text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Antibodies to squalene in recipients of anthrax vaccine. We previously reported that antibodies to squalene, an experimental vaccine adjuvant, are present in persons with symptoms consistent with Gulf War Syndrome (GWS) (P. B. Asa et al., Exp. Mol. Pathol 68, 196-197, 2000). The United States Department of Defense initiated the Anthrax Vaccine Immunization Program (AVIP) in 1997 to immunize 2.4 million military personnel. Because adverse reactions in vaccinated personnel were similar to symptoms of GWS, we tested AVIP participants for anti-squalene antibodies (ASA). In a pilot study, 6 of 6 vaccine recipients with GWS-like symptoms were positive for ASA. In a larger blinded study, only 32% (8/25) of AVIP personnel compared to 15.7% (3/19) of controls were positive (P > 0.05). Further analysis revealed that ASA were associated with specific lots of vaccine. The incidence of ASA in personnel in the blinded study receiving these lots was 47% (8/17) compared to an incidence of 0% (0/8; P < 0.025) of the AVIP participants receiving other lots of vaccine. Analysis of additional personnel revealed that in all but one case (19/20; 95%), ASA were restricted to personnel immunized with lots of vaccine known to contain squalene. Except for one symptomatic individual, positive clinical findings in 17 ASA-negative personnel were restricted to 4 individuals receiving vaccine from lots containing squalene. ASA were not present prior to vaccination in preimmunization sera available from 4 AVIP personnel. Three of these individuals became ASA positive after vaccination. These results suggest that the production of ASA in GWS patients is linked to the presence of squalene in certain lots of anthrax vaccine.
High
[ 0.6858710562414261, 31.25, 14.3125 ]
Related Images Related Tags The Friedland Industries building in Lansing’s Old Town neighborhood bustles with activity. Steady streams of people unload scores of paper-filled boxes from their cars. Green-minded volunteers feed thousands of documents into a giant paper shredder. The shredded paper is bound into tightly packed, cube-shaped bales, to be reprocessed into recycled paper. Green helped organize Lansing’s second Document Destruction Day, and it proved to be a big hit. By the end of the four-hour April 19 event, more than 200 people had recycled roughly 14,000 pounds of paper. Events like Document Destruction Day, are helping to meet an ever increasing demand for recycling options in the Mid-Michigan region. “People are absolutely thrilled,” says Green, who works for Lansing’s Principal Shopping District organization. “Almost to a person, they’ve said ‘We’ve been waiting for an event like this.’” Putting Words Into Action Businesses, municipalities and green-minded citizens—like the appropriately named Kevin Green—are working to spread the recycling gospel across the region. This includes the City of Lansing, which recently started the Go Green! Go Lansing! initiative. To achieve that goal, Lansing will strive to make city facilities more energy efficient, foster environmental education in Lansing’s schools, encourage the use of public transportation and promote recycling. This includes proposals to install energy-efficient ventilation systems in city hall and the police headquarters, encouraging employees to turn lights off, and installing sensors that automatically turn lights off when rooms are empty. The city’s also replacing incandescent light-bulbs with compact fluorescent ones, and adding 'flex fuel' cars to its fleet. Businesses and individuals are also signing the Go Green! pledge, a commitment to be more energy efficient. “We crunched some numbers, and if someone commits to recycle more or ride the bus more, they can save up to one ton of CO2 emissions,” explains Heins. Such savings have a real impact, she says. “We create cleaner, healthier communities that are better for us to live in. It also makes Lansing more attractive to other businesses and residents who are looking to live in a green city.” Kevin Green is one of them. An avid recycler, Green has promoted recycling amongst his co-workers as well. “There are nine of us in our office and we recycle everything,” Green says of his PSD colleagues. “More and more businesses are beginning to look at recycling as a viable opportunity, not only to help the environment, but to save money. Also, they’re looking to partner with other businesses so they can recycle in bulk. People are really becoming more ecologically aware” The Recycling Wagon As the president of Friedland Industries, Larry Bass knows a thing or two about the benefits of recycling. A Lansing-based business for more than 100 years, Friedland has facilitated Lansing recycling since it was called “scrap processing” in the 1970s. The company processes several hundred million pounds of materials a year—everything from bank statements to large heaps of scrap metal. “You’re doing good things for the community, you’re doing good things for the economy,” Bass says. “It takes 76 percent less energy to make paper out of old paper than to cut down trees. Nothing has to be taken out of the earth if we reuse and retake what we have already.” The City of East Lansing also has an impressive recycling resume. In 1991, East Lansing recycled 871 tons of material. By 2007, the city had nearly doubled that amount, recycling 1,600 tons, or about 3.2 million pounds, of material. “We recycle a lot of things and we do it in a lot of different ways,” says David Smith, the environmental specialist for the City of East Lansing. “It’s not just our curbside drop-off program, but we have special collection events as well.” “Last year we reduced our greenhouse gas emissions by about 100 tons in East Lansing. We reduced our water waste by 7.5 tons,” Smith says. “We saved 14,000 trees just by recycling. That’s rewarding in and of itself.” Around 75 percent of East Lansing residents recycle weekly, and more than 80 percent recycle at least once a month, according to research and surveys done by the city and MSU students. “When you compare that with other communities, that's quite high," says Smith. The largest special collection event in East Lansing is the wildly successful Project Pride. Held on the Saturday after Memorial Day at the Abbott Center in East Lansing, Project Pride is a spring cleaning event where East Lansing residents can recycle everything from cardboard, newspapers, lawn mowers, washing machines and even automobiles. “We bring in a bunch of different organizations, like the Salvation Army, Friedman Industries which collects scrap metal, and Dart Container, which collects Styrofoam,” Smith says. “People come in and clean out their garages and basements and bring in everything they can. And hopefully, by the time they’re done going through the site, they’ve gotten rid of everything in their car and it’s all been reused and recycled,” says Smith. Several other recycling events will be held over the summer, including computer and electronic equipment recycling at the Lansing Recycling Transfer Station, and plastic planting container collections in Haslett. Such events reflect a growing trend towards regional cooperation in recycling efforts, a trend certain to continue. In 1991, East Lansing only recycled five different products. Today, it recycles 15 different products. The City of Lansing recently began accepting boxboard items, such as cereal and shoe boxes, and is looking to accept more items in the near future. “I’d like to see that continued cooperation around the region, and more recycling events,” says Smith, who would like “for people to recycle even more products than they are now. For our people to have an increased environmental conscience, and not just recycle the things that are convenient and easy, but to really think about what they’re doing on a daily basis.”
Mid
[ 0.6378830083565461, 28.625, 16.25 ]
Oh no, how's that for a great title to this post?!?! Okay, it’s funny and it is a line from 50 Cent, but lets hope that there weren’t any fat kids at the wedding, that would be kind of not so nice. The bride and groom found this on Etsy, and heck, if as I’ve said before a cake … [Read more...] Wow, I feel like I’m turning into one of those negative nellies, who just lashes out randomly at things I don’t like, having given my questionable thumbs down to cake toppers in the past, now I have to give them thumbs down to a driftwood cake topper? Well, okay, so here’s my … [Read more...] So I kind of gave a big thumbs down to cake toppers not too long ago, and I’m going to backtrack just a bit here and say that I quite like this idea of using succulents. However, I will qualify all of that by then noting, using succulents is not some whimsical effort to cheapen a … [Read more...] As we broaden our horizon’s past the usual and popular from other wedding sites and with the chill of winter in the air how about we move a bit south, here comes Ella’s Cakes from Naples Florida (not Italy). We fell in love with Daniella Palumbo’s designs from the minute we … [Read more...] The Artful Caker is out in Sydney Australia and we’re betting that most any of our readers are not planning on having their next wedding or big eventful get together in the Land Down Under, but Hilary Stone does have a very Aussie minded creative knack for making stunning cakes. … [Read more...] Wedding cake toppers, we all have them, or have had them, or maybe not. I for one am not big on the whole wedding cake topper thing unless it really makes some sort of a statement about the couple or tells some sort of a story, if its just there because you feel like you might … [Read more...] Happy Couples Tasty Drinks Yes it seems that the trend these days is to always do a twist on something that has already been done, ie. change up a classic. In some cases it’s a really good idea not to mess with a classic, in others its okay. I don’t mind mixing up a daiquiri, … [Read More...]
Low
[ 0.48192771084337305, 30, 32.25 ]
#!/usr/bin/env sh # This file is part of CMake-codecov. # # Copyright (c) # 2015-2017 RWTH Aachen University, Federal Republic of Germany # # See the LICENSE file in the package base directory for details # # Written by Alexander Haase, [email protected] # if [ -z "$LLVM_COV_BIN" ] then echo "LLVM_COV_BIN not set!" >& 2 exit 1 fi # Get LLVM version to find out. LLVM_VERSION=$($LLVM_COV_BIN -version | grep -i "LLVM version" \ | sed "s/^\([A-Za-z ]*\)\([0-9]\).\([0-9]\).*$/\2.\3/g") if [ "$1" = "-v" ] then echo "llvm-cov-wrapper $LLVM_VERSION" exit 0 fi if [ -n "$LLVM_VERSION" ] then MAJOR=$(echo $LLVM_VERSION | cut -d'.' -f1) MINOR=$(echo $LLVM_VERSION | cut -d'.' -f2) if [ $MAJOR -eq 3 ] && [ $MINOR -le 4 ] then if [ -f "$1" ] then filename=$(basename "$1") extension="${filename##*.}" case "$extension" in "gcno") exec $LLVM_COV_BIN --gcno="$1" ;; "gcda") exec $LLVM_COV_BIN --gcda="$1" ;; esac fi fi if [ $MAJOR -eq 3 ] && [ $MINOR -le 5 ] then exec $LLVM_COV_BIN $@ fi fi exec $LLVM_COV_BIN gcov $@
Low
[ 0.511677282377919, 30.125, 28.75 ]
If GOP frontrunner Donald Trump wins next week’s March 22 winner-take-all primary in Arizona, his chances of securing enough delegates to wrap up the Republican nomination for president on the first ballot at the party’s July convention in Cleveland, Ohio will improve significantly. But the results of the majority-take-all Utah caucus held on the same day could change that trajectory. As the delegate count stands today, Trump will need to win either 53 percent (using the latest Real Clear Politics delegate count) or 54 percent (using the latest New York Times delegate count) of the remaining delegates to win the nomination on the first ballot. If Trump were to win Arizona, hold Sen. Ted Cruz below 50 percent in Utah, and sweep the four remaining winner-take-all primaries (Delaware–16 delegates–on April 26, Nebraska–36 delegates–on May 10, and New Jersey–51 delegates–and Montana–27 delegates– on June 7), he would only need to take 43 percent of the remaining delegates, a standard slightly below the 45 percent of allocated delegates he currently has. The New York Times delegate count released on Wednesday, which does not yet include delegate allocations from Tuesday’s Missouri and Illinois primaries, shows Donald Trump with 621 of the 1,237 delegates needed to win a majority of the 2,472 first ballot votes to win the nomination at the convention. Under this count Trump would need to win about 54 percent of the 1,134 delegates still to be allocated to secure the nomination. The Real Clear Politics delegate count from Wednesday, which includes a partial allocation of delegates from Missouri and Illinois, shows Trump with 661 of the 1,235 delegates needed to win. Under this count Trump would need to win about 53 percent of the 1,095 delegates still to be allocated to secure the nomination. According to press reports, Dr. Ben Carson had eight delegates before withdrawing, and Jeb Bush had four delegates before he ended his campaign. Should Trump win Arizona and keep Cruz below the 50 percent mark in Utah, while passing the 15 percent threshold himself in that state, he would need to take 51 percent of the outstanding delegates to secure a first ballot nomination. But if Cruz wins more than 50 percent, that number increases to 53 percent for Trump. If Cruz wins Arizona, Trump’s “need to win” number jumps to 58 percent. The most recent Arizona poll, conducted on March 8 prior to Rubio’s withdrawal, showed Trump with a 14 point lead over Cruz in the state. While Arizona, where Trump also benefits from the endorsements of former Governor Jan Brewer and Sheriff Joe Arpaio, looks to be a likely Trump win, Utah is another matter entirely. The decision today to cancel the planned March 21 Fox News debate in Utah following Trump’s decision not to attend, and Kasich’s subsequent decision not to attend as well, adds a significant element of uncertainty to the outcome in Utah. Cruz won an upset victory over Trump in nearby Idaho, with help from the state’s 19 percent Mormon population and Trump’s failure to visit the state. It is currently unclear how much, if any, time Trump will spend in Utah prior to the March 22 caucus, but the Trump campaign tells Breitbart News an announcement of his scheduled events for the next week will be made Wednesday afternoon and posted to the campaign’s website. If that schedule shows several trips to Utah as well as Arizona over the next week, it will be a clear signal Trump intends to contest both states. Utah, where more than 55 percent of the residents are Mormons, is the only state that has a higher percentage of the population that is Mormon than Idaho. Governor Mitt Romney, a Mormon with strong ties to the state where he helped lead the 1998 Winter Olympics out of financial trouble, chose Utah as the venue to make his recent anti-Trump pronouncement. While Romney campaigned with Kasich in Ohio, he did not endorse him, and it is unclear if he will choose to strategically campaign with Cruz, who was leading both Trump and Kasich in a February poll taken there prior to Sen. Marco Rubio’s withdrawal from the race. Presumably, Cruz is the favorite to win more than a majority of the votes in the Utah caucus, a form of delegate selection where he has historically performed better than Trump. Note, for instance, the recent huge Cruz victories in two caucus states, Kansas and Wyoming. But Ohio Governor John Kasich, the third candidate remaining in the race, has made it clear he intends to compete in Utah, with several town halls already scheduled there for March 18. If Trump were to win Arizona, hold Cruz below 50 percent in Utah, and lose winner-take-all Nebraska and Montana while winning in winner-take-all Delaware and New Jersey, his “need to win” number of remaining delegates would jump from 43 percent if he took all four to 51 percent. The most recent poll shows Trump with a 27 point lead in New Jersey, but Nebraska, next door to Iowa and Kansas, where Cruz won, and Montana, next door to Idaho where Cruz also won, probably lean to Cruz now, although polling in either state is sparse. The bottom line on the race for the GOP nomination is that Trump’s ability to convert his frontrunner status to first ballot nominee is still unknown. Politico made a more definitive prognostication that predicted Republican chaos if Trump did not win both Florida and Ohio: But if Trump doesn’t win both states [Florida and Ohio], the GOP is likely to find itself in Cleveland with no candidate above the 1,237-delegate majority needed to claim the nomination. If that happens, the Republican Party’s own rules lock in a quagmire in Cleveland—and likely a multi-ballot, no-holds-barred convention. Kasich’s win in Ohio, however, does not mean Trump cannot win the nomination on a first ballot. Whether he will be able to secure a first ballot victory is a matter to be determined week by week as he, Cruz, and Kasich slug it out in the remaining states, each of which has unique circumstances and its own delegate selection process. In other words, expect hand-to-hand combat in each state as Trump, Cruz, and Kasich exhaust every effort to secure every last possible delegate between now and the July 18 convention.
Mid
[ 0.551801801801801, 30.625, 24.875 ]
A qualitative estimate of the influence of halcinonide concentration and urea on the reservoir formation in the stratum corneum. The existence of a stratum corneum reservoir for topically applied substances is well known. Data concerning the stratum corneum retention time are important for the elaboration of optimal topical treatment. We used the re-occlusion technique followed by skin colour measurements (Chromametry) for the evaluation of the stratum corneum retention time of halcinonide. We found a significant reservoir for halcinonide up to 5 days after the initial application. The retention was found to be corticosteroid concentration and formulation dependent.
High
[ 0.664634146341463, 27.25, 13.75 ]
Specific antigen stimulated lymphocyte proliferation in osteosarcoma. A lymphocyte proliferation assay (LPA) for cellular immune responses to osteosarcoma antigens is described and applied to an examination of peripheral blood lymphocytes (PBL) taken from osteosarcoma patients. The antigen preparations were derived from 3 M KC1 solubilized osteosarcoma, taken from a limited number of patients. Lymphocytes from most tumor-bearing patients were stimulated to significant proliferation when cultured in normal human serum. Such stimulation was observed whether or not the lymphoid cells were preincubated 24 hours at 37 degrees C prior to addition of antigen. Patients whose lesion had been resected and who were without evidence of disease for 5-70 months had diminished proliferative responses. Lymphocytes from normal subjects, from patients having other types of sarcoma, and patients having carcinomas rarely responded to the soluble osteosarcoma antigens. When responsive PBL taken from tumor-bearing patients were cultured in autologous serum, the proliferative responses were abrogated or blocked. Serial assays made in the course of bearing this tumor under a variety of therapeutic regimens, including an immunotherapy protocol, suggest that the LPA may be useful in monitoring clinical progress of the disease and possibly in other immunotherapy protocols for osteosarcoma.
High
[ 0.681198910081743, 31.25, 14.625 ]
Q: Loop not breaking when string inputted So I was just making a random code generator and i added a loop so you can go again without running it again. But apparently when i type in yes at the end it goes again but when i type in no at still goes again. Here's my code: loop do puts "Hello. I am a random code generator. PLease type in how many digits you want" b = gets.chomp.to_i a = rand *10**b puts "Your random code is #{a.to_i}" puts "Would you like to go again?" x = gets if x == 'no' break end end A: loop do puts "Hello. I am a random code generator. PLease type in how many digits you want" b = gets.chomp.to_i a = rand *10**b puts "Your random code is #{a.to_i}" puts "Would you like to go again?" x = gets.chomp if x == 'no' break end end
Low
[ 0.473572938689217, 28, 31.125 ]
Q: lim sup and lim infs of Brownian Motion: $B_t/\sqrt{t}$ as $t \to \infty$ or as $t \to 0$. Below is my question. Q7.9 is what I'm stuck on. I've done Q7.8; I included it in the picture because I'll use it in Q7.9, and it gives a definition that I'll use. Update: This question is now solved, and I've added the details below. What I've done so far is this: By using time-inversion, $(tB_{1/t})_{t\ge0}$, and $(-B_t)_{t\ge0}$, sign-inversion of Brownian motion, we have that the four random variables in question are all equal to each other. Further, we see that the first is $\mathcal{F}_{0^+}$ measurable, since $$ \limsup_{t \to 0} \frac{B_t}{\sqrt{t}} = \lim_{s \to 0} \sup_{t \le s} \frac{B_s}{\sqrt{s}}, \ \text{and} \ \sup_{t \le s} \frac{B_s}{\sqrt{s}}$$ is $\mathcal{F}_s$ measurable for all $s > 0$, and thus the limit is $\mathcal{F}_{0^+}$ measurable. Hence by Blumenthal's $0$-$1$ law, it is almost surely constant. Hence we now have that the four random variables in question are equal to each other and almost surely constant. Since $\mathbb{P}(B_{t'} > 0) = 1/2$ for all $t' > 0$, by the Markov property, we have that the almost sure constant must be at least $0$. I'm stuck on showing that this constant is in fact $+\infty$. I wanted to use the scaling property, $(cB_{t/c^2})_{t\ge0}$, of Brownian motion, but the issue is that this gives $$\frac{cB_{t/c^2}}{\sqrt{t}} = \frac{B_{t/c^2}}{\sqrt{t/c^2}} = \frac{B_s}{\sqrt{s}}$$ where $s = t/c^2$. When considering just $B_t$ or $B_t/t$, we get a factor $c$ or $1/c$ out the front, and so, since this must hold for all $c$, we know that it must be $0$ or $\infty$. (We can then show which it is.) However, we don't get this nice property when using $B_t/\sqrt{t}$. Solution: Define $A^x_t$ and $A^x$ as follows: $$A^x_t = \left\{ \sup_{s \le t} \frac{B_s}{\sqrt{s}} \le x \right\}, ~ A^x = \left\{ \lim_{t \downarrow 0}\sup_{s \le t} \frac{B_s}{\sqrt{s}} \le x \right\} = \left\{ \limsup_{t \downarrow 0} \frac{B_s}{\sqrt{s}} \le x \right\}.$$ Observe that $B_t/\sqrt{t} \sim N(0,1)$. Thus, since $\sup_{s \le t} {B_s}/{\sqrt{s}} \ge {B_t}/{\sqrt{t}}$, $$P \left( \sup_{s \le t} \frac{B_s}{\sqrt{s}} \le x \right) \le P \left( \frac{B_t}{\sqrt{t}} \le x \right) = \Phi(x),$$ where $\Phi$ is the cdf for the standard normal. We want to show that $P(A^x) = 0$ for every $x \in \mathbb{R}$ ($\therefore x \neq \infty$); by Blumenthal's $0$-$1$ law, it is enough to show that $P(A^x) < 1$. Now, $A^x_{1/n} \downarrow A^x$ as $n \to \infty$, so by monotone convergence, $$P(A^x) = \lim_{n \to \infty}P(A^x_{1/n}) \le \Phi(x) < 1, \ x \in \Bbb R.$$ Thus $P(A^x) < 1$, ie $P(A^x) = 0$, for all $x \in \mathbb{R}$. Thus the almost sure constant must be $+\infty$. Thank you to Jay.H for helping me with this! A: Try to use the fact that $B_t/\sqrt{t}$ has the same distribution as $B_1$ and the fact that $\sup_{s\le t }B_s/\sqrt{s}$ is monotonic w.r.t. $t$ [Warning: more details below] For any constant $C>0$, let $$ A = (\lim_{t\to 0} \sup_{0<s\le t}\frac{B_s}{\sqrt{s}}<C )$$ We want to show that $P(A)=0$. Since $A\in {\mathcal F}_{0+}$, we only have to show that $P(A)<1$. Let $$ A_n = (\sup_{0<s\le \frac{1}{n}}\frac{B_s}{\sqrt{s}}<C)$$ Then $$ P(A_n) \le P(\frac{B_{1/n}}{\sqrt{1/n}}<C) = P(B_1<C)$$ Since $ A_n \uparrow A$, we have $$ P(A) = \lim_{n\to \infty} P(A_n) \le P(B_1<C) <1$$ Done.
Low
[ 0.5375, 32.25, 27.75 ]
Fatal pneumoperitoneum caused by nasopharyngeal oxygen delivery after transoesophageal echocardiography for cardiac surgery. We report a case of fatal post-operative pneumoperitoneum in a patient who had undergone urgent mitral valve surgery. In the absence of a proven cause of the pneumoperitoneum (refusal by the family of an autopsy), we can only propose a hypothesis for its origin. The most probable one is that forceful or sustained retrograde flexion of the transoesophageal echocardiographic probe created a lower oesophagus or gastric rupture and that oxygen flow administered by the nasal cannula went straight to the abdominal cavity, leading to tension pneumoperitoneum.
Mid
[ 0.583333333333333, 33.25, 23.75 ]
/*--------------------------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Licensed under the Source EULA. See License.txt in the project root for license information. *--------------------------------------------------------------------------------------------*/ 'use strict'; import * as azdata from 'azdata'; import * as Utils from '../utils'; import ControllerBase from './controllerBase'; import * as fs from 'fs'; import * as path from 'path'; /** * The main controller class that initializes the extension */ export default class MainController extends ControllerBase { public deactivate(): void { Utils.logDebug('Main controller deactivated'); } public activate(): Promise<boolean> { const webviewExampleHtml = fs.readFileSync(path.join(__dirname, 'webviewExample.html')).toString(); const buttonHtml = fs.readFileSync(path.join(__dirname, 'button.html')).toString(); const counterHtml = fs.readFileSync(path.join(__dirname, 'counter.html')).toString(); let countWidget: azdata.DashboardWebview; let buttonWidget: azdata.DashboardWebview; let count = 0; let dialog: azdata.ModalDialog = azdata.window.createWebViewDialog('Flyout extension'); dialog.html = '<div>This is a flyout extension.</div>'; azdata.dashboard.registerWebviewProvider('webview-count', e => { e.html = counterHtml; countWidget = e; }); azdata.dashboard.registerWebviewProvider('webview-button', e => { e.html = buttonHtml; buttonWidget = e; e.onMessage(event => { if (event === 'openFlyout') { dialog.open(); } else { count++; countWidget.postMessage(count); } }); }); azdata.dashboard.registerWebviewProvider('webviewExample', e => { e.html = webviewExampleHtml; }); return Promise.resolve(true); } }
Mid
[ 0.54054054054054, 32.5, 27.625 ]
Pages Saturday, October 20, 2012 Vijay Ganapati Mantra Sadhana This is a Siddha Vijay Ganapati Mantra Sadhana for the fulfillment of any task, wish, desire or problem in life. Vijaya or Vijay means victory and Vijay Ganapati is that form of Ganapati which makes one victorious. This is a Sadhana which is performed by many successful persons in India in secrecy, in their homes and is said to be a very powerful and potent Satvik Mantra Sadhana to get the blessings of Ganesha for the successful completion of any specific task or purpose. Vijay Ganapati Mantra The steps to be followed are given here in a chronological order. An idol of Vijay Ganapati has to be installed in the home. The Pran Prathishta ceremony or the ritual of infusing or breathing life into the idol has to be done; if you do not know how to do this rite, you can get it done through a priest. This has to be done on a Wednesday. This done; the Sadhana can be commenced and the day has to be a Wednesday. Early in morning after having a bath and wearing clean cloths sit before the idol of Ganesha; facing towards the East, Use a red colored cotton or woolen mat to sit on. Apply Kesar [Saffron] on the idol. Then put a Tilak of Raktachandana [Red Sandalwood] on the forehead of the idol. Then offer a Prasad of Jaggery by keeping it before the idol. Then take 21 red flowers and dipping each flower in a mug of water offer it to Ganesha by keeping the flower at the feet of the idol. While offering each and every flower state the aspiration, purpose or desire for which you are offering the flower. Then commence chanting the mantra which is given here. This mantra has to be chanted 125,000 times in a period of 5 days. Then on completion of the Sadhana on the 6th day invite 5 young girls who have not reached the stage of puberty for lunch and give some kind of gift to each of them. This successful completion of this Sadhana ensures success or victory in whatever task, wish, want, desire or problem which you have placed before Vijay Ganapati. Neel N is the founder of Prophet666.com. He tells you in English and Hindi about Spells, Vashikaran, Yakshinis and all Hindu and Islamic Mantras and Yantras. The Prophecies, Revolutions of India and the coming World Wars of the Bible, Kalki Avatar and Nostradamus. The Mantra and Remedies for Healthy Living and Exploring the Unknown Universe. Pranam guruji, i asked a priest for pran prathishta as u said in ur article but he is saying that there are lots if restrictions aftr that, like i cant use garlic in house, i have to light a lamp before ganapati ji every evening, make them bath. As i am a working lady, so it seems to be impossibile for me. Please suggest me what to do. I really want to perform this sadhana. Garlic, Onion, Ginger and all such item normally used in non-veg cooking should not be consumed on the day the Prana Prathishta takes place and not for ever.Only a lamp needs to be lit before the idol in the morning and evenings every day and it take little time to clean the idol with wet cloth every morning. Guruji, can i read mantra morning and evening ? do we neef to keep 21 flowers everyday ? I am asking because continuously 3 to 4 hours sitting is not possible with kids. Please reply I want to start in this month since it is very auspicious. Feel free to speak your mind and share your thoughts and knowledge. Answer the Queries of others. Please do not expect answers for obvious or personal questions. Information/HTML given in comments; especially on Vashikaran, Mohini, Yakshinis, Akarshan, Occult, Witchcraft, Hex and Voodoo Spells, Black Magic Mantra, Tantra, Jadu- Tona, Totka and Upay is not endorsed by this site See New Comment Policy Content Policy The contents of this site are Copyrighted.Commercial use is strictly prohibited and illegal.Websites/Bloggers are required by Law to put attribution link back to this site if they use the contents under the terms and conditions of the Creative Commons LicenceThis work is licensed under a Creative Commons Attribution-ShareAlike 4 International License.Information on the site including that of famous and popular Hindu Mantras, Yantras, Tantras, Spells, Attraction Mantras,Health Mantras, Wealth Mantras, Protection Mantras, Akarshan Mantras, Vashikaran Mantras, Mohini Mantras, Enemy Mantras and Indian Astrology, Home and Paranormal Remedies is given for information and educational purposes.I do not practice or advocate the practice of these experiments.Protected Copyright This site is formed as a Portal to impart rare and secret ancient Indian knowledge in English and Hindi to people all over the World. Do not misuse the contents;especially the rare and sacred ancient Hindu Mantras, Tantras, Yantras, Spells, Vashikaran, Mohini, Akarshan and Sammohan Mantras, Yantras, Tantras and Remedies. All prophecies and Predictions of Nostradamus, Bible, Kalki Avatar, Hindu, Islamic, Indian and New World Order are based on our own interpretations of various ancient,unknown and original texts on prophecies and religious scriptures.
Mid
[ 0.544052863436123, 30.875, 25.875 ]
-- Table for storing localisation data CREATE TABLE /*_*/l10n_cache ( lc_lang varbinary(35) NOT NULL, lc_key varchar(255) NOT NULL, lc_value mediumblob NOT NULL, PRIMARY KEY(lc_lang, lc_key) ) /*$wgDBTableOptions*/;
Low
[ 0.44, 30.25, 38.5 ]
How do race and sex affect the earnings of primary care physicians? To explore the connection between primary care physicians' race and sex and their annual incomes, we used restricted versions of Community Tracking Study Physician Surveys administered in 1998-99, 2001-02, and 2004-05. Compared to white male primary care physicians, we inconsistently found lower yearly incomes for their black male peers but consistently found significantly lower incomes for their female peers of any race, after differences in work effort, physician characteristics, and practice characteristics were adjusted for. Sex-based differences persisted over time. Our findings suggest that addressing the underlying causes of sex-based income differences should be a priority for health professional organizations, particularly as more women enter the physician workforce.
High
[ 0.658730158730158, 31.125, 16.125 ]
/* * Copyright Camunda Services GmbH and/or licensed to Camunda Services GmbH * under one or more contributor license agreements. See the NOTICE file * distributed with this work for additional information regarding copyright * ownership. Camunda licenses this file to you under the Apache License, * Version 2.0; you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.camunda.bpm.engine.test.bpmn.event.end; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertNotNull; import java.util.HashMap; import java.util.Map; import org.camunda.bpm.engine.runtime.ProcessInstance; import org.camunda.bpm.engine.task.Task; import org.camunda.bpm.engine.test.Deployment; import org.camunda.bpm.engine.test.util.PluggableProcessEngineTest; import org.junit.Test; /** * @author Kristin Polenz */ public class SignalEndEventTest extends PluggableProcessEngineTest { @Deployment @Test public void testCatchSignalEndEventInEmbeddedSubprocess() throws Exception { ProcessInstance processInstance = runtimeService.startProcessInstanceByKey("catchSignalEndEventInEmbeddedSubprocess"); assertNotNull(processInstance); // After process start, usertask in subprocess should exist Task task = taskService.createTaskQuery().singleResult(); assertEquals("subprocessTask", task.getName()); // After task completion, signal end event is reached and caught taskService.complete(task.getId()); task = taskService.createTaskQuery().singleResult(); assertEquals("task after catching the signal", task.getName()); taskService.complete(task.getId()); testRule.assertProcessEnded(processInstance.getId()); } @Deployment(resources={ "org/camunda/bpm/engine/test/bpmn/event/end/SignalEndEventTest.catchSignalEndEvent.bpmn20.xml", "org/camunda/bpm/engine/test/bpmn/event/end/SignalEndEventTest.processWithSignalEndEvent.bpmn20.xml" }) @Test public void testCatchSignalEndEventInCallActivity() throws Exception { // first, start process to wait of the signal event ProcessInstance processInstanceCatchEvent = runtimeService.startProcessInstanceByKey("catchSignalEndEvent"); assertNotNull(processInstanceCatchEvent); // now we have a subscription for the signal event: assertEquals(1, runtimeService.createEventSubscriptionQuery().count()); assertEquals("alert", runtimeService.createEventSubscriptionQuery().singleResult().getEventName()); // start process which throw the signal end event ProcessInstance processInstanceEndEvent = runtimeService.startProcessInstanceByKey("processWithSignalEndEvent"); assertNotNull(processInstanceEndEvent); testRule.assertProcessEnded(processInstanceEndEvent.getId()); // user task of process catchSignalEndEvent assertEquals(1, taskService.createTaskQuery().count()); Task task = taskService.createTaskQuery().singleResult(); assertEquals("taskAfterSignalCatch", task.getTaskDefinitionKey()); // complete user task taskService.complete(task.getId()); testRule.assertProcessEnded(processInstanceCatchEvent.getId()); } @Deployment(resources = { "org/camunda/bpm/engine/test/bpmn/event/signal/testPropagateOutputVariablesWhileThrowSignal.bpmn20.xml", "org/camunda/bpm/engine/test/bpmn/event/signal/SignalEndEventTest.parent.bpmn20.xml" }) @Test public void testPropagateOutputVariablesWhileThrowSignal() { // given Map<String,Object> variables = new HashMap<String, Object>(); variables.put("input", 42); String processInstanceId = runtimeService.startProcessInstanceByKey("SignalParentProcess", variables).getId(); // when String id = taskService.createTaskQuery().taskName("ut2").singleResult().getId(); taskService.complete(id); // then checkOutput(processInstanceId); } @Deployment(resources = { "org/camunda/bpm/engine/test/bpmn/event/signal/testPropagateOutputVariablesWhileThrowSignal2.bpmn20.xml", "org/camunda/bpm/engine/test/bpmn/event/signal/SignalEndEventTest.parent.bpmn20.xml" }) @Test public void testPropagateOutputVariablesWhileThrowSignal2() { // given Map<String,Object> variables = new HashMap<String, Object>(); variables.put("input", 42); String processInstanceId = runtimeService.startProcessInstanceByKey("SignalParentProcess", variables).getId(); // when String id = taskService.createTaskQuery().taskName("inside subprocess").singleResult().getId(); taskService.complete(id); // then checkOutput(processInstanceId); } protected void checkOutput(String processInstanceId) { assertEquals(1, taskService.createTaskQuery().taskName("task after catched signal").count()); // and set the output variable of the called process to the process assertNotNull(runtimeService.getVariable(processInstanceId, "cancelReason")); assertEquals(42, runtimeService.getVariable(processInstanceId, "input")); } }
Mid
[ 0.579676674364896, 31.375, 22.75 ]
Housing The Seattle Department of Planning and Development last night presented to the public a plan they said could improve the quality of townhouses without adding substantial costs, while also streamlining the design process and addressing common problems. Currently, most townhouses do not undergo design review, unless the applicant volunteers for administrative review in order to seek departures from city land use code development standards. The city says this has created townhome developments that are poorly designed and or do not fit in with the character of the neighborhoods. Following a directive last summer from Mayor Greg Nickels, who proposed new regulations for building townhouses, the department said the more streamlined version of the current Administrative Design Review could reduce permit process time and costs associated with it while still addressing design issues, said Geoff Wentlandt, senior planning and development specialist for the planning department. Nickels' proposal for new regulations for building townhouses aims to ease concerns to those who oppose so-called cookie cutter town homes. Northwest Multiple Listing Service members reported pending sales for April surged 11.4 percent compared to twelve months ago – and rose 21.3 percent from March, according to a press release from the service. Brokers reported 6,918 pending sales during April across the 19 counties that make up the Northwest MLS market area. That’s up from the year-ago total of 6,208, and the March figure of 5,701 pending sales (offers made and accepted, but not yet closed). For the four-county Puget Sound area (King, Kitsap, Pierce and Snohomish), brokers notched 5,372 pending sales, the highest total since August 2007 and a jump of 26 percent from March. Inventory is shrinking and prices are showing some signs of stabilizing, according to data in the latest report from Northwest MLS. The median price for last month’s closed sales of single family homes and condominiums area-wide was $270,000. That matched the figure for March, but still lagged prices of a year ago (down 12.9 percent). 05/05/2009 Mayor Greg Nickels announced his proposal today in Wallingford to renew the Seattle Housing Levy, which expires at the end of 2009. “Seattle voters have always voted to help house our most vulnerable neighbors," said Nickels in a statement. "This levy renewal will ensure struggling families, seniors and other vulnerable people keep a roof over their heads." Nickels said that more than half of the proposed seven-year, $145 million levy will be dedicated to families and individuals earning mimumum wage or less -including retail, restaurant and hotel workers, as well as seniors living on fixed incomes. For the average homeowner, the property tax would cost $79 annually - about $6.60 a month. A recent survey showed that 73 percent of Seattle residents surveyed believed that, in this economic downturn, it’s more important than ever to keep investing in low-income housing programs and assistance. 04/29/2009 The way to solve increasing homelessness, and it can be solved, will come through community organization and sacrifice, not through government policies or practices, according to two local homeless advocates. Tim Harris, executive director of Real Change, and Rev. Craig Rennebohm, who has worked with people living on the streets of Seattle for more than 20 years, talked and answered questions about why homelessness is the problem that it is and what can be done about it at an April 19 forum hosted by Ballard's Trinity United Methodist Church. Harris said members of the community need to build an infrastructure that will allow for organization across classes to help those living on the streets. Rennebohm said Ballard needs a community organization that includes those community members who are living on the streets. The neighborhood needs a grassroots, mobile outreach team with background in nursing, mental health and social work that can engage with those people who are most troubled, he said. "I guess what I'm asking is to really take hold of our communities and organize block by block," Rennebohm said. 04/20/2009 Photo credit: Michael Harthorne Tim Harris, founder of Real Change, and Craig Rennebohm, minister to the homeless, field questions about homelessness during an April 19 forum at Trinity United Methodist in Ballard. On April 19, at 7 p.m. the Trinity United Methodist Church will host a "homeless forum" at 6512 23rd Ave. N.W. Questions that will be explored include: - Why is homelessness growing in Ballard? - Who are the homeless? Are they all moochers, drunks and jerks? - What can be done politically to end homelessness? - How can our neighborhood care but not enable? - How can church and neighborhood work together? The forum will feature Tim Harris, Editor and Publisher of Real Change speaking about the structural, political reasons for homelessness. Rev. Craig Rennebohm, Mental Health Chaplain and author of "Souls in the Hands of a Tender God," will speak about the personal, behavioral reasons for homelessness. According to the church, this is the first of several neighborhood forums aimed at creating strategies geared toward solutions for the growing issue in the community. 04/14/2009 In an effort to slow down the increasing number of homeless individuals in Seattle, a joint effort by the city of Seattle, United Way of King County and the Committee to End Homelessness in King County have trained more than 500 Seattleites to survey unsheltered people in Seattle next Monday night. Taking a cue from Toronto, which first started the survey, Seattle will be sending volunteers to designated areas in teams of three, where they will approach every single person they see to participate in the assessment. “We’re making absolutely no assumptions or using typical stereotypes of what homeless people may look like,” Julie Moore, communications director of the Office of Housing said. “That’s something Toronto found, that when they did this survey you may be surprised when you come up to someone in business attire who just came out of work but actually may not have a home.” Volunteers will ask citizens if they are sleeping indoors that evening, between the hours of 9 p.m. to midnight on Monday April 13. They will also ask those who are not staying in a home or shelter to participate in the confidential voluntary survey. In the second recommendation meeting for a mixed-use complex at 4532 42nd Ave. S.W., the Southwest Design Review Board requested that architects return for another review after making changes to the first level of the building. The complex, located near the Alaska Junction, will measure six stories high and with 35 unit apartments and two levels of underground parking containing 55 parking stalls. In his presentation, architect Roger Newell explained how the project's design had been modified to address concerns presented by the board in June of 2008. He explained that the building's mass at the ground level had been set back and aligned with the west property line. To accommodate previous board recommendations, commercial retail space in the building had also been moved to the first level of the complex. Continuous overhead canopies have been added along the sidewalk. But Joe Hurley, the only acting board member who had been present at the project's previous recommendation meeting, was not satisfied with the changes he saw in Newell's design. This 35 unit apartment complex will undergo another recommendation meeting with the Southwest Design Review Board before construction can begin. The housing shortfall has grown for people below 40 percent of county-wide median and the King County 2008 Housing Benchmarks Report shows similar growing gap for Seattle's very low income households. • By contrast there is a surplus county-wide of rental units serving those at 80 percent of median of 100,000 plus units at that rent level. • In Seattle, 81 percent of all rentals are affordable to those at 80 percent of median - for a surplus of over 30,000 city-wide at that rent level. • But for the 40,000 households in Seattle earning at or below 40 percent of median, there are only about 10,000 units affordable to them at that rent level - for a shortfall of more than 30,000 units. • The crisis grows for those at the bottom and that's where our priority should remain. Though Seattle's housing and economic situation are not good, it's not as dire as some parts of the country, said experts in the industries at a panel discussion in front of the Seattle City Council Monday. Susan Greenwald, director of single-family operations at Homestreet Bank, said nationally the percentage of homes either in foreclosure or with loans in delinquency is roughly just below 12 percent. In Washington State, it's 6.58 percent. While it's better than the national average, Greenwald said she has never seen numbers that high in Seattle during her 30 years in the business. "We have some real challenges ahead," she said. Greenwald spoke with four other panelists from 10 a.m to noon, March 23 at a special council briefing titled,“The State of the Regional Economy: A Panel Discussion Among Local Experts," chaired by council president Richard Conlin. Greenwald attributes the state's lower number to less mortgage fraud against lenders here than other parts of the nation, such as Michigan. (Editor's note: This following was distributed to the Ballard News-Tribune through an email to community members.) Dear Neighbors, This is the second email update sent to those people who have expressed an interest in providing interim housing for men in a SHARE shelter at Our Redeemer's Calvary building. During the past few weeks we have heard from many neighbors. Thank you for asking questions and expressing your support and concerns. Since a community meeting on February 26, representatives from Our Redeemer's, the SHARE men's shelter, and neighbors of the Calvary building have met twice to more clearly understand how the shelter will operate, concerns, and expectations. These meetings have been informative and productive. Another meeting is planned. Our Redeemer's is currently working on an agreement with SHARE, which will govern shelter operations. The Calvary building is expected to be a safe, dry place for up to 20 homeless men each evening for a year. The men are self-governed, with staff support from SHARE. They have an excellent recent accountability record. Each evening the shelter participants will arrive by bus between 7 p.m. and 10 p.m.
Low
[ 0.49896480331262905, 30.125, 30.25 ]
Pedestrian 0.00 0 -0.20 712.40 143.00 810.73 307.92 1.89 0.48 1.20 1.84 1.47 8.41 0.01
Low
[ 0.30041152263374404, 13.6875, 31.875 ]
/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ import Foundation import SnapKit /// Presents a sheet with a child view controller of choice. /// On iPhones it presents as a bottom drawer style. /// On iPads it presents as a popup at center of the screen. class BottomSheetViewController: UIViewController { private struct UX { static let handleWidth: CGFloat = 35 static let handleHeight: CGFloat = 5 static let handleMargin: CGFloat = 20 } /// For landscape orientation the content view isn't full width. /// A fixed constant is used instead. private let maxHorizontalWidth = 400 private let animationDuration: TimeInterval = 0.25 //let childViewController: UIViewController // MARK: - Views let contentView = UIView().then { $0.layer.cornerRadius = 12 } private let backgroundOverlayView = UIView().then { $0.backgroundColor = .black $0.alpha = 0 } private let handleView = UIView().then { $0.backgroundColor = .black $0.alpha = 0.25 $0.layer.cornerRadius = UX.handleHeight / 2 } private let closeButton = UIButton().then { $0.setImage(#imageLiteral(resourceName: "close_popup").template, for: .normal) $0.appearanceTintColor = .lightGray } // MARK: - Constraint properties /// Controls height of the content view. private var yPosition: CGFloat = 0 { didSet { let maxY = view.frame.maxY func update() { if maxY <= 0 { return } // Update dark blur, the more of content view go away the less dark it is. backgroundOverlayView.alpha = (maxY - yPosition) / maxY let newFrame = contentView.frame contentView.frame = CGRect(x: newFrame.minX, y: yPosition, width: newFrame.width, height: newFrame.height) view.layoutIfNeeded() } if oldValue == yPosition { return } // All vertical position manipulation on iPads happens programatically, // no need to check for Y position limits. if showAsPopup { update() return } let initialY = initialDrawerYPosition // Only move the view if dragged below initial level. if yPosition <= initialY { yPosition = initialY } else if yPosition > maxY { // Dragged all way down, remove the view. yPosition = maxY } update() } } private var initialDrawerYPosition: CGFloat { let popupY = ceil((view.frame.height / 2) - (contentView.frame.height / 2)) let regularY = view.frame.maxY - contentView.frame.height return showAsPopup ? popupY : regularY } private var showAsPopup: Bool { traitCollection.userInterfaceIdiom == .pad && traitCollection.horizontalSizeClass == .regular } private var isLandscapePhone: Bool { traitCollection.userInterfaceIdiom == .phone && UIApplication.shared.statusBarOrientation.isLandscape } // MARK: - Lifecycle init() { super.init(nibName: nil, bundle: nil) } @available(*, unavailable) required init?(coder aDecoder: NSCoder) { fatalError() } override func viewDidLoad() { super.viewDidLoad() view.addSubview(backgroundOverlayView) view.addSubview(contentView) contentView.backgroundColor = .white let panGestureRecognizer = UIPanGestureRecognizer(target: self, action: #selector(handlePanGesture)) contentView.addGestureRecognizer(panGestureRecognizer) contentView.addSubview(handleView) contentView.addSubview(closeButton) closeButton.addTarget(self, action: #selector(closeView), for: .touchUpInside) contentView.isHidden = true makeConstraints() } override func viewDidAppear(_ animated: Bool) { super.viewDidAppear(animated) show() } override func viewDidLayoutSubviews() { yPosition = contentView.isHidden ? view.frame.maxY : initialDrawerYPosition } override func traitCollectionDidChange(_ previousTraitCollection: UITraitCollection?) { super.traitCollectionDidChange(previousTraitCollection) view.setNeedsUpdateConstraints() } override func updateViewConstraints() { let allCorners: CACornerMask = [.layerMinXMinYCorner, .layerMaxXMinYCorner, .layerMinXMaxYCorner, .layerMaxXMaxYCorner] let onlyTopCorners: CACornerMask = [.layerMinXMinYCorner, .layerMaxXMinYCorner] contentView.layer.maskedCorners = showAsPopup ? allCorners : onlyTopCorners handleView.isHidden = showAsPopup // Don't remake constraints if not needed. if yPosition == initialDrawerYPosition { return } contentView.snp.remakeConstraints { if showAsPopup || isLandscapePhone { $0.bottom.centerX.equalToSuperview() $0.width.equalTo(maxHorizontalWidth) // If contents can't fit the screen height, we have to add top constraint // in order to squeeze views in the `contentView`. // At the moment it only happens on iPhone 5S in landscape mode. // // Otherwise no top constraint is set, it will take as much space as needed. $0.top.greaterThanOrEqualToSuperview() } else { $0.leading.trailing.bottom.equalToSuperview() } } super.updateViewConstraints() } // MARK: - Constraints setup private func makeConstraints() { backgroundOverlayView.snp.makeConstraints { let bottomInset = parent?.view.safeAreaInsets.bottom ?? 0 $0.leading.trailing.top.equalToSuperview() $0.bottom.equalToSuperview().offset(bottomInset) } handleView.snp.remakeConstraints { $0.width.equalTo(UX.handleWidth) $0.height.equalTo(UX.handleHeight) $0.centerX.equalTo(contentView) $0.top.equalTo(contentView).offset((UX.handleMargin - UX.handleHeight) / 2) } closeButton.snp.makeConstraints { $0.top.equalToSuperview().inset(10) $0.right.equalToSuperview().inset(7) $0.size.equalTo(26) } } // MARK: - Animations @objc private func handlePanGesture(_ pan: UIPanGestureRecognizer) { // The view shouldn't be draggable on iPads if showAsPopup { return } let translation = pan.translation(in: contentView) yPosition += translation.y pan.setTranslation(CGPoint.zero, in: contentView) if pan.state != .ended { return } let projectedVelocity = project(initialVelocity: pan.velocity(in: contentView).y, decelerationRate: UIScrollView.DecelerationRate.normal.rawValue) let nextYPosition: CGFloat let bottomHalfOfChildView = view.frame.height - (contentView.frame.height / 2) let pannedPastHalfOfViewHeight = yPosition > bottomHalfOfChildView let closeByVelocity = projectedVelocity + yPosition > contentView.frame.maxY if pannedPastHalfOfViewHeight || closeByVelocity { nextYPosition = view.frame.maxY } else { nextYPosition = 0 } UIView.animate(withDuration: animationDuration, animations: { self.yPosition = nextYPosition }) { _ in if nextYPosition > 0 { self.view.removeFromSuperview() self.removeFromParent() } } } private func show() { contentView.isHidden = false UIView.animate(withDuration: animationDuration) { self.yPosition = self.initialDrawerYPosition } } @objc private func closeView() { close() } func close() { UIView.animate(withDuration: animationDuration, animations: { self.yPosition = self.view.frame.maxY }) { _ in self.view.removeFromSuperview() self.removeFromParent() } } // Distance travelled after decelerating to zero velocity at a constant rate (credit: a WWDC video) private func project(initialVelocity: CGFloat, decelerationRate: CGFloat) -> CGFloat { return (initialVelocity / 1000.0) * decelerationRate / (1.0 - decelerationRate) } }
Low
[ 0.472422062350119, 24.625, 27.5 ]
Ray v. McCain United States District Court, W.D. Louisiana, Lake Charles Division June 11, 2018 ALTON RAY D.O.C. # 599637v.W.S. McCAIN SECTION P REPORT AND RECOMMENDATION Kathleen Kay, Judge Before the court is a petition for writ of habeas corpus filed pursuant to 28 U.S.C. § 2254 by Alton “Aldo” Ray, who is proceeding pro se in this matter. Ray is an inmate in the custody of the Louisiana Department of Public Safety and Corrections and is currently incarcerated at the Raymond Laborde Correctional Center in Cottonport, Louisiana. W.S. McCain, warden of that facility and respondent in this matter, opposes the petition and Ray has filed a reply. Docs. 21, 27. Accordingly, the matter is now ripe. This petition is referred to the undersigned for review, report, and recommendation in accordance with 28 U.S.C. § 636 and the standing orders of the court. For the following reasons IT IS RECOMMEDED that the petition for writ of habeas corpus be DENIED and DISMISSED WITH PREJUDICE as time-barred under 28 U.S.C. § 2244(d). I. Background A. Conviction On February 1, 2011, in the Thirtieth Judicial District Court, Vernon Parish, Louisiana, Ray was charged by bill of information with two counts of molestation of a juvenile, a violation of Louisiana Revised Statute § 14:81.2(A)(1), or in the alternative, two counts of sexual battery of a juvenile, a violation of La. Rev. Stat. § 14:43.1. Doc. 22, att. 1, p. 38. After a one-day bench trial on January 11, 2012, Ray was acquitted on the first count and convicted of sexual battery on the second count. Doc. 22, att. 6, pp. 6-8. Ray made a motion and amended motion for a new trials [doc. 22, att. 3, pp. 1-2, 6], and the court denied same after a hearing. Id. at 9; see doc. 22, att. 6, pp. 12-18 (hearing transcript). Ray was then sentenced on June 12, 2012, to a twenty-five year term of imprisonment, the minimum required by law, without benefit of probation, parole, or suspension of sentence. Doc. 22, att. 1, p. 14; doc. 22, att. 3, pp. 20-22. He filed a motion to reconsider sentence, which was summarily denied without a hearing. Doc. 22, att. 3, pp. 11-12. B. Direct Appeal Through counsel, Ray raised the following assignments of error in the Louisiana Third Circuit Court of Appeal: 1. The evidence introduced at trial was insufficient to support his conviction for sexual battery. 2. The trial court failed to confirm whether Ray had knowingly and voluntarily waived his right to jury trial. 3. The trial court imposed a constitutionally excessive sentence. 4. The trial court erred in failing to consider the mitigating circumstances in the case, which require deviation from the ... Our website includes the first part of the main text of the court's opinion. To read the entire case, you must purchase the decision for download. With purchase, you also receive any available docket numbers, case citations or footnotes, dissents and concurrences that accompany the decision. Docket numbers and/or citations allow you to research a case further or to use a case in a legal proceeding. Footnotes (if any) include details of the court's decision. If the document contains a simple affirmation or denial without discussion, there may not be additional text. Buy This Entire Record For $7.95 Download the entire decision to receive the complete text, official citation, docket number, dissents and concurrences, and footnotes for this case.
Low
[ 0.43673469387755104, 26.75, 34.5 ]
The next potential victims of the nation’s credit crunch: nearly 1.5 million people who ride buses and trains each weekday in Los Angeles County. Transit officials say riders could soon be facing serious service cuts. That’s because the Los Angeles County Metropolitan Transportation Authority might have to quickly come up with hundreds of millions of dollars to pay investors under terms of deals it made involving American International Group, the troubled financial and insurance giant. “I’ve lost a lot of sleep over this,” said Terry Matsumoto, the chief financial service officer and treasurer for the MTA. He said it was “absolutely” certain the agency would have to cut service if the deals sour. The problem, Matsumoto said, could extend beyond the MTA to other large transit agencies that entered into similar deals between the late 1980s and 2003, when tax laws were changed to discourage such transactions. Among those is Metrolink. The news comes at a tough time for the MTA. The agency recently lost $133 million in state funds, and declining sales tax revenues mean it will have less money to help keep its buses and trains rolling. An AIG spokesman declined to comment, citing the confidentiality of deals with its customers. Between the late 1980s and 2003, the MTA sold its rail equipment, more than 1,000 buses, a parking garage and maintenance facilities to investors that included Wells Fargo, Comerica and Phillip Morris in separate deals. Lease-back deals are a common way to raise money in the corporate world. A manufacturer, for example, could sell its factory to investors and then lease it back. The manufacturer gets a large chunk of cash and the investors get a steady stream of lease payments as well as a tax break for their depreciating property. “It’s a great way to get a shot in the arm in terms of cash without actually divesting yourself of your property,” said Bill Holder, an accounting professor at USC. Many of the nation’s largest transit agencies participated in such deals. Among them are the San Francisco Muni system, the BART rail system in the Bay Area, the Chicago Transit Authority and the Washington, D.C., Metro system. Metrolink, the Southland’s commuter rail agency, also sold most of its train cars and locomotives in four lease-back deals -- three of which involved AIG -- and made a $35.5-million profit as a result, said spokesman Francisco Oaxaca. Metrolink, like the MTA, must now find another firm to replace AIG. “The potential is pretty horrendous across the industry,” said James LaRusch, the chief counsel for the American Public Transportation Assn., a trade group for transit agencies. “It’s typically going to impact the largest transit agencies, because they were the ones that had the kind of assets necessary to get into these kind of deals.” LaRusch said about 30 of the largest transit agencies in the nation have some involvement in such deals. “Any time you take money from the agency, you are going to cause a cutback in service,” he said. In the case of the MTA deals, AIG provided $1 billion in loans to finance the transactions. The company, in return for fees paid by the transit agency, also guaranteed that the lease payments to investors would be made on time. Things started to go downhill when AIG ran short of cash after running up billions in losses tied to the housing slump. Its credit ratings were slashed and the firm was on the verge of collapse last month when it was bailed out by the federal government. The lower credit ratings triggered a clause in the lease-back agreements that require the MTA to either find a new firm to guarantee the deals or reimburse investors for their down payments and lost tax benefits, a scenario that could cost the transit agency between $100 million and $300 million. As a frame of reference, Matsumoto said that $100 million equals about 10% of the MTA’s bus service. However, the MTA board has not yet discussed what cuts might be made. The MTA has not found a replacement for AIG, Matsumoto said. “With the current state of the markets, there are no people who are willing to provide a replacement for AIG at any price,” Matsumoto said. The agency has started talking to some investors in hopes of getting them to accept terms more favorable to the MTA, but Matsumoto said he doesn’t know if investors are willing to renegotiate. Under a worst-case scenario, Matsumoto said, the bill could rise to $1.8 billion, more than half the MTA’s annual budget for this year. “There is no practical way we could ever pay that back,” he said. The agency has met with congressional staffers and asked the U.S. Treasury Department for help, hoping to get a piece of the $700-billion bailout package recently approved by Congress. Some of that money is to be used to buy troubled assets. “They didn’t tell us to go fly a kite; that’s hopeful,” Matsumoto said. “But I don’t know how practical it is. We weren’t talking to decision-makers.” MTA board member Richard Katz said: “The feds need to be concerned. If they bailed out the companies, they also need to bail out the public agencies impacted by the companies’ actions.” The credit crunch has eased a bit in recent days as interest rates for inter-bank loans have inched downward and short-term lending to corporations has picked up. But it’s unlikely that conditions will improve fast enough to provide significant relief to the MTA. Both Matsumoto and LaRusch said the Federal Transit Administration encouraged transit agencies to make lease-back deals as a way to make extra money. The MTA said it made about $65 million on the deals. But an FTA spokesman disagreed. “FTA was not a cheerleader for these transit lease-back agreements,” agency spokesman Dave Longo wrote in an e-mail. “We reviewed lease-back agreements submitted to us by transit agencies in terms of their compliance with federal transit law requirements. When we determined those agreements met the requirements, we approved them from that perspective.” -- [email protected] [email protected]
Low
[ 0.527114967462039, 30.375, 27.25 ]
Get breaking news alerts and special reports. The news and stories that matter, delivered weekday mornings. Vladimir Putin on Tuesday accused the Obama administration of trying to “undermine the legitimacy” of President-elect Donald Trump by spreading "fake" information. The Russian president said America was "seeing a continuing heated political struggle, even though the elections are finished." Addressing reporters at a news conference in Moscow, Putin said the recent inclusion of allegations against Trump in an intelligence briefing "indicates a significant level of degradation [among] political elites in the West." Let our news meet your inbox. The news and stories that matters, delivered weekday mornings. This site is protected by recaptcha Related: Trump Briefing Materials Included Damaging Allegations of Russian Ties: Sources Relations between Moscow and Washington sank to a post-Cold War low after the U.S. imposed sanctions on Russia following its annexation of parts of Ukraine. Vladimir Putin holds a joint news conference with the president of Moldova. Sergei Ilnitsky / AP Putin said: "You know, there is category of people who leave without saying goodbye out of respect to the circumstances, in order not to disturb the way the things are. On the other hand, there are people who keep saying goodbye but never leave. I would put the leaving administration in the second category. “What are we seeing in the U.S.? We are seeing a continuing heated political struggle, even though the elections are finished and they finished with Mr Trump's conclusive victory.” Putin said Trump’s opponents had "certain objectives." "Firstly, it is to undermine the legitimacy of the president-elect," he continued. "Second, it is to tie the president's arms and legs to prevent him from realizing his promises to the American people, both at home and abroad. How is it possible to make steps toward improving Russian-American relationships while all those fake stories are being thrown in?" Putin went on to repeat Russia’s denial that it was involved in monitoring Trump during a past business trip. "Does someone think that our intelligence services follow any American billionaire? Of course not, it's absolutely absurd," the Russian president said. "But people who order such false statements, that are now being spread to compromise the newly-elected president of the USA, fabricate them and use them in their political struggle, those people are worse than prostitutes," Putin said. "They don't have any moral boundaries." Damaging claims that were in a dossier floated by Trump opponents and published by Buzzfeed, were unverified by both the media (including Buzzfeed) and the U.S. intelligence community. Trump has vehemently denied the allegations.
Low
[ 0.5010615711252651, 29.5, 29.375 ]
× Thanks for reading! Log in to continue. Enjoy more articles by logging in or creating a free account. No credit card required. Log in Sign up {{featured_button_text}} Omaha residents who want to cull old couches, desks and other bulky household items from their basements, garages and apartments no longer need to wait for spring. The city is holding its first fall cleanup in years, starting Oct. 19 in west Omaha and moving east after. Officials want people to drop off items too large to set out as garbage. All four weekends of fall cleanup will offer separate sites for dropping off tires and appliances to be recycled, as well as yard waste for people who would like to see it composted. The effort will cost taxpayers about $150,000. Much of that money pays local trash haulers to collect the items and take them to the landfill. This year’s hauler is Waste Management. Most of the people directing traffic, explaining what can be tossed and detailing recycling options at 16 sites will be neighborhood volunteers, as happens in the spring. Omaha residents can take items to any of the sites. But they will have fewer options this fall than the 80 sites the city oversaw for this spring’s more established cleanup period. Neighborhood associations, the roughly 100 groups that represent different parts of town, expressed less interest in staffing a second cleanup in the same year, city officials said.
Low
[ 0.47307692307692306, 30.75, 34.25 ]
Q: C# populate dictionary value I'm new to C# and I face a problem that I couldn't resolve. I listen to my Xiaomi gateway to get informations. These informations came as two type, report or heartbeat. Report is when something trigger the sensor, as for plug, when you turn it on or off : {"cmd":"report","model":"plug","sid":"158d000123f0c9","short_id":11119,"data":"{\"status\":\"off\"}"} Heartbeat is send every x minutes to say sensor is still there : {"cmd":"heartbeat","model":"plug","sid":"158d000123f0c9","short_id":11119,"data":"{\"voltage\":3600,\"status\":\"on\",\"inuse\":\"0\",\"power_consumed\":\"48\",\"load_power\":\"0.00\"}"} As you can see, report and heartbeat doesn't contain the same parameters as data. Here my plug class : [XiaomiEquipement("plug")] public class Plug { public string Model { get; set; } = "plug"; public string Sid { get; set; } public string Battery { get; set; } = "CR2450"; public int BatteryLevel { get; set; } public PlugReport Report { get; set; } } [XiaomiEquipement("plug_report")] public class PlugReport { public int Voltage { get; set; } public string Status { get; set; } public int InUse { get; set; } public float Power_Consume { get; set; } public float Load_Power { get; set; } } Ok, when I start my app, I ask gateway for all sensor and I enter them inside a double dictionary : dynamic Equipements = new Dictionary<string, Dictionary<string, dynamic>>(); And when I receive report or heartbeat, I search for the dictionary entry, modify it and send to my home automation system : Type modelReportType = Assembly.GetExecutingAssembly().GetTypes().SingleOrDefault(t => t.GetCustomAttribute<Response.XiaomiEquipementAttribute>()?.Model == data.Model + "_report"); dynamic test = Equipements[data.Model][data.Sid].Report; dynamic data = JsonConvert.DeserializeObject(Convert.ToString(data.Data), modelReportType); If data doesn't contain all property, it write them as default. What I want is that if a property isn't exist on the report/heartbeat, use dictionary value. For example, my dictionary contain : {"model":"plug","sid":"158d000123f0c9","short_id":11119,"data":"{\"voltage\":3600,\"status\":\"on\",\"inuse\":\"1\",\"power_consumed\":\"48\",\"load_power\":\"3.56\"}"} And I receive : {"cmd":"report","model":"plug","sid":"158d000123f0c9","short_id":11119,"data":"{\"status\":\"off\"}"} I want : {"model":"plug","sid":"158d000123f0c9","short_id":11119,"data":"{\"voltage\":3600,\"status\":\"off\",\"inuse\":\"1\",\"power_consumed\":\"48\",\"load_power\":\"3.56\"}"} And I get for the moment : {"model":"plug","sid":"158d000123f0c9","short_id":11119,"data":"{\"voltage\":3600,\"status\":\"off\",\"inuse\":\"0\",\"power_consumed\":\"00\",\"load_power\":\"0.00\"}"} I tried PopulateObject but it didn't work : dynamic data = JsonConvert.PopulateObject(Convert.ToString(data.Data), test); Anyone have an idea to modify my dynamic var without touching others properties ? Edit : some reports example : > {"cmd":"report","model":"weather.v1","sid":"158d0001a231ab","short_id":39499,"data":"{\"humidity\":\"5262\"}"} {"cmd":"report","model":"magnet","sid":"158d000159febe","short_id":40805,"data":"{\"status\":\"close\"}"} And for heartbeat : {"cmd":"heartbeat","model":"sensor_ht","sid":"158d0001a2c3e9","short_id":42820,"data":"{\"voltage\":3015,\"temperature\":\"2644\",\"humidity\":\"5454\"}"} {"cmd":"heartbeat","model":"magnet","sid":"158d000159febe","short_id":40805,"data":"{\"voltage\":3025,\"status\":\"open\"}"} As I said, I don't know in advance wich sensor it will be so everything must work in every case. That's why when I receive report/heartbeat, I searched for the report class base on model name, deserialize data part to an instance of this class. A: As for me, you shouldn't use dynamic. Instead of this, try to something like that. public class Data { [JsonProperty("status")] public string Status { get; set; } } public class ReportResponse { [JsonProperty("cmd")] public string Cmd { get; set; } [JsonProperty("model")] public string Model { get; set; } [JsonProperty("sid")] public string Sid { get; set; } [JsonProperty("short_id")] public int Short_id { get; set; } [JsonProperty("data")] public Dictionary<string, string> Data { get; set; } //public Data Data { get; set; } } var deserializeReponse = JsonConvert.DeserializeObject<ReportResponse>(rawResponse); When you are writing in this style, your code will be cleaner and exceptions, you're getting, will be more understandable P.S. When I need to generate objects from json, I use these two sites: Getting formatted json POCO generator
Low
[ 0.5145833333333331, 30.875, 29.125 ]
/*++ Copyright (c) 2006 Microsoft Corporation Module Name: qi_queue.cpp Abstract: <abstract> Author: Leonardo de Moura (leonardo) 2008-06-15. Revision History: --*/ #include "util/warning.h" #include "util/stats.h" #include "ast/ast_pp.h" #include "ast/ast_ll_pp.h" #include "ast/rewriter/var_subst.h" #include "smt/smt_context.h" #include "smt/qi_queue.h" namespace smt { qi_queue::qi_queue(quantifier_manager & qm, context & ctx, qi_params & params): m_qm(qm), m_context(ctx), m(m_context.get_manager()), m_params(params), m_checker(m_context), m_cost_function(m), m_new_gen_function(m), m_parser(m), m_evaluator(m), m_subst(m), m_instances(m) { init_parser_vars(); m_vals.resize(15, 0.0f); } qi_queue::~qi_queue() { } void qi_queue::setup() { TRACE("qi_cost", tout << "qi_cost: " << m_params.m_qi_cost << "\n";); if (!m_parser.parse_string(m_params.m_qi_cost.c_str(), m_cost_function)) { // it is not reasonable to abort here during the creation of smt::context just because an invalid option was provided. // throw default_exception("invalid cost function %s", m_params.m_qi_cost.c_str()); // using warning message instead warning_msg("invalid cost function '%s', switching to default one", m_params.m_qi_cost.c_str()); // Trying again with default function VERIFY(m_parser.parse_string("(+ weight generation)", m_cost_function)); } if (!m_parser.parse_string(m_params.m_qi_new_gen.c_str(), m_new_gen_function)) { // See comment above // throw default_exception("invalid new-gen function %s", m_params.m_qi_new_gen.c_str()); warning_msg("invalid new_gen function '%s', switching to default one", m_params.m_qi_new_gen.c_str()); VERIFY(m_parser.parse_string("cost", m_new_gen_function)); } m_eager_cost_threshold = m_params.m_qi_eager_threshold; } void qi_queue::init_parser_vars() { #define COST 14 m_parser.add_var("cost"); #define MIN_TOP_GENERATION 13 m_parser.add_var("min_top_generation"); #define MAX_TOP_GENERATION 12 m_parser.add_var("max_top_generation"); #define INSTANCES 11 m_parser.add_var("instances"); #define SIZE 10 m_parser.add_var("size"); #define DEPTH 9 m_parser.add_var("depth"); #define GENERATION 8 m_parser.add_var("generation"); #define QUANT_GENERATION 7 m_parser.add_var("quant_generation"); #define WEIGHT 6 m_parser.add_var("weight"); #define VARS 5 m_parser.add_var("vars"); #define PATTERN_WIDTH 4 m_parser.add_var("pattern_width"); #define TOTAL_INSTANCES 3 m_parser.add_var("total_instances"); #define SCOPE 2 m_parser.add_var("scope"); #define NESTED_QUANTIFIERS 1 m_parser.add_var("nested_quantifiers"); #define CS_FACTOR 0 m_parser.add_var("cs_factor"); } quantifier_stat * qi_queue::set_values(quantifier * q, app * pat, unsigned generation, unsigned min_top_generation, unsigned max_top_generation, float cost) { quantifier_stat * stat = m_qm.get_stat(q); m_vals[COST] = cost; m_vals[MIN_TOP_GENERATION] = static_cast<float>(min_top_generation); m_vals[MAX_TOP_GENERATION] = static_cast<float>(max_top_generation); m_vals[INSTANCES] = static_cast<float>(stat->get_num_instances_curr_branch()); m_vals[SIZE] = static_cast<float>(stat->get_size()); m_vals[DEPTH] = static_cast<float>(stat->get_depth()); m_vals[GENERATION] = static_cast<float>(generation); m_vals[QUANT_GENERATION] = static_cast<float>(stat->get_generation()); m_vals[WEIGHT] = static_cast<float>(q->get_weight()); m_vals[VARS] = static_cast<float>(q->get_num_decls()); m_vals[PATTERN_WIDTH] = pat ? static_cast<float>(pat->get_num_args()) : 1.0f; m_vals[TOTAL_INSTANCES] = static_cast<float>(stat->get_num_instances_curr_search()); m_vals[SCOPE] = static_cast<float>(m_context.get_scope_level()); m_vals[NESTED_QUANTIFIERS] = static_cast<float>(stat->get_num_nested_quantifiers()); m_vals[CS_FACTOR] = static_cast<float>(stat->get_case_split_factor()); TRACE("qi_queue_detail", for (unsigned i = 0; i < m_vals.size(); i++) { tout << m_vals[i] << " "; } tout << "\n";); return stat; } float qi_queue::get_cost(quantifier * q, app * pat, unsigned generation, unsigned min_top_generation, unsigned max_top_generation) { quantifier_stat * stat = set_values(q, pat, generation, min_top_generation, max_top_generation, 0); float r = m_evaluator(m_cost_function, m_vals.size(), m_vals.c_ptr()); stat->update_max_cost(r); return r; } unsigned qi_queue::get_new_gen(quantifier * q, unsigned generation, float cost) { // max_top_generation and min_top_generation are not available for computing inc_gen set_values(q, nullptr, generation, 0, 0, cost); float r = m_evaluator(m_new_gen_function, m_vals.size(), m_vals.c_ptr()); return std::max(generation + 1, static_cast<unsigned>(r)); } void qi_queue::insert(fingerprint * f, app * pat, unsigned generation, unsigned min_top_generation, unsigned max_top_generation) { quantifier * q = static_cast<quantifier*>(f->get_data()); float cost = get_cost(q, pat, generation, min_top_generation, max_top_generation); TRACE("qi_queue_detail", tout << "new instance of " << q->get_qid() << ", weight " << q->get_weight() << ", generation: " << generation << ", scope_level: " << m_context.get_scope_level() << ", cost: " << cost << "\n"; for (unsigned i = 0; i < f->get_num_args(); i++) { tout << "#" << f->get_arg(i)->get_owner_id() << " d:" << f->get_arg(i)->get_owner()->get_depth() << " "; } tout << "\n";); TRACE("new_entries_bug", tout << "[qi:insert]\n";); m_new_entries.push_back(entry(f, cost, generation)); } void qi_queue::instantiate() { unsigned since_last_check = 0; for (entry & curr : m_new_entries) { if (m_context.get_cancel_flag()) { break; } fingerprint * f = curr.m_qb; quantifier * qa = static_cast<quantifier*>(f->get_data()); if (curr.m_cost <= m_eager_cost_threshold) { instantiate(curr); } else if (m_params.m_qi_promote_unsat && m_checker.is_unsat(qa->get_expr(), f->get_num_args(), f->get_args())) { // do not delay instances that produce a conflict. TRACE("qi_unsat", tout << "promoting instance that produces a conflict\n" << mk_pp(qa, m) << "\n";); instantiate(curr); } else { TRACE("qi_queue", tout << "delaying quantifier instantiation... " << f << "\n" << mk_pp(qa, m) << "\ncost: " << curr.m_cost << "\n";); m_delayed_entries.push_back(curr); } // Periodically check if we didn't run out of time/memory. if (since_last_check++ > 100) { if (m_context.resource_limits_exceeded()) { break; } since_last_check = 0; } } m_new_entries.reset(); TRACE("new_entries_bug", tout << "[qi:instantiate]\n";); } void qi_queue::display_instance_profile(fingerprint * f, quantifier * q, unsigned num_bindings, enode * const * bindings, unsigned proof_id, unsigned generation) { if (m.has_trace_stream()) { m.trace_stream() << "[instance] "; m.trace_stream() << static_cast<void*>(f); if (m.proofs_enabled()) m.trace_stream() << " #" << proof_id; m.trace_stream() << " ; " << generation; m.trace_stream() << "\n"; } } void qi_queue::instantiate(entry & ent) { fingerprint * f = ent.m_qb; quantifier * q = static_cast<quantifier*>(f->get_data()); unsigned generation = ent.m_generation; unsigned num_bindings = f->get_num_args(); enode * const * bindings = f->get_args(); ent.m_instantiated = true; TRACE("qi_queue_profile", tout << q->get_qid() << ", gen: " << generation << " " << *f << " cost: " << ent.m_cost << "\n";); // NEVER remove coming_from_quant // "coming_from_quant" allows the logging of bindings and enodes // only when they come from instantiations enable_trace("coming_from_quant"); quantifier_stat * stat = m_qm.get_stat(q); if (m_checker.is_sat(q->get_expr(), num_bindings, bindings)) { TRACE("checker", tout << "instance already satisfied\n";); // we log the "dummy" instantiations separately from "instance" STRACE("dummy", tout << "### " << static_cast<void*>(f) <<", " << q->get_qid() << "\n";); STRACE("dummy", tout << "Instance already satisfied (dummy)\n";); // a dummy instantiation is still an instantiation. // in this way smt.qi.profile=true coincides with the axiom profiler stat->inc_num_instances_checker_sat(); disable_trace("coming_from_quant"); return; } STRACE("instance", tout << "### " << static_cast<void*>(f) <<", " << q->get_qid() << "\n";); expr_ref instance(m); m_subst(q, num_bindings, bindings, instance); TRACE("qi_queue", tout << "new instance:\n" << mk_pp(instance, m) << "\n";); TRACE("qi_queue_instance", tout << "new instance:\n" << mk_pp(instance, m) << "\n";); expr_ref s_instance(m); proof_ref pr(m); m_context.get_rewriter()(instance, s_instance, pr); TRACE("qi_queue_bug", tout << "new instance after simplification:\n" << s_instance << "\n";); if (m.is_true(s_instance)) { TRACE("checker", tout << "reduced to true, before:\n" << mk_ll_pp(instance, m);); STRACE("instance", tout << "Instance reduced to true\n";); stat -> inc_num_instances_simplify_true(); if (m.has_trace_stream()) { display_instance_profile(f, q, num_bindings, bindings, pr ? pr->get_id() : 0, generation); m.trace_stream() << "[end-of-instance]\n"; } disable_trace("coming_from_quant"); return; } TRACE("qi_queue", tout << "simplified instance:\n" << s_instance << "\n";); stat->inc_num_instances(); if (stat->get_num_instances() % m_params.m_qi_profile_freq == 0) { m_qm.display_stats(verbose_stream(), q); } expr_ref lemma(m); if (m.is_or(s_instance)) { ptr_vector<expr> args; args.push_back(m.mk_not(q)); args.append(to_app(s_instance)->get_num_args(), to_app(s_instance)->get_args()); lemma = m.mk_or(args.size(), args.c_ptr()); } else if (m.is_false(s_instance)) { lemma = m.mk_not(q); } else if (m.is_true(s_instance)) { lemma = s_instance; } else { lemma = m.mk_or(m.mk_not(q), s_instance); } m_instances.push_back(lemma); proof_ref pr1(m); unsigned proof_id = 0; if (m.proofs_enabled()) { expr_ref_vector bindings_e(m); for (unsigned i = 0; i < num_bindings; ++i) { bindings_e.push_back(bindings[i]->get_owner()); } app * bare_lemma = m.mk_or(m.mk_not(q), instance); proof * qi_pr = m.mk_quant_inst(bare_lemma, num_bindings, bindings_e.c_ptr()); proof_id = qi_pr->get_id(); if (bare_lemma == lemma) { pr1 = qi_pr; } else if (instance == s_instance) { proof * rw = m.mk_rewrite(bare_lemma, lemma); pr1 = m.mk_modus_ponens(qi_pr, rw); } else { app * bare_s_lemma = m.mk_or(m.mk_not(q), s_instance); proof * prs[1] = { pr.get() }; proof * cg = m.mk_congruence(bare_lemma, bare_s_lemma, 1, prs); proof * rw = m.mk_rewrite(bare_s_lemma, lemma); proof * tr = m.mk_transitivity(cg, rw); pr1 = m.mk_modus_ponens(qi_pr, tr); } m_instances.push_back(pr1); } TRACE("qi_queue", tout << mk_pp(lemma, m) << "\n#" << lemma->get_id() << ":=\n" << mk_ll_pp(lemma, m);); m_stats.m_num_instances++; unsigned gen = get_new_gen(q, generation, ent.m_cost); display_instance_profile(f, q, num_bindings, bindings, proof_id, gen); m_context.internalize_instance(lemma, pr1, gen); if (f->get_def()) { m_context.internalize(f->get_def(), true); } TRACE_CODE({ static unsigned num_useless = 0; if (m.is_or(lemma)) { app * n = to_app(lemma); bool has_unassigned = false; expr * true_child = 0; for (unsigned i = 0; i < n->get_num_args(); i++) { expr * arg = n->get_arg(i); switch(m_context.get_assignment(arg)) { case l_undef: has_unassigned = true; break; case l_true: true_child = arg; break; default: break; } } if (true_child && has_unassigned) { TRACE("qi_queue_profile_detail", tout << "missed:\n" << mk_ll_pp(s_instance, m) << "\n#" << true_child->get_id() << "\n";); num_useless++; if (num_useless % 10 == 0) { TRACE("qi_queue_profile", tout << "num useless: " << num_useless << "\n";); } } } }); if (m.has_trace_stream()) m.trace_stream() << "[end-of-instance]\n"; // NEVER remove coming_from_quant disable_trace("coming_from_quant"); } void qi_queue::push_scope() { TRACE("new_entries_bug", tout << "[qi:push-scope]\n";); m_scopes.push_back(scope()); SASSERT(m_context.inconsistent() || m_new_entries.empty()); scope & s = m_scopes.back(); s.m_delayed_entries_lim = m_delayed_entries.size(); s.m_instances_lim = m_instances.size(); s.m_instantiated_trail_lim = m_instantiated_trail.size(); } void qi_queue::pop_scope(unsigned num_scopes) { unsigned new_lvl = m_scopes.size() - num_scopes; scope & s = m_scopes[new_lvl]; unsigned old_sz = s.m_instantiated_trail_lim; unsigned sz = m_instantiated_trail.size(); for (unsigned i = old_sz; i < sz; i++) m_delayed_entries[m_instantiated_trail[i]].m_instantiated = false; m_instantiated_trail.shrink(old_sz); m_delayed_entries.shrink(s.m_delayed_entries_lim); m_instances.shrink(s.m_instances_lim); m_new_entries.reset(); m_scopes.shrink(new_lvl); TRACE("new_entries_bug", tout << "[qi:pop-scope]\n";); } void qi_queue::reset() { m_new_entries.reset(); m_delayed_entries.reset(); m_instances.reset(); m_scopes.reset(); } void qi_queue::init_search_eh() { m_subst.reset(); m_new_entries.reset(); } bool qi_queue::final_check_eh() { TRACE("qi_queue", display_delayed_instances_stats(tout); tout << "lazy threshold: " << m_params.m_qi_lazy_threshold << ", scope_level: " << m_context.get_scope_level() << "\n";); if (m_params.m_qi_conservative_final_check) { bool init = false; float min_cost = 0.0; unsigned sz = m_delayed_entries.size(); for (unsigned i = 0; i < sz; i++) { entry & e = m_delayed_entries[i]; TRACE("qi_queue", tout << e.m_qb << ", cost: " << e.m_cost << ", instantiated: " << e.m_instantiated << "\n";); if (!e.m_instantiated && e.m_cost <= m_params.m_qi_lazy_threshold && (!init || e.m_cost < min_cost)) { init = true; min_cost = e.m_cost; } } TRACE("qi_queue_min_cost", tout << "min_cost: " << min_cost << ", scope_level: " << m_context.get_scope_level() << "\n";); bool result = true; for (unsigned i = 0; i < sz; i++) { entry & e = m_delayed_entries[i]; TRACE("qi_queue", tout << e.m_qb << ", cost: " << e.m_cost << ", instantiated: " << e.m_instantiated << "\n";); if (!e.m_instantiated && e.m_cost <= min_cost) { TRACE("qi_queue", tout << "lazy quantifier instantiation...\n" << mk_pp(static_cast<quantifier*>(e.m_qb->get_data()), m) << "\ncost: " << e.m_cost << "\n";); result = false; m_instantiated_trail.push_back(i); m_stats.m_num_lazy_instances++; instantiate(e); } } return result; } bool result = true; for (unsigned i = 0; i < m_delayed_entries.size(); i++) { entry & e = m_delayed_entries[i]; TRACE("qi_queue", tout << e.m_qb << ", cost: " << e.m_cost << ", instantiated: " << e.m_instantiated << "\n";); if (!e.m_instantiated && e.m_cost <= m_params.m_qi_lazy_threshold) { TRACE("qi_queue", tout << "lazy quantifier instantiation...\n" << mk_pp(static_cast<quantifier*>(e.m_qb->get_data()), m) << "\ncost: " << e.m_cost << "\n";); result = false; m_instantiated_trail.push_back(i); m_stats.m_num_lazy_instances++; instantiate(e); } } return result; } struct delayed_qa_info { unsigned m_num; float m_min_cost; float m_max_cost; delayed_qa_info():m_num(0), m_min_cost(0.0f), m_max_cost(0.0f) {} }; void qi_queue::display_delayed_instances_stats(std::ostream & out) const { obj_map<quantifier, delayed_qa_info> qa2info; ptr_vector<quantifier> qas; for (entry const & e : m_delayed_entries) { if (e.m_instantiated) continue; quantifier * qa = static_cast<quantifier*>(e.m_qb->get_data()); delayed_qa_info info; if (qa2info.find(qa, info)) { info.m_num++; info.m_min_cost = std::min(info.m_min_cost, e.m_cost); info.m_max_cost = std::min(info.m_max_cost, e.m_cost); } else { qas.push_back(qa); info.m_num = 1; info.m_min_cost = e.m_cost; info.m_max_cost = e.m_cost; } qa2info.insert(qa, info); } for (quantifier * qa : qas) { delayed_qa_info info; qa2info.find(qa, info); out << qa->get_qid() << ": " << info.m_num << " [" << info.m_min_cost << ", " << info.m_max_cost << "]\n"; } } void qi_queue::get_min_max_costs(float & min, float & max) const { min = 0.0f; max = 0.0f; bool found = false; for (unsigned i = 0; i < m_delayed_entries.size(); i++) { if (!m_delayed_entries[i].m_instantiated) { float c = m_delayed_entries[i].m_cost; if (found) { min = std::min(min, c); max = std::max(max, c); } else { found = true; min = c; max = c; } } } } void qi_queue::collect_statistics(::statistics & st) const { st.update("quant instantiations", m_stats.m_num_instances); st.update("lazy quant instantiations", m_stats.m_num_lazy_instances); st.update("missed quant instantiations", m_delayed_entries.size()); float min, max; get_min_max_costs(min, max); st.update("min missed qa cost", min); st.update("max missed qa cost", max); #if 0 if (m_params.m_qi_profile) { out << "missed/delayed quantifier instances:\n"; display_delayed_instances_stats(out); } #endif } };
Mid
[ 0.569767441860465, 36.75, 27.75 ]
Q: How to avoid binding table knockout in computed array I have a Table where I load the values of arrayA wich one is ko.computed Array, wich one depends of the value of other arrayB. When I remove an element of array B, automatically the arrayA is updated with the new values of arrayB. The problem is when for example: <tbody data-bind="foreach: arrayA()"> <tr><td data-bind="text: $data.value"></td></tr> </tbody> javascript: arrayB.remove(data); When I do this operation in the html the table is reloaded with the previous values of arrayA without the element deleted + the new value of ArrayA. How can I avoid the reload of the table with previous values of arrayA + new value of arrayA computed? I want only reload the new values of computed arrayA without the previous content. Thanks in advance. A: If you create a ko.computed, it becomes a dependant observable, therefore any changes made to an observable that the computed is watching will cause it to update. This was the way it was designed to work, it's called the Dependency Chain. I would suggest looking into an alternative solution which doesn't use computed observables to achieve what you are looking for. http://knockoutjs.com/documentation/computedObservables.html
Low
[ 0.520100502512562, 25.875, 23.875 ]
Can Apple Pay Thwart the Credit Card Hacking Trend? Over the past year or so, we've seen some of the most pervasive and widespread credit card security breaches at many of the nation's largest retailers. With Apple's new Apple Pay service launching on Monday alongside a slew of security features, it comes at the perfect time. A troubling trendJust to get an idea of how bad these breaches are, here's a sample of some of the more prominent cyber attacks that have occurred within the past year, potentially impacting tens of millions of consumers. Adobe, 2.9 million card numbers (October 2013): A year ago, creative software specialist Adobe disclosed that it had suffered a cyber attack where hackers were able to access customer information as well as source code for certain Adobe products. Approximately 2.9 million Adobe customers had personal information stolen, including encrypted credit or debit card numbers. The company did not believe the attackers were able to access decrypted data. Target, 40 million card numbers (December 2013): This one was big. Target said last December that attackers had gained unauthorized access to its payment processing systems and upwards of 40 million credit and debit cards could have been compromised. A month later, the retailer said other personal information such as names, phone numbers, and addresses for up to 70 million customers could have also been stolen. Home Depot, 56 million card numbers (September 2014): As massive as the Target breach was, Home Depot's was even bigger. Much like Target, hackers used malware to gain access to Home Depot's payment data systems, resulting in 56 million card numbers being compromised over the span of 5 months. Kmart, undisclosed number of cards affected (October 2014): Just last week, Sears Holding's Kmart subsidiary said its systems were compromised by hackers that were able to access credit and debit card data information related to transactions between September and October. The company has yet to disclose specific numbers about how many cards may have been compromised, but it does not believe debit card PIN numbers were stolen. By no means is this a comprehensive list. Sadly, this troubling trend of escalating credit card breaches is unlikely to stop anytime soon. It's a constant game of cat-and-mouse between hackers and the cybersecurity industry. We may not ever be able to stop cyberattacks altogether, but at the same time there is hope that we can mitigate them. Here's how Apple can help. An encouraging trendOne of the key security mechanisms that Apple Pay will use is tokenization, whereby underlying credit card numbers are masked and transactions instead use a randomly generated number that can be discarded or made specific to that transaction. From a hacker's perspective, stealing tokenized data is useless. Apple Pay and Passbook. Source: Apple. Tokenization is not a new technology, but current implementations are cumbersome and not particularly user-friendly. However, the payment networks have recently proposed global standards and are putting a renewed emphasis on adoption. Apple brings its focus on the user experience to the table here, making the tokenization process automatic and simple for the user by taking care of everything behind the scenes. This lifts a tremendous burden off merchants and retailers, as storing sensitive credit card data will no longer be the onus it is today. As shown above, merchant networks are frequently compromised and the resulting data thefts are growing in scale. It's encouraging that the industry may finally accelerate the transition toward tokenization. Apple Pay will be one catalyst in driving adoption, but other payment services are also expected to embrace this powerful tool to combat cyberattacks. And it all starts on Monday. Next hit Apple product revealedApple recently revealed the product of its secret-development "dream team" -- Apple Watch. The secret is out, and some early viewers are claiming its everyday impact could trump the iPod, iPhone, and the iPad. In fact, ABI Research predicts 485 million of this type of device will be sold per year. But one small company makes Apple's gadget possible. And its stock price has nearly unlimited room to run for early in-the-know investors. To be one of them, and see where the real money is to be made, just click here!
Mid
[ 0.640176600441501, 36.25, 20.375 ]
The nephrotoxic effect of the ototoxic compound atoxyl. The arsenical compound atoxyl has been used in labyrinthine research because of its documented effects both on cells engaged in an active transport of ions (secretory epithelia) and sensory epithelia (cochlear hair cells and vestibular sensory cells type I and type II.) In the present experiments both the kidney and the structures of the inner ear were studied. The renal tubules were damaged by exposure to atoxyl. Tubular casts, haemorrhages (both in the tubules and in the renal calices) and tubular epithelial cell necrosis occurred. A common denominator in the ototoxic and the nephrotoxic actions of acute atoxyl poisoning might be a disturbance of the very active ion transport systems of the cells involved.
High
[ 0.6748299319727891, 31, 14.9375 ]
Postnatal touch stimulation acutely alters corticosterone levels and glucocorticoid receptor gene expression in the neonatal rat. Environmental manipulation early in life can alter the development of the hypothalamic-pituitary-adrenal (HPA) axis by mechanisms that are still unclear. The aim of the present work was to study the acute effects of postnatal touch stimulation, in an attempt to understand the mechanism by which touch stimulation early in life alters the HPA response to stress in adult animals. Rat pups were gently brushed for 15 min daily during the 1st postnatal week. Serum corticosterone levels were determined by radioimmunoassays, while glucocorticoid receptor (GR) gene expression was assayed by semiquantitative reverse transcriptase-polymerase chain reaction. Touch stimulation induced a significant decrease (30-36%) in serum corticosteroid secretion during the 1st and 2nd postnatal day as compared to the unstimulated group. In contrast, GR gene expression in the touch stimulation group was significantly increased in several brain areas such as the hippocampus (19-21%), frontal cortex (26-34%) and midbrain (15-24%). The results thus indicate that neonatal touch stimulation causes acute hormone- secretion and gene-expression changes within the period of stimulation. These changes may be the underlying cause for the permanent changes that have been observed in adult animals touch-stimulated as neonates.
High
[ 0.66824644549763, 35.25, 17.5 ]
A Citibank sign in front of one of the company's offices in California. Jefferies upgraded Citigroup's stock to buy from hold on Friday, saying the bank is headed toward revenue growth this year, as well as added benefits from growth in its Latin America business. "We upgrade ... given above consensus EPS estimates, a better understanding of the important [Latin America] story, and a still-attractive valuation," Jefferies said in a note to investors. "We believe '19 will show better rev. growth, stable costs/credit, and [over $20 billion in] capital return." Jefferies expects Citi will see improving revenue "growth in U.S. branded credit cards as customer mix improves and past headwinds abate." Jefferies also said Mexico's banking business will deliver better returns for Citi "after a few years of heavy investments." "We recently met with Jane Fraser, CEO of Latin America," Jefferies said. "[In that region] the pace of investment spending growth should begin to bend, with platform upgrades helping efficiency, new digital branches/ATMs offering better self-service options, and more partnering with external investments/insurance providers," Citigroup shares initially rose in premarket trading but ended the day down 0.3 percent at $64.14 a share. Jefferies has a $73 price target on Citi's stock.
Low
[ 0.525316455696202, 31.125, 28.125 ]
Without limiting the scope of the present invention, its background is described with reference to using optical fibers for communication in a subterranean wellbore environment, as an example. It is well known in the subterranean well completion and production arts that downhole sensors can be used to monitor a variety of parameters in the wellbore environment. For example, during a treatment operation, it may be desirable to monitor a variety of properties of the treatment fluid such as viscosity, temperature, pressure, velocity, specific gravity, conductivity, fluid composition and the like. Transmission of this information to the surface in real-time or near real-time allows the operators to modify or optimize such treatment operations to improve the completion process. One way to transmit this information to the surface is through the use of communication lines, such as one or more optical fibers, copper or metallic cables, or hydraulic or pressure lines. In addition, optical fibers may serve as sensors, where the optical fiber obtains distributed measurements related to a parameter along the length of the fiber. In a typical wellbore treating or stimulation operation, a lower portion of completion string including various tools such as sand control screens, fluid flow control devices, wellbore isolation devices and the like is permanently installed in the wellbore. The lower portion of the completion string may include various sensors, particularly, a lower portion of optical fiber. After the stimulation process, an upper portion of the work string including an upper portion of optical fiber is separated from the lower completion string and retrieved to the surface. This operation cuts-off communication between the lower string, which remains in place, and the surface. Accordingly, if information from the production zones is to be transmitted to the surface during later production operations, a connection to the lower optical fiber must be reestablished when the production tubing string is installed. It has been found, however, that wet-mating optical fibers in a downhole environment is very difficult. Difficulties due to lack of precision in the axial movement of the production string relative to the previously installed completion string are addressed, for example, in U.S. Pat. No. 8,122,967, to Richards, entitled Apparatus and Method for Controlling the Connection and Disconnection Speed of Downhole Connectors, which is hereby incorporated by reference for all purposes. Further disclosure regarding downhole connections can be found in U.S. Patent Application Publication 2012/0181045, to Thomas, entitled Apparatus and Method for Controlling the Connection and Disconnection Speed of Downhole Connectors, which is hereby incorporated by reference for all purposes. Additionally, wet-mate connections or wet-connects have become prevalent, especially in off-shore deep wells where it is difficult to provide for a dry-connection. A downhole communication line and a connector are often left in place, such as at the upper end of a completion string or production string. A second tool string is later lowered into the wellbore, also having a communication line and connector. The communication connectors are mated to provide an operable communication link between the tools. While it is possible to lower tool strings with all of the communication lines and corresponding conduits in place, there is increasing interest in wet-connect or wet-mate capabilities, that is, connections made in a wet environment. Further, it is often necessary or desirable to disconnect the tools and repeat the process, as later tools are inserted into the well, to speed and simplify equipment changes, replacement, or employ different tool configurations over time. Typically wet-connects are hydraulic or electric in nature, where a pressure-competent connection or an electrically isolated connection, respectively, must be created. These require a reasonably high degree of cleanliness and several methods are known to make these connections with varying success. With the increase in usage of fiber optic communication lines in particular, it has become critical to provide an especially “clean” connection between mating connectors. Fiber optic connections generally require relatively greater positional registration and cleanliness. Therefore, a need has arisen for apparatus and methods for wet-connecting optical fibers and other communication lines in a subterranean wellbore environment.
High
[ 0.6910112359550561, 30.75, 13.75 ]
Turing patterns from dynamics of early HIV infection. We have developed a mathematical model for in-host virus dynamics that includes spatial chemotaxis and diffusion across a two-dimensional surface representing the vaginal or rectal epithelium at primary HIV infection. A linear stability analysis of the steady state solutions identified conditions for Turing instability pattern formation. We have solved the model equations numerically using parameter values obtained from previous experimental results for HIV infections. Simulations of the model for this surface show hot spots of infection. Understanding this localization is an important step in the ability to correctly model early HIV infection. These spatial variations also have implications for the development and effectiveness of microbicides against HIV.
High
[ 0.673469387755102, 28.875, 14 ]
The present invention concerns a mobile telephony method and system. A system of the kind concerned is referred to as a xe2x80x9cGlobal System for Mobile communicationsxe2x80x9d (GSM). To describe it in a somewhat simplified manner, it includes mobile stations carried by respective users of the mobile stations, who are subscribers of the system. The mobile stations provide radio links with Mobile service Switching Centers (MSC). The MSCs have respective coverage areas. Each mobile station enables its user to be one party to a call linking it to at least one other party via a center visited by the mobile station. The center is the MSC in whose coverage area the mobile station is temporarily located. Beyond the center, the call in question travels through the remainder of the system and possibly, if the other party is not a subscriber of the system, via the Public Switched Telephone Network (PSTN). To enable call set-up and billing, each MSC stores the identity of each mobile station visiting the center and a Home Location Register (HLR) stores data concerning all the mobile stations of the system. The data in the HLR include the locations of the mobile stations, i.e. the identities of the MSC visited by the mobile stations. Many messages are sent to the HLR to ask it for information needed to set up calls passing through the system because at least one of the parties to be linked by such calls is a subscriber of the system. This is why the data in the HLR is individually updated each time a mobile station moves from one area to another and after each change of status of a user. The user""s status defines conditions under which the user has access to the system and is billed. It is part of the data concerning the user""s mobile station. The data is collectively backed up in another register. These operations are carried out periodically so that the back-up register does not contain locations of mobile stations which have moved since the last such operation. Some modifications, such as those concerning the status of some categories of users, are done in the back-up register first. Following any such modification in the back-up register, or following other incidents that can affect the validity of the data in the HLR, the data is collectively updated in an operation which is referred to as a xe2x80x9creset,xe2x80x9d that is based on data from the back-up register. The reset is reported to the MSC. On the first contact of a mobile station with the MSC it is visiting after a reset, the center sends the HLR a message to harmonize the data concerning the mobile station in the MSC and in the HLR. The location of the mobile station is updated in the HLR on the basis of the identity of the center sending the message and the data defining the status of the user of the mobile station is updated in the center from data contained in the HLR. Prior art systems of the above kind have the disadvantage that, when a system of this kind is requested to set up a call, call set-up is sometimes impeded by unavailability of the system, in other words the call request that requests call set-up is not completed even though the called party is available. An aim of the present invention is to provide a simple and low-cost way to limit such unavailability of the system. With this aim in view, the invention consists in a method which conventionally includes operations performed by a HLR containing respective data on a plurality of mobile stations. Each such operation consists in exploiting a message triggering the operation. To be able to select some of the messages in order to be able to exploit them in an overload situation, the HLR assigns each message a priority level chosen from a scale of such levels. Some of the operations effected by the HLR are collective updates of mobile station data. Each such update constitutes a reset and is reported to a plurality of MSCs each containing the data of the mobile stations located in the area of the center. Other operations are individual updates. Each such update consists in exploiting a message transmitted by a MSC and updates in the HLR the data of a mobile station constituting a station to which the message relates. Some of the individual updates are visit updates. A message requesting a visit update is transmitted by a MSC to exploit a visit notification reporting the arrival of the mobile station to which the message relates in the area of the center, the message constituting a visit request. Other individual updates are referred to as updates after a reset. A message requesting an update after a reset is transmitted by a MSC to exploit a contact between the center and the mobile station to which the message relates. It constitutes a request after a reset. It is transmitted when three conditions are combined: the mobile station is in the area of the center, the contact is after a preceding message transmitted by the center relating to the mobile station and requesting a visit update, and the contact is a first contact between the mobile station and the center since a reset was reported to the center. In the method of the invention the MSCs introduce a difference between visit update requests and update after a reset requests detectable by the HLR and by means of which the HLR assigns update after a reset requests a lower priority level than visit update requests. In the context of the present invention, it has been found that many instances of unavailability in prior art systems were related to the bit rate of messages sent to the HLR by the MSCs, the bit rate sometimes exceeding the HLR""s capacity to exploit such messages. It has been realized that abstaining from or delaying the exploitation of such messages would lead directly to only a few instances of unavailability of the system if such abstention were in practice limited to messages received by the HLR after a reset and at the same time as other messages needed to set up a call currently requested or requested afterwards. More particularly, it has been realized that there are then many fewer instances of unavailability than occur on abstaining from responding to the other messages in prior art systems. The present invention therefore avoids the additional cost that would be generated by increasing the HLR""s capacity for exploiting the messages it receives, at least when the increase in capacity would be sufficient to eliminate instances of unavailability linked to messages sent after a reset.
Mid
[ 0.5626477541371151, 29.75, 23.125 ]
Wythe A wythe is a continuous vertical section of masonry one unit in thickness. A wythe may be independent of, or interlocked with, the adjoining wythe(s). A single wythe of brick that is not structural in nature is referred to as a veneer. A multiple-wythe masonry wall may be composed of a single type of masonry unit layered to increase its thickness and structural strength, or different masonry units chosen by function, such as an economical concrete block serving a structural purpose and a more expensive brick chosen for its appearance. References Category:Masonry
High
[ 0.680161943319838, 31.5, 14.8125 ]
The present invention relates to a method of producing radiation sensors, in particular for infrared radiation, with an absorber for the radiation to be measured and a plurality of thermoelements for measuring the absorbed radiation-induced heating of the radiation absorber integrated into a semiconductor substrate. These methods can be used in particular for production of radiation absorbers with a plurality of sensor elements integrated at small distances on a substrate. Such a radiation sensor with a plurality of sensor elements and a method of producing same are described, for example, by I. H. Choi and K. D. Wise, xe2x80x9cA Linear Thermopile Infrared Detector Array with On-Chip Multiplexing,xe2x80x9d IEEE Trans Electron. Devices (September 1985), pages 132 through 135. This article describes a method whereby boron is diffused into a less than 100 greater than oriented silicon substrate in a ring pattern from the front side, a membrane of SiO2 and Si3N4 is created on the front side, and then openings are cut through the substrate from the rear side of the substrate by anisotropic wet etching. These openings end on the front side of the substrate within the ring-shaped areas doped with boron. This forms openings in the substrate that are closed only by the thin membrane. A radiation absorber is formed on the membrane in each of these openings. A plurality of thermoelements connected in series each has a hot contact in the vicinity of the radiation absorber and a cold contact on the remaining silicon substrate which functions as a heat sink. This known manufacturing method has a number of disadvantages. The anisotropy of wet etching occurs due to the fact that the etching process takes place at different rates on the different crystal faces of the silicon substrate. The etching rate is lowest on a surface with less than 111 greater than orientation. Therefore, in wet etching of a less than 100 greater than surface through an opening in a mask, a recess is formed in the surface, its side walls having less than 111 greater than orientations and being inclined at an angle of approx. 54xc2x0 to the less than 100 greater than surface. The bottom surface of the resulting recess is smaller the further the etching operation proceeds into the material, until it reaches a depth where the opposite walls of the recess abut against one another. Therefore, to produce a small opening at the level of the membrane, a mask with a much larger opening must be formed on the opposite side of the substrate. Fluctuations in thickness between different substrates or within a substrate have a critical effect on the dimensions of the opening produced in the membrane due to the inclined orientation of the walls. It is extremely difficult to produce precision openings with small dimensions in relation to the thickness of the substrate, because fluctuations in the thickness of the substrate have a great influence on their size. This problem is counteracted in the cited literature by the diffused ring made of boron. The boron-doped material is not attacked by etching, so the opening in the mask on the rear side of the substrate can be larger than would be necessary in view of the crystal geometry of the substrate to obtain a given opening size in the membrane. The size of the finished opening is then determined by the diameter of the undoped region inside the boron-doped ring. However, one unavoidable consequence of this method is that a portion of the rear side of the boron-doped ring which has diffused into the substrate is exposed so that the thickness of the substrate in the immediate vicinity of the opening after etching is determined by the thickness of the ring, which amounts to only approx. 20 xcexcm. Although a greater ring thickness could be achieved, this would be possible only through long diffusion times at very high process temperatures. This leads to the problem that, in the finished infrared sensor, the boron-doped ring may be eroded to varying extents by the etching process, resulting in variations in the quality of heat transfer from the cold contacts of the thermoelement over the ring into the solid silicon substrate, which can lead to systematic measurement errors. Another radiation sensor with a silicon substrate, a radiation absorber arranged on a membrane over an opening in the substrate and a plurality of thermoelements with a hot contact in the vicinity of the radiation absorber and a cold contact on the silicon substrate is known from German Published Patent Application No. 41 02 524. With this sensor, the walls of the opening also diverge toward the side of the substrate facing away from the membrane in the manner characteristic of anisotropic wet etching. The diameter of the opening is much greater than the thickness of the substrate. The present invention provides methods of producing radiation sensors which make it possible to produce radiation sensors with precisely reproducible properties and permit the production of radiation sensors with a plurality of individual sensor elements which can be arranged at a small distance from one another, which is independent of the thickness of the substrate used. According to a first aspect of the present invention, these advantages are achieved by the steps of forming an opening in the membrane in the specified area and etching the semiconductor substrate through this opening. This opening makes it possible to produce the required cavity below the radiation absorber from the front side of the substrate, thus eliminating the necessity of etching through the entire substrate in a time-consuming process. This eliminates possible sources of error in positioning the etching mask on the rear side of the substrate in relation to the position of the radiation absorber, as would otherwise be necessary; there is no danger of extensive etching beneath the edge areas of the opening where cold contacts of the thermoelement can be mounted, which would thus result in poor thermal contact with the solid silicon substrate; furthermore, there may be solid unetched semiconductor material a short distance below the radiation absorber, which increases the total mass of the heat sink formed by the semiconductor material. According to a first variant of this method, wherever a recess is to be created, the semiconductor material is made porous in that area prior to deposition. This can be accomplished by an anodic oxidation, e.g., with an HF electrolyte, in an electrochemical process in which the wafer functions as the anode with respect to the electrolyte. This region, which has been made porous, can then be etched out selectively in a subsequent etching step. This etching step preferably takes place after the membrane has been deposited and the thermoelements have been structured on the membrane. To determine the area to be etched out, in this case the surface of the semiconductor substrate is preferably masked with a protective layer made of a material which is resistant to the agent used to make the semiconductor porous. This material may be chromium or gold, for example. As an alternative, the areas to be etched out can be determined by low n-type doping (nxe2x88x92 doping) of the areas that are not to be etched away, so that in contrast with the p-doped substrate and any n++ doped areas, they are not attacked by the agent used to make the semiconductor porous. The etching step which follows the step of making the semiconductor porous may be a traditional wet etching step. The thermoelements are preferably structured on the deposited membrane before the etching step. No special masking is necessary for the etching step if the material to be etched out has been prepared by making it porous. According to a second variant of this method, no preparation of the area to be etched out by making it porous is necessary, and instead the area to be etched out is determined only by the formation of the opening in the membrane. The recess can be produced easily by isotropic etching of the substrate area behind the opening. This isotropic etching can be performed by electrochemical anodizing followed by dissolving, by direct electrochemical dissolution or by isotropic wet etching, e.g. HNA (HF+NHO3+CH3COOH). In this second variant, however, dry etching methods are preferred, such as plasma etching or spontaneous dry etching, because gaseous etching media can penetrate more easily than liquid media into the area to be etched away behind the opening, and because the mass exchange through the opening is more effective. In particular, plasmas of F2 in Ar, SF6 or NF3 may be used for plasma etching. Gases such as XeF2, CIF3 or BrF3 which erode silicon immediately on coming in contact with it in a violent reaction, forming volatile SiF4, may be used for spontaneous dry etching. According to a second aspect of the present invention, a method is to be provided of producing a radiation sensor on a semiconductor substrate by performing the steps of establishing at least one area on a first surface of the substrate, in which an opening is to be created in the substrate, depositing a membrane on the first surface of the substrate, applying a radiation absorber to the membrane, applying thermoelements with a hot contact in thermal contact with the radiation absorber and a cold contact in thermal contact with the semiconductor substrate, and applying a mask to a second surface of the semiconductor substrate (the rear side) which is opposite the first surface. According to this method, the mask has an opening congruent with each area thus determined, and the second surface is treated by anisotropic dry etching until the silicon substrate has been etched away in the areas determined. Suitable anisotropic dry etching methods are described in German Published Patent Application No. 42 41 045. The plasma etching processes described there make it possible to produce openings in the semiconductor substrate with walls almost perpendicular to its surface, thus eliminating the necessity for making the openings in the etching mask on the second surface of the substrate much larger than the finished openings by including a lead produced later in the substrate at the level of the membrane. Not only does this eliminate possible sources of error in producing and positioning the mask, it also yields the possibility of arranging the individual openings at a much smaller distance from one another which no longer necessarily depends on the thickness of the substrate. The cross-sectional dimensions of the openings in the semiconductor substrate are constant over the thickness of the substrate, so that there are no losses of surface area and a dense packing of openings is possible. It is readily possible to produce an opening in a substrate up to 700 xcexcm thick merely by anisotropic dry etching as described in the aforementioned publication. According to two advantageous embodiments of the method, however, the openings are produced in two steps. In the first embodiment, first a contiguous area of the substrate is eroded by etching, thereby producing the second surface on which the actual etching mask is applied. Any desired etching method, preferably a rapid etching method, can be used for this etching. As an alternative, dry etching itself may be subdivided into two steps, with etching being performed only in the congruent openings in the mask in the first step and then performed on a contiguous area having several congruent openings. Due to the first step, the congruent openings have a certain xe2x80x9cprojectionxe2x80x9d over the contiguous area surrounding them, and this is preserved in the next step of etching the contiguous area. The result of these two methods is a substrate with a contiguous recessed surface on the rear surface of the substrate and a plurality of openings extending from the surface to the membrane on the front surface of the substrate. The individual openings are separated by webs of semiconductor material, although the thickness of these webs is not that of the original substrate, but it is constant and reproducible for each individual opening, and thus for each individual radiation absorber arranged in such an opening it forms a uniform thermal tie to the heat sink formed by the semiconductor substrate. To form an effective heat sink, the webs of semiconductor material should be at least 50 xcexcm thick. Etching should thus proceed at least to this depth in the congruent openings. At a high aspect ratio of the openings, it becomes more and more difficult for the material etched away to be removed from the openings, and furthermore, on reaching the membrane, there is the risk of notching at the interface between the semiconductor substrate and the membrane, so it may be expedient to limit the depth of etching in the congruent openings, e.g., to a value of 100 or 200 xcexcm. A two-layer mask is preferably used for two-step dry etching, with an opening that corresponds to the contiguous area being formed in a first masking layer and with the second layer containing the congruent openings. In the transition between the two etching layers, only the second layer of the mask need be removed selectively. For example, an advantageous combination would be to use photoresist masking and SiO2 as a hard mask or a nitride oxide layer system such as that described in German Published Patent Application No. 41 29 206.
Low
[ 0.507900677200902, 28.125, 27.25 ]
Campaign 2016: Modest Interest, High Stakes Wide Gaps in GOP Candidate Visibility; Small Gaps in Support Survey Report The 2016 presidential campaign has gotten off to a slow start with voters. A majority of registered voters (58%) say they have given at least some thought to candidates who may run for president in 2016, but that is 10 points lower than at a comparable point in the 2008 campaign – the last time both parties had contested nominations. Yet, even at this early stage, the vast majority of voters (87%) say they care a good deal about who wins the presidency, and 72% say they care which party prevails. The latest national survey by the Pew Research Center, conducted March 25-29 among 1,500 adults, including 1,097 registered voters, finds stark differences in the way the possible Democratic and Republican fields are shaping up. Among the potential set of Democratic candidates, Hillary Clinton has a wide lead over other possible contenders, with fully 59% of Democratic and Democratic-leaning registered voters saying there is a good chance they would vote for her (86% say there is at least some chance they would). By contrast, no Republican stands out among the party’s crowded field: Of 10 possible GOP contenders asked about in the current survey, no candidate garners solid support from more than a quarter of Republican and Republican-leaning registered voters. Though Jeb Bush is widely known by Republican voters, just 23% say there is a good chance they would vote for him, while 41% say there is some chance; 25% say there is no chance they would vote for the former Florida governor. Mike Huckabee has similar levels of both recognition and support among Republican voters. By comparison, Marco Rubio, Scott Walker, Ted Cruz, Rand Paul and Ben Carson are all less well known, yet about as many GOP voters say there is a good chance they would vote for each of them as say this about Bush. Walker and Carson, in particular, are relatively unfamiliar potential candidates in the GOP race, but they fare well among the subset of Republican voters who have heard of them. Just 57% of Republican and Republican-leaning voters have heard of Wisconsin Gov. Walker, yet 23% say there is a good chance they would vote for him and just 7% say there is no chance. And Carson has name recognition only among 48% of GOP voters, but 21% say there is a good chance he would get their vote while just 5% say there is no chance of this. Chris Christie sits on the other end of the spectrum. Though relatively well-known (83% of GOP voters have heard of the New Jersey governor), there is little potential support for a Christie candidacy: Just 9% of GOP voters say there is a good chance they would vote for him, while nearly four-in-ten (39%) say there is no chance. In contrast to the tight Republican field, Hillary Clinton enjoys broad support among Democratic voters. Potential rivals for her party’s nomination have much softer levels of support among Democrats. Fully 59% of Democratic voters say there is a good chance they would vote for Clinton, while an additional 28% say there is some chance (just 10% say there is no chance). Though Joe Biden is similarly well-known, just 22% say there is a good chance they would vote for him, while 47% say there is some chance of this (23% say there is no chance). About two-in-ten (21%) also say there is a good chance they would vote for Elizabeth Warren, although only 63% of Democratic voters have heard of her. (Warren has frequently said she is not running for the office.) The remainder of the potential Democratic field is much less well-known, with fewer than half of Democratic voters having heard of Bernie Sanders, Jim Webb or Martin O’Malley. Though there is the prospect of having both Hillary Clinton and Jeb Bush — two candidates related to recent presidents — in the 2016 race, there is little sign that this is a concern among their respective constituencies. Three-quarters (75%) of Republican voters say it doesn’t really bother them that the Bush family continues to play a large role in the GOP, while fully 88% of Democratic voters say they aren’t bothered by the Clintons’ continued role in the Democratic Party. At this stage in the race, 52% of voters say it is more important to them that a presidential candidate will compromise with the other party than that he or she will stick to their core values and positions (41%). Democratic voters, in particular, place value on candidates who will make compromises: 63% say this, compared with 31% who prioritize sticking to core values. Republican voters, by contrast, are more likely to value candidates who stick to their core values (57% vs. 35%). Within the party coalitions there are differences on these measures among each candidate’s supporters, particularly within the GOP. Among Republican voters, those who say there is a good chance they would vote for Bush are more supportive of a candidate who would compromise with the other party than are supporters of Cruz, Carson, Walker, or Paul. And half of voters (50%) say “experience and a proven record” is more important to them than “new ideas and a different approach” (43%). Republicans (59%) are more likely than either Democrats (46%) or independents (48%) to prioritize a proven record. As the 114th Congress nears its 100-day mark, overall views of the institution remain at a near-record low: Today, just 22% of Americans have a favorable view of Congress. Views of the GOP Congressional leadership are little changed over the last few months as well; Mitch McConnell continues to be viewed more unfavorably (38%) than favorably (23%), though many Americans say they have no opinion of the Senate majority leader. And John Boehner — who is substantially better known than his Senate counterpart — is viewed much more unfavorably (51%) than favorably (22%). Overall views of Barack Obama are little changed since the beginning of the year. Currently 46% approve of his job performance, while 47% disapprove. About half (51%) have a favorable view of Obama personally, while 46% have an unfavorable impression. These ratings have changed little since the beginning of last year. An Early Look the 2016 Campaign With the 2016 election more than a year and a half away, most voters have yet to fully engage with it—just 26% say they have given a lot of thought to the 2016 candidates, while 58% say they have given at least some thought. Overall, there is less interest in the campaign today than there was in March 2007 (when 68% had given the candidates at least some thought). At that stage of the 2008 election, all of the major candidates from both parties had formally announced their candidacies. As of today, just one 2016 candidate—Ted Cruz—has formally declared an intention to run. Today, Democrats, Republicans, and independents are about equally likely to say they have given thought to 2016 candidates. In March 2007, Democratic voters were somewhat more attentive to the election than their Republican counterparts (71% said they had given it at least some thought, compared with 64% of GOP voters). Among all registered voters, Hillary Clinton registers the greatest share of support. One-third (33%) of voters say there is a good chance they would vote for her, while an additional 19% say there is at least some chance. No more than 13% say there is a good chance they would vote for any single other candidate. However, among the field of possible candidates beyond Clinton, there is little differentiation at this early stage. This is particularly the case when it comes to possible GOP contenders: Jeb Bush, Mike Huckabee, Rand Paul, Ted Cruz, Marco Rubio, Scott Walker and Ben Carson all have about one-in-ten registered voters saying there is a good chance they would vote for them. At this stage, there is considerable variance in awareness of potential candidates. Virtually all voters have heard of Clinton, and Biden and Jeb Bush also are widely known. Among the other Republicans, Mike Huckabee, Chris Christie, Rand Paul, Ted Cruz, Rick Perry, and Marco Rubio are familiar to at least two-thirds of voters. But fewer than half of all voters have heard of Bobby Jindal, Ben Carson or Scott Walker. Among the other Democrats, just over half of voters have heard of Elizabeth Warren and less than a third say they are familiar with either Jim Webb or Martin O’Malley. The GOP Field No single GOP contender emerges as the clear preference of Republican and Republican-leaning registered voters. Jeb Bush is by far the best known among GOP voters, followed by Mike Huckabee, Chris Christie and Rand Paul. Jeb Bush and Mike Huckabee lead the pack, both in overall name recognition and in the proportion of GOP voters who say they would consider voting for each: 63% of Republican voters say there is at least some chance they would vote for Bush (23% good chance), with about as many (61%) saying this about Huckabee. Smaller majorities of GOP voters also say there is at least some chance they would vote for Rand Paul (57%), Marco Rubio (55%) and Ted Cruz (54%). Republican voters’ overall support for Scott Walker (44% at least some chance) and Ben Carson (39% at least some chance) lags behind these other candidates, but that is largely because of their relative unfamiliarity within the GOP base. Both men are known by fewer than six-in-ten Republicans; yet among those who are familiar with each candidate, both men have more support than other candidates. All of the possible Republican candidates asked about are better known among conservative Republican voters than among the party’s moderates and liberals. And most candidates draw more support among conservatives, although the differences are greater for some than others. For example, three-in-ten conservative Republican voters say there is a good chance they would vote for Ted Cruz (30%) or Scott Walker (30%), while just 10% of moderate and liberal Republicans say this about either man. About twice as many GOP conservatives (25%) as moderates and liberals (13%) say there is a good chance they would support Ben Carson. There is a narrower gap in support for Jeb Bush: 25% of conservative Republican voters and 17% of moderate and liberal Republican voters say there is a good chance they would vote for the former Florida governor. Chris Christie is relatively well known among both conservative and moderate and liberal Republican voters, but draws little support from either group. Just 11% of conservative Republicans and 6% of moderate and liberal Republicans say they see a good chance of supporting Christie; 40% and 37%, respectively, say there is no chance they would vote for the New Jersey governor. 2016 Shaping up as a Different Kind of Race for the GOP Currently, seven GOP presidential candidates draw potentially strong support from 20% or more Republican and Republican-leaning voters. At a slightly later point in the 2012 campaign (May 2011), there were only two candidates – Mitt Romney and Sarah Palin – for whom 20% or more GOP voters said there was a good chance of voting. Similarly, in February 2007, only two GOP candidates surpassed the 20% mark: 34% of Republican and Republican-leaning voters said there was a good chance they would support Rudy Giuliani and 22% said the same about John McCain. In February 1999, about half of Republican voters saw a good chance of voting for George W. Bush (52%) in the 2000 election, and 35% said there was a good chance they would vote for Elizabeth Dole. The Democratic Field An overwhelming majority of Democratic and Democratic-leaning registered voters (86%) say there is either a good chance (59%) or some chance (28%) they would vote for Hillary Clinton. A majority (69%) of Democrats say there is at least some chance they would support Joe Biden, though just 22% say there is a good chance they would do so. About as many Democratic voters (21%) say there is a good chance they would vote for Senator Elizabeth Warren, despite being substantially less well known than the vice president. Bernie Sanders, Jim Webb and Martin O’Malley are little recognized, and fewer than a quarter of Democratic voters currently say there is any chance they would vote for them. Though support for Clinton is widespread among Democratic voters, there is a gender gap in the strength of her support among white Democratic voters. Overall, 62% of women and 54% of men say there is a good chance they would vote for Clinton. But these differences are particularly evident among whites: 61% of white Democratic women say there is a good chance they would vote for Clinton compared with 43% of white Democratic men. Conversely, more white Democratic men (45%) than women (26%) see some chance of voting for Clinton. Only about 10% in each group sees no chance of voting for her. Support for Clinton is greater among liberal Democratic voters (66% of whom say there is a good chance they would vote for her) than among conservative and moderate Democratic voters (53% say this). Still, large majorities of both groups (91% of liberal Democratic voters and 83% of conservative and moderate Democratic voters) say there is at least some chance they would cast a ballot for her. Joe Biden garners about equal levels of support from both liberals and moderates in the party, while Elizabeth Warren has greater support among the party’s liberals. Nearly a third (32%) of liberal Democratic and Democratic leaning voters say there is a good chance they’d vote for her, while just 14% of conservative and moderate Democratic voters say this. To some extent, this reflects liberals’ greater familiarity with Warren: 70% of liberal Democratic voters have heard of Warren, compared with 56% of conservative and moderate Democrats. 2016 Democratic Primary in Historical Perspective Democrats’ early preferences for the 2016 election are similar to those at a comparable point in the 2008 election in one respect: A large share of Democratic and Democratic-leaning voters say there is a good chance they would vote for Hillary Clinton. Nearly six-in-ten (59%) Democratic and Democratic-leaning voters say that today; 52% said that at a comparable point in the campaign eight years ago. But the Democratic field in 2007 was very different than it is today. Currently, about one-in-five Democrats say there is a good chance they would vote for Joe Biden (22%) if he were to decide to run and about as many say the same about Elizabeth Warren (21%), who has repeatedly indicated no interest in being a candidate. At about this point in 2007, Clinton, Barack Obama and John Edwards had all announced their candidacies; 32% of Democrats said there was a good chance they would support Obama and 22% said there was a good chance they would vote for Edwards. Views of Candidate Qualities Long-standing partisan differences in attitudes about political compromise are reflected in views of important qualities for presidential candidates. Overall, 52% of registered voters say it is more important for a presidential candidate to compromise with the other party; 42% say it is more important that a candidate sticks to their core values and positions. By roughly two-to-one (63% to 31%), Democratic voters value a candidate who compromises. Republican voters, by 57% to 35%, prefer someone who adheres to core values and positions. In recent years, Democrats have been consistently more likely than Republicans to prefer elected officials who make compromises. (For a recent example, see our post-election survey, conducted after the GOP’s midterm victories.) Large majorities of both liberal Democratic voters (66%), and conservative and moderate Democratic voters (60%), say it is more important for a candidate to compromise than to stick to core positions. Republican voters are internally divided: 64% of conservative Republicans say it is more important for a candidate to stick to core values; just 30% prefer a candidate who makes compromises. Moderate and liberal Republican voters are split (44% stick to core values, 45% compromise). There also are differences among GOP voters based on candidate preferences. Among all Republican and Republican-leaning registered voters, those who say there is a good chance they will vote for Jeb Bush are divided over whether it is more important for a candidate to stick to core positions (48%) or compromise with the other party (46%). Majorities of those who say there is a good chance they will vote for Ted Cruz (75%), Scott Walker (69%), Rand Paul (68%), Ben Carson (66%), Mike Huckabee (61%) and Marco Rubio (58%) say it is more important for a candidate to stick to their positions than to compromise. Republican and Democratic voters also differ over whether it is more important for a presidential candidate to have experience and a proven record or new ideas and a different approach. In general, more GOP voters prefer a candidate who has experience (59%) to one who has news ideas and different approach (33%). Among Democrats, nearly identical percentages value new ideas (48%) and experience (46%). Age is a bigger factor than partisanship in opinions about the relative importance of experience and new ideas. Voters younger than 30 are the only age group to prefer a candidate with new ideas (56% say this, while 38% say they would prefer a candidate with experience and a proven record). There is little variance in these views among Democratic voters who express a good chance of voting for different candidates. For example, about half (47%) of those who see a good chance of voting for Hillary Clinton value experience over new ideas, as do 50% of those who say there would be a good chance of supporting Elizabeth Warren and 45% of those who see a good chance of voting for Joe Biden. Opinions of Obama, Congress and GOP Leaders Obama’s approval rating is little changed since the start of the year. But through much of 2014, Obama’s job rating hovered around 44%. As has been the case for much of his presidency, Obama’s personal favorability ratings are somewhat more positive than views of his job performance. In the current poll, a somewhat greater share (51%) have a favorable opinion of Obama than approve of his job performance. The public’s views of Congress continue to hover near all-time lows. Just 22% have a favorable opinion of Congress — equal to its rating last December — while 72% feel unfavorably about Congress. The share giving Congress a positive rating dropped below 30% in March 2010 – coinciding with the passage of the Affordable Care Act — and has remained there nearly every survey since. With the GOP now in control of both houses of Congress, Republicans’ views of the institution are only slightly more positive than Democrats’: 29% of Republicans have a favorable opinion of Congress, compared with 22% of Democrats (and 19% of independents). About half of the public (51%) express unfavorable views of Speaker of the House John Boehner, while 22% have a favorable opinion of him (26% hold no opinion). A smaller share of the public has an opinion of Senate Majority Leader McConnell; however, about as many rate him favorably as Boehner (23%) and fewer (38%) have an unfavorable opinion of him (39% have no opinion). In a Pew Research survey last December, the Democratic congressional leaders also received negative ratings. Nearly half of the public (47%) had an unfavorable view of House Minority Leader Nancy Pelosi and 27% were favorable, though Democrats rated her positively on balance. Senate Minority Leader Harry Reid, who recently announced his upcoming retirement, was rated unfavorably by 41% of the public and favorably by 20%. In a change from late 2014, Boehner’s ratings among Republicans and Republican leaners are now more unfavorable (43%) than favorable (34%). Republicans and leaners had rated him either positively or about even in eight previous Pew Research Center surveys since the Republicans won back the House in November 2010. About Pew Research Center Pew Research Center is a nonpartisan fact tank that informs the public about the issues, attitudes and trends shaping the world. It conducts public opinion polling, demographic research, media content analysis and other empirical social science research. Pew Research Center does not take policy positions. It is a subsidiary of The Pew Charitable Trusts.
Low
[ 0.483271375464684, 32.5, 34.75 ]
We received a wide spectrum of shades from interior designers as their choices for the reigning colours this year. We have been introduced to some brilliant hues that will decorate our homes and offices in the near future. Offcourse, the choices are very much reflective of the designers’ personality, places where they live and their target homes and audience. Colours are symbolic and spiritual; colours are energising and passionate; the messages they convey change with culture, country and the context of their use. Our living environments also influence our colour preferences; with residents of warmer climates preferring warm tones while those from cooler places favouring cool shades. An Australian or Middle Eastern home, for example, may require a generous infusion of bold, bright shades, whereas, a Swiss homeowner may desire something more subtle. Children love bright, cheery colours and are happier around possibly reds, yellows and blues. A Kid's designer is more inclined to choose a bolder palette than a designer who works closely with businesses. In keeping with Pantone’s choice, Green has emerged as the most popular hue in our online poll, with shades of Green beating the rest as preferred choice with designers across the board. As the natural greenery around us shrinks, and much of the population move towards grey, dull, urban set-ups, homeowners are keen to infuse some zest and revive their lives with generous doses of Green. Green is the most commonplace neutral that combines wonderfully with many other shades to create refreshing décors. Apart from Greenery, Pantone’s Kale has emerged as a hot favourite. Hues of Cool Blue come a close second with Denim Drift and True Navy forming part of the desired palette. Earthy tones of Beige and Brown are ranked the third most commonplace, making them a more classic choice in certain kind of décor. If you are wondering how to incorporate these refreshing bold colours into the bathroom, then consider painting one ascent wall. Yellow and Orange would pair superbly well with Gold and vintage design brassware while Purple and Pink may be chosen with Silver and Chrome bathroom fixtures such as taps and towel rails. Bathroom Furniture partner particularly well with White or Pastel tiles which most homeowners prefer. Alternatively pick tiles in bold colours, designs and prints and match them with soft neutral paint, furnishings and accessories such as curtains and rugs.
Mid
[ 0.615196078431372, 31.375, 19.625 ]
[Complex ventricular extrasystole. Value of technics of programmed electric stimulation]. The incidence and significance of ventricular arrhythmia induced by programmed electrical stimulation in subjects with complex ventricular ectopy were studied in 46 consecutive subjects: 34 with heart disease, 12 with an apparently normal heart. The procedure consisted of delivering on one spontaneous and 2 imposed rhythms one, two, then three extrastimuli. Significant arrhythmia with more than 6 ventricular complexes was induced in 17 patients (37%), including 6 (13%) with sustained ventricular tachycardia and 11 with unsustained ventricular tachycardia. Induction of ventricular arrhythmia was observed in 12 of the 14 patients with a history of myocardial infarction. At the end of a mean follow-up period of 12 +/- 4 months, there were 2 sudden deaths, and 3 patients had clinically sustained ventricular tachycardia. Clinical ventricular tachycardia occurred in the group of 17 patients inducible during programmed electrical stimulation. The patients who died suddenly belonged to the group of 29 patients without induced ventricular arrhythmia. This study shows a high proportion of significant stimulation-induced arrhythmia in patients who had suffered from myocardial infarction more than 3 months previously and who had complex ventricular ectopy. Owing to the good condition of this group of patients after a mean follow-up of 12 months, we were unable to determine the influence of stimulation-induced arrhythmia on mortality. However, it must be noted that spontaneous sustained tachycardia occurred in the group of patients with significant induced ventricular arrhythmia.
High
[ 0.6867627785058971, 32.75, 14.9375 ]
Q: 承る and 賜る: are they etymologically related? I was studying kanji when I noticed that 承{うけたまわ}る and 賜{たまわ}る share 「たまわる」and they do seem to have related meanings. In fact, it appears to me that 承る is a compound verb that combines 受ける and 賜る but I'm not sure. Are they related? And if so, why the difference in kanji? A: (Full disclosure: I edited the Wiktionary entry linked earlier in the comments.) Derivation 承{うけたまわ}る and 賜{たまわ}る are indeed related: 承{うけたまわ}る even has a rare alternative spelling as 受{う}け賜{たまわ}る. 賜{たまわ}る has a meaning of "to be granted or gifted something from a social superior", and the additional 受{う}け on the front in 承{うけたまわ}る adds an additional sense of "to receive, to take in". Spelling As others have noted, don't let the spellings confuse you about the derivations. Spellings in Japanese have historically been rather fluid (and, if you've read any manga and noticed the liberal use of furigana, you'll see that they can still be quite flexible). If you are curious about the derivation of a particular word, and that word is kun'yomi, examine it with a focus on the kana -- how the word is spoken. Kanji for kun'yomi terms are an additional layer, providing further nuance, but the kanji are largely irrelevant to the actual derivation of kun'yomi terms.
High
[ 0.6747638326585691, 31.25, 15.0625 ]
Q: SQL Query in Hive to get top 2 values in 2 columns I have a table like access(url, access_time), with possibly many access times per url. I have another table that is asset(url, foo) I want to do a query that turns this into joined_data(url, first_access_time, second_access_time) Where first_access_time is NULL if there's no access time, and second_access_time is NULL if there's no 2nd access time. How could I do this in hive? A: You can use row_number to do this. with twotimes as (select ast.url, a.access_time, row_number() over(partition by a.url order by a.access_time) as rn from asset ast left join access a on a.url = ast.url ) select url, max(first_access_time), max(second_access_time) from ( select url, access_time as first_access_time, null as second_access_time from twotimes where rn = 1 union all select url, null as first_access_time, access_time as second_access_time from twotimes where rn = 2 ) t group by url
High
[ 0.6730310262529831, 35.25, 17.125 ]
The recent news of a hospital in Delhi that declared dead a newborn baby who was alive, and packed it off in a plastic sheet, has enraged people all over. As a doctor, with some experience, and a responsible citizen of the country, I would like to make a few observations that were not mentioned by the media while reporting the incident. I assume it may be because of the ignorance, or to keep the "sensational news alive", which is seemingly an essential component of "selling" news. Nevertheless, if it harms the image of a particular community, such sensationalism is best avoided. The Max Hospital incident is deplorable, and on the face of it (as reported by media outlets), appears to be a case of gross negligence by a doctor. We are already grappling with one of the worst infant mortality rates in the world (37 per 1,000 live births). India tops the ignominious list of countries with the highest under-five mortality rate in the world (50 per 1,000 live births). No wonder any complicated case is rushed to a private set-up. While the government has already failed us, the private set-ups are looked upon as the only hope, especially when they claim to have state-of-the-art facilities, and charge patients accordingly. But had the news reporters done some unbiased and dispassionate research on this story, which actually required just to reach out to any of the paediatricians/neonatologists in town, or Googled the topic of "foetal viability", the coverage would have been more balanced. Therefore, for readers of this article, it is necessary for me to put out some very relevant facts that may affect the overall outlook in this case. 1) The unfortunate "baby" (I am calling it a child with lot of reservations, as it was at the cusp, deserves to be called a foetus technically) was 22 weeks, part of a twin "delivery" (technically termed abortion) while the other was a stillborn and the weight is not mentioned. But if its weight was less than 400gm - which is very likely in an extremely premature twin baby - it is technically considered "non-viable" (not fit for survival) even as per American standards, and it is best not resuscitated. Any baby whose weight is less than 500gm has rarely made it. Image: India Today 2) I would like to mention here that about two months back, a miracle was performed and history was made by a private hospital in Santa Cruz, Mumbai, where a 22-week-old was miraculously saved after a painfully prolonged four-month journey during which the child, aptly named Nirvaan, suffered a litany of complications. It was a first in India, but could be made possible because of the extraordinary favourable points during the birth - he weighed 650grams, was a single foetus and from a healthy mother - all good pointers for the doctors to take the wafer-thin chance of 0.5 per cent survival in such cases after insistence by the parents. Unfortunately, it never made big time news because it was not sensational enough, I guess. 3) In simple words, the ill-fated foetus in question was not fit for survival and even by undertaking desperate saving measures, which is against medical ethics, it stood a slim chance as low as 0.5 per cent of survival. Such a foetus may have signs of life - twitching movements or heartbeat - for a few hours and in very rare cases for one or two days, or if kept on ventilator, for a few days. 4) Just to inform everybody, activists in India are running a strong campaign to declare 24 weeks as the higher limit of MTP (medical termination of pregnancy, or abortion of foetus), which at present is only 20 weeks, following enough scientific evidence. 5) Recently, the Supreme Court permitted a rape survivor to terminate her pregnancy at 24 weeks, which is beyond the permissible 20-week limit prescribed under the Medical Termination of Pregnancy Act, 1971. So, as far as the scenarios vis-a-vis the Max Hospital case are concerned, insinuations of “judicial murder of a child" are not just ill-informed, but also unjust. 6) In an ideal situation, the circumstances should have been explained to the family and told that if they want, they can take the baby or wait in the hospital until the eventual "death". The cost of continuing with the resuscitation measures and the long-term bad prognosticators was done. The FIR states that the doctors mentioned that it may cost Rs 50 lakh, which is not an entirely wrong figure by realistic considerations. 7) Without mincing words, if the "aggrieved party" was not explained all that in writing and handed over the babies (which is highly improbable), it shows a very callous attitude on the doctors' part. But does it still fulfil the legal parametres of negligence or malpractice? I am not sure. 8) It is very much possible that all the things must have been explained to them because delivery of such non-viable babies is not so uncommon. Therefore, such a goof-up is highly irresponsible as it is impossible. But, verbally explaining things is not enough. Patients at times later claim ignorance of any such consent given. Also, sometimes such babies start breathing late, or breathe sparsely. So, it is tricky to decide how much life is there in the foetus. Especially, because such foetus may suffer from hypothermia, which can temporarily arrest all life activities, only to come back again when the temperature is raised. But it does not alter the bleak prognosis of the foetus. Doctors do not take much trouble in such cases since anyway it is non-viable, especially when everything is explained and the patient/family has consented, which is usually the case. While I say that I don’t mean to defend the mistake of having sent the baby while there were signs of life telling them that it was dead, but the matter was not reported fairly by the media. Ask any neonatologist, and he/she can tell you better. 9) Now, I will give you another scenario, (especially in light of the recent Fortis FMRI fiasco) where the same foetus/baby would have been kept in the hospital, and the patient/family would have kicked a ruckus over “malpractice by Max Hospital for keeping a non-viable baby on ventilator or life support for money". The same relatives would have turned the story on its head, and quoted the medical rules of "foetal viability" and blamed Max Hospital of “malpractice and over-billing by keeping a baby who was practically dead. While I'm not saying medical negligence doesn't take place, it does and is highly condemnable, half-truths and ill-informed media reporting can sow seeds of suspicion and give rise to fear psychosis among the common people about the conduct of doctors. Also, I would say that doctors too are humans who are prone to errors. However, strengthening the processes at the hospitals and improving the standards of training, especially the documentation and counselling part, is the solution. 10 ) Lastly, is it not gross "injustice" when the doctors are booked under harsh sections of IPC like Section 308 (attempt to commit culpable homicide) without even getting the other side of the story? Or consulting medico-legal experts? That too in a case of "abortion" that led to the expulsion of a non-viable foetus, and where the parents also must have anyway refused any resuscitation? The doctors have been summarily terminated without any tangible inquiry. My only hope is that all aspects will be taken into consideration by Delhi Police during investigation, and that it will take into consideration expert opinion and not buckle under public pressure and media trial. Also read: Why India's public healthcare system is gasping for oxygen
Low
[ 0.524444444444444, 29.5, 26.75 ]
FRIDAY, April 19 (HealthDay News) -- Men whose fathers were abusive or absent are more likely to get into bar fights, a new study reveals. These findings about alcohol-related aggression are from a survey of 137 men, aged 18 to 25, in Australia, and appear online in advance of publication in the September print issue of the journal Alcoholism: Clinical & Experimental Research. "Alcohol affects people in a number of predictable ways that make it more likely that they will become involved in aggressive incidents," study corresponding author Peter Miller, an associate professor of psychology at Deakin University in Australia, said in a journal news release. "They become focused on the moment, have poorer decision-making skills and interpret social situations incorrectly, all of which mean they are more likely to be both perpetrators and victims of violence," Miller said. Samantha Wells, a scientist at the Center for Addiction and Mental Health in Canada who was not involved in the study, commented on the results. "These findings may further explain the link between masculinity and male violence; that is, boys who experience violence in the home at the hands of their fathers may react by embracing extreme versions of masculinity as a way of gaining a sense of power," Wells said in the news release. "In this way, the cycle of violence continues," she said. "But what is important here is the suggestion that the cycle of violence extends into social behavior in a bar setting. This finding confirms that male aggression in bars is not simply 'boys being boys' -- it's troubled boys being antisocial and harming others." Study author Miller said these findings could help doctors and other health professionals identify and help men who are more likely to become aggressive when they drink. For the study, the researchers used the term "negative fathering" to describe an abusive or absent relationship to the child. "The terms we use are: indifference, so lack of emotional attachment or concern for the child; abuse, noted as both verbal and physical -- for example, shaming or belittling the child, being verbally aggressive or physically violent, such as hitting, punching and spanking; and over-control, an authoritarian relationship characterized by high expectations of conformity and compliance to parental rules and directions while allowing little open dialogue between parent and child," Miller said in the news release.
High
[ 0.669975186104218, 33.75, 16.625 ]
Q: how to add details in specific column in list view I wanna add details to watchers column like my following image.. I use following code to add those details.But it prints in 1st column.. could anybody tell me to do this. screenshot Here's the code I've used: private void addwatchers(string watchers) { string[] row = { watchers }; ListViewItem item = new ListViewItem(row); //ADD ITEMS listView1.Items.Add(item); } private void button2_Click(object sender, System.EventArgs e) { string[] cwatchers = richTextBox2.Text.Split('\n'); for (int i=0;i<cwatchers.Length;i++) { addwatchers(cwatchers[i]); } } A: Every time you call addWatchers() you create a list view item (a row in the list view). You have several ways of creating such items. The one you're currently using is passing an array of string, which represents the column values (by position) to create each item. What I'd do is to create the ListViewItem in the caller method instead: for (int i = 0; i < cwatchers.Length; i++) { var item = new ListViewItem(i.ToString()); //<-- arbitrarily using i as the value for the first column. You should use whatever makes sense to you. //TODO: add the sub item for the ID column item.SubItems.Add(""); //Add in Watchers item.SubItems.Add(cwatchers[i]); //TODO: add the rest of the sub items //Add the item to the list view listView1.Items.Add(item); } You can safely get rid of the addwatchers method since it's only adding the corresponding subitem. UPDATE If you already have the items created when you call addWatchers, then the only thing you need to do is iterate through the items in the list view and add the missing sub items. Let's say you have added in a previous process all the items to the listview. And when you did that, you created the listview item with two columns. private void button2_Click(object sender, EventArgs e) { string[] cwatchers = richTextBox2Text.Split('\n'); for (int i = 0; i < cwatchers.Length; i++) { //Get the listview item in i and add the sub item for the watchers. //this assumes that the list view item is created and contains two subitems so the next one to be added is the wawtchers. listView1.Items[i].SubItems.Add(cwatchers[i]); //TODO: add the rest of the sub items } } Hope this helps!
Mid
[ 0.5963541666666661, 28.625, 19.375 ]
# Heading 1 ## Heading 2 ### Heading 3 #### Heading 4 This is a [link](http://example.com "Example") This is a [ref link][example] This is a [relative link](/example) This is a [pending ref](index) [example]: http://example.com/foobar "Example" External link to Markdown file: [Readme](https://github.com/readthedocs/recommonmark/blob/master/README.md). Foo ---- Bar ![foo "handle quotes"](/image.png "Example") #!/bin/sh python * Item A * Item B * Item C 1. Item 1 2. Item 2 3. Item 3
Low
[ 0.46028037383177506, 24.625, 28.875 ]
# get请求 import requests url = 'http://httpbin.org/get' data = {'key': 'value', 'abc': 'xyz'} # .get是使用get方式请求url,字典类型的data不用进行额外处理 response = requests.get(url, data) print(response.text) # post请求 import requests url = 'http://httpbin.org/post' data = {'key': 'value', 'abc': 'xyz'} # .post表示为post方法 response = requests.post(url, data) # 返回类型为json格式 print(response.json())
High
[ 0.6901960784313721, 22, 9.875 ]
Q: Swift - UIView addConstraints not working I was playing with Swift, when suddenly, nothing appear. override func viewDidLoad() { super.viewDidLoad() var DiabolicView: UIView = UIView();//With UIButton it's working DiabolicView.setTranslatesAutoresizingMaskIntoConstraints(false); DiabolicView.frame.size = CGSize(width: 67, height: 67) DiabolicView.backgroundColor = UIColor.redColor();//To see the view view.addSubview(DiabolicView); view.addConstraints([NSLayoutConstraint(item: DiabolicView, attribute: .Bottom, relatedBy: .Equal, toItem: view, attribute: .Bottom, multiplier: 1.0, constant: -100 )]); } Yes, really nothing (screen of nothing) But when I replace the Diabolic UIView by a cool UIButton, the Red Square appear : Screen of the magic Red Square when I replace UIView by UIButton So, the question is, why I can't see the UIView ? Thanks in advance :) A: Your constraints work with a UIButton because buttons have an intrinsic content size - they can decide how big they want to be. UIView, on the other hand, doesn't.* You need to either: Add constraints to specify the view's size, or Subclass UIView and override intrinsicContentSize() to return the default size of your view. Setting the frame's size as you're currently attempting won't cut it - this frame is ignored by the layout engine. * - The default implementation of this method returns CGSizeMake(UIViewNoIntrinsicMetric, UIViewNoIntrinsicMetric), or (-1, -1), which is why you don't see your view at all.
Mid
[ 0.633053221288515, 28.25, 16.375 ]
Summary Next week the first of three major satellites to be launched under NASA's controversial Earth Observing System program is scheduled to head into orbit. The 10-year, $7.25 billion program will gather data on how the planet's processes create climate and whether humans are seriously altering those processes. Along the way, NASA officials also hope to quiet concerns from scientists that the agency has gone too far in favoring hardware over data analysis and has reneged on its original long-term monitoring plan aimed at unlocking climate's deepest secrets.
High
[ 0.6795180722891561, 35.25, 16.625 ]
.class public Lcom/facebook/share/internal/NativeDialogParameters; .super Ljava/lang/Object; # direct methods .method public constructor <init>()V .locals 0 invoke-direct {p0}, Ljava/lang/Object;-><init>()V return-void .end method .method private static create(Lcom/facebook/share/model/ShareCameraEffectContent;Landroid/os/Bundle;Z)Landroid/os/Bundle; .locals 4 invoke-static {p0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 const-string/jumbo v1, "effect_id" invoke-virtual {p0}, Lcom/facebook/share/model/ShareCameraEffectContent;->getEffectId()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V if-eqz p1, :cond_0 const-string/jumbo v1, "effect_textures" invoke-virtual {v0, v1, p1}, Landroid/os/Bundle;->putBundle(Ljava/lang/String;Landroid/os/Bundle;)V :cond_0 :try_start_0 invoke-virtual {p0}, Lcom/facebook/share/model/ShareCameraEffectContent;->getArguments()Lcom/facebook/share/model/CameraEffectArguments; move-result-object v1 invoke-static {v1}, Lcom/facebook/share/internal/CameraEffectJSONUtility;->convertToJSON(Lcom/facebook/share/model/CameraEffectArguments;)Lorg/json/JSONObject; move-result-object v1 if-eqz v1, :cond_1 const-string/jumbo v2, "effect_arguments" invoke-virtual {v1}, Lorg/json/JSONObject;->toString()Ljava/lang/String; move-result-object v1 invoke-static {v0, v2, v1}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V :try_end_0 .catch Lorg/json/JSONException; {:try_start_0 .. :try_end_0} :catch_0 :cond_1 return-object v0 :catch_0 move-exception v0 new-instance v1, Lcom/facebook/FacebookException; new-instance v2, Ljava/lang/StringBuilder; invoke-direct {v2}, Ljava/lang/StringBuilder;-><init>()V const-string/jumbo v3, "Unable to create a JSON Object from the provided CameraEffectArguments: " invoke-virtual {v2, v3}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v2 invoke-virtual {v0}, Lorg/json/JSONException;->getMessage()Ljava/lang/String; move-result-object v0 invoke-virtual {v2, v0}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v0 invoke-virtual {v0}, Ljava/lang/StringBuilder;->toString()Ljava/lang/String; move-result-object v0 invoke-direct {v1, v0}, Lcom/facebook/FacebookException;-><init>(Ljava/lang/String;)V throw v1 .end method .method private static create(Lcom/facebook/share/model/ShareLinkContent;Z)Landroid/os/Bundle; .locals 3 invoke-static {p0, p1}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 const-string/jumbo v1, "TITLE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareLinkContent;->getContentTitle()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "DESCRIPTION" invoke-virtual {p0}, Lcom/facebook/share/model/ShareLinkContent;->getContentDescription()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "IMAGE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareLinkContent;->getImageUrl()Landroid/net/Uri; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putUri(Landroid/os/Bundle;Ljava/lang/String;Landroid/net/Uri;)V const-string/jumbo v1, "QUOTE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareLinkContent;->getQuote()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "MESSENGER_LINK" invoke-virtual {p0}, Lcom/facebook/share/model/ShareLinkContent;->getContentUrl()Landroid/net/Uri; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putUri(Landroid/os/Bundle;Ljava/lang/String;Landroid/net/Uri;)V const-string/jumbo v1, "TARGET_DISPLAY" invoke-virtual {p0}, Lcom/facebook/share/model/ShareLinkContent;->getContentUrl()Landroid/net/Uri; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putUri(Landroid/os/Bundle;Ljava/lang/String;Landroid/net/Uri;)V return-object v0 .end method .method private static create(Lcom/facebook/share/model/ShareMediaContent;Ljava/util/List;Z)Landroid/os/Bundle; .locals 3 .annotation system Ldalvik/annotation/Signature; value = { "(", "Lcom/facebook/share/model/ShareMediaContent;", "Ljava/util/List", "<", "Landroid/os/Bundle;", ">;Z)", "Landroid/os/Bundle;" } .end annotation invoke-static {p0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 const-string/jumbo v1, "MEDIA" new-instance v2, Ljava/util/ArrayList; invoke-direct {v2, p1}, Ljava/util/ArrayList;-><init>(Ljava/util/Collection;)V invoke-virtual {v0, v1, v2}, Landroid/os/Bundle;->putParcelableArrayList(Ljava/lang/String;Ljava/util/ArrayList;)V return-object v0 .end method .method private static create(Lcom/facebook/share/model/ShareMessengerGenericTemplateContent;Z)Landroid/os/Bundle; .locals 4 invoke-static {p0, p1}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 :try_start_0 invoke-static {v0, p0}, Lcom/facebook/share/internal/MessengerShareContentUtility;->addGenericTemplateContent(Landroid/os/Bundle;Lcom/facebook/share/model/ShareMessengerGenericTemplateContent;)V :try_end_0 .catch Lorg/json/JSONException; {:try_start_0 .. :try_end_0} :catch_0 return-object v0 :catch_0 move-exception v0 new-instance v1, Lcom/facebook/FacebookException; new-instance v2, Ljava/lang/StringBuilder; invoke-direct {v2}, Ljava/lang/StringBuilder;-><init>()V const-string/jumbo v3, "Unable to create a JSON Object from the provided ShareMessengerGenericTemplateContent: " invoke-virtual {v2, v3}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v2 invoke-virtual {v0}, Lorg/json/JSONException;->getMessage()Ljava/lang/String; move-result-object v0 invoke-virtual {v2, v0}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v0 invoke-virtual {v0}, Ljava/lang/StringBuilder;->toString()Ljava/lang/String; move-result-object v0 invoke-direct {v1, v0}, Lcom/facebook/FacebookException;-><init>(Ljava/lang/String;)V throw v1 .end method .method private static create(Lcom/facebook/share/model/ShareMessengerMediaTemplateContent;Z)Landroid/os/Bundle; .locals 4 invoke-static {p0, p1}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 :try_start_0 invoke-static {v0, p0}, Lcom/facebook/share/internal/MessengerShareContentUtility;->addMediaTemplateContent(Landroid/os/Bundle;Lcom/facebook/share/model/ShareMessengerMediaTemplateContent;)V :try_end_0 .catch Lorg/json/JSONException; {:try_start_0 .. :try_end_0} :catch_0 return-object v0 :catch_0 move-exception v0 new-instance v1, Lcom/facebook/FacebookException; new-instance v2, Ljava/lang/StringBuilder; invoke-direct {v2}, Ljava/lang/StringBuilder;-><init>()V const-string/jumbo v3, "Unable to create a JSON Object from the provided ShareMessengerMediaTemplateContent: " invoke-virtual {v2, v3}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v2 invoke-virtual {v0}, Lorg/json/JSONException;->getMessage()Ljava/lang/String; move-result-object v0 invoke-virtual {v2, v0}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v0 invoke-virtual {v0}, Ljava/lang/StringBuilder;->toString()Ljava/lang/String; move-result-object v0 invoke-direct {v1, v0}, Lcom/facebook/FacebookException;-><init>(Ljava/lang/String;)V throw v1 .end method .method private static create(Lcom/facebook/share/model/ShareMessengerOpenGraphMusicTemplateContent;Z)Landroid/os/Bundle; .locals 4 invoke-static {p0, p1}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 :try_start_0 invoke-static {v0, p0}, Lcom/facebook/share/internal/MessengerShareContentUtility;->addOpenGraphMusicTemplateContent(Landroid/os/Bundle;Lcom/facebook/share/model/ShareMessengerOpenGraphMusicTemplateContent;)V :try_end_0 .catch Lorg/json/JSONException; {:try_start_0 .. :try_end_0} :catch_0 return-object v0 :catch_0 move-exception v0 new-instance v1, Lcom/facebook/FacebookException; new-instance v2, Ljava/lang/StringBuilder; invoke-direct {v2}, Ljava/lang/StringBuilder;-><init>()V const-string/jumbo v3, "Unable to create a JSON Object from the provided ShareMessengerOpenGraphMusicTemplateContent: " invoke-virtual {v2, v3}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v2 invoke-virtual {v0}, Lorg/json/JSONException;->getMessage()Ljava/lang/String; move-result-object v0 invoke-virtual {v2, v0}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v0 invoke-virtual {v0}, Ljava/lang/StringBuilder;->toString()Ljava/lang/String; move-result-object v0 invoke-direct {v1, v0}, Lcom/facebook/FacebookException;-><init>(Ljava/lang/String;)V throw v1 .end method .method private static create(Lcom/facebook/share/model/ShareOpenGraphContent;Lorg/json/JSONObject;Z)Landroid/os/Bundle; .locals 3 invoke-static {p0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v1 invoke-virtual {p0}, Lcom/facebook/share/model/ShareOpenGraphContent;->getPreviewPropertyName()Ljava/lang/String; move-result-object v0 invoke-static {v0}, Lcom/facebook/share/internal/ShareInternalUtility;->getFieldNameAndNamespaceFromFullName(Ljava/lang/String;)Landroid/util/Pair; move-result-object v0 iget-object v0, v0, Landroid/util/Pair;->second:Ljava/lang/Object; check-cast v0, Ljava/lang/String; const-string/jumbo v2, "PREVIEW_PROPERTY_NAME" invoke-static {v1, v2, v0}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v0, "ACTION_TYPE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareOpenGraphContent;->getAction()Lcom/facebook/share/model/ShareOpenGraphAction; move-result-object v2 invoke-virtual {v2}, Lcom/facebook/share/model/ShareOpenGraphAction;->getActionType()Ljava/lang/String; move-result-object v2 invoke-static {v1, v0, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v0, "ACTION" invoke-virtual {p1}, Lorg/json/JSONObject;->toString()Ljava/lang/String; move-result-object v2 invoke-static {v1, v0, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V return-object v1 .end method .method private static create(Lcom/facebook/share/model/SharePhotoContent;Ljava/util/List;Z)Landroid/os/Bundle; .locals 3 .annotation system Ldalvik/annotation/Signature; value = { "(", "Lcom/facebook/share/model/SharePhotoContent;", "Ljava/util/List", "<", "Ljava/lang/String;", ">;Z)", "Landroid/os/Bundle;" } .end annotation invoke-static {p0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 const-string/jumbo v1, "PHOTOS" new-instance v2, Ljava/util/ArrayList; invoke-direct {v2, p1}, Ljava/util/ArrayList;-><init>(Ljava/util/Collection;)V invoke-virtual {v0, v1, v2}, Landroid/os/Bundle;->putStringArrayList(Ljava/lang/String;Ljava/util/ArrayList;)V return-object v0 .end method .method private static create(Lcom/facebook/share/model/ShareVideoContent;Ljava/lang/String;Z)Landroid/os/Bundle; .locals 3 invoke-static {p0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; move-result-object v0 const-string/jumbo v1, "TITLE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareVideoContent;->getContentTitle()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "DESCRIPTION" invoke-virtual {p0}, Lcom/facebook/share/model/ShareVideoContent;->getContentDescription()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "VIDEO" invoke-static {v0, v1, p1}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V return-object v0 .end method .method public static create(Ljava/util/UUID;Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; .locals 4 const-string/jumbo v0, "shareContent" invoke-static {p1, v0}, Lcom/facebook/internal/Validate;->notNull(Ljava/lang/Object;Ljava/lang/String;)V const-string/jumbo v0, "callId" invoke-static {p0, v0}, Lcom/facebook/internal/Validate;->notNull(Ljava/lang/Object;Ljava/lang/String;)V const/4 v0, 0x0 instance-of v1, p1, Lcom/facebook/share/model/ShareLinkContent; if-eqz v1, :cond_1 check-cast p1, Lcom/facebook/share/model/ShareLinkContent; invoke-static {p1, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareLinkContent;Z)Landroid/os/Bundle; move-result-object v0 :cond_0 :goto_0 return-object v0 :cond_1 instance-of v1, p1, Lcom/facebook/share/model/SharePhotoContent; if-eqz v1, :cond_2 check-cast p1, Lcom/facebook/share/model/SharePhotoContent; invoke-static {p1, p0}, Lcom/facebook/share/internal/ShareInternalUtility;->getPhotoUrls(Lcom/facebook/share/model/SharePhotoContent;Ljava/util/UUID;)Ljava/util/List; move-result-object v0 invoke-static {p1, v0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/SharePhotoContent;Ljava/util/List;Z)Landroid/os/Bundle; move-result-object v0 goto :goto_0 :cond_2 instance-of v1, p1, Lcom/facebook/share/model/ShareVideoContent; if-eqz v1, :cond_3 check-cast p1, Lcom/facebook/share/model/ShareVideoContent; invoke-static {p1, p0}, Lcom/facebook/share/internal/ShareInternalUtility;->getVideoUrl(Lcom/facebook/share/model/ShareVideoContent;Ljava/util/UUID;)Ljava/lang/String; move-result-object v0 invoke-static {p1, v0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareVideoContent;Ljava/lang/String;Z)Landroid/os/Bundle; move-result-object v0 goto :goto_0 :cond_3 instance-of v1, p1, Lcom/facebook/share/model/ShareOpenGraphContent; if-eqz v1, :cond_4 check-cast p1, Lcom/facebook/share/model/ShareOpenGraphContent; :try_start_0 invoke-static {p0, p1}, Lcom/facebook/share/internal/ShareInternalUtility;->toJSONObjectForCall(Ljava/util/UUID;Lcom/facebook/share/model/ShareOpenGraphContent;)Lorg/json/JSONObject; move-result-object v0 const/4 v1, 0x0 invoke-static {v0, v1}, Lcom/facebook/share/internal/ShareInternalUtility;->removeNamespacesFromOGJsonObject(Lorg/json/JSONObject;Z)Lorg/json/JSONObject; move-result-object v0 invoke-static {p1, v0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareOpenGraphContent;Lorg/json/JSONObject;Z)Landroid/os/Bundle; :try_end_0 .catch Lorg/json/JSONException; {:try_start_0 .. :try_end_0} :catch_0 move-result-object v0 goto :goto_0 :catch_0 move-exception v0 new-instance v1, Lcom/facebook/FacebookException; new-instance v2, Ljava/lang/StringBuilder; invoke-direct {v2}, Ljava/lang/StringBuilder;-><init>()V const-string/jumbo v3, "Unable to create a JSON Object from the provided ShareOpenGraphContent: " invoke-virtual {v2, v3}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v2 invoke-virtual {v0}, Lorg/json/JSONException;->getMessage()Ljava/lang/String; move-result-object v0 invoke-virtual {v2, v0}, Ljava/lang/StringBuilder;->append(Ljava/lang/String;)Ljava/lang/StringBuilder; move-result-object v0 invoke-virtual {v0}, Ljava/lang/StringBuilder;->toString()Ljava/lang/String; move-result-object v0 invoke-direct {v1, v0}, Lcom/facebook/FacebookException;-><init>(Ljava/lang/String;)V throw v1 :cond_4 instance-of v1, p1, Lcom/facebook/share/model/ShareMediaContent; if-eqz v1, :cond_5 check-cast p1, Lcom/facebook/share/model/ShareMediaContent; invoke-static {p1, p0}, Lcom/facebook/share/internal/ShareInternalUtility;->getMediaInfos(Lcom/facebook/share/model/ShareMediaContent;Ljava/util/UUID;)Ljava/util/List; move-result-object v0 invoke-static {p1, v0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareMediaContent;Ljava/util/List;Z)Landroid/os/Bundle; move-result-object v0 goto :goto_0 :cond_5 instance-of v1, p1, Lcom/facebook/share/model/ShareCameraEffectContent; if-eqz v1, :cond_6 check-cast p1, Lcom/facebook/share/model/ShareCameraEffectContent; invoke-static {p1, p0}, Lcom/facebook/share/internal/ShareInternalUtility;->getTextureUrlBundle(Lcom/facebook/share/model/ShareCameraEffectContent;Ljava/util/UUID;)Landroid/os/Bundle; move-result-object v0 invoke-static {p1, v0, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareCameraEffectContent;Landroid/os/Bundle;Z)Landroid/os/Bundle; move-result-object v0 goto :goto_0 :cond_6 instance-of v1, p1, Lcom/facebook/share/model/ShareMessengerGenericTemplateContent; if-eqz v1, :cond_7 check-cast p1, Lcom/facebook/share/model/ShareMessengerGenericTemplateContent; invoke-static {p1, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareMessengerGenericTemplateContent;Z)Landroid/os/Bundle; move-result-object v0 goto :goto_0 :cond_7 instance-of v1, p1, Lcom/facebook/share/model/ShareMessengerOpenGraphMusicTemplateContent; if-eqz v1, :cond_8 check-cast p1, Lcom/facebook/share/model/ShareMessengerOpenGraphMusicTemplateContent; invoke-static {p1, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareMessengerOpenGraphMusicTemplateContent;Z)Landroid/os/Bundle; move-result-object v0 goto/16 :goto_0 :cond_8 instance-of v1, p1, Lcom/facebook/share/model/ShareMessengerMediaTemplateContent; if-eqz v1, :cond_0 check-cast p1, Lcom/facebook/share/model/ShareMessengerMediaTemplateContent; invoke-static {p1, p2}, Lcom/facebook/share/internal/NativeDialogParameters;->create(Lcom/facebook/share/model/ShareMessengerMediaTemplateContent;Z)Landroid/os/Bundle; move-result-object v0 goto/16 :goto_0 .end method .method private static createBaseParameters(Lcom/facebook/share/model/ShareContent;Z)Landroid/os/Bundle; .locals 4 new-instance v0, Landroid/os/Bundle; invoke-direct {v0}, Landroid/os/Bundle;-><init>()V const-string/jumbo v1, "LINK" invoke-virtual {p0}, Lcom/facebook/share/model/ShareContent;->getContentUrl()Landroid/net/Uri; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putUri(Landroid/os/Bundle;Ljava/lang/String;Landroid/net/Uri;)V const-string/jumbo v1, "PLACE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareContent;->getPlaceId()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "PAGE" invoke-virtual {p0}, Lcom/facebook/share/model/ShareContent;->getPageId()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "REF" invoke-virtual {p0}, Lcom/facebook/share/model/ShareContent;->getRef()Ljava/lang/String; move-result-object v2 invoke-static {v0, v1, v2}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V const-string/jumbo v1, "DATA_FAILURES_FATAL" invoke-virtual {v0, v1, p1}, Landroid/os/Bundle;->putBoolean(Ljava/lang/String;Z)V invoke-virtual {p0}, Lcom/facebook/share/model/ShareContent;->getPeopleIds()Ljava/util/List; move-result-object v1 invoke-static {v1}, Lcom/facebook/internal/Utility;->isNullOrEmpty(Ljava/util/Collection;)Z move-result v2 if-nez v2, :cond_0 const-string/jumbo v2, "FRIENDS" new-instance v3, Ljava/util/ArrayList; invoke-direct {v3, v1}, Ljava/util/ArrayList;-><init>(Ljava/util/Collection;)V invoke-virtual {v0, v2, v3}, Landroid/os/Bundle;->putStringArrayList(Ljava/lang/String;Ljava/util/ArrayList;)V :cond_0 invoke-virtual {p0}, Lcom/facebook/share/model/ShareContent;->getShareHashtag()Lcom/facebook/share/model/ShareHashtag; move-result-object v1 if-eqz v1, :cond_1 const-string/jumbo v2, "HASHTAG" invoke-virtual {v1}, Lcom/facebook/share/model/ShareHashtag;->getHashtag()Ljava/lang/String; move-result-object v1 invoke-static {v0, v2, v1}, Lcom/facebook/internal/Utility;->putNonEmptyString(Landroid/os/Bundle;Ljava/lang/String;Ljava/lang/String;)V :cond_1 return-object v0 .end method
Low
[ 0.48526077097505604, 26.75, 28.375 ]
Friday, September 23, 2005 At first glance, that rushing defense doesn't look that bad, but then you break it down by game: Air Force: 218 yards rushingCal: 286Idaho: -4 That's not a misprint: Idaho is terrible at running the ball (186 yards after three games). So expect our rushing totals more in line with Air Force and Cal. On the other hand, Baer loves to stop the run, so maybe he'll try to contain Darius Walker, thus leaving the corners on an island. He tried this strategy against Air Force, who despite their option attack managed to get 207 yards passing against the Huskies. Washington's corners are both 5'11, so expect a Stovall redux if they try to single-cover him. Strange stat: Despite being 1-2, Washington has only given up one first quarter touchdown so far this year. Quarterback. Isaiah Stanback is mobile in the Drew Stanton mold, but doesn't have Stanton's battle-tested experience. Accuracy wasn't supposed to be one of Stanback's strong points, but so far this season he's managed a respectable 61% completion rate and a 4/2 touchdown to interception ratio. I wouldn't be surprised to see Washington try for a big play through the air on the first play from scrimmage a la the ND-FSU game in 2002 and the Washington-Cal game in 2005. Still, I have a feeling that the most productive call for the Huskies might be the broken play. Running Back. So far, 6', 195-lb sophomore Louis Rankin appears to be the man for the Huskies, their leading rusher with a respectable 4.8 yards per carry. While's he not blazingly fast, Rankin changes directions well and is a tough, second-effort kind of runner who's not afraid to lower his head and try and run over tacklers. The big injury question is whether Toledo's going to play. Due to injuries to Toledo and backup Chad Macklin (who moved from RT to LT, then got hurt), the Huskies have had a different starting right tackle for each of their first three games. The current starter is Tui Alailefaleula, a 335-lb guard who was just moved to tackle last week (after redshirting in 2004 following a shift from DL to OL). And if corner Roy Lewis can't go, that leaves Josh Okeobor, a JUCO transfer who sat out last year with a knee injury, to start in his place. Diedrickless. I think the biggest change for Willingham has got to be the introduction of Tim Lappano as offensive coordinator, the first OC in seven years for Ty not named Bill Diedrick. Lappano worked with Dennis Erickson at a variety of stops (including the Seahawks and the 49ers) and has been groomed on a one-back, spread attack, although he made a lot of noise in summer camp about wanting to emphasize the run a lot more. So far, he's tried to live up to that ideal, running against Air Force and Idaho (although the Cal game threw him off, and he ended up passing quite a bit since they were behind by so much). The Idaho game was probably a model for what he'd like to do in every game: run the ball 39 times. Husky fans seem pretty happy with Lappano's playcalling thus far. By the way, the last time Lappano faced the Irish was as Oregon State's offensive coordinator in the 2000 Fiesta Bowl. That was a great game.
Mid
[ 0.6266094420600851, 36.5, 21.75 ]
In This Section Washington, D.C. – The American Foreign Service Association welcomes new leadership as the professional association and union’s 29-person Governing Board begins its two-year term today. Incoming President Ambassador Barbara Stephenson comes to AFSA from her position as Dean of the Leadership and Management School at the Foreign Service Institute. Ambassador Stephenson has also served as Ambassador to Panama and the Deputy Chief of Mission and chargé d’affaires at the U.S. Embassy in London. Foreign Service Officer Angie Bryan, AFSA’s new Vice President of the Department of State constituency, is a 23-year veteran of the State Department, having served in various positions around the Middle East and Europe, including Deputy Chief of Mission at the U.S. Embassy in Sana’a, Yemen. Ambassador (ret.) Tom Boyatt is the incoming Vice President for the retiree constituency. He has held numerous positions on AFSA’s board and served as U.S. Ambassador to Colombia from 1980-1983. Foreign Service Officers Sharon Wayne, Steve Morrison and Mark Petry were re-elected and will serve as Vice Presidents of the USAID, Foreign Commercial Service and Foreign Agricultural Service constituencies, respectively. Completing AFSA’s leadership team, Ambassador (ret.) Charles A. Ford will serve his second term as treasurer and retired Foreign Service Officer William Haugh, currently a contractor with the Department of State’s Bureau of European and Eurasian Affairs, will serve as the organization’s Secretary. Complete bios for AFSA elected leadership, including all officers and constituent representatives, can be found at www.afsa.org/board. AFSA thanks President Robert J. Silverman, Secretary Angela Dickey, State Vice President Matthew Asada, retiree Vice President Lawrence Cohen and the other outgoing members of the previous Governing Board for their service to the association and to the Foreign Service. AFSA, the voice of the Foreign Service, is the professional association and labor union of the U.S. Foreign Service. Founded in 1924, AFSA represents 31,000 active and retired Foreign Service employees at the Department of State, U.S. Agency for International Development, Foreign Commercial Service, Foreign Agricultural Service, and Broadcasting Board of Governors.
Mid
[ 0.602739726027397, 33, 21.75 ]
THIRD DIVISION ELLINGTON, P. J., ANDREWS and RICKMAN, JJ. NOTICE: Motions for reconsideration must be physically received in our clerk’s office within ten days of the date of decision to be deemed timely filed. http://www.gaappeals.us/rules June 29, 2017 In the Court of Appeals of Georgia A17A0613. DONASTORG v. RAINBOW USA, INC. RICKMAN, Judge. In this premises liability action, Precious Donastorg sued Rainbow USA, Inc. to recover monetary damages for injuries she allegedly received after stepping on an anti-theft sensor pin while shopping in a clothing store owned and operated by Rainbow. The trial court granted summary judgment in favor of Rainbow upon concluding that Rainbow lacked superior knowledge of the hazard that injured Donastorg. Donastorg argues that genuine issues of material fact remain as to Rainbow’s knowledge of the hazard such that the grant of summary judgment in its favor was improper. We agree and reverse. We apply a de novo standard of review to an appeal from a grant of summary judgment and view the evidence, and all reasonable conclusions and inferences drawn from it, in the light most favorable to the nonmovant. A defendant may obtain summary judgment by showing an absence of evidence supporting at least one essential element of the plaintiff’s claim. Kennestone Hosp. v. Harris, 285 Ga. App. 393, 393-394 (646 SE2d 490) (2007). The pertinent facts in this case are largely undisputed. The record shows that shortly after 4:00 p.m. on the afternoon in question, Donastorg was shopping with her daughter at a Rainbow clothing store when she stepped on an anti-theft sensor pin located on the store’s floor. Donastorg stepped on the pin with her left foot as she removed an item of clothing from the clothing rack and held it up to her daughter. The pin, approximately the size of a thumb tack, went through Donastorg’s sandal and punctured her foot, allegedly causing permanent nerve and/or tissue damage. Donastorg deposed that, at the time of the incident, a Rainbow employee was unloading new inventory immediately to Donastorg’s right, and three additional employees were standing behind the cash registers approximately four to five feet away. Neither Donastorg nor any of the Rainbow employees saw the pin prior to Donastorg stepping on it, and it is unknown how the pin got onto the floor or when it surfaced there. The record contains no evidence that the sensor corresponding to the pin was ever located. 2 Donastorg filed suit against Rainbow, alleging that Rainbow breached its duty of care by failing to keep its premises free from hazardous conditions that it knew or should have known existed. The evidence obtained during discovery showed that every Rainbow employee was trained on how to securely attach the security sensors to merchandise, and the sensors were attached to all or most of the items in the store.1 Rainbow received new inventory daily, and its employees were continuously attaching security sensors to the newly received items. Although the employees generally attached the sensors in the stockroom where new items were received, they were also authorized to attach them on the storeroom floor during working hours.2 Upon the purchase of an item, Rainbow employees would remove the security sensor at the cash registers during the checkout process; however, Rainbow suffered from shoplifters “every day” and “around the clock” who would pry off the sensors 1 The district supervisor deposed that Rainbow’s policy requires that security sensors be placed on all items costing over $10.99, although the co-manager of the subject store deposed that its employees attach sensors to every item of clothing in the store. 2 Although the employee to Donastorg’s immediate right was unloading new inventory at the time of the incident, that employee was not deposed and the record otherwise contains no evidence as to whether she was attaching the sensor pins to the new items. 3 and dispose of them without regard.3 The security sensors were also known to occasionally fall off of dropped items and there was testimony that stray pins had been found on the floor on previous occasions.4 Rainbow’s training manual specifically cautioned employees to ensure that the sensor pins were kept off the floor as “[t]hey could be stepped on and cause injury.” The store policy mandated that the floor be swept twice daily–once immediately prior to the store opening and once at closing–and otherwise “if needed.” The floor had been swept prior to the store’s 10:00 a.m. opening on the day in question, approximately six hours before the incident. Rainbow introduced no evidence of any additional policies or procedures requiring that the storeroom floor be inspected or swept during working hours. 3 During one deposition, the deposing attorney was able to pry open and remove a sensor pin without the need for any tools. 4 The sole record evidence related to prior incidents involving the security pins is the store manager’s affirmative response when asked if stray pins had ever before been found laying on the floor, and Donastorg’s deposition testimony an unidentified Rainbow employee mentioned after the incident that “years ago it happened to another lady.” Nevertheless, construing this evidence, as the dissent does, to mean that “either the store’s customers were exposed to a minimal risk, or the store exercised extraordinary care in keeping the premises safe” does not comport with our standard of review on summary judgment. 4 Rainbow moved for summary judgment, asserting that it lacked the requisite knowledge of the hazard so as to absolve it of liability. The trial court granted Rainbow’s motion, and this appeal follows. Under Georgia law, “[a]n owner or occupier of land has a legal duty, enforceable by lawsuit, to exercise ordinary care to keep and maintain its premises and the approaches in a condition that does not pose an unreasonable risk of foreseeable harm to the invited public.” American Multi-Cinema, Inc. v. Brown, 285 Ga. 442 (679 SE2d 25) (2009); see OCGA § 51-3-1 (“Where an owner or occupier of land, by express or implied invitation, induces or leads others to come upon his premises for any lawful purpose, he is liable in damages to such persons for injuries caused by his failure to exercise ordinary care in keeping the premises and approaches safe.”). Nevertheless, a property owner/occupier “is not an insurer of the safety of its invitees. The mere occurrence of an injury does not create a presumption of negligence.” (Citation and punctuation omitted.) Kennestone Hosp., 285 Ga. App. at 394. Georgia has implemented a two-prong test in order to assess liability to a property owner/occupier on a premises liability claim involving a foreign object: “an invitee must prove (1) that the defendant had actual or constructive knowledge of the 5 hazard; and (2) that the plaintiff lacked knowledge of the hazard despite the exercise of ordinary care due to actions or conditions within the control of the owner/occupier.” Robinson v. Kroger Co., 268 Ga. 735, 748-249 (2) (b) (493 SE2d 403) (1997). The record here is undisputed that Rainbow did not have actual knowledge of the existence of the pin that injured Donastorg and that Donastorg lacked knowledge of the pin despite exercising ordinary care for her own safety. Thus, this case turns on whether Rainbow had constructive knowledge of the hazard. A plaintiff may demonstrate a proprietor’s constructive knowledge of a hazard by showing that “(1) a store employee was in the immediate area of the hazard and could have easily seen the [foreign object] or (2) the foreign [object] remained long enough that ordinary diligence by the store employees should have discovered it.” (Punctuation and footnote omitted.) Johnson v. All American Quality Foods, Inc., ___ Ga. App. ___, *2 (Case No. A16A1724, decided Mar. 10, 2017); see Alterman Foods, Inc. v. Ligon, 246 Ga. 620, 623 (272 SE2d 327) (1980). (1) Donastorg asserts that constructive knowledge may be inferred because several Rainbow employees were working in the area of the hazard and had the opportunity to discover and remove the pin prior to her injury. The employees’ mere presence, however, is not in and of itself sufficient to survive summary judgment on 6 the issue of constructive knowledge. See Kroger Co. v. Williams, 274 Ga. App. 177, 178 (617 SE2 160) (2005). Rather, “it must be shown that the [employees were] in a position to have easily seen the [object] and removed it.” (Citation and punctuation omitted; emphasis supplied.) Id. In light of the small nature of the pin, there is no evidence from which to conclude that any Rainbow employee–three of whom were four to five feet away and behind cash registers, and the other of whom was on the side of Donastorg opposite the pin–would have been in a position to have easily seen and removed it. It follows that Donastorg has failed to create a jury question as to this issue. See id. at 178-179; Bolton v. Wal Mart Stores, Inc., 257 Ga. App. 198 (570 SE2d 643) (2002). (2) The evidence does create a jury issue, however, as to whether Rainbow had constructive knowledge of the hazard using the second prong of the test, i.e., whether the pin had remained on the floor long enough that ordinary diligence by the store employees should have discovered it. Constructive knowledge may be inferred when there is evidence that the owner lacked a reasonable inspection procedure. In order to prevail at summary judgment based on lack of constructive knowledge, the owner must demonstrate not only that it had a reasonable inspection program in place, but that such program was actually carried out at the time of the incident. In addition, to withstand a motion for summary judgment, the 7 plaintiff need not show how long the hazard had been present unless the owner has demonstrated its inspection procedures. (Citation and punctuation omitted.) Food Lion, Inc. v. Walker, 290 Ga. App. 574, 576 (1) (660 SE2d 426) (2008). The reasonableness of an inspection procedure depends on the nature of the business, the size of the store, and the number of customers. See id. Significantly, summary adjudication as to constructive knowledge arising from the duty to inspect is not authorized absent plain, palpable and undisputable proof that customary inspection procedures or cleaning practices were in place, were actually followed and were adequate to guard against known or foreseeable dangers at the time of the patron’s alleged injuries. (Citations omitted.) Burnett v. Ingles Markets, Inc., 236 Ga. App. 865, 867 (514 SE2d 65) (1999). There is no doubt, as illustrated by the express warning in its training manual, that Rainbow was aware of the specific risk associated with stray sensor pins on the floor. Likewise, the abundance of shoplifting activity suffered by Rainbow on a daily basis is well established in the record, as is Rainbow’s admission that shoplifters tended to randomly discard the sensor pins without regard to where they landed. Rainbow employees were authorized to attach the security sensors on the storeroom 8 floor, and the pins were known to become dislodged from dropped items and had previously been found on the floor. Yet Rainbow introduced no evidence of any policy or procedure requiring that the storeroom floor be inspected for safety hazards during working hours. In light of this evidence, we cannot say that the record before this Court presents “plain, palpable and undisputable proof” that Rainbow’s inspection procedures or cleaning practices “were adequate to guard against known or foreseeable dangers” at the time of Donastorg’s injury. Burnett, 236 Ga. App. at 867. We must remember that it is the jury, not the court, which is the fact-finding body. It weighs the contradictory evidence and inferences, judges the credibility of witnesses, receives expert instructions, and draws the ultimate conclusion as to the facts. The very essence of its function is to select from among conflicting inferences and conclusions that which it considers most reasonable. (Citation and punctuation omitted.) Kroger Co. v. Schoenhoff, 324 Ga. App. 619, 622-623 (751 SE2d 438) (2013). It follows that the trial court’s grant of summary judgment in favor of Rainbow as to the issue of constructive knowledge under the second prong of the test was erroneous. See Williams v. GK Mahavir, Inc., 314 Ga. App. 758, 761 (726 SE2d 71) (2012) (reversing the grant of summary judgment to 9 hotel defendant because question of fact remained as to whether hotel policy of cleaning the lobby “only if it needed to be cleaned” without any scheduled walk through or inspections for known hazards was reasonable); Gilbert v. Automotive Purchasing Svc., 254 Ga. App. 770, 772 (563 SE2d 906) (2002) (reversing grant of summary judgment to automobile seller after plaintiff slipped and fell on showroom floor because “it is for a jury to determine whether the [store] employee conducted a cursory and inadequate inspection which failed to disclose the substance upon which [plaintiff] slipped and whether the substance was discoverable upon a reasonable inspection”); see also Ramotar v. Kroger Co., 322 Ga. App. 28, 31 (743 SE2d 591) (2013) (physical precedent only) (reversing grant of summary judgment in favor of grocery store because, “[i]n the absence of reasonable inspection procedures, we cannot conclude as a matter of law that [defendant store] lacked constructive notice of the alleged hazard”). Citing Chastain v. CF Georgia North Dekalb L.P., 256 Ga. App. 802 (569 SE2d 914) (2002), Rainbow asserts that the trial court properly granted summary judgment in its favor regardless of the adequacy of its inspection procedures because of Donastorg’s deposition testimony regarding her inability to see the pin. In Chastain, the plaintiff deposed that in order to see the dribbles of water on the shiny 10 mall floor that caused her to fall, one would have had to bend down and look from a specific angle. Id. at 803-804. In affirming the trial court’s grant of summary judgment to the mall owner and janitorial service responsible for maintaining the floor, the majority of this Court held that, regardless of whether the defendants complied with their inspection policy, “[i]f there is no evidence that the [hazard] could have been discovered during a reasonable inspection, then no inference arises that defendants’ failure to discover the defect was the result of any alleged failure to inspect.” (Citation omitted.) Id. at 803; see also Blake v. Kroger Co., 224 Ga. App. 140, 144 (1) (480 SE2d 199) (1996). In essence, the Chastain majority held that plaintiff’s testimony established no causal connection between plaintiff’s injury and any alleged inaction by defendants as a matter of law. We cannot say the same under the facts presented in this case. First, it is not immediately clear from Donastorg’s testimony that it was the nature or location of the pin, as opposed to her position relative to it, that rendered it difficult for her to detect: [Attorney]: Did you see the pin before you stepped on it? [Donastorg]: No. ... 11 [Attorney]: Okay. Was the pin covered by anything? [Donastorg]: No. [Attorney]: It was just in the middle of the floor? [Donastorg]: Yes. [Attorney]: Do you think if you would have looked down at the floor you would have seen the pin? [Donastorg]: No, because the rack – the rack is so full, and I’m short, and [my daughter is] short, so we wouldn’t have seen it. It happened, like, right there. [Attorney]: I know. I understand you didn’t see it, but I guess my question is . . . if you looked down at the ground like this, do you think you could have seen it? [Donastorg]: No. [Attorney]: I thought you said it was out in the open. [Donastorg]: No, you wouldn’t have seen it. You tell me if I had looked down in front of me? No, because I was this way when I step backwards on the left side of the floor. [Attorney]: But there was nothing hiding it? [Donastorg]: No. 12 [Attorney]: Okay, If you were looking for the pin, do you think you could have seen it? [Donastorg]: No. Properly construing this testimony in the light most favorable to Donastorg, we cannot definitively conclude that it equates to an admission that even an employee who was fully aware of the hazards associated with stray sensor pins would not have been able to see and identify the hazard during a reasonable inspection of the storeroom floor. See Samuels v. CBOCS, Inc., 319 Ga. App. 421, 424 (742 SE2d 141) (2012) (distinguishing Chastain and reversing the grant of summary judgment to restaurant because it failed to show an inspection had been conducted and a factual question remained as to whether the foreign object would have been difficult to see during a reasonable inspection); Food Lion, Inc. v. Walker, 290 Ga. App. 574, 577 (2) (660 SE2d 426) (2008) (distinguishing Chastain and rejecting store’s assertion that it was entitled to summary judgment due to the difficulty in detecting the foreign substance when it “was on notice of the risk of the particular hazard that caused [plaintiff] to fall”). 13 Moreover, we cannot say as a matter of law that there is no causal connection between Donastorg’s injury and Rainbow’s lack of an inspection procedure to identify and remove known potential hazards from the storeroom floor during working hours. See generally Samuels, 319 Ga. App. at 424; Walker, 290 Ga. App. at 577-778. Compare Rodriquez v. City of Augusta, 222 Ga. App. 383 (474 SE2d 278) (1996) (affirming grant of summary judgment to property owner because an inspection had been done five to ten minutes prior to plaintiff’s fall and the foreign substance “was not visible to the eye”). “With regard to premises liability cases, the Supreme Court has made plain that where reasonable minds can differ as to the conclusion to be reached with regard to questions of whether an owner/occupier breached the duty of care to invitees . . ., summary adjudication is not appropriate.” (Citation and punctuation omitted.) Samuels, 319 Ga. App. at 424. Accordingly, we reverse the trial court’s grant of summary judgment to Rainbow and hold that genuine issues of material fact remain on the question of constructive knowledge. Judgment reversed. Ellington, P. J., Dillard, P. J., McFadden, P. J., and Ray, Branch, and Self, JJ., concur. Andrews and Bethel, JJ., dissent. 14 In the Court of Appeals of Georgia A17A0613. DONASTORG v. RAINBOW USA, INC. ANDREWS, Judge, dissenting. This is yet another premises liability case which turns on imputing the premises owner with constructive knowledge of the hazard, despite the absence of any evidence in the record as to how long the foreign object had been on the floor. In such cases, under Lau’s Corp. v. Haskins, 261 Ga. 491 (405 SE2d 474) (1991), it should be axiomatic that a premises owner would be entitled to summary judgment where there is an absence of evidence to establish an essential element of the plaintiff’s claim. However, in contravention of Lau’s Corp., this Court wrongly continues to impose a duty on the premises owner to produce evidence of adherence to a reasonable inspection procedure before considering the absence of evidence to support the plaintiff’s claim. See Williams v. GK Mahavir, Inc., 314 Ga. App. 758, 763 (726 SE2d 71) (2012). Nevertheless, even imposing such a duty on the appellee premises owner in this case, I believe the appellee satisfied that requirement and still was entitled to summary judgment. What constitutes a reasonable inspection procedure depends “on the nature of the business, the size of the store, the number of customers, the nature of the dangerous condition, and the store’s location.” Shepard v. Winn Dixie Stores, 241 Ga. App. 746, 748 (1) (527 SE2d 36) (2000). In this case, the appellee was a clothing store, not one of the usual suspects in a premises liability case where liquids or produce on the floor seem to be a common hazard. The appellee acknowledged its use of the security pins presented a risk of injury; its employee training materials cautioned about loose pins and showed the employees how to attach the security pins properly so as to protect the inventory against theft and to protect customers from the risk of puncture. But the record in this case shows the risk of injury associated with the security pins was effectively managed by the appellee. The appellee carried out a daily inspection procedure at least twice a day, by sweeping the floors in the morning and in the afternoon, and more frequently if needed. The store inventory usually consisted of approximately 2 95,000 articles of clothing, most of which had security pins attached. The store manager explained that pins could be loosened in a number of ways: sometimes by not attaching them securely; sometimes when an article of clothing was dropped to the floor; and sometimes when shoplifters pried them off. The store manager acknowledged a loose pin occasionally was found on the floor, but there was no probative evidence of any prior similar incidents. In light of the large number of security pins used in the store and the absence of any evidence of prior incidents of injury caused by pins on the floor, either the store’s customers were exposed to a minimal risk, or the store exercised extraordinary care keeping the premises safe. Under these circumstances, the appellee carried out a reasonable inspection procedure, as there was no need for the appellee to monitor the store floor more frequently than it did. Moreover, even if the appellee’s inspection procedure was not reasonable, or even if the appellee had totally failed to inspect the premises, constructive knowledge of the loose security pin on the floor could not be imputed to the premises owner unless the hazard could have been easily seen and removed. See Kitchens v. Restaurant Management Services, Inc., 192 Ga. App. 313, 314 (385 SE2d 11) (1989); Lovins v. Kroger Company, 236 Ga. App. 585, 586 (1) (512 SE2d 2) 1999). “If there 3 is no evidence that the [pin] could have been discovered during a reasonable inspection, then no inference arises that [the appellee’s] failure to discover the defect was the result of any alleged failure to inspect.” (Citation omitted.) Chastain v. CF Georgia North DeKalb, L.P., 256 Ga. App. 802, 803 (569 SE2d 914) (2002). In the instant case, the only evidence concerning the visibility of the security pin was the plaintiff’s admission that she could not have seen the pin even if she had been looking right at it. If the pin was invisible to the plaintiff, it stands to reason the pin was just as invisible to any of the appellee’s employees. For that reason, “summary judgment was proper because the alleged defect was, by [the appellant’s] own admission, so difficult to detect. Constructive knowledge can only be inferred with proof that the proprietor or its agent could have easily discovered and corrected the alleged hazard.” (Citation omitted.) Lindsey v. Ga. Building Authority, 235 Ga. App. 718, 720 (509 SE2d 749) (1998). In summary, here it was undisputed neither party had actual knowledge of the loose security pin on the floor, and there was no evidence as to how long the pin had been on the floor. There was no evidence of any prior similar incident involving this specific hazard, which, considering the sheer volume of security pins in use at the appellee’s store on a daily basis, surely attested to the appellee’s diligence in 4 maintaining a premises safe for its customers. And lastly, the evidence showed that the loose security pin was not visible and therefore not easily removable. The above factors add up to one conclusion: that the appellee exercised ordinary care in keeping its premises safe for its invitees and thus was entitled to summary judgment. Accordingly, I dissent from the majority opinion’s reversal of the grant of summary judgment for the appellee. I am authorized to state that Judge Bethel joins in this dissent. 5
Mid
[ 0.5862068965517241, 27.625, 19.5 ]
Q: Magento 2 redirects url to https but not admin panel I know this question is more about apache config, but it involves Magento too. Currently i have configured my Magento with 2 different URLs, for port 443 or https I have an url like this: https://subdomain.domain.org/ for http i have: http://subdomain.domain.org/folder I want to redirect whenever a user types subdomain.domain.org to https://subdomain.domain.org, but if i do this my admin panel redirects there too, i have tried RewriteCond but no one of them worked, my admin panel url is: http://subdomain.domain.org/folder/admin , this link should not be redirected. Can someone help me to figure out how to do this? Thank you! A: Please check with below posibilities : check with your .htaccess ( url rewrite ) check your admin base url. i.e htaccess : Options +FollowSymLinks #Include this line if you are using Godaddy hosting RewriteEngine On RewriteCond %{REQUEST_URI} !(.*)subfolder RewriteRule ^(.*)$ subfolder/$1 [L] another option : goto database core_cofig table path - admin/url/use_custom set value 0 path - admin/url/use_custom_path set value 0 I hope its very helpful to you
High
[ 0.7098674521354931, 30.125, 12.3125 ]
Deployment stressors, gender, and mental health outcomes among Gulf War I veterans. Findings indicate that war-zone exposure has negative implications for the postdeployment adjustment of veterans; however, most studies have relied on limited conceptualizations of war-zone exposure and focused on male samples. In this study, an array of deployment stressors that were content valid for both female and male Gulf War I military personnel was examined to elucidate gender differences in war-zone exposure and identify gender-based differential associations between stressors and mental health outcomes. While women and men were exposed to both mission-related and interpersonal stressors and both stressor categories were associated with mental health outcomes, women reported more interpersonal stressors and these stressors generally had a stronger impact on women's than on men's mental health. Exceptions are described, and implications are discussed.
High
[ 0.6633906633906631, 33.75, 17.125 ]
{ "name": "example-example59", "files": [ "index-production.html", "script.js", "http-hello.html", "protractor.js" ] }
Low
[ 0.502631578947368, 23.875, 23.625 ]
[Treatment of calcaneus and mid-foot fractures using closed reposition and fixation with the Ilisarov fixator]. Sixteen fractures of the calcaneus involving the subtalar joint were treated by closed reduction and external fixation using the Ilisarov apparatus. Except for four cases in which temporary arthrodesis of the subtalar or ankle joint was used, fixation was usually only used for the calcaneus. The operative technique is described precisely. Initial follow-up examinations (on average after 1 year) show advantages over conservative treatment, e.g. better anatomical reduction. In addition, early mobilization of the joint and early weight-bearing result in less pain from disuse osteoporosis. Furthermore, several case reports demonstrate the efficiency of this method in tarsal and metatarsal fracture-dislocations.
High
[ 0.688783570300158, 27.25, 12.3125 ]
Neurobiological similarities in depression and drug dependence: a self-medication hypothesis. Epidemiological and clinical data indicate high comorbidity between depression and drug dependence that may reflect an attempt to self-medicate with drugs of abuse. The present review examines whether these two psychiatric disorders are related by attempting to identify similarities in the neurobiology of depression and drug dependence. Emphasis is put on the neuromechanisms that may mediate specific core symptoms of both disorders that reflect alterations in reward and motivational processes. First, the epidemiological and clinical data on the comorbidity of the two disorders are reviewed briefly. Then, the neuroadaptations associated with psychomotor stimulant, opiate, ethanol, nicotine, and benzodiazepine dependence in animals are reviewed. Finally, the neurotransmitter systems whose function appears to be altered in depression (i.e., serotonin, norepinephrine, acetylcholine, dopamine, gamma-aminobutyric acid, corticotropin releasing factor, neuropeptide Y, and somatostatin), as revealed primarily by animal studies, are discussed. It is concluded that drug dependence and depression may be associated with alterations in some of the same neurotransmitter systems and, in particular, with alterations of neurotransmitter function in limbic-related brain structures. Thus, these two psychiatric disorders may be linked by some shared neurobiology. Nevertheless, it remains unclear whether drug abuse and depression are different symptomatic expressions of the same preexisting neurobiological abnormalities, or whether repeated drug abuse leads to the abnormalities mediating depression (i.e., drug-induced depressions). The hypothesis of self-medication of non-drug- and drug-induced depressions with drugs of abuse is also discussed as a potentially important explanatory concept in understanding the observed clinical comorbidity of these two psychiatric disorders.
High
[ 0.6973848069738481, 35, 15.1875 ]
Q: Sum of Square-Weights For positive reals $a,b,c$, prove that $$\frac{a^3+b^3+c^3}{3abc}+\sum_{\text{cyc}} \frac{a(b+c)}{b^2+c^2}\geq 4$$ I've heard of a lemma stating if a polynomial expression $f(a,b,c)$ satisfies both $f(a,b,c)=f(b,a,c)$ and $f(a,a,c)=0$, then it is divisable by $(a-b)^2$. I tried splitting up the expression into different polynomials where the lemma could be applied but had no success. I would appreciate any help. Thanks in advance. A: $\sum_{\text{cyc}} \dfrac{a(b+c)}{b^2+c^2} -3=\sum_{\text{cyc}}(\dfrac{a(b+c)}{b^2+c^2} -1 )=\sum_{\text{cyc}}\dfrac{b(a-b)+c(a-c)}{b^2+c^2}=\sum_{\text{cyc}}(\dfrac{b(a-b)+}{b^2+c^2}+\dfrac{a(b-a)}{a^2+c^2})=\sum_{\text{cyc}}(\dfrac{(a-b)^2(ab-c^2)}{(b^2+c^2)(a^2+c^2)})=\sum \dfrac{(a-b)^2(ab)}{(b^2+c^2)(a^2+c^2)}-\sum \dfrac{(a-b)^2c^2}{(b^2+c^2)(a^2+c^2)}\ge \sum \dfrac{(a-b)^2(ab)}{(b^2+c^2)(a^2+c^2)}-\sum \dfrac{(a-b)^2c}{4abc}$ $\dfrac{a^3+b^3+c^3}{3abc}-1 =\sum \dfrac{(a+b+c)(a-b)^2}{6abc}$ $\sum \dfrac{(a+b+c)(a-b)^2}{6abc} -\sum \dfrac{(a-b)^2c}{4abc}=\dfrac{1}{12abc}\sum (a-b)^2(2(a+b+c)-3c)=\dfrac{1}{12abc}\sum (a-b)^2(a+b)+\dfrac{1}{12abc}\sum (a-b)^2(a+b-c)$ $\sum (a-b)^2(a+b-c)\ge 0 \iff a^3+b^3+c^3+3abc \ge \sum a^2b$
High
[ 0.6825595984943531, 34, 15.8125 ]
In the wake of the coronavirus pandemic, in the past two weeks the U.S. has been ramping up efforts to promote Taiwan’s inclusion into the World Health Organization (WHO) and other international bodies. Despite not being a world power and having inferior access to international organizations, labor, and resources, U.S. ally the Republic of China (Taiwan) is waging a much more effective fight against coronavirus than its nemesis, the People’s Republic of China (China). China is currently reporting over 83,000 cases of coronavirus, with over 3,300 deaths. As China has a population about 60 times larger than that of Taiwan, one would expect Taiwan to have approximately 1,400 cases and about 55 deaths. Instead, as of this writing Taiwan is remarkably only facing about 370 cases and five deaths. Given recent U.S. intelligence reports that China has underrepresented its cases in the past, the extent to which Taiwan is besting China is likely more significant. But how can this be? By “prioritizing the containment of information, rather than the virus itself,” China lost valuable time in stemming the tide of what would become a worldwide pandemic. In fact, one report claimed that China could have avoided 95 percent of its cases if it had begun acting against the virus three weeks earlier than it did. Three ways in which China falters and Taiwan excels in its containment of coronavirus are in the two countries’ respective treatment of 1) their own first responders and experts, 2) the WHO, and 3) other countries. China Suppresses Its Experts, While Taiwan Puts Them To Work China used its government officials to intimidate doctors and others who raised concerns about the threat of the coronavirus. After Wuhan doctor Li Wenliang and Wuhan Central Hospital director Ai Fen posted information on WeChat on December 30 about the newly discovered virus, China responded by reprimanding both of them. Li Wenliang was forced to sign a letter stating that he lied about the virus. (Li Wenliang died from coronavirus in early February, and China recently declared him a “martyr” in a hollow gesture.) In early January, a local Wuhan communist official ordered labs to stop testing and destroy samples. In a bizarre about-face almost three weeks later, China issued a directive that stated, “[A]nyone who deliberately delays and hides the reporting of [coronavirus] cases out of his or her own self-interest will be nailed on the pillar of shame for eternity.” But even after this statement, China continued to prevent the facts from coming to light. In mid-February, the Wuhan Institute of Virology officially denied the identity of a person who many believe is “patient zero,” one of its researchers named Huang Yanling. The Institute also appears to have recently scrubbed information about her from its website. Huang Yanling is presumed missing, with many believing she died from the virus and was cremated. This stonewalling of facts targeted not just the scientific community but also dissidents. A Chinese property tycoon recently went missing after publicly criticizing Xi Jinping for his response to the coronavirus. Taiwan, in contrast, quickly deployed its doctors, scientists, and government officials to combat the spread of the coronavirus. In early December, Taiwan’s health officials were checking passengers from flights from Wuhan for symptoms. Taiwan required its hospitals to test and report cases shortly after its fact-finding mission to China on January 12. On January 20, Taiwan’s CDC also relaunched its Central Epidemic Command Center, which Taiwan previously established following the SARS outbreak in 2003. This launch in turn allowed enabled Taiwan to execute a list of 124 public policies to fight the coronavirus. In contrast to China, Taiwan’s government officials are transparent, competent, and widely respected. Nicknamed the “Iron Minister,” Health Minister Chen Shih-chung brings a “sincere attitude and transparent approach” to matter-of-fact daily briefings on the coronavirus pandemic, and a current poll put his popularity at 91 percent. The current vice president, Chen Chien-jen, also provides policy expertise. An epidemiologist by training, Chen Chien-jen is praised in Taiwan as successfully containing SARS in 2003 in his previous role as health minister. China Stonewalled the WHO, While Taiwan Tried in Vain to Get Its Attention China further delayed what could have been an effective response to the coronavirus by refusing outside assistance. China only notified the WHO of the coronavirus on December 31, approximately three weeks after Chinese doctors discovered cases. China finally agreed to allow WHO experts into the country on February 2. Not only did China delay working with the WHO, but it also outright refused an offer of cooperation from the U.S. Centers for Disease Control and Prevention (CDC). Rather than criticize China, the WHO praised it in January and February. Ironically, it was Taiwan, not a member of the WHO due to pressure from China, that tried in vain to give the WHO timely and valuable information on the coronavirus. Taiwan asked the WHO questions and provided it with warnings about human-to-human transmission in December, but the WHO ignored both. More absurdly, WHO tweeted on January 14 that “Chinese authorities have found no clear evidence of human-to-human transmission.” In fact, China publicly acknowledged human-to-human transmission of the virus only on January 20, three weeks following Taiwan’s warning to the WHO. Taiwan was upfront in sharing its coronavirus cases and methods of prevention with the WHO, but the WHO responded by not sharing Taiwan’s information with members. Despite all of Taiwan’s efforts to do right by the WHO, the WHO continues to deny the country’s existence. In late March, Hong Kong journalist Yvonne Tong asked WHO Assistant Director-General Bruce Aylward if the WHO would consider Taiwan membership. In a clip that has now gone viral, Aylward responded by pretending not to hear the question, then asking Tong to move on. When Tong again asked about Taiwan, Aylward appeared to hang up on Tong. When Tong called back and again pressed Aylward on Taiwan, he responded by stating, “Well, we have already talked about China, and you know, when you look across all the different areas of China, they’ve actually all done quite a good job,” (my emphasis) and then abruptly concluding the interview. Following the interview, Aylward was mysteriously scrubbed from the WHO’s website. So it looks like the WHO will continue to parrot China’s position that Taiwan is not a sovereign nation and exclude Taiwan, even if doing so is so obviously counterproductive to world health. China Gives Deceptively, While Taiwan Extends Aid With Integrity China is doing little to build trust with other countries dealing with the pandemic and instead is opting for deception and belligerence. China is spreading a disinformation campaign against the United States, claiming that the coronavirus was created in a lab by the United States military. China has also claimed that the virus started in Italy. Rather than provide the United States with reliable information, China has expelled several American journalists from the country. Perhaps most egregious is China’s “mask diplomacy.” China has sent Europe defective facemasks and test kits. In light of these developments, New York authorities should view the Chinese ventilators recently donated to the city with great suspicion. Additionally, China is reportedly willing to give France one billion face masks, but only if it purchases 5G equipment from Huawei. Huawei itself had donated 800,000 masks to the Netherlands, while Netherlands is still debating whether or not to adopt Huawei’s 5G equipment. China’s masks to Italy, Spain, the Czech Republic, and Greece have been panned as cheap PR stunts to divide the European Union and to increase European dependency on China. Interestingly, Europe paid for most of the supplies from China; China did not donate them. Taiwan’s “mask diplomacy” appears far less problematic. Taiwan has pledged to send 10 million masks to countries most in need, including two million to the Untied States. These are donations. Taiwan has also pledged to work with the United States on prevention efforts as well as vaccine development. Taiwan has also donated food and supplies to the Vatican. Looking Ahead to A Stronger U.S.–Taiwan Partnership In 1971, the United Nations voted to expel Taiwan and recognize China in its place as “the only legitimate representative of China to the United Nations.” The United States was complicit in Taiwan’s isolation: President Nixon met with Mao in 1972, and President Carter declared People’s Republic of China as the sole legitimate Chinese government in 1979. But from its imposed pariah status, and with limited resources, Taiwan has so far managed to effectively battle coronavirus better than most, including China. Taiwan’s effective battle against the coronavirus will have downstream benefits to the United States. The current U.S. administration has been extremely pro-Taiwan, arguably more so than its predecessors. This administration sold F-16s to Taiwan, the first such sale since 1992. President Trump became the first president to speak directly with Taiwan since 1979, and he has questioned the “One-China Policy.” This administration should continue to promote policies that are mutually beneficial to both countries, potentially using the recently enacted TAIPEI Act as a catalyst. This administration should also continue to support Taiwan’s inclusion in the WHO and other world bodies, establish a full U.S. embassy in Taipei, increase bilateral trade, sign a U.S.–Taiwan free trade agreement, and boost defense contracts with the country.
High
[ 0.6762028608582571, 32.5, 15.5625 ]
when 1 - (-15)/(-3 + 4) is divided by 9. 7 Suppose -i = 2 - 4. Suppose 5*q - 19 = -2*v, v - 4 = 5*q - i. Calculate the remainder when v is divided by 4. 3 Let r(q) = q**3 - 2*q**2 - 4*q - 2. Suppose -5*n = -790 + 220. Let p = n + -73. Calculate the remainder when p is divided by r(4). 13 Calculate the remainder when 6/(6/4 + -1) is divided by 84/(-30)*(-5)/2. 5 Let l = 32 - 14. Suppose 13 = 3*u - 17. Calculate the remainder when l is divided by u. 8 Let b = -34 + 47. What is the remainder when b is divided by 9? 4 Let z = 13 + 15. What is the remainder when z is divided by 16? 12 Suppose 2*p - 47 = -3*x, 36 = 2*x - 0*p - p. Let w(m) = -m**3 + 9*m**2 + 6*m + 11. What is the remainder when w(9) is divided by x? 14 Let d(s) = -8*s + 67. What is the remainder when 50 is divided by d(6)? 12 Let g(b) = b**3 - 5*b**2 + 3*b + 3. Let j be g(4). What is the remainder when (-6)/(-21) + (-318)/(-14) is divided by ((-12)/9)/j*6? 7 Let p be (-8)/(-6) + 2/(-6). Let i = p - -4. Suppose 5*c - 4*c = 14. Calculate the remainder when c is divided by i. 4 Let c = 9 + -7. What is the remainder when (-6)/3 - (-20 - c) is divided by 11? 9 Suppose 19*y - 14*y - 90 = 0. Let g(v) = -5*v. Let z be g(-1). Suppose -q = -z*q + 40. Calculate the remainder when y is divided by q. 8 Suppose -14 = -a - 7. Suppose -2*q - 4*x = 6 + 6, 2*x = 5*q - 30. What is the remainder when a is divided by q? 3 Suppose -5*k = 36 - 151. Suppose 8*c = 7*c + k. Calculate the remainder when 90 is divided by c. 21 Suppose 2*l = 4, -2*a - 2*l - 3*l = -34. Suppose -92 = -4*p - a. Let d = 28 - p. Calculate the remainder when d is divided by 3. 2 Let c = 15 - -3. What is the remainder when 105 is divided by c? 15 Suppose n + 3 = 3*f, n + 0*n + 4*f = 11. What is the remainder when 19 is divided by (4/(-10))/(n/(-75))? 9 Suppose 0 = 2*j + 12 - 20. Suppose -2*i + 3 = -7. Suppose 2*t + i*u - 16 = 0, -4*t + 2*u = -u - 6. Calculate the remainder when j is divided by t. 1 Let i = -3 + 5. Suppose -i*s + 0*s - 3*p + 50 = 0, 0 = -2*s - p + 50. What is the remainder when s is divided by 9? 7 Suppose -3*o - 2*o - 10 = 0, -4*o - 2 = 3*g. Calculate the remainder when 2 is divided by g. 0 Suppose -4*l = -20, 11*n - 221 = 9*n - 3*l. What is the remainder when n is divided by 5? 3 Let o = -2 + 5. What is the remainder when 10 is divided by o? 1 Suppose -7*s + 40 = -3*s. What is the remainder when 38 is divided by s? 8 Suppose -3*y + 84 = 3*y. What is the remainder when y is divided by 8? 6 Suppose 2*h + 40 = 6*h. Let x = h - -4. Calculate the remainder when x is divided by 8. 6 Let q be 1 + 35 + (2 - 0). Suppose -3*f - 2*f - 110 = 0. Let n = q + f. What is the remainder when 31 is divided by n? 15 What is the remainder when 19 + 1*(5 - 2) is divided by 12? 10 Suppose -k = 4*p - 122 - 108, -222 = -4*p - 5*k. What is the remainder when p is divided by 20? 18 Suppose -v - v + 6 = 0. Suppose -v*p - 64 = -4*p + 3*l, 4*l - 304 = -4*p. Suppose 5*w - p + 8 = 0. Calculate the remainder when w is divided by 7. 6 Let t be -2*(-1)/(-2) - 0. Let d = 24 + -14. Calculate the remainder when 29 + (t - 0) - -1 is divided by d. 9 Suppose -3*o = 2*r - 39, -3 + 1 = -r + 2*o. Suppose -4*s = -5*t + 126, s - 19 = -5*t + 87. Calculate the remainder when t is divided by r. 10 Suppose l + 2 = t - 2, 0 = -3*l + t - 2. What is the remainder when 3 is divided by l? 0 Suppose 6 = t + t. Suppose -t*f + 15 = 0, -f - 100 = -5*s + 2*f. Calculate the remainder when s is divided by 12. 11 Let w = 51 - 47. What is the remainder when (-1 - 14/(-4))*2 is divided by w? 1 Suppose 0 = -0*i - 5*i + 25. Let l be 4 + (3/(-3) - -1). Suppose l*c = -5*a - 17, -c = c + 2*a + 6. Calculate the remainder when i is divided by c. 1 Suppose -4*r + 75 = 4*t - 13, 0 = t + 3*r - 18. Calculate the remainder when t is divided by 5. 4 What is the remainder when (-445)/(-5) + -2*2 is divided by 22? 19 Suppose -2*d = -11 - 117. Suppose l + 5 = -3*k + 2*k, 5*k + 20 = 0. What is the remainder when (1/l)/((-2)/d) is divided by 11? 10 Let m = -22 + 8. Let l = m + 29. Calculate the remainder when 44 is divided by l. 14 Suppose -b + 13 = 5*z, 0 = 3*z + 2*b - 3 - 2. Let g(d) = -5*d + 1 + 3*d + z*d. Calculate the remainder when 19 is divided by g(6). 5 Let t = -2 - -7. Let s(o) = -o**3 - 7*o**2 - 6*o. Let m be s(-6). What is the remainder when 2*8 + (m - 2) is divided by t? 4 Let c(f) = 2*f**3 - 8*f**2 - f - 6. What is the remainder when c(5) is divided by 6? 3 Suppose 2*a - 12 - 74 = 3*z, 0 = 5*a + z - 181. Calculate the remainder when 71 is divided by a. 34 Let u be 1*(-1)/2*0/(-1). Suppose 3*f + 4*d = 8*d - 16, 2*d = f + 8. Suppose -2*g + f*g + 22 = u. Calculate the remainder when 20 is divided by g. 9 Calculate the remainder when 5*(-6)/(-15) + 41 is divided by 23. 20 Let b(x) = 7*x - 16. Suppose k - 162 = -2*k. What is the remainder when k is divided by b(5)? 16 Let u = 25 - 24. What is the remainder when u is divided by 1? 0 Let o(a) = -a**3 - 8*a**2 - a - 6. Let n be o(-8). Let f = n - 2. Suppose 5*y + 4*v - 44 = f, -y + 9 = v - 0*v. Calculate the remainder when 21 is divided by y. 5 Suppose -2*x - 2*w = w + 6, 4*x + w + 2 = 0. Suppose x = d - 4*d + 12. Calculate the remainder when 9 is divided by d. 1 Suppose 8 = 4*j - 132. What is the remainder when j is divided by 5? 0 Let j(b) = -b**2 - 12*b + 1. Calculate the remainder when j(-4) is divided by 17. 16 Let i be 5/1*4/5. Suppose -15 = 3*l, i*k + k - 90 = l. Suppose 3*n = 140 + 7. What is the remainder when n is divided by k? 15 Suppose 2*n + 7 = 3*n + 5*h, -4*n - 3*h = -28. What is the remainder when 30 is divided by n? 2 Let h = 5 - 14. Let n be (2*1)/((-4)/(-26)). Let d = h + n. Calculate the remainder when 11 is divided by d. 3 Suppose 4*w - 7 = -o, 0*w - 4*o = 2*w. Suppose -11 = w*n + 13. Calculate the remainder when n/(-14)*(-42)/(-2) is divided by 10. 8 Let x = -21 - -45. Let g(o) = -o**3 - o**2 + 4*o + 3. What is the remainder when x is divided by g(-3)? 6 Suppose 0 = -5*w - 5*d - 17 + 77, 4*w - 46 = -2*d. Let m = 1 - -3. Calculate the remainder when w is divided by m. 3 Suppose -f - 13 = -0*f. Let a = f + 30. What is the remainder when a is divided by 6? 5 Suppose 16 = 19*y - 18*y. Calculate the remainder when 61 is divided by y. 13 Let h(i) = 0*i - 4*i + 2 + 1 - i**2. Calculate the remainder when (11 + (-3)/1)/2 is divided by h(-4). 1 Let g = 248 - 143. Suppose 4*r - 5*k = 95, 0*r - g = -4*r - 5*k. What is the remainder when r is divided by 13? 12 Suppose 2*j - 2 = 4*v + j, 2*j = -3*v + 4. Let t = 4 - -1. Suppose -11 - 7 = -n - 5*s, v = 2*n + t*s - 21. What is the remainder when 5 is divided by n? 2 Suppose -4*b + 8 + 32 = 0. Let l = 260 + -241. What is the remainder when l is divided by b? 9 Let p = -4 - -7. Let y(x) = -x**2 + 4*x + 4. What is the remainder when p*1/((-2)/(-4)) is divided by y(4)? 2 Let k = 2 + 9. What is the remainder when k is divided by 2/3*(-36)/(-6)? 3 Suppose 0 = 5*o - 7*o + 20. What is the remainder when 29 is divided by o? 9 Let l = 78 + -67. What is the remainder when l is divided by 7? 4 Suppose -5*p = -4*p. Suppose p = 3*s - s + 22. Let a = s - -27. Calculate the remainder when a is divided by 9. 7 Let s(p) = -2*p. What is the remainder when 31 is divided by s(-4)? 7 Suppose -5*l + 238 + 87 = 0. What is the remainder when l is divided by 22? 21 Let b = 1 + 6. Let l = 16 + -3. What is the remainder when l is divided by b? 6 Suppose 3 + 6 = 3*b. Calculate the remainder when b is divided by (8/(-4)*-1)/1. 1 Let r(c) = 4*c + 10. Let h be r(6). Let d = h - 5. Calculate the remainder when d is divided by 10. 9 Suppose -2*o + 5*o - 5*a = 22, -o = -3*a - 10. Calculate the remainder when 10*1/(20/12) is divided by o. 2 What is the remainder when -2 + 1070/35 + (-3)/(-7) is divided by 16? 13 Let r = 12 - 3. Calculate the remainder when 14 is divided by r. 5 Let b = 11 + -6. Suppose -5 = b*i - 2*n, -2*n = -5*i - n. Suppose u - 3 + 1 = 0, -3*u + 12 = 3*k. Calculate the remainder when k is divided by i. 0 Let g(x) = -x**3 - 3*x**2 + 14*x + 2. Calculate the remainder when 51 is divided by g(-6). 25 Let c be 6 - 10 - 2*-4. Suppose 57 = c*z - 4*l - 95, z = 4*l + 50. Calculate the remainder when z is divided by 9. 7 Suppose -f = -3*w + 82, 2*w - 2*f + f - 55 = 0. What is the remainder when 51 is divided
Low
[ 0.5039370078740151, 24, 23.625 ]
May 12, 2017 According to Hurriyet Daily News, Turkish President Recep Tayyip Erdogan said on May 12, 2017, that the U.S. support of the Syrian Kurds harms the strategic relations between the two countries. He [...] The next round of the Syrian talks under the auspices of the United Nations between the Syrian government and the opposition will take place in Geneva from May 16-19. During the upcoming meeting, the [...] Given an interview to Belarusian TV Channel ONT, Syrian President Bashar Assad said that the establishment of the de-escalation zones in Syria was a great chance for militants to lay down their arms [...]
Low
[ 0.46563192904656303, 26.25, 30.125 ]
Q: Is there a libfaketime alternative for Golang? I want to automate some tests where I have to manipulate the system time to check for authentication behaviours of a program that is written in golang. According to this post, libfaketime does not work with golang. Is there another way that I can achieve what I want to do with libfaketime? Here's a description of what libfaketime does from github. libfaketime intercepts various system calls that programs use to retrieve the current date and time. It then reports modified (faked) dates and times (as specified by you, the user) to these programs. This means you can modify the system time a program sees without having to change the time system-wide. A: No, there is none. You need to use something like clockwork (see this for more) and explicitly pass "time" implementation around your code.
Low
[ 0.51501154734411, 27.875, 26.25 ]
GRIFFIN, GA (January 26, 2010) -- A budding driving career and a trip to college are on tap for Max Gresham in 2011 according to plans announced today. Gresham, a 17-year-old Griffin, GA driver, stated he has been accepted and plans to attend Belmont Abby College in Belmont, NC this coming fall. According to Gresham, the suburban Charlotte school offers a bachelor's degree in Business Management with a concentration in Motorsports Management. The four-year degree, designed with a specific focus on the business and management side of the racing industry, is the first of its kind in the country. "My plan is to get a degree in their Business Administration/Motorsports Management program," stated Gresham, a graduating Senior student at Woodward Academy in College Park, GA. "Belmont Abby is a great school and a lot of my friends in racing have gone through the Business and Motorsports Marketing program there. It's awesome that I can get a degree in a program and area that I really love." Gresham also noted that the school's proximity to Charlotte was a factor in his college choice. The winner of two NASCAR K&N Pro Series events and an ARCA race in 2010, Gresham will turn 18 on April 30 and hopes to compete in select NASCAR Truck and Nationwide Series events throughout the second half of the 2011 season. He has already announced a five-race ARCA superspeedway program with Venturini Motorsports for 2011. "It's great that Belmont Abby is close enough to Charlotte so I am able to participate in anything I need to do to advance my driving career," Gresham stated. "All freshmen at Belmont Abby have to live on campus and I am looking forward to that. It will be great meeting new people. I want to have the full Belmont Abby College experience." Gresham already has a guaranteed starting spot in the event that will bring together the top NASCAR short track champion and race winning drivers from across North America. The 225-lap NASCAR K&N Pro Series all-star race is broken up into three sections -- two 100-lap segments and a 25-lap dash for cash to the finish.
High
[ 0.6606741573033701, 36.75, 18.875 ]
Talk about slaying demons. This time last year, England looked as if they couldn't play India's spinners - and Kuldeep Yadav, in particular - to save their lives. Barely a week after Kuldeep claimed 5 for 24 in an T20I in Manchester on July 3, 2018, he took 6 for 25 in an ODI in Nottingham, on July 12. Underlining his mastery over England, he dismissed Joe Root with the first ball he bowled at him in both matches. But things change. By the end of that limited-overs series, Root had made two unbeaten centuries and England felt they had worked out a method to combat Kuldeep. Also read: Kohli questions 59-metre boundary on rough day for India's spinners They knew the challenge that awaited them in this game. They had learned from last year and they had trained extensively against a really quite good left-arm leg-spin bowler, 20-year-old Nick Oxley, who has been bowling at them in the nets in recent days. They were ready. It was England's play against spin that separated the sides in this match. For while the excellence of England's seamers was matched - or even surpassed - by India's, only one side was obliged to deliver 20 overs of spin on a pitch offering them little. And while India's seamers conceded a more than respectable 173 from their 30 overs, India's spinners conceded a somewhat less respectable 160 from 20. Watch on Hotstar (India only): Highlights of Roy's innings While last year, England were tentative against Kuldeep and Co., here they were bold. His first over was taken for 13, his second for 12. While last year he was able to post two slips - leg and conventional - here he spent more time wondering which boundary to protect. By the time he had bowled four overs, he had conceded 46. It's not hard to see why England took a chance with Jason Roy's fitness. The uncompromising manner in which he attacks bowlers can not only unsettle them, but take the pressure off his partners. In Kuldeep's first over he twice skipped down the pitch to drive him back down the ground while Yuzvendra Chahal was swept - both slog and reverse - until he wasn't sure where to bowl. Roy has now passed 50 six times in seven ODIs in a spell which has also included two centuries. It is telling that England lost the only match in which he failed - he made eight against Pakistan earlier in this tournament - and two of the games he missed. "He intimidates bowlers," his captain, Eoin Morgan, said. "He's a gun player. Having him back is a big confidence booster for everyone." The partnership with Jonny Bairstow is prolific. They have now recorded nine century stands in the 30 ODIs in which they have opened together, with seven more half-century stands. Their average - 65.86 - puts them right at the top of regular ODI partnerships (20 or more games) in history. And if Bairstow frustrated a few of his teammates - and certainly some of the team management - with his comments ahead of the game, he does seem to perform better when he feels he has a point to prove. So while he enjoyed some fortune early in this innings - 11 of his first 17 runs came from the edge and twice he survived inside edges passing perilously close to the stumps - he also produced some bold strokes: all six of his sixes came off the spinners; all six came in the arc between long-on and mid-wicket with Chahal conceding four of them. It seemed to make no difference if there was a man on the fence; it seemed to make no difference if it was the long boundary. "It was definitely a match-winnings innings," Morgan said. "He likes a bit of fire in his belly and, if he plays like that [afterwards] I don't mind." Jason Roy pulls it toward fine leg on course to a rapid fifty Getty Images The pace they score is important, too. Recognising that stroke-making is likely to be easier against the newer, harder balls, England are far more aggressive in the opening overs than India. So while they managed a relatively modest 47 from their first 10 overs here, it was still 19 more than India. After 20 overs, the difference was 62 runs (145-0, compared to 83-1). Eventually the rate grew too steep even for MS Dhoni to contemplate. Watch on Hotstar (India only): Bairstow dazzles with 111 So bright was the start provided here - England were 160 without loss after 22 overs - that it allowed their teammates to withstand a later period when they scored just 25 in 10 overs in mid-innings (from the 28th to the 37th over). As a consequence, they still had wickets in hand for a late assault which, on this occasion, was provided by Ben Stokes. He has now made between 79 and 89 four times in the tournament, with Rohit Sharma praising his defining contribution. "Until then we were in the game," he said. "We needed someone like Stokes." But could Stokes' acceleration have come without the platform provided by his openers? It seems unlikely. Both Bairstow and Morgan later insisted there was no predetermined plan to target the spinners. Rather, Morgan said, they had hoped to put all the bowlers "under as much pressure as possible" in the hope that one of them cracked. That wasn't possible with Mohammed Shami - whose figures were spoiled by an expensive couple of death overs but was exemplary at the start of the innings - and Jasprit Bumrah immaculate. But once Roy survived a leg-side catch off Pandya - he had 21 at the time; if India had called for a review he would have been out - it precipitated an acceleration which saw 108 plundered from the next 10 overs. In all they took 112 in 80 deliveries from the spinners, giving them no chance to settle into a spell. "It was a great period for us," Morgan agreed. "That period from overs 10 to 20 was probably the difference in the game. Jonny and Jason can make wickets seem flat. And they did in that period." Maybe England read the conditions better, too. While the evidence of the previous game on the ground - the Pakistan and New Zealand match - suggested there would be significant assistance for spinners, England realised that may not be the case here. That previous game had been played on a used surface, after all, and after a period of prolonged poor weather which had limited the ground staff's preparation time. This was a fresh surface and the game was played after two of the hottest days of the year. So England left out Moeen Ali. The seamer they played instead, Liam Plunkett, benefited from some purchase with his cutters and claimed the wickets of Virat Kohli, Rishabh Pant and Hardik Pandya; which is quite a trio. India, meanwhile, persevered with two spinners. And while they were committed to bowling 20 overs of spin - overs that cost 160 in all - England delivered just six. All of India's seamers conceded fewer than seven runs an over; both their spinners conceded more. The India squad looks at least one seamer short. "It was a lot more difficult to face seam on that wicket," Bairstow said. "It was a bit two-paced so we had a difficult start against them. And their spinners have been a strength of theirs in those middle overs for a long time. But we played them well and you build confidence." Confidence that could yet serve them well in this tournament. If - and it is a big if - England can defeat New Zealand on Wednesday, there is a strong chance (South Africa would have to beat Australia to deny them) they could meet India again at Edgbaston in the semi-finals. Bearing in mind England have now won 10 international matches in a row here and the confidence with which they negated the spin threat may leave India with some thinking to do. Such scenarios can wait. This was a day when England's World Cup campaign could have come to a standstill. They will go to Durham with hopes revived.
Mid
[ 0.654867256637168, 37, 19.5 ]
Graphics processing architectures may facilitate the delivery of immersive experiences such as virtual reality (VR) environments, augmented reality (AR) environments and multi-player games to users. These experiences may involve the capture of 360° video content, wherein the captured video content may be used to deliver the immersive experience to a display such as a head mounted display (HMD) in real-time. The time-sensitive nature of real-time immersive experiences may present various image capture and encoding challenges with respect to power consumption, battery life and quality.
High
[ 0.673417721518987, 33.25, 16.125 ]
It’s more than a little ironic that Murdoch made these comments just a day or so after admitting that his company screwed up royally with Myspace, the social-networking leader it paid more than half a billion dollars for in 2005 — only to be forced to sell it last year for just $35 million after mismanaging it into oblivion. In a message that seemed to be a response to his many critics on Twitter, he admitted that the simple answer to the entity’s massive failure was that News Corp. had “screwed up in every way possible,” but the company had “learned lots of valuable [and] expensive lessons.” Failing to learn the lessons of digital content Were any of those lessons about how content works now, in an age of digital abundance and the “democratization of distribution,” as Om has called it? Murdoch isn’t saying, but his repeated attempts to lock up content in as many ways as possible don’t bode well. In addition to exporting his paywall model from the Wall Street Journal to British papers like the Times of London — where readership immediately plummeted by as much as 90 percent — News Corp. has also launched expensive projects like the iPad newspaper The Daily, which took the bizarre step of posting articles to its website as images with no links. I’ve long believed that piracy is largely a business model problem not a human behavior problem. If you give people a legal way to consume the content they want, they will pay for it. But when you make it impossible to legally consume the content they want, they will pirate it. Make it easy — and reasonably priced — and people will pay In a post on Sunday, the New York-based venture capitalist described another episode in which he and his family tried to find something to watch through their cable company’s “movies on demand” feature, as well as through Netflix, Amazon’s video service and some other methods. Unable to find anything worth paying for, Wilson said they wound up watching a free TV show — and reiterated his point that the kind of artificial scarcity the media and entertainment industries rely on is broken: I am sure there was a time when scarcity was a good business model for the film industry… I understand their muscle memory in terms of the scarcity business model. But restricting access to content is a bad business model in the age of a global network that costs practically nothing to distribute on. This is the simplest possible rebuttal to Rupert Murdoch’s claims about Google and the web, and how it engages in what he sees as rampant piracy. While there will always be people who prefer to find ways of accessing content without having to pay for it, the simple fact is that many more people who do so are like Fred Wilson, and would be more than happy to pay for that content if someone made it easy to do so, and charged a reasonable price. The recent experiment by comedian Louis CK was a great example — it proved that millions of people will pay for something even if it is available for free. Can Fox and the Wall Street Journal and other mainstream media outlets operate the same way, and simply hope that people will pay them for their content if given the chance? Perhaps not, but one thing is for sure: If even well-off venture capitalists are admitting they pirate content because they can’t find any way to pay for the things they want to watch, Murdoch and his scarcity-mongers are in deep trouble — and railing against Google is going to get them exactly nowhere.
Mid
[ 0.584946236559139, 34, 24.125 ]
Q: Remote Desktop switches to Chinese on ctrl+space I have Windows XP on my laptop and use Remote Desktop Connection to work on a computer with Windows Vista. On my laptop I use 3 languages: English, Russian, Chinese. I switch between them by Alt+Shift, changing to Chinese with Ctrl+Space is disabled. On the remote computer there is only one Language on the Installed services list - English. For some reason, when I press Ctrl+Sapce on that computer (e.g. for autocomplete in NetBeans) it switches to Chinese (language bar at the bottom shows 'CH') and I cannot input anything. This never happened until today (before I worked on that computer from my laptop without any problems). Does anyone know how to solve this problem? Any help is greatly appreciated. UPD: in Advanced Key Settings there is no action for Ctrl+Space on both computers. A: That is the windows default. CRTL+SPC = Turn Chinese IME on 101 keyboard on or off You can change the key combination for switching between languages or keyboard layouts in the Advanced Key Setting dialog box. To open the Advanced Key Setting dialog box, right-click the Language bar, and then click Settings. Under Preferences, click Key Settings. Put another shortcut instead of CRTL+SPC. Then you can use CRTL+SPC as you wish.
Mid
[ 0.5990099009900991, 30.25, 20.25 ]
Genomic analysis of miRNAs in an extreme mammalian hibernator, the Arctic ground squirrel. MicroRNAs (miRNAs) are 19- to 25-nucleotide-long small and noncoding RNAs now well-known for their regulatory roles in gene expression through posttranscriptional and translational controls. Mammalian hibernation is a physiological process involving profound changes in set-points for food consumption, body mass and growth, body temperature, and metabolic rate in which miRNAs may play important regulatory roles. In an initial study, we analyzed miRNAs in the liver of an extreme hibernating species, the Arctic ground squirrel (Spermophilus parryii), using massively parallel Illumina sequencing technology. We identified >200 ground squirrel miRNAs, including 18 novel miRNAs specific to ground squirrel and mir-506 that is fast evolving in the ground squirrel lineage. Comparing animals sampled after at least 8 days of continuous torpor (late torpid), within 5 h of a spontaneous arousal episode (early aroused), and 1-2 mo after hibernation had ended (nonhibernating), we identified differentially expressed miRNAs during hibernation, which are also compared with the results from two other miRNA profiling methods: Agilent miRNA microarray and real-time PCR. Among the most significant miRNAs, miR-320 and miR-378 were significantly underexpressed during both stages of hibernation compared with nonhibernating animals, whereas miR-486 and miR-451 were overexpressed in late torpor but returned in early arousal to the levels similar to those in nonhibernating animals. Analyses of their putative target genes suggest that these miRNAs could play an important role in suppressing tumor progression and cell growth during hibernation. High-throughput sequencing data and microarray data have been submitted to GEO database with accession: GSE19808.
High
[ 0.7218453188602441, 33.25, 12.8125 ]
// // JSUIWebViewViewController.h // WebViewJS // // Created by Jakey on 16/4/10. // Copyright © 2016年 www.skyfox.org All rights reserved. // #import <UIKit/UIKit.h> @interface JSUIWebViewViewController : UIViewController @property (weak, nonatomic) IBOutlet UIWebView *myWebView; @end
Low
[ 0.44568245125348105, 20, 24.875 ]
Stress management for the radiologic technologist. Changes in technology in the radiology department and an emphasis on multitasking can lead to stress and burnout, along with the potential for medical errors. A shift in viewpoint and exercises in self-evaluation can help radiologic technologists learn to manage change in a positive manner. Learning to approach change through a series of transitions and positive steps can reduce stress at work and at home.
High
[ 0.706192358366271, 33.5, 13.9375 ]
KIRKUS REVIEW Cowan, an Australian poet, here attempts a ""correspondence with [him]self"" aimed at comparing the ""metaphysical terrain"" of the Australian Aborigines to the destructive materialism of Western civilization. The result is a series of meandering, baffling, and hyper-romantic meditations that fail to illuminate. ""Dear Friend,"" Cowan writes, ""It is questionable whether you will receive this letter at all since I am writing to you from the entrance to a cave."" The cave, revealed to the author by its Aboriginal custodians and decorated with human handprints and the image of the Rainbow Snake, sends our correspondent into paroxysms of adoration and undisciplined soul-searching--as does every other beast, insect, and rock formation he comes into contact with in the desert. Disparaging his life in the ""pollutant haze"" of urban ""highrise apartments,"" Cowan exhorts all of Western society to join him in embracing ""wildness"" as a philosophic premise before it's too late: to ""give up much of what we have acquired in the name of progress"" and ""rediscover the wild spirit of nature that lies in the fathomless gaze of all animals when they acknowledge us as being at one with them."" How the uninitiated are to do this is apparently beyond the scope of this book: Cowan's vague, self-referential interpretation of the Aboriginal worldview--as he shuns accounts of actual communications, rituals, stories, or practices that might be of concrete interest--obscures more than it reveals, and his enthusiasm for the natural life is expressed in the unrestrained, rococo language of a die-hard fan. An unfocused and tiresome compilation in which the ""great lesson all traditional peoples can teach us: how to protect who we are by protecting what made us"" is lost in the fog. Be the first to discover new talent! Each week, our editors select the one author and one book they believe to be most worthy of your attention and highlight them in our Pro Connect email alert. Sign up here to receive your FREE alerts.
Low
[ 0.474820143884892, 33, 36.5 ]
// Copyright (c) 1995-2009 Nokia Corporation and/or its subsidiary(-ies). // All rights reserved. // This component and the accompanying materials are made available // under the terms of the License "Eclipse Public License v1.0" // which accompanies this distribution, and is available // at the URL "http://www.eclipse.org/legal/epl-v10.html". // // Initial Contributors: // Nokia Corporation - initial contribution. // // Contributors: // // Description: // f32test\server\b_file.cpp // // #define __E32TEST_EXTENSION__ #include <f32file.h> #include <e32math.h> #include <e32test.h> #include "t_server.h" GLDEF_D RTest test(_L("B_FILE")); LOCAL_D RFile TheFile; LOCAL_D TInt bret; // Expected error return LOCAL_D TInt aret; // Actual error return LOCAL_D TBuf8<10000> tbuf; // Test buffer LOCAL_D TPtrC tbin(_S("\\F32-TST\\TEST.BIN")); LOCAL_D TPtrC rndm(_S("\\F32-TST\\RANDOM.TST")); LOCAL_D TPtrC tzzz(_S("\\F32-TST\\ZZZZZZ.ZZZ")); LOCAL_D const TInt KRandomNumbers=1024; LOCAL_C void bopen(TUint aMode) // // Open the binary file. // { aret=TheFile.Open(TheFs,tbin,aMode); test(aret==bret); } LOCAL_C void bcreate(TUint aMode) // // Open the binary file. // { aret=TheFile.Create(TheFs,tbin,aMode); test(aret==bret); } LOCAL_C void breplace(TUint aMode) // // Open the binary file. // { aret=TheFile.Replace(TheFs,tbin,aMode); test(aret==bret); } LOCAL_C void bwrite(TInt aLength) // // Write aLength bytes of test data at current position. // { CheckDisk(); test.Printf(_L("bwrite1,len=%u\n"),aLength); TInt pos=0; // Relative position zero aret=TheFile.Seek(ESeekCurrent,pos); test.Printf(_L("bwrite2,pos=%u\n"),pos); test_KErrNone(aret); TInt count=pos&0xff; tbuf.SetLength(aLength); TText8* p=(TText8*)tbuf.Ptr(); TText8* pE=p+aLength; while (p<pE) { *p++=(TText8)count++; count&=0xff; } test.Printf(_L("bwrite3\n")); aret=TheFile.Write(tbuf); test.Printf(_L("bwrite4\n")); test(aret==bret); CheckDisk(); } LOCAL_C void bread(TInt aLength) // // Read and check aLength bytes of test data at current position. // { CheckDisk(); TInt pos=0; // Relative position zero aret=TheFile.Seek(ESeekCurrent,pos); test_KErrNone(aret); TInt count=pos&0xff; aret=TheFile.Read(tbuf,aLength); if (bret<KErrNone) { test(bret==aret); return; } test(((TInt)tbuf.Length())==bret); const TText8* p=tbuf.Ptr(); const TText8* pE=p+bret; while (p<pE) { if (*p++!=count++) test.Panic(_L("bread data different")); count&=0xff; } CheckDisk(); } LOCAL_C void bposa(TInt aPos) // // Position absolute. // { CheckDisk(); TInt newpos=aPos; aret=TheFile.Seek(ESeekStart,newpos); test_KErrNone(aret); test(newpos==aPos); CheckDisk(); } LOCAL_C void bclose() // // Close the file. // { CheckDisk(); TheFile.Close(); CheckDisk(); } LOCAL_C void btest1(TUint aMode) // // Binary file tests. // { test.Start(_L("BTEST1...")); bret=0; breplace(aMode|EFileWrite); bret=0; bread(1); bret=0; bwrite(1); bposa(0l); bret=1; bread(2); bret=0; bread(1); bret=0; bposa(0l); bret=1; bread(1); bret=0; bread(1); bret=0; bclose(); bret=KErrAlreadyExists;bcreate(aMode|EFileWrite);bret=0; bopen(aMode|EFileRead); bret=KErrAccessDenied; bwrite(1); bret=0; bclose(); aret=TheFile.Open(TheFs,tzzz,EFileRead); test_Value(aret, aret == KErrNotFound); test.End(); } LOCAL_C void btest2(TUint aMode) // // Binary file tests. // { test.Start(_L("BTEST2...")); bret=0; breplace(aMode|EFileWrite); bwrite(11); bposa(0); bret=5; bread(5); bret=0; bwrite(45); bposa(5); bret=45; bread(45); bret=0; bwrite(1000); bposa(600); bret=300; bread(300); bret=0; bclose(); bopen(aMode|EFileWrite); bposa(5); bret=5; bread(5); bret=1000; bread(1000); bret=0; bclose(); bopen(aMode|EFileWrite); bposa(KMaxTInt); bwrite(50); bposa(0); bret=1100; bread(1100); bret=0; aret=TheFile.Flush(); test_KErrNone(aret); aret=TheFile.SetSize(2000); test_KErrNone(aret); TInt pos=0; aret=TheFile.Seek(ESeekCurrent,pos); test_Value(aret, aret == KErrNone && pos==1100); pos=0; aret=TheFile.Seek(ESeekEnd,pos); test_Value(aret, aret == KErrNone && pos==2000); bclose(); test.End(); } LOCAL_C void rndtest(TUint aMode) // // Tests the file handling by writing a file of random numbers, // closing the file, reseeding the random number generator with // the same number, then reading the file back again, checking // it against the generator. // { TInt cnt; test.Start(_L("RNDTEST...")); TInt64 seed(0),zero(0); aret=TheFile.Replace(TheFs,rndm,EFileWrite|aMode); test_KErrNone(aret); for (cnt=0;cnt<KRandomNumbers;cnt++) { TBuf8<0x10> b; b.Format(TPtrC8((TUint8*)"%8x"),Math::Rand(seed)); aret=TheFile.Write(b); test_KErrNone(aret); } TheFile.Close(); // test.Next(_L("Reading back")); seed=zero; aret=TheFile.Open(TheFs,rndm,aMode); test_KErrNone(aret); for (cnt=0;cnt<KRandomNumbers;cnt++) { TBuf8<8> b; b.Format(TPtrC8((TUint8*)"%8x"),Math::Rand(seed)); TBuf8<8> r; aret=TheFile.Read(r); test_KErrNone(aret); test(b==r); } TheFile.Close(); aret=TheFs.Delete(rndm); test_KErrNone(aret); // test.End(); } LOCAL_C void testAutoClose() // // Tests TAutoClose template class // { test.Start(_L("TAutoClose...")); TAutoClose<RFile> f; aret=f.iObj.Replace(TheFs,rndm,EFileWrite); test_KErrNone(aret); TInt64 seed; for (TInt cnt=0;cnt<KRandomNumbers;cnt++) { TBuf8<0x10> b; b.Format(TPtrC8((TUint8*)"%8x"),Math::Rand(seed)); aret=f.iObj.Write(b); test_KErrNone(aret); } test.End(); } LOCAL_C void readWithNegativeLengthTest() { test.Start(_L("Read with Negative Length Test...")); TInt ret; TRequestStatus status = KRequestPending; TheFile.Open(TheFs,tbin,EFileRead); ret = TheFile.Read(0,tbuf,-1); // sync test_Value(ret, ret == KErrArgument); TheFile.Read(0,tbuf,-1,status); // async User::WaitForRequest(status); test(status.Int() == KErrArgument); TheFile.Close(); test.End(); } LOCAL_C void readWithNegativeLengthTestForEmptyFile() { test.Start(_L("Read with Negative Length Test(For EmptyFile)...")); RFile f; MakeFile(_L("C:\\F32-TST\\TFILE\\hello2.txt")); TInt r=f.Open(TheFs,_L("C:\\F32-TST\\TFILE\\hello2.txt"),EFileRead); test_KErrNone(r); TBuf8<0x100> a; test.Next(_L("Check Negative length when file is empty")); r=f.Read(a, -10); test_Value(r, r == KErrArgument); r=f.Read(0,a, -1); test_Value(r, r == KErrArgument); r=f.Read(0,a, -10); test_Value(r, r == KErrArgument); TRequestStatus stat1; f.Read(0,a,-5,stat1); User::WaitForRequest(stat1); test(stat1.Int() == KErrArgument); f.Read(a,-5,stat1); User::WaitForRequest(stat1); test(stat1.Int() == KErrArgument); f.Close(); test.End(); } GLDEF_C void CallTestsL() // // Call tests that may leave // { testAutoClose(); btest1(EFileStream); btest2(EFileStream); btest1(EFileStreamText); btest2(EFileStreamText); rndtest(EFileStream); readWithNegativeLengthTest(); readWithNegativeLengthTestForEmptyFile(); }
Low
[ 0.47465437788018405, 25.75, 28.5 ]
Steve Harney Steve Harney (born 1951) is an English former professional footballer who played as a right back. Career Born in Bradford, Harney played for Drum Rovers, Bradford City and Guiseley. For Bradford City he made 14 appearances in the Football League. Sources References Category:1951 births Category:Living people Category:English footballers Category:Bradford City A.F.C. players Category:Guiseley A.F.C. players Category:English Football League players Category:Association football fullbacks
Mid
[ 0.549549549549549, 30.5, 25 ]
Merkel Government Under Criticism for Handling of NSA Affair NSA ScandalMerkel's Interior Minister Not Up to the Job German Interior Minister Hans-Peter Friedrich has been tasked with investigating the full scope of NSA spying activities in Germany. But his failure to make progress has cranked up the pressure on him and Chancellor Merkel to finally do something. REUTERS German Interior Minsiter Hans-Peter Friedrich went to Washington last week for NSA answers. He didn't get many. Finally, he wants to go on the offensive and initiate something of his own. And to do so, German Interior Minister Hans-Peter Friedrich has brought along a few ideas regarding what could be done about "all these data privacy things." They include new rules in Europe, a trans-Atlantic treaty and a charter of fundamental digital rights. It is a long list. The ideas are not at all bad. But once again, Friedrich is late to the party. Others have already had the same ideas, including both the justice minister and the chancellor. Still, there is at least one advantage to throwing himself behind the data privacy effort. It means he won't have to talk as much about his actual job: that of providing clarification in the NSA spying scandal. That was the real reason why Friedrich had been invited to German parliament on Tuesday. For two-and-a-half hours, he answered questions from the Parliamentary Control Panel -- which is tasked with monitoring Germany's intelligence services -- on what he learned during his recent trip to the US about America's spying activities in Germany. The problem was, however, that Friedrich didn't bring all that much back from Washington. And what he did learn is highly classified and couldn't be discussed in parliament. Instead, Friedrich was forced to hail the fact that accusations made by whistleblower Edward Snowden to the effect that the NSA is collecting up to500 million communications connections a month in Germany are "now being investigated by US authorities." Details remain classified, but he said he hoped that the ongoing declassification process in Washington will provide some clarification. Data Collection Cooperation But insiders say that, even behind closed doors, Friedrich had few revelations to offer on the spying affair. The only one to offer specifics of any kind was Gerhard Schindler, the president of the Bundesnachrichtendienst (BND), Germany's foreign intelligence agency. According to participants, Schindler confirmed that his agency was cooperating with allied agencies in other countries. In situations such as overseas kidnappings, more than a dozen partner services generally cooperate on data collection, he said. But the BND, Schindler said according to meeting participants, never receives any information about sources of information or individual programs. Friedrich also emphasized once again that he had been unaware of programs like Prism. "When it comes to key issues," says Green Party domestic policy expert Hans-Christian Ströbele, "we still don't know anything more." Friedrich, of course, is in a difficult position. Chancellor Angela Merkel has used strong language in condemning the NSA spying program and demanded that the US abide by German law when operating in Germany. But it is Friedrich who has to travel to Washington, where he was, as had been expected, fobbed off with politely packaged non-information. Left-leaning daily Die Tageszeitung was harsh in its verdict as a result, calling him the "idiot in charge." But Friedrich has done little to counter the widespread impression that he is not particularly devoted to clearing up the NSA scandal. He is loathe to offend the Americans and also is a big supporter of active intelligence agencies. He is, simply put, the wrong person to be leading the German probe into excess American surveillance activities. Instead, he insists that Germans themselves must do more to protect their own digital data and refers to security as a "Supergrundrecht," a neologism that would seem to imply that security trumps other civil rights. Friedrich in the Terrorism Trap Friedrich has also run into trouble with his attempts to point out how valuable information provided by the NSA can be for Germany. Forty-five terror attacks, he announced following his US trip late last week, have been prevented by the Prism program, including five in Germany. But he has been back-peddling since then, unable to pinpoint the five instances. Two are clear -- the foiled "Sauerland Cell", which had planned a series of bombings in 2007, and the Düsseldorf al-Qaida cell. But that is where his list ends -- US officials apparently didn't provide further details, and Friedrich didn't ask any follow-up questions. Even among Friedrich's conservative allies, many find his maladroit use of the numbers to be unconvincing. Hans-Peter Uhl, a domestic policy expert with the Christian Social Union (CSU), the sister party to Merkel's Christian Democratic Union (CDU) and Friedrich's political home, called it "rubbish," though he placed more blame with the NSA than with the minister himself. The Free Democrats, Merkel's junior coalition partner, have been more direct with their criticism. "What we are seeing (from Friedrich) isn't good enough," says FDP domestic policy expert Gisela Piltz, who is calling for a task force at the Chancellery. She would like to see Merkel to take the investigation into her own hands. That is something the opposition has long been calling for. "The chancellor needs to apply more pressure on the issue of clarification. We need concrete facts," says Thomas Oppermann, parliamentary floor leader of the opposition, center-left Social Democratic Party (SPD). The SPD and the Greens have also reserved the right to summon Merkel herself to appear before the oversight committee. That decision will be made in another special session, probably in early August. By then, of course, the chancellor will be far away from Berlin, enjoying her summer vacation. Keep sucking up to the Yankees...it'll take you nowhere. With a 'friend' like the US, who needs enemies. Keep sucking up to the Yankees...it'll take you nowhere. With a 'friend' like the US, who needs enemies. golestan 07/18/2013 2. optional I have ever since the second Iraq war become increasingly anti-American. Any hope, that things would change under Obama have long since faded. Now I hear, that a broad coalition of US organisations is suing the NSA and others [...] I have ever since the second Iraq war become increasingly anti-American. Any hope, that things would change under Obama have long since faded. Now I hear, that a broad coalition of US organisations is suing the NSA and others responsible for unlawful and anti-constitutional search and seizure and other delinquencies. Maybe there is hope for American democracy after all. The Bundesverfassungsgesetz guarantees Freedom to the German people just as much as the American Constitution does to Americans. So where are the German prosecutors? See this article in the Washington Post: http://www.washingtonpost.com/national/broad-coalition-sues-feds-to-halt-electronic-surveillance-by-national-security-agency/2013/07/16/28e467a6-ee3a-11e2-bb32-725c8351a69e_story.html
Low
[ 0.474945533769063, 27.25, 30.125 ]
Surgical treatment using a medical needle such as ablator or biopsy has recently become popular due to relatively small incisions made in such a procedure. The surgical treatment is performed by inserting the medical needle into an internal region of a human body while referring to an internal image of the human body. Such surgical treatment, which is performed while observing internal organs of the human body with the help of a diagnostic imaging system, is referred to as an interventional treatment. The interventional treatment is performed by directing the medical needle to a lesion to be treated or examined through a skin with reference to images during the treatment. The images are acquired by employing a computerized tomography (CT) scanner, which is generally used in a radiology department, or a magnetic resonance imaging (MRI) system. Compared to a normal surgical treatment requiring relatively wide incisions to open the lesion, the interventional treatment has the advantages of low costs and obtaining effective operation results. This is because general anesthesia is not necessary for the interventional treatment and patients are subjected to less pain while benefiting from rapid recovery. However, it is difficult to obtain such images in real time by using the CT scanner or the MRI system. Especially, when the interventional treatment is performed by using the CT scanner, both the patient and the operator are exposed to radiation for quite a long time. However, when the interventional treatment is performed by using an ultrasound diagnostic system, the images can be obtained in real time without affecting the human body. But, there is a problem since it is difficult to accurately recognize the lesion as well as the medical device (i.e., a needle) in the ultrasound image obtained by using the ultrasound system.
Mid
[ 0.625, 35, 21 ]
// Cylinder.cpp // Copyright (c) 2009, Dan Heeks // This program is released under the BSD license. See the file COPYING for details. #include "stdafx.h" #include "Cylinder.h" #include "../interface/PropertyVertex.h" #include "../interface/PropertyDouble.h" #include "../interface/PropertyLength.h" #include "Gripper.h" #include "MarkedList.h" static TopoDS_Solid MakeCylinder(const gp_Ax2& pos, double radius, double height) { gp_Ax2 pos2 = pos; if(height<0) { pos2 = gp_Ax2(pos.Location(), -(pos.Direction())); height = fabs(height); } return BRepPrimAPI_MakeCylinder(pos2, radius, height); } CCylinder::CCylinder(const gp_Ax2& pos, double radius, double height, const wxChar* title, const HeeksColor& col, float opacity):CSolid(MakeCylinder(pos, radius, height), title, col, opacity), m_pos(pos), m_radius(radius), m_height(height) { } CCylinder::CCylinder(const TopoDS_Solid &solid, const wxChar* title, const HeeksColor& col, float opacity):CSolid(solid, title, col, opacity), m_pos(gp_Pnt(0, 0, 0), gp_Dir(0, 0, 1), gp_Dir(1, 0, 0)), m_radius(0.0), m_height(0.0) { } const wxBitmap &CCylinder::GetIcon() { static wxBitmap* icon = NULL; if(icon == NULL)icon = new wxBitmap(wxImage(wxGetApp().GetResFolder() + _T("/icons/cyl.png"))); return *icon; } HeeksObj *CCylinder::MakeACopy(void)const { return new CCylinder(*this); } bool CCylinder::IsDifferent(HeeksObj* other) { CCylinder* cyl = (CCylinder*)other; if(cyl->m_radius != m_radius || cyl->m_height != m_height) return true; if(!IsEqual(cyl->m_pos,m_pos)) return true; return CShape::IsDifferent(other); } static void on_set_diameter(double value, HeeksObj* object){ ((CCylinder*)object)->m_radius = value*0.5; } static void on_set_height(double value, HeeksObj* object){ ((CCylinder*)object)->m_height = value; } void CCylinder::MakeTransformedShape(const gp_Trsf &mat) { m_pos.Transform(mat); double scale = gp_Vec(1, 0, 0).Transformed(mat).Magnitude(); m_radius = fabs(m_radius * scale); m_height = fabs(m_height * scale); m_shape = MakeCylinder(m_pos, m_radius, m_height); } wxString CCylinder::StretchedName(){ return _("Stretched Cylinder");} void CCylinder::GetProperties(std::list<Property *> *list) { CoordinateSystem::GetAx2Properties(list, m_pos); list->push_back(new PropertyLength(_("diameter"), m_radius*2, this, on_set_diameter)); list->push_back(new PropertyLength(_("height"), m_height, this, on_set_height)); CSolid::GetProperties(list); } void CCylinder::GetGripperPositions(std::list<GripData> *list, bool just_for_endof) { gp_Pnt o = m_pos.Location(); gp_Pnt px(o.XYZ() + m_pos.XDirection().XYZ() * m_radius); gp_Dir z_dir = m_pos.XDirection() ^ m_pos.YDirection(); gp_Pnt pyz(o.XYZ() + m_pos.YDirection().XYZ() * m_radius + z_dir.XYZ() * m_height); gp_Pnt pmxz(o.XYZ() + m_pos.XDirection().XYZ() * (-m_radius) + z_dir.XYZ() * m_height); gp_Pnt pz(o.XYZ() + z_dir.XYZ() * m_height); list->push_back(GripData(GripperTypeTranslate,o.X(),o.Y(),o.Z(),NULL)); list->push_back(GripData(GripperTypeObjectScaleXY,px.X(),px.Y(),px.Z(),NULL)); list->push_back(GripData(GripperTypeRotateObject,pyz.X(),pyz.Y(),pyz.Z(),NULL)); list->push_back(GripData(GripperTypeRotateObject,pmxz.X(),pmxz.Y(),pmxz.Z(),NULL)); list->push_back(GripData(GripperTypeObjectScaleZ,pz.X(),pz.Y(),pz.Z(),NULL)); } void CCylinder::OnApplyProperties() { CCylinder* new_object = new CCylinder(m_pos, m_radius, m_height, m_title.c_str(), m_color, m_opacity); new_object->CopyIDsFrom(this); HEEKSOBJ_OWNER->Add(new_object, NULL); HEEKSOBJ_OWNER->Remove(this); if(wxGetApp().m_marked_list->ObjectMarked(this)) { wxGetApp().m_marked_list->Remove(this,false); wxGetApp().m_marked_list->Add(new_object, true); } wxGetApp().Repaint(); } int CCylinder::GetCentrePoints(double* pos, double* pos2) { gp_Pnt o = m_pos.Location(); gp_Dir z_dir = m_pos.XDirection() ^ m_pos.YDirection(); gp_Pnt pz(o.XYZ() + z_dir.XYZ() * m_height); extract(o, pos); extract(pz, pos2); return 2; } bool CCylinder::GetScaleAboutMatrix(double *m) { gp_Trsf mat = make_matrix(m_pos.Location(), m_pos.XDirection(), m_pos.YDirection()); extract(mat, m); return true; } bool CCylinder::Stretch(const double *p, const double* shift, void* data) { gp_Pnt vp = make_point(p); gp_Vec vshift = make_vector(shift); gp_Pnt o = m_pos.Location(); gp_Pnt px(o.XYZ() + m_pos.XDirection().XYZ() * m_radius); gp_Dir z_dir = m_pos.XDirection() ^ m_pos.YDirection(); gp_Pnt pz(o.XYZ() + z_dir.XYZ() * m_height); bool make_a_new_cylinder = false; if(px.IsEqual(vp, wxGetApp().m_geom_tol)){ px = px.XYZ() + vshift.XYZ(); double new_x = gp_Vec(px.XYZ()) * gp_Vec(m_pos.XDirection()) - gp_Vec(o.XYZ()) * gp_Vec(m_pos.XDirection()); double new_y = gp_Vec(px.XYZ()) * gp_Vec(m_pos.YDirection()) - gp_Vec(o.XYZ()) * gp_Vec(m_pos.YDirection()); make_a_new_cylinder = true; m_radius = sqrt(new_x * new_x + new_y * new_y); } else if(pz.IsEqual(vp, wxGetApp().m_geom_tol)){ pz = pz.XYZ() + vshift.XYZ(); double new_height = gp_Vec(pz.XYZ()) * gp_Vec(z_dir) - gp_Vec(o.XYZ()) * gp_Vec(z_dir); if(new_height > 0){ make_a_new_cylinder = true; m_height = new_height; } } if(make_a_new_cylinder) { CCylinder* new_object = new CCylinder(m_pos, m_radius, m_height, m_title.c_str(), m_color, m_opacity); new_object->CopyIDsFrom(this); HEEKSOBJ_OWNER->Add(new_object, NULL); HEEKSOBJ_OWNER->Remove(this); wxGetApp().m_marked_list->Clear(true); wxGetApp().m_marked_list->Add(new_object, true); } return true; } void CCylinder::SetXMLElement(TiXmlElement* element) { const gp_Pnt& l = m_pos.Location(); element->SetDoubleAttribute("lx", l.X()); element->SetDoubleAttribute("ly", l.Y()); element->SetDoubleAttribute("lz", l.Z()); const gp_Dir& d = m_pos.Direction(); element->SetDoubleAttribute("dx", d.X()); element->SetDoubleAttribute("dy", d.Y()); element->SetDoubleAttribute("dz", d.Z()); const gp_Dir& x = m_pos.XDirection(); element->SetDoubleAttribute("xx", x.X()); element->SetDoubleAttribute("xy", x.Y()); element->SetDoubleAttribute("xz", x.Z()); element->SetDoubleAttribute("r", m_radius); element->SetDoubleAttribute("h", m_height); CSolid::SetXMLElement(element); } void CCylinder::SetFromXMLElement(TiXmlElement* pElem) { // get the attributes double l[3] = {0, 0, 0}; double d[3] = {0, 0, 1}; double x[3] = {1, 0, 0}; for(TiXmlAttribute* a = pElem->FirstAttribute(); a; a = a->Next()) { std::string name(a->Name()); if(name == "lx") {l[0] = a->DoubleValue();} else if(name == "ly"){l[1] = a->DoubleValue();} else if(name == "lz"){l[2] = a->DoubleValue();} else if(name == "dx"){d[0] = a->DoubleValue();} else if(name == "dy"){d[1] = a->DoubleValue();} else if(name == "dz"){d[2] = a->DoubleValue();} else if(name == "xx"){x[0] = a->DoubleValue();} else if(name == "xy"){x[1] = a->DoubleValue();} else if(name == "xz"){x[2] = a->DoubleValue();} else if(name == "r"){m_radius = a->DoubleValue();} else if(name == "h"){m_height = a->DoubleValue();} } m_pos = gp_Ax2(make_point(l), make_vector(d), make_vector(x)); CSolid::SetFromXMLElement(pElem); }
Low
[ 0.5033557046979861, 37.5, 37 ]
Q: How can I make a secondary NIC port "eth0"? I am using CentOS 5.9. One of my servers recently had a malfunctioning NIC port. The software running on the server was hard-coded to use eth0. The other physical NIC ports were fine and unused. The issue is now resolved but I'm curious, how hard would it be to convince CentOS that the other NIC port is eth0? Is it just a matter of editing /etc/sysconfig/network-scripts/ifcfg-eth0 and setting HWADDR=<MAC Address of second NIC port> ? A: Adjusting /etc/udev/rules.d/70-persistent-net.rules /etc/sysconfig/network-scripts/ifcfg-eth0 (HWADDR) should do the trick.
Mid
[ 0.641361256544502, 30.625, 17.125 ]
MOHALI: Claiming to be the only hostage to have survived after being abducted along with 40 others by Islamic State of Iraq and Syria (ISIS) on June 11, 2014, Harjit Masih on Thursday said that he his fellow workers were shot down in strife-torn Masul city of Iraq.Masih claimed, “The ISIS took away nearly 100 workers including Indians and Bangladeshis to an undisclosed location and after keeping us in a furnished accommodation for 4 days, the Indians were taken to another place in rough terrains.”“They opened fire and as every other Indian around fell died, I got lucky with a bullet only bruising my leg. A fellow Punjabi’s body sheltered me. I pretended to be dead and escaped after some time. However, on reaching a main road, the person who gave me lift took me back to my abductors the same night,” claimed Masih, who tried hard to prove his point amid intensive questioning.Masih said he joined a group of Bangladeshis to survive after escaping the ISIS. A resident of Gurdaspur district, Masih said he had no interest in telling a lie about the fate of the abducted Indians.AAP's Sangrur MP Bhagwant Mann alleged that the Centre had messed up in handling the entire issue. “Masih got in touch with me two days back and I called him over to tell the story,” he said.
Mid
[ 0.6126482213438731, 38.75, 24.5 ]
module Hyperstack module Legacy module Store VERSION = '1.0.alpha1.5' end end end
Low
[ 0.43939393939393906, 21.75, 27.75 ]
Developmental expression of transcription factor genes in a demosponge: insights into the origin of metazoan multicellularity. Demosponges are considered part of the most basal evolutionary lineage in the animal kingdom. Although the sponge body plan fundamentally differs from that of other metazoans, their development includes many of the hallmarks of bilaterian and eumetazoan embryogenesis, namely fertilization followed by a period of cell division yielding distinct cell populations, which through a gastrulation-like process become allocated into different cell layers and patterned within these layers. These observations suggest that the last common ancestor (LCA) to all living animals was developmentally more sophisticated than is widely appreciated and used asymmetric cell division and morphogen gradients to establish localized populations of specified cells within the embryo. Here we demonstrate that members of a range of transcription factor gene classes, many of which appear to be metazoan-specific, are expressed during the development of the demosponge Reniera, including ANTP, Pax, POU, LIM-HD, Sox, nuclear receptor, Fox (forkhead), T-box, Mef2, and Ets genes. Phylogenetic analysis of these genes suggests that not only the origin but the diversification of some of the major developmental metazoan transcription factor classes took place before sponges diverged from the rest of the Metazoa. Their expression during demosponge development suggests that, as in today's sophisticated metazoans, these genes may have functioned in the regulatory network of the metazoan LCA to control cell specification and regionalized gene expression during embryogenesis.
High
[ 0.6818181818181811, 30, 14 ]
Q: Why are Pandas and Seaborn producing different KDE Plot for same data? I am trying to have a look at the distribution of a variable with the following values.. +-------+-------+ | Value | Count | +-------+-------+ | 0.0 | 355 | | 1.0 | 935 | | 2.0 | 1 | | 3.0 | 2 | | 4.0 | 1 | +-------+-------+ The table continues with values up to 1000 but very sparse (total observations = 1622, almost all the observations fall in 0 or 1) So when plotting I did: sns.distplot(kde=True, a = df.loc[(df.class == 1)].variable_of_interest) Which produces the following red distribution Seaborn does not capture the initial concentration of values, but shows more "sensibility" to the rest of the values Then I remembered pd.DataFrame.plot.kde() , so I gave it a try and it produces this plot that captures the concentration df.loc[(df.class== 1)].variable_of_interest.plot.kde() Important note: For those who might notice a difference in the X-axis, I did try the seaborn with xlims(-500, 1000) yet the plot remains exactly the same Do you know why do they generate such different plots? Does it have to do with how they process data, or I am doing something wrong? Thank you very much in advance! A: What's going wrong is that the kde is primarily meant for continuous data, while you seem to be working with discrete data. An important parameter is the bandwidth: the smaller it is, the closer the curve fits to the data, the wider the better to indicate a general form. It seems seaborn and pandas are using a different approach here to estimate a "good" bandwidth. With seaborn you could set a fixed bandwidth sns.kdeplot(..., bw=0.5) or so. Or seaborn.distplot(..., kde=True, kde_kws={'bw': 0.5}). With pandas df.plot.kde(bw_method=0.5, ...). Note that the "perfect" bandwidth doesn't exist, it depends on the data, the number of samples and about what you already know about the underlying distribution. The default seaborn and pandas choose is just a rule of thumb, that might be useful or not for your data. Future versions will probably use different rules of thumb. The following image shows how different bandwidths influences a kdeplot:
Mid
[ 0.631178707224334, 41.5, 24.25 ]
Enantiomeric composition of ipsdienol: A chemotaxonomic character for north American populations ofIps spp. in thepini subgeneric group (coleoptera: Scolytidae). Thirty-five populations ofIps pini (Say) and one population each ofIps avulsus (Eichhoff) andIps bonanseai (Hopkins) were analyzed for the enantiomeric composition of ipsdienol (2-methyl-6-methylene-2,7-octadien-4-ol). Populations ofI. pini occur as at least two distinct regional pheromone variants: New York type [32%-(-) to 56%-(-)-ipsdienol] and California type [94%-(-) to 98%-(-)-ipsdienol]. A third phenotype may occur in southeastern British Columbia, Idaho, and Montana [91%-(-) to 95%-(-)], possibly indicating a zone of hybridization. Populations of the New York type occur in southwestern British Columbia, Alberta, Saskatchewan, Minnesota, and Wisconsin suggesting a continuum through the Canadian provinces and Lake States. The presence of the New York type in western Canada is likely linked to the Quaternary history of the transcontinentally distributed host,Pinus banksiana Lamb. MaleI. avulsus [∼25%-(-)] and maleI. bonanseai [-29%-(-)] both produce ipsdienol, but not ipsenol. Production of ipsdienol by maleI. pini was evaluated in six differentPinus spp. hosts. Following transfer of maleI. pini to hosts other than the host of origin, the percentage of the (-)-enantiomer of ipsdienol declined when compared to production in the host of origin.
Mid
[ 0.5995623632385121, 34.25, 22.875 ]
Automatically file Outlook emails This VBA code will file emails based on the domain of the sender. I have used this for several years to quickly manage my emails without all the manual work of traversing the folders and depositing saved emails in the proper locations. Just update your Mailbox name and modify the arrays to support your emails and folder structure. I file everything under the Inbox and separate the communciations based on type, i.e. Software, Service, Purchasing, Hardware, etc. If this macro was activated with the default configuration, it would file any number of selected emails from softwarecompany.com into \Mailbox - Gerald Cox\Inbox\Software\SoftwareCompany. If the folder does not exist, it will be created. The code also handles emails from your own domain and files them in \Mailbox - Gerald Cox\Inbox\My Company\ just update mydomain.com and the destination folder.
High
[ 0.696598639455782, 32, 13.9375 ]
"The girl's case is very challenging for me, as I have never seen such a case, nor found it in medical history." Dr. Talsania told The Times of India. The big ants must be biting her, but there was no damage inside her ear." What's more disturbing? Doctors can't seem to locate a 'queen ant' that might have laid eggs. This leads them to believe, somehow, the girl is acting as the 'queen host'. Darji is being kept under observation by doctors,but according to local media, there is no reason behind the infestation, or foreseeable cure.
Low
[ 0.49464668094218406, 28.875, 29.5 ]
1. Field of the Invention The present invention relates to a fluid seal and, more particularly, to a shaft seal which may be suitably used in automotive shock absorbers and the like for sealing a reciprocating shaft which undergoes a substantial lateral thrust. 2. Description of the Prior Art In an automotive shock absorber, the piston rod is sealed by a shaft seal with respect to the housing. The shaft seal includes a primary fluid sealing lip for sealing the oil side of the piston rod to prevent release of the hydraulic fluid contained in the housing. In most instances, the seal also includes a dust sealing lip for sealing the air side to protect the primary sealing lip from ingress of dust and dirt. During operation of the shock absorber, the piston rod undergoes a substantial lateral thrust as the wheel hits a bump or when the automobile undergoes cornering. In particular, a severe lateral thrust is encountered in the MacPherson strut type suspension systems. One of the problems which must be overcome in designing a shaft seal for shock absorber applications is to effectively prevent ingress of dust and dirt for a long period of time despite repeated lateral thrust. Japanese Utility Model Kokai Publication No. 6-28429 discloses a shaft seal which is provided with an auxiliary dust sealing lip situated inwardly of the primary dust sealing lip. The auxiliary dust sealing lip is profiled in the form of an edge that functions to scrape incoming dust and dirt back to the air side. The problem associated with the conventional shaft seal is that the auxiliary dust sealing lip undergoes a considerable wear so that the dust sealing function of the shaft seal is prematurely degraded. It is therefore an object of the present invention to provide a shaft seal which is capable of providing a high degree of dust sealing capability for a long period of time.
Mid
[ 0.6324324324324321, 29.25, 17 ]
/* * Copyright © Magento, Inc. All rights reserved. * See COPYING.txt for license details. */ package com.magento.idea.magento2plugin.actions.generation.generator; import com.intellij.openapi.project.Project; import com.intellij.psi.PsiFile; import com.magento.idea.magento2plugin.actions.generation.data.ViewModelFileData; public class ModuleViewModelClassGeneratorTest extends BaseGeneratorTestCase { public void testGenerateViewModelFile() { Project project = myFixture.getProject(); ViewModelFileData viewModelData = new ViewModelFileData( "ViewModel", "TestViewModel", "Foo_Bar", "Foo\\Bar\\ViewModel" ); ModuleViewModelClassGenerator moduleViewModelClassGenerator = new ModuleViewModelClassGenerator( viewModelData, project ); PsiFile viewModelFile = moduleViewModelClassGenerator.generate("test"); String filePath = this.getFixturePath("TestViewModel.php"); PsiFile expectedFile = myFixture.configureByFile(filePath); assertGeneratedFileIsCorrect( expectedFile, "src/app/code/Foo/Bar/ViewModel", viewModelFile ); } }
Mid
[ 0.63031914893617, 29.625, 17.375 ]
import torch import torch.nn as nn import torch.nn.functional as F from torch.autograd import Variable class BasicBlock(nn.Module): def __init__(self, ch_in, ch_out, stride=1): super().__init__() self.bn1 = nn.BatchNorm2d(ch_out) self.conv1 = nn.Conv2d(ch_in, ch_out, kernel_size=3, stride=stride, padding=1, bias=False) self.bn2 = nn.BatchNorm2d(ch_out) self.conv2 = nn.Conv2d(ch_out, ch_out, kernel_size=3, stride=1, padding=1, bias=False) if stride != 1 or ch_in != ch_out: self.shortcut = nn.Sequential( nn.Conv2d(ch_in, ch_out, kernel_size=1, stride=stride, bias=False), nn.BatchNorm2d(ch_out) ) def forward(self, x): shortcut = self.shortcut(x) if hasattr(self, 'shortcut') else x out = self.conv1(x) out = self.bn2(self.conv2(F.relu(self.bn1(out)))) out += shortcut return F.relu(out) class ResNet(nn.Module): def __init__(self, num_blocks, num_classes=10): super().__init__() self.conv1 = nn.Conv2d(3, 16, kernel_size=3, stride=1, padding=1, bias=False) self.bn1 = nn.BatchNorm2d(16) self.layer1 = self.make_group_layer(16, 16, num_blocks[0], stride=1) self.layer2 = self.make_group_layer(16, 32, num_blocks[1], stride=2) self.layer3 = self.make_group_layer(32, 64, num_blocks[2], stride=2) self.linear = nn.Linear(64, num_classes) def make_group_layer(self,ch_in, ch_out, num_blocks, stride): layers = [BasicBlock(ch_in, ch_out, stride)] for i in range(num_blocks-1): layers.append(BasicBlock(ch_out, ch_out, stride=1)) return nn.Sequential(*layers) def forward(self, x): out = F.relu(self.bn1(self.conv1(x))) out = self.layer1(out) out = self.layer2(out) out = self.layer3(out) out = F.adaptive_avg_pool2d(out, 1) out = out.view(out.size(0), -1) return F.log_softmax(self.linear(out)) def resnet56(numblocks=[9,9,9]): """Constructs a ResNeXt-29, 16*64d model for CIFAR-10 (by default) Args: num_classes (uint): number of classes """ model = ResNet(numblocks) return model
Mid
[ 0.6203208556149731, 43.5, 26.625 ]
Q: How to add a outside layout to vue component I wanted to change my vue route from /dashboards/dashboard to just /dashboard. How to achieve these using this code import Layout2 from '@/layout/Layout2' export default [ { path: '/dashboards', component: Layout2, children: [ { path: 'dashboard', name: 'dashboard', component: () => import('@/components/dashboards/Dashboard') } ] } ] I have tried putting these code but how can I add the layout2 if the component is already added? export default [ { path: '/dashboard', name: 'dashboard', component: () => import('@/components/dashboards/Dashboard') } ] A: If vue-router document Note that nested paths that start with / will be treated as a root path. This allows you to leverage the component nesting without having to use a nested URL. You can do import Layout2 from '@/layout/Layout2' export default [ { path: '/', component: Layout2, children: [ { path: 'dashboard', name: 'dashboard', component: () => import('@/components/dashboards/Dashboard') } ] } ]
Mid
[ 0.587155963302752, 32, 22.5 ]
Term IRI Term label Parent term IRI Parent term label Alternative term Definition http://purl.obolibrary.org/obo/BFO_0000002 continuant http://purl.obolibrary.org/obo/BFO_0000001 entity endurant An entity that exists in full at any time in which it exists at all, persists through time while maintaining its identity and has no temporal parts. http://purl.obolibrary.org/obo/BFO_0000003 occurrent http://purl.obolibrary.org/obo/BFO_0000001 entity perdurant An entity that has temporal parts and that happens, unfolds or develops through time. Sometimes also called perdurants. http://purl.obolibrary.org/obo/BFO_0000004 independent continuant http://purl.obolibrary.org/obo/BFO_0000002 continuant substantial entity A continuant that is a bearer of quality and realizable entity entities, in which other entities inhere and which itself cannot inhere in anything. http://purl.obolibrary.org/obo/BFO_0000020 specifically dependent continuant http://purl.obolibrary.org/obo/BFO_0000002 continuant trope A continuant that inheres in or is borne by other entities. Every instance of A requires some specific instance of B which must always be the same. http://purl.obolibrary.org/obo/IAO_0000027 data item http://purl.obolibrary.org/obo/IAO_0000030 information content entity data An information content entity that is intended to be a truthful statement about something (modulo, e.g., measurement precision or other systematic errors) and is constructed/acquired by a method that reliably tends to produce (approximately) truthful statements. http://purl.obolibrary.org/obo/IAO_0000109 measurement data item http://purl.obolibrary.org/obo/IAO_0000027 data item measurement datum A data item that is a recording of the output of an assay. http://purl.obolibrary.org/obo/OBI_0000070 assay http://purl.obolibrary.org/obo/OBI_0000011 planned process scientific observation A planned process with the objective to produce information about the material entity that is the evaluant, by physically examining it or its proxies. http://purl.obolibrary.org/obo/OBI_0000112 specimen role http://purl.obolibrary.org/obo/BFO_0000023 role material sample a role borne by a material entity that is gained during a specimen collection process and that can be realized by use of the specimen in an investigation http://purl.obolibrary.org/obo/OBI_0000659 specimen collection process http://purl.obolibrary.org/obo/OBI_0000011 planned process specimen collection A planned process with the objective of collecting a specimen. http://purl.obolibrary.org/obo/CHEBI_33839 macromolecule http://purl.obolibrary.org/obo/BFO_0000040 material entity polymer A macromolecule is a molecule of high relative molecular mass, the structure of which essentially comprises the multiple repetition of units derived, actually or conceptually, from molecules of low relative molecular mass. http://purl.obolibrary.org/obo/PCO_0000000 collection of organisms http://purl.obolibrary.org/obo/PCO_0000031 organismal entity organism collection A material entity that consists of two or more organisms, viruses, or viroids. http://purl.obolibrary.org/obo/PCO_0000002 ecological community http://purl.obolibrary.org/obo/PCO_0000029 multi-species collection of organisms multispecies community A community of at least two different species, living in a particular area. Must have at least two populations of different species as members. http://purl.obolibrary.org/obo/PCO_0000018 single-species collection of organisms http://purl.obolibrary.org/obo/PCO_0000000 collection of organisms collection of organisms of the same species A material entity that has as parts two or more organisms, viruses, or viroids of the same species and no members of any other species. http://purl.obolibrary.org/obo/PCO_0000027 collection of humans http://purl.obolibrary.org/obo/PCO_0000018 single-species collection of organisms human population A collection of organisms of the same species that has as members only humans. http://purl.obolibrary.org/obo/bco_0000022 material sampling process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class collecting event A planned process that includes selecting a material entity for study, physically extracting the material entity, and submitting the material entity to some institution for preservation or study. http://purl.obolibrary.org/obo/BFO_0000005 obsolete dependent continuant http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A continuant that is either dependent on one or other independent continuant bearers or inheres in or is borne by other entities. http://purl.obolibrary.org/obo/BFO_0000008 temporal region http://purl.obolibrary.org/obo/BFO_0000003 occurrent An occurrent that is part of time. http://purl.obolibrary.org/obo/BFO_0000015 process http://purl.obolibrary.org/obo/BFO_0000003 occurrent An occurrent that has temporal proper parts and for some time t, p s-depends_on some material entity at t. http://purl.obolibrary.org/obo/BFO_0000017 realizable entity http://purl.obolibrary.org/obo/BFO_0000020 specifically dependent continuant A specifically dependent continuant that inheres in continuant entities and are not exhibited in full at every time in which it inheres in an entity or group of entities. The exhibition or actualization of a realizable entity is a particular manifestation, functioning or process that occurs under certain circumstances. http://purl.obolibrary.org/obo/BFO_0000023 role http://purl.obolibrary.org/obo/BFO_0000020 specifically dependent continuant A realizable entity the manifestation of which brings about some result or end that is not essential to a continuant in virtue of the kind of thing that it is but that can be served or participated in by that kind of continuant in some kinds of natural, social or institutional contexts. http://purl.obolibrary.org/obo/BFO_0000031 generically dependent continuant http://purl.obolibrary.org/obo/BFO_0000002 continuant A continuant that is dependent on one or other independent continuant bearers. For every instance of A requires some instance of (an independent continuant type) B but which instance of B serves can change from time to time. http://purl.obolibrary.org/obo/BFO_0000040 material entity http://purl.obolibrary.org/obo/BFO_0000004 independent continuant An independent continuant that is spatially extended whose identity is independent of that of other entities and can be maintained through time. http://purl.obolibrary.org/obo/IAO_0000005 objective specification http://purl.obolibrary.org/obo/IAO_0000033 directive information entity a directive information entity that describes an intended process endpoint. http://purl.obolibrary.org/obo/IAO_0000007 action specification http://purl.obolibrary.org/obo/IAO_0000033 directive information entity a directive information entity that describes an action the bearer will take http://purl.obolibrary.org/obo/IAO_0000015 information carrier http://purl.obolibrary.org/obo/BFO_0000020 specifically dependent continuant A quality of an information bearer that imparts the information content http://purl.obolibrary.org/obo/IAO_0000030 information content entity http://purl.obolibrary.org/obo/BFO_0000031 generically dependent continuant an information content entity is an entity that is generically dependent on some material entity and stands in relation of aboutness to some entity http://purl.obolibrary.org/obo/IAO_0000033 directive information entity http://purl.obolibrary.org/obo/IAO_0000030 information content entity An information content entity whose concretizations indicate to their bearer how to realize them in a process. http://purl.obolibrary.org/obo/IAO_0000078 curation status specification http://purl.obolibrary.org/obo/IAO_0000102 data about an ontology part The curation status of the term. The allowed values come from an enumerated list of predefined terms. See the specification of these instances for more detailed definitions of each enumerated value. http://purl.obolibrary.org/obo/IAO_0000101 image http://purl.obolibrary.org/obo/IAO_0000030 information content entity An image is an affine projection to a two dimensional surface, of measurements of some quality of an entity or entities repeated at regular intervals across a spatial range, where the measurements are represented as color and luminosity on the projected on surface. http://purl.obolibrary.org/obo/IAO_0000102 data about an ontology part http://purl.obolibrary.org/obo/IAO_0000027 data item data about an ontology part is a data item about a part of an ontology, for example a term http://purl.obolibrary.org/obo/IAO_0000104 plan specification http://purl.obolibrary.org/obo/IAO_0000033 directive information entity a directive information entity that, when concretized, is realized in a process in which the bearer tries to achieve the objectives, in part by taking the actions specified. http://purl.obolibrary.org/obo/IAO_0000178 material information bearer http://purl.obolibrary.org/obo/BFO_0000040 material entity A material entity in which a concretization of an information content entity inheres. http://purl.obolibrary.org/obo/IAO_0000185 photograph http://purl.obolibrary.org/obo/IAO_0000101 image A photograph is created by projecting an image onto a photosensitive surface such as a chemically treated plate or film, CCD receptor, etc. http://purl.obolibrary.org/obo/IAO_0000225 obsolescence reason specification http://purl.obolibrary.org/obo/IAO_0000102 data about an ontology part The reason for which a term has been deprecated. The allowed values come from an enumerated list of predefined terms. See the specification of these instances for more detailed definitions of each enumerated value. http://purl.obolibrary.org/obo/IAO_0000310 document http://purl.obolibrary.org/obo/IAO_0000030 information content entity A collection of information content entities intended to be understood together as a whole http://purl.obolibrary.org/obo/IAO_0000409 denotator type http://purl.obolibrary.org/obo/IAO_0000102 data about an ontology part A denotator type indicates how a term should be interpreted from an ontological perspective. http://purl.obolibrary.org/obo/OBI_0000011 planned process http://rs.tdwg.org/dwc/terms/Event Event A processual entity that realizes a plan which is the concretization of a plan specification. http://purl.obolibrary.org/obo/OBI_0000067 evaluant role http://purl.obolibrary.org/obo/BFO_0000023 role a role that inheres in a material entity that is realized in an assay in which data is generated about the bearer of the evaluant role http://purl.obolibrary.org/obo/OBI_0000185 imaging assay http://purl.obolibrary.org/obo/OBI_0000070 assay An imaging assay is an assay to produce a picture of an entity. definition_source: OBI. http://purl.obolibrary.org/obo/OBI_0000245 organization http://purl.obolibrary.org/obo/BFO_0000040 material entity An entity that can bear roles, has members, and has a set of organization rules. Members of organizations are either organizations themselves or individual people. Members can bear specific organization member roles that are determined in the organization rules. The organization rules also determine how decisions are made on behalf of the organization by the organization members. http://purl.obolibrary.org/obo/OBI_0000272 protocol http://purl.obolibrary.org/obo/IAO_0000104 plan specification A plan specification which has sufficient level of detail and quantitative information to communicate it between investigation agents, so that different investigation agents will reliably be able to independently reproduce the process. http://purl.obolibrary.org/obo/OBI_0000441 assay objective http://purl.obolibrary.org/obo/IAO_0000005 objective specification an objective specification to determine a specified type of information about an evaluated entity (the material entity bearing evaluant role) http://purl.obolibrary.org/obo/OBI_0000684 specimen collection objective http://purl.obolibrary.org/obo/IAO_0000005 objective specification A objective specification to obtain a material entity for potential use as an input during an investigation. http://purl.obolibrary.org/obo/OBI_0000811 primary structure of DNA macromolecule http://purl.obolibrary.org/obo/BFO_0000031 generically dependent continuant a quality of a DNA molecule that inheres in its bearer due to the order of its DNA nucleotide residues. http://purl.obolibrary.org/obo/OBI_0001573 DNA sequence data http://purl.obolibrary.org/obo/OBI_0000973 sequence data A sequence data item that is about the primary structure of DNA http://purl.obolibrary.org/obo/OBI_0001933 value specification http://purl.obolibrary.org/obo/IAO_0000030 information content entity An information content entity that specifies a value within a classification scheme or on a quantitative scale. http://purl.obolibrary.org/obo/OBI_0100051 specimen http://purl.obolibrary.org/obo/BFO_0000040 material entity A material entity that has the specimen role. http://purl.obolibrary.org/obo/OBI_0600047 sequencing assay http://purl.obolibrary.org/obo/OBI_0000070 assay the use of a chemical or biochemical means to infer the sequence of a biomaterial http://purl.obolibrary.org/obo/PR_000000001 protein http://purl.obolibrary.org/obo/CHEBI_33839 macromolecule An amino acid chain that is produced de novo by ribosome-mediated translation of a genetically-encoded mRNA. http://purl.obolibrary.org/obo/CHEBI_16991 deoxyribonucleic acid http://purl.obolibrary.org/obo/CHEBI_33696 nucleic acid High molecular weight, linear polymers, composed of nucleotides containing deoxyribose and linked by phosphodiester bonds; DNA contain the genetic information of organisms. http://purl.obolibrary.org/obo/CHEBI_33696 nucleic acid http://purl.obolibrary.org/obo/CHEBI_33839 macromolecule A macromolecule made up of nucleotide units and hydrolysable into certain pyrimidine or purine bases (usually adenine, cytosine, guanine, thymine, uracil), D-ribose or 2-deoxy-D-ribose and phosphoric acid. http://purl.obolibrary.org/obo/CHEBI_33697 ribonucleic acid http://purl.obolibrary.org/obo/CHEBI_33696 nucleic acid High molecular weight, linear polymers, composed of nucleotides containing ribose and linked by phosphodiester bonds; RNA is central to the synthesis of proteins. http://purl.obolibrary.org/obo/BCO_0000003 observing process http://purl.obolibrary.org/obo/OBI_0000011 planned process A process in which a person or machine sees or detects a material entity and selects it as worthy of observation, and which has as output an information content entity about the selected material entity. http://purl.obolibrary.org/obo/BCO_0000016 submitting process http://purl.obolibrary.org/obo/OBI_0000011 planned process A planned process whereby a person submits a material sample to an organization. http://purl.obolibrary.org/obo/BCO_0000025 locality description http://purl.obolibrary.org/obo/IAO_0000030 information content entity An information artifact that is about a spatio-temporal region at which a process (such as collecting process, observing process, or material sampling process) occured. http://purl.obolibrary.org/obo/BCO_0000031 museum collection http://purl.obolibrary.org/obo/BFO_0000027 object aggregate An object aggregate that has as member part a material sample that is located in museum as a result of a process of curation. http://purl.obolibrary.org/obo/BCO_0000032 organismal museum collection http://purl.obolibrary.org/obo/BCO_0000031 museum collection A museum collection that has as member part a material sample that was derived from an organism. http://purl.obolibrary.org/obo/BCO_0000042 taxonomic identification process http://purl.obolibrary.org/obo/OBI_0000011 planned process A planned process by which an organismal entity is associated with a taxon or taxa. http://purl.obolibrary.org/obo/BCO_0000044 material target of observation http://purl.obolibrary.org/obo/BFO_0000040 material entity A material entity that has a target of observation role, that is, a material entity that is the input of some observing process. http://purl.obolibrary.org/obo/BCO_0000046 material target of observation role http://purl.obolibrary.org/obo/BFO_0000023 role A role that is borne by some material entity and is realized by the material entity being the input of an observing process. http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process http://purl.obolibrary.org/obo/OBI_0000011 planned process A planned process by which a taxonomic inventory is created. http://purl.obolibrary.org/obo/BCO_0000048 taxonomic inventory http://purl.obolibrary.org/obo/IAO_0000030 information content entity A list of names ascribed to biological entities of specified organismal scope recorded over some defined spatial and temporal scope following a described sampling protocol and sampling effort, potentially including values indicating abundance or biomass of the biological entities http://purl.obolibrary.org/obo/BCO_0000051 restricted search taxonomic inventory process http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process A taxonomic inventory process that is restricted to defined plots, transects, or points, in which a person or group of people is comprehensively covering the entire defined area, usually with a defined survey time or pace. The search is restricted to a well-defined and human-scale geospatial area (traversable within a time course of less than a day) within which there is an expectation of a comprehensive accounting of the taxonomic items of interest. http://purl.obolibrary.org/obo/BCO_0000052 open search taxonomic inventory process http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process A taxonomic inventory process in which the search is restricted within a larger defined geographic area, but where effort isn't even or complete across the defined region. That is, a planned search restricted to a larger, defined geographic area, but effort isn't evenly distributed throughout the area, nor expected to be a complete and comprehensive accounting of taxa of interest across the defined region. Temporal duration is typically longer than restricted search, lasting hours to all day. http://purl.obolibrary.org/obo/BCO_0000053 opportunistic search taxonomic inventory process http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process A taxonomic inventory process that is a more casual reporting of occurrences of taxa of interest, often intended to be comprehensive accounting of the taxa of interest, but with no planned trajectory for discovery, nor pre-specified investment of effort. http://purl.obolibrary.org/obo/BCO_0000054 trap or sample taxonomic inventory process http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process A taxonomic inventory process that is typically highly restricted in geospatial extent that involves either the physical extraction of some evidence of the presence of the taxa of interest, such as scat, fur, other material samples or information artifacts such as photographs or sound recordings. http://purl.obolibrary.org/obo/BCO_0000055 adventitious taxonomic inventory process http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process A taxonomic inventory process in which taxon occurrences are recorded as a co-variates of another study, or by happenstance, and later compiled as a taxonomic inventory. http://purl.obolibrary.org/obo/BCO_0000056 compilation taxonomic inventory process http://purl.obolibrary.org/obo/BCO_0000047 taxonomic inventory process A taxonomic inventory process in which a list of taxa of interest is assembled from various combinations of existing taxonomic inventories, rather than generated de novo from observations or samples. http://purl.obolibrary.org/obo/BCO_0000059 museum http://purl.obolibrary.org/obo/OBI_0000245 organization An institution that cares for (conserves) a collection of artifacts and other objects of scientific, artistic, cultural, or historical importance. http://purl.obolibrary.org/obo/BCO_0000061 fossil specimen http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A specimen that is derived from a fossil. http://purl.obolibrary.org/obo/BCO_0000062 living specimen http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A specimen that is alive. http://purl.obolibrary.org/obo/BCO_0000063 preserved specimen http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A specimen that has been preserved. http://purl.obolibrary.org/obo/BCO_0000065 human observation process http://purl.obolibrary.org/obo/BCO_0000003 observing process An observing process in which the observing entity consists of one or more humans. http://purl.obolibrary.org/obo/BCO_0000066 machine observation process http://purl.obolibrary.org/obo/BCO_0000003 observing process An observing process in which the observing entity consists of one or more machines. http://purl.obolibrary.org/obo/BCO_0000084 identification assertion http://purl.obolibrary.org/obo/IAO_0000027 data item A data item that is the output of a taxonomic identification process and associates some organismal entity with a taxon or taxa. http://purl.obolibrary.org/obo/CARO_0001010 organism or virus or viroid http://purl.obolibrary.org/obo/PCO_0000031 organismal entity Material anatomical entity that is a member of an individual species or is a viral or viroid particle. http://purl.obolibrary.org/obo/CARO_0010004 organism http://purl.obolibrary.org/obo/CARO_0001010 organism or virus or viroid An individual member of a clade. http://purl.obolibrary.org/obo/PCO_0000001 population of organisms http://purl.obolibrary.org/obo/PCO_0000018 single-species collection of organisms A collection of organisms, all of the same species, that live in the same place. http://purl.obolibrary.org/obo/PCO_0000017 species as a collection of organisms http://purl.obolibrary.org/obo/PCO_0000018 single-species collection of organisms A collection of organisms that has as parts every organism of given species and no organisms of any other species. http://purl.obolibrary.org/obo/PCO_0000020 family http://purl.obolibrary.org/obo/PCO_0000018 single-species collection of organisms A domestic group, or a number of domestic groups linked through descent (demonstrated or stipulated) from a common ancestor, marriage, or adoption. http://purl.obolibrary.org/obo/PCO_0000024 household http://purl.obolibrary.org/obo/PCO_0000031 organismal entity A material entity that consists of one or more people who live in the same dwelling and also share at meals or living accommodation, and may consist of a single family or some other grouping of people. http://purl.obolibrary.org/obo/PCO_0000028 community http://purl.obolibrary.org/obo/PCO_0000000 collection of organisms A collection of organisms connected by social or biological relations (biotic interactions). http://purl.obolibrary.org/obo/PCO_0000029 multi-species collection of organisms http://purl.obolibrary.org/obo/PCO_0000000 collection of organisms A collection of organisms that consists of two or more organisms from at least two species. http://purl.obolibrary.org/obo/PCO_0000030 agricultural household http://purl.obolibrary.org/obo/PCO_0000024 household A household in which the majority of the income of its members is derived from agricultural activities. http://purl.obolibrary.org/obo/PCO_0000031 organismal entity http://purl.obolibrary.org/obo/BFO_0000040 material entity A material entity that is one or more organisms, viruses or viroids. http://purl.obolibrary.org/obo/bco.owl/BCO_0000080 zooarcheological specimen http://rs.tdwg.org/dwc/terms/PreservedSpecimen Preserved Specimen A preserved specimen that is the output of an archaeological sampling process and is the remains of a part of some animal. http://purl.obolibrary.org/obo/bco.owl/BCO_0000081 archeobotanical specimen http://rs.tdwg.org/dwc/terms/PreservedSpecimen Preserved Specimen A preserved specimen that is the output of an archaeological sampling process and is the remains of a part of some plant. http://purl.obolibrary.org/obo/bco_0000000 evidence role http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A role that is borne by some entity as a result of the entity providing evidence to support an assertion. http://purl.obolibrary.org/obo/bco_0000001 persistent evidence role http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class An evidence role that persists through time. http://purl.obolibrary.org/obo/bco_0000003 obsolete observing process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A process in which a person or machine sees or detects a material entity and selects it as worthy of observation, and which has as output an information content entity about the selected material entity. http://purl.obolibrary.org/obo/bco_0000004 being there process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A process of existing in a particular spatio-temporal region. http://purl.obolibrary.org/obo/bco_0000006 printed observational report http://purl.obolibrary.org/obo/bco_0000005 printed report A printed report that records the outcome of some observing process. http://purl.obolibrary.org/obo/bco_0000007 selecting process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A process by which a person or machine decides that a particular material entity as worthy of collection or observation. http://purl.obolibrary.org/obo/bco_0000016 obsolete submitting process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A planned process whereby a person submits a material sample to an organization. http://purl.obolibrary.org/obo/bco_0000021 physical extraction process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A process that involves removing a material entity from its original site to another site. http://purl.obolibrary.org/obo/bco_0000025 obsolete locality description http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class An information artifact that is about a spatio-temporal region at which a process (such as collecting process, observing process, or material sampling process) occured. http://purl.obolibrary.org/obo/bco_0000026 material sample role http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A role that is borne by some material entity and is realized by the material entity being the output of a material sampling process. http://purl.obolibrary.org/obo/bco_0000027 successful material sampling process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A sampling process that has as output some material sample. http://purl.obolibrary.org/obo/bco_0000028 unsuccessful material sampling process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A material sampling process that has as output exactly zero material samples. http://purl.obolibrary.org/obo/bco_0000030 organismal museum collection entity http://purl.obolibrary.org/obo/bco_0000029 museum collection entity A museum collections entity that derives from an organismal entity, has a persistent evidence role and 'depends on' a process of collecting. http://purl.obolibrary.org/obo/bco_0000031 obsolete museum collection http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class An object aggregate that has as member part a material sample that is located in museum as a result of a process of curation. http://purl.obolibrary.org/obo/bco_0000032 obsolete organismal museum collection http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A museum collection that has as member part a material sample that was derived from an organism. http://purl.obolibrary.org/obo/bco_0000034 obsolete organismal entity http://purl.obolibrary.org/obo/bco_0000042 obsolete taxonomic identification process A material entity that derives from an organism or virus or viroid. http://purl.obolibrary.org/obo/bco_0000036 material sample http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A material entity that has a material sample role. A material entity takes on the material sample role by being the output of a material samping process. That is, is selected for study, collected, and submitted to an institution for preservation or study. http://purl.obolibrary.org/obo/bco_0000037 data sample http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class An information content entity (?) that is the result of some data sampling process. http://purl.obolibrary.org/obo/bco_0000042 obsolete taxonomic identification process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A process by which a material sample is associated with a taxon or taxa. http://purl.obolibrary.org/obo/bco_0000044 obsolete material target of observation http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A material entity that has a target of observation role, that is, a material entity that is the input of some observing process. http://purl.obolibrary.org/obo/bco_0000046 obsolete material target of observation role http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class A role that is borne by some material entity and is realized by the material entity being the input of an observing process. http://rs.tdwg.org/dwc/terms/Event Event http://purl.obolibrary.org/obo/BFO_0000003 occurrent http://purl.obolibrary.org/obo/BFO_0000141 immaterial entity http://purl.obolibrary.org/obo/BFO_0000004 independent continuant http://purl.obolibrary.org/obo/BFO_0000034 function http://purl.obolibrary.org/obo/BFO_0000016 disposition http://purl.obolibrary.org/obo/BFO_0000016 disposition http://purl.obolibrary.org/obo/BFO_0000017 realizable entity http://purl.obolibrary.org/obo/BFO_0000019 quality http://purl.obolibrary.org/obo/BFO_0000020 specifically dependent continuant http://purl.obolibrary.org/obo/BFO_0000027 object aggregate http://purl.obolibrary.org/obo/BFO_0000040 material entity http://purl.obolibrary.org/obo/BFO_0000030 object http://purl.obolibrary.org/obo/BFO_0000040 material entity http://rs.tdwg.org/dwc/terms/MaterialSample Material Sample http://purl.obolibrary.org/obo/BFO_0000040 material entity http://purl.obolibrary.org/obo/BFO_0000029 site http://purl.obolibrary.org/obo/BFO_0000141 immaterial entity http://purl.obolibrary.org/obo/OBI_0000973 sequence data http://purl.obolibrary.org/obo/IAO_0000027 data item http://rs.tdwg.org/dwc/terms/HumanObservation Human Observation http://purl.obolibrary.org/obo/IAO_0000027 data item http://rs.tdwg.org/dwc/terms/MachineObservation Machine Observation http://purl.obolibrary.org/obo/IAO_0000027 data item http://rs.tdwg.org/dwc/terms/Identification Identification http://purl.obolibrary.org/obo/OBI_0000011 planned process http://rs.tdwg.org/dwc/terms/LivingSpecimen Living Specimen http://rs.tdwg.org/dwc/terms/MaterialSample Material Sample http://rs.tdwg.org/dwc/terms/PreservedSpecimen Preserved Specimen http://rs.tdwg.org/dwc/terms/MaterialSample Material Sample http://rs.tdwg.org/dwc/terms/MeasurementOrFact Measurement or Fact http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://rs.tdwg.org/dwc/terms/ResourceRelationship Resource Relationship http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/BCO_0000064 darwin core class http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000002 collecting process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000005 printed report http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000023 data sampling process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000024 statistical sampling process http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000029 museum collection entity http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000033 institution http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000035 obsolete organism or virus or viroid http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000038 statistical sample http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000039 protocol governed sampling activity http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000043 process that yields a material representation of a material entity http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/bco_0000045 process that yields an information artifact that is a representation of a material entity http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://purl.obolibrary.org/obo/NCBITaxon_33208 Metazoa http://purl.obolibrary.org/obo/NCBITaxon_2759 Eukaryota http://purl.obolibrary.org/obo/NCBITaxon_9606 Homo sapiens http://purl.obolibrary.org/obo/NCBITaxon_33208 Metazoa http://rs.tdwg.org/dwc/terms/FossilSpecimen Fossil Specimen http://rs.tdwg.org/dwc/terms/PreservedSpecimen Preserved Specimen http://purl.obolibrary.org/obo/NCBITaxon_2759 Eukaryota http://purl.obolibrary.org/obo/CARO_0010004 organism http://rs.tdwg.org/dwc/terms/Taxon Taxon http://purl.obolibrary.org/obo/PCO_0000000 collection of organisms http://purl.obolibrary.org/obo/PCO_0001000 pair of interacting organisms http://purl.obolibrary.org/obo/PCO_0000000 collection of organisms http://purl.obolibrary.org/obo/PCO_0001001 pair of interacting organisms of the same species http://purl.obolibrary.org/obo/PCO_0001000 pair of interacting organisms http://rs.tdwg.org/dwc/terms/Organism Organism http://purl.obolibrary.org/obo/PCO_0000031 organismal entity http://purl.obolibrary.org/obo/BFO_0000001 entity http://www.geneontology.org/formats/oboInOwl#ObsoleteClass Obsolete Class http://rs.tdwg.org/dwc/terms/GeologicalContext Geological Context http://rs.tdwg.org/dwc/terms/Occurrence Occurrence http://purl.obolibrary.org/obo/RO_0000079 function of http://purl.obolibrary.org/obo/RO_0000052 inheres in is function of a relation between a function and an independent continuant (the bearer), in which the function specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0000080 quality of http://purl.obolibrary.org/obo/RO_0000052 inheres in quality_of a relation between a quality and an independent continuant (the bearer), in which the quality specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0000085 has function http://purl.obolibrary.org/obo/RO_0000053 bearer of has_function a relation between an independent continuant (the bearer) and a function, in which the function specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0000086 has quality http://purl.obolibrary.org/obo/RO_0000053 bearer of has_quality a relation between an independent continuant (the bearer) and a quality, in which the quality specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0002350 member of http://purl.obolibrary.org/obo/BFO_0000050 part of member part of is member of is a mereological relation between a item and a collection. http://purl.obolibrary.org/obo/RO_0000087 has role http://purl.obolibrary.org/obo/RO_0000053 bearer of has_role a relation between an independent continuant (the bearer) and a role, in which the role specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0000081 role of http://purl.obolibrary.org/obo/RO_0000052 inheres in role_of a relation between a role and an independent continuant (the bearer), in which the role specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/OBI_0000293 has_specified_input http://purl.obolibrary.org/obo/RO_0002233 has input A relation between a planned process and a continuant participating in that process that is not created during the process. The presence of the continuant during the process is explicitly specified in the plan specification which the process realizes the concretization of. http://purl.obolibrary.org/obo/OBI_0000295 is_specified_input_of http://purl.obolibrary.org/obo/RO_0002352 is input of A relation between a planned process and a continuant participating in that process that is not created during the process. The presence of the continuant during the process is explicitly specified in the plan specification which the process realizes the concretization of. http://purl.obolibrary.org/obo/OBI_0000299 has_specified_output http://purl.obolibrary.org/obo/RO_0002234 has output A relation between a planned process and a continuant participating in that process. The presence of the continuant at the end of the process is explicitly specified in the objective specification which the process realizes the concretization of. http://purl.obolibrary.org/obo/OBI_0000312 is_specified_output_of http://purl.obolibrary.org/obo/RO_0002353 is output of A relation between a planned process and a continuant participating in that process. The presence of the continuant at the end of the process is explicitly specified in the objective specification which the process realizes the concretization of. http://purl.obolibrary.org/obo/OBI_0001938 has value specification http://purl.obolibrary.org/obo/BFO_0000051 has part A relation between an information content entity and a value specification that specifies its value. http://purl.obolibrary.org/obo/RO_0002351 has member http://purl.obolibrary.org/obo/BFO_0000051 has part has member is a mereological relation between a collection and an item. http://purl.obolibrary.org/obo/RO_0000091 has disposition http://purl.obolibrary.org/obo/RO_0000053 bearer of a relation between an independent continuant (the bearer) and a disposition, in which the disposition specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/BFO_0000052 inheres in http://purl.obolibrary.org/obo/BFO_0000070 s depends on inheres_in http://purl.obolibrary.org/obo/BCO_0000086 of organism http://purl.obolibrary.org/obo/IAO_0000136 is about http://purl.obolibrary.org/obo/BCO_0000085 to taxon http://purl.obolibrary.org/obo/IAO_0000136 is about http://purl.obolibrary.org/obo/RO_0000092 disposition of http://purl.obolibrary.org/obo/RO_0000052 inheres in http://rs.tdwg.org/dwc/terms/recordedBy Recorded By http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/measurementDeterminedBy Measurement Determined By http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/identifiedBy Identified By http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/nameAccordingTo Name According To http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/georeferencedBy Georeferenced By http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/relationshipAccordingTo Relationship According To http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/locationAccordingTo Location According To http://rs.tdwg.org/dwc/terms/accordingTo According To http://purl.obolibrary.org/obo/BCO_0000087 member of taxon http://purl.obolibrary.org/obo/BFO_0000050 part of http://purl.obolibrary.org/obo/RO_0000052 inheres in inheres_in a relation between a specifically dependent continuant (the dependent) and an independent continuant (the bearer), in which the dependent specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0000053 bearer of is bearer of a relation between an independent continuant (the bearer) and a specifically dependent continuant (the dependent), in which the dependent specifically depends on the bearer for its existence http://purl.obolibrary.org/obo/RO_0000056 participates in participates_in a relation between a continuant and a process, in which the continuant is somehow involved in the process http://purl.obolibrary.org/obo/RO_0000057 has participant has_participant a relation between a process and a continuant, in which the continuant is somehow involved in the process http://purl.obolibrary.org/obo/RO_0001000 derives from derives_from a relation between two distinct material entities, the new entity and the old entity, in which the new entity begins to exist when the old entity ceases to exist, and the new entity inherits the significant portion of the matter of the old entity http://purl.obolibrary.org/obo/RO_0001001 derives into derives_into a relation between two distinct material entities, the old entity and the new entity, in which the new entity begins to exist when the old entity ceases to exist, and the new entity inherits the significant portion of the matter of the old entity http://purl.obolibrary.org/obo/RO_0001015 location of location_of a relation between two independent continuants, the location and the target, in which the target is entirely within the location http://purl.obolibrary.org/obo/RO_0002000 2D boundary of is boundary of a relation between a 2D immaterial entity (the boundary) and a material entity, in which the boundary delimits the material entity http://purl.obolibrary.org/obo/RO_0002002 has 2D boundary has_2D_boundary a relation between a material entity and a 2D immaterial entity (the boundary), in which the boundary delimits the material entity http://purl.obolibrary.org/obo/RO_0001025 located in located_in a relation between two independent continuants, the target and the location, in which the target is entirely within the location http://purl.obolibrary.org/obo/BFO_0000051 has part has_part a core relation that holds between a whole and its part http://purl.obolibrary.org/obo/BFO_0000050 part of part_of a core relation that holds between a part and its whole http://purl.obolibrary.org/obo/BFO_0000066 occurs in unfolds_in b occurs_in c =def b is a process and c is a material entity or immaterial entity& there exists a spatiotemporal region r and b occupies_spatiotemporal_region r.& forall(t) if b exists_at t then c exists_at t & there exist spatial regions s and s’ where & b spatially_projects_onto s at t& c is occupies_spatial_region s’ at t& s is a proper_continuant_part_of s’ at t http://purl.obolibrary.org/obo/BFO_0000067 contains process [copied from inverse property 'occurs in'] b occurs_in c =def b is a process and c is a material entity or immaterial entity& there exists a spatiotemporal region r and b occupies_spatiotemporal_region r.& forall(t) if b exists_at t then c exists_at t & there exist spatial regions s and s’ where & b spatially_projects_onto s at t& c is occupies_spatial_region s’ at t& s is a proper_continuant_part_of s’ at t http://purl.obolibrary.org/obo/IAO_0000136 is about is_about is a (currently) primitive relation that relates an information artifact to an entity. http://purl.obolibrary.org/obo/OBI_0000417 achieves_planned_objective This relation obtains between a planned process and a objective specification when the criteria specified in the objective specification are met at the end of the planned process. http://purl.obolibrary.org/obo/RO_0000058 is concretized as A relationship between a generically dependent continuant and a specifically dependent continuant, in which the generically dependent continuant depends on some independent continuant in virtue of the fact that the specifically dependent continuant also depends on that same independent continuant. A generically dependent continuant may be concretized as multiple specifically dependent continuants. http://purl.obolibrary.org/obo/RO_0000059 concretizes A relationship between a specifically dependent continuant and a generically dependent continuant, in which the generically dependent continuant depends on some independent continuant in virtue of the fact that the specifically dependent continuant also depends on that same independent continuant. Multiple specifically dependent continuants can concretize the same generically dependent continuant. http://purl.obolibrary.org/obo/BCO_0000058 has role The relationship between an independent continuant and a role. Slightly more specific than the parent class bearer of. http://purl.obolibrary.org/obo/BFO_0000054 realized in realized_by http://purl.obolibrary.org/obo/BFO_0000053 is bearer of bearer_of http://purl.obolibrary.org/obo/BFO_0000070 s depends on s_depends_on http://purl.obolibrary.org/obo/BFO_0000087 has role has_role http://purl.obolibrary.org/obo/RO_0002234 has output http://purl.obolibrary.org/obo/BFO_0000055 realizes http://rs.tdwg.org/dwc/terms/acceptedNameUsage Accepted Name Usage http://rs.tdwg.org/dwc/terms/accordingTo According To http://rs.tdwg.org/dwc/terms/associatedMedia Associated Media http://rs.tdwg.org/dwc/terms/associatedOccurrences Associated Occurrences http://rs.tdwg.org/dwc/terms/associatedOrganisms Associated Organisms http://rs.tdwg.org/dwc/terms/associatedReferences Associated References http://rs.tdwg.org/dwc/terms/associatedSequences Associated Sequences http://rs.tdwg.org/dwc/terms/associatedTaxa Associated Taxa http://rs.tdwg.org/dwc/terms/basisOfRecord Basis of Record http://rs.tdwg.org/dwc/terms/bed Bed http://rs.tdwg.org/dwc/terms/behavior Behavior http://rs.tdwg.org/dwc/terms/catalogNumber Catalog Number http://rs.tdwg.org/dwc/terms/class Class http://rs.tdwg.org/dwc/terms/collectionCode Collection Code http://rs.tdwg.org/dwc/terms/collectionID Collection ID http://rs.tdwg.org/dwc/terms/continent Continent http://rs.tdwg.org/dwc/terms/coordinatePrecision Coordinate Precision http://rs.tdwg.org/dwc/terms/coordinateUncertaintyInMeters Coordinate Uncertainty In Meters http://rs.tdwg.org/dwc/terms/country Country http://rs.tdwg.org/dwc/terms/countryCode Country Code http://rs.tdwg.org/dwc/terms/county County http://rs.tdwg.org/dwc/terms/dataGeneralizations Data Generalizations http://rs.tdwg.org/dwc/terms/datasetName Dataset Name http://rs.tdwg.org/dwc/terms/dateIdentified Date Identified http://rs.tdwg.org/dwc/terms/day Day http://rs.tdwg.org/dwc/terms/decimalLatitude Decimal Latitude http://rs.tdwg.org/dwc/terms/decimalLongitude Decimal Longitude http://rs.tdwg.org/dwc/terms/disposition Disposition http://rs.tdwg.org/dwc/terms/dynamicProperties Dynamic Properties http://rs.tdwg.org/dwc/terms/earliestAgeOrLowestStage Earliest Age Or Lowest Stage http://rs.tdwg.org/dwc/terms/earliestEonOrLowestEonothem Earliest Eon Or Lowest Eonothem http://rs.tdwg.org/dwc/terms/earliestEpochOrLowestSeries Earliest Epoch Or Lowest Series http://rs.tdwg.org/dwc/terms/earliestEraOrLowestErathem Earliest Era Or Lowest Erathem http://rs.tdwg.org/dwc/terms/earliestPeriodOrLowestSystem Earliest Period Or Lowest System http://rs.tdwg.org/dwc/terms/endDayOfYear End Day Of Year http://rs.tdwg.org/dwc/terms/establishmentMeans Establishment Means http://rs.tdwg.org/dwc/terms/eventDate Event Date http://rs.tdwg.org/dwc/terms/eventRemarks Event Remarks http://rs.tdwg.org/dwc/terms/eventTime Event Time http://rs.tdwg.org/dwc/terms/family Family http://rs.tdwg.org/dwc/terms/fieldNotes Field Notes http://rs.tdwg.org/dwc/terms/fieldNumber Field Number http://rs.tdwg.org/dwc/terms/footprintSRS Footprint SRS http://rs.tdwg.org/dwc/terms/footprintSpatialFit Footprint Spatial Fit http://rs.tdwg.org/dwc/terms/footprintWKT Footprint WKT http://rs.tdwg.org/dwc/terms/formation Formation http://rs.tdwg.org/dwc/terms/genus Genus http://rs.tdwg.org/dwc/terms/geodeticDatum Geodetic Datum http://rs.tdwg.org/dwc/terms/georeferenceProtocol Georeference Protocol http://rs.tdwg.org/dwc/terms/georeferenceRemarks Georeference Remarks http://rs.tdwg.org/dwc/terms/georeferenceSources Georeference Sources http://rs.tdwg.org/dwc/terms/georeferenceVerificationStatus Georeference Verification Status http://rs.tdwg.org/dwc/terms/georeferencedDate Georeferenced Date http://rs.tdwg.org/dwc/terms/group Group http://rs.tdwg.org/dwc/terms/habitat Habitat http://rs.tdwg.org/dwc/terms/higherClassification Higher Classification http://rs.tdwg.org/dwc/terms/higherGeography Higher Geography http://rs.tdwg.org/dwc/terms/highestBiostratigraphicZone Highest Biostratigraphic Zone http://rs.tdwg.org/dwc/terms/identificationQualifier Identification Qualifier http://rs.tdwg.org/dwc/terms/identificationReferences Identification References http://rs.tdwg.org/dwc/terms/identificationRemarks Identification Remarks http://rs.tdwg.org/dwc/terms/identificationVerificationStatus Identification Verification Status http://rs.tdwg.org/dwc/terms/individualCount Individual Count http://rs.tdwg.org/dwc/terms/informationWithheld Information Withheld http://rs.tdwg.org/dwc/terms/infraspecificEpithet Infraspecific Epithet http://rs.tdwg.org/dwc/terms/institutionCode Institution Code http://rs.tdwg.org/dwc/terms/institutionID Institution ID http://rs.tdwg.org/dwc/terms/island Island http://rs.tdwg.org/dwc/terms/islandGroup Island Group http://rs.tdwg.org/dwc/terms/kingdom Kingdom http://rs.tdwg.org/dwc/terms/latestAgeOrHighestStage Latest AgeOr Highest Stage http://rs.tdwg.org/dwc/terms/latestEonOrHighestEonothem Latest Eon Or Highest Eonothem http://rs.tdwg.org/dwc/terms/latestEpochOrHighestSeries Latest Epoch Or Highest Series http://rs.tdwg.org/dwc/terms/latestEraOrHighestErathem Latest Era Or Highest Erathem http://rs.tdwg.org/dwc/terms/latestPeriodOrHighestSystem Latest Period Or Highest System http://rs.tdwg.org/dwc/terms/lifeStage Life Stage http://rs.tdwg.org/dwc/terms/lithostratigraphicTerms Lithostratigraphic Terms http://rs.tdwg.org/dwc/terms/locality Locality http://rs.tdwg.org/dwc/terms/locationRemarks Location Remarks http://rs.tdwg.org/dwc/terms/lowestBiostratigraphicZone Lowest Biostratigraphic Zone http://rs.tdwg.org/dwc/terms/maximumDepthInMeters Maximum Depth In Meters http://rs.tdwg.org/dwc/terms/maximumDistanceAboveSurfaceInMeters Maximum Distance Above Surface In Meters http://rs.tdwg.org/dwc/terms/maximumElevationInMeters Maximum Elevation In Meters http://rs.tdwg.org/dwc/terms/measurementAccuracy Measurement Accuracy http://rs.tdwg.org/dwc/terms/measurementDeterminedDate Measurement Determined Date http://rs.tdwg.org/dwc/terms/measurementMethod Measurement Method http://rs.tdwg.org/dwc/terms/measurementRemarks Measurement Remarks http://rs.tdwg.org/dwc/terms/measurementType Measurement Type http://rs.tdwg.org/dwc/terms/measurementUnit Measurement Unit http://rs.tdwg.org/dwc/terms/measurementValue Measurement Value http://rs.tdwg.org/dwc/terms/member Member http://rs.tdwg.org/dwc/terms/minimumDepthInMeters Minimum Depth In Meters http://rs.tdwg.org/dwc/terms/minimumDistanceAboveSurfaceInMeters Minimum Distance Above Surface In Meters http://rs.tdwg.org/dwc/terms/minimumElevationInMeters Minimum Elevation In Meters http://rs.tdwg.org/dwc/terms/month Month http://rs.tdwg.org/dwc/terms/municipality Municipality http://rs.tdwg.org/dwc/terms/namePublishedIn Name Published In http://rs.tdwg.org/dwc/terms/namePublishedInYear Name Published In Year http://rs.tdwg.org/dwc/terms/nomenclaturalCode Nomenclatural Code http://rs.tdwg.org/dwc/terms/nomenclaturalStatus Nomenclatural Status http://rs.tdwg.org/dwc/terms/occurrenceRemarks Occurrence Remarks http://rs.tdwg.org/dwc/terms/occurrenceStatus Occurrence Status http://rs.tdwg.org/dwc/terms/order Order http://rs.tdwg.org/dwc/terms/organismName Organism Name http://rs.tdwg.org/dwc/terms/organismQuantity Organism Quantity http://rs.tdwg.org/dwc/terms/organismQuantityType Organism Quantity Type http://rs.tdwg.org/dwc/terms/organismRemarks Organism Remarks http://rs.tdwg.org/dwc/terms/organismScope Organism Scope http://rs.tdwg.org/dwc/terms/originalNameUsage Original Name Usage http://rs.tdwg.org/dwc/terms/otherCatalogNumbers Other Catalog Numbers http://rs.tdwg.org/dwc/terms/ownerInstitutionCode Owner Institution Code http://rs.tdwg.org/dwc/terms/parentNameUsage Parent Name Usage http://rs.tdwg.org/dwc/terms/phylum Phylum http://rs.tdwg.org/dwc/terms/pointRadiusSpatialFit Point Radius Spatial Fit http://rs.tdwg.org/dwc/terms/preparations Preparations http://rs.tdwg.org/dwc/terms/previousIdentifications Previous Identifications http://rs.tdwg.org/dwc/terms/recordNumber Record Number http://rs.tdwg.org/dwc/terms/relationshipEstablishedDate Relationship Established Date http://rs.tdwg.org/dwc/terms/relationshipOfResource Relationship Of Resource http://rs.tdwg.org/dwc/terms/relationshipRemarks Relationship Remarks http://rs.tdwg.org/dwc/terms/reproductiveCondition Reproductive Condition http://rs.tdwg.org/dwc/terms/sampleSizeUnit Sample Size Unit http://rs.tdwg.org/dwc/terms/sampleSizeValue Sample Size Value http://rs.tdwg.org/dwc/terms/samplingEffort Sampling Effort http://rs.tdwg.org/dwc/terms/samplingProtocol Sampling Protocol http://rs.tdwg.org/dwc/terms/scientificName Scientific Name http://rs.tdwg.org/dwc/terms/scientificNameAuthorship Scientific Name Authorship http://rs.tdwg.org/dwc/terms/sex Sex http://rs.tdwg.org/dwc/terms/specificEpithet Specific Epithet http://rs.tdwg.org/dwc/terms/startDayOfYear Start Day Of Year http://rs.tdwg.org/dwc/terms/stateProvince State Province http://rs.tdwg.org/dwc/terms/subgenus Subgenus http://rs.tdwg.org/dwc/terms/taxonRank Taxon Rank http://rs.tdwg.org/dwc/terms/taxonRemarks Taxon Remarks http://rs.tdwg.org/dwc/terms/taxonomicStatus Taxonomic Status http://rs.tdwg.org/dwc/terms/typeStatus Type Status http://rs.tdwg.org/dwc/terms/verbatimCoordinateSystem Verbatim Coordinate System http://rs.tdwg.org/dwc/terms/verbatimCoordinates Verbatim Coordinates http://rs.tdwg.org/dwc/terms/verbatimDepth Verbatim Depth http://rs.tdwg.org/dwc/terms/verbatimElevation Verbatim Elevation http://rs.tdwg.org/dwc/terms/verbatimEventDate Verbatim EventDate http://rs.tdwg.org/dwc/terms/verbatimLatitude Verbatim Latitude http://rs.tdwg.org/dwc/terms/verbatimLocality Verbatim Locality http://rs.tdwg.org/dwc/terms/verbatimLongitude Verbatim Longitude http://rs.tdwg.org/dwc/terms/verbatimSRS Verbatim SRS http://rs.tdwg.org/dwc/terms/verbatimTaxonRank Verbatim Taxon Rank http://rs.tdwg.org/dwc/terms/vernacularName Vernacular Name http://rs.tdwg.org/dwc/terms/waterBody Water Body http://rs.tdwg.org/dwc/terms/year Year http://purl.obolibrary.org/obo/BCO_0000067 derives from by planned process http://purl.obolibrary.org/obo/BCO_0000068 is derived into by planned process http://purl.obolibrary.org/obo/RO_0002233 has input http://purl.obolibrary.org/obo/RO_0002352 is input of http://purl.obolibrary.org/obo/RO_0002353 is output of
Mid
[ 0.6163793103448271, 35.75, 22.25 ]
To those uninitiated in the global fight against the opioid crisis, the idea of delivering safe opioids through vending machines might sound ridiculous, counterintuitive and even dangerous. The idea was raised late last year by Dr. Mark Tyndall, executive medical director of the B.C. Centre for Disease Control, who suggested that machines could dispense pills at supportive housing facilities or supervised consumption sites. Many Canadians — including one of my medical school classmates who wrote a column on the topic for the National Post — believe that the government's focus should be getting people off drugs, not supplying them with them. Alberta United Conservative Party leader Jason Kenney echoed that sentiment recently, saying in an interview that, "Helping addicts inject poison into their bodies is not a solution to the problem of addiction." "Helping addicts inject poison into their bodies is not a solution to the problem of addiction," Kenney said in a recent interview. (CBC) But a mountain of research and rooms full of professionals will tell you that it is, in fact, part of a solution: that addressing addiction is a long-term effort. The opioid epidemic is killing at least eight people per day in this country. And as we struggle to fight it, we don't always have time to fight the addiction first. We need to fight to keep people alive. At its core, harm reduction is about showing compassion to people with addiction issues and removing the stigma that may keep them from seeking help. It recognizes that if people are going to use drugs, they might as well do so in as safe an environment as possible. Most importantly, it's about prioritizing a person's life ahead of their addiction. I was born and raised in British Columbia, where I have seen firsthand the impact of harm reduction efforts. The work of the B.C. Centre for Excellence in HIV/AIDS (where, full disclosure, I completed my PhD) and other organizations have demonstrated again and again that harm reduction saves lives. The opening of Insite, Vancouver's supervised injection facility, has resulted in dramatically fewer overdoses — a 35 per cent drop in fatal overdoses in the Downtown Eastside. What's more, the North American Opiate Medication Initiative (NAOMI) trial, based in Vancouver and Montreal, has demonstrated that providing safe sources of opioids can have a dramatic impact on users' lives. Patients who were provided medical grade heroin were more likely to remain in addiction treatment and less likely to use illicit drugs or be involved in other illegal activity. It is this high-impact peer-reviewed evidence that has helped form the basis for the supervised medical supply of opioids. The issue at hand here is not of some theoretical academic debate; real lives are at risk if we continue with the status quo. In 2016, more than 2,800 Canadians died from opioid-related causes, and the number of deaths due to fentanyl more than doubled. Opioid deaths may have reached as high as 4000 in 2017. Having compassion and realistic approaches for people who use opioids is not giving up on them. No one disputes that the ideal outcome is for people to move past their addictions and lead healthier lives. But that can't happen instantly. Preventing the unnecessary deaths of Canadians should be at the forefront of our approach to the opioid epidemic. Allowing deaths to occur based on ideology or outdated notions about harm reduction is reckless and lacks humanity. We must do all we can to keep those who are struggling with addiction alive. We can't help them if they're no longer here. Luke Swenson, PhD, is a final-year medical student who will soon be commencing his residency in psychiatry at the University of Toronto. He completed his PhD at the BC Centre for Excellence in HIV/AIDS. This column is part of CBC's Opinion section. For more information about this section, please read this editor's blog and our FAQ.
Mid
[ 0.636971046770601, 35.75, 20.375 ]
On a Shark, with stock width (and offset) wheels, they include fender clearance at both ends, interference with suspen-sion and steering components on the front end (with the wheels and tires both aimed straight ahead and turned to full left and ... Read Content Tire Recycling - Wikipedia, The Free EncyclopediaHowever, material recovered from waste tires, known as "crumb," is generally only a cheap "filler" material and is rarely used in high volumes. They are made to be highly durable and weatherproof, One stage of tire recycling involves the production of alternate products for sale. ... Read Article And most of the 20” or larger aftermarket wheels out there are chromeplated. Chrome is a beautiful finish, Wheel Finishes: Chrome About Autos Follow us: We deliver. Get the best of About Autos in your inbox. Thanks, You're in! ... Read Article Rolling Bridge Jack - Harbor Freight ToolsThe Roller Guides (19) are effectively wheels which will operate on rails much like the wheels on a railroad train. They will work on the edges of the platforms of an automotive lift, or on rails mounted on a work shop floor. 2. ... Read Here HAGON WHEEL SERVICES - Hagon-shocks.co.ukHAGON WHEEL SERVICES Hagon Products Ltd, one of the leading wheel specialists in the UK. We have been building wheels for classic and modern machines since 1958. So whether you require a super-moto conversion for your modern trail bike or a rebuild for ... Retrieve Here
Low
[ 0.487755102040816, 29.875, 31.375 ]
# Copyright 2015-2018 Cisco Systems, Inc. # All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. import struct from yabgp.tlv import TLV from ..linkstate import LinkState # 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 # +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ # | Link Local Identifier | # +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ # | Link Remote Identifier | # +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ @LinkState.register() class LinkIdentifiers(TLV): """ link local/remote identifiers """ TYPE = 258 # RFC 7752 TYPE_STR = 'link_identifiers' @classmethod def unpack(cls, data): local_identifier = struct.unpack('!I', data[:4])[0] remote_identifier = struct.unpack('!I', data[4:])[0] return cls(value={'local_identifier': local_identifier, 'remote_identifier': remote_identifier})
Mid
[ 0.567796610169491, 33.5, 25.5 ]
Hosting with XHTML,CSS abd Graphics Limitations of XHTML Sample of XHTML About DTDs What is the role of CSS Web hosting service is a type of internet hosting service that allows individuals and organizations to make website accessible via World Wide Web. The hosting companies provide a particular space on the server provided by the web hosting company. That space is provided according to what the user wants and is that space suitable for the user. Websites can be hosted in many different platforms. So if hosting of the website is done with XHTML, CSS and web graphics then how it will be working. So let’s go in brief about XHTML, CSS and web graphics. XHTML is the stricter and cleaner form of HTML and is very much identical to HTML 4.01. XHTML is responsible for the structure of the web pages whereas presentation is handled by CSS (Cascading Style Sheets). The first version of it is known as XHTML 1.0. It used the existing three document types of HTML and reformulated them as applications of XML. XHTML is the recommendation of W3C (Worldwide Web Consortium), an organization to make and maintain standards for the Internet and its associated technologies. Some limitations about XHTML: Documents must have only one root element XHTML elements must be properly nested Elements must always be closed and be in lowercase Tags attribute names must be in lower case and quoted XHTML tags attribute minimization is forbidden Websites are designed multi-column CSS layouts with optimized graphic files, the process of website development includes: • Getting Web Hosting, Domain name and FTP Access: Get the best business hosting plan which helps you in providing the user best hosting. Business hosting plan provides following : •Create a simple (X)HTML page, how to add links and images: An XHTML document has a very simple structure. It has a header, which contains information about the document, and a body, which contains the main content of the document. To markup this structure, you need three tags – <html>, <head>, and <body>.The FTP (File Transfer Protocol, File Transfer Protocol) is one of the oldest within the Internet. It is a service that users use frequently (driver downloads, music, documents, etc..), But this is only part of the service, since it is also possible to implement in our machine, FTP server for other users can connect to our computer and pick up / leave information in a particular area. For eg: <?xml version=”1.0″ encoding=”UTF-8″?> <!DOCTYPE htmlPUBLIC “-//W3C//DTD XHTML 1.0 Strict//EN””DTD/xhtml1-strict.dtd”> <html xmlns=”http://www.w3.org/1999/xhtml” xml:lang=”en” lang=”en”> <head> <title> Strict DTD XHTML Example </title> </head> <body> <p> Please Choose a Day: <br /><br /> <select name=”day”> <option selected=”selected”>Monday</option> <option>Tuesday</option> <option>Wednesday</option> </select> </p> </body> </html> • Web standards – Facts about XHTML: XHTML documents start with an <html> tag – there is no such thing as an <xhtml> tag. It is required that you declare the XHTML namespace inside the opening <html> tag. This XHTML example covered the use of XHTML transitional – for XHTML strict or frameset, use the appropriate DOCTYPE Declaration. Remember that declaring a DOCTYPE with a valid identifier at the top of an XHTML page puts most browers in standards mode- so remember not to use old browser hacks, and non-standard tags. (Otherwise, use just use regular HTML) For some browsers, including Microsoft Internet Explorer 6, if you start an XHTML page with the XML declaration, the browser goes into quirks mode, an unfortunate bug. The workaround is to delete the optional declaration and declare the the encoding using a meta tag. The DOCTYPE declaration has to be in all uppercase characters, just like in the XHTML example code. What are DTD’s? XML defines the DTD [document type definition] to avail variable contents to display them. XML conversion services are useful for newspapers, magazines, journals, technical and various documents, graphics and other republishing services. The source file is converted and validated with best validating software; every individual tag will be validated by automated method to make sure the highest quality standard is achieved. The purpose of a DTD (Document Type Definition) is to define the legal building blocks of an XML document. A DTD defines the document structure with a list of legal elements and attributes. Three types of DTD’s are there: a. Strict: You should use the strict DTD when your XHTML pages will be marked up cleanly, free of presentational clutter. You use the strict DTD together with cascading style sheets, because it doesn’t allow attributes like “bgcolor” to be set for the <body> tag, etc. b. Transitional The transitional DTD should be used when you need to take advantage of the presentational features that are available through HTML. You should also use the transitional DTD when you want to support older browsers that don’t have built-in support for cascading style sheets. c. Frameset You should use the frameset DTD when your XHTML page will contain frames. Go To Top • Cascading Style Sheets – CSS stands for Cascading Style Sheets. Styles define how to display HTML elements. Styles were added to HTML 4.0 to solve a problem. External Style Sheets can save a lot of work. External Style Sheets are stored in CSS files. CSS defines HOW HTML elements are to be displayed. CSS allows us to create visual settings for our internet documents. CSS is not a tool to enrich the business or logical layers of websites. The main and only purpose of CSS is to enrich and give a better control to visual aspects such as page layout, page color, text and decorations and the like. CSS also allows us to define different display of the same content in different situations. For example, using CSS it can be configured to display content differently in a browser or printed document. CSS also allows us to customize the way one reader or a group of readers will see our site according to various characteristics that we can define in advance. For example if you want to change the background color of a page then CSS is as follows: <html> <head> <style type=”text/css”> body { background-color:#b0c4de; } </style> </head> <body> <h1>My CSS web page!</h1> <p>HELLO! Welcome to webhostingcheap.net</p> </body> </html> • Web graphics: Graphics are visual elements often used to point readers and viewers to particular information. They are also used to supplement text in an effort to aid readers in their understanding of a particular concept or make the concept more clear or interesting. Graphics can be functional or artistic. The latter can be a recorded version, such as a photograph, or an interpretation by a scientist to highlight essential features, or an artist, in which case the distinction with imaginary graphics may become blurred. Web graphic design has been professed as the easiest and modern method for online connectedness, exploring other arenas of typography for designs. It uses visual arts, creative and cognitive skills, etc. for creating that quest to grouping. In primary events equal fluid publicity, competent illustration designs activity a better portrayal in determining the open soul for the kind. Go To Top
Mid
[ 0.549568965517241, 31.875, 26.125 ]
Prior art nasal filters designed to be removably inserted into the nostrils offer various filter materials exhibiting a range of porosities. Albu U.S. Pat. No. 3,463,149 discloses a filter plug comprising a cotton body contained within a fabric covering. A medicament containing cylinder, having a stationary ported piston received therein, dispenses medicament into the body upon relative movement of the cylinder and piston. Kronenberg U.S. Pat. No. 10,322,304 B2 discloses a two-stage filter system including a microfiber filter and a nanofiber filter used in series, with the nanofiber filter located downstream of the microfiber filter. Dolezal U.S. Pat. No. 7,918,224 B2 discloses a pair of ellipsoidal filters exhibiting a corrugated structure to increase the surface area available for filtration. The entire contents of the foregoing Albu, Kronenberg, and Dolezal patents are hereby incorporated herein. Presently known nasal filters are unsatisfactory in that they allow some portion of the inhaled air stream to bypass the seal formed between the outer perimeter of the filter and the internal nasal surfaces. In addition, very small particle sizes often pass through the filter and enter the body, potentially causing infection. Nasal filter devices and systems are thus needed which overcome these and other shortcomings of the prior art.
Mid
[ 0.6212424849699391, 38.75, 23.625 ]
Q: Sencha Touch - how to display up to date content in Nested List? So let's say in Sencha Touch, I created a Nested List like so var NestedList = createList(jsonDataObject,'leftNavigation','list','bookmark-icon'); function createList( data , id , cls, iconCls) { var store = new Ext.data.TreeStore({ model: 'ListItem', root: data, proxy: { type: 'ajax', reader: { type: 'tree', root: 'items' } } }); var leftNav = new Ext.NestedList({ // cardSwitchAnimation: false, dock: 'left', id: id, cls: 'card '+cls, useTitleAsBackText: true, title: data.text , iconCls: iconCls, displayField: 'text', width: '350', store: store}); } After a while, the contents of jsonDataObject will change (either periodically via a setInterval() call or because of user interaction). I may also need to submit an entirely new jsonDataObject to the NestedList store. So my questions are: a) How do I get the NestedList to refresh and display a new UI with the new data? b) Is my implementation of createList() the most appropriate way to create a Nestlisted? Or is there a better way for my purposes? A: Because no one answered my question in time, I used a work around. I kept the code as is in the question. The nested list is used by a container panel. So what I did was remove the old nestedlist from the container panel, destroy it, then create a new nestedlist, and insert it back to container panel. As an example: // my old nestedlist was item 1 of the container, where container is Ext.TabPanel() // you can re-use this strategy with any component in the container.items.items array var oldnestedlist = container.items.items[1]; container.remove(oldnestedlist); oldnestedlist.destroy(); // create the new nestedlist var NestedList = createList(jsonDataObject,'leftNavigation','list','bookmark-icon'); container.insert(1,NestedList); // After you insert the NestedList, the screen hasn't been redrawn yet, // so i force the user to go back to screen if container.items.items[0] via // setActiveItem(0). You can choose the screen in any other // container.items.items array container.setActiveItem(0); // Next time someone presses the tab for containers.items.items[1], the screen will automatically redraw
Mid
[ 0.596938775510204, 29.25, 19.75 ]
// Copyright (c) Microsoft. All Rights Reserved. Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information. using System; using System.Collections.Generic; namespace Microsoft.CodeAnalysis.CSharp.Syntax { internal class SyntaxNodeOrTokenListBuilder { private Syntax.InternalSyntax.CSharpSyntaxNode[] _nodes; private int _count; public SyntaxNodeOrTokenListBuilder(int size) { _nodes = new Syntax.InternalSyntax.CSharpSyntaxNode[size]; _count = 0; } public int Count { get { return _count; } } public void Clear() { _count = 0; } public SyntaxNodeOrToken this[int index] { get { var innerNode = _nodes[index]; var tk = innerNode as Syntax.InternalSyntax.SyntaxToken; if (tk != null) { // getting internal token so we do not know the position return new SyntaxNodeOrToken(null, tk, 0, 0); } else { return innerNode.CreateRed(); } } set { _nodes[index] = (Syntax.InternalSyntax.CSharpSyntaxNode)value.UnderlyingNode; } } internal void Add(Syntax.InternalSyntax.CSharpSyntaxNode item) { if (_nodes == null || _count >= _nodes.Length) { this.Grow(_count == 0 ? 8 : _nodes.Length * 2); } _nodes[_count++] = item; } public void Add(SyntaxNodeOrToken item) { this.Add((Syntax.InternalSyntax.CSharpSyntaxNode)item.UnderlyingNode); } public void Add(SyntaxNodeOrTokenList list) { this.Add(list, 0, list.Count); } public void Add(SyntaxNodeOrTokenList list, int offset, int length) { if (_nodes == null || _count + length > _nodes.Length) { this.Grow(_count + length); } list.CopyTo(offset, _nodes, _count, length); _count += length; } public void Add(IEnumerable<SyntaxNodeOrToken> nodeOrTokens) { foreach (var n in nodeOrTokens) { this.Add(n); } } internal void RemoveLast() { _count--; _nodes[_count] = null; } private void Grow(int size) { var tmp = new Syntax.InternalSyntax.CSharpSyntaxNode[size]; Array.Copy(_nodes, tmp, _nodes.Length); _nodes = tmp; } public SyntaxNodeOrTokenList ToList() { if (_count > 0) { switch (_count) { case 1: if (_nodes[0].IsToken) { return new SyntaxNodeOrTokenList( Syntax.InternalSyntax.SyntaxList.List(new[] { _nodes[0] }).CreateRed(), index: 0); } else { return new SyntaxNodeOrTokenList(_nodes[0].CreateRed(), index: 0); } case 2: return new SyntaxNodeOrTokenList( Syntax.InternalSyntax.SyntaxList.List(_nodes[0], _nodes[1]).CreateRed(), index: 0); case 3: return new SyntaxNodeOrTokenList( Syntax.InternalSyntax.SyntaxList.List(_nodes[0], _nodes[1], _nodes[2]).CreateRed(), index: 0); default: var tmp = new ArrayElement<Syntax.InternalSyntax.CSharpSyntaxNode>[_count]; for (int i = 0; i < _count; i++) { tmp[i].Value = _nodes[i]; } return new SyntaxNodeOrTokenList(Syntax.InternalSyntax.SyntaxList.List(tmp).CreateRed(), index: 0); } } else { return default(SyntaxNodeOrTokenList); } } } }
Low
[ 0.48122065727699503, 25.625, 27.625 ]
Polyhydroxy fatty acid amide surfactant is a desirable component of detergent compositions for its cleaning and mildness characteristics, but it can be difficult to handle in the plant and to formulate into a composition because of its high melting point. The melting point of a 50% N-cocacyl N-methyl glucamide mixture, for example, is about 142.degree. F. (61.1.degree. C.). It is difficult to pump concentrated polyhydroxy fatty acid amide unless it is diluted or heated to a temperature at or above its melting point. Polyhydroxy fatty acid amide is also often difficult to formulate into detergent compositions. For example, it may resolidify upon introduction to the cooler liquid ingredients. To get this component into solution often requires a great deal of stirring, heating above the melting point, diluting and/or use of solvents. It has been found that a pumpable polyhydroxy fatty acid amide composition can be formed by mixing certain soluble inorganic salts or C.sub.1-3 carboxylate salts into heated polyhydroxy fatty acid amide surfactant. Surprisingly, sodium and ammonium salts do not yield this benefit. The polyhydroxy fatty acid amide composition is thus easier to handle in the plant and to formulate into detergent compositions, particularly liquid detergent compositions. The use of N-alkyl glucamides in detergent compositions has been discussed. U.S. Pat. No. 2,965,576, issued Dec. 20, 1960 to E. R. Wilson, and G.B. Patent 809,060, published Feb. 18, 1959, relate to detergent compositions containing anionic surfactants and certain amide surfactants, which can include N-methyl glucamide, added as a low temperature suds enhancing agent. U.S. Pat. No. 2,703,798, issued Mar. 8, 1955 to A. M. Schwartz, relates to aqueous detergent compositions containing the condensation reaction product of N-alkyl glucamine and an aliphatic ester of a fatty acid. It is also known to prepare a sulfuric ester of acylated glucamine as disclosed in U.S. Pat. No. 2,717,894, issued Sep. 13, 1955, to A. M. Schwartz. European Patent 0 285 768, published Oct. 12, 1988 to H. Kelkenberg et al relates to the use of N-polyhydroxy alkyl fatty acid amides as thickening agents in aqueous detergent systems. Included are amides of the formula R.sub.1 C(O)N(X)R.sub.2 wherein R.sub.1 is a C.sub.1 -C.sub.17 (preferably C.sub.7 -C.sub.17) alkyl, R.sub.2 is hydrogen, a C.sub.1 -C.sub.18 (preferably C.sub.1 -C.sub.6) alkyl, or an alkylene oxide, and X is a polyhydroxy alkyl having four to seven carbon atoms, e.g., N-methyl, coconut fatty acid glucamide.
Mid
[ 0.6240409207161121, 30.5, 18.375 ]
Postnatal Schwann cell proliferation but not myelination is strictly and uniquely dependent on cyclin-dependent kinase 4 (cdk4). Peripheral myelin formation depends on axonal signals that tightly control proliferation and differentiation of the associated Schwann cells. Here we demonstrate that the molecular program controlling proliferation of Schwann cells switches at birth. We have analyzed the requirements for three members of the cyclin-dependent kinase (cdk) family in Schwann cells using cdk-deficient mice. Mice lacking cdk4 showed a drastic decrease in the proliferation rate of Schwann cells at postnatal days 2 and 5, but proliferation was unaffected at embryonic day 18. In contrast, ablation of cdk2 and cdk6 had no significant influence on postnatal Schwann cell proliferation. Taken together, these findings indicate that postnatal Schwann cell proliferation is uniquely controlled by cdk4. Despite the lack of the postnatal wave of Schwann cell proliferation, axons were normally myelinated in adult cdk4-deficient sciatic nerves. Following nerve injury, Schwann cells lacking cdk4 were unable to re-enter the cell cycle, while Schwann cells deficient in cdk2 or cdk6 displayed proliferation rates comparable to controls. We did not observe compensatory effects such as elevated cdk4 levels in uninjured or injured nerves of cdk2 or cdk6-deficient mice. Our data demonstrate that prenatal and postnatal Schwann cell proliferation are driven by distinct molecular cues, and that postnatal proliferation is not a prerequisite for the generation of Schwann cell numbers adequate for correct myelination.
Mid
[ 0.653937947494033, 34.25, 18.125 ]
Want to fight climate change? Build more nuclear power - markmassie http://csmonitor.com/Environment/Energy-Voices/2014/0828/Want-to-fight-climate-change-Build-more-nuclear-power ====== lispm Nuclear energy has still some popularity in the US. Especially among technical people. But technology is only one thing. What are the effects on a society long term? Here in Germany it is mostly dead. For us you are discussing positions of twenty years ago. The US has a very different energy situation compared to us: large country, nuclear weapons, lots of nuclear technology, extremely high energy use (more than twice than the average German), much lower population density, lots of energy sources, ... Here in Germany we've seen a lot of the negative effects in a country with higher density in the middle of Europe: * no plan or place for the waste * nuclear power plants all over the country * widespread corruption between politicians and industry * protests were suppressed with military-like police, escalated almost into civil war * lots of transport of nuclear materials through the country * extremely costly research paid by the tax payer * lots of promises of the nuclear industry just did not materialize: for example our pebble-bed reactor was closed silently, while earlier it was promised to solve a lot of technical problems * centralization of electricity production in few monopoly-like companies with zero competition The effects on an democratic society of nuclear technology is at least as bad as its technological problems. This was seen decades ago in the book 'Der Atomstaat' and the effects had been shown in Japan, where the Atomstaat was more advanced than here in Germany. We were able to stop it. Now we have to build-up renewable decentralized energy during the next decades. That's the common goal here in Germany. ~~~ abelsson The problem is that Germany, with its focus on wind and solar, is paying twice as much as for electricity compared to France - also a country with higher density in the middle of Europe - while also emitting more carbon dioxide per capita (9.6 vs 6.1 tons per capita). The difference is that France made the right decision 30 years ago when they transitioned from oil and coal to nuclear power for power generation. Solar and Wind are a much more expensive way of accomplishing the same thing. Der Energiewende is both expensive and inefficient. ~~~ Perseids > Der Energiewende Off topic: I'm always a bit mystified as to why people try to use German articles in English texts when they obviously don't know the gender of the word. "Wende" (turn) is female and you thus use "die" as an article. The third possible article is "das" and used for neutral nouns like "Auto". Given it is easy to look up [1], I guess you didn't know there are several? On topic: I won't state my opinion about the short term cost efficiency of nuclear power, because I don't have the references or raw data at hand to back it up (I wish a lot of others in this thread in the same situation wouldn't either). But IMHO the strongest argument against nuclear power is the uncertainty of long term waste disposal, given that we (currently) can't realistically predict storage conditions on a geological time frame. A month ago there was an article on HN about how we fail to come up with a way to communicate the danger of long term storage to future generations in a reliable way [2]. Even from an economic point of view the danger of a cost explosion of the nuclear waste disposal purely because of political struggles is daunting. In Germany we have a small disposal facility, the Asse, build to test long term storage in salt mines. Because of the usual combination of human error, incompetence and cover ups, waste was dumped there even while it was slowly becoming unstable [3]. Getting it all back out will cost somewhere around 5 billion euros. Guess who's paying for it. [1] [https://www.google.de/search?q=dictionary+energiewende](https://www.google.de/search?q=dictionary+energiewende) [2] [http://99percentinvisible.org/episode/ten-thousand- years/](http://99percentinvisible.org/episode/ten-thousand-years/) , corresponding hacker news thread: [https://news.ycombinator.com/item?id=8090759](https://news.ycombinator.com/item?id=8090759) [3] I'm oversimplifying. See [http://www.spiegel.de/international/germany/germany- weighs-o...](http://www.spiegel.de/international/germany/germany-weighs- options-for-handling-nuclear-waste-in-asse-mine-a-884523.html) for more background and [http://news.nationalgeographic.com/news/2010/07/photogalleri...](http://news.nationalgeographic.com/news/2010/07/photogalleries/100708-radioactive- nuclear-waste-science-salt-mine-dump-pictures-asse-ii-germany/) for pictures. ~~~ shangxiao There's also the economic cost of decommissioning a nuclear facility. The decommissioning happening at Sellafield is estimated at over £70bn [1] [1] [http://www.theguardian.com/environment/2013/dec/01/sellafiel...](http://www.theguardian.com/environment/2013/dec/01/sellafield- nuclear-clean-up-cost-rises) ------ marze The obstacles that nuclear power faces are formidable. One is that two other carbon-free options, solar and wind, are dropping in cost at a rapid rate at the same time that cost estimates for new nuclear plants are rising at a similarly rapid rate. Another is that there isn't anyone who thought their investment in the existing fleet of nuclear plants in the US was a good investment. They were uniformly bad investments, which is the primary reason for the 40 year gap with essentially no new plants ordered. Furthermore, even completely amortized plants are shutting down in the US. They can't even cover their operating costs, the few that shut down in the last year, let alone operating cost plus amortized construction cost. So even with the federal government guaranteeing 90% of the funds used for new plant construction (free money) it hasn't been easy to find investors willing to put up the remaining 10%. Nuclear power is awesome, especially if it is fusion power, and the reactor is 90M miles away, and anyone can use it for free just by put an inexpensive fusion power receiving panel outside with a clear view of the sky. One just needs to project what the wholesale price of PV power will be in 10 years to see the real reason it is difficult to find investors for new nuclear plants. Why spend $5B on a nuclear plant when you could spend it on five solar panel plants that each produce 1GW of solar panels, each year, creating substantially more jobs than the reactor would? Just asking. ~~~ hackuser My guess is that one reason for nuclear power's relatively high cost is that they must spend large amounts on safety while their primary competition, carbon-based power, gets a free ride from the rest of society on their safety costs, especially climate change. Nuclear pays for its own safety (AFAIK); who pays for climate change prevention, mitigation, and damage (e.g., hurricanes, seawalls, droughts, etc.)? The taxpayers. Make carbon pay to clean up the mess it creates, and nuclear will look much more attractive. ~~~ ljf While nuclear pays for site safety, it is the tax payer that covers the decommissioning and future waste storage / processing. As the costs for this is just so obscenely high that no private company would be involved if they had to pay for it from the meager profits they'd made from the electricity they'd produced. So once again it is the tax payer that covers the damage. ------ sounds Hopefully there are lots of people here who feel like I do, that building nuclear plants is a great idea -- just, what kind of nuclear plant should we build? 1\. You want to use government funding to build nuclear plants. My response: please look at previous government-funded nuclear operations of all types. It appears this doesn't work, from a failure to manage the environmental impact to a failure to keep the project cost-effective. This includes state- controlled energy companies, since nuclear power is a very tightly controlled business. 2\. You want to use an unproven technology. My response: there are several well-proven nuclear options that are being developed by very promising companies. Please compare your technology with them. Some of the promising technologies are government-funded, however, which seems like a waste of a good idea. 3\. You want to keep existing plants alive. This is nuanced. Some existing nuclear plants are necessary, but hopefully we can shut down the aging and dangerous and high-level-waste-producing ones in favor of cleaner alternatives. Doing so shouldn't necessarily cost a lot of money. 4\. You want to reprocess existing nuclear waste and burn it to low-grade waste while generating clean electricity. My response: if you can show that you've cleared the regulatory hurdles (a lot of waste is held by governments) and if you're reasonably transparent about your progress, I'd like to give you a donation. ~~~ vmp I'm personally excited about Thorium reactors, suprised that nobody else mentioned them yet. I could cite the "pamphlet propaganda" but I feel that I lack knowledge to lead the thorium discussion, so I'll let somebody else do that. :) ------ brandonmenc Why is France rarely mentioned in these discussions? Most of their energy is nuclear. They've also standardized on plant design, which must have huge benefits - fungible employees and more MTBF being big ones. All of our (the United States) plants afaik are bespoke designs, and can't be cheaper than pumping out cookie cutters. What are they doing right, and how do we copy it? ~~~ cygx Keep in mind that not everything is golden in the promised land of nuclear energy production that is France: If it gets too hot to use river water for cooling, they have to shut down their nuclear reactors and import electricity from their european neighbours. For that matter, they also have problems when it gets too cold: The French generally use electricity for heating and they cannot meet demand on their own. ~~~ h1fra That sentences is only half true. Yes they river water for cooling, but water is not polluted as it's not in direct contact. French use mostly electricity for heating, but we are importing only for some occasion when temperature are very cold which append maybe 10-20 times a year. The rest of the year we are heavily exporting to england & italy. You can see all this in realtime here [http://www.rte- france.com/fr/developpement-durable/eco2mix/p...](http://www.rte- france.com/fr/developpement-durable/eco2mix/production-d-electricite-par- filiere) And number are self explanatory, 1/4 is exported at the time I write this. ~~~ cygx > Yes they river water for cooling, but water is not polluted as it's not in > direct contact. Which I never claimed. I don't know why you mentioned that. > we are importing only for some occasion when temperature are very cold which > append maybe 10-20 times a year There was a spike in 2009, where France was a net importer for 57 days - basically, French nuclear plants could not satisfy demand for 2 months. I stand by my points. ------ discardorama The people of the areas surrounding Fukushima and Chernobyl may beg to differ. I'm not anti-nuclear, but the cost of a failure at a nuclear power plant is so high, that the engineering must be to similarly high standards. Unfortunately, as we have seen in the cases of 3-Mile Island, Chernobyl and Fukishima, this is not the case. We need to really figure that part out before opting for this route. And then there's the problem of nuclear waste disposal. ~~~ jlebar What people don't think about, because it's not an acute disaster like a nuclear accident, is that coal power plants kill a /lot/ of people. According to this article, coal power in China killed 300,000 people last year, which itself is way more than were displaced (not killed) by Fukushima. Even US coal power, which is much safer than Chinese coal power, is 160x more deadly per joule than nuclear, and it appears that's not counting climate change effects. I don't mean to suggest that nuclear power is without risk -- of course it's risky business. But we need to compare the risk to the alternatives. [http://www.forbes.com/sites/jamesconca/2012/06/10/energys- de...](http://www.forbes.com/sites/jamesconca/2012/06/10/energys-deathprint-a- price-always-paid/) ~~~ Lazare Germany responded to Fukushima by shutting down their nuclear power plants, and using more coal. In fact, they've embarked on a program of building new coal plants across Germany, which is madness by basically any metric you care to use. Which has an interesting outcome: The irrational response to Fukushima (in particular, the shift from nuclear to coal generation) will undoubtedly kill several orders of magnitude more people than the actual Fukushima disaster did. Sometimes it's hard not to get cynical and bitter. ~~~ lispm Practically every sentence is wrong. > Germany responded to Fukushima by shutting down their nuclear power plants Germany did not do that. Some of the oldest were shutdown. Basically Germany went back to the original plan from 2000, which was made together with the industry. The last nuclear reactor will be shut down around 2022. > In fact, they've embarked on a program of building new coal plants across > Germany, which is madness by basically any metric you care to use. Germany did not do that. Various coal power plants were planned long ago. Also many old were and are taken offline. That Germany is using coal is not actually madness. Germany has basically only one fossil fuel in larger quantities in the country: coal. > Which has an interesting outcome: The irrational response to Fukushima (in > particular, the shift from nuclear to coal generation) will undoubtedly kill > several orders of magnitude more people than the actual Fukushima disaster > did. Germany is on a long missions towards renewable energy. Nuclear energy is not a part of the plan. Nuclear will be replaced early, since it is a very costly energy which needs decades to be replaced. So Germany wanted to stop investing into it very early. There is no shift to coal. This year for example coal use is going down. What you think is a shift to coal, is just a temporary effect in a long-term plan. > Sometimes it's hard not to get cynical and bitter. If you would be better informed about German plans, you would not need to be cynical and bitter. ~~~ Lazare Item 1: Germany shut down 41% of it's nuclear plants following Fukushima, and greatly accelerated plans to close the remaining ones. Item 2: Germany is building a raft of new coal plants; something like 30 are in various stages of planning and building. According to Die Welt, power generation from brown coal (the dirtiest form) is climbing, at the highest level since 1990, and projected to increase further. Overall fossil fuel use for power generation is staying constant. If it wasn't for the decline of nuclear power in Germany, fossil fuel use could have declined. And according to Germany's energy regulator, coal fired plants will be essential to replace the closing nuclear plants. > There is no shift to coal. Yes, there is. As you go on to admit, even if you label it a "temporary effect in a long-term plan". (But given that the coal plants now being built are projected to be operating for _40 years_ , it's not what I'd call temporary.) And that shift will result in a net increase in deaths. You seem very defensive, but you haven't actually disputed any of the underlying facts. ~~~ lispm > Item 1: Germany shut down 41% of it's nuclear plants following Fukushima, > and greatly accelerated plans to close the remaining ones. Those were to close anyway in the very near future. Germany did not greatly accelerate the plan. > Item 2: Germany is building a raft of new coal plants; something like 30 are > in various stages of planning and building. It does not. 'Planning' is not building. Germany currently discusses the closing of 50 fossil fuel plants. > According to Die Welt, power generation from brown coal (the dirtiest form) > is climbing, at the highest level since 1990, and projected to increase > further. It is not. This year coal use is going down. > Overall fossil fuel use for power generation is staying constant. Only for a few years. > If it wasn't for the decline of nuclear power in Germany, fossil fuel use > could have declined. And according to Germany's energy regulator, coal fired > plants will be essential to replace the closing nuclear plants. Fossil fuel plants will be greatly reduced during the next decades. Already the industry is closing them faster than we want: [http://www.stern.de/wirtschaft/news/rueckzug-aus-der- kohle-r...](http://www.stern.de/wirtschaft/news/rueckzug-aus-der-kohle-rwe- schliesst-kraftwerke-in-nordrhein-westfalen-2130899.html) [http://www.tagesspiegel.de/wirtschaft/rwe-strom- energieriese...](http://www.tagesspiegel.de/wirtschaft/rwe-strom-energieriese- droht-schliessung-von-kraftwerken-an/8641004.html) [http://www.welt.de/wirtschaft/article119000950/RWE-und-E- on-...](http://www.welt.de/wirtschaft/article119000950/RWE-und-E-on-schalten- reihenweise-Kraftwerke-ab.html) > Yes, there is. As you go on to admit, even if you label it a "temporary > effect in a long-term plan". (But given that the coal plants now being built > are projected to be operating for 40 years, it's not what I'd call > temporary.) We have a lot of old ones to close. > And that shift will result in a net increase in deaths. You seem very > defensive, but you haven't actually disputed any of the underlying facts. Your so-called 'facts' are mostly wrong. I told you for example that coal use is going down this year. That's a fact. ~~~ ars > Only for a few years. You are including the coal used to build solar cells right? No, of course you aren't. Germany is just shipping their coal emissions to China, so that on paper they look good, but are actually making things worse. Greenwashing at its finest: Country wide and government supported. ~~~ lispm > You are including the coal used to build solar cells right? You know that renewable energy is more than solar? > Germany is just shipping their coal emissions to China We were not shipping emissions to China. Germany has build a lot of solar cell plants. Many got financial problems when China entered the market. > Greenwashing at its finest: Country wide and government supported. Personally I like our greenwashing more than your greenwashing. ------ lolgas Important to note that nuclear accounts for only 90 deaths in history, while providing 17% of the world's power. source: [http://www.forbes.com/sites/jamesconca/2012/06/10/energys- de...](http://www.forbes.com/sites/jamesconca/2012/06/10/energys-deathprint-a- price-always-paid/) ------ cygx Note that we haven't yet reached the end of the line as far as improvements to the manufacturing process of solar cells is conscerned, in particular [http://www.nature.com/nature/journal/vaop/ncurrent/abs/natur...](http://www.nature.com/nature/journal/vaop/ncurrent/abs/nature13435.html) . Cheaper solar energy might not be far off. ------ angry_octet The use of any sort of nuclear power with a well though out multi millenia waste storage system is irresponsible. Ideally this would be accomanied by a secret cult of priests of the atom, charged with defending the sacred temple sites fovever. (Religion being the one institution proven able to survive millenia.) ------ bayesianhorse As long as the nuclear waste problem isn't solved, nuclear power can't be the answer. Also the cost is very high, especially if you factor in risk/insurance and decommissioning. ------ ihsanyounes90 This is the easy way to get energia. Ok, We have seen that in Canada they use the dams, but we know that this harms the environment (for salmon). Here we really need to do research for alternative energy, do not think only about money and earnings, but think about the future. Otherwise we risk in 2050 to find the first deserts created by humans because of global warming.
Mid
[ 0.5958549222797921, 28.75, 19.5 ]
At Athenix Body Sculpting Institute, we specialize in body sculpting and contouring to give you the body you’ve always dreamed of without the downtime and difficult recovery of traditional liposuction and plastic surgery. We use the latest body sculpting technologies and techniques to give you the body you desire. Our procedures are performed by plastic and cosmetic surgeons who are artists in sculpting the body, so you get the best results in the safest environment. That’s the Athenix Body Sculpting Institute advantage. Learn more about Micro-Body Contouring › CoolSculpting is unique in that it is the only method of fat loss that utilizes freezing technology. Other methods involve the use of heat, and include ultrasound energy, lasers, and radiofrequency. CoolSculpting is more effective in removing fat and does so with more comfort than these other modalities. CoolSculpting is, in fact, the world’s leading technology for the noninvasive reduction of localized collections of excess fat. Now, you can finally achieve your weight loss goals without the risk or downtime of major bariatric surgery. The new, FDA-approved device, Orbera™, is a small gastric balloon that is gently placed into the stomach so you feel fuller longer and can practice portion control with greater success. Orbera™ is a non-surgical solution to help jump start your weight loss and maintain a healthier lifestyle. Nevertheless, this intrigued Friend #3, Friend #5 and myself into going later that day. On entering the gym, I saw that the previous description was a pessimistic one. Although the space has a functional appearance, there is an impressive array of exercise machines. As well as the usual suspects of running machines, bikes and rowing machines for cardiovascular training; there are also some great strengthening machines, both individual and multi-station. A circuit training area, a space to use medicine balls and a free weights area complete the layout. Body sculpting is used to tone down your body features and during the process you lose some weight as well. However, it is not an alternative to exercising and dieting. Massive amount of weight cannot be lost due to a body sculpting procedure. In fact, every patient who comes in for body sculpting procedure has to consult an expert who determines if the procedure is a perfect fit for the body type, and weight of the person. BMI (Body Mass Index) is the standardized measurement that is used to determine if the patient qualifies for the treatment or not. The SlimCo System is not intended for use in the diagnosis of a disease or any other condition or in the cure, mitigation, treatment, or prevention of disease, and is not intended to affect the structure or function of the body. These products are cosmetic in nature and do not claim to impart any health benefits. The statements on this website have not been evaluated by the Food and Drug administration. I previously started in the Newtownabbey branch but it had just opened and was very busy. I much prefer the St.Annes Square branch, big open gym, lots of machines and trainers floating about if you need any help. The classes are a bit daunting, not really a great confidence booster for a first timer in the class, but if you are happy to just go in and get on with it. Don't expect much help from the trainer in there they're just barking out orders. There is a large volume of different types so plenty to choose from. I recommend downloading the app and booking in advance as the popular classes tend to book up. Cheap pay as you go contract, and clean facilities, the only down side it the posers that go in full makeup and pretend to workout, taking up the machines! But body contouring doesn't come cheap. The average price of a full-body lift is around $30,000. Arm surgery runs in the range of $8,000, while inner thighs cost about $10,000 a pair. A breast lift and upper back surgery will set you back about $15,000, and a neck and face lift would add another $15,000 to the bill. (As you probably already guessed, insurance rarely covers any of it.) CoolSculpting works by taking advantage of the fact that fat cells are more sensitive to cold than the other cells around them. This basic scientific fact was first discovered in 1970 by doctors observing children who sucked on popsicles for hours, and ended up having first soreness, and later dimples, caused by loss of fat cells! Fast forward about 20 years, and Harvard scientists revisited this fact, and realized that they could turn this science into a system for aesthetic sculpting of fatty bulges. The key was to find the ‘sweet spot’ of time and temperature, which would kill some fat cells but not damage surrounding structures such as skin. They called the public company that makes the systems Zeltiq. The proof of the success of this concept and treatment: Zeltiq was bought out by Allergan in 2016 for whopping 2.5 billion! This was the largest sale of a single medical device company in history. If you’ve suddenly found that your fitness regime has taken a turn for the worst now that summer has been and gone and the weather’s turned nasty, then it’s no doubt you’re starting to feel a little tapped of energy. But don’t despair; there is a ton of ways to stay fit without exposing yourself to all that nasty weather! And with great deals and discounts available from gyms like LA Fitness, you’ll be back to your old self in no time. Besides being a great surgeon, Dr Nazarian carries a line for PREGNANT women called Spa Momma which is made-in-the-USA with no lead, phthalates, formaldehyde, propylene glycol, and no pregnancy-contraindicated aromatherapy oils!!!!!! I am obsessed with the body oil and the body scrub! I was having some major itching issues and I tried everything but nothing really helped. Then I tried the itchies body oil and it was the first relief I had had in months and I have no stretch marks!!!!!!!! Dr Nazarian is so up to date and science based and is willing to take time and help you out no matter what you issue is!!! I love her professionalism and recommend 110%! ASAPS formed an ad hoc committee to further investigate the pros and cons of mesotherapy, he says. "We don't know whether it works or not because it is used by a lot of people who inject all kinds of chemicals into the skin," Fodor explains. "Our committee looked at the literature and we found no uniformity to what is being used, how much is being injected, and where it is being injected, so we could not draw any conclusions," he says. That's why ASAPS is conducting a clinical trial at five centers to definitively answer questions about mesotherapy. "We will do some studies with an exact and rigid protocol so we can compare apples to apples, not apples to oranges," he says. Allergan's websites may ask your browser to store cookies, a small piece of data, on your computer or mobile device. A cookie can be used to enable a site to remember information that you previously input. It also helps deliver content-specific information to you and tracks how sections of websites are used. We may also use cookies to understand your preferences and tailor your access to your preferences. Your consent is required for Allergan to remember your user details and preferences over time. If you consent, check "I accept." You can withdraw your consent by changing your browser settings to erase cookies from your computer's hard drive, bock all cookies, or receive a warning before a cookie is stored. Please check your Internet browser's instructions to learn more about these functions. Your consent is voluntary; however, if you do not consent to cookies being installed on your browser, Allergan may not be able to provide you full access to or all the functionality of our websites. Celebrities like Khloe Kardashian and Jennifer Anniston have used body sculpting (also called CoolSculpting and Body Contouring) to target trouble areas like love handles and stubborn thighs and kill fat cells once and for all. So what is body sculpting? How much does it cost? And is it for you? Here’s a quick guide to the latest fat-blasting craze. No AXA PPP Group company will be liable for any loss, damage or personal injury whatsoever suffered or sustained in connection with the PureGym membership and/or use of the PureGym club(s) except for any liability which cannot be excluded by law (including fraud or for the death or personal injury caused by that AXA PPP Group company’s negligence). Disclaimer: The information throughout this cosmetic dermatology website is not intended to be taken as medical advice. The information provided by Dr. Rebecca Fitzgerald is intended to provide general information regarding cosmetic treatments including acne treatment, sun spot treatment, acne scar removal, hyperpigmentation, rosacea treatment, vein treatment and more for residents of Los Angeles, Beverly Hills, Larchmont and throughout the state of California. If you are interested in finding out more, please contact us today for a personal consultation. As we all know, coupon information changes very frequently. Some coupon sites may fail to update their discounts and deals in time. Therefore, there are many invalid coupons floating around the web. At DailySelect, we pursue the authenticity of coupons and deals. Our dedicated team is making unremitting efforts to provide verified coupons for our users everyday. Feel free to use Puregym.com promo codes before checkout. With Puregym.com Promo Codes, Enjoy Great Savings. Maintaining a beautiful figure or desirable body shape takes a lot of hard work. It requires diligent diet and exercise regimens that will keep you healthy and fit. Unfortunately, these efforts can’t always overcome our genetic predispositions for where fat gets stored. That’s why it’s common to find that in spite of all your efforts, you may still possess a few stubborn areas of fat that simply won’t go away. If this describes your situation, you may benefit from nonsurgical body sculpting procedures that will put the finishing touches on your workout routine, helping you achieve the toned shape you desire. Body sculpting allows you to safely achieve a well shaped, toned down body in multiple sessions. The treatment sessions are relatively shorter when compared to traditional surgeries. It also has minimal downtime and little to no discomfort. The procedure is not painful at all and can be carried out on a routine day where you can leave the treatment center and continue on with your normal routine. I've been going to puregym Leeds since it opened and have not experienced what other reviewers have. I've not had anything stolen but saying that I do lock up my belongings..I think it's unfortunate that others may have been stolen from. In regards to the staff, they do get on with their business and whenever I've asked for help (and I've asked different members) all have taken time out even during busy periods, to help me out. Sometimes you just need to speak up. In regards to the mould and filth in the changing rooms, I've seen none of this. The gym is still relatively new with cleaners working most of the day. I tend to go in the mornings when it's quiet and the one time I've been on an evening it's been hectic and yes, the changing rooms were messy but that's because other people using the gym left their own rubbish lying about, rather than bin it. For the price of the membership I really can't complain!
Mid
[ 0.5446224256292901, 29.75, 24.875 ]
Introduction ============ Chloronitrobenzenes (CNBs) are industrial chemicals that are used in the production of pesticides, fungicides, dyes and polymers ([@b15]). These compounds are toxic, and there are reports that the 2‐ and 4‐isomers of CNB are both mutagenic and carcinogenic ([@b42]; [@b29; @b30]). CNBs have been detected in industrial waste and in environmental water samples ([@b15]; [@b4]), and their presence poses health risks to humans and animals. The electron‐withdrawing nature of the nitro‐ and chloro‐groups makes these compounds resistant to microbial degradation, and consequently, relatively few bacterial strains have been reported to be capable of growth on CNBs. *Pseudomonas acidovorans* CA50 ([@b16]; [@b23]) converts all three CNB isomers to chloroanilines by direct reduction of the nitro‐group ([Fig. 1](#f1){ref-type="fig"}). The strain is able to grow on chloroanilines, using an aniline dioxygenase to oxidize the chloroanilines to chlorocatechols ([Fig. 1](#f1){ref-type="fig"}), which in turn are converted to TCA cycle intermediates by a modified *ortho* pathway. However, acetate and nitrate were required as co‐substrates for the initial reduction of CNBs, and therefore strain CA50 cannot use CNBs as sole carbon and energy sources. In another study, 3‐ and 4‐chloronitrobenzene (3CNB; 4CNB) degradation was achieved by sequential action of strains *P. putida* HS12 and *Rhodococcus* sp. strain HS51 ([@b39]). In this system, the reductive pathway for nitrobenzene degradation in HS12 converted 3CNB and 4CNB into 2‐amino‐4‐chlorophenol and 2‐amino‐5‐chlorophenol, respectively ([Fig. 1](#f1){ref-type="fig"}). These products were then converted to the corresponding chloro‐hydroxyacetanilides. *Rhodococcus* sp. strain HS51 was isolated for its ability to grow on chloro‐hydroxyacetanilides, which are further metabolized to TCA cycle intermediates using a modified *ortho* cleavage pathway. Together, these strains were able to completely degrade 3‐ and 4CNB ([Fig. 1](#f1){ref-type="fig"}); however, strain HS12 required the presence of the co‐substrate succinate for the initial reduction of CNBs, and nitrobenzene and chlorobenzene were necessary to induce the expression of the upper and lower pathways in strains HS12 and HS51, respectively. ![Chloronitrobenzene degradation pathways previously characterized from bacterial isolates and co‐cultures. Asterisks (\*) indicate steps that require the addition of a co‐substrate or co‐inducer in order to facilitate metabolite transformation.](mbt0002-0241-f1){#f1} *Pseudomonas stutzeri* ZWLR2‐1 was isolated for its ability to grow on 2‐chloronitrobenzene (2CNB), and it was reported to release chloride and nitrite from this substrate ([@b26]). However, further characterization of its degradation pathway has not been reported. *Comamonas* sp. strain CNB‐1 ([@b47]), *Pseudomonas putida* ZWL73 ([@b48]) and *Comamonas* sp. strain LW1 ([@b21]) each contain a reductive pathway for 4CNB degradation ([Fig. 1](#f1){ref-type="fig"}). Metabolism is initiated by a nitroreductase that converts 4CNB into 1‐chloro‐4‐hydroxyl‐aminobenzene, which is further transformed into 2‐amino‐5‐chlorophenol by a hydroxylaminobenzene mutase or via Bamberger rearrangement. Ring‐cleavage by 2‐aminophenol 1,6‐dioxygenase produces 2‐amino‐5‐chloromuconic acid, which is converted to TCA cycle intermediates after additional enzymatic steps ([@b47]). In this study we examined the ability of wild‐type and mutant nitroarene dioxygenases to oxidize CNBs to chlorocatechols, which are easily degraded by strains carrying the modified *ortho* pathway. Nitroarene dioxygenases act in the first step of nitrobenzene and (di)nitrotoluene degradation pathways, catalysing the insertion of both atoms of oxygen at the nitro‐substituted and adjacent carbon atoms of the aromatic ring to produce catechols and release nitrite. Nitroarene dioxygenases are capable of removing nitro‐groups from nitrobenzene, nitrotoluenes and aminonitrotoluenes ([@b46]; [@b36]; [@b18]; [@b25]). They are unique in their ability to overcome the electron‐withdrawing nature of the nitro‐group, which provides high energetic stability of nitroaromatic compounds and environmental recalcitrance, and we hypothesized that at least some of the isomers of CNB would be similarly oxidized by nitroarene dioxygenases. We characterized the activity of 2‐nitrotoluene 2,3‐dioxygenase (2NTDO) from *Acidovorax* sp. strain JS42 ([@b36]), nitrobenzene 1,2‐dioxygenase (NBDO) from *Comamonas* sp. strain JS765 ([@b25]), as well as active‐site mutants of NBDO ([@b20]) with the substrates 2CNB, 3CNB and 4CNB. Studies on the catalytic and biochemical properties of these enzymes ([@b36; @b38]; [@b25]; [@b24]), as well as an available crystal structure ([@b6]) have allowed the identification of specific amino acids that control substrate specificity. The availability of this information makes these enzymes good candidates for defining the activity of nitroarene dioxygenases with CNBs, a topic that was unexplored prior to this study. Genes encoding the enzymes with the best activity were introduced into *Ralstonia* sp. JS705, a robust chlorobenzene‐degrading strain isolated from contaminated groundwater. The chlorobenzene degradation pathway in this strain has been well characterized by physiological and genetic analyses ([@b50]; [@b31]). Chlorobenzene is converted to 3‐chlorocatechol in *Ralstonia* sp. JS705, and 3‐chlorocatechol is degraded to TCA cycle intermediates using the modified *ortho* cleavage pathway ([@b50]). Introduction of NBDO and one of its variants resulted in new strains that grow on and completely degrade all three isomers of CNBs. Results ======= Regiospecificity of CNB oxidation --------------------------------- We tested the activity of 2NTDO, NBDO and active‐site mutants of NBDO with 2CNB, 3CNB and 4CNB in *Escherichia coli* strains expressing the cloned dioxygenase genes. These substrates allowed us to characterize the behaviour of these dioxygenases towards molecules with two different electronegative functional groups. With each of these substrates, dioxygenation can occur at: (i) the nitro‐substituted carbon, (ii) the chloro‐substituted carbon or (iii) at positions distal to the nitro‐ or chloro‐substituted carbons. A variety of different substituted catechols or *cis*‐dihydrodiols could be produced depending on the regiospecificity of attack ([Fig. 2](#f2){ref-type="fig"}). ![Possible reactions catalysed by nitroarene dioxygenases with CNBs. Solid black and white arrows indicate reactions detected by some or all of the nitroarene dioxygenases tested in this study. All of the reactions shown require NADH as a cofactor. Black arrows indicate reactions whose products are substrates for further metabolism by the modified *ortho*‐ring cleavage pathway (shown in [Fig. 5](#f5){ref-type="fig"}). No evidence for the reactions indicated by dotted lines was obtained. 3ClCAT, 3‐chlorocatechol; 4ClCAT, 4‐chlorocatechol; 3NCAT, 3‐nitrocatechol; 4NCAT, 4‐nitrocatechol.](mbt0002-0241-f2){#f2} 2CNB, 3CNB and 4CNB were substrates for 2NTDO, NBDO and the NBDO variants. The relative product ratios from biotransformation reactions of these dioxygenases with the three CNB isomers are presented in [Table 1](#t1){ref-type="table"}. The majority of the tested dioxygenases favoured attack at the nitro‐substituted region of 2CNB to form 3‐chlorocatechol as the sole or major product. Both 2NTDO and NBDO had slight activity (≤ 3%) towards the chloro‐substituted region of 2CNB and formed small amounts of 3‐nitrocatechol. However, mutations at amino acid positions 258 and 350 of the catalytic subunit of NBDO altered the position of oxidation and increased the relative amount of 3‐nitrocatechol produced. The I350F variant showed the greatest change, reversing the regiospecificity of NBDO, to favour dechlorination rather than nitro‐group removal. Substitution of the phenylalanine at position 293 with histidine, isoleucine or glutamine increased the specificity of NBDO by eliminating 3‐nitrocatechol formation from 2CNB. ###### Relative ratios of products formed from CNBs by wild‐type and mutant nitroarene dioxygenases expressed in *E. coli.* Substrate Dioxygenase Catechols produced (% of total products) ----------- ------------- ------------------------------------------ ---------- ---------- --------- 2CNB NBDO 97 ± 1 3 ± 1 n/a n/a N258V 88 ± 1 12 ± 1 n/a n/a F293H 100 -- n/a n/a F293I 100 -- n/a n/a F293Q 100 -- n/a n/a I350F 22 ± 3 78 ± 3 n/a n/a I350T 85 ± 4 15 ± 4 n/a n/a 2NTDO 98 ± 1 2 ± 1 n/a n/a 3CNB NBDO -- -- 100 -- N258V 1 ± 1 -- 83 ± 1 16 ± 1 F293H 100 -- -- -- F293I -- -- 100 -- F293Q -- -- 100 -- I350F -- -- 100 -- I350T -- -- 100 -- 2NTDO -- -- 100 -- 4CNB NBDO n/a n/a 99 ± 0.4 1 ± 0.4 N258V n/a n/a 79 ± 4 21 ± 4 F293H n/a n/a 100 -- F293I n/a n/a 100 -- F293Q n/a n/a 100 -- I350F n/a n/a 66 ± 5 34 ± 5 I350T n/a n/a 84 ± 0.3 16 ± 0.3 2NTDO n/a n/a 100 -- 3ClCAT, 3‐chlorocatechol; 4ClCAT, 4‐chlorocatechol; 3NCAT, 3‐nitrocatechol; 4NCAT, 4‐nitrocatechol; *n* = 3; n/a, not applicable, i.e. not a possible product from this substrate; --, none detected. All of the tested dioxygenases except the N258V and F293H variants of NBDO preferentially attacked the nitro‐substituted positions of 3CNB, yielding 4‐chlorcatechol as the sole oxidation product. The substitution of asparagine 258 by valine changed the regiospecificity of NBDO with 3CNB, resulting in dechlorination and the formation of 4‐nitrocatechol (16%). Although 4‐chlorocatechol remained the major product (83%), the N258V mutant also formed a minor amount of 3‐chlorocatechol (1%). The F293H variant of NBDO retained the ability to attack the nitro‐substituted carbon but had the opposite regiospecificity, forming 3‐chlorocatechol instead of 4‐chlorocatechol. 3‐Nitrocatechol was not detected in any of the reactions with 3CNB. NBDO preferentially oxidized the nitro‐substituted carbon of 4CNB to yield 4‐chlorocatechol as the major product, but this enzyme also had minor activity at the chloro‐substituted carbon, forming 4‐nitrocatechol (1%). The N258V, I350F and I350T mutants of NBDO produced 4‐chlorocatechol as the major product, but were also able to dechlorinate 4CNB to form 4‐nitrocatechol (16--34%). In contrast, 2NTDO and the F293H, F293I and F293Q mutants of NBDO had increased specificity, oxidizing at the nitro‐substituted carbon and producing only 4‐chlorocatechol. In general, most of the tested dioxygenases preferentially oxidized at the nitro‐substituted positions rather than the chloro‐substituted positions of the aromatic ring. No catechol or *cis*‐dihydrodiols were detected in any biotransformation reactions based on the analysis of extracts by gas chromatography‐mass spectrometry (GC‐MS). NBDO and 2NTDO exhibited nearly identical regiospecificities, forming 3‐chlorocatechol and 4‐chlorocatechol as the major or exclusive products from the three CNB isomers. Amino acid substitutions at position 293 in NBDO directed enzyme activity specifically to the nitro‐substituted regions of the substrates, eliminating dechlorination reactions and nitrocatechol formation. Mutations at 258 and 350 decreased the regiospecificity of attack by NBDO, resulting in increased production of nitrocatechols. Oxidation activity ------------------ The activity of the nitroarene dioxygenases towards the different CNBs and their ability to form chlorocatechols was determined as a function of the amount of nitrite released at the end of 6 h biotransformation reactions ([Fig. 3](#f3){ref-type="fig"}). NBDO had comparable activities with 2CNB and 4CNB, but had the highest activity with 3CNB. In contrast, 2NTDO produced approximately twice as much product from 2CNB compared with NBDO, but its average activities with 3CNB and 4CNB were only 4% and \< 1% of the NBDO activities, respectively. ![Nitrite released from CNBs by *E. coli* strains expressing wild‐type and mutant nitroarene dioxygenases. 2CNB, white bars; 3CNB, grey bars; 4CNB, black bars. *N* = 3; error bars indicate standard deviations.](mbt0002-0241-f3){#f3} All of the mutations in NBDO resulted in decreased activity towards 2CNB and 4CNB. With 2CNB as the substrate, the F293Q variant was 45% as active as wild‐type NBDO, while the other variants retained only 1--7% of the original activity ([Fig. 3](#f3){ref-type="fig"}). The mutations at 293 and 350 reduced activity with 3CNB to ≤ 8% of NBDO, but the N258V variant was still 65% as active. The F293I mutation had no effect on the activity with 3CNB; in contrast, the F293Q enzyme showed a twofold improvement in nitro‐group removal with this substrate. All other mutations resulted in a 70--98% reduction in chlorocatechol production from 3CNB. Construction and activity of CNB‐degrading strains -------------------------------------------------- The results of the biotransformation experiments described above suggested that some of the tested dioxygenase enzymes might be useful biocatalysts in the production of substituted catechols or for improving biodegradation processes. We hypothesized that the successful expression of the appropriate nitroarene dioxygenases in strains containing a chlorocatechol degradation pathway would allow CNBs to be degraded and utilized as a source of carbon and energy for growth. To test the application of these enzymes, broad‐host‐range expression plasmids carrying selected dioxygenase genes were constructed and introduced into the chlorobenzene‐degrading strain *Ralstonia* sp. JS705. NBDO and the NBDO‐F293Q variant were chosen based on their high specificity for nitro‐group removal and chlorocatechol formation. To determine if the nitroarene dioxygenases were functional in the JS705 strains, we measured their activity with CNBs. Introduction of the dioxygenase‐containing expression plasmids allowed JS705 to remove nitrite from CNBs and form chlorocatechols, while cultures with the control plasmid (pBBR1MCS2) had no activity. JS705 expressing NBDO had comparable activities towards 2CNB (3.4 ± 1.3 nmol nitrite min^−1^ mg^−1^ protein) and 4CNB (3.3 ± 0.6 nmol nitrite min^−1^ mg^−1^ protein), and the highest activity with 3CNB (22.7 ± 1.3 nmol nitrite min^−1^ mg^−1^ protein). JS705 expressing NBDO‐F293Q had higher specific activity with 3CNB (29.3 ± 3.4 nmol nitrite min^−1^ mg^−1^ protein), while activity in this strain was reduced 74% with 2CNB and 88% with 3CNB compared with NBDO. Growth on CNBs -------------- *Ralstonia* sp. JS705 strains carrying plasmids expressing wild‐type NBDO or the NBDO‐F293Q variant were able to grow on all three CNB isomers as sole carbon sources ([Table 2](#t2){ref-type="table"}). Neutral resin (XAD‐7) was included to mitigate the toxicity of CNBs. 3CNB was the best substrate for both strains ([Table 2](#t2){ref-type="table"}, [Fig. 4A](#f4){ref-type="fig"}), and nitrite release correlated with growth ([Fig. 4B](#f4){ref-type="fig"}). JS705(pKSJ114) carrying NBDO‐F293Q grew 23% faster on 3CNB than the strain carrying wild‐type NBDO ([Table 2](#t2){ref-type="table"}), which is consistent with the activities of the two enzymes with 3CNB. In comparison, growth on 4‐chlorocatechol was inhibited even in the presence of XAD‐7, with cultures reaching a maximum cell density of 0.084 ± 0.004 with a 48 h doubling time. This is not a surprising result, as it is well known that catechols are cytotoxic even at low concentrations ([@b12]; [@b32]). The two strains were also capable of growth on all three CNBs as sole nitrogen sources in liquid cultures with succinate as the carbon source (data not shown). ###### Doubling times and cell yields of engineered *Ralstonia* sp. JS705 strains. Substrate Strain Dioxygenase present Doubling time[a](#t2n1){ref-type="table-fn"} (h) Maximum cell yield[a](#t2n1){ref-type="table-fn"} (OD~660~) ----------------- ---------------- --------------------- -------------------------------------------------- ------------------------------------------------------------- 2CNB JS705 (pKSJ99) NBDO 58.3 ± 3.5 0.18 ± 0.01 JS705 (pKSJ114) F293Q 57.8 ± 2.7 0.31 ± 0.02 3CNB JS705 (pKSJ99) NBDO 26.0 ± 0.3 0.40 ± 0.02 JS705 (pKSJ114) F293Q 20.0 ± 1.3 0.40 ± 0.02 4CNB JS705 (pKSJ99) NBDO 42.4 ± 3.7 0.27 ± 0.01 JS705 (pKSJ114) F293Q 37.3 ± 0.3 0.24 ± 0.01 *n* = 2; ± indicate standard deviations. The control strain JS705 (pBBR1MCS2) did not grow on any of the CNBs. ![Growth and nitrite production from 3CNB by *Ralstonia* sp. JS705 derivatives.
A. Growth on 3CNB.
B. Nitrite released in culture supernatants. JS705(pBBR1MCS2), vector control, indicated by triangles; JS705(pKSJ99), expressing wild‐type NBDO, indicated by squares; and JS705(pKSJ114), expressing NBDO‐F293Q, indicated by circles. *N* = 2; error bars indicate standard deviations.](mbt0002-0241-f4){#f4} Discussion ========== Although CNBs provide several possible sites for aromatic ring oxidation ([Fig. 2](#f2){ref-type="fig"}), 2NTDO and NBDO were highly specific towards the nitro‐substituted positions and produced chlorocatechols as the major products ([Table 1](#t1){ref-type="table"}). Dechlorination activity was detected, but nitrocatechols were produced only from 2CNB and 4CNB, and resulted in less than 5% of the total products generated by both enzymes. Attack at positions distal to the chloro‐ and nitro‐groups (which would result in the formation of chloronitro‐*cis*‐dihydrodiols), or the simultaneous removal of both the chloro‐ and nitro‐groups (which would result in the formation of catechol; [Fig. 2](#f2){ref-type="fig"}) was not observed. Analysis of product formation from CNBs by nitroarene dioxygenases allowed us to assess the activity of these enzymes when presented with two electronegative functional groups on a single aromatic ring. Electronegativity calculations ([@b17]; [@b8]) show that nitro‐ (3.29 Pauling units) and chloro‐groups (3.16 Pauling units) have comparable affinities for electrons. This suggests that differences in size and charge localization may be responsible for differences in regiospecificity towards the two functional groups by these enzymes. Another significant difference between these functional groups is the ability to participate in hydrogen bonding, and previous work indicated that proper positioning of nitrobenzene and nitrotoluenes for ring oxidation was controlled by hydrogen bonding of the nitro‐group of the substrate to Asn 258 in the active site of NBDO ([@b6]; [@b20]). The strong preference for nitro‐group removal from CNBs is consistent with previous NBDO substrate specificity studies with chloronitrotoluenes, in which chloromethylcatechols were formed as the dominant or exclusive products ([@b25]; [@b19]). Similar to results with CNBs, dechlorination was only a minor activity with select isomers of chloronitrotoluenes and the simultaneous removal of both the chloro‐ and nitro‐groups was not detected. There are both similarities and differences in the activities of 2NTDO, NBDO, and the active‐site mutants of NBDO towards nitrotoluenes and CNBs. Similar to the changes in activity with nitrotoluenes, substitution of amino acids at positions 258, 293 and 350 altered the activity and regiospecificity of NBDO towards CNBs. Substitutions at positions 258 and 350 increased oxidation at the chloro‐substituted carbon ([Table 1](#t1){ref-type="table"}). Biotransformation of nitrotoluenes by these dioxygenases ([@b20]) and 2NTDO mutants with the same amino acid substitutions at positions 258 and 350 ([@b24]) also led to decreased oxidation on the ring, with nitrobenzyl alcohols formed as the dominant products instead of methylcatechols. Although the asparagine at 258 is critical for positioning nitrobenzene and mononitrotoluenes in the active site of NBDO to allow attack at the nitro‐substituted carbon ([@b6]; [@b20]), the N258V substitution only altered the product ratio by 10--20% with CNBs ([Table 1](#t1){ref-type="table"}). Interestingly, while the NBDO variants with substitutions at position 293 showed reduced oxidation at the nitro‐group of 4‐nitrotoluene ([@b20]), the same changes increased specificity with 2CNB and 4CNB, resulting in the formation of only chlorocatechols. The same changes did not alter the substrate specificity of NBDO towards 3CNB (wild type and 293 variants produced only 4‐chlorocatechol), but resulted in production of small amounts of 3‐nitrobenzyl alcohol from 3‐nitrotoluene ([@b20]). The hydrophobic methyl‐group of nitrotoluenes and the electron‐withdrawing chloro‐group of CNBs appear to be sufficiently different such that their presence results in differences in regiospecificity of the same NBDO enzymes towards the two classes of substrates. By expressing the genes encoding the nitroarene dioxygenase enzyme systems in the chlorobenzene‐degrading *Ralstonia* sp. JS705, we generated strains containing novel pathways for CNB degradation that have not been previously reported ([Fig. 5](#f5){ref-type="fig"}). In these pathways, only a single enzymatic step is required to convert CNBs to chlorocatechols. Complete degradation of all three CNB isomers was achieved by channelling the chlorocatechols into the TCA cycle via the modified *ortho* pathway for chlorobenzene degradation in JS705 ([Fig. 5](#f5){ref-type="fig"}). Of the handful of isolated strains that can grow on CNBs, partially reductive pathways appear to be the main routes for degradation in these bacteria ([Fig. 1](#f1){ref-type="fig"}). The lone exception is a *P. stutzeri* isolate that grows on 2CNB, releasing chloride and nitrite in the process. This strain may utilize a pathway similar to that in our constructed strains, but analysis of the enzymes and pathway intermediates has not been reported ([@b26]). Although 3CNB degradation has been demonstrated in a reactor system ([@b28]), and complete transformation of 3CNB was achieved by the *P. putida--Rhodococcus* co‐culture ([@b39]) and by cultures of *P. acidovorans* CA50 ([@b16]; [@b23]), no bacterial isolates capable of growth on 3CNB as sole carbon source have been reported to date. In contrast, the JS705 variants generated here are capable of growing directly on 3CNB as the sole carbon and energy source. ![Constructed pathways for CNB degradation in engineered *Ralstonia* sp. JS705 strains.](mbt0002-0241-f5){#f5} Strategies to engineer catabolic pathways have met with varying success. For example, while the individual steps of a constructed 2‐chlorotoluene degradation pathway (using the *P. putida* F1 toluene dioxygenase to convert 2‐chlorotoluene to 2‐chlorobenzyl alcohol, the TOL plasmid upper pathway to convert 2‐chlorobenzyl alcohol to 2‐chlorobenzoate and either the *ortho* or modified *ortho* pathway for ring cleavage) each were functional, the constructed strains were unable to grow on 2‐chlorotoluene ([@b14]). In contrast, a strain capable of growth on 1,2,3‐trichloropropane was generated by introducing a modified haloalkane dehalogenase into a 2,3‐dichloropropanol*‐*degrading *Agrobacterium* strain ([@b1]). In designing engineered catabolic pathways, the relative activities of individual enzymes in the pathway and the appropriate regulation of the genes encoding each operon need to be considered in order to optimize flux through the pathway and avoid accumulation of toxic intermediates. Although we were successful in developing strains that grow on all three CNB isomers, several aspects of these metabolic pathways could be optimized to improve degradation. Increasing nitroarene dioxygenase activity might increase the net flux of carbon entering central metabolism and potentially allow for faster growth. Additionally, the pathway might be improved by placing the genes encoding the nitroarene dioxygenase and chlorocatechol dioxygenase under the control of a single induction system. Currently, the upper and lower pathways are differentially expressed, which may contribute to the slow growth. A CNB‐inducible system would conserve metabolic energy and streamline the pathway such that expression occurs only when substrate is available for degradation. Furthermore, the low *n*‐octanol/water partition coefficients (log *P*~ow~) for CNBs \[2.21--2.24 ([@b27])\] indicate that these compounds may accumulate in the cytoplasmic membrane of cells, where they can compromise the proton motive force and other vital metabolic functions mediated ([@b43]). We attempted to minimize the toxicity of CNBs by including XAD‐7 resin in the cultures to bind the compounds and allow their slow release into the medium. However, introduction of an appropriate solvent efflux pump ([@b7]) might increase the resistance of these engineered strains to the toxic effects of CNBs, and consequently improve growth and degradation. Despite these considerations, our results demonstrate the modularity of nitroarene dioxygenases and their utility in customizing the metabolic diversity of microbial strains. By taking advantage of the regiospecific oxidation at nitro‐substituted carbons, we applied nitroarene dioxygenases to create bacterial strains carrying novel synthetic pathways for the effective degradation of all three isomers of CNBs, thereby expanding the available options for biotreatment of these recalcitrant environmental contaminants. Experimental procedures ======================= Bacterial strains, plasmids and growth media -------------------------------------------- The bacterial strains and plasmids used in this study are listed in [Table 3](#t3){ref-type="table"}. *Escherichia coli* strains were grown in Luria--Bertani (LB) broth ([@b3]) at 37°C unless otherwise indicated. Minimal‐salts broth (MSB) ([@b45]) containing 1% (vol/vol) modified Balch\'s vitamins ([@b9]) solution (without thiamine and *p*‐aminobenzoate) was used as the basal medium for growth of other strains as described below. Modified MSB (nitrilotriacetic acid substituted with an equimolar amount of EDTA) was used for growth of *E. coli* cultures expressing recombinant dioxygenases in biotransformation reactions. For plates, LB and MSB were solidified with 1.6% (wt/vol) Difco Agar (Becton, Dickinson and Company, Sparks, MD) and 1.8% (wt/vol) Difco Agar Noble (Becton, Dickinson and Company), respectively. Antibiotics were added at the following concentrations for plasmid selection and maintenance; for *E. coli* strains, ampicillin, 200 µg ml^−1^; kanamycin, 50 µg ml^−1^; for *Ralstonia* sp. JS705, kanamycin, 50 µg ml^−1^. ###### Bacterial strains and plasmids used in this study. Strain or plasmid Relevant characteristics Reference or source ------------------------- ------------------------------------------------------------------------------------- --------------------- *Escherichia coli*  DH5α Cloning host; *thi* Invitrogen  S17‐1 λ*‐pir* Host for plasmid mobilization; *thi* [@b49]) *Pseudomonas putida* F1 Wild‐type toluene‐degrading strain [@b11]); [@b5]) *Ralstonia* sp. JS705 Wild‐type chlorobenzene‐degrading strain [@b50]) Plasmids  pBBR1MCS2 Broad‐host‐range vector; Km^R^ [@b22])  pDTG800 pUC18 containing *ntdAaAbAcAd* from JS42; Amp^R^ [@b35])  pDTG850 pUC13 containing *ntdAaAbAcAd* from JS42; Amp^R^ [@b37])  pDTG927 pUC19 containing *nbzAaAbAcAd* from JS765; Amp^R^ [@b25])  pKSJ4 pUC13 containing *nbzAaAbAcAd* from JS765, NBDO expression plasmid; Amp^R^ [@b20])  pKSJ10 Derivative of pKSJ4, NBDO I350T expression plasmid; Amp^R^ [@b20])  pKSJ12 Derivative of pKSJ4, NBDO N258V expression plasmid; Amp^R^ [@b20])  pKSJ19 Derivative of pKSJ4, NBDO I350F expression plasmid; Amp^R^ [@b20])  pKSJ21 Derivative of pKSJ4, NBDO F293Q expression plasmid; Amp^R^ [@b20])  pKSJ23 Derivative of pKSJ4, NBDO F293I expression plasmid; Amp^R^ [@b20])  pKSJ25 Derivative of pKSJ4, NBDO F293H expression plasmid; Amp^R^ [@b20])  pKSJ99 pBBR1MCS2 containing *nbzAaAbAcAd* from pDTG927; Km^R^ This study  pKSJ114 Derivative of pKSJ99 containing *nbzAc* AvrII‐MfeI gene fragment from pKSJ21; Km^R^ This study Amp^R^, ampicillin resistance; Km^R^, kanamycin resistance. Chemicals --------- Catechol (\> 99.5%) was purchased from Aldrich (Milwaukee, WI). Chlorobenzene (\> 99%) was obtained from Fisher Scientific (Fair Lawn, NJ), nitrobenzene from Acros Organics (Morris Plains, NJ), and 2NT (99%), 2CNB (99%) and 4CNB (98%) were from Avocado (Heysham, Lancashire, UK). 3CNB (98%) was from Lancaster (Pelham, NH). 4‐Chlorocatechol and 4‐nitrocatechol were generously provided by David T. Gibson (University of Iowa, Iowa City, IA). 3‐Chlorocatechol and 3‐nitrocatechol were prepared using *P. putida* F1, a toluene‐degrading bacterium that is able to produce these compounds from chlorobenzene and nitrobenzene respectively ([@b10]; [@b13]). F1 was cultured aerobically in 2.8 l Fernbach flasks containing 800 ml of MSB with 40 mM pyruvate and toluene in vapour form, and incubated at 28°C on a rotary shaker at 225 r.p.m. At an OD~660~ of 1.0, cells were harvested by centrifugation, resuspended in 500 ml of 40 mM phosphate buffer (pH 7.3), transferred to a new 2.8 l Fernbach flask with 0.1% chlorobenzene or nitrobenzene, and returned to the shaking incubator. After 12 h, each clarified supernatant was extracted with 2 vols of sodium hydroxide‐washed ethyl acetate, dried over anhydrous sodium sulfate and concentrated by rotary evaporation. 3‐Chlorocatechol and 3‐nitrocatechol were purified from the biotransformation products by flash chromatography over a column (18 mm × 45 mm) of silica gel (60 Å pore diameter). Compounds were eluted with a step gradient of chloroform--acetone, starting with 100% chloroform and transitioning to 100% acetone in 10% gradations of 100 ml of solvent, collected in 5 ml volumes and analysed by thin‐layer chromatography ([@b40]). Fractions containing purified 3‐chlorocatechol or 3‐nitrocatechol were combined, concentrated by rotary evaporation and re‐crystallized. The final products were \> 99% pure as judged by GC‐MS analysis. DNA manipulations ----------------- Standard methods were used to manipulate plasmids and DNA fragments ([@b41]). Restriction endonucleases and DNA modification enzymes were purchased from New England Biolabs (Beverly, MA). Plasmids were purified with a QIAprep Miniprep kit (Qiagen, Valenica, CA). DNA fragments were purified with a QIAquick Gel Extraction kit (Qiagen). Fluorescent automated DNA sequencing was carried out at the University of California, Davis sequencing facility with an Applied Biosystems 3730 automated sequencer. Nucleotide and amino acid sequence analyses were performed using the Vector NTI software suite (Invitrogen, Carlsbad, CA). *E. coli* strains were transformed with plasmid DNA by standard procedures ([@b41]). *E. coli* S17‐1 *λ*‐*pir* was used to introduce plasmids into *Ralstonia* sp. strain JS705 by conjugative matings. S17‐1 *λ*‐*pir* containing plasmids for mobilization were cross‐streaked with *Ralstonia* sp. JS705 on LB plates and incubated at 30°C for 24 h. Cells were resuspended in 10 ml of MSB, homogenized by vortexing and plated on MSB plates containing 10 mM succinate and kanamycin. Exconjugants were purified by repeated single colony isolation on the same medium. The presence of plasmids was confirmed by isolation and diagnostic restriction digests. Construction of expression clones --------------------------------- To express the nitroarene dioxygenase genes in *Ralstonia sp.* JS705, plasmids pKSJ99 and pKSJ100 were constructed by subcloning the 5 kb SacI‐fragments containing gene clusters *ntdAaAbAcAd* from pDTG800 and *nbzAaAbAcAd* from pDTG927 into SacI‐digested pBBR1MCS2, which is a broad‐host‐range cloning vector carrying a kanamycin‐resistance gene ([@b22]). The 2.4 kb AvrII‐MfeI fragment from pKSJ21 was ligated to AvrII‐MfeI‐digested pKSJ99 to generate pKSJ114 ([Table 3](#t3){ref-type="table"}). Dioxygenase genes were constitutively expressed from the *lac* promoter of the vector. Biotransformation reactions --------------------------- *E. coli* DH5α cultures expressing recombinant dioxygenase enzymes from plasmids pDTG850, pKSJ4, pKSJ10, pKSJ12, pKSJ19, pKSJ21, pKSJ23 or pKSJ25 ([Table 3](#t3){ref-type="table"}) were cultured aerobically in modified MSB medium containing 10 mM glucose, 1 mM thiamine and 200 µg ml^−1^ ampicillin as previously described ([@b20]). Each culture was harvested by centrifugation during exponential growth (OD~660~ 0.8--1.0), resuspended in 50 ml of 40 mM phosphate buffer (pH 7.3) containing 20 mM glucose and 25 ml volumes were dispensed into 125 ml Erlenmeyer flasks. Reaction mixtures were incubated with 0.1% (wt/vol) of 2‐, 3‐ or 4CNB on a rotary shaker at 30°C and 200 r.p.m. After 6 h, nitrite was analysed ([@b44]; [@b20]) from clarified supernatants and then the supernatants were extracted with 3 vols of sodium hydroxide‐washed ethyl acetate. Samples were dried over anhydrous sodium sulfate and concentrated by rotary evaporation. Products were transferred into 1‐dram glass screw‐cap vials, evaporated to dryness, dissolved in 0.5 ml of acetorititrile and analysed by thin‐layer chromatography and GC‐MS as described previously ([@b40]; [@b20]). The GC‐MS parameters used allowed the separation and detection of catechols, substituted catechols, phenols and single‐ring *cis*‐dihydrodiols. All products were identified by comparison with chemical standards. Enzyme assays ------------- Nitroarene dioxygenase activity with 2‐, 3‐ and 4CNB was analysed in *Ralstonia* sp. JS705 carrying cloned NBDO genes. Strains were grown in 125 ml Erlenmeyer flasks containing 25 ml MSB with 10 mM succinate and kanamycin at 30°C and 200 r.p.m. At an OD~660~ between 0.8--0.9, 2 ml volumes of each culture were dispensed into glass culture tubes (20 mm × 150 mm), supplied with 1 mM substrate, and incubated at 30°C on a rotary shaker at 300 r.p.m. Nitrite released during the initial 30 min was quantified from culture supernatants as previously described ([@b44]; [@b20]). Concentrations of total cellular proteins were determined by the method of Bradford ([@b2]) from cell pellets resuspended in 100 mM NaOH and boiled for 10 min, with bovine serum albumin as the standard. Growth assays ------------- *Ralstonia* sp. JS705 strains carrying pBBR1MCS2, pKSJ99 or pKSJ114 were tested for growth on 2CNB, 3CNB, 4CNB and 4‐chlorocatechol in liquid culture. Dioxygenase genes were expressed from the *lac* promoter of the vector without the need for induction. Strains were grown in 250 ml Fernbach flasks containing 50 ml of MSB, 50 µg ml^−1^ kanamycin and 100 mg of XAD‐7 beads (Sigma Chemical Co., St Louis, MO) to provide a gradual release of the CNBs or 4‐chlorocatechol and minimize their toxicity as previously described for dinitrotoluenes ([@b34; @b33]). The CNBs and 4‐chlorocatechol were added to a final concentration of 3 mM from methanolic stock solutions to flasks containing sterilized resin and the solvent was evaporated before the addition of sterile culture medium. Growth on CNBs as nitrogen sources was tested in the same fashion except ammonium sulfate was excluded from MSB and 10 mM succinate was added as the carbon source. Flasks were inoculated with overnight cultures of *Ralstonia* strains that had been grown in the same medium, and then incubated on a rotary shaker at 28--30°C and 200 r.p.m. Culture turbidity and nitrite formation were monitored over time (as in enzyme assays). This work was supported by grants awarded to R.E.P. from the U.S. Department of Defense Strategic Environmental Research and Development Program (SERDP CU1212) and the National Science Foundation (MCB 02627248). K.‐S.J. was supported by an NIH Traineeship in Molecular and Cellular Biology (NIH TM32 GM070377) and a University of California Toxic Substances Research and Teaching Program graduate fellowship.
Mid
[ 0.559210526315789, 31.875, 25.125 ]
GUATEMALA WEEKEND About Guatemala - From $299.00 USD Terms, conditions and restrictions apply; pricing, availability, and other details subject to change and/ or apply to US or Canadian residents. Please confirm details and booking information with your travel advisor. Itinerary FRI I GUATEMALA CITY Welcome to the land of Eternal Spring! Upon arrival at Guatemala’s airport, you will be transferred to Guatemala City for your overnight stay. SAT I GUATEMALA CITY I ANTIGUA I CHICHICASTENANGO After breakfast, depart for Antigua, the most important and enchanting city of colonial Guatemala. Founded by the Spaniards in 1543, nowadays Antigua is a beautiful blend of ruins, restored colonial buildings, and new buildings in colonial style. It was declared a “Monument of America” in 1965. Visit the Central Plaza that is surrounded by the antique Cathedral, the Municipal Government Building, the Palace of the Captains General, colonial churches and monasteries, and a jade factory where this stone is worked into beautiful jewelry. In the afternoon transfer to Chichicastenango for your overnight stay. (B) SUN I CHICHICASTENANGO I LAKE ATITLAN I GUATEMALA CITY Have breakfast at your hotel and prepare to enjoy market day in Chichicastenango. Visit the most colorful and picturesque Indian open-air market in the country. Hundreds of Indians from the surrounding countryside gather to barter their goods and products. You will also have a chance to witness the captivating religious ceremonies held on the steps and inside the 400-year old Church of Santo Tomás. Continue on to Lake Atitlán, one of the most beautiful in the world with its crystalline-azure waters in the crater bowl below. Atitlán is the ideal place to learn more about Guatemalan folklore. Twelve Indian villages surround the Lake and their inhabitants are descendants from the great Quiché, Cackchiquel, and Tzutuhil nations. In the afternoon, transfer back to Guatemala City for overnight. (B) MON I GUATEMALA CITY TO USA (OR EXTEND YOUR STAY) After breakfast enjoy some leisure time before transferring to the airport for your departure flight. (B)
Low
[ 0.534653465346534, 33.75, 29.375 ]