text
stringlengths 8
5.74M
| label
stringclasses 3
values | educational_prob
sequencelengths 3
3
|
---|---|---|
wp optimization Comet Cache is another popular caching plugin with 60,000 active installs. WP Super Cache is another popular caching plugin for WordPress, with over a million active installs. With over a million active installs, W3 Total… | Low | [
0.473809523809523,
24.875,
27.625
] |
Lab Test Results from Clack Corporation You may be interested in some of the results we have obtained using your KDF® 55D media in our water filter cartridges. The cartridges normally contain 45 cu in (740 cu cms) of granular activated carbon. In testing we maintain a flow rate of 1 gpm (3.8 L/min.) and a free chlorine feed of 2 mg/L. Cartridges with standard grade carbon have a capacity of about 4,000 gallons to 90% removal and 8,000 gallons to 75% removal. If premium carbon is used, typical capacities are 12,000 gallons to 90% and 20,000 gallons to 75%. When 1-1/2 lb (0.68 Kg) of KDF-55D was combined with Premium carbon, capacities increased to 30,000 gallons at 90% and 54,540 gallons at 75%. When an entire cartridge was filled with KDF, the test was carried out to 82,640 gallons (313,000L) before the test was terminated because of pressure loss. The KDF was still removing 94% of the chlorine! | Low | [
0.472164948453608,
28.625,
32
] |
Stability of 5-aminosalicylic acid and its metabolites in plasma at -20 degrees C. Formation of N-beta-D-glucopyranosyl-5-aminosalicylic acid. The stability of 5-aminosalicylic acid and its metabolites has been investigated when stored frozen. N-beta-D-Glucopyranosyl-5-aminosalicylic acid was formed in considerable amounts concomitant with a decrease in 5-aminosalicylic acid in plasma samples spiked with 5-aminosalicylic acid as well as in standard solutions of 5-aminosalicylic acid buffered with potassium phosphate between pH 5.5 and pH 8.0 with 4.0 mM glucose added and stored at -20 degrees C. Thus N-beta-D-glucopyranosyl-5-aminosalicylic acid might not, as previously described, be a metabolite of 5-aminosalicylic acid but an artifact formed during storage of plasma samples. The N-glucoside formed could be quantitatively degraded to 5-aminosalicylic acid and glucose by adding 0.2 M potassium phosphate buffer pH 3.0 to the sample prior to the analysis. The metabolites of 5-aminosalicylic acid (N-formyl-5-aminosalicylic acid, N-acetyl-5-aminosalicylic acid and N-butyryl-5-aminosalicylic acid) were found to be stable in plasma stored at -20 degrees C for at least eight months. | Mid | [
0.604444444444444,
34,
22.25
] |
CanvasImportedabric-and-syntheticAuthentic, the original and now iconic Vans styleD(M) sizing is for Men: For women size, add up 1.5 to Men size.For example, Men size 4 is same as Women 5.5 (See \"Size Chart\" for Men and Women Conversion) | Mid | [
0.6328767123287671,
28.875,
16.75
] |
Q: Exclude _id field in mongodb while inserting Is there any possibilities of without having _id field in mongodb collection?? I don't want it because i need to load mongodb data into apache pig, which will not support _id. So, i just don't want _id field in my mongodb collections. Anyone please help.. Thanks in advance. A: No, you can't. The _id field is required for internal purposes in MongoDB. It is the MongoDB equivalent to a primary key in a relational database. Every document must have an unique _id field. It does not necessarily need to be an ObjectId, but it must be a value unique to the collection. But you can query data without the ID field: db.yourCollection.find({ ...query... }, { _id: false } ); | Low | [
0.515837104072398,
28.5,
26.75
] |
8, -700, -252, 196, 644? 1092 What comes next: -121, -358, -595, -832, -1069, -1306? -1543 What is the next term in 109097, 218193, 327289, 436385, 545481? 654577 What is the next term in 153, 350, 661, 1080, 1601, 2218, 2925? 3716 What comes next: 2997, 3034, 3071, 3108, 3145, 3182? 3219 What is the next term in 16690, 16691, 16692, 16693, 16694, 16695? 16696 What is next in 18232, 36473, 54718, 72967? 91220 What comes next: -3743, -7527, -11311, -15095, -18879? -22663 What is next in 14355, 14354, 14353, 14352, 14351, 14350? 14349 What is the next term in -1737, -1471, -1027, -405? 395 What is next in 798, 923, 1050, 1179, 1310, 1443, 1578? 1715 What is the next term in 2464, 4976, 7490, 10006, 12524, 15044? 17566 What is the next term in -4007, -16056, -36137, -64250, -100395, -144572, -196781? -257022 What is next in 710015, 1420028, 2130041, 2840054? 3550067 What is next in 7621, 7577, 7503, 7399, 7265, 7101? 6907 What comes next: -42042, -84059, -126076, -168093? -210110 What comes next: 1408, 2779, 4112, 5407, 6664, 7883? 9064 What is next in 169, 521, 1145, 2071, 3329, 4949, 6961? 9395 What is the next term in 279, 559, 831, 1095, 1351, 1599, 1839? 2071 What comes next: -219, -1320, -3161, -5748, -9087, -13184, -18045? -23676 What is the next term in -71, -332, -775, -1406, -2231, -3256, -4487? -5930 What is the next term in 113, 264, 393, 488, 537, 528? 449 What is next in 234856, 234857, 234858, 234859, 234860, 234861? 234862 What is the next term in 197, 409, 641, 899, 1189? 1517 What is the next term in 11293, 11340, 11425, 11554, 11733, 11968? 12265 What comes next: 17718, 70359, 158094, 280923, 438846, 631863? 859974 What is the next term in 261854, 523706, 785558, 1047410, 1309262? 1571114 What comes next: 2418, 9685, 21814, 38811, 60682? 87433 What is the next term in -433991, -433988, -433983, -433976, -433967, -433956, -433943? -433928 What is next in -494, -554, -616, -680? -746 What comes next: -89, -219, -431, -725, -1101? -1559 What comes next: 284, 270, 234, 164, 48? -126 What is next in 438, 494, 550? 606 What is the next term in 2145, 8541, 19201, 34125, 53313, 76765? 104481 What is next in -1010, -1004, -1012, -1040, -1094? -1180 What comes next: -2453, -2568, -2667, -2744, -2793, -2808, -2783, -2712? -2589 What is next in -1482, -2969, -4458, -5949, -7442, -8937? -10434 What is the next term in -3874313, -3874314, -3874315? -3874316 What comes next: 43, 62, 59, 22, -61? -202 What is the next term in -2769, -3035, -3479, -4101, -4901, -5879? -7035 What is the next term in -290, 179, 662, 1165, 1694, 2255, 2854, 3497? 4190 What is the next term in -374, -1588, -3630, -6506, -10222, -14784, -20198? -26470 What is next in -470, -662, -854, -1046, -1238? -1430 What is the next term in -115873, -115874, -115875, -115876? -115877 What is next in -99442, -99441, -99440? -99439 What comes next: -12950, -12933, -12906, -12869? -12822 What comes next: -1050, -2031, -3004, -3963, -4902? -5815 What is next in -28004, -27788, -27428, -26924? -26276 What is the next term in 1631397, 1631396, 1631395, 1631394, 1631393, 1631392? 1631391 What comes next: 594615, 1189226, 1783835, 2378442, 2973047, 3567650? 4162251 What is next in -232160, -232159, -232168, -232193, -232240, -232315, -232424, -232573? -232768 What comes next: -7428, -14859, -22290, -29721, -37152, -44583? -52014 What is the next term in 142, -1306, -3728, -7130, -11518? -16898 What is next in -19707, -19714, -19723, -19734, -19747, -19762, -19779? -19798 What comes next: 4022, 3953, 3884, 3815, 3746, 3677? 3608 What is next in -13957, -13963, -13969, -13975, -13981, -13987? -13993 What is next in 373, 402, 451, 520, 609? 718 What is next in -1807, -1804, -1801, -1798? -1795 What is the next term in -8914, -9005, -9156, -9367? -9638 What is the next term in 265076, 265075, 265074, 265073, 265072? 265071 What comes next: -30862, -123272, -277282, -492886, -770078, -1108852? -1509202 What is the next term in -1093, -2141, -3155, -4135, -5081? -5993 What is next in -305, -885, -1861, -3239, -5025, -7225, -9845? -12891 What comes next: 246901, 246900, 246899, 246898, 246897, 246896? 246895 What comes next: 158, -317, -794, -1273, -1754, -2237, -2722? -3209 What is the next term in 23158, 46309, 69460? 92611 What comes next: -14483, -29260, -44037, -58814, -73591? -88368 What is next in -790, -1669, -2548, -3427, -4306? -5185 What is the next term in 4172, 16692, 37560, 66776, 104340, 150252, 204512? 267120 What is next in 5324, 5327, 5334, 5345, 5360? 5379 What is the next term in -76264, -76262, -76258, -76252? -76244 What is the next term in -276036, -552068, -828100, -1104132, -1380164? -1656196 What is next in 8356, 8309, 8258, 8203, 8144, 8081, 8014? 7943 What is next in -1217, -4920, -11093, -19736, -30849, -44432? -60485 What is the next term in -4246, -4025, -3814, -3619, -3446, -3301? -3190 What is the next term in -340, -1341, -3008, -5341, -8340, -12005, -16336? -21333 What is next in -8799, -8794, -8789, -8784? -8779 What comes next: -5026, -10311, -15596, -20881, -26166, -31451? -36736 What is the next term in -1831, -3237, -4645, -6049, -7443, -8821? -10177 What comes next: -13571, -13589, -13607? -13625 What is next in -23846, -47706, -71576, -95462, -119370, -143306? -167276 What comes next: 1363, 11023, 37267, 88387, 172675? 298423 What comes next: 43750, 43752, 43754? 43756 What is next in 290, -86, -462, -838, -1214, -1590? -1966 What is the next term in -15059, -15057, -15055, -15053? -15051 What is next in -62, -245, -536, -935, -1442, -2057, -2780? -3611 What is next in -36117, -36113, -36105, -36093, -36077, -36057, -36033? -36005 What is the next term in -1601, -1627, -1653, -1679, -1705? -1731 What comes next: 1360, 1368, 1376, 1384, 1392, 1400? 1408 What is the next term in 733, 2104, 4735, 9256, 16297, 26488, 40459? 58840 What is the next term in 142, 1678, 5846, 13960, 27334, 47282? 75118 What comes next: 37, -84, -205, -326, -447? -568 What comes next: 41903, 41902, 41901? 41900 What is next in -786, -1703, -2608, -3495, -4358, -5191, -5988? -6743 What is the next term in -2516, -4947, -7236, -9311, -11100, -12531, -13532, -14031? -13956 What is next in -910, -1807, -2702, -3595, -4486? -5375 What is the next term in -79, -114, -145, -148, -99? 26 What is next in -335723, -671447, -1007169, -1342889? -1678607 What is the next term in -22821, -91276, -205369, -365100? -570469 What is the next term in -236496, -236487, -236478, -236469, -236460, -236451? -236442 What is next in -93, -217, -347, -483, -625, -773, -927? -1087 What is the next term in -1006, -1018, -1032, -1042, -1042? -1026 What is the next term in -74893, -74907, -74921, -74935? -74949 What comes next: -30, -97, -218, -405, -670? -1025 What is the next term in 1323, 2598, 3873? 5148 What is next in 115250, 230487, 345724, 460961, 576198? 691435 What is next in -102299, -102298, -102297, -102296, -102295? -102294 What is next in 5682, 5858, 6034, 6210, 6386, 6562? 6738 What is the next term in 37986, 75996, 114006? 152016 What is next in 68, 186, 506, 1130, 2160, 3698, 5846? 8706 What comes next: -4033, -7994, -11955, -15916? -19877 What is next in 1972, 1963, 1930, 1861, 1744? 1567 What is the next term in -19156, -38072, -56984, -75892, -94796? -113696 What is next in -38483, -76970, -115457, -153944, -192431? -230918 What is the next term in 151534, 151537, 151540? 151543 What is next in -508843, -1017685, -1526525, -2035363? -2544199 What is next in -126, -614, -1418, -2532, -3950? -5666 What is the next term in -24605, -49206, -73807, -98408, -123009, -147610? -172211 What is the next term in -84085, -168168, -252251? -336334 What is next in -8788, -17574, -26360, -35146? -43932 What is the next term in 3508921, 7017842, 10526763, 14035684? 17544605 What comes next: 4778, 9505, 14232, 18959, 23686, 28413? 33140 What comes next: 3446, 13303, 29732, 52733, 82306, 118451, 161168? 210457 What is next in 3644, 3635, 3608, 3557, 3476, 3359, 3200? 2993 What is next in -287049, -287051, -287055, -287061? -287069 What is next in -55, -21, 165, 569, 1257, 2295? 3749 What is next in -175513, -351016, -526519, -702022, -877525, -1053028? -1228531 What is next in -2701, -2731, -2817, - | Low | [
0.501519756838905,
20.625,
20.5
] |
Hi all, I had a complete paradigm shift on February 13th of this year. I am wondering if anyone else had an experience like mine. For years I knew most all of the history and issues with the LDS church. I felt like that I wasn't going to ever believe differently then that the church was true, etc. I would always almost enjoy reading the upsetting stuff because I felt like it was something that outsiders didn't understand. I would go on mormon dialogue and talk about different doctrines etc. - but at times I would pray because I was so utterly confused. I would pray for better understanding to reconcile the church belief with other personal understandings about the universe. I did feel for so long that the understanding would come, and what I did understand about the Gospel was pretty amazing stuff, so of course everything else would fall into place. What happened was a complete collapse, almost all at once. Only for a second did I get a quick fear of losing eternal life but it soon left. Has anyone else had the experience of knowing the problematic stuff and it didn't really disturb you, and then all at once there is just a shift? I mean this wasn't a limited knowledge and then complete shock of learning something on a website. Something did change almost instantly though, inside. Thanks. That happened to me. I always thought a lot and eventually I came to the conclusion that there was so many problems. If the Lord cared about Joe's credibility to make a plan B to the 116 pages, why he didn't care to much worse stuff like the Book of Abraham, evolution, BOM translation, Plural Marriage, etc. It was the sheer number of grave problems that began to weight in. I had a major crisis of faith about one years ago, but when I felt the despair, I managed to close my eyes to the problems and it eventually went away. The Race and the Priesthood essay at December was the straw that broke the camel's back to me. I can paraphrase old Joe: "When I first looked upon him, I was afraid; but the fear soon left me." I guess I was aware of some things..... inoculated about disturbing things like polygamy, dna issues, multiple first vision... but then I heard about the Book Of Abraham issue.... I was still kinda holding out hope that I could find an explanation that would apease me, but they were all so absurd. I became obsessed with researching all things mormon. It didn't take long until I knew I couldn't believe it anymore..... I have special admiration for people who question the church based on doctrine or historical contradictions, since it took something as extreme as various thwarted sucide attempts because of my homosexual feelings to push me to finally question the validity of the Chruch. Once it cracks, it all falls apart like dominoes or as you called it, a whole shelf collapsing. After I resigned my membership the metaphor I used a lot was that my entire world had previously been meticulously organised in the form of an elaborate bookshelf, a bookshelf that was now totally collapsed. Having to reorganise all its contents based on my own thoughts and ideas and not the directives of an outside body was a task that took a lot of time and patience, but I am really deeply grateful it was possible to do so. closer2fine Wrote:-------------------------------------------------------> I guess I was aware of some things..... inoculated> about disturbing things like polygamy, dna issues,> multiple first vision... but then I heard about> the Book Of Abraham issue.... I was still kinda> holding out hope that I could find an explanation> that would apease me, but they were all so absurd.> I became obsessed with researching all things> mormon. It didn't take long until I knew I> couldn't believe it anymore.....>> So what was the one thing that did it for you? It was a myriad if things. A was a pious zealot and lived the law to a T. I have been well read on esoteric concepts, and other spirituality - but I would always have to filter what I felt was true through what some guy said at the last conference and reconcile it somehow, the mental gymnastics were a skill like no other. We paid such a generous fast offering for years, and I mean like a ridiculous amount, I seriously believed in the "promise" - we have ended up in a bad place, we honestly couldn't even afford tithing after sometime, and I paid on gross every two weeks for a few years. Incredible. Anyways, I remember out of all the things on the shelf, the one thing on mind was the hero worship that people gave the newest prophet. And then the prophet telling stories, and then more stories, and the. Re-telling stories. Then he would act all weird and everyone would have to laugh at how weird it was. I'm just saying that the feeling for me was not mutual for me. I agree with the other statements of a feeling of relief. I can tell you that in a moment that my whole paradigm changed, and not just what was religious. I am in happy valley and the culture and teachings really take over your whole life focus. I didn't necessarily just say I was had by a fraud, but I could say that the claims are not true, and that's it. It's funny because not until I has that "awakening" was I ready to defend the most ridiculous doctrines and practices. It really takes a shift in consciousness, and I am hoping my wife can come to that point, but I know where she is at and must allow her to process. She has been ultra accepting of all of this. It will cause issues with others, but I am not one who just lives the religion because that's what Pappa did, or because it's still "good", or for any reason- I love the truth, and if the LDS church taught me anything, it taught me that truth must be sought, no matter where it's at. I realized there was misdirection, and I am not going to follow suit. Anyways... I had gone inactive when my gay ex told me he was cheating and he was ex. sec. I didn't want the fallout of our marriage to happen in the public eye--and for other reasons. I had been inactive for quite a while--probably at least 10 to 15 years. I always thought I'd go back when life settled down. I knew some things like that JS was a polygamist. Up to the point I was at when I lost beliefs, I'd experienced A LOT in my own life dealing with leaders and the gay issue. My best friend's daughter was getting married. She told me that when there were problems with the wedding plans, her daughter would say, "The church is still true, so what does it matter." I thought about that statement for a few days and then, yes, it all fell apart. One day in a matter of moments it hit me, "But it mattered to me." I knew right then and there it was not true. It was after I'd lost by beliefs that my therapist told me about this board and I found out much of the history. It was just icing on the cake. Once I was able to verbalize the words "the LDS church is not true", my shelf collapsed at the same instant, because all those questions I once considered important became moot.Knowing the church was not at all what it claimed, by itself, washed all those questions away slicker thn snot! I remember 30 years ago reading scriptures with the kids. They had new scriptures, I had the old. We got to the "white and delightsome" part, but they read "pure and delightsome". I suppose that's where it started. Over the years I'd built myself quite a shelf. I knew probably 80% of the problems, and kept struggling to reconcile it all. Then one night while home alone I was walking through the house (I can still remember where I was), and a powerful impression hit me, that the church wasn't true. It was as though a great burden had been lifted from me. I no longer had to reconcile that pile of contradictions. It was a peaceful feeling, but I had a profound sense of loss (30 yrs in church at that point). I was subsequently called to serve in a bishopric. I hoped I could do some good. When I saw that our bishop / SP were primarily interested in running programs and getting people in the door, and had little interest in helping people grow spiritually, I knew I had nothing to offer. So yes, there was a singular moment for me, ignored for a while, but still there. I knew a few things... mostly BoA as the biggest. I put it on the shelf and continued for several years until I read "Rough Stone Rolling". After finishing that book, I put it away and figured I would continue on as TBM. Then I started thinking about what was in RSR and I said to myself, "you know what, I'm not ok with this." I struggled for a few weeks and then finally wondered, what if it's not true? That's when everything immediately clicked into place and made sense. Then the fallout began... but life is better now :) One thing that has always struck me as odd about the BoA was that Joseph Smith did not add to to the canonized scriptures, and nor did Brigham Young. The Church waited until 1880 when John Taylor was pres to canonize the Pearl of Great Price, which included the BoA. it was probably easier if it all collapsed at once. I kept drilling new holes in the wall for a better shelf, then propping it up over and over. finally all the 2x4's etc. couldn't hold all the weight. I don't think that TBM's appreciate what happens. The moment mine collapsed I had known about polygamy and a few other disturbing things like another version of the first vision and Oliver Cowdrey being excommunicated and Emma not being a part of Utah Mormonism. But I learned Joseph Smith married my ancestor Zina Jacobs after she had been married for only a short time to her legal husband. Collapse. I thought that the founder of Mormonism must have pulled a lot more shiz and then I went and learned about it. Game over for LDS Inc. and they don't want me. I think outside their box. I actually think the pearl of great price was actually put together and named as such by a missionary in England? In the mid 1800's. This guy put it together as a tract, then in becomes scripture a few decades later. But then they decanonized other stuff later on, lectures on faith, etc. | Mid | [
0.6265664160401,
31.25,
18.625
] |
/* * Copyright (c) Microsoft Corporation. All rights reserved. * Licensed under the MIT License. See License.txt in the project root for * license information. * * Code generated by Microsoft (R) AutoRest Code Generator. * Changes may cause incorrect behavior and will be lost if the code is * regenerated. */ import * as msRest from "@azure/ms-rest-js"; import * as msRestAzure from "@azure/ms-rest-azure-js"; import * as Models from "../models"; import * as Mappers from "../models/profilesMappers"; import * as Parameters from "../models/parameters"; import { CustomerInsightsManagementClientContext } from "../customerInsightsManagementClientContext"; /** Class representing a Profiles. */ export class Profiles { private readonly client: CustomerInsightsManagementClientContext; /** * Create a Profiles. * @param {CustomerInsightsManagementClientContext} client Reference to the service client. */ constructor(client: CustomerInsightsManagementClientContext) { this.client = client; } /** * Creates a profile within a Hub, or updates an existing profile. * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param parameters Parameters supplied to the create/delete Profile type operation * @param [options] The optional parameters * @returns Promise<Models.ProfilesCreateOrUpdateResponse> */ createOrUpdate(resourceGroupName: string, hubName: string, profileName: string, parameters: Models.ProfileResourceFormat, options?: msRest.RequestOptionsBase): Promise<Models.ProfilesCreateOrUpdateResponse> { return this.beginCreateOrUpdate(resourceGroupName,hubName,profileName,parameters,options) .then(lroPoller => lroPoller.pollUntilFinished()) as Promise<Models.ProfilesCreateOrUpdateResponse>; } /** * Gets information about the specified profile. * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param [options] The optional parameters * @returns Promise<Models.ProfilesGetResponse> */ get(resourceGroupName: string, hubName: string, profileName: string, options?: Models.ProfilesGetOptionalParams): Promise<Models.ProfilesGetResponse>; /** * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param callback The callback */ get(resourceGroupName: string, hubName: string, profileName: string, callback: msRest.ServiceCallback<Models.ProfileResourceFormat>): void; /** * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param options The optional parameters * @param callback The callback */ get(resourceGroupName: string, hubName: string, profileName: string, options: Models.ProfilesGetOptionalParams, callback: msRest.ServiceCallback<Models.ProfileResourceFormat>): void; get(resourceGroupName: string, hubName: string, profileName: string, options?: Models.ProfilesGetOptionalParams | msRest.ServiceCallback<Models.ProfileResourceFormat>, callback?: msRest.ServiceCallback<Models.ProfileResourceFormat>): Promise<Models.ProfilesGetResponse> { return this.client.sendOperationRequest( { resourceGroupName, hubName, profileName, options }, getOperationSpec, callback) as Promise<Models.ProfilesGetResponse>; } /** * Deletes a profile within a hub * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param [options] The optional parameters * @returns Promise<msRest.RestResponse> */ deleteMethod(resourceGroupName: string, hubName: string, profileName: string, options?: Models.ProfilesDeleteMethodOptionalParams): Promise<msRest.RestResponse> { return this.beginDeleteMethod(resourceGroupName,hubName,profileName,options) .then(lroPoller => lroPoller.pollUntilFinished()); } /** * Gets all profile in the hub. * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param [options] The optional parameters * @returns Promise<Models.ProfilesListByHubResponse> */ listByHub(resourceGroupName: string, hubName: string, options?: Models.ProfilesListByHubOptionalParams): Promise<Models.ProfilesListByHubResponse>; /** * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param callback The callback */ listByHub(resourceGroupName: string, hubName: string, callback: msRest.ServiceCallback<Models.ProfileListResult>): void; /** * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param options The optional parameters * @param callback The callback */ listByHub(resourceGroupName: string, hubName: string, options: Models.ProfilesListByHubOptionalParams, callback: msRest.ServiceCallback<Models.ProfileListResult>): void; listByHub(resourceGroupName: string, hubName: string, options?: Models.ProfilesListByHubOptionalParams | msRest.ServiceCallback<Models.ProfileListResult>, callback?: msRest.ServiceCallback<Models.ProfileListResult>): Promise<Models.ProfilesListByHubResponse> { return this.client.sendOperationRequest( { resourceGroupName, hubName, options }, listByHubOperationSpec, callback) as Promise<Models.ProfilesListByHubResponse>; } /** * Gets the KPIs that enrich the profile Type identified by the supplied name. Enrichment happens * through participants of the Interaction on an Interaction KPI and through Relationships for * Profile KPIs. * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param [options] The optional parameters * @returns Promise<Models.ProfilesGetEnrichingKpisResponse> */ getEnrichingKpis(resourceGroupName: string, hubName: string, profileName: string, options?: msRest.RequestOptionsBase): Promise<Models.ProfilesGetEnrichingKpisResponse>; /** * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param callback The callback */ getEnrichingKpis(resourceGroupName: string, hubName: string, profileName: string, callback: msRest.ServiceCallback<Models.KpiDefinition[]>): void; /** * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param options The optional parameters * @param callback The callback */ getEnrichingKpis(resourceGroupName: string, hubName: string, profileName: string, options: msRest.RequestOptionsBase, callback: msRest.ServiceCallback<Models.KpiDefinition[]>): void; getEnrichingKpis(resourceGroupName: string, hubName: string, profileName: string, options?: msRest.RequestOptionsBase | msRest.ServiceCallback<Models.KpiDefinition[]>, callback?: msRest.ServiceCallback<Models.KpiDefinition[]>): Promise<Models.ProfilesGetEnrichingKpisResponse> { return this.client.sendOperationRequest( { resourceGroupName, hubName, profileName, options }, getEnrichingKpisOperationSpec, callback) as Promise<Models.ProfilesGetEnrichingKpisResponse>; } /** * Creates a profile within a Hub, or updates an existing profile. * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param parameters Parameters supplied to the create/delete Profile type operation * @param [options] The optional parameters * @returns Promise<msRestAzure.LROPoller> */ beginCreateOrUpdate(resourceGroupName: string, hubName: string, profileName: string, parameters: Models.ProfileResourceFormat, options?: msRest.RequestOptionsBase): Promise<msRestAzure.LROPoller> { return this.client.sendLRORequest( { resourceGroupName, hubName, profileName, parameters, options }, beginCreateOrUpdateOperationSpec, options); } /** * Deletes a profile within a hub * @param resourceGroupName The name of the resource group. * @param hubName The name of the hub. * @param profileName The name of the profile. * @param [options] The optional parameters * @returns Promise<msRestAzure.LROPoller> */ beginDeleteMethod(resourceGroupName: string, hubName: string, profileName: string, options?: Models.ProfilesBeginDeleteMethodOptionalParams): Promise<msRestAzure.LROPoller> { return this.client.sendLRORequest( { resourceGroupName, hubName, profileName, options }, beginDeleteMethodOperationSpec, options); } /** * Gets all profile in the hub. * @param nextPageLink The NextLink from the previous successful call to List operation. * @param [options] The optional parameters * @returns Promise<Models.ProfilesListByHubNextResponse> */ listByHubNext(nextPageLink: string, options?: msRest.RequestOptionsBase): Promise<Models.ProfilesListByHubNextResponse>; /** * @param nextPageLink The NextLink from the previous successful call to List operation. * @param callback The callback */ listByHubNext(nextPageLink: string, callback: msRest.ServiceCallback<Models.ProfileListResult>): void; /** * @param nextPageLink The NextLink from the previous successful call to List operation. * @param options The optional parameters * @param callback The callback */ listByHubNext(nextPageLink: string, options: msRest.RequestOptionsBase, callback: msRest.ServiceCallback<Models.ProfileListResult>): void; listByHubNext(nextPageLink: string, options?: msRest.RequestOptionsBase | msRest.ServiceCallback<Models.ProfileListResult>, callback?: msRest.ServiceCallback<Models.ProfileListResult>): Promise<Models.ProfilesListByHubNextResponse> { return this.client.sendOperationRequest( { nextPageLink, options }, listByHubNextOperationSpec, callback) as Promise<Models.ProfilesListByHubNextResponse>; } } // Operation Specifications const serializer = new msRest.Serializer(Mappers); const getOperationSpec: msRest.OperationSpec = { httpMethod: "GET", path: "subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/profiles/{profileName}", urlParameters: [ Parameters.resourceGroupName, Parameters.hubName1, Parameters.profileName1, Parameters.subscriptionId ], queryParameters: [ Parameters.localeCode, Parameters.apiVersion ], headerParameters: [ Parameters.acceptLanguage ], responses: { 200: { bodyMapper: Mappers.ProfileResourceFormat }, default: { bodyMapper: Mappers.CloudError } }, serializer }; const listByHubOperationSpec: msRest.OperationSpec = { httpMethod: "GET", path: "subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/profiles", urlParameters: [ Parameters.resourceGroupName, Parameters.hubName1, Parameters.subscriptionId ], queryParameters: [ Parameters.localeCode, Parameters.apiVersion ], headerParameters: [ Parameters.acceptLanguage ], responses: { 200: { bodyMapper: Mappers.ProfileListResult }, default: { bodyMapper: Mappers.CloudError } }, serializer }; const getEnrichingKpisOperationSpec: msRest.OperationSpec = { httpMethod: "POST", path: "subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/profiles/{profileName}/getEnrichingKpis", urlParameters: [ Parameters.resourceGroupName, Parameters.hubName1, Parameters.profileName1, Parameters.subscriptionId ], queryParameters: [ Parameters.apiVersion ], headerParameters: [ Parameters.acceptLanguage ], responses: { 200: { bodyMapper: { serializedName: "parsedResponse", type: { name: "Sequence", element: { type: { name: "Composite", className: "KpiDefinition" } } } } }, default: { bodyMapper: Mappers.CloudError } }, serializer }; const beginCreateOrUpdateOperationSpec: msRest.OperationSpec = { httpMethod: "PUT", path: "subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/profiles/{profileName}", urlParameters: [ Parameters.resourceGroupName, Parameters.hubName1, Parameters.profileName0, Parameters.subscriptionId ], queryParameters: [ Parameters.apiVersion ], headerParameters: [ Parameters.acceptLanguage ], requestBody: { parameterPath: "parameters", mapper: { ...Mappers.ProfileResourceFormat, required: true } }, responses: { 200: { bodyMapper: Mappers.ProfileResourceFormat }, 202: {}, default: { bodyMapper: Mappers.CloudError } }, serializer }; const beginDeleteMethodOperationSpec: msRest.OperationSpec = { httpMethod: "DELETE", path: "subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.CustomerInsights/hubs/{hubName}/profiles/{profileName}", urlParameters: [ Parameters.resourceGroupName, Parameters.hubName1, Parameters.profileName1, Parameters.subscriptionId ], queryParameters: [ Parameters.localeCode, Parameters.apiVersion ], headerParameters: [ Parameters.acceptLanguage ], responses: { 200: {}, 202: {}, 204: {}, default: { bodyMapper: Mappers.CloudError } }, serializer }; const listByHubNextOperationSpec: msRest.OperationSpec = { httpMethod: "GET", baseUrl: "https://management.azure.com", path: "{nextLink}", urlParameters: [ Parameters.nextPageLink ], headerParameters: [ Parameters.acceptLanguage ], responses: { 200: { bodyMapper: Mappers.ProfileListResult }, default: { bodyMapper: Mappers.CloudError } }, serializer }; | Mid | [
0.567049808429118,
37,
28.25
] |
Blogs KevinMD's Take, March 25, 2013 In an emotionally-charged post, a physiatrist explains why she works part time to help balance family and work life. "Trust me, I feel guilty that I can’t work the hours some physicians work," she writes. "Sometimes I wonder what’s wrong with me, that I can’t seem to juggle the same number of balls as some other women. But I have found a balance of career and family life that seems to work for me." She shouldn't feel guilty. Physicians deserve balance, and gone are the days where they devote their lives entirely to the profession. It's up to hospitals and clinics to adjust to this new reality. But given the transparency of health information to patients, as well as the growing scope of practice for nonphysician providers, he worries "that the medical traditionalists may ultimately end up being on the wrong side of history." Already, there are medical schools that take a year off of training for students interested in primary care. The movement to shorten medical training has already begun. Kevin Pho MD is the founder of KevinMD.com, the web’s leading destination for provocative physician commentary on breaking medical news. Klout named KevinMD.com the web’s top social media influencer in health care and medicine. The Wall Street Journal called KevinMD.com a “punchy, prolific blog that chronicles America’s often dysfunctional health care system through the prism of a primary care provider,” while others have noted that “a lively comment stream on one of Kevin Pho’s posts provides more insight on the day-to-day realities of health care than any piece of journalism can ever hope to impart.” Kevin received his medical degree and completed residency at Boston University School of Medicine and is a member of the 2010 class of New Hampshire’s 40 Under Forty, recognizing the state’s emerging leaders. He is board certified in internal medicine and practices primary care in Nashua, New Hampshire. This survey is a poll of those who choose to participate and are, therefore, not valid statistical samples, but rather a snapshot of what your colleagues are thinking. ADVERTISEMENT MedPageToday is a trusted and reliable source for clinical and policy coverage that directly affects the lives and practices of health care professionals. Physicians and other healthcare professionals may also receive Continuing Medical Education (CME) and Continuing Education (CE) credits at no cost for participating in MedPage Today-hosted educational activities. | Mid | [
0.648401826484018,
35.5,
19.25
] |
68 S.E.2d 313 (1951) 234 N.C. 660 TAYLOR v. JONES BROS. BAKERY, Inc. No. 669. Supreme Court of North Carolina. December 12, 1951. *314 H. L. Koontz, Greensboro, J. Elmer Long and Clarence Ross, Graham, for plaintiff, appellee. Hines & Boren and Welch Jordan, Greensboro, for defendant, appellant. DENNY, Justice. The defendant's exception to the failure of the court to strike out that portion of paragraph eight of the plaintiff's complaint, alleging that the plaintiff was discharged by Biggerstaff wrongfully and without justification or excuse, is without merit. The exception, however, to the refusal of the court to strike out paragraph nine of the complaint in its entirety, presents a more serious question. There is no allegation in the complaint to the effect that Paul Jones, the Vice President of the defendant corporation, ever communicated the statement made by him to the plaintiff to any other person, nor does the plaintiff allege in his complaint that any slanderous statement with respect to the conduct of the plaintiff was ever communicated to a third person by any one, save and except by O. W. Biggerstaff, a route supervisor of the defendant. Therefore, we must consider whether the statement made by the officer of the defendant corporation to the plaintiff upon the plaintiff's inquiry as to why he had been discharged, constituted a publication sufficient to support an action for slander. The answer must be in the negative. It is generally held that the publication, of a libel or slander, invited or procured by the plaintiff, or by a person acting for him, is not sufficient to support an action for defamation. 33 Am.Jur., Libel and Slander, section 93, p. 105; 53 C.J.S., Libel and Slander, § 80, p. 129; Renfro Drug Co. v. Lawson, 138 Tex. 434, 160 S.W.2d 246, 146 A.L.R. 732; Taylor v. Mc-Daniels, 139 Okl. 262, 281 P. 967, 66 A.L.R. 1246; McDaniel v. Crescent Motors, 249 Ala. 330, 31 So.2d 343, 172 A.L.R. 204; Lovejoy v. Mutual Broadcasting Co., Tex. Civ.App., 220 S.W.2d 308; Kaplan v. Edmondson, 68 Ga.App. 151, 22 S.E.2d 343; Tucker v. Pure Oil Company of Carolinas, 191 S.C. 60, 3 S.E.2d 547. While it is not necessary that the defamatory words be communicated to the public generally, it is necessary that they be communicated to some person or persons other than the person defamed. Hedgepeth v. Coleman, 183 N.C. 309, 111 S.E. 517, 24 A.L.R. 232; McKeel v. Latham, 202 N.C. 318, 162 S.E. 747; 53 C.J.S., Libel and Slander, § 78, p. 127; 33 Am.Jur., Libel and Slander, section 96, p. 107. An examination of plaintiff's complaint discloses that all his allegations with respect to his right to recover compensatory as well as punitive damages, are bottomed on the statements made by Biggerstaff to the various customers of the defendant corporation. He alleges no damages resulting from the statement made to him by the Vice President of the defendant corporation in response to his own inquiry as to the reason for his discharge. Certainly such a statement, unless made to a third person, would not support an action for slander. Moreover, it is generally held that where slanderous or libelous statements are induced for the purpose of bringing suit thereon, recovery will not be permitted. This is upon the theory that a plaintiff will not be permitted to "assist in building up a cause of action for the purpose of gathering the fruitage to himself." Richardson v. Gunby, 88 Kan. 47, 127 P. 533, 536, 42 L.R.A.,N.S., 520. See 172 A.L.R. Annotation 214. Furthermore, there is no allegation in plaintiff's complaint to the effect that the Vice President of the defendant corporation authorized *315 the defendant Biggerstaff, or any one else, to publish the statement made by him to the plaintiff. 53 C.J.S., Libel and Slander, § 150(a), p. 233. Consequently, we think the defendant is entitled to have all of the allegations contained in paragraph nine of the plaintiff's complaint stricken out, and it is so ordered. The exception to the failure of the court to grant the defendant's motion to strike from the plaintiff's complaint the allegation with respect to the reputed wealth of the defendant, will not be upheld. In an action where punitive damages may be awarded, evidence of the financial condition of the defendant, or of its reputed wealth, is admissible in behalf of the plaintiff. Roth v. Greensboro News Co., 217 N.C. 13, 6 S.E.2d 882; Bryant v. Reedy, 214 N.C. 748, 200 S.E. 896; Baker v. Winslow, 184 N.C. 1, 113 S.E. 570; Carmichael v. Southern Bell Telephone & Telegraph Co., 162 N.C. 333, 78 S.E. 507; Arthur v. Henry, 157 N.C. 393, 73 S.E. 206; Tucker v. Winders, 130 N.C. 147, 41 S.E. 8; Reeves v. Winn, 97 N.C. 246, 1 S.E. 448; Adcock v. Marsh, 30 N.C. 360. The judgment of the court below will be modified as directed herein. Modified and affirmed. | Low | [
0.446854663774403,
25.75,
31.875
] |
--- abstract: 'Recent nuclear magnetic resonance (NMR) measurements revealed the coexistence of stripe-type antiferromagnetic (AFM) and ferromagnetic (FM) spin correlations in both the hole- and electron-doped BaFe$_2$As$_2$ families of iron-pnictide superconductors by a Korringa ratio analysis. Motivated by the NMR work, we investigate the possible existence of FM fluctuations in another iron pnictide superconducting family, Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$. We re-analyzed our previously reported data in terms of the Korringa ratio and found clear evidence for the coexistence of stripe-type AFM and FM spin correlations in the electron-doped CaFe$_2$As$_2$ system. These NMR data indicate that FM fluctuations exist in general in iron-pnictide superconducting families and thus must be included to capture the phenomenology of the iron pnictides.' author: - 'J. Cui' - 'P. Wiecki' - 'S. Ran\*' - 'S. L. Bud’ko' - 'P. C. Canfield' - 'Y. Furukawa' title: 'Coexistence of antiferromagnetic and ferromagnetic spin correlations in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ revealed by $^{75}$As nuclear magnetic resonance' --- Introduction ============ Since the discovery of high $T_{\rm c}$ superconductivity in iron pnictides,[@Kamihara2008] the interplay between spin fluctuations and the unconventional nature of superconductivity (SC) has been attracting much interest. In most of the Fe pnictide superconductors, the “parent" materials exhibit antiferromagnetic ordering below the Néel temperature.[@Canfield2010; @Johnston2010; @Stewart2011] SC in these compounds emerges upon suppression of the stripe-type antiferromagnetic (AFM) phase by application of pressure and/or chemical substitution, where the AFM spin fluctuations are still strong. Therefore, it is believed that stripe-type AFM spin fluctuations play an important role in driving the SC in the iron-based superconductors, although orbital fluctuations are also pointed out to be important. [@Kim2013] Recently nuclear magnetic resonance (NMR) measurements revealed that ferromagnetic (FM) correlations also play an important role in both the hole- and electron-doped BaFe$_2$As$_2$ families of iron-pnictide superconductors. [@Johnston2010; @Wiecki2015; @Wiecki2015prl] The FM fluctuations are found to be strongest in the maximally-doped BaCo$_2$As$_2$ and KFe$_2$As$_2$, but are still present in the BaFe$_2$As$_2$ parent compound, consistent with its enhanced magneric susceptibility $\chi$. [@Johnston2010] These FM fluctuations are suggested to compete with superconductivity and are a crucial ingredient to understand the variation of $T_{\rm c}$ and the shape of the SC dome. [@Wiecki2015prl] It is interesting and important to explore whether or not similar FM correlations exist in other iron pnictide systems. The CaFe$_2$As$_2$ family has a phase diagram distinct from that for the BaFe$_2$As$_2$ family. Whereas for the BaFe$_2$As$_2$ materials the AFM and orthorhombic phase transitions become second order with Co substitution, the CaFe$_2$As$_2$ family continues to manifest a strongly first order, coupled, structural-magnetic phase transition even as Co substitution suppresses the transition temperature to zero. Another significant difference in the phase diagrams of the CaFe$_2$As$_2$ and BaFe$_2$As$_2$ systems is also found in superconducting phase. Although SC appears when the stripe-type AFM phase is suppressed by Co substitution for Fe in both cases, no coexistence of SC and AFM has been observed in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$, whereas the coexistence has been reported in Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$. These results are consistent with the difference between a strongly first order versus second order phase transition. Recent NMR measurements revealed that the stripe-type AFM fluctuations are strongly suppressed in the AFM state in the Co-doped CaFe$_2$As$_2$ system, whereas sizable stripe-type AFM spin fluctuations still remain in the AFM state in the Co-doped BaFe$_2$As$_2$ system.[@Cui2015] These results indicate that the residual AFM spin fluctuations play an important role for the coexistence of AFM and SC in Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$. Furthermore, in the case of Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$, pseudogap-like behavior[@Cui2015] has been observed in the temperature dependence of 1/$T_1T$ and in-plane resistivity. The characteristic temperature of the pseudogap was reported to be nearly independent of Co substitution. In this paper, we investigated the possible existence of FM fluctuations in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ and found the clear evidence of coexistence of stripe-type AFM and FM correlations based on $^{75}$As NMR data analysis. In contrast to the case of Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ where the relative strength of FM correlations increases with Co substitution, that of the FM correlations are almost independent of the Co content in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ from $x$ = 0 to 0.059. Although we have investigated a relatively small Co substitution region, the existence of the FM spin correlations would be consistent with the fact that CaCo$_2$As$_2$, the end member of the electron doped Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ family of compounds, has an A-type antiferromagnetic ordered state below $T_{\rm N}$ = 52–76 K[@Quirinale2013; @Cheng2012] where the Co moments within the CoAs layer are ferromagnetically aligned along the $c$ axis and the moments in adjacent layers are aligned antiferromagnetically. Since the coexistence of FM and AFM spin correlations are observed in both the hole- and electron-doped BaFe$_2$As$_2$ systems,[@Wiecki2015prl] our results suggest that the FM fluctuations exist in general in iron pnictide superconductors, indicating that theoretical microscopic models should include FM correlations to reveal the feature of the iron pnictides. Experimental ============ The single crystals of Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ ($x$ = 0, 0.023, 0.028, 0.033 and 0.059) used in the present study are from the same batches as reported in Ref. . These single crystals were grown out of a FeAs/CoAs flux,[@Ran2011; @Ran2012] using conventional high temperature growth techniques.[@Canfield_book; @Canfield_1992] Subsequent to growth, the single crystals were annealed at $T_{\rm a}$ = 350 $^{\circ}$C for 7 days and then quenched. For $x$ = 0, the single crystal was annealed at $T_{\rm a}$ = 400 $^{\circ}$C for 24 hours. Details of the growth, annealing and quenching procedures have been reported in Refs. and . The stripe-type AFM states have been reported below the Néel temperatures $T_{\rm N}$ = 170, 106, and 53 K for $x$ = 0, 0.023, and 0.028, respectively.[@Goldman2008] The superconducting states are observed below the transition temperature of $T_{\rm c}$ = 15 and 10 K for $x$ = 0.033 and 0.059, respectively.[@Ran2012] NMR measurements were carried out on $^{75}$As (*I* = 3/2, $\gamma/2\pi$ = 7.2919 MHz/T, $Q$ = 0.29 Barns) by using a lab-built, phase-coherent, spin-echo pulse spectrometer. The $^{75}$As-NMR spectra were obtained at a fixed frequency $f$ = 53 MHz by sweeping the magnetic field. The magnetic field was applied parallel to either the crystal $c$ axis or the $ab$ plane where the direction of the magnetic field within the $ab$ plane was not controlled. The $^{75}$As 1/$T_{\rm 1}$ was measured with a recovery method using a single $\pi$/2 saturation $rf$ pulse. Most of NMR experimental results were published elsewhere.[@Furukawa2014; @Cui2015] ![(Color online) (a) Temperature dependence of $^{75}$As NMR shifts $K_{ab}$ and $K_{c}$ for Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$. (b) $K(T)$ versus magnetic susceptibility $\chi(T)$ plots for the corresponding $ab$ and $c$ components of $K$ in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ with $T$ as an implicit parameter. The solid and broken lines are linear fits. []{data-label="fig:T-K"}](Fig1){width="8.0"} Results and discussion ====================== In this paper we discuss magnetic correlations in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ based on a Korringa ratio analysis of the NMR results. Figure \[fig:T-K\](a) shows the $x$ and $T$ dependence of the Knight shifts, $K_{\rm ab}$ for $H$ parallel to the $ab$ plane and $K_{\rm c}$ for $H$ parallel to the $c$ axis, where new Knight shift data for $x$ = 0.033 and 0.059 are plotted in addition to the data ($x$ =0, 0.023 and 0.028) reported previously.[@Furukawa2014; @Cui2015] The NMR shift consists of a $T$-independent orbital shift $K_0$ and a $T$-dependent spin shift $K_{\text{spin}}(T)$ due to the uniform magnetic spin susceptibility $\chi(\mathbf{q}=0)$ of the electron system. The NMR shift can therefore be expressed as $K(T)=K_0+K_{\text{spin}}(T)=K_0+A_{\text{hf}}\chi_{\text{spin}}/N$, where $N$ is Avogadro’s number, and $A_{\text{hf}}$ is the hyperfine coupling constant, usually expressed in units of T$/\mu_{\rm B}$. Since detailed analysis of the temperature dependence of $K$ has been reported in Ref. , we are not going to discuss it in this paper. In order to extract $K_{\text{spin}}(T)$, which is needed for the following Korringa ratio analysis, we plot $K(T)$ against the corresponding bulk static uniform magnetic susceptibility $\chi(T)$ with $T$ as an implicit parameter as shown in Fig. \[fig:T-K\](b). From the slope of the linear fit curve, the hyperfine coupling constant can be estimated. The $x$ dependence of the hyperfine coupling constant has been reported in Ref. . From the $y$-intercept of the linear fit curve, one can estimate the orbital shift $K_0$, and extract $K_{\text{spin}}(T)$ to discuss magnetic correlations. A Korringa ratio analysis is applied to extract the character of spin fluctuations in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ from $^{75}$As NMR data as has been carried out for both the electron-doped Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ and hole-doped Ba$_{1-x}$K$_x$Fe$_2$As$_2$ families of iron-pnictide SCs.[@Wiecki2015prl] Within a Fermi liquid picture, $1/T_1T$ is proportional to the square of the density of states ${\cal D}(E_{\rm F})$ at the Fermi energy and $K_{\text{spin}} (\propto \chi_{\text{spin}}$) is proportional to ${\cal D}(E_{\rm F})$. In particular, $T_1TK_{\text{spin}}^2$ = $\frac{\hbar}{4\pi k_{\rm B}} \left(\frac{\gamma_{\rm e}}{\gamma_{\rm N}}\right)^2$ = ${\cal S}$, which is the Korringa relation. For the $^{75}$As nucleus ($\gamma_{\rm N}/2\pi=7.2919$ MHz/T), ${\cal S} =8.97\times 10^{-6}$ Ks. Korringa ratio $\alpha\equiv$ ${\cal S}$$/(T_1TK_{\text{spin}}^2)$, which reflects the deviations from ${\cal S}$, can reveal information about how electrons correlate in the material.[@Moriya1963; @Narath1968] $\alpha\sim1$ represents the situation of uncorrelated electrons. On the other hand, $\alpha >1$ indicates AFM correlations while $\alpha <1$ for FM correlations. These come from the enhancement of $\chi(\mathbf{q}\neq 0)$, which increases $1/T_1T$ but has little or no effect on $K_{\text{spin}}$, since the latter probes only the uniform $\chi(\mathbf{q} = 0)$. Therefore, the predominant feature of magnetic correlations, whether AFM or FM, can be determined by the Korringa ratio $\alpha$. To proceed with the Korringa ratio analysis, one needs to take the anisotropy of $K_\text{spin}$ and $1/T_1T$ into consideration. $1/T_1$ picks up the hyperfine field fluctuations at the NMR Larmor frequency, $\omega_{\rm 0}$, perpendicular to the applied field according to $(1/T_1)_{H||i}=\gamma_{\rm N}^2\left[|H^{\rm hf}_j(\omega_{\rm 0})|^2+|H^{\rm hf}_k(\omega_{\rm 0})|^2\right]$, where $(i,j,k)$ are mutually orthogonal directions and $|H^{\rm hf}_j(\omega_{\rm 0})|^2$ represents the power spectral density of the $j$-th component of the hyperfine magnetic field at the nuclear site. Thus, defining $H^{\rm hf}_{ab}\equiv H^{\rm hf}_{a}=H^{\rm hf}_{b}$, which is appropriate for the tetragonal PM state, we have $(1/T_1)_{H||c}=2\gamma_{\rm N}^2|H^{\rm hf}_{ab}(\omega_{\rm 0})|^2\equiv 1/T_{1,\perp}$. The Korringa parameter $\alpha_{\bot}\equiv {\cal S}/T_{1,\bot}TK_{\text{spin},ab}^2$ will then characterize fluctuations in the $ab$-plane component of the hyperfine field. Similarly, we consider the quantity $1/T_{1,\|}\equiv2(1/T_1)_{H||ab}-(1/T_1)_{H||c}= 2\gamma_N^2|H^{\rm hf}_{c}(\omega_{\rm N})|^2$, since $(1/T_1)_{H||ab}=\gamma_N^2\left[|H^{\rm hf}_{ab}(\omega_{\rm N})|^2+|H^{\rm hf}_c(\omega_{\rm N})|^2\right]$. We then pair $K_{\text{spin},c}$ with $1/T_{1,\|}$, so that the Korringa parameter $\alpha_{\|}={\cal S}/T_{1,\|}TK_{\text{spin},c}^2$ characterizes fluctuations in the $c$-axis component of the hyperfine field. ![(Color online) Temperature dependence of 1/$T_1T$ with anisotropy in Ca(Fe$_{\rm 1-x}$Co$_{x}$)$_2$As$_2$. (a) $1/T_{1,\perp}$ = $(1/T_1T)_{H||c}$. (b) $1/T_{1,\|}T=2(1/T_1T)_{H||ab}-(1/T_1T)_{H||c}$.[]{data-label="fig:T1T"}](Fig2){width="8.0cm"} Figure \[fig:T1T\] shows the temperature dependence of $1/T_{1,\perp}T$ and $1/T_{1,\|}T$ in Ca(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ at $H$ $\sim$ 7.5 T, obtained from the $(1/T_1T)_{H||ab}$ and $ (1/T_1T)_{H||c}$ data reported previously.[@Cui2015] For $x$ = 0, 0.023, and 0.028, $1/T_{1,\|}T$s show a monotonic increase with decreasing $T$ down to $T_{\rm N}$ = 170, 106, and 53 K for $x$ = 0, 0.023, 0.028, respectively, while $1/T_{1,\perp}T$s are nearly independent of $T$ although the slight increase can be seen near $T_{\rm N}$ for each sample. Since the increase of $1/T_{1,\|}T$s originates from the growth of the stripe-type AFM spin fluctuations,[@Cui2015] the results indicate that the AFM spin fluctuations enhance the hyperfine fluctuations at the As sites along the $c$ axis. In the case of superconducting samples with $x$ $\geq$ 0.033, $1/T_{1,\perp}T$ and $1/T_{1,\|}T$ show a slight increase or constant above $T^{*}$ $\sim$ 100 K on cooling and then start to decrease below $T^{*}$. These behaviors are ascribed to pseudogap-like behavior in Ref. . With a further decrease in $T$, both $1/T_{1,\|}T$ and $1/T_{1,\perp}T$ for $x$ = 0.033 and 0.059 show sudden decreases below $T_{\rm c}$ \[15 (10) K for $x$ = 0.033 (0.059)\] due to superconducting transitions. {width="16.0cm"} Using the $1/T_{1,\perp}T$, $1/T_{1,\|}T$ data and Knight shift data, we discuss magnetic correlations in Ca(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ based on the Korringa ratios. The $T$ dependences of the Korringa ratios $\alpha_{\bot}={\cal S}/T_{1,\bot}TK_{\text{spin},ab}^2$ and $\alpha_{\|}={\cal S}/T_{1,\|}TK_{\text{spin},c}^2$ are shown in Fig. \[fig:alpha\](a). All $\alpha_{\|}$ and $\alpha_\perp$ increase with decreasing $T$ down to $T_{\rm N}$ or $T^{*}$. The increase in $\alpha$, which is the increase in $1/T_{1,}TK^2$, clearly indicates the growth of the stripe-type AFM spin correlations as have been pointed out previously.[@Cui2015] It is noted that $\alpha_{\|}$ is always greater than $\alpha_\perp$ for each sample, indicating that stronger hyperfine fluctuations at the As sites due to AFM correlations along the $c$ axis than in $ab$. On the other hand, $\alpha_{\|}$ values seem to be less than unity: the largest value of $\alpha_\perp$ can be found to be $\sim$ 0.4 in $x$ = 0. The even smaller values $\alpha_\perp$ of 0.1 – 0.2 in $x$ = 0.023 and $x$ = 0.028 at high temperatures are observed, suggesting FM fluctuations in the normal state. In the application of the Korringa ratio to the iron pnictides, the question arises as to the role of the hyperfine form factor, which can, in principle, filter out the AFM fluctuations at the As site. This filtering effect could affect the balance of FM vs. AFM fluctuations as measured by the Korringa ratio. [@Jeglic2010] In order to discuss the filtering effects, it is convenient to express 1/$T_1$ in terms of wave-number ($\mathbf{q}$) dependent form factors and $\mathbf{q}$ dependent dynamical spin susceptibility $\chi(\mathbf{q}, \omega_0)$. By an explicit calculation of the form factors (see Appendix A) using the methods of Ref. , we find that $$\frac{1}{T_{1,\|}T}\sim \left[\left(2.7\frac{{\rm T}^2}{\mu_{\rm B}^2}\right)\frac{\chi_{ab}''(\mathbf{Q},\omega_0)}{\hbar\omega_0} +\left(1.5\frac{{\rm T}^2}{\mu_{\rm B}^2}\right)\frac{\chi_{c}''(\mathbf{0},\omega_0)}{\hbar\omega_0}\right],$$ $$\frac{1}{T_{1,\perp}T}\sim \left[\left(3.2\frac{{\rm T}^2}{\mu_{\rm B}^2}\right)\frac{\chi_{ab}''(\mathbf{0},\omega_0)}{\hbar\omega_0} +\left(1.4\frac{{\rm T}^2}{\mu_{\rm B}^2}\right)\frac{\chi_{c}''(\mathbf{Q},\omega_0)}{\hbar\omega_0}\right]$$ where $\chi''(\mathbf{0},\omega_0)$ and $\chi''(\mathbf{Q},\omega_0)$ represent the imaginary part of the dynamical susceptibility for $\mathbf{q}$ = 0 ferromagnetic and $\mathbf{Q}$ = $(\pi,0)/(0,\pi)$ stripe-type AFM components, respectively. The numbers are calculated from the hyperfine coupling constants in units of T/$\mu_{\rm B}$ for CaFe$_2$As$_2$ given in Ref. . From these equations, it is clear that the stripe-type AFM fluctuations are not filtered out for both directions in the iron pnictides. It is also seen that for $1/T_{1,\|}T$, the form factor favors AFM fluctuations, which explains the larger (more AFM) values of $\alpha_\|$. On the other hand, for $1/T_{1\perp}T$, the ferromagnetic fluctuations dominate more than the AFM fluctuations as actually seen in Fig. \[fig:alpha\](a) where $\alpha_\perp$ is less than $\alpha_\|$ for each sample. ![(Color online) (a),(b): Sources of hyperfine field along the $c$-axis. (c),(d): Sources of hyperfine field in the $ab$-plane.[]{data-label="fig:hyperfine"}](hyperfine.eps){width="8.0cm"} {width="17.0"} Now we consider the origin of the hyperfine field at the $^{75}$As site in order to further understand the physics associated with each term in Eqs. (1) and (2). The hyperfine field at the $^{75}$As site is determined by the spin moments on the Fe sites through the hyperfine coupling tensor $\tilde{A}$, according to $\mathbf{H}^{\text{hf}}=\tilde{A}\cdot\mathbf{S}$. In the tetragonal PM phase, the most general form for $\tilde{A}$ is [@Kitagawa2008; @Hirano2012] $$\tilde{A}= \begin{pmatrix} A_\perp & D & B \\ D & A_\perp & B \\ B & B & A_c \end{pmatrix},$$ where $A_i$ is the coupling for FM correlation, $D$ is the coupling for in-plane Neél-type AFM correlation and $B$ is coupling for stripe-type AFM correlations. Since there is no theoretical or experimental reason to expect Neél-type AFM correlation in the iron pnictides, below we simply set $D=0$. We then obtain $H^\text{hf}_\perp=A_\perp S_\perp+BS_{\rm c}$ and $H^\text{hf}_{\rm c}=2BS_\perp+A_{\rm c}S_{\rm c}$. There are therefore two sources of hyperfine field pointing along the $c$ axis[@Kitagawa2008]: fluctuations at $\mathbf{q}=\mathbf{Q}=(\pi,0)/(0,\pi)$ with the spins pointing in plane (as illustrated in Fig. \[fig:hyperfine\](a)) or fluctuations at $\mathbf{q}=0$ with the spins pointing along the $c$ axis (Fig. \[fig:hyperfine\](b)). The first and second fluctuations correspond to the first and second terms, respectively, in $1/T_{1, \|}T$ \[Eq. (1)\]. Similarly, hyperfine field fluctuations in the $ab$ plane can result from fluctuations at $\mathbf{q}=0$ with the spins pointing in plane (Fig. \[fig:hyperfine\](c)), or from fluctuations at $\mathbf{q}=\mathbf{Q}$ with the spins pointing along the $c$ axis (Fig. \[fig:hyperfine\](d)). Again, the first and second fluctuations can be attributed to the first and second terms, respectively, in $1/T_{1, \perp}T$ \[Eq. (2)\]. In what follows, we will refer to the correlations depicted in Fig. \[fig:hyperfine\](a) as “(a)-type” correlations (similarly for the others). To summarize, the value of $\alpha_\|$ reflects the competition between (a)- and (b)-type correlations, while $\alpha_\perp$ reflects the competition between (c)- and (d)-type correlations. Now, since $\alpha_\|$ reflects the character of hyperfine field fluctuations with a $c$-axis component, the strongly AFM $\alpha_\|$ in Fig. \[fig:alpha\] can be attributed to stripe-type AFM correlations with the Fe spins in plane (i.e. (a)-type). These must dominate the (b)-type correlations in order to have an AFM value of $\alpha_\|$. Similarly, since $\alpha_\perp$ reflects the character of the $ab$- plane component of hyperfine field fluctuations, the strongly FM value of $\alpha_\perp$ in the high $T$ region may be attributed to in plane FM fluctuations (Fig. \[fig:hyperfine\](c)), while the increase of $\alpha_\perp$ as the temperature is lowered reflects the increasing dominance of stripe-type AFM correlations with a $c$-axis component to the spin (as in Fig. \[fig:hyperfine\](d)). By examining the $c$-axis and $ab$-plane components of the hyperfine field fluctuations separately via $\alpha_\|$ and $\alpha_\perp$, we see the simultaneous coexistence of FM and AFM fluctuations in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$. Furthermore, the dominance of (a)- and (c)-type spin fluctuations in the high temperature region suggests that both the AFM and FM fluctuations are highly anisotropic, favoring the $ab$-plane. A similar feature of the coexistence of FM and AFM fluctuations[@Wiecki2015prl] has been reported in Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ and Ba$_{1-x}$K$_x$Fe$_2$As$_2$. It is interesting to separate the FM and the stripe-type AFM fluctuations and extract their $T$ dependence, as has been performed in the hole- and electron-doped BaFe$_2$As$_2$.[@Wiecki2015prl] According to the previous paper,[@Wiecki2015prl] $1/T_1T$ was decomposed into inter- and intraband components according to $1/T_1T=(1/T_1T)_\text{inter}+(1/T_1T)_\text{intra}$, where the $T$ dependence of the interband term is assumed to follow the Curie-Weiss (CW) form appropriate for 2D AFM spin fluctuations: $(1/T_1T)_\text{inter}=C/(T-\Theta_{\rm CW})$. For $T$ dependence of the intraband component, $(1/T_1T)_\text{intra}$ was assumed to be $(1/T_1T)_\text{intra}$ = $\alpha+\beta\text{exp}(-\Delta/k_{\rm B}T)$. Here we also tried to decompose the present $1/T_{1,\|}T$ and $1/T_{1,\perp}T$ data following the procedure. We, however, found large uncertainty in decomposing our data, especially for the $1/T_{1,\perp}T$ case, due to the weak temperature dependence of 1/$T_1T$. Nevertheless, we proceeded with our analysis to qualitatively examine the $x$ dependence of Curie-Weiss parameter $C$, which measures the strength of AFM spin fluctuations, and $\Theta_{\rm CW}$ corresponding to the distance in $T$ from the AFM instability point. Here we fit the data above $T_{\rm N}$ or $T^*$ for each sample. $\Theta_{\rm CW}$ decreases from 38 $\pm$ 17 K ($x$ = 0) to 15 $\pm$ 13 K ($x$ = 0.023), and to a negative values of –33 $\pm$ 21 K ($x$ = 0.028). This suggests that compounds with $x$ = 0.023 and 0.028 are close to the AFM instability point of $\Theta_{\rm CW}$ = 0 K. A similar behavior of $\Theta_{\rm CW}$ is reported in Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ (Refs. ) and Ba(Fe$_{1-x}$Ni$_x$)$_2$As$_2$ (Ref. ). The $x$ dependences of CW parameters $C_\perp$, $C_\|$ and $\Theta_{\rm CW}$ are shown in Figs. \[fig:phase\](a) and (b) together with the phase diagram reported in Ref. . Although these parameters have large uncertainty, $C_\|$ seems to be greater than $C_\perp$, consistent with that the in-plane AFM fluctuations are stronger than the $c$-axis AFM fluctuations. This result is same as in Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ samples in Ref. . On the other hand, the $C_\perp$ and $C_\|$ parameters are almost independent of $x$ in Ca(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ in the substitution range of $x$ = 0–0.059, while the $C_\perp$ and $C_\|$ parameters decrease with Co substitution in BaFe$_2$As$_2$ where the $c$-axis component AFM spin fluctuations decrease and die out with $x$ $\geq$ 0.15.[@Ning2010] It is interesting to point out that a similar $x$-independent behavior is also observed in the crossover temperature $T^*$ attributed to the pseudogaplike behavior in the spin excitation spectra of Ca(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ system.[@Cui2015] Finally we show, in Fig. \[fig:alpha\](b), the intra band Korringa ratios $\alpha_\|^\text{intra}$ and $\alpha_\perp^\text{intra}$ by subtracting the interband scattering term $C$/$(T-\Theta_{\rm CW})$. Both $\alpha_\|^\text{intra}$ and $\alpha_\perp^\text{intra}$ remain roughly constant above $T_{\rm N}$ or $T^*$. We plotted the average value of $\alpha_\|^\text{intra}$ and $\alpha_\perp^\text{intra}$ as a function of $x$ in Fig. \[fig:phase\](b). We find that $\alpha_\perp^\text{intra}$ is smaller than $\alpha_\|^\text{intra}$ for all the samples, confirming again the dominant in-plane FM spin fluctuations. The calculated $\alpha_\perp^\text{intra}$and $\alpha_\|^\text{intra}$ in Ca(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ are almost same order with those in both the electron and hole doped BaFe$_2$As$_2$. These results indicate that the FM spin correlations exist in general and may be a key ingredient to a theory of superconductivity in the iron pnictides. Summary ======= Motivated by the recent NMR measurements which revealed the coexistence of the stripe-type antiferromagnetic (AFM) and ferromagnetic (FM) spin correlations in both the hole- and electron-doped BaFe$_2$As$_2$ families of iron-pnictide superconductors[@Wiecki2015prl], we have reanalyzed NMR data in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$ and found clear evidence for the coexistence of the stripe-type AFM and FM spin correlations. In contrast to the case of Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ where the relative strength of FM correlations increases with Co substitution, the FM correlations are almost independent of the Co substitution for our investigated range of $x$ = 0 – 0.059 in Ca(Fe$_{1-x}$Co$_x$)$_2$As$_2$. The Curie-Weiss parameters $C_{\perp,\|}$ representing the strength of the stripe-type AFM correlations are almost independent of the Co doping, close to a feature of $T^*$ representing a characteristic temperature of the pseudogaplike behavior. Our analysis of the NMR data indicates that FM fluctuations exist in general in iron-pnictide superconducting families. Further systematic theoretical and experimental investigation on the role of the FM correlations in iron pnictide superconducting families are highly required. Acknowledgments =============== We thank David C. Johnston for helpful discussions. The research was supported by the U.S. Department of Energy, Office of Basic Energy Sciences, Division of Materials Sciences and Engineering. Ames Laboratory is operated for the U.S. Department of Energy by Iowa State University under Contract No. DE-AC02-07CH11358. A calculation of form factor ============================ Here, we directly calculate the appropriate form factors for the PM state of the iron pnictides according to the theory of Ref. . We make the assumption that the external applied field is much larger than the hyperfine field, which is certainly true in the PM state. We further assume that the wave-number $q$ dependent dynamic susceptibility tensor $\chi^{\alpha\beta}(\mathbf{q},\omega_0)$ is diagonal in the PM state. Under these assumptions, the spin-lattice relaxation rate in an external field $\mathbf{h}_{\rm{ext}}$ is given by $$\frac{1}{T_1(\mathbf{h}_{\rm{ext}})}=\lim_{\omega_0 \to 0}\frac{\gamma_N^2}{2N}k_{\rm B}T \sum_{\alpha,\mathbf{q}}{\cal{F}}_\alpha^{\mathbf{h}_{\rm{ext}}}(\mathbf{q}) \frac{\rm{Im}[\chi^{\alpha\alpha}(\mathbf{q},\omega_0)]}{\hbar\omega_0}, \label{eq:T1}$$ where $\alpha=(a,b,c)$ sums over the crystallographic axes. The general expression for the $q$ dependent form factor is $${\cal{F}}_\alpha^{\mathbf{h}_{\rm{ext}}}(\mathbf{q})=\sum_{\gamma,\delta} [R_{\mathbf{h}_{\rm{ext}}}^{x\gamma}R_{\mathbf{h}_{\rm{ext}}}^{x\delta}+(x\leftrightarrow y)] {\cal A}_\mathbf{q}^{\gamma\alpha}{\cal A}_{-\mathbf{q}}^{\delta\alpha}, \label{eq:form}$$ where $R_{\mathbf{h}_{\rm{ext}}}$ is a matrix which rotates a vector from the crystallographic $(a,b,c)$ coordinate system to a coordinate system $(x,y,z)$ whose $z$ axis is aligned with the total magnetic field at the nuclear site. For details we refer the reader to Ref. . When $\mathbf{h}_{\rm{ext}}\|c$, the two coordinate systems coincide so that $$R_{\mathbf{h}_{\rm{ext}}\|c}= \begin{pmatrix} 1 & 0 & 0 \\ 0 & 1 & 0 \\ 0 & 0 & 1 \end{pmatrix}. \label{eq:rc}$$ For $\mathbf{h}_{\rm{ext}}\|a$, the appropriate matrix is $$R_{\mathbf{h}_{\rm{ext}}\|a}= \begin{pmatrix} 0 & 0 & 1 \\ 0 & 1 & 0 \\ -1 & 0 & 0 \end{pmatrix}. \label{eq:ra}$$ For the case of the As site in the iron pnictides, the matrix ${\cal A}_\mathbf{q}$ in Eq. \[eq:form\] is given by [@Smerald2011] $${\cal A}_\mathbf{q}=4 \begin{pmatrix} {\cal A}^{aa}c_ac_b & -{\cal A}^{ab}s_as_b & i{\cal A}^{ac}s_ac_b \\ -{\cal A}^{ba}s_as_b & {\cal A}^{bb}c_ac_b & i{\cal A}^{bc}c_as_b \\ i{\cal A}^{ca}s_ac_b & i{\cal A}^{cb}c_as_b & {\cal A}^{cc}c_ac_b \end{pmatrix}, \label{eq:aq}$$ where ${\cal A}^{\alpha\beta}$ are the components of the hyperfine coupling tensor and $$\begin{aligned} c_a&=\cos\frac{q_aa_0}{2}&c_b&=\cos\frac{q_bb_0}{2}\\ s_a&=\sin\frac{q_aa_0}{2}&s_b&=\sin\frac{q_bb_0}{2}.\end{aligned}$$ Here $a_0$ and $b_0$ are lattice constants. Of course, $a_0=b_0$ in the PM state. Combining Eqs. \[eq:form\]-\[eq:aq\], we obtain $$\begin{aligned} {\cal{F}}_a^{\mathbf{h}_{\rm{ext}}\|a}(\mathbf{q})&=16({\cal A}^{ca}s_ac_b)^2+16({\cal A}^{ba}s_as_b)^2\\ {\cal{F}}_b^{\mathbf{h}_{\rm{ext}}\|a}(\mathbf{q})&=16({\cal A}^{cb}c_as_b)^2+16({\cal A}^{bb}c_ac_b)^2\\ {\cal{F}}_c^{\mathbf{h}_{\rm{ext}}\|a}(\mathbf{q})&=16({\cal A}^{cc}c_ac_b)^2+16({\cal A}^{bc}c_as_b)^2\end{aligned}$$ and $$\begin{aligned} {\cal{F}}_a^{\mathbf{h}_{\rm{ext}}\|c}(\mathbf{q})&=16({\cal A}^{aa}c_ac_b)^2+16({\cal A}^{ba}s_as_b)^2\\ {\cal{F}}_b^{\mathbf{h}_{\rm{ext}}\|c}(\mathbf{q})&=16({\cal A}^{bb}c_ac_b)^2+16({\cal A}^{ab}s_as_b)^2\\ {\cal{F}}_c^{\mathbf{h}_{\rm{ext}}\|c}(\mathbf{q})&=16({\cal A}^{ac}s_ac_b)^2+16({\cal A}^{bc}c_as_b)^2.\end{aligned}$$ To calculate $1/T_1$ from Eq. \[eq:T1\], we assume for simplicity that $\chi^{\alpha\beta}(\mathbf{q},\omega_0)$ is non-zero only near the wavevectors $\mathbf{q}=0$, $\mathbf{q}=\mathbf{Q}_a\equiv(\pm\pi/a_0,0)$ and $\mathbf{q}=\mathbf{Q}_b\equiv(0,\pm\pi/b_0)$. By tetragonal symmetry we have $a\leftrightarrow b$. In particular, $\mathbf{Q}_a=\mathbf{Q}_b\equiv\mathbf{Q}$ and $\rm{Im}[\chi^{aa}(\mathbf{q},\omega_0)]=\rm{Im}[\chi^{bb}(\mathbf{q},\omega_0)] \equiv\chi_{ab}''(\mathbf{q},\omega_0)$. We also now write $\rm{Im}[\chi^{cc}(\mathbf{q},\omega_0)] \equiv\chi_{c}''(\mathbf{q},\omega_0)$. We thus obtain $$\begin{aligned} \frac{1}{T_1(\mathbf{h}_{\rm{ext}}\|c)} = \lim_{\omega_0 \to 0}&\frac{8\gamma_N^2}{N}k_{\rm B}T \left[2({\cal A}^{aa})^2\frac{\chi_{ab}''(\mathbf{0},\omega_0)}{\hbar\omega_0}\right. \nonumber\\ &\qquad \left.+ 4({\cal A}^{ac})^2\frac{\chi_{c}''(\mathbf{Q},\omega_0)}{\hbar\omega_0}\right] \label{eq:T1c} $$ and $$\begin{aligned} \frac{1}{T_1(\mathbf{h}_{\rm{ext}}\|a)}&=\lim_{\omega_0 \to 0}\frac{8\gamma_N^2}{N}k_{\rm B}T \left[ 4({\cal A}^{ca})^2\frac{\chi_{ab}''(\mathbf{Q},\omega_0)}{\hbar\omega_0}\right. \nonumber\\ &\qquad \left.+({\cal A}^{aa})^2\frac{\chi_{ab}''(\mathbf{0},\omega_0)}{\hbar\omega_0}\right. \nonumber\\ & \qquad \left.+({\cal A}^{cc})^2\frac{\chi_{c}''(\mathbf{0},\omega_0)}{\hbar\omega_0}\right. \nonumber\\ &\qquad \left.+2({\cal A}^{ac})^2\frac{\chi_{c}''(\mathbf{Q},\omega_0)}{\hbar\omega_0} \right]. \label{eq:T1a} $$ We have summed over four AFM wavevectors $\mathbf{Q}=(\pm\pi/a_0,0)$ and $\mathbf{Q}=(0,\pm\pi/a_0)$, which have the same value of $\chi''(\mathbf{Q},\omega_0)$ in the PM state. Notice that, for both field directions, AFM flucutations at $\mathbf{q}=\mathbf{Q}$ are completely filtered out if ${\cal A}^{ac}=0$, as pointed out in Ref. . However, in the iron pnictides ${\cal A}^{ac}\neq0$, [@Kitagawa2008] and therefore AFM fluctuations are not filtered out. From Eqs. \[eq:T1c\] and \[eq:T1a\] we can easily calculate $1/T_{1,\|}\equiv2/T_1(\mathbf{h}_{\rm{ext}}\|a)-1/T_1(\mathbf{h}_{\rm{ext}}\|c)$ and $1/T_{1,\perp}\equiv1/T_1(\mathbf{h}_{\rm{ext}}\|c)$ $$\begin{aligned} \frac{1}{T_{1,\perp}}=\lim_{\omega_0 \to 0}&\frac{16\gamma_N^2}{N}k_BT \left[({\cal A}^{aa})^2\frac{\chi_{ab}''(\mathbf{0},\omega_0)}{\hbar\omega_0}\right. \nonumber\\ & \qquad \left.+2({\cal A}^{ac})^2\frac{\chi_{c}''(\mathbf{Q},\omega_0)}{\hbar\omega_0}\right]\end{aligned}$$ $$\begin{aligned} \frac{1}{T_{1,\|}}=\lim_{\omega_0 \to 0}&\frac{16\gamma_N^2}{N}k_BT \left[4({\cal A}^{ca})^2\frac{\chi_{ab}''(\mathbf{Q},\omega_0)}{\hbar\omega_0}\right. \nonumber\\ & \qquad \left.+ ({\cal A}^{cc})^2\frac{\chi_{c}''(\mathbf{0},\omega_0)}{\hbar\omega_0}\right]\end{aligned}$$ Notice that the fluctuations probed by $1/T_{1,\|}$ and $1/T_{1,\perp}$ are consistent with the qualitative arguments used in the main text. For the case of CaFe$_2$As$_2$, Ref. gives ${\cal A}^{aa}=1.8$ T$/\mu_{\rm B}$, ${\cal A}^{cc}=1.2$ T$/\mu_{\rm B}$ and ${\cal A}^{ca}={\cal A}^{ac}=0.82$ T$/\mu_{\rm B}$. ${\cal A}^{aa}$ and ${\cal A}^{cc}$ are determined by Knight shift measurements and ${\cal A}^{ac}$ is found by comparing the measured internal field in the AFM state to the value of the ordered moment obtained by neutron scattering. present address: Department of Physics, University of California, San Diego. California 92093, USA [10]{} Y. Kamihara, T. Watanabe, M. Hirano, and H. Hosono, J. Am. Chem. Soc. [**130**]{}, 3296 (2008). P. C. Canfield and S. L. Bud’ko, Annu. Rev. Condens. Matter Phys. [**1**]{}, 27 (2010). D. C. Johnston, Adv. Phys. [**59**]{}, 803 (2010). G. R. Stewart, Rev. Mod. Phys. [**83**]{}, 1589 (2011). Y. K. Kim, W. S. Jung, G. R. Han, K.-Y. Choi, C.-C. Chen, T. P. Devereaux, A. Chainani, J. Miyawaki, Y. Takata, Y. Tanaka, M. Oura, S. Shin, A. P. Singh, H. G. Lee, J.-Y. Kim, and C. Kim, Phys. Rev. Lett. [**111**]{}, 217001 (2013). P. Wiecki, V. Ogloblichev, A. Pandey, D. C. Johnston, and Y. Furukawa, Phys. Rev. B [**91**]{}, 220406 (R) (2015). P. Wiecki, B. Roy, D. C. Johnston, S. L. Bud’ko, P. C. Canfield, and Y. Furukawa, Phys. Rev. Lett. [**115**]{}, 137001 (2015). J. Cui, B. Roy, M. A. Tanatar, S. Ran, S. L. Bud’ko, R. Prozorov, P. C. Canfield, and Y. Furukawa, Phys. Rev. B [**92**]{}, 184504 (2015). B. Cheng, B. F. Hu, R. H. Yuan, T. Dong, A. F. Fang, Z. G. Chen, G. Xu, Y. G. Shi, P. Zheng, J. L. Luo, and N. L. Wang, Phys. Rev. B [**85**]{}, 144426 (2012). D. G. Quirinale, V. K. Anand, M. G. Kim, Abhishek Pandey, A. Huq, P. W. Stephens, T. W. Heitmann, A. Kreyssig, R. J. McQueeney, D. C. Johnston, and A. I. Goldman, Phys. Rev. B [**88**]{}, 174420 (2013). S. Ran, S. L. Bud’ko, D. K. Pratt, A. Kreyssig, M. G. Kim, M. J. Kramer, D. H. Ryan, W. N. Rowan-Weetaluktuk, Y. Furukawa, B. Roy, A. I. Goldman, and P. C. Canfield, Phys. Rev. B [**83**]{}, 144517 (2011). S. Ran, S. L. Bud’ko, W. E. Straszheim, J. Soh, M. G. Kim, A. Kreyssig, A. I. Goldman, and P. C. Canfield, Phys. Rev. B [**85**]{}, 224528 (2012). P. C. Canfield, [*in Properties and applications of complex intermetallics*]{}, edited by E. Belin-Frré (World Scientific Co. Pte. Ltd, Singapore, 2010), page 93. P. C. Canfield and Z. Fisk, Philos. Mag. B [**65**]{}, 1117 (1992). A. I. Goldman, D. N. Argyriou, B. Ouladdiaf, T. Chatterji, A. Kreyssig, S. Nandi, N. Ni, S. L. Bud’ko, P. C. Canfield, and R. J. McQueeney, Phys. Rev. B [**78**]{}, 100506(R) (2008). Y. Furukawa, B. Roy, S. Ran, S. L. Bud’ko, and P. C. Canfield, Phys. Rev. B [**89**]{}, 121109 (2014). T. Moriya, J. Phys. Soc. Jpn. [**18**]{}, 516 (1963). A. Narath and H. T. Weaver, Phys. Rev. [**175**]{}, 373 (1968). P. Jeglič, A. Potočnik, M. Klanjšek, M. Bobnar, M. Jagodič, K. Koch, H. Rosner, S. Margadonna, B. Lv, A. M. Guloy, and D. Arčon, Phys. Rev. B [**[81]{}**]{}, 140511(R) (2010). A. Smerald and N. Shannon, Phys. Rev. B [**84**]{}, 184437 (2011). K. Kitagawa, N. Katayama, K. Ohgushi, M. Yoshida, and M. Takigawa, J. Phys. Soc. Jpn. [**77**]{}, 114709 (2008). M. Hirano, Y. Yamada, T. Saito, R. Nagashima, T. Konishi, T. Toriyama, Y. Ohta, H. Fukazawa, Y. Kohori, Y. Furukawa, K. Kihou, C-H Lee, A. Iyo and H. Eisaki, J. Phys. Soc. Jpn. [**81**]{}, 054704 (2012). F. L. Ning, K. Ahilan, T. Imai, A. S. Sefat, M. A. McGuire, B. C. Sales, D. Mandrus, P. Cheng, B. Shen, and H.-H. Wen, Phys. Rev. Lett. [**104**]{}, 037001 (2010). R. Zhou, Z. Li, J. Yang, D. L. Sun, C. T. Lin, and G.-q. Zheng, Nat. Commun. [**4**]{} (2013). | Mid | [
0.589147286821705,
28.5,
19.875
] |
Dolphins sign WR Michael Rios Local product would compete for backup job The Dolphins signed former Arizona Cardinals WR Michael Rios to a one-year… April 3, 2014|By Chris Perkins, South Florida Sun Sentinel DAVIE – The Dolphins signed former Arizona Cardinal wide receiver Michael Rios to a one-year contract on Thursday, bolstering their crop of backups at that position. The Dolphins also announced they signed former Atlanta wide receiver Kevin Cone, which was reported Wednesday, and quarterback Jordan Rodgers. Rios, undrafted out of Marist College, is a local product having attended Miami Belen High School. When he signed a free agent contract with the Cardinals in 2012 he became the first player from Marist to sign with a NFL team. Rios (6-2, 203) didn’t compile any statistics with Arizona last season. He was released in late July after sustaining a broken left foot. Rios established the single-season receving yards record at Marist (244 yards) and had a school-record 17 career receiving touchdowns. He also established single-season records for receiving yards (1,173) and touchdowns (10). Rios had a workout for the Dolphins on Wednesday, according to the Poughkeepsie (NY) Journal and told the newspaper, “I am a Dolphins fan turned official Dolphin. It just feels right on both sides. It has the potential to work out for everyone.” The Dolphins are rapidly filling out their 90-man training camp roster and now have 62 players under contract after adding five players in the last few days. | Mid | [
0.611909650924024,
37.25,
23.625
] |
Social Sharing The wealthy Canadian behind a deal to buy WestJet has a reputation for his stellar business acumen and for owning a mansion among mansions in downtown Toronto, but a longtime family friend and associate say the titan has not forgotten his humbler beginnings. Social Sharing He's one of 45 Canadians to make the Forbes list of billionaires in 2019 The wealthy Canadian behind a deal to buy WestJet has a reputation for his stellar business acumen and for owning a mansion among mansions in downtown Toronto, but a longtime family friend and associate say the titan has not forgotten his humbler beginnings. On Monday it was announced that Toronto-based private equity firm Onex Corp. signed a deal to buy the Calgary-based airline for $3.5 billion. The man behind the yoke of the transaction for Onex is its 77-year-old founder and chief executive officer, Gerald Schwartz. "Even though he's been in Toronto now for probably a majority of his life, I don't think he's ever lost that sense of being a Winnipegger," said David Asper. Asper is the son of Izzy Asper, who founded CanWest Capital (which would become CanWest Communications) with Schwartz in the 1970s. Asper remembers meeting Schwartz when he was articling under Asper's father in the 1960s. "I have vivid memories of Gerry as a young man who started working for my dad and he was a fantastic character. He would come over and do magic tricks and entertain us," Asper said. "He was very vivacious and loved to laugh and was full of life." A successful career doesn't have to follow a straight line.-Gerald Schwartz, CEO of Onex Corp. Schwartz, his wife Heather Reisman — founder and CEO of Indigo Books and Music — and the couple's children are one of Canada's richest families. He has an almost incomparable reputation for business — Onex is considered a global force in private equity — and for philanthropy. He has donated millions to universities and hospitals. He's been inducted into the Canadian Business Hall of Fame and is an officer of the Order of Canada. The couple's home in Toronto's Rosedale neighbourhood is nicknamed "Fort Schwartz" and has a reputation as possibly the most expensive house in the city. It's all worlds away from Schwartz's formative years in Winnipeg, Asper said with a laugh. Schwartz was born in the Prairie city in 1941. In an online video from when he accepted the 2016 Horatio Alger Award, he explained how his mother was deaf, which resulted in her being distant. But he was extremely close with his father, a businessman and auto-parts dealer. Gerald Schwartz and Heather Reisman clap and blow kisses to the crowd during an announcement of their donation to the University go Toronto to help fund a new innovation Centre on campus in March 2019. (THE CANADIAN PRESS) "My dad was a fantastic guy who I looked up to, admired and loved," Schwartz said in the video. His dad "came from much more humble beginnings. He worked his way up," he said. Starting when he was 10, Schwartz worked in his father's store. He earned commerce and law degrees from the University of Manitoba, and later pursed a master of business administration from Harvard University. His goal was to get to Wall Street, Schwartz told students at the University of Toronto during a speech in 2016. But things didn't go according to plan. "A successful career doesn't have to follow a straight line," he said. "You can afford to make choices that turn out to be serious mistakes and time will let you correct the trajectory that you want to be on." Enterpreneur Gerald Schwartz is invested to the Order of Canada as Officer by Governor General Michaelle Jean during ceremony at Rideau Hall in Ottawa in 2008. (Canadian Press) In 1977, at age 35, Schwartz and Izzy Asper formed CanWest Capital. By 1984, that partnership was dissolved, and Schwartz took his portion of the industrial assets to start Onex. Asper said the mutual respect both men had for each other in business — and as friends — was maintained. Net worth pegged at $1.6 billion Schwartz's worth has grown steadily. He's one of 45 Canadians to make the Forbes list of billionaires in 2019, with his net worth pegged by the magazine at $1.6 billion. Onex boasts $33 billion in assets, Forbes says. Inside the boardroom, Schwartz is inquisitive, patient and smart, Asper said. He's also willing to share knowledge he's accrued over the decades. Onex Corp. CEO Gerald Schwartz wears a neck brace as he watches the Toronto Raptors preseason game against the Detroit Pistons in 2002. (Canadian Press) "The powerful legacy of Gerry, over the course of his life to this day, is that he actually inspires people to think big, to think critically and to have confidence to pursue what it is you are pursuing." Arni Thorsteinson, a founding director of Onex, said Schwartz continues to use values from his father and Prairie upbringing in his current business practices. In an interview from London, England, Thorsteinson called his friend "one of the great Canadian visionaries in business." With Schwartz leading the way, WestJet's success will soar, Thorsteinson predicted. "He has the patience, the capital and the vision to grow WestJet. It's a great opportunity." Related Stories Comments To encourage thoughtful and respectful conversations, first and last names will appear with each submission to CBC/Radio-Canada's online communities (except in children and youth-oriented communities). Pseudonyms will no longer be permitted. By submitting a comment, you accept that CBC has the right to reproduce and publish that comment in whole or in part, in any manner CBC chooses. Please note that CBC does not endorse the opinions expressed in comments. Comments on this story are moderated according to our Submission Guidelines. Comments are welcome while open. We reserve the right to close comments at any time. | Mid | [
0.608910891089108,
30.75,
19.75
] |
Jane’s Hotel: Family Hero Review The Good Well-crafted time management game. Many levels, upgrades and characters. The Bad Money doesn't carry forward. Only one game mode. Graphics are so-so. Move over, Paris Hilton – in Jane’s Hotel: Family Hero, you’re an heiress who actually works hard at her family business! Jane vows to stop the foreclosure of four hotels by borrowing money from the bank and then working at each one until enough cash is collected to help pull her family through. Through this ambitious venture you’ll work at a beachfront resort in the Canary Islands, a castle in England, a fancy French inn and a traditional Japanese hotel. While not perfect, this enjoyable sequel improves nicely on the original time management game. If you’re ready to check into your room, dear reader, here’s what you need to know about Jane’s Hotel: Family Hero. Beginning in the Canary Islands, hotel patrons arrive at the hotel and greet you at the main desk. After you give them keys to the room they settle into one of the four rooms and begin to ask for some amenities such as fancy drinks, souvenirs, telephone use or a newspaper. As the manager, you will first click on the appropriate amenity, such as an espresso maker, and then on correct door that pops up with the request – as indicated by a pop-up speech bubble of sorts. There are a wide variety of guests, each with its own animation and voice, but they don’t seem to act any different from one another (such as the teenager with headphones being more impatient than the cane-using senior). Unlike the original game, Jane now has two handy assistants who will help fulfill a guest’s needs. For example, you will likely see a picture of a small vacuum cleaner in the speech bubble, meaning the guest would like their room cleaned. By clicking on the maid button and the room she needs to tidy up, off she goes until the task is completed; you can chain more than one room together for bonus points, therefore you simply need to click on multiple rooms (with vacuum cleaner icons) in succession and the maid will go from one to the next. The maid helps with other jobs as you begin to advance through the hotels, such as watering plants, bringing clean sheets to a room, dry cleaning services, and more. The other assistant is a porter who is great for odd jobs such as fixing broken-down machines, such as the espresso machine that always seems to go on the fritz. As with the maid, the porter will pick up other duties the more you advance throughout the game’s 50 levels. After you make your daily cash quota and move onto the next day, dozens of upgrades can be purchased to increase the skills of the three workers (manager, maid and porter) such as faster shoes for Jane, a better vacuum cleaner (the “Turbo 4000”) for the maid or a digital camera for the porter. Furniture that’s relevant to the hotel can also be purchased to spice up the place, including nice paintings for the French hotel, a medieval knight statue for the English castle or floral trimmings for the resort in the Canary Islands. You can also buy places for guests to lounge in the lobby, which increases the number of guests you can handle at once, and therefore making you more cash at the end of each day. One issue, however, is you can’t save your cash for a more expensive luxury because your money doesn’t carry over between levels. For instance, say there’s a $400 crystal chandelier you want but you only have $200 left after paying for staff upgrades (which are arguably more important). Problem is, that $200 doesn’t carry over because you start each day with $0. Other minor niggles include graphics that are average compared to today’s casual games and only one game mode to play. Shortcomings aside, Jane’s Hotel: Family Hero is an enjoyable hotel management game that is sure to provide many hours of increasingly challenging fun. Multi-taskers especially will relish in the furious mouse-clicking required to juggle all the guests’ requests at once. We enjoyed our stay here, and we hope you will too! | Mid | [
0.5487804878048781,
28.125,
23.125
] |
Q: How to recursively list Google Drive files and folders up to level N in javascript? I need to list all files and folders of google drive up to some level. The code below is listing all the files and their folders (until it exceeds its time limit) and logs them. How to I add some way to stop if it recursively went, let´s say, 3 levels of subfolders? function listFolders(folder) { folder = folder || DriveApp.getRootFolder(); var folderName = folder.getName(); var files = folder.getFiles(); while (files.hasNext()) { var fileName = files.next().getName(); Logger.log(folderName + " :: " + fileName); } var subfolders = folder.getFolders(); while (subfolders.hasNext()) { listFolders(subfolders.next()); } } A: How about this modification? I think that there are several answers for your situation. So please think of this as just one of them. Modified script: When you use this modified script, please run main(). function main() { // Added const folder = // Please set here. const n = 3; // Please set here. This sample sets 3 as your question. listFolders(folder, n); } function listFolders(folder, n) { // Modified folder = folder || DriveApp.getRootFolder(); var folderName = folder.getName(); var files = folder.getFiles(); while (files.hasNext()) { var fileName = files.next().getName(); Logger.log(folderName + " :: " + fileName); } if (--n == 0) return; // Added var subfolders = folder.getFolders(); while (subfolders.hasNext()) { listFolders(subfolders.next(), n); // Modified } } Note: Your script is Google Apps Script. So I modified your script as Google Apps Script. Please modify it for your situation. If I misunderstood your question, please tell me. I would like to modify it. | High | [
0.7182320441988951,
32.5,
12.75
] |
Associations between cooperation, reactive aggression and social impairments among boys with autism spectrum disorder. Cooperation is a fundamental human ability that seems to be inversely related to aggressive behaviour in typical development. However, there is no knowledge whether similar association holds for children with autism spectrum disorder. A total of 27 boys with autism spectrum disorder and their gender, age and total score intelligence matched controls were studied in order to determine associations between cooperation, reactive aggression and autism spectrum disorder-related social impairments. The participants performed a modified version of the Prisoner's Dilemma task and the Pulkkinen Aggression Machine which measure dimensions of trust, trustworthiness and self-sacrifice in predisposition to cooperate, and inhibition of reactive aggression in the absence and presence of situational cues, respectively. Autism spectrum disorder severity-related Autism Diagnostic Interview-algorithm scores were ascertained by interviewing the parents of the participants with a semi-structured parental interview (Developmental, Dimensional and Diagnostic Interview). The results showed that albeit the boys with autism spectrum disorder were able to engage in reciprocation and cooperation regardless of their social impairments, their cooperativeness was positively associated with lower levels of reactive aggression and older age. Thus, strengthening inhibition mechanisms that regulate reactive aggression might make boys with autism spectrum disorder more likely to prefer mutual gain over self-interest in cooperation. | High | [
0.659517426273458,
30.75,
15.875
] |
Devil's Head Resort Devil's Head Resort is a golf, meeting/convention, and ski resort located in the Town of Merrimac in Sauk County, Wisconsin, near Devil's Lake State Park. Description Its runs face mostly south, overlooking the Wisconsin River. They range from very gentle to fairly challenging. There is also a range of terrain park difficulty; one moderately sloped area has low rails and boxes, another has higher jumps, rails, and boxes on a steeper slope, and a third has large jumps. There are no "tree runs" or any off-piste skiing. Two 18-hole golf courses operate during the summer and there are mountain biking trails. Two hotel facilities are operated by the resort, one in the central lodge complex and one 6-story high-rise near the east side of the ski runs. References External links Devil's Head official website Devil's Head Ski Patrol official website Category:Buildings and structures in Sauk County, Wisconsin Category:Ski areas and resorts in Wisconsin Category:Tourist attractions in Sauk County, Wisconsin | Low | [
0.516853932584269,
28.75,
26.875
] |
[Microsurgical anatomy of extraorganic arteries of the hypothalamo-hypophyseal complex and the rational technic of its removal for transplantation]. The authors ascertained the existence of numerous anastomoses between the right and left hypophyseal arteries on the level of both the interlobar sulcus and the base of the hypophyseal funnel in the form of an inferior and superior hypophyseal anastomotic rings, as well as a system of arterial connections between the anterosuperior and anteroinferior subgroups of the hypothalamic arteries located in front of and lateral to the chiasma as prechiasmal networks. This creates anatomo-physiological preconditions for adequate circulation in the hypothalamo-hypophyseal graft after its transplantation and inclusion in the blood flow of the internal carotid artery or one of its terminal branches. Bearing in mind the close connection of the hypophyseal and hypothalamic arteries with the cavernous sinuses, chiasma, and components of the sella turcica, the hypothalamo-hypophyseal graft must be removed in a complex with these structures. | High | [
0.6877697841726611,
29.875,
13.5625
] |
Q: How can I change the Print Spooler filename/document name associated with wxPrintout in wxwidgets I have managed to attach my filename to my print out by overloading the wxPrintout constructor with my chosen name. wxPrintout(const wxString& title = wxT("Printout")); In my code: VRPrintout::VRPrintout(blababala):wxPrintout(_("Heartrate")), But on printing to save as a PDF, in the filename dialog, it reads "Printing Heartrate". How can I get rid of "Printing" added before the name or even change it? A: @Credits to Xaviou from wxDev.fr. You can try overriding the "OnBeginDocument" method in your wxPrintout derived class. The default code is the following (the "OnBeginDocument" is virtual) in wx-src/common/prntbase.cpp:584 : bool wxPrintout::OnBeginDocument(int WXUNUSED(startPage), int WXUNUSED(endPage)) { return GetDC()->StartDoc(_("Printing ") + m_printoutTitle); } I think that if you provide yours with the correct text, it should be ok. Regards Xav' Edit : Tested on an app of mine that do printing stuff, and it works... Worked for me too | High | [
0.690208667736757,
26.875,
12.0625
] |
Hamlet – Simple and powerful reactive templating - Yahivin http://hamlet.coffee/ ====== chenglou Comparing your CoffeeScript example against a vanilla JS React example seems cheap. here's the front page React example in CS: converter = new Showdown.converter() MarkdownEditor = React.createClass getInitialState: () -> value: 'Type some *markdown* here!' handleChange: (e) -> @setState(value: e.target.value) render: () -> d = React.DOM d.div( d.h3(null, 'Input'), d.textarea(onChange: @handleChange, value: @state.value), d.h3(null, 'Output'), d.div(dangerouslySetInnerHTML: __html: converter.makeHtml(@state.value)) ) React.renderComponent MarkdownEditor(), document.querySelector('.container') Showing a LOC comparison (and not even from the same dialect of a language) isn't a good proof for what you're trying to demonstrate. Clarity, simplicity, and debuggability all count. Removing a few extra lines of (non-boilerplate) code compared to React doesn't make the library simpler to work with. ~~~ mdiebolt I thought about that when constructing the demo but opted to use the JSX / plain JavaScript version because that's what's displayed on the React homepage. We have a strong preference for Haml and CoffeeScript dialects so that's how we present our demos. I built jsfiddles based on how each framework presented their own product. ~~~ chenglou It is indeed displayed on the front page, in vanilla JS, but that doesn't change the fact that it's not a very accurate comparison, providing that the point you're trying to prove is LOC. The React version also showcased attributes such as `className`, which Hamlet didn't. Nothing against CoffeeScript; just picking on the comparison itself. Also, React is a view library, not a full-stack framework. The fact that it's put on the same level as other real JS frameworks is an acknowledgment of its paradigm's power and usefulness. So I guess people viewing it as a framework is a misleading but very telling phenomenon. That being said, good luck with the project! ------ Tyr42 Oh, I thought this was the already existing Hamlet language. Of which there are at least two. [http://www.yesodweb.com/book/shakespearean- templates](http://www.yesodweb.com/book/shakespearean-templates) [https://github.com/gregwebs/hamlet.rb](https://github.com/gregwebs/hamlet.rb) It does look pretty cool though. ~~~ Grothendieck Actually, at least one: the Ruby version is just a port from Haskell and has the same syntax. ~~~ Tyr42 Oh, shoot, I googled for the Haskell one, and saw the other one on the way. I should have read about two more lines, and I would have got it. In my defence, I always thought the main feature of Hamlet is the static checking of everything, and solving the escaping problem (at compile time!), so I didn't even entertain the idea that someone would port it to Ruby. ------ chriswarbo An unfortunate choice of name. When I saw the title, I thought it was on about [https://hackage.haskell.org/package/hamlet](https://hackage.haskell.org/package/hamlet) ~~~ Yahivin It's a popular play! ~~~ dllthomas And contains H, T, M, and L. ------ bradgessler We use hamlc and Backbone.js in our stack. This lib looks like it will simplify a lot of that. I have a few questions: 1\. Its interesting to see JS events specified in the template (e.g. `%a(onclick=@doSomething)`). Is there a way to specify that in the JS/model? 2\. Does "Observable" mean that the value is updated when the model changes, when the DOM changes, or both? Could all of the attributes of the object passed into the template be observable by default or would that incur a significant performance penalty? ~~~ Yahivin For point one, it is specified in the model. @doSomething would invoke the model's doSomething function. The template just names it. As to point two, observable provides a bi-directional binding so that changes to the value are reflected in the DOM and changes in the DOM are reflected in the model. The observable interface is essentially a jQuery style getter/setter method that allows for observers to be notified of changes. ~~~ klibertp When is the DOM updated? Are the changes performed as soon as they are observed or are they queued? Does Hamlet implement some kind of "virtual DOM" for diffing or does it sync DOM and model directly? Looks very nice, just this weekend I looked at some frontend frameworks, including Vue, Mithrill, Ractive and React and found some issues with them all. Hamlet would fit my use case very well, I think. One thing I'd like is more technical details on the main page - not how it "looks like" compared to other frameworks, but how it does its thing (compared to other frameworks). ~~~ Yahivin The current implementation performs changes immediately. There is no virtual DOM, as soon as a change occurs the model is update and vice versa. The Observable component invokes the callback to all listeners immediately when its value is changed. I find this makes testing and debugging somewhat easier than async callbacks or nextTick. ~~~ bradgessler How does observable wrap values? I see a few things: list = Observable [] list.push 'blah' and isOrange = Observable false isOrange = true // This obviously doesn't work this way... Do you poll the value? Or do you check the type of the value and wrap/proxy methods that would normally change the value? ~~~ Yahivin When Observable is declared with a type (especially an array) it sets up some wrapped methods to simplify working with it. The wrappers also set up automatic dependency resolution so you can do cool things like: list = Observable [] reversed = Observable -> list.map reverse list.push 'blah' reversed() # => ['halb'] There's no polling, the observable notifies all observers immediately when the value changes. ~~~ bradgessler What about simple types, like the `false` value example above? Is there a `set` and `get` method? ~~~ mdiebolt You'd use a jQuery style setter. isOrange(false) ------ peterhunt > Avoid working with over-engineered frameworks without sacrificing a great > interactive experience This is a pretty lame claim seeing as text fields are busted in Hamlet. [1] This is another example of a "lightweight" library that hasn't hit any of the hard problems yet. It's fine if you make this your personal project to learn from, but trying to convince people to bet their projects on unproven technology is pretty disingenuous. [1] Inserting characters does not work in the second example at [http://hamlet.coffee/garden/](http://hamlet.coffee/garden/) ~~~ CanSpice All of those examples work for me with Chrome 35. One thing I would love on HN is the reluctance to say something is "lame" because one example doesn't work for one person on one browser. Instead of being dismissive, why not be constructive? Or if you can't even do that, just don't post? ~~~ peterhunt If you look at my posting history you'll see that I tend to agree with your sentiment. Too much negativity on HN and I combat it where I can. But "lightweight" JS fetishism at the expense of correctness (and the arrogance that comes with it!) is an epidemic in the frontend web business today. I think it's important to highlight this when it happens so we can stop making crappy web apps and start to actually deliver reasonable experiences when compared to native. Also here is a video of the bug: [http://www.petehunt.net/hamlet.mov](http://www.petehunt.net/hamlet.mov) ~~~ jonahx I see the bug too on Chrome 35 on a Mac. That said, and with lots of respect for your work on React Pete, and also acknowledging that React is probably the simplest of the big frameworks, the love of minimalism and simplicity comes from a very real need and attempts to fulfill that need shouldn't be dismissed as toy projects. From what I can tell, Mithril, for example, is anything but that. I think people really really like being able to jump into something that can be useful and played with based on a few examples, and to model things with POJOs. I agree correctness shouldn't be sacrificed, but it doesn't have to be. ~~~ peterhunt Totally agree. If someone comes up with a simpler way to do it and proves it out on a few projects of real complexity, then I think it's great. My complaint is you see a lot of upstart projects pulling mindshare when the reason they're simple is either a matter of personal preference or a lack of essential complexity. Hamlet was an easy target because cursor position management is a great example of essential complexity and they made pretty aggro claims on their site about how over-engineered everything else is. ------ cfitzhugh I've really enjoyed ractive. Simple to learn, with mustaches, and it has worked really well for our project. No extra compile steps. Figured I'd share since I see alot of buzz around React and other things, and preferred ractive.js when I researched it a little bit ago. ~~~ Yahivin Wow, I hadn't heard of Ractive before. It looks quite similar in approach and also really cool. ------ zeekay Would be extremely appealing if it borrowed more inspiration from Jade than Haml. ~~~ Yahivin I actually agree! I started with haml because it's what I knew best at the time. The parser is separate from the compiler and the runtime, so it should be simple enough to add a jadelet, anglet, or any other simple style of adapter. If there is a lot of interest in a jade focused style or haml is a turn off for many people then it will become a priority for us. ~~~ lobo_tuerto You should checkout slim too, it's just a better haml. [http://slim-lang.com/](http://slim-lang.com/) ------ smrtinsert Reactivity is becoming an imperative. The browser of the future will let us code in a reactive language instead of forcing non reactive html or js on us. I'd love to see something simple for other languages and platforms as well. I love that it seems to not be tied to node out of the box as well. ~~~ Yahivin Yeah, it's only taken us 50 years :) One of our goals was for Hamlet to be suitable for really small and simple web apps, without any big framework or ecosystem. There's still a lot of work for us to do on the ease of getting started (both with or without node) so if you run into trouble or have any comments let us know. ~~~ smrtinsert Will do, and great job. ------ Smudge Got this JS alert: "This website abuses rawgit.com. You should complain to its owner." ~~~ Yahivin It looks like one of the JS fiddle examples we found for our demos wasn't up to our regular standards. We're looking into it. ------ mquandalle This looks to be a great declarative/reactive template engine. I've been working mostly with the Meteor Blaze template engine the last few months. Both of them use a "normal" template language for writing views and (potentially) let you choose if you prefer writing your templates in Handlebars, Jade, or Haml [0], which I find far more easy to use than React JSX format. I think Blaze beats Hamlet on the runtime rendering engine. First, Blaze does not require to set a root element in a template, which could be a source of bugs with Hamlet because for instance the `each` child is a template, here is a snippet of problematic example from the Hamlet README: - each @items, -> .first .second This works perfectly fine in Blaze. IIRC Blaze uses comments node on the DOM that are never rendered in browsers in order to define some "domrange" that keep track of n children in a single parent group. The second runtime issue in Hamlet appears when a third-party library directly modifies the DOM, without telling the template engine. Basically the modification will be erased on the next template redraw which make this system incompatible with all jQuery plugins for instance. Blaze has "fined grained DOM updates" which mean that the modification of a single element in a template does not require to touch any other node in the DOM. For instance if you have a each loop of inputs, and the user start to enter some data in one input field, and for some reason the template is redrawn the text will stay in the input with Blaze, but will be erased with Hamlet. Blaze also support reactive SVG (I'm not sure if Hamlet supports it but I haven't seen any particular mention in the code). I think all of these features can be implemented in Hamlet drawing on Blaze and ReactJS runtimes. Nevertheless I find the Javascript model declaration cleaner in Hamlet than in Blaze or Backbone or React. The only thing I'm not sure about is writing the js events in the template and not in the model, I actually like having all events of a given template in a single place but I don't have strong opinion on this. [0]: Meteor support Spacebars (which is quite similar to Handlebars) by default [https://github.com/meteor/meteor/blob/devel/packages/spaceba...](https://github.com/meteor/meteor/blob/devel/packages/spacebars/README.md), and there is also a package for jade [https://github.com/mquandalle/meteor- jade](https://github.com/mquandalle/meteor-jade) (disclaimer: I'm the author). It also seems that it wouldn't be difficult to support other languages than Haml for Hamlet. ~~~ Yahivin That issue about requiring a root item should be solvable in the future, it's just the current implementation that has limitations. I'm building up the test suite to specify the behavior and hope to have it working soon. For the most part jQuery plugins should work fine with Hamlet, so long as one remembers to update the data in the model rather than arbitrarily throughout the DOM. It can be a moderate mental shift to go from jQuery style "The DOM is the data" to the newer Backbone, Knockout, React, Angular, etc style of "The model is the data" and may not be right for all applications. Thanks for the comment I'll take a look at Meteor Blaze and see what cool tricks it has :) ~~~ mquandalle The problem is that most _current_ jQuery plugins modify the DOM. If someone want to use a jQuery carousel, the plugin will add arrows buttons and page indicators in the DOM. Then if the template engine updates one of the carousel slide, these nodes will be removed and the plugin will be broken. ~~~ Yahivin My advice for that kind of application would be to have a piecemeal approach. Use Hamlet for some templates on your page, and jQuery plugins for others. I hope it's modular enough to use as little or as much as you like. ------ krick I'm more intrigued by the domain name. Why there even exists 1st level domain "coffee"? ------ coherentpony Oh wow, people are actually using these new TLDs. ~~~ mdiebolt It's pretty awesome to be able to host CoffeeScript OSS projects on a .coffee TLD ------ jonahx @Yahivin, I'd love to hear your thoughts on Mithril. Have you used it? ~~~ Yahivin I hadn't seen Mithrill before, but from checking it out now it looks like it has a lot in common: small runtime, trying to be as close to plain JS and DOM as possible, and safety by default. I'm not sure if it provides as much magic as Hamlet's auto-dependencies and template syntax, but those do have costs and tradeoffs. I would like to see an interactive demo on the site so I could get to know it better by messing around. ------ bmcmaste Looks really interesting. Any plans for a Rails Gem? ~~~ Yahivin Yes, we plan to create or assist the creation of drop in solutions for Rails, Sinatra, and popular node frameworks, priority based on interest, volunteers, and whoever demands it the loudest. ------ toisanji its too bad this is made for coffescript, i would have liked to see it for regular javascript. ~~~ Yahivin It does work with regular JS though we present our examples in CoffeeScript. ------ notastartup What's wrong with just using jQuery? what's the rational for using a reactive solution? ~~~ Yahivin Say you're building a color picker with three text fields for R, G, B, and a swatch that displays the resulting color. You could do it in jQuery, but plumbing all the update code for each input would be kind of a chore. If you get a new source of input (say from the network) you'd have to remember to resync everything. To keep it simple you'd probably have to respond to `something changed` -> `update everything`. Reactive templates would only update the elements dependent on that change. With a reactive solution you make a model that contains observable RGB values and a function to compute the final color. Once you bind that model to your view everything stays in sync like magic. | Low | [
0.505399568034557,
29.25,
28.625
] |
<?php header("Content-type: text/html; charset=utf-8");
# Current Winner
$old_phrase = 'accountably acquits allele alliance amazon amortizing anarchial antecedents apocryphal apotheosized appearances arborolater arioso asynchronously attains audaciousness automat backwood bakemeats befriender behest belays benzoated bickered bifid bigwig bishop bodiless boiled bothered brainstems brushworks buffetings cacoepy calabash cancerophobe candytufts carabiniers celebrant cellar chanson cheapest chromophilous churchwomen closed-minded coleslaw colonist connateness connivingly conservatories cotyledonous crosscurrents cuprous curlpaper custard cylindrite czar datelines dative defalcation dengue descension detersion devouring dextrality dextroversion diachronic dicotyledon diminutive dinghy discourtesies disinvited disorganization disrelish dissoluteness divergent dormantly draff dropleaf dull eagerness ecstatically elementary emotiometabolic encryption endearing every exposit extreme felling fiddler fjords flake forcibly formulae gerontal girasol glens graveolence guideboard hachure hacker haematuria hawse heck heroically herrings hierarchically hispanics homelikeness hoodwink hydrazin illegalities immolation imparity incant indevotional indexable inexpectant inexpugnable infants insoluble intendancy interfering intonated invincible irrelevancy jawsmith jobbernowl joule journalistic joyride joyrider judice juniors kettle keystroke kilocycle kithless kitten lawnroller legitimizing levity lief list lockstep loll lovage loveable lovelornness lowthoughted makeready margins maximizes mediocreness megrims melodramas menadione menialness mica mimish minimalism misalign misaline misdiagnoses mishaps mitochondrion modulator mole moneybags motorizing moveless multinationals mutating nacreousness need nidorous noncommunist oaks objections obsequiousness occipitalis octans oglers oilkettle outfall overdistended overprotection overrighteous palingenesis patriarchate pebbled pencils petiolule philogynous phrased phytotopography pikes plains pocketful polemical prepotency pronunciative prows prudential pruners quinquenerval quinquevalvous quisqualis rallies reboard refining refractor reindeer relies reprogramming rescind respectfully restudying reunions ringleaders roguishly rubdown sacrosanctness salivant satisfyingly scamper schlep seamless searchlight secularism sepulture sequentially shadowboxing shameless shrines siskin sitz slant snowsprinkled spadix spasm splitsaw squirrely stemming styli subsoil supe surged suttee swamped swim swivel sycophant symphonious synaptic teachy tegumental tester thews toiling tornadic torquers tortoiseshell tungi turbulently turmoils twolevel twotimer unavailability uncullible unfenced unforgoable uniglobular unleash unlikable unscramble unseat unsuccessive untracked uproariously uptick venerates vial vibrio vitrification void warmaking wastethrift wattage weakest weakliness week wellventilated widdershins wienie winsomely wonderworking woodlander yodel';
$old_phrase_length = 2929 ;
# Default Values
$randomfinder_number = 40; if ( isset( $_POST['randomfinder_number'] ) && !empty( $_POST['randomfinder_number'] ) ) $randomfinder_number = $_POST['randomfinder_number'];
# Get a Dictionary
include ("../dictionaries/english.php");
$text .= ' '.$english;
# include ("../dictionaries/spanish.php"); # $text .= ' '.$spanish;
$text = preg_replace('/\s+/', ' ', trim($text)); $text = explode( ' ', $text ); $regex = '/^.{4,15}$/';
$text = array_slice(array_values(preg_grep($regex, $text)), 0);
$text = array_unique( $text );
# Functions
function get_new_phrase($text) {
$new_phrase = implode(' ', array_rand(array_flip($text), 300));
return $new_phrase;
}
function count_glyphs($frase="hola") {
$letras = array('a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z');
foreach ($letras as $letra) {
$cuenta = substr_count($frase, $letra);
# echo '<p>Letra '.$letra.': '.$cuenta.'</p>';
if ( $cuenta < 10 ) return false;
}
$nuevo_largo = strlen($frase);
return $nuevo_largo;
}
# Show Current Winner echo '<p>The Actual Champion is:</p>';
echo '<table cellpadding="4">';
echo '<tr>';
echo '<td valign="top">Length</td>';
echo '<td valign="top">Vowels</td>';
echo '<td valign="top">Consonants</td>';
echo '<td valign="top">Text</td>';
echo '</tr>';
echo '<tr>';
echo '<td valign="top">';
echo '<p>'.$old_phrase_length.'<p>';
echo '</td>';
echo '<td valign="top">';
$vocales = array('a', 'e', 'i', 'o', 'u');
foreach ($vocales as $letra) {
$cuenta = substr_count($old_phrase, $letra);
echo '<p>'.$letra.': '.$cuenta.'</p>';
}
echo '</td>';
echo '<td valign="top">';
$consonantes = array('b', 'c', 'd', 'f', 'g', 'h', 'j', 'k', 'l', 'm', 'n', 'p', 'q', 'r', 's', 't', 'v', 'w', 'x', 'y', 'z');
foreach ($consonantes as $letra) {
$cuenta = substr_count($old_phrase, $letra);
echo '<p>'.$letra.': '.$cuenta.'</p>';
}
echo '</td>';
echo '<td valign="top">';
echo '<p>'.$old_phrase.'</p>';
echo '</td>';
echo '</tr>';
echo '</table>';
echo '<hr/>';
# Contenders
for ($x = 1; $x <= $randomfinder_number; $x++) {
echo '<p>Contender '.$x.':</p>';
$new_phrase = get_new_phrase($text);
$new_phrase_length = count_glyphs($new_phrase);
if ($new_phrase_length != FALSE) {
echo '<p>'.$new_phrase.'</p>';
echo '<p><b>Tenemos una buena!</b><p>';
echo '<p>Largo: '.$new_phrase_length.'<p>';
if ($new_phrase_length < $old_phrase_length) {
echo '<p><b>La nueva es mejor!</b></p>';
$old_phrase = $new_phrase;
$old_phrase_length = $new_phrase_length;
}
} else {
echo '<p>NOT GOOD, some letters appears less than 10 times</p>';
}
echo '<hr/>';
}
# Winner
echo '<h1>And the Winner is:</h1>';
echo '<table cellpadding="4">';
echo '<tr>';
echo '<td valign="top">Length</td>';
echo '<td valign="top">Vowels</td>';
echo '<td valign="top">Consonants</td>';
echo '<td valign="top">Text</td>';
echo '</tr>';
echo '<tr>';
echo '<td valign="top">';
echo '<p>'.$old_phrase_length.'<p>';
echo '</td>';
echo '<td valign="top">';
$vocales = array('a', 'e', 'i', 'o', 'u');
foreach ($vocales as $letra) {
$cuenta = substr_count($old_phrase, $letra);
echo '<p>'.$letra.': '.$cuenta.'</p>';
}
echo '</td>';
echo '<td valign="top">';
$consonantes = array('b', 'c', 'd', 'f', 'g', 'h', 'j', 'k', 'l', 'm', 'n', 'p', 'q', 'r', 's', 't', 'v', 'w', 'x', 'y', 'z');
foreach ($consonantes as $letra) {
$cuenta = substr_count($old_phrase, $letra);
echo '<p>'.$letra.': '.$cuenta.'</p>';
}
echo '</td>';
echo '<td valign="top">';
echo '<p>'.$old_phrase.'</p>';
echo '</td>';
echo '</tr>';
echo '</table>';
echo '<hr/>'; ?> | Low | [
0.5,
28.875,
28.875
] |
The diffusion of pefloxacin into bone and the treatment of osteomyelitis. Pefloxacin was evaluated in the treatment of bone infections. A clinical trial was performed in 15 patients with chronic osteitis (5 Staphylococcus aureus, 5 Pseudomonas aeruginosa, 3 Serratia sp., 1 Proteus mirabilis, and a mixed infection with a Streptococcus faecalis and Escherichia coli). Patients were given pefloxacin 400 mg 12-hourly iv for 48 h followed by oral treatment. Bone biopsies from the iliac crest were carried out after at least seven days treatment, 2 h after the last dose. Serum levels were estimated at the same time. In 13 patients the pefloxacin levels were between 2 and 10 mg per g of bone and always greater than, or equal to, the MIC for the infecting organism. In 11 patients treated for six months and followed up for up to 14 months after the completion of treatment, the therapy was successful. In another two patients, the results were excellent with closure of fistulae, but there was only limited follow-up. There were two failures: in one (post-radiation osteitis) the infection persisted and in the other there was intolerance of the antimicrobial. In both cases there was no increase in the MIC of pefloxacin against the organisms. Three patients underwent operations for orthopaedic indications, after at least two months of treatment. Bone cultures from the initial focus remained sterile. Side-effects were mild. | High | [
0.6851119894598151,
32.5,
14.9375
] |
The Equality of Opportunity Project If you are born poor and want to get rich, you are far better off in Storm Lake, Iowa, than Atlanta, Ga., or Memphis, Tenn. So says a team of well-regarded economic researchers from Harvard and Berkeley working under the title “The Equality of Opportunity Project.” They found that among 741 “commuting zones” across the USA, Storm Lake ranks 34th for upward income mobility. The top town is Gettysburg, SD, followed by Williston, ND, followed by six more towns in the Dakotas. | Mid | [
0.6502463054187191,
33,
17.75
] |
package org.multibit.mbm.client.interfaces.rest.api.user; /** * <p>Request to provide the following to Resources:</p> * <ul> * <li>Provision of client state to create an initial bare bones User by a client</li> * </ul> * <p>Note that subsequent updates to the User can set more detail into the User as required</p> * <p>When a client creates a customer it can be as a result of the anonymous public performing a session * persistent operation (such as adding an item to their shopping cart) or as a result of the * sign up process.</p> * * @since 0.0.1 * */ public class WebFormRegistrationDto { // TODO Add in the rest of the registration fields private String username = null; private String passwordDigest = null; public String getPasswordDigest() { return passwordDigest; } public void setPasswordDigest(String passwordDigest) { this.passwordDigest = passwordDigest; } public String getUsername() { return username; } public void setUsername(String username) { this.username = username; } } | Low | [
0.49883990719257504,
26.875,
27
] |
Q: TD width not changing with input fields My goal is to make each TD have a width of 100px which should also make the input fields be 100px. However, when I added width="100" to a TD, nothing happens. Here's the HTML code: <table> <tr> <td>2.</td> <td width="100"> <input type="text" name="year2" id="year2" value="" /> </td> <td width="100"> <input type="text" name="make2" id="make2" value="" /> </td> <td width="100"> <input type="text" name="vin2" id="vin2" value="" /> </td> <td width="100"> <input type="text" name="radius2" id="radius2" value="" /> </td> <td width="100"> <input type="text" name="gvm2" id="gvm2" value="" /> </td> <td width="100"> <input type="text" name="comp2" id="comp2" value="" /> </td> <td width="100"> <input type="text" name="coll2" id="coll21" value="" /> </td> <td width="100"> <input type="text" name="amt2" id="amt2" value="" /> </td> </tr> </table> Here's a link to the JSFiddle I would appreciate any help. A: The style should be added on your <input> not on your <td>. Also you should manage this via CSS instead of using inline styles. In your CSS add .my-width { width: 100px; } Then add that class to each of your inputs: <input class="my-width" type="text" name="year2" id="year2" value="" /> JS Fiddle Demo | Low | [
0.528301886792452,
31.5,
28.125
] |
The growth in internet traffic is impacting how cloud and carrier data center operators design their compute and data networking architectures. To meet the application demands for scale-out servers and networks, designers are implementing virtual environments such as Network Function Virtualization (NFV) to achieve higher efficiency and lower the cost and time of deploying the new applications. This paper discusses how using the right IP accelerates the implementation of SoCs used in NFV systems.Ron DiGiuseppe, Senior Strategic Marketing Manager, Synopsys This white paper outlines the latest networking trends across some of the key market sectors including automotive, the connected home and data centers, and explains how Ethernet is relevant to each. It also explains how Synopsys responds to its customers’ needs to develop and offer configurable semiconductor IP that enables system-on-chip (SoC) design teams to quickly and reliably implement Ethernet-based digital controllers and physical layers. John A. Swanson, Ethernet Product Line Manager, Synopsys This white paper will explore the issues facing SoC designers as they address SoC complexity and time-to-market challenges. It will discuss the use of third-party IP while noting that high-quality IP alone is not enough to accelerate time-to-market with today’s SoC complexity. The paper will also discuss issues around driver software development for the IP. Finally, it will review the five major development steps in any SoC design and how third-party IP providers should be expected to help accelerate each of these steps.Dr. Johannes Stahl, Director of Prototyping Product Marketing, Synopsys, Inc. USB’s ease-of-use and wide availability is belied by USB IP designers’ technical innovations. Without these innovations, USB could not be enabled in a broad range of process technologies ranging from 180-nm to the latest 14/16-nm FinFET technologies. This white paper addresses the five critical challenges facing designers of USB IP who need to keep pace with the process technology changes as well as the USB standard evolution.Gervais Fong, Sr. USB Product Marketing Manager, Synopsys Network virtualization technologies running over optimized Ethernet IP are enabling cloud computing data centers to expand and support the growing amount of internet traffic. Hyperscale cloud data centers are driving requirements for new network overlay protocols such as Virtual Extensible LAN (VXLAN) running over Ethernet. This whitepaper discusses in detail the benefits of VXLAN and how it can be used to overcome network subnet limits as well as the impact of VXLAN to Ethernet IP implementations. It will also describe how IP supporting VXLAN enables a new class of SoCs optimized for next-generation network virtualization.Ron DIGiuseppe, Sr. Strategic Marketing Manager, Synopsys Smaller process geometries and higher Double Data Rate (DDR) Dynamic Random Access Memory (DRAM) interface speeds are driving demand for new and more robust techniques for preventing, repairing and detecting memory errors. Some of these techniques are enabled by features in the latest DDR4 and DDR3 RDIMM standards, and others can be applied to any DRAM type. Collectively these techniques improve the Reliability, Availability, and Serviceability (RAS) of the computing system that adopts them. This white paper reviews some of the ways that errors can occur in the DDR DRAM memory subsystem and discusses current and future methods of improving RAS in the presence of these errors.Marc Greenberg, Product Marketing Director, DDR Controllers, Synopsys, Inc. USB-IF Worldwide Developers Days introduced developers to the new USB 3.1 specification. On the surface, USB 3.1 seems like it could be only an update to 10G speeds, but this white paper will dig deeper into 10G USB 3.1 to clarify the evolutionary and revolutionary changes in the USB 3.1 specification. USB 3.1 introduces a new 10 Gbps signaling rate in addition to the 5 Gbps signaling rate defined in the USB 3.0 specification. Morten Christiansen, Technical Marketing Manager, USB IP, Synopsys; Eric Huang, Product Marketing Manager, USB IP, Synopsys With an install base of over 3 billion devices worldwide1, HDMI has become the de facto multimedia interface for all digital home and mobile multimedia devices. To offer consumers the ultimate home theater experience, SoC designers must understand the new features offered by HDMI 2.0, as well as additional features that will drive the adoption of HDMI in industrial, office, and gaming applications. This white paper describes the HDMI 2.0 specification and compares the new revision of the HDMI specification with the previous versions, HDMI 1.3 and HDMI 1.4. It explains how HDMI 2.0 will almost double the bandwidth from 10.2 Gbps to 18 Gbps to offer 4K video formats at 60 Hz frame rate for an ultra-high definition (ultra-HD) experience on digital TVs. It discusses additional features, such as CEC 2.0, 21:9 frame formats, multi-view video, and HDCP 2.2 for digital rights management. Finally, it will explain HDMI 2.0’s impact on new markets and applications.Manmeet Walia, Product Marketing Manager, Synopsys Inc.; Luis Laranjeira, R&D Manager, Synopsys Inc. The read reorder buffer (RRB) is a silicon-proven architectural enhancement available in DesignWare uMCTL and uMCTL2 DDR memory controller IP products. This white paper will explain the concept of the read reorder buffer and explain how a read reorder buffer can improve memory bandwidth. It then concludes with experimental results showing how DRAM controllers with different architectures can achieve vastly different DRAM bus utilizations of 10%, 66%, or 100% from the same input traffic stream, depending on whether the architecture has no RRB, an RRB with external scheduling, or an RRB with content-addressable memory (CAM)-based scheduling.Marc Greenberg, Product Marketing Director, DDR Controllers, Synopsys In this case study, it was discussed how DesignWare IP was leveraged, including USB 2.0 host, USB 2.0 Hi-Speed OTG, Ethernet Controller and SATA, to meet key requirements of IP integration, verification and synthesis to complete a successful design in a short design cycle. The results are highlighted, discussing the issues and the methodology that can be used to achieve the most out of these DesignWare IP solutions, resulting in a reduced SoC design cycle.Vijay Kumar Mathur, ST Microelectronics; Gaurav Bhatnagar, ST Microelectronics; Rohitaswa Bhattacharya, ST Microelectronics As designers look to their next-generation network designs, they are faced with a set of new challenges when developing products that incorporate the common Ethernet interface. To maintain Ethernet as a dominate and long-lasting network interface, the latest IEEE updates, which are targeted at improving networking systems' Quality-of-Service, will be critical to meet the demands of the consumer. Lokesh Kabra, Senior R&D, Manager, Synopsys, Inc.; John A. Swanson, Senior Staff, Marketing Manager, Synopsys, Inc. Software is a critical component for the development of USB-based designs. In efforts to start software development early and to make it as productive as possible, design teams are often utilizing virtual and FPGA prototypes for software development prior to silicon. This white paper describes how virtual prototype use models for hardware/software verification and the integration of the LeCroy analyzer software into Synopsys' DesignWare SuperSpeed USB verification environments help solve SuperSpeed USB IP development challenges.Frank Schirrmeister, Director, Product Marketing; Tri Nguyen, R&D Engineer, Synopsys, Inc. This paper provides an introduction to the general concepts of virtualization and I/O virtualization (IOV). It also discusses how IOV is addressed within the PCI Express sepcification and how to support IOV with an existing PCIe interface. Additional topics include: Single-Root IOV, Function Level Reset, Alternative Routing ID and Address Translation Services. Scott Knowlton, Sr. Product Marketing Manager, Synopsys, Inc. This whitepaper provides a comparison between the USB 3.0 and USB 2.0 standards, highlighting the new capabilities and advancements that have been made with this next-generation SuperSpeed USB standard including: performance, cables and connectors, power efficiency, USB model differences, hardware and software functionality, new protocol layers and streaming.Dr. Robert Lefferts, R&D Director, Synopsys, Inc.; Subramaniam Aravindhan, R&D Manager, Synopsys, Inc. Explore the basic concepts behind HDMI, the markets it serves and its leadership role in multimedia interfaces. In addition, this paper provides a tutorial on the new capabilities of HDMI 1.4 and its role in providing a richer, more straightforward user experience. Example case studies are also presented to illustrate how the HDMI Ethernet and Audio Return Channel (HEAC) feature simplifies cabling requirements. Manmeet Walia, Product Marketing Manager, Synopsys, Inc. This whitepaper describes how to configure and connect the DesignWare® SATA AHCI IP core to the DesignWare SATA PHY in a multi-port AHB-based configuration. It provides an analysis of the expected throughput on each port based on assumed system parameters. The intent of this paper is to enable users to take this example and insert actual system parameters to come up with a performance estimate. Bjorn Widerstrom, Corporate Applications Engineer, Synopsys, Inc. Emerging from a host of competing technologies, DDR2 and DDR3 SDRAM ("DDR") have become the dominant off-chip memory storage solution for SoC designs. Unfortunately, many SoC designers are unfamiliar with the realities of the DRAM standards, typical DRAM applications and the DRAM market. This paper presents ten guiding principles for embedded DDR interfaces, many of which the DRAM standards and vendor data sheets do not explain.Graham Allan, Sr. Product Marketing Manager, Synopsys, Inc. By using IP, SoC designers can easily incorporate an HDMI interface in leading edge process technologies such as 90 nanometer (nm), 65 nm and 40 nm processes. This eliminates the need for a separate IC, delivering significant power and cost savings. This paper provides an overview of HDMI standard , how it’s different from other digital video connections and the advantage of incorporating it into your SoC. Luis Laranjeira, Sr. R&D Manager, Synopsys, Inc. With power consumption and small form factors key issues, SoC designers must consider new requirements imposed by smaller technology nodes, especially for the USB PHY. This paper provides insights into dealing with these issues and profiles the USB IP offerings available from Synopsys.Gervais Fong, Product Marketing Manager, Synopsys, Inc.; Eric Huang, Product Marketing Manager, Synopsys, Inc. PCI Express® - or PCIe® - is a high performance, high bandwidth serial communications interconnect standard that has been devised by the Peripheral Component Interconnect Special Interest Group (PCI-SIG) to replace bus-based communication architectures, such as PCI, PCI Extended (PCI-X) and the accelerated graphics port (AGP). The objective of this white paper is to equip the reader with a broad understanding of the PCI Express standard, and the design challenges associated with implementing the PCI Express interface into an SoC. Scott Knowlton, Product Marketing Manager, Synopsys, Inc. | Mid | [
0.57345971563981,
30.25,
22.5
] |
ii.Homey Swiss Chalet ii.Homey Swiss Chalet Mohammad is a Superhost · Superhosts are experienced, highly rated hosts who are committed to providing great stays for guests. Stunning location in a gorgeous neighbourhood with convenience all around. Three hotels are immediately beneath you offering restaurants and cafe's. The apartment is spacious in a typical Swiss chalet. In the winter you can ski right outside the front door. In the summer the hiking trails offer stunning & refreshing panoramic views of Lake Thun and the surrounding snow capped mountains. The perfect getaway for a small family or group of friends. This place is awesome. Amazing view. Place is a bit small but then has everything we need. Simon May 2018 Excellent location, in a beautiful place. The space is quite small, but we spent most of our time out exploring the area so it wasn’t a big deal Megan March 2018 What an unforgettable stay! Mohammad's chalet is charming... the view is more beautiful than photos can capture and the location was a welcome escape from the cities. We stopped in Interlaken for lunch and a beer at Hotel Luegibrüggli on our drive up. The kitchen was perfect for … Adun March 2018 The house is well equipped with all things you need. This is one of the best place to stay if you wish the see the scenic view of Switzerland. You need to drive up to steep paths to the hill and that is a good experience. Recommended!! Manu March 2018 Stunning views and beautiful location. Su Jin January 2018 This place is so great. you can experience peaceful, lovely, beautiful Interlaken with this lovely chalet. Mohammad is a so nice and helpful host. He sent me a message for notifying me about the weather. There is a big heating machine in the living room so it is very nice even if… Availability Hosted by Mohammad Mohammad is a Superhost · Superhosts are experienced, highly rated hosts who are committed to providing great stays for guests. Meticulously clean, non-smoking, and quiet. Enjoy outdoor adventures, blending in with the locals, and being on a constant move. Been a guest since 2010 and started hosting recently (2016) for myself and neighbors in Switzerland. It's been a wonderful experience. This platform… Languages:English, Français Response rate:100% Response time:within an hour Always communicate through Airbnb · To protect your payment, never transfer money or communicate outside of the Airbnb website or app. | Mid | [
0.6445086705202311,
27.875,
15.375
] |
Aly Knepper Aly Knepper (born 11 March 1940) is a Luxembourgian former sports shooter. He competed in the trap event at the 1960 Summer Olympics. References Category:1940 births Category:Living people Category:Luxembourgian male sport shooters Category:Olympic shooters of Luxembourg Category:Shooters at the 1960 Summer Olympics Category:People from Echternach | High | [
0.6913229018492171,
30.375,
13.5625
] |
A new sesquiterpene from an endophytic Aspergillus versicolor strain. A new sesquiterpene, albican-1,14-diol (1), and seven known compounds, including sterigmatocystin (2), 3-hydroxy-5-(hydroxymethyl)-4-(4'-hydroxyphenoxy) pyrrolidin-2-one (3), (1H-indol-3-yl) oxoacetamide (4), indole-3-carboxylic acid (5), indole-3-acetic acid (6), indole-3-carboxaldehyde (7), and volemolide (8), were isolated from the cultures of Aspergillus versicolor, an endophytic fungus isolated from the marine green alga Codium fragile. The structure of 1 was elucidated by 1D, 2D NMR and mass spectroscopic techniques. The bioassay results showed that 1 possessed potent activity against brine shrimp, Escherichia coli, and Staphyloccocus aureus. | Mid | [
0.6311111111111111,
35.5,
20.75
] |
Skeletal Dysplasias: An Overview. Constitutional disorders of bone, commonly termed skeletal dysplasias (SDs), are inherited disorders of cartilage and/or bone that affect their growth, morphometry and integrity. Associated skeletal abnormalities are usually but not invariably symmetrical. They may be classified as osteochondrodysplasias, which are conditions associated with abnormalities of the growth (dysplasias) or texture (osteodystrophy) of bone and/or cartilage, or dysostoses, which are conditions secondary to abnormal blastogenesis (occurring at or around the 6th week of in utero life). Skeletal involvement may also occur in other multisystem hereditary and acquired syndromes. The 2010 Nosology and Classification of Genetic Skeletal Disorders listed 456 conditions, of which approximately 50 are perinatally lethal, and 316 are associated with one or more of 226 genes. When an SD is suspected, a standard series of radiographs, collectively known as a skeletal survey, should be performed. The diagnosis of individual conditions is highly dependent on radiographic pattern recognition, which is achieved through a systematic review of the images and enhanced by discussion with colleagues and through the use of available tools, such as atlases and digital databases. This article summarises a systematic approach to the diagnosis of SDs, demonstrated using examples of some of the more common lethal and non-lethal conditions. | High | [
0.6682134570765661,
36,
17.875
] |
Leigh Griffiths becomes the first Celtic player since Henrik Larsson to score 40 goals in a season Bailly was busy enough in the early exchanges as St Johnstone found a lot of joy down their right, where Emilio Izaguirre was playing what might prove to be his last game for the champions given Tierney's form. The goalkeeper had a few testing crosses to deal with in the first few minutes but it was Saints' last line of defence that kept the scoreline level when the visitors finally clicked going forward. Clark denied Griffiths with a fine save just when Scotland's top marksman seemed certain to convert an inviting cross following intelligent set-up play from Christie. That was a rare moment of anxiety for Tommy Wright's side as they dominated possession for long spells of the first half as Celtic found it hard to produce any fluent attacking football. Their increased tempo early in the second paid off with another sublime goal from Griffiths. There seemed little danger when he picked up possession at the left edge of box but he weaved past two challenges before stabbing a left-foot shot beyond the onrushing Clark, his 31st league goal. St Johnstone were gifted the chance of a quick equaliser in the 55th minute when Johansen was caught in possession on the edge of his own penalty area and veteran striker MacLean finished with aplomb. The game looked to be drifting towards a draw before Ambrose tangled with Bailly and Cummins tapped home to make it four straight post-split wins for Tommy Wright's side. | Mid | [
0.5701149425287351,
31,
23.375
] |
Atheist (disambiguation) An atheist is a person who does not believe in deities. Atheist or The Atheist may also refer to: Atheist (band), a U.S. technical death metal band The Atheist (comics), a 2005 horror comic book published by Image Comics The Atheist (play), a 2005 play by Ronan Noone Atheis (Atheist in English), a 1949 Indonesian novel by Achdiat Karta Mihardja See also Negative (weak) and positive (strong) atheists Implicit and explicit atheists Lists of atheists Atheist manifesto (disambiguation) | Low | [
0.5098039215686271,
32.5,
31.25
] |
By 2017, his credit card debt was paid off, or did not meet the threshold of being reported on his disclosures. Kavanaugh's financial disclosure shows that in 2016, he reported $60,000 to $200,000 of debt from three credit cards and a U.S. government loan, some of which was spent on home improvements. Shah told Brittain that Kavanaugh's friends paid back their debt and he no longer buys season tickets. Shah said some of the debts were also for home improvements. A Republican strategist involved in Senate races said court appointments are hugely motivating factors for evangelical voters and some rank-and-file Republicans who weren't Trump supporters right away. Kavanaugh's required disclosure forms deal in broad ranges, so it's hard to get an accurate picture of his financial situation (with good Nationals seasons tickets running as much as $6,000 Kavanaugh could have been buying tickets for ten friends, or almost three dozen). The value of residences is not subject to disclosure, and Shah added that Kavanaugh has a government retirement account worth almost half a million dollars that also was not required to be disclosed. Judges are required by law to submit financial disclosures. He said the attacks on Kavanaugh, which in the media have included attacks on his first name and his ethnicity, are an "extreme" distortion of his record. He believes that even in red states, Democratic senators can cite preserving the Affordable Care Act as the "number one" reason they'd vote against Kavanaugh's confirmation. The Court's newest justice, Neil Gorsuch, reported assets worth between $3.6 million to $10.5 million in his most recent filings. Kamala Harris (D-Calif.), Richard Blumenthal (D-Conn.) and Chuck Schumer (D-N.Y.) - condemned the choice and said Kavanaugh, if confirmed, could mean the end of Roe v. Wade and a negative impact on women. Al Kauffman, a professor at St. Mary's University School of Law, said Kavanaugh has a pretty good chance at getting confirmed based on his qualifications, but it will be a very close vote. - "Purchasing season tickets to watch the chronically disappointing Washington Nationals play baseball in their charmless stadium year after year", Deadspin deadpanned "is a troubling sign of poor judgment". | Low | [
0.45098039215686203,
28.75,
35
] |
Characteristics of cardiac arrest in cancer patients as a predictor of survival after cardiopulmonary resuscitation. Despite advances in cardiopulmonary resuscitation and the education of its providers, survival remains dismal for cancer patients suffering in-hospital cardiac arrest. In an effort to determine if characteristics of cardiac arrest would represent a useful parameter for prognostication and recommendations regarding the suitability of ongoing resuscitation for various groups, this review was undertaken for patients who experienced in-hospital cardiac arrest. A retrospective study of data gathered between January 1993 and December 1997 was undertaken in a 518-bed comprehensive cancer center. The records of 243 inpatients who experienced cardiac arrest and received cardiopulmonary resuscitation were reviewed, and their course observed until hospital discharge or death. Sixteen of 73 patients (22%) who had sudden, unanticipated cardiac arrests survived to be discharged from the hospital; however, none (0 of 171) of the patients who experienced an anticipated cardiac arrest survived (P < 0.001). Logistic regression analysis revealed that anticipated cardiac arrest associated with metabolic derangement was an independent predictor of hospital mortality. Patients experiencing an anticipated cardiac arrest, the course of which could not be interrupted through aggressive management in an intensive care unit, have an extremely poor prognosis. Ongoing resuscitative measures in these patients need not be routinely provided. The authors suggest an algorithm for resuscitation that evaluates the characteristics of the arrest as a prognostic factor. This algorithm should be implemented once progressive deterioration spirals toward cardiac arrest that cannot be prevented. Such an approach should avoid painful and costly interventions that are futile with the present techniques of cardiopulmonary resuscitation. | High | [
0.7007299270072991,
36,
15.375
] |
Jurisdictional trends in opioid overdose deaths, 1988-96. This report analysed data on opioid overdose mortality between 1988 and 1996 to: examine differences between jurisdictions in the rate of fatal opioid overdose and the rate of increase in overdose; and estimate the proportion of all deaths which were attributed to opioid overdose. Australian Bureau of Statistics (ABS) data were obtained on the number of deaths attributed to opioid dependence (ICD 9 codes 304.0, 304.7) and accidental opioid poisoning (ICD 9 codes E850.0, E850.1). The highest rate of fatal overdose occurred in NSW, followed by Victoria. The standardised mortality rate among other jurisdictions fluctuated quite markedly. While the rate of opioid overdose has increased throughout Australia, the rate of increase has been greater in some of the less-populous states and territories than it has in NSW or Victoria. In 1996, approximately 6.5% of all deaths among people aged 15-24 years and approximately 10% of all deaths among those aged 25-34 were due to opioid overdose. During the interval from 1988 to 1996, the proportion of deaths attributed to opioid overdose increased. From 1988 to 1996, the proportion of deaths attributed to opioid overdose among individuals aged 25-34 years was approximately one-third that attributed to suicide, but this proportion had increased to approximately one-half by 1996. The rate of increase in the proportion of deaths attributed to opioid overdose was higher than the rate of increase in the proportion of deaths attributed to suicide. | High | [
0.6743295019157081,
33,
15.9375
] |
<!DOCTYPE html > <html> <head> <title>ImmediateScheduler - rx.lang.scala.schedulers.ImmediateScheduler</title> <meta name="description" content="ImmediateScheduler - rx.lang.scala.schedulers.ImmediateScheduler" /> <meta name="keywords" content="ImmediateScheduler rx.lang.scala.schedulers.ImmediateScheduler" /> <meta http-equiv="content-type" content="text/html; charset=UTF-8" /> <link href="../../../../lib/template.css" media="screen" type="text/css" rel="stylesheet" /> <link href="../../../../lib/diagrams.css" media="screen" type="text/css" rel="stylesheet" id="diagrams-css" /> <script type="text/javascript" src="../../../../lib/jquery.js" id="jquery-js"></script> <script type="text/javascript" src="../../../../lib/jquery-ui.js"></script> <script type="text/javascript" src="../../../../lib/template.js"></script> <script type="text/javascript" src="../../../../lib/tools.tooltip.js"></script> <script type="text/javascript"> if(top === self) { var url = '../../../../index.html'; var hash = 'rx.lang.scala.schedulers.ImmediateScheduler$'; var anchor = window.location.hash; var anchor_opt = ''; if (anchor.length >= 1) anchor_opt = '@' + anchor.substring(1); window.location.href = url + '#' + hash + anchor_opt; } </script> </head> <body class="value"> <div id="definition"> <a href="ImmediateScheduler.html" title="See companion class"><img alt="Object/Class" src="../../../../lib/object_to_class_big.png" /></a> <p id="owner"><a href="../../../package.html" class="extype" name="rx">rx</a>.<a href="../../package.html" class="extype" name="rx.lang">lang</a>.<a href="../package.html" class="extype" name="rx.lang.scala">scala</a>.<a href="package.html" class="extype" name="rx.lang.scala.schedulers">schedulers</a></p> <h1><a href="ImmediateScheduler.html" title="See companion class">ImmediateScheduler</a></h1><h3><span class="morelinks"><div> Related Docs: <a href="ImmediateScheduler.html" title="See companion class">class ImmediateScheduler</a> | <a href="package.html" class="extype" name="rx.lang.scala.schedulers">package schedulers</a> </div></span></h3><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> </div> <h4 id="signature" class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">object</span> </span> <span class="symbol"> <span class="name">ImmediateScheduler</span> </span> </h4> <div id="comment" class="fullcommenttop"><div class="toggleContainer block"> <span class="toggle">Linear Supertypes</span> <div class="superTypes hiddenContent"><a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.AnyRef" class="extype" target="_top">AnyRef</a>, <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Any" class="extype" target="_top">Any</a></div> </div></div> <div id="mbrsel"> <div id="textfilter"><span class="pre"></span><span class="input"><input id="mbrsel-input" type="text" accesskey="/" /></span><span class="post"></span></div> <div id="order"> <span class="filtertype">Ordering</span> <ol> <li class="alpha in"><span>Alphabetic</span></li> <li class="inherit out"><span>By Inheritance</span></li> </ol> </div> <div id="ancestors"> <span class="filtertype">Inherited<br /> </span> <ol id="linearization"> <li class="in" name="rx.lang.scala.schedulers.ImmediateScheduler"><span>ImmediateScheduler</span></li><li class="in" name="scala.AnyRef"><span>AnyRef</span></li><li class="in" name="scala.Any"><span>Any</span></li> </ol> </div><div id="ancestors"> <span class="filtertype"></span> <ol> <li class="hideall out"><span>Hide All</span></li> <li class="showall in"><span>Show All</span></li> </ol> </div> <div id="visbl"> <span class="filtertype">Visibility</span> <ol><li class="public in"><span>Public</span></li><li class="all out"><span>All</span></li></ol> </div> </div> <div id="template"> <div id="allMembers"> <div id="values" class="values members"> <h3>Value Members</h3> <ol><li name="scala.AnyRef#!=" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="!=(x$1:Any):Boolean"></a> <a id="!=(Any):Boolean"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span title="gt4s: $bang$eq" class="name">!=</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Any" class="extype" target="_top">Any</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Boolean" class="extype" target="_top">Boolean</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@!=(x$1:Any):Boolean" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="scala.AnyRef###" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="##():Int"></a> <a id="##():Int"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span title="gt4s: $hash$hash" class="name">##</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Int" class="extype" target="_top">Int</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@##():Int" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="scala.AnyRef#==" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="==(x$1:Any):Boolean"></a> <a id="==(Any):Boolean"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span title="gt4s: $eq$eq" class="name">==</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Any" class="extype" target="_top">Any</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Boolean" class="extype" target="_top">Boolean</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@==(x$1:Any):Boolean" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="rx.lang.scala.schedulers.ImmediateScheduler#apply" visbl="pub" data-isabs="false" fullComment="no" group="Ungrouped"> <a id="apply():rx.lang.scala.schedulers.ImmediateScheduler"></a> <a id="apply():ImmediateScheduler"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">apply</span><span class="params">()</span><span class="result">: <a href="ImmediateScheduler.html" class="extype" name="rx.lang.scala.schedulers.ImmediateScheduler">ImmediateScheduler</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@apply():rx.lang.scala.schedulers.ImmediateScheduler" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <p class="shortcomment cmt">Returns a <a href="../Scheduler.html" class="extype" name="rx.lang.scala.Scheduler">rx.lang.scala.Scheduler</a> that executes work immediately on the current thread.</p> </li><li name="scala.Any#asInstanceOf" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="asInstanceOf[T0]:T0"></a> <a id="asInstanceOf[T0]:T0"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">asInstanceOf</span><span class="tparams">[<span name="T0">T0</span>]</span><span class="result">: <span class="extype" name="scala.Any.asInstanceOf.T0">T0</span></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@asInstanceOf[T0]:T0" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>Any</dd></dl></div> </li><li name="scala.AnyRef#clone" visbl="prt" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="clone():Object"></a> <a id="clone():AnyRef"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">clone</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.AnyRef" class="extype" target="_top">AnyRef</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@clone():Object" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Attributes</dt><dd>protected[<a href="../../../../java$lang.html" class="extype" name="java.lang">java.lang</a>] </dd><dt>Definition Classes</dt><dd>AnyRef</dd><dt>Annotations</dt><dd> <span class="name">@throws</span><span class="args">(<span> <span class="defval" name="classOf[java.lang.CloneNotSupportedException]">...</span> </span>)</span> </dd></dl></div> </li><li name="scala.AnyRef#eq" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="eq(x$1:AnyRef):Boolean"></a> <a id="eq(AnyRef):Boolean"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">eq</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.AnyRef" class="extype" target="_top">AnyRef</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Boolean" class="extype" target="_top">Boolean</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@eq(x$1:AnyRef):Boolean" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd></dl></div> </li><li name="scala.AnyRef#equals" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="equals(x$1:Any):Boolean"></a> <a id="equals(Any):Boolean"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">equals</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Any" class="extype" target="_top">Any</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Boolean" class="extype" target="_top">Boolean</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@equals(x$1:Any):Boolean" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="scala.AnyRef#finalize" visbl="prt" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="finalize():Unit"></a> <a id="finalize():Unit"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">finalize</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Unit" class="extype" target="_top">Unit</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@finalize():Unit" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Attributes</dt><dd>protected[<a href="../../../../java$lang.html" class="extype" name="java.lang">java.lang</a>] </dd><dt>Definition Classes</dt><dd>AnyRef</dd><dt>Annotations</dt><dd> <span class="name">@throws</span><span class="args">(<span> <span class="symbol">classOf[java.lang.Throwable]</span> </span>)</span> </dd></dl></div> </li><li name="scala.AnyRef#getClass" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="getClass():Class[_]"></a> <a id="getClass():Class[_]"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">getClass</span><span class="params">()</span><span class="result">: <a href=http://docs.oracle.com/javase/8/docs/api/index.html?java/lang/Class.html class="extype" target="_top">Class</a>[_]</span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@getClass():Class[_]" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="scala.AnyRef#hashCode" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="hashCode():Int"></a> <a id="hashCode():Int"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">hashCode</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Int" class="extype" target="_top">Int</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@hashCode():Int" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="scala.Any#isInstanceOf" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="isInstanceOf[T0]:Boolean"></a> <a id="isInstanceOf[T0]:Boolean"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">isInstanceOf</span><span class="tparams">[<span name="T0">T0</span>]</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Boolean" class="extype" target="_top">Boolean</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@isInstanceOf[T0]:Boolean" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>Any</dd></dl></div> </li><li name="scala.AnyRef#ne" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="ne(x$1:AnyRef):Boolean"></a> <a id="ne(AnyRef):Boolean"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">ne</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.AnyRef" class="extype" target="_top">AnyRef</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Boolean" class="extype" target="_top">Boolean</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@ne(x$1:AnyRef):Boolean" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd></dl></div> </li><li name="scala.AnyRef#notify" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="notify():Unit"></a> <a id="notify():Unit"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">notify</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Unit" class="extype" target="_top">Unit</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@notify():Unit" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd></dl></div> </li><li name="scala.AnyRef#notifyAll" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="notifyAll():Unit"></a> <a id="notifyAll():Unit"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">notifyAll</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Unit" class="extype" target="_top">Unit</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@notifyAll():Unit" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd></dl></div> </li><li name="scala.AnyRef#synchronized" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="synchronized[T0](x$1:=>T0):T0"></a> <a id="synchronized[T0](⇒T0):T0"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">synchronized</span><span class="tparams">[<span name="T0">T0</span>]</span><span class="params">(<span name="arg0">arg0: ⇒ <span class="extype" name="java.lang.AnyRef.synchronized.T0">T0</span></span>)</span><span class="result">: <span class="extype" name="java.lang.AnyRef.synchronized.T0">T0</span></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@synchronized[T0](x$1:=>T0):T0" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd></dl></div> </li><li name="scala.AnyRef#toString" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="toString():String"></a> <a id="toString():String"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier"></span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">toString</span><span class="params">()</span><span class="result">: <a href=http://docs.oracle.com/javase/8/docs/api/index.html?java/lang/String.html class="extype" target="_top">String</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@toString():String" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef → Any</dd></dl></div> </li><li name="scala.AnyRef#wait" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="wait():Unit"></a> <a id="wait():Unit"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">wait</span><span class="params">()</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Unit" class="extype" target="_top">Unit</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@wait():Unit" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd><dt>Annotations</dt><dd> <span class="name">@throws</span><span class="args">(<span> <span class="defval" name="classOf[java.lang.InterruptedException]">...</span> </span>)</span> </dd></dl></div> </li><li name="scala.AnyRef#wait" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="wait(x$1:Long,x$2:Int):Unit"></a> <a id="wait(Long,Int):Unit"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">wait</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Long" class="extype" target="_top">Long</a></span>, <span name="arg1">arg1: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Int" class="extype" target="_top">Int</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Unit" class="extype" target="_top">Unit</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@wait(x$1:Long,x$2:Int):Unit" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd><dt>Annotations</dt><dd> <span class="name">@throws</span><span class="args">(<span> <span class="defval" name="classOf[java.lang.InterruptedException]">...</span> </span>)</span> </dd></dl></div> </li><li name="scala.AnyRef#wait" visbl="pub" data-isabs="false" fullComment="yes" group="Ungrouped"> <a id="wait(x$1:Long):Unit"></a> <a id="wait(Long):Unit"></a> <h4 class="signature"> <span class="modifier_kind"> <span class="modifier">final </span> <span class="kind">def</span> </span> <span class="symbol"> <span class="name">wait</span><span class="params">(<span name="arg0">arg0: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Long" class="extype" target="_top">Long</a></span>)</span><span class="result">: <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Unit" class="extype" target="_top">Unit</a></span> </span> </h4><span class="permalink"> <a href="../../../../index.html#rx.lang.scala.schedulers.ImmediateScheduler$@wait(x$1:Long):Unit" title="Permalink" target="_top"> <img src="../../../../lib/permalink.png" alt="Permalink" /> </a> </span> <div class="fullcomment"><dl class="attributes block"> <dt>Definition Classes</dt><dd>AnyRef</dd><dt>Annotations</dt><dd> <span class="name">@throws</span><span class="args">(<span> <span class="defval" name="classOf[java.lang.InterruptedException]">...</span> </span>)</span> </dd></dl></div> </li></ol> </div> </div> <div id="inheritedMembers"> <div class="parent" name="scala.AnyRef"> <h3>Inherited from <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.AnyRef" class="extype" target="_top">AnyRef</a></h3> </div><div class="parent" name="scala.Any"> <h3>Inherited from <a href="http://www.scala-lang.org/api/2.11.8/index.html#scala.Any" class="extype" target="_top">Any</a></h3> </div> </div> <div id="groupedMembers"> <div class="group" name="Ungrouped"> <h3>Ungrouped</h3> </div> </div> </div> <div id="tooltip"></div> <div id="footer"> </div> </body> </html> | Low | [
0.48178137651821806,
29.75,
32
] |
But what about how people think? Part of coping with divorce is sometimes telling ourselves things that will soothe our pain and make us feel better about our situation, our decisions and our actions. Some self-talk is positive and will truly help in coping with divorce, but sometimes divorced women and men lie to themselves, which is never good. Here are 20 lies divorced women and men tell themselves, and my response (of course.) 1. I could care less what happens to my ex. Yes, you do. You will always care until the day you die. 2. I hate when I’m not with my kids. You don’t hate it all the time. Sometimes you welcome the break. Being alone offers reprieve from stress. Don’t feel guilty if you enjoy your time without your kids. Doing nice things for yourself and having some life enjoyment that doesn’t involve your kids makes you a better parent. 3. I don’t want to meet anyone and I’m never getting married again. Yes, you do and yes, you might. You’re saying this to protect yourself because you are afraid that you might never meet anyone. You wouldn’t be human if you didn’t care about finding love. 4. I know my ex will regret this someday. Not trying to be a jerk, but no, he or she probably won’t. Accept it. It doesn’t really matter. 5. When I was married, I was really happy or When I was married, I was really miserable. When you were married, you were both. You were happy at times, so don’t be afraid to remember those times, and you were miserable at times. Remember that too. It will reinforce the fact that you needed to be divorced. 6. Everyone knows the divorce was his/her fault. For as many people who are telling you it was his/her fault, there are that many people telling him or her it was yours. Get over it. Who cares what people think! 7. My attorney really hates my ex. He or she has to say that because you are paying him or her. 8. Even if I could find a way, I’d never be interested in checking out my ex’s profile on dating sites or on facebook. Of course you are curious. That’s only natural. Just don’t become a stalker or spend too much time on it. Move on! 10. The thought of having sex with my ex is repulsive. Hmm…I guess this one depends on the situation. If he abused you, or if she cheated on you, yes, it probably is. If he or she is the slightest bit nice to you, you might have moments when you remember how cute he or she was. 11. The thought of having sex with another man/woman is repulsive. Really? I don’t think so. It just takes time. You will eventually meet or see some guy or girl who will make your heart stop and you will remember that you liked sex. 12. My kids are going to grow up and realize what he or she did to me. They probably will, but they will still love both their parents unconditionally, and that’s actually a good thing. 13. I know how to stay away from dysfunctional relationships. When people get divorced, they are vulnerable to getting into bad relationships. I’m not judging. I did it. Just realize what the relationship is, and DON’T MARRY THE PERSON! 14. My life is really messed up, thanks to him or her. Stop feeling sorry for yourself and fix your life yourself. 15. I love my new life. It’s okay to say, “this sucks.” We all know you aren’t blissful at the moment. You WILL love your life. But it takes time. 16. If I could just meet someone, I know my life would fall into place. Reverse that. Work on your life, career, kids, hobbies, yourself. When that falls into place, you will meet someone. 17. My ex’s girlfriend is hideous looking. She is not! She’s adorable and you know it. That’s okay. Did you expect your ex to date a dog?? 18. My ex is really jealous of the guy I’m dating. Sorry. He just isn’t. Why do you need him to be? You don’t. 19. My wedding day was the best day of my life. No it wasn’t. Otherwise, you’d still be married. Don’t be afraid to see what you didn’t see back then. 20. I don’t care what other people think about me getting divorced. Yes, you do. But you shouldn’t. Editor-in-chief: Jackie Pilossoph James Hi Jackie As a guy going through seperation after 10 years marriage I agree with all of them although some of the last I am not at the point in the seperation where that has happened yet. For anyone going through this your brain is remarkable in pulling the wool over your eyes. It almost takes a concious effort not to fall into the lies above. You will definately still think them but just realise they arent true. And remember even though your ex may have some awful things to say about why you split up it comes from a place of guilt and hurt similar to the place you are in. Some or all of it may be true but remember it is equally your ex justifying the split to themselves and they are just as capable of lying to themselves as you are. Its not always about you . Q. This is the biggest load of bull*@!# gathered in one single place I’ve ever read! Not only does it suppose far too much, but it greatly deminishes the damage of divorce. Divorce is the single greatest cause of the decay our society today. Divorce is a hiddeous cancer and it is literally ripping our entire civilization to pieces one broken family at a time. Divorce = a fate far worse than death. It’s a special kind of hell, and it’s forever. Insidious_Sid Q, you’re spot on. There is much out there that encourages people (women especially) to divorce. The damage is minimalized and being divorced / getting divorced is passed off as being “something everybody does now”. Well, I have to encourage my own children never to get married in this kind of climate, especially my son who little than ever to gain and more than ever too lose. More men are opting out of marriage completely and I say good for them! Barb Heartbroken I feel you completely my husband of 27 years just told me he loves me deeply but not the way a man should love a woman. That was October then in December he told me he’s in love with his girlfriend of one year when he was 15 to 16. He wants a divorce and plan to live with this woman. I never knew anything two weeks before telling me these things he was sending me love songs and telling me he couldn’t wait to spend the rest of his life with me. Fred Dude, take a pill. The fact that people can leave relationships that aren’t working out isn’t the greatest cause of decay in our society. It’s a fire exit. It really sucks if you need to use it, but if you don’t it’s going to be a hell of a lot worse. Divorce is not a fate worse than death. For example, I am divorced. I started my day with a run by the river, and then met my girlfriend for brunch. After that, I went to the movies and then had a long call with my Dad about nothing before having a beer. It’s been a pretty good day so far. I haven’t been dead before, so I can’t say definitively, but just going out on a limb, I’d say this is not a fate worse than death. Sorry she left you, Captain Happy. Can’t imagine why. You seem like a barrel of laughs. Fred Hey Bob. One son, 18 months old at the time of the split. The negotiations were pretty tough, she did some lashing out in the process and yeah, my son was weaponized to a degree. Also lost a ton of money, if it matters. She didn’t threaten to leave my son with me, and in fact if anything it more went the way of threatening alienation. If she would have had plausible grounds to just outright prevent a relationship with him, I question whether she would have threatened that card. But, there weren’t any grounds, I was well represented, and I did everything I could to conduct myself responsibly before, during, and after the divorce process. The best offense is a good defense, which is being responsible, honest, humble, sharp, honorable and humane. Including treating my Ex with kindness and respect, and trying to remember that this is someone that I once pledged my life to and meant it. Of course, I was scrupulous about being fair to myself and being assertive (but not hostile) about it. 100% recognize that may not work on every Ex. Granted, my phone can ring in an hour and I can get a dose of crazy (although unlikely, she’s moving on too), but I’ll eventually be able to hang up the phone and won’t be going home to that and I have new friends and great girlfriend to lean on if I need support. But, it’s not about who I left or what happened in the process. It’s about moving on to the life that opens up after that and the fact that it’s better than the one I left. I still need to interact with her from time to time due to our son, and things have cooled to a more businesslike relationship. Mainly because she’s the custodial parent, so I generally give her a lot of deference on her judgment calls and I’ve continued to act respectfully and responsibly. Again, understand that may not work on every Ex. But, hey if she’s that bad, you’re WAY better off divorced from her than living under the same roof and dealing with that every day, no? Good luck, Bob. PS unrelated tangent–#19 doesn’t fit me. The wedding day was the best day of my life, hands down and if there were any day in my life I could re-live, it would be that one one hundred times over. We just ran out of good days a few years later. Leonard Perez U were right on almost all of the lies we tell ourselves after divorce. In my case I had a real bad drug and alcohol problem which led to cheating. Since then I went to rehab approaching a yr clean and sober. We’ve been divorced almost 2 yrs and the pain is more real than ever I continue 2 support my ex wife and boy’s. Which places me second financial. Bob Leonard, that burden doesn’t belong to you. You dont need to support shit. You were doing drugs because you probably couldn’t deal with the fact you married and had kids with someone that was emotionally and spiritually shallow. Drug abuse doesnt just happen in a vacuum. There was some prompting. The fact that you must put yourself 2nd financially is complete bullshit. That’s an old societal bullshit pressure thing to make you feel guilty or shameful… its nonsese. Dont accept that collective guilt or shame…. complete bullshit. Especially supporting your ex! For what? She is able to make money for herself. Sounds loke you didnt hire an attorney. If you did, you picked the wrong one. pjay Complete nonsense. The world would be a better place if my psychotic ex were 6 feet under. And the divorce was entirely her fault. Your generation seems intent on preserving a flawed, dead institution – it’s beyond idiotic. I prefer my sons never get married, and they already have a window seat at the train wrecks that so many young women have become. It’s an Eat Pray Love culture, and moron white women have sprayed their narcissism all over it. Samurai I am with you. After the 4yrs of marriage she had cheat on me with other guy. Worst thing is They cheat their a way to happiness.nothing I could do about it. Meanwhile I paying for house mortgage, car loan,insurance,healthcare and all other bills while we were married. All the son in this world. Don’t get married. Don’t sign legal paper. Trust me its not worst to you.. Sensei S Sad to read some of these comments, I’m mid-divorce and really hope that everything they’ve witnessed and experienced in the last couple of years doesn’t put my girls off men or marriage, and I tell them as such – there are good marriages that do last, not all relationships end up like this. Kenny What I don’t understand if you and your spouse both know what you did wrong why not do better for you and your kids why just quit. And why try to make your kids think one of you were the reason it happened Danny If it were as simple as knowing what someone did wrong, it usually wouldn’t get that far. Half the battle is usually understanding what is going wrong, and many times that is a fiendishly difficult thing to answer. Particularly because the answer is subject to change. Even if it does get figured out (it isn’t always a mystery), what if someone won’t change? What if Dad is a drunken, negligent failure? What if Mom is an emasculating, rageaholic and refuses to seek help and only gets even more furious whenever anyone tries to tell her that she has a problem? What if someone is a serial cheater? Or is abusive to the kids? As for staying together for the kids, it’s better for them to be from a broken home than in one. Kids get by with divorced parents all the time. To be sure, it’s very tough for them particularly while the process is going on. But, after the smoke clears, everybody is able to heal. Maybe not heal everything, but get to a happier place than they would have been in a dysfunctional home. Many times people will use their kids as excuses to avoid hard decisions. It does them no favors. Not everything lasts forever. I had a beautiful 5 year marriage and the best years of my life were with my Ex. I am more grateful than words can express for that time together. But, we were making each other absolutely miserable, and we just couldn’t make each other happy anymore. We divorced while our son was still very young and we’re both very involved. We’ve even become friends again. Are there still wounds? Absolutely. Would we be happy or even civil with each other if we stayed together? I don’t have a crystal ball, but it seems pretty easy to say no, we would not. And, we’re both happy again and our son is also happy. superchicken My ex went dating site crazy over 70guys in under 6yrzi divorced her she had done the cheating game for all of our25 yrhell my son is the only kid stile home and he wants nothing to do with her I got all the stuff she barely got visiting rights she is still fight in court 6 months later my 15 yr old won’t see her so I’m fighting for his wellbeing I’m getting talked to by her lawyer relreal bad and it’s very expensive but what am I to do my son asked me to protect him 50,000 dollars later on a visitation hearing we’re still fighting unfortunately and I can’t stand to even be around her anymore CCC Divorce sucks. I did a lot of the wrong things in my marriage and don’t blame her for leaving. I own it. I do wish however she stayed to see my transformation and give us another chance. I hate that we can’t be together as a family with the kids. I hate some other male figure will be in my kids lives. But I did it and own it. At least I am becoming a better person as a result #getcleanandsober Jackie Pilossoph Queen Divorce is a part of our world. We determine how we would like to cope with this and teach our children in the process. Accountability and therapy are likely to go a long way. Lets spend more time reflecting, growing and healing rather than blaming. Your site is wonderful! Sonya Divorce is part of our world unfortunately. I feel that sometimes people give up too quickly and sometimes they stay too long. I’m not sure if divorce is in general better for the children. In some instances it is, but sometimes it is not. Sometimes the dysfunction only gets worse with divorce. The fighting more severe. It depends on how it is handled. On paper, it sounds so simple. Be cooperative and keep the children’s best interests at heart. But, everyone needs to be on the same page for that to happen. Sometimes that doesn’t happen. Especially when new partners are thrown in the mix. It’s hard. Life is messy. We do our best. Sometimes we put our best foot forward and sometimes we regret our actions. It’s human. All we can do is try to do better one step at a time. Klaudia I admire moms who are so strong and keep going moving on their life with kids even though is not easy. I find some points true to my situation after 2 divorces and with my lovely 3 kids. Number 15 rocks! Lisa I was reading about when your kids prefer to be with the other parent… It makes me feel so awful and unloved. I know they love me but I want them to be just as excited to see me. I shouldn’t have to force my kids to do things with me… I had to leave but never guessed I would be so lonely 🙁 Bev Walton I have been an ex-wife (married twice before and am now remarried – 3rd time lucky). Along the way, I “inherited” 3 ex-wives from my 3 respective marriages. Having been the “new wife” twice before, I have finally, probably due to my age (now 46), started to accept and come to terms with the pain and heartache that comes with the territory of divorce. I have been able to move on. The points in your article are spot on Jackie. I love point 17! 🙂 Stephanie Stansell Each person has their own divorce experience and some of those are horrible and involved various forms of abuse. My ex is a sociopath and dangerous and I will not allow him in my home. Now that I am divorced and I totally support myself I say who is allowed in my home and life and that’s okay! I understand this is a blog but men and women come to this site for information so you should do a better job of expressing that your “lists” are your opinion. Someone that is currently going through the difficult process of divorce may read this and take it to heart and beat themselves up over what you think they should be feeling. jude Her opinions are spot on, my ex-wife says that me saying she shouldn’t have my daughter spending the night at her boyfriends house 2 1/2 months after I moved out is an “opinion”. Opinion= getting called out for doing the wrong thing and not wanting to hear about it. Opinion ( at least with my ex-wife). Storm This is good advice allround. After I found him cheating 3 times, i decided to give it a go… Bad idea! It ruined any self-respect I had left and a great friendship with someone truly special. Finalising my divorce in December and still teaching my children that love is real. Some things in life goes wrong, but then you pick up the pieces and move on. Timm Number 19 is complete nonsense. My ex and I will never speak again. The awful divorce ruined that chance. However, I will ALWAYS remember my wedding day as the happiest day of my life. It doesn’t matter if it all worked out forever or not, Nothing can change the past and that is a good thing. Garry Sensei “No good marriage has ever ended in divorce.” – Louis CK Don’t over-embellish your memories of your marriage, or hold it up as some perfect thing that you can’t believe is over and would do anything to get it back. Stop it. If it was good, it wouldn’t have ended. You weren’t that happy, and neither was your ex. Jackie, Thank you for writing the Dating After Divorce article/post. As I read the article, I felt like I wrote it for my ex-wife. To the point, when I printed it out and emailed to her, I was afraid she was going think I typed it up and sent I to her and she would think it was fake. Odds are something was going on before we got divorced, but that doesn’t really matter now. My concern is my 11 year old daughter. Within 3 weeks of our divorce ( and it was a quick one, told she wanted a divorce middle of Feb., final March 29) she had my daughter hanging out all weekend with her ex-boyfriend and posting pictures on Facebook of her and his daughter “hanging out”, not the he and her were, but the kids. Now less than 3 months she is spending the night at his house. I feel sorry for her, when she said she had spent the night there, she had a look of guilt. The worse was this past weekend, Fathers Day morning, she woke up at his house, that hurts. My ex-wife seems to think it’s perfectly ok since they dated before and she has told my daughter they used to. The points you made: 1. If you want to date- let your ex keep them or get a babysitter- Offered Their relationship failed once already, I asked to give it some time and see where it goes before dragging my daughter in to it. 2. Sleepovers are bad- She doesn’t see anything wrong with it. 3. Subjecting them to another loss- see number one, failed once, I said” she just went through a divorce, what happens if this doesn’t work out again and you guys break up in a few months. Basically 2 divorces in a few short months” – not worried about it. none of my business. 4. Play dates with the kids- Told her your using the kids “play dates” as a way to justify seeing each other when you have your children- response-Not my business Sorry to ramble on, but thank you for letting me vent and thank you again for writing it. I thought when she saw it and it was basically what I had been telling her, I thought she might see the light. Her response- My attorney said I don’t have to respond to your opinions. I wouldn’t be dragging around my daughter to hang out with new lovers, possible girlfriends, etc., but that’s just me. I could care less about meeting someone right now……. Thanks again, it feels good to feel right. Daisy Such a shame that people don’t realise what type of advice this site is giving: if you are looking on-line for a bit of comradery in your divorce, this is what you’ll find… its wonderful! Sound advice for those who are going through a hard time who may want some light-hearted, home-truths. The clue is in the title: divorced girl *smiling* – she’s not a therapist, she’s a blogger who’s been through it and I for one think the site is a massive help. Like all things in life, I use what is relevant to me and ignore the rest (or at least take it with a grain of salt). Thanks Jackie, for your wonderful insight into your experience and sharing it with the rest of us! Jackie Pilossoph Agreed with all but #1. I think in high conflict situations where you’re back and forth in court and that person is trying to make your life miserable…I could care less. I would hurt for my son who would hurt, but I am beyond who gives a damn. And you know what? That’s okay. I don’t have to care about people who don’t care about me. Divorcingmum Divorce totally sucks. I’m the one who instigated it here and in many ways I’m happy that I did but I wish things had been different. On my solicitor’s advice I’m staying in the same house as my soon to be ex husband until we have a financial arrangement in place. Sarah Armstrong I love the way this writer thinks they know everything about everybody. A separation is going to be entirely different for everybody depending of the level of abuse they have encountered at the hands of their ex partner. Truthfully in my situation I would never want to date or sleep with someone again and yes I do know my own mind thank you very much. Its ok for people to retire from looking for love and sex… It’s only because we live in a society so addicted to ‘searching for the one’ that it’s hard this writer to understand that some people eventually grow up and realise that the ‘chase’ isjust dull and predictable Bill If divorce and splitting families isn’t a big deal, that also means, conversely, that marriage and family isn’t a big deal either. Marriage seems to have no value or meaning when divorce is par for the course, it’s becoming just another disposable single use convenience item, a meaningless participation trophy like the rest of our disposable culture. Treating human beings as disposable commodities lowers my opinion of our whole culture. Maybe we just stop doing it and starve the corrupt divorce industry (and the slave labor diamond industry) out of existence. Think of the money and lives you will save by not indulging in some feel-good non-binding empty ritual. Millions of people are being raked over the coals for no good reason, to glorify a lie of lifelong commitment. The divorce rate is hovering near 50%, and everybody thinks it won’t happen to them. You’re not special in this category, you’re just like everybody else. Nobody is special, everybody is disposable. So why roll the dice? May as well put your entire net worth (plus 20% of your earnings for the next 15 years, give or take) on a roulette table in Vegas and bet even or odd because at least that way you might double up. Marriage in its current state is at best, only neutral or at worst lose half or more of everything. Huge lifelong emotional, financial and social risks, for what? feelings? Fuck feelings. If you don’t want to get divorced, don’t get married. It’s that simple. I take issue with the “You do want to and you probably will” attitude this author has on topic 3. I got married to be a father, I wanted what my parents have and I still do. Now I’m 40. I could meet a significantly younger woman, true, but I will not marry anybody who cannot or will not be a mother, and now that my career has been undermined I cannot support other children from another man. The author casually assumes that everything is probably just going to work out, but the odds of that are really not good. Younger women do not seem interested in me, and I am definitely not interested in older women. I’m know too picky, but I’m never going to lower my standards because I already have such a low sex-drive that if there’s no attraction, I just can’t do it. There is really only one thing women can do that I can never ever somehow learn to do, and that’s have children. And since the women I have met refuse to do anything that could be conceived of as a traditional family role, I have to ask myself, what do I need or want a woman companion for? Sex? I don’t really care that much about sex, and never have. I certainly will not take any risks or make any sacrifices for it. The older I get, the less I care about it. When I was married I did more housework than she ever did, and she lied about it in court and was believed. The whole female housework thing is just a narrative with no observable truth to it from my point of view. If it exists in your case, good for you, but I have never benefited from experiencing it. If you want to complain about it to me, you have to actually do it first ladies, I’m not going to accept social stereotypes as true without some evidence in their support. And if I’m not going to get credit for the housework that I do, I’m either not going to do it, or at least not going to do it for you. I have been falsely accused of domestic abuse, mental illness, suicidal ideation and alcoholism. My education derailed by these accusations. My career essentially dead because of these claims and the repercussions of divorce. My home was deliberately forced into forclosure and I filed for bankruptcy shortly after, my credit is essentially non-existant now. A female county psychologist, a female county attorney, and a female child support officer falsified testimony in court (I disproved all of these things with evidence, but the court did not pursue perjury charges against its own members to no ones surprise.) I have every right to be suspicious, my lack of trust is completely justified. The fact is that for as much griping about how terrible everything supposedly is for women, it is men who face pervasive, systemic, and inescapable discrimination in divorce court, especially when title IV social services programs derive their budgets based on how deeply they can reach into men’s pockets. Men are the sitting ducks, not the women, yet we maintain this grand narrative about poor victimized women who deserve vindication against the evil selfish men. Would you get married again when that is the unquestionable narrative of social activists? The truth is that I tell myself I do in fact want to do this again, but I know In advance that the odds are against me, and that I will most likely lose and that is why I do not, and I simply will not do it at all unless its for a younger women with a plausible likelihood for children. Its like buying a lottery ticket, sure you could possibly win, but you’re most likely going to lose and the cost is absurd. If you lose, lots of assholes on the internet will get a good laugh about how bitter you are and remind you about how you deserve this because you have a penis and women in Saudi Arabia are so terribly oppressed and therefore all men should be shamed and held responsible for the wrongdoings of others. I already lost my home, my education, my career, and damn near lost my son, shame me at your own risk motherfuckers. I will never gamble with any of those things again, unless it is for children and family and that is becoming increasingly unlikely as time progresses. I’m now 40. My goals in life are career, home, and family, and I must be secure in my person and my property before these things can reasonably be attained. My adherence to the social contract with every one of the rest of you is contingent upon these basic things, if you don’t care about me so be it, but be prepared to accept the consequences of that choice. We’re either in this together or we’re in it separately, and you can’t have your cake and eat it too. I’m not interested in money or power and will not be swayed by possessions, fancy vacations, spurious pastimes, or meaningless sex in lieu of home and family. Home and family is my non-negotiable condition, as career is dependent upon a non-recoverable education. Show me real commitment. Disposable marriage is not good enough. The commenter above was not wrong about the decay of society in this way, some of us simply will not accept anything else, the family is the foundation of society. It is not wise to take away people’s reasons for living. Want to see what happens to men with no sense of purpose or meaning and no respect for the social contract? Turn on the TV, they’re the ones that often make headlines. Nature behaves in similar ways when animal families are threatened. We will not accept the abrogation of family peacefully. JW I was married to a toxic narcissist for 18 years. I was previously married and did not want to fail again. Unfortunately, I found myself just eating the bad behavior, I was controlled by constant the constant threat of divorce, gaslighting and put downs. I was never going to be perfect enough and the list of imperfections that I was ordered to improve only got longer. I couldn’t keep up and I felt my life was hopeless and I was constantly walking on eggshells. Adding to it all, my husband had a drinking problem and when he was drinking he was even more verbally abusive, screaming and yelling and stomping around. After 9 years of no intimacy or sex, I threw in the towel. I couldn’t understand why he treated me the way he did when other men were attracted to me and would have liked to have someone who was loyal, attractive, didn’t spend money, didn’t drink, or party, do drugs, was spiritual and faithful. I tried so hard to be a good wife and I wasn’t perfect but I made so much effort. It was never enough for him. I went un-noticed. He tried to controll me by constantly threatening me with divorce. Needless to say, one day I had given in too long and was sick of my life and after one of his big threats, I filed for divorce. He was shocked and I have paid dearly in every way during our divorce. He continues to make my life miserable at every turn. Of course everything is my fault and he owns nothing. Here’s my advise to anyone that is in a toxic relationship. Educate yourself on what you are dealing with and pay attention. Protect yourself and arm yourself with knowledge. My childhood and family growing up were normal, everyday loving people. His family were alcoholics, dysfunctional and actually tried to literally kill each other. Somewhere along the line, he was damaged and continued the cycle of abuse. I did not come thru this 18 years unscathed. It will be a long road back to trusting my own judgement and building my self esteem. I can’t say that marriage is a bad institution, my parents have passed the test of 65 years of being together. I’ve never seen two people so in love. Learn to love yourself enough to save yourself. When it seems impossible, when you are down and depressed, turn it over to god and I promise he will hear you and give you the strength to get to the other side. Here’s to “having my life back and feeling alive again”. | Low | [
0.515513126491646,
27,
25.375
] |
using System.IO; using System.Threading; using MediaBrowser.Controller.Entities.Movies; using MediaBrowser.Controller.Providers; using MediaBrowser.LocalMetadata.Parsers; using MediaBrowser.Model.IO; using Microsoft.Extensions.Logging; namespace MediaBrowser.LocalMetadata.Providers { /// <summary> /// Class BoxSetXmlProvider. /// </summary> public class BoxSetXmlProvider : BaseXmlProvider<BoxSet> { private readonly ILogger<BoxSetXmlParser> _logger; private readonly IProviderManager _providerManager; /// <summary> /// Initializes a new instance of the <see cref="BoxSetXmlProvider"/> class. /// </summary> /// <param name="fileSystem">Instance of the <see cref="IFileSystem"/> interface.</param> /// <param name="logger">Instance of the <see cref="ILogger{BoxSetXmlParser}"/> interface.</param> /// <param name="providerManager">Instance of the <see cref="IProviderManager"/> interface.</param> public BoxSetXmlProvider(IFileSystem fileSystem, ILogger<BoxSetXmlParser> logger, IProviderManager providerManager) : base(fileSystem) { _logger = logger; _providerManager = providerManager; } /// <inheritdoc /> protected override void Fetch(MetadataResult<BoxSet> result, string path, CancellationToken cancellationToken) { new BoxSetXmlParser(_logger, _providerManager).Fetch(result, path, cancellationToken); } /// <inheritdoc /> protected override FileSystemMetadata GetXmlFile(ItemInfo info, IDirectoryService directoryService) { return directoryService.GetFile(Path.Combine(info.Path, "collection.xml")); } } } | Mid | [
0.6503667481662591,
33.25,
17.875
] |
Evelyn Peirce Evelyn Peirce (February 5, 1907 – August 9, 1960) was an American film actress during the silent film era, and into the 1930s. Biography Peirce was born in Del Rio, Texas, and moved to Hollywood as a professional stage dancer, and was spotted by talent scouts and encouraged to pursue an acting career in the mid-1920s. Her first role was in the 1925 film Excuse Me, which was uncredited. Her first credited role was that same year in Don't, which starred Sally O'Neil. She was also one of thirteen girls selected as "WAMPAS Baby Stars" in 1925, which included actress June Marlowe. Following being selected by "WAMPAS" she received a minor contract with Metro-Goldwyn-Mayer which lasted through 1931. From 1927 through 1931 Peirce starred in seven films, two of which were uncredited. She continued to act through 1935 after the end of her MGM contract, but only had one credited role out of six films during that period. She married actor Robert (Tex) Allen, and although he continued to act well into the 1980s, Peirce retired from acting. They had one daughter, Katherine Meyer, and a son, Ted Baehr, who chose to go by his father's birth name, and who is a well known media critic, as well as chairman of "The Christian Film and Television Commission", and publisher of MOVIEGUIDE. Allen and Peirce settled in Oyster Bay, New York, where they were residing at the time of her death at age 52 in 1960. References Sources Anderson, Chuck (October 3, 2008) "Columbia In Transition: Bob Allen and Jack Luden." The Old Corral (b-westerns.com), accessed October 25, 2008 Evelyn Pierce [sic], WAMPAS Baby Star, 1925 External links Category:American silent film actresses Category:American film actresses Category:Actresses from Texas Category:Actresses from Los Angeles Category:Disease-related deaths in New York (state) Category:1908 births Category:1960 deaths Category:People from Del Rio, Texas Category:20th-century American actresses Category:WAMPAS Baby Stars | Mid | [
0.6548148148148141,
27.625,
14.5625
] |
Contents Plot Chris is a 38 year old convict who has recently been released from prison. At a surprise party to celebrate Chris's release from prison Chris reunites with Carol, his former high school teacher, who was his pen pal during the 20 years he was in prison and helped with his release. After encountering him again outside a restaurant where he abruptly hugs her and gives her a portrait he made of her Carol begins to realize that Chris may have a crush on her though her own feelings for him are complicated as she is married with a teenage daughter. After Carol urges him to try to meet and socialize with other women, Chris bikes over to Carol's home and kisses her, confessing that he is in love with her. Despite her deep emotional connection to Chris, Carol insists that they should try to be friends. Returning home she approaches her husband, who now no longer sleeps in their bedroom, and tries to initiate sex, but he rejects her. Chris goes over for breakfast at Carol's and he, Carol and Carol's teenage daughter Hildy get along well though the mood is spoiled by the arrival of Carol's husband Tom. Chris also feels frustrated by the limitations of Carol's time, the fact that she is helping another convict get parole, his brother's betrayal by staying friends with the man who put him in prison, and his inability to find a job. Hildy becomes interested in Chris and befriends him. She is surprised to learn that he holds her mother in such high esteem and credits her with helping him get through prison. Despite her earlier words telling Chris that they can only be friends, Carol continues her emotional affair with Chris. Chris asks Carol to spend one day with him where the two of them can finally be free. They meet up for the day and go out to dinner and an arcade before going to a motel. They consummate their relationship with Chris and Carol confessing their love for one another. The following morning, leaving the motel, they are seen by Tom and Hildy. Tom attacks Chris who hits him in the shins before fleeing. Hildy disappears and is later found by Carol after some help by Chris. Carol apologizes for not paying enough attention to Hildy and prioritizing Chris though Hildy reassures her mother that she was able to make a difference in Chris's life. Carol admits that the relationship between her and Chris was a one time occurrence. Tom moves out of the family home, Chris gets a job, and Hildy breaks into Chris and his brother's home where she leaves an art sculpture which Chris recognizes as a sign of forgiveness. Carol goes to visit Chris and tells him that their goals are ultimately incompatible since he wants a simple life and she now craves a more fulfilling one. Nevertheless she asks Chris out on a date hoping that they will get to know each other as they are in the present to which Chris agrees. Critical reception Outside In received positive reviews from film critics. It currently holds a 95% approval rating on review aggregator website Rotten Tomatoes, based on 39 reviews, with a weighted average of 7.3/10.[11] On Metacritic, the film holds a rating of 76 out of 100, based on 15 critics, indicating "generally favorable reviews".[12] | High | [
0.6697038724373571,
36.75,
18.125
] |
Q: Dual boot : Ubuntu detects Windows Boot Manager instead of Windows 7 I am installing Ubuntu 14.04.4 LTS alongside Windows 7. Howewer, during installation it detects Windows Boot Manager instead of Windows 7 so I have an option : Install Ubuntu alongside Windows Boot Manager. Is it a problem or it is safe to proceed? Thank you very much for help! My partition table A: Yup, it's perfectly safe. I dualboot Windows 7 with Ubuntu 14.04 LTS as well. You get Windows Boot Manager because the boot partition of Windows was installed in another partition. (sda2 as shown in the picture below) Once you select the boot manager, it will ask you to select Windows 7 and then boot it up. | High | [
0.678378378378378,
31.375,
14.875
] |
After being outplayed on the first two days in Jaipur, Madhya Pradesh ended the third in a better position by restricting Rajasthan's first-innings lead to 123, and then setting up a strong second innings. They may now escape with a draw, and not suffer outright defeat. Fast bowler Ishwar Pandey and wicketkeeper-opener Naman Ojha made MP's recovery possible. Rajasthan were dismissed 379 due to Pandey's six-wicket haul, and then Ojha's unbeaten century took MP to 200 for 1 at stumps, ahead by 77. With the green wicket not offering much assistance to the bowlers, and without a quality spinner, Rajasthan may find it difficult to force a result on the final day. Pandey had taken four wickets on the second day, including those of stand-in captain Vineet Saxena, Ashok Menaria and centurion Rashmi Parida. He claimed two more on the third morning. Resuming at 306 for 6, wicketkeeper Sidhant Yagnik and Madhur Khatri began the day well for Rajasthan, hitting four boundaries in four overs. But then Pandey settled into a nagging line to left-hand batsman Yagnik, who edged one in the ninth over of the day to keeper Ojha. Before Rituraj Singh could get his eye in, Pandey put in some extra effort, and the additional bounce had Rituraj edging his delivery to Zafar Ali at second slip. Though Khatri, primarily in the side as an offspinner, played an effortless knock, he ran out of partners on 47 when Anand Rajan bowled last man Aniket Choudhury to earn his 100th first-class wicket. Rajasthan's lead wasn't a small one, especially with more than a day and a half remaining in the game. After a disastrous performance by MP's top order on the opening day, when they were reduced to 71 for 5 in the first session, the openers had to come good to earn one point. Ojha and Ali learnt from their first-innings mistakes to put on 134 before Ali was trapped lbw by Rituraj. Ojha, however, was the star of the day. In the first innings, he had poked at and edged a delivery that moved away from off stump. This time, Ojha didn't flash his bat outside off for the first hour. He preferred to leave as many balls as he could. Ojha didn't go into a shell either; he chose the balls he wanted to score off. Soon after he reached his fifty, he went after the part-time spinner Ashok Menaria, hitting two sixes over long-off and cutting to the point boundary. In the next over, however, Ali was dismissed. With Pankaj Singh and Rituraj steaming in, Ojha, batting on 78, defended for the next hour. Only in the last over of the day, when Khatri was brought on, did Ojha attack again. He stepped out to hit a six over long-off and then swept the next ball through square leg for a boundary to raise his ninth first-class century. "[Ojha] was terribly disappointed after being dismissed in that manner (in the first innings)," MP coach Mukesh Sahani said. "We had a chat about it. He realised that he hadn't justified his position of being among the senior players in the team by getting out in that manner. It was heartening to see him rectifying it." Despite playing first-class cricket for 12 years, Ojha has not fulfilled his batting potential "I haven't converted as many starts into hundreds as I should have but over the last few years, I have realised the need for scoring big hundreds and have been working towards it," Ojha said. "Since I came to the Ranji Trophy days after playing the Champions League [for Delhi Daredevils], it took time for me to switch into the first-class mode. But now that I have, I hope I can continue for the rest of the season." After stumps, most of the MP squad played a game of football until the light faded, unlike other days. Though the team had conceded three points with the first-innings lead, their relieved faces indicated that their primary objective at the start of the penultimate day - to avoid being in a position to concede an outright victory to Rajasthan - had been achieved. | Mid | [
0.582392776523702,
32.25,
23.125
] |
WASH interventions were typically community-based. WASH interventions were delivered to households and communities through community mobilization, mass media, home visits, and infrastructural development (126, 130, 136–138). There were some examples of facility-based delivery of WASH interventions, such as in health clinics and schools (139, 140); however, this was not representative of the majority of delivery platform coverage. Health clinic delivery platforms had limited reach, often targeting pregnant women and women with young children. In an evaluation of WASH interventions delivered in India (141), more demanding behavioral practices, such as handwashing and consistent use of latrines, required more intense contact (e.g., multiple home visits) than less intense interventions, such as sweeping of courtyards, that could be effectively delivered in small group meetings such as those in health clinics and community centers. More research is needed to evaluate the benefits and barriers of different delivery platforms for women across the life course. UN Women believe that violence against women "is rooted in gender-based discrimination and social norms and gender stereotypes that perpetuate such violence", and advocate moving from supporting victims to prevention, through addressing root and structural causes. They recommend programmes that start early in life and are directed towards both genders to promote respect and equality, an area often overlooked in public policy. This strategy, which involves broad educational and cultural change, also involves implementing the recommendations of the 57th session of the UN Commission on the Status of Women[146] (2013).[147][148][149] To that end the 2014 UN International Day of the Girl Child was dedicated to ending the cycle of violence.[112] In 2016, the World Health Assembly also adopted a plan of action to combat violence against women, globally.[150] A BMI of 25 to 29.9 is considered overweight and one 30 or above is considered obese. For an idea of what this means, a 5-foot 5-inch woman who weighs 150 pounds is overweight with a BMI of 25. At 180 pounds, she would be considered obese, with a BMI of 30. Keep in mind that the tables aren't always accurate, especially if you have a high muscle mass; are pregnant, nursing, frail or elderly; or if you are a teenager (i.e., still growing). Child marriage (including union or cohabitation)[91] is defined as marriage under the age of eighteen and is an ancient custom. In 2010 it was estimated that 67 million women, then, in their twenties had been married before they turned eighteen, and that 150 million would be in the next decade, equivalent to 15 million per year. This number had increased to 70 million by 2012. In developing countries one third of girls are married under age, and 1:9 before 15.[92] The practice is commonest in South Asia (48% of women), Africa (42%) and Latin America and the Caribbean (29%). The highest prevalence is in Western and Sub-Saharan Africa. The percentage of girls married before the age of eighteen is as high as 75% in countries such as Niger (Nour, Table I).[11][92] Most child marriage involves girls. For instance in Mali the ratio of girls to boys is 72:1, while in countries such as the United States the ratio is 8:1. Marriage may occur as early as birth, with the girl being sent to her husbands home as early as age seven.[11] Popular belief says if you really want to make a big change, focus on one new healthy habit at a time. But Stanford University School of Medicine researchers say working on your diet and fitness simultaneously may put the odds of reaching both goals more in your favor. They followed four groups of people: The first zoned in on their diets before adding exercise months later, the second did the opposite, the third focused on both at once, and the last made no changes. Those who doubled up were most likely to work out 150 minutes a week and get up to nine servings of fruits and veggies daily while keeping their calories from saturated fat at 10 percent or less of their total intake. | High | [
0.69047619047619,
36.25,
16.25
] |
Functional analysis of TolC homologs in Vibrio vulnificus. Gram-negative bacteria use tripartite pumps to transport antibacterial drugs and other toxic compounds across the inner and outer membranes, which are separated by the periplasmic space. The TolC protein is an outer membrane factor that participates in the formation of tripartite efflux pumps. The genome of Vibrio vulnificus encodes two E. coli TolC homologs, TolCV1 and TolCV2. Here, we show that both TolCV1 and TolCV2 are involved in the efflux of antimicrobial agents. Deletion of tolCV1 resulted in increased susceptibility of V. vulnificus to chemical detergents, DNA intercalating agents, and antibiotics including erythromycin, novobiocin, and tetracycline, whereas deletion of tolCV2 rendered V. vulnificus more susceptible to the above mentioned antibiotics only. We also observed that tolCV1 deletion resulted in reduced motility of V. vulnificus. Our results indicate active roles for TolCV1 and TolCV2 in the physiology of V. vulnificus. | High | [
0.6875,
33,
15
] |
? (a) m (b) 0.3 (c) 0.2 c Let i = -1/9 - -4/9. What is the nearest to -1 in -2, 0.3, i? -2 Let p = 0.6 - 0.7. Let i = 0.4 - 0.3. Let c = -0.4 - i. What is the closest to 1 in c, p, -0.3? p Let x be (-4)/((-16)/3) + 0. Let g = 0.5 - 0.6. Which is the closest to -1? (a) x (b) g (c) 1/4 b Let u = 19 - 27. Let q = u + 13. Let z = 13/30 + 1/15. What is the closest to z in q, -2/3, -2/9? -2/9 Let z = 859/40 + -108/5. Which is the nearest to -1/5? (a) z (b) 2 (c) -0.1 a Let y be (-1 - -1) + (-4)/(-14). Let w = -0.021 + -0.279. What is the closest to y in w, -5, -0.2? -0.2 Let j = -4 - -6. Let k be 10/(-9)*3/j. Let f = -0.6 - -1.6. What is the nearest to -1 in f, -2, k? k Let q = 25 + -24.8. What is the closest to 1/5 in 1/7, q, 4? q Let j = 0.07 + 0.73. Let g = j + -0.9. Which is the closest to g? (a) -1/7 (b) -2 (c) 3/5 a Let g = -2 + 1. Let q = -0.9 - g. Let p = q - 1.1. Which is the closest to -1? (a) 4 (b) p (c) -5 b Let x = -644/5757 + 2/303. Let m = -0.3 + 0.2. Which is the closest to 1? (a) x (b) 5 (c) m c Let v be -2 + (-2 - (-171)/(-6)). Let c = v - -33. What is the closest to 0 in 0, 0.1, c? 0 Suppose -2*z + 5 = 3*z - 3*s, -z + 23 = -5*s. What is the nearest to -1/2 in 0.3, z, -2/9? -2/9 Let r = 4 + -4. Let a be 2*3/18 + r. What is the closest to -0.1 in 5, 0.3, a? 0.3 Let k = 21 + -59/3. Let c = 2.57 + -1.57. Let n = -7 + 11. What is the closest to 1 in k, n, c? c Let k = -178.7 - -179. Let p = -16/3 + 170/33. Which is the closest to 0.7? (a) k (b) -4 (c) p a Let k be (4/(-21))/(6/(-9)). Which is the closest to 1? (a) k (b) 1/2 (c) -12 b Let s = -1.3 - -0.3. Let o = -124 + 1362/11. Which is the nearest to -1/4? (a) s (b) o (c) 2/7 b Let n = 57 + -60. Let y = 6 + -10. What is the nearest to -2 in y, n, 3? n Let o = -6 + 3. Let r = 40798675/161 - 253406. Let t = r - 54/23. Which is the nearest to -2? (a) o (b) 0.2 (c) t a Let s = 9.3 - 10. Let b = s - -0.3. Let g = 0.4 + -0.6. What is the nearest to g in b, -3, -0.2? -0.2 Let j = 29 - 29.1. Let f = 4.6 - -0.4. Let k be (-9)/16*4/3. What is the nearest to j in f, k, 0? 0 Let u be 0 - (1 - 18/10). Suppose o + 3*o = 2*q - 2, -5 = q + 4*o. Which is the closest to q? (a) 2/11 (b) 0.1 (c) u b Suppose 23 = 5*t + u, 3 = 3*t + 5*u - 2. Suppose 4*p = 3*r + 2*p + 2, -3*p + 4 = -t*r. Let v be -3 + 21/(-18)*r. What is the closest to 0 in 0.2, 3/5, v? 0.2 Let u be (-7)/(-6) - (-2 - 35/(-10)). Suppose -2*b + 5 = -3. What is the nearest to u in -2/7, 1, b? -2/7 Let d = -5 + 8. Let j = -48 + 45. Let m = d + j. Which is the nearest to 0? (a) -2 (b) m (c) -4 b Let u = -101/3 - -33. Let h = 8 + -9. Which is the nearest to h? (a) -3 (b) 4 (c) u c Suppose -3*a + 5*b - 3*b - 20 = 0, -5*b = 4*a - 4. Let z = 2/7 - 3/35. What is the nearest to 2 in -1/7, z, a? z Let h = -0.3 - 0.2. Let k = -2.5 + 8.8. Let s = k + -6. Which is the nearest to -2/3? (a) -3 (b) h (c) s b Let q = 1.2 + -0.3. Let x = 3 - 2. Let c = x - q. What is the nearest to c in -0.3, 5/3, 3? -0.3 Let p be (-49)/(-42) + (1 - 21/18). Which is the closest to -1/4? (a) -5 (b) p (c) -9 b Let g(l) = -l**3 + 1. Let q be g(-1). Suppose -q*i - j - 6 = j, -2*j = -2*i + 6. Let y be 2*(-1 - (-16)/18). Which is the nearest to -1? (a) i (b) 3 (c) y c Let w = 44 - 43.8. Which is the closest to w? (a) -4 (b) -0.5 (c) -5 b Let t = 25 - 25.2. Let o = -0.5 - t. Which is the nearest to -2/3? (a) -1/8 (b) -0.2 (c) o c Suppose -9*t + 10*t = 5. Which is the closest to -0.1? (a) -5 (b) t (c) 2/5 c Let k(l) be the first derivative of -l**4/4 - 7*l**3/3 + l**2/2 + 10*l - 4. Let p be k(-7). Which is the nearest to 1? (a) p (b) 2 (c) -1/3 b Let c = -0.08 - -5.08. Let p(x) = x**2 + 6*x + 4. Let t be p(-5). What is the nearest to t in -1/4, 0.4, c? -1/4 Let i = 0.01 - 0.11. Let w = 4.04 + -0.04. What is the nearest to -0.1 in w, 5, i? i Let v = 35 + -176/5. Let o = -2.1 + 0.1. Let h = 0.39 + 0.11. What is the nearest to o in -0.1, h, v? v Let m = -16 + 14. What is the nearest to m in 3, 1/3, -2/13? -2/13 Suppose 4*g = 4 + 36. Let o be g/4*(-246)/(-4). Let i = 153 - o. Which is the nearest to 0? (a) -3 (b) i (c) 0.3 c Let s = 12 + -12.4. Let p = 1883/9 + -209. What is the closest to -0.1 in s, p, -1/2? s Let m = 0.37 + 1.63. Which is the nearest to -0.1? (a) 1 (b) 5 (c) m a Let r be (-15)/595 - (-4)/28. What is the closest to 0.1 in 3, 4, r? r Let x(i) = -i**2 + i + 1. Let d be x(3). Let j be ((-15)/(-12))/((-8)/(-32)). What is the nearest to -0.1 in d, -1, j? -1 Let s(i) = -i**2 - 2. Let u = 11 - 11. Let d be s(u). Let q = 4 + -5. Which is the closest to -0.1? (a) d (b) -4 (c) q c Let i = 1 + 2. Let r = 26 + -29. What is the closest to i in 0.1, -2/11, r? 0.1 Let b(l) = -3*l - 6. Let w be b(-4). Let q(g) = -g**3 + 7*g**2 - 6*g - 6. Let t be q(w). Let z be ((-4)/(-10))/(t/(-5)). What is the closest to 1 in 0, z, 0.2? z Let i = 7.3 + -7. Let q = -0.2 + i. Let g = 1.03 + -1.43. Which is the nearest to q? (a) g (b) 3 (c) -0.2 c Let v be 4/10 - 132/180. Let t = -8 - -8.5. What is the nearest to v in 1, -2/9, t? -2/9 Let i(h) = h**2 + 9*h + 9. Let o be i(-7). Suppose d + 2 - 1 = 0. Let x be (4/(-6))/(d/3). What is the closest to 0 in 1/9, o, x? 1/9 Let z = 9 - 16. Let w = z + 8. What is the closest to 0.1 in -2, -0.5, w? -0.5 Let s be (6/(-32))/((-3)/(-12)). Let g be -2 + ((-60)/(-9))/5. What is the closest to 0 in s, g, 3? g Let j = 7 + -6.6. Which is the nearest to 2/3? (a) -0.5 (b) -3 (c) j c Let i be 4/(-6)*(-12)/16. Let d(p) = p**3 + 5*p**2 + 1. Let s be d(-5). Let o = -18 + 13. Which is the nearest to s? (a) 2 (b) o (c) i c Let t = -6 + 15. Let v = t + -13. Which is the nearest to v? (a) 0.2 (b) -2 (c) -0.2 b Let w be (-1 - (-36)/(-17)) + 3. Let q = w + -13/34. Which is the nearest to 0? (a) 5 (b) 1/3 (c) q b Let q = 0.2 + -0.2. Let p(r) = -r**3 + 7*r**2 + 9. Let j be p(7). Let i be ((-1)/4)/(j/(-24)). Which is the nearest to q? (a) i (b) 2/7 (c) 2/9 c Let u be 2 + 299/5 + -2. Let q = u - 60. What is the closest to -2/7 in 1/8, 1/7, q? q Let g be ((-2)/5)/(-2) + 2 + -3. Which is the nearest to 1? (a) 0.2 (b) -0.4 (c) g a Let z = 0.1 + -0.3. What is the nearest to 2 in 3, z, -0.4? 3 Let q = -8 + 7.7. Let n = 3 - 2.7. Let x = -0.7 - n. Which is the nearest to x? (a) q (b) -2/5 (c) 0.1 b Let f = -0.08 - -2.08. Suppose b = -b - 6. Let g be b - (3 - (-52)/(-9)). What is the closest to g in 3, -0.1, f? -0.1 Let i(n) be the third derivative of n**5/20 + n**3/6 + n**2. Let d be i(1). Suppose d = -g + 2*g. What is the closest to -1/3 in g, 0.5, 2? 0.5 Let l = 2 - 1. Let b = -1.1 + l. Let a = b + -0.4. What is the closest to 1/4 in -2/3, -4, a? a Let o = 9 + -7. Let v be (o/16)/((-2)/12). Which is the closest to -1? (a) 4 (b) v (c) -4 b Let z = -2 + -3. Let g = z + 4.6. Let h be 5 - ((-16)/(-4) + -1). Which is the nearest to h? (a) g (b) -0.1 (c) -3 b Let g = -24 - -24.4. Which is the closest to 1? (a) g (b) 1/3 (c) -4 a Let w = -10/13 + 1/52. Which is the nearest to 1? (a) 1 (b) w (c) -0.1 a Let c = 2.9 + -3. Let u = -69 - -69.5. What is the nearest to c in -0.4, u, -0.3? -0.3 Let v = -2.98 + -0.02. Let t = -2.5 - v. Which is the nearest to 0? (a) t (b) -0.2 (c) 0.4 b Let a = -673/4 + 168. What is the nearest to a in 0, -1, 2.2? 0 Let i = 1/162 + 319/810. Let j = 152 + -757/5. Which is the closest to i? (a) j (b) -4 (c) -5 a Let j = 0.9 + -0.6. Suppose 0 = -4*f - 3*a - 22, 3*f + a + 5 = -9. What is the nearest to -0.1 in 2/15, j, f? 2/15 Let d = 8 - 6. Let g = 192/505 + 2/101. What is the closest to d in 5, -2/5, g? g Let s = 2.1 - 2. Let y = s - 0. Let p = -0.2 - 0.3. What is the nearest to y in p, 0, 4? 0 Let g = 2.34 - 3.31. Let m = g + -0.03. Suppose 0 = 5*d - d - 4*k, -40 = 5*d + 5*k. What is the closest to -3 in d, m, 1? d Let y = -22 + 21. Which is the closest to -0.06? (a) -2 (b) y (c) -2/9 c Let q(v) = -v + 1. Let o be q(2). Let u be 2/(-3 + o - 1). Which is the nearest to -1? (a) u (b) 0.4 (c) 2 a Let z = -13/36 + 1/9. Suppose -5*a = -175 + 185. Let l = -0.1 + 0.2. What is the closest to l in z, -4/7, a? z Suppose y + 3 = -4*p, -2*p + 1 = 5*y - 2. Let f = -52 + 52.2. Which is the closest to p? (a) 4 (b) f (c) 0.1 c Let h be (-562)/1400 + (-1)/(-3). Let c = | Low | [
0.467065868263473,
19.5,
22.25
] |
import { Template } from 'meteor/templating'; import { UIComponents } from '/client/imports/modules'; import './add_user_options.html'; Template.customData.onRendered(() => { UIComponents.Editor.initializeCodeMirror({ divSelector: $('#divCustomData'), txtAreaId: 'txtCustomData' }); }); Template.roles.onRendered(() => { UIComponents.Editor.initializeCodeMirror({ divSelector: $('#divRoles'), txtAreaId: 'txtRoles' }); }); | Low | [
0.520987654320987,
26.375,
24.25
] |
Q: May a college remove a degree plan without letting students graduate without that degree? I attended an art school that is part of the UT System, and they removed my degree plan a year after I joined and started removing the classes required to graduate. They informed that I would be able to finish my degree even with the changes, but this wasn't true. Myself and other students in this major were told to take unrelated classes which would count as credit towards that major. Is this allowed? A: As an academic, I have seen a number of departments close and degrees discontinued and renamed. In every case I am aware of, these changes were slowly phased in/out. There is clearly a legal question about the liability of a university that chooses to discontinue a degree and not fulfill its obligation, but that is not what your university is doing (at least from what I can tell). You are earning an unaccredited degree meaning the exact courses are not prescribed by an outside governing body. The university has stopped offering courses you want to take, but is still allowing you to satisfy the degree requirements. No university promises to offer particular courses and further, they do not guarantee that students will even be able to take all the elective course they want to take. So in answer to your question, if you were admitted to a degree program and the university stopped offering the degree, they might be liable and you might be able to get damages. Your university is not doing that. | Mid | [
0.5754475703324801,
28.125,
20.75
] |
Phyisicists created atom-thin sheets of silicon - and named the new material Silicene. The idea to create such sheets from Silicon emerged in 2007 - even though silicon doesn't naturally form the required atomic bonds. Silicene has a similar pattern to Graphene and possibly has the same electronic properties and might have advantages of Graphene because silicon is more integrateable into today's electronic devices. The Silicene was created by growing a thin layer of silicon on top of a ceramic material called zirconium diboride. X-rays shined on this thin layer of silicon revealed a honeycomb of hexagons similar to the structure of graphene. | Mid | [
0.65,
32.5,
17.5
] |
Mexico nabs drug suspect wanted in Tijuana battles Marine soldiers escort Filiberto Parra Ramos, known as "La Perra", alleged member of the Arellano Felix drug cartel during his presentation to the media in Mexico City, Thursday, June 11, 2009. Ramos was arrested Wednesday in the northern city of Tijuana. (AP Photo/Alexandre Meneghini) — AP Marine soldiers escort Filiberto Parra Ramos, known as "La Perra", alleged member of the Arellano Felix drug cartel during his presentation to the media in Mexico City, Thursday, June 11, 2009. Ramos was arrested Wednesday in the northern city of Tijuana. (AP Photo/Alexandre Meneghini) / AP MEXICO CITY Mexican soldiers captured a suspected cartel member accused of killing two federal agents and leading bloody battles for smuggling routes in the northern city of Tijuana, authorities said Thursday. Jose Filiberto Parra Ramos appears in a U.S. Drug Enforcement Administration poster of 10 men it believes have been locked in a violent power struggle since a split in the Arellano Felix cartel last year. Soldiers captured Parra and three other drug suspects Wednesday in Tijuana using unspecified intelligence, the Defense Department and the Attorney General's Office said in a statement. The department said Parra is allied with Teodoro Garcia Simental, who is believed to be waging a bloody battle against reputed Arellano Felix cartel leader Fernando Sanchez Arellano, reputed heir to the Arellano Felix cartel. Masked soldiers led a handcuffed and scowling Parra off an airplane that landed in Mexico City from Tijuana, and paraded him in front of reporters at the airport. Parra led a group of armed men an April 2008 battle between the sides that left 13 people dead, the statement said. He also allegedly killed two federal police agents whose bodies were found at a ranch in the Baja California state town of Tecate that same month. According to Mexican authorities, Garcia left after the April 2008 battle to join forces with the powerful Sinaloa cartel and returned to Tijuana with a vengeance in September, sparking more than three months of intense bloodshed. The Defense Department says battles between the two gangs last year left 749 people dead. The army almost caught Parra twice at parties early this year, Gen. Alfonso Duarte Mugica, the top army commander in Tijuana, told The Associated Press in February. At a three-day bash in January, Parra and Garcia, known as "El Teo," barely escaped onto a beach. Instead, soldiers found Santiago Meza Lopez, nicknamed the "Pozole Maker," after a Mexican stew, because he is accused of disposing hundreds of bodies by disolving them in a corrosive material. Parra and another suspected trafficker, Reydel Lopez Uriarte, were close with Garcia but stayed on good terms with Sanchez Arellano after Garcia fled Tijuana last year, Duarte Mugica said. When Garcia returned to Tijuana in September, they joined him. Mexico has captured several high-profile cartel suspects since President Felipe Calderon launched a national crackdown on cartels in 2006 by sending troops to Michoacan, his home state. But drug violence has surged, claiming more than 10,800 lives since. On Thursday, gunmen opened fire and tossed a grenade at a crowded taco stand in the central Mexican city of Uruapan, killing a police officer and a 15-year-old boy, a spokesman for the state prosecutor's office said n condition of anonymity because his office does not allow him to give his name. The policeman was shot while eating with a fellow officer, the spokesman said. Before fleeing, the assailants shot two tanks of cooking gas that exploded, burning the teenage taco stand worker to death. Four other people were injured. | Low | [
0.505175983436853,
30.5,
29.875
] |
Homebrewed Christianity Neo-Orthodoxy: Old School Theology pt.4 Neo-Orthodoxy originated as a retrieval of orthodox Christianity that gained insight through critical engagement with liberalism. What initially connected its founding figure heads Rudolf Bultmann and Karl Barth was the reframing of biblical authority for Christian theology. Barth, Bultmann, and the prominant American voice Reinhold Neihbur share a strong attraction to the work of Soren Kierkegaard but where they each took his philosophical insights differed. Each figure is somewhat responsible for different theological schools that developed later, but that is for another day. Here are the identifying makers I got, let me know if they will work for early Bultmann and Barth. – A profound sense of the radical transcendence of God, the Holy Other; The primacy of the initiative of God in divine revelation, the action of God in self-disclosure over against Liberalism’s human experience or discovery – The affirmation of the incarnation of God in Jesus Christ, accentuating the cross and resurrection (without the necessity of the virginal conception) – The authority of the Bible as the indispensable witness to God’s revelation, but ‘infallibility’ rejected historically (because of the results of historical criticism) and theologically (because of the humanity of the Bible) – The frank acknowledgment of radical evil, doctrinally conceived as ‘original sin’; “I am the adam of my own soul” – The acceptance of a nondoctrinaire biblical criticism and the revolutionary findings of modern science – A vision of reconciliation that locates the individual in society in relation to all societal structures | Mid | [
0.655,
32.75,
17.25
] |
Experts in alternative cancer treatment have been warning cancer patients for decades that they need to give up all sugar. And sugar's role in diabetes is so well known it goes without saying. Now these views are going mainstream in a way I've never seen before. We're still a long way from seeing either the government or the medical establishment condemn sugar and warn the public to avoid it. But a few voices are being raised. In ten years I suspect most people will think of sugar about the same way they think of smoking. The day is coming. What prompts this thought is an article entitled "Is Sugar Toxic?" that appeared in the New York Times Magazine the Sunday before last (April 17). It's one thing for us "wackos" in the alternative cancer field to rant against sugar. But when an article like this appears in an establishment newspaper, quoting establishment medical doctors and scientists, it means there's real progress. But that's not what I found most interesting, this is... I was shocked by what I didn't know about sugar! Continued below. . . These Doctors Were Forced to Admit This "Crazy" Treatment Plan Works Rev. Cobus Rudolph's doctor told him, "Congratulations! You're cancer free!" That was six months after the same doctor had told him his case was hopeless and he should prepare to die. Rev. Rudolph saved his own life, at home, thank to a book by cancer expert Ty Bollinger. Richard Wiebe's doctor told him, "You're a miracle from God!" Just a year earlier the same doctor told Richard he'd be dead in six months from terminal brain cancer. Richard treated himself with the tips and secrets Ty Bollinger recommends. Kevin Irish's doctor was shocked. He asked Kevin, "Are you the terminal patient I saw two months ago? You look great!" Kevin saved his own life when he found Ty Bollinger's book on the Internet and started following the advice. Frank Woll's doctor was stubborn: "Well, I know the cancer is here somewhere!" But the doctor couldn't find Frank's cancer with a magnifying glass. Only a month earlier, the same doctor had told Frank they'd have to cut off half his ear and part of his neck! These four men got TOTALLY WELL with Ty Bollinger's secrets. Now, Cancer Defeated is proud to publish them in a new Special Report. Click here and discover an effective, cheap, at-home plan to get rid of almost any cancer in one month. The Times article taught me some new things about sugar's dangers that I didn't know. And that's saying something, considering how much I read about the subject. The new developments are by far the worst news about sugar I've ever seen. If you take heed, this news could save your life. The evidence indicates sugar is not just another food. It's a uniquely toxic, poisonous substance. It does strange things in and to the body. Sugar doesn't just feed cancer. There's every sign sugar actually causes cancer — as well as obesity, heart disease, high blood pressure and diabetes. Cancer Defeated has written frequently on the fact that all these problems are really one problem, but we didn't know the exact mechanism. Now the big picture is coming clear. And as far as I know, authorities in alternative cancer treatment have missed this new angle. Here's what happened. . . Among alternative cancer experts, it's well known that cancer cells consume vast amounts of sugar — far more than healthy cells do. That's why we tell cancer patients not to eat any sugar at all. Healthy people should eat as little as they can. A well-known cancer treatment, insulin potentiation therapy or IPT (see Issue #33), is entirely based on cancer's hunger for sugar. So is a mainstream medical test, the PET scan, in which a patient is injected with radioactively-tagged sugar, because the sugar will concentrate where cancer cells are found, causing the cancer cells to light up the scan like a Christmas tree. So there's absolutely no doubt that cancer feeds on sugar. In spite of that, few conventional cancer doctors will tell a patient to give up sugar. Most insist that what you eat makes no difference at all to your chances of beating cancer. That's why the New York Times article is surprising. Alternative cancer experts are ahead of the mainstream on this important subject. But anybody can get too absorbed in his own little field, and maybe that's what happened. Those of us who research and write about alternative treatments have been totally absorbed with the way cancer cells metabolize sugar, but it turns out the real story is how a healthy body metabolizes sugar. Cutting through the myths and debunking the urban legends Some experts will tell you that sucrose — granulated table sugar — is a bit healthier than high fructose corn syrup (HFCS), the sweetener found in sodas and almost every manufactured, processed food — even bread. These experts believe HFCS is the devil that's the source of many problems. Other experts will tell you that fruit is completely healthy, even though it's high in fructose. And still others will tell a cancer patient that a carb is a carb is a carb, i.e. the digestive process turns all carbs -- potatoes, white rice, fruit, granulated sugar AND HFCS -- into blood sugar (glucose), so you need to cut back or cut out all these foods. These experts say not just sugar but ALL carbohydrates feed cancer. It turns out all of these beliefs are off the mark or even dead wrong. First, take the idea that granulated sugar -- sucrose, made from sugar cane or beets -- is different from HFCS. Wrong. They're essentially the same thing. Each is roughly half glucose and half fructose. It's the fructose that does the harm, as I'll explain shortly. Because health food advocates have created a storm about HFCS the last few years, some food manufacturers are switching back to cane sugar/sucrose and touting their products as "fructose free". In this case, the health nuts are wrong. It makes no difference. I was disappointed to learn that fresh fruit MAY be a problem for cancer patients. It's high in fructose, the type of sugar the body has trouble metabolizing. Several years ago, I started making the switch from a typical American diet to a diet high in raw foods. Fresh fruit was a large part of my new eating plan, because I like it. Now I have to tell you, if the new findings hold up, fresh fruit probably isn't a good idea for cancer patients. You should definitely eat fresh, raw foods — but those foods should be vegetables. Fruit consumption should be low to moderate. I'm basing this on the new theory. As yet, there's not much clinical evidence. But if you're fighting cancer, play it safe. Fruit IS rich in vitamins, minerals and many other phytonutrients (nutrients found in plants). If you cut out fruit you'll need to take appropriate supplements. An example would be wine, which some people think is a health food. It's not. It's a megadose of sugar, even if it does contain some valuable nutrients. But you can get some of the benefits of wine by taking resveratrol supplements. Use moderation, take small steps If you don't have cancer, I believe moderate fruit consumption is still a good idea. But don't do what I did for several years and make fruit a huge part of your diet. I believed and hoped it was a healthy way to keep indulging in sweets. Bad idea. By eating fruit, I was taking in tons of antioxidants, bioflavonoids and other good things, but also tons of fructose. One thing fruit has going for it is that the fructose comes packaged with a large amount of fiber. Fiber fills you up, and has many other benefits too numerous to cover here. If you're in the habit of living on sodas, cakes, cookies and doughnuts, it's not likely you'll ever eat enough fruit to even touch the amount of sugar you get from these processed foods. That means switching from these sugary foods to fresh fruit is a huge step in the right direction. A switch to no sweets at all is probably more than most people can handle. So, as long as you don't have cancer, a switch to fresh fruit is a good first step. But if you do have cancer, my view is that you need to stop EVERYTHING that contains either fructose OR sucrose. Now for a good word about a few carbs. . . To continue with the myth-debunking, the good news is that potatoes, rice and similar carbs may not be so bad. These contain neither sucrose nor fructose. The body breaks them down into glucose, the same kind of sugar that circulates in your blood. All of your cells can directly utilize glucose with a minimum of effort. This type of sugar — this type of carb — puts the least strain on your body. The new theory is that fructose puts a unique, one-of-a-kind strain on the body that may be THE key to heart disease, diabetes, high blood pressure, obesity and cancer. If this theory is true (and it sure looks to me like it is), then potatoes and rice aren't strongly implicated in these degenerative diseases, even though they're carbohydrates. I don't recommend binging on these safer carbs, but it's okay to eat moderate amounts — very moderate, if you're a cancer patient. Wheat is another story. Like rice and potatoes, wheat products are metabolized into glucose and seem to belong in the category of comparatively "safe" carbs. But allergy to wheat is so widespread in our society, I recommend giving it up anyway. I don't want to digress here on the many dangers of wheat. I'll just say that if you suffer from ANY chronic disease — from arthritis to heart disease to indigestion — avoid wheat. Try giving it up for a few months. There's a good chance your medical problems will diminish or completely disappear. One hundred calories doesn't equal one hundred calories One of the dearly held beliefs of weight loss experts is that one calorie equals another. If you want to lose weight, it's a matter of calories in, calories out. If you don't burn up every calorie you eat, the excess is added to your flab. If you want to lose a pound of weight, you have to burn up 3,500 more calories than you eat — and it doesn't matter if the calories you give up are fats or carbohydrates, steaks or chocolate cake. You're not going to lose the pound until you eat 3,500 fewer calories. The new theory casts serious doubt on this old belief. One calorie isn't just like another. A hundred calories from fructose are NOT like a hundred calories of protein or even glucose, the kind of sugar your body's cells can take in directly. There's something different about fructose. I'm going to briefly explain what it is. If you have a taste for science and you'd like to know the details, check out a 90-minute Youtube lecture by an M.D. named Robert Lustig, Professor of Pediatrics at the University of California, San Francisco. Dr. Lustig is an expert on child obesity and a leading critic of sugar — both table sugar and HFCS — because both these sugars basically come down to fructose. He's the source of most of what was in the New York Times Magazine article and most of what I'm telling you here. He didn't conduct the scientific studies himself, but he's a very effective speaker and he passionately believes sugar is a poison. He actually uses the word "poison" 13 times in his lecture. You can quickly find his talk by Googling "Sugar: The Bitter Truth". The two-minute explanation of how fructose messes you up The quick summary is that, unlike glucose, fructose has to be metabolized in the liver by way of a very complex and inefficient process. Your digestive system quickly breaks down a potato or a grain of rice into glucose, the "good" sugar. The glucose then passes through your intestinal wall into your bloodstream, and your cells are able to take it up and "eat it" with no problem. Not so with fructose. Your liver has to convert fructose into glucose, the food your cells can take up. It's about like trying to turn a bowl of fish soup into a fish. The resulting process is so complex it puts a great strain on the liver. And here's the thing researchers say is key: 30 percent of the fructose is converted into fat and stays in your liver. The growing load of fat in your liver causes disastrous damage over a period of many years. It appears to be the main cause of "metabolic syndrome" or "insulin resistance syndrome" — the breakdown in your insulin system that leads to heart disease, diabetes, hypertension — and cancer. Glucose good (sort of), fructose bad (definitely) If you eat "good" glucose-generating carbs, only one calorie out of five is stored in the liver. What's more, it's stored in a harmless form called glycogen. Your liver can store any amount of glycogen without getting sick. When you eat fructose, three calories out of five are stored in the liver — three times as many as when you eat glucose. And the fructose calories are stored in the liver as a highly toxic fat. The researchers in the field believe this accumulation of toxic fat in the liver is THE cause of the chronic degenerative diseases such as cancer and heart disease. Fructose is a dietary catastrophe According to Dr. Lustig, eating a high-fructose diet is effectively like eating a high-fat diet. That means you can think you're following a so-called low-fat diet when you really aren't at all. For more than 30 years, conventional medicine has told us to cut way back on fats for a healthy heart. Eat all the carbs you want, they've told us, eat all the pasta you want, but give up fats, especially saturated fats like those found in beef or butter or even guacamole. In his lecture, Dr. Lustig provides persuasive evidence that this advice is all nonsense. You can eat a very low fat diet, but if you eat a lot of sugar — and Americans eat MASSIVE amounts of it — you'll still get fat. You'll still have an unhealthy heart and unhealthy arteries, you'll have hypertension, and very likely you'll get diabetes or cancer. You can eat and eat and still feel hungry Fructose has another oddity: You can eat a huge amount of calories and still feel hungry. Dr. Lustig says a kid can drink a Coke containing 200 calories and still go into McDonald's raving hungry and eat a heaping plate of food. The reason is that fructose does not suppress ghrelin, the "hunger hormone." When you're hungry, your stomach and pancreas secrete ghrelin, and this hormone signals your brain that you need to eat. You feel hungry. Once you've eaten, ghrelin production falls off and you don't feel hungry anymore. Unless you've eaten fructose. Ghrelin levels don't go down after consuming fructose, according to Dr. Lustig. You still feel hungry even though you've taken on board a huge dose of calories. It gets worse. Most food stimulates the body to produce leptin, a chemical that signals the brain you've had something to eat. According to Dr. Lustig, this response fails to occur if the food is high in fructose. Your brain never gets the message you're full. Fructose is a likely answer if not THE answer. There are other factors involved — certainly toxic chemicals and heavy metals, in the case of cancer. But fructose looks more and more like a major explanation for our problems. I'm convinced we'd see a rapid increase in health and well-being in our society if every gram of sugar disappeared tomorrow, for good. Instead, we eat five times the amount of fructose people ate a hundred years ago. And most of their fructose calories were from fruit. Most of ours are from the pure junk, like mainlining heroin. Here's a thought form the New York Times article: "One of the diseases that increases in incidence with obesity, diabetes and metabolic syndrome is cancer. . .The connection between obesity, diabetes and cancer was first reported in 2004 in large population studies by researchers from the World Health Organization's International Agency for Research on Cancer. It is not controversial." (We wrote about the diabetes-cancer connection in issue #35.) The Times also quotes Craig Thompson, President of the Memorial Sloan-Kettering Cancer Center in New York. While the article does the usual song and dance that we need more studies (and it's true; we do), Dr. Thompson dropped this bombshell: "I have eliminated refined sugar from my diet and eat as little as I possibly can, because I believe that ultimately it's something I can do to decrease my risk of cancer." This comes from the very heart of America's cancer establishment. If the world's leading enemies of alternative medicine are saying this. . .well, you do the math. I'll testify to the addiction bit, based on personal experience. Sugar is incredibly hard to give up. My own weakness is pastries, not candy or sodas. But when I was a child, I did drink soda by the gallon. Popcorn or pizza were unthinkable without a soft drink. To this day, I find sweets the most satisfying foods. But don't look for the FDA or other authorities to get excited about the addiction problem. They don't have a long-term orientation. And warning the public about sugar would be like admitting that nutrition matters — that alternative health experts have been right all along. Everyone knows alcohol is a toxin because it immediately affects the brain. There's no mistaking it. It's an "acute toxin." When you've had a drink you feel it within minutes, and hopefully you have enough sense not to drive. But fructose is what Dr. Lustig calls a "chronic toxin," and the FDA and other authorities have no interest in those. They don't look at long-term effects. Most people know that excessive, long-term use of alcohol damages your liver. But that's not the reason it's so heavily regulated. The government is all over alcohol because of what it does to you within 20 minutes, not 20 years. But, says Dr. Lustig, a can of Coke is as bad for your liver as a can of beer in terms of the number of calories that hit your liver, and the stress the beverage puts on the organ. Soda belly, he says, equals beer belly. The difference between an "acute toxin" and a "chronic toxin" is crucial. If you cut fructose out of your life, I'm confident you WILL see results, but not overnight results. This is a long-term issue. Most of us have been wrecking our health for as long as we've been on the planet — starting with sugary baby formulas and going on from there. You have to give a sugar-free diet several months at least — and no "little treats" to reward yourself (you know what I'm talking about.) I'd say give it six months or a year. And better yet, combine it with a good supplement plan and a big increase in healthy vegetables (preferably uncooked) and oils. Kindest regards, Lee Euler, Publisher If you’d like to comment, write me at [email protected]. Please do not write asking for personal advice about your health. I’m prohibited by law from assisting you. If you want to contact us about a product you purchased or a service issue, the email address is [email protected]. Health Disclaimer: The information provided above is not intended as personal medical advice or instructions. You should not take any action affecting your health without consulting a qualified health professional. The authors and publishers of the information above are not doctors or health-caregivers. The authors and publishers believe the information to be accurate but its accuracy cannot be guaranteed. There is some risk associated with ANY cancer treatment, and the reader should not act on the information above unless he or she is willing to assume the full risk. Reminder: We're the publishers of Natural Cancer Remedies that Work, Adios-Cancer, Cancer Breakthrough USA, Missing Ingredient For Good Health, German Cancer Breakthrough and How to Cure Almost Any Cancer for $5.15 a Day. You're getting this email because you purchased one of these Special Reports and gave us permission to contact you. From time to time we'll alert you to other important information about alternative cancer treatments. If you want to update or remove your email address, please scroll down to the bottom of this page and click on the appropriate link. To ensure delivery of this newsletter to your inbox and to enable images to load in future mailings, please add [email protected] to your e-mail address book or safe senders list. | Mid | [
0.561797752808988,
31.25,
24.375
] |
Sunflowers is a genus of plants comprising about 70 species in the family Asteraceae. Except for three species in South America, all Helianthus species are native to North America. The common name, “sunflower,” also applies to the popular annual species Helianthus annuus, the common sunflower. This and other species, notably Jerusalem artichoke (H. tuberosus), are cultivated in temperate regions as food crops and ornamental plants. The genus is one of many in the Asteraceae that are known as sunflowers. It is distinguished technically by the fact that the ray flowers, when present, are sterile, and by the presence on the disk flowers of a pappus that is of two awn-like scales that are caducous (that is, easily detached and falling at maturity). Some species also have additional shorter scales in the pappus, and there is one species that lacks a pappus entirely. Another technical feature that distinguishes the genus more reliably, but requires a microscope to see, is the presence of a prominent, multicellular appendage at the apex of the style. Sunflowers are especially well known for their symmetry based on Fibonacci numbers and the Golden angle. There is quite a bit of variability among the perennial species that make up the bulk of the species in the genus. Some have most or all of the large leaves in a rosette at the base of the plant and produce a flowering stem that has leaves that are reduced in size. Most of the perennials have disk flowers that are entirely yellow, but a few have disk flowers with reddish lobes. One species, H. radula, lacks ray flowers altogether. | Mid | [
0.64587973273942,
36.25,
19.875
] |
Pseudomonas simiae Pseudomonas simiae is a Gram-negative, catalase- and oxidase-positive, rod-shaped bacterium isolated from monkeys (Callithrix geoffroyi). The type strain is CCUG 50988. References External links Type strain of Pseudomonas simiae at BacDive - the Bacterial Diversity Metadatabase Category:Pseudomonadales Category:Bacteria described in 2006 | Mid | [
0.653465346534653,
33,
17.5
] |
Please be advidsed that there is not threat to public safety. Three additional suspects have been taken into custody in connection to the attack on the Boston Marathon. Aside from the aforementioned, there is no additional info to release at this time. Additional details will be provided when they become available. No info available at this time relative to a press conference. Possible obstruction of justice charges for two suspects: Sources tell @briantoddcnn two students are going to be charged with obstruction of justice connected to #Boston bombing. More from Boston.com on two men allegedly connected to the Tsarnaev brothers who are in custody for immigration violations: Two Kazakh men associated with the alleged Boston Marathon bombers went before a federal immigration judge this morning on allegations they violated their student visas. The men were detained for civil immigration violations after authorities questioned them about their possible connection to Tamerlan and Dzhokhar Tsarnaev, who allegedly detonated two bombs at the Boston Marathon last month, killing three people and injuring more than 200. The brothers also allegedly murdered MIT Police Officer Sean Collier. The two men, Dias Kadyrbayev and Azamat Tazhayakov, came to America from the Central Asian nation to study at the University of Massachusetts at Dartmouth, where Dzhokhar Tsarnaev was also enrolled. | Mid | [
0.592,
37,
25.5
] |
--- author: - 'Ting. Lan,' - 'Jian. Liu,' - 'Hong. Qin,' bibliography: - 'reference1.bib' title: 'Preference$-$based performance measures for Time$-$Domain Global Similarity method' --- Introduction {#sec:intro} ============ To guarantee the availability and reliability of data source, a general-purposed Time$-$Domain Global Similarity (TDGS) method based on machine learning techniques has been developed, which sorts out the incorrect fusion data by classifying the physical similarity between channels [@2017arXiv170504947L]. In the model selection and evaluation process of TDGS method, different performance measures lead to models of various generalization abilities [@karayiannis2013artificial; @kohavi1995study]. Choices of performance measures depend on the required generalization ability of models, or say preferences of tasks. Setting preference$-$based performance measures helps to perform corresponding tasks better. For TDGS method, directly adopting common performance measures, such as precision, recall, F$-$factor, confusion matrix, and Receiver Operating Characteristics (ROC) graphs, could only guarantee the performance for physical similarity between data sequences [@goutte2005probabilistic; @powers2011evaluation; @fawcett2006introduction]. Nevertheless, practical data cleaning tasks have requirements for the correctness of original data sequences. For example, some data cleaning tasks require high recall rate of incorrect data, and some tasks require high precision of correct data. To improve the performance of TDGS method in data cleaning tasks, new performance measures based on the preferences of corresponding tasks should be set. Each sample of TDGS method is the combination of two data sequences from different channels of MUlti-channel Measurement (MUM) systems. By tagging the sample completely constituted by correct data as physical similarity, and tagging the sample containing at least one incorrect data sequence as physical dissimilarity, the data cleaning problem turns into a binary classification problem about physical similarity between data sequences. When defining the prediction performance of TDGS method, True Positive (TP) refers that predicting results and actual sample tags are both dissimilar. True Negative (TN) refers that predicting results and actual sample tags are both similar. However, when defining the required prediction performance for data cleaning tasks, TP and TN refer to the incorrect and correct sequences which are correctly predicted. To set performance measures according to the preferences of tasks, the mapping relations between performance of TDGS method about physical similarity and correctness of data sequences should be explicit first. However, these mapping relations are complex and influenced by many factors, such as the data structure of samples, performance of models, the rule for judging the correctness of data based on given physical similarity, and the judging order. To obtain the general expression of preference$-$based performance measures for TDGS, the mapping relations between performance of TDGS method about physical similarity and correctness of data sequences are investigated by probability theory in this paper. Based on these mapping relations, we set preference$-$based performance measures for several common data cleaning tasks. By adopting these new performance measures in the model selection and evaluation process, models generated by TDGS method could best meet the preferences of tasks in probability. The mapping relations between performance of TDGS method about physical similarity and correctness of data sequences are decided by the rules for judging the correctness of data based on given physical similarity. Here we adopt an absolute algorithm, i.e., by scanning through all samples tagged with similarity first, tag the sequences contained in the similar samples as correct data, and tag the other data as incorrect data. Based on this judging rule, the mapping relations between performance about physical similarity and correctness of data sequences can be analyzed by probability theory. In view that every prediction about physical similarity is independent of each other, the probability of judging the correctness of data is the product of the probabilities of all predictions employed in the judging process [@durrett2010probability]. For example, according to the adopted judging rule, a correct data sequence $\ensuremath{S_0}$ would be predicted as incorrect if all samples containing $\ensuremath{S_0}$ are predicted as dissimilarity. Therefore, the probability of judging a correct data sequence as incorrect can be decided according to the number of similar samples containing $\ensuremath{S_0}$, the probability of predicting similar samples as dissimilarity, the number of dissimilar samples containing $\ensuremath{S_0}$, and the probability of predicting dissimilar samples as dissimilarity. Based on the mapping relations between performance of TDGS method about physical similarity and the correctness of data, performance measures for several common data cleaning tasks are set in this paper. Meanwhile, the correlative relations between these preference$-$based performance measures and performance parameters about physical similarity are analyzed. When preference-based performance measures are strong positive correlative with certain parameter, these performance measures could be simplified. The rest parts of this paper are organized as follows. In section \[sec:2\], the mapping relations between performance of TDGS method about physical similarity and the correctness of data sequences are studied by probability theory. In section \[sec:3\], performance measures for several common data cleaning tasks are investigated. Cases when these performance measures could be simplified are introduced. In section \[sec:4\], further optimizations of setting preference-based performance measures for TDGS method are discussed. Mapping relations between performance of TDGS method about physical similarity and correctness of data sequences {#sec:2} ================================================================================================================ In this section, the correctness of data sequences based on performance of TDGS method about physical similarity is analyzed by probability theory. Corresponding mapping relations are explicitly exhibited. MUM system measures related yet distinct aspects of the same observed object with multiple independent measuring channels. Interferometer systems [@kawahata1999far], polarimeter systems [@donne2004poloidal; @brower2001multichannel; @liu2014faraday; @liu2016internal; @zou2016optical], and electron cyclotron emission imaging systems [@luo2014quasi] are all typical MUM systems in Magnetic Confinement Fusion (MCF) devices. For practical purpose of data cleaning in MCF devices, the samples of a validation set are generated from diagnostic data of one discharge. For an N$-$channel MUM system, suppose $\ensuremath{n}$ and are ${Q_1} = \left. {n} \middle/ {N} \right.$ the number and proportion of correct data sequences respectively. By combining two data sequences from different channels of MUM system as one sample, $C_N^2$ samples can be generated. Among them, $C_n^2$ samples are similar, and $C_N^2 - C_n^2$ samples are dissimilar. The prediction performance of TDGS method about physical similarity can be divided as four types. ${k_1}$ and ${k_2}$ are the probabilities of correctly and incorrectly predicting similar samples respectively. ${k_3}$ and ${k_4}$ are the probabilities of correctly and incorrectly predicting dissimilar samples respectively. The total probability of all predictions equals 1, i.e., $\sum\limits_{i = 1}^4 {{k_i}} = 1$. The recall rate of similar samples ${Q_2}$ and the recall rate of dissimilar samples ${Q_3}$ are typical performance parameters about physical similarity, which are defined as the fraction of correctly predicted samples over total samples, namely \[eq:1\] $$\begin{aligned} \label{eq:1:1} \ensuremath{{Q_2} &= \frac{{{k_1}}}{{{k_1} + {k_2}}},} \\ \label{eq:1:2} \ensuremath{{Q_3} &= \frac{{{k_3}}}{{{k_3} + {k_4}}}.}\end{aligned}$$ The proportions of similar and dissimilar samples are $\left. {C_n^2} \middle/ {C_N^2} \right.$ and $\left. {(C_N^2-C_n^2)} \middle/ {C_N^2} \right.$ respectively. Total probability of correct and incorrect predictions of certain samples is the proportion of corresponding class, i.e., \[eq:2\] $$\begin{aligned} \label{eq:2:1} \ensuremath{{k_1} + {k_2} &=\left. {C_n^2} \middle/ {C_N^2} \right.,} \\ \label{eq:2:2} \ensuremath{{k_3} + {k_4} &= \left. {(C_N^2-C_n^2)} \middle/ {C_N^2} \right..}\end{aligned}$$ Based on the given performance of TDGS method about physical similarity, the correctness of data sequences could be analyzed by probability theory. The probability of incorrectly predicting a correct data sequence $\ensuremath{S_0}$ is the union set of incorrectly predicting all similar samples containing $\ensuremath{S_0}$ as dissimilarity, and correctly predicting all dissimilar samples containing $\ensuremath{S_0}$. For the validation set from one discharge, the amounts of similar and dissimilar samples containing $\ensuremath{S_0}$ are $\ensuremath{n-1}$ and $\ensuremath{N-n}$ respectively. The probability of predicting similar samples as dissimilarity is $1 - {Q_2}$. And the probability of correctly predicting dissimilar samples is ${Q_3}$. Considering the proportion of correct data is ${Q_1}$, the probability of incorrectly predicting correct data $P(R \rightarrow W)$ equals ${Q_1}{(1 - {Q_2})^{n - 1}}{({Q_3})^{N - n}}$. Since the total probability of correct and incorrect predictions of correct data sequences is ${Q_1}$, the probability of correctly predicting correct data $P(R \to R)$ equals ${Q_1} - P(R \to W) = {Q_1}[1{\rm{ - }}{(1 - {Q_2})^{n - 1}}{({Q_3})^{N - n}}]$. The probability of correctly predicting incorrect data sequence $\ensuremath{S_1}$ is the union set of predicting all dissimilar samples containing $\ensuremath{S_1}$ as dissimilarity. In view that the amount of dissimilar samples containing $\ensuremath{S_1}$ is $\ensuremath{N-1}$ and the proportion of incorrect data sequences is $1 - {Q_1}$, the probability of correctly predicting incorrect data $P(W \to W)$ equals $(1 - {Q_1}){({Q_3})^{N - 1}}$. Since the proportion of incorrect data sequences is $1 - {Q_1}$, the probability of incorrectly predicting incorrect data $P(W \to R)$ equals $(1 - {Q_1})[1 - {({Q_3})^{N - 1}}]$. Preference$-$based performance measures for TDGS method in several common data cleaning tasks {#sec:3} ============================================================================================= Based on the mapping relations between performance of TDGS method about physical similarity and the correctness of data sequences, performance measures for several common data cleaning tasks are set in this section. Different data cleaning tasks have various preferences. Some tasks require high recall rate of incorrect data. Then the performance measure can be set as $$\label{eq:3} \begin{split} \ensuremath{{E_1} = P(W \to W)./[P(W \to W) + P(W \to R)]{\rm{ = }}{({Q_3})^{N - 1}}.} \end{split}$$ Some tasks require high precision of incorrect data. Then the performance measure can be set as $$\label{eq:4} \begin{split} \ensuremath{{E_2} = P(W \to W)./[P(W \to W) + P(R \to W)] = \frac{{1 - {Q_1}}}{{1 - {Q_1} + {Q_1}{{(1{\rm{ - }}{Q_2})}^{n - 1}}{{({Q_3})}^{1 - n}}}}.} \end{split}$$ Some tasks require high recall rate of correct data. Then the performance measure can be set as $$\label{eq:5} \begin{split} \ensuremath{{E_3} = P(R \to R)./[P(R \to R) + P(R \to W){\rm{ = }}1{\rm{ - }}{(1{\rm{ - }}{Q_2})^{n - 1}}{({Q_3})^{N - n}}.} \end{split}$$ Some tasks require high precision of correct data. Then the performance measure can be set as $$\label{eq:6} \begin{split} \ensuremath{{E_4} = P(R \to R)./[P(R \to R) + P(W \to R)] = \frac{{{Q_1}[1{\rm{ - }}{{(1{\rm{ - }}{Q_2})}^{n - 1}}{{({Q_3})}^{N - n}}]}}{{{Q_1}[1{\rm{ - }}{{(1{\rm{ - }}{Q_2})}^{n - 1}}{{({Q_3})}^{N - n}}]{\rm{ + (1 - }}{Q_1}{\rm{)}}[1 - {{({Q_3})}^{^{N - 1}}}]}}.} \end{split}$$ The change relations between performance parameters about physical similarity and preference-based performance measures are different in various cases. In the case shown in figure \[fig:1\], the recall of incorrect data ${E_1}$ and precision of correct data ${E_4}$ are positive correlative with the recall rate of dissimilar samples ${Q_3}$. In the model selection and evaluation process of this case, the recall of incorrect data and precision of correct data could also be enhanced by just improving the recall rate of dissimilar samples. Then the performance measures ${E_1}$ and ${E_4}$ can be replaced with the more simplified parameter ${Q_3}$. When the channel number of MUM systems is bigger ${(N=50)}$, or the proportion of incorrect data is higher ${(Q_1=0.19)}$, this simplification is more reasonable for the correlative relations between ${Q_3}$ and performance measures are stronger. ![\[fig:1\] The change relations between performance parameters about physical similarity and preference-based performance measures are plotted. ${Q_2}$ denotes recall rate of similar samples. ${Q_3}$ denotes recall rate of dissimilar samples. ${E_1}$ denotes recall of incorrect data. ${E_2}$ denotes precision of incorrect data. ${E_3}$ denotes recall of correct data. ${E_4}$ denotes precision of correct data.](fig/Fig1_new.eps) Summary {#sec:4} ======= Data cleaning tasks could be performed better by setting preference-based performance measures. In this paper, we provide the mapping relations between performance of TDGS method about physical similarity and correctness of data sequences by probability theory. Based on these mapping relations, preference-based performance measures for several common data cleaning tasks are set for TDGS method. Meanwhile, the correlative relations between these new performance measures and performance parameters are analyzed. By setting preference$-$based performance measures, the preferences of data cleaning tasks could be best meet by TDGS method in probability. When these new performance measures are strong positive correlative with certain parameter, preference-based performance measures could be simplified. Next step, we would further improve the performance of TDGS method by adopting different rules for judging the correctness of data based on given physical similarity. The rule adopted in this paper is an absolute judging rule. Next step, we could adopt a non-absolute judging rule. For example, the sequence which is dissimilar from $90\%$ of the other sequences can be tagged as incorrect data. The degree parameter introduced by the judging rule changes the mapping relations between performance of TDGS method about physical similarity and correctness of data sequences. In some cases, proper setting of the degree parameter would improve the data cleaning performance of TDGS method. This research is supported by Key Research Program of Frontier Sciences CAS (QYZDB-SSW-SYS004), National Natural Science Foundation of China (NSFC-11575185,11575186), National Magnetic Confinement Fusion Energy Research Project (2015GB111003,2014GB124005), JSPS-NRF-NSFC A3 Foresight Program (NSFC-11261140328),and the GeoAlgorithmic Plasma Simulator (GAPS) Project. | Mid | [
0.645435244161358,
38,
20.875
] |
import pyaf.Bench.TS_datasets as tsds import tests.artificial.process_artificial_dataset as art art.process_dataset(N = 128 , FREQ = 'D', seed = 0, trendtype = "LinearTrend", cycle_length = 5, transform = "BoxCox", sigma = 0.0, exog_count = 20, ar_order = 0); | Mid | [
0.6297297297297291,
29.125,
17.125
] |
Q: SQL server: Inserting a bunch of rows into a table, generating a "batch id" for every 100? I'm inserting a bunch of rows into another table, and watch to generate an unique batch id for every X rows inserted (in this case X will be 100 or so). So if I'm inserting 1000 rows, the first 100 rows will have batch_id = 1, the next 100 will have batch_id = 2, etc. INSERT INTO BatchTable(batch_id, col1) SELECT batchId, col1 //how to generate batchId??? FROM OtherTable A: We can take advantage of integer division here for a simple way to round up to the next 100: ;WITH x AS ( SELECT col1, rn = ROW_NUMBER() OVER (ORDER BY col1) FROM dbo.OtherTable ) --INSERT dbo.BatchTable(batch_id, col1) SELECT batch_id = (99+rn)/100, col1 FROM x; When you're happy with the output, uncomment the INSERT... | High | [
0.670050761421319,
33,
16.25
] |
Q: Need to add for loop to add a lot of .csv files in the tikzpicture I am trying to plot data from .csv file. I have a lot of .csv files (around 4000). I am not sure how to do this. I am looking for some kind of "for loop" to perform this. Any help would be appreciated. I have attached an example code below. I have data a lot of data files and I do not want to add one line of code for all .csv files. I hope this explains my problem. %\title{Plot_for_gain_tuning_paper} \documentclass{article} \usepackage{tikz} \usepackage{pgfplots} \usepackage{filecontents} \usepackage[active,tightpage]{preview} \PreviewEnvironment{tikzpicture} \setlength\PreviewBorder{4pt} \pgfplotsset{width=9.75cm,compat=1.3} \pgfplotsset{every axis legend/.append style={at={(0.45,-0.25)},legend columns=5,anchor=south,font=\small}} \tikzset{every mark/.append style={scale=0.8}} \pgfplotsset{compat=1.8} \begin{document} \begin{tikzpicture} \begin{axis}[title=$V_{a_{rms}}+V_{b_{rms}}+V_{c_{rms}}$,xlabel={Time (in seconds)},ylabel={Voltage (in Volts)},grid=major,legend entries={$Index~1$,$Index~2$,$Index~3$,$Index~4$,$Index~5$}] \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_1.csv}; \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_2.csv}; \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_3.csv}; \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_4.csv}; \end{axis} \end{tikzpicture} \end{document} A: For a collection of files that has a regular 'progression' of filenames, the \foreach command (from the package pgffor, a utility package for tikz) can be helpful. Instead of \begin{tikzpicture} \begin{axis}[title=$V_{a_{rms}}+V_{b_{rms}}+V_{c_{rms}}$,xlabel={Time (in seconds)},ylabel={Voltage (in Volts)},grid=major,legend entries={$Index~1$,$Index~2$,$Index~3$,$Index~4$,$Index~5$}] \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_1.csv}; \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_2.csv}; \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_3.csv}; ... \addplot[color=black,style=solid,very thick] table [col sep=comma] {Data_128_4_1000.csv}; \end{axis} \end{tikzpicture} you could have: \begin{tikzpicture} \begin{axis}[ title=$V_{a_{rms}}+V_{b_{rms}}+V_{c_{rms}}$, xlabel={Time (in seconds)}, ylabel={Voltage (in Volts)}, grid=major, legend entries={$Index~1$,$Index~2$,$Index~3$,$Index~4$,$Index~5$} ] \foreach \F in {1,2,...,1000}{ \addplot[ color=black, style=solid, very thick ] table [col sep=comma] {Data_128_4_\F.csv}; } \end{axis} \end{tikzpicture} | Mid | [
0.6329787234042551,
29.75,
17.25
] |
Q: Selecting Razor markup elements with JavaScript Is it possible to select elements from JavaScript when they are set with Razor markup? For some reason, it is not working for me: @for (int i = 0; i < 10; i++) { <input type="radio" name="site-btn" id="site-btn[@i]" autocomplete="off" /> } The following JavaScript does not work to select the element: $("#site-btn[0]") But this one does: $("input[name=site-btn]").first() When I consult the page source while debugging, the ID is set correctly: <input type="radio" name="site-btn" id="site-btn[0]" autocomplete="off" /> But attempting to select the element just returns a 0-length object as if it does not exist. What am I doing wrong? A: You need to escape meta character i.e. [] with double \\ $("#site-btn\\[0\\]") | Mid | [
0.603015075376884,
30,
19.75
] |
Ohio State football podcast: J.T. Barrett under enemy fire and basketball recruiting COLUMBUS, Ohio — On the latest Inside the Shoe Ohio State football podcast, brought to you by Land of 10, Kyle Lamb discusses remarks made by Indiana coach Tom Allen calling J.T. Barrett’s passing “inaccurate.” Austin Ward joins the show to preview Saturday’s top-5 matchup against Oklahoma. Corey Evans, national basketball recruiting analyst for Rivals.com, stops by to analyze the 2018 recruiting efforts of the basketball Buckeyes. You can listen to the entire show in the embedded SoundCloud player below. You can subscribe to Inside the Shoe on iTunes and Google Play. It is available for direct download here. Will Ohio State receivers Paris Campbell, Johnnie Dixon and Binjimen Victor build off a promising first game? Was Indiana a perfect first opponent for Ohio State leading into the showdown against the Sooners? Urban Meyer calling his defensive backs “humbled” against the Hoosiers. Will those defensive backs be up to the task against the Oklahoma passing game? Who does Evans think Ohio State has the best shot at getting a commitment from in the 2018 basketball class? Who have the Buckeyes made much progress in recruiting over the past month? Which top-100 prospect is interested in potentially playing with point guard Elijah Weaver? The status of previous commit Torrence Watson of St. Louis. What is the 2018 class likely to look like for the Buckeyes? Be sure to check out Inside the Shoe on Thursday for continuing coverage of the Oklahoma game. Land of 10’s Ryan Ginn will join Kyle to prepare listeners for the game. Also joining the show is Ryan Aber, Sooners beat writer for The Oklahoman and NewsOK.com covering the Oklahoma Sooners. Aber will preview the Sooners and dissect the program under new coach Lincoln Riley. | Mid | [
0.6241758241758241,
35.5,
21.375
] |
Welcome to Evesplaining, politics writer Eve Peyser's column about why everyone else is wrong and she's right. On Monday, Joe Biden said he's "not closing the door" on a future presidential run. A new Politico/Morning Consult poll demonstrated why he's considering going for it by showing Biden leading Trump by 11 points in a very hypothetical 2020 matchup. But don't be fooled by these numbers—the same poll found that a "generic Democrat" would fare even better against Trump. More to the point, to even find himself facing Trump Biden would have to win a likely packed-to-the-brim Democratic primary. And when a Resistance-drunk Democratic base looks at Biden, it's going to see a lot not to like. He'll face the same problems Hillary Clinton did in 2016, but magnified. Let's begin by noting that Biden has already positioned himself as anti-populist Democrat in ideological opposition to Bernie Sanders, who according to some polls is the most popular politician in the US. In practice, this seems to mean going around saying things like "the wealthy are as patriotic as the poor," which seems slightly tone deaf considering he'd be competing to replace Trump and throw out his Cabinet of billionaires and hedge fund titans. That's just the tip of the iceberg. Young people are probably more familiar with the memefied iteration of Biden, a silly foil to Barack Obama, who was the subject of numerous Onion parodies that portrayed him as a weed-selling, porn-loving "Uncle Joe" who threw parties at the White House when Obama was out of town. But as entertaining as the persona Biden has fostered since serving as vice president is, his past tells another story. While Hillary was forever tied to the 1994 Violent Crime Control Act that her husband signed into law, Bill actually credited Biden with passing the legislation, which the former president later admitted made America's mass incarceration crisis worse. As recently as 2015, the bill that gave states financial incentivizes to incarcerate more citizens and instituted mandatory minimums for nonviolent crimes was referred to as “1994 Biden Crime Bill." Biden's role in Anita Hill's 1991 sexual harassment hearing is also troubling. The then-senator led the proceedings as chairman of the Senate Judiciary Committee, and even though he ultimately voted against confirming Clarence Thomas to the Supreme Court, he was widely criticized by the left for "having mismanaged the allegations of sexual harassment made by Ms. Hill against her former employer, Mr. Thomas," according to a 2008 New York Times story. In a 2014 interview with the Huffington Post, Hill said that Biden did “a disservice to me, a disservice more importantly, to the public.” On Monday, Biden offered up a half-baked non-apology for his conduct during the trial, saying, "I’m so sorry that she had to go through what she went through... I feel really badly that she didn't feel like the process worked." Like Clinton, Biden voted for the Iraq War. He later said he regretted that decision—but in a contest with a fresh generation of Democrats who didn't vote for the Iraq War, it's almost certain to be another disadvantage. He often presents himself as a champion of women's rights, having introduced the Violence Against Women Act in 1990 (it eventually passed as part of the 1994 crime bill), but Biden also voted in favor of banning so-called partial birth abortions and said that even though he believes in upholding Roe v. Wade, he thinks life begins at conception. Then there are all the photos of him touching women that look, well, creepy. No one has ever accused him of predatory behavior, but if 2020 is anything like 2017, those photos may skeeve out some Democratic voters. These low points throughout Biden's long political career make him a less than ideal candidate for 2020, but did you know he's also known for making racist blunders? In 2006, he said, "You cannot go to a 7-Eleven or a Dunkin' Donuts unless you have a slight Indian accent. I'm not joking." When he announced his presidential bid in 2007, he called Barack Obama "the first mainstream African-American who is articulate and bright and clean and a nice-looking guy." And even after Obama had chosen him to be his running mate, Biden gave John McCain one of his main talking points when he said: It will not be six months before the world tests Barack Obama like they did John Kennedy. The world is looking. We’re about to elect a brilliant 47-year-old senator president of the United States of America. Remember, I said it standing here, if you don’t remember anything else I said. Watch, we’re going to have an international crisis, a generated crisis, to test the mettle of this guy. If the primary gets ugly—and almost all close primaries get really, really ugly—you're also going to see people bringing up the reason Biden's first presidential run failed in 1987, which is that he stole a speech from a British politician. There are many viable potential 2020 Democratic candidates, from Bernie Sanders to Elizabeth Warren to Kamala Harris. Voters will be spoiled for choice. Why would they pick Biden? | Low | [
0.451292246520874,
28.375,
34.5
] |
Monday, November 22, 2010 SCFS Visiting Fellow Ken Wharton is giving a 'current projects' talk at USyd today (Nov 22) at 1pm in the Philosophy Common Room."The ongoing efforts to interpret quantum mechanics typically ignore the Feynman path-integral approach, despite the fact that this mathematics most naturally extends to relativistic quantum field theory. While literally interpreting the path-integral mathematics seems untenable, it is notable that this mathematics implies strong symmetries between experiments that are typically assumed to be unrelated. If one adopts the principle that any underlying ontology must respect these same symmetries (the "action duality"), it turns out that quantum interpretations are strongly constrained. Furthermore, one can use this principle to construct new interpretations by considering pairs of experiments related by this symmetry, particularly cases where interpreting one experiment appears straightforward and the other problematic. The results generally support time-symmetric and retrocausal interpretations. (Joint work with Huw Price, David Miller, and Peter Evans.)" Monday, September 6, 2010 LA METTRIE: MAN A MACHINEDr Charles Wolfe, History and Philosophy of Science, Faculty of Science KEY THINKERS SERIES – 15TH SEPTEMBER 2010 Julien Offray de La Mettrie, a medical doctor and philosopher was born in Saint-Malo (Brittany) in 1709, and died in 1751 in Berlin, where he was an intellectual-in-residence at Frederick II’s court ... of indigestion, food poisoning, or acute peritonitis after having consumed a whole pheasant pasty with truffles. He had been forced to flee from France and then even from Holland because of his writings, and was one of the most scandalous figures of the Enlightenment. I will focus especially on his best-known work, L’Homme-Machine or Man a Machine (1748), one of the greatest examples of materialist philosophy ever written - in which mind and body are explained as belonging to one material substance, which medical and physiological knowledge sheds light on. How is it that a philosopher admired today by all manner of ‘brain scientists’ was also the hero of the Marquis de Sade? Addressing this sort of question gets us to the heart of Enlightenment materialism. Saturday, September 4, 2010 Evolution is an essential theory for understanding the living world–including our own species. With understanding comes the capacity for improvement. This workshop examines three fields in which the understanding offered by contemporary evolutionary theory may offer practical guidance: conservation, public health, and the urban environment. The workshop will be led by evolutionary biologist Prof. David Sloan Wilson, SUNY Distinguished Professor of Biology and Anthropology at Binghamton University. Prof. Wilson’s recent books include: Darwin’s Cathedral: Evolution, Religion, and the Nature of Society and Evolution for Everyone: How Darwin's Theory Can Change the Way We Think About Our Lives Attendance at the workshop is limited to 50, to ensure that all participants are able to participate in a meaningful way in our discussions. Amongst the key questions to be addressed are:• Is evolutionary theory genuinely mature enough to guide practical policy formulation on any or all of these three topics?• What are the steps that evolutionary scientists can take to get their ideas onto the policy agenda?• What are the potential pitfalls facing evolutionary scientists as they begin to take their ideas out of the academy and into the policy arena? To lead the discussion alongside Prof Wilson we have four distinguished Australasian scientists, each with expertise on one of our focal topics:• Rick Shine, Professor of Evolutionary Biology and ARC Federation Fellow, University of Sydney• Sir Peter Gluckman, Head, Centre for Human Evolution, Adaptation and Disease, Liggins Institute, University of Auckland and New Zealand Prime Minister’s Chief Science Advisor• Stephen Simpson, Professor of Biology and ARC Laureate Fellow, University of Sydney• Roland Fletcher, Professor of Theoretical and World Archaeology, University of Sydney What would the consequences be, if rather than substances and structures, we took events and processes to be the primary entities that make up the universe? And what if instead of the traditional mechanistic model we used the concept of the organism, as the key metaphor in our understanding of the world? These are two central questions that Alfred North Whitehead (1861-1947) wrestled with in his later years. Whitehead of course, was famous for his early collaboration with Bertrand Russell on one of the most important works of mathematics in history—the three volumes of Principia Mathematica. While the two equally shared the work of this heroic attempt to establish a logical foundation for mathematics, it is not commonly known that there had been a fourth volume planned, which Whitehead alone began working on. But what became of the unfinished volume and why was it important for his philosophical development? Tuesday, August 17, 2010 Abstract: Extreme risks must be evaluated in such contexts as quarantine, terrorism and banking. Unfortunately, an extreme risk is one that hasn't happened yet, so directly relevant data is non-existent. The talk surveys what is done in the Basel II compliance regime in banking and in Australian quarantine risk analysis, where there are formal processes for using small data sets to keep expert opinion honest. The usefulness of Extreme Value Theory is considered. Extreme risks raise in acute form the "reference class problem", of how to decide what is the right class in which to take statistics to bear on an individual case. The views of philosophers and legal theorists on the reference class problem are canvassed. Thursday, July 15, 2010 What do we learn when we revisit scientists’ past worlds? How might one write a life as famous as Charles Darwin’s? Why is biography the best-selling genre of all? Pre-eminent Darwin scholar and Harvard Professor of the History of Science Janet Browne, talks with Sydney’s prizewinning historian Professor Iain McCalman, about the challenges and delights of the biographical genre for historians. In conversation with Alison Bashford, this is an evening that probes the intellectual life of these keen observers and interpreters of the world of Victorian science Tuesday, June 15, 2010 The program for this workshop later in June is very interesting and worth a look. One theme is the relations between HPS and science policy. This is the fifth in a series of Workshops on 'integrated history and philosophy of science' involving a good part of the UK's HPS community. Thursday, May 13, 2010 The video of Elliott Sober's lecture to a packed room on Darwin, Evolution, and Intelligent Design is now available on ABC TV's website, and is embedded below. An audio podcast is on the linked website, and also from the University of Sydney's podcast page. Monday, May 3, 2010 Recent Visiting Fellow Professor Elliott Sober was a guest on ABC Radio National's program, The Philosopher's Zone. Interviewed by Dr Alan Saunders, Professor Sober discussed intelligent design and Darwin. The podcast and transcript may be found here. Friday, April 30, 2010 The Sydney contingent is now all back home, having been variously delayed by the Icelandic ash cloud. The third Sydney-Tilburg conference was extremely successful - the most exciting so far, at least for me. The conference topic was 'The Future of Philosophy of Science' and on the last day of the conference we held an open discussion of this issue for all conference participants. Here are some of the themes from that discussion: There was general agreement that the increasing specialisation of philosophy of science (hereafter PoS) is a problem. This is in part a consequence of the increased attention to the actual science in recent PoS. Hence work in philosophy of biology, or of economics, now assumes the kind of detailed knowledge of the actual science that philosophy of physics always has. But now, of course, we do not now all share the common background in one science (selected areas of physics) that earlier philosophers of science could draw on. Jan Sprenger suggested that statistics and probability could act as unifying themes for PoS, given their importance right across the sciences, and their place at the heart of current models of confirmation, explanation, etc in PoS itself. But some participants argued that these formalisms were simply not that important in the sciences with which those participants were concerned. For example, although statistics are very important in bioinformatics, it is unclear that this is an important focus for work in the philosophy of the molecular biosciences, and recent work on that field has certainly not focused on issues in statistical inference. Michael Friedmann and others pointed to the increasing importance of HOPOS (History of Philosophy of Science) as a part of the discipline of PoS. There was general agreement that this is the case, and, indeed, there were a remarkable number of papers looking at the ideas of Carnap at this conference. I myself wondered if PoS was not starting to work as many areas of philosophy traditionally have, analysing core problems through reading and interpreting earlier philosopher's work on those problems. Carnap in particular might play the role in future PoS that Kant or Hume do to general epistemology. The HOPOS approach has obvious potential to act as a unifying theme for the discipline. Friedmann also pointed to the ambitions of early 20th century philosophers of science to do much more than offer a specialist philosophy of science, and in fact to reshape the whole of philosophy into a new, 'scientific philosophy'. Philosophy of science would thus be a central topic in philosophy because science matters to philosophy - to all of philosophy. Another recent 'movement' within PoS had been so-called 'integrated History and Philosophy of Science' or iHPS. As I understand it, the idea is to repair the near-divorce between recent work in history of science and recent work in philosophy of science by encouraging philosophers of science to make historical research on the sciences they study an integral part of their own work. This sort of approach was not much in evidence at the actual meeting, so I asked for a straw poll of people in the room who saw historical research as an integral part of their own work in PoS. About half of the participants thought this was true of themselves. One more strand of discussion concerned the role - and obligation - of PoS to interpret science for broader audiences. In the conference itself Massimo Pigliucci had outlined a role for PoS as 'science criticism', and there was some support in the room for the idea that PoS should seek to critically expound the significance of science to wider audiences. Monday, April 19, 2010 The Centre for Values, Ethics and Law in Medicine at University of Sydney is currently looking for a 0.6 FTE senior research fellow to work on a Clinical Ethics project for 2 years. The position would be suitable for someone with extensive experience in qualitative research and project management, from a discipline such as bioethics, health social sciences, medical humanities or other related areas. Details are available here. Thursday, April 15, 2010 Current University of Sydney International Visiting Fellow, Hans Reichenbach Professor Elliott Sober (University of Wisconsin), will be giving a Sydney Ideas Open lecture on "Darwin and Intelligent Design," on Thursday, 22 April. For further information, click here. Venue: Sydney Law School foyer, Eastern Avenue, Camperdown Campus.Time: Thursdays 6.00pm to 7.00pmFormat: 40 minute lecture followed by 20 minute Q & ARecording: Audio podcasts will be available three days after the lectureCost: This is a free series, and all are welcome. No RSVP or registration is needed, please just turn up. Kristie Miller (USyd) will be presenting at the University of Wollongong Philosophy Research Seminar series next Tuesday. All are welcome to attend. Title: "Motion, laws and plenitude: Are there objects to which the laws of nature do not apply?" When & where: April 20th, 5:30pm in room 19.1003 Abstract: It is a natural to assume that the domain of the concrete objects is coextensive with the domain of the objects to which the natural laws apply, and therefore that if we can find any concrete object that is at rest and does not stay at rest unless acted on by a net force, then we have found something that violates the law of inertia. Recently, however, this assumption has been challenged. The locus of this challenge has come from a number of metaphysicians who sign up for what I will call a plenitudinous ontology. Given a plenitudinous ontology, a great number of entities seem to be ones that violate one or other law of nature.Friends of plenitude have responded by conceding that the entities in question do violate the laws in question, and suggesting that the correct response is to distinguish two different kinds of concrete entity: the ones to which the laws apply, and the ones to which they do not. In this paper I advocate an alternative strategy according to which when the laws are properly understood, no concrete entity in the plenitudinous ontology ever violates those laws. Congratulations to Charles T. Wolfe and Ofer Gal on the publication of their edited book, The Body as Object and Instrument of Knowledge: Embodied Empiricism in Early Modern Science, available through Springer. Tuesday, March 16, 2010 The Philosophy Department, Otago University is hosting a one day workshop on "Composition, constitution, and mereology" to take place on Saturday, 5 June 2010. Invited speakers include former SCFS visiting fellow Patrick Greenough and SCFS researcher Kristie Miller. Abstracts can be sent to [email protected] by 16 April. Abstract: The credence you assign to a proposition is an important part of your epistemic attitude toward that proposition. But it's not the whole story. Another important factor is the stability of your credence: roughly the extent to which you expect it to change as you acquire new evidence. Expert probability functions -- be they the credences of your trusted weather forecaster, the credences of your future self or the objective chances -- serve to guide your credences to particular values. But they also serve to stabilize your credences, relative to particular types of evidence. By exploring this feature, I think we can better understand the relationship between credence and expert opinion, including the relationship between credence and objective chance. Tuesday, March 9, 2010 Unlike descriptive sciences that are principally concerned with discovering, describing, and explaining phenomena, environmental sciences pursue more immediate goals, such as providing scientific bases for the preservation of biodiversity and natural resources. What distinguishes sciences of this kind from descriptive science is their emphasis on achieving non-epistemic objectives humans consider valuable. They can be labeled ‘teleological’ for this reason. Recent analyses have suggested teleological sciences are value-laden in a strong sense: attempts to demarcate the function of facts and values within them are misguided and obscure rather than illuminate their structure. In fact, the claim that values inextricably permeate teleological sciences has recently been taken to challenge the view that a “gap” exists between facts and values, the gap widely believed to explain why, for example, determining what agents should do is distinct from studying what they actually do and why they do it. These claims are overstated. Teleological sciences are better conceptualized as having a conditional form where stipulated goals reflecting ethical values set much of their general structure and methodologies, but in which this influence can be demarcated from the factual status of claims made within them. The conditional nature of teleological sciences makes this demarcation possible, and helps clarify the function of values in science in general. Wednesday, February 24, 2010 Mark Colyvan, SCFS Director, was recently on Alan Saunder's excellent ABC radio program and podcast, The Philosopher's Zone. Allan is an advisor to the SCFS, and Kurt Gödel was the topic of their conversation. The podcast (and the transcript) is available for download from The Philosopher's Zone website. Monday, January 25, 2010 SCFS Researcher in History and Philosophy of Medicine, Hans Pols, will be giving a lecture on "Notes from Batavia, the European's Graveyard: the Debate on Acclimatisation in the Dutch East Indies, 1820-1860," this Saturday, 30 Jan, at 2pm, to the Australian and New Zealand Society of the History of Medicine. Soon after the conquest of Batavia in 1619, the city was nicknamed the “graveyard of Europeans” because of the unusually high mortality rate of soldiers and merchants there. Consequently, the Dutch East Indies company (VOC) maintained as few soldiers and officials there as possible. After the demise of the VOC in 1799, Batavia developed into a city of sorts—and the issue whether the Indies were suitable for European habitation came to dominate medical and civil discussions. Willem Bosch, the founder of the Batavia medical school in 1851 and chief of the Indies Civil Health Service, had calculated that European civilians who moved to the Indies sacrificed 60% of their life expectancy, while for soldiers it was a staggering 80%. A number of local physicians protested against these views by arguing that Europeans could maintain their health by following a set of sensible rules. They believed that special attention should be given to individuals who had arrived recently, because they would be unusually vulnerable to disease during the period of acclimatisation. In this paper I will analyse the often acerbic discussions between the advocates of these different perspectives, which was conducted in the first volumes of the first magazine that appeared in the Indies. Participants in this debate were the aforementioned Willem Bosch; the German explorer Franz Junghuhn, who charted volcanos and produced the first map of Java; the irascible German physician Carl Waitz, who later advocated the water-cure as a panacea; Cornelis Swaving, a physician known for his impenetrable prose; and Pieter Bleeker, a physician who later became famous as an ichthyologist. Thursday, January 21, 2010 SCFS Honorary associate Zach Weber, who is about to take up a position at the University of Melbourne, has recently published an article: "Transfinite Numbers in Paraconsistent Set Theory," in Review of Symbolic Logic. Saturday, January 9, 2010 The Department of Philosophy and the Tilburg Center for Logic and Philosophy of Science (a partner of the SCFS) has recently advertised a PhD position. The advertisement reads: The Department of Philosophy and the Tilburg Center for Logic and Philosophy of Science (TiLPS) invite applications for a three-year full-time PhD position, commencing September 1, 2010. The successful candidate is expected to work on a topic from the philosophy of science (including general philosophy of science, formal philosophy of science, philosophy of economics, and philosophy of psychology) and complete a PhD thesis within three years. The salary for a full-time employment agreement increases from 2.042 Euro gross a month in the first year to 2.492 Euro gross a month in the last year. The position is open to candidates with a master’s degree or equivalent in philosophy and an interest in working in a very active international and interdisciplinary research environment. Candidates are invited to submit a letter of interest, a curriculum vitae, a research proposal of 1000 to 2000 words, certificates, a transcript of courses taken (including grades), and two letters of recommendation. Please send your application package to PhD Position Search Committee, c/o P & O, Department of Philosophy, Tilburg University, Warandelaan 2, P.O. 90153, 5000 LE Tilburg, The Netherlands, or email to [email protected] <mailto:[email protected]> . The deadline for applications is April 15, 2010. Please mention the vacancy number 500.10.01 in your letter. Informal enquiries may be directed to Professor Stephan Hartmann (email: S.Hartmann “at” uvt.nl <mailto:[email protected]> ). There's titles and a preliminary timetable here. More information will be added to the website nearer the date. Propositions play a foundational role in many areas of philosophy, but what are they? Is there a single class of things that serve as the objects of belief, the bearers of truth, and the meanings of utterances? How do our utterances express propositions? Under what conditions do two speakers say the same thing, and what (if anything) does this tell us about the nature of propositions? This workshop, consisting of 7 talks by some of Australia's best philosophers, will address these questions and more. It will cover topics in philosophy of language, perception, and metaphysics. Registration is free but places are limited, so please email Mark Jago (mark.jago at gmail.com) if you'd like to attend. Coffee, biscuits and cake will be provided. A picnic lunch is available at a small fee (to cover costs) for those who RSVP. Organized by Rachael Briggs (Centre for Time, University of Sydney), Albert Atkin (Macquarie) and Mark Jago (Macquarie). Sunday, January 3, 2010 Catching up on journals after Xmas reveals that some associates of the SCFS have been afforded the oxygen of publicity. Idan Ben Barak's book The Invisible Kingdom (Australian edition Small Wonders) is recommended in the December 11th issue of Science (p.1485). Karola Stotz and I were captured by the paparazzi at a human nature workshop and the picture appeared in the December 17th edition of Nature (p.841). But we are only part of the entourage - the caption says 'John Dupre and his team'. The Nature article is an interesting discussion of the results of UKs 21 million pound investment in 'genomics in society' research, including an extended discussion of the value of philosophy in that context. About Foundations of Science With the Sydney Centre for the Foundations of Science, the University of Sydney is a major locus of research into the nature and history of science. This blog is a simple way for the Sydney research community to keep in touch with each other. | Mid | [
0.598086124401913,
31.25,
21
] |
Q: How to center first node in Forest diagram I want to horizontally center the first node Sing(f)=V(x,y,z). Everything I've tried so far won't work but frankly I don't know that much about Forest. My Code: \documentclass[a4paper,landscape]{scrartcl} \usepackage[margin=1in]{geometry} \usepackage{forest} \begin{document} \begin{forest} my edge label/.style={ if={greater(n(),n_children("!u")/2)}{ if={equal(n(),int((n_children("!u")+1)/2))}{ edge label={node [pos=.6] {#1}}, }{ edge label={node [pos=.4, right] {#1}}, }, }{ edge label={node [pos=.4, left] {#1}} }, }, for tree={ inner sep=1pt, text centered, align=center, font=\sffamily\bfseries\small, edge={font=\tiny}, if n children=3{calign=child, calign child=2}{}, s sep+=5pt, l sep+=15pt, } [{$Sing(f)=V(x,y,z)$} [{$Sing(f_x)=V(x,y_1)$} [{$Sing(f_{xx})=V(x,y_2,z_1)$} [{$Sing(f_{xxx})=V(x,y_3,z_2)$} [{$Sing(f_{xxxx})=V(x,y_4,z_3)$} [{$Sing(f_{xxxxx})=V(x,y_5,z_4)$}] [{$Sing(f_{xxxxy_4})=\emptyset$}] [{$Sing(f_{xxxxz_3})=V(x_1,y_5,z_3)$}]] [{$Sing(f_{xxxy_3})=\emptyset$}] [{$Sing(f_{xxxz_2})=V(x_1,y_4,z_2)$}]] [{$Sing(f_{xxy_2})=\emptyset$}] [{$Sing(f_{xxz_1})=\emptyset$}]] [{$Sing(f_{xy_1})=\emptyset$}]] [{$Sing(f_y)=\emptyset$},fit=band] [{$Sing(f_z)=V(y_1,z)$} [{$Sing(f_{zy_1})=\emptyset$}] [{$Sing(f_{zz})=\emptyset$}]]] \end{forest} \end{document} I get: I would be very grateful for any help and hints! A: Note that the style you define for edge labels is never used, so I've omitted it from the examples in this answer. Similarly for edge=\tiny and text centered. I'm not sure what you mean by centring - centred with respect to what? If the page, the tree as a whole will be very lop-sided. If you want to centre the tree and fit it on the page, however, you can always lie about its width. You must, however, be very careful with this as TeX will not then warn you if material flows off the page completely. Here's the kind of output I'm thinking you might want: Code: \documentclass[a4paper,landscape]{scrartcl} \usepackage[margin=1in]{geometry} \usepackage{forest} \begin{document} {\centering \makebox[0pt]{% \begin{forest} for tree={ inner sep=1pt, align=center, font=\sffamily\bfseries\small, if n children=3{calign=child, calign child=2}{}, s sep+=5pt, l sep+=15pt, } [{$Sing(f)=V(x,y,z)$} [{$Sing(f_x)=V(x,y_1)$} [{$Sing(f_{xx})=V(x,y_2,z_1)$} [{$Sing(f_{xxx})=V(x,y_3,z_2)$} [{$Sing(f_{xxxx})=V(x,y_4,z_3)$} [{$Sing(f_{xxxxx})=V(x,y_5,z_4)$}] [{$Sing(f_{xxxxy_4})=\emptyset$}] [{$Sing(f_{xxxxz_3})=V(x_1,y_5,z_3)$}]] [{$Sing(f_{xxxy_3})=\emptyset$}] [{$Sing(f_{xxxz_2})=V(x_1,y_4,z_2)$}]] [{$Sing(f_{xxy_2})=\emptyset$}] [{$Sing(f_{xxz_1})=\emptyset$}]] [{$Sing(f_{xy_1})=\emptyset$}]] [{$Sing(f_y)=\emptyset$},fit=band] [{$Sing(f_z)=V(y_1,z)$} [{$Sing(f_{zy_1})=\emptyset$}] [{$Sing(f_{zz})=\emptyset$}]]] \end{forest}}\par} \end{document} Note that this doesn't have anything specific to do with forest: the tree is just too wide for the page. Any too-big thing would present a similar problem ;). EDIT Another option for fitting the tree onto the page is to rethink its structure. There are a couple of possibilities. One is to alter the internal structure of the nodes to make them split across 2 lines: Code: \documentclass[a4paper,landscape]{scrartcl} \areaset{240mm}{152mm}% allow roughly the same total area for margins as you'd get with 1in margins, but let KOMA do the dividing and laying out of the page \usepackage{array,forest} \begin{document} {\centering \begin{forest} for tree={ inner sep=1pt, align={@{}>{$}c<{$}@{}}, font=\sffamily\bfseries\small, if n children=3{calign=child, calign child=2}{}, s sep+=5pt, l sep+=15pt, } [{Sing(f)\\=V(x,y,z)} [{Sing(f_x)\\=V(x,y_1)} [{Sing(f_{xx})\\=V(x,y_2,z_1)} [{Sing(f_{xxx})\\=V(x,y_3,z_2)} [{Sing(f_{xxxx})\\=V(x,y_4,z_3)} [{Sing(f_{xxxxx})\\=V(x,y_5,z_4)}] [{Sing(f_{xxxxy_4})\\=\emptyset}] [{Sing(f_{xxxxz_3})\\=V(x_1,y_5,z_3)}] ] [{Sing(f_{xxxy_3})\\=\emptyset}] [{Sing(f_{xxxz_2})\\=V(x_1,y_4,z_2)}] ] [{Sing(f_{xxy_2})\\=\emptyset}] [{Sing(f_{xxz_1})\\=\emptyset}] ] [{Sing(f_{xy_1})\\=\emptyset}] ] [{Sing(f_y)\\=\emptyset},fit=band] [{Sing(f_z)\\=V(y_1,z)} [{Sing(f_{zy_1})\\=\emptyset}] [{Sing(f_{zz})\\=\emptyset}] ] ] \end{forest}\par} \end{document} Alternatively, you could leave the internal node structure intact and restructure the relationship between the nodes. For example: Code: \documentclass[a4paper,landscape]{scrartcl} \areaset{240mm}{152mm}% allow roughly the same total area for margins as you'd get with 1in margins, but let KOMA do the dividing and laying out of the page \usepackage{forest} \begin{document} {\centering \begin{forest} for tree={ align=center, math content, font=\sffamily\bfseries\small, if n children=3{calign=child, calign child=2}{}, s sep+=5pt, l sep+=5pt, if={level>2}{ if n=1{ l+=20pt }{ if n'=1{ l+=20pt }{ if n children=0{ append={[,phantom]} }{} } }, }{ }, edge path={ \noexpand\path [\forestoption{edge}] (!u.parent anchor) -- +(0,-10pt) -| (.child anchor)\forestoption{edge label}; }, parent anchor=south, child anchor=north, } [{Sing(f)=V(x,y,z)} [{Sing(f_x)=V(x,y_1)} [{Sing(f_{xx})=V(x,y_2,z_1)} [{Sing(f_{xxx})=V(x,y_3,z_2)} [{Sing(f_{xxxx})=V(x,y_4,z_3)} [{Sing(f_{xxxxx})=V(x,y_5,z_4)}] [{Sing(f_{xxxxy_4})=\emptyset}] [{Sing(f_{xxxxz_3})=V(x_1,y_5,z_3)}] ] [{Sing(f_{xxxy_3})=\emptyset}] [{Sing(f_{xxxz_2})=V(x_1,y_4,z_2)}] ] [{Sing(f_{xxy_2})=\emptyset}] [{Sing(f_{xxz_1})=\emptyset}] ] [{Sing(f_{xy_1})=\emptyset}] ] [{Sing(f_y)=\emptyset}]%,fit=band] [{Sing(f_z)=V(y_1,z)} [{Sing(f_{zy_1})=\emptyset}] [{Sing(f_{zz})=\emptyset}] ] ] \end{forest}\par} \end{document} Whether any of this counts as centring the root node with respect to anything at all... that's another question. | Low | [
0.51937984496124,
25.125,
23.25
] |
PerioWave laser technology: Non Surgical Painless Gum Therapy PerioWave laser technology allows us to treat many periodontal ailments (gum diseases) without the invasive and often lengthy wait times associated with a specialists appointment. PerioWave is painless and non-surgical. | Mid | [
0.646370023419203,
34.5,
18.875
] |
Q: iOS keyboard flickers when switching view controllers I have a registration form and I want to have the keyboard always on top. The way I'm doing it now, is that when the user moves between view controllers, in viewDidLoad, the first UITextField becomes the first responder. The problem is that the keyboard flickers (disappears and then appears again) when the user moves between view controllers. Also, related to this: I have a form with a few uitextfields. When the user presses next it goes to the next uitextfield using becomefirstresponder. When the user is in the last textfield, the keyboard button becomes "Done". Then, when the user presses it, if there's an error with the last field, it should get the focus (calls becomeFirstResponder) but that doesn't happen (nothing get's the focus and the keyboard goes down). All the other fields get the focus fine, just this last field doesn't. I've tried about everything: switching to other textfields and back. The problem is that done automatically removes the keyboard. A: You should have made two separate questions for this. First, your flickering: I'm guessing you're using a UINavigationController. You can add an invisible UITextField somewhere in the UINavigationController, which you give focus before you switch to a new ViewController. Then, when the new ViewController has appeared (viewDidAppear), set the focus to the first textField as you want. However, the entire approach is kind of hackey and I don't recommend you use it. Instead, try using several views in a scrollView, of which you change the offset when you move to the new view. This will also solve the flickering. Second, losing firstResponder status on Done: The done button is specifically there to indicate exactly that which it says; Done. Pressing this assumes the user is finished and that no text is left to type, thus dismissing the keyboard. If you really want to keep the Done button, then try the following; Allow the user to dismiss the keyboard. Upon dismissal, check for the error in the last field. If there is an error, instead of calling [lastField becomeFirstResponder], try [self performSelector:@selector(thisSelectorWillCallFirstResponder) withObject:nil afterDelay:1.0]. In the method thisSelectorWillCallFirstResponder call [lastField becomeFirstResponder]. This will give time for the keyboard to disappear, before making it pop up again, so it doesn't interfere with the becomeFirstResponder call. Another method would be to not use a Done button, but instead use the return key. You can intercept return anytime with the delegate method textFieldShouldReturn:. There you can handle any error checking, without causing the textField to lose its focus. | Mid | [
0.6027027027027021,
27.875,
18.375
] |
--- abstract: | The aim of the paper is to introduce general techniques in order to optimize the parallel execution time of sorting on a distributed architectures with processors of various speeds. Such an application requires a partitioning step. For uniformly related processors (processors speeds are related by a constant factor), we develop a constant time technique for mastering processor load and execution time in an heterogeneous environment and also a technique to deal with unknown cost functions. For non uniformly related processors, we use a technique based on dynamic programming. Most of the time, the solutions are in ${\cal O}(p)$ ($p$ is the number of processors), independent of the problem size $n$. Consequently, there is a small overhead regarding the problem we deal with but it is inherently limited by the knowing of time complexity of the portion of code following the partitioning.\ [**Keywords:**]{} parallel in-core sorting, heterogeneous computing, complexity of parallel algorithms, data distribution. author: - 'Christophe Cérin, Jean-Christophe Dubacq' - 'Jean-Louis Roch' bibliography: - 'these.bib' title: 'Methods for Partitioning Data to Improve Parallel Execution Time for Sorting on Heterogeneous Clusters[^1]' --- The advent of parallel processing, in particular in the context of [*cluster computing*]{} is of particular interest with the available technology. A special class of [*non homogeneous clusters*]{} is under concern in the paper. We mean clusters whose global performances are correlated by a multiplicative factor. We depict a cluster by the mean of a vector set by the relative speeds of each processor. In this paper we develop general techniques in order to control the execution time and the load balancing of each node for applications running in such environment. What is important over the application we consider here, is the meta-partitioning schema which is the key of success. All the approaches we develop can be considered as static methods: we predetermine the size of data that we have to exchange between processors in order to guarantee that all the processors end at the same time before we start the execution. So, this work can be considered in the domain of placement of tasks in an heterogeneous environment. Many works have been done in data partitioning on heterogeneous platforms, among them Lastovetsky’s and Reddy’s work [@ipdps04] that introduces a scheme for data partitioning when memory hierarchies from one CPU to another are different. There, the heterogeneity notion is related to the heterogeneity of the memory structure. Under the model, the speed of each processor is represented by a function of the size of the problem. The authors solve the problem of partitioning $n$ elements over $p$ heterogeneous processors in ${\cal O}(p^2\times \log_2 n)$ time complexity. Drozdowski and Lawenda in [@europar2005] propose two algorithms that gear the load chunk sizes to different communication and computation speeds of applications under the principle of divisible loads (computations which can be divided into parts of arbitrary sizes; for instance painting with black pixels a whole image). The problem is formalized as a linear problem solved either by branch and bound technique or a genetic algorithm. Despite the fact that the architecture is large enough (authors consider heterogeneous CPU and heterogeneous links), we can not apply it here because our problem cannot be expressed under the framework of ’divisible loads’: in our case, we need to merge sorted chunks after the partitioning step and the cost is not a linear one…thus our new technique. The organization of our paper is the following. In section \[sec:ta\] we introduce the problem of sorting in order to characterize the difficulties of partitioning data in an heterogeneous environment. The section motivates the work. In section \[sec:previous\] we recall our previous techniques and results. Section \[sec:analytic\] is devoted to a new constant time solution and deals also with unknown cost functions. In section \[sec:dynamic\] we introduce a dynamic programming approach and we recall a technique that do not assume a model of processors related by constant integers but in this case the processor speed may be “unrelated”. Section \[sec:experiments\] is about experiments and section \[sec:conclusion\] concludes the paper. Target applications and implementation on heterogeneous clusters {#sec:ta} ================================================================ Assume that you have a set of $p$ processors with different speeds, interconnected by a crossbar. Initially, the data is distributed across the $p$ processors and according to the speeds: the slowest processor has less data than the quickest. This assumption describes the initial condition of the problem. In this section we detail our sorting application for which performance are directly related to this initial partitioning. Parallel Sort. {#mysection} -------------- Efficient parallel sorting on clusters (see [@spaa94*46; @reif87; @STOC::ReifV1983; @ShiHanmaoa1992a; @LiXandLuPa1993a; @HelmanDavi1996b] for the homogeneous case and [@CG00; @CG00a; @CG00b; @CG02; @CERIN2002] for the heterogeneous case) can be implemented in the following ways: 1. Each processor sorts locally its portion and picks up representative values in the sorted list. It sends the representative values to a dedicated node. 2. This node sorts what it receives from the processors and it keeps $p-1$ pivots; it distributes the pivots to all the processors. 3. Each processor partitions its sorted input according to the pivots and it sends $p-1$ portions to the others. 4. Each processor merges what it received from the others. Note that the sorting in step 1 can be bypassed but in this case the last step is a sort not a merge. Moreover note that there is only one communication step: the representative values can be selected by sampling few candidates at a cost much lower than the exchange of values. In other words, when a value moves, it goes to the final destination node in one step. Previous results and parallel execution time {#sec:previous} ============================================ Consider the simple problem of local sorting, such as presented in [@CG00a] (and our previous comments). The sizes $n_i$ of data chunks on each node is assumed to be proportional to the speed of processors. Let us now examine the impact on the parallel execution time of sorting of the initial distribution or, more precisely, the impact of the redistribution of data. We determine the impact in terms of the way of restructuring the code of the meta partitioning scheme that we have introduced above. In the previous section, when we had $N$ data to sort on $p$ processors depicted by their respective speeds $k1,\cdots,k_p$, we had needed to distribute to processor $p_i$ an amount $n_i$ of data such that: $$n_1 / k_1 = n_2 / k_2 = .....= n_p / k_p$$ and $$n_1 + n_2 + .... + n_p = N$$ The solution is: $$\forall i,n_i = N\times k_i / (k_1+k_2+ ...+k_p) %\begin{array}{rcl} %n_1 & = &N*k_1 / (k_1+k_2+ ...+k_p)\\ %%n_2 &= &N*k_2 / (k_1+k_2+ ...+k_p)\\ %\hdots & = & \dotfill\\ %n_p & = &N*k_p / (k_1+k_2+ ...+k_p)\\ %\end{array}$$ Now, since the sequential sorts are executed on $n_i$ data at a cost proportional $n_i\ln n_i$ time cost (approximatively since there is a constant in front of this term), there is no reason that the nodes terminate at the same time since $n_1/k_1\ln n_1 \neq n_2/k_2\ln n_2 \neq\cdots \neq n_p/k_p\ln n_p$ in this case. The main idea that we have developed in [@sbac04] is to send to each processor an amount of data to be treated by the sequential sorts proportional to $n_i\ln n_i$. The goal is to minimize the global computation time $T = \min (\max_{i=1, \ldots, p} n_i\ln n_i)$ under the constraints $\sum n_i = N$ and $n_i \geq 0$. It is straightforward to see that an optimal solution is obtained if the computation time is the same for all processors (if a processor ends its computation before another one, it could have been assigned more work thus shortening the computation time of the busiest processor). The problem becomes to compute the data sizes $n'_1,\cdots,n'_p$ such that: $$n'_1 + n'_2 + \cdots + n'_p = N$$ and such that $$\label{eq:equal} (n'_1/k_1)\ln n'_1 = (n'_2/k_2)\ln n'_2 =\cdots = (n_p'/k_p)\ln n'_p$$ We have shown that this new distribution converges to the initial distribution when $N$ tends to infinity. We have also proved in [@sbac04] that a constant time solution based on Taylor developments leads to the following solution: $$n_i = \frac{k_i}{K}N +\epsilon_i,\ \ \ (1\leq i\leq p) \ \mbox{where}\ \epsilon_i=\frac{N}{\ln N}\left[\frac{k_i}{K^2}\sum_{j=1}^p k_j\ln\left(\frac{k_j}{k_i}\right)\right]$$and where $K$ is simply the sum of the $k_i$. These equations give the sizes that we must have to install initially on each processors to guaranty that the processors will terminate at the same time. The time cost of computing one $k_i$ is ${\cal O}(p)$ and is independent of $n$ which is an adequate property for the implementations since $p$ is much lower and not of the same order than $n$. One limitation of above the technique is that we assume that the cost time of the code following the partitioning step should admit a Taylor development. We introduce now a more general approach to solve the problem of partitioning data in an heterogeneous context. It is the central part of the work. We consider an analytic description of the partitioning when the processors are uniformly related: processor $i$ has an intrinsic relative speed $k_i$. General exact analytic approach on uniformly related processors {#sec:analytic} =============================================================== The problem we solved in past sections is to distribute batches of size $N$ according to . We will first replace the execution time of the sorting function by a generic term $f(n)$ (which would be $f(n)=n\ln n$ for a sorting function, but could also be $f(n)=n^2$ for other sorting algorithms, or any function corresponding to different algorithms). We assume that $f$ is a strictly increasing monotonous integer function. We can with this consider a more general approach to task distribution in parallel algorithms. Since our processors have an intrinsic relative speed $k_i$, the computation time of a task of size $n_i$ will be $f(n_i)/k_i$. This (discrete) function can be extended to a (real) function $\tilde{f}$ by interpolation. We can try to solve this equation exactly through analytical computation. We define the common execution time $T$ through the following equation: $$T = \frac{\tilde{f}(n_1)}{k_1} = \frac{\tilde{f}(n_2)}{k_2} = \cdots = \frac{\tilde{f}(n_p)}{k_p}$$ and equation $$\label{eq:all} n_1 + n_2 + .... + n_p = N$$ Let us recall that monotonous increasing functions can have an inverse function. Therefore, for all $i$, we have $\tilde{f}(n_i)=T k_i$, and thus: $$\label{eq:ni} n_i=\tilde{f}^{-1}(T k_i)$$ Therefore, we can rewrite as: $$\label{eq:solveT} \sum_{i=1}^{p}\tilde{f}^{-1}(T k_i)=N$$ If we take our initial problem, we have only one unknown term in this equation which is $T$. The sum $\sum_{i=1}^{p}\tilde{f}^{-1}(T k_i)$ is a strictly increasing function of $T$. If we suppose $N$ large enough, there is a unique solution for $T$. The condition of $N$ being large enough is not a rough constraint. $\tilde{f}^{-1}(T)$ is the number of data that can be treated in time $T$ by a processor speed equals to $1$. If we consider that $\tilde{f}^{-1}(0)=0$ (which is reasonable enough), we obtain that $\sum_{i=1}^{p}\tilde{f}^{-1}(T k_i)=0$ for $T=0$. Having $T$, it is easy to compute all the values of $n_i=\tilde{f}^{-1}(T k_i)$. We shall show later on how this can be used in several contexts. Note also that the computed values have to be rounded to fit in the integer numbers. If the numbers are rounded down, at most $p$ elements will be left unassigned to a processor. The processors will therefore receive a batch of size $n_i=\left\lfloor\tilde{f}^{-1}(T k_i)\right\rfloor+\tilde{\delta_i}$ to process. $\delta_i$ can be computed with the following (greedy) algorithm: 1. Compute initial affectations $\tilde{n}_i=\left\lfloor\tilde{f}^{-1}(T k_i)\right\rfloor$ and set $\delta_i=0$; 2. For each unassigned item of the batch of size $N$ (at most $p$ elements) do: 1. Choose $i$ such that $(\tilde{n}_i+\delta_i+1)/k_i$ is the smallest; 2. Set $\delta_i=\delta_i+1$. The running time of this algorithm is $O(p\log p)$ at most, so independant of the size of the data $N$. Multiplicative cost functions ----------------------------- Let us consider now yet another cost function. $f$ is a multiplicative function if it verifies $f(x y)=f(x)f(y)$. If $f$ is multiplicative and admits an inverse function $g$, its inverse is also multiplicative: $$g(a b)=g(f(g(a))f(g(b)))=g(f(g(a)g(b)))=g(a)g(b)$$ If $\tilde{f}$ is such a function (e.g. $f(n)=n^k$), we can solve equation as follows: $$N=\sum_{i=1}^{p}\tilde{f}^{-1}(T k_i)=\sum_{i=1}^{p}\tilde{f}^{-1}(T)\tilde{f}^{-1}(k_i)=\tilde{f}^{-1}(T)\sum_{i=1}^{p}\tilde{f}^{-1}(k_i)$$ We can then extract the value of $T$: $$\tilde{f}^{-1}(T)=\frac{N}{\sum_{i=1}^{p}\tilde{f}^{-1}(k_i)}$$ Combining it with we obtain: $$n_i=\tilde{f}^{-1}(T k_i)=\tilde{f}^{-1}(T)\tilde{f}^{-1}(k_i)=\frac{\tilde{f}^{-1}(k_i)}{\sum_{i=1}^{p}\tilde{f}^{-1}(k_i)}N$$ Hence the following result: If $f$ is a cost function with the multiplicative property $f(a b)=f(a)f(b)$, then the size of the assigned sets is proportional to the size of the global batch with a coefficient that depends on the relative speed of the processor $k_i$: $$n_i=\frac{\tilde{f}^{-1}(k_i)}{\sum_{i=1}^{p}\tilde{f}^{-1}(k_i)}N$$ This results is compatible with the usual method for linear functions (split according to the relative speeds), and gives a nice generalization of the formula. Sorting: the polylogarithmic function case ------------------------------------------ Many algorithms have cost functions that are not multiplicative. This is the case for the cost $\Theta(n \log n)$ of the previous sequential part of our sorting algorithm, and more generally for polylogarithmic functions. However, in this case equation \[eq:solveT\] can be solved numerically. Simple results show that polylogarithmic functions do not yield a proportionality constant independent of $N$. ### Mathematical resolution for the case $n\ln n$ In the case $f(n)=n\ln n$, the inverse function can be computed. It makes use of the Lambert W function $W(x)$, defined as being the inverse function of $x e^x$. The inverse of $f:n\mapsto n\ln n$ is therefore $g:x\mapsto x/W(x)$. The function $W(x)$ can be approached by well-known formulas, including the ones given in [@CJK97]. A development to the second order of the formula yields $W(x)=\ln x-\ln\ln(x)+o(1)$, and also: $$\frac{x}{W(x)}=\frac{x}{\ln(x)}\frac{1}{1-(\ln\ln(x)/\ln(x))+o(1)}= \frac{x}{\ln(x)}\left(1+{\frac{\ln\ln(x)}{\ln(x)}}+{\mathcal O}\left(\left({\frac{\ln\ln(x)}{\ln(x)}}\right)^2\right)\right)$$ This approximation leads us to the following first-order approximation that can be used to numerically compute in ${\mathcal O}(p)$ the value of $T$: \[mytheo\] Initial values of $n_i$ can be asymptotically computed by $$\sum_{i=1}^{p}\frac{Tk_i+Tk_i\ln\ln(Tk_i)}{(\ln(Tk_i))^2}=N \text{ and } n_i=\frac{Tk_i+Tk_i\ln\ln(Tk_i)}{(\ln(Tk_i))^2}$$ Unknown cost functions ---------------------- Our previous method also claims an approach to unknown cost functions. The general outline of the method is laid out, but needs refinement according to the specific needs of the software platform. When dealing with unknown cost functions, we assume no former knowledge of the local sorting algorithm, just linear speed adjustments (the collection of $k_i$). We assume however that the algorithm has a cost function, i.e. a monotonous increasing function of the size of the data $C$.[^2] Several batch of data are submitted to our software. Our method builds an incremental model of the cost function. At first, data is given in chunks of size proportionnal to each node’s $k_i$. The computation time on node $i$ has a duration of $T_{n_i}$ and thus a basic complexity of $C(n_i)=T_{n_i}k_i$. We can thus build a piecewise affine function (or more complex interpolated function, if heuristics require that) that represents the current knowledge of the system about the time cost $n\mapsto C(n)$. Other values will be computed by interpolation. The list of all *known points* can be sorted, to compute $f$ efficiently. The following algorithm is executed for each task: 1. For each node $i$, precompute the mapping $(T,i)\mapsto n_i$ as previously, using interpolated values for $f$ if necessary (see below). Deduce a mapping $T\mapsto n$ by summing the mappings over all $i$. 2. Use a dichotomic search through $T\mapsto n$ mapping to find the ideal value of $T$ (and thus of all the $n_i$) and assign chunks of data to node $i$; 3. When chunk $i$ of size $n_i$ is being treated: 1. Record the cost $C=T_{n_i}k_i$ of the computation for size $n_i$. 2. If $n_i$ already had a non-interpolated value, choose a new value $C'$ according to whatever strategy it fits for the precise platform and desired effect (e.g. mean value weighted by the occurrences of the various $C$ found for $n_i$, mean value weighted by the complexity of the itemset, max value). Some strategies may require storing more informations than just the mapping $n\mapsto C(n)$. 3. If $n_i$ was not a known point, set $C'=C$. 4. Ensure that the mapping as defined by $n\neq n_i\mapsto C(n)$ and the new value $n_i\mapsto C'$ is still monotonous increasing. If not, raise or lower values of neighboring known points (this is simple enough to do if the strategy is to represent the cost with a piecewise function). Various heuristics can be applied, such as using the weighted mean value of conflicting points for both points. 4. At this point, the precomputation of the mappings will yield consistent results for the dichotomic search. A new batch can begin. The initial extrapolation needs care. An idea of the infinite behavior of the cost function toward infinity is a plus. In absence of any idea, the assumption that the cost is linear can be a starting point (a “linear guess”). All “linear guesses” will yield chunks of data of the same size (as in equation ). Once at least one point has been computed, the “linear guess” should use a ratio based on the complexity for the largest chunk size ever treated (e.g. if size $1,000$ yields a cost of $10,000$, the linear ratio should be at least $10$). A dynamic programming technique for non-uniformly related processors {#sec:dynamic} ==================================================================== In the previous sections we have developed new constant time solution to estimate the amount of data that each processor should have in its local memory in order to ensure that the parallel sorts end at the same time. The complexity of the method is the same than the complexity of the method introduced in [@sbac04]. The class of functions that can be used according to the new method introduced in the paper is large enough to be useful in practical cases. In [@sbac04], the class of functions captured by the method is the class of functions that admit a Taylor development. It could be a limitation of the use of the two methods. Moreover, the approach of [@sbac04] considers that the processor speeds are uniformly related, i.e. proportional to a given constant. This is a restriction in the framework of heterogeneous computers since the time to perform a computation on a given processor depends not only on the clock frequency but also on various complex factors (memory hierarchy, coprocessors for some operations). In this section we provide a general method that provides an optimal partitioning $n_i$ in the more general case. This method is based on dynamic programming strategy similar to the one used in FFTW to find the optimal split factor to compute the FFT of a vector [@FFTW05]. Let us give some details of the dynamic approach. Let $f_i(m)$ be the computational cost of a problem of size $m$ on machine $i$. Note that two distinct machines may implement different algorithms (e.g. quicksort or radix sort) or even the same generic algorithm but with specific threshold (e.g. Musser sort algorithm with processor specific algorithm to switch from quicksort to merge sort and insertion sort). Also, in the sequel the $f_i$ are not assumed proportional. Given $N$, an optimal partitioning $(n_1, \ldots, n_p)$ with $\sum_{i=1}^p n_i = N$ is defined as one that minimizes the parallel computation time $T(N,p)$; $$T(N,p) = \max \{{\vtop{\hbox{\hfill$f_i( n_i);\hfill$}\hbox{\raise 2pt\hbox{$\scriptstyle i=1,\ldots, p$}}}}\} = \min_{(x_1, \ldots, x_p)\in \mathbb{N}^p : \sum_{i=1}^p x_i = N} \max \{{\vtop{\hbox{\hfill$f_i(x_i);\hfill$}\hbox{\raise 2pt\hbox{$\scriptstyle i=1,\ldots, p$}}}}\}$$ A dynamic programming approach leads to the following inductive characterization of the solution:$\forall (m,i) \mbox{~with~} 0 \leq m \leq N \mbox{~and~} 1 \leq i \leq p: T(m,i) = \min_{n_i=0..m} \max ( f_i(n_i), C(m-n_i, i-1))$ Then, the computation of the optimal time $T(N,p)$ and of a related partition $(n_i)_{i=1,\ldots, p}$ is obtained iteratively in ${\cal O}(N^2.p)$ time and ${\cal O}(N.p)$ memory space. The main advantage of the method is that it makes no assumption on the functions $f_i$ that are non uniformly related in the general case. Yet, the potential drawback is the computational overhead for computing the $n_i$ which may be larger than the cost of the parallel computation itself since $T(N,p) =o(N^2p)$. However, it can be noticed, as in [@FFTW05], that this overhead can be amortized if various input data are used with a same size $N$. Moreover, some values $T(m,p)$ for $m \leq K$ may be precomputed and stored. Than in this case, the overhead decreases to $O\left(p.\left( \frac{N}{K}\right)^2\right)$. Sampling few values for each $n_i$ enables to reduce the overhead as desired, at the price of a loss of optimality. Experiments {#sec:experiments} =========== We have conducted experiments on the Grid-Explorer platform in order to compare our approach for partitioning with partitioning based only on the relative speeds. Grid-Explorer[^3] is a project devoted to build a large scale experimental grid. The Grid-Explorer platform is connected also to the nation wide project Grid5000[^4] which is the largest Grid project in France. We consider here only the Grid-Explorer platform which is built with bi-Opteron processors (2Ghz, model 246), 80GB of IDE disks (one per node). The interconnection network is made of Cisco switches allowing a bandwidth of 1Gb/s full-duplex between any two nodes. Currently, the Grid-Explorer platform has 216 computation nodes (432 CPU) and 32 network nodes (used for network emulation - not usefull in our case). So, the platform is an homogeneous platform. For emulating heterogeneous CPU, two techniques can be used. One can use the CPUfreq driver available with Linux kernels (2.6 and above) and if the processor supports it; the other one is CPU burning. In this case, a thread with high priority is started on each node and consumes Mhz while another process is started for the main program. In our case, since we have bi-opteron processors we have chosen to run 2 processes per node and doing CPU burning, letting Linux to run them one per CPU. Feedback and experience running the CPUfreq driver on a bi-processor node, if it exists, is not frequent. This explain why we use the CPU burning technique. Figure \[FIGONE\] shows the methodology of running experiments on the Grid-Explorer or Grid5000 platforms. Experimenters take care of deploying codes and reserve nodes. After that, they configure an environment (select specific packages and a Linux kernel, install them) and reboot the nodes according to the environment. The experiments take place only after installing this “software stack” and at a cost which is significant in term of time. {width="80mm"} \[FIGONE\] We have implemented the sorting algorithm depicted in subsection \[mysection\] and according to Theorem \[mytheo\] for the computation of the initial amount of data on each node for minimizing the total execution time. Note that each node generates its local portion on the local disk first, then we start to measure the time. It includes the time for reading from disk, the time to select and to exchange the pivots, the time for partitioning data according to the pivots, the time for redistributing (in memory) the partitions, the time for sorting and finally the time to write the result on the local disks. We sort records and each record is 100 bytes long. The first 10 bytes is a random key of 10 printable characters. We are compliant with the requirements of Minute Sort[^5] as much as possible in order to beat the record in a couple of weeks. We proceed with 50 runs per experiment. We only consider here experiments with a ratio of 1.5 between processor speeds. This is a strong constraint: the more the ratio is high the more the difference in execution time is important and in favor of our algorithm. So we have two classes of processor but the choice between the performance ($1$ or $1/1.5$) is made at random. We set half of the processors with a performance of $1$ and the remainder with a performance of $1/1.5$. We recall that the emulation technique is ’CPU burning’. Since we have observed that the communication time has a significant impact on the total execution time, we have developed two strategies and among them, one for using the second processor of the nodes. In the first implementation communication take place in a single thread that is to say in the thread also doing computation. In the second implementation we have created a thread for sending and a thread for receiving the partitions. We guess that the operating system allocates them on the ’second’ processor of our bi-opteron cards equiped with a single Gigabit card for communication. The input size is 541623000 records (54GB) because it provides about an execution time of one minute in the case of an homogeneous run using the entire 2Ghz. Note that it corresponds approximatively to 47% of the size of the 2005 Minute Sort record. We run 3 experiments. Only experiments A.2 et A.3 use our technique to partition the data whereas experiment A.1 corresponds to a partitioning according to the relative speed only. In other words, experiment A.1 corresponds to the case where the CPU burns X.Mhz (where X is either 1Ghz or 1/1.5 GHz) but the performance vector is set according to an homogeneous cluster, we mean without using our method for re-balancing the work. Experiment A.2 also corresponds to the case where communication are not done in separate threads (and thus they are done on the same processor). Experiment A.3 corresponds to the case where the CPU burns X Mhz (also with X is either 1Ghz or 1/1.5 GHz) and communication are done in separate threads (and thus they are done on separate processors among the two available on a node). We use the [pthread]{} library and LAM-MPI 7.1.1 which is a safe-thread implementation of MPI. A1 experiment A2 experiment A3 experiment --------------- --------------- --------------- 125.4s 112.7s 69.4s \[mytable\] sorting 54GB on 96 nodes is depicted in Figure 2. We observe that the multithreaded code (A.3) for implementating the communication step is more efficient than the code using a single thread (A.2). This observation confirms that the utilization of the second processor is benefit for the execution time. Concerning the data partitioning strategy introduced in the paper, we observe a benefit of about 10% in using it (A.2) comparing to A.1. Moreover, A.3 and A.2 use the same partitioning step but they differ in the communication step. The typical cost of the communication step is about 33% of the execution time for A.3 and about 60% for A.2. Conclusion {#sec:conclusion} ========== In this paper we address the problem of data partitioning in heterogeneous environments when relative speeds of processors are related by constant integers. We have introduced the sorting problem in order to exhibit inherent difficulties of the general problem. We have proposed new ${\cal O}(p)$ solutions for a large class of time complexity functions. We have also mentioned how dynamic programming can find solutions in the case where cost functions are “unrelated” (we cannot depict the cpu performance by the mean of integers) and we have reminded a recent and promising result of Lastovetsky and Reddy related to a geometrical interpretation of the solution. We have also described methods to deal with unknown cost functions. Experiments based on heteroneous processors correlated by a factor of 1.5 and on a cluster of 96 nodes (192 AMD Opteron 246) show better performance with our technique compared to the case where processors are supposed to be homogeneous. The performance of our algorithm is even better if we consider higher factor for the heterogeneity notion, demonstrating the validity of our approach. In any case, communication costs are not yet taken into account. It is an important challenge but the effort in modeling seems important. In fact you cannot mix, for instance, information before the partitioning with information after the partitioning in the same equation. Moreover, communications are difficult to precisely modelize in a complex grid archtitecture, where various network layers are involved (Internet/ADSL, high speed networks,…). In this context, a perspective is to adapt the static partitioning, such as proposed in this paper, by a dynamic on-line redistribution of some parts of the pre-allocated chunks in reaction to network overloads and resources idleness (e.g. distributed work stealing). [^1]: Work supported in part by France Agence Nationale de la Recherche under grants ANR-05-SSIA-0005-01 and ANR-05-SSIA-0005-05, programme ARA sécurité [^2]: If some chunks are treated faster than smaller ones, their complexity will be falsely exaggerated by our approach and lead to discrepancies in the expected running time. [^3]: See: [http://www.lri.fr/\~fci/GdX]{} [^4]: See: [http://www.grid5000.fr]{} [^5]: See: [http://research.microsoft.com/barc/SortBenchmark/]{} | Mid | [
0.5487528344671201,
30.25,
24.875
] |
Q: android debugger does not stop at breakpoints I am seeing debug statements in the console but the debugger does not stop on any breakpoints. I tried clearing all breakpoints and adding them back in. Not sure how this can happen but it is. A: If you use Android studio, click debug app instead of run app: A: Solution that worked for me: Simply uninstall the app from the device (manually on the device) and try debugging again(!) A: Have you set the debuggable flag in the AndroidManifest? If you miss that, do so by adding android:debuggable="true" in the application tag. It should look like that in the end: <application android:icon="@drawable/icon" android:label="@string/app_name" android:debuggable="true"> | Low | [
0.514606741573033,
28.625,
27
] |
Experience and Consciousness: Enhancing the Notion of Musical Understanding1 Adriana Renero SUMMARY: Disagreeing with Jerrold Levinson's claim that being conscious of broadspan musical form is not essential to understanding music, I will argue that our awareness of musical architecture is significant to achieve comprehension. I will show that the experiential model is not incompatible with the analytic model. My main goal is to show that these two models can be reconciled through the identification of a broader notion of understanding. After accomplishing this reconciliation by means of my new conception, I will close the paper by discussing some reasons to accept an enhancing notion of musical understanding that includes levels and degrees of understanding. KEY WORDS: Concatenationism, cognitive abilities, levels, degrees. Introduction Jerrold Levinson's central argument in Music in the Moment (1997) is that fundamental musical understanding can be achieved through the experience of listening to music in a certain way: specifically, in a concatenationist way; that is, listening to individual bits of a musical piece on the small-scale-just a few bars perhaps-and connecting present ones with previous and future ones. Levinson's concatenationism is erected against the traditional view, which holds that conscious awareness of broad-span musical form and of large-scale structural relationships is essential to understanding music.2 Despite his disagreement with this view, in order to explore the possibility that the organization of a musical piece on the large-scale, even if not an object of perception in itself, somehow 1 I am grateful to Jerrold Levinson for helpful comments on an earlier version of this essay. I am also grateful to the referees of the Journal Crítica for providing valuable comments that improved this paper. 2 As applied to the arts, "form", in general, is an important concept that refers to the shape, arrangement, relationship, or organization of the various elements. In music, the elements of form are rhythm, pitch and melody, dynamics, tone color, and texture. A musical work, such as a symphony, is formed or organized by means of repetitions of some of these elements and by contrasts among them. In this work, I refer to "form" when I say musical architecture, global form or large-scale musical structure. Nevertheless, it is important to remember that "a form" or "musical forms" refer to one of many standardized formal patterns, conventionally expressed by letter diagrams such as A B A and that are known as da capo form, fugue, sonata form, minuet form, theme and variations, rondo, among others (see Kerman 2000, pp. 39–41). 2 affects the listener's experience or helps achieve understanding, Levinson sets himself to qualify his own concatenationism in order to take large-scale characteristics into account. After exploring this modified view, Levinson concludes that intellectual apprehension and awareness of global form can only contribute to musical understanding to a relatively minor degree, not in any significant way. My goal in this paper is to explore the possibility of enhancing the general notion of musical understanding3 by considering two proposals which, if adopted, would lead to a reconciliation of those who claim that understanding is primarily achieved by the experience of listening and those who claim that understanding is primarily achieved through analysis and awareness of musical architecture, global form, and large-scale musical structure. I will argue that these two views about musical understanding are not mutually exclusive and will show a way in which both viewpoints can be reconciled. In fact, the awareness of musical form is not negligible in achieving musical understanding as Levinson supposes. On the contrary, it significantly enhances our musical understanding. As we will see below, this expanded notion of understanding is perfectly compatible with Levinson's qualified concatenationism. This essay has three sections: (1) in order to provide the most important aspects for the debate of the problem of musical understanding, I will outline central differences of the two views. (2) I will take Levinson's argument in Music in the Moment as an example of experiential model. I will explain his conception of musical understanding, and point out the main features of his concatenationism. (3) I will argue for my proposals to broaden the 3 Despite the fact that the notion of musical understanding can be applied to any musical genre, all musical examples in this work will be referred to tonal classical music or concert music, as we know it in the Western tradition. I do this in order to avoid the common fallacy of a number of authors that pick operas or other type of music associated to a text and supposedly analyze the musical qualities by themselves, while in reality they only attend to the narrative content provided by the text. 3 notion of musical understanding, and I will show that Levinson's qualified concatenationism is compatible with the enhanced understanding that I present. 1. Two Perspectives on Musical Understanding The problem posed by musical understanding has been discussed by philosophers of music such as Roger Scruton, Jerrold Levinson, Stephen Davies, Peter Kivy, Malcolm Budd and Mark DeBellis (a musicologist). The core of the problem can be seen by examining the two primary opposing positions: on the one hand, those who accept the necessity of an analytical capacity, conceptual and technical knowledge, and a consciousness of the musical structure as a necessary condition to understand music, on the other, those who argue that musical experience is a sufficient condition for achieving understanding through repeated listening whereby the dynamic musical forms and internal connections between the musical parts are intuitively detected, registered, and responded to. In this section, I will present those two perspectives stated more carefully. I will call these two positions the analytic model and the experiential model, respectively. Relying on C. Koopman and S. Davies (2001, pp. 266–68), I will now list some of the main differences between these two models, considering them in their purest form. Global vs. Local Focus: According to the analytic model, musical understanding is achieved by grasping the structural components of a musical work. A complete "view" of the work results from the identification of its parts, assuming they remain static and are not affected by the flow of time. On the contrary, experiential model, the musical process is grasped through a dynamic experience of music, which is apprehended as it happens in time through our ability to organize the various tones we listen to sequentially. The listener 4 reacts to a continual flow of events with a flow of corresponding responses. Reflective vs. Unreflective Listening: The analytic model depends on the listener having a reflective awareness of the work's form, on an intellectual approach to the work, and on his response being articulated propositionally. The experiential model does not look for such awareness since it considers it to be unnecessary. The listener's experience is sufficient to achieve musical understanding. Cognitive vs. Cognitive-Affective Bond: The analytic model is purely cognitive because it involves complex, intellectual mental processes, whereas the experiential model involves a cognitive-affective bond: In order to grasp a musical piece, the listener has to feel the musical progression. If the listeners lack the experience of feeling and listening to the musical sequences in tension and relaxation, they cannot understand the piece. External vs. Internal Perspective: In the analytic model, the listener's perspective is distanced from the musical work-the work is viewed from the outside. The listener in the experiential model is required to be involved with the work in order to understand it from the inside through an experience that involves him "empathically" with the musical piece. Coherence of the Whole vs. Coherence of Parts in Connection: On the analytic model, the listener is aware of connections (e.g., oppositions, elaborations, and reductions) that he detects in the musical score and can determine the coherence of a piece by means of the conventions of a certain style. In contrast, in the experiential model the listener grasps the music as a process that develops organically, in which each part is only tied to the previous one. In this way, the perception of the coherence of the piece is derived from the organic connection of its parts. For a more concrete view of these positions, the musicologist Mark DeBellis may serve as a 5 representative for the analytic model and Jerrold Levinson as one for the experiential model.4 DeBellis's central argument in Music and Conceptualization (1995, especially chapters 2 and 3) is that untrained listeners cannot follow a piece of music, its development and its fundamental structure. Hence, their experience of music is ineffable. This is supposed to imply an impoverishment of their understanding in comparison to trained listeners, who know how to conceptualize sounds in theoretical and technical terms. From the analytic perspective, knowledge and awareness of the musical structure is a necessary condition for understanding music. In contrast, Levinson maintains that in order to understand music, it is necessary to have a particular experience of listening. For the important thing on the experiential model is not what is listened to (i.e., what aspect of the overall structure), but how one listens; how unity and organization are perceived; the way in which a person listens to tones organized in a tonal system; how one appreciates and imaginatively participates in music; how one relates the preceding parts and anticipates the future ones. In sum, what matters is how we, as Roger Scruton says, transform our experience into an exercise, a practice, a habit (see Scruton 1997, Ch. 2). 2. Levinson's Concatenationism and Qualified Concatenationism The principal argument offered by Jerrold Levinson in Music in the Moment,5 is that a basic musical understanding is achieved in the experience of listening to music in a certain way. In particular, listening to individual bits of a musical piece, on a small-scale, and in the present time; i.e., aurally connecting present with previous and future bits, and where the 4 See also P. Kivy, 2001, pp. 183–217. To see reply to criticisms towards experiential model: J. Levinson, 1999, pp. 485–94, and S. Davies, 2007, pp. 25–79 who compares and criticizes both, DeBellis and Levinson. 5 An argument which may be traced basically to Edmund Gurney's music theory (The Power of the Sound, 1880). 6 decisive factor is the act of listening, when, in the exposition and repetition of a given piece, the listener responds to music. That is, when the listener follows and "makes sense" -i.e., connects present parts with previous and future ones-, reproduces -i.e., hums, whistles, sings, dances, etc.-, appreciates -i.e., perceives with attention-, esteems, and values the work, she understands it.6 Levinson writes, If basic musical understanding can be identified with a locally synthetic rather than a globally synoptic manner of hearing, then it is conceivable that with musical compositions, even complicated and lengthy ones, we miss nothing crucial by staying, as it were, in the moment, following the development of events in real time, engaging in no conscious mental activity of wider scope that has the whole or some extended portion of it as object. Of course it is rare that activity of that sort is entirely absent, but the point is that its contribution to basic understanding may be nil. (Levinson 1997, p. 29) It is important to be clear that by the adjective 'basic' in the phrase "basic musical understanding", Levinson means to convey that such understanding is essential to any apprehension of music, fundamental to any further musical understanding, and central to worthwhile musical experience of any kind. He does not mean to suggest that the understanding is simple, elementary, or rudimentary (cf. Levinson 1997a, p. 33). To exemplify the above view, take the famous opening motif of Beethoven's Symphony No. 5 in C Minor, Op. 67: {image here: Renero B. tiff.} It seems that the listeners do not need to be aware that the first movement is an Allegro con brio nor do they require consciousness of the Sonata Form structure of the whole movement, which is dominated by this rhythmic motif, in order to achieve basic understanding. Neither do they 6 The notion of musical understanding that Levinson (1996) maintains is closely related to music appreciation. Comprehension and appreciation cannot be divorced. To understand a musical work it is necessary to listen to it with a certain appreciation and enjoyment. For a position that doubts the felicity of the marriage between musical understanding and musical appreciation, see S. Davies (2007). 7 need to know that this motif forms the first theme in the exposition, initiates the bridge, appears as a subdued background to the lyrical and contrasting second theme, and emerges again in the cadence material. The listeners are not expected to be aware of things that could be observed in the score, like expansions of the motif in the development section, etc. In order to achieve a basic music understanding, they do not need to provide a technical explanation or conceptual description of exposition, development, or recapitulation as a large temporal span of the first movement. For Levinson, the listeners may achieve musical understanding if they are simply able to reproduce afterwards -hum, whistle, sing- the aforementioned motif. The listeners should be able to follow and recognize the motif as it undergoes numerous transformations throughout not only the first movement but the whole symphony, so that it would "make sense" to them. Most importantly, perhaps, the listeners should be able to perceive the intrinsic drama and emotional content that is conveyed by this simple motif in an astonishingly concise expression, which enables the composer to sustain high levels of tension based on different transformations of the motif. For Levinson, the fundamental thing is for the listener to detect and register the musical notes in the present and to perceive, through a constant and repeated audition, their interconnection, order and coherence, and to successively quasi-hear portions of a composition. Quasi-hearing, for Levinson, is "seeming to hear a span of music while strictly hearing, or aurally registering, just one element of it" (1997, p. 15, emphasis added). Quasi-hearing, claims Levinson, does not depend upon any conscious effort to keep before the mind the sound just heard, since an aural surrounding to the notes currently sounding constitutes itself automatically. The ear apprehends, vividly, in a musical unit that which goes beyond the sound "really" heard. Levinson's concept of musical understanding, employable by the "ordinary" or "common" listener, stands in opposition to the analytic 8 model, which traditionally argues for the need for a "learned" understanding only attainable by those with a trained ear, by those who can explain or describe the musical phenomena in terms of theoretical concepts, formal schemes, architectonical diagrams or synoptic representations. In the later chapters of Music in the Moment, Levinson develops what he calls a qualified concatenationism, which is an attempt to challenge his initial argument that listening is sufficient for understanding by making room for the awareness of the largescale musical form to play an important role in understanding and in affecting the listener's experience. Of possible ways to qualify his concatenationism, Levinson writes, Five possible grounds of qualification were addressed: (a) architectonic awareness's enhancement of the perceived impressiveness of individual bits; (b) architectonic awareness's enhancement of the perceived cogency of transitions between bits; (c) architectonic awareness's facilitation of quasi-hearing; (d) architectonic awareness's role in the perception of higher-order aesthetic properties; and (e) architectonic awareness's role as a source of distinct musical satisfactions, ones [which Levinson] characterize[s] as intellectual." (Levinson 2006a, p. 506) The first three grounds for qualification⎯(a), (b), (c)⎯are focused on the possible contribution of awareness of the architectonical form to the achievement of basic musical understanding. The last two⎯(d) and (e)⎯are focused on the direct role that might be played by such awareness in musical experience and understanding; i.e., of musical understanding of a more than basic sort (see Levinson 1999, p. 487). After exploring these qualifications and offering his qualified concatenationism, Levinson concludes that awareness of large-scale musical architecture only contributes to basic musical understanding in a small degree, and facilitates, but not in an important way, more-than9 basic understanding.7 Of this conclusion, he writes, But the plain truth is that to appreciate any music of substance, the thing to do is listen to it, over and over again. [...] Of course to experience the content of the music correctly, to respond to a piece as the piece it musicohistorically is, one must also have listened to and digested a lot of other music, in particular, that which forms the generative background to the piece in question. Still, listening is the key [...]. Contemplation of formal patterns, apprehension of spatial wholes, intellectual grasp of large-scale structural relations are of an entirely different, and lesser, order of importance. One can readily forgo them and still have entrée to the essential. (Levinson 1997, p. 174–5) 3. Supplementing Levinson's Notion of Musical Understanding There are two principal problems with Levinson's view: one concern his notion of musical understanding and the other is in regard to his concatenationism as a method of hearing. His notion of musical understanding is too narrow, and, although he provides a number of reasons to adopt his concatenationism as a plausible way to achieve a basic musical understanding, I will argue that any suitable listening technique must incorporate at least some aspects of the analytical model. Thus, the consequence of my proposals will be to bring about a broadening of the notion of musical understanding. I suggest that, 1. The sense of "understanding" used by both the experiential and analytic model must be clarified (Section 3.2.1.). This clarification will allow us to see that the models are complementary, not mutually exclusive, as our consciousness and capacity of analysis enhance our experience and enjoyment. (Section 3.2.2.) 2. Rather than insisting that the listener either achieves full musical understanding or none at all, it should be agreed that there are different levels and degrees of understanding that depend on many factors, such as the listener's mental 7 For an elaboration of the possibilities of qualified concatenationism and specific examples of each one of them, see Levinson, 1997, chapters 5–8. 10 abilities and the time invested in listening (Section 3.3.) As the notion of musical understanding is widened, we are able to prevent the seemingly inescapable dichotomy between the experiential model and the analytic model by resolving the disputes between them. I claim that both sides can agree on the usefulness of more precise definitions of different conceptions of musical understanding, and that my expansion of the notion of musical understanding is also an enhancement. My proposals, therefore, offer a better conception of musical understanding and provide a viable reconciliation between opposing views. 3.1 Problems with Levinson's Notion of Understanding Primarily, it is important to notice that there are at least three reasons to accept Levinson's concatenationst thesis: first, music is clearly listened to through time. It makes sense, then, that a musical work can be understood if listened to in time; the human ear can only grasp a piece if listened to in the present, moment by moment after all. Second, it is not even possible to perceptually apprehend a musical work in its totality. The human ear cannot apprehend "the whole" of a work or its large-scale architecture. It can only "build" the whole bit by bit. Third, because Levinson seems to be right when he claims that because music is internally synthesizable (by means of quasi-hearing), it is possible for the listener to "seemingly" apprehend the whole of a musical work, albeit progressively and never allat-once. Notwithstanding Levinson's intention of qualifying his simple concatenationism, I find a number of problems with his argument: (a) As already mentioned, his notion of understanding is too narrow because 11 Levinson a priori excludes awareness, knowledge, explanation, and description as necessary conditions for understanding music. (b) He commits himself to a false dichotomy between the analytic model and the experiential model, since, for him, only the latter is conducive to a basic musical understanding. (c) He fails to acknowledge that in order to enhance how one listens, it is important to know what one listens to. Our analytical capacity, conceptual and technical knowledge, and consciousness of what is listened to is non-negligible and plays a relevant role. 3.2 First Proposal: a Notion of Understanding Compatible with Concatenationism 3.2.1 Do the Experiential and Analytic Model Use the Same Definition of Understanding? Surprisingly, Levinson does not offer a definition of "understanding". If, as he states, musical understanding is not about formal analysis of a work, nor is it achieved through awareness of large-scale musical form, nor when the hearers are able to offer a causal explanation of the musical phenomenon or describe technically and conceptually that which they hear, what sense of "understanding" are we talking about? If understanding is achieved only through listening in a certain way, then analysis, awareness of the large-scale musical form, and the ability to explain and describe are neither necessary nor sufficient conditions for musical understanding. If awareness of the large-scale musical forms only minimally contributes to understanding, then we can be almost certain that understanding is not related to notions such as discernment, intelligence, or reason. On the contrary, the only decisive aspect of such an understanding is how we hear music⎯how we register certain aspects of the music and respond to them. Hence, 12 basic musical understanding is a species of knowing how, or procedural knowledge, not knowledge that, or propositional knowledge. Another distinction useful in discussions about musical understanding is between what to know and how to know (see Davies 1994, pp. 337–40). As I have mentioned, the former consists in a propositional knowledge, e.g., knowing that the tonic of Beethoven Symphony No. 3, Op. 55 Eroica is E flat major. Whereas the latter consists rather in the listeners' demonstrable abilities, e.g., how they are able to listen to and register how music unfolds in time and find expressivity, coherence, and unity in a piece (see Levinson 1997, p. 30). These experiences display many abilities of the listener: aural perception, detection of repetitions, anticipation and prediction, among others. Knowing how the music goes on, or "moves", is a way of listening in a concatenationist way rather than with the goal of finding true propositions about the music. The problem with the dichotomy presented by Levinson is that it does not acknowledge that both of these concepts are related: it is difficult to know how if we do not start by knowing what. We always start by knowing what an object is, and the way of knowing it or how to know it then strongly depends on that first knowledge. Take, for instance, the third movement of Brahms' Violin Concerto in D, Op. 77, allegro giocoso, ma non troppo vivace. Having precise information would certainly enhance our experience of following, reproducing and appreciating the piece⎯things we are meant to be doing on a concatenationist listening. Joseph Kerman's precise description clarifies my meaning: "[g]iocoso means 'jolly', that first theme in this rondo, A, has a lilt recalling the spirited gipsy fiddling that was popular in nineteenth-century in Vienna. The solo violin plays the theme (and much else in the movement) in double stops, that is, in 13 chords produced by bowing two violin strings simultaneously. Hard to do well, this makes a brilliant effect when done by a virtuoso" (Kerman 2000, p. 296). Numerous additional examples could easily be mentioned, such as, knowing that Berlioz's Symphony Fantastique is based on an idée fixe, which appears transfigured in each of the five movements of the symphony; the central part of the second movement of Beethoven's Eroica symphony is structured as a dramatic fugue; and so on. It is not obvious that a concatenationist listener could derive this relevant information that certainly enhances the musical understanding of the pieces simply by listening in the moment. Would it not be wise to offer a definition of basic musical understanding and clarify in what sense it is being used? In every area of philosophy, we are constantly trying to distinguish between kinds of understanding: e.g., it is not the same thing to understand a text, a human experience, a historical event, a logical formula, a fact or a causal relationship. In each of logic, epistemology and hermeneutics, the technical term understanding is generally used, but the uses often have subtle different senses. These differing senses are useful here, and I will borrow a few German terms to pick them out in what follows. Let us consider different senses of "understanding" that might be called, Verstehen, Verstand and Erklärung.8 Verstehen refers to the meaning of experience and alludes to a kind of grasping, as opposed to the understanding offered by the scientific explanatory method. Verstand means essentially intelligence, reason or judgment. And Erklärung refers 8 A number of traditions and authors who deal with the notion of "understanding" and "comprehension" stress their different uses. See, for instance, K. O. Apel and G. Wamke, 1984, Understanding and Explanation: A Transcendental Pragmatic Perspective, MIT Press, Cambridge, G. H. Von Wright, 2004, Explanation and Understanding, Cornell University Press, NY. Husserl uses Verstehen in his account of phenomenology as understanding the "lifeworld" or the things which we experienced (he took the term from Kant, as well as W. Dilthey and H.G. Gadamer) and Kant uses Verstand as a sense of understanding in his Critique of Pure Reason. 14 to explanation and is considered to be a way of apprehending objects because it suggests a kind of illustration of concepts in order to make them more understandable. Given these different senses of "understanding", the analytic model may be divided in two: if by "understanding" we mean Verstand, then the focus would be on understanding achieved through analysis, awareness and knowledge; if, on the other hand, we mean "understanding" in its Erklärung sense, then the understanding achieved when the hearer is able to give explanations of the musical form or of the structural coherence of the work is of the utmost importance. If we now suppose that the experiential model and basic musical understanding refer to Verstehen, while the analytic model and the understanding achieved in the explanation of the musical structure refer to Verstand and Erklärung, then there would be no place for any misunderstanding. Each model would refer to a different and complementary meaning of the term, understanding. Thus, we can disentangle the dispute between those who claim that understanding is reached through analysis and awareness of the musical form and those who claim that understanding is reached through the mere experience of listening. It is reasonable to infer that Levinson is thinking about the kind of understanding captured by Verstehen, since he emphasizes that understanding is achieved by apprehending; that is, in the experience of listening to music in a concatenationist way. However, he does not see that his basic musical understanding simply does not compete with understanding on the analytic model because different senses of "understanding" are in play. Levinson has suggested9 that these distinctions do not resolve the dispute because each of the parties already recognizes that there are different senses, meanings, or kinds of 9 Personal communication. 15 understanding involved, but disagree as to (a) their relative importance, and (b) their degree of dependence/independence of each other. However, I believe that this acknowledgement of different senses of understanding has not been clearly explained in the literature. Neither Levinson nor DeBellis-again, as representative thinkers of each camp⎯manifestly recognize different kinds of understanding as such. Thus, I disagree with point (a) because even Levinson, with his qualified concatenationism, concludes that awareness of largescale musical architecture contributes to basic musical understanding only in a small degree, and facilitates it, but not in an important way. Levinson practically excludes any contribution of the analytic model in his account of musical understanding: it makes no significant difference whether we say that the importance of awareness and an intellectual approach is irrelevant in order to achieve understanding or that it is relevant in such a minor degree. Both assessments imply that awareness is practically irrelevant. The same objection applies to point (b): for supporters of the experiential model, the recognition of the degree of dependence on analysis in the reaching of understanding is negligible. In fact, Levinson means to show that it is clearly independent from the process of reaching musical understanding. According to my view, however, when a listener hears music in a concatenationist way, it is desirable and useful for him to have knowledge of musical theory, technical vocabulary, awareness of musical forms, etc. in order to enhance his musical understanding and articulate more accurately his experience. In short, if we assume that Levinson primarily uses this limited sense of understanding, it is unnecessary for him to reject the analytic model view because it is compatible with his own view. Basic musical understanding would constitute only one specific "type" of understanding. 16 3.2.2. Why is it Useful to Find a Sense of Understanding Compatible with Concatenationism? Another way to look for a sense or meaning of "understanding" compatible with concatenationism is by treating it as a correspondence between the experiential sphere and the cognitive sphere; i.e., by allowing for reconciliation between both views presented.10 To broaden the notion of musical understanding, making the analytic and experiential models complementary, we must accept that, included in the mental abilities of the hearer, are those held to be important by the analytic model; i.e., categorization, conceptualization, analytical evaluation, description, etc. In the framework of a basic musical understanding, then, it would be essential to allow for these abilities' being important. Even if we do not consider them sufficient, we have to admit that knowledge, awareness, and other abilities are relevant to understanding music, and are more closely linked to experience of listening than Levinson thinks. At this point, it is important to make two observations. First, let us not claim that Levinson already holds a compromise view between the experiential model and the analytic model simply because his view refers to a cognitive-affective bond. Levinson only acknowledges that the experience of listening implies a relation between that which we perceive, attend to, imagine, and that which we sense, enjoy, appreciate. It is also important to notice that he allows only for certain cognitive abilities to play a role in the reception of music. For example, he does not consider crucial some of the abilities Roger Scruton does 10 I am aware that it might be objected that my argument implies the necessity and sufficiency of the analytic model for achieving basic musical understanding. Even though that is not so, it could be asked if my proposals do not invalidate at least the concatenationst view. In what follows, I will show that it would not only not be invalidated, that it would be usefully broadened. 17 (1997 and 1974). He does not allow the abilities of describing-at least metaphorically-or explicitly locating certain elements in organization to play much of a role. The next quotations illustrate these points: Those who propose the ability to offer descriptions of music as prerequisite to basic musical understanding make two mistakes: first, the representations in terms of which music is grasped may be not articulate in nature; second, even if they were, being able to access them after listening so as to produce descriptions of the music would at most be evidential, but neither necessary nor sufficient, for having had a hearing experience of the right sort (Levinson 1997, x–xi). [T]he point is that gratifying impressions of familiarity, unity-through-change, and the like require no conscious reflection on where or when some musical material was previously encountered, no active appreciation of the pattern of events, thematic or harmonic, as a whole. (Levinson 1997, p. 82). Qualified concatenationism claims that the intellectual pleasure obtained from apprehending musical form in a large-scale (a) is unnecessary to achieve basic musical understanding because it aims at an object different from that at which basic understanding aims⎯the experiential model points toward a musical work of art, whereas the analytic model directs listeners at a sound phenomenon open to analysis and explanation; (b) is not comparable with the pleasure obtained in the experience of listening, which of course involves awareness not of global form but of local form (see Levinson 1996, pp. 56–66), as well as of the expressive content which results or emerges from evolving form. We should keep in mind that Levinson distinguishes the pleasure obtained through an intellectual approach to music from the aesthetic pleasure obtained through the experience of listening. I emphasize this because the pleasure obtained in concatenationist listening implies awareness of the individual bits one listens to and what they express; that is, the conjunction of content and form. Still, this does not mean that Levinson accepts the importance of an intellectual approach to music. 18 In searching for a sense of "understanding" compatible with concatenationism, I have tried to argue for the possibility of the analytic and experiential models complementing, not excluding, one another. Both approaches to music can coexist and give feedback to one another since understanding has to do with perceiving or grasping the meaning of something, but also with conceptualizing and describing how, e.g., musical notes spread in time and how we find or identify their expressiveness. In support of this position, I propose a few possibilities, but do so while keeping in mind that Levinson is reacting against the views of those who plead for the analytic model; that is, while defending the "common" listener, who has no previous training in the matter and, even so, can achieve musical understanding. Now, my first claim is that even if we are radical supporters of the experiential model, we have to acknowledge and admit the importance of analysis and awareness of form, even in the small-scale, not only to conceptualize, identify, describe, but to follow, link and reproduce the different bits. To follow, link and reproduce, they who listen in the moment need a certain awareness and a more complex mental process to come into play; that is, to identify certain notes or individual bits and be able to follow them, the inexperienced listener must essentially hear with an awareness of time and space or of the moment in which the bits go by. What would happen to concatenationism if parts of the analytic model were accepted in order to achieve musical understanding? Would the experiential model cease to be concatenationist? Focusing on the second possibility in what follows, I will try to demonstrate that awareness enhances our experience and, therefore, our musical understanding. My second claim is that if we accept that the human ear can detect certain elements of the music's organization or coherence (by means of apprehending the musical relationships of bits on the small-scale and moment by moment, as Levinson proposes), I 19 believe that the concatenationist method does not prevent the listener from developing a detailed analysis of bits of the musical structure in order to be aware of the technical scope of a work. Likewise, our awareness, knowledge and analysis of the musical form do not subtract anything valuable from our experience. In fact, the listener would not cease to have the experience of listening, or cease to pay attention to and minutely analyze what he listens to at each moment in a concatenationist manner. In this way, he could complement his experience with an analysis and achieve an enriched basic musical understanding. For instance, any person can experience when sound goes from loud to soft. If a listener were aware of many different gradations that exist in an actual piece of music or passage, though, the experience of the passage would be enriched. If we listen to-in a concatentationist way-the beginning of the Smetana's Overture to The Bartered Bride and reflect on dynamics, we find: 0'00": opening outburst, full orchestra, fortissimo. 0'11": Sudden change to quiet rustling produced by violins, subito piano. 0'24": Three appearances of a short, gruff bit of music spaced out from one another, each forte. 1'14": Crescendo. 1'19": Culmination in a rowdy dance, the polka, fortissimo again. 1'22": Return to the quiet rustling, mezzo forte.11 Our experience of this piece would be enhanced if we were to reflect on concepts and analysis during a concatenationist hearing. Following the last example, having the experience of the music and understanding it has not only to do with its expressivity due to its dynamics, but also with our consciousness, analysis and technical knowledge of those properties that enhance our understanding. In other words, we have good reasons to accept that the experiential and analytical models are compatible, and that their combination 11 J. Kerman develops an interesting analysis of listening to Smetana's Overture to The Bartered Bride, in Kerman, et. al., 2000, p. 4. 20 results in a more complete musical understanding. That is, first, that the listener has a certain awareness of the notes related with dynamics that he or she listens to in a precise moment. Second, that the listener is able to conceptualize, in a certain way, some individual parts in order to focus on and listen to aspects in progress of various music passages. This listening to the dynamics and analyzing them does not reduce our experience, but on the contrary, strengthens it. Levinson has objected to my considerations by saying that this would not be basic musical understanding obviously, but rather "higher" or non-basic musical understanding. I agree that mine would be an enhanced notion of musical understanding. Nevertheless, following Levinson's own thought on the subject, the term 'basic' in "basic musical understanding" such as he defines it does not mean elemental, but rather fundamental for any further understanding: by "the adjective 'basic' [...] I mean to convey that such understanding is essential-to any apprehension of music-, fundamental-to any further musical understanding-, and central-to worthwhile experience of any kind-but not that it is simple, or elementary, or rudimentary" (Levinson 1997, p. 33). Now the question is whether or not my sense of musical understanding is compatible with Levinson's qualified concatenationism? He reflected on the possibilities of the awareness of the large-scale musical form facilitating or contributing to the hearing or quasi-hearing. However, awareness, analysis and technical knowledge of the form in a small-scale-note by note or moment by moment-would allow for a legitimate qualified concatenationism. I think we have good reasons to admit that the analytic model and the experiential model do complement each other, if we now accept that both possibilities are relevant for a broader musical understanding. I claim that (1) finding a meaning of musical understanding compatible with 21 concatenationism may clarify the position that we as listeners, proponents of the analytic model or the experiential model, philosophers or musicologists want to hold, and that because it resolves the false dichotomy between what is and what is not understanding, it is even more worthwhile to do so; (2) adopting the Verstehen meaning for the basic musical understanding proposed by Levinson shows a way out of the disputes with the supporters of the analytic model; and (3) using qualified concatenationism as a plausible way of understanding music through analysis, technical knowledge and awareness of the smallscale form significantly complements understanding achieved through experience. There is no way of proving that the mechanisms employed by the analytic model and the experiential model are as independent in the act of listening as the debate assumes. If I, as a "common" listener, hear constantly and repeatedly the same piece, even though my first approach was without awareness or knowledge of the musical form, after many times, a moment will arrive in which I detect certain aspects of the form⎯through listening I will be able to deduce certain musical features constitutive of the structure. How much does this contribute to my understanding though?12 Levinson would say that it is generally very little. Nevertheless, my goal is to enhance basic musical understanding beyond simple temporal order and to show that musical satisfaction with a piece is relevant to our experience of listening to music. I think that as much as we can detect and deduce constitutive elements, our satisfaction in listening to music piece will be greater. Moreover, I claim that the idea of musical architecture or musical form not only is related with the analytical, but also with experiential model. We can experience form through short phrases and by following their repetitions and contrasts, which eventually provide us a microcosm of musical form. Kerman is right when he maintains that a large- 12 A question raised by Levinson in a personal communication. 22 scale composition like a symphony is something like a greatly expanded tune, and its form is experienced in basically the same way. Form in art also has a good deal to do with is emotional quality: it is a mistake to consider form as merely structural or intellectual matter. Think of the little (or big) emotional "click" we get at the end of a limerick, or a sonnet, where the accumulated meanings of the words are summed up with the final rhyme. This is an effect to which form -limerick form or sonnet form- contributes. Similarly, when at the end of a symphony a previously heard melody comes back, with new orchestration and new harmonies, the special feeling this gives us emerges from a flood of memory; we remember the melody from before, in its earlier version. That effect, too, is created by musical form (Kerman 2000, pp. 39–40). Regardless of whether or not you are an ordinary listener, without knowledge, large-scale form-awareness, or ability in analysis, after constantly and repeatedly listening, it is impossible not to go through cognitive processes which involve mental representations of the music. Even though such representations are not directly observable, we infer their existence and nature until we notice them, hear them, memorize them and reproduce them. Finally, there is not an explicit divorce between the technical and the non-technical in music⎯between the form and the features of the form. The simple act of constantly and repeatedly listening will eventually produce knowledge of the structural and technical features of the music and of its global form.13 As Sloboda argues, evidence suggests that listeners without musical training do have an implicit knowledge of that which musicologists can talk about explicitly (1997, p. 3). 3.3 Second Proposal: Accepting Levels and Degrees of Musical Understanding If the false dichotomy between the experiential model and the analytic model is removed, 13 For an interesting discussion about a right listener's background of knowledge and practice, see J. Levinson, 1990. See also P. Kivy 1990, S. Davies 1994, and R. Scruton 1997, all of which include extended discussion of this topic. 23 several shades of understanding can be now appreciated. It is possible to see that there is not only one way of understanding music, but rather there are several levels, degrees and aspects of understanding. My second proposal is that inside one basic musical understanding there is room to distinguish between levels and degrees of understanding. Why would distinguishing levels and degrees of understanding within basic musical understanding be plausible? Levinson himself sheds light on this when (a) he argues that the hearer's abilities to follow and reproduce are a compelling sign of musical understanding and can be obtained through an attentive act of-concatenationist- listening; and (b) when he observes that basic musical understanding can be achieved when the hearer listens to a musical piece closely and repeatedly; i.e., when the hearer positions himself in the right music-historical space and listens with attention, constancy and repetition to a piece until he becomes very familiar with it. From this, I infer that levels and degrees of understanding can be explained as follows: (a) One aspect of a listener's understanding accords with his mental abilities; e.g., ceteris paribus understanding is not the same with a hearer who identifies the instruments in Smetana's Overture and the different tone colors at each moment, as with a hearer who hardly distinguishes between string instruments. These listeners both achieve understanding, but at different levels. Consider another section of The Bartered Bride Overture as heard by a listener who can differentiate instrumental tone colors. He or she will listen to the passage and experience the music's flow with the tone color changing every five seconds or so and the theme changing suddenly when it is played by different instruments, each with its own characteristic tone color. The listener would hear something like, at 2'59" there are three 24 drum strokes and an outburst: timpani, then massed woodwinds. 3'04": Part 2 of the outburst theme-massed string instruments, timpani. 3'09": Quiet rustling, violins playing together. 3'11": The theme, four spurts of music, violas. 3'16": Theme again, this time carried by a clarinet. 3'21": Third theme, two flutes. 3'26": Theme, fourth time: oboe with a bassoon below. 3'40": So many instruments are playing that tone colors are hard to distinguish (see Kerman 2000, p. 5). Here we have a different level of understanding than that achievable by someone who cannot distinguish between tone colors. (b) Another aspect of a listener's understanding accords with the time and constancy spent in hearing; e.g., ceteris paribus understanding is not the same for a hearer who attentively listens to Bruckner's Eighth Symphony twice a week for a year and for one who listens to it twice in a year. Both of them can achieve a basic musical understanding, but different degrees of it. In this respect also, every time we hear the symphony, we find different properties and qualities of the musical work. Our ear becomes more acute and sophisticated and we understand the piece to a more complex degree. For example, the listeners can identify the accompaniment of tremolando strings in the scherzo, pulsating string chords in D flat, over which violins have an expressive hymn-like theme in the adagio. Alternatively, more generally they notice the themes to which a movement returns, phrase repetitions, as well as apprehending the theme's articulation. We can justify the proposal for identifying different levels of understanding as follows:14 We know that concatenationst listening implies attention to the musical present, but there are other elemental aspects to which the hearer must pay attention. In order to 14 See (Davies 2007, pp. 25–79). 25 understand, the hearer should be able to: distinguish music from non-musical noise or from sounds unconnected with the piece; recognize when a piece is beginning and when it is coming to a close, so that they can tell when a performance breaks down or stops unexpectedly; recognize repetitions, where and when they occur, and be able to identify the earlier themes even if the repetition is not exact; register the waxing and waning of musical tension and movement and the expressive character of the music; predict how the music will continue and distinguish between an unanticipated but appropriate continuation and a performance blunder; experience the music as unfolding in a "logical" way. Most of these capacities can be characterized in a concatenationist way. Hence, it is not possible to believe that every listener has the same ability to listen to music. So, although it would be difficult or impossible to exactly measure and quantitatively determine someone's level of musical understanding, we can accept that not everybody achieves the same basic musical understanding, even if we are listening to music in a concatenationist way. As for the time and effort spent listening, (b), Levinson sheds light on the possibility of identifying degrees of understanding. If he does not make this suggestion explicitly, he at least implies it when he emphasizes the importance of listening closely and repeatedly to a music piece. How long must one listen before achieving basic musical understanding? It depends on many factors. For example (differing from Levinson) Davies correctly emphasizes the importance of the preparation of the appreciative musical listener, which cannot rest alone with what he can grasp unreflectively, simply by attending to music. He also stresses that, in order to reach a deeper understanding, the hearer needs certain information⎯some idea of the course of music history, genres and styles, etc. (Davies 26 2007, pp. 25–79).15 It is not easy to reach consensus as to when the hearer achieves a certain degree of understanding, how to measure the degree of understanding achieved, or what exactly is a degree. I accept this difficulty, as it is also difficult to determine somebody's knowledge of music, or how well listeners can analyze a work. Nevertheless, I still think that we can admit knowledge as well as degrees, and that we can regard as an important variable to enhanced musical understanding the time that the hearer devotes to listening-even though listening twice as many times certainly does not guarantee twice the understanding. Musical understanding is not the same for everybody: there are different levels and degrees of understanding since listeners apprehend different "parts of musical meaning" according to their abilities of listening and the time they spend on it. One of these parts is related to the purely internal connections of the music, its kinetic and dynamic content, and the other part has to do with the expressive elements of the music, its emotional and dramatic content.16 In this sense, basic musical understanding permits a grasp of both musical movement and extramusical expression. In such a way, basic musical understanding is correlative with basic musical meaning. Finally, let me suggest that qualified concatenationism considered as a tool for listening and achieving a basic musical understanding, can do the work that an intellectual approach requires: we can know, analyze and be aware of the small-scale form, and we can infer the large-scale form from this. Qualified concatenationism also answers the requirements of levels and degrees of musical understanding, and it would be possible to achieve basic musical understanding notwithstanding the mental states in which we 15 Levinson calls a listener's background formation in his "Musical Literacy", ibid. 16 Levinson (1997, p. 34) supports this idea from the argument of Roger Scruton: "Notes on the Meaning of Music" (1993). 27 approach a work, or what purposes we pursue by listening to it. The full details of how qualified concatenationism can pull this off, however, must be postponed to a later work. Conclusion In this paper, I have agreed that the idea of concatenationism is a very convincing way of hearing music. Drawing on a qualified version of concatenationism, I explored the possibility of expanding the notion of musical understanding by means of two proposals which led to a resolution of the disagreement between those who claim that understanding is achieved by the experience of listening and those who claim that understanding is achieved through analysis and awareness of musical architecture or large-scale musical structure. I argued that there is no real dichotomy between the experiential model and the analytic model, and I showed a way in which aware and analytical understanding can not only complement our experience of music, but also allow us to enhance this understanding. The new view that I presented in this paper not only captures important parts of what both models originally had in mind, but also gives a more accurate picture of the process of listening with understanding. "Understanding" implies a complicated mix of the three senses that I explained (Verstehen, Verstand and Erklärung), and neither the analytic nor the experiential model had recognized this. Given that, the three aspects of "understanding" are there and are important for basic musical understanding; both the development of complex mental processes, including the conscious effort to connect fragments of music and the repeated listening can contribute to increase our understanding. Thus, in order to broaden Levinson's notion of music understanding, I proposed that levels and degrees of understanding could be defined in reference to mental abilities, and to the time and dedication spent in hearing, respectively. Regarding these points, 28 Levinson's qualified concatenationism, besides being a very useful way of listening to music and experiencing it, is already compatible with the enhanced understanding that I have presented. REFERENCES Davies, S., 2007, "Musical Understandings", in A. Becker and M. Vogel (eds.) Musikalischer Sinn: Beiträger zu einer Philosophie der Musik, Suhrkamp, Frankfurt. -----, 2003, Themes in the Philosophy of Music, Oxford University Press, Oxford. -----, 2001, Musical Works & Performances, a Philosophical Exploration, Oxford University Press, Oxford. -----, 1999, "Review of Music in the Moment", The Philosophical Quarterly, 19, pp. 403– 405. -----, 1994, Musical Meaning and Expression, Cornell University Press, Ithaca. DeBellis, M., 2005, "Conceptual and Nonconceptual Modes of Music Perception", Postgraduate Journal of Aesthetics, 2 (2), pp. 45–61. -----, 1995, Music and Conceptualization, Cambridge University Press, Cambridge. Kerman, J., et al., 2000, Listen, Bedford/St. Martin's, Boston. Kivy, P., 2001, "Music in Memory and Music in the Moment" in New Essays on Musical Understanding, Oxford University Press, Oxford. -----, 1990, Music Alone. Philosophical Reflection on the Purely Musical Experience, Cornell University Press, Ithaca. Koopman, C. and Davies, S., 2001, "Musical Meaning in a Broader Perspective", The Journal of Aesthetics and Art Criticism, vol. 59, no. 3, pp. 261–273. Levinson, J., 2006a, "Concatecionism, Architectonism, and the Appreciation of Music", Revue International de Philosophie, Université Libre de Bruxelles, vol. 60, no. 238, pp. 505–514. -----, 2006b, "Musical Expressiveness as Hearability-as-Expression", Contemplating Art, Oxford University Press, Oxford. -----, 1999, "Reply to Commentaries on Music in the Moment", Music Perception 16, pp. 485–494. 29 -----, 1997, Music in the Moment, Cornell University Press, Ithaca. -----, 1996, The Pleasures of Aesthetics, Cornell University Press, Ithaca. -----, 1990, "Musical Literacy", Music, Art and Metaphysics, Cornell University Press, Ithaca. Scruton, R., 2007, "In Search of the Aesthetic", British Journal of Aesthetics, vol. 47, no.3, pp. 232–250. -----, 2004, "Wittgenstein and the Understanding of Music", British Journal of Aesthetics, vol. 44, no.1, pp.1–9. -----, 1998, The Aesthetic Understanding: Essays in the Philosophy of Art and Culture, St. Agustin's Press, Indiana. -----, 1997, The Aesthetics of Music, Oxford University Press, Oxford. -----, 1993, "Notes on the Meaning of Music," in Michael Krausz (ed.) The Interpretation of Music: Philosophical Essays, Oxford University Press, Oxford. -----, 1974, Art and Imagination, Methuen and Co., London. Sloboda, J., 1997, "Listening to music", The Musical Mind: The Cognitive Psychology of Music, Oxford University Press, Oxford. | Mid | [
0.649789029535864,
38.5,
20.75
] |
Metal-insulator-metal (MIM) capacitors and metal-oxide-metal (MOM) capacitors are among the most widely used capacitors in integrated circuits. FIG. 1 illustrates a typical MIM capacitor, which includes bottom plate 2, top plate 6, and insulation layer 4 therebetween. The bottom plate 2 and top plate 6 are formed of conductive materials. As is known in the art, the capacitance of a capacitor is proportional to its area and the dielectric constant (k) of the insulation layer, and is inversely proportional to the thickness of the insulation layer. Therefore, to increase the capacitance, it is preferable to increase the area and the k value and to reduce the thickness of the insulation layer. However, the thickness and the k value are often limited by the technology used for forming the capacitor. For example, the thickness cannot be less than what the existing technology allows. On the other hand, since the capacitors are often formed in low-k dielectric layers, the ability to increase the k value is also limited. Methods for increasing the area of the capacitor have been explored. A problem associated with increasing area is that greater chip area is required. This dilemma is solved by the introduction of vertical (multi-layer) capacitors. A typical vertical MOM capacitor 10 is shown in FIGS. 2, 3, and 4. FIG. 2 illustrates a perspective view of MOM capacitor 10, which includes metal electrodes 12 and 14 separated by dielectric materials. Each of the metal electrodes 12 and 14 forms a three-dimensional structure. For clarity, metal electrode 12 is not shaded, while metal electrode 14 is shaded with dots. Each of the metal electrodes 12 and 14 includes more than one layer interconnected by vias. FIG. 3 illustrates a top view of a first metal layer (please refer to the middle layer in FIG. 2). Metal electrode 12 includes fingers 122, and bus 121 for interconnecting fingers 122. Metal electrode 14 includes fingers 142, and bus 141 for interconnecting fingers 142. Fingers 122 and 142 are placed in an alternating pattern with a very small space between the neighboring fingers. Therefore, each finger 122/142 forms a sub capacitor(s) with its neighboring fingers 142/122 or a bus 141/121. The total capacitance is equivalent to the sum of the sub capacitors. FIG. 4 illustrates a top view of the capacitor 10 in a second metallization layer (refer to the top or the bottom layer in FIG. 2), which overlies the bottom metallization layer. Typically, the direction of the fingers in the second metallization layer is orthogonal to the direction of the fingers in the bottom metallization layer. Similarly, electrodes 12 and 14 in the second metallization layer include buses 121 and 141 and a plurality of fingers 122 and 142, respectively. Typically, buses 121 in all the layers have similar shapes and sizes and are overlapped vertically. Buses 141 in all the layers also have similar shapes and sizes and are overlapped vertically. Vias 16 connect buses 121 in the first and the second metallization layers, thereby forming an integral electrode 12. Similarly, vias 18 connect buses 141 in neighboring layers, thereby forming an integral electrode 14. To further increase the capacitance of MOM capacitors, the regions underlying the bottom metallization layer were also used to form a layer of the MOM capacitors. The resulting structure is similar to the structure as shown in FIG. 2, except that layer 1 of the MOM capacitor 10 is now formed in an inter-layer dielectric layer. Referring back to FIG. 3, in this case, electrodes 12 and 14 are formed of doped polysilicon, and layers 1 and 2 are interconnected by contact plugs, instead of vias. The introduction of the polysilicon MOM layer results in the increase in capacitance of the MOM capacitors. However, the use of polysilicon causes the degradation of the high-frequency response of the MOM capacitors, particularly at frequencies of about 1 GHz or higher. For example, the Q-factors of the capacitors having polysilicon layers may be degraded by about 74% compared to the MOM capacitors that have all layers formed of metals. Accordingly, new structures and manufacturing methods are needed to take advantage of the increased capacitance by forming a capacitor layer underlying the bottom metallization layer, without sacrificing high-frequency response. | High | [
0.665116279069767,
35.75,
18
] |
Today, some software applications provide quick response interfaces that provide software functions built around immediate and obvious context. For example, if a user is viewing a home screen on their device and a short message service (“SMS”) message arrives, the SMS message might appear in a popup with a text entry field through which the user can provide a quick response or can select a “close” box to dismiss and ignore the SMS message. However, there is an obvious proximate event and application in this scenario (i.e., the arrival of a message in an SMS application), a known address to reply to, and two high likelihood actions that are elevated to the user interface—more specifically, to respond or to dismiss the SMS message, with other options such as file-in-a-folder or delete not rising to the level of a common action deserving user interface attention. The SMS application relies on the context of an incoming SMS message to be aware that text entered by the user is relevant to the received SMS message. Without such context, the SMS application is unable to know that text entered by the user relates to the SMS application or whether the text might be relevant to a completely different application. Contextual interpretation of increasing amounts of data has been used in other settings to guide increasingly accurate decisions in a search function. For example, some operating systems, such as APPLE OS X, have a global search function in which a user begins typing a string of characters and an instantaneous list of candidates narrows down to a set of selectable locally or cloud-stored documents, emails, media files, and the like with filenames or content that contain the characters. GOOGLE provides a similar search function in which a user begins typing a search string and an instantaneous list of suggestions narrows down from which the user can select an expanded string to avoid further typing. However, both of these solutions already assume an action. In APPLE OS X, the search primarily seeks to “open” a file that has attributes closely matching the search string. The search function provided by GOOGLE primarily seeks to search the World Wide Web using a string. Contextual interpretation that refines the choice of messaging applications also exists today. A generic messaging application might accept multiple destination addresses and/or attachments. Upon receiving multiple addresses or attachments that preclude use of SMS and require use of multimedia message service (“MMS”), the messaging client might make a determination that MMS should be used, and might notify the user that such a decision is being made in order to satisfy the implicit request and approval embodied in the provided content. | Mid | [
0.618181818181818,
34,
21
] |
Q: Why isn't the tkinter window showing? I try to build a student management system while this tkinter window does not show after running following code. Can someone give some advice here? This is public source code from youtube chanel. from tkinter import * from tkinter import ttk class Student: def __init__(self,root): self.root=root self.root.title("student management system") self.root.geometry("1350*700+0+0") title=Label(self.root,text="Student Management System",bd=10,relief=GROOVE,front=("time new roman",40,"bold"),bg="yellow",fg="red") title.pack(side=TOP,fill=X) Manage_Frame=Frame(self.root,bd=4,relief=RIDGE,bg="crimson") Manage_Frame.place(x=20,y=70,width=450,height=560) #========Massage Frame=============================== Manage_Frame=Frame(self.root,bd=4,relief=RIDGE,bg="crimson") Manage_Frame.place(x=20,y=100,width=450,height=560) m_title=Label(Manage_Frame,text="Manage Students",bg="crimson",fg="white",front=("time new roman",30,"bold")) m_title.grid(row=0,columnspan=2,pady=10) lbl_roll = Label(Manage_Frame, text="Roll No.", bg="crimson", fg="white",front=("time new roman", 20, "bold")) lbl_roll.grid(row=1, colum=0, pady=10,padx=20,sticky="w") txt_roll = Entry(Manage_Frame,front=("time new roman", 15, "bold"),bd=5,relief=GROOVE) txt_roll.grid(row=1, colum=2, pady=10, padx=20, sticky="w") lbl_name = Label(Manage_Frame, text="Name", bg="crimson", fg="white", front=("time new roman", 20, "bold")) lbl_name.grid(row=1, colum=0, pady=10, padx=20, sticky="w") txt_name = Entry(Manage_Frame, front=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_name.grid(row=2, colum=1, pady=10, padx=20, sticky="w") lbl_Email = Label(Manage_Frame, text="Email", bg="crimson", fg="white", front=("time new roman", 20, "bold")) lbl_Email.grid(row=1, colum=0, pady=10, padx=20, sticky="w") txt_Email = Entry(Manage_Frame, front=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Email.grid(row=3, colum=0, pady=10, padx=20, sticky="w") lbl_Gender = Label(Manage_Frame, text="Gender", bg="crimson", fg="white", front=("time new roman", 20, "bold")) lbl_Gender.grid(row=4, colum=0, pady=10, padx=20, sticky="w") combo_Gender=ttk.Combobox(Manage_Frame,front=("times new roman",20,"bold")) combo_Gender['values']=("Male","Female","other") combo_Gender.grid(row=4,colum=1,padx=20,pady=10) lbl_Contact = Label(Manage_Frame, text="Contact", bg="crimson", fg="white", front=("time new roman", 20, "bold")) lbl_Contact.grid(row=5, colum=0, pady=10, padx=20, sticky="w") txt_Contact = Entry(Manage_Frame, front=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Contact.grid(row=5, colum=1, pady=10, padx=20, sticky="w") lbl_DOB = Label(Manage_Frame, text="DOB", bg="crimson", fg="white",front=("time new roman", 20, "bold")) lbl_DOB.grid(row=6, colum=0, pady=10, padx=20, sticky="w") txt_Contact = Entry(Manage_Frame, front=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Contact.grid(row=6, colum=1, pady=10, padx=20, sticky="w") lbl_address = Label(Manage_Frame, text="Address", bg="crimson", fg="white", front=("time new roman", 20, "bold")) lbl_address.grid(row=6, colum=0, pady=10, padx=20, sticky="w") txt_address = Entry(Manage_Frame, front=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_address.grid(row=6, colum=1, pady=10, padx=20, sticky="w") #=========Button Frame========= btn_Frame=Frame(Manage_Frame,bd=4,relief=RIDGE,bg="crimson") btn_Frame.place(x=15, y=500, width=420) Addbtn = Button(btn_Frame,text="add",width=10).grid(row=0,column=0,padx=10,pady=10) Updatebtn = Button(btn_Frame, text="update", width=10).grid(row=0, column=1, padx=10, pady=10) Deletebtn = Button(btn_Frame, text="delete", width=10).grid(row=0, column=2, padx=10, pady=10) Clearbtn = Button(btn_Frame, text="clear", width=10).grid(row=0, column=3, padx=10, pady=10) #=========Detail Frame========= Detail_Frame = Frame(self.root, bd=4, relief=RIDGE, bg="crimson") Detail_Frame.place(x=500, y=100, width=800, height=580) lbl_search = Label(Detail_Frame, text="Search By", bg="crimson", fg="white", front=("time new roman", 20, "bold")) lbl_search.grid(row=0, colum=0, pady=10, padx=20, sticky="w") combo_search = ttk.Combobox(Manage_Frame,width=10,front=("times new roman", 13, "bold"),state="readonly") combo_search['values'] = ("Roll", "Name", "contact") combo_search.grid(row=0, colum=1, padx=20, pady=10) txt_Search = Entry(Manage_Frame,width=15, front=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Search.grid(row=6, colum=1, pady=10, padx=20, sticky="w") searchbtn = Button(btn_Frame, text="Search", width=10).grid(row=0, column=3, padx=10, pady=10) showallbtn = Button(btn_Frame, text="Show All", width=10).grid(row=0, column=4, padx=10, pady=10) #=========Table Frame========= Table_Frame = Frame(Detail_Frame, bd=4, relief=RIDGE, bg="crimson") Table_Frame.place(x=10, y=70, width=760, height=500) scroll_x=Scrollbar(Table_Frame,orient=HORIZONTAL) scroll_y = Scrollbar(Table_Frame, orient=VERTICAL) Student_table=ttk.Treeview(Table_Frame,columns=("roll","name","email","gender","contact","dob","Address"),xscollcommand=scroll_x.set,yscollcommand=scroll_y.set) scroll_x.pack(side=BOTTOM,fill=X) scroll_y.pack(side=RIGHT, fill=Y) scroll_x.config(command=Student_table.xview) scroll_y.config(command=Student_table.xview) Student_table.heading("roll",text="Roll") Student_table.heading("name", text="Name") Student_table.heading("email", text="Email") Student_table.heading("gender", text="Gender") Student_table.heading("Contact", text="Contact") Student_table.heading("D.O.B", text="D.O.B") Student_table.heading("Address", text="Address") Student_table['show']='headings' Student_table.pack() root=Tk() A: You have to initialize your Student object and pass root to it. Add this to the end of your code for it to run: app=Student(root) root.mainloop() Your current code as is includes a lot of syntax errors that need to be fixed before running. The following should run, albeit with some visual errors: from tkinter import * from tkinter import ttk class Student: def __init__(self,root): self.root=root self.root.title("student management system") self.root.geometry("1350x700") title=Label(self.root,text="Student Management System",bd=10,relief=GROOVE,font=("time new roman",40,"bold"),bg="yellow",fg="red") title.pack(side=TOP,fill=X) Manage_Frame=Frame(self.root,bd=4,relief=RIDGE,bg="crimson") Manage_Frame.place(x=20,y=70,width=450,height=560) #========Massage Frame=============================== Manage_Frame=Frame(self.root,bd=4,relief=RIDGE,bg="crimson") Manage_Frame.place(x=20,y=100,width=450,height=560) m_title=Label(Manage_Frame,text="Manage Students",bg="crimson",fg="white",font=("time new roman",30,"bold")) m_title.grid(row=0,columnspan=2,pady=10) lbl_roll = Label(Manage_Frame, text="Roll No.", bg="crimson", fg="white",font=("time new roman", 20, "bold")) lbl_roll.grid(row=1, column=0, pady=10,padx=20,sticky="w") txt_roll = Entry(Manage_Frame,font=("time new roman", 15, "bold"),bd=5,relief=GROOVE) txt_roll.grid(row=1, column=2, pady=10, padx=20, sticky="w") lbl_name = Label(Manage_Frame, text="Name", bg="crimson", fg="white", font=("time new roman", 20, "bold")) lbl_name.grid(row=1, column=0, pady=10, padx=20, sticky="w") txt_name = Entry(Manage_Frame, font=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_name.grid(row=2, column=1, pady=10, padx=20, sticky="w") lbl_Email = Label(Manage_Frame, text="Email", bg="crimson", fg="white", font=("time new roman", 20, "bold")) lbl_Email.grid(row=1, column=0, pady=10, padx=20, sticky="w") txt_Email = Entry(Manage_Frame, font=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Email.grid(row=3, column=0, pady=10, padx=20, sticky="w") lbl_Gender = Label(Manage_Frame, text="Gender", bg="crimson", fg="white", font=("time new roman", 20, "bold")) lbl_Gender.grid(row=4, column=0, pady=10, padx=20, sticky="w") combo_Gender=ttk.Combobox(Manage_Frame,font=("times new roman",20,"bold")) combo_Gender['values']=("Male","Female","other") combo_Gender.grid(row=4,column=1,padx=20,pady=10) lbl_Contact = Label(Manage_Frame, text="Contact", bg="crimson", fg="white", font=("time new roman", 20, "bold")) lbl_Contact.grid(row=5, column=0, pady=10, padx=20, sticky="w") txt_Contact = Entry(Manage_Frame, font=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Contact.grid(row=5, column=1, pady=10, padx=20, sticky="w") lbl_DOB = Label(Manage_Frame, text="DOB", bg="crimson", fg="white",font=("time new roman", 20, "bold")) lbl_DOB.grid(row=6, column=0, pady=10, padx=20, sticky="w") txt_Contact = Entry(Manage_Frame, font=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Contact.grid(row=6, column=1, pady=10, padx=20, sticky="w") lbl_address = Label(Manage_Frame, text="Address", bg="crimson", fg="white", font=("time new roman", 20, "bold")) lbl_address.grid(row=6, column=0, pady=10, padx=20, sticky="w") txt_address = Entry(Manage_Frame, font=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_address.grid(row=6, column=1, pady=10, padx=20, sticky="w") #=========Button Frame========= btn_Frame=Frame(Manage_Frame,bd=4,relief=RIDGE,bg="crimson") btn_Frame.place(x=15, y=500, width=420) Addbtn = Button(btn_Frame,text="add",width=10).grid(row=0,column=0,padx=10,pady=10) Updatebtn = Button(btn_Frame, text="update", width=10).grid(row=0, column=1, padx=10, pady=10) Deletebtn = Button(btn_Frame, text="delete", width=10).grid(row=0, column=2, padx=10, pady=10) Clearbtn = Button(btn_Frame, text="clear", width=10).grid(row=0, column=3, padx=10, pady=10) #=========Detail Frame========= Detail_Frame = Frame(self.root, bd=4, relief=RIDGE, bg="crimson") Detail_Frame.place(x=500, y=100, width=800, height=580) lbl_search = Label(Detail_Frame, text="Search By", bg="crimson", fg="white", font=("time new roman", 20, "bold")) lbl_search.grid(row=0, column=0, pady=10, padx=20, sticky="w") combo_search = ttk.Combobox(Manage_Frame,width=10,font=("times new roman", 13, "bold"),state="readonly") combo_search['values'] = ("Roll", "Name", "contact") combo_search.grid(row=0, column=1, padx=20, pady=10) txt_Search = Entry(Manage_Frame,width=15, font=("time new roman", 15, "bold"), bd=5, relief=GROOVE) txt_Search.grid(row=6, column=1, pady=10, padx=20, sticky="w") searchbtn = Button(btn_Frame, text="Search", width=10).grid(row=0, column=3, padx=10, pady=10) showallbtn = Button(btn_Frame, text="Show All", width=10).grid(row=0, column=4, padx=10, pady=10) #=========Table Frame========= Table_Frame = Frame(Detail_Frame, bd=4, relief=RIDGE, bg="crimson") Table_Frame.place(x=10, y=70, width=760, height=500) scroll_x=Scrollbar(Table_Frame,orient=HORIZONTAL) scroll_y = Scrollbar(Table_Frame, orient=VERTICAL) Student_table=ttk.Treeview(Table_Frame,columns=("roll","name","email","gender","contact","dob","Address"),xscrollcommand=scroll_x.set,yscrollcommand=scroll_y.set) scroll_x.pack(side=BOTTOM,fill=X) scroll_y.pack(side=RIGHT, fill=Y) scroll_x.config(command=Student_table.xview) scroll_y.config(command=Student_table.xview) Student_table.heading("roll",text="Roll") Student_table.heading("name", text="Name") Student_table.heading("email", text="Email") Student_table.heading("gender", text="Gender") Student_table.heading("contact", text="Contact") Student_table.heading("dob", text="D.O.B") Student_table.heading("Address", text="Address") Student_table['show']='headings' Student_table.pack() root=Tk() app=Student(root) root.mainloop() | Mid | [
0.547752808988764,
24.375,
20.125
] |
New Mirai Variant Has a Domain Generation Algorithm - pjf http://blog.netlab.360.com/new-mirai-variant-with-dga/ ====== Exuma What software is that? I always see that decompiler software in posts like this. ~~~ Cyph0n My guess would be IDA[1]. It's the de facto industry standard for reverse engineering binaries. [1]: [https://www.hex-rays.com/products/ida/](https://www.hex- rays.com/products/ida/) ~~~ Exuma Is it as cool/intuitive as it looks? Lol... I also just saw this from this morning: [http://www.welivesecurity.com/2016/12/06/readers-popular- web...](http://www.welivesecurity.com/2016/12/06/readers-popular-websites- targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/) It looks almost like english. It makes me want to learn it for fun. More than likely though I would go to decompile something and it would be infinitely complicated and years of learning to know what I'm doing. Perhaps I shall youtube some intro videos. ~~~ ShaneWilton It's definitely cool, but it's far from intuitive. Worse, the licensing is nearly impossible to deal with as an individual. If you're interested in getting started with reverse engineering, I recommend Binary Ninja [0]. It's a newer platform, and you may run into bugs, but the team behind it is super responsive to feedback, and they've done a great job of taking a traditionally very arcane UI, and making it into something that's a joy to use. [0] [https://binary.ninja/](https://binary.ninja/) ~~~ aseipp Eh, Hex-Rays eased up on the licensing a lot in the past few years, IIRC, and it's much more tolerable for individuals. These days, from what I understand, as long as you basically email them from your corporate, work email address -- they'll let you purchase a permanent, individual license that way, even with their digital downloads. So you don't need physical shipment or anything like that, they just need to make sure they aren't sending it to a rando email address. In the past it was a lot more difficult since as an individual they'd want to physically ship you the software on disk, so they'd only send it to offices, trusted addresses, etc which complicated it a lot. I never really had to deal with this since I think their strategies changed a bit by the time I got licenses at my last job. Of course, just emailing them from your work addr won't totally cut it -- you also have to pony up the few thousand USD to get IDA, and near $10k if you want all the decompiler tools, as well... IDA Pro itself is relatively 'cheap' by itself if you just want disassembly, though, and you actually do it for a job. ------ ryanlol Wow, that's a particularly silly domain generation algorithm. Do these kids even use some sensible crypto for the C&C? If not, anyone running their own mirai net can steal these bots just by running .dns on their C&C domain and registering one of the generated domains :) ~~~ Godel_unicode > ...used it to predict all 365 possible DGA domains. When looking up their > registration information, we found some of them have been registered by the > MIRAI author... Not so fast. This is just so that malware reverse engineers can't run strings on the executable (note also where they say this executable is stripped but not packed) and then block/tip the handful of hard-coded domains. Anti-forensics is an arms race, and especially for a botnet like this the goal is to do just enough that you can spread (see also: premature optimization). You'll see it (mirai) get progressively better as the authors are forced to work harder. ~~~ ryanlol >This is just so that malware reverse engineers can't run strings on the executable (note also where they say this executable is stripped but not packed) and then block/tip the handful of hard-coded domains Nothing to do with `strings`. The purpose of domain generation algorithms is simply to prevent bot loss from domain suspension/C&C takedowns. Unless these guys patched mirai to authenticate the server somehow, this is a really easy way for them to lose all of their bots. As I stated earlier, this enables any competing botmaster to easily steal their bots simply by taking down the nameservers for their main domains. Mirai has built in functionality to do that, the ".dns" command. Even without that flaw, it's also a really bad way of keeping the bots alive since 365 domains will be trivial for the registry to blacklist. ~~~ Godel_unicode > Nothing to do with `strings`. The purpose of domain generation algorithms is > simply to prevent bot loss from domain suspension/C&C takedowns. The purpose of DGA is also to make it harder to identify the domains the malware will use. One of those ways is to run strings on an executable and look for domain names. As they made no attempt to move off their main domains, we can assume that wasn't the goal. Rather, the goal of this is pretty clearly to add a few new domain names which are not as obvious and thus less likely to be blocked. Certainly not the perfect solution, but see my previous about premature optimization. Also, I think you're overestimating the ease of taking over someone else's registrant account. Possible? Absolutely. Easy? Well, that depends on a great many things, but typically not easy without a court order. ~~~ ryanlol Are you just coming up with new uses for domain generation algorithms to refute my comment for the sake of refuting it, or do you personally know the developer? Or do you at least personally know developers who have used DGAs for that? I've seen lots of DGAs, but I've never seen one being used for the purpose you're describing. You're suggesting a pretty novel use case here, why is that? >Also, I think you're overestimating the ease of taking over someone else's registrant account. Possible? Absolutely. Easy? Well, that depends on a great many things, but typically not easy without a court order. While it's not at all what I was referring to, many domain registrars are actually surprisingly happy to just hand over malware domains to "whitehats". See goatsis comment for the issue I was originally referring to. ~~~ Godel_unicode My experience differs from yours. Apparently goatsis has heard of you, so good work on that? The logical fallacy of either/or doesn't advance your argument as much as you think it does. In my experience, malware authors care about beating the defense more than they do about having their domains taken down by some "whitehat". Although if you think that's easy, by all means please do. The Internet will thank you. ~~~ ryanlol Instead of relying on the fallacy fallacy could you try to back up your point of view somehow? Share your differing experiences and give us some examples. The idea of using a DGA to _hide_ your C&C simply isn't a very good one. It's not going to work, anyone running a packet capture will still see where your bot connects. Using a DGA to protect your C&C from being taken down? You can easily make it impossible for any domain registry to shut you down. It'll also protect you from server suspensions as you'll just be able to update your DNS records. One of these actually works, one doesn't. For hiding your C&C you'd want to use tor hidden services instead. Generally C&Cs are disposable though, so there's no need to hide them in the first place. >In my experience, malware authors care about beating the defense more than they do about having their domains taken down by some "whitehat". I don't really understand what you mean here. "beating the defense"? Are you suggesting that whoever did this mirai edit was trying to evade antiviruses or any sort of "defense" in that matter? On iot devices and routers? I'm _sure_ they weren't hoping that whatever analyst finds their binary isn't going to find their C&C... Which seems to be what you're suggesting. But if they aren't worried about their C&C being taken down by some "whitehat" then why on earth would they want to hide it in the first place? ------ maxt Are these domains for free? Is it possible to bypass a registrar and register a domain for free like this? ~~~ tyingq They aren't free, no. But the algorithm creates one predictable domain per day. So, the author of the code doesn't need to register all of them. Just one for each day he needs a backup c&c network. ------ rconti so apparently this is not about a Toyota. ~~~ Cyph0n It _could_ be, if you connected your Toyota to the internet. ------ jmiserez If the author's Gmail is known, shouldn't it be trivial for the authorities to find out who registered the domains and arrest them? ------ rurban Still from Ukraine | Low | [
0.49197860962566803,
23,
23.75
] |
Example sentences with "Θηρίον", translation memory add example No translation memories found. | Low | [
0.52112676056338,
18.5,
17
] |
CD44 in Cancer: Raising monoclonal antibodies against human white blood cells led to the discovery of the CD44 antigen; a single chain hyaluronic acid (HA) binding glycoprotein expressed on a wide variety of normal tissue and on all types of hematopoietic cells. It was originally associated with lymphocyte activation and homing. Currently, its putative physiological role also includes activation of inflammatory genes, modulation of cell cycle, induction of cell proliferation, induction of differentiation and development, induction of cytoskeletal reorganization and cell migration and cell survival/resistance to apoptosis. In humans, the single gene copy of CD44 is located on the short arm of chromosome 11, 11p13. The gene contains 19 exons; the first 5 are constant, the next 9 are variant, the following 3 are constant and the final 2 are variant. Differential splicing can lead to over 1000 different isoforms. However, currently only several dozen naturally occurring variants have been identified. The CD44 standard glycoprotein consists of a N-terminal extracellular (including a 20 a.a. leader sequence, and a membrane proximal region (85 a.a.)) domain (270 a.a.), a transmembrane region (21 a.a.) and a cytoplasmic tail (72 a.a.). The extracellular region also contains a link module at the N-terminus. This region is 92 a.a. in length and shows homology to other HA binding link proteins. There is high homology between the mouse and human forms of CD44. The variant forms of the protein are inserted to the carboxy terminus of exon 5 and are located extracellularly when expressed. A serum soluble form of CD44 also occurs naturally and can arise from either a stop codon (within the variable region) or from proteolytic activity. Activation of cells from a variety of stimuli including TNF-α results in shedding of the CD44 receptor. Shedding of the receptor has also been seen with tumor cells and can result in an increase in the human serum concentration of CD44 by up to 10-fold. High CD44 serum concentration suggests malignancy (ovarian cancer being the exception). The standard form of CD44 exists with a molecular weight of approximately 37 kD. Post-translational modifications increase the molecular weight to 80-90 kD. These modifications include amino terminus extracellular domain N-linked glycosylations at asparagine residues, O-linked glycosylations at serine/threonine residues at the carboxy terminus of the extracellular domain and glycosaminoglycan additions. Splice variants can range in size from 80-250 kD. HA, a polysaccharide located on the extracellular matrix (ECM) in mammals, is thought to be the primary CD44 ligand. However, CD44 has also been found to bind such proteins as collagen, fibronectin, laminin etc. There appears to be a correlation between HA binding and glycosylation. Inactive CD44 (does not bind HA) has the highest levels of glycosylation, active CD44 (binding HA) the lowest while inducible CD44 (does not or weakly binds HA unless activated by cytokines, monoclonal antibodies, growth factors, etc.) has glycosylation levels somewhere in between the active and inactive forms. CD44 can mediate some of its functions through signal transduction pathways that depend on the interaction of the cell, stimulus and the environment. Some of these pathways include the NFκB signaling cascade (involved in the inflammatory response), the Ras-MAPK signal transduction pathway (involved with activating cell cycling and proliferation), the Rho family of proteins (involved with cytoskeleton reorganization and cell migration) and the PI3-K-related signaling pathway (related to cell survival). All of the above-mentioned functions are closely associated with tumor disease initiation and progression. CD44 has also been implicated in playing a role in cancer through a variety of additional mechanisms. These include the presentation of growth factors, chemokines and cytokines by cell surface proteoglycans present on the cell surface of CD44 to receptors involved in malignancy. Also, the intracellular degradation of HA by lysosomal hyaluronidases after internalization of the CD44-HA complex can potentially increase the likelihood of tumor invasiveness and induction of angiogenesis through the ECM. In addition, the transmission of survival or apoptotic signals has been shown to occur through either the standard or variable CD44 receptor. CD44 has also been suggested to be involved in cell differentiation and migration. Many, if not all, of these mechanisms are environment and cell dependent and several give rise to variable findings. Therefore, more research is required before any conclusions can be drawn. In order to validate a potential functional role of CD44 in cancer, expression studies of CD44 were undertaken to determine if differential expression of the receptor correlates with disease progression. However, inconsistent findings were observed in a majority of tumor types and this is probably due to a combination of reagents, technique, pathological scoring and cell type differences between researchers. Renal cell carcinoma and non-Hodgkin's lymphoma appear to be the exception in that patients with high CD44 expressing tumors consistently had shorter survival times than their low or non-CD44 expressing counterparts. Due to its association with cancer, CD44 has been the target of the development of anti-cancer therapeutics. There is still controversy as to whether the standard or the variant forms of CD44 are required for tumor progression. There is in vivo animal data to support both views and again it may be tumor type and even cell type dependent. Different therapeutic approaches have included injection of soluble CD44 proteins, hyaluronan synthase cDNA, hyaluronidase, the use of CD44 antisense and CD44 specific antibodies. Each approach has led to some degree of success thereby providing support for anti-CD44 cancer therapeutics. Both variant and standard CD44 specific monoclonal antibodies have been generated experimentally but for the most part these antibodies have no intrinsic biological activity, rather they bind specifically to the type of CD44 they recognize. However, there are some that are either active in vitro or in vivo but generally not both. Several anti-CD44 antibodies have been shown to mediate cellular events. For example the murine antibody A3D8, directed against human erythrocyte Lutheran antigen CD44 standard form, was shown to enhance CD2 (9-1 antibody) and CD3 (OKT3 antibody) mediated T cell activation; another anti-CD44 antibody had similar effects. A3D8 also induced IL-1 release from monocytes and IL-2 release from T lymphocytes. Interestingly, the use of A3D8 in conjunction with drugs such as daunorubicin, mitoxantrone and etoposide inhibited apoptosis induction in HL60 and NB4 AML cells by abrogating the generation of the second messenger ceramide. The J173 antibody, which does not have intrinsic activity and is directed against a similar epitope of CD44s, did not inhibit drug-induced apoptosis. The NIH44-1 antibody, directed against an 85-110 kD and 200 kD form of CD44, augmented T-cell proliferation through a pathway the authors speculated as either cross-linking or aggregation of CD44. Taken together, there is no evidence that antibodies such as these are suitable for use as cancer therapeutics since they either are not directed against cancer (e.g. activate lymphocytes), induce cell proliferation, or when used with cytotoxic agents inhibited drug-induced death of cancer cells. Several anti-CD44 antibodies have been described which demonstrate anti-tumor effects in vivo. The antibody 1.1 ASML, a mouse IgG1 directed to the v6 variant of CD44, has been shown to decrease the lymph node and lung metastases of the rat pancreatic adenocarcinoma BSp73ASML. Survival of the treated animals was concomitantly increased. The antibody was only effective if administered before lymph node colonization, and was postulated to interfere with cell proliferation in the lymph node. There was no direct cytotoxicity of the antibody on the tumor cells in vitro, and the antibody did not enhance complement-mediated cytotoxicity, or immune effector cell function. Utility of the antibody against human cells was not described. Breyer et al. described the use of a commercially-available antibody to CD44s to disrupt the progression of an orthotopically-implanted rat glioblastoma. The rat glioblastoma cell line C6 was implanted in the frontal lobe, and after 1 week, the rats were given 3 treatments with antibody by intracerebral injection. Treated rats demonstrated decreased tumor growth, and higher body weight than buffer or isotype control treated rats. The antibody was able to inhibit adhesion of cells in vitro to coverslips coated with extracellular matrix components, but did not have any direct cytotoxic effects on cells. This antibody was not tested against human cells. A study was carried out which compared the efficacy of an antibody to CD44s (IM-7.8.1) to an antibody to CD44v10 (K926). The highly metastatic murine melanoma line B16F10, which expresses both CD44 isoforms, was implanted intravenously into mice. After 2 days, antibodies were given every third day for the duration of the study. Both antibodies caused a significant reduction of greater than 50 percent in the number of lung metastases; there was no significant difference in efficacy between the two antibodies. The antibody did not affect proliferation in vitro, and the authors, Zawadzki et al., speculated that the inhibition of tumor growth was due to the antibody blocking the interaction of CD44 with its ligand. In another study using IM-7.8.1, Zahalka et al. demonstrated that the antibody and its F(ab′)2 fragment were able to block the lymph node infiltration by the murine T-cell lymphoma LB. This conferred a significant survival benefit to the mice. Wallach-Dayan et al. showed that transfection of LB-TRs murine lymphoma, which does not spontaneously form tumors, with CD44v4-v10 conferred the ability to form tumors. IM-7.8.1 administration decreased tumor size of the implanted transfected cells in comparison to the isotype control antibody. None of these studies demonstrated human utility for this antibody. GKW.A3, a mouse IgG2a, is specific for human CD44 and prevents the formation and metastases of a human melanoma xenograft in SCID mice. The antibody was mixed with the metastastic human cell line SMMU-2, and then injected subcutaneously. Treatments were continued for the following 3 weeks. After 4 weeks, only 1 of 10 mice developed a tumor at the injection site, compared to 100 percent of untreated animals. F(ab′)2 fragments of the antibody demonstrated the same inhibition of tumor formation, suggesting that the mechanism of action was not dependent on complement or antibody-dependent cellular cytotoxicity. If the tumor cells were injected one week prior to the first antibody injection, 80 percent of the animals developed tumors at the primary site. However, it was noted that the survival time was still significantly increased. Although the delayed antibody administration had no effect on the primary tumor formation, it completely prevented the metastases to the lung, kidney, adrenal gland, liver and peritoneum that were present in the untreated animals. This antibody does not have any direct cytotoxicity on the cell line in vitro nor does it interfere with proliferation of SMMU-2 cells, and appears to have its major effect on tumor formation by affecting metastasis or growth. One notable feature of this antibody was that it recognized all isoforms of CD44, which suggests limited possibilities for therapeutic use. Strobel et al. describe the use of an anti-CD44 antibody (clone 515) to inhibit the peritoneal implantation of human ovarian cancer cells in a mouse xenograft model. The human ovarian cell line 36M2 was implanted intraperitoneally into mice in the presence of the anti-CD44 antibody or control antibody, and then treatments were administered over the next 20 days. After 5 weeks, there were significantly fewer nodules in the peritoneal cavity in the antibody treated group. The nodules from both the anti-CD44 and control treated groups were the same size, suggesting that once the cells had implanted, the antibody had no effect on tumor growth. When cells were implanted subcutaneously there was also no effect on tumor growth indicating that the antibody itself did not have an anti-proliferative or cytotoxic effect. In addition, there was no effect of the antibody on cell growth in vitro. VFF-18, also designated as BIWA 1, is a high-affinity antibody to the v6 variant of CD44 specific for the 360-370 region of the polypeptide. This antibody has been used as a 99mTechnetium-labelled conjugate in a Phase 1 clinical trial in 12 patients. The antibody was tested for safety and targeting potential in patients with squamous cell carcinoma of the head and neck. Forty hours after injection, 14 percent of the injected dose was taken up by the tumor, with minimal accumulation in other organs including the kidney, spleen and bone marrow. The highly selective tumor binding suggests a role for this antibody in radioimmunotherapy, although the exceptionally high affinity of this antibody prevented penetration into the deeper layers of the tumor. Further limiting the application of BIWA 1 is the immunogenicity of the murine antibody (11 of 12 patients developed human anti-mouse antibodies (HAMA)), heterogenous accumulation throughout the tumor and formation of antibody-soluble CD44 complexes. WO 02/094879 discloses a humanized version of VFF-18 designed to overcome the HAMA response, designated BIWA 4. BIWA 4 was found to have a significantly lower antigen binding affinity than the parent VFF 18 antibody. Surprisingly, the lower affinity BIWA 4 antibody had superior tumor uptake characteristics than the higher affinity BIWA 8 humanized VFF-18 antibody. Both 99mTechnetium-labelled and 186Rhenium-labelled BIWA 4 antibodies were assessed in a 33 patient Phase 1 clinical trial to determine safety, tolerability, tumor accumulation and maximum tolerated dose, in the case of 186Re-labelled BIWA 4. There appeared to be tumor related uptake of 99mTc-labelled BIWA 4. There were no tumor responses seen with all doses of 186Re-labelled BIWA 4, although a number had stable disease; the dose limiting toxicity occurred at 60 mCi/m2. There was a 50-65 percent rate of adverse events with 12 of 33 patients deemed to have serious adverse events (thrombocytopenia, leukopenia and fever) and of those 6, all treated with 186Re-labelled BIWA 4, died in the course of treatment or follow-up due to disease progression. Two patients developed human anti-human antibodies (HAHA). A Phase 1 dose escalation trial of 186Re-labelled BIWA 4 was carried out in 20 patients. Oral mucositis and dose-limiting thrombocytopenia and leucocytopenia were observed; one patient developed a HAHA response. Stable disease was seen in 5 patients treated at the highest dose of 60 mCi/m2. Although deemed to be acceptable in both safety and tolerability for the efficacy achieved, these studies have higher rates of adverse events compared to other non-radioisotope conjugated biological therapies in clinical studies. U.S. Patent Application US 2003/0103985 discloses a humanized version of VFF-18 conjugated to a maytansinoid, designated BIWI 1, for use in tumor therapy. A humanized VFF 18 antibody, BIWA 4, when conjugated to a toxin, i.e. BIWI 1, was found to have significant anti-tumor effects in mouse models of human epidermoid carcinoma of the vulva, squamous cell carcinoma of the pharynx or breast carcinoma. The unconjugated version, BIWA 4, did not have anti-tumor effects and the conjugated version, BIWI 1, has no evidence of safety or efficacy in humans. Mab U36 is a murine monoclonal IgG1 antibody generated by UM-SCC-22B human hypopharyngeal carcinoma cell immunization and selection for cancer and tissue specificity. Antigen characterization through cDNA cloning and sequence analysis identified the v6 domain of keratinocyte-specific CD44 splice variant epican as the target of Mab U36. Immunohistochemistry studies show the epitope to be restricted to the cell membrane. Furthermore, Mab U36 labeled 94 percent of the head and neck squamous cell carcinomas (HNSCC) strongly, and within these tumors there was uniformity in cell staining. A 10 patient 99mTc-labelled Mab U36 study showed selective accumulation of the antibody to HNSCC cancers (20.4+/−12.4 percent injected dose/kg at 2 days); no adverse effects were reported but two patients developed HAMA. In a study of radio-iodinated murine Mab U36 there were 3 cases of HAMA in 18 patients and selective homogenous uptake in HNSCC. In order to decrease the antigenicity of Mab U36 and decrease the rate of HAMA a chimeric antibody was constructed. Neither the chimeric nor the original murine Mab U36 has ADCC activity. There is no evidence of native functional activity of Mab U36. 186Re-labelled chimeric Mab U36 was used to determine the utility of Mab U36 as a therapeutic agent. In this Phase 1 escalating dose trial 13 patients received a scouting dose of 99mTc-labelled chimeric Mab U36 followed by 186Re-labelled chimeric Mab U36. There were no acute adverse events reported but following treatment dose limiting myelotoxcity (1.5 GBq/m2) in 2 of 3 patients, and thrombocytopenia in one patient treated with the maximum tolerated dose (1.0 GBq/m2) were observed. Although there were some effects on tumor size these effects did not fulfill the criteria for objective responses to treatment. A further study of 186Re-labelled chimeric Mab U36 employed a strategy of using granulocyte colony-stimulating factor stimulated whole blood reinfusion to double the maximum-tolerated activity to 2.8 Gy. In this study of nine patients with various tumors of the head and neck, 3 required transfusions for drug related anemia. Other toxicity includes grade 3 myelotoxicity, and grade 2 mucositis. No objective tumor responses were reported although stable disease was achieved for 3-5 months in 5 patients. Thus, it can be seen that although Mab U36 is a highly specific antibody the disadvantage of requiring a radioimmunoconjugate to achieve anti-cancer effects limits its usefulness because of the toxicity associated with the therapy in relation to the clinical effects achieved. To summarize, a CD44v6 (1.1ASML) and CD44v10 (K926) monoclonal antibody have been shown to reduce metastatic activity in rats injected with a metastatic pancreatic adenocarcinoma or mice injected with a malignant melanoma respectively. Another anti-CD44v6 antibody (VFF-18 and its derivatives), only when conjugated to a maytansinoid or a radioisotope, has been shown to have anti-tumor effects. Anti-standard CD44 monoclonal antibodies have also been shown to suppress intracerebral progression by rat glioblastoma (anti-CD44s), lymph node invasion by mouse T cell lymphoma (IM-7.8.1) as well as inhibit implantation of a human ovarian cancer cell line in nude mice (clone 515), lung metastasis of a mouse melanoma cell line (IM-7.8.1) and metastasis of a human melanoma cell line in SCID mice (GKW.A3). The radioisotope conjugated Mab U36 anti-CD44v6 antibody and its derivatives had anti-tumor activity in clinical trials that were accompanied by significant toxicity. These results, though they are encouraging and support the development of anti-CD44 monoclonal antibodies as potential cancer therapeutics, demonstrate limited effectiveness, safety, or applicability to human cancers. Thus, if an antibody composition were isolated which mediated cancerous cell cytotoxicity, as a function of its attraction to cell surface expression of CD44 on said cells, a valuable diagnostic and therapeutic procedure would be realized. Monoclonal Antibodies as Cancer Therapy: Each individual who presents with cancer is unique and has a cancer that is as different from other cancers as that person's identity. Despite this, current therapy treats all patients with the same type of cancer, at the same stage, in the same way. At least 30 percent of these patients will fail the first line therapy, thus leading to further rounds of treatment and the increased probability of treatment failure, metastases, and ultimately, death. A superior approach to treatment would be the customization of therapy for the particular individual. The only current therapy which lends itself to customization is surgery. Chemotherapy and radiation treatment cannot be tailored to the patient, and surgery by itself, in most cases is inadequate for producing cures. With the advent of monoclonal antibodies, the possibility of developing methods for customized therapy became more realistic since each antibody can be directed to a single epitope. Furthermore, it is possible to produce a combination of antibodies that are directed to the constellation of epitopes that uniquely define a particular individual's tumor. Having recognized that a significant difference between cancerous and normal cells is that cancerous cells contain antigens that are specific to transformed cells, the scientific community has long held that monoclonal antibodies can be designed to specifically target transformed cells by binding specifically to these cancer antigens; thus giving rise to the belief that monoclonal antibodies can serve as “Magic Bullets” to eliminate cancer cells. However, it is now widely recognized that no single monoclonal antibody can serve in all instances of cancer, and that monoclonal antibodies can be deployed, as a class, as targeted cancer treatments. Monoclonal antibodies isolated in accordance with the teachings of the instantly disclosed invention have been shown to modify the cancerous disease process in a manner which is beneficial to the patient, for example by reducing the tumor burden, and will variously be referred to herein as cancerous disease modifying antibodies (CDMAB) or “anti-cancer” antibodies. At the present time, the cancer patient usually has few options of treatment. The regimented approach to cancer therapy has produced improvements in global survival and morbidity rates. However, to the particular individual, these improved statistics do not necessarily correlate with an improvement in their personal situation. Thus, if a methodology was put forth which enabled the practitioner to treat each tumor independently of other patients in the same cohort, this would permit the unique approach of tailoring therapy to just that one person. Such a course of therapy would, ideally, increase the rate of cures, and produce better outcomes, thereby satisfying a long-felt need. Historically, the use of polyclonal antibodies has been used with limited success in the treatment of human cancers. Lymphomas and leukemias have been treated with human plasma, but there were few prolonged remission or responses. Furthermore, there was a lack of reproducibility and there was no additional benefit compared to chemotherapy. Solid tumors such as breast cancers, melanomas and renal cell carcinomas have also been treated with human blood, chimpanzee serum, human plasma and horse serum with correspondingly unpredictable and ineffective results. There have been many clinical trials of monoclonal antibodies for solid tumors. In the 1980s there were at least four clinical trials for human breast cancer which produced only one responder from at least 47 patients using antibodies against specific antigens or based on tissue selectivity. It was not until 1998 that there was a successful clinical trial using a humanized anti-Her2/neu antibody (HERCEPTIN® (trastuzumab)) in combination with Cisplatin. In this trial 37 patients were assessed for responses of which about a quarter had a partial response rate and an additional quarter had minor or stable disease progression. The median time to progression among the responders was 8.4 months with median response duration of 5.3 months. HERCEPTIN® (trastuzumab) was approved in 1998 for first line use in combination with TAXOL® (paclitaxel). Clinical study results showed an increase in the median time to disease progression for those who received antibody therapy plus TAXOL® (paclitaxel) (6.9 months) in comparison to the group that received TAXOL® (paclitaxel) alone (3.0 months). There was also a slight increase in median survival; 22 versus 18 months for the HERCEPTIN® (trastuzumab) plus TAXOL® (paclitaxel) treatment arm versus the TAXOL® (paclitaxel) treatment alone arm. In addition, there was an increase in the number of both complete (8 versus 2 percent) and partial responders (34 versus 15 percent) in the antibody plus TAXOL® (paclitaxel) combination group in comparison to TAXOL® (paclitaxel) alone. However, treatment with HERCEPTIN® (trastuzumab) and TAXOL® (paclitaxel) led to a higher incidence of cardiotoxicity in comparison to TAXOL® (paclitaxel) treatment alone (13 versus 1 percent respectively). Also, HERCEPTIN® (trastuzumab) therapy was only effective for patients who over express (as determined through immunohistochemistry (IHC) analysis) the human epidermal growth factor receptor 2 (Her2/neu), a receptor, which currently has no known function or biologically important ligand; approximately 25 percent of patients who have metastatic breast cancer. Therefore, there is still a large unmet need for patients with breast cancer. Even those who can benefit from HERCEPTIN® (trastuzumab) treatment would still require chemotherapy and consequently would still have to deal with, at least to some degree, the side effects of this kind of treatment. The clinical trials investigating colorectal cancer involve antibodies against both glycoprotein and glycolipid targets. Antibodies such as 17-1A, which has some specificity for adenocarcinomas, has undergone Phase 2 clinical trials in over 60 patients with only 1 patient having a partial response. In other trials, use of 17-1A produced only 1 complete response and 2 minor responses among 52 patients in protocols using additional cyclophosphamide. To date, Phase III clinical trials of 17-1A have not demonstrated improved efficacy as adjuvant therapy for stage III colon cancer. The use of a humanized murine monoclonal antibody initially approved for imaging also did not produce tumor regression. Only recently have there been any positive results from colorectal cancer clinical studies with the use of monoclonal antibodies. In 2004, ERBITUX® (cetuximab) was approved for the second line treatment of patients with EGFR-expressing metastatic colorectal cancer who are refractory to irinotecan-based chemotherapy. Results from both a two-arm Phase II clinical study and a single arm study showed that ERBITUX® (cetuximab) in combination with irinotecan had a response rate of 23 and 15 percent respectively with a median time to disease progression of 4.1 and 6.5 months respectively. Results from the same two-arm Phase II clinical study and another single arm study showed that treatment with ERBITUX® (cetuximab) alone resulted in an 11 and 9 percent response rate respectively with a median time to disease progression of 1.5 and 4.2 months respectively. Consequently in both Switzerland and the United States, ERBITUX® (cetuximab) treatment in combination with irinotecan, and in the United States, ERBITUX® (cetuximab) treatment alone, has been approved as a second line treatment of colon cancer patients who have failed first line irinotecan therapy. Therefore, like HERCEPTIN® (trastuzumab), treatment in Switzerland is only approved as a combination of monoclonal antibody and chemotherapy. In addition, treatment in both Switzerland and the US is only approved for patients as a second line therapy. Also, in 2004, AVASTIN® (bevacizumab) was approved for use in combination with intravenous 5-fluorouracil-based chemotherapy as a first line treatment of metastatic colorectal cancer. Phase III clinical study results demonstrated a prolongation in the median survival of patients treated with AVASTIN® (bevacizumab) plus 5-fluorouracil compared to patients treated with 5-fluourouracil alone (20 months versus 16 months respectively). However, again like HERCEPTIN® (trastuzumab) and ERBITUX® (cetuximab), treatment is only approved as a combination of monoclonal antibody and chemotherapy. There also continues to be poor results for lung, brain, ovarian, pancreatic, prostate, and stomach cancer. The most promising recent results for non-small cell lung cancer came from a Phase II clinical trial where treatment involved a monoclonal antibody (SGN-15; dox-BR96, anti-Sialyl-LeX) conjugated to the cell-killing drug doxorubicin in combination with the chemotherapeutic agent TAXOTERE® (docetaxel). TAXOTERE® (docetaxel) is the only FDA approved chemotherapy for the second line treatment of lung cancer. Initial data indicate an improved overall survival compared to TAXOTERE® (docetaxel) alone. Out of the 62 patients who were recruited for the study, two-thirds received SGN-15 in combination with TAXOTERE® (docetaxel) while the remaining one-third received TAXOTERE® (docetaxel) alone. For the patients receiving SGN-15 in combination with TAXOTERE® (docetaxel), median overall survival was 7.3 months in comparison to 5.9 months for patients receiving TAXOTERE® (docetaxel) alone. Overall survival at 1 year and 18 months was 29 and 18 percent respectively for patients receiving SNG-15 plus TAXOTERE® (docetaxel) compared to 24 and 8 percent respectively for patients receiving TAXOTERE® (docetaxel) alone. Further clinical trials are planned. Preclinically, there has been some limited success in the use of monoclonal antibodies for melanoma. Very few of these antibodies have reached clinical trials and to date none have been approved or demonstrated favorable results in Phase III clinical trials. The discovery of new drugs to treat disease is hindered by the lack of identification of relevant targets among the products of 30,000 known genes that could contribute to disease pathogenesis. In oncology research, potential drug targets are often selected simply due to the fact that they are over-expressed in tumor cells. Targets thus identified are then screened for interaction with a multitude of compounds. In the case of potential antibody therapies, these candidate compounds are usually derived from traditional methods of monoclonal antibody generation according to the fundamental principles laid down by Kohler and Milstein (1975, Nature, 256, 495-497, Kohler and Milstein). Spleen cells are collected from mice immunized with antigen (e.g. whole cells, cell fractions, purified antigen) and fused with immortalized hybridoma partners. The resulting hybridomas are screened and selected for secretion of antibodies which bind most avidly to the target. Many therapeutic and diagnostic antibodies directed against cancer cells, including HERCEPTIN® (trastuzumab) and Rituximab, have been produced using these methods and selected on the basis of their affinity. The flaws in this strategy are two-fold. Firstly, the choice of appropriate targets for therapeutic or diagnostic antibody binding is limited by the paucity of knowledge surrounding tissue specific carcinogenic processes and the resulting simplistic methods, such as selection by overexpression, by which these targets are identified. Secondly, the assumption that the drug molecule that binds to the receptor with the greatest affinity usually has the highest probability for initiating or inhibiting a signal may not always be the case. Despite some progress with the treatment of breast and colon cancer, the identification and development of efficacious antibody therapies, either as single agents or co-treatments, have been inadequate for all types of cancer. Prior Patents: U.S. Pat. No. 5,750,102 discloses a process wherein cells from a patient's tumor are transfected with MHC genes which may be cloned from cells or tissue from the patient. These transfected cells are then used to vaccinate the patient. U.S. Pat. No. 4,861,581 discloses a process comprising the steps of obtaining monoclonal antibodies that are specific to an internal cellular component of neoplastic and normal cells of the mammal but not to external components, labeling the monoclonal antibody, contacting the labeled antibody with tissue of a mammal that has received therapy to kill neoplastic cells, and determining the effectiveness of therapy by measuring the binding of the labeled antibody to the internal cellular component of the degenerating neoplastic cells. In preparing antibodies directed to human intracellular antigens, the patentee recognizes that malignant cells represent a convenient source of such antigens. U.S. Pat. No. 5,171,665 provides a novel antibody and method for its production. Specifically, the patent teaches formation of a monoclonal antibody which has the property of binding strongly to a protein antigen associated with human tumors, e.g. those of the colon and lung, while binding to normal cells to a much lesser degree. U.S. Pat. No. 5,484,596 provides a method of cancer therapy comprising surgically removing tumor tissue from a human cancer patient, treating the tumor tissue to obtain tumor cells, irradiating the tumor cells to be viable but non-tumorigenic, and using these cells to prepare a vaccine for the patient capable of inhibiting recurrence of the primary tumor while simultaneously inhibiting metastases. The patent teaches the development of monoclonal antibodies which are reactive with surface antigens of tumor cells. As set forth at col. 4, lines 45 et seq., the patentees utilize autochthonous tumor cells in the development of monoclonal antibodies expressing active specific immunotherapy in human neoplasia. U.S. Pat. No. 5,693,763 teaches a glycoprotein antigen characteristic of human carcinomas and not dependent upon the epithelial tissue of origin. U.S. Pat. No. 5,783,186 is drawn to Anti-Her2 antibodies which induce apoptosis in Her2 expressing cells, hybridoma cell lines producing the antibodies, methods of treating cancer using the antibodies and pharmaceutical compositions including said antibodies. U.S. Pat. No. 5,849,876 describes new hybridoma cell lines for the production of monoclonal antibodies to mucin antigens purified from tumor and non-tumor tissue sources. U.S. Pat. No. 5,869,268 is drawn to a method for generating a human lymphocyte producing an antibody specific to a desired antigen, a method for producing a monoclonal antibody, as well as monoclonal antibodies produced by the method. The patent is particularly drawn to the production of an anti-HD human monoclonal antibody useful for the diagnosis and treatment of cancers. U.S. Pat. No. 5,869,045 relates to antibodies, antibody fragments, antibody conjugates and single-chain immunotoxins reactive with human carcinoma cells. The mechanism by which these antibodies function is two-fold, in that the molecules are reactive with cell membrane antigens present on the surface of human carcinomas, and further in that the antibodies have the ability to internalize within the carcinoma cells, subsequent to binding, making them especially useful for forming antibody-drug and antibody-toxin conjugates. In their unmodified form the antibodies also manifest cytotoxic properties at specific concentrations. U.S. Pat. No. 5,780,033 discloses the use of autoantibodies for tumor therapy and prophylaxis. However, this antibody is an antinuclear autoantibody from an aged mammal. In this case, the autoantibody is said to be one type of natural antibody found in the immune system. Because the autoantibody comes from “an aged mammal”, there is no requirement that the autoantibody actually comes from the patient being treated. In addition the patent discloses natural and monoclonal antinuclear autoantibody from an aged mammal, and a hybridoma cell line producing a monoclonal antinuclear autoantibody. U.S. Pat. No. 5,750,102 discloses a process wherein cells from a patient's tumor are transfected with MHC genes, which may be cloned from cells or tissue from the patient. These transfected cells are then used to vaccinate the patient. U.S. Pat. No. 4,861,581 discloses a process comprising the steps of obtaining monoclonal antibodies that are specific to an internal cellular component of neoplastic and normal cells of the mammal but not to external components, labeling the monoclonal antibody, contacting the labeled antibody with tissue of a mammal that has received therapy to kill neoplastic cells, and determining the effectiveness of therapy by measuring the binding of the labeled antibody to the internal cellular component of the degenerating neoplastic cells. In preparing antibodies directed to human intracellular antigens, the patentee recognizes that malignant cells represent a convenient source of such antigens. U.S. Pat. No. 5,171,665 provides a novel antibody and method for its production. Specifically, the patent teaches formation of a monoclonal antibody which has the property of binding strongly to a protein antigen associated with human tumors, e.g. those of the colon and lung, while binding to normal cells to a much lesser degree. U.S. Pat. No. 5,484,596 provides a method of cancer therapy comprising surgically removing tumor tissue from a human cancer patient, treating the tumor tissue to obtain tumor cells, irradiating the tumor cells to be viable but non-tumorigenic, and using these cells to prepare a vaccine for the patient capable of inhibiting recurrence of the primary tumor while simultaneously inhibiting metastases. The patent teaches the development of monoclonal antibodies, which are reactive with surface antigens of tumor cells. As set forth at col. 4, lines 45 et seq., the patentees utilize autochthonous tumor cells in the development of monoclonal antibodies expressing active specific immunotherapy in human neoplasia. U.S. Pat. No. 5,693,763 teaches a glycoprotein antigen characteristic of human carcinomas and not dependent upon the epithelial tissue of origin. U.S. Pat. No. 5,783,186 is drawn to anti-Her2 antibodies, which induce apoptosis in Her2 expressing cells, hybridoma cell lines producing the antibodies, methods of treating cancer using the antibodies and pharmaceutical compositions including said antibodies. U.S. Pat. No. 5,849,876 describes new hybridoma cell lines for the production of monoclonal antibodies to mucin antigens purified from tumor and non-tumor tissue sources. U.S. Pat. No. 5,869,268 is drawn to a method for generating a human lymphocyte producing an antibody specific to a desired antigen, a method for producing a monoclonal antibody, as well as monoclonal antibodies produced by the method. The patent is particularly drawn to the production of an anti-HD human monoclonal antibody useful for the diagnosis and treatment of cancers. U.S. Pat. No. 5,869,045 relates to antibodies, antibody fragments, antibody conjugates and single chain immunotoxins reactive with human carcinoma cells. The mechanism by which these antibodies function is 2-fold, in that the molecules are reactive with cell membrane antigens present on the surface of human carcinomas, and further in that the antibodies have the ability to internalize within the carcinoma cells, subsequent to binding, making them especially useful for forming antibody-drug and antibody-toxin conjugates. In their unmodified form the antibodies also manifest cytotoxic properties at specific concentrations. U.S. Pat. No. 5,780,033 discloses the use of autoantibodies for tumor therapy and prophylaxis. However, this antibody is an anti-nuclear autoantibody from an aged mammal. In this case, the autoantibody is said to be one type of natural antibody found in the immune system. Because the autoantibody comes from “an aged mammal”, there is no requirement that the autoantibody actually comes from the patient being treated. In addition the patent discloses natural and monoclonal antinuclear autoantibody from an aged mammal, and a hybridoma cell line producing a monoclonal antinuclear autoantibody. U.S. Pat. No. 5,916,561 discloses a specific antibody, VFF-18, and its variants directed against the variant exon v6 of the CD44 gene. This antibody is an improvement over the comparator antibody in that it recognizes a human CD44 v6 variant rather than a rat CD44 v6 variant. In addition this antibody discloses diagnostic assays for CD44 v6 expression. There was no in vitro or in vivo function disclosed for this antibody. U.S. Pat. No. 5,616,468 discloses a monoclonal antibody, Var3.1, raised against a synthetic peptide containing a sequence encoded by the human exon 6A of the CD44 gene. Specifically this antibody does not bind to the 90 kD form of human CD44 and is distinguished from the Hermes-3 antibody. A method for detection of the v6 variant of CD44 is provided, as well as a method for screening and assaying for malignant transformation based on this antigen. A method for screening for inflammatory disease based on detecting the antigen in serum is also provided. U.S. Pat. No. 5,879,898 discloses a specific antibody that binds to a 129 bp exon of a human CD44 variant 6 that produces a 43 amino acid peptide. The monoclonal antibody is produced by a number of hybridoma cell lines: MAK<CD44>M-1.1.12, MAK<CD44>M-2.42.3, MAK<CD44>M-4.3.16. The antibody is generated from a fusion protein that contains at least a hexapeptide of the novel CD44 v6 amino acid sequence. Further, there is a disclosure of an immunoassay for the detection of exon 6 variant that can be used as a cancer diagnostic. Significantly, there is no in vitro or in vivo function of this antibody disclosed. U.S. Pat. No. 5,942,417 discloses a polynucleotide that encodes a CD44 like polypeptide, and the method of making a recombinant protein using the polynucleotide and its variants. Antibodies are claimed to these polypeptides however there are no specific examples and there are no deposited clones secreting such antibodies. Northern blots demonstrate the appearance of the polynucleotide in several types of tissues, but there is no accompanying evidence that there is translation and expression of this polynucleotide. Therefore, there is no evidence that there were antibodies to be made to the gene product of this polynucleotide, that these antibodies would have either in vitro or in vivo function, and whether they would be relevant to human cancerous disease. U.S. Pat. No. 5,885,575 discloses an antibody that reacts with a variant epitope of CD44 and methods of identifying the variant through the use of the antibody. The isolated polynucleotide encoding this variant was isolated from rat cells, and the antibody, mAb1.1ASML, directed against this variant recognizes proteins of molecular weight 120 kD, 150 kD, 180 kD, and 200 kD. The administration of monoclonal antibody 1.1ASML delayed the growth and metastases of rat BSp73ASML in isogenic rats. Significantly 1.1ASML does not recognize human tumors as demonstrated by its lack of reactivity, to LCLC97 human large-cell lung carcinoma. A human homolog was isolated from LCLC97 but no equivalent antibody recognizing this homolog was produced. Thus, although an antibody specific to a variant of rat CD44 was produced and shown to affect the growth and metastasis of rat tumors there is no evidence for the effect the this antibody against human tumors. More specifically the inventors point out that this antibody does not recognize human cancers. | High | [
0.665024630541871,
33.75,
17
] |
At present, I teach undergraduate courses which range through several fields of anthropology: archaeology and material culture, socio-cultural anthropology, and biological anthropology. I also teach the anthropology of science, particularly The Anthropology of Outer Space. In my teaching, I draw upon the history and philosophy of science, and broader social theory. | High | [
0.6937062937062931,
31,
13.6875
] |
NOTE: Pursuant to Fed. Cir. R. 47.6, this disposition is not citable as precedent. It is a public record. United States Court of Appeals for the Federal Circuit 2006-3192 LIONEL DAVIS, Petitioner, v. MERIT SYSTEMS PROTECTION BOARD, Respondent. ___________________________ DECIDED: August 11, 2006 ___________________________ Before MAYER, BRYSON, and LINN, Circuit Judges. PER CURIAM. DECISION Lionel Davis petitions for review of a final decision of the Merit Systems Protection Board, Docket No. CH-0752-04-0527-I-1, dismissing his petition for review of the Board’s initial decision as untimely filed. We affirm. BACKGROUND Until his removal on April 23, 2004, Mr. Davis was employed as a letter carrier for the United States Postal Service in Detroit, Michigan. On February 3, 2004, the Postal Service sent Mr. Davis a notice of proposed removal. In the notice, the Postal Service charged Mr. Davis with improperly delaying mail on January 16, 2004, and with extending his field time without authorization 30 times in December 2003 and January 2004, resulting in paid overtime. On the basis of those charges, the Postal Service ultimately removed Mr. Davis. Mr. Davis timely appealed to the Board. The administrative judge who was assigned to Mr. Davis’s case held a hearing and issued a decision on September 3, 2004, affirming Mr. Davis’s removal. The administrative judge’s opinion advised Mr. Davis that he had until October 8, 2004, to file a petition for review with the full Board. The opinion also instructed Mr. Davis that if he received the decision more than five days after its issuance date, he would be allowed up to 30 days from the date he actually received the decision to file a petition for review. See 5 C.F.R. § 1201.114(d). Mr. Davis did not take any further action in his Board appeal until November 5, 2005, more than a year later, when he filed a petition for review with the full Board. In a letter attached to his petition, Mr. Davis asked the Board to set aside its filing deadline because he had “suffered severe depression” since his removal. On November 17, 2005, the Board sent Mr. Davis a letter stating that his petition was untimely filed and that Board regulations require that an untimely petition for review must be accompanied by a motion for waiver of the time limit and a sworn affidavit stating why there is good cause for the late filing. The letter from the Board included a form entitled “Motion to Accept Filing as Timely or to Waive Time Limit.” Mr. Davis filled out the form and returned it to the Board on November 28, 2005. On the form, Mr. Davis reiterated his claim that he had suffered from severe depression as a result of the mental stress related to his removal. 2006-3192 2 The full Board considered Mr. Davis’s explanation and concluded that Mr. Davis had not shown good cause for the delay. The Board therefore dismissed the petition. Mr. Davis now petitions this court for review. DISCUSSION Mr. Davis makes several arguments concerning the merits of his removal, the unresponsiveness of union officials during the union grievance process, and the administrative judge’s disposition of his case. The final decision of the Board, however, was to dismiss Mr. Davis’s petition for review as being untimely filed without a showing of good cause. We are limited to addressing the correctness of that determination. See Rowe v. Merit Sys. Prot. Bd., 802 F.2d 434, 437 (Fed. Cir. 1986); Wallace v. Merit Sys. Prot. Bd., 728 F.2d 1456, 1459 (Fed. Cir. 1984). Pursuant to statutory authorization, 5 U.S.C. § 7701(e), the Board accepts untimely petitions for review upon a showing of good cause for the delay. 5 C.F.R. § 1201.114(f). When the Board declines to waive a filing deadline on the ground that an appellant has not shown good cause for the late filing, we review that determination for an abuse of discretion. See Zamot v. Merit Sys. Prot. Bd., 332 F.3d 1374, 1377 (Fed. Cir. 2003); Mendoza v. Merit Sys. Prot. Bd., 966 F.2d 650, 653 (Fed. Cir. 1993) (en banc); Phillips v. U.S. Postal Serv., 695 F.2d 1389, 1391 (Fed. Cir. 1982). To establish good cause for a filing delay, a petitioner must show that the delay was excusable under the circumstances and that he exercised due diligence in attempting to meet the filing deadline. Zamot, 332 F.3d at 1377; see also Walls v. Merit Sys. Prot. Bd., 29 F.3d 1578, 1582 (Fed. Cir. 1994) (listing factors that may be relevant to a determination of whether good cause has been shown for a delay). 2006-3192 3 In this case, we hold that the Board did not abuse its discretion in ruling that Mr. Davis did not establish good cause for the untimely filing of his petition for review. The Board noted that Mr. Davis’s filing was more than a year out-of-time. Although Mr. Davis stated that he suffered from severe depression as a result of stress related to his removal, the Board noted that he submitted no medical documentation to support his claim. Mr. Davis stated that he had medical bills to support his claim of illness, but he failed to provide those bills for the Board’s consideration. The Board further stated that Mr. Davis did not provide any explanation of how his depression “was so incapacitating as to prevent him from filing a petition for review, or requesting an extension of time, for more than one year.” Conclusory assertions of incapacity of the sort offered by Mr. Davis do not constitute an adequate showing of good cause under the standard applied by the Board. See Lacy v. Dep’t of the Army, 78 M.S.P.R. 434, 437 (1998) (“To establish that an untimely filing was the result of an illness, the party must: (1) Identify the time period during which he suffered from the illness; (2) submit medical evidence showing that he suffered from the alleged illness during that time period; and (3) explain how the illness prevented him from timely filing his appeal or a request for an extension of time.”); see also Smith v. Merit Sys. Prot. Bd., 168 F.3d 1305, 1306 (Fed. Cir. 1999) (referring to the Lacy standards). In his brief in this court, Mr. Davis reiterates his contention that his late filing was caused by his depression, but he does not point to any error in the Board’s determination that he failed to provide an evidentiary basis for his claim. We hold that the Board did not abuse its discretion in finding Mr. Davis’s explanation insufficient, and we therefore affirm the Board’s decision denying his petition for review. 2006-3192 4 | Low | [
0.47750000000000004,
23.875,
26.125
] |
The Carolina Hurricanes are expected to call a news conference for early next week when longtime general manager Jim Rutherford will likely step down. Rutherford just completed his 20th year as general manager of the Hurricanes. Rutherford is the only general manager in the history of the team in Carolina. Under his guidance, the Hurricanes have earned a 534-486-156-20 regular-season record since arriving in North Carolina prior to the 1997-98 season, including a pair of trips to the Stanley Cup Final and the first Stanley Cup title in franchise history in 2006. The former National Hockey League goaltender has been named The Hockey News Executive of the Year twice as well as the Sporting News Executive of the Year in 2006, as voted on by his NHL management peers. Jonathan Isaac Jersey .J. - The New Jersey Devils know the odds are against them as they chase a playoff spot in the Eastern Conference. Grant Hill Jersey . Now the Minnesota Vikings have set their sights on soccer. http://www.magicbasketballprostore.com/k...ic-jersey/. Its been two seasons in one for both parties and neither will look back on the first 18 games fondly. "I think I took the fall for a lot of things," said Gay, reflecting on his short time in Toronto ahead of Wednesdays game against his former club. D.J. Augustin Jersey .com) - Pavel Datsyuk and Gustav Nyquist both scored in the shootout as the Detroit Red Wings denied the Minnesota Wilds comeback bid with a 5-4 win on Tuesday. Vince Carter Jersey . The St. Louis Cardinals were scheduled to arrive in Boston in time for a workout on Tuesday afternoon. Much of Mondays discussion focused on Bostons lineup considerations as the series progresses, specifically when the venue shifts to St.DALY CITY, Calif. -- Karine Icher and her caddie husband, Fred, evaluated the conditions and course at challenging Lake Merced and decided on a Day 1 strategy: stay short of the pin and putt uphill. The move worked beautifully, and Icher delivered the most consistent performance on a day there werent many in the debut of the Swinging Skirts LPGA Classic. "I think its the key on this course," Icher said. "Its a tough golf course, especially with the wind and temperature. It gets so cold. You try to stay warm and try to catch the right wind and go with it and make some putts." The Frenchwoman birdied four of her first seven holes and finished with a 6-under 66 on Thursday to take the lead, two strokes ahead of Lydia Ko and several others. Afterward, Icher was off to pick up 2-year-old daughter, Lola, from the tours childrens care and head to dinner. The start was delayed two hours because of fog and play was suspended because of darkness with 24 players still on the course. Icher had a bogey-free round and hit all but one green in regulation. Many struggled off the tee or with their putters on speedy, tricky greens on a cool day with plenty of wind and hovering fog not far off the Pacific Ocean. The gallery sang "Happy Birthday" to Ko on her 17th birthday as she started from the first tee, and Ko came through with a 68 on a day she was also named among TIME magazines 100 most influential people. Kos group barely beat the horn for darkness. "I wanted to finish today," she said, acknowledging the birthday song was "kind of embarrassing" but much-appreciated. Morgan Pressel birdied four of her first eight holes and was among the players sitting three strokes back at 69. Mo Martin also shot a 69 after warming up four times before finally hitting her first tee shot following the fog delay. Pressel, whose round began on the back nine, went to 4 under at the turn. Top-ranked Inbee Park opened with a 73 in the $1.8 million event, while second-ranked Suzann Pettersen had a 70 in her first tournament since missing three events with a back injury. On the par-4 11th, a frustrated Pettersen made an 8-foot putt for triple-bogey to fall from 3 under to even par before bouncing back.dddddddddddd Michelle Wie, coming off her first win in nearly four years last week in her home state of Hawaii, finished at even-par 72. Those who were still on the course will play resume their rounds Friday morning, so many will have a quick turnaround after a short break. Tee times remained the same. Pressel also had a sizzling first round in Phoenix last month, going 9 under through her first 11 holes in the JTBC Founders Cup and chasing a 59. But Pressel bogeyed two straight holes and wound up with a 7-under 65. On Thursday, she recovered for par on holes 16 and 18 after both tee shots missed the fairway. On the forgiving par-5, 532-yard 18th, Pressels drive ricocheted off a tree and landed in a more favourable lie to the right of the fairway. She nearly put her third shot onto the green but the ball kicked back a couple of feet shy. "It was actually a bit of a struggle out there. My short game kept me in it. I stayed patient," Pressel said. "I stayed tough. Its a tough golf course. I knew nobody was going to go out there and blitz it." Martin played through more fog, and even wondered whether there might be a second delay. The LPGA is back in the Bay Area for the first time since 2010, and San Francisco provided exactly the kind of day that so perfectly represents this region and its unpredictable weather patterns. Martin sported an "L" charm necklace in memory of her grandfather, Lincoln Martin, who died last month at age 102. One of her biggest supporters since they reconnected 10 years ago, he last travelled to a tournament in Rochester, N.Y., last year. He ate vanilla ice cream on his chocolate crisped rice cereal -- with half and half to boot -- for breakfast every morning. He also had several U.S. patents. "It would be really hard to do him justice in a couple sentences, but greatest person Ive ever met," she said. "Changed my life when I got to know him in the last 10 years. Most peaceful person Ive ever met. ... Everybody out here loved him. He followed womens golf and was a fan of everyone." Angela Stanford and Se Ri Pak withdrew Thursday, and neither provided a reason to tournament officials. Cheap Soccer Jerseys AuthenticWholesale Hockey JerseysNike NFL Jerseys ChinaCheap Nike MLB Jerseys ChinaWholesale Baseball Jerseys ChinaWholesale College JerseysCheap Jerseys From ChinaWholesale Jerseys Near MeCheap Jerseys OnlineCheap NFL Jerseys AuthenticCheap Nike NFL Jerseys AuthenticCheap Soccer Jerseys ChinaCheap NCAA Jerseys AuthenticCheap Nike NBA JerseysCheap NHL Jerseys AuthenticMLB Jerseys ChinaCheap Jerseys From ChinaCheap NFL Throwback JerseysCheap Nike NFL JerseysCheap NFL Jerseys China ' ' ' | Mid | [
0.6129032258064511,
33.25,
21
] |
<window id="106">
<defaultcontrol>1000</defaultcontrol>
<include>Window_OpenClose_Animation</include>
<coordinates>
<system>1</system>
<posx>0</posx>
<posy>0</posy>
</coordinates>
<controls>
<control type="image" id="999">
<description>background image</description>
<posx>0</posx>
<posy>0</posy>
<width>360</width>
<texture border="20">menu_dialog_background.png</texture>
<colordiffuse>FF212121</colordiffuse>
</control>
<control type="button" id="1000">
<description>button template</description>
<posx>10</posx>
<posy>0</posy>
<width>340</width>
<height>72</height>
<align>center</align>
<aligny>center</aligny>
<font>font26</font>
<textcolor>white</textcolor>
<focusedcolor>black</focusedcolor>
<texturefocus border="30">button_action_menu_source_on.png</texturefocus>
<texturenofocus>-</texturenofocus>
</control>
</controls>
</window>
| Low | [
0.48628428927680806,
24.375,
25.75
] |
The Effect of Parkinson Disease Tremor Phenotype on Cepstral Peak Prominence and Transglottal Airflow in Vowels and Speech. The physiological manifestations of Parkinson disease are heterogeneous, as evidenced by disease subtypes. Dysphonia has been well documented as an early and progressively significant impairment associated with the disease. The purpose of this study was to investigate how acoustic and aerodynamic measures of vocal function were affected by Parkinson tremor subtype (phenotype) in an effort to better understand the heterogeneity of voice impairment severity in Parkinson disease. This is a prospective case-control study. Thirty-two speakers with Parkinson disease assigned to tremor and nontremor phenotypes and 10 healthy controls were recruited. Sustained vowels and connected speech were recorded from each speaker. Acoustic measures of cepstral peak prominence (CPP) and aerodynamic measures of transglottal airflow (TAF) were calculated from the recorded acoustic and aerodynamic waveforms. Speakers with a nontremor dominant phenotype exhibited significantly (P < 0.05) lower CPP and higher TAF in vowels compared with the tremor dominant phenotype and control speakers, who were not different from each other. No significant group differences were observed for CPP or TAF in connected speech. When producing vowels, participants with nontremor dominant phenotype exhibited reduced phonation periodicity and elevated TAF compared with tremor dominant and control participants. This finding is consistent with differential limb-motor and cognitive impairments between tremor and nontremor phenotypes reported in the extant literature. Results suggest that sustained vowel production may be sensitive to phonatory control as a function of Parkinson tremor phenotype in mild to moderate stages of the disease. | High | [
0.705357142857142,
29.625,
12.375
] |
The effects of cryopreservation on red blood cell rheologic properties. In transfusion medicine, frozen red blood cells (RBCs) are an alternative for liquid-stored RBCs. Little is known about the rheologic properties (i.e., aggregability and deformability) of thawed RBCs. In this study the rheologic properties of high-glycerol frozen RBCs and postthaw stored in saline-adenine-glucose-mannitol medium were compared to those of conventionally liquid-stored and fresh RBCs. Fresh RBCs were obtained from healthy volunteers. Leukoreduced liquid-stored and thawed deglycerolized RBC units were obtained from the Sanquin Blood Bank. RBCs were tested for aggregability (aggregation index [AI]), deformability (elongation index [EI]), and various hematologic variables. The AI of thawed RBCs was reduced, compared to fresh and liquid-stored RBCs (p<0.05). The EI of stored RBCs was significantly enhanced over a shear stress range of 2.0 to 50Pa compared to fresh RBCs (p<0.05). No significant differences in EI between thawed and 21- or 35-day liquid-stored RBCs were observed. The osmotic fragility, hemolysis, mean cell volume, and mean cell hemoglobin concentration of thawed RBCs were markedly altered, compared to fresh and liquid-stored RBCs (p< 0.05). The adenosine triphosphate (ATP) content of thawed RBCs was similar to 3- or 21-day liquid-stored and fresh RBCs. Thawed RBCs are more fragile than conventionally liquid-stored and fresh RBC. The freeze-thaw-wash process, however, did not adversely affect the aggregability and deformability or the ATP content of thawed RBCs. Based on the rheologic properties, cryopreserved RBCs are a valuable alternative to liquid-stored RBCs. | High | [
0.7005076142131981,
34.5,
14.75
] |
Q: Does Stack Overflow use a microformat for questions/answers? Recently when I have seen Stack Overflow results in Google, I have seen something like this: Note the text, "9 answers". Does Stack Overflow do anything special to get this shown? I have noticed a similar Rich Snippet on Yahoo Answers, which also said "Solved". I skimmed the source of both pages and couldn't see anything specific that looked like a microformat. There is nothing on schema.org specifically about Q&A. Is Google treating these sites specially? A: It certainly does look like Google is treating these sites specially. When you see results from discussion forums in Google search results it contains various helpful bits of information, like dates and numbers of replies. So it looks like Google has written custom parsers for various popular forum engines. This blog post from 2009 announces it as a feature but doesn't say how they do it. A: Is Google treating these sites specially? As paulmorriss mentioned, Google does apply an algorithmic means for identifying forums and, interestingly enough, Yahoo Answers and Ask.MetaFilter show similar snippets (search "Does my dog have fleas?" or "What does my cat think I am?" ... ?!) so it's quite possible that Google is treating sites with a few key indicators (i.e. 90% of <h1>'s include a question mark, words "question" and "answer" appear on every page, etc) as Q/A sites pending the introduction of a formal schema. From a review of sites in question (Y!A, Ask.MetaFilter, Quora) there does not appear to be any consistent formatting beyond the aforementioned use of "?" in the heading and the appearance of the words "question" and "answer" throughout most pages. | Mid | [
0.605664488017429,
34.75,
22.625
] |
<?xml version="1.0" encoding="UTF-8"?> <Workspace version = "1.0"> <FileRef location = "self:ZKPulseView.xcodeproj"> </FileRef> </Workspace> | Low | [
0.257799671592775,
9.8125,
28.25
] |
This White Genware Superior Chef Jacket Long Sleeve XXL 52"-54" comes with replaceable black stud buttons for longer life and a handy sleeve pocket for a thermometer. The Superior Jacket provides durability, comfort and style that can cope with the tough kitchen environment. Suitable for commercial laundering. | Mid | [
0.619385342789598,
32.75,
20.125
] |
Molecular characterisation of cytochrome P450 enzymes in waterflea (Daphnia pulex) and their expression regulation by polystyrene nanoplastics. Cytochrome P450 (CYP) enzymes are one of the largest protein families, and they metabolise a wide range of lipophilic organic endogenous and exogenous compounds. Many cytochrome P450 genes have been cloned and characterised, and they are frequently used as biomarkers in environmental toxicology studies because of their sensitivity and inducibility. In the present study, the full-length cDNAs of DpCYP370B and DpCYP4 were cloned from Daphnia pulex for the first time. The sequence of DpCYP370B consisted of an ORF of 1515 bp that encoded a 504 amino acid polypeptide, while the sequence of DpCYP4 comprised an ORF of 1527 bp that encoded a 508 amino acid polypeptide. Homologous alignments revealed the presence of a conserved cysteine haeme-iron ligand signature, FxxGxxxCxG, located in the C-terminal portion. Both the proteins contained a sequence for a transmembrane region that was deduced to be located in the endoplasmic reticulum. Subsequently, the expression levels of DpCYP370B and DpCYP4, as well as those of CYP4AN1, CYP4C33, and CYP4C34, were investigated using quantitative real-time PCR after exposure to five polystyrene nanoplastic concentrations: 0 (control), 0.1, 0.5, 1, and 2 mg/L for 21 days. Except for DpCYP4, the highest mRNA expression was observed at 0.5 mg/L nanoplastics; next, the expression of three of the enzymes (DpCYP370B, CYP4AN1, CYP4C34,) decreased to that of the control level at 1 and 2 mg/L doses of nanoplastics. The expression of DpCYP4 did not significantly change compared with that of the control group. These results indicated that CYP genes might play an important role in protecting D. pulex against nanoplastic pollutants. | High | [
0.700410396716826,
32,
13.6875
] |
Dispatch from Wisconsin: "Wisconsin is the canary in the coal mine" NUPGE representatives are in Madison providing support and solidarity to Wisconsin public service workers. This is the first in a series of dispatches from Wisconsin, where the governor's union-busting is spurring a popular uprising. Ottawa (9 Mar. 2011) - Every day for the past 20 days, there have been protests in the streets of Madison, Wisconsin's capital. Tens of thousands of people have joined the protests. The Republican state Governor, Scott Walker, wants to strip collective bargaining rights from 175,000 Wisconsin public service workers. Under the proposed legislation, workers would no longer have a voice on key issues such as working conditions, health and safety, grievance procedures, or equality provisions. This is a full, frontal attack on collective bargaining rights, public sector unions and the entire US labour movement. The following report and photos are from Holly Page (BCGEU/NUPGE) who is one of the NUPGE representatives in Wisconsin. Wisconsin Dispatch 1: "Wisconsin is the canary in the coal mine" Of the thousands of protest signs I've seen, one of my favourite reads: "Wisconsin is the canary in the coal mine." It resonates with what could be the rolling out of union busting not only here in Madison, Wisconsin, but in Canada as well. I arrived in Madison on the 20th day of the protests. The sounds are spectacular: chanting, drumming, people cheering. This has been unlike any demo I have ever been to. The Wisconsin Capitol building is the focus of the protest. It sits in the middle of a huge, square block, surrounded by streets on all four sides. Forty to fifty thousand activists are walking around the square chanting and singing. There is a huge rally with another couple thousand people on one side of the building, and another rally with a thousand more people on the opposite side. People are lined up hundreds deep on the remaining sides of the building. Flags, banners and pickets can be seen everywhere. The mood and energy is incredibly powerful, and positive. On every door of the Wisconsin Capitol building, there are coloured post it notes with messages to the elected. I posted a note of solidarity from the BCGEU. Today I will line up and hang our BCGEU Flag in solidarity. Nearly every store and business has a sign in the window supporting the unions. There is a lot of local police presence here, but many of them are having pictures taken with protesters and shaking hands and hi-fiving people. The people of Madison are clearly supporting this rally. Sprinkled throughout the crowds are palm trees all shapes and sizes. Last week, right wing news channel FOX News showed violent demonstrations on their newscasts. They said it was footage from Madison, Wisconsin, that happened to feature palm trees in the back ground. That was obviously not Madison, where the average temp now is six degrees celsius. Home made palm trees of all shapes and sizes now grace central Madison, along with signs stating "FOX lies." FOX News is engaged in a disinformation campaign, calling Madison protestors "greedy" and "violent unions." As I type, I can hear bagpipes. Firefighters decked out in gear are playing bagpipes and drumming. As I get closer in the middle of the parade, I see Michael Moore has come to join the rally. He addressed the rally for about 20 minutes thanking everybody who has maintained a hold on Wisonsin's Capitol for almost three weeks. He told them not to walk away. "We're going to do this together. Don't give up. Please don't give up," he said. (Click here for a video of Michael Moore's speech.) Stay tuned for more BCGEU dispatches from Wisconsin. NUPGE The National Union of Public and General Employees (NUPGE) is one of Canada's largest labour organizations with over 340,000 members. Our mission is to improve the lives of working families and to build a stronger Canada by ensuring our common wealth is used for the common good. | Mid | [
0.633416458852867,
31.75,
18.375
] |
require 'termnote/pane/helpers' require 'termnote/pane/chapter' require 'termnote/pane/text' require 'termnote/pane/code' require 'termnote/pane/console' module TermNote module Pane attr_accessor :show, :height, :width, :rows def call(window_size) window_height, window_width = window_size @width = window_width @height = window_height clear render end private def clear system("clear") end def render puts show.header + space + formated_rows + space end def space "\n" * (height / 2) end def formated_rows @output ||= rows.map(&method(:guttered_row)).join("\n") end def guttered_row(row) raise ArgumentError, "content was larger than screen" if gutter_width(row) < 0 gutter(row) + row end def gutter(row) " " * gutter_width(row) end def gutter_width(row) (width / 2.0).floor - (row.width / 2.0).ceil end end end | Low | [
0.510869565217391,
29.375,
28.125
] |
Bilateral diabetic papillopathy and metabolic control. The pathogenesis of diabetic papillopathy largely is unknown, but case reports suggest that it may follow rapidly improved metabolic control. The present study was designed to investigate this hypothesis. Retrospective case-control study. Two thousand sixty-six patients with type 1 diabetes. Review of clinical, photographic, and clinical chemistry records from a large diabetology and ophthalmology unit between 2001 and 2008. Simultaneous, bilateral diabetic papillopathy. The mean follow-up was 4.9 years. During 10,020 patient-years of observation, bilateral diabetic papillopathy developed in 5 patients. During the year preceding this incident, all 5 patients had experienced a decrease in glycosylated hemoglobin A₁(c) (HbA₁(C)) at a maximum rate of -2.5 (mean) percentage points per quarter year, which was significantly different from the changes in HbA₁(C) observed in the remainder of the study population (P<0.001). Photographs recorded before the onset of bilateral diabetic papillopathy showed that all 5 patients had small cup-to-disc diameter ratios in both eyes (P<0.001). Diabetic papillopathy was associated markedly with a drastic recent reduction in glycemia and a small cup-to-disc diameter ratio. This supports the hypothesis that diabetic papillopathy may be an early worsening phenomenon occurring in anatomically predisposed patients in response to a recent rapid decrease in glycemia. The author(s) have no proprietary or commercial interest in any materials discussed in this article. | High | [
0.6795180722891561,
35.25,
16.625
] |
2005 IIHF World Championship Main article: 2005 Men's Ice Hockey World Championships The 2005 IIHF World Championship was held in May 2005 in Vienna and Innsbruck, Austria. It was the 69th annual event, and was run by the International Ice Hockey Federation (IIHF). Venues Rosters Preliminary round Sixteen participating teams were placed in the following four groups. After playing a round-robin, the top three teams in each group advanced to the qualifying round. The last team in each group competed in the relegation round. Group A All times local (UTC +3) Group B All times local (UTC +3) Group C All times local (UTC +3) Group D All times local (UTC +3) Qualifying round The top three teams from each group in the First Round advance to the qualifying round. The top three teams from Groups A and D advance to Group E, and the top three teams from Groups B and C advance to Group F. Teams in the qualifying round carry forward the results and points gained in the preliminary round with the teams that they have played and advance with. Teams, which have played in the preliminary round, do not meet again in the qualifying round. Group E All times local (UTC+3) Group F Relegation round The consolation round is composed of the four teams that placed last in Groups A through D. They play in a round-robin fashion, and the bottom two teams get relegated to the Division I group in next year's World Championships. Group G All times local (UTC +3) Playoff round Bracket Quarter-finals Semi-finals Bronze medal game Gold medal game Ranking and statistics Final standings The final standings of the tournament according to IIHF: Scoring leaders List shows the top skaters sorted by points, then goals. If the list exceeds 10 skaters because of a tie in points, all of the tied skaters are left out. Source: Leading goaltenders Only the top five goaltenders, based on save percentage, who have played 40% of their team's minutes are included in this list. Source: See also 2005 in ice hockey 2005 IIHF World U18 Championships 2005 World Junior Ice Hockey Championships References External links 2005 IIHF World Championship official site Category:IIHF World Championship 1 World championships Category:International ice hockey competitions hosted by Austria Category:Sports competitions in Vienna Category:Sports competitions in Innsbruck Category:April 2005 sports events in Europe Category:May 2005 sports events in Europe Category:2000s in Vienna Category:2000s in Innsbruck | High | [
0.6693657219973,
31,
15.3125
] |
Lego Space "Midi Small" sets from the 80s and 90s. These "small" sets were slightly larger than the "Small" and "Mini-Small" sets of my previous lists. The boxes for these sets were almost double the length of the small sets. The sets numbered in the 684x range and expanded to the 685x range in the 1990s with boxes that were more squarish. (1985) This set is the second set this year in the series. It was not readily available, and from the looks of it is probably a US only set. It has the standard red minifig for the series, but departs from the jet-rover sequence for the series. (1987) This is the last Classic Space set in the series, and it continues the jet - rover alternation. A yellow Classic Space minifig helms the vehicle in the year that the Futuron minifigs were introduced. (1988) Notice that this is the second set to bear this set number, and this set was available worldwide. This set breaks the sequence of alternating between ground and air vehicles by introducing a Mecha. Note that this is also a Futuron set. (1996) There were no Ice Planet or Spyrius or Unitron sets in this size, bu tthere was a number that was skipped. One has to wonder if it was an Ice Planet or Spyrius set that was unproduced. Exploriens was the next sub-theme to introduce a set in this size. Note that there's also 6856 in the Exploriens theme, but that's for the next size up. UFO and Insectoids did not have a set in this size. The numbers 6855, 6857, 6858 and 6859 were not used. | Mid | [
0.609865470852017,
34,
21.75
] |
Crystal structure of YHI9, the yeast member of the phenazine biosynthesis PhzF enzyme superfamily. In the Pseudomonas bacterial genomes, the PhzF proteins are involved in the production of phenazine derivative antibiotic and antifungal compounds. The PhzF superfamily however also encompasses proteins in all genomes from bacteria to eukaryotes, for which no function has been assigned. We have determined the three dimensional crystal structure at 2.05 A resolution of YHI9, the yeast member of the PhzF family. YHI9 has a fold similar to bacterial diaminopimelate epimerase, revealing a bimodular structure with an internal symmetry. Residue conservation identifies a putative active site at the interface between the two domains. Evolution of this protein by gene duplication, gene fusion and domain swapping from an ancestral gene containing the "hot dog" fold, identifies the protein as a "kinked double hot dog" fold. | High | [
0.6976744186046511,
30,
13
] |
Asked by: Kadim Olzhas, Kazakhstan Most nosebleeds involve superficial bleeding from the capillaries close to the skin and can be stopped with pressure and an ice pack. But nosebleeds can also be caused by a torn internal carotid artery and in that case the bleeding can be fast enough to be life threatening. It’s also possible for a milder nosebleed to block your airway and asphyxiate you. A 47-year-old man from Gravesend, Kent died this way in 2011. Read more: Subscribe to BBC Focus magazine for fascinating new Q&As every month and follow @sciencefocusQA on Twitter for your daily dose of fun science facts. | Mid | [
0.611909650924024,
37.25,
23.625
] |
package io.swagger.codegen.options; /** * Created by steve on 18/09/16. */ public class JavaUndertowServerOptionsProvider extends JavaOptionsProvider { @Override public String getLanguage() { return "undertow"; } @Override public boolean isServer() { return true; } } | Low | [
0.503685503685503,
25.625,
25.25
] |
485 F.Supp. 789 (1980) UNITED STATES of America v. Ramon BARRIENTOS and Michael Karasik. Crim. No. 79-180. United States District Court, E. D. Pennsylvania. January 23, 1980. Roberto Rivera-Soto, Philadelphia, Pa., W. Cecil Jones, Asst. U. S. Atty., for plaintiff. William A. Clay, Miami, Fla., for Mr. Barrientos. Carl H. Lide, Miami, Fla., for Mr. Karasik. MEMORANDUM POLLAK, District Judge. I. On July 31, 1979, an indictment was returned by a federal grand jury in the Eastern District of Pennsylvania. The indictment charged that Ramon Barrientos, Cesar Sandino Grullon, Virgilio Armando Mejia, and Michael Karasik had conspired in violation of 18 U.S.C. § 371 to violate 22 U.S.C. § 2778 which makes it a crime to export certain categories of weapons without a license from the federal government. The indictment alleged the commission of overt acts in furtherance of the conspiracy both in the Eastern District of Pennsylvania and in the Southern District of Florida. The geographic diversity of the indictment paralleled the geographic diversity of the four *790 defendants: Grullon worked in the Eastern District of Pennsylvania and resided in nearby New Jersey. Mejia worked and resided in the Eastern District of Pennsylvania. Barrientos and Karasik both resided and worked in the Southern District of Florida.[1] On October 5, 1979, I granted the Government's motion to sever the trial of defendants Barrientos and Karasik from the trial of defendants Grullon and Mejia. Thereafter, defendants Grullon and Mejia were tried without a jury. At the close of the Government's case, I denied motions for directed verdicts of acquittal predicated on the strict scienter standard articulated by the Court of Appeals for the Fifth Circuit in United States v. Wieschenberg, 604 F.2d 326 (1979). I held that in this Circuit the proper construction of 22 U.S.C. § 2778 (and hence of an indictment charging a conspiracy to violate 22 U.S.C. § 2778) invokes the less demanding scienter standard reflected in Judge Broderick's jury instructions in United States v. Byrne, 422 F.Supp. 147, 168 n.20 (E.D.Pa.1976), in part affirmed and in part reversed on other grounds, sub nom. United States v. Cahalane, 560 F.2d 601 (3d Cir. 1977), cert. denied, 434 U.S. 1045, 98 S.Ct. 890, 54 L.Ed.2d 796 (1978). At the close of the case, I found defendants Grullon and Mejia guilty. In explaining my verdict, as announced from the bench on December 4, 1979, I stated that the Government's case fully met the Byrne standard (sustained in Cahalane) although not, in my view, the Wieschenberg standard as I understood it. The trial of defendants Barrientos and Karasik was scheduled to follow shortly after the conclusion of the trial of Grullon and Mejia. On December 12, 1979, Barrientos and Karasik moved to transfer the trial to the Southern District of Florida. On December 14 the Government filed its memorandum opposing the transfer, and on that day I held a hearing on the motion. Following the hearing I granted the motion to transfer, announcing my decision from the bench.[2] My decision involved an examination of the several relevant factors identified, and apparently approved, in Platt v. Minnesota Mining & Manufacturing Co., 376 U.S. 240, 244, 84 S.Ct. 769, 771, 11 L.Ed.2d 674 (1964). After examining the various factors, I concluded with the following exposition of the elements which seemed to me to be controlling: My conclusion is that this case should be transferred and I come to that conclusion because, with balances reasonably close on several of the items, the items that seem to me dispositive are those that go to, I think, the very, very extraordinary financial burden that would be imposed on the defendants and their attorneys if this case were retained here and I don't put at a low level the Government's inconvenience in continuing its prosecution here where its attorneys are located, where the really indispensible member of this whole case, Agent Fleisher, is located, but he too is mobile, I guess. I don't put the Government's interests at naught but it's only a matter, if I may say so, of inconvenience, not of fundamental disadvantage, and to the extent that one is talking about balances of convenience as *791 between the Government and the defendants, I conclude that on the question of transfer where the matter is in equilibrium the Government's interest must be subordinated, but having offered that dictum I do want to add that I do not regard this as a situation in which the matter is in equilibrium. I do think that the comparative financial burdens weigh very heavily in favor of permitting the defendants and their lawyers to try the case on their home grounds and, apart from the dollar cost, I think the factor of homeness is a factor which deserves real weight when there is no compulsion that points in another direction. I think it perfectly clear that if we were now to look back and say "Where would this indictment have been laid and this prosecution brought had there not been a Mr. Grullon and a Mr. Mejia charged in the same indictment?" the case would have been brought in Miami against Mr. Barrientos and Mr. Karasik and I think that is the status quo ante which would have been which should now be reconstructed by an order transferring this case to the Southern District of Miami. N.T. 87-89. II. The Government has now moved for reconsideration of the order of transfer. The reason assigned is that I did not give weight to the likelihood that the trial of Messrs. Barrientos and Karasik, if it is to take place in the Southern District of Florida rather than here, will be governed by the standard of scienter prevailing in the Fifth Circuit namely, the strict Wieschenberg standard which I declined to follow in the trial of Messrs. Grullon and Mejia. According to the Government: 11. In its December 14, 1979 oral findings, the Court did not specifically address the fact that, upon a forum non conveniens transfer, the law of the transferee district would apply. 12. In its December 14, 1979 oral findings, the Court did not take note of the conflict of law between the Fifth Circuit and all other Circuits as a "special element which might affect a transfer" (N.T. 87); this is one of the factors adopted sub silentio in Platt v. Minnesota Mining Co., 376 U.S. 240, 244 [84 S.Ct. 769, 771, 11 L.Ed.2d 674] (1964), as relevant in considering a forum non conveniens motion. 13. Because of the conflict of law between the Circuits, which conflict arose after the filing of Bill of Indictment 79-180, it is not in the interest of justice to transfer the instant cause to the Southern District of Florida for trial. 14. It is not in the interest of justice that the defendants Ramon Barrientos and Michael Karasik be tried under a stricter standard of proof than the one used for the defendants Cesar Sandino Grullon and Virgilio Armando Mejia, particularly when the Court declined to adopt such stricter standard. 15. The timing of the motion for transfer suggests an attempt at forum-shopping, the need for which became obvious after this Court declined to follow the Fifth Circuit-Weischenberg [sic] standard. The contention is not one of Government pressed in its papers opposing the motions to transfer, or in the hearing on the motions. Nonetheless, I will consider the Government's contention on its merits: no purpose would be served in persisting in the order of transfer if it was an abuse of discretion or erroneous as a matter of law. A. I find unpersuasive the Government's submission that Platt v. Minnesota Mining and Manufacturing Co. "sub silentio" requires that I include, among the factors to be considered as bearing on the appropriateness of transfer, the likelihood that a change of venue will carry with it a change of applicable law. To the extent that Platt speaks to the matter at all, I think it counsels a judge not to take a consideration of this sort into account. In that case, a district judge sitting in Illinois *792 declined to transfer a criminal case to Minnesota for the reason, inter alia, that in the judge's view it would be hard to select in Minnesota a jury not biased in favor of the defendant, a large Minnesota-based corporation. The Court of Appeals for the Seventh Circuit held that it was inappropriate for a judge, in weighing the elements going into a discretionary determination to transfer or to retain a case, to conjecture about how a case would be conducted if tried in another district. Minnesota Mining and Manufacturing Co. v. Platt, 314 F.2d 369, 375 (7th Cir. 1963). "We believe," said the Court of Appeals, "it would be an unsound and dangerous innovation in our federal court system for a judge in any district to appraise or even speculate as the efficacy of the operations of a federal court of concurrent jurisdiction in another district." Id. Therefore, in order to correct the Illinois district judge's erroneously based denial of the motion to transfer, the Court of Appeals directed transfer of the case to the federal court sitting in Minnesota. Id. The Supreme Court reversednot because it disagreed with the Seventh Circuit's holding that the district judge should have excluded from his calculus any consideration of whether a fair trial could be had in Minnesota, but rather because the Court of Appeals should, after determining that the district judge had erred, have simply vacated the order of transfer and remanded so that the district judge in whom the discretion was vested, could redetermine the transfer question, confining his attention to the factors which it was proper for him to consider. Accordingly, I feel that it would be outside the ambit of Platt for me to entertain the Government's contention that the potential application of the Fifth Circuit's Wieschenberg rule, in preference to Judge Broderick's Byrne rule sustained by the Third Circuit in Cahalane, "is not in the interest of justice." B. But the Government's position has a more basic flaw. It proceeds from a predicate namely, that there is in this instance a "conflict of law" which, in Section II(A) of this opinion, I assumed arguendo to be true, but which, in my judgment, cannot withstand analysis. When two or more states whether sovereign nations or the quasi-sovereign states which compose the United States and other federal unions have significant connections with a single legal controversy, it is not uncommon that the different states will be the source of discrepant legal norms, any of which could reasonably be regarded as constituting a proper rule of decision. Choosing the most proper of the competing norms is a chief end of that branch of jurisprudence denominated "conflicts of laws." It is in the handling of civil diversity cases that federal courts are most apt to run into conflicts questions: in that context, (1) a federal court is bound to follow the whole substantive law of the state in which it sits, including its conflicts rules,[3] and (2) when a case is transferred, pursuant to 28 U.S.C. § 1404(a), from a less convenient venue in one state to a more convenient venue in another state, the law of the transferor forum follows the case.[4] The mere statement of these familiar propositions suffices to show that characterization of the problem presented in the current circumstance as a "conflict of law between the Circuits" is a misnomer. The substantive legal norm applicable to the Government's criminal case against Messrs. Barrientos and Karasik is Section 2778 of Title 22 of the United States Code. There is no competing norm, and hence there is no conflict of laws. There is apparently a conflict of interpretations, as between the Fifth and Third Circuits, of the single applicable norm. I happened to think the Third Circuit's interpretation is the sounder one. I follow it, however, not because I subscribe to it but because, sitting in Philadelphia, I am required to do so, just as a district judge sitting in Miami must follow the Fifth Circuit *793 interpretation whatever that judge's own views may be. In short, I have no a priori basis for concluding that the "interest of justice" would be served by applying the Third Circuit's interpretation of Section 2778 rather than the Fifth Circuit's interpretation, or vice-versa. Whether one interpretation or the other governs the trial of Messrs. Barrientos and Karasik is, therefore, a matter not relevant to my decision on whether the trial should be transferred to the Southern District of Florida. What I have said is not intended to signify that discrepant judicial interpretations of a particular federal legal norm do not pose a problem of consequence. The opposite is true and most especially so when the norm is part of the federal criminal code, since a civilized legal order cannot tolerate the imposition of criminal sanctions on some, but not on others, for the same conduct. But resolving the inconsistent rulings of two courts of appeals is not the job of a district court; it is the job of the Supreme Court. Thus, if, in the present circumstance, it were to fall out that transfer to Miami of the case against Messrs. Barrientos and Karasik were to lead to their acquittal, through the application of Wieschenberg, while the convictions of Messrs. Grullon and Mejia were to be sustained by our Court of Appeals on the authority of Byrne and Cahalane, it would then be expectable that the Supreme Court would grant certiorari to review the cases of Grullon and Mejia, with a view to restoring the uniformity of federal law. See Sup.Ct.R. 19.1(b). The Government's Motion to Reconsider the Change of Venue Order will, therefore, be denied. NOTES [1] The indictment also contained a second count alleging a conspiracy unrelated to that charged in the first count and which named defendants Grullon and Mejia but not defendants Barrientos and Karasik. That second count is irrelevant to the issues considered in this opinion. [2] In its motion to reconsider the transfer order the Government characterizes the hearing as "an ex parte, in camera proceeding from which the Government was excluded." Government's Motion to Reconsider the Change of Venue Order, Paragraph 10. There was one phase of the hearing in which the Government did not participate. That was the phase in which defendants Barrientos and Karasik outlined in considerable detail including the names and hoped-for testimony of several potential witnesses the anticipated defense described in its broad contours on pages 4 and 5 of the motion to transfer. Recognizing that it would have been inappropriate for the Government to be apprised of the identities and anticipated testimony of defense witnesses at this pre-trial stage, the Government agreed that I should conduct that phase of the hearing in camera and with no Government attorneys present. N.T. 17, 20. [3] Klaxon Co. v. Stentor Electric Co., 313 U.S. 487, 61 S.Ct. 1020, 85 L.Ed. 1477 (1941). [4] Van Dusen v. Barrack, 376 U.S. 612, 84 S.Ct. 805, 11 L.Ed.2d 945 (1964). | Mid | [
0.541935483870967,
31.5,
26.625
] |
22.4.3 The Top Level of Mode Line Control The value of this variable is a mode line construct that controls the contents of the mode-line. It is always buffer-local in all buffers. If you set this variable to nil in a buffer, that buffer does not have a mode line. (A window that is just one line tall also does not display a mode line.) The default value of mode-line-format is designed to use the values of other variables such as mode-line-position and mode-line-modes (which in turn incorporates the values of the variables mode-name and minor-mode-alist). Very few modes need to alter mode-line-format itself. For most purposes, it is sufficient to alter some of the variables that mode-line-format either directly or indirectly refers to. If you do alter mode-line-format itself, the new value should use the same variables that appear in the default value (see Mode Line Variables), rather than duplicating their contents or displaying the information in another fashion. This way, customizations made by the user or by Lisp programs (such as display-time and major modes) via changes to those variables remain effective. Here is a hypothetical example of a mode-line-format that might be useful for Shell mode (in reality, Shell mode does not set mode-line-format): | High | [
0.66260162601626,
20.375,
10.375
] |
Lake County Port Authority Board of Directors have appointed Cathy Walsh to serve as the agency's interim executive director. Walsh, who is the Port Authority's chief financial officer, takes over for former Executive Director John Loftus who retired last month. "I'm happy to carry the Port through the transition period and make sure everything moves forward, all the projects we have going on," Walsh said Wednesday after the board appointment. "There is a lot of important things we're working on and I'm just glad to do my part to make sure that we keep moving forward in a positive way." Among the major projects for the Port Authority is work to secure leases for companies to occupy the former Coe Manufacturing site in Painesville, which the Port Authority now calls the Bank Street project. Advertisement The Port Authority last year obtained the 25-acre site that has not been utilized for the past two years with the goal to encourage companies to move in and have the property become productive again. Several companies have expressed an interest in moving to the site. Port Authority officials also continue to work with local, county and federal officials to see if it is feasible to take over ownership of the Lost Nation Airport. Board Chairman Harry Allen said the Port Authority is optimistic about what the agency is learning. "Right now we're in the final stages of documentation with the city of Willoughby and the FAA regarding final agreements and final property agreement language," Allen said. He said there are a few more steps that need to take place, including ensuring financial accountability and accounts that need to be resolved before a transfer of ownership can happen. "Due diligence efforts are under way to better ascertain the costs and operations of the facility," he said. The Port Authority Board also selected officers for the year. Re-elected were Allen as chairman and Christopher Madison as secretary. Rita McMahon, former Painesville city manager who was appointed the board last month by county commissioners, was elected as vice chairwoman. | Mid | [
0.6208251473477401,
39.5,
24.125
] |
Q: Remove quotes from json object How to remove the quotes from json object: Using php, i get the data in the following format(display the data using console.log()) [ ["Catching the Wind in Rural Malawi § SEEDM...", "3"], ["Engineering § SEEDMAGAZINE.COM...", "2"], ["Technology Review India: Nissan's Lea...", "2"], ["Alternative Fuel Consulting & Technical Tr...", "2"], ["MIT OpenCourseWare | Science, Technology, ...", "2"] ] How to remove the quotes using jquery/json,I need string like this(no quotes around the number): [ ["Catching the Wind in Rural Malawi § SEEDM...", 3], ["Engineering § SEEDMAGAZINE.COM...", 2], ["Technology Review India: Nissan's Lea...", 2], ["Alternative Fuel Consulting & Technical Tr...", 2], ["MIT OpenCourseWare | Science, Technology, ...", 2] ] A: You don't. You parse the JSON, convert them to integers, and then stringify again. | Mid | [
0.5663956639566391,
26.125,
20
] |
-- $Id$ -- http://www.bagley.org/~doug/shootout/ function Ack(M, N) if (M == 0) then return( N + 1 ) end if (N == 0) then return( Ack(M - 1, 1) ) end return( Ack(M - 1, Ack(M, (N - 1))) ) end NUM = tonumber((arg and arg[1])) or 1 if NUM > 7 then NUM=7 end write("Ack(3,", NUM ,"): ", Ack(3,NUM), "\n") | Low | [
0.49056603773584906,
32.5,
33.75
] |
Facebook on Monday restored three ads from Sen. Elizabeth Warren Elizabeth WarrenHarris joins women's voter mobilization event also featuring Pelosi, Gloria Steinem, Jane Fonda Judd Gregg: The Kamala threat — the Californiaization of America GOP set to release controversial Biden report MORE's (D-Mass.) campaign it had briefly taken down that highlighted her push for the breakup of massive tech giants, including the social media platform. “We removed the ads because they violated our policies against use of our corporate logo. In the interest of allowing robust debate, we are restoring the ads," the company said in a statement to The Hill. Andy Stone, a spokesperson for Facebook, noted that several other ads Warren's campaign placed that specifically referenced her proposal to break up Facebook, Instagram and WhatsApp, among other tech mergers, were unaffected. Facebook's policies ban advertisers from using the word "Facebook," or the company's logo, in any ads on the platform. The policy was instituted as an attempt to weed out advertisements that falsely promoted products using Facebook's name. ADVERTISEMENT Politico first reported on Monday that some of Warren's ads had been removed from the platform. A spokeswoman for Warren's campaign did not immediately respond to a request for comment. Warren, who is running for the Democratic presidential nomination in 2020, announced last week a proposal that called for the dissolution of Silicon Valley's largest companies, saying that the tech giants have gained "too much power over our economy, our society, and our democracy." Warren became the first major 2020 Democratic presidential candidate to call for breaking up companies such as Facebook, Google and Amazon, though the idea has gained traction among progressives in recent years amid growing concerns about data privacy and the potential to use social media to spread disinformation. "We need to stop this generation of big tech companies from throwing around their political power to shape the rules in their favor and throwing around their economic power to snuff out or buy up every potential competitor," she said in her proposal. -Emily Birnbaum contributed to this report that was updated at 8:22 p.m. | Low | [
0.5038167938931291,
33,
32.5
] |
This invention relates in general to combined air-land-water vehicles and, in particular, to a new and useful vehicle of this type which is particularly reliable in operation and secure as an aircraft and, in some embodiments, adapted to take off or go down into highway traffic. | Mid | [
0.5856832971800431,
33.75,
23.875
] |
Iraqi President Saddam Hussein has tried to reach out to the country's Kurdish population amid speculation that their areas could be used by the United States as it contemplates extending its war on terror against Iraq. We can disagree, but this should not put our powers at the service of the foreigners Saddam Hussein In a speech on the 32nd anniversary of an historic agreement setting out the rights of the Iraqi Kurds, he said Kurds should not be deceived by "the foreigner", and should postpone their aspiration in the face of threats facing Baghdad. But he added that he was not calling for dialogue with them - he did not want anyone "to have the illusion that this leadership is calling for dialogue because it is under futile threats". A Kurdish politician described the speech as "unbelievable". Kurdish regions in Iraq have been outside Baghdad's control since 1991. Wooing Trying to woo over the Kurds, Saddam referred back to the agreement of 11 March 1970, which had demonstrated the Iraqi people's "high level of maturity, ability and patriotism to solve their problems themselves". He asked the Kurds to compare between the treatment they had received in Iraq and the fate of their brethren in neighbouring Turkey, Iran and Syria, adding that he did not have any problem using words like "our Kurdish people and Iraqi Kurdistan." Iraqi Kurds They have been in control of their area since 1991 The Patriotic Union of Kurdistan (PUK) and the Kurdistan Democratic Party (KDP) share power They enjoy Western protection since the establishment of the UN safe haven But, while urging the Kurds to gain their rights through dialogue, the Iraqi leader said: "When we see that Iraq is going through difficult times, we should postpone many things". Dr Mahmoud Osman, a politician who led the Kurdish delegation at the 11 March agreement, told BBC News Online that Saddam's statement reminded him of the negotiations in 1991. "They told us that the Kurds have to ask for less than 1970 because they entered two wars and that there was a conspiracy against them," Mr Osman said. "We were asked to pay the price of what the Iraqi regime did." Threats The Iraqi president's speech was not without warnings and threats. "I say to the Iraqi people, and to the Kurds in particular, that Iraqis are clever, prudent and brave. The foreigner should not deceive them." "We can disagree," he added. "But this should not put our powers at the service of the foreigners." I do not want anyone to have the illusion that this leadership is calling for dialogue because it is under futile threats Saddam Hussein If the US were to extend its campaign against terror to Baghdad, a possible scenario would be to launch the attacks from Kurdish areas. Saddam Hussein said that he was staying out of the Kurdish-controlled areas "not because of the foreigners". Federalism? In the jousting between Washington and Baghdad to win over the Kurds, the Iraqi president said his government was "the only regime that will realise everything every Kurd aspires to". Iraqi Kurds have been pushing for a relationship with Baghdad that would be based on federalism. This was declared in 1992 by the joint Kurdish parliament elected after the withdrawal of Baghdad's administration from the Kurdish region. Concluding his remarks, the Iraqi president said there was nothing wrong with "discussing the improvement of the autonomy law". Dr Osman saw this as "a mere tactic." "He [Saddam] is only saying this because he is under threat. Once the threat is removed he will use force again". | Low | [
0.502252252252252,
27.875,
27.625
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.