text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
Effect of CYP17 and PSA gene polymorphisms on prostate cancer risk and circulating PSA levels in the Slovak population. Cytochrome P-450c17α (CYP17) and prostate-specific antigen (PSA) genes, which are involved in the androgen metabolism cascade, have been studied as possible candidates for genetic influences on prostate cancer development. Contradictory results prompted us to evaluate the frequencies of polymorphisms in the CYP17 and PSA genes as well as the association between these genetic variants and serum PSA levels in prostate cancer patients and men routinely screened for prostate cancer with PSA in the Slovak male population. The CYP17 and PSA polymorphisms were determined by the PCR-RFLP analysis in 197 Caucasian prostate cancer patients and 256 Caucasian controls. We did not find any association between the CYP17 and PSA genotypes and prostate cancer risk overall, or by grade. Also the total serum PSA levels in the cases with the AG or AA genotype were not significantly higher than in the men with the GG genotype (P > 0.05). Our study did not provide support for the hypothesized relationship between CYP17 and PSA gene polymorphisms and prostate cancer in the Slovak male population.
Mid
[ 0.617924528301886, 32.75, 20.25 ]
Tickets are still available at the door. Online sales have ended. Tickets still available at the door Event FOR THE CAUSE + Q&A: ADIFF WASHINGTON DC 2014 Sunday, August 24, 2014 @ 5PM + Q&A Upon her recent victory in a major prosecution, Mirai Scott, a reputable civil rights attorney is contacted by her estranged father, a former Black Panther who went underground decades prior after an altercation with the FBI. Captured and extradited, Mirai's father has been charged with the attempted murder of a policeman. Initially, Mirai refuses his case. However, when Mirai's mother refuses to elaborate on the parents' period in the Black Panther Party, Mirai's curiosity is piqued. While filling in the blanks of her past and overcoming her own relationship and trust issues, unearthed are deep-seated hostilities, long-buried wrongs and masked deceptions as Mirai aggressively pursues her father's defense. (USA, 2013, 85min, Katherine Nero, dir., Drama)
Mid
[ 0.544811320754716, 28.875, 24.125 ]
New Business Building Fios 1 News highlighted the Frank G. Zarb School of Business’ new 52,000-square-foot, state-of-the-art building, which is equipped with a new Behavioral Research in Business Lab, an enhanced Center for Entrepreneurship, makerspace/startup incubator, and multiple areas for student independent and collaborative study, as well as administrative, faculty, and student club offices.
High
[ 0.7014925373134321, 35.25, 15 ]
Nowadays Marvel Movies are a big deal. Each one that gets released dominates the box office as fans flock to the theater to watch their favorite superheroes on the big screen. But it wasn't always this way. It took a long time before Marvel movies became the success that they are today. Nintendo's President Satoru Iwata recently passed away and many are mourning him at the moment. One man took the time to pay tribute to Iwata by letting the world know how much of an impact he had on his life and his tribute will hit you right in the feels. Being a long distance trucker isn't easy. You spend a lot of time on the road, alone and away from home. When you're putting all those miles on the odometer you need a comfortable place to relax. See what these truckers call home when they're away from home.
Low
[ 0.432098765432098, 26.25, 34.5 ]
Breast cancer in Iran: an epidemiological review. Breast cancer is one of the most frequent malignancies among Iranian women, however; the epidemiological aspects of breast cancer among Iranian patients are uncertain. A literature review of the published articles from January 1998 to December 2005 was conducted using different search engines: MEDLINE, Scientific information data base of Academic Center for Education, Culture and Research, and over 2000 issues of 94 Persian medical journals. The headings "Breast Cancer,""Breast Tumor,""Breast Malignancy," and "Breast Carcinoma" were combined with the word "Iran" to execute the search. In all, 85 full papers were reviewed. These findings showed that participants ranged from 15 to 84 years old, with those 40-49 being the most prevalent. The incidence of breast cancer in women was 22 per 100,000. The prevalence in this same population was 120 per 100,000. Stage I was diagnosed in 18%, stage II in 57% and stage III in 25% of the cases. About 72% of the patients were diagnosed with a tumor over 2 cm. Sixty-three percent of the patients had lymph node involvement at the diagnostic time. Infiltrative ductal carcinoma was found to be the most common at 77% and lobular carcinoma the least at 5%. This review indicates that the epidemiological aspects of breast cancer in Iran are relatively well-studied. Shortcomings in study of its clinical aspects are evident and need to be a central part of upcoming investigations.
High
[ 0.6965174129353231, 35, 15.25 ]
Vascular endothelial growth factor [VEGF; also known as vascular permeability factor (VPF)] is a highly conserved, potent multifunctional cytokine. Abnormal levels of production and or secretion of VEGF have been linked to a number of pathological conditions. For example, high concentrations of biologically active VEGF have been detected in pleural fluids and ascites of cancer patients (Zebrowski et al., 1999a, b). Ascites, the accumulation of fluid in the abdominal cavity, may result from a number of conditions, including tumours and other disease states such as chronic liver disease. Cirrhosis of the liver is responsible for the majority of cases of ascites and the prognosis is generally poor. Accumulation of malignant ascites is an important cause of morbidity and mortality in patients with peritoneal carcinomatosis. Causes of malignant ascites formation include colon, gastric, pancreatic, endometrial and ovarian cancer (Smith and Jayson, 2003). For example, the malignant progression of ovarian cancer is predominantly confined to the peritoneal cavity and often evolves to an ascites form (Ozols et al., 1980). Both tumour size and the accumulation of ascites are inversely associated with survival (Hasumi et al., 2002). Current therapeutic treatment of patients with advanced ovarian cancer associates cytoreductive surgery and systemic chemotherapy, the combination of paclitaxel and cisplatin being considered the initial chemotherapy for stage III and IV (Burbridge et al., 1999). However two thirds of patients already have advanced disease when diagnosed, and poor prognoses are associated with rapidly accumulating ascites fluid and highly invasive and pleomorphic cellular phenotypes. There remains a need for an effective method for the treatment of ascites and ascites-associated conditions. Ascites is linked to peritoneal, as well as tumour microvascular hyperpermeability and several studies have implicated a role for VEGF in ascites formation via increasing vascular permeability. More generally, VEGF exerts a number of important effects on vascular endothelium including inducing new vascular formation. VEGF possesses potent vascular permeability-enhancing activity and abnormal levels of VEGF production or secretion lead to microvascular hyperpermeability. VEGF is now recognized as a key factor required for growth of tumours and is involved in many other disease states such as diabetes, arthritis including rheumatoid arthritis, psoriasis, endometriosis, cerebral oedema, atheroscelrosis, ischaemic heart disease, and retinopathic diseases such as age related macular degeneration. Tumour secretion of VEGF is essential for ascites accumulation. Tumour cells usually represent the main source of VEGF, but tumour-associated stroma is also an important site of VEGF production. Blocking VEGF production or secretion by tumour cells, for example using a VEGF inhibitor, has been shown in animal studies to result in inhibition of ascites formation (Zebrowski et al., 1999a, b; Xu et al., 2000). There is also growing evidence that VEGF production and secretion is not limited to solid tumours, but that VEGF and VEGF receptors are expressed by a variety of leukemias and other haematological malignancies. Accordingly, VEGF is an attractive target for therapeutic intervention and several strategies to block VEGF activity have been sought, including monoclonal antibodies, VEGF receptor antagonists, tyrosine kinase antagonists and soluble VEGF receptors (VEGF-trap). There remains a need however for an effective method of inhibiting VEGF production and/or secretion and for treatment of conditions associated with VEGF production and/or secretion. The present invention is predicated on the inventors' surprising finding that the benzimidazole carbamate albendazole has a potent effect on VEGF levels secreted by human ovarian cancer cells in vitro and on VEGF levels in vivo, and exhibits significant inhibitory effect on a number of conditions associated with abnormal VEGF levels.
Mid
[ 0.641255605381165, 35.75, 20 ]
Four city students build a satellite weighing 33.39 grams, probably the world’s lightest and cheapest Harikrishnan KG clutches the small box in his hand carefully. He nimbly opens it, revealing a concealed black cube, and props it on the table in front of us. It is just about double the size of the sugar cubes in the coffee shop we’re sitting in. But this isn’t just any trivial cube. It is a satellite. What Harikrishnan and his three friends from the Hindustan Institute of Technology and Science (HITS) have achieved over the past few months is remarkable... they have designed a satellite weighing just 33.39 grams, which could probably set a record as the world’s lightest and cheapest satellite. The boys have called it Jai Hind 1-S. Satellite weighing just 33.39 grams, designed by Harikrishnan and his three friends from the Hindustan Institute of Technology and Science in Chennai. Jai Hind was made mostly on the campus and homes, with locally sourced materials. But it has a long way to go, literally. It will travel to the United States next month and find a place, among other scientific material, at the Colorado Space Grant Consortium, NASA. There, it will be put in a special high-pressure balloon and sent to — hold your breath — space. Time to innovate Jai Hind’s inception started a year ago, when Harikrishnan chanced upon Cubes in Space, a competition across the world for students who have a penchant for innovation in science. “I’d long wanted to build a rocket, having been inspired by films like October Sky. Growing up, I realised that it might be a costly affair. Working on a satellite was a tempting alternative.” His friends — Amarnath P, Giri Prasad T and Sudhi G — shared his dream and when he bounced the idea of building a satellite to them, they were up for it. “We read about a team that had previously built a satellite weighing 64 grams, and wanted to build one that weighed less than that,” says Amarnath. The work wasn’t easy; apart from sourcing the materials, they had to scour the Internet for information. Thankfully, they got help from close quarters, when a professor, G Dinesh Kumar, volunteered to mentor them. They chose nylon as one of the core materials to make the satellite, a decision they took after much apprehension. But they’re confident now. “We’re excited to see how it’ll react in space. We’re confident that nylon will withstand the pressures of being in outer space,” says Giri Prasad. The belief stems from the many games they’ve played with Jai Hind in the last few months, like placing it inside a balloon and flying it from the top of their college terrace. And placing it inside the fridge for a few hours. And lighting it up with a cigarette lighter. Up above the sky The four come from varied backgrounds: one of them is a handball player, one has spent a considerable part of his childhood in Dubai, while the other two have been serious about “planes and flying” from a young age. But currently, they’re all focussed on how their satellite fares in outer space. “It will be a 15-20 hour journey, sometime in August,” says Sudhi. Once the high-pressure balloon, containing scientific material by students from across the world, travels up to a certain point in space, it will burst and all the material will be gathered by the team at NASA. “We can’t wait for the day when we will get our Jai Hind in our hands,” says Harikrishnan. Once they get it, all they have to do is retrieve the SD card that will contain all the data and findings. “We hope to find data like temperature, UV density and vapour pressure, among other things, at various points of the satellite’s upward journey. This will help in research and better understanding of the environment in outer space.”
High
[ 0.7082294264339151, 35.5, 14.625 ]
Q: How does XGBoost's multi-category classification work? I am trying to understand how multiclass classification in XGBoost works. I have read the Paper by Chen and Guestrin (2016, https://arxiv.org/abs/1603.02754), but the details are still not clear to me: Say I want to produce a probabilistic classifier for a 3-category classification task. If I understood correctly, XGBoost fits regression trees as "weak learners" or components of the boosting model. Therefore, if a new predictor vector is passed to the XGB model, the regression trees produce a real value as "prediction", the (weighted) combination of which is the boosted model prediciton. From this question and the documentation in the paper, I gathered that a softmax activation function is applied to the boosted model prediction (a real value?), and that the tree structure (e.g. splitting points) are determined by optimizing the cross-entropy loss function after the softmax is applied to the model output. What is not clear to me is how exactly three class probabilities are obtained. If the model output is just a real value (a weighted combination of the individual regression trees' outputs), how can an application of softmax function return 3 probabilities? I am using the XGBoost library in both Python and R, but that probably makes no difference. A: There can be multiple child GBDT models inside a XGBoost model. Specifically, in case of multi-class classification, there is one child GBDT model for each class. During prediction, the XGBoost model evaluates all child GBDT models and obtains a n-element array of raw boosting scores. The softmax normalization is applied to this array, yielding a n-element array of probability values. You may export your XGBoost model into JSON or PMML data formats to inspect this machinery in more detail.
High
[ 0.69774011299435, 30.875, 13.375 ]
[Implantation of intraocular lenses simultaneously with surgery for glaucoma]. The authors' experiences with combined operation ECCE, implantation IOL and trabeculectomy are presented. The advantages and disadvantages of various operation techniques are discussed here. The suitable conditions for this type of operation are defined based on their experiences and literature sources. The results are presented at the group of 12 eyes of the patients simultaneously with the analysis of per and postoperative complications.
High
[ 0.676616915422885, 34, 16.25 ]
kimberlee soo Wednesday, October 19, 2016 From the bus I can look down into the taxi and see the woman in her crisp business attire, her portfolio open, white sheets with black text splayed out before her. I wonder if she is reviewing a resume, her own or someone else's, wonder if she is off to interview someone or be interviewed, or maybe she's off to make some big corporate presentation. I imagine her facing a boardroom of suited men, possibly silver haired, possibly two times or three times her age. Or, possibly there is one who she is secretly meeting in a hotel room on Wednesdays over the lunch hour, when she tells her officemate she's running to Bloomingdales. I wonder this as I look down into her taxi. Then my bus lurches forward and the taxi speeds off. I am left with my own wondering about what I am about to do. Three more stops, before I do this, two more stops before I am there. I could stay on the bus, pass by the familiar cross-streets and let the summer pass and fall come without doing this. One stop. And then I find myself rise, step off the bus. My mind is a blur of possibilities, who will speak first, what will I say, what will he say, will I even be able to look him in the eye? It doesn't even occur to me until I am nearer that he might not even be there. And as I get nearer, it's obvious. He isn't. I did not expect this. Now what? I walk on, east, toward my office, embarrassment settling over me, the silliness of it all. I feel exposed and naked, like everyone passing me on the sidewalk can see that this (whatever this was suppose to be) will not be happening. But as the walk signal changes and I start through the intersection I pass by him, recognize his blue sweatshirt, the blonde curls wisping out from under the heavy dark blue hood, and nearly brush his arm with my shoulder. He doesn't recognize me (I mean, how could he, why should he) but I see that it's him and it catches my breath and I have to stop walking, frozen in the middle of the crosswalk, people squeezing to get by. But today's the day. The last possible day and if I’m going to do this it has to be today. So I turn around and cross back, barely making it before traffic zips behind me, drivers honking at my last minute sprint. I don't go to where he stands immediately. I am sweaty and can't breathe so I circle the square, my sunglasses shielding my sightlines. I pretend to smell the flowers and check out the organic soaps and sample the cheese from Somewhere, WI. I skip the honey booth with the live bees packed between two sheets of Plexiglas, and I skip all the other booths that sell fruit. His booth is right on the corner, the white canopy top makes me think of circus tents. I recognize the other employees, the one who uses a dirty knife to cut samples of bubble gum pears for all the girls, and the tallest one who's hands are always shoved into his pockets and he never seems to be helping anyone. I pick out my pears, unaware of how many I’ve chosen until the plastic bag is bulging and my sweaty palms can barely hold on. I put some back. I decide to keep my sunglasses on because last time I got this close I just stared at his hair, could hardly hand him the $3, certainly couldn't string 3 words together. Just handed him my bag of corn on the cob, trembling. He said something chit-chatty, and I, I, well, I grunted (seriously), thrust the $3 into his hand and bolted. That was last year. I'm up next in line and just as I step forward, dirty-knife-guy replaces him because some little old lady wants his opinion on the purple eggplants. "Back for more?" dirty-knife-guy asks. "Huh?!" I say quickly and suspiciously. "More pears? Told ya last year you'd love those bubble gum pears." "Yes, right, yes! I am back for more bubble gum pears!" I laugh a strange shrill laugh that sounds foreign even to my own ears and apparently to his too, because he backs away slightly when he gives me my change. I start to walk away but I can't. Somehow this thing, this thing, this thing I want to do has become huge, defining, urgent. So when I go to leave, I don't cross to the crosswalk. I come around his table and stand behind him as he finishes bagging the little old lady's purple eggplant. I step up to him, step in close and before I can think, I extend my hand. He starts to extend his, then seems unsure, can't tell if I’m going to hand him something, or if want one of the purple eggplants. But then he does take my hand, or I take his, and I lean in and whisper. We are still holding hands when the words hit him, I can actually tell when the vocabulary is decoded in his brain and the text becomes meaning. "Thank you," he says. "And you too." He is still holding my hand. I smile and say, "That's all." I let go of his hand and walk away. When I get to my office I immediately slice up a pear and hit the speed dial button with the heart on it. David picks up and I tell him what I’ve done. I sense him put on his 'best friend hat' as he says, "No way! You rock, you totally did that?!" and we laugh about how it took me all summer to work up the nerve. I tell him how I had to keep my shades on so the farmers market boy wouldn't see my eyes, so I could be brave enough to whisper, but David says, 'Hon, I can totally see your eyes through those shades.' "Oh, seriously?" I say. "Seriously." David asks why today, since there is still one more week for the farmers market. And I say that I don't know, that it just had to be today. "Sure, I get that." he says. There's a pause and I can tell he has something else he wants to say. "What?" I ask. "So does this mean this is the last of the bubble gum pears?" he asks. I can't tell over the phone if he's serious about the pears (because he really does love those pears) or if he's talking about my crush on the farmers market boy. "Yeah, I think so," I continue, fishing a bit. "Plus, I just ate one, and I’ve had better." I’m curious if his rarely worn 'jealous lover hat' has slipped on and I wait eagerly for his response. When it comes, I laugh, not really disappointed or surprised by his security or his honesty. He says, "Aw, too bad. Man I love those pears." Tuesday, September 06, 2016 My husband stares at me across the table. He is concentrating deeply. I see him flip from thought to thought, like thumbing through a library’s card catalog back in the day, pausing, considering, then discarding idea after idea.“Have you decided?” I ask, my knee jiggling against the tippy café table, making ripples in my water glass.“It’s hard to say,” he replies, astonished at coming up empty.I have seen this look before. I love this look. I’ve got him.80’s rock floats in through the open window, I look over and for a minute expect to see some kid walking by with a bulky boom box perched on his shoulder. Instead I see one of those convertible Fiats, clownishly small, crammed with mutantly ripped body builders in wraparound shades.“Remember when 80’s rock was just rock and we never listened to oldies stations?” I muse. David isn’t listening, he’s puzzling and piecing, looking for perfection.Already having my answer, I am free to wander through Remembers. The mix-tape I made him after we officially became boyfriend/girlfriend on the Puddle Jumper path, kissing for the first time under the infinite Iowa sky. The mix-CD he made me for Valentine’s Day our first year in Chicago when we were constantly deciding which bill to pay first and banking on the timing of the U.S. Postal Service.The mix-tape had Eric Clapton and Indigo Girls and Howard Jones. The mix-CD had Journey and Foreigner and Shakira and Clapton. The mix tape was labeled KIVID with the #1 and 1991 prudently penned. The mix-CD had carefully created liner notes slipped inside a plastic purple case.“I know what it is,” he says, eyes lighting up with discovery. “I know what it is.”“Okay, what?” I invite. I'm more motivated by the fact that I’m closer to disclosing my answer than true interest in his.“It would be…” He stops himself and I can tell he doesn’t like his choice, he is back-peddling, discontent.I groan, “Come. On.”“No no no, wait wait,” he rubs his palm against his shaved head. I know the prickliness of being on the brink of a major decision. I imagine the prickliness of his scalp against my palm and it softens my impatience at his stalling. I really shouldn’t rush him.“It’s not like you can win or lose with your answer,” I say trying to ease his angst.He gives me a look that says he knows what I mean but doesn’t necessarily agree. There is always a better and best to this particular query. And David likes to win. People don’t necessarily know this about him. He’s so laid back, he’s so easy going, he’s so chill, I hear year after year. All true, but he’s also fiercely focused and determined and a persistent pain in the ass when he thinks he needs to be.“Come. ON.” I say again.It’s not even one of the cumbersome conversations we’ve had since I married him in my mother’s wedding dress, in my parent’s back yard, under hulking fir trees. It's not about kids or no kids, about renting or buying, about faith or church or politics or environment or in-laws or art. It’s not like we’re opting between east and west coast after sixteen years in Chicago. It’s not like we’re choosing careers or cars or even a couch.But like everything he does, David puts his whole heart in and waits until he knows that he Knows.Finally, he looks up at me and smiles.It’s our 23rd wedding anniversary and it’s a big deal day. It’s also just another Sunday spent picking out our pirate names. Wednesday, August 24, 2016 ...when your neighbors is newly retired and you compliment his landscaping and he asks you if you like succulents and you say yes but that you always manage to kill yours, so he walks you to his backyard, which you've never seen before (even though you've lived across the street almost seven years and he's been there since the 50s) and you find rows and rows of various succulents in different sized pots, scattered all around the backyard and hanging from balcony banisters (next to miniature orange and apple and plum trees) and he grabs a white ceramic pot (the one you would have picked out yourself) from of a pile of different sized pots and begins filling it with the most superb succulent starters, all the while giving you gardening tips and saying he'll teach you because it's the easiest thing (even though it's not easy for you) and you ask, "are you sure?" and he says "of course, i'm so bored" and goes on to tell you you'll learn about orchids next... Wednesday, June 08, 2016 I'm walking out of Ralph's and the automatic sliding doors are wide open, their sensors being triggered by a train of shopping carts, one tucked into the other. Behind the mass of metal there stands a Ralph's employee, young, with thinning hair and a soft face. He is clad in a glowing orange-yellow vest, the kind they wear while on cart patrol. He's trying to talk to me over the carts, but he's nervous, distracted, his attention pulled by something I can't see. "What?" I ask. He starts to point at something, shifting from foot to foot. "I don't understand," I say walking closer. "I'm scared of him," he says, nearly whispering, prying his hands apart and gesturing generally toward the carts. I stop walking and wonder if this guy has just lost his mind and now sees dark demons in broad daylight. "What?" I ask again. The sliding doors are still open and shoppers come and go around us. I wonder, with two cold cartons of almond milk in my arms (my reusable bag in the car as usual), why me, why not one of them? "There." He points passionately, specifically now, so I follow his finger and find a tiny bumble bee resting on one of the carts. "Oh, it's a bumble bee," I say relieved, as if naming his demon will render it powerless. I half expect him to say, "Oh right, a bumble bee, I'm all good, never mind." I half expect this because I'm not afraid, because bumble bees are one of the only insects I'm not scared of. I swat at the bee from across the carts, a good effort, and see it lift off, so I start to walk away. "He's still there," he yells after me. I turn back and see he is still dancing nervously, kneading his hands. I imagine the sweat between his palms and likely beading on his brow. I imagine the constriction in his chest, perhaps prickling in his cheeks, as his breath shallows and he can't get himself to take in air. I imagine all of the things that happen to me when I'm afraid. Not long ago I was walking through this same parking lot and a car rolled up along side me. I assumed it was looking for parking and scooted farther to one side. But as I continued, the car slowed, keeping pace with me. I kept moving, throwing sharp glances through the driver's darkened window in an attempt to say, 'Don't think I'm unaware, I can see you." Which I couldn't. I slowed slightly and so did he. I quickened my step and the car sped up. There were people in the parking lot, I could have called out to someone, but it was hard enough to breathe and walk and figure out when and where to run. Suddenly the driver's window descended and reflexively, I turned and looked. The man behind the wheel stared at me. No words or weapons, just the intrusion and intimidation of his stare. I glared back but by then I was running out of road. The cross street was coming and I'd have to decide which way to turn, so I slowed completely until I stopped, and he slowed until he stopped. "WHAT?!" I screamed, completely facing him as he sat in his car. He said nothing, just gave me a sliver of a smile. And then sped off. "I can't move these," the Ralph's employee exclaims to me, to everyone, to the universe. How many minutes have passed since he first called for help? Two maybe? How many minutes did that car trail me? Two. Maybe. I hurry around to the other side of his shopping carts and shoo the bumble bee away. I keep shooing and keep shooing until I hear him say a quiet thanks and the sound of carts clattering by. The automatic sliding doors finally slide shut as customers come and go. Monday, May 23, 2016 It is not the most dramatic of peaks for our sixtieth SoCal hike. Mt. Hillyer near Chilao Flats summits rather aimlessly, leaving both David and I with furrowed brows, wondering, is this it? Regardless, it is a lovely day with sunshine and cool breezes singing through the tall pines. David and I crawl up what we've decided is the highest peak. On our way, we spot the most massive pine cone that has fallen down between the boulders, a pine cone nearly as big as my head (no joke). I say I want it, so of course, David shimmies down and plucks it out from the crack, careful not to break its scales. He climbs back up, treasure in hand, but the pine cone is seeping syrupy sap so instead, we perch it at the highest point (a cairn to abandoned desires) and leave it standing sturdy against the growing winds. We scramble down and sit, sheltered behind a nearby rock, and eat the snacks we packed, only then hearing the sounds of hikers, the first we've encountered all day, approaching from afar. "PINE CONE ROCK!" a young voice rips through the rabble. "I want to go to Pine Cone Rock!" We sit silent and unseen as a batch of unruly Boy Scouts race up the rocks. We smile at each other realizing they are talking about our pine cone rock. "DON'T TOUCH IT!" the tallest boy demands. "Leave it as you found it!" he states authoritatively. I know this phrase, I know respect for the wilderness, I have been taught well. I imagine my David (proud Eagle Scout) as a curly haired boy, wandering through woods, naming birds and plants and trees, steadfast in the ethics of the outdoors, leaning in close to inspect, but never touching. I feel equal twinges of pride and guilt knowing my David (proud Eagle Scout) as a shaved-headed full grown man, will scuttle down stone, to get me the biggest of pine cones. "It could be a marker," another boy suggests. "But HOW did it GET here?" David and I stare at each other, eyes wide, trying not to laugh. "A marker for what?" The questions hang for a second in silence, then the first boy explodes, "BUT I WANT IT." He wants it, like I want it. I wish I could sneak up there and stuff it in his backpack without his troupe seeing. I want him to have it, to get home and find it (hopefully with the sap fully dried), and stash it under his bed in a shoe box he keeps for secret things (although it's probably too big for a regular shoe box). Or maybe he'll take a chance and boldly display it next to his 4H trophies on the highest shelf in his bedroom. "But you can't have it! Nature doesn't belong to just you!" Oh. Bless. I don't want to know what happens next. I don't want to know if they keep fighting or if it accidentally gets tipped off the highest rock and tumbles down down down. I don't want to hear gasps or whose fault it is or reprimands from their leaders for being too close to the edge. So David and I slip away, leaving the Boy Scouts what-if-ing, and travel fast down the mountain, passing a thousand pine cones on our way. Thursday, May 19, 2016 ...we were lying in savasana and our yoga teacher told us that she was driving to the studio and got totally overwhelmed. she said, "tomorrow is my birthday, and i just felt totally overwhelmed." i expected her next words to be some realization about aging, about how quickly life passes, how she's running out of time or feeling her mortality. but instead, she continued by saying, "i've made it this far. so much has happened, and i'm here, i've made it this far." such a needed reminder to acknowledge all of the journey, the times we've soared and the times we've barely survived. she went on and affirmed not just the distance covered, but the immeasurable road ahead. what will we do with our next breath? in a year that has brought another death to my immediate family, shrinking us from seven to four in just five years, i remind myself that i am alive, so much has happened, and i'm here, i've made it this far. here's to the journey, to surviving and celebrating, and to those lovely spirits who guide us along the way... Thursday, May 05, 2016 I left my earphones in my other purse and the two women next to me are talking so loudly that I'm not sure if I'm more frustrated with myself or them. I choose them. They chatter on about the villa she stayed in, about the water, the weather, the pastries. One woman is perched eagerly over the other woman's phone. "That's a tall giraffe." "Yeah, we saw a lot of that, it was awesome." They are flipping through photos on the twiggy woman's phone. She wears suede boots up to the knee, a gold zipper from the heel all the way up the back of her calf, like a seam. "We ate at Africa House, it was awesome." She holds her phone in her left hand while running her finger across the phone screen. I see her ring finger wrapped in diamonds, a band of sparkling white, each stone nearly the size of my singular solitaire. Faster and faster she flips through the photos. The perched woman wears black leggings under a black skirt of the same material and can't stop coughing, asking clarifying questions, and interjecting opinions that the other woman swats away with minimal detail and maximum disinterest. "Why are you going so quick? I want to see!" she exclaims, leaning in closer. "It's not all exciting," her friend says as she tries to get through the slideshow. "Everything is exciting," she replies between coughs. They both wear wigs, the nice ones that you can't tell are fake at first glance, the ones I only notice in this part of town where the men wear black suits and cover their heads and are seen walking to synagogue on Friday nights. "If you said, let's go on safari I'd say let's wait a few years, but now I'd totally go again." They talk about the friend who owns the villa. "Wife?" "She converted." "Huh." "Whatever." She brushes it off and moves on to talk about parachuting and the view from the balcony and more animals and breakfast and the kids the kids the kids. They talk so fast it sounds like someone is playing a tape at a jacked up speed. I keep waiting for the tape to break or for one of them to pause. It makes my chest feel tight and I have to remind myself to breathe. "So that was my trip. How was Pesach?" I am pleased that I know Pesach means the same thing as Passover and it makes me smile to think of my first Seder dinner just a couple of weeks ago. "Not as exciting as yours," the cougher replies and laughs and instead of answering says, "Two more questions..." It feels like she's stalling. She asks, and off they go again, same routine, same interjections, same lightening speed. More about the weather, the food, the massages, the villa, the friends who own the villa, how her husband loves to be the center of attention, how you could go if you were single but only if you're a super social person. Finally the coughing woman takes her turn. She has the stage and slides back into her seat. She slouches to be eye to eye with her suede-booted friend, who is resting the lid of her Starbucks cup against her suddenly still lips. But as it turns out, she doesn't have much to say. She throws out a few details about Seder and the kids the kids the kids and speaks so quickly her hands can hardly keep up. There is an apology in her body, like she doesn't deserves to be center stage. I find I can't even follow her train of thought. The bigger she becomes the more she fades, until she is invisible, and all I see is her tossing the conversation back to the other woman, another question about the kids the kids the kids. Saturday, December 05, 2015 A girl who can't be more than twelve years old is telling her mom about Donald Trump, the church of Scientology, and how dimming a cellphone's screen saves the battery. Her younger brother sits across from her, nodding and interjecting his agreement. The kids nibble cheesy croissants and sip iced drinks with whipped cream piled high inside the domed plastic lids. It seems like a special occasion. The girl is lanky and freckled and tucks loose strands of hair behind her ear. She tells her mom things her dad says (about Donald Trump), and things her uncle says (about the church of Scientology), and how her best friend is getting her ears pierced and she wants to too but wonders how much it will hurt. The boy pulls apart his cheesy croissant and contently swings his oversized feet beneath his seat. "I don't like it," he says suspiciously, "It's going to hurt." The mom listens and nods and looks from child to child. She reaches out and touches the boy's perfectly pink cheek, and he leans in like a puppy dog, lapping up her love. He can't sit still, swiveling from croissant to whipped cream drink, and I imagine all the sugar being absorbed by his little body. "It's just craaaaazy," the girl says emphatically, having moved on to a new topic, pushing her hair out of her eyes again. "So craaaaazy," the boy agrees. All three laugh, throwing their heads back, heads with versions of the same dark chocolatey hair, the same texture and weight. A stranger walks by and greets the boy, tousling his hair. The boy receives this gesture with disinterested familiarity and the girl tosses him a haphazard 'hey,' the kind kids give most adults who are taller than them. I listen as the stranger introduces himself to their mother and I'm surprised to learn she's actually their aunt. School is out all week for the Thanksgiving holiday and family has come to town. All three seem bored with the stranger's chatter, although they are kid-polite and adult-friendly. I peek around to get a look at the aunt's face and wonder what the mother looks like. As soon as the stranger leaves, the girl leans in toward her aunt and brother and says something secret about the stranger. The boy agrees and drapes his arm around the aunt's shoulder. All three giggle, their heads nearly touching, and conspiratorially continue their conversation. They whisper. Heads bobbing, feet swinging. I picture myself, less than a decade from now, with Hopper and Marty perched on high coffee shop stools like these, with no need for help getting on or off. I wonder what their pre-teen voices will sound like, I wonder if they will even eat cheesy croissants or be fervent vegans because one of their best friends is vegan. I wonder if they will be the same height, or if one will have outgrown the other. The girl starts gathering her garbage and the boy and aunt follow her lead. They chatter on as they slide off their seats, almost bundled together, as they scurry out the front door. I watch them leave and wonder if, a decade from now, Hopper will want me to know her secrets, and if Marty will still let me touch his cheek.
Low
[ 0.527845036319612, 27.25, 24.375 ]
Wednesday, July 29, 2015 Big Fun Starts When “Ant-Man” Starts Shrinking (I actually did write an Ant-Man review. I turned it in, but it never was published. I want people to see it. I also want to get back to blogging consistently, and this gives a pretty easy post the put up. Life has been pretty awful lately, but if you're fan of Stranded in Hickville, have faith. As soon as I can get on my feet, more regular posts will be coming.) Most movie franchises have a pretty serious problem. They tend to push toward bigger, more epic set pieces as they roll along, leading them to lose sight of what made so cool to begin with. Marvel’s movie offerings have been suffering from that very condition lately. Every movie needs to expand the universe while finding new, more outlandish ways to save the Earth from being wiped out of existence. Few big franchise films ever try to do the opposite and pull back. But Marvel’s latest offering, “Ant-Man” shows how much fun smaller stories can be. ”Ant-Man” stars Paul Rudd as Scott Lang, a down-on-his-luck ex-con who’s about to lose his daughter, Cassie (the sweet and hilarious Abby Ryder Fortson). Scott’s recruited by Hank Pym (Michael Douglas) to help put the brakes on a plan by Pym’s former protoge, Darren Cross (Cory Stoll). Pym has discovered a way to shrink people down to the size of insects while retaining the strength of their full size selves. Cross has developed his own version of Pym’s tech and plans to sell it to the highest bidder. Pym recruits Scott to steal Cross’s goodies before he sells to someone with bad intents. Can Scott save the day, impress the girl, Hope (played by Evangeline Lily), and prove he’s good fatherhood material? Well, you have to watch to find out. While most of the other films in the Marvel Cinematic Universe are big, sci-fi-laced action films, “Ant-Man” is basically a heist movie. Said heist brings Scott into conflict with Cross, as well as some other surprising foes. The focus of the film is on getting Scott into Cross’s lab to snatch and grab. Along the way, a few jokes and a few skulls get cracked. Thankfully, though, “Ant-Man” never get too big for its britches. It scales the scope down in favor of being fast, fun and light on its feet. Mr. Rudd is perfectly cast as Scott Lang. Rudd’s is as good at cracking one-liners as anyone, but his face displays earnestness and vulnerability that make him easy to like. Rudd gets excellent support from Mr. Douglas. Douglas was terrific as Pym and it made me wonder what an Ant-Man movie with him in the lead role could’ve been like. Mr. Stoll gets handed a pretty cliched role, but he look like he had fun with it. Michael Pena steals every scene he’s in as one of Scott’s buddy’s. The first 30 minutes or so of “Ant-Man” are a little clunky and slow, but once Scott gets the suit and starts training, the movie really takes off. The jokes and visual gags fly fast and plentiful and the action scenes are amusingly put together while still packing plenty of punch. Scott’s size-changing skill are put to great use. As are ants. This may not be the movie for you if you don’t like ants. They play a pivotal role and have a lot of screen time. That said, these ants do some pretty clever and creative stunts to help Scott achieve his goals. They even help out in the final battle against Cross, a fight which is set in Cassie’s bedroom and is one of the most creative and entertaining fight scenes to come along in years. ”Ant-Man” is a smart, funny movie that serves as a refreshing coda to the MCU's Phase Two and serves as a bit of an antithesis to Marvel's big blow-up-the-world method of storytelling. The cast is great, the jokes are funny, and the action is a blast to watch. If it wasn’t weighed down by a clunky first act, it would be pretty much perfect. As it stands, “Ant-Man” is up there with “Guardians of the Galaxy”, the first “Iron Man” and the first “Avengers” flick as the most fun movies in the Marvel movie cannon. Now, if you’ll excuse me, I’m off to buy an ant farm.
Mid
[ 0.616780045351473, 34, 21.125 ]
Arsenate induces the expression of fungal genes involved in As transport in arbuscular mycorrhiza. We utilized the two-compartment system to study the effect of arsenic (As) on the expression of the Glomus intraradices high-affinity phosphate transporter GiPT, and the GiArsA gene, a novel protein with a possible putative role as part of an arsenite efflux pump and similar to ArsA ATPase. Our results show that induction of GiPT expression correlates with As(V) uptake in the extra-radical mycelium of G. intraradices. We showed a time-concerted induction of transcript levels first of GiPT, followed by GiArsA, as well as the location of gene expression using laser microdissection of these two genes not only in the extra-radical mycelium but also in arbuscules. This work represents the first report showing the dissection of the molecular players involved in arbuscular mycorrhizal fungus (AMF)-mediated As tolerance in plants, and suggests that tolerance mediated by AMF may be caused by an As exclusion mechanism, where fungal structures such as the extra-radical mycelium and arbuscules may be playing an important role. Our results extend knowledge of the mechanisms underlying As efflux in arbuscular mycorrhizal fungi and mechanisms related to As tolerance.
High
[ 0.6683937823834191, 32.25, 16 ]
Colgate seniors present research to leading scholars in Japan Jessica Huang ’14 and Michael Manansala ’14 presented their research at Kobe University in Japan and also had time for some independent travel. Over spring break, Jessica Huang ’14 and Michael Manansala ’14 put the capstone on a research project that they’ve been working on for much of their Colgate careers. Traveling to Kansai, Japan, the seniors presented their research titled “Does observing or producing different types of hand gestures help second-language auditory learning of Japanese short and long vowels?” They presented at the Phonological Association in Kansai conference at Kobe University in front of an audience of leading scholars from Japan. Huang and Manansala were accompanied by professors Yukari Hirata and Spencer Kelly, who have been advising them. The project, which was supported by a National Science Foundation grant, was an interdisciplinary study involving the fields of Japanese language learning and psychology/neuroscience. The researchers studied whether visual cues help people learn Japanese — specifically, whether the use of hand gestures helps to distinguish vowel lengths, which change the meaning of Japanese words. According to past studies, English speakers, in particular, have found learning Japanese difficult because they are not used to vowel lengths affecting the meaning of words. “[We] compared two different types of hand gestures to see which type would teach native English speakers to better distinguish the vowel lengths in Japanese,” explained Manansala, a molecular biology and Japanese double major from Dumont, N.J. “We also tested whether actually doing the gestures while learning, or just watching would be better for learning.” The team included two other students, April Bailey ’14 and Kristen Weiner ’14, and they have recruited Colgate students to participate in the study for the past three years, ultimately enlisting 88 students. Huang and Manansala also utilized high-end computer software and technology to measure participants’ brain wave responses. Ultimately, the results of the study showed that there was no direct relationship between the use of hand gestures and increased learning. According to Hirata, these findings lead to an overall question of whether a non-native speaker could ever fully reach the aptitude for the Japanese language (or any language) that a native speaker has. While the research project started in 2006 (funded by Colgate’s Picker Interdisciplinary Science Institute) with a group of students working under Hirata and Kelly, Huang and Manansala joined in during their sophomore year. Huang and Manansala have incorporated their research into their senior thesis papers. “Dr. Kelly and I really wanted our students to see not only the technical aspects, but also the bigger picture of how you do research,” Hirata said. “Now, they’re not just doing what we told them to do, but they also take time to digest information, and they’ve developed an understanding of this project as a whole.” “The professors made us feel like we were a vital part of the project,” said Huang, a Japanese and philosophy double major from Ridgewood, N.J. “So, it was our responsibility to do well, but we also felt like we wanted to contribute as much as possible. We formed a nice team.” Hirata and Kelly are writing three full-length manuscripts on their findings, which are coauthored by Huang and Manansala. “It’s been a fun process starting as sophomores and not really being sure what would happen with this,” reflected Manansala. “Now, as seniors, being able to present it has been a really rewarding experience.”
High
[ 0.6843501326259941, 32.25, 14.875 ]
Q: Solução direta (e bonita) para arrumar base usando dplyr Tenho a seguinte base de inadimplentes: df <- data.frame( lead_15 = c(1,0,0,0,0,1,0,0,1,0,0,0,0,0,1), lead_30 = c(0,0,0,1,0,0,1,1,0,1,0,0,0,1,0), lead_60 = c(0,1,0,0,1,0,0,0,0,0,1,1,0,0,0), inib_15 = c(1,0,0,0,0,0,0,0,1,0,0,0,0,0,0), inib_30 = c(0,0,0,1,0,0,1,0,0,0,0,0,0,1,0), inib_60 = c(0,0,0,0,1,0,0,0,0,0,1,1,0,0,0), motivo_15 = c("A","","","","","","","","D","","","","","",""), motivo_30 = c("","","","B","","","A","","","","","","","B",""), motivo_60 = c("","","","","C","","","","","","B","D","","","") ) Eu quero uma solução onde exista uma linha para cada lead (3 linhas) onde a primeira coluna seja a soma do respectivo lead, soma do respectivo inib e uma coluna para cada motivo (A, B, C, D) onde tenha a quantidade desses motivos. LEAD | QTD | INIB | A | B | C | D | --------|-----|------|---|---|---|---| lead_15 | 4 | 2 | 1 | 0 | 0 | 1 | --------|-----|------|---|---|---|---| lead_30 | 5 | 3 | 1 | 2 | 0 | 1 | --------|-----|------|---|---|---|---| lead_60 | 4 | 3 | 0 | 1 | 1 | 1 | É um problema relativamente simples que consigo resolver mas com muitos pedaços de código e contas separadas. Quis perguntar aqui pois sei que pode existir uma solução direta usando o dplyr. A: Não sei o que exatamente você quis dizer com solução direta, porém segue uma solução usando dplyr e tidyr em uma (longa) linha. df %>% mutate_at(vars(starts_with("motivo")), funs(A = if_else(. == "A", 1, 0), B = if_else(. == "B", 1, 0), C = if_else(. == "C", 1, 0), D = if_else(. == "D", 1, 0))) %>% select(-matches("motivo_\\d{2}$")) %>% gather %>% mutate(key = gsub("(.+)(_)(\\d{2})_(.$)", "\\1\\4_\\3", key)) %>% separate(key, c("tipo", "grupo")) %>% group_by(tipo, grupo) %>% summarise(value = sum(value)) %>% spread(tipo, value) # A tibble: 3 x 7 grupo inib lead motivoA motivoB motivoC motivoD * <chr> <dbl> <dbl> <dbl> <dbl> <dbl> <dbl> 1 15 2 4 1 0 0 1 2 30 3 5 1 2 0 0 3 60 3 4 0 1 1 1 A: Não consegui pensar numa forma de fazer em apenas uma expressão. Mas não acho que a seguinte organização seja ruim. motivo <- df %>% select(starts_with("motivo")) %>% gather(key, motivo) %>% separate(key, c('x', 'grupo')) %>% filter(motivo != "") %>% group_by(grupo, motivo) %>% summarise(n = n()) %>% spread(motivo, n, fill = 0) inib <- df %>% select(starts_with("inib")) %>% gather(key, inib) %>% filter(inib != 0) %>% separate(key, c('x', 'grupo')) %>% group_by(grupo) %>% summarise(inib = sum(inib)) qtd <- df %>% select(starts_with("lead")) %>% gather(key, lead) %>% separate(key, c('x', 'grupo')) %>% group_by(grupo) %>% summarise(inib = sum(lead)) final <- left_join(qtd, inib) %>% left_join(motivo) Claro que, se você souber que os motivos sempre serão "A", "B", "C" e "D", a solução do @Fernando é melhor. Essa solução assume que o número de motivos pode ser variável dependendo da base, assim como o número de tipos de "lead".
Mid
[ 0.6220735785953171, 23.25, 14.125 ]
ProTracker 2 clone changelog (starting from v1.00 and up) NOTE: This may contain stuff that only a programmer understands! v1.17 - 28.05.2020 - Added audio sampling capability. It can be accessed by clicking the new "SAMPLE" button in the SAMPLER screen. Pressing the right mouse button is the same as pressing the [SAMPLE] button, which is handy for easier timing. This is experimental and can contain bugs! Let me know if you find any. - Fixed a bug where clicking to the left of the song/sample name could cause a temporary UI lock up. - Bugfix: After loading a new sample, the sample restore (CTRL+Z) buffer would not be updated. - The scopes, VU-meters and (fake) spectrum analyzer should now be less delayed, and better in sync with the music. Only a slight difference though. - The PAT2SMP HI mode was changed from A-3 finetune +5 (28836.54Hz, period 123) to A-3 finetune +4 (28603.99Hz, period 124). After reading the Amiga Hardware Reference Manual and doing some basic testing, I found out that this rate is not safe for channel #4 on a real Amiga. The absolute minium safe period is period 124 (28603.991Hz, PAL). - Very minor code cleanup/changes v1.16 - 12.05.2020 - Added three new entries to protracker.ini: 1) FULLSCREEN (start in fullscreen mode) 2) PIXELFILTER (smooth out upscaled pixels to make them less grainy) 3) INTEGERSCALING (if set to false, force vertical stretch of image in fullscreen mode while maintaining aspect ratio) - Linux: Fixed the mouse not working with KMSDRM (hopefully) v1.15 - 07.05.2020 - Bugfix: The EFx (Invert Loop) effect didn't work on the whole sample loop, but only on the half of it. - Bugfix: The quadrascope didn't show the volume changes from the 7xy (Tremolo) effect. - Windows bugfix: Certain key modifiers didn't work (bug appeared in v1.13) - The "real VU-meters" mode now acts more like real VU-meters by showing average amplitudes instead of peak amplitudes. This mode can be toggled on/off by pressing ALT+F11 or changing a setting in protracker.ini. - The quadrascope code has been refactored a little bit to be slightly simpler - Some other cosmetic changes to the code (to better match the PT source code, which makes it easier to verify that it's correct). v1.14 - 05.05.2020 - Windows crashfix: When double-clicking .mod files associated with the program, the new temporary program instance would crash before getting terminated. v1.13 - 04.05.2020 - Windows bugfix: Left Amiga key (Win-key) didn't work! - Windows: Removed a broken Num Lock-specific hack. Seems like it didn't work anymore in later SDL2 versions. This means that the drumpad feature is pretty useless... - Bugfix: Saving samples as .IFF would result in broken .IFF files - Bugfix: Don't allow sample modifications in "sample zero" mode - Bugfix: The "numpad 0" key wasn't behaving the way it should - Bugfix: The "numpad enter" key wasn't behaving the way it should if the current sample was set to 16 (0010). - Code cleanup. Moved certain chunks to new files, renamed modEntry struct etc. v1.12 - 29.04.2020 - Fixed a bug where the right loop-pin could sometimes disappear when zoomed in and scrolled all the way to the right. - A much needed code refactoring of data structs. The code now also compiles with GCC 10 (fixed GitHub issue #7). v1.11 - 26.04.2020 - The BLEP synthesis has been improved for slightly less resampling aliasing. aciddose (the writer of the BLEP implementation) is currently working on it to see if it can be further improved, but as for now this should in theory be a little bit better than the old one. - Bugfix: Reset play mode to "Play song" when double-clicking files associated with the PT2 clone. - Bugfix: The MOD2WAV buffer was too small and could cause nasty issues when rendering a song with low BPM values. - MOD2WAV now renders the song at 96kHz, so that the user has more resolution before converting the WAV to the format/frequency of choice. - Don't include high-pass filter and dithering in PAT2SMP - Code cleanup v1.10 - 19.04.2020 - Bugfix: note(s) displayed in SAMPLER (resample note) and Edit Op. screen #4 were wrong. - After a long talk with aciddose I have found out that I did several things wrong in the Amiga audio filtering. I have now removed the filter cutoff tweaking, gotten a slightly improved low-pass/high-pass routine, and also replaced the naive "LED" filter implementation with another one that is slightly more accurate (but still not perfect). v1.09 - 09.04.2020 - Bug fix: "Play pattern" mode didn't work like it should in v1.08 - PATTDOTS mode (protracker.ini) is now even easier on the eye - Overflown arpeggios on -1 finetuned samples now behave exactly like real PT. This is a special case where overflown arpeggios sound very different. - Code cleanup v1.08 - 03.04.2020 - The mouse system has been rewritten so that we don't need to do mouse capturing while interacting with GUI widgets, which could be buggy sometimes. - Fixed a bug when exiting from Edit Op. screen #4 ("Sample chord editor") and reopening it. It could mess up the UI in worst case scenarios. - Some other small miscellaneous changes not worth of a mention - Small code cleanup (and also the opposite :-) v1.07 - 18.03.2020 - Linux: Fixed CMakeLists.txt to work on Arch Linux - Windows: The DPI-scaling is now per-monitor aware instead of system aware. Maybe this solves the issue of blurry pixels for some people... - Windows/macOS: SDL was upgraded from 2.0.10 to 2.0.12 v1.06 - 16.02.2020 - Fix: Don't cut off voices when changing the sample length from the GUI - When loading a WAV/AIFF sample that has a frequency above 22kHz, show a big ask dialog with more details about what is being asked. Some users got confused about the old "2X DOWNSAMPLING ?" status text that appeared when loading some samples. - When selecting "Yes" to downsampling a sample before loading it, apply a low-pass filter first to get rid of some potential aliasing after downsampling. This can now be turned off in protracker.ini (SAMPLELOWPASS). I recommend leaving this on, as it might remove quite a bit of aliasing in samples with a lot of high frequencies, like hi-hats and cymbals. However, some sharpness might get lost. If you need more sharpness, try the "BOOST" button in "Edit Op." screen #3. The low-pass filter is only applied to samples that are going to get 2x downsampled during load. You'll get a dialog where you click yes/no on samples that has a frequency higher than 22kHz. - Only filter forwards (not backwards as well) when filtering samples in the FILTERS toolbox in the sample editor. This makes the selected cutoff more correct. - The sample marking in the sample editor now looks slightly nicer (different color on the centerline). v1.05 - 12.02.2020 - The audio dithering has been slightly improved. It was changed from 1.5-bit rectangular to 1-bit triangular. - Bugfix: Don't load sample data after loop end when importing The Ultimate SoundTracker (STK/UST) modules. The data would be one-shot played in PT, which is not how it works in STK/UST. Fixes several modules... - Bugfix: Reset tempo mode to CIA when loading a new module - The module loader code has been cleaned up a little bit v1.04 - 29.01.2020 - Fixed a bug where loading certain .MODs would lead to messed up sample data (so far I have only found one, so it was rare). - Made some small optimizations to the audio channel mixer. The mixing is still bit-exact to the previous version... - Windows 32-bit: This version now requires your CPU to have the SSE2 instruction set, which the audio channel mixer takes good advantage of. Intel CPUs from around 2000 (AMD around 2003) and later have it. In other words, it's not worth my time trying to make the clone run on such old machines... v1.03 - 22.01.2020 - Bugfix: The MOD2WAV function would write .wav files with a wrong chunk length. Some .wav loaders didn't like this... - Bugfix: Don't allow toggling scope muting with right mouse button while MOD2WAV is ongoing. v1.02 - 06.01.2020 - The paulaSetLength() function now takes length in words, not bytes. This doesn't really change anything, but it's more correct. - Fixed a very minor bug with VOL up/down button in Edit Op. - Fixed a bug where the scopes could show the wrong volume for the tunetone waveform (sampler screen). - Some code cleanup v1.01 - 19.12.2019 - Hardware mouse ("HWMOUSE" in config) now has the same colors and shape as the original PT cursor. This mode is now the new config default. - MacOS: Pass NDEBUG to clang preprocessor defines, to prevent debug code from being compiled in release mode. v1.00 - 02.12.2019: - This is now the first "stable" release, and it's not in beta anymore - Renamed binary/folder/zip names - This version is otherwise identical with the previous "beta #37" version
Mid
[ 0.538636363636363, 29.625, 25.375 ]
LONDON -- Un-baaaaa-lievable: This wild bunch is completely ignoring rules on social distancing. With humans sheltering indoors to escape the new coronavirus, mountain goats are taking advantage of the peace and space to roam in frisky clumps through the streets of Llandudno, a town in North Wales. Andrew Stuart, a video producer for the Manchester Evening News, has been posting videos of the furry adventurers on his Twitter feed and they are racking up hundreds of thousands of views. He said the goats normally keep largely to themselves, in a country park that butts up against Llandudno. But now emboldened by the lack of people and cars, the long-horned animals are venturing deeper into the seaside town. The U.K. has been in lockdown for the past week to combat the spread of the coronavirus. “There’s no one around at the moment, because of the lockdown, so they take their chances and go as far as they can. And they are going further and further into the town,” Stuart told The Associated Press in an interview Tuesday from his parents’ pub in Llandudno, where he is waiting out the pandemic. His videos show the goats munching on people’s neatly trimmed hedges and trees in front yards and loitering casually on empty streets as if they own the place. “One of the videos on my Twitter shows that they were on a narrow side street and I was on the other side and they were scared of me. They were edging away from me. So they are still scared of people,” Stuart said. “But when there’s hardly anyone around on the big streets, they are taking their chances, they are absolutely going for it. And I think because it’s so quiet, and there’s hardly anyone around to scare them or anything, that they just don’t really care and are eating whatever they can.” For most people, the new coronavirus causes mild or moderate symptoms, such as fever and cough that clear up in two to three weeks. For some, especially older adults and people with existing health problems, it can cause more severe illness, including pneumonia, and death.
Mid
[ 0.53875968992248, 34.75, 29.75 ]
1994–95 Ukrainian Third League 1994–95 Ukrainian Third League was the last season of the experimental Third League. For the following year the league was consolidated into the Druha Liha. All the teams that placed above 17th place were welcome to apply for participation in the Druha Liha along with any successful amateur teams. The season started on August 14, 1994, with the final round being played on July 2, 1995. The newly reformed CSKA won the top awards. However, those medals were snatched from under the nose of the leading Nyva Myronivka who were in the lead with only two rounds to go. Those, together with the Tysmenytsia men, were the main challengers for the gold by the end of the season. This was the last year that the relegated clubs left the league and if Shakhtar Stakhanov was showing some determination for a victory, Zalishchyky were pretty much forced out of the league by various circumstances, such as poor performance. Team change Relegated team Two teams were relegated from the 1993–94 Ukrainian Second League. FC Dnister Zalishchyky – 21st place (debut) FC Shakhtar Stakhanov – 22nd (last) place (debut) Promoted teams Six group winners and six runners-up of 1993–94 Ukrainian Football Amateur League FC LAZ Lviv – winner of the Group 1 (debut) FC Lada Chernivtsi – runner-up of the Group 1 (debut) FC Advis Khmelnytskyi – winner of the Group 2 (debut) FC Keramik Baranivka – runner-up of the Group 2 (debut) FC Transimpeks Vyshneve – winner of the Group 3 (debut) FC Sula Lubny – runner-up of the Group 3 (debut) FC Avanhard Rovenky – winner of the Group 4 (debut) FC Vahonobudivnyk Kremenchuk – runner-up of the Group 4 (debut) FC Metalurh Novomoskovsk – winner of the Group 5 (debut) FC Shakhtar Horlivka – runner-up of the Group 5 (debut) FC Tavria Novotroitske – winner of the Group 6 (debut) FC Dnistrovets Bilhorod-Dnistrovskyi – runner-up of the Group 6 (debut) Final standings Notes Dnister, Fetrovyk, Lada, and Sula withdrew from the league. Hart changed its name to Systema-Borex CSK ZSU changed its name to CSKA Avanhard-Industiya was known simply as Avanhard Skify-LAZ was known as LAZ Top scorers Mykola Kovalchuk (CSKA) - 24 Viktor Pobehayev (Systema) - 24 (3) Vadym Vus (CSKA) - 17 Oleksandr Dovhalets (Advis) - 15 (3) Ihor Shylo (Avanhard-Ind) - 15 (8) Transimpeks-Slavutych situation The recently promoted Transimpeks was based in Vyshneve, then the club moved to Trezine where it changed its name to Transimpeks-Ros-2 (as a second team for FC Ros Bila Tserkva). Both clubs went through some financial difficulties and Transimpeks ended up with the greater impact. The administration of Ros could not afford another team and replaced it with amateurs from Kiev Oblast. Skhid Slavutych this season was competing in the amateur competitions, at first being situated in Yahotyn and later relocating all the way to Slavutych. By the end of the season Skhid Slavutych was promoted to the Third League to replace the "purged" Transimpeks, forfeiting all its games in the amateur competitions. Skhid, however, managed not to get relegated and was allowed to be promoted to the Second League becoming a professional club. In four of its games Skhid earned four points by winning one home game in Slvutych and earning a drew in Bilhorod. See also Ukrainian Second League 1994-95 Ukrainian First League 1994–95 Amateur championship 1994-1995 1994–95 Ukrainian Cup External links Table and results Category:Ukrainian Third League seasons 4 Ukra
Mid
[ 0.548707753479125, 34.5, 28.375 ]
Colourful Spring Wedding Cakes The vibrancy of spring wedding cakes owes as much to the gorgeous flowers that both adorn the spring wedding cake and inspire it. Gorgeous flowers cascade down the tiers of the wedding cake. Young brides who opt for a spring wedding theme usually ensure the colour motifs match those of the rest of the wedding party. It is only natural that a spring wedding should be a colourful affair, and it is equally natural that the spring cake embodies the colour and exhuberence of spring flowers. And did I mention they should be vibrant? Other spring theme wedding cake ideas may include a vivacious fondant frosting colour of, perhaps apple green or vibrant yellow. Then decorated with simple sugar paste or gum paste florals. The design may be simple but effective for the spring wedding theme. Four tier floral cake with fresh spring flowers. The wedding cake is covered with white rolled fondant then garnished with an assortment of mini fruits and fresh spring florals. From www.wildflowersbylori.com Creative three tier wedding cake decorated with white branch like fondant designs and large stunning pink hand made flowers. From www.butterflycakes.com
Mid
[ 0.5484536082474221, 33.25, 27.375 ]
Category: Press Student ambassadors train against bullying, violence September 9, 2019 KUAM News About 400 recruited students from nine private schools and one public high school participated in the two-day Safe School Ambassadors® training that was hosted for the sixth year by the Judiciary of Guam in partnership with the Guam Department of Education. Safeguarding Schools Inside-Out Instead of Outside-In Most schools adopt an adult-driven, control-driven, outside-in approach to secure schools. They rely on school resource officers, punitive policies and, often, metal detectors. That approach—keeping trouble out—may work at an airport or in a prison but not in schools, says Community Matters founder Rick Phillips. To fight cyberbullying, school makes students online hall monitors New Study: Cool Kids Get Bullied Too April 2, 2014 – KQED Forum with Michael Krasny CM founder Rick Phillips joins a panel of experts on bullying to discuss a study of North Carolina youth that showed a surprising increase in bullying victimization as they went higher up the social ladder.
Mid
[ 0.5668662674650691, 35.5, 27.125 ]
// Massgate // Copyright (C) 2017 Ubisoft Entertainment // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 2 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program. If not, see <https://www.gnu.org/licenses/>. #include "stdafx.h" #include "MT_Event.h" MT_Event::MT_Event(void) { // Creates the event object // initially set to unsignalled // myEvent = CreateEvent(NULL,FALSE,FALSE,NULL); // SWFM:SWR - changed to auto reset // SWFM:SWR - changed back to manual reset (background loader requires this) myEvent = CreateEvent(NULL,TRUE,FALSE,NULL); } MT_Event::~MT_Event(void) { CloseHandle(myEvent); } void MT_Event::ClearSignal() { ResetEvent(myEvent); } void MT_Event::Signal() { SetEvent(myEvent); } void MT_Event::WaitForSignal() { MC_THREADPROFILER_ENTER_WAIT(); if (WaitForSingleObject(myEvent, INFINITE) != WAIT_OBJECT_0) { assert(0); } MC_THREADPROFILER_LEAVE_WAIT(); } void MT_Event::TimedWaitForSignal(const u32 aTimeoutPeriod, bool& signalled) { // Performs a timed wait on the semaphore (in ms), returning whether // the operation succeeded, and populating the supplied bool reference // with a value corresponding to whether the semaphore was signalled // - not signalled assumes a timeout occurred. MC_THREADPROFILER_ENTER_WAIT(); signalled = false; DWORD result = WaitForSingleObject(myEvent, aTimeoutPeriod); if (result == WAIT_OBJECT_0) signalled = true; else if (result == WAIT_TIMEOUT) signalled = false; else assert(0); MC_THREADPROFILER_LEAVE_WAIT(); }
Mid
[ 0.5559845559845561, 36, 28.75 ]
Ni3C-assisted growth of carbon nanofibres 300 °C by thermal CVD. Ni-assisted thermal chemical vapor deposition (TCVD) is one of the most common techniques for the growth of carbon nanofibres/nanotubes (CNFs/CNTs). However, some fundamental issues related to the catalytic growth of CNFs/CNTs, such as the low-limit growth temperature, the limiting steps and the state of Ni, are still controversial. Here, we report the growth of CNFs at 300 °C; that is the lowest temperature for the growth of CNFs by TCVD using Ni as the catalyst so far. The results showed that the Ni existed in rhombohedral Ni3C, not in the normal form of face-centered cubic Ni, and the C atoms for building the CNFs were precipitated from the (001) planes of the faceted Ni3C nanoparticles. The CNFs are believed to be formed by the decomposition-formation cycle of metastable Ni3C that has a low-limit decomposition temperature of about 300 °C. Our results strongly suggest that TCVD is a valuable tool for the synthesis of CNFs/CNTs at temperatures below 400 °C, which is generally considered as the upper-limit temperature for fabricating complementary metal oxide semiconductor devices but is the low-limit temperature for growing CNFs/CNTs by TCVD at present.
Mid
[ 0.6485148514851481, 32.75, 17.75 ]
Bored with your cushy, overpowered luxury sedan? Do modern "dynamic" designs fail to live up to your expectations of dynamism? Have you grown weary of the endless hordes of dull, anonymous, unoriginal cars you see everywhere? That's because the wrong people are running car companies. These kids should be the ones doing it. Read more... By Mary Wisniewski CHICAGO (Reuters) - In a surprise result that showed the limits of a big-money campaign, Chicago Mayor Rahm Emanuel failed to get more than 50 percent of the vote in Tuesday's election, and must face a run-off against second-place finisher Jesus "Chuy" Garcia in April. The setback for Emanuel, 55, came despite a visit to Chicago last week from President Barack Obama, whom ... In France, a country that remains on edge after a recent terrorist attack, "at least five drones flew over the Eiffel Tower, the U.S. Embassy and other Paris landmarks overnight," The Associated Press reports. "It was the most audacious of several mysterious drone overflights around France in recent months. "In France it is a growing worry after dozens of sightings of mystery drones over nuclear ... In France, a country that remains on edge after a recent terrorist attack, "at least five drones flew over the Eiffel Tower, the U.S. Embassy and other Paris landmarks overnight," The Associated Press reports. "It was the most audacious of several mysterious drone overflights around France in recent months. "In France it is a growing worry after dozens of sightings of mystery drones over nuclear ...
Low
[ 0.42386831275720105, 25.75, 35 ]
[Inheritance of academic idea and experience about using traditional Chinese medicine from JIN Shi-yuan]. Professor Jin Shi-yuan has been worked in traditional Chinese medicine (TCM) over 70 years. He made prominent contributions in identification, processing, dispensing of TCM and reasonable use proprietary Chinese medicine. In over 70 years, he has mastered herbal medicine and traditional Chinese Medicine. It is also professor JIN's academic characteristic. Professor JIN's practical experiences were summarized according to the current situation about clinical medication, change of species of Juhong and Chenpi has been different from species of medical history. The quality is lower than before. Medicinal parts of Danggui, Gancao, Huangqin and Wuyao has been changed. So the actions of these herbal medicines have been changed also. Fresh herbal Qianchangpu has disappeared but it should be used clinically. Medical history, change of species, change of medicinal part, and change of preparing process in professor JIN's academic idea were be summarized periodically. The result is hoped to be referred by administration, manufacture, medical treatment of TCM.
Mid
[ 0.60093896713615, 32, 21.25 ]
Click on the “Search Events” button and enter the tournament you want to search for. They all start with the NEMWA. Once you have found the tournament, click on the blue tournament name link. When the tournament login box appears, chose “statistician” from the dropdown box. Enter your username and password. If you don’t have this information, contact the NEMWA secretary using the contact information below. Once logged in, next to the text that says “click here to import” pick your club from the drop down box. In the dropdown box next to the text “roster from” pick “a club coach account.” Once you have the dropdown boxes populated, click the blue “here” link and your club roster will appear. From your roster, check those who you want to register for the tournament and then click import. Once your wrestlers have been imported, their names will be in blue. Click on the names and enter the weight classes and actual weights. You can also update the wrestlers information or even delete wrestlers if you need to.
Mid
[ 0.5987261146496811, 35.25, 23.625 ]
Nobuo Yoneda was a Japanese mathematician and computer scientist. He obtained his Ph.D. degree from the University of Tokyo in 1952, under the direction of Shokichi Iyanaga. That same year he was appointed Assistant Professor in the Department of Mathematics of the University of Tokyo. In 1962 he was appointed Associate Professor in the Faculty of Science at Gakushuin University, and was promoted in 1966 to the rank of Professor. He became a professor of Theoretical Foundation of Information Science in 1972. After retiring from the University of Tokyo in 1990, he moved to Tokyo Denki University. The Yoneda lemma in category theory and the Yoneda product in homological algebra are named after him. In computer science, he is known for his work on ALGOL dialects. References External links Category:1930 births Category:1996 deaths Category:Japanese computer scientists Category:20th-century Japanese mathematicians Category:University of Tokyo alumni Category:University of Tokyo faculty Category:Gakushuin University
High
[ 0.694050991501416, 30.625, 13.5 ]
Q: How to union when using matching I am trying to list public status posts and friends posts getting friends post $friendsPosts= $this->Posts->find('all') ->contain(['Users', 'Languages', 'PostStates']) ->matching('Users.Dusers', function ($q) { return $q->where(['Dusers.id' => $this->Auth->user('id')]); }); getting public post $posts= $this->Posts->find('all') ->where(['Posts.post_state_id' => 3]) ->contain(['Users', 'Languages', 'PostStates']); $posts->union($friendsPosts); dd($posts->toArray()); error message: The used SELECT statements have a different number of columns A: Here is solution $posts = $this->Posts->find() ->where(['Posts.post_state_id' => 3]) ->contain(['Users', 'PostStates', 'Languages', 'Tags', 'Translations' => ['Users', 'Languages', 'conditions' => ['post_state_id' => 3]]]); $friendsPosts = $this->Posts->find('all') ->where(['Posts.post_state_id' => 2]) ->contain(['PostStates', 'Languages', 'Users', 'Tags', 'Translations' => ['Users', 'Languages', 'conditions' => ['post_state_id' => 3]]]) ->innerJoinWith('Users.Dusers', function ($q) { return $q->where(['Dusers.id' => $this->Auth->user('id'), 'UsersUsers.status' => 1])->select($this->Posts->Users); }); $posts->union($friendsPosts);
Mid
[ 0.6453201970443351, 32.75, 18 ]
Thanksgiving Baking Party This shop has been compensated by Collective Bias, Inc. and its advertiser. All opinions are mine alone. #nestleholidaybaking #CollectiveBias Thanksgiving Baking Party My daughter and I are so lucky to have a great group of mom friends and daughters. We like gathering together each month for our Mother/Daughter Book Club. We discuss a pre-selected book (that we all read) and do some fun activities. This month, it was our turn to host. So to celebrate food and friendship, our theme was Thanksgiving Baking. My first stop was Walmart, where I knew I would be able to score some delicious ingredients for making Thanksgiving treats! On a freestanding shelf in the middle of the grocery aisle, we found my new faves… NESTLÉ® TOLL HOUSE® Pumpkin Spice Morsels. One word. Yum! Fall would be “fall” without the flavor of pumpkin. These morsels also have some cinnamon in them, it’s the perfect combo. I also scored some cans of LIBBY’S® 100% Pure Pumpkin, 15oz. The display was also in the middle of the aisle in the grocery section. Do you know LIBBY’S® 100% Pure Pumpkin is 100% natural and pure? Plus there are no preservatives. And of course, what is holiday baking without evaporated milk? In the baking aisle, I located NESTLÉ® CARNATION® Evaporated Milk, 15oz. Families have been using it in their holiday baking for generations. To get set for our upcoming soiree, we got baking! I wanted to take a classic– CARNATION® Famous Fudge, and put a Thanksgiving spin on it. Pumpkin Spice Fudge Recipe I’d love to share the recipe for this delectable Pumpkin Spice Fudge with you. This is one of the treats my daughter and I served at our Thanksgiving Baking Party to get the party-goers in the baking mood! Pumpkin Spice Fudge Recipe Type: Dessert Cuisine: American Author: Malia Karlinsky Prep time: 10 mins Cook time: 6 mins Total time: 16 mins Serves: 48 pieces Delectable Pumpkin Spice Fudge. a fast, festive and easy recipe for the holidays Your friends and their kids are the lucky ones. What a FUN party to attend! You had me at pumpkin spice! I love the fudge and bread recipes. YUMM! And that apron is so adorable! Now I want to host a Thanksgiving party! -client
Mid
[ 0.6015625, 38.5, 25.5 ]
Effect of the deubiquitination enzyme gene UBP6 on the stress-responsive transcription factor Msn2-mediated control of the amino acid permease Gnp1 in yeast. In the yeast Saccharomyces cerevisiae, the transcriptional factor Msn2 plays an essential role in response to a variety of environmental stresses by activating the transcription of many genes that contain the stress-responsive elements in the promoters. We previously reported that overexpression of the MSN2 gene confers tolerance to various stresses in industrial yeast strains. Recently, the overexpression of MSN2 was shown to increase the amount of the amino acid permease Gnp1 on the plasma membrane, leading to the increased uptake of proline into the cell, suggesting a novel link between the Msn2-mediated stress response and amino acid homeostasis in yeast. Here, we found that overexpression of MSN2 increased ubiquitinated protein levels with reduced free ubiquitin. Among deubiquitinating enzymes (DUBs), it was revealed that the loss of Ubp6 depleted the free ubiquitin level and decreased tolerance to the toxic amino acid analogues. The overexpression of UBP6 in MSN2-overexpressing cells clearly complemented the impaired tolerance towards the toxic amino acid analogues. Both the protein level and the plasma-membrane localization of Gnp1 were increased in ubp6-deleted cells, as shown in MSN2-overexpressing cells. These results suggest that an excess level of Msn2 impairs endocytic degradation of Gnp1 through dysfunction of Ubp6 and other DUBs.
High
[ 0.677792041078305, 33, 15.6875 ]
--- abstract: 'Many mobile systems and wearable devices, such as Virtual Reality (VR) or Augmented Reality (AR) headsets, lack a keyboard or touchscreen to type an ID and password for signing into a virtual website. However, they are usually equipped with gesture capture interfaces to allow the user to interact with the system directly with hand gestures. Although gesture-based authentication has been well-studied, less attention is paid to the gesture-based user identification problem, which is essentially an input method of account ID and an efficient searching and indexing method of a database of gesture signals. In this paper, we propose FMHash (*i.e.*, Finger Motion Hash), a user identification framework that can generate a compact binary hash code from a piece of in-air-handwriting of an ID string. This hash code enables indexing and fast search of a large account database using the in-air-handwriting by a hash table. To demonstrate the effectiveness of the framework, we implemented a prototype and achieved $\ge$99.5% precision and $\ge$92.6% recall with exact hash code match on a dataset of 200 accounts collected by us. The ability of hashing in-air-handwriting pattern to binary code can be used to achieve convenient sign-in and sign-up with in-air-handwriting gesture ID on future mobile and wearable systems connected to the Internet.' author: - | Duo Lu, Dijiang Huang, Anshul Rai\ Arizona State University, Tempe, Arizona\ [@asu.edu]{} bibliography: - 'reference.bib' title: 'FMHash: Deep Hashing of In-Air-Handwriting for User Identification ' --- user identification, gesture ID, in-air-handwriting, fuzzy hashing, deep learning INTRODUCTION ============ Gesture user interfaces are considered as the future way for people to interact with Virtual Reality (VR) or Augmented Reality (AR) applications [@HoloLens] and other devices such as a smart door bell or smart watch [@Soli]. Such interfaces can capture and track hand motions in the air, and allow a user to manipulate menus, dialogues, and other virtual objects directly by hand gesture. However, for security related tasks such as sign-up and sign-in, entering the user ID string and password through a virtual keyboard on gesture interfaces become cumbersome due to the lack of keystroke feedback. Existing researches [@ArmSweep; @Feasibility; @uWave; @Madrid-Analysis; @LeapPassword; @KinWrite; @FMCode-IJCB; @FMCode-ICB] exploit the rich information in native gestures, and esp., in-air-handwriting, to authenticate a user. Yet, a usually neglected function is user identification. Authentication is a true or false question, *i.e.*, answering whether the user owns the account which he or she claims to own. On the other hand, identification is a multiple choice question, *i.e.*, answering which account the user wants to login among a database of many accounts. If we make an analogy of the sign-in procedure on a web with a desktop computer, the authentication procedure resembles typing and checking the password, while the identification procedure resembles searching the database given an ID number or ID string. Is it possible to construct a system that is capable of (1) taking a piece of in-air-handwriting of an ID string instead of typing, (2) searching a potentially large database of accounts registered using the in-air-handwriting, and (3) returning the matched identity or account number with high accuracy and short respond time? There are challenges for gesture-based user identification due to the unique characteristics of the hand motion. First, hand motion has inherent fuzziness. Even if the same user writes the same string in the air twice, the generated two motion signals are not identical, but with minor variations. Yet, the system should be able to tolerate the fuzziness and identify these two signals as the same user. This is different from typing an ID string of characters twice where even a single bit difference in the typed ID can cause failure in the identification. Second, it is difficult for many native gestures to provide enough information to enable a large account ID space as well as distinctiveness. Third, the traditional method of hash table for indexing a large account database using an ID string or account number does not work with handwriting signal, unless there is a way to generate a fixed size binary hash code from the signal with tolerance of inherent fuzziness (*i.e.*, fuzzy hash). ![image](arch.pdf){width="7in"} In this paper, we propose a framework called **FMHash**, i.e., Finger Motion Hash, to efficiently obtain a user’s account ID from the hand motion signal of writing an ID string in the air. FMHash uses a camera-based gesture user input device to capture the hand motion and a deep convolutional neural network (called FMHashNet) to convert the in-air-handwriting signal to a binary hash code (*i.e.*, deep hashing). With the hash code of the signals of all accounts, it further builds a hash table to index the whole account database to enable efficient user identification with hash table search. This is similar to face recognition, where a large database of identities are indexed using faces and an ID can be retrieved by presenting an image of a face. However, FMHash has a few unique advantages compared to face recognition. For example, one face is linked to one person, and a user can neither have multiple faces for multiple accounts nor change or revoke his or her own face. Moreover, the users may be worried about privacy because it is impossible to stay completely anonymous if a website requires face image to register. Yet, with in-air-handwriting of an ID string, the user can have multiple accounts with different ID strings, change or revoke the ID string, and stay anonymous by writing something unrelated to the true identity. In summary, our contributions in this paper are as follows: **1)** We proposed a deep hashing framework of in-air-handwriting for user identification over gesture interface. To our best knowledge, FMHash is the first framework that can generate fuzzy hash code from in-air-handwriting. Our method can accommodate gesture fuzziness by hashing multiple instances of the same handwriting by the same user to the same binary code with high probability of success ($\ge$99.5% precision and $\ge$92.6% recall with exact hash code match). **2)** We designed a regularizer called the *pq-regularizer* and a progressive training procedure for our neural network model. With the *pq-regularizer*, hashcode of in-air-handwriting signals of different accounts are separated more than two bits in over 99% of the change. Meanwhile, we can maintain a reasonably fast training speed ($\sim$10 minutes for a full training on our dataset). **3)** We provided a detailed analysis on the hash code fuzziness with a dataset of 200 accounts collected by us. The remainder of the paper is organized as follows. Related works on gesture-based authentication and deep hashing are discussed in section II. In section III, the architecture of the proposed framework is presented. Then we show the empirical evaluation results in section IV. Finally we draw the conclusion and discuss future work in section V. RELATED WORKS ============= Most 3D hand gesture based user authentication systems use a combination of password and behavioral biometrics, *i.e.*, different users are differentiated in the gesture content or the convention of hand motion (sometimes both). The hand motion can be captured by a handheld device [@uWave; @Madrid-Analysis], wearable device [@ArmSweep; @FMCode-IJCB], or a camera [@LeapPassword; @KinWrite; @FMCode-ICB]. The authentication system compares the captured motion signal with a template [@uWave; @KinWrite; @FMCode-ICB] or runs a pipeline of feature extractors and statistical pattern classifiers [@Madrid-Analysis; @FMCode-IJCB] to make a decision. The gesture content can be simple movements like shaking [@ArmSweep] or complex in-air-handwriting of a password or signature [@LeapPassword; @KinWrite; @MoCRA]. As mentioned previously, identification is different from authentication. Existing systems need to exhaustively check every account in the database using the authentication procedure, *i.e.*, in $O(N)$ complexity, which is impractical with a large account database. Instead, we take a different route by converting a in-air-handwriting signal to a binary code using a deep hashing method for efficient user identification, *i.e.*, in $O(1)$ complexity. Deep hashing has been investigated in communities of computer vision and machine learning for image retrieval [@xia2014supervised; @lai2015simultaneous; @zhao2015deep; @zhu2016deep; @DSH; @lin2016learning; @cao2017deep; @Liu_2017_CVPR] instead of security. Such image searching systems train a deep convolutional neural network (CNN) to convert 2D images to compact binary hash codes, and use the hash code to index a database with millions of images. To search similar images, a query image is converted to a hash code with the same neural network, and images in the database with similar hash code (*i.e.*, in Hamming distance) are returned. Training such a neural network requires techniques of pairwise supervision [@xia2014supervised; @DSH], triplet supervision [@zhang2015bit; @lai2015simultaneous], or various careful design of regularization and quantization [@DSH], as well as special treatment of the image like salience mask [@jin2018deep]. Although we are also utilizing CNN to generate hash code, our work has differences. First, the features of in-air-handwriting motion signal are fundamentally different from the features of an image. Second, user identification has different goals from image retrieval. Our identification system desires sparsity in the hash code space to avoid wrong identification because each ID is unique (using the *pq-regularizer*); while an image searching system desires smooth similarity change of the hash code to cope with the smooth semantic shift of images. Meanwhile, long hash code is preferred in identification to defend random guess. Third, considering that new accounts are registered from time to time, a neural network for user identification must be optimized with smaller number of parameters and faster training speed so as to be retrained online frequently. It should also be noted that FMHash is not a biometric verification system, and an ID string is not a signature linked to personal identity. An ID string can be created by a user containing arbitrary content as long as it has distinctiveness in the account database. THE FMHASH FRAMEWORK ==================== The proposed FMHash framework (shown in Fig. \[fig:arch\]) contains six components: \(1) An in-air-handwriting motion capture device (e.g., a Leap Motion controller [@LeapMotion] in our implementation); \(2) A preprocessing module smoothing and normalizing the captured motion signal (detailed in section III.A); \(3) A deep neural network that takes preprocessed motion signal $\mathbf{x}$ as input and generate a high dimensional floating point latent vector $\mathbf{h}$ (denoted as a function $f(\mathbf{x})=\mathbf{h}$, detailed in section III.B); \(4) An additional neural network layer that projects the latent vector $\mathbf{h}$ to low dimensional space and quantize the projected result to $B$-bit binary fuzzy hash code $\mathbf{b} \in \{-1, +1\}^B$ (denoted as another function $g(\mathbf{h})=\mathbf{b}$, and $B$ ban be 16, 32, 64, etc., also detailed in section III.B); \(5) An account database that stores a hash table index of account tuples $<$ID, $\mathbf{b}^{ID}$, $\mathbf{h}^{ID}>$, where ID is the account ID (usually a unique number generated by the system at registration), $\mathbf{b}^{ID}$ and $\mathbf{h}^{ID}$ are the hash code and latent vector corresponding to the account (detailed in section III.C); \(6) Optionally, there is an verification module after an ID is obtained by the FMHash framework. This ID is a candidate ID. The system can run a procedure similar to the authentication procedure by comparing the in-air-handwriting of the ID string to some information stored in the account referred by the candidate ID, which can further eliminate wrong identification results (detailed in section III.D). Signal Acquisition and Preprocessing ------------------------------------ ![An example of the motion signal (left) and trajectory in the 3D space (right) obtained by writing “FMhash” in the air.[]{data-label="fig:sig_exp"}](sig_exp){width="3.4in"} The in-air-handwriting of an ID string is captured by the Leap Motion controller in our implementation as a raw signal containing the 3D position coordinates of the center of the hand sampled at about 110 Hz. Once this raw signal is obtained, we further extract the 3D velocity, and 3D acceleration using the difference of adjacent position samples. Then the signal is normalized in hand pose (making the average hand pointing direction as x-axis) and amplitude (mean subtraction and division by standard deviation). Finally it is resampled to a fixed length of 256 data points in each dimension to form the 256$\times$9 input vector $\mathbf{x}$. An example of the motion signal and the trajectory of in-air-handwriting is shown in Fig. \[fig:sig\_exp\]. FMHashNet --------- \[tb:nn\_arch\] [|c|c|c|c|]{} layer & kernel & output & \#para\ \ conv-pool1 & 3$\rightarrow$1 conv, 2$\rightarrow$1 max pool & 128 \* 48 & 1.3k\ conv-pool2 & 3$\rightarrow$1 conv, 2$\rightarrow$1 max pool & 64 \* 96 & 14k\ conv-pool3 & 3$\rightarrow$1 conv, 2$\rightarrow$1 max pool & 32 \* 128 & 37k\ conv-pool4 & 3$\rightarrow$1 conv, 2$\rightarrow$1 avg pool & 16 \* 192 & 74k\ conv-pool5 & 3$\rightarrow$1 conv, 2$\rightarrow$1 avg pool & 8 \* 256 & 147k\ fc (latent) & fully connected & 512 & 1,048k\ [|c|c|c|c|c|c|c|]{} layer & output & \#para & & layer & output & \#para\ softmax & 200 & 102k & & projection & B & 512\*B\ & &\ The deep neural network and the additional projection-quantization layer are implemented together, which are collectively called the FMHashNet. There are multiple design goals of this neural network. First, for a pair of in-air-handwriting signals $(\mathbf{x}_1, \mathbf{x}_2)$, if they are generated by the same user writing the same ID string, the corresponding hash codes $(\mathbf{b}_1, \mathbf{b}_2)$ should be the same in most cases or differ only in one or two bits sometimes due to the fuzziness of the signals. However, if they are generated from different ID strings (regardless of the same user or different users), $(\mathbf{b}_1, \mathbf{b}_2)$ should differ by at least three bits. Second, the neural network should learn contrastive representations $\mathbf{h}$ to facilitate the projection. Third, it should be easy to train and fast to converge. To achieve these goals, we design the FMHashNet in the following way, as shown in Table 1. First, we apply five convolutional and pooling layers with VGG-like kernel [@VGG] and a fully connected layer to map input signal $\mathbf{x}$ to latent vectors $\mathbf{h}$. Both the convolutional layer and the fully connected layer have leaky ReLU activation. Next, the projection layer projects the latent vector $\mathbf{h}$ to a space in the same dimension as the final hash code, i.e., $\mathbf{z} = W\mathbf{h} + \mathbf{c}$, where $\mathbf{z}$ is the projected vector whose dimension is $B$. Here $W$ and $c$ are trainable parameters. After that, the hash code is generated by taking the sign of the projected vector $b_i = sign(z_i), 1 \le i \le B$. This is essentially partitioning the latent space by $B$ hyperplanes to obtain at most $2^B$ regions, where each region is associated with a unique hash code. Additionally, a softmax layer is added in parallel with the projection layer to help training the neural network. Training the FMHashNet is equivalent to placing all registered accounts into these $2^B$ regions, which is achieved progressively in two steps. First, we train the network with the softmax layer and cross-entropy loss to allow the convolutional filters to converge. In this step the projection layer is not activated. Note that the softmax classification layer does not need to contain all accounts if the account number is large, or even a independent dataset for pretraining can be utilized. Second, we train the network using the projection layer with the following pairwise loss $L$, and minibatches of $2M$ pairs of signals $(\mathbf{x}^{(i)}_1, \mathbf{x}^{(i)}_2), 1 \le i \le 2M$ . Here $2M$ (*i.e.*, the batch size) is a hyperparameter chosen empirically. Larger batch size leads to more computation in the training but more stable convergence behavior. In the minibatch, half pairs of signals are from the same account ($y^{(i)}$ = 0), and the other half pairs of signals are from different accounts ($y^{(i)}$ = 1). The loss function $L$ is as follows: $$L = \frac{1}{2M}\sum_{i = 1}^{2M}L^{(i)},$$ $$L^{(i)} = (1 - y^{(i)}) ||\mathbf{z}_1^{(i)} - \mathbf{z}_2^{(i)}|| + y^{(i)} \mbox{max}(m - ||\mathbf{z}_1^{(i)} - \mathbf{z}_2^{(i)}||, 0)$$ $$+ \alpha (P(\mathbf{z}_1^{(i)}) + P(\mathbf{z}_2^{(i)})) + \beta (Q(\mathbf{z}_1^{(i)}) + Q(\mathbf{z}_2^{(i)})).$$ Here $||.||$ is the Euclidean norm. In this loss function, the first term forces the projected vectors of the same account to the same value, and the second term forces the projected vectors of different accounts to separate at least $m$ in Euclidean distance. The remaining terms $P(\mathbf{z})$ and $Q(\mathbf{z})$ are the so-called *pq-regularizer* which is specially designed to help place all registered accounts into different regions and avoid ambiguity in quantization. These two terms are defined as follows: $$P(\mathbf{z}^{(i)}) = \sum_{j = 1}^{B} \mbox{max}(|z_j^{(i)}| - p, 0),$$ $$Q(\mathbf{z}^{(i)}) = \sum_{j = 1}^{B} \mbox{max}(q - |z_j^{(i)}|, 0),$$ where $p$ and $q$ are hyperparameters chosen empirically, $|z_j^{(i)}|$ is taking absolute value of the $jth$ component of $\mathbf{z}^{(i)}$. This regularizer forces each element of the projected vector $\mathbf{z}$ to reside in the region $[-p, -q]$ or the region $[+q, +p]$. The element $\mathbf{z}^{(i)}$ is quantized to the bit -1 if it is less than zero or bit +1 if it is greater or equal to zero, so as to generate the final fuzzy hash code bit $b_i$. The $p$ prevents $\mathbf{z}^{(i)}$ taking unbounded large values, and the $q$ prevents $\mathbf{z}^{(i)}$ taking values close to zero which causes quantization ambiguity. With a careful choice of $m$, we can push a pair of $(\mathbf{z}^{(i)}_1, \mathbf{z}^{(i)}_2)$ of different accounts to opposite regions, and hence, hash them to different binary codes, as shown in Fig. \[fig:regularizer\]. One example choice of $m$ as in our experiment is $p \sqrt{B}$, which is the Euclidean distance from the origin to the point $\mathbf{z}^\ast = (p, p, ..., p)$. This forces the hash code of signals of different accounts differ at least one bit. Our experience shows larger $m$ helps separation, but hurts convergence. The hyperparameter $\alpha$, $\beta$ controls the portion of contribution of the regularizer in the total loss and gradients. Our design differs from most related works of deep hashing which try to minimize quantization loss (i.e., forces the projected vector to be close to the vertices of Hamming hypercube). Instead, we map the input to a bounded Euclidean space and push them away from the decision boundary $z_j = 0$, where a relatively large region that can be quantized to the same bit value regardless of the quantization error. The effectiveness of our regularizer relies on the assumption that ID strings are distinctive, which is true in an identification system but not in an image retrival system. Meanwhile, both the FMHashNet activation function and the regularizer are piece-wise linear, which is easier to compute and train compared to the saturation methods such as tanh or sigmoid relaxation commonly used in deep hashing. ![The effect of the pq-regularizer that pushes $(\mathbf{z}_1, \mathbf{z}_2)$ from different accounts to different regions, in illustration (left) and with actual data (right). The right figure is obtained by plotting the first two dimensions of $\mathbf{z}$ of 200 training signals from 200 different accounts, with p=10 and q=5.[]{data-label="fig:regularizer"}](regularizer){width="3.25in"} Account Database ---------------- As mentioned previously, each account contains a tuple of $<$ID, $\mathbf{b}^{ID}$, $\mathbf{h}^{ID}>$. At registration time, the system generates a unique account ID for the registered account. The user is asked to create an ID string and write it $K$ times. The obtained $K$ in-air-handwriting signals $\{\mathbf{x}^{(1)}, \mathbf{x}^{(2)}, ..., \mathbf{x}^{(K)}\}$ are utilized to train the FMHashNet. Once the training is finished, we can use the training signals to construct $\mathbf{b}^{ID}$ and $\mathbf{h}^{ID}$ as follows: $$\mathbf{h}^{ID} = \frac{1}{K} \sum_{i = 1}^{K}\mathbf{h}^{(i)} = \frac{1}{K} \sum_{i = 1}^{K}f(\mathbf{x}^{(i)}),$$ $$\mathbf{b}^{ID} = g(\mathbf{h}^{ID}) = \mbox{sign}(W\mathbf{h}^{ID} + \mathbf{c}),$$ where $f()$ is the deep neural network $g()$ is the projection and quantization process, and $sign()$ is element-wise sign function. A hash table is also constructed to index all account tuples using the hash codes $\mathbf{b}^{ID}$. At identification time, given a preprocessed in-air-handwriting signal $\mathbf{x}^\prime$, the following steps are proceeded to obtain the account ID. First, we run the forward path of FMHashNet to obtain a latent vector $\mathbf{h}^\prime$ and $\mathbf{b}^\prime$. Second, we search the hash table using $\mathbf{b}^\prime$ with a tolerance of $l$ bit. If $l$ is 0, we just search the hash table using $\mathbf{b}^\prime$. If $l$ is not 0, we search the hash table multiple times with each element of a collection of hash codes $S$, where $S$ contains all possible hash codes with a Hamming distance less or equal than $l$ bits from $\mathbf{b}^\prime$. The rationale is that the fuzziness in the writing behavior eventually lead to errors that make $\mathbf{b}^\prime$ differ from the hash code of its real account, but this difference should be smaller than $l$ bits. In practice, we usually set $l$ to 1 or 2 to limit the total number of searches for prompt response. In this way, a collection of candidate accounts will be obtained. The third step is compare $\mathbf{h}^\prime$ with the latent vector of every candidate account to find the nearest neighbor. Finally, the account ID of this nearest neighbor is returned as the identified ID. ID Verification --------------- In this identification procedure explained previously, the nearest neighbor search step serves as a verification of the ID. Alternatively, the system may store a template of the handwriting of the ID string generated at registration for each account, instead of the $\mathbf{h}^{ID}$. Upon an identification request, the system can compare the signal in the request with the templates of all candidate accounts obtained by the hash table search and run a procedure similar to an authentication system to verify the candidate IDs. The motivation is that the hashing step loses information in the in-air-handwriting, which may lead to collisions if an imposter writes the same ID string as a legitimate user, and hence, a verification step can reduce misidentification significantly. Since the verification step is essentially an authentication system, we will not elaborate and evaluate it in this paper. Besides, an attacker can create colliding signals if both the hash code $\mathbf{b}^{ID}$ and the parameters of the neural network are leaked because FMHashNet generates fuzzy hash codes instead of crypotographic hash code. In practice, $\mathbf{b}^{ID}$ can be hashed again using a crypotographic hash algorithm such as SHA-256 for the hash table, while searching with bit tolerance can still work ($S$ contains crypotographically hashed elements of the original $S$). In this case, the crypotographic hash of $\mathbf{b}^{ID}$ is stored in the account database. Moreover, this crypotographic hash can be further used to generate a key to encrypt the template for the ID verification to further improve the security. EXPERIMENTAL EVALUATION ======================= Dataset ------- To evaluate the FMHash system, we collected a dataset of 200 accounts with 200 distinct ID strings, created by 100 users with exactly two accounts per user. For each account, the user wrote an ID string five times as registration (*i.e.*, training) and another five times as five independent identification requests (*i.e.*, testing). Roughly half of the users are college students, and the other half are people of other various occupations (including both office workers and non-office workers). The contents of the ID strings are determined by the users and no two ID strings are identical. Most users chose a meaningful phrase so that it is easy to remember and they wrote the ID strings very fast in an illegible way for convenience. The average time of writing an ID string in the air is around 3 to 8 seconds. ![Average Precision[]{data-label="fig:precision"}](precision.png){width="3in"} ![Average Recall](recall.png){width="3in"} \[fig:recall\] ![Misidentification Rate[]{data-label="fig:missrate"}](missrate.png){width="3in"} ![Failure of identification Rate](failrate.png){width="3in"} \[fig:failrate\] Implementation Details ---------------------- The FMHashNet is implemented in TensorFlow [@TensorFlow] on a Nvidia GTX 1080 Ti GPU. The weight parameters are initialized with the Xavier method [@Xavier] and the Adam optimizer [@Adam] with a initial learning rate of 0.001 is used. The leaky ReLU negative slope is set to 0.2. The regularizer hyperparameter $p$ is set to 10, $q$ is set to 5. The inter-class distance $m$ is set to $p \sqrt{B}$, and the hash code size $B$ is 16, 32, 48 and 64. For the training protocol, we first use the softmax layer and cross-entropy loss with 1,000 iterations. Then we use the projection layer and pairwise loss with pq-regularizer for another 10,000 iterations. During these 10,000 iterations, $\alpha$ is always set to 0.1, and $\beta$ is initially set 0.0001 for the first 2,000 iterations, and gradually increased 10 times per every 2,000 iterations until 0.1. The training pairs are selected online, and $M$ is set to 200 in a minibatch. For the pairs of the same account, we randomly select an account and two training signals of that account; for the pairs of different accounts, we calculate the account hash code $\mathbf{b}^{ID}$ for each account every 20 iterations, and select pairs from those accounts whose hash codes differs less than three bits. If no such account exists, we randomly choose two signals from two different accounts as a pair. \[tb:compare\] ------------------ ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ------- DSH-like [@DSH] 0.995 0.916 0.636 0.918 0.892 0.632 0.004 0.081 0.362 0.078 0.026 0.005 648 s FMHashNet (tanh) 0.970 0.821 0.494 0.443 0.638 0.474 0.014 0.139 0.484 0.544 0.223 0.042 637 s FMHashNet **0.999** **0.995** **0.979** **0.944** **0.972** **0.975** **0.001** **0.005** **0.021** **0.055** **0.023** **0.004** 610 s ------------------ ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ----------- ------- Another major challenge we encountered is the limited amount of training data (only five signals per account). To overcome this challenge, we augment the training dataset in two steps. First, given $K$ signals $\{\mathbf{x}^{(1)}, \mathbf{x}^{(2)}, ..., \mathbf{x}^{(K)}\}$ obtained at registration, for each $\mathbf{x}^{(k)}$ in this set, we align all the other signals to $\mathbf{x}^{(k)}$ to create $K - 1$ additional signals using Dynamic Time Warping [@DTW], and in total we can obtain $K^2$ signals (in our case 25 signals). Second, we randomly pick two aligned signals and exchange a random segment to create a new signal, and this step is repeated many times. Finally each account has 125 training signals. Empirical Results ----------------- We trained the FMHashNet with different hash code sizes $B =$ 16, 32, 48, 64 and tested it with fuzziness tolerances $l =$ 0, 1, 2. In a single experiment, we train the FMHashNet from scratch with the 200$\times$125 augmented training signals and ran the identification procedure with the 200$\times$5 testing signals from the 200 accounts. Given a testing signal $\mathbf{x}$ of an account A, if $\mathbf{x}$ is correctly identified as account A, it is a true positive of account A; if it is wrongly identified as some other account B, it is a false negative of account A and false positive of account B, also counted as a misidentification; if it is not identified as any account, it is counted as a failure of identification. The performance metrics are the average precision of all accounts (Fig. \[fig:precision\]), the average recall of all accounts (Fig. \[fig:recall\]), the misidentification rate (total number of misidentification divided by 200$\times$5, Fig. \[fig:missrate\]), and the failure of identification rate (total number of failure of identification divided by 200$\times$5, Fig. \[fig:failrate\]). Due to the stochastic nature of neural network, the results are obtained by averaging the performance of five repetitions of the same experiment with the same parameter settings. The ID verification step is not included in this evaluation. These results show that our FMHash framework performs consistently in the user identification task on our dataset with different hash code sizes. In general, longer hash code size provides better security since it is more difficult to guess the hash code without knowing the writing content, but it is also more difficult to train due to the added parameters. Also, a larger fuzziness tolerance $l$ leads to less failure of identification (*i.e.*, improved recall) but more misidentification. In a practical identification system, we recommend to set $l=0$ without ID verification for simplicity or set $l=2$ with ID verification for better security. ![Distribution of the Hamming distance between the account hash code and the hash code of a testing signal for the same account (left) and different accounts (right). The left figure is obtained by counting the Hamming distances of all 200$\times$5 pairs of $\mathbf{b}^{(i)}$ and $\mathbf{b}^{ID}$, where $\mathbf{b}^{(i)}$ and $\mathbf{b}^{ID}$ are from the same account. The right figure is obtained by counting the Hamming distances of all 200$\times$199$\times$5 pairs of $\mathbf{b}^{(i)}$ and $\mathbf{b}^{ID}$, where $\mathbf{b}^{(i)}$ and $\mathbf{b}^{ID}$ are from different accounts. The hash code size is 16 bits.[]{data-label="fig:pie"}](pie.png){width="3.25in"} Next, we evaluate how much fuzziness is in the hash code caused by the inherent variation in the in-air-handwriting. As shown in Fig. \[fig:pie\] (left), 1.6% of the testing signals are hashed more than 2 bits away from the their real accounts. Such fuzziness is mitigated by the separation of the hash codes of different classes, as shown in Fig. \[fig:pie\] (right), *i.e.*, in 99% of the case the hash code of a signal of one account is at least three bits far away from the hash code of other accounts. ![Distribution of zero and one (left) and correlation (right) of each bit in the hash code. The hash code size is 16 bits.[]{data-label="fig:bit_dist"}](bit_dist.png){width="3.25in"} Then, we study how the hash codes of all accounts are placed in the Hamming space. First, the distribution of zero and one of each bit in the hash code generated in an experiment is shown in Fig. \[fig:bit\_dist\] (left). There are roughly equal amounts of zeros and ones in each bit, indicating that the hash codes are evenly spread. Second, the correlation of every bit pair is shown in Fig. \[fig:bit\_dist\] (right). In this figure, the correlation is close to zero for every pair of bit $i$ and $j$ if $i \ne j$, indicating that each bit carries different information in the hash code. Third, the distribution of the distances of hash codes between any two accounts are shown in Fig. \[fig:bit\_diff\], where the minimum distance is 3 to 4 bits, the average is 7 to 8 bits, and the maximum is 13 to 14 bits. From this figure, we can see that hash codes of the accounts are sparsely located in the Hamming space and the distance between any two accounts are at least a few bits away. This property of sparsity is the key for an identification system, and it is from our careful design of the regularizer. ![image](bit_diff.png){width="6in"} At last, we compare our approach with a DSH-like [@DSH] regularizer and the commonly used tanh relaxation. The results are shown in Table \[tb:compare\]. For fair comparison, in the DSH-like approach, the same neural network architecture as FMHashNet is used and only the regularizer is changed to that in DSH. In this method, the regularizer scalar is empirically chosen to be 0.1 (best result achievable), and pair margin $m$ is set to $2B$ as suggested in the original paper. Similarly, in the tanh relaxation approach, the same network architecture is used but only the projection layer is changed to tanh activation and the loss function does not have regularization. In this method, the pair margin $m$ is set to $6$ (separation of at least 3 bits), and the initial learning rate is set to 1e-5 to avoid gradient explosion or vanishing. All compared methods have the same training method, pair selection strategy, and testing protocol. From the results we can see that the compared methods are not optimized to achieve the convergence of hash code with variation in the handwriting and the property of sparsity at the same time. Because the distance between a pair of two accounts are not separated enough, an identification request can get many wrong hash table search results when the bit tolerance increases. Discussions ----------- We design the FMHashNet as a pure convolutional neural network (CNN) on temporal normalized signals instead of a recurrent neural network (RNN) commonly use in recent signature verification systems [@tolosana2018exploring] mainly for speed and simplicity. First, FMHash is essentially a way to input an account ID so it must be able to be retrained or fine-tuned in a few minutes given new accounts are registered (which makes an RNN solution less favorable). Second, we believe that it is difficult to fully learn the long term dependency of handwriting strokes with very limited data for an RNN. Third, to generate a hash code of fixed size representing the whole signal, an RNN needs to keep a large number of hidden states and use them to output the hash code after the last sample of the signal is processed, which further increases the difficulty of training because of the lengthy backpropagation-through-time process. CONCLUSIONS AND FUTURE WORK =========================== In this paper, we proposed a user identification framework named FMHash that can generate a compact binary hash code and efficiently locate an account in a database given a piece of in-air-handwriting of an ID string. the empirical results obtained from our prototype evaluation demonstrates the feasibility of the idea of deep hashing of in-air-handwriting for user identification. The ability to convert a finger motion signal to fuzzy hash code gives FMHash great potential for sign-in over gesture input interface. However, it has certain limitations such as the requirement of retraining the neural network on creating new accounts or updating an existing ID. So far, our dataset has limited size and time span. In the future, we will continue improving the proposed framework, investigating the long term performance, and designing possible key generation schemes from the fuzzy hash.
High
[ 0.6666666666666661, 32.5, 16.25 ]
IBM rubs its junk for solar industry IBM is transforming its scrap silicon wafers into profitable material used to produce solar panels. IBM describes the new silicon retrieval process as a "specialized pattern removal technique," although it bares a striking resemblance to just buffing a wafer with an abrasive pad. By stripping the etched layers of semiconductor designs that contain intellectual property, IBM can repurpose the scrap wafers to sell to the solar industry, which is suffering from a silicon shortage. Of course, the process could be more complex than it looks, as IBM is rather pleased with itself for thinking it up. IBM even scored the company a Most Valuable Pollution Prevention Award from The National Pollution Prevention Roundtable 2007 for its chip rub. Judge for yourself on a short video IBM has prepared. The silicon disks can also be reused in internal manufacturing calibration — but that doesn't grab a company any eco-points. Chipmakers use silicon wafers as the starting material for manufacturing microelectronic products. IBM estimates that up to 3.3 per cent of its started wafers get scrapped. This amounts to approximately three million discarded wafers per year, the company said. Usually those wafers are crushed and sent to landfills or melted down and resold.
Mid
[ 0.577586206896551, 33.5, 24.5 ]
IN THE NEBRASKA COURT OF APPEALS MEMORANDUM OPINION AND JUDGMENT ON APPEAL (Memorandum Web Opinion) STATE V. BEDOLLA NOTICE: THIS OPINION IS NOT DESIGNATED FOR PERMANENT PUBLICATION AND MAY NOT BE CITED EXCEPT AS PROVIDED BY NEB. CT. R. APP. P. § 2-102(E). STATE OF NEBRASKA, APPELLEE, V. LUIS BEDOLLA, APPELLANT. Filed March 13, 2018. No. A-17-353. Appeal from the District Court for Hall County: TERESA K. LUTHER, Judge. Affirmed. Gerard A. Piccolo, Hall County Public Defender, for appellant. Douglas J. Peterson, Attorney General, and Sarah E. Marfisi for appellee. PIRTLE, BISHOP, and ARTERBURN, Judges. ARTERBURN, Judge. I. INTRODUCTION Following a trial, a jury found Luis Bedolla guilty of seven counts of sexual assault on a child, third degree. The jury found Bedolla not guilty of sexual assault on a child, first degree. Bedolla is represented by different counsel on appeal than his counsel at trial. Bedolla only assigns as error issues relating to ineffective assistance of counsel. For the reasons set forth below, we find these assignments are without merit. Therefore, we affirm. II. BACKGROUND Bedolla was initially charged by information on August 4, 2015, with two counts of sexual assault on a child, third degree. On October 7, 2016, Bedolla was charged by amended information with seven counts of sexual assault on a child, third degree, and one count of sexual assault on a child, first degree. The allegations involved three victims, T.Z., born in 1993; J.Z., born in 1997; and K.Z., born in 2008. The State also sought to consolidate a separate case involving a fourth -1- victim, C.Z., born in 1999, with the present action. The district court held a hearing on the matter and refused to consolidate the cases. However, after a § 27-414 hearing, the district court issued an order allowing evidence from all four victims to be admitted at trial. The four victims in this case are sisters, and are the nieces of Bedolla. At the time of trial, T.Z. was 23 years old, J.Z. was 19 years old, C.Z. was 17 years old, and K.Z. was 8 years old. As Bedolla’s assignments of error involve only issues pertaining to ineffective assistance of counsel, we will only discuss the testimony related to his assigned errors. At the time of the alleged crimes, Bedolla lived with his wife and four sons in Grand Island, Nebraska. The family lived approximately ten blocks away from Bedolla’s sister-in-law, her husband, and their four daughters. The two families were very close. The families could be found at each other’s residences multiple times per week and celebrated graduations and birthdays together. The first report of an alleged sexual assault against one of the four sisters occurred on May 25, 2015. C.Z. was staying at a friend’s home without permission from her parents. C.Z. had been involved in an argument with her parents and was resistant to returning to her home. C.Z. informed her friend and her friend’s guardian that she had been sexually abused by Bedolla over a span of 12 years. C.Z. testified that she decided to come forward with the report based on an incident that occurred on May 17, 2015. That day the families held a graduation party for C.Z.’s sister at C.Z.’s home. Most of the family was located outside of the residence. C.Z. chose to remain indoors, but was going outside to get food for herself. She encountered Bedolla in the kitchen area and testified that as they were passing each other, he grabbed her breasts. C.Z. said that she pushed him away and told him to stop, but he walked away and pretended like it did not occur. She testified that this type of behavior had occurred multiple times since she was 4 years old. The incidents C.Z. testified about all occurred while she was alone with Bedolla. She stated that when she was as young as four, Bedolla would pretend to tickle her and then he would touch her vagina either over or under her underwear. C.Z. did allege that he digitally penetrated her at least one time. At the urging of her friend’s guardian, they called the police. C.Z. was taken to the Child Advocacy Center that evening. She reported inappropriate physical discipline by her parents. Near the end of the interview, C.Z. disclosed to the forensic interviewer that she had been sexually assaulted by Bedolla. C.Z. testified that she could only remember a few specific instances at the time of the interview. After the interview, Officer Crouch of the Grand Island Police Department drove C.Z. back to her parent’s residence. At the residence, Officer Crouch told C.Z. to disclose to her parents what she had reported. C.Z. told her parents that Bedolla had sexually abused her. Officer Crouch requested that they bring J.Z. outside. C.Z. testified that J.Z. looked scared and started crying immediately. C.Z. testified that J.Z. stated “I’m not doing this right now,” and walked back inside. C.Z. stated that the officer left after J.Z. walked back into the residence. C.Z. testified that her Aunt Lupe, Bedolla’s wife, came to their residence a few hours later. C.Z. testified that Lupe was “all over the place” and was in anger and disbelief. When asked if she had ever told anyone about Bedolla sexually abusing her before May 25, 2015, C.Z. stated that she did one time. She and J.Z. were both under the age of 10 and were watching a scary movie and she asked J.Z. if Bedolla was a child molester. J.Z. told C.Z. not to talk about it. C.Z. admitted on -2- cross-examination that she did not previously remember telling her friend, F.G., about Bedolla sexually abusing her, but that she did communicate that to F.G. over a messaging application a couple of years prior to her report to the Child Advocacy Center. C.Z. testified that in her message to F.G., she told him that Bedolla’s actions had ruined her childhood. Officer Crouch testified similarly to the events of May 25, 2015. He testified that when C.Z. told her parents about the abuse, C.Z.’s mother, Estela, seemed shocked. He testified that when J.Z. came outside that she stated that she did not want to talk about it and went back inside of the residence. After leaving C.Z.’s residence, Officer Crouch went to Bedolla’s home. Crouch requested that Bedolla come speak with him at the police station. Bedolla agreed and arrived at the police station to do an interview at approximately 12:30 a.m. on May 26, 2015. Officer Crouch requested that a Spanish-speaking officer attend the interview to interpret Bedolla’s statement. Officer Tim Champion acted as interpreter for the interview. Bedolla generally denied the allegations of sexual abuse. After the interview concluded, Crouch informed Bedolla that he could return home and that the investigation was ongoing. Officer Crouch testified that he believed Officer Champion provided an accurate translation of Bedolla’s statement. F.G. testified that he had communicated with C.Z. on January 21, 2014, through a messaging application. In that conversation, F.G. stated that C.Z. had told him something personal, in confidence. F.G. told C.Z. that she should tell an adult about the issue. F.G testified that he did not discuss this conversation with anyone because he did not believe it was his business to discuss. The messages were not entered into evidence. T.Z. was the eldest daughter to Carlos and Estela. She was 23 years old at the time of trial. T.Z. did not report that she was sexually assaulted by Bedolla until June 10, 2015. She testified that the first time she remembered being abused by Bedolla occurred when she was 6 years old. She was in the basement of Bedolla’s home and Bedolla would pretend to tickle her and reach underneath her underwear and touch her vagina. T.Z. stated that this happened numerous times throughout the years. Additionally, T.Z. testified that when she was 8 years old, she went to the store with Bedolla in his van. Before they reached the store, Bedolla stopped the van and told T.Z. to get in the backseat. Bedolla went to the backseat as well and masturbated in her presence. T.Z. testified that he did not say anything, and afterwards, they drove to the store. T.Z. testified about the night Officer Crouch brought C.Z. to the residence after her interview with the Child Advocacy Center. She stated that she stayed inside while her parents and J.Z. went outside to speak with Officer Crouch. She testified that when her mother returned from being outside with the officer that she was crying. T.Z. also testified that when her Aunt Lupe came and spoke to her mother, that her mother accused Bedolla of touching her child. J.Z. testified to a similar pattern of sexual abuse. She was approximately 5 years old and sitting in the basement alone with Bedolla. There was no one else present in the basement. Bedolla began to touch her upper thigh and then move his hand slowly up to her vaginal area. His hand initially was over her underwear, but then moved under her underwear. This type of touching would occur frequently as she got older. The touching of her vaginal area ended when she was about 10 years old, but Bedolla then began to fondle her breasts and buttocks until she was around 15 years old. K.Z. also testified at trial. She testified that while alone with Bedolla, he had touched her vaginal area two different times. She testified that he penetrated her on both occasions with his fingers. -3- At the conclusion of trial, the jury returned a verdict finding Bedolla guilty of seven counts of sexual assault on a child, third degree, and not guilty on one count of sexual assault on a child, first degree. On March 1, 2017, Bedolla was sentenced to a combined sentence of not less than 12 years nor more than 15 years of imprisonment on the 7 guilty counts for which he was convicted. Bedolla appeals here. III. ASSIGMENTS OF ERROR Restated, reordered, and consolidated, Bedolla assigns that his trial counsel was ineffective by: (1) failing to preserve the issue of the § 27-414 evidence regarding C.Z.’s testimony; (2) failing to object to C.Z.’s testimony involving foundation and hearsay evidence; (3) failing to object on hearsay grounds and allowing police officers to verify the accuracy of Officer Champion’s interpretation of Bedolla’s statement to police; (4) allowing Officer Crouch to testify to certain events the night of C.Z.’s report of the sexual assaults; (5) failing to object to the entirety of the testimony of F.G.; (6) failing to object to T.Z.’s testimony regarding the alleged van masturbation incident; (7) failing to object to T.Z.’s testimony involving foundation and hearsay evidence; (8) failing to object to Estela Z.’s testimony on the basis of lack of foundation and hearsay ; (9) failing to object to Carlos Z.’s testimony on the basis of lack of foundation and hearsay ; and (10) allowing Jose B. to be impeached by an improper question. Additionally, Bedolla argues in his brief that his trial counsel was ineffective by failing to object to both Investigator Mann and the forensic interviewer’s opinion as to whether children report sexual assaults immediately. IV. STANDARD OF REVIEW Whether a claim of ineffective assistance of trial counsel may be determined on direct appeal is a question of law. State v. Mora, 298 Neb. 185, 903 N.W.2d 244 (2017). In reviewing claims of ineffective assistance of counsel on direct appeal, an appellate court decides only whether the undisputed facts contained within the record are sufficient to conclusively determine whether counsel did or did not provide effective assistance and whether the defendant was or was not prejudiced by counsel’s alleged deficient performance. Id. V. ANALYSIS Bedolla argues that his trial counsel’s performance was ineffective because counsel failed to make proper evidentiary objections. Additionally, Bedolla argues trial counsel failed to adequately preserve certain issues on appeal. To prevail on a claim of ineffective assistance of counsel under Strickland v. Washington, 466 U.S. 668, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984), the defendant must show that counsel’s performance was deficient and that this deficient performance actually prejudiced his or her defense. State v. Ash, 293 Neb. 583, 878 N.W.2d 569 (2016). The two prongs of this test may be addressed in either order, and the entire ineffectiveness analysis should be viewed with a strong presumption that counsel’s actions were reasonable. Id. The prejudice prong of the ineffective assistance of counsel test requires that the defendant show a reasonable probability that but for counsel’s deficient performance, the result of the proceeding in question would have been different. State v. Williams, 295 Neb. 575, 889 N.W.2d 99 (2017). Bedolla is represented on direct appeal by different counsel than the counsel who represented him at trial. When a defendant’s trial -4- counsel is different from his or her counsel on direct appeal, the defendant must raise on direct appeal any issue of trial counsel’s ineffective performance which is known to the defendant or is apparent from the record. State v. Ash, supra. Otherwise, the issue will be procedurally barred. Id. An ineffective assistance of counsel claim is raised on direct appeal when allegations of deficient performance are made with enough particularity for (1) an appellate court to make a determination of whether the claim can be decided upon the trial record and (2) the district court later reviewing a petition for postconviction relief to be able to recognize whether the claim was brought before the appellate court. Id. A claim of ineffective assistance of counsel need not be dismissed merely because it is made on direct appeal. State v. Casares, 291 Neb. 150, 864 N.W.2d 667 (2015). The determining factor is whether the record is sufficient to adequately review the question. When the claim is raised in a direct appeal, the appellant is not required to allege prejudice; however, an appellant must make specific allegations of the conduct that he or she claims constitutes deficient performance by trial counsel. Generally allegations that trial counsel performed deficiently or that trial counsel was ineffective are insufficient to raise an ineffective assistance claim on direct appeal and thereby preserve the issue for later review. Id. at 155, 864 N.W.2d at 672. Appellate courts have generally reached ineffective assistance of counsel claims on direct appeal only in those instances where it was clear from the record that such claims were without merit or in the rare case where trial counsel’s error was so egregious and resulted in such a high level of prejudice that no tactic or strategy could overcome the effect of the error, which effect was a fundamentally unfair trial. State v. Casares, supra. An ineffective assistance of counsel claim made on direct appeal can be found to be without merit if the record establishes that trial counsel’s performance was not deficient or that the appellant could not establish prejudice. Id. See, also, State v. Filholm, 287 Neb. 763, 848 N.W.2d 571 (2014). Here we find that the record is sufficient to determine whether trial counsel provided effective assistance and whether Bedolla was prejudiced by counsel’s alleged deficient performance. 1. C.Z.’S TESTIMONY (a) Section 27-414 Evidence Bedolla argues that his trial counsel was ineffective by failing to object and preserve the issue of whether C.Z.’s testimony was admissible under Neb. Rev. Stat. § 27-414 (Reissue 2016). Section 27-414 provides in relevant part: (1) In a criminal case in which the accused is accused of an offense of sexual assault, evidence of the accused’s commission of another offense or offenses of sexual assault is admissible if there is clear and convincing evidence otherwise admissible under the Nebraska Evidence Rules that the accused committed the other offense or offenses. If admissible, such evidence may be considered for its bearing on any matter to which it is relevant. .... (3) Before admitting evidence of the accused’s commission of another offense or offenses of sexual assault under this section, the court shall conduct a hearing outside the -5- presence of any jury. At the hearing, the rules of evidence shall apply and the court shall apply a section 27-403 balancing and admit the evidence unless the risk of prejudice substantially outweighs the probative value of the evidence. In assessing the balancing, the court may consider any relevant factor such as (a) the probability that the other offense occurred, (b) the proximity in time and intervening circumstances of the other offenses, and (c) the similarity of the other acts to the crime charged. Bedolla argues that his trial counsel was ineffective during the § 27-414 hearing in that his counsel waived the Nebraska Rules of Evidence to the extent that deposition testimony of the pertinent witnesses was substituted for live testimony. Bedolla argues that trial counsel’s failure to object to the presentation of C.Z.’s testimony at the time of trial was also ineffective. Two separate § 27-414 hearings were conducted before trial. The parties stipulated to the use of deposition testimony in place of live testimony in those hearings. The State was present during the depositions and had the opportunity to examine the witnesses and lodge objections. The district court determined in a written order that although it had previously refused to consolidate the alleged crimes against C.Z., that after weighing the factors under Neb. Rev. Stat. § 27-403 (Reissue 2016), C.Z.’s testimony would be admissible at trial. Under the two-prong test outlined in Strickland, we find that Bedolla has failed to demonstrate prejudice. The depositions were received as evidence in the § 27-414 hearings. Bedolla points to no law, and we can find no law, that holds that stipulating to the use of deposition testimony in place of live testimony at a § 27-414 hearing is per se ineffective. The district court determined that the testimony would be admissible at trial and C.Z. testified at trial as did her sisters. There is no indication in the record that trial counsel sought to preserve the § 27-414 issue by objecting to those portions of C.Z.’s testimony about sexual assaults inflicted on her by Bedolla. However, even if the objection was fully preserved, the record clearly supports the district court’s finding that C.Z.’s testimony was properly admitted under § 27-414. Both the deposition testimony as well as the trial testimony supports the district court’s finding that the probative value of the proffered testimony outweighed the risk of unfair prejudice. The statutory factors of probability that the offense occurred, proximity in time between the charged offenses and the acts described in the proffered testimony, and the similarity of the other acts to the charged offenses all favored admission of C.Z.’s testimony. Therefore, Bedolla cannot demonstrate any prejudice by way of trial counsel’s failure to require live testimony at the § 27-414 hearing or by failing to object to the testimony at the time of trial. (b) Foundational and Hearsay Evidence Bedolla argues that his trial counsel was ineffective in allowing C.Z. to testify without objection to the following: (1) Bedolla’s alleged assault at the graduation party was intentional; (2) Bedolla knew what he was doing when he touched C.Z.’s breasts; (3) J.Z. told her not to mention Bedolla sexually assaulting them; (4) J.Z. said, “I’m not doing this right now,” on the front porch; (5) Aunt Lupe was “all over the place”; and (6) her childhood was ruined as a result of Bedolla. -6- In his brief Bedolla argues that statements (1), (2), and (5) were not within C.Z.’s personal knowledge as she cannot know the intent or mindset of another person. However, these statements fall within her personal knowledge as she was testifying to how the events transpired from her point of view. Her testimony that Bedolla intentionally grabbed her breasts while passing her was based on his actions as she perceived them. The fact she testified that she pushed him away and he continued to attempt to touch her explains how she perceived his actions as intentional. As for Aunt Lupe being “all over the place,” this testimony relates to her perception of how her aunt was acting and was well within her personal knowledge. Therefore, Bedolla cannot demonstrate any prejudice from the admission of these statements. Bedolla argues that statements (3) and (4) were hearsay and that it was ineffective for his trial counsel to not object to these statements. This argument is without merit for multiple reasons. First, J.Z. telling C.Z. to not mention the sexual abuse was not offered for the truth of the matter asserted, but rather to explain why C.Z. did not disclose the sexual abuse previous to May 25, 2015. Therefore, it was offered for a nonhearsay purpose and Bedolla cannot demonstrate any prejudice. Similarly, J.Z.’s statement that she did not want to speak with Officer Crouch was not offered for the truth of the matter asserted, but rather, to demonstrate the nature of her reaction to a question about sexual abuse from an officer. Second, even if C.Z.’s testimony was considered hearsay, J.Z. also testified both about the incident where C.Z. informed her about Bedolla’s sexual abuse and her direction to not mention it, as well as her statement to Officer Crouch that she did not want to speak with him before returning inside the residence. Therefore these statements are cumulative in nature. The admission of hearsay that is merely cumulative and could not have prejudiced the defendant by materially influencing the jury is harmless error. State v. Neujahr, 248 Neb. 965, 540 N.W.2d 566 (1995). Therefore, Bedolla cannot demonstrate any prejudice from the admission of the statements. Lastly, Bedolla argues that his trial counsel should have objected to C.Z.’s statement that Bedolla ruined her childhood. He argues that this statement was substantially more prejudicial than probative. We disagree. C.Z. did not testify directly at trial that her childhood had been ruined by Bedolla. She did testify that she made that statement to F.G. by way of a messaging application over 1 year prior to disclosing the alleged sexual abuse perpetrated on her by Bedolla. The testimony was adduced as part of the State’s effort to rebut the defense allegation made throughout trial that C.Z.’s disclosures were recent fabrications. The statement was therefore admissible and Bedolla cannot demonstrate any prejudice from its admission. 2. OFFICER CROUCH’S TESTIMONY (a) Interpretation of Bedolla’s Statement Bedolla argues that his trial counsel erred in failing to object to both Officer Crouch and Investigator Mann testifying to the accuracy of the interpretation of Bedolla’s interview. Bedolla also argues that the interpreter’s statements were hearsay and should have been objected to by counsel. Finally he argues that it was ineffective for counsel to allow Officer Crouch to testify that Officer Champion never mentioned any problems translating Bedolla’s statements. Bedolla argues that the verification of Champion’s translation is not within the personal knowledge of Officer Crouch or Investigator Mann. He argues that trial counsel was ineffective by failing to object on hearsay and Confrontation Clause grounds because counsel never had the -7- opportunity to question Officer Champion, and that the officers that testified were offering Champion’s statements. Finally, Bedolla argues that Officer Crouch’s testimony that Officer Champion did not indicate any problems with the interpretation was also hearsay as nonverbal communication falls within the hearsay rule. Bedolla’s argument fails for multiple reasons. First, even if we were to consider Champion’s interpretation of Bedolla’s statements as hearsay, their admission is harmless. The interview only dealt with allegations from C.Z., who was not a victim in this case. Bedolla flatly denied all accusations of sexual assault in the interview. The only statement that Bedolla may be concerned with is when asked whether he had ever touched or penetrated their vaginas, he responded, “[n]ot that [I] can remember.” Although oddly phrased, this was still a denial of any criminal conduct. Second, Bedolla cited no Nebraska case law, and we can find none that holds that where a police officer is translating the statements of a criminal suspect to another police officer, the interpreting officer’s statements constitute hearsay or stand in violation of the Confrontation Clause. We note that the State refers to U.S. v. Orm Hieng, 679 F.3d 1131 (9th Cir. 2012), for discussion of a “language conduit” approach that has been used in the federal courts to address the issue of police testifying to what other police officers interpret to them from individuals being interviewed. Bedolla says this court should consider Taylor v. State, 226 Md. App. 317, 130 A.3d 509 (2016), but fails to discuss how that Maryland case supports his position here. We find it unnecessary to address cases from other jurisdictions. Even if we found these cases to be relevant to whether trial counsel was effective Bedolla still would not be able to demonstrate actual prejudice given that no incriminating statements were made during the interview. Finally, Bedolla argues that it was error for trial counsel to allow the officers to testify to the accuracy of the translation without objection. However, he does not allege on appeal that any portion of the translated statements were in fact inaccurate. Without any citation to an inaccurate translation, or even any general allegation of inaccuracy, Bedolla cannot demonstrate any actual prejudice. Therefore, we find that Bedolla’s ineffective assistance of counsel claims regarding the testimony surrounding the interpretation of his interview are without merit. (b) Night of C.Z.’s Report Bedolla argues that his trial counsel was ineffective in allowing Officer Crouch to testify without objection to the following: (1) that C.Z.’s parents were in shock when told that Bedolla had sexually abused C.Z.; and (2) J.Z. said, “I’m not doing this right now,” on the front porch. Bedolla argues that whether Carlos and Estela were in shock when informed of C.Z.’s allegations was not within Officer Crouch’s personal knowledge as he cannot know the intent or mindset of another person. However, this statement falls within his personal knowledge as he was testifying to his perspective of their demeanor as the events transpired. Therefore, Bedolla cannot demonstrate any prejudice from the admission of the statement. With respect to Officer Crouch testifying about J.Z.’s statement on the porch the night of May 25, 2015, we addressed that issue in our discussion of C.Z.’s testimony. The testimony is not hearsay and is cumulative to J.Z.’s own testimony. Again, Bedolla cannot demonstrate prejudice as a result of his trial counsel failing to lodge an objection. -8- 3. F.G.’S TESTIMONY Bedolla argues that his trial counsel was ineffective by not objecting to the relevance of the entire testimony of F.G. Bedolla argues that C.Z.’s testimony was collateral evidence permitted by the district court under § 27-414 and that his trial counsel should have objected to the relevance of the testimony of F.G. utilized as a prior consistent statement of C.Z. C.Z. testified prior to F.G. In her testimony, she specifically mentioned sending Facebook messages to F.G. disclosing that she had been subjected to sexual contact by Bedolla. Through the use of screenshots of the messages, her memory was refreshed that the conversation with F.G. occurred on January 24, 2014. F.G. was called for the purpose of corroborating C.Z.’s testimony. It is noteworthy that in his testimony, the only time F.G. mentions the specific subject matter of the messages from C.Z., trial counsel objected and the district court sustained the objection. However, F.G. did testify without objection that C.Z. had conversations with him on Facebook Messenger wherein she described information which she considered to be private and secret. He recognized and identified the same screenshots of a conversation occurring between himself and C.Z. on January 21, 2014, as was previously identified by C.Z. as her disclosure of the acts perpetrated on her by Bedolla. He then testified that in response to C.Z.’s disclosures, he advised her she should talk to an adult about what had happened. The purpose of F.G.’s testimony was to bolster C.Z.’s credibility by providing further evidence that her initial allegations regarding Bedolla were not recent fabrications. In his opening statement, trial counsel stated that the evidence would show that C.Z. made no allegations about Bedolla inappropriately touching her until a series of events occurred in which she was ultimately punished by her parents for allowing a friend to drive their car. He stated that the evidence would show that it was Bedolla who saw the friend driving the car and made the initial report which eventually made its way to C.Z.’s parents. During the presentation of Bedolla’s case, evidence supporting these assertions was presented. Other evidence regarding C.Z.’s reputation for truthfulness was also presented. C.Z.’s credibility was a major issue in this case since she was the first of the four sisters to report allegations of inappropriate sexual touching by Bedolla. Even though the offenses charged in this case were related to the three sisters of C.Z., we see no legal basis, and Bedolla does not cite to us one, for his allegation that evidence of a prior consistent statement cannot be used in response to his contention that C.Z. had recently fabricated her allegations against him. A statement is nonhearsay if the declarant testifies at the trial or hearing and is subject to cross-examination concerning the statement, and the statement is consistent with his testimony and is offered to rebut an express or implied charge against him of recent fabrication or improper influence or motive. Neb. Rev. Stat. § 27-801(4)(a)(2) (Reissue 2016). It is clear from the record that Bedolla’s trial counsel was either explicitly or implicitly attempting to demonstrate that C.Z. had recently fabricated her report of sexual abuse. As a result, the State offered the testimony of F.G. to corroborate C.Z.’s testimony that she had previously disclosed Bedolla’s actions to him on January 24, 2014. Neither § 27-414 nor § 27-801(4)(a)(2) prohibit the use of such a prior consistent statement as evidence. Therefore, Bedolla cannot demonstrate prejudice as this evidence was clearly admissible at trial. -9- 4. T.Z.’S TESTIMONY (a) Van Incident Bedolla argues that his trial counsel was ineffective because he allowed T.Z. to testify about the alleged van masturbation incident. Bedolla argues that this was evidence under § 27-414 and that the pretrial order issued by the district court allowed for this evidence only at the families’ residences. As a result, he argues that his trial counsel should have objected to the testimony as improper under § 27-414. The alleged incident is described above. We find that this evidence does not constitute other crimes evidence under Neb. Rev. Stat. § 27-404 or § 27-414, but is intrinsic evidence to the charged crimes. It is clear that the alleged act was for purposes of sexual gratification. This evidence was clearly admissible as intrinsic evidence within the factual setting of the charged crimes and not precluded under Neb. Rev. Stat. § 404(2). In State v. McPherson, 266 Neb. 734, 668 N.W.2d 513 (2003), a sexual assault case, the Nebraska Supreme Court held that evidence of sexual devices and sexually explicit videos were not evidence of prior unrelated bad acts under rule 404(2), but were relevant evidence that formed the factual setting of the crimes charged. Here, T.Z. was one of the victims alleged in the charged offenses and the alleged incident occurred during the charged time period. Third degree sexual assault requires that the contact occur “for the purpose of sexual arousal or gratification of either party.” This alleged incident clearly conforms to the behavior outlined in the statute. This evidence is intrinsic to the charged crimes and is not precluded under § 27-404 or § 27-414. Therefore, trial counsel’s failure to object to T.Z.’s testimony was not prejudicial to Bedolla since it was clearly admissible. (b) Foundational and Hearsay Evidence Bedolla argues that his trial counsel was ineffective in allowing T.Z. to testify without objection to the following: (1) when her mother returned from being outside with the officer that she was crying and (2) when her mother spoke to Aunt Lupe over the phone after C.Z. reported Bedolla’s sexual assaults, her mother accused Bedolla of touching her child. In his brief Bedolla argues that T.Z. should not have been permitted to testify about her mother’s reaction after speaking with Officer Crouch. He argues that her mother’s reaction was not within T.Z.’s personal knowledge as she cannot know the intent or mindset of another person. However, as found above, these statements fall within her personal knowledge as she was testifying to her perception of her mother’s demeanor and actions. Her testimony that her mother was crying was based on her actions as she perceived them. As this evidence was clearly admissible, Bedolla cannot demonstrate that his trial counsel was so ineffective to demonstrate prejudice. As for Estela’s statement to Lupe where she accused Bedolla of touching her child, this was an exception to the hearsay rule as it was an excited utterance. An excited utterance is defined as a statement made during a startling event or condition made while the declarant was under the stress of excitement caused by the event or condition. Neb. Rev. Stat. § 27-803(1) (Reissue 2016). T.Z. testified that after hearing C.Z.’s disclosure, her mother was “hysterical,” “bawling,” and “couldn’t control herself.” T.Z. testified that her mother was still crying approximately 5 minutes later when she made a telephone call to her sister. Even if the statement was not an excited utterance it was still admissible. It was not offered for the truth of the matter asserted, but, rather, - 10 - to demonstrate the effect of how she reacted to Lupe’s husband allegedly abusing her children. Moreover, any error in the admission of this evidence would be harmless as there is no probability that the outcome of the proceeding would have been different if the testimony would have been precluded. Therefore, Bedolla cannot demonstrate any prejudice from the admission of the statements. 5. REMAINING TESTIMONY (a) Estela’s Testimony Bedolla argues that his trial counsel was ineffective in (1) failing to object to Estela’s testimony regarding Lupe’s demeanor on May 25, 2015, and (2) failing to object to Estela’s testimony regarding Lupe’s demeanor on her second visit to Estela’s home. Bedolla argues that Estela’s testimony was not within her personal knowledge as she cannot know the intent or mindset of another person. Estela testified to Lupe’s reactions after C.Z. first reported. Estela testified that the night of May 25, 2015, Lupe came over to her home and that she was not upset, which was not what Estela expected. Estela testified the next time Lupe came over to her home, she was sad and crying, and not making much sense. However, as fully discussed above, this statement falls within her personal knowledge as she was testifying to her observations of Lupe’s demeanor. Therefore, Bedolla cannot demonstrate any prejudice from the admission of this testimony. (b) Carlos’ Testimony Bedolla argues that his trial counsel was ineffective in (1) failing to object to Carlos’ testimony that he knew before T.Z. reported that Bedolla had been abusing her that she was afraid to come forward and (2) not allowing Carlos to testify about C.Z.’s history of lying at home. Carlos testified that after C.Z. first reported the sexual abuse, but before T.Z. reported her history of abuse, he knew that she was afraid to come forward. Even if this testimony was erroneously admitted, the error was harmless. The jury was already aware that T.Z. was the last victim to report her history of abuse. This testimony was also cumulative as T.Z. had already testified that she did not want to disclose the abuse right away because it was something she wanted to forget and she did not want to ruin the bond between her mother and aunt. Any error in the admission of this evidence would be harmless and there is no probability that the outcome of the proceeding would have been different if the testimony would have been precluded. Bedolla’s argument that his counsel was ineffective because he did not allow Carlos to testify about C.Z.’s prior history of lying at home is also without merit. Trial counsel did attempt to adduce this very evidence. However, the State lodged an objection to trial counsel’s question about C.Z.’s history of lying and the district court sustained the objection. Therefore, this is not a basis for a claim of ineffective assistance of counsel as trial counsel attempted to adduce the very evidence Bedolla now alleges he failed to present. (c) Lupe’s Testimony Bedolla argues that his trial counsel was ineffective in failing to object during the State’s cross-examination of Lupe Bedolla. Bedolla also argues that counsel allowed improper impeachment of another defense witness to take place during the questioning of Lupe. - 11 - During the testimony of Bedolla’s son, trial counsel elicited testimony that the two families had planned a trip to California and that the three eldest girls would be traveling with his family by van. He testified that if there was no other choice, the girls would fly to California. Lupe Bedolla was asked about whether her son would have been lying or mistaken if he had testified that the victims were going to drive to California to visit her other son. Bedolla argues that this constituted improper impeachment of Bedolla’s son. Bedolla cannot demonstrate any prejudice in failing to object to this line of questioning as it would have been unsuccessful. The State is allowed to cross-examine defense witnesses about inconsistent details regarding common topics of testimony. Therefore, it was not improper impeachment and no prejudice can be shown. 6. OPINION TESTIMONY Bedolla argues in his brief that his trial counsel was ineffective by failing to object to both Investigator Mann and the forensic interviewer’s opinion as to whether children report sexual assaults immediately. However, he did not specifically assign this error in his assignment of errors section. An alleged error must be both specifically assigned and specifically argued in the brief of the party asserting the error to be considered by an appellate court. State v. Chacon, 296 Neb. 203, 894 N.W.2d 238 (2017). Therefore, we will not consider this alleged error. VI. CONCLUSION We find that the record is sufficient to address all of Bedolla’s claims of ineffective assistance of counsel on the merits. We conclude, for the reasons given herein, that all of his claims are without merit. AFFIRMED. - 12 -
Low
[ 0.48360655737704905, 29.5, 31.5 ]
Sen. Joe Schiavoni, D-Boardman, introduced a resolution that would require three-fifths passage by both the GOP-controlled Ohio House and Senate to land on ballots in November. The House already has passed a bill that would effectively shut down Internet cafes, and last week Republican Senate President Keith Faber of Celina said the Senate would move legislation in May to ban the nearly 800 sweepstakes cafes operating in Ohio. “While a ban has already been proposed, this has been a controversial issue that I believe can best be addressed on the ballot, as other gambling issues have,” Schiavoni said in a news release. “ It is necessary to allow voters to weigh in on the future of these facilities, just as they did with Ohio casinos.”
Mid
[ 0.607758620689655, 35.25, 22.75 ]
518 F.2d 860 89 L.R.R.M. (BNA) 2674, 77 Lab.Cas. P 10,935 NATIONAL LABOR RELATIONS BOARD, Petitioner,v.EMPIRE CORPORATION, Respondent. No. 74-2179. United States Court of Appeals,Sixth Circuit. June 18, 1975. Elliott Moore, Deputy Associate Gen. Counsel, David S. Fishback, N. L. R. B., Washington, D. C., Bernard Levine, Director, Region 8, N. L. R. B., Cleveland, Ohio, for petitioner. Harvey B. Rector, Gregory Paul Rector, Rector & Associates, Roy E. Browne, Hershey & Browne, Akron, Ohio, for respondent. Before WEICK, EDWARDS and PECK, Circuit Judges. JOHN W. PECK, Circuit Judge. 1 This case is before the court upon the application of the National Labor Relations Board for enforcement of its order issued against Empire Corporation (hereinafter "the Company") on July 30, 1974. The Board's order requires the Company to cease and desist from the unfair labor practices found and from "in any other manner" interfering with its employees in the exercise of rights guaranteed in Section 7 of the Act. Affirmatively, the Company is ordered to bargain upon request with the Union,1 execute any agreement reached, offer immediate and full reinstatement with back pay to employee Linda Cosavage as well as to twenty-five unfair labor practice strikers illegally discharged, and to post appropriate notices. The Board's decision and order are reported at 212 N.L.R.B. No. 81. 2 Summarized, the record discloses that the Retail Clerks Union began an organizational effort among the 68 employees at the Company's Akron, Ohio, plastic products manufacturing facility in mid-July of 1973. The Company responded to the unionization campaign by engaging in a variety of what have been found to be unfair labor practices including coercive questioning of union adherents, threats of loss of benefits and discharge, surveillance of union meetings, and promises of pay increases depending upon the employees' refusal to support the Union. These activities culminated in the July 26th firing of employee Linda Cosavage, one of the leading union supporters, allegedly for throwing water upon a co-worker. 3 Cosavage's discharge led to a midnight confrontation between the chief Union organizer, George Hennigin, and Company president Robert Andrews, in the Company parking lot. Hennigin, having determined that the Union had obtained 35 (a majority of one) signed authorization cards, asked Andrews to reinstate Cosavage and to recognize the Union. Andrews' only response was to place his fingers in his ears and begin walking away. When Hennigin followed him loudly repeating his demands for reinstatement and recognition, Andrews turned and twice sprayed Hennigin in the face with chemical mace. Hennigin retaliated by kicking Andrews in the stomach. Following the mace-kick incident, the Union called a strike which the Board ultimately found to have been an unfair labor practice strike. The Company intensified its efforts to undermine the Union during the strike. After two weeks the 25 workers participating in the strike made an unconditional offer to go back to work, but the Company rejected the offer and informed the strikers that they had been discharged for failure to report to work. 4 The administrative judge determined that the Company had committed 17 separate unfair labor practices forbidden by Section 8(a)(1) & (3) of the Act. He also found that the Union had obtained a card majority and that a lawful recognition demand had been made upon the Company. Despite the urging of the general counsel, however, he held that the Company was not obliged to recognize the Union. Specifically addressing the application of N.L.R.B. v. Gissel Packing Co., 395 U.S. 575, 89 S.Ct. 1918, 23 L.Ed.2d 547 (1969), he stated that "a fair election (could) be had" and that the Company's "unfair labor practices (would) not influence . . . voting at an election conducted by the Board." 5 Upon review, the Board concluded that the evidence disclosed a number of additional unfair labor practices not enumerated by the administrative judge. Further, unlike the administrative judge, the Board found that "(the Company's) entire course of conduct was so flagrant and coercive in nature as to require that a bargaining order be issued."2 The Company challenges both the Board's findings with reference to § 8(a)(1) & (3) violations, and its determination that the Company is required to bargain with the Union. 6 Although the Company is able to cite a certain amount of contradictory testimony, a thorough review of the record shows substantial evidence that it engaged in the various unfair labor practices found by the Board, and accordingly, the attack on the findings must fail. National Labor Relations Act, § 10(e), 29 U.S.C. § 160(e); Universal Camera Corp. v. N.L.R.B., 340 U.S. 474, 71 S.Ct. 456, 95 L.Ed. 456 (1951); N.L.R.B. v. S. E. Nichols of Ohio, Inc., 472 F.2d 1228 (6th Cir. 1973). Similarly, we find that the Board acted within its discretion in entering the cease and desist and reinstatement with back pay provisions of the order. J. P. Stevens & Co. v. N.L.R.B., 461 F.2d 490 (4th Cir. 1972). 7 The more difficult question presented, however, is whether the Board was warranted in ordering the Company to recognize the Union on the basis of the card majority. In N.L.R.B. v. Gissel Packing Co., 395 U.S. 575, 89 S.Ct. 1918, 23 L.Ed.2d 547 (1969), the Supreme Court held "that an employer who engages in 'unfair' labor practices 'likely to destroy the union's majority and seriously impede the election' may not insist that before it bargains the union get a secret ballot election." Linden Lumber Division, Summer & Co. v. N.L.R.B., 419 U.S. 301, 95 S.Ct. 429, 431, 42 L.Ed.2d 465 (1974), citing N.L.R.B. v. Gissel, supra. Gissel, like the case at bar, involved interference by an employer's unfair labor practices and a card majority demand for recognition. The Company urges that the present case can be distinguished on three grounds: (1) unlike the union in Gissel the Retail Clerks Union obtained but a "bare majority" of authorization cards in the unit; (2) in the present case the administrative judge and the Board did not agree as to the need for a bargaining order; and (3) four of the employees who signed the cards indicated that Union representatives misled them and misrepresented the purpose of the authorization cards. 8 Dealing with these contentions in reverse order, we note that the administrative judge ruled all 35 cards valid despite the Company's attempt to prove improper inducement in four specific instances. 9 "Although Respondent has attacked some of the foregoing cards as invalid on the ground that they were improperly obtained, I find . . . that those who signed said few cards were not induced to do so by improper solicitations. It follows that I find all 35 cards are valid, and they amount to a majority of those composing the unit aforesaid." 10 This finding of validity is supported by substantial evidence and we find the Company's contention in this regard unpersuasive. 11 This court may consider the fact that the Board reached a different result than the administrative judge, N.L.R.B. v. Industrial Towel & Uniform Service, 473 F.2d 1258 (6th Cir. 1973), but the crucial question continues to be whether the Board's determination was based upon substantial record evidence. Furthermore, ". . . the determination of whether unfair labor practices are of such a nature as to warrant the issuance of a bargaining order is for the Board and not the courts." MCP Restaurant Corp. v. N.L.R.B.,481 F.2d 75, 79 (2d Cir. 1973). In view of the nature and large number of unfair labor practices found herein we cannot say that the Board's determination that a fair election could not be held was unwarranted. 12 Returning to the Company's initial contention, we consider whether the percentage of the card majority is a critical factor. In Gissel and companion cases, the card majorities were as follows: Gissel Packing Co. 31 of 47 unit members; Heck's Inc. 14 of 26 and 21 of 38 unit members; General Steel 120 of 207 unit members. The percentages range from 53% to 65% in Gissel as compared with 51% in the case before us. We further note that bargaining orders have been approved in at least two other cases where the majority hinged on a single card. Self-Reliance Ukrainian Am. Co-op Ass'n v. N.L.R.B., 461 F.2d 33 (7th Cir. 1972) (7 of 13 unit members signed cards); and N.L.R.B. v. Kostel Corp., 440 F.2d 347 (7th Cir. 1971) (2 of 3 unit members signed cards).3 The Company has failed to cite any authority to support its argument, and in view of the above observations, we conclude that the percentage of the card majority is not a pivotal factor. The important consideration, as pointed out by the Supreme Court in Linden Lumber, supra, is the employer's destruction of the laboratory conditions necessary for a fair representation election. That factor is present here and we find the Board's order to bargain well taken. 13 The petition for enforcement is granted in full. 1 Retail Clerks International Association, Local 698, AFL-CIO (hereinafter "the Union") 2 "The Administrative Law Judge . . . concluded that a bargaining order was unwarranted as a fair election could be had 'because nearly all the card signers were in the court room during the trial as witnesses for the General Counsel and, judging from their friendly relation with and representation by the Union, I believe that Respondent's unfair labor practices will not influence their voting at an election conducted by the Board.' . . . Not only was Respondent's prestrike activity more serious and widespread than described by the Administrative Law Judge, but its entire course of conduct was so flagrant and coercive in nature as to require that a bargaining order be issued. Thus, the Respondent violated Section 8(a)(1) and (3) by unlawfully interrogating employees, assaulting a union representative who was requesting recognition, engaging in surveillance and giving the impression of engaging in surveillance, soliciting employees to engage in surveillance, promising wage increases and other economic benefits, threatening to discharge employees and discharging an employee for engaging in union or other protected activity, discriminatorily denying an employee a transfer from one job to another, threatening employee's husband to discourage her union or other protected activity, and unlawfully discharging 25 employees who were engaged in an unfair labor practice strike. . . . Respondent, rather than bargain with the Union, engaged in a series of unfair labor practices to undermine the Union's majority status. These violations were not in any sense minimal but are such as to strike at the very heart of the employees' Section 7 rights and the Union's representative capacity with widespread and persistent effects. We find that the coercive effects of the Respondent's unlawful acts cannot be eliminated by the traditional remedies, and were of a nature as to make a fair election doubtful, if not impossible. Under these circumstances, the purposes of the Act can best be effectuated by reliance on the employees' desires for union representation as expressed by their signed authorization cards rather than on the results of an election conducted in an employer-contaminated atmosphere. Accordingly, we find a bargaining order should issue to remedy the violations of Section 8(a)(1) and (3)." 3 It is clear that the Board may, where it finds egregious unfair labor practices, enter a bargaining order even though the union is unable to demonstrate that it represents a majority. J. P. Stevens & Co. v. N.L.R.B., 441 F.2d 514 (5th Cir.), cert. denied, 404 U.S. 830, 92 S.Ct. 69, 30 L.Ed.2d 59 (1971); N.L.R.B. v. Lou De Young's Market Basket, Inc., 430 F.2d 912 (6th Cir. 1970)
Mid
[ 0.5675675675675671, 31.5, 24 ]
German Foreign Minister Frank-Walter Steinmeier expresses concern over Ankara's post-coup measures and says it is up to Turkey to decide whether to advance its bid on joining the European Union. German Foreign Minister Frank-Walter Steinmeier (L) shakes hands with his Turkish counterpart Mevlut Cavusoglu (R) in Ankara, Turkey, November 15, 2016. (TRT World and Agencies) Turkish Foreign Minister Mevlut Cavusoglu said on Tuesday his country was "fed up" with the "condescending" attitude of the EU in accession talks, while his German counterpart expressed concern to Ankara about its post-coup crackdown. Relations between Ankara and Brussels have been especially strained since a failed coup in July. At least 240 people were killed and around 2,200 others wounded while resisting the putsch. Addressing a joint press conference after holding a meeting with his Turkish counterpart in Ankara, German Foreign Minister Frank-Walter Steinmeier said, "The question of whether Turkey goes closer to, or further away, from Europe is not a decision for Europe or the European capitals but should be made in Turkey." Turkey's accession effort dates back to the 1960s. German Foreign Minister Frank-Walter Steinmeier (L) and Turkish Foreign Minister Mevlut Cavusoglu hold a joint conference in Ankara. (TRT World and Agencies) The German foreign minister said he did not support halting accession talks with Turkey. He added that his conversation with Cavusoglu had "not been easy" and admitted the pair had expressed "divergent views" about the measures Turkey has put in place following the coup attempt. But Steinmeier insisted that Ankara should not see criticism from Berlin as "being lectured or disrespect for its sovereignty" because it was in the interest of long-term relations between the two sides. Cavusoglu, on the other hand, said Turkey was "fed up" with the condescending attitude of the European Union in talks over its application to join the bloc. "We don't deserve this attitude. So, like Frank-Walter said before, we will ask our people (about EU accession) and they will decide." He said that the Turkish people would decide whether or not to reinstate the death penalty, a decision that could spell the end of Turkey's accession bid. The Turkish foreign minister added he was tired of what he described as the "two-facedness and double standards" of the European Union. Turkish Prime Minister Binali Yildirim, accompanied by Foreign Minister Mevlut Cavusoglu, meets with German Foreign Minister Frank-Walter Steinmeier in Ankara, Turkey November 15, 2016. (TRT World and Agencies) The comments came a day after Turkish President Recep Tayyip Erdogan warned the EU to decide by the end of the year on the membership bid, threatening to otherwise call a referendum on the process. Steinmeier said he was "to say the least irritated" by repeated criticism from Erdogan accusing Germany of harbouring wanted Kurdish militants. "We condemn each form of terrorism, that from Daesh as well as terrorism by the PKK. I think that we are both of the opinion that in the end there must be a political solution, that terrorism cannot be eliminated using military force alone, that a return to the political process must be found. For this to happen, the PKK must of course refrain from carrying out attacks and must lay down their weapons." Talking on the subject, Cavusoglu said, "If (according to our information) there are cases against 4,500 PKK supporters (in Germany), this would mean that there are at least 4,500 terrorists in Germany. We don't know how those cases ended even though we did ask. Secondly, we asked for the extradition of PKK members. So far, only three of them have been extradited. They didn't extradite the others." Source: TRTWorld and agencies
Mid
[ 0.5590361445783131, 29, 22.875 ]
Q: how to use image in for loop in Twig? i have the address of images in the array and i want to load 3 image from that source my code : {% for address in image.address %} <img src="??"> {% endfor %}" what should I write in the Src in img tag? A: Finally its better to do this : <img src="{{ asset(news.address[i]) }}"> and we the array are sth like this : $news = array( 'address'=>array('bundles/Hippomain/frontend/img/img1.jpg',), ); and in this way we can load each image we have in the array easily !
High
[ 0.691292875989445, 32.75, 14.625 ]
Q: Searching keyword in a 2D array I'm trying to make a small method that will allow a user to input a crime into a "criminal database" and it will show only the criminals that committed that crime. Unfortunately, I have to use a 2D array. I've written a method, but it's not giving me the output I'm looking for. Here's the method: //method to search data public static void searchData() throws IOException{ int flag = 0; boolean found = false; //input search key System.out.print("Which crime would you like to select? (arson, theft, assault) "); String searchKey = br.readLine(); System.out.println("You searched for criminals with the offence of \"" + searchKey + "\"."); System.out.println("Name - Crime - Year of Conviction"); for(int i = 0; i < criminals.length; i++){ if(searchKey.compareTo(criminals[i][1]) == 0){ flag = i; found = true; } } if(found == false){ System.out.println("Error! Crime not found."); }else{ System.out.println("Criminals found."); for(int i = 0; i < criminals.length; i++){ System.out.println(criminals[flag][0] + " - " + criminals[flag][1] + " - " + criminals[flag][2]); } } } My input was this: George - theft - 1999 Eddie - assault - 2003 Al - theft - 1999 And here is the output after testing: Which crime would you like to select? (arson, theft, assault) theft You searched for criminals with the offence of "theft". Criminals found. Al - theft - 1999 Al - theft - 1999 Al - theft - 1999 Could you help me figure out what's wrong with this? Thanks in advance. :) A: You have been printing last found criminal (flag). for(int i = 0; i < criminals.length; i++){ if(searchKey.compareTo(criminals[i][1]) == 0){ if(!found) { found = true; System.out.println("Criminals found."); } System.out.println(criminals[i][0] + " - " + criminals[i][1] + " - " + criminals[i][2]); } } if(found == false){ System.out.println("Error! Crime not found."); }
Mid
[ 0.576419213973799, 33, 24.25 ]
Published on June 15, 2017 Huntsville’s new downtown master plan proposes a five-year development strategy to provide a mix of residential, retail, office and entertainment uses. The plan further addresses greater pedestrian and cycling options, traffic calming, two-way streets, parking and public transit, streetscaping, size and scale of future development, connectivity with the Von Braun Center, and the location and concept for a new City Hall. The plan is the result of a six-month intensive study on the downtown core by Urban Design Associates as an update to the 2006 downtown master plan. The process included numerous listening sessions with key stakeholders, residents, developers, meetings with city staff, open houses to review working drafts, and online engagement. “You have a lot of things popping here. The first wave of new inhabitants coming downtown in the last few years are fundamentally different from what you have had in the past, and that creates a challenge for cities to manage the expectation of new uses.” The Huntsville City Council got their first comprehensive look at the proposed update to the downtown plan during a June 13 work session. Public presentations before and after the work session were also held. The draft plan is available online for any final citizen comments. “We started this process by listening and understanding the issues important to Huntsville,” said Rob Robinson, Principal with UDA. “We don’t live here, and we wanted to understand what is possible and what your community valued and desired. We use those conversations as a springboard for testing ideas. Listen first, understand context, and then draw through ideas and work toward place.” Robinson says this micro plan fits within the context of Huntsville’s BIG Picture comprehensive master plan. Unlike a typical 20-year view, UDA was tasked with addressing short-term needs in the downtown core, which is experiencing dramatic rebirth and placing new demands on the City. Mayor Tommy Battle calls it Huntsville’s “Living Room,” and he wants City leaders to “do it right.” “You have a lot of things popping here,” said Robinson. “The first wave of new inhabitants coming downtown in the last few years are fundamentally different from what you have had in the past, and that creates a challenge for cities to manage the expectation of new uses. How do we build on that momentum and begin to complement and build upon what you have? What is possible here and now? What should we be thinking about and what would help reinforce investments that have been made? What can we do to enhance and improve it? This is about starting to set up that next wave.” The proposed downtown master plan will be presented for final approval to the Planning Commission and City Council next week. For more information on the Downtown Master Planning process visit The BIG Picture.
High
[ 0.6583333333333331, 29.625, 15.375 ]
Membrane traffic: Golgi stumbles over cilia. Golgins have been implicated in the maintenance of Golgi architecture. Recent studies have shown, however, that mice lacking the golgin TRIP11/GMAP-210 have normal Golgi stacks, but show developmental problems related to defective cilium formation and function.
Mid
[ 0.5634146341463411, 28.875, 22.375 ]
Q: ¿Puedo filtrar un archivo XML? me gustaria saber si puedo filtrar un archivo XML. El archivo es el siguiente: <Boletin_Consolidado> <Boletin> <Numero V="0122"/> <Tipo_Boletin V="DEPARTAMENTAL"/> <Departamento V="31"/> <Desc_Departamento V="VALLE"/> <Detalle_Circunscripcion> <lin> <Detalle_Pregunta> <lin> <Pregunta V="001"/> <Total_Sufragantes V="0"/> <Porc_Sufragantes V="000,00"/> <Abstencion V="3488628"/> <Porc_Abstencion V="100,00"/> <Votos_Validos V="0"/> <Porc_Votos_Validos V="000,00"/> <Votos_No_Marcados V="0"/> <Porc_Votos_No_Marcados V="000,00"/> <Votos_Nulos V="0"/> <Porc_Votos_Nulos V="000,00"/> </lin> </Detalle_Pregunta> <Detalle_Opcion> <lin> <Opcion V="001"/> <Votos V="0"/> <Porc V="000,00"/> <Pregunta V="001"/> </lin> <lin> <Opcion V="002"/> <Votos V="0"/> <Porc V="000,00"/> <Pregunta V="001"/> </lin> </Detalle_Opcion> </lin> </Detalle_Circunscripcion> </Boletin> </Boletin_Consolidado> La lista de los Departamentos continua bajo otras etiquetas llamadas Boletin. Lo que quiero hacer es filtrar por el codigo del Departamento Departamento utilizando un select y que me muestre esos datos. El archivo XML lo recorro en PHP de la siguiente forma: $NacionalXML = simplexml_load_file("./ConsultaAnticorrupcion/Archivos/XML/$Nac") or die("Error: Cannot create object"); foreach ($NacionalXML as $key => $Boletin) { // ========== CABECERA BOLETIN ========== $Numero = $Boletin->Numero["V"]; $Tipo_Boletin = $Boletin->Tipo_Boletin["V"]; $Fecha = $Boletin->Dia["V"] . "/" . $Boletin->Mes["V"] . "/" . $Boletin->Anio["V"]; $Hora = $Boletin->Hora["V"] . ":" . $Boletin->Minuto["V"]; $Mesas_Instaladas = $Boletin->Mesas_Instaladas["V"]; $Mesas_Informadas = $Boletin->Mesas_Informadas["V"]; $Potencial_Sufragantes = $Boletin->Potencial_Sufragantes["V"]; $Boletin_Departamental = $Boletin->Boletin_Departamental["V"]; $Desc_Departamento = $Boletin->Desc_Departamento["V"]; $Porc_Mesas_Informadas = $Boletin->Porc_Mesas_Informadas["V"]; $Departamento = $Boletin->Departamento["V"]; $Municipio = $Boletin->Municipio["V"]; // ========== PREGUNTAS ========== foreach ($Boletin->Detalle_Circunscripcion->lin->Detalle_Pregunta->lin as $Pregunta) { $Total_Sufragantes = $Pregunta->Total_Sufragantes["V"]++; $Votos_Nulos = $Pregunta->Votos_Nulos["V"]++; $Votos_No_Marcados = $Pregunta->Votos_No_Marcados["V"]++; $Votos_Validos = $Pregunta->Votos_Validos["V"]++; $Total_Votos = $Votos_Nulos + $Votos_No_Marcados + $Votos_Validos; } // ========== RESPUESTAS ========== foreach ($Boletin->Detalle_Circunscripcion->lin->Detalle_Opcion->lin as $Respuesta) { $Opcion = $Respuesta->Opcion["V"]; $Votos = $Respuesta->Votos["V"]; $Porc = $Respuesta->Porc["V"]; $Pregunta = $Respuesta->Pregunta["V"]; } } A: Lo que tienes que hacer es bastante complicado, hay tres opciones en principio. Parsearlo con php y hacer un ajax cada vez que se hace una selección, se puede usar SimpleXML para esto. Parsearlo con Javascript como si fuera DOM. Para esto se usaría DOMParser(), ejemplo básico aquí. Esta forma puede ser buena pero hay que hacer queries con selectores, que se pueden volver bastante complicados. Trasformar el xml en JSON. Voy a ponerte un ejemplo de esta última forma, es bastante complicada si no estas acostumbrado a manejar objetos y arrays, pero es la que a la larga, según mi opinión, permite mas flexibilidad. En principio hay que bajar una librería que haga el trabajo de transformar el xml a JSON y luego a objeto literal de javascript, porque hacer esto de cero no tiene mucho sentido, y hay varias librerías que hacen lo mismo, y por mas que una librería deje de funcionar, otra hará lo mismo, porque el resultado siempre tiene que ser el mismo. Yo elegí esta: https://cdn.rawgit.com/abdmob/x2js/master/xml2json.js Con el parser lo que hay que hacer es recorrer el objeto que tenemos como resultado e ir extrayendo la información que queremos de él. Algo como esto: //vamos a la parte del objeto que nos interese var obj = x2js.xml_str2json(xml).Boletin_Consolidado.Boletin.Detalle_Circunscripcion.lin; var detalleOpcion = obj.Detalle_Opcion.lin;//<-- accedemos directamente a propiedades que no es necesario iterar. var detallePregunta = obj.Detalle_Pregunta.lin; var info = document.getElementById("info"); detalleOpcion.forEach(function(o,i){//<-- recorremos un array for(let p in o){//<-- recorremos un objeto literal info.innerHTML += p+": "+o[p]._V+"<br>"; } Un ejémplo funcional: https://jsfiddle.net/x1hwfvan/ Yo no sé que información específica necesitas, pero creo que con eso cubre casi todas las formas que podrás usar para extraer la información. En cuanto al select, el select te va a dar supongo algún dato para buscar en este objeto, osea que casi toda la búsqueda, los forEach o fors van a tener que estar en el callback del evento onchange del select. Espero que esto te sirva a vos y a otros como punto de partida para lidiar con esto.
Mid
[ 0.548476454293628, 24.75, 20.375 ]
/* * Copyright (C) 2019 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.android.server.pm; import static android.os.UserManager.USER_TYPE_FULL_GUEST; import static android.os.UserManager.USER_TYPE_FULL_SECONDARY; import static android.os.UserManager.USER_TYPE_PROFILE_MANAGED; import static com.android.server.pm.UserSystemPackageInstaller.PACKAGE_WHITELIST_MODE_PROP; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_DEVICE_DEFAULT; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_DISABLE; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_ENFORCE; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_IGNORE_OTA; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_IMPLICIT_WHITELIST; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_IMPLICIT_WHITELIST_SYSTEM; import static com.android.server.pm.UserSystemPackageInstaller.USER_TYPE_PACKAGE_WHITELIST_MODE_LOG; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertNotNull; import static org.junit.Assert.assertTrue; import static org.junit.Assert.fail; import android.app.PropertyInvalidatedCache; import android.content.Context; import android.content.pm.PackageInfo; import android.content.pm.PackageManager; import android.content.pm.UserInfo; import android.os.Looper; import android.os.SystemProperties; import android.os.UserManager; import android.os.UserManagerInternal; import android.support.test.uiautomator.UiDevice; import android.util.ArrayMap; import android.util.ArraySet; import android.util.Log; import androidx.test.InstrumentationRegistry; import androidx.test.filters.MediumTest; import androidx.test.runner.AndroidJUnit4; import com.android.server.LocalServices; import com.android.server.SystemConfig; import com.android.server.pm.parsing.pkg.AndroidPackage; import com.android.server.pm.parsing.pkg.PackageImpl; import com.android.server.pm.parsing.pkg.ParsedPackage; import org.junit.After; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import java.io.IOException; import java.util.ArrayList; import java.util.Arrays; import java.util.List; import java.util.Set; /** * Tests for UserSystemPackageInstaller. * * <p>Run with:<pre> * atest com.android.server.pm.UserSystemPackageInstallerTest * </pre> */ @RunWith(AndroidJUnit4.class) @MediumTest public class UserSystemPackageInstallerTest { private static final String TAG = "UserSystemPackageInstallerTest"; private UserSystemPackageInstaller mUserSystemPackageInstaller; private Context mContext; /** Any users created during this test, for them to be removed when it's done. */ private final List<Integer> mRemoveUsers = new ArrayList<>(); /** Original value of PACKAGE_WHITELIST_MODE_PROP before the test, to reset at end. */ private final int mOriginalWhitelistMode = SystemProperties.getInt( PACKAGE_WHITELIST_MODE_PROP, USER_TYPE_PACKAGE_WHITELIST_MODE_DEVICE_DEFAULT); @Before public void setup() { // Currently UserManagerService cannot be instantiated twice inside a VM without a cleanup // TODO: Remove once UMS supports proper dependency injection if (Looper.myLooper() == null) { Looper.prepare(); } // Disable binder caches in this process. PropertyInvalidatedCache.disableForTestMode(); LocalServices.removeServiceForTest(UserManagerInternal.class); UserManagerService ums = new UserManagerService(InstrumentationRegistry.getContext()); ArrayMap<String, UserTypeDetails> userTypes = UserTypeFactory.getUserTypes(); mUserSystemPackageInstaller = new UserSystemPackageInstaller(ums, userTypes); mContext = InstrumentationRegistry.getTargetContext(); } @After public void tearDown() { UserManager um = UserManager.get(mContext); for (int userId : mRemoveUsers) { um.removeUser(userId); } setUserTypePackageWhitelistMode(mOriginalWhitelistMode); } /** * Subclass of SystemConfig without running the constructor. */ private class SystemConfigTestClass extends SystemConfig { SystemConfigTestClass(boolean readPermissions) { super(readPermissions); } } /** * Test that determineWhitelistedPackagesForUserTypes reads SystemConfig information properly. */ @Test public void testDetermineWhitelistedPackagesForUserTypes() { SystemConfig sysConfig = new SystemConfigTestClass(false) { @Override public ArrayMap<String, Set<String>> getAndClearPackageToUserTypeWhitelist() { ArrayMap<String, Set<String>> r = new ArrayMap<>(); r.put("com.android.package1", new ArraySet<>(Arrays.asList( "PROFILE", "SYSTEM", USER_TYPE_FULL_GUEST, "invalid-garbage1"))); r.put("com.android.package2", new ArraySet<>(Arrays.asList( USER_TYPE_PROFILE_MANAGED))); r.put("com.android.package3", new ArraySet<>(Arrays.asList("FULL"))); return r; } @Override public ArrayMap<String, Set<String>> getAndClearPackageToUserTypeBlacklist() { ArrayMap<String, Set<String>> r = new ArrayMap<>(); r.put("com.android.package1", new ArraySet<>(Arrays.asList( USER_TYPE_PROFILE_MANAGED, "invalid-garbage2"))); // com.android.package2 has nothing denylisted r.put("com.android.package3", new ArraySet<>(Arrays.asList("SYSTEM"))); return r; } }; final ArrayMap<String, UserTypeDetails> userTypes = UserTypeFactory.getUserTypes(); // Determine the expected userTypeBitSets based on getUserTypeMask. long expectedUserTypeBitSet1 = 0; expectedUserTypeBitSet1 |= mUserSystemPackageInstaller.getUserTypeMask(USER_TYPE_FULL_GUEST); for (int i = 0; i < userTypes.size(); i++) { final String userType = userTypes.keyAt(i); final UserTypeDetails details = userTypes.valueAt(i); if (details.isSystem() || details.isProfile()) { expectedUserTypeBitSet1 |= mUserSystemPackageInstaller.getUserTypeMask(userType); } } expectedUserTypeBitSet1 &= ~mUserSystemPackageInstaller.getUserTypeMask(USER_TYPE_PROFILE_MANAGED); final long expectedUserTypeBitSet2 = mUserSystemPackageInstaller.getUserTypeMask(USER_TYPE_PROFILE_MANAGED); long expectedUserTypeBitSet3 = 0; for (int i = 0; i < userTypes.size(); i++) { final String userType = userTypes.keyAt(i); final UserTypeDetails details = userTypes.valueAt(i); if (details.isFull() && !details.isSystem()) { expectedUserTypeBitSet3 |= mUserSystemPackageInstaller.getUserTypeMask(userType); } } final ArrayMap<String, Long> expectedOutput = getNewPackageToWhitelistedBitSetMap(); expectedOutput.put("com.android.package1", expectedUserTypeBitSet1); expectedOutput.put("com.android.package2", expectedUserTypeBitSet2); expectedOutput.put("com.android.package3", expectedUserTypeBitSet3); final ArrayMap<String, Long> actualOutput = mUserSystemPackageInstaller.determineWhitelistedPackagesForUserTypes(sysConfig); assertEquals("Incorrect package-to-user mapping.", expectedOutput, actualOutput); } /** * Test that determineWhitelistedPackagesForUserTypes does not include packages that were never * allowlisted properly, but does include packages that were allowlisted but then denylisted. */ @Test public void testDetermineWhitelistedPackagesForUserTypes_noNetWhitelisting() { SystemConfig sysConfig = new SystemConfigTestClass(false) { @Override public ArrayMap<String, Set<String>> getAndClearPackageToUserTypeWhitelist() { ArrayMap<String, Set<String>> r = new ArrayMap<>(); r.put("com.android.package1", new ArraySet<>(Arrays.asList("invalid1"))); // com.android.package2 has no allowlisting r.put("com.android.package3", new ArraySet<>(Arrays.asList("PROFILE", "FULL"))); r.put("com.android.package4", new ArraySet<>(Arrays.asList("PROFILE"))); r.put("com.android.package5", new ArraySet<>()); // com.android.package6 has no allowlisting return r; } @Override public ArrayMap<String, Set<String>> getAndClearPackageToUserTypeBlacklist() { ArrayMap<String, Set<String>> r = new ArrayMap<>(); // com.android.package1 has no denylisting r.put("com.android.package2", new ArraySet<>(Arrays.asList("FULL"))); r.put("com.android.package3", new ArraySet<>(Arrays.asList("PROFILE", "FULL"))); r.put("com.android.package4", new ArraySet<>(Arrays.asList("PROFILE", "invalid4"))); // com.android.package5 has no denylisting r.put("com.android.package6", new ArraySet<>(Arrays.asList("invalid6"))); return r; } }; final ArrayMap<String, Long> expectedOutput = getNewPackageToWhitelistedBitSetMap(); expectedOutput.put("com.android.package2", 0L); expectedOutput.put("com.android.package3", 0L); expectedOutput.put("com.android.package4", 0L); final ArrayMap<String, Long> actualOutput = mUserSystemPackageInstaller.determineWhitelistedPackagesForUserTypes(sysConfig); assertEquals("Incorrect package-to-user mapping.", expectedOutput, actualOutput); } /** * Tests that shouldInstallPackage correctly determines which packages should be installed. */ @Test public void testShouldInstallPackage() { final String packageName1 = "pkg1"; // allowlisted final String packageName2 = "pkg2"; // allowlisted and denylisted final String packageName3 = "pkg3"; // allowlisted for a different user type final String packageName4 = "pkg4"; // not allowlisted nor denylisted at all // Allowlist: user type bitset for each pkg (for the test, all that matters is 0 vs non-0). final ArrayMap<String, Long> pkgBitSetMap = new ArrayMap<>(); pkgBitSetMap.put(packageName1, 0b01L); pkgBitSetMap.put(packageName2, 0L); pkgBitSetMap.put(packageName3, 0b10L); // Allowlist of pkgs for this specific user, i.e. subset of pkgBitSetMap for this user. final Set<String> userWhitelist = new ArraySet<>(); userWhitelist.add(packageName1); final AndroidPackage pkg1 = ((ParsedPackage) PackageImpl.forTesting(packageName1) .hideAsParsed()).hideAsFinal(); final AndroidPackage pkg2 = ((ParsedPackage) PackageImpl.forTesting(packageName2) .hideAsParsed()).hideAsFinal(); final AndroidPackage pkg3 = ((ParsedPackage) PackageImpl.forTesting(packageName3) .hideAsParsed()).hideAsFinal(); final AndroidPackage pkg4 = ((ParsedPackage) PackageImpl.forTesting(packageName4) .hideAsParsed()).hideAsFinal(); // No implicit allowlist, so only install pkg1. boolean implicit = false; assertTrue(UserSystemPackageInstaller.shouldInstallPackage( pkg1, pkgBitSetMap, userWhitelist, implicit)); assertFalse(UserSystemPackageInstaller.shouldInstallPackage( pkg2, pkgBitSetMap, userWhitelist, implicit)); assertFalse(UserSystemPackageInstaller.shouldInstallPackage( pkg3, pkgBitSetMap, userWhitelist, implicit)); assertFalse(UserSystemPackageInstaller.shouldInstallPackage( pkg4, pkgBitSetMap, userWhitelist, implicit)); // Use implicit allowlist, so install pkg1 and pkg4 implicit = true; assertTrue(UserSystemPackageInstaller.shouldInstallPackage( pkg1, pkgBitSetMap, userWhitelist, implicit)); assertFalse(UserSystemPackageInstaller.shouldInstallPackage( pkg2, pkgBitSetMap, userWhitelist, implicit)); assertFalse(UserSystemPackageInstaller.shouldInstallPackage( pkg3, pkgBitSetMap, userWhitelist, implicit)); assertTrue(UserSystemPackageInstaller.shouldInstallPackage( pkg4, pkgBitSetMap, userWhitelist, implicit)); } /** * Tests that getWhitelistedPackagesForUserType works properly, assuming that * mWhitelistedPackagesForUserTypes (i.e. determineWhitelistedPackagesForUserTypes) is correct. */ @Test public void testGetWhitelistedPackagesForUserType() { final String[] sortedUserTypes = new String[]{"type_a", "type_b", "type_c", "type_d"}; final String nameOfTypeA = sortedUserTypes[0]; final String nameOfTypeB = sortedUserTypes[1]; final String nameOfTypeC = sortedUserTypes[2]; final long maskOfTypeA = 0b0001L; final long maskOfTypeC = 0b0100L; final String packageName1 = "pkg1"; // allowlisted for user type A final String packageName2 = "pkg2"; // denylisted whenever allowlisted final String packageName3 = "pkg3"; // allowlisted for user type C final String packageName4 = "pkg4"; // allowlisted for user type A final ArrayMap<String, Long> pkgBitSetMap = new ArrayMap<>(); // Allowlist: bitset per pkg pkgBitSetMap.put(packageName1, maskOfTypeA); pkgBitSetMap.put(packageName2, 0L); pkgBitSetMap.put(packageName3, maskOfTypeC); pkgBitSetMap.put(packageName4, maskOfTypeA); UserSystemPackageInstaller uspi = new UserSystemPackageInstaller(null, pkgBitSetMap, sortedUserTypes); Set<String> output = uspi.getWhitelistedPackagesForUserType(nameOfTypeA); assertEquals("Whitelist for FULL is the wrong size", 2, output.size()); assertTrue("Whitelist for A doesn't contain pkg1", output.contains(packageName1)); assertTrue("Whitelist for A doesn't contain pkg4", output.contains(packageName4)); output = uspi.getWhitelistedPackagesForUserType(nameOfTypeB); assertEquals("Whitelist for B is the wrong size", 0, output.size()); output = uspi.getWhitelistedPackagesForUserType(nameOfTypeC); assertEquals("Whitelist for C is the wrong size", 1, output.size()); assertTrue("Whitelist for C doesn't contain pkg1", output.contains(packageName3)); } /** * Test that a newly created FULL user has the expected system packages. * * Assumes that SystemConfig and UserManagerService.determineWhitelistedPackagesForUserTypes * work correctly (they are tested separately). */ @Test public void testPackagesForCreateUser_full() { final String userTypeToCreate = USER_TYPE_FULL_SECONDARY; final long userTypeMask = mUserSystemPackageInstaller.getUserTypeMask(userTypeToCreate); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_ENFORCE); PackageManager pm = mContext.getPackageManager(); final SystemConfig sysConfig = new SystemConfigTestClass(true); final ArrayMap<String, Long> packageMap = mUserSystemPackageInstaller.determineWhitelistedPackagesForUserTypes(sysConfig); final Set<String> expectedPackages = new ArraySet<>(packageMap.size()); for (int i = 0; i < packageMap.size(); i++) { if ((userTypeMask & packageMap.valueAt(i)) != 0) { expectedPackages.add(packageMap.keyAt(i)); } } final UserManager um = UserManager.get(mContext); final UserInfo user = um.createUser("Test User", userTypeToCreate, 0); assertNotNull(user); mRemoveUsers.add(user.id); final List<PackageInfo> packageInfos = pm.getInstalledPackagesAsUser( PackageManager.MATCH_SYSTEM_ONLY | PackageManager.MATCH_DISABLED_COMPONENTS | PackageManager.MATCH_DISABLED_UNTIL_USED_COMPONENTS, user.id); final Set<String> actualPackages = new ArraySet<>(packageInfos.size()); for (PackageInfo p : packageInfos) { actualPackages.add(p.packageName); } // Add auto-generated RRO package to expectedPackages since they are not (supposed to be) // in the allowlist but they should be installed. for (PackageInfo p : packageInfos) { if (p.isOverlayPackage() && UserSystemPackageInstaller.hasAutoGeneratedRROSuffix(p.packageName) && expectedPackages.contains(p.overlayTarget)) { expectedPackages.add(p.packageName); } } checkPackageDifferences(expectedPackages, actualPackages); } @Test public void testAutoGeneratedRROMatchesSuffix() { final List<PackageInfo> packageInfos = mContext.getPackageManager() .getInstalledPackages(PackageManager.GET_UNINSTALLED_PACKAGES); Log.v(TAG, "Found total packages: " + packageInfos.size()); for (PackageInfo p : packageInfos) { if (p.packageName.contains(".auto_generated_rro_")) { assertTrue("Auto-generated RRO package name does not match the suffix: " + p.packageName, UserSystemPackageInstaller.hasAutoGeneratedRROSuffix(p.packageName)); } } } /** * Test that overlay package not in allowlist should be installed for all user at Explicit mode. */ @Test public void testInstallOverlayPackagesExplicitMode() { setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_ENFORCE); final String[] userTypes = new String[]{"type"}; final long maskOfType = 0b0001L; final String packageName1 = "whitelistedPkg"; final String packageName2 = "nonWhitelistedPkg"; final String overlayName1 = String.format("%s.auto_generated_rro_product__", packageName1); final String overlayName2 = String.format("%s.auto_generated_rro_product__", packageName2); final AndroidPackage overlayPackage1 = ((ParsedPackage) PackageImpl.forTesting(overlayName1) .setOverlay(true) .setOverlayTarget(packageName1) .hideAsParsed()) .hideAsFinal(); final AndroidPackage overlayPackage2 = ((ParsedPackage) PackageImpl.forTesting(overlayName2) .setOverlay(true) .setOverlayTarget(packageName2) .hideAsParsed()) .hideAsFinal(); final ArrayMap<String, Long> userTypeWhitelist = new ArrayMap<>(); userTypeWhitelist.put(packageName1, maskOfType); final Set<String> userWhitelist = new ArraySet<>(); userWhitelist.add(packageName1); boolean implicit = false; assertTrue("Overlay for package1 should be installed", UserSystemPackageInstaller .shouldInstallPackage(overlayPackage1, userTypeWhitelist, userWhitelist, implicit)); assertFalse("Overlay for package2 should not be installed", UserSystemPackageInstaller .shouldInstallPackage(overlayPackage2, userTypeWhitelist, userWhitelist, implicit)); } /** Asserts that actual is a subset of expected. */ private void checkPackageDifferences(Set<String> expected, Set<String> actual) { final Set<String> uniqueToExpected = new ArraySet<>(expected); uniqueToExpected.removeAll(actual); final Set<String> uniqueToActual = new ArraySet<>(actual); uniqueToActual.removeAll(expected); Log.v(TAG, "Expected list uniquely has " + uniqueToExpected); Log.v(TAG, "Actual list uniquely has " + uniqueToActual); assertTrue("User's system packages includes non-whitelisted packages: " + uniqueToActual, uniqueToActual.isEmpty()); } /** * Test that setEnableUserTypePackageWhitelist() has the correct effect. */ @Test public void testSetWhitelistEnabledMode() { setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_DISABLE); assertFalse(mUserSystemPackageInstaller.isLogMode()); assertFalse(mUserSystemPackageInstaller.isEnforceMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_LOG); assertTrue(mUserSystemPackageInstaller.isLogMode()); assertFalse(mUserSystemPackageInstaller.isEnforceMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_ENFORCE); assertFalse(mUserSystemPackageInstaller.isLogMode()); assertTrue(mUserSystemPackageInstaller.isEnforceMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_IMPLICIT_WHITELIST); assertFalse(mUserSystemPackageInstaller.isLogMode()); assertFalse(mUserSystemPackageInstaller.isEnforceMode()); assertTrue(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_IMPLICIT_WHITELIST_SYSTEM); assertFalse(mUserSystemPackageInstaller.isLogMode()); assertFalse(mUserSystemPackageInstaller.isEnforceMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertTrue(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_IGNORE_OTA); assertFalse(mUserSystemPackageInstaller.isLogMode()); assertFalse(mUserSystemPackageInstaller.isEnforceMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertTrue(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode( USER_TYPE_PACKAGE_WHITELIST_MODE_LOG | USER_TYPE_PACKAGE_WHITELIST_MODE_ENFORCE); assertTrue(mUserSystemPackageInstaller.isLogMode()); assertTrue(mUserSystemPackageInstaller.isEnforceMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); setUserTypePackageWhitelistMode(USER_TYPE_PACKAGE_WHITELIST_MODE_IMPLICIT_WHITELIST | USER_TYPE_PACKAGE_WHITELIST_MODE_ENFORCE); assertFalse(mUserSystemPackageInstaller.isLogMode()); assertTrue(mUserSystemPackageInstaller.isEnforceMode()); assertTrue(mUserSystemPackageInstaller.isImplicitWhitelistMode()); assertFalse(mUserSystemPackageInstaller.isImplicitWhitelistSystemMode()); assertFalse(mUserSystemPackageInstaller.isIgnoreOtaMode()); } /** Sets the allowlist mode to the desired value via adb's setprop. */ private void setUserTypePackageWhitelistMode(int mode) { UiDevice uiDevice = UiDevice.getInstance(InstrumentationRegistry.getInstrumentation()); try { String result = uiDevice.executeShellCommand(String.format("setprop %s %d", PACKAGE_WHITELIST_MODE_PROP, mode)); assertFalse("Failed to set sysprop " + PACKAGE_WHITELIST_MODE_PROP + ": " + result, result != null && result.contains("Failed")); } catch (IOException e) { fail("Failed to set sysprop " + PACKAGE_WHITELIST_MODE_PROP + ":\n" + e); } } /** @see UserSystemPackageInstaller#mWhitelistedPackagesForUserTypes */ private ArrayMap<String, Long> getNewPackageToWhitelistedBitSetMap() { final ArrayMap<String, Long> pkgBitSetMap = new ArrayMap<>(); // "android" is always treated as allowlisted for all types, regardless of the xml file. pkgBitSetMap.put("android", ~0L); return pkgBitSetMap; } }
Low
[ 0.532631578947368, 31.625, 27.75 ]
The Rolex 24 At Daytona will serve as the kick-off event for the inaugural TUDOR United SportsCar Championship season and Daytona International Speedway’s Budweiser Speedweeks 2014, on Jan. 25-26. But three weeks beforehand, it will be time to make some pre Daytona Prototypes are expected to flock to the Roar Before The Rolex 24 test session.(Photo: Grand-Am) The Rolex 24 At Daytona will serve as the kick-off event for the inaugural TUDOR United SportsCar Championship season and Daytona International Speedway’s Budweiser Speedweeks 2014, on Jan. 25-26. But three weeks beforehand, it will be time to make some preseason noise. The annual “Roar Before The Rolex 24” test sessions will be held at DIS on Jan. 3-5, open to teams in the TUDOR United SportsCar Championship and the Continental Tire Sports Car Challenge, both sanctioned by the International Motor Sports Association (IMSA). This won’t be any ordinary test, though. The belief is that it will be rather extraordinary, starting with the expected total turnout of more than 100 cars. “We think this is going to be the ‘loudest’ Roar ever, meaning, it will be the most significant in the history of the test,” said IMSA Vice President of Competition and Technical Regulations Scot Elkins. “The season-opening Rolex 24 At Daytona will be just a few weeks away, and anticipation for the first race in the new TUDOR United SportsCar Championship will be at a fever pitch. The Roar will provide fans a chance to see the new championship’s class structure showcased together on-track. In addition, the Continental Tire Sports Car Challenge will roll onto the high banks with its typical huge contingent of production-based cars. “While the Roar officially will be a test session, fans who attend will experience a preview of what will be the race-weekend atmosphere. Of course the primary goal of the Roar is to provide teams an opportunity to test in advance of the race, but this year’s Roar is also designed to get everyone pumped about the Rolex 24 and the entire debut season for the TUDOR United SportsCar Championship.” Added Daytona International Speedway President Joie Chitwood III: “There will certainly be a special buzz surrounding this year’s Roar Before The Rolex 24, as we begin this new era in North American sports car racing. Fans will be treated to something special, watching TUDOR United SportsCar Championship teams prepare for their prestigious season-opening event – the Rolex 24 At Daytona.” Individual daily tickets to the Roar Before The Rolex 24 are available for $15 online at www.daytonainternationalspeedway.com or by calling 1-800-PITSHOP; children 12 and under will receive free admission. In addition, ticket holders for the 2014 Rolex 24 At Daytona receive free admission to the Roar Before The Rolex 24. season noise. The annual “Roar Before The Rolex 24” test sessions will be held at DIS on Jan. 3-5, open to teams in the TUDOR United SportsCar Championship and the Continental Tire Sports Car Challenge, both sanctioned by the International Motor Sports Association (IMSA). This won’t be any ordinary test, though. The belief is that it will be rather extraordinary, starting with the expected total turnout of more than 100 cars. “We think this is going to be the ‘loudest’ Roar ever, meaning, it will be the most significant in the history of the test,” said IMSA Vice President of Competition and Technical Regulations Scot Elkins. “The season-opening Rolex 24 At Daytona will be just a few weeks away, and anticipation for the first race in the new TUDOR United SportsCar Championship will be at a fever pitch. The Roar will provide fans a chance to see the new championship’s class structure showcased together on-track. In addition, the Continental Tire Sports Car Challenge will roll onto the high banks with its typical huge contingent of production-based cars. “While the Roar officially will be a test session, fans who attend will experience a preview of what will be the race-weekend atmosphere. Of course the primary goal of the Roar is to provide teams an opportunity to test in advance of the race, but this year’s Roar is also designed to get everyone pumped about the Rolex 24 and the entire debut season for the TUDOR United SportsCar Championship.” Added Daytona International Speedway President Joie Chitwood III: “There will certainly be a special buzz surrounding this year’s Roar Before The Rolex 24, as we begin this new era in North American sports car racing. Fans will be treated to something special, watching TUDOR United SportsCar Championship teams prepare for their prestigious season-opening event – the Rolex 24 At Daytona.” Individual daily tickets to the Roar Before The Rolex 24 are available for $15 online at www.daytonainternationalspeedway.com or by calling 1-800-PITSHOP; children 12 and under will receive free admission. In addition, ticket holders for the 2014 Rolex 24 At Daytona receive free admission to the Roar Before The Rolex 24.
Mid
[ 0.624413145539906, 33.25, 20 ]
5 Reasons Why Online Video Is So Persuasive Video Genie lets customers record video testimonials Let’s say you are browsing for shoes at your favorite online shoe store. You see a pair that looks like what you are looking for, but you aren’t 100% convinced. Then you notice that in addition to the regular reviews written by other shoppers, there is a video you can click on. You click on the video and watch a stream of customers show you the shoe and talk about why they like it. Persuasive? You bet! Video is one of the most powerful media choices for online persuasion. Here are 5 reasons why: #1 — Movement in peripheral vision grabs attention — In a previous post I talked about why movement in your peripheral vision is so powerful at grabbing attention. Video online is movement, and so will automatically grab attention more than anything else on the screen. #2 — Speakers and listener’s brains sync up — In a previous post I talked about the research by Stephens (Stephens, Greg, Silbert, L., & Hasson, U., 2010. Speaker–listener neural coupling underlies successful communication. Proceedings of the National Academy of Sciences, July 27, 2010.) that shows that the brain patterns of listeners synch up with the brain patterns of the speaker they are listening to. This means that a video of someone talking is going to be more powerful than just reading words on a page. #3 — Video compensates (somewhat) for the asynchronous problem — In a previous post I wrote about the research by Wiltermuth and Heath (Scott S. Wiltermuth and Chip Heath, Synchrony and Cooperation, Psychological Science, Volume 20 Issue 1, Pages 1 – 5) on how synchronous behavior bonds people together. A lot of online communication is asynchronous — the communication is not occurring simultaneously in real time. Emails, Facebook posts, twitter posts, are asynchronous. Chat is synchronous. Synchronous communication is, in general, more persuasive. Video can be synchronous (think Skype) or asynchronous (think TED talk or YouTube). But video does have the advantage of allowing you to hear and see an actual person, rather than the more removed reading of text. In this regard it is the most powerful of the asynchronous media. #4 — Video can convey emotional info, not just factual — In my book, Neuro Web Design: What makes them click? I talk about how important it is to speak to the emotional mid-brain if you want to get your message across and have your message be remembered. Video has the advantage (over just reading text) of communicating social and emotional information, not just facts. #5 — Video testimonials combine all the powerful elements together — If you haven’t seen Video Genie in action, I suggest you go to videogenie.com and check out their example videos. This is a new technology that allows customers to easily make a video testimonial and post it to your site (you get to moderate it, i.e. watch it before it gets posted). I’ve talked a lot (in books and other posts) about why testimonials and reviews are so powerful (it’s the principle of social validation). Video testimonials are social validation on steroids. Social validation, brain syncing, emotional content… you just can’t beat this for persuasion. The technology for video is finally getting easier and easier to create and integrate online. (Another interesting example is Vokle.com — it allows anyone to host their own video talk show, live, with people calling in.) 11 Replies to “5 Reasons Why Online Video Is So Persuasive” Video seems contrary to the spirit of the web however since its not very custom (everyone sees the same thing), its choreographed (there is a start, middle, end and needs it for context), and is really just an old medium delivered in a new method (and often of very low quality). Granted people love stories and when done well its useful but I would argue the web is about interactivity and video limits our interactivity. ed s — I don’t know that I agree with you on this. everything on the web is an old medium (i.e. text? photos?), and if you check out vokle and video genie — those are examples of not choreographed video and interactive video. Imagine how much more popular web video would be if it were regularly closed-captioned, so that the approximately 1m deaf and 8m hard of hearing people (according to Gallaudet University) in the US alone could access it? My Prediction: I think you will see the use of video to sell merchandise explode. The eCommerce shopping carts are a bit behind the curve, requiring customization and several clicks to get to a video clip of an item, but it’s doable. I will be featuring pets, swing sets, and homes on my garage sale website (under construction). Real estate agents are already using video extensively. YouTube makes mounting video clips to websites easy. And I disagree things have to look “professional” Home made music videos (See CED Baby, My Space and YouTube)and “do it yourself” videos becoming very accepted by users. Look at the lineup of current TV shows (“Funniest…”)and you will see the “amateur is acceptable” trend clearly. Interesting post! And I liked Ronnie’s comment about captioning videos. It would not only help the hard-of-hearing, but would also be useful to those of us who turn off the sound so that we can surf privately. I earn a living producing web video for small businesses. At first I thought is was about “filmmaking” but I found out it’s about creating a virtual pre-relationship. It’s about marketing and telling, not selling a story. Done correctly (in 3rd person, with NO call to action), the viewer feels like they are getting to know the subject. I’ve had my clients tell me that their clients remembered most of what was said on the video but none of what they read. @Ted – Quality is an issue. Most people try to save money and do videos with a Flip camera. Nothing wrong with a flip as long as the audio is good. Audio is more important. @Ronnie – That sounds like a good biz angle for you I agree with you on all these points. Nice to have the research to back it up. I know when I’m learning I prefer to watch and listen, rather than read. It’s faster and more enjoyable for me. It’s easier for me to understand and critique what I’m watching because I’m more engaged. The point that Ronnie makes is an important one too. In that case you have the transcript. Makes you wonder how youtube and TED are so popular though doesn’t it? Great article! Love the psychology behind why video is so powerful. I especially agree with reason #4 – take those ubiquitous Corona commercials as an example. Watching the nameless, faceless people enjoy their ice-cold Coronas on a beach transports you as the viewer to that place – you can imagine yourself sitting in that chair on that beach looking at that view with that beer in your hand, and it makes you want to go buy that beer, the one thing in that whole scene that is the most easily attainable. That’s why I think online video is set to boom so quickly. Thanks for the post! I could not agree with Susan more, I recently joined a video production company and they are literally taking the market by storm. With their ability to incorporate video into marketing, elearning, sales training etc… they have found a niche in a growing market space and it’s exciting to be a part of it.
High
[ 0.685714285714285, 31.5, 14.4375 ]
Interactions of the multidrug resistance modulators tariquidar and elacridar and their analogues with P-glycoprotein. Tariquidar and elacridar are among the most potent inhibitors of the multidrug resistance transporter P-glycoprotein (P-gp), but how they interact with the protein is yet unknown. In this work, we describe a possible way in which these inhibitors interact with P-gp. We rely on structure-activity relationship analysis of a small group of tariquidar and elacridar analogues that was purposefully selected, designed, and tested. Structural modifications of the compounds relate to the presence or absence of functional groups in the tariquidar and elacridar scaffolds. The activity of the compounds was evaluated by their effects on the accumulation of P-gp substrates rhodamine 123 and Hoechst 33342 in resistant tumor cells. The data allow estimation of the ability of the compounds to interact with the experimentally proposed R- and H-sites to which rhodamine 123 and Hoechst 33342 bind, respectively. Using an inward-facing homology model of human P-gp based on the crystallographic structure of mouse P-gp, we demonstrate that these binding sites may overlap with the binding sites of the QZ59 ligands co-crystallized with mouse P-gp. Based on this SAR analysis, and using flexible alignment and docking, we propose possible binding modes for tariquidar and elacridar. Our results suggest the possibility for the studied compounds to bind to sites that coincide or overlap with the binding sites of rhodamine 123 and Hoechst 33342. These results contribute to further understanding of structure-function relationships of P-gp and can help in the design of selective and potent P-gp inhibitors with potential clinical use.
High
[ 0.6892950391644901, 33, 14.875 ]
Caleb Stegall Caleb Stegall (born September 20, 1971) is an American attorney and writer residing in Perry, Kansas. He has served as the District attorney for Jefferson County, Kansas and Chief Counsel to Kansas Governor Sam Brownback before being appointed to the Kansas Court of Appeals. On August 29, 2014, Stegall was appointed by Kansas Governor Sam Brownback to the Kansas Supreme Court, replacing Nancy Moritz, who was appointed by President Barack Obama to the 10th Circuit Court of Appeals. He is a proponent of traditionalist conservatism. Background Born in Topeka, Stegall is a lifelong resident of Douglas and Jefferson Counties in northeast Kansas. Law practice At the time of his appointment by Brownback, the Kansas Democratic Party issued a release criticizing Brownback for the appointment. He represented the State of Kansas in litigation with environmentalists over the permitting of coal-fired power plants. Stegall represented eight American missionaries detained in Haiti following the 2010 Haiti earthquake. In 2008 he successfully defended the former executive director of the Kansas Republican Party in a dispute over Kansas campaign finance rules. In 2007 he was the lead counsel in the Kansas Supreme Court trial of former Kansas Attorney General Phill Kline. In 2008, Stegall represented a group of residents opposed public financing of casino operations in Kansas City, Kansas. In 2008 he represented a church that challenged local regulations on the church's operations as a homeless shelter. In 2009 he represented a teacher who claimed he had not been rehired because of his conservative political beliefs. As district attorney, he filed charges in 2009 against a county commissioner charged with theft by deception. and in 2010 was involved with a federal and state investigation of a distributor of "ethnobotanicals" who was accused of selling a synthetic cannabis. He has worked as a counsel for Americans for Prosperity.<ref>"Jefferson County attorney candidate Caleb Stegall chats about primary election", Lawrence Journal-World, July 29, 2008.</ref> Politics Stegall has been identified as an advocate for traditionalist conservatism and a "prairie populist". In 2004, he was profiled on the front page of The New York Times as one of a young generation of conservatives questioning GOP orthodoxy. On January 12, 2009, Stegall began his first term as Jefferson County District Attorney. He has been characterized by the popular and politically left publication Firedoglake as a "rising political star" of the right, has been suggested as a possible candidate for U.S. Senate, and has been described as representing a new path for the GOP in the post-Bush years. Religion Stegall is a ruling elder in the Evangelical Presbyterian Church. He has been described as a "lifelong conservative Presbyterian," whose faith and life is "strongly countercultural to mainstream Evangelicalism," although he still identifies himself as an evangelical. Stegall and his wife Ann homeschool their children. Writings In 2003, Stegall created and founded, with others, an online journal of religion, politics, and culture called The New Pantagruel. In 2006, Stegall and The New Pantagruel were featured in Rod Dreher's book, Crunchy Cons, as leaders in the resurgence of traditionalist conservatism. Though The New Pantagruel was discontinued at the end of 2006, Stegall's writing continues to appear in conservative papers, magazines, and journals including National Review Online, Christianity Today, The Intercollegiate Review, The American Conservative, Taki's Magazine, and Touchstone Magazine. Stegall authors a semi-regular column on Kansas politics for the independent publication Kansas Liberty. Stegall has authored chapters in several books, including the chapter on "Community" in the book American Conservatism: An Encyclopedia''. Notes External links Official Kansas Courts Biography Category:1971 births Category:Living people Category:American evangelicals Category:American non-fiction writers Category:American Presbyterians Category:District attorneys in Kansas Category:Geneva College alumni Category:Kansas Court of Appeals Judges Category:Kansas Republicans Category:Kansas Supreme Court justices Category:Politicians from Topeka, Kansas Category:University of Kansas School of Law alumni Category:Writers from Topeka, Kansas Category:People from Perry, Kansas Category:21st-century American judges Category:American conservative people
High
[ 0.6721088435374151, 30.875, 15.0625 ]
OMAHA — (Scroll down for video) — St. Cecilia’s Cathedral: On Sunday, August 16, 2015, at 11:06 am, a 72 year old woman entered the north vestibule of St. Cecilia’s Cathedral on 40th and Burt Street. As she stood at the welcome table reading a copy of the parish newsletter, two black men, approximately 16 years of age, entered behind her. One grabbed her purse from her arm and ran out the door. The second, for no explainable reason, hit the woman squarely on the side of her face, knocking her down where she hit her head against the side of the table. The second individual also ran out the door, and the two ran down Burt street, then North toward Cumings. Their faces and clothing are clearly visible on camera. Identifiable markings include the t-shirt and hair of the assailant, and the hood of the purse snatcher. Height estimated at 5’ 10”. The woman was taken to the hospital for her injuries. If you have any information, please contact the SaintCecilia Cathedral office at 402-551-2313 or the police department. Facebook Comments
Mid
[ 0.6082949308755761, 33, 21.25 ]
Commentaires/remarks Page tags Add a new page Posted by Louis on 22/03/2011 Hello my name is good-natured Louis, and my nickname is jacque mesrine. I am 16 years old. I was born on 4th october, 1994. I am your partner and I like sports, video games and partying. My father is Pascal - he is 48 years old. My mother is Valérie, and she is 47 years old. I have 4 sisters, 3 half-sisters and 1 half–brother. I have a cat aged 10, and I often play call of duty and black ops. I like going out with my friends who have motorbikes, and we go partying. We also like going for a walk and drinking at the weekend when we meet up together. I live in Cantenay-Epinard where population is about 3000. It's a beautiful village with many cows! Posted by Louis on 29/03/2011 I would like to be a policeman and work as a biker or a dog handler and if possible as a GIGN. For that, I need my E-levels and pass the entrance examination to become a policeman. Posted by Louis on 12/04/2011 I kiss my father and my family. I shake hands with my guy friends, and I kiss the girls to greet them. This is what we do in France. There are some traditions particular to France. We say 'bon appetit' to each other when we eat. 'Bon appetit' means 'enjoy your meal' in English. Some of the traditions in my little village are: We say hello to everyone that we see, and we go out in the evening. I nickname all my friends (popol, gaet, max, le roux , etc…).
Low
[ 0.528375733855185, 33.75, 30.125 ]
Can taking Simvistatin and Levoflaxacin cause Rhabdomyolysis? My father-inlaw was admitted to hospital suffering from servere muscle weekness and died 10 days later from Rhabdomyolysis.He was taking Simvistatin and previous to that had taken a 5 five day course of Levoflaxacin.His doctor informed us that it was an interaction between the two drugs. Responses (1) Simvastatin, like other statins, can cause myopathy with symptoms such as muscle pain, tenderness or weakness. Myopathy sometimes takes the form of rhabdomyolysis, death is rare but has occurred. Read more: https://www.drugs.com/pro/simvastatin.html
Mid
[ 0.6524064171122991, 30.5, 16.25 ]
The world is in chaos. He went so far as to hit the girl to make her obey his orders. My mom bought this shirt for me. The country is isolated economically and politically. Nguyen doesn't know what Hwa is doing. He always thinks ten steps ahead. He need not give up the plan. We'll find out later. Sabrina wants to donate money. Wheels turn on axles. 403-769-6153 He does nothing but complain all day long. What does Rossiyane mean? Sal was slouched in a chair. 403-769-6153 I've got get back to work. Jeffrey can't eat it all himself. They didn't do that. He made the plan along with his colleagues. They looked on her behavior as childish. I wrote a letter to my mother last night. The new model will retail for 30,000 yen. Nigel punched John in the stomach and walked away. 403-769-6153 Leads lives alone in a small cabin near a waterfall. We've found a dead dog in the garden. Should we wait here for Billie? Jerry was put in a cell. Pay attention to his advice. 403-769-6153 Why is my brother stupid? He experienced a pain in his leg. He spoke so eloquently that the audience were all moved to tears. Dori tried to smither her way out of the dark basement but hit her head on the rafter and fainted. 403-769-6153 His latest works are on temporary display. It wasn't Sean's first time to hear Mariou sing. 403-769-6153 Mark didn't mean to be so late. He felt perfectly content. I am sure I will win the tennis match. Why is anybody surprised? We tried everything. Check it out! When Elaine gets drunk, he'll eat a lot of things that he wouldn't eat when he's sober. 403-769-6153 The next Hikari arrives at 9:15. That's correct. 403-769-6153 I can't believe Rafael ate the whole thing. Panos began looking around. Insofar as we know, he is guilty. Ramsey was real scared. The answer is actually quite simple. I'll be home right after work. I don't want the investigation to burn out. The guardsman was assaulted by a robber. She thrilled to his saying so. 403-769-6153 Spatra set to sail through her exams I think I get the general idea. Manolis is the best high school catcher I've ever seen. Francois can't seem to understand what you're saying. Naloxone is a life-saving drug that can reverse the effects of an opioid overdose. 403-769-6153 That country has natural resources. Do you know how to use this camera? She is more beautiful than you think. Juliane never said where he'd first met Monty. I helped Kanthan. 403-769-6153 Roland is proud of his son. Apparently it worked. Mitch is a notary. The cup is full. There has been an increase in the number of murders. This is a really bad time. Could you come back later? She wore a green dress. Russian speech without swearing turns into a report.
Mid
[ 0.579310344827586, 31.5, 22.875 ]
Are Indian Banks On the Verge of Collapse? There has been a lot of talk in the last few months about the failing financial system in India – from the announcement of public bank recapitalisation last November, to declarations of increasing numbers of non-performing assets across the banking sector, to the Nirav Modi scandal that rocked the nation. But, just how vulnerable are the banks? Should we really be scared, or has it all been hyped out of proportion? In the new episode of “The Capitalmind Show”, Deepak Shenoy tackles these issues head on. Have the banks been mismanaged? Of course they have. Due to the near impossibility of shutting down, public sector bank managers have been taking on unnecessary risks without the fear of repercussions. At worst, these banks will be consolidated to make one larger bank with employees accommodated in the new company. In fact, Shenoy believes that the long term vision for Indian banks is actually quite positive. Despite the big loan problem across the banking sector, smaller private banks have a lot to gain by larger public banks becoming more fiscally conservative. After all, the debt that public sector banks are owed is alone double or even triple the size of entire private sector banks. For example, even Yes Bank – who were notoriously pulled up by the RBI for their own loan problem in the back end of last year – will grow if they can take on some of the clients that will be moving on from public banks. Additionally, Shenoy believes that increasing number of banks that are being pulled up by the RBI for NPAs is a good development. This doesn’t prove that there are more banks being careless. Rather, it proves that the governing body is now becoming more adept at finding these problems within the banking sector. POPULAR CATEGORY TheBigScope is India’s first live interactive online 24×7 channel, launched with the vision of reimagining television in internet era. It features regular shows that cover business, lifestyle, living, music and culture for the internet generation. TheBigScope has numerous venue livestream partners, works with a number of stellar brands and is available on most platforms and devices.
Mid
[ 0.6398104265402841, 33.75, 19 ]
Pyam language Fyam (Pyem, Gye, Fyem) is a Plateau language of Nigeria. References Blench, Roger. 2010. Plural verbs in the languages of Central Nigeria. Category:Languages of Nigeria Category:East Plateau languages
Mid
[ 0.6223175965665231, 36.25, 22 ]
Programs in Political Science and Legal Studies Main menu Big Man on the Big Island Submitted by Anonymous (not verified) on Sun, 2010-02-28 19:00 Like Barack Obama, Billy Kenoi ’93 is a native Hawaiian who ran against an older, more experienced candidate for office last November. And, like Obama, Kenoi triumphed. “Seeing the newspaper with the headlines ‘Obama Wins; Kenoi Wins’, gave me goose bumps,” he says. Kenoi, elected at 39, is the youngest-ever mayor of the ‘Big Island’ of Hawaii, which has 150,000 inhabitants spread over 4,000 square miles. He’s made a commitment to take the government to the people. He visits both sides of the island weekly and periodically brings his cabinet out to Hawaii’s rural towns. “Hawaii is a big place, but a close community,” he says. “I believe that by speaking honestly with people, we can get the job done. You have to keep things simple. Some people think politics is chess, but it’s checkers.” The economic downturn hit Hawaii hard, and Kenoi’s proudest accomplishment in office so far has been balancing the island’s $386 million budget without furloughs, layoffs, or cuts to social services. One of his main goals as mayor is to expand the island’s public transportation. “We want to get cars off the roads,” he says. “We’re bringing in Hawaii’s first double-decker bus. Our free bus service was actually inspired by the UMass Amherst transit system.” Kenoi calls coming to UMass Amherst in 1990 “one of the best decisions I ever made.” On campus he met his wife, Takako Culhane, a student volleyball player from Japan, and his mentor, political science professor John Brigham. Brigham recommended Kenoi for an internship with U.S. Senator Daniel K. Inouye, which put him on the path to law school, work as a trial attorney, and then politics. “I keep Professor Brigham’s letter to this day,” Kenoi says. “When I have a challenge as mayor, I’ll reread it and tell myself, ‘I can do this.’” Department of Political Science Thompson Hall, 200 Hicks Way Amherst, MA 01003 USA Phone: 413.545.2438The College of Social and Behavioral Sciences (SBS) bridges the sciences and liberal arts and educates thousands of students each year in the areas of culture, society, and individual behavior.This page is maintained by the Department of Political Science.
Mid
[ 0.650904033379694, 29.25, 15.6875 ]
Q: Retrofit2 throws ConnectionShutdownException error while uploading a file using Multipart I am using Retrofit2 library for http requests. It works perfectly except when I try to upload image using Multipart. I am picking an image from Gallery and setting the imageUri for an image view successfully. Then I take the image uri got from the image picker to declare a file and upload if (per some tutorials on Youtube). This is my Retrofit interface @Multipart @POST("fm/upload.php") Call<ResponseBody> callServerUrlSubmitNewOrderWithFiles( @Part MultipartBody.Part photo); This is my http call function (imageUri) is the image uri got from image picker: File originalFile = new File(image1Uri.getPath()); RequestBody filePart = RequestBody.create( MediaType.parse(getContentResolver().getType(image1Uri)), originalFile ); //wrapping the file MultipartBody.Part file = MultipartBody.Part.createFormData("photo", originalFile.getName(), filePart); //create retro instance Retrofit.Builder builder = new Retrofit.Builder() .baseUrl("https://mywebsite.net/") .addConverterFactory(GsonConverterFactory.create()); Retrofit retrofit = builder.build(); //get client & call object for the request RetroFit2Calls client = retrofit.create(RetroFit2Calls.class); //finally, execute the request Call<ResponseBody> call = client.callServerUrlSubmitNewOrderWithFiles(file); call.enqueue(new Callback<ResponseBody>() { @Override public void onResponse(Call<ResponseBody> call, Response<ResponseBody> response) { Log.e(TAG, "onResponse: Uploaded"+ response.message() ); } @Override public void onFailure(Call<ResponseBody> call, Throwable t) { Log.e(TAG, "onFailure: ",t ); } }); I am getting the following error (onFailure): E/SubmitRequest: onFailure: okhttp3.internal.http2.ConnectionShutdownException at okhttp3.internal.http2.Http2Connection.newStream(Http2Connection.java:248) at okhttp3.internal.http2.Http2Connection.newStream(Http2Connection.java:231) at okhttp3.internal.http2.Http2Codec.writeRequestHeaders(Http2Codec.java:117) at okhttp3.internal.http.CallServerInterceptor.intercept(CallServerInterceptor.java:50) at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.java:147) ... Here is the Manifest permissions: <uses-permission android:name="android.permission.INTERNET"></uses-permission> <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE"></uses-permission> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"></uses-permission> A: Found the solution here: https://stackoverflow.com/a/43714729/5157228 I was missing a permission request.
Mid
[ 0.6260869565217391, 36, 21.5 ]
Q: Can EPD Python and MacPorts Python coexist on OS X (matplotlib)? I've been using MacPorts Python 2.6 on OS X 10.6. I am considering also installing the Enthought Python Distribution (EPD) on the same machine because it comes preconfigured with matplotlib and other nice data analysis and visualization packages. Can the two Python distributions co-exist peacefully on the same machine? What potential problems will I have to look out for (e.g., environment variables)? I know that building matplotlib through MacPorts is an option, but the process is lengthy (on the order of a full day) and there are open questions about compiling some dependencies on 64bit Intel. I would like to know about the tradeoffs before committing to one of the two approaches. A: I'm not an OSX user, so I can't say for certain, but you should be fine. EPD bundles its own python interpreter and all required libraries. The installer basically just extracts a tarball into a stand-alone folder. The linux installer doesn't modify any environment variables (not even $PATH), so I assume the mac installer is similar. (Because of this, you'll probably want to manually set up aliases to the EPD python/ipython/etc binaries so you can more easily call them without changing your $PATH.) EPD really should be completely stand-alone, as far as I know. It should be safe to install along-side anything else.
High
[ 0.688073394495412, 28.125, 12.75 ]
Further evaluation of immunocytochemical staining in the diagnosis of early myocardial ischaemic/hypoxic damage. The pattern of immunocytochemical staining with antibodies to caeruloplasmin, myosin, myoglobin and C-reactive protein seen in myocardium taken from deaths with macroscopic evidence of myocardial infarction and/or significant coronary artery atherosclerosis and from deaths with neither of these lesions has been correlated with H&E, PTAH and HBFP staining of myocardium and circumstances of each death indicative of antemortem hypoxia and/or ischaemia. Loss of staining with these antibodies correlated well with fuchsinorrhagia and both techniques are more sensitive than H&E and PTAH staining in the detection of early ischaemic/hypoxic damage to myocardium. However, their sensitivity is such that they appear to detect agonal changes and, therefore, cannot be used for specific diagnosis of early myocardial infarction.
Mid
[ 0.6501305483028721, 31.125, 16.75 ]
<div class="profile_sidebar"> <ul class="profile_nav" id="summaries_nav"> <li class="" id="AboutMe"> <%= link_to "<span>About Me</span>".html_safe, user_profile_path(:login => @user.login), :class => params[:action] == "profile" ? "arrow_button active" : "arrow_button" %></li> <% if @user.can_view(:my_tracked_items, current_user) %> <li class="" style="" id="ItemsTracked"> <%= link_to "<span>Tracked Items</span>".html_safe, {:controller => 'profile', :action => 'items_tracked', :login => @user.login}, :class => ["items_tracked", "bills", "person", "committees", "issues"].include?(controller.action_name) ? "arrow_button active" : "arrow_button" %> </li> <% end %> <% if @user.can_view(:my_actions, current_user) %> <li class="" id="Actions"> <%= link_to "<span>Actions</span>".html_safe, {:controller => 'profile', :action => 'actions', :login => @user.login}, :class => params[:action] == "actions" ? "arrow_button active" : "arrow_button" %></li> <% end %> <% if @user.can_view(:my_friends, current_user) %> <li class="" id="Friends"> <%= link_to "<span>Friends</span>".html_safe, friends_path(@user.login), :class => params[:controller] == "friends" ? "arrow_button active" : "arrow_button" %></li> <% end %> <% if @user.can_view(:my_political_notebook, current_user) %> <li class="" id="Notebook"> <%= link_to "<span>My Political Notebook</span>".html_safe, political_notebook_path(@user.login), :class => controller.controller_name == 'political_notebooks' ? "arrow_button active" : "arrow_button" %> </li> <% end %> <% if @user.can_view(:watchdog, current_user) %> <li class="" id="Watchdog"> <%= link_to "<span>Watchdog</span>".html_safe, user_watchdog_path(@user.login), :class => controller.action_name == "watchdog" ? "arrow_button active" : "arrow_button" %> </li> <% end %> </ul> <% if @show_email_alerts %> <div id="alerts"> <h3>Your Active Email Alerts</h3> <% if @user.user_mailing_list.mailing_list_items.count == 0 %> <p style="margin-bottom:10px;">You have not yet set up any email alerts. In order to receive email updates, go to a bill page and select "get email alerts" from the right-hand sidebar.</p> <p>Questions? <%= mail_to "[email protected]", "Email us", :encode => :javascript %>.</p> <% end %> <% if @user.user_mailing_list.mailing_list_items.bills.count > 0 %> Bill Alerts <% @user.user_mailing_list.mailing_list_items.bills.each do |b| %> <p style="font-size:10px;"><span style="float:right;"><%= link_to "stop", b, :method => :delete %></span> <%= link_to truncate(b.mailable.title_full_common, :length => 40), bill_path(b.mailable.ident) %></p> <% end %> <% end %> <% if @user.user_mailing_list.mailing_list_items.people.count > 0 %> Legislator Alerts <% @user.user_mailing_list.mailing_list_items.people.each do |p| %> <p style="font-size:10px;"><span style="float:right;"><%= link_to "stop", p, :method => :delete %></span> <%= link_to truncate(p.mailable.title_full_name, :length => 40), bill_path(p.mailable.ident) %></p> <% end %> <% end %> </div> <% end %> <% if controller.action_name == "watchdog" %> <% if @user.can_view(:watchdog, current_user) %> <div id="alerts"> <h3 class="dark">My Friends</h3> My OpenCongress Friends: <%= link_to "#{@user.friends.count}", friends_path(@user.login) %><br/> Friends in my State: <%= link_to "#{@user.friends_in_state.length}", friends_path(@user.login) %></br> <h3 class="dark">MyPN</h3> My Political Notebook items -- my shared links, videos, and micro-blog for watchdogging: <%= link_to @user.notebook_items.count, political_notebook_path(@user.login) %><br/> All users' Political Notebook items tagged with my district (<%= @user.my_district.first %>): <%= NotebookItem.tagged_with("#{@user.my_district.first}", :on => :tags).length %><br/> <h3 class="dark">About Me</h3> <ul> <li><%= link_to "My contact info", user_profile_path(@user.login) %></li> <li>My RSS feeds: <ul> <li><%= link_to "Tracked Items", :controller=>"user_feeds", :action=>"tracked_items", :login => @user.login, :key => (logged_in? ? current_user.feed_key : nil) %></li> <li><%= link_to "Actions", :controller=>"user_feeds", :action=>"actions", :login => @user.login, :key => (logged_in? ? current_user.feed_key : nil) %></li> <li><%= link_to "My Political Notebook", political_notebook_path(@user.login) + "/feed" %></li> </ul> </li> </ul> </div> <% end %> <% end %> </div>
Mid
[ 0.5386266094420601, 31.375, 26.875 ]
package cc.mallet.pipe; import java.util.*; import java.io.*; import cc.mallet.util.*; import cc.mallet.types.*; import java.util.regex.*; /** This pipe changes text to lowercase, removes common XML entities (quot, apos, lt, gt), and replaces all punctuation except the - character with whitespace. It then breaks up tokens on whitespace and applies n-gram token replacements and deletions. Replacements are applied in the order they are specified, first by file and then within files. */ public class NGramPreprocessor extends Pipe implements Serializable { public ArrayList<ReplacementSet> replacementSets; public NGramPreprocessor () { replacementSets = new ArrayList<ReplacementSet>(); } public int loadReplacements(String filename) throws IOException { BufferedReader in = new BufferedReader(new FileReader(filename)); ReplacementSet set = new ReplacementSet(); int totalReplacements = 0; String line; while ((line = in.readLine()) != null) { set.addReplacement(new Replacement(line)); totalReplacements++; } in.close(); replacementSets.add(set); return totalReplacements; } public int loadDeletions(String filename) throws IOException { BufferedReader in = new BufferedReader(new FileReader(filename)); ReplacementSet set = new ReplacementSet(); int totalReplacements = 0; String line; while ((line = in.readLine()) != null) { set.addReplacement(new Replacement(line, "")); totalReplacements++; } in.close(); replacementSets.add(set); return totalReplacements; } public Instance pipe (Instance instance) { String input = (String) instance.getData(); input = input.toLowerCase(); //System.out.println(input); // Remove XML entities input = input.replaceAll("&apos;", "'"); input = input.replaceAll("&quot;", "\""); input = input.replaceAll("&gt;", "<"); input = input.replaceAll("&lt;", ">"); // Remove all non letter/number characters except dash and apostrophe input = input.replaceAll("[^\\p{L}\\p{N}\\-\\']", " "); // Reduce all blocks of whitespace to a single space input = input.replaceAll("\\s+", " "); for (ReplacementSet set: replacementSets) { input = set.applyReplacements(input); } //System.out.println(input); instance.setData(input); return instance; } private static final long serialVersionUID = 1; private static final int CURRENT_SERIAL_VERSION = 1; private void writeObject(ObjectOutputStream out) throws IOException { out.writeInt (CURRENT_SERIAL_VERSION); out.writeObject(replacementSets); } private void readObject (ObjectInputStream in) throws IOException, ClassNotFoundException { int version = in.readInt (); replacementSets = (ArrayList<ReplacementSet>) in.readObject(); } public class ReplacementSet implements Serializable { HashMap<String, ArrayList<Replacement>> replacementIndex; public ReplacementSet() { replacementIndex = new HashMap<String, ArrayList<Replacement>>(); } public void addReplacement(Replacement replacement) { String key = replacement.getFirstToken(); if (! replacementIndex.containsKey(key)) { replacementIndex.put(key, new ArrayList<Replacement>()); } replacementIndex.get(key).add(replacement); } public String applyReplacements(String input) { String[] tokens = input.split(" "); StringBuilder output = new StringBuilder(); int position = 0; while (position < tokens.length) { String token = tokens[position]; int initialPosition = position; if (replacementIndex.containsKey(token)) { for (Replacement replacement: replacementIndex.get(token)) { position = replacement.apply(tokens, position, output); if (position > initialPosition) { break; } } } if (position == initialPosition) { // No replacements were made, so nothing // has been output. output.append(token + " "); position ++; } } return output.toString(); } private static final long serialVersionUID = 1; private static final int CURRENT_SERIAL_VERSION = 1; private void writeObject(ObjectOutputStream out) throws IOException { out.writeInt (CURRENT_SERIAL_VERSION); out.writeObject(replacementIndex); } private void readObject (ObjectInputStream in) throws IOException, ClassNotFoundException { int version = in.readInt (); replacementIndex = (HashMap<String, ArrayList<Replacement>>) in.readObject(); } } }
Mid
[ 0.5869074492099321, 32.5, 22.875 ]
An off beat look at Indonesian and South East Asian football from the terraces or the pub Enter your search termsSubmit search form Web jakartacasual.blogspot.com Monday, September 18, 2006 Shit on United Murdered them we did, they were lucky it was just the one. What was good to see was they did play football throughout the game, not try and kick us off the park like in previous years. Adebayor had me swearing one minute and doing hand stands another, it was a priceless performance and a boost for the ego. We need to do the same though against teams who shut up shop, the Boro's, Villa's etc. Bolton away, that type of stuff.Lehmann was immense, Toure should be captain, Cesc was fab. Gallas gives us a new option, someone who uses his head!To think yesterday morning I was mentally preparing an obituary but we are The Arsenal and that, guys, was The Arsenal way..
Low
[ 0.534979423868312, 32.5, 28.25 ]
760 F.2d 272 Youngbloodv.Springfield Police 85-1074 United States Court of Appeals,Eighth Circuit. 2/21/85 1 W.D.Mo. AFFIRMED
Low
[ 0.5082304526748971, 30.875, 29.875 ]
288 F.Supp.2d 1013 (2003) Earle MYERS, Jr., Plaintiff, v. RICHLAND COUNTY, et al., Defendants. Civil No. A3-02-129. United States District Court, D. North Dakota, Southwestern Division. October 23, 2003. *1014 *1015 Patricia R. Monson, Nilles, Hansen & Davies, Ltd., Fargo, ND, for plaintiff. Ronald F. Fischer, Margaret E. Moore Jackson, Pearson Christensen, Grand Forks, ND, for defendant. MEMORANDUM AND ORDER WEBB, District Judge. I. INTRODUCTION The plaintiff, Earle Myers, Jr., brings an action against the defendants claiming breach of contract, defamation, and intentional infliction of emotional distress resulting from an alleged violation of a settlement agreement.[1] The defendants *1016 move to dismiss this federal action because of a lack of subject matter jurisdiction.[2] As articulated below, the defendants' motion to dismiss for lack of subject matter jurisdiction is DENIED (doc. # 14-1), but the defendants' Motion to Strike the plaintiff's prayer relief as it relates to punitive damages is GRANTED (doc. # 14-2). II. FACTS The plaintiff served as the elected Richland County, North Dakota State's Attorney from 1977 to 2003. The plaintiff's primary duty was to prosecute criminal actions on behalf of the County. He also served as legal advisor to the Richland County Board of Commissioners. In May of 2000, Jewel Jones-Van Tassel filed an action against the Richland County Commissioners, among others, for gender discrimination in violation of Title VII of the Civil Rights Act. The plaintiff's deposition was taken because as Richland County's attorney he was familiar with the County's discrimination history and policy. In December of 2000, the parties settled. Jones-Van Tassel obtained $1.2 million, along with letters of apology, and a commitment of non-disparagement. Paragraph 6 of the settlement agreement provided: Defendants agree that they will not retaliate with respect to any employment related matter against any former, present, or prospective City or County employee, or individual whose compensation is paid, in whole or part, by the City or County, who have provided any support to Plaintiff, whether by affidavit, deposition testimony, providing information to Plaintiff, or any other manner of support. In addition, Paragraph 17 provided that "[t]he parties agree that the Federal District Court for the District of North Dakota shall retain jurisdiction of this matter to enforce the terms of this Settlement Agreement and Release." At the end of the Jones-Van Tassel litigation, this express retention of jurisdiction was incorporated into the Court's order adopting the settlement. In November of 2002, the plaintiff initiated a lawsuit against Richland County, those serving on its Board of Commissioners as of that date, as well as those serving on its Board of Commissioners as of January 10, 2001 (hereinafter collectively known as "the defendants"). The plaintiff claims the defendants breached the settlement agreement by retaliating against him and preventing his reelection. He also brings claims for defamation and intentional infliction of emotional distress. III. DISCUSSION The defendants present five contentions in their motion to dismiss: (a) the court lacks subject matter jurisdiction; or (b) if subject matter jurisdiction exists, then the court should decline to exercise it based on 28 U.S.C. § 1367; (c) the plaintiff lacks standing to enforce the settlement agreement; (d) the plaintiff fails to raise a claim upon which relief can be granted; and (e) the plaintiff's claims do not entitle him to *1017 punitive damages or attorney fees. The Court will now address each of these contentions. A. Subject Matter Jurisdiction Federal courts are courts of limited jurisdiction that may hear a case only if the Constitution or a federal statute provides the court with jurisdiction. Kokkonen v. Gaurdian Life Ins. Co. of America, 511 U.S. 375, 377, 114 S.Ct. 1673, 128 L.Ed.2d 391 (1994). Title 28 of the United States Code contains the statutory bases of subject matter jurisdiction. The three types that are most often utilized to provide federal court review are: (1) federal question jurisdiction pursuant to 28 U.S.C. § 1331, (2) diversity jurisdiction pursuant to 28 U.S.C. § 1332, and (3) ancillary, or supplemental, jurisdiction pursuant to 28 U.S.C. § 1367. Jackson v. Delaware River and Bay Authority, 224 F.Supp.2d 834, 841 (D.N.J.2002). Rule 12(h)(3) of the Federal Rules of Civil Procedure provides: "Whenever it appears by the suggestion of the parties or otherwise that the court lacks jurisdiction of the subject matter, the court shall dismiss the action." Because jurisdiction is a threshold issue, the question should be determined at the outset of the action. Osborn v. United States, 918 F.2d 724, 729 (8th Cir.1990). The burden for proving subject matter jurisdiction falls on the plaintiff. Nucor Corp. v. Nebraska Pub. Power Dist., 891 F.2d 1343, 1346 (8th Cir.1989). The parties agree that neither diversity nor federal question jurisdiction exist in this case. The plaintiff, as well as each of the defendants, are citizens of and reside within North Dakota. All of the activities in this case occurred within North Dakota. Additionally, all of the plaintiff's claims are based on North Dakota law. The question then becomes whether the plaintiff's claims fall within the area known as supplemental jurisdiction pursuant to 28 U.S.C. § 1367(a). This subsection provides that: Except as provided in subsections (b) and (c) or as expressly provided by Federal statute, in any civil action which the district courts have original jurisdiction, the district courts shall have supplemental jurisdiction over all other claims that are so related to claims within such original jurisdiction that they form part of the same case or controversy under Article III of the United States Constitution ... (emphasis added) This subsection allows state claims such as the plaintiff's breach of contract claim to ride the back of a federal claim as long as that claim has an independent basis for jurisdiction. In the present case, it is undisputed that an independent basis for jurisdiction, federal question jurisdiction, was present in the Jones-Van Tassel case. With all that said, supplemental, or what is otherwise known as ancillary jurisdiction, has generally been used for two distinct purposes. The first purpose is "to permit disposition by a single court of claims that are, in varying respects and degrees, factually interdependent." Kokkonen, 511 U.S. at 379-80, 114 S.Ct. 1673 The second purpose is "to enable a court to function successfully, that is, to manage its proceedings, vindicate its authority, and effectuate its decrees." Id. Here, the Court is exclusively concerned with the second purpose the ability to vindicate its authority and effectuate its decrees. In Jones-Van Tassel, this Court expressly reserved jurisdiction to effectuate its decree. See Order, Jones-Van Tassel v. Richland County, (D.N.D Jan. 10, 2001), Case No. A3-99-60 (doc. # 138). It is well-settled that supplemental jurisdiction exists when a Court expressly retains jurisdiction to enforce the settlement agreement. Kokkonen, 511 U.S. at 381, *1018 114 S.Ct. 1673; Miener v. Missouri Dept. of Mental Health, 62 F.3d 1126, 1127-28 (8th Cir.1995)(dismissing the case because the settlement agreement did not designate any court as having jurisdiction over future enforcement proceedings); Montgomery v. Aetna Plywood, Inc., 231 F.3d 399, 411 (7th Cir.2000). Therefore, this Court has jurisdiction because the plaintiff's claims stem from breach of the settlement agreement, which the Court reserved jurisdiction to enforce.[3] B. Supplemental Jurisdiction Under 28 U.S.C. § 1367(c) Once subject matter jurisdiction has been established, a court may decide whether or not to exercise this jurisdiction. This is a purely discretionary decision. City of Chicago v. International College of Surgeons, 522 U.S. 156, 173, 118 S.Ct. 523, 139 L.Ed.2d 525 (1997). The relevant factors for such a decision are found in 28 U.S.C. § 1367(c). This section allows district courts to decline to exercise jurisdiction when: 1) the claim raises a novel or complex issue of State law, 2) the claim substantially predominates over the claim or claims over which the district court has original jurisdiction, 3) the district court has dismissed all claims over which it has original jurisdiction, or 4) in exceptional circumstances, there are other compelling reasons for declining jurisdiction. The current action involves run of the mill claims such as breach of contract, defamation, and intentional infliction of emotional distress. These claims are the direct result of the previous federal claim. Therefore, state claims cannot be said to predominate. Without the former federal claim, the state claims would not exist. This Court clearly and expressly retained jurisdiction over claims resulting from any subsequent breach of the settlement agreement, and this Court is in the best position to enforce its own decrees. Furthermore, this claim is not exceptional, it is a breach of contract suit and nothing more. The mere fact that the plaintiff was an elected official does not make this case exceptional. Therefore, after considering all of the factors under 28 U.S.C. § 1367(c), the Court declines the defendant's request to abstain and it will exercise supplemental jurisdiction over the present case. C. Standing to Enforce the Settlement Agreement In general, strangers to a settlement agreement lack standing to enforce its terms. Pure Country, Inc. v. Sigma Chi Fraternity, 312 F.3d 952, 958 (8th Cir.2002). However, a third party may enforce a settlement agreement when he shows that "the parties to the [settlement agreement] not only intended to confer a benefit upon that third party, but also intended to give that party a legally binding and enforceable right to that benefit." Id. If a third party is determined to be a beneficiary of the agreement, he or she can bring a separate suit to enforce the terms of the agreement. Beckett v. Air Line Pilots Ass'n, 995 F.2d 280, 286 (D.C.Cir.1993). State law is used to determine standing on state-law claims brought before a district court through the exercise of supplemental jurisdiction. See Westborourgh Mall, Inc. v. City of Cape Girardeau, *1019 693 F.2d 733, 747-48 (8th Cir.1982). North Dakota law provides that "a contract made expressly for the benefit of a third person may be enforced by him at any time before the parties thereto rescind it." N.D. Cent.Code § 9-02-04. The North Dakota Supreme Court has construed this to mean that a party only incidentally benefitted by performance of a contract is not entitled to maintain an action to enforce it. Hellman v. Thiele, 413 N.W.2d 321, 325 (N.D.1987). The defendants contend that the plaintiff is merely an incidental beneficiary to the settlement agreement. The Court, however, disagrees with the defendants' characterization of the plaintiff's status. Section 6 of the agreement states that the "[d]efendants will not retaliate with respect to any employment related matter against any former, present or prospective City or County employee ..." (emphasis added). This language implies that this class of protected individuals can continue to grow in direct relation to the defendants' conduct. Here, the plaintiff was a present employee who was compensated, in whole or in part, by the county. The plaintiff, and the others like him, must be intended beneficiaries of this clause because Jones-Van Tassel already received her $1.2 million, and is unlikely to sue to make sure that someone who helped her is not retaliated against. The County likewise will not sue to enforce this clause. Therefore, the plaintiff, and others similarly situated, must be intended as beneficiaries with standing; otherwise, the nonretaliation clause is worthless and unenforceable. Finally, the defendants contend that even if the Court is convinced that paragraph 6 of the agreement confers some right of enforcement on third parties, such interpretation must be rejected. In United States v. Knote, 29 F.3d 1297, 1302 (8th Cir.1994), the Eighth Circuit noted that a district court can modify a consent decree (settlement agreement) to avoid turning it into an instrument of wrong. The defendants claim that allowing a suit would be unfair because this type of suit was unforeseeable since the plaintiff was an elected official, and the plaintiff had the duty to represent the County in all legal matters. N.D. Cent.Code § 11-16-01(5). The defendants admit that outside counsel was also representing the County in this litigation. However, the plaintiff, as state's attorney, retained any final decisions over settlements. 2001 N.D. Op. Atty. Gen. No. L-02. Therefore, the defendants assert, the plaintiff was legally responsible for any decisions made by his subordinates and should not be allowed to sue a group he was in charge of representing and advising. The Court, once again, disagrees with the defendants. "Modification of a [settlement agreement] involves the granting of extraordinary relief." Monsanto Co. v. Ruckelshaus, 753 F.2d 649, 653 (8th Cir. 1985). "The party seeking modification bears the heavy burden of demonstrating that new and unforeseen conditions have produced such extreme and unexpected hardship that the [agreement] is oppressive." United States v. City of Fort Smith, 760 F.2d 231, 233 (8th Cir.1985). Nothing in this case merits granting the defendants extraordinary relief. The plaintiff's suit is not enough to make the settlement agreement oppressive. Also, if the Court assumes that the plaintiff's allegations are true, which it must for purposes of this motion to dismiss, changing the settlement agreement would make it an instrument of wrong against him, allowing contractually prohibited retaliation against an intended beneficiary of a contract. *1020 D. Failure to State a Claim In deciding a motion to dismiss for failure to state a claim upon which relief can be granted, the court must accept the material facts alleged in the complaint as true. Cohen v. Koenig, 25 F.3d 1168, 1172 (2d Cir.1994). Dismissal is appropriate where it appears beyond a doubt that plaintiff can prove no set of facts that would entitle him to relief. Conley v. Gibson, 355 U.S. 41, 45-46, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957). The defendants claim that the plaintiff has failed to allege any facts that would entitle him to relief for breach of contract. Section 6 of the agreement states that the "[d]efendants will not retaliate with respect to any employment related matter against any former, present or prospective City or County employee" (emphasis added). The defendants argue that the plaintiff, as an elected official, was not an employee of Richland County. In support of this proposition, the defendants cite state and federal anti-discrimination laws, including those prohibiting retaliation. See 42 U.S.C. § 2000e(f); N.D. Cent.Code § 14-02.4-02(6)(declaring "the term `employee' shall not include any person elected to public office in any state or political subdivision of any state by the qualified voters thereof"). The defendants contend that the clear language of Section 6 states "with respect to any employment related matter," and the plaintiff cannot be an employee of the county because he is an elected official, thus there is no breach of contract. The plaintiff, on the other hand, argues that the defendants' use of the term "employee" is entirely inconsistent with the normal usage of the word. Most people assume that they are an employee of the place that pays them. The plaintiff contends that the contract is at least ambiguous as to the meaning of the term "employee." "When ambiguities arise it is a factual determination that precludes dismissal on a motion for failure to state a claim." Martin Marietta Corp. v. Int'l Tel. Satellite Org., 991 F.2d 94 (4th Cir. 1992). To resolve ambiguity in consent decree (settlement agreement) enforcement actions, the explicit language of the decree (agreement) is given great weight, and deference is given to the plain meaning and normal usage of the words contained in it. Berger v. Heckler, 771 F.2d 1556, 1568 (2d Cir.1985). Courts may also use various aids to construction such as "the circumstances surrounding the formation of the [settlement agreement], any technical meaning words used may have had to the parties, and any other documents expressly incorporated into the [agreement]." United States v. ITT Continental Baking Co., 420 U.S. 223, 238, 95 S.Ct. 926, 43 L.Ed.2d 148 (1975). The Court agrees that the meaning of "employee" is ambiguous. The technical definition of "employee" may support the defendants' position, but this a contract action, not a Title VII action. The Court must also consider the plain meaning of the term and the circumstances surrounding the formation of the agreement. The Court agrees that many people assume that they are an employee of the place that pays them. Furthermore, the circumstances surrounding the formation of the agreement, especially the need to protect those who assisted Jones-Van Tassel, may have necessitated a more expansive meaning to the term "employee" than the defendants suggest. The Court, therefore, concludes that a question of fact remains as to the meaning of the phrase "any employment-related matter." Consequently, a 12(b)(6) motion to dismiss is inappropriate as the plaintiff has stated a claim for which relief may be granted. *1021 E. Punitive Damages and Attorney's Fees Lastly, the defendants contend that the plaintiff's claim for relief erroneously requests punitive (exemplary) damages and attorney's fees. As to exemplary damages, the defendants are correct. Exemplary damages statutes provide a substantive right and therefore state law applies. Nereson v. Zurich Ins. Co., 1992 WL 212233, 1992 U.S. Dist. LEXIS 12955 (D.N.D.). Per North Dakota law, a complaint may not seek exemplary damages. N.D. Cent.Code & sect; 32-03.2-11(1). The appropriate procedure is to make a motion to amend the pleadings to claim exemplary damages. Id. Therefore, the Court must strike the plaintiff's prayer for relief as it relates to exemplary damages. By this ruling, the Court does prejudge the merits of a motion to amend the pleadings and the plaintiff is free to seek leave to amend. The Court finds the defendants' request to strike attorney's fees from the plaintiff's prayer for relief is premature. The Court declines to rule on this issue at this time. IV. CONCLUSION Defendants' Motion to Dismiss is DENIED (doc. # 14-1). Defendants' Motion to Strike the plaintiff's prayer relief as it relates to punitive damages is GRANTED (doc. # 14-2). IT IS SO ORDERED. NOTES [1] The parties occasionally label the settlement agreement as a consent decree and occasionally cite cases discussing consent decrees. A consent decree is a court decree that all parties agree to. Black's Law Dictionary 419 (7th ed.1999). The Court did not adopt the settlement agreement, but merely retained jurisdiction to enforce the agreement. Kokkonen v. Guardian Life Ins. Co. of America, 511 U.S. 375, 380, 114 S.Ct. 1673, 128 L.Ed.2d 391 (1994) ("[a] judge's mere awareness and approval of the terms of the settlement agreement do not suffice to make them part of his order."). In any event, the difference between a consent decree and settlement agreement in the present case is negligible and the Court, therefore, cites consent decree cases as if they are discussing settlement agreements. [2] The Court held oral arguments on the motion to dismiss on June 17, 2003, at which time the Court posed three additional issues for supplemental briefing. The answers to issues raised in the supplemental briefs satisfy the Court's curiosity, but as no motion is filed with respect to those issues, the Court declines to rule at this time. Therefore, this Memorandum and Order addresses only the issues originally raised by the defendants. [3] Furthermore, as an intended beneficiary of the settlement agreement, the plaintiff is entitled to federal court admission by virtue of Rule 71 of the Federal Rules of Civil Procedure, which confers jurisdiction upon this Court to enforce obedience to its orders. Floyd v. Ortiz, 300 F.3d 1223, 1226 (10th Cir.2002).
Mid
[ 0.568965517241379, 33, 25 ]
Recent evidence has strongly suggested that the adult body weight of humans is greatly influenced by heredity (Bouchard et. al., 1985; 1986; Bray; 1981; Stunkard et. al., 1986a; 1986b). Since body weight is principally produced and maintained by eating, the genes that influence body weight probably act by affecting food intake, specifically, the frequency, composition, or size of meals. There have been, however, no systematic studies of hereditary influences on the meal patterns of humans. The proposed research will investigate that aspect of eating behavior is genetically determined by studying and comparing the meal patterns of monozygotic (MZ) and dizygotic (DZ) twins. MZ and DZ twins will be asked to enter into a diary everything they either eat or drink and the time of the meals throughout a consecutive seven day period. The records will then be entered into a computer in coded form for analysis of the nutrient composition of the recorded meals. The similarities and differences between overall nutrient intakes and the microstructure of eating including the meal compositions, the intervals between meals, the meal pattern correlations, and the circadian distribution of eating will be determined separately for the MZ and DZ twins. The heritabilities of these factors will then be estimated based upon the difference between the intra-twin correlations for the MZ and DZ pairs. The proposed study should provide insights into how heredity influences the meal patterns of humans and in turn encodes and maintains body weight. This may suggest the nature of the physiological processes that are genetically influenced and suggest methods of intervention to prevent or treat abnormal body weight or eating behavior.
High
[ 0.6778846153846151, 35.25, 16.75 ]
// RUN: %clang -### -S -fvisibility=hidden -fvisibility=default %s 2> %t.log // RUN: FileCheck -check-prefix=CHECK-1 %s < %t.log // CHECK-NOT: "-ftype-visibility" // CHECK-1: "-fvisibility" "default" // CHECK-NOT: "-ftype-visibility" // RUN: %clang -### -S -fvisibility=default -fvisibility=hidden %s 2> %t.log // RUN: FileCheck -check-prefix=CHECK-2 %s < %t.log // CHECK-NOT: "-ftype-visibility" // CHECK-2: "-fvisibility" "hidden" // CHECK-NOT: "-ftype-visibility" // RUN: %clang -### -S -fvisibility-ms-compat -fvisibility=hidden %s 2> %t.log // RUN: FileCheck -check-prefix=CHECK-3 %s < %t.log // CHECK-NOT: "-ftype-visibility" // CHECK-3: "-fvisibility" "hidden" // CHECK-NOT: "-ftype-visibility" // RUN: %clang -### -S -fvisibility-ms-compat -fvisibility=default %s 2> %t.log // RUN: FileCheck -check-prefix=CHECK-4 %s < %t.log // CHECK-NOT: "-ftype-visibility" // CHECK-4: "-fvisibility" "default" // CHECK-NOT: "-ftype-visibility" // RUN: %clang -### -S -fvisibility=hidden -fvisibility-ms-compat %s 2> %t.log // RUN: FileCheck -check-prefix=CHECK-5 %s < %t.log // CHECK-5: "-fvisibility" "hidden" // CHECK-5: "-ftype-visibility" "default" // RUN: %clang -### -S -fvisibility=default -fvisibility-ms-compat %s 2> %t.log // RUN: FileCheck -check-prefix=CHECK-6 %s < %t.log // CHECK-6: "-fvisibility" "hidden" // CHECK-6: "-ftype-visibility" "default"
Mid
[ 0.617234468937875, 38.5, 23.875 ]
// Distributed under the terms of the MIT license // Test case submitted to project by https://github.com/practicalswift (practicalswift) // Test case found by fuzzing extension NSData { class A { protocol C { enum A { func g { for in a { class case ,
Low
[ 0.38313253012048104, 19.875, 32 ]
Q: Why are parallel lines a problem in Euclidean Geometry I am reading the book Multiple View Geometry in Computer Vision, 2e, 2003 by Hartley and Zisserman. In the introductory 1st chapter, it states "Euclidean geometry is troublesome" and goes on to explain that "two lines almost always meet in a point, but there are pairs of lines that do not do so - those that we call parallel." Why is this a sticking point? The text doesn't really explain it (except to say that there is a "difficulty with infinity"), and I don't have the necessary mathematical background to understand it. A: It would have been nice if there was an intersection point of any two lines. In that case, it wouldn't have been necessary to say things like 'let X be the point of intersection of lines $k$ and $l$ (or $X=k\cap l$), which exists because $k$ and $l$ are not parallel', because the condition is then always true. There are other geometries for which every pair of lines (or the equivalent objects in those geometries) always have exactly one point of intersection, like the projective geometry.
Mid
[ 0.591022443890274, 29.625, 20.5 ]
While Final Fantasy XV is Tabata's biggest project to date, he's been at Square Enix for over a decade, also serving as the director on Final Fantasy Type-0 and Crisis Core: Final Fantasy VII. However, the Ardyn DLC is due to release in March 2019. Akio Ofuji, the global brand director for Square Enix's Final Fantasy XV game, also announced in the same video that Square Enix has cancelled the development on the planned "Episode Aranea", "Episode Lunafreya", and "Episode Noctis" DLC. However, no further details were divulged on what this new title is. "A new company called Luminous Productions was formed, centered around the staff who had previously been developing the main game as part of BD2, and they have continued to work on the project since", he said during the stream. Only hours prior to the announcement Square Enix Holdings reported an "extraordinary loss" in finances through Luminous Productions - amounting to 3,733 million yen. First ever Muslim women elected to US House of Representatives A pair of districts in the Midwest will add Muslim women to the ranks of the US Congress for the first time, CNN has projected. House races. "But really I am not going from a first to another first", Omar said in an interview with The Associated Press . What do you think about Tabata's resignation and Square Enix's announcements on Final Fantasy XV? At this point, it's unknown if these financial problems contributed to Tabata leaving Square Enix, but the timing is certainly coincidental. "As production of Episode Ardyn continues and Luminous Productions works on new projects, I felt that it was time for me to hand over the torch to the next-generation group of talented and trustworthy colleagues and believe that they will create something fantastic", Tabata added. Featuring side quests, boss battles, mini-games and more, World of Final Fantasy Maxima also includes the option to carry your progress across to the challenging new Nightmare difficulty mode upon finishing the game, starting with fresh save data for a second story playthrough. By failing to pick up the two seats needed, it's unclear whether the Democratic caucus's leadership ranks will change at all. Democrats won seats stretching from suburban Washington , New York and Philadelphia to outside Miami, Chicago and Denver. He was quick to distance himself from losing GOP House members who had been critical of his heated rhetoric, citing Florida Rep. Trump boasted a growing economy but campaigned aggressively in the closing days on a hardline anti-immigration message. The severity depends in part on whether the ribs are cracked or broken all the way through, and how many are broken. Ginsburg was admitted to the hospital for treatment and observation after tests showed she broke three ribs. The 2018 edition shows that ozone levels in sections of the stratosphere have been recovering at rates of 1-3 percent since 2000. Montzka said if the source of the new emissions could be identified and contained, the damage to the ozone should be minor. She will temporarily step down as chair of Tesla's audit committee until she leaves Telstra, the company said. Tesla has named an Australian executive as its new chairman after Elon Musk was forced to give up the role. He rushed for 1,291 yards with nine touchdowns over 15 games in 2017 with the Steelers, his fifth year in Pittsburgh. Le'Veon Bell has still not reported to the Steelers to sign his franchise tender for the 2018 season. The president then tried to move onto another reporter as Acosta began to ask him about the Russian Federation investigation. The reporter challenged Mr Trump on his characterisation of the South American migrant caravan as an "invasion". And his actions a day after the match express why he is considered the greatest player of all time by many football fans. Playing without talisman Lionel Messi , Barca took the lead in the second half through substitute Malcom . Well, as we now know, Prince Charles did the honours but it was actually Harry who asked his father to step in. She said: "He wants things done by yesterday as I think everybody who works for him will tell you". Comments Latest news Dutchman in legal bid to cut 20 years off his age However, he explained that allowing people to change their birth date would create problems from a legal point of view. A Dutch "positivity trainer" has launched a legal battle to change his age and boost his dating prospects. Marseille building collapse: Fourth body found in ruins One of them had been condemned and, with its windows boarded up, was well-secured and in theory unoccupied, officials said . Google Maps images taken in recent months showed the two collapsed buildings had large visible cracks in their facades. FAA issues 737 MAX emergency AD FAA and the European Aviation Safety Agency often follow such actions by mandating that carriers follow the bulletins. Some modern aircraft have systems created to correct the posture of the wings automatically to keep flying safely. Have Liverpool lost their bite in midfield at the moment? They conceded a goal from a corner and another from a loss of possession and quick counter-attack against Red Star . And it has ultimately left Liverpool with real work to do in their final games away to PSG and at home to Napoli. Breaking Bad Spin-off Movie Will Start Shooting This Month This will be the second Breaking Bad spinoff - the first, of course, Better Call Saul , which recently wrapped a fourth season. Production is set to being in Albuquerque in mid November and continue until early February, the Journal says. Dez Bryant Caught Ripping Saints Fan in Old Tweet Similarly, the team understood that a solid defense could key on Thomas in the postseason and leave them fighting with one hand. New Orleans (7-1), which has won seven straight and leads the NFC South Division, didn't necessarily need another receiver.
Low
[ 0.5166297117516631, 29.125, 27.25 ]
Hurricane Harvey Aftermath: Tracking Its Impact on Houston and Beyond As the Houston area begins the slow process of recovery following the catastrophic damage caused by Hurricane Harvey, and the southeastern U.S. braces for Irma, here is a look at some of the most immediate effects of the storm and their repercussions for the region and beyond. Business Response DRI President and CEO Chloe Demrovsky was interviewed by the Associated Press on how businesses recover in the wake of a Katrina or Harvey level event. She pointed out that companies whose workers can telecommute have a better chance of survival than a manufacturing company. “For other types of businesses, it’s going to be a lot harder,” she said. “They have to ask, how long can we keep our doors shuttered?” About 99% of companies in the Houston area are considered small businesses, according to U.S. government data. Together they make up a GDP of more than $315 billion for the region, and don’t have the resources of the far larger oil and medical industries. Many are hoping to rebuild, with disaster assistance from the U.S. Small Business administration. Flood insurance is less likely, as often small business owners go without it unless they are required to buy it. Transportation Even those businesses that haven’t been physically damage need employees, and transportation is another massive part of Harvey’s damage. Flooding destroyed as many as a million cars in the Houston metro area – which is a car-dependent city where 94.4% of households have at least one car. The total cost of the losses may be somewhere between $2.7 and $4.9 billion. While some automakers – including Ford and Volvo – are offering discounts on new cars to Harvey victims, 15% of Texas vehicle owners don’t have any kind of car insurance, meaning an estimate 100,000 may have to pay out of pocket for a replacement, when they’ve already lost their homes and belongings. Real Estate As much as 27% of commercial real estate may have been impacted by the storm, including 73 million square feet of retail space, 60 million square feet of office space, and 11 hospitals. In fact, the huge amount of real estate development in Houston over the years may have worsened the storms damage, leaving fewer areas for floodwaters to recede to. As a result, nearly four millions of barrels per day were offline, and without enough products to supply, the major pipeline from the Gulf coast to the east coast has been shut down. This could lead to a risk of shortages wherever the U.S. exports oil products. Global gas and diesel process have already jumped around the world. While there doesn’t appear to have been serious damage to the refineries, returning to full strength will be a careful process, if flooding has caused more sustainable damage to pumps or cokers once they’re brought back online. During that time, as current stock dwindles, the risk of shortages will rise.
Mid
[ 0.650485436893203, 33.5, 18 ]
This paper describes a versatile method for generating single cell arrays on a glass substrate, which could be applicable to any arbitrary cell types, by a combination of surface functionalization, biotinylation of cells, and microcontact printing (μCP).
High
[ 0.7414634146341461, 28.5, 9.9375 ]
Data Visualization Sketches for Google Search Results Topic Grid/plane, a studio centered in Portland Orgeon, collaborated with Instrument, to visualize media buzz across various social media outlets. The client? Google. Working in tandem with Google Analytics, the Flash-based, interactive tools allow users to explore relationships and see the effects of blogs, as well as mainstream and social media over time. While this particular project wasn’t really focused on Google search results, can you imagine how cool it would be if it were? One day we will get visualization in lieu of listed results. Trust me. We will also have power laces, self-drying jackets, and flying Deloreans. I’ve seen it with my own eyes. I’m curious, after looking through Google’s public API’s and not finding much, is there an API where we can query search/trend data? The Search API appears to be for adding search functionality, trends appears (I may be getting old websites) to be delivering results in CSV. Unfortunately no, to many people, including people offering products that are in competition with Google products, would stand to benefit greatly by being able to automatically extract large amounts of data from Google, their are plenty of great ways to do it manually though!
Low
[ 0.5163934426229501, 31.5, 29.5 ]
Talou Sen Chey District Talou Sen Chey District () is a district in Pursat Province, Cambodia. It was established in January 8, 2019 according to sub-decree no. 07 អនក្រ.បក by taking Talou Commune from Bakan District, and Phteah Rung Commune from Phnum Kravanh District. Two villages – Koh Svay and Koh Wat – of Khnar Totueng Commune, Bakan District became part of Talou commune. The district capital is at Phteah Rung Commune. Location Bakan shares a border with Battambang Province to the north and the district of Veal Veang to the northwest. To the south and west is Phnum Kravanh. Talou Sen Chey shares its eastern border with Bakan district. Administration The following table shows the villages of Talou Sen Chey district by commune. References Category:Districts of Cambodia Category:Districts of Pursat Province
Mid
[ 0.620087336244541, 35.5, 21.75 ]
An end to exclusivity arrangements between "Shufersal" and shopping centers and commercial centers In addition, Shufersal will pay approx. 9 million NIS for violations of the "food law" In the context of an agreement on an agreed order with Shufersal, Shufersal will cancel all the exclusivity arrangements in real estate the company is a party to. In addition, Shufersal will pay an administrative fine of 8.9 million NIS for violations of the Law for Encouragement of Competitiveness in the Food Sector Today, (30.7.2018) the Director-General of the Antitrust Authority reached agreement on an agreed order with "Shufersal" to cancel all exclusivity arrangements in real estate that Shufersal is a party to. This action is expected to ease the entry of competitors in the food market (including bakeries, fruit and vegetable stores, and delicatessens) to shopping malls and commercial centers. Shufersal will further pay an administrative fine of about 9 million shekel for violating the "Food Law". As part of the agreed order, Shufersal committed to cancelling about 185 exclusivity arrangements the company had entered into in rented real estate where branches of the chain are location; and to notifying other property owners in property owners the firm owns that Shufersal will not stand on exclusivity at these properties and will take no steps to implement the right to exclusivity. Shufersal will be allowed to be a party to future exclusivity arrangements for only 25 new branches and for no more than 3 years. After this period, Shufersal will not be allowed to enter into exclusivity arrangements at all. At the same time, Shufersal will pay an agreed administrative fine of approx. 9 million NIS, for violations of the Food Law. According to the Authority's inquiries, Shufersal extended 18 exclusivity arrangements it was party to, in violation of the Food Law, which bars entering into exclusivity arrangements in real estate, or extending such existing arrangements, in areas in which a retailer has a significant presence of more than 30% of the stores in the area. The exclusivity arrangements dealt with in the agreed order are rental agreements that bar the owner of a shopping mall or commercial center to rent retail space to a competitor of the renter. Thus, the renter ensures a limitation of competition in his competitive area in a manner which may harm competition and consumers. As remembered, about a year ago the Director-General of the Antitrust Authority reached agreement on an agreed order with Super-Pharm, in which Super-Pharm was obliged to cancel all the exclusivity arrangements it was a party to, excepting a number of exceptional branches. Before this agreement, in 2005 the Antitrust Authority determined that an exclusivity arrangement in real estate between Discount Bank and the Harel Shopping Center in Mevaseret-Zion was an illegal limiting arrangement. While real estate exclusivity arrangements have declined since then,Shufersal abstained from cancelling the exclusivity arrangements it was a party to on its own, and therefore the Director-General decided to bring the exclusivity arrangements to an end as detailed above, and to impose an agreed administrative fine on Shufersal of 9 million NIS for violations of the Food Law.
Mid
[ 0.609865470852017, 34, 21.75 ]
Sitting Target Sitting Target, also known as Screaming Target, is a 1972 British film directed by Douglas Hickox and shot in London. It stars Oliver Reed, Ian McShane and Jill St. John and was based on the 1970 novel by Laurence Henderson. Plot Harry Lomart, a convicted murderer, and Birdy Williams are convicts planning a breakout. Before the two men can abscond to another country, Lomart gets word that his wife Pat has been having an affair with another man and has become pregnant. The two men had made plans to lie low after their escape from jail, but Lomart decides to find and kill his wife and the man she has been seeing. A police inspector, Milton, is the man assigned to catch the two escaped convicts. Cast Oliver Reed as Harry Lomart Jill St. John as Pat Lomart Ian McShane as Birdy Williams Edward Woodward as Inspector Milton Frank Finlay as Marty Gold Freddie Jones as MacNeil Jill Townsend as Maureen Robert Beatty as Gun Dealer Tony Beckley as Soapy Tucker Mike Pratt as Prison Warder Accomplice Robert Russell as First Prison Warder Joe Cahill as Second Prison Warder Robert Ramsey as Gun Dealer's Bodyguard June Brown as Lomart's Neighbour Production Douglas Hickox was signed to direct in July 1971. Filming started in September 1971. Due to restrictions about filming in British prisons, the prisons sequences were filmed in Kilmainham Gaol, Dublin. Soundtrack The soundtrack was composed by Stanley Myers. It was released by Finders Keepers Records in 2007. Notes External links New York Times review Sitting Target at Trailers from Hell Category:1972 films Category:British films Category:English-language films Category:1970s crime drama films Category:1970s crime thriller films Category:Metro-Goldwyn-Mayer films Category:British crime thriller films Category:British films about revenge Category:Films based on British novels Category:Films directed by Douglas Hickox Category:Films scored by Stanley Myers Category:Films shot in London Category:British drama films
Mid
[ 0.6314363143631431, 29.125, 17 ]
Q: Anonymous access to parts of the svn repository I've been looking online and at the other posts on SO to figure out how to add anonymous access to my svn repository but nothing seems to work. I have the svnaccess.conf file in the directory where my repository is and I have groups setup with read and write access to the project like this: [groups] admins = administrator myproject= me [/] # give admins read/write access to all repositories @admins = rw [myproject:/] @myproject= rw This works fine for users who have read and write access. But i want to allow anonymous access to the project so anyone could have read access without having the login screen showup when trying to view the repository. A lot of the posts i've seen have involved adding * = r and anon-auth = read to the file but when i tried that it still shows the login screen. Am i doing something wrong? A: Did you also add Satisfy Any in Apache conf? Apache conf could be something like this: <Location /svn/> DAV svn AuthName "Subversion Repositories" AuthType Basic AuthBasicProvider file AuthUserFile "htpasswd" AuthzSVNAccessFile "authz" **Satisfy Any** Require valid-user </Location>
High
[ 0.6657263751763041, 29.5, 14.8125 ]
Q: Automating Access 2007 Queries (changing one criteria) So, I have 6 queries and I want to run them all once at the end of each month. (I know a bit about SQL but they're simply built using Access's design view). So, in the next few days, perhaps I'll run the 6 queries for May, as May just ended. I only want the data from the month that just ended, so the query has Criteria set as the name of the month (e.g., May). Now, it's not hugely time consuming to change all of these each month, but is there some way to automate this? Currently, they're all set to April and I want to change them all to May when I run them in a few days. And each month, I'd like to type the month (perhaps in a textbox in a form or somewhere else if you know a better way) just once and have it change all 6 queries, without having to manually open all 6, scroll over to the right field and change the Criteria. Note (about VBA): I have used Excel VBA so I know the basics of VBA but I don't really know anything specific to Access (other than seeing code a few times). And, others will use this who do not know anything about Access VBA. So, I think I have found a similar question/answer that could do this in VBA, but I'd rather do it some other way. If the query needs to be slightly redesigned later, probably by someone who doesn't know Access VBA at all, it'd be nice to have a solution not involving VBA if that is even possible. A: There's a simple way to have the query ask for the month when you run it: In the query, put [Enter Month] in the same place you now have the month name. When the query runs, a dialog box will appear to enter the month. You can put any text you want in the square brackets - it doesn't have to say "month"; this simply defines what the dialog box will say. This technique is called a "parameter query". Running all 6 queries with a single step will require VBA code - but very simple code. Your end users don't need to know anything about VBA - they only need to open a form and click a button. Create a form, put one button on it. In the properties list for that button, choose the Events tab and then the "On Click" event. Click the "..." button for the On Click event. This opens the VBA code window with the cursor in the correct place - Private Sub Command0_Click - where Command0 is the name of the button. Enter code as shown... Substitute the correct names for your queries and repeat the line of code as many times as needed. Opening the form and clicking the button will now run all the queries at once. The Next Step The final improvement would be to enter the parameter once and have it apply to all the queries automatically. This requires several steps. In the VBA code window, create a code "Module". Right click in the Project pane of the window and choose Insert/Module: In the new module, add this code: gstrMonth is a global variable string to hold the name of the month. The function GetMonth will be used in the queries to retrieve that value. Now change the Form1 code to this: The sub "AskForMonth" displays a dialog box for the user to type in a Month name. That input is assigned to the gstrMonth variable. In the Command0 (button) code we add AskForMonth before the query is run. Again, repeat the "DoCmd" line for each query with the correct query names. The final step is to replace the parameter in the queries with a call to the function "GetMonth". Instead of [Enter Month] in the query criteria, put "GetMonth()". I hope this encourages you to use some of the capabilities of VBA to automate your Access tasks!
High
[ 0.6819484240687671, 29.75, 13.875 ]
WENDELL HUSSEY | Cadet | CONTACT In an effort to find some consolation amongst the current circumstances, local Job Seeker Alisha Wilson has found solace in the fact she doesn’t live in the United States of America right now. Sitting at her dining table in her 4 person sharehouse in Betoota’s French Quarter, the young out of work hopso employee told The Advocate that she likes to remind herself that things could always be worse. “I could be a resident of New York right now I guess,” she laughed over a cup of tea and a brekky Tim Tam. “I mean, yeah I’m out of work, isolated, bored. But hey, at least I live in a country where social security will look after me, where people listen to authorities when it comes to protecting public health, and where our health care system will look after me if I fall ill.” “So at least I’m finishing Netflix and Stan in a relatively safe environment you know.” Wilson went onto explain that she is just so thankful she doesn’t live in the US, where the Death toll will tick over 50,000 in the next day or two, and people are talking to the streets to protest against the infringements on their rights to disobey social distancing measures. “I mean, at least Scott’s listening to the health authorities and not telling people with guns to ‘liberate themselves,'” she explained. “It’s really weird that the leader of their country blatantly ignored advice from health authorities, costing the country far more lives than they’ve lost to terrorism, and no one seems to bat an eyelid. Look at what we’ve achieved here by social distancing and a decent health care system.” c “So yeah, in short. There’s always a positive. And right now that’s the fact I live in Betoota, not the Land of the Free.”
Mid
[ 0.603938730853391, 34.5, 22.625 ]
Today, solar power is everywhere. It's on your neighbor's roof and in tiny portable cellphone chargers. There are even solar powered roads. And as solar power heats up, prices are going down. In fact, over the past 40 years, the cost of solar has decreased by more than 99 percent! But how did we get here? Ready for a quick history lesson on one of the world's fastest growing sources of energy? You might find this hard to believe, but we can trace the idea of harnessing the power of the sun back to 1839. A bright (pun intended!) young French physicist named Edmond Becquerel discovered the photovoltaic effect—the creation of an electric current in a material after being exposed to light—while experimenting in his father's laboratory. Over the following hundred-plus years, scientists continued exploring this phenomenon, creating and patenting solar cells, using them to heat water and doing extensive research to increase the efficiency of solar energy. The 1970s brought a period of change not only in the form of political and cultural upheaval, but also saw the rise of solar as a viable way to produce electricity. The first solar-powered calculator was commercialized, the Solar Energy Research Institute (now called the National Renewable Energy Laboratory) was established, and U.S. President Jimmy Carter installed solar panels on the White House for the first time. But it was also quite expensive, costing an average of $76 per watt in 1977. But as advancements in the industry continued, the costs began to fall. Over the next 10 years, the price would drop sevenfold to less than $10 per watt, hitting a plateau in the late 1980s and early '90s. Fast-forward to a few years later and solar technology was really hitting its stride as huge cost reductions were made in recent years, causing world leaders, governments, and the private sector to get on board and moving solar from a niche technology into the mainstream. Soon, regular people in communities all over the world were installing panels on their roofs and in numerous other applications thanks to the technology's improving economics and innovative incentives and financing models. Which brings us to today, when solar power can cost a minuscule61 cents per watt. In a relatively short period of time, it's become clear that an incredible future is ahead for this renewable source of energy. And as you might expect, the more the price falls, the more attractive it becomes. Forty years ago, the total global installation of solar was around 2 megawatts. Today, total global installation is closer to 224,000 megawatts. And as we start down the road forward after the historic Paris agreement, we're noticing just how many countries are working to meet their carbon emissions reduction goals by going solar. That's why we're hoping you will join us Dec. 5-6 for 24 Hours of Reality: The Road Forward as we travel the world for a look at how solar power is revolutionizing access to electricity in Mexico, Malaysia and Venezuela. We'll visit southeast Asia to meet a "solar monk" in Thailand and to South Africa, where sheep and solar live together on one solar PV farm. We'll even hear from oil-rich countries in the Middle East that are starting to prepare for a future beyond fossil fuels—and renewables like solar are becoming more and more cost effective. Sign up today to receive reminders about these inspiring stories. We'll see you Dec. 5-6 for The Climate Reality Project's annual 24 Hours of Reality live event. You won't want to miss out!
High
[ 0.699371069182389, 34.75, 14.9375 ]
Andy Stankiewicz Andrew Neal Stankiewicz (born August 10, 1964), nicknamed "Stanky", is a retired Major League Baseball middle-infielder, and presently is the head coach of the Grand Canyon Antelopes baseball team in Phoenix. Stankiewicz also served as the minor league field coordinator for the Seattle Mariners from 2009 to 2012. In 2004 and 2005 he served as the manager of the Staten Island Yankees, the class A affiliate of the New York Yankees, whom he led to the 2005 NY-Penn League Championship. Shorter than most major leaguers, at 5-9, and only 165 pounds, he went to St. Paul High School in Santa Fe Springs, California. He is an alumnus of Pepperdine University, where he was a standout for the Waves baseball program and graduated in 1986 with a degree in sociology. He ranks in the top 10 in several Pepperdine career batting categories, and is 3rd on the school's all-time list in stolen bases (101). Minor league career In 11 seasons in the minor leagues, he played primarily shortstop and second base. In 1987 he hit .307 at Ft. Lauderdale, and in 1989 he stole 41 bases in 498 at bats at Albany. Major league career Stankiewicz played for four different ballclubs during his career: the New York Yankees (1992–1993), Houston Astros (1994–1995), Montreal Expos (1996–1997), and Arizona Diamondbacks (1998). He made his Major League Baseball debut on April 11, 1992, and played his final game on September 23, 1998. He was a 27-year-old rookie in 1992, when he hit .268 for the Yankees, and .304 with runners in scoring position, and set what turned out to be career highs in at bats (400), runs (52), home runs (2), RBIs (25), and stolen bases (9). Post-playing career Following his playing career, he managed the Staten Island Yankees, New York's single-A (short season) affiliate, for two seasons (2004–2005), which culminated with a New York–Penn League title in 2005. In 2006, he worked as a scout for the New York Yankees. From 2006 to 2009 he was an assistant baseball coach at Arizona State University. Under his guidance, ASU led the nation in fielding percentage in 2007, and he coached 29 players who were drafted, including three first rounders. In 2012, Stankiewicz became the head coach at Grand Canyon University. In his first season, he guided the Antelopes to a 27–23 overall record as the squad finished eighth in the final West Region poll. Stankiewicz also had been selected as an assistant coach for USA Baseball's Collegiate National Team during the summer of 2012. The squad travelled to Cuba and The Netherlands to compete in Honkbal-Haarlem Baseball Week, where they won the bronze medal. In just his second season at Grand Canyon, Stankiewicz had the program winning 40 games and advancing to the NCAA Division II Baseball Championship. Stankiewicz continued to lead the Lopes as they transition from Division II to Division I beginning in 2014. In 2015, under his direction, Grand Canyon won the 2015 regular season WAC title. Head coaching record See also List of current NCAA Division I baseball coaches References External links Grand Canyon Antelopes bio Category:1964 births Category:Living people Category:Albany-Colonie Yankees players Category:American expatriate baseball players in Canada Category:American people of Polish descent Category:Arizona Diamondbacks players Category:Arizona League Diamondbacks players Category:Arizona State Sun Devils baseball coaches Category:Baseball coaches from California Category:Baseball players from California Category:Fort Lauderdale Yankees players Category:Columbus Clippers players Category:Grand Canyon Antelopes baseball coaches Category:Gulf Coast Yankees players Category:Houston Astros players Category:Jackson Generals (Texas League) players Category:Las Vegas 51s players Category:Major League Baseball second basemen Category:Major League Baseball shortstops Category:Minor league baseball managers Category:Montreal Expos players Category:Oneonta Yankees players Category:Pepperdine Waves baseball players Category:New York Yankees players Category:New York Yankees scouts Category:Sportspeople from Inglewood, California Category:Tucson Sidewinders players Category:Tucson Toros players
High
[ 0.660377358490566, 30.625, 15.75 ]
Assen had been earmarked as a key round for Honda in its search for competitiveness in WorldSBK. It passed with more confirmation that the team’s struggles will continue. Nine points were all that Nicky Hayden had to show for himself at the end of a trying weekend at the TT Circuit of Assen. The Honda rider was able to show some signs of improved competitiveness at times during the weekend, but overall the same flaws of the Honda Fireblade have been exposed once again. Reliability and inability to bring competitive upgrades to the table cost Hayden dearly at Assen. The week before the Dutch round, the team tested a new engine specification in Portimao and the American came away disappointed with a lack of progress. “We haven’t improved enough this year, and at the Portimao test before Assen, we were doing similar times to January,” said a clearly disappointed Hayden. “I think that was big blow to all of us, and I’m not going to lie, we went there expecting to see some improvement. We had a new engine upgrade, and it was a smoother power delivery, but it was too smooth and it wasn’t a step forward.” “It’s possible that there was some stuff wrong with that engine, and once they got it back to the workshop they might have found something.” “That test was just a big blow for us, and I wasn’t happy at all because we need to find some power. We had some other problems at that test and maybe that could be a little wakeup call for the team, and help all of us realize what’s going on.” “It’s not working, and we need to take a different path. We can’t use a lack of time with the bike as an excuse any longer because we’ve now had eight races and a lot of testing. With this much data on the bike and no real significant gain in lap time it’s clear that there is a problem.” That problem initially centered on the electronics of the bike, and issues with throttle connection and engine braking. At the Portimao test, those issues reared their head again and while the team had hoped to use the new specification at Assen, Hayden didn’t want to risk adding another engine to the allocation that could cause issues. “I have a problem adding the new engine because I’ve already used a lot of engines this year, because I had a problem with one. To bring another engine into the circulation is tough at this point in the season, because I don’t want to be starting from the pit road later in the year because of allocation issues.” There are plenty of other issues to be addressed as well, with Hayden’s Friday woes adding to his feeling that the team should bring in some additional resources. “I was hoping with the new big sponsor for this year we would see more resources. I know we are just a satellite team, but maybe we can add one or two people to the team – an engineer and a third mechanic for each rider.” “On Friday morning I had a water leak and it took time to fix it. Then I missed the whole second session with another problem. We have so many problems.” “Who expects that you have to screw down the clutch cover or drain water during practice? If everything goes smoothly, two mechanics are enough. In our situation though we could benefit from one extra.” Photo: Honda Pro Racing Stories like this one are made possible by our A&R Pro members. If you enjoyed reading this article, you should consider supporting this content by signing up for A&R Pro.
Mid
[ 0.542857142857142, 38, 32 ]
SITE FEATURES Martingale Betting System Explained The Martingale Betting System was developed in 18th century France. It was actually part of a group of betting methods that were classified as “martingale.” Today, Martingale refers to a relatively simple sports betting system that dictates when you win a wager, you bet the same amount on the next wager, but when you lose a bet, you double your next wager. Some sports gamblers swear by this methodology while sharp sports bettors that understand the math feel that it’s an example of poor money management practices. The fact that this system is still practiced and marketed today says more about the state of a losing gambler’s mind and less about the success or failure of the system. Here’s how it works. First, it’s important to know that the betting system is designed for even wagers, which are thought to hit about 50% of the time. A bettor with a bankroll of $500 puts $50 on an early afternoon football game. The bet is lost. Under the Martingale System, the gambler now places $100 on the late afternoon game. If the bet is won, the theory is that the gambler makes back the original loss, plus a $50 profit. Once the bet is won, the bettor goes back to wagering $50 per game until they lose again. The problem with this system is that it can put a bettor’s bankroll in jeopardy quickly. What if in our example the late afternoon wager is lost too. Now the bettor has to put $200 on the Sunday night contest. If that game is a washout, the gambler’s bankroll has gone from $500 to $150. And with that, the true problem with Martingale comes into focus. There’s only $150 left in the bank, but under Martingale the wager is supposed to be $400. Martingale has all but bankrupt the gambler’s bankroll. Of course, it’s not as big a dilemma if the original wager was $20, which is a wiser wager if you’ve got a $500 bankroll. Still, even at 20 bucks per pop, using this system the gambler is down $80 after three loses and is due to wager $160 on the Monday night game. If they lose that bet, their bank is down to $260. According to Martingale, the next bet should be $320 and, once again as in the previous example, the money is not there. What most amateur sports bettors dont understand is how odds work from a mathematical perspective. Did you know that a 50% handicapper will lose 5 games in a row 3% of the time? Eventually the math will catch with the Martingale system and the player will be broke. Martingale is seen as being a regressive form of wagering where bettors play conservatively when they are on a roll and go for the sky when they are in a tailspin. It’s based on the belief that a string of loses on even odds wagers means that eventually there will be a win to correct the deviation. But this idea that wins and loses even out, which is known as the Gambler’s Fallacy, is illogical for one primary reason—it supposes that our four bets are interrelated, and they are not. Whether one wins or loses the first wager will have no influence on the second bet and the outcome of the second in no way has any influence on the third outcome. If there is no correlation in the bets the order of wins and losses is controlled by variance, something that no gambler has control over. The application of any system in sports betting tends to be tenuous. Why? Success in gambling on sporting events is based on solid sports handicapping analysis, expert information and insider insights. A gambler’s ability to utilize all of the information available to them to make the right pick will determine an individual’s rate of success or failure and not some theory regarding odds correction based on probability. If as a sports bettor you do practice the Martingale Betting System do so with care. About Maddux Sports For years the sports handicappers at Maddux Sports have been making money for us and our clients betting the strongest sports picks on the Internet. Maddux Sports feels that in this industry the best sports handicappers can charge less for their picks than the big name scamdicappers. Maddux Sports makes its money from repeat sports bettors that know the value of their bankroll. Featured on:
Low
[ 0.5233050847457621, 30.875, 28.125 ]
Catharine Pugh Sentenced To 3 Years In Prison For Fraud. After releasing a lengthy apology video ahead of her sentencing earlier this week, ex-Baltimore mayor Catherine Pugh has been sentenced to 3 years in federal prison. The Democrat was indicted last November on 11 counts of charges that included tax evasion, conspiracy and fraud, and pleaded guilty to four charges the following day. After her sentencing Pugh apologized to Baltimore residents. Catharine Pugh Sentenced To 3 Years In Prison For Fraud The Baltimore Sun reports former Baltimore Mayor Catherine Pugh, who held elected offices in Baltimore for two decades and was elevated by voters to lead the city after the upheaval of 2015, was sentenced to three years in federal prison Thursday for a fraud scheme involving a children’s book series. U.S. District Judge Deborah K. Chasanow described Pugh’s crimes as “astounding” and said she took advantage of a career spent doing good works to mislead organizations who purchased her “Healthy Holly” books. “I have yet frankly to hear any explanation that makes sense,” the judge said. “This was not a tiny mistake, lapse of judgment. This became a very large fraud. The nature and circumstances of this offense clearly, I think, are extremely, extremely serious.” Pugh, 69, tearfully asked Chasanow for mercy and apologized in court “to anyone I have offended or hurt through my actions.” She said she had “turned a blind eye” and “sanctioned things I should not have,” but did not intend to cause harm. Pugh isn’t being imprisoned immediately. Chasanow told her to surrender “when notified when and where to report.” Inmates who cooperate with federal authorities usually get 30 to 60 days to report to prison. Outside the courthouse, Pugh spoke to reporters for the first time since leaving office and struck a resilient tone, declaring: “This is not the last you’ll see of Catherine Pugh.” Also Pugh’s political fall began in March when The Baltimore Sun revealed she had entered into a no-bid deal with the University of Maryland Medical System, where Pugh sat on the board of directors, to buy 100,000 copies of her sloppily self-published “Healthy Holly” books for $500,000. She later resigned from the board and as mayor amid multiple investigations into her finances and the book sales. In total, she netted more than $850,000, prosecutors say. At the same time, she failed to print thousands of copies, double-sold thousands more and took many others to use for how much how much self-promotion, according to prosecutors. Investigators also uncovered that she laundered illegal campaign contributions and failed to pay taxes. SUGGESTED:JUST IN: Hillary Clinton Begins A New Podcast Catharine Pugh Sentenced To 3 Years In Prison For Fraud PLEASE SHARE THIS ARTICLE TO SUPPORT BREAKING WIDE Sun please Share this: Twitter Facebook Reddit Pinterest LinkedIn WhatsApp
Low
[ 0.5344827586206891, 31, 27 ]
BELL RINGERS Woman remembers when Salvation Army helped family As shoppers hustle from car to store this holiday season, the Salvation Army bell ringers will wait outside next to their red kettles. The charity’s leaders hope they stay. Lorraine Fries, 42, of Greeley stood next to a kettle Tuesday afternoon in front of the downtown Greeley Post Office, 925 11th Ave. Bundled against the cold, she leaned against a metal railing and rattled a little white bell. “You have a nice day, Hon,” she said to the dozens of people who hurried past. Years ago, the Salvation Army helped Fries feed her two young sons. It’s not easy to accept charity, she said, but sometimes there isn’t any other choice. “You got to take your pride and stick it on the shelf when you have children.” If Fries, a paid employee, lasts through the season, she’ll be one of the few. Bell ringers become scarce toward the middle and end of the campaign when the blowing snow makes hours on the street especially unappealing. Capt. Paul Belcher said he started out with 60 workers last year in Denver and finished with 15 at the end of the campaign. Recommended Stories For You The Salvation Army depends on a mixture of paid employees and volunteers to operate the five-week campaign. Belcher, now running the Greeley office, said the organization needs volunteers throughout the season and hopes people will continue to sign up. In Greeley and Windsor, ringers work four-hour shifts — double shifts if they want to — to keep the bells clanging 10 a.m.-6 p.m. Tuesday through Saturday outside retailers and government buildings. Fries said she’ll try to finish out the campaign. Wearing Carhartt overalls over jeans and a sweatshirt with two, gloved hands sticking out of a brown overcoat, she said she could bear the cold. “I have to be honest, though, if I get another job that pays better than $6.50 an hour and it’s inside …” The Red Kettle Campaign is critical to the Salvation Army’s operations. Of Belcher’s $400,000 budget, he said as much as a third will come from the kettles. About 20-25 percent of the total donations will pay the operating costs of the campaign and the rest will fund services in Weld County, including food and assistance. Those services mean a lot for people who struggle to support their families, Fries said. She remembered digging ditches and tearing the roofs off houses, anything to take care of her boys and stay out of the system. “If everybody that walks in here, or everybody that buys a lottery ticket, put that money in here,” Fries said pointing to her kettle, “I don’t think we’d have as much of a problem.” With a couple of hours left in Fries’ eight-hour shift, the shadow of the post office stretched over her head and onto the sidewalk. She said the weather wasn’t too harsh Tuesday, but she’d heard the wind was supposed to come today. She figured that might discourage a lot of ringers. Fries had support on Tuesday, however. Ar friend, Rod Norris of Greeley, stopped by with a thermos of hot coffee and a warm burrito. “Sweet ambrosia,” Fries said, swigging the coffee. Moments later, a middle-aged man fished a handful of coins out of his pocket and dropped them in the kettle. Fries waved her bell. “You have a nice day, Hon.” For more information, to volunteer or to contribute, contact the Salvation Army, 1119 6th St., Greeley, 346-1661.
Mid
[ 0.6354679802955661, 32.25, 18.5 ]
Isolation and characterization of a novel IgD-binding protein from Moraxella catarrhalis. A novel surface protein of the bacterial species Moraxella catarrhalis that displays a high affinity for IgD (MID) was solubilized in Empigen and isolated by ion exchange chromatography and gel filtration. The apparent molecular mass of monomeric MID was estimated to approximately 200 kDa by SDS-PAGE. The mid gene was cloned and expressed in Escherichia coli. The complete mid nucleotide gene sequence was determined, and the deduced amino acid sequence consists of 2123 residues. The sequence of MID has no similarity to other Ig-binding proteins and differs from all previously described outer membrane proteins of M. catarrhalis. MID was found to exhibit unique Ig-binding properties. Thus, in ELISA, dot blots, and Western blots, MID bound two purified IgD myeloma proteins, four IgD myeloma sera, and finally one IgD standard serum. No binding of MID was detected to IgG, IgM, IgA, or IgE myeloma proteins. MID also bound to the surface-expressed B cell receptor IgD, but not to other membrane molecules on human PBLs. This novel Ig-binding reagent promises to be of theoretical and practical interest in immunological research.
High
[ 0.6728232189973611, 31.875, 15.5 ]
package com.disid.restful.web.customerorder.api; import com.disid.restful.model.CustomerOrder; import com.disid.restful.model.OrderDetail; import com.disid.restful.service.api.CustomerOrderService; import com.disid.restful.service.api.OrderDetailService; import io.springlets.data.domain.GlobalSearch; import io.springlets.web.NotFoundException; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.data.domain.Page; import org.springframework.data.domain.Pageable; import org.springframework.http.HttpStatus; import org.springframework.http.MediaType; import org.springframework.http.ResponseEntity; import org.springframework.web.bind.annotation.DeleteMapping; import org.springframework.web.bind.annotation.GetMapping; import org.springframework.web.bind.annotation.ModelAttribute; import org.springframework.web.bind.annotation.PathVariable; import org.springframework.web.bind.annotation.PostMapping; import org.springframework.web.bind.annotation.RequestBody; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; import java.util.Collections; import javax.validation.Valid; @RestController @RequestMapping(value = "/api/customerorders/{customerorder}/details", produces = MediaType.APPLICATION_JSON_VALUE) public class CustomerOrdersItemDetailsJsonController { public CustomerOrderService customerOrderService; public OrderDetailService orderDetailService; @Autowired public CustomerOrdersItemDetailsJsonController(CustomerOrderService customerOrderService, OrderDetailService orderDetailService) { this.customerOrderService = customerOrderService; this.orderDetailService = orderDetailService; } @ModelAttribute public CustomerOrder getCustomerOrder(@PathVariable("customerorder") Long id) { CustomerOrder customerOrder = customerOrderService.findOne(id); if (customerOrder == null) { throw new NotFoundException("Order not found"); } return customerOrder; } @GetMapping public ResponseEntity<Page<OrderDetail>> listOrderDetails( @ModelAttribute("customerorder") CustomerOrder customerOrder, GlobalSearch globalSearch, Pageable pageable) { Page<OrderDetail> orderDetails = orderDetailService.findByCustomerOrder(customerOrder, globalSearch, pageable); return ResponseEntity.status(HttpStatus.FOUND).body(orderDetails); } @PostMapping public ResponseEntity<?> addToDetails(@ModelAttribute CustomerOrder customerOrder, @Valid @RequestBody OrderDetail detail) { customerOrderService.addToDetails(customerOrder, Collections.singleton(detail)); return ResponseEntity.ok().build(); } @PostMapping("/batch") public ResponseEntity<?> addToDetails(@ModelAttribute CustomerOrder customerOrder, @Valid @RequestBody Iterable<OrderDetail> details) { customerOrderService.addToDetails(customerOrder, details); return ResponseEntity.ok().build(); } @DeleteMapping("/batch") public ResponseEntity<?> deleteFromDetails(@ModelAttribute CustomerOrder customerOrder, @Valid @RequestBody Iterable<Integer> details) { customerOrderService.removeFromDetails(customerOrder, details); return ResponseEntity.ok().build(); } }
Mid
[ 0.6026785714285711, 33.75, 22.25 ]
Association of soy and fiber consumption with the risk of endometrial cancer. The authors conducted a case-control study among the multi-ethnic population of Hawaii to examine the role of dietary soy, fiber, and related foods and nutrients on the risk of endometrial cancer. Endometrial cancer cases (n = 332) diagnosed between 1985 and 1993 were identified from the five main ethnic groups in the state (Japanese, Caucasian, Native Hawaiian, Filipino, and Chinese) through the rapid-reporting system of the Hawaii Tumor Registry. Population controls (n = 511) were selected randomly from lists of female Oahu residents and matched to cases on age (+/-2.5 years) and ethnicity. All subjects were interviewed using a diet history questionnaire that included over 250 food items. Non-dietary risk factors for endometrial cancer included nulliparity, never using oral contraceptives, fertility drug use, use of unopposed estrogens, a history of diabetes mellitus or hypertension, and a high Quetelet's index (kg/cm2). Energy intake from fat, but not from other sources, was positively associated with the risk of endometrial cancer. The authors also found a positive, monotonic relation of fat intake with the odds ratios for endometrial cancer after adjustment for energy intake. The consumption of fiber, but not starch, was inversely related to risk after adjustment for energy intake and other confounders. Similar inverse gradients in the odds ratios were obtained for crude fiber, non-starch polysaccharide, and dietary fiber. Sources of fiber, including cereal and vegetable and fruit fiber, were associated with a 29-46% reduction in risk for women in the highest quartiles of consumption. Vitamin A and possibly vitamin C, but not vitamin E, were also inversely associated with endometrial cancer, although trends were not strong. High consumption of soy products and other legumes was associated with a decreased risk of endometrial cancer (p for trend = 0.01; odds ratio = 0.46, 95% confidence interval 0.26-0.83) for the highest compared with the lowest quartile of soy intake. Similar reductions in risk were found for increased consumption of other sources of phytoestrogens such as whole grains, vegetables, fruits, and seaweeds. Ethnic-specific analyses were generally consistent with these results. The observed dietary associations appeared to be largely independent of other risk factors, although the effects of soy and legumes on risk were limited to women who were never pregnant or who had never used unopposed estrogens. These data suggest that plant-based diets low in calories from fat, high in fiber, and rich in legumes (especially soybeans), whole grain foods, vegetables, and fruits reduce the risk of endometrial cancer. These dietary associations may explain in part the reduced rates of uterine cancer in Asian countries compared with those in the United States.
High
[ 0.6976744186046511, 33.75, 14.625 ]
Impaired healing of cutaneous wounds and colonic anastomoses in mice lacking thrombin-activatable fibrinolysis inhibitor. Plasmin and other components of the plasminogen activation system play an important role in tissue repair by regulating extracellular matrix remodeling, including fibrin degradation. Thrombin-activatable fibrinolysis inhibitor (TAFI) is a procarboxypeptidase that, after activation, can attenuate plasmin-mediated fibrin degradation by removing the C-terminal lysine residues from fibrin, which play a role in the binding and activation of plasminogen. To test the hypothesis that TAFI is an important determinant in the control of tissue repair, we investigated the effect of TAFI deficiency on the healing of cutaneous wounds and colonic anastomoses. Histological examination revealed inappropriate organization of skin wound closure in the TAFI knockout mice, including an altered pattern of epithelial migration. The time required to completely heal the cutaneous wounds was slightly delayed in TAFI-deficient mice. Healing of colonic anastomoses was also impaired, as reflected by decreased strength of the tissue at the site of the suture, and by bleeding complications in 3 of 14 animals. Together, these abnormalities resulted in increased mortality in TAFI-deficient mice after colonic anastomoses. Although our study shows that tissue repair, including re-epithelialization and scar formation, occurs in TAFI-deficient mice, TAFI appears to be important for appropriate organization of the healing process.
High
[ 0.65648854961832, 32.25, 16.875 ]
You can help the Orangutans! By Amy Lawrenson I am a big fan of Orangutans (so much so that I drag my boyfriend to Colchester Zoo as often as I can to see their resident Orangutans!) – did you know that we share 97 per cent of our DNA with the furry, ginger fellows? As a redhead, I probably hit 98 per cent! While the Orangutans in the zoo are safe and well, the ones in the wild are threatened with extinction. Forests in South East Asia, in which these primates (and many other animals) live, are being destroyed to support the palm oil industry – an ingredient which is used in many of our day-to-day food, home and lifestyle products. ADVERTISEMENT - CONTINUE READING BELOW But this month, thanks to Trilogy, you can do something to help. Throughout November the organic skincare brand is supporting The Borneo Orangutan Survival Foundation, who rescue and rehabilitate wild Orangutans. All you need to do is purchase one of Trilogy’s Limited Edition Organic Rosehip Oil, and $1 of the £15.61 price will go towards the cause. The campaign is ongoing, so we will keep you updated on future fundraising schemes. In the meantime, if you want to read more about The Borneo Orangutan Survival Foundation, click here. Newsletter sign-up The ELLE take on everything that’s trending in your world – shopping, beauty and celebrity news, and in–depth reads – direct to your inbox every Wednesday. Sign up to ELLE Notes today. Enter your email address: Please tick if you would prefer not to receive news & special offers from Hearst Magazines UK, publisher of ELLE. Please tick if you would like to receive news & special offers from selected partners of Hearst Magazines UK.
Mid
[ 0.5906313645621181, 36.25, 25.125 ]
Q: Item alignments changed when using stackpanel instead of dockpanel I am working on an implementation where I want to display some items in a window as shown below --------------------- | | | | | | | | | | | | | | | xx xx xx xx | |-------------------- The attached scrrenn shot also displays the same . However I need to somehow implement this using a stack panel instead of a dock panel eve though I can get it to work as required from a dock panel when using stack panel is messes up all the alignments . Here is a ss of the required way it should look this is what it looks like in a stack panel below is my code , can anyone help me with this ? <Grid> <Grid.RowDefinitions> <RowDefinition Height="Auto"/> <RowDefinition Height="*"/> <RowDefinition Height="Auto"/> <RowDefinition Height="Auto"/> </Grid.RowDefinitions> <StackPanel Grid.Row="2" Margin="0,10,0,0"> <StackPanel HorizontalAlignment="Left" Orientation="Horizontal"> <TextBlock> Text01 </TextBlock> <TextBlock> Text02 </TextBlock> </StackPanel> <StackPanel HorizontalAlignment="Right" Orientation="Horizontal" > <TextBlock> Text03 </TextBlock> <TextBlock> Text04 </TextBlock> </StackPanel> </StackPanel> </Grid> A: There is no reason to force StackPanel to do what it doesn't support. Try Grid: <Grid Grid.Row="2" Margin="0,10,0,0"> <Grid.ColumnDefinitions> <ColumnDefinition Width="Auto"/> <ColumnDefinition Width="Auto"/> <ColumnDefinition Width="*"/> <ColumnDefinition Width="Auto"/> <ColumnDefinition Width="Auto"/> </Grid.ColumnDefinitions> <TextBlock Grid.Column="0" Text="Text 01"/> <TextBlock Grid.Column="1" Text="Text 02"/> <TextBlock Grid.Column="3" Text="Text 03"/> <TextBlock Grid.Column="4" Text="Text 04"/> </Grid>
Mid
[ 0.5754716981132071, 30.5, 22.5 ]
Robert & Olave Baden-Powell In the south aisle of the nave of Westminster Abbey, against the screen of St George’s chapel, is a memorial stone to Lord and Lady Baden-Powell. Both are buried in Kenya and each had a memorial service held at the Abbey. The joint memorial stone was unveiled on 12th February 1981, in the presence of Princess Margaret, and is by sculptor Wilhelm Josef Soukop. The Scouts and Guides flags are placed against the screen. This memorial replaced an earlier stone to Lord Baden-Powell which was unveiled in 1947. This had the badges of the Boy Scouts and Girl Guides on it with the inscription: In memory of Robert Baden-Powell Chief Scout of the World 1857-1941. The present memorial includes medallion heads in bronze with the inscription: Give thanks for ROBERT BADEN-POWELL 1857-1941 Chief Scout of the World OLAVE BADEN-POWELL 1889-1977 World Chief Guide. Robert Stephenson Smyth Baden-Powell was born in London on 22nd February 1857, a son of the Reverend H.G. Baden Powell, a professor at Oxford. He was educated at Tunbridge Wells in Kent and at Charterhouse School where he first became interested in the arts of Scouting and woodcraft. In 1869 his mother changed the family name from Powell to Baden-Powell. He served with the 13th Hussars in India from 1876-1883 and on leaving India carried out secret reconnaissance work in Africa and took part in the 1888 Zulu War. He also served in Malta and commanded the 5th Dragoon Guards. In 1899 came Mafeking, the most notable episode in his outstanding military career. During the 217 day siege of the town Baden-Powell’s book Aids to Scouting was published, reaching a wide audience. After Mafeking was relieved he went on to organise the South African constabulary and returned to England as Inspector General of Cavalry. He re-wrote his book and tested his scouting theories at a camp on Brownsea Island in Dorset. Soon Scout troops were being formed all over the country. Robert was knighted in 1909 and in 1912 he married Olave Soames. The first international Scout Jamboree was held in London in 1920 where Robert was acclaimed "Chief Scout of the World" and in 1929 he was created Lord Baden-Powell of Gilwell. In 1938 he went to live in Kenya and is buried at Nyeri. Olave St Clair Soames was born in Derbyshire on 22nd February 1889 and met Robert on a Caribbean cruise. They married in October 1912 and had three children. In 1909 Robert founded the Girl Guide movement, assisted by his sister Agnes, and Olave was active in the Sussex branch and became Chief Guide in 1918. In 1930 she became World Chief Guide. They undertook many world tours and Olave was appointed Dame Grand Cross of the British Empire in 1932 for her services to the Girl Guides. She died on 25th June 1977 and was buried beside her husband.
Mid
[ 0.6187050359712231, 32.25, 19.875 ]
THAT FRANK LAMPARD is already the Chelsea manager may make you feel old; that his side last night faced a striker younger than Facebook and Euro 2004 is guaranteed to send you fumbling through your mind for years you never realised had passed. Source: St Kevin's Boys FC. Lampard’s first game in charge ended in a 1-1 draw with Bohemians at Dalymount Park last night, with 14-year-old striker Evan Ferguson impressing off the bench for Bohs. Ferguson was introduced just after the hour mark and impressed against a Chelsea defence featuring familiar names like Kurt Zouma and Davide Zappacosta. Leading the line alone, he twice cut in from the left-hand side of the box with a stepover, jink and a drop of his shoulder. The second of these led to a vicious shot that whipped narrowly wide of the far post. He then had the awareness to dummy Keith Ward’s late pass for Eric Molloy, who scored Bohs’ equaliser a minute from the end. A product of St Kevin’s Boys, the schoolboy club whose graduates include Robbie Brady and Jeff Hendrick, Ferguson has been involved with Bohs’ U15s and U17s and has been capped up to U16 level by Ireland. He is being tracked by a series of clubs in England, and The42 understands Liverpool are among those keen for his services. It’s also understood he is due to train with Brighton and Hove Albion later this week. While Evan may soon leave the League of Ireland, his family are steeped in it. His father Barry played at centre-back with Bohs, Sporting Fingal, and Shamrock Rovers having won two FAI Cups and a League Cup with Longford Town in the early part of the last decade. “Evan is a highly sought after young prospect”, Bohs boss Keith Long said after last night’s game. “There are a lot of Premier League clubs in the UK interested in Evan. His father Barry played in the League for Longford and quite a number of teams, so he comes from a good background. He is highly thought of, and this was an opportunity for him to come in and get a cameo appearance tonight, and I thought he did very well. He obviously looks older than his years in terms of his physique, but he is 14 years of age and will be 15 in October. It was an opportunity to come in and play and give him a taste what the future may hold for him. “For the goal, it’s a nice little step over. Some of his combination play with Keith Ward was quite good, his hold-up play was quite good. He is a talented boy.” Elsewhere, the scorer of that goal, Eric Molloy, is on trial with Bohemians at the moment and Long was tight-lipped about the likelihood of his staying long-term. Keith Long. Source: Laszlo Geczo/INPHO Having played in the League with Wexford Youths, Molloy moved to New Zealand to play with Team Wellington in 2016. Last year, he became the first Irish player since 2008 to appear at the Fifa Club World Cup. “We asked him in to play tonight, he has been training with us for the last couple of days”, said Long. “Eric is familiar with the League, he was part of Wexford Youths’ promotion-winning team and played in the Premier Division with Wexford before he went down to New Zealand. “He has trained with us for a couple of days, he has taken his goal really well, and that’s an opportunity for us to have a look at him.” Frank Lampard arrives for his first game in charge of Chelsea. Source: Laszlo Geczo/INPHO Overall, Bohs’ performance was worthy of a draw against a Chelsea side that mingled inexperience with ring-rust and fatigue beneath a heavy training load. Whereas this was a pre-season friendly for Chelsea, it’s a mid-season run-out for Bohs and Long was keen to emphasise where his side’s attention lies. “It was a good night for the club, there was a big crowd here, I think it’s a good performance and we deserved to get the equaliser. “We have been lucky this season that our gates have been quite strong, and it’s not uncommon to have a sell-out here. “It’s good to get a team the calibre of Chelsea across, so credit must go to the people at the club who organised it and got a team like Chelsea across. “I said to the boys beforehand, ‘Go out and play, go out and fucking play’, excuse me. But try and play, express yourself, don’t be overawed and don’t be looking up at these guys. We have some good players too, and they have to believe in themselves. Our focus is UCD on Monday. This was a chance for players to come in and play well, and keep us in a good frame of mind going into the UCD game. And that’s what it is about for us. Tonight is a good game to have, get plenty of game time for players and hopefully, it won’t interfere with our preparations for Monday. “It’s great that we have a Premier League club here, but really, it’s about Monday for us.” After Molloy’s equaliser, the Bohs fans belted out a chorus of ‘You’re getting sacked in the morning’ in Lampard’s direction. When it was brought up with him after the game, Keith Long laughed. “Once it’s not me!”
Mid
[ 0.5934065934065931, 33.75, 23.125 ]
Certified by the SCAA and SCAE, this coffee maker exceeds the stringent quality control guidelines set forth by international coffee organizations. The inventor of this coffee maker, Gerard C. Smit has dedicated his life to creating coffee makers that do away with planned obsolescence, ensuring that this model – and every following model – is long-lasting, reliable, and energy-efficient. CR’s take: Like the model above, the Cuisinart Burr Grind & Brew takes whole coffee beans and grinds them fresh for each pot. It features programming, brew-strength control, a water filter, a permanent coffee filter, and auto-shutoff. This model earns a great rating for carafe handling. The stainless steel finish and glass carafe certainly elevate the experience of using it. Cuisinart brewers also received an Excellent rating for owner satisfaction. But the performance and finish come at a premium—this machine costs significantly more than the Black+Decker Mill & Brew. We’re the largest online retailer of espresso machines and it’s no secret why. We love coffee. We love that first sip in the morning, the one that you’ve got to fight to get to your mouth because 8 hours of sleep seems like a pipe dream. We love that rush, when the caffeine kicks in and you know that you’ve got the day in the palm of your hand. We love the art – brewing, roasting, tasting – and the journey that each coffee drinker takes in search of their perfect joe. We’ve been sharing that love with the world since 1997 and we hope you’ll pull up a cup and join us in celebration of nature’s most perfect beverage, coffee! Expert reviewers and buyers alike love this espresso machine. BravoTV wrote a review explaining why it's worth the money even though it's pricey. Indeed, when you do the math to calculate just how much money you spend over the course of a year on espresso, cappuccinos, and other high-end coffee drinks, you'll see just how much money this admittedly expensive machine will save you in the long run. An early variant technique, called a balance siphon, was to have the two chambers arranged side-by-side on a sort of scale-like device, with a counterweight attached opposite the initial (or heating) chamber. Once the near-boiling water was forced from the heating chamber into the brewing one, the counterweight was activated, causing a spring-loaded snuffer to come down over the flame, thus turning "off" the heat, and allowing the cooled water to return to the original chamber. In this way, a sort of primitive 'automatic' brewing method was achieved. Carafe style. Heavy coffee drinkers should look for a model with a thermal carafe. These coffee machines can keep your coffee warm for hours without having to sit on a burner, which can scald the liquid. Glass pots are not insulated and must sit on a heated burner to keep the coffee warm, so they’re an ideal choice for those who need only one or two cups a day. Some coffee drinkers insist that a glass carafe results in a better-tasting cup of joe. The Hamilton Beach 12-Cup BrewStation coffee maker offers convenient one-hand dispensing without a conventional glass carafe. There's no pouring or spills, and nothing fragile to break and replace. No matter how much you try, it’s impossible to get freshly brewed flavor from coffee that’s been sitting on a hot plate too long. That’s why the Hamilton Beach BrewStation was created, the only coffeemaker that keeps coffee tasting fresh for up to four hours. This best-selling coffee maker... A cafetiere (Coffee Plunger, French press in US English) requires coffee of a coarser grind than does a drip brew coffee filter, as finer grounds will seep through the press filter and into the coffee.[2] Coffee is brewed by placing the coffee and water together, stirring it and leaving to brew for a few minutes, then pressing the plunger to trap the coffee grounds at the bottom of the beaker. “This is the same coffee maker that I bought years ago. And it’s even the same price. Yep — they do still make things like they used to. And they last forever. It’s super simple, super reliable, compact, and cheap. There are a lot of places where we can spend money, but a simple cup of coffee doesn’t have to be one of them. Once you get the amount of water and coffee figured out to your taste — simply do that. No K-cup, nothing to recycle, fits the car cup holder. And the coffee stays hot in the mug.” Only two optional settings are available: You can control the heating element under the carafe and turn down the temperature if desired. Other than that, the Moccamaster doesn't have—and doesn't need—anything else. Technivorm boasts that its heating element can get water between 196ºF and 205ºF, which specialists say is the ideal temperature for brewing coffee. This is an easy-to-use coffee maker that'll add some retro style to your countertop. It includes a pause-and-pour feature for times when you need caffeine before the brewing process is done — and after brewing, it keeps your coffee piping hot for 40 minutes (you can monitor the length of time on the indicator gauge on the front display). Available in black, cream, white and red. Access the world of coffee for inspiration. The De’Longhi combination coffee espresso machine allows you to use either coffee pods for a speedy messfree espresso, or freshly ground beans if you prefer your coffee brewed the traditional way. Espresso is delivered straight to the cup in seconds, perfect every time. The distinct sign of an ideal espresso is its ‘crema’, a creamy, toffee-colored layer that seals in flavor. Your De’Longhi espresso machine will deliver a crema that reflects the quality of the espresso, and the machine that made it. Fancy topping your espresso with a sweet milk foam? It’s easy to brew creamy lattes and velvety cappuccinos too, thanks to our patented cappuccino system frothers. Making espresso in my old, classic Italian-style Moka machine takes about 10 to 12 minutes — and a bunch of elbow grease. My drip-maker for a classic American cup of joe takes even longer. My brewing cone for pour-over coffee requires me to boil water — and it can't make espresso. And my French press needs about 20 minutes to steep. Plus, it makes too much coffee and I find it's best reserved for fancier brunches. The built-in burr grinder is high quality, and you can easily adjust the grind size and amount with a dial on the front of the machine. You can choose to use either a single- or double-wall filter basket, and the grinder will automatically adjust to give you the right about of coffee grounds for your brew. Reviewers love that it comes with the grinder and praise its quality. Regardless of whether you buy extra accessories, it's still very affordable, and you're really buying this machine for the espresso. The De'Longhi delivers in that regard. It's a 15 bar machine with a self-priming function, so you don't have to go through the hassle of prepping the machine. The 35oz water tank is removable for cleaning and it has a drip tray to catch spills. and a durable, high-quality stainless steel boiler to ensure many years of delicious espresso. The OXO On 12-Cup feels high-tech without being high maintenance. It’s beautifully constructed, with silicone gaskets, a stainless steel carafe, and sturdy-feeling plastic. But let’s go ahead and get its biggest downside right out there in the open. Of the 10 machines we tested, it took the longest to brew eight cups of coffee — nearly 15 minutes. It heats its entire reservoir of water to temperature before a drop touches the grounds, and if you’re jonesing for a full pot to start off your day, that wait is going to feel like a lifetime. This was particularly noticeable considering four of the machines we tested brewed the same amount of coffee in less than half that time. The Bunn BTX-B Velocity Brew could do it in three minutes flat. The OXO On 12-Cup feels high-tech without being high maintenance. It’s beautifully constructed, with silicone gaskets, a stainless steel carafe, and sturdy-feeling plastic. But let’s go ahead and get its biggest downside right out there in the open. Of the 10 machines we tested, it took the longest to brew eight cups of coffee — nearly 15 minutes. It heats its entire reservoir of water to temperature before a drop touches the grounds, and if you’re jonesing for a full pot to start off your day, that wait is going to feel like a lifetime. This was particularly noticeable considering four of the machines we tested brewed the same amount of coffee in less than half that time. The Bunn BTX-B Velocity Brew could do it in three minutes flat. Our collections also include plenty of accessories to help you prepare and serve your delicious coffee. Serve coffee in style on one of our Williams Sonoma coffee tables. Browse a selection of consoles, side tables and rectangular tables that complement almost any space. If you opt for a capsule machine or a stovetop espresso maker, you may want to choose some accessories to enhance your drinks. Coffee accessories such as mills and scales can help improve flavor. If your maker of choice doesn’t include a frother, our collections offer a variety of options, from small handheld devices to slightly larger models that can froth a few cups of coffee at once. The Moccamaster isn't for everyone. Handmade in the Netherlands, it costs around $300—and would never win an award for value. It lacks a programmable timer, and it was also bit more difficult to set up than the rest of the coffee makers—in fact most were ready to go right out of the box. But a quick look at the instruction diagram should clear up any confusion, and the end result is well worth the effort. Coffeemakers or coffee machines are cooking appliances used to brew coffee. While there are many different types of coffeemakers using a number of different brewing principles, in the most common devices, coffee grounds are placed in a paper or metal filter inside a funnel, which is set over a glass or ceramic coffee pot, a cooking pot in the kettle family. Cold water is poured into a separate chamber, which is then heated up to the boiling point, and directed into the funnel. This is also called automatic drip-brew. It’s not that cone filters won’t make a great cup of coffee — the OXO On 9-Cup still ranked fifth out of 10 in our taste test. But flat bottoms generally allow for the grounds to be more evenly extracted and increase the coffee’s flavor. (It’s no coincidence our other three recommendations have flat-bottom brew baskets). You may have to do a little more tweaking to get this coffee maker’s brew to the best it can be, and that’s the other reason we like the 12-cupper more. This smaller version doesn’t let you tinker with water temperature. 6 month warranty for Spinn Original, Original Plus, and Original pro. If your machine is defective (DOA) when you receive it, we’ll make it right immediately. For US customers, if it develops a problem later that’s our fault, we’ll either (at our option) ship you the parts that need to be replaced along with detailed instructions, or ship it back to us for repair or replacement – in either case, for free, including shipping. For international customers, parts and repairs are free, but shipping is not included. The warranty covers everything except water filters. Unfortunately, if you modify your firmware, we can’t cover your Spinn under warranty (because it’s easy to break your Spinn by modifying your firmware!) Making espresso in my old, classic Italian-style Moka machine takes about 10 to 12 minutes — and a bunch of elbow grease. My drip-maker for a classic American cup of joe takes even longer. My brewing cone for pour-over coffee requires me to boil water — and it can't make espresso. And my French press needs about 20 minutes to steep. Plus, it makes too much coffee and I find it's best reserved for fancier brunches. Reviews.com has an advertising relationship with some of the offers included on this page. However, the rankings and listings of our reviews, tools and all other content are based on objective analysis. For more information, please check out our full Advertiser Disclosure. Reviews.com strives to keep its information accurate and up to date. The information in our reviews could be different from what you find when visiting a financial institution, service provider or a specific product’s website. All products are presented without warranty. The single-serve or single-cup coffeemaker has gained popularity in recent years.[5] Single-serve brewing systems let a certain amount of water heated at a precise temperature go through a coffee portion pack (or coffee pod), brewing a standardized cup of coffee into a recipient placed under the beverage outlet. A coffee portion pack has an air-tight seal to ensure product freshness. It contains a determined quantity of ground coffee and usually encloses an internal filter paper for optimal brewing results. The single-serve coffeemaker technology often allows the choice of cup size and brew strength, and delivers a cup of brewed coffee rapidly, usually at the touch of a button. Today, a variety of beverages are available for brewing with single-cup machines such as tea, hot chocolate and milk-based specialty beverages. Single-cup coffee machines are designed for both home and commercial use. You can check out our best milk frothers here. Some of you will stick with the machine's frothing wand, but you'll still need a milk frothing pitcher, so we recommend this one from Rattleware. Should you want a better tamper, we recommend this one from Rattleware. To save money on the coffee grinder, you can try this manual Hario Skerton Ceramic Coffee Mill, but if you want a high-end one, you may pay more than $200 for it. This multi-functional brewer uses espresso, coffee, tea and milk pods to give you drinks just like your favorite barista makes. The machines automatically uses different levels of pressure to create various beverages, such as high-pressure extraction for espresso to low pressure for regular coffee. The sleek design will look right at home on your counter, and the water reservoir can be detached for easy refills. From 1-cup coffee makers to 60-cup coffee urns, automatic drip coffee makers to french press coffee makers, we design and expertly engineer our coffee machines to fit your lifestyle and brew a perfect cup of coffee, every time. Some of our coffee innovations include our FlexBrew® coffee makers, designed to let you drink a cup of coffee from a single-serve pack or from coffee grounds, in a single cup or a 12-cup carafe. Our collection of BrewStation® coffee makers ignore the carafe completely and internalize the brewing system, allowing you to pour a fresh cup of coffee with one-hand. Other innovations like easy access filling, programmable settings, and automatic grounds filling make our coffee makers uniquely qualified to improve your every morning.
Mid
[ 0.5703703703703701, 28.875, 21.75 ]
Investigative journalist Sharyl Attkisson has filed a lawsuit against former Deputy Attorney General Rod Rosenstein and other deep state actors for their alleged involvement in spying on her. According to Attkisson’s own website, a former U.S. government agent admitted to illegally spying on her and claimed that Rosenstein was the ringleader of the operation, ordering other defendants to surveil the investigative reporter. As a result of this information, Attkisson and her family filed the lawsuit. The complaint claims the spying took place at the U.S. attorney’s office in Baltimore, MD. “The Plaintiffs first acquired the details regarding key individuals involved in the surveillance in August, 2019, from a person involved in the wrongdoing who has come forward to provide information. Prior to that time, the Government and its agents and representatives had denied that any such conduct had occurred, including denials in Court pleadings and argument,” states the lawsuit. Attkisson was surveilled while she was covering the Obama Administration scandal known as Operation Fast and Furious as a CBS News investigative correspondent. The spying continued throughout her reporting on the September 11, 2012 Benghazi attacks. Sharyl Attkisson.com also reports that a former FBI Unit Chief signed a sworn Affidavit “confirming that forensics prove U.S. government software was used in illegal surveillance on Attkisson and her family.” The Unit Chief, Leslie Szwajkowski claims a colleague asked him for help while examining Attkisson’s computer in 2012 and says some of his colleagues were “shocked” and “outraged” that the government would spy on a journalist. “I personally could not imagine that something like this could ever happen in the United State of America,” said Szwajowski. Szwajkowski claims those spying on Attkisson’s computer had “full access” to files, photographs and included a keystroke monitoring program. They also had access to Attkisson’s audio through Skype. In a statement, Attkisson said, “I’ve learned that when the Justice Dept. won’t hold its own accountable, the ability to get justice in civil court can be nearly impossible for an ordinary citizen, even when irrefutable forensic proof and admissions are in hand, such as in my case. There are six ways from Sunday that the Justice Department can make sure the proof is never seen by a jury. On the other hand, it’s worth the fight because at least we are bringing important information to light about the illegal government abuses that I believe have happened to many U.S. citizens, the least of which is me. I’m grateful to the 4th amendment and free press advocates who have continued to selflessly support this effort.”
High
[ 0.6767537826685001, 30.75, 14.6875 ]
1More Crystal In-Ear Headphones Black Crystal Clear Sound To Reminisce On Youth . Disrupting The Model of Sound, For You New Perspective On Music. Sound From The Source. Preserved In Time. Made with Swarovski ® elements The rear covers of the earphones are fabricated using with the Swarovski ® elements. It uses the cutting craft of “Chessboard Fatbacks”(2035 Chessboard), making the Swarovski crystal rhinestone shine. When combined with the simple design, it portrays the modern urban fashion to its full potential. Crystal Clear Sound To Reminisce On Youth . Disrupting The Model of Sound, For You New Perspective On Music. Sound From The Source. Preserved In Time. Made with Swarovski ® elements The rear covers of the earphones are fabricated using with the Swarovski ® elements. It uses the cutting craft of “Chessboard Fatbacks”(2035 Chessboard), making the Swarovski crystal rhinestone shine. When combined with the simple design, it portrays the modern urban fashion to its full potential. Aerospace-grade composite diaphragm In order to present the diverse music styles better, 1MORE crystal piston in-ear headphones (Special Edition) uses aerospace composite diaphragm. This allow the earphone to extend the frequency range, enhance the richness and detail of the music, while also lowing distortion, and ensuring the powerful heavy bass at the same time. Crystal clear sounds due to the new Dual Balanced Damping System When the sound overlay on top of one another on the diaphragm, the sound loses its accuracy. 1MORE uses Dual Balanced Damping System to disperse sound waves in order prevent overlay and produce the purest sound.
Mid
[ 0.5420353982300881, 30.625, 25.875 ]
This bundle of 16 math tests for Grade 2 is in French. The tests have been translated from English by a Francophone First Language translator. They are based on the Ontario Curriculum Expectations. The tests cover 2D Shapes, 3D Shapes, Addition & Subtraction, Canadian Money, Fractions, Graphi
Mid
[ 0.561247216035634, 31.5, 24.625 ]
Q: JavaScript variable definition and scope I'm trying to understand how variable scope works when you bind an event. The following example works fine: function clickHandler() { alert(foo); } var foo = true; $('div').on({ 'click': clickHandler }); See: http://jsfiddle.net/OliverJAsh/7fM5U/4/ However, when I make this simple change, it doesn't work anymore: function clickHandler() { alert(foo); } (function () { var foo = true; $('div').on({ 'click': clickHandler }); }()); See: http://jsfiddle.net/OliverJAsh/7fM5U/3/ How would you go about making the second example work? Can I do anything with .call? I am wondering this because the function is being called where the variable is defined, so I want it to have access to that. UPDATE: I understand why it can't access the variable - but because the function is being called from where the variable is defined, I wondered how I could make it work, without moving the scope of things. I think I'm asking about the .call method. A: In javascript variables are scoped within functions - so the scope of foo is within your anonymous (function () { .. }()); which is not visible to clickHandler. To fix it you can bring the clickHandler function into the anonymous function like so: (function () { var foo = true; var clickHandler = function() { alert(foo); } $('div').on({ 'click': clickHandler }); }()); Update If you are unable to change the scoping if the clickHandler function and do not wish to change the signature either, you can use the call function like so: function clickHandler () { alert(this); } (function () { var foo = true; $('div').on({ 'click': function() { clickHandler.call(foo); } }); }());
Mid
[ 0.642398286937901, 37.5, 20.875 ]
/*************************************************************************** * Copyright (c) 2002 Jürgen Riegel <[email protected]> * * * * This file is part of the FreeCAD CAx development system. * * * * This library is free software; you can redistribute it and/or * * modify it under the terms of the GNU Library General Public * * License as published by the Free Software Foundation; either * * version 2 of the License, or (at your option) any later version. * * * * This library is distributed in the hope that it will be useful, * * but WITHOUT ANY WARRANTY; without even the implied warranty of * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * * GNU Library General Public License for more details. * * * * You should have received a copy of the GNU Library General Public * * License along with this library; see the file COPYING.LIB. If not, * * write to the Free Software Foundation, Inc., 59 Temple Place, * * Suite 330, Boston, MA 02111-1307, USA * * * ***************************************************************************/ #ifndef GUI_DIALOG_DLGSETTINGS3DVIEWIMP_H #define GUI_DIALOG_DLGSETTINGS3DVIEWIMP_H #include "PropertyPage.h" #include <memory> class QDoubleSpinBox; namespace Gui { namespace Dialog { class Ui_DlgSettings3DView; /** * The DlgSettings3DViewImp class implements a preference page to change settings * for the Inventor viewer. * \author Jürgen Riegel */ class DlgSettings3DViewImp : public PreferencePage { Q_OBJECT public: DlgSettings3DViewImp(QWidget* parent = 0); ~DlgSettings3DViewImp(); void saveSettings(); void loadSettings(); private Q_SLOTS: void onAliasingChanged(int); protected: void changeEvent(QEvent *e); private: std::unique_ptr<Ui_DlgSettings3DView> ui; static bool showMsg; }; } // namespace Dialog } // namespace Gui #endif // GUI_DIALOG_DLGSETTINGS3DVIEWIMP_H
Mid
[ 0.6247544204322201, 39.75, 23.875 ]
Q: Opencart Issue Config Step 3 - "Error: Could not connect to the database please make..." IF someone is familiar with Opencart please help. I am in the stages of experimenting with shopping carts and I have very little knowledge MySQL. Issue "Error: Could not connect to the database please make sure the database server, username and password is correct!" I have been through Cpanel and created a Database (DB) to fill in the relevant fields. These are the fields that I have filled: (drop down) MySQLi - MySQL (What is the difference?) (Input Field) Database Host : localhost (where does this need to point to?) (Input) Username and then password : I have entered a password without special characters, but I can't remove the underscore from the user name. These were made in Cpanel. Database Name : I have entered the database name here but cant remove "dsdsdsd_databasename" Database Prefix : oc_ I have left this as is... What is this prefix? And the I have entered the username admin and password - any pointers? A: All appears to be working with the config! I can see the login. Although if anyone could answer my bullet points above that would be appreciated. In the end I went into the Cpanel, scrolled down to 'MySQL wizard' and followed the steps. I believe my names and passwords were correct from before as typed these a few times. The difference with using the wizard in Cpanel was that it allowed an option at the end that allowed 'all privileges' - ticked the box and before long I could see the admin panel. Hope this helps.
Mid
[ 0.561643835616438, 30.75, 24 ]
Time Has Its Own Terms Format: Print Length Language: English Format: PDF / Kindle / ePub Size: 7.39 MB Downloadable formats: PDF You may use the CHEA website to search for both CHEA and USDE recognized accreditors ( off-site link ) or to view a chart comparing CHEA and USDE recognition ( off-site PDF chart ). Finally, the A+ Schools for B Students category examined two variables: the school’s performance in the 2016 edition of the U. Also, the buddy should really deflect from places, like caves that can invoke fear to the beginner, to make the whole experience worthwhile. Maid-Rite is an Iowan restaurant that first opened in 1926 and popularized these sandwiches. Pages: 160 Publisher: Xlibris (November 30, 2001) ISBN: B007IFNHAA Report of the adjutant general of the state of Illinois A Standard History of Kansas and Kansans History of Illinois, from 1778 to 1833; and life and times of Ninian Edwards. Justice Denied Please check out the 2015 NAGPS Midwest Regional Conference Facebook page for updates! Deadline to receive conference hotel rate March 6, 2015 NAGPS regional conferences serve as a forum where student leaders from the region come together to share best practices, learn about national platforms, and grow in their understanding of issues relevant to graduate students in the Midwest online. They expect high-quality and unique recreational opportunities such as restaurants, sporting events, live music, and nightlife venues ref.: American Pharaoh: Mayor download for free American Pharaoh: Mayor Richard J. Daley. They know that when they purchase a meal from us, the money goes back into the local economy and to farmers and ranchers in Pacific Northwest.” Ice Cube may have immortalized Fatburger in rap in the early 1990s (“No helicopter looking for a murder / Two in the morning got the Fatburger”), but the chain founded by Lovie Yancey in 1952 had already developed a strong following in Southern California Dewey: The Small-Town Library Cat Who Touched The World http://zachis.it/?library/dewey-the-small-town-library-cat-who-touched-the-world. Department of Education 8:30 am CDT on Wednesday, May 18, 2011 InterContinental Chicago O’Hare Hotel 5300 N. River Road Rosemont, IL 60018 Thelma Meléndez de Santa Ana, assistant secretary for the Office of Elementary and Secondary Education, U. Department of Education 11:45 AM CDT on Thursday, May 19, 2011 S. supply (though we share these shorelines with Canada’s Ontario and Quebec provinces). However, in replying to the “water revival” assertion, I am always careful to temper the sanguine outlook with several “the glass is half empty” caveats. First, while it is true that water is becoming increasingly scarce in much of the West and even, more recently, in the Southeastern United States, the problem there mostly lies with poor allocation of water among competing uses rather than with sudden scarcity , cited: General Henry Baxter, 7th read pdf read pdf. A small area of southeastern Puerto Rico remained in moderate drought during the month. Across much of the region, dryland crops remained stressed from excessive heat and dryness, but some improvement occurred in scattered locations that received higher amounts of rainfall. By the end of the month, nearly 40 percent of the corn crop in Alabama was reported to be in poor or very poor condition , cited: Forty Years a Fur Trader on download here http://lawrenceburgspringwater.com/library/forty-years-a-fur-trader-on-the-upper-missouri-the-personal-narrative-of-charles-larpenteur. Missouri was one of the top states in 2013 for technology job growth, including the biomedical field Lincoln in Illinois http://www.patricioginelsa.com/lib/lincoln-in-illinois. These colleges and universities are Midwest Regional colleges are rankings More Regional colleges ranking by region: North, South, Midwest, and West. Welcome to the Midwest Independent Booksellers Association, your connection to the best locally owned and operated independent bookstores throughout the Midwest. We are a nonprofit trade association that supports the success and growth of independent bookstores in Illinois, Iowa, Kansas, Minnesota, Missouri, Nebraska, North Dakota, South Dakota, Wisconsin, and Michigan's Upper Peninsula From Warrior to Judge the Biography of Wahshashowahtinega Bill Nixon Hapashutsy of the Osage Tribe 1843 to 1917 From Warrior to Judge the Biography of. Louisiana and Mississippi receive the most rain of the region during the winter--upwards of 5 inches are the average in January Dekalb County In Vintage Postcards (IN) (Postcard History Series) http://www.patricioginelsa.com/lib/dekalb-county-in-vintage-postcards-in-postcard-history-series. The eldest son John's mouth was perfectly normal... A preacher was riding to one of the churches on his circuit when darkness fell. It was about to storm, and the only house nearby was an old mansion which was reputed to be haunted download. Authority and Alliance in the Letters of Henry Adams (Wisconsin Studies in Autobiography) For the Seventh District, Illinois and Wisconsin (top right quadrant) have average years of schooling above that of the U , e.g. Conquest of the Country Northwest of the River Ohio 1778-1783, Volume 1 Conquest of the Country Northwest of the. The formula uses quantitative measures that education experts have proposed as reliable indicators of academic quality, and it's based on U. News' researched view of what matters in education. First, regionally accredited schools are categorized by their mission, which is derived from the breakdown of types of higher education institutions. National Universities offer a full range of undergraduate majors, plus master's and doctoral programs, and emphasize faculty research , e.g. One Branch of the Fay Family download epub http://www.patricioginelsa.com/lib/one-branch-of-the-fay-family-tree-an-account-of-the-ancestors-and-descendants-of-william-and. Read the October 2016 issue of AgResearch magazine online now Jumping the Line: The read epub www.patricioginelsa.com. Used together, the Palmer Z Index and PHDI maps show that short-term dry conditions occurred across much of the West, Southeast, coastal Mid-Atlantic and Northeast, and parts of the Northern High Plains. This short-term dryness expanded or intensified long-term dry conditions in August compared to July in most of these areas. Short-term wet conditions expanded or intensified long-term wet conditions in the Southern and Central Plains to Ohio Valley and western Great Lakes, and contracted long-term drought conditions in the Southwest , e.g. Sketches of Things and Peoples in Indiana (Classic Reprint) download pdf. Availability of the draft report for commenting will be announced in the Federal Register The Missabe Road ... The read here www.patricioginelsa.com. District Court for the Western District of Oklahoma (EEOC v. Midwest Regional Medical Center, Civil Case No.: CIV-13-789-M) after first attempting to reach a pre-litigation settlement through its conciliation process. The EEOC's suit seeks back pay, compensatory and punitive damages and reinstatement or front pay for Withers, as well as injunctive relief, including a court order prohibiting Midwest Regional Medical Center from any further discrimination against employees because of their disability. "The ADA has long prohibited a private employer from discriminating against applicants or employees because of their disability," said Barbara A epub. Memoirs of Samuel Rufus Harshman: comprising his autobiography, recollections of men and events, camp-meetings, and other meetings held in Ohio, ... later life, obituary, letters, and sermons... Burrows of Michigan and the Republican Party: A Biography and a History - Scholar's Choice Edition malabar farm ROSTER OF SOLDIERS, SAILORS AND MARINES OF THE WAR OF 1812, THE MEXICAN WAR, AND THE WAR OF THE REBELLION, RESIDING IN NEBRASKA JUNE 1, 1891 Glimpses of the Nation's Struggle: 1st -6th Series. Papers Read Before the Minnesota Commandery of the Military Order of the Loyal Legion of the Unite When I Was a Father (Minnesota Voices Project) The Hoosier Year of 366 Indiana Writers and Speakers - Scholar's Choice Edition History Of The Expedition Under The Command Of Captains Lewis And Clarke, To The Sources Of The Missouri ...: Performed During The Years 1804, 1805, ... The Government Of The United States, Volume 2 Memorial Addresses on the Life and Character of Joseph Rankin, (a Representative from Wisconsin): Delivered in the House of Representatives and in the Senate Jennie Gerhardt: (Annotated) Sketches of Early Life and Times in Kentucky, Missouri and Illinois McDaniel appeared on closed circuit TV with his public defender Finding Common Ground: The Art read for free Finding Common Ground: The Art of. A miner was on his way to Dos Cabezas, where here heard there was good prospecting, when he found himself lost and alone in the flats just north of the Dragoon Mountains Minnesota Historical read online http://hoperadiony.com/library/minnesota-historical-collections-volume-9. To access the menus on this page please perform the following steps. 1. Please switch auto forms mode to off. 2. Hit enter to expand a main menu option (Health, Benefits, etc). 3 epub. A common source for GM canola in the wild is seed that has scattered during harvest or fallen off a truck during transport. "Because about 90 percent of the U. S. and Canadian canola crop is biotech, it is reasonable to expect a survey of roadside canola to show similar levels of biotech plants," said Tom Nickson, environmental policy lead at Monsanto, in a prepared statement , source: Biographical history of download for free http://www.patricioginelsa.com/lib/biographical-history-of-tippecanoe-white-jasper-newton-benton-warren-and-pulaski-counties. The rankings are published online at www.usnews.com/colleges and in the U. JOHANNESBURG, SOUTH AFRICA--(Marketwire -10/12/11)- www.stockcall.com/ offers investors comprehensive research on the Regional - Midwest Banks industry and has completed analytical research on U. Bancorp (NYSE: USB - News ) and Comerica Incorporated (NYSE: CMA - News ) online. Augustana is ranked No. 3 among the " Best Regional Colleges in the Midwest " according to the latest edition of “ Best Colleges 2013 ” by U. The College also received high rankings in the report’s analysis of schools that offer students the best value. Among the regional colleges listed in the “ Best Value Schools ” study, Augustana is ranked No. 2 in the Midwest. The report, which ranks more than 1,800 schools nationwide, classifies a regional college as a school that focuses entirely on the undergraduate experience and offers a broad range of programs in the liberal arts and in fields such as business, nursing and education , source: Portrait and biographical record of Lafayette and Saline counties, Missouri: containing biographical sketches of prominent and representative ... of all the presidents of the United States Portrait and biographical record of. Wilson was transported to the Grant County Jail without incident. While the deputies were investigating the incident at the construction site, they made contact with Travis Campagna, age 38 of Campbellsport Wisconsin ref.: Proceedings Of The ... Annual download epub http://skcreatives.co.uk/?freebooks/proceedings-of-the-annual-session-of-the-kansas-conference-of-social-work. Take a moment to fill out an online application, or call your local Regional Finance branch, and we will work quickly to help you find the right loan for your big purchase, along with a payment plan that doesn't break the bank Cincinnati Revealed: A Photographic Heritage of the Queen City (OH) (Images of America) download for free. He is 20-5-1 on the season with a 2.03 goals against average and a .930 saves percentage. The Badgers’ top offensive player is senior forward Mark Zengerle. He has 10 goals and 33 assists for 43 points on the season epub. For example, the net change in a given land cover category results from the gains and losses in that cover type between two periods, such as 1973 to 2000 Warner's History of Dakota County, Nebraska: From the Days of the Pioneers and First Settlers to the Present Time, with Biographical Sketches, and Anecdotes of Ye Olden Times Warner's History of Dakota County,. Here, with the exception of New York City, U. S. cities tend to be less international than those on other continents. How this relates to Chicago’s recent growth performance and prospects is not clear epub. Snowfall occurs the further north one travels in this area, with Oklahoma being the state that receives the most. Louisiana and Mississippi receive the most rain of the region during the winter--upwards of 5 inches are the average in January. Summer in the Southern region or hot and sticky--with rain falling in the form of thunderstorms and heavy rainfall during the afternoons often throughout the summer months , e.g. Life Of Stephen A. Douglas: read epub Life Of Stephen A. Douglas: United.
Low
[ 0.48400852878464806, 28.375, 30.25 ]
Clinical and biochemical aspects of thiamine treatment for metabolic acidosis during total parenteral nutrition. We encountered six cases of total parenteral nutrition (TPN)-associated lactic acidosis during the 6-y period of 1988-1993. The patients were characterized by severe disease of the digestive organs, minimal food intake before surgery, and postoperative TPN with no food intake and with no vitamin supplements. Within 4 wk of TPN, they developed hypotension (< or = 80/60 mmHg), Kussmaul's respiration, and clouding of consciousness, as well as abdominal pain not directly related to the underlying disease. Routine laboratory examinations revealed no acute aggravation in hepatic, renal, or pancreatic functions. Arterial blood gas analysis showed pH < or = 7.134 and base excess < or = -17.5 mmol/L. Additional laboratory examinations revealed serum lactate > or = 10.9 mmol/L, serum pyruvate > or = 159 mumol/L, and lactate/pyruvate ratio > or = 0.029. None of the patients responded to sodium bicarbonate or other conventional emergency treatments for shock and lactic acidosis. After the first case, we suspected that thiamine deficiency might be responsible for this pathologic condition, Serum thiamine was proved to be < or = 196 nmol/L in 5 patients. Thiamine replenishment at intravenous doses of 100 mg every 12 h resolved lactic acidosis and improved the clinical condition in 3 patients. This article includes a review of 11 relevant reports published from 1982-1992 and a discussion of the biochemical mechanism of onset of thiamine deficiency-associated lactic acidosis. We emphasize the needs (1) to supplement TPN with thiamine-containing vitamins for the patients whose food intake does not meet nutritional requirements; (2) to monitor the patients routinely measuring serum thiamine concentration and erythrocyte transketolase activity during TPN; and (3) to intravenously replenish using high-dose thiamine simultaneously with the manifestation of signs and symptoms of lactic acidosis.
High
[ 0.710124826629681, 32, 13.0625 ]
Back in the Reagan era, the Republican Party advertised itself as a "big tent," a collection of conservatives, independents, recovering liberals, even Reagan Democrats. Today, by comparison, it's little more than a pup tent. Much is made of the Grand Old Party's latest evidence of shrinkage -- Pennsylvania Sen. Arlen Specter's defection to the Democrats. Too little is made of the fact that in Obama's Washington the GOP is increasingly irrelevant at a time of great crisis when a vibrant opposition voice is vital. It's not good for the country. One-party dominance has too often been a recipe for recklessness. The most alarming aspect of the GOP's steep decline is the seeming indifference of its elected leadership and its Greek chorus in the right-wing media. "Good riddance!" was the response of many to Specter's departure. Rush Limbaugh, Grand Poobah of conservative TV cacklers, even suggested Specter take Sen. John McCain out the door with him. A look at the map suggests this is not a party that can afford to lose anyone, even Sarah Palin. Recent elections have left it representing a bit of the farm belt and little more than the Old Confederacy; even there, it lost three of the Old South's four biggest states last year, Florida, Virginia and North Carolina. Republicans are an endangered species all along the West Coast and have suffered grievous losses in the Midwest and the Middle Atlantic states and even in parts of their Rocky Mountain stronghold. In New England they're beyond endangered; they're all but extinct. There's no mystery why Republicans, like Lewis Carroll's Cheshire Cat, are slowly disappearing, grinning as they do. It's their quest for ultra-conservative ideological conformity. As Specter put it: "They don't make any bones about their willingness to lose the general election if they can purify the party." He cited the purging of popular GOP moderates in party primaries in Rhode Island and New Mexico that led to Senate general election defeats. The party lacks the two things normally deemed essential to political success: nimble, attractive leaders and a message right for the times. Its Congressional leaders, Sen. Mitch McConnell and Rep. John Boehner, have all the appeal of a pair of androids. The party chairman, Michael Steele, is working toward a black belt in malapropisms. And what damage Limbaugh doesn't do to the party image, Dick Cheney does. As toxic assets, they're a match for any held by Wall Street's most busted banks. But it's on the vital subject of message that the GOP is most clearly bankrupt. Its all-purpose cure for everything that ails the country is tax cuts and/or reduced government spending. That won't do; it might if times were good, but not now, with the economy on dead stop and needing a jolt. Moreover, the public is wise to the GOP's blanket opposition to the Obama program. A CBS News-NY Times poll reports that 70 percent of those surveyed believe the opposition is motivated primarily by politics, not principle. In time, GOP fortunes will rebound. But not without new leadership, new ideas, and a new welcome for viewpoints other than those of Rush Limbaugh. South Carolina Republican Sen. Lindsey Graham put it must pithily. "We have to find places in the party," he said, "for people who couldn't win in South Carolina."
Mid
[ 0.612529002320185, 33, 20.875 ]
Introduction {#S1} ============ Breast cancer is the second most common cause of death in women in the Western world, with over 44,000 deaths per year in the US alone ([@R1]). Despite advances in breast cancer treatment at present there is no cure once metastasis develop ([@R12]). The metastatic ability of breast cancer is inversely related to its degree of differentiation, evidenced pathologically by nuclear pleomorphism and the formation of glandular structures ([@R16]). The more undifferentiated the invasive carcinoma, the greater likelihood to develop metastasis. Our laboratory has shown that EZH2, a protein that controls cell differentiation, is elevated in aggressive and metastatic breast cancer ([@R21]). EZH2 is an independent predictor of survival in women with breast cancer ([@R21]). Invasive carcinomas with high EZH2 expression are significantly larger and more likely to metastasize than tumors with low EZH2. Studies have shown that EZH2 expression correlates with markers of the basal-cell breast cancer subtype characterized by infrequent expression of estrogen (ER) and progesterone receptors(PR), and rare Her-2/neu overexpression, but robust expression of markers of myoepithelial differentiation ([@R2]; [@R8]; [@R21]). EZH2 is a Polycomb group (PcG) protein homologous to *Drosophila* Enhancer of Zeste and involved in the regulation of cellular memory ([@R23]; [@R29]; [@R31]). PcG together with the Trithorax group (TrxG) proteins function forming multimeric complexes that activate and repress transcription. While PcG proteins act mainly by repressing gene expression, TrxG proteins promote gene expression ([@R23]; [@R29]; [@R31]). Deregulation of the PcG proteins can lead to cancer ([@R18]; [@R19]; [@R23]). Studies have shown that EZH2 specifically trimethylates lysine 27 of histone H3 (H2K27me^3^) which recruits other members of the PcG to specific genetic loci ([@R7]; [@R20]; [@R22]). Of note, recent studies show that EZH2 was able to activate gene transcription through mechanisms that do not involve histone methylation ([@R32]). EZH2 was reported to function by forming transcriptional complexes independent of its methyltrasnferase activity ([@R36]). In addition, mechanisms that do not involve gene transcription but affect protein activation have been proposed ([@R35]). The mechanism by which EZH2 is associated with breast cancer progression, especially in the context of ER negative breast cancer remains to be elucidated. The tumor suppressor BRCA1 regulates DNA repair, activation of cell-cycle checkpoints, and maintenance of chromosome stability ([@R40]). Heterozygous germ-line mutations in the BRCA1 gene predispose women to breast and ovarian cancer with a lifetime risk of breast cancer of up to 80% ([@R27]). Although somatic mutations of BRCA1 are not common, expression of its messenger RNA and protein are reduced in approximately 40 % of sporadic breast carcinomas ([@R38]; [@R41]; [@R44]). The vast majority of breast tumors in these patients display a basal-like phenotype, and BRCA1 dysfunction, by down-regulation, mutation, or other mechanisms, has been suggested to play an etiological role in the development of this aggressive breast cancer subtype ([@R15]; [@R24]; [@R38]). To evaluate the oncogenic function of EZH2 in the breast, we generated a lentivirus-mediated short hairpin RNA to stably knockdown EZH2 in breast cancer cells. Our *in vivo* and *in vitro* studies show that EZH2 plays a critical role in breast cancer growth. We provide the first evidence that EZH2 knockdown decreased the rate of breast tumor growth, the volume of tumors, and improved survival of mice. EZH2 down-regulation decreased proliferation of ER negative breast cancer cells and caused a delay in the G2/M transition of the cell cycle. Our data revealed that EZH2 modulates BRCA protein levels and the levels of BRCA1 phosphorylated at serine 1423, which is important in the regulation of the G2/M transition. Of note, we show that BRCA1 is required for the proliferative and G2/M effects of EZH2. The relevance of our *in vitro* and animal model findings to human breast cancer is highlighted by demonstrating that ER negative invasive carcinomas have high levels of EZH2 and concomitant low levels of BRCA1 protein. Results {#S2} ======= EZH2 protein is elevated in breast cancer cells {#S3} ----------------------------------------------- We investigated the levels of EZH2 protein expression in a panel of breast cells including the non-tumorigenic line MCF10A and breast cancer cells, MDA-MB-231, SUM149, CAL51 and MCF-7. EZH2 protein is elevated in breast cancer cells compared to benign cells ([Figure 1A](#F1){ref-type="fig"}). The expression of EZH2 in benign non-mammary diploid fibroblasts has been shown to be cell cycle regulated ([@R5]). To determine the pattern of EZH2 expression in the cell cycle during growth, benign and cancerous breast cells were subjected to double thymidine block and subsequently re-stimulated by their medium to enter the cell cycle. As shown in [Figure 1B](#F1){ref-type="fig"} left, EZH2 protein is cell growth regulated and accumulates at the G1/S transition in benign MCF10A cells. This pattern of expression is similar to that reported in fibroblasts ([@R5]). However, this regulation is lost in cancer cells, as the four different breast cancer cells studied had deregulated and high levels of EZH2, that were not regulated through the cell cycle ([Figure 1B](#F1){ref-type="fig"} right). The deregulation of EZH2 in CAL51 breast cancer cells during cell cycle progression is likely not due to activating *EZH2* mutations, as no mutations in the open reading frame of *EZH2* of CAL51 cells were detected by direct sequencing (data not shown). Lentivirus-mediated knockdown of EZH2 decreases cell proliferation {#S4} ------------------------------------------------------------------ Guided by our previous data showing that EZH2 overexpression in invasive carcinomas is significantly associated with negative estrogen receptor (ER) status ([@R21]), we concentrated our studies on the ER negative cell lines CAL51 and MDA-MB-231 cells, both of which have high levels of EZH2 protein ([Figure 1A](#F1){ref-type="fig"}) and intact BRCA1 ([@R13]; [@R45]). To directly investigate the contribution of EZH2 to breast tumorigenesis we used short hairpin RNA interference (shRNA) in a lentivirus vector, which effectively downregulated EZH2 expression in breast cancer cells ([Figure 2A](#F2){ref-type="fig"}). EZH2 knockdown in MDA-MB-231 and CAL51 cells significantly decreased proliferation ([Figure 2B](#F2){ref-type="fig"}). [Figure 2C](#F2){ref-type="fig"} shows that the doubling time of both breast cancer cell lines was increased after EZH2 knockdown when compared to empty vector transfected cells (36 h for CAL51 shEZH2 vs. 24 h for CAL51/vector, and 33 h for MDA-MB-231 shEZH2 vs. 24 h for MDA-MB-231/vector, ANOVA p\<0.05 for both cell lines). Of note, EZH2 knockdown did not induce apoptosis, as assessed by annexin V staining of nuclei and flow cytometry (6.11 % shEZH2 vs 6 % control). EZH2 knockdown induces a delay in the G2 phase of the cell cycle and decreases the mitotic activity of breast cancer cells {#S5} -------------------------------------------------------------------------------------------------------------------------- We wished to understand the observed variability of EZH2 expression in active cell growth. For this, we analyzed the number and distribution of cells in the phases of the cell cycle by flow cytometry. As shown in [Figure 3A](#F3){ref-type="fig"}, EZH2 knockdown significantly increased the number of cells at the G2/M transition. In asyncronized CAL51 cell cultures, EZH2 knockdown resulted in 30 % increase in the number of cells in G2/M when compared to empty vector transfected cells, normalized to total cell count. We next investigated the effect of EZH2 on crucial G2/M checkpoint proteins. For this, nuclear extracted fractions of CAL51 shEZH2 and vector controls were anayzed for the level of hyperphosphorylated mitotic Cdc25C, Cdc2 and Cdc2-Tyr15 phosphorylation, whose activities are essential for entry into mitosis ([@R4]; [@R17]; [@R28]; [@R34]), as well as for total Cdc25C protein. As shown in [Figure 3B](#F3){ref-type="fig"}, EZH2 knockdown resulted in decreased hyperphosphorylated mitotic Cdc25C and increased Cdc2 and Cdc2-Tyr15 phosphorylation, further supporting the observed G2 delay. To directly determine the effect of EZH2 on the mitotic activity of breast cells, we monitored the mitotic fractions of cultured cells using the mitotic marker phosphorylated histone H3 using both immunofluorescence and flow cytometry. EZH2 knockdown caused over 50 % reduction in the percentage of breast cancer cells undergoing mitosis ([Figure 3C](#F3){ref-type="fig"}). Consistent with this result, overexpression of EZH2 in MCF10A cells resulted in a four-fold increase in the mitotic activity ([Figure 3C](#F3){ref-type="fig"}, right). The overexpression of EZH2 was confirmed by immunoblot analysis ([Figure 3C](#F3){ref-type="fig"}, inset). Collectively, these data show that EZH2 plays a role in the regulation of the G2/M transition and the number of cells undergoing mitosis, which have a major influence in tumor growth. EZH2 knockdown decreases *in vivo* proliferation and tumorigenicity, and improves survival of mice {#S6} -------------------------------------------------------------------------------------------------- We analyzed the effect of EZH2 knockdown on MDA-MB-231 xenograft tumor growth and survival of immunocompromised mice. Two groups of mice were injected in the mammary fat pads with MDA-MB-231 shEZH2 (10 mice), and MDA-MB-231 sh-control (10 mice). Quantitative real time RT-PCR and immunohistochemistry confirmed the stable down-regulation of EZH2 in the MDA-MB-231 shEZH2 tumors compared to controls ([Supplementary Figure 1](#SD3){ref-type="supplementary-material"}). MDA-MB-231 cells with shRNA knockdown of EZH2 exhibited a slower tumor growth rate and smaller tumor volumes than controls (p = 0.014 based on mixed effects regression model for the serial tumor volume measurements, [Figure 4A](#F4){ref-type="fig"}). Importantly, mice bearing MDA-MB-231 shEZH2 tumors had a significantly better survival when compared to control mice (log rank p = 0.016). Histopathologic examination of the tumors resulting from the different experimental groups did not reveal significant morphological differences. We observed a striking difference in the mitotic activity of the tumors. Xenografts formed by MDA-MB-231 cells transfected with the empty vector exhibited high mitotic activity (mean 7.8 mitoses per high power field, 400x). In contrast, tumors derived from MDA-MB-231 shEZH2 cells had markedly decreased number of mitoses (mean 3.5 mitoses per high power field) ([Figure 4B](#F4){ref-type="fig"}). Taken together, these data show for the first time that EZH2 down-regulation decreases *in vivo* mitotic activity and breast tumor growth, and set the foundation for further studies to explore EZH2 as a therapeutic target for breast cancer. The EZH2 effects on cell proliferation and G2/M transition require BRCA1 {#S7} ------------------------------------------------------------------------ Studies including our own have demonstrated that EZH2 overexpression in human breast carcinomas is associated with the ER negative basal-like phenotype, characterized by low BRCA1 protein expression ([@R2]; [@R21]; [@R38]). We next tested the hypothesis that EZH2 may promote breast tumorigenesis by regulating BRCA1 in this subtype of breast cancer. As shown in [Figure 5A](#F5){ref-type="fig"}, EZH2 down-regulation increased the protein levels of total BRCA1 and BRCA1 phosphorylated at serine 1423 (pBRCA1 s1423) in the nuclei of MDA-MB-231 and CAL51 breast cancer cells. Consistently, ectopic expression of EZH2 in non-tumorigenic MCF10A breast cells resulted in 75 % decrease in nuclear BRCA1 protein and in 67 % decrease in nuclear pBRCA1 s1423 ([Figure 5B](#F5){ref-type="fig"}). We further confirmed the *in vivo* upregulation of BRCA1 protein by EZH2 knockdown ([Figure 5C](#F5){ref-type="fig"}). To investigate whether the effects of EZH2 down-regulation on cell proliferation and transition from the G2 phase to mitosis necessitate BRCA1 protein, we employed shRNA to knockdown BRCA1 in CAL51 cells with EZH2 down-regulation and controls. As expected, BRCA1 shRNA resulted in almost complete inhibition of nuclear BRCA1 protein compared with cells transfected with the empty vector. In CAL51 shEZH2 cells, BRCA1 shRNA effectively reduced BRCA1 protein to levels similar to the empty vector transfected cells, and therefore, specifically abrogated the increase in BRCA1 caused by EZH2 knockdown ([Figure 6A](#F6){ref-type="fig"}). To ascertain the role of BRCA1 in EZH2 mediated cell proliferation, we subjected these breast cancer cells to proliferation assays and flow cytometry. [Figures 6B and 6C](#F6){ref-type="fig"} show that BRCA1 knockdown in shEZH2 CAL51 cells was sufficient to completely rescue the reduction in cell proliferation and the G2/M arrest caused by EZH2 down-regulation. Of note, inhibition of BRCA1 in CAL51 cells had no effect in their proliferative activity. This result is not surprising given previous studies showing that BRCA1 knockdown in breast and prostate cancer cells does not affect their proliferation kinetics ([@R3]). Entry into mitosis is tightly regulated by the Cdc2/Cyclin B1 complex ([@R33]). Cdc25C is the key enzyme that triggers the activation of CyclinB1/Cdc2 by dephosphorylating Cdc2 at Thr14 and Tyr15 ([@R11]). Our data show that BRCA1 knockdown abolished the effect of EZH2 inhibition on the levels of Cdc25C mitotic protein ([Figure 6D](#F6){ref-type="fig"}) as well as the levels of total and phosphorylated Cyclin B1 ([Figure 6E](#F6){ref-type="fig"}). Taken together, these data provide strong evidence supporting the hypothesis that the decrease in cell proliferation and prolongation of G2 caused by EZH2 knockdown require BRCA1. ER negative invasive breast carcinomas exhibit high EZH2 and low pBRCA1 proteins {#S8} -------------------------------------------------------------------------------- To investigate the relevance of our *in vitro* and *in viv*o xenograft studies to human breast cancer, we investigated the expression of pBRCA1 s1423 in tissue samples that we have previously characterized for ER and EZH2 proteins ([@R21]). These tissues consisted of 136 consecutive invasive breast carcinomas. Immunohistochemical analysis showed that pBRCA1 s1423 protein was localized exclusively to the nuclei of cancer cells, and was scored as positive or negative ([Figure 7A](#F7){ref-type="fig"}). We found a novel significant association between pBRCA1 s1423 expression and ER status. Forty three of 86 (50 %) ER positive tumors were negative for pBRCA1 s1423, while 38 of 50 (76 %) ER negative tumors were negative for pBRCA1 s1423 (Fisher's exact test p=0.015). Importantly, concomitant with elevated EZH2 protein expression, ER negative invasive breast carcinomas had significantly reduced pBRCA1 s1423 expression (Chi square test, p\<0.0001, [Table 1](#T1){ref-type="table"}). Discussion {#S9} ========== EZH2 is an independent marker of recurrence and metastasis in women with breast cancer ([@R21]). EZH2 overexpression occurs mainly in the basal-type tumors, characterized by ER, PR, and Her-2/neu negative status as well as low levels of BRCA1 protein ([@R2]; [@R8]). A major novel finding presented in our study that EZH2 down-regulation in aggressive ER negative breast cancer cells greatly decreases their proliferative capacity and rate of progression through the cell cycle. Specifically, we found that EZH2 knockdown prolonged the doubling time of ER negative breast cancer cell lines, and caused an arrest at the G2/M transition of the cell cycle, with corresponding changes in mitotic Cdc25C, Cdc2 and Cdc2-Tyr15 phosphorylation. Consequently, EZH2 knockdown led to a decreased number of breast cancer cells undergoing mitosis. In support of these data, ectopic expression of EZH2 in the non-tumorigenic MCF10A cells caused a striking increase in the mitotic fraction. Work from our and other laboratories support these findings. Braken et al demonstrated that ectopic overexpression of EZH2 promotes cell proliferation in human diploid fibroblasts, and that EZH2 siRNA inhibits BrdU incorporation suggesting a role for EZH2 for progression through the cell cycle ([@R5]). Varambally et al reported that EZH2 siRNA induces a G2/M arrest in prostate cell lines ([@R39]). Using tissue samples, it has been shown that EZH2 overexpression is significantly associated with increased proliferative activity determined by detection of the Ki-67 antigen in ductal carcinoma *in situ* and invasive carcinomas of the breast ([@R2]; [@R10]). There have been intensive studies concerning the oncogenic mechanism underlying EZH2 overexpression. Both repression and activation of genes that regulate fundamental processes have been implicated, and new mechanisms that do not involve gene transcription have been proposed ([@R32]; [@R35]; [@R36]). However, direct demonstration of EZH2's function in *in vivo* breast tumorigenesis is currently lacking. In the present study, we show that EZH2 modulates breast cell proliferation and tumor growth *in vivo*. Targeted down-regulation of EZH2 in aggressive ER negative breast cancer cells resulted in a significant reduction of mammary tumor size as well as better survival. Although the histological features of the EZH2 inhibited and control tumors were similar, we found that EZH2 knockdown decreased the mitotic activity of breast cancer cells. Our xenograft mouse models thus suggest that EZH2 inhibiting compounds may have potential utility in treating ER negative breast cancer patients, and provide the foundation for the design of pre-clinical models. In addition to its role in hereditary breast cancer, BRCA1 expression is reduced in up to 40 % of sporadic breast carcinomas ([@R37]; [@R38]; [@R41]; [@R44]). Although BRCA1 promoter methylation is responsible for BRCA1 reduction in 10--15 % of sporadic breast carcinomas, it does not explain BRCA1 deficiency in the remainder of the tumors and it has been suggested that a group of ER basal-like breast carcinomas are characterized by BRCA1 deficiency ([@R37]; [@R38]). Discovery of novel strategies to restore BRCA1 expression and function is highly desirable to develop therapies for women carrying BRCA1-deficient tumors. It has been proposed that the function BRCA1 in cell cycle regulation complements its role in DNA damage response, by allowing time for DNA repair to occur more effectively ([@R26]; [@R40]). We demonstrate that EZH2 knockdown in ER negative breast cancer cell lines causes up-regulation of BRCA1 protein levels with a concomitant increase in pBRCA1 s1423; the total amount of the latter being crucial for G2/M arrest ([@R9]; [@R42]). Consistently, ectopic overexpression of EZH2 in benign breast cells decreased nuclear BRCA1 and pBRCA1 s1423 protein levels. The *in vivo* relevance of these findings is underscored by our xenograft mouse models showing that EZH2 knockdown increased BRCA1 and pBRCA1 s1423 proteins in the nuclei of breast cancer cells *in situ*. Of note, our data demonstrate that the observed effects of EZH2 down-regulation on breast cancer cell proliferation and G2/M transition require BRCA1, as BRCA1 inhibition was sufficient to completely rescue the decrease in cell proliferation and the delay in G2 caused by EZH2 down-regulation. Ectopic overexpression of BRCA1 in breast cancer cells has been shown to cause G2/M arrest by regulating the levels and activity of Cdc2/Cyclin B1 complex and the dual phosphatase Cdc25C, both of which are essential for G2/M checkpoint control ([@R25]; [@R43]). At the G2/M transition, hyperphosphorylation of Cdc25C on several sites within its regulatory N-terminal domain coincides with mitotic activation of Cdc25C ([@R4]; [@R6]; [@R30]; [@R34]). Once activated, Cdc25C is able to dephosphorylate Ccd2-Tyr15, which increases the activity of the Cdc2/Cyclin B1 complex and results in entry into mitosis ([@R11]). Providing strong evidence in support of EZH2 participation in BRCA1-mediated G2/M checkpoint control, EZH2 knockdown decreased nuclear mitotic Cdc25C, increased Cdc2 and Cdc2-Tyr15 phosphorylation, and decreased total and phosphorylated Cyclin B1. Importantly, BRCA1 knockdown reverted the effects of EZH2 down-regulation on the levels of both mitotic Cdc25C, and total and phosphorylated Cyclin B1. Our experiments show that EZH2 knockdown is sufficient to increase BRCA1 levels in breast cancer cells and trigger similar effects in G2/M as those reported after ectopic expression of BRCA1 using an adenovirus vector in the absence of ionizing irradiation ([@R25]; [@R43]). We propose that EZH2 knockdown in breast cancer cells reduces their growth by enhancing the cell cycle regulatory effects of BRCA1, slowing the transition from G2 to M phases, and allowing more time for DNA repair to occur. This hypothesis is supported by our experiments showing that breast cancer cells with EZH2 knockdown have increased levels of pBRCA1 s1423 protein, which is crucial for G2/M arrest and is activated during the DNA damage response ([@R42]). Even though the precise mechanism by which EZH2 modulates BRCA1 protein levels will require further studies, unpublished preliminary data from our laboratory suggest that it does not involve BRCA1 gene transcription since EZH2 knockdown had no effect on BRCA1 messenger RNA. This finding is not surprising in light of studies showing that EZH2 regulates the activity of Cdc42 without directly affecting its transcription ([@R35]). Furthermore, we have no evidence by co-immunoprecipitation of a direct interaction between EZH2 and BRCA1 proteins (data not shown). A functional connection of EZH2 and BRCA1 proteins is currently under investigation. The relevance of the association between EZH2 and BRCA1 proteins to human breast cancer is highlighted by the finding that 76 % of ER negative invasive carcinomas overexpress EZH2 and are negative for pBRCA1 s1423 protein. Previous studies have demonstrated that ER negative breast carcinomas have significantly lower BRCA1 protein than ER positive tumors ([@R38]). However, the expression of pBRCA1 s1423 has not been reported. Our study shows for the first time that pBRCA1 s1423 levels are significantly associated with the ER status of invasive breast carcinomas as invasive carcinomas with negative ER exhibit significantly higher levels of pBRCA1 s1423 protein. In conclusion, our results demonstrate a previously undescribed function of EZH2 during ER negative breast cancer progression by showing that EZH2 knockdown decreases tumor proliferation and growth *in vivo* and *in vitro*, and influences the transition from G2 phase to mitosis. We provide the first link between EZH2 and BRCA1 proteins and show that EZH2 knockdown depends on BRCA1 up-regulation to decrease breast cancer proliferation and progression through G2 phase ([Figure 7B](#F7){ref-type="fig"}). Our data raise a novel hypothesis that restoration of BRCA1 function by EZH2 knockdown may effectively decrease tumor progression enabled by BRCA1 deficiency, and provide a new lead toward future developments of specific strategies to restore BRCA1 levels and function, and for possible prevention of ER negative tumors. Methods {#S10} ======= Cell lines {#S11} ---------- SUM149 cell line was developed and provided by S.P. Ethier (Karmanos Cancer Institute, Detroit, MI). Additional breast cancer cell lines and immortalized human mammary epithelial cell lines (MCF10A) were obtained from the American Type Culture Collection (AATC, Manassas, VA) and grown under recommended conditions. Western immunoblots {#S12} ------------------- Immunoblot analysis was performed as previously described ([@R21]) using 100 µg of nuclear enriched fractions extracted with NE-Per kit, (Pierce, Rockford, IL), or whole cell extract as indicated in the legends. The following antibodies were used: mouse anti-β-actin (1:10,000), mouse anti-α-tubulin (1:1000), goat anti-rabbit:HRP secondary antibody (1:10,000), and goat anti-mouse HRP also (1:10000). These antibodies were purchased from Sigma (St Louis, MO). In addition, we used anti-EZH2 (1:1000, BD Biosciences, San Jose, CA), anti-BRCA1 (D-9) (1:200, Santa Cruz Biotechnology, Santa Cruz, CA), anti-phospho-BRCA1 (Ser1423) (1:1000, ABCAM, Cambridge, MA), anti-cdc25C (5H9), anti-cdc2, anti-phosphor-cdc2-tyr15, used at 1:1000 dilution, from Cell Signaling Technology, Danvers, MA, anti-Cyclin B1 (1:1000 dilution, Calbiochem, EMD Chemicals, La Jolla, CA) and anti-phospho-Cyclin B1 (Ser126) (1:1000 dilution, Novus Biologicals, Littleton, CO). Control immunoblots using preimmune IgG confirmed the specificity of the antibodies. Semi-quantitative protein expression levels were determined by densitometry using IMAGE J 1.38x software. Cell synchronization {#S13} -------------------- Cells were synchronized with a double thymidine block as described previously ([@R14]). Briefly, cells were incubated in medium containing 2 mM thymidine for 12 hours, released into their normal medium for 8--10 hours, and then incubated for 12 hours in medium containing 2 mM thymidine (See [Supplemental Methods](#SD1){ref-type="supplementary-material"} for details). Knockdown of shEZH2 and shBRCA1 in breast cancer cells {#S14} ------------------------------------------------------ To generate stable hairpin short interfering RNA-EZH2 and RNA-BRCA1 in MDA-MB-231 and/or CAL51 breast cancer cells, cells were transduced with lentivirus and selected for antibiotic resistance in ATCC recommended media with puromycin (100 µg/ml, Sigma), at 37°C under 10% CO~2~. Lentivirus was purchased from the Vector Core, University of Michigan. Background vector control was Lenti-PuroEMPTY-VSVG. For targeting *EZH2* (NM_152998 NCBI) and *BRCA1* (NM_009764 NCBI) the shRNA oligos ID used were as follows: V2LHS_17507 targeting EZH2 and V2LHS_254648 targeting BRCA1, corresponding to these catalog numbers RHS4430-99139126 and RHS4430-99157192 respectively from Open Biosystems, Huntsville, AL. EZH2 overexpression in non-tumorigenic mammary epithelial cells {#S15} --------------------------------------------------------------- To generate MCF10A cells stably overexpressing EZH2, MCF10A cells were transduced with a lentivirus construct containing EZH2 or empty vector, and cultured in growth media supplemented with puromycin (100ug/ml). Lentivirus bearing the control vector: pLentiLoxRSV-puro was purchased from the Vector Core at the University of Michigan. *EZH2* gene was isolated from pCDNA3-myc EZH2 plasmid (gift of Dr. Chinnaiyan). Lentiviral Transduction {#S16} ----------------------- Briefly, cell transductions were performed in 6-well plates using short hairpin RNA in a lentivirus vector targeting *EZH2* and *BRCA1* or lentivirus overexpressing EZH2 for 48 h and selecting for two weeks for puromycin resistance colonies. Cell Proliferation {#S17} ------------------ Cells were plated at the same density and cultured for 24 hours in a 96-well microplate. WST-1 reagent was added and absorbance at 450 nm was measured after 3 hours of incubation, following the manufacturer's instructions (Roche Molecular Systems, Pleasanton, CA). Mitotic Index {#S18} ------------- CAL51-shRNA (control, EZH2, and BRCA1) cells were grown in 100-mm plates and fixed at 70 % (v/v) ethanol at −20 °C for 2 h, then incubated with a rabbit antibody to pH3 (anti-phospho histone H3, Ser10 mitotic maker, Upstate Biotechnology, Lake Placid, NY). Cells were then stained with Alexa Fluor-633 goat anti-rabbit IgG (H+L) (Invitrogen Molecular Probes, Carlsbad, CA). Stained cells were treated with RNase A, incubated with propidium iodide and then analyzed by flow cytometry. Breast Tumor Xenografts {#S19} ----------------------- Ten week-old SCID mice (Jackson Laboratories, Bar Harbor, Maine) were used for examining tumorigenicity. To evaluate the role of EZH2 down-regulation in tumor 20 formation, shEZH2 MDA-MB-231 cells or vector control cells were orthotopically injected into the mammary fat pad at a concentration of 2 ×10^6^ cells in 20 mice (n = 10 mice per group). Additional information can be found in the [Supplemental Methods](#SD1){ref-type="supplementary-material"}. Real-time Quantitative PCR {#S20} -------------------------- Total RNA was isolated from following the manufacturer's instructions with the RNeasy kit, (QIAGEN Inc., Valencia, CA). cDNA samples from breast cancer cells were amplified in triplicate from the same starting material of total RNA following the manufacturer's instructions (High-Capacity cDNA reverse Transcription kit, Applied Biosystems, Foster City, CA). Samples were amplified using TaqMan MGB FAM dyelabeled probes from Applied Biosystems (Foster City, CA) in an ABI7900HT model Real-Time PCR machine. The following probes were used: Hs99999903_m1 *(ACTIN)*, Hs00173233_m1 (*BRCA1*) and Hs00544830_m1 *(EZH2)*. Human Tissue Specimens and immunohistochemical analysis {#S21} ------------------------------------------------------- A high-density tissue microarray (TMA) containing 136 consecutive invasive carcinomas of the breast, previously analyzed for ER and EZH2 ([@R21]) was employed. A 5 µthick section was immunostained using a rabbit polyclonal antipBRCA1 s1423 antibody at 1:700 (Abcam, catalog number AB2838, Cambridge, MA) following standard biotin-avidin complex technique ([@R21]). Details are in the [Supplemental Methods](#SD1){ref-type="supplementary-material"}. Supplementary Material {#SM} ====================== We thank Dr. Arul Chinnaiyan for the EZH2 plasmid, and Tracey Filzen for technical support. This work was supported by NIH grants CA090876 (CGK), CA107469 (CGK), CA77612 (SDM), a grant from the Avon Foundation (CGK), a grant from the Burroughs Wellcome Fund (SDM), and a grant from the Department of Defense Breast Cancer Research Program (ACV). ![EZH2 is upregulated and deregulated in breast cancer cells\ **A.** Immunoblot for EZH2 in a panel of breast cells shows that EZH2 protein is elevated in breast cancer cells when compared to the non-tumorigenic MCF10A cell line. **B.** EZH2 is deregulated in breast cancer cell lines compared to MCF10A cells. Cells were synchronized using a double thymidine block that induces a cell block in G1 phase and were released into their culture medium to progress to S phase. Western immunoblots were performed concomitantly with flow cytometry analysis (not shown). Note that while EZH2 protein in benign MCF10A cells is cell growth regulated and accumulate at the G1/S transition as has been previously reported ([@R5]), this regulation is lost in breast cancer cell lines.](nihms76277f1){#F1} ![EZH2 inhibition decreases proliferation of breast cancer cells\ **A.** Immunoblot analysis of EZH2 in stable vector and EZH2 shRNA breast cancer cells. MDA-MB-231 and CAL51 cells were stably transfected with EZH2 shRNA in a lentivirus vector or empty vector control. **B.** EZH2 inhibition in MDA-MB-231 and CAL51 breast cancer cells decreases proliferation, as measured with the Wst-1 assay at 6 days after plating the cells. Significant inhibition of proliferation is seen in cells transfected with EZH2 shRNA relative to those transfected with the empty vector (Student\'s *t*-test, *P* \< 0.001 for both cell lines). **C.** Time course of proliferation determined using the Wst-1 assay. shEZH2 in CAL51 and MDA-MB-231 cells significantly decreases their doubling time when compared to vector control transfected cells (Student\'s *t*-test, *P* \< 0.001 for both cell lines). Data are from at least three independent experiments carried out in triplicate.](nihms76277f2){#F2} ![EZH2 knockdown induces G2/M cell cycle arrest in breast cancer cells\ **A.** DNA content analysis by flow cytometry. Samples were fixed and stained with PI. PI-stained cells were gated on the basis of their DNA content. The percentage of cells with 4N-DNA content, indicative of G2/M phase of the cell cycle, are indicated. EZH2 knockdown increases the number of cells at G2/M. **B.** Immunoblot analyses show that EZH2 knockdown in CAL51 cells affects the levels of proteins crucial in G2/M transition including phosphorylated mitotic Cdc25C, total Cdc2 and Cdc2 phosphorylated at Tyr15 in the nuclear fractions of the cells. No effect was noted on total Cdc25C protein. In immunoblots, the numbers underneath each band indicate the fold change in intensity of the corresponding band relative to the control. **C.** Left, EZH2 knockdown decreases the number of cells undergoing mitosis as determined by flow cytometry using phosphorylated histone 3 antibody. Right, EZH2 overexpression in MCF10A cells increases the number of cells in mitosis. Inset shows an immunoblot using anti-EZH2 antibody demonstrating EZH2 overexpression in MCF10A cells.](nihms76277f3){#F3} ![EZH2 down-regulation inhibits breast tumor growth *in vivo*\ **A**. Stable MDA-MB-231- shEZH2 cells have reduced tumor growth in a xenograft mouse model. Tumor growth rates significantly different between the control and EZH2 knockdown cells, mixed effects regression model (p=0.014). **B.** Histopathological study of the tumors shows no significant morphological differences. Both tumors are poorly differentiated and growing in sheets of malignant cells. Note that tumors formed by EZH2 shRNA cells had decreased mitotic activity than tumors derived from empty vector transfected cells. The arrows show mitotic figures (Hematoxylin and eosin stain, light microscopy, x400). The bar graph shows the quantification of the mitotic activity in the xenografts. The number of mitosis per high power field was quantified by light microscopy in at least 5 high power fields per tumor in all xenografts (n = 10 per group, two groups). Error bars: n = 10, mean ± SD Student's t test p \< 0.001.](nihms76277f4){#F4} ![EZH2 knockdown up-regulates BRCA1 protein levels in breast cancer *in vivo* and *in vitro*\ **A and B.** Immunoblot analyses of EZH2, BRCA1, BRCA1 phosphorylated at serine 1423, and α-tubulin proteins in breast cancer cells MDA-MB-231 and CAL51 (A), and in non-tumorigenic spontaneously immortalized breast cells MCF10A following stable lentiviral-mediated EZH2 overexpression or transfected with the empty vector (B). **C.** *In vivo* association of EZH2 and BRCA1 protein expression. Representative immunostaining of EZH2, BRCA1, and BRCA1 phosphorylated on serine 1423 (pBRCA1-s1423) in tumor xenografts derived from MDA-MB-231 shEZH2 cells and controls. Magnification 600x.](nihms76277f5){#F5} ![The effects of EZH2 on cell proliferation and G2/M transition require BRCA1\ **A.** CAL51 cells were transfected with vector or EZH2 shRNA alone or in combination with BRCA1 shRNA. Immunoblots show strong up-regulation of BRCA1 in EZH2 shRNA CAL51 cells when compared to CAL51 cells transfected with the empty vector. BRCA1 knockdown in the setting of EZH2 down-regulation abrogates the increase in BRCA1 protein to levels similar to vector transfected cells. **B.** BRCA1 knockdown is sufficient to rescue the effect of EZH2 inhibition on cell proliferation. Inhibition of BRCA1 in CAL51 cells does not affect cell proliferation, as has been previously reported by Rosen and coworkers ([@R3]). **C.** BRCA1 knockdown rescues the effect of EZH2 inhibition on G2/M cell cycle arrest by DNA content analysis by flow cytometry. **D and E.** Consistently, BRCA1 knockdown reverts the effect of EZH2 down-regulation on crucial proteins that regulate G2/M transition: phosphorylated Cdc25C and total and phosphorylated Cyclin B1 in nuclear fractions of CAL51 cells.](nihms76277f6){#F6} ![EZH2 expression is associated with phosphorylated BRCA1 in ER negative human breast carcinoma tissue samples\ **A.** Human breast cancer tissue samples (n=136) immunostained for EZH2 and pBRCA1 s1423. Representative ER negative invasive carcinomas with low EZH2 expression and positive p-BRCA1 s1423 levels (*TOP*), and another tumor with high expression of EZH2 and negative p-BRCA1 s1423 proteins (*BOTTOM*). **B.** Working model for the role of EZH2 in cell proliferation and breast tumor development. Based on our data, we propose that EZH2 regulates the levels of BRCA1 protein and its serine 1423 phosphorylation in the breast epithelium. Low levels of EZH2, as occurs in normal breast epithelial cells ([@R10]; [@R21]), regulate BRCA1 and control cell proliferation in the normal breast epithelium by regulating the levels of Cdc25C and the Cdc2-CyclinB1 complex. EZH2 overexpression results in decreased BRCA1 and pBRCA1 s1423 with 30 high levels of Cdc2-CyclinB1 complex and uncontrolled proliferation and mitosis, which contributes to breast carcinogenesis.](nihms76277f7){#F7} ###### Association between EZH2 and pBRCA1 s1423 proteins in invasive carcinomas of the breast according to the ER status Parameter EZH2 high pBRCA1 s1423− EZH2 high pBRCA1 s1423+ EZH2 low pBRCA1 s1423− EZH2 Low pBRCA1 s1423+ *P*[\*](#TFN1){ref-type="table-fn"} ------------- ------------------------- ------------------------- ------------------------ ------------------------ ------------------------------------- N % N % N % N % ER negative 29 (76.3) 9 (75) 9 (23.7) 3 (25) \<0.0001 ER positive 16 (50) 16 (50) 27 (50) 27 (50) NS Chi square test
Mid
[ 0.6474820143884891, 33.75, 18.375 ]
Zhang Shuai shows her sympathy to an injured Madison Keys after their match at the Australian Open. Photograph: Mark Kolbe/Getty Images Nine days ago, Zhang Shuai was nearly on a plane back to China before the Australian Open began. The French veteran Virginie Razzano was serving for the match against her in the final round of qualifying, but Zhang was able to break back and win the third set 8-6 — along with a spot in the main draw. Now, the No133-ranked Zhang, who considered retiring from tennis after a dismal 2015 season, is into the quarter-finals of the season’s first major after defeating an injured Madison Keys 3-6, 6-3, 6-3 on Monday. Johanna Konta beats Ekaterina Makarova to reach Australian Open last eight Read more Keys, who broke through to reach her first grand slam semi-final in Melbourne last year, dominated the first set with powerful groundstrokes that Zhang had trouble returning, breaking the Chinese player at love in the opening game of the match. But the American began to feel pain in her left leg early in the second set and, after taking a medical timeout to have her upper thigh wrapped, had difficulty putting any weight on her leg to serve and looked increasingly in pain as the match wore on. She later said she kept playing because “One, I hate retiring. Two, you don’t want to do that to someone who is trying to get into the quarter-finals.” At the start of the third set, she broke Zhang to take a 2-1 lead. But the trainer returned soon after to treat Keys again and she finished the match slicing shots into the court with no power behind them, tears streaming down her face. “So difficult to concentrate when I saw her [in pain], it’s so tough to continue to play,” Zhang said in her post-match interview.
Mid
[ 0.59090909090909, 35.75, 24.75 ]
The present invention refers to a heat pump arrangement for heating purposes comprising a vaporizer designed as a heat exchanger, a compressor for compression of a vaporized medium and a condensor incorporated in a heat distribution system, at which the vaporizer is designed as an icing machine arranged to produce ice slush, and the heat generated during the ice formation is emitted to the vaporizer. There are nowadays strong attempts to economize on energy sources in all ways. For heating purposes solar energy and heat pump technique are therefore two alternative solutions, which become more and more intersesting but which also have their limitations. For heating purposes solar energy is collected with solar energy collectors, from which the heat is transferred by means of e.g. air or water. Solar energy collectors can only collect a part of the solar energy which is radiated towards it. The efficiency can be about 50%, but depends strongly on a plurality of factors, e.g. the over-temperature of the collector in relation to the air temperature. The efficiency decreases with a rising over-temperature and vice versa. Another problem when utilizing solar energy for heating purposes is that the intensity of the sun is highest during the summer and lowest during the winter and thus inversely related to the heating demands. For this reason some kind of heat accumulator and/or alternative energy sources must be installed in the system. In some plants they have tried to supply the heating requirements only with the collected solar energy. In this case it is necessary to work with relatively high temperatures on the collectors, and energy must be stored from the summer to the winter. Owing to the high temperatures the efficiency of the collector is considerably decreased, which means that collectors with very large surface areas must be used. Such a plant also needs a big accumulator volume, i.e. due to the fact that the temperaure only can vary between narrow limits (about +95.degree. C. when fully loaded to about +45.degree. C. when the accumulator is unloaded). There have also been attempts to use salt solutions of different kind in order to increase the stored energy per unit of volume and by that decrease the accumulated volume. In order to decrease the accumulated volume and temporarily increase the efficiency of the collectors, solar energy collectors are sometimes combined with a heat pump. The vaporizer of the heat pump takes heat from the solar energy collector/accumulator system and delivers heat at a higher temperature by means of the condensor to the heat system. By this combination the temperature variation of the accumulator can increase and its volume can be reduced. However the surface areas of the collectors, as the accumulator volume, are still very large if the entire annual heat requirements of a building shall be supplied in this way. In many cases attempts have been made to supply the heat requirements only by means of heat pumps without solar energy collectors and accumulators. The heat pump then has to take heat from the air or from the ground. The efficiency or heat factor of the heat pump decreases strongly when the temperature of the primary heat source--in this case the outdoor air or the ground--is low, and is therefore especially unfavorable during cold periods when the heat requirement are highest. The heat pump working with heat from the ground further have the disadvantages that it can be used only for special ground conditions, it has to be placed on a large depth and a large surface of the heat absorbing tube coils is required.
Mid
[ 0.5701559020044541, 32, 24.125 ]