text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
<?xml version="1.0" encoding="windows-1251"?> <VisualStudioProject ProjectType="Visual C++" Version="7.10" Name="spazm" ProjectGUID="{6AC5469F-67AA-42F7-8530-1BF241A714FE}" RootNamespace="spazm" Keyword="Win32Proj"> <Platforms> <Platform Name="Win32"/> </Platforms> <Configurations> <Configuration Name="Debug|Win32" OutputDirectory="Debug" IntermediateDirectory="Debug" ConfigurationType="1" CharacterSet="2"> <Tool Name="VCCLCompilerTool" Optimization="0" PreprocessorDefinitions="WIN32;_DEBUG;_WINDOWS" MinimalRebuild="TRUE" BasicRuntimeChecks="3" RuntimeLibrary="1" DisableLanguageExtensions="TRUE" WarningLevel="4" Detect64BitPortabilityProblems="TRUE" DebugInformationFormat="4"/> <Tool Name="VCCustomBuildTool"/> <Tool Name="VCLinkerTool" OutputFile="$(OutDir)/spazm.exe" LinkIncremental="0" GenerateDebugInformation="TRUE" ProgramDatabaseFile="$(OutDir)/spazm.pdb" SubSystem="2"/> <Tool Name="VCMIDLTool"/> <Tool Name="VCPostBuildEventTool"/> <Tool Name="VCPreBuildEventTool"/> <Tool Name="VCPreLinkEventTool"/> <Tool Name="VCResourceCompilerTool"/> <Tool Name="VCWebServiceProxyGeneratorTool"/> <Tool Name="VCXMLDataGeneratorTool"/> <Tool Name="VCWebDeploymentTool"/> <Tool Name="VCManagedWrapperGeneratorTool"/> <Tool Name="VCAuxiliaryManagedWrapperGeneratorTool"/> </Configuration> <Configuration Name="Release|Win32" OutputDirectory="Release" IntermediateDirectory="Release" ConfigurationType="1" CharacterSet="2"> <Tool Name="VCCLCompilerTool" PreprocessorDefinitions="WIN32;NDEBUG;_WINDOWS" RuntimeLibrary="4" UsePrecompiledHeader="0" WarningLevel="3" Detect64BitPortabilityProblems="TRUE" DebugInformationFormat="3"/> <Tool Name="VCCustomBuildTool"/> <Tool Name="VCLinkerTool" GenerateDebugInformation="FALSE" GenerateMapFile="FALSE" SubSystem="2"/> <Tool Name="VCMIDLTool"/> <Tool Name="VCPostBuildEventTool"/> <Tool Name="VCPreBuildEventTool"/> <Tool Name="VCPreLinkEventTool"/> <Tool Name="VCResourceCompilerTool"/> <Tool Name="VCWebServiceProxyGeneratorTool"/> <Tool Name="VCXMLDataGeneratorTool"/> <Tool Name="VCWebDeploymentTool"/> <Tool Name="VCManagedWrapperGeneratorTool"/> <Tool Name="VCAuxiliaryManagedWrapperGeneratorTool"/> </Configuration> </Configurations> <References> </References> <Files> <Filter Name="Source Files" Filter="cpp;c;cxx;def;odl;idl;hpj;bat;asm;asmx" UniqueIdentifier="{4FC737F1-C7A5-4376-A066-2A32D752A2FF}"> <File RelativePath=".\main.cpp"> <FileConfiguration Name="Debug|Win32" ExcludedFromBuild="TRUE"> <Tool Name="VCCustomBuildTool"/> </FileConfiguration> </File> </Filter> <Filter Name="Header Files" Filter="h;hpp;hxx;hm;inl;inc;xsd" UniqueIdentifier="{93995380-89BD-4b04-88EB-625FBE52EBFB}"> <File RelativePath=".\_config.h"> </File> <File RelativePath=".\autorun.h"> </File> <File RelativePath=".\base64.h"> </File> <File RelativePath=".\bindshell.h"> </File> <File RelativePath=".\ddos.h"> </File> <File RelativePath=".\download.h"> </File> <File RelativePath=".\find_proc.h"> <FileConfiguration Name="Debug|Win32" ExcludedFromBuild="TRUE"> <Tool Name="VCCustomBuildTool"/> </FileConfiguration> </File> <File RelativePath=".\icmp.h"> </File> <File RelativePath=".\igmp.h"> </File> <File RelativePath=".\inject.h"> <FileConfiguration Name="Debug|Win32" ExcludedFromBuild="TRUE"> <Tool Name="VCCustomBuildTool"/> </FileConfiguration> </File> <File RelativePath=".\killer.h"> </File> <File RelativePath=".\net.h"> </File> <File RelativePath=".\priv.h"> <FileConfiguration Name="Debug|Win32" ExcludedFromBuild="TRUE"> <Tool Name="VCCustomBuildTool"/> </FileConfiguration> </File> <File RelativePath=".\socks4.h"> </File> <File RelativePath=".\sys_info.h"> </File> <File RelativePath=".\udp.h"> </File> <File RelativePath=".\update.h"> </File> <Filter Name="Z_worm" Filter=""> <File RelativePath=".\Z_worm\outlook_passwd.h"> </File> <File RelativePath=".\Z_worm\rnd.h"> </File> <File RelativePath=".\Z_worm\smtp.h"> </File> <File RelativePath=".\Z_worm\sok.h"> </File> <File RelativePath=".\Z_worm\worm_email.h"> </File> <File RelativePath=".\Z_worm\worm_p2p.h"> </File> </Filter> <Filter Name="Z_driver" Filter=""> <File RelativePath=".\Z_driver\create.h"> </File> <File RelativePath=".\Z_driver\file.h"> </File> <File RelativePath=".\Z_driver\firewall.h"> </File> <File RelativePath=".\Z_driver\process.h"> </File> </Filter> </Filter> <Filter Name="Resource Files" Filter="rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx" UniqueIdentifier="{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}"> </Filter> </Files> <Globals> </Globals> </VisualStudioProject>
Low
[ 0.522198731501057, 30.875, 28.25 ]
project(argparse) set (SOURCE_DIR ${CMAKE_CURRENT_SOURCE_DIR}) set (SOURCES ${SOURCE_DIR}/argparse.c ) add_library(argparse STATIC ${SOURCES}) if (${CMAKE_GENERATOR} MATCHES "Visual") target_compile_options(microprofile PRIVATE) else() target_compile_options(microprofile PRIVATE -fPIC) endif()
Mid
[ 0.541743970315398, 36.5, 30.875 ]
"Simply put, OutdoorIndustryJobs.com is the go to source for hiring in the Outdoor Industry. I posted one job opening and the pool of candidates was so qualified that I ended up bringing 3 additional people on!" Company Description The Hyalite Outdoor group is looking for territory sales reps for PACIFIC OUTDOOR EQUIPMENT, TEKO SOCKS, and BALADEO brands. Pacific Outdoor Equipment: Innovative and award winning welded and environmentally sensitive product line focused on sleeping pads, camp chairs, dry bags and bicycle panniers. We are looking for experienced reps for the Southeast, South Central/Texas, and Northwest territories. Established contacts and work history in the Outdoor Industry is mandatory, cycling industry experience a plus. www.pacoutdoor.com Teko Socks: with a commitment to build the best socks on the planet and the best socks for the planet, Teko is a US manufacturer of the finest natural and synthetic socks. Teko has rep openings in the Southeast, South Central/Texas and So Cal/Southwest territories. Contacts in the bike, run, outdoor, and ski channels are preferred. www.tekosocks.com Baladeo: Baladeo is a manufacturer of fine pocket knives, L.E.D. lights, multi tools and solar chargers. Baladeo is best known for their traditional Laguoile style pocket knives, wine screws and cutlery. Baladeo has rep openings in the So Cal/Southwest, Upper Mid west, South Central/Texas, Southeast and New England territories. Contacts in the Outdoor Industry mandatory, contacts in fish/hunt, cutlery, and other markets a plus.
Mid
[ 0.6375000000000001, 38.25, 21.75 ]
An apoE-derived mimic peptide, COG1410, alleviates early brain injury via reducing apoptosis and neuroinflammation in a mouse model of subarachnoid hemorrhage. This study investigated the neuroprotective effects of COG1410, an apoliporotein E (apoE)-derived mimic peptide, against early brain injury (EBI) after subarachnoid hemorrhage (SAH). SAH was induced in C57BL/6J mice (n=68) by endovascular perforation. Mice received intravenous injection of COG1410 (2mg/kg) or equal volume of vehicle (saline). The mortality rate, neurological score, rotarod latencies, cell apoptosis, microglial activation, pro-inflammatory cytokines production and protein levels of apoptotic and inflammatory markers were assessed at 24h after sham operation or SAH. Results showed that COG1410 alleviated the neurological deficits associated with SAH. Compared with vehicle treatment group, the number of apoptotic cells and activated microglia decreased significantly in the COG1410 treated group. COG1410 enhanced Akt activation and suppressed caspase-3 cleavage. The imbalance of Bax and Bcl-2 induced by SAH was regulated by COG1410. Additionally, COG1410 attenuated cytokines production of IL-1β, IL-6 and TNF-α and suppressed the activation of JNK/c-Jun and NF-κB. Taken together, COG1410 protected against EBI via reducing apoptosis and neuroinflammation, through mechanisms that involve the regulation of apoptotic signaling and microglial activation. COG1410 is a potential neuroprotective agent for SAH treatment.
High
[ 0.693402328589909, 33.5, 14.8125 ]
5 Appliances that Break the Most Often 5 Appliances that Break the Most Often Eventually, every appliance you own is going to break down and need to be repaired or replaced. However, certain appliances will break down more often than others. With these appliances, it’s important to do your research on the lifespans of different makes and models. If ever you feel uncertain about a purchase, talk to us at West Coast Chief Repair. So, which appliances should you be a little more careful with? 1. Washing Machines Washing machines always seem to be breaking down, and they seem to do it when you have overflowing hampers and empty closets. Why do they break so often? Well, part of it is just the work they do; the various parts are in close constant contact with water, and the spin cycle in particular can be brutal. But there is also a lot of room for user error. You can put too many clothes in one load, try to wash bedding that should be cleaned in an industrial machine, or fail to complete regular maintenance, such as cleaning the drum. To make breakdowns less likely to happen, make sure you have the machine placed in a good spot, that you keep the loads to a good size, and that you avoid putting items in the machine that can damage it. 2. Dryers Much like your washing machine, this is an appliance that never breaks down at a good moment and often breaks due to user error. Just like the washing machine, putting too many items in or the wrong items can cause it to break. It also needs regular maintenance. However, the most dangerous user error is not cleaning the lint screen or the vent; the screen should be cleaned after each load and the vent once a year. Once again, take care with what you put into the dryer and make sure you are maintaining it well. 3. Refrigerators When washers and dryers break, you have to get creative with your wardrobe. It might be embarrassing, but it isn’t devastating. When the fridge goes out, however, it can be a disaster. The food inside can spoil and you might not have enough money to both buy more and fix the appliance. Refrigerators tend to give out completely after about ten years. However, you can extend their lifespan and reduce the amount of repairs needed by taking some simple steps. The most important is to clean dust off the condenser coils every six months. You should also keep the fridge as stocked as you can and keep the door shut as much as possible so the compressor isn’t working more than is needed. 4. Dishwashers Anytime an appliance deals with water, there will be many things that can go wrong. And because water can cause a lot of damage to your home at large, the impact can be severe. Dishwashers tend to need repair quite often, and need to be replaced about every 13 years. The biggest threat to your dishwasher is dry rot, which can impact the seals, gaskets, and hoses. The best way to prevent this is just to use your dishwasher often, preventing these elements from drying out. You should also use a special cleaner in the machine once a month, running it with the machine empty. 5. Garbage Disposals Garbage disposals are actually pretty tough devices. When used correctly, you should not expect much to go wrong. The problem is that many people don’t know how to use them correctly. Some common mistakes are putting non-food items in the disposal or putting in items that are too hard or thick for the machine, such as bones, corn cobs, and fruit pits. As long as you treat it right, it could last you a couple of decades, maybe more. Which Appliances Break Less Often? So now that we’ve looked at the appliances you should worry about, what about those that are highly dependable? Below are the most reliable appliances you have in your home: Range hoods Microwaves Toaster ovens Gas stoves Ceiling fans Of course, as we noted earlier, buying the right make and model makes a big difference. So, what are the most reliable brands you can buy? Whirlpool LG Frigidaire Miele Bosch Samsung Speed Queen Maytag KitchenAid Thermador Wolf For Repairs, Buying Advice, and More, Turn to West Coast Chief Repair If you’re having a hard time with your appliance, need help maintaining it, or advice when buying a new one, our team is here for you. Home appliances are our business, and we know them better than anyone in the area. Give us a call and we will head over right away to help you.
Mid
[ 0.608490566037735, 32.25, 20.75 ]
Q: Importance of (the number of) ultrafilters I have seen a proof about the numbers of ultrafilters in topology, namely a theorem of Pospíšil stating that there are $2^{2^\kappa}$ ultrafilters on every infinite set $X$ with $\kappa = |X|$. The number of principal ultrafilters (the only one that can be constructed explicity) is equal to the cardinality of $\mathbb{N}$, giving a lower bound the the number of ultrafilters. So, the theorem of Pospíšil states how many different choices are available when using the axiom of choice. Why is this quantification of "maximal filters" (using Zorn for getting an ultrafilter) of interest in particular in connection with compactness? My idea was the following: An equivalent definition of compactness is that all universal nets converge and universal nets are equivalent to ultrafilters. The number of ultrafilters hence give me another argument to see why nets are needed and sequences do not suffice in non-metric spaces. So, can this theorem be seen how big one have to choose the set the net is defined on in order to find a full description of the space? How are those properties called? A: It shows how large a compactification can be. If we have a discrete space $D$ of size $\kappa$ and $X$ is a compactification of $D$ (so that $X$ is compact Hausdorff and has $D$ as a dense subset), the largest that $X$ can be $2^{2^\kappa}$, namely when every ultrafilter on $D$ ( which must have a limit in $X$), gets a different limit. So we then need $2^{2^\kappa}$ many new points outside $D$. It is well known that $w(X) \le 2^{d(X)}$ for $T_3$ spaces and $|X| \le 2^{w(X)}$ for $T_0$ spaces. So the Čech-Stone compactification (hence the number of ultrafilters) shows these bounds cannot be improved upon.
High
[ 0.7000000000000001, 33.25, 14.25 ]
Anomalous diffusion of poly(ethylene oxide) in agarose gels. We report on the effect of probe size and diffusion time of poly(ethylene) oxide in agarose gels. Time-dependence of the diffusion coefficient, reflecting anomalous diffusion, was observed for poly(ethylene) oxide chains with hydrodynamic radii exceeding about 20nm at an agarose concentration of 2%. The main conclusion is that the pore distribution includes pores that are only several nm across, in agreement with scattering reports in the literature. Interpretation of the diffusion coefficient dependence on the probe size based on a model of entangled rigid rods yielded a rod length of 72nm.
High
[ 0.6854724964739071, 30.375, 13.9375 ]
--- layout: default title: PSR-7 integration --- # PSR-7 integration Glide ships with the `PsrResponseFactory` class, allowing you to use any [PSR-7](http://www.php-fig.org/psr/psr-7/) compliant library. However, since Glide only depends on the PSR-7 interfaces, it cannot actually create the `Response` or `Stream` objects. Instead, you must provide them. ## Configuration The following example uses the [Zend Diactoros](https://github.com/zendframework/zend-diactoros) library, but any PSR-7 compatible package will work. ~~~ php <?php use League\Glide\ServerFactory; use League\Glide\Responses\PsrResponseFactory; use Zend\Diactoros\Response; use Zend\Diactoros\Stream; $server = ServerFactory::create([ 'response' => new PsrResponseFactory(new Response(), function ($stream) { return new Stream($stream); }), ]); ~~~ ## Vendor specific adapters However, for simplicity, Glide provides a vendor specific PSR-7 adapters to make this easier: - [Slim](/1.0/config/integrations/slim/) - [Zend](/1.0/config/integrations/zend/)
Mid
[ 0.5769230769230761, 30, 22 ]
Club Hípico de Santiago Club Hípico de Santiago is a thoroughbred horse race track in Santiago, Chile. History The Club Hípico de Santiago, opened in 1870, is Chile's oldest racetrack and home to South America's oldest stakes race, the Clásico El Ensayo. It is one of Chile's three main tracks, the others being Hipodromo Chile and Valparaiso Sporting Club. Physical attributes Club Hípico features a wide right-handed turf course, approximately 2400 m (12 furlongs) long, and is landscaped with gardens, fountains and ponds. Concerts Racing Live racing takes place every Friday, every other Monday and on some Sundays. Racedays are extremely long by International standards, usually featuring around 18 races per card. 2007 Major Stakes Schedule External links Home Page Racecourse Profile on Horse Racing South America Category:Horse racing venues in Chile Category:Music venues in Chile Category:Sports venues in Santiago
High
[ 0.66, 33, 17 ]
It looks like Google has removed one of their previously documented structured data markups from their developer docs. Specifically, they have removed the Preferred Site Name option, it now 404s when you try to access it, but for now, the cached version is still available. You were able to use structured data markup on your official website to indicate the preferred name you want Google Search to display in Search results. But they removed the documentation, so does that mean Google will no longer support this markup? Aaron Bradley first spotted this and posted it on Google+ yesterday saying "looks like "Preferred site name" is no longer supported by Google." I asked John Mueller about it on Google+, but have not yet heard back if this is just an error or something Google has fully stopped supporting. Here is a screen shot of the old document: Forum discussion at Google+.
Mid
[ 0.6000000000000001, 34.5, 23 ]
This Week in D Welcome to This Week in D! Each week, we'll summarize what's been going on in the D community and write brief advice columns to help you get the most out of the D Programming Language. The D Programming Language is a general purpose programming language that offers modern convenience, modeling power, and native efficiency with a familiar C-style syntax. This Week in D has an RSS feed. This Week in D is edited by Adam D. Ruppe. Contact me with any questions, comments, or contributions. Statistics In the community Community announcements See more at the announce forum. Tip of the Week This week's tip actually comes from Walter Bright himself: you can use identity template specializations with constraints to make a generic fallback. import core.stdc.stdio; void f(T:T)(T t) if ( is (T == int )) { printf( "case int " ); } void f(T:T)(T t) if ( is (T == uint )) { printf( "case uint " ); } void f(T)(T t) { printf( "case default " ); } void main() { f(1); f(1u); f(1.0); } This works because specializations are preferred over non-specializations, and T:T is the identity specialization. (Adam writing again from here on) The problem of the fallback is normally that the compiler will complain that there are two equal matches for the template parameters. Constraints are a binary condition to take a template out of consideration entirely, but if it passes, if it is considered, it holds equal weight to all other passing options. Specialization changes the weight of a template in consideration. When one is present and matching, that template gets a higher match weight than ones without or with a less specific specialization, overcoming the "multiple templates match" error - now they match, but since one is a higher weight, it isn't an equal match and thus not an error. So, to use this technique, you use the T:T specialization on one of the arguments (it doesn't matter which one, all this does is increase the match weight without changing anything else, specializing to itself will only match itself anyway) for each of the better matches with the constraint. Then, the fallback is written without it. Using a fallback and specialization from across modules may need local aliases to merge the overload sets. Consider the following: module u; void fallback(T)() { pragma (msg, "fallback" ); } module uu.d; void fallback(T:T)() if ( is (T == int )) { pragma (msg, "int" ); } import u; import uu; void main() { fallback! char ; } Compiling those three modules together will result in the fallback message being printed, without error. Change the main function to use fallback!int instead of char and recompile. Now, you'll get an error: uuu.d(5): Error: uu.fallback!int.fallback at uu.d(1) conflicts with u.fallback!int.fallback at u.d(3) The reason for this error is that there's two matches in different modules, triggering D's hijacking rules. Both templates match, the if int one is NOT taken out of consideration, but since they are in different modules, the specialization doesn't automatically apply; despite the higher weight, the fact they are in separate modules still triggers the error, just like with function overloads. Thankfully, the solution is the same as with function overloads too: you can alias the template from both modules together to explicitly resolve the problem: import u; import uu; alias fallback = u.fallback; alias fallback = uu.fallback; void main() { fallback! int ; } Now, both work! Alternatively, the module with the specialization can import the fallback and do the aliasing there: import u; // note, you must import the module with the non-specialized fallback // but it does NOT have to be a public import; the alias below is enough alias fallback = u.fallback; // add the fallback to the overload set void fallback(T:T)() if ( is (T == int )) { pragma (msg, "int" ); } Alternatively, you can edit the fallback module to import the specialization module, and do the alias there. Either way though, one module must be aware of the other(s) to merge the overload sets. Once that is done, import JUST the one module with the aliases (still importing both would trigger the ambiguity again) and compile - boom, it works! I must confess, when Walter posted this, I was a bit jealous that I never considered this option before myself! Learn more about D To learn more about D and what's happening in D:
Mid
[ 0.623376623376623, 36, 21.75 ]
package api import ( "bytes" "compress/gzip" "encoding/json" "errors" "fmt" "html/template" "io" "net/http" "strings" "time" "github.com/dgrijalva/jwt-go" "github.com/go-chi/chi" "github.com/go-chi/render" "github.com/go-pkgz/auth" "github.com/go-pkgz/auth/token" cache "github.com/go-pkgz/lcw" log "github.com/go-pkgz/lgr" R "github.com/go-pkgz/rest" "github.com/hashicorp/go-multierror" "github.com/umputun/remark42/backend/app/notify" "github.com/umputun/remark42/backend/app/rest" "github.com/umputun/remark42/backend/app/store" "github.com/umputun/remark42/backend/app/store/engine" "github.com/umputun/remark42/backend/app/store/image" "github.com/umputun/remark42/backend/app/store/service" "github.com/umputun/remark42/backend/app/templates" ) type private struct { dataService privStore cache LoadingCache readOnlyAge int commentFormatter *store.CommentFormatter imageService *image.Service notifyService *notify.Service authenticator *auth.Service remarkURL string adminEmail []string anonVote bool templates templates.FileReader } type privStore interface { Create(comment store.Comment) (commentID string, err error) EditComment(locator store.Locator, commentID string, req service.EditRequest) (comment store.Comment, err error) Vote(req service.VoteReq) (comment store.Comment, err error) Get(locator store.Locator, commentID string, user store.User) (store.Comment, error) User(siteID, userID string, limit, skip int, user store.User) ([]store.Comment, error) GetUserEmail(siteID string, userID string) (string, error) SetUserEmail(siteID string, userID string, value string) (string, error) DeleteUserDetail(siteID string, userID string, detail engine.UserDetail) error ValidateComment(c *store.Comment) error IsVerified(siteID string, userID string) bool IsReadOnly(locator store.Locator) bool IsBlocked(siteID string, userID string) bool Info(locator store.Locator, readonlyAge int) (store.PostInfo, error) } // POST /comment - adds comment, resets all immutable fields func (s *private) createCommentCtrl(w http.ResponseWriter, r *http.Request) { comment := store.Comment{} if err := render.DecodeJSON(http.MaxBytesReader(w, r.Body, hardBodyLimit), &comment); err != nil { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't bind comment", rest.ErrDecode) return } user := rest.MustGetUserInfo(r) if user.ID != "admin" && user.SiteID != comment.Locator.SiteID { rest.SendErrorJSON(w, r, http.StatusForbidden, fmt.Errorf("site mismatch, %q not allowed to post to %s", user.SiteID, comment.Locator.SiteID), "invalid site", rest.ErrCommentValidation) return } comment.PrepareUntrusted() // clean all fields user not supposed to set comment.User = user comment.User.IP = strings.Split(r.RemoteAddr, ":")[0] comment.Orig = comment.Text // original comment text, prior to md render if err := s.dataService.ValidateComment(&comment); err != nil { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "invalid comment", rest.ErrCommentValidation) return } comment = s.commentFormatter.Format(comment) // check if user blocked if s.dataService.IsBlocked(comment.Locator.SiteID, comment.User.ID) { rest.SendErrorJSON(w, r, http.StatusForbidden, errors.New("rejected"), "user blocked", rest.ErrUserBlocked) return } if s.isReadOnly(comment.Locator) { rest.SendErrorJSON(w, r, http.StatusForbidden, errors.New("rejected"), "old post, read-only", rest.ErrReadOnly) return } id, err := s.dataService.Create(comment) if err == service.ErrRestrictedWordsFound { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "invalid comment", rest.ErrCommentValidation) return } if err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "can't save comment", rest.ErrInternal) return } // dataService modifies comment finalComment, err := s.dataService.Get(comment.Locator, id, rest.GetUserOrEmpty(r)) if err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "can't load created comment", rest.ErrInternal) return } s.cache.Flush(cache.Flusher(comment.Locator.SiteID). Scopes(comment.Locator.URL, lastCommentsScope, comment.User.ID, comment.Locator.SiteID)) if s.notifyService != nil { // user notification s.notifyService.Submit(notify.Request{Comment: finalComment}) // admin notification for _, adminEmail := range s.adminEmail { s.notifyService.Submit(notify.Request{Comment: finalComment, Email: adminEmail, ForAdmin: true}) } } log.Printf("[DEBUG] created commend %+v", finalComment) render.Status(r, http.StatusCreated) render.JSON(w, r, &finalComment) } // PUT /comment/{id}?site=siteID&url=post-url - update comment func (s *private) updateCommentCtrl(w http.ResponseWriter, r *http.Request) { edit := struct { Text string Summary string Delete bool }{} if err := render.DecodeJSON(http.MaxBytesReader(w, r.Body, hardBodyLimit), &edit); err != nil { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't bind comment", rest.ErrDecode) return } user := rest.MustGetUserInfo(r) locator := store.Locator{SiteID: r.URL.Query().Get("site"), URL: r.URL.Query().Get("url")} id := chi.URLParam(r, "id") log.Printf("[DEBUG] update comment %s", id) var currComment store.Comment var err error if currComment, err = s.dataService.Get(locator, id, rest.GetUserOrEmpty(r)); err != nil { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't find comment", rest.ErrCommentNotFound) return } if currComment.User.ID != user.ID { rest.SendErrorJSON(w, r, http.StatusForbidden, errors.New("rejected"), "can not edit comments for other users", rest.ErrNoAccess) return } editReq := service.EditRequest{ Text: s.commentFormatter.FormatText(edit.Text), Orig: edit.Text, Summary: edit.Summary, Delete: edit.Delete, } res, err := s.dataService.EditComment(locator, id, editReq) if err == service.ErrRestrictedWordsFound { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "invalid comment", rest.ErrCommentValidation) return } if err != nil { code := parseError(err, rest.ErrCommentRejected) rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't update comment", code) return } s.cache.Flush(cache.Flusher(locator.SiteID).Scopes(locator.SiteID, locator.URL, lastCommentsScope, user.ID)) render.JSON(w, r, res) } // GET /user?site=siteID - returns user info func (s *private) userInfoCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) if siteID := r.URL.Query().Get("site"); siteID != "" { user.Verified = s.dataService.IsVerified(siteID, user.ID) email, err := s.dataService.GetUserEmail(siteID, user.ID) if err != nil { log.Printf("[WARN] can't read email for %s, %v", user.ID, err) } if len(email) > 0 { user.EmailSubscription = true } } render.JSON(w, r, user) } // PUT /vote/{id}?site=siteID&url=post-url&vote=1 - vote for/against comment func (s *private) voteCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) if !s.anonVote && strings.HasPrefix(user.ID, "anonymous_") { http.Error(w, "Access denied", http.StatusForbidden) return } locator := store.Locator{SiteID: r.URL.Query().Get("site"), URL: r.URL.Query().Get("url")} id := chi.URLParam(r, "id") log.Printf("[DEBUG] vote for comment %s", id) vote := r.URL.Query().Get("vote") == "1" if s.isReadOnly(locator) { rest.SendErrorJSON(w, r, http.StatusForbidden, errors.New("rejected"), "old post, read-only", rest.ErrReadOnly) return } // check if user blocked if s.dataService.IsBlocked(locator.SiteID, user.ID) { rest.SendErrorJSON(w, r, http.StatusForbidden, errors.New("rejected"), "user blocked", rest.ErrUserBlocked) return } req := service.VoteReq{ Locator: locator, CommentID: id, UserID: user.ID, UserIP: strings.Split(r.RemoteAddr, ":")[0], Val: vote, } comment, err := s.dataService.Vote(req) if err != nil { code := parseError(err, rest.ErrVoteRejected) rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't vote for comment", code) return } s.cache.Flush(cache.Flusher(locator.SiteID).Scopes(locator.URL, comment.User.ID)) render.JSON(w, r, R.JSON{"id": comment.ID, "score": comment.Score}) } // getEmailCtrl gets email address for authenticated user. // GET /email?site=siteID func (s *private) getEmailCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) siteID := r.URL.Query().Get("site") address, err := s.dataService.GetUserEmail(siteID, user.ID) if err != nil { log.Printf("[WARN] can't read email for %s, %v", user.ID, err) } render.JSON(w, r, R.JSON{"user": user, "address": address}) } // sendEmailConfirmationCtrl gets address and siteID from query, makes confirmation token and sends it to user. // GET /email/subscribe?site=siteID&[email protected] func (s *private) sendEmailConfirmationCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) address := r.URL.Query().Get("address") siteID := r.URL.Query().Get("site") if address == "" { rest.SendErrorJSON(w, r, http.StatusBadRequest, errors.New("missing parameter"), "address parameter is required", rest.ErrInternal) return } existingAddress, err := s.dataService.GetUserEmail(siteID, user.ID) if err != nil { log.Printf("[WARN] can't read email for %s, %v", user.ID, err) } if address == existingAddress { rest.SendErrorJSON(w, r, http.StatusConflict, errors.New("already verified"), "email address is already verified for this user", rest.ErrInternal) return } claims := token.Claims{ Handshake: &token.Handshake{ID: user.ID + "::" + address}, StandardClaims: jwt.StandardClaims{ Audience: r.URL.Query().Get("site"), ExpiresAt: time.Now().Add(30 * time.Minute).Unix(), NotBefore: time.Now().Add(-1 * time.Minute).Unix(), Issuer: "remark42", }, } tkn, err := s.authenticator.TokenService().Token(claims) if err != nil { rest.SendErrorJSON(w, r, http.StatusForbidden, err, "failed to make verification token", rest.ErrInternal) return } s.notifyService.Submit( notify.Request{ Email: address, Verification: notify.VerificationMetadata{ SiteID: siteID, User: user.Name, Token: tkn, }, }, ) render.JSON(w, r, R.JSON{"user": user, "address": address}) } // setConfirmedEmailCtrl uses provided token parameter (generated by sendEmailConfirmationCtrl) to set email and add it to user token // PUT /email/confirm?site=siteID&tkn=jwt func (s *private) setConfirmedEmailCtrl(w http.ResponseWriter, r *http.Request) { tkn := r.URL.Query().Get("tkn") if tkn == "" { rest.SendErrorJSON(w, r, http.StatusBadRequest, errors.New("missing parameter"), "token parameter is required", rest.ErrInternal) return } user := rest.MustGetUserInfo(r) siteID := r.URL.Query().Get("site") confClaims, err := s.authenticator.TokenService().Parse(tkn) if err != nil { rest.SendErrorJSON(w, r, http.StatusForbidden, err, "failed to verify confirmation token", rest.ErrInternal) return } if s.authenticator.TokenService().IsExpired(confClaims) { rest.SendErrorJSON(w, r, http.StatusForbidden, errors.New("expired"), "failed to verify confirmation token", rest.ErrInternal) return } elems := strings.Split(confClaims.Handshake.ID, "::") if len(elems) != 2 || elems[0] != user.ID { rest.SendErrorJSON(w, r, http.StatusBadRequest, errors.New(confClaims.Handshake.ID), "invalid handshake token", rest.ErrInternal) return } address := elems[1] log.Printf("[DEBUG] set email for user %s", user.ID) val, err := s.dataService.SetUserEmail(siteID, user.ID, address) if err != nil { code := parseError(err, rest.ErrInternal) rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't set email for user", code) return } // update User.Email from the token claims, _, err := s.authenticator.TokenService().Get(r) if err != nil { rest.SendErrorJSON(w, r, http.StatusForbidden, err, "failed to verify confirmation token", rest.ErrInternal) return } claims.User.Email = address if _, err = s.authenticator.TokenService().Set(w, claims); err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "failed to set token", rest.ErrInternal) return } render.JSON(w, r, R.JSON{"updated": true, "address": val}) } // POST/GET /email/unsubscribe.html?site=siteID&tkn=jwt - unsubscribe the user in token from email notifications func (s *private) emailUnsubscribeCtrl(w http.ResponseWriter, r *http.Request) { tkn := r.URL.Query().Get("tkn") if tkn == "" { rest.SendErrorHTML(w, r, http.StatusBadRequest, errors.New("missing parameter"), "token parameter is required", rest.ErrInternal, s.templates) return } siteID := r.URL.Query().Get("site") confClaims, err := s.authenticator.TokenService().Parse(tkn) if err != nil { rest.SendErrorHTML(w, r, http.StatusForbidden, err, "failed to verify confirmation token", rest.ErrInternal, s.templates) return } if s.authenticator.TokenService().IsExpired(confClaims) { rest.SendErrorHTML(w, r, http.StatusForbidden, errors.New("expired"), "failed to verify confirmation token", rest.ErrInternal, s.templates) return } elems := strings.Split(confClaims.Handshake.ID, "::") if len(elems) != 2 { rest.SendErrorHTML(w, r, http.StatusBadRequest, errors.New(confClaims.Handshake.ID), "invalid handshake token", rest.ErrInternal, s.templates) return } userID := elems[0] address := elems[1] existingAddress, err := s.dataService.GetUserEmail(siteID, userID) if err != nil { log.Printf("[WARN] can't read email for %s, %v", userID, err) } if existingAddress == "" { rest.SendErrorHTML(w, r, http.StatusConflict, errors.New("user is not subscribed"), "user does not have active email subscription", rest.ErrInternal, s.templates) return } if address != existingAddress { rest.SendErrorHTML(w, r, http.StatusBadRequest, errors.New("wrong email unsubscription"), "email address in request does not match known for this user", rest.ErrInternal, s.templates) return } log.Printf("[DEBUG] unsubscribe user %s", userID) if err = s.dataService.DeleteUserDetail(siteID, userID, engine.UserEmail); err != nil { code := parseError(err, rest.ErrInternal) rest.SendErrorHTML(w, r, http.StatusBadRequest, err, "can't delete email for user", code, s.templates) return } // clean User.Email from the token, if user has the token claims, _, err := s.authenticator.TokenService().Get(r) if err != nil { log.Printf("[DEBUG] unsubscribed user doesn't have valid JWT token to update %s, %v", userID, err) } if claims.User != nil && claims.User.Email != "" { claims.User.Email = "" if _, err = s.authenticator.TokenService().Set(w, claims); err != nil { rest.SendErrorHTML(w, r, http.StatusInternalServerError, err, "failed to set token", rest.ErrInternal, s.templates) return } } // MustExecute behaves like template.Execute, but panics if an error occurs. MustExecute := func(tmpl *template.Template, wr io.Writer, data interface{}) { if err := tmpl.Execute(wr, data); err != nil { panic(err) } } MustRead := func(path string) string { file, err := s.templates.ReadFile(path) if err != nil { panic(err) } return string(file) } tmplstr := MustRead("unsubscribe.html.tmpl") tmpl := template.Must(template.New("unsubscribe").Parse(tmplstr)) msg := bytes.Buffer{} MustExecute(tmpl, &msg, nil) render.HTML(w, r, msg.String()) } // DELETE /email?site=siteID - removes user's email func (s *private) deleteEmailCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) siteID := r.URL.Query().Get("site") log.Printf("[DEBUG] remove email for user %s", user.ID) if err := s.dataService.DeleteUserDetail(siteID, user.ID, engine.UserEmail); err != nil { code := parseError(err, rest.ErrInternal) rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't delete email for user", code) return } // clean User.Email from the token claims, _, err := s.authenticator.TokenService().Get(r) if err != nil { rest.SendErrorJSON(w, r, http.StatusForbidden, err, "failed to verify confirmation token", rest.ErrInternal) return } if claims.User.Email != "" { claims.User.Email = "" if _, err = s.authenticator.TokenService().Set(w, claims); err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "failed to set token", rest.ErrInternal) return } } render.JSON(w, r, R.JSON{"deleted": true}) } // GET /userdata?site=siteID - exports all data about the user as a json with user info and list of all comments func (s *private) userAllDataCtrl(w http.ResponseWriter, r *http.Request) { siteID := r.URL.Query().Get("site") user := rest.MustGetUserInfo(r) userB, err := json.Marshal(&user) if err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "can't marshal user info", rest.ErrInternal) return } exportFile := fmt.Sprintf("%s-%s-%s.json.gz", siteID, user.ID, time.Now().Format("20060102")) w.Header().Set("Content-Type", "application/gzip") w.Header().Set("Content-Disposition", "attachment;filename="+exportFile) gzWriter := gzip.NewWriter(w) defer func() { if e := gzWriter.Close(); e != nil { log.Printf("[WARN] can't close gzip writer, %s", e) } }() write := func(val []byte) error { _, e := gzWriter.Write(val) return e } var merr error merr = multierror.Append(merr, write([]byte(`{"info": `))) // send user prefix merr = multierror.Append(merr, write(userB)) // send user info merr = multierror.Append(merr, write([]byte(`, "comments":`))) // send comments prefix // get comments in 100 in each paginated request for i := 0; i < 100; i++ { comments, errUser := s.dataService.User(siteID, user.ID, 100, i*100, rest.GetUserOrEmpty(r)) if errUser != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, errUser, "can't get user comments", rest.ErrInternal) return } b, errUser := json.Marshal(comments) if errUser != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, errUser, "can't marshal user comments", rest.ErrInternal) return } merr = multierror.Append(merr, write(b)) if len(comments) != 100 { break } } merr = multierror.Append(merr, write([]byte(`}`))) if merr.(*multierror.Error).ErrorOrNil() != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, merr, "can't write user info", rest.ErrInternal) return } } // POST /deleteme?site_id=site - requesting delete of all user info // makes jwt with user info and sends it back as a part of json response func (s *private) deleteMeCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) siteID := r.URL.Query().Get("site") claims := token.Claims{ StandardClaims: jwt.StandardClaims{ Audience: siteID, Issuer: "remark42", ExpiresAt: time.Now().AddDate(0, 3, 0).Unix(), NotBefore: time.Now().Add(-1 * time.Minute).Unix(), }, User: &token.User{ ID: user.ID, Name: user.Name, Attributes: map[string]interface{}{ "delete_me": true, // prevents this token from being used for login }, }, } tokenStr, err := s.authenticator.TokenService().Token(claims) if err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "can't make token", rest.ErrInternal) return } link := fmt.Sprintf("%s/web/deleteme.html?token=%s", s.remarkURL, tokenStr) render.JSON(w, r, R.JSON{"site": siteID, "user_id": user.ID, "token": tokenStr, "link": link}) } // POST /image - save image with form request func (s *private) savePictureCtrl(w http.ResponseWriter, r *http.Request) { user := rest.MustGetUserInfo(r) if err := r.ParseMultipartForm(5 * 1024 * 1024); err != nil { // 5M max memory, if bigger will make a file rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "can't parse multipart form", rest.ErrDecode) return } file, _, err := r.FormFile("file") if err != nil { rest.SendErrorJSON(w, r, http.StatusInternalServerError, err, "can't get image file from the request", rest.ErrInternal) return } defer func() { _ = file.Close() }() id, err := s.imageService.Save(user.ID, file) if err != nil { rest.SendErrorJSON(w, r, http.StatusBadRequest, err, "can't save image", rest.ErrInternal) return } render.JSON(w, r, R.JSON{"id": id}) } func (s *private) isReadOnly(locator store.Locator) bool { if s.readOnlyAge > 0 { // check RO by age if info, e := s.dataService.Info(locator, s.readOnlyAge); e == nil && info.ReadOnly { return true } } return s.dataService.IsReadOnly(locator) // ro manually }
Mid
[ 0.592760180995475, 32.75, 22.5 ]
"use strict"; let assert = require('assert'); let Highest = require('../../lib/Utils/Highest').Highest; let input = { values : [10,20,30,40,30,20,10,20,16,29,15], period : 3 } let expectResult = [30, 40, 40, 40, 30, 20, 20, 29, 29] describe('Highest', function() { it('should calculate Highest using the calculate method', function() { var result = Highest.calculate(input); assert.deepEqual(result, expectResult, 'Wrong Results'); }); })
Low
[ 0.52803738317757, 28.25, 25.25 ]
Bilateral and massive lipoidal infiltration of the cornea (secondary lipoidal degeneration). A 41-year-old white man presented with bilateral white infiltration of the cornea from limbus to limbus. Extensive examination revealed no manifestations of disorders of lipid metabolism and the patient gave no history of previous ocular disease. VDRL and other serological tests were negative. The corneal button removed by penetrating keratoplasty from the right eye was studied by light microscopy, histochemistry and electron microscopy. The light microscopic appearance was consistent with lipoidal degeneration of the cornea associated with stromal vascularization and chronic keratitis, more likely a secondary lipoidal degeneration. Cholesterol clefts were seen in all levels of the stroma focally surrounded by a foreign body giant cell reaction. Lipid vacuoles were observed in extracellular and intracellular locations within histiocytes and fibroblasts in vascularized and inflammed areas. Lipid stains disclosed cholesterol crystals, neutral fats, and phospholipids.
Mid
[ 0.5900900900900901, 32.75, 22.75 ]
Earlier this week, EFF learned that a "Broadcast Flag" amendment might slip past legislative gates as part of an appropriations bill. We quickly sent out an action alert to EFF supporters in states with senators on the Senate Appropriations Committee, warning that within 48 hours, we could see a new law that would give Hollywood permanent veto power over how we use over-the-air digital television and force American innovators to beg the government for permission before adding new features to TV. It's easy to see how this could happen. Despite the courts striking down the flag and powerful opposition in the Internet community, in many circles it's still considered "non-controversial." But that was Monday evening. Within the space of a few hours, the action alert hit the Internet. And you slammed Congress. By 6 p.m. on Tuesday, the 27 members of the Senate Appropriations Committee received *more than 11,000 emails and faxes* from EFF supporters. That's nearly 500 faxes an hour. Dianne Feinstein alone received more than 2,600 messages in her inbox. Kay Hutchison, the senior senator for Texas, received 1,441 letters. And these are just the numbers EFF has. We don't track telephone calls. But we do know that many of you listened when we joined Public Knowledge in urging you to call your senators directly. If you tried to call and the line was engaged, it was likely occupied by someone else griping about the same amendment. Staffers report that they are "swamped." Today, the phone calls, email messages, and faxes continue to flood in. This is a mass protest even without voices from many of the more populous states, which don't have senators on the committee. Suffice it to say that you don't get that kind of reaction except for *very* controversial bills. You did it. You got the attention of every senator on the Appropriations Committee. And so far, it's working. No one proposed a Broadcast Flag amendment in the sub-committee on Tuesday. The next opportunity will be Thursday at 2 p.m. By then, everyone on the committee will have been briefed by their besieged staffers. And in the briefings will be words to the effect that this is an issue with "a great deal of voter concern." For these senators, the Broadcast Flag now comes with its own red flag. It's not over yet. The entertainment industry lobbyists won't give up easily, and there are plenty of sneaky tricks left to pull. But by acting now, you've given your legislator a reason to decline Hollywood's advances. You may even have given a few the back-up necessary to *keep* declining. We challenge you to keep the momentum going. Tell your friends and family about the Broadcast Flag, and forward the URL below. You know can make a difference - you already have. Internet Entrepreneur Joe Kraus Joins EFF Board Founder of DigitalConsumer.org Is a Perfect Fit for Digital Liberties Organization San Francisco, CA - This week, EFF welcomed the newest member of its executive board, Internet entrepreneur Joe Kraus. The founder of DigitalConsumer.org, a grassroots organization devoted to helping consumers get fair use access to digital media, Kraus has more than a decade of experience working on Internet-related ventures. He was a founder of Excite.com in the early 1990s, and he is currently the CEO of JotSpot, a maker of wiki-based applications. He is also an angel investor who works with early-stage technology companies. "I think the work of EFF is critical to a thriving and innovative online world where people are free to create new technologies, content, and communities," said Kraus. "Without the EFF, the Internet would be a smaller, darker place." EFF Executive Director Shari Steele said, "We're thrilled to have Joe on our board, and we look forward to getting his input into current and future EFF projects." Other members of EFF's executive board include Brad Templeton, John Gilmore, Pam Samuelson, Lawrence Lessig, John Perry Barlow, Brewster Kahle, and Dave Farber. Upholding the Legality of Reverse Engineering Judges Weigh Issues in Eighth Circuit Videogame Case St. Louis, MO - Judges in the Eighth Circuit Court of Appeals heard oral arguments this week in Blizzard v. BnetD, a case that pits a large videogame corporation against three game-loving software developers. Blizzard sued the developers because they created an open-source program called BnetD, which lets people play popular Blizzard titles like "Warcraft" with other gamers online. Blizzard maintains its own game server, Battle.net, and claims that the developers violated its end user license agreements (EULAs) and the Digital Millennium Copyright Act (DMCA) when they reverse-engineered a protocol used in Battle.net to create their own program. EFF is representing the BnetD programmers to fight for the right to reverse-engineer and build alternative platforms for legitimately purchased software. Arguing on the programmers' behalf was EFF co-counsel Paul Grewal of Day Casebeer Madrid & Batchelder, assisted by EFF Staff Attorney Jason Schultz. "The judges were struggling with the right questions," said Schultz. "They're trying to balance copyright interests with the right to reverse engineer. They clearly recognized the public interest in reverse engineering, but they admitted this would be a hard case to decide." Congress expressly recognized the importance of reverse engineering when it created an exception to the DMCA for this activity. Whether it's allowing gamers to choose a better server for Internet play, or allowing a printer owner to purchase from a range of printer cartridge replacements, reverse engineering is a critical part of innovation in a world where more and more devices need to talk to each other in order to operate correctly. EFF Joins Battle to Protect the Right to Read Anonymously, Publishers' Rights EFF has joined eight other civil liberties and consumer rights organizations, including Public Citizen and the ACLU of Maryland, in a legal battle to protect the anonymity of subscribers to an online financial newsletter. In the case, Forensic Advisors v. Matrixx Initiatives, Inc., the pharmaceutical company Matrixx is attempting to force the publisher of the newsletter to divulge the subscriber list because, for reasons that it hasn't adequately explained, the company believes that it will help identify several "John Does" who allegedly defamed Matrixx and its products on Internet message boards. Matrixx sells a nasal decongestant that members of the news media and the general public have alleged causes permanent loss of the sense of smell. In a joint friend-of-the-court brief, EFF argues that the Maryland news media privilege prevents disclosure of sources and information collected in the course of reporting, and that the First Amendment right to read anonymously bars disclosure of a list of readers and subscribers. "Anonymity has a long and celebrated history in the United States, beginning with the pseudonymous advocates of the United States Constitution," the brief states. "People choose to maintain anonymity regarding what they read for many reasons, including forestalling assumptions about their beliefs and associations, maintaining privacy, and avoiding harassment, threats, frivolous litigation, or social stigma." EFF Seeks Experienced, Dynamic Membership Coordinator EFF is searching for a dynamic Membership Coordinator (MC) with a successful track record. The Membership Coordinator reports to the Director of Development and is a key component of EFF's fundraising activities. The MC is responsible for managing contact with EFF's members, helping to develop strategies to grow the membership, donor and membership databases; processing donations, thank-you letters and renewal notices; managing the donation pages of the website; and responding to any issues members may have. The MC also manages EFF's online shop, including order fulfillment. The MC also attends a number of commercial conferences each year, managing the EFF booth presence and speaking informally with conference attendees. The position requires enthusiasm and a flexible, can-do attitude with a strong affinity for quality customer service. Having the initiative to sniff out and solve problems independently is essential, as is the dedication to perform daily tasks with minimal oversight. The position offers the opportunity to learn about all aspects of nonprofit fundraising, as well as digital civil liberties issues, in a hard-working, fun office environment. Seven Nights 'til Copynight Putting the "pub" into public domain, the monthly copyfighters' meet-up is next Tuesday, in Chicago, San Francisco, Houston, New York, Nashville, and elsewhere all across the nation:http://www.copynight.org/ Survey Says: If You Understood the Question, You Probably Want Legal Music-Sharing The more people use technology, the more they want filesharing protected, concludes a Digital Life America survey:http://p2pnet.net/story/5275 After Dealing with Cake Infringers, Disney Goes After Pinata Makers Evidently, film industry lawyers are running through checklist of "fun things our loyal customers do that we can spoil":http://blogs.law.harvard.edu/palfrey/2005/06/20 FTC Says Law Requiring "ADV:" in Spam Subject Lines Won't Help Maybe if they demanded the messages all say "Hey sex1y viagr1 d3alz:," they would get more take-up:http://www.ftc.gov/opa/2005/06/adv1.htm Reproduction of this publication in electronic media is encouraged. Signed articles do not necessarily represent the views of EFF. To reproduce signed articles individually, please contact the authors for their express permission. Press releases and EFF announcements & articles may be reproduced individually at will.
High
[ 0.67024128686327, 31.25, 15.375 ]
Approach to the biosynthesis of atisine-type diterpenoid alkaloids. To determine the biosynthesis pathway of the atisine-type diterpenoid alkaloids spiramines A/B and C/D, feeding experiments in in vitro cultured plantlets and enzymatic transformations in cell-free extracts were performed in combination with LCMS and tandem MS analyses. L-[2-(13)C,(15)N]Serine was used in the feeding experiments and enzymatic transformations, and the diterpene spiraminol was identified as a biosynthetic precursor of spiramine alkaloids. The LCMS and tandem MS spectra of the extracts from these experiments indicated that L-[2-(13)C,(15)N]serine was incorporated into spiramines A/B and C/D. The labeled reaction products show that l-serine is the one possible nitrogen source involved in the biosynthesis of atisine-type DAs.
High
[ 0.669902912621359, 34.5, 17 ]
Q: Change pane of existing tileLayer in Leaflet interactively I'm developing a map application in Leaflet with multiple Layers (Tile-Layer and TopoJSON). I would like a button, which moves the Tile-Layer in front of the other Layers. Therefore I need to put the Tile-Layer into a pane with a z-Index > 400 (see Map Panes). This works fine when initializing the Tile-Layer, but how do I move an existing Tile-layer into another pane in the foreground after having initialised it (change "pane: 'tilePane'" to "pane: 'layerForeground'")? map.createPane('layerForeground'); map.getPane('layerForeground').style.zIndex = 650; var SWEmean71_00Apr =L.tileLayer('data/maps/e01_swe/tiles/3857_Mittelwert/{z}/{x}/{y}.png', { maxZoom: 12, minZoom: 7, tms: false, pane: 'tilePane', })//.addTo(map); A: Leaflet layers can not change panes dynamically. Panes are too tightly coupled to the initialization of the HTMLElements for the layers' containers. You can, however, change the zIndex of a map pane dynamically. So you can set a unique pane for each of your tilelayers, and change their z-indexes when you need to change their order.
Low
[ 0.5351043643263751, 35.25, 30.625 ]
Blinded by Risk. A small illustration of how this happens to all of us. This post is a story about how a simple game gave us insight into something quite profound; the blinding effect of seemingly innocuous negative information. A number of years ago, we designed a small exercise to demonstrate the idea of how a company can have beliefs about business “truths” that prevent them from seeing important opportunities. The example that got us thinking was the squeezable ketchup bottle. Heinz had dominated the market in ketchup sales. When approached by the inventors of the plastic bottle, they dismissed it. They believed their traditional glass bottle and the ritual of coaxing the thick ketchup out by tapping the bottle was iconic of their brand and important to their customers, and therefore a key factor in maintaining their position. We all know what happened. Hunts picked up on the plastic bottle and stole a large portion of Heinz’s market share. Although Heinz now has the plastic bottle, they lost critical dominance for a long time. Now, nearly all condiments are available in plastic bottles. We started listing other radical ideas which had become important eventually but which were at first rejected by leading industries. The SUV, digital photography, the personal computer and even the television, were radical ideas at the time of invention. We ended up with 10 stories. We realized that each of these stories has six components: The idea itself. The reasons why it’s a good idea from the point of view of the company that adopted it. The reasons why the idea is not needed, too risky, or a violation of the product’s image from the point of view of the company that rejected it. The name of the company that avoided the idea and their market position at the time The name of the company that embraced the idea and their market position at the time. The eventual outcome financially for both companies. We put the six elements of each story on a separate card and arranged them in a series to show how easy it would be to miss important ideas. Given that we then had a set of 60 cards, we had the idea of color coding each of the six types just to keep them straight. The reasons for not adopting the new innovation happened to be “red” cards. The value of the idea was on a green card. The outcomes were on yellow cards, a description of the idea itself was on a blue card, and so on. This small puzzle made it easy to see the point, but it also showed us something else. Sometimes we asked people to complete the series and try to match the product with its story elements. We noticed that when people started their series with the red card, it took them much longer to complete the sets. A little later, while giving a talk at a major university’s MBA program, we broke the audience into two teams. So they wouldn’t know they were working with the same cards, we asked one group to arrange all the red cards vertically and add the matching cards from left to right in order to complete the 10 stories. We asked the other team to do the same beginning with the green cards. The “green team” finished in about 7 or 8 minutes. The “red” team never finished. At the time this was very embarrassing for the participants and a little disconcerting to us, but it also intrigued me. Starting your thinking with the reasons not to do something clearly had an impact, evenwhen you don’t know what the idea is yet (this was on the blue cards) and it’s not even your industry. In groups, this effect turned out to be much worse. We started doing this two-team exercise with groups before a presentation or a speech in order to illustrate how the starting point of a discussion can influence the whole outcome. We had to stop because after numerous tries we realized that no groupwho began with red cards ever finished their sets and this was very upsetting for them. What does this mean? The original idea was to demonstrate the phenomenon philosophers refer to as “shared meaning”, which is specific to our species. In other words, we participate with other people in common activities and as a result, eventually share their world view. This happens on a very large scale – at one time everyone believed the earth was flat – or on a micro-cultural level, such as a group of friends having the same world-view. In the same way, people who work for the same company can come to share a common “truth” about the business they are in and what is possible. But what we observed here was much more powerful and potentially much more disturbing. Even when people do not know each other, know anything about the innovation, or even work for the same company, the manner in which they are introduced to a common task can have a profound impact. A card with four lines indicating the risks of an idea caused them to be completely blinded. They literally could not find the cards that went logically with these risks but rather believed them as self-evident truths that cannot be challenged. Conversely, the same kinds of teams of strangers who began with the positive outcomes of an idea—an idea that they also did not yet have knowledge of – had a smooth path to see not only the opportunities, but also to finding the card that described the risks, even though they turned out to be unfounded. It is possible that we tapped into a fundamental cognitive mechanism. Beginning with a positive outcome may not only allow innovation to be recognized, but also put the risks in perspective. In other words, it might actually be a more objective way to see the whole picture. But more to the point of this article, these two paths can happen easily, instantly, out of context and can be very hard to change once turned on. A small starting thought may literally determine what you can see next in the landscape of information, even when solving a small card puzzle. Fortunately, it can also be undone easily, instantly and out of context, but that’s the subject of my next post……
Mid
[ 0.5498007968127491, 34.5, 28.25 ]
name=Route 46 type=Mountain {0|74|40|1,2,3|2,3} {0|74|45|0|2,4} {0|21|35|1,2,3|2,3} {0|19|20|1,2,3|2,2} {0|19|50|0|2,3} {0|39|5|-1|3,5} {0|231|5|1,3|2,2} {1|21|80|-1|10,10} {1|163|50|-1|10,10} {1|204|30|-1|10,10} {1|190|20|-1|10,10} {1|164|10|-1|10,10} {1|12|5|-1|10,10} {1|15|5|-1|10,10} {1|214|30|-1|10,10} {1|10|15|-1|10,10} {1|11|5|-1|10,10} {1|13|15|-1|10,10} {1|14|5|-1|10,10}
Low
[ 0.47982062780269, 26.75, 29 ]
For the Cancer Consortium Community: Biobehavioral and Outcomes Research Affinity Group (BORG) Jason A. Mendoza, MD, MPH will be presenting on a recently completed pilot bicycle train randomized controlled trial (RCT). His will also discuss the development of machine learned algorithms that used accelerometer and GPS data to automatically identify various types of sedentary and physical activities that were used in the RCT. Refreshments will provided. About the Speaker Dr. Jason Mendoza is an Associate Professor at the University of Washington and an Investigator at Seattle Children’s Research Institute, as well as the Associate Director of Minority Health and Health Disparities and Associate Program Head of the Cancer Prevention Program at Fred Hutchinson Cancer Research Center. Dr. Mendoza has devoted his career to studying the promotion of physical activity and healthy eating among low-income and racial/ethnic minority children. He conducts community-engaged research on eliminating health inequities by reducing screen time, such as television viewing, and increasing physical activity, such as through Safe Routes to School programs. He leads research on the influence of food insecurity on chronic diseases, such as diabetes, among adolescents and young adults. He also co-leads mHealth interventions to promote physical activity among AYA cancer survivors. This website was developed by the Institute of Translational Health Sciences. This project was supported by the National Center for Advancing Translational Sciences, National Institutes of Health, through Grant Number UL1 TR002319. Its contents are solely the responsibility of the authors and do not necessarily represent the official views of the NIH.
Mid
[ 0.643326039387308, 36.75, 20.375 ]
Transoral surgical treatment of Eagle's syndrome: case report and review of literature. Eagle's syndrome is a symptomatic abnormal length of the styloid process and/or a calcification of the stylohyoid ligament. Diagnosis is based on common pharyngeal symptoms and is confirmed by radiologic examination, more particularly CT-scan. Medical and surgical treatments are described. Medical treatment consists in repeated local anaesthetics, steroid infiltration or analgesics administration. It is purely symptomatic and has no long-term effectiveness. Surgical treatment remains the treatment of choice and consists of removal of the abnormal process. Both transoral and external approaches have been described. The advantages of the transoral approach is a shorter operative time, the absence of aesthetic prejudice and a lesser risk of neurovascular injury. Few post operative complications have been described (surgical cervical emphysema, cervical swelling, trismus and moderate breathing difficulty) but none of the studies reported neurovascular injury, deep cervical infection nor long-term complication. We present the technique, a case report and a review of the literature of the transoral approach.
High
[ 0.684073107049608, 32.75, 15.125 ]
import classNames from 'classnames'; import ensureArray from 'ensure-array'; import React, { PureComponent } from 'react'; import store from 'app/store'; import Widget from './Widget'; import styles from './widgets.styl'; class DefaultWidgets extends PureComponent { render() { const { className } = this.props; const defaultWidgets = ensureArray(store.get('workspace.container.default.widgets')); const widgets = defaultWidgets.map(widgetId => ( <div data-widget-id={widgetId} key={widgetId}> <Widget widgetId={widgetId} /> </div> )); return ( <div className={classNames(className, styles.widgets)}> {widgets} </div> ); } } export default DefaultWidgets;
Mid
[ 0.59090909090909, 30.875, 21.375 ]
Orko Heroic court magician Homeworld Trolla Species Trollan Gender Male Hair color none Era Present Family Unknown Affiliation Heroic Warriors Abilities Powerful (but unreliable) magic Played by Erik Gunden Gabe Khouth Orko is a character from the Masters of the Universe franchise. The character was not originally developed for the 1980s toy line, but was instead created by Filmation to provide comic relief in the He-Man and the Masters of the Universe animated series. Owing to the popularity of the series and the character, Mattel later produced an Orko action figure, and he has had a major role in the franchise ever since. The character was named Gorpo in the early original series drafts, and that name was still used in the Brazilian Portuguese dub of the original series, but he was renamed Orko for animation purposes; Filmation artists often flipped the character cels, a technique that works best when the characters are symmetrical in design, and putting a "G" on Orko's shirt would have complicated the process. Character information Orko is a "Trollan", a race of beings from the extradimensional world of Trolla. Like all Trollans, Orko appears to be a diminutive blue humanoid, capable of floating in mid-air, whose appearance is almost completely hidden beneath a robe, hat, and scarf. Little more than Orko's hands, ears, and eyes are ever seen by the audience, as Trollan custom only rarely permits the revelation of one's face. Orko's face was designed in production drawings but never appeared in the series; when his clothing is removed he is always obscured. The laws of nature on Trolla are vastly different than those on Eternia, so although Orko is an accomplished wizard on his homeworld, his spells usually backfire or malfunction when he aids He-Man in adventure or provides entertainment in the Royal Palace. However, this premise is not consistently applied in the Filmation series; in some episodes Orko is equally incompetent on Trolla, and in others his uncle Montork is a powerful magician on both worlds. In the 2002 series, Orko is shown to be a slightly more competent magician, although he indicates he lost a wand when he arrived on Eternia that enhanced his abilities. In addition to his magic spells, Orko also stores a plethora of items, some useful, some not-so-useful, inside his hat. The sheer number of things he stores inside the hat is impossibly great, suggesting that the hat itself is a bag of holding under some kind of magic spell. Orko came to Eternia when a "cosmic storm" accidentally transported him there. He appeared in the Tar Swamp, where he found a young Prince Adam and his pet, Cringer, at the time a tiger cub, and saved them both from dying in the tar. However, he lost his pendant in the process after colliding with a tree. Stuck on Eternia, Orko was made Royal Buffoon by the King of Eternia in gratitude for having saved his son. Orko became one of Adam's closest friends; in fact, Orko knows that Adam is secretly He-Man, although it is never revealed how he found out. However, Orko frequently annoys Man-At-Arms, due to his magic constantly backfiring or Orko coming into his lab unexpected and uninvited and messing with his equipment, which gets on Man-At-Arms' nerves rather than amusing him as it does others. Orko has proven to be a good friend and a valuable ally, despite his unpredictable powers and the fact he is more than a little clueless. Sometimes Orko wonders how useful he is to He-Man, but despite his apparent cowardliness, he never fails to help those in need. Orko returns to Trolla, with the help of others, on a number of occasions. The first time, he helps He-Man save the life of several Trollans captured by a humanoid dragon called Dragoon, and begins a romance with a Trollan girl named Dree Elle. However, he decides that his place is now on Eternia, and so he returns there. However, he still occasionally visits his friends and relatives on Trolla. Through his friendship with Adam/He-Man, Orko also knows that his twin sister Adora is She-Ra but didn't meet her when he ended up on Etheria by accident. Also, Orko strikes up a friendship with Madame Razz. 2002 Animated Series In the 2002 series, Orko is more or less the same, but it is revealed that he and Cringer followed Prince Adam to Castle Grayskull and watched him transform into He-Man for the first time. Orko then follows He-Man and the new Battle Cat into battle and almost reveals He-Man's identity to Teela and the other Masters, despite having been warned by both The Sorceress and He-Man not to. Fortunately, Man-At-Arms, quickly steps in and stops him, informing Teela and the other Masters that the new hero is He-Man and that the Sorceress had told him of He-Man's coming beforehand. In this series Orko was a very powerful wizard but when he came to Eternia and saved Prince Adam, he lost his wand, which was needed to control his magic (reminiscent of the loss of his amulet in the original series). A flashback episode, "The Power of Grayskull", which reveals the history of Adam's ancestor King Grayskull, going on a quest for power to defend Eternia, and Grayskull encountered an Oracle who looked and sounded much like Orko, suggesting that other Trollans might have found their way to Eternia.[1] 2004 Comics In MVCreations' last He-Man comic, Orko disastrously lost control of another of his magic spells. After a flashback to Trolla, where he fought monsters as "Orko the Great" while Dree Elle, Montork, and Gark looked on, he again asks the sorceress to help him return home. She directs him to the Oracle of Zalesia, and after he and He-Man get directions from the Faceless One, they find the ruins of his temple. There, the Oracle offers him a choice: the material he needs to create a doorway to Trolla, or a map that would give him a larger role in the war for Eternia. Recognizing the Oracle's writing, Orko realizes he's also a Trollan, and chooses the map. The Oracle assures him he made the right choice, and his time to return home would come. The map led Orko to his missing wand, and Adam reintroduced him to the royal court as Orko the Great. Powers Orko has powerful magic abilities, but he cannot always cast his spells correctly. He is a great magician, but a muddled one, which is implied to be a result of the laws of nature and physics being so much different on Eternia than they are on Trolla (where his magic is at its strongest). His magic is so powerful that it has been able to affect the sword of He-Man, taking it away from its owner. Orko also has a magic wand that makes his magic work flawlessly. In the comics, he was able to fight with Skeletor magically.
Low
[ 0.5102880658436211, 31, 29.75 ]
/* * Copyright 2020 ThoughtWorks, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ import {Hg} from "models/materials/spec/material_test_data"; import { BranchOrRefspecValidator, DependencyMaterialAttributes, GitMaterialAttributes, HgMaterialAttributes, Material, P4MaterialAttributes, ScmMaterialAttributes, SvnMaterialAttributes, TfsMaterialAttributes } from "models/materials/types"; import {ValidatableMixin} from "models/mixins/new_validatable_mixin"; import {Configurations} from "../../shared/configuration"; import {PluginMetadata, Scm} from "../pluggable_scm"; import {DependencyMaterialAttributesJSON} from "../serialization"; describe("Material Types", () => { describe("BranchOrRefspecValidator", () => { it("allows blank branch", () => { expect(isValid(null)).toBe(true); expect(isValid("")).toBe(true); expect(isValid(" ")).toBe(true); }); it("rejects branch with wildcard", () => { expect(new Foo("branch-*").errors().errorsForDisplay("branch")).toBe("Branch names may not contain '*'."); }); it("rejects malformed refspec", () => { expect(validating(":a")).toBe("Refspec is missing a source ref."); expect(validating(" :b")).toBe("Refspec is missing a source ref."); expect(validating("refs/foo: ")).toBe("Refspec is missing a destination ref."); expect(validating("refs/bar:")).toBe("Refspec is missing a destination ref."); expect(validating(":")).toBe("Refspec is missing a source ref. Refspec is missing a destination ref."); expect(validating(" : ")).toBe("Refspec is missing a source ref. Refspec is missing a destination ref."); expect(validating("a:b")).toBe("Refspec source must be an absolute ref (must start with `refs/`)."); expect(validating("refs/heads/*:my-branch")).toBe("Refspecs may not contain wildcards; source and destination refs must be exact."); expect(validating("refs/heads/foo:branches/*")).toBe("Refspecs may not contain wildcards; source and destination refs must be exact."); expect(validating("refs/heads/*:branches/*")).toBe("Refspecs may not contain wildcards; source and destination refs must be exact."); }); it("accepts valid refspecs", () => { expect(isValid("refs/pull/123/head:pr-123")).toBe(true); expect(isValid("refs/pull/123/head:refs/my-prs/123")).toBe(true); }); function validating(branch: string | null): string { return new Foo(branch).errors().errorsForDisplay("branch"); } function isValid(branch: string | null): boolean { return !new Foo(branch).errors().hasErrors(); } class Foo extends ValidatableMixin { branch: string | null; constructor(branch: string | null) { super(); this.branch = branch; this.validateWith(new BranchOrRefspecValidator(), "branch"); this.isValid(); } } }); describe("Deserialize", () => { it("should deserialize hg material with branch", () => { const hgJson = Hg.withBranch(); const hgMaterialAttributes = HgMaterialAttributes.fromJSON(hgJson); expect(hgMaterialAttributes.branch()).toBe(hgJson.branch); }); it('should deserialize dependency material', () => { const json = { name: "dependencyMaterial", pipeline: "upstream", stage: "stage", ignore_for_scheduling: false } as DependencyMaterialAttributesJSON; const materialAttrs = DependencyMaterialAttributes.fromJSON(json); expect(materialAttrs.name()).toBe(json.name); expect(materialAttrs.pipeline()).toBe(json.pipeline); expect(materialAttrs.stage()).toBe(json.stage); expect(materialAttrs.ignoreForScheduling()).toBeFalse(); }); }); describe("Validation", () => { it("should should validate Git material attributes", () => { const material = new Material("git", new GitMaterialAttributes()); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(1); expect(material.attributes()!.errors().keys()).toEqual(["url"]); }); it("should should validate SVN material attributes", () => { const material = new Material("svn", new SvnMaterialAttributes()); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(1); expect(material.attributes()!.errors().keys()).toEqual(["url"]); }); it("should should validate P4 material attributes", () => { const material = new Material("p4", new P4MaterialAttributes()); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(2); expect(material.attributes()!.errors().keys()).toEqual(["view", "port"]); expect(material.attributes()!.errors().errorsForDisplay("port")) .toEqual("Host and port must be present."); }); it("should should validate Hg material attributes", () => { const material = new Material("hg", new HgMaterialAttributes()); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(1); expect(material.attributes()!.errors().keys()).toEqual(["url"]); }); it("should should validate TFS material attributes", () => { const material = new Material("tfs", new TfsMaterialAttributes()); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(3); expect(material.attributes()!.errors().keys()).toEqual(["url", "projectPath", "username"]); }); it("should validate name if provided", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "http://host")); expect(material.isValid()).toBe(true); material.attributes()!.name("foo bar baz"); expect(material.name()).toBe("foo bar baz"); expect(material.isValid()).toBe(false); expect(material.attributes()!.errors().count()).toBe(1); expect(material.attributes()!.errors().keys()).toEqual(["name"]); expect(material.attributes()!.errors().errorsForDisplay("name")) .toBe( "Invalid name. This must be alphanumeric and can contain hyphens, underscores and periods (however, it cannot start with a period). The maximum allowed length is 255 characters."); }); it("should validate destination directory if provided", () => { const attrs = new GitMaterialAttributes(undefined, true, "http://host"); const material = new Material("git", attrs); assertValidPaths(material, attrs, [ "", "foo/bar", "./somepath", "here", "here or there" ]); assertInvalidPaths(material, attrs, [ "..", "../up", ". ", " .", "/root" ]); function assertValidPaths(material: Material, attrs: ScmMaterialAttributes, paths: string[]) { for (const path of paths) { attrs.destination(path); expect(material.isValid()).toBe(true, `${path} should be valid`); expect(attrs.errors().hasErrors("destination")).toBe(false, `${path} should yield no errors`); } } function assertInvalidPaths(material: Material, attrs: ScmMaterialAttributes, paths: string[]) { for (const path of paths) { attrs.destination(path); expect(material.isValid()).toBe(false, `${path} should be invalid`); expect(attrs.errors().hasErrors("destination")).toBe(true, `${path} should yield errors`); expect(attrs.errors().errorsForDisplay("destination")) .toBe("Must be a relative path within the pipeline's working directory."); } } }); it("should should allow Git SCP-style URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "git@host:repo.git")); expect(material.isValid()).toBe(true); expect(material.errors().count()).toBe(0); expect(material.attributes()!.isValid()).toBe(true); expect(material.attributes()!.errors().count()).toBe(0); }); it("should should allow SSH URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "ssh://git@host/repo.git")); expect(material.isValid()).toBe(true); expect(material.errors().count()).toBe(0); expect(material.attributes()!.isValid()).toBe(true); expect(material.attributes()!.errors().count()).toBe(0); }); it("should should validate Git URL credentials", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "http://user:pass@host", "master", false, "user", "pass")); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(1); expect(material.attributes()!.errors().keys()).toEqual(["url"]); expect(material.attributes()!.errors().errorsForDisplay("url")) .toBe("URL credentials must be set in either the URL or the username+password fields, but not both."); }); it("should should validate Hg URL credentials", () => { const material = new Material("hg", new HgMaterialAttributes(undefined, true, "http://user:pass@host", "user", "pass")); expect(material.isValid()).toBe(false); expect(material.errors().count()).toBe(0); expect(material.attributes()!.errors().count()).toBe(1); expect(material.attributes()!.errors().keys()).toEqual(["url"]); expect(material.attributes()!.errors().errorsForDisplay("url")) .toBe("URL credentials must be set in either the URL or the username+password fields, but not both."); }); it('should validate Scm material', () => { const material = new Scm("", "", false, new PluginMetadata("", ""), new Configurations([])); const isValid = material.isValid(); expect(isValid).toBeFalse(); expect(material.errors().count()).toBe(1); expect(material.errors().errorsForDisplay('name')).toBe('Name must be present.'); expect(material.pluginMetadata().errors().count()).toBe(1); expect(material.pluginMetadata().errors().errorsForDisplay('id')).toBe('Id must be present.'); }); }); describe('Serialization', () => { it('should serialize dependency materials', () => { const dependencyAttrs = new DependencyMaterialAttributes("name", false, "pipeline", "stage", false); expect(Object.keys(dependencyAttrs.toJSON())).not.toContain('destination'); }); it('should serialize git materials', () => { const gitAttrs = new GitMaterialAttributes("name", false, "some-url"); expect(Object.keys(gitAttrs.toJSON())).not.toContain('destination'); gitAttrs.destination("some-dest"); expect(Object.keys(gitAttrs.toJSON())).toContain('destination'); }); }); it('should reset password if it is present and has been updated', () => { const material = new Material("git", new GitMaterialAttributes("name", true, "some-url", "master", false, "username", "password")); const attrs = (material.attributes() as GitMaterialAttributes); attrs.password().edit(); expect(attrs.password().value()).toBe(''); material.resetPasswordIfAny(); expect(attrs.password().value()).toBe('password'); }); describe('Clone', () => { it('should clone only the type is attrs are not present', () => { const material = new Material("git"); const clone = material.clone(); expect(clone.type()).toBe(material.type()); expect(clone.attributes()).toBeUndefined(); }); it('should clone the attrs as well', () => { const material = new Material("git", new GitMaterialAttributes("name", true, "some-url", "master", true, "username", "password")); const clone = material.clone(); expect(clone.type()).toBe(material.type()); expect(clone.attributes()!.name()).toEqual(material.attributes()!.name()); expect(clone.attributes()!.autoUpdate()).toEqual(material.attributes()!.autoUpdate()); expect((clone.attributes()! as GitMaterialAttributes).url()).toEqual((material.attributes()! as GitMaterialAttributes).url()); expect((clone.attributes()! as GitMaterialAttributes).branch()).toEqual((material.attributes()! as GitMaterialAttributes).branch()); expect((clone.attributes()! as GitMaterialAttributes).shallowClone()).toEqual((material.attributes()! as GitMaterialAttributes).shallowClone()); expect((clone.attributes()! as GitMaterialAttributes).username()).toEqual((material.attributes()! as GitMaterialAttributes).username()); expect((clone.attributes()! as GitMaterialAttributes).password().valueForDisplay()).toEqual((material.attributes()! as GitMaterialAttributes).password().valueForDisplay()); }); }); describe('DisplayNameSpec', () => { it('should return the url as display name if name is undefined', () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "http://repo.git")); expect(material.displayName()).toBe('http://repo.git'); }); it('should mask the user info for http/https url', () => { const attrs = new GitMaterialAttributes(undefined, true, "http://user:[email protected]"); const material = new Material("git", attrs); expect(material.displayName()).toBe('http://user:******@repo.git'); attrs.url("http://[email protected]"); expect(material.displayName()).toBe('http://******@repo.git'); }); it("should not mask Git SCP-style URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "git@host:repo.git")); expect(material.displayName()).toBe('git@host:repo.git'); }); it("should not mask SSH URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "ssh://git@host/repo.git")); expect(material.displayName()).toBe('ssh://git@host/repo.git'); }); it("should not mask SSH+SVN URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "ssh+svn://git@host/repo.git")); expect(material.displayName()).toBe('ssh+svn://git@host/repo.git'); }); }); describe('MaterialUrlSpec', () => { it('should return the url as display name if name is undefined', () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "http://repo.git")); expect(material.displayName()).toBe('http://repo.git'); }); it('should mask the user info for http/https url', () => { const attrs = new GitMaterialAttributes(undefined, true, "http://user:[email protected]"); const material = new Material("git", attrs); expect(material.displayName()).toBe('http://user:******@repo.git'); attrs.url("http://[email protected]"); expect(material.displayName()).toBe('http://******@repo.git'); }); it("should not mask Git SCP-style URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "git@host:repo.git")); expect(material.displayName()).toBe('git@host:repo.git'); }); it("should not mask SSH URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "ssh://git@host/repo.git")); expect(material.displayName()).toBe('ssh://git@host/repo.git'); }); it("should not mask SSH+SVN URLs", () => { const material = new Material("git", new GitMaterialAttributes(undefined, true, "ssh+svn://git@host/repo.git")); expect(material.displayName()).toBe('ssh+svn://git@host/repo.git'); }); it('should mask the user info in url for Hg material', () => { const hgAttrs = new HgMaterialAttributes(undefined, true, "http://user:[email protected]"); const material = new Material("hg", hgAttrs); expect(material.displayName()).toBe('http://user:******@example.com'); hgAttrs.url("http://[email protected]"); expect(material.displayName()).toBe('http://******@example.com'); }); }); });
Mid
[ 0.5392354124748491, 33.5, 28.625 ]
Morningdew Dice Bags Bidet! Morningdew Dice Bags specializes in dice bags in fun prints with a pop of color. We have recently added a line of Dragonscale bags to the product line up. The dragonscale bags features reversible sequins that when reversed display silver or black. We also feature Critical Role inspired dice bags such as Jester's Donut bag! New designs are released frequently so be sure to check back often! Morningdew Dice Bags also takes custom orders. We are happy to work with our customers to build a bag of their dreams. For International Tabletop Day Morningdew Dice Bags is offering 15% off all dice bags! Black Thread Goods Tired of fishing your dice out from under the couch after they fall off the table? Black Thread Goods offers custom dice trays to keep your dice on the table in style. Check out one of the many designs available. Want something custom? Just drop me a message and we will work together to get a tray you will love. New patterns are available often! For International Table Top Day, BTG is offering 15% off all orders!
Mid
[ 0.5416666666666661, 32.5, 27.5 ]
Lord High Constable of Sweden The Lord High Constable ( or only Marsk) was a prominent and influential office in Sweden, from the 13th century until 1676, excluding periods when the office was out of use. The office holder was a member of the Swedish Privy Council and, from 1630 and on, the head of the Swedish Council of War. From 1634, the Lord High Constable was one of five Great Officers of the Realm. Middle Ages In a letter from 1268, during the reign of Valdemar Birgersson, the title marscalcus of the king is mentioned. The holder of the prestigious title is a nobleman, but it is not possible to decide much about the assignments belonging to it. It is possible that the marsk, or the constable, replaced the stabularius that previously governed the king's mounted following. Constable Torgils Knutsson was the foremost among the powerful men that ruled Sweden during the childhood of king Birger Magnusson in the late 13th century. Later constables seem to only occasionally be called upon by the king, without having regular tasks to fulfill. Queen Margaret, who tried to reclaim power that previous kings had lost, chose to have neither a Lord High Constable nor a Lord High Steward. Her successor Eric of Pomerania was forced by the Swedish noblemen to appoint a constable. Thus, in 1435, Karl Knutsson Bonde, a future Swedish king, became the first constable for quite some time. In a suggestion to a treaty of the Kalmar union from 1436, the constable got responsibilities in two areas: law/justice and heading the country's army in war time. For most of the remaining part of the 15th century, the office was vacant. Early modern period Lars Siggesson Sparre, long-time constable of Gustav I, was a significant figure during his king's reign, but the office seemingly still lacked any specific assignment. When something reminiscent of a council of war was founded in 1540, the constable was not included. King Gustav's successor, his oldest son Eric XIV, apparently had plans to modernize the constable office, as did the following rulers John III and Sigismund, but those intentions remained unfulfilled. The title meant no particular assignment until 1630, when constable Jacob De la Gardie became president of the Council of War (Swedish: first Krigsrätten, later Krigsrådet and Krigskollegium). The Lord High Constable was second in rank of the five Great Officers of the Realm, established in 1634, who was the five most prominent members of the Swedish Privy Council. When Carl Gustaf Wrangel died in 1676, the office was abolished. King Charles XI, who had come to age four years earlier, wanted to avoid appointing new holders of the high offices, once these became vacant. The riksmarsk title has not been used since, in contrast to two other offices that Charles XI abolished, Lord High Chancellor and Lord High Steward, who were both revived for a relatively short period in the late 18th century. Related offices A number of other high offices, that namewise are somewhat similar to the riksmarsk and to some degree inherited assignments that earlier had been attached to the constable office, have figurated in Swedish history. The fodermarsk appeared in the late Middle Ages and was responsible for the foddering of the court's horses. The first hovmarskalk, Marshal of the Court, was appointed in c. 1540 and the office is still in use. Earlier, the office holder was supervising the economy of the court. Today's First Marshal of the Court is the head of the Office of the Marshal of the Court (Hovmarskalkämbetet), which is responsible for preparing the public appearances and state visits of the Swedish Royal Family. Göran Klasson Stjernsköld became the first riksmarskalk, Marshal of the Realm, in 1607. As such, he was the head of the royal court, and that is still a valid description for the holder of the office. Lord High Constables of Sweden Torgils Knutsson (c. 1290-1306) Karl Knutsson Bonde (1435-?) Nils Stensson Natt och Dag (1439) Tord Karlsson Bonde (1453 or 1454-1456) Svante Nilsson Sture the Elder (1497-?) Lars Siggesson Sparre (1523-1554) Svante Nilsson Sture the Younger (1561-1564) Gustaf Olofsson Stenbock (1569-1572) Klas Fleming (c. 1591-?) Magnus Brahe (1602-1611) Axel Nilsson Ryning (1611-1620) Jacob De la Gardie (1620-1652) Gustaf Horn (1653-1657) Adolf Johan of Pfalz-Zweibrücken (1660) Lars Kagg (1660-1661) Carl Gustaf Wrangel (1664-1676) Gallery References Category:13th-century establishments in Sweden Co
Mid
[ 0.623188405797101, 32.25, 19.5 ]
Dave Warden, a bud tender at Private Organic Therapy (P.O.T.), a non-profit co-operative medical marijuana dispensary, displays various types of marijuana available to patients on October 19, 2009 in Los Angeles, California. (Photo: David McNew/Getty Images) The ice cream company Ben & Jerry's was among those on Saturday who sought to draw attention to inequities which have become increasingly apparent since more states began loosening cannabis restrictions—a shift which critics say has mainly benefited white and upper-class Americans. The Vermont-based company, which has been outspoken about progressive causes since it opened in 1978, circulated a petition late Friday, calling on Congress to extend the benefits of the growing destigmatization of marijuana to communities of color, who are disproportionately convicted of and incarcerated for drug-related crimes. "Now that pot is legal in 33 states and counting," the company wrote of April 20, a popular date in cannabis culture, "fans of cannabis can celebrate 4/20 openly and in style in more places than ever before. And even if you're not in a state that legalized pot, there's a still a pretty good chance that the cops won’t hassle you as you spend 4/20 doing your thing." "If you're a white person," the petition added. Legal dispensaries that sell cannabis for recreational and health purposes are driving what is expected to be a $20 billion industry by 2020, the company wrote. But even in states where marijuana has been legalized, arrests for possession of the substance still disproportionately target black Americans. "Let's be clear: even with increased legalization, hundreds of thousands of people are still being arrested for pot," wrote Ben & Jerry's. "And most of those people are Black. Black New York City residents, for example, are eight times more likely to be arrested for pot than whites." Meanwhile, according to a Buzzfeed report from 2018, "based on more than 150 interviews with dispensary owners, industry insiders, and salespeople who interact with a lot of pot shops, it appears that fewer than three dozen of the 3,200 to 3,600 storefront marijuana dispensaries in the United States are owned by black people — about one percent." Ben & Jerry's asked supporters to call on Congress to expunge prior convictions for marijuana and begin pardoning people who were convicted only of cannabis possession, in order to help "make sure that legalization benefits all of us." By Saturday afternoon, more than 21,000 people had signed the petition. The topic of social equity in relation to cannabis was a topic of discussion for many in the press and on social media on Saturday, with the Washington Postreporting on efforts in Oakland, California to give at least half of its cannabis retail licenses to social equity candidates—including people with past marijuana convictions—and in Sacramento to give preferential treatment for licenses to neighborhoods affected by the War on Drugs. "We have opted into the cannabis industry and now we have to make sure it works for all of our people," said Sacramento Mayor Darrell Steinberg told the Post. Our work is licensed under a Creative Commons Attribution-Share Alike 3.0 License. Feel free to republish and share widely. This is the world we live in. This is the world we cover. Because of people like you, another world is possible. There are many battles to be won, but we will battle them together—all of us. Common Dreams is not your normal news site. We don't survive on clicks. We don't want advertising dollars. We want the world to be a better place. But we can't do it alone. It doesn't work that way. We need you. If you can help today—because every gift of every size matters—please do. Without Your Support We Won't Exist. Further A belated, heartfelt happy birthday to Harvey Milk, assassinated in 1978 for daring to come out of the closet, be himself and insist on his rights, who would have turned 89 this week. On Harvey Milk Day, California passed a resolution honoring his "critical role in creating the modern LGBT movement." From one ally: "He imagined a righteous world inside his head and then he set about to create it." These dark days, his message resonates more than ever: "You stand up and fight." Common Dreams brings you the news that matters. Sign up for Newsletter Connect With Us Support our common dreams. Can We Count on Your Help Today? Common Dreams is a small nonprofit with a big mission. Every day of the week, we publish the most important breaking news & views for the progressive community. To remain an independent news source, we do not advertise, sell subscriptions or accept corporate contributions. Instead, we rely on readers like you, to provide the "people power" that fuels our work. Please help keep Common Dreams alive by making a contribution. Thank you. - Craig Brown, Co-founder
Low
[ 0.468036529680365, 25.625, 29.125 ]
Platelet-derived growth factor receptors form a high affinity state in membrane preparations. Kinetics and affinity cross-linking studies. The specific binding of 125I-PDGF (platelet-derived growth factor) to intact fibroblasts becomes relatively nondissociable during incubation at 37 degrees C. To characterize the interaction of PDGF with its receptors under conditions in which there is no receptor internalization, we have studied the binding of 125I-PDGF to membrane preparations derived from mouse 3T3 cells and rat liver. The binding sites had the affinity and specificity characteristics expected of PDGF receptors. At 37 degrees C (but not at 4 degrees C) the specific binding of 125I-PDGF to membranes gradually became nondissociable as assessed by either dilution or by addition of excess unlabeled PDGF. This tight binding was not due to a covalent interaction since the polyanionic compound suramin readily dissociated specifically bound 125I-PDGF. This property of suramin was used to expose rat liver PDGF receptors which were occupied by endogenous PDGF. Affinity cross-linking studies demonstrated that the formation of the nondissociable state of 125I-PDGF binding was associated with the binding of 125I-PDGF to a 160,000-dalton protein and to a 110,000-dalton species. The cross-linked binding sites could be adsorbed to wheat germ agglutinin and to anion exchange resins. The isoelectric point of both cross-linked species determined by two-dimensional gel electrophoresis was approximately 4.7. These data demonstrate that in membrane preparations, PDGF binds to an anionic 160,000-dalton glycoprotein which is likely to be the receptor. A high affinity state of PDGF binding, which is formed rapidly at 37 degrees C, can be dissociated by suramin.
High
[ 0.712550607287449, 33, 13.3125 ]
Boehner's Plan B https://www.futureofcapitalism.com/2012/12/boehner-plan-b Here are two possible opinions on Speaker Boehner's bill to extend the Bush tax cuts permanently for everyone earning less than $1 million. 1. It's great. Measured by the House Ways and Means Committee, over ten years, it's about a $4 trillion tax cut compared to current law (under which the cuts expire December 31). It's better than President Obama's approach because it reduces taxes compared to current law (under which the cuts expire December 31) not only for the under $250,000-a-year crowd that Mr. Obama wants to protect, but also for the $250,000 to $999,999 a year crowd. And it's better than doing nothing at all, because if the House does nothing at all, then everyone's taxes will go up under the current law. Finally, far from totally abandoning the $1 million-plus crowd, the Boehner approach helps them out by not pursuing limits or phase-outs on their itemized deductions and by providing some continued estate-tax relief, and by capping their dividend and capital gains tax at 20% (23.8% if you include the ObamaCare tax), rather than letting those rates rise to the Clinton-era ordinary income tax rates. The $1 million plus earners will also benefit from the lower rates at the lower brackets, and they may have the ability to restructure some of their income as capital gains or dividends, anyway. That's one reason that left-wing groups like the Center on Budget and Policy Priorities are so worked up against the Boehner plan. Finally, it's permanent, or at least as permanent as any tax legislation is, providing some welcome certainty. 2. It's terrible. By decoupling million-dollar-a-year earners from the rest of the population, the House Republicans are joining in the class-warfare, attack-the-successful tactics of Obama. They are abandoning the principles that everyone should be treated the same and that tax relief should go to those who already pay a big share of the taxes. Not only is the policy wrong, the process is terrible. The plan being voted on is amendment two to a resolution "Approving the renewal of import restrictions contained in the Burmese Freedom and Democracy Act of 2003." The amendment was posted online at 10:39 p.m. on Tuesday, while a vote is expected some time today. That leaves two days for the public to review the legislation, which includes all kinds of little goodies (or baddies, depending on how you look at it, like "Allow electing Alaska Native Settlement Trusts to tax income to the Trust not the beneficiaries." I'd love to know who got the lobbying fees on that one.) It's a missed opportunity for tax reform or tax simplification (though never underestimate the fact that lower rates themselves are tax reform because they reduce the value of the deductions). The tax cut may undermine whatever credibility the Republicans have on the debt and deficit issue, because it's not part of an overall budget package, though there is a companion spending reduction bill. Which do you think is closer to the truth here, "great" or "terrible"?
Low
[ 0.48337028824833705, 27.25, 29.125 ]
Tell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only. The tv power supply board have dying parts call the capacitors.These capacitors are dying and have leaking gases.These dying capacitors are alway bulges up on it tops or puffing up on it tops.The power supply board the board that the board,where the power a/c cord plug into it.U have tools like a soldering iron,desoldering pump or desoldering braids,solders?U can do basic soldering?U have basic understanding of electronic?Replaced these dying and leaking gases capacitors,that are bulging up on it tops or puffing up on it tops.This sporadic turn off and on will stop.Or tries websites like Shopjimmy.com,Ebay.com to buy a whole refurbish power supply board for the replacement. The Lg you have actually has three boards that can cause the problem you are talking about. The control board, the y-board or the z-board. Usually most technicians will change the y-board and z board together since it is usually a combination of both that cause the problem. The control board by itself can cause the problem. The part #'s are as follows and these are straight from the LG plasma tv training manuals. 1- Control board 6871QCH053G, 2- Y board 6871QYH036D, and the Z-board is 6871QZH041B. The boards can be checked by looking at the voltages and signals but as I said some of those problems for no picture interrelate between boards. Hope this helped. Also with the back cover off those boards are clearly marked. The y board is a small board on the left and the Z board is on the right. The control board is of course in between them. They have tiny white stickers with the part # and assy# on them an also directly on the board itself. Always disconnect the power cord when looking at the inside by taking the back cover off.
Low
[ 0.529411764705882, 33.75, 30 ]
Murder charge dropped against Irish nanny in girl's death; cause of death now 'undetermined' FILE - In this July 30, 2015 file photo, Aisling Brady McCarthy leaves court proceedings at Middlesex Superior Court in Woburn, Mass. Middlesex District Attorney Marian Ryan announced Monday, Aug. 31, 2015, that the murder charge against the Irish nanny had been dropped because the medical examiner issued an amended ruling changing the manner of death to "undetermined." McCarthy had been charged with murder in the death of Rehma Sabir in Cambridge, Mass., in 2013. Her lawyers had challenged the medical examiner's earlier findings that the girl died of complications of blunt-force head injuries. (Keith Bedford//The Boston Globe via AP, Pool, File) (The Associated Press) BOSTON – Prosecutors have dropped a murder charge against an Irish nanny charged with killing a 1-year-old girl after a state medical examiner reversed an earlier decision that the death was a homicide. Aisling Brady McCarthy was charged with murder in the death of Rehma Sabir in Cambridge in 2013. Her lawyers challenged the medical examiner's findings that Rehma died of complications of blunt-force head injuries. Middlesex District Attorney Marian Ryan announced Monday that the murder charge was dropped because the medical examiner issued an amended ruling changing the manner of death to "undetermined." Ryan say the medical examiner found Rehma had past medical issues and may have had some type of undiagnosed disorder. McCarthy has been living in the U.S. illegally. It was not immediately clear if she would be deported.
Low
[ 0.5239852398523981, 35.5, 32.25 ]
import sublime import itertools REG_UNNAMED = '"' REG_SMALL_DELETE = '-' REG_BLACK_HOLE = '_' REG_LAST_INSERTED_TEXT = '.' REG_FILE_NAME = '%' REG_ALT_FILE_NAME = '#' REG_EXPRESSION = '=' REG_SYS_CLIPBOARD_1 = '*' REG_SYS_CLIPBOARD_2 = '+' REG_SYS_CLIPBOARD_ALL = (REG_SYS_CLIPBOARD_1, REG_SYS_CLIPBOARD_2) REG_VALID_NAMES = tuple('abcdefghijklmnopqrstuvwxyz') REG_VALID_NUMBERS = tuple('0123456789') REG_SPECIAL = (REG_UNNAMED, REG_SMALL_DELETE, REG_BLACK_HOLE, REG_LAST_INSERTED_TEXT, REG_FILE_NAME, REG_ALT_FILE_NAME, REG_SYS_CLIPBOARD_1, REG_SYS_CLIPBOARD_2) REG_ALL = REG_SPECIAL + REG_VALID_NUMBERS + REG_VALID_NAMES # todo(guillermo): There are more. # todo(guillermo): "* and "+ don't do what they should in linux def init_register_data(): return { '0': None, # init registers 1-9 '1-9': [None] * 9, } # Stores register data. _REGISTER_DATA = init_register_data() # todo(guillermooo): Subclass dict properly. class Registers(object): """ Registers hold global data used mainly by yank, delete and paste. This class is meant to be used a descriptor. class State(object): registers = Registers() ... state = State() state.registers['%'] # now state.registers has access to the # current view. And this is how you access registers: Setting registers... state.registers['a'] = "foo" # => a == "foo" state.registers['A'] = "bar" # => a == "foobar" state.registers['1'] = "baz" # => 1 == "baz" state.registers[1] = "fizz" # => 1 == "fizz" Retrieving registers... state.registers['a'] # => "foobar" state.registers['A'] # => "foobar" (synonyms) """ def __get__(self, instance, owner): self.view = instance.view self.settings = instance.settings return self # This ensures that we can easiy access the active view. # return Registers(instance.view, instance.settings) def _set_default_register(self, values): assert isinstance(values, list) # Coerce all values into strings. values = [str(v) for v in values] # todo(guillermo): could be made a decorator. _REGISTER_DATA[REG_UNNAMED] = values def _maybe_set_sys_clipboard(self, name, value): # We actually need to check whether the option is set to a bool; could # be any JSON type. if (name in REG_SYS_CLIPBOARD_ALL or self.settings.view['vintageous_use_sys_clipboard'] is True): # Make sure Sublime Text does the right thing in the presence # of multiple selections. if len(value) > 1: self.view.run_command('copy') else: sublime.set_clipboard(value[0]) def set(self, name, values): """ Sets an a-z or 0-9 register. In order to honor multiple selections in Sublime Text, we need to store register data as lists, one per selection. The paste command will then make the final decision about what to insert into the buffer when faced with unbalanced selection number / available register data. """ # We accept integers as register names. name = str(name) assert len(str(name)) == 1, "Register names must be 1 char long: " + name if name == REG_BLACK_HOLE: return assert isinstance(values, list), \ "Register values must be inside a list." # Coerce all values into strings. values = [str(v) for v in values] # Special registers and invalid registers won't be set. if (not (name.isalpha() or name.isdigit() or name.isupper() or name == REG_UNNAMED or name in REG_SYS_CLIPBOARD_ALL or name == REG_EXPRESSION or name == REG_SMALL_DELETE)): # Vim fails silently. # raise Exception("Can only set a-z and 0-9 registers.") return None _REGISTER_DATA[name] = values if name not in (REG_EXPRESSION,): self._set_default_register(values) self._maybe_set_sys_clipboard(name, values) def append_to(self, name, suffixes): """ Appends to an a-z register. `name` must be a capital in A-Z. """ assert len(name) == 1, "Register names must be 1 char long." assert name in "ABCDEFGHIJKLMNOPQRSTUVWXYZ", \ "Can only append to A-Z registers." existing_values = _REGISTER_DATA.get(name.lower(), '') new_values = itertools.zip_longest(existing_values, suffixes, fillvalue='') new_values = [(prefix + suffix) for (prefix, suffix) in new_values] _REGISTER_DATA[name.lower()] = new_values self._set_default_register(new_values) self._maybe_set_sys_clipboard(name, new_values) def get(self, name=REG_UNNAMED): # We accept integers or strings a register names. name = str(name) assert len(str(name)) == 1, "Register names must be 1 char long." # Did we request a special register? if name == REG_BLACK_HOLE: return elif name == REG_FILE_NAME: try: return [self.view.file_name()] except AttributeError: return '' elif name in REG_SYS_CLIPBOARD_ALL: return [sublime.get_clipboard()] elif ((name not in (REG_UNNAMED, REG_SMALL_DELETE)) and (name in REG_SPECIAL)): return # Special case lumped among these --user always wants the sys # clipboard. elif ((name == REG_UNNAMED) and (self.settings.view['vintageous_use_sys_clipboard'] is True)): return [sublime.get_clipboard()] # If the expression register holds a value and we're requesting the # unnamed register, return the expression register and clear it # aftwerwards. elif name == REG_UNNAMED and _REGISTER_DATA.get(REG_EXPRESSION, ''): value = _REGISTER_DATA[REG_EXPRESSION] _REGISTER_DATA[REG_EXPRESSION] = '' return value # We requested an [a-z0-9"] register. if name.isdigit(): if name == '0': return _REGISTER_DATA[name] return _REGISTER_DATA['1-9'][int(name) - 1] try: # In Vim, "A and "a seem to be synonyms, so accept either. return _REGISTER_DATA[name.lower()] except KeyError: pass def yank(self, vi_cmd_data, register=None, operation='yank'): # Populate registers if we have to. if vi_cmd_data._can_yank: if register and register != REG_UNNAMED: self[register] = self.get_selected_text(vi_cmd_data) else: self[REG_UNNAMED] = self.get_selected_text(vi_cmd_data) # if yanking, the 0 register gets set if operation == 'yank': _REGISTER_DATA['0'] = self.get_selected_text(vi_cmd_data) # if chaning or deleting, the numbered registers get set elif operation in ('change', 'delete'): text = self.get_selected_text(vi_cmd_data) # TODO: very inefficient _REGISTER_DATA['1-9'].insert(0, text) if len(_REGISTER_DATA['1-9']) > 10: _REGISTER_DATA['1-9'].pop() else: raise ValueError('unsupported operation: ' + operation) # # XXX: Small register delete. Improve this implementation. if vi_cmd_data._populates_small_delete_register: is_same_line = (lambda r: self.view.line(r.begin()) == self.view.line(r.end() - 1)) if all(is_same_line(x) for x in list(self.view.sel())): self[REG_SMALL_DELETE] = self.get_selected_text(vi_cmd_data) def get_selected_text(self, vi_cmd_data): """Inspect settings and populate registers as needed. """ fragments = [self.view.substr(r) for r in list(self.view.sel())] # Add new line at EOF, but don't add too many new lines. if (vi_cmd_data._synthetize_new_line_at_eof and not vi_cmd_data._yanks_linewise): if (not fragments[-1].endswith('\n') and # XXX: It appears regions can end beyond the buffer's EOF (?). self.view.sel()[-1].b >= self.view.size()): fragments[-1] += '\n' if fragments and vi_cmd_data._yanks_linewise: for i, f in enumerate(fragments): # When should we add a newline character? # * always except when we have a non-\n-only string followed # by a newline char. if (not f.endswith('\n')) or f.endswith('\n\n'): fragments[i] = f + '\n' return fragments def to_dict(self): # XXX: Stopgap solution until we sublass from dict return {name: self.get(name) for name in REG_ALL} def __getitem__(self, key): return self.get(key) def __setitem__(self, key, value): try: if key.isupper(): self.append_to(key, value) else: self.set(key, value) except AttributeError: self.set(key, value)
Mid
[ 0.599542334096109, 32.75, 21.875 ]
<?xml version="1.0" encoding="UTF-8"?> <thing:thing-descriptions bindingId="zwave" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:thing="https://openhab.org/schemas/thing-description/v1.0.0" xsi:schemaLocation="https://openhab.org/schemas/thing-description/v1.0.0 https://openhab.org/schemas/thing-description/v1.0.0"> <thing-type id="sensative_1102011_00_000" listed="false"> <label>11 02 011 Strips Comfort/Drips Multisensor</label> <description><![CDATA[ Strips Comfort/Drips Multisensor<br /><h1>Overview</h1><p>Strips, the ultra-thin multi sensor is now available in two new sensor models, Strips Drip and Strips Comfort. Drip and Comfort join Strips Guard, the thinnest magnet sensor in the world detecting if your windows are open and closed invisibly since 2015. Strip Drip sends an alarm signal if it detects a water leak. Its unique design allows it to be easily placed almost everywhere, including most places other sensors simply can’t fit. With soaking pads integrated in the mounting plate even small amounts of water will be detected. The built-in temperature sensor gives the possibility to combine the leakage alarm with a freeze alarm. There is also a built-in ambient light sensor that may be useful in special applications. Strips Comfort is a very accurate temperature and ambient light sensor. The unique design and mounting plate makes it easy to place almost invisibly in your home to measure temperature or control heating, air conditioning and even windows blinds which are connected to your Z-Wave smart home system. All Strips products can be used both in-doors and out-doors and the integrated custom battery gives Strips an expected lifetime of up to 10 years. For you, this means no hassle needing to change or charge batteries in your Strips sensors for the lifetime of the products!</p> <p>You may need to reset Strips if your Z-Wave controller is missing or not responding. Follow the instructions for “Wake up”, but on the 3rd repetition, leave the magnet at the rounded edge for 10 seconds. A long LED signal indicates success.</p> <br /><h2>Inclusion Information</h2><p>Set your controller to add mode (see your controller’s manual). Follow the instruction for Wake up. A long LED blink indicates that the add/remove was successful.</p> <br /><h2>Exclusion Information</h2><p>Set your controller to remove mode (see your controller’s manual). Follow the instruction for Wake up. A long LED blink indicates that the add/remove was successful.</p> <br /><h2>Wakeup Information</h2><p>Wake up Strips manually for Z-Wave communication. Place the magnet at the rounded edge. When the LED blinks, move the magnet away. Repeat twice within 10 seconds.</p> ]]></description> <category>Sensor</category> <!-- CHANNEL DEFINITIONS --> <channels> <channel id="sensor_binary" typeId="sensor_binary"> <label>Binary Sensor</label> <properties> <property name="binding:*:OnOffType">COMMAND_CLASS_SENSOR_BINARY</property> </properties> </channel> <channel id="sensor_temperature" typeId="sensor_temperature"> <label>Sensor (temperature)</label> <properties> <property name="binding:*:QuantityType">COMMAND_CLASS_SENSOR_MULTILEVEL;type=TEMPERATURE</property> </properties> </channel> <channel id="sensor_moisture" typeId="sensor_moisture"> <label>Sensor (moisture)</label> <properties> <property name="binding:*:DecimalType">COMMAND_CLASS_SENSOR_MULTILEVEL;type=MOISTURE</property> </properties> </channel> <channel id="sensor_luminance" typeId="sensor_luminance"> <label>Sensor (luminance)</label> <properties> <property name="binding:*:DecimalType">COMMAND_CLASS_SENSOR_MULTILEVEL;type=LUMINANCE</property> </properties> </channel> <channel id="alarm_burglar" typeId="alarm_burglar"> <label>Alarm (burglar)</label> <properties> <property name="binding:*:OnOffType">COMMAND_CLASS_ALARM;type=BURGLAR</property> </properties> </channel> <channel id="alarm_flood" typeId="alarm_flood"> <label>Alarm (flood)</label> <properties> <property name="binding:*:OnOffType">COMMAND_CLASS_ALARM;type=FLOOD</property> </properties> </channel> <channel id="alarm_heat" typeId="alarm_heat"> <label>Alarm (heat)</label> <properties> <property name="binding:*:OnOffType">COMMAND_CLASS_ALARM;type=HEAT</property> </properties> </channel> <channel id="battery-level" typeId="system.battery-level"> <properties> <property name="binding:*:PercentType">COMMAND_CLASS_BATTERY</property> </properties> </channel> </channels> <!-- DEVICE PROPERTY DEFINITIONS --> <properties> <property name="vendor">Sensative AB</property> <property name="modelId">11 02 011</property> <property name="manufacturerId">019A</property> <property name="manufacturerRef">0003:000A</property> <property name="versionMax">0.2</property> <property name="dbReference">747</property> <property name="defaultAssociations">1</property> </properties> <!-- CONFIGURATION DESCRIPTIONS --> <config-description> <!-- GROUP DEFINITIONS --> <parameter-group name="configuration"> <context>setup</context> <label>Configuration Parameters</label> </parameter-group> <parameter-group name="association"> <context>link</context> <label>Association Groups</label> </parameter-group> <!-- PARAMETER DEFINITIONS --> <parameter name="config_3_1" type="integer" groupName="configuration"> <label>3: Temperature reporting mode</label> <description>0:Off 1:Normal 2:High Accuracy</description> <default>1</default> <options> <option value="0">Off</option> <option value="1">Normal</option> <option value="2">High Accuracy</option> </options> </parameter> <parameter name="config_4_1" type="integer" groupName="configuration"> <label>4: Temperature reporting unit</label> <description>0:Celcius 1:Fahrenheit</description> <default>0</default> <options> <option value="0">Celcius</option> <option value="1">Fahrenheit</option> </options> </parameter> <parameter name="config_5_1" type="integer" groupName="configuration"> <label>5: High Temperature alarm</label> <description>0:Off 1:On</description> <default>0</default> <options> <option value="0">Off</option> <option value="1">On</option> </options> </parameter> <parameter name="config_6_1" type="integer" groupName="configuration" min="-20" max="60"> <label>6: High Temperature alarm level</label> <description>-20 to + 60 degree C</description> <default>60</default> <options> <option value="-20">Temperature alarm level</option> </options> <limitToOptions>false</limitToOptions> </parameter> <parameter name="config_7_1" type="integer" groupName="configuration"> <label>7: Low Temperature alarm</label> <description>0:Off 1:On</description> <default>0</default> <options> <option value="0">Off</option> <option value="1">On</option> </options> </parameter> <parameter name="config_8_1" type="integer" groupName="configuration" min="-20" max="60"> <label>8: Low Temperature alarm level</label> <description>-20 to + 60 degree C</description> <default>-20</default> <options> <option value="-20">Temperature alarm level</option> </options> <limitToOptions>false</limitToOptions> </parameter> <parameter name="config_9_1" type="integer" groupName="configuration"> <label>9: Ambient light reporting</label> <description>0:Off 1:On</description> <default>1</default> <options> <option value="0">Off</option> <option value="1">On</option> </options> </parameter> <parameter name="config_10_1" type="integer" groupName="configuration"> <label>10: Leakage alarm</label> <description>0:Off 1:On</description> <default>1</default> <options> <option value="0">Off</option> <option value="1">On</option> </options> </parameter> <parameter name="config_11_1" type="integer" groupName="configuration" min="1" max="100"> <label>11: Leakage alarm level</label> <description>1 to 100 (1= almost dry, 100 = soaking wet)</description> <default>25</default> <options> <option value="1">(1= almost dry, 100= soaking wet)</option> </options> <limitToOptions>false</limitToOptions> </parameter> <parameter name="config_12_1" type="integer" groupName="configuration" min="0" max="120"> <label>12: Moisture reporting period</label> <description>0-120: Number of hours between moisture reports</description> <default>0</default> <options> <option value="0">Number of hours between moisture reports</option> </options> <limitToOptions>false</limitToOptions> </parameter> <!-- ASSOCIATION DEFINITIONS --> <parameter name="group_1" type="text" groupName="association"> <label>1: Lifeline</label> </parameter> <!-- STATIC DEFINITIONS --> <parameter name="node_id" type="integer" min="1" max="232" readOnly="true" required="true"> <label>Node ID</label> <advanced>true</advanced> </parameter> </config-description> </thing-type> </thing:thing-descriptions>
Mid
[ 0.553488372093023, 29.75, 24 ]
A "lamentable failure"? The founding of Nightingale nursing in Australia, 1868-1884. Florence Nightingale's private assessment was that Lucy Osburn failed in her attempt to found Nightingale nursing in Australia. This assessment is directly at odds with those of historians who have unquestioningly accepted Osburn's success. An alternative narrative of the founding of Nightingale nursing in Australia is provided through examining why Nightingale thought Osburn failed. The judgment of failure had little to do with nursing practice or care. Nightingale's judgment was based on the personal characteristics she expected of the Nightingale nurse and her fear of public exposure of problems at the Nightingale School of Nursing at St Thomas's Hospital.
Mid
[ 0.584946236559139, 34, 24.125 ]
Maryland Teacher Told To Take Down Anti-Trump Posters A Maryland high school has taken a stand to end politics in the classroom so students can focus on learning without being indoctrinated by their teachers. Teachers at Westminster High School in Carroll County were told to remove anti-Trump posters from their classrooms last week according to CBS Baltimore. Examples of “We the People” posters #WestMinster HS teachers were asked to take down because they were perceived as “anti-Trump” by admin. pic.twitter.com/QWKUf0TryF — Rick Ritter (@RickRitterWJZ) February 22, 2017 From CBS Baltimore: TRENDING: RUTH BADER GINSBURG DEAD! Supreme Court Justice Dies at Home Surrounded by Family The “We the People” posters depicted Latina, Muslim and African-American women in the same red, white and blue style of the “Hope” election posters for Barack Obama. Shepard Fairey, the artist behind the Hope posters and the diversity posters, told CNN in January that those three groups could be “the most feeling that their needs would be neglected in a Trump administration.” Some teachers at Westminster high school put up the posters as an effort to “promote diversity.” It wasn’t long before the school started to receive complaints that the posters were anti-Trump which lead to the school to tell its teachers to take down the posters. From CBS Baltimore: “After some reflection and some discussion, the posters came down until we can further examine the issue,” said Stephen Guthrie, superintendent of Carroll County Public Schools. “We don’t really have any guidelines in Carroll County in terms of what can be displayed, other than the classroom can’t be a forum for politics.” The move to take down the posters triggered the schools liberal students who made statements like: “That wasn’t the intent at all, to be political or partisan in any way,” and “There’s nothing partisan about it.,” according to CBS Baltimore. Follow Ryan Saavedra On Twitter @NewsRevoltRyan
Low
[ 0.507246376811594, 35, 34 ]
From 1/f noise to multifractal cascades in heartbeat dynamics. We explore the degree to which concepts developed in statistical physics can be usefully applied to physiological signals. We illustrate the problems related to physiologic signal analysis with representative examples of human heartbeat dynamics under healthy and pathologic conditions. We first review recent progress based on two analysis methods, power spectrum and detrended fluctuation analysis, used to quantify long-range power-law correlations in noisy heartbeat fluctuations. The finding of power-law correlations indicates presence of scale-invariant, fractal structures in the human heartbeat. These fractal structures are represented by self-affine cascades of beat-to-beat fluctuations revealed by wavelet decomposition at different time scales. We then describe very recent work that quantifies multifractal features in these cascades, and the discovery that the multifractal structure of healthy dynamics is lost with congestive heart failure. The analytic tools we discuss may be used on a wide range of physiologic signals. (c) 2001 American Institute of Physics.
High
[ 0.701803051317614, 31.625, 13.4375 ]
1975 North Vietnamese legislative election Parliamentary elections were held in North Vietnam on 6 April 1975. The Vietnamese Fatherland Front won all 424 seats, with voter turnout reported to be 98.26%. They were the final elections held in North Vietnam, as Vietnamese reunification occurred the following year. Results References Category:1975 elections in Asia Parliamentary election Parliamentary election, 1975 Category:April 1975 events in Asia
High
[ 0.719640179910045, 30, 11.6875 ]
Q: Sending emails with Reactjs I am trying to use an API for sending emails with JavaScript, it's called SmptJs. The API works perfectly when integrated in a simple HTML file, but I don't know how to integrate it in a reactJs component ! Here is the api link and doc : https://smtpjs.com/ I tried it first in my HTML page, like this : code of html file And it worked, I received the email. But I want to add the api inside my React Component, specifically when I click submit in my form but I got an error and I think it's not compatible with ReactJs syntax, here is the image : code of react component the error msg A: Checkout the simple component with example here https://jsfiddle.net/92a68tmz/ You have to include the tag of smtpjs in your public/index.html or general index.html file in your project and you can use it like this sendMail() { window.Email.send({ SecureToken : "C973D7AD-F097-4B95-91F4-40ABC5567812", To : '[email protected]', From : "[email protected]", Subject : "This is the subject", Body : "And this is the body" }).then( message => alert(message) ); in your onSubmit you directly use this const onSubmit = data => { window.Email.send({ SecureToken : "C973D7AD-F097-4B95-91F4-40ABC5567812", To : data.email, From : "[email protected]", Subject : "This is the subject", Body : "And this is the body" + data.firstname }).then( message => alert(message) } No need for a separate Emailer component.
High
[ 0.667535853976531, 32, 15.9375 ]
2011 e-Boks Sony Ericsson Open – Singles Qualifying This article displays the qualifying draw of the 2011 e-Boks Sony Ericsson Open. Players Seeds Qualifiers Qualifying draw First qualifier Second qualifier Third qualifier Fourth qualifier References Qualifying Draw e-Boks Sony Ericsson Open - qualifying
Mid
[ 0.54054054054054, 32.5, 27.625 ]
How To Be Effortlessly Charming? - Apply These 5 Secrets Charm is more valuable than beauty. You can resist beauty but you can't resist charm. In this post I'm going to use a celebrity that everyone likes as an example, for the purpose of this article. I'm going to use Shahrukh Khan Shahrukh Khan has a subtle and almost effortless charm. And unlike some of the people that we've covered, you don't have to take drastic steps to emulate it. So today we are going to be looking at some of the habits that make him so effortlessly charismatic and learn what you can do to convey that same charm in your life. 1. Focus On Setting The Tone The first thing that you can learn from Shahrukh is that, at the start of every social interaction rather than focusing on what you say focus primarily on setting the tone and pick the one that suits you best. Now, to see this principle in action let's begin by examining the most common start to any social situation, entering a room. First think about any social entrance of Shahrukh on stage. You'll notice the Shahrukh feels much relaxed. His pace is slower. He looks around smiling and he lingers to greet the audience. That carefree attitude sets the tone from the start and frames the rest of the conversation. You'll also see Shahrukh often spend more time to touch and warmly greet people when he enters a new space like that. All these habits add up to one clear point. Whether you're walking into an interview or workplace meeting or a bar, for the first 10 to 20 seconds of any new interaction in a new place, rather than worrying about what to say next. Focus on setting the tone. Now, you can go really high energy like Ranveer Singh with huge gestures greeting everyone loudly. Or you can go for the more subdued Shahrukh charm by taking time to make yourself comfortable and then greeting others with a smile. Either way the energy at the start of an interaction counts for far more and the specific words you say, so put your focus there. Now, if it's not already clear, the energy that Shahrukh tends to create is one of comfort and this extends to how he situates himself physically. The reason that this is important to note is that physical comfort leads to psychological comfort and feeling comfortable is one of the main ingredients of charm. Even the simple act of crossing your legs, if that makes you feel comfortable or resting your arms on the on chair combined with a relaxed posture can make you feel as if you were hanging out in your own living room as opposed to being under any sort of pressure like on a talk show or in an interview. Now moving on to the next point. Let's discuss an easy way to make people laugh and enjoy your company without having to tell funnier jokes or even be much higher energy. And that is number two. 2. Laughing With Your Eyes What are you talking about " How To & Lifestyle "? By showing signs of laughter in your own eyes works the same way as other people laughing can make you crack up for no apparent reason. Seeing laughing eyes can do the same without you even realizing. And if you're worried about laughing at your own jokes, don't sweat it. When you have fun with your jokes even to the point of laughing at them, it is very charming. As long as the laughter is real and not forced. So the key here isn't simply to squint your eyes or put on a veneer of laughter behind your speech. It's to get emotionally involved with what you're saying so that is actually fun for you. And when you do this, your eyes will naturally go to that laughing look and people will match you making your charm effortless. And this brings us to another element where more genuine involvement in the things that you're saying is going to help and that is your number three. 3. Genuine Eye-Contact How To Be Effortlessly Charming? - Apply These 5 Secrets Now, there's a popular myth that more eye contact is simply better. And of course if you're staring at your feet half the time more eye contact would be an improvement. But Shahrukh style of speech illustrates that looking down while forming thoughts can actually make your communication feel more genuine. After all, there is a natural tendency to look down when you're accessing emotional memories. The key then is not to make unblinking eye contact but to be more like a boomerang, making sure to return to the person you're speaking to after looking away so that they feel involved. If you are giving more sporadic eye contact, the best time to deliver that, is when you're making your most important point and there's no hard and fast rule. But Shahrukh shows a way to handle this with humor. And that's to make the punch line when you deliver that strong eye contact, but then to break as people laugh, so they don't feel too much pressure and you see him do this repeatedly. Now, lets move on to our next piece. 4. Self Deprecating Humor & Complimenting Others And it's Shahrukh's self-deprecating nature. He does this all the time, but what's perhaps most interesting here is, that he does his self-deprecation more in some situations than in others and it connects two seemingly opposite sides of his personality. His propensity to tease prank and laugh at people compared to his propensity to compliment people and to laugh at himself. Now the reason that these two opposing sides actually work so well together is that there's a pattern to the way Shahrukh uses them. He's likely to be playful with people of a similar status. Sometimes teasing them or laughing at them but is often supportive and complimentary towards those that might have a lower status than him in any given social situation so for instance Shahrukh will tease other celebrities of a similar stature. He's also notorious for pulling pranks on his colleagues.The flip side. He regularly showers his interviewers who are less known in compliments. And he often delivers these compliments with self-deprecation lowering his own position in a joking way. So consider whether you are punching up or down, when it comes to teasing or laughing at people. At your level and above and it's more likely to be fun for everyone involved as long as you're coming from a positive place. But if you're talking to someone who is lower than you in terms of status like a student who's in a younger grade or an employee who's underneath you in a business hierarchy or someone operating in a service role for you, generally compliments are a much better way to go because you can come across as a bully without even meaning to if you're teasing due to your status. 5. Shahrukh's Goal Is To Feel Good Now, this finally brings us to the mindset which ties all of this together. And it's that it doesn't appear that Shahrukh's ultimate goal in conversation is to be charming nor should it be yours. It appears that his ultimate goal is simply to feel good and to make the other people around him feel good, too. That's why he takes the time to settle in and it's why he has variable ways of treating people. Different things make people feel better depending on their status. Now, if you do this, you'll probably find, that you are more willing to crack jokes at your own expense. You'll also find that you're quicker on your feet when things go wrong because it's just another opportunity to have fun. So, instead of habitually asking yourself, what can I do to fit in or what do I have to say to make this conversation better? Ask yourself instead, what would make both of us feel more comfortable right now? What would make both of us have more fun? Do that, the charm will flow much more easily. Remember, Charisma is a skill that can be learned So, guys these were 5 secrets about " How To Be Effortlessly charming " . Besides that guys, stay tuned. Read Also - How To Create A Good And Positive First Impression Read Also - Habits Of Highly Successful People Read Also - How To Overcome Any Kind Of Addiction? Read Next - How To Stop Overthinking?
Mid
[ 0.582995951417004, 36, 25.75 ]
import enum import os from abc import ABC from abc import abstractmethod from typing import Dict from typing import Iterable from typing import List from typing import Union from mwm.feature_types import readable_type # See coding/string_utf8_multilang.cpp to synchronize languages. LANGS = ( "default", "en", "ja", "fr", "ko_rm", "ar", "de", "int_name", "ru", "sv", "zh", "fi", "be", "ka", "ko", "he", "nl", "ga", "ja_rm", "el", "it", "es", "zh_pinyin", "th", "cy", "sr", "uk", "ca", "hu", "reserved (earlier hsb)", "eu", "fa", "reserved (earlier br)", "pl", "hy", "reserved (earlier kn)", "sl", "ro", "sq", "am", "no", "cs", "id", "sk", "af", "ja_kana", "reserved (earlier lb)", "pt", "hr", "da", "vi", "tr", "bg", "alt_name", "lt", "old_name", "kk", "reserved (earlier gsw)", "et", "ku", "mn", "mk", "lv", "hi", ) class MetadataField(enum.Enum): cuisine = 1 open_hours = 2 phone_number = 3 fax_number = 4 stars = 5 operator = 6 url = 7 website = 8 internet = 9 ele = 10 turn_lanes = 11 turn_lanes_forward = 12 turn_lanes_backward = 13 email = 14 postcode = 15 wikipedia = 16 flats = 18 height = 19 min_height = 20 denomination = 21 building_levels = 22 test_id = 23 sponsored_id = 24 price_rate = 25 rating = 26 banner_url = 27 level = 28 airport_iata = 29 brand = 30 duration = 31 class RegionDataField(enum.Enum): languages = 0 driving = 1 timezone = 2 address_format = 3 phone_format = 4 postcode_format = 5 public_holidays = 6 allow_housenames = 7 class MapType(enum.Enum): world = 0 world_coasts = 1 country = 2 class GeomType(enum.Enum): undefined = -1 point = 0 line = 1 area = 2 class SectionInfo: __slots__ = "name", "offset", "size" def __init__(self, name, offset, size): self.name = name self.offset = offset self.size = size def __repr__(self): return ( f"SectionInfo[name: {self.name}, " f"offset: {self.offset}, " f"size: {self.size}]" ) def to_json(self): return {"name": self.name, "offset": self.offset, "size": self.size} class MwmVersion: __slots__ = "format", "seconds_since_epoch", "version" def __init__(self, format, seconds_since_epoch, version): self.format = format self.seconds_since_epoch = seconds_since_epoch self.version = version def __repr__(self): return ( f"MwmVersion[format: {self.format}, " f"seconds since epoch: {self.seconds_since_epoch}, " f"version: {self.version}]" ) def to_json(self): return { "format": self.format, "secondsSinceEpoch": self.seconds_since_epoch, "version": self.version, } class Point: __slots__ = "x", "y" def __init__(self, x=0.0, y=0.0): self.x = x self.y = y def __add__(self, other): if isinstance(other, Point): return Point(self.x + other.x, self.y + other.y) raise NotImplementedError def __iadd__(self, other): if isinstance(other, Point): self.x += other.x self.y += other.y raise NotImplementedError def __repr__(self): return f"({self.x}, {self.y})" def to_json(self): return {"x": self.x, "y": self.y} class Rect: __slots__ = "left_bottom", "right_top" def __init__(self, left_bottom: Point, right_top: Point): self.left_bottom = left_bottom self.right_top = right_top def __repr__(self): return f"Rect[{self.left_bottom}, {self.right_top}]" def to_json(self): return { "leftBottom": self.left_bottom.to_json(), "rightTop": self.right_top.to_json(), } class Triangle: __slots__ = "x", "y", "z" def __init__(self, x: Point, y: Point, z: Point): self.x = x self.y = y self.z = z def __repr__(self): return f"Triangle[{self.x}, {self.y}, {self.z}]" def to_json(self): return {"x": self.x.to_json(), "y": self.y.to_json(), "z": self.z.to_json()} class Mwm(ABC): def __init__(self, filename: str): self.filename = filename def name(self) -> str: return os.path.basename(self.filename) def path(self) -> str: return self.filename @abstractmethod def version(self) -> MwmVersion: pass @abstractmethod def type(self) -> MapType: pass @abstractmethod def bounds(self) -> Rect: pass @abstractmethod def sections_info(self) -> Dict[str, SectionInfo]: pass @abstractmethod def __len__(self) -> int: pass @abstractmethod def __iter__(self) -> Iterable: pass def __repr__(self): si = "\n".join( [ f" {s}" for s in sorted(self.sections_info().values(), key=lambda x: x.offset) ] ) return ( f"Mwm[\n" f" name: {self.name()}\n" f" type: {self.type()}\n" f" version: {self.version()}\n" f" number of features: {len(self)}\n" f" bounds: {self.bounds()}\n" f" sections info: [\n{si} \n ]\n" f"]" ) def to_json(self, with_features=False): m = { "name": self.name(), "version": self.version().to_json(), "type": self.type(), "bounds": self.bounds().to_json(), "sections_info": {k: v.to_json() for k, v in self.sections_info().items()}, "size": len(self), } if with_features: m["features"] = [f.to_json() for f in self] return m class Feature(ABC): @abstractmethod def index(self) -> int: pass @abstractmethod def types(self) -> List[int]: pass def readable_types(self) -> List[str]: return [readable_type(i) for i in self.types()] @abstractmethod def metadata(self) -> Dict[MetadataField, str]: pass @abstractmethod def names(self) -> Dict[str, str]: pass @abstractmethod def readable_name(self) -> str: pass @abstractmethod def rank(self) -> int: pass @abstractmethod def population(self) -> int: pass @abstractmethod def road_number(self) -> str: pass @abstractmethod def house_number(self) -> str: pass @abstractmethod def postcode(self) -> str: pass @abstractmethod def layer(self) -> int: pass @abstractmethod def geom_type(self) -> GeomType: pass @abstractmethod def center(self) -> Point: pass @abstractmethod def geometry(self) -> Union[List[Point], List[Triangle]]: pass @abstractmethod def limit_rect(self) -> Rect: pass @abstractmethod def parse(self): pass def __repr__(self): return ( f"Feature[\n" f" index: {self.index()}\n" f" readable name: {self.readable_name()}\n" f" types: {self.readable_types()}\n" f" names: {self.names()}\n" f" metadata: {self.metadata()}\n" f" geom_type: {self.geom_type()}\n" f" center: {self.center()}\n" f" limit_rect: {self.limit_rect()}\n" f"]" ) def to_json(self): center = None center_ = self.center() if center_: center = self.center().to_json() limit_rect = None limit_rect_ = self.limit_rect() if limit_rect_: limit_rect = limit_rect_.to_json() return { "index": self.index(), "types": {t: readable_type(t) for t in self.types()}, "metadata": {k.name: v for k, v in self.metadata().items()}, "names": self.names(), "readable_name": self.readable_name(), "rank": self.rank(), "population": self.population(), "road_number": self.road_number(), "house_number": self.house_number(), "postcode": self.postcode(), "layer": self.layer(), "geom_type": self.geom_type(), "center": center, "limit_rect": limit_rect, }
Mid
[ 0.5772811918063311, 38.75, 28.375 ]
[Role of Inhibitory Transforming Growth Factor-β Signal Smad7 in Helicobacter pylori-associated Gastric Damage]. Transforming growth factor-beta (TGF-β) is a cytokine implicated in the susceptibility, development, and progression of gastrointestinal cancer and certain other neoplasms. In the later stages of cancer, TGF-β not only acts as a bystander of host-immune response, but also contributes to cell growth, invasion, and metastasis. In the current study, we generated gastric mucosal cells that stably express Smad7, and explored the Helicobacter pylori-associated biological changes between mock-transfected and Smad7-transfected RGM1 cells. RGM1 cells stably transfected with Smad7 were infected with H. pylori, and molecular changes in apoptotic markers and inflammatory mediators were examined. Several candidate genes were explored in Smad7-overexpressing cells after H. pylori infection. Overexpression of Smad7 in RGM1 cells significantly increased the H. pylori-induced cytotoxicity compared to mock-transfected cells. Exaggerated increases in inflammatory mediators, cyclooxygenase 2, inducible NO synthase, and augmented apoptosis were noted in Smad7-overexpressing cells, whereas mitigated heme oxygenase 1 was noted in Smad7- overexpressing cells. These phenomena were reversed in cells transfected with Smad7 siRNA. These data suggest that inhibition of Smad7 is a possible target for mitigating H. pylori-associated inflammation.
High
[ 0.700434153400868, 30.25, 12.9375 ]
--- abstract: 'In this work, we study the effects of torsion due to a uniform distribution of topological defects (screw dislocations) on free spin/carrier dynamics in elastic solids. When a particle moves in such a medium, the effect of the torsion associated to the defect distribution is analogous to that of an applied magnetic field but with subtle differences. Analogue Landau levels are present in this system but they cannot be confined to two dimensions. In the case of spinless carriers, zero modes, which do not appear in the magnetic Landau levels, show up for quantized values of the linear momentum projected on the defects axis. Particles with spin are subjected to a Zeeman-like coupling between spin and torsion, which is insensitive to charge. This suggests the possibility of spin resonance experiments without a magnetic field for charged carriers or quasiparticles without electrical charge, like triplet excitons, for instance.' author: - 'Anderson A. Lima' - Cleverson Filgueiras - Fernando Moraes bibliography: - 'ref.bib' title: 'Torsion effects on Condensed Matter: like a magnetic field but not so much' --- Introduction ============ Perhaps because torsion does not play a role as important as curvature in gravitation, it has received little attention from the physics community in general. On the other hand, curvature is ubiquitous: among other things it is the main ingredient in general relativity and recently it appeared as a tool to manipulate electronic properties of low-dimensional systems (see, for instance, Ref. [@nano] and references therein). It is the aim of this paper to call the attention to a manifestation of torsion associated to topological defects in electronic/spintronic systems. The geometric theory of defects of Katanaev and Volovich [@Katanaev19921; @katanaev] demonstrated the equivalence between three-dimensional gravity with torsion and the theory of defects in solids. In the continuous limit, this approach describes the solid using a Riemann-Cartan manifold where curvature and torsion are associated with disclinations and dislocations, respectively. The Burgers vector of the dislocation is associated with torsion and the Frank angle of the disclination is associated with curvature. In this theory, the elastic deformations introduced by defects in the medium are incorporated into the metric of the manifold. This way, geometric tools from general relativity can then be used in the study of physical properties of material media containing topological defects. Conversely, these media can provide experimental tests of hypotheses of gravitational theory involving topological defects [@MORAES2000]. Topological defects are present in any type of crystalline material. They are a result of a local break of the discrete symmetry of crystals. Their generation as a “cut and glue” process was first described by Vito Volterra in 1907 [@Volterra1907] in what became known as the Volterra process. The geometrical description of elastic media with topological defects started in the 1950’s with Kondo [@kondo1958memoirs] and Bilby, Bullough and Smith [@Bilby] who, independently, build an elegant differential geometric theory of dislocations. The continuum theory of defects had then very important contributions in the ensuing years from Eshelby [@eshelby1956continuum], Kröner [@kroner1956kontinuumstheorie] and Zorawski [@zorawski1967theorie]. A very nice review of these developments is found in [@kroner1981continuum], including dislocations, disclinations and point defects. Dislocations, in particular, have a strong influence on the elastic and electronic properties of the media where they occur. Scattering by these defects has strong effects on elastic waves [@maurel2008interaction], magnons [@woltersdorf2004two] and electrons [@Jaszek2001]. For the electronic device industry, these defects are a problem since they interfere in the electronic properties of the materials by way of scattering or acting as electronic traps. On the other hand, line defects might be useful in the design of electronic devices as they act as one-dimensional conductive channels [@vish; @jairo; @knut]. There is large evidence of the similarity between dislocation lines and magnetic flux tubes. Recent research on the effects of dislocations indicate that they act as sources of a ficticious magnetic field in a Weyl semimetal [@Sumiyoshi]. On the other hand, even though they cause effects like Aharonov-Bohm-like phases [@Kawamura1978; @PhysRevB.59.13491; @Furtado2001160] and induce transverse modes in the quantum Hall effect [@clev], it has been shown recently, in a study of optical conductivity in the presence of a screw dislocation [@Taira], that they act qualitatively different from the magnetic field. Therefore, research on defects and how they may influence the dynamics of carriers is important for the improvement of electronic technology, the discovery of new phenomena and better control of transmission processes. The advent of spintronics [@RevModPhys.76.323], rises the interest on the effects of topological defects on the dynamics of the spinning carriers. Since torsion couples to spin, understanding its effects on spin dynamics may help in the design of spintronic devices through dislocation engineering. Using the geometric theory of defects, the authors of Ref. [@elastic] studied the quantum dynamics of a particle moving in a screw dislocation density, homogeneously distributed, and parallel to each other. Even without the application of an external magnetic field, they obtained energy eigenvalues much similar to the well known Landau levels due to the torsion field associated to the defect distribution. The coupling of torsion to the wave function comes from the distortion of the medium with the defects, which effectively appears as a modification of the kinetic energy due to the distorted trajectories. The Laplacian operator is substituted by its more general version, the Laplace-Beltrami operator, which incorporates the effective geometry of the medium as seen from the point of view of the geometric theory of defects. In the present work, we go a step further and include the coupling between the torsion field and the magnetic moment of the particle, a well known phenomenon of magnetoelasticity [@Eringen]. In elastic materials, the distortion of the medium around dislocations tends to align magnetic moments creating nanoscale magnetic patterns which have been largely studied both from the theoretical [@Seeger] as well from the experimental [@Bode] points of view. Here, we present a simplified approach, inspired in the geometric theory of defects, by adding to the Hamiltonian studied in Ref. [@elastic], a term coupling the torsion field of the defects to the spin (and therefore to the magnetic moment) of the quantum particle. This coupling is well known in quantum field theory in the presence of torsion [@shapiro] and naturally does not include all the details of the magnetoelasticity theory but, nevertheless, provides a geometric framework for the study of spinning particles in defected media. This work is presented as follows: in Section \[sect2\], after a brief introduction (subsection \[dis\]) to screw dislocations and their geometrical description, we discuss the classical behavior (Subsection \[cla\]) and solve (Subsection \[qua\]) the Schrödinger-Pauli-like equation for a free particle with spin interacting with an homogeneous distribution of screw dislocations. In the final part of this subsection we discuss the results and their implications to real systems like GaAs, for instance. In Section \[conc\] we present our conclusions. Appendix \[back\] gives some background on the geometry involving torsion and Appendix \[tqm\] gives the derivation of the torsion version of the Schrödinger-Pauli equation used in Subsection \[qua\]. Particle dynamics in a uniform screw dislocation distribution \[sect2\] ======================================================================= Screw dislocations \[dis\] -------------------------- The discrete translational symmetry of crystals eventually fails in real materials. A quite common fault that appears both in metals and semiconductors is the screw dislocation. Such defects appear naturally in the fabrication processes of the materials but are usually eliminated by annealing [@rollett2004recrystallization], since they impair the performance of electronic devices, as mentioned in the Introduction. A single screw dislocation can be visualized by the Volterra process [@Volterra1907]: make a cut in the material and move the parts separated by the cut relative to each other, as shown in Fig. \[fig1\]. The displacement made is known as the Burgers vector, represented by $\vec{b}$ in the figure. In real crystals, the displacement must be a translation vector of the lattice so that the cut surfaces fit together perfectly, except near the defect axis, defined by the end of the cut. ![Representation of a continuous elastic medium with a single screw dislocation with its Burgers vector $\vec{b}$.[]{data-label="fig1"}](dislocationnnn){width="5cm"} It is then clear that, in a medium with a screw dislocation with Burgers vector $\vec{b}=b\hat{z}$, given the cylindrical coordinates $(\rho,\varphi ,z)$, as $\varphi \rightarrow \varphi + 2\pi$ we must have $z \rightarrow z + b$. These are boundary conditions which is naturally encoded in a geometric background in the framework of the geometric theory of defects [@Katanaev19921; @katanaev]. For this particular case of a single screw dislocation, the corresponding effective geometry is described by the line element [@Furtado2001160] $$ds^2= d\rho^2 + \rho^2 d\varphi^2 + \left( dz + \frac{b}{2\pi} d\varphi \right)^2 . \label{metricsingle}$$ The generalization of Eq. (\[metricsingle\]) to a continuous distribution of screw dislocations is [@elastic] $$ds^2= d\rho^2 + \rho^2 d\varphi^2 + \left( dz + \Omega \rho ^2 d\varphi \right)^2, \label{metricdens}$$ where the density of the Burgers vectors $\Omega = bN/ 2$ and $N$ is the surface density of dislocations. Eq. (\[metricdens\]) sets the background for our classical and quantum studies that follow. Classical behavior \[cla\] -------------------------- In order to gain some intuition on the dynamics of a particle in the presence of a screw dislocation density we describe initially its classical behavior. Starting with the line element (\[metricdens\]) one can get the squared velocity of a particle of mass $\mu$ and, consequently, the Lagrangian $$L=\frac{1}{2} \mu \left(\frac{ds}{dt}\right)^2 = \frac{1}{2} \mu \left(\dot{\rho}^2 + \rho^2 \dot{\varphi}^2 + (\dot{z} + \Omega \rho^2 \dot{\varphi})^2 \right). \label{Lag}$$ In contrast, the analogous Lagrangian for a particle of charge $q$ in an uniform magnetic field $\vec{B}=B\hat{z}$ is [@symon1971mechanics] $$L^{mag}= \frac{1}{2} \mu \left(\dot{\rho}^2 + \rho^2 \dot{\varphi}^2 +\dot{z}^2 \right)+ \frac{1}{2}q \rho^2 \dot{\varphi}B . \label{Lagmag}$$ It is clear that $z$ and $\varphi$ are cyclic coordinates for the Lagrangian (\[Lag\]) and therefore that the corresponding momenta are conserved. That is, $$p_z = \frac{\partial L}{\partial \dot{z}}= \mu \dot{z} + \mu\Omega \rho^2 \dot{\varphi} \label{pz}$$ and $$p_{\varphi} = \frac{\partial L}{\partial \dot{\varphi}}= \mu\rho^2 \dot{\varphi} + \Omega \rho^2 p_z ,\label{el}$$ where $p_{\varphi}$ and $p_z$ are constants of motion. The corresponding momenta for the magnetic case are [@symon1971mechanics] $$p_z^{mag} = \mu \dot{z} \label{pzmag}$$ and $$p_{\varphi}^{mag}=\mu\rho^2 \dot{\varphi} + \frac{1}{2}q\rho^2 B. \label{elmag}$$ The third constant of motion, the energy $E$, is given by the Hamiltonian $H=\sum_i p_i \dot{q}_i - L(q_i , \dot{q}_i )$, which becomes $$H = \frac{1}{2}\mu\dot{\rho}^2 + \frac{1}{2}\mu\dot{z}^2 + \frac{1}{2}\mu\left( 1 + \Omega^2 \rho^2 \right)\rho^2\dot{\varphi}^2 + \mu\Omega \rho^2 \dot{\varphi}\dot{z}$$ and therefore $$E= \frac{1}{2}\mu\dot{\rho}^2 + \frac{p_z^2}{2\mu} + \frac{1}{2\mu} \left( \frac{p_{\varphi}}{\rho} - \Omega\rho p_z \right)^2 , \label{Losc}$$ after using Eqs.(\[pz\]) and (\[el\]). The corresponding expression for the magnetic case has exactly the same form [@symon1971mechanics]: $$E^{mag}= \frac{1}{2}\mu\dot{\rho}^2 + \frac{(p_z^{mag})^2}{2\mu} + \frac{1}{2\mu} \left( \frac{p_{\varphi}^{mag}}{\rho} - \frac{1}{2}q\rho B\right)^2 . \label{Loscmag}$$ The steady orbits are obtained at the minimum of the effective potential $\frac{1}{2\mu} \left( \frac{p_{\varphi}}{\rho} - \Omega\rho p_z \right)^2 $. This requirement, plus Eqs. (\[pz\]) and (\[el\]) gives for the angular frequency, $$\dot{\varphi}=- \frac{2\Omega p_z}{\mu}, \label{angfreq}$$ and for the radius $$\rho=\sqrt{\frac{|p_{\varphi}|}{\Omega |p_z |}}, \label{raio}$$ to be compared with the magnetic case $$\dot{\varphi}^{mag}=- \frac{qB}{\mu}, \label{angfreqmag}$$ $$\rho^{mag}=\sqrt{\frac{2|p_{\varphi}|}{q|B|}}, \label{raiomag}$$ respectively. Note that $p_{\varphi}=-\Omega \rho^2 p_z$, and therefore that, $p_z$ and $p_{\varphi}$ have opposing signs. Clearly the orbits are spirals like the one shown in Fig. \[geo\], as in the magnetic case. ![Classical trajectory for a particle moving in the presence of a continuous distribution of screw dislocations.[]{data-label="geo"}](classic){width="6cm" width="6cm"} Inspection of the above equations indicate that $2\Omega p_z$ is the analogue of $qB$ in the defect distribution. This indicates that absence of motion along the $z$ direction is equivalent to no magnetic field. Planar, circular orbits are not possible in the defect distribution, in contrast with the cyclotron orbits of the charged particle moving in a magnetic field. Furthermore, while the magnetic field couples to the charge, the defect density couples to the mass of the particle by modifying its inertial properties. This way, a classical Hall-like effect due to a screw dislocation density is unable to determine the charge of a carrier. The problem considered here involves a uniform torsion field, which is represented by its axial vector (Eq. (\[S3\])), as described in Appendix \[back\]. A representation of this vector field is shown in Fig. \[graf\] but a more intuitive picture of its effect can be obtained by exploring the isometries associated to this field. According to the well-known Noether theorem, conservation laws are associated to symmetry operations that leave the Lagrangian invariant. The conserved quantities are generators of these symmetry operations. Thus, the conserved mixed momenta given by Eqs. (\[pz\]) and (\[el\]) generate a combined motion along the $z$ and $\varphi$ directions. In other words, while the momentum $p_{\varphi}$ generates infinitesimal rotations around the $z$ axis, the momentum $p_z$ generates simultaneous displacements along $z$, due to the coupling between Eqs. (\[pz\]) and (\[el\]). From Eqs. (\[pz\]) and (\[el\]), we see that during an infinitesimal interval of time $dt$ there will be simultaneous translations of $dz$ along the $\hat{z}$ direction and $\Omega\rho (\rho d\varphi)$ along the $\hat{\varphi}$ direction which leave the Lagrangian invariant. In order to give an intuitive view of the isometries introduced by the torsion field we show in Fig. \[graf2\] a representation of the vector field $ (\hat{z} + \Omega \rho \hat{\varphi})$ which represents the infinitesimal displacements just mentioned. ![The torsion field associated to the screw dislocation distribution, as represented by the axial vector (Eq. (\[S3\])). The field is oriented parallel to the $z$ direction. []{data-label="graf"}](density){width="8cm" width="8cm"} ![Representation of the vector field $ (\hat{z} + \Omega \rho \hat{\varphi})$ which gives, at each point, the direction of an infinitesimal translation that leaves the equations of motion invariant: a) side view and b) top view.[]{data-label="graf2"}](killing2){width="8cm" width="8cm"} Quantum behavior \[qua\] ------------------------ Now, we turn to the quantum behavior. The dynamics of the particle in the screw dislocation distribution is given by an expression analogous to the Schrödinger-Pauli Hamiltonian, which was derived in Appendix \[tqm\] (Eq. (\[Htor\])): $$H= \frac{1}{2\mu}\vec{p}\,^2 + \eta \vec{\sigma} \cdot \vec{S} , \label{Htor1}$$ where $\mu$ is the effective mass of the particle in the medium with the defects, $\vec{\sigma}$ is the particle’s spin and $\vec{S}$ is the torsion field associated to the defect distribution. The second term on the right hand side of this equation is analogous to the Zeeman term $\left( \frac{e\hbar}{2m}\right)\vec{\sigma} \cdot \vec {B}$ which couples spin angular momentum and magnetic field. The material-dependent coupling constant $\eta$ expresses the magnetoelastic interaction; that is, it describes how strong is the effect of elastic torsion, due to the defect distribution, on the spin angular momentum of the particle and should be determined experimentally for each material. Note that $\eta$ has the dimensions of energy times distance. Shapiro and co-authors have shown that $\eta=-(1/8)\hbar c$ and they also consider the possible generalization to other situations [@shapiro2; @Ryder199821]. Using the same value, we obtain spin splitting of order of magnitude between those observed experimentally [@kato2004coherent] and theoretically predicted [@chantis2008strain] for strained GaAs, as shown below. Eq. (\[Htor1\]) leads to the following differential equation in cylindrical coordinates (see the derivation of Eq. (\[schrod\]) in Appendix \[tqm\]): $$\begin{aligned} &&\left[ \frac{1}{\rho}\frac{\partial}{\partial \rho} \left( \rho \frac{\partial}{\partial \rho} \right) + \frac{1}{\rho^2}\frac{\partial^2}{\partial \varphi^2} - 2\Omega \frac{\partial^2}{\partial z \partial \varphi} \right. + \nonumber \\ && \left. \left( 1+\Omega^2 \rho^2 \right)\frac{\partial^2}{\partial z^2}+\frac{2\mu E}{\hbar^2}-\frac{4\mu \Omega \eta \lambda}{\hbar^2} \right] \Psi = 0 , \label{schrod1}\end{aligned}$$ where $\lambda=\pm 1$ is the eigenvalue of the Pauli matrix $\sigma^3$. To solve this equation we use the [*ansatz*]{} $$\Psi \left( \rho, \varphi, z \right) = R \left( \rho \right) e^{im \varphi}e^{ikz} , \label{ansatz}$$ where $m$ is an integer. Substituting Eq.(\[ansatz\]) into Eq.(\[schrod1\]), the Scr" odinger-Pauli-like equation takes the following form $$\begin{aligned} &&\frac{1}{\rho}\frac{d}{d\rho}\left( \rho \frac{dR}{d\rho}\right)-\frac{m^2}{\rho^2}R - k^2 \Omega^2 \rho^2 R + \nonumber \\ && \left[ \frac{2\mu E}{\hbar^2} +2mk\Omega - k^2 -\frac{4\mu \Omega \eta \lambda}{\hbar^2} \right] R =0 . \label{xx}\end{aligned}$$ Comparing this equation to its classical counterpart, Eq. (\[Losc\]), we identify that the effective classical potential $ \frac{1}{2\mu} \left( \frac{p_{\varphi}}{\rho} - \Omega\rho p_z \right)^2$ is mapped onto $\frac{1}{2\mu} \left( \frac{\hbar m}{\rho} - \Omega\rho \hbar k \right)^2$ as it should. Following Ref. [@elastic], we consider the change of variables $$\xi \equiv k \Omega \rho^2 , \label{changev}$$ and substituting Eq.(\[changev\]) into Eq.(\[xx\]), we have the following equation $$\xi \frac{d^2 R}{d\xi^2}+\frac{dR}{d\xi}-\frac{m^2}{4\xi}R -\frac{\xi}{4}R+\beta R =0 , \label{R}$$ where $$\beta = \frac{1}{4k\Omega} \left( \frac{2\mu E}{\hbar^2} +2mk\Omega - k^2 -\frac{4\mu \Omega \eta \lambda}{\hbar^2} \right). \label{beta}$$ The asymptotic behavior of Eq. (\[R\]) suggests that we write $$R \left( \xi \right) = e^{-\frac{\xi}{2}}\xi^{\frac{|m|}{2}}u\left( \xi \right) . \label{}$$ The equation for $u(\xi)$ is therefore $$\xi \frac{d^2 u}{d\xi^2}+\left( 1+|m|-\xi \right)\frac{du}{d\xi} + \left( \beta -\frac{|m|+1}{2}\right) u=0 . \label{function}$$ This second order ordinary differential equation, which has as coefficients linear functions of $ \xi $, has as solution a confluent hypergeometric function, given by $$u\left( \xi \right) = F\left( -\beta + \frac{|m|+1}{2},1+|m|,\xi \right). \label{n}$$ For a normalisable wave function, the series (\[n\]) should end, becoming a polynomial of degree $n_{\rho}$ so that $$-\beta + \frac{|m|+1}{2}=-n_{\rho} \label{nn}$$ Combining Eqs. (\[nn\]) and (\[beta\]), we find the discrete energy values with the spin term contribution $$E=\hbar \omega_{el} \left(n+\frac{1}{2} \right) + 2\Omega \eta \lambda + \frac{k^2 \hbar^2}{2 \mu}, \label{ll}$$ where $$\omega_ {el} = \frac{2 \hbar k \Omega}{\mu} \label{freq}$$ is the elastic “cyclotron” frequency and $n=n_{\rho} + \frac{|m|}{2}+\frac{m}{2}$. Note that Eq. (\[freq\]) is consistent with its classical counterpart (\[angfreq\]) with the identification of $\hbar k$ with $p_z$. Note also that the quantum numbers $n_{\rho}$, $m$ and $k$ correspond to the radial, angular and linear degrees of freedom, respectively. The Burgers vector density, as previously mentioned, is $\Omega = bN/2$, where $b$ is the Burgers vector and $N$ is the surface density of screw dislocations. Like in the case of magnetic Landau levels, $E$ is degenerate with respect to $n$, since $n_{\rho} \in \mathbb{N}$ and $m \in \mathbb{Z}$. The spin term partially removes the degeneracy as seen in Fig. \[grafico\]. The fact that the elastic frequency (\[freq\]) depends on $k$ expresses the 3-dimensionality of the motion. Since the defects couple $z$ and $\varphi$, their effect does not appear without motion along the $z$-direction, as mentioned in Subection \[cla\]. The fact that $k \in \mathbb{R}$ brings about the possibility of zero modes for spinless particles, when $k =- (2n+1) 2\Omega = -(2n+1) S$ and $k=0$. ![The energy, as in Eq. (\[ll\]), as a function of the wave vector for a dislocation density $N=10^8$ disl.$/cm^2$. We consider $s=0$ for the particle without spin and $s= \pm \frac{\hbar}{2}$ for the case with spin. We used $\eta = -\frac{1}{8}\hbar c$ and data for GaAS (electron effective mass, Burgers vector magnitude, and typical range of dislocation density). []{data-label="grafico"}](Energiaxk){width="9cm" width="9cm"} Fig. \[grafico\] shows a plot of the energy as a function of wave vector $k$ showing the vertical shift of the parabolic band due to spin splitting. The aforementioned zero mode at $k =- (2n+1) 2\Omega = -(2n+1) S$ corresponds to a value of $k$ too small to be seen in the scale used. ![The magnitude of the spin splitting, as a function of dislocation density. []{data-label="grafico2"}](split){width="8cm" width="8cm"} From Eq. (\[ll\]) we have the magnitude of the spin splitting, $|\Delta E| = 4 \Omega|\eta|$, which is plotted in Fig. \[grafico2\] as a function of the dislocation density. We remark that, from the experimental point of view, this would require separate samples with different defect densities. In order to plot the graphics shown in Fig. \[grafico\] and \[grafico2\], we use parameters for bulk GaAs found in the literature [@Jaszek2001]: the density of screw dislocations $N \sim 10^8$ disl./$cm^2$), the magnitude of the Burgers vector $b=4 \times 10^{-10} m$ , and the electron effective mass is $\mu = 0.61 \times 10^{-31}kg$. What is seen in Fig. \[grafico2\] is the same kind of splitting that happens in the Zeeman effect, which leads to Electron Spin Resonance (ESR) phenomena [@esr], suggesting the possibility of ESR experiments using elastic torsion instead of magnetic field. Furthermore, as pointed out in [@kato2004coherent] and [@li2008strain], strain can be used to manipulate spins, turning topological defects like dislocations, with their associated strain/torsion field, into possible tools for this manipulation. The results obtained here can be compared to those of references [@kato2004coherent] and [@chantis2008strain], for instance, that study spin-splitting in GaAs strained samples. The relevant parameters for spin splitting in these works are, respectively, drift velocity [@kato2004coherent] and wave vector amplitude [@chantis2008strain]. In our work, the relevant parameter is the dislocation density, that is, the strain itself. For the range of drift velocities studied experimentally in Ref. [@kato2004coherent], the authors report $|\Delta E| \sim 0.1\, \mu$eV. For the range of wave vector amplitudes studied theoretically in Ref.[@chantis2008strain], it is $|\Delta E| \sim 0.1$ meV. Our results, for realistic dislocation densities, are placed in between, with $|\Delta E| \sim 0.01$ meV, making their experimental observation feasible. Concluding remarks \[conc\] =========================== In this work, we study the dynamics of a particle in a medium with a uniform distribution of screw dislocations, which are quite common defects in crystalline materials. Although there are some similarities with the problem of a charged particle in the presence of a uniform magnetic field, as it has been pointed out in the literature, there are important differences as well. The classical picture, analyzed in Subsection \[cla\] as a means of providing some physical intuition on the effects of the defect distribution, presents some of these differences. For instance, the motion is always three-dimensional due to the nature of the defect distribution, which couples the angular ($\varphi$) and the linear ($z$) degrees of freedom of the particle. Also, there is no distinction between positively or negatively charged particles. The quantum picture introduces a coupling between the spin of the particle and the defect distribution. It is known that such a defect density on elastic media generates a torsion field that acts on the particle as if an external magnetic field were being applied to it. In fact, a Zeeman-like effect appears due to the torsion-spin coupling. On the other hand, the energy levels, although similar to the magnetic (Landau) levels, have a few important differences. While the motion of charged particles in the presence of a uniform magnetic field may be confined to a plane perpendicular to the field lines, this is not possible in the case of torsion, which needs motion in three-dimensional space in order to show up its effects. Furthermore, in the case of a spinless particle, when the $z$-component of its linear momentum is antiparallel to the torsion field, there appear zero energy modes for quantized values of the momentum. The coupling of the torsion field to the spin of the particle introduces a shift in the energy spectrum and breaks the spin degeneracy like in the Zeeman effect. This magnetic-like field produced by the density of defects is insensitive to the charge signal and thus will have the same effect on spinning neutral particles. Since the Zeeman-like splitting allows for ESR experiments, there is the perspective of using magnetic-like resonance to study neutral particles like excitons in the triplet state. Even though the main focus of spintronic studies has been on dislocation-free materials, since the defects couple to magnetic moments, they may be useful in the design of spintronic devices, in addition to curvature, which has been suggested as a tool to aid in the design of electronic nanodevices [@nano]. Some background on torsion \[back\] =================================== Riemanniann (and pseudo-Riemmanian as in general relativity) geometry is torsion-free due to the requirement that the metric tensor should be symmetric: $$g_{\mu\nu} = g_{\nu\mu},$$ where the Greek indices $\mu,\nu$ refer to 4-dimensional spacetime coordinates. Relaxing this rule brings about the geometry of Riemann-Cartan, which naturally includes torsion and curvature as its main geometric entities. Torsion appears naturally in the differential forms approach [@forms]. In this formalism, the metric tensor $g$ is written in terms of the 2-form basis $dx^{\mu}\wedge dx^{\nu}$ as $g = g_{\mu\nu} dx^{\mu}\wedge dx^{\nu}$. In a flat manifold, one can have a universal Cartesian frame such that $g_{\mu\nu}$ is diagonal. Although this is not possible in a more general manifold with curvature and/or torsion, one can still have it locally since the (Lorentz) tangent space in each point is flat. Therefore, it is interesting to make a transformation between the manifold coordinates and the local Cartesian coordinates in tangent space such that the metric tensor is made (locally) diagonal. Denoting the transformation between the manifold $\theta^a$ and Lorentz $dx^{\mu}$ 1-form bases by $$\theta^a = e^a_{\mu} dx^{\mu}, \label{transf}$$ we have for the line element $$ds^2 = g_{\mu\nu}dx^{\mu}dx^{\nu}=\eta_{ab} \theta^a \theta^b, \label{diagline}$$ where $\eta_{ab}$ is diag(-1,1,1,1) since the tangent space is flat. The transformation matrix $e^a_{\mu}$ is known as tetrad and it gives rise to the Cartan connection, as seen below. The Cartan connection is defined as $$\Gamma^{\sigma}_{\mu\nu}= e_a^{\sigma} \partial_{\nu} e^a_{\mu}, \label{Cconnection}$$ where $e_a^{\mu}$ is such that $e^a_{\mu}e_a^{\nu} = \delta_{\mu}^{\nu}$. This is the connection that parallel transports the tetrad field. That is, the covariant derivative $$\nabla_{\nu} e^a_{\mu} = \partial_{\nu} e^a_{\mu} - \Gamma^{\rho}_{\mu\nu}e^a_{\rho} = 0.$$ The torsion 2-form $T$ is given by the structure equation $$T = d \theta + \omega \wedge \theta , \label{Tform}$$ where $\omega$ is the 1-form spin connection. In terms of components, we have $$T^{\sigma}=d \theta^{\sigma} + \omega^{\sigma}_{\nu} \wedge \theta^{\nu} = T^{\sigma}_{\mu\nu} \theta^{\mu} \wedge \theta^{\nu},$$ where $$T^{\sigma}_{\mu\nu} = \Gamma^{\sigma}_{\mu\nu} - \Gamma^{\sigma}_{\nu\mu} , \label{T}$$ which naturally vanishes for the torsion-free Levi-Civita connection, which is symmetric under $\mu \leftrightarrow \nu$. Riemann-Cartan geometry applies naturally to the physics of continuum elastic media with topological defects. The defects appear as a result of breaking the translational and/or rotational symmetry of the continuum. In particular, line defects like disclinations which carry curvature but no torsion, are associated to rotational symmetry breaking. Dislocations, on the other hand, carry torsion but not curvature and are associated to translational symmetry breaking. Consider a medium with a continuous and uniform screw dislocation distribution oriented along the z-axis. The metric that corresponds to a set of parallel screw dislocations, in cylindrical coordinates, is given by Eq. (\[metricdens\]) : $$ds^2= d\rho^2 + \rho^2 d\varphi^2 + \left( dz + \Omega \rho ^2 d\varphi \right)^2, \label{metric}$$ with the following density of the Burgers vectors $\Omega = bN / 2$, where $b$ is the Burgers vector and $N$ is the surface density of dislocations. This metric describes a continuous distribution of screw dislocations, with torsion uniformly distributed throughout the space. Looking at the metric (\[metric\]) we choose the 1-form basis $$\begin{aligned} \theta^1 & = & d\rho \nonumber \\ \theta^2 & = & \rho d\varphi \nonumber \\ \theta^3 & = & dz + \Omega \rho^2 d \varphi \label{basisT}\end{aligned}$$ such that the line element $ds^2= \delta_{ab}\theta^a \theta^b $, with $a,b = 1,2,3$. The torsion 2-form is given by the structure equation (\[Tform\]) where $\omega$ now is zero since there is no curvature. It follows that $$T = d\theta^3 = 2\Omega \, d\rho \wedge \rho d\varphi . \label{T2}$$ Torsion in quantum mechanics \[tqm\] ==================================== Torsion makes its appearance in quantum mechanics through the axial vector $$S^{\nu} =\epsilon^{\alpha\beta\mu\nu}T_{\alpha\beta\mu}, \label{S}$$ where $T_{\alpha\beta\mu}=g_{\alpha\sigma} T^{\sigma}_{\beta\mu} $. Since torsion couples to spin, it naturally appears in the Dirac equation. Indeed, the Dirac operator in a space-time with torsion can be written as [@shapiro] $$i\hbar \frac{\partial}{\partial t} = c \vec{\alpha}\cdot \vec{p} - \eta \vec{\alpha} \cdot \vec{S} \gamma_5 + \eta \gamma_5 S_0 + \mu c^2 \beta , \label{Dirac1}$$ where $\eta$ is a coupling constant between torsion and matter fields and $\vec{\alpha}$, $\gamma_5$ and $\beta$ are the usual Dirac matrices. While $S_0$ is the time-axis component of the axial quadrivector, $\vec{S}$ represents its space part. In the non-relativistic limit, this results in the low-energy Pauli-like Hamiltonian [@shapiro] $$H= \frac{1}{2\mu}\vec{\pi}^2 + B_0 + \vec{\sigma} \cdot \vec{Q}, \label{H}$$ where $$\vec{\pi}=\vec{p}-\frac{\eta_1}{c}\vec{\sigma}S_0, \label{pi}$$ $$\vec{Q}= \eta \vec{S} \label{Q}$$ and $$B_0 = - \frac{1}{\mu c^2}\eta^2 S_0^2 . \label{B}$$ In Eqs. (\[H\]) and (\[pi\]), $\vec{\sigma}$ is the Pauli vector. The three-dimensional version of the torsion axial vector (\[S\]) is $S^{\nu} = \epsilon^{\alpha\beta\nu} T_{\alpha\beta}$ and its only non-null component is, from (\[T2\]), $$S^{3} = 2 \Omega . \label{S3}$$ It follows from Eqs. (\[pi\])-(\[B\]) that $\vec{\pi}=\vec{p}$, $\vec{Q}=\eta \vec{S}$, $B_0=0$ and therefore that $$H= \frac{1}{2\mu}\vec{p}\,^2 + \eta \vec{\sigma} \cdot \vec{S} , \label{Htor}$$ from Eq. (\[H\]). From Eq. (\[Htor\]), it follows that $$H=-\frac{\hbar^2}{2\mu}\nabla^2_{LB} + 2\Omega \eta \sigma^3 , \label{Hsig}$$ where $\nabla^2_{LB} $ stands for the Laplace-Beltrami operator, which incorporates the boundary conditions associated to the defect distribution, and $\sigma^3$ is the Pauli matrix. Since the Hamiltonian given by Eq. (\[Hsig\]) is diagonal in the spin degree of freedom, we can write $$\begin{aligned} &&\left[ -\frac{\hbar^2}{2\mu}\frac{1}{\sqrt{|g|}} \frac{\partial}{\partial x^i}\left( \sqrt{|g|} g^{ij} \frac{\partial}{\partial x^j}\right) +2\Omega \eta \lambda \right] \Psi = E \Psi , \nonumber \\ \label{sch}\end{aligned}$$ where $\lambda=\pm 1$ is the eigenvalue of the Pauli matrix $\sigma^3$. This results in the following equation: $$\begin{aligned} &&\left[ \frac{1}{\rho}\frac{\partial}{\partial \rho} \left( \rho \frac{\partial}{\partial \rho} \right) + \frac{1}{\rho^2}\frac{\partial^2}{\partial \varphi^2} - 2\Omega \frac{\partial^2}{\partial z \partial \varphi} \right. + \nonumber \\ && \left. \left( 1+\Omega^2 \rho^2 \right)\frac{\partial^2}{\partial z^2}+\frac{2\mu E}{\hbar^2}-\frac{4\mu \Omega \eta \lambda}{\hbar^2} \right] \Psi = 0 , \label{schrod}\end{aligned}$$ which is Eq. (\[schrod1\]). [**Acknowledgements**]{}: This work was supported by CAPES, CNPq and FACEPE (Brazilian agencies).
High
[ 0.685271317829457, 27.625, 12.6875 ]
<!DOCTYPE html> <html lang="en"> <head> <title>Ethereum: Bitcoin Testnet Relay Contract Status</title> <link rel="stylesheet" href="./css/bootstrap.min.css"> <link rel="stylesheet" href="./css/dapp.css"> <script src="./js/jquery-2.1.3.min.js"></script> <script src="./js/bootstrap.min.js"></script> <script src="./js/btcRelayAbi.js"></script> <script src="./js/bignumber.js"></script> <script src="./js/web3.min.js"></script> <script> if (typeof web3 !== 'undefined') { // Web3 has been injected by the browser (Mist/MetaMask) web3 = new Web3(web3.currentProvider); } else { // fallback - use your fallback strategy (local node / hosted node + in-dapp id mgmt / fail) web3 = new Web3(new Web3.providers.HttpProvider("https://morden.infura.io:8545")); } var heightPerRelay; $(function() { /* do NOT forget to update ABI files when needed */ var relayAddr = '0x4bfc72eebe3644a1ab1f7c093b3b2fd1595b4cbd'; // Morden relay for BTC TESTnet // var relayAddr = web3.eth.namereg.addr('btcrelay'); // Olympic $('#relayAddr').text(relayAddr); updateBlockr(); var RelayContract = web3.eth.contract(btcRelayAbi); // see ./js/btcRelayAbi.js var contract = RelayContract.at(relayAddr); heightPerRelay = contract.getLastBlockHeight.call().toString(); $('#latestBlockHeight').text(heightPerRelay); var headHash = contract.getBlockchainHead.call(); $('#latestBlockHash').text(formatHash(headHash)); var feeVTX = web3.fromWei(contract.getFeeAmount.call(headHash), 'ether'); $('#feeVTX').text(feeVTX); window.btcrelayTester = contract; // signature of verifyTx is (txHash, txIndex, merkleSiblingArray, txBlockHash) // to make a call to verifyTx so that btcrelay will get some fees, // run this code in the browser developer console: fees will be sent // from the coinbase // res = btcrelayTester.verifyTx.sendTransaction(0, 1, [], 0, {from: web3.eth.coinbase, value: web3.toWei('0.1', 'ether')}); // console.log('txHash for verifyTx: ', res) // mock chainWork since the initialization did not set it correctly // var headScore = contract.getChainWork.call(); // $('#latestBlockScore').text(web3.toBigNumber(headScore).toString(10)); $('#latestBlockScore').text('...'); // setTimeout(checkHeights, 1000); don't show node warning }); function updateBlockr() { $.getJSON('http://tbtc.blockr.io/api/v1/block/info/last', function(data) { $('#blockrBlockHeight').text(data.data.nb); }); } function checkHeights() { var blockrHeight = $('#blockrBlockHeight').text(); var bciHeight = blockrHeight; // hack for now, since BCI has no testnet if (!bciHeight || !blockrHeight || heightPerRelay === bciHeight || heightPerRelay === blockrHeight) { $('#warnSync').hide(); } else { $('#nodeBlockNum').text(web3.eth.blockNumber); $('#warnSync').show(); } } function formatHash(bnHash) { var hash = bnHash.toString(16); return Array(64 - hash.length + 1).join('0') + hash; } </script> </head> <body> <div class="container"> <div class="logo"> <img src="./images/ethereum-logo-small.png"/> </div> <div class="jumbotron"> <h2><a href="https://github.com/ethereum/btcrelay">Ethereum: Bitcoin Testnet Relay</a> on <a href="https://github.com/ConsenSys/ConsenSys.github.io/wiki/ConsenSys-public-testnet">PUBLIC ETH TESTNET</a></h3> <h3>BTC Relay: <strong id="relayAddr"></strong></h3> <h3><a href="./js/btcRelayAbi.js">ABI</a></h2> <h3>Latest Block Hash: <strong id="latestBlockHash"></strong></h3> <div> <h3 style="display: inline-block">Latest Block#: <strong id="latestBlockHeight"></strong></h3> <div style="display: inline-block; margin-left:3em">may be behind since BTC testnet may produce blocks much faster than 1 every 10 mins&nbsp<a href="https://tbtc.blockr.io" target="_">tbtc.blockr.io</a>: <strong id="blockrBlockHeight"></strong></span> </div> <h3>Latest Block ChainWork: <strong id="latestBlockScore"></strong></h3> <h3 id="warnSync" style="display: none">Your Ethereum node may not be fully synced: <span id=nodeBlockNum></span>. Check <a href="https://stats.ethdev.com" target="_">stats</a> for the latest blocks. </h3> <h3>ETH fee (0 means free to use): <strong id="feeVTX"></strong></h3> </div> <!-- <h3>blockchain.info Latest Block Hash: <strong id="bciBlockHash"></strong></h3> --> <!-- <div class="footer-logo"> <img src="./images/ETH_DEV_LOGO_LARGE.svg"/> </div> --> </div> </body> </html>
Low
[ 0.48072562358276605, 26.5, 28.625 ]
MAIN = t0 include sdcc.mk
Low
[ 0.521472392638036, 31.875, 29.25 ]
--- abstract: 'The exponential sensitivity of cluster number counts to the properties of the dark energy implies a comparable sensitivity to not only the mean but also the actual [*distribution*]{} of an observable mass proxy given the true cluster mass. For example a $25\%$ scatter in mass can provide a $\sim 50\%$ change in the number counts at $z \sim 2$ for the upcoming SPT survey. Uncertainty in the scatter of this amount would degrade dark energy constraints to uninteresting levels. Given the shape of the actual mass function, the properties of the distribution may be internally monitored by the shape of the [*observable*]{} mass function. An arbitrary evolution of the scatter of a mass-independent Gaussian distribution may be self-calibrated to allow a measurement of the dark energy equation of state of $\sigma(w) \sim 0.1$. External constraints on the mass [*variance*]{} of the distribution that are more accurate than $\Delta {\sigma_{\ln {M}}}^2 < 0.01$ at $z \sim 1$ can further improve constraints by up to a factor of 2. More generally, cluster counts and their sample variance measured as a function of the observable provide internal consistency checks on the assumed form of the observable-mass distribution that will protect against misinterpretation of the dark energy constraints.' author: - 'Marcos Lima$^{1}$ and Wayne Hu$^{2}$' title: 'Self-Calibration of Cluster Dark Energy Studies: Observable-Mass Distribution' --- Introduction ============ It is well known that cluster counts as a function of their mass are exponentially sensitive to the amplitude of the linear density field and hence the dark energy dependent growth of structure. Unfortunately the mass of a cluster is not a direct observable and their numbers can only be counted as a function of some observable proxy for mass. Typical proxies include the Sunyaev-Zel’dovich flux decrement, X-ray temperature, X-ray surface brightness or gas mass, optical galaxy richness, and the weak lensing shear. The exponential sensitivity to mass translates into a comparable sensitivity to the whole [*distribution*]{} of the observable given the mass not just the mean relationship. While scatter in the observable-mass relation is typically addressed in studies of the local cluster abundance (e.g. [@Ikeetal01]), it is commonly ignored in forecasts for upcoming high redshift surveys (e.g. [@HaiMohHol01; @HuKra02; @WanKhoHaiMay04]). While it is true that scatter in the observable of a known form does little to degrade the dark energy information, uncertainties in the distribution directly translate into uncertainties in the dark energy inferences that must be controlled. In this Paper we undertake a general study of the impact of uncertainty in the observable-mass distribution on high redshift cluster counts. Previous work on forecasting prospects for dark energy constraints have examined the effect of scatter under specific and typically more restrictive assumptions. For example, the change in the number counts, known as Eddington bias [@Edd13], has been assessed for a fixed cut in signal-to-noise of cluster detection via the Sunyaev-Zel’dovich flux in a hydrodynamic simulation [@HolMohCarEvrLei00] and through modeling a constant scatter in mass [@BatWel03]. However it is the uncertainty in the scatter, or the error in the correction of the bias, that degrades dark energy constraints. Along these lines, Levine et al. [@LevSchWhi02] considered the marginalization of a constant scatter in the mass-temperature relation for clusters but with strong external priors on the dark energy parameters. Prospects for the self-calibration of the [*mean*]{} observable-mass relation have been extensively studied recently. Self-calibration relies on the fact that both the shape of the mass function [@Hu03a] and the clustering of clusters [@MajMoh03] can be predicted from cosmological simulations. Much of the information in the latter can be extracted from the angular variance of the counts so that costly spectroscopy can be avoided [@LimHu04]. Thus by demanding consistency between the counts and their sample variance across the sky as a function of the observable mass, one can jointly solve for the cosmology and the mean observable mass relation. Here we show that the shape of the mass function is even more effective at monitoring the scatter in the observable-mass relation. We begin in §\[sec:distribution\] with a discussion of our parameterization of the observable-mass distribution and assess its implications for the dark energy. We examine the prospects for self-calibration in §\[sec:self\] and conclude in §\[sec:discussion\]. Observable-Mass Distribution {#sec:distribution} ============================ The cosmological utility of cluster number counts arises from their exponential sensitivity to the amplitude of the linear density field. For illustrative purposes, we will employ a fit to simulations for the mass function or the differential comoving density of clusters [@Jenetal01] $${d \bar n \over d\ln M} = 0.3 {\rho_{m} \over M} {d \ln \sigma^{-1} \over d\ln M} \exp[-|\ln \sigma^{-1} + 0.64|^{3.82}]\,, \label{eqn:massfun}$$ where $\sigma^2(M;z)\equiv \sigma^2_{R}(z)$, the linear density field variance in a region enclosing $M=4\pi R^3\rho_m/3$ at the mean matter density today $\rho_{m}$. =3.4in To exploit this exponential sensitivity, the observable-mass distribution must be known to a comparable accuracy. Let us consider the probability of assigning a mass ${M^{\rm obs}}$ to a cluster of true mass $M$ to be given by a Gaussian distribution in $\ln M$ as motivated by the observed scatter in the scaling relations between typical cluster observables (e.g. [@Ikeetal01]) $$p({M^{\rm obs}}| {M}) = {1 \over \sqrt{2\pi {\sigma_{\ln {M}}}^2} } \exp\left[ -x^2({M^{\rm obs}}) \right] \,,$$ where $$x({M^{\rm obs}}) \equiv { \ln {M^{\rm obs}}- \ln M - \ln {M^{\rm bias}}\over \sqrt{2 {\sigma_{\ln {M}}}^2}} \,.$$ For simplicity we will allow the mass variance ${\sigma_{\ln {M}}}^2$ and the mass bias $\ln {M^{\rm bias}}$ to vary with redshift but not mass. We implicitly exclude sources of scatter due to noise in the measurement of ${M^{\rm obs}}$ which certainly would depend on ${M^{\rm obs}}$ but in a way that is known given the properties of a specific survey. More generally, our qualitative results will hold so long as any trend in mass at a fixed redshift is known. =3.4in The average number density of clusters within a range defined by cuts in the observable mass ${M^{\rm obs}}_i \le {M^{\rm obs}}\le {M^{\rm obs}}_{i+1}$ is $$\begin{aligned} \bar n_i & \equiv \int_{{M^{\rm obs}}_i}^{{M^{\rm obs}}_{i+1}} {d {M^{\rm obs}}\over {M^{\rm obs}}} \int {dM \over M} { d \bar n \over d\ln M} p({M^{\rm obs}}| {M})\nonumber \\ & = \int {d M \over M} { d \bar n \over d\ln M} {1\over 2} \left[ {\rm erfc}(x_i) - {\rm erfc}(x_{i+1}) \right] \,, \label{eqn:binneddensity}\end{aligned}$$ where $x_i = x({M^{\rm obs}}_i)$. The mean number of clusters in a given volume $V_i$ is then $$\begin{aligned} \bar m_i = \bar n_i V_i \,.\end{aligned}$$ Note that in the limit that ${\sigma_{\ln {M}}}^{2} \rightarrow 0$ and ${M^{\rm obs}}_{i+1} \rightarrow \infty$, $\bar m_i$ is the usual cumulative number counts above some sharp mass threshold. An unknown scatter or more generally uncertainty in the distribution of the observable mass given the true mass causes ambiguities in the interpretation of number counts. Fig. \[fig:leak\] shows the expected mass distribution of clusters above a certain ${M^{\rm obs}}$ given a scatter of ${\sigma_{\ln {M}}}=0.25$. As the observable threshold reaches the exponential tail of the intrinsic distribution, the excess of upscattered versus downscattered clusters can become a significant fraction of the total. Since at high redshift a fixed ${M^{\rm obs}}$ will be further on the exponential tail, even a constant but unknown scatter can introduce a trend in redshift that will degrade the dark energy information in the counts. =3.4in The relative importance of scatter can be understood by examining the sensitivity of the counts to the scatter around ${\sigma_{\ln {M}}}^2=0$ $$\begin{aligned} \lim_{{\sigma_{\ln {M}}}^{2}\rightarrow 0} {\partial \ln \bar m_{i} \over \partial {\sigma_{\ln {M}}}^{2}} = - {1\over 2 \bar n_i} {d^{2}\bar n \over d\ln^{2} M} \Big|_{x_{i+1}=0}^{x_{i}=0} \,. \label{eqn:sig2sens} \end{aligned}$$ Thus the steepness of the mass function around the thresholds in the observable mass determines the excess due to upscatters. Note that it is the variance ${\sigma_{\ln {M}}}^2$ rather than the rms scatter ${\sigma_{\ln {M}}}$ that controls the upscattering effect. For example, since $$\begin{aligned} \lim_{{\sigma_{\ln {M}}}^{2}\rightarrow 0} \left[ {\partial \ln \bar m_{i} \over \partial {\sigma_{\ln {M}}}} = 2{\sigma_{\ln {M}}}{\partial \ln \bar m_{i} \over \partial {\sigma_{\ln {M}}}^{2}} \right] =0 \,, \end{aligned}$$ the sensitivity to the rms scatter depends on the true value of the scatter and vanishes at ${\sigma_{\ln {M}}}=0$. Conversely from Eqn. (\[eqn:sig2sens\]), an observable with say half the scatter would have a quarter of the fractional effect on number counts in this limit. On the other hand the sensitivity to the bias is given by $$\begin{aligned} \lim_{{\sigma_{\ln {M}}}^{2}\rightarrow 0} {\partial \ln \bar m_{i} \over \partial \ln {M^{\rm bias}}} = {1\over \bar n_i}{d \bar n \over d\ln M} \Big|_{x_{i+1}=0}^{x_{i}=0} \,. \end{aligned}$$ Thus the relative importance of scatter compared with bias can be estimated through the local power law slope of the mass function $d \bar n/d\ln M \propto M^{\alpha}$ (see Fig. \[fig:slope\]) $$\begin{aligned} - {1\over 2} { {d^{2}\bar n / d\ln^{2} M} \over {d \bar n / d\ln M} } =-{1\over 2}\alpha(M) \,. \label{eqn:alpha} \end{aligned}$$ Uncertainties in scatter can dominate those of bias for the steep mass function at high mass or redshift. These expectations are borne out at finite scatter by a direct computation of the number count sensitivity. Fig. \[fig:sigsens\], shows the sensitivity of number counts above ${M^{\rm obs}}= 10^{14.2} h^{-1} M_\odot$ in redshift bins of $\Delta z=0.1$ evaluated around $\ln {M^{\rm bias}}=0$ and a finite scatter ${\sigma_{\ln {M}}}^2=(0.25)^2$. Both in terms of absolute sensitivity and relative sensitivity compared to the bias, the importance of scatter increases with redshift. Uncertainties in the mass variance of $\Delta {\sigma_{\ln {M}}}^2 = (0.25)^2$ would produce a $\sim 50\%$ uncertainty in the number counts at $z=2$. For the high $z$ counts to provide cosmological information, the scatter must be known to significantly better than this level. Given that the relative effect of scatter depends on the local slope of the mass function, measuring the counts as a function of ${M^{\rm obs}}$ monitors the scatter in the mass-observable relation. Combined with additional information in the sample variance of the number counts, an unknown evolution in ${M^{\rm bias}}$ and ${\sigma_{\ln {M}}}^2$ may be internally calibrated. =3.4in Self-Calibration {#sec:self} ================ To assess the impact of uncertainties in the observable-mass distribution, we employ the usual Fisher matrix technique. For illustrative purposes we take a fiducial cluster survey with specifications similar to the planned South Pole Telescope (SPT) Survey: an area of 4000 deg$^{2}$ and a sensitivity corresponding to a constant ${M^{\rm obs}}_{\rm th} = 10^{14.2} h^{-1} M_{\odot}$. We further divide the number counts into bins of redshift $\Delta z=0.1$ from an assumed optical photometric followup out to $z=2$ and 400 angular cells of 10 deg$^{2}$ for assessment of the sample variance of the counts (see [@LimHu04] for an exploration of these choices). Finally to study the efficacy of self-calibration from binning of the observable, we compare 5 bins of $\Delta \log_{10} {M^{\rm obs}}= 0.2$ versus a single bin of ${M^{\rm obs}}\ge {M^{\rm obs}}_{\rm th}$ (see Fig. \[fig:massfn\]). The Fisher matrix is constructed out of predictions for the number counts and their covariance. The mean number counts $m_i$ possess a sample covariance of [@HuKra02] $$\begin{aligned} S_{ij} &=&\langle (m_i -\bar m_i)(m_j - \bar m_j)\rangle \nonumber\\ &=&{ b_i \bar m_i b_j \bar m_j \over V_i V_j} \int{d^3 k \over (2\pi)^3} W_i^*({{\bf k}})W_j({{\bf k}}) P(k)\,, \label{eqn:covariance}\end{aligned}$$ given a linear power spectrum $P(k)$ and the Fourier transform of the selection window $W_i({{\bf x}})$. The pixel index $i$ here runs over unique cells in redshift, angle, and observable mass. Here $b_i$ is the average bias of the clusters predicted from the distribution in Eqn. (\[eqn:binneddensity\]) $$\begin{aligned} b_i & = {1 \over \bar n_i} \int {d M\over M} {d \bar n_i \over d\ln M} b(M;z_i)\,,\end{aligned}$$ where we take a fit to simulations of [@SheTor99] $$b(M;z) = 1 + {a_c \delta_c^2/\sigma^2 -1 \over \delta_c} + { 2 p_c \over \delta_c [ 1 + (a \delta_c^2/\sigma^2)^p_c]} \label{eqn:bias}$$ with $a_c=0.75$, $p_c= 0.3$, and $\delta_c=1.69$. That the sample variance, or the clustering of clusters, is a known function of mass provides a second means of self-calibration [@MajMoh03]. Note that for a given volume defined by the redshift and solid angle, the mean counts for different ranges in the observable mass ${M^{\rm obs}}$ are fully correlated. Finally the total covariance matrix is the sample covariance plus shot variance $$\begin{aligned} C_{ij} = S_{ij} + \bar m_i \delta_{ij} \,.\end{aligned}$$ The Fisher matrix quantifies the information in the counts on a set of parameters $p_\alpha$ as [@HolHaiMoh01; @LimHu04] $$\begin{aligned} F_{\alpha\beta}&=& \bar{\bf m}^t_{,\alpha} {\bf C}^{-1} \bar{\bf m}_{,\beta} + {1\over 2} {\rm Tr} [{\bf C}^{-1} {\bf S}_{,\alpha} {\bf C}^{-1} {\bf S}_{,\beta} ]\,, \label{eqn:fisher}\end{aligned}$$ where the first piece represents the information from the mean counts and the second piece the information from the sample covariance of the counts. We have here arranged the counts per pixel $i$ into a vector ${\bf m} \equiv (m_1,\ldots,m_{N_{\rm pix}})$ and correspondingly their covariance into a matrix. The Fisher matrix approximates the covariance matrix of the parameters $C_{\alpha\beta} \approx [{\bf F}^{-1}]_{\alpha\beta}$ such that the marginalized error on a single parameter is $\sigma(p_\alpha) = [{\bf F}^{-1}]_{\alpha\alpha}^{1/2}$. When considering prior information on parameters of a given $\sigma(p_\alpha)$ we add to the Fisher matrix a contribution of $\sigma^{-2}(p_\alpha) \delta_{\alpha\beta}$ before inversion. For the parameters of the Fisher matrix we begin with six cosmological parameters: the normalization of the initial curvature spectrum $\delta_\zeta (=5.07\times 10^{-5})$ at $k=0.05$ Mpc$^{-1}$ (see [@HuJai03] for its relationship to the more traditional $\sigma_8$ normalization), its tilt $n (=1)$, the baryon density $\Omega_bh^2 (=0.024)$, the dark matter density $\Omega_m h^2 (=0.14)$, and the two dark energy parameters of interest: its density $\Omega_{\rm DE} (=0.73)$ relative to critical and equation of state $w(=-1)$ which we assume to be constant. Values in the fiducial cosmology are given in parentheses. The first 4 parameters have already been determined at the few to $10\%$ level through the CMB [@Speetal03] and we will extrapolate these constraints into the future with priors of $\sigma(\ln \delta_\zeta)=\sigma(n)=\sigma(\ln\Omega_b h^2)=\sigma(\ln\Omega_m h^2) =0.01$. For the observable-mass distribution we choose a fiducial model of $\ln {M^{\rm bias}}(z_i)=0$ and ${\sigma_{\ln {M}}}^2(z_i) = (0.25)^2$. The results that follow do not depend on the specific choice as we have explicitly shown by testing a much smaller fiducial scatter of ${\sigma_{\ln {M}}}^2(z_i) = (0.05)^2$. Given an observable-mass distribution fixed at the fiducial model and the priors on the other cosmological parameters, the baseline errors on the dark energy parameters are $\sigma(\Omega_\Lambda,w)=(0.008,0.03)$. The mere presence of scatter in an observable does not necessarily degrade the cosmological information; in fact for reasonable scatter it actually enhances the information by effectively lowering the mass threshold at high redshift. However, cosmological parameter errors are degraded once observable-mass parameters are added in a joint fit. As the most general case, we take independent $\ln {M^{\rm bias}}(z_{i})$ and ${\sigma_{\ln {M}}}^2(z_{i})$ parameters for each redshift bin for a total of 40 parameters. As discussed in §\[sec:distribution\], for the Fisher results to be valid around a fiducial ${\sigma_{\ln {M}}}\ll 1$, the mass variance and not its scatter must be chosen as the parameters. Because the evolution in the cluster parameters is expected to be smooth in redshift we alternatively take a more restrictive power law evolution in the bias ${M^{\rm bias}}$ $$\ln {M^{\rm bias}}(z_i) = A_b + n_b \ln (1+z_i) \label{eqn:biaspowerlaw}$$ and/or a Taylor expansion of ${\sigma_{\ln {M}}}^{2}$ around $z=0$ $${\sigma_{\ln {M}}}^{2}(z_i) = {\sigma_{\ln {M}}}^{2} \Big|_{\rm fid} + \sum_{a=0}^{N_\sigma-1} B_a z^a_i \label{eqn:variancetaylor}$$ =3.4in With no self-calibration, i.e. no clustering information from the sample variance and no binning in ${M^{\rm obs}}$, interesting constraints on the dark energy are not possible even for the restricted evolutionary forms of Eqns. (\[eqn:biaspowerlaw\])-(\[eqn:variancetaylor\]) if ${\sigma_{\ln {M}}}^2(z)$ is allowed to evolve ($N_{\sigma}\ge 2$). Even restricting the parameters to a single constant scatter ($N_\sigma=1$) causes a degradation to $\sigma(\Omega_\Lambda,w)=(0.37,0.24)$. As shown in Fig. \[fig:ellipse\] adding in the sample (co)variance information in the Fisher matrix of Eqn. (\[eqn:fisher\]) for a single bin in ${M^{\rm obs}}$ helps but still does not allow for full self-calibration of an arbitrary evolution in ${\sigma_{\ln {M}}}^2(z)$ even when ${M^{\rm bias}}$ is restricted to power law evolution. Further restricting the evolution in the mass variance to a cubic form $N_\sigma=4$ yields $\sigma(\Omega_\Lambda,w)=(0.22,0.17)$ and to a constant form $N_\sigma=1$ yields $\sigma(\Omega_\Lambda,w)=(0.15,0.07)$. Employing the information contained in the shape of the counts through ${M^{\rm obs}}$ binning allows for a more robust self-calibration. In the case of arbitrary evolution for [*both*]{} the bias and the scatter $\sigma(\Omega_\Lambda,w)=(0.03,0.21)$. With a power law form for the bias $\sigma(\Omega_\Lambda,w)=(0.02,0.11)$; with an additional cubic form for the mass variance $\sigma(\Omega_\Lambda,w)=(0.02,0.10)$; with a constant form for the scatter $\sigma(\Omega_\Lambda,w)=(0.02,0.06)$. External priors on the observable-mass distribution from simulations and cross-calibration of observables can further improve on self-calibration. Cross-calibration of cluster observables may involve a subsample of clusters which have detailed mass modeling from lensing or X-ray temperature and surface brightness profiles assuming hydrostatic equilibrium [@MajMoh03]. In Fig. \[fig:prior\] we explore the effect of independent priors on the 20 ${\sigma_{\ln {M}}}^2(z_i)$ parameters in the power law ${M^{\rm bias}}$ context. Priors of the level of $\sigma( {\sigma_{\ln {M}}}^2 )=(0.1)^2$ would suffice to improve $\sigma(w)$ by a factor of 2. Note that the potential further improvement in $w$ errors comes from the ability to change the scatter smoothly from $z=0$ to $z\sim 1$. Since we take the priors to be independent, their cumulative effect implicitly poses a much more stringent constraint on the possible smooth evolution of ${\sigma_{\ln {M}}}^2$ than any one individual prior. To better quantify the implications of the joint prior, note that the self-calibration errors on the cubic form in Fig. \[fig:ellipse\]c nearly coincide with the fully arbitrary form. Taking independent priors on the 4 $B_a$ parameters of $\sigma(B_a)= 2 \sigma({\sigma_{\ln {M}}}^2)$ to reflect the assumed uncertainty around $z=1$ yields the dashed curve in Fig. \[fig:prior\]. The full improvement requires ${\sigma_{\ln {M}}}^2$ priors at the $(0.02)^2$ level and a minimum of $(0.1)^2$ for substantial improvements. If these priors are to come from mass modeling of observables then a [*fair*]{} sample of more than $\sim 100$ clusters at $z\sim 1$ with accurate masses will be required. Accurate masses will be difficult to obtain at the low threshold of $10^{14.2} h^{{-1}} M_{\odot}$ employed here. Priors on ${M^{\rm bias}}$ can also improve constraints. For a completely fixed ${M^{\rm bias}}$, errors for an arbitrary evolution in ${\sigma_{\ln {M}}}^2$ are $\sigma(\Omega_\Lambda,w)=(0.01,0.06)$. Conversely for a completely fixed ${\sigma_{\ln {M}}}^2$, errors for an arbitrary evolution of ${M^{\rm bias}}$ are $\sigma(\Omega_\Lambda,w)=(0.02,0.13)$. Finally to assess the possible impact of unknown trends in the mass bias and variance with mass at fixed redshift, we limit the ${M^{\rm obs}}$ bins to 2 separated by $\Delta \log_{10}{M^{\rm obs}}=0.2$ from the threshold. In this case errors for arbitrary evolution degrade slightly to $\sigma(\Omega_\Lambda,w)=(0.03,0.26)$ and with power law mass bias and cubic variance to $\sigma(\Omega_\Lambda,w)=(0.03,0.11)$. Thus most of the information from self-calibration comes from the small range in masses around the threshold reflecting the steepness of the mass function. The mass bias and mass variance need only be constant or slowly varying in a known way in mass across a range in masses comparable to the expected scatter for self-calibration to be effective. In any case, bins at higher masses also monitor the validity of this assumption in practice. Discussion {#sec:discussion} ========== The exponential sensitivity of number counts to the cluster mass requires a calibration of the whole observable-mass distribution before cosmological information on the dark energy can be extracted. We have shown that even in the case of an unknown arbitrary evolution in the mass bias and scatter of a Gaussian distribution there is enough information in the ratio of the counts in bins of the observable mass and their sample variance to calibrate the distribution and provide interesting constraints on the dark energy. For the more realistic case of an unknown power law evolution in the mass bias ${M^{\rm bias}}$, the forecasted errors for the fiducial SPT-like survey are $\sigma(\Omega_\Lambda,w) = (0.02,0.11)$. To further improve on these constraints, external constraints on the mass variance would need to achieve an accuracy of $\sigma( {\sigma_{\ln {M}}}^2 ) < (0.1)^2 =0.01$ on a possible evolution of the mass variance from $0\le z \le 1$. Note that this result is robust to the assumed true value of the scatter when quoted as a constraint on the mass variance and not the rms scatter. However, self-calibration is not a replacement for simulated catalogues, cross-calibration techniques from so-called direct mass measurements [@MajMoh03], and monitoring scatter in observable-observable scaling relations. It is instead an internal consistency check on their assumptions and the simplifying assumptions in this study. We have assumed that the observable-mass distribution is a Gaussian in $\ln M$ and that its parameters depend in a known way on mass at a given redshift for at least a range in masses that is greater than the expected scatter. Furthermore, for low mass clusters detected optically (e.g. [@GlaYee05]) or through lensing (e.g. [@Witetal03]), the assumption of a one-to-one mapping of objects identified by mass to those identified by the observable breaks down since confusion and projection will cause many small mass objects in a given redshift range to be associated with a single object in the observable (see e.g. [@Kimetal02; @HenSpe04]). Without such simplifying assumptions, true self-calibration is impossible (see e.g. [@Hu03a]). Still, the ideas underlying self-calibration will be useful in revealing violations of the assumed form of the distribution of cluster observables given the cluster masses and prevent misinterpretation of the data. [ [*Acknowledgments:*]{} We thank D. Hogg, G. Holder, A. Kravtsov, J. Mohr, A. Schulz, T. McKay, A. Vikhlinin, J. Weller, M. White for useful discussions. We also thank the organizer, A. Evrard, and the participants of the Kona Cluster meeting. This work was supported by the DOE, the Packard Foundation and CNPq; it was carried out at the KICP under NSF PHY-0114422. ]{} [20]{} natexlab\#1[\#1]{}bibnamefont \#1[\#1]{}bibfnamefont \#1[\#1]{}citenamefont \#1[\#1]{}url \#1[`#1`]{}urlprefix\[2\][\#2]{} \[2\]\[\][[\#2](#2)]{} , , , , , ****, (), . , , , ****, (). , ****, (), . , , , , ****, (). , ****, (). , , , , , ****, (), . , ****, (). , , , ****, (), . , ****, (), . , ****, (), . , ****, (), . , ****, (). , ****, (). , , , ****, (). , ****, (), . , ****, (), . , ****, (). , ****, (). , ****, (). , ****, ().
Mid
[ 0.559493670886075, 27.625, 21.75 ]
Saturday, November 15, 2008 For the average person with little mechanical knowledge, leaving a car with someone for repairs is a big act of trust. You know your car has a problem, and you want it to be fixed without paying outrageous prices for repairs that weren’t needed, or unexpected charges for services you didn’t ask for. There are some ways you can assure yourself that you won’t be pushed over by zealous technicians that may try to talk you into doing things you don’t understand or need. One place to start is to ask everyone you know where they take their cars, and what their experience has been. Word will travel fast if there is an unscrupulous repair center. If you’re lucky enough to have a friend who has mechanical knowledge, invite them to go with you to check out a place. If you know your car is having problems but you cannot define what that problem is, having a more knowledgeable friend come along for a test drive could be very enlightening. A noise or other problem that you might not be able to describe will be more obvious to someone with auto repair experience. If you don’t have anyone you can ask for help, then walk into the repair center armed with all of the information you can come up with. Have your car's symptoms written down to the best of your ability. If you get nervous, you won’t have to try to remember exactly what you were going to say. Make sure you tell the shop to call you with an estimate of charges before any work is done. Ask them if they have any minimum charges. Let the technician know that you will only pay for work done that you actually authorized. Another important thing to do is to ask for your old parts back. You will then be able to look at the condition of your old parts and perhaps gain a better understanding of your car’s systems. Not only that, but if you’re stuck somewhere, you’ll have your old parts to either put back on in a pinch or know what to order. If possible, you should pay your account with a credit card. This way, if there is a problem later, you can refuse to pay the bill and the incident will be looked into. Finally, a little courtesy goes a long way. Be firm, but not rude when talking with your technician. My World Now Fitness Tip of the Day Deals Ur U Tube MJ/ AL Trend Watching About Me I love my work in real estate and I love my family, meeting new people, serving God always. I'm just trying to enjoy life. Blogging is one of my favorite hobbies, and I really enjoy working on this one
Mid
[ 0.587044534412955, 36.25, 25.5 ]
10 dir 266 https://mp4parser.googlecode.com/svn/trunk/isoparser/src/main/java/com/coremedia/iso/mdta https://mp4parser.googlecode.com/svn 2011-07-11T20:39:14.277970Z 178 [email protected] 7decde4b-c250-0410-a0da-51896bc88be6
Low
[ 0.47584541062801905, 24.625, 27.125 ]
#!/usr/bin/ruby n,*z=`dd`.split.map &:to_i t=*0...n *e=t a=z.shift n+1 n.downto(1){|i|a[i]-=a[i-1]} k,*z=z z.map{|x|t[x-2,2]=t[x-1],t[x-2]} 60.times{|i|k[i]>0&&e.map!{|q|t[q]};t=t.map{|q|t[q]}} k,*a=a;e.map{|q|p k;k+=a[q]}
Low
[ 0.44761904761904703, 23.5, 29 ]
Q: How to use libavcodec in Qt4? How do I use libavcodec in Qt4 to access individual video frames? After verifying that the video stream can be decoded by libavcodec by compiling this example, I moved the source code to my C++ program. Now av_open_input_file() is suddenly unable to open my video file (returning an errorcode: -2). The call looks like this right now: ... // Register all formats and codecs avcodec_register_all(); // Open video file QString videoFileName("/absolute/path/to/video.avi"); // from somewhere else in the application const char* fileName = videoFileName.toStdString().c_str(); int err = 0; if((err = av_open_input_file(&pFormatCtx, fileName, NULL, 0, NULL)) != 0) { doErrorHandling(err, fileName); // err = -2 } When I look at const char* fileName inside the debugger it looks correct. Am I making some basic mistake in mixing C and C++ code (for a first attempt I just dumped the code from the example into the constructor of a class)? Note: In order to get the application to compile I include the headers like this: extern "C" { #define __STDC_CONSTANT_MACROS // for UINT64_C #include <libavcodec/avcodec.h> #include <libavformat/avformat.h> #include <libswscale/swscale.h> } I have also tried to hard code the path to the video file into the application without any success: av_open_input_file(&pFormatCtx, "/home/bjoernz/video.avi", NULL, 0, NULL); I was able to compile and execute the example (avcodec_sample.0.5.0.c) using g++. A: Well, this is embarrassing: When I transfered the source code from the example to the c++ application I made a stupid mistake when I got linker errors, that told me that av_register_all(); was unavailable... and I renamed it to avcodec_register_all(), a little while later I fixed the linker problem and forgot about it... Solution: avcodec_register_all() needs to be changed to av_register_all().
Mid
[ 0.64, 34, 19.125 ]
Major insurers around the country are reporting that a growing number of small businesses are signing up to give their workers health benefits, a sign of potential progress for the nation’s battered healthcare system. The increase, although not universal, has brought new security to thousands of workers, many of whom did not have insurance or were at risk of losing it. An important selling point has been a tax credit that the nation’s new healthcare law provides to companies with fewer than 25 employees and moderate-to-low pay scales to help offset the cost of providing benefits. The tax credit is one of the first few provisions to kick in; much of the law rolls out over the next few years. “We certainly did not expect to see this in this economy,” said Gary Claxton, who oversees an annual survey of employer health plans for the nonprofit Kaiser Family Foundation. “It’s surprising.” For insurers, the market presents a big opportunity. Nationally, three-quarters of businesses with 10 to 24 workers offer benefits. About half of those with three to nine employees provide health plans. By comparison, 99% of firms with more than 200 employees offer benefits. Now some insurers are reporting significant jumps in coverage. In the six months after the law was signed in March, UnitedHealth Group Inc., the country’s largest insurer, added 75,000 new customers who work for companies with fewer than 50 employees. The Minnesota company called the increase notable but declined to reveal further details. Coventry Health Care Inc., an insurer in Maryland that focuses on small businesses, signed contracts to cover 115,000 new workers in the first nine months of this year, an 8% jump. In California, Warner Pacific Insurance Services in Westlake Village, a major servicer of insurance brokers, has seen business grow more than 10% this year, a company executive said. And Blue Cross Blue Shield of Kansas City, the largest insurer in the Kansas City, Mo., area, is reporting a 58% jump in the number of small businesses buying insurance since April, the first full month after the legislation was signed into law. The independent nonprofit insurer has been particularly aggressive in marketing the new tax credit, which can mean a discount of as much as 35% for very small companies with low payrolls. “One of the biggest problems in the small-group market is affordability,” said Ron Rowe, who oversees small-group sales for the insurer. “We looked at the tax credit and said, ‘This is perfect.’” Rowe said that 38% of the businesses it is signing up had not offered health benefits before. When the law was signed, the company partnered with H&R Block to create a website for small businesses to calculate how much they can save with the tax credit. For Bistro Kids, a small business in the Kansas City suburb of Gladstone that serves school meals made with locally grown, organic produce, the deal was too good to pass up. “We said, ‘How could we not do this?’” said Kiersten Firquain, 42, a trained chef who started the company after being appalled by the quality of the food her son was being served at school. “The whole message of Bistro Kids is doing the right thing,” she said as she watched students at Oakhill Day School dig into chili and cornbread made with local beef, cheese and corn. “We wanted to do what was right for our employees, not just for our kids.” Like other small-business owners nationwide, Firquain had been keeping a file of health insurance quotes. But every year, the prices seemed to get more out of reach. “It just wasn’t realistic,” she said. Now, Firquain is offering her 10 chefs a standard individual preferred provider organization plan with a $1,000 deductible and $30 co-pays. The employees pay $67 to $212 a month, depending on age and gender. The company’s share, including the tax credit, comes to $434 a month per employee, although that may rise next year as more of Bistro Kids’ chefs opt for the health plan. So far, four have signed up for benefits. It’s unclear how many businesses around the country are taking advantage of the new tax credit. National statistics will not be available until next year after 2010 tax returns are analyzed. Many small businesses don’t qualify for the tax credit, which is available to employers that have fewer than 25 full-time positions and pay an average salary of less than $50,000 a year. And only those with fewer than 10 employees and an average salary of less than $25,000 a year can claim the full 35% credit. Employers with more employees and higher salaries can get a smaller credit. “I’m not sure the credit is big enough to convince anyone to buy insurance that hasn’t already,” said Russ Childers, an insurance broker in southern Georgia. Childers said he expected about 10% of the firms he works with to qualify for some tax credit. For many businesses, even the tax credit may not make insurance affordable at a time when the average premium for an individual health plan is more than $5,000 a year and many insurers are hitting businesses with double-digit rate increases. That has prompted some critics of the health insurance overhaul, including the National Federation of Independent Business, to dismiss the tax credit. Some insurers have seen a decrease in small-business sales. But in Kansas City, officials at Blue Cross Blue Shield say the credit is a major selling point. “I hear some people saying that this tax credit is not a big deal, that most small businesses won’t qualify,” Rowe said. “Well, I wanted to sell to those that do.” Blue Cross Blue Shield of North Carolina, another independent nonprofit that has aggressively marketed the tax credit, also is expecting a substantial uptick in policies when it tallies its numbers next month, said Drew Narayan, the company’s sales director. Nationwide, the Kaiser survey found that 59% of firms with three to nine employees offered health benefits, up from 46% last year. “Prices keep going up, but we are seeing insurers trying to be competitive,” said Neil Crosby, Warner Pacific’s director of sales. “And businesses are buying, so they must see some value.” Breasia Studios, a recording studio in Maryland, is one of those businesses. After learning about the tax credit from a local activist, studio owner Jamal Lee got a health plan for his four employees for the first time. He said it’s already making a difference. “You get more done when people are happy,” said Lee, who opened the studio five years ago. “And it feels good to look at my employees and know that I’m helping to provide something that they really need.” [email protected]
Mid
[ 0.6407035175879391, 31.875, 17.875 ]
An Interview With Henrique Couto Sunday, August 10, 2014 An Interview With Henrique CoutoBy Pathetic Waste Henrique Couto has directed over 8 feature films. He has his roots in backyard DIY cinema and is currently sowing his legend in independent horror cinema. I sat down with Henrique to get an insight on what is behind the brain of the Dayton madman himself. PW:I know, like many directors, you started off as a fan. How did you become a fan of the genre? What made you transition from fan to filmmaker? Henrique Couto: It’s hard to really pinpoint my first moments of fandom, I remember at around 6 or 7 years old seeing Return of the Living Dead on cable and loving it. I remember having a VHS recording of Jaws 4, which looking back was silly but as a kid it scared me so badly. But when it really all came to a head was when I was around 9 or 10 and I was given the first five Nightmare on Elm Street films on tape from my older sister. I watched them again and again, memorized them and became so fascinated. Being fascinated with movies and being kind of an outcast in school was a perfect storm to lead me toward wanting to make my own. I got my first camcorder when I was 12 years old and I couldn’t stop video taping things. Anything. I’d film our dog, I’d film myself, my friends, whatever I could point the camera at. Then I started editing them together by connecting two VCRs. I would make lots of montages and music videos. There’s a level of obsession that went into my desire to make videos that I’ve never quite been able to understand. But it is there, and it has never seemed to leave me. Eventually I started volunteering at a cable access station, that was when I began getting a structured background on video. From there it has just always been a gradual progression, every video I make is a little better than the last. PW:Also, you were a convention kid, much like myself. You still run the convention circuit to this day. What was it like when you went to your first convention? How have conventions changed since then? Henrique Couto: Conventions were an incredible discovery for me when I was 14 years old, it was as if all the years of fandom I had were finally paying off. Being at conventions is like knowing a foreign language and then finally getting to speak it when you are around the right people. The first convention I ever went to I was overwhelmed by, I spent every penny I had in the world there because there were so many incredible and hard to find items. Fan heaven. Overall conventions have changed with the internet making things more accessible. With file sharing you don’t need people bootlegging rare and out of print movies so what you find are a lot more people selling original art and films. I still love them to this day. PW:Around 2002-2003, you started your own production company. Freak Productions. Making DIY cinema in your backyard. With films such as Patches 2, Headcheese, Slumber Party Murder Mania and Teen Suicide. What was your mentality back then? How did these films prepare you for future projects? Was this your own, personal, film school? Henrique Couto: Freak Productions was my own little empire, I loved making little movies and I looked up to other companies so I wanted to emulate them. My attitude was that every time I could manage to get a half dozen bottles of corn syrup together we would make a movie. Often they didn’t have scripts, just a concept and 2 or 3 days. We almost always shot them all at once. In a way they taught me a lot about running a set and marketing projects. Every little movie I made I would make a cover box for and sell DVDs of and always managed to make them turn a profit on the 30 or 40 bucks spent. Haha. In a way it was like film school, but it was like elementary school compared to the full blown university of hard knocks I would end up at later on. PW:Under your label, Freak Productions, you released one of Chris Lamartina’s early films. Eat Me. How did you develop a relationship with Chris and how did the film get into your hands for distribution? Henrique Couto: Chris and I met at Horrorfind weekend in Baltimore, we were both pretty young, I think I was 16 he was a year or two older. He introduced himself and gave me a VHS copy of Eat Me to check out. I didn’t give him much thought again until I watch it and was blown away by the editing, quality, and attitude. I immediately got in touch with him and that started a friendship and occasional collaboration that still goes on to this day. Eat Me wasn’t a huge splash on DVD, but it was an awesome experience. PW:Freak Productions also released Justin Channell’s Raising the Stakes. A vampire horror-comedy. How did the film come to your attention? Henrique Couto: I saw Justin around film forums here and there and we got to talking, at the time I was one of the few guys in our peer group who had a system down for making and selling DVDs. I had the graphic design, the manufacturing, and then the outlet to sell them. I loved his film and wanted to help him get it out into the world. It was a cool experience and again, I often collaborate with Justin to this day. A great friendship that started so long ago. PW: In 2005, you did two horror anthology films. Faces of Schlock and Faces of Schlock Vol 2. For these films you partnered with three other filmmakers. Chris Lamartina, Andrew Shearer and Justin Channell. How did these projects come to be? What was it like working with such company? Henrique Couto: Andrew Shearer and I became friends around the same time as Chris LaMartina and I, so we were always thinking of ways to partner up. LaMartina and I had toyed with the idea of an anthology here and there and finally it happened. It was massively out of a desire to make something fast and feature length. Then it got coverage in Fangoria and was a huge hit at conventions, so we knocked out a part 2 less than 6 months later and involved a newer friend of mine at the time Justin Channell. The experience was excellent, I am so honored to work with such talented people. PW:You have also worked on some projects for Chris Seaver, of Low Budget Pictures. How did you meet Chris and how did you two start a working relationship? Henrique Couto: Chris Seaver and I met at my first convention and I bought some tapes from him, since then I have lost track of how many things Chris and I have worked on. I did lots of DVD work with him, helped him with the editing on Carnage for the Destroyer and Destruction Kings. We just kind of clicked and enjoyed working together from the start. PW:In 2006, you left backyard horror behind, with the release of Marty Jenkins and the Vampire Bitches. A horror comedy and step up from your previous productions. How did you come up with the idea? What made this different from your other films? What was the response upon release? Henrique Couto: Marty Jenkins was my first real feature length movie, and it is where I consider the start of my “professional” career as a director. I came up with that title which I thought was hilarious and then kind of ran from there. I had just went through a very hard breakup right before I started writing it so it is full of a lot of not so subtle anger. It was also the first thing I ever wrote that ended up being very personal because of what I was going through at the time. I think the script being so personal is what gives my first feature some staying power to where people still compliment it to this day. PW:Around this time, you also played a role in the zombie film Die and Let Live. How did you get involved in the production? How was it to work with the guys from IWC Films? Henrique Couto: I was actually gearing up to move away from Ohio while they were starting to produce Die and Let Live, so I drove out for a weekend and helped out on set and played a role. It was a complete and total blast, lots of improvising and crazy makeup. I wouldn’t trade that time for anything. PW:You took a break from 2006 to 2009, but returned with a bang. A reboot, re-imagining, suedo-sequel to Faces of Schlock. Also returning were previous co-directors Justin Channell, Andrew Shearer and Chris Lamartina. What made you go back to the well? Did it feel natural to do another entry? Will we see the four of you working together in the future? Possibly another Faces of Schlock? Henrique Couto: My break was while I worked for Alternative Cinema on the east coast, but the entire time I was there I wanted to do something new. We had all talked about a part 3, in fact Andrew Shearer had even shot his segment ahead of everyone else but it never quite happened. Well at one point we had the same realization we had the first time. We didn’t have much money or time but we wanted to make a feature. So we all came together and made it happen. It felt awesome to bring it together, the excitement I got when the MiniDV tapes arrived from those guys was indescribable. At this time, we are all working on numerous projects I’m not sure theres another anthology on the way, but I wouldn’t rule it out forever. PW:This entry in Faces of Schlock was “Slay Ride” A love-letter to the killer santa film. What made you pick a killer santa flick as your subject matter? Henrique Couto: I have an adoration for Christmas and Slay Ride was the first time I really let myself indulge it. I think holidays are the perfect backdrop for stories, Andrew Shearer actually wrote that script and he gave it such a perfect bite. It’s still one of my favorite things I’ve directed. PW:This is also the first time you would work with Scream Queen Ruby Larocca. How did your work relationship begin? Any plans to have here in future films? Henrique Couto: Ruby was recommended to me when I was looking for the lead for Slay Ride, she hadn’t been very active at the time so I sent her an email with the script. I had been a big fan of her work before that so I was excited but also very nervous. She had hugely positive things to say about the script so we talked a little more and cast her. I actually didn’t meet her in person until the first day of shooting, that’s how fast things move in my world! PW:Next up, you directed the suicide-revenge film Bleeding Through. Once again, a step-up over your previous films in storytelling and production value. This film has similar tendencies to your earlier backyard-opus Teen Suicide. Was this a suedo-remake? This was also a much more serious tone for you. What was behind the darker tone of the film? What was the overall response to Bleeding Through? Henrique Couto: Bleeding Through was such a change of pace for me in every way. It was loosely based on the short film Teen Suicide I had made as kid. After shooting Slay Ride I had adored working with Sandy Behre so much I wanted to do a feature with her as the lead. She and I get along very well so it seemed like it would be a cakewalk. We actually shot the film in two big chunks, we had to stop when we ran out of money. I love being funny and I love humor but there is something about being very serious that fascinates me. Before Bleeding Through I was always more obsessed with technical things like shooting and editing, but after the film I fell in love what directing. That was when I knew I wasn’t just making movies to try it out, I knew what I wanted. I wanted to direct actors, I wanted to choose stories and I wanted to tell them. PW: You have also done two comedy/drama films. A Bulldog For Christmas and Depression: The Movie. Can you tell us why you chose to differ from the genre you are best known for? What was the inspiration behind the films? Henrique Couto: I love movies, and I love the idea of directing every kind of movie possible. When I made Depression: The Movie I was feeling kind of disenfranchised by making movies so I decided to make something totally different and incredibly personal. I dived in head first and made a movie I wasn’t sure anyone else would want to see. I loved making it and I loved expanding my horizons as a director. A Bulldog for Christmas was an experiment in making something the whole family could enjoy, I am a sucker for sappy stories of family and holidays so I wrote something that would pull at my own heart strings while delivering a fun and silly ride. Shooting Bulldog was hard because of the long schedules but one of the most fun sets I have ever brought together. PW:You would return to horror with Babysitter Massacre. A nasty little, 80’s style, slasher. You really seem in your element here. What was the inspiration for Babysitter Massacre? Can you tell us a bit about the production? Any chance for sequel? Henrique Couto: After making Depression it was becoming clear that soon I would return to making something more commercial so I started thinking about what kind of horror movie I wanted to see. I immediately started thinking about a film centered around Halloween with the vibe of Slumber Party Massacre. I wanted to make a fun horror flick I would enjoy myself, on a budget of course! I announced I was making the film and had a poster already being shared around and I managed to get the attention of Alternative Cinema, who had distributed two of my films prior. They got on board and I produced the film for them to release. It was the first time I ever made a film that already had distribution in place. The production was fast, and it involved a lot of new people, people I’ve now worth with on many more movies. I remember loving recreating the halloween vibe and lots of really difficult emotional scenes. It was a hell of an experience and I’m so glad it has found an audience. I don’t know for sure if there will be a sequel, it is still too early to tell how successful the film has been. PW:Your latest release was Haunted House on Sorority Row, arguably your best and most prolific film to date. Bringing back a majority of the cast from Babysitter Massacre, this time a supernatural movie rather than a slasher. Did this seem like a natural successor to Babysitter Massacre? How has the response been to the film? Henrique Couto: Haunted House on Sorority Row started like a lot of my films as a title I really loved, with the successful partnership I had with Alternative Cinema on Babysitter we moved to this next one. I brought on the very talented screenwriter John Oak Dalton to help bring it to life and we were off and running. The films production ran incredibly smooth and so far everyone is raving about it. I’m very proud of the film, my cast and crew delivered a very professional film with very little money and time. I loved making it. PW:Your last few pictures have been released through Independent Entertainment. You also have an ongoing partnership with Alternative Cinema. How did they start releasing your films and how has the relationship with IE and Alternative Cinema been, thus far? Henrique Couto: I used to be a staffer at Alternative Cinema, I learned so much about the business from them. When I made Faces of Schlock I had intended to release it myself but alternative came to me and offered to license it for distribution. It was a big deal to get it out so wide and it did pretty well. I’m very proud of my work with them and look forward to doing more with them in the future. PW:You have two upcoming releases. Another comedy, entitled, Awkward Thanksgiving. Also on the platter, a horror film, called Scarewaves. Can you tell us a bit about the two? When can we expect for them to be available? Henrique Couto: Awkward Thanksgiving was another very personal film, kind of like A Bulldog for Christmas but with much more adult humor. I just wrapped it entirely and I think people are going to love it, I put so much into the characters and the production. It should be out wide in November with details to come shortly. Scarewaves just wrapped its final cut, and it is a really awesome love-letter to horror anthologies. I was trying to create a Tales from the Crypt vibe and I think I achieved it. This is another one being made for Alternative Cinema which will release early next year. Very exciting to have two whole films ready to go. PW:What is your favorite film of your own and why? Henrique Couto: That’s such a hard question to answer, I feel like Depression: The Movie is probably a persona favorite just because of the risks I took and how hard I worked to tell a story I wasn’t sure anyone would want to see. The response to Depression has been incredible and I’m so proud of it. But Awkward Thanksgiving might be able to dethrone it, only time will tell! PW: If you could remake any of your films, what would it be? Are there any of your films you’d like to erase from your filmography? Henrique Couto: Honestly, I love my filmography. I love making movies, and more than I want to remake anything or erase anything I just wanna go shoot more. I want to make as many films as I can. PW:Obviously, you are a fan of the genre. What are your favorite genre films? What directors inspired you to become a filmmaker? Henrique Couto: Dawn of the Dead is probably the film I can watch a million times and always get something different from it. That is my absolute favorite genre film. I was massively inspired by Jim Wynorski, Fred Olen Ray, Jeff Burr, and Woody Allen just to name a few. I love their work, and their body of work as a whole. PW:Do you have any advice you can give to aspiring film makers? Henrique Couto: Make movies, all the time. Don’t stop, don’t question. Just keep making movies. Don’t look back, only look forward. Be resilient. Resiliency will pay off more than skill or talent ever could. PW:What can we expect from Henrique Couto in the future? Henrique Couto: That’s a tough one, the kinds of movies I make are always shifting. Maybe an action film, or a sex comedy. Who knows? I have a few things developing, but I will tell you whatever it is I will put everything I have into making it entertaining. PW:Anything you’d like to share with your fans, Henrique? Henrique Couto: Just a huge thank you, thank you for following my work. Without people enjoying my work I have no work to do. It means everything to me to wake up every day and see how I can entertain you all with a camera yet again. PW:One last question. I know you are a fan of Tremors. So, Tremors 5? Thoughts? Henrique Couto: If they give me more Burt Gummer, I will eat it up. I’m easy like sunday morning!
Mid
[ 0.579088471849866, 27, 19.625 ]
// A test node that exports a function module.exports = function(RED) { function TestNode(n) {} RED.nodes.registerType("test-node-mod-1",TestNode); }
Low
[ 0.48093220338983006, 28.375, 30.625 ]
Q: VB.net Labels not populated from dropdown variable data on pageload, but update when dropdowns change I have declared variables based on dropdown text: Dim strDataCollection As String = ddlDataCollection.Text Dim strYear As String = DdlYear.SelectedItem.Text Dim strSubject As String = DdlSubject.Text Dim strTeachingGroup As String = DdlTeachingGroup.Text Dim strSubgroup As String = ddlSubgroup.SelectedItem.Text Then I've called those variables to display in a series of labels. lblHeaderYear.Text = "Year " & strYear lblHeaderDataCollection.Text = " " & strDataCollection lblHeaderSubject.Text = " " & strSubject lblHeaderTeachingGroup.Text = " " & strTeachingGroup lblHeaderSubroup.Text = " " & strSubgroup However, on page load only the lblHeaderYear label text is populating, but not the rest of the labels. Yet when I make a selection from the dropdown lists then they all display ok. Here is the asp in front of this: <div style="width:100%; height: 100%;"> <asp:Label ID="lblDataCollection" runat="server" Text="Data Collection: " cssclass="label"></asp:Label> <asp:DropDownList ID="ddlDataCollection" runat="server" DataSourceID="DsDataCollection" DataTextField="DataCollection" DataValueField="DataCollection" CssClass="dropdown" AutoPostBack="True"> </asp:DropDownList> <asp:SqlDataSource ID="DsDataCollection" runat="server" ConnectionString="<%$ ConnectionStrings:MaltingsConnectionString %>" SelectCommand="SELECT DISTINCT DataCollection FROM Subject ORDER BY DataCollection"></asp:SqlDataSource> <asp:Label ID="lblYear" runat="server" CssClass="label" Text="Year: "></asp:Label> <asp:DropDownList ID="DdlYear" runat="server" AutoPostBack="True" CssClass="dropdown"> <asp:ListItem Selected="True">11</asp:ListItem> <asp:ListItem>10</asp:ListItem> <asp:ListItem>9</asp:ListItem> <asp:ListItem>8</asp:ListItem> <asp:ListItem>7</asp:ListItem> </asp:DropDownList> <asp:Label ID="lblSubject" runat="server" CssClass="label" Text="Subject: "></asp:Label> <asp:DropDownList ID="DdlSubject" runat="server" DataSourceID="DsSubject" DataTextField="Subject Name" DataValueField="Subject Name" AutoPostBack="True" CssClass="dropdown"> </asp:DropDownList> <asp:SqlDataSource ID="DsSubject" runat="server" ConnectionString="<%$ ConnectionStrings:MaltingsConnectionString %>" SelectCommand="SELECT DISTINCT Subject.Name AS 'Subject Name', CASE WHEN Subject.Name LIKE 'English' OR Subject.Name LIKE 'English iGCSE' OR Subject.Name LIKE 'Mathematics' THEN 0 ELSE 1 END AS Ordering, Subject.DataCollection AS Expr1 FROM Student INNER JOIN Subject ON Student.UPN = Subject.UPN WHERE (Student.StuYear = 11) AND (Subject.DataCollection LIKE 'March 2013') ORDER BY Ordering, 'Subject Name'"></asp:SqlDataSource> <asp:Label ID="LblTeachingGroup" runat="server" Text="Teaching Group: " CssClass="label"></asp:Label> <asp:DropDownList ID="DdlTeachingGroup" runat="server" DataSourceID="DsTeachingGroup" DataTextField="Teaching Group" DataValueField="Teaching Group" AutoPostBack ="true" CssClass="dropdown"> <asp:ListItem Selected="True" Value="Select All">Select All</asp:ListItem> </asp:DropDownList> <br /> <asp:SqlDataSource ID="DsTeachingGroup" runat="server" ConnectionString="<%$ ConnectionStrings:MaltingsConnectionString %>" SelectCommand="SELECT 'Select All' AS 'Teaching Group', 0 AS SortOrder UNION SELECT DISTINCT Subject.TeachingGroup AS 'Teaching Group', 1 AS SortOrder FROM Student INNER JOIN Subject ON Student.UPN = Subject.UPN WHERE (Subject.Name LIKE 'English') AND (Student.StuYear = 11) ORDER BY SortOrder, 'Teaching Group'"></asp:SqlDataSource> <asp:Label ID="lblSubgroup" runat="server" cssclass="label" style="font-size: 11px" Text="Subgroup: "></asp:Label> <asp:DropDownList ID="ddlSubgroup" runat="server" cssclass="dropdown" style="font-size: 11px" AutoPostBack="True"> <asp:ListItem Selected="True">Select All</asp:ListItem> <asp:ListItem Value="GenF">Girls</asp:ListItem> <asp:ListItem Value="GenM">Boys</asp:ListItem> <asp:ListItem Value="High">High Attainers</asp:ListItem> <asp:ListItem Value="Middle">Middle Attainers</asp:ListItem> <asp:ListItem Value="Low">Low Attainers</asp:ListItem> <asp:ListItem Value="PPYes">Pupil Premium</asp:ListItem> <asp:ListItem Value="PPNo">Non-Pupil Premium</asp:ListItem> <asp:ListItem Value="FSMYes">Free School Meals</asp:ListItem> <asp:ListItem Value="FSMNo">Non-Free School Meals</asp:ListItem> <asp:ListItem Value="SENYes">Special Educational Needs</asp:ListItem> <asp:ListItem Value="SENNo">Non-Special Educational Needs</asp:ListItem> <asp:ListItem Value="SENS">Statemented</asp:ListItem> <asp:ListItem Value="SENNoS">Non-Statemented</asp:ListItem> <asp:ListItem Value="SENAYes">School Action</asp:ListItem> <asp:ListItem Value="SENANo">Non-School Action</asp:ListItem> <asp:ListItem Value="SENPYes">School Action Plus</asp:ListItem> <asp:ListItem Value="SENPNo">Non-School Action Plus</asp:ListItem> <asp:ListItem Value="EALYes">English as Additional Language</asp:ListItem> <asp:ListItem Value="EALNo">Non-English as Additional Language</asp:ListItem> <asp:ListItem Value="LACYes">Looked After Children</asp:ListItem> <asp:ListItem Value="LACNo">Non-Looked After Children</asp:ListItem> <asp:ListItem Value="GandTYes">Gifted and Talented</asp:ListItem> <asp:ListItem Value="GandTNo">Non-Gifted and Talented</asp:ListItem> <asp:ListItem Value="GiftedYes">Gifted</asp:ListItem> <asp:ListItem Value="GiftedNo">Non-Gifted</asp:ListItem> <asp:ListItem Value="TalentYes">Talented</asp:ListItem> <asp:ListItem Value="TalentNo">Non-Talented</asp:ListItem> </asp:DropDownList> <br /> <br /> <asp:Label ID="lblHeaderYear" runat="server" Text="" CssClass="header"></asp:Label> <asp:Label ID="lblHeaderDataCollection" runat="server" Text="" CssClass="header"></asp:Label> <asp:Label ID="lblHeaderSubject" runat="server" Text="" CssClass="header"></asp:Label> <asp:Label ID="lblHeaderTeachingGroup" runat="server" Text="" CssClass="header"></asp:Label> <asp:Label ID="lblHeaderSubroup" runat="server" Text="" CssClass="header"></asp:Label> <br /> <br /> </div> A: it looks like you're not using the 'SelectedItem.Text' property for all the dropdownlist boxes. Instead of Dim strDataCollection As String = ddlDataCollection.Text Dim strYear As String = DdlYear.SelectedItem.Text Dim strSubject As String = DdlSubject.Text Dim strTeachingGroup As String = DdlTeachingGroup.Text Dim strSubgroup As String = ddlSubgroup.SelectedItem.Text Do you want: Dim strDataCollection As String = ddlDataCollection.SelectedItem.Text Dim strYear As String = DdlYear.SelectedItem.Text Dim strSubject As String = DdlSubject.SelectedItem.Text Dim strTeachingGroup As String = DdlTeachingGroup.SelectedItem.Text Dim strSubgroup As String = ddlSubgroup.SelectedItem.Text
Mid
[ 0.556097560975609, 28.5, 22.75 ]
WordPress Discontinues Support for Internet Explorer 6 - ssclafani http://www.readwriteweb.com/hack/2011/05/wordpresscom-discontinues-supp.php ====== steve19 They are only discontinuing support for the admin part of the package which is very javascript heavy. The default frontend theme will, I am sure, continue to support IE6 for a long time. ~~~ dave1010uk The new Twenty Eleven theme [1] doesn't fully support IE6 (there's comments on that bug) but I believe it works OK in it. As WordPress is completely themeable, there will probably be themes that support IE6 for years to come. More interesting (for me at least) is that WordPress 3.2 will require PHP5.2 [2]. WordPress had lots of legacy code for PHP4 that made coding plugins for it a pain. [1] <http://core.trac.wordpress.org/ticket/17198> [2] <http://wordpress.org/news/2011/05/wordpress-3-2-beta-1/> ------ hxf148 It's funny, I have been around so long in this game that I remember never really liking Netscape, ever. IE3 in some ways made web dev fun and interesting again. Then IE4 took over and I was pretty happy using it as Netscape grew fat and slow. Netscape 4 was ok and that was the short lived first era of decent browser consistency. I don't remember much about IE5, head down developing and skipping classes but I do remember when MS broke all our hearts with IE6. It started out all so well then it turned to mush and our faces melted as we glimpsed the future carved in exceptions and special handling. Web dev from then until very recently has been haunted and stunted and repeatedly annoyed by efforts to include IE6 "Support". Out of a perverse loyalty to doing things well in all browsers and an employer's choices have meant that I have been one of those making an effort all these long dark years. Ten years with a corporate network that I believe is still running IE7 in compatibility mode today taught me lots of useless IE skills and.. creative thinking. Thanks WP for joining the kill IE6..7..8 effort. 9 isn't bad but they will probably screw it up. <http://infostripe.com/harold> ~~~ cubicle67 Not sure if you're aware of it, but the reason you're being down voted is not because of your comment (which is fine), but because you've included a link to your blog which adds nothing to the discussion and is generally not viewed as a positive thing [edit: 1 - I upvoted you because I thought your comment was good. 2 - at the time of writing your comment looked to be at about -2 but now it's back in the +ve] ~~~ hxf148 Ahh sorry about that I sign my link as a sig all the time out of habit. I guess in a way it could be related as that link is a project I work on that has minimal intentional IE6 support. :) I'll remember that tip regardless. ~~~ yuhong You can put it in your about in Hacker News. ------ grandalf This is fantastic news. Now if only Google would release Chrome for Win2K to un-obsolete many valuable Win2K licenses. ~~~ bzbarsky For what it's worth, Firefox 4 runs fine on Win2K last I checked. ~~~ grandalf Only with FF 4 has the browser been speedy enough to run on the typical kind of hardware sold with a Win2K license. Chrome is extremely fast and would un- obsolete so much more hardware even than FF4. ~~~ bzbarsky Chrome uses way more memory than Firefox 4. So it may in fact not run all that well on some of the lower-end hardware.... ------ barnaby Cool! Wordpress are becoming part of the solution. ------ ck2 There they go trying to be "hip" again, thinking they are important enough to cause trends. They also stopped supporting PHP 4.4 which means hundreds of thousands of legacy installs no longer do automatic updates because their update code (purposely? lazily?) has a few lines that don't work under PHP 4. IE6 is one thing to go "meh" about but WordPress installs that do not do fast easy updates are time bombs. ~~~ code_duck I can think of several large sites or organizations who have dropped IE6 support in the past year. There's nothing lazy about not supporting PHP 4. It is outdated and flawed, and the last release was in 2008. PHP 5 has been out for over 5 years. The fact that those sites are timebombs is not WordPress's fault or their problem. ~~~ ck2 For modern code that starts off with PHP5 it's fine and understandable to restrict versions. But WordPress is an "ancient" legacy mess and does not have any advanced code that benefits from PHP5 - you actually have to go out of your way to break it for PHP4. There is nothing in it that cannot be fixed for PHP4 without one extra line or two. Note that 99.9% of WordPress3 works on PHP4 - only the security updating fails - and it fails in an uncontrolled way, not because it checks for the PHP version and stops - it actually fails silently (which is also typical WP style). There are hundreds of thousands of shared servers that are still running PHP 4.4.9 just fine and WordPress has a responsibility to make sure security updates keep working if it's easy enough to maintain (and it is). ~~~ ceejayoz The best thing WP can do, security-wise, is ditch PHP4. ~~~ uriel The best thing it could do security-wise is ditching PHP. ~~~ code_duck Not really, since that would of course mean a complete rewrite. The code is only as secure as it's authors make it, too - Python or Ruby are not magic bullets against XSS or SQL injection. While it would be fantastic to have WordPress in Python, and for the crufty and backwards bits to be cleaned up, old code that has been tested and audited is surely more secure and bug free than a brand new code base.
Low
[ 0.5177304964539, 27.375, 25.5 ]
Application of sec-butanol to the derivatization of hydroxyfuranones. This paper reports the use of sec-butanol for the derivatization of chlorinated hydroxyfuranones. The following hydroxyfuranones were investigated: 3,4-dichloro-5-hydroxy-2(5H)-furanone, 3,4-dibromo-5-hydroxy-2(5H)-furanone, 3-chloro-4-(chloromethyl)-5-hydroxy-2(5H)-furanone, and 3-chloro-4-methyl-5-hydroxy-2(5H)-furanone. Their derivatization products were analyzed by gas chromatography/mass spectrometry. The sec-butyl derivatives of the hydroxyfuranones investigated yield ions that are less abundant than those obtained for the corresponding isopropyl derivatives. However, sec-butyl derivatives are easily detectable in especially dirty matrixes because they produce double peaks in the chromatogram. The ion intensity of the first peak in the pair is lower than that of the second peak, but both are characterized by the same spectrum. The formation of multiple peaks is related to the formation of diastereoisomers during derivatization.
Mid
[ 0.6229508196721311, 33.25, 20.125 ]
Pediatric laryngeal paralysis: a new proposed surgical therapy. The cricothyroid muscle (CTM) has a separate innervation from that of intrinsic laryngeal muscles; therefore, its action may contribute to airflow resistance in children with laryngeal paralysis (LP) secondary to recurrent laryngeal nerve (RLN) palsy. We proposed removal of the CTM as a means of indirectly widening the paralyzed neonatal glottis. A prospective study was conducted using a piglet animal model to simulate LP and evaluate the proposed treatment's outcome. LP was induced via bilateral RLN sectioning in seven piglets. The CTMs were then removed. Animals acted as their own controls. Outcome measures consisted of serial inspiratory and expiratory airflow resistance measurements taken (1) with no intervention, (2) after RLN sectioning, and (3) after CTM removal. Several animals were awakened to assess their clinical responses to the interventions. The paired Student's t-test was used for statistical analysis. Inspiratory airflow resistance was significantly increased by RLN sectioning (p = .0062) and then significantly decreased after subsequent CTM removal (p = .0005). Clinical responses to the interventions mirrored the measured findings. Removal of the CTM significantly decreases inspiratory airway resistance in piglets with induced LP. This proposed surgical therapy for pediatric bilateral LP warrants further investigation.
High
[ 0.6904109589041091, 31.5, 14.125 ]
1. Introduction {#sec1-nanomaterials-07-00391} =============== Nowadays, advanced oxidation processes (AOPs) for disinfecting water are drawing more attention \[[@B1-nanomaterials-07-00391],[@B2-nanomaterials-07-00391]\]. AOPs are chemical treatment procedures that remove organic pollutants by oxidation through reactive oxygen species (ROS). Hydroxyl radicals (•OH) are one of the most oxidative ROS, with a potential of 2.80 V vs. normal hydrogen electrode (NHE) \[[@B3-nanomaterials-07-00391]\]. Photocatalysis refers to the process of using light to accelerate the kinetics of a chemical reaction while remaining unconsumed. Upon irradiation with light, when the energy of an excitation source is greater than the band gap energy of the photocatalyst, photon absorption occurs. The latter leads to the excitation of an electron (e^−^) from valence to conduction band leaving behind an electronic hole (h^+^). These photogenerated pairs (electron/hole) can now undergo recombination or create ROS \[[@B4-nanomaterials-07-00391]\]. The charge carriers can migrate to the surface of the photocatalyst to initiate reactions with surface adsorbed molecules (mainly H~2~O and/or O~2~). The photoexcited electron can react with oxygen to form superoxide radicals (•O~2~^−^) and the holes react with water to form hydroperoxide radicals (HO~2~•). The ROS can attack the bacterial cell wall, eventually causing cell wall disruption leading to cell death \[[@B5-nanomaterials-07-00391]\]. Ever since TiO~2~ photocatalysis was observed by Fujishima and Honda \[[@B6-nanomaterials-07-00391],[@B7-nanomaterials-07-00391]\], TiO~2~ has been widely used for photocatalysis. TiO~2~ is cheap, inert, chemically stable and environment friendly. Photocatalysis with TiO~2~ can be achieved at ambient temperature and pressure. However, the major drawback of TiO~2~ in photocatalysis is its relatively large band gap. This large band gap restricts light absorption to only ultra violet (UV) light and induces the fast recombination of photoinduced electrons and holes, which restricts the improvement of solar energy conversion efficiency. Since the UV spectrum is only a minute portion of the light reaching the earth's surface \[[@B8-nanomaterials-07-00391]\], TiO~2~ is ineffective for indoor and/or confined environments. Doping TiO~2~ can create color centers that lead to visible light absorption \[[@B9-nanomaterials-07-00391]\] and enable its activity under visible light. Many researchers have proved the possibility of tuning the band gap resulting in the activation of TiO~2~ under visible light by doping with metallic \[[@B10-nanomaterials-07-00391],[@B11-nanomaterials-07-00391]\] and non-metallic \[[@B12-nanomaterials-07-00391]\] elements, using either a self-doping process \[[@B13-nanomaterials-07-00391]\] or by deposition of noble metals on their surface \[[@B14-nanomaterials-07-00391],[@B15-nanomaterials-07-00391]\]. N-doped TiO~2~ is one of the most promising and studied anion-doped TiO~2~ for photocatalytic applications. Several methods were used to dope TiO~2~ such as sol-gel synthesis \[[@B16-nanomaterials-07-00391],[@B17-nanomaterials-07-00391]\], sputtering in N~2~ \[[@B18-nanomaterials-07-00391],[@B19-nanomaterials-07-00391]\], ion implantation \[[@B20-nanomaterials-07-00391],[@B21-nanomaterials-07-00391]\], gas phase reaction \[[@B22-nanomaterials-07-00391],[@B23-nanomaterials-07-00391]\], and atomic layer deposition \[[@B24-nanomaterials-07-00391]\], as well as dry and wet milling followed by heat treatment \[[@B25-nanomaterials-07-00391]\]. In this study, we choose to work with P25 as a source of TiO~2~, which is a commercial nanopowder. P25 is a mixture of 70% anatase and 30% rutile phases. It was shown that this biphasic TiO~2~ showed more superior photocatalytic activities than pure-phase TiO~2~, owing to the efficient electron transfer from the conduction band of the anatase to that of the rutile phase \[[@B13-nanomaterials-07-00391],[@B26-nanomaterials-07-00391]\]. A wet milling method of TiO~2~ in the presence of a doping agent with a suitable solvent is a simple scalable method that has been shown to be effective in previous studies \[[@B27-nanomaterials-07-00391]\]. The wet milling method has advantages such as reduced agglomeration over dry milling \[[@B28-nanomaterials-07-00391]\], which showed signs of heavy agglomeration. Senna et al. \[[@B27-nanomaterials-07-00391]\] showed that the doping of TiO~2~ with nitrogen through wet milling and subsequent annealing gave catalytic activity in indoor light by modifying the absorption spectrum. TiO~2~ doped with both fluorine and nitrogen showed better photoabsorption of the visible spectrum than doping with either \[[@B29-nanomaterials-07-00391]\]. Moreover, doping TiO~2~ with fluorine and a combination of fluorine and nitrogen through wet milling has not been reported before. Thus, the present work studies each sample individually, by spectroscopy methods, powder granulometry and electron microscopy, and tests their visible light absorption and antibacterial activity taking *E. coli* as a probe. 2. Results {#sec2-nanomaterials-07-00391} ========== 2.1. Untreated Particles and Effect of Attrition Milling {#sec2dot1-nanomaterials-07-00391} -------------------------------------------------------- The adsorption of the dopant molecules is a crucial step in our process, as their vicinity will further help the doping by the direct diffusion of ions from the surface into the TiO~2~ structure \[[@B27-nanomaterials-07-00391]\]. By following the surface potential changes, the adsorption of the molecules on P25 and the consequent surface modification after heat treatment can be observed. [Table 1](#nanomaterials-07-00391-t001){ref-type="table"} presents the zeta potential values of attrition milled and heat-treated samples. The negative zeta potential values are in good agreement with results showing the isoelectric point around pH 5--6 for P25 \[[@B5-nanomaterials-07-00391]\], which as stated is not altered so much by the ionic strength of the culture medium (not presented in the table). We notice that after the attrition process, samples P25-N-Att, P25-F-Att, and P25-F&N-Att have a much lower zeta potential absolute value compared with P25-UN, which is probably due to the successful adsorption of the doping molecule (Glycine (Gly) and/or polytetrafluoroethylene (PTFE)) onto the surface of the nanoparticles (NPs) by wet milling. It is worth noting that PTFE has a poor solubility in water; thus, attrition mill seems to be an ideal technique in this case. After heat treatment (HT), all of the "doped" samples have a clearly negative surface potential charge. Indeed, doped P25 samples showed an increase in their zeta potential absolute value after the burning of the organic layer at high temperature evidencing a surface change consequent to the doping process. Due to the negative zeta potential of the doped NPs, electrostatic repulsion is to be expected between bacterial cell surfaces and NPs at this working pH, since both are negatively charged. Yet, toxicity is still observed, as later discussed in the section on the antibacterial trials. We used the thermogravimetric analysis (TGA) to study the weight loss of organic species of the attrition milled samples during calcination. A weight loss was registered for all the samples from 200 °C to 500 °C or 600 °C. The TGA results of the N-attrited P25 ([Figure 1](#nanomaterials-07-00391-f001){ref-type="fig"}) show that 3 wt % of Gly was deposited on the surface of the P25 sample after attrition milling. For P25-F-Att and P25-F&N-Att, we observed a higher weight loss of 9 wt %, which was close to the 10% of PTFE added when compared with the dry TiO~2~ powder (see [Supplementary, Figure S1](#app1-nanomaterials-07-00391){ref-type="app"}). 2.2. Experimental Change upon HT {#sec2dot2-nanomaterials-07-00391} -------------------------------- The particle size distributions (PSD) that were measured using laser diffraction for the parent powders after attrition milling, drying, and heat treatment are given in [Table 1](#nanomaterials-07-00391-t001){ref-type="table"}. The samples were prepared in the saline buffer solution (SBS) medium used for the antibacterial test followed by magnetic stirring to characterize in the same experimental conditions. PSDs and morphological changes over the course of treatment are evaluated, and possible explanations and correlations with other results are now discussed. [Figure 1](#nanomaterials-07-00391-f001){ref-type="fig"} shows a typical Malvern measurement of our sample, revealing in all cases micrometer size agglomerates. The PSD of P25-UN dispersed by means of ultrasounds in 1 mM HNO~3~ gave a single mode at 2.43 μm. These values shifted towards bigger sizes, up to 3.28 μm, by dispersing the particles using magnetic stirring in the SBS, as shown in [Table 1](#nanomaterials-07-00391-t001){ref-type="table"}. The ionic strength of the SBS, in addition to the lack of a high-energy dispersing step, is probably playing an important role on the aggregation state of our samples. Indeed, salt-induced aggregation is a well-known process in particle suspensions \[[@B30-nanomaterials-07-00391]\]. After the doping process involving HT at either 500 °C or 600 °C, D~v~50 increases with aggregates five to seven times bigger than the P25-UN. The span of Malvern D~v~50 is two times higher than the parent D~v~50, showing that the heat treatment has a significant impact on the average particle size and consistently widens the size distribution. This suggests that some of the agglomerates began to sinter and/or transform into rutile \[[@B31-nanomaterials-07-00391]\] during the heat treatment \[[@B32-nanomaterials-07-00391]\]. The SEM images in [Figure 2](#nanomaterials-07-00391-f002){ref-type="fig"} show little morphological change due to the HT process, but in every case, heavy agglomeration can be noticed. In TEM micrographs, bigger and more well-define particles are clearly observed when the heat treatment is done at 600 °C ([Figure 2](#nanomaterials-07-00391-f002){ref-type="fig"}G,H) compared with P25-N-HT treated at 500 °C ([Figure 2](#nanomaterials-07-00391-f002){ref-type="fig"}F). The change can be also correlated to the partial sintering and/or transformation into rutile of P25 particles at high temperature with respect to the untreated TiO~2~ ([Figure 2](#nanomaterials-07-00391-f002){ref-type="fig"}E). The Brunauer-Emmett-Teller (BET)---specific surface area (SSA) in [Table 1](#nanomaterials-07-00391-t001){ref-type="table"} shows an increase after attrition milling heat treatment for P25-N-HT. This is further clarified by calculating the primary particle diameter obtained from BET, d~BET~, and the correlated agglomeration factor, F~ag~, from Equations (1) and (2) respectively \[[@B33-nanomaterials-07-00391]\]: $$d_{BET} = 6 \div \left( {{SSA} \times \mathsf{\rho}} \right)$$ $$F_{ag} = D_{v}50\left( {Malvern} \right) \div d_{BET}$$ where ρ is the density of the specimen, and D~v~50 is the volume median diameter of the particle size distribution. As the SSA increases, the d~BET~ decreases for P25-N-HT, as expected, from 35 nm (P25-UN) to 28 nm (P25-N-HT). This additionally proves that there is no significant partial sintering observed at 500 °C as confirmed by SEM and TEM ([Figure 2](#nanomaterials-07-00391-f002){ref-type="fig"}B,F). Fluorinated samples however, show a decrease in SSA coupled with an increase in d~BET~ to twice the size of P25-UN, which relates to the partial sintering in P25-F-HT and P25-F&N-HT resulting from heat treatment at 600 °C. After HT, the particles appeared more agglomerated in all cases after dispersion in SBS. Nevertheless, we can notice an agglomeration factor for P25-N-HT that is more than two times higher than of both P25-F-HT and P25-F&N-HT, whereas almost no difference is observed between the latter two. Moreover, it is worth noting that the F~ag~ is strongly dependent on the dispersing medium and dispersing technique. Indeed, by suspending the P25 nanoparticles in HNO~3~ solution and applying additional ultrasound technique to help break the agglomerates, the F~ag~ is found to be 69 compared to 94 in SBS for the same sample. The chemical composition of the as-doped sample surfaces was investigated by X-ray photoelectron spectroscopy (XPS) analysis. The atomic concentration of the dopants in P25 were estimated to be, (i) P25-N-HT: around 0.30 at% of N, (ii) P25-F-HT: around 0.45 at% of F, (iii) P25-F&N-HT: around 0.45 at% of N and 1.00 at% of F, showing the successful doping of P25 through wet milling process using Gly and/or PTFE molecules. For a detailed analysis, the curve fitting and deconvolution spectra of the Ti 2p, O 1s regions are given in [Supplementary, Figure S2](#app1-nanomaterials-07-00391){ref-type="app"}; which the N 1s and F 1s regions in the XPS spectra of doped samples are presented in [Figure 3](#nanomaterials-07-00391-f003){ref-type="fig"}. The XPS spectra of Ti 2p revealed two main peaks that can be deconvoluted. The consequent binding energies (BE) could be assigned to Ti^3+^ at 457.8 eV and 463.1 eV and Ti^4+^ at 458.4 eV and 464.1 eV. The coexistence of the Ti^3+^/Ti^4+^ redox couple is crucial for photocatalysis applications \[[@B34-nanomaterials-07-00391]\]. In our case, the intensity of the peaks corresponding to Ti^3+^ is very low. The deconvolution of the O 1s peak in the XPS spectrum brought to light two peaks, at about 529.5 and 531.5 eV. The first one which is the main peak is ascribed to the O~2~ bonded to Ti in the form of Ti--O linkages \[[@B35-nanomaterials-07-00391]\], and the second peak of lower intensity can be attributed to the presence of OH groups \[[@B36-nanomaterials-07-00391]\]. The presence of one N 1s peak at BE from 396 eV to 398 eV is generally assigned to the substitutional doping site (Ti--N--Ti species) \[[@B20-nanomaterials-07-00391],[@B37-nanomaterials-07-00391],[@B38-nanomaterials-07-00391]\]. Samples doped with N and doped with both N and F showed a N 1s peak in the region between 392 and 406 eV (Ti--N--O) that can be deconvoluted into two bands with two different BE at 400 eV and 397.9 eV, revealing two kinds of nitrogen linkages in our catalysts. The highest intensity peak at 400 eV relates to interstitial doping, as stated by different groups \[[@B38-nanomaterials-07-00391],[@B39-nanomaterials-07-00391],[@B40-nanomaterials-07-00391],[@B41-nanomaterials-07-00391]\]. In addition, this higher binding energy, which was confirmed more recently by Batalović et al. using Density functional theory (DFT) calculations, is attributed to interstitial nitrogen located near the lattice oxygen forming a short N--O bond \[[@B42-nanomaterials-07-00391]\]. The peak at 397.9 eV, despite a poor signal-to-noise ratio and low intensity, can possibly be assigned to atomic nitrogen bonded to titanium, with the N atom replacing the oxygen atoms in the TiO~2~ crystal lattice to form a N--Ti--N bond \[[@B43-nanomaterials-07-00391]\]. However, this is only representative of \<5% of the N 1s signal. No signal for the nitrogen species was observed for undoped and F-doped sample. The XPS spectra in the F 1s region for both the F and F&N modified samples are given in [Figure 3](#nanomaterials-07-00391-f003){ref-type="fig"}B,D, respectively. A single peak is observed; the peak maximum is at 684.5 eV. This peak is attributed to the fluorine anions adsorbed at the surface of the nanoparticles (surface fluorination, i.e., to a terminal Ti--O--F or Ti--F bond), if we compare with literature data \[[@B44-nanomaterials-07-00391]\]. Furthermore, Senna et al., whom worked also with PTFE as a source of fluorine ion, attributed the peak at 684 eV to a change in electronic states due to fluorine incorporated into P25 near the surface region \[[@B28-nanomaterials-07-00391]\]. No evidence of a resolved peak in the region of 688 eV, which was assigned to substitutional lattice fluorine ions \[[@B44-nanomaterials-07-00391]\], was obtained in our XPS investigations. In our process using PTFE, the presence of this peak would not be a proof of the substitutional doping, since this peak is also found in pristine PTFE \[[@B28-nanomaterials-07-00391]\]. As expected, fluorine species were not detected in undoped and N-doped samples. Fourier transform infrared (FTIR spectra of all of the samples have been investigated. All of the doped samples present similar features by FTIR. For clarity, only spectra of P25-UN and P25-F&N-HT are shown in [Figure 4](#nanomaterials-07-00391-f004){ref-type="fig"}. The band between 500--800 cm^−1^ corresponds to the symmetric stretching vibrations of Ti--O and Ti--O--Ti \[[@B45-nanomaterials-07-00391],[@B46-nanomaterials-07-00391]\]. The peak found at 1016 cm^−1^ is assigned to a Ti--O--C bond. Pillai et al. have correlated this bond with urea concentrations in their samples. Hence, it can be assumed that these peaks could be due to the carbon residue remaining on the surface of NPs after HT. The peak obtained at 1124 cm^−1^ is assigned to the stretching vibration of C--N \[[@B47-nanomaterials-07-00391]\]. The band at 2165 cm^−1^ is expected to be due to NO vibration \[[@B38-nanomaterials-07-00391]\]. The peak at 3189 cm^−1^ is characteristic of C--O stretching mode \[[@B48-nanomaterials-07-00391]\]. The two peaks located at 3501 and 1844 cm^−1^ represent the stretching \[[@B47-nanomaterials-07-00391]\] and bending vibrations \[[@B46-nanomaterials-07-00391]\] of the hydroxyl group on the surface of the powder and O--H bending of dissociated or molecularly adsorbed water molecules \[[@B45-nanomaterials-07-00391]\]. As shown in [Figure 4](#nanomaterials-07-00391-f004){ref-type="fig"} it is clear that the magnitude of the spectrum (at 3501 and 1844 cm^−1^) of doped samples is higher than for the untreated parent powder. This difference indicates higher surface adsorbed water and hydroxyl groups, which may play an important role in photocatalytic reactions \[[@B45-nanomaterials-07-00391],[@B49-nanomaterials-07-00391]\]. The possible changes in the phase structure of the doped samples after HT were investigated by X-Ray Diffraction (XRD). [Figure 5](#nanomaterials-07-00391-f005){ref-type="fig"} shows the XRD patterns of P25 powders as-received and doped with N, Fluorinated, or doped with both N and F. All of the samples were analyzed along with a 100% rutile standard, which was used to quantify amorphous phases present (if any) after heat treatment of the samples. The analyses showed only crystalline powders with no traces of amorphous phases. In all of the samples, the indexation confirmed the presence of both anatase (RRUFF R060277) and rutile (RRUFF R110109) crystal structures with a dominant anatase phase. The P25-UN nanopowder showed around 90% anatase and 10% rutile (expected values from the Degussa data sheet were 70% anatase and 30% rutile). Almost the same proportion was found in P25-N-HT, whereas for both P25-F-HT and P25-F&N-HT, a significant change in anatase and rutile proportions were observed with almost 60% of anatase and 40% of rutile. The usual temperature of the phase transition from anatase to rutile TiO~2~ is around 550 °C \[[@B50-nanomaterials-07-00391]\]; thus, it can be concluded that the nanomaterial is gradually converted to rutile over this temperature range. In the case of nitrogen doping, no change in the peak positions were noticed compared with P25-UN powder. Fluorine doping did not cause any shift in the XRD peak positions of P25-F-HT or P25-F&N-HT nanoparticles, which is in accordance with the XPS results showing no incorporation of fluorine into the particle. Moreover, since the radius of fluorine anion (0.133 nm) is almost the same as oxide anion (0.132 nm), no change in XRD pattern should even be observed in the case of substitutional doping. The structure of the P25 samples was further investigated by Raman spectroscopy. The Raman spectra are shown in [Supplementary, Figure S3](#app1-nanomaterials-07-00391){ref-type="app"}. The spectra of P25-UN and P25-N-HT are comprised of four Raman modes at 138, 392, 514, and 635 (±3) cm^−1^ corresponding to E~g~(1), B~1g~(1), B~1g~(2) + A~1g~, and the E~g~(2) Raman active modes of the anatase phase. No other phase is observed in these spectra whereas the spectra of P25-F-HT and P25-F&N-HT revealed two more peaks at 444 and 606 cm^−1^, which are attributed to rutile phase E~g~ and A~1g~ modes along with a shift in anatase peaks \[[@B51-nanomaterials-07-00391],[@B52-nanomaterials-07-00391]\]. The observation of the rutile phase here is due to its higher content as shown by the XRD results. 2.3. Photocatalytic Activity {#sec2dot3-nanomaterials-07-00391} ---------------------------- Reflectance spectroscopy (RS) measurements were performed on all of the samples. The absorption of the samples is plotted in [Supplementary, Figure S4](#app1-nanomaterials-07-00391){ref-type="app"} in the absorbance units vs. wavelength. Compared with parent P25, RS showed successful light absorption in the visible region (380--420 nm) for all of the doped samples, and more especially, fluorination influenced the light absorption characteristics. Our N-doped samples were prepared with a similar protocol, but with lower milling times and lower glycine concentrations than in the process of Senna et al. \[[@B27-nanomaterials-07-00391]\]. Here, our N-doped P25 samples showed better absorption compared with the P25-UN showing that N doping gives successful visible light absorption. Similar to other studies in the literature, we observed a better light absorption in the visible range for our N-doped \[[@B27-nanomaterials-07-00391],[@B42-nanomaterials-07-00391]\] and F-doped samples \[[@B28-nanomaterials-07-00391]\]. Moreover, P25-F-HT and P25-F&N-HT showed a similar trend for the same anatase-to-rutile ratio. All of these results showed that doped samples changed the electronic structures of P25 that were associated with lower band gap energy. Similar modifications in the adsorption spectra have been previously observed for N and F monodoped anatase nanoparticles \[[@B42-nanomaterials-07-00391],[@B53-nanomaterials-07-00391]\]. However, it was found that F&N modification considerably enhanced the visible light absorption of TiO~2~ as observed in our experiments \[[@B34-nanomaterials-07-00391],[@B54-nanomaterials-07-00391]\]. The photocatalytic performance of the prepared catalysts was tested to disinfect *E. coli* bacteria in suspension, as shown in [Figure 6](#nanomaterials-07-00391-f006){ref-type="fig"}. All of the samples showed effective photocatalytic activity against *E. coli* leading to bacterial inactivation under simulated light. The most effective one was the F&N sample, which presented the fastest inactivation dynamics of *E. coli* compared with N and F monodoped TiO~2~. 3. Discussion {#sec3-nanomaterials-07-00391} ============= Photocatalytic activity was observed for doped samples, suggesting the possibility of creating intermediate energy levels in the band gap. Then, the production of ROS is possible under light irradiation, as it showed a soft spectral shift towards visible wavelengths, leading to the bacterial increase in the cell wall fluidity and the bacterial inactivation \[[@B55-nanomaterials-07-00391]\]. This agrees with the observed modification in the FTIR spectra showing higher surface adsorbed water and hydroxyl groups for doped samples. Indeed, as seen in Equations (4) and (5), (i) hydroxyl groups capture photoinduced holes (h^+^) when irradiated with light, and form hydroxyl radicals (•OH) with high oxidation capability \[[@B45-nanomaterials-07-00391]\], and (ii) surface adsorbed water acts as absorption centres for O~2~ molecules and form •OH to enhance photocatalytic activity \[[@B56-nanomaterials-07-00391]\]. At the molecular level, the photogenerated electrons tend to reduce Ti^4+^ to Ti^3+^, and the holes react with the bridging oxygen sites leading to oxygen vacancies and free •OH radicals. Redox couple Ti^3+^/Ti^4+^ were seen to co-exist in our prepared catalysts, as shown with XPS in SI, [Figure S5](#app1-nanomaterials-07-00391){ref-type="app"}. Water molecules heal the oxygen vacancies, producing OH groups on the surface, which leads to the oxidation of Ti^3+^ into Ti^4+^, as recently reported \[[@B56-nanomaterials-07-00391]\]. Substitution can occur during the heat treatment process, according to the atomic radii of the species. In our case, the atomic radius of N is 0.56 Å, which cannot substitute the Ti presenting a radius of 1.76 Å; however, it can substitute the O (0.48 Å), as recently reported \[[@B9-nanomaterials-07-00391],[@B45-nanomaterials-07-00391],[@B56-nanomaterials-07-00391]\]. This can lead to lattice (or interstitial) or O atom substitutional doping by N, which leads to intragap states and spectral absorptio. These Ti--N, O--N and Ti--O--N bonds were previously described in detail in the XPS section. For fluorinated & N doped TiO~2~, it has been demonstrated that the position of N (interstitial or substitutional) does not qualitatively differ in the essential features of the electronic structure \[[@B57-nanomaterials-07-00391]\]. Moreover, the important role of surface fluoride was highlighted in a N-doped TiO~2~ sample \[[@B58-nanomaterials-07-00391]\]. [Scheme 1](#nanomaterials-07-00391-sch001){ref-type="scheme"} shows the suggested mechanistic considerations behind the observed photocatalytic activity of the doped TiO~2~. The N-doped catalyst showed no activity in the dark ([Figure S5](#app1-nanomaterials-07-00391){ref-type="app"}) and faster bacterial inactivation kinetics within 90 min compared with the P25-F-HT sample (120 min). The fluorinated & N cdoped sample presented the fastest inactivation dynamics of *E. coli*, with a total bacterial inactivation within 60 min. These results tend to prove that the antibacterial activity is not heavily size dependant, since similar aggregates size in both P25-F-HT and P25-F&N-HT lead to different results. Moreover, the partial sintering process for the fluorinated and fluorinated and N doped samples (at 600 °C) does not appear to affect their photocatalytic activities. This is in accordance with other studies that showing that NPs agglomerate---and not single NPs---interact primarily with *E. coli* cell walls before disrupting them \[[@B55-nanomaterials-07-00391]\]. Another point was to confirm whether the anatase/rutile ratio plays a role in the process. Indeed, we observed a phase transition for the samples HT at 600 °C, but for the same ratio in the fluorinated samples, we found different bacterial inactivation times (by a factor of two), meaning that the proportion of rutile is not crucial at this stage. Finally, these results show that a combination of both N and F lead to better activity against *E. coli* than fluorine or nitrogen separately. Fluorinated and N doped TiO~2~ (F&N-TiO~2~) demonstrated the fastest bacterial inactivation under solar light (UV and visible). Indeed, the presence of fluorine increases the catalytic activity of F&N-TiO~2~ when compared with N monodoped TiO~2~ \[[@B57-nanomaterials-07-00391]\]. Compared with the undoped TiO~2~, F&N-TiO~2~ showed improved activity under visible light. The slight improvement in the photocatalytic activity of the fluorinated TiO~2~ can be attributed to the enhanced intrinsic properties of UV photons absorption. Poor activity is observed in the visible light region (data not shown) due to the insufficient absorption in the lower energy range. In both N-TiO~2~ and F&N-TiO~2~, enhanced photocatalytic activity is observed in the visible region. This can be attributed to the band gap tuning which triggers photons absorption in the visible light range ([Scheme 1](#nanomaterials-07-00391-sch001){ref-type="scheme"}). Consequently, less energy is required to photoactivate the photocatalysts for surface radicals generation. 4. Materials and Methods {#sec4-nanomaterials-07-00391} ======================== 4.1. Catalysts Preparation {#sec4dot1-nanomaterials-07-00391} -------------------------- P25 (Aeroxide^®^, average primary particle size 21 nm) was purchased from Sigma-Aldrich, St. Louis, MO, USA. Glycine (henceforth Gly, Acros organics, Morris Plains, NJ, USA) and polytetrafluoroethylene (PTFE, Sigma-Aldrich, St. Louis, MO, USA) were used as sources of nitrogen and fluorine respectively without any further purification. To obtain doped TiO~2~, a four-step process was followed. The first step is the suspension preparation from the as-received powder batches using a suitable dispersant and the titania powder. In the case of nitrogen doping (N-doping), a 5 wt % aqueous solution of Gly was prepared by dissolving 2.5 g Gly in 500 g of 10^−3^ N nitric acid (HNO~3~) solution. Senna et al. \[[@B27-nanomaterials-07-00391]\] used 100 g in 500 g of the HNO~3~ solution with 5 h of attrition milling. We investigated the effects of milling time and glycine concentration ([Supplementary, Section S2](#app1-nanomaterials-07-00391){ref-type="app"}), and found a decrease in milling time had little effect and a decrease in glycine concentration showed higher photocatalytic activity ([Table S1](#app1-nanomaterials-07-00391){ref-type="app"}). For easier processing but maintaining a direct comparison with the previously published work \[[@B27-nanomaterials-07-00391]\], we chose 2.5 g glycine in 500 g of the HNO~3~ solution as this gave the same time to complete bacterial deactivation (120 min) ([Table S1](#app1-nanomaterials-07-00391){ref-type="app"}). The glycine solution was homogenised for 20 min using an ultrasonic bath. The solution pH was 3.4. For fluorine, a 1.92 wt % aqueous suspension of PTFE was prepared by dispersing 2.0 g of PTFE in 102 g of 10^−3^ N HNO~3~ solution. Then, 1.1 g TWEEN 20 (Fluka) was added to the as-prepared PTFE to improve the dispersion of PTFE in the aqueous medium. In the case of fluorine and nitrogen co-doping (F&N), 1 g PTFE and 55 g of 5 wt % Gly solution were mixed together, which corresponded to half of the quantities used in the cases of N and fluorine doping. We added 10^−3^ N HNO~3~ solution until the total mass of the suspension reached 110 g. Then, 1 wt % of TWEEN 20 was added. For homogeneous dispersion, the suspensions were treated by ultrasonic bath (Branson 5510) for 20 min followed by ultrasonic horn treatment (150 W with Telsonic Ultrasonics, model DG-100) for 15 min. Finally, 42 g of titania nanopowder was added into 110 g Gly solution, and 21 g of the same batch of titania nanopowder was added into 110 g of PTFE suspension or Gly/PTFE suspension. In a second step, attrition milling was performed on each suspension as previously described using a Netzsch PE075 mill (Netzsch, Selb, Germany), with yttrium-stabilized zirconia beads (2.5 mm) 180 g, at 1500 rpm for 1 h. The attrition-milled samples (henceforth, samples P25-N-Att, P25-F-Att, and P25-F&N-Att) were washed with either Gly suspension or 10^−3^ N HNO~3~ (2 × 50 mL) to recover the maximum of powder, and dried at 60 °C for 96 h using a SalvisLab Thermocenter TC100 oven. Oven dried powders were then crushed with a mortar and a pestle for 2 min manually and heated in air. Thermogravimetric analysis (TGA) was performed to find the appropriate heat treatment temperatures for all of the samples. The heating temperature was set at to 500/600 °C at a rate of 10 °C/min. The TGA samples were held for 1 h at 500/600 °C, and then cooled down at a rate of 10 °C/min. For the bulk powder samples (4--5 g), they were heated at 10 °C/min up to 500 °C (for N-doping) or 600 °C (for F and F&N), held for 1 h, and cooled naturally (henceforth, samples P25-N-HT, P25-F-HT, and P25-F&N-HT). 4.2. Photocatalytic Activity {#sec4dot2-nanomaterials-07-00391} ---------------------------- The photocatalytic antibacterial activity of P25 powders was assessed by adding 1 g/L titania suspension to an Escherichia coli solution (saline buffer solution, SBS, NaCl (8 mg/L) and KCl (0.8 mg/L) to maintain the osmotic pressure of bacterial cells during the experiment) and exposing the mixture to the solar simulated light (310--800 nm, 50 mW/cm^2^). The initial bacterial solution contained \~4.1 × 10^6^ colony-forming units per milliliter (CFU/mL). Samples were taken every 15 min. During the sampling, the stirring was stopped for 2--3 min, and the samples were taken at different depths of the 40 mL solution. A sample of 100 μL of each run was pipetted onto a nutrient agar plate and then spread over the surface of the plate using the standard plate method. Agar plates were incubated lid down at 37 °C for 24 h before colonies were counted. Three independent assays were done for each sample. 4.3. Characterisation {#sec4dot3-nanomaterials-07-00391} --------------------- Granulometric analyses were performed for the particle size distribution (PSD) with a Mastersizer S (Malvern Instruments Ltd., Worcestershire, UK). For granulometric analysis, suspensions were prepared in the same SBS (NaCl/KCl) used for antibacterial activity trials: 0.01 g of P25 undoped (P25-UN) or modified P25 powders were mixed with 10 mL of the SBS solution to measure the PSD under the same conditions as used for the photocatalytic activity. The suspension was placed in a plastic container with a magnetic stirrer for 5 min prior to measurements. The colloidal surface properties were also evaluated, i.e., zeta potentials for the as-prepared suspension were measured using Zetasizer Nano ZS (Malvern Instruments Ltd., Worcestershire, UK). The zeta potential surface charge was measured by dispersing the particles in water using an ultrasound bath for 15 min and adjusting the pH between pH 7 and 7.1 (HCl/NaOH 1 M). The nitrogen-specific surface area was assessed using the method of Brunauer, Emmett and Teller (the BET model) with a Gemini 2375 (Micromeritics Instrument, Norcross, GA, USA); samples were degassed under flowing nitrogen at 200 °C for 1 h. Solid state properties were determined by X-ray diffractometry (XRD; Philips X Pert, Eindhoven, The Netherlands), thermogravimetric analysis (TGA; TGA/SDTA851e, Mettler Toledo, Columbus, OH, USA), reflectance spectroscopy (Varian Cary 1E spectrometer), X-ray photoelectron spectroscopy (XPS; Axis Ultra, Kratos Analytical, Manchester, UK), Fourier transform infrared spectroscopy (FTIR; Spectrum 100 Optica, Perkin Elmer, Bucks, UK), Raman spectroscopy (LabRAM HR, Horiba, Kyoto, Japan). Scanning Electron microscopy (SEM) images were obtained with a SEM Merlin microscope (Carl Zeiss, Jena, Germany). 5. Conclusions {#sec5-nanomaterials-07-00391} ============== In summary, we have successfully prepared nitrogen-doped, fluorinated, and fluorinated and N-doped (F&N) P25 nanoparticles by a scalable wet milling process in the presence of a doping agent (Gly and PTFE) followed by a heat treatment. XRD and Raman spectroscopy confirmed that all of the samples are nanocrystalline TiO~2~ composed of a mixture of anatase and rutile phases. An increase in the heat treatment temperature from 500 °C to 600 °C for fluorinated samples induced a phase transition with a significant change in anatase to rutile proportions. Heavily agglomerated particles were observed in the saline buffer solution medium, used in the bacterial inactivation evaluation tests. Granulometric analyses and SEM images confirmed a partial sintering after a heat treatment at 600 °C. XPS analysis indicated that N-doping atoms are mainly located in the interstitial position, whereas F-doping atoms are related to a surface fluorination and highlighted the coexistence of a Ti^3+^/Ti^4+^ redox couple. Moreover, FTIR spectroscopy showed higher surface adsorbed hydroxyl groups, which are necessary for photocatalysis applications. All of the doped P25 powders showed effective photocatalytic activity against *E. coli* leading to bacterial inactivation under simulated light. The characterization data seem to indicate that the inactivation process is neither size nor composition-dependent in this case. Among all of the doped samples, results revealed that P25-fluorinated and N-doped nanopowder is the most efficient with a synergistic effect of both N and F non-metal atoms. We thank EPFL and the CCMX-NanoScreen project for the financial support of this work. The following are available online at <http://www.mdpi.com/2079-4991/7/11/391/s1>, Figure S1: TGA profiles showing the weight loss versus the temperature of P25-UN (a); P25-N-Att (b); P25-F-Att (c) and P25-N&F-Att (d), Figure S2: XPS spectra of undoped and doped samples and high-resolution analysis in the O 1s, Ti 2p, N 1s and F 1s binding energy region, Figure S3: Raman spectra of (a) P25-UN, (b) P25-N-HT, (c) P25-F-HT and (d) P25-F&N-HT. The bands corresponding to rutile were annotated with the letter R, Figure S4: UV-vis-RS spectra of various samples. P25-UN (a) and P25-N-HT (b) (these were separated in the inset for more clarity), P25-F-HT (c) and P25-N&F-HT (d), Figure S5: Bacterial deactivation of E-coli under simulated solar light and in the dark in the presence of N-doped P25 TiO~2~ powder, Table S1: Effect of milling time and glycine concentration on the time to total deactivation of E-coli under illumination of simulated solar light. ###### Click here for additional data file. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript. P.B. designed the doping process experiments and conceived the study. B.v.D. and B.G. performed the preliminary experiments for optimization of the N doping of TiO~2~. A.J. accomplished the other doping experiments (N, F as well as F&N). S.R. performed the antibacterial studies and prepared the mechanism of the photocatalytic activity. I.M. and A.J. realized the characterization of the samples and the interpretation of the results. P.B. and I.M. supervised the overall research. The authors declare no conflict of interest. Figures, Scheme and Table ========================= ![Laser diffraction (Malvern) particle size distribution of (**a**) P25-UN and (**b**) P25-F&N-HT.](nanomaterials-07-00391-g001){#nanomaterials-07-00391-f001} ![SEM and TEM images respectively of (**A**,**E**) untreated P25; (**B**,**F**) P25-N-HT; (**C**,**G**) P25-F-HT; and (**D**,**H**) P25-F&N-HT.](nanomaterials-07-00391-g002){#nanomaterials-07-00391-f002} ![High-resolution X-ray photoelectron spectroscopy (XPS) spectra analysis in the N 1s and F 1s binding energy region for (**a**) P25-N-HT, (**b**) P25-F-HT, (**c**,**d**) P25-F&N-HT. All the other spectra are presented in SI, [Figure S2](#app1-nanomaterials-07-00391){ref-type="app"}.](nanomaterials-07-00391-g003){#nanomaterials-07-00391-f003} ![Fourier transform infrared (FTIR) spectra of P25-UN and P25-F&N-HT samples.](nanomaterials-07-00391-g004){#nanomaterials-07-00391-f004} ![XRD spectra indexed with rutile (R) phase (RRUFF R110109) and anatase (A) phase (RRUFF R060277) of (**a**) P25-UN, (**b**) P25-N-HT, (**c**) P25-F-HT, (**d**) P25-F&N-HT.](nanomaterials-07-00391-g005){#nanomaterials-07-00391-f005} ![*E. coli* survival versus time in the presence of (1) light only or doped samples (2) P25-N-HT, (3) P25-F-HT, and (4) P25-N&F-HT under simulated light.](nanomaterials-07-00391-g006){#nanomaterials-07-00391-f006} ![Schematic representation of the electron transfer mechanism showing the energy states and the role of various reactive oxygen species during the photocatalytic processes in the N- and F-doped anatase and rutile phase. P25 nanoparticles are a mixture of both anatase and rutile phases.](nanomaterials-07-00391-sch001){#nanomaterials-07-00391-sch001} nanomaterials-07-00391-t001_Table 1 ###### Summary of the Zeta (ζ) potential measurements of the different P25 samples after attrition milling and after heat treatment at pH 7 in saline buffer solution and the granulometric results and calculated agglomeration factor F~ag~ for the undoped and doped samples. BET: Brunauer, Emmett, and Teller method. Medium Sample Malvern BET F~ag~ -------------------------- -------- ------- ------- --------- ------ ------- ----- ---- 10^−3^ N HNO~3~ Solution P25-UN 2 \- 2.43 1.72 39.7 35 69 Saline buffer solution P25-UN 7 −5.1 3.28 2.17 39.7 35 94 P25-N-Att 7 −9.9 \- \- \- \- \- P25-N-HT 7 −15.1 20.33 4.01 49.5 28 726 P25-F-Att 7 −5.3 \- \- \- \- \- P25-F-HT 7 −21.9 15.19 4.51 23.3 60 253 P25-F&N-Att 7 −5.9 \- \- \- \- \- P25-F&N-HT 7 −20.6 21.03 4.49 20.0 70 300 [^1]: Current address: Materials for Arts and Archeology, 3ME, TU Delft, Mekelweg 2, 2628 CD Delft, The Netherlands.
High
[ 0.6651480637813211, 36.5, 18.375 ]
Market Realist Weekly: Get Real 9/18/17 Markets Started Strong and Finished Solid Last Week By Winston Smith | Sep 18, 2017 8:28 am EST Strong opener and decent close Last week, financial markets opened on a strong note as Hurricane Irma died down and the damage was less than anticipated. Across the board, markets (SPY) (NASDAQ) (DJI) rose 1%–2.5% in the US. Oil (USO) had an even better week. OPEC tried to extend cuts beyond March of next year. As risk assets rallied, gold (GLD) gave back a bit during the week and fell 2%. On Monday, the Dow opened almost 260 points higher followed by another up day on “Apple Day” Tuesday. Here are the highs and lows last week: Hurricane Irma weakened with damage estimates as high as $20 billion–$65 billion, but lower than initial fears.
Low
[ 0.49707602339181206, 31.875, 32.25 ]
Q: In Vue, what is the relationship of template, render, VNode? During development of a vue project, and got some doubt regarding template / render / VNode. After reading the document https://vuejs.org/v2/guide/syntax.html, and google search, still didn't understand it well. Code main.js: (partly) new Vue({ el: '#app', render: h => h(App), router }) App.vue: <template> <div id="content"> <!-- <img src="./assets/logo.png" alt="">--> <router-view></router-view> </div> </template> <script> export default {} </script> Questions What is h from h => h(App) ? And what is the type of h's return value? Does the template always compile to a VNode or a function that returns a VNode? A: What is h from h => h(App) render: h => h(App) is shorthand for: render: function (createElement) { return createElement(App); } where h is shorthand for the createElement argument; a function to compile the template into a VNode https://github.com/vuejs-templates/webpack-simple/issues/29#issuecomment-312902539 What is the type of h's return value? Since h is the createElement function, h here returns a VNode https://vuejs.org/v2/guide/render-function.html#createElement-Arguments Does the template always compile to a VNode or a function that returns a VNode You can do either, just depending on your implementation. If you use Vue.compile, then you can compile the template into a render function: var res = Vue.compile('<div><span>{{ msg }}</span></div>') new Vue({ data: { msg: 'hello' }, render: res.render, staticRenderFns: res.staticRenderFns }) https://vuejs.org/v2/api/#Vue-compile If you use the createElement function, then you compile the template directly into a VNode.
High
[ 0.7474747474747471, 27.75, 9.375 ]
Flickr Photos Recent events in Boston and Texas emphasize the importance of knowing what to do when an emergency occurs. Even as first responders rushed into help at both scenes, much of the initial care to the injured was provided by friends, neighbors and bystanders who were trained in CPR and first aid. Whether the emergency is community-wide and involves numerous injuries, or involves a single individual being hurt at home, it is vital that someone close by knows what to do when such an emergency occurs. Getting yourself and your family more prepared for disasters can bring peace of mind during trying times and can help save someone’s life during future emergencies. Taking an action like downloading our first aid app, taking a first aid class or building a disaster supply kit can help people feel empowered to act when disaster strikes. The American Red Cross has numerous ways people can get the information and training they need to be able to help when an emergency occurs. The Red Cross urges everyone to be better prepared by taking advantage of training and mobile apps available to teach them what to do when someone needs assistance. FIRST AID/CPR CLASSESThe Red Cross has classes available that emphasize hands-on-learning of First Aid, Cardiopulmonary Resuscitation (CPR) and use of an Automated External Defibrillator (AED). The courses teach someone the skills they need to help save a life. Participants learn how to respond to common first aid emergencies, how to respond to cardiac and breathing emergencies in adults and how to use AEDs. There are also options available to learn how to help infants and children. People can register for these classes at redcross.org/takeaclass or by calling 1-800-REDCROSS. Know when to call 9-1-1 and what to do until help arrives for critical cardiac and first aid emergencies. This course is for people who do not require OSHA-compliant certification. It takes about 2 hours to go through the Adult CPR and First Aid content. Pediatric modules are also available. DOWNLOAD FIRST AID APPPeople can also download the free Red Cross First Aid App for iPhone and Android mobile devices which puts simple lifesaving information at someone’s fingertips. Features include step-by-step instructions to guide someone through everyday first aid scenarios, full integration with 9-1-1 to call emergency services from the app and preloaded content to have instant access to information even without device reception or internet connectivity. The app is available in the Apple App Store and the Google Play Store by searching for American Red Cross.
High
[ 0.657142857142857, 34.5, 18 ]
Poll: Which player can the Dolphins least afford to lose to injury in 2010? The Dolphins, on paper, look poised to make the playoffs in 2010 and have as good a shot as any team to make a Super Bowl run. Entering Year 3 under Bill Parcells, Jeff Ireland and Tony Sparano, they have their young, franchise quarterback in place in Chad Henne, one of the best receivers in the world in Brandon Marshall, two Pro Bowl running backs in Ronnie Brown and Ricky Williams, two anchors in Jake Long and Vernon Carey, an athletic freak at middle linebacker in Karlos Dansby and one of the top young cornerback duos in the game in Vontae Davis and Sean Smith. But stuff happens throughout the course of a season – injuries, suspensions, ineffective play. The 2010 Dolphins in December could look entirely different from the team that starts the season in September. One untimely injury could derail the entire season. Hall of Fame receiver Michael Irvin, who now hosts a midday radio show on WQAM 560-AM, asked Dolphins linebacker Channing Crowder Monday afternoon who he thinks is the one player the team absolutely can’t afford to lose this season. I expected Crowder to say Henne, the talented first-time starting quarterback whose ability to handle the pressures of his job will certainly have a major impact on the Dolphins’ season. But Crowder threw a bit of a curveball. His answer: “We need Brandon Marshall to stay healthy,” Crowder said. “Everyone’s talking about the passing game now, but now you have to pull some of those safeties out of the box, now you have to address that receiver position. So now you have two studs, two Pro Bowl running backs back there coming in fresh every other play. Now having that receiver, now being able to open that box and having Ronnie and Ricky coming down hill, it’s tough.” “We addressed the receiver situation with the best receiver, in my mind, so if he were to go down, God willing he doesn’t, it would be back where it was.” And Crowder makes some good points. Where the receiver position was, as Crowder puts it, was not a good place. Since Dan Marino retired after the 1999 season, the Dolphins have had exactly one 1,000-yard receiver – Chris Chambers in 2005 (1,118 yards). Otherwise, Dolphins receivers have underperformed and underwhelmed – Ted Ginn, Chambers, Marty Booker, Derek Hagan and others. Marshall, 26, brings three straight 100-catch, 1,100-plus yard seasons to Miami, and could have a waterfall effect on the rest of the offense – Davone Bess, Brian Hartline and Greg Camarillo could thrive because of more single-teams; Brown and Williams could have more space to run; Henne could put up Pro Bowl-type passing stats. But there is no right answer to this question. Henne, certainly, needs to stay healthy, because Tyler Thigpen, an injured Chad Pennington or Pat White probably won’t be taking this team to the playoffs. If Brown or Williams go down, it kills the thunder-and-lightning, fresh-legs aspects of the Dolphins’ running game. If Long goes down, opposing pass-rushers could tee off on Henne. If Yeremiah Bell goes down, the Dolphins could have two young fifth-round picks starting at safety. If Randy Starks goes down, the Dolphins will have no one to plug the middle of the defensive line. If Cam Wake goes down, the Dolphins may not have anyone to rush the passer. If Patrick Cobbs goes down, who will do all the dirty work? So what say you, fans? Who is the one player the Dolphins simply cannot afford to lose this season?
Mid
[ 0.599156118143459, 35.5, 23.75 ]
Q: Array subclassing with setPrototypeOf So I read some blog posts, SO threads and other lectures about subclassing Array in JavaScript. The general view on the topic is that there is no way to create a subclass with some kind of downside. While trying out a few things I came up with this solution for myself: // This is the constructor of the new class. function CustomArray() { // The "use strict" statement changes the way the "magic" variable // "arguments" works and makes code generally safer. "use strict"; // Create an actual array. This way the object will treat numeric // properties in the special way it is supposed to. var arr = [], i; // Overwrite the object's prototype, so that CustomArray.prototype is // in the prototype chain and the object inherits its methods. This does // not break the special behaviour of arrays. Object.setPrototypeOf(arr, CustomArray.prototype); // Take all arguments and push them to the array. for (i = 0; i < arguments.length; i++) { arr.push(arguments[i]); } // Return the array with the modified prototype chain. This overwrites // the return value of the constructor so that CustomArray() really // returns the modified array and not "this". return arr; } // Make CustomArray inherit from Array. CustomArray.prototype = Object.create(Array.prototype); // Define a method for the CustomArray class. CustomArray.prototype.last = function () { return this[this.length - 1]; }; var myArray = new CustomArray("A", "B", 3); // [ "A", "B", 3 ] myArray.length; // 3 myArray.push("C"); // [ "A", "B", 3, "C" ] myArray.length; // 4 myArray.last(); // "C" My question is: Is there anything wrong with this code? I find it hard to believe that I came up with "the one solution" after so many people searched before me. A: The article discusses how to create an array "subclass". That is, we want to create an object that has Array.prototype in its prototype chain, but with an immediate prototype parent that is not Array.prototype (i.e., so that the prototype parent can provide additional methods beyond the array prototype). That article says that a fundamental difficulty in creating an array "subclass" is that arrays get their behavior from both their prototype, and simply being array instances. If arrays inherited all their behavior from Array.prototype, our work would be very quick. We would simply create an object whose prototype chain includes Array.prototype. That object would make an ideal prototype for our array-subclass instances. However, arrays have special automatic behaviors that are unique to array instances, and are not inherited from the prototype. (In particular, I mean the behaviors around the length property automatically changing when the array changes, and vice versa.) These are behaviors supplied to each array instance when it is created by the Array constructor, and there is no way to mimic them faithfully in ECMAScript 5. Therefore, the instance of your array subclass must be originally created by the Array constructor. This is non-negotiable, if we want the appropriate length behaviors. This requirement conflicts with our other requirement that the instance must have a prototype that is not Array.prototype. (We don't want to add methods to Array.prototype; we want to add methods to an object that uses Array.prototype as its own prototype .) In ECMAScript 5, any object created using the Array constructor must have the prototype parent of Array.prototype. The ECMAScript 5 spec provides no mechanism to change an object's prototype after it is created. By contrast, ECMAScript 6 does provide such a mechanism. Your approach is quite similar to the __proto__-based approach described in the article, under the section "Wrappers. Prototype chain injection.," except you use ECMAScript 6's Object.setPrototypeOf instead of __proto__. Your solution correctly satisfies all of the following requirements: Each instance actually is an array (i.e., has been constructed by the Array constructor). This ensures that the [[Class]] internal property is correct, and length behaves correctly. Each instance has an immediate prototype that is not Array.prototype, but still includes Array.prototype in its prototype chain. These requirements were previously impossible to satisfy in ES5, but ES6 makes it fairly easy. In ES5, you could have an array instance that fails to satisfy requirement #2, or a plain object that fails to satisfy requirement #1.
Mid
[ 0.5862944162436541, 28.875, 20.375 ]
Organizing Grad Students – Joining A Union As A Moral And Religious Obligation (Greg Williams) As a blog catering mostly to the religious academy, Political Theology Today usually carries descriptive, analytical pieces. Its primary purpose is to provide a space for real-time, intellectually rigorous reflection on ongoing political events that can help religious thinkers to respond to them in their own work. I am therefore very grateful that the editors have made an exception in the case of this piece by allowing me to share something that is primarily agitational. This is not, however, out of keeping with the overall spirit of PTT. I write to reflect theologically and ethically upon ongoing political events that demand a response from us as Christian intellectuals. The main difference in this instance is that the response that is called for is not analysis, but action, not a description, but a personal decision. I want to take the opportunity to argue that graduate students in the various branches of Christian theological studies ought to answer that question with an unabashed and unmitigated “YES!” The circumstances at every university are different. Different campuses are organizing with different unions (Columbia with UAW, Yale with Unite Here, Duke with SEIU), around different though often overlapping demands (e.g., pay, continuation fees, health insurance, etc.), so I can’t speak to the specifics of every case. What I can do here is to argue for a particular way of thinking about labor organizing theologically. A presupposition of this analysis is that there is more at stake in any given unionization drive than the given grievances at issue for a particular set of workers and a particular employer. There is the question of supporting the labor movement itself, something that I believe there are at least three very good reasons for doing: through the labor movement, we as Christian intellectuals can personally exercise a theology of liberation, a politics of common life, and the virtue of solidarity. Through Unions, We Exercise a Preferential Option for the Poor and the Working Class In 1891, Pope Leo XIII issued his ground-breaking encyclical, Rerum novarum, making a natural law argument in defense of labor unions, living wages, and industrial democracy. Since that time, not only the magisterial teaching of the Catholic Church, but a broad consensus among both protestant and catholic theologians has recognized that Christian communities cannot remain neutral in social and political conflicts in the places and times that they share with their neighbors, and that one of the most important such conflicts is that between capital and labor, a conflict that is endemic to the modes of political and economic order under which the majority of Christians in the world currently live. Which side Christian communities choose is, moreover, dictated not by nationality, partisanship, or other modes of earthly belonging, but by evangelical witness to Jesus Christ as savior and lord, and that means consistently opting for the exploited and the oppressed in conflicts with their exploiters and oppressors. …the poor person, when loved, “is esteemed as of great value”, and this is what makes the authentic option for the poor differ from any other ideology, from any attempt to exploit the poor for one’s own personal or political interest.Only on the basis of this real and sincere closeness can we properly accompany the poor on their path of liberation. Only this will ensure that “in every Christian community the poor feel at home. Would not this approach be the greatest and most effective presentation of the good news of the kingdom?” Without the preferential option for the poor, “the proclamation of the Gospel, which is itself the prime form of charity, risks being misunderstood or submerged by the ocean of words which daily engulfs us in today’s society of mass communications”. (199) Later theologians (including, though not limited to those working under the rubric of liberation theology) have accented this dimension of the gospel as a pastoral response to situations in the communities that they serve. Speaking to the context of American race relations, for example, James H. Cone in his A Black Theology of Liberation has written that… …Christian theology is a theology of liberation…There can be no Christian theology that is not identified unreservedly with those who are humiliated and abused. In fact, theology ceases to be a theology of the gospel when it fails to arise out of the community of the oppressed” (1). In the words of Bishop Frank Weston, “it is folly—it is madness—to suppose that you can worship Jesus in the Sacraments and Jesus on the Throne of glory, when you are sweating him in the souls and bodies of his children. It cannot be done.” The preferential option is Biblically warranted, and it reflects faith in God’s incarnation in Jesus Christ, love for the world that God has created through Jesus Christ, and eschatological hope for the coming of God’s commonwealth of peace and freedom when Christ shall come again. While the gospel cannot be reduced to emancipatory politics, the commitment to emancipation is a sine qua non of catholic, Christian faith and life. Almost every articulation of the preferential option, from Catholic social teaching to William Temple’s iconic argument for socialism in Christianity and Social Order, to contemporary liberation theologies both north and south, makes specific mention of the labor movement. This is for a very simple reason. Union organizing is quite possibly the single best concrete tool that Christians living under capitalist modes of political order have to instantiate the preferential option for the poor. Not only does almost every statistic in existence show that unionized workers make better wages (according to a 2015 AFL-CIO report, for example “union workers’ wages are 27 percent higher than their nonunion counterparts.”) but, just as importantly, unionization efforts tend to benefit not only those who join a union, but other workers as well, by driving up wages and creating better standards for working conditions. Classic examples of this include the eight-hour day, overtime, and child labor bans, that affected all workers, not just those who were part of the unions that fought for them. But this is true in the contemporary context as well. A recent article in The Atlantic, for example, argues that skyrocketing income inequality in the US economy between 1979 and 2012 can be directly attributed to a decline in the membership and power of America’s labor unions in that same period. Christian theology, as a discourse that centers human emancipation in the name of the God who became a human being, unequivocally names this as a good, and one that it is proper to the mission of Christ’s church to fight for and to protect. Through Unions, We Care for the Common Life we Share with our Neighbors If the preferential option provides a theological warrant for the economic dimensions of the labor movement, the Christian obligation to care for the life and goods we share with our neighbors provides a warrant for its political dimension. Unions not only guarantee higher wages, especially for the most exploited and oppressed members of the working class, but they are also a crucial element in maintaining democratic political life. In his 2014 volume, Resurrecting Democracy: Faith, Citizenship, and the Politics of a Common Life, Luke Bretherton makes a strong case for the capacity of unions, and, with them, other forms of association that exist in the realm between the state, the market, the family, and educational/cultural institutions to provide a key site in which individuals and groups can come together to identify and create common goods, and, in so doing, to repair breaches and deformations in those sectors (206). Broad-based community organizing, which Bretherton holds up as a key mode of praxis for this sort of reparative work, comes out of Saul Alinsky’s Industrial Areas Foundation, founded originally as a companion to the Congress of Industrial Organizations (CIO), a confederation of communist and democratic labor unions. Bretherton writes: “For Alinsky, place-based neighborhood organizing was a complement to the work-based organizing of the unions” (32). For Bretherton, community organizing (and, by extension, labor organizing) is a key method by which Christians can create the conditions and possibilities of a common life with others. This search for a common life is, in turn, a key element of faithful Christian praxis because the saeculum, the time that the church shares with its neighbors, is one in which wheat and tares are sown together in the field of the world, in which no permanent distinctions of “in” and “out” can be made, in which, as Augustine put it, even “among our most declared enemies there are now some, unknown to themselves, who are destined to become our friends” (City of God, I.35). Insofar as labor unions, then, provide a space that different people can come together and solve their shared problems democratically, they provide a space for the kind of common life the care of which Bretherton, and other Augustinians, argue is crucial to the church’s vocation to seek the peace of the earthly city. Concretely, what this means is that the day-to-day activities of shop floor politics, for which unions provide a framework of coming together to figure out what sort of family leave a workplace should be asked to provide, of forming common cause between custodial workers, home care workers, and teachers, and even of providing resources to advocate for individual workers whose rights are being violated by an employer. In short, the creation of industrial democracy, of common life politics in the workplace, are activities that ought to be of fundamental value to those who would think about labor within the discourse of Christian theology. Through Unions We Exercise the Virtue of Solidarity The preferential option for the poor and the practice of democratic politics constitute what could be called the extrinsic goods of union organizing, to which Christian theology ought to be committed. But there are also basic intrinsic goods to joining a union as well. That is to say, union organizing as a practice can provide an arena for formation in a number of key virtues. One of the most important of these is already implicit in the foregoing description. Intrinsic to union organizing as an instantiation of the preferential option and of common life politics is the virtue of solidarity. In Feminist Theory: From Margin to Centerbell hooks writes: Solidarity is not the same as support. To experience solidarity, we must have a community of interests, shared beliefs, and goals around which to unite, to build Sisterhood. Support can be occasional. It can be given and just as easily withdrawn. Solidarity requires sustained, ongoing commitment”. (67) It is the work of labor unions to create a community of interests, a shared understanding of how to achieve those interests, and to identify and pursue a set of goods in common. More fundamentally, it is to teach workers that they already have the basis of a common life, and to act on the assumption that this is so, rather than to give their support to the defense of that life when giving it is easy or when that basis is obvious, and to withdraw it when this is not so. For theologians and – if I may say so – for theological ethicists in particular, this final reason is perhaps the most important one of all to join a union. It is common, we could even say it is fashionable, for theologians to express support for “struggles for liberation” in the US and around the world. A visit to the Society of Christian Ethics will tell you that, with some notable exceptions, our field is awash with emancipatory ideals but virtually devoid of emancipatory praxis. What this means is that it has come to be expected that we will do our scholarship on the assumption that we are outside observers to the liberation struggles of our time since, for the most part, that is exactly what we are. A theologian or an ethicist who is part of a labor union cannot claim this. Insofar as all emancipatory struggles are intersectional, when my workplace unionizes, I am provided not only with the conditions and possibilities of a common life with my fellow workers, but also with the grounds for a shared struggle with others. These include residents of low income neighborhoods fighting against gentrification (which may well be carried out by the same university I am fighting for better wages and benefits), with prisoners struggling to end slave labor in the US criminal justice system (who may be turning a profit for companies that are in my university’s investment portfolio), and with countless others who are working to bring a new world to birth. When we choose to unionize, we are not only living out the ideals central to the gospel that it is our vocation as theologians to proclaim, we are also changing the very nature of what theological scholarship is – and changing it for the better. Fellow workers, the time for a decision is at hand. Greg Williams is a graduate student in theology at Duke University. He is also a community activist and ethicist.
Mid
[ 0.641791044776119, 32.25, 18 ]
<Glyph name="hyphen_hyphen.liga" lsb="-398" width="625"> <CharString> 292 61 hstem -398 340 136 340 vstem -70 292 rmoveto 12 61 rlineto -328 hlineto -12 -61 rlineto 804 hmoveto 12 61 rlineto -328 hlineto -12 -61 rlineto endchar </CharString> <Subrs/> <GlobalSubrs/> </Glyph>
Low
[ 0.48293963254593103, 23, 24.625 ]
All relevant data are within the manuscript and its Supporting Information files. Introduction {#sec001} ============ Opisthorchiasis is a neglected tropical disease caused by an infection with a small human liver fluke *Opisthorchis viverrini*. Based on epidemiological and experimental evidence, *O*. *viverrini* as well as a closely related species, *Clonorchis sinensis*, were classified as group I biological carcinogenic agents \[[@pntd.0007186.ref001]\]. Opisthorchiasis is known to cause important public health problems in mainland Southeast Asia, particularly in Thailand, Lao PDR, Cambodia and Vietnam \[[@pntd.0007186.ref002], [@pntd.0007186.ref003]\]. The current transmission landscape consists of a light and uneven distribution of *O*. *viverrini* infection in endemic areas, a feature that has consequences for diagnostic accuracy, as well as the role of *O*. *viverrini* as risk factor of cholangiocarcinoma (CCA) \[[@pntd.0007186.ref004], [@pntd.0007186.ref005]\]. For the success of any liver fluke control and elimination program, particularly for mapping and facilitating drug treatment, an improved diagnostic method that is suitable to the current endemic conditions is needed \[[@pntd.0007186.ref006], [@pntd.0007186.ref007]\]. To date, definitive diagnosis of *O*. *viverrini* infection is achieved by finding parasite eggs in feces, however, such parasitological diagnosis has many drawbacks including false positivity caused by confusion with the eggs of minute intestinal flukes, or by false negativity in light infections and in biliary duct obstruction where no eggs can be detected in feces. Repeated stool examination is required to increase the reliability of the results \[[@pntd.0007186.ref008]--[@pntd.0007186.ref010]\], but the cost and requirement of an expert microscopist make this method less practical. Previously molecular and immunological-based diagnostic methods have been developed and applied for the diagnosis of opisthorchiasis \[[@pntd.0007186.ref011]--[@pntd.0007186.ref015]\]. Although these methods have provided a better diagnostic performance compared with the parasitological method, they have several drawbacks regarding their sensitivity and specificity according to the abundance of the target genes, antigens or antibodies, and also the presence of inhibitors in clinical samples \[[@pntd.0007186.ref007], [@pntd.0007186.ref016]\]. An antibody-based approach for the detection of circulating antibody has limitations due to the cross reactive nature of the antigens used \[[@pntd.0007186.ref017]--[@pntd.0007186.ref021]\] and a positive result does not always indicate active infection by the parasite \[[@pntd.0007186.ref019], [@pntd.0007186.ref022], [@pntd.0007186.ref023]\]. Unlike antibody detection, an antigen detection assay detects a current and viable parasite infection which better reflects the infection status in opisthorchiasis patients. In this regard, monoclonal antibody-based enzyme linked immunosorbent assays (mAb-ELISA) for detecting parasite antigen in fecal samples (copro-antigen) have been introduced and verified in clinical samples \[[@pntd.0007186.ref024], [@pntd.0007186.ref025]\]. The mAb-ELISA provides several advantages over conventional methods since it has a higher specificity, good reproducibility, and can be prepared in large quantities \[[@pntd.0007186.ref026]\]. In addition to previous studies \[[@pntd.0007186.ref024], [@pntd.0007186.ref025]\], our group has reported an improved protocol for copro-antigen detection with high diagnostic performance \[[@pntd.0007186.ref027]\]. Subsequently, in 2015, we reported a novel antigen detection method using urine samples for the diagnosis of opisthorchiasis \[[@pntd.0007186.ref028]\]. Both urine and copro-antigen detection yielded a high diagnostic performance compared with standard fecal examination, but a comparison between these antigen detection methods in the same sample population has not been reported. In this study, we aim to assess the field application of this method, comparing the diagnostic performances of urine antigen detection with that of copro-antigen detection. The formalin-ethyl acetate concentration technique (FECT) was used as a reference method. This study was conducted with the residents of 3 opisthorchiasis endemic communities in Northeast Thailand that showed varying prevalence and intensity of *O*. *viverrini* infection. We also investigate the quantitative relationships between the levels of *O*. *viverrini* antigens in urine and fecal samples and the fecal egg counts determined by the formalin-ethyl acetate concentration technique. Materials and methods {#sec002} ===================== Ethical statement {#sec003} ----------------- The human subject protocol used in this study was approved by the Human Ethics Committee of Khon Kaen University, Thailand (reference number HE561478). Written informed consent was obtained from individual subjects and those with the *O*. *viverrini*-positive examination by FECT or antigen detection methods were treated with a single oral dose of praziquantel (40 mg/kg body weight). The experimental protocols for laboratory animal handling for monoclonal and polyclonal antibody production and also parasite antigen production were approved by the Institutional Animal Ethical Committee, Khon Kaen University (AEKKU-NELAC 26/2558). All animals were anesthetized with isoflurane inhalation before immunization. For euthanization, the animals were anesthetized by isoflurane and sacrificed by drawing of blood from the heart. No animals were demonstrated the severe health problems during in this study. The procedure was performed in strict accordance with the guidelines for the Care and Use of Laboratory Animals of the National Research Council of Thailand. Study area and study participants {#sec004} --------------------------------- This prospective cross-sectional study began in March 2015 and ended in July 2016. The eligibility criteria of the participants were; (i) participants who were native residents in Ban Wa sub-district in Khon Kaen Province (KK), Tao Ngoi sub-district, Sakon Nakhon province (SK) and Nong Khon Thai sub-district, Chaiyaphum province (CP), Northeast Thailand; (ii) participants who agreed to provide both feces and urine on the same day for index and standard reference tests; (iii) participants who were apparently healthy and had no clinical signs or symptoms. The sample size of this study was calculated based on the average proportion of positive *O*. *viverrini* cases (28%) with the derivative set at 1.96 and corresponding to a 95% confident level ± 5%. The calculated sample size was 930 participants with a potential loss of sample submission of 20% so that the number of participants in three localities to be recruited was 1,116. Of the 1,233 participants originally enrolling, 180 were excluded because they either failed to submit clinical specimens (n = 134) or submitted inadequate specimens (n = 56). A total of 1,043 participants fulfilled the inclusion criterion and provided complete clinical samples ([Fig 1](#pntd.0007186.g001){ref-type="fig"}). There was no statistical difference in demographics data (age, sex, etc.) between the recruited and the excluded participants. ![Flow diagram of study participants and sample collection.\ The flowchart shows the number of participants included and excluded from the project comparing diagnostic methods for human opisthorchiasis by formalin ethyl-acetate concentration technique (FECT) and antigen detections in urine and fecal sample.](pntd.0007186.g001){#pntd.0007186.g001} Clinical samples {#sec005} ---------------- Feces (10 g) and samples of the first morning, mid-stream urine (5 ml) were collected from the project participants in standard plastic containers and kept in a chilled box (4°C-8°C) during transportation to the laboratory within one day of collection. At the laboratory, each feces sample was separated into 2 parts: (i) aliquoted and processed for parasite examination by the formalin ethyl-acetate concentration technique (FECT), (ii) kept in 1.5 ml tube and stored at -20°C for copro-antigen detection. The urine samples were centrifuged at 1,500 rpm at 4°C for 15 minutes and the cleared supernatants were aliquoted into new vials and stored at -20°C until required for mAb-ELISA. Faecal examination by the quantitative formalin-ethyl acetate concentration technique (FECT) {#sec006} -------------------------------------------------------------------------------------------- The procedure for quantitative FECT was similar to the procedure detailed in the previous report \[[@pntd.0007186.ref029]\]. In brief, 2 grams of fresh stool were fixed in 10% formalin and kept at room temperature until processing. After vigorous shaking, the specimens were centrifuged at 2,500 rpm for 5 minutes and the sediment re-suspended with NSS and strained through two layers of gauze. The tube was then centrifuged at 2,500 rpm for 5 minutes and the supernatant discarded. Seven milliliters of 0.85% saline were added to the sediment and mixed, then 3 ml of ethyl acetate were added to the sample tube, mixed thoroughly, and centrifuged at 2,500 rpm for 5 minutes. After removal of the top three layers, the sediment was re-suspended with 1 ml of 10% formalin. The final suspension was examined blind by two parasitologists and the number of *O*. *viverrini* eggs were counted in 2 drops sampled from the total suspension. The number of eggs per gram of feces (EPG) was calculated to determine the intensity of *O*. *viverrini* and other parasitic infection. Antigen detection by monoclonal antibody-based enzyme linked immunosorbent assay (mAb-ELISA) {#sec007} -------------------------------------------------------------------------------------------- ### Sample preparation and pretreatment {#sec008} The frozen urine and feces samples were thawed at room temperature prior to processing. For fecal sample, phosphate buffered saline (PBS) pH 7.2 was added (1: 3 by volume), mixed thoroughly by vortexing and centrifuged at 2,000 rpm at 4°C for 30 minutes. The resulting supernatants were transferred into new vials and centrifuged at 10,000 rpm at 4°C for 5 minutes. The urine samples and also the final supernatants of fecal samples were pretreated with an equal volume of 4% trichloroacetic acid (TCA) to remove interfering components as described previously \[[@pntd.0007186.ref027], [@pntd.0007186.ref028], [@pntd.0007186.ref030]\]. The sample tubes were mixed, vortexed and then incubated for 20 minutes at room temperature. Finally, the mixture was neutralized with an equal volume of 0.244 M carbonate buffer (pH 9.6). Procedure for antigen detection by mAb-ELISA {#sec009} -------------------------------------------- The protocols for mAb-ELISA for *O*. *viverrini* antigen measurements in urine and fecal samples were similar to those previously described \[[@pntd.0007186.ref027], [@pntd.0007186.ref028]\]. Polystyrene microtiter plates (NUNC, Roskilde, Denmark) were sensitized overnight at 4°C with 100 μl/well of 5 μg/ml of mAb diluted in 50 mM bicarbonate buffer pH 9.6. After coating, the plates were washed three times with normal saline containing 0.05% Tween 20 (NSST) and uncoated sites were blocked with a solution of 5% dried skimmed milk in 50 mM bicarbonate buffer pH 9.6. After incubation for 1 hour at 37°C, TCA-pretreated urine and fecal extracted samples were added and the plates (100 μl/well) were incubated at 37°C for 1 hour. Next, the plates were washed five times with NSST and purified IgG rabbit against crude *O*. *viverrini* antigen (10 μg/ml) and 2% dried skimmed milk in PBST was added and incubated at 37°C for 1 hour. After that, 100 μl/well of biotinylated goat anti-rabbit IgG conjugate (1: 4,000) in 2% dried skimmed milk in PBST were added (Invitrogen, CA, USA) and the plates were incubated at 37°C for 1 hour. After washing three times, horseradish peroxidase-conjugated streptavidin (GE Healthcare, Buckinghamshire, UK) (dilution 1: 5,000) in PBST was added and the plates were incubated at 37°C for 1 hour. Plates were washed and the substrate (*o*-phenylenediamine hydrochloride) solution (Sigma, St. Louis, MO, USA) was added and incubated for 20 minutes in the dark at room temperature. The enzyme reaction was stopped with 100 μl/well of 2M sulfuric acid (H~2~SO~4~) and the optical densities (OD) were read spectrophotometrically at 492 nm with an ELISA reader (Tecan Sunrise Absorbance Reader, Austria). Two well-trained laboratory staff were responsible for the simultaneous sample analysis of the index tests. During the laboratory procedure, the sample IDs were blinded and the laboratory staff had no knowledge of the sample subjects. Receiver operation characteristic curve (ROC curve) {#sec010} --------------------------------------------------- Known negative and positive urine samples and also fecal samples for *O*. *viverrini* infection determined by FECT were used to construct a Receiver Operation Curve (ROC). The cutoff points for diagnosis by mAb-ELISA were calculated using MedCalc software version 9.6.3 (MedCalc Software, Ostend, Belgium). The OD values were transformed to antigen concentrations based on the standard curves for urine and feces using spiked *O*. *viverrini*-ES antigen extract with varying concentrations starting with 5,000 ng and followed by two-fold serially dilutions to produce a standard calibration curve. The separated cut off value was 19.4 ng/ml for urine and 61.2 ng/ml copro antigen detection methods. These were used to determine negative and positive tests. The sensitivity, specificity, and positive and negative predictive values with 95% confidence intervals were calculated and compared between each sample using standard parasitological methods as a reference. In addition, a composite reference standard method which combined both parasitological, urine or fecal antigen detection methods as a reference method was used to assess the diagnostic performance of each method. Cross reactivity {#sec011} ---------------- In order to assess the specificity of the mAb-ELISA for *O*. *viverrini* antigen detection in both urinary and copro-antigen detection method, cross reactivity with positive samples of other parasitic infections determined by FECT was assessed. For urinary antigen detection, the other parasite infections, i.e. *Strongyloides stercoralis* (n = 40), minute intestinal fluke (n = 17), hookworms (n = 10), *Taenia* sp. (n = 5), *Echinostoma* sp. (n = 8) and *Trichuris trichiura* (n = 5), were tested for cross reactivity. Cross reactivity of copro-antigen detection was performed with *Strongyloides stercoralis* (n = 40), minute intestinal fluke (n = 17), hookworms (n = 10) and *Taenia* sp. (n = 5). Statistical analysis {#sec012} -------------------- Data recorded in the case report forms were entered into a computer using the Microsoft Excel program and analyzed using SPSS v.22 (International Business Machines, USA). Helminth species-specific fecal egg counts were transformed into number of eggs per gram of feces (EPG). Kendall's tau-b correlation test was used to determine the correlation between urinary-antigen and copro-antigen concentration and also EPG. Performance of the test in terms of sensitivity, specificity, and predictive values was calculated as described elsewhere \[[@pntd.0007186.ref031]\]. The OD values were transformed to a ratio between the OD of the samples and the OD of reference urine or fecal extracted samples. The reliability of urine and copro-antigen detection methods by mAb-ELISA for the diagnosis of opisthorchiasis was analyzed using odds ratios (OR) with 95% confidence intervals (CI) using logistic regression. A statistically significant level was set as p\<0.05. We used the following guidelines to interpret the kappa values; ≤ 0 indicating no agreement, 0--0.2, poor agreement; 0.21--0.4; fair agreement; 0.41--06, moderate agreement; 0.61--0.8, good agreement; and 0.81--1.0, excellent agreement \[[@pntd.0007186.ref032]\]. Results {#sec013} ======= Prevalence and intensity of *O*. *viverrini* infection {#sec014} ------------------------------------------------------ As shown in [Table 1](#pntd.0007186.t001){ref-type="table"}, based on FECT, the prevalence of *O*. *viverrini* infection in the three localities was 29--77% with an overall prevalence of 41%. The highest prevalence was in Nong Khon Thai sub district, Chiyaphum (CP), followed by Tao Ngoi subdistrict, Sakon Nakhon (SK) and the lowest was in Ban Wa sub-district, Khon Kaen (KK). The intensity of infection measured by fecal egg counts (EPG) were similar in the three localities which had mainly either no or light infection (EPG\<50) with approximately 13% having an EPG\>100. The average intensity of infection by locality was 25--127 EPG and the overall intensity was 54 EPG. Other parasitic infections occurred in \<9% of the samples and the prevalence by order were *S*. *stercoralis*, MIFs, hookworm and *Taenia* spp. By urine antigen detection, the prevalence of *O*. *viverrini* was 46--77% by locality and the overall prevalence was 54%. The antigen concentration was 27--40 ng/ml of urine with an average of 31 ng/ml in all three localities. In the case of copro-antigen detection, the prevalence of *O*. *viverrini* was 48--78% with an overall value of 56%. The antigen concentration in feces was 75--90 ng/ml of feces and an average concentration of 81 ng/ml. 10.1371/journal.pntd.0007186.t001 ###### Characteristics of study participants and the prevalence and intensity of *O*. *viverrini* determined by quantitative FECT, urine and copro-antigen detection in the study localities in northeast, Thailand. ![](pntd.0007186.t001){#pntd.0007186.t001g} ------------------------------------------------------------------------------------------------------------------------ Variable KK SK CP All sites ---------------------------------------------------------------- ------------ ------------- -------------- ------------- Participants 558 281 204 1,043 Number of males (%) 287 (51) 97 (35) 107 (52) 491 (47) Number of females (%) 271 (49) 184 (65) 97 (48) 552 (53) Age (Mean ± SD) 53 ± 12.7 48.5 ± 16.3 55.0 ± 13.6 52.2 ± 14.1 Reference standard (FECT) Prevalence no+ve (%) 160 (29) 105 (37) 158 (77) 423 (41) Infection intensity (EPG) 0 367 (66) 154 (55) 27 (14) 548 (53) 1--50 101 (18) 48 (17) 62 (30) 211 (20) 51--100 22 (4) 11 (4) 39 (19) 72 (7) \>100 37 (7) 46 (16) 57 (28) 140 (13) Mean EPG\ 25.3 ± 4.8 59.7 ± 10.1 127.1 ± 15.9 54.5 ± 5.0 (Geometric Mean ± SE) [\*](#t001fn004){ref-type="table-fn"}Other parasites infection 31 (6) 22 (8) 19 (9) 72 (7) Urinary antigen test Prevalence no+ve (%) 257 (46) 152 (54) 157 (77) 566 (54) Antigen concentration\ 27.2 ± 1.2 32.9 ± 1.7 40.9 ± 4.6 31.4 ± 1.2 (Geometric Mean ± SE) Copro-antigen test Prevalence no+ve (%) 266 (48) 156 (56) 160 (78) 582 (56) Antigen concentration\ 75.7 ± 2.8 85.1 ± 5.2 90.2 ± 4.2 81.1 ± 2.2 (Geometric Mean ± SE) ------------------------------------------------------------------------------------------------------------------------ KK: Ban Wa sub-district, Khon Kaen Province SK: Tao Ngoi sub-district, Sakon Nakhon Province CP: Nong Khon Thai sub-district, Chaiyaphum Province \*Other parasites included *Strongyloides stercoralis*, minute intestinal flukes (MIFs), hookworms and *Taenia* spp. Age-prevalence and intensity profiles {#sec015} ------------------------------------- As shown in [Fig 2](#pntd.0007186.g002){ref-type="fig"}, the *O*. *viverrini* infection determined by FECT showed the prevalence profile that peaked at 30--40 years in CP and SK, but in KK the prevalence increased slowly and peaked at an age \>60 years. The intensity profiles increased steeply from 20--30 years and stabilized thereafter in CP and SK. In KK the intensity increased slowly with age and reached a plateau at age 50 years onwards. ![Age prevalence and intensity profiles of *O*. *viverrini* infection determined by different diagnostic methods in 3 different localities.\ (A) Determination of infection by FECT. (B) Urine antigen detection and (C) copro antigen detection measured by mAb-ELISA. The prevalence profiles of opisthorchiasis (left panel) and intensity of infection (right panel) are illustrated according to the age group and locality.](pntd.0007186.g002){#pntd.0007186.g002} The age-prevalence profiles of *O*. *viverrini* by urine and copro-antigen detection ([Fig 2B and 2C](#pntd.0007186.g002){ref-type="fig"}) shared a similar pattern in CP and SK where they peaked at age \<30 years and plateaued thereafter. In the case of KK, the prevalence increased steadily with age and became a maximum at age \<50 years. The age-intensity profiles measured by urine and copro-antigen were similar to those by FECT, being highest at age \<30 years and slightly less at age \<50 years in CP and SK. The intensity profile for KK increased slowly with age and was highest at age \<60 years. Quantitative relationship between urinary and copro-antigen concentrations of spiked samples {#sec016} -------------------------------------------------------------------------------------------- In order to construct the standard curves for the calculation of antigen concentrations in urine and fecal samples, measurement of antigens in spiked excretory-secretory antigen of *O*. *viverrini* in urine and feces was performed using mAb-ELISA. The relationships between the concentrations of in urine and fecal samples and OD values obtained from mAb-ELISA were assessed by linear regression models. The best-fit linear regression equations for urinary and copro-antigen detection was y = 0.856x-0.831 and y = 0.653x-0.725, respectively. These equations were used to calculate the concentration of antigen in the clinical samples from the project participants ([S1 Fig](#pntd.0007186.s001){ref-type="supplementary-material"}). Levels of *O*. *viverrini* antigen in urine and feces in relation to intensity of infection {#sec017} ------------------------------------------------------------------------------------------- In order to determine the effect of EPG on the level of antigen detected in urine and feces, the participants from all localities were combined and then separated into 4 different intensity groups based on EPG determined by FECT ([Table 2](#pntd.0007186.t002){ref-type="table"}). Based on the urine and copro-antigen assays, the positive infection rates were 31% of egg-negative subjects by FECT. In egg-positive groups, the positive infection rates were 83--97% for urine and 83--98% for copro-antigen detections. Overall, urine and copro-antigen detections yielded similar positive rates and both assays yielded 14--15% higher positive rates than FECT. 10.1371/journal.pntd.0007186.t002 ###### Positive rates of *O*. *viverrini* determined by urinary and copro-antigen detection in different groups of participants stratified by intensity of infection (EPG). ![](pntd.0007186.t002){#pntd.0007186.t002g} ---------------------------------------------------------------------------------------------- Intensity of O. viverrini infection\ N *O*. *viverri* positive by (EPG) -------------------------------------- ----------- ---------------------------- -------------- 0 620 191 (31) 195 (31) 1--50 211 176 (83) 189 (90) 51--100 72 63 (88) 60 (83) \>100 140 136 (97) 138 (98) **Total** **1,043** **566 (55)** **582 (56)** ---------------------------------------------------------------------------------------------- The concentrations of urinary and copro-antigen showed a significant positive correlation with increasing intensity of *O*. *viverrini* (EPG) (Kendall's tau-b, p \< 0.001; [Fig 3A and 3B](#pntd.0007186.g003){ref-type="fig"}). ![Relation between *O*. *viverrini* antigen levels and intensity of *O*. *viverrini* (EPG).\ (A) The profiles of urine antigen levels (ng/ml) in different intensity groups of *O*. *viverrini* (EPG) (Kendall's tau-b correlation; P \<0.001); (B) The profiles of copro-antigen levels (ng/ml) in different intensity groups of *O*. *viverrini* (EPG) (Kendall's tau-b correlation; P \<0.001).](pntd.0007186.g003){#pntd.0007186.g003} The relationship between urine and copro-antigen concentrations and their diagnostic performances {#sec018} ------------------------------------------------------------------------------------------------- Based on 1,043 participants who provided both fecal and urine samples for analysis of *O*. *viverrini* antigen concentrations, there was a significant positive correlation between urine and copro-antigen concentrations ([Fig 4](#pntd.0007186.g004){ref-type="fig"}, R^2^ = 0.323, p \< 0.001). The best fit linear regression equation was y = 0.635+1.283 where y = copro-antigen concentration (log-transformed value; ng/mL and x = urine antigen concentration (log-transformed value; ng/mL). ![Relationship between *O*. *viverrini* antigen concentrations in urine and feces determined by mAb-ELISA.\ (Kendall's tau-b correlation; p \<0.001). Data shown are observed values (rectangles) and the linear regression line between urine and copro-antigen concentrations. The vertical (blue) and horizontal (red) lines are cut off values for urine and copro-antigen, respectively.](pntd.0007186.g004){#pntd.0007186.g004} [Table 3](#pntd.0007186.t003){ref-type="table"} shows the diagnostic performance of urine and copro-antigen detections determined in field-collected samples by using FECT as a gold standard. By locality, urine antigen detection exhibited a sensitivity between 86--90% and a specificity between 56--71%. The overall sensitivity in 3 localities was 89.5% (95% CI = 86.1--92.3) and specificity 71.2% (95% CI = 67.6--74.7). The diagnostic performance of copro-antigen detection was comparable to that for urine assay with the overall 90.7% sensitivity and 70% specificity. 10.1371/journal.pntd.0007186.t003 ###### Diagnostic performance of antigen detection by urine and copro-antigen detection in comparison with the gold standard FECT (n = 1043). ![](pntd.0007186.t003){#pntd.0007186.t003g} -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Tested method Locality Sensitivity (95% CI) Specificity (95% CI) [°](#t003fn001){ref-type="table-fn"}PPV [°](#t003fn001){ref-type="table-fn"}NPV ------------------------- -------------- ---------------------- ---------------------- ----------------------------------------- ----------------------------------------- Urine antigen detection KK 89.4\ 71.4\ 55.6 94.4 (83.5--93.7) (66.6--75.8) SK 90.5\ 67.6\ 62.5 92.2 (83.2--95.3) (60.2--74.5) CP 86.1\ 56.5\ 82.7 54.2 (79.7--91.1) (41.1--71.1) Overall 89.5\ 71.2\ 66.2 89.7 (86.1--92.3) (67.6--74.7) Copro-antigen detection KK 94.4\ 71.6\ 57.2 96.9 (89.6--97.4) (66.9--76.0) SK 92.4\ 66.5\ 62.2 93.6 (85.5--96.7) (59.0--73.4) CP 88.0\ 54.3\ 86.9 56.8 (81.9--92.6) (39.0--69.1) Overall 90.7\ 70.0\ 66.7 92.2 (87.5--93.4) (66.3--73.5) -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- °Positive Predictive Value (PPV), Negative Predictive Value (NPV) KK: Ban Wa sub-district, Khon Kaen Province SK: Tao Ngoi sub-district, Sakon Nakhon Province CP: Nong Khon Thai sub-district, Chaiyaphum Province When using combined methods as a composite standard, the performance of FECT in terms of sensitivities was 54%-85%, with the overall sensitivity of 63.6%. The specificities were 60%-98% between localities, with the overall specificity of 94.8%. Urine antigen detection showed the overall sensitivity 86.2% and was 83%-86% between localities. In the case of copro-antigen detection, the overall sensitivity was 85.3% and 85%-89% between localities ([Table 4](#pntd.0007186.t004){ref-type="table"}). 10.1371/journal.pntd.0007186.t004 ###### Diagnostic performance of antigen detection methods for urine and copro-antigen compared with the composite gold standard which combined FECT and antigen detection method. ![](pntd.0007186.t004){#pntd.0007186.t004g} ---------------------------------------------------------------------------------------------------------------------------------------------------------- Tested method Locality Sensitivity\ Specificity\ [°](#t004fn001){ref-type="table-fn"}PPV [°](#t004fn001){ref-type="table-fn"}NPV (95% CI) (95% CI) ------------------------- -------------- -------------- -------------- ----------------------------------------- ----------------------------------------- FECT KK 54.1\ 98.9\ 98.1 66.6 (48.2--60.0) (96.8--99.8) SK 58.4\ 96.3\ 96.2 59.1 (50.7--65.8) (90.8--99.0) CP 85.2\ 60.0\ 91.1 45.7 (78.9--90.2) (42.1--76.1) Overall 63.6\ 94.8\ 95.0 62.9 (59.7--67.4) (92.3--96.8) Urine antigen detection KK 86.8\ 93.0\ 92.2 88.0 (82.2--90.6) (89.4--95.7) SK 84.8\ 88.9\ 91.4 80.6 (78.3--89.9) (81.7--93.9) CP 83.1\ 81.0\ 97.4 35.4 (76.8--88.2) (58.1--94.6) Overall 86.2\ 91.3\ 93.5 80.8 (83.2--88.8) (88.3--93.8) Copro-antigen detection KK 89.4\ 93.3\ 92.8 90.1 (85.2--92.8) (89.7--95.9) SK 87.0\ 87.4\ 90.4 83.2 (80.9--91.8) (80.1--92.8) CP 85.3\ 81.0\ 97.5 38.6 (79.3--90.0) (88.1--94.6) Overall 88.1\ 90.9\ 93.4 83.4 (85.3--90.6) (87.8--93.5) ---------------------------------------------------------------------------------------------------------------------------------------------------------- °Positive Predictive Value (PPV), Negative Predictive Value (NPV) KK: Ban Wa sub-district, Khon Kaen Province SK: Tao Ngoi sub-district, Sakon Nakhon Province CP: Nong Khon Thai sub-district, Chaiyaphum Province For ROC curve analysis, with reference to FECT, the AUC for urine antigen detection was 0.791 while it was 0.831 for copro-antigen detection ([Fig 5A](#pntd.0007186.g005){ref-type="fig"}). Based on the composite gold standard, the AUCs for the diagnostic assay were 0.824, 0.934 and 0.957 for FECT, urine and copro-antigen, respectively ([Fig 5B](#pntd.0007186.g005){ref-type="fig"}). ![Receiver operating characteristic (ROC) curves comparing the antigen detection methods to the gold standard FECT (n = 1,043).\ (A) The ROC curve demonstrates the diagnostic performance of urine and copro-antigen detections with reference to the gold standard FECT. The AUCs of the urine and copro-antigen detection methods were 0.791 and 0.831, respectively. (B) The ROC curve shows the diagnostic performance of urine, copro-antigen detection and FECT, compared to the composite gold standard FECT which combined FECT and an antigen detection method. The AUCs for FECT, urine and copro-antigen detection and were of 0.824, 0.934 and 0.957, respectively.](pntd.0007186.g005){#pntd.0007186.g005} The test for agreement between FECT versus urine antigen detection and FECT versus copro-antigen detection revealed moderate agreement, Kappa values (κ) were 0.547 and 0.570, respectively. The kappa tests showed good agreement (0.770) between urine and copro-antigen detection ([Table 5](#pntd.0007186.t005){ref-type="table"}). 10.1371/journal.pntd.0007186.t005 ###### Agreement (Kappa value) of diagnosis between the FECT and antigen detection methods. ![](pntd.0007186.t005){#pntd.0007186.t005g} Variable Kappa 95% Confidence Interval P-value ---------------------------------- ------- ------------------------- --------- --------- FECT vs urine antigen detection 0.547 0.496 0.598 \<0.001 FECT vs copro-antigen detection 0.570 0.522 0.616 \<0.001 Urine vs copro-antigen detection 0.770 0.730 0.808 \<0.001 Additionally, a logistic regression analysis was performed to predict the risk of human opisthorchiasis (odds ratios) based on increasing arbitrary unit of the antigen in urine and fecal samples by mAb-ELISA. The arbitrary unit was defined as the antigen concentration of 28.050 ng/ml for urine antigen and 75.729 ng/ml that predict the odd of one in having opisthorchiasis. The analysis showed that the odds ratio values increased according to the increasing concentration of both urine and copro-antigens ([Table 6](#pntd.0007186.t006){ref-type="table"}). 10.1371/journal.pntd.0007186.t006 ###### Prediction of human opisthorchiasis by increasing urine and copro-antigen concentration. ![](pntd.0007186.t006){#pntd.0007186.t006g} --------------------------------------- ---------------- ----------------------------- -------- **Unit increasing in urine antigen** **Odds ratio** **95% Confidence Interval** **Lower** **Upper** 1 1.042 0.199 5.510 10 2.170 1.377 3.421 20 2.393 1.029 5.568 30 9.454 4.245 21.056 **Unit increasing in copro- antigen** **Odds ratio** **95% Confidence Interval** **Lower** **Upper** 1 1.068 0.175 6.524 10 4.565 2.559 8.144 20 5.162 2.663 10.007 30 14.003 5.901 32.227 --------------------------------------- ---------------- ----------------------------- -------- Cross reactivity of urine and copro-antigen detection methods {#sec019} ------------------------------------------------------------- To determine the specificity of mAb-ELISA, we applied this method to a separate set of urine and fecal extracts derived from participants with known parasite infection other than *O*. *viverrini* by the gold standard FECT. For the urine antigen detection method, a positive result was found in 10% of subjects with *Strongyloides stercoralis* infection, 20% (2/10) in subjects with hookworm infection and 20% (1/5) in subjects with *Trichuris trichiura* infection. ([Fig 6A](#pntd.0007186.g006){ref-type="fig"}). Copro-antigen detection showed a positive result in 7.5% (3/40) in subjects with *Strongyloides stercoralis* infection, 11.7% (2/17) in minute intestinal flukes infection and 10% (1/10) in hookworm infection ([Fig 6B](#pntd.0007186.g006){ref-type="fig"}). ![Tests for cross reactivity with other helminth infections by antigen assay using mAb-ELISA for opisthorchiasis (A) urine antigen detection and (B) copro-antigen detection method.\ Data shown are observed values of antigen/mL and the dotted-lined represents the cutoff values. Ov, *O*. *viverrini*; Ss, *S*. *stercoralis*; MIF, minute intestinal flukes; Hw, hookworm, T, *Taenia* sp.; Ech, *Echinostoma* sp. and Tt; *Tricuris trichiura*.](pntd.0007186.g006){#pntd.0007186.g006} Discussion {#sec020} ========== In order to overcome the drawbacks of conventional fecal examination, the urine assay for *O*. *viverrini* antigen detection offers not only higher diagnostic accuracy, but also the practical advantage of utilizing urine instead of feces for the diagnosis of opisthorchiasis \[[@pntd.0007186.ref028]\]. The urine antigen detection method is based on the hypothesis that excretory-secretory antigens released by living parasites can enter the blood circulation and be excreted via the kidneys into the urine. Herein, we applied this method in a community-based epidemiological study of opisthorchiasis, together with copro-antigen detection, using a mAb-ELISA protocol. The results indicate that urine as well as copro-antigen detection have comparable diagnostic accuracy and both methods have a superior diagnostic performance to that of fecal examination by FECT. The estimated concentration of antigen in the urine as well as that in feces significantly positively correlated with the intensity of infection measured by fecal egg count (egg/gram feces). Moreover, the antigen concentration in urine positively correlated with the levels antigen in the feces and the agreement test between methods showed good concordance (kappa value; 0.770). The average antigen concentrations in both urine and feces paralleled EPG. The antigen concentration in urine was two- to three- folds less than those in feces. On average of the antigen concentration in feces was 2.6 times that of urine. Because of the qualitative and quantitative concordance between urine and copro-antigen detection, as well as that from FECT, the ease of sample collection and specimen handling strongly indicate that urine detection is desirable for the diagnosis and screening of opisthorchiasis. There was a higher positive detection obtained by urine (46--77%) and copro-antigen detection (48--78%) compared to FECT (29--77%). The discrepancies of antigen detection versus fecal examination by FECT were seen at low to, moderate intensities of opisthorchiasis, i.e. in SK a geometric mean of 25.3 EPG, in KK a geometric mean of 59.7 EPG. By contrast, the positive rates detected by both urine (77%) and copro-antigen detections (78%) were similar to FECT (77%) in the locality with high transmission intensity (geometric mean 127.1 EPG) in CP. These findings further support the usefulness of the urine antigen detection assay for screening for opisthorchiasis with low intensities of infection. This may help in avoiding the under diagnosis of the majority of individuals who have a low worm burden. However, whether our antigen detection assays can demonstrate a single worm infection, as reported in schistosomiasis \[[@pntd.0007186.ref033]\], is not known, but this is a critical threshold to assess the impact of parasite control and eventually elimination, and hence requires further investigation. Moreover, the occurrence of varying transmission levels observed in the three study communities reflects once again the changing landscape of infection associated with multiple factors such as mass drug administration (MDA) and public health educational efforts \[[@pntd.0007186.ref002], [@pntd.0007186.ref034]\]. Therefore, a detection method which is analytically sensitive yet also rapid and easy to apply is required to monitor the current endemic situation of opisthorchiasis \[[@pntd.0007186.ref007]\]. For cases of *O*. *viverrini* egg negativity as determined by FECT (n = 620), 191 (30.8%) and 195 (31.4%) positive cases were discovered by urine and copro-antigen detection, respectively. The finding of antigen positivity in this scenario indicates the vital role of worms rather than eggs as a source of antigen in the urine and feces in opisthorchiasis. A similar situation was previously observed in an autopsy study which revealed that fecal eggs were not discovered in the majority of infected individuals with less than 20 worms \[[@pntd.0007186.ref035]\]. Further study is required to monitor the changes in antigen profile after treatment to justify the need for chemotherapy of the antigen positive but egg-negative individuals. As opposed to egg negative cases, in cases of positive for *O*. *viverrini* eggs (1--100 EPG), not all individuals were found positive by the antigen detection methods. Within the egg positive group (n = 423), 11.3% were negative in urine and slightly less (8.5%) were copro-antigen negative. The explanation for the under diagnosis by antigen detections is currently not known but may depend on several possibilities. First, as the antigens appearing in the urine and feces are excretory-secretory products originating from living adult worms and may not directly relate to fecal egg count. Second, the presence of urine antigen may rely on the intermittent production of secretory products from the adult worms and also the passage through kidney glomerular filtration as proteinuria \[[@pntd.0007186.ref036]\] and motility of gastrointestinal system in the case of copro-antigen. Thus, liver fluke-induced pathology in the biliary system and abnormal glomerular filtration in the kidneys may contribute in fluctuations of urine antigen. Third, the physical properties of urine and feces such as water content and fecal mass may influence the antigen concentration and eventually detectable antigen levels. Dilution effects of urine were addressed using the concentration procedure to find the accurate antigen detection levels in urine in schistosomiasis \[[@pntd.0007186.ref033]\]. Lastly, more antigen positive cases can be found by multiple or repeated examination of the urine and feces over consecutive days, which yield a higher positive diagnostic rate as shown in the case of schistosomiasis \[[@pntd.0007186.ref037], [@pntd.0007186.ref038]\]. Kidney involvement in opisthorchiasis, in terms of proteinuria and deterioration of renal function associated with immune complex, has been shown previously \[[@pntd.0007186.ref039], [@pntd.0007186.ref040]\]. Since the antigen detection approach in opisthorchiasis is at a rudimentary phase, further work to prove and disprove the above hypotheses is required to augment our understanding of the presence as well as the pathway of urinary antigens, and hence the improvement of diagnostic accuracy. The urine antigen detections had a 0.79 AUC and 89% sensitivity while the copro-antigen detection had a comparable accuracy (0.83 AUC and 90% sensitivity) with respect to the conventional FECT gold standard. A similar trend but with slightly lower diagnostic values was observed when the composite diagnosis was used as a reference standard in which FECT has the lowest sensitivity (63%) but high specificity. The observed diagnostic values in the current study were comparable to our recent study for urine \[[@pntd.0007186.ref028]\] and copro-antigen \[[@pntd.0007186.ref027]\] but higher than that in previous reports for copro-antigen detections \[[@pntd.0007186.ref024], [@pntd.0007186.ref025]\]. This observation is probably due to different mAb-ELISA protocols, particularly with monoclonal antibody being used. Additionally, the diagnostic accuracy of opisthorchiasis may approach a new gold standard when antigen detection is combined with fecal examination, agreeing with an approach used in cases of clonorchiasis \[[@pntd.0007186.ref041]\]. Although *O*. *viverrini*-specific mAb was used for antigen detection in ELISA, cross relativities with other parasite antigens in urine were observed in individuals infected with *S*. *stercoralis*, hookworms and *T*. *trichiura*. In the case of copro-antigen detection, cross reactions occurred with *S*. *stercoralis*, MIF and hookworms. These findings are similar to our previous reports \[[@pntd.0007186.ref027], [@pntd.0007186.ref028]\], and may be explained by the fact that these patients probably harbored a low intensity of *O*. *viverrini* infection which could not be detected by FECT. Since multiple parasite infections are common in the study areas in Thailand, further cross reaction studies on the participants from non-*O*. *viverrini* endemic areas are needed. In addition to cross reactivity with other parasitic infections, there are drawbacks for both the urine and copro-antigen detection methods that required attention. The main drawback is that the whole process of mAb-ELISA takes approximately 5--6 hours to complete and these assays needed experienced operators and special equipment. Furthermore, samples should be kept cold (4°C or on ice) during transportation and require centrifugation and pre-treatment with TCA prior to the analyses. Therefore, a "rapid point of care and ease-of-use" platform such as a lateral flow immunochromatgraphic strip or dipstick, which can be operated at point of care setting, should be developed. Conclusion {#sec021} ---------- In this study, we show that *O*. *viverrini* antigen detection in urine and fecal samples has a higher diagnostic accuracy than conventional fecal examination method, FECT. Both antigen detection methods yielded comparable diagnostic accuracy and were significantly positively correlated. With high diagnostic accuracy and the ease of sample collection, the urine antigen detection method is a powerful approach for the diagnosis and population screening of opisthorchiasis in a clinical and also field setting. Pending additional study, the urine antigen detection method may serve not only the purpose diagnosis and screening, but also as a tool to follow-up opisthorchiasis patients to determine effective drug treatment in the control and elimination program. Supporting information {#sec022} ====================== ###### Linear relationship between urine (S1 A) and copro (S1 B) spiked excretory-secretory antigen of *O*. *viverrini* and OD values. The range of antigen used was 0.1--5000 ng/ml and OD values were obtained from the mAb-ELISA. Data shown are observed OD values. The solid lines represent the best-fit linear regression equations (P \<0.001). (TIF) ###### Click here for additional data file. ###### (DOCX) ###### Click here for additional data file. We would like to acknowledge Prof. Trevor N. Petney for editing the manuscript via Publication Clinic KKU, Thailand. [^1]: The authors have declared that no competing interests exist.
High
[ 0.6650366748166251, 34, 17.125 ]
Attacks on the SHA-1 hashing algorithm just got a lot more dangerous last week with the discovery of a cheap "chosen-prefix collision attack," a more practical version of the SHA-1 collision attack first carried out by Google two years ago. What this means is that SHA-1 collision attacks can now be carried out with custom inputs, and they're not just accidental mishaps anymore, allowing attackers to target certain files to duplicate and forge. SHA-1 collision attacks The SHA-1 hashing function was theoretically broken in 2005; however, the first successful collision attack in the real world was carried out in 2017. Two years ago, academics from Google and CWI produced two files that had the same SHA-1 hash, in the world's first ever SHA-1 collision attack -- known as "SHAttered." Cryptographers predicted SHA-1 would be broken in a real-world scenario, but the SHAttered research came three years earlier than they expected, and also cost only $110,000 to execute using cloud-rented computing power, far less than what people thought it might cost. Image: Google SHA-1 chosen-prefix attacks But last week, a team of academics from France and Singapore has taken the SHAttered research one step further by demonstrating a SHA-1 "chosen-prefix" collision attack, in a new research paper titled "From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1." "Finding a practical collision attack breaks the hash function badly of course, but the actual damage that can be done with such a collision is somewhat limited as the attacker will have little to no control on the actual data that collides," Thomas Peyrin, one of the researchers told ZDNet via email over the weekend. "A much more interesting attack is to find a so-called 'chosen-prefix collision,' where the attacker can freely choose the prefix for the two colliding messages. Such collisions change everything in terms of threat because you can now consider having collisions with meaningful data inside (like names or identities in a digital certificate, etc)." First SHA1 was shattered. https://t.co/CnnYJiLtxP Now it's reduced to shambles. It's time to stop using SHA1. (HMAC-SHA1 is still okay.) — Scott Arciszewski (@CiPHPerCoder) May 10, 2019 What this means is that SHA-1 collision attacks aren't a game of roulette anymore, and now, threat actors can forge any SHA-1-signed documents they want, ranging from business documents to TLS certificates. SHA-1 chosen-prefix collision attacks are now also cheap But the work of Peyrin and his colleague, Gaetan Leurent, have done goes far beyond just proving SHA-1 chosen-prefix collision attacks are theoretically possible. They also showed that such attacks are now cheap and in the budget of cybercrime and nation-state attackers. "These chosen-prefix collisions are believed to be much harder to find than classical collisions. For SHA-1, the best previous search method required 2^77 SHA-1 evaluations, which remained out of reach in practice," Peyrin told ZDNet. "The novelty in our article is that we explain how to drastically reduce the cost of finding chosen-prefix collisions for SHA-1, down to almost the same cost as finding a classical collision," he said. "We are currently working on further improvements (unpublished yet), and we evaluate now that one can find a chosen-prefix collision for SHA-1 with a budget of less than $100,000, which is really practical." This is about the same cost as the original SHAttered research, yet, this version of the attack is what attackers would likely use if they'd ever want to attack SHA-1-protected data. "We have tested all subcomponents of the attack, but we have not tried to compute a chosen-prefix collision example," Peyrin said. "Our initial estimations were $1 million to compute the chosen-prefix collision, which is an amount of money we simply don't have. Thanks to our latest improvements, the cost went down below $100,000 and we are currently working on computing the first chosen-prefix collision for SHA-1. "Hopefully, we will be able to announce new results soon," the researcher said. Moving away from SHA-1 Browser vendors have long ago started deprecating support for SHA-1-signed TLS traffic inside their products; however, other applications still rely on it. "There are still many users with older browsers and many protocols and software that allow SHA-1 signatures. Concretely, it is still possible to buy an SHA-1 certificate from a trusted CA, and many email clients accept an SHA-1 certificate when opening a TLS connection," Peyrin told us. "SHA-1 is also widely supported to authenticate TLS and IKE handshake messages. Now, what protocol can be attacked and to what extent is hard to tell at the moment, because it needs careful scrutiny of the inner working of the protocol and how the digital signatures/certificates are used, etc.. "However, what we can say is that our attack put at possible risk products using digital signatures, or certificates based on SHA-1," Peyrin said. "The take-home message should really be that using SHA-1 for digital signatures or certificates is very dangerous, and should not be allowed. People doing so are strongly advised to change to SHA-2 or SHA-3 now." What to use? "The attacks against SHA-1 are only going to get better," Scott Arciszewski, Chief Development Officer at Paragon Initiative Enterprises, and a leading cryptographer, told ZDNet in a separate email. "Everyone should switch to (in order of preference): BLAKE2b / BLAKE2s SHA-512/256 SHA3-256 SHA-384 Any other SHA2-family hash function as a last resort "...unless they're storing passwords! In which case, they should switch to (in order of preference): Argon2id with memory >= 32MiB, >= 2 rounds, and >= 2 parallelism scrypt / yescrypt with memory >= 32 MiB, >= 4 rounds, and >= 1 parellelism bcrypt (for PHP devs, password_hash() and password_verify() does the trick) PBKDF2-SHA512 with 85,000 iterations as a last resort "But SHA1 should no longer be used anymore. No excuses," Arciszewski said. Related cybersecurity coverage:
Mid
[ 0.6164021164021161, 29.125, 18.125 ]
Brenda E. Jaffe, age 74 of Sylvania, OH died May 18, 2017. Born in Louisville, KY she was the daughter of Omer and Esther Horn Hardison, later settling in Toledo, where she met and married Jerrold “Jerry” Jaffe and celebrated 49 years of marriage. Brenda was employed as bookkeeper for 25 years with the family business, Tyler Meats. Preceding her in death were her parents; daughter, Anna Mellick; also brothers, Edward and Charles. Surviving are her husband, Jerrold; children, John Thomas Mellick, Patricia J. Mellick, Mary Elizabeth Mellick, Ronald Mellick, Jerry Clark Jaffe (Yukiko), William David Jaffe (Mary) and Joseph Michael Jaffe (June); brother, Robert Hardison (Blanche;) also 11 grandchildren and 2 great-grandchildren. Friends may call Sunday, May 21, 2017 from 4 to 8 p.m. in the Robert H. Wick / Wisniewski Funeral Home, 2426 N. Reynolds Rd. where services will be held Monday, May 22, 2017 at 11 a.m. Entombment Chapel of Peace at Toledo Memorial Park. Memorial tributes suggested to Hospice of Northwest Ohio or charity of donor’s choice. www.wickfh.com
Mid
[ 0.6039119804400971, 30.875, 20.25 ]
Writing The Blue Wave: Postcards to Voters This election cycle, voters are opening their mailboxes to a very old very new thing in electoral campaigning: handwritten postcards. Cards and letters from volunteers have long been a tool in the arsenal of political campaigns, but they’re making a resurgence in a big way thanks to the resistance movement and thousands of newly-engaged activists trying to build a blue wave to sweep Democrats into office. The most well-known effort, Postcards to Voters, traces its origins back to the Georgia special election to replace Trump’s original HHS secretary Tom Price. Postcards to Voter founder Tony McMullin, better known to volunteers as Tony the Democrat, was volunteering for the Jon Ossoff campaign in early 2017, when he saw a demand from Democrats out of of state who wanted to help. He began sending out five addresses to each volunteer willing to send a handwritten card, and reports (in a fun Reddit AMA) that it instantly exploded from just 5 people to 1,200 in only four weeks. When all was said and done, 51,000 cards were written. Ossoff lost, but Postcards to Voters was here to stay. Tony thinks the tactic can be especially beneficial in low-turnout special elections when voters may not be otherwise aware an election is upcoming, but the program has participated in some statewide elections as well. For the Alabama special election, the Postcards to Voters volunteer team was able to send an astonishing 348,000 postcards, reaching every identified Democrat in the state. In an age of digital overload, old-fashioned mail makes a lot of sense. Younger people, whose votes are critical to achieving a blue wave, are 30% more likely than other age groups to feel “very positively” about receiving mail and report ignoring mail solicitation at far lower rates than they do digital ads. The novelty factor cannot be overlooked. In an age when everyone’s grandmother is texting and commenting on your Facebook posts, how often do young people even receive a handwritten card or letter? Postcard writing hits a sweet spot for another reason: it appeals to exactly the demographic that has become active in the resistance movement. Introverts who often shy away from phone banks and canvasses, are among Tony’s most active volunteers. According to Steph, a prolific postcard writer and member of Ohio’s District 12 Indivisible: “I think this initiative is an easy starting point for people who are newly engaged in politics and don’t know where to start. Not everyone is comfortable knocking doors or making phone calls but the postcard writing gives you a tangible way to help. I think in some people this builds their confidence so they can move to that next step of talking to voters face to face.” Most attendees at the postcard parties I’ve attended have been full of middle-age women. Tony confirms: “judging only from the profile photos of those volunteers, the majority of our volunteers are women.” Attending a postcard party is a great social outlet–some Ohio resistance groups are scheduling them once a week or more–but it can also be done from home. As one reddit commenter explained “It’s something that can be done in small chunks of time without a lot of coordination and scheduling and it doesn’t require child care “ “When I started writing postcards to voters I went as a way to meet new folks in my Indivisible group and as an outlet for talking politics. So I think it makes a difference in a few ways. As a writer it has helped me connect with the progressive community here in central Ohio. I get to talk to people who back different local candidates and hear why they support them. I get caught up or learn about what is happening in this country right now and learn about candidates all over the country. As a voter I think it makes a difference because I think about how I would feel if I got one of these postcards.” – Steph, District 12 activist And voters do notice. In one special election, campaign staff reported voters stopping by their office with postcards in hand “in wonderment and appreciation.” Another says the cards, often showcasing the creative talents of their volunteer senders, “stand out from slick campaign mailers and are conversation pieces in ways that phone calls and door knocks just aren’t.” Steph has seen it too: “you can see this on the Facebook and Twitter feeds for Postcards to Voters; people love getting these cards! They post pictures and let the group know that it was received, appreciated, and that they will vote. In some cases, the recipient even becomes a writer.” Participants sign up by email or text and are sent voter addresses via a text bot. The group has a Facebook page where volunteers cheer on their candidates on special election nights. Postcards to Voters isn’t the only game in town. Sister District, a program that allows volunteers in safe districts to lend a hand in contested races reports that their volunteers sent more than 40,000 postcards in 2017 alone. While volunteer-driven, none of these efforts are rogue. All coordinate with campaigns, who provide talking points and voter lists. Some campaigns are wary and have refused offers of volunteer help, perhaps out of a sense of nervousness about what unscripted volunteers might say. But as the programs mature, more campaigns are asking to be part of the effort, including some close to home. We know of at least two Ohio campaigns getting in on the postcard game. Beth Liston, a pediatrician running for the Ohio House, has put dozens of volunteers to work writing “woman to woman” postcards and is preparing to reach out to Democrats who have requested mail-in primary ballots. Thank you to all those who came to write postcards yesterday! We will keep working to reach out and connect with people. Follow us on Facebook for volunteer opportunities https://t.co/bvH0vyckYW pic.twitter.com/ZRlDWYco81 — Liston For Ohio (@Liston4Ohio) March 19, 2018 John Russell, an early leader of the District 12 Indivisible group who is now running for the seat himself, has enlisted his volunteers to send personal messages to voters in his far-flung, mostly-rural district. Our postcards are in! Want to be part of our voter-to-voter postcard writing team? Sign up at https://t.co/7YxwHaSRRU #OH12 #TeamRussell pic.twitter.com/gfSv0l1Hrh — John Russell (@russellforohio) March 28, 2018 The other side is catching on. In Wisconsin, the state arm of Koch-funded Americans for Prosperity started hearing about postcards hitting mailboxes and responded by enlisting their own volunteers to replicate the effort. Campaigns should recognize there is a pent-up desire to do something–anything–to help win elections and engage volunteers in new ways. Print some postcards if you like, or let people bring their own. All you really need to do is assign one super volunteer to send out instructions and addresses to others willing to provide their handwriting and postage and you’re in the game. It’s a lot cheaper-and far more likely to get read-than direct mail. People who don’t have time to write postcards can still support the Postcards to Voters effort by donating money for supplies and technology.
Mid
[ 0.6522781774580331, 34, 18.125 ]
Neoadjuvant induction chemotherapy. Neoadjuvant chemotherapy (NACT) and neoadjuvant hormonal therapy (NAHT) have been adopted worldwide as appropriate, if not standard of care, options of treatment for patients with locally advanced carcinoma of the breast. The initial role of NACT was the conversion of so called inoperable tumors into those for which mastectomy could now be performed, irrespective of effect on overall survival outcome. As breast conservation became accepted as an alternative to mastectomy in selected patients, NACT often reduced tumor volume enough to allow consideration of this option for these patients as well. Currently a majority of patients undergoing NACT become candidates for breast conservation. Clinical trial data, however, suggest that overall survival has not been affected by NACT, although recent non randomized but prospective data do document improved disease free and overall survival, as well as decrease in local recurrence. The adoption of axillary lymphatic mapping and sentinel lymph node biopsy (SLNB) in stage I/II, clinically N0 patients has promoted the judicious use of SLNB in selected patients who have undergone NACT, if the nodes are ''downstaged'' and are clinically negative at the completion of NACT. SLNB in these patients remains highly controversial, as does the application of NACT in patients with smaller (T1, N1, or T2, N01) cancers. The optimal choice of drug regimens for NACT is also controversial, i.e., both the drugs used and the duration of treatment. Generally accepted approaches are usually the same as if the drugs were given as adjuvant, rather than neoadjuvant, treatment. Most investigators do agree that those patients who achieve a complete pathological response (pCR, or absence of any invasive cancer in the final specimen) to NACT do have an improved outcome, so that the manipulation of treatment regimens by ongoing clinical trials is of utmost importance in this regard. The recent observation of an increased rate of pCR in patients with Herceptin added to the NACT regimen is, therefore, an exciting advance and requires further investigation. The adoption of NACT into treatment plans for women with earlier cancers is likely to become even more ubiquitous if a higher likelihood of pCR can be achieved, and as more and more women with smaller tumors (T1c) become almost automatic candidates for adjuvant chemotherapy because of tumor size, irrespective of node status. It is not difficult to imagine that the majority of women with breast cancer will become candidates for NACT as more information about tumor response and outcome data are accumulated.
High
[ 0.6924101198402131, 32.5, 14.4375 ]
Navigation Cosi Top End students will get a theatrical look inside a psychiatric facility at Brown’s Mart Theatre’s latest education program production, Cosi. By Tamara Howie More than 760 students will see the famous Australian play, loosely based on playwright Louis Nowra’s own life, which explores ideas of friendship, romance, infidelity and our perception of madness and sanity. Directed by Gail Evans, the play is set in 1971 when Australia is protesting against the war in Vietnam. Inside an asylum, inmates are preparing for a performance of Mozart’s famous comic opera, Così fan tutte, even though no one can sing, act or speak Italian. Brown’s Mart artistic director Sean Pardy says it’s a great opportunity for students to see the texts they’re studying in the classroom come to life on stage. “There is something special about live performance, something that you can’t capture when reading a script, or even watching a film,” he says. This is the fifth year the Brown’s Mart education program has presented a syllabus-linked production, giving students the opportunity to not only see the play they’re studying on the stage, but to also encourage an appreciation of the performing arts. Pardy says it’s also a captivating show for any theatre-lovers, not just the ones with their noses in the script at school. “Audiences will benefit greatly from seeing the live performance, the nuances of the characters, the subtle twists in the plot. The themes and hidden meanings of the text are all brought to life by the ensemble,” he says. More reads If you're dead-set ready for some laughs from the original comedians of the country then get ready for Deadly Darwin Comedy. The inaugural event features a group of four Aboriginal comedians who are keen to launch humour into their communities... Pull up a bar stool and get to know the regulars in this timeless classic of the stage. By Anna Dowd Written by Jim Cartwright and directed by Ensemble Theatre’s Mark Kilmurry, Two introduces 14 colourful characters, all skilfully played... Dane Simpson has a home- grown approach to comedy that audiences can’t get enough of. By Anna Dowd From sell-out shows with the Aboriginal Comedy All Stars, to his Darwin-bound third tour with the Melbourne International Comedy Festival Roadshow, no... Showcasing top end comics and local stand-up performers By Will Crawford I was at a house-warming of some very hip 20-somethings, music industry types, when the perennial debate about the best-ever sitcom erupted. Predictably enough, some overly loud, middle-aged white... Showcasing top end comics and local stand-up performers By Will Crawford Last month a swag of comedians took to the stage to compete in RAW comedy, but it was a newcomer to the scene who took out the NT title... Never miss an event Sign up to our electronic mailing list to receive the latest events news.
Mid
[ 0.5862068965517241, 38.25, 27 ]
Q: How to pass query params in Map Local/Remote in Charles Debugger I am used to using Fiddler, but have recently purchased a Mac and am forced to use Charles. I have successfully mapped some web requests to files on another web server, but I cannot get the query params to pass through. In fiddler I use something like regex:www.example.com(/w*) in the from and everything works as expected, however I cannot for the life of me find how to do this in Charles. Any help or direction would be great! TIA! A: Can't believe this but apparently all I had to do was place an asterisk in the from query param box and it seems to be passing it through. Was easier than Fiddler...no regex needed.
Mid
[ 0.625, 28.75, 17.25 ]
Make a Difference Week: Boy Scouts, Chess, Hunger As part of Make a Difference Week, Steve Adubato and Joanna Gagis talk to four NJ leaders: Bart Oates, Debbie Eastburn & Damion Josephs and Adam Lowy. Steve Adubato talks with former NY Giants great Bart Oates about the tremendous impact The Boy Scouts can have on a young man and current Boy Scout Matthew Scala about how scouting has “changed his life”. Chess in the Schools President & CEO Debbie Eastburn and alum Damion Josephs share with Steve Adubato how chess is teaching valuable life lessons to kids in low-income New York City schools. Joanna Gagis goes on-location to take a look at the hunger crisis in New Jersey and talk with Adam Lowy, founder of Move for Hunger, an organization that that collects unopened and non-perishable food items from families that are moving and delivers them to their local food pantry. 5/12/17 #2039 Excerpt: "Hi, I'm Steve Adubato here. More importantly, I have two very special guests to talk about Scouting and why it's so special. First, our good friend, back by popular demand, looking better than ever, Bart Oates, former NFL player and star. How many Super Bowl rings? Three. Yeah okay, who's counting? Yeah. And also a Scouting volunteer, and he's joined by his good friend Matthew Scala, who's sixteen years of age, just told me he's been in Scouting since he was six years of age. Yes I have. How great is this? And I want to thank our friends over at Wakefern for talking to us about Scouting, and why this is so special. I gotta ask you something. You were a Scout as a kid? I was. Yeah, I grew up as a Scout. And now you're a volunteer? Been a volunteer for years. Because? I've been a Scoutmaster. I've been... because this is an awesome organization. It helps young men kind of learn leadership skills, self confidence, a lot of fun, camping, just... you know, connecting with nature... just tremendous benefits. So for ten years, you've been in this? Ten years. What would you say the number one benefit you've taken from your Scouting experience has been? I'd have to say friendships, because the boys you meet in Scouting are the boys that you're gonna hang out with for years to come. I know most of my friends are from Scouting. I hang out with them on the weekends, we go places, we talk on the phone all the time, just a really great way to meet new people. It's interesting, you said you talk on the phone, and do you actually talk on a phone or...? Well, we text. Okay! [laughter] We text! [laughter] We always have a big group chat. We're always... Do you really? Oh it's very active. Everyone's on. "Oh, how is everyone's day?" Sending everyone funny messages or something. But it's a Scout thing? Oh, it's a Scout thing. It's all Scouts. That's great. Scout jokes and stuff. Scout jokes is about..."
High
[ 0.68065268065268, 36.5, 17.125 ]
This invention relates to a sheltering device, and more particularly pertains to a cover designed to operate effectively in preventing any leakage around a vent pipe and through its flashing even though significant disparity exists between the coefficient of expansions for the vent pipe and its accompanying and surrounding flashing. Customarily, in the plumbing trade, and usual type of cast iron vent pipe extends upwardly through the roof of the building, and then a flashing, usually also constructed of some form of metal, such as lead, is provided for mounting upon the roof of a building, with the upper end of this type of standard flashing having an extending lead sleeve that is usually peened over by means of hammering or other bending and into the upper end of the cast iron vent pipe, thereby sealing the opening in the roof through which the vent pipe extends. This prior art type of flashing for the vent pipe has generally worked satisfactory, primarily because the various types of metals from which both the vent pipe and the flashing have been constructed are metals both having a very low, or somewhat equivalent, coefficient of expansion. But, over the past few years, there has generally been developing a market for the plastic type of piping that is now being frequently used in the plumbing industry, generally such piping being constructed from a polyvinyl chloride, or a compound of acrylonitrile-butadiene-styrene copolymers, generally identified in the trade as ABS. And, while this type of piping, thus far, has been found to work very effectively for plumbing installations, such pipe has a reasonably high coefficient of expansion which makes it very different to provide closure around the vent pipe when formed of one of these materials particularly where it extends through the building roof. For example, these vent pipes extend through a hole or aperture in the roof of the structure, and then have the old style of flashing, namely, one having an upper sleeve of lead, and which is sealed in place upon the roof, with said lead sleeve being peened over and around the upper edge of the plastic pipe. Then, and as frequently occurs, particularly in cold weather where the upper end of the plastic vent pipe may be exposed to very low winter temperatures, and with the vent pipe located within the building being exposed to the heated environment of the interior of the building, generally in the vicinity of 65.degree. to 75.degree. F., such has caused a high expansion of the plastic pipe. As a result, such a vent pipe expands considerably, while the lead flashing remains rather static, and with the only location for expansion of the vent pipe being in an upward shifting direction through the roof of a building, since usually its lower end is reasonably fixed to other plumbing installations, there is, therefore, no room for expansion downwardly. Consequently, the metal type flashing surrounding the upper end of the vent pipe is frequently broken loose and clear from its mounting upon the roof, causing a wide open gap in which the rain or other elements may easily flow as through the hole provided in the roof of the structure, and through which the vent pipe extends, eventually causing severe damage to the structure roof of the building within the vicinity of its said vent pipe. As an example of the type of expansion problems encountered in forming vent pipes of the newer plastic type materials, it has been found that a vent pipe formed of polyvinyl chloride, and having a length approximating 35 feet when initially prepared for use, will expand as much as 7/8 inch when exposed to temperatures in the range of 140.degree. F., while at the same time, when exposed to temperatures in the vicinity of 33.degree. F., may contract as much as 1/2 inch. In addition, a pipe formed from ABS, and also having an initially and precisely cut length of approximately 35 feet, will expand well over 11/2 inches when exposed to temperatures in the vicinity of 140.degree. F., and will contract as much as 1 inch when exposed to temperatures, as at the other extreme, around 35.degree. F. Bear in mind that the temperatures selected for these tests are not too unsimilar to the temperatures normally encountered by that portion of a vent pipe that extends through the roof of a structure, since in the hot summer sun, temperatures may well reach in the vicinity of 140.degree. F., at the roof line, while in the wintertime, temperatures within the central and northern parts of the United States easily average 33.degree. F. And, expansions of the type previously identified, particularly under summer heat, and even when the pipe interiorly of the structure, where most of it is located, is exposed to temperatures in the vicinity of 70.degree. F., when they expand the 1 inch or more in length, does have a very detrimental effect upon the lead flashing which had previously been peened around the upper edge of the pipe when installed. Thus, and particularly when expansion occurs, there is no place for the lead flashing to move but up, and when this occurs, it normally breaks loose from its mounting upon the roof structure, thereby readily exposing the gap between the roof and the enclosed vent pipe to rain, snow, or any other elements that eventually flow upon the surface of the roof. The current invention is designed for use with the present lead roof flashing which is predominantly used in the trade, and at the same time, totally eliminates any leakage that occurs from the problems now associated with the usage of plastic pipe with such a lead flashing, since the problem of expansion and contraction has been alleviated through the structure of this invention. Various prior art patents have given some consideration to the fabrication of shields for use in conjunction with roof vent pipes. For example, in the U.S. Pat. No. 3,797,181 to Nievelt, there is disclosed an outer cylindrical sheet that extends downwardly for flaring into an overlapping fashion and resting upon its modified form of sheet metal base, as shown. There are two significant differences between the shield of this prior art patent, and the current invention, in that the shield as shown is not fixed to any particular structure, but rather, simply rests upon the flashing. And, the shield is drapped over the vent pipe, and therefore, does not move with its expansion, as does the current invention. The U.S. Pat. No. 1,010,100, to Wallace discloses a roof jacket for a ventilating pipe, wherein a sleeve is provided upon the top edge of the vent pipe 4, and then has another sleeve disposed for telescoping about the vertical pipe portion of the flashing. The cap of this jacket contains a series of interconnecting lugs that are designed for passing through various notches formed upon the pipe so that the cap may be rotated so as to lock it in place. And, a disc and stud are further provided for partially enclosing the center of the vent pipe as shown, and therefore, actually obstruct, rather than allow, the free flow of air out of the vent pipe. The patent is specifically upon an adjustable ice and frost proof flashing, its base having adjustability to compensate for varying slopes on roofs, and since no plastic pipe was available in 1911, Wallace had no concern with expansion matters. And, for this reason, this prior art patent shows its pipe 10 and section 9 in contiguity, unlike the present invention. In any event, the structure of this Wallace jacket, particularly at its upper reaches, is quite dissimilar from the rather easily assembled adapter as designed and shown in the current invention. And, whereas Wallace is designed having contact between its sleeve and its pipe, the current invention avoids such. Other prior art patents in this particular field include a U.S. Pat. No. 1,750,019 to Moore, the U.S. Pat. No. 1,923,220 to Lightbown, U.S. Pat. No. 2,307,269 to Hauser, and the U.S. Pat. No. 3,436,880 to Kiefer. In view of the foregoing, it is, therefore, the principal object of this invention to provide a no leak expansion vent cover for use in conjunction with a current flashing provided upon the roof of a building structure. Another object of this invention is to provide a vent cover which may be made in various sizes to be readily connected onto existing vent pipes and cooperate with the flashing so as to overcome problems associated with material expansion as currently exists. A further object of this invention is to provide a vent cover which prevents lead flashings from being torn loose from their mountings upon roof structures. An additional object of this invention is to provide a vent cover that allows for free expansion of the plastic vent stack or pipe, without any contact or cooperation needed for its functioning from the surrounding flashing, which will remain in a fixed position. Another object of this invention is to provide a vent cover that is highly successful in operation and has received approved usage where ever installed. Yet another object of this invention is to provide a vent cover that can be easily modified, at the job site, for mounting upon plastic vent pipes of a variety of sizes. A further significant attribute of this invention is to provide a vent cover that allows for the full inside diameter of the vent pipe to vent its gases to the atmosphere. A further object of this invention is to provide a vent cover that can be easily installed upon new construction, or modified in repair of existing vent structures, within a matter of minutes. These and other objects will become more apparent to those skilled in the art upon reviewing the summary of this invention, and upon undertaking a study of the description of its preferred embodiment, in view of its drawings.
Mid
[ 0.588505747126436, 32, 22.375 ]
Cognitive impairment in antiphospholipid syndrome: evidence from animal models. Although antiphospholipid syndrome (APS) is a multisystem prothrombotic condition, its inflammatory nature has been increasingly recognized in recent years. Stroke and transitory ischemic attacks are the neurological manifestations included in APS criteria, however many other neurological involvements have been attributed to antiphospholipid antibodies (aPL), such as seizures, transverse myelitis, and cognitive impairment. In this article we will review evidence from animal model that explain the role of aPL in cognition.
High
[ 0.6922060766182291, 32.75, 14.5625 ]
/* * Hibernate, Relational Persistence for Idiomatic Java * * License: GNU Lesser General Public License (LGPL), version 2.1 or later. * See the lgpl.txt file in the root directory or <http://www.gnu.org/licenses/lgpl-2.1.html>. */ package org.hibernate.envers.test.integration.superclass.auditAtMethodSuperclassLevel; import javax.persistence.Entity; import javax.persistence.GeneratedValue; import javax.persistence.Id; import javax.persistence.Table; /** * @author Adam Warski (adam at warski dot org) * @author Hern&aacute;n Chanfreau */ @Entity @Table(name = "NotAuditedSubclass") public class NotAuditedSubclassEntity extends AuditedMethodMappedSuperclass { @Id @GeneratedValue private Integer id; private String notAuditedStr; public NotAuditedSubclassEntity() { } public NotAuditedSubclassEntity(Integer id, String str, String otherStr, String notAuditedStr) { super( str, otherStr ); this.notAuditedStr = notAuditedStr; this.id = id; } public NotAuditedSubclassEntity(String str, String otherStr, String notAuditedStr) { super( str, otherStr ); this.notAuditedStr = notAuditedStr; } public Integer getId() { return id; } public void setId(Integer id) { this.id = id; } public String getNotAuditedStr() { return notAuditedStr; } public void setNotAuditedStr(String notAuditedStr) { this.notAuditedStr = notAuditedStr; } public boolean equals(Object o) { if ( this == o ) { return true; } if ( !(o instanceof NotAuditedSubclassEntity) ) { return false; } if ( !super.equals( o ) ) { return false; } NotAuditedSubclassEntity that = (NotAuditedSubclassEntity) o; if ( id != null ? !id.equals( that.id ) : that.id != null ) { return false; } return true; } public int hashCode() { int result = super.hashCode(); result = 31 * result + (id != null ? id.hashCode() : 0); return result; } }
Mid
[ 0.54337899543379, 29.75, 25 ]
package com.rusefi.core; import java.util.EnumMap; import java.util.Map; public class SensorsHolder implements ISensorHolder { private final Map<Sensor, Double> values = new EnumMap<>(Sensor.class); public double getValue(Sensor sensor) { Double value = values.get(sensor); if (value == null) return Double.NaN; return value; } public boolean setValue(double value, final Sensor sensor) { Double oldValue = values.get(sensor); boolean isUpdated = oldValue == null || !oldValue.equals(value); values.put(sensor, value); return isUpdated; } }
Mid
[ 0.6060606060606061, 32.5, 21.125 ]
CUTTING CLINTON FOUNDATION TIES Some of the good works can survive, but the foundation and its principal players must distance themselves from the foreign and corporate money that risks tainting Hillary Clinton’s campaign. OPINION Does the new batch of previously undisclosed State Department emails prove that big-money donors to the Bill, Hillary & Chelsea Clinton Foundation got special favors from Mrs. Clinton while she was secretary of state? Not so far, but that the question...
Low
[ 0.514492753623188, 35.5, 33.5 ]
TRAF Molecules {#s1} ============== Discovered in 1994, Tumor necrosis factor receptor (TNFR)-associated factors or TRAFs are a phylogenetically conserved and structurally related family of cytoplasmic proteins composed of seven known members TRAF1 through TRAF7. While TRAFs were initially implicated in the regulation of inflammatory responses through their engagement with TNFR2 ([@B1]), they are now recognized to engage diverse signaling cascades functioning as central regulators of immunity and inflammation. All identified mammalian TRAF molecules, with the exception of TRAF7 ([@B2], [@B3]), constitute the hallmark highly conserved carboxyl terminal TRAF domain (TRAF-C) through which they are recognized as intracellular scaffolding molecules. TRAF molecules can engage cytoplasmic domains of cytokine receptors i.e., IL-1β, IL-2, IL-6, IL-17, IL-18, IL-33, type I IFNs, type III IFNs, GM-CSF, M-CSF, and TGF-β, Toll-like receptors (TLRs), NOD-like receptors (NLRs), RIG-I- like receptors, and C-type lectin receptors ([@B4]). TRAFs self-assemble into trimeric homo or heterotrimers of TRAF-C domains mediated in part by the amino terminal extension of the TRAF-C domain that contains a coiled-coil domain. TRAF2 coiled-coil domain is the longest and contains 14 heptads, compared to only 3 heptads on TRAF4 ([@B5]). In addition, with the exception of TRAF1, all TRAFs also contain an amino terminal (really interesting new gene) or RING finger domain endowed with E3 ubiquitin ligase activity thought to be necessary for TRAF function ([@B6]). E3 ubiquitin ligase activity of the RING domain has been shown to be required for TRAF-dependent activation of nuclear factor kappa-B NFκB1 and NFκB2, mitogen-activated protein kinases (MAPKs); extra-cellular signal-regulated kinase (ERK), P38, and Jun N-terminal protein kinase (JNK) as well as interferon regulatory factors/IRFs and downstream gene expression ([@B7]). Biochemical studies also suggests that TRAFs are capable of mediating Lysine 29(K29), lysine 48(K48), lysine 63(K63) polyubiquitination, the later, shown to require RING domain dimers and the most proximal zinc finger to RING, zinc finger 1 (ZF1) ([@B8]--[@B10]). Interestingly, It was recently demonstrated that TRAFs i.e., TRAF6 molecules can form trimers that could associate to enable the formation homo or heterodimer RING assemblies with TRAF5 ([@B11]). It seems TRAF6 RING dimers are important for the formation of a catalytic complex with the ubiquitin conjugating E2 enzyme and E3 ligase activity. It is proposed that, at least for TRAF6 dimers which utilizes Ubc13-Uev1A E2 complex ([@B12]), one RING interfaces with a Ubc13\~Ubiquitin conjugate, while the zinc finger 1 (ZF1) domain and linker-helix of the opposing monomer associates with ubiquitin ([@B11]). IL-17 Cytokine Family {#s2} ===================== Interleukin-17(IL-17) cytokine family members are known to promote and drive tissue responses that are crucial for protective immunity. IL-17 cytokines are also implicated in mediating acute and chronic inflammation, autoimmunity, and cancer. Homology-based cloning has revealed six IL-17 family members, termed IL-17A, IL-17B, IL-17C, IL-17D, IL-17E, and IL-17F ([@B13]). IL-17A commonly referred to as IL-17, is the prototypical IL-17 family member and plays an essential role in host defense against microbial infections and is widely implicated in various inflammatory conditions i.e., psoriasis, asthma, rheumatoid arthritis, multiple sclerosis, transplant rejection, inflammatory bowel disease, and cancer ([@B14], [@B15]). IL-17A is produced by type 17 T helper (Th17) cells, B cells, γδT cells, iNKT cells, a subset of CD8+ T cells, known as Tc17 cells, type 3 innate lymphoid cells (ILC3s) ([@B16]), as well as a subset of human regulatory T cells([@B17]). The transcription factor retinoid-related orphan nuclear receptor γt (RORγt) is required for the generation and propagation of IL-17 producing type 17 T helper cells ([@B18]). Interestingly, TRAF5 mediates Lysine 63(K63) polyubiquitination and stabilization of RORγt and can promote IL-17 production and pathology. IL-17A amplifies tissue immune activity by promoting the production inflammatory mediators; cytokines, chemokines, acute phase proteins, anti-microbial peptides, and matrix metalloproteinases. Further, can drive granulopoiesis and tissue neutrophilia; as well as maintaining barrier function by the activation of innate and adaptive immunity necessary for host defense. Dysregulation of IL-17 activity under pathological conditions is implicated in leading to chronic inflammation, tissue damage, and disease. Biological responsiveness to IL-17 cytokines is mediated by five single pass transmembrane IL-17 receptors (IL-17RA, IL-17RB, IL-17RC, IL-17RD, IL-17RE) that possess the hallmark cytoplasmic SEFIR domain (similar expression of fibroblast growth factor and IL-17R), a motif uncovered through phylogenic sequence analysis to be similar to the Toll/IL-1R (TIR) domain found in IL-1 and Toll-like receptor family members and comprising the STIR superfamily ([@B19]). While debate still exists regarding the stoichiometry of the IL-17 receptor complex, biochemical, genomic, and structure function analysis suggests that the SEFIR domain mediates both homotypic and heterotypic interactions among IL-17Rs and its adaptor molecule Act1 ([@B20]). The SEFIR domain is also present on Act1 (NFκB activator 1, also known as CIKS or TRAF3IP2) which was originally discovered as an activator of NFκB pathway. Act1 is now known to be recruited to the IL-17 receptor complex in a manner dependent on the homotypic and heterotypic interactions between the SEFIR domains on Act1 as well as IL-17 receptors ([@B21]). IL-17 receptor complex also elicits a dual phosphorylation of the CAAT enhancer binding protein β (C/EBPβ) at Threonine 188(Thr188) and Threonine 179(Thr179) that is mediated by ERK and glycogen synthase kinase 3β (GSK3β) ([@B22]). The distal domain of IL-17RA -coined C/EBPb-activating domain (C-BAD)- is necessary for phosphorylation of C/EBPβ and downstream inhibition of IL-17-dependent gene induction. It is also suggested that during chronic activation of IL-17 pathway, stimulates Lys48-linked polyubiquitination and degradation of IL-17 receptor adaptor; Act1 ([@B23]). Considerable sequence divergence exists between IL-17R genes, which are located on human chromosome 22 (IL-17RA) and human chromosome 3 (IL-17RB, IL-17RC, IL-17RD, IL-17RE) ([@B24], [@B25]). A sixth member of the IL-17 receptor family was identified as IL-17REL ([@B26]). IL-17REL was found to be associated with inflammatory bowel disease, ulcerative colitis ([@B27]), and gout ([@B28]); yet, its biological role remains poorly defined. IL-17 Cytokines require a heterodimer receptor complex that must include the common IL-17 receptor chain IL17RA in addition to the supplementary chain IL-17RC for hematopoietic cell derived IL-17A and epithelial derived IL-17F, IL-17RB for epithelial and hematopoietic derived IL-17E (IL-25) and epithelial IL-17B, and IL-17RE for epithelial derived IL-17C ([@B29]). Despite the obligate requirement for IL-17RA chain for IL-17A, IL-17B, IL-17C, IL-17D, as well as IL-17E (IL-25), IL-17 cytokines can induce distinct biological responses. While much overlap is observed in downstream target gene in IL-17A; IL-17C, and IL-17F; the cellular sources and co-receptor are thought to have different expression and tissue localization. In comparison to IL-17A, IL-17E or IL-25 is often deemed the black sheep of the group. IL-17E or (IL-25) signaling shares some similarities with IL-17A signaling transduction but has very defined biological effects and is linked to allergic, atopic inflammation, and eosinophilic responses. IL-25 signals through a heterodimeric receptor complex IL-25R which also utilizes the common IL-17RA and addition to IL-17RB, both of which contain a conserved SEFIR domain at the cytoplasmic region. Upon binding of the IL-17E (IL-25), IL-25R recruits the adaptor molecule Act1 through the homotypic and heterotypic interactions of the SEFIR domains ([@B30], [@B31]). Act1 deficiency results in a loss of IL-25-dependent gene expression and renders mice resistant to IL-25-mediated allergic airway inflammation. TRAF Regulation of IL-17 Cytokine Signaling {#s3} =========================================== TRAF6 ----- TRAF6 is ubiquitously expressed in human tissues and is highly expressed in bone marrow. TRAF6 is involved in both innate and adaptive immune pathways through the signaling of several cytokines and intracellular mediators. TRAF6 is shown to engage TIR domain containing cytokine receptors of IL-1R family; IL-1R ([@B32]), IL-18R, and IL-33R ([@B33], [@B34]), MyD88-dependent TLRs, NLR family; NOD1, NOD2 ([@B35]), and RIG-I/RLRs ([@B36]). TRAF6 is also required for the activation of both canonical and non-canonical NFκB pathways as well as activation of the MAPKs (JNK1/2, ERK1/2, and p38) and IRFs (IRF3, IRF4, IRF5, and IRF7). TRAFs were initially implicated in the IL-17 signaling pathway by the reported requirement of TRAF6 but not TRAF2 in IL-17 mediated NFκB pathway activation ([@B37]). It was subsequently shown that the cytosolic protein Act1, is crucial for their biochemical interaction and subsequent TRAF6 mediated NFκB activation and downstream gene expression. ACT1 U-box E3 ubiquitin ligase function in conjunction with the ubiquitin conjugating enzyme Ubc13 and Ubc-like protein Uev1A mediates K63-linked polyubiquitination of TRAF6 ([@B38]). Act1 mediated TRAF6 recruitment and polyubiquitination primarily on Lysine 124(K124) is required for TRAF6-dependent TGFβ-activated kinase 1(TAK1) TAK1-IKK \[composed of IKKα, IKKβ, and IKKγ/NEMO\] and IKK mediated IkB**α** phosphorylation and proteasomal degradation. The later allowing the nuclear localization p50-p65 dimers and the activation of the classical (or canonical) NFκB signaling pathway. Interestingly, the non-receptor tyrosine kinase Spleen tyrosine kinase (Syk) was also shown to participate in the Act1/TRAF6 complex and to be necessary for K63-linked polyubiquitination of TRAF6, IL-17A-induced TAK1, IKK, IkBα, JNK, and MKK4 and chemokine ligand 20 CCL20 mRNA and protein levels ([@B39]). Interference with Syk expression reduced Act1 interaction with TRAF6 and attenuated NFκB activation and downstream CCL20 levels ([Figure 1](#F1){ref-type="fig"}). ![TRAFs in IL-17 signaling pathway. Biological responsiveness to IL-17 is mediated by single pass transmembrane IL-17 receptors (IL-17RA, IL-17RC). **ACT1** U-box E3 ubiquitin ligase function in conjunction with the ubiquitin conjugating enzyme Ubc13 and Ubc-like protein Uev1A mediates K63-linked polyubiquitination of **TRAF6**. TRAF6 mediated deubiquitination by USP25 and A20 mediate the negative feedback regulation of IL-17 induced NFκB and MAPK. In addition to its role as the adaptor molecule for IL-17 receptors, Act1 also functions as an RNA-binding protein that mediates receptor-induced stabilization of select mRNAs by directing the formation of distinct RNA-protein complexes. Act1-**TRAF2-TRAF5** complex modulation of mRNA stability is dependent on IkB kinase (IKKi) and TBK1-mediated phosphorylation of Act1 at the serine residue 311 (Ser311). Formation of Act1/TRAF2/TRAF5/ASF (arginine serine rich splicing factor) also known as SRSF1 or SF2 prevents ASF from binding to the 3′ UTR of CXCL1 mRNA and subsequent degradation. **TRAF2** also recruits IL-17-induced RNA binding protein Arid5a to stabilize mRNA by counteracting mRNA degradation mediated by the endoribonuclease Regnase-1. **TRAF3** can bind directly to the IL-17R to impede the formation of the IL-17R-Act1-TRAF6 complex. **TRAF4** tethers IL-17RA and EGFR to enable IL-17A-induced EGFR transactivation and downstream activation of ERK5. In addition, **TRAF4** competes with TRAF6 for the two TRAF binding site (TB) on Act1. Illustration by Shadi Swaidani MD, Ph.D. and Brandon Stelter, BFA, Reprinted with the permission of the Cleveland Clinic Center for Medical Art & Photography © 2019. All Rights Reserved.](fimmu-10-01293-g0001){#F1} TRAF6 was also crucial for IL-25R-mediated NFkB activation and IL-25 induced gene expression of IL-6, TGFβ, G-CSF, TARC (Thymus and activation-Regulated chemokine) but not activation of MAPK pathway ([@B40]). These studies demonstrated that IL-25 induced activation of ERK, JNK, P38 was intact in the absence of TRAF6, suggesting that MAPK downstream pathway is independent from TRAF6 unlike IL-25R-mediated NFkB activation and gene expression. Although, IL-17RB-SEFIR which contains a putative TRAF binding motif does not function as a true TRAF6-binding motif, it is possible that IL-17RB interaction with TRAF6 directly via a still undefined motif ([@B41]). In addition, IL-17RB possibly recruits TRAF6 indirectly via the heterodimeric interaction with IL-17RA and the adaptor protein Act1. Noteworthy was the identification that IL-17RD engages TRAF6 and is part of the heterotrimeric complex required for IL-17 signaling and gene expression ([@B42]). IL-17RD was found to disrupt IL-17RA interaction with Act1 and TRAF6 ([@B43]). IL-17RD was implicated in down regulating the NFκB pathway while promoting p38 MAPK pathway. Thus, TRAF6 is a necessary component of the positive induction of downstream signaling of both IL-17A as well as IL-17E/IL-25. TRAF6 is recruited to IL-17RA, IL-17RB, and IL-17RC by Act1. TRAF6 recruitment to the receptor complex and K63 polyubiquitination primarily on Lysine 124(K124) is required for induction of the pathway. Conversely, negative regulation of this pathway is also mediated in part by TRAF6. USP25 and A20 ([@B44]) both function as deubiquitinase enzymes or DUBs that target K63-linked polyubiquitination of TRAF6 and mediate the negative feedback regulation of IL-17 induced NFkB and MAPK. TRAF2/5 ------- While TRAF2 and TRAF5 are implicated in cytokine mediated activation of the both classical (canonical) and alternative (non-cononical) NFkB pathways, MAPKs, IRFs and can contribute inflammasome activation during chronic inflammatory responses ([@B45]--[@B47]), their mechanistic involvement in the IL-17A signaling pathway has been shown to potentiate distinct effects. IL-17R signaling through Act1-TRAF6 interaction has been shown to activate the classical NFkB pathway and downstream IL-17 target genes, albeit, less robustly than potent proinflammatory cytokines i.e., TNFα, and IL-1β; IL-17A has been shown to amplify TNFα-stimulated mRNAs in wild-type, as well as TRAF6-deficient cells, but not from Act1 deficient cells ([@B48]). IL-17A capability to stabilize TNFα induced KC, MIP-2, and IκB**ζ** mRNAs in TRAF6-deficient cells remains intact. These observations were suggestive of the independence of the classical NFkB pathway from the mRNA stability mechanism despite Act1 being central to both. IL-17A signaling through Act1-TRAF2-TRAF5 complex results in the control of mRNA stability of IL-17 as well as additional proinflammatory cytokines TNFα, and IL-1β target genes. This mRNA stabilization pathway is dependent on IkB kinase (IKKi) and TBK1-mediated phosphorylation of Act1 at the serine residue 311 (Ser311) ([@B49], [@B50]). Phosphorylation of Act1 at Ser311 allows the recruitment and interaction of TRAF2 and TRAF5, but not TRAF6, to form an Act1/TRAF2/TRAF5/ASF (Arginine Serine rich splicing factor) also known as, SRSF1 or SF2. Formation of this complex prevents ASF from binding to the 3′ untranslated regions UTR of CXCL1 mRNA and subsequent degradation. Evidently, through Act1-TRAF2/5 dependent mechanism, IL-17A signaling can also activate the mRNA stabilizing factor human antigen R (HuR)/ELAVL1 ([@B51]). IL-17A induced mRNAs exhibit short half-life\'s due to adenine and uridine--rich sequence elements (AREs) within their 3′ (UTRs) that can mediate deadenylation, decapping, and exonucleolytic degradation by ARE-binding proteins. IL-17A stimulation induced Act1-dependent, K63-linked polyubiquitination of HuR and interaction of HuR with Act1 and TRAF2/5 but not SF2/ASF. HuR may compete with ASF for binding to the ARE-mRNAs i.e., CXCL1 and CXCL5 and promote mRNA stability and enhance neutrophilic inflammation. Interestingly, IKKi deficiency does not impact the IL-17-Act1-TRAF6 axis and the activation of NFkB but instead leads to an attenuated activation of (MAPKs) and attenuates IL-17-dependent stabilization of mRNA encoding the neutrophil chemokine CXCL1 and tissue neutrophilic infiltration. While ASF and HuR are implicated in IL-17-induced mRNA regulation, the recruitment of ASF and HuR cannot explain the receptor-specific mRNA stabilization of selected IL-17 inflammatory genes. Unexpectedly, while Act1 is the essential adaptor molecule for IL-17 receptors, recent study has shown that it also exhibits direct mRNA-binding activity. Importantly, much of the receptor-mediated target specificity is mediated by Act1 and its RNA-binding capacity that allows it to interact with the stem-loop structure of select inflammatory mRNAs. A more detailed discussion of this emerging aspect of IL-17-mediated mRNA stabilization can be found in recent publications ([@B52], [@B53]). The positive role of TRAF2/5 in IL-17A signaling is regulated by ubiquitinylation. It has been shown that ubiquitin-specific protease 25 (USP25) deubiquitinates Act1-mediated K63 polyubiquitination of both TRAF5 and TRAF6, turning down IL-17A mediated mRNA stability and NFkB pathways, respectively ([@B54]). Notably, a recent study has shown that IL-17A stimulation induces the RNA binding protein Arid5a, which is recruited by TRAF2 to counteract Regnase-1-mediated mRNA degradation ([@B53]). Of importance, Regnase-1 can also be phosphorylated by IKKi and TBK1 in an Act1-dependent manner, which releases Reganse-1 from endoplasmic reticulum to preserve mRNA for translation ([@B55]). While it was demonstrated that neither TRAF2 nor TRAF5 can associate with IL-17RB ([@B40]), TRAF2 was shown to interact with IL-17RD through TNFα induced activation and TNFR2. IL-17RD and TNFR2 complex formation was induced with TNFα and activated NFκB ([@B56]). Thus, through a unique mechanism, TRAF2 can multitask TNFα signaling through the engagement of IL-17 receptors namely, IL-17RD. TRAF3 ----- TRAF3 is also ubiquitously expressed and plays important functions in regulation of antiviral immunity, inflammation, and tumor suppression ([@B2], [@B4]). Dysregulation of TRAF3 has been shown to promote autoimmunity and predisposition to cancer TRAF3 is an important negative regulator in TNF family receptors like CD40, B cell--activating factor (BAFF) receptor, and lymphotoxinβ receptor and has been shown to be required for Toll-like receptors (TLRs), RIG-I-mediated type I IFN production for antiviral defense and anti-inflammatory mediators i.e., IL-10 ([@B57]). Mechanistically, in the absence of ligand stimulation, TRAF3 requires TRAF2 for its activity ([@B58]). NFkB-- inducing kinase (NIK) binds to TRAF3 and recruits TRAF2-cIAPs that mediate K48-linked ubiquitination of NIK and consequential proteasomal degradation. Upon ligand-receptor binding, TRAF3 is recruited to receptor complex and competes with NIK receptor interaction leading to its release accumulates and subsequent activation of the non-canonical NF-κB. Important to note that despite TRAF3 shared homology with TRAF2, they both poses non-redundant functions. In a similar fashion, TRAF3 mediates negative regulation of the IL-17 signaling. TRAF3 can bind directly to the IL-17R to impede the formation of the IL-17R-Act1-TRAF6 complex. IL-17 stimulation induces the recruitment of TRAF3 to the distal domain of IL-17RA and has been shown to compete with Act1 interaction. Over-expression of TRAF3 suppressed IL-17--induced IkBα phosphorylation and degradation, p65 phosphorylation, p38 phosphorylation, and ERK phosphorylation ([@B59]). Conversely, Depletion of endogenous TRAF3 enhances Act1 binding to the IL-17RA and promotes NFkB and MAPK activation as well as enhances IL-17A-dependent pro-inflammatory gene expression ([@B59]). TRAF3 suppresses the development of experimental autoimmune encephalomyelitis (EAE) and IL-17 mediated EAE in part by its role as a negative regulator of the IL-17 induced inflammation and autoimmunity. TRAF4 ----- TRAF4, through its interaction with the adaptor protein Act1, was implicated in an intriguing pathway involving skin biology and tumor formation in squamous cell carcinoma (SCC) ([@B60]). IL-17 signaling is required TRAF4 for Act1-MEKK3 dependent extracellular signal-regulated kinase 5 (ERK5) activation, a pathway that is hyperactivated and dominant in human SCC. Through a positive feedback mechanism, IL-17-Act1-TRAF4-MEKK3-ERK5 induced the expression of target genes Steap4 (a metalloreductase for cell metabolism and proliferation) and p63 (a transcription factor for epidermal stem cell proliferation and Traf4 promoter). Thus, TRAF4 perpetuates its own expression through Steap4 and p63 and mediates IL-17 signaling in an Act1-MEKK3-ERK5 fashion contributing to hyperactivation of IL-17 inflammation and tumorigenesis. Curiously, the activation of MEKK3-ERK5 axis requires tyrosine phosphorylation. The tyrosine kinase responsible for IL-17-induced activation of the MEKK3-ERK5 axis was found to be EGFR. IL-17 stimulation prompts TRAF4 to recruit EGFR to the IL-17 receptor complex, while Act1 engages the kinase Src to phosphorylate the recruited EGFR, leading to its transactivation and the subsequent activation of MEKK3-MEK5-MEKK3 axis. Importantly, the IL-17-induced EGFR-ERK5 activation plays a crucial role in the expansion and migration of Lrig1+ cells and their progeny in the skin, critically contributing to wound healing and tumor formation. Of note, Lrig1 is a negative regulator of EGF-indued EGFR activation. Thus, the cis-activation of EGFR is impeded in the Lrig1+ stem cells residing in the hair follicle. Nevertheless, the Lrig1+ stem cells highly express TRAF4, which enables IL-17-induced trans-activation of EGFR, providing a mechanistic link between inflammation, wound healing and tumorigenesis ([@B61]). Evidently, despite the role of TRAF4 in propagating and promoting IL-17-Act1 MEKK3-ERK5 pathway and its implication in squamous cell carcinoma, TRAF4 is also involved in negative regulation of the IL-17 cascade. TRAF4 deficiency leads to elevated basal as well as IL-17-induced levels of ERK1/2, JNK activation, degradation of IkBα, and gene expression CXCL1, G-CSF, and GM-CSF. Conversely, increasing TRAF4 expression leads to attenuation of the above mentioned IL-17 effects. Noteworthy was that TRAF4 deficiency *in vivo* led to marked exacerbations of the murine model of EAE ([@B62]). Thus, TRAF4 can be a potent positive as well as negative regulator of the IL-17 pathway. The mechanism of this negative regulation of TRAF4 involves the competition for the two TRAF binding site (TB) on Act1 between TRAF4 and TRAF6. This was demonstrated by the fact that TRAF6 association with Act1 was increased in TRAF4 deficiency; TRAF6 association with Act1 was reduced with TRAF4 overexpression; and the demonstrated that mutation of the TB site abolished TRAF4 interaction with Act1. TRAF4 on the other hand seems to play a crucial role in IL-25-mediated type 2 immunity. TRAF4 in the T cell compartment and the epithelial compartment were shown to be required for the induction of IL-25 dependent genes, as well as, IL-25 mediated type 2 helper responses (Th2) *in vitro* as well as *in vivo* ([@B63]). While TRAF3 was not required for IL-25 induced responses, TRAF4 deficiency rendered an abolishment of IL-25 induced Cxcl1, Ccl11, IL-9, IL-13, IL-25 gene expression, IL-25 induced pulmonary responsiveness, as well as allergic airway inflammation. While it was previously shown that Smurf2 (smad ubiquitin regulatory factor 2) an E3 ubiquitin ligase, can target the proteasomal degradation of DAZAP2 (DAZ associated protein 2), an inhibitory molecule that interacts with the cytoplasmic domain of IL-17RB ([@B64]), blocking ACT1/IL-17RB interaction. The details of Smurf2 interaction were demonstrated to involve TRAF4. TRAF4 is shown to mediate K48 polyubiquitination and proteasomal degradation in order to allow for subsequent interaction of Act1 with the IL-25 receptor complex. Thus, TRAF4-mediated silencing of Dazap2 increased ACT1/IL-25R interaction and IL-25 responsiveness. Thus, TRAF4 requirement for IL-25 signaling is mediated in part by its mediation of the proteasomal degradation of Smurf2, and consequently, the removal of its inhibitory effect on the downstream signaling of the IL-25 receptor complex. Notably, IL-17 responsiveness in these studies was increased in TRAF4 deficiency consistent with the established role of TRAF4 as a negative regulator of the IL-17 pathway. In summary, TRAF4 modulation of the IL-17 signaling pathway seems to be context and cell dependent. TRAF4 through Act1-MEKK3-ERK5 can lead to hyperactivation of IL-17 effects, while TRAF4 overexpression attenuates IL-17 effects. TRAF4 deficiency exacerbates IL-17 mediated inflammation in EAE model, but rendered resistance to IL17E (IL-25) induced effects. Concluding Remarks {#s4} ================== Over the past 20 years, significant advancements has been made in the understanding of how Tumor necrosis factor receptor (TNFR)-associated factors (TRAFs) impact signaling pathways of IL-17 cytokines and drive protective immunity and mediate pathology. TRAFs are necessary in the activation as well as resolution of IL-17 signaling pathways and it is apparent that their dysregulation is implicit in disease pathobiology. Little is known about the involvement of TRAF1 and TRAF7 in the IL-17 signaling cascade and limited studies have explored the role of TRAFs in other IL-17 cytokine family members. Better understanding of the dynamics and mechanisms of how TRAFs regulate these inflammatory pathways are prudent for the development of new generation of therapeutics for the treatment of chronic inflammation, autoimmunity, and cancer. Author Contributions {#s5} ==================== All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication. Conflict of Interest Statement ------------------------------ The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. [^1]: Edited by: Sofie Struyf, KU Leuven, Belgium [^2]: Reviewed by: Kok-Fai Kong, La Jolla Institute for Immunology (LJI), United States; Ping Xie, Rutgers University, The State University of New Jersey, United States; Bin Li, Shanghai Jiao Tong University School of Medicine, China [^3]: This article was submitted to Cytokines and Soluble Mediators in Immunity, a section of the journal Frontiers in Immunology
Mid
[ 0.538288288288288, 29.875, 25.625 ]
<?xml version="1.0" encoding="utf-8"?> <resources> <dimen name="grid_margin">2dp</dimen> </resources>
Low
[ 0.33129770992366403, 13.5625, 27.375 ]
Tysons Corner, Virginia Real Estate Homes for sale in Tysons Corner, Virginia Guide to Tysons Corner, VA Tyson’s Corner is an unincorporated community in Fairfax County, Virginia. The houses here are as varied as its residents and restaurants. This neighborhood is more than its mall and office parks, but allows easy access to Arlington and Washington, DC and eventually Dulles Airport with its new Silver Metro line. Situated Between Vienna & McLean Tyson’s Corner is roughly restricted by Electric Avenue to the south, Westwood Country Club and a portion of Wolftrap Creek to the west, the Dulles Access Road to the north, and Route 650 to the east. This census-designated place is between the community of McLean and the town of Vienna. Falls Church and later downtown Arlington are further out towards the southeast, Dunn Loring, West Falls Church, Merrifield, and Mantua are to the south, and Odrick’s Corner and finally the Potomac River are to the north. Peach Grove to William Tyson Originally named Peach Grove, this area received the designation Tyson’s Crossroads after the Civil War. After the war, Lawrence Foster sold a tract of his land to William Tyson. Tyson, a Maryland native, served as a postmaster of the now discontinued Peach Grove Post Office. As recently as the 1950’s, Tyson’s Corner was a quiet, rural intersection with a few small stores. In 1963, the Tyson’s area moved from a country crossroads to a giant commercial urban area with the advantage of awarding contracts at the interchange of Route 123 and Route 7. One of the most important additions at the time was Tyson’s Corner Center. Four Metro Stations Depending on where you decide to commute from, you might be closer to one station then the other. Towards the west is Spring Hill located on its namesake Road, south near the Pike Plaza is the Greensboro Metro station. Across the street from its center, Tyson’s Corner dominates most of the traffic, while further east is the McLean station. All four stations run on the Silver line and easily connect Tyson’s by rail with Reston, Arlington, and Washington, DC. Further extension of the line west to Washington Dulles International Airport is projected for completion in 2018. Mostly Condos & Townhouses Keep close attention to the housing options in Tyson’s Corner. Although there aren’t many housing developments in some areas, there are plenty spattered around Tyson’s Corner Center. Branching out of the center you can find some single-family homes, a couple of new high-end developments beyond Route 267, and more quiet streets lined with row houses, and split-level homes near the south. Tyson’s Corner Center & Nearby Restaurants Tyson’s Corner Center is a massive mall that opened in 1968, becoming one of the first fully enclosed, climate-controlled shopping malls in the Washington metropolitan area. The premises are completed with 3 levels featuring 300 plus stores, eateries, a cinema, and an elevated outdoor plaza. Some anchors of the mall include Bloomingdale’s, Lord & Taylor, L.L. Bean, Macy’s, Microsoft, American Girl, and Apple—the first one built in the world. A few of the restaurants located within the center are Seasons 52, Brio Tuscan Grille, Gordon Biersch, California Pizza Kitchen, and Wasabi. Tyson’s Galleria is an overlooked, upscale three-level mall located across the street from Tyson’s Corner Center. This shopping mall features high-end boutiques and department stores, plus dining options. However, if you’re looking for dining options beyond the mall check out Chef Geoff’s Tyson Corner. This consistently good mini-chain is reasonably pricy but offers a delicious bacon bar with some upscale dishes like the Madras Curry Chicken and the Jumbo Lump Crabcake. A wonderfully hidden gem of Tyson’s is Shamshiry, located on Westwood Center Drive. This Middle Eastern restaurant is tucked away in an office park and produces some of the best Iranian cuisine in the area with classics like barg kebabs and the fluffiest of rice dishes with naan. Wolf Trap Tyson’s Corner offers a small amount of acres set aside for parks and other recreational activities. However, hovering on the northwestern edge of the neighborhood is Wolf Trap. This parks partnership between the National Park Service and the non-profit Wolf Trap Foundation for the Performing Arts allows offers of both natural and cultural resources. Its 7,000-seat theater is its main tourist attraction as it produces performing arts, orchestras, live music, and other events. The park also features kid-friendly shows at the Children’s Theatre in the Woods, and adjacent to that is Meadow Pavilion. There are also tour guides by rangers, hikes, summer programs, and junior ranger days. Westwood Country Club is located on Maple Avenue and separates Tyson’s from Vienna. This fabulous golf course provides a driving range, chipping and putting greens, a pool, tennis courts, banquet facilities, steam rooms, dining rooms, and a ballroom great for special events like reunions and weddings. Some urban parks located throughout the area include Raglan Road Park, Wildwood Park, Heritage Resource Park, Springlake Park, and Freedom Hill Park. Tyson’s Corner is a historic area tucked away between Vienna and Arlington. Its known for its mall and office parks, but its recent, radical change from car centric to pedestrian friendly city allows a terrific balance for homeowners to consider when looking into real estate in Northern Virginia. Industry regulations require us to validate contact information before displaying complete data on sold and contract pending properties. Registration implies agreement to Terms of Service and Privacy Policy. Already have an account? Sign in Reset Password Click here to sign in to your account Forgot Password Click here to sign in to your account Online Terms and Conditions of Use Welcome Your registration is complete. Industry regulations require us to validate contact information before displaying complete data on sold and contract pending properties. We recognize that this is annoying, but once you click on the validation link in the email that we just sent from [email protected] you will be all set to search just like an agent!
Mid
[ 0.554371002132196, 32.5, 26.125 ]
t is 473 minutes before 2:04 AM? 6:11 PM What is 546 minutes after 5:24 AM? 2:30 PM How many minutes are there between 3:11 PM and 5:43 PM? 152 What is 48 minutes before 4:31 AM? 3:43 AM How many minutes are there between 1:24 AM and 8:23 AM? 419 How many minutes are there between 6:15 AM and 10:24 AM? 249 How many minutes are there between 5:09 PM and 9:24 PM? 255 How many minutes are there between 8:29 AM and 8:18 PM? 709 What is 491 minutes before 1:10 AM? 4:59 PM How many minutes are there between 6:20 AM and 4:11 PM? 591 What is 313 minutes after 6:36 AM? 11:49 AM How many minutes are there between 10:29 PM and 5:29 AM? 420 How many minutes are there between 3:38 PM and 2:41 AM? 663 What is 324 minutes before 7:21 PM? 1:57 PM What is 387 minutes before 8:39 AM? 2:12 AM What is 27 minutes after 5:53 PM? 6:20 PM How many minutes are there between 8:09 AM and 2:36 PM? 387 How many minutes are there between 10:33 AM and 5:45 PM? 432 What is 416 minutes before 10:03 AM? 3:07 AM What is 530 minutes before 9:58 PM? 1:08 PM How many minutes are there between 4:34 PM and 12:24 AM? 470 What is 661 minutes after 9:24 PM? 8:25 AM What is 591 minutes after 10:33 AM? 8:24 PM How many minutes are there between 8:29 PM and 5:17 AM? 528 What is 372 minutes before 4:52 PM? 10:40 AM What is 36 minutes before 1:44 PM? 1:08 PM What is 423 minutes before 5:59 AM? 10:56 PM What is 709 minutes after 4:26 PM? 4:15 AM How many minutes are there between 9:35 PM and 2:28 AM? 293 How many minutes are there between 10:59 AM and 10:08 PM? 669 How many minutes are there between 4:25 AM and 4:04 PM? 699 How many minutes are there between 12:40 AM and 1:57 AM? 77 What is 552 minutes before 12:11 AM? 2:59 PM How many minutes are there between 2:17 AM and 3:20 AM? 63 What is 130 minutes after 1:09 PM? 3:19 PM What is 419 minutes before 3:34 AM? 8:35 PM How many minutes are there between 3:02 AM and 11:03 AM? 481 How many minutes are there between 6:58 PM and 3:23 AM? 505 How many minutes are there between 9:08 AM and 7:55 PM? 647 What is 211 minutes after 11:45 AM? 3:16 PM How many minutes are there between 12:25 AM and 7:21 AM? 416 What is 49 minutes after 9:55 PM? 10:44 PM What is 611 minutes before 2:10 AM? 3:59 PM How many minutes are there between 6:24 AM and 12:19 PM? 355 What is 589 minutes before 3:01 PM? 5:12 AM What is 664 minutes before 8:02 AM? 8:58 PM What is 11 minutes after 5:45 PM? 5:56 PM How many minutes are there between 4:43 PM and 6:43 PM? 120 How many minutes are there between 12:11 AM and 11:12 AM? 661 What is 416 minutes before 4:24 PM? 9:28 AM What is 584 minutes before 2:03 AM? 4:19 PM What is 371 minutes after 3:43 AM? 9:54 AM How many minutes are there between 2:17 AM and 4:14 AM? 117 What is 692 minutes before 8:08 AM? 8:36 PM What is 185 minutes before 5:48 PM? 2:43 PM What is 664 minutes after 11:28 AM? 10:32 PM What is 581 minutes after 5:42 AM? 3:23 PM How many minutes are there between 11:58 PM and 12:46 AM? 48 How many minutes are there between 5:25 PM and 11:02 PM? 337 What is 325 minutes after 11:20 PM? 4:45 AM How many minutes are there between 3:12 PM and 6:43 PM? 211 What is 175 minutes after 8:34 PM? 11:29 PM What is 599 minutes after 6:13 PM? 4:12 AM How many minutes are there between 9:20 PM and 10:11 PM? 51 What is 485 minutes before 1:47 PM? 5:42 AM What is 296 minutes after 9:13 PM? 2:09 AM How many minutes are there between 8:56 AM and 8:08 PM? 672 How many minutes are there between 12:13 PM and 7:09 PM? 416 What is 662 minutes before 12:04 PM? 1:02 AM How many minutes are there between 2:20 PM and 5:12 PM? 172 What is 107 minutes before 10:51 AM? 9:04 AM What is 462 minutes after 2:32 AM? 10:14 AM How many minutes are there between 9:45 AM and 1:00 PM? 195 What is 394 minutes after 3:53 PM? 10:27 PM What is 703 minutes after 1:49 PM? 1:32 AM How many minutes are there between 2:16 AM and 6:26 AM? 250 How many minutes are there between 11:59 AM and 12:09 PM? 10 What is 485 minutes after 11:40 PM? 7:45 AM How many minutes are there between 4:50 AM and 2:10 PM? 560 What is 588 minutes before 4:55 PM? 7:07 AM What is 481 minutes after 10:34 AM? 6:35 PM How many minutes are there between 4:34 PM and 6:42 PM? 128 What is 708 minutes after 6:04 PM? 5:52 AM What is 669 minutes before 4:32 AM? 5:23 PM What is 295 minutes before 10:56 AM? 6:01 AM What is 456 minutes before 3:29 PM? 7:53 AM How many minutes are there between 12:49 AM and 7:16 AM? 387 What is 556 minutes before 8:01 AM? 10:45 PM What is 366 minutes after 11:41 PM? 5:47 AM What is 36 minutes after 2:08 AM? 2:44 AM How many minutes are there between 12:59 AM and 1:32 AM? 33 What is 678 minutes after 1:20 PM? 12:38 AM What is 14 minutes before 8:18 AM? 8:04 AM What is 445 minutes after 5:43 PM? 1:08 AM How many minutes are there between 10:55 AM and 5:29 PM? 394 How many minutes are there between 6:58 PM and 7:42 PM? 44 How many minutes are there between 4:26 PM and 2:51 AM? 625 What is 252 minutes after 7:48 PM? 12:00 AM How many minutes are there between 1:34 PM and 2:15 PM? 41 How many minutes are there between 8:30 AM and 2:29 PM? 359 How many minutes are there between 5:56 AM and 10:51 AM? 295 What is 581 minutes before 8:42 PM? 11:01 AM What is 317 minutes before 8:42 PM? 3:25 PM What is 181 minutes after 10:22 AM? 1:23 PM How many minutes are there between 2:21 AM and 4:27 AM? 126 What is 462 minutes before 6:20 AM? 10:38 PM What is 153 minutes after 12:12 AM? 2:45 AM What is 468 minutes after 2:50 AM? 10:38 AM How many minutes are there between 10:20 AM and 10:34 AM? 14 What is 132 minutes before 10:08 AM? 7:56 AM How many minutes are there between 12:03 AM and 9:27 AM? 564 What is 82 minutes after 7:24 AM? 8:46 AM What is 39 minutes before 11:16 PM? 10:37 PM What is 605 minutes after 2:19 AM? 12:24 PM How many minutes are there between 6:35 AM and 12:46 PM? 371 What is 702 minutes after 1:47 PM? 1:29 AM What is 454 minutes before 12:44 AM? 5:10 PM How many minutes are there between 1:29 PM and 4:04 PM? 155 What is 265 minutes after 11:08 AM? 3:33 PM What is 663 minutes before 8:58 PM? 9:55 AM What is 391 minutes before 11:52 AM? 5:21 AM What is 636 minutes before 7:09 PM? 8:33 AM How many minutes are there between 6:51 AM and 8:28 AM? 97 How many minutes are there between 9:01 PM and 8:22 AM? 681 What is 708 minutes before 7:25 AM? 7:37 PM What is 136 minutes after 12:20 AM? 2:36 AM How many minutes are there between 2:54 PM and 9:10 PM? 376 How many minutes are there between 2:12 PM and 8:43 PM? 391 What is 202 minutes after 2:01 PM? 5:23 PM What is 473 minutes after 4:36 PM? 12:29 AM How many minutes are there between 5:15 AM and 4:36 PM? 681 How many minutes are there between 4:40 PM and 11:59 PM? 439 How many minutes are there between 10:18 PM and 10:56 PM? 38 What is 77 minutes before 12:15 AM? 10:58 PM How many minutes are there between 5:36 PM and 3:31 AM? 595 What is 211 minutes before 3:05 PM? 11:34 AM What is 184 minutes before 1:47 PM? 10:43 AM How many minutes are there between 8:04 AM and 1:07 PM? 303 What is 69 minutes before 7:53 PM? 6:44 PM How many minutes are there between 9:46 PM and 3:08 AM? 322 What is 41 minutes after 6:37 PM? 7:18 PM How many minutes are there between 4:19 AM and 8:58 AM? 279 How many minutes are there between 5:39 AM and 5:11 PM? 692 How many minutes are there between 9:44 PM and 6:12 AM? 508 How many minutes are there between 1:51 AM and 8:54 AM? 423 How many minutes are there between 11:13 PM and 7:06 AM? 473 How many minutes are there between 5:15 PM and 8:11 PM? 176 How many minutes are there between 5:12 AM and 5:39 AM? 27 What is 231 minutes before 1:09 AM? 9:18 PM What is 430 minutes after 2:40 PM? 9:50 PM How many minutes are there between 9:22 AM and 9:21 PM? 719 How many minutes are there between 12:31 AM and 2:48 AM? 137 What is 611 minutes before 4:01 PM? 5:50 AM What is 321 minutes after 6:16 AM? 11:37 AM What is 91 minutes before 12:36 AM? 11:05 PM What is 564 minutes before 3:40 PM? 6:16 AM How many minutes are there between 7:03 AM and 2:27 PM? 444 How many minutes are there between 6:21 PM and 12:49 AM? 388 What is 607 minutes before 4:59 AM? 6:52 PM What is 454 minutes after 3:47 AM? 11:21 AM How many m
Low
[ 0.515981735159817, 28.25, 26.5 ]
For its first 12 years of existence, Sandwell had a two-tier system of local government; Sandwell Council shared power with the West Midlands County Council. In 1986 the county council was abolished, and Sandwell effectively became a unitary authority. The borough is divided into 24 Wards and is represented by 72 ward councillors on the borough council. The borough was named after Sandwell Priory, the ruins of which are located in Sandwell Valley. The local council has considered changing its name in the past over confusion as to the whereabouts of the borough outside the West Midlands, and in June 2002 a survey of borough residents was carried out. Sixty-five percent of those surveyed favoured retaining the name Sandwell.[8] The sole further education college in the borough, Sandwell College was opened in September 1986 following the merger of Warley College and West Bromwich College.[36] It was originally based in the old Warley College buildings on Pound Road, Oldbury, and the West Bromwich College buildings on West Bromwich High Street, as well as a building in Smethwick town centre, but moved into a new single site campus in West Bromwich town centre in September 2012.[36] In 2004, a debt-ridden Sandwell College was subject to a police investigation.[37]
Mid
[ 0.6195899772209561, 34, 20.875 ]
With two speeches in two days, Indian mainstream media has really woken up and has declared the arrival of the next best thing to India, since sliced bread. Many neutral journalists were coming out of their rat-holes to declare the arrival of a messiah. Having said that, credit must be given where its due. Media has doggedly tried to make any of his sighting, as a comeback of sorts for the last 7 years. Here is the snapshot of their propaganda. Don’t let the headline fool you – also check the dates. In May 2009, Indian Media had as many as 5 pieces titled “Coming of Age of Rahul Gandhi”, from 5 different authors. Coincidence? Or well planned plug, with title suggested by some unnamed source (read Rahul Gandhi PR Team?). Two such articles, were dated 5th May (on NDTV) and 8 May 2009 on BBC. What is so special about these dates? The 2009 Lok Sabha elections were conducted between 16 April 2009 and 13 May 2009. Both these “coming of age” pieces are right in the middle of the elections. Coincidence? - Advertisement - The other three pieces appeared on 17th May 2009. Yes, all on the same date: The Hindu: May 17, 2009 – The coming of age of Rahul The Economic Times: May 17, 2009 – Rahul Gandhi: A coming-of-age Topnews.in: May 17 2009 – Rahul Gandhi comes of age What is so special about 17 May 2009? The results to the Lok Sabha elections were declared on 16th May 2009. UPA got re-elected, and Indian media was quick to appropriate credit of this victory to the Prince. But the media was not done. As Rahul’s charisma faded away, they kept peppering us with similar headlines, TV debates, right upto 2014. Jan 05, 2010 – Rahul Gandhi: A coming of age June 19, 2011 – Has Rahul Gandhi come of age? (A TV Debate) Feb 6, 2012 – Has Rahul Gandhi come of age as a politician? – By Rajdeep Sardesai Jan 17, 2014 – Has Rahul Gandhi come of age as a politician? – Another TV debate, again by Rajdeep Sardesai Jan 27, 2014 – Has Rahul Gandhi come of age? Why two stories of “Rahul Coming of Age” in 2014 you ask? 2014 General Elections Stupid! And we aren’t even looking for other articles, titled differently, just this cliched phrase of “coming of age”, used in Rahul Gandhi’s context year in year out. One can find numerous other articles with keywords like “comeback”, “mojo”, “return” and so on, associated with the Shehzaada. So now do you understand why suddenly all of our neutral journalists tweeted high praise for a Lok Sabha MP, with no administrative track record, who has never done a job in his entire life, and who disappeared for 56 days, even as Parliament was in session? Last two days are just an extension of media’s lifelong endeavor of seeing him at 7RCR, so that they can enjoy free run with their propaganda.
Low
[ 0.5166340508806261, 33, 30.875 ]
I'm never one to back down from a challenge, particularly when it comes to tests of manhood, cunning, and derring-do. After all, you're looking at the keg stand Gold Medalist in the 1998 PiKA-AEPhi Alcohol Olympics (45 seconds, baby!) But in this case, I'm going to have to settle for a test of prognostication abilities. And so, without further ado, here are my predictions for the Challenge: 1. Nationals season record: 65-97 2. Nationals NL East division place and games back (if any): 5th place, 22.5 games back. 3. Date on which Nick Johnson first appears in a Nationals game: July 4, 2007.
Mid
[ 0.54120267260579, 30.375, 25.75 ]
{ "type": "bundle", "id": "bundle--8c60c1d3-5592-4c19-adce-7a886c4d886a", "spec_version": "2.0", "objects": [ { "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "source_ref": "course-of-action--93e7968a-9074-4eac-8ae9-9f5200ec3317", "target_ref": "attack-pattern--7b211ac6-c815-4189-93a9-ab415deca926", "relationship_type": "mitigates", "description": "Do not allow a user to be a local administrator for multiple systems.", "id": "relationship--4ff3969a-4992-43c0-b4dc-02a21f5c9b2b", "type": "relationship", "modified": "2020-03-12T17:03:16.294Z", "created": "2020-01-30T17:03:43.449Z" } ] }
Mid
[ 0.603015075376884, 30, 19.75 ]
Two Saudi health workers who had been in contact for patients with Middle East respiratory syndrome (MERS) coronavirus infections are among three new cases reported to the World Health Organisation, the UN agency has said. The WHO said the female health staff, from the Saudi regions of Assir and Riyadh, both had mild symptoms of MERS, while a third new case in a 67-year-old woman from Riyadh was more severe, with that patient being treated in hospital. A study by international team of infectious diseases experts who went to Saudi Arabia in May to analyse an outbreak concluded that MERS infection is a "serious risk" in hospitals because it is easily transmitted in healthcare settings. The virus, which can cause coughing, fever and pneumonia in those it infects and is often fatal, emerged in last year and has since spread from the Gulf to France, Germany, Italy, Tunisia and Britain. Globally to date, there have been a total of 94 laboratory-confirmed cases including 46 deaths, according to latest WHO figures. The vast majority of cases have been in Saudi Arabia. The Geneva-based WHO said clinics and hospital caring for patients suspected or confirmed with MERS infection "should take appropriate measures to decrease the risk of transmission ... to other patients, health care workers and visitors". The United Nations health agency last week issued travel and health advice for the millions of pilgrims who flock to the holy Saudi cities of Makkah and Madinah for the annual haj, saying the risk of MERS infection among them was "very low."
Mid
[ 0.644736842105263, 36.75, 20.25 ]
1. Field of the Invention This invention is related to an agitator and in particular to one which can stir a mixture thoroughly and rapidly. 2. Description of the Prior Art As shown in FIG. 7, the conventional agitator includes a barrel 30 in which are mounted a series of blades 31. The blades 31 are driven by an electric motor to stir up the mixture in the barrel 30. Nevertheless, the blades 31 are rotated to turn up the mixture in use and so in case of dried mixture, the barrel 30 must be covered with a lid in order to prevent the mixture from floating in the air thereby causing much inconvenience in use. When stirring wet mixture such as concrete or the like, it will take a long time to stir well the mixture as such an agitator can stir only a small amount of the mixture each time thus making it unfit for practical use. Furthermore, the mixture close to the cylindrical surface of the barrel 30 will not be touched by the blades 31 and so the mixture will not be thoroughly agitated. Therefore, it is an object of the present invention to provide an improved agitator which can obviate and mitigate the above-mentioned drawbacks.
Mid
[ 0.5490196078431371, 35, 28.75 ]
Introduction {#Sec1} ============ Tuberculosis (TB) remains one of the health problems in the developing world even after the development of effective treatment \[[@CR1]\]. TB becomes the leading cause of death from a single infectious disease \[[@CR2]\]. Globally, 10.4 million new TB cases were recorded in 2015 \[[@CR2]\], Africa accounting for 26% of the global TB \[[@CR2]\]. Out of the 30 high TB burden countries, Ethiopia ranks 11th \[[@CR2]\] and the prevalence of TB per 100,000 populations in Ethiopia was 482 in 1994 \[[@CR3]\] and declined progressively to 200 in 2014 \[[@CR4]\]. The estimate of TB incidence per 100,000 populations was 431 in 1997 which was declined to 192 in 2015 \[[@CR2]\]. The prevalence of multidrug-resistant (MDR)-TB in Ethiopia has been increasing from 1.6 to 2.3% in new cases and 11.8--17.8% in previously treated TB cases from 2005 to 2014 \[[@CR5]\]. In addition, 17.6% of all TB patients in Ethiopia were co-infected with HIV \[[@CR5]\]. The Federal Ministry of Health of Ethiopia (FMOH) has been implementing a number of strategies specific to TB, TB/HIV, and MDR-TB. Direct Observed Treatment Short-course (DOTS) was recommended by WHO since the mid-1990s. DOTS has been started in Ethiopia in 1992 as a pilot \[[@CR6], [@CR7]\] and since then Ethiopia has been implementing DOTS. So far, TB treatment outcomes in Ethiopia were evaluated in a limited number of easily accessible health facilities \[[@CR8]--[@CR25]\]. However, treatment outcomes are dependent on adherence to the treatment protocol which is also dependent on the knowledge and commitment of patients and health professionals \[[@CR26]\]. This implies that patients who live in less accessible and geographically distant places could have low level of knowledge that may contribute to the reduced adherence to treatment \[[@CR27], [@CR28]\]. Studies indicated that treatment success rate (TSR) in Ethiopia varies from 26% \[[@CR11]\] to 94.4% \[[@CR13]\] depending on different factors. Therefore, evaluating the treatment outcomes of specific localities such as that of the South Omo Zone (SOZ) could play an important role in addressing the TB control problems of the Zone. The objective of this study was, therefore, to evaluate the TB treatment outcomes and identify associated risk factors in the Jinka General Hospital (JGH), southern Ethiopia. Main text {#Sec2} ========= Materials and methods {#Sec3} --------------------- ### Study settings {#Sec4} The study was carried out using data extracted from medical records of TB patients registered in the JGH between July 2004 and June 2014. The JGH is located in SOZ, southern Ethiopia. According to the 2007 census, the total population of the SOZ was 577,673 (7.5% urban and 92.5% rural) of whom 50% were men \[[@CR29]\]. In the SOZ, the first health center was established in April 1962 (Hospital archive). Presently, the JGH, the only Hospital in the SOZ, has been serving the community since April 2001. Direct Observed Treatment Short-course was introduced in the Southern Nations and Nationalities People Region (SNNPR), in 1996 \[[@CR30]\] and started in the SOZ in 2001 at the JGH setting (personal communication). Its effectiveness has never been evaluated. The JGH uses first-line TB drugs in a combination of two or more drugs which includes streptomycin (S), ethambutol (E), isoniazid (H), rifampicin (R) and pyrazinamide (Z). Treatment regimens were: short course chemotherapy (SCC)---2(RHZ) plus or minus E or S/followed by 6(EH) or 4(RH) for new patients; 2S(RHZE), 1(RHZE) and 5(RHE) for re-treatment patients, and Long course chemotherapy (LCC)---2S(HE)/10(RE) for patients with serious liver disease \[[@CR31]\]. Since 2009, the continuation phase regimen has been changed from 6(EH) to 4(RH) \[[@CR32]\]. ### Definitions {#Sec5} Tuberculosis patients clinically and, before and after TB treatment were categorized based on guidelines of Ethiopian TB, TB/HIV and leprosy control program and WHO \[[@CR33], [@CR34]\]. ### Data collection {#Sec6} Tuberculosis treatment registers in JGH from July 2004 to June 2014 were used as the data source. The data collected included year of treatment, sex, age, treatment history, type of TB, HIV test result and treatment outcomes. The collected data were entered into an Excel spreadsheet and the data were cross-checked for the correctness before analysis. ### Data analysis {#Sec7} Data analysis was made by transforming the data from Excel into IBM SPSS Statistics 20. The results were presented using descriptive statistics. The associations between TB treatment outcomes and independent variables were computed using binary logistic regression. Crude odds ratio (COR) and adjusted odds ratio (AOR) were used to present the results. value less than 0.05 was considered statistically significant. Results {#Sec8} ------- ### Demographic and clinical characteristics of TB patients {#Sec9} Demographic and clinical characteristics of TB patients were summarized in Table [1](#Tab1){ref-type="table"}. A total of 2156 TB patients (59.4% male) with the age range of 0.25--95 years were registered during the 10 years. The mean, standard deviation and median age of the TB patients were 30.1, 15.4 and 29, respectively. The highest percentage (77.7%) of the cases was in the age range 15--54 years. The proportion of smear-negative pulmonary TB (PTB−) cases, new cases, re-treatment cases and transfer-in cases were 48.4, 92.3, 5.3 and 2.3% respectively. TB/HIV co-infection was 19.6% (315/1604) and higher percentage was recorded in smear-negative PTB (PTB−) patients.Table 1Demographic characteristics of TB patients registered at JGH (July 2004--June 2014)CharacteristicsNumber (%) stratified by type of TBTotal N (%) PTB−PTB+EPTBSex Female420 (40.2)225 (40.7)231 (41.3)876 (40.6) Male624 (59.8)328 (59.3)328 (58.7)1280 (59.4)Age in years \< 15150 (14.4)31 (5.6)119 (21.3)300 (13.9) 15--24137 (13.1)149 (26.9)132 (23.6)418 (19.4) 25--34297 (28.4)202 (36.5)163 (29.2)662 (30.7) 35--44219 (21.0)88 (15.9)80 (14.3)387 (17.9) 45--54116 (11.1)60 (10.8)32 (5.7)208 (9.6) ≥ 55125 (12.0)23 (4.2)33 (5.9)181 (8.4)TB patients category New TB cases976 (93.5)495 (89.5)520 (93.0)1991 (92.3) Re-treatment TB cases53 (5.1)37 (6.7)25 (4.5)115 (5.3) Transfer-in TB cases15 (1.4)21 (3.8)14 (2.5)50 (2.3)HIV test result Non reactive602 (57.7)331 (59.9)356 (63.7)1289 (59.8) Reactive209 (20.0)69 (12.5)37 (6.6)315 (14.6) Unknown233 (22.3)153 (27.7)166 (29.7)552 (25.6)Year of registration for TB treatment July 2004--June 200525 (2.4)48 (8.7)30 (5.4)103 (4.8) July 2005--June 200657 (5.5)27 (4.9)53 (9.5)137 (6.4) July 2006--June 200782 (7.9)39 (7.1)56 (10.0)177 (8.2) July 2007--June 2008104 (10.0)47 (8.5)50 (8.9)201 (9.3) July 2008--June 2009102 (9.8)46 (8.3)31 (5.5)179 (8.3) July 2009--June 2010124 (11.9)43 (7.8)31 (5.5)198 (9.2) July 2010--June 2011189 (18.1)41 (7.4)70 (12.5)300 (13.9) July 2011--June 2012224 (21.5)92 (16.6)87 (15.6)403 (18.7) July 2012--June 201361 (5.8)71 (12.8)72 (12.9)204 (9.5) July 2013--June 201476 (7.3)99 (17.9)79 (14.1)254 (11.8)Total1044 (48.4)553 (25.6)559 (25.9)2156 (100) ### Treatment outcomes {#Sec10} Treatment outcomes of the cases are summarized in Table [2](#Tab2){ref-type="table"}. Out of 2156 TB patients registered at the JGH between 2004 and 2014, 45.6% (984/2156) was transferred out. Treatment outcomes were available only for 54.4% (1172/2156) of the patients. Out of the later, 13.1, 60.9, 10.2 and 9.1% were cured, treatment completed, died and loss to follow-up, respectively. TSR was 91.5% (43/47), 80.8% (227/281), 78.9% (422/535) and 84.1% (53/63) in transfer-in, smear-positive pulmonary TB (PTB+), HIV negative, and July 2012--June 2013 registered cases respectively. The cure rates were 54.8% (154/281) and 67.8% (154/227) in all cases and PTB+ cases, respectively. Higher numbers of unsuccessful treatment outcomes were recorded in PTB− cases. The TSR showed an increasing trend in the first 5 years and then a declining trend except during 1 year (July 2012 and June 2013).Table 2Treatment outcomes of TB patients in JGH (July 2004--June 2014)CharacteristicsNumber (%) stratified by the treatment outcomesTotal\ N (%) P valueSuccessful treatment outcomes 868 (74)Unsuccessful treatment outcomes 304 (24)CuredTreatment completedDiedT. failure^a^Loss to follow-upInterrupterSex Female66 (14.2)299 (64.3)40 (8.6)0 (0.0)30 (6.5)30 (6.5)465 (39.7)0.059 Male88 (12.4)415 (58.7)79 (11.2)1 (0.1)77 (10.9)47 (6.6)707 (60.3)Age in years \< 155 (3.4)101 (69.7)10 (6.9)0 (0.0)8 (5.5)21 (14.5)145 (12.4)\< 0.001 15--2455 (21.7)145 (57.1)19 (7.5)0 (0.0)22 (8.7)13 (5.1)254 (21.7) 25--3456 (15.3)216 (59.2)39 (10.7)1 (0.3)34 (9.3)19 (5.2)365 (31.1) 35--4423 (10.6)138 (63.3)24 (11.0)0 (0.0)22 (10.1)11 (5.0)218 (18.6) 45--5410 (10.4)50 (52.1)16 (16.7)0 (0.0)12 (12.5)8 (8.3)96 (8.2) ≥ 555 (5.3)64 (68.1)11 (11.7)0 (0.0)9 (9.6)5 (5.3)94 (8.0)TB patients category New TB cases125 (12.0)633 (61.0)107 (10.3)0 (0.0)98 (9.4)75 (7.2)1038 (88.6)\< 0.001 Re-treatment TB cases16 (30.2)22 (51.2)5 (11.6)0 (0.0)3 (7.0)0 (0.0)43 (3.7) Transfer-in TB cases13 (27.7)30 (63.8)1 (2.1)0 (0.0)2 (4.3)1 (2.1)47 (4.0)Type of TB PTB−NA436 (71.5)72 (11.8)NA51 (8.4)51 (8.4)610 (52.0)\< 0.001 PTB+154 (54.8)73 (26.0)24 (8.5)1 (0.4)22 (7.8)7 (2.5)281 (24.0) EPTBNA205 (73.0)23 (8.2)NA34 (12.1)19 (6.8)281 (24.0)HIV test result Non reactive81 (15.1)341 (63.7)29 (5.4)0 (0.0)39 (7.3)45 (8.4)535 (45.6)\< 0.001 Reactive28 (11.9)138 (58.7)41 (17.4)0 (0.0)15 (6.4)13 (5ρ.5)235 (20.1) Unknown45 (11.2)235 (58.5)49 (12.2)1 (0.2)53 (13.2)19 (4.7)402 (34.3)Year of TB treatment July 2004--June 200510 (12.2)43 (52.4)14 (17.1)1 (1.2)13 (15.9)1 (1.2)82 (7.0)\< 0.001 July 2005--June 20069 (8.3)63 (57.8)21 (19.3)0 (0.0)15 (13.8)1 (0.9)109 (9.3) July 2006--June 200713 (8.9)91 (62.3)11 (7.5)0 (0.0)21 (14.40)10 (6.8)146 (12.5) July 2007--June 200818 (11.8)101 (66.0)19 (12.4)0 (0.0)10 (6.5)5 (3.3)153 (13.1) July 2008--June 200920 (16.3)83 (67.5)11 (8.9)0 (0.0)4 (3.3)5 (4.1)123 (10.5) July 2009--June 201019 (13.7)92 (66.2)12 (8.6)0 (0.0)12 (8.6)4 (2.9)139 (11.9) July 2010--June 201121 (11.7)120 (67.0)8 (4.5)0 (0.0)8 (4.5)22 (12.3)179 (15.3) July 2011--June 201215 (14.3)57 (54.3)6 (5.7)0 (0.0)8 (7.6)19 (18.1)105 (9.0) July 2012--June 201319 (30.2)34 (54.0)6 (9.5)0 (0.0)1 (1.6)3 (4.8)63 (5.4) July 2013--June 201410 (13.7)30 (41.1)11 (15.1)0 (0.0)15 (20.5)7 (9.6)73 (6.2)Total154 (13.1)714 (60.9)119 (10.2)1 (0.1)107 (9.1)77 (6.6)1172 (100)*NA* not applicable, *T. failure* ^a^ treatment failure ### Treatment success and associated factors of TB patients {#Sec11} Multiple logistic regression analysis indicated that male (AOR = 0.70, 95% CI 0.52--0.93) and TB/HIV co-infection (AOR = 0.67, 95% CI 0.46--0.98) were significantly associated with reduced odds of treatment success (Table [3](#Tab3){ref-type="table"}). While patients who transferred-in (AOR = 3.80, 95% CI 1.32--10.94) and PTB+ (AOR = 1.81, 95% CI 1.24--2.64) were significantly associated with the odds of having better treatment success.Table 3Factors associated with treatment success rate TB cases at JGH (July 2004--June 2014)CharacteristicsTotal\ N (%)Treatment success N (%)Crude OR (95% CI)Adjusted OR (95% CI)P valueSex Female465 (39.7)365 (78.5)1.001.00 Male707 (60.3)503 (71.1)*0.68 (0.51--0.89)0.70 (0.52--0.93)0.013*Age in years \< 15145 (12.4)106 (73.1)1.001.00 15--24254 (21.7)200 (78.7)1.36 (0.85--2.19)1.30 (0.79--2.14)0.301 25--34365 (31.1)272 (74.5)1.08 (0.70--1.66)1.18 (0.74--1.87)0.493 35--44218 (18.6)161 (73.9)1.04 (0.65--1.67)1.13 (0.68--1.86)0.645 45--5496 (8.2)60 (62.5)0.61 (0.35--1.07)0.63 (0.35--1.13)0.122 ≥ 5594 (8.0)69 (73.4)1.02 (0.57--1.83)1.04 (0.56--1.91)0.912TB patients category New TB cases1038 (88.6)758 (73.0)1.001.00 Re-treatment TB cases87 (7.4)67 (77.0)1.24 (0.74--2.08)0.94 (0.55--1.62)0.831 Transfer-in TB cases47 (4.0)43 (91.5)*3.97 (1.41--11.16)3.79 (1.31--10.92)0.014*Type of TB PTB−610 (52.0)436 (71.5)1.001.00 PTB+281 (24.0)227 (80.8)*1.68 (1.19--2.37)1.81 (1.24--2.64)0.002* EPTB281 (24.0)205 (73.0)1.08 (0.78--1.48)1.19 (0.84--1.68)0.328HIV test result Non reactive535 (45.6)422 (78.9)1.001.00 Reactive235 (20.1)166 (70.6)*0.64 (0.45--0.91)0.67 (0.45--0.98)0.036* Unknown402 (34.3)280 (69.7)*0.62 (0.46--0.83)*0.81 (0.44--1.49)0.492Year of registration for TB treatment July 2004--June 200582 (7.0)53 (64.6)1.001.00 July 2005--June 2006109 (9.3)72 (66.1)1.07 (0.58--1.94)1.17 (0.63--2.18)0.614 July 2006--June 2007146 (12.5)104 (71.2)1.36 (0.76--2.41)1.62 (0.89--2.93)0.114 July 2007--June 2008153 (13.1)119 (77.8)*1.92 (1.06--3.46)2.29 (1.03--5.09)0.043* July 2008--June 2009123 (10.5)103 (83.7)*2.82 (1.46--5.45)3.29 (1.38--7.84)0.007* July 2009--June 2010139 (11.9)111 (79.9)*2.17 (1.17--4.01)2.53 (1.11--5.75)0.027* July 2010--June 2011179 (15.3)141 (78.8)*2.03 (1.14--3.62)2.37 (1.03--5.45)0.042* July 2011--June 2012105 (9.0)72 (68.6)1.19 (0.65--2.20)1.36 (0.59--3.14)0.474 July 2012--June 201363 (5.4)53 (84.1)*2.90 (1.29--6.54)2.78 (1.01--7.66)0.048* July 2013--June 201473 (6.2)40 (54.8)0.66 (0.35--1.27)0.65 (0.26--1.60)0.348Italic values to show significance Discussion {#Sec12} ---------- In the present study, the records of TB cases registered at JGH between 2004 and 2014 were extracted and analyzed for the evaluation of the treatment outcomes. The analysis was done for 54.4% (1172/2156) of TB cases. The ratio of male to female cases was 1.5:1, which is in agreement with the reports of WHO \[[@CR2]\] and with those of the previous studies in Ethiopia \[[@CR11], [@CR14], [@CR16], [@CR23], [@CR24]\] and in other countries \[[@CR35]--[@CR39]\]. The larger number of TB cases in males than females could be due to biological differences, the difference in societal roles and access to health facilities \[[@CR40], [@CR41]\]. The finding of this study showed that the percentage of TB was highest in the productive age group (15--54) and it was in agreement with the results of studies conducted in Ethiopia \[[@CR8], [@CR14], [@CR25]\] and Bhutan \[[@CR42]\]. Such findings could be due to the greater mobility of this age group for economic and social reasons. TB/HIV co-infection recorded in the present study was higher than the average percentages of Ethiopia and that of the Southern region of Ethiopia \[[@CR5]\]. Moreover, it was higher than those of other studies in Ethiopia \[[@CR9], [@CR10], [@CR13], [@CR18], [@CR23]\] and in Spain \[[@CR37]\]. On the other hand, other studies \[[@CR8], [@CR11]\] reported higher percentages of TB/HIV co-infection compared to that of the present study. As suggested by an earlier study, the variation in the percentage of TB/HIV co-infection is mainly attributed to the prevalence of HIV in the study population \[[@CR43]\]. In this study, PTB− cases had higher number of TB/HIV co-infection than PTB+ cases. This is the fact that TB cases with HIV are less likely to be smear-positive \[[@CR44]\]. The TSR recorded, 74%, by this study was less than the target to be achieved, 87%, by 2015 \[[@CR45]\]. It was also less than the TSR reported from the other regions of Ethiopia \[[@CR9], [@CR10], [@CR13], [@CR15], [@CR21], [@CR24]\]. On the other hand, it was similar with that of one study \[[@CR11]\] and greater than that of reporting from the northern Ethiopia \[[@CR22]\] and greater than that reported from Nigeria \[[@CR39]\]. Such variations in TSR could be attributed to differences in socio-economic of the patients, geographic setting, sample size, study period and the TB clinic management. In the present study, 32.2% of PTB+ cases among who adhere and complete their treatment did not provide sputum for AFB examination according to the guideline \[[@CR33]\] or their smear results were not recorded. This could be due to lack of commitment of health professionals and/or poor awareness of PTB+ patients for checking their status during treatment. During the study period, there was an increment of TSR for the first 5 years and then decline between July 2012 and June 2013. The decline of TSR could be due to lack of continues support/encouragement for people working in TB clinic and/or poor awareness of TB patients. Male and TB/HIV co-infected cases demonstrated lower treatment success and this was in agreement with the findings reported in Ethiopia \[[@CR10], [@CR16], [@CR19], [@CR22]\] and in Malawi \[[@CR46]\]. Low treatment success in males could be attributed to risk-taking behavior like use of tobacco, alcohol and illicit drug \[[@CR47]\] and in TB/HIV co-infected patients could be due to co-administration of ART along with anti-TB therapy which can lead to drug--drug interactions, overlapping drug toxicities and immune reconstitution syndrome \[[@CR48]\]. In agreement with the studies in Ethiopia \[[@CR22]\] and in Malawi \[[@CR49]\], PTB+ cases in this study was associated with a higher treatment success which could be due to the easier accessibility of the drugs to the TB bacilli as the granuloma is usually burst in PTB+ cases and could also be due to more number of TB/HIV co-infected cases and higher number of death in PTB− patients. In addition, transfer-in patients had high probability of treatment success. It could be due to patients desire to be in an ideal health facility to continue and complete their treatment. The percentage of overall unsuccessful treatment outcomes reported by the present study was similar with some studies \[[@CR12], [@CR17], [@CR22]\] while greater than other studies \[[@CR8]--[@CR11], [@CR13]--[@CR16], [@CR18], [@CR20], [@CR21], [@CR23], [@CR24]\]. Greater numbers of unsuccessful TB cases in the present study could be attributed to being in a remote area which leads to poor knowledge and having poor socio-economic status together reduces treatment adherence \[[@CR27], [@CR28]\]. Conclusion and recommendations {#Sec13} ------------------------------ The TSR recorded in the present study was less than the target to be met by 2015. This implies the necessity of urgent management response to improve current TSR. The low percentage of cure rate in PTB+ patients could suggest the strengthening of services of TB Clinic of the JGH. This is an area that needs health system level intervention. HIV positivity and male gender were associated with poor treatment success which requires targeted TB control management. Hence, improvement and strengthening of comprehensive and targeted TB--HIV control program are recommended to the study area. Limitations {#Sec14} =========== This study had the following limitations and born from being secondary data: lack of HIV status for the significant number of cases that could affect treatment outcomes, the low percentage of PTB+ cases which could be attributed to negligence or poor skills of the technicians, inadequate sputum examination records for PTB+ cases during treatment which could be due to the negligence of health professionals and could be a reason for low cure rate and for only one treatment failure case, and finally a high percentage of transfer out cases which could be attributed to the long distance between the Hospital and living districts of the patients which obliges the transfer out of the patients so that they can be treated at the nearby health center. Additional file {#Sec15} =============== **Additional file 1.** 10 years (2004--2014) TB DOTS data of JGH, Ethiopia. This is a file which contains information has been used for data analysis. AOR : adjusted odds ratio COR : crude odds ratio DOTS : Direct Observed Treatment Short-course JGH : Jinka General Hospital MDR : multi-drug resistant PTB− : smear-negative pulmonary TB PTB+ : smear-positive pulmonary TB SOZ : South Omo Zone TB : tuberculosis **Electronic supplementary material** The online version of this article (10.1186/s13104-017-3020-z) contains supplementary material, which is available to authorized users. BW was the principal investigator, conceived the study, designed, participated in data collection, conducted data analysis and interpretation, and wrote the manuscript. GM participated in its design, data analysis and interpretation, and manuscript writing. TT participated in its data analysis and interpretation, and manuscript writing. WM participated in its data collection and manuscript writing. MT participated in its data collection and manuscript writing. GA participated as a supervisor in its conception, design, data analysis and interpretation, and manuscript writing. All authors read and approved the final manuscript. Acknowledgements {#FPar1} ================ The authors would like to thank staff members of South Omo Health Office and JGH, particularly Mrs. Sofia, Dr. Nardos, Mr. Ayalkbet, Mr. Alo, Mr. Efream, Mr. Abera and Mr. Gebeyehu for facilitating data collection process. Competing interests {#FPar2} =================== The authors declare that they have no competing interests. Availability of data and materials {#FPar3} ================================== All data generated or analyzed during this study are included in this published article and its Additional file [1](#MOESM1){ref-type="media"} "10 years (2004 to 2014) TB DOTS Data of JGH, Ethiopia". Consent for publication {#FPar4} ======================= Not applicable. Ethics approval and consent to participate {#FPar5} ========================================== Ethical clearance for the study was granted by Institutional Review Board of Aklilu Lemma Institute of Pathobiology, Addis Ababa University (Ref. No. ALIPB/9175/2005/12). Consent was obtained from SOZ Health Department and JGH to get the necessary secondary data from JGH. Funding {#FPar6} ======= The research was funded by Addis Ababa University Thematic Research Project Granted to Prof. Gobena Ameni. Publisher's Note {#FPar7} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Mid
[ 0.568493150684931, 31.125, 23.625 ]
Well, I called Fort Benning's Animal Control Center to see how the cat was doing. The lady that spoke said the cat "had been euthanized because of the severity of its condition". I was literally speechless. Not only did the Animal Control Officer either lie to Me about the no-kill policy, the cat's condition was nowhere near hopeless, at least to My untrained eye. Well, maybe it was. I am not an animal expert. To Me, it really just looked very underfed, and it was at least well enough to forage around for what food it could find until I unwittingly rescued it to death.
Low
[ 0.5074626865671641, 29.75, 28.875 ]
Q: jQuery dynamically mark all checkboxes checked I have the following HTML structure - <div class="first_checkbox"> <input type="checkbox" name="checkbox" class="all-checkbox" value=""> </div> <table> <tr> <td> <input type="checkbox" name="checkbox-32" id="checkbox-32" value="" style="opacity: 0;" /> </td> <td class="h_pincode">380059</td> <td class="b_add2">Nr. Swatik Cross Road, Navrangpura</td> </tr> <tr> <td> <input type="checkbox" name="checkbox-34" id="checkbox-34" value="" style="opacity: 0;" /> </td> <td class="h_pincode">380015</td> </tr> </table> The functionality, I want to achieve is, when I click on the first radio box, all the subsequent checkbox in s be checked. The JS to do that is as follows - $(function(){ $(".all-checkbox").on("click", function(){ $('input[type=checkbox]').each(function(ind, val){ $(this).prop('checked', 'checked'); console.log(this.name + ' ' + this.value + ' ' + this.checked); }); }); }); I am getting the console logs correctly, only difference being, the radio boxes does not get checked. The fiddle is located here - http://jsfiddle.net/dAJM8/ A: check jsFiddle JQuery $("#checkbox-all").click(function () { $('input:checkbox').not(this).prop('checked', this.checked); });
Mid
[ 0.583333333333333, 33.25, 23.75 ]
Top Ten Trends In California Form Si 11 To Watch | California Form Si 11 National political action and accountability anchorman accoutrement money and access in politics On a airy day this summer, about 40 bos circuitous at the Malibu home of a Hollywood television writer, the sounds of the Pacific Ocean aition outside. They were there to accommodated and accession money for a political candidate, a archetypal arena in this go-to arena for Democratic attack cash. Except that the applicant — Madeleine Dean — is not a civic ascent star. She is a accompaniment administrator and first-time House applicant from southeast Pennsylvania. The host, Bill Chais, co-executive ambassador of the CBS ball “Bull,” said he has become “maniacal” about allowance Democrats booty aback the House in 2018. But rather than acid a ysis to the Democratic Party, he is acrimonious alone candidates — poring over endorts by Emily’s List and trading political handicapping emails with Hollywood friends. Hollywood’s animation for this year’s midterm elections rivals that of contempo presidential campaigns, according to Democratic donors and strategists in the Los Angeles breadth who say the activity is apprenticed by a acceptance that a Democratic-controlled House can serve as a able ysis on Admiral Trump. People who assignment in the television, cine and music Top Ten Trends In California Form Si 11 To Watch | California Form Si 11 – california form si 100 | Welcome to be able to my personal website, in this particular period I am going to explain to you concerning california form si 100 . And today, this is the very first photograph:
Low
[ 0.49579831932773105, 29.5, 30 ]
/* %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % AAA V V SSSSS % % A A V V SS % % AAAAA V V SSS % % A A V V SS % % A A V SSSSS % % % % % % Read/Write AVS X Image Format % % % % Software Design % % Cristy % % July 1992 % % % % % % Copyright 1999-2017 ImageMagick Studio LLC, a non-profit organization % % dedicated to making software imaging solutions freely available. % % % % You may not use this file except in compliance with the License. You may % % obtain a copy of the License at % % % % http://www.imagemagick.org/script/license.php % % % % Unless required by applicable law or agreed to in writing, software % % distributed under the License is distributed on an "AS IS" BASIS, % % WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. % % See the License for the specific language governing permissions and % % limitations under the License. % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % */ /* Include declarations. */ #include "magick/studio.h" #include "magick/blob.h" #include "magick/blob-private.h" #include "magick/cache.h" #include "magick/colorspace.h" #include "magick/colorspace-private.h" #include "magick/exception.h" #include "magick/exception-private.h" #include "magick/image.h" #include "magick/image-private.h" #include "magick/list.h" #include "magick/magick.h" #include "magick/memory_.h" #include "magick/monitor.h" #include "magick/monitor-private.h" #include "magick/pixel-accessor.h" #include "magick/quantum-private.h" #include "magick/static.h" #include "magick/string_.h" #include "magick/module.h" /* Forward declarations. */ static MagickBooleanType WriteAVSImage(const ImageInfo *,Image *); /* %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % R e a d A V S I m a g e % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % ReadAVSImage() reads an AVS X image file and returns it. It % allocates the memory necessary for the new Image structure and returns a % pointer to the new image. % % The format of the ReadAVSImage method is: % % Image *ReadAVSImage(const ImageInfo *image_info,ExceptionInfo *exception) % % A description of each parameter follows: % % o image_info: the image info. % % o exception: return any errors or warnings in this structure. % */ static Image *ReadAVSImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MemoryInfo *pixel_info; register PixelPacket *q; register ssize_t x; register unsigned char *p; size_t height, width; ssize_t count, y; unsigned char *pixels; /* Open image file. */ assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickSignature); if (image_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s", image_info->filename); assert(exception != (ExceptionInfo *) NULL); assert(exception->signature == MagickSignature); image=AcquireImage(image_info); status=OpenBlob(image_info,image,ReadBinaryBlobMode,exception); if (status == MagickFalse) { image=DestroyImageList(image); return((Image *) NULL); } /* Read AVS X image. */ width=ReadBlobMSBLong(image); height=ReadBlobMSBLong(image); if (EOFBlob(image) != MagickFalse) ThrowReaderException(CorruptImageError,"ImproperImageHeader"); if ((width == 0UL) || (height == 0UL)) ThrowReaderException(CorruptImageError,"ImproperImageHeader"); do { ssize_t length; /* Convert AVS raster image to pixel packets. */ image->columns=width; image->rows=height; image->depth=8; if ((image_info->ping != MagickFalse) && (image_info->number_scenes != 0)) if (image->scene >= (image_info->scene+image_info->number_scenes-1)) break; status=SetImageExtent(image,image->columns,image->rows); if (status == MagickFalse) { InheritException(exception,&image->exception); return(DestroyImageList(image)); } pixel_info=AcquireVirtualMemory(image->columns,4*sizeof(*pixels)); if (pixel_info == (MemoryInfo *) NULL) ThrowReaderException(ResourceLimitError,"MemoryAllocationFailed"); pixels=(unsigned char *) GetVirtualMemoryBlob(pixel_info); length=(size_t) 4*image->columns; for (y=0; y < (ssize_t) image->rows; y++) { count=ReadBlob(image,length,pixels); if (count != length) ThrowReaderException(CorruptImageError,"UnableToReadImageData"); p=pixels; q=QueueAuthenticPixels(image,0,y,image->columns,1,exception); if (q == (PixelPacket *) NULL) break; for (x=0; x < (ssize_t) image->columns; x++) { SetPixelAlpha(q,ScaleCharToQuantum(*p++)); SetPixelRed(q,ScaleCharToQuantum(*p++)); SetPixelGreen(q,ScaleCharToQuantum(*p++)); SetPixelBlue(q,ScaleCharToQuantum(*p++)); if (q->opacity != OpaqueOpacity) image->matte=MagickTrue; q++; } if (SyncAuthenticPixels(image,exception) == MagickFalse) break; if (image->previous == (Image *) NULL) { status=SetImageProgress(image,LoadImageTag,(MagickOffsetType) y, image->rows); if (status == MagickFalse) break; } } pixel_info=RelinquishVirtualMemory(pixel_info); if (EOFBlob(image) != MagickFalse) { ThrowFileException(exception,CorruptImageError,"UnexpectedEndOfFile", image->filename); break; } /* Proceed to next image. */ if (image_info->number_scenes != 0) if (image->scene >= (image_info->scene+image_info->number_scenes-1)) break; width=ReadBlobMSBLong(image); height=ReadBlobMSBLong(image); if ((width != 0UL) && (height != 0UL)) { /* Allocate next image structure. */ AcquireNextImage(image_info,image); if (GetNextImageInList(image) == (Image *) NULL) { image=DestroyImageList(image); return((Image *) NULL); } image=SyncNextImageInList(image); status=SetImageProgress(image,LoadImagesTag,TellBlob(image), GetBlobSize(image)); if (status == MagickFalse) break; } } while ((width != 0UL) && (height != 0UL)); (void) CloseBlob(image); return(GetFirstImageInList(image)); } /* %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % R e g i s t e r A V S I m a g e % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % RegisterAVSImage() adds attributes for the AVS X image format to the list % of supported formats. The attributes include the image format tag, a % method to read and/or write the format, whether the format supports the % saving of more than one frame to the same file or blob, whether the format % supports native in-memory I/O, and a brief description of the format. % % The format of the RegisterAVSImage method is: % % size_t RegisterAVSImage(void) % */ ModuleExport size_t RegisterAVSImage(void) { MagickInfo *entry; entry=SetMagickInfo("AVS"); entry->decoder=(DecodeImageHandler *) ReadAVSImage; entry->encoder=(EncodeImageHandler *) WriteAVSImage; entry->description=ConstantString("AVS X image"); entry->module=ConstantString("AVS"); (void) RegisterMagickInfo(entry); return(MagickImageCoderSignature); } /* %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % U n r e g i s t e r A V S I m a g e % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % UnregisterAVSImage() removes format registrations made by the % AVS module from the list of supported formats. % % The format of the UnregisterAVSImage method is: % % UnregisterAVSImage(void) % */ ModuleExport void UnregisterAVSImage(void) { (void) UnregisterMagickInfo("AVS"); } /* %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % % % % % W r i t e A V S I m a g e % % % % % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % WriteAVSImage() writes an image to a file in AVS X image format. % % The format of the WriteAVSImage method is: % % MagickBooleanType WriteAVSImage(const ImageInfo *image_info,Image *image) % % A description of each parameter follows. % % o image_info: the image info. % % o image: The image. % */ static MagickBooleanType WriteAVSImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; MagickOffsetType scene; MemoryInfo *pixel_info; register const PixelPacket *magick_restrict p; register ssize_t x; register unsigned char *magick_restrict q; ssize_t count, y; unsigned char *pixels; /* Open output image file. */ assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickSignature); assert(image != (Image *) NULL); assert(image->signature == MagickSignature); if (image->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",image->filename); status=OpenBlob(image_info,image,WriteBinaryBlobMode,&image->exception); if (status == MagickFalse) return(status); scene=0; do { /* Write AVS header. */ (void) TransformImageColorspace(image,sRGBColorspace); (void) WriteBlobMSBLong(image,(unsigned int) image->columns); (void) WriteBlobMSBLong(image,(unsigned int) image->rows); /* Allocate memory for pixels. */ pixel_info=AcquireVirtualMemory(image->columns,4*sizeof(*pixels)); if (pixel_info == (MemoryInfo *) NULL) ThrowWriterException(ResourceLimitError,"MemoryAllocationFailed"); pixels=(unsigned char *) GetVirtualMemoryBlob(pixel_info); /* Convert MIFF to AVS raster pixels. */ for (y=0; y < (ssize_t) image->rows; y++) { p=GetVirtualPixels(image,0,y,image->columns,1,&image->exception); if (p == (PixelPacket *) NULL) break; q=pixels; for (x=0; x < (ssize_t) image->columns; x++) { *q++=ScaleQuantumToChar((Quantum) (QuantumRange-(image->matte != MagickFalse ? GetPixelOpacity(p) : OpaqueOpacity))); *q++=ScaleQuantumToChar(GetPixelRed(p)); *q++=ScaleQuantumToChar(GetPixelGreen(p)); *q++=ScaleQuantumToChar(GetPixelBlue(p)); p++; } count=WriteBlob(image,(size_t) (q-pixels),pixels); if (count != (ssize_t) (q-pixels)) break; if (image->previous == (Image *) NULL) { status=SetImageProgress(image,SaveImageTag,(MagickOffsetType) y, image->rows); if (status == MagickFalse) break; } } pixel_info=RelinquishVirtualMemory(pixel_info); if (GetNextImageInList(image) == (Image *) NULL) break; image=SyncNextImageInList(image); status=SetImageProgress(image,SaveImagesTag,scene++, GetImageListLength(image)); if (status == MagickFalse) break; } while (image_info->adjoin != MagickFalse); (void) CloseBlob(image); return(MagickTrue); }
Low
[ 0.5369649805447471, 34.5, 29.75 ]
<?php return function($model, $structure, $entry) { $form = new Kirby\Panel\Form($structure->fields(), $entry->toArray(), $structure->field()); $form->cancel($model); $form->buttons->submit->value = l('ok'); return $form; };
Low
[ 0.5172413793103441, 33.75, 31.5 ]
Determinants of emergency room visits for psychological problems in a general hospital. Determinants of emergency room visits for psychological reasons were studied prospectively for a four month period in an Indian General Hospital. Psychiatric emergencies constituted only 2% of all emergency visits. Most of the patients were new except for 7.4% who were already registered with the outpatient services of the psychiatry department. Males outnumbered females in a ratio of 2:1. Self-referrals constituted 77% of the samples; 21% of patients were brought by police. Two-thirds of the patients were brought owing to the severity of their clinical condition and the rest, one-third, for medico-legal and social reasons. Approximately 80% of the patients sought consultation within one month of the onset of illness episode. First episode of mental illness was within last one year of the emergency room visit in 60% patients. Past history of hospitalization for mental illness was obtained only in 10% of cases. The pattern suggested that there was no misuse of emergency services by psychiatric patients although 20% of the patients presented with social problems only which required social rather than psychiatric intervention.
Mid
[ 0.625570776255707, 34.25, 20.5 ]
760 N.W.2d 931 (2009) 277 Neb. 179 STATE of Nebraska ex rel. Counsel for Discipline of the Nebraska Supreme Court, relator, v. Willis G. YOESEL, respondent. No. S-07-1192. Supreme Court of Nebraska. February 20, 2009. *932 HEAVICAN, C.J., WRIGHT, CONNOLLY, GERRARD, STEPHAN, McCORMACK, and MILLER-LERMAN, JJ. PER CURIAM. INTRODUCTION This case is before the court on the voluntary surrender of license filed by respondent Willis G. Yoesel. The court accepts respondent's surrender of his license and enters an order of disbarment. FACTS Respondent was admitted to the practice of law in the State of Nebraska on June 27, 1972. On June 30, 2008, the Counsel for Discipline of the Nebraska Supreme Court filed formal charges against respondent. The formal charges filed on June 30, 2008, allege that on November 26, 2002, on behalf of Dorothy M. Muse, respondent filed in the county court for Richardson County an application for informal probate of will and appointment of personal representative in the estate of Paul E. Jorn, Sr. On November 27, letters of personal representative were issued to Muse. Notice of the estate proceedings was published and thereafter numerous creditor claims were filed against the estate. An inventory in the Jorn estate was not timely filed, and on May 19, 2003, the county court issued an order to show cause regarding the estate. The county court held a show cause hearing on June 11. At the hearing, the county court directed the personal representative to file an inventory by June 30. On July 8, respondent filed a short form inventory listing property individually owned by Jorn and property jointly owned by Jorn and Muse. On March 10, 2005, the county court issued another order to show cause regarding the Jorn estate. A show cause hearing was held and the court directed the personal representative to file estate closing documents by May 31. Respondent failed to file the closing documents by May 31 and failed to inform the court why he could not timely file the documents. On September 14, 2006, the court entered another order to show cause, and the show cause hearing was set for October 25. Respondent failed to attend the hearing. The hearing was rescheduled for December 6. At the hearing, the personal representative was directed to file closing papers and a proposed schedule of distribution by January 16, 2007. Respondent again failed to timely file any closing documents. On February 14, 2007, the court issued another show cause order setting a show cause hearing for March 19. Again, respondent failed to attend the hearing. The court gave the personal representative until March 28, to hire a replacement counsel to complete the estate. Muse hired new counsel on March 27. *933 On April 6, 2007, Counsel for Discipline received a grievance letter from Muse regarding the respondent. Muse alleged that she hired respondent in 2002 to handle the probate of the estate of Jorn but that respondent had not timely handled the estate proceedings, failed to attend one or more hearings, failed to timely provide Muse with her file materials so that she could give them to her replacement attorney, and failed to refund the unused portion of the advance she paid to respondent in 2002. A copy of Muse's grievance letter was mailed to respondent on April 9, 2007. The Counsel for Discipline made repeated inquiries to respondent for information concerning Muse's grievances. Respondent failed to provide all the information requested by the Counsel for Discipline. In the formal charges filed against respondent, the Counsel for Discipline alleges that respondent violated his oath of office as an attorney licensed to practice law in the State of Nebraska as provided by Neb.Rev.Stat. § 7-104 (Reissue 2007), and for the acts that occurred prior to September 1, 2005, respondent violated the following provisions of the Code of Professional Responsibility: Canon 1, DR 1-102 (misconduct); Canon 6, DR 6-101 (failing to act competently); and Canon 9, DR 9-102 (preserving identity of funds and property of client). The formal charges further allege that for respondent's actions that occurred after September 1, 2005, he violated the following provisions of what are now codified as Neb. Ct. R. of Prof. Cond.: § 3-501.3 (diligence), § 3-501.15 (safekeeping property), and § 3-508.4 (misconduct). Respondent answered the formal charges on September 22, 2008, and on October 9, this court appointed a referee. On December 19, respondent filed with this court a voluntary surrender of license, voluntarily surrendering his license to practice law in the State of Nebraska. In his voluntary surrender of license, respondent stated that, for the purpose of his voluntary surrender of license, he knowingly does not challenge or contest the truth of the allegations in the formal charges. In addition to surrendering his license, respondent voluntarily consented to the entry of an order of disbarment and waived his right to notice, appearance, and hearing prior to the entry of the order of disbarment. ANALYSIS Neb. Ct. R. § 3-315 provides in pertinent part: (A) Once a Grievance, a Complaint, or a Formal Charge has been filed, suggested, or indicated against a member, the member may voluntarily surrender his or her license. (1) The voluntary surrender of license shall state in writing that the member knowingly admits or knowingly does not challenge or contest the truth of the suggested or indicated Grievance, Complaint, or Formal Charge and waives all proceedings against him or her in connection therewith. Pursuant to § 3-315, we find that respondent has voluntarily surrendered his license to practice law and knowingly does not challenge or contest the truth of the allegations made against him in the formal charges. Further, respondent has waived all proceedings against him in connection therewith. We further find that respondent has consented to the entry of an order of disbarment. CONCLUSION Upon due consideration of the court file in this matter, the court finds that respondent voluntarily has stated that he knowingly does not challenge or contest the truth of the allegations in the formal charges that he failed to address client matters, failed to attend court hearings, *934 and failed to preserve the identity of client funds and violated his oath of office as an attorney. The court accepts respondent's surrender of his license to practice law, finds that respondent should be disbarred, and hereby orders him disbarred from the practice of law in the State of Nebraska, effective immediately. Respondent shall forthwith comply with all terms of Neb. Ct. R. § 3-316, and upon failure to do so, he shall be subject to punishment for contempt of this court. Accordingly, respondent is directed to pay costs and expenses in accordance with Neb.Rev.Stat. §§ 7-114 and 7-115 (Reissue 2007) and Neb. Ct. R. §§ 3-310(P) and 3-323 within 60 days after an order imposing costs and expenses, if any, is entered by the court. Judgment of disbarment.
Mid
[ 0.5424354243542431, 36.75, 31 ]
Q: Send SMS with RestComm-Connect Issue I tried to send SMS using restcomm http api, it was successful when sent with Media_Type="application/x-www-form-urlencoded" from SOAPUI. But while trying it with "application/json" it throws following error 01:00:22,439 SEVERE [com.sun.jersey.spi.container.ContainerRequest] (http-/127.0.0.1:8080-1) A message body reader for Java class javax.ws.rs.core.MultivaluedMap, and Java type javax.ws.rs.core.MultivaluedMap<java.lang.String, java.lang.String>, and MIME media type application/json was not found. The registered message body readers compatible with the MIME media type are: */* -> com.sun.jersey.core.impl.provider.entity.FormProvider com.sun.jersey.core.impl.provider.entity.MimeMultipartProvider com.sun.jersey.core.impl.provider.entity.StringProvider com.sun.jersey.core.impl.provider.entity.ByteArrayProvider com.sun.jersey.core.impl.provider.entity.FileProvider com.sun.jersey.core.impl.provider.entity.InputStreamProvider com.sun.jersey.core.impl.provider.entity.DataSourceProvider com.sun.jersey.core.impl.provider.entity.XMLJAXBElementProvider$General com.sun.jersey.core.impl.provider.entity.ReaderProvider com.sun.jersey.core.impl.provider.entity.DocumentProvider com.sun.jersey.core.impl.provider.entity.SourceProvider$StreamSourceReader com.sun.jersey.core.impl.provider.entity.SourceProvider$SAXSourceReader com.sun.jersey.core.impl.provider.entity.SourceProvider$DOMSourceReader com.sun.jersey.core.impl.provider.entity.XMLRootElementProvider$General com.sun.jersey.core.impl.provider.entity.XMLListElementProvider$General com.sun.jersey.core.impl.provider.entity.XMLRootObjectProvider$General com.sun.jersey.core.impl.provider.entity.EntityHolderReader From documents it look like only Response could be XML or JSON. Two Questions:- To get response in JSON we have to use URL ends with .json, same can be achieve by setting "Accept=application/json" header. Any specific reason to use URL approach? Why JSON request not supported? application/json application/x-www-form-urlencoded A: Thanks for your question Imran, Answer to your first question is that, twilio came first and defined the api, we, in order to try to be compatible with them, adopted the same api approach. We can say it is not as per core principles of rest/httpbut one can say it is easier for a web developer to put .json instead of playing with headers but that a different debate. I hope I already covered reason to use URL approach. For second question, it makes sense to support json requests. (Would you like to open a github issue for that, would you be interested to contribute on it.)
Low
[ 0.5352798053527981, 27.5, 23.875 ]
Plasma CADM1 promoter hypermethylation and D-dimer as novel metastasis predictors of cervical cancer. Cervical cancer (CC) is the fourth malignant tumor in women worldwide. The metastasis is still the major reason for the treatment failures of most CC patients. Cell adhesion molecule 1 (CADM1) promoter methylation and plasma D-dimer levels have been reported to be increased in many types of cancers. The purpose of this study was to investigate the value of combinatorial assay of plasma CADM1 promoter hypermethylation and D-dimer as a metastasis marker in CC. Two hundred and ninety-two patients with newly diagnosed cervical diseases and 70 healthy women were enrolled. A validation set comprised 36 Stage I CC patients and followed for 3 years. Plasma CADM1 promoter methylation and D-dimer levels were detected. The total coincidence rate of CADM1 promoter methylation status was 93.3% between 45 pair-matched tissue and plasma samples. Plasma CADM1 methylation levels in CC patients were higher than other benign disease groups (P = 0.000). Plasma CADM1 methylation levels had statistically differences between CC patients with and without lymph node metastasis (P = 0.049) or in CC patients with and without distant metastasis (P = 0.000). Similarly, plasma D-dimer levels in CC patients were higher than other benign disease groups (P < 0.05). D-dimer levels were only statistically different between CC patients with and without distant metastasis (P = 0.003). Combined assay of the two parameters for metastasis prediction has high sensitivity (80.4%) and specificity (90.5%). Combinatorial assay of plasma CADM1 methylation and D-dimer is a promising metastasis marker in cervical cancer.
High
[ 0.7033492822966501, 36.75, 15.5 ]
Q: Is it possible to embed [bokeh] high level charts? It seems most Bokeh embedding examples are using bokeh.plotting.figure object. Is it possible to embed a high level chart, like bokeh.charts.Bar or bokeh.charts.Scatter? Or is it possible to have convert a high level chart to a bokeh.plotting.figure object? Thanks a lot. A: The User's Guide section on Bokeh APIs has a good run down of how all these parts fit together, that I would suggest reading. The long-story-short: Regardless of what API you use, bokeh.plotting or bokeh.charts, the end result is always just a collection of the same low-level bokeh.models objects. You can can think of bokeh.models as very basic building blocks, and the other higher level APIs as conveniences that help you to assemble the building blocks more efficiently and correctly. So, in that light, yes, it is perfectly fine to embed a bokeh.chart using exactly the same functions described in Embedding Plots and Apps. The one thing I will add is that if you need to update the plot's data after the fact, in place, then the bokeh.figure API will probably be more straightforward. The mapping between your data, and what gets plotted is more direct. Things generated by bokeh.charts may transform your input data into entirely different forms before plotting (e.g. you give a series, and Histogram has to spit out coordinates for boxes—not the data you started with)
High
[ 0.656330749354005, 31.75, 16.625 ]
Video: Getting Started with Object-Oriented PHP Although PHP wasn't conceived as an object-oriented language, its soaring popularity in the years following its initial release caused the developers to reconsider this decision. The decision to add object-oriented features in later releases was made in order to provider users with more sophisticated options for managing larger and more complex applications. However, to this day PHP remains a hybridized language, allowing both procedural and object-oriented programming. This flexibility has largely been a net positive because novice programmers generally find PHP to be the least intimidating of today's mainstream languages. However, any novice programmer intent on building and maintaining a relatively complex PHP-driven website will almost certainly want to use a framework such as the Zend Framework, symfony or CakePHP. Because these frameworks are all object-oriented, developers lacking basic knowledge of PHP's object-oriented syntax will find themselves at a serious disadvantage. There's nothing to worry about though, as the syntax is every bit as straightforward as the rest of the language! In the first of a two-part video series, you'll be introduced to PHP's object-oriented syntax, learning how to create a class, and populate it with class attributes and methods. You'll also learn how to access and manipulate object data, and create a constructor useful for initializing class data. Please enable Javascript in your browser, before you post the comment! Now Javascript is disabled.
Mid
[ 0.645598194130925, 35.75, 19.625 ]