text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
Simplicity Series: Lacoya Heggie Hey there! A little bit about me – I’ve been married to my college sweetheart for almost 4 years and we have 2 darling tyrants named Xavier, 9 and Olivia, 2 (both lovingly nicknamed #beansandpies, in that order). I currently work in corporate America as a Navy civilian engineer, but will soon be turning in my steeled-toe boots to pursue my passion for wedding planning & design full-time! Very exciting! I discovered my love for serving brides and grooms after having a terrible “planner-bail” moment during my very own wedding and now I strive my hardest to ensure that my couples are 100% stress-free on their wedding day! With that being said – the current balance of family, entrepreneurship, and a full-time job is taxing, and I am constantly brainstorming new ways to juggle it all! How do you take care of yourself so that you’re physically and mentally prepared to be your best self for others? I try my best to make sure I get enough sleep. Sleep is so important and I can totally see a difference if I get 5 hours of sleep vs. 6-8 hours. I currently have to get up at 5am to get to my corporate job, so my goal every evening is to finish up as much client work as I can and hit my bed by 10:30pm. It’s not my desired 8, but it’s sure better than 5 or less. With enough sleep, I wake up feeling energized and can last much longer throughout the day to be the best version of me for my family as possible. I am really looking forward to getting more sleep when I work for myself full-time! What’s your favorite beauty secret? Hands-down, my Clarisonic brush. My husband bought it for me for Christmas around 3 years ago and I have not stopped using it to this day. I use to clean my face the good ole-fashioned way with my two hands, but this brush really puts them to shame – it’s sad. It leaves my squeaky clean and ready to apply a light moisturizer. What’s your favorite go-to outfit for a quick polished look? I’m a sucker for charcoal slacks with a skinny leg, a flowy blouse with some really cute flats. Oh, and who forget a favorite statement necklace? I love statement necklaces! I’m normally not one with a face full of makeup, but I do love a light layer of Clinique foundation, a favorite blush and some tinted lip moisturizer. Now I’m ready to take on the world! What’s your favorite quick-prep dinner for your family? Have y’all heard of Tasty? If not, find them on Facebook and thank me later. This page has TONS of quick and easy recipes for family dinners for moms who don’t have tons of prep time. Slowcooker recipes are my favorite because I can just throw ingredients in and go. My husband has a really good one that simply involves placing a pork roast in the pot, covering it with root beer and cooking it on low for 6-8 hours. Once it’s done, shred it, add your favorite BBQ sauce, whip out some buns and you’ve got the best BBQ pulled-pork sandwiches! Tell us your favorite Instagram account to follow and why? Oh no! Don’t make me choose! If I had to choose one, I would have to say my dear friend, Jamie of Marigold & Grey. Instagram is, honestly, an outlet for me. Sort of like a favorite pasttime, if you will? I just really like to look at beautiful photos and not have to think so hard! Jamie is so gifted (no pun, intended) at what she does that I could literally sit and look at her feed all day and feel so totally at peace. Everything is so beautiful, so organized, the attention to detail is impeccable. She’s a true artist and I have so much love for her feed. What tradition or routine is important to you? I absolutely love to see my kids after a full day’s work. I know they really don’t see it as a tradition but like clockwork, everytime they see me – they laugh, smile and giggle. It makes me feel like, even on the hardest of days, I have plenty to be happy about. Their laughter and faces bring me so much joy. What’s in your purse? Scary question – haha. Let’s see – my pouch of pens (I feel like every woman has a pouch of pens in their purse! haha), an iphone charger, Tylenol (always have to be prepared), can’t live without C.O. Bigelow’s lip moisturizer, and Bath & Body Works Peppermint Hand Cream (a remnant of Christmas sales). Oh, and hand sanitizer! Where do you find your inspiration? Every single where. I pride myself on being a very good listener and when you actually stop to listen to what’s going on around you, absorb it and meditate on it – you will find that you are able to find tons on inspiration all over the place. I find it when talking with other business owners, clients, my husband, my children. I think that we, as women who wear so many different hats, have a hard time stopping to listen to what’s going on around us and seeing how it can inspire us in different ways. After all of these conversations – I like to brain dump whenever possible so I don’t lose any of it! We know you’re a busy lady! How do you balance all of your work responsibilities with your personal and home life? Any tips for our readers? Jesus. I know that that answer won’t resonate with everyone, but Mathew 6:33 (“See ye first the kingdom of heaven and everything else will be added unto you”) has become a settling motto in my life. Life can beat you up and give you a heart attack if you attempt to tackle it by yourself. I stressed myself out a lot years ago by trying to control every single thing in my life -and- make everyone happy around me. But God is able to handle all of these things a lot better than I can. I find that when I find the time to invest into building my relationship with him (praying, reading, fellowshipping with other like-minded people), I find a lot more balance and peace that I ever have when I don’t. What’s your favorite app (or other tool) for helping you do life? My daily planner! I do not know how I would adult through life without it. It helps me keep track of all of my meetings, games, etc. and also helps me to schedule out my tasks depending on what I have going on for the week. If it is not written in there – basically, it’s not happening. Haha! Gmail is also pretty awesome. Don’t know where I’d be without it. | Low | [
0.48178137651821806,
29.75,
32
] |
#!/usr/bin/env python ''' This example demonstrates a simple use of pycallgraph. ''' from pycallgraph import PyCallGraph from pycallgraph.output import GraphvizOutput class Banana: def eat(self): pass class Person: def __init__(self): self.no_bananas() def no_bananas(self): self.bananas = [] def add_banana(self, banana): self.bananas.append(banana) def eat_bananas(self): [banana.eat() for banana in self.bananas] self.no_bananas() def main(): graphviz = GraphvizOutput() graphviz.output_file = 'basic.png' with PyCallGraph(output=graphviz): person = Person() for a in xrange(10): person.add_banana(Banana()) person.eat_bananas() if __name__ == '__main__': main() | Mid | [
0.608856088560885,
41.25,
26.5
] |
//------------------------------// // Archive Nine: Heroes // Story: Arrow 18 Mission Logs: Lone Ranger // by AdmiralTigerclaw //------------------------------// MISSION LOG: December 3rd, 2257 So far, Dash seems to be handling the Raven a lot better than before. I think she’s still nervous if I’m reading pony ear expressions correctly, but Twilight is doing her best to keep the pegasus distracted from the fact that this bird is rather cramped. It’ll be at least another eighteen hours to reentry interface, so I’ve still got some time to kill before we have to strap in. I’ve spoken with Twilight, and she conceded that Rainbow Dash should get the copilot position during reentry. I need to make absolutely certain that Twilight lets Dash know that fire and flames are normal. We can’t have a repeat of the ascent incident while I’m trying to bring the Raven in on course. Dash is looking out the viewports as I type this. The planet continues to grow in size as we drop from high orbit. MISSION LOG December 4th, 2257 I wish I’d gotten a picture of the look on Dash’s face when she woke up from a nap to find us skirting along in low orbit. I had the Raven rolled pro-grade with the planet to the left, and the clouds in the atmosphere were zipping past at incredible speed. I doubt in her previous state during the ascent that she really appreciated the Mach count Twilight had been translating to her. As mentioned in the previous log entry, Twilight and I decided it was Dash’s ‘turn’ to take the front seat for reentry, maybe giving her a view out the main viewports during descent. I think our decision ended up being the right one. Dash remained calm all the way in, though around Mach 18 or so as we hit the fifty kilometer mark, the glowing plasma coming off the hull caused her to look at me repeatedly. Thankfully, every time she turned her head, I think seeing me being so calm helped her realize things were normal. I’m very pleased to say that for doing something none of her kind ever even thought about before, she handled it like a champ. I say this even considering her panic-stricken nature during half the time we spent in orbit. Now, aside from Rainbow’s expression during the remaining approach, I was quite surprised about what we discovered coming in. It seems in that in the course of a single week, the princesses had arranged for the creation of a landing strip just outside of Ponyville. It has, or I should say had, to be about five kilometers long, solid white and was lit up with marker lights its entire length. I said ‘had’ in the previous statement because at the time of writing this log, it’s long since ‘dissolved’. I’m not quite sure what it was. From altitude it looked like concrete, but it got laid down in less than a week so there’s no possible way. It was spongy, but firm, similar to cork… If one could imagine cork being as hard as stainless steel. Twilight told me it was something called-roughly translated-‘Cloudcrete.’, a type of industrial cloud used for the pegasus cloud city structures. I recall seeing the city in brief but things were so busy this last week it almost slipped my mind. I don’t know what to say about this ‘Cloudcrete’. If what Sparkle is telling me is accurate, it pours and shapes easier than cement, and hardens as strong as steel while still retaining incredibly ‘soft’ properties and the ability to be dispersed as easy as a mist under certain conditions. Kind of fantastical if you ask me, but I just flew a unicorn and a pegasus into space for a week… Cloudcrete’s also expensive from what I understand. Something about the magic cost of producing it being so high that it’s rarely ever used for anything other than supporting mounts for machines, and as counter tops in pegasus homes. Twilight didn’t want to go into details today, but she mentioned that it must have been the princesses themselves that provided the magic to ‘cure’ the amount used to create the strip. As far as I can say in terms of opinion, the Raven behaved no differently than if I’d set her down on a regular Earth landing strip. Perhaps a little better, seeing as touchdown was so smooth I almost didn’t feel the bump. As a note for the future, if we can establish regular contact and travel between worlds, I know some materials engineers who would kill for this stuff. I had better go now. There’s a massive party outside and I appear to be the guest of honor. That’s probably to be expected when you’re the first publicized beings to go into space. Check the next log entry for any additional details. MISSION LOG: December 7th, 2257 Ugh… Finally. Festivities, for lack of a better term, have been going almost non-stop for three days now. I feel like a museum piece from all the gawking and photos I’ve been in. Not to mention I've been all but force fed enough chocolate and sweets thanks to Pink that my dietitian back home would probably ban me from any and all substances containing sugar. I'm going to have to make sure I work off this excess weight to ensure I don't upset the Raven's center of mass. On the other hand, Rainbow Dash seems to have made a full rebound and has been all but devouring the attention sent her way. Twilight less so, but she seemed to enjoy the attention of Princess Heaven when she and her sister arrived. Both of the winged unicorns were extremely interested in their gifts. Luna in particular seemed to get completely lost in hers. Don’t worry guys, the world record score in Stardust* is still safe. She can’t get past level five for being too impatient to set up the advanced cascades. I should also mention the odd pony I met during all this. It wouldn’t be anything worth mentioning, except there seemed to be something very… I don’t know ‘not pony’ about this particular one. I think it was the way it acted. The ponies seem to subconsciously follow their herd nature and tended to cluster during the parties. And while they were timid towards me at first, they had warmed up to the tall alien creature I am. This one though, I’ve never seen it before, and it seemed almost unafraid of me at all. Actually, it, or should I say ‘she’ seemed to slip away whenever Twilight would talk to me. (Or whenever Dash dragged me off to have my eyesight ruined by ponies wielding old-style flash cameras.) I paid enough attention to notice that it didn’t really stick to any particular group and tended to regularly ‘scan’ the area as if looking for something… Or looking out for something. But the clincher in all this was the very real creepy crawly sensation I got whenever she got close enough. It’s like those skin-prickling chills I’ve been getting when Luna’s been watching, or when I was woken up in orbit. But far, far weaker. I keep forgetting to ask Twilight about her theory on that. Some thing's happening, but I’m not sure what. Whenever I’ve noticed it, that odd pony seemed to react as if she’d been slapped across the snout with a newspaper. For the time being, I'll call her Shifty. MISSION LOG: December 10th, 2257 Things have slowed down since our return, but I'm no less the center of attention I was before. Yesterday, the pink teacher from the school came by with the entire class as well as Twilight and Rainbow Dash in tow. With my permission (Twilight was very careful to ask me something like six times over, much to my satisfaction), I allowed the unicorn to take the young ones around the inside the Raven in groups of two while the teacher and Dash kept the others busy. Between the four of us, we managed to keep things amongst the children under control. I've been asked if I would like to come by in a week and explain with Twilight to the class how orbits work. MISSION LOG: December 12th, 2257 It's late and I've been going over the solar data I collected for over a week. I still don't get this. The microwave pattern and its 24 hour cycle still elude explanation. I think tomorrow I'll go check some recording equipment and see if there are any similar cycles being experienced on the ground. If I can just find SOMETHING I might be able to crack this nut. MISSION LOG: December 13th, 2257 I'm being stalked. I collected data from several of the surface instruments located around town today. While I was doing so, I started noticing that prickling tingle that comes whenever I feel Shifty about. I didn't see the odd pony anywhere, but it's been getting to the point where I can almost identify the 'type' of tingle she causes. - Tops of the arms, back of the neck, and a shudder like it's getting cold. Kind of like those stories about people who say they've encountered ghosts. I've got this strangest feeling I should be wearing my sidearm. But I see no actual reason why I should. MISSION LOG: December 15th, 2257 A quick observational report on Shifty thanks to some camera footage. Standing Height (all fours): ~110 cm Length: ~164 cm (Including tail) Weight: (Based on a hoof depression measurement) ~34 kg (!?)++ Behavioral Pattern: Shifty shows signs of wariness in the open but is oblivious to the camera as she approaches it. Like one would expect of a typical animal, she seems to sniff at the equipment and keep a few meters distance. She is also quite flighty. A shout (I assume from another pony to get away from the equipment) causes her to flee the scene. Of special note, unlike the ponies, who seem to rear in alarm, Shifty ducked more into a springing position typical of a cat or other large predator. ++ - I've not met a single pony that doesn't mass proportionally close to or above a typical human despite a smaller physical size. I'll have to bring this information to Twilight tomorrow. Perhaps she knows what this odd behavior represents in a pony. MISSION LOG: December 16th, 2257 I visited Twilight at the Library today and presented her with the information I've collected on Shifty. She acted confused at first, but then broke out into a broad grin before saying not to worry too much and just keep watching 'Shifty' and reporting how she behaves. When I asked if she knew something, Twilight just said that if she told me, it might skew the results. I let it drop at that point. I've come to to recognize that look. It tends to be one of her 'ask forgiveness rather than permission' looks. I won't get anything out of her until she's ready. The rest of today was spent preparing our presentation and lesson for the children tomorrow. Twilight mentioned that Rarity was going to show up, but hadn't been informed as to why. MISSION LOG: December 17th, 2257 Of all the things I've been given... I think this I'll treasure most. This badge was given to, Rainbow Dash, Twilight Sparkle, and myself by the class just before our presentation. It represents the experiences we shared during our week in space. I bet all the guys back home will be jealous after this. Well, all you have to do is be the last man standing in a political elimination match you didn't even know you were playing. But I digress. These badges were hoof-made by Rarity. (It seems awkward to say 'hand made' when they don't actually have hands.) I thought the ones made for the suits were good, but this is so much more. If you look at it in the light just right, you can even see how she managed to get some crushed gemstone mixed in. It's obvious she's been preparing these for weeks. I know I had some headaches dealing with the liberties Twilight's been taking with GSA property, but I guess in the end, provided I can keep myself between her and anything truly sensitive, like a hydrazine valve, things will be okay. The children (foals?) seemed to enjoy our presentation as well. With Twilight acting as translator, we essentially spent about half the day teaching basic orbital mechanics and Kepler's laws of planetary motion. They enjoyed it quite a bit right up until one child wearing a cute silver tiara fielded a question asking why, if physics made planets and moons move the way they did, did their rulers Princess Heaven and Princess Luna have to control them. I don't need to know how to speak 'pony' to know a loaded question when I hear it. Even before Twilight had translated for me, I knew she'd stopped dialogue with the sudden, absolute silence that followed. Having grown up and gone through childhood myself, I recognized a child that was being contrary for the sake of being contrary. And 'Little Princess' was certainly doing her best attempt to undermine me. However, it was still a valid question. And with Twilight there to translate for me, I told her the truth. Truth is: That is the entire reason I'm here. The follow up was like a cherry on top of an ice cream sundae. There was silence for several seconds before the children began to stomp their hooves on the floor. I was confused for a moment until I realized it was an applause. Imagine if you would, half a dozen small ponies drumming their front hooves on the ground. I could feel the floor shaking from just a small group of children. Later this evening, Twilight told me she was genuinely surprised how elegantly I'd handled it. 'Little Princess' was well known in town as what we would recognize as a 'spoiled rich kid'. And I had managed to, not so much as take her down a peg as rather to awe her into silence. But I'm still bothered by that question. I've solved what's making the sun of this world revolve around the planet... But in doing so, I've unearthed deeper questions. How? And more importantly... Why? MISSION LOG: December 18th, 2257 An overnight weather change caught me off guard today. When I woke up, it was pouring down rain and the sky was ablaze with lightning. Don't ask me why creatures that have complete control of the weather saw fit to include full on thunderstorms with their work, but I'm sure they have a reason for it. I was just settling in to spend another day reviewing the same data I've gone over half a dozen times with no luck when I noticed movement on a camera I'd placed in one of the wheel wells. At first I thought it was wind, but then a particularly loud crack of thunder caused a pony I had not noticed previously to practically jump out of its skin... or fur. Shifty, trying to take shelter from the storm by the aft gear. We have an old saying. 'It ain't a fit night out for man or beast.' And I'm sure this applied even here... Even if it was day time. It certainly wasn't weather I would call 'fit' for a man, or a beast. So I decided to play good Samaritan and risked the electric madness of a pegasus thunderstorm to open the hatch on the Raven. Shifty seemed almost as scared of me suddenly appearing and whistling at her as she was of the cracks of thunder around us. It was like trying to coax a dog that wouldn't listen inside. Only after a lightning bolt took out a tree fifty meters away (and about caused me to tumble right off the Raven), did she finally decide to heed my rather absurd 'come on!' gestures. I don't know how long she was out in that storm, but by the time we'd gotten back into the ship and secured the hatch, we were both soaked to the bone and freezing our collective rears off. The strange thing however, was that while I had to towel off and wipe up the deck, Shifty was practically dry in spite of being covered in fur. That would have added something else for me to ponder about her for days if she hadn't sneezed right about that moment. And spontaneously combusted. I panicked and dove for the cabin fire suppression system. I was sure she'd touched off an electrical fire some how when she went. The tell-tale green of burning copper was the only thing on my mind for a few seconds. I'm rather glad I missed the extinguishing button on my first lunge. Even though my mind was already imagining a hydro-lox fireball reducing the Raven to a smoldering crater a hundred meters wide, the flames were already subsiding by the time I was making my second. More importantly however, Shifty wasn't incinerated. At least, at the time I didn't think she was. Charred, maybe, but not incinerated. It took me a few moments to identify the creature I had formerly recognized. My first thought to type for a description is 'giant insect'. However, insects are defined strictly as having six legs. 'Shifty' was still a quadruped, and still seemed to sport the equine features of the pony races. I would say she or it more resembled some mad wizard's attempt to create Man-Fly... but with a pony mare. (Mare-fly?) Compound eyes but not compound eyes, wings, an exoskeleton-like skin, and fangs (3 cm or better, can't tell, don't want to find out the hard way). Although I find the concept a bit shocking to encounter the way I did, I can't help but almost feel sorry for the poor thing. Her body shows numerous signs of grievous past injuries. The exoskeleton is covered in lacerations and holes as big around as golf balls, and her wings are all but half-gone with what little remains tattered and damaged significantly. When I'd recovered from my surprise she was cowering in the corner like a beaten puppy. Any attempt I made to approach was met with a nasty hiss that would make a cobra proud. I wasn't about to test the effectiveness of those fangs either. Without knowledge of the creature, she could have anything up to and including natural neurotoxins. After my encounter with the formerly mythical cockatrice a few months back, I'm not about to push my luck with strange natural defenses. However, something did/does appear to be rather odd. Much like her behavior a few days back, this creature, which I'm assuming is still Shifty, seems to flinch horribly any time we lock eyes. It's that same flinch too. Like I'd physically reached out and struck her on the nose. At the moment, I'm not quite sure what to do. I'd like to get Twilight to find out what she really is, but I'm afraid the moment I leave, Shifty will run for it. All I know at the moment is that until a few hours ago, she looked like a normal pony. Now she's some kind of 'Mare-fly' that looks like she's been dashed on the jagged rocks of life and traumatized into fearing anything that so much as looks at her sternly. I could say I know one pony with similar behavior, but even she seems to open up once she starts to relax around you. At the moment Shifty's still tucked in a corner. She may or may not be asleep, but I'm not going to push it. I'll let her get used to being around me and see if she can realize that I'm not going to hurt her. I am going to lock the CHM when I go to sleep though. MISSION LOG: December 19th, 2257 [AM] Append at least two new pony breeds to the list. One: Bat-winged pegasi. Two: Polymorphic insectoidal pegasus/unicorn hybrids. When I awoke this morning, I found the Raven surrounded in the former. Judging by their gear, they were some kind of special guard unit. I feel they may be reacting to Shifty's presence, though I'm not sure how they knew she was here. Shifty herself seems to have calmed down and seems to recognize that I have no plans to cause her harm. I am hissed at if I approach looking as if I wish to touch her, but otherwise she no longer cringes in the corner. Shifty appears to be some kind of magic-based, chameleon-like equinoid. Like the princesses, she appears to possess hybrid traits of both wings and a horn, though in this case I'm willing to hypothesize that these features aren't related, and shows competency in utilizing both to a certain level. However, the dominant feature appears to be a sufficiently effective polymorphic disguise ability. Under normal physical laws, I would have called the feat impossible, but the existence of magic can easily cover this. Unfortunately, I have yet to document anything on this ability as her 'spontaneous combustion' yesterday was my only clue. However, I can make a few assumptions. Based on the condition of her current body, I surmise this is her true form. Logic would dictate that any new form she took would be made to blend in, and look like it was in good condition. Second, even if she were attempting to use a 'hurt' appearance for sympathy or as a means of predation, it would likely utilize more recent and/or pressing injuries that would garner immediate attention. With the number, severity, and apparent age of her wounds, I would assume them to be the real deal. Third, I doubt she would attempt the disguise after-the-fact, or even allow me to witness the disguising process. Because of this, I can only assume she suffered a failure of her abilities when she sneezed. A second assumption that I can make is that conservation of mass is followed. Records indicated Shifty was exceptionally light for a pony of the species she was disguised as. Her current form explains much of that. Unlike ponies, her limbs are smaller and more wiry, and her body much more lean. I would say even bordering on anorexic if I'm to assume that her body mass is supposed to even remotely approach the others. Without a wider pool of subjects to examine, I can make no conclusions. As for dietary habits, I cannot give any conclusions there either. I offered food of both stuff I know the ponies will eat, as well as meat given the presence of her fangs. All options were ignored. I might note that it was not with a vicious hiss either. Shifty seemed to at least recognize my intent. I'll finish this log later. Someone's knocking on the cockpit windows. MISSION LOG: December 19th, 2257 [PM] At approximately noon, local time, Shifty was taken into custody by what is apparently the night division of the royal guard. Interesting that bat-winged pegasi exist. I guess it makes sense that they're nocturnal, but it just comes across as some kind of children's logic. Anyway, according to Twilight Sparkle, Shifty is a member of an extremely hostile species of sapient, shape-shifting parasitic lifeforms. She called them 'changers' for a lack of a better translation. Apparently, Changers recently launched an attack on the capital, which did significant damage, but failed spectacularly after their queen made a critical military blunder. Twilight failed to elaborate on that. I can only assume the queen underestimated the power of a creature like Princess Heaven, who can move stars around. Twilight did however elaborate on some of the nature of a changer. Parasite seems to be a pretty accurate term for what it does. According to Twilight, a changer does not consume organic matter to sustain itself in the conventional sense. Instead, it is apparently a creature that uses emotional attachment to siphon magic from a host. Most commonly, it seems to go after love. This, along with its clever disguising ability allows it to blend in and feed off a host, or multiple hosts, not only sustaining it, but increasing its strength. Twilight referred to the entire concept as feeding on love, but after a brief discussion we both agreed that love itself is little more than a mental construct and not a tangible energy. More likely, and I feel so silly taking this seriously, the changer utilizes the emotional, and possibly psychic vulnerability introduced by love and similar emotions to more easily approach and siphon magical energy from the host. When I asked Twilight if she knew about the changer, she mentioned that she started suspecting it when I gave her the data on Shifty's peculiar behavior and physical characteristics. Plus, apparently Pink Pie had mentioned something about not recognizing Shifty. Ah, good ol' small-town dynamics. Everyone knows everyone. And if they don't, good luck hiding. So anyway, from what I gather, Shifty has been taken into custody, but should not be harmed. Twilight mentioned being a bit curious about the whole event and wanted the changer around once it was proven safe. By her understanding, I'm completely immune to a large number of magical effects ranging from the cockatrice attack on through to Princess Luna's 'dream viewing'. The moment she said that, I should note she stuck both hooves over her mouth and made a squeak more at home coming from Dormouse. When I pressed the issue, Twilight quickly excused herself, saying she'd already skewed the results enough just saying that. Now I know that girl's up to something. | Low | [
0.52127659574468,
30.625,
28.125
] |
Park Street Park Street may refer to: Park Street, Boston, Massachusetts, USA Park Street, Hertfordshire, England Park Street, Kolkata, India Park Street, Bristol, England Park Street, Sydney, Australia Park Street, Cambridge, England Park Street, Mayfair, London, England Park Street, Southwark, London, England Park Street, West Sussex, England Former name of Parks Road, Oxford, England Park Street, Bath, Somerset, England Park Street, Wakad, Pune, Maharashtra, India Transportation Park Street station (MBTA), station in Boston, Massachusetts, United States Park Street railway station (England), railway station in Park Street, Hertfordshire, England Parkville station (Connecticut), known as Park Street during planning Park Street metro station (Kolkata) in Kolkata, India See also Park Street station (disambiguation) | Mid | [
0.578842315369261,
36.25,
26.375
] |
Q: IPs overlaps on L3 cisco 3550 switch? I want to configure my L3 switch to connect multiple devices: squid proxy (192.168.1.4) web server (192.168.1.6) client (192.168.1.11) something like that: the problem is when I configure one interface it worked will: ip address 192.168.1.7 255.255.255.0 but when I try(on another interface): ip address 192.168.1.8 255.255.255.0 this message returned: 192.168.1.0 overlaped with fastethernet0/1 this is confusing, because I have used /24 as a mask. and even when I try: ip address 192.168.2.8 255.255.255.0 I can't connect the webserver(192.168.1.6) to the squid (192.168.2.4) So is there something I have missed? Note: I have configured all the interfaces to be no switchport. A: So is there something I have missed? Yes, you've got the following machines that you want in the same /24 subnet: squid proxy (192.168.1.4) web server (192.168.1.6) client (192.168.1.11) However, you're trying to put each one of them on their own routed interface; this is a very common mistake. The simplest solution to your problem is to create what Cisco calls a Switched Vlan Interface (SVI) for all of 192.168.1.0/24 on your 3550. Let's assume you're going to use Vlan 10 for all these systems; it doesn't really matter what vlan number you use, although people tend to avoid vlan 1 for security reasons. I will make assumptions about which switchport you connected these systems to, however the port numbers should not matter; just be sure that you configure their actual port number in vlan 10. The configuration you want to use is: ip routing ! ! many people set vtp to transparent to avoid future problems... vtp mode transparent ! vlan 10 state active ! interface FastEthernet0/1 description [Squid Proxy] switchport access vlan 10 switchport mode access ! interface FastEthernet0/2 description [Web Server] switchport access vlan 10 switchport mode access ! interface FastEthernet0/3 description [Client] switchport access vlan 10 switchport mode access ! interface Vlan10 ip address 192.168.1.254 255.255.255.0 no ip proxy-arp no ip directed-broadcast no shut ! ! Add a default route on a different SVI if you want these systems ! to route through the 3550 to other networks Now configure your squid proxy, web server, and client to use 192.168.1.254 as the default gateway. Finally, consider using switchport nonnegotiate on Fa0/1, Fa0/2, and Fa0/3. | Mid | [
0.645502645502645,
30.5,
16.75
] |
Egypt: Betrayed but not broken By Yolande Knell BBC News, Cairo Published duration 1 February 2013 image caption People took the streets again on Friday in Cairo, the traditional day of protest On chilly, rain-soaked streets, activists turned out for a peaceful march to al-Ittihadiya, the presidential palace in Cairo's well-off Heliopolis district. "Step down, step down, Muslim Brotherhood!" and "Freedom is for us and for you!" were among the chants. Some carried placards showing a red cross through the face of President Mohammed Morsi. Meanwhile, in Tahrir Square, the scene of renewed clashes between protesters and police over the past week, numbers swelled to several thousand after Friday prayers. Rallies against Mr Morsi also took place in cities along the Suez Canal where he imposed emergency measures to try to halt recent violence. Demonstrators carried pictures of young men killed in the fighting. More than 60 people died in the latest wave of unrest that added to the sense of a deep crisis in Egypt. The numbers at the latest demonstrations were lower than expected and greatly diminished from those seen two years ago, at the height of the Egyptian uprising. However, they were another expression of the anger and disappointment that many Egyptians feel over the performance of their new Islamist leader who narrowly won last June's presidential election. 'New authoritarianism' Mr Morsi's critics accuse him of betraying the values of the 2011 revolt and imposing a new brand of authoritarianism that concentrates power in the hands of the Muslim Brotherhood, the religious organisation from which he stems. image caption Protesters say they want to purge the country's judiciary and interior ministry The main opposition coalition, the National Salvation Front (NSF), demands a national unity government and amendments to the new Islamist-tinged constitution. Revolutionary groups also call for reforms. "We're not for or against Morsi. He just hasn't fulfilled his electoral promises," says Mohammed Adel, a leader of the 6 April Youth Movement which helped organise the latest protests. "We want the constitution to be changed, we want the judiciary and interior ministry to be cleansed and we want violence by the state to stop." The president's supporters argue that his detractors refuse to accept the results of a free and fair election and are trying to seize power through the street. Mr Morsi has not ruled out a committee to re-examine the rushed new constitution but says a new government will be decided after parliamentary elections in a few months. "After the elections we will have a parliament chosen by the people. It is the duty of parliament to make a new government," he told journalists on Wednesday. Al-Azhar agreement This week brought a stern warning from the head of the military that continuing political strife could cause the collapse of the state. Afterwards, Egypt's Grand Imam summoned rival political factions, youth groups and church officials to the headquarters of al-Azhar, the 1,000-year-old institution that is the top seat of Sunni Islam. They agreed to sign up to a charter condemning violence and committed to dialogue as a way to end the crisis. It prompted the Nobel Peace Prize winner, Mohammed ElBaradei, a leader of the NSF, to speak of his "optimism" while the head of the Muslim Brotherhood's Freedom and Justice Party, Saad el-Katatni, declared it "a historic day". The agreement appeared to help take away the impetus for further mass protests on what activists had called "The Friday of Salvation". A lot of Egyptians are also weary of demonstrations or are worried about their personal safety. Egypt on edge The economy was already teetering before the latest turmoil. Tourism and foreign investment have fallen dramatically. The central bank has been forced to drain currency reserves to prop up the Egyptian pound. "The country is going down. It's worse now than under the old president," said one man observing protesters at the entrance to Tahrir Square. Another bystander chimed in: "[The former president, Hosni] Mubarak was lousy and he was a thief but at least we had security and we were living". Parts of central Cairo have become no-go areas for many ordinary people with reports of a spike in sexual assaults and increased crime and lawlessness. The Nile-side luxury hotel, the Semiramis InterContinental, has been closed after masked men looted it early on Tuesday, terrifying guests. "This is a disaster," said small businessman, Gamal. | Low | [
0.521739130434782,
30,
27.5
] |
Structural analysis of Arabidopsis thaliana chromosome 3. I. Sequence features of the regions of 4,504,864 bp covered by sixty P1 and TAC clones. Based on the physical map of Arabidopsis thaliana chromosome 3 previously constructed with CIC YAC, TAC, P1 and BAC clones (Sato, S. et al., DNA Res., 5, 163-168, 1998), a total of 60 P1 and TAC clones were sequenced, and the sequence features of the resulting 4,504,864 bp regions were analyzed by applying various computer programs for similarity search and gene modeling. As a result, a total of 1054 potential protein-coding genes were identified. The average density of the genes identified was 1 gene per 4066 bp. Introns were observed in 77% of the genes, and the average number per gene and the average length of the introns were 3.9 and 156 bp, respectively. These sequence features are essentially identical to those of chromosome 5 in our previous reports, but the gene density was slightly higher than that observed for chromosomes 2 and 4. The regions also contained 10 tRNA genes when searched by similarity to reported tRNA genes and the tRNA scan-SE program. The sequence data and information on the potential genes are available through the World Wide Web database KAOS (Kazusa Arabidopsis data Opening Site) at http://www.kazusa.or.jp/kaos/. | High | [
0.6716049382716051,
34,
16.625
] |
Q: Existence of Parentheses after the new, make any different in C++11 Look at the tow declarations bellow. These two method make any different in C++ 11? I checked the story about C++03 here Class A{int m;} A* a = new A A* a = new A(); A: It's the same in C++11 as it was in C++03. The first is default-initialision, leaving m uninitialised. The second is value-initialisation, initialising m to zero. If the class had a user-provided default constructor, then both would do the same thing, calling that constructor. | Low | [
0.509749303621169,
22.875,
22
] |
Church of St. Stephen (Stari Grad, Hvar) The Church of St. Stephen (Crkva sv. Stjepana u Starom Gradu) is the parish church of Stari Grad on the island of Hvar in Croatia. It is dedicated to the martyred Pope Stephen I. It stands on the eastern side of a small square, Trg sv. Stjepana (St. Stephen's Square), in the historical centre of Stari Grad. History It was built from 1605 onward at the site of an earlier church also dedicated to St. Stephen. The previous church, built in the 9th/10th centuries, had served as the cathedral for the bishop of Hvar from 1147, when the diocese was established, until 1278, when the island placed itself under the protection of the Venetian Republic and the bishopric was moved to the town of Hvar. It was severely damaged during a raid of the Ottoman admiral Uluç Ali on the island of Hvar in 1571 before he participated with his Algerian corsair fleet in the Battle of Lepanto on 7 October 1571. Once the town had recovered from this devastation, the ruins of the old cathedral and of the adjacent episcopal palace were demolished and the construction of the new church begun in 1605. The bell tower was only completed in 1753. Architecture The present church, in the style of Dalmatian Baroque, is a large three-nave basilica with a square apse, built of stone from the nearby island of Korčula which oxidizes over time and takes on a red-brown colour. It is the work of local craftsmen. The main portal in the centre of the west-facing façade, and probably the entire façade, is the work of Ivan Pomenić from Korčula who also worked on the Cathedral of St. Stephen in Hvar. The two side aisles are the work of Mark Foretić from Korčula and of the master of the Skarpa-family of Stari Grad. The baroque façade has a semicircular gable, a large central portal and two smaller side portals, all in the style of the late Renaissance/early Baroque. Above the central portal is a rose window. Interior The vault of the nave is decorated with stucco which imitates Gothic ribbed vaults of the late Gothic. The church has a beautiful wooden choir and contains a number of valuable furnishings by well-known artists. The stone baptismal font of 1592 is by the architect and sculptor Tryfun Bokanić (1575 - 1609) from Pučišća on the island of Brač. The main altar is the work of the Venetian workshop of Alessandro Tremignon from 1702. In the northern aisle are a wooden crucifix from the 17th century and the black marble altar of the Holy Cross, a work of the architect and sculptor Andrea Bruttapelle (1728-1782) from 1773. In the southern aisle stand the altar of St. Anthony of Padua from the first half of the 18th century and an altar from the 19th century with the figures of Sts. Cosmas and Damian and of St. Lucy. Next to it is the most valuable work of art in the church, a triptych by the Venetian Francesco di Gerolamo de Santacroce (1516-1584) depicting St. Mary, St. John the Baptist and St. Jerome. On the outside of the church is a stone relief of Eros, one of the rare remains from the ancient Greek polis. Bell tower The bell tower stands apart from the church. The inscription above its door indicates that it was completed in 1753. Another inscription, in Latin, states that stone blocks of the lower part of the tower were part of the city walls of the ancient Pharos, the Greek predecessor of today's Stari Grad, and that the gate to the city was at this location. In the wall on the ground floor is a relief of a Roman merchant ship, dating from the 2nd century AD. References External links A brief history of Stari Grad Category:Basilica churches in Croatia Category:Hvar Category:Buildings and structures in Split-Dalmatia County Category:Tourist attractions in Split-Dalmatia County | Mid | [
0.570796460176991,
32.25,
24.25
] |
# See the ExtractFilenamesFromWindowsEDB.ps1 - same script, but extended with filenames and not only folder names.
# The script performs an analysis of the Windows.edb, specifically, the "SystemIndex_GthrPth" table containing indexed locations.
# The result may be a great source of knowledge about folders on the drive, mainly in user profiles.
# The table contains also an information about outlook items, but while folders are stored in a normal way, objects are only referred via binary data. The script ignores such data.
# For your own safety, please work on the copy of the Windows.edb file and not on the original one: C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb even if the script opens it readonly.
# Analysis of the database may be made without any special permissions, but gathering the file itself is a bit more challenging. I can suggest following ways:
# 1. net stop wsearch & copy & net start wsearch
# 2. offline copy (such as copy from disk image, by booting from usb etc.)
# 3. copy from the vss snapshot
# The table usually has thousands of rows. Analysis may take several time (about 2 mins for 50k rows), and the script displays an information about the progress.
# SET IT TO YOUR COPY OF Windows.edb
$edbfile = ".\Windows.edb"
$VerbosePreference = "Continue" # SilentlyContinue do not display messages. Additionally you can uncomment line 143.
$ProgressPreference = "Continue" # SilentlyContinue = do not display progress bars. Increases speed about 6%
# --------------------------------------------------
$edbfile = (Resolve-Path $edbfile -ErrorAction SilentlyContinue).Path # fix the path is specified above
if ($null -eq $edbfile) {
Write-Host "Cannot find Windows.edb file."
break
}
$TableName = "SystemIndex_GthrPth" # do not touch this
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][System.Reflection.Assembly]::LoadWithPartialName("System.Drawing")
[void][System.Reflection.Assembly]::LoadWithPartialName("Microsoft.Isam.Esent.Interop")
# create Form for displaying the folder tree
$Form = New-Object System.Windows.Forms.Form
$Form.Text = "Indexed locations"
$Form.Size = New-Object System.Drawing.Size(640, 480)
# create Treeview-Object
$TreeView = New-Object System.Windows.Forms.TreeView
$TreeView.Dock = [System.Windows.Forms.DockStyle]::Fill
$TreeView.Sorted = $true
$Form.Controls.Add($TreeView)
# Let's do some basic checks for the EDB file
[System.Int64]$FileSize = -1
[Microsoft.Isam.Esent.Interop.Api]::JetGetDatabaseFileInfo( $edbfile, [ref]$FileSize, [Microsoft.Isam.Esent.Interop.JET_DbInfo]::Filesize)
Write-Verbose -Message "File size: $FileSize"
if ($FileSize -le 0) {
Write-Host "Could not read edb size. Something went wrong."
break;
}
# not so interesting but we need it later anyway.
[System.Int32]$PageSize = -1
[Microsoft.Isam.Esent.Interop.Api]::JetGetDatabaseFileInfo($edbfile, [ref]$PageSize, [Microsoft.Isam.Esent.Interop.JET_DbInfo]::PageSize)
Write-Verbose -Message "Page size: $PageSize"
[Microsoft.Isam.Esent.Interop.JET_INSTANCE]$Instance = New-Object -TypeName Microsoft.Isam.Esent.Interop.JET_INSTANCE
[Microsoft.Isam.Esent.Interop.JET_SESID]$Session = New-Object -TypeName Microsoft.Isam.Esent.Interop.JET_SESID
[void][Microsoft.Isam.Esent.Interop.Api]::JetSetSystemParameter($Instance, [Microsoft.Isam.Esent.Interop.JET_SESID]::Nil, [Microsoft.Isam.Esent.Interop.JET_param]::DatabasePageSize, $PageSize, $null)
[void][Microsoft.Isam.Esent.Interop.Api]::JetSetSystemParameter($Instance, [Microsoft.Isam.Esent.Interop.JET_SESID]::Nil, [Microsoft.Isam.Esent.Interop.JET_param]::Recovery, [int]$false, $null)
[void][Microsoft.Isam.Esent.Interop.Api]::JetSetSystemParameter($Instance, [Microsoft.Isam.Esent.Interop.JET_SESID]::Nil, [Microsoft.Isam.Esent.Interop.JET_param]::CircularLog, [int]$true, $null)
[Microsoft.Isam.Esent.Interop.Api]::JetCreateInstance2([ref]$Instance, "Windows_EDB_Instance", "Windows_EDB_Instance", [Microsoft.Isam.Esent.Interop.CreateInstanceGrbit]::None)
[void][Microsoft.Isam.Esent.Interop.Api]::JetInit2([ref]$Instance, [Microsoft.Isam.Esent.Interop.InitGrbit]::None)
[Microsoft.Isam.Esent.Interop.Api]::JetBeginSession($Instance, [ref]$Session, [System.String]::Empty, [System.String]::Empty)
[Microsoft.Isam.Esent.Interop.JET_DBID]$DatabaseId = New-Object -TypeName Microsoft.Isam.Esent.Interop.JET_DBID
Write-Host "Attaching DB... " -NoNewline
[Microsoft.Isam.Esent.Interop.Api]::JetAttachDatabase($Session, $edbfile, [Microsoft.Isam.Esent.Interop.AttachDatabaseGrbit]::ReadOnly)
Write-Host "Opening DB... " -NoNewline
[Microsoft.Isam.Esent.Interop.Api]::JetOpenDatabase($Session, $edbfile, [System.String]::Empty, [ref]$DatabaseId, [Microsoft.Isam.Esent.Interop.OpenDatabaseGrbit]::ReadOnly)
[Microsoft.Isam.Esent.Interop.Table]$Table = New-Object -TypeName Microsoft.Isam.Esent.Interop.Table($Session, $DatabaseId, $TableName, [Microsoft.Isam.Esent.Interop.OpenTableGrbit]::None)
$Columns = [Microsoft.Isam.Esent.Interop.Api]::GetTableColumns($Session, $DatabaseId, $TableName)
$ColArr = @()
foreach ($Column in $Columns) {
$ColArr += $Column
}
[void]([Microsoft.Isam.Esent.Interop.Api]::TryMoveFirst($Session, $Table.JetTableid))
[System.Int32]$RecCount = -1
[Microsoft.Isam.Esent.Interop.Api]::JetIndexRecordCount( $Session, $Table.JetTableid, [ref]$RecCount, 0)
Write-Verbose -Message "Records: $RecCount"
if ($RecCount -le 0) {
Write-Host "Could not read record count. Something went wrong."
break;
}
#preparing the tree data
$TreeView.Nodes.Clear()
$nodesarr = @()
#tree node for orphaned entries
$node = New-Object System.Windows.Forms.TreeNode
$nodesrow = New-Object psobject
$nodesrow | Add-Member -Name "Scope" -Value $nodesarr.Count -MemberType NoteProperty
$nodesrow | Add-Member -Name "Parent" -Value 0 -MemberType NoteProperty
$nodesrow | Add-Member -Name "TreeNode" -Value $node -MemberType NoteProperty
$nodesarr += $nodesrow
$nodesarr[0].TreeNode.Text = "ORPHANS:"
$nodesarr[0].TreeNode.Name = "0"
[void]$TreeView.Nodes.Add($nodesarr[0].TreeNode)
#root (=1)
$node = New-Object System.Windows.Forms.TreeNode
$nodesrow = New-Object psobject
$nodesrow | Add-Member -Name "Scope" -Value $nodesarr.Count -MemberType NoteProperty
$nodesrow | Add-Member -Name "Parent" -Value 0 -MemberType NoteProperty
$nodesrow | Add-Member -Name "TreeNode" -Value $node -MemberType NoteProperty
$nodesarr += $nodesrow
$nodesarr[1].TreeNode.Text = "INDEX:"
$nodesarr[1].TreeNode.Name = "1"
[void]$TreeView.Nodes.Add($nodesarr[1].TreeNode)
$i = 0
while ($true) {
if (($i % 100) -eq 0) {
Write-Progress -Activity "Reading rows" -CurrentOperation "$i of $RecCount" -PercentComplete (($i * 100) / $RecCount) -id 1
}
$i = $i + 1
$Buffer = [Microsoft.Isam.Esent.Interop.Api]::RetrieveColumn($Session, $Table.JetTableid, $ColArr[0].Columnid)
if ($Buffer.count -eq 50) {
#first filter for mapi entries.
#if we have more than 10 "172" values in the name, it is not a name... YMMV!
$counter172 = 0
for ($k = 0; $k -le 49; $k++) {
if ($Buffer[$k] -eq 172) {
$counter172 += 1
}
}
if ($counter172 -ge 10) {
if (![Microsoft.Isam.Esent.Interop.Api]::TryMoveNext($Session, $Table.JetTableid)) {
break
}
continue
}
}
$Buffer = [System.Text.Encoding]::Unicode.GetString($Buffer)
$BufferParent = [Microsoft.Isam.Esent.Interop.Api]::RetrieveColumnAsInt32($Session, $Table.JetTableid, $ColArr[1].Columnid)
$BufferScope = [Microsoft.Isam.Esent.Interop.Api]::RetrieveColumnAsInt32($Session, $Table.JetTableid, $ColArr[2].Columnid)
# Write-Verbose -Message ($Buffer) # uncomment do display rows when processing. Makes script 10% slower.
$j = 0
$ShowProgress2 = $false #sometimes we add one or two nodes, sometimes couple of thousands. Let's display progress when it makes sense
$NodesToAdd = (([Math]::Max($BufferScope, $BufferParent)) - $nodesarr.Count)
if ($NodesToAdd -gt 1000) {
$ShowProgress2 = $true
}
while ($nodesarr.Count -le ([Math]::Max($BufferScope, $BufferParent))) {
if ($ShowProgress2) {
if (($j % 100) -eq 0) {
Write-Progress -Activity "Adding nodes" -CurrentOperation "$j of $NodesToAdd" -PercentComplete (($j * 100) / $NodesToAdd) -ParentId 1 -id 2
}
$j = $j + 1
} #showprogress2
$newnode = New-Object System.Windows.Forms.TreeNode
$nodesrow = New-Object psobject
$nodesrow | Add-Member -Name "Scope" -Value $nodesarr.Count -MemberType NoteProperty
$nodesrow | Add-Member -Name "Parent" -Value 0 -MemberType NoteProperty
$nodesrow | Add-Member -Name "TreeNode" -Value $newnode -MemberType NoteProperty
$nodesarr += $nodesrow
} #while - adding nodes
if ($ShowProgress2) {
Write-Progress -Id 2 -Completed -Activity "Done."
}
$nodesarr[$BufferScope].TreeNode.Text = $Buffer
[void]$nodesarr[$BufferParent].TreeNode.Nodes.Add($nodesarr[$BufferScope].TreeNode)
$nodesarr[$BufferScope].Parent = $BufferParent #will be useful to find orphans
if (![Microsoft.Isam.Esent.Interop.Api]::TryMoveNext($Session, $Table.JetTableid)) {
break
}
} #while true
Write-Progress -Id 1 -Completed -Activity "Done."
# I never saw any orphans, but better safe than sorry
for ($i = 2; $i -le $nodesarr.Count; $i++) {
if ($nodesarr[$i].Parent -eq 0) {
if ($nodesarr[$i].TreeNode.Text -ne "") {
$nodesarr[0].TreeNode.Nodes.Add($nodesarr[$i].TreeNode)
}
}
}
#close/detach the database
Write-Verbose -Message "Shutting down database $edbfile due to normal close operation."
[Microsoft.Isam.Esent.Interop.Api]::JetCloseDatabase($Session, $DatabaseId, [Microsoft.Isam.Esent.Interop.CloseDatabaseGrbit]::None)
[Microsoft.Isam.Esent.Interop.Api]::JetDetachDatabase($Session, $Path)
[Microsoft.Isam.Esent.Interop.Api]::JetEndSession($Session, [Microsoft.Isam.Esent.Interop.EndSessionGrbit]::None)
[Microsoft.Isam.Esent.Interop.Api]::JetTerm($Instance)
Write-Verbose -Message "Completed shut down successfully."
# Show Form // this is blocking call, so you need to close the form to make the script terminate.
Write-Verbose -Message "Showing the tree..."
$Form.Add_Shown( { $Form.Activate() })
[void] $Form.ShowDialog()
| High | [
0.685857321652065,
34.25,
15.6875
] |
<?xml version="1.0" encoding="utf-8"?> <selector xmlns:android="http://schemas.android.com/apk/res/android"> <item android:state_pressed="true"> <shape android:shape="rectangle"> <corners android:radius="2dp" /> <solid android:color="#44BF1A" /> </shape> </item> <item android:state_enabled="true"> <shape android:shape="rectangle"> <corners android:radius="2dp" /> <solid android:color="#44BF1A" /> </shape> </item> <item android:state_enabled="false"> <shape android:shape="rectangle"> <corners android:radius="2dp" /> <solid android:color="#337523" /> </shape> </item> <item> <shape android:shape="rectangle"> <corners android:radius="2dp" /> <solid android:color="#337523" /> </shape> </item> </selector> | Low | [
0.49324324324324303,
27.375,
28.125
] |
Not only does it have a very high dividend yield, but it also makes its payments each month. This helps Whitestone to stand out, as there are currently just 41 monthly dividend stocks. You can download the full list of monthly dividend stocks from our database below: Stocks with such extremely high yields can also carry significant risk. As a result, it is critical for investors to make sure the high dividend payouts are sustainable over the long term. This article will discuss Whitestone’s business model, and whether its dividend is covered by sufficient cash flow. Business Overview Whitestone is a commercial REIT. Its properties are located primarily in the South: Phoenix (50% of operating profit) Houston (20% of operating profit) San Antonio/Austin (20% of operating profit) Dallas (9% of operating profit) Chicago (1% of operating profit) Whitestone’s focused strategy is a competitive advantage. It primarily invests in destination centers, such as grocery stores, retail outlets, banks, restaurants, and many more. As of March 31st, 2017, Whitestone’s portfolio consisted of 69 properties, with over 1,500 tenants. It has a solid occupancy rate of 89%. Source: June 2017 Investor Presentation, page 17 Whitestone believes its investment properties are “e-commerce resistant”, because they are go-to destinations that provide needed or necessary centers. Moreover, the company believes these are products and services that are not readily available online. And, these properties are located in densely-populated, high-income areas, which are experiencing strong growth. Not only does Whitestone expect its properties to benefit from population growth, but from household income growth as well. According to the company, household growth within a three-mile radius is likely to exceed 8% per year, over the next five years. Furthermore, households within a three-mile radius are expected to generate income growth of approximately 7.8% per year, over the same time. The neighborhoods it invests in have an average household income of over $75,000, well above the industry average of approximately $62,000. This focus has served the company, and its shareholders, very well. Whitestone has racked up very high growth rates for the past seven years. Source: June 2017 Investor Presentation, page 23 Since Whitestone’s initial public offering in August 2010, its revenue and funds from operation have grown by 23% and 32% per year, respectively. Going forward, the company will continue its acquisition strategy to fuel future growth. Growth Prospects Acquisitions are a key piece of Whitestone’s growth strategy. The company abides by several acquisition criteria before purchasing a property. And, the properties must have potential for increasing rents and renovation potential, and may also feature vacant land to build on. It also will invest in distressed properties, whose maturity has passed with a high likelihood that it will not be refinanced. Purchasing non-performing assets allows Whitestone to buy valuable properties on the cheap, which it can redevelop and earn a sizable rate of return. It completed two major acquisitions to start 2017, BLVD Place and Eldorado Plaza, both located in Texas. Acquisitions have generated strong growth for Whitestone since its IPO, but growth has leveled off in recent years. Source: June 2017 Investor Presentation, page 6 It finances these acquisitions with a mix of internally generated cash flow, as well as external equity and debt issuances. FFO, or Funds From Operation, is a non-GAAP measure typically utilized by REITs to express cash flow available for distributions. FFO-per-share declined fractionally from the previous year, due to higher shares outstanding. But the company remained solidly profitable, with FFO-per-share of $1.34. FFO-per-share declined again in the first quarter. Revenue increased 11%, but FFO-per-share declined 5.8% year over year. Fortunately, Whitestone expects FFO-per-share in a range of $1.34-$1.39 per share for 2017, which would represent a return to growth on a per-share basis. Dividend Analysis Whitestone has obvious appeal for income investors, because of its very high dividend yield. That said, it is also important to assess a REIT’s ability to pay its dividend, especially with such high-yielding stocks like Whitestone. For the first quarter of 2017, Whitestone had a debt-to-EBITDA ratio of 8.8, which is high. The good news is, management intends to reduce the ratio to 7.0 over the next one to two years. The bad news is, this is still a fairly high debt level, which means further work needs to be done. The company generates enough cash flow to pay its dividend for now, thanks to a sufficient coverage ratio. Source: June 2017 Investor Presentation, page 28 Whitestone’s 2016 core FFO of $1.34 per share fully covers its annualized dividend of $1.14 per share. If the company can continue growing FFO moving forward, it will strengthen its dividend coverage. Another piece of good news is that approximately 64% of Whitestone’s debt is fixed-rate, with a manageable weighted average interest rate of 4%. This will help blunt the impact of rising interest rates moving forward. Its mortgage debt averages just $7.7 million in maturities over the next three years. It has ample short-term liquidity, with over $100 million in an unused credit revolver, along with $6.5 million in cash. However, the longer-term picture is much cloudier. Whitestone is facing approximately $278 million in total maturities in 2020. If the company can grow FFO-per-share, it could withstand its long-term maturities. Still, investors should keep an eye on Whitestone’s financial results in subsequent quarters, to confirm its debt reduction strategy is still intact. Final Thoughts The old saying ‘high risk, high reward’ seems to apply to Whitestone. While the stock has a tantalizingly high dividend yield, it is not without risk. The current dividend payout looks sustainable for now and over the next few years. Whether the dividend can be maintained over the long-term, remains to be seen. If everything goes according to plan, Whitestone could be an attractive stock for investors looking for income right now, such as retirees. Whitestone has not raised its dividend since its IPO in 2010, meaning it is not as attractive for dividend growth investors. As a result, the decision whether to buy Whitestone stock, may come down to the investor’s time horizon and level of risk aversion. Thanks for reading this article. Please send any feedback, corrections, or questions to [email protected]. | Mid | [
0.553524804177545,
26.5,
21.375
] |
With 2:15 left in the third quarter at the United Center last night, the Bulls and Sixers made their ways to the proper benches for a TV timeout. It was that time in the night when a footrace between animated breakfast food comes on the video board, and as the racers were announced (Dashing Donut, Cuppy Coffee, and Biggie Bagel), people in the crowd reached for their cards to find out in which Dunkin’ Donuts product they had a rooting interest. My friend made a joke about how Larry Bird must hate all this, but aside from that, I see little problem in providing fans with interstitial bits of entertainment. Plus, Dunkin’ Donuts coffee is delicious. The troubling part came when we noticed that joining the viewing public was the majority of the 76ers bench. Down 11, two days after a double-digit loss to D-League Orlando followed by a public chastising by its coach, most of the Philly roster was more invested in Dashing Donut’s triumph than in whatever Doug Collins had to say. Chicago and Philadelphia, it would seem, are in similar situations. Both are in their third year of playing for a demanding head coach who occasionally sounds like he ate a pack of Marlboro Reds for lunch. Both have spent this season without the star that was supposed to define their rosters. And both came into last night’s game mired in their worst stretch of the season. It was something, then, to watch how each responded at their lowest point. It’s not that the Sixers’ starters shared their apathy of their bench-dwelling teammates in their 93-82 loss; it’s that none of them were Joakim Noah. Noah’s 23-point, 21-rebound, 11-block triple-double was the best game of his career, and it comes in a year where Noah has defined the Bulls — both their successes and their ills. Luol Deng still leads the team — and the league — in minutes, but Noah is a 7-footer who’s seventh, and no one has been asked to do more amid the changes to Chicago’s roster. The increase in Noah’s playing time is easily attributable to the departure of Omer Asik. Without a reliable backup center, Noah has been forced to serve as the Bulls’ defensive anchor for more than 80 percent of games (Noah’s 38.4 minutes per game is eight more than he averaged last year). He’s responded with his best defensive season. The other areas where Noah’s role has grown are less expected. Without Derrick Rose to control the Bulls’ offense, much of the departed playmaking and possession usage has fallen on Noah. A good portion of the team’s offense has become a pass to Noah in the high post, after which he’ll turn to face the basket, and then look to create. He’s not scoring at a higher rate, but for a center, his assist numbers have become, frankly, ridiculous. Noah assists on 17.7 percent of his teammates’ field goals while on the court. He’s one of the best passing big men in basketball, and this year, he’s gotten to show it off. All this was rewarded with Noah’s first All-Star selection, and predictably, his play in the All-Star Game was like his play in every game — relentless. That lack of an effort-dimmer — for Noah, for coach Tom Thibodeau, for the Bulls — is part of what brought the Bulls to where they were Tuesday night against Cleveland. With Taj Gibson out of the lineup, the team’s bench was even shorter than usual. Noah logged 41 more minutes, and by the game’s second half, the wear from the season’s first 56 games was evident. Defensive rotations were a step slow, passing lanes were an inch too wide, and a youthful Cleveland team was too much, even without its star. That Noah is currently dealing with a nasty case of plantar fasciitis didn’t help either. When I got to the United Center last night, I expected to see a game between two teams moving further down the spiral. It was evident early on, though, that just wasn’t going to happen. Noah’s historic night started quietly — there were scattered blocks, and a few tip-ins throughout the first half — but his effort was anything but. A few minutes after the Sixers were done staring up at the video board, Jrue Holiday had the misfortune of picking up his dribble near the Bulls bench following a pick and roll. As Thibodeau screamed and waved his arms behind him, Noah screamed and waved his arms in front of him, and I struggled to imagine a less enviable position on a basketball court. Rumblings about the triple-double started at the beginning of the fourth quarter. Two people in the row behind me noted that he better get it, and while I didn’t say anything, I hoped the same. The cheers came when Noah got his 10th block — one that required a hedge, a recover, and all-around perfect defense — but my favorite was the ninth. With his right hand, Noah sent Jeremy Pargo’s layup straight down into the hardwood and knocked it back inbounds. On the other end, two quick passes led to a Nate Robinson 3, and the Bulls’ lead was nine with 6 minutes left. The triple-double was one thing, but how Noah got his 20th point just about defined his night. Up nine with 5 minutes left, Noah set a screen for Jimmy Butler low on the left wing, and as he rolled, he tried three different times to get position on the block. When he finally did, Butler hit him with a bounce pass, and Noah spun to the baseline for the layup and the foul. As he walked to the line, chants of “Noah” began. The Sixers didn’t let the game’s final minutes go. Philly fouled several times in the last 120 seconds, and each one was a chance for Thibodeau to take Noah out and provide some recognition from the sparse crowd that remained. When Kirk Hinrich rebounded Holiday’s miss from 25 feet with 14 seconds left (an attempt Noah tried to block three times), it seemed like this was the perfect chance. But there Noah stood, on the block, hands on his hips. When the second free throw went down, the Bulls center was the first one down the floor, and when Holiday missed, Noah was there for the rebound. | Mid | [
0.5654885654885651,
34,
26.125
] |
The Involvement of a Concerned Significant Other in Gambling Disorder Treatment Outcome. Interpersonal distress is a common feature in gambling disorder and adding a concerned significant other (CSO) to the recovery process could be an effective tool for improving treatment outcome. However, little empirical evidence is available regarding the effectiveness of including a CSO to interventions. We aimed to compare treatment outcomes (i.e. compliance with therapy guidelines, dropout from treatment, and relapse during treatment) in a CBT program involving a CSO to CBT treatment as usual (TAU) without a CSO. The sample comprised male gambling disorder patients (N = 675). The manualized CBT intervention consisted of 16 weekly outpatient group sessions and a 3-month follow-up period. Patient CSOs attended a predetermined number of sessions with the patient and were provided with resources to acquire a better understanding of the disorder, to manage risk situations, and to aid patients in adhering to treatment guidelines. Patients with a CSO had significant higher treatment attendance and reduced dropout compared to patients receiving TAU. Moreover, patients whose spouse was involved in the treatment program were less likely to relapse and adhered to the treatment guidelines more than those with a non-spousal CSO. Our results suggest that incorporating interpersonal support to gambling disorder interventions could potentially improve treatment outcomes. | High | [
0.685408299866131,
32,
14.6875
] |
History 1932-1938 9 July 1932-1938 The inaugural meeting of the branch took place at the Whitnash Rectory on July 9 1932..The Chairman of the meeting was Mr John Nicol. A Committee was formed comprising Mr G R Quayle as Hon Secretary, Mr F V Smith as Hon Treasurer and Mrs Bryan, Mr Cooper and Mr Hodges as general members. A vote of thanks was given to the Rev Mr Bryan and Mrs Bryan for placing their apiary at the disposal of the Association. The Branch would be governed by the Rules of the Warwickshire Beekeepers' Association. Original record of the setting up of Warwick and Leamington Branch of Warwickshire Beekeepers Association, with thanks to Rev Mr & Mrs Bryan for use of their apiary. Those who have served the branch as Chairman, Hon.Treasurer and Hon. Secretary since its inauguration are listed as follows. | Mid | [
0.641148325358851,
33.5,
18.75
] |
Abstract. We construct a coupling for nonstationary compositions of transitive Anosov diffeomorphisms and prove that, while there is no invariant measure, the pushforwards of sufficiently regular initial measures converge exponentially. | Mid | [
0.650485436893203,
33.5,
18
] |
Venezuela's Hugo Chavez - Hated by the Rich, Loved by the Poor On October 7 the Venezuelan people go to the polls to elect a government. The contest has come down to a straight contest between the present incumbent Hugo Chavez and his United Socialist Party of Venezuela (PSUV), and Capriles Radonski and his Roundtable for Democratic Unity coalition (MUD). Chavez remains a controversial figure in the West, where he has been attacked as a demagogue, dictator, and tyrant ever since he was first elected as President of Venezuela in 1999. A coup, orchestrated by the oligarchs who used to run the country in conjunction with a section of the military leadership, and which enjoyed the tacit support of the Bush administration, attempted to remove him from power in 2002. It failed when the poor of the the slums and barrios of Caracas descended on the presidential palace in their tens of thousands and demanded the return of their president. Since then Chavez has been re-elected twice, making him among the most democratically elected leaders of any in the entire world. Yet still he is labelled a dictator by his opponents, both within Venezuela and around the world, particularly Washington. Of course the real reason Chavez has come under such a sustained attack has little to do with his style of government - which is certainly flamboyant and extrovert - but his orientation towards Venezuela's poor in a domestic program of radical reform which he and his millions of supporters have named the Bolivarian Revolution. In concrete terms it has been responsible for the following achievements: The lowest indices of inequality in Latin America over the past 12 years. The indices of extreme poverty have dramatically decreased, along with poverty in general, with the Gini Coefficient (the measure of inequality in the distribution of income) being the lowest in the history of Venezuela. At the same time the Index of Human Development (IDH) has risen. A literacy program that has led to UNESCO declaring Venezuela a country free of illiteracy. Higher education enrollment has increased by 170 percent, up from 785,285 students in 1998 to over 2.12 million in 2009. Venezuela now occupies the second place in Latin America and fifth in the world when it comes to university graduation. The investment of 7.8% of GNP into a free healthcare program, known as Mission Barrio Adentro, designed to provide free healthcare services to the poor. To date it has saved 301,000 lives. Additionally, the level of infant mortality has been reduced by 32%. A reduction in the rate of unemployment from 16.1% in 1998 to 6.5% today. Venezuela's minimum wage is now among the highest in Latin America. Workers also receive a bonus of food and their pensions have been raised to the same level as the nation's minimum wage. With the PSUV's Mission Alimentation food is now offered at lower prices to the poor. The result has been a reduction in those suffering from a nutritional deficit from 5.3% of the population to 2.9% in the past decade. A 4% rise in GDP in 2011, with significant gains registered in the non-petroleum sector of the Venezuelan economy for the first time in decades. Not content with that, Hugo Chavez has also been a prime mover in inspiring a leftward shift throughout Latin America, a part of the world that for so long was ruled by right wing dictatorships responsible for widespread torture, imprisonment without trial, murder, and repression. Those right wing dictatorships enjoyed the supported of the United States and ensured that the region's economic and social development was retarded. In contradistinction to this dark period in Latin American history, Venezuela under Hugo Chavez has embarked on a policy of trans-border cooperation and investment, designed to fight poverty and increase economic grow throughout the region. This is being done under the rubric of various organisations such as the Bolivarian Alliance of the Peoples of Our America (ALBA), the Union of South American Nations (UNASUR), PETROCARIBE (which provides cheap oil to Caribbean nations), and more recently the Community of Latin American and Caribbean States (CELAC) and the Common Market of the South (MERCOSUR). The closeness of the relationship forged between Venezuela and Cuba has also been significant. It has involved an innovate exchange of oil from Venezuela for healthcare programs and medical missions from Cuba. It has helped to lessen Cuba's economic isolation in the face of a sustained economic blockade by the United States, while at the same time spreading the many achievements of the Cuban Revolution in healthcare, education, and a counter-hegemonic economic and social system to capitalism. In truth it is Chavez's opposition to US domination of the region, the example he has set in redistributing Venezuela's oil wealth to the poor at the expense of the rich, and his attempt to spread this example throughout Latin America, which has earned him such vitriolic enmity in Washington and other western capitals. Each of the aforementioned flies in the face of the neoliberal straitjacket that was responsible for devastating the lives of millions in Venezuela and throughout Latin America for decades prior to his emergence as a catalyst for progressive change. Having recovered from the cancer which saw him treated in Cuba and which had his supporters worried and his enemies no doubt rubbing their hands, Hugo Chavez stands poised, according to the latest polls, to sweep to victory and be elected the President of Venezuela for an historic fourth consecutive term. A fierce sense of solidarity with the poor is what drives this remarkable figure. It was Dom Helder Camara, the Catholic archbishop whose devotion to Brazil's urban poor earned him the sobriquet of 'Bishop of the slums', who once said: "When I give food to the poor, they call me a saint. When I ask why they are poor, they call me a communist." Hugo Chavez is a man and a leader who has spent his life asking why. Indeed, not only has he been asking he's been doing something about it. If this makes him a communist then so be it. To the poor of Venezuela and throughout Latin America he is a champion of justice and liberation - the kind that money can't buy. | High | [
0.6666666666666661,
33.5,
16.75
] |
Lindelof completely lost his footing as Newcastle ended Man United’s clean sheet run (Picture: BT Sport) Manchester United summer signing Victor Lindelof made the worst possible start to his full Premier League debut when he slipped over to present Newcastle with an easy goal. The Red Devils had not conceded in any of their five matches at home so far this season, the best run in the division, with David de Gea last conceding a goal at home in the league in April. Incredibly, you have to go all the way back to New Years Eve 2016 for the last time United conceded from open play in the league at Old Trafford – 21 hours and 37 minutes ago. But Lindelof helped changed all that just 14 minutes into his first start for the club in the Premier League, falling over when all he needed to do was boot the ball clear. Lindelof, brought in due to injuries to Jones and Bailly, had a horror moment (Picture: Getty) United had looked in charge of the opening exchanges, but when DeAndre Yedlin broke clear down the right flank Lindelof was unable to intercept his cross into the box for Dwight Gayle, who guided the ball past De Gea and in off the post. Lindelof, the No.2, appeared to be in a good position to cut out the cross… (Picture: SFR Sport1) The £31m man got his legs all muddled up, eventually ending up doing the splits rather than either stopping the cross or blocking the shot, lying prone on the floor as Newcastle’s players wheeled away celebrating. … but a millisecond later he was sprawled on the floor with his legs wide open (Picture: SFR Sport1) It is not the first time Lindelof has looked clumsy for United, also coming off the bench against Huddersfield and losing the flight of the ball to gift the home side a goal within minutes of coming on. United fans had hoped his excellent performances for Sweden against Italy in their World Cup play-off victory would improve his domestic form, but that does not appear to be the case. In all likelihood, despite his midweek heroics, Jose Mourinho probably would not have selected Lindelof had Eric Bailly and Phil Jones been fit, but his usual centre-back pairing are currently sidelined through injury. To view this video please enable JavaScript, and consider upgrading to a web browser that supports HTML5 video | Low | [
0.45267489711934106,
27.5,
33.25
] |
<a href="http://www.agencebp.com/">[BP] Architectures'</a> expansive new mixed-use project in Paris includes social housing, classrooms, a theatre, underground parking and opens out onto a lush park. Located on the edge of the 13th arrondissement of Paris, the <a href="http://www.agencebp.com/indexhibit/index.php?/ongoing/m9clog/">M9-C project</a> addresses the issue of density in a city with many complicated redevelopment sites. [BP] Architectures responded to the environmental and neighborhood context to design an energy-efficient building that provides an array of services on-site for its residents. 1 [BP] Archtiectures M9-C Project in Paris Rive Gauche [BP] Architectures developed a system of folding shutters that can be seen around the entirety of the building. More shutters are present along the interior facades facing south, and this provides privacy and sun protection to the housing units. 2 [BP] Archtiectures M9-C Project in Paris Rive Gauche The housing units stack above these spaces providing occupants great views of Paris and the Centre Pompidou. 3 [BP] Archtiectures M9-C Project in Paris Rive Gauche The school and the theatre are located on the main level so that the public can access these features. Outdoor space and utilities are shared to maximize function and flexibility. 4 [BP] Archtiectures M9-C Project in Paris Rive Gauche The neighboring park provides the inhabitants of the M9-C development a very close amenity to relax in green space. 5 [BP] Archtiectures M9-C Project in Paris Rive Gauche The building’s L-shape is oriented along the Northwest and Northeast edges of the site, and thus the folded facades of the interior provide needed shading from the harsh southern sun. A canopy above the first level also provides shading for the classrooms. 6 [BP] Archtiectures M9-C Project in Paris Rive Gauche The interior of the classrooms and the theatre offer bright colors to liven the space. Materials were chosen for affordability and durability. 7 [BP] Archtiectures M9-C Project in Paris Rive Gauche These housing units at M9-C have a theatre and school within the same development, and this allows for less transportation needs for families living at M9-C. Including these components (schools, services, offices) within the same development as where you live will ultimately reduce emissions and save costs. 8 [BP] Archtiectures M9-C Project in Paris Rive Gauche Small perforations along the length of the shutters allows for sunlight to enter the exterior corridors while deflecting unnecessary heat gain. 9 [BP] Archtiectures M9-C Project in Paris Rive Gauche The flexibility of the facade adds a lot of personality to the development and gives the occupants an ability to personalize their space. 10 [BP] Archtiectures M9-C Project in Paris Rive Gauche The facade seems to come to life as the shutters are pulled open and closed. This is a very energy efficient way to shelter the building from excessive heat gain. 11 [BP] Archtiectures M9-C Project in Paris Rive Gauche The exterior of the building has an increased uniformity from each individual façade, and this is done through the use of the exterior claddings, such as terracotta cladding, aluminum shutters, and Buxy stone. 12 [BP] Archtiectures M9-C Project in Paris Rive Gauche <a href="http://inhabitat.com/bp-architectures-m9-c-development-is-a-versatile-energy-efficient-mixed-use-facility-in-paris/bp-archtiecture-paris-rive-gauche-11/" rel="attachment wp-att-454069"></a> The M9-C project is located on the Parisian Left Bank and contains a nine-class school, a three-level theater, 66 <a href="http://inhabitat.com/hassells-sustainable-common-ground-housing-project-honored-at-the-world-architecture-festival/">social housing</a> rental units, and a 51-space underground parking garage. The school and the theater are located on the main level so that the public can access these features. Outdoor space and utilities are shared to maximize function and flexibility....<br><br><a href='http://inhabitat.com/bp-architectures-m9-c-development-is-a-versatile-energy-efficient-mixed-use-facility-in-paris/'>READ ARTICLE</a> 13 [BP] Archtiectures M9-C Project in Paris Rive Gauche <a href="http://inhabitat.com/bp-architectures-m9-c-development-is-a-versatile-energy-efficient-mixed-use-facility-in-paris/bp-archtiecture-paris-rive-gauche-11/" rel="attachment wp-att-454069"></a> The M9-C project is located on the Parisian Left Bank and contains a nine-class school, a three-level theater, 66 <a href="http://inhabitat.com/hassells-sustainable-common-ground-housing-project-honored-at-the-world-architecture-festival/">social housing</a> rental units, and a 51-space underground parking garage. The school and the theater are located on the main level so that the public can access these features. Outdoor space and utilities are shared to maximize function and flexibility....<br><br><a href='http://inhabitat.com/bp-architectures-m9-c-development-is-a-versatile-energy-efficient-mixed-use-facility-in-paris/'>READ ARTICLE</a> 14 1/14 [BP] Archtiectures M9-C Project in Paris Rive Gauche [BP] Architectures' expansive new mixed-use project in Paris includes social housing, classrooms, a theatre, underground parking and opens out onto a lush park. Located on the edge of the 13th arrondissement of Paris, the M9-C project addresses the issue of density in a city with many complicated redevelopment sites. [BP] Architectures responded to the environmental and neighborhood context to design an energy-efficient building that provides an array of services on-site for its residents. | High | [
0.663865546218487,
29.625,
15
] |
Hey gyuys, I am wondering how to exactly install a power switch for my computer that has blue illumination. I don't thing the power connectors themselves have a 12 volt current, do they? I'm no electrical guy and need to know for a small project i'm doing. thanks. Hey gyuys, I am wondering how to exactly install a power switch for my computer that has blue illumination. I don't thing the power connectors themselves have a 12 volt current, do they? I'm no electrical guy and need to know for a small project i'm doing. thanks. first what are you powering ? what are the spec's of the device? 12v + dc or 120v ~ ac a led light would need to add a resistor for most are 3-5v DC and correct polarity What Zero is alluding to is that a CPU power switch is a momentary switch (only passes power as long as it's held down), while those rockers are like a light switch, always on or always off. Now if you're looking to control lights or fans, you need a Single Pole Single Throw switch like the rocker switch you linked. | Mid | [
0.620408163265306,
38,
23.25
] |
package android.security.net.config; import android.content.Context; import android.content.pm.ApplicationInfo; import android.content.res.Resources; import android.content.res.XmlResourceParser; import android.util.ArraySet; import android.util.Base64; import android.util.Pair; import com.android.internal.util.XmlUtils; import org.xmlpull.v1.XmlPullParser; import org.xmlpull.v1.XmlPullParserException; import java.io.IOException; import java.text.ParseException; import java.text.SimpleDateFormat; import java.util.ArrayList; import java.util.Collection; import java.util.Date; import java.util.List; import java.util.Locale; import java.util.Set; /** * {@link ConfigSource} based on an XML configuration file. * * @hide */ public class XmlConfigSource implements ConfigSource { private static final int CONFIG_BASE = 0; private static final int CONFIG_DOMAIN = 1; private static final int CONFIG_DEBUG = 2; private final Object mLock = new Object(); private final int mResourceId; private final boolean mDebugBuild; private final ApplicationInfo mApplicationInfo; private boolean mInitialized; private NetworkSecurityConfig mDefaultConfig; private Set<Pair<Domain, NetworkSecurityConfig>> mDomainMap; private Context mContext; public XmlConfigSource(Context context, int resourceId, ApplicationInfo info) { mContext = context; mResourceId = resourceId; mApplicationInfo = new ApplicationInfo(info); mDebugBuild = (mApplicationInfo.flags & ApplicationInfo.FLAG_DEBUGGABLE) != 0; } public Set<Pair<Domain, NetworkSecurityConfig>> getPerDomainConfigs() { ensureInitialized(); return mDomainMap; } public NetworkSecurityConfig getDefaultConfig() { ensureInitialized(); return mDefaultConfig; } private static final String getConfigString(int configType) { switch (configType) { case CONFIG_BASE: return "base-config"; case CONFIG_DOMAIN: return "domain-config"; case CONFIG_DEBUG: return "debug-overrides"; default: throw new IllegalArgumentException("Unknown config type: " + configType); } } private void ensureInitialized() { synchronized (mLock) { if (mInitialized) { return; } try (XmlResourceParser parser = mContext.getResources().getXml(mResourceId)) { parseNetworkSecurityConfig(parser); mContext = null; mInitialized = true; } catch (Resources.NotFoundException | XmlPullParserException | IOException | ParserException e) { throw new RuntimeException("Failed to parse XML configuration from " + mContext.getResources().getResourceEntryName(mResourceId), e); } } } private Pin parsePin(XmlResourceParser parser) throws IOException, XmlPullParserException, ParserException { String digestAlgorithm = parser.getAttributeValue(null, "digest"); if (!Pin.isSupportedDigestAlgorithm(digestAlgorithm)) { throw new ParserException(parser, "Unsupported pin digest algorithm: " + digestAlgorithm); } if (parser.next() != XmlPullParser.TEXT) { throw new ParserException(parser, "Missing pin digest"); } String digest = parser.getText().trim(); byte[] decodedDigest = null; try { decodedDigest = Base64.decode(digest, 0); } catch (IllegalArgumentException e) { throw new ParserException(parser, "Invalid pin digest", e); } int expectedLength = Pin.getDigestLength(digestAlgorithm); if (decodedDigest.length != expectedLength) { throw new ParserException(parser, "digest length " + decodedDigest.length + " does not match expected length for " + digestAlgorithm + " of " + expectedLength); } if (parser.next() != XmlPullParser.END_TAG) { throw new ParserException(parser, "pin contains additional elements"); } return new Pin(digestAlgorithm, decodedDigest); } private PinSet parsePinSet(XmlResourceParser parser) throws IOException, XmlPullParserException, ParserException { String expirationDate = parser.getAttributeValue(null, "expiration"); long expirationTimestampMilis = Long.MAX_VALUE; if (expirationDate != null) { try { SimpleDateFormat sdf = new SimpleDateFormat("yyyy-MM-dd"); sdf.setLenient(false); Date date = sdf.parse(expirationDate); if (date == null) { throw new ParserException(parser, "Invalid expiration date in pin-set"); } expirationTimestampMilis = date.getTime(); } catch (ParseException e) { throw new ParserException(parser, "Invalid expiration date in pin-set", e); } } int outerDepth = parser.getDepth(); Set<Pin> pins = new ArraySet<>(); while (XmlUtils.nextElementWithin(parser, outerDepth)) { String tagName = parser.getName(); if (tagName.equals("pin")) { pins.add(parsePin(parser)); } else { XmlUtils.skipCurrentTag(parser); } } return new PinSet(pins, expirationTimestampMilis); } private Domain parseDomain(XmlResourceParser parser, Set<String> seenDomains) throws IOException, XmlPullParserException, ParserException { boolean includeSubdomains = parser.getAttributeBooleanValue(null, "includeSubdomains", false); if (parser.next() != XmlPullParser.TEXT) { throw new ParserException(parser, "Domain name missing"); } String domain = parser.getText().trim().toLowerCase(Locale.US); if (parser.next() != XmlPullParser.END_TAG) { throw new ParserException(parser, "domain contains additional elements"); } // Domains are matched using a most specific match, so don't allow duplicates. // includeSubdomains isn't relevant here, both android.com + subdomains and android.com // match for android.com equally. Do not allow any duplicates period. if (!seenDomains.add(domain)) { throw new ParserException(parser, domain + " has already been specified"); } return new Domain(domain, includeSubdomains); } private CertificatesEntryRef parseCertificatesEntry(XmlResourceParser parser, boolean defaultOverridePins) throws IOException, XmlPullParserException, ParserException { boolean overridePins = parser.getAttributeBooleanValue(null, "overridePins", defaultOverridePins); int sourceId = parser.getAttributeResourceValue(null, "src", -1); String sourceString = parser.getAttributeValue(null, "src"); CertificateSource source = null; if (sourceString == null) { throw new ParserException(parser, "certificates element missing src attribute"); } if (sourceId != -1) { // TODO: Cache ResourceCertificateSources by sourceId source = new ResourceCertificateSource(sourceId, mContext); } else if ("system".equals(sourceString)) { source = SystemCertificateSource.getInstance(); } else if ("user".equals(sourceString)) { source = UserCertificateSource.getInstance(); } else if ("wfa".equals(sourceString)) { source = WfaCertificateSource.getInstance(); } else { throw new ParserException(parser, "Unknown certificates src. " + "Should be one of system|user|@resourceVal"); } XmlUtils.skipCurrentTag(parser); return new CertificatesEntryRef(source, overridePins); } private Collection<CertificatesEntryRef> parseTrustAnchors(XmlResourceParser parser, boolean defaultOverridePins) throws IOException, XmlPullParserException, ParserException { int outerDepth = parser.getDepth(); List<CertificatesEntryRef> anchors = new ArrayList<>(); while (XmlUtils.nextElementWithin(parser, outerDepth)) { String tagName = parser.getName(); if (tagName.equals("certificates")) { anchors.add(parseCertificatesEntry(parser, defaultOverridePins)); } else { XmlUtils.skipCurrentTag(parser); } } return anchors; } private List<Pair<NetworkSecurityConfig.Builder, Set<Domain>>> parseConfigEntry( XmlResourceParser parser, Set<String> seenDomains, NetworkSecurityConfig.Builder parentBuilder, int configType) throws IOException, XmlPullParserException, ParserException { List<Pair<NetworkSecurityConfig.Builder, Set<Domain>>> builders = new ArrayList<>(); NetworkSecurityConfig.Builder builder = new NetworkSecurityConfig.Builder(); builder.setParent(parentBuilder); Set<Domain> domains = new ArraySet<>(); boolean seenPinSet = false; boolean seenTrustAnchors = false; boolean defaultOverridePins = configType == CONFIG_DEBUG; String configName = parser.getName(); int outerDepth = parser.getDepth(); // Add this builder now so that this builder occurs before any of its children. This // makes the final build pass easier. builders.add(new Pair<>(builder, domains)); // Parse config attributes. Only set values that are present, config inheritence will // handle the rest. for (int i = 0; i < parser.getAttributeCount(); i++) { String name = parser.getAttributeName(i); if ("hstsEnforced".equals(name)) { builder.setHstsEnforced( parser.getAttributeBooleanValue(i, NetworkSecurityConfig.DEFAULT_HSTS_ENFORCED)); } else if ("cleartextTrafficPermitted".equals(name)) { builder.setCleartextTrafficPermitted( parser.getAttributeBooleanValue(i, NetworkSecurityConfig.DEFAULT_CLEARTEXT_TRAFFIC_PERMITTED)); } } // Parse the config elements. while (XmlUtils.nextElementWithin(parser, outerDepth)) { String tagName = parser.getName(); if ("domain".equals(tagName)) { if (configType != CONFIG_DOMAIN) { throw new ParserException(parser, "domain element not allowed in " + getConfigString(configType)); } Domain domain = parseDomain(parser, seenDomains); domains.add(domain); } else if ("trust-anchors".equals(tagName)) { if (seenTrustAnchors) { throw new ParserException(parser, "Multiple trust-anchor elements not allowed"); } builder.addCertificatesEntryRefs( parseTrustAnchors(parser, defaultOverridePins)); seenTrustAnchors = true; } else if ("pin-set".equals(tagName)) { if (configType != CONFIG_DOMAIN) { throw new ParserException(parser, "pin-set element not allowed in " + getConfigString(configType)); } if (seenPinSet) { throw new ParserException(parser, "Multiple pin-set elements not allowed"); } builder.setPinSet(parsePinSet(parser)); seenPinSet = true; } else if ("domain-config".equals(tagName)) { if (configType != CONFIG_DOMAIN) { throw new ParserException(parser, "Nested domain-config not allowed in " + getConfigString(configType)); } builders.addAll(parseConfigEntry(parser, seenDomains, builder, configType)); } else { XmlUtils.skipCurrentTag(parser); } } if (configType == CONFIG_DOMAIN && domains.isEmpty()) { throw new ParserException(parser, "No domain elements in domain-config"); } return builders; } private void addDebugAnchorsIfNeeded(NetworkSecurityConfig.Builder debugConfigBuilder, NetworkSecurityConfig.Builder builder) { if (debugConfigBuilder == null || !debugConfigBuilder.hasCertificatesEntryRefs()) { return; } // Don't add trust anchors if not already present, the builder will inherit the anchors // from its parent, and that's where the trust anchors should be added. if (!builder.hasCertificatesEntryRefs()) { return; } builder.addCertificatesEntryRefs(debugConfigBuilder.getCertificatesEntryRefs()); } private void parseNetworkSecurityConfig(XmlResourceParser parser) throws IOException, XmlPullParserException, ParserException { Set<String> seenDomains = new ArraySet<>(); List<Pair<NetworkSecurityConfig.Builder, Set<Domain>>> builders = new ArrayList<>(); NetworkSecurityConfig.Builder baseConfigBuilder = null; NetworkSecurityConfig.Builder debugConfigBuilder = null; boolean seenDebugOverrides = false; boolean seenBaseConfig = false; XmlUtils.beginDocument(parser, "network-security-config"); int outerDepth = parser.getDepth(); while (XmlUtils.nextElementWithin(parser, outerDepth)) { if ("base-config".equals(parser.getName())) { if (seenBaseConfig) { throw new ParserException(parser, "Only one base-config allowed"); } seenBaseConfig = true; baseConfigBuilder = parseConfigEntry(parser, seenDomains, null, CONFIG_BASE).get(0).first; } else if ("domain-config".equals(parser.getName())) { builders.addAll( parseConfigEntry(parser, seenDomains, baseConfigBuilder, CONFIG_DOMAIN)); } else if ("debug-overrides".equals(parser.getName())) { if (seenDebugOverrides) { throw new ParserException(parser, "Only one debug-overrides allowed"); } if (mDebugBuild) { debugConfigBuilder = parseConfigEntry(parser, null, null, CONFIG_DEBUG).get(0).first; } else { XmlUtils.skipCurrentTag(parser); } seenDebugOverrides = true; } else { XmlUtils.skipCurrentTag(parser); } } // If debug is true and there was no debug-overrides in the file check for an extra // _debug resource. if (mDebugBuild && debugConfigBuilder == null) { debugConfigBuilder = parseDebugOverridesResource(); } // Use the platform default as the parent of the base config for any values not provided // there. If there is no base config use the platform default. NetworkSecurityConfig.Builder platformDefaultBuilder = NetworkSecurityConfig.getDefaultBuilder(mApplicationInfo); addDebugAnchorsIfNeeded(debugConfigBuilder, platformDefaultBuilder); if (baseConfigBuilder != null) { baseConfigBuilder.setParent(platformDefaultBuilder); addDebugAnchorsIfNeeded(debugConfigBuilder, baseConfigBuilder); } else { baseConfigBuilder = platformDefaultBuilder; } // Build the per-domain config mapping. Set<Pair<Domain, NetworkSecurityConfig>> configs = new ArraySet<>(); for (Pair<NetworkSecurityConfig.Builder, Set<Domain>> entry : builders) { NetworkSecurityConfig.Builder builder = entry.first; Set<Domain> domains = entry.second; // Set the parent of configs that do not have a parent to the base-config. This can // happen if the base-config comes after a domain-config in the file. // Note that this is safe with regards to children because of the order that // parseConfigEntry returns builders, the parent is always before the children. The // children builders will not have build called until _after_ their parents have their // parent set so everything is consistent. if (builder.getParent() == null) { builder.setParent(baseConfigBuilder); } addDebugAnchorsIfNeeded(debugConfigBuilder, builder); NetworkSecurityConfig config = builder.build(); for (Domain domain : domains) { configs.add(new Pair<>(domain, config)); } } mDefaultConfig = baseConfigBuilder.build(); mDomainMap = configs; } private NetworkSecurityConfig.Builder parseDebugOverridesResource() throws IOException, XmlPullParserException, ParserException { Resources resources = mContext.getResources(); String packageName = resources.getResourcePackageName(mResourceId); String entryName = resources.getResourceEntryName(mResourceId); int resId = resources.getIdentifier(entryName + "_debug", "xml", packageName); // No debug-overrides resource was found, nothing to parse. if (resId == 0) { return null; } NetworkSecurityConfig.Builder debugConfigBuilder = null; // Parse debug-overrides out of the _debug resource. try (XmlResourceParser parser = resources.getXml(resId)) { XmlUtils.beginDocument(parser, "network-security-config"); int outerDepth = parser.getDepth(); boolean seenDebugOverrides = false; while (XmlUtils.nextElementWithin(parser, outerDepth)) { if ("debug-overrides".equals(parser.getName())) { if (seenDebugOverrides) { throw new ParserException(parser, "Only one debug-overrides allowed"); } if (mDebugBuild) { debugConfigBuilder = parseConfigEntry(parser, null, null, CONFIG_DEBUG).get(0).first; } else { XmlUtils.skipCurrentTag(parser); } seenDebugOverrides = true; } else { XmlUtils.skipCurrentTag(parser); } } } return debugConfigBuilder; } public static class ParserException extends Exception { public ParserException(XmlPullParser parser, String message, Throwable cause) { super(message + " at: " + parser.getPositionDescription(), cause); } public ParserException(XmlPullParser parser, String message) { this(parser, message, null); } } } | Low | [
0.495833333333333,
29.75,
30.25
] |
Q: PHP Mysql insert only after submit I have 2 pages. After the user inserts all their info on page 1, they go to page 2. All the inputted information gets correctly stored in $_POST so I can access it in the next page. I can also insert into mysql database just fine no problem. The thing I'm trying to do is to ONLY execute the insert into the database code IF they click the submit button on the second page. I tried doing this: Page2.php <script> $(document).ready(function(e) { $("#PaySubmit").click(function() { $.ajax({ url: 'Insert.php' }); }); }); </script> <input type="submit" name="PaySubmit" id="PaySubmit" value="Continue"/> Insert.php try { $link = new PDO('mysql:host=****;dbname=****;charset=UTF-8','****','****'); $first = $_POST["fname"]; $last = $_POST["lname"]; $stmt = $link -> prepare("INSERT INTO Conference (`First Name`, `Last Name`) VALUES (:first, :last)"); $stmt->bindParam(':first', $first); $stmt->bindParam(':last', $last); $stmt->execute(); } catch(PDOException $e) { print "Error!: " . $e->getMessage() . "<br/>"; die(); } The problem is, when you click submit on the 2nd page $_POST gets replaced with data from the second page, so I no longer have access to the 1st page's data. Any ideas on how to go about this? A: Store all the values from the first post in the current SESSION. You can then access them with the $_SESSION global. Have a look at the serialize function, it might be able to help you a lot. Or json_encode. They are very useful for storing arrays in one variable and retrieving it later. | High | [
0.678474114441416,
31.125,
14.75
] |
Determination of placental ferritin-positive peripheral lymphocytes in early stages of breast cancer. "Ferritin-blocked lymphocytes" or placental ferritin (PLF) -positive T cells have repeatedly been described in the circulation of patients with female breast cancer. Since a monoclonal antibody directed against PLF became available, a study was performed to evaluate its usefulness in an easily reproducible system. One hundred patients with controversial or highly suspicious findings on mammography who subsequently underwent operation entered this trial. Sixty-one healthy blood donors served as controls. Patients with early (lymph-node negative) stages of breast cancer (in situ and T1N0 tumors) revealed significantly higher numbers of PLF-positive cells (9.00% +/- 4.5% and 6.21% +/- 3.4%) as compared with controls or patients with benign lumps (p < 0.001). Patients with negative lymph nodes differed significantly from node-positive patients (9.79% versus 2.55%; p < 0.001), whereas no difference as related to menopausal and estrogen-receptor status was observed. In order to define the sensitivity and specificity of this test, we analyzed four different cutoff levels (3%, 4%, 5%, and 6% of PLF-positive T cells). At a level of PLF-positive lymphocyte cells of 4%, 94% of cancer patients with stage T1N0 disease or ductal carcinoma in situ, 5% of patients with benign lumps, and 7% of healthy controls were identified. Furthermore, 88% of all lymph node-negative cancer patients had more than 4% positive cells, compared with only 25% in patients with axillary node involvement. The fact that more than 90% of all patients with in situ carcinomas and patients with stage T1N0 cancer had values above 4% offers promising aspects for this method to be used to complement mammography in the early detection of breast cancer. | High | [
0.6831812255541061,
32.75,
15.1875
] |
Q: Why Does .Hide()ing and .Show()ing Panels in wxPython Result in the Sizer Changing the Layout? As referenced in my previous question, I am trying to make something slightly wizard-like in function. I have settled on a single frame with a sizer added to it. I build panels for each of the screens I would like users to see, add them to the frame's sizer, then switch between panels by .Hide()ing one panel, then calling a custom .ShowYourself() on the next panel. Obviously, I would like the buttons to remain in the same place as the user progresses through the process. I have linked together two panels in an infinite loop by their "Back" and "Next" buttons so you can see what is going on. The first panel looks great; tom10's code worked on that level, as it eschewed my initial, over-fancy attempt with borders flying every which way. And then the second panel seems to have shrunk down to the bare minimum. As we return to the first panel, the shrinkage has occurred here as well. Why does it look fine on the first panel, but not after I return there? Why is calling .Fit() necessary if I do not want a 10 pixel by 10 pixel wad of grey? And if it is necessary, why does .Fit() give inconsistent results? This infinite loop seems to characterize my experience with this: I fix the layout on a panel, only to find that switching ruins the layout for other panels. I fix that problem, by using sizer_h.Add(self.panel1, 0) instead of sizer_h.Add(self.panel1, 1, wx.EXPAND), and now my layouts are off again. So far, my "solution" is to add a mastersizer.SetMinSize((475, 592)) to each panel's master sizer (commented out in the code below). This is a cruddy solution because 1) I have had to find the numbers that work by trial and error (-5 pixels for the width, -28 pixels for the height). 2) I don't understand why the underlying issue still happens. What's the correct, non-ugly solution? Instead of adding all of the panels to the frame's sizer at once, should switching panels involve .Detach()ing that panel from the frame's sizer and then .Add()ing the next panel to the frame's sizer? Is there a .JustMakeThisFillThePanel() method hiding somewhere I have missed in both the wxWidgets and the wxPython documents online? I'm obviously missing something in my mental model of layout. Minimalist code pasted below. import wx import sys class My_App(wx.App): def OnInit(self): self.frame = My_Frame(None) self.frame.Show() self.SetTopWindow(self.frame) return True def OnExit(self): print 'Dying ...' class My_Frame(wx.Frame): def __init__(self, image, parent=None,id=-1, title='Generic Title', pos=wx.DefaultPosition, style=wx.CAPTION | wx.STAY_ON_TOP): size = (480, 620) wx.Frame.__init__(self, parent, id, 'Program Title', pos, size, style) sizer_h = wx.BoxSizer(wx.HORIZONTAL) self.panel0 = User_Interaction0(self) sizer_h.Add(self.panel0, 1, wx.EXPAND) self.panel1 = User_Interaction1(self) sizer_h.Add(self.panel1, 1, wx.EXPAND) self.SetSizer(sizer_h) self.panel0.ShowYourself() def ShutDown(self): self.Destroy() class User_Interaction0(wx.Panel): def __init__(self, parent, id=-1): wx.Panel.__init__(self, parent, id) # master sizer for the whole panel mastersizer = wx.BoxSizer(wx.VERTICAL) #mastersizer.SetMinSize((475, 592)) mastersizer.AddSpacer(15) # build the top row txtHeader = wx.StaticText(self, -1, 'Welcome to This Boring\nProgram', (0, 0)) font = wx.Font(16, wx.DEFAULT, wx.NORMAL, wx.BOLD) txtHeader.SetFont(font) txtOutOf = wx.StaticText(self, -1, '1 out of 7', (0, 0)) rowtopsizer = wx.BoxSizer(wx.HORIZONTAL) rowtopsizer.Add(txtHeader, 3, wx.ALIGN_LEFT) rowtopsizer.Add((0,0), 1) rowtopsizer.Add(txtOutOf, 0, wx.ALIGN_RIGHT) mastersizer.Add(rowtopsizer, 0, flag=wx.EXPAND | wx.LEFT | wx.RIGHT, border=15) # build the middle row text = 'PANEL 0\n\n' text = text + 'This could be a giant blob of explanatory text.\n' txtBasic = wx.StaticText(self, -1, text) font = wx.Font(11, wx.DEFAULT, wx.NORMAL, wx.NORMAL) txtBasic.SetFont(font) mastersizer.Add(txtBasic, 1, flag=wx.EXPAND | wx.LEFT | wx.RIGHT, border=15) # build the bottom row btnBack = wx.Button(self, -1, 'Back') self.Bind(wx.EVT_BUTTON, self.OnBack, id=btnBack.GetId()) btnNext = wx.Button(self, -1, 'Next') self.Bind(wx.EVT_BUTTON, self.OnNext, id=btnNext.GetId()) btnCancelExit = wx.Button(self, -1, 'Cancel and Exit') self.Bind(wx.EVT_BUTTON, self.OnCancelAndExit, id=btnCancelExit.GetId()) rowbottomsizer = wx.BoxSizer(wx.HORIZONTAL) rowbottomsizer.Add(btnBack, 0, wx.ALIGN_LEFT) rowbottomsizer.AddSpacer(5) rowbottomsizer.Add(btnNext, 0) rowbottomsizer.AddSpacer(5) rowbottomsizer.AddStretchSpacer(1) rowbottomsizer.Add(btnCancelExit, 0, wx.ALIGN_RIGHT) mastersizer.Add(rowbottomsizer, flag=wx.EXPAND | wx.LEFT | wx.RIGHT, border=15) # finish master sizer mastersizer.AddSpacer(15) self.SetSizer(mastersizer) self.Raise() self.SetPosition((0,0)) self.Fit() self.Hide() def ShowYourself(self): self.Raise() self.SetPosition((0,0)) self.Fit() self.Show() def OnBack(self, event): self.Hide() self.GetParent().panel1.ShowYourself() def OnNext(self, event): self.Hide() self.GetParent().panel1.ShowYourself() def OnCancelAndExit(self, event): self.GetParent().ShutDown() class User_Interaction1(wx.Panel): def __init__(self, parent, id=-1): wx.Panel.__init__(self, parent, id) # master sizer for the whole panel mastersizer = wx.BoxSizer(wx.VERTICAL) #mastersizer.SetMinSize((475, 592)) mastersizer.AddSpacer(15) # build the top row txtHeader = wx.StaticText(self, -1, 'Read about This Boring\nProgram', (0, 0)) font = wx.Font(16, wx.DEFAULT, wx.NORMAL, wx.BOLD) txtHeader.SetFont(font) txtOutOf = wx.StaticText(self, -1, '2 out of 7', (0, 0)) rowtopsizer = wx.BoxSizer(wx.HORIZONTAL) rowtopsizer.Add(txtHeader, 3, wx.ALIGN_LEFT) rowtopsizer.Add((0,0), 1) rowtopsizer.Add(txtOutOf, 0, wx.ALIGN_RIGHT) mastersizer.Add(rowtopsizer, 0, flag=wx.EXPAND | wx.LEFT | wx.RIGHT, border=15) # build the middle row text = 'PANEL 1\n\n' text = text + 'This could be a giant blob of boring text.\n' txtBasic = wx.StaticText(self, -1, text) font = wx.Font(11, wx.DEFAULT, wx.NORMAL, wx.NORMAL) txtBasic.SetFont(font) mastersizer.Add(txtBasic, 1, flag=wx.EXPAND | wx.LEFT | wx.RIGHT, border=15) # build the bottom row btnBack = wx.Button(self, -1, 'Back') self.Bind(wx.EVT_BUTTON, self.OnBack, id=btnBack.GetId()) btnNext = wx.Button(self, -1, 'Next') self.Bind(wx.EVT_BUTTON, self.OnNext, id=btnNext.GetId()) btnCancelExit = wx.Button(self, -1, 'Cancel and Exit') self.Bind(wx.EVT_BUTTON, self.OnCancelAndExit, id=btnCancelExit.GetId()) rowbottomsizer = wx.BoxSizer(wx.HORIZONTAL) rowbottomsizer.Add(btnBack, 0, wx.ALIGN_LEFT) rowbottomsizer.AddSpacer(5) rowbottomsizer.Add(btnNext, 0) rowbottomsizer.AddSpacer(5) rowbottomsizer.AddStretchSpacer(1) rowbottomsizer.Add(btnCancelExit, 0, wx.ALIGN_RIGHT) mastersizer.Add(rowbottomsizer, flag=wx.EXPAND | wx.LEFT | wx.RIGHT, border=15) # finish master sizer mastersizer.AddSpacer(15) self.SetSizer(mastersizer) self.Raise() self.SetPosition((0,0)) self.Fit() self.Hide() def ShowYourself(self): self.Raise() self.SetPosition((0,0)) self.Fit() self.Show() def OnBack(self, event): self.Hide() self.GetParent().panel0.ShowYourself() def OnNext(self, event): self.Hide() self.GetParent().panel0.ShowYourself() def OnCancelAndExit(self, event): self.GetParent().ShutDown() def main(): app = My_App(redirect = False) app.MainLoop() if __name__ == '__main__': main() A: I think I figured it out. Instead of calls to the Show and Hide methods of the panels, you need to call the Show and Hide methods of the root sizer: self.Show() becomes self.GetParent().GetSizer().Show(self) ...and so on. Also, after each call, you need self.GetParent().GetSizer().Layout() A: Yeah, I know this is already answered, but here you go anyway: You should only have to call Layout() on the panel's parent, so something like self.GetParent().Layout() should do the trick. See this article: http://www.blog.pythonlibrary.org/2010/06/16/wxpython-how-to-switch-between-panels/ If you want the buttons to always show, create two panels in one vertical sizer. The one on top will show your panels and the one on the bottom will show the buttons. Then use PubSub or something to communicate between them. | Low | [
0.5367483296213801,
30.125,
26
] |
--- abstract: | We outline a different method of describing scalar field particle production in a uniform electric field. In the standard approach, the (analytically continued) harmonic oscillator paradigm is important in describing particle production. In the gauges normally considered, in which the four vector potential depends only on the time or space coordinate, the system reduces to a non-relativistic effective Schrödinger equation with an inverted oscillator potential. The Bogolubov coefficients are determined by tunnelling in this potential. In the Schwinger proper time method of determining the effective Lagrangian, the analytically continued propagator for the usual oscillator system is regarded as the correct propagator for the inverted oscillator system and is used to obtain the gauge invariant result. However, there is another gauge in which the particle production process has striking similarities with the one used to describe Hawking radiation in black holes. The gauge we use to describe the electric field in is the [*lightcone*]{} gauge, so named because the mode functions for a scalar field are found to be singular on the lightcone. We use these modes in evaluating the effective Lagrangian using the proper time technique. The key feature of this analysis is that these modes can be explicitly “normalized” by using the criterion that they reduce to the usual flat space modes in the limit of the electric field tending to zero. This normalization procedure allows one to determine the Schwinger proper time kernel without using the analytical continuation of the harmonic oscillator kernel that is resorted to in the standard analysis. We find that the proper time kernel is not the same as the analytically continued oscillator kernel though the effective Lagrangian is the standard result as it should be. We also consider an example of a confined electric field system using the lightcone gauge modes that has several features of interest. In particular, our analysis indicates that the Bogolubov coefficients, in taking the limit to the uniform electric field case, are multiplied by energy dependent boundary factors that have not been taken into account before. address: 'IUCAA, Post Bag 4, Ganeshkhind, Pune 411 007, INDIA.' author: - 'K. Srinivasan[^1], T. Padmanabhan[^2]' title: A novel approach to particle production in an uniform electric field --- ł ß Introduction ============ We present a different derivation of particle production in an uniform background electric field in Minkowski spacetime. The problem addressed is that of a scalar field propagating in flat spacetime in such a background. The backreaction on the electric field due to particle production is not discussed but only the mechanism by which particles are produced is considered. The difference between the method described here and the standard analysis discussed in Refs. [@schwinger; @brout95; @paddy91; @sriram97; @paddyaspects] arises in the gauge used. The electric field here is described using the [*lightcone*]{} gauge which has already been introduced in Ref. [@kt99]. In this gauge, the mode functions are combinations of elementary functions and they are singular on the lightcone. The latter property is similar to the mode functions in spacetimes with a horizon like the Schwarzchild or Rindler spacetimes with the modes being singular on the horizon. This property of the lightcone gauge modes explicitly shows that particle production occurs in a similar fashion in both systems (though not exactly in the same way as will be subsequently shown). Note that these modes describe the same system as the parabolic cylinder functions do in the time and space dependent gauges used normally. The singularity present in the modes of the lightcone gauge manifests itself as the singular inverted oscillator potential in the other two gauges. These modes have the property that they can be “normalized” by a suitable physical criterion which allows one to calculate the Schwinger proper time kernel in a straightforward manner using an appropriate extension of the Feynman-Kac formula. Such a normalizability property circumvents the need to regard the analytically continued harmonic oscillator kernel as the correct propagator for the inverted oscillator kernel. This is required in the standard analysis because the parabolic cylinder functions cannot be normalized in a simple manner. The proper time kernel determined from these modes is found to be different from the analytically continued harmonic oscillator kernel though the effective Lagrangian is the same as the standard result. We also consider a special, spatially confined electric field system that can be conveniently described using the lightcone gauge. The system is constructed such that, in the limit of a parameter tending to infinity, it tends to a uniform electric field system. This provides us with another example of a limiting process by which a uniform electric field system can be described. The highlight of this analysis is that hitherto unaccounted for normalization constants appear in the expression for the Bogolubov coefficients. This occurs because, in the standard analysis, boundary conditions at infinity could not be explicitly considered. If a continuous vector potential is used to describe a confined electric field that varies from zero in the infinite past to a finite constant value in the infinite future (in the time dependent gauge, say), the normalization constants for positive frequency modes are different at these two asymptotic regions. Therefore, when computing the Bogolubov coefficients, this difference in definition of positive frequency modes appears as a multiplicative factor to the standard values. This factor is found to be the same for both the Bogolubov coefficients. As a consequence, the effective Lagrangian is found to match the standard Schwinger result. This paper is organized as follows. In section (\[sec:lightcone\]), we briefly introduce the lightcone gauge. Section (\[sec:electricefflag\]) discusses the construction of the effective Lagrangian in the lightcone gauge. We show how this lightcone structure of the modes determines particle production. Then, in section (\[sec:modematching\]), we discuss the confined electric field system. This system also illustrates the role of the lightcone structure in particle production and is reducible to the uniform electric field case by a well defined limiting procedure. We calculate the Bogolubov coefficients and effective Lagrangian and then take the limit to the uniform electric field case. Finally, in section (\[sec:electricdiscussion\]), we summarize the results of this paper. The lightcone gauge {#sec:lightcone} =================== The lightcone gauge has already been introduced and described in Ref. [@kt99]. There, we showed how the tunnelling interpretation was used to recover the Bogolubov coefficients. However, for completeness, we briefly describe the gauge here. We describe a spatially and temporally uniform electric field pointing along the $\hat{\bf x}$ direction by the gauge A\^[k]{} = [E\_02]{}( t -x, x - t, 0, 0) \[eqn:lightconegauge\], where $E_0$ is the magnitude of the electric field. The differential equation satisfied by a massive scalar field $\Phi$ in an electromagnetic field background in Minkowski spacetime is ł\[ł(\_k + iq A\_k)ł(\^k + iqA\^k) + m\^2 \]= 0, \[phi\] where $m$ is the mass, $q$ is the charge and $A^k$ is the four potential of the electromagentic field. Defining the null variables $$u = t - x \qquad ; \qquad v =t + x \label{eqn:electric41}$$ and setting = e\^[i k\_y y + ik\_zz]{} e\^[-iv]{} (u) , we obtain the following [*first order*]{} differential equation $$2i(qE_0u - 2\gamma){d\phi \over du} + (m^2 + {\bf k}_{\perp}^2 + iqE_0) \phi (u) = 0. \label{eqn:electric46}$$ The solution to the above equation is easily seen to be $$\phi (u) = \left( \sqrt{qE_0\over 2}\, u - \gamma \sqrt{2\over qE_0}\, \right)^{i\lambda/2 \, - \, 1/2} \label{eqn:electric47},$$ where = [m\^2 + [**k**]{}\_\^2 qE\_0]{} . \[lambda\] Note that the solution for $\phi$ is an elementary function of the variable $u$. This is unlike the modes in the time or space dependent gauge which contain transcendental parabolic cylinder functions. This is the simplest mode function possible for any gauge of the electric field. This solution is singular on the null surface $t-x = \gamma/qE_0$ and it is for this reason that the gauge in Eq. (\[eqn:lightconegauge\]) is referred to as the lightcone gauge. The Bogolubov coefficients can be easily calculated by constructing a tunnelling scenario for $\phi(u)$, calculating the transmission and reflection coefficients using the method of complex paths and then using the tunnelling interpretation to suitably interpret these coefficients. This has been done in detail in Ref. [@kt99] and will not be repeated here. It was shown there that the standard result is obtained. From the form of the lightcone gauge given in Eq. (\[eqn:lightconegauge\]), it is clear that there is another equivalent gauge that also gives the simplest mode functions possible. This gauge is of the form A\^[i]{} = -[E\_02]{}ł( t+x, t+x, 0, 0) . \[eqn:lightconegauge1\] This gauge, however, will not be considered here separately since its properties are very similar to that of the light cone gauge. In the next section, we calculate the effective Lagrangian using Schwinger’s proper time approach. Effective Lagrangian for Electric Field {#sec:electricefflag} ======================================= The uniform electric field problem, in the time dependent gauge, can be essentially reduced to an effective Schrödinger problem with an inverted harmonic oscillator potential with mode functions that are transcendental parabolic cylinder functions. This effective quantum mechanical system has no ground state. But the basic formalism of the effective Lagrangian method requires that the system be in the vacuum state in the asymptotic past and future. It makes the implicit assumption that the electric field tends to zero in the asymptotic limits. This issue is resolved, in the path integral technique, by analytically continuining the simple harmonic oscillator kernel to imaginary frequencies [@paddyaspects]. This analytically continued kernel is assumed to be the correct kernel for the electric field system. Such a continuation also implies the boundary condition that the electric field tends to zero asymptotically. In this section, we propose an alternative derivation of the effective Lagrangian result without using the harmonic oscillator kernel. The gauge we work in is the light cone gauge discussed in the previous section. The mode functions in this gauge are combinations of elementary functions and are singular on the light cone. This singular behaviour implies that the proper time mode functions cannot be normalized by the usual Schrödinger normalization condition. (This non-normalizability of the proper time modes also occurs in the standard approach because of the presence of the parabolic cylinder functions which do not have the required asymptotic behaviour.) However, this can be circumvented by demanding that these modes reduce to the usual flat space modes in the limit of the electric field $E_0 \to 0$. Imposing this normalization condition is equivalent to the analytic continuation that is resorted to in the standard approach and gives the correct result. The lightcone structure of these modes plays an important role in determining particle production as will be shown. The entire analysis is conveniently done in the $(u,v,y,z)$ coordinate system where $u=t-x$ and $v=t+x$ are the usual null coordinates. This section is divided into two parts. In the first part, the proper time kernel is calculated for the case $E_0 = 0$ in the $(u,v,y,z)$ coordinate system in order to motivate the discussion for the case $E_0 \neq 0$ which will be considered in the next part. The effective Lagrangian will be calculated subsequently. Proper time kernel for $E_0 = 0$ {#subsec:Minkowskikernel} -------------------------------- For the case $E_0 = 0$, the proper time effective Schrödinger equation in the $(u,v,y,z)$ coordinate system for a scalar field of mass $m$ is ł( 4\_u\_v - \_\^2 + m\^2)= E, \[minkkernel1\] where $E$ is the “energy” corresponding to the proper time $s$. The solution to the above equation is of the form = N e\^[i[**k**]{}\_\_]{}e\^[-iu]{} e\^[-iv]{}, \[minkkernel2\] where $N$ is a normalisation constant to be determined and $\alpha$, $\gamma$ and ${\bf k}_{\perp} = (0, k_y, k_z)$ are arbitrary constants taking values in the range $(-\infty, \infty)$ such that E = m\^2 + [**k**]{}\_\^2 - 4. \[minkkernel3\] We normalize $\Phi$ by the usual Schrödinger prescription to obtain the normalized wavefunctions = [ (2)\^2]{}e\^[i[**k**]{}\_\_]{}e\^[-iu]{}e\^[-iv]{}. \[minkkernel4\] The proper time kernel, using the Feynman-Kac expression, is K(a,b;s) &=& [2 (2)\^4]{} d\^2[**k**]{}\_dd e\^[i[**k**]{}\_([**a**]{}\_-[**b**]{}\_)]{} e\^[-i(u\_a - u\_b)]{} e\^[-i(v\_a-v\_b)]{} e\^[-iEs]{}\ &=& [2(2)\^4is]{} e\^[i([**a**]{}\_\^2 - [**b**]{}\_\^2)/4s]{} e\^[-im\^2s]{} (2)d ł\[4s - (u\_a - u\_b)\] e\^[-i(v\_a - v\_b)]{}\ &=& [1 16\^2 is\^2]{} e\^[-im\^2s]{}e\^[i([**a**]{}\_\^2 - [**b**]{}\_\^2)/4s]{} e\^[-i(u\_a-u\_b)(v\_a-v\_b)/4s]{}\ &=& [1 16\^2 is\^2]{} e\^[-im\^2s]{} e\^[-i(a-b)\^2/4s]{} \[minkkernel5\], where we have substituted for $E$ from Eq. (\[minkkernel3\]), $a = (u_a, v_a, a_y, a_z)$, $b = (u_b, v_b, b_y, b_z)$, ${\bf a}_{\perp} = (0, a_y,a_z)$, ${\bf b}_{\perp} = (0, b_y,b_z)$ and $\delta(x)$ is the one dimensional Dirac delta function. The above result is seen to be the standard result for a complex scalar field. Proper time kernel for $E_0 \neq 0$ {#subsec:electrickernel} ----------------------------------- Now, we are ready to consider the case of a uniform electric field pointing along the $\hat{\bf x}$ direction with a magnitude $E_0$. The gauge we consider is the light cone gauge. The proper time effective Schödinger equation in this case is ł\[ ł(\_i + iqA\_i)ł(\^i + iqA\^i) + m\^2\] = E. \[electrickernel1\] The lightcone gauge, in the $(u,v,y,z)$ coordinate system, is A\^i = E\_0ł(u, 0, 0, 0) \[electrickernel2\]. The solutions to Eq. (\[electrickernel1\]) are given by = N e\^[i[**k**]{}\_\_]{}e\^[-iv]{} ł\[ u - \]\^[i-[12]{}]{} , \[electrickernel3\] where $N$ is a normalisation constant to be determined, $\gamma$, $\varrho$ and ${\bf k}_{\perp}$ are arbitrary constants and the energy $E$ is given by the relation E = m\^2 + [**k**]{}\_\^2 - 2qE\_0 . \[electrickernel4\] Since the above mode functions are singular on the surface $u = 2\gamma/qE_0$, it can easily be shown that they cannot be normalized by the usual Schrödinger prescription. To make progress, we impose the condition that, in the limit of $qE_0 \to 0$, $\Psi$ reduces to the usual Minkowski mode functions given in (\[minkkernel4\]). This implies that the “normalized” mode functions must be of the form = [ (2)\^2]{} ł()\^[-[2iqE\_0]{} + [12]{}]{} e\^[i[**k**]{}\_\_]{}e\^[-iv]{} ł\[ - u \]\^[[2iqE\_0]{} - [12]{}]{}, \[electrickernel5\] where a new constant $\alpha$ has been defined such that E = m\^2 + [**k**]{}\_\^2 - 4, \[electrickernel6\] just as in (\[minkkernel3\]) with $\varrho = 2\alpha\gamma/qE_0$. Extending the definition of the Feynman-Kac formula for such a system, we have K(a,b;s) &=& [2 (2)\^4]{} d\^2[**k**]{}\_dde\^[i[**k**]{}\_ ([**a**]{}\_- [**b**]{}\_)]{}e\^[-i(v\_a-v\_b)]{} e\^[-i(m\^2 + [**k**]{}\_\^2 -4)s]{}\ & & ł\[ - u\_a \]\^[[ 2iqE\_0]{} -[1 2]{}]{} ł\[ - u\_b \]\^[-[2iqE\_0]{} - [12]{}]{} \[electrickernel7\]. Doing the integrals over $k_y$ and $k_z$ and defining new dimensionless variables ’ = , ’ = , \[electrickernel8\] the expression for the kernel becomes K(a,b;s) &=& [2 (2)\^3is]{}ł\[[qE\_0 2]{}\]\^[3/2]{} e\^[-im\^2s]{}e\^[i([**a**]{}\_ - [**b**]{}\_)\^2/4s]{} d’ d’ ’ e\^[-i’ (v\_a-v\_b)]{}\ && e\^[2iqE\_0s ’’]{} ł\[ł(’-u\_a)ł(’-u\_b )\]\^[-[12]{}]{}\ && ł(i’’ł\[[’-u\_a ’-u\_b]{}\] ) \[electrickernel9\]. When $u_a \neq u_b$ and assuming further that $u_a>u_b$ for definiteness, the integral over $\alpha'$ gives a Dirac delta function which can be easily evaluated to give the result K(a,b;s) &=& [1 16\^2 is]{} [qE\_0 (qE\_0s)]{} e\^[-im\^2s]{} e\^[i([**a**]{}\_ - [**b**]{}\_)\^2/4s]{}\ && ł(-[iqE\_0 ł(u\_a - u\_be\^[-2qE\_0s]{})(v\_a-v\_b) 2ł(1-e\^[-2qE\_0s]{}) ]{}) . \[electrickernel11\] In the limit of $qE_0 \to 0$, it is easily checked that the above result reduces to the free field result in Eq. (\[minkkernel5\]). This result is clearly not the same as the proper time kernel of the analytically continued simple harmonic oscillator. This difference merely reflects the choice of gauge in each case. The effective Lagrangian can be calculated using the above kernel by setting $v_a = v_b$, ${\bf a}_{\perp} = {\bf b}_{\perp}$ and taking the limit $u_a \to u_b$. This gives L\_[eff]{} &=& -i\_[ab]{}\_0\^ K(a,b;s)\ &=& -[1 16\^2]{} \_0\^ e\^[-im\^2 s]{} [qE\_0 (qE\_0s)]{} \[electrickernel12\], which indeed is the standard result [@paddyaspects]. The imaginary part of the effective Lagrangian can be calculated in the usual way by using standard contour integration techniques. Note that the final answer is seen to be valid even if $u_a \neq u_b$ (but with $v_a = v_b$ and ${\bf a}_{\perp} = {\bf b}_{\perp}$) and so is perfectly well defined in the limit $u_a \to u_b$. Therefore, we see that the standard result is recovered in a rather simple and straightforward manner. The role of the light cone structure appears to make no difference to the production of particles as to be expected of a gauge invariant result. The following subtlety however, is worth noting. Let us impose the condition $u_a = u_b$ [*before*]{} the evaluation of the integral over $\alpha'$ in Eq. (\[electrickernel9\]). In this case, the last exponential containing the logarithmic term does not contribute. Evaluating the integral over $\alpha'$, one has K(a,b;s) &=& [2 (2)\^2is]{}ł\[[qE\_0 2]{}\]\^[3/2]{} e\^[-im\^2s]{}e\^[i([**a**]{}\_ - [**b**]{}\_)\^2/4s]{} d’ ’ e\^[-i’ (v\_a-v\_b)]{}\ && ł(’-u\_a)\^[-1]{} (2qE\_0s’)\ && 0 . \[electrickernel10\] The kernel vanishes with the consequent result that the effective Lagrangian is [*identically zero*]{}. A possible way of understanding this sensititivity to the order of operations is as follows. The presence of the electric field produces a singularity on the light cone at each spacetime point (with the singularity at a point $x$ occuring at a time $t=x+(2\gamma/E_0)$). In order to have pair production, the electric field modes have to propagate past this lightcone singularity. Imposing the condition $u_a = u_b$ before the evaluation of the integral over $\alpha'$ in Eq. (\[electrickernel9\]) implies that this propagation across the singularity does not take place with the result that the kernel and the effective Lagrangian do not acquire an imaginary part. Hence no particles are produced. The zero result is primarily the consequence of the normalization criteria used to normalize the modes and just means that there is no vacuum polarization term present. When $u_a\neq u_b$, the evaluation of the Dirac Delta function to give the result in Eq. (\[electrickernel11\]) ensures propagation of these modes across the singularity. Since the contribution to the kernel from the singularity, which results in the appearance of an imaginary term, is independent of $u_a$ or $u_b$ (this is analogous to a tunnelling situation where the tunnelling coefficients are independent of the initial and final coordinates and arise only from the singularities and turning points present in the potential in the complex plane; see, for example, Ref. [@kt99]), the final answer is well defined even in the limit of $u_a \to u_b$. We can therefore conclude that particle production in an uniform electric field is dependent on the light cone structure of the electric field modes. This clearly shows that electric field particle production is essentially a tunnelling process. In the time and space dependent gauges, the singular potential was responsible for particle production while in the light cone gauge, it is the singularity present on the lightcone. A confined electric field system {#sec:modematching} ================================ It was mentioned earlier that the uniform electric field problem, in the purely time dependent gauge, can be essentially reduced to an effective Schrödinger problem with an inverted harmonic oscillator potential. Since this system does not possess the required asymptotic properties, the effective Lagrangian has to be calculated in a suitable fashion (in the path integral method, the analytic continuation of the proper time kernel of the simple harmonic oscillator to imaginary frequencies provides the solution). In order to explicitly justify the method used to compute the effective Lagrangian, one has to consider a system where the electric field is temporally bounded. That is, one should assume a continuous four vector potential that corresponds to zero electric field everywhere in the distant past and future. This four vector potential should also contain a parameter that enables this system to tend to the uniform field case in a suitable limit. By appropriate mode matching at the boundaries (or by determining the exact solution for a smoothly varying electric field) and calculating the Bogolubov coefficients and subsequently the effective Lagrangian, it ought to be possible to verify if the methods used in the standard calculation are justified by taking an appropriate limit to the uniform field case. One such electric field which is mathematically tractable is a time varying homogeneous electric field system of the form = [E\_0 \^2(t)]{} \[tempfield1\], which tends to zero in the infinite past and future [@popov72] (see also Refs. [@nandn70; @nikishov70two] for related work). The above example admits an exact solution for the mode functions in terms of hypergeometric functions (see [@mandf53], Part 2, pp.1651-1660). In the limit of $\omega \to 0$, it is clear that the system tends to an uniform electric field system. This system can be reduced to an effective Schrödinger equation in the $t$ coordinate. By analysing this effective Schrödinger system, it can be shown that, in the limit $\omega \to 0$, the transmission and reflection coefficients tend to the standard values thus showing that these values are obtainable using a well defined limiting process. Thus, the effective Lagrangian can be obtained in a consistent manner which is free of the issue raised in the previous paragraph about the non-asymptotic behaviour of the uniform electric field system. In the example discussed above, the boundary conditions at termporal infinity were not imposed properly. Though the complete solution is given in terms of hypergeometric functions which have the required asymptotic behaviour, it should be noted that an extra normalization factor arises if these modes are matched to the standard Minkowski mode functions as mentioned in the introduction. This extra term modifies the expressions for the Bogolubov coefficients and thus the number of particle pairs created is different. However, the relative probability of pair creation, which is quantified by the reflection coefficient $R$ in the temporally varying electric field [@popov72], remains unchanged. This occurs because both the Bogolubov coefficients are modified in exactly the same way by a multiplicative term. We shall now study an example of a confined electric field system that is conveniently described using the lightcone gauge. Recall that the modes in this gauge are singular on the lightcone surface. This is very similar to the black hole system where the modes are singular on the horizon which is also a null surface. Particle production described in such a gauge appears to be remarkably similar to that occuring in a black hole system with the presence of a null surface playing an important role (also see the concluding paragraphs of section (\[sec:electricefflag\])). This system is constructed such that, in the limit of a suitable parameter tending to infinity, it tends to a uniform electric field system. It also clarifies the issue raised in the previous paragraph by showing that the Bogolubov coefficients, in this limit, are modified by an extra factor that arises due to mode matching at the boundaries. Consider a vector potential that is continuous in the null coordinate $u=t-x$ of the form A\^i = ł{ [lll]{} (0, 0, 0, 0) & u u\_1 & ([in region]{})\ E\_0 (u-u\_1, 0, 0, 0) & u\_1 < u < u\_2 & ([region II]{})\ E\_0(u\_2-u\_1, 0, 0, 0) & u u\_2 & ([out region]{})\ . , \[matchingmodes1a\] where $u_1$ and $u_2$ are constants. The electric field, charge density $\rho$ and current density ${\bf j}$ for this system are &=& E\_0 (u-u\_1)(u\_2 - u),\ &=& [E\_0 4]{} ł\[ (u\_2 - u) - (u-u\_1)\] , = ł(,0,0) \[matchingmodes1b\], where $\theta(x)$ the step function. The above electric field propagates along the null geodesic $u=constant$. At any particular point in space, the electric field switches on and off for a finite time interval starting from some particular time that is dependent on the location of this point. That is, the electric field, at any fixed point $x$ in space, switches on at $t_i = x + u_1$ and switches off at $t_f = x + u_2$ which therefore implies that the interval during which the electric field is on at any point in space is $t_f-t_i = u_2 - u_1 = T$. During this time interval, the electric field at that point is constant. The charge and current density configuration required to set up such a system is clearly unfeasible since it involves positive and negative charges moving at the speed of light along the null lines $u=u_2$ and $u=u_1$ respectively. Though such a system is physically unrealizable, it is neverthless worth studying since it is mathematically simple and tends to a uniform electric field system by a concrete limiting procedure. From the form of $A^i$ in Eq. (\[matchingmodes1a\]), we see that our calculations can be conveniently done in the $(u.v.y,z)$ coordinate system where $u=t-x$ and $v=t+x$. The advantage is that the scalar wave equation reduces to solving first order equations in the $u$ and $v$ variables. Therefore, imposing boundary conditions in the $u$ variable involves just matching the modes at the boundary and [*not*]{} the first derivatives. The scalar wave equation in the $(u,v,y,z)$ coordinate system with a vector potential of the form $A^i = (f(u),\, 0,\, 0,\,0)$ is ł\[ 4\_u\_v + 2iqf(u)\_u + iqf’(u) - \_\^2 + m\^2 \]= 0 \[matchingmodes1\], where $f'(u) = df/du$, $\nabla_{\perp}^2 = \partial_y^2 + \partial_z^2$ and $q$ and $m$ are the charge and mass of the scalar field respectively. The flat space modes in the “in region”, $u<u_1$, are \_[in]{} = N\_[in]{} e\^[i[**k**]{}\_\_]{} e\^[-i\_[in]{} v]{}e\^[-i\_[in]{} u]{},m\^2 + [**k**]{}\_\^2 = 4\_[in]{}\_[in]{} , \[matchingmodes2\] where $\gamma_{\rm in}$ and $\alpha_{\rm in}$ are arbitrary constants satisfying the relation on the right and $N_{\rm in}$ is a normalization constant to be determined. The other independent mode is $\Psi_{\rm in}^*$ which has an equivalent expression. We would now like to determine the conditions on $\alpha_{\rm in}$ and $\gamma_{\rm in}$ so that $\Psi_{\rm in}$ can be identified as a positive frequency mode. This can be done by noting that the normalized Minkowski positive frequency mode $\Phi$ in the $(t,x,y,z)$ coordinate system in the same region can be written in the alternative form \_[in]{} &=& [1 ]{} e\^[i[**k**]{}\_\_]{} e\^[ik\_x x]{} e\^[-i\_[in]{} t]{}\ &=& [1 ]{} e\^[i[**k**]{}\_\_]{} e\^[-i(\_[in]{} -k\_x)v/2]{} e\^[-i(\_[in]{} + k\_x)u/2]{}, \[matchingmodes3\] where $\omega_{\rm in} = \sqrt{k_x^2 + {\bf k}_{\perp}^2 + m^2} > 0$. Comparing the modes in Eq. (\[matchingmodes2\]) and Eq. (\[matchingmodes3\]), one sees that, for $\Psi_{\rm in}$ to be a positive frequency mode, one must have \_[in]{} = [1 2]{}(\_[in]{} -k\_x) > 0, \_[in]{} = [1 2]{}(\_[in]{} +k\_x) > 0, N\_[in]{} = [1]{}, \[matchingmodes4\] which therefore implies that $4\alpha_{\rm in} \gamma_{\rm in} = \omega_{\rm in}^2 - k_x^2$. A similar argument shows that $\Psi_{\rm in}^*$ can be identified with negative frequency modes. In the previous section, a suitable normalization criterion for the electric field modes was introduced. We apply the same to the electric field modes in region ${\rm II}$ i.e. we demand that these modes reduce to the standard Minkowski modes in the limit $E_0 \to 0$. Keeping in mind, the relations in Eq. (\[matchingmodes4\]), the normalized electric field modes in the region $u_1<u<u_2$ (denoted by $\Psi_{\rm II}$) are given by \_[II]{} &=& N\_[in]{} ł( \_[in]{})\^[-[2i\_[in]{} \_[in]{} qE\_0]{} + [12]{}]{} e\^[i[**k**]{}\_\_]{}e\^[i\_[in]{}u\_1]{} e\^[-i\_[in]{} v]{}\ && ł\[ \_[in]{} - (u-u\_1) \]\^[[2i\_[in]{}\_[in]{} qE\_0]{} -[12]{}]{}. \[matchingmodes5\] The other independent mode is $\Psi_{\rm II}^*$ which has an equivalent expression. Since the normalization criterion for $\Psi_{\rm II}$ has been chosen such that, in the limit of $E_0 \to 0$, they reduce to the standard modes in Eq. (\[matchingmodes2\]), we identify $\Psi_{\rm II}$ as the [*electric field positive frequency vacuum mode*]{}. Similarly, $\Psi_{\rm II}^*$ can be identified as the electric field negative frequency vacuum mode. Note that $\Psi_{\rm II}$ and $\Psi_{\rm II}^*$ are singular on the light cone surface $u = u_s = u_1 + 2\gamma_{\rm in}/qE_0$. For particle production to take place, it is [*necessary*]{} that the condition $u_1 < u_s< u_2$ hold. This arises as follows: If the boundary condition, that for $u<u_s$, only positive frequency electric field modes are present, is imposed, then the electric field modes for $u>u_s$ are not pure positive frequency modes but are a combination of both positive and negative frequency modes because of the singularity at $u=u_s$. This implies particle production and is possible only if $u_s$ lies between $u_1$ and $u_2$. Substituting for $\gamma_{\rm in}$ from Eq. (\[matchingmodes4\]), this condition can be written as \_[in]{} - k\_x < qE\_0T . \[matchingmodes6\] For this electric field, only those vacuum modes with wave vectors $(k_x,k_y,k_z)$ satisfying the above condition are excited and hence contribute to particle production. This condition will be used when the effective Lagrangian is calculated. Finally, consider the “out region”. The normalized Minkowski positive frequency modes in the $(t,x,y,z)$ coordinate system in this region are \_[out]{} = [1 ]{} e\^[i[**k**]{}\_\_]{} e\^[i|[k]{}\_xx]{} e\^[-i\_[out]{}t]{} , \[matchingmodes7\] where $\omega_{\rm out}$, $\bar{k}_x$ and $(k_y,k_z)$ satisfy the relation ł(\_[out]{} - qE\_0T/2)\^2 - ł(|[k]{}\_x + qE\_0T/2)\^2 = [**k**]{}\_\^2 + m\^2 . \[matchingmodes8\] Thus, by analogy with that done for the “in region”, the normalized positive frequency modes in the $(u,v,y,z)$ coordinate system are \_[out]{} = N\_[out]{} e\^[i[**k**]{}\_\_]{} e\^[-i\_[out]{}v]{} e\^[-i\_[out]{}u]{} , \[matchingmodes9\] with the identifications \_[out]{} = [1 2]{}(\_[out]{} -|[k]{}\_x), \_[out]{} = [1 2]{}(\_[out]{} +|[k]{}\_x), N\_[out]{} = [1]{} . \[matchingmodes10\] The constant $\gamma_{\rm out}$, or equivalently $\bar{k}_x$, is determined later by using the matching conditions at the boundary $u=u_2$. The other independent mode is $\Psi_{\rm out}^*$ which has an equivalent expression. Thus, in all three regions, we have = ł{ [ll]{} N\^[in]{}\_1 \_[in]{} + N\^[in]{}\_2\_[in]{}\^\* & u u\_1\ N\^[II]{}\_1 \_[II]{} + N\^[II]{}\_2\_[in]{}\^\* & u\_1< u < u\_s\ N\^[II]{}\_3 \_[II]{} + N\^[II]{}\_4\_[in]{}\^\* & u\_s< u < u\_2\ N\^[out]{}\_1 \_[out]{} + N\^[out]{}\_2\_[out]{}\^\* & u u\_2\ . \[matchingmodes11\] , where $N^{\rm in}_1$, $N^{\rm in}_2$, …, $N^{\rm out}_2$ are constants to be determined. We now impose the boundary condition that, for $u<u_1$, only positive frequency Minkowski modes are present. This immediately implies that $N^{\rm in}_2 = N^{\rm II}_2=0$. Matching the modes at the boundary $u=u_1$ gives $N^{\rm II}_1 = N^{\rm in}_1$. These positive frequency electric field modes propagate past the singularity at $u=u_s$ to become a combination of positive and negative frequency modes with amplitudes $N^{\rm II}_3$ and $N^{\rm II}_4$. For convenience, we set N\_3\^[II]{} = C\_1 N\_1\^[II]{} ; N\_4\^[II]{} = C\_2 N\_1\^[II]{} \[matchingmodes13\]. These amplitudes $C_1$ and $C_2$ can be exactly determined by matching the modes and their derivatives at the singularity. However, since only their modulus squares are finally required, these can be determined from the expressions for the modulus square of the Bogolubov coefficients for these modes (see Ref. [@kt99]) without doing any complicated calculation. Now, at the boundary $u=u_2$, it is clear that positive frequency electric field modes go over to the positive frequency Minkowski modes and similarly for the negative frequency modes. Since the mode matching must hold for arbitrary $v$, one must have $\gamma_{\rm in} = \gamma_{\rm out}$. Using this, we get N\^[out]{}\_1 &=& C\_1 N\_1\^[in]{} ł([N\_[in]{} N\_[out]{}]{}) e\^[i(\_[in]{}u\_1 + \_[out]{}u\_2)]{} ł(\_[in]{})\^[-[2i\_[in]{} \_[in]{} qE\_0]{} + [12]{}]{}\ && ł\[ \_[in]{} - T \]\^[[2i\_[in]{}\_[in]{} qE\_0]{} -[12]{}]{} \[matchingmodes14a\] and N\^[out]{}\_2 &=& C\_2 N\_1\^[in]{} ł([N\_[in]{} N\_[out]{}]{}) e\^[-i(\_[in]{}u\_1 + \_[out]{}u\_2)]{} ł( \_[in]{})\^[[2i\_[in]{} \_[in]{} qE\_0]{} + [12]{}]{}\ && ł\[ \_[in]{} - T \]\^[-[2i\_[in]{}\_[in]{} qE\_0]{} -[12]{}]{} \[matchingmodes14b\]. From the expression for the Bogolubov coefficients, we have |C\_1|\^2 = 1 + e\^[-]{} ; |C\_2|\^2 = e\^[-]{}, \[matchingmodes15\] where $\lambda = (m^2 + {\bf k}_{\perp}^2)/qE_0$ as usual. The final expressions for the Bogolubov coefficients are ł|\_[**k**]{}|\^2 = ł|[N\^[out]{}\_1 N\^[in]{}\_1]{}|\^2 = ł([\_[in]{} \_[in]{}]{}) ł([ ł(qE\_0T - 2\_[in]{})\^2 + [**k**]{}\_\^2 + m\^2 ł(qE\_0T - 2\_[in]{})\^2 ]{}) ł(1 + e\^[-]{}) \[matchingmodes16a\] and ł|\_[**k**]{}|\^2 = ł|[N\^[out]{}\_2 N\^[in]{}\_1]{}|\^2 = ł([\_[in]{} \_[in]{}]{}) ł([ ł(qE\_0T - 2\_[in]{})\^2 + [**k**]{}\_\^2 + m\^2 ł(qE\_0T - 2\_[in]{})\^2 ]{}) e\^[-]{} \[matchingmodes16b\]. The expression for $|\beta_{\bf k}|^2$ gives the number of pairs produced for this electric field system. Note that the relative probability of particle production which is = [ e\^[-]{}1 + e\^[-]{}]{} , \[matchingmodes17\] is [*independent*]{} of $T$. Thus, in the limit of $T \to \infty$ (or equivalently $u_1 \to -\infty$ and $u_2 \to \infty$), which corresponds to an uniform electric field existing over all space and time, it is clear that the standard results are recovered. Moreover, the Bogolubov coefficients also tend to the standard values upto a multiplicative factor i.e. \_[T ]{} ł|\_[**k**]{}|\^2 = ł([\_[in]{} - k\_x \_[in]{}]{}) ł(1 + e\^[-]{}), \_[T ]{} ł|\_[**k**]{}|\^2 = ł([\_[in]{} - k\_x \_[in]{}]{}) e\^[-]{} \[modbogolubov\]. This difference can be traced to the fact that, in the standard calculation, boundary effects at $t\to \pm \infty$ due to mode matching were not taken into account. Therefore, the above expressions can be considered to be the correct ones with the extra factors arising due to these boundary effects at $t\to \pm \infty$. Note that both the coefficients have been modified by the same factor. It therefore follows that the relative probability of pair production, which is the ratio $\l(|\beta_{\bf k}|^2/|\alpha_{\bf k}|^2\r)$, is independent of this factor. The imaginary part of the effective Lagrangian for this system follows. Omitting several straightforward intermediate steps (see, for example Ref. [@sriram97; @paddyaspects]), one has d\^4x [Im]{}[L]{}\_[eff]{} = [V 2(2)\^3]{}\_[n=1]{}\^ [(-1)\^[n+1]{} n]{} e\^[-[m\^2 qE\_0]{}n]{} dk\_x 2|[**k**]{}\_| d|[**k**]{}\_| e\^[-[n qE\_0]{}[**k**]{}\_\^2]{} \[matchefflag1\], where the limits over $k_x$ and $|{\bf k}_{\perp}|$ are to be determined from the condition in Eq. (\[matchingmodes6\]). From Eq. (\[matchingmodes6\]), we have, \_\^2 < (qE\_0T)\^2 + (2qE\_0T)k\_x - m\^2 = L(k\_x). \[matchefflag2\] Thus, the limits for the $|{\bf k}_{\perp}|$ integral are $\l(0, \sqrt{\smash L(k_x)}\r)$. From the condition that $L(k_x) > 0$ always, one must have k\_x > - ł([(qE\_0T)\^2 - m\^2 2qE\_0T]{}) = - M \[matchefflag3\]. Consider only the integral over $k_x$ and $|{\bf k}_{\perp}|$. Integrating over $|{\bf k}_{\perp}|$, we get I &=& \_[-M]{}\^ dk\_x \_[0]{}\^ 2|[**k**]{}\_| d|[**k**]{}\_| e\^[-[n qE\_0]{}[**k**]{}\_\^2]{}\ &=& [qE\_0 n]{}\_[-M]{}\^ dk\_x ł\[1 - e\^[-[n qE\_0]{}L(k\_x)]{}\] \[matchefflag4\]. The integral over the first term in the square brackets gives a formally divergent term. Denoting this by $Z$ and doing the integration over $k_x$, one obtains I = [qE\_0 n]{}ł{ Z + ł([(qE\_0T)\^2 - m\^2 2qE\_0T]{}) - ł([1 2n T]{}) } \[matchefflag5\]. Substituting the above into (\[matchefflag1\]), we have d\^3[**r**]{} dt [Im]{}[L]{}\_[eff]{} &=& V\_[n=1]{}\^ [12]{} [(qE\_0)\^2 (2)\^3]{} [(-1)\^[n+1]{} n\^2]{} ł\[-[m\^2 qE\_0]{}n\]\ && ł{ Z + [1 2]{}T - [m\^2 2(qE\_0)\^2T]{} - [1 2qE\_0n T]{} } \[matchefflag6\]. (Note that in the definition of the vacuum persistence amplitude, the limits $t_1 \to -\infty$ and $t_2 \to \infty$ were considered. Since two independent limits are being taken, it follows that, when differentiating with respect to $T$ in Eq. (\[matchefflag6\]), the right hand side has to be multiplied by a factor $1/2$.) Differentiating both sides with respect to $T$ and discarding the dimensionless divergent term $Z/T$ , one gets the result \_[eff]{} = \_[n=1]{}\^ [12]{} [(qE\_0)\^2 (2)\^3]{} [(-1)\^[n+1]{} n\^2]{} e\^[-[m\^2 qE\_0]{}n]{} ł{ 1 + [m\^2 (qE\_0)\^2T\^2]{} + [1 qE\_0n T\^2]{} } \[matchefflag7\]. This expression for the effective Lagrangian shows boundary effects occurring as a correction to the standard result. Taking the limit of $T\to \infty$ does reproduce the standard result. The positive sign for these correction terms implies that the vacuum persistence probability is [*smaller*]{} than that for the uniform electric field case. We conclude this section by making a few general remarks regarding the importance of the light cone gauge in calculating the effective Lagrangian. The use of this gauge suggests a way of calculating the effective Lagrangian for a constant electric field system. (By a constant electric field system one means any spacetime region that has a constant electric field present in it.) The following points may be deduced from the effective Lagrangian calculation presented in this section: (1) The light cone gauge, as discussed earlier, has the property that the electric field modes are singular at finite spacetime points that are located on null lines. (2) Each singularity indicates the energy of the vacuum mode that is excited by the electric field. Particle production occurs in that mode when the vacuum modes propagate past this singularity. The set of all these singularities determines the range of energies for which particles are produced (see the discussion leading to condition Eq. (\[matchingmodes6\])). (3) In the calculation of the Bogolubov coefficients, the boundary conditions present in the system modified both the coefficients in exactly the same way (see Eq. (\[matchingmodes16b\])). This implies that the relative probability of pair creation which is the ratio $|\beta_{\bf k}|^2/|\alpha_{\bf k}|^2$ is [*independent*]{} of the extra factors introduced by the boundary conditions. It is dependent solely on the presence of the singularities. This point is justified for any constant electric field system if one accepts that particle production in an electric field is essentially a tunnelling process which arises, in this case, because of the singularities present on the light cone. (In any other gauge, like the time dependent gauge for example, the inverted oscillator nature of the effective potential is responsible for particle production.) We can use these three points to determine a procedure to calculate the effective Lagrangian for an arbitrary constant electric field system in the following manner. Consider a region of spacetime that has a constant electric field of magnitude $E_0$ along, say, the $\hat{\bf x}$ direction (without any loss of generality). The field modes in this region can always be described in terms of the modes of the light cone gauge (multiplied by a suitable gauge factor). The only singularities that occur in the mode functions are due to the light cone gauge modes (we assume that singular gauge transformations are not allowed). Now, identify the set of null rays $u=constant$ passing through this region. Since singularities occur on these rays, this set determines the set of possible modes described by the wave vector ${\bf k}$ that can be excited by the electric field. That is, the possible range of values that can be taken by ${\bf k}=(k_x,k_y,k_z)$ are determined. Using the fact that the relative probability of pair production in a particular mode, given by = [e\^[-]{} 1+ e\^[-]{} ]{}, \[matchefflag8\] is independent of extra factors arising from boundary conditions, the effective Lagrangian can be calculated using the formula in Eq. (\[matchefflag1\]) by evaluating the integrals over ${\bf k}$ over the range of values determined above. Any formally divergent terms that occur have to be discarded. We apply the procedure outlined above to two simple electric field systems. The first is the finite time constant electric field configuration. Here, the electric field is switched on over all spatial points for a finite time interval $T$. It is easy to see that all null rays $u=constant$ intersect this region. Hence, the range of possible values for ${\bf k}=(k_x,k_y,k_z)$ is from $(-\infty, \infty)$ for all the three components. Carrying out the integration over $k_y$ and $k_z$, we obtain \_0\^T dt [Im]{}[L]{}\_[eff]{} = \_[n=1]{}\^ [12]{} [(qE\_0)\^2 (2)\^3]{} [(-1)\^[n+1]{} n\^2]{} e\^[-[m\^2 qE\_0]{}n]{} \_[-]{}\^ \[matchefflag9\] Since this expression is formally divergent, we use the following regularization procedure to obtain a finite result. We set \_[-]{}\^ [dk\_x qE\_0]{} = Z + \_0\^T dt \[matchefflag10\] where $Z$ is a formally divergent term. Differentiating both sides in (\[matchefflag9\]) with respect to $T$ and neglecting the dimensionless divergent term $Z/T$, it is easy to show that one obtains the standard result. This result is not too surprising because to set up a constant electric field over all space requires an infinite amount of energy. Hence, vacuum modes of arbitrary energy are excited. The second system is an uniform electric field that is bounded along the $x$-axis (but not along the $y$ or $z$ axes) to a region of width $x_0$ but existing for all time. This system would correspond to a pair of capacitor plates (of infinite area) separated by a distance $x_0$. Here too, it is clear that all null rays pass through this region implying that all vacuum energy modes are excited. The effective Lagrangian for this sytem too is the standard result. Notice that in both the above examples, the actual number of pairs produced per mode cannot be determined easily since the boundary conditions are non-trivial and difficult to impose. More complicated examples can be studied in this fashion. Conclusions {#sec:electricdiscussion} =========== Summarising the analysis in this paper, we see that particle production in an uniform electric field has been described differently from the standard method. The lightcone gauge in Eq. (\[eqn:lightconegauge\]), clearly indicates the presence of a null surface which is responsible for particle production. This is very similar to the black hole case where again a null surface present in the manifold is responsible for particle creation. Both the black hole modes and the electric field modes (in the light cone gauge) possess a [*logarithmic*]{} singularity at the null surface which determines pair creation. However, the crucial difference between the two cases is that the null surface in the black hole case is a [*one way*]{} surface which is the horizon. To obtain particle production, we need the semi-classical prescription discussed in [@kt99] or some other equivalent prescription that takes into account this one-way nature of the horizon. In the electric field case, the modes can be described either by the gauge in Eq. (\[eqn:lightconegauge\]) which is written in terms of the “right moving” null coordinate $u=t-x$ (as done in this chapter) or by the gauge in Eq. (\[eqn:lightconegauge1\]) which uses the “left moving” null coordinate $v=t+x$ (both these gauges are appropriate light cone gauges). Whether the propagation of the electric field modes occurs from left to right or right to left across the singularity makes no difference to the final result. This implies that particle production in an uniform electric field is a genuine tunnelling phenomena (in the quantum mechanical sense) which is not the case for the black hole system. The effective Lagrangian, when calculated in the lightcone gauge (see section (\[sec:electricefflag\])), is found to be the same as the standard result. The modes in this gauge were also explicitly “normalizable” by a suitable physically reasonable criterion (that they reduce to the standard Minkowski modes in the limit of the field tending to zero). Because of this “normalizable” property we can look upon the lightcone gauge as a more [*natural*]{} gauge to describe the uniform electric field in. (This property also prompts the question as to whether one can determine indirectly a suitable “normalization” constant for the transcendental scalar field modes in the time or space dependent gauges.) One of the assumptions made in calculating the proper time kernel is regarding the applicability of the Feynman-Kac formula to such a singular system. However, this can be justified since, in the limit of $E_0 \to 0$, the free space result is obtained. The lightcone gauge was also used to calculate the Bogolubov coefficients and the effective Lagrangian for a finite time, but spatially non-uniform, electric field. The Bogolubov coefficients, in the limit of $T\to \infty$, which implies a uniform electric field over space and time, were found to reduce to the usual results upto a multiplicative factor which was due to extra boundary effects. The property of the light cone gauge that mode functions in this gauge are singular on null surfaces was used to develop a procedure to calculate the effective Lagrangian for a constant electric field present in an arbitrary region of spacetime. This procedure was based crucially on the assumption that the relative probability of pair creation depends only on the presence of the singularities and not on the specific boundary conditions present. This can be justified because pair creation in the uniform electric field is essentially a tunnelling process. In the light cone gauge, only tunnelling across the singularities produces particles and not otherwise. This procedure can be extended to arbitrary electric field systems which have the property that, in a sufficiently small neighbourhood of an arbitrary spacetime point, the electric field can be regarded as constant. This is very similar to the case of Reimannian manifolds which are locally flat. It would be therefore be of interest to ask if a suitable formalism can be developed on the lines of general relativity to describe arbitrary electric fields in the lightcone formalism and extend it to electromagnetic fields that satisfy the condition ${\bf E}^2 - {\bf B}^2 > 0$ (which must hold for particle production to take place). Such a formalism can be expected to shed light on the role of gauge transformations in particle production and would probably have relevance in describing backreaction on the electric field system. These issues will be considered in a future publication. [20]{} K. Srinivasan and T. Padmanabhan, ‘Particle production and complex path analysis’, Phys. Rev. D [**60**]{}, 24007 (1999). J. Schwinger, Phys.Rev., [*On Gauge Invariance and Vacuum Polarization*]{}, [**82**]{}, 664 (1951). R. Brout, S. Massar, R. Parentani, P. Spindel, Phys. Rept. [**260**]{} 329-454 (1995) and references cited therin. T. Pamanabhan, Pramana–J. Phys. [**179**]{}, 37 (1991). L. Sriramkumar, [*Quantum Fields in Non-trivial Backgrounds*]{}, Ph.D thesis, IUCAA (1997). T. Padmanabhan, ‘Aspects of quantum field theory’ in [*Geometry, fields and cosmology*]{}, eds. B. R. Iyer and C. V. Vishveshwara, Kluwer, Dordrecht, Netherlands (1997). V. S. Popov, Sov. Phys.–JETP [**35**]{}, 659 (1972). N. B. Narozhnyi and A. I. Nikishov, Sov. J. Nucl. Phys. [**11**]{}, 596 (1970). A. I. Nikishov, Nucl. Phys. B [**21**]{}, 346 (1970). P. M. Morse and H. Feshbach, [*Methods of theoretical physics*]{}, McGraw-Hill, New York (1953). [^1]: Electronic address: [email protected] [^2]: Electronic address: [email protected] | High | [
0.6666666666666661,
32.75,
16.375
] |
The primary mandate of Special Counsel Robert Mueller’s investigation is to determine if there are “any links between the Russian government and individuals associated with the campaign of President Donald Trump.” That specific task has nothing directly to do with criminal liability for any Americans or Russians, nor anything to do with the potential political implications for the President whether in the form of an impeachment report or something else. The primary mandate of the Special Counsel is, instead, a counterintelligence investigation. With all the media focus on potential criminal and political implications, we often forget this critically important, core mission for Mueller. We should concentrate far more on that dimension—the counterintelligence effort–as the country prepares for the release of the Special Counsel’s report. Mueller’s counterintelligence effort can answer nationally important questions like: Why were the Russians so successful in impacting the 2016 presidential election? For the last year and half, the Special Counsel has undertaken a broad scoped investigation into allegations regarding “collusion” on the part of then candidate Donald Trump’s campaign and matters that arise from that investigation. While the political and criminal investigative efforts make for great media, the critically important counterintelligence part of the Special Counsel’s investigation is being undertaken much more discretely. Of course, the Special Counsel is looking to determine if criminal wrongdoing happened, but he will be working to identify and understand the more complex intentions and actions undertaken at the direction or, at the least, with the concurrence of one of America’s most significant adversaries, the Russian government. We are all hopeful that the counterintelligence investigation will not only identify the actions undertake by the Russians but why they were so successful. Knowing this more than anything else is needed to guard against future effective efforts by either the Russians or other intelligence services. In January 2017, the Office of the Director of National Intelligence (ODNI) released a report documenting what the US intelligence community considered to be a dramatic and intentional effort by Russian intelligence to impact the 2016 Presidential election including distribution of stolen emails, social media campaigns, and compromising state and local electoral systems. For the most part, this report was well received by the public and within the U.S. government. However, there were those who were hesitant to fully accept the findings and called into question the integrity and the process of underlying US Intelligence Community members including the CIA, FBI, and NSC. While the report was the public “tip of the iceberg” relative to recent Russian interference, the US Intelligence Community also conceded that this was not the first time Russia had undertaken efforts to influence the US political system. Regardless, the “push back” against the intelligence agencies was one of Russia’s public victories. So, what makes this counterintelligence effort by the Russians different from previous efforts and why was it so successful? It may be best to start with just a simple understanding of the basics of an intelligence operation and what Mueller’s counterintelligence investigation may be looking for and finding along the way. Russian intelligence’s modus operandi An intelligence effort usually has a clear goal of acquiring information, access or influence. With the goal identified, a multi-pronged strategy can be used to accomplish the goal. Individuals and organizations can be targeted with hopes of acquiring specific outcomes. Operations generally begin with a significant amount of research and a solid understanding of the targets. If a specific outcome is the primary goal, a number of individuals may be targeted because of their connection to or influence relating to the ultimate goal. In this effort, tools deployed by an intelligence service may include: the use of recruited or coerced individuals, the undermining and exploitation of systems for conveying information, and the propagation of false information to paint an alternate narrative which benefits the goals of the intelligence effort. These are time tested tools and not new or unique to the Russian services. Even in the most technical of intelligence operations, individuals are often targeted. Knowing an individual’s or an institution’s history is foundational to assessing a target’s anticipated action and responses. As information is developed, the target’s weaknesses come to light. With people, these vulnerabilities can be very personal in nature, such as a desire or need for acclaim or an appreciation of certain things whether that’s money or something less tangible. Personal weaknesses such as infidelity or a propensity for criminal behavior can also be useful when considering vulnerabilities of a target. Greed and arrogance are traits which are incredibly helpful when assessing a target’s weaknesses as they often provide an opening to lure a target into a mutually agreed or coerced relationship. As a result, intelligence operations are generally tailored to maximize and exploit such weaknesses. Russian intelligence’s success: access Let’s face it. The Russians were effective. They not only successfully engaged with individuals who lacked familiarity or sophistication in intelligence operations but also demonstrated arrogance and neediness. While I am not naming specific persons in this article, I am sure a number of familiar names and faces easily come to mind for readers as well when thinking about individuals who have been of interest to the Special Counsel. While understanding a target of an intelligence operation is foundational, having access to the target is critical. This access can be direct access such as when intelligence services have one on one contact with a targeted individual or organization. However, the access does not always have to be direct. It can also be indirect access via someone close to the target, for instance a family member. Sometimes having access to someone else close to the target, an exploitable close associate or relative, is even better. This access can help gain cooperation of a less vulnerable target through coercion or manipulation and often to protect the family member or associate. Plenty of information demonstrates the Russians pursued access to the Trump campaign through a variety of individuals. Going back to the summer of 2016, we see campaign affiliates having active and sometimes professional ties to both Russian business and government officials. Through meetings and other professional associations, Trump campaign officials and contacts demonstrated their lack of sophistication and potentially exposed the campaign to Russian access and exploitation. With access to individuals, intelligence services work toward consummated relationships. These relationships can start as “all business.” Professional environments often provide good assessment opportunities for intelligence services and potential individual targets. Individuals who are prone to too much self-disclosure are of obvious interest and generally easy to exploit. Through either a friendly, mutually beneficial relationship or a manipulative and coerced one, relationships are needed to identify, disclose and acquire the sought-after information, gain access or exert influence. With the ever-increasing reliance on technology, cyber tools and hacking are utilized broadly by intelligence services across the globe. Having information about the most intimate details of your adversary is a currency these days. According to the Special Counsel’s July 2018 indictment of 12 Russian military officials from the GRU (Main Intelligence Directorate of the General Staff), the GRU team hacked into accounts of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC) and those of Clinton campaign employees and volunteers. The Russians did this, in part, through sending a convincing email to a senior Clinton campaign official with a fake security reset email. Once the bait was taken, the Russians then used his email credentials to send others inside the Clinton campaign additional fraudulent emails allowing the Russians to eventually steal their emails and credentials as well. While obviously a U.S. criminal offense, the Russians benefited from this hack first by exposing a weakness in the campaign and the Democratic party. What’s more, they benefitted from access to “insider” information, providing them with valuable and some very embarrassing information. It also gave them an edge in feeding a purposeful narrative helpful to their goals of impacting the 2016 election. The Russians effectively used ill-gotten information and released it at a time which benefitted them the most. Honestly, I am not sure there are many intelligence plans which work any better than this one. The Russians employed normal and everyday intelligence methods, but their success essentially cannot be overstated. While I am hard pressed to say anything nice about the Russian intelligence services, I will say they are good at what they do. The FSB, SVR and the GRU are very worthy adversaries. The US intelligence agencies have long considered them one of the most aggressive services and have occasionally walked a fine line trying to balance US intelligence goals with US diplomatic goals. Like most professional intelligence services, the Russians are studied and well versed in American processes and way of life. They are experts at identifying and taking advantage of weakness, arrogance and vanity. They effectively use outright manipulation, coercion and blackmail and are unafraid to deliver on their threats. With all that said, the Russians can also be incredibly charming and alluring to the naive. Russian intelligence’s success: social and political outcomes In addition to the manipulation of persons and the aggressive hacking and theft of personal and campaign information, the Russians have written their version of the American story from a million different perspectives. Over the last year, big tech companies have identified a host of ways the Russians have manipulated social media tools to create false identities and spread propaganda and false story lines sowing both political and social discord. These tech firms and social media outlets have been called to account and to be more transparent about their own weaknesses. Of course, this only adds to our growing distrust of another aspect of American infrastructure — this time one of the largest economic sectors of the US economy. The Russian influence campaign has caused all of us to question significant parts of trusted American processes and institutions. In hindsight, however, much of that trust was already waning. The Russians just made the most of it. I wonder how successful the Russians would have been, had we been more willing to have civil discussions over issues as opposed to eagerly fueling political rancor and partisan drama. They took advantage of us fully and the effectiveness of their efforts is much broader than even they could have imagined. Some Americans distrust our intelligence community and law enforcement. Some distrust a prior presidential campaign and a current White House administration. Some distrust our media and our technology sector. We have allowed Russian created false narratives to stoke racial and political discord. Most of all, the Russians have been successful at causing us to distrust each other. I hope at the end of the day, the Special Counsel will reveal as much as possible about how the Russians plotted and manipulated individuals in campaigns and government, stole sensitive information, and created false identities and narratives, all to satisfy their US election goals for their good not ours. The unfortunate reality is that probably near 50% of the country will believe it and another near 50% will not. | Mid | [
0.651851851851851,
33,
17.625
] |
Q: mv .. with path: Where does my file go? I have been using *nix systems for a while now, and I was surprised to see this situation in which mv misplaces or deletes my file. For example, I had a file foo.txt in the directory called previousVersions, and when I was in that directory's parent directory, I issued the command mv previousVersions/foo.txt .. expecting it to move foo.txt up to my working directory. Instead, foo.txt is in neither the original directory nor my working directory. Why did this happen and where did my file go? A: mv previousVersions/foo.txt .. will move the file foo.txt to the directory above your working directory. To have the file be moved to your working directory, replace .. with .: mv previousVersions/foo.txt . With the file presently in the parent directory of your current working directory, you can move it to your current working directory with this command: mv ../foo.txt . | High | [
0.662337662337662,
31.875,
16.25
] |
Salinivibrio proteolyticus sp. nov., a moderately halophilic and proteolytic species from a hypersaline lake in Iran. A novel moderately halophilic, Gram-negative, curved-rod-shaped bacterium, designated strain AF-2004T, was isolated from Bakhtegan Lake, a hypersaline lake with 17 % (w/v) total salt located in the southern region of Iran. Strain AF-2004T was a facultative anaerobe, motile by one polar flagellum, non-sporulating and oxidase- and catalase-positive. It grew at salinities of 1-17 % (w/v) NaCl, showing optimal growth at 5 % (w/v). Growth occurred at 10.0-45.0 degrees C and pH 5.0-9.5, with optimum growth at 32.0-35.0 degrees C and pH 8.0-8.5. Phylogenetic analyses based on 16S rRNA gene sequence comparisons indicated that strain AF-2004T is a member of the genus Salinivibrio. Strain AF-2004T had C18 : 1omega7c (31.6 %), C16 : 1omega7c (22.1 %) and C16 : 0 (20.7 %) as the predominant fatty acids and Q-8 as the major respiratory lipoquinone. The DNA G+C content was 49.5 mol%, which is in the range of values for members of the genus Salinivibrio. On the basis of differentiation from Salinivibrio costicola by phenotypic and chemotaxonomic characteristics, 16S rRNA sequence analysis and DNA-DNA relatedness, it is proposed that strain AF-2004T (=DSM 19052T =CIP 109598T) should be placed in the genus Salinivibrio as the type strain of a novel species, Salinivibrio proteolyticus sp. nov. | High | [
0.715953307392996,
34.5,
13.6875
] |
Q: PLS 00306 Error PL/SQL I use SQL *PLUS to run this code DECLARE v_sal NUMBER:= 3000; v_valid BOOLEAN; BEGIN v_valid := v_sal BETWEEN 1000 AND 5000; DBMS_OUTPUT.PUT_LINE('Value of v_valid is ' || v_valid); END; / I read that I can use this expression to assign boolean value. Why then I get this error @ line 6? A: I don't think the problem is the BETWEEN expression. It's the DBMS_OUTPUT line. It can't handle BOOLEAN values. The following code works: set serveroutput on DECLARE v_sal NUMBER:= 3000; v_valid BOOLEAN; BEGIN v_valid := v_sal BETWEEN 1000 AND 5000; dbms_output.put_line(CASE WHEN v_valid THEN 'true' ELSE 'false' END); END; / | High | [
0.660550458715596,
36,
18.5
] |
Named in honor of Charles Darwin, the father of evolution, Darwin Awards commemorate those who improve our gene pool by removing themselves from it. Passionate Plunge 1998 Darwin Award Nominee Confirmed by Darwin (July 1998) A man with the unlikely ambition to jump off every river bridge in Norwich ended his athletic career with a 70-foot leap into three feet of water. Friends said the 34-year-old man had fulfilled his dream of jumping off every city bridge spanning the River Wensum. Having exhausted the bridge selection, this time he climbed to the top of a multi-story car park, looked down from the parapets and shouted an enquiry to onlookers asking how deep the water was. Then he plunged to his death in the shallow waters below. Emergency workers were unable to resuscitate the man, who was said to possess "a strange and unusual passion for jumping into rivers." | Low | [
0.531958762886597,
32.25,
28.375
] |
Q: new line character in JSP I need to call a method from a java bean that returns a string composed of multiple lines However I need to insert the newline character in the JSP Form. In java bean, I am using the following method: for (String s : descriptionContrats){ if(s.startsWith("Contrat")){ contratsBuilder.append(s+"\r\n "); } } contrats=contratsBuilder.toString(); I wish to display the string contrats in multiple lines according to the number of iterations But when the variable is called in JSP and I use it in the following manner: <tr><td><%- contrats %> </td></tr> It prints simply as a single string in a single line. Update I have already replaced contratsBuilder.append(s+"\r\n "); by contratsBuilder.append(s).append("<br/>"); but my <br /> tags getting converted to <br /> in the html. However when it renders on browser, it has the <br /> and therefore there is no line break???. A: You are displaying the page in HTML, so you need to use HTML's newline tag - <br/>: for (String s : descriptionContrats) { if (s.startsWith("Contrat")) { contratsBuilder.append(s).append("<br/>"); } } contrats = contratsBuilder.toString(); | Mid | [
0.5495867768595041,
33.25,
27.25
] |
Source: FOX Sports Albert Pujols achieved home run number 600 in grand (slam) fashion last night as the Angels beat the Twins 7–2. Pujols is the 9th player to join this elite club and is only the second player to be born outside of the United States to hit his 600th, the other being Sammy Sosa. Unfortunately, I was not watching the game when The Machine hit #600, but as an avid Angels fan I have been sitting on the edge of my seat for every at bat, by Pujols, since he hit HR #590. I was a little disappointed at the lack of interest that seemed to be surrounding Pujols hitting his 600th home run. There was a moment during Pujols’ trek for 600, where I kind of forgot how big of a milestone 600 career home runs is. The Angels have not been playing great baseball, Mike Trout is sidelined for up to eight weeks, so I am not surprised that the Angels fanbase is not the most invested at the moment. Further, it seems like ages ago that Albert Pujols was the best player in baseball. It is no question that Pujols is a shell of his former self. He can’t field, he can’t run the bases, all he really can do is hit. But he can hit. Albert Pujols is one of the greatest hitters of all time. However, since joining the Angels, Pujols has seen a rather steady decline in his abilities. Plagued by a foot injuries that have required surgery in 2015 and 2016, it is time to accept that Pujols is no more than a designated hitter. All that to say, I was happy, and relieved, last night to see how much love was given to Albert on his career night. For the last few weeks, it seemed as if Angels, and baseball, fans just wanted him to get it over with. Thankfully, I didn’t get that feeling last night as I scrolled through my Twitter timeline. Here are some tweets from last night: Not only was it great to see so much love for Albert on social media, but I loved that there were so many people at the game last night. According to the NBC Sports box score, there was an attendance of 40,236, only 4,814 shy of a sell out. I’m glad that the video of the home run doesn’t have a grand slam shot going into a section of empty seats. Rather, there was a sea of red as the ball was blasted over the left field wall. It would have been a bit anti climactic had he hit #600 on the road, or at an empty Angel Stadium. Pujols has played 17 MLB seasons, 11 with the Cardinals and 6 with the Angels. He has won 3 MVP awards, 2 World Series (2006 and 2011), and 6 Silver Slugger awards. Albert Pujols will be enshrined in Cooperstown before long, but before then, congratulations on home run #600. | Mid | [
0.606924643584521,
37.25,
24.125
] |
The drill fell on West 30th Street, near Sixth Avenue, officials said. View Full Caption DNAinfo/Gwynne Hogan MIDTOWN — A large drill tipped over on West 30th Street and crushed a parked NYPD van outside a construction site for a luxury hotel Monday morning. The Casagrande B175 XP drill was driving into the construction site forthcoming Virgin Hotel on 30th Street, near Sixth Avenue, at about 9 a.m. when it tipped backwards, its boom crushing the NYPD van, FDNY officials said. Video shows the boom slowly tipping back onto the van while a woman runs to get out of the way. EXCLUSIVE: Video shows Midtown construction boom crashing down on NYPD van. STORY: http://t.co/VsKGxjH8LZ https://t.co/isgUXle9gB — Eyewitness News (@ABC7NY) September 28, 2015 "The machine was going up the little hill," said site foreman Nelson Ducus, 52. "All the weight's in the back. It just went backward. The machine went up in front it, it just went down," Ducus added. "I was working on the computer and heard the sound. It sounded like a loud crash, like something broke," said Carlos Marin, 36, who works across the street. Someone's Monday is worse than yours. Crane collapse on 30th and Broadway. #whoops A photo posted by Marisa McWilliams (@marisamcwilliams) on Sep 28, 2015 at 7:04am PDT The drill fell on West 30th Street, near Sixth Avenue, officials said. View Full Caption DNAinfo/Anton Nilsson No injuries were reported, the FDNY spokesman said. The machine weighs about 42 tons, according the manufacturer's website. The Department of Buildings issued a stop work order on the site for failing to safeguard it, a spokesman said. An NYPD spokeswoman did not immediately have any details about the incident. The lead contractor at the construction site, Flintlock Construction Services, did not immediately respond to a request for comment. The site's owner, LG Broadway Management, could not be reached. The Virgin Hotel, which is backed by mogul Richard Branson and already has another outpost in Chicago, is slated to take over much of the block with 460 rooms filling its 38 stories, according to New York YIMBY. It's due to open in 2016, Curbed said. | Low | [
0.461847389558232,
28.75,
33.5
] |
Scary Details Emerge From Sandra Bullock Stalking Incident Scary details have come out in regards to Sandra Bullock's home invasion in early June that involved the police arriving at her house. On June 8, a man was arrested for trespassing on Bullock's property while she was home. The 'Gravity' star was unharmed and the intruder, Joshua Corbett, was arrested without incident around 3:30AM PT. TMZ has learned frightening details from the evening that say Bullock actually came face-to-face with the man after she heard noises coming from inside the house around 1AM. When Bullock went to her bedroom door to lock it, she saw Corbett dressed in all black. Bullock reportedly then shut the door and immediately called 9-1-1. She revealed that she had showered before going to bed, and that the intruder may have actually been inside her house longer. When cops arrived and arrested Corbett, he reportedly yelled, "Sandy, I'm sorry. Please don't press charges." He was also reportedly carrying a notebook with magazine photos of Bullock pasted with notes, with one saying, "I will forever be thinking of you and Louie, my son, as you are my wife by law, the law of God and you belong to me and me to you." An investigation into Corbett's house turned up seven guns at his home, including assault rifles, and police believe he may have more out there. Corbett has been charged with 19 felonies, including seven counts of possession of a machine gun, two counts of possession of an assault weapon and 10 counts of possession of a destructive device, as well as stalking. Bullock's evening sounds frightening, but we're glad that the Academy Award-winner is OK and unharmed. | Mid | [
0.549707602339181,
35.25,
28.875
] |
package org.mockserver.serialization.java; import org.junit.Test; import org.mockserver.model.HttpClassCallback; import java.util.concurrent.TimeUnit; import static org.junit.Assert.assertEquals; import static org.mockserver.character.Character.NEW_LINE; /** * @author jamesdbloom */ public class HttpClassCallbackToJavaSerializerTest { @Test public void shouldSerializeFullObjectWithCallbackAsJava() { assertEquals(NEW_LINE + " callback()" + NEW_LINE + " .withCallbackClass(\"some_class\")" + NEW_LINE + " .withDelay(new Delay(TimeUnit.MILLISECONDS, 100))", new HttpClassCallbackToJavaSerializer().serialize(1, new HttpClassCallback() .withCallbackClass("some_class") .withDelay(TimeUnit.MILLISECONDS, 100) ) ); } } | Mid | [
0.6284987277353691,
30.875,
18.25
] |
import open from 'open'; import catchAsyncError from '../catchAsyncError'; import {findModuleChangelogUrl} from '../changelogUtils'; import {strong} from '../cliStyles'; const pkg = require('../../package.json'); export const command = 'changelog <moduleName>'; export const describe = 'Show changelog for a module'; export const handler = catchAsyncError(async opts => { const {moduleName} = opts; console.log(`Trying to find changelog URL for ${strong(moduleName)}...`); let changelogUrl; try { changelogUrl = await findModuleChangelogUrl(moduleName); } catch (err) { if (err.code === 'E404') { console.log("Couldn't find info about this module in npm registry"); return; } } if (changelogUrl) { console.log(`Opening ${strong(changelogUrl)}...`); open(changelogUrl); } else { console.log( "Sorry, we haven't found any changelog URL for this module.\n" + `It would be great if you could fill an issue about this here: ${strong(pkg.bugs.url)}\n` + 'Thanks a lot!' ); } }); | Mid | [
0.59438775510204,
29.125,
19.875
] |
Kaepernick Says He’ll Donate Proceeds From Top-Selling Jersey He called the support of his national anthem protest unexpected. -- Despite some initial push back from some fans who posted images of themselves burning Colin Kaepernick memorabilia, the quarterback's protest of the national anthem and treatment of "black people and people of color" has sparked an outpouring of support -- and merchandise sales. The red, home team version of the 49ers Kaepernick jerseys became the league's top seller today, according to NFL.com, which tracks sales by popularity. The jersey sales surpassed those for Cowboys running back Ezekiel Elliott, who has held the top spot for much of the NFL pre-season. The embattled quarterback took to Instagram today to acknowledge the occasion and thank fans for their ongoing support, despite the controversy surrounding him. He promised to donate the proceeds he receives from jersey sales to "the communities." "I want to thank everyone who has shown me love and support, it truly means a lot! I wasn't expecting my jersey sales to jump to number one because of this, but it shows the people's belief that we can achieve justice and equality for ALL!" Kaepernick wrote. "The only way I can repay you for the support is to return the favor by donating all the proceeds I receive from my jersey sales back into the communities! I believe in the people, and WE can be the change!" Kaepernick didn't elaborate on how much money he would donate, or how he would do it. Kaepernick white, away game 49ers jerseys, the second appearance of his name on NFL.com's list of best sellers, currently out-ranks the first appearance of NFL superstars like Cam Newton and Rob Gronkowski. The protest, which was first noticed by the media in a pre-season game against the Green Bay Packers on August 26, has added to the debate over the subjects of race, patriotism, sports protest and violence by and against police. Kaepernick's growing marketability, at least in terms of jersey sales, has added an additional layer of complexity to this story. Mixing politics and sports has often been seen as difficult since teams don't want to alienate any fans. Today, NFL Commissioner Roger Goodell voiced disagreement with Kaepernick's choice to kneel during the anthem, after acknowledging his right to do so. "I support our players when they want to see change in society, and we don't live in a perfect society," Goodell said. "On the other hand, we believe very strongly in patriotism in the NFL." Republican presidential nominee Donald Trump said not long after the story broke that "maybe [Kaepernick] should find a country that works better for him," and the union for the Santa Clara, California Police Department -- the officers who work San Francisco 49ers home games -- said that its members would consider boycotting their duty to police the stadium if the team didn't discipline Kaepernick for his actions. Santa Clara Police Chief Michael Sellers later offered a rebuke of that position, saying that "officers are here to protect the rights of every person, even if we disagree with their position," but also expressed sympathy for the union's sentiment. President Obama defended Kaepernick's right to protest while answering questions from the press at the G20 summit meeting in Hangzhou, China this Monday, saying that he was "exercising his constitutional right." "I don't doubt his sincerity," Obama said of Kaepernick, before going on to say generating conversation on the topic was positive. The NFL regular season opens this week, and the 49ers are scheduled to host the Los Angeles Rams in a game on Monday, September 12. 49ers' coach Chip Kelly announced that Kaepernick would serve as the team's backup quarterback at that game. He is expected to continue to protest there. | Mid | [
0.612826603325415,
32.25,
20.375
] |
29 P.3d 680 (2001) 2001 UT App 228 STATE of Utah, Plaintiff and Appellee, v. Rodger VANCLEAVE, Defendant and Appellant. No. 980210-CA. Court of Appeals of Utah. July 19, 2001. *682 Margaret P. Lindsay, Aldrich, Nelson, Weight & Esplin, Provo, for Appellant. Mark L. Shurtleff, Atty. Gen., and Joanne C. Slotnik, Asst. Atty. Gen., Salt Lake City, for Appellee. Before Judges BENCH, BILLINGS, and THORNE. OPINION THORNE, Judge: ¶ 1 Defendant Rodger Vancleave appeals from his convictions for possession of a clandestine drug lab, a first degree felony; possession of a dangerous weapon by a restricted person, a second degree felony; possession or use of drug paraphernalia in a drug free zone, a class A misdemeanor; carrying a loaded firearm in a motor vehicle, a class B misdemeanor; and speeding, a class C misdemeanor. We affirm. BACKGROUND ¶ 2 The underlying facts of this matter are not in dispute. On March 17, 1997, Deputy David Knowles of the Utah County Sheriff's Office, while on routine traffic patrol, stopped defendant for speeding. During the stop, the deputy discovered that defendant was the subject of an outstanding felony warrant. Subsequently, the deputy arrested defendant and searched his vehicle. During the search, the deputy discovered the materials necessary to construct a methamphetamine lab, a fully loaded .357 magnum, a full box of .357 shells, a partially burnt marijuana cigarette, and broken glass covered with methamphetamine residue. As a result, defendant was charged with possession of a clandestine drug lab and six other drug and firearm related crimes. ¶ 3 On April 14, 1997, the trial court appointed Mr. Steve Killpack to represent defendant. On April 21, June 12, and August 18, defendant petitioned the trial court to remove Mr. Killpack.[1] The trial court denied each of defendant's motions and on each occasion asked defendant if he would prefer to represent himself. Each time, after a brief dialogue with the court, defendant chose to retain Mr. Killpack as counsel. However, defendant consistently maintained that Mr. Killpack's refusal to follow his instructions, as well as his refusal to file certain motions, amounted to Mr. Killpack's failure to fully represent defendant. Defendant also submitted several pro se motions[2] without consulting Mr. Killpack, despite the trial courts instruction that all motions and argument should flow through Mr. Killpack. ¶ 4 Finally, on the morning of defendant's trial, and following defendant's repeated refusal to comply with the court's instructions, the trial court asked defendant to choose between representing himself or accepting the representation of Mr. Killpack. Following *683 a brief exchange with the court, defendant chose to represent himself. The trial court cautioned defendant as to the wisdom of this choice; however, the trial court accepted defendant's decision and retained Mr. Killpack in an advisory role. Ultimately, the jury convicted defendant of five of the seven charges. He now appeals. ISSUE AND STANDARD OF REVIEW ¶ 5 Defendant's sole argument on appeal is that he did not intelligently and voluntarily waive his right to counsel at trial. "[T]he question of whether a defendant knowingly, intelligently, and voluntarily waives the right to counsel is `highly fact dependant, and the fact patterns are quite variable.'" State v. McDonald, 922 P.2d 776, 781 (Utah Ct.App.1996) (citation omitted). However, the right to counsel is constitutionally protected, see id., therefore, "[w]hether a waiver of counsel was made knowingly and intelligently is a mixed question of law and fact." State v. Heaton, 958 P.2d 911, 914 (Utah 1998). Thus, we review the trial court's factual findings for clear error, and its legal conclusions for correctness. See State v. Tenney, 913 P.2d 750, 753 (Utah Ct.App.1996). ANALYSIS ¶ 6 Under these circumstances, we must first examine whether the trial court properly discharged its duty to inquire following defendant's motions to remove Mr. Killpack. See State v. Valencia, 2001 UT App 159, ¶ 13, 421 Utah Adv. Rep. 11. We then must determine whether the trial court properly determined that good cause did not exist to require the appointment of substitute counsel. See id. at ¶ 14, 27 P.3d 573. Finally, we examine whether defendant properly waived his right to counsel. See id. at ¶ 19, 27 P.3d 573. I. The Trial Court's Duty to Inquire ¶ 7 "[T]he trial court has a duty to `make some reasonable, non-suggestive efforts to determine the nature of [a] defendant's complaints' before deciding whether good cause [to appoint] substitute counsel exists." Id. at ¶ 13, 27 P.3d 573 (citation omitted). In the instant case, defendant petitioned the court to remove Mr. Killpack on at least three separate occasions: once expressing an interest in retaining counsel from out-of-state, and thereafter expressing his dissatisfaction with Mr. Killpack's services. ¶ 8 The trial court, in an effort to fully investigate defendant's claims, asked defendant to explain the reasons underlying his dissatisfaction, thereby attempting to explore the substance of defendant's complaint before denying his request. See State v. Vessey, 967 P.2d 960, 962-64 (Utah Ct.App. 1998). Additionally, the trial court explained to defendant that if he could show a true conflict of interest existed with Mr. Killpack, defendant would then be entitled to substitute appointed counsel. Accordingly, while the trial court's inquiry is not a model of clarity, we conclude that the trial court sufficiently discharged its duty to inquire. II. Good Cause for Substitute Counsel ¶ 9 Next, we would normally determine whether defendant presented the trial court with sufficient information to establish the good cause necessary to trigger the appointment of substitute counsel. See Valencia, 2001 UT App 159 at ¶ 14, 27 P.3d 573. "It is well established that to warrant substitution of counsel, a defendant `must show good cause, such as a conflict of interest, a complete breakdown in communication or an irreconcilable conflict which leads to an apparently unjust verdict.'" State v. Lovell, 1999 UT 40, ¶ 31, 984 P.2d 382 (quoting United States v. Young, 482 F.2d 993, 995 (5th Cir. 1973) (citation omitted)). However, defendant does not challenge the trial court's denial of his motion for substitute counsel; therefore, we assume that the trial court's determination was correct. See State v. Rodriguez, 841 P.2d 1228, 1229 (Utah Ct.App.1992)(holding that, "[i]n general, if a defendant has not raised an issue on appeal, we may not consider the issue sua sponte"). Accordingly, we are left to examine whether defendant properly waived his right to counsel. *684 III. Waiver of the Sixth Amendment Right to Counsel ¶ 10 The Sixth Amendment guarantees both a defendant's right to representation by counsel, including the right to appointed counsel, and the right to proceed pro se. See State v. Heaton, 958 P.2d 911, 917. When faced with a defendant who is unwilling to "proceed to trial with appointed counsel or insists on proceeding pro se," a trial court must balance the defendant's right to counsel with his right to represent himself. Id. However, a trial court also "must honor a defendant's choice of self-representation unless the court finds that the [defendant's] waiver was not [made] knowing[ly], intelligent[ly,] and voluntary[ly]." State v. McDonald, 922 P.2d 776, 779 (internal citations omitted). Therefore, we have recommended that trial court[s] conduct an on-the-record colloquy with the accused [during] which the court should fully inform the accused "of the dangers and disadvantages of self-representation, so that the record will establish that he knows what he is doing and his choice is made with eyes open." State v. Bakalov, 1999 UT 45, ¶ 23, 979 P.2d 799 (quoting State v. Frampton, 737 P.2d 183, 187 (Utah 1987)). "[I]n the absence of such a colloquy, this court will look at the record and make a de novo determination regarding the validity of the defendant's waiver only in extraordinary circumstances." Heaton, 958 P.2d at 918. ¶ 11 In the present matter, defendant concedes that a colloquy took place. Thus, we are left to determine whether defendant's waiver of counsel was made both intelligently and voluntarily.[3] ¶ 12 Defendant first argues that his waiver was not voluntary because the trial court refused to appoint substitute counsel. In the context of a defendant's decision to waive the right to counsel, we have defined voluntary to mean "`free from official coercion, even if not free from the influence of a mental disorder.'" McDonald, 922 P.2d at 779 (quoting State v. Drobel, 815 P.2d 724, 732 n. 11 (Utah Ct.App.1991)). Moreover, as our supreme court stated in Bakalov, "`"[a] defendant may be asked, in the interest of orderly procedures, to choose between waiver [of counsel] and another course of action as long as the choice presented to him is not constitutionally offensive."'" Bakalov, 1999 UT 45 at ¶ 17, 979 P.2d 799 (alteration in original) (quoting Frampton, 737 P.2d at 187 (quoting United States v. Davis, 604 F.2d 474, 485 (7th Cir.1979))). ¶ 13 Defendant's fundamental argument is that, in forcing him to choose between Mr. Killpack's representation or representing himself, the trial court forced him to waive his right to counsel. We disagree. In Bakalov, the Utah Supreme Court addressed a similar argument. There, the trial court assigned the defendant a competent, conflict-free counsel with whom defendant refused to cooperate. See id. at ¶ 18, 979 P.2d 799. The defendant demanded that counsel "strictly follow tactics dictated" by him, and, after counsel refused, the defendant repeatedly demanded that the trial court assign substitute counsel.[4]Id. As a result, the trial court "presented defendant with the choice of either accepting representation" from appointed counsel or proceeding pro se. Id. at ¶ 19, 979 P.2d 799. ¶ 14 On appeal, the supreme court explained that so long as no good cause exists to justify a change in attorneys, a defendant is "`not entitled to pick and choose' his court-appointed counsel `by either the process of an affirmative demand or the selective elimination of other attorneys.'" Id. at ¶ 20, 979 P.2d 799. The court determined that Bakalov had failed to demonstrate the good cause required to trigger the right to substitute appointed counsel, therefore, the trial court was not required to appoint substitute counsel. See id. Accordingly, the court concluded "the options offered defendant[,proceeding pro se or accepting the representation of *685 appointed counsel,] were constitutionally permissible." Id. at ¶ 19, 979 P.2d 799. ¶ 15 Here, the trial court assigned Mr. Killpack to represent defendant throughout the proceedings.[5] However, from the outset, defendant refused to cooperate with Mr. Killpack, attempted to force Mr. Killpack to adopt defendant's tactics, and repeatedly insisted that the trial court appoint substitute counsel more amenable to defendant's demands. The trial court, after explaining what circumstances would trigger defendant's right to substitute counsel, denied each of his motions. Defendant, however, continued to demand the removal of Mr. Killpack. Finally, on the morning of trial, following a review of yet another series of pro se motions, the trial court presented defendant with two options: (1) accept Mr. Killpack as his attorney of record, or (2) represent himself. ¶ 16 While it is clear that "[a] defendant cannot be forced to proceed with incompetent counsel or counsel having a conflict of interests," Bakalov, 1999 UT 45 at ¶ 20, 979 P.2d 799, defendant has failed to "contest [either] the qualifications or impartiality" of Mr. Killpack. Id. Defendant instead argues that the trial court failed to ask defendant whether his waiver was voluntary, thus coercing his waiver. However, whether or not the trial court asked defendant if his choice was voluntary is not the critical issue, rather we concentrate on whether the trial court presented defendant with constitutionally permissible options. Here, defendant refused to cooperate with Mr. Killpack and continually demanded that the trial court appoint substitute counsel. Upon review, we agree with the trial court's determination that defendant failed to demonstrate the good cause required to trigger his right to substitute appointed counsel. Thus, the trial court properly denied defendant's request for substitute appointed counsel, and consequently the trial court did not err in presenting defendant with the choice of retaining competent, conflict-free counsel or self-representation. Accordingly, we conclude that defendant's waiver of counsel was voluntary and free from official coercion. ¶ 17 Defendant next argues that he did not intelligently waive his right to counsel because the trial court failed to fully inform him of the risks associated with self-representation.[6] When a defendant voices a desire to waive his right to counsel, a trial court must; (1) advise the defendant of his constitutional right to the assistance of counsel, as well as his constitutional right to represent himself; (2) ascertain that the defendant possesses the intelligence and capacity to understand and appreciate the consequences of the decision to represent himself, including the expectation that the defendant will comply with the technical rules and the recognition that presenting a defense is not just a matter of telling one's story; and (3) ascertain that the defendant comprehends the nature of the charges and proceedings, and any additional facts necessary to a broad understanding of the case. Heaton, 958 P.2d at 918.[7] Further, "`[t]he ultimate test is not the trial court's express advice, but rather the defendant's understanding.'" McDonald, 922 P.2d at 779 (quoting Fitzpatrick v. Wainwright, 800 F.2d 1057, 1065 (11th Cir.1986)). Therefore, we *686 examine the record to determine if defendant fully understood the implications of his decision, and thus, made his choice with his eyes open. See Bakalov, 1999 UT 45 at ¶ 23, 979 P.2d 799. ¶ 18 First, on April 21, 1997, while discussing defendant's difficulty with Mr. Killpack, the trial court informed defendant that[8] it is your right to counsel we're dealing with, and if you either want to waive that right and proceed on your own today, or if you want to have another attorney, then I'm going to have to decide whether or not we'll interrupt this proceeding at this point. The trial court then added, "if you want to waive your right to counsel, I can let you do that." In response, defendant stated clearly and unambiguously, "No, sir, I do not wish to waive my right." Accordingly, we conclude that the trial court adequately informed defendant of his rights relative to counsel, and that defendant clearly understood those rights. ¶ 19 The trial court also repeatedly explored with defendant the nature of the charges against him and the possible penalties defendant faced. For example, on April 21, 1997, the following dialogue occurred: THE COURT: I sense you don't understand what we're doing, and it concerns me. MR. VANCLEAVE: I do understand what we're doing, and I'm concerned whether I'm going to spend five to life in the State prison on a presumption. Then, on June 12, 1997, the trial court had the following exchange with defendant: MR. VANCLEAVE: I'm fixing to go on trial for five to life, and I don't even have a defense. THE COURT: It's my understanding, Mr. Ro[d]ger VanCleave, at each and every stage of these proceedings I have attempted to appoint counsel for you, advising you that count I is a first degree felony, Count II is a first degree felony, Count III is a second degree felony, possession of a dangerous weapon by a restricted person. Count IV is possession or use of marijuana, a class A misdemeanor. Count V is a class A misdemeanor, Count VI is a loaded firearm in [motor] vehicle, a class B misdemeanor. Count VII is a misdemeanor, and that there's a motion to (inaudible) involved, and at each and every stage of these proceedings I have indicated to you, "You need counsel." MR. VANCLEAVE: Correct. THE COURT: And [on] each and every occasion, as I recall, you've simply complained about everything, and refused to have counsel and have represented yourself. .... THE COURT: I have appointed Mr. Steven Killpack as advisory counsel for you with the anticipation that you may ask him questions and procedural questions, but on these first degree felonies where you could spend the rest of your life in prison, Mr. VanCleave, my understanding was is [sic] that you don't trust legal counsel, you don't like legal counsel, and you're going to represent yourself. MR. VANCLEAVE: That's not true, your Honor. ¶ 20 Based on these exchanges, we have no difficulty concluding not only that defendant had a broad understanding of the court proceedings, the State's case, and the nature of the charges against him, but also that the trial court adequately explored this information to ensure defendant's understanding. ¶ 21 Finally, we must determine if the trial court "ascertain[ed] that the defendant possess[ed] the intelligence and capacity to understand and appreciate the consequences of the decision to represent himself, including the expectation that the defendant will comply with the technical rules and the *687 recognition that presenting a defense is not just a matter of telling one's story." Heaton, 958 P.2d at 918. Such a determination requires not only that the trial court conduct a thorough colloquy with defendant, but also that the court "carefully evaluate the accused's background, experience, and conduct insofar as they indicate what the accused understands in attempting to waive the right to counsel." Bakalov, 1999 UT 45 at ¶ 23, 979 P.2d 799. ¶ 22 Here, the trial court had ample opportunity to examine defendant's "background, experience and conduct" as indicators of his understanding concerning his right to waive counsel. Id. First, the trial court was aware of defendant's familiarity with the criminal justice system, including his status as a convicted felon. Second, in filing an array of pro se motions without the benefit of counsel,[9] defendant demonstrated a well developed knowledge of the criminal justice system, including the Utah Rules of Evidence and the Utah Rules of Criminal Procedure.[10] Third, defendant argued his position before the court, which indicated that he possessed the "intelligence and capacity to understand" the right he eventually chose to waive. Id. ¶ 23 Finally, on August 18, 1997, the morning of defendant's trial, the trial court engaged defendant in the following exchange concerning the responsibilities of self-representation: THE COURT: Now the next issue before the court and I will direct this, sir is whether or not you are representing yourself today with Stephen Killpack as advisory counsel, or whether he is the one that is going to conduct this trial and represent you and be an advocate for you and speak [on] your behalf and have opening argument [on] your behalf and cross-examine witnesses [on] your behalf. I will not allow both. I will allow you to make that election now, sir. You'll either represent yourself with Mr. Killpack being advisory counsel so you can ask him questions and ask him procedural questions, and consult him as often and frequently as you need during the course of the trial, or in the alternative he will represent you, and he will be the one that will be your advocate, speak [on] your behalf, make closing arguments [on] your behalf, and conduct the interrogation and cross-examination of witnesses. That is a critical issue before we proceed. .... MR. VANCLEAVE: I would like to represent myself, your Honor. THE COURT: Very well. If you choose to represent yourself, you will represent yourself. You will be the only spokesman for the defense. Mr. Killpack will not have the opportunity then to cross examine witnesses. He will not have the ability to call witnesses. He will not have the ability to make opening statements or closing arguments to this jury. But I will give you leave, during the course of the trial, when necessary, to consult with him on procedural matters and for clarification of matters and for the exhaustion of questions and cross-examination of witnesses. He will be advisory and consultant to you, and you may proceed to represent yourself. I don't recommend that. I've told you at all stages of this case that these are serious charges, and that I think your case is best served by having a seasoned expert, a seasoned advocate, a seasoned attorney such as Mr. Killpack to be your advocate in this case. That has been my recommendation at all stages. I don't depart from it now. But you have the right to represent yourself. *688 ¶ 24 This exchange clearly supports the State's position that the trial court explained the gravity of defendant's decision to defendant. It also clearly demonstrates that the trial court explained the responsibilities of presenting a defense to defendant, including a clear indication that presenting a defense requires more than merely telling one's own story. See Heaton, 958 P.2d at 918. Finally, the court's repeated reference to the procedural rules and its recommendation that defendant rely on Mr. Killpack for procedural questions supports the State's argument that defendant was informed of his duty to comply with the technical rules. ¶ 25 Therefore, we conclude that the trial court collected sufficient information about defendant's "background, experience and conduct" to determine that he was proceeding with his eyes open. Bakalov, 1999 UT 45 at ¶ 23, 979 P.2d 799. We also conclude that defendant understood the implications of waiving counsel, and therefore, the trial court properly determined that defendant intelligently waived his right to counsel. CONCLUSION ¶ 26 The trial court did not err in presenting defendant with the choice to proceed either pro se or with the assistance of appointed counsel. Therefore, defendant's waiver was not coerced, but was instead voluntary. We further conclude, based on defendant's background, demonstrated intelligence, and knowledge of the criminal justice system, as well as the trial court's ongoing colloquy with defendant, that defendant intelligently waived his right to counsel. ¶ 27 Accordingly, we affirm defendant's convictions. ¶ 28 WE CONCUR: RUSSELL W. BENCH, Judge, and JUDITH M. BILLINGS, Judge. NOTES [1] Defendant's initial request arose from his asserted desire to engage private defense counsel. All of defendant's subsequent motions to remove Mr. Killpack included requests for substitute appointed counsel and were predicated on defendant's claim that Mr. Killpack was not representing defendant's interests. [2] The trial court denied each of defendant's pro se motions. [3] Defendant does not argue that he unknowingly waived the right to counsel; therefore, we do not address this requirement. [4] Bakalov insisted that appointed counsel enter into no discussions concerning possible plea agreements, and in fact, have no contact with the district attorney prosecuting the case. See Bakalov, 1999 UT 45 at ¶ 18, 979 P.2d 799. [5] Because defendant does not appeal the trial court's denial of his motions to remove Mr. Killpack and does not allege that Mr. Killpack's representation was at any time ineffective, we assume that Mr. Killpack was both competent and conflict free. [6] "`Intelligent' in this context means `only that the defendant has been provided with adequate information on which to make his or her self-representation choice. Because such a choice is seldom, if ever, a wise one, "intelligent" does not carry that meaning here.'" State v. McDonald, 922 P.2d 776, 779 (Utah Ct.App.1996)(quoting State v. Drobel, 815 P.2d 724, 732 n. 11 (Utah Ct.App.1991)). [7] The supreme court has strongly recommended that trial courts address these elements using the colloquy set forth in State v. Frampton, 737 P.2d 183, 187 n. 12 (Utah 1987). See Bakalov, 1999 UT 45 at ¶¶ 23-24, 979 P.2d 799; Heaton, 958 P.2d at 918 n. 5; see also McDonald, 922 P.2d at 783 (wherein the Utah Court of Appeals makes a similar recommendation). However, we have yet to require courts to strictly adhere to this form, and decline to do so now. [8] The trial court entered into similar conversations with defendant on several subsequent occasions. [9] Included among the many pro se motions filed by defendant were a motion to suppress evidence, a motion to dismiss the charges, at least one discovery motion, and a motion requesting a bill of particulars. [10] Defendant's demonstrated knowledge, however, must be balanced with his statement to the trial court concerning his unfamiliarity with these rules. | Low | [
0.513833992094861,
32.5,
30.75
] |
54 Ill.2d 271 (1973) 296 N.E.2d 740 WILLIAM LLOYD ST. JOHN et al., Appellees, v. R.R. DONNELLEY & SONS CO., INC., Appellant. No. 45282. Supreme Court of Illinois. Opinion filed May 21, 1973. JACK E. HORSLEY and RICHARD F. RECORD, JR., of CRAIG & CRAIG, all of Mattoon, for appellant. RALPH D. GLENN of GLENN & LOGUE, of Mattoon, for appellees. Judgment affirmed. MR. JUSTICE WARD delivered the opinion of the court: William Lloyd St. John and his wife, Mary, the plaintiffs, brought an action for the wrongful death of their son, David, in the circuit court of Coles County against the defendant R.R. Donnelley & Sons Co., Inc., and other *272 persons. The first count of the complaint was brought under the Wrongful Death Act, and in the second count the plaintiffs charged that their son's death had been caused by the defendants' wilful violation of the Structural Work Act (Ill. Rev. Stat. 1967, ch. 48, pars. 60-69). Prior to trial, all the defendants save R.R. Donnelley & Sons Co. were dismissed from the action. The jury returned a verdict in favor of the defendant on the wrongful death count but gave a verdict for the plaintiffs for $42,000 on the count charging violation of the Structural Work Act. Upon the defendant's appeal the judgment was affirmed by the appellate court, with one judge dissenting. (5 Ill. App.3d 538.) We granted the defendant's petition for leave to appeal. David St. John was employed as a laborer by Campbell-Lowrie-Lautermilch Corporation, the general contractor for a new plant being built by the defendant. On July 21, 1967, David Swanson, a foreman of the general contractor, instructed certain of his employees to go to the roof of the plant, remove debris and stack runways, which had been used in moving carts filled with concrete across the roof. Each runway was constructed of four 2 x 4's, 8 to 10 feet long, which had been laid parallel and covered with 1 x 6's measuring about 36 to 42 inches long, placed across and secured at right angles to the 2 x 4's. There was about a one-inch separation between the 1 x 6's. Each runway weighed seventy to eighty pounds, and after being used they had been scattered about the roof. At the time of the incident we discuss, the roof was in the process of being covered with felt, tar, and gravel. The runways and debris were being removed to permit the completion of this roof-covering process. David St. John and James Edwards, at Swanson's direction, had begun to remove debris and stack runways. On the roof there were a number of openings designed to receive heating, ventilating and lighting equipment which *273 was to be later installed. The two men had stacked several runways near the edge of the roof, and had picked up another runway and were moving it toward the stack. Edwards was walking backwards. He took one or two steps, apparently looking over his shoulder, when he felt his partner's end of the runway drop. Not seeing St. John when he turned, Edwards dropped the runway and looked through the opening which had been exposed when the men picked up and moved the runway. He saw the body of St. John, who had fallen 32 feet to the freshly poured concrete floor of the plant. The runway, which Edwards said had debris on it, had not been attached to the part of the roof bordering the opening. The only question presented on this appeal is whether the Structural Work Act has application under the circumstances of this case. The first paragraph of section 1 of the Act (Ill. Rev. Stat. 1967, ch. 48, par. 60) is pertinent. It provides: "That all scaffolds, hoists, cranes, stays, ladders, supports, or other mechanical contrivances, erected or construed by any person, firm or corporation in this State for the use in the erection, repairing, alteration, removal or painting of any house, building, bridge, viaduct, or other structure, shall be erected and constructed, in a safe, suitable and proper manner, and shall be so erected and constructed, placed and operated as to give proper and adequate protection to the life and limb of any person or persons employed or engaged thereon, or passing under or by the same, and in such manner as to prevent the falling of any material that may be used or deposited thereon." The argument of the plaintiff is that the roof, intended to be a permanent part of the factory, when it was temporarily used to support the construction workers could properly be considered as a scaffold within the meaning of the Structural Work Act. The argument continues that the scaffold or support was not constructed in a safe manner because of the openings or holes in it, and *274 that the consequent dangerous condition was in violation of section 1 of the Act. The defendant acknowledges that this court in Louis v. Barenfanger, 39 Ill.2d 445, held that a permanent support was not, because of its permanent character, excluded from the Structural Work Act, but it contends that Barenfanger cannot be extended to the circumstances of this case. In Barenfanger the plaintiff sustained injuries when he fell while working on steel girders that formed an integral part of a building under construction. We held that a failure to provide scaffolding can be the basis of a cause of action under the Act and that a permanent structure, used as a stay or temporary support, was not, because of its permanent character, outside of the Act. We consider that the case here falls within the rationale of Barenfanger. It is clear that the rooftop was being temporarily used as a platform or support for St. John and Edwards. That the roof was intended to be a permanent part of the building is not relevant; it was being put to a temporary use as a scaffold and was within the Structural Work Act. This conclusion is consistent with the purpose of the Act, which is to provide protection to workmen engaged in extrahazardous work. (Schultz v. Henry Ericsson Co., 264 Ill. 156, 164.) Too, we observed in Barenfanger that this court in Gannon v. Chicago, Milwaukee, St. Paul and Pacific Ry. Co., 22 Ill.2d 305, 317, said in construing the Act: "* * * we must apply the legal axiom that the words of a statute should be construed to give effect to the legislative intention, which must be ascertained not only from the language of the entire act, but from the evil to be remedied and the object to be attained." We are not dissuaded from the conclusion that the circumstances here were within the Act by the defendant's citation of Crafton v. Lester B. Knight & Associates, 46 Ill.2d 533, *275 and McGinnis v. Cosmopolitan National Bank and Trust Co., 114 Ill. App.2d 113. In Crafton we held that a tractor which lurched and caused injury to the plaintiff could not be considered a "scaffold, hoist, crane, stay, ladder, or support." Nor, we said, could it be considered to fall within the "other mechanical contrivances" language of the Act. It is clear that the question presented here is completely dissimilar from the one we considered in Crafton. McGinnis involved an injury to a machine operator. There the plaintiff had heard her name called and the sound seemed to come from a hole in the floor which had been cut for the purpose of installing a dumb-waiter. She walked to the opening, leaned over a low barrier which had been placed about the opening and fell into a basement, injuring herself. The appellate court, with one judge dissenting, held that the Structural Work Act was not applicable. We would first note that the decision is not binding on this court. Second, the force of the holding, we consider, is somewhat diminished by the ground on which the majority acted in McGinnis. It appears from the opinion that the plaintiff had taken the position that the hole or the opening in the floor itself was a scaffold. The majority said: "* * * the plaintiff's position [is] that this hole in the floor is either a scaffold or a hoist or was so intended." (114 Ill. App.2d 113, 116.) The position of the plaintiff here is of course completely distinguishable. For the reasons given, the judgment of the appellate court is affirmed. Judgment affirmed. MR. JUSTICE DAVIS, specially concurring: I concur in the judgment herein, but not in the rationale used to reach this judgment. The majority opinion seems to hold that when the roof of a building is *276 "being temporarily used as a platform in support," it is a scaffold under the Scaffolding Act. Under this rationale it would appear logical, then, to say that since the rest of the building provides the support for the roof, the entire building is a scaffold, or that each internal floor is a scaffold as long as a workman is located on it. This broad application of the Scaffolding Act is not necessarily dictated by this court's decision in Louis v. Barenfanger (1968), 39 Ill.2d 445, which concerned the classification of steel girders as a scaffold. It would seem reasonable that at some point in time a building with four walls, several floors, and a roof should cease being a scaffold and become a building. The language of the majority opinion could be construed to say that this transition never takes place. I concur in the result reached by the majority in this case because a roof with unguarded holes for the later insertion of equipment is not a completed roof. On the facts of this case, the roof was being used as a scaffold for the purpose of inserting integral parts of the roof's structure. In my judgment, however, the circumstance does not warrant a holding that the roof in this case is a scaffold merely because it is "being temporarily used as a platform or support." | Low | [
0.5370741482965931,
33.5,
28.875
] |
Project Summary/Abstract Bipolar disorder (BD) is a devastating condition affecting many Veterans. Lithium and valproate are the drugs of choice for the manic phase of BD. While therapeutically effective, their mechanisms of action are not fully understood, and undesirable side effects are common. Lithium inhibits brain inositol monophosphatase (IMPase), thereby depleting the available pool of free inositol, and resulting in the correction of the manic phase of BD. Inositol synthase (IPS) is a key enzyme that regulates inositol levels by generating the precursor, inositol phosphate (IP). Our preliminary data demonstrate that rat brain IPS is up-regulated by chronic lithium treatment, which would have the same net effect as inositol depletion relative to inositol phosphate. We hypothesize that lithium and other mood stabilizers exert their therapeutic effects by up-regulating IPS expression, increasing the available inositol phosphate pool. This implies that the pathophysiological mechanism underlying BD is a disturbance in maintaining a proper balance in the ratio of free inositol to inositol phosphate pools. Our long-term objective is to define how mood stabilizers work, and to find common therapeutic targets in the pathophysiology of BD so new medications can be designed. Our specific aims are: 1) Determine the changes in abundance and activity of the newly-identified isoforms of IPS in brain regions after chronic lithium and valproate; 2) Determine the effects of lithium and valproate on IPS binding to clathrin and receptor-mediated endocytosis; 3) Establish the link between inositol metabolism and behavior in IPS-deficient mice; and 4) Identify drug-targetable convergent pathways for lithium, valproate and lamotirgine responsive genes. To accomplish Aim 1, IPS and its isoforms will be quantified in drug-treated rat brain regions by enzyme activity assay, Western blot, and Q-PCR methods. To accomplish Aim 2, brain IPS and its complexes will be analyzed by Western and mass spectral analyses. Effects on receptor-mediated endocytosis will be monitored by following transferrin receptor trafficking and fluorescence resonance energy transfer (FRET) analysis. For Aim 3, lithium and valproate treated and untreated IPS knock-out mice will be subjected to standardized behavioral tests and their brains assayed for key enzymes in inositol metabolism. Aim 4 will be addressed by microarray and pathway analyses to map and compare the chronic lithium, valproate and lamotrigine transcriptomes in human neuronal cell lines and in rat primary cortical neuronal cell cultures. Defining the mechanisms of lithium action on inositol metabolism in the brain from the perspective of IPS function may establish a direct connection between inositol regulation and behavior. Thus advancing our understanding of the pathophysiology of BD and disclosing new therapeutic targets for treating BD. PUBLIC HEALTH RELEVANCE: PROJECT NARRATIVE (Potential Relevance to Veterans' Health) Bipolar Disorder (BD) is a major clinical problem for Veterans, and there are many Iraq War Veterans treated by VA Psychiatry Service for lithium-resistant BD. To better manage these patients we must be able to identify common targets of mood-stabilizers so that future medications can be designed that have greater efficacy and fewer side effects. One way lithium can correct BD is by modulating brain inositol signal pathways. The brain maintains inositol (a sugar) homeostasis through three routes. Inositol phosphate synthase (IPS) is the only biosynthetic means of generating inositol from glucose. IPS is a new target linked to the genesis of BD. Stimulators of brain IPS enzyme which will then cause the generation of inositol inside the human brain, can be considered as an important new class of mood stabilizing medications. The results from these studies will provide a highly positive impact on the health of Veterans with BD. | Mid | [
0.6341463414634141,
35.75,
20.625
] |
Reading in a dream is a generally favorable omen signifying progress. If you were reading aloud, it predicts help from outside sources; to hear someone else read foretells future comfort and peace of mind. | Low | [
0.536480686695278,
31.25,
27
] |
1. Field of the Invention The present invention relates to extendable shades and screens and more particularly to dual window shades, one serving as a decorative curtain and the other for light and privacy control. 2. Description of the Prior Art A roller mounted window shade with a dual acting clutch and a pull cord or chain actuator is shown in U.S. Pat. No. 4,372,432. A dual acting clutch mechanism is shown in U.S. Pat. No. 4,433,765. | Low | [
0.502164502164502,
29,
28.75
] |
Enjoy $300 as a new Chase checking customer, when you open a Chase Premier Plus CheckingSM account and set up direct deposit. This is our recommended Checking account for the added benefits. Full Review Get up to $350 when you open a new Chase Total Checking® account with Direct Deposit and/or open a new Chase SavingsSM account, deposit $10,000 or more in new money and maintain a $10,000 balance for 90 days. Full Review Earn $200 when you open a new Chase Total Business Checking® account, deposit $1,000 in new money within 10 business days of account opening, maintain that balance for 60 days and complete five qualifying transactions within 60 days. Full Review Open a new TD Bank Premier CheckingSM account online to earn a $300 bonus. Or, open a new TD Bank Convenience CheckingSM account online to earn a $150 bonus. Both offers have a direct deposit requirement. Full Review Apply for the Barclaycard Arrival Plus® World Elite Mastercard® and earn 40,000 bonus miles after you spend $3,000 on purchases in the first 90 days. This is one of the best credit card bonuses for a travel card. Full Review Open an online Money Market Account from CIT Bank (available nationwide) and earn a 1.75% APY rate on all balances. There’s no monthly service charge and the minimum opening deposit is just $100. Full Review Sandy Spring Bank $150 Checking Account Bonus [DC, MD, VA Residents] By: Tony Phan | Last Updated: February 27, 2018 | This content is not provided or commissioned by the issuer. Opinions expressed here are author’s alone, not those of the issuer, and have not been reviewed, approved or otherwise endorsed by the issuer. This site may be compensated through the issuer’s Affiliate Program. Please visit our Advertiser Disclosure for additional details. Sandy Spring Bank Checking and Savings accounts sign-up bonuses and promotions can be found here. Established in 1900 and headquartered in Olney, Maryland, Sandy Spring Bank has grown to over 45 branch locations across the District of Columbia, Maryland and Virginia. If you’re not a resident of these regions, see our Bank Bonus Page for other suitable offers. How To Earn The $150 Bonus Open a new My Free Banking account online, or bring in the bonus certificate to a nearby branch. You can also open over the phone. Enroll in eStatements Make a direct deposit within 90 days of opening the checking account. Minimum direct deposit to qualify is $250 within 90 days of opening the account from a paycheck, pension, social security or other regular monthly income electronically deposited. Bonus will be deposited within 30 days of the end of the 4th statement cycle, into the checking account meeting the Bonus requirements, to accounts in good standing The Fine Print Limited time offer available only to individuals who currently do not have a personal checking account with Sandy Spring Bank or have not had one within the last 90 days. Offer subject to change and cancellation without notice, and is not transferable. Only one Bonus per individual. Bonus will be deposited within 125 days of account opening, into the checking account meeting the Bonus requirements, to accounts in good standing. Earn a $200 bonus when you open a new Chase Total Checking® account and set up direct deposit. Also earn a $150 bonus when you open a new Chase SavingsSM account, deposit a total of $10,000 or more in new money within 10 days & maintain a $10,000 balance for 90 days. Apply for both offers and get a $350 total bonus. Full Review Get $300 when you open a new Chase Premier Plus CheckingSM account and set up direct deposit. This account has more features than the Chase Total Checking® and the monthly service fee can be waived with a few different requirement options. A $300 Checking bonus is one of the best offers from Chase Bank. Full Review Earn $200 when you open a new Chase Total Business Checking® account, deposit $1,000 in new money within 10 business days of account opening, maintain that balance for 60 days and complete five qualifying transactions within 60 days. This is the most popular Business Checking offer.Full Review Apply for the Barclaycard Arrival Plus® World Elite Mastercard® and earn 40,000 bonus miles after you spend $3,000 on purchases in the first 90 days. These 40K bonus miles are worth $420 in travel redemption. This is one of the best credit card bonus offers for a travel credit card. Full Review Apply online for a new TD Bank Checking account to earn either a $300 bonus for the TD Premier Checking account ( $2,500 in direct deposits required), or a $150 bonus for the TD Convenience Checking account ($500 in direct deposits required). This is a limited time offer. Full Review CIT Bank is offering a 1.75% APY rate with their Money Market Account for all balances. This account is available online nationwide and consistently offers one of the best rates in the nation. The minimum opening deposit is $100 and there are no fees for opening or maintaining the account. Full Review Ally Invest has a promotion where you can earn either 90 days of commission-free trades or a $200 cash bonus. The $200 bonus will require a deposit of at least $25,000 within 15 days of account opening and the execution of 3 trades within 90 days. The free trades offer will require a $10,000 minimum deposit. Full Review Simple Bank has an offer where you can earn a $20 bonus after opening their free online Checking account that's available nationwide. You'll then be able to earn unlimited $20 referral bonuses. Direct deposit isn't a requirement and all you and your referrals need to do is open a new account and use the Simple Visa debit card to make a first purchase. Full Review Apply for the Barclaycard Arrival Plus® World Elite Mastercard® and earn 40,000 bonus miles after you spend $3,000 on purchases in the first 90 days. This is one of the best credit card bonus offers for a travel credit card. Get up to $350 when you open a new Chase Total Checking® account with Direct Deposit and/or open a new Chase SavingsSMaccount, deposit $10,000 or more in new money and maintain a $10,000 balance for 90 days. About Tony Phan *These responses are not provided or commissioned by the bank advertiser. Responses have not been reviewed, approved or otherwise endorsed by the bank advertiser. It is not the bank advertiser's responsibility to ensure all posts and/or questions are answered. Get Email Updates! E-Mail Address Enjoy $300 as a new Chase checking customer, when you open a Chase Premier Plus CheckingSM account and set up direct deposit. This is our recommended Checking account for the added benefits. Full Review Get up to $350 when you open a new Chase Total Checking® account with Direct Deposit and/or open a new Chase SavingsSM account, deposit $10,000 or more in new money and maintain a $10,000 balance for 90 days. Full Review Earn $200 when you open a new Chase Total Business Checking® account, deposit $1,000 in new money within 10 business days of account opening, maintain that balance for 60 days and complete five qualifying transactions within 60 days. Full Review Open a new TD Bank Premier CheckingSM account online to earn a $300 bonus. Or, open a new TD Bank Convenience CheckingSM account online to earn a $150 bonus. Both offers have a direct deposit requirement. Full Review Apply for the Barclaycard Arrival Plus® World Elite Mastercard® and earn 40,000 bonus miles after you spend $3,000 on purchases in the first 90 days. This is one of the best credit card bonuses for a travel card. Full Review Open an online Money Market Account from CIT Bank (available nationwide) and earn a 1.75% APY rate on all balances. There’s no monthly service charge and the minimum opening deposit is just $100. Full Review *Advertiser Disclosure: The credit card and banking offers that appear on this site are from credit card and banking companies from which MoneysMyLife.com receives compensation. This compensation may impact how and where products appear on this site (including, for example, the order in which they appear). MoneysMyLife.com does not include all credit card and banking companies or all available credit card and banking offers. • This content is not provided or commissioned by the bank advertiser. Opinions expressed here are author’s alone, not those of the bank advertiser, and have not been reviewed, approved or otherwise endorsed by the bank advertiser. This site may be compensated through the bank advertiser Affiliate Program. | Low | [
0.515555555555555,
29,
27.25
] |
Techniques of early respiratory management of very low and extremely low birth weight infants. The generalized anatomic and physiologic immaturity of preterm infants of very low birth weight (VLBW) (<or=1,500 g) and extremely low birth weight (ELBW) (<or=1,000 g) places them at high risk for death or associated negative sequelae, including chronic lung disease of infancy (CLDI). The standard treatment for pulmonary immaturity, mechanical ventilation (MV) at birth, can lead to barotrauma, volutrauma, pulmonary edema, infection, and inflammation. To minimize these negative outcomes, multiple treatment strategies have been proposed and evaluated as to their subsequent clinical course. This article compares, contrasts, and integrates the use of MV, nasal continuous positive airway pressure (NCPAP), and surfactant administration to encourage and support consideration of their use in the VLBW and ELBW population. Supporting a reduction of the use of MV in favor of NCPAP is safe and recommended because this practice is likely to decrease the probable sequelae of CLDI while permitting an individualized approach. | Mid | [
0.645476772616136,
33,
18.125
] |
How do I change the URL/web address for my corporate page? Support Team - November 27, 2015 09:07 Have you noticed that your default corporate page link is quite long? You can create a shorter link (or URL) from your corporate admin dashboard - something easier to remember and nicer to use on printed or online materials. This is called a vanity URL. Want one? Login to your account and follow these steps: Click 'Profile' from the admin menu Type in the name for your URL Scroll to the bottom of the page - click 'update' to save your changes. | Low | [
0.525,
28.875,
26.125
] |
76 Wis.2d 286 (1977) 251 N.W.2d 196 IN INTEREST OF D. H.: D. H., Plaintiff in error, v. STATE, Defendant in error. No. 75-257. Supreme Court of Wisconsin. Argued December 2, 1976. Decided March 1, 1977. *289 For the plaintiff in error there were briefs and oral argument by Howard B. Eisenberg, state public defender. For the defendant in error the cause was argued by James H. McDermott, assistant attorney general, with whom on the brief was Bronson C. La Follette, attorney general. ABRAHAMSON, J. The order reviewed in this case was entered by the circuit court affirming an order of the county court waiving juvenile jurisdiction over D. H., a juvenile. On February 17, 1975, a "Petition for Determination of Status" was filed with the Kenosha County Juvenile Court alleging that D. H. was delinquent in that he had violated secs. 943.32(1) (b) and 939.05, Stats., which define the offense of being a party to the crime of robbery. The Petition for Determination of Status recites that at approximately 7:20 p.m. on February 13, 1975, D. H. and three others, two of whom were then over the *290 age of eighteen, drove to Fasulo's Grocery, located in the city and county of Kenosha; that D. H. and two of the others entered the store, leaving one person to wait in the car; that D. H. stated to Sam Fasulo, owner of the store, that "my friend has a gun in his pocket, so give me the money;" that Fasulo asked to see the gun, whereupon D. H. stated to Fasulo "Give me your money or I'll bust you in the mouth, and don't push any buttons;" and that Fasulo then directed an employee to hand over to D. H. currency contained in the cash register. D. H. took the money, which amounted to $35, and the group then returned to the car. The petition further alleges that D. H.'s date of birth is December 1, 1958, which would make his age at the time of the alleged offense (and the filing of the Petition for Determination of Status) sixteen years and two and one-half months. He turned eighteen on December 1, 1976. A "Petition for Waiver" was also filed on February 17, 1975, alleging that "it would be contrary to the best interests of the child or of the public to dispose of the issues in the juvenile court," and praying for an order waiving juvenile jurisdiction over D. H. and referring the matter to the district attorney for appropriate further proceedings. Other than the phrase just quoted the petition for waiver does not specify any reasons why waiver of jurisdiction was being sought. On that same day, February 17, 1975, a hearing was held on the waiver petition before the juvenile court. Present were an assistant district attorney, D. H., D. H.'s mother, and D. H.'s court-appointed counsel. The assistant district attorney and counsel for D. H. argued very briefly their respective positions on the waiver question, but no testimony was taken. D. H.'s counsel informed the court that he had been informed that D. H. had no prior criminal or juvenile record and that he was unemployed. D. H.'s mother told the court that D. H. had dropped out of school, apparently only a short time before the alleged robbery, and that he spent most of his time at home. *291 The juvenile court ruled from the bench that it would grant the petition to waive jurisdiction over D. H. The court mentioned the following factors in announcing its decision: (1) D. H. was not going to school and was unemployed. (2) The offense charged was a serious one, carrying a maximum possible sentence of ten years' imprisonment. (3) D. H. allegedly acted in concert with adults over the age of eighteen. (4) The time remaining for juvenile jurisdiction, approximately one year and ten months, was insufficient to be commensurate with the conduct alleged in the Petition for Determination of Status which had "all of the characteristics of adult criminal conduct," in the court's view. The court stated that for the purpose at hand it was required to assume that the allegations of the petition setting forth the crime were true. A written "Order Granting Petition for Waiver" was entered on February 17, 1975, in which the court found that "the best interests of the minor (and/or of the public) will be best served for the court to waive jurisdiction," and set forth as the basis for this finding factors (1) through (3) listed above and "other reasons more specifically stated on the record." This order was appealed to the circuit court pursuant to sec. 48.47, Stats. On March 14, 1975, the circuit court rendered its memorandum decision affirming the order waiving juvenile jurisdiction over D. H., and on March 18, 1975, an order of affirmance was entered. This is the order presently here for review. Three issues are presented: 1. This court's jurisdiction over the appeal: A. Was the order of the juvenile court waiving jurisdiction over D. H. appealable to the circuit court under sec. 48.47, Stats.?; and *292 B. Was the circuit court's order affirming the county court's order appealable to this court? 2. The procedure at the waiver hearing: A. Did the petition filed with the juvenile court seeking waiver of juvenile jurisdiction allege sufficient facts to support such a request and to comply with due process of law?; and B. Was the prosecutor required to adduce competent, admissible evidence at the waiver hearing to support the petition for waiver of juvenile jurisdiction? 3. The merits of the decision on waiver: Did the juvenile court abuse its discretion in waiving its jurisdiction? JURISDICTION The transfer of the juvenile to the adult criminal process is a grave step, and there should be a way for the juvenile to obtain immediate review of the decision. In Wisconsin the order waiving juvenile jurisdiction is entered pursuant to sec. 48.18, Stats.: "... Except as provided in s. 48.17, the criminal and civil courts shall have jurisdiction over a child 16 or older who is alleged to have violated a state law or a county or municipal ordinance only if the juvenile court judge deems it contrary to the best interest of such child or of the public to hear the case and enters an order waiving his jurisdiction and referring the matter to the district attorney, corporation counsel or city attorney, for appropriate proceedings in a criminal or civil court. In that event, the district attorney, corporation counsel or city attorney of the county or municipality shall proceed with the case in the same manner as though the jurisdiction of the juvenile court had never attached." The right to appeal from proceedings in the juvenile court is governed by sec. 48.47, Stats.: "... Any person aggrieved by an adjudication of the county court under this chapter and directly affected thereby has the right to appeal to the circuit court of *293 the same county within 40 days of the entry of the order in the manner in which appeals are taken from judgments in civil actions. No undertaking shall be required on such appeal. The order of the county court shall stand, pending the determination of the appeal, but the circuit court may upon application stay such order. The appeal shall be on the record which the county court shall make and keep of the entire proceedings. Appeal from an order granting or denying an adoption under s. 879.27 and from any county court review under s. 48.64 (4) (c) shall be to the supreme court." [1] An order entered in waiver proceedings might fit within sec. 48.47, Stats., as an order of the juvenile court, rather than the judge, and might fit within the general concept of adjudication, but not altogether comfortably. And, although we night further hold that the circuit court's order was appealable to this court under sec. 274.33, Stats. (now renumbered sec. 817.33, Stats.), this appellate route is not an adequate remedy. In order for a child to be waived from juvenile to adult court he must have attained the age of sixteen. Sec. 48.18, Stats. Thus in waiver situations, we are dealing with children who are between the ages of sixteen and eighteen. If all the steps for an appeal to this court are complied with, it is likely that from the time of the determination of waiver until this court's hearing of the case, at least two years will elapse. In this case the alleged offense took place on February 13, 1975; the waiver was ordered on February 17, 1975; the circuit court decision on waiver was made on March 14, 1975. The case was argued in this court on December 2, 1976. D. H. was sixteen years, two and one-half months old when the alleged offense was committed and when he was first brought to juvenile court. This case moved along promptly on the over-crowded appellate docket. Yet D. H. was eighteen years of age on December 1, 1976, the day before the case was argued here. Thus if *294 this court would find the waiver improper, D. H. is now over eighteen years of age. This court has reviewed juvenile waiver proceedings on review of a subsequent criminal conviction. Mikulovsky v. State, 54 Wis.2d 699, 196 N.W.2d 748 (1972). However, this remedy also is unacceptable due to the delays which are at present inevitable in the appellate process, and for the additional reason that once the child has been subject to trial as an adult, the confidentiality associated with juvenile proceedings has been irreparably lost. See State ex rel. Koopman v. County Court, 38 Wis.2d 492, 157 N.W.2d 623 (1968). [2] We therefore believe that even if we could find that the statutes provide an appeal via secs. 48.47 and 274.33, this appeal route is not adequate under present circumstances. Review in cases where the juvenile court has waived jurisdiction must be speedy and efficient. Legislation could establish the necessary procedures but it does not. "When an adequate remedy or forum does not exist to resolve disputes or provide due process, the courts, under the Wisconsin Constitution, can fashion an adequate remedy."[1] In order to expedite court processes and to further justice, we fashion the following procedure to be followed (until the legislature provides otherwise) for review of *295 an order waiving juvenile court jurisdiction pursuant to sec. 48.18, Stats. 1. The juvenile has the right to appeal to the circuit court of the same county within forty days of the entry of the order in the manner in which appeals are taken from judgments in civil actions. The circuit court shall hear this appeal expeditiously. The appeal shall be on the record which the county court shall make and keep of the entire proceedings. No undertaking shall be required. 2. The order of the circuit court affirming the order granting waiver may be reviewed by the supreme court in its discretion upon the juvenile's application for a writ of prohibition. Wis. Const. art. VII, sec. 3.[2] The writ should be applied for within forty days of the entry of the order of the circuit court (see sec. 807.11, Stats.). If the writ is applied for, this court may determine whether the decision to waive juvenile jurisdiction constituted an abuse of discretion.[3] 3. Upon the taking of an appeal to circuit court or the filing with this court of an application for a writ of prohibition, the order of the county court shall stand pending the determination of review of the order, but the *296 circuit court or this court may upon application stay such order. [3] We consider this matter as properly before us. THE WAIVER HEARING: PROCEDURE D. H. raises two claims to challenge the procedural validity of the juvenile court's waiver of jurisdiction over his case. He contends that the petition he received was inadequate notice because it alleges no facts to support the waiver request, and, apparently, because it came too late to constitute effective notice. He also contends that the hearing was invalid in that no "competent evidence" was introduced thereat. [4] D. H. relies principally on Kent v. United States, 383 U.S. 541, 86 S. Ct. 1045, 16 L. Ed.2d 84 (1966). This court has observed that Kent "is a significant decision ... concerning the constitutional requirements of the juvenile waiver process," In re Interest of F.R.W., 61 Wis.2d 193, 202, 212 N.W.2d 130 (1973), and has relied on Kent for the proposition that "waiver of juvenile jurisdiction is a `critically important' portion of the criminal proceeding where a juvenile stands accused." Gibson v. State, 47 Wis.2d 810, 815, 177 N.W.2d 912 (1970). At the same time, the court has indicated that Kent did not render juvenile proceedings subject in all respects to the rules applicable to criminal prosecutions. Due process and fair treatment are required in both classes of proceedings, but the forms thereof need not be the same. In re D.M.D. v. State, 54 Wis.2d 313, 317, 318, 195 N.W.2d 594 (1972); J. K. v. State, 68 Wis.2d 426, 430, 431, 228 N.W. 713 (1975). Cf. State v. Gerard, 57 Wis.2d 611, 205 N.W.2d 374 (1973). "[T]he applicable due process standard in juvenile proceedings ... is *297 fundamental fairness." McKeiver v. Pennsylvania, 403 U.S. 528, 543, 91 Sup. Ct. 1976, 29 L. Ed.2d 647 (1971). [6] We believe that the basic requirements of fundamental fairness are that a hearing be held; that the child, the child's parent, guardian or other custodian, and the child's counsel be given notice of the charges against the child and the time, place and purpose of the waiver proceeding; that the juvenile be given assistance of counsel; that the juvenile's attorney be given access a reasonable time before the hearing to any reports or records regarding the juvenile considered by the court; that the juvenile be given the right to present evidence and cross-examine witnesses; and that the juvenile court not rely on secret information in making its decision and that the court state its reasons for concluding that waiver of jurisdiction is appropriate.[4] *298 In this case D. H. received two separate petitions, on the same day, and apparently at the same time, three days after his arrest. It is true that the "petition for waiver" provided only the bare information that waiver was being sought because "it would be contrary to the best interests of the child or the public to dispose of the issues in the juvenile court," with no indication of the nature of the charges against D. H. and with no indication of the reasons underlying the quoted conclusory statement. The accompanying "petition for determination of status" set forth the charge in great detail: The statute allegedly violated was specified; the events allegedly constituting the crime were recited at length; and the sources of the information upon which the petition was based were set forth. It is only reasonable to read the two petitions together, and so read, they clearly conveyed adequate notice of the charges against D. H., and the time, place and purpose of the proceeding. It would perhaps have been better to indicate the charges on the waiver petition itself, or to explicitly refer therein to the petition for determination of status. However, it does not appear that D. H. was or reasonably could have been misled by the failure to do so. D. H. appears to make a distinction between being informed of the crime with which he is charged and being informed of the reasons for which waiver is being sought. Although he cites no authority supporting a right to notice of the latter character, and the cases cited above (note 4, supra) do not speak in such terms, it may be that in some circumstances notice of reasons for waiver going beyond the nature of the immediate crime and the general statement of the statutory grounds for waiver should be given as a matter of fairness. For example, if the prosecutor had procured witnesses, records or reports for the purpose of proving prior behavioral problems or patterns of unlawful conduct of the juvenile, and intended to rely on these matters to justify waiver of *299 juvenile jurisdiction, it might be unfair to take the juvenile by surprise at the time of the hearing. However, no such factors were involved in the case at bar. Other than the nature of the alleged crime, of which D. H. was apprised, the only reason for waiver advocated by the prosecutor was the fact that D. H. had dropped out of school some two months before the incident in question. [7] Elsewhere in this opinion we enumerate certain factors deemed relevant to the waiver decision. It would no doubt be a commendable practice to notify the juvenile as to which factors are felt to justify waiver in his particular case. However, the enumerated considerations are principally a guide, which is nonexhaustive, for the exercise of the judge's discretion. They serve to mark out areas in which evidence and argument are relevant, and as such they are available to judge, prosecutor and defense counsel alike. In respect of notice they are as a general matter distinguishable from the nature of the charges, the time, place and purpose of the proceeding, and factual matters regarding the conduct of the juvenile. The test of the adequacy of notice is fairness. Under the circumstances of this case, we find that the content of the notice received by D. H. was adequate. It is contended that the fact that the petitions were not given to D. H. or to his counsel or to his parents until the day of the hearing rendered the notice inadequate and deprived him of the effective assistance of counsel. However, no continuance of the hearing was requested; nor did counsel make any claim of surprise or lack of opportunity to prepare. The record indicates that counsel was appointed on February 14, 1975, three days before the hearing occurred. Three days might under some circumstances be inadequate to prepare fully for a waiver hearing. However, it was certainly adequate time for counsel to ascertain the general nature of D. H.'s position by conferring with him and to prepare to the extent of knowing whether or not additional time for final preparation *300 was required. D. H.'s counsel indicated at the hearing that he was aware of the Kent decision; his failure to request additional time does not appear to be the product of ignorance or neglect. [8, 9] The granting of a continuance is a matter for the discretion of the court.[5] This court has indicated that failure to grant a continuance is not improper where no request therefor was made.[6] D. H.'s claims of inadequate notice must be rejected. D. H. claims that the waiver order herein is invalid due to the absence of "competent evidence" at the hearing. By "competent evidence" D. H. apparently means sworn testimony and documentary evidence that would be admissible under the rules of evidence. D. H. cites no direct support for this position.[7] *301 [10, 11] The trial judge should require that the information considered by him be trustworthy, and the judge should allow the juvenile a reasonable opportunity to demonstrate that information before him is inaccurate, unreliable, or the product of bias or animosity on the part of other persons. A juvenile has the right to present evidence himself showing that he is a suitable subject for retention in the juvenile system or contradicting information or evidence relied upon by the state. Moreover, where the judge receives material that would be inadmissible under the rules of evidence, and such material is claimed by the juvenile to be false, the court might, under such circumstances, require the proponent of the evidence to substantiate it with properly admissible evidence. [12] Testimony may of course be received at a waiver hearing, as it was in Mikulovsky v. State, 54 Wis.2d 699, 196 N.W.2d 748 (1972). A police officer there testified with respect to a statement given to him by the defendant. However, the court did not indicate that such testimony was required, and this court specifically rejected the contention that testimony of social workers was required to be heard on the question of a juvenile's prospects for rehabilitation and propensity for further crime. The court stated that there are situations in which such testimony is appropriate, but it is not mandatory in all cases. Mikulovsky, supra, 54 Wis.2d at 707, 708. None of this is to require, as D. H. appears to argue, that before a waiver may be effectuated the prosecution must in some manner prove up, by competent evidence in the strict legal sense, some sort of prima facie case for waiver of jurisdiction.[8] *302 [13] The decision whether to waive juvenile jurisdiction in a given case is one which the legislatures of this and many other states have committed to the sound discretion of *303 the juvenile court.[9] The proper exercise of discretion contemplates an informed determination reached by the demonstrated application of reason to facts and circumstances appearing in the record. Those facts and circumstances must be developed from reliable sources of information, but we are disinclined to impose upon the process a blanket requirement for formal proof. The juvenile court may inform itself in any manner it deems suitably reliable, subject to the juvenile's right to be advised of the information relied upon by the court, to supplement or contradict the information presented, to request that the court compel the state to produce as witnesses persons upon whose knowledge or opinion the state relies, and to test witnesses called by the state by cross-examination under oath. Several states that have dealt expressly by statute or rule of court with the matter of evidence at waiver hearings have similarly concluded that the application of rigid rules, including the rules of evidence, would be more likely to impair the juvenile court's ability to deal fairly with a particular problem than to lead to a just result.[10] *304 In the instant case D. H. was not prevented from offering evidence, information or argument to the court. It appears from the record that the court considered all materials presented to it, and did not rely on any information not presented in court and subject to challenge by the defense. The hearing could have been more thorough.[11] However, we think there was sufficient information before the court for the court to exercise its sound judicial discretion. We conclude that D. H.'s contentions grounded on the procedure by which juvenile jurisdiction was waived are without merit. ABUSE OF DISCRETION [14-16] Sec. 48.18, Stats., provides that the juvenile court may waive its jurisdiction when it appears that to retain jurisdiction would be "contrary to the best interest of such child or of the public."[12] This court, citing sec. *305 48.01 (3), Stats.,[13] has held that the best interest of the child must be considered paramount in a waiver determination. In re Interest of F.R.W., 61 Wis.2d 193, 201, 204, 208, 212 N.W.2d 130 (1973). This determination is addressed to the sound discretion of the juvenile court, but this court stands ready to determine whether the juvenile court judge properly exercised his discretion in waiving jurisdiction. This court, to give meaningful review, requires that a statement of the relevant facts and a statement of the reasons motivating waiver must be set forth carefully by the juvenile court judge. State v. Gibbs, 94 Ida. 908, 500 P.2d 209 (1972); Atkins v. State, 259 Ind. 596, 290 N.E.2d 441, 443 (1972). In Mikulovsky v. State, 54 Wis.2d 699, 704 (n. 3), 196 N.W.2d 748 (1972), and in In re Interest of F.R.W. v. State, 61 Wis.2d 193, 205, 212 N.W.2d 130 (1973), this court recognized that in Wisconsin the eight criteria set forth in Kent are relevant in determining whether to waive jurisdiction.[14] Sec. 48.01 (2), Stats.,[15] directs the *306 judge's attention to various considerations as they may bear on the interests of the child. Among them are the *307 consideration of each case on its individual merits, eliminating unnecessary separation from parents, adequate care and rehabilitation for those children who must be separated from their parents, and maximizing the development of the child and controlling influences detrimental to him.[16] [17] In the case at bar the juvenile court did touch upon a number of the Kent criteria. The court's statement at the hearing indicates that the court rightly considered a robbery, obviously premeditated, by three persons in concert, to be a serious offense. The court considered that two of D. H.'s companions were adults.[17] Though no *308 actual violence occurred, the alleged crime was certainly aggressive in its nature, and the complaint does reveal that D. H. was a prime actor in its commission; D. H. personally acted in a highly threatening manner toward the proprietor of the grocery store. It would appear from the record that the case has prosecutive merit. In short, factors relating to the seriousness of the alleged crime and the public interest in being protected from such crimes are present and support the decision to waive juvenile jurisdiction. The court appears to have given somebut not a great deal ofconcern to the other side of the balance, namely, the welfare and possible rehabilitation of the juvenile before it. The judge was informed that D. H. apparently had no prior criminal or juvenile record and that his parents were divorced. The judge found it significant that D. H. was neither employed nor in school. However, although both D. H. and his mother were present, the court made no attempt to learn anything further concerning D. H.'s family background, why he dropped out of school, or any other aspects of his personal history. Beyond the judge's statement that he felt the time for which D. H. would remain subject to juvenile jurisdiction was inadequate in view of the nature of the offense, no consideration appears to have been given on the record to the "likelihood of reasonable rehabilitation of the juvenile" within the juvenile system (the 8th criterion in Kent). It should be noted that D. H. was only two months past the age of sixteen, the youngest age at which *309 waiver for prosecution as an adult is allowed. The juvenile system would thus have had almost as much time to work with D. H. as it would with anyone for whom waiver was a possibility. [18] We have held that it was not mandatory in every case that before a proper waiver could be made "the juvenile court was obligated to hear testimony from social workers and child psychologists directed to the questions of defendant's prospects for rehabilitation and propensity for committing similar crimes in the future." Mikulovsky v. State, 54 Wis.2d 699, 707, 708, 196 N.W.2d 748 (1972). Nevertheless, this court believes that at a waiver hearing the record should show that the juvenile court judge considered the availability of facilities, programs and personnel under juvenile court jurisdiction and the possibility of satisfactory protection of the public and rehabilitation of the child within the juvenile system. Counsel and the court have an important role in exploring the alternatives to waiver that are available. See Haziel v. United States, 404 F.2d 1275 (D.C. Cir. 1968); Miller v. Quatsoe, 332 F. Supp. 1269, 1275 (E.D. Wis. 1971). Thus the juvenile court judge should, on the record, base his decision on waiver on such criteria as: 1. The prior record and character of the juvenile, including his motives and attitudes; his physical and mental maturity; his pattern of living; his prior offenses; his prior treatment record and his potential for responding to the juvenile correctional facility. 2. The type of offensethe seriousness of the offense; whether the crime was committed in an aggressive, violent, premeditated or willful mannerand the prosecutive merit. *310 3. The comparable adequacy and suitability of facilities available to this juvenile in the juvenile and criminal courts.[18] Not all the relevant factors need be resolved against the juvenile, and this court cannot make a mathematical calculation as to the weight to be given by the juvenile court judge or this court to each factor. However, we do require the record to show that the judge examined these factors and set forth the reasons motivating waiver with sufficient specificity to allow review. [19] What this court said in McCleary v. State, 49 Wis.2d 263, 277, 182 N.W.2d 512 (1971), with respect to another discretionary function, the sentencing process, is relevant here: "Discretion is not synonymous with decision-making. Rather, the term contemplates a process of reasoning. This process must depend on facts that are of record or that are reasonably derived by inference from the record and a conclusion based on a logical rationale founded upon proper legal standards. As we pointed out in State v. Hutnik (1968), 39 Wis.2d 754, 764, 159 N.W.2d 733, `... there should be evidence in the record that discretion was in fact exercised and the basis of that exercise of discretion should be set forth.'" Adherence to this practice will not only aid appellate review, but perhaps more importantly, it will inevitably facilitate the decision-making process of the juvenile *311 court in the first instance. See McCleary, supra, 49 Wis.2d, at 282. Enough has been said to indicate that the records in the case at bar leaves something to be desired. It would have been better had the court received more information or given a more detailed explication as to why the time remaining for juvenile jurisdiction was inadequate in this case. However, the record does reflect, as discussed above, that the judge considered various factors properly bearing on the decision whether jurisdiction should be waived, and it does not reflect reliance upon any improper or irrelevant considerations. The juvenile court had before it a youth charged with robbing a store at night along with three accomplices, two of whom were adults. The record indicates that D. H. was not simply co-operating in the venture, but was in fact the leader of the group. He attempted to force the store's owner to surrender the money by telling him one of the group had a gun, and when this failed, he threatened the owner with direct physical violence. The robbery was clearly a premeditated act, and the group had apparently driven up to Kenosha from Illinois to commit it. D. H. was neither in school nor employed. [20] Though less deference is to be given the juvenile court's judgment here than would have been accorded it on a more complete record, we accept that court's analysis of the situation as far as it went and we evaluate its decision in light of the fact that it had the opportunity, not available to this court, to observe D. H.'s demeanor as it reflected on his attitude and level of sophistication. We find it a close question. The facts show a serious premeditated offense involving a threat of violence, committed by one having an apparently aimless pattern of living. Though D. H. appeared to have no prior record, the juvenile court could have found, as it did, that he possessed a degree of criminal sophistication *312 well beyond his years, and that because of this his treatment as a juvenile would not have been conducive to rehabilitation, and would therefore have been inappropriate. [21] The waiver will be upheld where the judge considered the proper factors and there is a preponderance of information before the judge that shows the determination is proper. We conclude that the decision to waive juvenile jurisdiction was not an abuse of discretion under the circumstances of this case. By the Court.Order affirmed. ROBERT W. HANSEN, J. (concurring). The writer sees the appeal to the circuit court of a waiver of juvenile court jurisdiction as provided for in sec. 48.47, Stats.[1] This statute provides for appeal to the circuit court of an adjudication by the juvenile court by any aggrieved party. The majority finds appeal under sec. 48.47 "not adequate under present circumstances." The writer would hold sec. 48.47 is applicable and controlling. This statute fashions a procedure for appeal to the circuit court "in the manner in which appeals are taken from judgments in civil actions." Under sec. 48.47 the state, as an aggrieved party, has the right to appeal a refusal to waive jurisdiction by the juvenile court judge. Under the court-fashioned remedy of the majority, with the appeal of a waiver to be handled by procedures for appeals of judgment in civil actions, the writer would submit that the right of the state, as an aggrieved party, to appeal a refusal to waive should also be spelled out. *313 This would follow the terms and general policy as to availability of appeal to "aggrieved parties" as set forth in sec. 48.47, Stats.[2] NOTES [1] Hortonville Ed. Assn. v. Joint School Dist. No. 1, 66 Wis.2d 469, 497, 225 N.W.2d 658 (1975), citing Art. I, sec. 9, Wis. Const. ("Every person is entitled to a certain remedy in the laws for all injuries, or wrongs which he may receive in his person, property, or character; he ought to obtain justice freely, and without being obliged to purchase it, completely and without denial, promptly and without delay, conformably to the laws.") and State ex rel. Wickham v. Nygaard, 159 Wis. 396, 150 N.W. 513 (1915); Wisconsin Telephone Co. v. Public Service Comm., 232 Wis. 274, 287 N.W. 122, 287 N.W. 593 (1939); Huebner v. State, 33 Wis.2d 505, 147 N.W.2d 646 (1967). For a discussion of the appealability of the juvenile court decision to transfer jurisdiction in other states, see Stamm, Transfer fer of Jurisdiction in Juvenile Court, 62 Ky. L.J. 122, 176-181 (1973). [2] Art. VII, sec. 3, Wis. Const., provides as follows: "The supreme court, except in cases otherwise provided in this constitution, shall have appellate jurisdiction only, which shall be coextensive with the state; but in no case removed to the supreme court shall a trial by jury be allowed. The supreme court shall have a general superintending control over all inferior courts; it shall have power to issue writs of habeas corpus, mandamus, injunction, quo warranto, certiorari, and other original and remedial writs, and to hear and determine the same." [3] For discussions of the writ of prohibition, see: State ex rel. Kowaleski v. District Court, 254 Wis. 363, 372, 36 N.W.2d 419 (1949); Drugsvold v. Small Claims Court, 13 Wis.2d 228, 108 N.W.2d 648 (1961); State ex rel. Jefferson v. Roraff, 44 Wis.2d 250, 256, 257, 170 N.W.2d 691 (1969); State ex rel. Prentice v. Milwaukee County Ct., 70 Wis.2d 230, 233-235, 234 N.W.2d 283 (1975). [4] "The net, therefore, is that petitionerthen a boy of 16 was by statute entitled to certain procedures and benefits as a consequence of his statutory right to the `exclusive' jurisdiction of the Juvenile Court. In these circumstances, considering particularly that decision as to waiver of jurisdiction and transfer of the matter to the District Court was potentially as important to petitioner as the difference between five years' confinement and a death sentence, we conclude that, as a condition to a valid waiver order, petitioner was entitled to a hearing, including access by his counsel to the social records and probation or similar reports which presumably are considered by the court, and to a statement of reasons for the Juvenile Court's decision. We believe that this result is required by the statute read in the context of constitutional principles relating to due process and the assistance of counsel." Kent v. United States, 383 U.S. 541, 557, 86 S. Ct. 1045, 16 L. Ed.2d 84 (1966). See also Kemplen v. Maryland, 428 F.2d 175 (4th Cir. 1970); Miller v. Quatsoe, 332 F. Supp. 1269, 1276 (E.D. Wis. 1971); United States ex rel. Turner v. Rundle, 438 F.2d 839, 842 (3d Cir. 1971); Davis, Rights of Juveniles: The Juvenile Justice System, sec. 4.02 (1974); Uniform Juvenile Court Act, secs. 24, 26, and 34; Wisconsin Special Study Committee on Criminal Justice Standards and Goals, Juvenile Justice Standards and Goals, Standards 12.1(n) (o), 12.11(a) (b) (c) (d) (1975). [5] In re Guardianship of Schmidt, 71 Wis.2d 317, 321, 237 N.W.2d 919 (1976); Phifer v. State, 64 Wis.2d 24, 30, 218 N.W.2d 354 (1974). [6] Hansen v. State, 64 Wis.2d 541, 550, 219 N.W.2d 246 (1974); Ripon v. Diedrich, 34 Wis.2d 459, 464, 149 N.W.2d 580 (1967). "This court has often stated that it does not look with favor upon claims of prejudicial error based upon the trial court's failure to act when no action is requested by counsel." State v. Cartagena, 40 Wis.2d 213, 222, 161 N.W.2d 392 (1968). [7] D.H.'s position is weakened by Kent where the court said: "We do not agree with the Court of Appeals' statement, attempting to justify denial of access to these records, that counsel's role is limited to presenting `to the court anything on behalf of the child which might help the court in arriving at a decision; it is not to denigrate the staff's submissions and recommendations.' On the contrary, if the staff's submissions include materials which are susceptible to challenge or impeachment, it is precisely the role of counsel to `denigrate' such matter. There is no irrebuttable presumption of accuracy attached to staff reports. If a decision on waiver is `critically important' it is equally of `critical importance' that the material submitted to the judge which is protected by the statute only against `indiscriminate' inspectionbe subjected, within reasonable limits having regard to the theory of the Juvenile Court Act, to examination, criticism and refutation. While the Juvenile Court judge may, of course, receive ex parte analyses and recommendations from his staff, he may not, for purposes of a decision on waiver, receive and rely upon secret information, whether emanating from his staff or otherwise." 383 U.S. 541, 563. [8] This position is supported by United States ex rel. Bombacino v. Bensinger, 498 F.2d 875, 877, 878 (7th Cir. 1974). It was claimed that a waiver effected in an Illinois state court was invalid because no evidence had been heard. This contention was dismissed as follows: "There are two aspects to the argument based on the absence of an evidentiary hearing. It is first significant that the court did not refuse to hear any evidence offered on behalf of the petitioner because no such offer was made. In oral argument his counsel made certain representations which, since they were unchallenged, presumably were accepted as true by the judge. Although petitioner's guilt or innocence was in dispute, the facts concerning the juvenile's age, education, family background, and the absence of a prior record, appear to have been undisputed. We find nothing in the record to indicate that petitioner was denied the opportunity to adduce evidence relating to the transfer issue. "At the oral argument before the juvenile judge, petitioner argued that the prosecutor should be required to introduce evidence to show probable cause that the juvenile was guilty of a criminal offense. Quite clearly, under the Illinois statutory procedure, such evidence was unnecessary. We find nothing in either the Kent opinion or in the concept of fundamental fairness which mandates such a hearing before the jurisdiction of the juvenile court may be waived. Of course, before an indictment can be returned, evidence of probable cause, sufficient to satisfy the grand jury, must be presented. That procedure adequately protects a person's rights; there is no constitutional requirement that a probable cause showing must be made twice." See Uniform Juvenile Court Act, secs. 24 and 27. See also Hazell v. State, 12 Md. App. 144, 277 A.2d 639, 644 (1971); State v. Gerard, 57 Wis.2d 611, 618, 205 N.W.2d 374 (1973), where this court said that in a revocation of probation hearing, which is "a due-process-type hearing, all of the technical rules of evidence need not be observed. The trial judge, in the exercise of his discretion, can accept or reject the information offered as reliable or unreliable in making a proper determination." See also Waddell v. State, 24 Wis.2d 364, 369, 129 N.W.2d 201 (1964); Lehmann v. State, 39 Wis.2d 619, 629, 630, 159 N.W.2d 607 (1968); Neely v. State, 47 Wis.2d 300, 334-336, 177 N.W.2d 79 (1970) relating to sentencing procedures. [9] See Stamm, Transfer of Jurisdiction in Juvenile Court, 62 Ky. L.J. 123 (1973); Mlyniec, Juvenile Delinquent or Adult ConvictThe Prosecutor's Choice, 14 Am. Cr. L. Rev. 29 (1976). [10] See, for example, Cal. Welf. & Inst'ns Code sec. 707 (Supp. 1976); Ill. Rev. Stats. ch. 37, sec. 702-7 (3) (a) (1975); Kan. Stats. Annot. sec. 38-808(b) (Supp. 1976), which provides in part: "Written reports and other materials relating to the child's mental, physical, educational and social history may be considered by the court, but the court, if so requested by the child, the child's parent or guardian or other interested party, shall require the person, persons or agency preparing the report and other material to appear and be subject to both direct and cross-examinations."; Minn. Juv. Ct. Rule 8-6 (West 1977), which provides: "In arriving at its reference decision, the court shall consider only data which has been formally admitted in evidence. All testimony shall be under oath and may be in narrative form. The court may admit any evidence that is material and relevant to the decision whether to refer the cause for prosecution, including hearsay and opinion evidence. The parties shall have the right to examine any person who has prepared any report admitted in evidence." [11] We echo the sentiments expressed by Chief Judge BAZELON, Haziel v. United States, 404 F.2d 1275, 1282 (D.C. Cir. 1968): "It is all too often true that appellate opinions must reflect the realization that little can be done to salvage the past. But if yesterday has forever fled, the future can and must still be cared for. The standards set forth in this decision may well do more to improve future waiver proceedings than to correct the past." [12] This court has stated that our juvenile laws have the "benevolent purpose of improving the child's condition and not ... punishing his past conduct." In re Alley, 174 Wis. 85, 91, 92, 182 N.W. 360 (1921). In In re Winburn, 32 Wis.2d 152, 158, 145 N.W.2d 178 (1966), it was said: "The entire philosophy of the Children's Code is avowedly the antithesis of criminal prosecution. "`For the delinquent child, the aim of the court is to correct, re-educate, re-direct, and rehabilitate, rather than to punish or to seek retribution for misdeeds.' Wisconsin Handbook for Juvenile Court Services (November, 1959), p. 2." Winburn went on to discuss frankly the fact that in practice retribution as well as rehabilitation plays a role in the function of the juvenile court, and as the United States Supreme Court did in Kent v. United States, 383 U.S. 541, 86 S. Ct. 1045, 16 L. Ed.2d 84 (1966) and in In re Gault, 387 U.S. 1, 87 S. Ct. 1428, 18 L. Ed.2d 527 (1967), this court in Winburn rejected in large measure the former doctrine by which the supposed beneficence of juvenile courts justified gross denials of rights accorded adults charged with crime. However, we do not read Winburn as negating the statutory requirement that the paramount consideration in juvenile proceedings is the welfare of the juvenile. For expression of a similar view, see Breed v. Jones, 421 U.S. 519, 528, 529, 95 S. Ct. 1779, 1785, 44 L. Ed.2d 346 (1975). [13] Sec. 48.01 (3), Stats., provides that "the best interests of the child shall always be of paramount consideration, but the court shall also consider the interest of the parents or guardian of the child and the interest of the public." [14] The criteria from Kent are as follows: 1. The seriousness of the alleged offense to the community and whether the protection of the community requires waiver. 2. Whether the alleged offense was committed in an aggressive, violent, premeditated or willful manner. 3. Whether the alleged offense was against persons or against property, greater weight being given to offenses against persons especially if personal injury resulted. 4. The prosecutive merit of the complaint, i.e., whether there is evidence upon which a Grand Jury may be expected to return an indictment (to be determined by consultation with the United States Attorney). 5. The desirability of trial and disposition of the entire offense in one court when the juvenile's associates in the alleged offense are adults who will be charged with a crime in the United States District Court for the District of Columbia. 6. The sophistication and maturity of the juvenile as determined by consideration of his home, environmental situation, emotional attitude and pattern of living. 7. The record and previous history of the juvenile, including previous contacts with the Youth Aid Division, other law enforcement agencies, juvenile courts and other jurisdictions, prior periods of probation to this Court, or prior commitments to juvenile institutions. 8. The prospects for adequate protection of the public and the likelihood of reasonable rehabilitation of the juvenile (if he is found to have committed the alleged offense) by the use of procedures, services and facilities currently available to the Juvenile Court. In Breed v. Jones, 421 U.S. 519, 537, 95 S. Ct. 1790, 1791, 44 L. Ed.2d 346 (1975), the United States Supreme Court noted that "the Court has never attempted to prescribe criteria for, or the nature and quantum of evidence that must support, a decision to transfer a juvenile for trial in adult court." [15] Sec. 48.01 (2), Stats.: "(2) INTENT. It is declared to be the intent of this chapter to promote the best interests of the children of this state through: "(a) Juvenile courts adequately equipped to review each case on its individual merits under procedures designed to safeguard the legal rights of the child and his parents; "(b) An integrated and co-ordinated program for all delinquent, neglected and dependent children both in their own community and while in the custody of the state; "(c) Protection of children from unnecessary separation, either temporary or permanent, from their parents; "(d) Adequate care and rehabilitation for all children who must be separated from their parents temporarily for the child's protection or that of the public; "(e) Co-ordinated planning to assist local communities in promoting effective programs in health, education, recreation and welfare for the maximum development of all children and for the control of influences detrimental to youth; "(f) Assurance for children needing adoptive homes that they will be placed in the best home available; protection of children from adoption by persons unfit to have responsibility for raising a child; protection for children who are legally established in adoptive homes from interference by their natural parents." [16] This court in F.R.W., 61 Wis.2d at 210, quoted with approval the following from Miller v. Quatsoe, 332 F. Supp. 1269, 1275 (E.D. Wis. 1971): "Unlike a typical criminal action, a juvenile waiver proceeding vests the judge with a wide amount of discretion in making his determination. In his decision making, the juvenile judge does not simply deal with a specific factual incident in the accused's life as does a criminal court judge, but rather the juvenile judge must consider the juvenile's past, his future, his mind, and his acts and then balance these factors against the safety, needs, and demands of society. Further, besides judging the `whole man' as opposed to the act with wide as opposed to limited discretion, the juvenile judge may perform his task in a comparatively informal proceeding. Kent, supra, at 562, 86 S. Ct. 1045." [17] It has been suggested that the presence of co-offenders over eighteen is an important consideration in waiver hearings. Waiver is likely to effect a greater equality of treatment. The offenders could be jointly prosecuted (providing efficiency for prosecutor and courts) and if warranted could receive similar sentences. Comment, Waiver of Jurisdiction in Wisconsin Juvenile Courts, 1968 Wis. L. Rev. 551, 553; Wis. Special Study Committee on Criminal Justice Standards and Goals, Juvenile Justice Standards and Goals, Standard 12.11(f) 5 (1975). [18] For a discussion of the criteria to be used in a waiver proceeding, see Schornhorst, The Waiver of Jurisdiction: Kent Revisited, 43 Ind. L. J. 604, n. 127 (1968); Comment, Juvenile Court Waiver: The Questionable Validity of Existing Statutory Standards, 16 St. Louis L. J. 604 (1972); Comment, Waiver of Jurisdiction in Wisconsin Juvenile Courts, 1968 Wis. L. Rev. 551; Stamm, Transfer of Jurisdiction in Juvenile Court, 62 Ky. L. J. 122, 157 (1973); Wis. Special Study Committee on Criminal Justice Standards and Goals, Juvenile Justice Standards and Goals, Standard 12.11(f) (1975). [1] Sec. 48.47, Stats., Children's Code, providing: "Any person aggrieved by an adjudication of the county court under this chapter and directly affected thereby has the right to appeal to the circuit court of the same county within 40 days of the entry of the order in the manner in which appeals are taken from judgments in civil actions...." See also: Sec. 274.33, Stats., entitled Appealable orders. [2] See: 1955 Revision Committee Note to sec. 48.47: "Another important change is that it allows an appeal by a welfare agency which files a petition in a case since the agency would come within the class of those aggrieved by the adjudication and directly affected thereby. This overrules In re Fish, 246 Wis. 474, 17 N.W.2d 558 (1944)." See also: In re Johnson, 9 Wis.2d 65, 100 N.W.2d 383 (1960). However, In re Fish was not overruled as to the following point of law: "The right to an appeal is not a commonlaw right. Unless the statute provides for an appeal, no right exists." Citing Fronhaefer v. Richter, 237 Wis. 282, 296 N.W. 588 (1941); Green Bay v. Saunders, 237 Wis. 229, 296 N.W. 592 (1941). Accordingly, in order to appeal at all, a party must invoke sec. 48.47, Stats. Once that section is invoked, it is clear that all aggrieved parties, including the state, may appeal. | Mid | [
0.5489361702127661,
32.25,
26.5
] |
Varicocelectomy: 986 cases in a twelve-year study. Over a twelve-year period, surgical correction of varicocele was performed on 986 selected subfertile men. They were followed up for at least two years after surgery. Semen quality was improved in 70 per cent, and 53 per cent of the wives became pregnant. Statistically, the results were better in terms of semen quality improvement and pregnancy for patients who had preoperative sperm counts over 10 million per milliliter (85 per cent improved, 70 per cent pregnancy rate) than for patients who had preoperative sperm counts of less than 10 million per milliliter (35 per cent improved, 27 per cent pregnancy rate). The empirical use of postoperative human chorionic gonadotropin therapy in this latter group improved results significantly (55 per cent improved, 45 per cent pregnancy rate). | High | [
0.6825595984943531,
34,
15.8125
] |
What was known before {#section21-2054358119892174} ===================== Acute kidney injury (AKI) is defined according to variations of SCr and diuresis, with a 3-stage prognostic classification. Most descriptions of AKI come from intensive care units (ICUs). Severe AKI could be defined as a homogenous prognostic stage. What this adds {#section22-2054358119892174} ============== The clinical presentation, care, and prognosis of patients hospitalized with severe AKI in a tertiary hospital are highly heterogeneous. Introduction {#section23-2054358119892174} ============ Acute kidney injury (AKI) is a syndrome characterized by a rapid reduction in kidney function that sharply decreases clearance of excess water, electrolytes, and toxins. It is highly prevalent among hospitalized patients and is associated with poor outcomes including increased length of stay and mortality.^[@bibr1-2054358119892174]^ In 2012, KDIGO (Kidney Disease: Improving Global Outcomes), an international nonprofit organization that develops and implements clinical practice guidelines for kidney disease, issued a clinical practice guideline that proposed a new classification of AKI based on variations in serum creatinine (SCr), urine volume, and dialysis treatment.^[@bibr2-2054358119892174]^ This definition facilitates homogeneous description and has resulted in better knowledge of AKI epidemiology worldwide.^[@bibr3-2054358119892174]^ However, no other clinical information, including clinical presentation, is recorded,^[@bibr1-2054358119892174]^ even though AKI is not a single homogeneous disease but a "loose collection of syndromes characterized by an abrupt decrease in glomerular filtration rate (GFR) with multiple potential causes."^[@bibr4-2054358119892174]^ The KDIGO definition and classification thus appear too simple for several of its patterns of clinical presentation. Recent articles have debated the definition and classification of AKI, offering conflicting opinions.^[@bibr5-2054358119892174]^ Barasch et al^[@bibr5-2054358119892174]^ argue that focus on creatinine-based staging has de-emphasized the traditional clinical approach of determining the cause of AKI and prevents progress in the personalized medicine needed to treat these various syndromes. Kellum and Lameire^[@bibr6-2054358119892174]^ counter that, in the absence of current alternatives to SCr, its significant advantages in clinical and research environments include the facilitation of efforts to address variations in the delivery of AKI care. Moreover, most descriptive data for AKI come from severely ill patients treated in intensive care units (ICUs). Few data from non-ICU patients are available.^[@bibr4-2054358119892174],[@bibr7-2054358119892174]^ A French study that recently reported a difference in AKI prognosis according to whether it is coded in the French discharge database as the principal or an associated diagnosis indicates that AKI covers a wide range of clinical situations and types of care that differ according to the department in which the patient is hospitalized.^[@bibr8-2054358119892174]^ Acute kidney injury occurs across a wide range of diseases treated by a variety of specialists: Most episodes of AKI are managed by nonnephrologists.^[@bibr9-2054358119892174]^ In 2009, the UK National Confidential Enquiry into Patient Outcome and Death reported that this heterogeneity of patient management led to "good care" for only 50% of AKI patients, and only 31% were referred to nephrologists.^[@bibr10-2054358119892174]^ Descriptive data about AKI nonetheless come mainly from administrative data or from ICU patient cohorts; specific information is missing about its cause, its clinical features, and the care provided. Outcomes for severe AKI are reported mainly from ICUs and not for hospitals as a whole. Moreover, few studies describe the indications for dialysis according to the unit of hospitalization (ICU or nephrology). More precise descriptive information is needed to improve individualized patient-centered care for this inpatient population with severe AKI. In this context, the single-center prospective study we report here aimed to describe the incidence and patterns of severe AKI diagnosed in a tertiary university hospital, from its clinical presentation to its global care, according to the department of hospitalization: ICU, nephrology, and other wards. Methods {#section24-2054358119892174} ======= Study Population {#section25-2054358119892174} ---------------- All adults (≥18 years) presenting severe AKI at or after admission to our university hospital between August 2016 and December 2017 were eligible to participate. They were prospectively identified by physicians in the ICU and the nephrology department and by the biochemistry laboratory for the hospital overall. Inclusion criteria were severe AKI, defined according to 2 of the 3 criterion definitions of KDIGO stage 3 AKI: an increase in SCr above 354 µmol/L or renal replacement therapy (RRT) indication, but not the 3-fold increase in SCr increase within 7 days with SCr below 354 µmol/L. Exclusion criteria were chronic kidney disease (CKD) KDIGO stage 5, patients living with a kidney transplant, planned dialysis for bilateral surgical nephrectomy, patients under guardianship, patients who refused, and patients with no health insurance. Exhaustiveness of inclusions in the hospital during the study period was verified regularly by the biochemistry department, which sent us information about all patients with SCr above 354 µmol/L. The patients requiring RRT for AKI were also screened weekly by the investigators throughout the study. [Figure 1](#fig1-2054358119892174){ref-type="fig"} presents a flowchart of the study population. {#fig1-2054358119892174} ### Patient characteristics {#section26-2054358119892174} The following information was recorded at inclusion by the hospital staff physician responsible for the patient care and during the hospitalization by the study data team: sociodemographic information (age, sex, height, weight, and body mass index \[BMI\]) and prespecified chronic illnesses (coronary heart disease, treated hypertension, heart failure, cardiac arrhythmia, cerebrovascular disease, peripheral vascular disease, chronic obstructive pulmonary disease or asthma, noninvasive ventilation except for supplemental oxygen, diabetes mellitus, chronic liver dysfunction, solid organ malignancies, and hemopathy). The comorbidities were defined according to the "dictionary used with the REIN registry."^[@bibr11-2054358119892174]^ A Charlson comorbidity score was calculated at inclusion, and the Simplified Acute Physiology score (SAPS II)^[@bibr12-2054358119892174]^ within 24 hours after admission to the "inclusion ward." The presence of CKD according to the KDIGO definition and care by a nephrologist at least 3 months before inclusion was also recorded. In the absence of information about the kidney function before hospitalization, the GFR was estimated at a value of 75 mL/min/1.73 m^2^, as recommended.^[@bibr1-2054358119892174]^ At inclusion, we also recorded laboratory values for SCr (enzymatic method), urea, lactates, hemoglobin, potassium, phosphates, bicarbonates, albumin, and for urine sample values, including the protein/creatinine ratio. Acute kidney injury cause was defined according to standard nephrology definitions^[@bibr13-2054358119892174]^ and the clinical context, as suggested by Kellum and Prowle.^[@bibr4-2054358119892174]^ If a kidney biopsy was done for AKI, we used the results to specify the precise cause. The different causes considered were prerenal kidney injury with a clinical context of real hypovolemia and rapid reversibility of AKI after fluid administration; obstructive kidney failure with documented urinary tract obstruction; and renal kidney injury including acute tubular necrosis (ATN), glomerulopathy, vascular or acute interstitial nephritis, as assessed by a nephrologist based on medical history, clinical presentation, kidney imaging, and urine analysis. Acute tubular necrosis was diagnosed in cases of sustained renal ischemia, drug direct tubular injury, rhabdomyolysis, cast nephropathy, or persistent AKI more than 72 hours after hemodynamic correction. Acute kidney injury in the context of type I cardiorenal syndrome was defined by acute heart failure complicated by AKI,^[@bibr14-2054358119892174]^ and AKI with liver-renal syndrome by AKI with cirrhosis or liver failure.^[@bibr15-2054358119892174]^ AKI associated with sepsis was defined according to the 2016 definition^[@bibr16-2054358119892174]^ and AKI with multiorgan failure by the failure of at least 3 organs. Finally, hospital-acquired AKI was defined by its occurrence ≥48 hours after hospital admission, surgery-associated AKI by its occurrence within 72 hours after surgery, and community-acquired AKI as that not acquired in a hospital. Two investigators (C.A. and O.M.) reached a consensus about each probable cause of AKI. As Kellum et al point out, this diagnosis is sometimes complex; therefore, we first describe causes according to clinical syndrome, as in sepsis or multiorgan failure, and then as a cause as hypovolemic, renal, or obstructive. ### Trajectory and care {#section27-2054358119892174} We recorded patient trajectory during hospitalization with information about different departments of hospitalization for patients. The "inclusion ward" was defined as the ward where the patient presented severe AKI requiring inclusion. In this context, we defined 3 groups of inclusion wards; the ICU and the nephrology ward (NW) both had RRT available, whereas the third group was "all other wards, without RRT care." The "ICU department" contains 2 units, 1 surgical and 1 medical, with different patient profiles. Other departments recorded included the ward, if any, before the "inclusion ward" and the last ward of stay before discharge, transfer to another facility, or inpatient death. The reasons for patient admission were separated into 9 main groups according to the principal reason: sepsis, cardiovascular, neurologic, digestive disease, respiratory distress, hypovolemia or hemorrhage, AKI, or other diagnoses. More than 1 condition could be selected in each case. During hospitalization, dates of hospital admission, inclusion, discharge or death, and need for RRT were recorded. At inclusion, that is, at the diagnosis of AKI, physicians reported any palliative care plan. When RRT was indicated, the attending physician specified the reason from the following items selected in advance: oligoanuria, hyperkalemia, acute pulmonary edema, metabolic acidosis, hypercalcemia volume overload with diuretic resistance, toxin clearance, or refractory shock. Several causes could be selected. Similarly, when dialysis was not considered to be indicated, physicians were asked to select the reason from a list of situations including the absence of clinical and laboratory indications and patient refusal or preference for palliative care. The following specific treatments were also recorded during hospitalization: need for mechanical ventilation and intravenous infusion of inotropes or vasopressors. Statistical Analysis {#section28-2054358119892174} -------------------- We reported the incidence of hospitalization for severe AKI in adults over the study period according to the overall number of stays in this tertiary university hospital for adults hospitalized in medical, surgical, and obstetric wards. The population characteristics, clinical presentation at inclusion, trajectory, and care are reported for the overall population and by inclusion ward. Quantitative values with Gaussian distribution are expressed as means with their standard deviations (SDs) and compared with the analysis of variance (ANOVA) test; those with non-Gaussian distribution are expressed as medians and their interquartile ranges (IQRs) and compared by inclusion ward with the Kruskal-Wallis nonparametric test. Qualitative values are expressed by numbers (with percentages) for qualitative values and compared by inclusion ward with the chi-square test. Significance was defined as *P* \< .05 with a bilateral test. Statistical analyses were performed with SAS software version 9.3 (SAS Institute Inc). The statistical comparison of the variables according to group is a global comparison between the ICU (surgical and medical combined), the NW, and other wards (OW). Ethics {#section29-2054358119892174} ------ This study was approved by the Ethics Committee (REB) and the French Data Protection Authority (Commission Nationale Informatique & Libertés; CNIL number: 1963867v0). All patients or their substitute decision-makers received clear information that they could object to the collection of their health records, and none expressed any opposition. Results {#section30-2054358119892174} ======= During the study period, 480 (mean age: 72 years, IQR: \[64, 83\], 73% male) patients were included among the 507 who were eligible ([Figure 1](#fig1-2054358119892174){ref-type="fig"}). Overall, 188 (39%) were included from the ICU: 91 (19%) from the surgical ICU and 97 (20%) from the medical ICU. The NW was the inclusion ward for 130 (27%) and the OW for 162 (34%). [Figure 2](#fig2-2054358119892174){ref-type="fig"} lists the OW, together with the number of patients included in each; they included elder care, oncology/hematology, palliative care, urology, obstetrics, cardiology, and other medical and surgical wards. Of the overall hospital patient admissions (N = 21 312) during the study period, 2.3% were of patients diagnosed with severe AKI at admission or during their stay. The prespecified chronic illnesses and sociodemographic information are presented for the overall population and according to the inclusion ward in [Table 1](#table1-2054358119892174){ref-type="table"}. Patients included in the ICU were younger (mean age: 66 years) than those from the NW (73) or OW (83) (*P* \< .001). Comorbidities were numerous, especially cardiovascular and neoplastic. Nearly half the patients (n = 234; 49%) were known to have had CKD before this hospitalization; only 82 (35%) had previous nephrology care. A history of CKD was most frequent in patients included in the NW. {#fig2-2054358119892174} ###### Sociodemographic Data, Medical History, and Kidney Information.  General (N = 480) ICU (N = 188; 39%) Surgical ICU (N = 91; 19%) Medical ICU (N = 97; 20%) Nephrology ward (NW) (N = 130; 27%) Other wards (OW) (N = 162; 34%) *P* (general) ----------------------------------------- ------------------- -------------------- ---------------------------- --------------------------- ------------------------------------- --------------------------------- --------------- Sociodemographic data Men, n (%) 351 (73.1) 145 (77.1) 70 (76.9) 75 (77.3) 88 (67.7) 118 (72.8) .32 Age (years), median \[IQR\] 72 \[64, 83\] 68 \[60, 76\] 70 \[64, 78\] 66 \[57, 74\] 73 \[63, 82\] 83 \[71, 89\] \<.0001 Past medical history, n (%) Cardiovascular disease 440 (91.7) 174 (93) 82 (90.1) 92 (94.9) 115 (88.5) 151 (93) .28 Coronary heart disease 116 (24.3) 46 (24.5) 21 (23.1) 25 (25.8) 29 (22.3) 41 (25.8) .88 Heart failure 128 (26.7) 42 (22.3) 15 (16.5) 27 (27.8) 37 (28.5) 49 (30.3) .10 Peripheral vascular disease 86 (17.9) 35 (18.6) 19 (20.9) 16 (16.5) 23 (17.7) 28 (17.3) .87 Cardiac arrhythmia 108 (22.6) 30 (16.0) 15 (16.5) 15 (15.5) 29 (22.3) 49 (30.8) .012 Cerebrovascular disease 61 (12.8) 17 (9.0) 7 (7.7) 10 (10.3) 11 (8.5) 33 (20.8) .003 Treated hypertension 320 (67.1) 127 (67.6) 58 (63.7) 69 (71.1) 93 (71.5) 100 (62.9) .31 Diabetes mellitus 176 (36.7) 72 (38.3) 33 (36.3) 39 (40.2) 49 (37.7) 55 (34.0) .77 Chronic liver dysfunction 29 (6) 17 (9.0) 9 (9.9) 8 (8.3) 7 (5.4) 5 (3.1) .11 Solid organ malignancies 130 (27.1) 43 (22.9) 21 (23.1) 22 (22.7) 27 (20.8) 60 (37.0) .006 Hemopathy 40 (8.4) 13 (7.0) 6 (6.7) 7 (7.4) 11 (8.5) 16 (9.9) .85 Asthma or COPD 66 (13.8) 31 (16.6) 17 (18.9) 14 (14.4) 16 (12.4) 19 (11.7) .42 NIV or supplemental oxygen 37 (7.7) 20 (10.6) 13 (14.3) 7 (7.2) 8 (6.2) 9 (5.6) .069 Renal information (previous 6 months) CKD, n (%) 235 (48.9) 77 (41.0) 33 (36.3) 44 (45.4) 83 (63.9) 74 (45.7) \<.001 GFR (mL/min/1.73 m^2^), median \[IQR\] 56 \[37, 81\] 71 \[46, 90\] 73 \[47, 90\] 68 \[46, 91\] 54 \[30, 71\] 46 \[32, 75\] \<.0001 *Note.* "P" for the global comparison of values between ICU, NW, and OW. ICU = intensive care unit; IQR = interquartile range; COPD = chronic obstructive pulmonary disease; NIV = noninvasive ventilation; CKD = chronic kidney disease; GFR = glomerular filtration rate. Clinical Characteristics and Laboratory Values {#section31-2054358119892174} ---------------------------------------------- Other characteristics including reason for hospitalization, community- vs hospital-acquired AKI, surgery-associated AKI, clinical data, and AKI cause are reported in [Table 2](#table2-2054358119892174){ref-type="table"}. The principal reasons for admission were gastrointestinal disease (24.8%), sepsis (21.9%), hypovolemia (19.5%), and AKI (19.5%). Acute kidney injury was hospital acquired for 28% of the study population and surgery associated for 20.3%, including 78% of the cases regarded as emergency surgery. At inclusion, the median Charlson index was 7 (IQR: \[4, 9\]) and was highest in the OW inclusion group. The median BMI was 26.6 (IQR: \[23.3, 30.9\]) with significant differences according to inclusion ward, and the values were lower for patients included in OW than in the ICU and NW. The median SCr (423 μmol/L, IQR: \[367, 557\]) also differed between these groups and was lower in the ICU, as were bicarbonate levels. ###### Reason for Admission, Clinical Data, Laboratory Findings, and Causes of AKI.  General population (N = 480) ICU (N = 188; 39%) Surgical ICU (N = 91; 19%) Medical ICU (N = 97; 20%) Nephrology ward (NW) (N = 130; 27%) Other wards (OW) (N = 162; 34%) *P* ---------------------------------------------- ------------------------------ --------------------- ---------------------------- --------------------------- ------------------------------------- --------------------------------- --------- Reason for admission, n (%) Gastrointestinal 120 (25) 62 (33.0) 35 (38.5) 27 (27.8) 26 (20.0) 32 (19.8) .004 Infectious 105 (21.9) 65 (34.6) 41 (45.1) 24 (24.7) 3 (2.3) 37 (22.8) \<.001 AKI (alone) 99 (19.5) 11 (5.9) 4 (4.4) 7 (7.2) 60 (45.8) 28 (17.3) .2 Hypovolemia/hemorrhage 93 (19.4) 39 (20.7) 17 (18.7) 22 (22.7) 30 (23.1) 24 (14.8) .26 Cardiovascular 70 (14.6) 40 (21.3) 15 (16.5) 25 (25.8) 16 (12.3) 14 (8.6) .001 Respiratory distress 63 (13.1) 40 (21.3) 18 (19.8) 22 (22.7) 5 (3.9) 18 (11.1) \<.0001 Neurological 37 (7.7) 9 (4.8) 5 (5.5) 4 (4.1) 10 (7.7) 18 (11.1) .17 Polytrauma 13 (2.7) 7 (3.7) 6 (6.6) 1 (1.0) 1 (0.8) 5 (3.1) .042 Other 27 (16.3) 0 0 0 0 27 (16.7) \<.0001 Hospital-acquired AKI, n (%) 135 (28.1) 68 (36.2) 42 (46.2) 26 (26.8) 27 (20.8) 40 (24.7) .0003 Surgery-associated AKI, n (%) 98 (20.4) 60 (31.9) 47 (51.7) 13 (13.4) 12 (9.2) 26 (16.1) \<.0001 Clinical data, median \[IQR\] BMI (kg/m^2^) 26.6 \[23.3, 30.9\] 28.1 \[24.7, 32.4\] 29.1 \[24.3, 32.8\] 27.8 \[24.7, 32.3\] 26.5 \[23.0, 30.4\] 24.9 \[22.5, 28.4\] \<.001 Charlson index 7 \[4, 9\] 6 \[3, 8\] 5 \[3, 8\] 6 \[3, 8\] 7 \[4, 9\] 8 \[6, 10\] \<.001 Laboratory data at inclusion, median \[IQR\] Creatinine (μmol/L) 423 \[367, 557\] 379 \[257, 482\] 381 \[239, 468\] 376 \[295, 500\] 535 \[415, 732\] 428 \[382, 505\] \<.0001 Urea (mmol/L) 29.6 \[21, 38\] 26.9 \[17, 36\] 22.9 \[14.9, 31.7\] 29.9 \[21, 38.2\] 30.6 \[23, 37.2\] 30.9 \[22.6, 38.8\] \<.0001 Potassium (mmol/L) 4.9 \[4.2, 5.6\] 4.8 \[4.2, 5.5\] 4.9 \[4.3, 5.6\] 4.8 \[4.0, 5.5\] 4.8 \[4.1, 5.4\] 5 \[4.2, 5.6\] .096 Bicarbonates (mmol/L) 18.6 \[14.5, 21.8\] 16.7 \[13.5, 21.0\] 16.1 \[13.4, 20.7\] 16.7 \[13.8, 21.0\] 19.4 \[15.8, 22.6\] 19.5 \[16.1, 21.8\] .0007 Cause of AKI, n (%) \<.001 Hypovolemia 98 (20.4) 24 (12.8) 11 (12.1) 13 (13.4) 29 (22.3) 45 (27.8) Renal 112 (23.5) 27 (14.4) 12 (13.2) 15 (15.5) 61 (46.9) 24 (14.8) Acute tubular necrosis 74 (15.4) 21 (11.1) 10 (11) 11 (11.3) 32 (24.6) 21 (13) Acute interstitial nephritis 13 (2.7) 2 (1) 1 (1.1) 1 (1) 9 (7) 2 (1.2) Glomerulonephritis 19 (4) 2 (1) 1 (1.1) 1 (1) 16 (12.3) 1 (0.6) Vascular nephropathy 7 (1.5) 3 (3.1) 0 3 (3.1) 4 (3.1) 0 Obstructive 85 (17.5) 14 (7.5) 8 (8.8) 6 (6.2) 19 (14.6) 52 (32.1) Sepsis 104 (21.7) 76 (40.4) 45 (49.6) 31 (32.0) 8 (6.2) 20 (12.4) Multiorgan failure 25 (5.2) 20 (10.6) 8 (8.8) 12 (12.4) 0 5 (3.1) Cardiorenal syndrome 51 (10.6) 22 (11.7) 5 (5.5) 17 (17.5) 13 (10) 16 (9.9) Hepatorenal syndrome 5 (1) 5 (2.7) 2 (2.2) 3 (3.1) 0 0 *Note.* "P" for the global comparison of values between ICU, NW, and OW. AKI = acute kidney injury; ICU = intensive care unit; BMI = body mass index; IQR = interquartile range. AKI Causes {#section32-2054358119892174} ---------- The main causes of AKI were sepsis (22%), hypovolemia AKI (20%), obstructive AKI (18%), ATN (15%), and cardiorenal syndrome (11%) ([Figure 3](#fig3-2054358119892174){ref-type="fig"}). These causes differed significantly between wards: septic AKI, multiorgan failure, and cardiorenal and hepatorenal syndromes were most frequent in the ICU, whereas hypovolemia and obstructive AKI were predominant in the OW inclusion group. Finally, renal AKI, which includes ATN, acute glomerular injury, acute vascular nephritis, and acute interstitial nephritis, was predominant in the NW. {#fig3-2054358119892174} Trajectory and Care {#section33-2054358119892174} ------------------- [Table 3](#table3-2054358119892174){ref-type="table"} summarizes the data about care plans, indications for RRT, and specific treatment during hospitalization. At inclusion, treatment limitations (such as "do not resuscitate" orders) were in effect for 72 patients (15%), with the largest proportion of them being included in OW. During hospitalization, 194 patients (40%) required RRT, with more of them being included in the ICU (73%) than in the NW (43%); none of the OW inclusions received RRT. The most common indications for RRT reported by physicians were anuria (57%), metabolic acidosis (54%), hyperkalemia (32%), and diuretic-resistant volume overload (15%). Acute pulmonary edema was most frequent in patients included in the NW, whereas metabolic acidosis and anuria were the principal indications in the ICU ([Figure 4](#fig4-2054358119892174){ref-type="fig"}). In OW, none of them were treated by RRT because of treatment limitations in 58 (36%) and because of the causes of AKI that can be treated by specific treatment other than RRT such as intravenous (IV) infusion for hypovolemia (45; 28%), urine derivation for obstructive (52; 32%), and AKI or cardiac treatment for cardiorenal syndrome (16; 16%). Finally, 143 patients (30%) needed vasopressors and 115 (24%) mechanical ventilation, mostly in the ICU group. Slightly more than half of the patients (n = 245; 51%) were admitted via the emergency department to their inclusion ward. A total of 141 (29%) of these patients died during this hospitalization. The rates of death in the hospital and at 30 days differed according to department of inclusion and were highest among those included from the ICU. ###### Trajectory and Care.  General population (N = 480) ICU (N = 188; 39%) Surgical ICU (N = 91; 19%) Medical ICU (N = 97; 20%) Nephrology ward (NW) (N = 130; 27%) Other wards (OW) (N = 162; 34%) *P* ------------------------------------------- ------------------------------ -------------------- ---------------------------- --------------------------- ------------------------------------- --------------------------------- --------- Palliative care, n (%) 72 (14.9) 10 (5.3) 3 (3.3) 7 (7.2) 4 (3.1) 58 (35.4) \<.0001 RRT delivery 194 (40.4) 139 (73.9) 67 (73.6) 72 (74.2) 55 (42.3) 0 \<.0001 Reason for RRT, n (%) Anuria 112 (23.3) 85 (45.2) 46 (68.7) 39 (40.2) 27 (20.8) --- .07 Metabolic acidosis 106 (22.1) 86 (45.7) 43 (64.2) 43 (44.3) 20 (15.4) --- .005 Hyperkalemia 62 (12.9) 48 (25.5) 24 (35.8) 24 (24.7) 14 (10.8) --- .45 Acute pulmonary edema 33 (6.9) 17 (9.0) 7 (10.5) 10 (10.3) 16 (12.3) --- .02 Volume overload with diuretic resistance 30 (6.3) 17 (9.0) 8 (8.8) 9 (9.3) 13 (10.0) --- .16 Toxic clearance 23 (4.8) 13 (6.9) 4 (4.4) 9 (9.3) 10 (7.7) --- .10 Refractory shock 5 (1.0) 5 (2.7) 3 (3.3) 2 (2.1) 0 --- .32 Hypercalcemia 4 (0.8) 2 (1.1) 0 2 (2.9) 2 (3.6) --- .32 Specific treatment, n (%) Vasopressor use 143 (29.8) 67 (35.6) 71 (78.0) 67 (69.1) 1 (0.8) 4 (2.4) \<.0001 Mechanical ventilation 115 (23.9) 54 (47) 61 (67.0) 54 (55.7) 0 0 \<.0001 Trajectory, n (%) Ward before inclusion \<.0001 Medicine 67 (13.9) 24 (12.8) 8 (8.8) 16 (16.5) 31 (23.9) 12 (7.4) Surgery 23 (4.8) 17 (9.0) 12 (13.2) 5 (5.2) 6 (4.6) 0 Emergency 245 (51.0) 62 (32.9) 33 (36.3) 29 (29.9) 58 (44.6) 125 (77.2) Inhospital death, n (%) 141 (29.4) 80 (42.6) 34 (37.4) 46 (47.4) 12 (9.3) 49 (30.3) \<.0001 30-day mortality, n (%) 141 (29.4) 70 (37.2) 30 (33.0) 40 (41.2) 12 (9.2) 59 (36.4) \<.0001 *Note.* "P" for global comparison between ICU, NW, and OW. ICU = intensive care unit; RRT = renal replacement therapy. {#fig4-2054358119892174} Discussion {#section34-2054358119892174} ========== Our prospective study, conducted over an 18-month period in a tertiary teaching hospital, included 480 patients with severe AKI, that is, 2.3% of overall hospital admissions. Our study showed that this population was relatively old and had frequent comorbidities, which were cardiovascular (92%), diabetes mellitus (37%), cancer (35%), and CKD (50%) before hospitalization. These patients were managed in several different wards, not only in the ICU and NW, and these wards varied according to patients' clinical presentation and laboratory results. The causes of severe AKI varied, with sepsis being predominant in the ICU and renal AKI in the NW. Indications for RRT for AKI also differed between the ICU and the NW, and no patients initially diagnosed in OW had RRT. Finally, the prognosis of our study population with severe AKI and a high rate of comorbidities was poor, with a high inhospital mortality of almost one third. It nonetheless differed according to inclusion ward and was associated with different patterns and care. In this population comprising a subgroup of patients with KDIGO stage 3, the high inhospital mortality rate was probably due not only to AKI but also to the causes of AKI and the high rate of comorbidities. This study underlines that severe AKI is not limited to the ICU and that its clinical presentation and care are extremely heterogeneous. The demographics of the study population were consistent with previous epidemiologic studies, in particular with 2 French cohort studies based on the national discharge database.^[@bibr8-2054358119892174],[@bibr17-2054358119892174]^ We observed that most patients in our cohort had major comorbidities, including but not limited to diabetes, cardiovascular disease, and cancer. The median Charlson index score was 7. Moreover, the median patient age was 72 years. Patients included in the ICU were significantly younger than those included in the NW and OW, as in a nationwide French study.^[@bibr17-2054358119892174]^ A novelty for our cohort is information about CKD history, which was frequent in this population: Around 50% of the patients had previously met the definition for CKD, but only 17% of them were managed by nephrologists. This CKD history rate is higher than that in French administrative database studies or in other studies of AKI, which report rates from 10% to 35%.^[@bibr18-2054358119892174][@bibr19-2054358119892174][@bibr20-2054358119892174][@bibr21-2054358119892174][@bibr22-2054358119892174]-[@bibr23-2054358119892174]^ The high frequency of CKD history may be explained in part by the quality of information collected, due to the study's prospective design and its use of the KDIGO definition of CKD, rather than estimated GFR or administrative codes. It may also be explained by the age profile of our cohort. Gastrointestinal diseases, sepsis, hypovolemia, AKI, and cardiovascular disorders were the leading reasons for hospitalization. These reasons can vary in populations by hospital type, especially in relation to both solid organ transplantation and cardiac surgery, the latter being strongly associated with AKI occurrence. Reports indicate that AKI complicates 18% of hospitalizations for cardiac surgery, with 2% to 6% requiring RRT.^[@bibr24-2054358119892174]^ Otherwise, we observed that 28% of AKI cases were hospital acquired and 72% community acquired. The same ratio was observed in a UK study in 2 tertiary centers (6% of ICU stays and 25% AKI stage 3): 27% hospital acquired vs 73% community acquired.^[@bibr25-2054358119892174]^ In our study, the incidence of severe adult AKI was 2.3% of overall hospitalizations. This finding is consistent with the UK data from a multicentre randomized trial performed in 5 UK hospitals that showed an incidence of 2.5% of severe AKI.^[@bibr26-2054358119892174]^ Sepsis was the leading cause of AKI in our study population, followed by prerenal, postrenal, and cardiorenal AKI. In a Scottish population study of all hospitalized patients (including 8.5% patients in ICU and 35% in the failure stage of the RIFLE classification), sepsis and hypovolemia were the leading causes of AKI.^[@bibr27-2054358119892174]^ In comparison, the study of all hospitals in Madrid (and with 27% of patients in the ICU) by Liano and Pascual^[@bibr22-2054358119892174]^ found the 3 leading causes of AKI to be ATN (45%), hypovolemic AKI (21%), and obstructive AKI (10%). Nonetheless, the definition of AKI was different then, and the cases of ATN probably include some cases of septic AKI, which has only become understood more recently.^[@bibr4-2054358119892174]^ The main indications for RRT in our study were oligoanuria, metabolic acidosis, hyperkalemia, and volume overload---causes similar to those from a Canadian study of a cohort of elderly ICU patients.^[@bibr28-2054358119892174]^ RRT in our hospital is performed by a continuous venovenous hemodiafiltration technique in the ICU (medical and surgical) and by intermittent hemodialysis in the NW. Because the study design was observational, we described the frequency of RRT indication according to the ward of inclusion. The frequency of RRT differed according to not only inclusion ward but also the causes of RRT, patient comorbidities, and AKI causes. We described the population and practices according to the ward and observed different rates of RRT according to the ward but also for indication or no indication of RRT showing heterogeneity of this population with severe AKI. For the overall population, we report that hospital mortality and 30-day mortality were similar, around 29%. Hospital mortality for RRT patients was 40.2%. A multicentre, stepped-wedge cluster randomized trial performed in 5 UK hospitals included patients with AKI aged ≥18 years and observed an overall 30-day mortality rate of 24.5%.^[@bibr26-2054358119892174]^ In the French cohort studies based on the national discharge database for patients with AKI requiring RRT, the inhospital mortality of 47% was similar to ours.^[@bibr17-2054358119892174]^ The strength of this study is its prospective design and the quality of information collected for medical history. We used the entire KDIGO definition of CKD, because it is frequently underestimated by focusing only on GFR in studies based on medical administrative databases. Thus, this prospective analysis of all adults with severe AKI in a university hospital allows us to show the frequent comorbidities and heterogeneity of severe AKI in clinical presentation, severity, and care in different hospital departments. Its results emphasize that the care of patients with severe AKI depends on the presence of treatment limitations and that the indications for RRT differ between intensivists and nephrologists. Limitations {#section35-2054358119892174} ----------- Our study has several limitations that must be considered in interpreting our data. First, we studied a subgroup of patients with KDIGO stage 3 AKI with a restricted definition that does not include the urine output criteria or the tripling of baseline SCr with a maximum SCr below 354 µmol/L. The single-center design in a tertiary hospital with no cardiac surgery ward or solid organ transplantation limits the generalizability of this result without limiting the extent of heterogeneity in the population. This study indicates the substantial heterogeneity of severe AKI and reinforces the fact that AKI is not a single disease and is not managed only in ICUs. This probably implies the need for an individualized patient-centered approach and the wide implementation of the KDIGO AKI classification to discuss the planning of care. Conclusion {#section36-2054358119892174} ========== This study reports 3 hospitalization patterns in patients with severe AKI. Only 39% of these patients are hospitalized in the ICU, 27% are in the NW, and 34% in OW. Clinical presentation, AKI cause, and thus its care, including reasons for RRT, differ according to the department of hospitalization with broad heterogeneity for the same AKI stage. The heterogeneity of severe AKI and of its treatment in this population of a subgroup of patients with stage 3 KDIGO AKI implies the need for more individualized and patient-centered care and for improvement of prognostic tools to include more information than simply SCr and diuresis. The authors thank the University Hospital of Nîmes for its structural, human, and financial support through the award obtained by our team during the internal call for tenders "Thématiques émergentes." The authors also thank Jo Ann Cahn for reviewing the English. **Ethics Approval and Consent to Participate:** This study was approved by the Ethics Committee and the French Data Protection Authority (Commission Nationale Informatique & Libertés; CNIL number: 1963867v0). **Consent for Publication:** All authors consent to the publication of this study. **Availability of Data and Materials:** The data and materials are not available for this study. **Author Contributions:** O.M. conceived and designed the study. C.A., L.M., S.D.B., R.T., Z.M., J.-Y.L., and O.M. analyzed and interpreted the data. C.A., L.M., S.D.B., J.-Y.L., D.-P.D.B., and O.M. drafted and revised the article. C.A., L.M., P.R., S.C., S.D.B., R.T., Z.M., J.-Y.L., and O.M. provided intellectual content of critical importance to the work described. C.A., L.M., P.R., S.C., S.D.B., R.T., Z.M., D.-P.D.B., J.-Y.L., and O.M. approved the final version to be published. **Declaration of Conflicting Interests:** The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. **Funding:** The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: The current study is part of the thematic portfolio for clinical research studies which were at least partly supported through the University Hospital of Nîmes call for internal bids "Thématiques émergentes." **ORCID iD:** Olivier Moranne  <https://orcid.org/0000-0002-3127-1415> | Mid | [
0.590021691973969,
34,
23.625
] |
Q: How to save data from a row in ajax to the database? I have created a table which displays data from the databaseand have given the users the option to add rows to it. I have also added the necessary Ajax script so that whenever users click the button "add" a new row appears at the bottom of the table. I am not able to find a way to save the data entered by the user in the newly added row to the database. `<table border = "1" width = "50%" id="bill"> <tr> <th>Item no</th> <th>Product Code</th> <th>Dates</th> <th>Quantity</th> <th>Amount</th> <th>Net Amount</th> <th>Tax</th> <th>Choose option</th> </tr> <c:forEach var = "row" items = "${result.rows}"> <tr> <td><c:out value = "${row.Item_no}"/></td> <td><c:out value = "${row.Product_Code}"/></td> <td><c:out value = "${row.Dates}"/></td> <td><c:out value = "${row.Quantity}"/></td> <td><c:out value = "${row.Amount}"/></td> <td><c:out value="${row.Amount * row.Quantity}"/></td> <td><input type="text" name="Tax" value=""></td> <td><input type="text" name="gross" value=""></td> </tr> ' <input type="button" id="addrow" href="#" value="ADD">//the code to display the table with data from data base along with the add rows option $(document).ready(function() { var t = $('#bill'); var counter = $('#bill tr').size() + 1; console.log(counter); $('#addrow').on( 'click', function () { t.append('<tr width="80%"><td><input type="text" name="Item_No" id="item" value = "" ></td><td><input type="text" name="Product_code" id="pc"></td>\n\ <td><input type="text" name="Date" id="date"></td><td><input type="text" name="Quantity" id="quantity"></td>\n\ <td><input type="text" name="Amount" id="amount"></td><td><input type="text" name="Net Amount" id="net"></td>\n\ <td><input type="text" name="Tax" id="tax"></td><td><input type="text" name="Gross" id="gross"></td>\n\ </tr>'); counter++; } ); //The code which displays a new row at the bottom of the table when the users click add option . This is where the user enters his new data and I need to save it to the database. A: Whenever you will click on addrow a new row will append in your table , so there are 2 way you can save value to database .They are as follow : 1). Whenever you append new row ,user will fill inputs to it and then you can create one submit btn in your row and i.e : $('#addrow').on( 'click', function () { t.append('<tr width="80%"> <form action="url" method="post"> <td><input type="text" name="Item_No" id="item" value = "" ></td> <td><input type="text" name="Product_code" id="pc"></td>\n\ //your input field <td><input type="submit" name="submit" value="add to db"><td> </form> </tr>'); counter++; }); so,whenever you will click on submit btn data will go to urlprovided by you and then you can use ,request.getParameter("Product_code"); to get values and save values in database . 2) .You can use ajax ,whenever you append new row add a button also to it $('#addrow').on( 'click', function () { t.append('<tr width="80%"> <td><input type="text" name="Item_No" id="item" value = "" ></td> <td><input type="text" name="Product_code" id="pc"></td>\n\ //your input field <td><input type="button" name="submit" id="addtodb" value="add to db"><td>//add this button </tr>'); counter++; }); When user will click on btn you can get all values of input field and then pass to ajax and save them in database like below : $('#addtodb').on( 'click', function () { var pc=$("#pc").val();//getting value of input field var quantity=$("#quantity").val(); $.ajax({ url:"yourclasspageurl", method:"POST", data:{ quantity:quantity,pc:pc} //passing data to specified url success:function(data){ //do something } }); }); Get all , above values same using request.getParameter("quantity"); and save data to database. Hope this help you . | Mid | [
0.54739336492891,
28.875,
23.875
] |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!--NewPage--> <HTML> <HEAD> <!-- Generated by javadoc (build 1.4.2_18) on Thu Jul 31 15:03:54 GMT+01:00 2008 --> <TITLE> PresentationTextData (Apache FOP 0.95 API) </TITLE> <META NAME="keywords" CONTENT="org.apache.fop.render.afp.modca.PresentationTextData class"> <LINK REL ="stylesheet" TYPE="text/css" HREF="../../../../../../stylesheet.css" TITLE="Style"> <SCRIPT type="text/javascript"> function windowTitle() { parent.document.title="PresentationTextData (Apache FOP 0.95 API)"; } </SCRIPT> </HEAD> <BODY BGCOLOR="white" onload="windowTitle();"> <!-- ========= START OF TOP NAVBAR ======= --> <A NAME="navbar_top"><!-- --></A> <A HREF="#skip-navbar_top" title="Skip navigation links"></A> <TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY=""> <TR> <TD COLSPAN=3 BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A NAME="navbar_top_firstrow"><!-- --></A> <TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY=""> <TR ALIGN="center" VALIGN="top"> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A> </TD> <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> <FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="class-use/PresentationTextData.html"><FONT CLASS="NavBarFont1"><B>Use</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A> </TD> </TR> </TABLE> </TD> <TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM> fop 0.95</EM> </TD> </TR> <TR> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> <A HREF="../../../../../../org/apache/fop/render/afp/modca/PageObject.html" title="class in org.apache.fop.render.afp.modca"><B>PREV CLASS</B></A> <A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextDescriptor.html" title="class in org.apache.fop.render.afp.modca"><B>NEXT CLASS</B></A></FONT></TD> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> <A HREF="../../../../../../index.html" target="_top"><B>FRAMES</B></A> <A HREF="PresentationTextData.html" target="_top"><B>NO FRAMES</B></A> <SCRIPT type="text/javascript"> <!-- if(window==top) { document.writeln('<A HREF="../../../../../../allclasses-noframe.html"><B>All Classes</B></A>'); } //--> </SCRIPT> <NOSCRIPT> <A HREF="../../../../../../allclasses-noframe.html"><B>All Classes</B></A> </NOSCRIPT> </FONT></TD> </TR> <TR> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> SUMMARY: NESTED | <A HREF="#fields_inherited_from_class_org.apache.fop.render.afp.modca.AbstractAFPObject">FIELD</A> | <A HREF="#constructor_summary">CONSTR</A> | <A HREF="#method_summary">METHOD</A></FONT></TD> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> DETAIL: FIELD | <A HREF="#constructor_detail">CONSTR</A> | <A HREF="#method_detail">METHOD</A></FONT></TD> </TR> </TABLE> <A NAME="skip-navbar_top"></A> <!-- ========= END OF TOP NAVBAR ========= --> <HR> <!-- ======== START OF CLASS DATA ======== --> <H2> <FONT SIZE="-1"> org.apache.fop.render.afp.modca</FONT> <BR> Class PresentationTextData</H2> <PRE> java.lang.Object <IMG SRC="../../../../../../resources/inherit.gif" ALT="extended by"><A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html" title="class in org.apache.fop.render.afp.modca">org.apache.fop.render.afp.modca.AbstractAFPObject</A> <IMG SRC="../../../../../../resources/inherit.gif" ALT="extended by"><B>org.apache.fop.render.afp.modca.PresentationTextData</B> </PRE> <HR> <DL> <DT>public class <B>PresentationTextData</B><DT>extends <A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html" title="class in org.apache.fop.render.afp.modca">AbstractAFPObject</A></DL> <P> Presentation text data contains the graphic characters and the control sequences necessary to position the characters within the object space. The data consists of: - graphic characters to be presented - control sequences that position them - modal control sequences that adjust the positions by small amounts - other functions causing text to be presented with differences in appearance. The graphic characters are expected to conform to a coded font representation so that they can be translated from the code point in the object data to the character in the coded font. The units of measure for linear displacements are derived from the PresentationTextDescriptor or from the hierarchical defaults. In addition to graphic character code points, Presentation Text data can contain embedded control sequences. These are strings of two or more bytes which signal an alternate mode of processing for the content of the current Presentation Text data. <P> <P> <HR> <P> <!-- ======== NESTED CLASS SUMMARY ======== --> <!-- =========== FIELD SUMMARY =========== --> <A NAME="field_summary"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TD COLSPAN=2><FONT SIZE="+2"> <B>Field Summary</B></FONT></TD> </TR> </TABLE> <A NAME="fields_inherited_from_class_org.apache.fop.render.afp.modca.AbstractAFPObject"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor"> <TD><B>Fields inherited from class org.apache.fop.render.afp.modca.<A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html" title="class in org.apache.fop.render.afp.modca">AbstractAFPObject</A></B></TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html#log">log</A></CODE></TD> </TR> </TABLE> <!-- ======== CONSTRUCTOR SUMMARY ======== --> <A NAME="constructor_summary"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TD COLSPAN=2><FONT SIZE="+2"> <B>Constructor Summary</B></FONT></TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE><B><A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextData.html#PresentationTextData()">PresentationTextData</A></B>()</CODE> <BR> Default constructor for the PresentationTextData.</TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE><B><A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextData.html#PresentationTextData(boolean)">PresentationTextData</A></B>(boolean controlInd)</CODE> <BR> Constructor for the PresentationTextData, the boolean flag indicate whether the control sequence prefix should be set to indicate the start of a new control sequence.</TD> </TR> </TABLE> <!-- ========== METHOD SUMMARY =========== --> <A NAME="method_summary"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TD COLSPAN=2><FONT SIZE="+2"> <B>Method Summary</B></FONT></TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1"> <CODE> void</CODE></FONT></TD> <TD><CODE><B><A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextData.html#createLineData(int, int, int, int, int, int, java.awt.Color)">createLineData</A></B>(int x1, int y1, int x2, int y2, int thickness, int orientation, java.awt.Color col)</CODE> <BR> Drawing of lines using the starting and ending coordinates, thickness and colour arguments.</TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1"> <CODE> void</CODE></FONT></TD> <TD><CODE><B><A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextData.html#createTextData(int, int, int, int, java.awt.Color, int, int, byte[])">createTextData</A></B>(int fontNumber, int x, int y, int orientation, java.awt.Color col, int vsci, int ica, byte[] data)</CODE> <BR> Create the presentation text data for the byte array of data.</TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1"> <CODE> void</CODE></FONT></TD> <TD><CODE><B><A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextData.html#endControlSequence()">endControlSequence</A></B>()</CODE> <BR> A control sequence is a sequence of bytes that specifies a control function.</TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1"> <CODE> void</CODE></FONT></TD> <TD><CODE><B><A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextData.html#writeDataStream(java.io.OutputStream)">writeDataStream</A></B>(java.io.OutputStream os)</CODE> <BR> Accessor method to write the AFP datastream for the text data.</TD> </TR> </TABLE> <A NAME="methods_inherited_from_class_org.apache.fop.render.afp.modca.AbstractAFPObject"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor"> <TD><B>Methods inherited from class org.apache.fop.render.afp.modca.<A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html" title="class in org.apache.fop.render.afp.modca">AbstractAFPObject</A></B></TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html#writeObjectList(java.util.List, java.io.OutputStream)">writeObjectList</A></CODE></TD> </TR> </TABLE> <A NAME="methods_inherited_from_class_java.lang.Object"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor"> <TD><B>Methods inherited from class java.lang.Object</B></TD> </TR> <TR BGCOLOR="white" CLASS="TableRowColor"> <TD><CODE>clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait</CODE></TD> </TR> </TABLE> <P> <!-- ============ FIELD DETAIL =========== --> <!-- ========= CONSTRUCTOR DETAIL ======== --> <A NAME="constructor_detail"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TD COLSPAN=1><FONT SIZE="+2"> <B>Constructor Detail</B></FONT></TD> </TR> </TABLE> <A NAME="PresentationTextData()"><!-- --></A><H3> PresentationTextData</H3> <PRE> public <B>PresentationTextData</B>()</PRE> <DL> <DD>Default constructor for the PresentationTextData. <P> </DL> <HR> <A NAME="PresentationTextData(boolean)"><!-- --></A><H3> PresentationTextData</H3> <PRE> public <B>PresentationTextData</B>(boolean controlInd)</PRE> <DL> <DD>Constructor for the PresentationTextData, the boolean flag indicate whether the control sequence prefix should be set to indicate the start of a new control sequence. <P> <DT><B>Parameters:</B><DD><CODE>controlInd</CODE> - The control sequence indicator.</DL> <!-- ============ METHOD DETAIL ========== --> <A NAME="method_detail"><!-- --></A> <TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY=""> <TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor"> <TD COLSPAN=1><FONT SIZE="+2"> <B>Method Detail</B></FONT></TD> </TR> </TABLE> <A NAME="createTextData(int, int, int, int, java.awt.Color, int, int, byte[])"><!-- --></A><H3> createTextData</H3> <PRE> public void <B>createTextData</B>(int fontNumber, int x, int y, int orientation, java.awt.Color col, int vsci, int ica, byte[] data) throws <A HREF="../../../../../../org/apache/fop/render/afp/modca/MaximumSizeExceededException.html" title="class in org.apache.fop.render.afp.modca">MaximumSizeExceededException</A></PRE> <DL> <DD>Create the presentation text data for the byte array of data. <P> <DD><DL> <DT><B>Parameters:</B><DD><CODE>fontNumber</CODE> - The font resource identifier.<DD><CODE>x</CODE> - The x coordinate for the text data.<DD><CODE>y</CODE> - The y coordinate for the text data.<DD><CODE>orientation</CODE> - The orientation of the text data.<DD><CODE>col</CODE> - The text color.<DD><CODE>vsci</CODE> - The variable space character increment.<DD><CODE>ica</CODE> - The inter character adjustment.<DD><CODE>data</CODE> - The text data to be created. <DT><B>Throws:</B> <DD><CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/MaximumSizeExceededException.html" title="class in org.apache.fop.render.afp.modca">MaximumSizeExceededException</A></CODE></DL> </DD> </DL> <HR> <A NAME="createLineData(int, int, int, int, int, int, java.awt.Color)"><!-- --></A><H3> createLineData</H3> <PRE> public void <B>createLineData</B>(int x1, int y1, int x2, int y2, int thickness, int orientation, java.awt.Color col) throws <A HREF="../../../../../../org/apache/fop/render/afp/modca/MaximumSizeExceededException.html" title="class in org.apache.fop.render.afp.modca">MaximumSizeExceededException</A></PRE> <DL> <DD>Drawing of lines using the starting and ending coordinates, thickness and colour arguments. <P> <DD><DL> <DT><B>Parameters:</B><DD><CODE>x1</CODE> - The starting X coordinate.<DD><CODE>y1</CODE> - The starting Y coordinate.<DD><CODE>x2</CODE> - The ending X coordinate.<DD><CODE>y2</CODE> - The ending Y coordinate.<DD><CODE>thickness</CODE> - The line thickness.<DD><CODE>orientation</CODE> - The orientation of the text data.<DD><CODE>col</CODE> - The text color. <DT><B>Throws:</B> <DD><CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/MaximumSizeExceededException.html" title="class in org.apache.fop.render.afp.modca">MaximumSizeExceededException</A></CODE></DL> </DD> </DL> <HR> <A NAME="writeDataStream(java.io.OutputStream)"><!-- --></A><H3> writeDataStream</H3> <PRE> public void <B>writeDataStream</B>(java.io.OutputStream os) throws java.io.IOException</PRE> <DL> <DD>Accessor method to write the AFP datastream for the text data. <P> <DD><DL> <DT><B>Specified by:</B><DD><CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html#writeDataStream(java.io.OutputStream)">writeDataStream</A></CODE> in class <CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/AbstractAFPObject.html" title="class in org.apache.fop.render.afp.modca">AbstractAFPObject</A></CODE></DL> </DD> <DD><DL> <DT><B>Parameters:</B><DD><CODE>os</CODE> - The stream to write to <DT><B>Throws:</B> <DD><CODE>java.io.IOException</CODE></DL> </DD> </DL> <HR> <A NAME="endControlSequence()"><!-- --></A><H3> endControlSequence</H3> <PRE> public void <B>endControlSequence</B>() throws <A HREF="../../../../../../org/apache/fop/render/afp/modca/MaximumSizeExceededException.html" title="class in org.apache.fop.render.afp.modca">MaximumSizeExceededException</A></PRE> <DL> <DD>A control sequence is a sequence of bytes that specifies a control function. A control sequence consists of a control sequence introducer and zero or more parameters. The control sequence can extend multiple presentation text data objects, but must eventually be terminated. This method terminates the control sequence. <P> <DD><DL> <DT><B>Throws:</B> <DD><CODE><A HREF="../../../../../../org/apache/fop/render/afp/modca/MaximumSizeExceededException.html" title="class in org.apache.fop.render.afp.modca">MaximumSizeExceededException</A></CODE></DL> </DD> </DL> <!-- ========= END OF CLASS DATA ========= --> <HR> <!-- ======= START OF BOTTOM NAVBAR ====== --> <A NAME="navbar_bottom"><!-- --></A> <A HREF="#skip-navbar_bottom" title="Skip navigation links"></A> <TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY=""> <TR> <TD COLSPAN=3 BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A NAME="navbar_bottom_firstrow"><!-- --></A> <TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY=""> <TR ALIGN="center" VALIGN="top"> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A> </TD> <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> <FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="class-use/PresentationTextData.html"><FONT CLASS="NavBarFont1"><B>Use</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A> </TD> <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1"> <A HREF="../../../../../../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A> </TD> </TR> </TABLE> </TD> <TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM> fop 0.95</EM> </TD> </TR> <TR> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> <A HREF="../../../../../../org/apache/fop/render/afp/modca/PageObject.html" title="class in org.apache.fop.render.afp.modca"><B>PREV CLASS</B></A> <A HREF="../../../../../../org/apache/fop/render/afp/modca/PresentationTextDescriptor.html" title="class in org.apache.fop.render.afp.modca"><B>NEXT CLASS</B></A></FONT></TD> <TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2"> <A HREF="../../../../../../index.html" target="_top"><B>FRAMES</B></A> <A HREF="PresentationTextData.html" target="_top"><B>NO FRAMES</B></A> <SCRIPT type="text/javascript"> <!-- if(window==top) { document.writeln('<A HREF="../../../../../../allclasses-noframe.html"><B>All Classes</B></A>'); } //--> </SCRIPT> <NOSCRIPT> <A HREF="../../../../../../allclasses-noframe.html"><B>All Classes</B></A> </NOSCRIPT> </FONT></TD> </TR> <TR> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> SUMMARY: NESTED | <A HREF="#fields_inherited_from_class_org.apache.fop.render.afp.modca.AbstractAFPObject">FIELD</A> | <A HREF="#constructor_summary">CONSTR</A> | <A HREF="#method_summary">METHOD</A></FONT></TD> <TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2"> DETAIL: FIELD | <A HREF="#constructor_detail">CONSTR</A> | <A HREF="#method_detail">METHOD</A></FONT></TD> </TR> </TABLE> <A NAME="skip-navbar_bottom"></A> <!-- ======== END OF BOTTOM NAVBAR ======= --> <HR> Copyright 1999-2008 The Apache Software Foundation. All Rights Reserved. </BODY> </HTML> | Low | [
0.44875346260387805,
20.25,
24.875
] |
Step 3: Send us your tax forms Registered Disability Savings Plan (RDSP) Already have a Disability Tax Credit Certificate and under 49 years old? Access lifetime maximums of $70,000 from Canada Disability Savings Grants and up to $20,000 from Canada Disability Savings Bonds. | Low | [
0.46341463414634104,
23.75,
27.5
] |
Product Description There's nothing delicate about the Ed Hardy Men's Bolt Los Angeles Watch #BT-LA with its oval stainless steel case and thick black leather band. A white skull with checker flagged bones screams amidst writhing serpents on a black dial in this dark tattoo-inspired watch by tattoo artist Don Ed Hardy. Keeping with the rugged look and feel, the steel bezel is dotted with raised Arabic numerals at three, six, nine, and 12 o'clock while flathead screws mark the hours in between. A calendar window displaying the date sits at the three o'clock. Fastened with a silver buckle, this Ed Hardy original relies on Japanese Quartz movement and is water resistant up to 330 feet (100 meters). Product Specifications Watch Information Brand Name: Ed Hardy Dial window material type: hardened mineral Display Type: analog Clasp: Buckle Case material: stainless-steel 316L Case diameter: 51 millimeters Case Thickness: 10 millimeters Band material: leather-pig-skin Band length: unisex Band width: 35 millimeters Band Color: black Dial color: red Bezel material: stainless-steel Bezel Function: stationary Movement: Japanese-Quartz Water resistant depth: 330 Feet Customer Review Product Reviews Write Your Own Review 1. How do you rate this product? 2. Write a headline for your review here: 3. Write your review here: 4. Enter your name: (optional) 5. Enter the code below: This product hasn't received any reviews yet. Be the first to review this product! | Low | [
0.5267326732673261,
33.25,
29.875
] |
Q: Is there a megametre (Mm)? With miles, there are no SI prefixes, so, you just write "every 3k/10k miles". With kilometres, there's already an SI prefix present. What's the sane way to write, say, "5000 / 16'000 km" in a shorter form, without all the zeros? A: Yes you can apply all SI prefixes to meters. So a megameter would be one million meters or 1000 kilometers. Gigameter is 1000 megameters. Terameter is 1000 gigameters. Petameter is 1000 terameters etc. Gigameter and higher are usually only used in the context of space and astronomy because in normal contexts it is impossible to visualize or relate those distances. People don't simplify down 120,000 km to 120 Mm because of tradition and because their odometer reads in kilometres, and also because it is hard to relate to a megameter. | Mid | [
0.6120906801007551,
30.375,
19.25
] |
Supporting the University of Texas at San Antonio's ascent to premier research university status, UTSA Libraries Special Collections sustains the university's teaching, research and outreach mission by acquiring, preserving and digitizing primary resources for use by students and scholars at UTSA and from around the world. Starting in 2008, UTSA Libraries Special Collectons began harvesting in partnership with Archive-It. Our collecting focus includes university and university-affiliated sites, and sites relevant to Texas and the Southwest (Border Studies, Gender Studies, South Texas and San Antonio History), including food culture and renewable energy. For more information, see our collection development policy at: http://lib.utsa.edu/collections/web-collection-development-guidelines/ Sites and collections from this organization are listed below. Narrow your results at left, or enter a search query below to find a collection, site, specific URL or to search the text of archived webpages. A collection of websites and blogs chosen by subject specialists from Special Collections of the University of Texas at San Antonio Libraries. Areas of focus include renewable or alternative energy, primarily wind and solar, in Texas. A collection of web sites maintained by San Antonio restaurants, with a focus on Mexican and Tex-Mex cuisine. Most sites include menus; by comparing crawls over time, it is possible to document the ongoing evolution of San Antonio's culinary scene over time. Websites, videos, blogs and other resources covering Tejano and Conjunto music. These popular music genres originated from south Texas, with similarities to the Mexican norteño, but is also influenced by several American musical genres and in particular features elements of polka. The basic duo of accordion and bajo sexto (12-string bass guitar) has grown to include other instruments (drum kit, bass guitar, etc.) but these two instruments still characterize the sound of the ensemble. | High | [
0.70379746835443,
34.75,
14.625
] |
Q: Adding an 'Add more' button to a settings form in the backend For my module I need a settings form where administrators should be able to enter an arbitrary number of variables. I have tried setting up an AJAX 'Add more' button, analogous to the example found in the AJAX example module. When I click the button, it doesnt add an extra field and I don't get any errors. Can anyone help me out? Example code, and my code: https://gist.github.com/Tagini/8282034 A: It turns out I had two problems: I have jquery_update installed, which included a version too recent for the backend. I configured a previous version and I got a whole step further. I did not have my $form and $form_state as input parameters in my main form function and as such the field count was not updated. | Mid | [
0.628242074927953,
27.25,
16.125
] |
{ "frames": [ "Light0", "Light1", "Light2", "LightMoss", "Light3", "Light4", "Light5", "Mixed", "Dark0", "Dark1", "Dark2", "DarkDiamond", "Dark3", "Dark4", "Dark5" ], "tags": "tile dungeon", "blockIdentity": "images._tile" } | Low | [
0.510158013544018,
28.25,
27.125
] |
Flaxseed reverses atherosclerotic lesion formation and lowers lipoprotein(a) in ovarian hormone deficiency. The incidence of cardiovascular disease dramatically increases during menopause, and postmenopausal women seek natural alternatives to hormone therapy. Flaxseed can slow the progression of atherosclerotic lesion formation; however, it is not known whether it can reverse formation that has already occurred. Seventy-two female Golden Syrian hamsters were randomly divided into six groups (n = 12), sham-operated (sham) or ovariectomized (ovx), and kept on the same diet for 120 days to allow for atherosclerotic lesion development. After this 120-day period, whole flaxseed was introduced to the diets of hamsters in three of the groups: group 1 (sham + casein); group 2 (ovx + casein); group 3 (ovx + 7.5% flaxseed); group 4 (ovx + 15% flaxseed); group 5 (ovx + 22.5% flaxseed); and group 6 (ovx + 17β-estradiol). This diet was maintained for an additional 120 days. Lesion regression was examined histologically, and serum was analyzed for total cholesterol, triglyceride, low-density lipoprotein cholesterol, high-density lipoprotein cholesterol, Apo A, Apo B, and lipoprotein(a). Results showed that 15% and 22.5% flaxseed, compared with ovx animals, significantly reduced lipoprotein(a) (4.4 mg/dL [ovx] vs 2.15 mg/dL [15% flaxseed] and 0.3 mg/dL [22.5% flaxseed]; P < 0.05) and Apo B (2.8 mg/dL [ovx] vs 2.4 mg/dL [15% flaxseed] and 2.5 mg/dL [22.5% flaxseed]). Flax reduced by 67% the number of animals with aortic arch lesions. All three doses of flax reduce the severity of lesion formation compared with ovx controls. These results support the efficacy of flaxseed in reducing cardiovascular disease risk. | High | [
0.675105485232067,
30,
14.4375
] |
The present invention relates to carbapenem antibiotics and, more particularly, to carbapenem compounds having a xcex2-orientated methyl group introduced at 1-position and 1-[(heterocyclyl)-azetidin-3-yl]thio group at the 2-position of carbapenem skeleton, and to antibacterial compositions containing the same as an active ingredient. Since the discovery of thienamycin [U.S. Pat. No. 3,950,357; J. Am. Chem. Soc., 100, 313(1987)], there have been proposed many carbapenem antibiotic substances, and among them imipenem (INN) have been developed as a practically useful carbapenem antibiotic substance, and is widely used in clinical field. Although the imipenem, developed at first as carbapenem antibiotic substance, exhibits wide antibacterial activities against gram positive or negative bacteria, it possesses the disadvantage that it is decomposed within a short period of time by renal dehydropeptidase (DHP) in the living body. For this reason, imipenem cannot be administered singly, and must be used in combination with a DHP inhibitor in order to control its decomposition leading to inactivation. Therefore, its formulation for clinical administration is a combination with cilastatin (INN) that is a DHP inhibitor. An antibacterial agent preferred for practical clinical use; however, is one that alone can demonstrate antibacterial activity. Furthermore, the DHP inhibitor to be combined with the antibiotic could exert undesirable action on tissues of the living body. For these reasons, the combined use should be avoided wherever possible. Thus, there has been a growing demand for a carbapenem compound having sufficiently high degrees of both antibacterial activity and resistance to DHP. There were proposed some carbapenem compounds of the type that could achieve the above-mentioned objectives. Such carbapenem compounds are 1-methylcarbapenem compounds in which a methyl group is introduced at the 1-position of the carbapenem skeleton, and it is reported that these carbapenem compounds are not only resistant to DHP but also more chemically stable than those having no methyl group at the 1-position of the carbapenem skeleton. Under these circumstances, many researchers have specifically attempted to modify a side-chain substituent at 2-position of 1-methylcarbapenem compounds, and as a result, meropenem and biapenem are proposed for the carbapenem antibiotics that can be administered singly. Although, the carbapenem compounds possess a potent antibacterial activity with a broad spectrum, it is anticipated that the resistant strain, which is a problem in the field of xcex2-lactam antibiotics, will appear. That is, it is well anticipated for new carbapenem antibiotics to be effective at first, but long time clinical use of it will gradually cause the resistant to appear. Therefore, there always is constant demand for development of new compounds having excellent antibacterial activity in the antibacterial field. Under these circumstances, it is the purpose of the present invention to provide new carbapenem compounds having high antibacterial activities and a strong action of inhibiting xcex2-lactamase as well as improved resistance to DHP. Accordingly, one subject of the present invention is to provide carbapenem compounds represented by the following formula (I): wherein R is hydrogen atom, or substituted or unsubstituted lower alkyl group; and, n is an integer of 1 or 2, or a pharmaceutically acceptable salt thereof. Another subject of the present invention is to provide ester compounds of formula (I), in which carboxylic acid group at 3-position is converted to ester form by various kinds of ester residues. These ester residues may be conventional ester residues, which are widely used for ester moieties for carboxylic group in this field. The carbapenem compounds according to the present invention are characterized in that the substituent at the 2-position of 1-methyl carbapenem skeleton is specific 1-heterocyclyl-azetidin-3-ylthio group, which is never demonstrated for substituent for 2-position, and have superior antibacterial activities. Therefore, still another subject of the present invention is to provide an antibacterial agent containing the carbapenem compounds represented by the formula (I) above, ester thereof or pharmaceutically acceptable salt thereof claimed in claim 1 as an active ingredient. The present invention is described in more detail in the following. The terms used throughout the present specification have following meanings. The term xe2x80x9clowerxe2x80x9d qualifying a group or a compound means that the group or the compound qualified has 1 to 7, preferably 1 to 4, carbon atoms. The term xe2x80x9clower alkyl groupxe2x80x9d stands for a linear or branched alkyl group such as methyl, ethyl, n-propyl, isopropyl, n-butyl, isobutyl, sec-butyl, tert-butyl, n-pentyl, isopentyl, n-hexyl, isohexyl, n-heptyl, isoheptyl and so on. Substituents, which can substitute to said lower alkyl group, are hydroxy group; lower alkoxy group; halogen atom such as chlorine, bromine, and so on; mono-substituted amino group; di-substituted amino group such as dimethylamino, diethylamino, methylethylamino, and the like; phenyl; substituted phenyl such as hydroxyphenyl, methylphenyl, dimethylphenyl, aminophenyl, aminomethylphenyl, nitrophenyl, and so on; nitro group; acetyl group, and the like. When the carbapenem compounds of the present invention have an asymmetric carbon atom at the side chain of the 2-position, the isomers can be stereo-selectively obtained by using optically active starting materials, and each isomer can be isolated from the stereoisomeric mixture by usual method. Therefore, each isomer per se, as well as the stereoisomeric mixture, should be included in the compounds of the present invention. The following are the typical carbapenem compounds of the present invention. (1R,5S,6S)-2-[1-(1,3-imidazolin-2-yl)azetidin-3-yl]thio-6-[(R)-1-hydroxyethyl]-1-methylcarbapen-2-em-3-carbolic acid; (1R,5S,6S)-2-[1-(1-methy-2-imidazolin-2-yl)azetidin-3-yl]-thio -6-[(R)-1-hydroxyethyl]-1-methylcarbapen-2-em-3-carbolic acid; (1R,5S,6S)-2-[1-(1,4,5,6-tetrahydropyrimidin-2-yl)azetidin-3-yl]thio -6-[(R)-1-hydroxyethyl]-1-methylcarbapen-2-em-3-carbolic acid; (1R,5S,6S)-2-[1-(1-methyl-1,4,5,6-tetrahydropyrimidin-2-yl) azetidin-3-yl]thio-6-[(R)-1-hydroxyethyl]-1-methylcarbapen-2-em-3-carbolic acid; (1R,5S,6S)-2-[1-(1-(4-aminomethylbenzyl)-2-imidazolin-2-yl) azetidin-3-yl]thio-6[-(R)-1-hydroxyethyl]-1-methylcarbapen-2-em-3-carbolic acid. Examples of the pharmaceutically acceptable salt of carbapenem compound of the present invention include non-toxic inorganic or organic salts thereof. The inorganic salts may include alkali metal salt such as sodium, potassium and the like; alkali earth metal salt such as calcium, magnesium and the like; and ammonium salt thereof. The organic salts may include triethylamine, pyridine, picoline, ethanolamine, triethanolamine, dicyclohexyl amine, N,Nxe2x80x2-dibenzyl-ethylenediamine and the like. Furthermore, the carbapenem compounds of the present invention may be converted into a pharmaceutically acceptable acid addition salt thereof with organic or inorganic acids. Examples of inorganic acids include hydrochloric acid, nitric acid, hydrobromic acid, sulfuric acid and phosphoric acid. Examples of organic acids include organic acid such as formic acid, acetic acid, trifluoroacetic acid, maleic acid, tartaric acid, methanesulfonic acid, benzenesulfonic acid and so on; and basic or acidic amino acid such as arginine, aspartic acid, glutamic acid and the like. The ester compound of the present invention may include ester compound prepared by the ester residue mentioned later. The carbapenem compound of the present invention may be prepared in accordance with the processes as illustrated by the reaction scheme A shown below. wherein Ra is acyl group; R1 is carboxyl protecting group; and R and n have the same meanings as above. The term xe2x80x9cacyl groupxe2x80x9d represented by Ra may be, in a narrow sense, a moiety obtained by removing the hydroxyl group from the carboxyl group of an organic carboxylic acid as well as, in a broader sense, any acyl group derived from an organic sulfonic acid or an organic phosphoric acid. Such an acyl group may include, for example, a lower alkanoyl group such as acetyl, propionyl, butyryl or the like; a (halo) lower alkyl sulfonyl group such as methanesulfonyl, trifluoromethanesulfonyl or the like; a substituted or unsubstituted arylsulfonyl group such as benzenesulfonyl, p-nitrobenzenesulfonyl, p-bromobenzenesulfonyl, toluenesulfonyl, 2,4,6-triisopropylbenzenesulfonyl or the like; and diphenylphosphoryl. The term xe2x80x9ccaroboxyl protecting groupxe2x80x9d represented by R1 may stands for ester group. Examples include lower alkyl ester such as methyl ester, ethyl ester, n-propyl ester, isopropyl ester, n-, iso- or tert-butyl ester, n-hexyl ester or the like; aralkyl ester such as benzyl ester, p-nitrobenzyl ester, o-nitrobenzyl ester, 2,4-dinitrobenzyl ester, p-chlorobenzyl ester, p-bromobenzyl ester, p-methoxybenzyl ester or the like; lower aliphatic acyloxyalkyl ester such as acetoxymethyl ester, acetoxyethyl ester, propionyloxymethyl ester, n- or iso-butyryloxymethyl ester or the like. According to Process (a) of the reaction scheme (A), the compound of formula (IV) is obtained by reacting the compound (II) with the compound (III). The reaction of the compound (II) with the compound (III) may be carried out, for instance, by reacting the compound (II) with approximately 0.5 molar to approximately 5 molar, preferably from approximately 0.8 molar to approximately 3 molar in amount of the compound (III) in an appropriate solvent such as tetrahydrofuran, dichloromethane, dioxane, dimethylformamide, dimethylsulfoxide, acetonitrile, hexamethylphosphoramide or the like, preferable in the presence of a base such as sodium hydrogen carbonate, potassium carbonate, triethylamine, diisopropylethylamine, especially diisopropylethylamine, at a temperature ranging from approximately xe2x88x9240xc2x0 C. to 25xc2x0 C., preferably under ice-cooling for approximately 30 minutes to 24 hours. Although it is not required, this reaction is preferred to be carried out in an inert atmosphere, for example in an atmosphere of nitrogen gas or argon gas. The reaction described above provides the resulting compound of formula (IV), and the resultant may be used for the next reaction without further purification; or the compound (IV) may be isolated and purified in conventional manner such as by means of filtration, extraction, washing, removal of the solvent, drying, column chromatography and so on. Next, according to Process (b), the compound of the formula (IV) obtained by Process (a) described above is converted to the carbapenem compound of the present invention of the formula (I) by the removal reaction of the carboxyl protecting group known per se, such as solvolysis or hydrogenolysis. In a typical reaction, the compound of the formula (IV) may be treated in a mixture solvent having pH ranging from 5 to 7, using hydrogen under approximately 1 to 5 atmospheric pressures, in the presence of a catalyst for hydrogenation such as platinum oxide, palladium-activated carbon or palladium hydroxide-activated carbon at temperature ranging from approximately 0xc2x0 C. to 50xc2x0 C. for approximately 0.25 to 5 hours. Examples of the mixture solvent used in the reaction may be an acetate buffer solution having pH ranging 5 to 7, a morpholinepropanesulfonic acid-sodium hydroxide buffer solution having pH ranging 5 to 7, or phosphoric acid buffer solution having pH ranging 5 to 7, or further containing alcoholic solvent and/or tetrahydrofuran. Furthermore, tetrahydrofuran-water, tertahydrofuran-ethanol-water, dioxane-water, dioxane-ethanol-water, n-butanol-water containing potassium phosphate dibasic, sodium phosphate dibasic or sodium bicarbonate or the like may be used for the reaction mixture solvent. Furthermore, the removal of the protecting group R1 may also be carried out by reacting the compound of formula (IV) with zinc in a buffer solution. In typical reaction, the compound of formula (IV) may be treated with zinc in the buffer solution of pH 5 to 7 such as a phosphate buffer solution, an acetate buffer solution, morpholinepropanesulfonate buffer solution, and N-methylmorpholine buffer solution. Zinc used in the reaction may include, for example, elemental zinc in the form of powder, flower or granule or the like. The amount of zinc used in this reaction is not strictly limited; however, it is conveniently about 1 to 10 parts by weight, preferably 1 to 5 parts by weight per part by weight of the compound of formula (IV) to be treated. In this reaction, an organic solvent may be used in combination. Examples of the solvent are alcohols such as ethanol, propanol, n-butanol and the like; ethers such as diethylether, tetrahydrofuran, dioxane and the like; acetonitrile, dimethylformamide, dimethylacetamide and the like. Usually, the reaction may be finished in approximately 0.1 to 5 hours in a reaction temperature from about xe2x88x9220xc2x0 C. to about 50xc2x0 C., preferably from the room temperature to about 30xc2x0 C. Furthermore, the compound of the present invention in which the group xe2x80x9cRxe2x80x9d is hydrogen atom may be prepared from the compound of formula (III) in which the group xe2x80x9cRxe2x80x9d is amino protective group, such as p-nitrobenzyloxycarbonyl group (PNZ) or tert-butoxycarbonyl group (Boc), in accordance with the condensation reaction of step (a) in Reaction Scheme A above and then, the removal reaction of the amino and carbonyl protecting groups of the resulting compounds in step (b). The removal of both amino and carbonyl protecting groups may be preferably conducted by hydrogenolysis as already described in step (b) as mentioned above. The carbapenem compounds of the formula (I) according to the present invention thus obtained may be isolated and purified by the conventional manner, or by using ion-exchange chromatography or synthetic absorbent polymer resin chromatography method, if necessary. The compounds of the formula (III) used in the above procedure as the starting compounds, may be prepared in accordance with the processes as illustrated by the reaction scheme B shown below. wherein R2 and R3 are thiol protecting groups. For example, the compound (VII), which may be obtained by the condensation reaction of 3-hydroxyazetidine (V) with compound (VI) having methylthio group in the molecule, is converted to the compound (VIII) under Mitsunobu""s reaction condition such as by treating with thioacetic acid. Thus, hydroxy group of the compound (VII) is converted to protected mercapto group, which is protected by thiol protecting group (acetyl group). Then, the obtained compound (VIII) is converted to the objective compound (III) by removal of the thiol protecting group of the compound (VIII). In the process of the synthesis of the carbapehem compound of formula (I) as shown in the Reaction Scheme A, the crude compound (III) which is obtained by removal of the thiol protecting group of the compound (VIII) can be used for the reaction with compound (II) without purification. Each process of the Reaction Scheme B may be carried out in the presence of an appropriate inert solvent or catalyst. Examples of the solvent are alcohols such as methanol, ethanol, isopropanol and the like; ethers such as diethylether, tetrahydrofuran, dioxane and the like; benzenes such as benzene, toluene, xylen and the like; acetonitrile, dimethylformamide and the like. The detailed reaction conditions of the processes of the Reaction Scheme B are described by the Preparation Examples mentioned later, and various kinds of compounds of formula (III) may be obtained by the same manner as described in the Preparation Examples. The carbapenem compounds of the present invention are novel compounds that are not disclosed specifically in the prior publication, and have superior antibacterial activities. The remarkably high antibacterial activities of the compounds according to the present invention have been proved by antibacterial tests described below. [Antibacterial Tests] 1. Test Procedures The antibacterial activities were tested by an agar plate dilution method in accordance with the standard method of The Japanese Chemotherapy Society [Chemotherapy, Vol.29, 76-79(1981)]. A Mulluer-Hinton (MH) agar liquid medium of a test microorganism was cultured overnight at 37xc2x0 C. and the resultant culture medium was diluted with a buffered saline gelatin (BSG) solution to contain approximately 106 cells of the test microorganisms per milliliter, and then the diluted solution was inoculated with a micro-planter at the rate of approximately 5 xcexcl on a MH agar medium containing a test compound. This medium was then incubated at 37xc2x0 C. for 18 hours. The minimum inhibitory concentration (MIC) is determined as a minimum concentration in which no test microorganism could grow. It is noted here that the test organisms used were all standard strains, and test compounds were Compound (8) and (15) obtained in Examples mentioned later. 2. Results Table 1 shows the test results. The foregoing results clearly demonstrate that the carbapenem compounds according to the present invention have superior antibacterial activities. Furthermore, the compounds of the present invention are characterized by having a methyl group introduced at 1 xcex2-position and specific 1-aza-3-thiabicyclo ring group at the 2-position of carbapenem skeleton, and therefore are stable against renal dehydropeptidase (DHP) and are also stable chemically and physically. [Toxicity Tests] Toxicological studies were carried out using a group of 10 male mice of ddY strain weighing from 20 to 23 grams. Solutions containing each of the carbapenem compounds of the present invention obtained by Examples mentioned later were administered subcutaneously to the mice and subjected to observations for one week. The results have revealed that the groups of mice to which the carbapenem compounds of the present invention had been administered in the amount of 500 mg/kg were alive without any abnormal findings. As described above, the carbapenem compounds according to the present invention permit a single administration without combining with any other DHP inhibitor, and are extremely useful as antibacterial agents for therapy and prevention of infectious diseases from various pathogenic organisms. The carbapenem compounds or pharmaceutically acceptable salt thereof according to the present invention may be administered as an antibacterial agent to the human being and other mammalian animals in the form of a pharmaceutically acceptable composition containing an antibacterial effective amount thereof. The administration dose may vary in a wide range with age, weight, conditions of patients, forms or route of administration, physician""s diagnoses or the like and may be orally, parenterally or topically administered. To adult patients, a standard daily dose range from approximately 200 to approximately 3,000 mg once or in several installments per day. The pharmaceutically acceptable composition of the carbapenem compounds according to the present invention may contain an inorganic or organic, solid or liquid carrier or diluent, which is conventionally used for preparation of medicines, particularly antibiotic preparations, such as an excipient, e.g., starch, lactose, white sugar, crystalline cellulose, calcium phosphate or the like; a binder, e.g., acacia, hydroxypropyl cellulose, alginic acid, gelatin, polyvinyl pyrrolidone or the like; a lubricant, e.g., stearic acid, magnesium stearate, talc, hydrogenated plant oil or the like; a disintegrator, e.g., modified starch, calcium carboxymethyl cellulose, low substituted hydroxypropyl cellulose or the like; or a dissolution aid, e.g., a non-ionic surfactant, an anionic surfactant or the like, and may be prepared into forms suitable for oral, parenteral or topical administration. The formulation suitable for oral administration may include solid preparations such as tablets, coatings, capsules, troches, powders, fine powders, granules, dry syrups or the like, and liquid preparations such as syrups and the like; the formulations suitable for parenteral administration may include, for example, injectable solutions, drip-feed solutions, depositories or the like; and the formulations suitable for topical administration may include, for example, ointments, tinctures, creams, gels or the like. These formulations may be formed by procedures known per se to those skilled in the art in the field of pharmaceutical formulations. The carbapenem compounds according to the present invention are suitable for administeration in the form of parenteral formulations, particularly in the form of injectable solutions. | Mid | [
0.599542334096109,
32.75,
21.875
] |
Closteriopsis Closteriopsis is a genus of green algae in the family Chlorellaceae. References External links Category:Trebouxiophyceae genera Category:Chlorellaceae | Mid | [
0.559837728194726,
34.5,
27.125
] |
410 So.2d 45 (1982) LIBERTY LOAN CORPORATION OF GADSDEN, a Corporation v. Rita MIZELL. 80-597. Supreme Court of Alabama. February 19, 1982. *46 Thomas M. Goggans of Piel, Bright & Goggans, Montgomery, for appellant. Frank M. Wilson of Beasley & Wilson, Montgomery, for appellee. BEATTY, Justice. The defendant appeals from a judgment based upon a jury verdict for the plaintiff in the amount of $15,000.00. We reverse and remand. The litigation arose out of attempts by defendant to collect money under a promissory note and security agreement between defendant, plaintiff and her husband. Plaintiff and her then husband each signed that agreement and a real estate mortgage. Following a default in the payment of the loan, the defendant, apparently by mail, sent a delinquency notice to the debtors on December 27, 1979; another was sent to plaintiff herself on June 25, 1980. In July 1980 a representative of the defendant telephoned plaintiff's office without result. He then telephoned plaintiff's apartment on two occasions. The conversations which ensued were brief; the representative identifying himself and giving the purpose of his call, and plaintiff expressing to him her opinion that the debt was not hers, but was that of her husband. Mr. Sheldon, plaintiff's former husband and a signatory to the loan documents, on January 21, 1980, had filed a petition in the United States Bankruptcy Court for relief under 11 U.S.C. Chapter 13.[1] The defendant's representative knew this at the time of his call to her on July 17, 1980, and gave this knowledge as the reason for his call. He then telephoned plaintiff's attorney to inquire whether or not plaintiff herself was in bankruptcy and was advised by someone in that office that she was not. Whereupon on that date defendant's representative mailed a form letter to plaintiff notifying her that her account had been sent to an attorney with instructions to file suit against her. It called attention to the added expense involved and added: Even at this late date, we are willing to work with you to bring your account to a current status. We believe that it is to your advantage to avoid unnecessary costly legal proceedings. The representative contacted the plaintiff again on July 29, 1980, informing her that he had contacted her attorney and had sent her account to defendant's attorney. On July 30, 1980, plaintiff's attorney sent a letter to the defendant's representative, with a copy to defendant's attorney, pointing out that plaintiff and her husband had divorced, that under the decree the former husband was to satisfy all indebtedness incurred by him during the marriage, and taking the position that the defendant's delinquent account concerned a debt owed by plaintiff's former husband, not by plaintiff. That decree, which was later admitted into evidence, actually recites: 4. That the wife shall pay the outstanding indebtedness to Troy State University incurred by her for educational *47 expenses and that the husband shall pay all other marital bills ... incurred by the parties prior to the date of any decree to be rendered in this cause and that the husband shall hold the wife harmless from liability for same. [Emphasis added.] On August 13, 1980, defendant filed an action against plaintiff in the District Court of Montgomery County to recover the balance due it on the loan agreement. An employee of the sheriff's department took the summons and complaint to the plaintiff's apartment complex. He obtained her correct address from the manager but, finding no one at home, returned to the sheriff's office where he found instructions to serve the process upon plaintiff's attorney. Plaintiff later found a message from the sheriff's department on her door asking her to pick up some papers at the courthouse. She telephoned and requested the sheriff's office to serve the papers upon her attorney, which was done. The complaint was amended on August 29, 1980, and on September 16, 1980, it was dismissed on the present defendant's motion. That same day the present plaintiff filed a complaint in circuit court containing Count I alleging an invasion of her privacy, Count II alleging malicious prosecution, and Count III alleging libel. In the due course of pleading, the defendant filed a motion for summary judgment against plaintiff on plaintiff's complaint and against plaintiff on defendant's counterclaim to recover the alleged sum due under the loan agreement. This motion was denied. Meanwhile, on December 17, 1980, a hearing was held in the bankruptcy court to determine whether the statutory co-debtor stay of execution provided by Section 1301 of the Bankruptcy Code should be lifted. That court found from the evidence that plaintiff had executed a promissory note and security agreement on May 18, 1979, and was liable to defendant for any sum due under said note. The findings continued: It further appears that this debtor's plan does not provide for any payment to Liberty Loan Corporation and that accordingly the codebtor stay provided by Section 1301 of the Bankruptcy Code should be lifted as provided by Section 1301(c)(2). It is accordingly ORDERED that the codebtor stay be and is hereby lifted as to Rita Mizell and the creditor Liberty Loan Corporation is free to proceed according to law. The case proceeded to jury trial. At the conclusion of plaintiff's evidence, the defendant's motion for a directed verdict was denied. Following the jury's verdict in favor of plaintiff, the defendant moved for a judgment notwithstanding the verdict and a new trial on the ground, among others, that the verdict and judgment were contrary to the evidence. Those motions were denied. This appeal ensued. In the count charging an invasion of privacy, plaintiff alleged that her husband had borrowed the money; that he had filed for bankruptcy; that defendant was aware of this, but nevertheless contacted plaintiff at home and at work on numerous occasions demanding payment of a past due account which she advised was not hers; that defendant filed suit against her, made numerous threats to plaintiff, notified one or more credit rating companies that she owed a past due debt, and otherwise harassed plaintiff with threats of suit and collection for a debt that was not owed by plaintiff. The tort of invasion of the right of privacy, insofar as it applies to actions of a creditor in regard to his debtor, is "the wrongful intrusion into one's private activities in such manner as to outrage or cause mental suffering, shame or humiliation to a person of ordinary sensibilities." Norris v. Moskin Stores, Inc., 272 Ala. 174, 132 So.2d 321 (1961), quoting from Smith v. Doss, 251 Ala. 250, 37 So.2d 118 (1948). As Norris cautioned, however, not every effort by a creditor to collect a debt rises to the level of a lawsuit by the debtor: The mere efforts of a creditor ... to collect a debt cannot without more be considered a wrongful and actionable intrusion. *48 A creditor has and must have the right to take reasonable action to pursue his debtor and collect his debt.... As Norris pointed out, some courts have applied a rule of "reasonableness" in judging the extent to which a creditor may act in pursuing collection and cited cases exemplifying unreasonableness. Those cases disclose patterns of repeated conduct equating deliberate harassment, or systematic campaigns designed to vilify the debtor or expose him to public ridicule. This case contains no facts from which any such inference could reasonably be made. The creditor sent two notices of account delinquency, one of which was addressed to plaintiff when the account was past due. One telephone call was made to her office, and there is no evidence that it was untoward. Two calls were made to plaintiff's home. In the first the company representative identified himself and his purpose; the plaintiff denied liability and referred him to her attorney. When he telephoned her attorney, he inquired whether plaintiff was in bankruptcy and received a negative answer. He then sent plaintiff a letter advising that her account had been turned over to a lawyer. This notice was given to plaintiff by telephone almost two weeks later. The district court action was filed the next month claiming the balance of the account. The complaint had the wrong address; the process server obtained the correct address from the apartment manager and left a message for her, but nothing else transpired in any way to humiliate or harass plaintiff. Plaintiff herself testified that the company representative did not subject her to any abuse during their telephone conversations. In short, nothing occurred in the nature of an invasion of privacy; nothing occurred that was calculated to offend a person of ordinary sensibilities. The preponderance of the evidence, to say the least, was against proof of the allegations of Count 1. We reach the same conclusion with respect to Count II charging malicious prosecution. It is axiomatic that a charge of malicious prosecution must be supported by proof of a lack of probable cause and malice, Boothby Realty Company v. Haygood, 269 Ala. 549, 114 So.2d 555 (1959), and it is clear that evidence implying the existence of neither of these elements was adduced below. Was there probable cause for the institution of the action filed in district court to enforce the debt? If that action was brought with probable cause, then the malicious prosecution action would not arise no matter what the result in the former action was. Turner v. J. Blach & Sons, 242 Ala. 127, 5 So.2d 93 (1942). And for the defense of probable cause to prevail, the defendant in the subsequent action must have reasonably entertained the opinion that, upon adjudication, the claim he put forth in the former action would prevail. Gamble v. Webb Quarterback Club, Ala.Civ. App., 386 So.2d 455 (1980), cert. denied, Ex parte Gamble, Ala., 386 So.2d 459 (1980). As stated in Boothby, supra, 269 Ala. at 554, 114 So.2d 555: One of the reasons for this rule is that public policy requires that all persons shall resort freely to the courts for redress of wrongs and to enforce their rights, and that this may be done without the peril of a suit for damages in the event of an unfavorable judgment by jury or judge. If this were not the case, a large proportion of unsuccessful civil actions would be followed by suits for malicious prosecution, and there would be a piling of litigation on litigation without end. [Citations omitted.] Conceding, as the plaintiff insists, that the defendant knew of the bankruptcy proceedings, those proceedings were not instituted by the plaintiff but by her husband. Plaintiff freely and voluntarily executed the promissory note and security agreement, the failure of which gave rise to the district court action. The language of each agreement contemplated more than one signatory, and upon signing each became *49 liable as a joint maker. Elrod v. Trussell, 266 Ala. 383, 96 So.2d 813 (1957). See also Code of 1975, § 7-3-413. And, while the parties' divorce decree did place the obligation to pay the indebtedness upon the husband, that decree did not state that she was not indebted. Indeed, the decree required the husband to indemnify plaintiff by holding her "harmless." It is true that Section 1301 of the Bankruptcy Code provides for an automatic stay of proceedings against a co-debtor; however, that provision is not a final adjudication but only a postponement of further proceedings by the creditor: The protection [to the debtor] is limited, however, to ensure that the creditor involved does not lose the benefit of the bargain he made for a cosigner. He is entitled to full compensation ... provided for by the agreement under which the debtor obtained his loan.... The creditor is delayed, but his substantive rights are not affected. . . . . Under the terms of the agreement with the codebtor who is not in bankruptcy, the creditor has a right to collect all payments to the extent they are not made by the debtor at the time they are due. To the extent to which a Chapter 13 plan does not propose to pay a creditor his claims, the creditor may obtain relief from the court from the automatic stay and collect such claims from the codebtor.... [5 Bkr.L.Ed. § 45:9 at 6; see also In re Betts, 8 B.R. 799 (Bkrtcy.S.D. Ohio 1981).] Thus, even though the district court action to enforce the debt was later dismissed on the present defendant's motion, its knowledge of plaintiff's husband's bankruptcy did not impute a lack of probable cause to prosecute that action against this plaintiff, a co-debtor, for the effect of the bankruptcy law did not act on the legality of her debt but only postponed collection in order to assure that her co-debtor, the bankrupt, was insulated from "indirect pressure from his creditors exerted through friends or relatives that may have cosigned an obligation of the debtor." 5 Bkr.L.Ed. § 45.9 at 6. As we have shown, that postponement was lifted by the bankruptcy court following a hearing which found the plaintiff liable to the defendant on the promissory note. In weighing the defendant's action in light of the facts as they appeared at the time of the district court action, and considering that action in accord with the defendant's exercise of its legal rights, we cannot conclude that any evidence was shown which created an inference of lack of probable cause. Such a course of conduct, moreover, could not furnish an inference of malice. Emerson v. Lowe Mfg. Co., 159 Ala. 350, 49 So. 69 (1909). Finally, our examination of the record convinces us that there was a failure of proof of Count III which charged this defendant with defaming plaintiff by publishing false statements that plaintiff was indebted to defendant, refused to pay it, and that her credit was bad. It has been shown that plaintiff did owe the debt to defendant. Truth is an absolute defense to defamation. Ripps v. Herrington, 241 Ala. 209, 1 So.2d 899 (1941). Moreover, the plaintiff did not allege or prove any special damage. In this jurisdiction "words charging nonpayment of debts ... are actionable without special damage being shown, when they refer to merchants, tradesmen, or others in occupations where credit is essential." Harrison v. Burger, 212 Ala. 670, 672, 103 So. 842 (1925). Plaintiff, a psychiatric social worker, does not have an occupation falling within that category. Indeed, according to her own testimony, her damage consisted of embarrassment and attorney's fees. Our previous recital of the facts amply discloses an absence of any facts establishing an actionable publication. We have not found in the record, nor have we been pointed to, any publication made by the defendant to any credit bureau or similar organization, but even if such report had been made, it would have been protected by the defense of truth. Jakob v. First Alabama Bank of Montgomery, Ala., 361 So.2d 1017 (1978). Additionally, it appears that *50 such a report to a credit agency is generally held to be qualifiedly privileged, i.e., not actionable if made in good faith by a party having an interest in the matter to another having a corresponding interest. See 53 C.J.S. Libel and Slander § 119 (1948). Nothing in the facts before us indicates any lack of good faith on the part of the defendant in its conduct to collect this debt, nor was there any communication containing matter which would tend to defame. Neither the late notices nor the telephone messages contained any such inferences. No verbal abuse of any kind was disclosed. The attempted service of process by the deputy sheriff contained nothing in the way of defamatory matter. Plaintiff herself communicated the fact of defendant's lawsuit against her to her friends and associates at work, not defendant. Under these facts no prima facie case of defamation was established. Although defendant moved for a directed verdict at the conclusion of the evidence, the denial of that motion is not made a ground of appeal; instead defendant has appealed from the denial of its motions for JNOV and a new trial and has argued the insufficiency of the evidence. Had defendant raised before us the denial of its motion for a directed verdict, that would have furnished a ground for reversal, as we have shown. Cf. Garmon v. King Coal Co., Inc., Ala., 409 So.2d 776 (1981). However, we are likewise clear to the conclusion that the evidence failed to establish a prima facie case on any count and thus it was error to deny the motion for JNOV. We have no alternative but to reverse the judgment and remand the cause to the trial court with directions to enter a judgment for the defendant. It is so ordered. REVERSED AND REMANDED WITH DIRECTIONS. TORBERT, C. J., and MADDOX, JONES and SHORES, JJ., concur. NOTES [1] Under Section 1301 of the Bankruptcy Code, the right of a creditor to proceed against a co-debtor is postponed until the manner of repayment is resolved. | Mid | [
0.5447761194029851,
36.5,
30.5
] |
The present invention relates to an information extraction device for extracting information of a picture by means of mapping. The device according to the present invention can be used to obtain information concerning a picture, such as the existence of a straight line, the intersection of straight lines, and the three-dimensional direction of straight lines or parallel lines. Such information is useful for pattern recognition of an object, such as in the case of pattern recognition by an industrial robot. In general, in order to obtain pattern information of an object article, an image of the object is taken by an imaging device, such as a TV camera, the image is processed electronically, and information is extracted from the result of the image processing. One of the prior art methods of the information extraction is the Hough transformation method, in which the probability of extraction of a straight line or a line segment in the image from the object is enhanced. In the Hough transformation method, the coordinates of a point (x.sub.i, y.sub.i) in the x-y plane of the image plane are transformed into a mapping function in the form of a sine wave: r=x.sub.i cos.theta.+y.sub.i sin.theta., in the .theta.-r plane of the parameter plane. The sine waves, which correspond to points on a straight line in the picture plane, intersect at two points in the parameter plane. If only the positive value of .rho. is taken into consideration, the above-mentioned sine waves intersect at a single point. The angle .theta..sub.0 and the height r.sub.0 of the intersecting point in the parameter plane indicate the length of the vertical line from the original point to the straight line and the angle of the vertical line in the image plane. Hence, information of the straight line on the image plane can be extracted by using the obtained data of the angle .theta..sub.0 and the height r.sub.0. It is also possible to use such information extraction to reproduce a straight line having interruptions or distortions. In the prior art Hough transformation method, however, it is necessary to obtain mapping functions corresponding to every point. The number of points for which the mapping functions are to be obtained is quite large. Hence, it takes a considerable length of time if such mapping functions are obtained by calculations in a point-by-point manner. Accordingly, it is difficult to extract information at a high speed. Prior art technology for three-dimensional measurement of an object article includes a method for detecting the three-dimensional direction of a line or a plane existing in space, a method of using the vanishing point, and a method of binocular vision. However, these prior art methods may be used only under limited conditions of measurement. | Mid | [
0.645502645502645,
30.5,
16.75
] |
The Israeli cabinet has adopted a bill to authorize the force-feeding of Palestinians who are on hunger strike in Israel’s jails. A proposed law allowing the force-feeding of Palestinians who are on hunger strike in Israel’s jails has been approved by the country’s cabinet, sources said.The bill on the “Prevention of Damage by Hunger Strikers,” which was proposed by Public Security Minister Gilad Erdan has yet to be endorsed by the Israeli parliament (Knesset) before being signed into law. “Hunger strikes by imprisoned terrorists have become a weapon with which they are trying to threaten the State of Israel. The cabinet’s decision today sends a clear message: we will not blink in the face of any threat,” Erdan was quoted by Reuters as saying on Sunday. The bill stipulates that Palestinian prisoners must be fed forcibly if their lives are in danger; the measure should be applied after the approval of a district court judge. The Physicians for Human Rights, a non-profit group, lashed out at what it described as “a disgraceful law that was condemned by the medical community in Israel and the world.” The group said that the law will “legalize torture and gross violations of medical ethics and international conventions.” Echoing the group were the World Medical Association, the Israel Medical Association and the Association for Civil Rights in Israel, which also harshly condemned the bill.Israel has repeatedly been alarmed about Palestinian hunger strikes in its jails, which occasionally end in death and fuel protests in the West Bank and East Jerusalem. The Israel Medical Association, for its part, claims that force-feeding is a form of torture and that Israeli medics should not adhere to the law in case it is signed into law. | Low | [
0.49486652977412704,
30.125,
30.75
] |
Q: Way to include one .hgignore file in another Is there any way to include one .hgignore file in another? e.g., say I have a common .hgignore file in a Mercurial subrepository (named hg-common) that ignores files like desktop.ini & .DS_Store, and I want to include that file in every project that I create. In my .hgignore of my project1 repo, I want to do something like: syntax: include hg-common/.hgignore with syntax: include being my imaginary syntax for including the specified file. A: I found the correct syntax: include:hg-common/.hgignore | Mid | [
0.5790645879732741,
32.5,
23.625
] |
Dorothy Baker was allegedly attacked from the back seat of her minivan by Ismael Martinez but was able to stop him with some quick-thinking moves that sound like something out of an action film (video below). Baker rammed her minivan into a telephone poll, took the knife from Martinez, hit him in the face, tossed the 54-year-old man out of her minivan and then ran over him over. It all started when Baker and her two young sons were leaving a CVS drugstore on Friday night. "[Martinez] popped up out of the backseat and said that if I didn't want my kids to get hurt, that I would do exactly what he said," Baker told ABC News. ADVERTISEMENT Thanks for watching! Visit Website "I thought, 'If you swerve and hit the pole, he's not wearing a seat belt, he'll go through the windshield or at least hit his head, and you can stop him. You can do something to make sure that he doesn't hurt your kids,'" Baker explained to KTRK-TV. After Martinez was disarmed and thrown out of the car, Baker said she accidentally ran over him. "All I was thinking of really, was just to get him away from my kids," Martinez said. "I didn't mean to run him over. I was just trying to stop him so he didn't hurt anybody else." Martinez was taken to Memorial Hermann Hospital in Houston and is in stable condition, reports KHOU-TV. Police say Martinez was convicted of rape in 1976. ADVERTISEMENT Thanks for watching! Visit Website ADVERTISEMENT Thanks for watching! Visit Website Martinez is expected to face felony charges for this incident. Sources: ABC News, KTRK-TV, KHOU-TV undefined | Mid | [
0.5606694560669451,
33.5,
26.25
] |
Multi-Benefit 10-in-1 Beauty Balm Cream The BB Cream reduces lines, smoothes skin and conceals flaws, all while hydrating your skin! SPF 15 protects your skin while Vitamin E, minerals and antioxidants heal and care for it! Get perfect lightweight coverage while your skin gets pampered and healthier! Flawless even coverage for your skin! After just one week, skin looks healthier, more even and radiant. BB Cream can be used as an alternative to traditional foundation for those days when the lightweight coverage is more desirable. Choose from five different shades to best match your skintone while getting care + coverage. Each shade comes in a 1floz tube. Benefits Infused with Vitamin E Infused with minerals and anti-oxidants Hydrates skin Evens skintone Visibly minimizes redness Conceals flaws Lightweight feel Smoothes skin SPF 15 Skin looks better even after removing* To Use Apply BB Cream to face and blend evenly Use sponge or your fingertips Made in Mexico. *Based on those who expressed an opinion in a consumer-perception study. – I don’t like wearing heavy makeup in the summer. This has worked well for me. – I have oily skin and somewhat large pores so was not sure how something so sheer looking and lightweight would work for me but WOW this stuff is great! Goes on easily, non-greasy and lasts! – This is my first experience with a BB cream and I have become a lifelong fan of the AVON BB Beauty Balm Cream. A small amount provides full, yet natural looking coverage. The BB Beauty Balm can be worn comfortably alone, under moisturizer without looking oily or smearing, and sets flawlessly under loose or compact powder. AVON BB Beauty Balm supplies soft, comfortable, moist coverage to your skin. It neither streaks nor cakes even in the warmest weather. I highly recommend this product for your consideration. AVON BB Beauty Balm Cream has become a staple in my daily routine for office, weekends, and evenings out. – The one I ordered is alil too light for my skin but if I keep blending it looks fine. I really was impressed that my face hasn’t gotten burned➕ I do 3-4hour cardio outdoors! FREE SHIPPING Every Time on each $40 or more order (before tax), even on special offer orders and no coupon code needed! Three Ways to Shop Shop my online Avon brochure – Browse the current Avon brochure and add items to your shopping bag as you go. You can also shop this option by departments. Shop by product number – If you already know the product numbers for what you want (maybe with an Avon brochure in front of you), you can quickly enter the product numbers. This also allows you to backorder from my previous two Avon campaigns by selecting which campaign number you want. You can also sign up for eNewsletters on my eStore to receive notice of coupon codes and sales. Just look for the red and black mascara onmy website. Have a great day, y’all! 💋 Your Avon Lady, Beth Bailey 👠 Remember! If you would like for me to be your Avon Lady, check your Avon account settings if you haven’t already, to make sure you are registered as an eCustomer with me serving as your Avon Representative. Here’s how to do that. Sassy Direct Member Listing Blog Stats 13,421 Views Let’s Get Social! Start Advertising with VistaPrint! From business cards to t-shirts, start advertising with VistaPrint! I use VistaPrint myself and I love it! Get started through my referral link and get free delivery on your first order of $25+ and 30% off! Categories CategoriesSearch for: Start Taking Plastic with Square! I love using Square, whether I'm at vendor events or just taking payment from my regular customers! If you run your own business, this is a service I highly recommend you use! Start using Square through my referral link and process $1,000 in sales without any processing fees for your 1st 180 days! Archives Archives My Community Take Your Blog to New Heights by Self-Hosting with BlueHost! Self-hosting with this powerful web host allows you to take control of your blog that you can't do with free hosting. You'll also have 24/7 support & a money-back guarantee. Plans start @ $3.95/month. Psst... My blog is using BlueHost! *My Referral Link. | Mid | [
0.6153846153846151,
34,
21.25
] |
15 June 2019 Abusing the CPU's adder circuits by Gianni Tedesco Have you ever been asked the interview question “how do you count the number of bits set in an integer?” A smart-ass like myself might answer something like: unsigned int count_set_bits ( unsigned int x ) { return __builtin_popcount ( x ); } Which, on x86_64 , produces: xor eax , eax popcnt eax , edi ret The interviewer, of course, doesn’t like that. He wants to see you come up with an algorithm. So you come up with something like this: unsigned int count_set_bits ( uint32_t x ) { unsigned int i , ret ; for ( ret = i = 0 ; i < 32 ; i ++ ) { ret += !! ( x & ( 1U << i )); } return ret ; } Which gives you something like: xor r8d , r8d xor eax , eax mov ecx , 1 . p2align 4 ,, 10 . p2align 3 . L4 : shlx edx , ecx , eax test edx , edi setne dl movzx edx , dl inc eax add r8d , edx cmp eax , 32 jne . L4 mov eax , r8d ret Which is, of course, dreadful. But the reason the interviewer likes this is because it sets up the next question: “how can we optimize this?” Or if you want to be more circumspect: “what if we only expect one or two bits to be set?” or “what if our data is very sparse?” Realistically though, you either know about “Kernighan’s trick”, or, you don’t. It goes something like this: unsigned int count_set_bits ( unsigned int x ) { unsigned int ret ; for ( ret = 0 ; x ; x &= ( x - 1 )) ret ++ ; return ret ; } Which, at least for an Intel weenie such as myself, was a pointless exercise because gcc compiles that to: xor eax , eax popcnt eax , edi mov edx , 0 test edi , edi cmove eax , edx ret Which looks like a terrible code-generation bug in gcc. But hey, at least clang does the right thing here: popcnt eax , edi ret Anyway, I digress. Did you notice the x &= (x - 1) part? That is bitwise woo-woo magic to unset the rightmost bit in x . It’s a neat trick, and if you know it you’ll ace this part of the job interview. But later, when you’re at home, alone, contemplating the empty meaninglessness of the universe, you might ask yourself “but why does it work?” Two’s complement Let’s forget the & part and just focus on what x - 1 is doing for now. One thing you’re going to need to know about is two’s complement arithmetic. I won’t bore you by recapitulating the details but we should do well to remember the following equations: Therefore: So the magic rune is just adding all one’s to our original value. Half adder So here’s the part where we get in to how addition really works. You probably have a good handle on this already from your school days, but let’s refresh. The simplest case is if we’re just adding together a couple of 1-bit numbers. Let’s write out the truth table for that: x y result 0 0 0 0 1 1 1 0 1 1 1 0… oh yeah, we need to carry… Let’s try again: x y result carry 0 0 0 0 0 1 1 0 1 0 1 0 1 1 0 1 Right, if we’re going to expand this to add numbers with more than one bit, we’re going to need to do something about this carry output. Full adder Let’s call the last adder with 2 inputs, and 2 outputs, the “half-adder.” The full adder is going to have 3 inputs: the 2 operands, and then a carry-in which is going to be connected to the next least significant bit’s carry-out. x y carry-in result carry-out 0 0 0 0 0 0 1 0 1 0 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 0 1 1 0 1 1 0 1 0 1 1 1 1 1 1 So you can see in this example of a 4-bit adder that there’s this chain of carry inputs going from right to left: Thanks to Colin M.L. Burnett for the excellent diagram. Putting it all together The basic outline of the algorithm is that we start with an input, x . And as long as it isn’t zero, we unset the least significant bit, and increment the result. So if the input is 1000_1100 , the loop will iterate 3 times. x &= (x - 1) is an operation which clears the least-significant set bit in the input, x . Since we’re going to do x &= mask , that must mean that mask has a zero in the position we want to zero out. And it can’t have any zeroes where the input has a one. So we abuse the carry-chain to create such a mask. By adding 1111_1111 to the input, we’re essentially ensuring that the carry signal is not asserted until we hit the first one bit, but after that it will be asserted for all the rest of the bits (travelling from right to left). If we extract the relevant parts of the adder truth table we can see how the addition operation will produce the mask that we need: x y cin result cout explanation 0 1 0 1 0 Before the first bit, produce ones 1 1 0 0 1 For the first bit, produce a zero and set the carry going 0 1 1 0 1 now the result is zero if x was 0 1 1 1 1 1 or 1 if x was one What that gives us is a number which is (from right to left): all ones (but that’s okay because corresponding input bits are zeroes) zero for the first one bit (which ensures that it will be cleared) and then equal to the input after that (leaving all higher bits unchanged) tags: binary - logic - bitwise-hacks Please enable JavaScript to view the comments powered by Disqus. | Mid | [
0.6114942528735631,
33.25,
21.125
] |
package cn.stylefeng.guns.sys.modular.system.mapper; import cn.stylefeng.guns.sys.modular.system.entity.Notice; import com.baomidou.mybatisplus.core.mapper.BaseMapper; import com.baomidou.mybatisplus.extension.plugins.pagination.Page; import org.apache.ibatis.annotations.Param; import java.util.Map; /** * <p> * 通知表 Mapper 接口 * </p> * * @author stylefeng * @since 2018-12-07 */ public interface NoticeMapper extends BaseMapper<Notice> { /** * 获取通知列表 */ Page<Map<String, Object>> list(@Param("page") Page page, @Param("condition") String condition); } | Mid | [
0.621923937360178,
34.75,
21.125
] |
State of the art technology used in packaging machineries of rmk To offer lucrative, low maintenance and performance driven machinery for packaging food and other products has always been the mission of RMK. The company is dedicated towards its client and work towards providing the most excellent machinery as per the client’s requirement. It provides every possible solution of Packaging Technology through painstaking Research & Development program. RMK’s food packaging machinery give their customer the standard in high-quality, low-cost extrusion. Better nutritional content, better digestibility, better flavour and better shelf life is guaranteed for the food that is packaged from the packaging machines of RMK. State of the art technology used in packaging machineries of rmk 1. State of the Art Technology Used in Packaging Machineries of RMK To offer lucrative, low maintenance and performance driven machinery for packaging food and other products has always been the mission of RMK. The company is dedicated towards its client and work towards providing the most excellent machinery as per the client’s requirement. It provides every possible solution of Packaging Technology through painstaking Research & Development program. RMK’s food packaging machinery give their customer the standard in high-quality, low-cost extrusion. Better nutritional content, better digestibility, better flavour and better shelf life is guaranteed for the food that is packaged from the packaging machines of RMK. RMK’s food packaging machine deliver noticeably higher standards in durability and reliability as a result of stringent structural engineering testing and parts manufacturing that require only top-grade technologies. As a result, the company’s leadership in mechanical reliability and end-product nutritional fineness has received a top repute among medium to small feed and food processing enterprises. Further, its years of experience in the field also allows it to perfectly understand as well as match up with up-and-coming packaging machinery demands of different consumer goods industries. The company has successfully worked on various packaging machine and come up with highly efficient electronic load cell based net weighers. Based on pneumatic and servo mechanism, these weighers can be used with machines used for granular products like lined carton machine and manual packing machines. The weighers of RMK come in three variations: up to 1kg. /up to 10 kg. /up to 50 kg. For packing granular products, most manufacturers employ cup fillers for filling purpose, which does not give the desired accuracy. Therefore, to ensure more accuracy and efficiency, RMK has avoided the use of cup fillers in their filling machines, except in those which packs products up to 100 gm only. RMK provides its clients a single window for all kinds of packaging solutions. It boasts of a huge product range that includes Popcorn Pouch Packaging Machines, Spice Sachets Packing Machines, Detergent Sachets Packing Machines, Hair Dye Packing Machines, Granules Pouches Packing Machines, Coffee Sachets Packing Machines, Tea Sachets Packing Machines, and more. At RMK, the biggest objective has always been total customer support and satisfaction. The team at RMK undertakes the responsibility of providing their clients with quality products, that will assure them durability and hassle-free operations for years together. The company’s enthusiasm and customer support has earned them many consistent orders. At present, RMK has clinched a set of high profile, quality conscious clients all over the world. | High | [
0.700143472022955,
30.5,
13.0625
] |
On June 26 Kaohsiung City Councilor Chen Hsin-yu (陳信瑜) posted an 80-second video on YouTube showing a white dog dangling from a chain around its neck for about 40 seconds before hanging to death. As the animal draws its last breath, Taiwanese soldiers can be heard saying, “Don’t become a stupid dog in your next life.” The clip ends with the soldiers shouting the Marine Corps’ motto. The incident occurred around the Taiwan Marine Corps’ camp near Shoushan in Kaohsiung. Director of the Kaohsiung Concern Stray Animal Association Wang Jin-chun (王春金) says that stray dogs have been spotted around the camp and that one of the squad leaders told his soldiers he “didn’t want to see the white puppy anymore,” leading to the hapless dog's mistreatment. A preliminary investigation also shows that three soldiers beat the dog with wooden sticks before hanging it alive on a chain. On Facebook, Wang has identified the squad leader’s name as Chen You-tsai (陳祐才). Two other soldiers involved are Chang Feng-yu (張峰瑜) and Hu Chia-wei (胡家瑋). Both the association and the Kaohsiung City Animal Protection Office have launched an investigation. Wang says Chang had already admitted to abusing and killing the dog before throwing it into the ocean. He initially agreed to make an official statement with the animal protection office. However, Su Shih-lin (蘇世霖), the director of the political warfare office, said Chang was no longer willing to cooperate and that the military would conduct its own investigation. Su says he stopped the animal protection office from investigating because it had failed to go through appropriate procedures. First Editor: J. Michael Cole Second Editor: Edward White | Low | [
0.48262548262548205,
31.25,
33.5
] |
A Letter I'm Sending Back in Time to Myself The Night Before Halloween of 2005 Hey, what’s up? Wait, let me guess. It’s Sunday night so you’re probably in sweats, eating a medium pizza with banana peppers and pineapple and watching a crappy movie on TBS. If I remember correctly it’s The Wedding Planner. Mindy, stop watching that movie. In six months you’re going to tell some cute guy over drinks that The Wedding Planner is one of your favorite movies and that you think JLo is a great actress and you’ll never hear from him again. And stop eating that pizza. You can’t tell yet, but your metabolism is slowing down, a LOT. If you keep eating like this, one Saturday night in 2007 while at the movies you’re going to have to unbutton your jeans to let your muffin top breathe. ANYWAY, I’m writing to tell you NOT to go out on Halloween tomorrow night. I know, I know, it’s Halloween. It’s the one night of the year you get to wear fishnets and heels together without judgment. And this year you’re dressing as a ladybug for the forth year in the row because you bought a children’s size, fleece, ladybug dress in the “costume section” of some drugstore in Ann Arbor, Michigan in 2002. And you tell everyone you wear it because “it’s warm, it’s fleece” but I know you wear that lady bug costume every year because you think wearing a children’s size dress as a shirt, with fishnets and boots, will get you a boyfriend. But all it’s gotten you so far is a disturbing conversation with a sixty-year-old man dressed as an exterminator, a free bottle of Bailey’s Irish Cream, and an awkward trip to second base with a closeted homosexual. So don’t wear the ladybug fleece, and don’t go out to a bar on the Upper East Side with a group of girls dressed as “naked chefs” and “naughty lawyers” that’s filled with men in their thirties who still think they’re in a fraternity and are dressed as “athletes” and “women.” And don’t talk to some guy dressed as “a bad cop” but who’s “actually a fireman” all night because you’re turned on by the fact that he “actually fight fires and stuff” and don’t let him and his sports-loving, hairy-dress- wearing friends buy you and your friends four rounds of shots, and don’t say yes when he asks if you want to “split a cab home” and don’t make out with him in the cab. And the next morning, after you ask him why you woke up wrapped in a down comforter, alone, fully clothed, and under a pool table, and he says, “we were playing pool and then you passed out” don’t give him your cell phone number! And when he calls the next day, don’t pick up the phone and make small talk with him for twenty minutes because you’re still turned on by the fact that he’s a fireman. And don’t meet him for drinks that week wearing your “Forever 21 I Don’t Need a Personality Tank Top.” Mindy, you stupid, naive, little twat. He’s not a fireman. He’s unemployed. He collects knives. And he lives in Staten Island. That night you passed out in his second cousin’s apartment. And when you meet him for drinks he says “So you’re Italian Catholic right?” you when you tell him you’re Jewish he says, “that’s fuckin' hot!” in a really creepy way. And he’s going to call you everyday for the next three weeks leaving you really long voicemails. At first he’ll just ramble and you’ll laugh about it with your friends, but then he’ll get kind of nasty and sociopath-like and you’re going to have to change your cell phone number. And even though you’re sure you didn’t do anything more than make out with him, you’re still going to pay three hundred dollars out of your uninsured pocket to see the Gyno, just in case. And to this day you still have nightmares about being attacked by a large, unemployed, knife collecting, Catholic, fireman wannabe from Staten Island with a fetish for Jewish women who probably reads your College Humor Column. So don’t EVER post a column about him, that would be really, really stupid. Oh, and never wear leggings and jelly shoes when you’re twenty-seven, not even ironically. | Low | [
0.482014388489208,
33.5,
36
] |
Synthesis and visualization of a membrane-permeable MRI contrast agent. The study of in vivo developmental events has undergone significant advances with the advent of biological molecular imaging techniques such as computer enhanced light microscopy imaging, positron emission tomography (PET), micro-CT, and magnetic resonance imaging (MRI). MRI has proven to be a particularly powerful tool in clinical and biological settings. Images can be acquired of opaque living animals, with the benefit of tracking events of extended periods of time on the same specimen. Contrast agents are routinely used to enhance regions, tissues, and cells that are magnetically similar but histologically distinct. A principal barrier to the development of MR contrast agents for investigating developmental biological questions is the ability to deliver the agent across cellular membranes. As part of our research, we are investigating a number of small molecules that facilitate transport of charged and uncharged species across cell membranes. Here we describe the synthesis and testing of a Gd(III)-based MR contrast agent conjugated to polyarginine that is able to permeate cell membranes. We confirmed cellular uptake of the agent using two-photon laser microscopy to visualize a Eu(III) derivative of the contrast agent in cell culture, and verified this uptake by T(1) analysis of the Gd(III) agent in cells. | High | [
0.6892808683853461,
31.75,
14.3125
] |
Molecular Cloning of Drebrin: Progress and Perspectives. Chicken drebrin isoforms were first identified in the optic tectum of developing brain. Although the time course of protein expression was different in each drebrin isoform, the similarity between their protein structures was suggested by biochemical analysis of purified protein. To determine their protein structures, the cloning of drebrin cDNAs was conducted. Comparison between the cDNA sequences shows that all drebrin cDNAs are identical except that the internal insertion sequences are present or absent in their sequences. Chicken drebrin are now classified into three isoforms, namely, drebrins E1, E2, and A. Genomic cloning demonstrated that the three isoforms are generated by an alternative splicing of individual exons encoding the insertion sequences from single drebrin gene. The mechanism should be precisely regulated in cell-type-specific and developmental stage-specific fashion. Drebrin protein, which is well conserved in various vertebrate species, although mammalian drebrin has only two isoforms, namely, drebrin E and drebrin A, is different from chicken drebrin that has three isoforms. Drebrin belongs to an actin-depolymerizing factor homology (ADF-H) domain protein family. Besides the ADF-H domain, drebrin has other domains, including the actin-binding domain and Homer-binding motifs. Diversity of protein isoform and multiple domains of drebrin could interact differentially with the actin cytoskeleton and other intracellular proteins and regulate diverse cellular processes. | High | [
0.6651376146788991,
36.25,
18.25
] |
{ This file is part of the Free Pascal run time library. (c) 2000-2003 by Marco van de Voort member of the Free Pascal development team. See the file COPYING.FPC, included in this distribution, for details about the copyright. Termios implementation for FreeBSD This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. } {****************************************************************************** IOCtl and Termios calls ******************************************************************************} Function TCGetAttr(fd:cint;var tios:TermIOS):cint; {$ifdef VER2_0}inline;{$endif} begin TCGETAttr:=fpIoCtl(Fd,TIOCGETA,@tios); end; Function TCSetAttr(fd:cint;OptAct:cint;const tios:TermIOS):cint; var nr: TIoCtlRequest; begin case OptAct of {the three constants TIOCSETA, TIOCSETAW and TIOCSETAF are unsigned values above $80000000, so that they give range check errors on 32-bit systems Solved by using TIoCtlRequest type for FpIOCtl second parameter } TCSANOW : nr:=TIOCSETA; TCSADRAIN : nr:=TIOCSETAW; TCSAFLUSH : nr:=TIOCSETAF; else begin fpsetErrNo(ESysEINVAL); TCSetAttr:=-1; exit; end; end; TCSetAttr:=fpIOCtl(fd,nr,@Tios); end; Procedure CFSetISpeed(var tios:TermIOS;speed:Cardinal); {$ifdef VER2_0}inline;{$endif} begin tios.c_ispeed:=speed; {Probably the Bxxxx speed constants} end; Procedure CFSetOSpeed(var tios:TermIOS;speed:Cardinal); {$ifdef VER2_0}inline;{$endif} begin tios.c_ospeed:=speed; end; Procedure CFMakeRaw(var tios:TermIOS); begin with tios do begin c_iflag:=c_iflag and (not (IMAXBEL or IXOFF or INPCK or BRKINT or PARMRK or ISTRIP or INLCR or IGNCR or ICRNL or IXON or IGNPAR)); c_iflag:=c_iflag OR IGNBRK; c_oflag:=c_oflag and (not OPOST); c_lflag:=c_lflag and (not (ECHO or ECHOE or ECHOK or ECHONL or ICANON or ISIG or IEXTEN or NOFLSH or TOSTOP or PENDIN)); c_cflag:=(c_cflag and (not (CSIZE or PARENB))) or (CS8 OR cread); c_cc[VMIN]:=1; c_cc[VTIME]:=0; end; end; Function TCSendBreak(fd,duration:cint):cint; {$ifdef VER2_0}inline;{$endif} var sleepytime : ttimeval; begin sleepytime.tv_sec := 0; sleepytime.tv_usec := 400000; if fpioctl(fd, TIOCSBRK, nil) = -1 then exit(-1); fpselect(0, nil, nil, nil, @sleepytime); if fpioctl(fd, TIOCCBRK, nil) = -1 then exit(-1); TCSendBreak:=0; end; Function TCSetPGrp(fd,id:cint):cint; {$ifdef VER2_0}inline;{$endif} begin TCSetPGrp:=fpIOCtl(fd,TIOCSPGRP,pointer(id)); end; Function TCGetPGrp(fd:cint;var id:cint):cint; {$ifdef VER2_0}inline;{$endif} begin TCGetPGrp:=fpIOCtl(fd,TIOCGPGRP,@id); end; Function TCDrain(fd:cint):cint; {$ifdef VER2_0}inline;{$endif} begin TCDrain:=fpIOCtl(fd,TIOCDRAIN,nil); {Should set timeout to 1 first?} end; const _POSIX_VDISABLE = $ff; Function TCFlow(fd,act:cint):cint; {$ifdef VER2_0}inline;{$endif} var term:Termios; c : cuchar; tmp : cint; begin case act OF TCOOFF : TCFlow:=fpIoctl(fd,TIOCSTOP,nil); TCOOn : TCFlow:=fpIOctl(Fd,TIOCStart,nil); TCION, TCIOFF : begin if tcgetattr(fd, term) = -1 then exit(-1); if act=TCIOFF then tmp:=VSTOP else tmp:=VSTART; c:=term.c_cc[tmp]; if (c <> _POSIX_VDISABLE) and (fpwrite(fd, c, sizeof(c)) = -1) then exit (-1); TCFlow:=0; end; else begin errno := esysEINVAL; exit(-1); end; end; end; const FREAD = 1; // marked "BSD visible" FWRITE = 2; Function TCFlush(fd,qsel:cint):cint; {$ifdef VER2_0}inline;{$endif} var comval : cint; begin case qsel of TCIFlush : comval:=FREAD; TCOFlush : comval:=FWRITE; TCIOFlush : comval:=FREAD or FWRITE; else begin errno:=ESysEINVAL; exit(-1); end; end; TCFlush:=fpIOCtl(fd,TIOCFLUSH,pointer(@comval)); end; Function IsATTY (Handle:cint):cint; { Check if the filehandle described by 'handle' is a TTY (Terminal) } var t : Termios; begin IsAtty:=ord(TCGetAttr(Handle,t) <> -1); end; Function IsATTY(var f: text):cint; {$ifdef VER2_0}inline;{$endif} { Idem as previous, only now for text variables. } begin IsATTY:=IsaTTY(textrec(f).handle); end; | Low | [
0.5237068965517241,
30.375,
27.625
] |
Q: Unix find and replace recursively? Hopefully, this will be a quick one for someone here... I need to find and replace a string recursively in unix. Normally, I use: perl -e "s/term/differenterm/g;" -pi $(find path/to/DIRECTORY -type f) But, the string I need to replace contains slashes, and I'm not sure how to escape them? So, I need to do: perl -e "s/FIND/REPLACE/g;" -pi $(find path/to/DIRECTORY -type f) where FIND = '/string/path/term' and REPLACE = '/string/path/newterm' A: You could use other characters besides /. For example: perl -e "s|FIND|REPLACE|g;" -pi $(find path/to/DIRECTORY -type f) More info in http://perldoc.perl.org/perlop.html#Regexp-Quote-Like-Operators | Mid | [
0.6497695852534561,
35.25,
19
] |
p**4*w + 27*g*p**3 - 2*g*p**2*w + 2*g*p**2 + 2*g*p - 14*g*w wrt p. 3540*g*p**2 - 48*g*p*w + 162*g Differentiate -169*f + 2921 wrt f. -169 Find the second derivative of -34*q**2 - 888*q. -68 Differentiate -188*a*p - 109*p wrt a. -188*p What is the second derivative of 2*x**2*z**2 - 70*x**2*z - 2*x**2 - 4130*x*z**3 - 10*x + z**3 - 2*z**2 - 2 wrt z? 4*x**2 - 24780*x*z + 6*z - 4 What is the second derivative of 12*q**3*y**2*z + 2*q**3*y*z**2 + 20*q**3*z**2 - q**2*y*z**3 + 2*y**2*z**3 + 8*y**2 wrt y? 24*q**3*z + 4*z**3 + 16 Find the third derivative of 770*p**3*v**3 - 4*p**3*v**2 + p**3*v - 17 wrt v. 4620*p**3 Differentiate 6*n**3*o**4*r - 3*n**3*r**2 + 18*n**2*o*r**3 + 3*n*r**3 wrt o. 24*n**3*o**3*r + 18*n**2*r**3 Find the second derivative of 20*w**4 - 22*w**3 + 48*w + 5 wrt w. 240*w**2 - 132*w What is the second derivative of 6764*k**3 - 4000*k? 40584*k What is the third derivative of 1113*x**4 + 2*x**2 + 4493 wrt x? 26712*x Differentiate -2*r**3 + 252*r**2 - 968 with respect to r. -6*r**2 + 504*r Find the second derivative of 71*k**3 + 4*k**2 + 85*k - 1 wrt k. 426*k + 8 Find the first derivative of 993*c*u - 2093*c wrt u. 993*c Differentiate -20632*n**2*r**2 + r**2 - 14*r + 12 wrt n. -41264*n*r**2 What is the first derivative of -1211*d**2 + 50? -2422*d Find the third derivative of 115*w**6 - w**3 + 2*w**2 + 388 wrt w. 13800*w**3 - 6 What is the third derivative of g**6*q**2 - 77*g**6*q - 2*g**2*q - 13*g*q**2 - 5 wrt g? 120*g**3*q**2 - 9240*g**3*q What is the derivative of 2*h**3 + 2108*h**2 - 1994 wrt h? 6*h**2 + 4216*h What is the third derivative of 738*w**4 + 1932*w**2? 17712*w What is the third derivative of 32*b**3*l*p**2 + b**3*l*p - 3*b**3*p**2 - b**2*p + b*l*p**2 + b*l + 3*p**2 wrt b? 192*l*p**2 + 6*l*p - 18*p**2 Find the second derivative of -19*u**4 + 2*u**2 + u + 48 wrt u. -228*u**2 + 4 Find the first derivative of 1112*z - 1480 wrt z. 1112 What is the third derivative of -11*k**5 - 4*k**4 - 45*k**2 wrt k? -660*k**2 - 96*k What is the first derivative of 108*d**3 + 65 wrt d? 324*d**2 Differentiate -36*m**3 + 7395 wrt m. -108*m**2 Differentiate 12*i*j**4 + 15*i + 40*j - 2 with respect to j. 48*i*j**3 + 40 Find the first derivative of -117*n**2*s*w**3 - 4*n**2*s - 226*n*s + s*w**3 wrt w. -351*n**2*s*w**2 + 3*s*w**2 Find the third derivative of 346*f**4*j - f**3*j**2 - 13*f**2*j + 5*j**2 wrt f. 8304*f*j - 6*j**2 What is the first derivative of -2*u*y**3 - 1110*u*y - 6*u + 203 wrt y? -6*u*y**2 - 1110*u What is the derivative of 867*c**2 - 393 wrt c? 1734*c Differentiate -130*c**2*d + d - 56 wrt c. -260*c*d Differentiate 6*d**2*n*x - d**2*v*x - 6*d*n*v*x - 11*d*v*x + 4*d*v with respect to n. 6*d**2*x - 6*d*v*x Differentiate -3289*m*p**2 + 2*m - 1301 with respect to p. -6578*m*p What is the third derivative of -367*r**4 + 23*r**2 - 15*r? -8808*r What is the second derivative of 283*r**2 - 2*r - 459 wrt r? 566 What is the first derivative of b**2*w**2 - 3*b**2 - 5*b*w**3 - b*w + 8*b wrt w? 2*b**2*w - 15*b*w**2 - b Differentiate -1812*g**3 + 1833 wrt g. -5436*g**2 Differentiate -53*z + 145. -53 What is the second derivative of -9608*d**2*k**2 + 4241*d*k**2 wrt d? -19216*k**2 What is the third derivative of 28*i**3*r**3 - 2*i**3*r - 2*r**2 + 57*r wrt r? 168*i**3 What is the first derivative of 3*a**2*k - 34*a + 59*k - 4 wrt a? 6*a*k - 34 What is the second derivative of k**2*u**2 - 76*k**2*u - 131*k*u**2 wrt k? 2*u**2 - 152*u What is the third derivative of -7853*b**3 - 9686*b**2? -47118 Find the first derivative of -b*j**2*n**2 + 4*b*j**2*n + 26*b + j**2 + 2*n**2 - 1 wrt n. -2*b*j**2*n + 4*b*j**2 + 4*n Find the second derivative of 657*a**5 - a - 117. 13140*a**3 Find the third derivative of -370*o**5 + 15*o**2 - 3*o. -22200*o**2 What is the third derivative of k*m**4 - 46*k*m**3 + 5*k*m**2 + 21*m**2 wrt m? 24*k*m - 276*k Find the first derivative of -2*q**4 + 9*q**2 - 506 wrt q. -8*q**3 + 18*q Find the third derivative of 2*c*g**5 + 308*c*g**3 + c*g**2 + 4*g**2 + 12*g wrt g. 120*c*g**2 + 1848*c Find the second derivative of j**2*v + 1067*j**2 - 3*j*v + 5*j + 45*v + 1 wrt j. 2*v + 2134 Find the second derivative of -3202*k**2 - 1675*k wrt k. -6404 What is the third derivative of -3962*f**3 + 7134*f**2 wrt f? -23772 What is the first derivative of -48*a*c**3*d - a*c**3 + a*c**2*d + a*c*d*f + 1734*a*c*f wrt d? -48*a*c**3 + a*c**2 + a*c*f What is the third derivative of 3987*b**3 + 2*b**2 - 3*b - 573 wrt b? 23922 What is the first derivative of -1685*j**4*k - j**3*k + 1515*k wrt j? -6740*j**3*k - 3*j**2*k What is the first derivative of -10*m**2 + 3*m + 5 wrt m? -20*m + 3 Find the third derivative of -4*h**5 - 528*h**4 - 3*h**3 - 350*h**2 - 3*h - 1 wrt h. -240*h**2 - 12672*h - 18 What is the second derivative of s**5 + 924*s**3 + 5*s + 61 wrt s? 20*s**3 + 5544*s What is the third derivative of -38*f*n**4 + f*n**3 + 37*f*n - n**5 + 4*n**2 wrt n? -912*f*n + 6*f - 60*n**2 Find the second derivative of -545*s**2 + 703*s. -1090 Differentiate 2165*m**2 + m - 494 with respect to m. 4330*m + 1 Find the second derivative of 3*m**2*o**2 + 2*m**2*o + 27*m - 17*o**2 + 7*o wrt o. 6*m**2 - 34 What is the first derivative of 2*u**4*x - 3*u**2*x**2 - 59*u**2*x - 3418*x**2 wrt u? 8*u**3*x - 6*u*x**2 - 118*u*x Find the third derivative of -33*j**3*n + 14*j**3 - 37*j**2*n - j*n wrt j. -198*n + 84 What is the second derivative of 4*l**2*p**2*t + 6*l**2*p*t**2 + 20*l*p**2*t**2 - 225*l*p wrt t? 12*l**2*p + 40*l*p**2 Find the second derivative of 439*c**2*y**2*z**2 + 6*c**2*y**2*z + 2*c**2*y**2 - 14*c**2 - 2*y*z wrt z. 878*c**2*y**2 Differentiate 5840*f**2*v - 6172*f**2 wrt v. 5840*f**2 What is the second derivative of -3752*k**2 + 5114*k? -7504 Find the second derivative of 139*s**2 + 210*s wrt s. 278 Find the first derivative of y**4 + 12684*y**3 + 7072 wrt y. 4*y**3 + 38052*y**2 What is the first derivative of 276*n*w**3 + 366*w**3 wrt n? 276*w**3 Differentiate -14518*s**2 + 2868 wrt s. -29036*s Find the third derivative of -199*o**3 - 17*o**2 - o wrt o. -1194 What is the third derivative of -102*a*l**2*s**3 - 2*a*l*s**2 - 2*a*s + k*l**2 + 2*k*l*s**3 + 202*k*l + 3*l**2*s**3 wrt s? -612*a*l**2 + 12*k*l + 18*l**2 Differentiate 86*b**3 - 205 wrt b. 258*b**2 What is the third derivative of 243*l**4 - 2*l**3 + 195*l**2 + 2*l + 2? 5832*l - 12 Differentiate -2*c**2 + 7*c - 2468 with respect to c. -4*c + 7 What is the third derivative of -50*h**4 + 89*h**3 - 10*h**2 + 112? -1200*h + 534 Differentiate -12*b**2*r**3 + 16*b*r**3 - 24554*r**3 wrt b. -24*b*r**3 + 16*r**3 What is the third derivative of -44*q**5 + 26*q**2 - 2*q? -2640*q**2 What is the first derivative of -21*c**4 - 4*c**2 - 1170? -84*c**3 - 8*c Find the second derivative of 2732*r**5 + 1006*r + 3 wrt r. 54640*r**3 Find the third derivative of 3*h*j*k**3 + 7*h*j - 5*j*k**3 - 2*j - 362*k**3 - k**2 + 19 wrt k. 18*h*j - 30*j - 2172 What is the third derivative of 46*o**6 + 6*o**5 + 2413*o**2 wrt o? 5520*o**3 + 360*o**2 What is the third derivative of -2*m**3*q**2*w + 27*m**3*q*w**2 - 4*m**3*w**3 - 2*m*q**2*w**3 + 5*m*q**2*w**2 - 555*q*w**3 wrt w? -24*m**3 - 12*m*q**2 - 3330*q Find the second derivative of 87*h**4*o**2 + 3*h**3*o**2 + 171*h*o + o**2 wrt h. 1044*h**2*o**2 + 18*h*o**2 Differentiate -933*b**2 + 187. -1866*b What is the third derivative of k**6 + 23*k**5 + 34*k**4 - 2913*k**2? 120*k**3 + 1380*k**2 + 816*k What is the third derivative of 113*g**5 + 2*g**2 + 127*g? 6780*g**2 Find the second derivative of 293*n**3 - 162*n wrt n. 1758*n Find the third derivative of 183*q**4 + q**3 - 239*q**2 wrt q. 4392*q + 6 Differentiate -2826*v**2 + 17242 wrt v. -5652*v Find the second derivative of -3*q**4 + 207*q**3 + 1011*q wrt q. -36*q**2 + 1242*q What is the second derivative of 162*m*p**3 + 2*m*p**2 - 149*m - 10*p**5 - 5*p + 2 wrt p? 972*m*p + 4*m - 200*p**3 What is the derivative of 37*v**4 + 3*v**2 + 2616? 148*v**3 + 6*v What is the first derivative of 1064*a**3*p*y + 42*a**3 + 2*a**2*p*y + 5*y wrt p? 1064*a**3*y + 2*a**2*y Differentiate b*m**3 - 28*b*s - 20*m**3*s - 5*m**2 + 2*s wrt b. m**3 - 28*s What is the third derivative of -448*b**3*s + 2*b**2*s + 22*b**2 - s wrt b? -2688*s Find the second derivative of -5*g*v**4 + 619*g*v**3 + 4*g*v - 2*g - 2*v**3 + 14 wrt v. -60*g*v**2 + 3714*g*v - 12*v Find the sec | Mid | [
0.558823529411764,
30.875,
24.375
] |
What do clients expect of community care and what are their needs? The Community care for the Elderly: Needs and Service Use Study (CENSUS). To investigate the relationship between objectively assessed care needs and expectations for care of older people and their carers, before commencement of community care services. Cross-sectional research on 55 community-dwelling older adults and carers, recruited after receiving approval for government-subsidised community care services. Care needs and expectations of care were assessed at interview. Participants' and carers' expectations for their pending community care package did not correspond with unmet participant needs. Instead, expectations corresponded with met needs, that is those for which they already received help, with the exception of expectations of domestic support and personal care. Participants' unmet needs were predominantly in social and recreational activities, eating, and physical and mental health. As community care in Australia becomes consumer-directed by 2015, care services will need to empower clients and carers through education about their needs and available services, as part of the assessment and service negotiation process. | High | [
0.656330749354005,
31.75,
16.625
] |
Introduction {#sec1} ============ The prevalence of diabetes has been growing rapidly over the past 20 years. Number of diabetic patients of 20--79 years old worldwide is expected to increase to 439 million by 2030 \[[@B1]\]. Diabetes is considered as a significant risk factor for cardiovascular disease (CVD), the primary cause of mortality worldwide \[[@B2],[@B3]\]. In 2012, about 1.5 million people died of diabetes in the world, of which about 80% were associated with myocardial infarction (MI) or stroke \[[@B4]\]. Diabetes treatment aims to control multiple risk factors, such as hyperglycemia, hyperlipidemia, and hypertension, etc., in order to decrease the incidence of CVD and other complications. A variety of antidiabetic agents are available clinically, for example: sulfonylureas and meglitinides, biguanides, α-glucosidase inhibitors (AGIs), thiazolidinediones (TZDs), glucagon-like peptide1 (GLP-1) analogs, dipeptidyl peptidase-4 (DPP-4) inhibitors, sodium-glucose cotransporter 2 (SGLT2) inhibitors, insulin and insulin analogs, etc. Previously, cardiovascular (CV) safety was rarely assessed in large clinical trials before antidiabetic agents were approved for market, and the majority of data obtained originally from postmarketing clinical observations. In 2007, however, an amazing result of a meta-analysis from 42 randomized trials treated with rosiglitazone, one of TZDs, was reported by Nissen and Wolski \[[@B5]\], which showed a possible increased risk of MI and death from CVD when comparing to the control group. This result sparked long-standing debate, although no excess CVD risk was reported in the following studies \[[@B6]\]. Consequently, a guidance about requiring the evidence of CV safety of novel antidiabetic agents by the pharmaceutical industry before approval was released by the US Food and Drug Administration (US FDA) \[[@B7]\]. Diabetic CVD is caused by many pathophysiological processes, such as macroangiopathy, microangiopathy, metabolic abnormalities, chronic inflammation, and fibrosis \[[@B8],[@B9]\]. Pathogenesis and protective molecular mechanisms of diabetic CVD have been the focus of research in recent years. Adenosine 5′-monophosphate-activated protein kinase (AMPK) is an important serine and threonine protein kinase with the structure of three subunits (α, β, γ), which plays crucial roles in cell energy metabolism \[[@B10]\]. Increasing the ratio between intracellular adenosine monophosphate (AMP) and adenosine triphosphate (ATP), such as during strenuous exercise, hypoxia or nutritional deficiency, could phosphorylate a threonine, the 172th amino acid of the α subunit, thereby activating AMPK \[[@B11]\]. In addition, liver kinase B1 (LKB1), calmodulin-dependent protein kinase kinase β (CaMKKβ) and AMPK kinase (AMPKK) can be employed as upstream molecules. After activation, AMPK shuts down pathways of ATP-consuming and switches on catabolic pathways of ATP-producing through downstream signaling and target molecules \[[@B12],[@B13]\], regulates lipid and protein metabolism, fatty acid oxidation, glucose uptake, gluconeogenesis, and autophagy \[[@B12]\], etc. AMPK also plays an important role in reducing oxidative stress, regulating autophagy, and anti-apoptosis of cardiomyocytes \[[@B16],[@B17]\]. Our research team and others have reported that AMPK played cardioprotective roles during ischemia by increasing glucose uptake and glucose transporter 4 (GLUT4) translocation \[[@B18]\], decreasing apoptosis, improving postischemic recovery and limiting MI \[[@B7],[@B19]\]. Furthermore, our studies have also suggested that activated protein C could activate AMPK and protect the heart from ischemia/reperfusion (I/R) injury \[[@B20]\], and inhibit inflammatory responses during hypoxia/reoxygenation (H/R) by modulating a JNK-mediated nuclear factor κB (NF-κB) pathway \[[@B21]\]. Antidiabetic agents may affect the CV system through many molecular signaling pathways. In this review, we intend to summarize the literature and discuss whether commonly used antidiabetic agents can affect CVD through AMPK-related signaling and molecular pathways. Sulfonylureas and meglitinides {#sec2} ============================== Sulfonylureas act by binding to sulphonylurea receptor 1 (SUR1) of pancreatic β cells, and close the ATP-sensitive potassium channels (KATP), causing an augment of intracellular K^+^, triggering of membrane depolarization, opening of voltage-dependent Ca^2+^ channels, increasing intracellular Ca^2+^ influx, then inducing insulin secretion \[[@B22]\]. Glibenclamide, glipizide, gliclazide, and glimepiride are commonly used in clinical practice. Meglitinides, including repaglinide, nateglinide and mitiglinide, display a similar hypoglycemic mechanism (binding to SUR2) as sulfonylureas. Concern exists regarding the CV safety of sulfonylureas \[[@B23]\]. In the UK Prospective Diabetes Study (UKPDS), CV mortality was similar in patients of chlorpropamide group and insulin group \[[@B24]\]. Glibenclamide has been associated with acute MI and mortality \[[@B25]\], as well as being associated with blocking the protective effects of postconditioning \[[@B26]\]. By contrast, gliclazide and repaglinide appear to be related a lower risk than other sulfonylureas \[[@B25], [@B27]\]. Multiple research has suggested that cardiotoxicity of sulfonylureas is associated to the closure of specific KATP channels expressed in the heart \[[@B28]\], which could worsen the myocardial injury. Some newer sulfonylureas may not inhibit myocardial protection. For example, gliclazide and glimepiride appear not to prevent the protective effect of ischemic preconditioning in animals \[[@B29]\] and humans \[[@B30]\]. Very little research can be retrieved on the relationship between sulfonylureas and AMPK nor meglitinides and AMPK. Glibenclamide induced a dose-dependent increase of the AMP/ATP ratio by inhibiting complexes I, II, III \[[@B31]\], resulting in an increased AMPK phosphorylation in H9C2 cells. However, it profoundly changes cell metabolism in cardiomyocytes by impairing mitochondrial structure and function and induces irreversible damage beyond the benefits of AMPK activation. This may further explain the risk of CV events related to this drug. However, gliclazide can increase CaMKKβ and the phosphorylated AMPK levels in vascular smooth muscle cell (VSMC) and suppress platelet-derived growth factor (PDGF)-induced VSMC proliferation by the rising of intracellular Ca^2+^ concentration \[[@B32]\], which is beneficial for reducing CVD. Biguanides {#sec3} ========== Biguanides were used for treatment of diabetes in humans in the 1920s \[[@B33]\] with several derivatives such as metformin, phenformin and buformin. Phenformin was withdrawn from the market in 1978 because of a rare but life-threatening side effect of lactic acidosis. Metformin is the most widely prescribed antidiabetic agent in individuals with type 2 diabetes (T2DM), which is the first-line oral therapy recommended by almost all guidelines, such as American Diabetes Association (ADA) \[[@B34]\], European Association of the Study of Diabetes (EASD) \[[@B35]\], and National Institute for Health and Care Excellence (NICE) \[[@B36]\], etc. UKPDS \[[@B24]\] suggested that metformin reduced diabetes-related death by 42% and all-cause mortality by 36%. Similar results reported later from many clinical studies have shown CV protection and mortality reduction exerted by metformin appearing not to be dependent on its hypoglycemic effects \[[@B37]\]. Although the main antidiabetic effect of metformin was known as reducing hepatic glucose output and an increasing insulin-dependent peripheral glucose utilization \[[@B40],[@B41]\], mainly by inhibiting gluconeogenesis \[[@B42]\], its molecular mechanism remained unclear until it was reported that it could activate AMPK in isolated hepatocytes \[[@B43]\]. Metformin inhibits complex I of the respiratory chain of the cell resulting in a decrease of the intracellular ATP concentration and an increase of the AMP/ATP ratio for the activation of AMPK \[[@B44]\], which is required for the CV protective effects of metformin \[[@B44],[@B47]\]. Interestingly, there are also studies demonstrating that AMPK can be activated by metformin without changes in the AMP/ATP ratio \[[@B48],[@B49]\] and metformin can also exert its beneficial metabolic effects on cardiomyocytes in an AMPK-independent manner \[[@B50]\]. Many studies suggest the pleiotropic effects of metformin mediated by activation of AMPK. We can summarize the effects of metformin on CVD through the AMPK pathways from the following aspects. Energy metabolism of cardiomyocyte {#sec3-1} ---------------------------------- Impaired energy metabolism exists in many kinds of heart disease. After activation by metformin, AMPK can phosphorylate acetyl-coenzyme A carboxylase (ACC) and inhibit its function, which reduces the production of malonyl-CoA and the inhibitory effect of AMPK on carnitine palmitoyl transferase 1 (CPT1), promoting the oxidation of fatty acids \[[@B51]\]. In addition, activation of AMPK by metformin increases glucose uptake by inducing GLUT4 recruitment to the plasma membrane \[[@B52],[@B53]\], prevents GLUT4 endocytosis and increases the residence time of GLUT4 in the plasma membrane thus increasing glucose transport and catabolism \[[@B54]\]. Vascular endothelium and oxidative stress {#sec3-2} ----------------------------------------- The dysfunction of endothelial cells plays a crucial role in the occurrence and development of CVD. Metformin exerts an inhibitory effect to mitochondrial reactive oxygen species (ROS) production by selectively blocking the reverse electron flow through complex I of respiratory chain \[[@B55]\]. Multiple studies indicated that activated AMPK is beneficial to endothelial function by suppressing oxidative stress in endothelial cells \[[@B56],[@B57]\]. Endothelial nitric oxide synthase (eNOS) has a protective function in the CV system, which is attributed to NO production regulating the vascular tone. Administration of metformin *in vivo* increases AMPK phosphorylation in the aorta of mice, resulting in increased NO synthesis, and bioavailability \[[@B58]\]. Metformin can also increase mitochondria-derived peroxonitrite ONOO^−^ to activate AMPK in c-Src/PI3K (phosphatidylinositol-3-kinases)-dependent manners in cultured bovine aortic endothelial cells \[[@B59]\]. A further study has demonstrated that AMPK activation by metformin increases the association between heat-shock protein 90 (Hsp90) and eNOS, which reduces eNOS-derived O^2−^ \[[@B60]\]. In addition to antioxidant stress, metformin also regulates endothelial cell energy metabolism. For example, AMPK activation by metformin increases fatty acid oxidation, which can alleviate endothelial lipotoxicity and improve endothelial function \[[@B61]\]. AMPK is considered as an important target for endothelial dysfunction and atherosclerosis. As an AMPK activator, metformin has great potential for promoting endothelial function to resist atherosclerosis \[[@B62]\]. Metformin's CV beneficial effects of atherosclerosis prevention are mediated in part through its ability of inhibiting the oxidative stress-mediated accumulation of cholesterol via AMPK-SREBP2 (sterol regulatory element-binding protein 2)-LDLR (low-density lipoprotein receptor) axis in vascular cells \[[@B63]\]. Heart failure and ventricular remodeling {#sec3-3} ---------------------------------------- Diabetes has a higher risk of developing heart failure (HF). Diabetic cardiomyopathy \[[@B64]\] is a common cause of HF in diabetics. It is characterized with reduced cardiomyocyte contractile function and apoptosis, mitochondrial pathology and dysfunction, and myocardial interstitial fibrosis \[[@B65]\]. Previously, metformin is considered contraindicated in patients with HF due to increase the risk of lactic acidosis. However, growing evidence indicates that this contraindication could be revised \[[@B66]\]. Accordingly, FDA removed the HF contraindication on the drug label for metformin in 2006, although congestive HF remains in the label's warning section \[[@B69]\]. It has also been demonstrated that metformin has multiple beneficial AMPK-mediated effects in HF \[[@B70],[@B71]\]. Several animal studies showed that metformin could delay the process of cardiac remodeling and the development of HF by a different pathway of AMPK activation \[[@B72]\]. Gundewar et al. \[[@B73]\] have carried out some experiments that metformin could significantly improve left ventricular (LV) function and survival by AMPK and its downstream mediators activation, peroxisome proliferator-activated receptor γ coactivator 1-α (PGC-1α) and eNOS in a murine model of HF. Chronic administration of metformin to a dog model of cardiac pacing-induced HF attenuated the hemodynamic and structural changes by AMPK activation \[[@B74]\]. Moreover, chronic treatment with a low dose of metformin (100 mg/kg) exerts significant cardioprotection effect against HF of rat by activating the AMPK/eNOS pathway, as well as reducing circulating and myocardial levels of insulin, transforming growth factor beta 1 (TGF-β1), basic fibroblast growth factor (bFGF), and tumor necrosis factor α (TNFα) \[[@B75]\]. Myocardial ischemia and I/R injury {#sec3-4} ---------------------------------- It has been tested that metformin and activated AMPK can play essential roles in the protection of myocardial ischemia and I/R injury by maintenance of the energy supply, and anti-oxidative stress \[[@B76]\]. Metformin (5 mM) in H9C2 cardiomyoblasts attenuated high glucose and H/R-induced cell injury, mitochondrial dysfunction, ROS over generation and inflammatory response through an AMPK/JNK-dependent signaling pathway \[[@B77]\]. A meta-analysis with 38 animals treated with metformin and 50 controls showed that the average infarct area at risk was reduced from 47.8 in the ischemia control group to 29.4 in the metformin group \[[@B78]\].In the study of isolated rat hearts, during the first 15 min of reperfusion metformin reduced infarct area with approximately 40--50% \[[@B79]\] by increased AMPK phosphorylation. Yin et al. \[[@B69]\] have also shown the reduction of the infarct size by metformin through AMPK phosphorylation in rats independent of systemic glucose levels. Metformin can also prevent acute death of cells in cardiac allografts by mainly suppressing intrinsic apoptosis due to I/R injury incurred from the transplantation procedure by AMPK activation \[[@B80]\]. Chronic myocardium inflammation {#sec3-5} ------------------------------- Recent studies have indicated that metformin has a direct anti-inflammatory action by inhibition of NF-κB via AMPK-dependent and independent pathways \[[@B81]\]. AMPK activation by short-term administration of metformin and the subsequent suppression of Toll-like receptor 4 (TLR4) expression and activity can suppress inflammatory responses and protect the infarcted heart \[[@B82]\]. However, Soraya et al. found that low dose pre-treatment of metformin chronically could suppress TLR4 signaling, inhibit the release of inflammatory mediators, and reverse LV contractile dysfunction in the setting of MI in an AMPK-independent manner \[[@B83]\]. Apoptosis {#sec3-6} --------- Cardiomyocyte apoptosis is common in CVD and diabetic cardiomyopathy. Experimental evidence suggested that metformin reduced the production of pro-apoptotic proteins, increased the anti-apoptotic proteins, and attenuated the percentage of apoptotic cardiomyocytes \[[@B84]\]. High-fat-induced cardiomyocyte apoptosis was partly blunted by metformin associated with increased AMPK phosphorylation \[[@B85]\]. Doxorubicin, a chemotherapy medication used to treat some cancer, can cause cardiotoxicity, and cardiomyocyte apoptosis. Metformin protected adult mouse cardiomyocytes (HL-1 cells) from doxorubicin-induced oxidative stress and apoptosis by modulating the expression of the adiponectin system via AMPK-mediated signaling \[[@B86]\]. Another research suggested that cardioprotective effects of metformin are mediated by AMPK activation, protein kinase A (PKA), Src, and platelet-derived growth factor receptor (PDGFR) \[[@B87]\]. Autophagy {#sec3-7} --------- Autophagy is a self-degradative process that is important for balancing sources of energy at critical times in development and in response to nutrient stress \[[@B88]\]. Declined AMPK activity and the following reduction in cardiac autophagy are central to the development of diabetic cardiomyopathy. Metformin significantly improved mitochondrial respiration and ATP synthesis of cardiomyocytes by an underlying mechanism requiring the AMPK activation and its downstream mediators eNOS and PGC-1α \[[@B73]\]. Xie et al. \[[@B72]\] found that AMPK activated by metformin stimulates autophagy activity in cardiomyocytes by modulating Beclin1 and the tuberous sclerosis complex (TSC) mammalian target of rapamycin (mTOR) pathway in OVE26 mice. Meanwhile, a study in a murine model demonstrated that activation of Pink1-AMPK signaling by metformin rescued against phosphatase and tensin homolog (PTEN) deletion-induced changes in myocardial geometry, function, and autophagy \[[@B89]\]. Downstream molecular signaling pathways of AMPK activated by metfromin for the protection of CV system are shown in [Figure 1](#F1){ref-type="fig"}. {#F1} α-Glucosidase inhibitors {#sec4} ======================== AGIs are a type of widely used hypoglycemic agents with the mechanism of delaying the absorption of carbohydrates from the upper part of small intestine and producing a lowering effect to postprandial blood glucose. Acarbose, miglitol, and voglibose are involved. Some clinical and basic studies have provided evidence of CV protection of AGIs. Acarbose reportedly reduced the morbidity of hypertension, CV events \[[@B90]\], and silent MI \[[@B91]\]. It also slowed progression of intima-media thickening of individuals with impaired glucose tolerance (IGT), improved carotid plaque echogenicity in patients with acute coronary syndrome (ACS) \[[@B92],[@B93]\], and reduces the risk of MI in T2DM patients \[[@B94]\]. Acarbose could also stabilize carotid plaque within 1 month of therapy in patients with ACS and T2DM \[[@B93]\]. In the reports of basic research, acarbose reduced MI size in animals by opening mitochondrial KATP channels \[[@B95]\]. Some reports have suggested that the absorbed miglitol suppressed neointimal thickening of the arterial wall in animals \[[@B96],[@B97]\]. Voglibose significantly decreased infarct size of nondiabetic rabbits during 30 min of ischemia and 48 h of reperfusion condition \[[@B98]\] by up-regulating GLP-1 levels and activating the GLP-1 receptors, with downstream activation of Akt, eNOS, and the mitochondrial KATP channels. Research of AGIs on CVD through AMPK pathway is rare. Acarbose could improve vascular inflammation by enhancing NO expression to suppress cell cycle progression and inhibiting VSMC proliferation through AMPK activation and Ras inhibition, thus preventing or slowing the development of atherosclerosis \[[@B99]\]. Miglitol inhibits endothelial cell injury and protects against DNA damage under intensive oxidative stress, which may be involved in the activation of AMPK in endothelial cells, with the result of increasing NO production and reduced intercellular cell adhesion molecule-1 (ICAM-1), and vascular cell adhesion molecule-1 (VCAM-1) mRNA expression \[[@B100]\]. Mulberry 1-deoxynojirimycin (DNJ) can be considered as an AGI analog with the effect of inhibiting α-glucosidase in the small intestine \[[@B101],[@B102]\]. Chan's group has indicated the mechanisms by which mulberry leaf DNJ effectively inhibit proliferation and migration of VSMCs, including AMPK/RhoB activation and down-regulation of FAK *in vitro* study \[[@B103]\]. Thiazolidinediones {#sec5} ================== TZDs increase insulin sensitivity through binding of the so-called peroxisome proliferator-activated receptor γ (PPAR-γ) to activate downstream genes that are involved in glucose and fatty acid metabolism. Of the members in this family, troglitazone has been withdrawed from the market, but rosiglitazone and pioglitazone remain in use. In clinical studies, the effects of rosiglitazone and pioglitazone on CVD display diversity. Previous meta-analysis suggested that rosiglitazone use is associated with the risk of MI and death from CVD, and also increase risk of fluid retention which may exacerbate HF \[[@B5],[@B104]\]. In a retrospective, observational trial, rosiglitazone was related with an increased risk of stroke, HF, and a composite outcomes of acute myocardial infarction (AMI) \[[@B105]\]. However, the prospective Rosiglitazone Evaluated for Cardiac Outcomes and Regulation of Glycemia in Diabetes (RECORD) trial found that there is no adverse effect of rosiglitazone on the composite outcome of CV death or hospitalization but report an increased risk of hospitalization for congestive heart failure (CHF) in patients using rosiglitazone versus active comparator \[[@B6]\]. Rosiglitazone has beneficial CV effects of nondiabetics in basic research \[[@B106]\]. Other clinical studies \[[@B107]\] and a meta-analysis \[[@B108]\] have demonstrated that pioglitazone reduces CV complications in individuals of T2DM. Despite the FDA's release of rosiglitazone use and prescription restrictions in 2013 due to later clinical trial evidence \[[@B109],[@B110]\], patients with HF are still very cautious to use. TZDs are ligands for the nuclear hormone receptor family member PPAR-γ \[[@B111]\]. Both rosiglitazone and pioglitazone have been proved to activate AMPK in intact cells \[[@B112],[@B113]\] by stimulating the release and expression of circulating adiponectin from adipose tissue \[[@B114]\], or indirectly by enhancing the cellular AMP/ATP ratio, possibly via a similar mechanism with biguanides \[[@B117]\]. Our group conducted a series of studies on the role of TZDs and AMPK in the heart. The result demonstrated that by using rosiglitazone acutely under I/R stress, MI is decreased and postischemic cardiac function is improved by modulating AMPK, Akt, and JNK signaling mechanisms in the nondiabetic mouse heart \[[@B118]\]. Many studies have suggested that TZDs can attenuate myocardial hypertrophy mediated by AMPK. It has been shown that adiponectin stimulates the phosphorylation of AMPK and suppresses agonist-stimulated extracellular regulated protein kinases (ERK1/2) activation and hypertrophic response in cultured cardiomyocytes through activating AMPK signaling \[[@B119]\]. Antihypertrophic effect of pioglitazone is attributed to reduced ERK1/2 activation that is involved in the adiponectin-AMPK regulatory axis \[[@B120]\]. Administration of pioglitazone with long term delayed the development of LV hypertrophy and fibrosis as well as inhibited phosphorylation of mTOR and p70S6 kinase in the heart, which are likely attributable, at least in part, not only to the AMPK activation through stimulation of adiponectin secretion but also to the Akt signaling inhibition in the heart \[[@B121]\]. TZDs also plays an essential role in adjusting energy metabolism. Troglitazone could significantly increase glucose uptake and activated both AMPK and eNOS signaling in isolated papillary muscles \[[@B122]\]. Adiponectin stimulated by TZDs can bind to adiponectin receptor 1 (AdipoR1) and activate AMPK/ACC/CPT-1 pathway to enhance fatty acid β-oxidation in the heart, a pathway that is also regulated by PGC-1α and PPARα \[[@B123]\]. However, rosiglitazone does not always increase glucose and fatty acid metabolism in adiponectin/AMPK pathway. An interesting research showed that activation of PPAR-γ in the late-gestation sheep fetus, rosiglitazone may decrease cardiac metabolism (glucose uptake, fatty acid β-oxidation) and cardiomyocyte size by down-regulating AdipoR1, phospho-AMPK, phospho-ACC, and PGC-1α \[[@B124]\]. GLP-1 analogs {#sec6} ============= GLP-1 is a type of incretin hormone that is secreted from L-cells of the small intestine in a glucose-dependent manner to stimulate insulin secretion, increase pancreatic β cell mass, and inhibits glucagon secretion and gastric emptying, thus reducing postprandial glycemia \[[@B125],[@B126]\]. Due to rapid degradation by DPP-4, the half-life of endogenous GLP-1 is very short. Longer half-life synthetic analogs have been developed for clinical use as a new class of antidiabetic agents, such as: exenatide, liraglutide, lixisenatide, albiglutide, dulaglutide, and semaglutide, etc. Several large clinical studies have revealed that GLP-1 analogs can reduce the risk of major adverse cardiovascular events (MACE), nonfatal MI, and CV death, etc., in T2DM \[[@B127]\]. GLP-1 analogs play CV protective roles mediated by GLP-1 receptor (GLP1R) in CV tissues, among which, activation of AMPK signaling pathway is still crucial. Considerable evidences demonstrate that GLP-1 protects the isolated mouse heart against I/R injury by AMPK pathway \[[@B131]\]. GLP-1 analogs have also been shown to exert direct cardioprotective effects of MI in murine models \[[@B132]\]. Liraglutide could increase AMPK phosphorylation in the hearts of obese mice with the similar effect to metformin \[[@B73]\]. A short-term treatment with a weight-neutral dose of liraglutide can reverse the molecular pathophysiology of obesity-induced heart disease in mice through a variety of putative mechanisms with a central role for AMPK \[[@B133]\]. GLP-1 analogs can also display the effect in balancing energy metabolism and maintaining heart function of diabetic models. Guo's \[[@B134]\] study showed that exenatide treatment increased the level of phosphorylation of AMPK and the mRNA expression of GLUT4 in the diabetic heart of rats. The increased adiponectin may partially explain these change, which might contribute to the ameliorated heart function. After being treated with exenatide, the adiponectin and high-molecular-weight-adiponectin and the APPL1-AMPK-PPARα axis were increased, the NF-κB and the apoptosis were decreased, and the cardiac function of the diabetic rats was improved \[[@B135]\]. We have discussed the essentiality of autophagy for cell survival above. Liraglutide relieved myocardial damage by enhancing autophagy via AMPK-mTOR signaling pathway in Zucker diabetic fatty rat \[[@B136]\]. In adult rat cardiomyocytes, GLP-1 activates AMPK, then inhibits the hyperglycemia-induced NADPH oxidase 2 (NOX2) activation by limiting protein kinase C (PKC) phosphorylation and p47phox translocation to the caveolae; thereby, preventing glucotoxicity \[[@B137]\]. Abbas and Kabil \[[@B138]\] demonstrated that liraglutide treatment had been shown to relieve doxorubicin-induced cardiotoxicity, may be attributed to the antioxidant and anti-inflammatory effects as well as anti-apoptotic effects through the AMPK/Akt/GSK-3β (glycogen synthase kinase 3β) signaling pathway. Meanwhile, administration of liraglutide protected against myocardial steatosis and oxidative stress by activation of the AMPK-Sirt1 (silent mating type information regulation 2 homolog) pathway \[[@B139]\] at least in part. GLP-1 analogs can also improve endothelial dysfunction. Liraglutide plays an anti-inflammatory role to primary human aortic endothelial cells (HAECs) by causing a subsequent increase in intracellular calcium, CaMKKβ activity and AMPK activation \[[@B140]\]. Exenatide significantly improves coronary artery endothelial function of individuals with newly diagnosed T2DM. The improvement effect may be mediated by activation of the AMPK/PI3K-Akt/eNOS pathway via a GLP-1R/cAMP-dependent mechanism \[[@B141]\]. DPP-4 inhibitors {#sec7} ================ DPP-4 inhibitors are a group of agents for treating T2DM \[[@B126]\]. They prevent the deactivation of the two endogenous incretine hormones, GLP-1 and glucose-dependent-insulinotropic-peptide (GIP), thus causing the accumulation of these hormones \[[@B142]\] to make these hormones play the role of antidiabetes. Sitagliptin, saxagliptin, vildagliptin, alogliptin, linagliptin, and trelagliptin are approved on market as DPP-4 inhibitors family members. Several large clinical studies have shown that DPP-4 inhibitors do not increase the risk of CVD in type 2 diabetics compared with placebos \[[@B143]\]. It has been reported that DPP-4 inhibitors can limit infarct size in the nondiabetic mice \[[@B146]\] and isolated rat hearts \[[@B147]\]. Sitagliptin has been reported to play a protective role in CVD and atherosclerosis \[[@B148],[@B149]\]. Sitagliptin can decrease the atherosclerotic lesion area by activating AMPK-mediated Akt signaling pathway in ApoE^−/−^ mice while attenuating the phosphorylation of p38 and ERK1/2 and mitogen-activated protein kinase (MAPK), therefore, inhibiting inflammatory responses in the aorta, such as the release of monocyte chemoattractant protein 1 (MCP-1) and interleukin 6 (IL-6), and the expression of the VCAM-1 and serum P-selectin \[[@B150]\]. One study indicated that sitagliptin inhibits endothelin-1 (ET-1) expression in the aortic endothelium by suppressing the NF-κB/IκBα system through the activation of the AMPK pathway in diabetic rats, which demonstrated some of the vasoprotective properties of DPP-4 inhibitors *in vivo* \[[@B151]\]. In other studies, sitagliptin prevented hyperglycemia induced apoptosis via activation of AMPK in HUVECs and also attenuated myocardial apoptosis by activating LKB-1/AMPK/Akt signaling pathway and suppressing the activity of GSK-3β and p38α/MAPK in diabetic cardiomyopathy of rat \[[@B152]\]. However, Lenski's group found that \[[@B153]\] sitagliptin treatment reduced the increased phosphorylation of AMPK and ACC in db/db^−/−^mice, then reduced membrane translocation of GLUT4 in cardiomyocytes, thus prevented the metabolic alteration associated with the diabetes-obesity syndrome via AMPK and its downstream molecule in the myocardium. SGLT2 inhibitors {#sec8} ================ SGLT2 inhibitors selectively inhibit SGLT2 of the renal proximal tubule, with a consequent decrease in renal tubular thresholds for glycosuria and increase in urinary excretion of glucose, reducing blood glucose independently of insulin. Canagliflozin, dapagliflozin, empagliflozin, and ertugliflozin of this family have been approved by FDA. As the request of FDA, some clinical trials for CV risk assessments were conducted before market. EMPA REG OUTCOME (Empagliflozin, Cardiovascular Outcomes, and Mortality in type 2 diabetes) demonstrated that empagliflozin exerts a 38% risk reduction in death from CV causes, 32% risk reduction death from any cause and 35% reduction on risk of hospitalization for HF \[[@B154]\]. CVD-REAL study has confirmed that the positive effects on HF of SGLT2 inhibitors can be considered a class effect, not only by empagliflozin \[[@B155]\]. CANVAS study for evaluating canagliflozin also showed similar CV protective effect \[[@B156]\]. FDA has approved a new indication for empagliflozin to reduce the risk of CVD death in adult patients with T2DM and CVD in December, 2016 \[[@B157]\]. After clinical analysis, the protective effect of SGLT2 inhibitors on heart may be related to lowering blood pressure, weight loss, decreasing serum uric acid level, osmotic diuresis, reducing volume load and hemodynamic changes, etc. Further molecular mechanism is still in the exploratory stage. At present, basic research are focusing on energy metabolism, inflammation, oxidative stress, myocardial fibrosis and electrolyte homeostasis \[[@B158]\]. SGLT2 inhibitors change the energy metabolism of the heart from glucose to fat \[[@B159]\] and slightly increase the ketone level \[[@B162]\], which is beneficial for cardiac energy supply during HF. Empagliflozin can significantly improve myocardial fibrosis in obese and diabetic mice \[[@B163],[@B164]\], and also play the role of anti-oxidative stress and anti-apoptosis \[[@B165],[@B166]\]. Meanwhile, empagliflozin can reduce infarct size after I/R \[[@B167]\], and improve diastolic function of the left ventricle in diabetic mice \[[@B168]\]. Dapagliflozin can delay the occurrence and progress of diabetic cardiomyopathy \[[@B169]\]. There are currently relatively few studies on SGLT2 inhibitors and AMPK. Canagliflozin activates AMPK human embryonic kidney (HEK-293) cells and hepatocytes by inhibiting complex I in the mitochondrial respiratory chain and increasing cellular AMP levels \[[@B170]\]. Clinically-relevant canagliflozin concentrations can directly inhibit endothelial pro-inflammatory chemokine/cytokine secretion by AMPK dependent and independent mechanisms without affecting early interleukin-1β (IL-1β) signaling \[[@B171]\]. Dapagliflozin decreases the activation of the NOD-like receptor family, pyrin domain containing 3/apoptosis-associated speck-like protein containing a CARD (NLRP3/ASC) inflammasome attenuated myocardial inflammation, fibrosis, apoptosis, and diabetic remodeling likely mediated through AMPK activation \[[@B164]\]. In another study, empagliflozin alleviated diabetic cardiac microvascular endothelial cell (CMEC) injury by inhibiting mitochondrial fission via the activation of AMPK-Drp1 (Dynamin-related protein 1) signaling pathways, preserved cardiac CMEC barrier function through suppressed mitochondrial ROS production and subsequently oxidative stress to inhibit CMEC senescence. So empagliflozin can be considered as a cardiac microvascular-protection agents to maintain cardiac circulatory function and structure upon hyperglycemic insult \[[@B172]\]. Our group is currently studying the molecular mechanisms underlying the cardioprotective effect of empagliflozin. Preliminary results show that a certain concentration of empagliflozin can enhance the contractility of isolated mice cardiomyocytes under the condition of intracellular hypoxia. At baseline, empagliflozin can phosphorylate AMPK in mice cardiomyocytes. In intracellular hypoxia state induced by sodium cyanide (NaCN), empagliflozin can prolong AMPK activation time of mice cardiomyocytes (unpublished data). The further molecular mechanisms of AMPK activation is still under exploration. We summarized the upstream signal pathways of AMPK activated by antidiabetic agentsin CV system in [Figure 2](#F2){ref-type="fig"}. {#F2} Pespectives {#sec9} =========== We enumerate the CV safety of commonly used antidiabetic agents in clinical practice and summarize whether these drugs can affect CVD through AMPK-related signaling pathways in this review to help clinicians for selection of antidiabetic agents. The mechanism of metformin on activating AMPK is relatively clear, but it is still obscure for other antidiabetic agents. Therefore, further research is needed to find answers from the intricate AMPK signal transduction network. Given the benefits of AMPK activation for diabetes and CVD, AMPK is becoming a promising target for the treatment of diabetes, metabolic syndrome, and CVD. There are still some problems to be solved. First, AMPK has many subtypes, and the expression of each subunit is different among species and tissues, making it more difficult to translate AMPK activators from pre-clinical animal experiment to clinical trial. Second, AMPK is expressed in many organs and tissues of the whole body. Whether systemic activation caused by nonspecific AMPK agonists has adverse effects on some organs is unknown. Therefore, it is necessary to develop organ-specific AMPK agonists. Third, the AMPK signaling network is very complicated, and there are many cross-talk with other pathways. The effect of activating AMPK on other pathways also needs a lot of research to confirm. At last, what is the activation duration and degree of AMPK? It is also unknown whether excessive or prolonged activation will bring adverse effects. Therefore, there is still a long way to go on progressing AMPK from basic research to clinical application. Competing interests {#sec10} =================== The authors declare that there are no competing interests associated with the manuscript. Funding {#sec11} ======= The present study was supported by American Diabetes Association \[grant number 1-17-IBS-296\]; \[grant numbers NIH R01AG049835 R01GM124108, P01HL051971 and P20GM104357\]. ACC : coenzyme A carboxylase ACS : acute coronary syndrome AdipoR : adiponectin receptor AGI : α-glucosidase inhibitor AMPK : adenosine 5′-monophosphate-activated protein kinase CaMKK : calmodulin-dependent protein kinase kinase CMEC : cardiac microvascular endothelial cell CV : cardiovascular CVD : cardiovascular disease DNJ : deoxynojirimycin DPP : dipeptidyl peptidase eNOS : endothelial nitric oxide synthase ERK : extracellular regulated protein kinase GLP : glucagon-like peptide GLUT : glucose transporter GSK : glycogen synthase kinase H/R : hypoxia/reoxygenation I/R : ischemia/reperfusion KATP : ATP-sensitive potassium channel LDLR : low-density lipoprotein receptor LKB : liver kinase B MAPK : mitogen-activated protein kinase mTOR : mammalian target of rapamycin NF-κB : nuclear factor κB PGC : peroxisome proliferator-activated receptor γ coactivator 1-α PI3K : phosphatidylinositol-3-kinase PPAR : peroxisome proliferator-activated receptor ROS : reactive oxygen species SGLT : sodium-glucose cotransporter SREBP2 : sterol regulatory element-binding protein T2DM : type 2 diabetes TLR : Toll-like receptor TZD : thiazolidinedione UKPDS : UK Prospective Diabetes Study VCAM : vascular cell adhesion molecule VSMC : vascular smooth muscle cell | Mid | [
0.6014319809069211,
31.5,
20.875
] |
Charlie Schneider, 7th, is in competitive gymnastics. Over the weekend he competed in the Men's State Gymnastics Competition and came in 5th overall and first in rings for his division. He will now compete in the Regionals Competition in Kansas on April 2nd. *if you want your child or student to be recognized on this page please email me the name, and award won to [email protected] it does not have to be school related. | High | [
0.6560232220609571,
28.25,
14.8125
] |
Q: Meaning of phrase "an und für sich" I found this phrase as the title of a blog I was reading (here). There exists a German language Wiktionary page for it (here). Checking the meaning of the words individually, it seemed like "and also for itself", but I don't really know what the phrase would be used for. Checking the synonyms on the German wiktionary page yields "in principle" as the most understandable synonym. Edit based on answers: It's just the title of a blog I was reading, no context given, except that one of the main authors of the blog is apparently a bit of a Zizek reader, so the Hegel bit might be what it is. A: The English version is in and for itself. It has become a general idiomatic expression in the meaning of "an sich" / "eigentlich" / "in itself" / "per se". Originally it's a philosophical expression attributed to Hegel, it's a combination of "an sich" and "für sich". Someone with insight into the philosophy of Hegel might be able to explain the original concepts behind it. Or you could ask at philosophy.stackexchange.com A: If your question is (and that is not really clear - or not "an und für sich" clear) what the meaning of this phrase is: Most of the time it just used to weaken whatever statement else is given in the sentence it is used in. For example: Take a piece of software that generelly does its job quite well, but lacks some (very minor) feature that may be seldom used. You could then say "Dieses Programm ist an und für sich perfekt für die gestellte Aufgabe, aber es fehlt an folgenden Kleinigkeiten ..." So "in principle" seems to me like a perfect translation. | Mid | [
0.639175257731958,
31,
17.5
] |
Static equipment including electronic components is now extensively used in telephone exchanges together with traditional electromechanical relay contacts to produce ringing signals (usually of 25 Hz) transmitted over subscriber lines to respective stations in response to digit-selection signals received by the exchange from calling subscribers. In the present state of the art, a ringing-signal generator normally comprises a pilot oscillator working into an amplification stage stabilized by negative feedback, the amplifier furnishing an output signal of the desired power characteristics. Two disadvantages of this arrangement are the low efficiency of such an amplifier and the large-size output transformer required to raise the voltage of the outgoing signal. Another conventional ringing-signal generator produces a stepped wave approximating a sinusoid, e.g. by connecting different taps of a transformer secondary in cyclic succession to an amplifier, this stepped wave being fed to a low-pass filter stage deriving a roughly sinusoidal voltage therefrom. Although such a device performs satisfactorily, the harmonics content of its output voltage is significant even with a high number of steps in the unfiltered waveform. Another shortcoming of the last-mentioned device is its relative inflexibility in the face of variations in load. | Mid | [
0.564885496183206,
37,
28.5
] |
@using PagedList @using PagedList.Mvc @model IEnumerable<CMS.Models.Article> @{ ViewBag.Title = "Index"; } <h2>Index</h2> <div> @using (Html.BeginForm("Index", "Articles", new { area = "Admin" }, FormMethod.Get, new { @class = "navbar-form navbar-left", role = "search" })) { <div class="form-group"> <input type="text" class="form-control" placeholder="Search"> </div> <button type="submit" class="btn btn-default">搜尋</button> } </div> <p> @Html.ActionLink("Create New", "Create") </p> <table class="table"> <tr> <th> @Html.DisplayNameFor(model => model.Subject) </th> <th> @Html.DisplayNameFor(model => model.Summary) </th> <th> @Html.DisplayNameFor(model => model.ContentText) </th> <th> @Html.DisplayNameFor(model => model.IsPublich) </th> <th> @Html.DisplayNameFor(model => model.PublishDate) </th> <th> @Html.DisplayNameFor(model => model.ViewCount) </th> <th> @Html.DisplayNameFor(model => model.CreateUser) </th> <th> @Html.DisplayNameFor(model => model.CreateDate) </th> <th> @Html.DisplayNameFor(model => model.UpdateUser) </th> <th> @Html.DisplayNameFor(model => model.UpdateDate) </th> <th></th> </tr> @foreach (var item in Model) { <tr> <td> @Html.DisplayFor(modelItem => item.Subject) </td> <td> @Html.DisplayFor(modelItem => item.Summary) </td> <td> @Html.DisplayFor(modelItem => item.ContentText) </td> <td> @Html.DisplayFor(modelItem => item.IsPublich) </td> <td> @Html.DisplayFor(modelItem => item.PublishDate) </td> <td> @Html.DisplayFor(modelItem => item.ViewCount) </td> <td> @Html.DisplayFor(modelItem => item.CreateUser) </td> <td> @Html.DisplayFor(modelItem => item.CreateDate) </td> <td> @Html.DisplayFor(modelItem => item.UpdateUser) </td> <td> @Html.DisplayFor(modelItem => item.UpdateDate) </td> <td> @Html.ActionLink("Edit", "Edit", new { id = item.ID }) | @Html.ActionLink("Details", "Details", new { id = item.ID }) | @Html.ActionLink("Delete", "Delete", new { id = item.ID }) </td> </tr> } </table> @Html.PagedListPager((IPagedList)Model, x => Url.Action("Index", new { page = x })) | Mid | [
0.630136986301369,
34.5,
20.25
] |
Introduction {#S1} ============ Clinicians have been directly exciting the cerebellar cortex with implanted electrodes in epileptic patients and in those with schizophrenia and depression since the 1970s with good therapeutic results ([@B1]), demonstrating the use of constant electrical stimulation for the treatment of behavioral disorders and epilepsy. Today, transcranial brain stimulation techniques \[often referred to as non-invasive brain stimulation (NIBS)\], such as repetitive transcranial magnetic stimulation (rTMS) and transcranial direct current stimulation (tDCS), are realized to have the capacity to systematically modify behavior by inducing lasting changes in underlying brain functions, and are useful approaches to studying brain--behavior relationships in healthy participants. They have also been used to study mechanisms of cortical plasticity, and both techniques have been implicated as therapeutic tools for the treatment of motor and cognitive deficits in patients after stroke, and in cerebellar disease ([@B2], [@B3]). In recent years, cerebellar-tDCS has grown in popularity in various laboratories and clinics, partly because the lateral cerebellar hemispheres, which are thought to be involved in cognition, are most accessible to transcranial electrical stimulation, are sensitive to the effects of polarizing currents, and because the procedure is relatively inexpensive and easy to perform. Mechanisms of action and effects of tDCS {#S1-1} ---------------------------------------- The mechanisms of action and effects of tDCS on the human cerebellum are inferred from animal studies, or from indirect effects on motor cortex, and from modeling data. In humans, the procedure typically involves delivering 1--2 mA of DC stimulation through a pair of saline-soaked electrodes: one stimulation electrode on scalp overlying the cerebellum, and the other reference electrode on the ipsilateral head or shoulder. Intracerebral current flow between the two electrodes has relatively little functional spread to neighboring regions \[e.g., visual cortex ([@B4])\] and is thought to excite or depress Purkinje cells in the cerebellar cortex, producing both neurophysiological and behavioral changes. The effects are polarity-specific as evidenced by the consequences of cerebellar stimulation on motor cortex excitability ([@B5]). Anodal stimulation has an excitatory effect and increases the output of Purkinje cells; increasing inhibition of the facilitatory pathway from the cerebellar nuclei to cerebral cortex. Cathodal stimulation has an opposite effect, i.e., dis-inhibition of the cerebral cortex by reducing Purkinje cell inhibition of the cerebellar nuclei. However, the after-effects of TMS ([@B6]) and tDCS ([@B7]) over motor cortex are highly variable between individuals, and not always polarity-specific, which highlights the need to better understand individual factors that determine the efficacy of NIBS (e.g., neural excitability and/or cognitive capacity) and to develop improved protocols for delivering brain stimulation. Effects of stimulation are also different depending on whether behavior is tested during (on-line effects) or after (off-line effects) the stimulation period, which typically last 15--20 min, suggesting that on-line effects may include changes in ion concentration gradients and cell membrane potentials, while off-line effects might include longer lasting changes in neural activity due to altered intracellular processes (e.g., receptor plasticity). Polarity-specific effects on cognitive functions are more difficult to detect and to interpret than the direct effects of the cerebellum on motor areas due to cerebellar-brain inhibition (CBI). Nonetheless, anatomical studies in primates reveal how Purkinje cells could exert a facilitatory drive onto both motor and cognitive circuits, via a synaptic relay in the ventral--lateral thalamus ([@B8]). And, associative plasticity induced by sensory/motor stimuli paired at 25 ms -- paired associative stimulation (PAS), can be blocked by cerebellar-tDCS, demonstrating how the cerebellum can exert a remote influence over excitability in the cerebral cortex ([@B9]). Thus, changes in both motor and cognitive functions are physiologically plausible via electrical stimulation of the cerebello--thalamo--cortical pathway. tDCS after-effects and the cerebellum {#S1-2} ------------------------------------- Polarizing the brain with cortical scalp electrodes as treatment for remedying cognitive deficits in human participants is not new. In the 1960s, Lippold and colleagues demonstrated beneficial effects in certain psychiatric disorders caused by long duration stimulation (up to 10 h) at small current strengths over the forehead ([@B10], [@B11]). The authors were able to distinguish positive and negative polarization effects on mood in the majority of cases. Scalp-positive effects included an increase in the patients' involvement with the environment (e.g., alertness and cheerfulness), and scalp-negative effects included environmental inhibition and withdrawal (e.g., quietness). Due to a recent revival in this method, there is now a better understanding of tDCS-induced effects and evidence that cerebellar-tDCS can modulate, and in some cases, enhance cognitive functions and behavioral performance in healthy participants \[reviewed in Ref. ([@B12], [@B13])\]. For example, in 2005, Ferrucci and colleagues measured off-line tDCS effects during a modified version of the Sternberg item recognition task (i.e., identifying the presence or absence of a digit from a list of previously presented visual items after a memory maintenance period) in healthy participants ([@B14]). Fifteen minutes of cerebellar stimulation (irrespective of electrical polarity or activity of visual cortex) impaired the usual practice-dependent proficiency increase associated with this task. Five years later, this result was reproduced by Boehringer et al. ([@B15]). While neither study found tDCS to enhance performance, the work by Boehringer and colleagues did demonstrate that tDCS could alter performance during visual item recognition as a function of task difficulty or when cognitive load is set at a specific level. These studies show how tDCS can alter cerebellar cognitive functions, and hint toward situations where tDCS is most efficient. Task difficulty was a major feature of our recent study of cerebellar functioning during tests of verbal working memory \[WM; ([@B16])\], in which we applied tDCS over the right cerebellar hemisphere and showed neuro-enhancement during a demanding subtraction version of a mental arithmetic task \[the paced auditory serial subtraction task (PASST)\] with high cognitive load, but not during a simpler and less demanding addition version \[the paced auditory serial addition task (PASAT)\]. In short, cathodal stimulation improved task accuracy, response speed, and response variability \[relative to anodal and sham stimulation (see Figure [1](#F1){ref-type="fig"})\]. As both tasks share similar motor control (i.e., verbal operations), but dissimilar cognitive load (i.e., mental effort), we speculated that cathodal depression of the right cerebellar cortex might release additional cognitive resources required when demands are high by dis-inhibition of the left prefrontal cortex to which it projects via the cerebello--thalamo--cortical pathway ([@B3]). Supporting this view, and the emergent role for the cerebellum in cognition and emotion ([@B17], [@B18]), is the finding that functional connectivity between the cerebellum and prefrontal cortex during mathematics is task- and difficulty-sensitive ([@B19]). This result was demonstrated shortly after MR signal coherence measures were first used to detect cerebellar--prefrontal and cerebellar--parietal connections ([@B20]), lending further support to the idea that the cerebellum can influence cognitive processes in the prefrontal cortex: a major site for many WM operations. ![**(A)** Response latencies (mean + 1 SEM, *n* = 20) selectively improved after cerebellar cathodal stimulation from session one (pre-stimulation) to session two (post-stimulation), significantly more in the subtraction task than in the addition task. **(B)** The variability of participants' responses also selectively improved significantly between sessions during subtraction, but not during addition. Modified from Pope and Miall ([@B16]).](fpsyt-05-00033-g001){#F1} Interestingly, our 2012 work predicts that anodal stimulation over the left dorsolateral prefrontal cortex (DLPFC) should selectively improve performance during subtraction, but not addition task versions. Indeed, others have shown how stimulating the DLPFC can enhance arithmetic performance over long durations, improve neurovascular coupling ([@B21]), and facilitate solution generation for difficult problems, but not for easy problems ([@B22]). In fact, electrical stimulation of the prefrontal cortex can enhance performance in a variety of WM tasks in healthy participants ([@B23], [@B24]), leading researchers to employ tDCS as a therapeutic tool for the treatment of cognitive deficits in patients after stroke ([@B25]), and in patients with Parkinson's disease ([@B26]). In our cerebellar-tDCS study ([@B16]), we also employed a language protocol as well as the arithmetic study, and observed responses that got faster over five consecutive blocks of trials in which participants generated verbs in response to visually presented nouns (see Figure [2](#F2){ref-type="fig"}). This priming effect complements the results of our arithmetic study, and also findings by others showing how anodal tDCS over the left DLPFC can improve verbal fluency ([@B27]) and picture naming latencies ([@B28]). It supports the hypothesis that the same facilitation patterns may be observed after cathodal tDCS over the right cerebellar hemisphere as can be seen by anodal stimulation over the frontal cortex. Taken together, these findings support a role for the cerebellum -- albeit indirect -- in language, learning, and memory ([@B29]). ![**(A)** Response latencies (mean + 1 SEM, *n* = 20) decreased across repeated presentation of the same sets of noun--verb pairs between blocks 1--5 (new words were presented in block 6), and selectively improved after cathodal stimulation from session one \[pre-stimulation (left panel)\] to session two \[post-stimulation (right panel)\]. **(B)** The variability of participants' responses also selectively improved significantly between blocks 1--5, and between sessions. Modified from Pope and Miall ([@B16]).](fpsyt-05-00033-g002){#F2} tDCS influences cerebro--cerebellar connectivity {#S1-3} ------------------------------------------------ Our tDCS work ([@B16]) shows how an understanding of neuro-enhancements in healthy participants is firmly constrained by cognitive and anatomical hypotheses regarding WM capacity and cerebro--cerebellar connectivity, where cerebellar stimulation may most effectively modulate cognition and performance when participants fully engage in a task, or when the task maximally excites the cerebellar--cortical pathway. Indeed, an fMRI study by Salmi and colleagues previously showed how a load increase in cognition during WM tasks is associated with enhanced neural activity in both cerebral and cerebellar areas, which they suggested was involved with optimization of response speed ([@B30]). They also showed with MR tractography how crus I/II in the posterior lateral cerebellum was linked with the lateral prefrontal areas activated by an increase in cognitive load, whereas the anterior cerebellar lobe was not. Based on the available literature, cerebellar-tDCS could be expected to influence cognition during certain WM tasks via excitation of the cerebello--thalamo--cortical pathway (see Figure [3](#F3){ref-type="fig"}), leading researchers to speculate on the efficacy of this technique as a therapeutic tool for treating cognitive deficits in patients with cerebellar disease ([@B3]). ![**A schematic diagram of the main circuits and interneurones in the cerebellar cortex and the principal white matter tracts connecting the cerebellum to the cerebrum -- cerebro--cerebellar connectivity \[after Voogd and Glickstein ([@B31]); redrawn by authors\]**. Inhibitory cells/synapses are shown in black, excitatory cells/synapses are shown in gray. ML, molecular layer; PCL, Purkinje cell layer; GCL, granule cell layer; WM, white matter layer; CN, cerebellar nuclei; IO, inferior olive; PCN, precerebellar neurones.](fpsyt-05-00033-g003){#F3} NIBS and cerebellar ataxias {#S1-4} --------------------------- The cerebro--cerebellar circuits have been proposed as the anatomical substrate of the cerebellar involvement in executive functions, WM, and emotion in patients with the cerebellar cognitive affective syndrome \[CCAS ([@B17], [@B18])\]. And the cerebellum's role in cognition in the context of adaptation, expertise, and giftedness is said to accelerate information processing in WM and to make thinking and reasoning more efficient ([@B32]). Some ataxic patients can also present with cognitive and emotional impairments if damage to non-motor regions of the cerebellum disrupts the coupling with cerebral cortical areas for thinking and reasoning. In fact, white matter changes in the dentato--rubral tract \[but not the dentato--thalamic or thalamo--cortical tracts (see Figure [3](#F3){ref-type="fig"})\] have been shown to correlate with cognitive assessment in patients with Friedreich's ataxia (FA), suggesting that this pathway is an important contributor to cognitive impairments in this disease ([@B33], [@B34]). Genetically confirmed FA patients present with impairments in processing speed, conceptual thinking, verbal fluency, acquisition of verbal information, use of semantic strategies in retrieval, visuoperceptive and visuoconstructive functions, and action naming ([@B35]). However, DC stimulation of the cerebellar cortex may not at first hand prove effective in remedying the symptoms of this autosomal recessive inherited disease since cerebro--cerebellar circuits, including the dentato--rubral tract, become progressively damaged due to atrophy of the dentate nucleus -- negating possible therapeutic benefits from tDCS or TMS. But this has not prevented clinicians from employing other interventions such as cognitive rehabilitation therapy (CRT), and physical and occupational therapy to help improve/stabilize cognition, mood and motor functions in patients with spinocerebellar degeneration, by asking them to carry-out a battery of cognitive tests and activities of daily living that after treatment changed the rate of disease progression in some patients ([@B36], [@B37]). Cerebellar-tDCS could then be used alongside rehabilitative interventions to provide a synergistic effect -- further improving the management of these patients. Recently, tDCS applied as an adjunct to cognitive behavioral therapy (CBT) has been successful in treating depression in patients over the course of a year, whose symptoms were otherwise resistant to other forms of treatment ([@B38]). Such a study demonstrates a favorable synergistic interaction between two very different interventions, opening up new possibilities for the use of tDCS as a cognitive neuro-rehabilitation tool. It is also worth speculating whether the excitatory effects of tDCS alone could prove helpful in reducing cognitive decline/stabilizing mood and motor functions in cerebellar patients by exciting cerebro--cerebellar connectivity; preventing or slowing down further damage in analogy to the slowing of disease progression in patients with FA ([@B36]) and spinocerebellar ataxia ([@B37]). This might be expected if chronic cerebellar damage reduces the excitability of motor and visual cortices ([@B18]). Behavioral gains induced by tDCS do increase functional connectivity, for example after stroke ([@B39]). Thus, the tDCS enhances activity, and it seems, maintains the cerebello--thalamo--cortical pathway. Motor and cognitive improvements after cerebellar-TMS {#S1-5} ----------------------------------------------------- Transcranial direct current stimulation has yet to be performed in patients with cerebellar ataxia with the aim of evaluating cognitive functions, although improved motor symptoms (reduced amplitude of upper limb stretch reflexes) have been reported in these patients after anodal stimulation of the cerebellum, which increased the inhibitory effect exerted by the cerebellar cortex upon the cerebellar nuclei ([@B40]). Anodal tDCS over the motor cortex can also improve gait symmetry in patients with cerebellar ataxia for a short-term period by restoring motor cortex activity deprived from the cerebro--cerebellar circuit ([@B41]). However, improved cognition in an ataxic patient has been demonstrated using TMS, which uses electromagnetic induction instead of a direct electrical current to activate the brain. In a case study by Farzan and colleagues ([@B2]), a patient with a diagnosis of idiopathic late-onset cerebellar atrophy with speech and gait difficulties underwent 21 daily sessions of TMS at maximum output over the cerebellum. After treatment, the authors observed improvements in the patients' functional mobility (postural control and walking) and dual-tasking (naming supermarket items while walking). The therapeutic mechanisms were also investigated using dual-coil paired-pulse TMS to measure cerebello--thalamo--cortical connectivity, before and after treatment. The difference between treatments was marked by an increase (facilitation) in motor evoked potentials induced by motor cortical stimulation when the cerebellum was also excited a few milliseconds beforehand, demonstrating enhanced activity in contralateral motor cortex that reflected reduced CBI. The reduction in CBI lasted 6 months after treatment. The authors attributed the improvements in cognitive function to a consequence of enhanced motor function and liberation of resources for the performance of the dual-task, thus enabling the patient to name more items while walking with more ease. The TMS-induced reduction in CBI may also have improved prefrontal cortical function directly, through exciting cerebellar projections to this area, thus improving cognitive capacity. This second explanation compares well with that from our own work showing a selective improvement in verbal WM after cerebellar-tDCS (see above). NIBS and cerebellar cognitive affective disorders {#S1-6} ------------------------------------------------- The cerebro--cerebellar circuits that can be enhanced by TMS in cerebellar ataxic patients presenting with cognitive impairments are disrupted in patients that develop the CCAS following a lesion or damage to the non-motor cerebellum ([@B17], [@B18]). A defect associated with a lesion in one cerebellar hemisphere is decreased excitability of the contralateral prefrontal area. Thus, symptoms that are part of the CCAS extend beyond problems with motor control, co-ordination and balance, and include problems with executive functions, WM, linguistic performance, and changes in emotion and personality ([@B18]). The use of cerebellar-tDCS to enhance cognition via its remote neuromodulatory effect on prefrontal areas can be anticipated too on the basis of existing TMS studies of cerebellar cognitive functions. This should lead to improving mental flexibility (e.g., multi-tasking) in CCAS patients. For example, facilitatory effects of TMS have been observed during procedural learning \[e.g., serial reaction time task (SRTT)\], which involves acquiring a skill (beyond just motor control) through repeated performance and practice. This task is thought to involve connections between the cerebellum and the prefrontal cortex via the thalamus, and damage in any one of these regions is likely to impair performance. Indeed, TMS over the DLPFC interferes with procedural learning when applied over the hemisphere contralateral to the performing hand ([@B42]). A patient has also been studied with a left cerebellar lesion and a selective deficit in procedural learning, as evidenced by poor performance with the left hand on the SSRT ([@B43]). By decreasing cortical excitability of the right (unaffected) cerebellum or the left DLPFC (in separate sessions) with 1 Hz rTMS for 10 min, the deficit recovered and task performance markedly improved. Interestingly, inhibition of the right DLPFC or a control fronto-parietal region did not change the patient's performance. It is interesting to speculate whether the inhibitory effects of cathodal tDCS of the same regions might produce similar results. Nonetheless, the authors explained these findings in terms of the modulation of a set of inhibitory and excitatory connections between the lateral cerebellar hemisphere and the contralateral prefrontal area induced by the inhibitory effect of TMS -- restoring the balance of cortical activation. Trains of epidural anodal/cathodal DC stimulation over the cerebellum in rats has also shown how this structure can exert a remote neuromodulatory effect upon the excitability of the primary motor cortex -- reshaping the representation of muscles on motor cortex ([@B44]). In an earlier paper, the same authors employed anodal tDCS to antagonize motor cortex hypoexcitability contralateral to a hemicerebellar ablation in rats, and they speculated that by setting the motor cortex at an appropriate level of excitability, tDCS might be used to modulate motor cortex excitability after acute cerebellar dysfunction ([@B45]). In humans, neuromodulatory effects from cerebellar stimulation have revealed how cathodal tDCS decreases CBI, in contrast with anodal tDCS that increases the cerebellum's inhibitory tone over the motor cortex ([@B5]). Taken together, tDCS of the cerebellum and prefrontal cortex, either jointly or in separate sessions, might offer a new treatment for restoring the balance between these two regions, which normally work together to fine-tune behavior and optimize performance. Conclusion {#S2} ========== Many studies involving healthy participants and certain patient populations demonstrate the value of NIBS as the technique of choice for producing plastic changes in the brain, and as a research tool for testing hypotheses about how motor and cognitive functions are performed and how cerebro--cerebellar circuits subserve these operations. Based on the available literature, we see five possible approaches to cognitive rehabilitation using NIBS in patients with damage at various sites in this circuit. (1) Cerebellar-tDCS could reduce cognitive decline and/or improve mood in ataxic patients. By increasing the excitability of cerebellar projections to areas of the prefrontal cortex, this may prevent further damage and decline of this pathway and potentially enhance functional connectivity. (2) NIBS could also be used as an adjunct to other types of therapy (e.g., CRT or CBT), improving their therapeutic efficacy when treating the decline of cerebellar cognitive functions. This is because evidence suggests that NIBS enhance the neuroplastic effects of adjunct non-stimulation therapy. And this may apply not only in diseases primarily involving the cerebellum, but also in those affecting interconnected regions where the cerebellum exerts a modulatory influence. (3) Enhancing the coupling between one side of the cerebellum and the contralateral region of frontal cortex is another possibility in which the facilitatory effects of NIBS could be exploited: improving cognitive capacity and motor control in patients with pure cerebellar ataxias. This would free up more cognitive resources for dual-tasking (e.g., talking whilst walking) -- minimizing the risk of falls in aged cerebellar patients with cognitive decline. Even in healthy individuals, NIBS may be anticipated to improve motor and cognitive functions and enhance performance by boosting cerebro--cerebellar connectivity. A sedentary life does not engage this circuit much. Expert performers such as musicians ([@B46]) and athletes ([@B47]), have a significantly larger cerebellum than non-experts, suggesting that increased activity increases neural volume and probably neural connectivity. (4) The neuromodulatory effects of cerebellar stimulation might prove successful in restoring the balance of inhibitory and excitatory connections in the cerebrum, which can be dysfunctional in patients with cerebellar damage. Studies show that the normal effects of CBI, which typically decreases excitability of the motor cortex, are reduced or absent in patients with degeneration or lesions of the efferent system from the cerebellum ([@B48], [@B49]), confirming the clinical effectiveness of NIBS to manage motor deficits in cerebellar ataxias ([@B40], [@B41]). (5) Lastly, one can foresee a procedure that combines the inhibitory effects of cathodal tDCS or low frequency rTMS to decrease CBI, with the excitatory effects of anodal tDCS or high frequency rTMS to excite the DLPFC. This dual-site stimulation paradigm could be employed to enhance the dis-inhibition of the cerebral cortex, restoring system balance after cerebellar disease and permitting improved cognitive functions. However, the type of stimulation (e.g., inhibitory versus excitatory) and stimulation paradigm (e.g., single- versus dual-site) to be employed as part of an effective treatment plan will be governed by understanding each patients' specific medical condition. Future research will likely explore these ideas and must be directed toward understanding individual factors that determine the efficacy of NIBS, leading to better procedures and protocols for delivering NIBS as a cognitive rehabilitation tool for neuro-enhancement. Conflict of Interest Statement {#S3} ============================== The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. This work was funded by Wellcome Trust grant WT087554. [^1]: Edited by: Joseph M. Galea, University College London, UK [^2]: Reviewed by: Masashi Hamada, University College London, UK; Nick J. Davis, Swansea University, UK [^3]: This article was submitted to Neuropsychiatric Imaging and Stimulation, a section of the journal Frontiers in Psychiatry. | Mid | [
0.614657210401891,
32.5,
20.375
] |
[High incidence of left ventricular thrombosis and systemic embolism in patients with left ventricular assist system]. The purpose of this study was to determine the incidence of left ventricular (LV) thrombosis and systemic embolism in 14 patients with LV assist systems. Echocardiography was used to detect LV wall motion abnormalities, intracavitary smoke-like echoes and thrombosis, and the effect of anticoagulant therapy was serially examined. During full assist of the circulation, the aortic valve did not open in any patient. Smoke-like echoes were observed in 9 patients (64%) and thrombi in 8 (57%). The thrombus developed within the first 3 assist days. Systemic anticoagulant therapy decreased the thrombus size in only 3 patients, but there was a possibility of intracranial or mediastinal bleeding in other 3 patients. Systemic embolism was noted in 7 of 11 autopsy patients (64%). The characteristic finding was that there were multiple embolized organs, such as the brain, kidneys, spleen and liver, in all patients. Development of a thrombus is a serious complication in all patients with LV assist systems. However, the problem does not lie in the assist system but in the left ventricle of the patient's own heart. It is also noteworthy that systemic anticoagulation is not effective for an LV thrombus. A new method of assisting the failing heart, or a new anticoagulant delivery technique for the LV cavity to prevent LV thrombus development is needed. | High | [
0.667571234735413,
30.75,
15.3125
] |
Q: Username & password string comparison problem When I enter "abcd" in the passwordField, and use System.out.println(s21) - to check the password - it shows "[C@1372a1a", why? private void submit() { String s1 = userNameField.getText(); char[] s2 = passwordField.getPassword(); String s21 = s2.toString(); if (s1.equals(management.getUsernamesAdmin())&& s21.equals(management.getPasswordsAdmin())) { SystemManagementPage admin = new SystemManagementPage(this, true, management); admin.setVisible(true); } } } A: Your problem is here: String s21 = s2.toString(); This is calling toString() on a char[], and isn't going to return anything useful. Instead, String s21 = new String(s2); Will give you a String composed of the characters in the array. Other than that, I can't see any reason your code shouldn't work. | Mid | [
0.565573770491803,
25.875,
19.875
] |
Q: There exists an $\aleph_0$-coloring of a graph on the real numbers. I have this question: Let $G = ( \mathbb{R} , E)$ be a graph such that its vertices are the real numbers and its edge set is given by $$E = \big\{ \{u,v\}\,\big |\, u-v \in \mathbb{Q} \setminus \{0 \}\big\}\,.$$ Prove that the graph has a legal coloring in color set $\mathbb{N}$. I have a graph $G$ with vertices set $V$, If there is a legal coloring of the graph $G$ using a set $A$ of colors of cardinality of $a$. Does that mean there is a legal coloring of $G$ using every set of colors with cardinality $a$ ? Thank you! A: HINT: Show that if $\{u,v\}$ and $\{v,w\}$ are both edges of $G$, then $\{u,w\}$ is also an edge of $G$. Conclude that each component of $G$ is a countably infinite complete graph. Added: I’ll fill in a bit more detail. Let $u$ be any vertex of $G$; the neighborhood of $u$ (i.e., $u$ together with the set of vertices to which it is joined by edges) is $N(u)=\{u\pm q:q\in\Bbb Q\}$. Note that this is a countably infinite set (why?). Use the original hint to show that if $v\in N(u)$, then $N(v)=N(u)$: every vertex in $N(u)$ is connected by an edge to every other vertex in $N(u)$, and no vertex in $N(u)$ is connected to any vertex outside of $N(u)$. That shows that $N(u)$ is both a complete subgraph of $G$ and a component of $G$. And it has countably infinitely many vertices, so there is a bijection between it and $\Bbb N$. | Mid | [
0.631346578366445,
35.75,
20.875
] |
Other Searches Food & Drink Best Mexican Market Durango Grocery Looking for tuttifrutti Jarritos, buñuelos mix, the perfect quinceañera dress or a pound of menudo? How about right next door to "Best Taqueria" alum (2010) Taqueria Durango. The two establishments are all that remain in a forlorn strip mall just off Page Avenue in Overland. But you wouldn't know it once you're inside the neighborhood store, where Angelica Lopez, who, along with her parents and sister, owns the place, greets customers by name and often knows who in Mexico they're calling from the shop's phone bank. A meat counter offers all the expected cuts (and parts), and you can also pick up Mexican cuisine-friendly produce, cheese and, oh, yes, beans, beans and more beans, and enough dried chiles to keep your party sweating. Speaking of parties, Durango's tequila selection is something to behold, in particular the Scorpion mescal, which substitutes — you guessed it — an auténtico pickled scorpion for the traditional agave larva. Eat that, gringo! | Mid | [
0.554027504911591,
35.25,
28.375
] |
List of European Athletics Championships records The European Athletics Championships is a quadrennial event which began in 1934. European Athletics accepts only athletes who are representing one of the organisation's European member states and the body recognises records set at editions of the European Athletics Championships. The Championships records in athletics are the best marks set in competitions at the event. The athletics events at the Championships are divided into four groups: track events (including sprints, middle- and long-distance running, hurdling and relays), field events (including javelin, discus, hammer, pole vault, long and triple jumps), road events and combined events (the heptathlon and decathlon). Great Britain's athletes holds the greatest number of records at the Championships with a total of ten, followed by Russia (9), Germany (7), and Spain (4). Marita Koch and Heike Drechsler each hold multiple records, Koch having broken both the 400 metres record as an individual and as part of the East German relay team and Drechsler holding the records for both long jump and 200 m. World records have been set at the Championships: the French 4×100 metres relay team ran a world record 37.79 seconds at the 1990 Championships. Several athletics events no longer take place at the Championships and thus the events are deemed defunct, and their records unchallengeable. No records were broken at the 2012 European Athletics Championships – the first time in the history of the event. The current edition is taking place between 7 and 12 August 2018 in Berlin. Men's records Statistics are correct as of 12 August 2018 Women's records Statistics are correct as of 12 August 2018 Statistics Totals World records Records in defunct events Men's events Women's events References General European Championships Best Performances Men. European Athletics (archived). Retrieved on 2009-07-13. European Championships Best Performances Women. European Athletics (archived). Retrieved on 2009-07-13. European Championships (Men). GBR Athletics. Retrieved on 2014-01-04. European Championships (Women). GBR Athletics. Retrieved on 2014-01-04. Specific Records European Athletics Championships European Championships | High | [
0.677333333333333,
31.75,
15.125
] |
Marketing Myopia Essay 1 ) 0 Launch In line with Levitt (1960), Promoting Myopia identifies the narrow view of myopia, advertising business environment. This kind of advertising program without the demand with clients but an organization will certainly is to promote goods or services inside particular monetary markets. This tilted a small business to focus on their desire, rather than what the purchasing desires, and often modifying to create a culture of immunity each typically conclude losing the name, business damage and ineffective commercial practice Levitt, (1960). This can be accomplished exploring by these people, an enterprise may seem an extra completely meet buyer needs and wants, in order to develop the business. It gives a brilliant perspective of thoughts for your consumers. At Marketing Myopia, Levitt (1960), he signifies the current marking statement explained: Marketing is actually a stepson a lot of the organizations pressured production and marketing. 2 . 0 Crucial failing 1980’s According to the example has shown that, the key failings in marketing as a organization practice by Levitt in 1960. In line with the article, the key key failing point was they had a management failure does not since the market is not really saturated yet the reason is because of their own MYOPIA. These all key failing level has plainly to support and determine how they had a poor supervision. First and foremost, that they watched it had been supposed to develop but never take action to developed that, which means we were holding not looked at the long term although they look with the short term just, which is short-sighted goods for instance, the petroleum. The situation worsened rail transport terrible, since they will be rail-based rather than product-oriented, we were holding product oriented rather than customer oriented, they do not care about the client’s wishes and there are more on source but few on demand. As a outcomes that is because for what reason their customers snatched by competitors. Other than that, they are deficiency of considering how a rail road can be pant in the potential customer future. While those who the lack of consider how to become a fantastic entertainer abilities in The show biz industry and alternatively they considered filmmaking. In addition , they have never seen the item as overall and slim example should not be considered to be petroleum fuel industry but is deemed the energy business, which is not thought to produce Showmanship movies but since amusement and also failed to observe this market from any marketing view. Furthermore, Theodore Levitt defined there is misconception of manufacturer, they are just think regarding the particular merchandise and yet they are missed to find the category of the item. The last crucial failing reason for management inability perceived by simply Levitt is definitely they have a poor product framework, they are impossible comprehensive application, failed to find out its customers product range leading to the failure of the organization and are not able to have a good sales available in the market. 3. 0 Changes and thinking Relating to to the ideology was that it needs to change from merchandise orientation to client alignment and the practice would likewise move coming from product alignment to customer orientation. How things are performed there such a huge boost, because at this point people are incredibly imaginative in how they look for the future, within marketing from your product-oriented and service-oriented their particular thinking capability to widen stricture ideas, their very own management is changed by simply catering the needs of promoting person. As an example, the Perils of Petroleum. They created a right of alternative petroleum pursuit with advanced technical and know how to take pleasure in the confidence of senior buyers, restrictions by itself technologies petrol exploration, oil extraction, olive oil refining and did not expect substitutes; example of natural gas. The oil organization has never been produced gas as a substitute to gasoline. Crude oil is usually one if she is not treated being a major patent medicine which can be we all understood that petroleum was a very significant issue, if not really the economy could got unwell, this is how they noted that it is proprietary drug. Oil companies have two items have not wanted to work with these two, Generally as gas instead of petrol or gas. The petrol has not been robust growth, herbal oils itself would not have started to be a greater by oil firm, and all this kind of because it needed to run automobiles and equipment. The next will probably be Dry Washing. This market was a growth with extravagance outlook. At one time, try to expensive that it is finally can get them in safely and easily to be cleaning. The boom was on. After thirty years the boom is usually begin as well as the industry is at difficulty with competition. The competition is avoid related virtually any new technique for a better cleaning, it has come with synthetic fibres and the chemical additives thus both of this kind of are resulted cut down the necessity of dry cleaning. The industrial marketplace is the latest present invention and business-oriented services, but it confronts a number of out of date shadows, as a result of new developments in which get this industry much more useless for the clients. Clients with a new and optimal substitutes order to meet their needs (Jahidur Rahim, 2014). In addition , it will be electric Resources. This was likewise one of those normally which is no substitute’ items that had been throne base of invincible growth. Power industry continues to boom as feel luxury home is changed into electrical gizmos museum. Electric utility industry has also confront the same issue in the use and production using its new and dynamic modify. By that changing of your time, electric ammenities is also changing very quickly, with all the whole changing clients familiar with using the new and useful utility. The result is a particular product oriented companies are faced with the outdated state. Grocery Store sectors which is known in the case can be corner grocery store’. In this supermarket continues to be took over a solid potency. The large big meals chains in 1930’s directly had escaped aggressive the expansion impartial supermarket was completely perished. The 1st pure superstore was commence business on 1930 in Jamaica li. 1933 supermarket were blossom in Pennsylvania, California Kansas and so on. Yet, When performed a large cycle announced that he discovered the difficult to consider the people can drive kms to a food store and sacrifice personalized assistance chain offers improved, people are used to Mrs. Consumer’. The moment 1936 past due, Wholesale and retail grocery store markets nationwide Association of Convention and New Jersey explained there is not fear. For introduction from the new very chain shops and super markets, the grocery store in which our friends and neighbors are also prone to face a loss of business. For the first time food store shopkeeper thinks that these grocery stores are not within their competitive, not originated from their particular market however they were actually wrong. 5. 0 Contemporary Industry Area Some of companies were behaving myopically. A global petroleum sector is generally described to consist of oil exploration, refining, travel (oil tankers and pipelines), extraction and the sale of petroleum products. With extensive from the products in the marketplace, including: crude oil and other offshoot products affiliated known as petroleum products, and products for use in the petrochemical industry. Sector classification was distributed in five industries which are upstream, downstream, delivers, pipeline, materials as well as companies (Kakada, 2014). The global petroleum industry can easily drive the greater part aptly identified as the engine of economic development on the globe. On the internationally market today, the most impressive commodities trading is elementary. And more than the usual century, crude oil has always been world’s main energy source. Petroleum sector already described as the most periodic activities and offers exceed 70 percent of global energy demand (Unknown, 2014). Place a vibrant business environment in worldwide, there are no changes in the structure from the industry and organizations like the oil and gas market has seen. From the universe today, functioning under the influence of significant changes in the composition and organization of the occurrence of the market is called, plus the most popular is that this is usually balancing amongst demand and provide of the products. This is specifically in the recent past is one of the most extensive decision-making tools and also the craze rest of rising prices to get products of strategic organizing. In short, for the significant industry changes in the past half-century stand for a new system of marketing of crude oil, query and designed state-owned businesses in the oil-producing countries, the OPEC formation consolidated and acquisitions of the nationalization, and entry the brand new company. The Industry similar to others Sector which has designed its operating instructions and specific attributes. From the limited supply of these products in the industry, as it has a nonrenewable resource. Even though the formation of fossil petrol are noted, but not in the global range buried precious does have every ground include oil. It could sound contrary, but it is still a fact. Therefore , great benefit were positioned on oil if of the site it is be found or seen to exist, which means oil goods extracted nonetheless yet to get extracted by simply that ground is regard to be as similar monetary value. Search, production, improving and oil resources in the last have been powered transport two forms of expense in the program. The first is associated with transnational agglomeration system, accompanied by foreign businesses. However , in two devices, the main power is the oil concession underneath its control, which ensures that even when methods that belong to the ability from the host nation, However control of the obole rights had been transferred to those company’s status. The system has got the majority of time in this 100 years, and the second world war played an important impact the activities within the industry. The unique features of this system may be the supreme electric power or right is providing the company to explore, extract and export of petroleum to limit any other investors generate any competitive advantage. In addition , the system enables whoever provides the overall power over the subside investments in the host nation for the expansion, the number of natural areas as well as the right to choose the location of production levels, production services, exploration and the transportation Capacity. In theory, this kind of sounds great, but this may not be made clear the way the state of tax collection and using resources, virtually any tangible contribution to the stationary role. This makes authorized role of the express, additional dependent, and not as dependent on the concessionaire. The partnership between the express and enterprises level started to be fiscal. In the long run, the company centered on their income will be below no accountability to meet any state of social financial and political neither the host or perhaps nor certain requirements of the advancement the petroleum sector. This technique in of the wider perspective, the inference is that the expenditure decision-making and analysis with the scheme, only consider the world economy. In a simplified fashion, petroleum sector is isolated from other departments in order to develop what might improve beneath what essential oil companies to host an economic background. five. 0Personal contribution and group dynamic Particular number of true in saying should go two heads are better than a single. In order to guarantee this task and promptly and completed effectively the improvement of this process, myself and my professional colleagues to work together firmly, burning the midnight candle lights, and generate investigations visiting in several neighborhood such as public libraries, the college libraries to procurement a reference just for this task. Yet sometimes I was wrote straight down some data of important parts for what our lecturer in lecturing us upon since I would not catch up or missed out a lot of significant parts on this task, therefore I might try to placing more hard work on it and i also and my group partners usually stay back in college after classes to study even more. We look at as much as possible and fulfill our instructors and older persons to help us in certain areas the difficulties in order to our worries and dilemma. Before we all started this report, i was divided the job of manufactured a display in order to allows each other appreciate more. I with my own teammates conduce to the initially question, it is to determine the sales as being a business remark and Levitt (1960) perceived problems. We were paid a visit to meet up with each of our group members 2 times a week for this task plus the spending several hours probably because 1 hour and 40 a few minutes for every sole meet up. In others period, we were discuss via social networking such as contacting or have a phone call. One other group of each of our classmates had been contributed in question zero 2 which can be be display on how the thinking (and practice) continues to be influence upon since then- supported commentaries to the primary article (starting with Levitt’s own up-to-date thinking)while an additional of the last group had been contributed upon question simply no 3 which usually we were asked to take a single business space (which can be one at first checked out simply by Levitt (1960), or another of the choice) confirm whether or not you believe it’s at the moment acting myopically, giving the reasons (evidence! ) for your views. Due the hard job and assistance I had been get hold of such a success at the same time understanding how to work along with my personal team and got a lot of opinion make those that means into the job. But likewise learned even more regarding about how exactly to package or how you can well deal with a business, together with the most important factor to be more understand is customer-oriented than product-oriented of it is only we would exactly understand the client demands and would like. My own thought due to his literary performs is that Levitt is a visionary because the majority of the subjects this individual underlined in 1960 regarding train, Hollywood and petroleum industry turned into right a long time after. It was a well to start regarding the marketing knowledge’s. 6. 0 Conclusion In conclusion this task, marketing myopia is an extremely important in addition to a broad theme that needs to be fixed in a lot of aspect, simply by trying to take away the short sightedness that a lot of businesses has been endured and go through during the existence. And there are a lot of marketing options that had been disregarded or neglected since the majority of the businesses would not watch or project or plan for the excellent prospect of their business, why? because of all of them having a brief sighted. When ever businesses which have been having a short sighted would experienced in the long run while since that there organization does not get together to their clientele demand plus the services and resulted in having a poor consumers services these people were being forced to shut down. Related posts The story of just one of India’s favorite brands reads like a apologue. Once upon a time, in 1892 to become precise, a biscuit organization was were only available in a nondescript house in Calcutta (now Kolkata) with an initial expense of Rs. 295. The corporation we all know since Britannia today. The origins might […] By simply its extremely nature, promoting requires corporations and organisations to develop new ideas and make changes to their promoting efforts. Fresh concepts, models and goods are essential pertaining to responding to the ever-changing demands of the goal market/s, and are crucial pertaining to maintaining client satisfaction, which in the end leads to improved revenues […] Answer1: The Vocalpoint program launched by P&G was a very well sought out imply to market the merchandise by using the word of mouth marketing strategy. Introduction of the mothers from surrounding the country was a cunning decision made by the managers at P&G the reason behind this being was that moms are the kinds […] The Graveyard Book is a novel by Neil Gaiman. It can be about a youngster called No one Owens who have lives in a graveyard. This individual wandered in as a kid after his entire is murdered with a mysterious gentleman named Jack. He is brought up by a man called Silas who is vampire […] The newspaper market, like different markets are becoming competitive for the extent that survival takes a lot of imagination and innovation in the way the organization is done. This is the circumstance in which the 3 major magazines on the Zambian market, i. e the Post, the Times of Nyimba, zambia, and the Zambia Daily […] | Mid | [
0.6096997690531171,
33,
21.125
] |
7 F.3d 357 130 A.L.R.Fed. 633, 62 USLW 2243, Fed.Sec. L. Rep. P 97,789 In re DONALD J. TRUMP CASINO SECURITIES LITIGATION--TAJMAHAL LITIGATION.Sidney L. KAUFMAN, suing individually and on behalf of aclass of persons similarly situated; Jerome Schwartz, suingindividually and on behalf of a class of persons similarlysituated; Peter Stuyvesant, Ltd., on behalf of itself andall others similarly situated; Susan Cagan; Eric Cagan;David E. Dougherty; Jean Curzio; Alexander L. Charnis;Dorothy Arkell; Fred Glossner; Herman Krangel; RobertKloss; Helen Kloss; Fairmount Financial Corp.; JoanneGollomp; Dino Del Zottov.TRUMP'S CASTLE FUNDING; Trump's Castle Associates LimitedPartnership, a New Jersey Limited Partnership; Trump TajMahal Funding, Inc., a New Jersey Corporation; Trump TajMahal Associates Limited Partnership, a New Jersey LimitedPartnership; Donald J. Trump; Robert S. Trump; JohnO'Donnell; Nathan Katz; Tim Maland; Francisco Tejeda;Julian Menarguez; Harvey I. Freeman; Paul Henderson;Patrick C. McKoy; Edward M. Tracy; Michael S. Vautrin;Jeffrey A. Ross; John P. Belisle; Timothy G. Rose; LoriTaylor; C. "Bucky" Willard; The Trump Organization, Inc.;Trump Taj Mahal, Inc.; Merrill Lynch, Pierce, Fenner &Smith Incorporated.Sidney L. KAUFMAN, suing individually and on behalf of aclass of persons similarly situatedv.TRUMP'S CASTLE FUNDING; Trump's Castle Associates LimitedPartnership, a New Jersey Limited Partnership; Trump TajMahal Funding, Inc., a New Jersey Corporation; Trump TajMahal Associates Limited Partnership, a New Jersey LimitedPartnership; Donald J. Trump.Jerome SCHWARTZ, suing individually and on behalf of a classof persons similarly situatedv.TRUMP'S CASTLE FUNDING, INC. (A New Jersey Corporation);Trump's Castle Associates Limited Partnership (A New JerseyLimited Partnership); Trump Taj Mahal Funding, Inc. (A NewJersey Corporation); Trump Taj Mahal Associates LimitedPartnership (A New Jersey Limited Partnership); Donald J. Trump.PETER STUYVESANT, LTD., on behalf of itself and all otherssimilarly situatedv.Donald J. TRUMP; Robert S. Trump; John O'Donnell; TrumpPlaza Funding, Inc.; Nathan Katz; Tim Maland; Trump PlazaAssociates; Francisco Tejeda; Julian Menarguez; Harvey I.Freeman; Paul Henderson; Patrick C. McKoy; Edward M.Tracy; Michael S. Vautrin; Jeffrey A. Ross; John P.Belisle; Timothy G. Rose; Trump's Castle Funding, Inc.;Lori Taylor; Trump's Castle Associates Limited Partnership.Susan CAGAN; Eric Cagan; David E. Dougherty; Jean Curziov.Donald J. TRUMP; Robert S. Trump; Harvey I. Freeman; C."Bucky" Willard; Trump Taj Mahal Funding, Inc.; Trump TajMahal Associates Limited Partnership; The TrumpOrganization, Inc.; Trump Taj Mahal Incorporated; MerrillLynch, Pierce, Fenner & Smith Incorporated.Alexander L. CHARNIS; Dorothy Arkellv.Donald J. TRUMP; Robert S. Trump; Harvey I. Freeman; C."Bucky" Willard; Trump Taj Mahal Funding, Inc.; Trump TajMahal Associates Limited Partnership; The TrumpOrganization, Inc.; Merrill Lynch, Pierce, Fenner & SmithIncorporated.FAIRMONT FINANCIAL CORP.; Joanne Gollomp, on behalf ofthemselves and all others similarly situatedv.Donald J. TRUMP; Harvey S. Freeman; Robert S. Trump; TheTrump Organization, Inc.; Merrill Lynch, Pierce, Fenner &Smith Incorporated; Trump Taj Mahal Funding, Inc.; TrumpTaj Mahal, Inc.; Trump Taj Mahal Associates Limited Partnership.Robert KLOSS; Helen Klossv.Donald J. TRUMP; Robert S. Trump; Harvey I. Freeman; C."Bucky" Willard; Trump Taj Mahal Associates LimitedPartnership; The Trump Organization, Inc.; Trump TajMahal, Inc.; Merrill Lynch, Pierce, Fenner & Smith Incorporated.Fred GLOSSNER; Herman Krangelv.Donald J. TRUMP; Harvey S. Freeman; Robert S. Trump; TheTrump Organization, Inc.; Merrill Lynch, Pierce, Fenner &Smith Incorporated; Trump Taj Mahal Funding, Inc.; TrumpTaj Mahal, Inc.; Trump Taj Mahal Associates Limited Partnership.Dino DEL ZOTTOv.Donald J. TRUMP; Robert S. Trump; Harvey I. Freeman; C."Bucky" Willard; Trump Taj Mahal Funding, Inc.; TrumpTaj Mahal Associates; The Trump Organization, Inc.;Trump Taj Mahal, Inc.; Merrill Lynch, Pierce, Fenner &Smith Incorporated,Joanne Gollomp, Susan Cagan, Eric Cagan, David E. Dougherty,Jean Curzio, Robert and Helen Kloss, Fred Glossner, HermanKrangel, Sidney Kaufman, Jerome Schwartz, Dino Del Zotto,Alexander L. Charnis and Dorothy Arkell, on behalf ofthemselves and all others similarly situated, Appellants. No. 92-5350. United States Court of Appeals,Third Circuit. Argued Jan. 29, 1993.Decided Oct. 14, 1993. Stuart D. Wechsler (argued), Joel C. Feffer, New York City, Stanley R. Wolfe, Todd S. Collins, Berger & Montague, P.C., Philadelphia, PA, Carl D. Poplar, Cherry Hill, NJ, Gerald Jay Rodos, Barrack, Rodos & Bacine, Philadelphia, PA, Robert S. Schachter, Zwerling, Schachter & Zwerling, Bruce E. Gerstein, Garwin, Bronzaft, Gerstein & Fisher, New York City, Charles V. Van de Walle, Martin, Van de Walle, Guardino & Donohue, Great Neck, NY, Jared Stamell, Joseph J. Tabacco, Jr., Stamell, Tabacco & Schager, Joseph H. Weiss, New York City, Michael A. Cohan, Cohan & Eckhaus, Parlin, NJ, James V. Bashian, New York City, C. Oliver Burt, III, James R. Malone, Mark C. Rifkin, Debra N. Nathanson, Greenfield & Chimicles, Haverford, PA, Howard A. Specter, Pittsburgh, PA, for appellants. Richard L. Posen (argued), Willkie Farr & Gallagher, New York City, John J. Barry, Clapp & Eisenberg, P.C., Newark, NJ, Stuart J. Baskin (argued), Shearman & Sterling, New York City, for appellees. Before: BECKER, ALITO, Circuit Judges and ATKINS, District Judge.*OPINION OF THE COURT BECKER, Circuit Judge. 1 This is an appeal from orders of the district court for the District of New Jersey dismissing a number of complaints brought under various provisions of the Securities Act of 1933 and the Securities Exchange Act of 1934 by a class of investors who purchased bonds to provide financing for the acquisition and completion of the Taj Mahal, a lavish casino/hotel on the boardwalk in Atlantic City, New Jersey. The defendants are Donald J. Trump ("Trump"), Robert S. Trump, Harvey S. Freeman, the Trump Organization Inc., Trump Taj Mahal Inc., Taj Mahal Funding Inc. and Trump Taj Mahal Associates Limited Partnership (the "Partnership")1 (collectively the "Trump defendants") and Merrill Lynch, Pierce, Fenner and Smith Inc. ("Merrill Lynch"). The complaints allege that the prospectus accompanying the issuance of the bonds contained affirmatively misleading statements and materially misleading omissions in contravention of the federal securities laws. 2 The district court dismissed the securities law claims under Fed.R.Civ.P. 12(b)(6) for failure to state a claim upon which relief can be granted. The linchpin of the district court's decision was what has been described as the "bespeaks caution" doctrine, according to which a court may determine that the inclusion of sufficient cautionary statements in a prospectus renders misrepresentations and omissions contained therein nonactionable. While the viability of the bespeaks caution doctrine is an issue of first impression for this court, we believe that it primarily represents new nomenclature rather than substantive change in the law. As we see it, "bespeaks caution" is essentially shorthand for the well-established principle that a statement or omission must be considered in context, so that accompanying statements may render it immaterial as a matter of law. 3 We believe that the bespeaks caution doctrine is both viable and applicable to the facts of this appeal. The prospectus here took considerable care to convey to potential investors the extreme risks inherent in the venture while simultaneously carefully alerting the investors to a variety of obstacles the Taj Mahal would face, all of which were relevant to a potential investor's decision concerning purchase of the bonds. We conclude that, given these warning signals in the text of the prospectus itself, the plaintiffs cannot establish that a reasonable investor would find the alleged misstatements and omissions material to his or her decision to invest in the Taj Mahal. Hence we will affirm the district court's orders. 4 Inasmuch as some plaintiffs filed their complaints in other districts, and the Judicial Panel on Multidistrict Litigation (the "JPML") transferred them to the district court for the District of New Jersey under 28 U.S.C. § 1407 for consolidated pre-trial proceedings (as opposed to a transfer for all purposes, such as under 28 U.S.C. § 1404(a) or 1406), the question arises whether the district court possessed authority to issue dispositive pre-trial orders terminating the cases so transferred. It seems to be widely accepted that § 1407 and the rules promulgated thereunder empower a transferee court to enter dispositive orders to terminate a case, but there is no reported case law so holding. We take this opportunity to confirm the power of the transferee court to enter a Rule 12(b)(6) dismissal. I. Facts and Procedural History 5 In November, 1988 the Trump defendants offered to the public $675 million in first mortgage investment bonds (the "bonds") with Merrill Lynch acting as the sole underwriter. The interest rate on the bonds was 14%, a high rate in comparison to the 9% yield offered on quality corporate bonds at the time. The Trump defendants issued the bonds to raise capital to: (1) purchase the Taj Mahal, a partially-completed casino/hotel located on the boardwalk, from Resorts International, Inc. (which had already invested substantial amounts in its construction); (2) complete construction of the Taj Mahal; and (3) open the Taj Mahal for business. 6 As is well-known, the Taj Mahal was widely touted as Atlantic City's largest and most lavish casino resort. When ultimately opened in April, 1990 it was at least twice the size of any other casino in Atlantic City. It consisted of a 42-story hotel tower that contained approximately 1,250 guest rooms and an adjacent low-rise building encompassing roughly 155,000 square feet of meeting, ballroom and convention space, a 120,000 square foot casino, and numerous restaurants, lounges and stores. The entire structure occupied approximately seventeen acres of land. 7 The prospectus accompanying the bonds estimated the completion cost of the Taj Mahal, including the payment of interest on the bonds for the first fifteen months of operation, at $805 million. It explained that, to obtain that amount, the Trump defendants were relying on the $675 million in bond proceeds, a $75 million capital contribution by Donald Trump, investment income derived from those sums, a contingent additional loan of $25 million from the Trump Line of Credit, and loans from other sources. 8 Plaintiffs ground their lawsuits in the text of the prospectus. Their strongest attack focuses on the "Management Discussion and Analysis" ("MD & A") section of the prospectus, which stated: "The Partnership believes that funds generated from the operation of the Taj Mahal will be sufficient to cover all of its debt service (interest and principal)." See Complaint at p 32. The plaintiffs' primary contention is that this statement was materially misleading because the defendants possessed neither a genuine nor a reasonable belief in its truth. However, as the defendants emphasize, the prospectus contained numerous disclaimers and cautionary statements in conjunction with this statement. The cautionary statements stressed, among other things: the intense competition in the casino industry; the absence of an operating history for the Taj Mahal which could serve as a basis for its valuation; the unprecedented size of the Taj Mahal casino in Atlantic City; and the enterprise's potential inability to repay the interest on the bonds in the event of a mortgage default and subsequent liquidation of the Taj Mahal. 9 After learning that the Trump defendants planned to file Chapter 11 bankruptcy proceedings and establish a reorganization plan, various bondholders filed separate complaints in the United States District Courts for the Southern District of New York, the Eastern District of New York and the District of New Jersey. The complaints each alleged that the prospectus accompanying the issuance of the bonds contained material misrepresentations and material omissions in violation of the 1933 and 1934 Acts. Pursuant to 28 U.S.C. § 1407, the JPML subsequently transferred the complaints for consolidated pre-trial proceedings to the District of New Jersey. See MDL Docket No. 864 (In re Donald J. Trump Sec. Litig.). 10 The consolidated complaints pleaded four counts. In count one, the plaintiffs alleged that the prospectus contained misrepresentations and omissions of material fact in violation of §§ 11,2 12(2)3 and 15 of the Securities Act of 1933 (the "1933 Act"), 15 U.S.C. §§ 77k(a), 77l (2), 77o. Count two of the complaints alleged fraud in the prospectus, based on the same alleged misrepresentations and omissions, but in violation of §§ 10(b)4 and 20(a)5 of the Securities Exchange Act of 1934 (the "1934 Act") and Rule 10(b)(5)6 promulgated thereunder, 15 U.S.C. §§ 78j(b), 78t(a), and 17 C.F.R. § 240.10(b)-5. Counts three and four alleged state common law claims. 11 The defendants moved to dismiss the complaints pursuant to Rule 12(b)(6), asserting that the plaintiffs had failed to state actionable securities fraud claims, and also pursuant to Fed.R.Civ.P. 9(b), contending that the plaintiffs failed to plead their fraud allegations with sufficient particularity. The district court granted the defendants' motion under Rule 12(b)(6), reasoning that the abundance of cautionary statements that directly addressed the alleged misrepresentations and omissions rendered the plaintiffs' claims nonactionable as a matter of law. See In re Donald J. Trump Casino Sec. Litig., 793 F.Supp. 543 (D.N.J.1992). The district court also rejected the plaintiffs' motion to amend their complaints to add allegations based on an appraisal of the future value of the Taj Mahal which had been issued by the accounting firm of Laventhol and Horwath ("the Laventhol Report"). The district court did not reach the defendants' motion to dismiss based on Rule 9(b). Having disposed of the federal claims, the court subsequently dismissed the plaintiffs' claims of breach of fiduciary duty and false advertising without prejudice for lack of pendent jurisdiction. 793 F.Supp. at 568. This appeal followed. 12 The district court had jurisdiction over the federal securities law claims under 15 U.S.C. §§ 77v and 78aa and over the state law claims under 28 U.S.C. § 1367. We have jurisdiction under 28 U.S.C. § 1291. We exercise plenary review over the district court's dismissal of the plaintiffs' complaint under Rule 12(b)(6). Marshall-Silver Constr. Co. v. Mendel, 894 F.2d 593, 595 (3d Cir.1990). In this regard, we must accept the plaintiffs' factual allegations as true and give the plaintiffs the benefit of the inferences which we may fairly draw from them. See Scheuer v. Rhodes, 416 U.S. 232, 236, 94 S.Ct. 1683, 1686, 40 L.Ed.2d 90 (1974). II. The Parties' Contentions 13 The plaintiffs allege that the prospectus contained material misrepresentations. Their principal claim is that the defendants had neither an honest belief in nor a reasonable basis for one statement in the MD & A section of the prospectus: "The Partnership believes that funds generated from the operation of the Taj Mahal will be sufficient to cover all of its debt service (interest and principal)." Before the district court and again before us, the plaintiffs concentrate on this statement and its allegedly misleading character. 14 The plaintiffs also argue that the prospectus was misleading in its omission of allegedly material information. The plaintiffs submit that the prospectus failed to disclose, inter alia, that: 1) the Taj Mahal required an average "casino win" of approximately $1.3 million per day on a continuing basis in order to service its debtload; 2) Donald Trump had personally guaranteed hundreds of millions of dollars in bank loans for other properties; and 3) the Taj Mahal had an "unprecedented" debt to equity ratio.7 The plaintiffs contend that these allegedly material misrepresentations and omissions form the basis for actionable securities fraud claims and that, to the extent that the prospectus contained cautionary language, the district court improperly considered the effect of this language on a motion to dismiss. 15 The defendants respond that the myriad warnings and cautionary statements contained in the prospectus sufficiently disclosed to the bondholders the multifarious risks inherent in the investment. With respect to the plaintiffs' primary argument--that the statement relating the Partnership's belief in the Taj Mahal's capacity to generate ample income for the Partnership to make full payment on the bonds was materially misleading--the defendants contend that there was also adequate cautionary language surrounding this statement to render it nonactionable as a matter of law. That is, they insist that when a prospectus (such as this one) contains abundant warnings and cautionary statements which qualify the statements plaintiffs claim they relied upon, plaintiffs cannot, as a matter of law, contend that they were misled by the alleged misrepresentations and/or omissions. 16 III. The District Court's Authority to Terminate the Case Under 28 U.S.C. § 1407 17 As we noted above, the JPML transferred a number of complaints that different plaintiffs had filed in the Southern and Eastern Districts of New York to the District of New Jersey for consolidated pre-trial proceedings pursuant to 28 U.S.C. § 1407. At oral argument, the question arose whether the district court possessed the authority to terminate the transferred cases under Rule 12(b)(6). Surprisingly, no judicial precedent addresses this point, so we take this opportunity to make clear that § 1407 empowers transferee courts to enter a dispositive pre-trial order terminating a case. 18 Section 1407 authorizes the consolidation and transfer of civil actions containing common questions of fact "for coordinated or consolidated pretrial proceedings." 28 U.S.C. § 1407(a). The section further directs that the transferee court should remand the case to the transferor court "unless it shall have been previously terminated," which suggests that Congress contemplated that transferee courts would dismiss cases in response to dispositive motions. The dismissal of a complaint under Rule 12(b)(6) constitutes such a pre-trial proceeding. 19 Apparently, transferee courts frequently terminate consolidated cases in practice. See In re Korean Air Lines Disaster, 829 F.2d 1171, 1176 n. 9 (D.C.Cir.1987) (noting that as of 1986 transferee courts had terminated over two-thirds of all cases subject to § 1407 proceedings), aff'd sub nom. Chan v. Korean Air Lines, Ltd., 490 U.S. 122, 109 S.Ct. 1676, 104 L.Ed.2d 113 (1989). Moreover, the practice comports with the rules the JPML promulgated pursuant to § 1407, see Rule 14(a) ("Actions terminated in the transferee district court by valid judgment, including ... judgment of dismissal ..., shall not be remanded ... and shall be dismissed by the transferee district court."), as well as the views of commentators. See Manual for Complex Litigation, Second, § 31.122, at 254 (1985) (stating "[t]he transferee judge has the power to terminate actions by rulings on motions under Fed.R.Civ.P. 12"); Stanley A. Weigel, The Judicial Panel on Multidistrict Litigation, Transferor Courts and Transferee Courts, 78 F.R.D. 575, 582-83 (1978). 20 In sum, we are satisfied that § 1407 empowered the district court to dismiss the plaintiffs' complaint under Rule 12(b)(6).8 21 IV. The Alleged Affirmative Material Misrepresentations in 22 the Prospectus 23 As we explained above, the plaintiffs assert that the Trump defendants had neither an honest nor a reasonable belief in their statement on page 28 of the prospectus that "[t]he Partnership believes that funds generated from the operation of the Taj Mahal will be sufficient to cover all of its debt service (interest and principal)." The plaintiffs contend that, in view of this allegation, they have stated a cause of action under the federal securities laws. We disagree.9 A. General Legal Principles 24 At a minimum, each of the securities fraud provisions which the bondholders allege the Trump defendants violated requires proof that the defendants made untrue or misleading statements or omissions of material fact. See Shapiro v. UJB Fin. Corp., 964 F.2d 272, 280, 286 (3d Cir.), cert. denied, --- U.S. ----, 113 S.Ct. 365, 121 L.Ed.2d 278 (1992).10 We have squarely held that opinions, predictions and other forward-looking statements are not per se inactionable under the securities laws. Rather, such statements of "soft information" may be actionable misrepresentations if the speaker does not genuinely and reasonably believe them.11 See, e.g., Herskowitz v. Nutri/System, Inc., 857 F.2d 179, 184 (3d Cir.1988), cert. denied, 489 U.S. 1054, 109 S.Ct. 1315, 103 L.Ed.2d 584 (1989); Eisenberg v. Gagnon, 766 F.2d 770, 776 (3d Cir.), cert. denied sub nom. Wasserstrom v. Eisenberg, 474 U.S. 946, 106 S.Ct. 342, 88 L.Ed.2d 290 (1985). Therefore, the plaintiffs' complaint does not falter just because it alleges that the defendants made a misrepresentation with their statement that they believed they would be able to repay the principal and interest on the bonds. Rather, the complaint cannot survive a motion to dismiss because ultimately it does not sufficiently allege that the defendants made a material misrepresentation. 25 The Supreme Court in TSC Indus., Inc. v. Northway, Inc., 426 U.S. 438, 96 S.Ct. 2126, 48 L.Ed.2d 757 (1976), defined materiality within the proxy-solicitation context of § 14(a) of the 1934 Act. Subsequently the Court expressly made the TSC standard applicable to actions under § 10 and Rule 10b-5, see Basic Inc. v. Levinson, 485 U.S. 224, 232, 108 S.Ct. 978, 983, 99 L.Ed.2d 194 (1988), and we have made it applicable as well to claims under §§ 11 and 12(2) of the 1933 Act, see Craftmatic Sec. Litig. v. Kraftsow, 890 F.2d 628, 641 & n. 18 (3d Cir.1989). TSC instructs that "[a]n omitted fact is material if there is a substantial likelihood that a reasonable [investor] would consider it important in deciding how to [act]." 426 U.S. at 449, 96 S.Ct. at 2132. For an omission to be deemed material, "there must be a substantial likelihood that [its disclosure] would have been viewed by the reasonable investor as having significantly altered the 'total mix' of information made available." Id.12 26 As the statement quoted immediately above implies, materiality is a relative concept, so that a court must appraise a misrepresentation or omission in the complete context in which the author conveys it. See I. Meyer Pincus & Assocs. v. Oppenheimer & Co., 936 F.2d 759, 763 (2d Cir.1991).13 In other words, a particular misrepresentation or omission significant to a reasonable investor in one document or circumstance may not influence a reasonable investor in another. We accordingly take into account not only the assertion that the Partnership believed the Taj Mahal could meet the obligations of the bonds, but also other relevant statements contained in the prospectus. B. The Text of the Prospectus 27 The prospectus at issue contained an abundance of warnings and cautionary language which bore directly on the prospective financial success of the Taj Mahal and on the Partnership's ability to repay the bonds. We believe that given this extensive yet specific cautionary language, a reasonable factfinder could not conclude that the inclusion of the statement "[t]he Partnership believes that funds generated from the operation of the Taj Mahal will be sufficient to cover all of its debt service (interest and principal)" would influence a reasonable investor's investment decision. More specifically, we believe that due to the disclaimers and warnings the prospectus contains, no reasonable investor could believe anything but that the Taj Mahal bonds represented a rather risky, speculative investment which might yield a high rate of return, but which alternatively might result in no return or even a loss. We hold that under this set of facts, the bondholders cannot prove that the alleged misrepresentation was material. 28 The statement the plaintiffs assail as misleading is contained in the MD & A section of the prospectus, which follows the sizable "Special Considerations" section, a section notable for its extensive and detailed disclaimers and cautionary statements. More precisely, the prospectus explained that, because of its status as a new venture of unprecedented size and scale, a variety of risks inhered in the Taj Mahal which could affect the Partnership's ability to repay the bondholders. For example, it stated: 29 The casino business in Atlantic City, New Jersey has a seasonal nature of which summer is the peak season.... Since the third interest payment date on the Bonds [ (which constitutes the first interest payment not paid out of the initial financing) ] occurs before the summer season, the Partnership will not have the benefit of receiving peak season cash flow prior to the third interest payment date, which could adversely affect its ability to pay interest on the Bonds. 30 ... The Taj Mahal has not been completed and, accordingly, has no operating history. The Partnership, therefore, has no history of earnings and its operations will be subject to all of the risks inherent in the establishment of a new business enterprise. Accordingly, the ability of the Partnership to service its debt to [Taj Mahal Funding Inc., which issued the bonds,] is completely dependent upon the success of that operation and such success will depend upon financial, business, competitive, regulatory and other factors affecting the Taj Mahal and the casino industry in general as well as prevailing economic conditions.... 31 The Taj Mahal will be the largest casino/hotel complex in Atlantic City, with approximately twice the room capacity and casino space of many of the existing casino/hotels in Atlantic City. [No] other casino/hotel operator has had experience operating a complex the size of the Taj Mahal in Atlantic City. Consequently, no assurance can be given that, once opened, the Taj Mahal will be profitable or that it will generate cash flow sufficient to provide for the payment of the debt service.... 32 Prospectus at 8. 33 The prospectus went on to relate, as part of its "Security for the Bonds" subsection, the potential effect of the Partnership's default on its mortgage payments. For example, this subsection unreservedly explained that if a default occurred prior to completion of the Taj Mahal, "there would not be sufficient proceeds [from a foreclosure sale of the Taj Mahal] to pay the principal of, and accrued interest on, the Bonds." Prospectus at 9. 34 The "Special Considerations" section also detailed the high level of competition for customers the completed Taj Mahal would face once opened to the public: 35 Competition in the Atlantic City casino/hotel market is intense. At present, there are twelve casino/hotels in Atlantic City.... Some Atlantic City casino/hotels recently have completed renovations or are in the process of expanding and improving their facilities.... The Partnership believes that, based upon historical trends, casino win per square foot of casino space will decline in 1990 as a result of a projected increase in casino floor space, including the opening of the Taj Mahal. 36 Prospectus at 14 (emphasis added). In a section following the MD & A section, the prospectus reiterated its reference to the intense competition in the Atlantic City casino industry: 37 Growth in Atlantic City casino win is expected to be restrained until further improvements to the City's transportation system and infrastructure are undertaken and completed and the number of non-casino hotel rooms and existing convention space are increased. No assurance can be given with respect to either the future growth of the Atlantic City gaming market or the ability of the Taj Mahal to attract a representative share of that market. 38 Prospectus at 33. The prospectus additionally reported that there were risks of delay in the construction of the Taj Mahal and a risk that the casino might not receive the numerous essential licenses and permits from the state regulatory authorities. See Prospectus at 11-13, 15-16, 35-37. 39 In this case the Partnership did not bury the warnings about risks amidst the bulk of the prospectus. Indeed, it was the allegedly misleading statement which was buried amidst the cautionary language. At all events, in addition to reading the allegedly misleading statement setting forth the Partnership's belief that it could repay the principal and interest on the bonds, a prospective investor would have also read the dire warnings and cautionary statements a sampling of which we have just outlined. Moreover, an investor would have read the sentence immediately following the challenged statement, which cautioned: "[n]o assurance can be given, however, that actual operating results will meet the Partnership's expectations." 40 As we explained above, we must consider an alleged misrepresentation within the context in which the speaker communicated it. Here the context clearly and precisely relayed to the bondholders the substantial uncertainties inherent in the completion and operation of the Taj Mahal. The prospectus contained both general warnings that the Partnership could not assure the repayment of the bonds as well as specific discussions detailing a variety of risk factors that rendered the completion and profitable operation of the Taj Mahal highly uncertain. Within this broad context the statement at issue was, at worst, harmless. C. The Bespeaks Caution Doctrine 41 The district court applied what has come to be known as the "bespeaks caution" doctrine. In so doing it followed the lead of a number of courts of appeals which have dismissed securities fraud claims under Rule 12(b)(6) because cautionary language in the offering document negated the materiality of an alleged misrepresentation or omission. See Sinay v. Lamson & Sessions Co., 948 F.2d 1037, 1040 (6th Cir.1991); I. Meyer Pincus & Assocs. v. Oppenheimer & Co., 936 F.2d 759, 763 (2d Cir.1991); Romani v. Shearson Lehman Hutton, 929 F.2d 875, 879 (1st Cir.1991); Polin v. Conductron Corp., 552 F.2d 797, 806 n. 28 (8th Cir.), cert. denied, 434 U.S. 857, 98 S.Ct. 178, 54 L.Ed.2d 129 (1977); cf. Huddleston v. Herman & MacLean, 640 F.2d 534, 543-44 (5th Cir.1981) (holding that a general warning was insufficient to render a known misrepresentation immaterial as a matter of law), modified, 459 U.S. 375, 103 S.Ct. 683, 74 L.Ed.2d 548 (1983); see also In re Convergent Technologies Sec. Litig., 948 F.2d 507, 515-16 (9th Cir.1991) (applying but not explicitly referencing the bespeaks caution doctrine to uphold a grant of summary judgment for the defendant). We are persuaded by the ratio decidendi of these cases and will apply bespeaks caution to the facts before us. 42 The application of bespeaks caution depends on the specific text of the offering document or other communication at issue, i.e., courts must assess the communication on a case-by-case basis. See Flynn v. Bass Bros. Enters., 744 F.2d 978, 988 (3d Cir.1984) (holding courts must determine the materiality of soft information on a case-by-case basis). Nevertheless, we can state as a general matter that, when an offering document's forecasts, opinions or projections are accompanied by meaningful cautionary statements, the forward-looking statements will not form the basis for a securities fraud claim if those statements did not affect the "total mix" of information the document provided investors. In other words, cautionary language, if sufficient, renders the alleged omissions or misrepresentations immaterial as a matter of law. 43 The bespeaks caution doctrine is, as an analytical matter, equally applicable to allegations of both affirmative misrepresentations and omissions concerning soft information. Whether the plaintiffs allege a document contains an affirmative prediction/opinion which is misleading or fails to include a forecast or prediction which failure is misleading, the cautionary statements included in the document may render the challenged predictive statements or opinions immaterial as a matter of law. Of course, a vague or blanket (boilerplate) disclaimer which merely warns the reader that the investment has risks will ordinarily be inadequate to prevent misinformation. To suffice, the cautionary statements must be substantive and tailored to the specific future projections, estimates or opinions in the prospectus which the plaintiffs challenge. 44 Because of the abundant and meaningful cautionary language contained in the prospectus, we hold that the plaintiffs have failed to state an actionable claim regarding the statement that the Partnership believed it could repay the bonds. We can say that the prospectus here truly bespeaks caution because, not only does the prospectus generally convey the riskiness of the investment, but its warnings and cautionary language directly address the substance of the statement the plaintiffs challenge. That is to say, the cautionary statements were tailored precisely to address the uncertainty concerning the Partnership's prospective ability to repay the bondholders. 45 Moreover, contrary to the submission of the plaintiffs, the Supreme Court's reasoning in Virginia Bankshares, Inc. v. Sandberg, --- U.S. ----, 111 S.Ct. 2749, 115 L.Ed.2d 929 (1991) supports rather than undermines the application of the bespeaks caution doctrine in this case. In Virginia Bankshares, the Court considered the actionability of statements of reasons, opinions or beliefs in the proxy-solicitation context under § 14(a) of the 1934 Act, 15 U.S.C. § 78n(a).14 The Court rejected the defendants' argument that a statement by corporate directors, made in the midst of an effort to effectuate a "freeze-out" merger, that in their opinion $42 a share was a fair price which would offer "high" value to the minority stockholders, was inactionable under the securities laws. Consistent with our decisions pre-dating Virginia Bankshares, see, e.g., Eisenberg v. Gagnon, 766 F.2d at 776, the Court held that statements of opinion or belief may be actionable when they expressly or impliedly assert something false or misleading about their subject matter. The Court further held that the specific statement at issue in the case was a proper basis for liability under § 14(a) because the minority shareholders reasonably understood it to rest on a factual basis. See --- U.S. at ----, 111 S.Ct. at 2758-60. 46 In addition, the Court in Virginia Bankshares reached two conclusions directly relevant to the case at bar. First, the Court held that a speaker's subjective disbelief or motivation, standing alone, would be inadequate to state a claim under § 14(a).15 Second, and more importantly, by recognizing that an accompanying statement may neutralize the effect of a misleading statement, the Court impliedly accepted the logic of the bespeaks caution doctrine. Id. at ----, 111 S.Ct. at 2760. The Court explained: 47 While a misleading statement will not always lose its deceptive edge simply by joinder with others that are true, the true statements may discredit the other one so obviously that the risk of real deception drops to nil. Since liability under § 14(a) must rest not only on deceptiveness but materiality as well[,] ... publishing accurate facts in a proxy statement can render a misleading statement too unimportant to ground liability. 48 Id. 49 The Court then refined this general principle to take on the same contours as what we have denoted as the bespeaks caution doctrine. In particular, the Court acknowledged that "not every mixture with the true will neutralize the deceptive. If it would take a financial analyst to spot the tension between the one and the other, whatever is misleading will remain materially so, and liability should follow." Id. at ----, 111 S.Ct. at 2760. In fact, this notion really comports with the general principle, because it merely underscores that when the subject of a misrepresentation or omission is such that the accompanying language does not diminish the importance of the misrepresentation or omission to the investor, the misrepresentation or omission remains actionable. In a word, a misrepresentation or omission is actionable when materially misleading. 50 This reading of Virginia Bankshares just restates what what we explained above, namely, that materiality involves a context-specific analysis such that warnings and cautionary language will sometimes suffice to render the allegedly misleading misrepresentations or omissions immaterial as a matter of law. We understand Virginia Bankshares to indicate that if the nature of the subject matter or the manner of presentation of an alleged misrepresentation or omission or its accompanying statements is such that for a reasonable investor the accompanying statements do not offset the misleading effect of the misrepresentation or omission, then bespeaks caution is unavailable as a defense. Therefore, contrary to the plaintiffs' assertion, we believe that our analysis comports with the Supreme Court's reasoning in Virginia Bankshares.16 D. Conclusion 51 Returning to the instant case, we think it clear that the accompanying warnings and cautionary language served to negate any potentially misleading effect that the prospectus' statement about the Partnership's belief in its ability to repay the bonds would have on a reasonable investor. The prospectus clearly and precisely cautioned that the bonds represented an exceptionally risky, perhaps even speculative, venture and that the Partnership's ability to repay the bonds was uncertain. Given this context, we believe that no reasonable jury could conclude that the subject projection materially influenced a reasonable investor.17V. The Allegations Concerning Material Omissions 52 The complaint also includes allegations that the prospectus omitted material facts. More specifically, the plaintiffs contend that the prospectus was materially misleading due to its failure to disclose certain facts which, for purposes of this appeal, we assume are all true: 1) the precarious nature of Trump's personal finances; 2) the fact that the Taj Mahal would require an average daily casino win of $1.3 million in order to repay the bonds in full; 3) the thinly-capitalized nature of the Taj Mahal; 4) the expense necessary to attract customers from other casinos to the Taj Mahal and the improbability that the Taj Mahal would be successful in such an effort; and 5) the likely effect of the already weakened economy on the future success of the Taj Mahal. Analyzing each in turn, we reject the plaintiffs' contention that these allegations state actionable securities fraud claims. A. Trump's Personal Finances 53 We can readily dispose of the plaintiffs' allegation that the prospectus made a material omission in its failure to disclose that Trump's financial condition was "precarious" because he had made or was planning to make various financial guarantees on projects unrelated to the Taj Mahal. Complaint at p 34.18 The prospectus made clear that Trump was only obligated to contribute $75 million of his own funds toward the completion of the Taj Mahal and that he had promised to lend the venture up to $25 million under specified circumstances. It did not even suggest that Trump would contribute more of his personal wealth to the venture in order to repay the bondholders or otherwise to ensure the Taj Mahal's successful completion and operation. Given the explicit limitations on Trump's financial obligations toward the Taj Mahal as well as the fact that he, in fact, contributed the amounts he had promised, we fail to see the materiality of his actions or intentions with respect to the balance of his personal assets.19 B. Average Daily Casino Win 54 We also reject the plaintiffs' argument that they state an actionable claim through their allegation that the prospectus failed to disclose that, for the Partnership to repay all of its debts, the Taj Mahal would require a $1.3 million average daily casino win. See Complaint at p 33(a)-(b). As we discussed above, the prospectus went to great lengths to alert investors to many of the specific risks involved in the successful completion and operation of the Taj Mahal. It clearly conveyed the projected magnitude and enormity of the casino/hotel--the size of which was unprecedented in Atlantic City--and acknowledged that consequently the Taj Mahal's projected cash flow and profitability were highly uncertain. In addition, the prospectus directly related this uncertainty to the indefiniteness of the Partnership's ability to repay the bonds. With great detail, it also explained the intense competition the Taj Mahal would face in Atlantic City. The prospectus even predicted that, due to the projected increase in casino floor space, the average casino win per square foot would decrease in Atlantic City. 55 A reasonable investor, having read these cautionary explanations, would understand that the Taj Mahal carried substantial risks. He or she would further comprehend that, because of its size, the Taj Mahal would need to generate a particularly high daily casino win. In other words, an explicit statement in the prospectus that the Taj Mahal demanded an average daily casino win of $1.3 million to meet its debtload would have been superfluous. We therefore hold as a matter of law that this omission was immaterial and cannot form the basis for a claim under the federal securities laws. C. Debt/Equity Ratio 56 The plaintiffs furthermore allege that the prospectus failed to disclose that the construction and operation of the Taj Mahal "involved an excessive, unwarranted, and unprecedented debt component relative to total capitalization. Out of the $805 million total projected ... costs, no more than $75 million (or only nine percent) represented capital contributions." Complaint at p 36. 57 The plaintiffs cannot successfully contend that the prospectus failed to disclose the specifics of the debt-equity ratio. The prospectus set forth the details of the venture's projected debt component with great clarity. It advised that the Partnership estimated a cost of approximately $805 million to fund the acquisition, completion and operation of the Taj Mahal and to repay the interest on the bonds for fifteen months. It then specifically delineated the several sources for this amount and the magnitude of each source.20 Thus the prospectus adequately apprised the bondholders that capital contributions (rather than debt obligations) would supply only about nine percent of the Taj Mahal's funds. 58 In addition, the plaintiffs cannot successfully contend that the prospectus is actionable because it failed to describe its debt-equity ratio as either "unwarranted" or "excessive." See Goldberg v. Meridor, 567 F.2d 209, 218 n. 8 (2d Cir.1977) ("We do not mean to suggest that § 10(b) or Rule 10b-5 requires insiders to characterize conflict of interest transactions with pejorative nouns or adjectives."), cert. denied, 434 U.S. 1069, 98 S.Ct. 1249, 55 L.Ed.2d 771 (1978). The prospectus disclosed the relevant fact that capital contributions would provide only $75 million of the $805 million budget. And even assuming the Partnership had superior access to such information, the prospectus' failure to compare the Taj Mahal's debt-equity ratio with that of other casinos does not, by itself, create an actionable claim. 59 The federal securities laws do not ordain that the issuer of a security compare itself in myriad ways to its competitors, whether favorably or unfavorably, for at least three reasons. First, such a requirement would impose an onerous if not insurmountable obstacle on issuers of securities to ensure they obtain accurate information on all aspects of their competitors which a reasonable investor might find material. Second, were we to announce such a requirement, the likely result would be to inundate the investor with what the Supreme Court disparaged as "an avalanche of trivial information." TSC, 426 U.S. at 448, 96 S.Ct. at 2132. Third--and of greatest consequence--it is precisely and uniquely the function of the prudent investor, not the issuer of securities, to make such comparisons among investments. See In re Donald J. Trump Sec. Litig., 793 F.Supp. at 559. 60 Similarly, to the extent that the plaintiffs simply challenge the Partnership's decision to obtain only $75 million in capital contributions in comparison to the approximately $700 million in debt obligations, they plainly do not state a claim under the securities laws. It is well-established that the securities laws do not create liability for breaches of fiduciary duty or mismanagement. See Santa Fe Indus. v. Green, 430 U.S. 462, 477, 97 S.Ct. 1292, 1303, 51 L.Ed.2d 480 (1977). We have held that "[w]here the incremental value of disclosure is solely to place potential investors on notice that management is culpable of a breach of faith or incompetence, the failure to disclose does not violate the securities acts." Craftmatic, 890 F.2d at 640. Accordingly, we hold that the plaintiffs' challenges with respect to the Taj Mahal's debt-equity ratio fail as a matter of law to state a claim under the federal securities laws. D. Attracting Customers from Other Casinos 61 The plaintiffs also allege that the prospectus failed to disclose that the Taj Mahal would be unlikely to draw away enough customers from other casinos to generate sufficient income for the Partnership to repay its debts. Because the prospectus did in fact warn of the high level of competition for patrons that the Taj Mahal would face, we uphold the district court's decision to dismiss these claims.21 62 The prospectus explicitly stressed the severity of competition the Taj Mahal would face. It twice stated that "[c]ompetition in the Atlantic City casino/hotel market is intense." In addition, the prospectus specified with particularity the number of casinos in Atlantic City which would compete with the Taj Mahal, and their operators' ongoing and projected efforts to expand their capacity and/or renovate their facilities. The prospectus disclosed that the "Atlantic City casino industry is currently experiencing a significant increase in capacity." It warned that "[t]he Partnership believes that, based upon historical trends, casino win per square foot of casino space will decline in 1990 as a result of a projected increase in casino floor space, including the opening of the Taj Mahal." 63 The prospectus, moreover, stated flatly: "Growth in Atlantic City casino win is expected to be restrained.... No assurance can be given with respect to either the future growth of the Atlantic City gaming market or the ability of the Taj Mahal to attract a representative share of that market." Furthermore, the prospectus underscored that the Taj Mahal would compete with other Trump-owned casinos in Atlantic City and with other forms of legalized gambling in the vicinity as well as casino and other gambling in other regions (e.g., Las Vegas). In short, the prospectus extensively and graphically disclosed the magnitude of the competition that the Taj Mahal would face. 64 The prospectus so bespoke caution with respect to the Taj Mahal's prospective competitive obstacles that we deem the challenged omission immaterial as a matter of law. Because the prospectus took substantial pains to convey to the bondholders the considerable competition that the Taj Mahal would face in the Atlantic City casino industry, we fail to see how the inclusion of the prediction that the Taj Mahal would have difficulty in surmounting this obstacle successfully would have materially altered the substance of the information provided by the prospectus. Cf. Craftmatic, 890 F.2d at 641-44 (dismissing complaint's allegations of material omissions of predictive statements about the likely success of the defendant's effort to enter new lines of business). We therefore conclude that the prospectus adequately cautioned potential investors that the Taj Mahal would face intense competition. These warnings undermine any claim that the prospectus made material omissions on this issue. E. Economic Conditions 65 Finally we turn to the plaintiffs' allegation that the prospectus "omitted to disclose the likely effect of the already weakened economy in the Northeast and the potential for competition from casinos located in Las Vegas, Nevada." Complaint at p 39. This allegation also fails to state an actionable claim. As mentioned above, see supra page 376, the prospectus did in fact divulge that the Taj Mahal would face competition from Las Vegas casinos. In addition, we hold that the defendants did not violate the securities fraud laws merely by failing to alert investors to the obvious implications of the already weakened economic conditions in the Northeast. As the reasonable investor should have known of the economic downturn in the Northeast at that time, the inclusion of this information would not have substantively altered the total mix of information the prospectus provided to investors. The federal securities laws, in a word, do not compel the Partnership to state the obvious. VI. Conclusion 66 For the foregoing reasons we will affirm the orders of the district court dismissing the plaintiffs' complaints under Rule 12(b)(6). In view of our disposition of the plaintiffs' federal causes of action, we will also affirm the district court's dismissal without prejudice of the plaintiffs' state law claims for lack of pendent jurisdiction. * The Honorable C. Clyde Atkins, United States District Judge for the Southern District of Florida, sitting by designation 1 The Partnership was composed of Trump and Trump Taj Mahal Inc. as the general partners and Trump as the sole limited partner. Taj Mahal Funding Inc., which actually issued the bonds, immediately loaned the proceeds to the Partnership 2 Section 11(a) provides in pertinent part: In case any part of the registration statement, when such part became effective, contained an untrue statement of a material fact or omitted to state a material fact required to be stated therein or necessary to make the statements therein not misleading, any person acquiring such security ... may ... sue-- (1) every person who signed the registration statement; (2) every person who was a director of ... or partner in the issuer at the time of the filing of the part of the registration statement with respect to which his liability is asserted: (5) every underwriter with respect to such security. 15 U.S.C. § 77k(a). 3 Section 12(2) establishes the liability of any seller or offeror of a security who: by means of a prospectus or oral communication ... includes an untrue statement of a material fact or omits to state a material fact necessary in order to make the statements, in the light of the circumstances under which they were made, not misleading (the purchaser not knowing of such untruth or omission), and who shall not sustain the burden of proof that he did not know, and in the exercise of reasonable care could not have known, of such untruth or omission.... 15 U.S.C. § 77l(2). 4 Section 10(b) provides in pertinent part: It shall be unlawful for any person, directly or indirectly ... (b) [t]o use or employ, in connection with the purchase or sale of any security ..., any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the Commission may prescribe as necessary or appropriate in the public interest or for the protection of investors. 15 U.S.C. § 78j(b). 5 Section 15 of the Securities Act of 1933 and § 20(a) of the Securities Exchange Act of 1934 establish liability for those "controlling persons" who violate the substantive provisions of the respective acts. See 15 U.S.C. §§ 77o, 78t(a) 6 Rule 10b-5 provides: It shall be unlawful for any person, directly or indirectly, by the use of any means or instrumentality ... (a) To employ any device, scheme, or artifice to defraud, (b) To make any untrue statement of a material fact or to omit to state a material fact necessary in order to make the statements made, in the light of the circumstances under which they were made, not misleading, or (c) To engage in any act, practice, or course of business which operates or would operate as a fraud or deceit upon any person, in connection with the purchase or sale of any security. 17 C.F.R. § 240.10b-5 7 As we noted above, the district court denied the plaintiffs' motion to amend their complaint to add allegations that the prospectus did not disclose the existence of the Laventhol Report and the substance of its conclusions. The plaintiffs have been equivocal, however, as to whether they challenge the district court's denial of their motion to amend here. They did not raise the denial of their motion to amend in their statement of the issues. Moreover, they expressly stated in their opening brief that they did not wish to challenge this portion of the district court's order: "Plaintiffs asked the [district court] to consider the Laventhol Report.... The district court declined to do so ... and plaintiffs do not challenge that decision here.... Plaintiffs do not now ask this Court to consider the prescience of the Laventhol Report or to consider the omission of any mention of this report from the Prospectus." Brief for Appellants at 10-11 n. 8 (emphasis added). Nevertheless, in their reply brief and at oral argument plaintiffs advanced arguments premised on the Laventhol Report. It is well-established that, "[a]s a general matter, the courts of appeals will not consider arguments raised on appeal for the first time in a reply brief." Hoxworth v. Blinder, Robinson & Co., 903 F.2d 186, 205 n. 29 (3d Cir.1990); accord International Raw Materials, Ltd. v. Stauffer Chem. Co., 978 F.2d 1318, 1327 n. 11 (3d Cir.1992), cert. denied, --- U.S. ----, 113 S.Ct. 1588, 123 L.Ed.2d 154 (1993). Under these circumstances, then, we will not reach the merits of this issue 8 The transfer of the complaints filed in the Southern and Eastern Districts of New York to the District of New Jersey presents a potential choice of law issue in terms of whether Second or Third Circuit precedent controls. The district court followed the approach the D.C. Circuit adopted in the leading case on choice of law in multidistrict transfers, see In re Korean Air Lines Disaster, 829 F.2d at 1176. Consequently, the district court held that while only this court's precedent would control, the Second Circuit's precedent would merit close consideration. See In re Donald J. Trump Sec. Litig., 793 F.Supp. at 548. Because neither party has challenged the district court's holding on this point, we assume without deciding that it was correct 9 Although the plaintiffs did not attach the prospectus to their complaint, the defendants appended it to their motion to dismiss. We recently held that "a court may consider an undisputedly authentic document that a defendant attaches as an exhibit to a motion to dismiss if the plaintiff's claims are based on the document." Pension Benefit Guar. Corp. v. White Consol. Indus., 998 F.2d 1192, 1196 (3d Cir.1993). Because the complaint directly challenged the prospectus, the district court properly considered the prospectus in deciding whether to grant the Rule 12(b)(6) motion 10 There are substantial differences between the elements a plaintiff must establish under § 10 and Rule 10b-5 of the Securities Exchange Act of 1934 and under §§ 11 and 12(2) of the Securities Act of 1933. See Herman & MacLean v. Huddleston, 459 U.S. 375, 380-86, 103 S.Ct. 683, 686-89, 74 L.Ed.2d 548 (1983). Under the former, the plaintiffs must plead not only that the defendants made material omissions and/or misrepresentations, but also that they reasonably relied on them and that the defendants acted with knowledge or recklessness. See id. at 382, 103 S.Ct. at 687; Shapiro, 964 F.2d at 280. In contrast, §§ 11 and 12(2) impose no such requirements. See Herman & MacLean, 459 U.S. at 383-84, 103 S.Ct. at 688; Shapiro, 964 F.2d at 286. Because our analysis here is predicated on the materiality requirement, which is common to all the causes of action the plaintiffs allege, we do not here distinguish between the various securities law provisions that the plaintiffs invoke 11 "The term soft information refers to statements of subjective analysis or extrapolation, such as opinions, motives, and intentions, or forward looking statements, such as projections, estimates, and forecasts." Craftmatic Sec. Litig. v. Kraftsow, 890 F.2d 628, 642 (3d Cir.1989). See generally Victor Brudney, A Note on Materiality and Soft Information Under the Federal Securities Laws, 75 Va.L.Rev. 723 (1989) 12 In TSC the Court also indicated that setting the threshold for materiality too low would not serve the remedial purposes of the securities laws: Some information is of such dubious significance that insistence on its disclosure may accomplish more harm than good.... [I]f the standard of materiality is unnecessarily low, not only may the corporation and its management be subjected to liability for insignificant omissions or misstatements, but [it] also ... may cause [management] to bury the shareholders in an avalanche of trivial information--a result that is hardly conducive to informed decisionmaking. 426 U.S. at 448-49, 96 S.Ct. at 2132. 13 Although materiality is a mixed question of law and fact which the trier of fact ordinarily decides, see TSC, 426 U.S. at 450, 96 S.Ct. at 2132-33; Shapiro, 964 F.2d at 280 n. 11, "if the alleged misrepresentations or omissions are so obviously unimportant to an investor that reasonable minds cannot differ on the question of materiality [it is] appropriate for the district court to rule that the allegations are inactionable as a matter of law." Shapiro, 964 F.2d at 280 & n. 11; accord TSC, 426 U.S. at 450, 96 S.Ct. at 2133; Craftmatic, 890 F.2d at 641 14 Although the Court in Virginia Bankshares addressed § 14(a) of the 1934 Act, which concerns proxy statements, it is instructive here in addressing the plaintiffs' claims brought under §§ 11 and 12(2) of the 1933 Act, §§ 10 and 20 of the 1934 Act and Rule 10b-5 promulgated thereunder, which involve corporate communications in the sale of securities. Cf. Basic Inc. v. Levinson, 485 U.S. 224, 232, 108 S.Ct. 978, 983, 99 L.Ed.2d 194 (1988) (adopting the materiality standard under § 14 for § 10 and Rule 10b-5) 15 The Court stated: "We think that proof of mere disbelief or belief undisclosed should not suffice for liability under § 14(a), and if nothing more had been required or proven in this case we would reverse [the judgment in favor of the plaintiff] for that reason." Virginia Bankshares, --- U.S. at ----, 111 S.Ct. at 2760 16 In Mayer v. Mylod, 988 F.2d 635 (6th Cir.1993) the Sixth Circuit clarified and narrowed its decision in Sinay v. Lamson & Sessions Co., 948 F.2d 1037 (6th Cir.1991), which appeared to apply the bespeaks caution doctrine liberally, to eliminate any potential conflict with Virginia Bankshares. Contrary to the plaintiffs' argument, the interpretation of Virginia Bankshares in Mayer is consistent with ours In Sinay, the Sixth Circuit had held, apparently without reservation, that "[e]conomic projections are not actionable if they bespeak caution." 948 F.2d at 1040. In considering this broad statement in Mayer, the Sixth Circuit acknowledged its potential tension with the Supreme Court's recognition in Virginia Bankshares that, although the effect of some misrepresentations will be negated by the inclusion of other statements, "not every mixture with the true will neutralize the deceptive." Virginia Bankshares, --- U.S. at ----, 111 S.Ct. at 2760 (emphasis added), quoted in Mayer, 988 F.2d at 639. The Mayer court thus properly recognized that in light of Virginia Bankshares its earlier statement, which one could have read to indicate that economic projections coupled with warnings and cautionary statements are per se non-actionable, was overbroad. Because we do not establish a sweeping rule that cautionary statements will always render misrepresentations or omissions immaterial as a matter of law, we believe that the Mayer court's understanding of Virginia Bankshares is harmonious with our approach here. 17 The plaintiffs have also alleged that the prospectus was materially misleading in its estimation that as of its opening date the Taj Mahal would be worth approximately $1.1 billion. An independent appraisal conducted by the Appraisal Group International ("AGI") had arrived at that estimate. The plaintiffs submit that this estimate lacked an adequate basis in fact because AGI based it on " 'the capitalization of income approach,' even though at the time of the Prospectus it was impossible to make any reasonable estimate of the Taj Mahal's future income." Complaint at p 37 We conclude that, given the text of the prospectus, the plaintiffs have failed to state a claim under the securities laws through this allegation. As we discussed more fully above, see supra Part IV.B, the prospectus explicitly disclosed that the Taj Mahal, as a new enterprise, lacked any operating history, including any history of earnings. Moreover, the prospectus clearly and precisely set forth the speculative nature of this estimate and the consequent uncertainty that the Taj Mahal would actually be worth $1.1 billion by its opening date. This cautionary discussion, in combination with the more general warnings which alerted investors to the variety of highly uncertain circumstances the Taj Mahal confronted, rendered the estimate of the Taj Mahal's worth on its opening date immaterial. We further note that the plaintiffs' allegation concerning the appraisal report fails to satisfy the particularity requirements of Rule 9(b), which at least applies to the plaintiffs' claims brought under § 10 and Rule 10b-5. See Shapiro v. UJB Fin. Corp., 964 F.2d at 288 (leaving open the question whether Rule 9(b) always applies to claims brought under §§ 11 and 12(2) even when they sound in negligence rather than fraud). The complaint fails to allege (i) what established appraisal method the AGI Report should have used, (ii) how the capitalization of income approach departed from that method, and (iii) that the defendants recognized or should have recognized the unreasonableness of the capitalization of income approach as an estimate of the future value of the Taj Mahal. See Christidis v. First Pa. Mortgage Trust, 717 F.2d 96, 100 (3d Cir.1983) (holding that a complaint with similar deficiencies failed to comply with Rule 9(b)). 18 The plaintiffs also alleged that Trump himself made misleading statements and failed to make material disclosures when he, in speaking with the press, denied that he was having financial troubles and boasted about his financial strength and the liquidity of his assets. See Complaint at p 41. Our analysis with respect to the similar alleged omissions in the prospectus equally applies to the allegations concerning these statements 19 The prospectus stated that Trump "has advised the Partnership ... that he has sufficient financial resources to perform his obligations.... He has further advised ... that his net worth, determined in accordance with generally accepted accounting principles ..., is at least $500,000,000." If this account accurately portrayed Trump's personal finances, then even after subtracting the amounts of the financial guarantees that the plaintiffs allege Trump made, he would still have retained adequate resources to contribute the $75 million as well as to advance the $25 million loan to the Taj Mahal. The consolidated complaint, however, counters that this $500,000,000 estimate is an exaggerated representation of Trump's personal fortune because it was "based upon artificially inflated appraisals ... [and was] not prepared in accordance with generally accepted accounting principles." Complaint at p 34. We cannot, however, assume this allegation to be true--as is the normal practice under Rule 12(b)(6)--because it is insufficiently specific to satisfy Rule 9(b), which, as we have explained above, see supra note 17, applies at least to the claims brought under § 10 and Rule 10b-5. The complaint wholly fails to allege the established accounting practices that the defendants supposedly departed from and the manner in which they supposedly did so. As we mentioned in our discussion of the allegations concerning the AGI Report, see supra note 17, under Christidis these defects in a complaint render the fraud allegations insufficiently exact to meet the requirements of Rule 9(b). See Christidis, 717 F.2d at 100 20 The prospectus specified how the Partnership planned to finance the $805 million: $675 million from the sale of the bonds; $75 million from Trump's capital contribution; and $55 million from other sources, including earnings from the investment of the yet unused portion of the bond proceeds and the $25 million Trump was obliged to lend the venture under certain circumstances 21 With respect to the same topic, the plaintiffs additionally submit that the prospectus did not disclose that the Taj Mahal would have to expend substantial resources to lure patrons to the Taj Mahal and away from competitors, which expenditures would detract from the profits the Taj Mahal could reap from the new customers. This allegation is without merit. The prospectus does in fact describe the marketing strategy which the Partnership planned to utilize to attract customers to the casino. For example, the prospectus reported that the Partnership would promote the Taj Mahal through the use of advertising, complimentary services and promotional programs. In conjunction with the statements concerning the intensity of inter-casino competition, see supra at 370-71; infra at 376-77, these disclosures sufficed to inform a reasonable investor that the Taj Mahal would need to spend substantial sums in its efforts to attract patrons from its competitors The plaintiffs also invoke the following statement from the prospectus: The Partnership believes that the opening of the Taj Mahal [in] the proximity of the Showboat and Resorts Casino Hotel will attract an increased volume of patrons to the vicinity of the Taj Mahal. Complaint at p 38 (citing Prospectus at 34). It is unclear whether the plaintiffs found an allegation on this statement. In case they wished to allege that this statement is affirmatively and materially misleading because it fails to adjust the increased casino win for increased advertising and promotional expenditures, we note that the prospectus only states that the Taj Mahal's close proximity to other casinos will result in a larger number of customers in the vicinity of the Taj Mahal, not that it will result in greater profits for the Taj Mahal itself. Hence it does not advance the plaintiffs' position. | Low | [
0.5041493775933611,
30.375,
29.875
] |
Multiple adult xanthogranuloma: case report and literature review. Non-Langerhans cell histiocytoses form a heterogeneous group defined by the proliferation of cells with macrophage characteristics. Diagnosis is easy in typical cases but becomes more complex in unusual forms. We report the case of a 53-year-old patient who presented multiple brown-to-yellowish papules and nodules of the trunk, neck, and head evolving for 6 months. No visceral involvement was found. Histopathological examination revealed histiocytic proliferation with features of secondary xanthomization with the presence of giant foamy multinucleated Touton cells. One year later, all lesions cleared spontaneously. Based on the clinical presentation and evolution and on the immunohistologic data, we retain the diagnosis of adult xanthogranuloma (AXG) in a diffuse shape. Multiple AXG is a rare entity (15 cases reported since 1963) with a stereotypic presentation. It is important to recognize because of its good prognosis and the absence of visceral involvement therefore requiring no investigations or aggressive treatments. This case is interesting because of the complete and spontaneous healing of all the lesions within 20 months. | High | [
0.670025188916876,
33.25,
16.375
] |
Saturday, May 7, 2016 The complete SLR Digital Photography course has everything you need to start shooting quality professional photos in a few hours. This course is suitable for all SLR camera models, Canon, Nikon, Sony ect..The course encompasses these subjects delivered over DVD.How to achieve those tack sharp photosThe fundamentals of a good shot, if you abide by these simple rules you will always have great shots.How to reduce Camera Shake, (one of the biggest problems in photographyHow to shoot in RawHow to hold your camera properly to shoot handheld in low light situations.How to compose your picture properly using the rule of thirdsHow to compose using leading linesISO and which settings are bestAperture how to use it properly to achieve professional results.How professionals use cropping to improve their photos.How to remove unwanted items from your photo.Correct use of timers and remote controls.Reflectors, how to use them to get that professional look in portraits.How the pros use exposure bracketing to always get the right exposureUsing exposure compensation to get the right exposure in tricky situations.Camera modes explained and how to use each one correctly.Metering modes explained and how you can use them to make sure you always the perfect shotHow to frame your picture properly, filling the frame and using natural framesHow professionals use burst/continuous mode to always get that perfectly times shot.Correct use of focus lock and its use in composition.Proper settings for compression and qualityCamera sensors explained and which ones are best for landscape or portraits.Noise and the best ways to reduce itNote : This is exclusive please complete survey for support this site before download | Mid | [
0.596244131455399,
31.75,
21.5
] |
Q: How to read a file using javax.lang.model? I see lot of references to javax.lang.model as being the api for parsing java files and it seems it'll suffice for what I want to do. But I can't find any examples of using the classes in it starting with opening a .java file. The only vague reference I have found are about writing a compiler plugin and invoking your code using javac. Is that the only way to use this api? Isn't it possible to simply open a file and get the instances of classes from javax.lang.model.element with your own main()? Would anyone be able to point me to working examples of this nature? A: The javax.lang.model, javax.lang.model.element, javax.lang.model.element.type, and javax.model.element.util packages are intended for use in annotation processors (javax.annotation.processing.Processor), which are the compiler plug-ins that you mentioned. There is a compiler API that you can use to compile and analyze classes at run-time. You can use javax.tools.ToolProvider.getSystemJavaCompiler() which returns a javax.tools.JavaCompiler class. It has an interface to compile .java files and to run annotation processors against them. For more information check out JavaCompiler#getTask | Low | [
0.47716894977168905,
26.125,
28.625
] |
The campus of Europa-Universität Flensburg What you will find on campus In this section you will find all information about the campus of Europa-Universität Flensburg. On the various sub-pages you can learn about our wide range of offers on campus, the presentation of the student self-administration, our partner on campus and cooperation partner University of Applied Sciences Flensburg and you can also gain a small insight into urban life in Flensburg. You are trying to find your way around campus? Take a look at our Campus Map - or familiarize yourself from the air with our green campus (video in German only): About our Campus Germany's most northern university, with 5,000 student,s offers a very personal atmosphere. At Europa-Universität Flensburg we place particular emphasis on providing support and we value personal exchange with students and staff alike. At our University people know each other. Students are not just numbers lost in the crowd, but have names and faces who you will meet again and again. The University also sets great store by its international orientation, currently the International Centre cooperates with 80 partner universities in 32 countries around the globe. Right in the middle Studying and research take place in the Auditorium, the main building (HG), the extension building (EB) and in the branch office, Munketoft. All lecture halls and seminar rooms are barrier-free and equipped with multimedia devices. In addition, WiFi is available throughout the campus and students are granted access to it when they first register at the university. Teaching material and work stations can be found in the Central Library. On the go on Campus Europa-Universität Flensburg and the University of Applied Sciences are direct neighbors and share the same cafeteria, library, sports centre and campus. The campus is one of the greenest in Germany. Between lectures, students can relax on the spacious lawns and sunbathe or walk around the small lakes. Students can seek refuge from the sometimes uncomfortable north German weather in the cafeteria, which is operated by the Studentenwerk Schleswig-Holstein or in the Campus Suite Café, where a great variety of coffees, baguettes, muffins and other snacks can be purchased. Also located on campus are a daycare center, a swimming pool and several residence halls for students. Students who do not live on campus can get to the campus by taking buses number 4 or 5. There are also parking spaces for bicycles and cars. Furthermore... The old brick building at Munketoft is the branch office of Europa-Universität Flensburg. It is located in the heart of Flensburg, opposite the famous Flensburg Brewery, Flensburger Brauerei. The International Institute for Management and Economic Education is based in this building. Here future managers can find not only their tutors, but also a small cafeteria operated by the Studentenwerk Schleswig-Holstein, a computer room, conference room and seminar rooms, plus many workstations. | High | [
0.695431472081218,
34.25,
15
] |
Another veteran of the global investor community is taking a backseat from work due to illness. Michael Moritz, a veteran of early stage tech investment group Sequoia, who has been one of the early spotters of success stories like Google, LinkedIn, PayPal and Yahoo, is taking few steps back from work due to what he termed as a ‘rare medical condition which can be managed but is incurable’. He did not clearly say what the illness is but in a letter to LPs of the venture capital firm reproduced by Bloomberg Businessweek, he wrote, “I’ve been told that in the next five to ten years the quality of my life is quite likely to decline. Right now I feel fitter than ever and I hope that I’ll be one of the lucky ones who can live a full life and defy the statisticians. But there is no way of predicting this with certainty and thus for me life has assumed a different meaning and I am making some adjustments.” This follows another veteran US investor Warren Buffett disclosing he has prostate cancer last month. According to Bloomberg Businessweek, Sequoia has said Moritz is giving up some of his management responsibilities, including regulatory compliance and recruitments. He will remain involved in making new investments from current and future funds, besides mentoring startups. In the letter, Moritz said he will step back from the daily management of Sequoia Capital, a role he has been associated with for the past sixteen years. Moritz will become chairman of Sequoia Capital and will work closely with some of the VC firm’s younger and newer members. He will continue in his role as managing member of the existing funds. Moritz said he will take 3-4 months of every year ‘for various pursuits, diversions and trivial indulgences’. Since mid-90s Moritz has become one of the key names in Silicon Valley investment circle. A former journalist with Time he also wrote a book The Little Kingdom: the Private Story of Apple Computer besides co-authoring a book related to automaker Chrysler. | Mid | [
0.625,
37.5,
22.5
] |
Article Preview Our View Published 01/27/2011, Pine Journal Incredibly, a bill that would partially repeal Minnesota’s smoking ban was introduced in the Minnesota House of Representatives this week. It was only three and a half short years ago that the state enacted its Freedom to Breathe Act that banned smoking in all public places and workplaces in the state. A few short months before that, Carlton County was forward thinking enough to have passed a similar ban all on its own. And even before that, the city of Moose Lake took it upon itself to make smoking illegal inside the city limits. Word count: 432 Log In The full article is available to newspaper subscribers. If you are a subscriber please log in to continue reading. E-mail: Password: Are you a newspaper subscriber but you don't have a Digital Access account yet? Click here to set one up. You will need your subscription account number and phone number. | Low | [
0.5237191650853891,
34.5,
31.375
] |
CLINTON TOWNSHIP — It was only a matter of time after the video showing Artie Lange pumping gas before someone would find out where he was doing it. A man who says he had his friend who works at the CIA track him down to Hunterdon County, gave Lange a $20 tip with a note on it saying "Not valid for drugs." Lange was grateful and talkative. "I'm doing good, I appreciate it," he said. You can see the uncensored video here. Artie was also asked about Howard Stern, who has come out with a new autobiographical book. "Listen, I love Howard. Howard gave me the greatest job of my life. He tried to help me," he said. "A million times Howard said to me, 'Go to rehab, take as long as you want and you got a job.' What else can you expect? And I s**t all over that because I was a drug addict. But Howard did me right; I love him." Lange, who explained he's pumping gas as part of his program at a halfway house in Glen Gardner, is losing weight. "Without cocaine, I'm losing weight. I've got 111 days clean and sober." He said he will be returning to the stage "in a few weeks." But for now, as it appears on the video, Artie will be appearing at the Exxon on Route 31 in Clinton Township through May 26. | Mid | [
0.5668016194331981,
35,
26.75
] |
Q: problem with removing dynamically added elements from table I'm trying to add and remove some rows from a table using Jquery. But I dont know how to remove the newly added rows. If I have a remove link it will work, but thats not what I want. I want to be able to call a js function that shall remove all items. I have tried iterate over the items, but the count for the tr's in the table are always 0. <script src="scripts/jquery-1.3.2.min.js"></script> <script language=javascript> function UpdateData() { var dataStructure = new Object(); dataStructure.Start = "Added Start"; $("#table tbody tr:first").remove(); InsertDataInToTable(dataStructure); } function InsertDataInToTable(dataStructure) { var newRow = $("#table thead tr:first").clone(); newRow.find("td").eq(0).text(dataStructure.Start); newRow.insertAfter("#table tbody"); } Start Inital start A: I recommend trying to add the DOM elements manually and assign a class using addClass. Then you know which ones were added and which ones you want to remove. Then doing $(".className").remove(); might be cleaner. You could have them defaulted as a class 'standard' and using addClass('new') and remove the $('.new').remove(); Or you can just assign them all the .ClassName and remove all of that class name when you're ready. I don't recommend using the prior recommendation of adding a fake attribute in the DOM like "newLine" because it's not valid XHTML. If you use .addClass() you can easily manage things in a validated way. Hope this helps! | Mid | [
0.6039119804400971,
30.875,
20.25
] |
Hadith 2:26 Narrated Yahya bin Said: I asked 'Amra about taking a bath on Fridays. She replied, " Aisha said, 'The people used to work (for their livelihood) and whenever they went for the Jumua prayer, they used to go to the mosque in the same shape as they had been in work. So they were asked to take a bath on Friday.' " | Mid | [
0.5498839907192571,
29.625,
24.25
] |
Construction is restarting this week on the third and largest building in the 20 Midtown development in downtown Birmingham. Revamped plans call for 274 apartments, from studios to three-bedroom units, and at least 38,800 square feet of retail space on the ground floor, said developer Dick Schmalz. The third building compasses an entire block bordered by 20th Street South and Richard Arrington Jr. Boulevard and Third Avenue South and Second Avenue South. The 20 Midtown development also includes a 36-unit apartment building anchored by Starbucks, Chipotle Mexican Grill and AT&T. A second 75-unit apartment building is anchored by Publix Super Market. Schmalz of RGS Properties and Scott Bryant of Scott M. Bryant & Co. are developers of the project. Construction on the third building was slated to start last summer, but it was delayed due to a series of right-of-way vacations and a hiccup in extending sanitary sewer, Schmalz said. The developers also needed time to get their financing in place. Now, though, the first two buildings in 20Midtown are 100 percent leased, he said. And, the delay in the project allowed the developers to study the residential market downtown and make "some pretty dynamic changes" to the design and size of the apartment units, Schmalz said. He said 28 units were added to the third building, and more 400 square feet studios, with separate living and sleeping areas, and three-bedroom units with up to 1,700 square feet of space were added to the mix. Rents will be comparable the other apartments in 20 Midtown, Schmalz said. "The third building is going to have something to cater to the entire spectrum," he said. An amenity deck will be constructed on the fourth floor of the third building. It will feature a massive pool, a putting green, several gas grills, bocce ball, and a fitness center that's both indoors and outdoors. Due to the height of the ground level, retailers will have an opportunity to add a mezzanine level to their spaces, Schmalz said. He said they are working to finalize some leases on the retail space. He said pre-leasing on the third building will begin in four to five months. The construction is expected to take 16 to 18 months, but work will be staged to allow some retailers and apartments to open before the entire project is complete. | Mid | [
0.631578947368421,
34.5,
20.125
] |
.class public interface abstract Landroid/webkit/ValueCallback; .super Ljava/lang/Object; .source "ValueCallback.java" # annotations .annotation system Ldalvik/annotation/Signature; value = { "<T:", "Ljava/lang/Object;", ">", "Ljava/lang/Object;" } .end annotation # virtual methods .method public abstract onReceiveValue(Ljava/lang/Object;)V .annotation system Ldalvik/annotation/Signature; value = { "(TT;)V" } .end annotation .end method | Mid | [
0.612440191387559,
32,
20.25
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.