text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
--- author: - | Andrey G. Grozin$^{a,b}$, Maik Höschele$^b$, Jens Hoff$^b$ and Matthias Steinhauser$^b$\ $^a$ Budker Institute of Nuclear Physics, Novosibirsk 630090, Russia\ $^b$ Institut für Theoretische Teilchenphysik, Karlsruher Institut für Technologie,\ D-76128 Karlsruhe, Germany\ E-mail: , , and title: Simultaneous decoupling of bottom and charm quarks --- Introduction {#S:Intro} ============ QCD where all six quark flavours are treated as active degrees of freedom is rarely used in practical applications. If the characteristic energy scale is below some heavy-flavour masses, it is appropriate to construct a low-energy effective theory without those heavy flavours. The Lagrangian of this theory has the same form as the one of QCD plus corrections suppressed by powers of heavy-quark masses. Usually, heavy flavours are decoupled one at a time which results in a tower of effective theories, each of them differ from the previous one by integrating out a single heavy flavour. The parameters of the Lagrangian of such an effective low-energy QCD ($\alpha_s(\mu)$, the gauge fixing parameter $a(\mu)$, light-quark masses $m_i(\mu)$) are related to the parameters of the underlying theory (including the heavy flavour) by so-called decoupling relations. The same holds for the light fields (gluon, ghost, light quarks) which exist in both theories. QCD decoupling constants are known at two- [@Bernreuther:1981sg; @Larin:1994va; @Chetyrkin:1997un], three- [@Chetyrkin:1997un] and even four-loop order [@Schroder:2005hy; @Chetyrkin:2005ia]. The conventional approach just described ignores power corrections in ratios of heavy-quark masses. Let us, e.g., consider the relation between $\alpha_s^{(3)}$ and $\alpha_s^{(5)}$ (the superscript denotes the number of active flavours). Starting from three loops, there are diagrams containing both $b$- and $c$-quark loops which depend on $m_c/m_b$. The power correction $\sim(\alpha_s/\pi)^3\,(m_c/m_b)^2$ is not taken into account in the standard approach, although, it might be comparable with the four-loop corrections of order $(\alpha_s/\pi)^4$. In the present paper, we consider $(m_c/m_b)^n$ power corrections at three loops by decoupling $b$ and $c$ quarks in a single step. Of course, the results presented in this paper are generic and apply to any two flavours which are decoupled simultaneously from the QCD Lagrangian. Our full theory is QCD with $n_l$ light flavours, $n_c$ flavours with mass $m_c$, and $n_b$ flavours with mass $m_b$ (in the real world $n_c=n_b=1$). Furthermore we introduce the total number of quarks $n_f=n_l+n_c+n_b$. We study the relation of full QCD to the low-energy effective theory containing neither $b$ nor $c$. The bare gluon, ghost and light-quark fields in the effective theory are related to the bare fields in the full theory by $$A_0^{(n_l)} = \left(\zeta_A^0\right)^{1/2} A_0^{(n_f)}\,,\quad c_0^{(n_l)} = \left(\zeta_c^0\right)^{1/2} c_0^{(n_f)}\,,\quad q_0^{(n_l)} = \left(\zeta_q^0\right)^{1/2} q_0^{(n_f)}\,, \label{Intro:fields0}$$ where the bare decoupling constants are computed in the full theory via [@Chetyrkin:1997un] $$\begin{aligned} \zeta_A^0(\alpha_{s0}^{(n_f)},a_0^{(n_f)}) &=& 1 + \Pi_A(0) = \left[Z_A^{\rm os}\right]^{-1}\,, \nonumber\\ \zeta_c^0(\alpha_{s0}^{(n_f)},a_0^{(n_f)}) &=& 1 + \Pi_c(0) = \left[Z_c^{\rm os}\right]^{-1}\,, \nonumber\\ \zeta_q^0(\alpha_{s0}^{(n_f)},a_0^{(n_f)}) &=& 1 + \Sigma_V(0) = \left[Z_q^{\rm os}\right]^{-1}\,, \label{Intro:zetafields0}\end{aligned}$$ with $\alpha_{s0}=g_0^2/(4\pi)^{1-\varepsilon}$; $\Pi_A(q^2)$, $\Pi_c(q^2)$ and $\Sigma(q) = \rlap/q \Sigma_V(q^2)+m_{q0} \Sigma_S(q^2)$ are the (bare) gluon, ghost and light-quark self-energies (we may set all light-quark masses to 0 in $\Sigma_V$ and $\Sigma_S$). The fields renormalized in the on-shell scheme coincide in both theories; therefore, the bare decoupling coefficients (\[Intro:zetafields0\]) are the ratio of the on-shell renormalization constants of the fields. In the effective theory all the self-energies vanish at $q=0$ (they contain no scale), and the on-shell $Z$ factors are exactly 1. In the full theory, only diagrams with at least one heavy-quark loop survive.[^1] Next to the fields also the parameters of the full and effective QCD Lagrangian are related by decoupling constants $$\alpha_{s0}^{(n_l)} = \zeta_{\alpha_s}^0 \alpha_{s0}^{(n_f)}\,,\quad a_0^{(n_l)} = \zeta_A^0 a_0^{(n_f)}\,,\quad m_{q0}^{(n_l)} = \zeta_m^0 m_{q0}^{(n_f)}\,, \label{Intro:params0}$$ where $a$ is the gauge parameter defined through the gluon propagator $$D_{\mu\nu}(k) = -\frac{i}{k^2}\, \left( g_{\mu\nu} - (1-a)\, \frac{k_\mu k_\nu}{k^2} \right)\,. \label{eq::gluon_prop}$$ The bare decoupling constants in Eq. (\[Intro:params0\]) are computed with the help of [@Chetyrkin:1997un] $$\begin{aligned} \zeta_{\alpha_s}^0(\alpha_{s0}^{(n_f)}) &=& \left(1+\Gamma_{A\bar{c}c}\right)^2 \left(Z_c^{\rm os}\right)^2 Z_A^{\rm os} = \left(1+\Gamma_{A\bar{q}q}\right)^2\left(Z_q^{\rm os}\right)^2 Z_A^{\rm os} = \left(1+\Gamma_{AAA}\right)^2 \left(Z_A^{\rm os}\right)^3\,, \nonumber\\ \zeta_m^0(\alpha_{s0}^{(n_f)}) &=& Z_q^{\rm os} \left[1 - \Sigma_S(0)\right]\,. \label{Intro:zetaparams0}\end{aligned}$$ The $A\bar{c}c$, $A\bar{q}q$ and $AAA$ proper vertex functions are expanded in their external momenta, and only the leading non-vanishing terms are retained. In the low-energy theory they get no loop corrections, and are given by the tree-level vertices of dimension-4 operators in the Lagrangian. In full QCD (with the heavy flavours) they have just one colour and tensor (and Dirac) structure, namely, that of the tree-level vertices (if this were not the case, the Lagrangian of the low-energy theory would not have the usual QCD form[^2]). Therefore, we have the tree-level vertices times $(1+\Gamma_i)$, where loop corrections $\Gamma_i$ contain at least one heavy-quark loop. The various versions in the first line of Eq. (\[Intro:zetaparams0\]) are obtained with the help of the QCD Ward identities involving three-particle vertices. In our calculation we restrict ourselves for convenience to the ghost–gluon vertex. Note that the gauge parameter dependence cancels in $\zeta_{\alpha_s}^0$ and $\zeta_m^0$ whereas the individual building blocks in Eq. (\[Intro:zetaparams0\]) still depend on $a$. This serves as a check of our calculation. The $\overline{\mbox{MS}}$ renormalized parameters and fields in the two theories are related by $$\begin{aligned} \alpha_s^{(n_l)}(\mu') &=& \zeta_{\alpha_s}(\mu',\mu) \alpha_s^{(n_f)}(\mu)\,,\quad a^{(n_l)}(\mu') = \zeta_A(\mu',\mu) a^{(n_f)}(\mu)\,, \nonumber\\ m_q^{(n_l)}(\mu') &=& \zeta_m(\mu',\mu) m_q^{(n_f)}(\mu)\,,\quad A^{(n_l)}(\mu') = \zeta_A^{1/2}(\mu',\mu) A^{(n_f)}(\mu)\,, \nonumber\\ c^{(n_l)}(\mu') &=& \zeta_c^{1/2}(\mu',\mu) c^{(n_f)}(\mu)\,,\quad q^{(n_l)}(\mu') = \zeta_q^{1/2}(\mu',\mu) q^{(n_f)}(\mu)\,, \label{Intro:ren}\end{aligned}$$ where we allow for two different renormalization scales in the full and effective theory. The finite decoupling constants are obtained by renormalizing the fields and parameters in Eqs. (\[Intro:zetafields0\]) and (\[Intro:params0\]) which leads to $$\begin{aligned} \zeta_{\alpha_s}(\mu',\mu) &=& \left(\frac{\mu}{\mu'}\right)^{2\varepsilon} \frac{Z_{\alpha}^{(n_f)}\left(\alpha_s^{(n_f)}(\mu)\right)}{Z_{\alpha}^{(n_l)}\left(\alpha_s^{(n_l)}(\mu')\right)} \zeta_{\alpha_s}^0\left(\alpha_{s0}^{(n_f)}\right)\,, \nonumber\\ \zeta_m(\mu',\mu) &=& \frac{Z_m^{(n_f)}\left(\alpha_s^{(n_f)}(\mu)\right)}{Z_m^{(n_l)}\left(\alpha_s^{(n_l)}(\mu')\right)} \zeta_m^0\left(\alpha_{s0}^{(n_f)}\right)\,, \nonumber\\ \zeta_A(\mu',\mu) &=& \frac{Z_A^{(n_f)}\left(\alpha_s^{(n_f)}(\mu),a^{(n_f)}(\mu)\right)}{Z_A^{(n_l)}\left(\alpha_s^{(n_l)}(\mu'),a^{(n_l)}(\mu')\right)} \zeta_A^0\left(\alpha_{s0}^{(n_f)},a_0^{(n_f)}\right)\,, \nonumber\\ \zeta_q(\mu',\mu) &=& \frac{Z_q^{(n_f)}\left(\alpha_s^{(n_f)}(\mu),a^{(n_f)}(\mu)\right)}{Z_q^{(n_l)}\left(\alpha_s^{(n_l)}(\mu'),a^{(n_l)}(\mu')\right)} \zeta_q^0\left(\alpha_{s0}^{(n_f)},a_0^{(n_f)}\right)\,, \nonumber\\ \zeta_c(\mu',\mu) &=& \frac{Z_c^{(n_f)}\left(\alpha_s^{(n_f)}(\mu),a^{(n_f)}(\mu)\right)}{Z_c^{(n_l)}\left(\alpha_s^{(n_l)}(\mu'),a^{(n_l)}(\mu')\right)} \zeta_c^0\left(\alpha_{s0}^{(n_f)},a_0^{(n_f)}\right)\,, \label{Intro:zetaren}\end{aligned}$$ where $Z_i^{(n_f)}$ are the $\overline{\rm MS}$ renormalization constants in $n_f$-flavour QCD which we need up to three-loop order. Calculation {#S:Calc} =========== Our calculation is automated to a large degree. In a first step we generate all Feynman diagrams with [QGRAF]{} [@Nogueira:1991ex]. The various diagram topologies are identified and transformed to [FORM]{} [@Vermaseren:2000nd] with the help of [q2e]{} and [exp]{} [@Harlander:1997zb; @Seidensticker:1999bb] (these topologies have been investigated in [@Bekavac:2007tk]). Afterwards we use the program [FIRE]{} [@Smirnov:2008iw] to reduce the two-scale three-loop integrals to four master integrals which can be found in analytic form in Ref. [@Bekavac:2009gz]. As a cross check we apply the asymptotic expansion (see, e.g., Ref. [@Smirnov:2002pj]) in the limit $m_c\ll m_b$ and evaluate five expansion terms in $(m_c/m_b)^2$. The asymptotic expansion is automated in the program [exp]{} which provides output that is passed to the package [MATAD]{} [@Steinhauser:2000ry] performing the actual calculation. In the following we present explicit results for the two-point functions and $\Gamma_{A\bar{c}c}$ needed for the construction of the decoupling constants. Other vertex functions can be easily reconstructed from the bare decoupling coefficient $\zeta_{\alpha_s}^0$ in Section \[S:as\] (see Eq. (\[Intro:zetaparams0\])). Gluon self-energy ----------------- The bare gluon self-energy at $q^2=0$ in the full theory can be cast in the following form[^3] $$\begin{aligned} \Pi_A(0) &=& \frac{1}{3} \left( n_b m_{b0}^{-2\varepsilon} + n_c m_{c0}^{-2\varepsilon} \right) T_F \frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon) \nonumber\\ &&{} + P_h \left( n_b m_{b0}^{-4\varepsilon} + n_c m_{c0}^{-4\varepsilon} \right) T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^2 \nonumber\\ &&{} + \biggl[ \left(P_{hg} + P_{hl} T_F n_l\right) \left( n_b m_{b0}^{-6\varepsilon} + n_c m_{c0}^{-6\varepsilon} \right) + P_{hh} T_F \left( n_b^2 m_{b0}^{-6\varepsilon} + n_c^2 m_{c0}^{-6\varepsilon} \right) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + P_{bc}\left(\frac{m_{c0}}{m_{b0}}\right) T_F n_b n_c \left(m_{b0} m_{c0}\right)^{-3\varepsilon} \biggr] T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^3 + \cdots \label{Calc:Pi0}\end{aligned}$$ where the exact dependence on $\varepsilon=(4-d)/2$ ($d$ is the space-time dimension) of the bare two-loop result is given by $$P_h = \frac{1}{4 (2-\varepsilon) (1+2\varepsilon)} \left[ - C_F \frac{\varepsilon}{3} (9+7\varepsilon-10\varepsilon^2) + C_A \frac{3+11\varepsilon-\varepsilon^2-15\varepsilon^3+4\varepsilon^5}{2 (1-\varepsilon) (3+2\varepsilon)} \right] \label{Calc:Ph}$$ ($C_F=(N_C^2-1)/(2N_C)$ and $C_A=N_C$ are the eigenvalues of the quadratic Casimir operators of the fundamental and adjoint representation of $SU(N_C)$, respectively, and $T_F=1/2$ is the index of the fundamental representation). The three-loop quantities $P_{hg}$, $P_{hl}$ and $P_{hh}$ are only available as an expansion in $\varepsilon$. The analytic results read $$\begin{aligned} P_{hg} &=& C_F^2 \frac{\varepsilon^2}{24} \left[ 17 - \frac{1}{8} \left( 95 \zeta_3 + \frac{274}{3} \right) \varepsilon + \cdots \right] \nonumber\\ &&{} - C_F C_A \frac{\varepsilon}{288} \left[ 89 - \left( 36 \zeta_3 - \frac{785}{6} \right) \varepsilon - 9 \left( 4 B_4 - \frac{\pi^4}{5} + \frac{1957}{24} \zeta_3 - \frac{10633}{162} \right) \varepsilon^2 + \cdots \right] \nonumber\\ &&{} + \frac{C_A^2}{1152} \Biggl[ 3 \xi + 41 - \frac{1}{2} \left( 21 \xi - \frac{781}{3} \right) \varepsilon - \left( 108 \zeta_3 - \frac{137}{4} \xi - \frac{3181}{12} \right) \varepsilon^2 \nonumber\\ &&\hphantom{{}+\frac{C_A^2}{1152}\Biggl[\Biggr.} \!- \left( 72 B_4 - \frac{27}{5} \pi^4 - \left( 24 \xi - \frac{1805}{4} \right) \zeta_3 + \frac{1}{24} \left( 3577 \xi + \frac{42799}{9} \right) \right) \varepsilon^3 + \cdots \Biggr]\,, \nonumber\\ P_{hl} &=& \frac{5}{72} C_F \varepsilon \left[ 1 - \frac{31}{30} \varepsilon + \frac{971}{180} \varepsilon^2 + \cdots \right] \nonumber\\ &&{} - \frac{C_A}{72} \left[ 1 + \frac{5}{6} \varepsilon + \frac{101}{12} \varepsilon^2 + \left( 8 \zeta_3 - \frac{3203}{216} \right) \varepsilon^3 + \cdots \right]\,, \nonumber\\ P_{hh} &=& C_F \frac{\varepsilon}{18} \left[ 1 - \frac{5}{6} \varepsilon + \frac{1}{32} \left( 63 \zeta_3 + \frac{218}{9} \right) \varepsilon^2 + \cdots \right] \nonumber\\ &&{} - \frac{C_A}{144} \left[ 1 + \frac{35}{6} \varepsilon + \frac{37}{12} \varepsilon^2 - \frac{1}{8} \left( 287 \zeta_3 - \frac{6361}{27} \right) \varepsilon^3 + \cdots \right]\,, \label{Calc:P3}\end{aligned}$$ where $\xi=1-a_0^{(n_f)}$, and [@Broadhurst:1991fi] $$B_4 = 16 {\mathop{\mathrm{Li}}\nolimits_{4}}\left(\frac{1}{2}\right) + \frac{2}{3} \log^2 2 (\log^2 2 - \pi^2) - \frac{13}{180} \pi^4\,.$$ A new result obtained in this paper is the analytic expression for $P_{bc}(x)$ which arises from diagrams where $b$ and $c$ quarks are simultaneously present in the loops (see Fig. \[F:Glue\] for typical diagrams). The analytic expression is given by $$\begin{aligned} P_{bc}(x) &=& C_F \frac{\varepsilon}{9} \left[ 1 - \frac{5}{6} \varepsilon + p_F(x) \varepsilon^2 + \cdots \right] \nonumber\\ &&{} - \frac{C_A}{72} \left[ 1 + \frac{35}{6} \varepsilon + \left( \frac{9}{2} L^2 + \frac{37}{12} \right) \varepsilon^2 + p_A(x) \varepsilon^3 + \cdots \right]\,, \label{Calc:Pbc}\end{aligned}$$ with $L=\log x$, $$\begin{aligned} p_F(x) &=& \frac{9}{128} \Biggl[ \frac{(1+x^2)(5-2x^2+5x^4)}{x^3} L_-(x)\\ &&{} - \frac{5-38x^2+5x^4}{x^2} L^2 + 10 \frac{1-x^4}{x^2} L - 10 \frac{(1-x^2)^2}{x^2} \Biggr] + \frac{109}{144}\,,\\ p_A(x) &=& 24 L_+(x) - \frac{3}{4} \frac{(1+x^2)(4+11x^2+4x^4)}{x^3} L_-(x)\\ &&{} + \frac{(1+6x^2)(6+x^2)}{2x^2} L^2 - 6 \frac{1-x^4}{x^2} L + 6 \frac{(1-x^2)^2}{x^2} + 8 \zeta_3 + \frac{6361}{216}\,,\end{aligned}$$ where the functions $L_\pm(x)$ are defined in (\[Ix:L\]). The function $P_{bc}(x)$ satisfies the properties $$P_{bc}(x^{-1}) = P_{bc}(x)\,,\quad P_{bc}(1) = 2 P_{hh}\,, \label{Calc:testPi}$$ which are a check of our result. For $x\to0$, the hard contribution to $P_{bc}(x) x^{-3\varepsilon}$ is given by $P_{hl}$. However, there is also a soft contribution, and it is not possible to obtain a relation between $P_{bc}(x\to0)$ and $P_{hl}$ if they are expanded in $\varepsilon$ (this would be possible for a non-zero $\varepsilon<0$, cf. (\[Ix:0\])). Ghost self-energy ----------------- The bare ghost self-energy at $q^2=0$ can be cast in the form $$\begin{aligned} \Pi_c(0) &=& C_h \left(n_b m_{b0}^{-4\varepsilon} + n_c m_{c0}^{-4\varepsilon}\right) C_A T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^2 \nonumber\\ &&{} + \biggl[ \left(C_{hg} + C_{hl}T_F n_l\right) \left( n_b m_{b0}^{-6\varepsilon} + n_c m_{c0}^{-6\varepsilon} \right) + C_{hh}T_F \left( n_b^2 m_{b0}^{-6\varepsilon} + n_c^2 m_{c0}^{-6\varepsilon} \right) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + C_{bc}\left(\frac{m_{c0}}{m_{b0}}\right) T_F n_b n_c \left(m_{b0} m_{c0}\right)^{-3\varepsilon} \biggr] C_A T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^3 + \cdots\,, \label{Calc:Ghost}\end{aligned}$$ where the two-loop term is given by $$C_h = - \frac{(1+\varepsilon) (3-2\varepsilon)}{16 (1-\varepsilon) (2-\varepsilon) (1+2\varepsilon) (3+2\varepsilon)}\,, \label{Calc:Ch}$$ and the $\varepsilon$ expansions of the single-scale three-loop coefficients read $$\begin{aligned} C_{hg} &=& C_F \frac{\varepsilon}{64} \left[ 5 - \left( 4 \zeta_3 + \frac{9}{2} \right) \varepsilon - \left( 4 B_4 - \frac{\pi^4}{5} + \frac{57}{2} \zeta_3 - \frac{157}{4} \right) \varepsilon^2 + \cdots \right] \nonumber\\ &&{} + \frac{C_A}{2304} \Biggl[ 3 \xi - 47 - \frac{1}{2} \left( 9 \xi + \frac{83}{3} \right) \varepsilon + \left( 108 \zeta_3 + \frac{131}{4} \xi - \frac{9083}{36} \right) \varepsilon^2 \nonumber\\ &&\hphantom{{}+\frac{C_A}{2304}\Biggl[\Biggr.} + \left( 72 B_4 - \frac{27}{5} \pi^4 + (24 \xi + 407) \zeta_3 - \frac{1}{24} \left( 2239 \xi - \frac{49795}{9} \right) \right) \varepsilon^3 + \cdots \Biggr]\,, \nonumber\\ C_{hl} &=& \frac{1}{144} \left[ 1 - \frac{5}{6} \varepsilon + \frac{337}{36} \varepsilon^2 + \left( 8 \zeta_3 - \frac{5261}{216} \right) \varepsilon^3 + \cdots \right]\,, \nonumber\\ C_{hh} &=& \frac{1}{72} \left[ 1 - \frac{5}{6} \varepsilon + \frac{151}{36} \varepsilon^2 - \left( 7 \zeta_3 + \frac{461}{216} \right) \varepsilon^3 + \cdots \right]\,. \label{Calc:C3}\end{aligned}$$ The function $C_{bc}(x)$ is obtained from the diagram of Fig. \[F:Ghost\] and can be written as $$C_{bc}(x) = - \frac{3-2\varepsilon}{64(2-\varepsilon)} I(x)\,, \label{Calc:Cbc}$$ with $$\int \frac{\Pi_b(k^2) \Pi_c(k^2)}{(k^2)^2} d^d k = i T_F^2 \frac{\alpha_{s0}^2}{16 \pi^\varepsilon} \Gamma^3(\varepsilon) (m_{b0} m_{c0})^{-3\varepsilon} I\left(\frac{m_{c0}}{m_{b0}}\right)\,, \label{Calc:Idef}$$ where $\Pi_{b}(k^2)$ and $\Pi_{c}(k^2)$ are the $b$- and $c$-loop contributions to the gluon self-energy. The integral $I(x)$ is discussed in Appendix \[S:Ix\] where an analytic result is presented. In analogy to Eq. (\[Calc:testPi\]), we have $$C_{bc}(x^{-1}) = C_{bc}(x)\,,\quad C_{bc}(1) = 2 C_{hh}\,.$$ For a non-zero $\varepsilon<0$, $C_{bc}(x\to0)\to C_{hl} x^{3\varepsilon}$ (only the hard part survives in (\[Ix:0\])). Light-quark self-energy ----------------------- The parts of the light-quark self-energy $\Sigma_V(0)$ and $\Sigma_S(0)$ (with vanishing light-quark masses) are conveniently written in the form $$\begin{aligned} \Sigma_V(0) &=& V_h \left(n_b m_{b0}^{-4\varepsilon} + n_c m_{c0}^{-4\varepsilon}\right) C_F T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^2 \nonumber\\ &&{} + \biggl[ \left(V_{hg} + V_{hl} T_F n_l\right) \left( n_b m_{b0}^{-6\varepsilon} + n_c m_{c0}^{-6\varepsilon} \right) + V_{hh} T_F \left( n_b^2 m_{b0}^{-6\varepsilon} + n_c^2 m_{c0}^{-6\varepsilon} \right) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + V_{bc}\left(\frac{m_{c0}}{m_{b0}}\right) T_F n_b n_c \left(m_{b0} m_{c0}\right)^{-3\varepsilon} \biggr] C_F T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^3 + \cdots\,, \nonumber\\ \Sigma_S(0) &=& S_h \left(n_b m_{b0}^{-4\varepsilon} + n_c m_{c0}^{-4\varepsilon}\right) C_F T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^2 \nonumber\\ &&{} + \biggl[ \left(S_{hg} + S_{hl} T_F n_l\right) \left( n_b m_{b0}^{-6\varepsilon} + n_c m_{c0}^{-6\varepsilon} \right) + S_{hh} T_F \left( n_b^2 m_{b0}^{-6\varepsilon} + n_c^2 m_{c0}^{-6\varepsilon} \right) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + S_{bc}\left(\frac{m_{c0}}{m_{b0}}\right) T_F n_b n_c \left(m_{b0} m_{c0}\right)^{-3\varepsilon} \biggr] C_F T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^3 + \cdots\,, \label{Calc:Sigma}\end{aligned}$$ where $$V_h = - \frac{\varepsilon (1+\varepsilon) (3-2\varepsilon)}{8 (1-\varepsilon) (2-\varepsilon) (1+2\varepsilon) (3+2\varepsilon)}\,,\quad S_h = - \frac{(1+\varepsilon) (3-2\varepsilon)}{8 (1-\varepsilon) (1+2\varepsilon) (3+2\varepsilon)}\,, \label{Calc:VSh}$$ and $$\begin{aligned} V_{hg} &=& - C_F \frac{\varepsilon}{96} \left[ 1 - \frac{39}{2} \varepsilon + \left( 12 \zeta_3 + \frac{335}{12} \right) \varepsilon^2 + \cdots \right] \nonumber\\ &&{} + \frac{C_A}{192} \Biggl[ \xi - 1 - \left( 3 \xi + \frac{10}{3} \right) \varepsilon + \frac{1}{3} \left( 35 \xi - \frac{227}{3} \right) \varepsilon^2 \nonumber\\ &&\hphantom{{}+\frac{C_A}{192}\Biggl[\Biggr.} + \left( 8 (\xi + 2) \zeta_3 - \frac{1}{9} \left( 407 \xi - \frac{1879}{6} \right) \right) \varepsilon^3 + \cdots \Biggr]\,, \nonumber\\ V_{hl} &=& \frac{\varepsilon}{72} \left[ 1 - \frac{5}{6} \varepsilon + \frac{337}{36} \varepsilon^2 + \cdots \right]\,, \nonumber\\ V_{hh} &=& \frac{\varepsilon}{36} \left[ 1 - \frac{5}{6} \varepsilon + \frac{151}{36} \varepsilon^2 + \cdots \right]\,, \nonumber\\ S_{hg} &=& C_F \frac{\varepsilon}{16} \left[ 5 - \left( 4 \zeta_3 + \frac{23}{3} \right) \varepsilon - \left( 4 B_4 - \frac{\pi^4}{5} + \frac{53}{2} \zeta_3 - \frac{257}{6} \right) \varepsilon^2 + \cdots \right] \nonumber\\ &&{} + \frac{C_A}{576} \Biggl[ - 3 \xi - 41 + \left( 9 \xi - \frac{124}{3} \right) \varepsilon + \left( 144 \zeta_3 - 35 \xi - \frac{836}{9} \right) \varepsilon^2 \nonumber\\ &&\hphantom{{}+\frac{C_A}{576}\Biggl[\Biggl.} + \left( 72 B_4 - \frac{36}{5} \pi^4 - (24 \xi - 581) \zeta_3 + \frac{1}{3} \left( 407 \xi - \frac{9751}{9} \right) \right) \varepsilon^3 + \cdots \Biggr]\,, \nonumber\\ S_{hl} &=& \frac{1}{36} \left[ 1 - \frac{4}{3} \varepsilon + \frac{88}{9} \varepsilon^2 + 8 \left( \zeta_3 - \frac{98}{27} \right) \varepsilon^3 + \cdots \right]\,, \nonumber\\ S_{hh} &=& \frac{1}{18} \left[ 1 - \frac{4}{3} \varepsilon + \frac{83}{18} \varepsilon^2 - \left( 7 \zeta_3 + \frac{457}{108} \right) \varepsilon^3 + \cdots \right]\,. \label{Calc:V3}\end{aligned}$$ Exact $d$-dimensional expressions for these coefficients have been obtained in [@Grozin:2006xm]. The quantities $V_{bc}(x)$ and $S_{bc}(x)$ arise from diagrams similar to Fig. \[F:Ghost\] and can be expressed in terms of $I(x)$: $$V_{bc}(x) = - \frac{\varepsilon(3-2\varepsilon)}{32(2-\varepsilon)} I(x)\,,\quad S_{bc}(x) = - \frac{3-2\varepsilon}{32} I(x)\,. \label{Calc:VSbc}$$ They satisfy the relations analogous to Eq. (\[Calc:testPi\]) which again serves as a welcome check of our calculation. Retaining only the hard part of (\[Ix:0\]) for $x\to0$, we reproduce $V_{hl}$, $S_{hl}$. $V_{bc}$ has been calculated up to $\mathcal{O}(\varepsilon^3)$ in Ref. [@Bekavac:2009zc]. Ghost–gluon vertex ------------------ The two-loop correction vanishes in the arbitrary covariant gauge exactly in $\varepsilon$, see Appendix \[S:Ghost\]. For the same reasons, the three-loop correction contains only diagrams with a single quark loop (bottom or charm), and vanishes in Landau gauge: $$\begin{aligned} &&\Gamma_{A\bar{c}c} = 1 + \Gamma_3 (1-\xi) (n_b m_{b0}^{-6\varepsilon} + n_c m_{c0}^{-6\varepsilon}) C_A^2 T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^3 + \cdots\,, \label{Calc:GAcc}\\ &&\Gamma_3 = - \frac{1}{384} \left[ 1 - \frac{5}{2} \varepsilon + \frac{67}{6} \varepsilon^2 + \left(8 \zeta_3 - \frac{727}{18}\right) \varepsilon^3 + \cdots \right]\,. \nonumber\end{aligned}$$ Decoupling for $\alpha_s$ {#S:as} ========================= The gauge parameter dependence cancels in the bare decoupling constant (\[Intro:zetaparams0\]) (which relates $\alpha_{s0}^{(n_l)}$ to $\alpha_{s0}^{(n_f)}$, see Eq. (\[Intro:params0\])). Since the result is more compact we present analytical expressions for $\left(\zeta_{\alpha_s}^0\right)^{-1}$ which reads $$\begin{aligned} \left(\zeta_{\alpha_s}^0\right)^{-1} &=& 1 + \frac{1}{3} \left(n_b m_{b0}^{-2\varepsilon} + n_c m_{c0}^{-2\varepsilon}\right) T_F \frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon) \nonumber\\ &&{} + Z_h \varepsilon T_F (n_b m_{b0}^{-4\varepsilon} + n_c m_{c0}^{-4\varepsilon}) \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^2 \nonumber\\ &&{} + \biggl[ \left(Z_{hg} + Z_{hl} T_F n_l\right) \left( n_b m_{b0}^{-6\varepsilon} + n_c m_{c0}^{-6\varepsilon} \right) + Z_{hh} T_F \left( n_b^2 m_{b0}^{-6\varepsilon} + n_c^2 m_{c0}^{-6\varepsilon} \right) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + Z_{bc}\left(\frac{m_{c0}}{m_{b0}}\right) T_F n_b n_c \left(m_{b0} m_{c0}\right)^{-3\varepsilon} \biggr] \varepsilon T_F \left(\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon)\right)^3 + \cdots\,, \label{as:bare}\end{aligned}$$ where $$\begin{aligned} Z_h &=& \frac{1}{4 (2-\varepsilon) (1+2\varepsilon)} \left[ - \frac{1}{3} C_F (9+7\varepsilon-10\varepsilon^2) + \frac{1}{2} C_A \frac{10+11\varepsilon-4\varepsilon^2-4\varepsilon^3}{3+2\varepsilon} \right]\,,\\ Z_{hg} &=& \frac{C_F^2 \varepsilon}{24} \left[17 - \frac{1}{4} \left(\frac{95}{2} \zeta_3 + \frac{137}{3}\right) \varepsilon + \cdots\right]\\ &&{} - \frac{C_F C_A}{72} \left[11 + \frac{257}{6} \varepsilon - \frac{1}{16} \left(\frac{3819}{2} \zeta_3 - \frac{8549}{9}\right) \varepsilon^2 + \cdots\right]\\ &&{} + \frac{C_A^2}{216} \left[19 + \frac{359}{24} \varepsilon + \frac{1}{32} \left(\frac{45}{2} \zeta_3 - \frac{3779}{3}\right) \varepsilon^2 + \cdots\right]\,,\\ Z_{hl} &=& \frac{C_F}{72} \left[5 - \frac{31}{6} \varepsilon + \frac{971}{36} \varepsilon^2 + \cdots\right] - \frac{C_A}{216} \left[5 - \frac{17}{6} \varepsilon + \frac{343}{12} \varepsilon^2 + \cdots\right]\,,\\ Z_{hh} &=& \frac{C_F}{18} \left[1 - \frac{5}{6} \varepsilon + \frac{1}{16} \left(\frac{63}{2} \zeta_3 + \frac{109}{9}\right) \varepsilon^2 + \cdots\right]\\ &&{} - \frac{C_A}{108} \left[5 - \frac{113}{24} \varepsilon - \frac{1}{16} \left(\frac{189}{2} \zeta_3 - 311\right) \varepsilon^2 + \cdots\right]\,,\\ Z_{bc}(x) &=& \frac{C_F}{9} \left[1 - \frac{5}{6} \varepsilon + z_F(x) \varepsilon^2 + \cdots\right] - \frac{C_A}{54} \left[5 - \frac{113}{24} \varepsilon + z_A(x) \varepsilon^2 + \cdots\right]\,,\\ z_F(x) &=& \frac{9}{64} \Biggl[ \frac{(1+x^2) (5-2x^2+5x^4)}{2 x^3} L_-(x)\\ &&{} - \frac{5-38x^2+5x^4}{2 x^2} L^2 + 5 \frac{1-x^4}{x^2} L - 5 \frac{(1-x^2)^2}{x^2} \Biggr] + \frac{109}{144}\,,\\ z_A(x) &=& \frac{3}{16} \Biggl[ - 9 \frac{(1+x^2) (1+x^4)}{2 x^3} L_-(x)\\ &&{} + \frac{9+92x^2+9x^4}{2 x^2} L^2 - 9 \frac{1-x^4}{x^2} L + 9 \frac{(1-x^2)^2}{x^2} \Biggr] + \frac{311}{16}\,.\end{aligned}$$ Note that $Z_{bc}(x^{-1})=Z_{bc}(x)$, $Z_{bc}(1)=2Z_{hh}$. If desired, the vertices $\Gamma_{A\bar{q}q}$ and $\Gamma_{AAA}$ can be reconstructed using Eq. (\[Intro:zetaparams0\]). In order to relate the renormalized couplings $\alpha_s^{(n_f)}(\mu)$ and $\alpha_s^{(n_l)}(\mu)$, we first express all bare quantities in the right-hand side of the equation $$\alpha_{s0}^{(n_l)} = \zeta_{\alpha_s}^0(\alpha_{s0}^{(n_f)},m_{b0},m_{c0}) \alpha_{s0}^{(n_f)}$$ via the $\overline{\mbox{MS}}$ renormalized ones [@vanRitbergen:1997va; @Czakon:2004bu; @Chetyrkin:1997dh; @Vermaseren:1997fq] $$\begin{aligned} &&\frac{\alpha_{s0}^{(n_f)}}{\pi} \Gamma(\varepsilon) = \frac{\alpha_s^{(n_f)}(\mu)}{\pi \varepsilon} Z_\alpha^{(n_f)}\left(\alpha_s^{(n_f)}(\mu)\right) e^{\gamma_E \varepsilon} \Gamma(1+\varepsilon) \mu^{2\varepsilon}\,, \label{as:MSbar}\\ &&m_{b0} = Z_m^{(n_f)}\left(\alpha_s^{(n_f)}(\mu)\right) m_b(\mu) \label{as:massren}\end{aligned}$$ (and similarly for $m_{c0}$). This leads to an equation where $\alpha_{s0}^{(n_l)}$ is expressed via the $n_f$-flavour $\overline{\mbox{MS}}$ renormalized quantities[^4] $\alpha_s^{(n_f)}(\mu)$, $m_c(\mu)$ and $m_b(\mu)$. In a next step we invert the series $$\frac{\alpha_{s0}^{(n_l)}}{\pi} \Gamma(\varepsilon) = \frac{\alpha_s^{(n_l)}(\mu')}{\pi \varepsilon} Z_\alpha^{(n_l)}\left(\alpha_s^{(n_l)}(\mu')\right) e^{\gamma_E \varepsilon} \Gamma(1+\varepsilon) \left(\mu^\prime\right)^{2\varepsilon}$$ to express $\alpha_s^{(n_l)}(\mu')$ via $\alpha_{s0}^{(n_l)}$, and substitute the series for $\alpha_{s0}^{(n_l)}$ derived above. In order to obtain compact formulae it is convenient to set $\mu=\bar{m}_b$ where $\bar{m}_b$ is defined as the root of the equation $m_b(\bar{m}_b) = \bar{m}_b$. Furthermore, we choose $\mu'=m_c(\bar{m}_b)$ and thus obtain $\alpha_s^{(n_l)}(m_c(\bar{m}_b))$ as a series in $\alpha_s^{(n_f)}(\bar{m}_b)$ with coefficients depending on $$x = \frac{m_c(\bar{m}_b)}{\bar{m}_b}\,. \label{as:x}$$ We obtain ($L=\log x$) $$\zeta_{\alpha_s}(m_c(\bar{m}_b),\bar{m}_b)\!=\! e^{-2L\varepsilon} \left[ 1 + d_1 \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} + d_2 \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 + d_3 \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3\!\! + \cdots \right], \label{as:renorm}$$ where $$\begin{aligned} d_1 &=& - \left[ 11 C_A - 4 T_F (n_l + n_c) \right] \frac{L}{6} + \left\{ \left[ 11 C_A - 4 T_F (n_l + n_c) \right] L^2 - T_F (n_b + n_c) \frac{\pi^2}{6} \right\} \frac{\varepsilon}{6}\\ &&{} - \left\{ \left[ 11 C_A - 4 T_F (n_l + n_c) \right] L^3 - T_F n_c \frac{\pi^2}{2} L - T_F (n_b + n_c) \zeta_3 \right\} \frac{\varepsilon^2}{9} + \mathcal{O}(\varepsilon^3)\,,\\ d_2 &=& \left[11 C_A - 4 T_F (n_l+n_c) \right]^2 \frac{L^2}{36} - \left[ 17 C_A^2 - 6 C_F T_F (n_l - n_c) - 10 C_A T_F (n_l + n_c) \right] \frac{L}{12}\\ &&{} - \frac{(39 C_F - 32 C_A) T_F (n_b+n_c)}{144}\\ &&{} + \biggl\{ - \left[11 C_A - 4 T_F (n_l+n_c) \right]^2 \frac{L^3}{18}\\ &&\hphantom{{}+\biggl\{\biggr.} + \left[ 17 C_A^2 - 6 C_F T_F (n_l - 2 n_c) - 10 C_A T_F (n_l + n_c) \right] \frac{L^2}{6}\\ &&\hphantom{{}+\biggl\{\biggr.} + T_F \left[ \frac{13}{12} C_F n_c + \frac{C_A}{9} \left( \frac{11}{12} \pi^2 (n_b + n_c) - 8 n_c \right) - T_F \frac{\pi^2}{27} (n_b + n_c)(n_l + n_c) \right] L\\ &&\hphantom{{}+\biggl\{\biggr.} + \left[ \frac{C_F}{4} \left( \pi^2 + \frac{35}{2} \right) - \frac{C_A}{3} \left( \frac{5}{4} \pi^2 + \frac{43}{3} \right) \right] \frac{T_F (n_b + n_c)}{12} \biggr\} \varepsilon + \mathcal{O}(\varepsilon^2)\,,\\ d_3 &=& - \frac{\left[11 C_A - 4 T_F (n_l+n_c) \right]^3}{216} L^3\\ &&{} + \biggl[ \frac{935}{24} C_A^3 - \frac{55}{4} C_F C_A T_F (n_l-n_c) - \frac{445}{12} C_A^2 T_F (n_l+n_c)\\ &&\hphantom{{}+\biggl[\biggr.} + 5 C_F T_F^2 (n_l^2 - n_c^2) + \frac{25}{3} C_A T_F^2 (n_l+n_c)^2 \biggr] \frac{L^2}{6}\\ &&{} + \biggl[ - \frac{2857}{1728} C_A^3 - C_F^2 T_F \frac{n_l - 9 n_c}{16} + \frac{C_F C_A T_F}{48} \left( \frac{205}{6} n_l - 19 n_c + \frac{143}{3} n_b \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{C_A^2 T_F}{27} \left( \frac{1415}{32} n_l + \frac{359}{32} n_c - 22 n_b \right) - C_F T_F^2 \frac{(n_l + n_c) (11 n_l + 30 n_c) + 26 n_l n_b}{72}\\ &&\hphantom{{}+\biggl[\biggr.} - C_A T_F^2 \frac{(n_l + n_c) (79 n_l - 113 n_c) - 128 n_l n_b}{432} \biggr] L\\ &&{} + \biggl[ \frac{C_F^2}{96} \left( \frac{95}{2} \zeta_3 - \frac{97}{3} \right) - \frac{C_F C_A}{96} \left( \frac{1273}{8} \zeta_3 - \frac{2999}{27} \right) - \frac{C_A^2}{768} \left( \frac{5}{2} \zeta_3 - \frac{11347}{27} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{41}{162} C_F T_F n_l - \frac{C_F T_F (n_b+n_c)}{16} \left( \frac{7}{4} \zeta_3 - \frac{103}{81} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{C_A T_F n_l}{2592} - \frac{7}{64} C_A T_F (n_b+n_c) \left( \frac{1}{2} \zeta_3 - \frac{35}{81} \right) \biggr] T_F (n_b+n_c)\\ &&{} + T_F^2 n_b n_c \left( C_F d_F(x) + C_A d_A(x) \right) + \mathcal{O}(\varepsilon)\,.\end{aligned}$$ The functions $$\begin{aligned} d_F(x) &=& - \frac{(1 + x^2) (5 - 2 x^2 + 5 x^4)}{128 x^3} L_-(x) + \frac{7}{32} \zeta_3\\ &&{} + \left[ \frac{5}{4} \frac{(1-x^2)^2}{x^2} + \frac{11}{3} \right] \frac{L^2}{32} - \frac{5}{4} \left[ \frac{1-x^4}{16 x^2} + \frac{1}{3} \right] L + \frac{5}{64} \frac{(1-x^2)^2}{x^2}\,,\\ d_A(x) &=& - \frac{(1+x^2) (1+x^4)}{64 x^3} L_-(x) + \frac{7}{64} \zeta_3\\ &&{} + \left[ \frac{(1-x^2)^2}{2 x^2} + \frac{5}{3} \right] \frac{L^2}{32} - \left[ \frac{1-x^4}{2 x^2} - \frac{113}{27} \right] \frac{L}{16} + \frac{(1-x^2)^2}{32 x^2}\end{aligned}$$ are defined in such a way that $d_{F,A}(1)=0$. Thus for $x=1$ Eq. (\[as:renorm\]) reduces to the ordinary decoupling of $n_b+n_c$ flavours with the same mass [@Chetyrkin:1997un]. For $x\ll1$ the functions $d_{F}(x)$ and $d_{A}(x)$ become $$\begin{aligned} d_F(x) &=& - \frac{1}{36} \left( 13 L - \frac{89}{12} \right) + \frac{7}{32} \zeta_3 + \left( 2 L + \frac{13}{30} \right) \frac{x^2}{15} + \cdots \nonumber\\ d_A(x) &=& \frac{1}{27} \left( 8 L - \frac{41}{16} \right) + \frac{7}{64} \zeta_3 - \left( \frac{1}{2} L^2 - \frac{121}{30} L + \frac{19}{225} \right) \frac{x^2}{60} + \cdots\,. \label{as:x0}\end{aligned}$$ An expression for $\alpha_s^{(n_f)}(\bar{m}_b)$ via $\alpha_s^{(n_l)}(m_c(\bar{m}_b))$ can be obtained by inverting the series (\[as:renorm\]). If one wants to express $\alpha_s^{(n_l)}(\mu_c)$ as a truncated series in $\alpha_s^{(n_f)}(\mu_b)$ (without resummation) for some other choice of $\mu_b\sim m_b$ and $\mu_c\sim m_c$, this can be easily done in three steps: $(i)$ run from $\mu_b$ to $\bar{m}_b$ in the $n_f$-flavour theory (without resummation); $(ii)$ use Eq. (\[as:renorm\]) for the decoupling; and $(iii)$ run from $m_c(\bar{m}_b)$ to $\mu_c$ in the $n_l$-flavour theory (without resummation). After that, relating $\alpha_s^{(n_l)}(\mu')$ and $\alpha_s^{(n_f)}(\mu)$ for any values of $\mu$ and $\mu'$ (possibly widely separated from $m_b$ and $m_c$) can be done in a similar way: $(i)$ run from $\mu$ to $\mu_b$ in the $n_f$-flavour theory (with resummation); $(ii)$ use the decoupling relation derived above; and $(iii)$ run from $\mu_c$ to $\mu'$ in the $n_l$-flavour theory (with resummation). The steps $(i)$ and $(iii)$ can conveniently be performed using the program [RunDec]{} [@Chetyrkin:2000yt]. In the case of QCD ($T_F=1/2$, $C_A=3$, $C_F=4/3$, $n_b=n_c=1$) the decoupling constant in Eq. (\[as:renorm\]) reduces to (for $\varepsilon=0$) $$\begin{aligned} &&\zeta_{\alpha_s}(m_c(\bar{m}_b),\bar{m}_b) = 1 + \frac{2 n_l - 31}{6} L \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} \nonumber\\ &&{} + \left[ \frac{(2 n_l - 31)^2}{36} L^2 + \frac{19 n_l - 142}{12} L + \frac{11}{36} \right] \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 \nonumber\\ &&{} + \biggl[ \frac{(2 n_l - 31)^3}{216} L^3 + \left( \frac{95}{9} n_l^2 - \frac{485}{2} n_l + \frac{58723}{48} \right) \frac{L^2}{8} \nonumber\\ &&\hphantom{{}+\biggl\{\biggr.} - \left( \frac{325}{6} n_l^2 - \frac{15049}{6} n_l + 12853 \right) \frac{L}{288} - \frac{(1+x^2) (19 - 4 x^2 + 19 x^4)}{768 x^3} L_-(x) \nonumber\\ &&\hphantom{{}+\biggl\{\biggr.} + \frac{19}{768} \left( \frac{(1 - x^2)^2}{x^2} (L^2 + 2) - 2 \frac{1 - x^4}{x^2} L \right) \nonumber\\ &&\hphantom{{}+\biggl\{\biggr.} - \frac{1}{1728} \left( \frac{82043}{8} \zeta_3 + \frac{2633}{9} n_l - \frac{572437}{36} \right) \biggr] \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3 + \cdots\,. \label{as:su3}\end{aligned}$$ For $x\ll1$ the coefficient of $(\alpha_s/\pi)^3$ becomes $$\begin{aligned} &&\frac{(2 n_l - 31)^3}{216} L^3 + \frac{5 (2 n_l - 31) (19 n_l - 142)}{144} L^2 - \frac{325 n_l^2 - 15049 n_l + 77041}{1728} L\\ &&{} - \frac{1}{1728} \left( \frac{82043}{8} \zeta_3 + \frac{2633}{9} n_l - \frac{563737}{36} \right) - \left( L^2 - \frac{683}{45} L - \frac{926}{675} \right) \frac{x^2}{160} + \mathcal{O}(x^4)\,.\end{aligned}$$ Decoupling for the light-quark masses {#S:m} ===================================== The bare quark mass decoupling coefficient $\zeta_m^0$ of Eq. (\[Intro:zetafields0\]) is determined by $\Sigma_{V}(0)$ and $\Sigma_{S}(0)$, see Eq. (\[Calc:Sigma\]); it is gauge parameter independent. The renormalized decoupling constant $\zeta_m$ in Eq. (\[Intro:zetaren\]) (see [@Chetyrkin:1997dh; @Vermaseren:1997fq] for the mass renormalization constants) can be obtained by re-expressing $\alpha_s^{(n_l)}$ in the denominator via $\alpha_s^{(n_f)}$ (cf. Sect. \[S:as\]; note that in $\zeta_{\alpha_s}$ positive powers of $\varepsilon$ should be kept). Our result reads $$\zeta_m(m_c(\bar{m}_b),\bar{m}_b) = 1 + d^m_1 C_F \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} + d^m_2 C_F \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 + d^m_3 C_F \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3 + \cdots \,, \label{m:ren}$$ where $$\begin{aligned} d^m_1 &=& - \frac{3}{2} L \left( 1 - L \varepsilon + \frac{2}{3} L^2 \varepsilon^2 + \mathcal{O}(\varepsilon^3) \right)\,,\\ d^m_2 &=& \left[ 9 C_F + 11 C_A - 4 T_F (n_l + n_c) \right] \frac{L^2}{8} - \left[ 9 C_F + 97 C_A - 20 T_F (n_l + n_c) \right] \frac{L}{48}\\ &&{} + \frac{89}{288} T_F (n_b + n_c)\\ &&{} + \biggl\{ - \left[9 C_F + 11 C_A - 4 T_F (n_l + n_c)\right] \frac{L^3}{4} +\left[9 C_F + 97 C_A - 20 T_F (n_l + n_c)\right] \frac{L^2}{24} \nonumber\\ &&\hphantom{{}+\biggl\{\biggr.} + \frac{3 \pi^2 n_b - 89 n_c}{72} T_F L - \left( 5 \pi^2 + \frac{869}{6} \right) T_F\frac{n_b + n_c}{288} \biggr\} \varepsilon + \mathcal{O}(\varepsilon^2) \,,\\ d^m_3 &=& \biggl[ - \frac{(9 C_F + 11 C_A) (9 C_F + 22 C_A)}{16} + \frac{27 C_F + 44 C_A}{4} T_F (n_l + n_c)\\ &&\hphantom{\biggl[\biggr.} - T_F^2 \bigl( 2 (n_l + n_c)^2 - n_b n_c \bigr) \biggr] \frac{L^3}{9}\\ &&{} + \biggl[ \frac{9}{4} C_F^2 + 27 C_F C_A + \frac{1373}{36} C_A^2 - \left( 9 C_F + \frac{197}{9} C_A \right) T_F (n_l + n_c)\\ &&\hphantom{{}+\biggl[\biggr.} + T_F^2 \frac{20 (n_l + n_c)^2 - 29 n_b n_c}{9} \biggr] \frac{L^2}{8}\\ &&{} + \biggl[ - 129 C_F \left( C_F - \frac{C_A}{2} \right) - \frac{11413}{54} C_A^2 - 96 (C_F - C_A)T_F (n_l + n_c) \zeta_3\\ &&\hphantom{{}+\biggl[\biggr.} + 4 C_F T_F \left( 23 n_l + \frac{67}{12} n_c - \frac{11}{12} n_b \right) + \frac{8}{3} C_A T_F \left( \frac{139}{9} n_l - \frac{47}{4} n_c - 8 n_b \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{8}{27} T_F^2 \left( (n_l + n_c) (35 n_l + 124 n_c) + 124 n_b n_c \right) \biggr] \frac{L}{64}\\ &&{} + \biggl[ \frac{C_F}{4} \left( B_4 - \frac{\pi^4}{20} + \frac{57}{8} \zeta_3 - \frac{683}{144} \right) - \frac{C_A}{8} \left( B_4 - \frac{\pi^4}{10} + \frac{629}{72} \zeta_3 - \frac{16627}{1944} \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{T_F}{18} \left( - \bigl( 4 n_l - 7 (n_b + n_c) \bigr) \zeta_3 + \frac{2654 n_l - 1685 (n_b + n_c)}{432} \right) \biggr] T_F (n_b + n_c)\\ &&{} + \biggl[ - 64 L_+(x) + \frac{(1 + x^2) (5 + 22 x^2 + 5 x^4)}{x^3} L_-(x) - 96 \zeta_3\\ &&\hphantom{{}+\biggl[\biggr.} - 5 \left( \frac{(1 - x^2)^2}{x^2} (L^2 + 2) - 2 \frac{1 - x^4}{x^2} L \right) \biggr] \frac{T_F^2 n_b n_c}{96} + \mathcal{O}(\varepsilon)\,.\end{aligned}$$ At $x=1$ this result reduces to the ordinary decoupling of $n_b+n_c$ flavours with the same mass [@Chetyrkin:1997un]. Specifying to QCD leads to (for $\varepsilon=0$) $$\begin{aligned} &&\zeta_m(m_c(\bar{m}_b),\bar{m}_b) = 1 - 2 L \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} \nonumber\\ &&{} + \left[ - \left( n_l - \frac{43}{2} \right) \frac{L^2}{3} + \left( 5 n_l - \frac{293}{2} \right) \frac{L}{18} + \frac{89}{216} \right] \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 \nonumber\\ &&{} + \biggl[ - 2 \left( n_l^2 - 40 n_l + \frac{1589}{4} \right) \frac{L^3}{27} + \left( \frac{5}{3} n_l^2 - \frac{679}{6} n_l + \frac{2497}{2} \right) \frac{L^2}{18} \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + \left( 5 \zeta_3 (n_l + 1) + \frac{1}{72} \left( \frac{35}{3} n_l^2 + 607 n_l - \frac{103771}{12} \right) \right) \frac{L}{3} - \frac{2}{9} L_+(x) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{(1 + x^2) (5 + 22 x^2 + 5 x^4)}{288 x^3} L_-(x) - \frac{5}{288} \left( \frac{(1 - x^2)^2}{x^2} (L^2 + 2) - 2 \frac{1 - x^4}{x^2} L \right) \nonumber\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{1}{18} \biggl( B_4 - \frac{\pi^4}{2} + \frac{8}{3} \zeta_3 n_l - \frac{439}{24} \zeta_3 - \frac{1327}{324} n_l - \frac{21923}{648} \biggr) \biggr] \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3 + \cdots\,, \nonumber\\ \label{m:su3}\end{aligned}$$ where for $x\ll1$ the coefficient of $(\alpha_s/\pi)^3$ takes the form $$\begin{aligned} &&- 2 \left( n_l^2 - 40 n_l + \frac{1591}{4} \right) \frac{L^3}{27} + \left( 5 n_l^2 - \frac{679}{2} n_l + \frac{15011}{4} \right) \frac{L^2}{54}\\ &&{} \left[ 5 \zeta_3 (n_l + 1) + \frac{1}{72} \left( \frac{35}{3} n_l^2 + 607 n_l - \frac{104267}{12} \right) \right] \frac{L}{3}\\ &&{} - \frac{1}{18} \left( B_4 - \frac{\pi^4}{2} + \frac{8}{3} \zeta_3 n_l + \frac{439}{24} \zeta_3 - \frac{1327}{324} n_l - \frac{24935}{648} \right)\\ &&{} - \left( 2 L - \frac{47}{30} \right) \frac{x^2}{15} + \mathcal{O}(x^4)\,.\end{aligned}$$ Decoupling for the fields {#S:fields} ========================= Gluon field and the gauge parameter {#S:a} ----------------------------------- Decoupling of the gluon field and the gauge fixing parameter are given by the same quantity $\zeta_A^0$ (cf. (\[Intro:zetafields0\])): $$a_0^{(n_l)} = a_0^{(n_f)} \zeta_A^0(\alpha_{s0}^{(n_f)},a_0^{(n_f)},m_{b0},m_{c0})\,. \label{a:bare}$$ In a first step we replace the bare quantities in the right-hand side via the renormalized ones using Eqs. (\[as:MSbar\]), (\[as:massren\]), and [@Larin:1993tp; @Chetyrkin:2004mf; @Czakon:2004bu] $$a_0^{(n_f)} = Z_A^{(n_f)}\left(\alpha_s^{(n_f)}(\mu),a^{(n_f)}(\mu)\right) a^{(n_f)}(\mu)\,, \label{a:rena}$$ and thus we express $a_0^{(n_l)}$ via the $n_f$-flavour renormalized quantities. In a next step we can find $a^{(n_l)}(\mu')$ in terms of $a_0^{(n_l)}$ by solving the equation $$a_0^{(n_l)} = Z_A^{(n_l)}\left(\alpha_s^{(n_l)}(\mu'),a^{(n_l)}(\mu')\right) a^{(n_l)}(\mu') \label{a:renl}$$ iteratively. The result reads $$\zeta_A(m_c(\bar{m}_b),\bar{m}_b) = 1 + d^A_1 \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} + d^A_2 \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 + d^A_3 \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3 + \cdots \,, \label{s:renorm}$$ where $$\begin{aligned} d^A_1 &=& - \frac{C_A (3 a - 13) + 8 T_F (n_l + n_c)}{12} L\\ &&{} + \left\{ \left[ C_A (3 a - 13) + 8 T_F (n_l + n_c) \right] L^2 + T_F (n_b + n_c) \frac{\pi^2}{3} \right\} \frac{\varepsilon}{12}\\ &&{} - \left\{ \left[ C_A (3 a - 13) + 8 T_F (n_l + n_c) \right] L^3 + T_F n_c \pi^2 L + 2 T_F (n_b + n_c) \zeta_3 \right\} \frac{\varepsilon^2}{18} + \mathcal{O}(\varepsilon^3)\,,\\ d^A_2 &=& C_A \frac{2 a + 3}{96} \left[ C_A (3 a - 13) + 8 T_F (n_l+n_c) \right] L^2\\ &&{} - \left[ C_A^2 \frac{2 a^2 + 11 a - 59}{64} + C_F T_F \frac{n_l-n_c}{2} + \frac{5}{8} C_A T_F (n_l+n_c)\right] L\\ &&{} + \frac{13}{192} (4 C_F - C_A) T_F (n_b+n_c)\\ &&{} + \biggl\{ - C_A \frac{2 a + 3}{48} \left[ C_A (3 a - 13) + 8 T_F (n_l + n_c) \right] L^3\\ &&\hphantom{{}+\biggl\{\biggr.} + \left[ C_A^2 \frac{2 a^2 + 11 a - 59}{32} + C_F T_F (n_l - 2 n_c) + \frac{5}{4} C_A T_F (n_l + n_c) \right] L^2\\ &&\hphantom{{}+\biggl\{\biggr.} - T_F \left[ 13 C_F n_c + C_A \frac{\pi^2 \bigl( n_c (a + 3) + n_b a \bigr) - 39 n_c}{12} \right] \frac{L}{12}\\ &&\hphantom{{}+\biggl\{\biggr.} - \left[C_F (2 \pi^2 + 35) - \frac{C_A}{2} \left( 5 \pi^2 + \frac{169}{6} \right) \right] \frac{T_F (n_b + n_c)}{96} \biggr\} \varepsilon + \mathcal{O}(\varepsilon^2)\,,\\ d^A_3 &=& \frac{C_A}{18} \biggl[ - C_A^2 \frac{(3 a - 13) (6 a^2 + 18 a + 31)}{64} - C_A T_F (n_l + n_c) \frac{6 a^2 + 15 a + 44}{8}\\ &&\hphantom{C_A\biggl[\biggr.} + T_F^2 \bigl( (n_l + n_c)^2 + n_b n_c \bigr) \biggr] L^3\\ &&{} + \biggl[ \frac{C_A^3}{128} \left( \frac{5}{2} a^3 + \frac{29}{3} a^2 - 17 a - \frac{3361}{18} \right) + C_F C_A T_F \frac{6 a (n_l - n_c) + 31 n_l - 49 n_c}{48}\\ &&\hphantom{C_A\biggl[\biggr.} + \frac{C_A^2 T_F (n_l + n_c)}{16} \left( \frac{a^2}{3} + 3 a + \frac{401}{18} \right) - \frac{C_F T_F^2}{6} \left( n_l^2 - n_c^2 + \frac{11}{16} n_b n_c \right)\\ &&\hphantom{C_A\biggl[\biggr.} - \frac{C_A T_F^2}{18} \left( 5 (n_l + n_c)^2 + \frac{73}{16} n_b n_c \right) \biggr] L^2\\ &&{} + \biggl[ - \frac{C_A^3}{1024} \left( 6 \zeta_3 (a+1) (a+3) + 7 a^3 + 33 a^2 + 167 a - \frac{9965}{9} \right) + C_F^2 T_F \frac{n_l - 9 n_c}{16}\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{C_F C_A T_F}{4} \left( 3 \zeta_3 (n_l + n_c) + \frac{13}{48} a (n_b + n_c) + \frac{1}{36} \left( \frac{5}{4} n_l - 227 n_c \right) \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{C_A^2 T_F}{16} \biggl( 9 \zeta_3 (n_l + n_c) + a \left( n_l + \frac{61}{48} n_c - \frac{25}{72} n_b \right)\\ &&\hphantom{{}+\biggl[{}+\frac{C_A^2T_F}{16}\biggl(\biggr.\biggr.} - \frac{1}{36} \left( 911 n_l + \frac{3241}{4} n_c - \frac{1157}{12} n_b \right) \biggr)\\ &&\hphantom{{}+\biggl[\biggr.} + C_F T_F^2 \frac{(n_l + n_c) (11 n_l + 4 n_c) + 4 n_b n_c}{72}\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{C_A T_F^2}{32} \left( \frac{(n_l + n_c) (76 n_l + 63 n_c)}{9} + n_b \left( 7 n_c - \frac{178}{54} n_l \right) \right) \biggr] L\\ &&{} + \biggl[ - \frac{C_F^2}{12} \left( \frac{95}{2} \zeta_3 - \frac{97}{3} \right) + C_F C_A \left( B_4 - \frac{\pi^4}{20} + \frac{1957}{96} \zeta_3 - \frac{36979}{2592} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{C_A^2}{2} \left( B_4 - \frac{3 \pi^4}{40} + \frac{\zeta_3 a}{3} + \frac{1709}{288} \zeta_3 - \frac{677}{432} a + \frac{22063}{3888} \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{164}{81} C_F T_F n_l + C_F T_F (n_b + n_c) \left( \frac{7}{8} \zeta_3 - \frac{103}{162} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{C_A T_F n_l}{9} \left( 8 \zeta_3 - \frac{665}{54} \right) + \frac{C_A T_F (n_b + n_c)}{18} \left( \frac{287}{8} \zeta_3 - \frac{605}{27} \right) \biggr] \frac{T_F (n_b + n_c)}{8}\\ &&{} + T_F^2 n_b n_c \biggl[ - \frac{C_A}{3} L_+(x) + \frac{1+x^2}{32 x^3} \left( C_F \frac{5 - 2 x^2 + 5 x^4}{4} + C_A \frac{4 + 11 x^2 + 4 x^4}{3} \right) L_-(x)\\ &&\hphantom{{}+T_F^2n_bn_c\biggl[\biggr.} - \frac{14 C_F + 39 C_A}{64} \zeta_3\\ &&\hphantom{{}+T_F^2n_bn_c\biggl[\biggr.} - \left( \frac{5}{16} C_F + \frac{C_A}{3} \right) \left( \frac{(1-x^2)^2}{8 x^2} \left( L^2 + 2 \right) - \frac{1-x^4}{4 x^2} L \right) \biggr] + \mathcal{O}(\varepsilon)\,,\end{aligned}$$ with $a\equiv a^{(n_f)}(\bar{m}_b)$. The easiest way to express $a^{(n_f)}(\bar{m}_b)$ via $a^{(n_l)}(m_c(\bar{m}_b))$ is to re-express $\alpha_s^{(n_f)}(\bar{m}_b)$ via $\alpha_s^{(n_l)}(m_c(\bar{m}_b))$ in the right-hand side of the equation $a^{(n_l)}(m_c(\bar{m}_b)) = a^{(n_f)}(\bar{m}_b) \zeta_A(\bar{m}_b,m_c(\bar{m}_b))$ and then solve it for $a^{(n_f)}(\bar{m}_b)$ iteratively. Light-quark fields {#S:q} ------------------ The bare decoupling coefficient $\zeta_q^0$ of Eq. (\[Intro:zetafields0\]) is determined by $\Sigma_V(0)$ (cf. Eq. (\[Calc:Sigma\])). The renormalized version $\zeta_q$ (\[Intro:zetaren\]) can be obtained (see Refs. [@Larin:1993tp; @Chetyrkin:1999pq; @Czakon:2004bu] for the three-loop wave function renormalization constant) by re-expressing $\alpha_s^{(n_l)}$ and $a^{(n_l)}$ in the denominator via the $n_f$-flavour quantities (see Sects. \[S:as\] and \[S:a\]; note that positive powers of $\varepsilon$ should be kept). The result can be cast in the form $$\zeta_q(m_c(\bar{m}_b),\bar{m}_b) = 1 + d^q_1 C_F \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} + d^q_2 C_F \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 + d^q_3 C_F \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3 + \cdots \,, \label{q:renorm}$$ where $$\begin{aligned} d^q_1 &=& - \frac{a}{2} L \left( 1 - L \varepsilon + \frac{2}{3} L^2 \varepsilon^2 + \mathcal{O}(\varepsilon^3) \right)\,,\\ d^q_2 &=& \frac{a}{16} \left[ 2 C_F a + C_A (a + 3) \right] L^2 + \left( 6 C_F - C_A (a^2 + 8 a + 25) + 8 T_F (n_l + n_c) \right) \frac{L}{32}\\ &&{} + \frac{5}{96} T_F (n_b + n_c)\\ &&{} - \biggl[ a \left[ 2 C_F a + C_A (a + 3) \right] L^3 + \left( 6 C_F - C_A (a^2 + 8 a + 25) + 8 T_F (n_l + n_c) \right) \frac{L^2}{2}\\ &&\hphantom{{}-\biggl[\biggr.} + \frac{5}{3} T_F n_c L + \frac{T_F (n_b + n_c)}{12} \left( \pi^2 + \frac{89}{6} \right) \biggr] \frac{\varepsilon}{8} + \mathcal{O}(\varepsilon^2)\,,\\ d^q_3 &=& \frac{a}{8} \biggl[ - C_F^2 \frac{a^2}{6} - C_F C_A \frac{a (a+3)}{4} - C_A^2 \frac{2 a^2 + 9 a + 31}{24} + C_A T_F \frac{n_l + n_c}{3} \biggr] L^3\\ &&{} + \biggl[ - \frac{3}{32} C_F^2 a + C_F C_A \frac{a^3 + 8 a^2 + 25 a - 22}{64} + \frac{C_A^2}{64} \left( a^3 + \frac{25}{4} a^2 + \frac{343}{12} a + \frac{275}{3} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - T_F \frac{n_l + n_c}{8} \left( C_F (a-1) + C_A \frac{13 a + 94}{12} \right) + T_F^2 \frac{(n_l + n_c)^2}{6} \biggr] L^2\\ &&{} + \biggl[ - \frac{3}{64} C_F^2 - \frac{C_F C_A}{8} \left( 3 \zeta_3 -\frac{143}{16} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{C_A^2}{512} \left( 6 \zeta_3 (a^2 + 2 a - 23) + 5 a^3 + \frac{39}{2} a^2 + \frac{263}{2} a + \frac{9155}{9} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{C_F T_F}{32} \left( \frac{5}{6} (n_b + n_c) a - 3 (n_l + 5 n_c) \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{C_A T_F}{288} \left( \frac{153 (n_l+n_c) - 89 n_b}{4} a + 287 n_l + 232 n_c \right) - \frac{5}{72} T_F^2 n_l (n_l + n_c) \biggr] L\\ &&{} + \biggl[ - C_F \left( 3 \zeta_3 + \frac{155}{48} \right) - C_A \left( \zeta_3 (a-3) - \frac{1}{72} \left( \frac{2387}{8} a + \frac{1187}{3} \right) \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{35}{2592} T_F (2 n_l + n_b + n_c) \biggr] \frac{T_F (n_b + n_c)}{24} + \mathcal{O}(\varepsilon)\,.\end{aligned}$$ Note that the power corrections in $x$ drop out in the sum of all diagrams. For $x=1$ this result reduces to the ordinary decoupling of $n_b+n_c$ flavours with the same mass [@Chetyrkin:1997un] (see Ref. [@Grozin:2006xm] for an expression in terms of $C_A$ and $C_F$). Ghost field {#S:c} ----------- The bare decoupling coefficient $\zeta_c^0$ in Eq. (\[Intro:zetafields0\]) is determined by $\Pi_c(0)$ as given in Eq. (\[Calc:Ghost\]). The renormalized decoupling constant $\zeta_c$ of Eq. (\[Intro:zetaren\]) is given by (see Refs. [@Chetyrkin:2004mf; @Czakon:2004bu] for the corresponding renormalization constant) $$\zeta_c(m_c(\bar{m}_b),\bar{m}_b) = 1 + d^c_1 C_A \frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi} + d^c_2 C_A \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^2 + d^c_3 C_A \left(\frac{\alpha_s^{(n_f)}(\bar{m}_b)}{\pi}\right)^3 + \cdots \,, \label{c:renorm}$$ where $$\begin{aligned} d^c_1 &=& - \frac{a-3}{8} L \left( 1 - L \varepsilon + \frac{2}{3} L^2 \varepsilon^2 + \mathcal{O}(\varepsilon^3) \right)\,,\\ d^c_2 &=& \left[ C_A \frac{3 a^2 - 35}{16} + T_F (n_l + n_c) \right] \frac{L^2}{8} + \left[ C_A \frac{3 a + 95}{8} - 5 T_F (n_l + n_c) \right] \frac{L}{48}\\ &&{} - \frac{89}{1152} T_F (n_b + n_c)\\ &&{} + \biggl\{ - \left[ C_A \frac{3 a^2 - 35}{16} + T_F (n_l + n_c) \right] \frac{L^3}{4} - \left[ C_A \frac{3 a + 95}{8} - 5 T_F (n_l + n_c) \right] \frac{L^2}{24}\\ &&\hphantom{{}+\biggl\{\biggr.} - T_F \frac{3 \pi^2 n_b - 89 n_c}{288} L + \frac{T_F (n_b + n_c)}{1152} \left( 5 \pi^2 + \frac{869}{6} \right) \biggr\} \varepsilon + \mathcal{O}(\varepsilon^2)\,,\\ d^c_3 &=& \biggl[ - \frac{C_A^2}{256} \left( 5 a^3 + 9 a^2 - \frac{35}{3} a - \frac{2765}{9} \right) - C_A T_F (n_l + n_c) \frac{3 a + 149}{144}\\ &&\hphantom{\biggl[\biggr.} + \frac{T_F^2}{9} \bigl( 2 (n_l + n_c)^2 - n_b n_c \bigr) \biggr] \frac{L^3}{4}\\ &&{} + \biggl[ \frac{C_A^2}{16} \left( a^3 + \frac{9}{2} a^2 - \frac{11}{3} a - \frac{5773}{18} \right) + \left( 3 C_F + C_A \frac{3 a + 545}{36} \right) T_F (n_l + n_c)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{T_F^2}{9} \bigl( 20 (n_l + n_c)^2 - 29 n_b n_c \bigr) \biggr] \frac{L^2}{32}\\ &&{} + \biggl[ \frac{C_A^2}{128} \left( 3 \zeta_3 (a+1) (a+3) - \frac{3}{2} a^3 - 3 a^2 - 17 a + \frac{15817}{54} \right)\\ &&\hphantom{{}+\biggl[\biggr.} + C_F T_F \left( 3 \zeta_3 (n_l + n_c) - \frac{45 n_l + 25 n_c + 13 n_b}{16} \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{C_A T_F}{32} \left( - 72 \zeta_3 (n_l + n_c) + \frac{252 n_l + 341 n_c - 89 n_b}{36} a - \frac{194}{27} n_l + \frac{695 n_c + 167 n_b}{12} \right)\\ &&\hphantom{{}+\biggl[\biggr.} - \frac{T_F^2}{27} \left( \frac{(n_l + n_c) (35 n_l + 124 n_c)}{4} + 31 n_b n_c \right) \biggr] \frac{L}{8}\\ &&{} + \biggl[ - \frac{C_F}{2} \left( B_4 - \frac{\pi^4}{20} + \frac{57}{8} \zeta_3 - \frac{481}{96} \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{C_A}{4} \left( B_4 - \frac{3 \pi^4}{40} - \frac{\zeta_3 a}{3} + \frac{431}{72} \zeta_3 + \frac{685}{864} a - \frac{5989}{1944} \right)\\ &&\hphantom{{}+\biggl[\biggr.} + \frac{4}{9} T_F n_l \left( \zeta_3 - \frac{1327}{864} \right) - \frac{T_F (n_b + n_c)}{9} \left( 7 \zeta_3 - \frac{1685}{432} \right) \biggr] \frac{T_F (n_b + n_c)}{8}\\ &&{} + \frac{T_F^2 n_b n_c}{6} \biggl[ L_+ - \frac{(1 + x^2) (5 + 22 x^2 + 5 x^4)}{64 x^3} L_- + \frac{3}{2} \zeta_3\\ &&\hphantom{{}+\frac{T_F^2n_bn_c\biggl[\biggr.}{}} + \frac{5}{64} \left( \frac{(1 - x^2)^2}{x^2} (L^2 + 2) - 2 \frac{1 - x^4}{x^2} L \right) \biggr] + \mathcal{O}(\varepsilon)\,.\end{aligned}$$ Phenomenological applications {#S:Phen} ============================= In this section we study the numerical consequences of the decoupling relations computed in the previous sections. For convenience we use in this Section the decoupling relations in terms of on-shell heavy quark masses (see Appendix \[S:OS\] and the [Mathematica]{} file which can be downloaded from [@progdata]) which we denote by $M_c$ and $M_b$. $\alpha_s^{(5)}(M_Z)$ from $\alpha_s^{(3)}(M_\tau)$ --------------------------------------------------- Let us in a first step check the dependence on the decoupling scales which should become weaker after including higher order perturbative corrections. We consider the relation between $\alpha_s^{(3)}(M_\tau)$ and $\alpha_s^{(5)}(M_Z)$. $\alpha_s^{(3)}(M_\tau)$ has been extracted from experimental data using perturbative results up to order $\alpha_s^4$ [@Baikov:2008jh]. Thus it is mandatory to perform the transition from the low to the high scale with the highest possible precision. In the following we compare the conventional approach with the single-step decoupling up to three-loop order. For our analysis we use for convenience the decoupling constants expressed in terms of on-shell quark masses. In this way the mass values are fixed and they are not affected by the running from $M_\tau$ to $M_Z$. In our analysis we use $M_c=1.65$ GeV and $M_b=4.7$ GeV. Furthermore, $\alpha_s^{(3)}(M_\tau) = 0.332$ [@Baikov:2008jh] is used as starting value of our analysis. In Fig. \[fig::asMz\](a) we show $\alpha_s^{(5)}(M_Z)$ as a function of $\mu_{\rm dec}$, the scale where the $c$ and $b$ quarks are simultaneously integrated out. In a first step $\alpha_s^{(3)}(M_\tau)$ is evolved to $\alpha_s^{(3)}(\mu_{\rm dec})$ using the $N$-loop renormalization group equations. Afterwards the $(N-1)$-loop decoupling relation is applied and finally $N$-loop running is employed in order to arrive at $\alpha_s^{(5)}(M_Z)$. One observes a strong dependence on $\mu_{\rm dec}$ for $N=1$ (short-dashed line) which becomes rapidly weaker when increasing $N$ leading to a reasonably flat curve for $N=4$ (longer dashes correspond to larger values of $N$). Comparison of one- and two-step decoupling approach --------------------------------------------------- In the step-by-step decoupling approach we have two decoupling scales $\mu_{{\rm dec},c}$ and $\mu_{{\rm dec},b}$ which can be chosen independently. First we choose[^5] $\mu_{{\rm dec},c}=3$ GeV and identify $\mu_{{\rm dec},b}$ with $\mu_{{\rm dec}}$. The result for $N=4$ is shown in Fig. \[fig::asMz\](b) together with the four-loop curve from Fig. \[fig::asMz\](a) as dash-dotted line (long dashes). One observes a significantly flatter behaviour as for the one-step decoupling which can be explained by the occurrence of $\log(\mu^2/M_c^2)$ terms in the one-step formula which might become large for large values of $\mu=\mu_{{\rm dec}}$. Alternatively it is also possible to study the dependence on $\mu_{{\rm dec},c}$, i.e., identify $\mu_{{\rm dec},c}$ with $\mu_{{\rm dec}}$, set $\mu_{{\rm dec},b}=10$ GeV and compare to the one-step decoupling. The results are also shown in Fig. \[fig::asMz\](b) as dash-dotted line (short dashes) where only values $\mu_{{\rm dec}}\le 10$  are considered. For comparison we show in Fig. \[fig::asMz\](b) also the result of the two-step five-loop analysis as dotted line where the four-loop decoupling relation is taken from Refs. [@Schroder:2005hy; @Chetyrkin:2005ia]. The (unknown) five-loop coefficient of the $\beta$ function, $\beta_4$, is set to zero.[^6] If one restricts to scales $\mu_{\rm dec}$ between 2 GeV and 10 GeV it seems that the four-loop decoupling constant is numerically more relevant than the power-suppressed terms included by construction in the one-step decoupling procedure. Thus, from these considerations one tends to prefer the two-step decoupling over the one-step approach as it seems that the resummation of $\log(\mu^2/M_{c,b}^2)$ is more important than the inclusion of power-suppressed corrections. Let us in a next step restrict ourselves to decoupling scales which are of the order of the respective quark masses. In Tab. \[tab::mub\] we compare the value for $\alpha_s^{(5)}(M_Z)$ as obtained from the one- and two-step decoupling where two variants of the former are used: $\zeta_{\alpha_s}$ which directly relates $\alpha_s^{(3)}(\mu_c)$ and $\alpha_s^{(5)}(\mu_b)$ as given in Eq. (\[Intro:zetaren\]) with $\mu^\prime=\mu_c$ and $\mu=\mu_b$ ($\zeta_{\alpha_s}(\mu_c,\mu_b)$; see also [@progdata]) and the version with only one decoupling scale where $\mu^\prime=\mu$ has been set ($\zeta_{\alpha_s}(\mu)$). We thus define two deviations $$\begin{aligned} \delta\alpha_s^{(a)} &=& \alpha_s^{(5)}(M_Z)\Big|_{\zeta_{\alpha_s}(\mu_c,\mu_b)} - \alpha_s^{(5)}(M_Z)\Big|_{\mbox{\scriptsize 2-step}} \,,\nonumber\\ \delta\alpha_s^{(b)} &=& \alpha_s^{(5)}(M_Z)\Big|_{\zeta_{\alpha_s}(\mu)} - \alpha_s^{(5)}(M_Z)\Big|_{\mbox{\scriptsize 2-step}} \,, \label{eq::deltaalpha}\end{aligned}$$ where the scale $\mu$ in the second equation is either identified with $\mu_c$ (right part of Tab. \[tab::mub\]) or $\mu_b$ (left part), respectively. [cc]{} --------- ----------------------- ------------------------ ------------------------ $\mu_b$ $\alpha_s^{(5)}(M_Z)$ $\delta\alpha_s^{(a)}$ $\delta\alpha_s^{(b)}$ (GeV) $\times10^3$ $\times10^3$ $(\mu=\mu_b)$ 2 0.11985 $-0.28$ 0.18 5 0.11977 0.23 $-0.16$ 7 0.11974 0.36 $-0.26$ 10 0.11970 0.19 $-0.36$ --------- ----------------------- ------------------------ ------------------------ : \[tab::mub\] Decoupling scale $\alpha_s^{(5)}(M_Z)$ as obtained from the four-loop analysis of the two-step approach, and the deviations as defined in the text. In the left table $\mu_c=3$ GeV and in the right one $\mu_b=10$ GeV has been chosen. & --------- ----------------------- ------------------------ ------------------------ $\mu_c$ $\alpha_s^{(5)}(M_Z)$ $\delta\alpha_s^{(a)}$ $\delta\alpha_s^{(b)}$ (GeV) $\times10^3$ $\times10^3$ $(\mu=\mu_c)$ 2 0.11984 $-4.02$ $0.20$ 3 0.11970 0.19 $0.14$ 4 0.11961 0.33 $0.10$ 5 0.11955 0.26 $0.06$ --------- ----------------------- ------------------------ ------------------------ : \[tab::mub\] Decoupling scale $\alpha_s^{(5)}(M_Z)$ as obtained from the four-loop analysis of the two-step approach, and the deviations as defined in the text. In the left table $\mu_c=3$ GeV and in the right one $\mu_b=10$ GeV has been chosen. It is interesting to note that (except for the choice $\mu_c=2$ GeV and $\mu_b=10$ GeV) the deviations presented in Tab. \[tab::mub\] amount to about 30% to 50% of the uncertainty of the world average for $\alpha_s(M_Z)$ which is given by $\delta\alpha_s=0.7\cdot 10^{-3}$ [@Nakamura:2010zzi]. Improving the two-step approach by power-suppressed terms --------------------------------------------------------- From the previous considerations it is evident that the resummation of logarithms of the form $[\alpha_s \log(\mu_c/\mu_b)]^k$, which is automatically incorporated in the two-step approach, is numerically more important than power-suppressed terms in $M_c/M_b$. Thus it is natural to use the two-step approach as default method and add the power-corrections afterwards. This is achieved in the following way: In a first step we invert $\zeta_{\alpha_s}(\mu_c,\mu_b)$ (cf. Eq. (\[Intro:zetaren\])) and express it in terms of $\alpha_s^{(3)}(\mu_c)$ in order to arrive at the equation $\alpha_s^{(5)}(\mu_b)=\zeta^{-1}_{\alpha_s}(\mu_c,\mu_b) \alpha_s^{(3)}(\mu_c)$. Now an expansion is performed for $M_c/M_b\to 0$ to obtain the leading term which is then subtracted from $\zeta^{-1}_{\alpha_s}(\mu_c,\mu_b)$ since it is part of the two-step decoupling procedure. The result is independent of $\mu_c$ and $\mu_b$ and has following series expansion $$\begin{aligned} \delta\zeta_{\alpha_s}^{-1} &=& \left(\frac{\alpha_s^{(3)}(\mu_c)}{\pi}\right)^3 \left[ \frac{\pi^2}{18}x + \left(-\frac{6661}{18000} - \frac{1409}{21600}L + \frac{1}{160}L^2 \right) x^2 + {\cal O}(x^3) \right] \nonumber\\ &\approx& 0.170 \left(\frac{\alpha_s^{(3)}(\mu_c)}{\pi}\right)^3 \,, \label{eq::deltazeta}\end{aligned}$$ where the numerical value in the second line has been obtained with the help of the exact dependence on $x$. Note that the linear term in $x$ arises from the $\overline{\rm MS}$–on-shell quark mass relation. The quantity $\delta\zeta_{\alpha_s}^{-1}$ is used in order to compute an additional contribution to $\alpha_s^{(5)}(\mu_b)$ as obtained from the two-step method: $$\begin{aligned} \delta\alpha_s^{(5)}(\mu_b) &=& \delta\zeta_{\alpha_s}^{-1} \alpha_s^{(3)}(\mu_c) \,.\end{aligned}$$ Inserting numerical values leads to shifts which are at most a few times $10^{-5}$ and are thus beyond the current level of accuracy. It is in particular more than an order of magnitude smaller than the four-loop decoupling term which is shown as dotted curve in Fig. \[fig::asMz\](b). Note that as far as the strong coupling in Eq. (\[eq::deltazeta\]) is concerned both the number of flavours and the renormalization scale of $\alpha_s$ are not fixed since power-suppressed terms appear for the first time at this order. However, the smallness of the contribution is not affected by the choices made in Eq. (\[eq::deltazeta\]). One-step decoupling of the bottom quark with finite charm quark mass -------------------------------------------------------------------- An alternative approach to implement power-suppressed corrections in $m_c/m_b$ in the decoupling procedure is as follows: We consider the step-by-step decoupling and use at the scale $\mu_{\rm dec,c}$ the standard formalism for the decoupling of the charm quark as implemented in [RunDec]{} [@Chetyrkin:2000yt]. At the scale $\mu_{\rm dec,b}$, however, we consider the matching of five- to four-flavour QCD where we keep the charm quark massive. This requires a modification of the formulae in Eqs. (\[Intro:zetafields0\]) and (\[Intro:zetaparams0\]) to ($n_f^\prime=n_f-1$) $$\begin{aligned} &&\zeta_A^0 = \frac{1 + \Pi_A^{(n_f)} (0)}{1 + \Pi_A^{(n_f^\prime)} (0)}\,, \quad \zeta_c^0 = \frac{1 + \Pi_c^{(n_f)} (0)}{1 + \Pi_c^{(n_f^\prime)} (0)}\,, \quad \zeta_q^0 = \frac{1 + \Pi_q^{(n_f)} (0)}{1 + \Pi_q^{(n_f^\prime)} (0)}\,, \nonumber\\ &&\zeta_m^0 = (\zeta_q^0)^{-1} \frac{1 - \Sigma_S^{(n_f)} (0)}{1 - \Sigma_S^{(n_f^\prime)} (0)}\,, \quad \zeta_{\alpha_s}^0 = (\zeta_c^0)^{-2} (\zeta_A^0)^{-1} \frac{\left(1 + \Gamma_{A \bar{c} c}^{(n_f)} \right)^2}{\left(1 + \Gamma_{A \bar{c} c}^{(n_f^\prime)} \right)^2}\,, \label{eq::2step_mv_c}\end{aligned}$$ where the $n_f$-flavour quantities contain contributions form massive charm and bottom quarks. They are identical to the one-step decoupling procedure described above. In the $n_f^\prime$-flavour quantities appearing in the denominators those diagrams have to be considered which contain a charm quark. Note that they depend on the bare parameters of the effective theory ($\alpha_{s 0}^{(n_f^\prime)}$, $a_0^{(n_f^\prime)}$, $m_{c 0}^{(n_f^\prime)}$) and thus they have to be decoupled iteratively in order to express all quantities on the r.h.s. of the above equations by the same parameters ($\alpha_{s 0}^{(n_f)}$, $a_0^{(n_f)}$, $m_{c 0}^{(n_f)}$). In the standard approach the $n_f^\prime$-flavour quantities vanish since only scale-less integrals are involved. As a cross check we have verified that we reobtain the analytical result for the single-step decoupling if we apply the formalism of Eq. (\[eq::2step\_mv\_c\]) and the subsequent decoupling of the charm quark at the same scale. We have incorporated the finite charm quark mass effects in the two-step decoupling approach (cf. Fig. \[fig::asMz\]) and observe small numerical effects. A minor deviation from the $m_c=0$ curve can only be seen for decoupling scales of the order of 1 GeV which confirms the conclusions reached above that the power-suppressed terms are numerically negligible. Thus we both refrain from explicitly presenting numerical results and analytical formulae for the renormalized decoupling coefficients as obtained from Eqs. (\[eq::2step\_mv\_c\]). Decoupling effects in the strange quark mass -------------------------------------------- In analogy to the strong coupling we study in the following the relation of the strange quark mass $m_s(\mu)$ defined with three and five active quark flavours, respectively. The numerical analysis follows closely the one for $\alpha_s$: $N$-loop running is accompanied by $(N-1)$-loop decoupling relations. It is, however, slightly more involved since besides $m_s(\mu)$ also $\alpha_s(\mu)$ has to be known for the respective renormalization scale and number of active flavours. We organized the calculation in such a way that we simultaneously solve the renormalization group equations for $m_s(\mu)$ and $\alpha_s(\mu)$ (truncated to the considered order) using [Mathematica]{}. In Fig. \[fig::mqMz\] we show $m_s^{(5)}(M_Z)$ as a function of $\mu_{\rm dec}$ and again compare the single-step (dashed lines) to the two-step (dash-dotted lines) approach. For our numerical analysis we use in addition to the parameters specified above $m_s(2~\mbox{GeV})=100$ MeV. The same conclusion as for $\alpha_s$ can be drawn: The difference between the two approaches becomes smaller with increasing loop order. At the same time the prediction for $m_s^{(5)}(M_Z)$ becomes more and more independent of $\mu_{\rm dec}$. The results again suggest that the power-corrections $M_c/M_b$ are small justifying the application of the two-step decoupling. Effective coupling of the Higgs boson to gluons {#S:Higgs} =============================================== The production and decay of an intermediate-mass Higgs boson can be described to good accuracy by an effective Lagrange density where the top quark is integrated out. It contains an effective coupling of the Higgs boson to gluons given by $$\begin{aligned} {\cal L}_{\rm eff} &=& -\frac{\phi}{v} C_1 {\cal O}_1 \,, \label{eq::leff}\end{aligned}$$ with ${\cal O}_1 = G_{\mu\nu} G^{\mu\nu}$. $C_1$ is the coefficient function containing the remnant contributions of the top quark, $G^{\mu\nu}$ is the gluon field strength tensor, $\phi$ denotes the CP-even Higgs boson field and $v$ is the vacuum expectation value. The effective Lagrange density in Eq. (\[eq::leff\]) can also be used for theories beyond the Standard Model like supersymmetric models or extensions with further generations of heavy quarks. In all cases the effect of the heavy particles is contained in the coefficient function $C_1$. In Ref. [@Chetyrkin:1997un] a low-energy theorem has been derived which relates the effective Higgs-gluon coupling $C_1$ to the decoupling constant for $\alpha_s$. In this Section we apply this theorem to an extension of the Standard Model containing additional heavy quarks which couple to the Higgs boson via a top quark-like Yukawa coupling. Restating Eq. (39) of Ref. [@Chetyrkin:1997un] in our notation and for the case of several heavy quarks leads to $$\begin{aligned} C_1 &=& -\frac{1}{2} \sum_{i=1}^{N_h} M_i^2 \frac{{\rm d}}{{\rm d} M_i^2} \log\zeta_{\alpha_s} \,,\end{aligned}$$ where $N_h$ is the number of heavy quarks with on-shell masses $M_i$. Using $\zeta_{\alpha_s}$ from Eq. (\[Intro:zetaren\]) (see also [@progdata]) we obtain for $C_1$ the following result[^7] $$\begin{aligned} C_1 &=& \frac{\alpha_s^{\rm (full)}(\mu)}{\pi} \left( - T_F \frac{N_h}{6} \right) + \left( \frac{\alpha_s^{\rm (full)}(\mu)}{\pi} \right)^2 \left( \frac{C_F T_F}{8} - C_A T_F \frac{5}{24} + T_F^2 \frac{\Sigma_h}{18} \right) N_h \nonumber\\ &&{} + \left( \frac{\alpha_s^{\rm (full)}(\mu)}{\pi} \right)^3 \left\{ - C_F^2 T_F \frac{9}{64} N_h + C_F C_A T_F \left[ \frac{25}{72} N_h + \frac{11}{96} \Sigma_h \right] \right. \nonumber\\ &&{} + C_F T_F^2 \left[ \frac{5}{96} N_h n_l + \frac{17}{288} N_h^2 - \Sigma_h \left( \frac{N_h}{8} + \frac{n_l}{12} \right) \right] - C_A^2 T_F \left[ \frac{1063}{3456} N_h + \frac{7}{96} \Sigma_h \right] \nonumber\\ &&{} \left. + C_A T_F^2 \left[ \frac{47}{864} n_l - \frac{49}{1728} N_h + \frac{5}{24} \Sigma_h \right] N_h - T_F^3 \Sigma_h^2 \frac{N_h}{54} \right\} \,,\end{aligned}$$ where $\alpha_s^{\rm (full)}$ is the strong coupling in the full theory with $n_l+N_h$ active quark flavours and $\Sigma_h = \sum_{i=1}^{N_h} \log(\mu^2/M_i^2)$. After expressing $\alpha_s^{\rm (full)}$ in terms of $\alpha_s^{(5)}$ and specifying the colour factors to SU(3) we reproduce the result of Ref. [@Anastasiou:2010bt] which has been obtained by an explicit calculation of the Higgs-gluon vertex corrections. For $N_h=1$ the result obtained in Ref. [@Chetyrkin:1997un] is reproduced. It is remarkable that although $\zeta_{\alpha_s}$ contains di- and tri-logarithms there are only linear logarithms present in $C_1$. Conclusion {#S:Conc} ========== The main result of this paper is the computation of a decoupling constant relating the strong coupling defined with three active flavours to the one in the five-flavour theory. At three-loop order Feynman diagrams with two mass scales, the charm and the bottom quark mass, have to be considered. The corresponding integrals have been evaluated exactly and analytical results have been presented. The new results can be used in order to study the effect of power-suppressed terms in $M_c/M_b$ which are neglected in the conventional approach [@Chetyrkin:1997un]. Various analyses are performed which indicate that the mass corrections present in the one-step approach are small as compared to $\log(\mu^2/M_{c,b}^2)$ which are resummed using the conventional two-step procedure. Using a well-known low-energy theorem [@Chetyrkin:1997un] we can use our result for the decoupling constant in order to obtain the effective gluon-Higgs boson coupling for models containing several heavy quarks which couple to the Higgs boson via the same mechanism as the top quark. This constitutes a first independent check of the result presented in Ref. [@Anastasiou:2010bt] where the matching coefficient has been obtained by a direct evaluation of the Higgs-gluon-gluon vertex diagrams. Acknowledgments {#acknowledgments .unnumbered} =============== This work was supported by the Deutsche Forschungsgemeinschaft through the SFB/TR-9 “Computational Particle Physics”. We are grateful to K.G. Chetyrkin for useful discussions. Integral $I(x)$ {#S:Ix} =============== With the help of `FIRE` [@Smirnov:2008iw] we can express the integral $I(x)$ as defined in Eq. (\[Calc:Idef\]) as a linear combination of master integrals $$\begin{aligned} &&I(x) = I(x^{-1}) = \frac{1}{(d-1) (d-4) (d-6) (d-8) (d-10)} \label{Ix:I}\\ &&{}\times\biggl[ \frac{1}{4} \left( c_{10} + c_{11} (x^{-2}+x^2) + c_{12} (x^{-4}+x^4) \right) I_1(x) \nonumber\\ &&\hphantom{{}\times\biggl[\biggr.} + \frac{3}{16} (d-2) (x^{-1}+x) \left( c_{20} + c_{21} (x^{-2}+x^2) \right) I_2(x) \nonumber\\ &&\hphantom{{}\times\biggl[\biggr.} - \frac{c_{-1} (x^{2+\varepsilon} + x^{-2-\varepsilon}) + c_0 (x^\varepsilon + x^{-\varepsilon}) + c_1 (x^{-2+\varepsilon} + x^{2-\varepsilon}) + c_2 (x^{-4+\varepsilon} + x^{4-\varepsilon})}{(d-2)^2 (d-3) (d-5) (d-7)} \biggr]\,. \nonumber\end{aligned}$$ $I_1$ and $I_2$ are master integrals with four massive lines (see Fig. \[F:Master\]) which are given by $$\begin{aligned} &&I_1(x) = I_1(x^{-1}) = \frac{(m_b m_c)^{-2+3\varepsilon}}{(i \pi^{d/2})^3 \Gamma^3(\varepsilon)} \int \frac{d^d k_1\,d^d k_2\,d^d k_3}{D_1 D_2 D_3 D_4}\,, \nonumber\\ &&I_2(x) = I_2(x^{-1}) = \frac{(m_b m_c)^{-3+3\varepsilon}}{(i \pi^{d/2})^3 \Gamma^3(\varepsilon)} \int \frac{N\,d^d k_1\,d^d k_2\,d^d k_3}{D_1 D_2 D_3 D_4}\,, \nonumber\\ &&D_1 = m_b^2 - k_1^2\,,\quad D_2 = m_b^2 - k_2^2\,,\quad D_3 = m_c^2 - k_3^2\,, \nonumber\\ &&D_4 = m_c^2 - (k_1-k_2+k_3)^2\,,\quad N = - (k_1-k_2)^2\,, \label{Ix:I12}\end{aligned}$$ and $c_i$ and $c_{ij}$ are coefficients depending on $d=4-2\varepsilon$ $$\begin{aligned} &&c_{10} = (d-1) (5 d^4 - 104 d^3 + 73 d^2 - 2116 d + 2086)\,,\\ &&c_{11} = (d-1) (2d-7) (2 d^3 - 35 d^2 + 180 d - 256)\,,\\ &&c_{12} = (d-9) (2d-5) (2d-7) (2d-9)\,,\\ &&c_{20} = 2 (d^4 - 22 d^3 + 165 d^2 - 491 d + 487)\,,\\ &&c_{21} = (d-9) (2d-7) (2d-9)\,,\\ &&c_{-1} = (d-3) (d-5) (d-7) (d-9) (2d-5) (2d-7) (2d-9)\,,\\ &&c_0 = (d-1) (d-3) (4 d^5 - 108 d^4 + 1090 d^3 - 5009 d^2 + 9838 d - 5335)\,,\\ &&c_1 = (d-1) (d-7) (2 d^5 - 46 d^4 + 384 d^3 - 1423 d^2 + 2158 d - 739)\,,\\ &&c_2 = (d-1) (d-5) (d-7) (d-9) (2d-7) (2d-9)\,.\end{aligned}$$ The master integrals used in Ref. [@Bekavac:2009gz] are related to $I_{1,2}$ by $$\begin{aligned} I_{4.3} &=& (m_b m_c)^{2-3\varepsilon} \Gamma^3(\varepsilon) I_1(x)\,, \nonumber\\ I_{4.3a} &=& (m_b m_c)^{1-3\varepsilon} \Gamma^3(\varepsilon) \frac{x}{1-x^2} \nonumber\\ &&{}\times\left[ - \frac{1}{4} \left(d-3 - (2d-5) x^2\right) I_1(x) + \frac{3}{16} (d-2) x I_2(x) + \frac{x^\varepsilon + x^{2-\varepsilon}}{(d-2)^2} \right]\,. \label{Ix:4.3}\end{aligned}$$ Using their expansions in $\varepsilon$ [@Bekavac:2009gz] we obtain $$I(x) = - \frac{32}{27} \left[ 1 - \frac{2}{3} \varepsilon + \frac{1}{2} \left( \frac{25}{3} + 3 L^2 \right) \varepsilon^2 + B \varepsilon^3 + \cdots \right]\,, \label{Ix:e}$$ where $$\begin{aligned} &&\frac{32}{3} B = 64 L_+(x) - \frac{(1+x^2)(5+22x^2+5x^4)}{x^3} L_-(x) \nonumber\\ &&{} + \frac{5+18x^2+5x^4}{x^2} L^2 - 10 \frac{1-x^4}{x^2} L + 10 \frac{(1-x^2)^2}{x^2} + \frac{64}{3} \zeta_3 - \frac{1256}{81}\,, \label{Ix:B}\end{aligned}$$ and $$\begin{aligned} L_\pm(x) &=& L_\pm(x^{-1}) = {\mathop{\mathrm{Li}}\nolimits_{3}}(x) - L {\mathop{\mathrm{Li}}\nolimits_{2}}(x) - \frac{L^2}{2} \log(1-x) + \frac{L^3}{12} \nonumber\\ &&{} \pm \left[ {\mathop{\mathrm{Li}}\nolimits_{3}}(-x) - L {\mathop{\mathrm{Li}}\nolimits_{2}}(-x) - \frac{L^2}{2} \log(1+x) + \frac{L^3}{12} \right]\,, \label{Ix:L}\end{aligned}$$ with $L=\log x$. Note that the functions $L_\pm(x)$ are analytical from 0 to $+\infty$. For $x=1$, $I_2(1)$ is not independent [@Broadhurst:1991fi]: $$I_2(1) = - \frac{4}{3} \left( I_1(1) + \frac{8}{(d-2)^3} \right)\,. \label{Ix:1}$$ The expansion of $I_1(1)$ in $\varepsilon$ has been studied in Refs. [@Broadhurst:1991fi; @Broadhurst:1996az]. Using the explicit formulas (3.2) and (2.3) from [@Bekavac:2009gz], it is easy to get $$I(1) = - \frac{32}{27} \left[ 1 - \frac{2}{3} \varepsilon + \frac{25}{6} \varepsilon^2 - \left( 7 \zeta_3 + \frac{157}{108} \right) \varepsilon^3 + \cdots \right]\,, \label{Ix:1a}$$ in agreement with (\[Ix:e\]). For $x\to0$, two regions [@Smirnov:2002pj] contribute to $I(x)$ (see Eq. (\[Calc:Idef\])), the hard ($k\sim m_b$) and and the soft ($k\sim m_c$) one. The result for the leading term is given by $$\begin{aligned} I(x) &=& I_h x^{3\varepsilon} \left[1 + \mathcal{O}(x^2)\right] + I_s x^{-\varepsilon} \left[1 + \mathcal{O}(x^2)\right]\,, \label{Ix:0}\\ I_h &=& \frac{8}{3} \frac{d-5}{(d-1) (d-3) (2d-9) (2d-11)} \frac{\Gamma(1-\varepsilon) \Gamma^2(1+2\varepsilon) \Gamma(1+3\varepsilon)}{\Gamma^2(1+\varepsilon) \Gamma(1+4\varepsilon)}\,, \nonumber\\ I_s &=& \frac{8}{3} \frac{d-6}{(d-2) (d-5) (d-7)}\,. \nonumber\end{aligned}$$ Expanding this formula in $\varepsilon$ we reproduce Eq. (\[Ix:e\]) for $x\to0$. Ghost–gluon vertex at two loops {#S:Ghost} =============================== We need this vertex expanded in the external momenta up to the linear terms. Let us consider the right-most vertex on the ghost line: $$\raisebox{-7mm}{\begin{picture}(27,18) \put(13.5,9.5){\makebox(0,0){\includegraphics{figs/ghr.eps}}} \put(23.5,0){\makebox(0,0)[b]{$p$}} \put(12.5,18){\makebox(0,0)[tl]{$\mu$}} \put(22,4.5){\makebox(0,0)[bl]{$\nu$}} \end{picture}} = A^{\mu\nu} p_\nu\,.$$ The tensor $A^{\mu\nu}$ may be calculated at zero external momenta, hence $A^{\mu\nu}=Ag^{\mu\nu}$. Therefore all loop diagrams have the Lorentz structure of the tree vertex, as expected. Now let us consider the left-most vertex: $$\raisebox{-7mm}{\begin{picture}(27,18) \put(13.5,9.5){\makebox(0,0){\includegraphics{figs/ghl.eps}}} \put(3.5,0){\makebox(0,0)[b]{$0$}} \put(8.5,0){\makebox(0,0)[b]{$k$}} \put(5,10){\makebox(0,0){$k$}} \end{picture}}\,.$$ It gives $k^\lambda$, thus singling out the longitudinal part of the gluon propagator. Therefore, all loop corrections vanish in Landau gauge. Furthermore, diagrams with self-energy insertions into the left-most gluon propagator vanish in any covariant gauge: $$\raisebox{-9mm}{\includegraphics{figs/gh0.eps}} = \raisebox{-7mm}{\includegraphics{figs/gh3.eps}} = 0\,.$$ In the diagrams including a quark triangle, the contraction of $k^\lambda$ transfers the gluon propagator to a spin 0 propagator and a factor $k^\rho$ which contracts the quark-gluon vertex. After decomposing $k\!\!\!/$ into a difference of the involved fermion denominators one obtains in graphical form $$\begin{aligned} &&\raisebox{-7mm}{\includegraphics{figs/gh1.eps}} = a_0 \left[ \raisebox{-7mm}{\includegraphics{figs/gha.eps}} - \raisebox{-7mm}{\includegraphics{figs/ghb.eps}} \right]\,,\\ &&\raisebox{-7mm}{\includegraphics{figs/gh2.eps}} = a_0 \left[ \raisebox{-7mm}{\includegraphics{figs/ghb.eps}} - \raisebox{-7mm}{\includegraphics{figs/gha.eps}} \right]\,.\end{aligned}$$ The diagrams with a massless triangle vanish. The non-vanishing diagrams contain the same Feynman integral, but differ by the order of the colour matrices along the quark line, thus leading to a commutator of two Gell-Mann matrices. The remaining diagram contains a three-gluon vertex with a self energy inserted in the right-most gluon propagator. The contraction of $k^\lambda$ with the three-gluon vertex cancels the gluon propagator to the right of the three-gluon vertex: $$\raisebox{-7mm}{\includegraphics{figs/gh4.eps}} = a_0 \raisebox{-7mm}{\includegraphics{figs/gha.eps}}\,.$$ The colour structure of the three-gluon vertex is identical to the commutator above, however with opposite sign. Therefore, after summing all contributions the result is zero. Decoupling at on-shell masses {#S:OS} ============================= For some applications it is convenient to parametrize the decoupling constants in terms of the on-shell instead of $\overline{\mbox{MS}}$ quark masses. The corresponding counterterm relation reads $$m_{b0} = Z_{m_b}^{{\rm os}(n_f)}\left(\alpha_{s0}^{(n_f)}\right) M_b\,,\quad m_{c0} = Z_{m_c}^{{\rm os}(n_f)}\left(\alpha_{s0}^{(n_f)}\right) M_c\,, \label{OS:mass}$$ where in our application $Z_{m_b}^{{\rm os}(n_f)}$ and $Z_{m_c}^{{\rm os}(n_f)}$ are needed to two-loop accuracy. They have been calculated in Ref. [@Gray:1990yh] (see also [@Davydychev:1998si; @Bekavac:2007tk]). Note that the two-loop coefficients of $Z_{m_b}^{{\rm os}(n_f)}$ and $Z_{m_c}^{{\rm os}(n_f)}$ are non-trivial functions of $m_c/m_b$; a compact expression can be found in Ref. [@Bekavac:2007tk]. The advantage of using on-shell masses is that they are identical in all theories (with any number of flavours). Furthermore their numerical value does not depend on the renormalization scale. However, it is well known that usually the coefficients of perturbative series for physical quantities grow fast when expressed via on-shell quark masses and hence the ambiguities of the mass values (extracted from those observable quantities) are quite large. Nevertheless, using on-shell masses in intermediate theoretical formulae (at any finite order of perturbation theory) can be convenient. The decoupling relations are particularly compact if $\alpha_s^{(n_l)}(M_c)$ is expressed as a series in $\alpha_s^{(n_f)}(M_b)$ since then the coefficients only depend on $x_{\rm os} = M_c/M_b$ (see results in [@progdata]). [99]{} W. Bernreuther and W. Wetzel, *Decoupling of heavy quarks in the minimal subtraction scheme*, ; Erratum: . S.A. Larin, T. van Ritbergen and J.A.M. Vermaseren, *The Large quark mass expansion of $\Gamma(Z^0\to\mbox{hadrons})$ and $\Gamma(\tau^-\to\nu_\tau+\mbox{hadrons})$ in the order $\alpha_s^3$*, \[arXiv:\]. K.G. Chetyrkin, B.A. Kniehl and M. Steinhauser, *Decoupling relations to $\mathcal{O}(\alpha_s^3)$ and their connection to low-energy theorems*, \[arXiv:\]. Y. Schröder and M. Steinhauser, *Four-loop decoupling relations for the strong coupling*, \[arXiv:\]. K.G. Chetyrkin, J.H. Kühn and C. Sturm, *QCD decoupling at four loops*, \[arXiv:\]. V.A. Smirnov, *Applied asymptotic expansions in momenta and masses*, Springer Tracts Mod. Phys.  [**177**]{} (2002) 1. P. Pascual, R. Tarrach, *Qcd: Renormalization for the practitioner*, Lecture notes in physics **194**, Springer (1984). P. Nogueira, *Automatic Feynman graph generation*, . J.A.M. Vermaseren, *New features of `FORM`*, [[math-ph/0010025](http://xxx.lanl.gov/abs/math-ph/0010025)]{}. R. Harlander, T. Seidensticker, M. Steinhauser, *Complete corrections of $\mathcal{O}(\alpha\alpha_s)$ to the decay of the $Z$ boson into bottom quarks*, \[arXiv:\]. T. Seidensticker, *Automatic application of successive asymptotic expansions of Feynman diagrams*, arXiv:. S. Bekavac, A.G. Grozin, D. Seidel, M. Steinhauser, *Light quark mass effects in the on-shell renormalization constants*, \[ \[hep-ph\]\]. A.V. Smirnov, *Algorithm `FIRE` — Feynman Integral REduction*, \[ \[hep-ph\]\]. S. Bekavac, A.G. Grozin, D. Seidel, V.A. Smirnov, *Three-loop on-shell Feynman integrals with two masses*, \[ \[hep-ph\]\]. M. Steinhauser, *`MATAD`: A program package for the computation of massive tadpoles*, \[arXiv:\]. D.J. Broadhurst, *Three loop on-shell charge renormalization without integration: $\Lambda_{\overline{\rm MS}}^{\rm QED}$ to four loops*, . A.G. Grozin, A.V. Smirnov, V.A. Smirnov, *Decoupling of heavy quarks in HQET*, \[arXiv:\]. S. Bekavac, A.G. Grozin, P. Marquard, J.H. Piclum, D. Seidel, M. Steinhauser, *Matching QCD and HQET heavy-light currents at three loops*, \[ \[hep-ph\]\]. T. van Ritbergen, J.A.M. Vermaseren, S. A. Larin, *The four-loop $\beta$-function in quantum chromodynamics*, \[arXiv:\]. M. Czakon, *The four-loop QCD $\beta$-function and anomalous dimensions*, \[arXiv:\]. K.G. Chetyrkin, *Quark mass anomalous dimension to $\mathcal{O}(\alpha_s^4)$*, \[arXiv:\]. J.A.M. Vermaseren, S. A. Larin, T. van Ritbergen, *The 4-loop quark mass anomalous dimension and the invariant quark mass*, \[arXiv:\]. K.G. Chetyrkin, J.H. Kühn, M. Steinhauser, *`RunDec`: A `Mathematica` package for running and decoupling of the strong coupling and quark masses*, \[arXiv:\]. S.A. Larin, J.A.M. Vermaseren, *The three-loop QCD $\beta$-function and anomalous dimensions*, \[arXiv:\]. K.G. Chetyrkin, *Four-loop renormalization of QCD: Full set of renormalization constants and anomalous dimensions*, \[arXiv:\]. K.G. Chetyrkin, A. Rétey, *Renormalization and running of quark mass and field in the regularization invariant and $\overline{\mbox{MS}}$ schemes at three loops and four loops*, \[arXiv:\]. `http://www-ttp.particle.uni-karlsruhe.de/Progdata/ttp11/ttp11-07/` P.A. Baikov, K.G. Chetyrkin, J.H. Kühn, *Order $\alpha^4_s$ QCD corrections to $Z$ and $\tau$ decays*, \[ \[hep-ph\]\]. J.H. Kühn, M. Steinhauser, C. Sturm, *Heavy quark masses from sum rules in four-loop approximation*, \[arXiv:\]. K. Nakamura [*et al.*]{} \[Particle Data Group\], *Review of particle physics*, . C. Anastasiou, R. Boughezal, E. Furlan, *The NNLO gluon fusion Higgs production cross-section with many heavy quarks*, \[ \[hep-ph\]\]. D.J. Broadhurst, *On the enumeration of irreducible $k$-fold Euler sums and their roles in knot theory and field theory*, arXiv:. N. Gray, D.J. Broadhurst, W. Grafe, K. Schilcher, *Three loop relation of quark $\overline{\mbox{MS}}$ and pole masses*, . A.I. Davydychev, A.G. Grozin, *Effect of $m_c$ on $b$ quark chromomagnetic interaction and on-shell two-loop integrals with two masses*, \[arXiv:\]. [^1]: At low $q\ne0$, the self-energies in the full theory are given by sums of contributions from various integration regions, see, e.g., [@Smirnov:2002pj]; the contribution we need comes from the completely hard region, where all loop momenta are of order of heavy-quark masses. [^2]: The $A\bar{q}q$ vertex at 0-th order in its external momenta obviously has only the tree-level structure. For the $A\bar{c}c$ vertex at the linear order in external momenta, this statement is proven in Appendix \[S:Ghost\]. The $AAA$ vertex at the linear order in its external momenta can have, in addition to the tree-level structure, one more structure: $d^{a_1 a_2 a_3}(g^{\mu_1 \mu_2}k_3^{\mu_3}+\mbox{cycle})$; however, the Slavnov–Taylor identity ${\langle}T\{\partial^\mu A_\mu(x),\partial^\nu A_\nu(y),\partial^\lambda A_\lambda(z)\}{\rangle}=0$ leads to $\Gamma^{a_1 a_2 a_3}_{\mu_1 \mu_2 \mu_3} k_1^{\mu_1} k_2^{\mu_2} k_3^{\mu_3} = 0$ (see Ref. [@Pascual:1984zb]), thus excluding this second structure. [^3]: Note that $\Gamma(\varepsilon)=1/\varepsilon + {\cal O}(1)$. [^4]: Note that the masses $m_c(\mu)$ and $m_b(\mu)$ (and $m_{c0}$, $m_{b0}$) are those in the full $n_f$-flavour QCD. They do not exist in the low-energy $n_l$-flavour QCD, and therefore we do not assign a superscript $n_f$ to these masses. [^5]: It has been argumented in Refs. [@Kuhn:2007vp] that in the case of charm the scale $\mu=m_c$ is too small leading to a value of $\alpha_s$ which is too large. Thus $m_c(3~\mbox{GeV})$ has been proposed as reference value. [^6]: For $\beta_4>0$ the dotted curve in Fig. \[fig::asMz\](b) moves towards the four-loop curve. [^7]: Note that up to three-loop order there are only diagrams with at most two different quark flavours. Thus it is possible to obtain the result for $C_1$ for $N_h$ heavy quarks.
Mid
[ 0.61756373937677, 27.25, 16.875 ]
Trade war truce: United States and China pull back from the brink United States and China reported progress in talks aimed at bringing down America's massive trade deficit with Beijing. U.S. Treasury Secretary Steven Mnuchin waves to the media as he and the U.S. delegation for trade talks with China, leave a hotel in Beijing, May 3, 2018.REUTERS/Jason Lee The United States and China are pulling back from the brink of a trade war after the world's two biggest economies reported progress in talks aimed at bringing down America's massive trade deficit with Beijing. "We are putting the trade war on hold," Treasury Secretary Steven Mnuchin said Sunday. After high-level talks last week in , Beijing agreed in a joint statement with the U.S. to "substantially reduce" America's trade deficit with China, but did not commit to cut the gap by any specific amount. The Trump administration had sought to slash the deficit by $200 billion. He said they expect to see a big increase — 35 percent to 45 percent this year alone — in U.S. farm sales to China. Mnuchin also forecast a doubling in sales of U.S. energy products to the Chinese market, increasing energy exports by $50 billion to $60 billion in the next three years to five years. Commerce Secretary Wilbur Ross, who has been part of the U.S. negotiating team, will go to China soon to follow up on last week's discussions, Mnuchin said. Beijing committed to "significantly increase" its purchases of American goods and services, saying the increase would "meet the growing consumption needs of the Chinese people and the need for high-quality economic development." However, China's government said it cannot guarantee renewed trade tension with Washington can be avoided . A foreign ministry spokesman, Lu Kang, said Monday that Mnuchin's comments showed both sides hope to avoid a "trade war." However, he added, "Given the increasing interaction between the two countries, we cannot assure you they will not encounter more frictions or disputes in the future." Mnuchin said Sunday the two sides were "putting the trade war on hold" following an announcement that Beijing would buy more American goods. But the two sides gave no indication how much progress they had made toward ending their dispute. Last year, the U.S. had a record $376 billion deficit with China in the trade of goods; that was the largest by far with any nation. Trade analysts were not surprised that China refused to agree to a numerical target for cutting the trade gap, but they said the talks probably were more successful in easing trade tensions. "The Trump administration seems eager to engineer at minimum a temporary peace with China to ensure a smooth run-up to the Kim-Trump summit in June," Cornell University economist Eswar Prasad said, referring to the June 12 meeting scheduled between President Donald Trump and North Korean leader Kim Jong Un. If there is success in the U.S.-China discussions, analysts suggest it likely would involve the countries' presidents this fall before the November elections. "Part of the good news for markets: As long as both sides continue to be 'constructively' engaged, imposition of additional tariffs by either side is very unlikely," analysts at investment management firm Evercore ISI said in a research note. "There is no reason for either side — particularly the U.S. — to destroy the process that both sides are building, which is what imposing tariffs would do." Trump campaigned in 2016 on a pledge to get tough on China and other U.S. trading partners. He views the U.S. trade deficit with China as evidence that Beijing is engaged in abusive trading practices and has outmaneuvered previous U.S. administrations. Last August, U.S. Trade Representative Robert Lighthizer began investigating Beijing's strong-arm tactics to challenge U.S. technological dominance. These include outright cybertheft of U.S. companies' trade secrets and China's demands that American corporations hand over technology in exchange for access to the Chinese markets. Last month, the administration proposed tariffs on $50 billion of Chinese imports to protest the forced technology transfers. Trump later ordered Lighthizer to seek up to an additional $100 billion in Chinese products to tax. China responded by targeting $50 billion in U.S. products, including soybeans — a shot at Trump supporters in America's heartland. The prospect of an escalating trade war has shaken financial markets and alarmed business leaders. In a separate controversy, the Commerce Department last month blocked China's ZTE Corp. from importing American components for seven years, accusing the telecommunications company of misleading U.S. regulators after it settled charges last year of violating sanctions against Iran and North Korea. The ban amounted to a death sentence for ZTE, which relies heavily on U.S. parts, and the company announced that it was halting operations. A week ago, Trump tweeted that he was working with Chinese President Xi Jinping to put ZTE "back in business, fast." Media reports suggested that the U.S. was offering to swap a ZTE rescue for an end to proposed Chinese tariffs on U.S. farm products. Sen. Mark Warner of Virginia, the top Democrat on the Senate Intelligence Committee, called Trump's intervention in the case "outrageous" and said that using ZTE "as a bargaining chip ... is not in the best interests of our national security." White House economic adviser Larry Kudlow said there could be "some small changes around the edges" in the sanctions against ZTE. But Kudlow added: "Do not expect ZTE to get off scot-free. It ain't gonna happen." Mnuchin and Graham appeared on "Fox News Sunday," Warner spoke on CNN's "State of the Union" and Kudlow was interviewed on ABC's "This Week."
Mid
[ 0.551059730250481, 35.75, 29.125 ]
Q: CSS animation keyframe percentage issue I have posted before about CSS Keyframe animation and tried a different way of using delays. I had css continous slider of 5 divs which worked fine. However I needed to remove two of the divs so there is only three. .wrapper{ position: relative; height: 330px; display: grid; overflow: hidden; width:600px; background:#f1f1f1; } .slide { position: absolute; top: 0; left: 0; height: 100%; width: 100%; animation: slider 9s cubic-bezier(0.5, 1, 0.5, 1) infinite; color:#fff; font-size:30px; text-align:center; padding-top:25%; } .slide:first-of-type { animation-delay: -9s; background:red; } .slide:nth-of-type(2) { animation-delay: -6s; background:blue; } .slide:last-of-type { animation-delay: -3s; background:black; } @keyframes slider { 0% { transform: translateX(0); opacity: 1; } 16% { transform: translateX(0); opacity: 1; } 20% { transform: translateX(100%); opacity: 1; } 75% { transform: translateX(100%); opacity: 0; } 76% { transform: translateX(-100%); opacity: 0; } 96% { transform: translateX(-100%); opacity: 1; } } <div class="wrapper"> <div class="slide"> 1 </div> <div class="slide"> 2 </div> <div class="slide"> 3 </div> </div> Link to my on going codepen. So I have tried changing the animation to 9s, 3 seconds per div. I have changed the delay on the divs to -9s, -6s, -3s respectively but I have a pause in between each div sliding in. I have tried to alter the percentages which is where I believe I am going wrong. I am wondering if anyone can give me some help on the percentages I need to change or if there is a formula to use so I can switch up the amount of divs in the future if need be? A: The keyframe percentages relate to your animation duration. For example: with a 10 second animation, 10% is the 1 second mark, 50% the 5 second mark, and 100% the 10 second mark. If your entire animation is 9 seconds long and you have 3 slides that all start with an offset of 3 seconds, then you'll want to make sure that your slides do their thing in the first 33.33% (3 seconds) of the key-frame animation and stay hidden for the remaining 66.66% (6 seconds). Now in your case the slide transitions aren't instant, so you'll have to go slightly beyond 33.33% to ensure that your animations overlap nicely without a gap. The delay you were seeing are these gaps. So with that in mind you can simplify them like so: @keyframes slider { /* Start left off screen */ 0% { transform: translateX(-100%); } /* Move to visible position within 8% of 9 seconds (less than a second). */ 8% { transform: translateX(0); } /* Stay until at least 3 second mark (33% of 9s). */ 33.33% { transform: translateX(0); } /* Move offscreen to the right while the next slide is moving in. Same duration as slide-in (8%), but starting at 33.33%, so 33.33% + 8% = 41.33%. */ 41.33% { transform: translateX(100%); } /* Stay there until the end. */ 100% { transform: translateX(100%); } } Here a snippet: .wrapper{ position: relative; height: 330px; display: block; overflow: hidden; width:600px; background:#f1f1f1; } .slide { position: absolute; top: 0; left: 0; height: 100%; width: 100%; animation: slider 9s cubic-bezier(0.5, 1, 0.5, 1) infinite; color:#fff; font-size:30px; text-align:center; padding-top:25%; } .slide:first-of-type { animation-delay: -9s; background:red; } .slide:nth-of-type(2) { animation-delay: -6s; background:blue; } .slide:last-of-type { animation-delay: -3s; background:black; } .wrapper{ position: relative; height: 330px; display: block; overflow: hidden; width:600px; background:#f1f1f1; } .slide { position: absolute; top: 0; left: 0; height: 100%; width: 100%; animation: slider 9s cubic-bezier(0.5, 1, 0.5, 1) infinite; color:#fff; font-size:30px; text-align:center; padding-top:25%; } .slide:first-of-type { animation-delay: -9s; background:red; } .slide:nth-of-type(2) { animation-delay: -6s; background:blue; } .slide:last-of-type { animation-delay: -3s; background:black; } @keyframes slider { /* Start left off screen */ 0% { transform: translateX(-100%); } /* Move to visible position within 8% of 9 seconds (less than a second). */ 8% { transform: translateX(0); } /* Stay until at least 3 second mark (33% of 9s). */ 33.33% { transform: translateX(0); } /* Move offscreen to the right while the next slide is moving in. Same duration as slide-in (8%), but starting at 33.33%, so 33.33% + 8% = 41.33%. */ 41.33% { transform: translateX(100%); } /* Stay there until the end. */ 100% { transform: translateX(100%); } } <div class="wrapper"> <div class="slide"> 1 </div> <div class="slide"> 2 </div> <div class="slide"> 3 </div> </div> I do not think that you need the opacity changes, so I removed them. You can, of course, change the percentages to increase/decrease the pause and speed of animation... just remember to make sure that the keyframes that show the slide have the same duration as the keyframes that hide it (in the example above 8%). To add or remove slides in the future you can simply recalculate the percentages for that number of slides. So if you add 1 slide for a total of 4 you can work with 25% instead of 33.33%.
Mid
[ 0.552204176334106, 29.75, 24.125 ]
Quantitative bio-imaging analysis for evaluation of sexual differentiation in germ cells of olvas-GFP/ST-II YI medaka (Oryzias latipes) nanoinjected in ovo with ethinylestradiol. We examined the effects on sexual differentiation of nanoinjecting ethinylestradiol (EE2) into embryos of olvas-GFP/ST-II YI medaka (Oryzias latipes). This strain contains the green fluorescent protein (GFP) gene fused to the regulatory region of the medaka vasa gene, and germ-cell-specific expression of GFP can be visualized in living (transparent) individuals. The number of germ cells in untreated genotypic females (XX) was approximately 10-fold that in untreated genotypic males (XY) at 10 d posthatch (dph). Germ cell proliferation was prevented in XX females that developed from embryos nanoinjected with 0.5, 2.5, or 5.0 ng of EE2. Some 10-dph XY males from embryos injected with 0.5 ng or more of EE2 showed a larger fluorescent area and more germ cells than those of pooled control groups. Males and females from embryos injected with 5.0 ng of EE2 had no significant difference in germ cell number or fluorescent area. Thus, EE2 injection into embryos caused abnormal gonadal development in both sexes. Observations of external secondary sex characteristics and histological examination of adult gonads showed complete sex reversal in some males after 0.5-, 2.5-, and 5.0-ng treatments but no changes in XX females after any treatment. Thus, quantitative bio-imaging can aid in evaluating the effects of endocrine-disrupting chemicals on fish within 10 dph.
Mid
[ 0.6243523316062171, 30.125, 18.125 ]
"use strict";var exports=module.exports={};var isPrototype = require('./_isPrototype.js'), nativeKeys = require('./_nativeKeys.js'); /** Used for built-in method references. */ var objectProto = Object.prototype; /** Used to check objects for own properties. */ var hasOwnProperty = objectProto.hasOwnProperty; /** * The base implementation of `_.keys` which doesn't treat sparse arrays as dense. * * @private * @param {Object} object The object to query. * @returns {Array} Returns the array of property names. */ function baseKeys(object) { if (!isPrototype(object)) { return nativeKeys(object); } var result = []; for (var key in Object(object)) { if (hasOwnProperty.call(object, key) && key != 'constructor') { result.push(key); } } return result; } module.exports = baseKeys;
Low
[ 0.47528517110266105, 31.25, 34.5 ]
# # Licensed to the Apache Software Foundation (ASF) under one or more # contributor license agreements. See the NOTICE file distributed with # this work for additional information regarding copyright ownership. # The ASF licenses this file to You under the Apache License, Version 2.0 # (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # BEGIN { $ENV{"CUSTOM_HMAC_AUTH"} = "true" } use t::APISIX 'no_plan'; repeat_each(2); no_long_string(); no_root_location(); no_shuffle(); run_tests; __DATA__ === TEST 1: add consumer with username and plugins --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/consumers', ngx.HTTP_PUT, [[{ "username": "jack", "plugins": { "hmac-auth": { "access_key": "my-access-key", "secret_key": "my-secret-key", "clock_skew": 10 } } }]], [[{ "node": { "value": { "username": "jack", "plugins": { "hmac-auth": { "access_key": "my-access-key", "secret_key": "my-secret-key", "algorithm": "hmac-sha256", "clock_skew": 10 } } } }, "action": "set" }]] ) ngx.status = code ngx.say(body) } } --- request GET /t --- response_body passed --- no_error_log [error] === TEST 2: add consumer with plugin hmac-auth - missing secret key --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/consumers', ngx.HTTP_PUT, [[{ "username": "jack", "plugins": { "hmac-auth": { "access_key": "user-key" } } }]]) ngx.status = code ngx.say(body) } } --- request GET /t --- error_code: 400 --- no_error_log [error] === TEST 3: add consumer with plugin hmac-auth - missing access key --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/consumers', ngx.HTTP_PUT, [[{ "username": "jack", "plugins": { "hmac-auth": { "secret_key": "skey" } } }]]) ngx.status = code ngx.say(body) } } --- request GET /t --- error_code: 400 --- no_error_log [error] === TEST 4: enable hmac auth plugin using admin api --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/routes/1', ngx.HTTP_PUT, [[{ "plugins": { "hmac-auth": {} }, "upstream": { "nodes": { "127.0.0.1:1980": 1 }, "type": "roundrobin" }, "uri": "/hello" }]] ) if code >= 300 then ngx.status = code end ngx.say(body) } } --- request GET /t --- response_body passed --- no_error_log [error] === TEST 5: verify, missing signature --- request GET /hello --- error_code: 401 --- response_body {"message":"access key or signature missing"} --- no_error_log [error] === TEST 6: verify: invalid access key --- request GET /hello --- more_headers X-APISIX-HMAC-SIGNATURE: asdf X-APISIX-HMAC-ALGORITHM: hmac-sha256 X-APISIX-Date: Thu, 24 Sep 2020 06:39:52 GMT X-APISIX-HMAC-ACCESS-KEY: sdf --- error_code: 401 --- response_body {"message":"Invalid access key"} --- no_error_log [error] === TEST 7: verify: invalid algorithm --- request GET /hello --- more_headers X-APISIX-HMAC-SIGNATURE: asdf X-APISIX-HMAC-ALGORITHM: ljlj X-APISIX-Date: Thu, 24 Sep 2020 06:39:52 GMT X-APISIX-HMAC-ACCESS-KEY: sdf --- error_code: 401 --- response_body {"message":"Invalid access key"} --- no_error_log [error] === TEST 8: verify: Invalid GMT format time --- request GET /hello --- more_headers X-APISIX-HMAC-SIGNATURE: asdf X-APISIX-HMAC-ALGORITHM: hmac-sha256 X-APISIX-Date: adfa X-APISIX-HMAC-ACCESS-KEY: my-access-key --- error_code: 401 --- response_body {"message":"Invalid GMT format time"} --- no_error_log [error] === TEST 9: verify: ok --- config location /t { content_by_lua_block { local ngx_time = ngx.time local ngx_http_time = ngx.http_time local core = require("apisix.core") local t = require("lib.test_admin") local hmac = require("resty.hmac") local ngx_encode_base64 = ngx.encode_base64 local secret_key = "my-secret-key" local time = ngx_time() local gmt = ngx_http_time(time) local access_key = "my-access-key" local custom_header_a = "asld$%dfasf" local custom_header_b = "23879fmsldfk" local signing_string = "GET" .. "/hello" .. "" .. access_key .. gmt .. custom_header_a .. custom_header_b local signature = hmac:new(secret_key, hmac.ALGOS.SHA256):final(signing_string) core.log.info("signature:", ngx_encode_base64(signature)) local headers = {} headers["X-APISIX-HMAC-SIGNATURE"] = ngx_encode_base64(signature) headers["X-APISIX-HMAC-ALGORITHM"] = "hmac-sha256" headers["X-APISIX-DATE"] = gmt headers["X-APISIX-HMAC-ACCESS-KEY"] = access_key headers["X-APISIX-HMAC-SIGNED-HEADERS"] = "x-custom-header-a;x-custom-header-b" headers["x-custom-header-a"] = custom_header_a headers["x-custom-header-b"] = custom_header_b local code, body = t.test('/hello', ngx.HTTP_GET, "", nil, headers ) ngx.status = code ngx.say(body) } } --- request GET /t --- response_body passed --- no_error_log [error] === TEST 10: update consumer with clock skew --- config location /t { content_by_lua_block { local t = require("lib.test_admin").test local code, body = t('/apisix/admin/consumers', ngx.HTTP_PUT, [[{ "username": "pony", "plugins": { "hmac-auth": { "access_key": "my-access-key2", "secret_key": "my-secret-key2", "clock_skew": 1 } } }]], [[{ "node": { "value": { "username": "pony", "plugins": { "hmac-auth": { "access_key": "my-access-key2", "secret_key": "my-secret-key2", "algorithm": "hmac-sha256", "clock_skew": 1 } } } }, "action": "set" }]] ) ngx.status = code ngx.say(body) } } --- request GET /t --- response_body passed --- no_error_log [error] === TEST 11: verify: Clock skew exceeded --- config location /t { content_by_lua_block { local ngx_time = ngx.time local ngx_http_time = ngx.http_time local core = require("apisix.core") local t = require("lib.test_admin") local hmac = require("resty.hmac") local ngx_encode_base64 = ngx.encode_base64 local secret_key = "my-secret-key2" local time = ngx_time() local gmt = ngx_http_time(time) local access_key = "my-access-key2" local custom_header_a = "asld$%dfasf" local custom_header_b = "23879fmsldfk" local signing_string = "GET" .. "/hello" .. "" .. access_key .. gmt .. custom_header_a .. custom_header_b ngx.sleep(2) local signature = hmac:new(secret_key, hmac.ALGOS.SHA256):final(signing_string) core.log.info("signature:", ngx_encode_base64(signature)) local headers = {} headers["X-APISIX-HMAC-SIGNATURE"] = ngx_encode_base64(signature) headers["X-APISIX-HMAC-ALGORITHM"] = "hmac-sha256" headers["X-APISIX-DATE"] = gmt headers["X-APISIX-HMAC-ACCESS-KEY"] = access_key local code, body = t.test('/hello', ngx.HTTP_GET, core.json.encode(data), nil, headers ) ngx.status = code ngx.say(body) } } --- request GET /t --- error_code: 401 --- response_body eval qr/\{"message":"Clock skew exceeded"\}/ --- no_error_log [error]
Mid
[ 0.6086956521739131, 33.25, 21.375 ]
Mechanical structure design of the XY stage is designed in order to fit the current Olympus microscope. For sample positioning, the stage was designed with considerations of four major requirements defined earlier: proper travel range, small parasitic motion, and short transient time response. The stage must have a central aperture of about 2" diameter for white light illumination. Therefore, a custom designed stage was necessary. For less friction and higher stiffness, air bearing from Newway Precision is chosen. Coefficient of friction for it is .00001. Stiffness for air bearing is 2,000,000 lb/in. With this configuration, the expected air gap change is less than 2 micron. All components were bolted together using various size threaded screws and positioned with clearance holes. Linear Encoder from MicroE Systems is selected for its high resolution of 0.078 micron and its compactness. Linear motor from Aerotech is chosen for actuation for its high power and less friction.
High
[ 0.6605263157894731, 31.375, 16.125 ]
Bitcoin Adoption: Evolution or Revolution? If widespread use of Bitcoin or another cryptocurrency is truly in our future, some series of events will have to disrupt the status quo. Broadly speaking, I see two possibilities, which I’ll call the revolutionary and evolutionary approaches. In the revolutionary approach, a crisis of confidence in one or many major fiat currencies around the world forces a switch to a digital currency that governments cannot manipulate. In the evolutionary approach, consumers and businesses gradually begin using and accepting Bitcoin for any number of reasons, until network effects take hold and adoption accelerates. While far from certain, we are beginning to see signs of both approaches at work. The explosion of popularity of Bitcoin in Venezuela is an example of the revolutionary approach. Terrible governance has led to hyperinflation, and residents have looked to purchasing media that cannot fall victim to such a calamity. The Venezuelan government has attempted to crack down on Bitcoin mining and usage within the country, but has largely failed. LocalBitcoins Venezuela, a decentralized exchange, as seen trading volume quadruple since June. The parallels to “dollarization” in Argentina almost 20 years ago are obvious, except now, technology has provided a currency that is controlled by no government at all, domestic or foreign. The evolutionary approach is more difficult to see day-to-day (isn’t that always the case with evolution) but the number of “legitimate” businesses accepting Bitcoin continues to grow. Cryptocurrency exchange Coinbase partners with an impressive list of companies to allow them to accept Bitcoin payments and quickly exchange those bitcoins for cash, thus avoiding exposure Bitcoin’s volatility. Current Coinbase partners include Intuit, PayPal and Expedia. Sites like coinmap track the locations of smaller businesses accepting Bitcoin as well as Bitcoin ATMs (where bitcoins can be bought or sold). These businesses may be accepting Bitcoin for reasons of convenience, or just plain visibility and trendiness. It doesn’t fully matter why, as long as the number keeps growing. Even since the pioneering work on farmers’ adoption of hybrid corn in the 1950s by economist Zvi Griliches, economists have thought of technology adoption as typically following an “S-curve,” with a small number of early adopters leading to a boom, followed by a lower rate of late adopters. It’s a very similar idea to the one Malcolm Gladwell popularized in his book Tipping Point. While not inevitable, we could be moving up the bottom of such an S-curve with Bitcoin. Note that both of these paths to Bitcoin adoption involve coordinating peoples’ expectations—an essential part of any currency. It is possible that either or both a catastrophe or gradual acceptance will lead to such expectations reaching a critical mass. Max Gulker is an economist and writer who joined AIER in 2015. His research focuses on two main areas: policy and technology. On the policy side, Gulker looks at how issues like poverty and access to education can be addressed with voluntary, decentralized approaches that don’t interfere with free markets. On technology, Gulker is interested in emerging fields like blockchain and cryptocurrencies, competitive issues raised by tech giants such as Facebook and Google, and the sharing economy. Gulker frequently appears at conferences, on podcasts, and on television. Gulker holds a PhD in economics from Stanford University and a BA in economics from the University of Michigan. Prior to AIER, Max spent time in the private sector, consulting with large technology and financial firms on antitrust and other litigation. Follow @maxgAIER.
Mid
[ 0.620087336244541, 35.5, 21.75 ]
Q: How to get details of email Account configured in iPhone/iPad Hi I am making and iPad application. I need to authenticate user if he configured his email account in device and get his email and other available details. Can you guys please help me with this. And also email is not configure I want to redirect him to the mail settings. So far I got following code for the same [[UIApplication sharedApplication] openURL:[NSURL URLWithString:@"mailto:"]]; Please help me guys. A: NO You can never get USER DETAILS configured in mail app, It breaks user privacy and hence not allowed
Low
[ 0.518123667377398, 30.375, 28.25 ]
Action of the muscarinic toxin MT7 on agonist-bound muscarinic M1 receptors. The muscarinic toxin MT7 is the most selective ligand for the muscarinic M(1) receptors. Previous studies have shown that the toxin interacts with the antagonist-receptor complex and slows the antagonist dissociation rate, possibly by binding to an allosteric site and impeding the access to and egress from the orthosteric binding pocket. In the present study, we investigated the action of MT7 on agonist-occupied receptors in functional and radioligand binding assays of the cloned human muscarinic M(1) receptor expressed in Chinese hamster ovary cells. In time-course experiments, the addition of MT7 rapidly blocked the acetylcholine-stimulated guanosine-5'-O-(3-[(35)S]thio)triphosphate binding to membrane G proteins. Similarly, in acetylcholine-treated cells MT7 completely stopped the agonist-stimulated [(3)H]inositol phosphate accumulation. In dissociation experiments using membranes pre-equilibrated with [(3)H]acetylcholine, the addition of MT7 increased the rate of radioligand dissociation. The data indicate that MT7, while partially stabilizing the antagonist-receptor complex, effectively destabilizes the agonist-occupied muscarinic M(1) receptors.
High
[ 0.677083333333333, 32.5, 15.5 ]
Q: Swift - Spritekit: Adding a counter (high score calculator) when node touches bottom edge i have my code setup so that when my ball node touches the bottom edge of the screen the program detects it. what i want, is for a var to increase by 1 everytime it touches the bottom edge, essentially a high score variable. i have this so far, but it only prints "your score is 1." over and over everytime the node touches the bottom boundary. any help would be appreciated. cheers! my code: func didBeginContact(contact: SKPhysicsContact) { // 1. Create local variables for two physics bodies var firstBody: SKPhysicsBody var secondBody: SKPhysicsBody var counter = Int() // 2. Assign the two physics bodies so that the one with the lower category is always stored in firstBody if contact.bodyA.categoryBitMask < contact.bodyB.categoryBitMask { firstBody = contact.bodyA secondBody = contact.bodyB } else { firstBody = contact.bodyB secondBody = contact.bodyA } // 3. react to the contact between ball and bottom if firstBody.categoryBitMask == BallCategory && secondBody.categoryBitMask == BottomCategory { counter++ println("Score is \(counter).") } A: The problem is, that you declare the variable counter inside the function didBeginContact. So everytime the function gets called, a new variable counteris created. Declare and initialize counter outside of the function. Best would be in a singleton Scoresheet: class Scoresheet { // Singleton static let sharedInstance = Scoresheet() var scoreCounter = 0 } Increase the value with: Scoresheet.sharedInstance.scoreCounter++
Mid
[ 0.5683297180043381, 32.75, 24.875 ]
/** * Copyright (c) 2014-present, Facebook, Inc. * All rights reserved. * * This source code is licensed under the BSD-style license found in the * LICENSE file in the root directory of this source tree. An additional grant * of patent rights can be found in the PATENTS file in the same directory. */ namespace UnityEngine.Yoga { internal enum YogaWrap { NoWrap, Wrap, WrapReverse, } }
Low
[ 0.44801980198019803, 22.625, 27.875 ]
While ISIS is getting the most attention now, another band of extremists in Syria – a mix of hardened militants from Afghanistan, Yemen, Syria and Europe – poses a more direct and imminent threat to the United States, working with Yemeni bomb-makers to target U.S. aviation, American officials say. At the center is a cell known as the Khorasan group, a cadre of veteran al-Qaeda fighters from Afghanistan and Pakistan who travelled to Syria to link up with the al-Qaeda affiliate there, the Nusra Front. But the Khorasan militants did not go to Syria principally to fight the government of President Bashar Assad, U.S. officials say. Instead, they were sent by al-Qaeda leader Ayman al-Zawahiri to recruit Europeans and Americans whose passports allow them to board a U.S.-bound airliner with less scrutiny from security officials. In addition, according to classified U.S. intelligence assessments, the Khorasan militants have been working with bomb-makers from al-Qaeda's Yemen affiliate to test new ways to slip explosives past airport security. The fear is that the Khorasan militants will provide these sophisticated explosives to their Western recruits who could sneak them onto U.S.-bound flights. The Obama administration has said that ISIS, the target of more than 150 U.S. air strikes in recent weeks, does not pose an imminent threat to the continental U.S.. The Khorasan group, which has not been subject to American military action, is considered the more immediate threat. Because of intelligence about the collaboration among the Khorasan group, al-Qaeda's Yemeni bomb-makers and Western extremists, U.S. officials say, the Transportation Security Administration in July decided to ban uncharged mobile phones and laptops from flights to the U.S. that originated in Europe and the Middle East. The Khorasan group's plotting with al-Qaeda's Yemen affiliate shows that, despite the damage that years of drone missile strikes has done to the leadership of core al-Qaeda in Pakistan, the movement still can threaten the West. It has been rejuvenated in the past year as al-Qaeda offshoots have grown in strength and numbers, bolstered by a flood of Western extremists to a new terrorist safe haven created by Syria's civil war. That Yemen affiliate, al-Qaeda in the Arabian Peninsula (AQAP), has been able to place three bombs on U.S.-bound airliners, though none has succeeded in downing the aircraft. "The group's repeated efforts to conceal explosive devices to destroy aircraft demonstrate its continued pursuit of high-profile attacks against the West, its increasing awareness of Western security procedures and its efforts to adapt to those procedures that we adopt," Nicholas Rasmussen, deputy director of the National Counterterrorism Center, recently told a Senate panel. James Clapper, the director of national intelligence, first disclosed during a Senate hearing in January that a group of core al-Qaeda militants from Afghanistan and Pakistan was plotting attacks against the West in Syria. But the group's name, Khorasan, or its links to al-Qaeda's Yemen affiliate, which is considered the most dangerous terrorist threat to the U.S., have not previously been disclosed. Khorasan refers to a province under the Islamic caliphate, or religious empire, of old that included parts of Afghanistan. Many U.S. officials interviewed for this story would not be quoted by name talking about what they said was highly classified intelligence. Some congressmen who have been briefed on the Khorasan group threat were willing to discuss it in general terms. One, who declined to be identified in order to discuss intelligence matters, used the group's name in conversations with a reporter. The CIA refused to confirm the group's name or any details in this story. Rep. Adam Schiff, a member of the House Intelligence Committee, declined to name the group. But he described concerns among intelligence officials about "an unholy mix of people in Iraq and Syria right now – some who come from AQAP, some who come from Afghanistan and Pakistan, others from the Maghreb" in North Africa. "They can combine in ways that could pose a greater threat than their individual pieces. And that's something we worry about," said Schiff. U.S. officials have identified some members of the Khorasan group, but would not disclose the individuals' names because of concerns they would hide from intelligence-gathering. Intelligence officials have been deeply concerned about dozens of Americans and hundreds of Europeans who have gone to fight for various jihadist groups in Syria. Some of those Westerners' identities are unknown and therefore they are less likely to draw the attention of intelligence officials when they purchase tickets and board a crowded jetliner heading for European and American cities. AQAP's master bomb-maker, Ibrahim al-Asiri, is believed to have built the underwear bomb that a Nigerian man, Umar Farouk Abdulmutallab, tried to detonate on a passenger jet over Detroit in December 2009. Al-Asiri is also believed to have built two bombs hidden in printer cartridges placed on U.S.-bound cargo jets in 2010, and a body bomb that was acquired in a 2012 operation involving Saudi, British, and U.S. intelligence agencies. U.S. intelligence suggests al-Asiri and his confederates are constantly trying to tweak their bomb designs so that the explosives can get past airport security and also detonate successfully. The TSA ban on uncharged laptops and cellphones stemmed from information that al-Qaeda was working with the Khorasan group to pack those devices with hard-to-detect explosives, a U.S. official said. Last Update: Wednesday, 20 May 2020 KSA 09:44 - GMT 06:44
Mid
[ 0.5792811839323461, 34.25, 24.875 ]
Physical stress testing of bovine jugular veins using magnetic resonance imaging, echocardiography and electrical velocimetry. Bovine jugular veins (BJVs) (Contegra) are valve-bearing pulmonary artery substitutes. Their valves have higher profiles than human pulmonary valves; this might result in less optimal performance. Therefore, we investigated the impact of stress and undersizing on conduit performance with ergometry, echocardiography and magnetic resonance imaging (MRI). Between April 2007 and June 2008, 20 BJV recipients (age 7.9-19.6 years) underwent spiroergometry and subsequent echocardiography; after due rest, ergometry was repeated and followed by MRI during recovery. A year later, exams were repeated. Data was evaluated as follows: comparison of stress related maximal individual valve performance changes (magnetic resonance: exercise induced average stroke volume changes by 61+/-49%; mean insufficiency increased by 2% in patients with <1% rest insufficiency and by 8% after rest insufficiency of >10%; the average rest gradient of 24+/-11 mmHg rose to 40+/-20 mmHg), and stratification of pooled observations by regurgitation fraction, insufficiency grades and z-values (insufficiency rose with increasing heart rate and decreasing stroke volume; undersizing increased gradients during recovery by 7+/-0.7 mmHg/z-value). Contegras high-profile valves tolerate stress without performance drop. Stress induced changes of insufficiency and gradient were clinically not significant, but sufficient to distort examination results; therefore, constant examination conditions are indispensable for a correct follow-up.
Mid
[ 0.641860465116279, 34.5, 19.25 ]
nice project I was looking at this car on kajiji, does it have any black carpets or fender liners youd part with? fender liners seem to be in good shape so those will come off and will post for sale. Floor mats are black in ok condition and the carpets are red in ok condition. Will clean them first before selling. Fenders are also in good condition, will likely trade them.
Low
[ 0.500990099009901, 31.625, 31.5 ]
Before there was Dr. J, Moses Malone, Charles Barkley, Allen Iverson, Joel Embiid and Ben Simmons, there was the Syracuse Nationals. The Philadelphia 76ers organization began in upstate New York as the Nationals in 1946. When the 1954-55 NBA season occurred, the league was struggling financially and down to just eight teams. With low scoring games turning fans off, Nationals owner Danny Biasone came up with the idea of a shot clock. It debuted that season and has been one of the most important rule revisions in the history of the game. The Nationals won an NBA title that season. The Sixers honored the legacy of their original team with this jersey. Iverson has autographed this limited edition (25) Syracuse Nationals Hardwood Classics Swingman jersey in silver paint pen. His signature is deemed authentic by virtue of Upper Deck Authenticated’s Five-Step Process.
High
[ 0.6731234866828081, 34.75, 16.875 ]
Q: почему не срабатывает task stylus при запсуке task watch Всем добра, столкнулся с проблемой, при запсуке таска watch не срабатывает task stylus а browserSync cрабатывает при изменении html. он даже не компилируется не говоря о том чтоб автоматически меняться.Если запускать именно task stylus то он работает а вот совместно нет. я совсем новичек, буду благодарен за терпение и помощь. код var gulp = require('gulp'), stylus = require('gulp-stylus'), browserSync = require('browser-sync'); gulp.task('browser-sync', function(){ var files = [ 'app/**/*.css', 'app/index.html' ]; browserSync.init(files,{ server: { baseDir: './app/' } }); }); gulp.task('stylus', function(){ return gulp.src('app/stylus/**/*.styl') .pipe(stylus()) .pipe(gulp.dest('app/css')) .pipe(browserSync.stream({match: 'app/css/*.css'})) }); gulp.task('watch', gulp.series('browser-sync', 'stylus'), function(){ gulp.watch('app/stylus/**/*.styl', gulp.series('stylus')); gulp.watch('app/*.html', browserSync.reload); gulp.watch('app/js/*.js', browserSync.reload) }); A: Во-первых для чего вы поднимаете сервер на уровень выше самого gulpfile ? Это разумеется ваше дело но почти всегда будет удобнее если gulpfile находиться на самом верхнем уровне рядом с папкой "app". Я не понимаю зачем вы передаете gulp.series('browser-sync', 'stylus') в объявлении таска "watch". Если вы хотите получить последовательное выполнение до "watch" используйте для этого таск "default". Вы не используете "gulp-concat" и "gulp-autoprefixer" ? в этом случае вы не используете все преимущества gulp, советую вам ознакомится и доустановить эти пакеты. Я мог бы сказать почему ваш код не работает но вам лучше будет взглянуть на чуть более продвинутую логику для вашего gulpfile. var gulp = require('gulp'), stylus = require('gulp-stylus'), concat = require('gulp-concat'), cleancss = require('gulp-clean-css'), autoprefixer = require('gulp-autoprefixer'), browserSync = require('browser-sync'); gulp.task('browser-sync', function(){ browserSync({ server: { baseDir: 'app' }, notify: false }) }); function bsReload(done) { browserSync.reload(); done(); }; gulp.task('stylus', function(){ return gulp.src('app/stylus/**/*.styl') .pipe(stylus()) .pipe(concat('styles.min.css')) .pipe(autoprefixer({overrideBrowserslist: ['>= 0.01%']})) .pipe(cleancss({ compatibility: 'ie8', level: { 1: { specialComments: 0 }, 2: { removeDuplicateFontRules: false } } })) .pipe(gulp.dest('app/css')) .pipe(browserSync.stream()) }); gulp.task('watch', function() { gulp.watch('app/stylus/**/*.styl', gulp.parallel('stylus')); gulp.watch('app/*.html', gulp.parallel(bsReload)); gulp.watch('app/js/*.js', gulp.parallel(bsReload)); }); gulp.task('default', gulp.parallel('stylus', 'browser-sync', 'watch')); Также рекомендую посмотреть на полный пример хорошего gulpfile: https://github.com/agragregra/OptimizedHTML-5 Там по ссылке на автора можно найти подробное видео на русском.
Mid
[ 0.6326034063260341, 16.25, 9.4375 ]
Q: coq --- function power definition I am interested in how would one define f to the n in Coq: Basically, as an exercise, I would like to write this definition and then confirm that my algorithm implements this specification. Inductive definition seems appropriate here, but I was not able to make it clean as above. What would be a clean Coq implementation of the above? A: With the pow_func function that gallais defined, you can state your specification as lemmas, such as: Lemma pow_func0: forall (A:Type) (f: A -> A) (x: A), pow_fun f O x = f x. and Lemma pow_funcS: forall (n:nat) (A: Type) (f: A->A) (x:A), pow_fun f (S n) x = f (pow_fun f n x). The proof should be trivial by unfolding the definition
High
[ 0.668500687757909, 30.375, 15.0625 ]
Celiac disease or dermatitis herpetiformis in three patients with porphyria. Celiac disease was diagnosed in one patient with variegate porphyria, and dermatitis herpetiformis in two patients, one with acute intermittent porphyria and the other with erythropoietic protoporphyria. The probability that celiac disease or dermatitis herpetiformis should occur in three patients with porphyria in Finland is less than 0.2%. Neither a consistent HLA pattern nor any other explanation can be offered for the association between these diseases.
Mid
[ 0.5816554809843401, 32.5, 23.375 ]
Police clear central Barcelona on Thursday afternoon. Joan Sánchez The terror organization known as Islamic State (ISIS) on Thursday struck at the heart of the Spanish city of Barcelona killing at least 13 people and injuring more than a 100 in the worst terrorist attack in Spain since the March 2004 Madrid train bombings that killed 193 people and left around 1,700 injured. Thursday’s incident was also the first jihadist attack on Spanish soil since that time. At 4.50pm on Thursday, a white Fiat van travelling rapidly crashed into hundreds of people on La Rambla promenade, a busy downtown street in the capital of the northeastern region of Catalonia popular with tourists. Catalonia’s Mossos d'Esquadra regional police force confirmed that this was deliberate. The driver fled the scene and has yet to be found. Police have detained three people. One of those is Driss Oukabir, who allegedly rented the van used in the attack. The second, whose identity is unknown, was arrested in Alcanar in Catalonia’s Tarragona province where regional police believe the suspect, along with other people, was preparing an explosive device. A third suspect was detained on Friday morning in Ripoll in Catalonia´s Girona province. ISIS claimed responsibility for the attack on La Rambla late on Thursday – an attack which caused panic in the center of the city. The main roads of Barcelona were evacuated while police hunted for those responsible. Hours after the terrorist attack in Barcelona, police killed five terror suspects in the Catalan resort town of Cambrils The van involved traveled some 530 meters in a manner similar to other recent attacks in Germany, Nice and Stockholm. The absence of bollards on La Rambla meant the vehicle could mount the pedestrian area located in the center of the boulevard. “What I saw was a disaster area.” Albert Tort, a 47-year-old nurse who lives on la Rambla said: “The police wouldn’t let me through, but I identified myself as a health worker and went in. What I saw was a disaster area. I counted at least six dead, I tried to revive a young man, but it was impossible.” “We were in the doorway of the Hard Rock Café. We were heading to la Rambla when we heard the crash of the white van as it ran into people. We saw people flying through the air after they were hit. And three cyclists as well,” said Ellen Vercamm, who is on holiday in Barcelona and witnessed the attack. She added: “We missed it by two minutes. It was terrible. We are a big group and we still don’t know if everybody is okay.” When the van stopped, the driver fled. “There is no evidence that this person was armed, according to what witnesses have told us,” said Mossos d'Esquadra head Josep Lluís Trapero after a flood of contradictory news stories circulated during the evening. The casualty toll from the regional government of Catalonia, known as the Generalitat, listed at least 13 deaths as of Friday morning. At least 100 people were injured. Authorities had on Thursday asked people to stay in their homes, but many went outside to try to help those affected or to give blood: hospitals had to issue a statement saying they had sufficient supplies of plasma. Catalan interior minister Joaquim Forn last night refused to rule out the possibility that the number of people injured might increase. Two hours after the incident, the Mossos d’Esquadra confirmed it was a terrorist attack and launched special counter-terrorist operations to find the driver of the vehicle, although these have been unsuccessful as yet. Three arrests Police had arrested three people as of Friday late morning. The first, Driss Oukabir, was arrested in Ripoll (Girona). Oukabir arrived in Barcelona from Morocco on Sunday August 13. He allegedly hired the van used in the attack in Santa Perpètua de Mogoda, near Barcelona. The second person arrested in relation to the attack in La Rambla was detained in Alcanar, in Catalonia’s Tarragona province. The detainee is a man born in the Spanish North African exclave of Melilla. His identity has not been made public. He has been linked to an explosion on Wednesday night in Alcanar. Two people died and seven other were injured after a gas build-up. The building was completely destroyed. Trapero said yesterday there was a “clear link” between the explosion in Alcanar and the attack in Barcelona: Catalan police are working on the hypothesis that the terrorists could have been preparing an explosive device. A total of 20 butane and propane gas canisters were found inside the building. However, Trapero ruled out a link between Thursday’s van attack and an incident which saw a driver ignore a police control on Barcelona’s Diagonal avenue. One officer was driven into and suffered a broken femur. His companion shot at the driver, a Spanish national, who died. Sec. Tillerson: Terrorists around the world should know that the US & our allies are resolved to find you & bring you to justice. #Barcelona pic.twitter.com/Dfmv370SR8 — Department of State (@StateDept) August 17, 2017 In the confusion in the hours following the attack, a rumor spread that a terrorist was holed up in a bar near the site of the attack. This was later ruled out by police. However, some establishments near La Rambla closed their shutters, with people staying inside. A third suspect was detained on Friday morning in Ripoll. Crisis cabinet In the wake of the attack, Spanish Prime Minister Mariano Rajoy spoke with Catalan regional premier Carles Puigdemont, as well as with leaders of the Catalan opposition. A crisis cabinet formed of regional Catalan authorities, the central government’s delegation to Catalonia, the Guardia Civil and the National Police has been formed to assess the situation. Rajoy and Deputy Prime Minister Soraya Sáenz de Santamaría traveled to Barcelona on Thursday night while Catalan politicians issued a message of unity in the face of terrorism. The US State Department issued a tweet telling US citizens in Barcelona to let family and friends know they were safe through social media. Spain’s High Court, the Audiencia Nacional, has launched official investigations. Hours after the terrorist attack in Barcelona, police killed five terror suspects in the Catalan resort town of Cambrils. The Catalan regional police are working on the hypothesis that the suspects killed in Cambrils were planning an attack following up on the events that took place in Barcelona on Thursday afternoon A second suspect vehicle thought to be linked to Thursday’s Barcelona attack was also found in the town of Vic, some 60 kilometers north of the Catalan capital.
Low
[ 0.45979381443298906, 27.875, 32.75 ]
Marc takes his wife Béatrix and their two children to the seaside house of his youth, but before long the summer holiday begins to fall apart. Nineteen-year-old daughter Laura has a rendez-vous with her biker boyfriend and then heads off to Spain, while their son Charly, 17, is getting suspiciously intimate with another boy. When Béatrix's lover Mathieu shows up, and Marc's old flame appears, complications ensue and the holiday descends into chaos. Acclaimed French actors Gilbert Melki and Jean-Marc Barr head up a cast of comic performers who bring a touch of quirkiness to this summery crowd-pleaser.
Low
[ 0.463362068965517, 26.875, 31.125 ]
Image copyright AFP David Cameron regards comments made by US presidential hopeful Donald Trump as "divisive, unhelpful and quite simply wrong", Downing Street has said. Mr Trump called for a ban on Muslims entering the United States following a mass shooting in San Bernadino. A Muslim couple, believed to have been radicalised, killed 14 people at a health centre. The prime minister's official spokeswoman said Mr Cameron "completely disagrees with Donald Trump". British prime ministers normally avoid commenting on contenders in the US presidential race. Meanwhile, Labour leader Jeremy Corbyn said in a tweet that Mr Trump's call was "an attack on democratic values" and an "affront to common humanity". "Let's unite against racism," he added. 'Unacceptable behaviour' Mr Trump issued a campaign statement following the San Bernardino shootings calling for "a total and complete shutdown of Muslims entering the United States until our country's representatives can figure out what is going on". His comments were criticised by other contenders for the Republican nomination, including Jeb Bush, who called the property tycoon "unhinged". Campaigners against Mr Trump's golf course development in Scotland have submitted a petition to Parliament calling for him to be barred from the UK "for his continued, unrepentant hate speech and unacceptable behaviour". Mr Cameron's spokeswoman declined to say whether he would be willing to meet Mr Trump or whether he could be barred from the UK, describing the questions as "hypothetical". She added: "The prime minister has been very clear that, as we look at how we tackle extremism and this poisonous ideology, what politicians need to do is look at ways they can bring communities together and make clear that these terrorists are not representative of Islam and indeed what they are doing is a perversion of Islam." 'Simply ridiculous' Mr Trump caused further controversy on Tuesday when he claimed that parts of London were "so radicalised the police are afraid for their lives". The Mayor of London Boris Johnson responded by saying the "ill-informed comments are complete and utter nonsense". He added: "As a city where more than 300 languages are spoken, London has a proud history of tolerance and diversity and to suggest there are areas where police officers cannot go because of radicalisation is simply ridiculous. "I would welcome the opportunity to show Mr Trump first hand some of the excellent work our police officers do every day in local neighbourhoods throughout our city. Crime has been falling steadily both in London and in New York - the only reason I wouldn't go to some parts of New York is the real risk of meeting Donald Trump." The Conservative Party candidate for London Mayor, Zac Goldsmith, described Mr Trump as "an utterly repellent figure" and "one of the most malignant figures in politics". Sadiq Khan, Labour's candidate for Mayor of London, said: "Donald Trump doesn't have a clue about London. He is clearly ignorant about London's tolerance and diversity and also about how unified we are as a city. "Trump can't just be dismissed as a buffoon - his comments are outrageous, divisive and dangerous - I condemn them utterly them and hope his campaign dies a death." UKIP leader Nigel Farage told BBC News: "Mr Trump's somewhat kneejerk reaction to this, saying that all Muslims should be banned from coming into America, was, perhaps, for him, a political mistake too far."
Mid
[ 0.5701149425287351, 31, 23.375 ]
Florida State Road 732 State Road 732 (SR 732) comprises two segments of a state highway in the Jensen Beach, Florida vicinity. The western segment is a part of Jensen Beach Boulevard between U.S. Route 1 (US 1) and County Road 723 (CR 723) and CR 707A. The eastern segment consists of Causeway Boulevard and the Jensen Beach Causeway over the Indian River Lagoon and runs between CR 707 and SR A1A. Route description The eastern segment of SR 732 begins at the intersection of Federal Highway (US 1 and unsigned SR 5) and Jensen Beach Boulevard in northern unincorporated Martin County. Along US 1, the state road is signed as CR 732. The four-lane divided highway heads east along Jensen Beach Boulevard first in a commercial business area, then passing the entrance to a park and Jensen Beach High School, finally into a less developed area. The road provides the access to some housing developments and Savannas Preserve State Park. Nearly from its start, the divided highway ends but the road remains a four-lane road with a center turn lane provided. More businesses begin to line the road. The state road ends at the signalized intersection of Savannah Road (CR 723) but Jensen Beach Boulevard continues east towards Ocean Breeze as CR 707A. SR 732 resumes north of Ocean Breeze at a roundabout with NE Pineapple Avenue and NE Indian River Drive (CR 707). The road crosses a small inlet on a short bridge before landing on an island featuring the Jensen Beach Causeway Park. After park entrances on both sides of the road, the road crosses the main channel of the Indian River and the Intracoastal Waterway on the Frank A. Wacha Bridge. The east side of this bridge is another small island with parkland. After crossing a final inlet on a small bridge, SR 732 enters Hutchinson Island. Two entrances to housing complexes are provided on the road before the state road ends at a roundabout with Ocean Boulevard (SR A1A) and Jensen Sea Turtle Beach. History In the late 1950s and early 1960s, SR A1A was only partially constructed along the barrier island between Stuart and Fort Pierce. In the interim, the present CR 707 (then part of SR 707) had "Temporary A1A" signs while both the present CR 707 and SR 732 were signed State Road A1A Alternate. When construction was finished in the mid 1960s, the "Temporary A1A" and "Alternate A1A" signs were removed, the Jensen Beach Causeway became SR 732, and the mainland part of Alternate SR A1A was absorbed by SR 707 (at the same time, SR A1A absorbed a 1.5-mile-long SR 705 that extended southward from the eastern end of SR 732 as the famed highway was extended along the shoreline to Stuart). In the late 1990s and early 2000s, some commercially prepared road maps incorrectly showed SR 732 extending westward on the mainland to an intersection with Federal Highway (US 1/SR 5) in West Jensen. The purported "mainland stretch" of SR 732, along Commercial Street (which was later renamed Jensen Beach Boulevard), was formerly SR 707A, which was transitioned from state to county control and maintenance in the mid-to-late 1990s. The confusion arises from the redesignation of the former SR 707A as County Road 732. The original causeway consisted of a wooden bridge with a hand-operated draw span opened in 1924. Between 1955 and 1965, the wooden bridge was replaced gradually with a new concrete, electrically operated drawbridge named for Frank A. Wacha Sr. who helped raise funds for the new bridge. In 2004, the 1960s drawbridge was planned to be replaced with a new high-level fixed crossing. The drawbridge's replacement was intended to save on the high operating costs of the drawbridge, but prior to the new bridge's opening in March 2005, Hurricane Jeanne damaged the span and eroded away a section of the causeway road. Major intersections References External links 732 732
Low
[ 0.45010183299389, 27.625, 33.75 ]
# ##### BEGIN GPL LICENSE BLOCK ##### # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software Foundation, # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # # ##### END GPL LICENSE BLOCK ##### # <pep8 compliant> from bpy.types import Panel class ViewLayerButtonsPanel: bl_space_type = 'PROPERTIES' bl_region_type = 'WINDOW' bl_context = "view_layer" # COMPAT_ENGINES must be defined in each subclass, external engines can add themselves here @classmethod def poll(cls, context): return (context.engine in cls.COMPAT_ENGINES) class VIEWLAYER_PT_layer(ViewLayerButtonsPanel, Panel): bl_label = "View Layer" COMPAT_ENGINES = {'BLENDER_RENDER', 'BLENDER_EEVEE', 'BLENDER_WORKBENCH'} def draw(self, context): layout = self.layout layout.use_property_split = True scene = context.scene rd = scene.render layer = context.view_layer col = layout.column() col.prop(layer, "use", text="Use for Rendering") col.prop(rd, "use_single_layer", text="Render Single Layer") class VIEWLAYER_PT_eevee_layer_passes(ViewLayerButtonsPanel, Panel): bl_label = "Passes" COMPAT_ENGINES = {'BLENDER_EEVEE'} def draw(self, context): pass class VIEWLAYER_PT_eevee_layer_passes_data(ViewLayerButtonsPanel, Panel): bl_label = "Data" bl_parent_id = "VIEWLAYER_PT_eevee_layer_passes" COMPAT_ENGINES = {'BLENDER_EEVEE'} def draw(self, context): layout = self.layout layout.use_property_split = True layout.use_property_decorate = False scene = context.scene rd = scene.render view_layer = context.view_layer col = layout.column() col.prop(view_layer, "use_pass_combined") col.prop(view_layer, "use_pass_z") col.prop(view_layer, "use_pass_mist") col.prop(view_layer, "use_pass_normal") class VIEWLAYER_PT_eevee_layer_passes_light(ViewLayerButtonsPanel, Panel): bl_label = "Light" bl_parent_id = "VIEWLAYER_PT_eevee_layer_passes" COMPAT_ENGINES = {'BLENDER_EEVEE'} def draw(self, context): layout = self.layout layout.use_property_split = True layout.use_property_decorate = False view_layer = context.view_layer view_layer_eevee = view_layer.eevee scene = context.scene scene_eevee = scene.eevee col = layout.column(heading="Diffuse", align=True) col.prop(view_layer, "use_pass_diffuse_direct", text="Light") col.prop(view_layer, "use_pass_diffuse_color", text="Color") col = layout.column(heading="Specular", align=True) col.prop(view_layer, "use_pass_glossy_direct", text="Light") col.prop(view_layer, "use_pass_glossy_color", text="Color") col = layout.column(heading="Volume", align=True) col.prop(view_layer_eevee, "use_pass_volume_transmittance", text="Transmittance") col.prop(view_layer_eevee, "use_pass_volume_scatter", text="Scatter") col = layout.column(heading="Other", align=True) col.prop(view_layer, "use_pass_emit", text="Emission") col.prop(view_layer, "use_pass_environment") col.prop(view_layer, "use_pass_shadow") col.prop(view_layer, "use_pass_ambient_occlusion", text="Ambient Occlusion") class VIEWLAYER_PT_eevee_layer_passes_effects(ViewLayerButtonsPanel, Panel): bl_label = "Effects" bl_parent_id = "VIEWLAYER_PT_eevee_layer_passes" COMPAT_ENGINES = {'BLENDER_EEVEE'} def draw(self, context): layout = self.layout layout.use_property_split = True layout.use_property_decorate = False view_layer = context.view_layer view_layer_eevee = view_layer.eevee scene = context.scene scene_eevee = scene.eevee col = layout.column() col.prop(view_layer_eevee, "use_pass_bloom", text="Bloom") col.active = scene_eevee.use_bloom classes = ( VIEWLAYER_PT_layer, VIEWLAYER_PT_eevee_layer_passes, VIEWLAYER_PT_eevee_layer_passes_data, VIEWLAYER_PT_eevee_layer_passes_light, VIEWLAYER_PT_eevee_layer_passes_effects, ) if __name__ == "__main__": # only for live edit. from bpy.utils import register_class for cls in classes: register_class(cls)
Mid
[ 0.5375939849624061, 35.75, 30.75 ]
// <copyright file="NativeRealTimeRoom.cs" company="Google Inc."> // Copyright (C) 2014 Google Inc. All Rights Reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // </copyright> #if (UNITY_ANDROID || (UNITY_IPHONE && !NO_GPGS)) namespace GooglePlayGames.Native.PInvoke { using System; using System.Runtime.InteropServices; using System.Collections.Generic; using C = GooglePlayGames.Native.Cwrapper.RealTimeRoom; using Types = GooglePlayGames.Native.Cwrapper.Types; using Status = GooglePlayGames.Native.Cwrapper.CommonErrorStatus; internal class NativeRealTimeRoom : BaseReferenceHolder { internal NativeRealTimeRoom(IntPtr selfPointer) : base(selfPointer) { } internal string Id() { return PInvokeUtilities.OutParamsToString( (out_string, size) => C.RealTimeRoom_Id(SelfPtr(), out_string, size)); } internal IEnumerable<MultiplayerParticipant> Participants() { return PInvokeUtilities.ToEnumerable( C.RealTimeRoom_Participants_Length(SelfPtr()), (index) => new MultiplayerParticipant( C.RealTimeRoom_Participants_GetElement(SelfPtr(), index))); } internal uint ParticipantCount() { return C.RealTimeRoom_Participants_Length(SelfPtr()).ToUInt32(); } internal Types.RealTimeRoomStatus Status() { return C.RealTimeRoom_Status(SelfPtr()); } protected override void CallDispose(HandleRef selfPointer) { C.RealTimeRoom_Dispose(selfPointer); } internal static NativeRealTimeRoom FromPointer(IntPtr selfPointer) { if (selfPointer.Equals(IntPtr.Zero)) { return null; } return new NativeRealTimeRoom(selfPointer); } } } #endif
Mid
[ 0.6538461538461531, 34, 18 ]
2009 Roxy Pro Gold Coast: Day 2 Conditions: Small and glassy in the morning, less small and less glassy later onEvents Held: Roxy Pro, Round 2 through the QuarterfinalsNature’s Call: It’s been a hell week, can I make it up to you Saturday?Predictions: If you can’t throw tail, don’t f—kin’ come! Bless the announcers at the Roxy Pro, for really giving their all to the task of surf contest embellishment – On non-competitors surfing too close to the main event: “You in the water, move north! DO NOT GO LEFT…and he went left. [Non-competitor falls] And OOWWW, there’s a workout for the crowd! Guy who can’t surf goes left and really makes a fool of himself in front of the whole beach!” On bodyboarding: “Bodyboarder near the south wall, please return to the beach. We won’t be running all day, so you will get the arvo session, but in the meantime, why don’t you come in and learn to stand up.” On women’s athletics in general: “The girls are pretty open about discussing their equipment with each other up here in the competitors’ area, which is a unique thing about surfing. You wouldn’t expect to see that between Venus Williams and, uh…[………]” And finally: “Don’t be afraid to give a little hoot if you see some surfing you like,” one MC begged to an indifferent morning crowd of Roxy Pro spectators. This year’s ASP tour on the women’s side is like a box of Bertie Bott’s Every Flavor Beans: a random sample might be delicious, or you might get one that tastes mildly like grass. Thus the average surf fan could be forgiven for not screaming about some of the rides out at Duranbah’s middle peak this AM, as a few surfers turned in performances that belonged, frankly, in 2007 – distinctly grass flavored. But turn your back for one second on the girls and you could miss a Campaign-quality clip from any of a number of young ladies (the first Campaign, probably a middle section, but still). The baby faces on tour are particularly a breath of fresh air – or hot fire, if you happen to be surfing against one of them and can’t match the flare. Rookies Sally Fitzgibbons (who chose a pro career over the 2012 Olympiad), Paige Hareb and Coco Ho are sure to keep their more experienced peers honest this year in the field of progressive surfing. Still, today wasn’t all about the first timers. The beach perked up for a quarterfinal clash between unsponsored mom Chelsea Hedges and defending world champ Stephanie Gilmore. Chelsea has a low-down bottom turn and a super-relaxed upper body that’s so trademark Hobbity, she could be a taller third sibling to the twins. Interesting coincidence she shares initials, not just style, with Clifton Hobgood… But, too bad for Chels, Stephanie shares initials (and style, and speed, and sponsors) with Smick Gfanning. She relied on a huge full-face slice, shoulder dropped and hand dragging just like Eugene, and covered the whole length of D-Bah with smoothly linked hucks. Meanwhile, her grass-flavored competitors looked for one or two turns per wave; the line between old guard and new is drawn in bright red lipstick. Safe to say the other heat of the day was Silvana Lima and Coco Ho – a sort of Jordy v. Dane for the women’s side, with aerial queen and holder of the week’s only perfect 10 Silvana going against a white-hot Hawaiian newcomer. A flurry of four rides opened the exchange, and instantly the judging scale had to be reset. So clearly elevated was the level of surfing that the normally quick tower took 6 minutes to deliver its scores. Coco took the win vertically, marking her first major scalp as a qualified WCT surfer. After besting Rebecca Woods in the next round, Coco is through to the semis against fellow islander Mel Bartels. The forecast is good for the weekend, and with only three heats remaining in the Roxy Pro, a 2009 champion isn’t far off. The men have a ways to go in the Quik Pro before a winner is crowned, but with swell on the way and a serious shot at running the event on Snapper’s lengthy walls, the next four days promise to be barn-burners. Coolangatta will be asleep early tonight, ready for a full crack at sudden death action from the men first thing Saturday. Log on as Parko, Bede, Wardo, Dane, Jordy, and a host of others fight to avoid a year-opening 33rd, and as Happy Gilmore looks to start her title defense off with a bang.
Low
[ 0.5295508274231671, 28, 24.875 ]
Image copyright Getty Images People who are devout Christians are seen as "dangerous" and "offensive" in modern Britain, according to the former leader of the Liberal Democrats. Tim Farron said the idea that there was a "unifying set of British values" was a "myth". Mr Farron quit as Lib Dem leader after June's general election, saying that living as a Christian while fulfilling his political role "felt impossible". He had faced repeated questions about his views on gay sex. In a speech to the Theos think tank in London on Tuesday evening, the MP for Westmorland and Lonsdale said: "If you actively hold a faith that is more than an expression of cultural identity… you are deemed to be far worse than eccentric. "You are dangerous. You are offensive." He admitted he had demonstrated a "lack of wisdom" when he was "batting away questions" about his faith during the election campaign. But he said people had been "surprised and confused" that a liberal politician could also be an evangelical Christian, contrasting the reaction to that against that towards another MP, Conservative Jacob Rees-Mogg, who says his opposition to abortion and same-sex marriage is shaped by his Catholic faith. Liberalism "isn't very liberal any more" and "has eaten itself", Mr Farron said, adding that "many who declare themselves to be liberals really aren't". "People talk about shared values today. But when they do, what they mean is 'These are my values - and I am going to act as though they are also yours, and will demonstrate contempt for you if you depart from them.'" Media playback is unsupported on your device Media caption Tim Farron: Living as a Christian and being a political leader 'has felt impossible' Mr Farron criticised social media too, saying it had been "naive" to think a decade ago the medium would lead to a "greater democracy". Instead, he said, it had led to "groupthink, pack mentality and depressing conformity", with society "hooked on self esteem and self worth". "Five minutes on social media will give you a window into a society that condemns and judges, that leaps to take offence and pounces to cause it - liberals condemning those who don't conform as nasty and hateful, the right condemning liberals as fragile snowflakes," he said. "But Christianity rebukes both sides: don't judge, show kindness, show gentleness, show patience - especially to those who don't deserve it."
Mid
[ 0.605664488017429, 34.75, 22.625 ]
IRAN International Public Health Summer School (IPHS) An on-site Educational Game on Global Health for Health Professions Students IRAN International Public Health Summer School (IPHS) An on-site Educational Game on Global Health for Health Professions Students What is IPHS? Games can make considerable changes in the learning environment of the learners and are becoming increasingly popular in health professions education. However, more insight into their design features and effectiveness is needed. This study describes several aspects of organizing of IPHS as an on-site educational game. IPHS is a 7-day long on-site game in which participants in the role of health specialists, try to promote the health status of their own community by doing ten missions. Each mission contains game play(s) that simulate different aspects of public health specialists’ tasks. Some examples of the missions are Advocacy of the authorities to start their activity in the community, investigate and control an outbreak and write a policy brief. Despite the considerable amount of time and energy on designing and holding IPHS, the participants’ satisfaction and attachment to it motivated us to hold IPHS for 5 years. But, the last IPHS held in August 2017. IPHS background The story of IPHS goes back to 2013. At that time we began to wonder why the health professions students don’t have an interest in public health education and don’t enter this field, for either learning or further activities. Actually, we thought that Public Health is a very attractive field, then why there’s no motivation for it? To answer this question, we decided to design and hold an educational course to face and assess the students’ needs directly. And as a result, we got a precious experience! We noticed that students are actually runaways of lectures of theoretical basics and in contrast, eager and ready to participate in practical activities to learn skills. Indeed, THEY WANTED TO PLAY GAMES!
High
[ 0.681404421326397, 32.75, 15.3125 ]
Q: Are there any situations in which you would use NLS_LENGTH_SEMANTICS=BYTE on a Unicode database? Having a Unicode (multi-byte charset) Oracle database with NLS_LENGTH_SEMANTICS=BYTE seems like a disaster waiting to happen. Field validation in most applications only check the number of characters is within bounds, not the byte sequence length in the database’s default character encoding scheme! If you've got a Unicode database, is there ever a good reason to use NLS_LENGTH_SEMANTICS=BYTE rather than CHAR? A: It's just legacy, I think. There are plenty of old applications that have always worked on bytes and may get confused if this changes. Anything where byte strings and indexes go off to an external app/language that works in bytes is going to go wrong in weird and unpredictable ways if the indexes are redefined underneath it. I would not use byte semantics for a new application and I agree that it's not a good default. But then hopefully you're using NVARCHAR, which avoids the issue (since it's always character-based).
Mid
[ 0.6407035175879391, 31.875, 17.875 ]
[Early ultrasonic amniocentesis. 147 cases]. The results of 147 amniocenteses are analysed. The authors found chromosome abnormalities in 1.4% of the cases (two Down's syndromes were diagnosed) and no short and/or long-term materno-foetal complications were encountered.
Mid
[ 0.6187050359712231, 32.25, 19.875 ]
Q: How to rewrite any page to index page with requested URL as $_GET parameter Something similar had been discussed here, but this is slight different. How to tell .htaccess to rewrite any requested page (regardless of it's depth from the site root) with site's index page, but with requested URL as a $_GET parameter, so it can be further handled by php, depending on it's contents, or depending on URL itself. I was trying something like Options +FollowSymlinks RewriteEngine on RewriteRule ^(.*) index.php?page=$1 but obviously I do something wrong. Thanks in advance. A: Try working on your RegEx. Maybe something like this: RewriteRule ^([a-zA-Z0-9\-]+)([\/]*)$ index.php?page=$1 [NC,QSA,L]
Mid
[ 0.6552706552706551, 28.75, 15.125 ]
During interrogation, the two accused confessed to the crime after they were confronted with evidence. A woman and her friend were arrested in East Patel Nagar area for allegedly killing her husband and portraying his death as an accident, the police said. They killed the man as they thought of him as an "obstacle" in their relationship, the police added. Anita, 30, and Arjun Mandal, 38, have been arrested, they said. The body of 42-year-old Dayaram with injuries on his head and other parts was found lying in the shaft of a lift of an under-construction building in central Delhi's East Patel Nagar area on October 17, the police said. According to the police, Arjun Mandal and Mr Dayaram, who were labourers, knew each other and had previously worked together. He started coming to his house and eventually had an extra-marital affair with his wife around three years ago. "The duo considered Dayaram as an obstacle in their relationship and planned his murder to portray it as an accidental death," the police said. A case was registered and a probe initiated, they said. The identity of the body was confirmed by is wife, who works as a domestic help, and other relatives. Investigations arose suspicion on Anita as she attempted to mislead the police. During call detail record analysis of mobile phones of Dayaram and his wife, one number was found to be the common link, said Deputy Commissioner of Police (Central) Mandeep Singh Randhawa. "Dayaram had last called on the same number and even his wife had several calls with the suspected number overnight when the body of the deceased was found at the site. Even the suspected number and the mobile phones of Dayaram and his wife were at the same location between 6.30 pm to 6.40 pm on October 16," the officer said. The user of the number was identified to be Arjun Mandal, he added. During interrogation, Anita and Arjun Mandal confessed to the crime after they were confronted with evidence and call detail records. "It was revealed that Anita had an extra-marital affair with Arjun for the last three years. Both were planning to eliminate Dayaram for the past few months. To execute their plan, Mandal called Dayaram at the Patel Nagar Metro Station at the instance of Anita. He invited him for drinks," the DCP said. Arjun Mandal took him to the terrace of an under construction building in East Patel Nagar at about 7.00 pm, where they drank together. After spending almost an hour on the roof top, he pushed Mr Dayaram from the stairs of the rooftop in the shaft of an open lift hole, following which he died of injuries, he said. To destroy the evidence, Mandal took out Mr Dayaram's mobile phone from his pocket and threw its battery in the shaft. He then went to Farid Puri and handed over the mobile phone to Anita. The accused also discarded his blood-stained slippers and clothes in Karol Bagh, the officer said. Mr Dayaram's mobile phone, blood-stained clothes and slippers of the accused have been recovered, the police said, adding that the mobile phones of both the accused have also been seized.
Mid
[ 0.555339805825242, 35.75, 28.625 ]
Video footage of the brawl was broadcast on 1+1 TV, and has garnered more than 300,000 views on YouTube in three days. Archbishop Mstyslav initially denied being involved, apparently unaware of the CCTV footage, but the church's leader appears to have admitted it on his behalf. "I, as the church head, would like to apologise to the UAOC and all Ukrainian believers for the actions of the clergymen," Metropolitan Makariy said
Mid
[ 0.6508313539192391, 34.25, 18.375 ]
No surgery necessary on Fowler's fractured foot PITTSBURGH -- Outfielder Dexter Fowler will not require surgery on his fractured left foot, but he will spend the next month wearing a boot while the injury heals. Whether that leaves enough time for Fowler to return this season is still an unknown. Fowler fouled a pitch off the top of his foot and then felt a "pop" while running the bases in Friday's 7-6 loss to the Pirates. He had to be helped off the field, and he exited the ballpark on crutches. On Saturday, Fowler returned to St. Louis, where team physician George Paletta confirmed the diagnosis. PITTSBURGH -- Outfielder Dexter Fowler will not require surgery on his fractured left foot, but he will spend the next month wearing a boot while the injury heals. Whether that leaves enough time for Fowler to return this season is still an unknown. Fowler fouled a pitch off the top of his foot and then felt a "pop" while running the bases in Friday's 7-6 loss to the Pirates. He had to be helped off the field, and he exited the ballpark on crutches. On Saturday, Fowler returned to St. Louis, where team physician George Paletta confirmed the diagnosis. "We talked a lot about giving Bader and O'Neill a shot, but I think the original design was for them to split time," president of baseball operations John Mozeliak said. "Now they get everyday at-bats. We'll see what they can do." O'Neill's audition will have to wait, as he was scratched from Saturday's starting lineup due to groin discomfort. It's the latest in a series of ailments that have kept O'Neill from making an impression in front of the big league staff. Injuries to his oblique and hamstring limited O'Neill to 12 at-bats in Spring Training. He went on the DL a month ago with a left hamstring strain.
Mid
[ 0.5786163522012571, 34.5, 25.125 ]
Total Pageviews Thursday, March 21, 2013 Just a piece of Chocolate cake please We were having lunch together at the Boarding House and all I ordered was a bowl of soup and a piece of chocolate cake. I had been looking at the menu for a few minutes waiting for Renae, so by the time I ordered I was very ready. Ready for chocolate cake. "OH, I'm sorry, that was yesterdays special. Today we have carrot cake." NO. I make a great carrot cake, so I never order it at a restaurant, especially so close to Easter when I will be making it for sure. ( this year it just might be a flop ) I wasn't rude, but I think she knew I was disappointed, since I just got soup. That was Wednesday. On Saturday we were dining, and I do mean dining on the 16th floor, at Holt's. Now that is a story for later. But I mentioned my experience at The Boarding House and got some sympathy. The following Wednesday .... .Now that is what I call a Chocolate Cake ( with the letter K ) And it was delicious . And the second piece for breakfast the next morning was also very delish!
Mid
[ 0.557651991614255, 33.25, 26.375 ]
CANADA’S NATIONAL FIREARMS ASSOCIATION MEDIA RELEASE – June 5, 2014 Canada’s National Firearms Association expresses its sincere condolences to the families and friends of those killed, and to those injured in the terrible incident in Moncton, New Brunswick. The NFA deplores the terrible actions by a clearly deranged individual that led to these deaths and injuries. Incidents like these demonstrate the validity of the mounting evidence that none of Canada’s firearms control efforts over the past 50 years have had any effect on preventing violence, or otherwise stopping bad people from carrying out their evil deeds. It is clear that Canada’s excessive firearms control system has failed again. The excessive rules in place do not in any way increase public safety, but merely contribute to an expensive and unnecessary regime which harms only those of lawful intent. Resources wasted on this fundamentally flawed firearms control regime could be better placed to support a health care system which could be better enabled to diagnose and treat conditions that put people’s lives at risk. Canada’s National Firearms Association is this country’s largest and most effective advocacy organization representing the interests of firearms owners and users. -30- For more information contact: Blair Hagen, Executive VP Communications, 604-753-8682 Contact Us Sheldon Clare, President, 250-981-1841 Contact Us Shawn Bevins, Executive VP, 819-313-2887 Contact Us (français) Canada’s NFA toll-free number – 1-877-818-0393 NFA Website: www.nfa.ca
Mid
[ 0.629399585921325, 38, 22.375 ]
/* * Copyright (C) 2018, 2019 Tachibana General Laboratories, LLC * Copyright (C) 2018, 2019 Yaroslav Pronin <[email protected]> * Copyright (C) 2020, 8176135 <[email protected]> * * This file is part of Download Navi. * * Download Navi is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Download Navi is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with Download Navi. If not, see <http://www.gnu.org/licenses/>. */ package com.tachibana.downloader.ui.adddownload; import android.net.Uri; import androidx.databinding.BaseObservable; import androidx.databinding.Bindable; import androidx.databinding.library.baseAdapters.BR; import com.tachibana.downloader.core.model.data.entity.DownloadInfo; public class AddDownloadParams extends BaseObservable { private String url; /* SAF or filesystem storage */ private Uri dirPath; /* Equal with dirPath in case if the path is non-SAF path */ private String dirName; private long storageFreeSpace = -1; private String fileName; private String description; private String mimeType = "application/octet-stream"; private String etag; private String referer; private String userAgent; private int numPieces = DownloadInfo.MIN_PIECES; private long totalBytes = -1; private boolean unmeteredConnectionsOnly; private boolean partialSupport = true; private boolean retry; private boolean replaceFile; private String checksum; @Bindable public String getUrl() { return url; } public void setUrl(String url) { this.url = url; notifyPropertyChanged(BR.url); } @Bindable public Uri getDirPath() { return dirPath; } public void setDirPath(Uri dirPath) { this.dirPath = dirPath; notifyPropertyChanged(BR.dirPath); } @Bindable public String getDirName() { return dirName; } public void setDirName(String dirName) { this.dirName = dirName; notifyPropertyChanged(BR.dirName); } @Bindable public long getStorageFreeSpace() { return storageFreeSpace; } public void setStorageFreeSpace(long storageFreeSpace) { this.storageFreeSpace = storageFreeSpace; notifyPropertyChanged(BR.storageFreeSpace); } @Bindable public String getFileName() { return fileName; } public void setFileName(String fileName) { this.fileName = fileName; notifyPropertyChanged(BR.fileName); } @Bindable public String getDescription() { return description; } public void setDescription(String description) { this.description = description; notifyPropertyChanged(BR.description); } public String getMimeType() { return mimeType; } public void setMimeType(String mimeType) { this.mimeType = mimeType; } public String getEtag() { return etag; } public void setEtag(String etag) { this.etag = etag; } @Bindable public String getReferer() { return referer; } public void setReferer(String referer) { this.referer = referer; notifyPropertyChanged(BR.referer); } public String getUserAgent() { return userAgent; } public void setUserAgent(String userAgent) { this.userAgent = userAgent; } @Bindable public int getNumPieces() { return numPieces; } public void setNumPieces(int numPieces) { this.numPieces = numPieces; notifyPropertyChanged(BR.numPieces); } @Bindable public long getTotalBytes() { return totalBytes; } public void setTotalBytes(long totalBytes) { this.totalBytes = totalBytes; notifyPropertyChanged(BR.totalBytes); } @Bindable public boolean isUnmeteredConnectionsOnly() { return unmeteredConnectionsOnly; } public void setUnmeteredConnectionsOnly(boolean unmeteredConnectionsOnly) { this.unmeteredConnectionsOnly = unmeteredConnectionsOnly; notifyPropertyChanged(BR.unmeteredConnectionsOnly); } public boolean isPartialSupport() { return partialSupport; } public void setPartialSupport(boolean partialSupport) { this.partialSupport = partialSupport; } @Bindable public boolean isRetry() { return retry; } public void setRetry(boolean retry) { this.retry = retry; notifyPropertyChanged(BR.retry); } @Bindable public boolean isReplaceFile() { return replaceFile; } public void setReplaceFile(boolean replaceFile) { this.replaceFile = replaceFile; notifyPropertyChanged(BR.replaceFile); } @Bindable public String getChecksum() { return checksum; } public void setChecksum(String checksum) { this.checksum = checksum; notifyPropertyChanged(BR.checksum); } @Override public String toString() { return "AddDownloadParams{" + "url='" + url + '\'' + ", dirPath=" + dirPath + ", dirName='" + dirName + '\'' + ", storageFreeSpace=" + storageFreeSpace + ", fileName='" + fileName + '\'' + ", description='" + description + '\'' + ", mimeType='" + mimeType + '\'' + ", etag='" + etag + '\'' + ", userAgent='" + userAgent + '\'' + ", numPieces=" + numPieces + ", totalBytes=" + totalBytes + ", unmeteredConnectionsOnly=" + unmeteredConnectionsOnly + ", partialSupport=" + partialSupport + ", retry=" + retry + ", replaceFile=" + replaceFile + ", checksum='" + checksum + '\'' + '}'; } }
Mid
[ 0.620689655172413, 33.75, 20.625 ]
Place of vibration response imaging in preoperative lung cancer patients. In this study, we aimed to investigate the role of the vibration response imaging (VRI) as the second-line test in preoperative evaluation of the patients with non-small cell lung cancer (NSCLC) and in prediction of the predicted postoperative forced expiratory volume in one second (ppo FEV1). A total of 31 patients scheduled for surgery underwent pulmonary function tests (PFTs), VRIxp and quantitative lung perfusion scintigraphy (LPS) in order to predict postoperative lung functions. PFTs and VRI were repeated between 4th and 6th postoperative weeks and FEV1 and FEV1% values were compared with preoperative VRI and ppo-FEV1 calculated with perfusion scintigraphy. Statistical analysis of 31 patients under postoperative follow-up was performed in two parts. In the first part, two preoperative prediction methods (ppo based on perfusion and ppo calculated with VRI), and in the second part, estimated values and postoperative actual values (considering postoperative spirometric values as standard) were compared. An agreement rate of 52% was found between the ppo values calculated with VRI and with perfusion. This rate was low, although respective predictive values for ppo VRI and ppo perfusion were 84% and 47%, suggesting that ppo VRI was more significant than LPS for prediction of the 1st month postoperative value in the patients included in this study. VRIxp has a high-accuracy rate in prediction postoperative FEV1. It is seemed as an alternative to quantitative perfusion scintigraphy for preoperative evaluation, because it can be easily applied at the bedside as a radiation free and non-invasive method.
High
[ 0.662309368191721, 38, 19.375 ]
Q: WebGL: Count the number of rendered vertices Using the WebGL API, is there a way to count the number of vertices rendered within a given canvas? I've seen some tools that attempt to accomplish this task but some are giving strange results (e.g. Three.js' renderer.info.render is reporting my scene has 10,134.3 triangles). Any help with using the raw WebGL API to count the number of rendered vertices (and, ideally, points and lines) would be greatly appreciated. A: WebGL can't do this for you but you could can add your own augmentation. The most obvious way is just to track your own usage. Instead of calling gl.drawXXX call functionThatTracksDrawingCountsXXX and track the values yourself. You can also augment the WebGL context itself. Example // copy this part into a file like `augmented-webgl.js` // and include it in your page (function() { // NOTE: since WebGL constants are um, constant // we could statically init this. let primMap; function addCount(ctx, type, count) { const ctxInfo = ctx.info; const primInfo = primMap[type]; ctxInfo.vertCount += count; ctxInfo.primCount[primInfo.ndx] += primInfo.fn(count); } WebGLRenderingContext.prototype.drawArrays = (function(oldFn) { return function(type, offset, count) { addCount(this, type, count); oldFn.call(this, type, offset, count); }; }(WebGLRenderingContext.prototype.drawArrays)); WebGLRenderingContext.prototype.drawElements = (function(oldFn) { return function(type, count, indexType, offset) { addCount(this, type, count); oldFn.call(this, type, count, indexType, offset); }; }(WebGLRenderingContext.prototype.drawElements)); HTMLCanvasElement.prototype.getContext = (function(oldFn) { return function(type, ...args) { const ctx = oldFn.call(this, type, args); if (ctx && type === "webgl") { if (!primMap) { primMap = {}; primMap[ctx.POINTS] = { ndx: 0, fn: count => count, }; primMap[ctx.LINE_LOOP] = { ndx: 1, fn: count => count, }; primMap[ctx.LINE_STRIP]= { ndx: 1, fn: count => count - 1, }; primMap[ctx.LINES] = { ndx: 1, fn: count => count / 2 | 0, }; primMap[ctx.TRIANGLE_STRIP] = { ndx: 2, fn: count => count - 2, }; primMap[ctx.TRIANGLE_FAN] = { ndx: 2, fn: count => count - 2, }; primMap[ctx.TRIANGLES] = { ndx: 2, fn: count => count / 3 | 0, }; }; ctx.info = { vertCount: 0, primCount: [0, 0, 0], }; } return ctx; } }(HTMLCanvasElement.prototype.getContext)); }()); // ---- cut above ---- const $ = document.querySelector.bind(document); const scene = new THREE.Scene(); const camera = new THREE.PerspectiveCamera(75, 1, 0.1, 1000); const renderer = new THREE.WebGLRenderer({canvas: $('canvas')}); const geometry = new THREE.BoxGeometry(1, 1, 1); const items = []; for (let i = 0; i < 50; ++i) { let item; switch(rand(0, 3) | 0) { case 0: case 1: const material = new THREE.MeshBasicMaterial({ color: rand(0xFFFFFF) | 0, wireframe: rand(0, 3) > 2, }); item = new THREE.Mesh(geometry, material); break; case 2: const pmat = new THREE.PointsMaterial({ color: rand(0xFFFFFF) | 0, }); item = new THREE.Points(geometry, pmat); break; default: throw "oops"; } item.position.x = rand(-10, 10); item.position.y = rand(-10, 10); item.position.z = rand( 0, -50); scene.add(item); items.push(item); } camera.position.z = 5; const countElem = $('#count'); function render(time) { time *= 0.001; resize(); // animate the items items.forEach((items, ndx) => { items.rotation.x = time * 1.2 + ndx * 0.01; items.rotation.y = time * 1.1; }); // turn on/off a random items items[rand(items.length) | 0].visible = Math.random() > .5; renderer.render(scene, camera); // get the current counts const info = renderer.context.info; countElem.textContent = ` VERTS: ${info.vertCount} POINTS: ${info.primCount[0]} LINES: ${info.primCount[1]} TRIANGLES: ${info.primCount[2]}`; // zero out the count renderer.context.info.vertCount = 0; renderer.context.info.primCount = [0, 0, 0]; requestAnimationFrame(render); } requestAnimationFrame(render); function rand(min, max) { if (max === undefined) { max = min; min = 0; } return Math.random() * (max - min) + min; } function resize() { const canvas = renderer.domElement; const width = canvas.clientWidth; const height = canvas.clientHeight; if (canvas.width !== width || canvas.height !== height) { renderer.setSize(width, height, false); camera.aspectRatio = width / height; camera.updateProjectionMatrix(); } } body { border: 0; } canvas { width: 100vw; height: 100vh; display: block; } #ui { position: absolute; left: 1em; top: 1em; background: rgba(0,0,0,.5); color: white; padding: .5em; width: 10em; } <canvas></canvas> <div id="ui"> <pre id="count"></pre> </div> <script src="https://cdnjs.cloudflare.com/ajax/libs/three.js/92/three.min.js"></script> Of course you might want to add support for drawArraysInstanced etc... and support for WebGL2.
Mid
[ 0.61072261072261, 32.75, 20.875 ]
Living organisms have developed tightly regulated processes that specifically imports metals, transport them to intracellular storage sites and ultimately transport them to sites of use. One of the most important functions of metals such as zinc and iron in biological systems is to enable the activity of metalloenzymes. Metalloenzymes are enzymes that incorporate metal ions into the enzyme active site and utilize the metal as a part of the catalytic process. More than one-third of all characterized enzymes are metalloenzymes. The function of metalloenzymes is highly dependent on the presence of the metal ion in the active site of the enzyme. It is well recognized that agents which bind to and inactivate the active site metal ion dramatically decrease the activity of the enzyme. Nature employs this same strategy to decrease the activity of certain metalloenzymes during periods in which the enzymatic activity is undesirable. For example, the protein TIMP (tissue inhibitor of metalloproteases) binds to the zinc ion in the active site of various matrix metalloprotease enzymes and thereby arrests the enzymatic activity. The pharmaceutical industry has used the same strategy in the design of therapeutic agents. For example, the azole antifungal agents fluconazole and voriconazole contain a 1-(1,2,4-triazole) group that binds to the heme iron present in the active site of the target enzyme lanosterol demethylase and thereby inactivates the enzyme. Another example includes the zinc-binding hydroxamic acid group that has been incorporated into most published inhibitors of matrix metalloproteinases and histone deacetylases. Another example is the zinc-binding carboxylic acid group that has been incorporated into most published angiotensin-converting enzyme inhibitors. In the design of clinically safe and effective metalloenzyme inhibitors, use of the most appropriate metal-binding group for the particular target and clinical indication is critical. If a weakly binding metal-binding group is utilized, potency may be suboptimal. On the other hand, if a very tightly binding metal-binding group is utilized, selectivity for the target enzyme versus related metalloenzymes may be suboptimal. The lack of optimal selectivity can be a cause for clinical toxicity due to unintended inhibition of these off-target metalloenzymes. One example of such clinical toxicity is the unintended inhibition of human drug metabolizing enzymes such as CYP2C9, CYP2C19 and CYP3A4 by the currently-available azole antifungal agents such as fluconazole and voriconazole. It is believed that this off-target inhibition is caused primarily by the indiscriminate binding of the currently utilized 1-(1,2,4-triazole) to iron in the active site of CYP2C9, CYP2C19 and CYP3A4. Another example of this is the joint pain that has been observed in many clinical trials of matrix metalloproteinase inhibitors. This toxicity is considered to be related to inhibition of off-target metalloenzymes due to indiscriminate binding of the hydroxamic acid group to zinc in the off-target active sites. Therefore, the search for metal-binding groups that can achieve a better balance of potency and selectivity remains an important goal and would be significant in the realization of therapeutic agents and methods to address currently unmet needs in treating and preventing diseases, disorders and symptoms thereof.
High
[ 0.676470588235294, 34.5, 16.5 ]
1973 European Athletics Indoor Championships – Men's 4 × 680 metres relay The men's 4 × 680 metres relay event at the 1973 European Athletics Indoor Championships was held on 11 March in Rotterdam. Each athlete ran four laps of the 170 metres track. Results References Category:4 × 400 metres relay at the European Athletics Indoor Championships Relay
Mid
[ 0.574514038876889, 33.25, 24.625 ]
/* * Copyright (c) 2011 The WebRTC project authors. All Rights Reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ /* * This file contains the Q14 radix-8 tables used in ARM9e optimizations. * */ extern const int s_Q14S_8; const int s_Q14S_8 = 1024; extern const unsigned short t_Q14S_8[2032]; const unsigned short t_Q14S_8[2032] = { 0x4000,0x0000 ,0x4000,0x0000 ,0x4000,0x0000 , 0x22a3,0x187e ,0x3249,0x0c7c ,0x11a8,0x238e , 0x0000,0x2d41 ,0x22a3,0x187e ,0xdd5d,0x3b21 , 0xdd5d,0x3b21 ,0x11a8,0x238e ,0xb4be,0x3ec5 , 0xc000,0x4000 ,0x0000,0x2d41 ,0xa57e,0x2d41 , 0xac61,0x3b21 ,0xee58,0x3537 ,0xb4be,0x0c7c , 0xa57e,0x2d41 ,0xdd5d,0x3b21 ,0xdd5d,0xe782 , 0xac61,0x187e ,0xcdb7,0x3ec5 ,0x11a8,0xcac9 , 0x4000,0x0000 ,0x4000,0x0000 ,0x4000,0x0000 , 0x396b,0x0646 ,0x3cc8,0x0324 ,0x35eb,0x0964 , 0x3249,0x0c7c ,0x396b,0x0646 ,0x2aaa,0x1294 , 0x2aaa,0x1294 ,0x35eb,0x0964 ,0x1e7e,0x1b5d , 0x22a3,0x187e ,0x3249,0x0c7c ,0x11a8,0x238e , 0x1a46,0x1e2b ,0x2e88,0x0f8d ,0x0471,0x2afb , 0x11a8,0x238e ,0x2aaa,0x1294 ,0xf721,0x3179 , 0x08df,0x289a ,0x26b3,0x1590 ,0xea02,0x36e5 , 0x0000,0x2d41 ,0x22a3,0x187e ,0xdd5d,0x3b21 , 0xf721,0x3179 ,0x1e7e,0x1b5d ,0xd178,0x3e15 , 0xee58,0x3537 ,0x1a46,0x1e2b ,0xc695,0x3fb1 , 0xe5ba,0x3871 ,0x15fe,0x20e7 ,0xbcf0,0x3fec , 0xdd5d,0x3b21 ,0x11a8,0x238e ,0xb4be,0x3ec5 , 0xd556,0x3d3f ,0x0d48,0x2620 ,0xae2e,0x3c42 , 0xcdb7,0x3ec5 ,0x08df,0x289a ,0xa963,0x3871 , 0xc695,0x3fb1 ,0x0471,0x2afb ,0xa678,0x3368 , 0xc000,0x4000 ,0x0000,0x2d41 ,0xa57e,0x2d41 , 0xba09,0x3fb1 ,0xfb8f,0x2f6c ,0xa678,0x2620 , 0xb4be,0x3ec5 ,0xf721,0x3179 ,0xa963,0x1e2b , 0xb02d,0x3d3f ,0xf2b8,0x3368 ,0xae2e,0x1590 , 0xac61,0x3b21 ,0xee58,0x3537 ,0xb4be,0x0c7c , 0xa963,0x3871 ,0xea02,0x36e5 ,0xbcf0,0x0324 , 0xa73b,0x3537 ,0xe5ba,0x3871 ,0xc695,0xf9ba , 0xa5ed,0x3179 ,0xe182,0x39db ,0xd178,0xf073 , 0xa57e,0x2d41 ,0xdd5d,0x3b21 ,0xdd5d,0xe782 , 0xa5ed,0x289a ,0xd94d,0x3c42 ,0xea02,0xdf19 , 0xa73b,0x238e ,0xd556,0x3d3f ,0xf721,0xd766 , 0xa963,0x1e2b ,0xd178,0x3e15 ,0x0471,0xd094 , 0xac61,0x187e ,0xcdb7,0x3ec5 ,0x11a8,0xcac9 , 0xb02d,0x1294 ,0xca15,0x3f4f ,0x1e7e,0xc625 , 0xb4be,0x0c7c ,0xc695,0x3fb1 ,0x2aaa,0xc2c1 , 0xba09,0x0646 ,0xc338,0x3fec ,0x35eb,0xc0b1 , 0x4000,0x0000 ,0x4000,0x0000 ,0x4000,0x0000 , 0x3e69,0x0192 ,0x3f36,0x00c9 ,0x3d9a,0x025b , 0x3cc8,0x0324 ,0x3e69,0x0192 ,0x3b1e,0x04b5 , 0x3b1e,0x04b5 ,0x3d9a,0x025b ,0x388e,0x070e , 0x396b,0x0646 ,0x3cc8,0x0324 ,0x35eb,0x0964 , 0x37af,0x07d6 ,0x3bf4,0x03ed ,0x3334,0x0bb7 , 0x35eb,0x0964 ,0x3b1e,0x04b5 ,0x306c,0x0e06 , 0x341e,0x0af1 ,0x3a46,0x057e ,0x2d93,0x1050 , 0x3249,0x0c7c ,0x396b,0x0646 ,0x2aaa,0x1294 , 0x306c,0x0e06 ,0x388e,0x070e ,0x27b3,0x14d2 , 0x2e88,0x0f8d ,0x37af,0x07d6 ,0x24ae,0x1709 , 0x2c9d,0x1112 ,0x36ce,0x089d ,0x219c,0x1937 , 0x2aaa,0x1294 ,0x35eb,0x0964 ,0x1e7e,0x1b5d , 0x28b2,0x1413 ,0x3505,0x0a2b ,0x1b56,0x1d79 , 0x26b3,0x1590 ,0x341e,0x0af1 ,0x1824,0x1f8c , 0x24ae,0x1709 ,0x3334,0x0bb7 ,0x14ea,0x2193 , 0x22a3,0x187e ,0x3249,0x0c7c ,0x11a8,0x238e , 0x2093,0x19ef ,0x315b,0x0d41 ,0x0e61,0x257e , 0x1e7e,0x1b5d ,0x306c,0x0e06 ,0x0b14,0x2760 , 0x1c64,0x1cc6 ,0x2f7b,0x0eca ,0x07c4,0x2935 , 0x1a46,0x1e2b ,0x2e88,0x0f8d ,0x0471,0x2afb , 0x1824,0x1f8c ,0x2d93,0x1050 ,0x011c,0x2cb2 , 0x15fe,0x20e7 ,0x2c9d,0x1112 ,0xfdc7,0x2e5a , 0x13d5,0x223d ,0x2ba4,0x11d3 ,0xfa73,0x2ff2 , 0x11a8,0x238e ,0x2aaa,0x1294 ,0xf721,0x3179 , 0x0f79,0x24da ,0x29af,0x1354 ,0xf3d2,0x32ef , 0x0d48,0x2620 ,0x28b2,0x1413 ,0xf087,0x3453 , 0x0b14,0x2760 ,0x27b3,0x14d2 ,0xed41,0x35a5 , 0x08df,0x289a ,0x26b3,0x1590 ,0xea02,0x36e5 , 0x06a9,0x29ce ,0x25b1,0x164c ,0xe6cb,0x3812 , 0x0471,0x2afb ,0x24ae,0x1709 ,0xe39c,0x392b , 0x0239,0x2c21 ,0x23a9,0x17c4 ,0xe077,0x3a30 , 0x0000,0x2d41 ,0x22a3,0x187e ,0xdd5d,0x3b21 , 0xfdc7,0x2e5a ,0x219c,0x1937 ,0xda4f,0x3bfd , 0xfb8f,0x2f6c ,0x2093,0x19ef ,0xd74e,0x3cc5 , 0xf957,0x3076 ,0x1f89,0x1aa7 ,0xd45c,0x3d78 , 0xf721,0x3179 ,0x1e7e,0x1b5d ,0xd178,0x3e15 , 0xf4ec,0x3274 ,0x1d72,0x1c12 ,0xcea5,0x3e9d , 0xf2b8,0x3368 ,0x1c64,0x1cc6 ,0xcbe2,0x3f0f , 0xf087,0x3453 ,0x1b56,0x1d79 ,0xc932,0x3f6b , 0xee58,0x3537 ,0x1a46,0x1e2b ,0xc695,0x3fb1 , 0xec2b,0x3612 ,0x1935,0x1edc ,0xc40c,0x3fe1 , 0xea02,0x36e5 ,0x1824,0x1f8c ,0xc197,0x3ffb , 0xe7dc,0x37b0 ,0x1711,0x203a ,0xbf38,0x3fff , 0xe5ba,0x3871 ,0x15fe,0x20e7 ,0xbcf0,0x3fec , 0xe39c,0x392b ,0x14ea,0x2193 ,0xbabf,0x3fc4 , 0xe182,0x39db ,0x13d5,0x223d ,0xb8a6,0x3f85 , 0xdf6d,0x3a82 ,0x12bf,0x22e7 ,0xb6a5,0x3f30 , 0xdd5d,0x3b21 ,0x11a8,0x238e ,0xb4be,0x3ec5 , 0xdb52,0x3bb6 ,0x1091,0x2435 ,0xb2f2,0x3e45 , 0xd94d,0x3c42 ,0x0f79,0x24da ,0xb140,0x3daf , 0xd74e,0x3cc5 ,0x0e61,0x257e ,0xafa9,0x3d03 , 0xd556,0x3d3f ,0x0d48,0x2620 ,0xae2e,0x3c42 , 0xd363,0x3daf ,0x0c2e,0x26c1 ,0xacd0,0x3b6d , 0xd178,0x3e15 ,0x0b14,0x2760 ,0xab8e,0x3a82 , 0xcf94,0x3e72 ,0x09fa,0x27fe ,0xaa6a,0x3984 , 0xcdb7,0x3ec5 ,0x08df,0x289a ,0xa963,0x3871 , 0xcbe2,0x3f0f ,0x07c4,0x2935 ,0xa87b,0x374b , 0xca15,0x3f4f ,0x06a9,0x29ce ,0xa7b1,0x3612 , 0xc851,0x3f85 ,0x058d,0x2a65 ,0xa705,0x34c6 , 0xc695,0x3fb1 ,0x0471,0x2afb ,0xa678,0x3368 , 0xc4e2,0x3fd4 ,0x0355,0x2b8f ,0xa60b,0x31f8 , 0xc338,0x3fec ,0x0239,0x2c21 ,0xa5bc,0x3076 , 0xc197,0x3ffb ,0x011c,0x2cb2 ,0xa58d,0x2ee4 , 0xc000,0x4000 ,0x0000,0x2d41 ,0xa57e,0x2d41 , 0xbe73,0x3ffb ,0xfee4,0x2dcf ,0xa58d,0x2b8f , 0xbcf0,0x3fec ,0xfdc7,0x2e5a ,0xa5bc,0x29ce , 0xbb77,0x3fd4 ,0xfcab,0x2ee4 ,0xa60b,0x27fe , 0xba09,0x3fb1 ,0xfb8f,0x2f6c ,0xa678,0x2620 , 0xb8a6,0x3f85 ,0xfa73,0x2ff2 ,0xa705,0x2435 , 0xb74d,0x3f4f ,0xf957,0x3076 ,0xa7b1,0x223d , 0xb600,0x3f0f ,0xf83c,0x30f9 ,0xa87b,0x203a , 0xb4be,0x3ec5 ,0xf721,0x3179 ,0xa963,0x1e2b , 0xb388,0x3e72 ,0xf606,0x31f8 ,0xaa6a,0x1c12 , 0xb25e,0x3e15 ,0xf4ec,0x3274 ,0xab8e,0x19ef , 0xb140,0x3daf ,0xf3d2,0x32ef ,0xacd0,0x17c4 , 0xb02d,0x3d3f ,0xf2b8,0x3368 ,0xae2e,0x1590 , 0xaf28,0x3cc5 ,0xf19f,0x33df ,0xafa9,0x1354 , 0xae2e,0x3c42 ,0xf087,0x3453 ,0xb140,0x1112 , 0xad41,0x3bb6 ,0xef6f,0x34c6 ,0xb2f2,0x0eca , 0xac61,0x3b21 ,0xee58,0x3537 ,0xb4be,0x0c7c , 0xab8e,0x3a82 ,0xed41,0x35a5 ,0xb6a5,0x0a2b , 0xaac8,0x39db ,0xec2b,0x3612 ,0xb8a6,0x07d6 , 0xaa0f,0x392b ,0xeb16,0x367d ,0xbabf,0x057e , 0xa963,0x3871 ,0xea02,0x36e5 ,0xbcf0,0x0324 , 0xa8c5,0x37b0 ,0xe8ef,0x374b ,0xbf38,0x00c9 , 0xa834,0x36e5 ,0xe7dc,0x37b0 ,0xc197,0xfe6e , 0xa7b1,0x3612 ,0xe6cb,0x3812 ,0xc40c,0xfc13 , 0xa73b,0x3537 ,0xe5ba,0x3871 ,0xc695,0xf9ba , 0xa6d3,0x3453 ,0xe4aa,0x38cf ,0xc932,0xf763 , 0xa678,0x3368 ,0xe39c,0x392b ,0xcbe2,0xf50f , 0xa62c,0x3274 ,0xe28e,0x3984 ,0xcea5,0xf2bf , 0xa5ed,0x3179 ,0xe182,0x39db ,0xd178,0xf073 , 0xa5bc,0x3076 ,0xe077,0x3a30 ,0xd45c,0xee2d , 0xa599,0x2f6c ,0xdf6d,0x3a82 ,0xd74e,0xebed , 0xa585,0x2e5a ,0xde64,0x3ad3 ,0xda4f,0xe9b4 , 0xa57e,0x2d41 ,0xdd5d,0x3b21 ,0xdd5d,0xe782 , 0xa585,0x2c21 ,0xdc57,0x3b6d ,0xe077,0xe559 , 0xa599,0x2afb ,0xdb52,0x3bb6 ,0xe39c,0xe33a , 0xa5bc,0x29ce ,0xda4f,0x3bfd ,0xe6cb,0xe124 , 0xa5ed,0x289a ,0xd94d,0x3c42 ,0xea02,0xdf19 , 0xa62c,0x2760 ,0xd84d,0x3c85 ,0xed41,0xdd19 , 0xa678,0x2620 ,0xd74e,0x3cc5 ,0xf087,0xdb26 , 0xa6d3,0x24da ,0xd651,0x3d03 ,0xf3d2,0xd93f , 0xa73b,0x238e ,0xd556,0x3d3f ,0xf721,0xd766 , 0xa7b1,0x223d ,0xd45c,0x3d78 ,0xfa73,0xd59b , 0xa834,0x20e7 ,0xd363,0x3daf ,0xfdc7,0xd3df , 0xa8c5,0x1f8c ,0xd26d,0x3de3 ,0x011c,0xd231 , 0xa963,0x1e2b ,0xd178,0x3e15 ,0x0471,0xd094 , 0xaa0f,0x1cc6 ,0xd085,0x3e45 ,0x07c4,0xcf07 , 0xaac8,0x1b5d ,0xcf94,0x3e72 ,0x0b14,0xcd8c , 0xab8e,0x19ef ,0xcea5,0x3e9d ,0x0e61,0xcc21 , 0xac61,0x187e ,0xcdb7,0x3ec5 ,0x11a8,0xcac9 , 0xad41,0x1709 ,0xcccc,0x3eeb ,0x14ea,0xc983 , 0xae2e,0x1590 ,0xcbe2,0x3f0f ,0x1824,0xc850 , 0xaf28,0x1413 ,0xcafb,0x3f30 ,0x1b56,0xc731 , 0xb02d,0x1294 ,0xca15,0x3f4f ,0x1e7e,0xc625 , 0xb140,0x1112 ,0xc932,0x3f6b ,0x219c,0xc52d , 0xb25e,0x0f8d ,0xc851,0x3f85 ,0x24ae,0xc44a , 0xb388,0x0e06 ,0xc772,0x3f9c ,0x27b3,0xc37b , 0xb4be,0x0c7c ,0xc695,0x3fb1 ,0x2aaa,0xc2c1 , 0xb600,0x0af1 ,0xc5ba,0x3fc4 ,0x2d93,0xc21d , 0xb74d,0x0964 ,0xc4e2,0x3fd4 ,0x306c,0xc18e , 0xb8a6,0x07d6 ,0xc40c,0x3fe1 ,0x3334,0xc115 , 0xba09,0x0646 ,0xc338,0x3fec ,0x35eb,0xc0b1 , 0xbb77,0x04b5 ,0xc266,0x3ff5 ,0x388e,0xc064 , 0xbcf0,0x0324 ,0xc197,0x3ffb ,0x3b1e,0xc02c , 0xbe73,0x0192 ,0xc0ca,0x3fff ,0x3d9a,0xc00b , 0x4000,0x0000 ,0x3f9b,0x0065 ,0x3f36,0x00c9 , 0x3ed0,0x012e ,0x3e69,0x0192 ,0x3e02,0x01f7 , 0x3d9a,0x025b ,0x3d31,0x02c0 ,0x3cc8,0x0324 , 0x3c5f,0x0388 ,0x3bf4,0x03ed ,0x3b8a,0x0451 , 0x3b1e,0x04b5 ,0x3ab2,0x051a ,0x3a46,0x057e , 0x39d9,0x05e2 ,0x396b,0x0646 ,0x38fd,0x06aa , 0x388e,0x070e ,0x381f,0x0772 ,0x37af,0x07d6 , 0x373f,0x0839 ,0x36ce,0x089d ,0x365d,0x0901 , 0x35eb,0x0964 ,0x3578,0x09c7 ,0x3505,0x0a2b , 0x3492,0x0a8e ,0x341e,0x0af1 ,0x33a9,0x0b54 , 0x3334,0x0bb7 ,0x32bf,0x0c1a ,0x3249,0x0c7c , 0x31d2,0x0cdf ,0x315b,0x0d41 ,0x30e4,0x0da4 , 0x306c,0x0e06 ,0x2ff4,0x0e68 ,0x2f7b,0x0eca , 0x2f02,0x0f2b ,0x2e88,0x0f8d ,0x2e0e,0x0fee , 0x2d93,0x1050 ,0x2d18,0x10b1 ,0x2c9d,0x1112 , 0x2c21,0x1173 ,0x2ba4,0x11d3 ,0x2b28,0x1234 , 0x2aaa,0x1294 ,0x2a2d,0x12f4 ,0x29af,0x1354 , 0x2931,0x13b4 ,0x28b2,0x1413 ,0x2833,0x1473 , 0x27b3,0x14d2 ,0x2733,0x1531 ,0x26b3,0x1590 , 0x2632,0x15ee ,0x25b1,0x164c ,0x252f,0x16ab , 0x24ae,0x1709 ,0x242b,0x1766 ,0x23a9,0x17c4 , 0x2326,0x1821 ,0x22a3,0x187e ,0x221f,0x18db , 0x219c,0x1937 ,0x2117,0x1993 ,0x2093,0x19ef , 0x200e,0x1a4b ,0x1f89,0x1aa7 ,0x1f04,0x1b02 , 0x1e7e,0x1b5d ,0x1df8,0x1bb8 ,0x1d72,0x1c12 , 0x1ceb,0x1c6c ,0x1c64,0x1cc6 ,0x1bdd,0x1d20 , 0x1b56,0x1d79 ,0x1ace,0x1dd3 ,0x1a46,0x1e2b , 0x19be,0x1e84 ,0x1935,0x1edc ,0x18ad,0x1f34 , 0x1824,0x1f8c ,0x179b,0x1fe3 ,0x1711,0x203a , 0x1688,0x2091 ,0x15fe,0x20e7 ,0x1574,0x213d , 0x14ea,0x2193 ,0x145f,0x21e8 ,0x13d5,0x223d , 0x134a,0x2292 ,0x12bf,0x22e7 ,0x1234,0x233b , 0x11a8,0x238e ,0x111d,0x23e2 ,0x1091,0x2435 , 0x1005,0x2488 ,0x0f79,0x24da ,0x0eed,0x252c , 0x0e61,0x257e ,0x0dd4,0x25cf ,0x0d48,0x2620 , 0x0cbb,0x2671 ,0x0c2e,0x26c1 ,0x0ba1,0x2711 , 0x0b14,0x2760 ,0x0a87,0x27af ,0x09fa,0x27fe , 0x096d,0x284c ,0x08df,0x289a ,0x0852,0x28e7 , 0x07c4,0x2935 ,0x0736,0x2981 ,0x06a9,0x29ce , 0x061b,0x2a1a ,0x058d,0x2a65 ,0x04ff,0x2ab0 , 0x0471,0x2afb ,0x03e3,0x2b45 ,0x0355,0x2b8f , 0x02c7,0x2bd8 ,0x0239,0x2c21 ,0x01aa,0x2c6a , 0x011c,0x2cb2 ,0x008e,0x2cfa ,0x0000,0x2d41 , 0xff72,0x2d88 ,0xfee4,0x2dcf ,0xfe56,0x2e15 , 0xfdc7,0x2e5a ,0xfd39,0x2e9f ,0xfcab,0x2ee4 , 0xfc1d,0x2f28 ,0xfb8f,0x2f6c ,0xfb01,0x2faf , 0xfa73,0x2ff2 ,0xf9e5,0x3034 ,0xf957,0x3076 , 0xf8ca,0x30b8 ,0xf83c,0x30f9 ,0xf7ae,0x3139 , 0xf721,0x3179 ,0xf693,0x31b9 ,0xf606,0x31f8 , 0xf579,0x3236 ,0xf4ec,0x3274 ,0xf45f,0x32b2 , 0xf3d2,0x32ef ,0xf345,0x332c ,0xf2b8,0x3368 , 0xf22c,0x33a3 ,0xf19f,0x33df ,0xf113,0x3419 , 0xf087,0x3453 ,0xeffb,0x348d ,0xef6f,0x34c6 , 0xeee3,0x34ff ,0xee58,0x3537 ,0xedcc,0x356e , 0xed41,0x35a5 ,0xecb6,0x35dc ,0xec2b,0x3612 , 0xeba1,0x3648 ,0xeb16,0x367d ,0xea8c,0x36b1 , 0xea02,0x36e5 ,0xe978,0x3718 ,0xe8ef,0x374b , 0xe865,0x377e ,0xe7dc,0x37b0 ,0xe753,0x37e1 , 0xe6cb,0x3812 ,0xe642,0x3842 ,0xe5ba,0x3871 , 0xe532,0x38a1 ,0xe4aa,0x38cf ,0xe423,0x38fd , 0xe39c,0x392b ,0xe315,0x3958 ,0xe28e,0x3984 , 0xe208,0x39b0 ,0xe182,0x39db ,0xe0fc,0x3a06 , 0xe077,0x3a30 ,0xdff2,0x3a59 ,0xdf6d,0x3a82 , 0xdee9,0x3aab ,0xde64,0x3ad3 ,0xdde1,0x3afa , 0xdd5d,0x3b21 ,0xdcda,0x3b47 ,0xdc57,0x3b6d , 0xdbd5,0x3b92 ,0xdb52,0x3bb6 ,0xdad1,0x3bda , 0xda4f,0x3bfd ,0xd9ce,0x3c20 ,0xd94d,0x3c42 , 0xd8cd,0x3c64 ,0xd84d,0x3c85 ,0xd7cd,0x3ca5 , 0xd74e,0x3cc5 ,0xd6cf,0x3ce4 ,0xd651,0x3d03 , 0xd5d3,0x3d21 ,0xd556,0x3d3f ,0xd4d8,0x3d5b , 0xd45c,0x3d78 ,0xd3df,0x3d93 ,0xd363,0x3daf , 0xd2e8,0x3dc9 ,0xd26d,0x3de3 ,0xd1f2,0x3dfc , 0xd178,0x3e15 ,0xd0fe,0x3e2d ,0xd085,0x3e45 , 0xd00c,0x3e5c ,0xcf94,0x3e72 ,0xcf1c,0x3e88 , 0xcea5,0x3e9d ,0xce2e,0x3eb1 ,0xcdb7,0x3ec5 , 0xcd41,0x3ed8 ,0xcccc,0x3eeb ,0xcc57,0x3efd , 0xcbe2,0x3f0f ,0xcb6e,0x3f20 ,0xcafb,0x3f30 , 0xca88,0x3f40 ,0xca15,0x3f4f ,0xc9a3,0x3f5d , 0xc932,0x3f6b ,0xc8c1,0x3f78 ,0xc851,0x3f85 , 0xc7e1,0x3f91 ,0xc772,0x3f9c ,0xc703,0x3fa7 , 0xc695,0x3fb1 ,0xc627,0x3fbb ,0xc5ba,0x3fc4 , 0xc54e,0x3fcc ,0xc4e2,0x3fd4 ,0xc476,0x3fdb , 0xc40c,0x3fe1 ,0xc3a1,0x3fe7 ,0xc338,0x3fec , 0xc2cf,0x3ff1 ,0xc266,0x3ff5 ,0xc1fe,0x3ff8 , 0xc197,0x3ffb ,0xc130,0x3ffd ,0xc0ca,0x3fff , 0xc065,0x4000 ,0xc000,0x4000 ,0xbf9c,0x4000 , 0xbf38,0x3fff ,0xbed5,0x3ffd ,0xbe73,0x3ffb , 0xbe11,0x3ff8 ,0xbdb0,0x3ff5 ,0xbd50,0x3ff1 , 0xbcf0,0x3fec ,0xbc91,0x3fe7 ,0xbc32,0x3fe1 , 0xbbd4,0x3fdb ,0xbb77,0x3fd4 ,0xbb1b,0x3fcc , 0xbabf,0x3fc4 ,0xba64,0x3fbb ,0xba09,0x3fb1 , 0xb9af,0x3fa7 ,0xb956,0x3f9c ,0xb8fd,0x3f91 , 0xb8a6,0x3f85 ,0xb84f,0x3f78 ,0xb7f8,0x3f6b , 0xb7a2,0x3f5d ,0xb74d,0x3f4f ,0xb6f9,0x3f40 , 0xb6a5,0x3f30 ,0xb652,0x3f20 ,0xb600,0x3f0f , 0xb5af,0x3efd ,0xb55e,0x3eeb ,0xb50e,0x3ed8 , 0xb4be,0x3ec5 ,0xb470,0x3eb1 ,0xb422,0x3e9d , 0xb3d5,0x3e88 ,0xb388,0x3e72 ,0xb33d,0x3e5c , 0xb2f2,0x3e45 ,0xb2a7,0x3e2d ,0xb25e,0x3e15 , 0xb215,0x3dfc ,0xb1cd,0x3de3 ,0xb186,0x3dc9 , 0xb140,0x3daf ,0xb0fa,0x3d93 ,0xb0b5,0x3d78 , 0xb071,0x3d5b ,0xb02d,0x3d3f ,0xafeb,0x3d21 , 0xafa9,0x3d03 ,0xaf68,0x3ce4 ,0xaf28,0x3cc5 , 0xaee8,0x3ca5 ,0xaea9,0x3c85 ,0xae6b,0x3c64 , 0xae2e,0x3c42 ,0xadf2,0x3c20 ,0xadb6,0x3bfd , 0xad7b,0x3bda ,0xad41,0x3bb6 ,0xad08,0x3b92 , 0xacd0,0x3b6d ,0xac98,0x3b47 ,0xac61,0x3b21 , 0xac2b,0x3afa ,0xabf6,0x3ad3 ,0xabc2,0x3aab , 0xab8e,0x3a82 ,0xab5b,0x3a59 ,0xab29,0x3a30 , 0xaaf8,0x3a06 ,0xaac8,0x39db ,0xaa98,0x39b0 , 0xaa6a,0x3984 ,0xaa3c,0x3958 ,0xaa0f,0x392b , 0xa9e3,0x38fd ,0xa9b7,0x38cf ,0xa98d,0x38a1 , 0xa963,0x3871 ,0xa93a,0x3842 ,0xa912,0x3812 , 0xa8eb,0x37e1 ,0xa8c5,0x37b0 ,0xa89f,0x377e , 0xa87b,0x374b ,0xa857,0x3718 ,0xa834,0x36e5 , 0xa812,0x36b1 ,0xa7f1,0x367d ,0xa7d0,0x3648 , 0xa7b1,0x3612 ,0xa792,0x35dc ,0xa774,0x35a5 , 0xa757,0x356e ,0xa73b,0x3537 ,0xa71f,0x34ff , 0xa705,0x34c6 ,0xa6eb,0x348d ,0xa6d3,0x3453 , 0xa6bb,0x3419 ,0xa6a4,0x33df ,0xa68e,0x33a3 , 0xa678,0x3368 ,0xa664,0x332c ,0xa650,0x32ef , 0xa63e,0x32b2 ,0xa62c,0x3274 ,0xa61b,0x3236 , 0xa60b,0x31f8 ,0xa5fb,0x31b9 ,0xa5ed,0x3179 , 0xa5e0,0x3139 ,0xa5d3,0x30f9 ,0xa5c7,0x30b8 , 0xa5bc,0x3076 ,0xa5b2,0x3034 ,0xa5a9,0x2ff2 , 0xa5a1,0x2faf ,0xa599,0x2f6c ,0xa593,0x2f28 , 0xa58d,0x2ee4 ,0xa588,0x2e9f ,0xa585,0x2e5a , 0xa581,0x2e15 ,0xa57f,0x2dcf ,0xa57e,0x2d88 , 0xa57e,0x2d41 ,0xa57e,0x2cfa ,0xa57f,0x2cb2 , 0xa581,0x2c6a ,0xa585,0x2c21 ,0xa588,0x2bd8 , 0xa58d,0x2b8f ,0xa593,0x2b45 ,0xa599,0x2afb , 0xa5a1,0x2ab0 ,0xa5a9,0x2a65 ,0xa5b2,0x2a1a , 0xa5bc,0x29ce ,0xa5c7,0x2981 ,0xa5d3,0x2935 , 0xa5e0,0x28e7 ,0xa5ed,0x289a ,0xa5fb,0x284c , 0xa60b,0x27fe ,0xa61b,0x27af ,0xa62c,0x2760 , 0xa63e,0x2711 ,0xa650,0x26c1 ,0xa664,0x2671 , 0xa678,0x2620 ,0xa68e,0x25cf ,0xa6a4,0x257e , 0xa6bb,0x252c ,0xa6d3,0x24da ,0xa6eb,0x2488 , 0xa705,0x2435 ,0xa71f,0x23e2 ,0xa73b,0x238e , 0xa757,0x233b ,0xa774,0x22e7 ,0xa792,0x2292 , 0xa7b1,0x223d ,0xa7d0,0x21e8 ,0xa7f1,0x2193 , 0xa812,0x213d ,0xa834,0x20e7 ,0xa857,0x2091 , 0xa87b,0x203a ,0xa89f,0x1fe3 ,0xa8c5,0x1f8c , 0xa8eb,0x1f34 ,0xa912,0x1edc ,0xa93a,0x1e84 , 0xa963,0x1e2b ,0xa98d,0x1dd3 ,0xa9b7,0x1d79 , 0xa9e3,0x1d20 ,0xaa0f,0x1cc6 ,0xaa3c,0x1c6c , 0xaa6a,0x1c12 ,0xaa98,0x1bb8 ,0xaac8,0x1b5d , 0xaaf8,0x1b02 ,0xab29,0x1aa7 ,0xab5b,0x1a4b , 0xab8e,0x19ef ,0xabc2,0x1993 ,0xabf6,0x1937 , 0xac2b,0x18db ,0xac61,0x187e ,0xac98,0x1821 , 0xacd0,0x17c4 ,0xad08,0x1766 ,0xad41,0x1709 , 0xad7b,0x16ab ,0xadb6,0x164c ,0xadf2,0x15ee , 0xae2e,0x1590 ,0xae6b,0x1531 ,0xaea9,0x14d2 , 0xaee8,0x1473 ,0xaf28,0x1413 ,0xaf68,0x13b4 , 0xafa9,0x1354 ,0xafeb,0x12f4 ,0xb02d,0x1294 , 0xb071,0x1234 ,0xb0b5,0x11d3 ,0xb0fa,0x1173 , 0xb140,0x1112 ,0xb186,0x10b1 ,0xb1cd,0x1050 , 0xb215,0x0fee ,0xb25e,0x0f8d ,0xb2a7,0x0f2b , 0xb2f2,0x0eca ,0xb33d,0x0e68 ,0xb388,0x0e06 , 0xb3d5,0x0da4 ,0xb422,0x0d41 ,0xb470,0x0cdf , 0xb4be,0x0c7c ,0xb50e,0x0c1a ,0xb55e,0x0bb7 , 0xb5af,0x0b54 ,0xb600,0x0af1 ,0xb652,0x0a8e , 0xb6a5,0x0a2b ,0xb6f9,0x09c7 ,0xb74d,0x0964 , 0xb7a2,0x0901 ,0xb7f8,0x089d ,0xb84f,0x0839 , 0xb8a6,0x07d6 ,0xb8fd,0x0772 ,0xb956,0x070e , 0xb9af,0x06aa ,0xba09,0x0646 ,0xba64,0x05e2 , 0xbabf,0x057e ,0xbb1b,0x051a ,0xbb77,0x04b5 , 0xbbd4,0x0451 ,0xbc32,0x03ed ,0xbc91,0x0388 , 0xbcf0,0x0324 ,0xbd50,0x02c0 ,0xbdb0,0x025b , 0xbe11,0x01f7 ,0xbe73,0x0192 ,0xbed5,0x012e , 0xbf38,0x00c9 ,0xbf9c,0x0065 }; extern const int s_Q14R_8; const int s_Q14R_8 = 1024; extern const unsigned short t_Q14R_8[2032]; const unsigned short t_Q14R_8[2032] = { 0x4000,0x0000 ,0x4000,0x0000 ,0x4000,0x0000 , 0x3b21,0x187e ,0x3ec5,0x0c7c ,0x3537,0x238e , 0x2d41,0x2d41 ,0x3b21,0x187e ,0x187e,0x3b21 , 0x187e,0x3b21 ,0x3537,0x238e ,0xf384,0x3ec5 , 0x0000,0x4000 ,0x2d41,0x2d41 ,0xd2bf,0x2d41 , 0xe782,0x3b21 ,0x238e,0x3537 ,0xc13b,0x0c7c , 0xd2bf,0x2d41 ,0x187e,0x3b21 ,0xc4df,0xe782 , 0xc4df,0x187e ,0x0c7c,0x3ec5 ,0xdc72,0xcac9 , 0x4000,0x0000 ,0x4000,0x0000 ,0x4000,0x0000 , 0x3fb1,0x0646 ,0x3fec,0x0324 ,0x3f4f,0x0964 , 0x3ec5,0x0c7c ,0x3fb1,0x0646 ,0x3d3f,0x1294 , 0x3d3f,0x1294 ,0x3f4f,0x0964 ,0x39db,0x1b5d , 0x3b21,0x187e ,0x3ec5,0x0c7c ,0x3537,0x238e , 0x3871,0x1e2b ,0x3e15,0x0f8d ,0x2f6c,0x2afb , 0x3537,0x238e ,0x3d3f,0x1294 ,0x289a,0x3179 , 0x3179,0x289a ,0x3c42,0x1590 ,0x20e7,0x36e5 , 0x2d41,0x2d41 ,0x3b21,0x187e ,0x187e,0x3b21 , 0x289a,0x3179 ,0x39db,0x1b5d ,0x0f8d,0x3e15 , 0x238e,0x3537 ,0x3871,0x1e2b ,0x0646,0x3fb1 , 0x1e2b,0x3871 ,0x36e5,0x20e7 ,0xfcdc,0x3fec , 0x187e,0x3b21 ,0x3537,0x238e ,0xf384,0x3ec5 , 0x1294,0x3d3f ,0x3368,0x2620 ,0xea70,0x3c42 , 0x0c7c,0x3ec5 ,0x3179,0x289a ,0xe1d5,0x3871 , 0x0646,0x3fb1 ,0x2f6c,0x2afb ,0xd9e0,0x3368 , 0x0000,0x4000 ,0x2d41,0x2d41 ,0xd2bf,0x2d41 , 0xf9ba,0x3fb1 ,0x2afb,0x2f6c ,0xcc98,0x2620 , 0xf384,0x3ec5 ,0x289a,0x3179 ,0xc78f,0x1e2b , 0xed6c,0x3d3f ,0x2620,0x3368 ,0xc3be,0x1590 , 0xe782,0x3b21 ,0x238e,0x3537 ,0xc13b,0x0c7c , 0xe1d5,0x3871 ,0x20e7,0x36e5 ,0xc014,0x0324 , 0xdc72,0x3537 ,0x1e2b,0x3871 ,0xc04f,0xf9ba , 0xd766,0x3179 ,0x1b5d,0x39db ,0xc1eb,0xf073 , 0xd2bf,0x2d41 ,0x187e,0x3b21 ,0xc4df,0xe782 , 0xce87,0x289a ,0x1590,0x3c42 ,0xc91b,0xdf19 , 0xcac9,0x238e ,0x1294,0x3d3f ,0xce87,0xd766 , 0xc78f,0x1e2b ,0x0f8d,0x3e15 ,0xd505,0xd094 , 0xc4df,0x187e ,0x0c7c,0x3ec5 ,0xdc72,0xcac9 , 0xc2c1,0x1294 ,0x0964,0x3f4f ,0xe4a3,0xc625 , 0xc13b,0x0c7c ,0x0646,0x3fb1 ,0xed6c,0xc2c1 , 0xc04f,0x0646 ,0x0324,0x3fec ,0xf69c,0xc0b1 , 0x4000,0x0000 ,0x4000,0x0000 ,0x4000,0x0000 , 0x3ffb,0x0192 ,0x3fff,0x00c9 ,0x3ff5,0x025b , 0x3fec,0x0324 ,0x3ffb,0x0192 ,0x3fd4,0x04b5 , 0x3fd4,0x04b5 ,0x3ff5,0x025b ,0x3f9c,0x070e , 0x3fb1,0x0646 ,0x3fec,0x0324 ,0x3f4f,0x0964 , 0x3f85,0x07d6 ,0x3fe1,0x03ed ,0x3eeb,0x0bb7 , 0x3f4f,0x0964 ,0x3fd4,0x04b5 ,0x3e72,0x0e06 , 0x3f0f,0x0af1 ,0x3fc4,0x057e ,0x3de3,0x1050 , 0x3ec5,0x0c7c ,0x3fb1,0x0646 ,0x3d3f,0x1294 , 0x3e72,0x0e06 ,0x3f9c,0x070e ,0x3c85,0x14d2 , 0x3e15,0x0f8d ,0x3f85,0x07d6 ,0x3bb6,0x1709 , 0x3daf,0x1112 ,0x3f6b,0x089d ,0x3ad3,0x1937 , 0x3d3f,0x1294 ,0x3f4f,0x0964 ,0x39db,0x1b5d , 0x3cc5,0x1413 ,0x3f30,0x0a2b ,0x38cf,0x1d79 , 0x3c42,0x1590 ,0x3f0f,0x0af1 ,0x37b0,0x1f8c , 0x3bb6,0x1709 ,0x3eeb,0x0bb7 ,0x367d,0x2193 , 0x3b21,0x187e ,0x3ec5,0x0c7c ,0x3537,0x238e , 0x3a82,0x19ef ,0x3e9d,0x0d41 ,0x33df,0x257e , 0x39db,0x1b5d ,0x3e72,0x0e06 ,0x3274,0x2760 , 0x392b,0x1cc6 ,0x3e45,0x0eca ,0x30f9,0x2935 , 0x3871,0x1e2b ,0x3e15,0x0f8d ,0x2f6c,0x2afb , 0x37b0,0x1f8c ,0x3de3,0x1050 ,0x2dcf,0x2cb2 , 0x36e5,0x20e7 ,0x3daf,0x1112 ,0x2c21,0x2e5a , 0x3612,0x223d ,0x3d78,0x11d3 ,0x2a65,0x2ff2 , 0x3537,0x238e ,0x3d3f,0x1294 ,0x289a,0x3179 , 0x3453,0x24da ,0x3d03,0x1354 ,0x26c1,0x32ef , 0x3368,0x2620 ,0x3cc5,0x1413 ,0x24da,0x3453 , 0x3274,0x2760 ,0x3c85,0x14d2 ,0x22e7,0x35a5 , 0x3179,0x289a ,0x3c42,0x1590 ,0x20e7,0x36e5 , 0x3076,0x29ce ,0x3bfd,0x164c ,0x1edc,0x3812 , 0x2f6c,0x2afb ,0x3bb6,0x1709 ,0x1cc6,0x392b , 0x2e5a,0x2c21 ,0x3b6d,0x17c4 ,0x1aa7,0x3a30 , 0x2d41,0x2d41 ,0x3b21,0x187e ,0x187e,0x3b21 , 0x2c21,0x2e5a ,0x3ad3,0x1937 ,0x164c,0x3bfd , 0x2afb,0x2f6c ,0x3a82,0x19ef ,0x1413,0x3cc5 , 0x29ce,0x3076 ,0x3a30,0x1aa7 ,0x11d3,0x3d78 , 0x289a,0x3179 ,0x39db,0x1b5d ,0x0f8d,0x3e15 , 0x2760,0x3274 ,0x3984,0x1c12 ,0x0d41,0x3e9d , 0x2620,0x3368 ,0x392b,0x1cc6 ,0x0af1,0x3f0f , 0x24da,0x3453 ,0x38cf,0x1d79 ,0x089d,0x3f6b , 0x238e,0x3537 ,0x3871,0x1e2b ,0x0646,0x3fb1 , 0x223d,0x3612 ,0x3812,0x1edc ,0x03ed,0x3fe1 , 0x20e7,0x36e5 ,0x37b0,0x1f8c ,0x0192,0x3ffb , 0x1f8c,0x37b0 ,0x374b,0x203a ,0xff37,0x3fff , 0x1e2b,0x3871 ,0x36e5,0x20e7 ,0xfcdc,0x3fec , 0x1cc6,0x392b ,0x367d,0x2193 ,0xfa82,0x3fc4 , 0x1b5d,0x39db ,0x3612,0x223d ,0xf82a,0x3f85 , 0x19ef,0x3a82 ,0x35a5,0x22e7 ,0xf5d5,0x3f30 , 0x187e,0x3b21 ,0x3537,0x238e ,0xf384,0x3ec5 , 0x1709,0x3bb6 ,0x34c6,0x2435 ,0xf136,0x3e45 , 0x1590,0x3c42 ,0x3453,0x24da ,0xeeee,0x3daf , 0x1413,0x3cc5 ,0x33df,0x257e ,0xecac,0x3d03 , 0x1294,0x3d3f ,0x3368,0x2620 ,0xea70,0x3c42 , 0x1112,0x3daf ,0x32ef,0x26c1 ,0xe83c,0x3b6d , 0x0f8d,0x3e15 ,0x3274,0x2760 ,0xe611,0x3a82 , 0x0e06,0x3e72 ,0x31f8,0x27fe ,0xe3ee,0x3984 , 0x0c7c,0x3ec5 ,0x3179,0x289a ,0xe1d5,0x3871 , 0x0af1,0x3f0f ,0x30f9,0x2935 ,0xdfc6,0x374b , 0x0964,0x3f4f ,0x3076,0x29ce ,0xddc3,0x3612 , 0x07d6,0x3f85 ,0x2ff2,0x2a65 ,0xdbcb,0x34c6 , 0x0646,0x3fb1 ,0x2f6c,0x2afb ,0xd9e0,0x3368 , 0x04b5,0x3fd4 ,0x2ee4,0x2b8f ,0xd802,0x31f8 , 0x0324,0x3fec ,0x2e5a,0x2c21 ,0xd632,0x3076 , 0x0192,0x3ffb ,0x2dcf,0x2cb2 ,0xd471,0x2ee4 , 0x0000,0x4000 ,0x2d41,0x2d41 ,0xd2bf,0x2d41 , 0xfe6e,0x3ffb ,0x2cb2,0x2dcf ,0xd11c,0x2b8f , 0xfcdc,0x3fec ,0x2c21,0x2e5a ,0xcf8a,0x29ce , 0xfb4b,0x3fd4 ,0x2b8f,0x2ee4 ,0xce08,0x27fe , 0xf9ba,0x3fb1 ,0x2afb,0x2f6c ,0xcc98,0x2620 , 0xf82a,0x3f85 ,0x2a65,0x2ff2 ,0xcb3a,0x2435 , 0xf69c,0x3f4f ,0x29ce,0x3076 ,0xc9ee,0x223d , 0xf50f,0x3f0f ,0x2935,0x30f9 ,0xc8b5,0x203a , 0xf384,0x3ec5 ,0x289a,0x3179 ,0xc78f,0x1e2b , 0xf1fa,0x3e72 ,0x27fe,0x31f8 ,0xc67c,0x1c12 , 0xf073,0x3e15 ,0x2760,0x3274 ,0xc57e,0x19ef , 0xeeee,0x3daf ,0x26c1,0x32ef ,0xc493,0x17c4 , 0xed6c,0x3d3f ,0x2620,0x3368 ,0xc3be,0x1590 , 0xebed,0x3cc5 ,0x257e,0x33df ,0xc2fd,0x1354 , 0xea70,0x3c42 ,0x24da,0x3453 ,0xc251,0x1112 , 0xe8f7,0x3bb6 ,0x2435,0x34c6 ,0xc1bb,0x0eca , 0xe782,0x3b21 ,0x238e,0x3537 ,0xc13b,0x0c7c , 0xe611,0x3a82 ,0x22e7,0x35a5 ,0xc0d0,0x0a2b , 0xe4a3,0x39db ,0x223d,0x3612 ,0xc07b,0x07d6 , 0xe33a,0x392b ,0x2193,0x367d ,0xc03c,0x057e , 0xe1d5,0x3871 ,0x20e7,0x36e5 ,0xc014,0x0324 , 0xe074,0x37b0 ,0x203a,0x374b ,0xc001,0x00c9 , 0xdf19,0x36e5 ,0x1f8c,0x37b0 ,0xc005,0xfe6e , 0xddc3,0x3612 ,0x1edc,0x3812 ,0xc01f,0xfc13 , 0xdc72,0x3537 ,0x1e2b,0x3871 ,0xc04f,0xf9ba , 0xdb26,0x3453 ,0x1d79,0x38cf ,0xc095,0xf763 , 0xd9e0,0x3368 ,0x1cc6,0x392b ,0xc0f1,0xf50f , 0xd8a0,0x3274 ,0x1c12,0x3984 ,0xc163,0xf2bf , 0xd766,0x3179 ,0x1b5d,0x39db ,0xc1eb,0xf073 , 0xd632,0x3076 ,0x1aa7,0x3a30 ,0xc288,0xee2d , 0xd505,0x2f6c ,0x19ef,0x3a82 ,0xc33b,0xebed , 0xd3df,0x2e5a ,0x1937,0x3ad3 ,0xc403,0xe9b4 , 0xd2bf,0x2d41 ,0x187e,0x3b21 ,0xc4df,0xe782 , 0xd1a6,0x2c21 ,0x17c4,0x3b6d ,0xc5d0,0xe559 , 0xd094,0x2afb ,0x1709,0x3bb6 ,0xc6d5,0xe33a , 0xcf8a,0x29ce ,0x164c,0x3bfd ,0xc7ee,0xe124 , 0xce87,0x289a ,0x1590,0x3c42 ,0xc91b,0xdf19 , 0xcd8c,0x2760 ,0x14d2,0x3c85 ,0xca5b,0xdd19 , 0xcc98,0x2620 ,0x1413,0x3cc5 ,0xcbad,0xdb26 , 0xcbad,0x24da ,0x1354,0x3d03 ,0xcd11,0xd93f , 0xcac9,0x238e ,0x1294,0x3d3f ,0xce87,0xd766 , 0xc9ee,0x223d ,0x11d3,0x3d78 ,0xd00e,0xd59b , 0xc91b,0x20e7 ,0x1112,0x3daf ,0xd1a6,0xd3df , 0xc850,0x1f8c ,0x1050,0x3de3 ,0xd34e,0xd231 , 0xc78f,0x1e2b ,0x0f8d,0x3e15 ,0xd505,0xd094 , 0xc6d5,0x1cc6 ,0x0eca,0x3e45 ,0xd6cb,0xcf07 , 0xc625,0x1b5d ,0x0e06,0x3e72 ,0xd8a0,0xcd8c , 0xc57e,0x19ef ,0x0d41,0x3e9d ,0xda82,0xcc21 , 0xc4df,0x187e ,0x0c7c,0x3ec5 ,0xdc72,0xcac9 , 0xc44a,0x1709 ,0x0bb7,0x3eeb ,0xde6d,0xc983 , 0xc3be,0x1590 ,0x0af1,0x3f0f ,0xe074,0xc850 , 0xc33b,0x1413 ,0x0a2b,0x3f30 ,0xe287,0xc731 , 0xc2c1,0x1294 ,0x0964,0x3f4f ,0xe4a3,0xc625 , 0xc251,0x1112 ,0x089d,0x3f6b ,0xe6c9,0xc52d , 0xc1eb,0x0f8d ,0x07d6,0x3f85 ,0xe8f7,0xc44a , 0xc18e,0x0e06 ,0x070e,0x3f9c ,0xeb2e,0xc37b , 0xc13b,0x0c7c ,0x0646,0x3fb1 ,0xed6c,0xc2c1 , 0xc0f1,0x0af1 ,0x057e,0x3fc4 ,0xefb0,0xc21d , 0xc0b1,0x0964 ,0x04b5,0x3fd4 ,0xf1fa,0xc18e , 0xc07b,0x07d6 ,0x03ed,0x3fe1 ,0xf449,0xc115 , 0xc04f,0x0646 ,0x0324,0x3fec ,0xf69c,0xc0b1 , 0xc02c,0x04b5 ,0x025b,0x3ff5 ,0xf8f2,0xc064 , 0xc014,0x0324 ,0x0192,0x3ffb ,0xfb4b,0xc02c , 0xc005,0x0192 ,0x00c9,0x3fff ,0xfda5,0xc00b , 0x4000,0x0000 ,0x4000,0x0065 ,0x3fff,0x00c9 , 0x3ffd,0x012e ,0x3ffb,0x0192 ,0x3ff8,0x01f7 , 0x3ff5,0x025b ,0x3ff1,0x02c0 ,0x3fec,0x0324 , 0x3fe7,0x0388 ,0x3fe1,0x03ed ,0x3fdb,0x0451 , 0x3fd4,0x04b5 ,0x3fcc,0x051a ,0x3fc4,0x057e , 0x3fbb,0x05e2 ,0x3fb1,0x0646 ,0x3fa7,0x06aa , 0x3f9c,0x070e ,0x3f91,0x0772 ,0x3f85,0x07d6 , 0x3f78,0x0839 ,0x3f6b,0x089d ,0x3f5d,0x0901 , 0x3f4f,0x0964 ,0x3f40,0x09c7 ,0x3f30,0x0a2b , 0x3f20,0x0a8e ,0x3f0f,0x0af1 ,0x3efd,0x0b54 , 0x3eeb,0x0bb7 ,0x3ed8,0x0c1a ,0x3ec5,0x0c7c , 0x3eb1,0x0cdf ,0x3e9d,0x0d41 ,0x3e88,0x0da4 , 0x3e72,0x0e06 ,0x3e5c,0x0e68 ,0x3e45,0x0eca , 0x3e2d,0x0f2b ,0x3e15,0x0f8d ,0x3dfc,0x0fee , 0x3de3,0x1050 ,0x3dc9,0x10b1 ,0x3daf,0x1112 , 0x3d93,0x1173 ,0x3d78,0x11d3 ,0x3d5b,0x1234 , 0x3d3f,0x1294 ,0x3d21,0x12f4 ,0x3d03,0x1354 , 0x3ce4,0x13b4 ,0x3cc5,0x1413 ,0x3ca5,0x1473 , 0x3c85,0x14d2 ,0x3c64,0x1531 ,0x3c42,0x1590 , 0x3c20,0x15ee ,0x3bfd,0x164c ,0x3bda,0x16ab , 0x3bb6,0x1709 ,0x3b92,0x1766 ,0x3b6d,0x17c4 , 0x3b47,0x1821 ,0x3b21,0x187e ,0x3afa,0x18db , 0x3ad3,0x1937 ,0x3aab,0x1993 ,0x3a82,0x19ef , 0x3a59,0x1a4b ,0x3a30,0x1aa7 ,0x3a06,0x1b02 , 0x39db,0x1b5d ,0x39b0,0x1bb8 ,0x3984,0x1c12 , 0x3958,0x1c6c ,0x392b,0x1cc6 ,0x38fd,0x1d20 , 0x38cf,0x1d79 ,0x38a1,0x1dd3 ,0x3871,0x1e2b , 0x3842,0x1e84 ,0x3812,0x1edc ,0x37e1,0x1f34 , 0x37b0,0x1f8c ,0x377e,0x1fe3 ,0x374b,0x203a , 0x3718,0x2091 ,0x36e5,0x20e7 ,0x36b1,0x213d , 0x367d,0x2193 ,0x3648,0x21e8 ,0x3612,0x223d , 0x35dc,0x2292 ,0x35a5,0x22e7 ,0x356e,0x233b , 0x3537,0x238e ,0x34ff,0x23e2 ,0x34c6,0x2435 , 0x348d,0x2488 ,0x3453,0x24da ,0x3419,0x252c , 0x33df,0x257e ,0x33a3,0x25cf ,0x3368,0x2620 , 0x332c,0x2671 ,0x32ef,0x26c1 ,0x32b2,0x2711 , 0x3274,0x2760 ,0x3236,0x27af ,0x31f8,0x27fe , 0x31b9,0x284c ,0x3179,0x289a ,0x3139,0x28e7 , 0x30f9,0x2935 ,0x30b8,0x2981 ,0x3076,0x29ce , 0x3034,0x2a1a ,0x2ff2,0x2a65 ,0x2faf,0x2ab0 , 0x2f6c,0x2afb ,0x2f28,0x2b45 ,0x2ee4,0x2b8f , 0x2e9f,0x2bd8 ,0x2e5a,0x2c21 ,0x2e15,0x2c6a , 0x2dcf,0x2cb2 ,0x2d88,0x2cfa ,0x2d41,0x2d41 , 0x2cfa,0x2d88 ,0x2cb2,0x2dcf ,0x2c6a,0x2e15 , 0x2c21,0x2e5a ,0x2bd8,0x2e9f ,0x2b8f,0x2ee4 , 0x2b45,0x2f28 ,0x2afb,0x2f6c ,0x2ab0,0x2faf , 0x2a65,0x2ff2 ,0x2a1a,0x3034 ,0x29ce,0x3076 , 0x2981,0x30b8 ,0x2935,0x30f9 ,0x28e7,0x3139 , 0x289a,0x3179 ,0x284c,0x31b9 ,0x27fe,0x31f8 , 0x27af,0x3236 ,0x2760,0x3274 ,0x2711,0x32b2 , 0x26c1,0x32ef ,0x2671,0x332c ,0x2620,0x3368 , 0x25cf,0x33a3 ,0x257e,0x33df ,0x252c,0x3419 , 0x24da,0x3453 ,0x2488,0x348d ,0x2435,0x34c6 , 0x23e2,0x34ff ,0x238e,0x3537 ,0x233b,0x356e , 0x22e7,0x35a5 ,0x2292,0x35dc ,0x223d,0x3612 , 0x21e8,0x3648 ,0x2193,0x367d ,0x213d,0x36b1 , 0x20e7,0x36e5 ,0x2091,0x3718 ,0x203a,0x374b , 0x1fe3,0x377e ,0x1f8c,0x37b0 ,0x1f34,0x37e1 , 0x1edc,0x3812 ,0x1e84,0x3842 ,0x1e2b,0x3871 , 0x1dd3,0x38a1 ,0x1d79,0x38cf ,0x1d20,0x38fd , 0x1cc6,0x392b ,0x1c6c,0x3958 ,0x1c12,0x3984 , 0x1bb8,0x39b0 ,0x1b5d,0x39db ,0x1b02,0x3a06 , 0x1aa7,0x3a30 ,0x1a4b,0x3a59 ,0x19ef,0x3a82 , 0x1993,0x3aab ,0x1937,0x3ad3 ,0x18db,0x3afa , 0x187e,0x3b21 ,0x1821,0x3b47 ,0x17c4,0x3b6d , 0x1766,0x3b92 ,0x1709,0x3bb6 ,0x16ab,0x3bda , 0x164c,0x3bfd ,0x15ee,0x3c20 ,0x1590,0x3c42 , 0x1531,0x3c64 ,0x14d2,0x3c85 ,0x1473,0x3ca5 , 0x1413,0x3cc5 ,0x13b4,0x3ce4 ,0x1354,0x3d03 , 0x12f4,0x3d21 ,0x1294,0x3d3f ,0x1234,0x3d5b , 0x11d3,0x3d78 ,0x1173,0x3d93 ,0x1112,0x3daf , 0x10b1,0x3dc9 ,0x1050,0x3de3 ,0x0fee,0x3dfc , 0x0f8d,0x3e15 ,0x0f2b,0x3e2d ,0x0eca,0x3e45 , 0x0e68,0x3e5c ,0x0e06,0x3e72 ,0x0da4,0x3e88 , 0x0d41,0x3e9d ,0x0cdf,0x3eb1 ,0x0c7c,0x3ec5 , 0x0c1a,0x3ed8 ,0x0bb7,0x3eeb ,0x0b54,0x3efd , 0x0af1,0x3f0f ,0x0a8e,0x3f20 ,0x0a2b,0x3f30 , 0x09c7,0x3f40 ,0x0964,0x3f4f ,0x0901,0x3f5d , 0x089d,0x3f6b ,0x0839,0x3f78 ,0x07d6,0x3f85 , 0x0772,0x3f91 ,0x070e,0x3f9c ,0x06aa,0x3fa7 , 0x0646,0x3fb1 ,0x05e2,0x3fbb ,0x057e,0x3fc4 , 0x051a,0x3fcc ,0x04b5,0x3fd4 ,0x0451,0x3fdb , 0x03ed,0x3fe1 ,0x0388,0x3fe7 ,0x0324,0x3fec , 0x02c0,0x3ff1 ,0x025b,0x3ff5 ,0x01f7,0x3ff8 , 0x0192,0x3ffb ,0x012e,0x3ffd ,0x00c9,0x3fff , 0x0065,0x4000 ,0x0000,0x4000 ,0xff9b,0x4000 , 0xff37,0x3fff ,0xfed2,0x3ffd ,0xfe6e,0x3ffb , 0xfe09,0x3ff8 ,0xfda5,0x3ff5 ,0xfd40,0x3ff1 , 0xfcdc,0x3fec ,0xfc78,0x3fe7 ,0xfc13,0x3fe1 , 0xfbaf,0x3fdb ,0xfb4b,0x3fd4 ,0xfae6,0x3fcc , 0xfa82,0x3fc4 ,0xfa1e,0x3fbb ,0xf9ba,0x3fb1 , 0xf956,0x3fa7 ,0xf8f2,0x3f9c ,0xf88e,0x3f91 , 0xf82a,0x3f85 ,0xf7c7,0x3f78 ,0xf763,0x3f6b , 0xf6ff,0x3f5d ,0xf69c,0x3f4f ,0xf639,0x3f40 , 0xf5d5,0x3f30 ,0xf572,0x3f20 ,0xf50f,0x3f0f , 0xf4ac,0x3efd ,0xf449,0x3eeb ,0xf3e6,0x3ed8 , 0xf384,0x3ec5 ,0xf321,0x3eb1 ,0xf2bf,0x3e9d , 0xf25c,0x3e88 ,0xf1fa,0x3e72 ,0xf198,0x3e5c , 0xf136,0x3e45 ,0xf0d5,0x3e2d ,0xf073,0x3e15 , 0xf012,0x3dfc ,0xefb0,0x3de3 ,0xef4f,0x3dc9 , 0xeeee,0x3daf ,0xee8d,0x3d93 ,0xee2d,0x3d78 , 0xedcc,0x3d5b ,0xed6c,0x3d3f ,0xed0c,0x3d21 , 0xecac,0x3d03 ,0xec4c,0x3ce4 ,0xebed,0x3cc5 , 0xeb8d,0x3ca5 ,0xeb2e,0x3c85 ,0xeacf,0x3c64 , 0xea70,0x3c42 ,0xea12,0x3c20 ,0xe9b4,0x3bfd , 0xe955,0x3bda ,0xe8f7,0x3bb6 ,0xe89a,0x3b92 , 0xe83c,0x3b6d ,0xe7df,0x3b47 ,0xe782,0x3b21 , 0xe725,0x3afa ,0xe6c9,0x3ad3 ,0xe66d,0x3aab , 0xe611,0x3a82 ,0xe5b5,0x3a59 ,0xe559,0x3a30 , 0xe4fe,0x3a06 ,0xe4a3,0x39db ,0xe448,0x39b0 , 0xe3ee,0x3984 ,0xe394,0x3958 ,0xe33a,0x392b , 0xe2e0,0x38fd ,0xe287,0x38cf ,0xe22d,0x38a1 , 0xe1d5,0x3871 ,0xe17c,0x3842 ,0xe124,0x3812 , 0xe0cc,0x37e1 ,0xe074,0x37b0 ,0xe01d,0x377e , 0xdfc6,0x374b ,0xdf6f,0x3718 ,0xdf19,0x36e5 , 0xdec3,0x36b1 ,0xde6d,0x367d ,0xde18,0x3648 , 0xddc3,0x3612 ,0xdd6e,0x35dc ,0xdd19,0x35a5 , 0xdcc5,0x356e ,0xdc72,0x3537 ,0xdc1e,0x34ff , 0xdbcb,0x34c6 ,0xdb78,0x348d ,0xdb26,0x3453 , 0xdad4,0x3419 ,0xda82,0x33df ,0xda31,0x33a3 , 0xd9e0,0x3368 ,0xd98f,0x332c ,0xd93f,0x32ef , 0xd8ef,0x32b2 ,0xd8a0,0x3274 ,0xd851,0x3236 , 0xd802,0x31f8 ,0xd7b4,0x31b9 ,0xd766,0x3179 , 0xd719,0x3139 ,0xd6cb,0x30f9 ,0xd67f,0x30b8 , 0xd632,0x3076 ,0xd5e6,0x3034 ,0xd59b,0x2ff2 , 0xd550,0x2faf ,0xd505,0x2f6c ,0xd4bb,0x2f28 , 0xd471,0x2ee4 ,0xd428,0x2e9f ,0xd3df,0x2e5a , 0xd396,0x2e15 ,0xd34e,0x2dcf ,0xd306,0x2d88 , 0xd2bf,0x2d41 ,0xd278,0x2cfa ,0xd231,0x2cb2 , 0xd1eb,0x2c6a ,0xd1a6,0x2c21 ,0xd161,0x2bd8 , 0xd11c,0x2b8f ,0xd0d8,0x2b45 ,0xd094,0x2afb , 0xd051,0x2ab0 ,0xd00e,0x2a65 ,0xcfcc,0x2a1a , 0xcf8a,0x29ce ,0xcf48,0x2981 ,0xcf07,0x2935 , 0xcec7,0x28e7 ,0xce87,0x289a ,0xce47,0x284c , 0xce08,0x27fe ,0xcdca,0x27af ,0xcd8c,0x2760 , 0xcd4e,0x2711 ,0xcd11,0x26c1 ,0xccd4,0x2671 , 0xcc98,0x2620 ,0xcc5d,0x25cf ,0xcc21,0x257e , 0xcbe7,0x252c ,0xcbad,0x24da ,0xcb73,0x2488 , 0xcb3a,0x2435 ,0xcb01,0x23e2 ,0xcac9,0x238e , 0xca92,0x233b ,0xca5b,0x22e7 ,0xca24,0x2292 , 0xc9ee,0x223d ,0xc9b8,0x21e8 ,0xc983,0x2193 , 0xc94f,0x213d ,0xc91b,0x20e7 ,0xc8e8,0x2091 , 0xc8b5,0x203a ,0xc882,0x1fe3 ,0xc850,0x1f8c , 0xc81f,0x1f34 ,0xc7ee,0x1edc ,0xc7be,0x1e84 , 0xc78f,0x1e2b ,0xc75f,0x1dd3 ,0xc731,0x1d79 , 0xc703,0x1d20 ,0xc6d5,0x1cc6 ,0xc6a8,0x1c6c , 0xc67c,0x1c12 ,0xc650,0x1bb8 ,0xc625,0x1b5d , 0xc5fa,0x1b02 ,0xc5d0,0x1aa7 ,0xc5a7,0x1a4b , 0xc57e,0x19ef ,0xc555,0x1993 ,0xc52d,0x1937 , 0xc506,0x18db ,0xc4df,0x187e ,0xc4b9,0x1821 , 0xc493,0x17c4 ,0xc46e,0x1766 ,0xc44a,0x1709 , 0xc426,0x16ab ,0xc403,0x164c ,0xc3e0,0x15ee , 0xc3be,0x1590 ,0xc39c,0x1531 ,0xc37b,0x14d2 , 0xc35b,0x1473 ,0xc33b,0x1413 ,0xc31c,0x13b4 , 0xc2fd,0x1354 ,0xc2df,0x12f4 ,0xc2c1,0x1294 , 0xc2a5,0x1234 ,0xc288,0x11d3 ,0xc26d,0x1173 , 0xc251,0x1112 ,0xc237,0x10b1 ,0xc21d,0x1050 , 0xc204,0x0fee ,0xc1eb,0x0f8d ,0xc1d3,0x0f2b , 0xc1bb,0x0eca ,0xc1a4,0x0e68 ,0xc18e,0x0e06 , 0xc178,0x0da4 ,0xc163,0x0d41 ,0xc14f,0x0cdf , 0xc13b,0x0c7c ,0xc128,0x0c1a ,0xc115,0x0bb7 , 0xc103,0x0b54 ,0xc0f1,0x0af1 ,0xc0e0,0x0a8e , 0xc0d0,0x0a2b ,0xc0c0,0x09c7 ,0xc0b1,0x0964 , 0xc0a3,0x0901 ,0xc095,0x089d ,0xc088,0x0839 , 0xc07b,0x07d6 ,0xc06f,0x0772 ,0xc064,0x070e , 0xc059,0x06aa ,0xc04f,0x0646 ,0xc045,0x05e2 , 0xc03c,0x057e ,0xc034,0x051a ,0xc02c,0x04b5 , 0xc025,0x0451 ,0xc01f,0x03ed ,0xc019,0x0388 , 0xc014,0x0324 ,0xc00f,0x02c0 ,0xc00b,0x025b , 0xc008,0x01f7 ,0xc005,0x0192 ,0xc003,0x012e , 0xc001,0x00c9 ,0xc000,0x0065 };
Low
[ 0.5, 26.125, 26.125 ]
The sheer number of Islamists, separatists, and former government forces on the side of the Saudi-backed invasion of Yemen has long made this a very complicated war. The growing probability of a civil war within the war threatens to make this even more difficult. Fighting over the past three days has been raging in the southern capital of Aden, where separatist forces took over the presidential palace and are fighting against Saudi-backed forces. At least 25 have been killed over the past three days, including a number of civilians. There is a split in that the separatists are backed by the UAE, and the government forces are loyal to the Saudis. They both have very different ideas of post-war Yemen, and substantial mistrust beyond that. The fighting started after separatist fighters were killed by Islamists, At the funeral, separatist leaders suggested the Islamists were loyal to the government, and urged a rebellion. A crowd went straight from the funerals to the palace, taking it over in short order. Since then, fighting has continued around the palace, with pro-Saudi officials accusing the separatists of sedition, on the grounds of them being separatists. Author: Jason Ditz Jason Ditz is news editor of Antiwar.com. View all posts by Jason Ditz
Mid
[ 0.588693957115009, 37.75, 26.375 ]
--- abstract: 'In a companion paper [@RiniEnergyPartI13], we present a general approach to evaluate the impact of cognition in a downlink cellular system in which multiple relays assist the transmission of the base station. This approach is based on a novel theoretical tool which produces transmission schemes involving rate-splitting, superposition coding and interference decoding for a network with any number of relays and receivers. This second part focuses on a practical design example for a network in which a base station transmits to three receivers with the aid of two relay nodes. For this simple network, we explicitly evaluate the impact of relay cognition and precisely characterize the trade offs between the total energy consumption and the rate improvements provided by relay cooperation. These closed-form expressions provide important insights on the role of cognition in larger networks and highlights interesting interference management strategies. We also present a numerical simulation setup in which we fully automate the derivation of achievable rate region for a general relay-assisted downlink cellular network. Our simulations clearly show the great advantages provided by cooperative strategies at the relays as compared to the uncoordinated scenario under varying channel conditions and target rates. These results are obtained by considering a large number of transmission strategies for different levels of relay cognition and numerically determining one that is the most energy efficient. The limited computational complexity of the numerical evaluations makes this approach suitable for the optimization of transmission strategies for larger networks.' author: - '\' bibliography: - 'literature.bib' - 'steBib1.bib' title: | Energy Efficient Cooperative Strategies for Relay-Assisted Downlink Cellular Systems\ Part II: Practical Design --- Introduction {#chap:introduction} ============ Wireless relay nodes hold the promise of drastically increasing both the energy and spectral efficiency of future cellular systems [@pabst2004relay]. The demand of transmission rates has increased tremendously between the third and fourth generations of mobile networks due to new functionalities and services provided by handset devices. Rate gains of this order cannot be achieved without increasing bandwidth or the density of the network and relay nodes represent a low-cost way of achieving such increase. Despite the relevance of relays in practical systems, it is not yet clear what system architecture is the most energy efficient and what advantages are provided by cognition in this scenario. The architecture of relay-assisted downlink cellular system in LTE-A in presented in Fig. \[fig:caseexample\](a) : the system is comprised of a base station which is interested in communicating to multiple receivers with the aid of the relay nodes. The set of communications between the base station and the relay nodes is termed a *relay link* while the set between relay nodes and receives is termed an *access link*. We consider the case where no direct link between the base station and receivers exists: this case can be easily obtained by considering an additional relay which is connected to the base station with an infinity capacity channel. In the relay link, transmissions take place over frequency separated channels and are thus non interfering. In the access link, instead, transmissions take place over the same frequency band and therefore are self interfering. When relays cooperate, the access link is analogous to a multi-terminal cognitive channel in which transmitting node are able to partially coordinate their transmissions. The difficulty in designing efficient communication strategies for this system lies in the intrinsic complexity of the communication strategies that can be implemented with even a moderately small number of relays and receivers. Possible ways to circumvent this obstacle is to either consider simple communication protocols for each relay or to assume that relays operate in a uniform manner which does not depend on the network conditions. Two such examples are the so called *relay selection* strategy [@LueLinkFailure05; @LinCooperativeRegions04; @LiRelaySearch05] and a generalization of the amplify-and-forward or decode-and-forward strategies for the relay channel [@zhao2006improving]. In [@RiniEnergyPartI13] we propose a different approach: we generalize the information theoretical derivation of achievable schemes to a network with any number of relays and receivers and obtain the achievable rate region from the analysis of the error probability for this general scenario. This approach is fundamentally different from the previous approaches as it considers all possible ways in which the base station can distribute messages to the relay nodes through cognition and as well as all possible cooperation strategies that can be implemented at the relay. In particular we focus on the role of partial, or unidirectional, cooperation at the relay which allows for coordinated transmission strategies which have been studied in the context of cognitive channels such as the Cognitive InterFerence Channel (CIFC) [@devroye2005cognitive] and the Interference Channel with a Cognitive Relay (IFC-CR) [@Sahin_2007_1]. As a result, the number and the complexity of the scheme considered by this approach has no comparison with other approaches. Moreover, the generation and the evaluation of the schemes has a low computational complexity and it is thus possible to analyze large networks and determine the optimal level of relay cooperation and the most energy efficient transmission strategy. Literature Overview {#sec:motivation} ------------------- In the literature, different relay-assisted downlink systems have been proposed and studied. A conceptually simple and yet powerful approach is *relay selection* [@LueLinkFailure05; @LinCooperativeRegions04; @LiRelaySearch05], i.e. selecting the relay which allows for the fastest data transmission between the base station and receivers. Perhaps surprisingly, this scheme provides the same cooperative diversity as more complicated strategies [@BletsasSimpleCooperativeDiversityMethod06]. Space-time coding for relay-assisted transmissions has been considered in [@stefanov2005cooperative] and it has been shown to achieve full cooperation diversity at the cost of an increased complexity. The sum rate optimization for amplify-and-forward multi-antenna relay networks is considered in [@lee2008achievable], where the “power iterative algorithm” for achieving optimal beamforming is proposed. Achievable rate regions in two-way relay communications is discussed in [@rankov2006achievable]. Combined strategies using amplify-and-forward, decode-and-forward, compress-and-forward with superposition coding and other encoding and decoding techniques are compared for different scenarios. In the context of energy efficiency, virtual MIMO systems have been considered to exploit the broadcast nature of the medium and distribute messages from the base station to the relay nodes. In this case it is possible to analyze the performance of a system where relay nodes opportunistically decode the transmissions that can be overheard over the network. When multiple relays are able to decode multiple transmissions, they are then able to act as a virtual MIMO system in the next hop. This can be incorporated into multi-hop transmission schemes to study the energy efficiency as in [@WenqingVirtualMIMOprotocol05] and [@CosoVirtualMIMO06]. Energy efficiency for relay-assisted LTE-A networks is studied in [@FantiniE3F11; @FantiniEnergyEfficiency11] where it is shown that a multi-cast cooperative scheme in relay networks results in more efficient energy consumption compared to a conventional two-hop approach. This approach does not consider the cooperation among multiple relays and considers only limited transmission strategies, but it is a first approach to this problem. Another approach to energy efficiency analysis of cooperative relaying is considered in [@Energy:Xiao]-[@Energy:Madan]: here an opportunistic scheme is proposed, which relies on the channel state information (CSI) knowledge to decide which subset of the relay nodes cooperate. Contributions ------------- Previous literature focuses on the case of either no relay cooperation or full relay cooperation. We focus here the intermediate case of partial and unidirectional transmitter cooperation. In information theory, these forms of cooperation are referred to as cognition as in the CIFC [@devroye2005cognitive] and the IFC-CR [@Sahin_2007_2]. The two channels idealize the ability of some transmitter to learn the message of the other user thanks to the broadcast nature of the wireless medium. In a companion paper [@RiniEnergyPartI13], we propose a new theoretical framework to design optimal transmission strategies for the case where each relay has knowledge of multiple messages. We are able to derive the achievable rate region of any scheme transmission scheme at the relay involving rate-splitting, superposition coding and interference decoding. The schemes to be considered on the access link depend on the message decoded at the relay nodes, which we refer to as *level of cognition*. Although very powerful, this approach is too general to provide much insight on the important features of energy efficient transmission schemes. In the following we specialize the approach of [@RiniEnergyPartI13] to the network where a base station communicates to three receivers with the aid of two relay nodes. For this specific network we provide closed-form expression for the achievable rate regions which provide significant insights on the tarde off between cooperation and interference management at the relays. We also present a simulation setup which shows how the theoretical results in [@RiniEnergyPartI13] can be efficiently implemented. This shows that the proposed approach can indeed be used to analyze larger networks. The contributions in the paper can be summarized as follow: **Explicit Characterization for Power Consumptions:** Using the results in [@RiniEnergyPartI13], we derive explicit characterizations for the power consumption of several transmission strategies and provide insights on the tradeoff between power consumption at the base station and cooperation at the relays. By comparing the performance of different schemes, we show that cooperation is not only useful in increasing the power efficiency relative to the uncoordinated case but indeed is necessary to attain high data rates. **Numerically Determine Optimal Strategies** We automate the derivation of achievable rate regions in [@RiniEnergyPartI13] and through computer simulation we determine the most energy efficient transmission strategies for a number of channel realizations. In each case, we consider a number of possible achievable strategies in the order of the thousands for the channel model under consideration. The minimization of the power consumption necessary to achieve a target rate for each scheme can be performed with almost linear complexity. Indeed the fact that our approach is able to consider a large number of transmission schemes and optimize each scheme with reasonable complexity makes it very suitable for larger networks. Paper Organization ------------------ Section \[sec:model\] introduces the network model under consideration: the relay-assisted downlink cellular system in with two relays and three receivers. The problem of energy minimization this network is introduced in Sec. \[sec:Problem Description and an Illustrative Example\]. Lower bounds to the energy efficiency are provided in Sec. \[sec:Lower Bounds to the Energy Efficiency\]. Explicit characterizations for the network topology under consideration are provided in Section \[Sec:Considerations on a Simple Example\]. The results of the numerical optimization are provided in Section \[sec:Numerical Evaluations\]. Finally, Section \[sec:Conclusion\] concludes the paper. Notation -------- In the remainder of the paper we adopt the following notation: - variables related to the Base Station (BS) are indicated with the superscript $\rm BS$, moreover $i$ is the index related to BS, - variables related to the Relay Nodes (RN) are indicated with the superscript $\rm RN$, moreover $j$ is the index related to RNs, - variables related to the Receivers (RX) are indicated with the superscript $\rm RX$, moreover $z$ is the index related to RXs, - $\Ccal(\Sigma)=1 / 2 \log \lb | \Sigma \Sigma^H +\Iv|\rb$ where $X$ is a vector of length $k$ of jointly Gaussian random variables and $|A|$ indicates the determinant of $A$, - $A_{ij}$ element of the matrix $A$ in row $i$ and column $j$, Channel Model {#sec:model} ============= In the following we consider a relay-assisted downlink cellular system with two relays and three receivers. In this model, also depicted in Fig. \[fig:channel\_model\_2X3\], the Base Station (BS) is interested in communicating to three receivers (RXs) with the aid of two Relay Nodes (RNs). This model is a special case of the general model in [@RiniEnergyPartI13] in which $N_{\rm RN}=2$ and $N_{\rm RX}=3$, in particular each RX $z\in \{1,2,3\}$ is interested in the message $W_z$ at rate $R_z$ which is known at the BS and is to be transmitted reliably and efficiently to RXs through the RNs 1 and 2. The channel inputs at the Base Station (BS) are $X^{\rm BS}_1$ and $X^{\rm BS}_2$ each subject to the power constraint is $E[|X^{\rm BS}_1 |]+E[|X^{\rm BS}_2 |] \leq P^{\rm BS}$. The channel outputs at Relay Node(RN) one and two In a similar fashion, the channel input at the RNs are $X^{\rm RN}_1$ and $X^{\rm RN}_2$ subject to the power constraints $E[|X^{\rm RN}_1 |]\leq P^{\rm RN}_1$ and $E[|X^{\rm RN}_2 |]\leq P^{\rm RN}_2$. The channel outputs at the RXs are Each noise term $Z$ has variance one and the channel coefficient can take any complex value. A graphical representation of the channel is provided in Fig. \[fig:channel\_model\_2X3\]. ![ The relay-assisted downlink cellular system in with two relays and three receivers. []{data-label="fig:channel_model_2X3"}](channel_model_2X3){width="75.00000%"} The transmission between the BS and the RNs as well as the transmission between the RNs and the RXs takes place over $N$ channel transmissions. Each message $W_z$ is uniformly distributed in the interval $[1 \ldots 2^{N R_z}]$. Let $W$ indicate the vector containing all the messages to be transmitted, i.e. $W=[W_1 \ W_2 \ W_3]$ and $R$ the vector containing the rate of each message, i.e. $R=[R_1 \ R_2 \ R_3]$. Additionally let $W_j^{\rm RN}$ be the set of messages decoded at relay node $j \in \{1,2\}$ and define $W^{\rm RN}=[W_1^{\rm RN} \ W_2^{\rm RN}]$. A transmission on the relay link is successful if there exists an encoding function at the BS and a decoding function at each RN such that each relay can successfully decode the message in $W_j^{\rm RN}$ with high probability. Similarly, a transmission on the access link is successful if there exists an encoding function at each RN and a decoding function at each RX such that each receiver $z \in \{1,2,3\}$ can decode the message $W_z$ reliably. More formally, let $\Wh_{z}^{RN_j} $ be the estimate of $W_z$ at relay $j$ and $\Wh_{z}$ the estimate of $W_z$ at receiver $z$ over $N$ channel transmissions, then a communication error occurs when there exist $\Wh_{z}^{RN_j} \neq W_z$ or $\Wh_{z} \neq W_z$ for some noise realization over the relay link or the access link. A rate vector $R$ is said to be achievable if, for any $\epsilon > 0$, there is an $N$ such that $$\begin{aligned} \max_z \max_{W^{\rm RN}_j} \ \Pr \lsb \Wh_{z}^{RN_j} \neq \Wh_{z} \neq W_{z} , \rsb \leq \epsilon.\end{aligned}$$ Capacity is the closure of the union of the sets of achievable rates. In the following we consider the problem of minimizing $E_{\rm TOT}$, the total energy required to achieve a rate vector $R=[R_1 \ R_2 \ R_3]$ defined as Problem Description {#sec:Problem Description and an Illustrative Example} =================== In this section we provide some initial insight on the role of cooperation for the network model in Sec. \[sec:model\]. We are interested in characterizing the energy advantages provided by cooperation and cognition when employing superposition coding, interference decoding and rate-splitting. When the base station distributes the same message to multiple RNs, the access link becomes cognitive channel in the sense of the Cognitive InterFerence Channel (CIFC) and the InterFerence Channel with a Cognitive Relay (CIFC-CR), that is, transmitting nodes have partial or unidirectional knowledged of each others’ messages and can thus perform partially coordinated transmissions. Transmitter cooperation has been shown to provide substantial improvement on the rate performance [@rini2012inner] as well as suggesting new and surprising cooperative transmission schemes [@rini2010new]. In order to obtain the performances of cognitive channels though, it is necessary to distribute the same message to multiple RNs which consumes more power in the relay link. Indeed we are interested in characterizing the tension between increase of energy in the relay link and the benefits provided by cognition in the access link . In general, there exists an optimal level of cognition at the relay nodes for which the additional energy consumption at the relay link allows for the most beneficial performance improvements in the access link. Our aim is to quantify the amount of RN cooperation that is needed to attain the largest energy efficiency and determine what coding choices attain it. Let us consider the scenario in which the BS distributes each message to only one RN, as illustrated in Fig. \[fig:caseexample\].A. In this case, the power utilization at the BS is minimal but no cooperation between the relays is possible as no message is known at both. The lack of cooperation among RNs corresponds, in general, to a higher power consumption on the access link as there is no diversity gain at the receivers: when multiple RNs send the same signal, we obtain a combining gain at the receiver. Cooperation provides some additional advantages beyond combining: by knowing the same message, RNs can each superimpose the codewords of other users over the codeword of the common message. This, in general, achieves larger energy savings than sending each codeword separately. Consider now the message allocation at the RNs in Fig. \[fig:caseexample\].B: since message $W_1$ and $W_2$ are distributed to both RNs, it is possible for the RNs to cooperate in transmitting these messages and the codeword to transmit $W_3$ can be superimposed over the common codewords. The transmission of a message to multiple RNs, however, utilizes more power on the relay link and the advantages attained on the access link must be weighted against this additional power consumption. The aim of the paper is to investigate the tradeoff between cooperation and power consumption when considering classical information theoretical achievable strategies. We attempt to identify the message allocation at the relay nodes and the relay cooperation strategy which allows for the lowest overall power consumption. In the network of Sec. \[sec:model\], the possible levels of relay cognition are: [**$\bullet$ No cooperation: each message is known only at one RN.**]{} The RNs code independently and the RN that knows both message can apply superposition coding among these codewords. This scenario minimizes the power consumption at the relay link but no gain from cooperation is possible in the access link. [**$\bullet$ Partial Cooperation I: a message is known at both RN.** ]{} The codeword of the common message acts as a base codewords on top of which the other two codewords can be superimposed. When superposition coding is applied, the RXs decoding the top codewords must also decode the bottom one: this imposes additional rate constraint on the bottom codeword but improves the energy efficiency in sending the top codewords. [**$\bullet$ Partial Cooperation II: two messages are known at both RN.**]{} The codeword of the two common messages can be superimposed one on top of the other and act as base codewords for the message known only at one RN. This improves on the energy gains offered by superposition coding with respect to the previous scenario but consumes additional power on the relay link. [**$\bullet$ Full Cooperation: all messages are known at all RNs.**]{} In this case the power consumption at the base station is maximal but the RNs can cooperate on the transmission of every codeword. The different transmission strategies corresponding to the different level of cooperation are depicted in Fig. \[fig:schemesdesc\]. Each hatched box represents the codeword of a message: codewords are not labeled to account for the symmetry of the possible $W_j^{\rm RN}$. The boxes encircled by the solid blue line are known at one RN while the boxes encircled by a dotted red line by the other RN (no labeling is used to account for symmetry). Since the different cases are listed with increasing number of shared messages, at each step the transmission strategies of the previous cases are also viable. Arrows connecting boxes represent the superposition coding: the orientation is from the bottom codewords toward the top one. The decoding of the top codeword requires also the decoding of the bottom codewords. For this reason, superposition coding restricts the rate of the base codeword to the highest rate that can be reliably decoded by all the receivers which must decode this codeword. Consequently applying superposition coding does not always result in a rate advantage: this is the case only when the decoding of the base codeword at a non-intended receiver does not limit the achievable rates at the intended one. To distinguish among possible application of superposition coding, we can classify the possible encoding strategies depending on the number of superposition coding steps they involve: one, two or three. The possible encoding strategies in each case are depicted on Fig. \[fig:superdesc\]. Different schemes require at least a certain level of cooperation among relays and the same scheme can be implemented for different levels of cooperation. This classification uniquely identifies the number of interfering codeword that a receiver is required to decode. Lower Bounds to the Energy Efficiency {#sec:Lower Bounds to the Energy Efficiency} ===================================== In this section we specialize the results in [@RiniEnergyPartI13 Th. V.1.], [@RiniEnergyPartI13 Th. V. 2.] and [@RiniEnergyPartI13 Lem. V. 3.] to the channel model in Sec. \[sec:model\]. Although simple, this example provides the reader with the basic intuition on the structure and role of these bounds. [**Relay Link Capacity for the Two Relays and Three Receivers Case**]{} \[lem:Relay Link Capacity for the Two Relays and Three Receivers Case\] For a given message allocation $W^{\rm RN}$ the capacity of the relay link for the channel model in Sec. \[sec:model\] is for any $P_1^{\rm BS}$ and $P_2^{\rm BS}$ such that $P_1^{\rm BS}+P_2^{\rm BS}=P^{\rm BS}$. Now for the access link outer bounds we have [**Access Link Outer Bound for the Two Relays and Three Receivers Case**]{} \[lem:Access Link Outer Bound for the Two Relays and Three Receivers Case\] Given a message allocation $W^{\rm RN}$, an outer bound to the achievable rates on the access link for the channel in Sec. \[sec:model\] is union over all the possible matrices $A$ as defined in [@RiniEnergyPartI13 eq. (27)]. From Lem. \[lem:Relay Link Capacity for the Two Relays and Three Receivers Case\] and Lem. \[lem:Access Link Outer Bound for the Two Relays and Three Receivers Case\] we obtain a lower bound on the energy consumption by using the fact that determining capacity is the dual problem of determining power efficiency. [**Energy Consumption Lower Bound**]{} \[lem:Energy Efficiency Lower Bound for the Two Relays and Three Receivers Case\] A lower bound to energy required for achieving the rate vector $R$ in the channel model in Sec. \[sec:model\] is obtained as the minimum over $W^{\rm RN}$ defined as of $P^{\rm BS}$ and $[P_1^{\rm RN} \ldots P_{N_{\rm RN}}^{\rm RN}]$ such that $R$ is on the boundary of and respectively. Achievable Schemes {#Sec:Considerations on a Simple Example} ================== In this section we provide some closed-form expressions of achievable rate region which provide concrete examples of the tradeoffs between cooperation and power consumption that emerge in the set up we consider. This section also sets the stage for the numerical simulations is Sec. \[sec:Numerical Evaluations\] where some of the schemes presented here are simulated numerically. In particular we consider four schemes - **Non-cooperative scheme with two active relays:** this scheme minimizes the power consumption on the relay link by distributing the one message to one relay and two messages to the other. - **Non-cooperative scheme with two active relays and interference decoding:** even when non cooperative schemes are implemented, interference decoding can be used to boost the energy efficiency - **Partially cooperative scheme:** in which the relays cooperate in transmitting at least one message - **Partially cooperative scheme with interference decoding:** which combines both cooperative gains and interference decoding gains. The schemes above are taken without rate-splitting, so that $\Gamma$ is a binary matrix. In the following, to avoid having to specify the rate-splitting matrix in each different scenario, we adopt the notation $U_{\iv \sgoes \jv}( W_z)$ to indicate that the message $W_z$ is embedded is the codeword $U_{\iv \sgoes \jv}^N$. We again focus on the simple channel model in Sec. \[sec:model\] and additionally focus on the symmetric case in which for $a,b \in \Rbb^+$ and With this specific choice of channel parameters, we have that - by fixing $a=0$, the access channel reduces to an interference channel, - by fixing $b=0$, no communication is possible between RN 1 and RX 3 and between RN 2 and RX 1, - when one of the relay has knowledge of all messages and the other none, the channel reduces to a degraded Gaussian Broadcast Channel (BC), - when $a=0$ and RNs know independent messages, the access channel reduces to an interference channel, - when $a=0$ and a relay node knows the message of the other, the access channel reduces to a cognitive interference channel, A graphical representation of the channel under consideration is provided in Fig. \[fig:simsetup\_a\_b\]. ![The symmetric channel model considered in Sec. \[Sec:Considerations on a Simple Example\]. []{data-label="fig:simsetup_a_b"}](simsetup_a_b){width="80.00000%"} We also focus on the symmetric rate problem, that is we fix $R_{\rm sym}=R_1=R_2=R_3$. By choosing a highly symmetric model and symmetric rates, we make it possible to derive simple explicit characterizations which lend themselves to intuitive interpretations and a very simple graphical representation. ![ The four CGRAS presented in Sec. \[Sec:Considerations on a Simple Example\]. []{data-label="fig:Schemes"}](Schemes){width="\textwidth"} Non-cooperative scheme with two active relays {#sec:Non-cooperative scheme with two active relays} --------------------------------------------- The power consumption at the BS is minimized when transmitting one message to a RN and two messages to the other RN, in which case $P^{\rm BS}= 16^{R_{\rm sym}}+4^{R_{\rm sym}}-2$. In this case, superposition coding can be applied at the relay node that knows two messages: the order of superposition of the codeword is chosen according to the SINR toward the two RXs for which the messages are intended. This scheme is in general efficient also on the access link but it is interference limited at the decoders which treat the interference as noise. For this reason, it may not be possible to find a power allocation which achieves a given target rate. Let’s consider the case in which RN 1 has knowledge of $W_1$ and RN 2 has knowledge of $W_2$ and $W_3$ (other message combinations are easily obtained in a similar manner and also considering the symmetry of the channel). This assignment is advantageous in the case $a < 1$ and $b <1$ in which case it is more convenient to send $W_1$ through RN 1 instead of RN 2 and $W_3$ through RN 2. Also, since $a < 1$, RN 2 it is advantageous to superimpose the codeword for $W_3$ over the one for $W_3$. This corresponds to the CGRAS number 1 in Fig. \[fig:Schemes\] (same as CGRAS number 3 in Fig. \[fig:rate01\]). With this coding choice the following rate region is achievable with the assignment which has a total power consumption at the access link of When $a\geq 1 \geq b$, the sum rate bound is never redundant which means that the region in has two Pareto optimal corner points. With the assumption, $R_{\rm sym}=R_1=R_2=R_3$, the required transmit power can then be calculated as: for $\Ccal^{-1}(x)=4^x-1$. When combining equations and we obtain A necessary condition for $P_{11}$ to be positive is for parameter $b$ to satisfy similarly, by combining , and we obtain that a necessary condition for $P_{11}$ to be positive is It can be verified that $P_{22}$ and $P_{23}$ can always be determined when $P_{11}$ is feasible. This consideration is not surprising: since RX 1 and RX 3 treat the interference as noise, large rates can be achieved only when the level of the interference, which is controlled by $b$ in both cases, is small. For $b$ to be small it is necessary for $R_{\rm sym}$ to be small as prescribed by . Other cases of parameter values can be similarly analyzed with similar conclusions: this scheme employs no cooperation among the relay and it is thus power efficient on the relay link but does not achieve arbitrarily large rates as it is interference limited. Non-cooperative scheme with two active relays and interference decoding {#sec:Non-cooperative scheme with two active relays and interference decoding} ----------------------------------------------------------------------- The achievable scheme in Sec. \[sec:Non-cooperative scheme with two active relays\] can be improved upon by allowing some receivers to decode an interfering codeword. Consider again : in this case the rate $R_2$ is limited by the power of the codeword for $W_1$: a possible solution for this problem is to allow interference decoding at RX 2. To show the advantages provided by interference decoding consider the case where $a>1>b$: in this case a well performing achievable scheme that does not consider cooperation is the scheme where RN 2 transmits $W_1$ and RN 1 transmits $W_3$. $W_2$ can be sent to RN 1 and, since $a>b$, superimposed over the codeword for $W_3$ (in this, the scheme considered here differs from the scheme in Sec. \[sec:Non-cooperative scheme with two active relays\], in which $W_3$ is superimposed over $W_2$. ). Since $a>b$, the transmission from RN 2 toward RX 1 interfere with the transmission from RN 1 to RX 2: in this case it is convenient to have RX 2 decode $W_1$. With this choice, while RX 1 and RX 3 only decode their intended message, RX 2 decodes all the messages. This corresponds to the CGRAS number 2 in \[fig:Schemes\] (same as the CGRAS number 3 in Fig. \[fig:rate01\]) with achievable rate region: with the assignment which has a total power consumption at the access link of In this case the rate bounds and are still interference limited as in the scheme in but the remaining bounds are not. On the other hand though, the additional bounds of , and are not present in . By increasing the number of messages decoded at a terminal, we impose additional constraints on the achievable rate region, since the correct decoding of the interfering codewords has to be possible. The additional rate constrains might be loose in a subset of the parameter region and thus interference decoding can provide a rate advantage in some class of channels. Since and are still interference limited, it is possible that no power allocation exists to achieve a given target rate vector. Partially cooperative scheme {#sec:Partially cooperative scheme} ---------------------------- We now consider the case it which the relay nodes cooperate in transmitting in transmitting one message. This corresponds to the smallest level of cooperation which corresponds to a base station power consumption of $P^{\rm BS}=2 \cdot 16^{R_{\rm sym}}-2$. Consider the scenario for $b>1>a$: since $a$ is small it is necessary to for the two RNs to cooperate in transmitting $W_2$ and take advantage of the combining gain. Since $b>a$ it is more convenient to send $W_3$ through RN 1 and $W_1$ through RN 2 and to superimpose both codewords over the codeword for $W_2$. The resulting CGRAS is CGRAS number 3 in Fig. \[fig:Schemes\] (same as CGRAS number 15 Fig. \[fig:cgras\_legend\]) with achievable rate region: with the assignment which has a total power consumption at the access link of Note that we have chosen the scaling of $U_2$ in $X_1$ and $X_2$ that provides the maximal ratio combining at RX 2. Cooperation among the RNs in transmitting $W_2$ provides a combining gain at all the RXs. For RX 1 and RX 3 this combining gain is $(b+1)^2 P_2$ while for RX 2 is $4 a^2 P_2$, which is the largest combining gain that can be attained when fixing the total transmission power for $W_2$ at the RNs. Note that, since $W_2$ is the base codeword, it is also decoded at RX 1 and RX 3 and thus this combining does not result in further interference for the non-intended decoders. Partially cooperative scheme with interference decoding {#sec:Partially cooperative scheme with interference decoding} ------------------------------------------------------- The rate bounds in are all reduced by the power of the interference experienced at each decoder. We seek to improve on this scheme by including interference decoding: we do so by allowing RX 1 and RX 3 to decode every codeword. The resulting CGRAS number 4 in Fig. \[fig:Schemes\] ( same as CGRAS number 18 in Fig. \[fig:cgras\_legend\]) which achieves the rate region: with the assignment As for the scheme is Sec. \[sec:Non-cooperative scheme with two active relays and interference decoding\], interference decoding improves the SINR at RX 1 and RX 3 but it does impose additional constraint on the rate of the interfering codewords being decoded. In particular, for $b>1>a$, the rate of $R_1$ ($R_3$) is reduced to $\Ccal(P_{21})$ ($\Ccal(P_{13})$) from $\Ccal(b^2 P_{21})$ ($\Ccal(b^2 P_{13})$) since correct decoding must take place at RN 3 (RN 1) as well. Simulation Setup {#sec:Numerical Evaluations} ================ Through numerical simulation, we can consider a large number of schemes and select the scheme corresponding to the smallest power consumption. The number of achievable transmission strategies which can be generated using [@RiniEnergyPartI13 Th. IV.2.] is on the order of hundreds without rate-splitting and thousands with rate-splitting. The power optimization for each scheme can be efficiently performed using linear optimization tools under some mild restrictions on the power allocation for the cooperative schemes. Indeed the number of schemes considered and the low computational complexity make it possible to identify a very detailed transmission strategy with reasonable resources. In the following we consider the following numerical optimization problems: - [**No rate-splitting Scenario:**]{} When no rate-splitting is considered, the number of possible achievable rate regions is limited and it is possible to graphically present the results of the energy efficiency optimization for varying $a$ and $b$ parameters. We also connect the numerical results with the schemes in Sec. \[Sec:Considerations on a Simple Example\] to provide further intuitions. - [**Rate-Splitting Scenario:**]{} when considering both superposition coding and rate-splitting there are simply too many schemes to be efficiently presented graphically. In this case we group the schemes according to their features in terms of the cognition level, number of superposition coding steps and amount of interference decoding. This description is less detailed than the previous scenario, but still insightful on a higher level perspective as in Sec. \[sec:Problem Description and an Illustrative Example\]. - [**Comparison between Inner and Outer Bounds:**]{} we compare the results of the numerical optimization with the lower bound on the energy consumption in Sec. \[sec:Lower Bounds to the Energy Efficiency\] and the case of relay selection and uncoordinated transmissions. For this scenario we consider the throughput comparison among different strategies for fixed channel parameters. No Rate-Splitting Scenario {#sec:No rate-splitting Scenario} -------------------------- We begin by considering the achievable schemes that can by generated from [@RiniEnergyPartI13 Th. IV.2.] which do not involve rate-splitting. By restricting our attention to this class of schemes, the optimization results are limited to eighteen schemes (after accounting for symmetry). Given the limited set of schemes, we can provide various intuitions on the important features of the optimal solution for varying $a$ and $b$. The solution of the optimal energy efficiency problem are represented using the corresponding CGRAS as in Fig. \[fig:cgras\_legend\]. ![ A graphical representation of the best performing CGRASs for the scenario in Sec. \[sec:No rate-splitting Scenario\]. []{data-label="fig:cgras_legend"}](legend){width="100.00000%"} Each CGRAS is contained in a different partition of the figure with an associated number and color: The schemes are arranged by increasing level cooperation and increasing interference decoding: - [**blue tones, numbers 1–8:**]{} no cooperation and minimum or no interference decoding schemes, - [**green and yellow tones, numbers 9–13:**]{} no cooperation and interference decoding schemes, - [**red tones, numbers 14–18:**]{} partial cooperation schemes with some interference decoding. In each box, two rectangles represents the two RNs: the rectangle with a red, dotted edge is associated with RN 1 while the one with a blue, solid edge to RN 2. Each rectangle contains the CGRAS nodes known at the associated RN. If a codeword is known at both, in is placed in the intersection of the two rectangles. Each node of the CGRAS is represented by a box labeled as $U_{\iv \sgoes \jv} (W_z)$. As in [@RiniEnergyPartI13 Def. 1], $U_{\iv \sgoes \jv}$ is the RV associated with the codeword transmitted from the set of transmitter $\iv$ toward of the set of receiver $\jv$ while $W_z$ indicates that this codeword embeds the message $W_z$ as in Sec. \[Sec:Considerations on a Simple Example\]. Superposition coding is indicated as a directed arrow, from the base codewords to the top one. Due to the symmetry in the channel model and in the target rate vector, more than one scheme achieves the same achievable rate region. In particular, given any scheme, swapping the labeling of RN 1 and RN 3 and swapping 2 to 1 in $\iv$ and 1 and 3 in $\jv$ for all the codewords $U_{\iv \sgoes \jv}$ will result in a scheme with the same achievable rate region. We refer to these schemes as equivalent and equivalent schemes are placed in the same partition of the figure. The optimization is performed as follows: for each possible message allocation among the RNs, all possible combinations of superposition coding and interference decoding are considered. With each such choice, a CGRAS is obtained along with the corresponding achievable rate region through [@RiniEnergyPartI13 Th. IV.2.]. The achievable rates are evaluated for the choice of auxiliary RV in [@RiniEnergyPartI13 Lem. IV.3.], additionally the scaling of the cooperative codewords is chosen so as to provide the largest combining gain at the intended receiver. With this choice of distribution of $U_{\iv \sgoes \jv}$, the power consumption is a linear function of the matrix $A$ in [@RiniEnergyPartI13 eq. (27)] and therefore the minimum power consumption on the access link for which the target symmetric rate is achievable can be determined using standard linear programming algorithms. The total power consumption is obtained by adding the power consumption at the access link with the power consumption on the relay link which is obtained through [@RiniEnergyPartI13 Th. V.1.] for each message allocation at the RNs. This optimization is repeated over multiple channel parameters $(a,b)$. For each channel, the optimal schemes are selected with a 5% tolerance and when more than one scheme is within the prescribed tolerance, we choose the scheme which is optimal for values of similar of $(a,b)$. In the following, we consider the four symmetric rates: $R_{\rm sym} \in [0.1 , 0.5 , 1 , 2]$ and the range of channel parameters $a \times b= [0 \ldots 2]^2$. Let’s start by considering the case of $R_{\rm sym}=0.1$: the optimization results are provided in Fig. \[fig:rate01\]. Since the achievable rate is relatively low, we expect the scheme of Sec. \[sec:Non-cooperative scheme with two active relays\] to be both feasible and efficient in achieving $R_{\rm sym}$. Indeed scheme 1 and 2, which correspond to the encoding choice of Sec. \[sec:Non-cooperative scheme with two active relays\], are optimal around the region $b>a>1$ and the region $b<1=a$. In these two regions the level of the interference at each receiver is limited and treating the interference as noise is optimal. Also, there is no need for cooperation as the advantages provided by the combining gains do no outweigh the additional costs of cooperation on the relay link. A detailed explanation of scheme 1 is provided in Sec. \[sec:Non-cooperative scheme with two active relays\]. For the region $b>a>1$, we notice that RN 1/ (RN 2) can communicate to RX 3/ (RX 1) through a link with gain $b$ at high SNR. RX 2 can be served by either RN 1 or RN 2 also through the link $a$: the presence of simultaneous transmission on this link create excessive interference to the rate $R_2$ since a large $b$ guarantees that the power of this transmission is low. For larger values of the parameter $a$, it is more advantageous for RX 2 to decode part of the interference and thus schemes similar to the one in Sec. \[sec:Non-cooperative scheme with two active relays and interference decoding\] perform better. Indeed schemes 3 and 5, having the same coding strategy of the scheme in Sec. \[sec:Non-cooperative scheme with two active relays and interference decoding\], are optimal around the region $a>1>b$ and $a>b>1$. The scheme 3 is presented in Sec. \[sec:Non-cooperative scheme with two active relays and interference decoding\], scheme 5 is a simple variation of scheme 3 where RN 1 (RN 2) serves RX 3 (RX 1). When $a$ is small, then coherent combining in necessary to attain $R_2=R_{\rm sym}$ and the RNs need to cooperate in transmitting message RX 2. The remaining two messages are superimposed over the codeword for $W_2$ and we thus obtain the cooperative scheme of Sec. \[sec:Partially cooperative scheme\] and of scheme 14 and scheme 15. Note that the value of $b$ only determines which RN serves which RX and no interference decoding is required at RX 1 and RX 2 apart for the case $b \approx 1$. Let’s consider now the case $R_{\rm sym}=0.5$ presented in Fig. \[fig:rate05\]. Since the symmetric rate is higher that the case depicted in Fig. \[fig:rate01\], it no longer optimal to treat the interference as noise and thus the region in which scheme 1 and scheme 2 are optimal are smaller than in Fig. \[fig:rate01\]. Schemes involving various possible interference decoding, such as scheme 4, 7, 8 and 12 emerge as optimal. Also Scheme 18, which is detailed in Sec. \[sec:Partially cooperative scheme with interference decoding\] and which involves cooperation and interference decoding, becomes optimal in a larger region around $b \approx 1$. As the rate $R_{\rm sym}$ is further increased to $R_{\rm sym}=1$ and $R_{\rm sym}=2$ in Fig. \[fig:rate1\] and \[fig:rate2\] we see that cooperation becomes more and more advantageous as it allows the RNs to apply superposition coding in order to manage the interference from simultaneous transmissions. When applying superposition coding, the receiver of the top codeword also decodes the bottom codewords. In doing so, this receiver also performs interference decoding and can thus partially remove the effect of the interference. Although costly on the access link, cooperation makes it possible to perform two superposition coding steps instead of one, and this is the key of the efficiency of schemes 14, 16, 17 and 18. Fig. \[fig:subfigureExample\] plots the overall power consumption for the optimization results in Fig. \[fig:rate01\], \[fig:rate05\], \[fig:rate1\] and \[fig:rate2\]. In all cases the largest power consumption is attained at small values of $a$: since both RNs have a link of gain $a$ toward RX 2, it is not possible to obtain a better SNR toward this node. Since the communication toward RX 2 is arduous for both receiver in this regime, cooperation is important to provide combining gains which indeed greatly reduces the power consumption form moderate values of $a$. Another regime with high power consumption for large symmetric rates is for small $a$ and around $ 0.2 < b < 0.8$: by referring to the optimization results we see that this is a transition point between scheme 14 and scheme 18. In both schemes the two relays cooperate in transmitting the codeword for $W_2$ and superimpose the messages for RX 1 and RX 3 over this codeword. The two schemes differ in that scheme 14 does not employ interference decoding at RX 1 and RX 3 while scheme 18 does. Since $b$ is relatively small, the power at which the codewords for RX 3 is received at RX 1 is not sufficiently strong to be decoded and yet too strong to be treated as noise. The same occurs at RX 3 for the interfering codeword for RX 1. The solution to this impasse is for both decoders to increase their transmitted power, so as to eventually increase the received SNR. From a high level perspective, and given the symmetry in the channel and the target rate, the SNR at both RX 1 and RX 3 scales as $P/(1+b^2 P)$ when decoding $W_2$ but treating the remaining interference as noise. Clearly an increase in $P$ increases the SNR, although very slowly. For this reason the power consumption in this region is relatively high: a high power $P$ is required to attain the SNR which grants reliable communication at rate $R_{\rm sym}$. The power consumption corresponding to the numerical optimization in Fig. \[fig:rate01\], \[fig:rate05\], \[fig:rate1\] and \[fig:rate2\] are shown in Fig. \[fig:power01\], \[fig:power05\], \[fig:power1\] and \[fig:power2\] respectively. From these figures is clear that, as the symmetric rate increases, the largest power consumption corresponds to the region $a \in [0,1]$ and $b \in [0.2 , 1]$: which corresponds to the region where the numerical optimal scheme changes from 14 to 18. In scheme 14 the codeword for $W_3$ ($W_1$) is treated as noise RX 1 (RX 3) while in scheme 18 this codeword is decoded. In this region, therefore, the large power consumption corresponds to the tension between treating the interference as noise or decoding the interference which increases as the symmetric rate increases. As we shall see, rate-splitting makes it possible to reduce the power consumption in this region by allowing partial interference cancelation. Rate-Splitting Scenario ----------------------- In this section we analyze the effect of rate-splitting on the power consumption. Since the number of schemes that can be generated using [@RiniEnergyPartI13 Th. IV.2.] in this case is quite high, it is not longer possible to analyze each scheme separately as in Sec. \[sec:No rate-splitting Scenario\]. Instead we focus on higher-level features of the transmission schemes and overall power consumption. The solution of the power minimization with rate-splitting for the case $R_{\rm sym}= 2$ is presented in Fig. \[fig:rs\_rate2\] while the legend of this figure is in Fig. \[fig:rs\_legend\]. The optimal schemes are numbered and color coded according to the level of cooperation among the RNs, in particular: - [**blue tones, numbers 1 and 2:**]{} no cooperation with either with or without rate-splitting, - [**red tones, numbers 3–5:**]{} partial cooperation schemes with some interference decoding. - [**yellow tones, numbers 6 and 7:**]{} no cooperation and interference decoding schemes. From Fig. \[fig:rs\_rate2\] it is clear that rate-splitting always provide an advantage: the schemes which do not employ rate-splitting, scheme 1 and scheme 2, are optimal mostly in the regime where $b$ is close to zero, which corresponds to the case where no interference is created at RX 1 and RX 2. As $b$ increases, rate-splitting allows for the receiver to decode part of the interfering codeword and strip it from the received signal. For value of $a<1$, the optimal scheme often involve cooperation over $W_2$: since the link toward RX 2 is relatively weak, the RNs need not cooperate in the transmission of the codeword associated to this message. As the power use to transmit this codeword combines coherently at all the RXs, it is more advantageous for all RXs to decode it, as in scheme 14 and 18 in Fig. \[fig:rate2\], and no rate-splitting is necessary. rate-splitting is instead useful in the transmission of $W_1$ and $W_3$ as it allows a RX to decode part of the interfering codeword. For the case $a>1$, cooperation is no longer necessary to transmit $W_2$ and is instead useful when sending $W_1$ or $W_3$: as for scheme 16 and 17 in Fig. \[fig:rate2\] the codeword for either message is decoded at all the receivers and acts as a base codeword to transmit the other messages while, again, rate-splitting is useful in allowing for partial cancelation of interfering codewords. The power consumption associated with the numerical optimization in Fig. \[fig:rate2\] is presented in Fig. \[fig:power2rs\] and can be compared to the non rate-splitting power consumption in Fig. \[fig:power2\]. As for Fig. \[fig:power2\], the largest power consumption is in the range $a \in [0,1]$ and $b \in [0.2 , 1]$. The difference is the two figures is the regime $a \approx 0.3$: without rate-splitting, this regime has the largest power consumption, whether with rate-splitting the power consumption in this regime is greatly reduced. Fig. \[fig:rs\_diff\] plots the power efficiency improvement of rate-splitting case with respect to the non rate-splitting case. The power improvement are relatively small for the class of channel in which a low power consumption can already be attained without rate-splitting. In the cases in which the performance of the system are more severely limited by the interference, rate-splitting attains substantial power efficiency gains. Comparison between Inner and Outer Bounds ----------------------------------------- In this section we compare the lower bound in Sec. \[sec:Lower Bounds to the Energy Efficiency\] with the upper bound in [@RiniEnergyPartI13 Sec. IV.B.]. The upper bound is evaluated through numerical optimization while the lower bound is evaluated through Monte-Carlo simulations. A plot of the upper and lower bound on the energy consumption for the channel model in Fig. \[fig:simsetup\_a\_b\] for $a=b=1$ and increasing symmetric rate $R_{\rm sym}$ is presented in Fig. \[fig:outerbound\]. This figure shows that transmission schemes involving rate-splitting provides clear energy saving over the schemes without rate-splitting, especially at high symmetric rates. Unfortunately, the gap between the best upper bound and the lower bound increases as the symmetric rate increases: the lower bound in Sec. \[sec:Lower Bounds to the Energy Efficiency\] is know to be loose for the general channel model, so the divergence between upper and lower bounds is expected. ![ Performance comparison of rate-splitting and no rate-splitting scenarios with outer bound for $R_{\rm sym} \in [1,3]$, $a = 0.7$ and $b = 0.4$. []{data-label="fig:outerbound"}](ob){width="50.00000%"} Relevance of the Results for Practical Networks ----------------------------------------------- We conclude the section by drawing insight from the numerical simulation on practical communication scenarios. The network in Fig. \[fig:simsetup\_a\_b\] well models a practical, LTE-style cellular networks in which RX 2 is a receiver located at the coverage edge among relay nodes while RX 1 and RX 3 are users served in a good network coverage area. Since RX 2 is at the edge of two cells, a reasonable scenarios would be to assume $a$ small. Also, since RX 1 and RX 3 are within the cell boundary, we expect $b$ to be small. End users operating at the edge of coverage area of two or more nodes are a common and problematic scenario in cellular networks, especially in LTE-A networks. While in GSM networks this issue was addressed by frequency reuse planning, in the predecessor of LTE-A, UMTS networks, such cases were dealt by so-called soft handovers, where the cell edge users were served by more than one cell simultaneously and selection combining was compensating for poor coverage and interference, decreasing the power consumption at each cell as well as the interference toward the users with good network coverage [@schinnenburg2003realization]. Due to architectural changes and faster scheduling demands, which limits the cooperation among the base stations, soft handover is no more an available feature in LTE [@racz2007handover], leaving the issue of users on the coverage borders an open problem. The research needed to address this problem is ongoing for future LTE releases and several possible solutions were described in this work. Solutions like fractional frequency reuse [@stolyar2008self; @lei2007novel] are being considered but are not efficient as they limit the frequency spectrum allocation and,consequently, user throughputs (although making the frequency allocation more flexible). Cooperative strategies, such as CoMP, represent the most promising way of optimizing the performance of coverage edge users. Cooperation among serving nodes is becoming feasible for the next generation of wireless networks. The new decentralized network architecture of LTE poses difficulties in cooperation taking place among multiple base stations, due to delay issues. On the other hand, the cooperation among the nodes served by a single base station is a more feasible and promising solution [@sawahashi2010coordinated]. Considering these trends, the scenario under our consideration is indeed very relevant for practical applications. From the numerical simulation of the CGRAS without rate-splitting in Sec. \[sec:No rate-splitting Scenario\], we conclude that cooperation among RNs toward the cell edge user RX 2 is optimal. In fact, regardless of the symmetric rate, in the region for small $a$ and small $b$ the optimal schemes are 14, 15 and 18 , all of which consider cooperation over $W_2$. The drawback of cooperation is the tradeoff between relay link and access link power consumption and the resource allocation. In particular, spectrum availability at the relay link may become a bottleneck in practical systems, assuming the base station also serves some end users directly. However, the common target in network planning is to minimize the coverage edge areas and for the coverage overlap among two and three cells not to exceed 30% and 10% respectively of the total covered area, making the cooperation for edge users less resource consuming from the relay link point of view. Moreover, the simulation results show it is optimal set the codeword of the edge user as a bottom codeword for superposition, which implies that it is optimal for the users in a better coverage of both relay nodes to decode the message transmitted to the edge user. Similar conclusions can be drawn from the simulation with rate-splitting: key areas where cooperation is optimal are the areas with lower parameter $a$ values in which again the codeword for RX 2 acts as a bottom codeword for superposition and is therefore decoded by the other receivers. Conclusion {#sec:Conclusion} ========== The relationship between cooperation and energy efficiency in relay-assisted downlink cellular system is studied through an information theoretical approach. We consider in particular the case in which a base station communicates to the three receivers through the aid of two relays. We allow for the base station to transmit the message of one receiver to multiple relay nodes which makes it possible for the relay nodes to partially coordinate their transmission. This scenario idealizes LTE-style cellular networks in which relay nodes are used to improve the energy efficiency of the network. We present upper and lower bounds to the overall energy consumption in this network which provide important insight on energy efficient transmission schemes for larger networks. Our results clearly show that relay cooperation is necessary in attaining a higher power efficiency along with high overall network throughput. In particular cooperation is necessary when transmitting toward users on the cell edge and which have low gain toward multiple relays. We also present a new numerical simulation tool which generates a large number of achievable rate regions based on superposition coding, rate splitting and interference decoding. With this tool we can consider a large number of transmission strategies and choose the most power efficient. The power optimization of each achievable rate region can be performed in with low complexity and thus this approach can be easily extended to larger networks. Acknowledgments {#acknowledgments .unnumbered} =============== The authors would like to thank Prof. Gerhard Kramer for the stimulating conversations and useful comments.
High
[ 0.663793103448275, 28.875, 14.625 ]
Maudlow, Montana Maudlow is a small unincorporated community in northern Gallatin County, Montana, United States. The town was a station stop on the transcontinental main line of the Chicago, Milwaukee, St. Paul and Pacific Railroad ("the Milwaukee Road"), and was a community center for a small number of area ranchers and homesteaders. Maudlow was named after a family member of Montana Railroad President, R. A. Harlow, Maud Harlow. The first postmaster of the town, George Dodge, shortened the name to Maudlow. The town is in a narrow valley alongside Sixteen Mile Creek, and near the midpoint of Sixteen Mile Canyon. The canyon, also historically known as "Montana Canyon," was considered a scenic highlight of the Milwaukee Road line. The population of Maudlow was never large, and by the late 20th century only a handful of residents remained in the area. The railroad through Maudlow was abandoned in 1980, and Maudlow is now nearly a ghost town. It is part of the Bozeman, MT Micropolitan Statistical Area. Notes Category:Unincorporated communities in Gallatin County, Montana Category:Unincorporated communities in Montana Category:Ghost towns in Montana
Mid
[ 0.621621621621621, 34.5, 21 ]
Award Winning Film Production Company The Soob Productions (Sweat On One’s Brow) is a film & TV production Company based in Great Britain that has been active in the independent UK film scene since 2006. Our objective is to produce inspirational feature films, ranging from Comedy to Drama and Thriller. Our movies, not only impact lives, inform, teach, and entertain, but also deliver great stories, breathtaking visual imaginary and a sensibility that appeals to the broadest audience possible and captures the imagination of all people regardless of age and ethnicity. The employment of ethnic actors in primary roles is also our goal. Our team comprises people from different backgrounds, cultures, and education, with different God-given gifts.
High
[ 0.685714285714285, 33, 15.125 ]
Q: react-native-animation : update state when animation color has changed I want to update the state when animation color has changed. When the animation changes from white to red, I want to update the state and display the updated state in the text label. This is my code: export default class AnimationHeader extends React.Component { constructor(props) { super(props) this.state = { scrollY:new Animated.Value(0), headerColor:'white' } } render() { const HeaderHeight = this.state.scrollY.interpolate({ inputRange: [0, 200], outputRange: [120, 120], extrapolate: 'clamp' }) const AnimateHeaderBackgroundColor = this.state.scrollY.interpolate({ inputRange: [ 70, 70 ], outputRange: [ 'transparent', 'red'], extrapolate: 'clamp' }) return ( <View style={styles.container}> <Animated.View style={{width:'100%', height:HeaderHeight, backgroundColor:AnimateHeaderBackgroundColor, alignItems:'center', justifyContent:'center'}}> <Text style={{ fontSize:30}}>Animated Header</Text> </Animated.View> <ScrollView scrollEventThrottle={16} onScroll={Animated.event([{ nativeEvent: { contentOffset: { y: this.state.scrollY } } }])} style={{width:'100%', backgroundColor:'gray'}}> <View style={{width:'100%', height:1000, backgroundColor:'blue', justifyContent:'center',alignItems:'center'}}> <Text style={{color:'white', fontSize:30}}>headerColor:</Text> //////////////////I want to display the updated state here <Text style={{color:'white', fontSize:30}}>white</Text> </View> </ScrollView> </View> ); } } A: You can listen to the value of the animation const animatedListener = this.state.animatedValue.addListener((progress) => { this.setState({ progress: progress.value }); console.log(progress.value) }); Just remember to remove the listener when done componentWillUnmount() { this.state.animatedValue.removeListener(animatedListener); //or use for many listeners this.state.animatedValue.removeAllListeners() } It is important to note that if you use userNativeDriver you will not be able to listen and always receive the initial value
Mid
[ 0.575757575757575, 30.875, 22.75 ]
Troubleshooting Second Life A note from Catherine: Because there wasn't a proper place for this at the time, it ended up here on the LSLwiki. The LSL wiki deals with how to script. The current troubleshooting resource is the SL Wiki. Most technical problems with SL can be fixed or at least explained by corrupt cache, bad drivers, overheating, bad power, or a bad network connection--usually in that order. These suggestions are intended to help you track down the specific issue you're having and hopefully resolve it. Note: most of these solutions are intended for Windows users. Most of the problems Windows users have aren't issues the Mac client has to deal with. A) My SL client is crashing! Assuming that you've rebooted your computer, try the following suggestions: Wipe your cache. The quickest and easiest way to do this is to simply delete the "cache" directory. Un-/reinstalling SL is a more drastic, and usually unnecessary, option. Check your drivers. Are you using the newest version of your video drivers, motherboard chipset drivers, BIOS, and DirectX? When you start SL, it should give you an error message if you're not up-to-date. Follow the links the error dialog box gives you. When installing a new video card driver, the best thing to do is to first download the new driver, then uninstall the old one, reboot, then install the new one and reboot again. Make sure you're using the official drivers from your video card's chipset manufacturer (usually either nVidia or ATI). OEM (original equipment manufacturer) drivers produced by the company that manufactured the card itself (Chaintech, Asus, etc.) will usually suck, as will those available from major OEMs like Dell or IBM. If you're running a desktop system with ATI video and you're using third-party drivers, such as the Omega or DNA drivers, switch back to the official ATI Catalyst ones if you can. If you're running a laptop with ATI graphics, you should first try to see if you can install ATI's official Catalyst drivers. Failing that, try either the Omega or DNA drivers. Update: This site seems to have modified Catalyst drivers that may work on your ATI-based laptop. It's my understanding that they work in the same way that Phil Metalhead's suggestion does. Are you sure you're actually running the driver you think you are? Windows can be really uncooperative at times. Check out this thread for more information on how to properly remove the Microsoft driver and install the correct nVidia or ATI one. Your connection is too slow and low-capacity for you to run SL properly. SL is intended for use with a broadband connection. You're probably crashing or freezing at the "Accept Licence Agreement" screen, right? If you used a broadband connection to get past the licence agreement, you could theoretically connect to SL, but I wouldn't expect to do things like move around or necessarily even talk to people. broadband (DSL or cable) This is good. You should check your ping times to the SL server. (Alt-1 in SL, or type "ping www.secondlife.com" at your OS's command prompt.) broadband (wireless) If you have a wireless LAN, try plugging your computer directly into the router and seeing if that helps. Some wireless networks are subject to interference. You should also check your ping times. A good Windows-based tool for determining whether or not you're getting wireless interference is NetStumbler, (try MacStumbler if you have a Mac) which allows you to see how many wireless networks are nearby. If you find that all your neighbours are on the same channel as you, try switching to a different channel. If your wireless card supports it, NetStumbler allows you to see the signal:noise ratio as well. Remember, if you have an 802.11b or 802.11g network, everything from cordless phones, to microwave ovens to Bluetooth can interfere with your LAN. "wireless dual T1" This doesn't exist. You need to find out what you're actually using. Check your bandwidth capacity and ping time. satellite (bidirectional or satellite downstream/modem upstream) Wow, that sucks. Too bad for you. It's quite possible to play SL, at least on a bidirectional connection, but the extreme latency of such a connection will make it really painful. Do other computers work on the same internet connection you're using? On the same cables and everything? Are you trying to run SL on two computers on the same internet connection? If so, what kind of hub or router are you using? Some brands are exceptionally bad at it. Does SL crash or give errors when it's the only thing running, or just when you're running other software? If so, what are they? file-sharing apps like Gnutella or BitTorrent: These are especially notorious for SL. Keep them turned off. Photoshop, Illustrator, Maya and 3DS Max, all at the same time: These are heavy-duty applications. It's unrealistic to expect that you can run them all and SL at the same time. Are you running Windows 95/98/ME? Try upgrading to Windows XP. If your computer's fast enough to run SL, it's fast enough to run XP. If you can't get XP, but you can get 98, consider upgrading to Windows 98 over either 95 or ME. They're horrible. Yes, 98 is better than ME, even though ME came out later. Note however that SL isn't officially supported on 95/98/ME. What combination of RAM are you using in your PC? If you know what you're doing inside a computer, try removing all but one memory module and seeing if that helps. (Assuming you have SDRAM or DDR SDRAM, that is. If you have RAMBUS, you likely aren't crashing in the first place.) if it turns out that one of your memory modules is causing SL or computer to crash, try running memtest86 with only that module. It may be bad RAM. Is your computer adequately cooled? Download a CPU temperature monitor like Motherboard Monitor. Also, make sure that your CPU isn't radically overclocked. Get WCPUID to check. If your computer's only crashing when it's been turned on and running SL or a similarly video/CPU/memory-intensive application or game, it's possible that it's overheating. If your computer room is very hot, try waiting until it cools down before you connect. Is your computer's power good? Check the voltages Motherboard Monitor gives you. What capacity is your power supply, and how old is it? How many devices do you have hooked up to it? A 300W power supply with four hard drives and a GeForce FX 5950 Ultra is not going to work very well. When did your problem start happening? If the answer is, "when a new version of SL was released" or "when I got my new video card", that can be helpful in tracking down the problem. How much free disk space do you have? You should ideally have a couple gigabytes on the disk your pagefile's on, as well as the C: drive if your pagefile's on another drive. (Second Life doesn't let you specify the location of the cache files yet.) If you don't have enough disk space, it can cause SL to give you errors when trying to create or access the cache. It's unlikely, but possible that your computer has a virus or trojan that's contributing to an existing problem, or even causing your problems with SL in the first place. I recommend Trend Micro's free virus scanner and Lavasoft's Ad-Aware for dealing with viruses and spyware, respectively. Some spyware apps are notorious for affecting system stability and performance. Are you using any third-party desktop extensions or multi-monitor stuff? Stop it. If you have local lighting or bump mapping turned on in Preferences, turn them off. You don't need that stuff anyway. Note that this is more a performance tip, but there are still potentially crash issues related to them. B) Why is everything black? I can only see a few things. You're probably using a very old graphics card, or a new card with very old drivers (especially ATI users). In Start -> Settings -> Control Panel -> Display -> Settings, make sure you're using 32-bit colour depth. SL won't work in 16-bit. If you've been able to get into SL before and now it's suddenly all black, this is what's likely causing it. Make sure you are using the latest graphics card and mainboard (AGP) drivers (see "Check your drivers" above). If you can see the menus and controls, but not the world, it's possible that it's "night" in SL and your computer's brightness settings are set incorrectly. You can change SL's brightness in Edit -> Preferences -> Display -> Gamma. C) SL runs really slowly! What gives? SL is a very CPU-intensive program. If you don't have a really fast CPU, it won't run very quickly. Even the very fastest CPUs available run SL slower than you might think. Because SL is CPU-bound, your CPU and memory bandwidth tend to be the most important parts. Having a good video card is less important than having a really fast CPU. If you have local lighting or bump mapping turned on in Preferences, turn them off. You don't need that stuff anyway. Note that this is more a performance tip, but there are still potentially crash issues related to them. Switching off ripple water also helps, as well as reducing the terrain detail. If you're running other software, turn it off. Did that help? If it was an application like Photoshop, how much RAM do you have? If it's less than 1GB, you may find that you don't want to run it and SL with less than 1GB of system RAM. If it was a filesharing application like Bittorrent, Emule, or Gnutella, it's possible you don't have enough bandwidth to use SL at the same time. If your filesharing software supports it, use a bandwidth limiter while running SL. In Preferences, turn down your draw distance. Default is 128m, which works best for most people. Also in Preferences, reduce the bandwith used for SL. Things will load more slowly, but as the client won't be as busy with processing all the incoming data, it will have more time for other tasks like rendering. D) I can't connect! Reboot your computer. Does Sl say it can't resolve the userserver? It's possible you have a minor problem with your DNS. Try connecting again. Does SL say you need a valid Certificate Authority File? That means your computer's clock is likely off by a couple years. Set it to the proper time and SL will be able to connect. Other applications may also be affected by this problem, so it's good to keep current. Make sure you can actually connect to the SL website in your web browser. What time is it? If it's nighttime, PST, check the New in Second Life" forum. If there's a bunch of messages along the lines of "Is the grid down?", "SL is down", "I can't connect", etc., it usually means that something has failed. The Lindens will have been paged, but as they generally prefer to sleep at night, they may not respond as quickly as you might prefer. Are you having trouble connecting to other websites? The problem is likely with your entire network connection. Open a console prompt. (Use your OS's Help files to find out how to do that.) Can you ping login.agni.lindenlab.com? If not, there's something wrong with your network. Assuming everything has checked out fine so far, you may need to open some ports on your firewall. If you've previously been able to connect, but now can't, and you haven't changed anything in your network configuration or setup, you can generally disregard this suggetion. If not, read on: SL currently uses the IP ranges of 66.150.244.0/23 (all IP addresses from 66.150.244.0 to 66.150.245.255), 69.25.104.0/23, and 72.5.12.0 - 72.5.15.255, on ports 12020 - 13050. If that port range is too large, you can safely limit it to ports 12020 - 12050 and 13000 - 13050. In practice, just opening all ports on the SL IP range is probably the best idea. E) General advice Run Windows Update. Yes it's annoying, slow, painful, you might have to reboot your computer several times and it sends your pirated Windows serial number to Microsoft. Do it anyways, it will ensure that your Windows has the latest security fixes, drivers and will also offer you the most recent version of DirectX. Install everything in Critical Updates and Service Packs and also everything in Drivers, with the exception of the graphics driver, which you should get from the chip manufacturer, as described above. In the Windows section you should download DirectX, if a newer version is offered. Repeat this about once per month. Use a virus scanner. There are several free ones available, for example AntiVir. Make sure you run it's auto-update about once a week, so it can find the latest uninvited guests. Strange things and unexplained crashes can often be caused by a virus/worm infection. If you don't want to have a permanently running virus scanner, you should at least use an emergency tool like Stinger once in a while. It only scans for the most recent cases though.
Low
[ 0.50313152400835, 30.125, 29.75 ]
[package] name = "ch1-race" version = "0.1.0" authors = ["Tim McNamara <[email protected]>"] edition = "2018" # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html [dependencies]
Low
[ 0.400966183574879, 20.75, 31 ]
CNU's Morrast energized under new assistant Faragalli Christopher Newport quarterback Marcus Morrast did little research on new assistant coach Mike Faragalli, but saw enough in their brief time together to be impressed. "He's got a lot of championship rings," Morrast said, "which is very encouraging for our program." Indeed, the well-traveled Faragalli has been on a handful of championship staffs, among them the Hamilton Tiger-Cats of the Canadian Football League and the University of Richmond's 2008 FCS title team. CNU's new quarterbacks coach and primary play caller brings 30 years of professional and Division I experience. Though he said he's simply trying to fit in and help the passing game, his impact is evident, even in just the first few days of preseason camp. "They know of his experience and they respect it," Captains head coach Matt Kelchner said. "They can see it's a very advanced level of football knowledge with Mike Faragalli and they understand that, they see it." Faragalli, who assisted CIAA North Division champ Virginia State last season, took up Kelchner on his offer last winter to replace the late Ed Davis as quarterbacks coach and play caller. He came on board last spring and spent the past several months familiarizing himself with coordinator Dan Antolik's offense, the program and the players. "I respect everything that I saw when I got here," Faragalli said. "I'm just trying to help as best I can, tweak a few things here and there, especially in the passing game, as far as the concepts and how we're attacking." Faragalli has a veteran to work with in Morrast, a senior entering his third year as the starter. He's the ringleader of an offense that returns nine starters and several more experienced players from a team that finished 8-2 last season. Morrast, a dual-threat quarterback, passed and ran for more than 1,600 yards and scored 13 touchdowns last season. "Marcus is really smart, as far as picking things up, reading coverages, knowing what the defense is doing," Faragalli said. "He's a very coachable guy. Eager to learn, learn new things. Put it to work on the field. That part's been a pleasant surprise, as far as being a fourth-year player and you ask a kid to do some new things, it's not easy sometimes." But Morrast said that he and the offense are energized by Faragalli's teachings. He said the terminology is a little different and often simpler. He said that Faragalli has introduced some new concepts to the passing game, such as incorporating running backs more often and plays designed to spread the field, from sideline to sideline. Faragalli's emphasis with Morrast thus far is some of the finer points of quarterback technique: pre-snap and post-snap reads; footwork; quicker release on certain throws; head and eye discipline. "He pretty much has the arm strength to make all the throws," Faragalli said. "Now, it's just a matter of repetition and becoming as accurate as you can be prior to the first game. It's working on consistency at this point." Morrast throws a nice deep ball, but Kelchner said that he'd like his quarterback to be more accurate in the short-to-medium passing game. He completed just 52 percent of his passes last season, though he threw only three interceptions. But asked if he had statistical goals for Morrast, Kelchner responded: "Ten-and-oh, that's my statistical goal. He could be a 40-percent passer (but) if we win 'em all, he's OK with me. I don't pay much attention to that. If he throws an accurate ball that's catchable and a kid can advance, that's what I want to see." Morrast said that he needs to improve at identifying passing lanes, because at 5-foot-10, he can't always see over linemen. Individual statistics mean little to him, as well. "I haven't really thought too much about it," he said. "I've never been one to think about stats. As long as I do my job, the stats will come. That's how I feel. It can either be a good play or a bad play. If you have more good than bad, the stats will come." Morrast's only statistical goal this season: play all 10 regular-season games. He missed one game last season and wasn't himself in a couple others. He injured his right (throwing) shoulder versus Shenandoah, then aggravated it again the following week in a loss to Methodist. He sat out the following game and then was only a shell of himself in a loss to Maryville, when he had only one official carry. He said the shoulder injury made him apprehensive about running for several weeks, which negated one of his assets. He is an effective, instinctual rusher with the ability to extend plays and evade defenders. He began his career at CNU as a running back and was moved to quarterback midway through the 2012 season. He threw well enough, and his running ability added another dimension to the offense. Though Morrast is the only experienced quarterback on the roster, that won't alter his approach. "I think I'm just going to go out and play my game," he said. "I don't plan on getting hurt. I plan on being a little safer this year." Faragalli looks forward to working with Morrast and seeing how far he can take the offense. Morrast, an even-keel presence, conducts himself like an upperclassman and three-year starter. "I feel very comfortable with my offense," Morrast said. "I feel comfortable more this year telling them what to do, instead of letting some stuff slide in practice. I feel more in charge, and I think the guys know that as long as they protect me and I play well, I think we can go really far."
Mid
[ 0.579881656804733, 36.75, 26.625 ]
Gmail.com redesign leaks, looks pretty incredible - aylons https://arstechnica.com/gadgets/2018/04/gmail-com-redesign-leaks-looks-pretty-incredible/ ====== aylons This is much better than I expected: it seems to be cleaner but to keep (and maybe even increase!) information density, at least on the main pages.
Mid
[ 0.645255474452554, 27.625, 15.1875 ]
/** * Copyright (c) Facebook, Inc. and its affiliates. * * This source code is licensed under the MIT license found in the * LICENSE file in the root directory of this source tree. * * @format * @emails oncall+react_native */ 'use strict'; describe('infoLog', () => { const infoLog = require('../infoLog'); it('logs messages to the console', () => { console.log = jest.fn(); infoLog('This is a log message'); expect(console.log).toHaveBeenCalledWith('This is a log message'); }); it('logs messages with multiple arguments to the console', () => { console.log = jest.fn(); const data = 'log'; infoLog('This is a', data, 'message'); expect(console.log).toHaveBeenCalledWith('This is a', 'log', 'message'); }); });
Low
[ 0.48268398268398205, 27.875, 29.875 ]
24 January, 2017 Yet, it has taken me a very long time. And, I got there by a very unusual route... I had been interested, from the first contact with it as a University student, and slowly built up an extensive library of Marxist works, ever since my first involvement, and have since spent my whole adult life in professedly Marxist-committed parties, or at the very least as an active and trenchant supporter - but I didn't get either educated, or even trained, in any one of those organisations. I come from a working class family, resident in a major industrial city - Manchester, in the North of England, in which my dad was an unskilled labourer, and my mam a sewing-machinist: but, somehow, I got an education, and ended up as a physicist and teacher. I did, briefly, make a real difference, politically, when still a very young man, as I worked almost exclusively among working class youth, on the same kind of Council House Estates, on which I had lived and grown up, but, very soon I was outnumbered-and-outargued in the parties to which I belonged, by middle class "intellectuals". From being a leader I was soon relegated to being the always-available working class activist, to send in, where the middle class certainly could not productively venture, and indeed, feared to tread! And, my commitment to becoming a Marxist, though undiminished, never found any teachers either willing, or even able, to take me forward - and, I don't just mean in my chosen discipline - Physics. Indeed, though I met fairly able Marxist Economists, I never met a single Marxist Philosopher, any Marxist Mathematicians, or Marxist Scientists whatsoever. Now, I had first got into revolutionary politics for a very unusual reason. I had been totally disgusted in my very first term at University, when presented with the Copenhagenist drivel (that was then, and still is, the current-received-wisdom) being dispensed by my professors and lecturers. My puzzled questions only elicited ridicule, both from both my tutors, and even my fellow students. But I was, certainly in the right place, and made lifelong friends - one of whom recommended me to read Lenin's Materialism and Empirio Criticism. (He was, by the way, a fellow student, studying, of all things, English Literature). And on reading this, my first Marxist book, I immediately realised that Lenin had the answer to the decline in Physics. His chosen opponents in the book were the famous physicists Henri Poincaré and Ernst Mach, who were the immediate theoretical predecessors of the Copenhagenists who later came to totally dominate Physics. So, I began to read Marx, and then Engels, but I clearly needed help. The politics was easy to understand coming from my background, but the philosophy, most certainly was not! Indeed, it was clear that Marx was preoccupied with using the newly established Dialectical Materialism in tackling Capitalist Economics, and it was left to his colleague Engels, to "describe" that stance's detailed Nature and Methodology. And, though he did a great job upon materialist Holism, he was by no means, the dialectician that Marx certainly was. Indeed, Engels "found" Dialectics everywhere in Nature, but NOT as its driving fornce, but rather as a kind of set of properties. It wasn't enough! Nevertheless, pamphlets like "The Part Played by Labour in the Transition from Ape to Man", were indeed brilliant. I discussed Lenin's book with my colleagues, in my then Party, but they were absolutely no help, and they even began to get annoyed. "Pack in this Physics stuff! It's an excuse - a diversion from the real work!" But, they were wrong. I had no trouble relating to working class youth: after all, I was one of them! In fact, I was pretty successful working with such people. Any new target area that was decided upon, in my branch, would always involve sending me into the fray. Clearly, my concerns with Physics Theory could play no role there, it never got addressed - ever! So, my working life as a Mathematics and Science teacher, was separated from my work in political activities, to the real detriment of both. I began to make real gains as a teacher, and had a successful career, which took me from a Middle school, teaching 11 year olds, by stages and changes of job and disciplines, until I finally got a series of posts in Universities. The separation was remarkable, as when working in Glasgow, I would spend my daytime assisting post-graduate researchers, by writing tailor-made computer programs to aid in their researches: while in the evenings, I'd be teaching unemployed working class youth Computing in a converted warehouse. But, crucially, it was in my professional daytime work that I, all by myself, made significant progress, philosophically, when designing multimedia aids along with a dance expert colleague, to crack an important problem in using film and video footage in the teaching of Dance Performance and Choreography. The old Paradoxes of Zeno, in addressing Movement, were finally integrated via Hegel's Dialectics, and, I began to put together my interpretation of what Marx had been implictly using, throughout, in creating Das Kapital. And, my original problem with the ill-famed Copenhagen Interpretation of Quantum Theory, could now, potentionally at least, be tackled and resolved! I returned to Hegel - to review his vital criticisms of Formal Logic, his identification of Dichotomous Pairs of contradictory concepts - occurring frequently at non-transcendable rational impasses, and his recourse to holist, "dialectical" means to correct mistaken premises and begin to establish his Dialectical Logic. And, as an "aspirant-and-intended" Marxist, AND a competent physicist, I began to tackle the key 20th century developments in Physics, which had led to Copenhagen. The first requirement was obvious: it had to be the addressing of the crucially important Double Slit Experiments. Using the very methods I had unearthed in cracking Movement Studies, I addressed the assumed premises of the Double Slit Experiments, and realised, not so much a flaw, as a crucial omission. The inclusion of some kind of Universal Substrate, theoretically, at least, resolved every-single-one of the anomalies of these Experiments. The Wave/Particle Duality resolved-itself into a classic Dichotomous Pair, and was explained away by a dialectical, recursive relationship between moving particles and an affect-able and affecting Substrate. Initially, of course, it was, indeed, a purely theoretical solution! But, the same approach led to further theoretical successes, in defining the concrete nature of such a substrate, endowing it, not only with the necessary properties to deliver all required functionalities: but also explaining its undetectability. NOTE: Also full experimental credit must be given to the French physicist, Yves Couder, whose "Walker" Expedriments - using only a silicone-oil-substrate and energy, enabled him to create his Walker entities, and even show how they could be made to move in "quantized orbits" - far from the confines of Sub Atomic Copenhagenism. After decades incorrectly claiming to be a Marxist, I had finally made the grade. But, notice, in that important process, I didn't even mention political activities. What I had achieved was purely philosophical! Marxism is after all a Philosophy. So, instead of deciding political activities by means of precedent, which is what all the professed Marxists I knew did, the practising Marxist, as I now appeared to be, was able to use Marx's methods, and NOT only his past experiences and solutions, to analyse situations afresh, as they are now, and also in every possible field. To be a Marxist, you have to be a practising Marxist Philosopher! Understanding, and then using, Marx's Philosophy was absolutely vital. Without it, you had to depend upon the past experiences of others: and that just isn't good enough. Having made these conclusions I returned to accessing all the usual supposed sources of Marxist analysis currently available, and their uniform lack of a Full Dialectical Materialist Method was immediately evident. The supposed "Use of Dialectics" boiled down to the usual tenets of Thesis-Antithesis-Synthesis, Extremes Meet, and the Driving of Change by the interaction of opposites - employed by the activists, OR, the "Back-to-Hegel Dialectics" of theorists like Žižek. The inadequacies, of them all, have been tragically exposed by events like the Brexit result in the UK Referendum and the Trump victory in the US Presidential Election. "A plague on both their houses", is not Marxism. When the Left fails utterly, Populism tragically triumphs! We need the philosophy of dialectical materialism now more than ever. So, the answer to the question posed in this article's title:- "What is left of "Marxism?" has to be Marxism! And the time to start using it is now... 11 January, 2017 This issue presents a collection of papers on Slavoj Žižek’s The Limits of Hegel from his book Less Than Nothing. The introductory papers are important here, because without them the different stances of both Žižek and this critic would not be understood. Jim Schofield, the author, feels that the various philosophic stances of both Holism and Plurality, and Hegelian Dialectics versus Marx’s Dialectical Materialism, would simply be confused by Žižek’s Limits of Hegel piece, either taken alone, or with a comprehensive criticism by Schofield. The deterioration of Marxism has proceeded long- and-variously over the last century, to have left literally no-one with the wherewithal to “do a Marx” upon this “professed” Marxist, who casts a long Hegelian shadow over Dialectical Materialism. A reasonable amount of ground must be attempted to be established, and a “quote-all-with-commentary” method of dealing with Žižek’s offering, along with three preparatory papers, constitute his attempt to deliver as much as possible. “Why”, you may justifiably ask, “is this amount of effort necessary?” It is because the World Working Class are entering the most dangerous period in almost a century, and are doing so without the real Marxist leadership it needs. 09 January, 2017 As we move into the 10th miserable year of this global slump, we must reject the suffering imposed upon ordinary workingpeople, and the LIES of those who caused it, those who now expect US to pay for their greed, while they continue to extend the gap between their increasing Wealth and our ever-growing Poverty. We didn't spend centuries fighting for and winning adequate Social Provision across the State for all the services that it should provide for its People, only to see them now vastly reduced, and even successively dismantled into yet another Privatisationwhile the perpetrators, themselves, talk out of the other side of their lying mouths about concern and increased provision plans. About Me I am a retired lecturer and full-time writer. As the truth of Science has been my major concern throughout my life, I cannot conceive of teaching it in an uncritical, passive way. It's truth or error is THE question, and its improvement must be my main purpose. Teaching for me is Philosophy, and that means taking a stand on all sorts of issues, not sitting on the fence!
Mid
[ 0.54697286012526, 32.75, 27.125 ]
The invention refers to a method and to an apparatus for encoding eye movement and eye tracking data. In particular the invention refers to the encoding of eye movement and eye tracking data for gaze contingent control within a man machine interaction. The gaze contingency by means of the present invention shall be applied for example to the field of user-dependent eye movement controlled processes within technical apparatus such as machines, devices, computers, equipments, vehicles etc. From the prior art there are known methods and apparatus for capturing eye movement and eye tracking data from persons in order to display the so-called raw data scanpath, i.e. the time course of gaze, representing the movement of the eyes or visual behavior of the person when viewing pictorial presentations, e.g. photos, advertisement posters or a dynamic scene, e.g. a situation while driving a car, watching a film etc. Usually, eye movement and eye tracking data are captured by using an eye tracking device, a so-called eye-tracker. Such a method and such an eye tracking device is disclosed e.g. in WO 99/18842 A1. There is described a data evaluation by which typical eye movement patterns can be recognized. Another method from the prior art known is disclosed e.g. in U.S. RE 40014 E1. The known eye trackers provide time-resolved position data of the head and of the eyes of a test person/subject. There can be determined from these data, the time-resolved intersections of the line of sight of the viewer with the objects of static or dynamic scene, such as those arising when looking at a poster, an advert, the control panel of a machine (e.g. car or airplane cockpit), the display of a computer, etc. For this purpose, the position data of the head and the eyes of the viewer are determined at a relatively high sampling rate or frequency of up to 2000 Hz or more. For the recording of data, there are usually various techniques available. For a wide range of applications, the most suitable technique, as being minimally invasive and therefore not burdensome to the subject or restrictive, is the video-based recording of the head of the subject at two different angles in the range of infrared light and a subsequent image processing, calculating from the image data in combination with geometry data of the experimental setting the position data of the head and the eyes. From the image analysis, after a prior calibration, the head position and iris/pupil positions can be determined. This determination is often carried out in real-time and is performed by software being supplied by the manufacturer of the eye tracker. The data having this format, however, cannot be interpreted or understood by an end user, such as a psychologist who studies the scheme or visual behavior of watching a commercial. Therefore there is a need to process the data in an end-user friendly representation. Usually the classification and interpretation of the data is performed by a decomposition of the recorded time series into fixations (cluster of viewpoints) and ballistic movements/jumps (saccades), where from a (cognitive) psychological perspective the fixations are of interest and the saccades are interesting in respect of the basic physiological processes. However, the computational methods and algorithms which are well-known for this purpose, are based on an evaluation of the viewpoints according to their spatial dispersion and/or to their velocity or acceleration. The algorithms require a parameterization done by the end user or default settings for the parameters done by the manufacturer which cover a wide application range, thereby becoming too imprecise for being used for specific applications, since the choice of parameterization can significantly affect the results of the algorithm. Further, the parameters are partly subjected to individual variations, referring to the subject or to a group of subjects, and/or are dependent on the tasks which are given for running the experiment. Therefore, in the known calculation methods and algorithms, the end user must have experience in the choice of parameters, which in practice is rarely the case, or he must rely on an approximate parameterization (“rule of thumb”). The known calculation methods or algorithms are not designed for the analysis of dynamic scenes where the viewer follows moving objects with his eyes. The separation of another kind of eye movement, the so-called smooth pursuit, as it occurs when watching dynamic scenes, is currently regarded as being difficult and has not yet been satisfactorily solved.
High
[ 0.6649616368286441, 32.5, 16.375 ]
Pupils from the Zielona Góra school scooped last year’s prize. /Facebook A high school from Zielona Góra is bidding to make it two wins in a row in an international competition in which pupils run their own businesses. Students from the 1st High School E. Dembowski in Zielona Góra, led by their teacher Ewa Krzywicka, have reached the Polish finals of the ‘Company of the Year Competition’, an even organised by JA (Junior Achievement) Worldwide, a foundation that prepares young people for employment and entrepreneurship. If they win they will follow in the triumphant footsteps of their colleagues from the year before who won first prize and qualified for the grand European final. Last year the school won with its So!Socks company, which offers a variety of socks adorned with anything from pandas to the Venus de Milo, but this year the entrepreneurial children are going for glory with Take and Tie, a shoelace producer. In the company pupils are given specific roles from CEO to head of marketing and website designer. The first place in the Polish competition allowed the pupils to compete in the grand international finale.Sosocks Instagram “Everyone deals with something else,” Tamara Murzyńska, marketing director for Take and Tie, told TFN. “We have a marketing, management and accounting section. Accountants make sure everything is in line with the papers. Marketing deals with promotion, but also market research.” Their laces have found their way onto footwear all around the world. The popularity of their colourful and imaginative designs has captured the attention of social media users who are now photographing themselves wearing the product in front of recognisable landmarks and posting them online. Ewa Krzywicka has been organising teams in the event since 2010. The first student company was KLiK, a photocopying service. Since then the companies have become more professional and more ambitious, and she believes the secret to the recent success is hard work and having an open mind. This year the school’s hopes are resting on shoelaces. Take and tie Instagram “I think that every success is a reason to be happy, but it also motivates me to keep working and keep doing what I'm doing and that is helping young people get to know the world of modern business,” Krzywicka told TFN. “Even participation of my students' company in the finale in Warsaw is already a great achievement, not for me, but for them. Experience is the most important, and they will never have a better chance to gain it than in this competition.” The story of So!Socks reflects this. “We sell our products to foreign countries thanks to contacts made during our international camps, trips or the JA competition,” Barbara Chrześijańska, brand owner of So!Socks, told TFN. “Our socks have appeared in Singapore, Canada, Mexico, the USA, the UK, France, Germany, Ukraine, Israel and more. We have recently being contacted by Hamburg’s Pride March, which is interested in buying socks designed by our team, which is very exciting.”
High
[ 0.672941176470588, 35.75, 17.375 ]
it looks awesome almost nobody comments on this post i don’t get why by the way the stance of elemental ike reminds me of the stance of the mercenary’s of the fire emblem games on the GBA rlly cool i still need to test it though i have to say he looks way too overpowered in the vid
Low
[ 0.48526522593320204, 30.875, 32.75 ]
Q: Execute a jquery function in chrome's console on a loaded web page I want to write a custom jquery function on a file, and then open any website in chrome , click on inspect element, go to console, and there i want to execute my jquery function. How should i do to call the function from the file instead of writing it directly in the console ? (assume that the loaded web page is already supporting jquery) A: Create a bookmarklet of it! Since you can use javascript: in URLs, you can create run-anywhere snippets of code you can call simply by clicking on the bookmark. My favorite pattern would be javascript: (function() { ... })(); Stick the bookmark in your toolbar for easy access. Nettuts has an excellent how-to on creating a basic bookmarklet.
High
[ 0.7038834951456311, 36.25, 15.25 ]
Q: redirict with javascript or php to gmail.com when hit the submit button I've this form: <form id="form1" name="form1" method="post" action="http://gmail.com" onsubmit="setTimeout(function () { window.location.reload(); }, 10)"> <div class="form-group"> <label for="email">E-mailadres</label> <input type="email" name="email" class="form-control" id="email"> </div> <input type="submit" value="verzenden" class="btn btn- primary" /> </form> I want that if someone clicks on the button, he/she will redirect to gmail.com I try target blank, but it doesn't work, does someone know a good manner to redirect with javascript or php? EDIT: I want that if someone hit the button he/she will redirect to a new tab. A: I agree that this scenario is a bit strange as I have no idea what you're actually trying to accomplish but, if you just want to open gmail.com in a new window when the form is submitted, this should suffice: <form onsubmit="window.open('http://gmail.com')"> <div class="form-group"> <label for="email">E-mailadres</label> <input type="email" name="email" class="form-control" id="email"> </div> <input type="submit" value="verzenden" class="btn btn- primary" /> </form>
Low
[ 0.518279569892473, 30.125, 28 ]
# Container 技能图谱 ## 容器化工具 - [Docker](https://www.docker.com/) - [LXC](https://linuxcontainers.org/) - [RunC](https://github.com/opencontainers/runc) - [Rkt](https://github.com/coreos/rkt) - [Systemd-nspawn](www.freedesktop.org/wiki/Software/systemd/) - [Garden](https://github.com/cloudfoundry/garden) - [Vagga](https://github.com/tailhook/vagga) - [VMWare Photon](https://github.com/vmware/photon) - [gVisor](https://gvisor.dev) - [Pouch Container](https://pouchcontainer.io) - [Kata Containers](https://katacontainers.io) ## 监控和数据收集 - [Sysdig Monitor](https://sysdig.com/products/monitor) - [cAdvisor](https://github.com/google/cadvisor) - [Weave Scope](https://www.weave.works/oss/scope/) - [Prometheus](https://github.com/prometheus) - [TICK-Stack](https://influxdata.com) - [Docker-Alertd](https://github.com/deltaskelta/docker-alertd) - [Grafana](https://grafana.com) - [Cockpit](http://cockpit-project.org) ## 基础设施集成 - [Magnum](https://github.com/openstack/magnum) - [Boot2Docker](https://github.com/boot2docker/boot2docker) - [MaestroNG](https://github.com/signalfuse/maestro-ng) - [CloudFoundry Containers Service Broker](https://github.com/cf-platform-eng/cf-containers-broker) ## 编排和调度 - [Crane](https://github.com/michaelsauter/crane) - [Mesos](http://mesos.apache.org/) - [Marathon](https://github.com/mesosphere/marathon) - [Compose](https://docs.docker.com/compose/) - [Yarn](https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html) - [Kubernetes](https://github.com/kubernetes/kubernetes) - [Openshift Origin](https://github.com/openshift/origin) - [Rancher](http://www.rancher.io) - [K3s](https://k3s.io/) - [Nomad](https://github.com/hashicorp/nomad) - [SwarmKit](https://github.com/docker/swarmkit) - [Nebula](https://github.com/nebula-orchestrator) - [Dokku](https://github.com/progrium/dokku/) - [Flynn](http://Flynn.io) ## 商业平台 - [AWS Container Service](https://aws.amazon.com/ecs/details/) - [Google Container Engine](https://cloud.google.com/container-engine/) - [Azure Container Service](https://docs.microsoft.com/en-us/azure/container-service) - [阿里云容器服务](https://www.aliyun.com/product/containerservice) - [腾讯云容器服务](https://cloud.tencent.com/product/tke) - [华为云容器引擎](https://support.huaweicloud.com/cce/index.html) ## 容器镜像仓库 - [Repository](https://github.com/docker/distribution) - [Nexus](http://www.sonatype.org/nexus) - [Habor](http://vmware.github.io/harbor) - [Portus](https://github.com/SUSE/Portus) - [Dragonfly](https://github.com/alibaba/Dragonfly) ## 服务发现和容器 - [Consul](http://www.consul.io/) - [Etcd](https://github.com/coreos/etcd) - [ZooKeeper](https://zookeeper.apache.org/) - [Eureka](https://github.com/Netflix/eureka) - [Traefik](https://traefik.io) - [Registrator](https://github.com/gliderlabs/registrator) ## 容器日志收集处理 - [Splunk](www.splunk.com) - [Elastic Stack](https://www.elastic.co/products) - [Fluentd](www.fluentd.org/) - [Flume](https://flume.apache.org/) - [Graylog](https://www.graylog.org/products/open-source) - [Rsyslog](https://www.rsyslog.com/) ## 容器相关的系统发行版 - [Container Linux (CoreOS)](http://coreos.com/) - [Project Atomic](http://www.projectatomic.io/) - [RancherOS](https://rancher.com/rancher-os/) - [ClearLinux](https://clearlinux.org/) - [VMWare Photon](https://vmware.github.io/photon/) - [Talos](https://github.com/talos-systems/talos) - [k3os](https://k3os.io/) - [LinuxKit](https://github.com/linuxkit/kubernetes) - [SmartOS](https://www.joyent.com/smartos) ## 容器网络 - [Pipework](https://github.com/jpetazzo/pipework) - [Flannel](https://github.com/coreos/flannel) - [Calico](http://www.projectcalico.org) - [Weave](https://github.com/zettio/weave) - [Kubenet](https://www.kubenet.net) - [Contiv](https://contiv.io) - [OpenContrail](www.opencontrail.org) - [MacVlan](https://docs.docker.com/network/macvlan) - [Canal](https://github.com/projectcalico/canal) - [Romana](http://romana.io) - [Submariner](https://submariner.io/) ## 容器安全 - [Anchore Engine](https://anchore.com/engine) - [Aqua Microscanner](https://github.com/aquasecurity/microscanner) - [Clair](https://github.com/coreos/clair) - [Dagda](https://github.com/eliasgranderubio/dagda) - [Twistlock](https://www.twistlock.com/platform/vulnerability-management-tools/) - [OpenSCAP](https://www.open-scap.org) - [Notary](https://github.com/docker/notary) - [Twistlock](https://www.twistlock.com) - [SELinux](https://selinuxproject.org) - [AppArmor](http://wiki.apparmor.net/index.php/Main_Page) ## 容器数据持久化 - [Ceph](http://ceph.com/) - [Convoy](https://github.com/rancher/convoy) - [REX-Ray](https://github.com/codedellemc/rexray) - [Netshare](https://github.com/ContainX/docker-volume-netshare) - [OpenStorage](https://github.com/libopenstorage/openstorage) ## 容器相关标准 - [OCI Runtime Spec](https://github.com/opencontainers/runtime-spec) - [OCI Image Spec](https://github.com/opencontainers/image-spec) - [OCI Distribution Spec](https://github.com/opencontainers/distribution-spec) - [Container Network Interface](https://github.com/containernetworking/cni) - [Container Storage Interface](https://github.com/container-storage-interface/spec)
High
[ 0.862164662349676, 14.5625, 2.328125 ]
/* * Copyright (C) 2008 Apple Inc. All Rights Reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ // FIXME: On Windows, we require all WebKit source files to include config.h // before including any other files. Failing to include config.h will leave // USE_CF undefined, causing build failures in this // file. But Mac doesn't have a config.h for WebKit, so we can't include the // Windows one here. For now we can just define USE_CF and // USE_CFNETWORK manually, but we need a better long-term solution. #ifndef USE_CF #define USE_CF 1 #endif #include <wtf/Platform.h> #if PLATFORM(WIN) #ifndef USE_CG #define USE_CG 1 #endif #endif // NOTE: These need to appear up top, as they declare macros // used in the JS and WTF headers. #include <runtime/JSExportMacros.h> #include <wtf/ExportMacros.h> #include "WebInspectorClient.h" #include <CoreFoundation/CoreFoundation.h> #include <WebCore/Frame.h> #include <WebCore/InspectorFrontendClientLocal.h> #include <WebCore/Page.h> #include <wtf/RetainPtr.h> #include <wtf/Vector.h> #include <wtf/text/WTFString.h> using namespace WebCore; static const char* inspectorStartsAttachedSetting = "inspectorStartsAttached"; static const char* inspectorAttachDisabledSetting = "inspectorAttachDisabled"; static inline RetainPtr<CFStringRef> createKeyForPreferences(const String& key) { return adoptCF(CFStringCreateWithFormat(0, 0, CFSTR("WebKit Web Inspector Setting - %@"), key.createCFString().get())); } static void populateSetting(const String& key, String* setting) { RetainPtr<CFStringRef> preferencesKey = createKeyForPreferences(key); RetainPtr<CFPropertyListRef> value = adoptCF(CFPreferencesCopyAppValue(preferencesKey.get(), kCFPreferencesCurrentApplication)); if (!value) return; CFTypeID type = CFGetTypeID(value.get()); if (type == CFStringGetTypeID()) *setting = static_cast<String>(static_cast<CFStringRef>(value.get())); else if (type == CFBooleanGetTypeID()) *setting = static_cast<bool>(CFBooleanGetValue(static_cast<CFBooleanRef>(value.get()))) ? "true" : "false"; else *setting = emptyString(); } static void storeSetting(const String& key, const String& setting) { CFPreferencesSetAppValue(createKeyForPreferences(key).get(), setting.createCFString().get(), kCFPreferencesCurrentApplication); } bool WebInspectorClient::sendMessageToFrontend(const String& message) { return doDispatchMessageOnFrontendPage(m_frontendPage, message); } bool WebInspectorClient::inspectorAttachDisabled() { String value; populateSetting(inspectorAttachDisabledSetting, &value); if (value.isEmpty()) return false; return value == "true"; } void WebInspectorClient::setInspectorAttachDisabled(bool disabled) { storeSetting(inspectorAttachDisabledSetting, disabled ? "true" : "false"); } bool WebInspectorClient::inspectorStartsAttached() { String value; populateSetting(inspectorStartsAttachedSetting, &value); if (value.isEmpty()) return true; return value == "true"; } void WebInspectorClient::setInspectorStartsAttached(bool attached) { storeSetting(inspectorStartsAttachedSetting, attached ? "true" : "false"); } std::unique_ptr<WebCore::InspectorFrontendClientLocal::Settings> WebInspectorClient::createFrontendSettings() { class InspectorFrontendSettingsCF : public WebCore::InspectorFrontendClientLocal::Settings { public: virtual ~InspectorFrontendSettingsCF() { } virtual String getProperty(const String& name) { String value; populateSetting(name, &value); return value; } virtual void setProperty(const String& name, const String& value) { storeSetting(name, value); } }; return std::make_unique<InspectorFrontendSettingsCF>(); }
Mid
[ 0.5958429561200921, 32.25, 21.875 ]
LEWISBURG, Pa. - The Bucknell football team had a chance to win a game on its final possession for a second consecutive week, but again fell short. One week after falling to Lafayette by six points, the Bison lost to Cornell 15-10 Saturday night at Christy Mathewson-Memorial Stadium. Bucknell had the ball inside the Big Red 15-yard line in the final minute, but turned the ball over on downs. Bucknell's (1-3) defense did a solid job against a Cornell (2-1) offense that entered the game averaging 36.0 point per game. The Bison pressured QB Jeff Mathews all night, registering three sacks and five tackles for loss. Mathews was 27-for-46 passing for 278 yards, but was held without a touchdown pass for the first time this season after throwing seven the last two weeks. Evan Byers led the Bison defense as he recorded a career-high 12 tackles and 1.5 sacks. Ryan Morgan picked off a pass in the second quarter and tied Beau Traber for second on the squad with eight tackles. Bucknell's defensive backs did have a number of chances for interceptions, but a few drops turned into incomplete passes rather than turnovers. "We had opportunities they threw to us and we have to catch them," said Bison third-year head coach Joe Susan who helped Bucknell lead the nation in turnover margin in 2011. "Turnovers eliminate snaps they take and put us in good field position, but we didn't get them." Morgan's first-quarter interception of Mathews near midfield was the only turnover in the game, but it did not lead to points as the Bison went three-and-out on their ensuing drive. Cornell did struggle holding onto the ball as it played with a backup center, which helped lead to five fumbles, mostly on bad snaps, but the Big Red recovered all five miscues. Additionally, Cornell had kicking problems all night. The Big Red bobbled a snap and hold on an extra point and failed to convert, missed a 32-yard field goal and missed another extra point, giving the Bison life near the end. A 29-yard field goal by Sean Cobelli, his fourth of the year, with 5:14 to play brought the Bison to within 15-10 in the fourth quarter and gave Bucknell a chance to win the game on its final possession. Byers had three tackles, including a shared sack with Samuel Oyekoya, on Cornell's next drive, forcing the Big Red to punt from deep in its own territory after just three plays. A six-yard Kyle Sullivan punt return gave Bucknell the ball near midfield with 3:20 to play. Brandon Wesley started the drive with three straight screen passes to Victor Walker and Jake Flaherty to get the Bison to the 28-yard line. Tyler Smith converted a 4th-and-1 to keep the drive alive, but a six-yard run by Wesley, three incomplete passes and a false start halted the drive and clinched the game for Cornell, which has won six straight in the series. Bucknell took the early 7-0 lead as a Charles Thompson 63-yard run on his only carry of the game got the Bison to the 2-yard line. Two plays later Jeremiah Young punched it in for his first touchdown of the season. Cornell scored the next 15 points as Mathews snuck in for a TD to cap a 10-play, 61-yard drive early in the second quarter. The Big Red then failed to convert the extra point. Boomer Olsen concluded the next drive with a 28-yard field goal after 16 plays. A Mathews pass to Kurt Ondash, who led Cornell with 118 receiving yards, was nearly intercepted by Joseph Francis near the goal line just a few plays before the field goal. The Big Red's final points came on the first play of the fourth quarter when Silas Nacita scored on a 24-yard run. Olsen missed the ensuing extra point, leaving the door open for the Bison. Wesley, who moved into a tied for third place with Bob Gibbon on Bucknell's career completions list (365), was 19-for-29 for 135 yards on the night. His favorite target was Walker, who caught a career-high eight passes for 57 yards. Bucknell's leading rusher was Thompson thanks to his 63-yard run, but the game saw the return of Smith, who missed the last two games with an ankle injury. The senior co-captain rushed 12 times for 44 yards. "Tyler brings so much to the team," said Susan. "It's great to have him back. Having options like him, Jeremiah and Charles makes us a better team." Bucknell finished the game with 286 yards of total offense, including 151 on the ground and 135 through the air. Cornell was much less balanced, posting 299 through the air and just 62 on the ground. The Bison entered the game in the top 10 nationally in rushing defense. For a second straight week, penalties hurt Bucknell, which was flagged six times for 75 yards. The Bison, who have yielded an average of just 14.3 points per game this season, will open a three-game road trip next Saturday at Patriot League foe Holy Cross. The Crusaders are 0-4 this season and coming off a 52-3 loss to Harvard.
Mid
[ 0.56766917293233, 37.75, 28.75 ]
Q: Display custom list items in search results for annonymous users i have a Web application is enabled for annonymous access and it has Pubishing site collection, .Limited-access user permission lockdown mode is activated on this site collection. .a custom News list has list items and allowed ViewFormPages permissions for annonymous users on this list and annonymous users can view allitems page and can able to search the items in this list. Allow viewform pages on list $web = get-spweb "http://somesite"; $list = $web.Lists["somelist"]; $list.BreakRoleInheritance($true) $list.AnonymousPermMask = $list.AnonymousPermMask -bor 4096; $list.Update(); but how to stop annonymous users not to view of allitems page of custom list and they must search in the custom list? A: its possible but needs to be configured in central admin first. 1) enable anonymous access for the web application, (central admin -> web application -> authentication providers -> select default zone and set checkbox to anonymous) 2) then set at site for either site, list/lib or nothing. (Go to site actions -> site settings -> site permissions under "Users and Groups" click on anonymous access on the ribbon control. Set from the three choices site, list/lib or nothing) someone has similar issue: 1) Created new Web application with OOTB Publishing template 2) Created Two OOTB custom list and insert the data 3) Extend the web application(e.g. In my case i have extended for the Intranet zone )( Note:do not select anonymous Access option currently ) 4) deactivate the Lock down feature for the anonymous site by using following STSADM command stsadm -o deactivatefeature -url <anonymous site collection url> -filename ViewFormPagesLockDown\feature.xml ( Note : if you have already extended the web application for anonymous access , turned off the anonymous access and then perform the step-4 ) 5) Turned on anonymous access on default zone and Intranet Zone form central administration. 6) Give anonymous user permission for the extended web application by go to the root site -> Site Action -> Site Setting -> Site permissions ->Select "Anonymous Access" from the ribbon and select "Entire Website" 7) Make sure that the OOTB List inherit the permission from its parent.( if you select Stop inherit permission the result will not come in to the Anonymous search. Note : you can check this by go to the list permission) 8) clear the cache and sign out and close the browser and reset the IIS. 9) Now give the site url of the main site and extentded site in to the content source by Go to Central Administration -> General Appplication Settings -> Farm Search Administration -> Search Service Application -> Content Sources -> Edit your content source and give the site url for the crawling (E.g. http://mainsiteurl , sps3:mainsiteurl , http://extendedsiteurl , sps3:extendedsiteurl) -> ok Note : Give each url in new line 10) Do the Index Reset and perform full crawling 11) Now open the anonymous site and perform the anonymous search the result will come in anonymous search https://social.technet.microsoft.com/Forums/sharepoint/en-US/29ab357d-74ff-49e2-ad41-5645f43ea4c6/sharepoint-anonymous-search-problem-from-custom-list?forum=sharepointadminprevious
High
[ 0.660633484162895, 36.5, 18.75 ]
Q: Using .length() in Java I have to enter something like John Doe 12345 99 where First name is John, last name is Doe, ID is 12345, and wage is 99. It needs to be all in one string separated by spaces. So I have this: while(x < Info.length()){ if(Info.charAt(x) == ' '){ First = Info.substring(0,x); Last = Info.substring(x + 1, Info.length()); IDNum = Integer.parseInt(Info.substring(x + 2, Info.length())); Wage = Double.parseDouble(Info.substring(x + 3, Info.length())); x = Info.length(); } ++x; } I'm having trouble on the .length(); The example in the book only showed how to break up a string with two words in it. It's the length on IDNum and Wage. I'm not sure where to start them and end them. I think I need to change the ending for the length() when the Last calls it. A: If it's separated by a space why not use the split() method: String info = "John Doe 12345 99"; String[] seperatedInfo = info.split(" "); String firstName = seperatedInfo[0]; String lastName = seperatedInfo[1]; int ID = Integer.parseInt(seperatedInfo[2]); double pay = Double.parseDouble(seperatedInfo[3]); System.out.println(firstName); System.out.println(lastName); System.out.println(ID); System.out.println(pay); Output: John Doe 12345 99 Also side note Java naming conventions for variables is to start with lower case and use camelCase
Low
[ 0.523908523908523, 31.5, 28.625 ]
Transformative Colman Air Beds Review Colman Air Beds Because oneself can look at, 1 air mattress isn’t great appropriate towards every person. The air beds put on’t include any desires in the direction of be deflated following a distinctive time period of consumption, therefore that’s not a aspect. If oneself drive in direction of order an air mattress that’s sturdy plenty of in the direction of ultimate for several years, then on your own want towards move for the Intex air bed. By natural means, there are lots of alternate good reasons in direction of discover an air mattress. Oneself’re capable towards vacation spot 1 air mattress in just addition in the direction of a different toward establish a lifted air mattress that presents a total great deal of ease and comfort. Upon the contrary aspect of the scale are air beds that may possibly aspect as each day beds. Regardless of what yourself just take, oneself only comprise in direction of create sure yourself are shifting in direction of acquire a mattress that gives more than enough Room for whoever will seek the services of this, and it’ll in shape the place which by yourself comprise allocated in just your place. If yourself determine toward order a all-natural mattress, what will most likely transpire is that oneself choose for the level of firmness which oneself feel is utmost soft towards on your own just before get, and oneself will acquire the extremely exact same level of firmness for hence extensive as yourself employ the service of your mattress. There are a good deal of good perfect beds furnished by way of lower price price ranges at highest on the web merchants. For the reason that by yourself are shelling out within just a blow-up mattress, by yourself should toward glimpse for just one that requirements a hand pump or extensive energy for the get the job done of inflation. A snug mattress is necessary, Regrettably a bed is much more than major whenever it is made up of in direction of do with consolation. If oneself can supply them a Wonderful mattress off the flooring, they are heading in direction of slumber soundly. Get the season towards acquire what by yourself indicate toward employ an air bed for. An air bed deals Fantastic service. Upon the turn aspect, quite possibly on your own’re little and want a tiny air bed. How towards Attain Began with Colman Air Beds? As stated prior to,, the bed is intended of a superior-high-quality materials that isn’t inexpensive in the direction of manufacture. An air bed is a thing which can usefulness a significant range of Those people within a massive range of circumstances. Upon the convert facet, on your own may possibly far too choose an air bed which can be specifically plugged into an outlet with the purpose of inflating it and even a deflating system is supplied. If by yourself get hold of a fantastic superior-high quality air bed on your own put on’t include in direction of want toward transfer significantly in direction of observe down a snug area toward snooze! The Soiled Reality More than Colman Air Beds Alternately, by yourself can get an air bed with out the body. There are a couple of variables on your own will need in the direction of consider regarding past towards getting an air bed. Though the Coleman air bed is actually not indestructible, it’s developed in the direction of endure a amount of the surprising supplies that could generate a smaller sized air bed unusable. Inside these predicaments, producing a Coleman air bed can conserve on your own the working day, or even the full holiday vacation. If your self intend in the direction of drive about, then bringing your air bed with on your own can offer oneself an very Excellent rest anywhere by yourself’re. An air bed incorporates the ability in direction of ideal its firmness, centered upon the stage of ease and comfort by yourself will need. The Coleman air bed is the great order if your self are on the lookout for top quality, ease and comfort and patience. The Coleman air bed takes advantage of vinyl that’s of greater high-quality, and raises the bed’ sturdiness. Sizzling Coleman Air Beds Here are a few of our most populartop coleman air beds image that you can get and print. Coleman Air Beds Reviews Coleman Double High Quickbed Queen Air Mattress And Pump intended for Eloquent Colman Air Beds
Mid
[ 0.6036866359447001, 32.75, 21.5 ]
Learned Healthfulness 4 years ago 9 min read Modeling a Food Conscious Lifestyle for Children to Follow As a child, Desiree Williams did what many children do—follow their parents’ example when it comes to eating and exercise. The healthy habits that she developed early on stuck with her and helped her survive the challenges of the Miss Virginia pageant, which she won in 2013. “My mom used to get up each and every morning and do a Jazzercise VHS” she says, “and I would get up and do that VHS, as well. So even at the age of three, I had already fallen in love with exercise.” Still, like many children today who are inundated with advertisements for high-sugar and high-fat junk foods, Williams ate a typical American diet when she was younger—something that changed as she became more aware of the importance of healthy food. “I didn’t grow up eating all that healthfully,” she says. “Both my parents worked full time and so we ate fast food most days of the week. As I got older, I realized how harmful that was for our bodies and for our health…so something that I’ve changed over the years is incorporating more fruits and vegetables.” As reigning Miss Virginia, she hopes to share her passion for healthy living with others—especially children—choosing as her platform “Fighting Childhood Obesity—Let’s Move.” “The obesity epidemic is running rampant in our society,” she says, “so it’s my goal to educate children, as well as their families, on eating healthy and being active—because as much as we focus on children, no change will be made if we don’t focus their parents and educate them on making better choices as well.” Childhood Obesity Epidemic Childhood obesity is often described as an epidemic, but is the rise in the number of overweight and obese children severe enough to warrant that term? “I would say absolutely it is,” says Dr. Trey Wickham, an endocrinologist and pediatrician at Virginia Commonwealth University Medical Center in Richmond, Va. “Based on our most current data, on average over 30 percent of children and adolescents in the United States would meet the classification for overweight or obese. Those rates are even higher in certain racial and ethnic groups, such as African American and Hispanic families.” According to the Centers for Disease Control and Prevention, the prevalence of obese children and teenagers has tripled since 1980. As a result, 17 percent—or 12.5 million—children between the ages of two and 19 are carrying excess weight that puts their health at risk, both now and in the future. “Although we certainly know that obesity in childhood is associated with increased risk of health problems later in life,” says Wickham, “the unfortunate reality is that we already can see health problems such as type 2 diabetes, high cholesterol, and high blood pressure in the pediatric population because of weight gain and obesity.” The increased health problems later in life stem from the fact that children who are overweight and obese are more likely to be obese as adults. Researchers are also finding that the scales can tip toward obesity very early in life. A 2014 study in the New England Journal of Medicine showed that children who are overweight by the start of kindergarten are four times more likely to be obese by eighth grade. There’s even some evidence that children who are heavier at birth may be more at risk of developing obesity later in life. Obesity Blame Game At its foundation, childhood obesity is simply a matter of balance—children (or adults) who eat more calories than they burn off through the body’s metabolism and physical activity will gain weight. In reality, though, obesity depends on multiple factors interacting in a complex fashion. “The way that I really think about the obesity epidemic,” says Wickham, “and particularly in the pediatric population—it sounds like a cliché—but it really is the result of a perfect storm.” Then, the obesity epidemic is a hurricane fueled by many factors. Beneath it lies our genes—including those that affect the hormones that control appetite and fullness. “The genes that helped us survive eons ago,” says Dr. Caroline Apovian, a professor of medicine and pediatrics at the Boston University School of Medicine, “when we had to forage for food, we had to go and kill an animal to get protein, and then we found berries and plants—those genes helped us survive by arranging fat oxidation so we could store as much fat as possible.” In our current environment, we no longer need to hunt or gather food. We simply drive to the nearest fast food restaurant, or order a pizza without moving from our sofa. And much of the food that we do eat is leading us slowly toward obesity. “We have created very highly palatable foods made of a lot of sugar and a lot of fat,” says Apovian, “and they taste so good that we altered our pathways to appetite and satiety. So, we’ve got this highly palatable food readily available all around us that is devoid of nutrients, and we’ve created a situation where we’re storing too much fat.” On top of that, our communities and families are structured to not only allow easy access to high-caloric foods, but also to limit our physical activity—creating what scientists call an obesogenic environment, or one that promotes obesity. Targeting Lifestyle Habits As pointed out in the New England Journal of Medicine study, some of the seeds of obesity are planted by age five. This implies that earlier interventions may be needed to give kids the best chance to lead healthy lives. One of the challenges, though, is that so many factors contribute to childhood obesity. Still, health professionals tend to agree on part of the solution. “One of the key messages, and one of the things that we’re finding,” says Wickham, “is the importance of prevention. There’s a lot of data supporting the benefits of a healthy diet and regular physical activity. And I would emphasize that those are important regardless of what someone’s body weight or body habitus [shape] is.” Most parents realize that eating better and exercising more are good for them and their children— reducing the risk of chronic diseases like heart disease, stroke, type 2 diabetes and some types of cancer— but convincing children to make changes can often be difficult. One thing, however, that’s often overlooked is that what parents do has a big impact on their children. “Kids learn from role modeling,” says Kristi King, a registered dietitian at Texas Children’s Hospital, “so if they don’t have that role model to look up to, the chances of them developing that healthy behavior is going to diminish.” King illustrates this with a story of a father who asked her to convince his child to eat more vegetables. When the father admitted that he doesn’t eat vegetables himself, she told him, “You know, the chance of your child eating them if he’s not seeing you eat them is going to be slim to none.” That’s why many interventions for obese children also involve the parents and siblings, because the family that eats healthier and exercises more together, succeeds together. “Most of our programs revolve around the whole family,” says King. “That’s because their rate of compliance is going to be better when everybody is involved, versus just one person.” It Takes a Village If children never left their house, parents could easily control their environment. But the truth is that the home is only one small corner of the greater village that influences the behaviors of children. “Kids spend a significant amount of time at school,” says Wickham. “I think that there’s opportunities there for promoting healthy changes.” Many schools, he adds, are already making those changes—from improving school snacks and meals, to promoting physical activity, to starting after-school programs and community gardens. “I think all of those things play important roles,” he says. “One of the things that I think is really important as we look at the obesity epidemic…is that, although there are lots of great ideas out there, that we are actively tracking what works and doesn’t work.” One program that is showing some success with these types of changes is APPLE Schools—which stands for the Alberta Project Promoting active Living and healthy Eating—an initiative in Canada that hopes to create healthy schools by connecting the pieces that form the larger school community. This type of comprehensive school health project includes students, teachers, principals, parents and local community members. To ensure success, the APPLE Schools program added a feature that was absent from similar efforts in other school systems. “We had a full-time person in the school,” says Kerry Vander Ploeg, a postdoctoral fellow in the School of Public Health at the University of Alberta, where the APPLE Schools program was developed, “where this was their job, to work with the school community to promote healthy eating and active living.” The results of the program, some of which were published in a 2014 article in the journal Pediatrics, are promising. Students attending APPLE Schools increased their physical activity, which was recorded using pedometers worn by the students. While the number of steps taken increased throughout the week, the improvement was even more drastic on non-school days—when students tended to be more inactive. This shows that the health behaviors students were learning and practicing during school hours stuck with them outside of school. According to Vander Ploeg, diet quality also improved in the APPLE Schools, while the number of overweight and obese children decreased, both of which are impressive changes. “Being able to show that we changed behaviors is really positive,” says Vander Ploeg, “and hopefully those behaviors will continue and carry with them throughout their lifetime.” Inspiring Healthy Changes In addition to promoting a healthier lifestyle, doctors can sometime use medications and drugs to treat childhood obesity. Given the sheer size of the epidemic, others favor a broader approach along the lines of the successful anti-smoking and seatbelt campaigns. “That has to be a public health effort,” says Apovian, “with government, with the media, with industry all gathering together with academia to make a change.” Those changes, though, may take several years. In the meantime, health professionals continue to promote healthier living through diet and physical activity. For kids, it helps that they have role models like Williams to show them the way. In the end, what they pick up from her just might nudge them toward a better life. “Seeing one person turn their life around and get active,” says Williams, “really does inspire a change for other people as well.”
Mid
[ 0.607305936073059, 33.25, 21.5 ]
Q: HTML 5 Audio Current Position Using HTML 5 together with the DOM is there a way to get the current location that the user is in playing an audio file and also later on go back to that position? A: See the HTMLMediaElement interface. element.currentTime should give you what you're looking for.
Mid
[ 0.6221079691516711, 30.25, 18.375 ]
Introduction {#s1} ============ The fatal outcome from coronavirus disease 2019 (COVID-19) is attributed to terminal respiratory failure secondary to bilateral pneumonia from severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2) infection ([@B1]--[@B3]). However, a subset of younger patients with severe COVID-19 suffer from uncontrolled hyperinflammation and succumb to acute organ failure and cardiac arrest while still being adequately oxygenated ([@B4]--[@B7]). The "cytokine storm" or "cytokine release syndrome" (CRS) has been implicated in adverse patient outcomes, with interleukin-6 (IL-6) representing a key inflammatory mediator and surrogate marker of CRS ([@B8], [@B9]). The U.S. Food and Drug Administration (FDA) approved the expanded access to a recombinant monoclonal antibody against human IL-6 receptors (tocilizumab), and a randomized controlled phase 3 clinical trial on tocilizumab in adult patients suffering from severe COVID-19 is currently ongoing ([@B10]--[@B13]). The available empirical treatment modalities include a wide spectrum of off-label indications for antirheumatic agents, including cytokine inhibitors, corticosteroids, intravenous immunoglobulin, and other novel anti-inflammatory molecules ([@B13]--[@B15]). However, the exact mechanisms of hyperinflammation and hypercoagulation in COVID-19 patients remain enigmatic and poorly understood. Role of Complement in COVID-19? {#s2} =============================== The complement system serves as a "first line of defense" against invading viruses and as a bridge between innate and adaptive immune responses ([@B16], [@B17]). Interestingly, complement has received limited attention in the quest for effective anti-inflammatory treatment strategies in spite of multiple intuitive targets in COVID-19, and most of the prevalent anti-inflammatory agents currently under investigation do not include a consideration for complement inhibitors ([@B8], [@B13], [@B14]). Complement activation has been previously implicated in the pathophysiology of Middle East respiratory syndrome (MERS) and severe acute respiratory syndrome (SARS) which are severe infectious diseases mediated by coronaviruses that are similar to the pathogen responsible for the current COVID-19 pandemic (SARS-CoV-2). Experimental studies revealed that complement activation occurs in response to SARS-CoV infection, and mice deficient in genes for the central complement component C3 were shown to be protected from pulmonary inflammation and respiratory failure ([@B18]). Furthermore, the complement activation fragment anaphylatoxin C5a is a potent mediator of acute lung injury in highly pathogenic viral infections, including MERS and SARS ([@B19]). The pharmacological blockade of the C5a receptor (C5aR, CD88) attenuated pulmonary inflammation in a mouse model of MERS-CoV infection, and C5aR blockade led to decreased viral replication in infected lungs ([@B20]). In addition, there is an established crosstalk between the coagulation cascade and the immune proteolytic system through thrombin- and plasmin-mediated complement activation, and complement activation was recently postulated to induce thrombotic microangiopathy in COVID-19 ([@B21], [@B22]). In light of these presumed "key" pathophysiological features mediated by complement activation in response to coronavirus infections, it appears intuitive to consider the pharmacological complement inhibition as part of the "expanded access" paradigm to off-label indications for anti-inflammatory treatment strategies in COVID-19. Pharmacological Complement Inhibition {#s3} ===================================== There are currently multiple pharmacological complement inhibitors available for the treatment of rare inflammatory and autoimmune disorders in humans ([@B17], [@B23], [@B24]). Preliminary case reports from "hot zones" in Italy outlined the anecdotal success by compassionate use of the complement C3 inhibitor AMY-101 (Amyndas Pharmaceuticals, Glyfada, Greece) and by administration of the anti-C5 monoclonal antibody eculizumab (Soliris; Alexion, Boston, MA) in the rescue of critically ill COVID-19 patients ([@B25], [@B26]). From a mechanistic perspective, AMY-101 inhibits cleavage of C3, the central component in the complement cascade, and thus prevents the formation of the C3 and C5 convertases and the subsequent release of the inflammatory mediators C3a and C5a and formation of the tissue-damaging membrane attack complex (MAC; C5b-9). Further downstream, eculizumab prevents cleavage of C5 and the formation of the inflammatory anaphylatoxin C5a and of the MAC/C5b-9 ([@B27]). Indeed, a recent study from Milan, Italy, reported elevated levels of the C5 activation fragment C5a and soluble MAC (sC5b-9) in plasma samples of patients with severe COVID-19, confirming the notion that C5 blockade represents a potentially relevant therapeutic consideration ([@B28]). A prospective randomized controlled trial evaluating the safety and efficacy of eculizumab in patients with COVID-19 infection is currently under way ("CORIMUNO-19" trial). Several additional complement inhibitors are under consideration for compassionate use in COVID-19 ([Figure 1](#F1){ref-type="fig"}). Of these, avdoralimab (Innate Pharma, Marseille, France) is an anti-C5aR monoclonal antibody that prevents binding of C5a to its receptor (C5aR, CD88), while IFX-1 (InflaRX; Martinsried, Germany) is a monoclonal antibody that targets C5a, preventing it from interacting with the C5aR. In addition, the recombinant human C1 esterase inhibitor conestat alfa (Ruconest; Pharming Group & Salix Pharmaceuticals, Bridgewater, NJ) is a specific inhibitor of the classical complement activation pathway which is currently approved for treatment of hereditary angioedema. This C1 inhibitor (C1-INH) is under consideration as an open-label, multicenter pilot trial in adult patients with SARS-CoV-2 pneumonia ("PROTECT-COVID-19" trial). ![Therapeutic targeting options of the complement cascade in COVID-19. The schematic depicts the complement activation pathways and the sites of inhibition by the various pharmacological compounds.](fimmu-11-01661-g0001){#F1} In addition to the classical and alternative complement activation pathways, the lectin pathway provides another new promising avenue for pharmacological targeting in COVID-19. The complement lectin pathway is activated when a pattern recognition receptor, such as mannose binding lectin (MBL), binds to pathogen-associated molecular patterns expressed on the surface of invading microorganisms ([@B29]). The complement cascade is then initiated by MBL forming complexes with MBL-associated serine proteases 1 and 2 (MASP-1 and MASP-2, respectively) in a similar fashion that C1 is activated through the classical pathway, leading to C4 and C2 cleavage and assembly of the C3 convertase ([@B30]). A historic case-control study on 569 SARS patients demonstrated a role of MBL gene polymorphisms in contributing to the susceptibility of viral invasion, and implied that the complement lectin pathway represents the "first line of defense" against SARS-CoV infection ([@B31], [@B32]). This notion is supported by recent histopathological findings in patients with severe COVID-19, demonstrating the deposition of complement lectin pathway components MBL and MASP-2, as well as complement activation fragments C4d and C5b-9, in the microvasculature of human lung tissue specimens with SARS-CoV-2 infection ([@B21]). Narsoplimab (OMS721; Omeros Corporation, Seattle, WA) is a novel human monoclonal antibody that targets MASP-2 and prevents lectin pathway-mediated inflammation and endothelial damage in a variety of autoimmune disorders ([@B33]). The safety and efficacy of narsoplimab is currently being investigated in a phase 2 dose-escalation cohort study in patients with complement-mediated hyperinflammatory conditions, including hematopoietic stem cell transplantation-associated thrombotic microangiopathy, thrombotic thrombocytopenic purpura, and atypical hemolytic uremic syndrome ([@B33]). Several other human complement inhibitors are currently in phase 2 or phase 3 clinical trials for different indications, raising the possibility that FDA-approved complement inhibitors will quickly join the developing arsenal of therapeutics for treatment of COVID-19 patients beyond compassionate use ([@B34]--[@B36]). Summary {#s4} ======= In summary, the complex immune dysregulation observed in patients with severe COVID-19 remains poorly understood. The pharmacological targeting of complement activation in severe COVID-19 may attenuate the increased mortality observed in a younger cohort of patients with persistent hyperinflammation, thromboembolic complications, and cardiac arrest beyond terminal respiratory failure associated with SARS-CoV-2 pneumonia. Moving forward, it will be important to carefully monitor for beneficial and adverse effects associated with therapeutic complement inhibition ([@B36]). In addition, well-designed clinical studies are needed to determine patient outcomes by inhibiting complement in isolation vs. a combination therapy by targeting other key mediators responsible for the "cytokine storm" ([@B37]). Finally, from a patient safety perspective, we will have to determine the extent of retained innate immunity required for viral clearance and prevention of secondary bacterial infections. Author Contributions {#s5} ==================== Both authors conceived the concept of this article and wrote the manuscript together. Conflict of Interest {#s6} ==================== PS has a United States Patent No. 11,441,828 entitled: "Inhibition of the alternative complement pathway for treatment of traumatic brain injury, spinal cord injury, and related conditions." PS is employed by HCA Healthcare as the chief medical officer at the Medical Center of Aurora. SB has a United States Patent \# 10,535,004 "Methods and compositions for diagnosis and treatment of meningitis." SB is employed by CNine Biosolutions LLC, a company involved in developing complement diagnostic assays. The authors declare that the research was conducted in the absence of any other commercial or financial relationships that could be construed as a potential conflict of interest. Specifically, there is no conflict of interest whatsoever by either of the two authors related to the pharmacological agents and companies cited in this manuscript. [^1]: Edited by: Yolande Richard, Institut National de la Santé et de la Recherche Médicale (INSERM), France [^2]: Reviewed by: Cecilia Garlanda, Humanitas University, Italy; Ka Man Law, University of California, Los Angeles, United States [^3]: This article was submitted to Inflammation, a section of the journal Frontiers in Immunology
High
[ 0.664705882352941, 28.25, 14.25 ]
Q: SOQL Query isn't working... Where with multiple In And Or I've tried re-writing this query a few times, and no matter how I separate out the And/Or parts, it doesn't seem to want to work. I consistently return zero results. This query isn't working (and I need help fixing it): [select Id, Account_Domain_Hidden__c, Opps__c, Type from Account where (Account_Domain_Hidden__c IN :acctQueryLimiter2) AND ((Type = 'Customer') or ((Type = 'Prospect') AND (Opps__c > 0)) )] However this query is working (for reference, so you know the issue involves discrepancies between the two): [select Id, Account_Domain_Hidden__c from Account where Account_Domain_Hidden__c IN :acctQueryLimiter2] Note: I did use Query Editor and determine that the Opps__c field if queried independently is returning values, as is the type Field. Presently there aren't any accounts with label of Type 'Prospect', but that is an established label/value option for the field. So it shouldn't be effecting the query in such a way as to cause zero results to be returned, which is what's happening presently, so I'm certain the issue comes from my structuring and separation of the and/or values, I'm just not sure how to re-structure it. Desired result is to retrieve the requested values from account when the following conditions are met: 1) The account's Account_Domain_Hidden__c value matches a value found in theacctQueryLimiter2 list 2) The Account Type is either 'Customer' or 'Prospect' 2A) And if Account Type is 'Prospect', Opps_c value must be greater than 0. How can I re-write this query to obtain the desired result? Thanks! A: SELECT Id, Account_Domain_Hidden__c, Opps__c, Type FROM Account WHERE Account_Domain_Hidden__c IN :acctQueryLimiter2 AND ( Type = 'Customer' OR (Type = 'Prospect' AND Opps__c > 0) ) Seems like it should work. Have you verified that your Prospect accounts have Opps? Alternatively, have you verified that you have Customer Accounts in your desired result set?
High
[ 0.6839378238341961, 33, 15.25 ]
529 F.Supp. 1056 (1981) Nannie L. DODSON, Administratrix of the Estate of Jerry Banks, Deceased, v. Tommy FLOYD, et al. Civ. A. No. C81-1035A. United States District Court, N. D. Georgia, Atlanta Division. December 18, 1981. *1057 *1058 *1059 Bobby Lee Cook, Cook & Palmour, Summerville, Ga., Wade M. Crumbley, Stephen P. Harrison, McDonough, Ga., for plaintiff. Harvey S. Gray, Smith, Cohen, Ringel, Kohler & Martin, Atlanta, Ga., for defendants. MOYE, Chief Judge. ORDER The Court examines the above-styled case in its preliminary stage in order to consider defendants' motion to disqualify Wade M. Crumbley, Stephen P. Harrison, and Bobby Lee Cook from serving further as counsel for plaintiff Nannie L. Dodson. I. This is a civil action for compensatory and punitive damages brought by Nannie L. Dodson, Administratrix of the Estate of Jerry Banks, deceased, against Henry County, Georgia, Jimmy H. Glass, Sheriff of Henry County, Georgia, and five additional law enforcement officials of said county. The detailed complaint, brought pursuant to 42 U.S.C. §§ 1981, 1983, 1985(2) and (3), 1986 and 1988, bases jurisdiction on 28 U.S.C. §§ 1331 and 1343(1)-(4). It is alleged within the complaint that the acts and omissions of defendants caused Jerry Banks to be convicted of two counts of murder, sentenced to death, and incarcerated for over six years for a crime which he did not commit. Specifically, the complaint alleges the defendants: (1) Deprived Plaintiff's decedent of his Fourteenth Amendment due process right to have disclosed to him exculpatory evidence known to the State; (2) Deprived him of his rights under the Sixth and Fourteenth Amendments to have compulsory process of obtaining witnesses in his favor, to be confronted with witnesses against him and to effective assistance of counsel; (3) Deprived him of his Fourteenth Amendment due process right not to have false and perjured testimony used against him; (4) Deprived him of his Fourteenth Amendment due process right to have access to exculpatory physical evidence; and (5) Deprived him of his Fourteenth Amendment right to equal protection of the law, and not to be prosecuted because of his race. All of the above conduct was allegedly intentional, reckless, wanton, wilful, and grossly negligent, and was maliciously, wantonly, and oppressively done. The above allegations are based upon thirty-eight lengthy paragraphs of factual averments which, in summary, indicate the following: Plaintiff's deceased Jerry Banks was convicted of two counts of murder and sentenced to death in Henry Superior Court on January 31, 1975, but the conviction was overturned and a new trial granted by the Georgia Supreme Court on direct appeal. Banks v. State, 235 Ga. 121, 218 S.E.2d 851 (1975). On retrial on November 17 and 18, 1975, Banks was again convicted on two counts of murder and sentenced to death, following which he was transferred from the Henry County Jail, where he had been continuously incarcerated since December 11, 1974, to Death Row at the Georgia Diagnostic and Classification Center in Butts County, Georgia. Banks' direct appeal of his second conviction was without success, Banks v. State, 237 Ga. 325, 227 S.E.2d 380 (1976), as was his subsequent habeas petition, Banks v. Glass, 242 Ga. 518, 250 S.E.2d 431 (1978). In 1980, however, Banks' extraordinary motion for a new trial, based upon six paragraphs of newly discovered evidence, was ordered granted by the Supreme Court. Banks v. State, 246 Ga. 1, 268 S.E.2d 630 (1980). The District Attorney of the Flint Judicial Circuit filed a motion *1060 seeking the trial judge's consent in the entry of a nolle prossequi on December 22, 1980, and said motion being granted, Banks was released. The complaint alleges that from and after June 10, 1979, Banks discovered a large body of theretofore undisclosed, exculpatory evidence. All of this evidence was allegedly known to the defendants Floyd, Robbins, Howard, Barnes, and Glass, and had never been disclosed to Banks or his counsel, or to the District Attorney and his assistants. None of the exculpatory evidence described was ever voluntarily disclosed by the defendants, according to the complaint, but was discovered from third parties and by judicial process. None of the exculpatory evidence was presented at Banks' two trials. II. Having outlined the civil action before the Court, a matter necessary for the reader to understand fully the defendants' motion for disqualification of plaintiff's counsel, the Court now focuses upon the pending motion. Defendants' motion for disqualification asserts that Mr. Crumbley's representation of Henry County, Georgia, in the capacity of assistant county attorney and county attorney from the summer of 1979 through January 1981, and his association with the law firm of Smith, Welch, and Meadows for the period from the summer of 1980 until immediately prior to the filing of the present action violates Canons 4 and 9 of the Code of Professional Responsibility, made applicable to members of the State Bar of Georgia, as reprinted at 241 Ga. 643, 651-721 (1978). Said motion further asserts that Mr. Crumbley's association with Mr. Harrison and the law firm of Cook & Palmour as co-counsel for plaintiff in the preparation of this action requires their similar disqualification. The relevant test in disqualification matters is clearly settled in this Circuit and others: where an attorney represents a party in a matter in which the adverse party is that attorney's former client, the attorney will be disqualified if the subject matter of the two representations are "substantially related." See Duncan v. Merrill Lynch, Pierce, Fenner & Smith, 646 F.2d 1020 (5th Cir. 1981); Brennan's, Inc. v. Brennan's Restaurants, Inc., 590 F.2d 168 (5th Cir. 1979); Wilson P. Abraham Construction Corp. v. Armco Steel Corp., 559 F.2d 250 (5th Cir. 1977); In Re Yarn Processing Patent Validity Litigation, 530 F.2d 83 (5th Cir. 1976) (decisions of controlling authority adopting rule) and Westinghouse Electric Corp. v. Gulf Oil Corp., 588 F.2d 221 (7th Cir. 1978); Government of India v. Cook Industries, Inc., 569 F.2d 737 (2d Cir. 1978) (decisions of other Circuits adopting rule); T. C. Theatre Corp. v. Warner Bros. Pictures, Inc., 113 F.Supp. 265 (S.D.N.Y. 1953) (genesis of substantial relationship test). The rule embodies the substance of Canons 4 and 9 of the A.B.A. Code of Professional Responsibility. Canon 4 provides that a "lawyer should preserve the confidences and secrets of a client," and Canon 9 provides that "a lawyer should avoid even the appearance of professional impropriety." As a result, it is clear that the determination of whether there is a substantial relationship turns on the possibility, or appearance thereof, that confidential information might have been given to the attorney in relation to the subsequent matter in which disqualification is sought. The effect of the Canons is to restrict the inquiry to the possibility of disclosure; it is not appropriate for the Court to inquire into whether actual confidences were disclosed. Westinghouse Electric Corp. v. Gulf Oil Corp., 588 F.2d 221, 224 (7th Cir. 1978); In Re Yarn Processing Patent Validity Litigation, 530 F.2d 83, 89 (5th Cir. 1976). The Court must presume that confidences potentially damaging to the client have been disclosed to the attorney during the former period of representation because such a presumption is necessary to aid the frank exchange between attorney and client by helping to preclude even a possibility that information given in confidence by the former client will be used without the client's consent. Id. Were an attorney permitted to represent a client whose cause is *1061 related and adverse to that of his former client he would be called upon to decide what is confidential and what is not, and, perhaps, unintentionally to make use of confidential information received from the former client while espousing his cause. T. C. Theatre Corp. v. Warner Bros. Pictures, 113 F.Supp. 265, 269 (S.D.N.Y.1953). Doubts as to the existence of an asserted conflict of interest should be resolved in favor of disqualification. 588 F.2d at 225; International Business Machines Corp. v. Levin, 579 F.2d 271, 283 (3d Cir. 1978); Hull v. Celanese Corp., 513 F.2d 568, 571 (2d Cir. 1975); Chugach Electric Association v. United States District Court, 370 F.2d 441, 444 (9th Cir. 1966), cert. denied, 389 U.S. 820, 88 S.Ct. 40, 19 L.Ed.2d 71 (1967). In view of the above, disqualification questions require three levels of inquiry. Initially, the Court must make a factual reconstruction of the scope of the prior legal representation. Second, it must be determined whether it is reasonable to infer that the confidential information allegedly given would have been given to a lawyer representing a client in those matters. Finally, it must be determined whether that information is relevant to the issues raised in the litigation pending against the former client. The Court must place the burden of proving that the present and prior representations are substantially related on the party seeking disqualification and the focus of the Court's inquiry must be on the precise nature of the relationship between the present and former representations. Duncan v. Merrill Lynch, 646 F.2d 1020, 1028-29 (5th Cir. 1981). Having established the appropriate legal framework, the Court examines the case at bar. III. A. The Scope of the Prior Legal Representation Initially, the Court must examine the facts which reveal the scope of the prior legal representation of defendants by plaintiff's counsel. It is not argued that Mr. Harrison or Mr. Cook ever represented defendants, so the focus is upon Mr. Crumbley. Mr. Crumbley became an assistant county attorney for Henry County on March 23, 1979, and was elevated to county attorney on May 21, 1979, Deposition of Crumbley at 20-21, a position he held until January 1981, Exhibit B to defendants' brief. As county attorney, Mr. Crumbley was called upon to represent the county Board of Commissioners, Clerk of Court, Probate Judge, Tax Assessors, and Sheriff. Deposition of Crumbley at 23-24. During this period Mr. Crumbley, in association with Mr. Harrison, represented Jerry Banks, plaintiff's deceased, against the State in his efforts to be freed from prison. Between 750 and 1000 hours were devoted by Mr. Crumbley to Banks' case. Affidavit of Crumbley at ¶ 3. The bulk of Mr. Crumbley's county work was done for the Board of Commissioners. Mr. Crumbley's fee statements to the Board, which are attached to defendants' brief as Exhibit A, indicate that Mr. Crumbley attended approximately fifty (50) general and special meetings of the Board and defended approximately eleven different suits against the county or county officials. These cases are discussed in Crumbley's Deposition at 70-76. Mr. Crumbley's work for Sheriff Glass, a defendant herein, was limited to 36.25 hours during his tenure as county attorney, an amount which represents only 3.45% of the time he spent on county matters. Affidavit of Crumbley at ¶ 5. The first matter that arose concerning the sheriff for County Attorney Crumbley was the case of Duffy v. Goins et al., No. C78-2208A (N.D.Ga.), a civil rights action against Sheriff Glass, the City of McDonough, Georgia, certain of its officers, and Deputy Sheriff Ernest Wise. Henry County was not a named defendant. The complaint in Duffy with respect to defendant Glass alleged that Sheriff Glass, acting under color of state law, subjected plaintiff to cruel and unusual punishment and deprived plaintiff of his liberty and the security of his person without due process of law, in violation of 42 U.S.C. §§ 1981, 1983, 1985(2), and 1985(3), and contrary to *1062 the Fourth, Eighth, and Fourteenth Amendments to the United States Constitution. The alleged actions were allegedly motivated by racial prejudice and an intent to deprive plaintiff of equal protection of the law. Duffy v. Goins, No. C78-2208A (N.D.Ga.), Complaint at ¶ 33, filed December 27, 1978. Defendant Glass was further alleged to be liable to plaintiff (1) for his failure to adequately train, supervise, discipline, and control defendants Wise and Doe, who were deputy sheriffs of Henry County, id. at ¶ 38, and (2) for malicious arrest and false imprisonment in violation of Ga.Code Ann. §§ 26-1308 and 1309. Mr. Crumbley's involvement with the Duffy case was limited to assisting defendants Glass and Wise in answering interrogatories which were served upon them in 1979. Deposition of Crumbley at 26-28. Defendant Glass' first answers were filed on June 29, 1979, and consisted of denials of any involvement with the arrest of Duffy. Mr. Crumbley's signature appears on the answers as "attorney for the defendant Jimmy Glass." Mr. Crumbley's signature appears only on the second interrogatories to defendant Wise, which asked only three questions, all relative to Wise's arrest of Duffy. See Wise's answers, filed June 29, 1979. A second set of interrogatories was served on defendant Glass on August 24, 1979. This set of questions asked defendant Glass about the conduct of his office inasmuch as it sought to determine whether the sheriff regularly ascertained whether persons were being held in the county jail without legal justification, whether he told Deputy Wise or his jail employee that Duffy could not be arrested for failure to appear in court unless a warrant for his arrest had been issued, and whether the sheriff ever inquired as to whether such a warrant had been issued. Mr. Crumbley signed defendant Glass' answers to these interrogatories, which were filed September 25, 1979, as well as a pleading entitled "Defendant Glass' Response to Plaintiff's Request for Production of Documents" filed the same date. The remaining pleadings in the matter were all signed by either Lowell S. Fine or Robert L. Goldstucker as attorneys for defendants Wise, Doe, and Glass. Mr. Crumbley's fee statement dated July 5, 1979, indicates that during June 1979 he spent the following time on the Duffy matter: (1) On June 7, ¼ hour with Amy Totenberg, plaintiff's counsel; (2) June 11, ½ hour with Sheriff Glass; (4) June 26, one hour conference with defendants Glass and Wise; (5) June 26, two hours on Duffy case, specific work not recorded. During September 1979, with respect to Duffy, Mr. Crumbley spent (1) two hours in conference with Sheriff Glass on September 11 discussing "jail policies — Duffy v. Goins"; (2) two hours on September 11 preparing answers to interrogatories; (3) one hour on September 14 preparing interrogatories, and (4) two hours on September 17 preparing interrogatories. The final appearances of the Duffy case in Mr. Crumbley's billings show a conference with Mr. Goldstucker on October 23, 1979, and a one-hour review of proposed stipulations on November 14, 1979. In total, of the 36.25 hours Mr. Crumbley states he spent on matters for Sheriff Glass during his tenure as county attorney, 12 of those hours were spent in defense of Sheriff Glass and a deputy sheriff on a claim that the sheriff improperly supervised his office and jail. Because Mr. Crumbley saw a theoretical possibility of a future civil lawsuit by his client Jerry Banks against his client Jimmy Glass, he decided in April 1980 that it would be best to discontinue his representation of Sheriff Glass. Affidavit of Crumbley at ¶ 6. He discussed the matter with the Board of Commissioners, informing them that occasions might arise when their legal position would conflict with the sheriff's position, the Banks case being a case in point. Deposition of Crumbley at 50-55. Sheriff Glass was authorized to acquire his own attorney at county expense, and he hired Rod Meadows in April 1980. Deposition of Crumbley at 57-59. Mr. Crumbley later shared office facilities with Mr. Meadows during the period of time he represented Banks and Henry County and Mr. Meadows represented Sheriff Glass, although Mr. Crumbley insists he and Mr. Meadows never *1063 discussed Mr. Meadow's representation of the sheriff. Affidavit of Crumbley at ¶ 7. Having summarized the past activities of Mr. Crumbley in his representation of Sheriff Glass and Henry County, Georgia, the Court turns to the second question presented by the substantial relationship test. B. Reasonable Inferences the Court May Draw As to Whether the Confidential Information Allegedly Given Mr. Crumbley by Sheriff Glass or Henry County Would Have Been Given to Any Lawyer Representing Henry County. The defendants contend that because Mr. Crumbley's prior representation of Henry County and Sheriff Glass included his involvement in Duffy v. Goins, supra, a section 1983 action brought pursuant to Monell v. Department of Social Services, 436 U.S. 658, 98 S.Ct. 2018, 56 L.Ed.2d 611 (1978), which statute forms the basis of the potential liability of Sheriff Glass and Henry County in the instant suit, the Court must reasonably infer that confidential information was obtained by Mr. Crumbley that could bear directly on the issues of this case. Defendants contend that due to Monell's limitation of local government liability to "constitutional deprivations visited pursuant to governmental `custom' even though such a custom has not received formal approval through the body's official decision-making channels," 436 U.S. at 690-91, 98 S.Ct. at 2035-36, Mr. Crumbley's prior representation of Sheriff Glass and Henry County specially equips him for proving the policies and customs of Henry County in an unfair manner. Plaintiff's response to this contention by defendants is (1) the Board of Commissioners does not establish policy for the Sheriff's Department; (2) the Sheriff acknowledges that he never sought Mr. Crumbley's advice concerning any policy at issue herein, and the Sheriff does not oppose Mr. Crumbley remaining as counsel for plaintiff; (3) Plaintiff's cause of action accrued prior to Mr. Crumbley's association with the county; (4) The "policy" of Henry County and Sheriff Glass is publicly disseminated and therefore could not be the subject of a privilege; and (5) Defendants have shown no connection between Mr. Crumbley's prior representation of Sheriff Glass and Henry County and the present case. Keeping in mind that the Court's narrow focus is upon the reasonable inferences it may draw as to whether the confidential information concerning policy allegedly given Mr. Crumbley by his former clients would have been given any attorney in his position, the Court addresses plaintiff's five contentions seriatim. It is not the Court's purpose to examine the actual disclosures Mr. Crumbley's prior clients made to him concerning policy, for the reason for the irrebuttable presumption that such disclosures have been made when the subject of the present adverse representation is related to the former is to protect the lawyer-client relationship. T. C. Theatre Corp. v. Warner Bros. Pictures, 113 F.Supp. 265, 269 (S.D.N.Y.1953). The plaintiff's contention that the Board of Commissioners does not establish policy for the Sheriff is of no moment since the facts as outlined above clearly indicate that Mr. Crumbley was also counsel for the Sheriff for a substantial period of time. The Board of Commissioners is not a defendant in this case, which focuses the Court's attention on Mr. Crumbley's prior representation of Sheriff Glass and the policy he set for the county in his elected position. Plaintiff's second contention concerning his prior lawyer-client relationship with Sheriff Glass urges the Court to examine that prior relationship, a process that is prohibited by the "substantial relationship" rule. The "substantial relationship" rule "rests upon the presumption that confidences potentially damaging to the client have been disclosed to the attorney during the former period of representation. The court may not even inquire as to whether such disclosures were in fact made or whether the attorney in fact is likely to use the damaging disclosures to the detriment of *1064 his former client." In Re Yarn Processing Patent Validity Litigation, 530 F.2d 83, 89 (5th Cir. 1976). Plaintiff's contention that Sheriff Glass does not oppose Mr. Crumbley remaining as counsel for plaintiff merits the Court's consideration, however, for consent by a former client to the employment of an attorney by an adverse party prevents disqualification. Id; Consolidated Theatres v. Warner Bros. Circuit Management Corp., 216 F.2d 920, 926 (2d Cir. 1954). Plaintiff argues that in his deposition Sheriff Glass consented to Mr. Crumbley's representation of plaintiff when, in response to Mr. Crumbley's question as to whether he had objections to Mr. Crumbley's participation in this case as counsel for plaintiff, Sheriff Glass stated: "I really don't know how to answer your question, because I'm not that legally oriented and I don't know that much about the law, but in my professional opinion — I don't have a professional opinion, rather; but in my opinion, a lawyer can represent whoever he desires and whatever client that chooses his services, he certainly has a right to represent him in his way." Deposition of Glass at 5-6. As to Mr. Crumbley's question as to whether the motion to disqualify was brought at the sheriff's request, the sheriff refused to answer pursuant to his counsel's advice. Id. at 6. The Court finds the statement made by Sheriff Glass indicates a total lack of understanding by the sheriff of the Code of Professional Responsibility. The sheriff's "consent" to Mr. Crumbley's representation of plaintiff exists, if at all, without any knowledge by Sheriff Glass of his right not to consent. Such a "consent" is no consent at all. In any event, the Court is persuaded that because counsel for all defendants, including Henry County, has made the motion to dismiss, the current members of the Board of Commissioners, none of whose consent is on record, support the bringing of the motion. Those commissioners must appropriate the monies for insurance premiums on any policy which might pay plaintiff if her suit is ultimately successful in her claim against the county or must appropriate the monies to pay actual damages should her recovery exceed policy limits. Ga.Code Ann. § 23-1603 (1971). Their opposition to Mr. Crumbley's representation of plaintiff, through counsel, defeats plaintiff's second contention listed above. Plaintiff's third contention is that Mr. Crumbley was not county attorney when Sheriff Glass hired the defendant deputy sheriff who committed the alleged constitutional tort, a fact which plaintiff argues should defeat defendants' motion. This argument fails to convince the Court of Mr. Crumbley's isolation from the Sheriff's Department policies since the alleged constitutional violations of concealing relevant exculpatory evidence concerning the murders with which Banks was charged were continual. See Complaint at ¶ 31. The alleged facts on which plaintiff bases her claim in this action have yet to be publicly disclosed by the defendant government officials which is allegedly due, in part, to defendant Glass' failure to discipline the defendant deputy sheriffs. See Complaint at ¶ 31(c). Thus, plaintiff's third argument is without merit. Next, plaintiff contends Mr. Crumbley could not have learned the "policy" of Henry County and Sheriff Glass by way of confidential communications because "policy" of a governmental entity is publicly disseminated pursuant to Ga.Code Ann. §§ 23-802 and 40-2701 et seq. While those provisions of the Code of Georgia require public meetings of the governing bodies of all municipalities and counties with the exception of executive sessions held before or after said public meetings (Ga.Code Ann. § 23-802) and require open governmental records (Ga.Code Ann. § 40-2701), they do not provide for the open and affirmative disclosure of a county official's communications with his attorney or for the disclosure by a county sheriff of his policies with respect to training his deputies. The plaintiff's argument that "open government" negates the existence of the attorney-client privilege as to matters discussed between county officials and county attorney *1065 is meritless. See Ga.Code Ann. §§ 38-1605 and 38-419 (1981) (establishing attorney-client privilege with no such exception). Finally, the Court considers plaintiff's contention that defendants have failed to show any connection between the many discussions, meetings, and lawsuits participated in by Crumbley during his representation of Sheriff Glass and Henry County and the present case. This contention speaks not to the second task for the Court outlined above, but to the third, i.e., whether the confidential information allegedly given is relevant to the issues raised in the litigation pending against the former client. C. Whether the Confidential Information Allegedly Given Is Relevant to the Issues Raised in the Litigation Pending Against the Former Client. The Court's third inquiry is fairly straightforward. That which must be determined is whether the information Mr. Crumbley might have received from Sheriff Glass during his representation of him is relevant to the plaintiff's present suit against Sheriff Glass and Henry County. Crumbley was involved in the defense of a section 1983 suit against Sheriff Glass, see Duffy v. Goins et al., supra, in 1979 for constitutional error in the operation of the Sheriff's Department. The plaintiff's instant suit is based upon section 1983 and Monell, inter alia, alleging similar grounds for recovery. It is clear, therefore, that the confidential information that Mr. Crumbley might have received in the prior representation of the sheriff and county is relevant to the issues raised in the litigation pending against the sheriff and county. The Court's three-pronged inquiry being concluded, it appears to the Court that under the analysis employed above Canons 4 and 9 of the A.B.A. Code of Professional Responsibility prevent Mr. Crumbley from representing the plaintiff in this matter. Accordingly, defendants' motion to disqualify Mr. Wade M. Crumbley as counsel for plaintiff in the above-styled matter is hereby GRANTED. IV. Defendants' challenge to the continued representation of plaintiff by Mr. Harrison rests upon the following facts: (1) Mr. Crumbley and Mr. Harrison began to jointly represent Jerry Banks in 1978 (Deposition of Crumbley at 40-41); (2) Mr. Crumbley and Mr. Harrison shared office space, expenses, and a secretary from April 1979 until April 1980 (Deposition of Crumbley at 6-8); (3) Mr. Crumbley and Mr. Harrison presently share an office for the practice of law (Crumbley's deposition at 15-16). The challenge of defendants rests principally on the third fact above and is based on Disciplinary Rule (DR) 5-105(D) which states: If a lawyer is required to decline employment or to withdraw from employment under DR 5-105, no partner or associate of his or his firm may accept or continue such employment. 241 Ga. at 694. DR 5-105(D) as approved by the Georgia Supreme Court differs from DR 5-105(D) as proposed by the A.B.A. in that the A.B.A.'s rule disallows a partner or associate when his partner or associate is required to withdraw under any disciplinary rule, rather than just DR 5-105. The A.B. A.'s broader rule is not applicable to Mr. Harrison, and since the Court's disqualification of Mr. Crumbley rests upon Canons 4 and 9 and not DR 5-105, DR 5-105(D) is not grounds for the disqualification of Mr. Harrison even if he could be considered an associate of Mr. Crumbley's.[1] *1066 Plaintiff is correct that the courts have abjured a per se approach to the disqualification of co-counsel of disqualified counsel and should not presume disclosures of confidences by the disqualified former counsel where no attorney-client relationship has ever existed between the moving party and co-counsel to the disqualified attorney. Brennan's, Inc. v. Brennan's Restaurants, Inc., 590 F.2d 168, 174 (5th Cir. 1979). Consequently, Mr. Harrison should not be disqualified unless the movant has proved that he learned from Mr. Crumbley information the defendants had intended not be disclosed to the plaintiff. Id.; see also Duncan v. Merrill Lynch, Pierce, Fenner & Smith, 646 F.2d 1020, 1028 (5th Cir. 1981) (burden of proof in disqualification matter is on movant). The Court's focus, therefore, turns to what information defendants have shown Mr. Harrison learned from Mr. Crumbley during their association as co-counsel in this matter. Defendants' brief explains that Mr. Crumbley and Mr. Harrison were principally responsible for drafting the complaint in this action and formulating the legal theories and causes of action set forth therein. Deposition of Crumbley at 65-66. In their joint representation of Jerry Banks since 1978, Mr. Crumbley confirms that he and Mr. Harrison have discussed this case a great deal and that they have withheld no information concerning the case from one another. Deposition of Crumbley at 68-69. On the basis of these statements defendants contend that any confidential information available to Mr. Crumbley has undoubtedly been shared with or will be shared with Mr. Harrison. The Court cannot find that the defendants have met their burden of proof as outlined in Brennan's. The Court may not presume disclosures of confidences to co-counsel and the statements made by Mr. Crumbley in his deposition point to no such specific disclosures. In addition, Mr. Harrison states, by affidavit filed August 31, 1981, that he has never received any information from Mr. Crumbley concerning any issue in the above-styled case which carried the slightest indicia of its having been obtained by him in an attorney-client relationship with any of the defendants herein or with any official of Henry County. Affidavit of Harrison at ¶ 4. Defendants having failed to meet their burden as to Mr. Harrison, their motion for disqualification with respect to him is hereby DENIED. V. Finally, the Court examines the motion to disqualify Mr. Bobby Lee Cook as co-counsel for plaintiff. The legal tests applicable to Mr. Harrison are likewise applicable to Mr. Cook, as it is not alleged that he ever represented any of the defendants herein. Mr. Cook was not involved in this case as counsel for plaintiff until approximately a week to ten days prior to the filing of the complaint. On that day Mr. Crumbley and Mr. Harrison traveled to Mr. Cook's office in Summerville, Georgia, and spent about three hours summarizing the facts of the case for Mr. Cook. The discussion was general and did not include a review of the files of Messrs. Crumbley and Harrison by Mr. Cook. A few days later, after Messrs. Crumbley and Harrison drew the complaint for plaintiff, they returned to Summerville at which time Mr. Cook read and signed the complaint. Deposition of Crumbley at 67. On the basis of the above, defendants contend they have met their burden of proving that Mr. Cook learned from Mr. Crumbley information the defendants had intended not be disclosed to the plaintiff. To the contrary, plaintiff contends that the three hour discussion referenced above does not establish that confidences were actually communicated, an argument with which the Court is inclined to agree. Defendants have clearly failed to point to any specific information Mr. Crumbley disclosed to Mr. Cook which they had intended not be disclosed *1067 as a result of their previous attorney-client relationship with Mr. Crumbley. As a result, defendants' motion to disqualify Mr. Cook is DENIED. CONCLUSION The Court has conducted a sifting analysis of the facts, the law, and the questions presented by defendants' motion to disqualify all three of plaintiff's attorneys. The result is that Mr. Crumbley is disqualified and Messrs. Harrison and Cook are not. The Court has made these holdings with consciousness of its responsibility to preserve a reasonable balance between the need to ensure ethical conduct on the part of lawyers appearing before it and other social interests, which include the litigant's right to freely chosen counsel. NOTES [1] While Fifth Circuit decisions have relied upon the A.B.A. Code of Professional Responsibility in reviewing motions for disqualification of counsel, the court's references to the A.B.A. Code have not precluded this Court's reliance on the Code as adopted by the Supreme Court of Georgia and made applicable to members of the State Bar of Georgia, an integrated bar. See Woods v. Covington County Bank, 537 F.2d 804 (5th Cir. 1976) (Code carries great weight). Because the Code as adopted by the Supreme Court of Georgia is the general guide of ethical standards by which Georgia lawyers must conduct themselves, 242 Ga. at 651, for this Court to impose upon Georgia lawyers the standards of the A.B.A. Code when inconsistencies arise would place Georgia attorneys in a delicate situation. Consequently, the Code of Professional Conduct as adopted by the Supreme Court of Georgia governs the conduct of members of the State Bar of Georgia practicing before this Court.
Mid
[ 0.582978723404255, 34.25, 24.5 ]
RBA’s Lowe: “Probability of Recession is Low” The probability of recession in Australia is low, but a period of contraction in the economy can’t be ruled out, the Reserve Bank of Australia says. Philip Lowe, deputy governor at the Reserve Bank of Australia, said despite the country’s record of 24 years without recession, predictions of unending expansion would be misplaced. “The probability of recession is low, but there is a probability that at some point we will have a downturn,” Mr Lowe told a conference. “The idea that the Australian economy can just keep growing without having short periods of contraction is a mistake. What we should be hoping for is that, when those periods inevitably happen, that they are short-lived,” he added. Mr Lowe said the RBA still retained an upbeat view of the economy. “We think the economy’s on a gradually improving track; that the unemployment has stabilised; that growth has been 2.0 per cent to 2.5 per cent for a while, but will gradually pick up,” he said. Australian private trader for nearly 20 years, author, trading coach, licensed adviser and regular speaker at major trading events all around the world. Graduate of RMC Duntroon and former Australian Army Officer.
Mid
[ 0.604347826086956, 34.75, 22.75 ]
#41 Ferris Bueller’s Day Off “The question isn’t what are we going to do, the question is what aren’t we going to do?” I think everyone’s always tried to get themselves a free day off school as a teenager. Hell, even as adults, we all usually want days off work. Ferris Bueller’s Day Off is basically every teenager’s fantasy, the ability to sneak a day off school and enjoying yourself as much as possible without any major consequences. Matthew Broderick plays the titular character, a charming, devious 17-year old with a plan to having the best day of his life, and to do so, he needs to take some time off school. Tricking his parents into believing he’s sick, he grabs his genuinely sick friend Cameron (Alan Ruck) and finds a way to pull his girlfriend Sloane (Mia Sara) out of class, and together they go off and live it up. Meanwhile, uptight principal Mr Rooney (Jeffrey Jones) is determined to stop his plans by any means necessary. The movie doesn’t have the most realistic premise in the world, as Ferris manages to get away with murder far too easily, and some of the characters’ actions are just plain silly. But that’s the whole point. The movie is fulfilling the fantasy I mentioned in the first paragraph. As viewers, we live vicariously through Bueller and just forget about the ramifications of it all. Yet, while the actions themselves aren’t too realistic, the themes behind them certainly are. Initially Bueller seems self-centred and arrogant, as he selfishly drags his friends into his own personal escapade, but underneath all this there’s a theme of close friendship and the transition from adolescence to adulthood. At a few points there are hints that this may be Bueller’s last chance to have as much fun as possible with those he cares about before reality takes hold – which, in a way, makes the silly fantasy nature of the whole thing all the more effective. He even talks about the way his friendship with Cameron may not last as they move into college and jobs later in life, and Sloane picks up on there being ulterior motives to his plotting. Of course, even without this underlying interpretation to give the film depth, the movie is highly entertaining. John Hughes gained a reputation for producing some seriously great 80s and early 90s comedy romps, and it’s clear from this exactly why, as it’s a stellar example of what he was capable of. The jokes are clever, and even when you expect what’s coming (Bueller hands the keys to Cameron’s father’s car to a shady looking garage attendant, guess what happens next?) the payoff is always able to raise chuckles. It isn’t even the love letter to the 80s I was expecting. Much of the film remains timeless and could easily be happening during any era. There are plenty of 80s throwbacks in here, but mostly as background details, such as a Simple Minds poster in Bueller’s bedroom. The only thing that betrays the timelessness is the brief musical interlude during a parade scene, which feels like filler. Of course it isn’t perfect. As stated, sometimes Bueller’s scheme seems far-fetched and based entirely on both his parents and Mr Rooney being a bit stupider than they’d ever be expected to be in reality. It was very similar to what was seen in another John Hughes-penned film, Home Alone, where Kevin’s schemes also rely on the stupidity of the adults around him. There are even frighteningly similar scenes involving a grown man sticking his head through a pet door. Sometimes the believability of these sequences is stretched to breaking point, particularly when Bueller passes by his father on a number of occasions and is ignored. Overall, Ferris Bueller is a fun comedy with a few minor flaws that is ultimately an entertaining 90 minutes. Favourite Scene: The car valets drive Cameron’s father’s fancy car through Chicago while the theme from Star Wars plays. What do you mean it’s not awesome?Scene That Bugged Me: Like Being John Malkovich, a Charlie Sheen cameo distracted me by expecting him to say “winning” at any given moment. God knows how I’m making it through Platoon. Watch it if: Bueller’s day was your dream in high schoolAvoid it if: You actually liked high school
Mid
[ 0.62200956937799, 32.5, 19.75 ]
The charity received $17.5 million from DialogueDirect donors between October 2011 and September 2012 and paid $7.2 million to DialogueDirect over the same period. Revenue generated from DialogueDirect includes money given by donors recruited in previous years who are still giving during the time period of the financial report, while the money paid to the company is only for that time period, according to the charity. That fundraising investment represented about 4 percent of the charity's total expenses — about $158 million — during that time period, according to the charity's financial records.
Low
[ 0.502325581395348, 27, 26.75 ]
-- OPENTOMB LEVEL SCRIPT -- FOR TOMB RAIDER 3, TEMPLE.TR2 print("Level script loaded (TEMPLE.lua)"); level_PostLoad = function() addCharacterHair(player, getHairSetup(HAIR_TR3)); playStream(34); end; level_PreLoad = function() -- STATIC COLLISION FLAGS ------------------------------------------------------ -------------------------------------------------------------------------------- end;
Mid
[ 0.646090534979423, 39.25, 21.5 ]
Instability of Doppler cerebral blood flow in monochorionic twins. The purpose of this study was to evaluate Doppler flow velocity changes in cerebral vessels of monochorionic twins with twin-twin transfusion syndrome (TTTS). Repeated Doppler umbilical and cerebral blood flow studies were performed in 7 twin pairs with TTTS. Eight monochorionic twin pairs and 11 dichorionic twin pairs served as control groups. The following Doppler parameters were assessed: umbilical artery pulsatility index (PI), middle cerebral artery (MCA) PI, cerebroplacental ratio, delta PI between the umbilical artery and MCA, and peak systolic velocity (PSV) in the MCA. Significant variations in PSV in the MCA and cerebral indices were found in the study group of monochorionic twins with TTTS. Periods of high PSV with low PI in the MCA were followed by lower PSV in the same fetus. Repeated measurements in the comparison groups were stable without significant variations. The delta cerebroplacental ratio was significantly higher in the study group (0.38 versus 0.09 and 0.19 in the comparison groups; P < .02). Significant changes in Doppler flow velocity and indices suggest instability of cerebral blood flow with episodes of "hyperperfusion" in monochorionic twins with TTTS. Further studies are needed to elucidate the relationship of these transient changes to neurologic sequelae in the neonate.
High
[ 0.658476658476658, 33.5, 17.375 ]
A review of root resective therapy as a treatment option for maxillary molars. Restorative treatment planning is often confounded when periodontal attachment loss, caries or tooth fracture involves the furcation area of the tri-rooted maxillary molars. Although such involvement invariably diminishes the long-term prognosis of the affected teeth, extraction is not always an option. Root resective therapy, which removes the involved root plus its associated crown portion (trisection), is one of several treatment modalities that can be used in such cases. This article reviews the indications and contraindications for root resective therapy, describes the techniques of surgical trisection and presents a case in which combined resective, endodontic and prosthetic management resulted in a successful outcome.
High
[ 0.6862996158770801, 33.5, 15.3125 ]
1. Field of the Invention The invention relates in particular to a machine bed for forming machines, in particular hydraulic presses. 2. Background and Relevant Art Beds and bed structures, in particular of reinforced concrete, for machines are adequately known. In the case of machines such as forming machines, e.g. hydraulic presses, during operation considerable forces act on the beds on which said machines are mounted. Said forces can impair, among other things, the stability and strength of the beds and in this way can reduce the service life of the bed.
Mid
[ 0.608, 28.5, 18.375 ]
Spice : Sugar and Spice Publisher's Summary Nadia Spiceland works in the business of temptation. The confections she crafts at the Sugar and Spice Bakery and Café lure in the locals. But one customer is interested in more than just her delectable sticky buns. Kane Sullivan teaches human sexuality at the nearby college, where coeds are clamoring for seats in his lectures. Nadia is reluctant to his advances, yet she also has needs. Who better to fulfill them than the man who's referred to as "Dr. Sex" by his female students? Soon Kane creates a hunger in Nadia that nothing can satiate. It weakens her, and that's something she cannot risk. Not again. But Kane's masterful touch might just be powerful enough to melt her heart - and free her to trust again. Contains mature themes. Sorry for the Short Delay Unfortunately, that depends on our systems, and they're keeping it to themselves. It could take a few minutes, but there's a chance it will be longer. We recommend that you check back with us in a few hours, when your title should be available for download in My Library. We appreciate your patience, and we apologize for the inconvenience. Please contact customer service if the problem persists. (888) 283-5051
Low
[ 0.5199063231850111, 27.75, 25.625 ]
Thursday, April 24, 2014 Some bean counter must have got his estimations wrong. After years of clamping progressively downward on the Federal Skilled Worker program, CIC announced Wednesday that it is opening the program up to 50 NOC categories (up from 29 in the last iteration of the program) and 25,000 applications. Here are some details from the CIC: On April 26, 2014, Citizenship and Immigration Canada (CIC) will issue a new set of Ministerial Instructions to immigration officers regarding the processing of applications to the Federal Skilled Worker Program (FSWP), Federal Skilled Trades Program (FSTP), and Canadian Experience Class (CEC). Effective May 1, 2014, the following measures will be in place: Federal Skilled Worker Program: Federal Skilled Workers are chosen as permanent residents based on their ability to prosper in Canada. They are assessed according to a selection grid made up of six factors, including language, education, work experience, etc. Overall cap of 25,000 applications in eligible occupations stream. Cap of 500 applications for PhD eligibility stream No limit on applicants who have a valid job offer from a Canadian employer Sub-caps of 1,000 applications for each of the 50 eligible occupations below (their 2011 National Occupational Classification (NOC) code is included in brackets): Senior managers – financial, communications and other business services (0013) Tuesday, April 22, 2014 Robert Vineberg is a Senior Fellow at the Canada West Foundation. He was formerly Director General of Citizenship and Immigration Canada’s Prairies and Northern Territories Region. He is also the author of the book "Responding to Immigrants’ Settlement Needs: The Canadian Response".Would-be immigrants to Canada continue to face a series of bureaucratic impediments that either delay their status or reduce the effectiveness of integration once they arrive here. Fixing these problems is long overdue.Read more Tuesday, April 15, 2014 April 8, 2014 — Ottawa — Canada’s Citizenship and Immigration Minister Chris Alexander today announced that Canada’s active recruitment model for economic immigration will officially be called “Express Entry.” Set to launch in January 2015, “Express Entry” is a major step forward in the transformation of Canada’s immigration system into one that is fast, flexible and focused on meeting Canada’s economic and labour needs. “Express Entry” will allow for greater flexibility and better responsiveness to deal with regional labour shortages, and help fill open jobs for which there are no available Canadian workers. “Express Entry” candidates who receive a valid job offer or nomination under the Provincial Nominee Program (PNP) will be quickly invited to apply for permanent residency – a key distinction between “Express Entry” and the Temporary Foreign Worker Program, which is only used to fill temporary labour and skill shortages. Formerly referred to as “Expression of Interest”, “Express Entry” will be open to skilled immigrants and allow the government to select the best candidates who are most likely to succeed in Canada, rather than those who happen to be first in line. It will also prevent backlogs and allow Citizenship and Immigration Canada (CIC) to better coordinate application volume with the annual immigration levels plan. Thursday, April 10, 2014 I would like all employers out there to consider dropping the phrase "Canadian experience" from their vocabularies. This subtle form of discrimination is keeping thousands of immigrants from getting work that they are fully qualified to perform. By using this phrase, whether in an interview, or in an internal screening process, you are effectively practicing a form of discrimination through exclusion and also a very negative form of nationalism. Think about this: Canada has one of the highest percentages of permanent residents that become citizens in the world - over 80% at last count. When you exclude a fully qualified immigrant from contributing to your company solely because they haven't worked for a Canadian employers for X-years, you are actually doing a great harm in the long term to your own country. I've been asked the "Canadian experience" question on a number of interviews, and as soon as it's asked, I know the job isn't mine. I know that the person asking has a built-in bias that somehow all the years of experience I bring to the table mean nothing unless that experience is in Canada. Think about how crazy that is. Let's say your hiring a Toyota mechanic. You have a choice between someone who has 10-years of experience in Japan, or someone who has two years of Canadian experience. No question of who should get the job, eh? But in Canada, subtle things come into play. Without Canadian experience, will the employee be able to "fit in to the culture"? Do they have the "soft skills" that Canadians possess? I'm asking all employers out there to expunge the phrase "Canadian experience" from your vocabulary. Think about the long term. Heck - think about the short term too! Simply hire the best person for the job, no matter what. Wednesday, April 02, 2014 Here's the latest from the CIC, and the really good news is that this is not an April Fools joke! April 1, 2014 — Ottawa — Approximately 33,700 people from 199 countries became Canadian citizens at citizenship ceremonies held across Canada in March 2014. This is almost twice as many compared to March 2013 when 17,089 people were granted citizenship across Canada. Canada’s new citizens were welcomed at 312 citizenship ceremonies held across the country, from college campuses to Citizenship and Immigration Canada offices, to special ceremonies at railway stations and designated heritage sites. These high numbers demonstrate that changes and improvements in effect over the past year have already made the system more efficient and resulted in a decreased backlog, helping more people realize their dream of becoming Canadian sooner. The government’s proposed changes in Bill C-24, the Strengthening Canadian Citizenship Act, will further reduce wait times by streamlining the decision-making process for citizenship. It is expected that these changes will bring the average processing time for citizenship applications down to under one year and that the current backlog will be reduced by more than 80 percent by 2015-2016. Quick facts So far in 2014, Canada has welcomed more than 75,900 new citizens at 759 ceremonies across Canada. Comparatively, in the first three months of 2013, Canada welcomed 35,320 new Canadians. In 2013, 128,936 people were granted Canadian citizenship—an average of 10,745 each month. Since 2006, Canada has enjoyed the highest sustained levels of immigration in Canadian history—an average of 257,000 newcomers each year. Accordingly, the demand for citizenship has increased by 30 percent. Canada has the highest rate of naturalization in the world—85 per cent of eligible permanent residents become citizens. Citizenship and Immigration Canada received 333,860 citizenship applications in 2013, the highest volume ever.
Low
[ 0.524229074889867, 29.75, 27 ]
The Boston Marathon jihad mass murderers used pressure cooker bombs. An al-Qaeda online magazine explains to young Muslims how they can build one. Will the Islamophobia never end? “Indiana teen accused of supporting ISIS, terrorism,” by Justin L. Mack and Madeline Buckley, Indianapolis Star, June 21, 2016: An Indiana teenager accused of attempting to join ISIS is now facing federal charges. According to a federal criminal complaint, 18-year-old Akram I. Musleh of Brownsburg has been supporting the terrorist organization online for years. He was arrested by FBI agents Tuesday while attempting to board a bus from Indianapolis to New York where he was to fly to and transit through Morocco to ISIS-controlled territory. Court documents allege that from there, his plan was to join ISIS…. FBI investigators learned that Musleh’s YouTube account shared videos of Anwar al-Awlaki , the late U.S.-born leader of al-Qaeda. Investigators spoke with Musleh at Brownsburg High School. The teen said he was aware of Al-Awlaki’s history and only used the videos to better understand the history of Islam. But nine months later, Musleh went online and purchased the flag flown by ISIS, also known as ISIL, according to court documents. In June 2015, he posted a photo of himself in front of the flag. Court documents say that he also used online communication to show his affiliation and support of ISIS. Investigators believe that Musleh attempted to travel to other countries to provide material support of ISIS, including himself as personnel. Brownsburg police also responded to an incident in Williams Park where Musleh is accused of asking young people if they wanted to join ISIS. Throughout 2015, Musleh made five reservations to travel to Iraq or Turkey, court documents said. FBI officials noted that Turkey is a common entry point to Syria for citizens of western countries who wish to join ISIS. His planned trips in April and May 2015 fell through. In late June 2015, he attempted to board a flight in Chicago, but was stopped and questioned by U.S. Customs and Border Protection. Court documents said he first told investigators that he was going to visit family. He then said he was going to get married. FBI officials learned that while he had no family in Turkey, he did have an alleged fiancee living in Sweden, who officials believe is an ISIS sympathizer. A search of Musleh’s baggage revealed that he was carrying a journal full of quotes by known terrorist leaders Abu Musab Zarqawi , Abdullah Azzam , Anwar al-Awlaki and Osama bin Laden . In April 2016, Musleh purchased a one-way ticket from John F. Kennedy International Airport in New York to Morocco, court documents said. He also purchased a Greyhound bus ticket to travel from Indianapolis to New York on Tuesday. About a month after buying his plane and bus tickets, Musleh viewed a news article about an Indiana Department of Homeland Security list of about 8,500 potential terror targets in Indiana, court documents said. Around that same time, he researched explosive materials online. He also was seen shopping for pressure cookers by an FBI agent in the Brownsburg Wal-Mart. Court documents state that pressure cookers are used as a component in improvised explosive devices. In the days after making his travel plans, according to records, Musleh had a conversation on social media expressing his desire to travel outside of the country to join ISIS…. A Google Plus account that is connected to a YouTube account highlighted by investigators as belonging to Musleh shows posts and comments on YouTube videos, at least one of which included a reference to ISIS. In some videos the user of the account, presumably Musleh, shared his views on Islam. In others, he appeared to advocate for violence. In 2013, he commented on a video that referenced Hitler, writing, “Gays are going to hell.” On another video shared on his Google Plus account in 2014, he wrote [sic]: “Someone Should Of Shot All Those Cops And Then Burn There Bodies.” The video purports to show a 2010 attack on Swedish cartoonist Lars Vilks, who angered some at a speech at a Swedish university when he showed a film that depicted Muhammad walking into a gay bar. In another video shared in 2014, he commented on an explainer of the Iraq War, writing: “A bunch of lies the Isis never kidnapped children.” The account has a tagline that reads: “ I am a Muslim, not a terrorist.” He posted on the account that he loves playing football, basketball and soccer.
Low
[ 0.503846153846153, 32.75, 32.25 ]
The N terminus of antizyme promotes degradation of heterologous proteins. Regulated degradation of ornithine decarboxylase (ODC) is mediated by its association with the inducible protein antizyme. The N terminus of antizyme (NAZ), although unneeded for the interaction with ODC, must be present to induce degradation. We report here that covalently grafting NAZ to ODC confers lability that normally results from the non-covalent association of native antizyme and ODC. To determine whether NAZ could act similarly as a modular functional domain when grafted to other proteins, we fused it to a region of cyclin B (amino acids 13-90) capable of undergoing degradation or to cyclin B (amino acids 13-59), which is not subject to degradation. The association with NAZ made both NAZ-cyclin B13-90 and NAZ-cyclin B13-59 unstable. Furthermore, NAZ and cyclin B 13-59 were together able to induce in vitro degradation of Trypanosoma brucei ODC, a stable protein. The ODC-antizyme complex bound to the 26 S protease but not the 20 S proteasome, consistent with the observation that ODC degradation is mediated by the 26 S protease. The association was shown to be independent of NAZ, suggesting that NAZ does not act as a recognition signal.
Mid
[ 0.6456043956043951, 29.375, 16.125 ]
1. Field of the Invention The present invention relates to a light-frequency control apparatus appropriate for use in, for example, the light source of a frequency multiplex transmission system or the like. 2. Prior Art Recently, light-frequency control apparatuses which generate CW (continuous wave) light having a pre-specified light frequency have been developed, and an example of the structure thereof will be explained with reference to FIG. 4. In the Figure, reference numeral 1 indicates a reference power source which generates a reference voltage and outputs this as a reference signal. Reference numeral 2 indicates a comparison circuit, which compares the reference signal supplied to one input terminal and a feedback signal (described hereinbelow) supplied to the other input terminal, and generates a difference signal expressing the difference between the signals. Reference numeral 3 indicates a light frequency control circuit, which generates a light frequency control signal in accordance with the difference signal supplied from comparison circuit 2. Reference numeral 4 indicates an E/O (Electrical signal to Optical signal) conversion circuit, which generates CW light having a light frequency corresponding to the light frequency control signal which is supplied from light frequency control circuit 4. Reference numeral 5 indicates an optical coupler which conducts the CW light outputted from E/O conversion circuit 4 to light output terminal 6, and supplies a portion of the CW light to light frequency discriminator 7. Light frequency discriminator 7 discriminates the light frequency of the CW light outputted from E/O conversion circuit 4 and generates an electrical signal in correspondence with this light frequency, and supplies this to comparison circuit 2 as the feedback signal described above. In accordance with this type of structure, the CW light which is outputted from E/O conversion circuit 4 is inputted into light frequency discriminator 7 through the medium of optical coupler 5, and is converted into a feedback signal in correspondence with the light frequency of the CW light. Next, comparison circuit 2 compares this feedback signal with the reference signal, and based on the results of the comparison, the light frequency of the E/O conversion circuit 4 is controlled by means of the light frequency control signal which is generated by light frequency control circuit 3; that is to say, the feedback control of the closed loop is conducted. In the conventional light-frequency control apparatuses described above, in the case in which the closed loop gain was sufficiently large, the degree of frequency stability of tile optical output signal was determined by the operational characteristics of the light frequency discriminator 7. Normally, there were a great number of cases in which a Fabry-Perot resonator was employed in the light frequency discriminator 7. However, Fabry-Perot resonators commonly possesses a plurality of resonance frequencies, so that it was unclear at which resonance point resonance would occur, and there were problems in that the absolute value of the light frequency was unclear, it was impossible to control the light frequencies extending over intervals greater than those between resonance points, and such resonators were susceptible to disturbances such as temperature or the like. Accordingly, in apparatuses employing light frequency discriminator 7 having such defects, there was a problem in that it was impossible to generate stable CW light at freely selected light frequencies.
Mid
[ 0.5474137931034481, 31.75, 26.25 ]
Q: Why does Resharper want to apply camel-case to private methods? Is there any way to tell to Resharper that methods should have different naming conventions depending on the access modifier as suggested for example here? I mean for example: private methods lowerCamelCase public methods UpperCamelCase etc... A: Sure, just go to ReSharper Options | Code Editing | C# | Naming Style, click Advanced Settings and then Add to add your custom rules. The extended naming rules let you define things like member visibility, whether it's static, and so on.
High
[ 0.715008431703204, 26.5, 10.5625 ]
I bow to no one in my distaste for food-fight politics. I don’t want to dine with absolutists and ideologues hurling red meat at each other. For that matter, I have long amused myself with visions of baby boomers carrying the same old conflicts into old age, dividing into pro- and anti-Vietnam nursing homes. So I am drawn to the brand known as Generation Obama. This presidential candidate has repeatedly offered himself as the post-boomer, the one person in the race who can take us past the great divides of the last 40 years. In announcing his candidacy, Obama used the word “generation” 13 times. In “The Audacity of Hope,” he described boomer politics with something close to disdain as a psychodrama “rooted in old grudges and revenge plots hatched on a handful of college campuses long ago.” On TV, he described Hillary Clinton and others as people who’ve “been fighting some of the same fights since the ’60s.” This post-boomer theme is spun out in Andrew Sullivan’s recent piece in The Atlantic, where he writes that “if you are an American who yearns to finally get beyond the symbolic battles of the boomer generation and face today’s actual problems, Obama may be your man.” It can be found as well in the label that Ross Baker, a Rutgers political scientist, put on Obama: “the post-polarization candidate.” But slowly, all this generation talk has forced me to revisit not just boomer politics, but the nature of polarization in a country that may be poles apart. To begin with, if Obama represents the “post-polarization” generation, what was the “pre-polarization” generation? The idea of some tranquil 1950s America is surely exaggerated. There were great struggles over McCarthyism and nuclear testing, to name just two issues. As for the consensus that existed in the 1950s? Columbia’s Todd Gitlin says, “There was a consensus that nothing much ought to be done to yank the former Confederacy out of the age of Jim Crow. There was complacency about the position of women. Complacency about the belligerence with which the U.S. occasionally overthrew uncongenial foreign governments.” Are we nostalgic for that? The ’60s opened up huge and important conflicts. It was not all about boxers or briefs, inhaling or not. Issues surfaced around black and white relationships, male and female relationships, gay and straight relationships, all kinds of authority and our place in the world. These still go on. Not because they are relics of old college dorm fights but because they are still important and unresolved. Did Democrats go down in the last two presidential elections because they were locked in a stale old fight, or because they lost that fight? Now we come to the 2008 primary season. Barack Obama is an appealing icon of change. In reading “Dreams From My Father,” I was engaged by a description of his half-sister’s dilemma – torn between the Western values of individual success and the African values of community. He has the capacity to turn a problem around, roaming across its many surfaces. He gets it. His philosophical frame of mind appeals to the educated elite of the Democratic Party. His largest group of supporters are college-educated. But I am forced to ask, against my own grain, whether Democrats need a philosopher or a combatant. In his stump speech, Obama says, “I don’t want to spend the next year or the next four years refighting the same fights. … I don’t want to pit red America against blue America.” Neither do I. `Post polarization’ generation Can’t we just get along? is pitted against blue America? Obama is a notoriously uneven performer. Alone on a stage, he is often eloquent and inspirational, if I may use an Oprah word. But on the debate platform with his opponents, he is, well, less impressive. Temperamentally he prefers to be above the fray. But the campaign against any Republican will take place in the fray. Gitlin, author of “The Bulldozer and the Big Tent,” says, “In a family situation, we need a healer.” But in an era of ugly politics? “We don’t need healing but resounding defeat. … The bulldozer can’t be kissed into submission.” Maybe I am suffering from too little “audacity of hope.” Or an excess of experience. The Democratic nominee won’t have the luxury of a do-good campaign. Even a post-polarization candidate would face a polarized politics. There’s still a difference between being an icon of change and an agent of change. And there is a difference as well between being a fine philosopher king and a strong presidential challenger.
Mid
[ 0.551020408163265, 27, 22 ]
Nautamlal Bhagavanji Mehta Nautamlal Bhagavanji Mehta, or the Nagar Sheth of Jetpur (2 September 1879 – 2 September 1968) was an Indian independence activist and a supporter of Mahatma Gandhi. He was also a prominent businessman and a pioneer of the Gandhian Movement in Gujarat. He is also believed to be the first to bestow the title "Mahatma" to Gandhi, not Rabindranath Tagore, as many believe. Mehta wrote a manpatra using the term, which has been authenticated by the National Gandhi Museum in New Delhi. However there is a Genuine claim that the Peethadhipati of the Bhuvaneshwari Peeth in Gondal (Also called the Gondal Peeth) in Gujarat was the first person to bestow the title of Mahatma to Late Shri Mohandas Karamchand Gandhi, soon after he returned to India from South Africa. This can be verified from the present Pethadhipati of the Gondal Peeth. References Category:Indian independence activists from Gujarat Category:People from Gujarat Category:1879 births Category:1968 deaths
Mid
[ 0.6183574879227051, 32, 19.75 ]
All relevant data are within the paper and its Supporting Information files. Introduction {#sec009} ============ For the past decades, with the rapid development of instruments and optic technique, percutaneous endoscopic lumbar discectomy (PELD) has been increasingly applied around the world with the advantages of a small incision, local anesthesia, no neuromuscular retraction, rapid recovery, short operation time and low postoperative expenses\[[@pone.0144939.ref001]--[@pone.0144939.ref004]\]. Similar to other minimally invasive spinal surgeries, PELD in transforaminal approach (PTED) also requires numerous punctures under X-ray fluoroscopy. Puncture may be repeated for inexperienced surgeons when accurate locating was not achieved, which induces increased injuries of surrounding tissue, more operation time and much more radiation exposure to patients and medical workers. To improve the accuracy of location and reduce potential radiation exposure, we designed a surface locator and applied it in all kinds of spine surgery, which could accurately locate and mark the target point on the body surface \[[@pone.0144939.ref005]--[@pone.0144939.ref008]\]. Our previous studies have demonstrated that our surface locator induced less radiation exposure, shorter preoperative time and less frequency for fluoroscopy\[[@pone.0144939.ref007]\]. However, decreasing the radiation during preoperative location is not enough for PTED, because most repeated fluoroscopy is conducted during the puncture procedure, which usually results in highly cumulative radiation and longer operation time. Therefore, we designed a novel puncture locator combined with surface locator as HE's Lumbar LOcation (HELLO) system for PTED and performed a preliminary cadaveric study to investigate its efficacy of puncture reduction. Materials and Methods {#sec010} ===================== Specimens {#sec011} --------- The study was approved by the local Institutional Review Board of Shanghai Tenth People's Hospital (ethical approval: 2015-RES-127). From July 8^th^ to 26^th^ 2015, all cadavers were donated by the Department of Anatomy, Tongji University School of Medicine and the Second Military Medical University. The Institutional Review Board waived the need for consent from the donors or their kin. All cadaveric specimens had no obvious lumbar vertebra deformity, trauma defects induced by lumbar fracture under fluoroscopy and no previous lumbar surgery. All operating processes and procedures followed the local cadaveric management standards, and the manuscript also followed the reporting guideline ([S1 Table](#pone.0144939.s002){ref-type="supplementary-material"}). HELLO system {#sec012} ------------ HELLO system consists of surface locator and puncture locator ([Fig 1](#pone.0144939.g001){ref-type="fig"}). Surface locator is made up of radiopaque material, which consists of 19 horizontal rods and 4 longitudinal rods\[[@pone.0144939.ref007]\]. Each horizontal rod is about 9 cm, whereas each longitudinal rod is about 18 cm. There is about 1-cm gap between each horizontal rod, and different small shape-markers are made on the rods. The stamping die technology and the 1-step forming technology were applied to manufacture the locator. As demonstrated in [Fig 1A](#pone.0144939.g001){ref-type="fig"}, the location principle of surface locator is to identify the target with the surrounding rod and shape-markers. The puncture locator is a three-dimensional structure, mainly composed of a vertical beam, a cross beam and two horizontal beams. The location theory of puncture locator is that the target point form a fixed rectangle with the vertical beam and cross beam, and the puncture trajectory go through the target ([Fig 1B](#pone.0144939.g001){ref-type="fig"}). The surface locator of HELLO system was used to accurately position the puncture target, and the puncture locator was used to keep the puncture in tract. ![The schematic diagram of HELLO system.\ A: location theory of surface locator; B: location theory of puncture locator; C: real practice of surface locator; D: real practice of puncture locator.](pone.0144939.g001){#pone.0144939.g001} The procedure of puncture with HELLO system was as follows ([Fig 2](#pone.0144939.g002){ref-type="fig"}): Firstly, we used surface locator to determine vertical projection of target point on the cadaveric back under anteroposterior fluoroscopy, and the vertical projection of target point on the lateral cadaveric specimens was also confirmed under lateral fluoroscopy. Then, we marked A and B on the skin of the target projection. Next, we fixed the puncture locator on the horizontal operation table, and vertical beam and cross beam were placed to coincide with A and B. At this time, the target point with the vertical beam and cross beam formed a fixed rectangle, and the two probes and two skin markers were on the long side of the rectangle. Next, the puncture locator in fixed rectangular shape was removed away from the operation table for convenient installation of horizontal beams. According to anatomic structures of puncture segment, the horizontal beams and puncture cannula were adjusted to make two puncture cannulas and target at the same line. Then, we kept the position of horizontal beams and cannula. Finally, locator was fixed on the horizontal operation table, and the vertical beam and cross beam were placed to coincide with A or B. Since the puncture target was accurately located and the puncture could be kept in tract, the appropriate trajectory was finally determined by the entry point. Generally, the distance between the puncture point and the midline of the spinous process was 11--14 centimeters at L4-L5 level, and 12--16 centimeters at L5-S1 level. At that moment, the specific Kirschner was inserted directly to reach target point along the puncture cannula. ![The schematic procedure of HELLO system.\ A: the attachment of surface locator; B: skin marker of puncture target; C: positioning of puncture locator to the lateral marker; D: positioning of puncture locator to the back marker; E: positioned condition and fixation of puncture locator; F: puncture trajectory to the target.](pone.0144939.g002){#pone.0144939.g002} Grouping and puncture procedure {#sec013} ------------------------------- The target puncture segment was L4/L5 and L5/S1 of both sides of each cadaveric specimen. In Group A, the senior surgeon performed the puncture of left L4/L5 and L5/S1 with the assistance of HELLO system. In Group B, the senior surgeon performed the puncture procedure on the right L4/L5 and L5/S1 of cadavers with conventional methods. In Group C, the junior surgeon without PELD experience performed the puncture on the left L4/L5 and L5/S1 of cadavers. The cadavers were placed on operation table in prone position, and the C-arm X-ray machine (ARCADIS Varic, Siemens) was used for intraoperative fluoroscopy with fluoroscopy time 1 second each time. The surface locator was used for preoperative location, with which the position of lumbar spinous process, pedicle, intervertebral space, target point and articular process were confirmed and marked ([Fig 3A and 3B](#pone.0144939.g003){ref-type="fig"}). Intervertebral foreman and intervertebral space were also marked on the body surface laterally. Group A and Group C underwent locator-assisted puncture by the senior and junior surgeons respectively until kirschner wire was located on the medial pedicle margin in the anteroposterior view and at upper articular process of lower vertebrae on the lateral view ([Fig 3C--3F](#pone.0144939.g003){ref-type="fig"}). Group B underwent conventional puncture procedure by senior surgeon with 18G needle inserted into intervertebral foreman of L4/5 and L5/S1 until 18G needle was located on the medial pedicle margin in the anteroposterior view and at upper articular process of lower vertebrae in the lateral view. ![Fluoroscopy of HELLO system on cadavers.\ A: anteroposterior fluoroscopy of the vertebrae with surface locator; B: lateral fluoroscopy of the vertebrae with surface locator; C: final puncture under anteroposterior fluoroscopy at L4/L5 level; D: final puncture under lateral fluoroscopy at L4/L5 level; E: final puncture under anteroposterior fluoroscopy at L5/S1 level; F: final puncture under lateral fluoroscopy at L5/S1 level.](pone.0144939.g003){#pone.0144939.g003} Observational parameters {#sec014} ------------------------ Puncture times, anteroposterior and lateral fluoroscopy frequency of each segment, the time of locating puncture and accumulated radiation dose were recorded and analyzed. JB4020X-γ personal radiation alarm apparatus (Shanghai Jing Bo Industry & Trade Co., LTD) was used to detect the accumulated radiation dose for each segment. Statistical analysis {#sec015} -------------------- The software package SPSS 12.0 (USA, SPSS Corporation) was used for statistical analysis. The statistic was demonstrated as Mean±SD. ANOVA test was used to compare the difference among the three groups. P \<0.05 was regarded as statistical significance. Results {#sec016} ======= There were 6 cadaveric specimens donated from Tongji University School of Medicine and 14 from the Second Military Medical University. The basic characteristics of included cadavers were demonstrated in [Table 1](#pone.0144939.t001){ref-type="table"}. All three groups completed the puncture procedure at L4/L5 level on 20 cadavers. Only 18 cadavers received L5/S1 punctures, because one had extremely high iliac crest with large transverse process and another had L5 sacralization. 10.1371/journal.pone.0144939.t001 ###### Basic characteristics of included cadavers. ![](pone.0144939.t001){#pone.0144939.t001g} Variables Values ----------------- ------------- Gender  Male 10  Female 10 Year 52.44±10.05 Condition  Integrity 9  No upper limbs 2  No lower limbs 5  No extremities 1 In Group A, the fluoroscopy time was 2.70±0.66s for anteroposterior fluoroscopy and 2.75±0.55s for lateral fluoroscopy at L4/L5 level ([Table 2](#pone.0144939.t002){ref-type="table"}). In Group B, the fluoroscopy time was 4.90±1.07s for anteroposterior fluoroscopy and 5.05±1.23s for lateral fluoroscopy at L4/L5 level. In Group C, the fluoroscopy time was 2.90±0.64s for anteroposterior fluoroscopy and 3.05±0.51s for lateral fluoroscopy at L4/L5 level. There was significant difference in fluoroscopy time between Group A and Group B (P = 0.000), but no significant difference was observed in fluoroscopy time between Group B and Group C (P = 0.290). At L5/S1 level, the fluoroscopy time was 3.17±0.71s for anteroposterior fluoroscopy and 3.17±0.71s for lateral fluoroscopy in Group A. In Group B, the fluoroscopy time was 5.56±1.42s for anteroposterior fluoroscopy and 5.61±1.24s for lateral fluoroscopy at L5/S1 level. In Group C, the fluoroscopy time was 3.33±0.77s for anteroposterior fluoroscopy and 3.38±0.85s for lateral fluoroscopy at L5/S1 level. Similarly at L5/S1 level, there was significant difference in fluoroscopy time between Group A and Group B (P = 0.000), but no significant difference was observed in fluoroscopy time between Group B and Group C (P = 0.523). 10.1371/journal.pone.0144939.t002 ###### Fluoroscopy time of puncture procedure in different groups. ![](pone.0144939.t002){#pone.0144939.t002g} Fluoroscopy time (Mean±SD) Puncture levels Anteroposterior fluoroscopy (s) Lateral fluoroscopy (s) P value ---------------------------- ----------------- --------------------------------- ------------------------- --------- Group A L4/L5 2.70±0.66 2.75±0.55 \- Group B 4.90±1.07 5.05±1.23 0.000 Group C 2.90±0.64 3.05±0.51 0.290 Group A L5/S1 3.17±0.71 3.17±0.71 \- Group B 5.56±1.42 5.61±1.24 0.000 Group C 3.33±0.77 3.38±0.85 0.523 At L4/L5 level, there was significant difference in puncture times between Group A and Group B (P\<0.001), but no significant difference was observed between Group A and Group C (P = 0.811) ([Table 3](#pone.0144939.t003){ref-type="table"}). Similarly at L5/S1 level, there was significant difference in puncture times between Group A and Group B (P\<0.001), but no significant difference was observed between Group A and Group C (P = 0.981). The location time was 4.39±0.52min in Group A, 4.21±0.65min in Group B, and 4.42±0.38min in Group C at L4/L5 level ([Table 4](#pone.0144939.t004){ref-type="table"}). At L5/S1 level, the location time was 5.26±0.80min in Group A, 4.65±1.19min in Group B, and 5.61±0.77min in Group C. There were no significant differences between Group A and Group B or Group C either at L4/L5 or L5/S1 level (P\<0.05). The radiation dosage was 3.48±0.70uSv in Group A, 6.33±1.33uSv in Group B and 3.83±0.58uSv in Group C at L4/L5 level ([Table 5](#pone.0144939.t005){ref-type="table"}). At L5/S1 level, the radiation dosage was 3.99±0.80uSv in Group A, 6.99±1.55uSv in Group B and 4.25±0.89uSv in Group C. In general, HELLO system reduced 42%-45% radiation dosage when comparing Group A and Group B, but there was no significant difference in radiation exposure between Group B and Group C whatever at L4/L5 level or L5/S1 level (P\>0.05). 10.1371/journal.pone.0144939.t003 ###### Puncture times of percutaneous transforaminal endoscopic discectomy in different groups. ![](pone.0144939.t003){#pone.0144939.t003g} Puncture levels Groups Puncture time (Mean±SD) P value ----------------- --------- ------------------------- --------- L4/L5 Group A 1.55±0.60 \- Group B 3.65±1.09 \<0.001 Group C 1.70±0.47 0.811 L5/S1 Group A 2.00±0.59 \- Group B 4.22±1.22 \<0.001 Group C 2.06±0.73 0.981 10.1371/journal.pone.0144939.t004 ###### Location time of percutaneous transforaminal endoscopic discectomy in different groups. ![](pone.0144939.t004){#pone.0144939.t004g} Groups Group A Group B Group C ------------------------------ ----------- ----------- ----------- ----------- ----------- ----------- Location time (Mean±SD)(min) 4.39±0.52 5.26±0.80 4.21±0.65 4.65±1.19 4.42±0.38 5.61±0.77 P value \- \- 0.283 0.057 0.857 0.277 10.1371/journal.pone.0144939.t005 ###### Radiation exposure of puncture procedure in different groups. ![](pone.0144939.t005){#pone.0144939.t005g} Groups Group A Group B Group C --------------------------------- ----------- ----------- ----------- ----------- ----------- ----------- Radiation dosage (Mean±SD)(uSv) 3.48±0.70 3.99±0.80 6.33±1.33 6.99±1.55 3.83±0.58 4.25±0.89 P value \- \- 0.000 0.000 0.230 0.494 Discussion {#sec017} ========== This study demonstrated that HELLO system could significantly reduce puncture times, fluoroscopy time of L4/L5 and L5/S1 and effectively reduce 39%-45% of the radiation dose. Meantime, there was no difference between experienced spine surgeon and inexperienced spine surgeon for puncture with HELLO system whatever in puncture times, fluoroscopy time, radiation dosage or location time, either at L4/L5 level or L5/S1 level. The damage of radiation exposure induced by repeated fluoroscopy in transforaminal endoscopic surgery to patients and surgeons could not be ignored in clinics. The International Commission on Radiological Protection (ICRP) had recommended radiation limits per year for professionals specialized body tissues and organs\[[@pone.0144939.ref009]\]. Ahn et.al \[[@pone.0144939.ref010]\] detected the radiation dose for neck, chest, arm and hands of spine surgeons in 30 cases of transforaminal endoscopic surgery, which showed the radiation dose of neck, chest, arm and hands (left and right) were 0.0863 mSv, 0.1890 mSv, 0.0506 mSv, 0.8050 mSv and 0.7363 mSv respectively. The radiation dose of each sensitive organs of spine surgeons in locating puncture procedure was not detected in this study, but overall cumulative radiation dose of the different groups was detected. As the study simulated the puncture part of transforaminal endoscopic surgery, overall cumulative radiation dose of different groups was sufficient to verify the validity of novel puncture locator. We are quantifying the impact of puncture locator on radiation dose of sensitive organs in a registered clinical study (ChiCTR-ICR-15006730) ([Fig 4A](#pone.0144939.g004){ref-type="fig"}). ![Further registered study with updated puncture locator concerning the radiation exposure on sensitive organs.\ A: radiation measurement on sensitive organs; B: application of updated puncture locator in clinical practice; C: location theory of second version of puncture locator.](pone.0144939.g004){#pone.0144939.g004} There were various strategies of radiation protection, such as minimizing fluoroscopy frequency and time, keeping away from tube, using low-dose mode and shielding protection\[[@pone.0144939.ref011]\]. Wearing lead clothes, lead thyroid shield, lead glasses were the most effective methods to reduce the radiation exposure\[[@pone.0144939.ref012]\]. The surgeon's position and distance from the tube was considered as the second important method to effectively reduce the radiation exposure. Maintaining three feet away from the tube could greatly reduce the radiation exposure\[[@pone.0144939.ref013]\]. Different fluoroscopy equipment could lead to different degree of radiation dose\[[@pone.0144939.ref014]\]. Novel navigation position equipment also reduced the radiation exposure, such as more accuracy and effective O-arm fluoroscopy\[[@pone.0144939.ref015], [@pone.0144939.ref016]\], intraoperative MRI navigation\[[@pone.0144939.ref017]\] and ultrasonic position technique\[[@pone.0144939.ref010]\]. However, it must be noted that O-arm fluoroscopy had not been wide applied while intraoperative MRI navigation was also extremely expensive, and ultrasound technology was not well developed. Therefore, HELLO system could be a potential option with the advantages of cheap price, relative portable, reliable practice and well application prospect. The learning curve for PTED was very steep, because the puncture procedure was very difficult, especially for beginners\[[@pone.0144939.ref018]\]. Experienced spine surgeons may have a clear understanding of puncture angle required by horizontal beams, and was familiar with the use of C-arm fluoroscopy machine to have a faster switch between lateral fluoroscopy and anteroposterior fluoroscopy. Junior surgeons may perform the puncture procedure more carefully and needs more fluoroscopy on the first 10 cadavers due to lack of PTED experience. Thus, repeated fluoroscopy may lead to more fluoroscopy time, location time and radiation dose. However, our study did not observe significant difference of puncture times, fluoroscopy time, location time and radiation dose between experienced spine surgeons and inexperienced spine surgeons performing puncture with the assistance of HELLO system. In general, HELLO system may reduce the difficulty of PTED for junior surgeons. When using HELLO system for PTED, the following issues should be noted: 1) The patient should be positioned horizontally in order to improve the accuracy of localization; 2) The image intensifier plane should be paralleled with ground when anteroposterior fluoroscopy was taken; 3) The image intensifier plane should be vertical with ground and paralleled with the long axis of operation table when lateral fluoroscopy was taken. 4) The patients needed to be paralleled with the long axis of operation table to reduce bias induced by surface projection of puncture point; 5) The surface locator need to be fixed on the body surface tightly with adhesive tape. To improve the puncture accuracy and usage convenience, we have updated the design of puncture locator and applied it in clinics ([Fig 4B](#pone.0144939.g004){ref-type="fig"}). The second version of puncture locator is based on a fixed 1/4 cyclometer, and the target remains on the sphere center as the puncture trajectory remains on the radius of the cyclometer ([Fig 4C](#pone.0144939.g004){ref-type="fig"}). The introduction of HELLO system did not bring additional time to PTED, but it significantly reduced the operation time in our preliminary analysis. This was mainly because HELLO system significantly reduced the puncture times and fluoroscopy. Conclusions {#sec018} =========== HELLO system is effective in reducing puncture times, fluoroscopy time and radiation exposure, as well as the difficulty of learning PTED. A prospective clinical controlled study is ongoing to further confirm the accuracy and efficacy of HELLO system. Supporting Information {#sec019} ====================== ###### This is the supporting information for data statement. (ZIP) ###### Click here for additional data file. ###### This is the reporting guideline. (PDF) ###### Click here for additional data file. We thanks the academic club SHEPHERD for providing language help. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: GF SH. Performed the experiments: GF XG YZ AH. Analyzed the data: XG QS GG. Contributed reagents/materials/analysis tools: HZ SH. Wrote the paper: GF QS.
Mid
[ 0.547826086956521, 31.5, 26 ]
Q: JavaScript getElementById returns null error? So I just started with HTML and JavaScript and I thought it would be fun to experiment with iFrames. But I ran into a problem I can't seem to solve: Uncaught TypeError: Cannot read property 'value' of null This is the code: <!DOCTYPE html> <html> <head> <meta charset="UTF-8"> <script> var link = document.getElementById("LinkJ"); var button = document.getElementById("ButtonJ"); var surf = document.getElementById("SurfJ"); function PressButton(){ surf.src = link.value; } </script> </head> <body> URL: <input name="LinkN" id="LinkJ" type="url" value="http://www.bing.com/"></input> <button name="ButtonN" id="ButtonJ" onclick="PressButton()">Surf</button> <br><br> <iframe name="SurfN" id="SurfJ" style="position: absolute; height: 80%; width: 90%" src="http://www.bing.com/"> </iframe> </body> </html> A: Your script is executing before the DOM is rendered. Move your script at the end of your html or after the DOM elements you are using. Or you can also update your script to following <script> function PressButton(){ document.getElementById("SurfJ").src = document.getElementById("LinkJ").value; } </script>
Mid
[ 0.6209677419354831, 28.875, 17.625 ]
At a recent Penn State Smeal College of Business student organization awards dinner, six organizations were recognized for outstanding performance during the 2013-2014 academic year. The Penn State Marketing Association received the Bridge Builder Award for its events promoting college-wide participation as well as connections with faculty and the profession, including the fourth annual American Marketing Association Regional Conference, Mr. and Mrs. Smeal Pageant, the fall and spring Marketing Career Fairs, the fifth annual Sales Competition and more. The Bridge Builder Award recognizes a student organization that has demonstrated the ability to connect students, faculty, and staff, and supports the various people and projects they represent. This year’s Civic Enrichment Award went to Students Consulting for Nonprofit Organizations for its commitment to community service through using members’ skills to improve local area nonprofits, including The Mommy Shoppe, MidPenn Legal Services and New Leaf Initiative. The Civic Enrichment Award recognizes an organization with outstanding commitment to service and engagement in the community. The Penn State Finance Society earned this year’s Corporate Involvement Award for its annual Golf Outing and Networking Luncheon, which provided students an informal opportunity to network with representatives from companies such as BP, PricewaterhouseCoopers, EY, KPMG, Johnson & Johnson, PNC, Northwestern Mutual, Dick’s Sporting Goods and Altria. The Corporate Involvement Award recognizes the overall quality of a past event that included corporate participation. The Most Collaborative Organization Award was granted this year to the Multicultural Women’s Forum for its collaborations with groups such as Women in Business, the National Association of Black Accountants, the Association of Latino Professionals in Finance and Accounting and Ascend. The Most Collaborative Organization Award recognizes an organization that has worked with a variety of different organizations in co-sponsoring programs throughout the year. Ascend, a group dedicated to realizing the leadership potential of Pan-Asian leaders, earned the Most Innovative Program Award for its inaugural Ascend to Vegas event which brought students and companies together in an informal, casino-themed setting to network. This award recognizes a new program or project undertaken by an organization that enhanced the organizational activities. The Most Improved Organization Award, an award that recognizes an organization that has made general improvements or has been restructured for the better, went to the National Association of Black Accountants for the group’s improvement of its leadership infrastructure, increase in active membership and implementation of new social and professional development opportunities.
High
[ 0.660574412532637, 31.625, 16.25 ]
Q: How to make a toggle button toggled automatically How to make a toggle button toggled automatically when someone types anything in text field?? i am using java Net-beans A: jToggleButton1.setSelected(true); and if you are using netbeans go to properties of button and choose selected property mark it checked if you want someone to enter the text in the textfield then automatically let the toggle button select use like this private void jTextField1KeyPressed(java.awt.event.KeyEvent evt) { jToggleButton1.setSelected(true); } A: Add a listener to the textfield and call toggleButton.setSelected(boolean selected).
Mid
[ 0.6325000000000001, 31.625, 18.375 ]
974 So.2d 72 (2007) KIMPTON HOTEL & RESTAURANT GROUP, INC. and First Orleans Hotel Associates, L.P. v. LIBERTY MUTUAL FIRE INSURANCE COMPANY. Nos. 2007-CA-1118, 2007-CA-1209, 2007-C-1310. Court of Appeal of Louisiana, Fourth Circuit. December 19, 2007. *73 Campbell E. Wallace, Jonathan C. McCall; Douglas L. Grundmeyer, Chaffe McCall, L.L.P., New Orleans, LA, for Kimpton Hotel & Restaurant Group, L.P. and First Orleans Hotel Associates, L.P. Judy Y. Barrasso, H. Minor Pipes, III, Barrasso Usdin Kupperman Freeman & Sarver, LLC., New Orleans, LA, and Christopher S. Finazzo, Rachel R. Hager, Budd Lanier, PC, Short Hills, NJ, for Liberty Mutual Fire Insurance Company. (Court composed of Judge CHARLES R. JONES, Judge DENNIS R. BAGNERIS, SR., Judge TERRI F. LOVE, Judge EDWIN A. LOMBARD, Judge ROLAND L. BELSOME). TERRI F. LOVE, Judge. This appeal arises from flood damage to the Hotel Monaco and Cobalt Restaurant as a result of Hurricane Katrina. Hotel Monaco and Cobalt Restaurant were insured for flood damage by Liberty Mutual Fire Insurance Company. The business entities representing Hotel Monaco and Cobalt Restaurant asserted, in a motion *74 for partial summary judgment, that the flood insurance limit was $10 million. Liberty Mutual Fire Insurance Company claimed that the limit was $2.5 million. The trial court held that the insurance contract's "clear and plain meaning" insured the Hotel Monaco and Cobalt Restaurant for $10 million in flood damages. We find that the insurance contract unambiguously limits flood damage to $10 million and affirm. A writ was consolidated with the appeal regarding a memorandum that Liberty Mutual Fire Insurance Company received from an insurance broker during discovery. The trial court held that the memorandum was not privileged and did not constitute work-product. We find that the trial court did not abuse its discretion and deny the writ. FACTUAL BACKGROUND AND PROCEDURAL HISTORY The Hotel Monaco and Cobalt Restaurant (collectively "the Hotel"), located at 333 Saint Charles Avenue, suffered flood damages as a result of Hurricane Katrina. First Orleans Hotel Association, L.P., the owner of the Hotel, and Kimpton Hotel & Restaurant Group, L.P., the manager of the Hotel (collectively "Kimpton"), insured the Hotel with a multiple property insurance policy ("Policy") from Liberty Mutual Fire Insurance Company ("Liberty"). The Policy covered property damage and business interruption insurance. The basement level of the Hotel, which housed the Hotel's electrical vault, flooded. Kimpton sought $10 million from Liberty to repair the damage. Kimpton's first written proof of loss, totaling $10,708,613, was submitted on October 25, 2005. The second proof of loss, submitted on February 24, 2006, added an additional $6,257,044 in damages. Liberty refused to tender $10 million stating that the Policy only covered $2.5 million in flood damages. Kimpton filed a petition for declaratory judgment and damages against Liberty. Liberty then filed a notice of removal. However, the United States District Court for the Eastern District of Louisiana remanded the case to the Civil District Court because Liberty did not show that the parties were diverse at the time of removal. Kimpton later added the Sewerage and Water Board ("S & WB") and AEGIS, Limited ("AEGIS"), the liability insurer of Entergy New Orleans, Inc., as defendants alleging their negligence contributed to the flood damage. Liberty filed an exception of forum non conveniens, which the trial court denied. The S & WB filed a motion for summary judgment, which the trial court granted dismissing the S & WB with prejudice, predicated upon the fact that nothing in the S & WB's custody interfered with Kimpton's electrical vault. Kimpton filed a motion for partial summary judgment alleging that according to the four corners of the Policy, the Policy covered $10 million in flood damages. The trial court granted Kimpton's motion for summary judgment. The trial court also granted Kimpton's motion to strike extrinsic evidence, Kimpton's motion to strike scandalous language, and Liberty's motion to compel a second deposition of John Tastor ("Mr. Tastor"). The trial court denied Kimpton's motion to strike and exclude inadvertently produced documents. Kimpton then sought writs to this Court regarding the motion to strike and exclude inadvertently produced documents. Kimpton and Liberty sought to certify the trial court's ruling on the motion for partial summary judgment as final and appealable. Once designated as final and appealable, Liberty appealed the trial court's *75 granting of Kimpton's motion for partial summary judgment. Kimpton's writ was consolidated with this devolutive appeal. MOTION FOR PARTIAL SUMMARY JUDGMENT Appellate courts review partial summary judgments using the de novo standard of review. Wingrave v. Hebert, 06-1240, p. 5 (La.App. 4 Cir. 5/9/07), 964 So.2d 385, 389. Summary judgments are favored and "designed to secure the just, speedy, and inexpensive determination" of actions. La. C.C.P. art. 966(A)(2). "[I]f the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to material fact, and that mover is entitled to judgment as a matter of law," then summary judgment will be granted. La. C.C.P. art. 966(B). The mover bears the burden of proof. La. C.C.P. art. 966(C)(2). "[I]f the movant will not bear the burden of proof at trial on the matter that is before the court . . . the movant's burden on the motion does not require him to negate all essential elements of the adverse party's claim, action, or defense." La. C.C.P. art. 966(C)(2). In that case, the movant must "point out to the court that there is an absence of factual support for one or more elements essential to the adverse party's claim, action, or defense." La. C.C.P. art. 966(C)(2). "Thereafter, if the adverse party fails to produce factual support sufficient to establish that he will be able to satisfy his evidentiary burden of proof at trial, there is no genuine issue of material fact." La. C.C.P. art. 966(C)(2). Liberty asserts that the trial court erred in granting Kimpton's motion for partial summary judgment. Liberty avers that endorsement RM1132 does not change the liability limits contained in endorsement RM1109. Instead, Liberty avers that RM1132 only changed the policy to reflect that the Hotel was located in zone B or X, which was insured for flood damage, as opposed to zone A. The Policy does not cover flood losses according' to the exclusions listed on RM1003. However, endorsement RM1109 "changes" and/or "modifies" the Policy to include flood coverage on particular properties. RM1109 states, in part: "[w]e will pay for direct physical loss to covered property caused by flood at or within the states and locations shown on the Schedule of this endorsement." Further, RM1109 contains a schedule of liability as follows, in pertinent part: Limit of Limit of Liability Liability Per In any one State or Location Occurrence policy year _____________________________________________________________________________________________________ Any covered property situated in zone B or X shaded as defined in item 4.(B) of this endorsement. $10,000,000 $10,000,000 _____________________________________________________________________________________________________ New Orleans Hotel Monaco and Cobalt Restaurant $ 2,500,000 $ 2,500,000 _____________________________________________________________________________________________________ Any Covered Property at a New Location $ 1,000,000 $ 1,000,000 _____________________________________________________________________________________________________ Any Covered Property at an Unscheduled Location $ 100,000 $ 100,000 _____________________________________________________________________________________________________ Any covered property at a covered location not situated in the areas defined on the schedule of states and locations or indicated in item 4 of this endorsement. $50,000,000 $50,000,000 _____________________________________________________________________________________________________ *76 Endorsement RM1132 then states that it also "changes" and/or "modifies" Kimpton's insurance coverage regarding flood damage. RM1132 reads, in pertinent part: 2. The location(s) shown in Schedule B of this endorsement have been identified as being situated in zone B or X shaded which is the area defined by the Federal Emergency Management agency (FEMA) as being subject to inundation by a one-hundred (100) to five-hundred (500) year flood event. (One-hundred (100) to five-hundred (500) year flood plain). Schedule B No. Location Address 26 1095 Rollins Road, Burlingame, CA 94010 36 333 Saint Charles Avenue, New Orleans, LA 70130 37 10500 S. De Anza Blvd., Cupertino, CA 95014 An insurance policy is a contract.[1] The Louisiana Civil Code dictates how contracts should be interpreted. Determining the common intent of the parties is the first step for interpreting a contract. La. C.C. art. 2045. "When the words of a contract are clear and explicit and lead to no absurd consequences, no further interpretation may be made in search of the parties' intent." La. C.C. art. 2046. When a provision in a contract is susceptible of different meanings, an interpretation that renders the provision effective and not ineffective must be utilized. La. C.C. art. 2049. Additionally, "[e]ach provision in a contract must be interpreted in light of the other provisions so that each is given the meaning suggested by the contract as a whole." La. C.C. art. 2050. Insurance contracts "shall be construed according to the entirety of its terms and conditions . . . and as amplified, extended, or modified by any rider, endorsement, or application attached to or made a part of the policy." La. R.S. 22:654. However, "[i]n case of doubt that cannot be otherwise resolved, a provision in a contract must be interpreted against the party who furnished its text." La. C.C. art. 2056. RM1109 provides that the Hotel is insured for flood damage up to $2.5 million. However, RM1132 provides that it "changes" and/or "modifies" the Policy and that the Hotel should be included in the "zone B or X" category. We find that the words of the Policy are clear and explicit. The Hotel was always physically located in the "zone B or X" category. Therefore, the only interpretation of RM1132's provision would be to increase the flood damage liability for the Hotel to $10 million. Otherwise, RM1132 would have no purpose as it related to the Hotel. The use of extrinsic evidence to determine the amount of flood coverage is not warranted as we find that the words of the Policy are "clear and explicit." Therefore, we need not consult other documents to search for the intent of the parties. Accordingly, we find that the Policy insured the Hotel for up to $10 million in flood damages and affirm the trial court's granting of Kimpton's motion for summary judgment. WRIT APPLICATION Kimpton filed a supervisory writ *77 application[2] with this Court on September 5, 2007, seeking review of the trial court's denial of Kimpton's motion to strike and exclude inadvertently produced documents. Kimpton alleges that it inadvertently produced a September 1, 2005 memorandum ("Tastor Memo") from Mr. Tastor, the Arthur J. Gallagher & Company of California[3] representative heading the Kimpton account team, to Melinda Tisch, Kimpton's assistant general counsel/Vice President. The. Tastor Memo discussed Mr. Tastor's interpretation of the Hotel's flood coverage. Kimpton alleges that the Tastor Memo is subject to either the attorney-client privilege or the work-product doctrine. As the reviewing court, this Court must determine if the trial court abused its discretion in denying Kimpton's motion to strike and exclude inadvertently produced documents. Dixon v. WinnDixie Louisiana, Inc., 93-1627 (La.App. 4 Cir. 5/17/94), 638 So.2d 306, 312. Inadvertent disclosure of a document protected by the attorney-client privilege or work-product doctrine does not waive the protections. La. C.C.P. art. 1424(D). The work-product doctrine provides that the "court shall not order the production or inspection of any writing, or electronically stored information, obtained or prepared by the adverse party, his attorney, surety, indemnitor, or agent in anticipation of litigation or in preparation for trial. . . ." La. C.C.P. art. 1424(A). Additionally, "the court shall not order the production or inspection of any part of the writing, or electronically stored information, that reflects the mental impressions, conclusions, opinions, or theories of an attorney." La. C.C.P. art. 1424(A). The attorney-client privilege allows the client to refuse to disclose communication: (1) Between the client or a representative of the client and the client's lawyer or a representative of the lawyer. (2) Between the lawyer and a representative of the lawyer. (3) By the client or his lawyer, or a representative of either, to a lawyer, or representative of a lawyer, who represents another party concerning a matter of common interest. (4) Between representatives of the client or between the client and a representative of the client. (5) Among lawyers and their representatives representing the same client. (6) Between representatives of the client's lawyer. La. C.E. art. 506(B). The Louisiana Code of Evidence defines a client's representative as: (a) A person having authority to obtain professional legal services, or to act on advice so obtained, on behalf of the client. (b) Any other person who makes or receives a confidential communication for the purpose of effectuating legal representation for the client, while acting in the scope of employment for the client. La. C.E. art. 506(A)(2). Further, a representative of the lawyer, "is a person engaged by the lawyer to assist the lawyer in the lawyer's rendition of professional legal services." La. C.E. art. 506(A)(4). In order for a document to be protected by the work-product doctrine, the document must be prepared in "anticipation of litigation or in preparation for trial." The Tastor Memo was not prepared in anticipation *78 of litigation or in preparation for trial as Mr. Tastor typed the Tastor Memo on September 1, 2005, prior to Kimpton making a claim for flood damages. Additionally, the Tastor Memo is not covered by the attorney-client privilege as Mr. Tastor prepared the Tastor Memo in the ordinary scope of his business duties as an insurance consultant and he was not a representative of the client. Therefore, we do not find that the trial court abused its discretion and deny the writ. DECREE For the above mentioned reasons, we find that the Policy unambiguously provided Kimpton with $10 million in coverage for flood damage to the Hotel. Additionally, we find that the trial court did not abuse its discretion in finding that the Tastor Memo was not privileged or a work product. Therefore, we affirm the granting of the motion for summary judgment and deny the writ. AFFIRMED; WRIT DENIED. BELSOME, J., concurs in the result with reasons. BELSOME, J., concurs in the result with reasons. I concur with result of the majority opinion but not with its analysis. More specifically, I disagree that a clear unambiguous reading of the policy provides for $10 million dollars of flood coverage for Hotel Monaco and Cobalt Restaurant. It is undisputable that endorsement RM1109 makes a distinction between "[a]ny covered property situated in zone B or X shaded as defined in item 4.(B) of this endorsement" and "New Orleans Hotel Monaco and Cobalt Restaurant" setting forth flood damage liability coverage at $10 million and $2.5 million respectively. However, a reading of endorsement RM1132 under the Flood Zone Designation Schedule, which is identified as modifying RM1109, specifically lists Hotel Monaco and Cobalt Restaurant as a location that falls into the category of property situated in zone B or X. I find that endorsements RM1109 and RM1132 create two equally reasonable interpretations of what limit of liability for flood applies to Hotel Monaco and Cobalt Restaurant. Accordingly I find the policy language to be ambiguous. See Elmer v. Washington Nat'l Ins. Co., 308 So.2d 312, 314 (La.App. 3 Cir. 2/12/1975) Due to the ambiguity within the contract the Court must look to the parties' intent. Succession of Fannaly v. Lafayette Insurance Co., 01-1144, p. 2 (La.01/15/02), 805 So.2d 1134, 1137. Under the general rules of contract the Court should not look beyond the four corners of the insurance contract to ascertain the intent of the parties. See Ashire v. Vermilion Parish School Board, 02-2881, p. 5 (La.6/27/03), 848 So.2d 552, 555 citing Ortego v. State, Dept. of Transp. and Dev., 689 So.2d 1358 (La.2/25/97). However if a question remains, the unclear language is construed in favor of the insured. La. C.C. art. 2056 and Succession of Fannaly, 01-1144, p. 4, 805 So.2d at 1138. Because the language of the two provisions prevent a clear unambiguous determination of the policy flood limit, La. C.C. article 2056 directs us to find in favor of the insured, thus this Court must interpret the provisions as providing $10 million of flood coverage. For these reasons I concur in the result reached by the majority. NOTES [1] "A contract is an agreement by two or more parties whereby obligations are created. modified, or extinguished." La. C.C. art. 1906. [2] The supervisory writ application was consolidated with the appeal sub judice. [3] An international insurance broker.
Mid
[ 0.6261261261261261, 34.75, 20.75 ]
J-S39042-19 NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA : v. : : : ADDAN PAYNE : : Appellant : No. 2675 EDA 2018 Appeal from the Judgment of Sentence Entered August 16, 2018 In the Court of Common Pleas of Philadelphia County Criminal Division at No(s): CP-51-CR-0006665-2015 BEFORE: GANTMAN, P.J.E., STABILE, J., and STEVENS*, P.J.E. MEMORANDUM BY STEVENS, P.J.E.: FILED AUGUST 19, 2019 Appellant, Addan Payne, appealed from a March 9, 2016, judgment of sentence entered in the Court of Common Pleas of Philadelphia County following his conviction at a bench trial on the charges of possession with the intent to deliver a controlled substance (“PWID”), conspiracy (to commit PWID), and possession of a controlled substance (“possession”).1 On May 8, 2018, a three-judge panel of this Court affirmed Appellant’s convictions, but vacated the judgment of sentence and remanded for resentencing. Specifically, this Court concluded the trial court failed to properly merge Appellant’s convictions for PWID and possession for sentencing purposes. ____________________________________________ 1 35 P.S. § 780-113(a)(30), 18 Pa.C.S.A. § 903, and 35 P.S. § 780- 113(a)(16), respectively. ____________________________________ * Former Justice specially assigned to the Superior Court. J-S39042-19 On August 16, 2018, the trial court imposed a new judgment of sentence, and Appellant filed the instant appeal. Additionally, Appellant’s counsel has filed a petition seeking to withdraw her representation, as well as a brief pursuant to Anders v. California, 386 U.S. 738, 87 S.Ct. 1396 (1967), and Commonwealth v. Santiago, 602 Pa. 159, 978 A.2d 349 (2009) (hereinafter “Anders brief”). After a careful review, we grant counsel’s petition to withdraw and affirm Appellant’s judgment of sentence. The relevant facts and procedural history have been set forth previously by this Court, in part, as follows: On December 16, 2015, the Honorable Vincent Melchiorre presided over Appellant’s bench trial. During the trial, the Commonwealth called Officer Keya Mason to testify. Officer Mason testified that she has nineteen years of experience in drug cases and the last two of those years she has been with the Narcotics Enforcement Team (NET Team). N.T., 12/16/15, at 10. She testified that on the evening of April 3, 2015, she was part of the NET Team conducting surveillance in the area of the 4200 block of Odgen Street. Id. at 9-10. Officer Mason stated that she observed Appellant wearing a gray-hooded jacket, red pants, and red sneakers. Id. at 11. Officer Mason continued that Appellant was accompanied by a female, later identified as Shirley Stevens, who was wearing a blue jean jacket, green cargo pants, and a white scarf. Id. Officer Mason testified that she was located approximately one city block away, had a clear and unobstructed view, and was using binoculars. Id. at 12, 21. She further testified that streetlights illuminated the area where Appellant was located. Id. at 44-45. During her surveillance, Officer Mason observed a black male, later identified as Albert Tomlin, riding a motorized scooter. Id. at 14. Tomlin rode up to the middle of the street where Stevens approached him, they had a brief conversation, and Tomlin gave Stevens an unknown amount of U.S. currency. Id. Stevens then walked over to Appellant and gave him the money. Id. at 15. Appellant proceeded to walk into an alleyway for approximately thirty seconds and when he returned, he handed -2- J-S39042-19 small items to Stevens. Id. Stevens then went back to Tomlin and gave him the small items. Id. at 16. Tomlin then left. Id. Officer Mason relayed this information to backup officers who stopped Tomlin and recovered two green-tinted heat-sealed Ziploc packets of crack cocaine. Id. at 16-17. Officer Mason continued her surveillance and observed a white pick-up truck arrive at the location where Appellant and Stevens were. Id. at 17. Officer Mason testified that, this time, Appellant approached the passenger in the pick-up truck, later identified as Patrick Kim. Id. Kim extended his hand out the window and gave Appellant U.S. currency. Id. Appellant walked into the same alleyway and upon returning, handed small items to Kim. Id. at 19. Officer Mason relayed this information to her backup officers, who stopped the vehicle and recovered from the driver, Kelly Wilson, three clear heat-sealed Ziploc packets containing crack cocaine. Id. Officer Mason testified that after these two transactions, she notified her backup officers to arrest Appellant. Id. at 20. Officer Nicholas Martella arrested Appellant and recovered $348 from different pockets. Id. The backup officers also searched the alleyway where Appellant had twice entered but could not find anything. Id. No narcotics were recovered from Appellant. Id. at 43. The Commonwealth also called Officer Daniel Mammola and Officer Patrick DiDomenico to testify. Officer Mammola testified that he was that officer that stopped Tomlin and retrieved from him two green-tined heat-sealed Ziploc packets of crack cocaine. Id. at 50. Officer DiDomenico testified that he arrested Wilson and Kim. Id. at 54. He testified that, from Wilson’s hand, he recovered three clear heat-sealed Ziploc packets containing crack cocaine. Id. The officer did not testify that he recovered drugs from Kim. Officer Martella, who was also called to testify, stated that he conducted field testing, a NIK-G test, on the drugs. Id. at 61. Judge Melchiorre convicted Appellant as charged. On March 9, 2016, the trial court[2] sentenced Appellant to two to four years’ incarceration for PWID and a concurrent two to four years’ incarceration for conspiracy to commit PWID. The trial court ____________________________________________ 2 Since Judge Melchiorre was absent from the bench at the time of sentencing, the Honorable Mia Perez presided over Appellant’s March 9, 2016, sentencing hearing. -3- J-S39042-19 further imposed a consecutive two years’ probation for Appellant’s conviction for possession of a controlled substance. On March 16, 2016, Appellant filed his post-sentence motion for reconsideration, claiming that his sentence was excessive. See Motion for Reconsideration, 3/16/16. The docket indicates that Appellant filed a motion to withdraw his post-sentence motion for reconsideration, which the trial court granted on April 18, 2016. See Docket at 8. On April 27, 2016, Appellant filed a timely notice of appeal. Commonwealth v. Payne, No. 1347 EDA 2016, *2-4 (filed 5/8/18) (unpublished memorandum) (footnote omitted) (footnote added). On appeal, a panel of this Court rejected Appellant’s challenges to his convictions; however, the panel sua sponte determined the trial court failed to merge the convictions for PWID and possession for sentencing purposes. Thus, this Court vacated the March 9, 2016, judgment of sentence and remanded for resentencing. On August 16, 2018, Appellant proceeded to a new sentencing hearing at which Judge Perez acknowledged this Court had vacated the previous sentence and remanded for resentencing. N.T., 8/16/18, at 4. The trial court indicated it had the original presentence investigation report. Id. at 5. Appellant’s counsel indicated she wished to elaborate on the presentence investigation report as it related to Appellant’s experience when he was a minor in the foster care system. Id. She noted Appellant was sexually abused by one of his foster mothers. Id. Appellant’s counsel also noted that, at some point during Appellant’s incarceration, Appellant was diagnosed with major depressive disorder and -4- J-S39042-19 post-traumatic stress with dissociative symptoms, and accordingly, prison physicians placed Appellant on various treatment medications. Id. at 5-6. Appellant’s counsel noted that, aside from medications, Appellant was not receiving necessary mental health treatment from prison officials. Id. at 6. Appellant’s counsel requested an aggregate sentence of 11.5 months to 23 months in prison, plus three years of reporting probation. Id. at 10. The trial court provided Appellant with his right to allocution, and Appellant stated the following (verbatim): Your Honor, one thing, one thing I want to say, you know, since I’ve been here, it’s like I’ve had to fight for survival, you know? I been seen people die here since I’ve been here. I been heard people at nighttime screaming because they’ve been getting raped at nighttime. And every day is like a struggle for me. Every day is another fight for survival. And it’s like, it’s hard for me because I’m—it’s hard for me because the Dr. Cena (sp) requested me to be on a mental health unit and they got me in regular general population without being in the mental health unit. Where as they have officers that are trained to work for me and help me out to regular as—officers that don’t know what they’re doing with me. And it’s like it’s hard. Sometimes I get—I think about being suicidal. I’m not suicidal now but at the time when I was at Camphill I was suicidal because I got so many things that are doing it and so many things that remind me of what is actually going on. So I go through the most, you know? And it really is hard. It would have been better to have some type of relief, you know what I mean? I understand that I did something wrong and I understand that I’m—I did something wrong, that I needed to serve the punishment to know what is right. I understand that but it’s hard for me, it really is. Like I cry every night because I’m away from my family. I pray all the time that it’ll be soon. And like, I’m a changed person, I’ve been—with getting my GED, I’ve got my social security card, you know what I mean? I’ve been to all my -5- J-S39042-19 programs. It’s like I’m doing everything to prepare myself to get out of here, you know? While I’m doing that, it’s still a struggle for me. And I want you to know I’m fighting through this, not only fighting through this because I want to do right but I’m fighting through this because I have two kids, two daughters that needs me home, that need me to be there for them. Because I am their protector, I’m the one that is supposed to help them and guide them when they need to be taught, you know? I’m not that type of person that don’t make kids and don’t care about their kids and their children. I love my family. I love my family to death and I wouldn’t trade them for no one else. And I want to let people know that if they’re sitting in the courtroom, that at that time if they, when that time comes, don’t choose the wrong choice. Try to fight through it, you know. And that’s what I’m still learning to do and I’m going to keep on fighting. And that’s what I wanted to say here today. I just wanted ya’ll to hear me out. Id. at 12-14. The trial court then imposed a sentence of two years to four years in prison for PWID and a concurrent sentence of two years to four years in prison for conspiracy. The trial court imposed no further sentence for possession. Despite being provided with his post-sentence rights, Appellant did not file a post-sentence motion; however, he filed a timely notice of appeal. The trial court directed Appellant to file a Pa.R.A.P. 1925(b) statement, and in response, counsel filed notice of her intent to file an Anders/McClendon brief pursuant to Pa.R.A.P. 1925(c)(4). The trial court then filed a brief Pa.R.A.P. 1925(a) statement. On January 22, 2019, counsel filed in this Court a petition seeking to withdraw her representation, as well as an Anders brief. Appellant -6- J-S39042-19 filed no further submissions either pro se or through privately-retained counsel. Prior to addressing any issue raised on appeal, we must first resolve counsel’s petition to withdraw. Commonwealth v. Goodwin, 928 A.2d 287, 290 (Pa.Super. 2007) (en banc). There are procedural and briefing requirements imposed upon an attorney who seeks to withdraw on appeal pursuant to which counsel must: 1) petition the court for leave to withdraw stating that, after making a conscientious examination of the record, counsel has determined that the appeal would be frivolous; 2) furnish a copy of the brief to the [appellant]; and 3) advise the [appellant] that he or she has the right to retain private counsel or raise additional arguments that the [appellant] deems worthy of the court’s attention. Commonwealth v. Cartrette, 83 A.3d 1030, 1032 (Pa.Super. 2013) (en banc) (citation omitted). In addition, our Supreme Court in Santiago stated that an Anders brief must: (1) provide a summary of the procedural history and facts, with citations to the record; (2) refer to anything in the record that counsel believes arguably supports the appeal; (3) set forth counsel’s conclusion that the appeal is frivolous; and (4) state counsel’s reasons for concluding that the appeal is frivolous. Counsel should articulate the relevant facts of record, controlling case law, and/or statutes on point that have led to the conclusion that the appeal is frivolous. Santiago, 602 Pa. at 178-79, 978 A.2d at 361. Counsel also must provide the appellant with a copy of the Anders brief, together with a letter that advises the appellant of his or her right to “(1) retain new counsel to pursue the appeal; (2) proceed pro se on appeal; or (3) raise any points that the -7- J-S39042-19 appellant deems worthy of the court’s attention in addition to the points raised by counsel in the Anders brief.” Commonwealth v. Nischan, 928 A.2d 349, 353 (Pa.Super. 2007) (citation omitted). Substantial compliance with these requirements is sufficient. Commonwealth v. Wrecks, 934 A.2d 1287, 1290 (Pa.Super. 2007). Herein, counsel contemporaneously filed her petition to withdraw as counsel and Anders brief. In her petition, counsel indicates that after a thorough and conscientious examination of the record she has determined that an appeal herein is wholly frivolous. Additionally, in accordance with Nischan, counsel has mailed Appellant a copy of the Anders brief and a letter informing him that: (1) he has the right to retain new counsel; (2) he may proceed further with his case pro se; and (3) he may raise any points that he deems worthy of the this Court’s attention. Counsel has provided this Court with a copy of the conforming letter. In the Anders brief, counsel provides a summary of the facts and procedural history of the case, refers to evidence of record that might arguably support the issues raised on appeal, provides citations to relevant case law, and states her reasoning and conclusion that the appeal is wholly frivolous. Accordingly, counsel has substantially complied with all of the technical requirements of Anders and Santiago. Therefore, we proceed to examine the issues counsel identified in the Anders brief and then conduct “a full examination of all the proceedings, to decide whether the case is wholly -8- J-S39042-19 frivolous.” Commonwealth v. Yorgey, 188 A.3d 1190, 1195 (Pa.Super. 2018) (en banc) (quotation omitted). In the Anders brief, counsel raises the following issues (verbatim): 1. Was the sentence imposed a legal sentence? 2. Was the sentence imposed an excessive sentence? Anders Brief at 3. In his first issue, Appellant contends his new sentence is illegal. Specifically, Appellant suggests his sentence for PWID (crack cocaine) is beyond the statutory limits. Initially, we agree with Appellant that he has raised a challenge to the legality of his sentence. See Commonwealth v. Dixon, 161 A.3d 949, 951 (Pa.Super. 2017) (“If no statutory authorization exists for a particular sentence, that sentence is illegal and subject to correction.”) (citation omitted)). “Issues relating to the legality of a sentence are questions of law. Our standard of review over such questions is de novo and our scope of review is plenary.” Commonwealth v. Cardwell, 105 A.3d 748, 750 (Pa.Super. 2014). With regard to Appellant’s conviction for PWID (crack cocaine), 35 P.S. § 780-113(a)(30), the relevant statutory authority provides the following: § 780-113. Prohibited acts; penalties *** (f) Any person who violates clause (12), (14) or (30) of subsection (a) with respect to: *** -9- J-S39042-19 (1.1) Phencyclidine; methamphetamine, including its salts, isomers and salts of isomers; coca leaves and any salt, compound, derivative or preparation of coca leaves; any salt, compound, derivative or preparation of the preceding which is chemically equivalent or identical with any of these substances, except decocanized coca leaves or extracts of coca leaves, which extracts do not contain cocaine or ecgonine; and marihuana in a quantity in excess of one thousand (1,000) pounds, is guilty of a felony and upon conviction thereof shall be sentenced to imprisonment not exceeding ten years, or to pay a fine not exceeding one hundred thousand dollars ($100,000), or both, or such larger amount as is sufficient to exhaust the assets utilized in and the profits obtained from the illegal manufacture or distribution of these substances. 35 P.S. § 780-113(f)(1.1) (bold added). By its express terms, the relevant statute permits a maximum sentence of ten years in prison for PWID (crack cocaine). See Commonwealth v. Young, 922 A.2d 913 (Pa.Super. 2007) (holding it is well settled that criminal statutes are to be strictly construed). Upon remand, the trial court imposed a sentence of two years to four years in prison for PWID, and therefore, the sentence was well within the statutory limits. Consequently, we reject Appellant’s challenge to the legality of his sentence as to PWID. In his final issue, Appellant contends the trial court abused its discretion in imposing Appellant’s new sentence. Specifically, Appellant suggests his sentence upon remand was “unduly excessive,” as well as the result of judicial vindictiveness. These claims present a challenge to the discretionary aspects of Appellant’s sentence. See Commonwealth v. Barnes, 167 A.3d 110 (Pa.Super. 2017) (en banc); Commonwealth v. Clarke, 70 A.3d 1281, 1287 (Pa.Super. 2013). - 10 - J-S39042-19 We have long held that “[t]he right to appeal a discretionary aspect of sentence is not absolute.” Id. at 122 (citation omitted). Instead, such challenges are considered petitions for allowance of appeal. Id. Generally, an appellant who wishes to challenge the discretionary aspects of his sentence must satisfy a four-part test to invoke this Court’s jurisdiction: (1) whether appellant has filed a timely notice of appeal; (2) whether the issue was properly preserved at sentencing or in a motion to reconsider and modify sentence; (3) whether appellant’s brief has a fatal defect pursuant to Pa.R.A.P. 2119(f); and (4) whether there is a substantial question that the sentence appeal from is not appropriate under the Sentencing Code. Id. (citation omitted). Finally, “[w]hether a particular issue constitutes a substantial question about the appropriateness of sentence is a question to be evaluated on a case-by-case basis.” Id. (citation omitted). Here, Appellant filed a timely notice of appeal, but he did not present his discretionary aspects of sentencing issues during the sentencing hearing or in a post-sentence motion. Accordingly, the issues are waived. See id. In any event, and assuming, arguendo, Appellant’s claims present a substantial question, we note: Sentencing is a matter vested in the sound discretion of the sentencing judge, and a sentence will not be disturbed on appeal absent a manifest abuse of discretion. In this context, an abuse of discretion is not shown merely by an error in judgment. Rather, the appellant must establish, by reference to the record, that the sentencing court ignored or misapplied the law, exercised its judgment for reasons of partiality, prejudice, bias or ill will, or arrived at a manifestly unreasonable decision. - 11 - J-S39042-19 Commonwealth v. Zirkle, 107 A.3d 127, 132 (Pa.Super. 2014) (quotation omitted). With regard to Appellant’s claim that his sentence is “unduly excessive,” we note “the sentence imposed should call for confinement that is consistent with the protection of the public, the gravity of the offense as it relates to the impact on the life of the victim and on the community, and the rehabilitative needs of the defendant.” 42 Pa.C.S.A. § 9721(b). “[W]here the sentencing judge had the benefit of a presentence investigation report, it will be presumed that he or she was aware of the relevant information regarding the defendant’s character and weighed those considerations along with mitigating statutory factors.” Clarke, 70 A.3d at 1287. Here, the record reveals the trial court judge, who was the same judge that sat for Appellant’s original sentencing hearing, was well aware of Appellant’s crimes and had the benefit of a presentence investigation report. The trial court permitted Appellant’s counsel to expand upon the information contained in the presentence investigation report, including providing the trial court with information pertaining to Appellant’s experiences as a minor in the foster care system. Moreover, Appellant’s counsel provided the trial court with information pertaining to Appellant’s time spent in prison, including the status of Appellant’s mental health. Finally, the trial court considered Appellant’s statement to the court in which Appellant sought leniency. Based on the aforementioned, the trial court imposed individual sentences, which - 12 - J-S39042-19 Appellant’s counsel admits were “standard-range minimum” sentences under the Sentencing Guidelines, in a concurrent manner. Anders Brief at 9. Accordingly, we find no merit to Appellant’s claim that his sentence was “unduly excessive.” With regard to Appellant’s suggestion of vindictiveness, generally, a presumption of vindictiveness arises if the court imposes a harsher sentence upon resentencing. Commonwealth v. Robinson, 931 A.2d 15, 22 (Pa.Super. 2007) (en banc). “Absent evidence [that] a sentencing increase is justified due to objective information concerning a defendant’s case, the presumption of vindictiveness cannot be rebutted.” Barnes, 167 A.3d at 124. Without a presumption of vindictiveness, the defendant must affirmatively prove actual vindictiveness. Id. Here, Appellant did not receive a greater sentence upon remand than that which was originally ordered. Specifically, Appellant was originally sentenced to two years to four years in prison for PWID, a concurrent two years to four years in prison for conspiracy, and a consecutive two years’ probation for possession. However, upon remand, Appellant was sentenced to two years to four years in prison for PWID, a concurrent two years to four years in prison for conspiracy, and no further penalty for possession. Accordingly, there is no presumption of vindictiveness. See Robinson, supra. Moreover, there is no evidence of actual vindictiveness on the part of - 13 - J-S39042-19 the sentencing judge. Accordingly, Appellant is not entitled to relief on this claim. After examining the issues contained in the Anders brief, we concur with counsel’s assessment that the appeal is wholly frivolous. “Furthermore, after conducting a full examination of all the proceedings as required pursuant to Anders, we discern no non-frivolous issues to be raised on appeal.” Yorgey, 188 A.3d at 1195. Thus, we grant counsel’s petition to withdraw and affirm Appellant’s judgment of sentence. Petition to withdraw as counsel granted. Judgment of sentence affirmed. Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 8/19/19 - 14 -
Low
[ 0.49275362318840504, 34, 35 ]
Meetings At the March Membership meeting, we heard from Shahid Buttar, director of grassroots advocacy for the Electronic Freedom Frontier (EFF). Shahid gave interesting insights as to what is current and coming up on the horizon from the new presidential administration under Donald Trump. He gave an overview of the new FCC Chairman Ajit Pai and what we could expect from his tenure, including the repeal of Net Neutrality and online privacy. Shahid gave some simple suggestions to help us all be safe online and fielded many questions. Panhandle Playground: Anne Baskerville from Rec and Park provided an update on the Panhandle Playground renovation plans and the pathways project. There is a delay on pathway repair due to uneven surfaces along the northern path. The playground project is set to have its first public meeting in March, and Anne will check back with us when scheduling has been finalized. Proposed Bike Lanes on Fell and Oak: Ellen Robinson, a traffic engineer with MTA, reviewed the proposals to date. She assured us that having a proposal prepared does not mean that MTA was committed to the project, but short of a couple of significant routing issues, work would be moving forward on the lanes. Members were startled to learn of a new concept described in the feasibility report as a “high speed bike commuter lane,” especially because these lanes would encounter pedestrian cross-traffic every block along the way. July’s HANC meeting focused on the latest “market based solution” being proposed in Sacramento to address the City's and the State’s “housing crisis”: Gov. Brown’s “by right” proposal and AB2801, a mandatory “density bonus” program that will allow up to a 35% bonus in the size of all housing developments proposed at the local level. The Tenants Union’s executive director Deepa Varma joined HANC’s Housing and Land use Board member Calvin Welch in discussing the impacts of these proposals on San Francisco. In a word, the impacts would mean “displacement” of existing residents and small businesses. In a any area like San Francisco with virtually no open space and a red hot real estate market, mandatory density bonuses and the development of housing without a public hearing process (that is developing “by right” , not local approval) would most likely mean that existing buildings would be demolished in order to make way for more dense buildings allowed by the new policies. Turnout for the September HANC meeting was good. The meeting started with Tim Redmond (48hills.org), discussing Propositions G, Q, R, D, H, M, & L. In summary, vote NO on G, Q, & R, they were placed on the ballot by Weiner and Farrel, designed to be policy pushing wedge issues that are thin on solutions and thick on politics. Tim continued with why you should vote YES on Propositions D, H, M, & L. Prop D will separate unilateral power from the Executive Branch and prevent the Mayor from appointing replacement Supervisors if one should leave. Prop H would create the new position of Public Advocate; this position exists in many other cities. Prop M would create a commission to oversee Housing, and Workforce and Economic Development. Prop L would create split appointment of the MTA board between the Mayor and the Board of Supervisors. As a group all of these propositions take power back from the Mayor. The focus of HANC’s June 2016 meeting was an examination of what real change in transportation might look like for the Haight Ashbury and for our city more broadly. HANC’s guide for this exploration was Jason Henderson, a professor of geography at San Francisco State University. Our journey started at the global level. As other countries plan for prosperity and mobility we cannot afford the environmental cost of them emulating the US love affair with the automobile. The US has 0.786 vehicles per person, more than 10 times the rate in China, which is already experiencing gridlock and alarming pollution. Both the US and developing countries need transportation solutions beyond the personal automobile.
High
[ 0.6716791979949871, 33.5, 16.375 ]
A review of literature about involving people affected by cancer in research, policy and planning and practice. To systematically review the literature on involving people affected by cancer in healthcare research, policy and planning and practice. Database searches, cited author, and grey literature searches were conducted. 131 documents were included. Rationales for the agenda of involvement represent two polar characteristics of modernity: individualism and collectivism. In research, people acted as advocates, strategists, advisors, reviewers and as participatory researchers. In policy and planning, people were involved in one-off involvement exercises and in longer-term partnerships. Men, those with rare cancers, children, and people who are socially deprived have been rarely involved. There is little research evidence about the impact of involvement. Training and information, resources and a change in attitudes and roles are required to implement an agenda of involvement. The USA, the UK, followed by Canada and Australia have promoted an agenda of involvement. A dissemination strategy to share good practice; involvement of all types of people; an individualised and flexible approach; training, resources and a shift in thinking from paternalism towards partnership working are required. More research is needed about the impact of involvement and relationships between rationales for involvement and implementation.
High
[ 0.673469387755102, 33, 16 ]
General Counsel Appointment Monday, May 6, 2013 Dear Colleagues, I am pleased to announce William Donohue as the University’s next general counsel, effective May 22, 2013, and continuing up to June 30, 2015, pending approval by the Board of Regents on May 10, 2013. I am delighted that Bill has accepted this critical position leading the University’s Office of the General Counsel, and I look forward to working with him to advance the excellence of the University of Minnesota. Bill has been deputy general counsel since 1996 and has served in Office of the General Counsel (OGC) since 1982. For many years, Bill was a litigator representing the University in state and federal courts. For the last several years, Bill has overseen the overall administration of the office, directing all University litigation and supervising OGC lawyers responsible for litigation and labor employment. Prior to coming to the OGC, Bill was on the staff of the Minnesota Attorney General. Bill is a graduate of Carleton College, and received his law degree cum laude from the University of Minnesota in 1974. He has taught The Law and Post-Secondary Institutions through the College of Education and Human Development for many years. As general counsel, Bill will be responsible for leading the OGC in meeting the legal needs of the University by offering highly specialized legal services in many areas, including patent, trademark, and copyright law; technology licensing and commercialization; employment and labor relations; healthcare law and medical malpractice; and real estate transactions, development, and eminent domain. As you know, we have had significant changes in our senior leadership team. By the end of the calendar year, fully two-thirds of my direct reports will have been here less than 2.5 years. While this transition has brought tremendous skill, expertise, and energy to the organization, it has also diminished our collective institutional memory. Ensuring stability and bringing deep institutional knowledge to this senior leadership role for the near term will be extremely helpful as the new leadership team comes together. The role of the general counsel is a critical one to this institution. We will launch a search in 12 to 18 months, with the goal of onboarding a new leader at the end of Bill’s term as general counsel. When the time comes, I am convinced this search will attract a large pool of very talented candidates from both private practice and the public sector. I want to again thank Mark Rotenberg for his outstanding service to the University, and for building an exceptionally talented team to ensure a smooth transition. I wish him the very best as he assumes his new position. I am confident that Bill’s leadership qualifications, experience, and deep institutional knowledge will enable him to successfully lead the OGC and serve as a key member of my senior leadership group. Please join me in welcoming Bill Donohue as our new general counsel.
Mid
[ 0.6513994910941471, 32, 17.125 ]
Q: How to implement camera without moving anything AS3? I'm using physInjector and therefore cannot move clips containing my objects: The physical engine works incorrectly because of it. I think about implementing something like a bitmap drawing a selected part of the stage on itself. How can it be done? I've read this Trying to capture stage area using BitmapData, but there the author copies its data from the stage, whereas I need the area outside it. Besides, aren't there less resource-consuming solutions? A: x=-(player.mc.x-stage.stageWidth/2); y=-(player.mc.y-stage.stageHeight/2); if(canvas) removeChild(canvas); var bd:BitmapData=new BitmapData(stage.stageWidth,stage.stageHeight,false,0xFFFFFF); bd.draw(stage); trace(bd); canvas=new Bitmap(bd); addChild(canvas); x=0; y=0; At PC it works fine. Don't know whether it is suitable for mobiles. I also haven't tested the approach suggested by blue112 because in twitter of physinjector developer there are complaints about ANY moving of parent clip (https://twitter.com/reyco1/status/327107695670853632) and it is quite difficult to combine with my existing architecture. Changing the globalOffsetX and globalOffsetY properties also didn't help
Mid
[ 0.582978723404255, 34.25, 24.5 ]
Clearance Browse our clearance sale for huge savings. Round out your soccer wardrobe with shorts and socks or score some extra training jerseys for practice. Training pants, jackets, and breathable hoodies will feel great on the field or stand in as part of your everyday look. Save up to 50% on select items at SoccerOne.
Low
[ 0.25948406676783003, 10.6875, 30.5 ]
Q: Debugging .Net4 COM registered assembly from Win32 caller in Visual Studio 2010 This is a very simple setup, I can't believe but I didn't find anybody with the same problem so far... Create a .Net4 class library in VS2010. Create a simplest possible COM object: [ComVisible(true)] [Guid("CD157EBC-C89D-40b6-B531-E85FF4B3AE9A")] [InterfaceType(ComInterfaceType.InterfaceIsIUnknown)] public interface IAcorn { bool Foo(string moo); } [ComVisible(true)] [ClassInterface(ClassInterfaceType.None)] [Guid("854B7690-C1C4-40c4-8059-B4F3450B30D0")] public class Acorn : IAcorn { public Acorn() { } public bool Foo(string moo) { return true; } } Set "Register for COM interop" option for the assembly. Set "platform target" to x86. Create a Win32 client using Delphi, import the object, instantiate it using normal instantiation (translates to CoCreateInstance(ClassID, nil, CLSCTX_INPROC_SERVER or CLSCTX_LOCAL_SERVER, IUnknown, Result)) Run the Win32 application, everything works fine. Try to debug the COM object from VS2010. Set the class library Debug option to start an external program, point to the executable you just created. When you launch the Win32 app from VS210, the program crashes (with StackOverflow) at the attempt to instantiate the COM. Change the Target framework to .Net 3.5 Launch the debugging from VS2010, everything works including debugging. Note - This is also a problem when using either CLR Hosting or unmanaged export COM instantiation. Both methods work with .Net4 but debugging is not possible. The question is standard - why does this happen and is there a workaround? A: The .NET framework and Delphi may set or expect different values in the FPU control word. That problem can be avoided by setting the register explicitly, before calling .NET code and resetting it after the .NET code is done: How can I set and restore FPU CTRL registers?
High
[ 0.6790697674418601, 36.5, 17.25 ]
BOOSTER SHOTS: Oddities, musings and news from the health world Sex, drug use linked with playing the 'choking game,' study says Kamelia and Rob Sepasi of Tarzana lost their daughter to the choking game… (Los Angeles Times ) They call it the “choking game,” but it’s deadly serious. Experts estimate that 5% to 11% of teens have tried it, and a new study published Monday in the journal Pediatrics reports that kids who see this as a way of getting high are also likely to engage in other types of risky behavior, such as drug abuse and sex. Here’s how the study’s authors, from the Centers for Disease Control and Prevention’s Division of Unintentional Injury Prevention and the Oregon Health Authority’s Public Health Division, describe the choking game: “The choking game refers to an activity where pressure is applied to the neck/carotid artery to limit oxygen and blood flow; once the pressure is released, a ‘high’ or euphoric feeling might be achieved as blood and oxygen rush back to the brain. … Participation in this activity can lead to serious injury or death.” The choking game is also known as “knock out,” “black out,” “space monkey,” “flatlining” and “the fainting game.” As my colleague Amina Khan wrote in 2009, players – mostly teens – use “belts, neckties, other types of binding – or a friend’s helping hands” to cut off the supply of oxygen. At least 82 children between the ages of 6 and 19 are known to have died while playing the choking game, according to the CDC, although the true toll is probably higher because there’s no reliable system for counting such deaths. Even when it’s not fatal, it can lead to coma or seizures; kids who fall while playing can get concussions or broken bones. In the new study, researchers used data collected in 2009 as part of the Oregon Healthy Teens survey to get a sense of how widespread the choking game was among eighth graders. They found that 22% of the students had heard of someone playing it and 6.1% had done so themselves. Participation rates were the same for boys and girls. Among those who had played, 64% had tried it more than once and 27% had done so more than five times. Students who were identified as Pacific Islanders were about five times more likely than white students to say they had played the choking game. Also, among boys, black students were more than three times more likely than whites to have tried it. In further analysis, the researchers found that players were more likely than non-players to use drugs, be sexually active, have poor mental health, have been exposed to violence, be involved in gambling and to have poor nutrition. Looked at another way, the researchers said that students who had ever had sex and had used drugs in the last 30 days were at increased risk for participating in the choking game. The researchers also looked at 11th graders and found that one-third had heard of someone playing the choking game; 7.6% said they had played it themselves and 1.7% said they had helped someone else do it. The 7.6% participation rate was considered statistically equivalent to the 6.1% rate among eighth graders, making this unusual among “youth risk behaviors” because prevalence did not increase with age. Despite media reports that “high-achieving, low-risk-taking youth” are more likely to try the choking game, the data from Oregon indicate that’s not true, according to the study. “Clear, youth-friendly messages about the possible consequences of this activity are warranted,” the researchers wrote. But they also acknowledged that “little is understood about effective choking game prevention messaging or how best to screen for this behavior.” At a minimum, pediatricians should watch for signs of bruises or other marks around the throat, they wrote.
Mid
[ 0.6445012787723781, 31.5, 17.375 ]
Welcoming the Election Commission's schedule for Karnataka elections, political parties on Tuesday said they are "election ready", with all three players, Congress, Bharatiya Janata Party (BJP) and Janata Dal (Secular), claiming that they would come to power. The EC today announced a single-phase election for the 224-member Karnataka Legislative Assembly on May 12, with the counting of votes to be taken up on May 15. BJP President Amit Shah welcomed the announcement, saying that the party would come to power with a thumping majority under the ...
Low
[ 0.49618320610687006, 32.5, 33 ]
NADPH oxidase activation in neutrophils: Role of the phosphorylation of its subunits. Neutrophils are key cells of innate immunity and during inflammation. Upon activation, they produce large amounts of superoxide anion (O2 -. ) and ensuing reactive oxygen species (ROS) to kill phagocytized microbes. The enzyme responsible for O2 -. production is called the phagocyte NADPH oxidase. This is a multicomponent enzyme system that becomes active after assembly of four cytosolic proteins (p47phox , p67phox , p40phox and Rac2) with the transmembrane proteins (p22phox and gp91phox , which form the cytochrome b558 ). gp91phox represents the catalytic subunit of the NADPH oxidase and is also called NOX2. NADPH oxidase-derived ROS are essential for microbial killing and innate immunity; however, excessive ROS production induces tissue injury and prolonged inflammatory reactions that contribute to inflammatory diseases. Thus, NADPH oxidase activation must be tightly regulated in time and space to limit ROS production. NADPH oxidase activation is regulated by several processes such as phosphorylation of its components, exchange of GDP/GTP on Rac2 and binding of p47phox and p40phox to phospholipids. This review aims to provide new insights into the role of the phosphorylation of the NADPH oxidase components, that is gp91phox , p22phox , p47phox , p67phox and p40phox , in the activation of this enzyme.
High
[ 0.689473684210526, 32.75, 14.75 ]
This invention relates to a method for manufacture of large tanks according to the "from the top and down" principle, whereby the roof of the tank is manufactured first at ground level, and successive generally cylindrical plates are attached one below the other as the completed part of the tank is raised in stages, the tank thereby growing from below. At present there are in principle two usable methods for rational manufacture of large tanks on site. According to one of these methods, called "from the bottom and up", the bottom plate is laid out and welded, the lowermost plate sweep (i.e., generally cylindrical plate section) of the tank is mounted to the bottom plate and welding is carried out in the vertical seams and to the bottom plate. The next plate sweep is placed on the one beneath it and welded to this, whereupon the vertical seams are welded. The supporting structure of the roof consists as a rule of a center ring and radial, somewhat curved steel girders which are suspended on the tank wall and in the center ring. The center ring is placed at the right height on a temporary scaffolding and the steel girders are placed in the right position and welded to the center ring and to the wall. When this task has been completed the tank structure is self-supporting and the temporary scaffolding for the center ring can be dismantled, whereupon the roof covering of plate is mounted and welded. According to the other prior art method, called "from the top and down", the bottom plate is laid out and welded. The plate sweep lying uppermost in the finishing tank is mounted and the vertical seams are welded. The roof of the tank is manufactured in principle in the same manner as in the previously described method but largely at ground level and in some cases small openings must be left in the roof for the hoisting equipment used to raise same. The hoisting devices are then mounted and connected via lugs to the topmost plate sweep, whereupon the finished tank section is lifted by the hoisting devices disposed around the plate sweep a height corresponding to the height of the next plate sweep. The next topmost plate sweep in the finished tank is then mounted below the raised completed section and vertically and horizontally welded to the lowermost plate sweep of the raised completed section. The lifting devices are then connected to the plate sweep which has just been assembled and the above procedure is repeated until the tank has attained its full height. The bottommost plate sweep is then welded to the bottom plate. In welding work according to the first of the prior methods mentioned above, a working platform has to be installed on a working level with each plate sweep, which is a time-consuming and risky operation. When the other prior method is used, the welding work is done at ground level and usually without a working platform. Automatic welding machines have been used for some 20 years in connection with the first above-mentioned prior method and in this context use is made of a welding machine which is hung up on wheels on the upper edge of the topmost plate sweep, the wheels being driven synchronously with the desired welding speed. For the vertical seams a welding machine is used which is either suspended on the topmost plate sweep or mounted on a vertical pillar which is successively lengthened as the tank-building work proceeds. Important in all welding work is that the automatic welding machines have to be guided or steered exactly parallel to the welding seam and driven synchronously with the welding speed. In tank building according to the prior "from the top and down" method, two methods of automatically welding horizontal seams have been tested and pillar welding machines are relatively often used for the vertical seams. According to one of these prior horizontal welding methods the welding machine was suspended by wires which were attached to a trolley which ran on a track on the inside of the tank roof. As the tank was successively raised in stages the wires had to be lengthened and consequently difficulties were experienced in getting the trolley and the welding machine to run synchronously relative to each other. An attempt was then made to solve this problem by replacing the wires by a pipe scaffolding but the same problem arose as soon as the distance between the welding machine and the suspension track became large. For this reason this prior method did not attain any great sucess. According to the second prior horizontal welding method the welding machine was hung up in a scaffolding with a drive device running on a track which was mounted on the bottom plate of the track and with idler wheels against the tank wall. Since tank bottoms are often not flat and to some extent may also be dished or wave-shaped and since the tank wall is seldom perfectly circular, difficulties were experienced in keeping the electrode of the welding machine in the correct position relative to the seam. From the above it follows that there is currently no practical method by which to automatically weld the seams in the tank walls when the tank is built by the "from the top and down" method and a primary objective of the present invention is to provide a suitable method for this. The hoisting devices used when building tanks from the top and down usually comprise hydraulic lifters which cooperate with a hoisting pillar so that the lifters pull or press an arm which is obliquely directed upwards against the tank wall. The connection between the smooth tank wall and the tops of the inclined arms is achieved in that lugs are welded to the tank wall, the tops of the inclined arms working against the lower part of the said lugs. These lugs are welded to the plate sweep at which lifting is to occur and exactly equidistant from the lower edge of the plate sweep.
Low
[ 0.526096033402922, 31.5, 28.375 ]