text
stringlengths
8
5.74M
label
stringclasses
3 values
educational_prob
sequencelengths
3
3
…that heals quickly. I’ve always said Trump needs a Ben Franklin in his board room and Newt Gingrich once again has proved that he’s the one, explaining Donald Trump exactly right…especially since he agrees with me in defining Donald Trump’s basic instincts. About President Trump’s now-famous tweet about Mika and Joe, particularly Mika’s facelift, Newt commented to Tucker Carlson that President Trump is 80%-90% correct with his tweets, so should continue with them. But he messes up once in a while. Four steps forward, then maybe one step back. Considering his evisceration of the national media, without help from almost anyone, I’ll take that. Examining his steps backwards, it should be noted that when he shoots himself in the foot, those wounds heal quickly. This latest reminds me of Winston Churchill’s ongoing war of words with Lady Astor, who, if you don’t know, was an American citizen who moved to England, married wealth and became the first female member of Parliament, and strident, snooty political enemy of Churchill. No one ever accused Sir Winston of being a boorish philistine, still… At a function both attended Churchill had had too much to drink, and during a caustic exchange with Lady Astor, she said, “Winston, you’re drunk” – to which he replied, “I may be drunk, Miss, but in the morning I will be sober and you will still be ugly.” Trump has said essentially the same thing to Ms Brzezinski (and Megyn Kelly, once upon a time) so we know the impact of this comment will have staying power only among the coven wing of the Democrat and media Left, and that portion of the chattering classes who are offended by Donald Trump anyway. Mika Brzezinski is suddenly the media’s new Kardashian girl, her mug in every tabloid. Now she can be picked out of a lineup standing next to Meryl Streep. But in view of the downward spiral in popularity and visibility taken by Megyn Kelly in less than two years, and who can now go to Walmart without her Foster Grants, one wonders if the same fate awaits Mika once the her celebrity wears off, as Trump moves off to offend the world’s obese by fat-shaming Kim Jong-un, the unindicted extortionist and murderer from North Korea. If you are a Trump supporter and was embarrassed by his tweet about Mika, you’re correct to feel that way, but don’t self-reflect too deeply. Charles Krauthammer said Trump shamed America, when he really meant to say “Trump shamed his America” (Krauthammer’s). He said “the world” was embarrassed, but really only the world’s chattering classes are embarrassed, made up largely of government and corporate bureaucrats who read the German, French, or British versions of the New York Times. Donald Trump is the “ex officio” leader of the world’s huddled masses yearning to be free of the yoke of those same bureaucrats. Once upon a time, before Obama and a few others, that was a permanent position of the American president. Dr Krauthammer should know that, but he has let his thirst for “style” get in his way. So while Trump poked at Mika’s vanity, she and boyfriend Joe had been on an unrelenting attack on Trump for “destroying the country” only in a more sophisticated tone that seemed civilized compared to Trump’s coarseness in pointing out her difficulties with her personal appearance. To the extent this was ever a real story to the Americans who actually follow cable news, it broke generally the same as the national vote did in November. For Trump voters it will soon fade. Three-four days. For Trump haters, the Left, the Media, feminists, Never Trumpsters, it will linger on, perhaps for years. I’m sure there is some old-goat feminist on Park Avenue who’s still steaming about what the sexist Winston said to Lady Astor, “The very idea!” 0 0 vote Article Rating Share this: Twitter Facebook Pinterest Email Print Like this: Like Loading...
Low
[ 0.5224215246636771, 29.125, 26.625 ]
g order. t, 1.88, 0, -2 Let f = -2494922/11 + 226811. Let s = -38 + 13. Sort s, -1/2, 0.4, f in increasing order. s, -1/2, f, 0.4 Suppose -4*s = -5*m - 40, -m - s + 13 = -3*m. Sort 20, 4, m, 12 in increasing order. m, 4, 12, 20 Let l be (-28)/56*10/(-2)*2/5. Let s(q) = q**2 - 7*q - 11. Let o be s(8). Put o, l, 15, -1 in descending order. 15, l, -1, o Let f = -0.3 + 0.23. Let h = f - -2.07. Let w = 5.9652 - -0.0348. Put h, w, -0.3 in descending order. w, h, -0.3 Let j = 3.92844 + 0.07156. Sort 0.5, 3.93, 3, j in descending order. j, 3.93, 3, 0.5 Let y = 2479 - 2480. Let z = -28 - -24. Sort y, 5, z in descending order. 5, y, z Suppose 8 = k - j, 2 = -k - 14*j + 13*j. Put -1, k, -4, 68 in increasing order. -4, -1, k, 68 Suppose k = -2 + 14. Suppose 4*v = 9*b - 14*b - 70, -2*v = -4*b + 22. Let h be v/(-50) - 4/((-40)/37). Put k, h, -4 in decreasing order. k, h, -4 Let r = 517 - 524. Let f be (-41 - r) + -6 + 7. Put f, -3, -5 in ascending order. f, -5, -3 Let k = 3 + -4. Let r = -2/171 + 869/1197. Let o = 38/63 - r. Put k, o, 2 in increasing order. k, o, 2 Let p(j) = j**3 + 3*j**2 + 6*j + 41. Let d be p(-3). Put -9, d, 4, -5 in decreasing order. d, 4, -5, -9 Let i = 28053 + -28057. Put i, 2/7, -0.1, 0, -4/13 in decreasing order. 2/7, 0, -0.1, -4/13, i Suppose -2*u = 2*u - 12. Let n(y) = 26 + 27 - 3 - 6 - 3*y. Let c be n(14). Sort c, u, -17 in decreasing order. u, c, -17 Let q be 66/3*50/780*-3. Put 0.3, -14, q in ascending order. -14, q, 0.3 Suppose 28 = -5*o - 4*q - 3, 3*o - 2*q = -1. Put o, 682, -5 in decreasing order. 682, o, -5 Suppose 4*z = -3*k - 302, -98 = k - z + 5. Sort k, -1, 0, 3, -9 in increasing order. k, -9, -1, 0, 3 Let p(n) = n**2 - 28*n + 79. Let v be p(25). Let f be 10/(-60)*(-3 + 20/v). Put 0, f, -3, -0.18 in ascending order. -3, f, -0.18, 0 Let p(o) = o**2 - 4*o. Let k be p(4). Suppose 5*x = -3*y - 35, -4*x + 4*y + 191 = 187. Put x, k, 2, -3 in ascending order. x, -3, k, 2 Let j = 5 - 1.79. Let y = -0.21 + j. Put -2, y, -3 in descending order. y, -2, -3 Let o(j) = 12*j - 15. Let s be o(1). Let q be s*((-87)/(-29) + 10/(-3)). Sort 12, q, -1 in increasing order. -1, q, 12 Let g(x) = x**3 - x**2 - 15*x - 11. Let u be g(-3). Sort 5, 412, u. u, 5, 412 Let x = -2395 - -2394.949. Sort x, -0.3, 2.2 in ascending order. -0.3, x, 2.2 Suppose 53 = j - b + 48, -9*j + 27 = -3*b. Sort 151, 5, j. j, 5, 151 Let y(q) = -q**3 - 4*q**2 + 2*q + 4. Let g be y(-4). Let t = 1008 - 1011. Let a be (-5)/(-2 + t) - -1. Put 3, g, a, -3 in decreasing order. 3, a, -3, g Let m = -2260 - -2264. Sort -1, m, 385 in increasing order. -1, m, 385 Suppose 16*a + 5*a - 72 = 3*a. Put -5, a, -1, 2, 134 in ascending order. -5, -1, 2, a, 134 Let f = 13 - 27. Let b(n) = 22*n - 244. Let i be b(11). Put 1, f, i in decreasing order. 1, i, f Suppose -2*p + 5*q = 32, -12*p + 4*q + 14 = -17*p. Put -3, p, 0, -98 in ascending order. -98, p, -3, 0 Suppose 3*j + 244 = 5*z, -107*j + 8 = -103*j. Sort 7, 0, 2, z in increasing order. 0, 2, 7, z Let i be (6 + (-30)/6)/((-2)/(-8)). Suppose -i*z + 7 = p, 2 = -4*z + 3*z - 4*p. Put 4, -60, z in ascending order. -60, z, 4 Suppose 5*b - 182 = -x - 210, -3*b = -4*x - 135. Put 3, 5, -25, x in descending order. 5, 3, -25, x Suppose -5*u + 2*g - 210 = 0, 0 = -4*u - 4*g + 33 - 229. Let o = 40 + u. Let t be 0 + o + (8 - 8). Sort -3, -1, t, 0. t, -3, -1, 0 Let b be -5*(-2)/(-2) - -1. Let j(q) = -q - 85. Let m be j(-89). Sort b, 24, m in increasing order. b, m, 24 Let m = -34 - -98/3. Let p = -142/11 + 983/77. Sort m, -1, p. m, -1, p Suppose 2*i + 4*t = 14, -2*i - i + 5*t = -10. Sort i, -2, -1, -5 in increasing order. -5, -2, -1, i Suppose -9*g = 5*i - 11*g - 267, 232 = 4*i + 3*g. Sort i, 4, -1/8, -0.5. -0.5, -1/8, 4, i Let l(k) = -k**2 + 10*k - 12. Let a be l(8). Let t(h) = h**2 - 7*h + 10. Let z be t(4). Let i = 416 + -411. Put a, i, z in descending order. i, a, z Let a = -13091 + 13089. Put a, -159, -29 in increasing order. -159, -29, a Let f be 20 - (224/72 - 6/54). Sort f, 1/11, 5, -0.5 in decreasing order. f, 5, 1/11, -0.5 Let h be (-47)/(-5) - (-720)/(-1800) - 9. Let y be -2 + 1 + -5*6. Sort -5, h, y, -1. y, -5, -1, h Suppose 29*a = 36*a - 84. Let w be 1*20/(-6)*a/(-8). Let k(o) = o**3 + 2*o**2 - 5*o - 4. Let b be k(-3). Sort -5, w, 3, b in ascending order. -5, b, 3, w Let w = -37 - -36. Suppose -2*o - 3*j + 16 = 3*o, o - 12 = -5*j. Suppose -2*h = -5*t + 15, 25 = 3*h - 0*t + o*t. Sort 3, h, w. w, 3, h Suppose -500 = 5*j + 3*c + c, -2*c = 2*j + 198. Put 2/5, 3/7, j in increasing order. j, 2/5, 3/7 Let j = -11 - -7. Let c = -25835 + 25829. Put -2, c, j in ascending order. c, j, -2 Let v(d) = 3*d**2 + 11*d + 21. Let r be v(-2). Suppose 27 = 4*w + 3*p + 2*p, 18 = 5*w + p. Let g(n) = -n**3 - 8*n**2 + 4. Let x be g(-8). Sort x, -5, r, w. -5, w, x, r Let a be ((-30)/(-9) - 15) + 10. Let c = -41 - -41. Put a, c, 0.2, -2/7 in decreasing order. 0.2, c, -2/7, a Suppose 0*p = p + 5. Let x be 2918/(-6) + -8 + (-110)/(-15). Let v = x + 490. Sort p, 8, v. p, v, 8 Let y = -2 - -2. Let v be (0 + 2/3)/(68/1530*-3). Sort 12, y, -3, v in decreasing order. 12, y, -3, v Suppose -169 = 19*n - 511. Suppose -2*s - 2*l = -6*l + n, 2*s + 6 = l. Let u(y) = -y**3 + 9*y**2 - y + 12. Let b be u(9). Put b, 2, -7, s in increasing order. -7, s, 2, b Let g = -971 + 975. Sort -5, -2, 432, -3, g in ascending order. -5, -3, -2, g, 432 Let l = 12322 - 12322.5. Sort -2/5, l, 0.44, -3 in increasing order. -3, l, -2/5, 0.44 Let t(q) = -q**3 + 32*q**2 - 29*q - 59. Let n be t(31). Let w be (-2 - n)*((-2)/2)/(-1). Suppose -b + 2 = 3. Put b, 2, 1, w in decreasing order. 2, 1, b, w Suppose -1568 = z - 4*y - 1574, 2*z - 4*y - 4 = 0. Sort z, 1, 0, -798 in decreasing order. 1, 0, z, -798 Suppose 48 = 264*d - 252*d. Put d, 2, -1297, 5 in descending order. 5, d, 2, -1297 Let n = 8868/22145 + -2/4429. Sort 35, n, 0 in decreasing order. 35, n, 0 Let m be ((-20)/15*(-27)/(-6))/(0 + -2). Put 1, m, 5, 78 in increasing order. 1, m, 5, 78 Let y(o) = 6*o**3 + o. Let s be y(1). Suppose 4*v + 5*d - s = 0, 5*v - d - 2*d - 18 = 0. Let t = 2013 + -2013.2. Put v, 1, t, 5/4 in descending order. v, 5/4, 1, t Let r = 43 - 41.4. Suppose 20 = -11*q + 9. Let p be 3*10/285 - 0/q. Put p, r, -2 in descending order. r, p, -2 Let r = 0.8 + -0.5. Let h = 65942 - 263771/4. Put -4, h, 10, r in decreasing order. 10, r, h, -4 Let g = -45 - -42.5. Let k = -3 - g. Suppose -7*q + 3*q - 20 = 0. Sort -0.3, k, q in descending order. -0.3, k, q Let t = 1309 + -1306. Let g = 110 - 109. Suppose -20 + 0 = -5*w. Sort 0, g, w, t. 0, g, t, w Let s = 5.6 - -17.4. Let j = -20.9 + s. Suppose 16 = -361*q + 357*q. Put j, q, -0.1 in ascending order. q, -0.1, j Suppose -21*p - 24 = -18*p. Let r = 39 - 65. Let d = -27 - r. Sort 3, d, p, 5 in descending order. 5, 3, d, p Let r(n) = 51*n + 89. Let l be r(-2). Put -7, -5, -1, l in decreasing order. -1, -5, -7, l Let w be 2 - 8*4/8 - -260. Suppose 27*i - w = 24*i. Let f = i - 262/3. Sort 1/4, f, -3 in increasing order. -3, f, 1/4 Let t = 4383.9 - 4384. Let u = -7988/17 + 470. Put -3/5, t, u in descending order. u, t, -3/5 Let g = 16.36 + -17.77. Put 2, g, -0.5 in decreasing order. 2, -0.5, g Suppose 4*z + 5*r = -z + 1225, r = 5*z - 1231. Let k = z - 249. Let h = -33 + 36. Sort -5, 1, k, h. -5, k, 1, h Let v = 281.889 + 0.111. Let r = v + -274. Sort 1, r, 2, -2/5 in ascending order. -2/5, 1, 2, r Suppose 5 = -2*c + a, -5*c + a = -a + 12. Let o = -2697 - -2766. Put 3, c, o in decreasing order. o, 3, c Let m(j) = 201*j - 5623. Let b be m(28). Sort 4, b, 29, 3 in descending order. 29, b, 4, 3 Let o = -1.711 + -0.289. Let z be ((-405)/(-36))/(-15)*(-8)/15. Sort -0.2, z, o, 2/7 in increasing order. o, -0.2, 2/7, z Suppose -6*c + 4 - 10 = 0. Let n(y) = -5*y**3 + 4*y**2 + 4*y. Let i be n(c). Put i, -3, -5 in decreasing order. i, -3, -5 Let x be -2 + -61 - (-90 + 94). Put -4, x, -11 in descending order. -4, -11, x Suppose 0 = -3*q + 13 + 8. Let p(v) = v**2 - 9*v + 9. Let b be p(q). Let k be 2/(-8) + (-27)/36. Put k, 4, b in descending order. 4, k, b Let a(g) = -69*g + 3455. Let k be a(50). Put 1.4, -1/7, -2/15, 6, k in descending order. 6, k, 1.4, -2/15, -1/7 Let o be 4/18 - (-320)/(-144). Let v(r) = -r**2 + 10*r + 7. Let z be v(11). Put z, o, -1 in increasing order. z, o, -1 Suppose 0 = x + 40*l - 41*l
Low
[ 0.46774193548387005, 21.75, 24.75 ]
Patterns of adaptation in obsessive-compulsive disorder: multivariate indicators of greater variability and linear change compared to controls. Patterns of adaptation to conflict in persons with Obsessive-Compulsive Disorder were assessed with the Serial Color-Word Test. Obsessive-Compulsive patients (n=50) were compared with an age- and sex-matched group of nonclinical volunteers. Measures of linear and nonlinear change in reading times during each of the five consecutive trials of the test were compared between groups by means of a multivariate model with doubly repeated measures. The multivariate analysis yielded a significant between-groups result (Wilks Lambda = .76, p < .001), mainly supported by higher values of nonlinear change in the Obsessive-Compulsive group. Thus, the discriminative ability of the Serial Color-Word Test was confirmed when individual differences were removed from the error term.
High
[ 0.699865410497981, 32.5, 13.9375 ]
This is the Group C match of the Ranji Trophy 2016 as part of the Indian domestic cricket. If at all you miss out on the live action of the Kerala vs Goa Ranji Trophy match, then you can always catch up with the Goa vs Kerala Ranji Trophy live streaming and may be even the Goa vs Kerala highlights 2016 and the Ranji Trophy 2016 highlights later on. Keep visiting OyeCricket.com for extensive coverage of Ranji Trophy 2016 and also for the Goa vs Kerala Ranji Trophy live scores. Thank you for visiting our post on the Goa vs Kerala Ranji Trophy Scorecard 2016 and hope you have got the details you need from the Goa vs Kerala Ranji Trophy Live Scores. Also watch this space for the Goa vs Kerala Ranji Trophy Highlights 2016.
High
[ 0.684210526315789, 35.75, 16.5 ]
Irfan Sabir Irfan Sabir (born December 19, 1977) is a Canadian lawyer and politician who was elected to the Legislative Assembly of Alberta in the 2015 and 2019 Alberta general elections to represent the electoral district of Calgary-McCall. He is a member of the Alberta New Democratic Party. In the 29th Alberta Legislature his party formed a majority government and he was a member of the Executive Council of Alberta as the Minister of Community and Social Services between 2015-2019. In the 30th Alberta Legislature, beginning in 2019, his party formed the official opposition to a United Conservative Party majority government. Background Sabir was raised in Rawalakot, Azad Kashmir, Pakistan, where he obtained an economics degree. He moved to Calgary in 2004, and obtained degrees in social work and law at the University of Calgary. In 2012, he began working at Maurice Law Barristers and Solicitors, where he specialized in Aboriginal law. In the past, he has also worked for a Calgary homeless shelter and volunteered for Calgary Legal Guidance and Red Cross Canada. Electoral history 2015 general election 2019 general election References Category:1970s births Category:Alberta New Democratic Party MLAs Category:Lawyers in Alberta Category:Living people Category:Canadian people of Azad Kashmiri descent Category:Members of the Executive Council of Alberta Category:Politicians from Calgary Category:Pakistani emigrants to Canada Category:Naturalized citizens of Canada Category:Canadian politicians of Pakistani descent Category:People from Rawalakot Category:21st-century Canadian politicians
High
[ 0.733001658374792, 27.625, 10.0625 ]
The Brussels terrorist attacks and the refugee crisis confront Europe, as perhaps never before, with a stark choice between idealism and realism. Both tragedies have been described as major tests, with many voices saying they have exposed Europe’s failures. Criticism is piling up, and comes from pro-European Union and anti-EU circles alike. Explosions heard as Belgian police carry out terror raid in Brussels Read more Calls for stronger law enforcement and better security will lead to heightened surveillance measures across the continent. These will be denounced by human rights campaigners as putting civil liberties at risk, just as the EU’s recent deal with Turkey, aimed at stopping refugee flows, has been roundly denounced as a betrayal of European principles. These are no light matters: if values aren’t defended, then what is the EU all about? But Europe’s existential challenges have taken on such proportions that some compromises, however uncomfortable, may have become necessary. After the bloodbaths in Brussels and Paris, it is obvious that security has become paramount; and after the scenes of refugees drowning at sea or stranded at barbed-wire fences, it is hard to deny that chaotic migration flows must urgently be stemmed. These are two distinct issues. But a key reason why they must both be approached with a new realism is that if swift measures aren’t taken, not only will more lives be threatened but Europe’s far-right and populist movements will end up dominating the continent. Citizens’ lack of trust in the capacity of governments to get on top of problems is what fuels the growth of far-right parties. These, in turn, threaten Europe’s democratic fabric and social cohesion. If these movements continue proliferating, they will spell the end of the EU as a project, and possibly the end of stability and peace in our region. Facebook Twitter Pinterest Don’t let Trump fool you: rightwing populism is the new normal – video Stark realism is called for because we risk seeing the re-emergence of ghosts of the past, something resembling what happened in the 1930s when authoritarian regimes appeared, xenophobia grew, and weak democracies were overrun by fascism. In that kind of Europe, there wouldn’t be many civil liberties or human rights left to defend. In that kind of Europe, worries about police surveillance or about how asylum conventions are violated would become luxuries, or at least sideshows. An awareness of this worst-case scenario is, I believe, at the heart of recent policy choices, chiefly the much-criticised deal whereby refugees travelling across the Aegean Sea to Greece will be deported to Turkey if they are not granted asylum. Whether those choices will bring the desired results will continue to be debated. But it is important to understand that a central motivation behind the EU’s new refugee policy, and behind renewed calls for tighter security on the continent, lies in the need to prevent Europe turning sharply to the right; these are steps taken to avert Europe’s self-destruction. Europe’s problems are essentially political. Terrorism is a danger, but must be kept in perspective. In the last 12 years it has killed 400 people in Europe – a tiny fraction of the number of victims in other parts of the world. The refugee issue is important, but remember that the number of arrivals in 2015 represents just over 0.2% of the EU’s population. Some of Europe’s vulnerabilities have technical causes: for instance, the Schengen area’s external borders have never been protected. But the main weakness is political. Europe has been hit by the fallout from external crises (the growth of Islamic State in the Middle East, and mass displacements of populations caused by the Syrian war), but the reasons it has failed to address these challenges are domestic. The EU has been paralysed by its divisions, and many governments have preferred to pander to populist sentiments than confront them. Citizens’ lack of trust in the capacity of governments to get on top of problems is what fuels far-right parties The first time extremist and xenophobic parties made headlines throughout Europe was in May 2014, when they won a third or so of seats in the EU parliament. That was before acts of mass terrorism were perpetrated by Isis in Europe, and before the refugee crisis took on unprecedented dimensions. The risk these parties will grow further – now that terrorism has become an obsession and refugees have at times been cynically conflated with radical Islam or crime (remember Cologne) – weighs heavily on Europe’s future. Fragmentation and xenophobia are growing: witness Ukip’s reaction to Brussels, and how Marine Le Pen and other populists who want to see the end of the EU have sought to capitalise on the tragedy. This is not to say fundamental values should be sacrificed. Human rights organisations have sound reasons to criticise the EU-Turkey deal, if only because it entails mass expulsions, and will surely be challenged in courts. Nor does an EU agreement with Turkey’s repressive regime carry much glory. But there is also a dose of high-minded idealism in this criticism that misses the overarching objective. The deal is meant to send a signal to EU citizens that action is being taken by Europe’s political leaders. It is meant to neutralise the narrative of Europe’s populist movements – something Germany’s chancellor feels strongly about. European elections: results from across Europe Read more The dangers Angela Merkel wants to avert are obvious. The UK is preparing for a referendum, and recent elections in Germany and elsewhere have shown that the anti-migrant, anti-Muslim far right is surging (in Slovakia a neo-Nazi party has just entered parliament). The EU-Turkey deal may well bring only a temporary slowdown in refugee movements. Smugglers will probably open up other routes, through the central Mediterranean or even the Black Sea. But the signal sent – even temporarily – to European voters has logic behind it. European citizens will migrate to political extremes in even higher numbers if EU institutions and governments don’t manage to build trust in the system. Right now, that can be done only if decisive steps are taken both against terrorism and uncontrolled migration. It may sound cynical, but lofty idealism simply won’t do the trick. Tolerance was once described by Merkel as “the heart and soul of Europe”. The painful paradox today is that halting the advance of parties that promote intolerance, want to bury the EU, and feel empowered by recent tragic events, may require some maximalist moral postures to be abandoned.
Mid
[ 0.6141078838174271, 37, 23.25 ]
Neymar is just the player Manchester United need to dominate the Premier League Reviewed by Momizat on Jun 01. Neymar is among the greatest players in world football at present, which means it’s no surprise to hear rumours linking him with the biggest teams in the world.Neymar is among the greatest players in world football at present, which means it’s no surprise to hear rumours linking him with the biggest teams in the world. Rating: 0 Neymar is just the player Manchester United need to dominate the Premier League Neymar is among the greatest players in world football at present, which means it’s no surprise to hear rumours linking him with the biggest teams in the world. Recently, the Brazilian superstar was reportedly linked with European champions Real Madrid and English Premier League runners-up Manchester United. Of those, the team who needs him the most is definitely the Red Devils. Former PSG boss Unai Emery insisted that Neymar would be staying in France with the current Ligue 1 champions into next season. However, Emery is now manager of Arsenal in England and isn’t there to persuade the twenty-six-year-old to stay put. A monumental transfer fee would be required to secure the signing of Neymar, but he could be the player United need to dominate the Premier League once again. Man United Recent History Manchester United won the first ever Premier League season in 1992/93 and have managed to win it a further twelve times since then. However, they have struggled to have an impact in recent seasons. Since they last were crowned champions in 2012/13, they have finished 7th, 4th, 5th, 6th, and second last term. These aren’t the sort of league finishes which please the red half of Manchester and manager Jose Mourinho needs to do something to turn it around soon. Fans expect trophies, especially when they have seen their side dominate English, and indeed European football for so many years. United’s treble winning season. Would the signing of a player like Neymar bring back the glory days to Old Trafford? Why Neymar? The simple reason Neymar would be perfect for United is that he is simply one of the best players in the world and would give them an attacking threat they have lacked since Robin van Persie netted twenty-six league goals to fire them to the title in 2012/13. In the past five seasons, United’s top scorers have accumulated a total of seventy-three league goals between them. This is Romelu Lukaku (16), Zlatan Ibrahimovic (17), Anthony Martial (11) and Wayne Rooney (12 & 17). In contrast, Neymar has scored a total of eighty-seven league goals in that time playing for two of the best teams in European football. Add to that his high profile, which would attract more fans and sell more merchandise to increase revenue, and the fact his signing would be a clear message to every one of United’s rivals. Also, one major signing can show other great players that the club has ambition and are willing to invest heavily to achieve success. That could open the floodgates of players who want to pull on the red shirt at Old Trafford. One player doesn’t make a team, but the greatest footballers in the world have managed to lift their teammates to a level they had never previously reached. Neymar is the sort of player who could do that. His pace, technique, dribbling ability, playmaking, and overall phenomenal talent opens up space for teammates and allows every team he plays for to create chances. His goal scoring ability is up there with the best and he would be certain to add a touch of class and flair to the current Manchester United setup. It remains to be seen if Neymar is keen to make the move to English football and if Manchester United is the team he would like to play for. The Brazilian superstar has already achieved great success in Spain and France, to do the same in England would surely secure his place in history as one of the best ever players in world football. He may end up costing £300 million if United did want to secure his services but if he can turn them into champions again next May, it could be a worthwhile investment. However, Neymar’s primary concern at the moment will be the World Cup in Russia and whether or not he will be able to participate fully fit, or even participate at all.
Mid
[ 0.576059850374064, 28.875, 21.25 ]
t s(p) = p**3 + p**2 - 53*p - 132. Calculate s(-3). 9 Let r(o) = -921*o - 2780. Give r(-3). -17 Let g(l) = -19*l**2 - 384*l - 75. Calculate g(-20). 5 Let x(n) = -83*n**3 - n**2 + 21*n - 22. Calculate x(1). -85 Let w(m) = 10*m**2 - 465*m + 214. Give w(46). -16 Let f(g) = 101*g + 94. What is f(1)? 195 Let c(v) = 10*v**2 + 8*v - 21. Give c(5). 269 Let r(i) = i**3 + 116*i**2 - 741*i - 1079. Calculate r(-122). 19 Let g(v) = -v**3 + 21*v**2 - 13*v - 414. Calculate g(19). 61 Let g(z) = z**2 + 15*z - 163. Give g(7). -9 Let y(h) = 2*h**2 + 217*h + 5215. What is y(-72)? -41 Let j(m) = -m**3 + 50*m**2 - 482*m + 70. Give j(37). 33 Let w(x) = 9*x**2 - 144*x - 2. Calculate w(16). -2 Let a(k) = -k**3 - 10*k**2 - 17*k + 22. Determine a(-10). 192 Let u(z) = -35*z - 3741. What is u(-107)? 4 Let q(f) = 5*f**2 - 83*f - 334. What is q(20)? 6 Let n(c) = -c**3 - 13*c**2 + 73*c + 90. Determine n(-17). 5 Let d(f) = -5*f**2 - 319*f + 60. What is d(-64)? -4 Let u(x) = 7*x**3 + 67*x**2 - 195*x + 25. Give u(-12). -83 Let z(w) = -w**3 - 3*w**2 + 78*w - 28. Calculate z(-11). 82 Let n(y) = 20007*y + 160056. Give n(-8). 0 Let l(g) = -g**2 + 244*g - 481. What is l(2)? 3 Let v(r) = r**3 + 10*r**2 - 27*r - 1. Give v(2). -7 Let m(o) = 2*o**3 - 99*o**2 + 65*o - 770. What is m(49)? 14 Let b(g) = 3*g**2 + 181*g + 148. What is b(-60)? 88 Let x(q) = -q**2 + 30*q + 442. What is x(-11)? -9 Let g(p) = -1094*p + 5479. What is g(5)? 9 Let s(y) = -y**2 + 369*y + 4031. What is s(-11)? -149 Let s(y) = -476*y + 954. What is s(2)? 2 Let w(o) = 1765*o + 61781. What is w(-35)? 6 Let k(i) = -i**2 - 37*i + 315. Calculate k(-41). 151 Let f(r) = 861*r + 11191. Calculate f(-13). -2 Let q(x) = -63*x - 494. Determine q(-7). -53 Let g(z) = -16*z**2 - 1287*z + 737. Give g(-81). 8 Let q(n) = -n**3 + 37*n**2 + 16*n - 84. Give q(37). 508 Let o(w) = -w**2 + 240*w + 8087. Determine o(-30). -13 Let p(q) = 3*q**2 + 30*q + 60. Calculate p(-7). -3 Let q(z) = -19*z**2 + z - 7. Give q(3). -175 Let s(d) = 500*d - 54493. Determine s(109). 7 Let q(j) = 184*j - 8818. Determine q(48). 14 Let n(s) = 26*s**2 - 370*s + 52. Determine n(14). -32 Let g(y) = -29*y**3 + 6*y**2 - 25*y - 56. What is g(-2)? 250 Let x(f) = -241*f - 2798. Calculate x(-11). -147 Let p(a) = -3*a**2 - 136*a + 367. Determine p(-48). -17 Let r(i) = 9*i**2 + 646*i - 132. Give r(-72). 12 Let r(t) = -7*t**2 + t + 13. Determine r(6). -233 Let a(w) = 14*w - 922. Give a(70). 58 Let l(q) = q**3 + 6*q**2 - 431*q + 80. Give l(-24). 56 Let n(q) = -1654*q + 3315. What is n(2)? 7 Let r(q) = -375*q + 4099. Calculate r(11). -26 Let f(v) = 4*v**3 - 713*v**2 + 886*v - 170. What is f(177)? 7 Let i(r) = 2*r**2 - 45*r - 1052. Give i(-14). -30 Let k(h) = h**2 - 261*h + 1286. What is k(5)? 6 Let i(m) = -10*m**2 + 129*m. Determine i(13). -13 Let t(d) = -d**3 + 181*d**2 - 4284*d + 12. Calculate t(28). 12 Let f(v) = v**3 - 24*v**2 + 52*v - 40. Give f(21). -271 Let g(z) = -z**3 - 80*z**2 + 519*z + 248. Calculate g(-86). -10 Let a(j) = -j**3 - 16*j**2 - 40*j + 2. Calculate a(-12). -94 Let j(p) = -p**3 - 33*p**2 + 103*p - 25. Give j(-36). 155 Let r(d) = -46*d**3 - 10*d**2 - 8*d + 1. Calculate r(-1). 45 Let o(q) = -38*q - 1770. What is o(-47)? 16 Let f(d) = 4*d**3 - 25*d**2 - 11*d + 86. Calculate f(6). -16 Let h(f) = -f**3 + 27*f**2 - 175*f - 22. Give h(16). -6 Let c(x) = -3*x**3 - 2*x**2 + 4*x + 55. Calculate c(-6). 607 Let g(i) = i**3 + 6*i**2 - 6*i - 45. What is g(-5)? 10 Let p(t) = -238*t + 1186. Determine p(6). -242 Let l(s) = -625*s - 17505. Give l(-28). -5 Let x(l) = -6*l**3 - 40*l**2 - 41*l + 9. What is x(-6)? 111 Let p(q) = 8*q**2 + 145*q - 216. Calculate p(-20). 84 Let t(x) = -15*x + 166. Calculate t(21). -149 Let q(y) = y**3 + 20*y**2 + 44*y - 190. What is q(-17)? -71 Let a(y) = -1091*y + 62. Give a(0). 62 Let m(d) = -10*d + 221. Calculate m(19). 31 Let h(l) = 45*l + 366. What is h(-8)? 6 Let w(z) = z**3 + 11*z**2 - 202*z - 21. Calculate w(8). -421 Let q(n) = n**3 - 34*n**2 + 43*n - 208. Determine q(33). 122 Let z(d) = -3*d**3 - 22*d**2 + 6*d + 101. Determine z(-8). 181 Let m(v) = v + 73. Give m(-18). 55 Let v(p) = p**3 - 68*p**2 + 250*p + 382. Give v(64). -2 Let r(c) = -345*c + 1633. Give r(5). -92 Let h(x) = -x**3 + 16*x**2 - 31*x + 40. Give h(14). -2 Let g(i) = -41*i + 6222. Calculate g(152). -10 Let x(p) = 14*p - 566. Determine x(55). 204 Let i(u) = 31*u - 1437. Determine i(47). 20 Let f(t) = -332*t + 2958. Determine f(9). -30 Let r(b) = -2*b**2 - 5*b + 283. What is r(-13)? 10 Let h(c) = -83*c + 13118. Give h(158). 4 Let k(h) = -h**3 + 8*h**2 + 58*h + 88. Give k(13). -3 Let p(m) = m**3 - 18*m**2 - 3*m + 180. Calculate p(17). -160 Let v(k) = 2*k**2 + 24*k - 19. Calculate v(-13). 7 Let z(o) = -3*o**2 + 27*o + 565. Give z(19). -5 Let r(i) = -3*i**3 + 3*i**2 + 13*i + 11. Give r(-5). 396 Let y(u) = -5*u**3 + 12*u**2 - 38*u + 47. Calculate y(5). -468 Let h(v) = -v**3 - 16*v**2 + 135*v + 63. Calculate h(-22). -3 Let o(d) = -22*d**3 + 5*d**2 + 17*d - 22. Determine o(1). -22 Let t(f) = -8*f**3 + 2*f**2 + 10*f - 19. Give t(3). -187 Let m(h) = h**3 + 139*h**2 - 719*h + 3. What is m(5)? 8 Let c(g) = g**2 - 2*g - 1515. Give c(40). 5 Let k(a) = 33*a**2 + 382*a + 123. Determine k(-11). -86 Let c(l) = l**3 - 2*l**2 + 141*l - 1857. What is c(9)? -21 Let c(h) = -h**3 + 12*h**2 - 8*h - 6. Calculate c(11). 27 Let m(f) = 8*f**3 - 19*f**2 + 3*f + 9. What is m(4)? 229 Let u(z) = 2*z**3 - 37*z**2 + 68*z + 156. Give u(16). -36 Let p(m) = 3*m**2 + 31*m + 27. Give p(-10). 17 Let s(m) = -m**2 + 5*m + 45. Give s(13). -59 Let a(g) = -g**3 + 28*g**2 - 6*g + 41. What is a(28)? -127 Let w(a) = -255*a + 176. What is w(2)? -334 Let b(z) = -z**2 - 131*z + 22116. Determine b(-228). 0 Let z(w) = 27*w + 589. Calculate z(-22). -5 Let t(m) = 16*m + 183. What is t(-12)? -9 Let a(n) = -71*n - 46. Give a(3). -259 Let n(t) = 49*t**2 + 8086*t + 156. Determine n(-165). -9 Let l(a) = -2154*a - 17248. Give l(-8). -16 Let c(y) = -8*y + 85. Calculate c(-2). 101 Let o(q) = -3*q**3 + q**2 + 12*q + 83. Determine o(-5). 423 Let q(z) = -1420*z**2 + 7101*z - 4. Calculate q(5). 1 Let v(f) = 2*f**3 - 15*f**2 - 524*f + 4110. What is v(8)? -18 Let k(l) = l**2 - 769*l - 41826. Calculate k(-51). -6 Let h(q) = q**2 - 143*q - 190702. What is h(-371)? -8 Let t(v) = 2*v**3 - 9*v**2 - 36*v - 1. Give t(9). 404 Let b(m) = -2*m**2 - 4*m + 91. What is b(-8)? -5 Let c(l) = -108*l - 978. Calculate c(-9). -6 Let p(t) = t**3 + 2*t**2 + t + 15. Calculate p(0). 15 Let s(t) = -t**3 - 41*t**2 + 130*t + 161. Determine s(-44). 249 Let f(k) = k**3 - 50*k**2 + 31*k + 886. Determine f(49). 4 Let d(n) = -21*n - 176. Give d(-4). -92 Let v(k) = 2*k**2 + 1118*k - 3366. What is v(3)? 6 Let u(m) = -m**3 - 46*m**2 + 95*m - 34. Calculate u(-48). 14 Let p(s) = 2*s**3 + 61*s**2 + 365*s + 48. Calculate p(-8). 8 Let y(p) = -2*p**2 - 37*p - 162. What is y(0)? -162 Let s(h) = -h**3 - 18*h**2 + 21*h + 644. Determine s(-17). -2 Let h(i) = 18*i**2 - 241*i - 22. Determine h(14). 132 Let s(v) = -3*v**2 - 44*v - 12. Determine s(-15). -27 Let t(s) = s**3 - 18*s**2 + 15*s - 26. Give t(16). -298 Let k(q) = 11*q - 148. What is k(7)? -71 Let c(h) = -216*h + 1975. Calculate c(9). 31 Let v(i) = i**3 - 137*i**2 + 1720*i + 21. Give v(14). -7 Let t(r) = -117*r + 1643. Determine t(14). 5 Let z(s) = -2*s**3 + 71*s**2 + 31*s + 196. Give z(36). 16 Let l(o) = 205*o + 241. Give l(2). 651 Let m(s) = s**3 + 6*s**2 + s + 16. Give m(-6). 10 Let x(d) = -99*d - 1485. Calculate x(-15). 0 Let u(o) = -o**2 + 11*o - 36. Determine u(3). -12 Let i(j) = j**3 - 12*j**2 - 158*j - 29. Give i(20). 11 Let g(p) = -p**3 + 13*p**2 + 41*p - 2. Give g(-3). 19 Let q(m) = -m**3 + 20*m**2 - 1040*m + 19391. Calculate q(19). -8 Let l(a) = -a**3 - 113*a**2 + 968*a + 41. Determine l(8). 41 Let d(u) = 55*u**2 + 5722*u + 207. Determine d(-104). -1 Let h(l) = 90*l**2 - 778*l - 295. Give h(9). -7 Let n(k) = 10*k**2 - 10*k - 71. Determine n(-5). 229 Let g(q) = q**2 - 18*q - 90. Determine g(19). -71 Let z(o) = o**3 - 4*o**2 - 28*o - 49. Determine z(-2). -17 Let f(v) = v**2 + 7*v - 7. What is f(7)? 91 Let m(y) = -y**3 + 7*y**2 + 15*y + 26. Calculate m(9). -1 Let b(g) = -g**2 - 47*g - 32. Calculate b(-47). -32 Let j(w) = -w**3 + 9*w**2 - 45*w + 289. Give j(8). -7 Let k(y) = 3*y**2 + 3*y - 22. Determine k(-6). 68 Let i(
Low
[ 0.5063613231552161, 24.875, 24.25 ]
<OFX> <!-- Begin response data --> <SIGNONMSGSRSV1> <SONRS> <!-- Begin signon --> <STATUS> <!-- Begin status aggregate --> <CODE>0</CODE> <!-- OK --> <SEVERITY>INFO</SEVERITY> </STATUS> <DTSERVER>19991029101003</DTSERVER><!-- Oct. 29, 1999, 10:10:03 am --> <LANGUAGE>ENG</LANGUAGE> <!-- Language used in response --> <DTPROFUP>19991029101003</DTPROFUP><!-- Last update to profile--> <DTACCTUP>19991029101003</DTACCTUP><!-- Last account update --> <FI> <!-- ID of receiving institution --> <ORG>NCH</ORG> <!-- Name of ID owner --> <FID>1001</FID> <!-- Actual ID --> </FI> </SONRS> <!-- End of signon --> </SIGNONMSGSRSV1> <BANKMSGSRSV1> <STMTTRNRS> <!-- Begin response --> <TRNUID>1001</TRNUID> <!-- Client ID sent in request --> <STATUS> <!-- Start status aggregate --> <CODE>0</CODE> <!-- OK --> <SEVERITY>INFO</SEVERITY> </STATUS> <STMTRS> <!-- Begin statement response --> <CURDEF>USD</CURDEF> <BANKACCTFROM> <!-- Identify the account --> <BANKID>121099999</BANKID><!-- Routing transit or other FI ID --> <ACCTID>999988</ACCTID><!-- Account number --> <ACCTTYPE>CHECKING</ACCTTYPE><!-- Account type --> </BANKACCTFROM> <!-- End of account ID --> <BANKTRANLIST> <!-- Begin list of statement trans. --> <DTSTART>19991001</DTSTART><!-- Start date: Oct. 1, 1999 --> <DTEND>19991028</DTEND><!-- End date: Oct. 28, 1999 --> <STMTTRN> <!-- First statement transaction --> <TRNTYPE>CHECK</TRNTYPE><!--Check --> <DTPOSTED>19991004</DTPOSTED><!-- Posted on Oct. 4, 1999 --> <TRNAMT>-200.00</TRNAMT><!-- $200.00 --> <FITID>00002</FITID><!-- Unique ID --> <CHECKNUM>1000</CHECKNUM><!-- Check number --> </STMTTRN> <!-- End statement transaction --> <STMTTRN> <!-- Second transaction --> <TRNTYPE>ATM</TRNTYPE><!-- ATM transaction --> <DTPOSTED>19991020</DTPOSTED><!-- Posted on Oct. 20, 1999 --> <DTUSER>19991020</DTUSER><!-- User date of Oct. 20, 1999 --> <TRNAMT>-300.00</TRNAMT><!-- $300.00 --> <FITID>00003</FITID><!-- Unique ID --> </STMTTRN> <!-- End statement transaction --> </BANKTRANLIST> <!-- End list of statement trans. --> <LEDGERBAL> <!-- Ledger balance aggregate --> <BALAMT>200.29</BALAMT><!-- Bal amount: $200.29 --> <DTASOF>199910291120</DTASOF><!-- Bal date: 10/29/99, 11:20 am --> </LEDGERBAL> <!-- End ledger balance --> <AVAILBAL> <!-- Available balance aggregate --> <BALAMT>200.29</BALAMT><!-- Bal amount: $200.29 --> <DTASOF>199910291120</DTASOF><!-- Bal date: 10/29/99, 11:20 am --> </AVAILBAL> <!-- End available balance --> </STMTRS> <!-- End statement response --> </STMTTRNRS> <!-- End of transaction --> </BANKMSGSRSV1> </OFX> <!-- End of response data -->
Low
[ 0.534334763948497, 31.125, 27.125 ]
Q: C - Counting number of same elements in 2 arrays Let's say we have 2 arrays: char arr1[1024]="ABDDDABAC"; char arr2[1024]="DDDABKDDJABAJJ"; and would like to determine the position at which arr2 has the maximum number of matching elements as arr1. For example if arr1[0] is compared to arr2[2], it would result in 5 matches as the code shows below. int matches=0; for (int i=0;i<strlen(arr2);i++){ if (arr1[i+2]==arr2[i]){ matches++; } } printf("matches: %d\n", matches); The code above returns the number of matches when arr1 is shifted by 2 indices, but does not calculate the number of matches at every single possible shift, and returns the shift which results in the maximum number of matching elements. A: the comparisons in for (int i=0;i<strlen(arr2);i++){ if (arr1[i+2]==arr2[i]){ matches++; } } only considers (in an expensive way) the length of arr2, there is no protection concerning arr1 and you can go out of it with an undefined behavior If you want to find the max number of matches you just have to iterate on the possible offsets in arr1 and save the best case, for instance : #include <stdio.h> #include <string.h> int main() { const char * arr1 = "ABDDDABAC"; const char * arr2 = "DDDABKDDJABAJJ"; size_t max = 0; const char * pmax; size_t ln1 = strlen(arr1); size_t ln2 = strlen(arr2); for (const char * a1 = arr1; *a1 ; ++a1) { size_t mx = 0; const char * p1 = a1; const char * p2 = arr2; while (*p1 && *p2) { if (*p1++ == *p2++) mx += 1; } printf("%d matches at offset %d\n",mx, a1 - arr1); if (mx > max) { max = mx; pmax = a1; if (mx == ln2) /* useless to continue, cannot be better */ break; } if (--ln1 < max) /* useless to continue, cannot be better */ break; } if (max == 0) puts("no match"); else printf("max matches %d at offset %d\n", max, pmax - arr1); } Compilation and execution : pi@raspberrypi:/tmp $ gcc -g -pedantic -Wextra -Wall m.c pi@raspberrypi:/tmp $ ./a.out 1 matches at offset 0 2 matches at offset 1 5 matches at offset 2 2 matches at offset 3 2 matches at offset 4 max matches 5 at offset 2 Execution under valgrind pi@raspberrypi:/tmp $ valgrind ./a.out ==10912== Memcheck, a memory error detector ==10912== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==10912== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info ==10912== Command: ./a.out ==10912== 1 matches at offset 0 2 matches at offset 1 5 matches at offset 2 2 matches at offset 3 2 matches at offset 4 max matches 5 at offset 2 ==10912== ==10912== HEAP SUMMARY: ==10912== in use at exit: 0 bytes in 0 blocks ==10912== total heap usage: 1 allocs, 1 frees, 1,024 bytes allocated ==10912== ==10912== All heap blocks were freed -- no leaks are possible ==10912== ==10912== For counts of detected and suppressed errors, rerun with: -v ==10912== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 6 from 3) Note : the code makes no supposition concerning the size of the arrays, this is why it contains if (--ln1 < max) ... which is never true with the used strings, so arr1 and arr2 can be argv[1] and argv[2] rather than hard coded if you want all the number of matches remove all the code concerning ln1 and ln2
Mid
[ 0.5869074492099321, 32.5, 22.875 ]
A sun-kissed evening at Glyndebourne, a delicious picnic on the soft greensward with friends: heaven on earth, surely. So why my despondency? The explanation is one fell word: Rameau. Beecham’s blind spot was J S Bach, Stravinsky disdained Wagner, Britten was allergic to Brahms. Not for want of trying, Little Me finds that the operatic genius of this revered 18th-century French composer just goes way over his thick head. I enjoy the splendidly vigorous choruses and dances, but I cannot penetrate the declamatory solo vocal lines, pitched at one monotonous level of decorum, unvarying of cadence and devoid of melodic flexibility: everyone sounds the same and nobody breaks free of their boned corsets, powdered wigs and embroidered paniers. And I wonder whether Jonathan Kent wouldn’t in his cups agree with me, because his production of Rameau’s first great success, inspired by Racine’s Phèdre, has a hyperactive yet floundering quality. The staging, designed by Paul Brown, lacks coherence, integrity, focus: all it offers instead is queasily camp spectacle, not so much eclectic as chaotic. The interminable Prologue, in the course of which Diana and Cupid debate the merits of chastity, takes place - no, I’m not joking - inside a giant fridge, filled with sausages, eggs, and other comestibles. The fridge imagery continues as we enter the story of Thesée’s wife Phèdre and her incestuous love for her stepson Hippolyte via a cold store room or abattoir in which carcasses are hung. Here Aricie, the innocent object of Hippolyte’s affections dressed in a white shift, smears herself with blood - one of several clichés to which resort is liberally made. Thesée’s descent to hell takes place at the rear of the fridge, with demons popping out from behind the grid. But this idea is then dropped: Thesée’s palace becomes a modern suburban villa, shown in cross-section and invaded at one point by a prancing posse of sailors fugitive from Anchors Aweigh. A hunt scene brings the chorus out in full Versailles fig, while the denouement takes place in a morgue in which the dead are pulled out on gurneys to be revived by goddesses descending from the heavens on ropes. Now everyone is barefooted, wearing high-street black suits. Veering between zany farce and postmodern pretension, the net impact of this willful disunity of tone (which I don’t sense in the courtly manner of the music and libretto) is just muddling - eye-candy, fed us to stop wriggling boredom. And in my case at least, it didn’t work. This is no reflection on William Christie, who as usual sets an exhilarating pace, galvanising the Orchestra of the Age of Enlightenment to playing of tremendous panache. As Phèdre and Thesée, Sarah Connolly and Stéphane Degout almost persuade me that this music can be brought expressively alive, while Christiane Karg and Ed Lyon sing prettily as the titular lovers. There are some nicely executed solos further down the line too, and the chorus is superb. But when it was all over I whooped with relief.
Low
[ 0.48306997742663604, 26.75, 28.625 ]
add_executable(openMVG_main_geodesy_registration_to_gps_position registration_to_exif_gps_position.cpp) target_link_libraries(openMVG_main_geodesy_registration_to_gps_position PRIVATE openMVG_exif openMVG_features openMVG_geodesy openMVG_sfm openMVG_system ${STLPLUS_LIBRARY} ) set_property(TARGET openMVG_main_geodesy_registration_to_gps_position PROPERTY FOLDER OpenMVG/software) install(TARGETS openMVG_main_geodesy_registration_to_gps_position DESTINATION bin/)
Low
[ 0.515625, 33, 31 ]
Henry Sephton Henry Sephton (c. 1686 – 2 June 1756) was the leading mason and architect in St Helens, Lancashire during the second quarter of the eighteenth century, the architect-builder of Ince Blundell Hall and Halton Court House, Halton, Cheshire (now a hotel), who worked in both classical and Gothic revival styles. Notes Category:1756 deaths Category:1686 births Category:18th-century English architects Category:Stonemasons Category:Architects from Lancashire Category:People from St Helens, Merseyside
High
[ 0.697017268445839, 27.75, 12.0625 ]
Q: Dialog Box with a comment I am using JQuery Dialog box to alert users that they are about to delete an item. I need to place a comments text box inside the dialog, and then use this comment to update the record in the database. I have the following JQuery function: $('.releaseMessage').click(function (evt) { evt.preventDefault(); var msgId = $(this).closest('tr').children().eq(2).html(); var senderBIC = $(this).closest('tr').children().eq(3).html(); var idPredefineDetail = $(this).closest("div").find("input[name=idPredefineDetail]").value(); var _msgId = JSON.stringify({ msgId: msgId, senderBIC: senderBIC }); $("#release-dialog-text").text("You are about to release message ("+ msgId + ")"); $("#release-dialog").dialog({ model: true, buttons: { Ok: function () { $(this).dialog("close"); $.ajax({ type: "POST", url: "Default.aspx/ReleaseMessage", data: _msgId, contentType: "application/json; charset=utf-8", dataType: "json", success: function () { }, error: function (xml, textStatus, errorThrown) { alert(xml.status + "||" + xml.responseText); } }); }, Cancel: function () { $(this).dialog("close"); } } }); }); And my DIV for the dialog is: <div id="release-dialog" title="Release Message"> <div id="release-dialog-text"> </div> <input id="comment" type="text" /> </div> A: ok sorted this using this method: window.parent.$('#release-dialog') .attr('title', 'Release Message') .html('Enter your comment') .dialog({ ... rest of dialog stuff var comment = window.parent.$('#releasecomment').val();
Mid
[ 0.6051873198847261, 26.25, 17.125 ]
Professor of Cardiology, SGPGIMS, Lucknow, Uttar Pradesh. Atrial fibrillation (AF) is the most common supraventricular tachycardia and its incidence increases with age. The pathophysiology of AF has been studied extensively and is a subject of continuing research. The primary pathologic change seen in AF is progressive fibrosis of the atria and hence structural remodeling, is the mainstay in many forms of AF. Dilation of the atria can be due to almost any structural abnormality of the heart which includes valvular heart disease, hypertension or congestive heart failure. Electrical remodeling promotes AF by acting on fundamental arrhythmia mechanism: focal ectopic activity and reentry. Rapidly firing foci initiating paroxysmal AF arise most commonly from the atrial myocardial sleeves that extend into pulmonary veins. The evolution of AF from paroxysmal to persistent to permanent forms through atrial remodeling can be caused by the arrhythmia itself and/or progression of underlying heart disease. The development of functional reentry substrates contribute to persistent AF. AF-related reentry is currently thought to occur through two main concepts: (1) the leading- circle concept and (2) spiral wave reentry. The multiple wavelets hypothesis, particularly in advanced structural and electrical remodelling are present, maintains AF survival, causing the most frequent common final pathway in sustained AF.
High
[ 0.6613756613756611, 31.25, 16 ]
Q: ¿Como almacenar los datos múltiples que provienen en formato de array? ACTUALIZADO Dentro de mi formulario poseo una tabla que permite agregar/eliminar dinámicamente campos de entrada. En esta misma tabla puedo insertar tantas herramientas como desee, quiero aclarar en esta misma tabla participan y se relacionan 2 entidades (TOOL-INSERT), con una relación de uno a muchos. al intentar guardar el fomulario recibo el siguiente error que proviene de mi tabla dinamica: message: "Array to string conversion (SQL: insert into tools (code_tool, insert_id, position) values (www, effeee, 01))" Las dudas que tengo son las siguientes: ¿Como capturar los datos múltiples ingresados en mi formulario a través de mi tabla dinámica? ¿Como guardar los datos múltiples que provienen en formato de array? A continuacion una imagen de mi formulario Como mencione anteriormente en la imagen existen campos que pertenecen a la entidad TOOL (posición/herramienta) y campos que pertenecen a la entidad INSERT(inserto/calidad) modelo Tool: use Illuminate\Database\Eloquent\Model; class Tool extends Model { protected $fillable = [ 'insert_id', 'position', 'code_tool', 'type', 'category', 'status', 'description', 'reason' ]; public function inserts() { return $this->hasMany(Insert::class); } public function pieces() { return $this->belongsToMany(Piece::class)->withTimestamps(); } } modelo Insert: <?php namespace App; use Illuminate\Database\Eloquent\Model; class Insert extends Model { protected $fillable = [ 'code_insert', 'quality', 'type', 'category', 'status', 'description', 'reason' ]; public function tool() { return $this->belongsTo(Insert::class); } } Este es mi formulario: <div class="row"> {!! Form::model($piece, [ 'route' => $piece->exists ? ['admin.pieces.update', $pieces->id] : 'admin.pieces.store', 'method' => $piece->exists ? 'PUT' : 'POST' ]) !!} <div class="col-md-6"> <div class="box box-primary"> <div class="box-header with-border "> <h3 class="box-title">Detalles del Legajo</h3> </div> <div class="box-body"> <table class="table table-striped table-bordered table-condensed table-hover" id="dynamicTable"> <tr> <th>Posición</th> <th>Herramienta</th> <th>Inserto</th> <th>Action</th> </tr> <tr> <td><input type="text" name="position[]" placeholder="Posicion" class="form-control select2" /></td> <td><input type="text" name="code_tool[]" placeholder="Codigo" class="form-control" /></td> <td><input type="text" name="code_insert[]" placeholder="Codigo" class="form-control" /></td> <td><button type="button" name="add" id="add" class="btn btn-success"><i class="fa fa-plus-square"></i> Add More</button></td> </tr> </table> </div> </div> </div> {!! Form::close() !!} </div> Entiendo que primero se debe crear el inserto, luego crear la herramienta ya que la tabla tools tiene un campo insert_id. En mi controlador en el metodo store estoy tratando de recorrer el array de la siguiente manera: ACTUALIZADO 2P controlador: public function store(Request $request) { if ($request->ajax()){ try { // Transacciones DB::beginTransaction(); $position = $request->position; $code_tool = $request->code_tool; $code_insert = $request->code_insert; $quality = $request->quality; for($count = 0; $count < count($position); $count++) { $insert = array( 'code_insert' => $code_insert[$count], 'quality' => $quality[$count] ); $insert = new Insert(); $insert->code_insert = $code_insert[$count]; $insert->quality = $quality[$count]; if($insert->save()){ $tool = array( 'position' => $position[$count], 'code_tool' => $code_tool[$count], 'insert_id' => $insert->id ); $tool_data[] = $tool; } } // dd($tool_data); Tool::insert($tool_data); $gag = Gag::create($request->all()); $program = Program::create($request->all()); $piece = $program->piece()->create([ 'denomination' => $request['denomination'], 'code' => $request['code'], 'time' => $request['time'], 'part_piece' => $request['part_piece'], 'gag_id' => $gag->id ]); $piece->tools()->sync($request->get('')); DB::commit(); } catch (Exception $e) { // anula la transacion DB::rollBack(); } } } Agregando un dd($tool_data); inspecciono la consola justamente en pestana network, obtengo lo siguiente: array:1 [ 0 => array:3 [ "position" => "01" "code_tool" => "www" "insert_id" => array:2 [ "code_insert" => "effeee" "quality" => "de3" ] ] ] ¿me podrian ayudar, explicar como capturar los datos desde mi tabla dinamica, recorrer el array y guardarlo correctamente? A: El problema esta en que inser_id es un array. ... $insert = array( 'code_insert' => $code_insert[$count], 'quality' => $quality[$count] ); Debes primero guardar el $insert en tu base de datos, y luego si guardar el ID de ese objeto en el atributo insert_id de tu modelo Tool. $insert = new Insert(); $insert->code_insert = $code_insert[$count]; $insert->quality = $quality[$count]; if($insert->save()){ $tool = array( 'position' => $position[$count], 'code_tool' => $code_tool[$count], 'insert_id' => $insert->id ); $tool_data[] = $tool; } ... Tool::insert($tool_data); DB::commit(); Debes guardar primero el $insert porque si no, no sabrás que ID es el que se le asignara a ese objeto.
Mid
[ 0.631901840490797, 25.75, 15 ]
The road to the 53-man roster in the NFL can be filled with twists and turns. There will be unexpected bumps, be they injuries or other unforeseen developments. But, in every case, the moves must generally be driven by a blueprint. You cannot set out on this journey without a road map. Building an NFL roster is difficult enough. It is made only more challenging by failing to adhere to some kind of plan. Which brings us to the Indianapolis Colts. Once they were done reducing their roster to the NFL-mandated limit on Saturday afternoon, there was no question what their driving principle is: The Colts are doubling down on their youth. There was no greater example than their decision to release veteran edge player John Simon, choosing instead to give his snaps to players like second-round pick Kemoko Turay and last year’s third-round choice, Tarell Basham. Whether you agree with the approach or scoff at it, let there be no confusion: The...
High
[ 0.6839622641509431, 36.25, 16.75 ]
Q: Regular Expression allows specific special characters in java I need to know the regular expression for string that contains alphanumeric characters, @, underscore(_), full stop(.)and not any blank spaces. And also for alphanumeric characters and it allow spaces. I tried with this regex, ^[_A-Za-z0-9-\\.\\@]$ and ^[A-Za-z0-9-\\s]$ CODE: private static final String Username_REGEX ="^[_A-Za-z0-9.@-]$"; public static boolean isUsername(EditText editText, boolean required) { return isValid(editText, Username_REGEX,Username_MSG, required); } public static boolean isValid(EditText editText, String regex, String errMsg, boolean required) { String text = editText.getText().toString().trim(); editText.setError(null); if ( required && !hasTextemt(editText) ) return false; if (required && !Pattern.matches(regex, text)) { editText.setError(errMsg); return false; }; return true; } public static boolean hasTextemt(EditText editText) { String text = editText.getText().toString().trim(); editText.setError(null); if (text.length() == 0) { editText.setError(emt); return false; } return true; } Is this correct? I did not get proper result. Can anyone guide me? A: Move the dash - at the end of the character class: ^[_A-Za-z0-9.@-]+$ and ^[A-Za-z0-9\\s-]+$ Between two characters it means a range. Edit: You also need a + modifier to match one or more of the characters in the character class.
Mid
[ 0.587301587301587, 27.75, 19.5 ]
--- abstract: 'In the empirically sensible limit in which QCD, $t$-quark Yukawa, and scalar-field-interaction coupling constants dominate all other Standard-Model coupling constants, we sum all leading-logarithm terms within the perturbative expansion for the effective potential that contribute to the extraction of the Higgs boson mass via radiative electroweak symmetry breaking. A Higgs boson mass of $216 \; GeV$ emerges from such terms, as well as a scalar-field-interaction coupling constant substantially larger than that anticipated from conventional spontaneous symmetry breaking. The sum of the effective potential’s leading logarithms is shown to exhibit a local minimum in the limit $\phi \rightarrow 0$ if the QCD coupling constant is sufficiently strong, suggesting (in a multiphase scenario) that electroweak physics may provide the mechanism for choosing the asymptotically-free phase of QCD.' author: - 'V. Elias' - 'R. B. Mann' - 'D. G. C. McKeon' - 'T. G. Steele' title: 'Consequences of Leading-Logarithm Summation for the Radiative Breakdown of Standard-Model Electroweak Symmetry' --- [ address=[Department of Applied Mathematics, The University of Western Ontario,\ London, Ontario N6A 5B7, Canada]{} ,altaddress=[Perimeter Institute for Theoretical Physics, 35 King Street North, Waterloo, ON N2J 2W9, Canada]{} ]{} [ address=[Perimeter Institute for Theoretical Physics, 35 King Street North, Waterloo, ON N2J 2W9, Canada]{}, ,altaddress=[Department of Physics, University of Waterloo, Waterloo, ON N2L 3G1, Canada]{} ]{} [ address=[Department of Applied Mathematics, The University of Western Ontario,\ London, Ontario N6A 5B7, Canada]{} ]{} [ address=[Department of Physics and Engineering Physics, University of Saskatchewan,\ Saskatoon, Saskatchewan S7N 5E2, Canada]{} ]{} 1. Radiative Electroweak Symmetry Breaking ========================================== Radiative symmetry breaking, in which a vacuum expectation value arises from radiative corrections to a potential with no quadratic mass term, was first addressed in a classic paper by S. Coleman and E. Weinberg [@1]. Unlike conventional symmetry breaking, in which an arbitrary but negative mass term leads to a correspondingly arbitrary Higgs boson mass, the radiative scenario for electroweak symmetry breaking necessarily predicts the Higgs boson mass as well as the magnitude of the quartic scalar-field interaction coupling constant $\lambda$. Unfortunately, the first such predictions preceded the discovery of the top-quark, whose large Yukawa coupling dominates all one-loop radiative effects. Indeed, the large magnitude of this coupling constant destroys not only the applicability of Coleman and Weinberg’s prediction for the Higgs mass (which is far below present empirical lower bounds), but also the use of a purely one-loop potential to make *any* such predictions via radiative symmetry breaking [@2]. The only hope for the program of radiative symmetry breaking for electroweak physics is to include radiative effects past one-loop order. In the present work, we demonstrate how renormalization-group methods permit one to extract *all* contributing leading-logarithm contributions to the Higgs boson mass, as well as some surprising results from the summation of leading logarithms in the zero field limit. 2. Leading Logarithms and the Higgs Boson Mass ============================================== The dominant couplants of the single-Higgs-doublet standard model are the $t$-quark Yukawa couplant $\left( x \equiv g_t^2(v)/4\pi^2 = 2m_t^2/(2\pi v)^2 = 0.0253\right)$, the QCD gauge couplant $\left( z \equiv \alpha_s (v) /4\pi^2 = 0.0329\right)$ as evolved from $\alpha_s (M_Z) = 0.12$ [@3], and the unknown quartic scalar couplant $y \equiv \lambda(v) / 4\pi^2$, where $v = 2^{-1/4} G_F^{-1/2} = 246 \; GeV$ is the expectation value characterizing the breakdown of electroweak symmetry. The remaining Yukawa and gauge couplants are all small compared to these three couplants, and are therefore ignored in the treatment which follows. The effective potential of an $SU(2)\times U(1)$ single-Higgs-doublet $(\phi)$ theory in which a quadratic mass term is absent $\left( V_{tree} = \lambda(\phi^\dag \phi)^2 / 4 \equiv \lambda \phi^4 / 4 \right)$ satisfies the renormalization-group (RG) equation $$\begin{aligned} %1 0 & = & \mu \frac{d}{d\mu} V \left[ \lambda(\mu), g_t (\mu), g_3 (\mu), \phi^2 (\mu), \mu \right] \nonumber\\ & = & \left( \mu \frac{\partial}{\partial\mu} + \beta_\lambda \frac{\partial}{% \partial \lambda} + \beta_t \frac{\partial}{\partial g_t} + \beta_3 \frac{% \partial}{\partial g_3} - 2\gamma \phi^2 \frac{\partial}{\partial \phi^2} \right) V \left( \lambda, g_t, g_3, \phi^2, \mu \right),\end{aligned}$$ This potential may be expressed in the form $$%2 V = \pi^2 \phi^4 \sum_{n=0}^\infty x^n \sum_{k=0}^\infty y^k \sum_{\ell = 0}^\infty z^\ell \sum_{p=0}^{n+k+\ell - 1} L^p \; D_{n,k,\ell,p}, \; [D_{0,1,0,0} = 1, \; D_{1,0,0,0} = D_{0,0,1,0} = 0],$$ with the logarithm $L \equiv \log (\phi^2 / \mu^2)$ referenced to an arbitrary renormalization scale $\mu$. The leading logarithm contributions to this potential arise when $p = n + k + \ell - 1$, i.e., when the degree of the logarithm is only one less than the sum of the powers of the three contributing couplants. If we define $C_{n,k,\ell} \equiv D_{n,k,\ell, n + k + \ell - 1}$, such coefficients of the leading logarithm series, $$\begin{aligned} %3 V_{LL} & = & \pi^2 \phi^4 S_{LL} = \pi^2 \phi^4 \left\{\sum_{n=0}^\infty x^n \sum_{k=0}^\infty y^k \sum_{\ell=0}^\infty z^{\ell} C_{n, k, \ell} L^{n+k+\ell-1} \right\},\nonumber\\ && C_{0,0,0} = C_{1,0,0} = C_{0,0,1} = 0, \; \; C_{0,1,0} = 1, \end{aligned}$$ may be obtained via the explicit one-loop RG functions [@2; @4] appearing in Eq. (1): $$%4 \left[ -2 \frac{\partial}{\partial L} + \left( \frac{9}{4} x^2 - 4xz \right) \frac{\partial}{\partial x} + \left( 6y^2 + 3yx - \frac{3}{2} x^2 \right) \frac{\partial}{\partial y} -\frac{7}{2} z^2 \frac{\partial}{\partial z} - 3x \right] S_{LL} (x,y,z,L) = 0.$$ One can solve this equation for successive powers of $L$. For example, the aggregate coefficient of $L^0$ is given by $$%5 - 2 \left( C_{0,2,0} \; y^2 + C_{2,0,0} \; x^2 + C_{0,0,2} \; z^2 + C_{1,1,0} \; xy + C_{1,0,1} \; xz + C_{0,1,1} yz \right) + 6y^2 - \frac{3}{2} x^2 = 0,$$ in which case $C_{0,2,0} = 3$, $C_{2,0,0} = -\frac{3}{4}$, and the remaining degree-2 coefficients within Eq. (3) are zero: $$%6 S_{LL} = y + 3y^2 L - \frac{3}{4} x^2 L + \ldots = \frac{\lambda}{4\pi^2} + \left( \frac{3\lambda^2}{16\pi^4} - \frac{3g_t^4}{64\pi^4} \right) \log \left( \frac{\phi^2}{\mu^2} \right) + \ldots$$ Eq. (6) corresponds to the ${\cal{O}}(\lambda^2, g_t^2)$ diagrammatic contributions to the $SU(2) \times U(1)$ effective potential $\left( V_{LL} = \pi^2 \phi^4 S_{LL} \right)$ calculated in ref. [@1]. Such a brute-force approach can be utilized to obtain all subsequent $C_{n,k,\ell}$ coefficients. The extraction of a Higgs boson mass, however, is sensitive only to terms in $S_{LL}$ of degree-4 or less in $L$. These terms are given by $$%7 S_{LL} = y + BL + CL^2 + DL^3 + EL^4 + \ldots$$ where [@5] $$%8 B = 3y^2 - \frac{3}{4} x^2,$$ $$%9 C = 9y^3 + \frac{9}{4} xy^2 - \frac{9}{4} x^2 y + \frac{3}{2} x^2 z - \frac{9% }{32} x^3,$$ $$%10 D = 27 y^4 + \frac{27}{2} x y^3 - \frac{3}{2} xy^2 z + 3x^2 yz - \frac{225}{% 32} x^2y^2 - \frac{23}{8} x^2z^2 + \frac{15}{16} x^3z - \frac{45}{16} x^3 y + \frac{99}{256} x^4,$$ $$\begin{aligned} %11 E & = & 81y^5 + \frac{243}{4} xy^4 - 9xy^3z + \frac{45}{32} x y^2 z^2 - \frac{% 69}{16} x^2 yz^2 - \frac{135}{8} x^2 y^3 + \frac{531}{64} x^2 y^2 z \nonumber\\ & + & \frac{345}{64} x^2 z^3 - \frac{603}{256} x^3 z^2 + \frac{207}{32} x^3 yz - \frac{8343}{512} x^3 y^2 - \frac{459}{512} x^4 z + \frac{135}{512} x^4 y + \frac{837}{1024} x^5.\nonumber\\\end{aligned}$$ We emphasize that Eqs. (7) - (11) represent the sum of *all* leading-logarithm terms contributing to the Higgs boson mass in the radiatively-broken single-Higgs-doublet standard model. The extraction of a mass proceeds in the same manner as described in ref. [@1] for the one-loop potential. After subtractions, $V$ will contain a finite $K \phi^4$ counterterm, $$%12 V = \pi^2 \phi^4 (S_{LL} + K),$$ whose magnitude is determined by renormalization conditions. Formally this counterterm may be identified with the sum of non-leading $p = 0$ contributions to Eq. (2), $$%13 K = \sum_{n=0}^\infty \sum_{k=0}^\infty \sum_{\ell = 0}^\infty x^n y^k z^\ell D_{n,\ell, k, 0}, \; \;\; n+k+\ell \geq 2.$$ This sum represents a combination of non-leading logarithm contributions to $V$, a sum of terms in Eq. (2) whose couplants have an aggregate power at least two larger than the power (zero) of the logarithm. Consequently, the counterterm $K$ is not RG-accessible via Eq. (4), but must be determined by a set of renormalization conditions. In the complete absence of a bare $\phi^2$ mass term, note also that the potential will not generate a renormalized $\phi^2$ term; the (external-to-Standard-Model) symmetry that would permit a conformally invariant tree-potential [@2] will be preserved within the context of a gauge-invariant regularization procedure [@6]. The set of renormalization conditions we employ at the choice $\mu = v$ for renormalization scale are the same as in ref. [@1]: $$%14 \left. \frac{dV}{d\phi}\right|_v =0, \; \; \left. \frac{d^2 V}{d\phi^2}\right|_v = m_\phi^2, \; \; \left. \frac{d^4 V}{d \phi^4}\right|_v = \frac{d^4}{d\phi^4} \left( \frac{\lambda \phi^4}{4} \right) = 24\pi^2 y$$ which respectively imply that $$%15 4(y + K) + 2B = 0$$ $$%16 \pi^2 v^2 (12y + 12K + 14B + 8C) = m_\phi^2$$ $$%17 24(y+K) + 100B + 280C + 480D + 384E = 0.$$ Note from Eqs. (8) - (11) that $B$, $C$, $D$ and $E$ are all functions of the undetermined couplant $y$, as $x$ and $z$ are known empirically. Consequently, the factor of $y+K$ can be eliminated between Eqs. (15) and (17) to obtain a fifth-order equation for $y$ with three real solutions, $\left\{ 0.0538, -0.278, -0.00143 \right\}$. For a given choice of solution, the coefficients $\left\{ B, C, D, E \right\}$ are numerically determined. One finds from Eqs. (15) and (16) that the respective values for the square of the Higgs mass $(=8\pi^2 v^2 (B+C))$ are positive only for the first two choices for $y$, of which only the first has any likelihood of perturbative stability (see below); we thus find for $y = 0.0538$ that $m_\phi = 216 \; GeV$. 3. Phenomenological Viability and Consequences ============================================== The estimate $m_\phi = 216 \; GeV$ is much larger than the ${\cal{O}}(10 \; GeV)$ estimate obtained from radiative symmetry breaking [@1] in the absence of any empirical knowledge of the $t$-quark. The $216 \; GeV$ estimate is also within striking distance of the indirect 95% confidence-level phenomenological bound $m_\phi \leq 196 \; GeV$ [@3] obtained from $\log(m_\phi)$ factors in radiative corrections to $m_W$, $m_Z$ and $\Gamma_Z$. However, the viability of this estimate rests upon its stability under subsequent (next-to-leading logarithm) corrections, which we are not yet able to compute. If residual renormalization-scale dependence of the potential is indicative of the magnitude of such subsequent corrections, we have found that the extimate $m_\phi = 216 \; GeV$ is quite stable. If we allow $\mu$ to vary from $v/2$ to $2v$ within leading-logarithm (but not counterterm [^1]) contributions to the potential, with concomitant evolution of $x(\mu)$, $y(\mu)$ and $z(\mu)$ from known values at $\mu = v$, and $\phi(\mu)$ from its input value $\phi(\equiv \phi(v))$, we find the corresponding range of values for $m_\phi$ to vary between $208$ and $217 \; GeV$ [@5]. Although the $y = 0.0538$ value we obtain from Eqs. (15) and (17) is much larger than the quartic scalar-interaction couplant $(\lambda/4\pi^2)$ that would arise from generating a $216 \; GeV$ Higgs mass via conventional (non-radiative) symmetry breaking, this large couplant still appears to be perturbative. In the limit $y >> x,z$, the scalar-field sector of the Standard Model decouples into an $O(4)$-symmetric scalar field theory whose $\beta$- and $\gamma$-functions are known to five-loop order [@7]: $$%18 \lim_{\stackrel{_{x \rightarrow 0}}{_{z \rightarrow 0}}} \mu \frac{dy}{d\mu} = 6y^2 - \frac{39}{2} y^3 + 187.85y^4 - 2698.3y^5 + 47975 y^6 + \ldots \; \; ,$$ $$%19 \lim_{\stackrel{_{x \rightarrow 0}}{_{z \rightarrow 0}}} \gamma \;\; \sim \;\; y^2 \left[ 1 - \frac{3}{2} y + \frac{195}{16} y^2 - 132.9 y^3 + ...\right].$$ Both series above decrease monotonically when $y = 0.0538$, consistent (though barely so) with $y$ being sufficiently small to be perturbative. As noted above, the salient phenomenological signature of radiative (as opposed to conventional) electroweak symmetry breaking appears to be the pairing of an empirically viable Higgs mass with a large scalar-field interaction couplant. In conventional symmetry breaking a $216 \; GeV$ Higgs corresponds to a quartic scalar couplant $y = m_\phi^2/(8\pi^2 v^2) = 0.0093$, as opposed to the value $0.0538$ obtained above. Consequently, $y$-sensitive processes such as the longitudinal channel for $W^+ W^- \rightarrow ZZ$ scattering, in which $\sigma \sim y^2$ [@8], should serve to distinguish between the two approaches to symmetry breaking, with *an order of magnitude enhancement* predicted for the radiative case. 4. Large Logarithm Behaviour ============================ A salient motivation for summing the leading logarithms of any given process is to ascertain the large logarithm limit of that process, since leading logarithm terms dominate all subsequent terms when the logarithm is itself large. In the case of the Standard-Model effective potential, the large logarithm limit corresponds either to $|\phi| \rightarrow \infty$ or $\phi \rightarrow 0$ behaviour of the potential. To extract this behaviour, we first express the leading-logarithm series $S_{LL}$ in the form $$%20 S_{LL} = y F_0 (w, \zeta) + \sum_{n=1}^\infty x^n L^{n-1} F_n (w, \zeta), \; \; \zeta \equiv zL, \; \; w \equiv 1 - 3yL.$$ If we substitute Eq. (20) into the RG equation (4), we obtain the following recursive set of partial differential equations [@5] $$%21 \zeta \left( 1 + \frac{7}{4} \zeta \right) \frac{\partial}{\partial \zeta} F_0 (w, \zeta) = (1 - w) \left[ w\frac{\partial}{\partial w} + 1 \right] F_0 (w, \zeta),$$ $$%22 \left[ \zeta \left( 1 + \frac{7}{4} \zeta \right) \frac{\partial}{\partial \zeta} + 2\zeta + (w - 1) w \frac{\partial}{\partial w} \right] F_1 (w, \zeta) = -\frac{(w-1)^2}{2} \frac{\partial}{\partial w} F_0 (w, \zeta),$$ $$\begin{aligned} %23 && \left[ \zeta \left( 1 + \frac{7}{4} \zeta \right) \frac{\partial}{\partial \zeta} + (w-1) w \frac{\partial}{\partial w} + (1 + 4\zeta) \right] F_2 (w, \zeta)\nonumber\\ & = & \left[ \frac{3}{2} (w-1) \frac{\partial}{\partial w} - \frac{3}{8} \right] F_1 (w, \zeta) - \frac{3}{4} \left[ (w-1) \frac{\partial% }{\partial w} + 1 \right] F_0 (w, \zeta),\end{aligned}$$ $$\begin{aligned} %24 && \left[ \zeta \left(1 + \frac{7}{4} \zeta \right) \frac{\partial}{\partial \zeta} + (w-1) w \frac{\partial}{\partial w} + (k-1 + 2k \zeta) \right] F_k (w, \zeta)\nonumber \\ & = & \left[ \frac{3(3k-7)}{8} + \frac{3}{2} (w-1) \frac{% \partial}{\partial w} \right] F_{k-1} (w, \zeta) + \frac{9}{2} \frac{% \partial F_{k- 2}}{\partial w} (w, \zeta), \; \; \; (k \geq 3).\end{aligned}$$ Given that $F_0 (1,0) = 1$, i.e., that $S_{LL} \rightarrow y$ as $L \rightarrow 0$, one finds from Eq. (21) that $$%25 F_0 (w,\zeta) = 1/w.$$ One then finds that the only solution to Eq. (22) for $F_1(w,\zeta)$ that is non-singular at $\zeta = 0$ \[i.e. non-singular when QCD is turned off $(z = 0)$\] is $$\begin{aligned} %26 F_1 (w, \zeta) & = & \left[ \frac{6\zeta + 4[1-(1+7\zeta/4)^{6/7}]}{3\zeta^2}\right] \left( \frac{w-1}{w}\right)^2\nonumber\\ & = & \left[ \frac{1}{4} - \frac{\zeta}{6} + \frac{5}{32} \zeta^2 + \; \ldots \right]\left( \frac{w-1}{w} \right)^2 .\end{aligned}$$ Solutions of the form $$%27 F_p(w,\zeta) = \sum_{k=0}^{p+1} f_{p,k} (\zeta) \left[ \frac{w-1}{w}\right]^k$$ can be found by straightforward means from Eqs. (23) and (24). For the $p = 2$ case, we find that $$%28 f_{2,0}(\zeta )=\left[ Z^{-9/7}-1\right] /3\zeta ,$$ $$%29 f_{2,1}(\zeta )=\left[ 2\zeta -4(1-Z^{-2/7})\right] /3\zeta ^{2},$$ $$%30 f_{2,2}(\zeta )=\left[ 20+71\zeta /2-\zeta ^{2}+22Z^{5/7}-42Z^{6/7}\right] /3\zeta ^{3},$$ $$%31 f_{2,3}(\zeta )=\left[ -16-48\zeta -36\zeta ^{2}+32Z^{6/7}/7-16Z^{12/7}+192Z^{13/7}/7\right] /3\zeta ^{4},$$ where $Z \equiv 1 + 7\zeta/4$. For $p \geq 3$ we find from Eq. (24) that $$\begin{aligned} %32 0 & = & \left( \left[ (7\zeta ^{2}/2)\frac{d}{d\zeta }+4p\zeta \right] +\left[ 2\zeta \frac{d}{d\zeta }+2(p-1)+2k\right] \right) f_{p,k}(\zeta ) \nonumber\\ & - &\left[ (9p-21)/4+3k\right] f_{p-1,k}(\zeta )+3(k-1)f_{p-1,k-1}(\zeta ) \nonumber\\ & - & \left[ 9(k-1)/2\right] f_{p-2,k-1}(\zeta )+9kf_{p-2,k}(\zeta )-\left[ 9(k+1)/2\right] f_{p-2,k+1}(\zeta ),\end{aligned}$$ where $f_{p,k}\equiv 0$ when $k<0$ or $k>p+1$. In the large $L$ limit, one finds from Eqs. (25) - (31) that the leading terms in the series (20) exhibit the following large-$L$ behaviour: $$%33 y \; F_0 \rightarrow - \frac{1}{3L}, \; \; \; x \; F_1 \rightarrow \frac{2}{L} \left( \frac{x}{z}\right), \; \; \; x^2 \; L F_2 \rightarrow -\frac{3}{2L} \left( \frac{x}{z} \right)^2.$$ Moreover, since $(w - 1) / w \rightarrow 1$ when $|L| \rightarrow \infty$, we find that $F_n \rightarrow \sum_{k=0}^{n+1} f_{n,k} (\zeta)$. We then find in the large $L$ (hence large-$\zeta$) limit of Eq. (32) that $$%34 \left( \frac{7}{4} \zeta^2 \frac{d}{d\zeta} + 2n \zeta \right) F_n = \frac{% 3(3n-7)}{8} F_{n-1}, \; \; ( n \geq 3 ). \label{eq8.17}$$ a result that follows from the relations $$%35 \sum_{k=0}^{p+1} \left[ k f_{p-1, k} - (k-1) f_{p-1, k-1} \right] = 0,$$ $$%36 \sum_{k=0}^{p+1} \left[ - (k-1) f_{p-2, k-1} + 2k f_{p-2, k} - (k+1) f_{p-2, k+1}\right]=0,$$ \[Note $f_{p, k} = 0$ if $k > p+1$ or $k < 0$\]. One then finds from Eqs. (33) and (34) that for $n > 2$, $$%37 F_n \rightarrow a_n \zeta^{-n}, \; \; a_n = \frac{3(3n-7)}{2n} a_{n-1}, \; \; a_2 = - 3/2.$$ The results (33) and (37) permit explicit summation of the series (20) in the large $L$ limit, provided $x/z$ is sufficiently small [@5]: $$%38 V_{eff} \begin{array}{c} {} \\ _{\longrightarrow} \\ ^{|L| \rightarrow \infty} \end{array} \pi^2 \phi^4 S_{LL} \rightarrow - \frac{\pi^2 \phi^4}{3L} \left[1 - \frac{9x}{2z} \right]^{4/3}, \; \; \; 0 \leq x/z \leq 2/9.$$ 5. Footprints of New Physics ============================ If $x/z > 2/9$, the series (20) is outside its radius of convergence, and the result (38) is no longer applicable. The result (38), therefore, is not relevant to empirical Standard-Model physics, for which $z = \alpha_s(v)/\pi = 0.033$, $x = 1.0/(4\pi^2)= 0.025$. However, this result *is* of interest if QCD exhibits more than one phase. Two phases for the evolution of the gauge coupling constant are known to characterize the exact $\beta$-function for N = 1 supersymmetric Yang-Mills theory in the absence of matter fields \[9\]. An asymptotically-free phase in which the gauge couplant is weak is accompanied by an additional non-asymptotically-free strong-couplant phase. Both weak and strong couplants evolve toward a common value at an infrared-attractive momentum scale, which serves as a lower bound on the domain of perturbative physics. Pade approximant arguments have recently been advanced [@10] in support of QCD being characterized by similar two-phase behaviour. If such is the case, a very natural explanation emerges for the transition at $\mu \simeq m_\rho$ from QCD as a perturbative gauge theory of quarks and gluons to QCD as an effective theory of strongly-interacting hadrons [@10; @11]. However, within such a picture, there needs to be a mechanism for understanding why the “weak” asymptotically-free phase is the one we observe. Eq. (38) shows an effective potential that approaches zero from above as $\phi \rightarrow 0$. Consequently, when the QCD couplant is sufficiently large, the effective potential exhibits a local *minimum* at $\phi = 0$. Since the potential is itself zero at this minimum, whereas the empirical (weak-phase) potential is negative at its $\phi = v$ minimum, we see that the weaker of the two phases may be energetically-preferred by (radiatively-broken) electroweak symmetry. As a final note, the large value for $y(v) = 0.0538$ emerging from radiative symmetry breaking suggests that the evolution of this couplant $[\mu(dy/d\mu) = 6y^2 + \ldots]$ is characterized by a Landau pole at (or below) $\mu = v \exp \{1/[6y(v)]\} \simeq 5.5 \; TeV$. Such a bound on the scale for new physics corresponds explicitly to the singularity at $w (= 1 - 3yL) = 0$ characterizing successive factors $x^p L^{p-1} F_p(w,\zeta)$ \[Eq. (27)\] within the leading-logarithm series (20). Thus, we can hopefully anticipate empirical evidence for the onset of new physics (or embedding symmetry) if electroweak symmetry is radiatively broken. We are grateful to the Natural Sciences and Engineering Research Council of Canada for support of this research. [99]{} S. Coleman and E. Weinberg,*Phys. Rev.* [**D 7**]{}, 1888 (1973) M. Sher, [*Phys. Rep.*]{} [**179**]{}, 273 (1989) Particle Data Group \[K. Hagiwara et al.\], [*Phys. Rev.*]{} [**D 66**]{}, 1 (2002) T. P. Cheng, E. Eichten and L. -F. Li, [*Phys. Rev.*]{} [**D 9**]{}, 2259 (1974); M. B. Einhorn and D. R. T. Jones, [*Nucl. Phys.*]{} [**B 211**]{}, 29 (1983); M. J. Duncan, R. Philippe and M. Sher, [*Phys. Lett.*]{} [**B 153**]{}, 165 (1985) V. Elias, R. B. Mann, D. G. C. McKeon and T. G. Steele, hep-ph/0304153. J. C. Collins, [*Phys. Rev.*]{} [**D 10**]{}, 1213 (1974) H. Kleinert, J. Neu, V. Schulte-Frohlinde, K. G. Chetyrkin and S. A. Larin, [*Phys. Lett.*]{} [**B 272**]{}, 39 (1991); [**B 319**]{}, 545 (E) (1993) U. Nierste and K. Riesselmann, [*Phys. Rev.*]{} [**D 53**]{}, 6638 (1996) I. I. Kogan and M. Shifman, *Phys. Rev. Lett.* [**75**]{}, 2085 (1995); see also V. Elias, *J. Phys.*[**G 27**]{}, 217 (2001) regarding D. R. T. Jones, *Phys. Lett.*[**B 123**]{}, 45 (1983) F. A. Chishtie, V. Elias, V. A. Miransky and T. G. Steele, *Prog. Theor. Phys.* [**104**]{}, 603 (2000) F. A. Chishtie, V. Elias and T. G. Steele, *Phys. Lett.* [**B 514**]{}, 279 (2001) [^1]: We assume $K\phi^4$ to be RG-invariant in the one-loop sense, since the counterterm corresponds to a sum of subsequent-to-leading logarithm contributions, as noted above.
High
[ 0.657824933687002, 31, 16.125 ]
Ken Hodges Kenneth (Ken) B. Hodges III (born September 22, 1965) is a Judge of the Georgia Court of Appeals and the former District Attorney for Dougherty County, Georgia in the United States and was the Democratic nominee for Attorney General of Georgia in 2010. In 2015, Hodges started his own law firm, Ken Hodges Law, based out of Atlanta and Albany. Hodges won an open seat in a contested race on the Georgia Court of Appeals in 2018, earning nearly 70% of the state-wide vote. Hodges was born and raised in Albany, Georgia and went on to receive his Bachelor of Arts degrees in Political Science and Sociology from Emory University in 1988 and his Juris Doctor degree from the University of Georgia School of Law in 1991. His wife, Melissa, grew up in Gwinnett County and graduated from The Marist School in Atlanta. She earned her bachelor's degree from Saint Mary's College, Notre Dame, Indiana and is an award-winning television journalist and currently is a media consultant. The couple was married in 2004 and currently live in Albany, GA with their daughter and son. Career After graduating from law school at the University of Georgia, Hodges worked at an Atlanta law firm before returning to his hometown of Albany, Georgia, in 1996 to run a successful campaign for District Attorney. Hodges served as District Attorney for 12 years, gaining re-election in 2000 and 2004. During his career as attorney and District Attorney for Dougherty County, Hodges has argued in front of the Georgia Court of Appeals and the Georgia Supreme Court. Hodges was instrumental in the 2002 prosecution of Sidney Dorsey, a former DeKalb County Sheriff who ordered the assassination of his successor, Derwin Brown. Ultimately, Dorsey was found guilty on eleven counts, including murder and racketeering. Ken Hodges also served as President of the Georgia District Attorney's Association and in 2002 was recognized as Georgia's District Attorney of the Year. He has also chaired the Prosecuting Attorney's Council (PAC), and is a Fellow of the Lawyer's Foundation of Georgia. He is a graduate of Leadership Albany and Leadership Georgia, and was on the Board of Trustees for Leadership Georgia. He has been listed on Georgia Trend Magazine's "40 under 40" and the Fulton County Daily Report's "Attorneys on the Rise." In 2013, Hodges was honored by the State Bar of Georgia's Committee to Promote Inclusion in the Profession with the Commitment to Equality Award. Hodges was selected for the honor because of "his contributions to the advancement of diversity, including his prior service as District Attorney for the Dougherty Judicial Circuit, hiring as his chief assistant the African American prosecutor who later became his successor. During his three terms, Hodges had one of the most proportionately diverse offices in the state and, in many instances, helped his minority assistants move on to become federal prosecutors or secure positions in private practice. As district attorney, he maintained an internship program with Albany State University, one of Georgia's historical black universities." In 2013, Hodges was elected by Georgia's attorneys to serve on the Executive Committee of the State Bar of Georgia. Hodges currently serves on the Board of Governors for the State Bar of Georgia, and multiple committees, including the Advisory Committee on Legislation. He was sworn in as President of the State Bar of Georgia in June 2018. Ken Hodges is past Secretary and Board of Trustees member for the Urban League of Atlanta. In August 2009, Candidate Hodges received the endorsement of Andrew Young, former Mayor of Atlanta and United States Ambassador to the United Nations under President Jimmy Carter. Young praised Hodges for "his commitment to equal rights and the fair application of justice during his years of service in Albany." Hodges has also received the endorsements of former Georgia Supreme Court Chief Justice Leah Ward Sears, the first African-American female Chief Justice in the United States, Mark Taylor, former lieutenant governor of Georgia, and Sam Nunn, former United States senator from Georgia. In January 2011, Hodges joined the Atlanta law firm Rafuse Hill & Hodges, LLP as a partner in the litigation division. Rafuse Hill & Hodges had a national litigation practice focusing on employment, civil rights, products liability and commercial disputes. Controversial actions As district attorney As district attorney, he requested a search of a physician's phone records, against the physician—who questioned certain billing practices at the local hospital Phoebe Putney. Hodges was personally sued, successfully, in the same District Court in Albany, but because the case finally impinged on "absolute immunity for grand jurors" the District Court decision went all the way to the Supreme Court of the United States where it was then overturned. As attorney and judge-elect In an ongoing action in the Dougherty County Superior Court (where Hodges was DA), the plaintiff claimed that Hodges was appointed improperly as the receiver of an apartment complex called Gardens on Whispering Pines, and also acted improperly because he had previously served as attorney facilitating the sale of the real estate in question. Subsequently James B. Holloway filed an appeal against Hodges in the same Court where Hodges won the election to replace the judge. Hodges has been accused of ethical violations and is being sued for millions of dollars in the Dougherty County Superior Court. (17-cv-1456). The plaintiffs allege that Hodges communicated with Judge Willie Lockette to improperly place the apt complex into receivership, and then denied under oath to Senior Judge L. A. McConnell that he had no professional or personal dealings with a Stephen Bacon in the matter. Additionally he has been accused of calling the Judicial Qualifications Commission (JQC) in the selection of judges who might rule favorably in the case. References Category:District attorneys Category:Georgia (U.S. state) state court judges Category:Georgia (U.S. state) Democrats Category:Living people Category:Emory University alumni Category:People from Albany, Georgia Category:1965 births
High
[ 0.71938775510204, 35.25, 13.75 ]
New transmission schemes for extending a transmission rate are required according to an increase in an amount of communication due to the widespread use of mobile communication terminals such as smart phones and tablets. As one of such schemes, a Long Term Evolution (LTE) time division duplex (TDD) scheme is adopted in addition to a conventional LTE frequency division duplex (FDD) scheme. The FDD scheme is a duplex scheme in which frequency bands for use in an uplink (hereinafter referred to as “UL”) and a downlink (hereinafter referred to as “DL”) are provided separately. The FDD scheme is a scheme in which a transmission rate is increased by independently performing UL and DL transmissions. However, because frequency resources are finite, it is difficult to newly allocate a broadband for the FDD scheme. Thus, an LTE TDD scheme of dividing UL and DL with respect to time by using the same frequency band is beginning to be adopted. Because the TDD scheme requires half a band as compared with the FDD scheme, it is possible to effectively utilize frequency resources therewith. On the other hand, as one method of transmitting radio waves transmitted from a wireless device such as a mobile phone base station to a plurality of dead zones which radio waves do not reach, a distributed antenna system (DAS) for drawing a slave station for a base station in each dead zone in a wired manner is provided. The DAS can not only eliminate the dead zone but also can reduce an installation space for a base station. Thus, DASs are being actively used in zones which radio waves do not reach such as the inside of buildings, underground malls, and tunnels. Here, if the LTE TDD scheme is applied to the DAS, it is necessary to perform switching of transmission/reception using UL and DL. If there is a deviation between a switching timing of the transmission/reception of the DAS and a switching timing of the LTE TDD scheme, UL and DL interfere with each other and communication quality deteriorates. Due to this mutual interference, the transmission/reception of a control signal between a base station and a user terminal is obstructed, so that communication of the user terminal is disabled. Thus, in the LTE TDD scheme, a guard time is provided between UL and DL in order to prevent mutual interference between UL and DL. Mutual interference between UL and DL can be prevented by performing switching of the transmission/reception of the DAS during this guard time. In order to perform switching of the transmission/reception of a DAS during the guard time, it is necessary to detect the beginning of an UL signal or a DL signal. If the beginning of a signal can be accurately detected, it is possible to perform transmission without affecting the communication quality even if the signal has a short guard time. Conventionally, the beginning of the UL signal or the DL signal is detected based on a switching timing between UL and DL estimated on the basis of configuration information in the LTE TDD scheme. However because it is necessary to decode a received radio signal to acquire the configuration information in the LTE TDD scheme, an apparatus constituting the DAS becomes complicated. Also, as another detection method, the beginning of the UL signal is detected by estimating a radio signal of a user terminal connected to a macro base station that can be an interference source on the basis of an output of a detector. However, because the output of the detector generally has a variation of about several microseconds, it is difficult to detect the beginning of the signal with high accuracy. As described above, it has conventionally been difficult to detect the beginning of the UL signal or the DL signal with a simple configuration and high accuracy.
Mid
[ 0.565874730021598, 32.75, 25.125 ]
Heavyweight Numbered Ducks by Big Duck Canvas We are excited to offer a wide range of Heavyweight Numbered Ducks! Single fill and double fill are both constructed with a flat weave, but the double fill (The Numbered Ducks) are stronger because the warp and weft are made of plied (twisted) yarns. These fabrics are extremely dense, stiff and durable. #1 is the heaviest of all at 30oz! #4 is the next heaviest and available in a wide selection of widths from 24″-120″. If these fabrics sound perfect for your next sewing project make sure you have an industrial sewing machine and heavy thread. We recommend a tex 69 thread. I personally use #4 to make floor cloths and tote bags. I have had a lot of luck dyeing the #4. One thing I have learned about this super heavy canvas is that the wrinkles are very hard to remove. I have found the best way to wash #4 is to lay it flat in the driveway and use a hose and scrub brush. After I wash and rinse I move the canvas to another flat spot in the sun. It dries really quickly and completely flat! Keeping the fabric flat through the washing process saves a lot of time trying to remove stubborn wrinkles made in the washing machine. If you absolutely want to use your washing machine to wash this heavyweight canvas, the best solution is to remove the wet canvas and lay it flat on a few layers of towels. Cover it with more towels with some flat heavy weights on top. Change out the towels every few hours and eventually your fabric will look smooth.
Mid
[ 0.578231292517006, 31.875, 23.25 ]
Let your new Dog Show Ribbon charm holder be your symbol for your Best In Show dog jewelry, Best In Show Specialty Jewelry, Grand Champion dog show jewelry, Champion dog show jewelry, Top 20 dog show jewelry, Top 10 dog show jewelry and other conformation titles you have earned with your dog. Or let your Dog Show Ribbon Charm holder become your favorite MACH Jewelry, PACH Jewelry, NATCH Jewelry, ADCH Jewelry C-ATCH Jewelry, OTCH Jewelry or any other dog sport you and your dog enjoy doing. Sky is the limit for dog show titles we can engrave on this stunning ribbon piece with your favorite dog breed. Over 16 different Swarovski crystal colors to choose from. Ribbon pendant is best worn on an omega chain. Best In Show Great Pyrenees necklace beautifully complements Great Pyrenees earrings Commemorate your time in the dog show ring with a personalized Great Pyrenees ribbon pendant. Engraved items are not eligible for return/refund. Custom engraved items cannot be returned for errors in spelling, font etc. If they are engraved the way you instructed. Please be sure to verify spelling grammar and all information prior to placing your order. Sterling Silver Best In Show Great Pyrenees pendant is copyrighted by Dazzling Paws Jewelry LLC. Any re-creations of these designs will be prosecuted by law. How to select the right necklace length for your pendant 16” Chain is a short chain that fits close around your neck. 16” chains are great to wear with a “V” neck top or button-down shirt. The 16” chain fits more like a choke chain tightly around the throat. When buying a gift for a person that weighs over 150lbs and is around 5’5” tall, we recommend selecting an 18” to ensure that the necklace will fit properly as the 16” may not fit the person. 18” Chain is our most popular chain because it fits nicely around the neck coming down about 1”-2” from the throat. This chain length is comfortable to wear as it falls nicely in a “V” neck shirt or in a button-down top. When buying a gift for a person that weighs over 180lbs and is around 5’5” tall, we recommend selecting a 20” to ensure that the necklace will fit properly as the 18” may not fit the person comfortably. 20” Chain is a medium length chain that lies nicely on the outside of a rounded neckline. Our 20” is a popular chain for the full-figured woman, as it will lie like an 18” chain on them. The 20” is also known as the winter 18” chain. When wearing bulky clothes around the neck this necklace length will act like an 18”. 24” Chain is a longer chain that fits on the outside of collars on garments. This chain will normally lie about chest length. Great for chain to use for charm holders. Thou this chain may be long we do not recommend slipping this chain over your head as it causes stress/strain on the chain and clasp area their-by causing it to break over time. 30" Chain is a very long chain that will lie in the stomach area for a woman that is 5’5” but for a full figured woman can be a nice length to wear for a rounded neckline. This length of chain can be put on over your head without opening the clasp, even if you are wearing glasses. Great for chain to use for charm holders. Size chart below reflects a woman who is around 5’5” tall. Jewelry Tips for wearing a necklace ·Remove any necklaces before going to bed or taking a nap. Tossing and turning can cause excessive strain on necklaces which can result in kinking, weaknesses and breakage. Remember your neck and head weigh about 11lbs and your necklace weights about 5grams. Wearing your necklace to bed is like a semi hitting the deer. You know who survives that accident before it even happens.Please do not wear your jewelry to bed or when taking a nap. ·Remove your jewelry before you shower or bath. Necklace ends that are glued together such as our leather and twisted cords will erode from the water, causing the ends to unravel and come apart. Soap also clouds jewelry making it loose its luster. ·Remove your jewelry before you enter a swimming pool or Jacuzzi. The chemicals used both in the water and floating in the air will discolor Sterling Silver instantly and cause Bronze to permanently tarnish.
High
[ 0.702247191011236, 31.25, 13.25 ]
Publisher Correction: L3MBTL1 regulates ALS/FTD-associated proteotoxicity and quality control. An amendment to this paper has been published and can be accessed via a link at the top of the paper.
Mid
[ 0.637305699481865, 30.75, 17.5 ]
using System; namespace MultiMiner.Xgminer.Api.Data { public class VersionInformation { public string Name { get; set; } public string Description { get; set; } public string MinerVersion { get; set; } public string ApiVersion { get; set; } public VersionInformation() { Name = String.Empty; Description = String.Empty; MinerVersion = String.Empty; ApiVersion = String.Empty; } } }
Low
[ 0.469548133595284, 29.875, 33.75 ]
"KDE has released a series of updates to the Plasma Desktop and Netbook workspaces, the KDE Applications and the KDE Platform. This update is the first in a series of stabilization updates to 4.5.0, coming every month, as if delivered by a cronjob. 4.5.1 brings bugfixes and translation updates on top of KDE SC 4.5.0." In my case, on several distros (Fedora, OpenSuse, Pardus) and with default settings, X shows a pretty dark screen when launched, and then the computer becomes unresponsive (ie Ctl+Alt+Fx things won't work, power button won't shut the machine down, and so on). Tried to update NVidia and intel drivers to the latest release, no luck. Tried to force X to use the nvidia proprietary driver, no luck (no card detected). Tried with intel, no luck either (same symptom). 640x480 generic driver (VGA ?) kind of works, but it's just useless (insanely high screen brightness that can't be changed, eats up a fully charged battery in less than 2 hours, no room on screen, ugliness). So I'll just consider that support for my hardware is not ready yet Some years ago, I'd have fought with the command line until it works, but now I'm tired of this : either it works out of the box/with simple fixes or it doesn't work. I will tell it again and again and again. The problem is that gfx and other devices do not conform to a standard that would help create cross-OS drivers targeting the standard and not vendors. No matter how good are the programmers the Linux/Haiku/Solaris .... drivers will be crippled. We need one standard, like VESA, for capabilites exposed by the HW to the OS developer that should encompass GPUs and APUs (AMD's terminology). You just swap the GFX, not the drivers. I would love it if a well-known standard like VESA or OpenGL specified how software communicates with hardware for 3D acceleration too, but I think it's a dream. Hobby OSs should do their best with VESA standards and forget 3D acceleration until they've got sufficient momentum.
Mid
[ 0.6016260162601621, 37, 24.5 ]
Lazarus Group, Fancy Bear Most Active Threat Groups in 2017 Dark Reading reports on the most active threat actor groups from the calendar year 2017: The busiest threat actor groups of 2017 were Sofacy (otherwise known as Fancy Bear or APT28) and the Lazarus Group, security experts report. As these groups ramped up activity, threat actors operating out of China became quiet. Analysts at AlienVault leveraged data from its Open Threat Exchange (OTX) threat intelligence sharing platform to take a broad look at threat patterns from last year. They found the most frequently referenced threat group in 2017 was Sofacy. Ten years ago, Sofacy primarily targeted NATO and defense ministries. Over the past three years its operations have expanded to target businesses, individuals, and elections in the United States and France. Leaked information from the US government, and an official report from the German government, indicate the threat group is associated with Russian military intelligence. The second most active group was Lazarus, which is believed to operate out of North Korea (or Democratic People’s Republic of Korea, DPRK). It really is striking how quiet China was in 2017 compared to previous years. It could potentially be that Russian and North Korean threat actors are creating so much noise, that China is merely slipping under the radar. It is hard to believe China has slowed down their cyber operations to the degree they are almost irrelevant for an entire calendar year. I suspect they have grown more sophisticated, and their exploits have yet to be discovered. In due time we will know. SCOTT (すこっと) Scott (すこっと) is a cyber security, threat intelligence strategist, and technology evangelist working and living in Tokyo. In addition to his day job, Scott is fascinated by the future of computing, the technology industry, privacy, encryption, mobile apps, politics, & Japan. Scott enjoys taking pictures with his iPhone and sharing them freely online, primarily on Instagram.
High
[ 0.658354114713216, 33, 17.125 ]
The International Authority on Everything Theme Park Related. Join a Cast of Experts and Fans Every Week On an Informative Immersive Experience into the World of Rides, Attractions and Parks. We cover Disney, Universal, Merlin, Herschend, SeaWorld, Six Flags, Cedar Fair, and More!!! Part of the MiceChat Podcast Network - MicePod.com. In this week’s Season Pass, Pat McCabe (A Walk in the Park Podcast, In The Loop) joins Shannon and Doug Barnes in the SPDR.We discuss Enthusiast Events and have a West Coast Bash 2009 review.We also have an appearance by Nick Hutson to give us an opening rundown of the new SAW: The Ride at Thorpe Park in the UK.There’s also on-ride audio commentary for Six Flags Magic Mountain’s Gold Rusher, Riddler’s Revenge, Colossus, and Goliath (though it was quite windy so… well you’ll hear).Please enjoy this fan-packed show!!
Mid
[ 0.5943600867678951, 34.25, 23.375 ]
Q: Can I create an Infrastructure access point from built-in WiFi (as opposed to Ad-Hoc) on Windows XP? I want to use my Windows XP laptop as an access point. What I am trying to achieve is possible under Windows 7 with a myriad of utilities, but the wireless driver stack was different before Windows 7 and those specific APIs don't exist on XP. The reason behind me wanting to do this is that I would like my Android phone to be able to connect via WiFi to a network that is only hard-wired (reverse tethering). Unfortunately, my Android device (Galaxy S Captivate) does not support ad-hoc networks without a serious amount of screwing around. Is it possible to create an "Infrastructure" network with my Dell Latitude D830's built-in WiFi - a "Dell Wireless 1395 WLAN Card", which I am assuming is probably rebadged Broadcom, or is there some fundamental difference between a wireless adapter and an access point that would prevent this? A: You appear to face a host of issues with this one. Limitations of Windows XP, limitations that may be present in the drivers you are using/have been provided... etc. As I am new, I can't post all the links I needed to, so there may be links you need to select and manually copy/paste to follow. It's not the WNIC that is at fault per se. Multiple commercial WAP devices use Mini-PCI wireless cards to provide wireless access. It appears that you need to have specific Access Point based drivers available from the manufacturer (as in the RTL 8180 Native Wi-Fi AP based devices out there), as well as an OS that can allow building an Infrastructure based device (Windows CE, for example). Examine this MSDN article and specifically this article on configuring the registry on the OS you need to build and you start to get a sense of what would be necessary to take an OS not designed to stand as an Infrastructre WAP, and turn it into one. As you pointed out, there are a pile of utilities that can be used in conjunction with Win7 to make it happen... however, this just wasn't the case with Windows XP. There are "potential" software solutions out there, like: Nat32 which will provide internet access across a present WNIC (but no mention is made of it being Ad-hoc or Infrastructure). WooWeb is a commercial software router solution that will also work across a WAN as well as a LAN, and from the documentation it appears to stand as an Infrastructure, not an Ad-Hoc. In short: Windows XP wasn't made to be an embedded OS, which is what you essentially need to build an Infrastructure device if you don't want to use third party software. Otherwise, start downloading and testing software routers. That's your only option.
Mid
[ 0.617924528301886, 32.75, 20.25 ]
<map id="odf.draw.Control" name="odf.draw.Control"> <area shape="rect" id="node3" href="$namespaceodf_1_1draw.html#a3370d99ab01e834591bb75a5869210eb" title="odf.draw.StyleRefElement" alt="" coords="168,5,339,33"/> </map>
Low
[ 0.311926605504587, 12.75, 28.125 ]
Steatocystoma multiplex suppurativum: treatment with isotretinoin. A patient with steatocystoma multiplex with multiple ruptured draining cysts and abscesses was treated with a twenty-week course of isotretinoin. Abscesses involuted and inflamed cysts shrank. The remission persisted for ten weeks after discontinuing therapy; subsequently cysts and abscesses occurred in multiple sites.
Mid
[ 0.615584415584415, 29.625, 18.5 ]
U.S. and Saudi Arabia sanction alleged Lashkar-e-Taiba supporters RIYADH (Reuters) - Saudi Arabia and the United States imposed joint sanctions targeting the Pakistan-based militant group Lashkar-e-Taiba, the two countries announced on Thursday. The sanctions targeted four individuals and two affiliated organizations, including James Alexander McLintock and the Pakistan-based Al-Rahmah Welfare Organization, which the U.S. Treasury Department said was a front for al-Qaeda. Also listed were Abdul Aziz Nuristani, the Jamia Asariya Madrassa, Naveed Qamar and Saudi Arabia-based Muhammad Ijaz Safarash, who was accused of arranging travel documents and financial transfers for Lashkar-e-Taiba from the kingdom. The announcement marks the second time that the United States and Saudi officials have coordinated their actions to disrupt the finances of Islamist militant groups in Southeast Asia. Last April, they levied joint sanctions against Al-Furqan Foundation Welfare Trust, also based in Pakistan and Afghanistan.
Mid
[ 0.6157303370786511, 34.25, 21.375 ]
At Osturlund Racing, more than just the cars were being prepared for the beginning of the 1980 season. Car owner Rod Osturlund and driver Dale Earnhardt sat down to talk about the future, and Dale, who a year before had been in debt and struggling while trying to find a way to move his career from the Sportsman ranks to the NASCAR Winston Cup Series, was about to finally feel secure about his future. Rod and Dale put together an five-year contract that insured Earnhardt's future in stock car racing's major league. When the season started, Earnhardt and his young group of stalwarts at Osturlund were going from race to race, trying to win every event and putting up some incredible results for a team with a second-year driver. Meanwhile, drivers like Cale Yarborough and Darrell Waltrip, who normally would be in control of the series, were sorting through problems. The Osturlund team had given no thought to challenging for the title at the beginning of the season, especially since no driver had ever won the championship as early as his second year of competition. The crew was inexperienced in a title run, and everyone expected the blue and yellow cars to have problems with consistency - the key to winning a championship on a 31-event schedule. But Dale surprised everyone when he took the point lead after collecting a second-place finish at Riverside and a fourth in the Daytona 500. Earnhardt never looked back. Race after race the team ran up front, and the points for the championship came in gobs. Earnhardt won his first career superspeedway at Atlanta in the spring; he beat Rusty Wallace - in Rusty's NASCAR Winston Cup debut - by more than nine seconds. Earnhardt won again the following week at Bristol. Dale's crew chief, Jake Elder, walked away from the team following the World 600 at Charlotte. Pit road-watchers expected the Osturlund effort to fall on its face. But 20-year-old Doug Richert stepped up as crew chief and more than met the demands of leading the team. The Chevrolets never missed a beat. Richard Petty was the first to make a run at Earnhardt, but a string of engine failures late in the season ended his hopes. Then, Cale Yarborough leveled both barrels at Earnhardt in the stretch run. But Dale's hugely popular win at the National 500 at his home track, Charlotte, blunted Cale's charge and propelled the Osturlund team through the final three races of the season. Cale did win at Rockingham and Atlanta and had closed to within 29 points heading into the final race at Ontario. Yarborough charged to a third-place finish in the final race of the season, but Earnhardt finished fifth at the southern California track, gaining just enough points to hold onto the lead and claim the title. Dale, who wrapped up five wins that season, had won his first championship by 19 points. The young and aggressive team had accomplished what few had expected. With a "just win" attitude and working against all odds - including a crew chief shuffle in mid-season - the Osturlund "kids" parried every thrust by tried and proven championship teams. No one had told them they weren't supposed to win the title. The team's game plan never changed: try to win every race, and if they couldn't, obtain the best finish possible. The wins and top-10 finishes came with regularity, and the "meltdown" that the team's competitors had expected in the midst of the torrid stretch run to the championship never materialized. It was a brilliant display of driving, preparation, and team chemistry that obviously was missing from several other teams during the season. In the final stages of the season, the Osturlund team proudly announced sponsorship for the coming year from Wrangler. The Wrangler name even appeared on the car at Ontario. Osturlund's normal blue and yellow colors were a perfect fit for the clothing manufacturer, and by having its name on the Chevrolet during the event in which the team had nailed down the NASCAR Winston Cup championship, Wrangler enjoyed the added benefit of a winter of "free advertising"!
High
[ 0.7021013597033371, 35.5, 15.0625 ]
Used for iterating through DoubleHistogram values values using the finest granularity steps supported by the underlying representation. The iteration steps through all possible unit value levels, regardless of whether or not there were recorded values for that value level, and terminates when all recorded histogram values are exhausted.
Mid
[ 0.589569160997732, 32.5, 22.625 ]
Q: Custom paginations in DataTables js How can I add a custom pagination in datatables.js as per the below illustration? A: The quickest way to add pagination is to add parameter 'paging' to your initial options, like that: $('#your_table_id').dataTable( { "paging": true }); Parameter 'paging' is set to true by default. You can also add parameter pagingType and set it to full_numbers, like that: $('#your_table_id').dataTable( { "paging": true, "pagingType": "full_numbers" }); To display other pagination buttons (first, last) and add custom names to them you should use below code: $('#myTable').DataTable({ "pagingType": "full_numbers", "language": { "paginate": { "first": "«", "previous": "‹", "next": "›", "last": "»" } } }); and to add the style you can override some CSS rules like that: .dataTables_wrapper .dataTables_paginate .paginate_button { border: 1px solid blue !important; /* other rules */ } .dataTables_wrapper .dataTables_paginate .paginate_button.current { border: 1px solid red !important; /* other rules */ } .dataTables_wrapper .dataTables_paginate .paginate_button.disabled { border: 1px solid grey !important; /* other rules */ } Unfortunately, it is ugly because you have to use the flag !important. The other more difficult way is to write own plugin.
High
[ 0.691421254801536, 33.75, 15.0625 ]
[Psychotherapeutic procedures for fibromyalgia syndrome]. Psychosocial factors play an important role in the predisposition, triggering and course of fibromyalgia syndrome (FMS). Cognitive behavioral therapies are strongly recommended in the current guidelines on the management of FMS in Canada, Germany and Israel. Review of techniques, aims and efficacy of psychotherapeutic procedures in FMS. Narrative review based on a selective search for systematic reviews on the efficacy of psychotherapeutic procedures in FMS. There is robust evidence for the short and long-term efficacy of cognitive behavioral therapies on some key symptoms of FMS, e.g. pain, depression and disability. The quality and quantity of the evidence for the efficacy of other psychotherapeutic procedures (e.g. biofeedback, relaxation therapies, hypnosis/guided imagery and psychodynamic therapy) are insufficient. Cognitive behavioral therapies (e.g. acceptance and commitment therapy, cognitive behavioral therapy and operant therapy) should play an important role in a graduated and individually tailored therapy of FMS patients.
High
[ 0.700447093889716, 29.375, 12.5625 ]
This invention relates to an apparatus for use with semi-trailers, and more particularly to apparatus for retracting bogie-locking coupling pins to facilitate positioning of bogies under the bed of a semitrailer. More particularly, this invention relates to an operator for a pin retractor mounted on a bogie included in a tractor trailer rig. This invention also relates to mechanisms including a threaded shaft and a partial nut which allows lineal movement between the shaft and partial nut through rotational motion of the shaft or an axial pulling motion exerted on the shaft. Tractor trailer rigs include trailer beds that are supported above a roadway by a tandem-wheeled "bogie". Truck drivers find that it is necessary to move the trailer bed forward and backward relative to the bogie to support the load that they intend to carry on the trailer bed properly. Pins are used to lock a trailer bed in a fixed position relative to an underlying bogie. These pins must be dislodged, oftentimes not an easy task, to enable a truck driver to move or reposition the trailer bed relative to the underlying bogie. Drivers dislodge the pins by operating the tractor to rock the trailer bed forward and backward while someone, or some device, pulls on a handle of a pin retractor mounted to the bogie to retract the pins and decouple the trailer bed from the bogie. Drivers would welcome a detachable pin retractor operator that is attached to the bogie to pull on the handle of the pin retractor while the driver operates the tractor to rock the trailer bed until the pins coupling the trailer bed to the bogie are retracted and which does not need to be removed prior to repositioning the trailer bed over the bogie.
Mid
[ 0.6241758241758241, 35.5, 21.375 ]
Bitfinex will now be able to hold on to documents related to an alleged cover-up of $850 million loss on the cryptocurrency exchange. This is according to a court order that was published on September 24 by the Appellate Division of the New York Supreme Court. Bitfinex’s Cover-Up Case iFinex, the parent company of the cryptocurrency exchange Bitfinex, will not have to produce documents and information related to the $850 million loss that the exchange registered. Appellate court justices David Friedman, Peter Tom, Troy Webber, Ellen Gesmer and Jeffrey Oing took the decision to stop the previous ruling by the New York Supreme Court Judge Joel Cohen. iFinex has been accused of covering up an $850 million loss on the Bitfinex exchange using funds that were backing the Tether (USDT) stablecoin. The company filed these appeals against turning over the documents back in August this year. Since May, the company is involved in this legal fight with the NYAG. iFinex considers that the NYAG has no jurisdiction over the company. Tether has been involved in different controversies during the past years regarding the funds that it has to back its peg against the U.S. dollar. The stablecoin is currently the largest in the market despite being accused of manipulating Bitcoin’s (BTC) price. According to CoinDesk, Judge Cohen ruled in August that Bitfinex must turn over the documents considering the NYAG’s office had jurisdiction over the trading platform. Thus, the document production should proceed as established. The main issue with the funds provided to the exchange is related to the fact that Tether’s cash reserves were pretended to back the stablecoin. If Tether users wanted to cash their funds out would not have been able to do so at that time, or at least to some extent. The companies were accused of violating the New York law and that Bitfinex never shared information about the losses to investors. At the time of writing this article, Bitfinex is the 32nd largest cryptocurrency exchange in terms of market capitalization. This is according to data provided by CoinMarketCap, one of the largest digital currency data services providers in the space. Bitfinex handled a trading volume of $533 million in the last 24 hours with BTC/USD, ETH/USD and EOS/USD being the most traded pairs on the platform. These virtual currencies accounted for over 62% of all the trading volume on the exchange.
Mid
[ 0.5790645879732741, 32.5, 23.625 ]
Savor sweet golden carrots kissed with just the right amount of honey and apricot preserves. Ingredients 2 bags (16 oz each) ready-to-eat baby-cut carrots 1 medium onion, cut in half, sliced 1/4 teaspoon salt 1/3 cup honey 1/3 cup apricot preserves 2 tablespoons chopped fresh parsley Directions 1In 4- to 5-quart slow cooker, place carrots and onion. Sprinkle with salt. 2Cover; cook on Low heat setting 9 to 10 hours. 3Discard liquid in cooker. In small bowl, mix honey and preserves; pour over carrots in cooker. Increase heat setting to High. Cover; cook 10 to 15 minutes or until hot. Sprinkle with parsley before serving. Carrots will hold on Low heat setting up to 2 hours; stir occasionally. Expert Tips Carrots that are about the same size cook more evenly, so cut larger carrots in half lengthwise. Peach, plum, pineapple or another flavor of preserves will lend these carrots a subtly different yet equally delicious fruit flavor.
Low
[ 0.5036496350364961, 34.5, 34 ]
We are incredibly proud to announce that the tabletop RPG books ZWEIHÄNDER Grim & Perilous RPG: Core Rulebook and the yet-unreleased MAIN GAUCHE will be joining the annals of authors such as Exploding Kittens, The Oatmeal, Roger Ebert, The Boondocks, Calvin and Hobbes, FoxTrot, Doonsbury, The Far Side, Garfield and many, many others as a publication of Andrews McMeel Universal! This will be AMU’s first foray into the tabletop RPG industry, with these two books at the fore… It’s 2019 #ZweihanderRPG announcement time! Starting in January, tune in every Friday with the Encounter Roleplay #Blackhearts crew for for their full-length grim & perilous campaign using ZWEIHÄNDER Grim & Perilous RPG on Twitch! Take Zweihänder for a spin by grabbing the 688-page core book for $9.99 here! An excellent review from Charles Dunwoody at E.N. World on his experience playing ZWEIHÄNDER Grim & Perilous RPG: You chased a thief into a swamp, trekked through trackless forests and bogs, and fought your way out of an ambush set by orx. Just another day as wandering adventurers in Zweihänder the grim and perilous RPG. Zweihänder is a 668 page hardcover filled with black and white art of grim dark shenanigans. If you want a long-term campaign of… Have you ben impish or admirable this holiday season? The #ZweihänderRPG Krampus wants to know! Download our Krampus holiday creature and its dread brass bells relic from DriveThruRPG tonight! This creature was made using our new supplement MAIN GAUCHE, which you can pre-order up until December 24th. Happy holidays, and see you in 2019! Download the Krampus from DriveThruRPG Here Preorder your copy of ZWEIHÄNDER Grim & Perilous RPG and its expansion Main Gauche through Backerkit! A special discount rate will automatically applied to all preorders made before December 24th. All pre-orders will get a special stocking stuffer coupon to let your friends and kids know that they’ll have a ho-ho-heck of a time playing Zweihänder Grim & Perilous RPG! PREORDER YOUR GAME HERE (shipping begins in February 2018) The Teach Your Kids To Game holiday sale is on right now at DriveThruRPG! You can get the complete Zweihander Grim & Perilous Digital Collection – that’s 15 products at 50% off for only $40. That’s every digital product we currently offer in our catalogue. #ZweihanderRPG, #MainGauche, magick cards, character folios, GM screens, accessories and more! This special holiday deal ends soon, so hurry before it’s gone!
Mid
[ 0.6272727272727271, 34.5, 20.5 ]
Background ========== Esophageal cancer, an aggressive upper gastrointestinal malignancy, generally presents as a locally advanced disease and requires a multimodal concept. Despite improvements in its detection and management, the prognosis in patients with esophageal cancer remains poor, with a 5-year survival of 15--34% \[[@B1],[@B2]\]. Most patients who undergo curative treatment for esophageal cancer will eventually relapse and die as a result of their disease. Neoadjuvant chemoradiotherapy (CCRT) can increase the chance of R0 resection, and responders will have a survival benefit \[[@B3]\]. Patient selection is important to guide multidisciplinary therapy. The identification of potential molecular markers to predict response to CCRT and recurrence is important for the effective management and prognosis of esophageal cancer. Proinflammatory cytokine may contribute to tumor progression by stimulating angiogenesis, invasion and metastasis \[[@B4],[@B5]\] IL-6 is a pleiotropic cytokine that is capable of modulating diverse cell functions such as inflammatory reactions, and is a major activator of the JAK/STAT3 and PI3K/AKT signaling pathways \[[@B6]\]. IL-6 signaling has been implicated in the regulation of tumor growth and metastatic spread in different cancers \[[@B7]-[@B9]\]. Moreover, increased IL-6 serum levels were reported to be associated with metastasis and poor prognosis in prostate, ovarian and gastrointestinal cancers \[[@B10]-[@B12]\]. Although evidence suggests that IL-6 is a critical factor in a variety of malignancies \[[@B11],[@B13],[@B14]\], how IL-6 modulates the biological activities of esophageal carcinoma cells and how it is associated with the prognosis of esophageal cancer remains unclear. There are two distinct histological types of esophageal cancer: squamous cell carcinoma (SCC) and adenocarcinoma. There are marked differences between these carcinomas in incidence, natural history and treatment outcomes \[[@B15]\]. The majority of esophageal SCC cases occur in Asia, with the predominant type in Taiwan being SCC \[[@B16]\]. We therefore investigated the role of IL-6 in esophageal SCC *in vitro* and *in vivo*, and examined the correlation between IL-6 levels and clinical outcomes in esophageal cancer patients. Materials and methods ===================== Patient characteristics ----------------------- The Institutional Review Board of Chang Gung Memorial Hospital approved the present study (Permit Number: 96-1693B). The written consents were signed by the patients for their specimen and information to be stored in the hospital and used for research. Patients who did not comply with the treatment regimen and those who received surgery alone for early-stage esophageal cancer were excluded from the study. A total of 173 patients with esophageal SCC who completed curative treatment were enrolled in the study. The curative treatment for esophageal cancer included neoadjuvant CCRT combined with surgery or definitive CCRT according to the guidelines proposed by oncology team at our hospital. On completion of neoadjuvant CCRT, patients underwent a repeat CT scan and endoscopic examination to determine the response to treatment. If the tumor was considered resectable, patients underwent surgery for the residual tumor. Pathologic complete response (CR) was defined as absence of residual invasive tumor in the surgical specimen in patients undergoing surgical intervention. For patients who refused surgery or in whom it was contraindicated, a second round of CCRT was administered, comprising two courses of chemotherapy and radiotherapy of a total of 60--63 Gy. Specimens collected from the 173 patients at diagnosis were subjected to immunochemical analysis. The main end points were overall survival (OS), disease-free survival (DFS) and response to neoadjuvant therapy. Survival probability was analyzed statistically using the Kaplan--Meier method. The significance of between-group differences was assessed using the log-rank test. Multivariate analyses were performed using a Cox regression model for survival. Immunohistochemical staining (IHC) ---------------------------------- Formalin-fixed, paraffin-embedded tissues from 173 patients with esophageal cancer were subjected to IHC staining. Dissected esophageal cancer specimens from 20 of these patients were converted into tissue microarray (TMA) blocks using an AutoTiss 1000 arrayer (Ever BioTechnology, Canada). The TMA block contained esophageal SCCs and the adjacent non-malignant epithelium. The quality of the TMA slides was confirmed by the pathologist using hematoxylin- and eosin-stained slides. The IHC data for the specimens were assessed using the semi-quantitative immunoreactive score (IRS). The criterion for positive staining was an IRS score of ≥2. The details were described in Additional file [1](#S1){ref-type="supplementary-material"}: Supplementary methods. Cell culture and reagents ------------------------- The human esophageal cancer cell line CE81T, derived from a well-differentiated esophageal SCC, was obtained from the Bioresource Collection and Research Center (BCRC),and cultured in Dulbecco's modified Eagle's medium supplemented with 10% fetal bovine serum. The IL-6-neutralizing antibody, STAT3 siRNA and the JAK inhibitor AG490 were purchased from R&D Systems (Minneapolis, MN) and Sigma (St. Louis, MO), respectively. The IL-6-GFP silencing vector (human IL6 shRNA constructs in retroviral GFP vector) and GFP-control vector (Non-effective scrambled shRNA cassette in retroviral GFP vector) were purchased from Origene Technologies, Inc. (Rockville, MD). Transfection in CE81T was carried out by Lipofectamine™ 2000 (Invitrogen) according to the manufacturer's instructions. Stable cancer cells were generated by transfecting CE81T cells with either the IL-6 silencing vectors or control vectors, followed by selection with puromycin for 4 weeks. Cell growth ----------- To measure cell growth, 1×10^4^ cells per well were plated into 6-well dishes. At the indicated time-points, cells were trypsinized, collected and surviving cells counted using Trypan blue exclusion, from which the survival curves for CE81T transfectants ( wild type, with control vectors, and with IL-6 silencing vectors) were established. Immunoblotting -------------- To determine the *in vitro* effects of STAT3 siRNA, proteins were extracted from cells transfected with STAT3 siRNA for 72 h. To determine the *in vitro* effects of the JAK inhibitor and the anti-IL-6 antibody, proteins were extracted from cells incubated in the presence of 50 μM AG490 or 5 μg/ml IL-6 neutralizing antibodies for 24 h. The details were described in Additional file [1](#S1){ref-type="supplementary-material"}: Supplementary methods. Immunofluorescence staining (IF) and Statistical analysis --------------------------------------------------------- The details were described in Additional file [1](#S1){ref-type="supplementary-material"}: Supplementary methods. Enzyme-linked immunosorbent assay (ELISA) analysis of IL-6 level ---------------------------------------------------------------- We examined the serum level of IL-6 from 71 patients among subjects enrolled with esophageal cancer in the present study. For serum specimen, five milliliters of peripheral blood were drawn from each patient. Moreover, IL-6 levels in cellular supertnant and murine serum were tested. Levels of IL-6 in samples were analyzed using an IL-6 Quantikine ELISA Kit (R&D system). The details were described in Additional file [1](#S1){ref-type="supplementary-material"}: Supplementary methods. Tumor xenografts ---------------- This study was carried out in strict accordance with the recommendations in the Guide for the Care and Use of Laboratory Animals as promulgated by the Institutes of Laboratory Animal Resources, National Research Council, U.S.A. The protocol was approved by the Committee on the Ethics of Animal Experiments of Chang Gung Memorial Hospital (Permit Number: 2012080903). Eight-week-old male athymic nude mice were used and all animal experiments conformed to the protocols approved by the experimental animal committee of our hospital. CE81T cancer cell transfectants (1 × 10^6^ per implantation, five animals per group) were subcutaneously implanted in the dorsal gluteal region. To determine *in vivo* radiosensitivity, local irradiation (15 Gy) was performed when the tumor volume reached 500 mm^3^. Radiosensitivity was indicated by a growth delay (*i*.*e*., the time required for the tumor to recover its previous volume after irradiation). Duplicate experiments were performed for growth delay analyses. The details were described in Additional file [1](#S1){ref-type="supplementary-material"}: Supplementary methods. Results ======= Level of IL-6 in esophageal SCC ------------------------------- The IHC data for TMA slides demonstrated that IL-6 was overexpressed in tumor tissues compared to adjacent non-malignant epithelial tissues (Figure [1](#F1){ref-type="fig"}a). Figure [1](#F1){ref-type="fig"}b showed the representative slides of positive staining and negative staining with anti-IL-6 antibody for human esophageal cancer specimens. Of the 173 esophageal cancer tissues, 88 (51%) showed positive IL-6 immunoreactivity (41% (45/109) in ≤ T3 *versus* 67% (43/64) in T4, *P* = 0.001). Furthermore, there was a positive correlation between IL-6 overexpression and cancers developing loco-regional failure or distant metastasis (Table [1](#T1){ref-type="table"}). The biological activities of IL-6 are mediated through binding to a membrane-bound or soluble form of IL-6 receptor. By IHC analysis of TMA slides, IL-6 receptor (IL-6R) was expressed in both tumor tissues and adjacent non-malignant epithelial tissues (Figure [1](#F1){ref-type="fig"}c). ![**IL-6 levels in esophageal SCC. a**. Representative IHC staining with an anti-IL-6 antibody of esophageal cancer and adjacent non-malignant epithelium from TMA blocks. **b**. IHC staining with an anti-IL-6 antibody of human esophageal cancer specimens. Images of representative slides are shown at magnifications of × 100 (left panel) and × 200 (right panel). **c**. Representative images of IHC staining with an anti-IL-6R antibody of esophageal cancer and adjacent non-malignant epithelium from TMA blocks.](1476-4598-12-26-1){#F1} ###### Clinico-pathological characteristics of esophageal cancer patients for immunohistochemical investigation   **No. of patients**   ------------------------------------------- --------------------- ---- ------------ **patients** 85 88   **Age**       \> = 56y/0 43 44 0.938 \<56y/o 42 44   **Location**       Upper third 22 26 0.498 Middle third 48 42   Lower third 15 20   **Tumor stage**     0.041\* I-II 28 17   III-IV 57 71   **LN metastasis**     0.246 negative 27 21   positive 58 67   **P-stat3 staining**     \<0.0001\* negative 71 20   positive 14 68   **Response to Neoadjuvant Tx**     0.0001\* Response 69 47   Non- response 16 41   **Surgery s/p Neoadjuvant Tx**     0.145 Yes 31 24   No 54 64   **Local-regional Recurrence /persistent**     \<0.0001\* No 44 16   Yes 41 72   **Distant metastasis**     0.0003\* negative 58 36   positive 27 52   Abbreviations: Neoadjuvant Tx = neoadjuvant chemoradiotherapy. Role of IL-6 in tumor growth ---------------------------- As demonstrated in Figure [2](#F2){ref-type="fig"}a, the IL-6 silencing vector significantly inhibited IL-6 expression in CE81T cells. By viable cell counting over 6 days and observation of xenograft tumors, the IL-6 silencing vector significantly inhibited tumor growth *in vitro* (Figure [2](#F2){ref-type="fig"}b) and *in vivo* (Figure [2](#F2){ref-type="fig"}c). Figure [2](#F2){ref-type="fig"}d showed that the cell death rate increased from 5.6 ± 1.2% to 13.5 ± 1.8% in CE81T cells after treatment with an IL-6-neutralizing antibody (as measured by flow cytometry) and by the IL-6 silencing vector (propidium iodide staining). ![**Role of IL-6 in tumor growth. a**. Effect of an IL-6-GFP silencing vector on the level of IL-6 in CE81T, as assessed by immunofluorescence and immunoblotting. The results of representative slides are shown. The IL-6-GFP silencing vector as compared with that with control-GFP vector significantly reduced IL-6 levels. **b**. Effect of IL-6 on the proliferation of CE81T cancer cells as determined by viable cell counting. The same number of cells (10^4^) were plated in each plate on day 0 and allowed to grow in their respective cultures. We counted the number of viable cells after incubation for 2, 4 and 6 days. The Y axis represents the viable cell number. Point, means of three separate experiments; bars, SD. \*, *p* \< 0.05. **c**. Effect of IL-6 inhibition on tumor xenograft growth. Data represent the means ± SD of three independent experiments. \*, *p* \< 0.05. IL-6 expression was also evaluated by IHC staining of xenografts. Representative slides are shown. **d**. Effect of IL-6 inhibition on cell death, as assessed by FACS and immunofluorescence staining. The results of representative slides are shown.](1476-4598-12-26-2){#F2} Role of IL-6 in tumor invasion and underlying mechanisms -------------------------------------------------------- There was a positive link between IL-6 and tumor stage and disease failure in patients with esophageal cancer (Table [1](#T1){ref-type="table"}). Furthermore, as demonstrated using migration scratch assays, IL-6 silencing vector attenuated the invasive capacity of esophageal cancer cells (Figure [3](#F3){ref-type="fig"}a). Epithelial-mesenchymal transition (EMT) is a key event in invasiveness \[[@B17]\]. As shown in Figure [3](#F3){ref-type="fig"}b, the IL-6 silencing vector reversed EMT changes, with increased E-cadherin expressions, and decreased matrix metalloproteinase (MMP)-9, vimentin and Snail, a repressor of E-cadherin expression. The activation of STAT3 signaling was reported to play important roles in the induction of aggressive tumor behavior and EMT changes in cancer \[[@B18]\], including cancers in the upper aerodigestive tract \[[@B8],[@B19]\]. As shown in Table [1](#T1){ref-type="table"} and Figure [3](#F3){ref-type="fig"}c--d, positive staining for p-STAT3 was evident in 47% of the 173 cancer specimens, and a significant positive correlation was found in cancer specimen that expressed IL-6 and p-STAT3. As determined by immunofluorescence and immunoblotting analysis (Figure [3](#F3){ref-type="fig"}e-f), IL-6 inhibition significantly attenuated the activation of STAT3 *in vitro*. Moreover, when STAT3 signaling was inhibited by STAT3 siRNA or the JAK inhibitor AG490, the decreases in EMT- related protein levels were comparable to those induced by the IL-6-neutralizing antibody (Figure [3](#F3){ref-type="fig"}f). Therefore, it appears that altered STAT3 activation and subsequent EMT might, at least in part, be responsible for the aggressive tumor behavior in IL-6-positive esophageal cancer. ![**Role of IL-6 in aggressive tumor behavior and EMT changes. a**. Effect of IL-6 inhibition on the migration ability of esophageal cancer cells. Plates were photographed at the times indicated. Representative slides and quantitative data (y-axis shows the relative ratio, normalized to the distance under control conditions) are shown. **b**. Effect of IL-6 inhibition on EMT-associated proteins. The changes of E-cadherin and vimentin expression were evaluated by immunofluorescence, and the results of representative slides are shown. In addition, changes in the levels of EMT-associated proteins were evaluated by immunoblotting (W, wild-type cells; V, cells transfected with the control vector; IL-6^-^, cells transfected with the IL-6 silencing vector). **c**. Representative IHC staining with an anti-p-STAT3 antibody in esophageal cancer and adjacent non-malignant epithelium on slides from TMA blocks. **d**. P-STAT3 levels correlate positively with IL-6 levels in human esophageal cancer specimens (*p* \< 0.001). Representative images of positive IL-6 and p-STAT3 staining on slides from a selected tumor specimen, and representative negative staining for IL-6 and p-STAT3 on slides from another tumor specimen, are shown. **e**. Effect of the IL-6 silencing vector on STAT3 activation, as examined by immunofluorescence analysis. **f**. Effect of inhibited IL-6 signaling on STAT3 activation and EMT-related protein levels, as determined by immunoblotting (W, proteins were extracted from cells under control condition; IL-6Ab, proteins were extracted from cells incubated in the presence of 5 μg/ml IL-6 neutralizing antibodies for 24 h; AG, proteins were extracted from cells incubated in the presence of 50 μM AG490 for 24 h; SI, proteins were extracted from cells 72 h after transfection with STAT3 siRNA).](1476-4598-12-26-3){#F3} Effects of circulating IL-6 on tumor aggressiveness --------------------------------------------------- We used ELISA assay to test the level of IL-6 in the supernatant of cell culture and the serum of mice bearing tumors. As shown in Figure [4](#F4){ref-type="fig"}a, IL-6 silencing vector clearly attenuated IL-6 secretion. Moreover, the serum levels of IL-6 were examined by ELISA. The mean IL-6 levels in serum samples from 71 patients with esophageal cancer were 39 ±  7.7 pg/mL. Serum IL-6 levels were significantly elevated in patients with local-regional failure or developing distant metastasis compared to those in patients with disease control (Figure [4](#F4){ref-type="fig"}b). Table [2](#T2){ref-type="table"} also showed that IL-6 serum levels were significantly correlated with a greater probability of developing local-regional failure and distant metastasis. In addition to EMT, angiogenesis is one of the mechanisms that promote tumor progression. The most prominent and best-characterized pro-angiogenic pathway is vascular endothelial growth factor (VEGF) signaling \[[@B20]\], and CD31-mediated endothelial cell-cell interactions are involved in angiogenesis \[[@B21]\]. Therefore, the vascular network within the tumor was measured by VEGF staining and microvascular density (MVD) analysis after CD31 staining. When esophageal cancer cells with control vectors and those with IL-6 silencing vectors were subcutaneously implanted into mice, we found that the growth inhibiting effect induced by IL-6 silencing vector associated with lower expression levels of EMT- and angiogenesis-related factor (Figure [4](#F4){ref-type="fig"}c). Accordingly, we suggested that circulating IL-6 plays a role in tumor promotion, and the induction of angiogenesis and EMT might be the underling mechanisms. ![**Effects of circulating IL-6 on tumor aggressiveness. a**. The levels of IL-6 in cell supernatant and serum of mice bearing tumors with or without IL-6 silencing vectors were examined by ELISA. Columns, means of 3 separate experiments; bars, SD. \*, *P* \< 0.05. **b**. Serum IL-6 levels of patients were examined by ELISA analysis. Columns are the means of specimen; Bars, SD; \*, *P  \<*  0.05. (LR = Local-regional Recurrence /persistent; DM = distant metastasis). **c**. IHC using MMP-9, E-cadherin, CD31, and VEGF staining in tumors 20 days after implantation. IL-6 silencing vectors were significantly reduced by the angiogenesis and EMT-related changes as compared with control-GFP vector. The Y-axis represents the ratio normalized by the value of target protein in tumor transfected with control vectors. Columns, means of 3 separate experiments; bars, SD. \*, *P* \< 0.05 (C-V, cells transfected with the control vector; IL-6 SV, cells transfected with the IL-6 silencing vector).](1476-4598-12-26-4){#F4} ###### Significance of IL-6 expression stratified according to the occurrence of local- regional failure (LR) or distant metastasis (DM) in 71 patients   **IL-6 serum level**   -------- ---------------------- ---- ---- ------------- **LR** **+** 12 32 *P = 0.001* **-** 18 9 **DM** **+** 10 24 *P = 0.035*   **-** 20 17   LR = Local-regional Recurrence /persistent; DM = distant metastasis. IL-6 correlates with treatment response in esophageal SCC --------------------------------------------------------- Regarding clinical data, the expression of IL-6 was significantly associated with a lower rate of response to curative treatment in the 173 esophageal SCC patients (Table [1](#T1){ref-type="table"}), and a lower pathological complete response rate in the 55 patients who underwent surgical intervention (Table [3](#T3){ref-type="table"}). Therefore, we investigated the role of IL-6 in treatment resistance and the underlying mechanisms. Colony-forming assay data (Figure [5](#F5){ref-type="fig"}a) and the *in vivo* delay in tumor growth (Figure [5](#F5){ref-type="fig"}b) demonstrated that the IL-6 silencing vector significantly sensitized esophageal cancer cells to irradiation. As shown in Figure [5](#F5){ref-type="fig"}c-d, inhibition of IL-6 increased cell death and DNA damage and attenuated STAT3 activation after irradiation. Tumor vascularity have been shown to be linked to the tumor-bed effect induced by irradiation \[[@B22]\]. To investigate whether angiogenesis underlies radiation resistance triggered by IL-6, the vascular network within the tumor by MVD analysis and the expression of VEGF after irradiation were measured. As shown in Figure [5](#F5){ref-type="fig"}d, the IL-6 silencing vector significantly decreased angiogenesis by evidence of decreased MVD and VEGF staining in irradiated tumors. ###### Significance of IL-6 expression stratified according to the complete response to neoadjuvant treatment in 55 patients with surgery resection   **IL-6**   --------------- ---------- ---- ---- ------------- Pathologic CR **+** 3 11 *P = 0.052*   **-** 21 20   ![**Effects of IL-6 on radiation responses. a**. Cells were irradiated with 0, 2, 4, 6, and 8 Gy, and survival curves were constructed using colony-forming assay data. Data represent the means of three experiments. \*, *p* \< 0.05. IL-6 silencing vectors significantly sensitized tumor cells to irradiation. **b**. Effects of IL-6 on *in vivo* radiosensitivity, as assessed by evaluation of tumor growth following irradiation (15 Gy). The y-axis shows the tumor volume ratio at each time point, divided by the tumor volume at irradiation. (C-V, cells transfected with the control vector; IL-6 SV, cells transfected with the IL-6 silencing vector). **c**. The *in vitro*effects of IL-6 inhibition on p-STAT3 and p-H2AX levels and cell death, as evaluated by IHC staining and Annexin V-PI staining in irradiated cells. **d**. An IL-6-silencing vector decreased angiogenesis in tumors, as evaluated by immunoblotting and IHC analysis of tumor specimens 14 days after local irradiation. Representative slides are shown. The Y axis represents the ratio normalized by the value of target protein in tumor transfected with control vectors. Columns, means of 3 separate experiments; bars, SD. \*, *P* \< 0.05. (C-V, cells transfected with the control vector; IL-6 SV, cells transfected with the IL-6 silencing vector).](1476-4598-12-26-5){#F5} Correlation between the IL-6 level and clinical outcome ------------------------------------------------------- As shown in Figure [6](#F6){ref-type="fig"}, IL-6 is a significant predictor for OS. The median OS times were 16 and 42 months in patients who completed CCRT treatment and those who underwent surgical intervention, respectively. In addition, Tables [1](#T1){ref-type="table"}, [2](#T2){ref-type="table"}, [3](#T3){ref-type="table"} showed that IL-6 was significantly correlated with a greater probability of developing distant metastasis and a higher recurrence rate after curative treatment. In univariate and multivariate analyses, poor treatment response, no tumor resection, and positive IL-6 staining were significantly associated with shorter survival (Tables [4](#T4){ref-type="table"}, [5](#T5){ref-type="table"}, [6](#T6){ref-type="table"}). Furthermore, in the subgroup of 118 patients treated with CCRT, but not in the 55 who underwent surgical intervention, positive IL-6 staining retained predictive power concerning survival in a multivariate analysis (Tables [7](#T7){ref-type="table"}, [8](#T8){ref-type="table"}). ![**Correlation between IL-6 level and clinical outcome.**Survival differences according to IL-6 positivity for (**a**) all 173 patients, (**b**) patients treated with CCRT and (**c**) patients who underwent pre-operative CCRT and surgery. The IL-6-positive group exhibited shorter survival than the IL-6-negative group.](1476-4598-12-26-6){#F6} ###### Univariate analysis to determine factors associated with prognosis **Variables** **P value for overall survival** **P value for disease-free survival** ------------------------------- ---------------------------------- --------------------------------------- Clinical stage 0.271 0.006\* Tumor resection 0.001\* 0.000\* Positive staining for IL-6 0.000\* 0.000\* Positive staining for p-STAT3 0.000\* 0.000\* Local-regional Recurrence 0.002\* 0.000\* Distant metastasis 0.03\* 0.000\* Treatment response 0.000\* 0.000\* ###### Multivariate analysis to determine molecular markers associated with prognosis (OS) of patients **Variables** **Odd ratios** **95% confidence interval** **p** -------------------------------------- ---------------- ----------------------------- ----------- IL-6 staining 5.319 2.906-9.734 \<0.001\* p-STAT3 staining 0.926 0.529-1.593 0.761 Tumor resection 0.454 0.270-0.762 0.003\* Clinical stage 0.908 0.531-1.551 0.723 Treatment response 2.601 1.583-4.276 \<0.001\* Recurrence and/or distant metastasis 4.172 1.700-10.240 0.002\* ###### Multivariate analysis to determine molecular markers associated with prognosis (DFS) of patients **Variables** **Odd ratios** **95% confidence interval** **p** -------------------- ---------------- ----------------------------- ----------- IL-6 staining 5.424 3.349-8.784 \<0.001\* p-STAT3 staining 0.724 0.465-1.128 0.153 Tumor resection 0.365 0.241-0.553 \<0.001\* Clinical stage 1.655 1.058-2.589 0.027\* Treatment response 3.719 2.135-4.733 \<0.001\* ###### Multivariate analysis to determine factors associated with prognosis (OS) of patients with definite CCRT treatment **Variables** **Odd ratios** **95% confidence interval** **p** -------------------------------------- ---------------- ----------------------------- ----------- IL-6 staining 7.622 3.580-16.226 \<0.001\* p-STAT3 staining 1.032 0.524-2.031 0.928 Clinical stage 0.828 0.409-1.677 0.600 Treatment response 2.327 1.314-4.120 0.004\* Recurrence and/or distant metastasis 4.576 1.292-16.199 0.018\* ###### Multivariate analysis to determine factors associated with prognosis (OS) of patients with pre-op CCRT and surgery **Variables** **Odd ratios** **95% confidence interval** **p** -------------------------------------- ---------------- ----------------------------- --------- IL-6 staining 1.738 0.537-5.622 0.356 p-STAT3 staining 1.152 0.364-3.643 0.810 Clinical stage 0.860 0.332-2.232 0.757 Pathologic CR 1.883 0.518-6.842 0.336 Recurrence and/or distant metastasis 4.205 1.138-15.538 0.031\* Discussion ========== Understanding the molecular mechanisms underlying aggressive tumor growth in esophageal SCC is pivotal to identifying novel targets for pharmacological intervention. Furthermore, clinical data \[[@B2],[@B3],[@B23]\] suggest the need for markers that predict responses to neoadjuvant CCRT and help to identify patients at high risk of tumor recurrence and distant metastasis. However, no suitable markers have been identified to date. The inflammatory cytokine IL-6 contributes to the growth and progression of various malignancies, such as HNSCC, prostate cancer and gastrointestinal cancer, and acts as an autocrine growth factor and an anti-apoptotic factor for various stimuli, including anticancer agents \[[@B11],[@B24]-[@B27]\]. Moreover, the IL-6/STAT3 pathway is important for the development of inflammation-associated intestinal tumorigenesis. Similar to other series \[[@B11],[@B28]\], we found that IL-6 and IL-6R were detected in both esophageal cancer specimens and esophageal carcinoma cell lines. IL-6 expression was higher in esophageal cancer specimens compared with non-malignant tissues. Furthermore, positive staining for IL-6 was associated with higher tumor stage, higher rates of tumor recurrence and distant metastasis. To further investigate whether IL-6 was responsible for aggressive tumor growth in esophageal SCC, we suppressed IL-6 in esophageal cancer cells using a silencing vector. Data obtained from cell and xenograft tumor growth experiments revealed that inhibiting IL-6 resulted in slower tumor growth and reduced invasiveness. The transformation of an epithelial cell into a mesenchymal cell appears to be functionally relevant to the invasive characteristics of epithelial tumors, including esophageal cancer \[[@B19],[@B29],[@B30]\]. At the molecular marker level, EMT is characterized by the loss of E-cadherin and increased expression of invasion-related factors \[[@B31]\]. In cell experiments, the IL-6 silencing vector induced both an increase in E-cadherin levels in esophageal cancer cells, and decreases in MMP-9 levels. Constitutive activation of STAT3 signaling has been reported to contribute to oncogenesis by promoting proliferation and EMT, and IL-6 is a major activator of JAK/STAT3 signaling \[[@B8],[@B32]-[@B34]\]. Therefore, we examined the links between STAT3 activation, IL-6 and EMT. When blocking STAT3 activation by STAT3 siRNA or JAK inhibitor, the decreases in EMT-related protein levels were comparable to those induced by IL-6 silencing vector. Furthermore, IHC data obtained from clinical samples demonstrated that IL-6 expression was significantly correlated with p-STAT3 staining. Therefore, it is likely that STAT3 activation plays a role in transmitting IL-6 signals to downstream targets that regulate EMT and invasiveness. In the present study, IL-6 silencing vectors significantly decreased IL-6 levels seen in the supernatant of cell culture medium and the serum of mice bearing tumors. Moreover, in the clinic, IL-6 serum levels seem to be elevated in a subgroup of patients with local-regional failure or distant metastasis. We assume that circulating IL-6 plays an important role to stimulate tumor growth *in vivo*, besides direct action on malignant cells. Angiogenesis is one of the mechanisms that promote tumor progression, and CD31-mediated endothelial cell-cell interactions are involved in angiogenesis. Moreover, STAT3 activation has been reported to modulate the expression of genes that mediate angiogenesis; *e*.*g*., VEGF \[[@B35]\]. Accordingly, the links between IL-6, angiogenesis, and promotion of cancer in tumor-bearing mice were further investigated using a xenograft tumor model. Our data from animal experiments demonstrated that IL-6 level positively linked with angiogenesis in addition to EMT. These findings indicated that the promotion of EMT changes and angiogenesis mediate the aggressive tumor growth noted in IL-6 expressing esophageal cancer, at least in part. Radiotherapy is a well-established therapeutic modality in oncology. It provides survival benefits in several cancer types, including esophageal cancer. For esophageal SCC, treatment response is an independent prognostic factor. We demonstrated that positive IL-6 staining was significantly associated with a lower response rate after treatment in patients with esophageal SCC. As determined using clonogenic assays and delayed tumor growth, inhibition of IL-6 by transfection of an IL-6 silencing vector increased radiosensitivity. Extensive DNA damage caused by radiation and anti-cancer agents can result in cell death or sensitivity to clinical treatment if left unrepaired \[[@B36]\]. Phosphorylated H2AX is an indicator of double-strand breaks, and its expression after irradiation correlates with treatment sensitivity \[[@B37]\]. Our data demonstrate that inhibition of IL-6 was associated with increased radiation-induced DNA damage and increased cell death. Moreover, the data from xenograft tumors demonstrated that inhibition of IL-6 attenuated angiogenesis and decreased p-STAT3 activation after irradiation. The expression of angiogenic factors is suggested to have predictive value for treatment response and outcome in patients with esophageal cancer \[[@B38],[@B39]\]. Therefore, we suggest activation of STAT3 signaling and angiogenesis after irradiation was reported to be responsible for resistance to treatment and tumor regrowth after irradiation triggered by IL-6. We further examined the predictive power of IL-6 for prognosis in esophageal SCC. Besides a lower response to treatment, enhanced expression of IL-6 was significantly associated with a higher clinical stage, a greater risk of distant metastasis and shorter survival. In a multivariate analysis, IL-6 retained predictive power for OS. These findings indicate that IL-6-positive esophageal cancer provides a suitable microenvironment for the development of tumor growth and treatment resistance mediated by induction of angiogenesis, enhancement of cell mobility, and promotion of EMT. Our data support the emerging notion that IL-6 and p-STAT3 are clinically significant predictors, and suggest that IL-6 may represent a suitable target for esophageal SCC treatment. Competing interests =================== The authors confirm that there are no conflicts of interest that could be perceived as prejudicing the impartiality of the research reported. Authors' contributions ====================== MFC conceived of the study, performed the study and coordination and assisted in editing of manuscript. PTC performed the study and drafted the manuscript. MSL conceived of the study and participated in its design and coordination. PYL helped in histology and IHC staining. WCC conceived part of the study and performed the statistical analysis. KDL participated in its design and coordination. All authors read and approved the final manuscript. Supplementary Material ====================== ###### Additional file 1 Supplementary methods. ###### Click here for file Acknowledgements ================ The work was support by National Science Council, Taiwan. Grant 98-2314-B-182-038-MY2 (to M.F. Chen).
High
[ 0.717423133235724, 30.625, 12.0625 ]
Q: HTML Flex футер к низу страницы Изучаю флекс бокс. я в самом начале.Пытаюсь прижать футер к низу страницы. html { height: 100%; } body { display: flex; flex-direction: column; height: 100%; } .container { height: 100%; } * { margin: 0; padding: 0; } .header { flex: 0 0 auto; } <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Document</title> <link rel="stylesheet" href="style.css"> </head> <body> <div class="container"> <div class="header">ALL MENU</div> <div class="content">HOT SEX</div> <footer class="footer">BOTTOM</footer> </div> </body> </html> И все равно они слеплены вместе вверху. Только если главный див он же контейнер сразу же закрыть,то футер уезжает вниз как положено. Где ошибаюсь?подскажите. A: Вы задаёте flex не тому элементу: * { margin: 0; padding: 0; } html, body { height: 100%; } .container { display: flex; flex-flow: column nowrap; height: 100%; } .content { flex: 1; } <body> <div class="container"> <div class="header">ALL MENU</div> <div class="content">HOT SEX</div> <footer class="footer">BOTTOM</footer> </div> </body>
Low
[ 0.5108225108225101, 14.75, 14.125 ]
Cancer is a major public health problem. It accounts for approximately one quarter of all deaths in the United States, and is the leading cause of death among men and women under 85 years of age. The lifetime probability of developing cancer is 46% for men and 38% for women. Many anti-cancer therapies are plagued by side effects including nausea, emesis, hair loss, fever, and risk of infection. Chemotherapy and radiotherapy both lead to high rates of oral and gastrointestinal (GI) mucositis in treated patients, and these effects can be the dose-limiting toxicities of some treatment modalities. Tumor cells acquire a high level of adaptive heat shock response. The heat shock response is an adaptive mechanism used by all living cellular organisms to survive under the conditions of so-called proteotoxic stress—the condition resulting in accumulation of misfolded proteins, which tend to aggregate leading to cell death due to global protein denaturing triggered by such aggregation. Cells can activate this protective mechanism by inducing synthesis of additional protein chaperones, known as heat shock proteins (HSP). Tumor cell viability may be dependent on heat shock response because they have higher rate of protein misfolding. However, the efficacy of thermotherapy techniques for cancer are limited by the induction of adaptive heat shock response, which can greatly diminish tumor cell sensitivity to treatment and limit the use of thermotherapy and other heat shock modulating treatments. Accordingly, there is a need for improved methods of inducing cell death.
Mid
[ 0.6296296296296291, 34, 20 ]
My vote would be on not introducing additional properties for columns breaks, from an implementation/performance perspective. From a html/css author point of view, I would prefer to not mix up column and pages as it makes it unclear how to use the property. How about mixing it up in the values instead, so instead of having "page-break-<whatever>:<value>" and "column-break-<whatever>:<value>" we would have "break-<whatever>:<page-value>|<column-value>". For example: "break-inside: page", "break-inside:column", "break-inside:any", "break-inside:none", etc. I think this would be less ambiguous to the user as well as allow for an efficient implementation. This is roughly what is already proposed, with the difference that the wording "page-" be removed from the property name and used in the property values instead. Haven't really considered how these properties are used though. Regards, Em2 Solutions AB Michael Jansson HÃ¥kon Wium Lie wrote: > Also sprach Philip TAYLOR: > > > > It should also be noted that using the page-* propoerties to set > > > preferences on columns is not ideal. However, introducing three new > > > properties to describe column behavior seems excessive. > > > > I don't agree. A page is a page and a column is a column. > > Adding "column-break-<whatever>" seems to me to be both > > necessary and sufficient, and /infinitely/ preferable to > > overloading "page-break-<whatever>" as currently proposed. > > To infinity, and beyond! :) > > I can go both ways on this. The current draft is a result of this > discussion: > > http://lists.w3.org/Archives/Public/www-style/2007Dec/0046.html > http://lists.w3.org/Archives/Public/www-style/2007Dec/0053.html > > -h&kon > HÃ¥kon Wium Lie CTO °þe®ª > [email protected] http://people.opera.com/howcome > >
Mid
[ 0.6082949308755761, 33, 21.25 ]
import SwiftUI import MapKit struct MapView { var coordinate: CLLocationCoordinate2D func makeMapView() -> MKMapView { MKMapView(frame: .zero) } func updateMapView(_ view: MKMapView, context: Context) { let span = MKCoordinateSpan(latitudeDelta: 150, longitudeDelta: 150) let region = MKCoordinateRegion(center: coordinate, span: span) view.showsZoomControls = true view.setRegion(region, animated: false) view.removeAnnotations(view.annotations) let annotation = MKPointAnnotation() annotation.coordinate = coordinate view.addAnnotation(annotation) } } #if os(macOS) extension MapView: NSViewRepresentable { func makeNSView(context: Context) -> MKMapView { makeMapView() } func updateNSView(_ nsView: MKMapView, context: Context) { updateMapView(nsView, context: context) } } #else extension MapView: UIViewRepresentable { func makeUIView(context: Context) -> MKMapView { makeMapView() } func updateUIView(_ uiView: MKMapView, context: Context) { updateMapView(uiView, context: context) } } #endif
Mid
[ 0.619385342789598, 32.75, 20.125 ]
This invention relates to the field of electronic telephone devices. Specifically, this invention relates to the field of electronic telephone dialing and answering devices. In recent years telephone answering devices have been commercially available. These devices when connected to a telephone will answer the incoming call with a recorded message and then allow the caller to transcribe a message. These answering units function with a tape recorder device that allows the owner to record a message that is transmitted when an incoming call occurs and also records on magnetic tape the messages from the incoming callers. Repertory dialers have also appeared recently on commercial markets. The repertory dialer allows the user to dial a 7 digit or a 10 digit telephone number by inputting only a 1, 2 or 3 digital number. In other words, the repertory dialer stores specific numbers that are addressable by the user and when accessed by the user will transmit these stored numbers to a telephone device in order to call that number. The disclosed invention combines the functions of the answering device and the repertory dialer in providing the user with an electronic telephone that performs both these functions but does not require the user to record a message to answer incoming calls. Furthermore, this invention allows the user the option to connect certain peripheral devices to phone alerts for fires, for household breakins, and for medical emergencies.
Mid
[ 0.5806451612903221, 33.75, 24.375 ]
A. Field of the Invention This invention relates generally to monitoring systems, and more particularly to systems for automatically monitoring the programs broadcast by commercial television stations. B. Description of the Prior Art Several techniques for monitoring the programs broadcast by commercial television stations are known. The simplest technique involves a human monitor who watches the programs broadcast at a monitoring site and manually logs each program. Automated systems have been developed which employ a "picket fence" code placed in the upper corners of the picture broadcast by the television station which is automatically detected and recorded. Preferably the code is broadcast in such a manner that it is undetectable by the viewer. In prior art systems, this is accomplished by placing the code in a corner of the television field that is not normally visible to the viewer. In other systems, the code is placed in a notch that has been filtered out of the audio spectrum. While these techniques provide a way to monitor the television programs broadcast by commercial television stations, registration problems occur when the bar code is recorded on a photographic medium, and when the code is placed in the audio spectrum, the code can be heard during quiet periods. Furthermore, these systems are generally used only to identify commercials, and are not particularly suitable for monitoring the programs carried by network affiliated television stations to determine whether a network program is being carried. This is because of the large amount of data involved in monitoring a network program line-up, and because no convenient data storage format has been developed to store this data. As a result, the effort required to monitor all of the network affiliated stations and to tabulate the data becomes excessive if more than minimal data about the programs broadcast is tabulated.
Mid
[ 0.55829596412556, 31.125, 24.625 ]
The use of the laryngeal mask airway to facilitate the insertion of a percutaneous tracheostomy. We report the use of the laryngeal mask airway to facilitate the insertion of a percutaneous tracheostomy (Ciaglia kit) in two patients. This method has not been reported previously. We believe that in selected patients the technique described increases the ease of placement of a percutaneous tracheostomy.
High
[ 0.6824408468244081, 34.25, 15.9375 ]
Epinephrine Beginning the lead of pitch four of Epinephrine. Slick but relatively easy chimney with a great handcrack at the back (you can actually climb this lower section as a crack if you prefer). The second from the party ahead of us is beginning the crux section of the pitch where the chimney narrows down and the grovelling begins... (May 22, 2005). But no ticking off Epi. on this trip unfortunately! Mix of reasons but mostly due to attempting this during a heat wave that had hit Vegas and peaked on the day we were trying this. Went thru. 75% of our water atop pitch 4 (out of ~15 pitches). Bailed. Also, next time we'll do the approach in our rock shoes. Hauling my size 16 approach shoes thru. the chimneys is a b*tch!! Too bad - but I'm sure you'll be back. I was reading the page on Epi and it says that the *record* ascent time (roped) is something like 5.5 hours. That gives me some idea how long this climb is! Approach in rock shoes? Ouch! Yes, it was very hot in S. Utah this weekend, too. I can't imagine being out there on the rock, under that desert sun, with no relief. And carrying enough water for a 12 hour climb must be next to impossible under those conditions. This was a hiking/backpacking trip, so no climbing :) Still, we explored an awesome canyon in Grand Staircase, Escalante - Coyote Gulch. It's very popular, but a cool backpack or long dayhike. I'd love to go explore some of the more technical slot canyons. Did a little dayhiking at Bryce, too, before heading back to SLC. My next Utah destination is definitely Moab, Canyonlands, and Arches, though!
Low
[ 0.515873015873015, 32.5, 30.5 ]
Q: want to use polyfill with HTML5 to make date type work in firefox I want to use polyfill with HTML5 to make date type work in firefox. <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width,minimum-scale=1.0, maximum-scale=1.0,user-scalable=no"> <title>better-dateinput-polyfill demo</title> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js" type="text/javascript"></script> <script src="http://cdn.jsdelivr.net/webshim/1.12.4/extras/ modernizr-custom.js"></script> <script src="//cdn.jsdelivr.net/webshim/1.12.4/polyfiller.js"></script> <script> webshims.setOptions('forms-ext', {types: 'date'}); webshims.polyfill('forms forms-ext'); </script> </head> <body> <input type="date" /> </body> </html> I used this answer How to get HTML 5 input type="date" working in Firefox and/or IE 10 and this is demo and it works fine http://jsfiddle.net/trixta/BMEc9/ but this error appears to me ( TypeError: a.support is undefined polyfiller.js (line 1, col 1413 ) A: You need a newer version of jQuery; support() was not added until 1.3: http://api.jquery.com/jquery.support/
Mid
[ 0.6129032258064511, 30.875, 19.5 ]
--- abstract: 'The observed afterglows of gamma ray bursts (GRBs), in particular that of GRB 970228 six months later, seem to rule out relativistic fireballs and relativistic firecones driven by merger or accretion induced collapse of compact stellar objects in galaxies as the origin of GRBs. GRBs can be produced by superluminal jets from such events.' author: - Arnon Dar title: 'CAN FIREBALL OR FIRECONE MODELS EXPLAIN GAMMA RAY BURSTS?' --- INTRODUCTION ============ The isotropy of the positions of gamma ray bursts (GRBs) in the sky and their brightness distribution have provided the first strong indication that they are at cosmological distances (Meegan et al 1992; Fishman and Meegan 1995 and references therein). The recent discovery of an extended faint optical source coincident with the optical transient of GRB 970228 ( Groot et al. 1997; van Paradijs et al. 1997; Sahu et al. 1997) and, in particular, the detection of absorption and emission line systems at redshift z=0.835 (Metzger et al. 1997a,b) in the spectrum of the optical counterpart of GRB 970508, which may arise from a host galaxy (see e.g. Pedersen et al 1997), have provided further evidence that GRBs take place in distant galaxies. The peak luminosity of GRB 970508 in the 0.04-2.0 MeV range exceeded $10^{51}d\Omega~erg~s^{-1}$ (assuming $\Omega\approx 0.2$, $\Lambda=0$ and $H_0\approx 70~km~Mpc~s^{-1}$), where $d\Omega$ is the solid angle into which the emitted radiation was beamed. Such $\gamma$-ray luminosities and their short time variability strongly suggest that GRBs are produced by mergers and/or accretion induced collapse (AIC) of compact stellar objects (Blinnikov et al. 1984; Paczynski 1986; Goodman, Dar and Nussinov 1987), the only known sources which can release such enormous energies in a very short time. Then the gamma rays must be highly collimated and their radius of emission must be large enough in order to avoid self opaqueness due to $\gamma \gamma\rightarrow e^+e^-$ pair production. A sufficient, and probably necessary, condition for this to occur is that they are emitted by highly relativistic outflows with bulk Lorentz factors, $\Gamma=1/\sqrt{1-\beta^2}\gg 100.$ Additional support for their emission from highly relativistic flows is provided by their non thermal energy spectrum. Consequently relativistic fireballs (Cavallo and Rees 1976; Paczynski 1986; Goodman 1986) and relativistic jets (e.g., Shaviv and Dar 1995; Dar 1997) were proposed as the producers of GRBs. The observed radiation may be produced by self interactions within the flow (e.g., Paczynski and Xu 1994; Rees and Meszaros 1994) or by interactions with external matter (e.g. Rees and Meszaros 1992; Meszaros and Rees 1993) or with external radiation (e.g., Shemi 1993; Shaviv and Dar 1995; 1996). Following the discovery of the afterglow of GRBs 970228 various authors have concluded that it supports the fireball model of GRBs (e.g., Katz et al. 1997; Waxman 1997a,b; Wijers et al. 1997; Reichart 1997; Vietri 1997; Rhoads 1997; Sari 1997a; Tavani 1997; Sahu et al 1997a). However, here we show that the detailed observations of the afterglows of GRBs 970111, 970228, 970402, 970508, 970616, 970828, 971214, and in particular that of 970228 six months later (Fruchter et al, 1997), support neither the simple relativistic fireball model (e.g., Meszaros and Rees 1997), nor simple relativistic firecone (conical ejecta) models. However, if the relativistic ejecta in merger/AIC of compact stellar objects is collimated into magnetically confined narrow jets, the major problems of the fireball and firecones models can be avoided and the general properties of GRBs and their afterglows can be explained quite naturally. FAILURES OF SIMPLE FIREBALLS ============================ Energy Crisis ------------- The spherical blast wave models assume (e.g., Meszaros and Rees 1997; Wijers et al 1997) that the ultrarelativistic spherical shell which expands with a Lorentz factor $\gamma=1/\sqrt{1-\beta^2}$ drives a collisionless (magnetic) shock into the surrounding interstellar medium. They also assume that the collisionless shock which propagates in the ISM with a Lorentz factor $\gamma_s=\sqrt{2}\gamma$ accelerates it and heats it up to a temperature $T\approx \gamma m_pc^2$ (in its rest frame). Energy-momentum conservation in the ultrarelativistic limit, which reads $d[(M+nm_p(4\pi/3)r^3)\gamma^i]\approx 0$ with $i=2$, then implies that the bulk Lorentz factor of the decelerating debris (mass $M$) and swept up ISM (ambient density $n$) decreases for large $r$ like $\gamma(r)\sim\gamma(r_0)(r/r_0)^{-3/2}$. In fact, the assumption that a highly relativistic collisionless shock heats up the ISM to a temperature $T_p\approx \gamma m_pc^2$ in its rest frame, has never been substantiated by self consistent magnetodynamic calculations nor by direct observations of radiation from decelerating superluminal jets. For $T_p<m_pc^2$ (or fast cooling) one has $i=1$ and $\gamma \sim r^{-3}$. It is further assumed that superthermal electrons, with a power-law spectrum, $dn_e/dE'\sim E'^{-p}$ and $p\approx 2.5$, in the rest frame of the shocked ISM emit synchrotron radiation with a power-law spectrum $h\nu dn/d\nu'\sim \nu'^{-(p-1)/2}$ (or $\sim \nu'^{-p/2}$ for fast cooling) from an assumed equipartition internal magnetic field. Photons which are emitted with a frequency $\nu'$ in the rest frame of the shocked material and at an angle $cos\theta'$ relative to its bulk motion, are viewed in the lab frame at a frequency $\nu$ and at an angle $\theta$ which satisfy, respectively, (e.g. , Rybicki and Lightman 1979) $$\nu=\gamma(1+\beta cos\theta')\nu'~;~~ tan\theta=sin\theta'/\gamma(\beta+cos\theta').$$ If $\gamma>>1$ and if the photons are emitted isotropically in the rest frame of the shocked material with differential intensity $I_\nu= h\nu'dn/d\nu'$, then in the lab frame they have an angular and spectral distribution $${dI_\nu\over dcos\theta}= {4\gamma^3\over(1+\gamma^2\theta^2)^3} I_{\nu'=\nu(1+\gamma^2\theta^2)/2\gamma}.$$ Thus, a distant observer sees essentially only photons emitted in his direction from radius vectors $r$ with angles $\theta\leq 1/\gamma$ relative to his line of sight (l.o.s.) to the explosion center ($r=0)$. If the emission from the shocked ISM between the expanding debris and the shock front is uniform, then the photon arrival times are $$t\approx {r\over \alpha_ic[\gamma(r)]^2}-{r'\over 2\alpha_ic[\gamma(r')]^2}+ {r\theta^2\over 2c},$$ where $r'\leq r$ is the initial distance of the shocked material from the explosion point and $\alpha_i=2(6/i+1)=14,8$ for $i=1,2,$ respectively. If the photons are emitted mainly from a thin shell behind the shock front then $r'\approx r$ and $$t\approx {r\over 2\alpha_ic[\gamma(r)]^2}+{r\theta^2\over 2c}~.$$ Photons which are emitted from the shock front at $\theta=0$ reach the observer at a time $$t=r/2\alpha_i c\gamma^2~.$$ Neglecting redshift effects, the differential luminosity seen by the observer at time $t$ is obtained by integrating eq. 2 over $r'\leq r$, $r$ and $\theta$, subject to eq. 3 (thick shell) or eq. 2 (thin shell). Because the angular delay dominates eqs. 3 and 4, the emissivity is weighted in the integration by $ 2\pi \theta d\theta$, the integrand peaks at $\theta^2=1/(6-i+p)\gamma^2 $. Substituting that into eq. 4, we find that for thin adiabatic shells ($i=2$) most of the high frequency photons which arrive at time $t$ come from a ring around the l.o.s. whose distance $R$ and Lorentz factor $\gamma(R)$ satisfy eq. 5 with $\alpha_2\approx 3.6$ and $R=0.77R_{max}$, while for thin radiative shells $(i=1)$ we find $\alpha_1\approx 4.9$ and $R \approx 0.84R_{max}$. Very similar results were obtained by Panaitescu and Meszaros (1997) from exact numerical integrations. The relativistic expansion lasts until $\gamma(r)\approx 2$, i.e., $t\approx r/8\alpha_i c$. Since the energy of the swept up material is $\approx(4\pi/3)r^3n\gamma^im_pc^2$, the explosion energy must satisfy $$E\geq 2.7\times 10^{54} n(\alpha_i/[1+z])^3i^2t_y^3~erg,$$ where $n$ is the mean density of the swept up ISM in $cm^{-3}$, $t_y$ is the observer time in years, and $z$ is the redshift of the host galaxy where the explosion took place. (The factor $i^2=4$ for the thick shell/adiabatic expansion case follows from the assumption that the proton and electron temperatures are both $\sim \gamma m_pc^2$). The shape, angular size $(0.8'')$ and magnitude $(V=25.7\pm 0.15)$ of the host nebula of GRB 970228 that were measured by HST between Sep. 4.65 and 4.76 UT ($t_y\approx 0.52$) suggest that it is a galaxy with a redshift $z<1$. For $z=1$, a standard ISM density $n\sim 1~cm^{-3}$, $i=1$ and $\alpha_1\approx 4 $ calculated by Panaitescu and Meszaros (1997) for a thin/radiative shell, eq. 6 yields $E\geq 3\times 10^{54}~erg $. For a thick/adiabatic shell ($i=2$) and $\alpha_2\approx 2$ eq. 6 yields $E\geq 1.5\times 10^{54}~erg$. Such energies, are comparable to the total energy-release in mergers/AIC of compact stellar objects, which is usually less than $\sim M_\odot c^2\approx 1.8\times 10^{54}erg$. Such kinetic energies, however, are larger by orders of magnitude than the maximal plausible kinetic energies of spherical explosions produced by such events. This is because a large fraction of the released energy is radiated in gravitational waves, and neutrino emission is inefficient in driving spherical explosions in gravitational collapse of compact objects. Typically, in core collapse supernovae explosions, the kinetic energies of the debris is about $\sim 1\%$ of the total gravitational binding energy release. NS merger/AIC is not expected to convert a larger fraction of the gravitational binding energy release into kinetic energy of a spherical explosion. First, a large fraction of the binding energy is radiated away by gravitational waves emission, which is relatively unimportant in Type II supernova explosions. Second, neutrino deposition of energy and momentum in the ejecta is less efficient in NS mergers, because it lasts only for milliseconds and because neutrino trapping and gravitational redshift of neutrino energy are stronger than in core collapse supernovae. Indeed, detailed numerical calculations of spherical explosions driven by neutrinos in NS mergers (e.g., Janka and Ruffert 1996; Ruffert et al 1997) produce very small explosion energies. Although the numerical calculations still are far from being full general relativistic three dimensional calculations, let alone their inability to reproduce consistently supernova explosions, probably, they do indicate the correct order of magnitude of the kinetic energy in spherical explosions driven by NS merger or AIC of white dwarfs and NS. The fluence of GRB 970508 was $\geq 10^{52}erg $ in the 0.04-2.0 $MeV$ alone, assuming isotropic emission. If hundred times brighter GRBs, like GRB 970616, have redshifts similar to that of GRB 970508, their fluences must be $\sim 10^{54}~erg$ for isotropic emission. It also cannot be supplied by mergers/AIC of compact stellar objects. Absence of Simple Scaling ------------------------- Relativistic blast wave models predict that GRB afterglows are scaled by powers of their basic parameters: total energy E, initial Lorentz factor $\Gamma$, surrounding gas density $n$, and distance $D$. However, GRBs 970111, 970228, 970402, 970508, 970616, 970828 and 971214 exhibited unscaled behavior and very different spectral properties (for the X-ray observations see Costa et al. 1997; Piro et al., 1997; Castro-Tirado et al 1977; Feroci et al 1977; Heise et al. 1997; Odewahn 1997; Frontera et al 1997; for optical observations see the compilation in Reichart 1997; Sahu et al 1997b; Pedersen et al 1997; and Halpern et al. 1997; A. Diercks et al. 1997; for radio observations see Frail et al 1997b and references therein). For instance, GRB 970111 and GRB 970828 had $\gamma$-ray fluences $\sim$ 25 times larger than GRB 970228 but their afterglow were not detected in X-rays, in the optical band and in the radio band (e.g., Groot et al. 1997b; Frontera et al. 1997). The upper bound on the optical peak response of GRB 970828 was $\sim 10^2,~10^3$ smaller than that of GRB 970228 and GRB 970508, respectively (Groot et al 1997b). GRB 970508 was 6 times weaker in $\gamma$-rays than GRB 970228 (Kouveliotou et al 1997, Hurley et al 1977) but 6 times brighter in the optical band (see, e.g., Sahu et al 1977b and references therein). Such spectral variability is observed in the afterglows of gamma ray flares from extragalactic relativistic jets of blazars and also in flares from galactic relativistic jets of microquasars (galactic superluminal sources) such as GRS 1915+105 (Mirabel and Rodriguez 1994) and GRO J1655-40 (Tingay et al. 1995). Firecone Rescue? ---------------- The radiated energy of GRB 970228 during the afterglow in the 2-10 keV window alone was about 40% of the energy in the gamma burst itself in the 40-700 keV band (Costa et al. 1997). For such a fast cooling, energy-momentum conservation requires $\gamma\sim r^{-3}$, instead of $\gamma\sim r^{-3/2}$ for a slow cooling, which was used to derive the $\sim t^{-3(p-1)/4}$ fading of the X-ray and optical afterglows (Wijers et al. 1997) of GRBs. Also the relation between observer time, emissiom radius and Lorentz factor which was used is not correct. Thus, the only successful prediction of the afterglow model is also in doubt. Moreover, the duration (in months) of the initial power-law fading of the afterglow (thin radiative shell, $i=1$, $\alpha_1\approx 4)$ which last until $\gamma(R)\approx 2$ is $$t_m\approx 1.85 E_{52} ^{1/3}[(1+z)/i^{2/3}\alpha_in^{1/3}]~months,$$ where $E_K=10^{52}E_{52}~erg$ and $n$ in $cm^{-3}$. This short cooling time is already in conflict with the observed $\sim t^{-1.1}$ fading of the afterglow of GRB 970228 over 6 months (Fruchter et al. 1997) if $[E_{52}/n]^{-1/3}\leq 1$, both for thin/radiative and thick/adiabatic shells. Note that GRBs 970228 and 970508 appear within the optical luminous part of the faint host galaxy (Sahu et al. 1997, Fruchter 1997, Metzger et al 1997, Djorgovski et al 1997) where one expects $n\sim 1$. Conical fireballs (“firecones”) with opening angles $\theta_c>1/\Gamma$ and solid angles smaller by $\theta_c^2/4$, can reduce the estimated total energy in $\gamma$-rays and X-rays by a factor $\sim \theta_c^2/4$. As long as $\theta_c>1/\gamma$, fireballs and firecones look alike for observer near the axis of the firecone. But, when $\gamma\theta_c<1$, the beaming efficiency decreases by $\gamma^2\theta_c^2$ and the $\sim t^{-1.1}$ fading of the optical afterglow is accelerated by a factor $\gamma^2\sim t^{-6/(6+i)}=t^{-3/4}$, for thick/adiabatic conical shell. Such a change has not been observed yet in the afterglow of GRB 970228, implying that after six months $\gamma\theta_c>2$. Therefor, firecones cannot solve (by additional factors $<4,~4^{1/3}$ on the r.h.s. of eqs. 6 and 7 , respectively) the energy crisis or explain the uniform power law fading of GRB 970228 for over six months. It can be shown easily that the crisis is larger for observers with larger viewing angles with respect to the firecone axis. Short Time Variability ====================== Even if the energy crisis in GRBs and the non-universality of their afterglows could have been avoided by assuming firecones, i.e. conical shells instead of relativisticly expanding spherical shells, neither firecones nor fireballs can explain subsecond variability in GRBs that last for tens or hundreds of seconds. First, a variable central engine must be fine tuned to arrange for shells to collide only after a distance where the produced $\gamma$-rays are not reabsorbed, which is larger by more than 10 orders of magnitude than the size of the central engine (Shaviv, 1996). Second, even with fine tuning of the central engine, the transverse size of the emitting area whose radiation is beamed towards the observer, $r\theta \leq r/\Gamma$ where $\Gamma\approx \gamma(0)$, implies variability on time scales (e.g., Shaviv 1996; Fenimore 1996) $$\Delta t\sim r\theta^2/2c\approx r/2c\Gamma^2\sim T_{GRB},$$ i.e., comparable to the total duration of the GRB. It is in conflict with the observed short time variability of GRBs. Even GRBs that last more than $100~ s$, show a variability on subsecond time scales, (e.g., Fishman and Meegan 1995). Local instabilities are not efficient enough in producing high intensity pulses. Extended GeV Emission --------------------- The initial Lorentz factor of a relativisticly expanding fireball, which sweeps up ambient matter, decays rather fastly ($t\sim T_{GRB}$) as its energy is shared by the swept up matter. It cannot explain emission of multi GeV $\gamma$-rays, which is extended over hours (in the observer frame) with an energy fluence similar to that in the keV/MeV GRB, as observed in GRB 910503 (Dingus et al. 1994) and in GRB 940217 (Hurley et al. 1994). Note in particular that inverse Compton scattering of GRB photons or external photons by the decelerating debris is not efficient enough in producing the observed extended emission of GeV photons. Also it cannot explain MeV $\gamma$-ray emission that extends over 2 days, which, perhaps, was the case if the cluster of four GRBs (Meegan et al. 1996; Connaughton et al. 1997) were a single GRB. GRBS FROM ACCRETION JETS ======================== Highly collimated relativistic jets seem to be emitted by all astrophysical systems where mass is accreted at a high rate from a disk onto a central (rotating?) black hole. They are observed in galactic and extragalactic superluminal radio sources, like the galactic microquasars GRS 1915+105 (Mirabel and Rodriguez 1994) and GRO J1655-40 (Tingay et al. 1995) and in many extragalactic blazars where mass is accreted onto, respectively, stellar and supermassive rotating black holes. They produce $\gamma$-ray flares with afterglows in the X-ray, optical and radio bands which rise fastly and decline with time like a power-law and have a non-thermal power-law spectra and hardness which is correlated with intensity. Highly relativistic jets probably are ejected also in the violent merger/AIC death of close binary systems containing compact stellar objects. Such jets which are pointing in our direction can produce the cosmological GRBs and their afterglows (Dar 1997b,c). Jetting the ejecta in merger/AIC of compact stellar objects can solve the energy crisis of GRBs by reducing the total inferred energy release in GRBs by the beaming factor $f=\Delta\Omega/4\pi$, where $\Delta\Omega$ is the solid angle into which the emission is beamed. In fact, in order to match the observed GRB rate (e.g. Fishman and Meegan 1995) and the currently best estimates of the NS-NS merger rate in the Universe (e.g. Lipunov et al. 1997) solid angles $\Delta\Omega\sim 10^{-2}$ are required. Such solid angles are typical of superluminal jets from Blazars. The estimated rate of AIC of white dwarfs and neutron stars is much higher, $\sim 1$ per second in the Universe compared with $\sim 1$ per minute for NS-NS mergers. If GRBs are produced by accretion induced collapse of white dwarfs and neutron stars (e.g., Goodman et al 1987; Dar et al 1992), then $\Delta\Omega\sim 10^{-4}$. The FeII and MgII absorption lines and OII emission lines at redshift z=0.835 in the afterglow of GRB 970508 seems to indicate that GRBs are produced in dense stellar regions, e.g. star burst regions. Boosting of stellar light by superluminal jets from merger/AIC in dense stellar regions (with typical size $R\approx 10^{18}\times R_{18}~cm$ and photon column density $N_\gamma=N_{23}\times 10^{23}~cm^{-2}$) has been proposed by Shaviv and Dar (1995; 1997) as the origin of GRBs. It can explain quite naturally the fluence, typical energy, duration distribution, light curves, spectral evolution and afterglows of GRBs. Due to space limitation, here we only demonstrate that it solves the main difficulties of the fireball/firecone models: If the ejected jet (blobs) has an initial kinetic energy $E_k=E_{52}\times 10^{52}~erg$, a Lorentz factor $\Gamma=\Gamma_3\times 10^3$, and a cross section $S_j\approx\pi R_j^2=\pi R_{j16}^2\times 10^{32}~cm^2 $ which after initial expansion remains constant due to magnetic confinement, then: \(a) The photon fluence at a distance $D=D_{28}\times10^{28}~cm$ due to photo absorption/emission by partially ionized heavy atoms (Shaviv 1996) in the jet ($\sigma_a=\sigma_{18}\times 10^{-18}~cm^2$) is $$I_\gamma\approx {\eta E_k\sigma_{T} N_\gamma\over \Gamma m_p c^2 D^2\Delta\Omega} =7\times {\eta_2E_{52}\sigma_{18}N_{23}\over D_{28}^2\Gamma_3\Delta\Omega_2}~\gamma~cm^{-2},$$ where $\eta=\eta_2\times 10^{-2}$ is the fraction of heavy atoms in the jet (we assume a cosmic ray composition). \(b) The typical energy of the emitted (Lorentz boosted) photons and the energy fluence in the observer frame are, respectively, $$E_\gamma\approx {\Gamma_3^2\epsilon_{eV}\over(1+z)}~MeV,$$ where $\epsilon=\epsilon_{eV}\times eV$ is the typical energy of stellar photons, and $$F_\gamma\approx I_\gamma E_\gamma\approx 10^{-5}\times {\eta_2E_{52}\sigma_{18}N_{23}\Gamma_3\epsilon_{eV} \over (1+z) D_{28}^2\Delta\Omega_2}~ erg~cm^{-2}.$$ (c) The typical duration of GRBs and the duration of individual pulses from boosting starlight of bright stars are given, respectively, by $$T_{GRB}\approx {R\over c\Gamma^2}=30 R_{18}\Gamma_3^{-2}~s,~and~~ T_p\approx {R_j\over c\Gamma^2}=0.30 R_{j16}\Gamma_3^{-2}~s.$$ The bimodality of the duration distribution og GRBs (e.g., Fishman and Meegan 1995) has a simple statistical origin (Shaviv and Dar 1997). \(d) Due to energy-momentum conservation, an ejected jet (blob) with a an initial kinetic energy $E_k$, bulk-motion Lorentz factor $\Gamma$ and constant cross section $S_j$ is decelerated by the swept up interstellar matter according to $\gamma=\Gamma/(1+R/R_0)$, or $R=R_0(\Gamma/\gamma-1)$, where $R$ is its propagation distance in the interstellar medium and $R_0=E_k/nm_pc^2\Gamma S_j$. The electrons in the ejecta and the swept up interstellar matter whose total mass increases like $M\sim 1/\gamma$ are accelerated by the jet to a power-law spectrum in the jet rest frame. They emit synchrotron radiation with a power-law spectrum $\nu'dn/d\nu' \sim \nu'^{-(p-1)/2}$ with intensity proportional to their number and to the magnetic energy density. For an observer within the beaming cone, this synchrotron emission is Lorentz boosted and collimated according to eq. 2, i.e., it is amplified by a factor $A\sim \gamma^{3+(p-1)/2}$. Thus, an observer within the beaming cone sees a synchrotron afterglow with intensity $I_{\nu}\sim AB^2M(dt'/dt)$. Since $dt=dt'/2\gamma$ and $t=\int dR/2\gamma^{-2}=(R_0/6c\Gamma^2)[(\Gamma/\gamma)^{-3}-1]$, one obtains for $p=2.5\pm 0.5$ that $$I_\nu\sim \gamma^{3+(p-1)/2} \sim (t+t_0)^{-1.25\pm 0.08}$$ where $t_0=R_0/6c\Gamma^2\approx (E_{52}/n\Gamma_3^3R_{j16}^2)\times 100~s$. Initial expansion of the ejecta, changes in opacity within the jet and along the trajectory of the emitted radiation, and viewing angle effects due to the change in the beaming angle, can produce complex time and wavelength dependences of the afterglow in the initial phase. Moreover, absorption of optical photons, UV photons and X-rays by the interstellar gas and dust around the burst location depends strongly on energy. Gas Column densities $N_{H}\geq 10^{22}~cm^{-2}$, which are also required by the detection of GeV emission from bright GRBs (see below), can explain why some GRBs afterglows which were detected in $X$ rays were not detected also in the optical band. If this explanation for the suppression of optical afterglows of GRBs is correct, then X-ray afterglows of GRBs which are not accompanied by optical afterglows must show harder X-ray spectra than those of GRBs with optical afterglows. Such GRBs must also be accompanied by strong emission of GeV photons. Inhomogeneous ISM and jet instabilities can modify the late time behavior of the afterglows. For instance, if the jet is deflected by a stellar or interstellar magnetic field, the afterglow may disappear suddenly from the field of view (collisions and deflection of jets on scales 10-100 pc were observed in AGN, e.g., Mantovani et al. 1997). \(e) The high column density of gas in star forming regions, $N_{H}=N_{23}\times 10^{23}~cm^{-2}$, with $N_{23}\geq 1$, provides an efficient target for hadronic production of high energy photons via $pp\rightarrow \pi^0 X$ followed by the prompt $\pi^0\rightarrow 2\gamma$ decay. A power-law proton spectrum produces a power-law photon spectrum with the same power index and efficiency (e.g., Dar 1997) $g\sigma_{in}N_{H}$ where $g=10^{-1}\times g_1 =0.195exp[-3.84(p-2)+1.220(p-2)^2]$ and $\sigma_{in}\approx 3\times 10^{-26}~cm^2$ is the $pp$ inelastic cross section. Consequently, GRBs in star forming regions are accompanied by emission of a power-law spectrum of high energy photons with a total fluence $$F(>100~MeV) \approx {E_{52}g_1N_{23}\over D_{28}^2\Delta\Omega_2}{3\over 1+z} \times 10^{-6} erg~cm^{-2},$$ comparable to the GRB fluence in MeV $\gamma$ rays. This is consistent with the detection of GeV photons by the EGRET instrument on board the Compton Gamma Ray Observatory from a handful of bright bursts (see, e.g., Dingus 1995). Given the EGRET sensitivity and limited field of view, the detection rate implies that high energy emission may accompany most GRBs. Finally, significant hadronic production of gamma rays with energy $\sim 18~ GeV$, as observed in GRB 940217, requires incident proton energies $\sim 6$ times larger, i.e., that $\gamma>115$. Consequently, the effective duration of emission of such photons is $$t(E_\gamma<18 GeV)\approx {R_0\over 6c\gamma^2}\approx {E_{52}\over n\Gamma_3R_{j16}^2}\times 2.5h,$$ which is consistent with the EGRET/CGRO observations (Hurley 1994). CONCLUSIONS =========== The observed properties of GRBs and their afterglows, in particular that of GRB 970228 six months later, seem to rule out relativistic fireballs and firecones powered by mergers/AIC of compact stellar objects within galaxies as the origin of GRBs. In spite of their flexibility and multitude of free parameters, the simple fireball and firecone models of GRBs appear not to be able to explain the total energy of GRBs, nor to explain the enormous diversity of GRBs, their short time scale (subsecond) variability, their spectral evolution, the delayed emission of MeV and GeV $\gamma$-rays in some GRBs, and the spectral versatility of GRB afterglows. In order to solve these problems, the single relativistic spherical shell which expands into a uniform medium must be replaced by a fine tuned series of asymmetric shells (conical ejecta) which expand into a nonuniform medium (e.g., Meszaros et al 1997). This adds many new parameters to the “fireball” model which can be adjusted to fit any GRB and rescue the model. However, this increased flexibility through a multitude of new adjustable parameters makes the modified relativistic fireball/firecone models too flexible, without predictive power and unfalsifyable, and therefor scientifically unacceptable. However, if the relativistic ejecta in merger/AIC of compact stellar objects is collimated into highly relativistic jets, most of the problems of the spherical fireball models can be avoided and the general properties of GRBs and their afterglows can be explained quite naturally using the observed properties of superluminal jets from blazars and microquasars. In particular, if GRBs are produced by highly relativistic jets which are pointing in our direction they should show superluminal motions with speeds $v\leq \Gamma c$. Such supeluminal motions may be detected in long term (months) VLBI observations of radio afterglows of GRBs (see, e.g., Taylor et al. 1997). Blinnikov, S. I. et al. 1984 SvA. Lett. 10, 177 Castro-Tirado, A. J. et al. 1997, IAU Circ. 6657 Cavallo, G. & Rees, M. J., 1978, MNRAS, 183, 359 Connaughton, V. et al 1997, to be published Costa, E. et al. 1977a, Nature, 387, 783 (1997) Costa, E. et al. 1997b, IAU Circs. 6572, 6576, 6649 Costa, E. et al. 1997c, preprint astro-ph/9706065 Dar A., et al. 1992, ApJ, 388, 164 Dar, A., 1997a, in [*Very High Energy Phenomena In The Universe*]{} (ed. Y. Giraud-Heraud and J. Tran Thanh Van, Editions Frontieres 1997) p. 69 Dar, A. 1997b, submitted to ApJ. Lett. (astro-ph/9704187). Dar, A. 1997c, submitted to Phys. Rev. Lett. (astro-ph/9708042). A. Diercks et al. 1997, IAU Circ. 6791 Dingus, B. et al. 1994, AIP Conf. Proc. 307, 22 Dingus, B. 1995, Ap. & Sp. Sc. 231, 195 Djorgovski, S. G. et al., Nature, 1997, 387, 876 Djorgovski, S. G. et al. IAU Circs. 6655, 6658, 6660 Fenimore, E. E. 1977, preprint astro-ph/9705028 Feroci, M. [*et al.*]{} 1997, IAU Circ. 6610 Fishman G. J. & Meegan, C. A. A., 1995, Ann. Rev. Astr. Ap. 33, 415 Frail, D. A., & Kulkarni, S. R. 1997a, IAU Circ. 6662 Frail, D. A. et al. 1997b, Nature, 389, 261 Fruchter, A. et al. 1977, Circ. 6747 Goodman, J. 1986, ApJ, 308, L47 Goodman, J., Dar, A. & Nussinov, S., 1987, ApJ, 314, L7 Groot, P. J. et al. 1997a, IAU Circ. 6660 Groot, P. J. et al. 1997b, preprint astro-ph/9711171 Halpern, J. et al. 1997, IAU Circ. 6788 Heise, J. et al. 1997, IAU Circ. 6610 Hurley, K. et al. 1994, Nature, 372, 652 Janka, H. T. & Ruffert, M. 1996, A&A, 307, L33 Katz, J. I. et al. 1997, preprint astro-ph/9703133 Kouveliotou, C. et al. 1977, IAU Circ. 6600 Lipunov et al. 1997, MNRAS, 288, 245 Mantovani, F. et al 1997, preprint astro-ph/9712084 Meegan, C. A. A. et al. 1992, Nature, 355, 143 Meegan, C. A. A. et al. 1996, IAU Circ. 6518 Meszaros, P. & Rees, M. J. 1993, ApJ, 405, 278 Meszaros, P. & Rees, M. J. 1997, ApJ, 476, 232 Meszaros, P., Rees, M. J. & Wijers, R. A. M. J., 1997, preprint astro-ph/9709273 Metzger, M. R. et al. 1997a, IAU Circ. 6676 Metzger, M. R. et al. 1997b, Nature, 387, 878 Mirabel, I. F. & Rodriguez, L. F. 1994, Nature, 371, 46 Odewahn, S. C. et al. 1997 IAU Circ. 6735 Paczynski, B. 1986, ApJ, 308, L43 (1986); Paczynski, B. & Rhoads, J. 1993, ApJ, 418, L5 Paczynski, B. & Xu, G. 1994, ApJ, 427, 708 Panaitescu, A. and Meszaros, P. preprint astro-ph/9709284 Pedersen, H. et al. 1997, Submitted to Ap. J., preprint astro-ph/9710322 Piro, L. et al. 1997, IAU Circs. 6656, 6617 Rees, M. J. & Meszaros, P.. 1992, MNRAS, 258, 41P Rees, M. J. & Meszaros, P. 1994, ApJ, 430, L93 Reichart, D. E. 1997, ApJ, 485, L57 Rhoads, J. E. 1997, preprint astro-ph/9705163 Ruffert, M. et al. 1997 A&A, 319, 122 Rybicki, G. B. & Lightman, A. P. 1979, [*Radiative Processes in Astrophys.*]{} Sahu, K. C. et al. 1997a, Nature, 387, 476 Sahu, K. C. et al. 1997b, Astro-ph/9706225 Sari, R. 1997a, preprint astro-ph/9706078 Shaviv, N. J. 1995, Ap. & Sp. Sc. 231, 445 Shaviv, N. J. 1996, Ph.D Thesis, Technion Report Ph-96-16, (unpublished). Shaviv, J. N. & Dar, A. 1995, ApJ, 447, 863 Shaviv, J. N. & Dar, A., 1997, in [*Neutrinos, Dark Matter and The Universe*]{}, eds. T. Stolarcyk et al. (Editions Frontieres 1997) p. 338. Shemi, A., 1994, MNRAS, 269, 1112 Tavani, M. 1997, ApJ, 483, L87 Taylor, G. B. et al. 1997, Nature, 389, 263 Tingay, S. J., et al. 1995, Nature, 374, 141 van Paradijs, J. et al., 1997, Nature, 386, 686 Vietri, M. 1997, ApJ, 478, L1 Waxman, E. 1997a, ApJ, 485, L5 Waxman, E. 1997b, preprint astro-ph/9705229 Wijers, R. et al. 1997, MNRAS, 288, L5
High
[ 0.6569920844327171, 31.125, 16.25 ]
Q: Empty gridlines in android gridview? I want a gridview with empty grid lines as follows Here is what i got till now, gridview with gridlines in the occupied cells only. I want gridlines in empty cells also. Is this possible? A: I'm almost positive a GridView was never intended for this, so you have two options. -Write your own GridView that supports a defaulted view. OR -If this is not a dynamic view that is changing all the time in real time: In your adapter, set a minimum in your getCount method (return Math.max(actualSize, minimumCount)). And set the views with no data to your empty boxes. Make sure the count is always some mod of 4 to ensure each row will be filled beyond that. That's just what I'm coming up with on the top of my head, there's most likely a better way to do it, but hopefully I'm moving you in the right direction.
Mid
[ 0.644908616187989, 30.875, 17 ]
Embedded academic writing support for nursing students with English as a second language. This paper reports a study which evaluated a brief, embedded academic support workshop as a strategy for improving academic writing skills in first-year nursing students with low-to-medium English language proficiency. Nursing students who speak English as a second language have lower academic success compared with their native English-speaking counterparts. The development of academic writing skills is known to be most effective when embedded into discipline-specific curricula. Using a randomized controlled design, in 2008 106 students pre-enrolled in an introductory bioscience subject were randomized to receive either the intervention, a 4-day embedded academic learning support workshop facilitated by two bioscience (content) nursing academics and a writing and editing professional, or to act as the control group. The primary focus of the workshop was to support students to work through a mock assignment by providing progressive feedback and written suggestions on how to improve their answers. Of the 59 students randomized to the intervention, only 28 attended the workshop. Bioscience assignment results were analysed for those who attended (attendees), those randomized to the intervention but who did not attend (non-attendees), and the control group. Using anova, the results indicated that attendees achieved statistically significantly higher mean scores (70.8, sd: 6.1) compared to both control group (58.4, sd: 3.4, P = 0.002) and non-attendees (48.5, sd: 5.5, P = 0.001). A brief, intensive, embedded academic support workshop was effective in improving the academic writing ability of nursing students with low-to-medium English language proficiency, although reaching all students who are likely to benefit from this intervention remains a challenge.
High
[ 0.6697674418604651, 36, 17.75 ]
BROADSHEET/COMPACT PRESSBOX Last updated : 26 January 2006 By Ed THE GUARDIAN Edwin van der Sar's duties extended well beyond goalkeeping on the night Sir Alex Ferguson's team booked a Carling Cup final against Wigan Athletic. Both clubs should be grateful for Manchester United's goalkeeper preventing television cameras filming the disorder that took place inside the tunnel at half-time, with Robbie Savage inevitably at the epicentre. The absence of any incriminating evidence will leave the Old Trafford crowd - and the Football Association - with little but educated guesswork about the clashes. After Rio Ferdinand deliberately barged into Savage, the Blackburn midfielder pursued him down the tunnel, followed by nearly every other player plus the substitutes, several coaches and every steward in the vicinity. The stampede was reminiscent of Turkey's World Cup qualifier against Switzerland in November, except nobody had the presence of mind in Istanbul to block out the cameras. A fractious night extended to the post-match interviews, with Blackburn's manager Mark Hughes complaining bitterly about Graham Poll. "Some referees enjoy the celebrity status a bit too much," he said. "I think Graham Poll was under the impression that 61,000 people came here to see him." His anger stemmed from Poll's decision to award a 42nd-minute penalty after Ruud van Nistelrooy flicked the ball against Zurab Khizanishvili's hand. The excellent Brad Friedel saved Van Nistelrooy's effort but Hughes was still smouldering with injustice at the end, not least because Ferdinand had escaped punishment for a carbon-copy incident. "There were decisions like that all night," he said. "There needed to be a balance but we never got that and we're very upset." But when the dust settled Sir Alex Ferguson was entitled to say the better side had won over the two legs. These are strange times when the Carling Cup is regarded at Old Trafford with dewy-eyed fondness. To Ferguson it used to be a nuisance in an already congested fixture list. These days he cannot be so choosy and there was jubilation at the final whistle. Out of the Champions League before most people had finished their Christmas shopping and 14 points adrift in the Premiership, he will need a trophy if he is to get a favourable end-of-season verdict from the Glazers. He will get his chance in Cardiff on February 26. "We deserve to go through," he said. "Blackburn made us work hard and they made the referee work hand, but we got there and I'm delighted." THE INDEPENDENT Wild celebrations greeted another slender Manchester United victory at Old Trafford last night although this time Gary Neville was a model of decorum as the home supporters and Sir Alex Ferguson reacted to confirmation of a place in the Carling Cup Final as though their futures rested on it. In many respects, of course, it did. The elevation of the Carling Cup in United's list of priorities emphasises the diminishing returns for Ferguson, but having heralded the competition as "a great opportunity to mark this season as a successful one" the performance of his team against a Blackburn Rovers side low on strikers but high on endeavour proved the 64-year-old Scot still has the capacity to leave his players hanging on his every word. United shone only in parts yet fought for the right to face Wigan in the all-Lancashire final throughout the semi-final second leg, though perhaps too literally during the interval. While goals from Ruud Van Nistelrooy and Louis Saha secured their date at the Millennium Stadium, several of their players, notably Rio Ferdinand, could be set for an appearance before the FA's disciplinary committee after an alleged brawl involving, surprise, surprise, Blackburn's Robbie Savage on the way down the Old Trafford tunnel. Though both managers attempted to downplay the incident afterwards, and in fairness they were still out on the pitch while every outfield player sprinted to take part in a melée witnessed by hundreds of supporters, the sight of two shadow-boxing ball-boys near the entrance to the dressing rooms gave the game away. "As he was on his way to the dressing room, Rio clipped Robbie," said the Rovers manager Mark Hughes. "I don't know why he did it, but there was no need. Robbie then asked him why he had done it and everyone else ran in just to make sure nothing happened." Television evidence, which was not replayed by Sky, could yet prove if that was the case. Should the FA launch an investigation into what occurred, then it should not overlook the contribution of referee Graham Poll towards the simmering passions of the players, especially those of a Blackburn hue. The Tring official harshly penalised Zurab Khizanishvili for deliberate handball inside his own penalty area two minutes before the break, and then allowed Ferdinand to escape with a similar offence in the second half, but it was the decision not to punish Van Nistelrooy for venting the frustration of seeing his spot-kick saved by Brad Friedel on the heels of Steven Reid and into the back of Savage that left the visitors enraged. THE TIMES Long gone are the days when Manchester United could afford to treat the League Cup with disdain. On the pitch and in the stands they celebrated their passage to the final against Wigan Athletic on February 26 with a zeal that they once reserved for Europe. In these impoverished times, Sir Alex Ferguson will take any trophy he can get his hands on and so will his players, to judge from their approach throughout a fiercely contested semi- final tie that almost boiled over when Rio Ferdinand and Robbie Savage clashed in the Old Trafford tunnel at half-time. A classic cover-up operation meant that reports of the incident were sketchy, with the gestures of an excitable ball-boy about the only indication that any punches had been thrown, but the decisive blow on the pitch came from Louis Saha, who scored his fifth goal in the competition this season early in the second half. Earlier, Ruud van Nistelrooy had restored United’s aggregate lead and had a penalty saved by the excellent Brad Friedel. Blackburn worked hard, but, missing the injured Craig Bellamy, they lacked quality in attack and had only a goal from Steven Reid to show for their efforts. Over the two legs, United did enough to merit their place at the Millennium Stadium and would have won comfortably but for the heroics of Friedel in the Blackburn goal. As against Liverpool on Sunday, they ultimately made light of a shortage of quantity as well as quality in midfield, Ryan Giggs having limped off after 13 minutes with a hamstring injury. Ferguson knows that the present position, with Paul Scholes, John O’Shea and Quinton Fortune out, is not tenable and he hinted at signing a midfield player on loan, with the latest targets rumoured to be Johan Vogel, of AC Milan, as well as Thomas Gravesen, of Real Madrid. THE TELEGRAPH On a Burns Night as fiery as any whisky from the Western Isles, the country's most famous Scot, Gordon Brown included, steered Manchester United to the 13th final of his reign. These days League Cups are no mere trinkets at Old Trafford and last night Sir Alex Ferguson saw Manchester United deliver an impassioned display that, but for Brad Friedel's brilliance, would have seen them settle matters long before the final whistle. They had too much pace and too much skill for a hard-working but essentially leaden Blackburn side crucially deprived of Craig Bellamy. Sometimes, as when Rio Ferdinand and Robbie Savage clashed in the tunnel during the interval, there was a surfeit of emotion but if the Wigan chairman, Dave Whelan, did not receive the final with his former club, Blackburn, he dreamed of, then one against Manchester United would serve almost as well. For Hughes, the night's great irony was that having produced a series of remarkable saves to keep United at bay, including from a penalty, Friedel should have conceded the second to what was essentially a miskick from Louis Saha. It was quite an eventful first half for Ruud van Nistelrooy, who scored, missed a penalty and was possibly fortunate to be on the pitch for the second half, having flattened Steven Reid with one tackle and pushed Savage to the floor, which began the sequence of events that led to the tunnel brawl. When he returned after the interval, the Dutchman produced a header from six yards that forced Brad Friedel into one of the saves of the season, reacting brilliantly to push it clear. Savage, who had put Wayne Rooney in a headlock in the first leg at Ewood Park, made rather more of Van Nistelrooy's challenge than was necessary and as he walked off with Rio Ferdinand the England defender appeared to say something and then sprinted for the dressing room. Savage, showing a rather more nifty turn of speed than he had during most of the tie, sprinted after him, followed by the rest of the teams. Thankfully, given what happened when Arsenal visited, nobody appears to have been armed with pizza.
Low
[ 0.528384279475982, 30.25, 27 ]
Königslutter Königslutter am Elm is a town in the district of Helmstedt in Lower Saxony, Germany. Geography It is located on the northeastern slopes of the Elm hill range, within the Elm-Lappwald Nature Park, about east of Brunswick, west of the district capital Helmstedt, and south of Wolfsburg. The town has access to the Brunswick–Magdeburg railway at the Königslutter railway station, served by Regionalbahn trains to Brunswick and Helmstedt, and is traversed by the Bundesstraße 1 federal highway. The Bundesautobahn 2 runs about north of the town centre. Königslutter is a stop on the German Timber-Frame Road (Deutsche Fachwerkstraße) tourist route. In its current form, the township with about 16,000 inhabitants was created in a 1974 administrative reform by joining the following 18 municipalities: Beienrode Boimstorf Bornum am Elm Glentorf Groß Steinum Klein Steimke Königslutter Lauingen Lelm Ochsendorf Rhode Rieseberg Rotenkamp Rottorf Scheppau Schickelsheim Sunstedt Uhry History A village called Lûtere in the Duchy of Saxony was first mentioned in an 1135 deed, when Emperor Lothair III established a Benedictine monastery here, centered on the Sts Peter and Paul Church, a prominent Romanesque basilica where he and his consort Richenza of Northeim as well as his son-in-law, the Welf duke Henry the Proud are also buried. The place was named after the nearby karst spring of the Lutter (from Middle High German: lauter, "pure") stream in the Elm hills. A water castle was erected around 1200 and in 1318 the surrounding settlement was documented as a market town. Around 1400 the Dukes of Brunswick granted the citizens of Luttere town privileges. From the late 14th century onwards, the place was called Konnigesluttere, referring to late Emperor Lothair III, King of the Romans. Located on the trade route from Brunswick to Magdeburg (the present-day Bundesstraße 1), beer brewing and Elm limestone mining and cutting were its main industries in early modern times, while the monastery developed as a pilgrimage destination. Not until 1924, the monastery complex and the adjacent settlement of Oberlutter were incorporated into the town. The monastery church is known for its sculptural art and the tomb of the emperor. Politics Seats in the town's assembly (Rat) as of 2011 local elections: Christian Democratic Union (CDU): 15 Social Democratic Party of Germany (SPD): 14 Free Voters: 2 Free Democratic Party (FDP): 1 Alliance 90/The Greens: 1 In 2013 the assembly has voted to enter in merger negotiations with neighbouring Wolfsburg. Mayors Since November 2011 Alexander Hoppe (SPD) is the mayor of Königslutter. Former mayors: Walter Lüders (1948–1949) Friedrich Schmook (1949–1953) Karl Köhler (1953–1954) Friedrich Schmook (1954–1956) Karl Köhler (1956–1968) Otto Schwarzbach (1968–1972) Frieda Fricke (1972–1973) Gustav Uhde (1973–1974) Helmut Albrecht (1974–1976) Alfred Küchenthal (1976–1981) Helmut Albrecht (1981–1986) Alfred Küchenthal (1986–1996) Arnulf Baumann (1996–2001) Margot Albrecht (2001–2002) Ottomar Lippelt (2002–2011) Alexander Hoppe (since 2011) Twin towns Königslutter is twinned with the following towns: Gommern, Germany, since 1990 Taunton, England, since 1992 Opalenica, Poland, since 1998 Notable people Werner Schrader (1895–1944), teacher, officer and resistance fighter against the Nazi regime Samuel Hahnemann (1755–1843), physician and pioneer of homeopathy, who lived in Königslutter from 1796 to 1799 Thilo Maatsch (1900–1983), Bauhaus artist, spent his retirement here Notes External links Official site Category:Helmstedt (district) Category:Burial sites of European royal families Category:Burial sites of the House of Süpplinburger Category:Duchy of Brunswick
Low
[ 0.514161220043573, 29.5, 27.875 ]
ESE-1 inhibits the invasion of oral squamous cell carcinoma in conjunction with MMP-9 suppression. Matrix metalloproteinases (MMPs) regulated by ets transcription factors facilitate carcinoma cell invasion. An ets family member, ESE-1, is expressed specifically in epithelial tissues, but its association with MMPs is obscure. In this study, we investigated whether ESE-1 regulates invasion of oral squamous cell carcinoma (SCC) via transcriptional activity of MMP-9. HSC-3 and KB were used as human oral SCC lines. The expression of ESE-1 and MMP-9 was detected by in situ hybridization and immunohistochemistry. Invasion assay, gelatin zymography and Northern blotting were used to detect the invasion activity, the gelatinolytic activity and the expression of MMP-9 in the ESE-1 transfectants. Luciferase assays and mutation analysis were used for the transcriptional analysis of MMP-9 promoter region by ESE-1. ESE-1 was expressed in the intermediate layer but not in the invasive area, in which MMP-9 was expressed, in the oral SCC tissues. ESE-1 suppressed invasion activity and 92 kDa gelatinolytic activity in HSC-3 as a result of transfection. ESE-1 regulates MMP-9 expression in a negative manner and the ets binding site on the MMP-9 promoter contributed to suppression by ESE-1. These findings indicate that ESE-1 negatively regulates the invasion of oral SCC via transcriptional suppression of MMP-9.
High
[ 0.664886515353805, 31.125, 15.6875 ]
Computers have come a long way since the Apple II, with important improvements to both hardware and software. But along the way, a few valuable computing aspects were lost. A recent ITworld.com story looks at features that lost the evolutionary war: "… there are some things they don't do that the old, slow, often command-line-intead-of-GUI-oriented applications did." The first page of the story focuses on the losses associated with the transition from a command-line interface (CLI) to a graphical user interface (GUI). One consultant laments the loss of programmable function keys and other shortcuts that extended keyboards once offered. These features were never available to the Apple II user, but I can commiserate with the need for shortcuts that don't require a pointing device. My first six years as a Macintosh predominantly took the form of a laptop (a PowerBook 1400cs) with an external trackball (an ADB Kensington TurboMouse). That trackball had four buttons that could be programmed for a variety of custom functions, such as right-clicking or switching applications. My right hand rarely strayed from that device, as it was impossible to use Mac OS Classic without it. After switching to Mac OS X on December 7, 2003, I began to rely less and less. I found this reinvention of the Macintosh operating system featured keyboard-based shortcuts that I'd previously used the TurboMouse for. Now, I could switch windows, applications, and more while keeping my hands on the keyboard. In this way, OS X is actually a bit more similar to the Apple II with which I grew up. Navigating Microsoft Word will never be as intuitive or efficient as using AppleWorks, but it's a bit closer. With all my Macs having always been portable, it's important for such power to be inbuilt, though I imagine those with desktop computers might enjoy the options such a stable position brings. For example, Andrew Plotkin, in an interview with The Setup (the same site that previously interviewed Bert Kersey), recommended the Matias Tactile Pro 3 keyboard, saying, "If your typing doesn’t sound like a hailstorm on a tin roof, you’re not typing." (This is despite the keyboard being connected to a MacBook Pro; says Plotkin, "I essentially never move it — I’m not a laptop person at heart.") As a former or current Apple II user, by what input device or method do you prefer to navigate your modern computer? Is there particular hardware you favor or recommend?
Mid
[ 0.6269315673289181, 35.5, 21.125 ]
With questions over whether Steven Gerrard’s current role for Liverpool is the right one, Ben Twelves takes a look at the captain’s future on the pitch. So far this season, the midfield area of the Liverpool team has been a big talking point among supporters. The debate has centred on a number of things but mainly on who should or perhaps more to the point – who shouldn’t occupy the midfield shirts – as well as the lack of balance and why a new, more dynamic, midfielder didn’t arrive in the summer transfer window. The lack of mobility in central midfield is the main cause for concern while others point to the fact that we don’t have a tough tackling and energetic ‘ball winner’ in the middle of the park to compliment the technically gifted midfielders we have at our disposal. These concerns have led to calls for a re-shuffle of the midfield and have also seen Brendan Rodgers, as well as midfield duo Lucas Leiva and Captain Steven Gerrard, come in for criticism over their athletic limitations. Regarding the captain, “Play him in his proper position – the number 10 role”, “Keep him where he is” and “Drop him from the starting team completely!” are all phrases that I have read and heard in discussions over where Gerrard should feature for Liverpool, with the odd shout thrown in claiming that he’s only played on reputation. So with the number of options that are available, where is now best for Steven Gerrard in the Liverpool team? The Deep-Lying Role Since Brendan Rodgers arrived at Anfield, Gerrard has been deployed in a deeper midfield than normal, where he has started the play by collecting the ball from the back four, or now back three, and starting Liverpool’s attacking play. He has the ability to play short and long passes to feet, finding those in the more advanced and dangerous areas and as a result can dominate the ball something Rodgers desires from his teams. With his mobility admittedly on the decline, the problem for me is that with Lucas alongside him, Gerrard doesn’t have the necessary athleticism to compliment him in his role. This would be improved with preferably Jordan Henderson in centrally alongside Gerrard and Lucas dropped from the starting team. Steven at 33 years of age is still more mobile around the park than a 26 year old Lucas Leiva, who looks like injuries are getting the better of him unfortunately. That is the problem. Playing the holding role has allowed Gerrard to remain fit and indeed, without shoulder surgery at the end of last season, has started every Premier League game under Rodgers. The Number 10 Role When I think about Steven Gerrard’s performances on the pitch for us, the first thing that comes into my head is how good he was in the number 10 role where he played as the second striker, just off Fernando Torres. Season 08/09 where Rafa came so close to clinching the league title saw Gerrard in devastating form scoring 16 league goals and 24 in all competitions from this position. It’s because of just how good he was in that role that voices have asked for him to be moved back there but I agree with Brendan in that it is no longer Gerrard’s strongest position and Gerrard is no longer the answer there. He doesn’t have the same explosive drive that he did four years ago that saw opposing players desperately try to hang to him as he breezed past them, nor does he have the same power in his legs to constantly burst forward with the ball. The blunt truth for those still calling for him to move to his ‘best’ position is that Gerrard is no longer dynamic enough to play that role. He now lacks the explosiveness and doesn’t have the intricacy in our system to play there. The real problem: Saving Steven One thing that I feel does need addressing with Gerrard however, is the way he is currently being managed. Playing him game in game out is only going to contribute to quicker burnout of our ageing captain and therefore, his ability to get around the pitch will only suffer further. Rodgers has played Steven every game religiously, despite him seemingly needing rest and I feel the manager has left Gerrard open for a certain amount of criticism as his performance rate drops and his fatigue increases. A lot of supporters would welcome Steven being managed in a way that would allow him to be fully competitive for each game that he is then chosen to feature and we have the options with Joe Allen, Jordan Henderson to allow this to happen. Playing Stevie every game is no longer the right thing to do and I’m very surprised that Rodgers has done so. He doesn’t have to play every game and he doesn’t have it in him to be able to do so either, without hindering the teams’ and his own performance. The Verdict: Steven Gerrard still does have a lot to offer Liverpool Football Club on the pitch and claims that he is picked on reputation are unfair. It doesn’t come down to sentiment at all. The fact is, Steven Gerrard is still a quality footballer who does have a role in the system – the one he is currently in; the deep-lying one. All that needs to change to improve the midfield is the personnel alongside him.
Mid
[ 0.540305010893246, 31, 26.375 ]
Radical prostatectomy for carcinoma of the prostate. Morphologic features of prostatic adenocarcinoma in the radical prostatectomy (RP) specimen are powerful prognostic indicators for prognosis for disease-free survival. This review discusses the methods of sampling of the RP specimen to optimize the detection of these morphologic features, balanced against the added expense of submitting the entire gland for sectioning. Gleason grade, one of the most powerful prognostic factors, is discussed briefly, including the percent pattern 4/5 cancer compared to the standard Gleason grading. Pathologic stage, as defined by the TNM system, is discussed in detail, both in terms of precise histological definition of each category, as well as the associated prognostic implications. Surgical margin status is also important prognostically across all pathologic stages categories. Perineural invasion, which has been used diagnostically in prostate cancer for several decades, has emerged as a very important prognostic indicator as well, as determined by the quantitative aspects of tumor in the perineural space. The effect of tumor volume on prognosis is discussed, as well as the newer concepts of the prognostic significance of zone of origin of the tumor and the presence or absence of intraductal carcinoma.
Mid
[ 0.6497461928934011, 32, 17.25 ]
“An investigation is needed because the suicide rate continues to climb despite 43 million Americans taking antidepressants. The suicide doesn't have to be from a drug overdose; CCHR is looking at what chemically may contribute to a person committing self-harm.” Celebrity suicides prompt urgency to warn of ineffective or adverse treatment effects By CCHR International The Mental Health Industry Watchdog June 21, 2018 Coinciding with the recent tragic suicides of celebrities Anthony Bourdain and Kate Spade, the U.S. Centers for Disease Control and Prevention (CDC) reported the suicide rate in the U.S. jumped 30 percent from 2000 to 2016.[1] In light of such high-profile suicides, there are, naturally, calls for “more effective treatments” for depression. However, Citizens Commission on Human Rights (CCHR) International, a mental health industry watchdog, warns that these calls can include demands for more antidepressants without investigating how these and other treatments may be a potential cause of, or contributing factor in, suicides. CCHR cited how psychiatric drug prescriptions, including sedatives, antidepressants, psycho-stimulants and antipsychotics, increased 117 percent from 1999 to 2013 and, during that same time period, the CDC had reported the suicide rate had increased 24 percent.[2] Within three years, that figure is now 30 percent. A CDC survey also found the number of Americans who took an antidepressant over the past month — despite 49 official psychiatric drug warnings of the adverse effects of self-harm, suicide or suicidal thoughts[3] — rose by 65 percent between 1999 and 2014.[4] Fashion designer Ms. Spade was taking medication for her depression, while it’s unknown whether chef-turned-TV-host Mr. Bourdain was taking any psychotropic medication, although he was seeing a therapist in 2016 that featured in scenes of his show “Parts Unknown.” Whether or not there was a psychotropic drug involved, it should be incumbent upon health authorities in light of their tragedies, and with any suicide, to investigate if and what treatments were administered, CCHR says. This includes the potential for adverse withdrawal effects if a person stops taking psychotropic drugs, for example. CCHR says such an investigation is needed because the suicide rate continues to climb despite 43 million Americans taking antidepressants.[5] The suicide doesn’t have to be from a drug overdose; CCHR is looking at what chemically may contribute to a person committing self-harm. Often prescribed to treat depression, a 2018 study published in Frontiers in Psychiatry concluded that “antidepressants are largely ineffective and potentially harmful.” Lead researcher Michael P. Hengartner at the Zurich University of Applied Sciences in Switzerland conducted a thorough literature review focusing on randomized, controlled trials — the gold standard of evidence-based recommendation. Hengartner cited evidence that the likelihood of relapse is also correlated with duration of treatment. That is, the more one takes an antidepressant, the likelier one is to have another episode of depression. For those taking antidepressants under the age of 24, a black box FDA label warning of suicidal side effects from the use of antidepressants is included. But a 2016 review of clinical trial data published by the Royal Society of Medicine determined “antidepressants double the occurrence of events in adult healthy volunteers that can lead to suicide and violence.”[6] Studies also link psychiatric drug withdrawal effects to suicide. Post-withdrawal symptoms from antidepressants “may last several months to years” and include disturbed mood, emotional lability [excessive emotional reactions and frequent mood changes] and irritability, according to a study in Psychotherapy and Psychosomatics in 2012.[7] British psychiatrist Joanna Moncrieff and others reported in The Journal of Psychoactive Drugs, “It is now accepted that all major classes of psychiatric medication produce distinctive withdrawal effects which mostly reflect their pharmacological activity.”[8] After 30 years of the new “miracle” SSRI antidepressants, psychiatrists now say that for at least a third of those taking them, the drugs don’t “work.” In one study, psychiatrists admitted the failure rate to be as high as 46 percent. Research confirms that antidepressants may not be effective at all. In a 2014 study, Irving Kirsh, associate director of the Program in Placebo Studies at Harvard Medical School, stated, “analyses of the published data and the unpublished data that were hidden by drug companies reveals that most (if not all) of the benefits [of antidepressants] are due to the placebo effect.”[9] In February 2018, a study published in Lancet, asserting the opposite, had been conducted by researchers with strong financial ties to the pharmaceutical industry, CCHR reports. Of the 522 trials in their analysis, 409 were funded by pharmaceutical companies. Because of antidepressant ineffectiveness, today, an antipsychotic — normally limited to treat severe psychosis or “schizophrenia”— can be prescribed as an “add-on” to the antidepressant — mindless of any adverse chemical reaction this may cause. Glen Spielmans, Ph.D., a researcher and associate professor of psychology at Metropolitan State University in St. Paul, conducted a review of 14 previous randomized clinical trials in which the combined use of an antidepressant and an antipsychotic were compared to the use of an antidepressant with a placebo. “In terms of quality of life and how well people were functioning, there was really not much evidence that these drugs did anything,” said Spielmans.[10] A 2017 Journal of Clinical Psychiatry study found non-response rates with first- and second-line antipsychotics as high as 25% and 83%, respectively. CCHR further warns that when these drugs not only fail but potentially worsen or harm the individual, electroconvulsive therapy — shock treatment, using up to 460 volts of electricity — is often administered. A 2017 comprehensive review of 89 studies on electroconvulsive therapy since 2009 found none proved it effective and that maintenance ECT involved participants being on “medication” again following the ECT.[11] In one Norwegian study of 120 patients, 56 (47 percent) who were described as having shown improvement after the first ECT series suffered a relapse in the first six months. A total of 86 (72 percent) suffered a relapse after an average of 13 months. After the first ECT series, 84 patients (70 percent) received antidepressants and/or lithium, while 87 of 100 received ECT again and within another six months, 58 (67 percent) relapsed again.[12] A Review of ECT studies in 2010 and again in 2017 also reported that there was no evidence, of any kind, in support of the theory that ECT prevents suicide.[13] Thousands are supporting a petition calling for a ban on the ECT device. Click here to read and sign the petition. Jan Eastgate, the president of CCHR International, who has twice testified before the Food and Drug Administration on this issue, said the term “treatment resistant depression” is “disingenuous and misleading, implying fault on the part of the patient or his or her ‘disease’ rather than treatment failure and damage. It’s a terrible injustice to the consumer who, desperate for relief, can give up hope, unaware of the influence a drug, withdrawal from it or electroshock may be having on their thinking.” More public information is needed, she said, which is why CCHR maintains a Psychiatric Drug Side Effects Database for people to become better informed until such time as governments investigate the correlation between treatment and suicide. References: [1] “The US suicide rate has increased 30% since 2000 — and it tripled for young girls,” Business Insider, 15 June 2018, https://www.msn.com/en-us/health/wellness/the-us-suicide-rate-has-increased-30-25-since-2000-e2-80-94-and-it-tripled-for-young-girls/ar-AAyCArX. [2] “Psychiatric Medications Kill More Americans than Heroin,” Rehabs.com, 5 Jan. 2016, citing: MEPS (Medical Expenditure Panel Survey) database, https://www.rehabs.com/pro-talk-articles/psychiatric-medications-kill-more-americans-than-heroin/; Sally C. Curtin, M.A., Margaret Warner, Ph.D., and Holly Hedegaard, M.D., M.S.P.H., “Increase in Suicide in the United States, 1999-2014,” NCHS Data Brief No. 241, Apr. 2016, https://www.cdc.gov/nchs/products/databriefs/db241.htm. [3] “Psychiatric Drugs: Create Violence & Suicide,” Citizens Commission on Human Rights International, March 2018, p. 5, https://www.cchrint.org/pdfs/violence-report.pdf. [4] Laura A. Pratt, Ph.D., Debra J. Brody, M.P.H., and Qiuping Gu, M.D., Ph.D., “Antidepressant Use Among Persons Aged 12 and Over: United States, 2011-2014,”Centers for Disease Control and Prevention, Aug. 2017, https://www.cdc.gov/nchs/products/databriefs/db283.htm. [5] IQVia Total Patient Tracker (TPT) Database, Year 2017, Extracted April 2018. [6] Andreas Ø Bielefeldt, et al., “Precursors to suicidality and violence on antidepressants: systematic review of trials in adult healthy volunteers,” Journal of the Royal Society of Medicine, October 2016, Vol. 109, No. 10, p. 381, http://jrs.sagepub.com/content/109/10/381.full; Stephan Barlas, ” FDA Adds Young Adults to Black Box Warnings on Antidepressants,” Psychiatric Times, I June 2007, http://www.psychiatrictimes.com/addiction/fda-adds-young-adults-black-box-warnings-antidepressants. [7] “Patient Online Report of Selective Serotonin Reuptake Inhibitor-Induced Persistent Post-withdrawal Anxiety and Mood Disorders,” Psychotherapy and Psychosomatics, 19 Jan. 2012, https://www.karger.com/Article/FullText/341178. [8] Joanna Moncrieff, M.B.B.S., David Cohen and Sally Porter, “The Psychoactive Effects of Psychiatric Medication: The Elephant in the Room,” J Psychoactive Drugs, Nov. 2013; 45(5): 409-415, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4118946/; Smitha Bhandari, “Treatment-Resistant Depression,” Web M.D., 23 June 2017, https://www.webmd.com/depression/guide/treatment-resistant-depression-what-is-treatment-resistant-depression#1. [9] Irving Kirsch, “Antidepressants and the Placebo Effect,” NCBI, 2014, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4172306/; The Harvard Catalyst, https://connects.catalyst.harvard.edu/profiles/display/Person/96221. [10] Traci Pederson, “Adding Antipsychotic Meds to Antidepressant Shows Risk, Little Benefit,” Psych Central, https://psychcentral.com/news/2013/03/14/adding-antipsychotic-meds-to-antidepressants-shows-risk-little-benefit/52597.html; John Lally, James H. MacCabe, “Antipsychotic medication in schizophrenia: a review,” British Medical Bulletin, 1 June 2015, pp. 169-179, https://academic.oup.com/bmb/article/114/1/169/246291. [11] John Read and Chelsea Arnold, “Is Electroconvulsive Therapy for Depression More Effective Than Placebo? A Systematic Review of Studies Since 2009,” Ethical Human Psychology and Psychiatry, Volume 19, Number 1, 2017, http://www.ingentaconnect.com/content/springer/ehpp/2017/00000019/00000001/art00002. [12] Kjell Martin Moksnes, “Relapse following electroconvulsive therapy,” Tidsskr Nor Legeforen 2011; 131: 1991doi: 10.4045/tidsskr.10.1349, https://tidsskriftet.no/en/2011/10/relapse-following-electroconvulsive-therapy [13] Op cit., John Read and Chelsea Arnold, “Is Electroconvulsive Therapy for Depression More Effective Than Placebo?”
Mid
[ 0.652849740932642, 31.5, 16.75 ]
Does the ICC Statute Remove Immunities of State Officials in National Proceedings? Some Observations from the Drafting History of Article 27(2) of the Rome Statute Following oral hearings held in September, the Appeals Chamber of the International Criminal Court (ICC) is currently deliberating in Jordan’s Appeal of the Pre-Trial Chamber’s decisionholding that it had failed to cooperate with the ICC by refusing to arrest and surrender Sudan’s President, Omar Al-Bashir, when he visited Jordan. Central to the determination of whether Jordan, a party to the ICC Statute, failed to comply with its obligations of cooperation under the Statute is the issue of whether Jordan was obliged to respect the immunity ratione personae that the Sudanese President would ordinarily be entitled to as a serving head of state. As is well known, when the ICC seeks to exercise its jurisdiction over a state official who ordinarily possesses immunity under international law from foreign criminal jurisdiction, the question of immunity may, potentially, arise at two levels. First, the issue of international law immunity with respect to the ICC may possibly arise at the so-called ‘vertical level’, i.e in the relations between the ICC, on the one hand, and the accused person and his or her state, on the other. The question that arises here is whether the accused person (as a state official entitled to international law immunities) or his or her state, may plead those immunities before the ICC itself, such as to prevent the Court from exercising jurisdiction over him or her. Second, and more commonly, the issue of immunity will arise at the so-called ‘horizontal level’, i.e in the relations between a state that is requested by the ICC to effect an arrest or surrender, on the one hand, and the state of the accused person, on the other. Here, the question is whether a state that is requested by the ICC, to arrest or surrender the official of another state, may do so, where to do so would require the requested state to violate the immunities that the foreign state official ordinarily possesses under international law. In particular, the question at this horizontal level is whether there is something about the ICC’s request for cooperation that would mean that the obligations which a state ordinarily owes to another to consider inviolable the person of a serving foreign head of state no longer apply. This is the main question that the Appeals Chamber is called upon to resolve in the Bashir case. In this post, we do not propose to examine the range of arguments put to the Chamber on this question. Rather this post will consider one specific question that is critical to the Court’s assessment and to the more general question of how the ICC Statute affects the immunity of state officials. The post considers whether the provision of the Rome Statute that removes immunity – Art. 27(2) – only removes immunity at the ‘vertical level’ (before the Court itself) or whether it does so at the ‘horizontal level’ (before national authorities) as well. In particular, the post throws new light on this question through an examination of the drafting history of that provision. Consideration of the drafting history shows that the drafters of the provision considered, throughout the period of elaboration of the Statute, that what would become Art. 27 was to have effect not just in proceedings before the ICC itself but also in national proceedings related to the ICC’s exercise of jurisdiction. It will be recalled that the principal argument made by the Office of the Prosecutor in the Jordan Appeal is that SC Resolution 1593, which referred the situation in Darfur, Sudan, to the ICC, had the effect of imposing the removal of immunity contained in Art. 27(2) on Sudan. This argument, to which we subscribe (and which one of us set out in full in 2009and the other elaborated upon more recently on this blog) had been accepted by the Pre-Trial Chamber in the Jordanand South Africaproceedings in the Bashir Case (for brief consideration of the evolution of the views of the ICC Pre-Trial Chambers with respect to immunity, see this recent AJIL Unbound piece). The argument proceeds on the basis that the removal of immunity contained in Art. 27(2) of the ICC Statute does not only operate at the horizontal level but also removes immunity at the ‘vertical level’ before national courts and national authorities. One of us has previously (see this 2003 AJIL article (pp. 419-426) and this 2009 JICJ article (pp. 337-339)) set out arguments as to why this is so. That strand of the argument was also accepted in the Jordan and South African Pre- Trial Chamber decisions. This post addresses just this latter strand of the argument and does not address the question of the effect of the Security Council resolutions on immunity. Article 27(2) provides that: “Immunities or special procedural rules which may attach to the official capacity of a person, whether under national or international law, shall not bar the Court from exercising its jurisdiction over such a person.” The view that Article 27 removes immunities, not just before the ICC itself, but also with respect to action taken by national authorities, where those authorities are acting in response to a request by the Court has been put forward for a number of reasons. Those reasons derive support from the rules of treaty interpretation to be found in Art. 31 of the Vienna Convention on the Law of Treaties. First, there is the argument that follows from the text of Art. 27(2). Where national authorities give effect to immunity as a reason for not arresting or surrendering someone subject to a request for cooperation by the Court, the immunity would indeed “bar the Court from exercising its jurisdiction over such a person.” (See South Africa Pre-Trial Chamber, para. 74). Second, there is the argument that is derived from the principle of effectiveness. To read Art. 27(2) as applying only to immunity before the Court would render at least one part of that provision completely meaningless and other parts practically meaningless. The reference to immunity under ‘national law’ will be completely meaningless since international tribunals do not apply national law. Furthermore, because the Court has no independent powers of arrest and must rely on national authorities, a proclamation that immunities shall not bar the exercise of jurisdiction by the Court while leaving such immunities intact with respect to arrests by national authorities would mean that the Court would hardly be in a position to apply Article 27 and exercise its jurisdiction. This is because the ICC would not gain custody of persons entitled to immunity except where such persons are surrendered by their state (in which case their immunity would be waived and Article 27 would be irrelevant) or through voluntary surrender. This would confine Article 27 to the rare case where a person entitled to immunity surrendered voluntarily, in which case the person is unlikely to claim immunity. The third reason for interpreting Art. 27 as applying to the vertical level is that the effect of the contrary argument would be to make an important provision directed at combating impunity inoperable for most practical purposes. As the Pre-Trial Chamber noted in the South African decision, reliance on immunities to deny cooperation with the court would create an insurmountable obstacle to the Court’s ability to exercise its jurisdiction and “[s]uch a situation would clearly be incompatible with the object and purpose of article 27(2) of the Statute [para. 75].” Fourth, the practice of at least some parties to the ICC Statute, in legislation implementing their obligations under the Statute, suggests that they view Article 27 as removing immunity not only at the stage where the defendant is before the Court, but also at the national level. A number of states have adopted domestic implementing legislation which implicitly or explicitly take the view that officials of other states may not be entitled to international law immunity from arrest when a request for arrest has been made by the ICC. [See the list from this 2009 JICJ article, n. 19, with reference to legislation by Canada, New Zealand, UK, Switzerland, Malta, South Africa, Croatia, Trinidad & Tobago, Ireland, Samoa, Estonia and the Commonwealth’s Model on Implementation of the Rome Statute.] If, after considering these rules of interpretation that are to be found in Art 31 of the VCLT, ambiguity remains as the scope of Art. 27(2), Art. 31 of the VCLT provides that recourse may be had to the drafting history. When one digs into the travaux préparatoiresof this provision, three important findings emerge. First, several earlier versions of Article 27(2) had a slightly different, but clearer wording: “Any immunities or special procedural rules attached to the official capacity of a person, whether under national or international law, may not be relied upon to prevent the Court from exercising its jurisdiction in relation to that person.” (emphasis added) (see, e.g. here, at p. 4; here, at p. 22; here, at pp. 54-55; and here, at p. 51) This text seems to indicate that not only are states parties precluded from relying on immunities before the ICC itself, but also on any other immunities, before domestic or international courts, that would otherwise prevent or bar the Court from exercising its own jurisdiction. In other words, the immunity exception did not just cover immunities from the ICC’s own jurisdiction, but also any other immunities or procedural rules that would somehow prevent the Court from exercising this jurisdiction. We are mindful that several reasons might have justified the change in the wording of this provision. However, there is no record of controversy or debate between the drafters surrounding the content or the text of what later became Article 27(2). Indeed, the discussion of the content of this provision was left to the drafting committee in charge of Part 9 on judicial cooperation with the Court (See Otto Triffterer and Christoph Burchard ‘Article 27 Irrelevance of official capacity’ in Otto Triffterer and Kai Ambos (eds), Rome Statute of the International Criminal Court: A Commentary (Beck/Hart 2016), at p. 1048). This suggests that there was indeed a relationship between Articles 27(2) and 98. It also seems to indicate that the content of Article 27(2) did not change between its first and second versions. Secondly and relatedly, the preparatory works reveal that, from the moment of inclusion of what was to become Article 27(2) in the Draft Statute, the drafters were already mindful of the relationship that existed between the removal of immunity provided for in that provision, and the provisions setting out the Court’s cooperation regime. In fact, the following footnote is found in various documents containing the earlier formulation of Article 27(2): That footnote would be meaningless if what became Art. 27(2) was to have effect only before the ICC itself, and would have no impact on immunities before domestic authorities in the context of the cooperation regime. That footnote seems to be indication of the drafters’ view that what became Art. 27(2) would have some effect on the cooperation regime and on national authorities. This point is significant because some have argued that Art. 27(2) cannot be seen has having an effect at the horizontal level (i.e before national authorities) because that is a matter that deals with cooperation but Art. 27 is not in Part 9 of the ICC Statute dealing with state cooperation. Thirdly, even after what was to become Article 27(2) gained its final wording during the Rome Conference itself in June 2018, the drafters were still mindful of the impact of this provision on the possible exercise of domestic jurisdiction by states. After adoption of this text by the Drafting Committee of the Rome Conference, a new footnote was added explaining that: “The Drafting Committee will re-examine this text after receiving from the Committee of the Whole the provisions on complementarity, in order to determine whether the present provision overrides or is subject to the principle of complementarity.” (see here) As is well known, complementarity has to do with the primary role of states and their domestic courts in the prosecution of conduct amounting to the international crimes which are subject to the Court’s jurisdiction. Thus, the reference to complementarity chiefly implies a concern with states’ own domestic jurisdiction over those crimes. Significantly, in the context of Article 27(2) of the Statute, a reference to ‘overriding’ or being ‘subject to’ complementarity could mean that the removal of immunity contained in that provision also applied to states and their domestic courts, either to allow them to exercise their own domestic jurisdiction, with primacy over the ICC, or to allow the Court to take over the case. These materials to be found in the drafting history provide a picture indicating that the drafters of Art. 27(2) always considered that this provision would have some effect at the national level, at least in the contexts of cooperation by states. When this reference to the drafting history is combined with methods of treaty interpretation, they provide strong support for the view that for those states that are bound by Article 27(2), the provision does not merely operate at the ‘vertical level’ (removing immunity before the ICC), but also at the ‘horizontal level’ (removing, before national authorities of states parties, the immunity of those states bound by the Statute).
High
[ 0.6878453038674031, 31.125, 14.125 ]
Decreased serum levels of carboxylesterase-2 in patients with ovarian cancer. Carboxylesterase-2 has been identified as the key enzyme in the metabolic activation ofirinotecan, a topoisomerase I inhibitor commonly used in the treatment of many solid tumors. Previous studies have shown that carboxylesterase-2 is down-regulated in colorectal cancer following progression of the disease. However, very limited information is available on carboxylesterase-2 expression in ovarian cancer. The aim of the present study was to detect the serum level and the tissue expression of carboxylesterase-2 in human ovarian cancer patients at different stages of the disease. Carboxylesterase-2 levels in the serum of ovarian cancer patients were investigated by western blot and ELISA and in the tumor mass of ovarian cancer patients by western blot. Both the serum carboxylesterase-2 level and the expression of carboxylesterase-2 in tumor tissues were significantly different among patients at different stages of the disease (n = 40). No positive correlation was found between the serum carboxylesterase-2 level and the cancer antigen 125 level (n = 40). Serum carboxylesterase-2 is more sensitive than cancer antigen 125 in detecting the early stage patient with ovarian cancer. Our results indicate that serum carboxylesterase-2 level might be a potential marker in the diagnosis of the early stage ovarian cancer.
High
[ 0.696569920844327, 33, 14.375 ]
Transparency and disclosure, neutrality and balance: shared values or just shared words? Values influence choice of methodology and thus influence every risk assessment and inference. To deal with this inescapable reality, we need to replace vague and unattainable calls for objectivity with more precise operational qualities. Among qualities that seem widely valued are transparency (openness) and neutrality (balance, fairness). Conformity of researchers to these qualities may be evaluated by considering whether their reports disclose key information desired by readers and whether their methodology encourages initial neutrality among hypotheses of concern. A case study is given in which two authors appearing to share these values and writing on ostensibly the same issues (disclosure and methodology) nonetheless appear to have very different concepts of what the values entail in practice. Thus, more precision is needed in explicating and implementing such values.
High
[ 0.670025188916876, 33.25, 16.375 ]
Antibacterial effects of iron oxide (Fe3O4) nanoparticles: distinguishing concentration-dependent effects with different bacterial cells growth and membrane-associated mechanisms. Nowadays, the influence of nanoparticles (NPs) on microorganisms attracts a great deal of attention as an alternative to antibiotics. Iron oxide (Fe3O4) NPs' effects on Gram-negative Escherichia coli BW 25113 and Gram-positive Enterococcus hirae ATCC 9790 growth and membrane-associated mechanisms have been investigated in this study. Growth specific rate of E. coli was decreased, indicating the bactericidal effect of Fe3O4 NPs. This inhibitory effect of NPs had a concentration-dependent manner. The reactive oxygen species together with superoxide radicals and singlet oxygen formed by Fe3O4 NPs could be the inhibition cause. Fe3O4 NPs showed opposite effects on E. hirae: the growth stimulation or inhibition was observed depending on NPs concentration used. Addition of NPs altered redox potential kinetics and inhibited H2 yield in E. coli; no change in intracellular pH was determined. Fe3O4 NPs decreased H+-fluxes through bacterial membrane more in E. coli than in E. hirae even in the presence of DCCD and increased ATPase activity more in E. hirae than in E. coli. Our results showed that the Fe3O4 NPs demonstrate differentiating effects on Gram-negative and Gram-positive bacteria likely due to the differences in bacterial cell wall structure and metabolic peculiarities. Fe3O4 NPs of different concentrations have no hemolytic (cytotoxic) activity against erythrocytes. Therefore, they can be proposed as antibacterial agents in biomedicine, biotechnology, and pharmaceutics.
High
[ 0.665116279069767, 35.75, 18 ]
[Change in the functional state and tissue oxidative processes of the pancreas under the influence of alcoholic intoxication]. Experiments conducted with albino rats demonstrated that intragastrically introduced ethyl alcohol in a dose of 3 g/kg intensifies the external-secretary function of the pancreas and also increases the activity of the pancreatic juice amylase in the blood, this activity continuing to be elevated 24 hours after a single introduction of the alcohol. The action of the latter reduces the oxygen tension and the redox potential in the glandular tissue, lessens the activity of NAD-dependent dehydrogenases occurring against the background of the succinate-cytochrome-c-oxydoreductase complex activity, which bears evidence to the development of "hypoxy-like" shifts in the metabolic stade of the pancreas. The author concludes that the toxic action of alcohol on the pancreas is associated with disturbances in the redox processes and with the damage of cellular membranes.
Mid
[ 0.634517766497461, 31.25, 18 ]
Introduction ============ Neurons convey information by means of electrical signals. Due to intrinsic properties of neuronal networks (e.g., conduction delays, balance between excitation and inhibition, membrane time constants), these electrical pulses give rise to large-scale periodic fluctuations of the background electric potential, which constitute the brain "rhythms" and oscillations (Buzsaki, [@B9]). Some oscillations -- like the "alpha" rhythm at 8--13 Hz can be seen with the naked eye on an electro-encephalographic trace (Berger, [@B4]), while others require sophisticated analysis methods or recordings with a higher signal-to-noise ratio (using intra-cerebral probes in animals and, more rarely, in humans). There are many theories implicating brain oscillations in the performance of particular cognitive functions such as perception (Eckhorn et al., [@B20]; Gray et al., [@B31]; Engel et al., [@B23]; Singer and Gray, [@B79]; von der Malsburg, [@B99]), attention (Niebur et al., [@B62]; Fell et al., [@B26]; Womelsdorf and Fries, [@B103]), consciousness (Koch and Braun, [@B48]; Gold, [@B30]; Engel and Singer, [@B24]), and memory (Lisman and Idiart, [@B52]; Klimesch, [@B45]; Kahana et al., [@B43]). There are also flurries of experimental studies supporting (and sometimes, invalidating) these theories based on electrophysiological measurements of brain activity (Revonsuo et al., [@B72]; Tallon-Baudry et al., [@B81], [@B82]; Fries et al., [@B28]; Jensen et al., [@B42]; Gail et al., [@B29]; Ray and Maunsell, [@B70]). It is somewhat less ordinary, on the other hand, to investigate the consequences of brain oscillations using psychophysical techniques. Yet one major prediction of the above-mentioned theories is directly amenable to psychophysical experimentation: indeed, an oscillatory implementation at the neuronal level should imply that the relevant cognitive function fluctuates periodically, and such fluctuations should be measurable with standard (or slightly more sophisticated) experimental psychology techniques. The purpose of this article is to review some of the psychophysical techniques that have been applied recently to the study of brain oscillations. In so doing, we will touch upon two classical debates in perception research. First, scientists have long theorized that oscillations could divide the continuous sequence of inputs feeding into our perceptual systems into a series of discrete cycles or "snapshots" (Pitts and McCulloch, [@B66]; Stroud, [@B80]; Harter, [@B32]; Allport, [@B1]; Sanford, [@B74]), but this idea is far from mainstream nowadays; we refer to this debate as "discrete vs. continuous perception" (VanRullen and Koch, [@B94]). Second, there is another long-standing debate known as "parallel vs. sequential attention": does attention concentrate its resources simultaneously or sequentially when there are multiple targets to focus on? Though this discussion is generally disconnected from the topic of brain oscillations, we will argue that it is in fact germane to the previous question. The sequential attention idea -- which has traditionally been the dominant one -- originated with the assumption that high-level vision cannot process more than one object at a time, and must therefore shift periodically between the stimuli (Eriksen and Spencer, [@B25]; Treisman, [@B84]; Kahneman, [@B44]), just like our gaze must shift around because our fovea cannot fixate on multiple objects simultaneously. Interestingly, sequential attention theories require a (possibly irregular) cyclic process for disengaging attention at the current target location and engaging it anew. It is easy to see -- although little noticed in the literature -- that discrete perception is merely an extension of this idea, obtained by assuming that the "periodic engine" keeps running, even when there is only one stimulus to process. This connection between the two theories will be a recurring thread in the present narrative. Of course, the primary source of evidence about these topics is (and should remain) based on neurophysiological recordings, which provide direct measurements of the neuronal oscillations. For example, we have recently reviewed our past EEG work on the perceptual correlates of ongoing oscillations, with a focus on linking these oscillations to the notion of discrete perception (VanRullen et al., [@B90]). Another example is a recent study in macaque monkeys revealing that oscillatory neuronal activity in the frontal eye field (FEF, a region involved in attention and saccade programming) reflects the successive cycles of a clearly sequential attentional exploration process during visual search (Buschman and Miller, [@B8]). In this review we focus on purely psychophysical methods, not because they are better than direct neurophysiological measurements, but because they also inform us about psychological and perceptual consequences of the postulated periodicities. However, due to the inherent temporal limitations of most psychophysical methods, it should be kept in mind that in practice this approach is probably restricted to the lower end of the frequency spectrum, i.e., oscillations in the delta (0--4 Hz), theta (4--8 Hz), alpha (8--14 Hz), and possibly beta (14--30 Hz) bands. Higher-frequency oscillations (e.g., gamma: 30--80 Hz) may still play a role in sensory processing, but they are generally less amenable to direct psychophysical observation. There exist many psychophysical paradigms designed to test the temporal limits of sensory systems but that do not directly implicate periodic perception or attention, because their results can also be explained by temporal "smoothing" or integration, in the context of a strictly continuous model of perception (Di Lollo and Wilson, [@B15]). These paradigms are nonetheless useful to the discrete argument because they constrain the range of plausible periodicities: for example, temporal numerosity judgments or simultaneity judgments indicate that the temporal limit for individuating visual events is only around 10 events per second (White et al., [@B101]; Lichtenstein, [@B51]; White, [@B100]; Holcombe, [@B35]), suggesting a potential oscillatory correlate in the alpha band (Harter, [@B32]). We will not develop these results further here, focusing instead on paradigms that unequivocally indicate periodic sampling of perception or attention. Similarly, although some psychophysical studies have demonstrated that perception and attention can be entrained to a low-frequency rhythmic structure in the stimulus sequence (Large and Jones, [@B49]; Mathewson et al., [@B56]), we will only concentrate here on studies implicating *intrinsic* perceptual and attentional rhythms (i.e., rhythms that are not present in the stimulus). We will see that progress can be made on the two debates of discrete vs. continuous perception and sequential vs. parallel attention by addressing them together rather than separately. Rhythmic Sampling of a Single Stimulus: Discrete vs. Continuous Perception {#s1} ========================================================================== Suppose that a new stimulus suddenly appears in your visual field, say a red light at the traffic intersection. For such a transient onset, a sequence of visual processing mechanisms from your retina to your high-level visual cortex will automatically come into play, allowing you after a more or less fixed latency to "perceive" this stimulus, i.e., experience it as part of the world in front of you. Hopefully you should then stop at the intersection. What happens next? For as long as the stimulus remains in the visual field, you will continue to experience it. But how do you know it is still there? You might argue that if it were gone, the same process as previously would now signal the transient offset (together with the onset of the green light), and you would then recognize that the red light is gone. But in-between those two moments, you did experience the red light as present -- did you only fill in the mental contents of this intervening period after the green light appeared? This sounds unlikely, at least if your traffic lights last as long as they do around here. Maybe the different stages of your visual system were constantly processing their (unchanged) inputs and feeding their (unchanged) outputs to the next stage, just in case the stimulus might happen to change right then -- a costly but plausible strategy. An intermediate alternative would consist in sampling the external world periodically to verify, and potentially update, its contents; the period could be chosen to minimize metabolic effort, while maximizing the chances of detecting any changes within an ecologically useful delay (e.g., to avoid honking from impatient drivers behind you when you take too long to notice the green light). These last two strategies are respectively known as continuous and discrete perception. The specific logic of the above example may have urged you to favor discrete perception, but the scientific community traditionally sides with the continuous idea. It has not always been so, however. In particular, the first observations of EEG oscillations in the early twentieth century (Berger, [@B4]), together with the simultaneous popularization of the cinema, prompted many post-war scientists to propose that the role of brain oscillations could be to chunk sensory information into unitary events or "snapshots," similar to what happens in the movies (Pitts and McCulloch, [@B66]; Stroud, [@B80]; Harter, [@B32]). Much experimental research ensued, which we have already reviewed elsewhere (VanRullen and Koch, [@B94]). The question was never fully decided, however, and the community\'s interest eventually faded. The experimental efforts that we describe in this section all result from an attempt to follow up on this past work and revive the scientific appeal of the discrete perception theory. Periodicities in reaction time distributions -------------------------------------------- Some authors have reasoned that if the visual system samples the external world discretely, the time it would take an observer to react after the light turns green would depend on the precise moment at which this event occurred, relative to the ongoing samples: if the stimulus is not detected within one given sample then the response will be delayed at least until the next sampling period. This relation may be visible in histograms of reaction time (RT). Indeed, multiple peaks separated by a more or less constant period are often apparent in RT histograms: these multimodal distributions have been reported with a period of approximately 100 ms for verbal choice responses (Venables, [@B98]), 10--40 ms for auditory and visual discrimination responses (Dehaene, [@B14]), 10--15 ms for saccadic responses (Latour, [@B50]), 30 ms for smooth pursuit eye movement initiation responses (Poppel and Logothetis, [@B67]). It must be emphasized, however, that an oscillation can only be found in a histogram of post-stimulus RTs if each stimulus either evokes a novel oscillation, or resets an existing one. Otherwise (and assuming that the experiment is properly designed, i.e., with unpredictable stimulus onsets), the moment of periodic sampling will always occur at a random time with respect to the stimulus onset; thus, the peaks of response probability corresponding to the recurring sampling moments will average out, when the histogram is computed over many trials. In other words, even though these periodicities in RT distributions are intriguing, they do not unambiguously demonstrate that perception samples the world periodically -- for example, it could just be that each stimulus onset triggers an oscillation in the motor system that will subsequently constrain the response generation process. In the following sections, we present other psychophysical methods that can reveal perceptual periodicities within *ongoing* brain activity, i.e., without assuming a post-stimulus phase reset. Double-detection functions -------------------------- As illustrated in the previous section, there is an inherent difficulty in studying the perceptual consequences of ongoing oscillations: even if the pre-stimulus oscillatory phase modulates the sensory processing of the stimulus, this pre-stimulus phase will be different on successive repetitions of the experimental trial, and the average performance over many trials will show no signs of the modulation. Obviously, this problem can be overcome if the phase on each trial can be precisely estimated, for example using EEG recordings (VanRullen et al., [@B90]). With purely psychophysical methods, however, the problem is a real challenge. An elegant way to get around this challenge has been proposed by Latour ([@B50]). With this method, he showed preliminary evidence that visual detection thresholds could fluctuate along with ongoing oscillations in the gamma range (30--80 Hz). The idea is to present two stimuli on each trial, with a variable delay between them, and measure the observer\'s performance for detecting (or discriminating, recognizing, etc.) both stimuli: even if each stimulus\'s absolute relation to an ongoing oscillatory phase cannot be estimated, the probability of double-detection should oscillate as a function of the inter-stimulus *delay* (Figure [1](#F1){ref-type="fig"}). In plain English, the logic is that when the inter-stimulus delay is a multiple of the oscillatory period, the observer will be very likely to detect both stimuli (if they both fall at the optimal phase of the oscillation) or to miss both stimuli altogether (if they both fall at the opposite phase); on the other hand, if the delay is chosen in-between two multiples of the oscillatory period, then the observer will be very likely to detect only one of the two stimuli (if the first stimulus occurs at the optimal phase, the other will fall at the opposite, and vice-versa). ![**Double-detection functions can reveal periodicities even when the phase varies across trials**. **(A)** Protocol. Let us assume that the probability of detecting a stimulus (i.e., the system\'s sensitivity) fluctuates periodically along with the phase of an ongoing oscillatory process. By definition, this process bears no relation with the timing of each trial, and thus the phase will differ on each trial. On successive trials, not one but two stimuli are presented, with a variable delay between them. **(B)** Expected results. Because the phase of the oscillatory process at the moment of stimulus presentation is fully unpredictable, the average probability of detecting each stimulus as a function of time (using an absolute reference, such as the trial onset) will be constant (left). The probability of detecting the second stimulus will also be independent of the time elapsed since the first one (middle). However, the probability of detecting both stimuli (albeit smaller) will oscillate as a function of the delay between them, and the period of this oscillation will be equal to the period of the original ongoing oscillatory process (adapted from Latour, [@B50]).](fpsyg-02-00203-g001){#F1} More formally, let us assume that the probability of measuring our psychological variable ψ (e.g., target detection, discrimination, recognition, etc.) depends periodically (with period 2π/ω) on the time of presentation of the stimulation *s*; to a first approximation this can be noted: p ( ψ = 1 \| s = 1 ) = p 0 ⋅ ( 1 \+ a ⋅ sin ⁡ ( ω ⋅ t ) ) where *p*~0~ is the average expected measurement probability, and a is the amplitude of the periodic modulation. Since the time *t* of stimulation (with respect to the ongoing oscillation) may change for different repetitions of the measurement, only *p*~0~ can be measured with classical trial averaging methods (i.e., the "sine" term will average out to a mean value of zero). However, if two identical stimulations are presented, separated by an interval δ*t*, the conditional probability of measuring our psychological variable *twice* can be shown to be (there is no room here, unfortunately, for the corresponding mathematical demonstration): p ( ψ = 2 \| s = 2 ) = p 0 2 ⋅ ( 1 \+ ( ( ( a 2 ) / 2 ) ⋅ cos ⁡ ( ω ⋅ δ t ) ) ) The resulting probability only depends on the interval δ*t* (chosen by the experimenter), and thus does not require knowledge of the exact oscillatory phase on every trial. This means that, using double stimulations and double-detection functions, one can derive *psychophysically* the rate ω of the periodic process, and its modulation amplitude a (Figure [1](#F1){ref-type="fig"}). In practice, unfortunately, this method is not as easy to apply as it sounds. One important caveat was already mentioned by Latour: the inter-stimulus delay must be chosen to be long enough to avoid direct interactions between the two stimuli (e.g., masking, apparent motion, etc.). This is because the mathematical derivation of Eq. [2](#E2){ref-type="disp-formula"} assumes independence between the detection probabilities for the two stimuli. To ensure that this condition is satisfied, the stimuli should be separated by a few 100 ms (corresponding to the integration period for masking or apparent motion); on the other hand, this implies that several oscillatory cycles will occur between the two stimuli, and many external factors (e.g., phase slip, reset) can thus interfere and decrease the measured oscillation. This in turn suggests that the method may be more appropriate for revealing low-frequency oscillations than high-frequency ones (e.g., gamma). Another important limitation is that the magnitude of the measured oscillation in the double-detection function (2) is squared, compared to the magnitude of the original perceptual oscillation. Although this is not a problem if the perceptual oscillation is strong (i.e., the square of a number close to 1 is also close to 1), it can become troublesome when the original perceptual oscillation is already subtle (e.g., for a 20% modulation of the visual threshold, one can only expect a 4% modulation in the double-detection function). Altogether, these limitations may explain why Latour\'s results have, so far, not been replicated or extended. Temporal aliasing: The wagon wheel illusion {#s2} ------------------------------------------- Engineers know that any signal sampled by a discrete or periodic system is subject to potential "aliasing" artifacts (Figure [2](#F2){ref-type="fig"}): when the sampling resolution is lower than a critical limit (the "Nyquist rate") the signal can be interpreted erroneously. This is true, for instance, when a signal is sampled in the temporal domain (Figure [2](#F2){ref-type="fig"}A). When this signal is a periodic visual pattern in motion, aliasing produces a phenomenon called the "wagon wheel illusion" (Figure [2](#F2){ref-type="fig"}B): the pattern appears to move in the wrong direction. This is often observed in movies or on television, due to the discrete sampling of video cameras (generally around 24 frames per second). Interestingly, a similar perceptual effect has also been reported under continuous conditions of illumination, e.g., daylight (Schouten, [@B75]; Purves et al., [@B68]; VanRullen et al., [@B93]). In this case, however, because no artificial device is imposing a periodic sampling of the stimulus, the logical conclusion is that the illusion must be caused by aliasing within the visual system itself. Thus, this "continuous version of the wagon wheel illusion" (or "c-WWI") has been interpreted as evidence that the visual system samples motion information periodically (Purves et al., [@B68]; Andrews et al., [@B2]; Simpson et al., [@B78]; VanRullen et al., [@B93]). ![**Temporal aliasing**. **(A)** Concept. Sampling a temporal signal using too low a sampling rate leads to systematic errors about the signal, known as "aliasing errors." Here, the original signal is periodic, but its frequency is too high compared with the system\'s sampling rate (i.e., it is above the system\'s "Nyquist" frequency, defined as half of its sampling rate). As a result, the successive samples skip ahead by almost one full period of the original oscillation: instead of normally going through the angular phases of zero, π/2, π, 3π/2, and back to zero, the successive samples describe the opposite pattern, i.e., zero, 3π/2, π, π/2, and so on. The aliasing is particularly clear in the complex domain (right), where the representations of the original and estimated signals describe circles in opposite directions. **(B)** The wagon wheel illusion. When the original signal is a periodically moving stimulus, temporal aliasing transpires as a reversal of the perceived direction. This wagon wheel illusion is typically observed in movies due to the discrete sampling of video cameras. The continuous version of this wagon wheel illusion (c-WWI) differs in that it occurs when directly observing the moving pattern in continuous illumination; in this case, it has been proposed that reversed motion indicates a form of discrete sampling occurring in the visual system itself.](fpsyg-02-00203-g002){#F2} There are many arguments in favor of this "discrete" interpretation of the c-WWI. First, the illusion occurs in a very specific range of stimulus temporal frequencies, compatible with a discrete sampling rate of approximately 13 Hz (Purves et al., [@B68]; Simpson et al., [@B78]; VanRullen et al., [@B93]). As expected according to the discrete sampling idea, this critical frequency remains unchanged when manipulating the spatial frequency of the stimulus (Simpson et al., [@B78]; VanRullen et al., [@B93]) or the type of motion employed, i.e., rotation vs. translation motion, or first-order vs. second-order motion (VanRullen et al., [@B93]). EEG correlates of the perceived illusion confirm these psychophysical findings and point to an oscillation in the same frequency range around 13 Hz (VanRullen et al., [@B88]; Piantoni et al., [@B65]). Altogether, these data suggest that (at least part of) the motion perception system proceeds by sampling its inputs periodically, at a rate of 13 samples per second. There are, of course, alternative accounts of the phenomenon. First, it is noteworthy that the illusion is not instantaneous, and does not last indefinitely, but it is instead a bistable phenomenon, which comes and goes with stochastic dynamics; such a process implies the existence of a competition between neural mechanisms supporting the veridical and the erroneous motion directions (Blake and Logothetis, [@B6]). Within this context, the debate centers around the source of the erroneous signals: some authors have argued that they arise not from periodic sampling and aliasing, but from spurious activation in low-level motion detectors (Kline et al., [@B47]; Holcombe et al., [@B36]) or from motion adaptation processes that would momentarily prevail over the steady input (Holcombe and Seizova-Cajic, [@B37]; Kline and Eagleman, [@B46]). We find these accounts unsatisfactory, because they do not seem compatible with the following experimental observations: (i) the illusion is always maximal around the same temporal frequency, whereas the temporal frequency tuning of low-level motion detectors differs widely between first and second-order motion (Hutchinson and Ledgeway, [@B40]); (ii) not only the magnitude of the illusion, but also its spatial extent and its optimal temporal frequency -- which we take as a reflection of the system\'s periodic sampling rate -- are all affected by attentional manipulations (VanRullen et al., [@B93]; VanRullen, [@B88]; Macdonald et al., under review); in contrast, the amount of motion adaptation could be assumed to vary with attentional load (Chaudhuri, [@B12]; Rezec et al., [@B73]), but probably not the frequency tuning of low-level motion detectors; (iii) motion adaptation itself can be dissociated from the wagon wheel illusion using appropriate stimulus manipulations; for example, varying stimulus contrast or eccentricity can make the motion aftereffects (both static and dynamic versions) decrease while the c-WWI magnitude increases, and vice-versa (VanRullen, [@B89]); (iv) finally, the brain regions responsible for the c-WWI effect, repeatedly identified in the right parietal lobe (VanRullen et al., [@B88], [@B95]; Reddy et al., [@B71]), point to a higher-level cause than the mere adaptation of low-level motion detectors. Disentangling the neural mechanisms of the continuous wagon wheel illusion could be (and actually, is) the topic of an entirely separate review (VanRullen et al., [@B97]). To summarize, our current view is that the reversed motion signals most likely originate as a form of aliasing due to periodic temporal sampling by attention-based motion perception systems, at a rate of ∼13 Hz; the bistability of the illusion is due to the simultaneous encoding of the veridical motion direction by other (low-level, or "first-order") motion perception systems. The debate, however, is as yet far from settled. At any rate, this phenomenon illustrates the potential value of temporal aliasing as a paradigm to probe the discrete nature of sensory perception. Other forms of temporal aliasing {#s3} -------------------------------- The sampling frequency evidenced with the c-WWI paradigm may be specific to attention-based motion perception mechanisms. It is only natural to try and extend the temporal aliasing methodology to perception of other types of motion, to perception of visual features other than motion or to perception in sensory modalities other than vision. If evidence for temporal aliasing could be found in these cases, the corresponding sampling frequencies may then be compared to one another and further inform our understanding of discrete perception. Is there a single rhythm, a central (attentional) clock that samples all sensory inputs? Or is information from any single channel of sensory information read out periodically at its own rate, independently from other channels? While the first proposition reflects the understanding that most have of the theory of discrete perception (Kline and Eagleman, [@B46]), the latter may be a much more faithful description of reality; additionally, the sampling rate for a given channel may vary depending on task demands and attentional state, further blurring intrinsic periodicities. The simple generic paradigm which we advocate to probe the brain for temporal aliasing is as follows. Human observers are presented with a periodic time-varying input which physically evolves in an unambiguously defined direction; they are asked to make a two-alternative forced choice judgment on the direction of evolution of this input, whose frequency is systematically varied by the experimenter across trials. A consistent report of the wrong direction at a given input frequency may be taken as a behavioral correlate of temporal aliasing, and the frequencies at which this occurs inform the experimenter about the underlying sampling frequency of the brain for this input. Two main hurdles may be encountered in applying this paradigm. The first one lies in what should be considered a "consistent" report of the wrong direction. Clearly, for an engineered sampling system, one can find input frequencies at which the system will *always* output the wrong direction. For a human observer, however, several factors could be expected to lower the tendency to report the wrong direction, even at frequencies that are subject to aliasing: measurement noise, the potential variability of the hypothetical sampling frequency over the duration of the experiment, and most importantly, the potential presence of alternate sources of information (as in the c-WWI example, where competition occurs between low-level and attention-based motion systems). In the end, even if aliasing occurs, it may not manifest as a clear and reliable percept of the erroneous direction, but rather as a subtle increase of the probability of reporting the wrong direction at certain frequencies. Recently, we proposed a method to evaluate the presence of aliasing in psychometric functions, based on model fitting (Dubois and VanRullen, [@B17]). (A write-up of this method and associated findings can be accessed at [http://www.cerco.ups-tlse.fr/∼rufin/assc09/](http://www.cerco.ups-tlse.fr/∼rufin/assc09/)). Results of a 2-AFC motion discrimination experiment were well explained by considering two motion sensing systems, one that functions continuously and one that takes periodic samples of position to infer motion. These two systems each give rise to predictable psychometric functions with few parameters, whose respective contributions to performance can be inferred by model fitting. Evidence for a significant contribution of a discrete process sampling at 13 Hz was found -- thus confirming our previous conclusions from the c-WWI phenomenon. Furthermore, the discrete process contributed more strongly to the perceptual outcome when motion was presented inter-ocularly, than binocularly; this is compatible with our postulate that discrete sampling in the c-WWI is a high-level effect, since inter-ocular motion perception depends on higher-level motion perception systems (Lu and Sperling, [@B54]). The second pitfall is that the temporal resolution for discriminating the direction of the time-varying input under consideration should be at least as good as the hypothesized sampling frequency. If the psychometric function is already at chance at the frequency where aliasing is expected to take place, this aliasing will simply not be observed -- whether the perceptual process relies on periodic sampling or not. Our lab learned this the hard way: many of the features that we experimented with so far, besides luminance and contrast-defined motion, can only be discriminated at low-temporal frequencies -- they belong to Holcombe\'s "seeing slow" category (Holcombe, [@B35]). For example, we hypothesized that motion stimuli designed to be invisible to the first-order motion perception system, such as stereo-defined motion (Tseng et al., [@B86]), would yield maximal aliasing as there is no other motion perception system offering competing information. Unfortunately, these stimuli do not yield a clear percept at temporal frequencies beyond 3--4 Hz, meaning that any aliasing occurring at higher frequencies would have escaped our notice. The "motion standstill" phenomenon reported by Lu and colleagues (Lu et al., [@B53]; Tseng et al. [@B86]) with similar stimuli at frequencies around 5 Hz remains a potential manifestation of temporal aliasing, although we have not satisfactorily replicated it in our lab yet. We also hypothesized that binding of spatially distinct feature conjunctions, such as color and motion, could rely on sequential attentional sampling of the two features (Moutoussis and Zeki, [@B60]), and should thus be subject to aliasing. Again, we were disappointed to find that performance was at chance level at presentation rates higher than 3--4 Hz (Holcombe, [@B35]), precluding further analysis. We also attempted to adapt the wagon wheel phenomenon to the auditory modality. Here, perception of sound source motion (e.g., a sound rotating around the listener) also appeared limited to about 3 Hz (Feron et al., [@B27]). We then reasoned that frequency, rather than spatial position, was the primary feature for auditory perception, and designed periodic stimuli that moved in particular directions in the frequency domain -- so-called Shepard or Risset sequences (Shepard, [@B76]). Again, we found that the direction of these periodic frequency sweeps could not be identified when the temporal frequency of presentation was increased beyond 3--4 Hz. In sum, although temporal aliasing is, in principle, a choice paradigm to probe the rhythms of perception, our attempts so far at applying this technique to other perceptual domains than motion (the c-WWI) have been foiled by the strict temporal limits of the corresponding sensory systems. What we can safely conclude is that, if discrete sampling exists in any of these other perceptual domains, it will be at a sampling rate above 3--4 Hz. We have not exhausted all possible stimuli and encourage others to conduct their own experiments. There are two faces to the challenge: finding stimuli that the brain "sees fast" enough, and using an appropriate model to infer the contribution of periodic sampling to the psychometric performance (in case other sources of information and sizeable variability across trials should blur the influence of discrete processes). Rhythmic Sampling of Multiple Stimuli: Sequential vs. Parallel Attention {#s4} ======================================================================== Let us return to our previous hypothetical situation. Now you have passed the traffic lights and driven home, and you turned on the TV to find out today\'s lottery numbers. There are a handful of channels that can provide this information at this hour, so you go to "multi-channel" mode to monitor them simultaneously. The lottery results are not on, so you will wait until any channel shows them. How will you know which one? You try to process all channels at once, but their contents collide and confuse you. What if one of them shows the numbers but you notice it too late? By focusing on a single channel you would be sure not to miss the first numbers, but then what if you picked the wrong channel? In such a situation, it is likely that you will switch your attention rapidly between the different candidate channels until you see one that provides the required information. Your brain often faces the same problem when multiple objects are present in the visual field and their properties must be identified, monitored or compared. A long-standing debate ---------------------- ### Visual search Whether your brain simultaneously and continuously shares its attentional resources (i.e., in "parallel") between candidate target objects, or switches rapidly and sequentially between them, has been the subject of intense debate in the literature. We refer to this debate as "parallel vs. sequential attention." Originally, attention was assumed to be a unitary, indivisible resource, and consequently the sequential model was favored, often implicitly (Eriksen and Spencer, [@B25]; Treisman, [@B84]; Kahneman, [@B44]). The first two decades of studies using the visual search paradigm were heavily biased toward this assumption (Treisman and Gelade, [@B85]; Wolfe, [@B102]): when a target had to be identified among a varying number of distractors and the observer\'s RT was found to increase steadily with the number of items, it was assumed that the additional time needed for each item reflected the duration of engaging, sampling and disengaging attention (hence the term "serial search slope"). It was only in the 1990s that this assumption was seriously challenged by proponents of an alternate model, according to which attention is always distributed in parallel among items, and the increase in RT with increasing item number simply reflects the increasing task difficulty or decreasing "signal-to-noise ratio" (Palmer, [@B64]; Carrasco and Yeshurun, [@B10]; Eckstein, [@B21]; McElree and Carrasco, [@B57]; Eckstein et al., [@B22]). Both models are still contemplated today -- and indeed, they are extremely difficult to distinguish experimentally (Townsend, [@B83]). ### Multi-object tracking The same difficulty also plagues paradigms other than visual search. Multi-object tracking, for instance, corresponds to a situation in which several target objects are constantly and randomly moving around the visual field, often embedded among similarly moving distractors (Pylyshyn and Storm, [@B69]). Sometimes, the objects are moving in feature space (i.e., changing their color or their orientation) rather than in physical space (Blaser et al., [@B7]). The common finding that up to four -- or sometimes more (Cavanagh and Alvarez, [@B11]) objects can be efficiently tracked at the same time has been taken as evidence that attention must be divided in parallel among the targets (Pylyshyn and Storm, [@B69]). However, in the limit where attention would be assumed to move at lightning speed, it is obvious that this simultaneous tracking capacity could be explained equally well by sequential shifts of a single attention spotlight, than by divided or parallel attention. Indeed, at least some of the existing data have been found compatible with a sequential process (Howard and Holcombe, [@B38]; Oksama and Hyona, [@B63]). Since there is no general agreement concerning the actual speed of attention (Duncan et al., [@B19]; Moore et al., [@B59]; Hogendoorn et al., [@B34]), the question remains open. ### Simultaneous/sequential paradigm Other paradigms have been designed with the explicit aim of teasing apart the parallel and serial attention models. In the simultaneous/sequential paradigm, the capacity of attention to process multiple items simultaneously is assessed by presenting the relevant information for a limited time in each display cycle. In one condition (simultaneous) this information is delivered at once for all items; in the other condition (sequential) each item\'s information is revealed independently, at different times. In both conditions the critical information is thus shown for the same total amount of time, such that a parallel model of attentional allocation would predict comparable performance; however, a serial attentional model would suffer more in the simultaneous condition, because attention would necessarily miss the relevant information in one stimulus while it is sampling the other(s), and vice-versa (Eriksen and Spencer, [@B25]; Shiffrin and Gardner, [@B77]). The paradigm was recently applied to the problem of multiple-object tracking (Howe et al., [@B39]), and the data were deemed incompatible with serial attention sampling. A major source of confounds in this paradigm, however, is that, depending on stimulus arrangement parameters, certain factors (e.g., grouping, crowding) can improve or decrease performance in the simultaneous condition independently of attention; similarly, other factors (e.g., apparent motion, masking) can improve or decrease performance in the sequential condition. It is unclear in the end how to tease apart the effects of attention from the potentially combined effects of all these extraneous factors. ### Split spotlight studies To finish, there is yet another class of experiments that were intended to address a distinct albeit related question: when attention is divided among multiple objects, does the focus simply expand its size to include all of the targets, or does it split into several individual spotlights? To test this, these paradigms generally measure an improvement of performance due to attention at two separate locations concurrently; the critical test is then whether a similar improvement can also be observed at an intervening spatial location: if yes, the spotlight may have been simply enlarged, if not it may have been broken down into independent spotlights. Psychophysical studies tend to support the multiple spotlights account (Bichot et al., [@B5]; Awh and Pashler, [@B3]). The same idea has also been applied to physiological measurements of the spotlight, demonstrating that EEG or fMRI brain activations can be enhanced by attention at two concurrent locations, without any enhancement at intervening locations (Muller et al., [@B61]; McMains and Somers, [@B58]). Now, how do these results on the spatial deployment of attention pertain to our original question about the temporal dynamics of attention? Inherent in the logic of this paradigm is the assumption that attentional resources are divided constantly over time; multiple spotlights are implicitly assumed to operate simultaneously, rather than as a single, rapidly shifting focus. To support this assumption, authors often use limited presentation times (so attention does not have time to shift between targets), and speculate on the speed of attention. As mentioned before, since this speed is largely unknown, a lot of the data remain open to interpretation. In fact, our recent results in a very similar paradigm (in which we varied the delay between stimulus onset and the subsequent measurement of attentional deployment) showed that multiple simultaneous spotlights can in fact be observed, but are short-lived; when several target locations need to be monitored for extended periods of time, the attentional system quickly settles into a single-spotlight mode (Dubois et al., [@B17]). In another related study we found that attention could not simultaneously access information from two locations, but instead relied on rapid sequential allocation (Hogendoorn et al., [@B33]). The conclusion from studies that have used this kind of paradigm is also fairly representative of the current status of the entire "sequential vs. parallel attention" debate, which we have briefly reviewed here. As summarized in a recent (and more thorough) review by Jans et al. ([@B41]), most of the so-called demonstrations of multiple parallel attention spotlights rely on strong -- and often unsubstantiated -- assumptions about the temporal dynamics of attention. In sum, parallel attention has by no means won the prize. Temporal aliasing returns ------------------------- Could aliasing (see [Temporal Aliasing: the Wagon Wheel Illusion](#s2){ref-type="sec"} and [Other Forms of Temporal Aliasing](#s3){ref-type="sec"}) provide a way of resolving the "sequential vs. parallel attention" debate? If attention focuses on each target sequentially rather than continuously, the target information will be sampled more or less periodically, and should thus be subject to aliasing artifacts; furthermore, the rate of sampling for each target should be inversely related to the number of targets to sample (i.e., the "set size"). On the other hand, parallel attention models have no reason to predict aliasing; and, even if aliasing were to occur, no reason to predict a change of aliasing frequency as a function of set size. We recently tested this idea using a variant of the continuous wagon wheel illusion phenomenon (Macdonald et al., under review). On each 40 s trial, we showed one, two, three or four wheels rotating in the same direction; the frequency of rotation was varied between trials. From time to time, a subset of the wheels briefly reversed their direction, and the subjects' task was to count and report how many of these reversal events had occurred in each trial. We reasoned that any aliasing would be manifested as an overestimation of the number of reversals. As expected from our experiments with the c-WWI, we found significant aliasing in a specific range of rotation frequencies. Most importantly, the frequency of maximum aliasing significantly decreased as set size was increased, as predicted by the "sequential attention" idea. Although the magnitude of this decrease was lower than expected (the sampling frequency was approximately divided by 2, from ∼13 Hz down to ∼7 Hz, while the set size was multiplied by 4), this finding poses a very serious challenge to the "parallel attention" theory. The blinking spotlight of attention ----------------------------------- The crucial difficulty in distinguishing parallel and sequential accounts of attention is a theoretical one: any "set size effect" that can be explained by a division of attentional resources in time can, in principle, be explained equally well using a spatial division of the same resources (Townsend, [@B83]; Jans et al., [@B41]). There is a form of equivalence between the temporal and spatial domains, a sort of Heisenberg uncertainty principle, that precludes most attempts at jointly determining the spatial and temporal distributions of attention. In a recent experiment, however, we tried to break down this equivalence by measuring set size effects following a *temporal* manipulation of the stimuli -- namely, after varying their effective duration on each trial (VanRullen et al., [@B89]). Thus we could tell, for example, how well three stimuli were processed when they were presented for 300 ms, and we could compare this to the performance obtained for one stimulus presented 100, or 300 ms (or any other combination of set size and duration). The interest of this procedure was that different models of attentional division (e.g., sequential and parallel models) would make different predictions about how the psychometric function for processing one stimulus as a function of its duration should translate into corresponding psychometric functions for larger set sizes. To simplify, the space--time equivalence was broken, because performance for sequentially sampling two (or three, or four) stimuli each for a fixed period could be predicted exactly, by knowing the corresponding performance for a single stimulus that lasted for a duration equivalent to the sampling period; a simple parallel model, of course, could be designed to explain the change in performance from one to two (or three, or four) stimuli, but if the model was wrong it would then do a poor job at explaining performance obtained at other set sizes. We compared three distinct models of attention allocation, each with a single free parameter. In the "parallel" model, all stimuli were processed simultaneously, and only the efficiency of this processing varied as a function of attentional load (i.e., set size); the cost in efficiency was manipulated by the model\'s free parameter. The second model, coined "sample-when-divided," corresponded to the classic idea of a switching spotlight: when more than one stimulus was present, the otherwise constant attentional resource was forced to sequentially sample the stimulus locations; the model\'s free parameter was its sampling period, which affected its ability to process multiple stimuli. Finally, we decided to consider a third model, termed "sample-always," similar to the previous one except for the fact that it still collected and integrated successive attentional samples even when a single stimulus was present (see Figure [3](#F3){ref-type="fig"} for an illustration); this model\'s behavior was also governed by its sampling period. Our strategy was, then, to compare the three models' ability to emulate the actual psychometric functions of human observers. ![**Relating discrete perception with sequential attention**. **(A)** A sensory process that samples a single visual input periodically illustrates the concept of discrete perception. **(B)** A sensory process that serially samples three simultaneously presented visual stimuli demonstrates the notion of a sequential attention spotlight. Since many of our findings implicate attention in the periodic sampling processes displayed in **(A)**, we propose that both types of periodic psychological operations **(A,B)** actually reflect a common oscillatory neuronal process. According to this view, the spotlight of attention is intrinsically rhythmic, which gives it both the ability to rapidly scan multiple objects, and to discretely sample a single source. (The yellow balls linked by red lines illustrate successive attentional samples.)](fpsyg-02-00203-g003){#F3} Compatible with existing findings (Palmer, [@B64]), we revealed that the parallel model could outperform the classic version of the sequential model -- the "sample-when-divided" one, which considers that the attentional spotlight shifts around sequentially, but only when attention must be divided. However, the truly optimal model to explain human psychometric functions was the other variant of the sequential idea, a model in which attention always samples information periodically, regardless of set size. The rate of sampling was found to be ∼7 Hz. When attention is divided, successive samples naturally focus on different stimuli, but when it is concentrated on a single target, the samples continue to occur repeatedly every ∼150 ms, simply accumulating evidence for this one stimulus. In other words, our findings supported a "blinking spotlight" of attention (VanRullen et al., [@B89]) over the sequentially "switching spotlight" (and over the multiple "parallel spotlights"). Conclusion ========== The notion of a blinking spotlight illustrates a fundamental point: that discrete sampling and sequential attention could be two facets of a single process (Figure [3](#F3){ref-type="fig"}). Proponents of the discrete sampling theory should ask themselves: what happens when there are more than one relevant stimuli in the visual field? Can they all be processed in a single "snapshot"? Advocates of sequential attention should ponder about the behavior of attention when it has only one target to monitor: is it useful -- or even possible -- for attention to pause its exploratory dynamics? The simple theory that we propose is that periodic "covert" attentional sampling may have evolved from "overt" exploratory behavior (i.e., eye movements), as a means to quickly and effortlessly scan internal representations of the environment (VanRullen et al., [@B92]; Uchida et al., [@B87]). Just as eye movements continue to occur even when there is only one object in the scene -- lest the object quickly fade from awareness (Ditchburn and Ginsborg, [@B16]; Coppola and Purves, [@B13]; Martinez-Conde et al., [@B55]) -- it is sensible to posit that attentional sampling takes place regardless of the number of objects to sample. Perception can then be said to be "discrete" or "periodic," insofar as a very significant portion of its inputs (those depending on attentional mechanisms) are delivered periodically. For example, the ∼13 Hz discrete sampling responsible for the continuous wagon wheel illusion was found to be driven by attention (VanRullen et al., [@B93]; VanRullen, [@B88]; Macdonald et al., under review). The frequency of this sampling progressively decreased to ∼7 Hz when two, three, and finally four "wagon wheel" stimuli had to be simultaneously monitored (Macdonald et al., under review). Interestingly, this ∼7 Hz periodicity was also the one indicated by our model of the "blinking spotlight" of attention (VanRullen et al., [@B89]). Altogether, our data raise the intriguing suggestion that attention creates discrete samples of the visual world with a periodicity of approximately one tenth of a second. To conclude, we argue that it is constructive to unite the two separate psychophysical debates about discrete vs. continuous perception (see [Rhythmic Sampling of a Single Stimulus: Discrete vs. Continuous Perception](#s1){ref-type="sec"}) and sequential vs. parallel attention (see [Rhythmic Sampling of Multiple Stimuli: Sequential vs. Parallel Attention](#s4){ref-type="sec"}). Discrete perception and sequential attention may represent perceptual and psychological manifestations of a single class of periodic neuronal mechanisms. Therefore, psychophysical progress in solving those debates could, ultimately, contribute to uncovering the role of low-frequency brain rhythms in perception and attention. Conflict of Interest Statement ============================== The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. This research was funded by a EURYI Award and an ANR grant 06JCJC-0154 to RV. [^1]: Edited by: Gregor Thut, University of Glasgow, UK [^2]: Reviewed by: Hinze Hogendoorn, Utrecht University, Netherlands; Ayelet Nina Landau, Ernst Strüngmann Institute in Cooperation with Max Planck Society, Germany [^3]: This article was submitted to Frontiers in Perception Science, a specialty of Frontiers in Psychology.
Mid
[ 0.636363636363636, 28.875, 16.5 ]
Manatawny Creek Manatawny Creek is an tributary of the Schuylkill River in Pennsylvania in the United States. Manatawny Creek comes from the Lenape (or Delaware Indian) term Man'en'tau'wata'wik, which means "drink-at-uninhabited-place" or "where we drank liquor". The tributary Ironstone Creek joins the Manatawny at Pine Forge. Manatawny Creek is formed by the confluence of Bieber Creek and Pine Creek just below Lobachsville. Manatawny Creek joins the Schuylkill River at Pottstown in Montgomery County. Bridges The Pleasantville Bridge crosses Little Manatawny Creek at Oley Township in Berks County. See also List of rivers of Pennsylvania References External links U.S. Geological Survey: PA stream gaging stations Category:Rivers of Pennsylvania Category:Tributaries of the Schuylkill River Category:Rivers of Montgomery County, Pennsylvania Category:Rivers of Berks County, Pennsylvania
Mid
[ 0.5824847250509161, 35.75, 25.625 ]
Q: Hook filter to change wp_upload_dir() path in multisite The upload directory and URL paths are stored in the options database. You can change them using update_option(): update_option( 'upload_path', ABSPATH . '/path/to/uploads' ); update_option( 'upload_path_url', site_url( '/uploads/' ) ); However, if it's a blog site on network multisite, the function _wp_upload_dir on /wp-includes/functions.php add /site/id_blog/ after the url defined on upload_path and upload_path_url. function _wp_upload_dir( $time = null ) { $siteurl = get_option( 'siteurl' ); $upload_path = trim( get_option( 'upload_path' ) ); if ( empty( $upload_path ) || 'wp-content/uploads' == $upload_path ) { $dir = WP_CONTENT_DIR . '/uploads'; } elseif ( 0 !== strpos( $upload_path, ABSPATH ) ) { $dir = path_join( ABSPATH, $upload_path ); } else { $dir = $upload_path; } if ( !$url = get_option( 'upload_url_path' ) ) { if ( empty($upload_path) || ( 'wp-content/uploads' == $upload_path ) || ( $upload_path == $dir ) ) $url = WP_CONTENT_URL . '/uploads'; else $url = trailingslashit( $siteurl ) . $upload_path; } if ( defined( 'UPLOADS' ) && ! ( is_multisite() && get_site_option( 'ms_files_rewriting' ) ) ) { $dir = ABSPATH . UPLOADS; $url = trailingslashit( $siteurl ) . UPLOADS; } // If multisite (and if not the main site in a post-MU network) if ( is_multisite() && ! ( is_main_network() && is_main_site() && defined( 'MULTISITE' ) ) ) { if ( ! get_site_option( 'ms_files_rewriting' ) ) { if ( defined( 'MULTISITE' ) ) $ms_dir = '/sites/' . get_current_blog_id(); else $ms_dir = '/' . get_current_blog_id(); $dir .= $ms_dir; $url .= $ms_dir; } elseif ( defined( 'UPLOADS' ) && ! ms_is_switched() ) { if ( defined( 'BLOGUPLOADDIR' ) ) $dir = untrailingslashit( BLOGUPLOADDIR ); else $dir = ABSPATH . UPLOADS; $url = trailingslashit( $siteurl ) . 'files'; } } $basedir = $dir; $baseurl = $url; $subdir = ''; if ( get_option( 'uploads_use_yearmonth_folders' ) ) { if ( !$time ) $time = current_time( 'mysql' ); $y = substr( $time, 0, 4 ); $m = substr( $time, 5, 2 ); $subdir = "/$y/$m"; } $dir .= $subdir; $url .= $subdir; return array( 'path' => $dir, 'url' => $url, 'subdir' => $subdir, 'basedir' => $basedir, 'baseurl' => $baseurl, 'error' => false, ); } So I need to delete only next condition: if ( defined( 'MULTISITE' ) ) $ms_dir = '/sites/' . get_current_blog_id(); else $ms_dir = '/' . get_current_blog_id(); To this: $ms_dir = '/' But I don't like to mess up the core wordpress code. I would like change it by a filter hook if it's possible. Any advice would be helpful. A: Use the upload_dir filter. add_filter( 'upload_dir', 'wpse_261931_upload_dir', 10, 1 ); function wpse_261931_upload_dir( array $uploads ) { if( is_multisite() ) { //* Do something interesting with the $uploads directory } return $uploads; }
Low
[ 0.501084598698481, 28.875, 28.75 ]
Acting Black: Reflections on Race and Campus Life Audio/Video/Info Sarah Willie, an associate professor of sociology at Swarthmore College, is the author of Acting Black: College, Identity and the Performance of Race (Routledge, 2003). For this book, she interviewed African-American alumni of Howard and Northwestern Universities—the former historically black, the latter predominantly white. Willie is introduced by Cheryl Presley, vice president for student affairs at Boston College.
High
[ 0.701670644391408, 36.75, 15.625 ]
Sixth victim comes forward in Hamilton High hazing scandal A spokesperson with the Chandler Police Department has confirmed another victim is working with their detectives. Author: Charly Edsitty Published: 8:23 AM PST September 22, 2017 Updated: 1:47 PM PST September 22, 2017 PHOENIX - A sixth victim is now working with detectives who are investigating the allegations of sexual assault and hazing happening inside the football locker room at Hamilton High School. According to a department spokesperson, the victim came to police two weeks ago. The Chandler Police Department first announced their investigation into the allegations at the end of March, when three victims were identified by police, and since that time, three more victims have come forward. Notices of claim have been filed with the Chandler Unified School District on behalf of five of the victims, asking for 34 million dollars in total damages. The claims allege school officials were aware of the assaults and were negligent in reporting them to police.
Mid
[ 0.585034013605442, 32.25, 22.875 ]
Investigational agents to enhance the efficacy of chemotherapy or radiation in pancreatic cancer. Pancreatic cancer (PC) continues to be a fatal malignancy. With standard treatments having modest impact, alternative courses of actions are being investigated such as enhancing the efficacy of standard treatment through sensitization of PC cells to chemotherapy or radiation. This review emphasizes investigational agents that increase the responses to chemotherapy or radiation in PC models. Our group has extensively investigated on Curcumin (Cur), analogs (EF31, UBS109, and L49H37), nanoparticles and a small molecule Tolfenamic acid (TA) for enhancing therapeutic efficacy in both in vitro and in vivo assays. Cur has a low level of toxicity and promising anti-cancer activity, however, its clinical development has been limited by low bioavailability. Cur analogs and nanoparticles were synthesized to improve Cur's efficacy and bioavailability. These compounds were found to be effective in enhancing the therapeutic effects of chemotherapy in pre-clinical models. Small molecules such as NSAIDs have also been tested for the anti-cancer activity and induction of response of chemotherapy and radiation. Interest in TA, a NSAID, has recently increased due to promising preclinical data demonstrating its anti-cancer properties with minimum toxicity. TA also synergistically increased the response of XRT in PC cells and in an orthotropic mouse model. With strong preclinical evidence, research aimed at developing less toxic therapies for PC using Cur analogues or TA is ready for translation into clinical testing.
High
[ 0.677325581395348, 29.125, 13.875 ]
#- XLsuite, an integrated CMS, CRM and ERP for medium businesses #- Copyright 2005-2009 iXLd Media Inc. See LICENSE for details. module XlSuite class Flash < Liquid::Tag TheCode = %q(<object id="__ID" width="__WIDTH" height="__HEIGHT" align="__ALIGN" type="application/x-shockwave-flash" data="__URL"> <param value="__URL" name="movie"/> <param value="__ALLOW_FULL_SCREEN" name="allowFullScreen"/> <param value="high" name="quality"/> <param value="__WMODE" name="wmode"/> <param value="__BGCOLOR" name="bgcolor"/> </object>).gsub(/^\s+/, "").freeze QuotedFragment = Liquid::QuotedFragment.freeze DefaultOptions = {:version => "7", :align => "middle", :bgcolor => '#00000', :id => "", :width => "", :height => "", :allow_full_screen => "true", :wmode => "transparent"}.freeze AlignSyntax = /align:\s*(#{QuotedFragment})/i BgcolorSyntax = /bgcolor:\s*(#{QuotedFragment})/i HeightSyntax = /height:\s*(#{QuotedFragment})/i IdSyntax = /id:\s*(#{QuotedFragment})/i UrlSyntax = /url:\s*(#{QuotedFragment})/i VersionSyntax = /version:\s*(#{QuotedFragment})/i WidthSyntax = /width:\s*(#{QuotedFragment})/i AllowFullScreenSyntax = /allow_full_screen:\s*(#{QuotedFragment})/i WModeSyntax = /wmode:\s*(#{QuotedFragment})/i def initialize(tag_name, markup, tokens) super @options = DefaultOptions.dup @options[:align] = strip_quotes($1) if AlignSyntax =~ markup @options[:bgcolor] = strip_quotes($1) if BgcolorSyntax =~ markup @options[:height] = strip_quotes($1) if HeightSyntax =~ markup @options[:id] = strip_quotes($1) if IdSyntax =~ markup @options[:url] = strip_quotes($1) if UrlSyntax =~ markup @options[:version] = strip_quotes($1) if VersionSyntax =~ markup @options[:width] = strip_quotes($1) if WidthSyntax =~ markup @options[:allow_full_screen] = strip_quotes($1) if AllowFullScreenSyntax =~ markup @options[:wmode] = strip_quotes($1) if WModeSyntax =~ markup raise SyntaxError, "flash tag requires the url: parameter: it is missing" if @options[:url].blank? end def render(context) returning TheCode.dup do |text| temp_value = nil @options.each_pair do |key, value| temp_value = context[value] logger.debug {"PRE (#{key.inspect} => #{value.inspect})\n\n#{text}"} text.gsub!("__#{key.to_s.upcase}", (temp_value || value).to_s) logger.debug {"POST\n\n#{text}"} end end end def strip_quotes(value) case value[0,1] when '"', "'" value[1..-2] else value end end end end
Mid
[ 0.574948665297741, 35, 25.875 ]
Ergen's Bid Bets on Consumers Hungry for Data By Anton Troianovski and Shalini Ramachandran April 15, 2013 6:58 p.m. ET People are guzzling wireless data and spending more on their phone bills. That has helped turn Sprint Nextel Corp. , seen as the poor stepchild of the U.S. wireless industry just two years ago, into a hot acquisition target. The looming takeover fight for Sprint between Softbank Corp. of Japan, which agreed to buy 70% of the company for $20.1 billion last year, and Dish Network Corp. , which lobbed in an unsolicited $25.5 billion offer for the whole company on Monday, reflects the fast-changing habits of Americans in how they consume media and what they spend on telecommunications. Sunday night, when Dish Network Chairman Charles Ergen and his colleagues were in New York preparing to announce their Sprint offer, they were also using their mobile devices to watch the Masters golf tournament. Mr. Ergen spent much of a later interview with The Wall Street Journal maintaining that more people in the future will want to do the same—and that Dish, by buying Sprint, would put itself in position to profit from those changed habits. Pairing his satellite broadcaster with a nationwide wireless service like Sprint's would allow him to offer wireless Internet service that people can use in their homes, thanks to Sprint's cellular network, along with a more comprehensive mobile-video service that he said would let Dish subscribers get live TV beamed to their phones cheaply. There is also a large portion of Americans—as much as a third, Mr. Ergen estimated—who in the future will find it more efficient to get their home Internet over a wireless connection than through a wired one because they won't have access to superfast fiber-optic wired networks. For those people, Mr. Ergen said in the interview, a combined Dish-Sprint could beam Internet service from towers to special cellular antennas mounted on the roofs of people's homes. Mobile video is expensive now because it uses a lot of bandwidth, and most big wireless carriers charge for bandwidth on a usage basis. Consumers have shown they are willing to pay up as America's mobile addiction grows. From 2007 to 2011, average annual household spending on telephone services increased by $116 to $1,226. Mr. Ergen thinks he can capitalize on further increases in demand. He said live video could be transmitted far more efficiently over a special band of airwaves Dish controls. That way a combined Dish-Sprint wouldn't have to impose data caps on that video service, he said. Mr. Ergen's comments about his offer for Sprint show he is making a bet that telecommunications providers will have a greater role in people's lives than simply being the "dumb pipe" that transmits data traffic on behalf of other companies. "We can offer a much, much more compelling product that differentiates away from things like data caps and bits and bytes," Mr. Ergen said. For his video plan to work, though, Mr. Ergen would likely need the programmers who control rights to mobile use of their shows to sign off. While Dish executives have said they have sewn up some of those rights, Dish's relationships with media partners are among the most contentious of any major TV distributor. He is currently involved in a legal dispute with major broadcasters, over his Ad Hopper digital video recorder, which makes it very easy for TV viewers to skip commercials. (Among broadcasters suing Dish is Fox, whose parent company, News Corp . , also owns The Wall Street Journal). And Dish only recently settled a yearslong legal fight with Cablevision Systems Corp. and sibling company AMC Networks , which had involved a blackout of AMC's channels on Dish's service for several months last year. This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at 1-800-843-0008 or visit www.djreprints.com.
Mid
[ 0.549118387909319, 27.25, 22.375 ]
On Sunday afternoon, the OHL champion London Knights and QMJHL champion Rouyn-Noranda Huskies will square off in the final of the 2016 Memorial Cup. The Knights received a bye to the final by being perfect through the round robin, winning all three games against the Huskies, host Red Deer Rebels, and WHL champion Brandon Wheat Kings. Rouyn-Noranda had a more complicated road to the championship game, defeating the Rebels in front of a raucous home crowd in the semi-final, by a score of 3-1. 2016 Memorial Cup Final Preview London Knights (3-0-0) vs. Rouyn-Noranda Huskies (2-2-0) This game is sure to be fascinating, with the two strongest teams in junior hockey squaring off. The Knights and Huskies met previously on Tuesday, in both teams’ final round robin game, where London came out the victors by a score of 5-2. That game wasn’t quite what it was expected to be; the referees set the tone early by assessing a penalty to Rouyn-Noranda’s Antoine Waked just nine seconds in, and from then on even strength play was a rarity. In all, 20 minor penalties were called (9 to the Huskies, 11 to the Knights), and frustration grew in both teams. London made better use of their power-plays, though, going 3 for 7 when the Huskies went 2 for 11. That comes as no surprise, though, as the OHL champion’s deadliness with a man advantage has been a common theme all year – they were tops in the league at 29.1% in the regular season. The Knights’ much-lauded top line of Mitch Marner, Christian Dvorak and Matthew Tkachuk combined for 9 points in that game against the Huskies, 26 in the whole Memorial Cup tournament. Marner alone has an astonishing 13, with 2 goals and 11 assists. On Saturday the 19-year-old Toronto Maple Leafs prospect was named CHL player of the year, bringing him one step closer to the astonishingly historic company he’s chasing. Marner has already caught the attention of the world, lighting up every team that has stood in his way throughout the playoffs and Memorial Cup. He surpassed Leon Draisaitl‘s 2015 tournament-leading points total of 7 in just the second game. He’s now three points away from tying the all-time Memorial Cup record – not out of reach at the rate he’s scoring. As a team, the Knights have outscored their opponents 20-5 in this tournament, taking no prisoners as they romped through the first three games by scored of 6-2, 9-1, and 5-2. Nine different players have recorded a point, among them depth scorers such as Aaron Berisha and Max Jones. The Huskies can score too, though. Quebec’s best team was the highest-scoring in their league as well, putting up 302 goals in the regular season and 88 in the QMJHL playoffs. They’re led up front by San Jose Sharks prospect Timo Meier, who recorded 51 points in 29 games after Rouyn-Noranda acquired him at the trade deadline. He has 7 points at the Memorial Cup, tied with his teammate Francis Perron, an Ottawa Senators draft pick who was named the regular season MVP in Quebec after scoring 108 points. Leafs prospect Martins Dzierkals is just another one of the list of Huskies players who can contribute offensively. Both teams are also strong on the back end, capable of winning battles in both ends and taking some of the heavy lifting away from their goaltenders. London’s blue line is led by their mismatched top pairing of the 5’10” Victor Mete, one of the best skaters in the league, and the towering 6’7″ Chris Martenet. Behind them, highly-touted draft eligible Finn Olli Juolevi provides an offensive flair from the point while veteran (and member of last year’s Memorial Cup champion Oshawa Generals) Jacob Graves provides support. Rouyn-Noranda’s defence also received help at the trade deadline, as they added Nikolas Brouillard to contribute in their own zone. Jeremy Lauzon, a draft pick of the Boston Bruins, typically calls the shots from the back end. 6’5″ Philippe Myers rounds out the Huskies’ big three, which has been paramount to their defensive game all year. The battle in net will be between London’s Tyler Parsons and Rouyn-Noranda’s Chase Marchand. Parsons has been spectacular in the Memorial Cup so far, with a .944 save percentage. He was a major factor in the Knights’ dominance of the OHL playoffs, providing the offensive-minded defencemen with more freedom to join the rush. Marchand has also been a rock for the Huskies, having posted a .946 save percentage throughout the entire QMJHL playoffs. Both teams made waves to get to the final. The Knights rolled through every team they played. The Huskies had to fight their way here, but still impressed by dispensing with the Wheat Kings (who were severely disappointing) and the feisty Red Deer Rebels. With the roll that London is on, it’s all too easy to call them the favourite. For the third year in a row, the OHL champion at this tournament has gone 3-0 and automatically qualified for the final. However, the Knights must be wary of what has happened in the past to teams who rested on their laurels. At the 2014 Memorial Cup, the Guelph Storm dominated the competition en route to the championship game, where they were promptly dismantled 6-3 by the Edmonton Oil Kings – who the Storm had beaten 5-2 just eight days previously. The Knights were present at that tournament, five of their current players having experienced the 7-2 beatdown given to them by Guelph firsthand. Surely Dale Hunter‘s team will know not to ease up on a team they have beaten in the past – they learned that in the first round of the playoffs against the Owen Sound Attack. After their team trip to Banff during the free time they bought themselves, the Knights have been practising hard, having watched hours of Huskies game tape. The first meeting between these two teams will not have been a good preview for what will happen in the final. It was a slow game riddled with stoppages, an abnormality for any hockey game. The 2016 Memorial Cup Final will surely be the true test of the Knights and Huskies. Rouyn-Noranda will definitely be hungry, having been beaten handily by London last time in a game where neither team got into any true rhythm. They’ve fought harder to get here, though, having played just two days ago – while the Knights have been off since Tuesday. The greatest prize in junior hockey is up for grabs on Sunday. The London Knights may be the slight favourites given their recent record and star-studded roster, but in a single elimination game anything can happen. The puck drops in Red Deer, Alberta at 4:30 EST. Main Photo:
High
[ 0.6962785114045611, 36.25, 15.8125 ]
A peacock and white pearl dog collar, choker necklace. Formed silver tone metal, set with peacock and white freshwater baroque shaped pearls, set in a grid like design with further pearl drops set beneath. Adjustable length lobster claw fastener. Stunning modern necklace.
Mid
[ 0.565874730021598, 32.75, 25.125 ]
--- abstract: | Let $S$ be a nonempty set of vertices of a connected graph $G$. A collection $T_1,\cdots,T_{\ell}$ of trees in $G$ is said to be internally disjoint trees connecting $S$ if $E(T_i)\cap E(T_j)=\emptyset$ and $V(T_i)\cap V(T_j)=S$ for any pair of distinct integers $i,j$, where $1\leq i,j\leq r$. For an integer $k$ with $2\leq k\leq n$, the generalized $k$-connectivity $\kappa_k(G)$ of $G$ is the greatest positive integer $r$ such that $G$ contains at least $r$ internally disjoint trees connecting $S$ for any set $S$ of $k$ vertices of $G$. Obviously, $\kappa_2(G)$ is the connectivity of $G$. In this paper, sharp upper and lower bounds of $\kappa_3(G)$ are given for a connected graph $G$ of order $n$, that is, $1\leq \kappa_3(G)\leq n-2$. Graphs of order $n$ such that $\kappa_3(G)=n-2,\, n-3$ are characterized, respectively. [**Keywords**]{}: connectivity, internally disjoint trees, generalized connectivity.\ [**AMS subject classification 2010:**]{} 05C40, 05C05. author: - | Hengzhe Li, Xueliang Li, Yaping Mao, Yuefang Sun\ Center for Combinatorics and LPMC-TJKLC\ Nankai University, Tianjin 300071, China\ [email protected]; [email protected];\ [email protected]; [email protected] title: '**Graphs with large generalized $3$-connectivity [^1]**' --- Introduction ============ All graphs in this paper are undirected, finite and simple. We refer to book [@bondy] for graph theoretical notation and terminology not described here. The generalized connectivity of a graph $G$, which was introduced by Chartrand et al. in [@Chartrand1], is a natural and nice generalization of the concept of connectivity. A tree $T$ is called *an $S$-tree* if $S\subseteq V(T)$, where $S\in V(G)$. A collection $T_1,\cdots,T_{\ell}$ of trees in $G$ is said to be *internally disjoint trees connecting $S$* if $E(T_i)\cap E(T_j)=\emptyset$ and $V(T_i)\cap V(T_j)=S$ for any pair of distinct integers $i,j$, where $1\leq i,j\leq r$. For an integer $k$ with $2\leq k\leq n$, the *generalized $k$-connectivity* $\kappa_k(G)$ of $G$ is the greatest positive integer $r$ such that $G$ contains at least $r$ internally disjoint trees connecting $S$ for any set $S$ of $k$ vertices of $G$. Obviously, $\kappa_2(G)$ is the connectivity of $G$. By convention, for a connected graph with less than $k$ vertices, we set $\kappa_k(G)=1$; for a disconnected graph $G$, we set $\kappa_k(G)=0$. In addition to being natural combinatorial measures, the generalized connectivity can be motivated by their interesting interpretation in practice. For example, suppose that $G$ represents a network. If one considers to connect a pair of vertices of $G$, then a path is used to connect them. However, if one wants to connect a set $S$ of vertices of $G$ with $|S|\geq 3$, then a tree has to be used to connect them. This kind of tree with minimum order for connecting a set of vertices is usually called a Steiner tree, and popularly used in the physical design of VLSI, see [@Sherwani]. Usually, one wants to consider how tough a network can be, for the connection of a set of vertices. Then, the number of totally independent ways to connect them is a measure for this purpose. The generalized $k$-connectivity can serve for measuring the capability of a network $G$ to connect any $k$ vertices in $G$. There have appeared many results on the generalized connectivity, see [@Chartrand1; @Chartrand2; @Okamoto; @Li1; @Li2; @Li3; @Li4; @Li5]. Chartrand et al. in [@Chartrand2] obtained the following result in the generalized connectivity. [@Chartrand2] For every two integers $n$ and $k$ with $2\leq k\leq n$, $$\kappa_k(K_n)=n-\lceil k/2\rceil.$$ The following result is given by Li et al. in [@Li4], which will be used later. [@Li4] For any connected graph $G$, $\kappa_3(G)\leq \kappa(G)$. Moreover, the upper bound is sharp. In Section 2, sharp upper and lower bounds of $\kappa_3(G)$ are given for a connected graph $G$ of order $n$, that is, $1\leq \kappa_3(G)\leq n-2$. Moreover, graphs of order $n$ such that $\kappa_3(G)=n-2,\, n-3$ are characterized, respectively. Graphs with $3$-connectivity $n-2, n-3$ ======================================= For a graph $G$, let $V(G)$, $E(G)$ be the set of vertices, the set of edges, respectively, and $|G|$ and $\|G\|$ the order, the size of $G$, respectively. If $S$ is a subset of vertices of a graph $G$, the subgraph of $G$ induced by $S$ is denoted by $G[S]$. If $M$ is a subset of edges of $G$, the subgraph of $G$ induced by $M$ is denoted by $G[M]$. As usual, the *union* of two graphs $G$ and $H$ is the graph, denoted by $G\cup H$, with vertex set $V(G)\cup V(H)$ and edge set $E(G)\cup E(H)$. Let $mH$ be the disjoint union of $m$ copies of a graph $H$. For $U\subseteq V(G)$, we denote $G\setminus U$ the subgraph by deleting the vertices of $U$ along with the incident edges from $G$. Let $d_G(v)$, simply denoted by $d(v)$, be the degree of a vertex $v$, and let $N_G(v)$ be the neighborhood set of $v$ in $G$. A subset $M$ of $E(G)$ is called a *matching* in $G$ if its elements are such edges that no two of them are adjacent in $G$. A matching $M$ saturates a vertex $v$, or $v$ is said to be *$M$-saturated*, if some edge of $M$ is incident with $v$; otherwise, $v$ is *$M$-unsaturated*. $M$ is a *maximum matching* if $G$ has no matching $M'$ with $|M'|>|M|$. If $G$ is a graph obtained from the complete graph $K_n$ by deleting an edge set $M$ and $\Delta(K_n[M])\geq 3$, then $\kappa_3(G)\leq n-4$. The observation above indicates that if $\kappa_3(G)\geq n-3$, then each component of $K_n[M]$ must be a path or a cycle. After the preparation above, we start to give our main results of this paper. At first, we give the bounds of $\kappa_3(G)$. For a connected graph $G$ of order $n \ (n\geq 3)$, $1\leq \kappa_3(G)\leq n-2$. Moreover, the upper and lower bounds are sharp. It is easy to see that $\kappa_3(G)\leq \kappa_3(K_n)$. From this together with Lemma 1, we have $\kappa_3(G)\leq n-2$. Since $G$ is connected, $\kappa_3(G)\geq 1$. The result holds. It is easy to check that the complete graph $K_n$ attains the upper bound and the complete bipartite graph $K_{1,n-1}$ attains the lower bound. For a connected graph $G$ of order $n$, $\kappa_3(G)=n-2$ if and only if $G=K_n$ or $G=K_n\setminus e$. *Necessity* If $G=K_n$, then we have $\kappa_3(G)=n-2$ by Lemma 1. If $G=K_n\setminus e$, it follows by Proposition 1 that $\kappa_3(G)\leq n-2$. We will show that $\kappa_3(G)\geq n-2$. It suffices to show that for any $S\subseteq V(G)$ such that $|S|=2$, there exist $n-2$ internally disjoint $S$-trees in $G$. Let $e=uv$, and $W=G\setminus\{u,v\}=\{w_1,w_2,\cdots,w_{n-2}\}$. Clearly, $G[W]$ is a complete graph of order $n-2$. \[0.8\][![image](1.eps)]{}\ Figure 1 The edges of a tree are by the same type of lines. If $|\{u,v\}\cap S|=1$ (See Figure 1 $(a)$), without loss of generality, let $S=\{u,w_1,w_2\}$. The trees $T_i= w_iu\cup w_iw_1\cup w_iw_2$ together with $T_1=uw_1\cup w_1w_2$, $T_2=uw_2\cup vw_2\cup vw_1$ form $n-2$ pairwise internally disjoint $S$-trees, where $i=2,\cdots,n-2$. If $|\{u,v\}\cap S|=2$(See Figure 1 $(b)$), without loss of generality, let $S=\{u,v,w_1\}$. The trees $T_i= w_iu\cup w_iv\cup w_iw_1$ together with $T_1=uw_1\cup w_1v$ form $n-2$ pairwise internally disjoint $S$-trees, where $i=2,\cdots,n-2$. Otherwise, suppose $S\subseteq W$ (See Figure 1 $(c)$). Without loss of generality, let $S=\{w_1,w_2,w_3\}$. The trees $T_i=w_iw_1\cup w_iw_2\cup w_iw_3(i=4,5,\cdots,n-2)$ together with $T_1=w_2w_1\cup w_2w_3$ and $T_2=uw_1\cup uw_2\cup uw_3$ and $T_3=vw_1\cup vw_2\cup vw_3$ form $n-2$ pairwise internally disjoint $S$-trees. From the arguments above , we conclude that $\kappa_3(K_n\setminus e)\geq n-2$. From this together with Proposition 1, $\kappa(K_n\setminus e)=n-2$. *Sufficiency* Next we show that if $G\neq K_n, K_n\setminus e$, then $\kappa_3(G)\leq n-3$, where $G$ is a connected graph. Let $G$ be the graph obtained from $K_n$ by deleting two edges. It suffices to prove that $\kappa_3(G)\leq n-3$. Let $G=K_n\setminus\{e_1,e_2\}$, where $e_1,e_2\in E(K_n)$. If $e_1$ and $e_2$ has a common vertex and form a $P_3$, denoted by $v_1,v_2,v_3$. Thus $d_G(v)=n-3$. So $\kappa_3(G)\leq \delta(G)\leq n-3$. If $e_1$ and $e_2$ are independent edges. Let $e_1=xy$ and $e_2=vw$. Let $S=\{x,y,v\}$. We consider the internally disjoint $S$-trees. It is easy to see that $d_{G}(x)=d_{G}(y)=d_{G}(v)=n-2$. Furthermore, each edge incident to $x$ (each neighbor adjacent to $x$) in $G$ belongs to an $S$-tree so that we can obtain $n-2$ $S$-trees. The same is true for the vertices $y$ and $v$. Let $\mathcal {T}$ be a set of internally disjoint $S$-trees that contains as many $S$-trees as possible and $U=N_G(x)\cap N_G(y)\cap N_G(v)$. There exist at most $|U|=n-4$ $S$-tree in $\mathcal {T}$ that contain at least one vertex in $U$. Next we show that there exist one $S$-tree in $G\setminus U$. Suppose that there exist two internally disjoint $S$-trees in $G\setminus U$. Since $G\setminus U$ is cycle of order $4$, and there exists at most one $S$-tree in $G\setminus U$. So $\kappa_3(G)=|\mathcal {T}|\leq n-3$. Let $G$ be a connected graph of order $n(n\geq 3)$. $\kappa_3(G)=n-3$ if and only if $G$ is a graph obtained from the complete graph $K_n$ by deleting an edge set $M$ such that $K_n[M]=P_4$ or $K_n[M]=P_3\cup P_2$ or $K_n[M]=C_3\cup P_2$ or $K_n[M]=r P_2( 2\leq r\leq \lfloor\frac{n}{2}\rfloor)$. *Sufficiency.*  Assume that $\kappa_3(G)=n-3$. Then $|M|\geq 2$ by Theorem 1 and each component of $K_n[M]$ is a path or a cycle by Observation 1. We will show that the following claims hold. **Claim 1.**  $K_n[M]$ has at most one component of order larger than 2. Suppose, to the contrary, that $K_n[M]$ has two components of order larger than 2, denoted by $H_1$ and $H_2$ (See Figure 2 $(a)$). Pick a set $S=\{x,y,z\}$ such that $x,y\in H_1$, $z\in H_2$, $d_{H_1}(y)=d_{H_2}(z)=2$, and $x$ is adjacent to $y$ in $H_1$. Since $d_G(y)=n-1-d_{H_1}(y)=n-3$, each edge incident to $y$ (each neighbor adjacent to $y$) in $G$ belongs to an $S$-tree so that we can obtain $n-3$ internally disjoint $S$-trees. The same is true for the vertex $z$. The same is true for the vertices $y$ and $v$. Let $\mathcal {T}$ be a set of internally disjoint $S$-trees that contains as many $S$-trees as possible and $U$ be the vertex set whose elements are adjacent to both of $y$ and $z$. There exist at most $|U|=n-6$ $S$-trees in $\mathcal {T}$ that contain a vertex in $U$. Next we show that there exist at most $2$ $S$-trees in $G\setminus U$ (See Figure 2 $(a)$). Suppose that there exist $3$ internally disjoint $S$-trees in $G\setminus U$. Since $d_{G\setminus U}(y)=d_{G\setminus U}(z)=3$, $yz$ must be in an $S$-tree, say $T_{n-5}$. Then we must use one element of the edge set $E_1=\{zx,v_2z,v_3y,v_1y\}$ if we want to reach $x$ in $T_{n-5}$. Thus $d_{T_{n-5}}(y)=2$ or $d_{T_{n-5}}(z)=2$, which implies that there exists at most one $S$-tree except $T_{n-5}$ in $G\setminus U$. So $\kappa_3(G)=|\mathcal {T}|\leq n-4$, a contradiction. \[0.8\][![image](2.eps)]{}\ Figure 2 Graphs for Claim 1 and Claim 2(The dotted lines stand for edges in $M$). **Claim 2.**  If $H$ is a component of $K_n[M]$ of order larger than three, then $K_n[M]=P_4$. Suppose, to the contrary, that $H$ is a path or a cycle of order larger than $4$, or a cycle of order $4$, or $H$ is a path of order $4$ and $K_n[M]$ has another component. If $H$ is a path or a cycle of order larger than $4$, we can pick a $P_5$ in $H$. Let $P_5=v_1,v_2,v_3,v_4,v_5$(See Figure 2 $(b)$) and $S=\{v_2,v_3,v_4\}$. Since $d_H(v_2)=d_H(v_3)=d_H(v_4)=2$, $d_{G}(v_2)=d_{G}(v_3)=d_{G}(v_4)=n-3$. Furthermore, each edge incident to $v_2$ (each neighbor adjacent to $v_2$) in $G$ belongs to an $S$-tree so that we can obtain $n-3$ $S$-trees. The same is true for the vertices $y$ and $z$. Let $\mathcal {T}$ be a set of internally disjoint $S$-trees that contains as many $S$-trees as possible and $U=N_G(v_2)\cap N_G(v_3)\cap N_G(v_4)$. There exist at most $|U|=n-5$ $S$-tree in $\mathcal {T}$ that contain at least one vertex in $U$. Next we show that there exist at most one $S$-tree in $G\setminus U$ (See Figure 2 $(b)$). Suppose that there exist two internally disjoint $S$-trees in $G\setminus U$. Since $d_{G\setminus U}(v_2)=d_{G\setminus U}(v_4)=2$, $v_2v_4$ must be in an $S$-tree, say $T_{n-5}$. Then we must use one element of $\{v_1,v_5\}$ if we want to reach $v_3$ in $T_{n-5}$. This implies that there exists at most one $S$-tree except $T_{n-5}$ in $G\setminus U$. So $\kappa_3(G)=|\mathcal {T}|\leq n-4$, a contradiction. If $H$ is a cycle of order $4$, let $H=v_1,v_2,v_3,v_4$(See Figure 2 $(c)$), and $S=\{v_1,v_2,v_3\}$. Since $d_H(v_1)=d_H(v_2)=d_H(v_3)=2$, $d_{G}(v_1)=d_{G}(v_2)=d_{G}(v_3)=n-3$. Furthermore, each edge incident to $v_1$ in $G$ belongs to an $S$-tree so that we can obtain $n-3$ $S$-trees. The same is true for the vertices $v_2$ and $v_3$. Let $\mathcal {T}$ be a set of internally disjoint $S$-trees that contains as many $S$-trees as possible and $U=N_G(v_2)\cap N_G(v_3)\cap N_G(v_4)$. There exist at most $|U|=n-4$ $S$-trees in $\mathcal {T}$ that contain at least one vertex in $U$. It is obvious that $G\setminus U$ is disconnected, and we will show that there exists no $S$-tree in $G\setminus U$(See Figure 2 $(c)$). So $\kappa_3(G)=|\mathcal {T}|\leq n-4$, a contradiction. . Otherwise, $H$ is a path order $4$ and $K_n[M]$ has another component. By Claim 1, the component must be an edge, denoted by $P_2=u_1u_2$. Let $H=P_4=v_1,v_2,v_3,v_4$(See Figure 3 $(a)$) and $S=\{v_2,v_3,u_1\}$. Since $d_H(v_2)=d_H(v_3)=2$, we have $d_{G}(v_2)=d_{G}(v_3)=n-3$. Furthermore, each edge incident to $v_2$ (each neighbor adjacent to $v_2$) in $G$ belongs to an $S$-tree so that we can obtain $n-3$ $S$-trees. The same is true for the vertex $v_3$. Let $\mathcal {T}$ be a set of internally disjoint $S$-trees that contains as many $S$-trees as possible and $U$ be the vertex set whose elements are adjacent to both of $v_2$, $v_3$ and $u_1$. There exist at most $|U|=n-6$ $S$-trees in $\mathcal {T}$ that contain at least one vertex in $U$. Next we show that there exist at most two $S$-trees in $G\setminus U$. Suppose that there exist $3$ internally disjoint $S$-trees in $G\setminus U$. Since $d_{G\setminus U}(v_2)=d_{G\setminus U}(v_3)=3$, each edge incident to $v_2$ (each neighbor adjacent to $v_2$) in $G$ belongs to an $S$-tree so that we can obtain $3$ $S$-trees. The same is true for the vertex $v_3$. This implies that $v_2u_2$ belongs to an $S$-trees, denoted by $T_1$, and $v_3u_2$ belongs to an $S$-trees, denoted by $T_2$. Clearly, $T_1=T_2$. Otherwise, $u_2\in T_1\cap T_2$, which contradicts to that $T_1$ and $T_2$ are internally disjoint $S$-trees. Then $v_2u_2,v_3u_2\in E(T_{1})$. If we want to form $T_{1}$, we need the vertex $v_1$ or $v_4$. Without loss of generality, let $v_1\in V(T_{1})$. It is easy to see that there exists exactly one $S$-tree except $T_{1}$ in $G\setminus U$ (See Figure 3 $(b)$), which implies that $\kappa_3(G)\leq n-4$. So $\kappa_3(G)=|\mathcal {T}|\leq n-4$, a contradiction. **Claim 3.**  If $H$ is a component of $K_n[M]$ of order $3$, then $K_n[M]=C_3\cup P_2$ or $K_n[M]=P_3\cup P_2$. By the similar arguments to the claims above, we can deduce the claim. \[0.8\][![image](3.eps)]{}\ Figure 3 Graphs for Claim 2(The dotted lines stands for edges in $M$). From the arguments above, we can conclude that $G$ is a graph obtained from the complete graph $K_n$ by deleting an edge set $M$ such that $K_n[M]=P_4$ or $K_n[M]=P_3\cup P_2$ or $K_n[M]=C_3\cup P_2$ or $K_n[M]=r P_2(2\leq r\leq \lfloor\frac{n}{2}\rfloor)$. *Necessity.* We show that $\kappa_3(G)\geq n-3$ if $G$ is a graph obtained from the complete graph $K_n$ by deleting an edge set $M$ such that $K_n[M]=P_4$ or $K_n[M]=P_3\cup P_2$ or $K_n[M]=C_3\cup P_2$ or $K_n[M]=r P_2( 2\leq r\leq \lfloor\frac{n}{2}\rfloor)$. We consider the following cases: **Case 1.**  $K_n[M]=r P_2(2\leq r\leq \lfloor\frac{n}{2}\rfloor)$. In this case, $M$ is a matching of $K_n$. We only need to prove that $\kappa_3(G)\geq n-3$ when $M$ is a maximum matching of $K_n$. Let $S=\{x,y,z\}$. Since $|S|=3$, $S$ contains at most a pair of adjacent vertices under $M$. If $S$ contains a pair of adjacent vertices under $M$, denoted by $x$ and $y$, then the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_1=xy\cup yz$ form $n-3$ pairwise internally disjoint trees connecting $S$, where $\{w_1,w_2,\cdots,w_{n-4}\}=V(G)\setminus \{x,y,z,z'\}$ such that $z'$ is the adjacent vertex of $z$ under $M$ if $z$ is $M$-saturated, or $z'$ is any vertex in $V(G)\setminus \{x,y,z\}$ if $z$ is $M$-unsaturated. If $S$ contains no pair of adjacent vertices under $M$, then the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_1=yx\cup xy'\cup y'z$ and $T_2=yx'\cup zx'\cup zx$ and $T_3=zy\cup yz'\cup z'x$ form $n-3$ pairwise edge-disjoint $S$-trees, where $\{w_1,w_2,\cdots,w_{n-6}\}=V(G)\setminus \{x,y,z,x',y',z'\}$, $x',y',z'$ are the adjacent vertices of $x,y,z$ under $M$, respectively, if $x,y,z$ are all $M$-saturated, or one of $x',y',z'$ is any vertex in $V(G)\setminus \{x,y,z\}$ if the vertex is $M$-unsaturated. From the arguments above , we know that $\kappa(S)\geq n-3$ for $S\subseteq V(G)$. Thus $\kappa_3(G)\geq n-3$. From this together with Theorem 1, we know $\kappa_3(G)=n-3$. **Case 2.**  $K_n[M]=C_3\cup P_2$ or $K_n[M]=P_3\cup P_2$. If $\kappa_3(G)\geq n-3$ for $K_n[M]=C_3\cup P_2$, then $\kappa_3(G)\geq n-3$ for $K_n[M]=P_3\cup P_2$. So we only consider the former. Let $C_3=v_1,v_2,v_3$ and $P_2=u_1u_2$, and let $S=\{x,y,z\}$ be a $3$-set of $G$. If $S=V(C_3)$, then there exist $n-3$ pairwise internally disjoint $S$-trees since each vertex in $S$ is adjacent to each vertex in $G\setminus S$. Suppose $S\neq V(C_3)$. If $|S\cap V(C_3)|=2$, without loss of generality, assume that $x=v_1$ and $y=v_2$. When $S\cap V(P_2)\neq \emptyset$, say $z=u_1$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_{n-4}=xz\cup yz$ and $T_{n-3}=xu_2\cup u_2v_3\cup zv_3\cup u_2y$ form $n-3$ pairwise internally disjoint trees connecting $S$, where $\{w_1,w_2,\cdots,w_{n-5}\}=V(G)\setminus \{x,y,z,u_2,v_3\}$. When $S\cap V(P_2)=\emptyset$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_{n-3}=xz\cup zy$ are $n-3$ pairwise internally disjoint trees connecting $S$, where $\{w_1,w_2,\cdots,w_4\}=V(G)\setminus \{x,y,z,v_3\}$. If $|S\cap V(C_3)|=1$, without loss of generality, assume $x=v_1$. When $|S\cap V(P_2)|=2$, say $y=u_1$ and $z=u_2$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_{n-4}=xz\cup v_2z\cup v_2y$ and $T_{n-3}=xy\cup yv_3\cup zv_3$ form $n-3$ pairwise internally disjoint trees connecting $S$, where $\{w_1,w_2,\cdots,w_{n-5}\}=V(G)\setminus \{x,y,z,v_2,v_3\}$. When $S\cap V(P_2)=1$, say $u_1=y$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_{n-5}=xz\cup zy$ and $T_{n-4}=xu_2\cup u_2v_2\cup v_2y\cup v_2z$ and $T_{n-3}=xz\cup zv_3\cup v_3y$ are $n-3$ pairwise internally disjoint trees connecting $S$, where $\{w_1,w_2,\cdots,w_{n-6}\}=V(G)\setminus \{x,y,z,v_2,v_3,u_2\}$. When $|S\cap V(P_2)|=\emptyset$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_{n-4}=xz\cup zy$ and $T_{n-3}=xy\cup yv_3\cup zv_3$ form $n-3$ pairwise internally disjoint $S$-trees, where $\{w_1,w_2,\cdots,w_{n-5}\}=V(G)\setminus \{x,y,z,v_2,v_3\}$. If $S\cap V(C_3)=\emptyset$, when $|S\cap V(P_2)|=0$ or $|S\cap V(P_2)|=2$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ form $n-3$ pairwise internally disjoint $S$-trees, where $\{w_1,w_2,\cdots,w_{n-3}\}=V(G)\setminus \{x,y,z\}$. When $S\cap V(P_2)=1$, say $u_1=x$, the trees $T_i=w_ix\cup w_iy\cup w_iz$ together with $T_{n-3}=xz\cup zy$ form $n-3$ pairwise internally disjoint $S$-trees, where $\{w_1,w_2,\cdots,w_{n-4}\}=V(G)\setminus \{x,y,z,u_2\}$. From the arguments above , we conclude that $\kappa(S)\geq n-3$ for $S\subseteq V(G)$. Thus $\kappa_3(G)\geq n-3$. From this together with Theorem 1, it follows that $\kappa_3(G)=n-3$. **Case 3.**  $K_n[M]=P_4$. This case can be proved by an argument similar to Cases 1 and 2. [11]{} J.A. Bondy, U.S.R. Murty, *Graph Theory*, GTM 244, Springer, 2008. G. Chartrand, S.F. Kappor, L. Lesniak, D.R. Lick, *Generalized connectivity in graphs*, Bull. Bombay Math. Colloq. 2(1984), 1-6. G. Chartrand, F. Okamoto, P. Zhang, *Rainbow trees in graphs and generalized connectivity*, Networks 55(4)(2010), 360-367. S. Li, W. Li, X. Li, *The generalized connectivity of complete bipartite graphs*, Ars Combin. 104(2012). S. Li, X. Li, *Note on the hardness of generalized connectivity*, J. Combin. Optimization, in press. S. Li, X. Li, Y. Shi, *The minimal size of a graph with generalized connectivity $\kappa_3(G)=2$*, Australasian J. Combin. 51(2011), 209-220. S. Li, X. Li, W. Zhou, *Sharp bounds for the generalized connectivity $\kappa_3(G)$*, Discrete Math. 310(2010), 2147-2163. X. Li, Y. Mao, Y. Sun, *The generalized connectivity and generalized edge-connectivity*, arXiv:1112.0127 \[math.CO\] 2011. F. Okamoto, P. Zhang, *The tree connectivity of regular complete bipartite graphs*, J. Combin. Math. Combin. Comput. 74(2010), 279-293. N.A. Sherwani, *Algorithms for VLSI physical design automation*, 3rd Edition, Kluwer Acad. Pub., London, 1999. [^1]: Supported by NSFC No.11071130.
Mid
[ 0.605150214592274, 35.25, 23 ]
Aluminum Cheap Element Case For Iphone 5g Shop Aluminum Cheap Element Case For Iphone 5g now and get amazing discounts! Save big on shipping and see more similar products available at great prices for amazing values. Casesinthebox is the best online shop for all products from home appliance to makeup. All products are offered at wholesale discount prices and shipping the whole world. You just need several minutes while you will get the best user experience you never have before.
Low
[ 0.38730853391684905, 22.125, 35 ]
#repost @roger_wine1 I couldn’t help myself.. let’s take another trip to a different side of Toscano just outside of Bolgheri. Lodovico and Piero teamed up to find this Vineyard near Ornellaia and Sassicaia to make this beautiful Bordeaux style blend of cab franc, merlot, Cabernet, petite Verdot blend.. 2010 Bibbona Biserno . Same vintage as the Felsina but so much more purity and balance in the acidity. Drinking great but can go another 5-8 years. #antinori#somm#sommelier#lodovico#bibbona#tuscany#wine#winelove#love#vineyard#blends#altamaremma _#repost @roger_wine1 : I couldn’t help myself.. let’s take another trip to a different side of Toscano just outside of Bolgheri. Lodovico and Piero teamed up to find this Vineyard near Ornellaia and Sassicaia to make this beautiful Bordeaux style blend of cab franc, merlot, Cabernet, petite Verdot blend.. 2010 Bibbona Biserno . Same vintage as the Felsina but so much more purity and balance in the acidity. Drinking great but can go another 5-8 years. #antinori#somm#sommelier#lodovico#bibbona#tuscany#wine#winelove#love#vinayard#blends#altamaremma I couldn’t help myself .. let’s take another trip to a different side of Toscano just outside of Bolgheri. Lodovico and Piero teamed up to find this Vineyard near Ornellaia and Sassicaia to make this beautiful Bordeaux style blend of cab franc , merlot , Cabernet, petite Verdot blend .. 2010 Bibbona Biserno. Same vintage as the Felsina but so much more purity and balance in the acidity . Drinking great but can go another 5-8 years . #antinori#somm#sommelier#lodovico#bibbona#tuscany#wine#winelover#love#vineyard#blends
High
[ 0.682857142857142, 29.875, 13.875 ]
Q: Same named function with multiple arguments in PHP I started off OOP with Java, and now I'm getting pretty heavy into PHP. Is it possible to create multiples of a function with different arguments like in Java? Or will the interpreted / untyped nature of the language prevent this and cause conflicts? A: Everyone else has answers with good code explanations. Here is an explanation in more high level terms: Java supports Method overloading which is what you are referring to when you talk about function with the same name but different arguments. Since PHP is a dynamically typed language, this is not possible. Instead PHP supports Default arguments which you can use to get much the same effect. A: If you are dealing with classes you can overload methods with __call() (see Overloading) e.g.: class Foo { public function doSomethingWith2Parameters($a, $b) { } public function doSomethingWith3Parameters($a, $b, $c) { } public function __call($method, $arguments) { if($method == 'doSomething') { if(count($arguments) == 2) { return call_user_func_array(array($this,'doSomethingWith2Parameters'), $arguments); } else if(count($arguments) == 3) { return call_user_func_array(array($this,'doSomethingWith3Parameters'), $arguments); } } } } Then you can do: $foo = new Foo(); $foo->doSomething(1,2); // calls $foo->doSomethingWith2Parameters(1,2) $foo->doSomething(1,2,3); // calls $foo->doSomethingWith3Parameters(1,2,3) This might not be the best example but __call can be very handy sometimes. Basically you can use it to catch method calls on objects where this method does not exist. But it is not the same or as easy as in Java. A: Short answer: No. There can only be one function with a given name. Longer answer: You can do this by creating a convoluted include system that includes the function with the right number of arguments. Or, better yet, you can take advantage of PHP allowing default values for parameters and also a variable amount of parameters. To take advantage of default values just assign a value to a parameter when defining the function: function do_something($param1, $param2, $param3 = 'defaultvaule') {} It's common practice to put parameters with default values at the end of the function declaration since they may be omitted when the function is called and makes the syntax for using them clearer: do_something('value1', 'value2'); // $param3 is 'defaultvaule' by default You can also send a variable amount of parameters by using func_num_args() and func_get_arg() to get the arguments: <?php function dynamic_args() { echo "Number of arguments: " . func_num_args() . "<br />"; for($i = 0 ; $i < func_num_args(); $i++) { echo "Argument $i = " . func_get_arg($i) . "<br />"; } } dynamic_args("a", "b", "c", "d", "e"); ?>
Mid
[ 0.5667447306791561, 30.25, 23.125 ]
Seven Last Words: Paradise “Truly, I tell you, today, you will be with me in Paradise” (Luke 23:43) Our world is a world that has closed itself off from the transcendent. We have bought into the discourses of science that tells us the immediately tangible is all there is, everything else is suspected as superstition. Do not get me wrong, science has earned its place in the world, and many need to listen to its voice more. Science has offered enormous explanatory power for our worldview. In the great feuds between scriptural literalism and science, science will usually win. We have found the sun does not revolve around the earth, that the earth is much older than chronicled, that rain comes from weather systems, illness from poor hygiene, etc. The world has pushed God out of its purview. God has been viewed as too burdensome a notion to trust. The events of the primordial church fade into the distance of history. History, itself, seems to crocked a path to see providence. Divine intervention seems like misconstrued co-incidence. Many of the great political advances have been done despite religious influences. We immerse ourselves in the comforting hum of media noise. Talk of God becomes as rare as genuine conversation itself. Hearing from God becomes as rare as genuine listening itself. An atheism falls over us because we feel the blunt force of divine absence. Our daily lives, even for many Christians, are often practically atheist. Church becomes an cumbersome ritual. Work is more important than worship. Singing praise to God does not feed a family. Prayer and Scripture reading get sidelined to more relaxing practices: Television, sports, etc. So, we say to ourselves, why bother believe? However, we deceive ourselves into thinking the modern world was the first to discover doubt, as if doubt was an invention by the same brilliance that discovered flight, electricity, or the theory of relativity. Yet, doubt is not a modern novelty. The cross was a scary time for Jesus and his followers. The cosmos, let alone their little band of disciples, hung in the balance. The circumstances had become so chancy that most of the disciples deserted Jesus: belief in this man as the messiah was simply too insecure at that moment. Peter initially drew his weapon to defend his lord, but upon realization that violence was not going to resolve the conflict between Christ and the priests, upon seeing his master taken rather than fighting back, unleashing the kingdom of power that he was expecting him to unleash, Peter himself turned to deny Christ, three times in fact. Other disciples deserted him far sooner, unfortunately. Thus, there Christ hung, condemned, and by all accounts at that very moment, defeated and disproved. Jesus as messiah was no longer a tenable conviction anymore. He did not seem to be bringing in a new kingdom, as prophesied. He did not defeat the Roman occupation, as prophesied. Far from! There he was pathetic, disheveled, beaten into irrevocable submission to the powers he should have pulverized with legions of the faithful, perhaps having even angel armies come to assist. Thus, Pilate, either out of mockery to the Jewish people or out of some deep seated pious guilt over killing a truly innocent man, wrote “King of the Jews” and hung it over Jesus’ head. If one was to look for a reason to believe in Christ at that moment, one would have looked in vain. The man on the cross was exposed many times over as just a man, flesh and blood, ashes and dust, rejected by his people, betrayed by his closest followers and friends, accused of blasphemy by his own religion’s authorities, tortured and in the midst of his execution by his people’s most hated enemies, the most idolatrous power in existence, hanging there, slowly bleeding out, slowly succumbing to his wounds, to thirst, and to death. Atheism’s objections pale in comparison to the scandal of Good Friday. As onlookers mocked and jeered, even a man, a wretched thief, dying the same death as Christ next to him, felt no solidarity with the co-condemned, no compassion for his neighbor in this death, only cynicism and despair. Even the thief on Jesus’ one side mocked him. At this moment, there seems to be no good reason to trust Jesus. Jesus hung there, discredited. Would you have believed that Jesus was the messiah then? I know I probably would not have. Sadly, that is because I am a “reasonable” person. More sadly, is that the only reasonable people in this story are monsters: Judas, who calculates how to profit from Jesus’ arrest; the Pharisees, who have the foresight to plan against possible agitators; the Romans, who brilliantly invented means of rebellion suppression. And yet, in this moment of darkness and doubt, despair and destruction, one person believed! One person dared to see something more. One person had faith. The other thief, what tradition refers to as the “penitent thief,” dying at Jesus’ side. He believed. He had nothing left to hold back. He could have mocked like the other thief, but he didn’t. We know next to nothing about this person. The Gospels left him unnamed. Having no hope left in this world, he still says to the other thief, “Do you not fear God? You are under the same punishment.” He admits that his punishment is just, yet Christ’s is not. Christ is innocent and he is not. At the very end of his life, he is moved with humility and honesty. But his confession is more radical than that. If one was worried about self-preservation, they would have petitioned far more prestigious powers than a dying messiah. When no one else believed in Jesus, this man did. And so he simply requests that Jesus would remember him when he comes into his kingdom. He, in the darkness moment of his life, in the darkness moment in history, chose to trust the kingdom is still coming. This man had perhaps the greatest faith in all history, and yet we do not know his name! But God does. God is not dead because God did not stay dead. Jesus did promise to remember him. In fact, this man, in his final moments of life, was given the most definitive assurance anyone had before the resurrection: Jesus turned to the man and said, “Today, I truly tell you, you will be with me in paradise.” Sadly, it is only when we realize that our lives stand on the edge of oblivion that we can feel assured that our lives are in the hands of something more absolute than what this world offers. Father, Help us to have even just a fraction of the faith this man had. We complain about our lot in life, yet we are unwilling to admit our faults. We so often mock and mistrust your salvation. When we do that, we must acknowledge that our punishment, like his is just.
Mid
[ 0.5965665236051501, 34.75, 23.5 ]
Q: Likely RS-485 color coding of three wires? We received a piece of equipment (actually from an Italian manufacturer, if that gives a hint) which uses RS-485. So, as well as a power connection the devices have THREE WIRES (bare wires) coming from the relevant board, being white, gray, black. We have all the custom communications protocol in a PDF, but they neglected to include a mention of the wiring of the RS-485. Can you guess which is A, B, Reference? Is there a typical color scheme for the three, for "raw" 485 wires? As it happens the engineers are completely on holiday for a week! (Typical production hang-up right?) Also just generally curious if there is a typical standard for this. Just FTR if relevant, the plan by us and them was that the three wires would connect to a convertor to RS-232 and hence to an ordinary (ie Windows8) PC; cable lengths are only a meter or two. A: Joe - forget about hopes of finding a standard color scheme. The simplest thing is that the Reference (Common) lead will connect to the GND of the circuit. That should be dead simple to discover which one with a multi-meter. Finding that the other two will be the A and B lines. Hook those up one way and see if any protocol makes sense. If not then hook them up the other way.
Mid
[ 0.550827423167848, 29.125, 23.75 ]
FIG. 14 is a diagram illustrating the structure of a conventional PLL equipped with a variable frequency divider has pulse-swallow architecture. As shown in FIG. 14, the PLL comprises an amplifier 201 for amplifying the output (whose frequency ftcxo is 14.4 MHz) of an externally mounted temperature-compensated crystal oscillator (TCXO) 200; a reference-frequency dividing circuit 202 for frequency-dividing the output of the amplifier 201; a phase comparator 203 for sensing the phase difference between a reference signal (frequency f≈400 KHz), which is the result of frequency division by the reference-frequency dividing circuit 202, and a frequency-divided clock; a charge pump 204 for charging a capacitance (not shown) when the phase comparator 203 is outputting an UP signal in accordance with the result of the phase comparison and for discharging the charge, which has accumulated in the capacitance, when the phase comparator 203 is outputting a DOWN signal in accordance with the result of the phase comparison; a low-pass filter (loop filter) LPF 205 for smoothing the terminal voltage of the capacitance charged/discharged by the charge pump 204; a voltage-controlled oscillator (VCO) 206, to which the output voltage of the LPF 205 is input as a control voltage, for oscillating at a frequency conforming to the control voltage and outputting a signal having this frequency; a divide-by-P or divide-by-(P+1) frequency dividing circuit (referred to also as a “prescaler”) 207 composed by ECL (emitter-coupled logic) circuits for frequency-dividing the output of the voltage-controlled oscillator 206 by P or (P+1); and an A counter 209 and B counter 210 for counting the output of the prescaler 207. The phase comparator 203 compares the phase of an (A×P+B)-divided signal, which is output from a control circuit 213, and the phase of the reference signal. An MC (modulus control) signal supplied to the prescaler 207 from the B counter 210 is a control signal for changing the frequency-dividing factor of the P, (P+1) frequency dividing prescaler 207. The prescaler 207 functions as a divide-by-P prescaler when the signal MC is at HIGH level and as a divide-by-(P+1) prescaler when the signal MC is at LOW level. A modulus-control prescaler circuit according to the prior art will be described with reference to FIG. 15, which is a diagram illustrating the prescaler 207 and counters 209 and 210 extracted from the PLL circuit shown in FIG. 14. As shown in FIG. 15, the prescaler 207 includes D-type flip-flops 22 to 25 each of which has its data output terminal connected to the data input terminal of the D-type flip-flop of the next stage and each of which has a clock terminal to which an output signal of the voltage-controlled oscillator (referred to simply as a “VCO”) 206 is supplied to thereby construct a 4-stage shift register; an OR gate 21 having a first input terminal connected to an inverting output terminal QB of the D-type flip-flop 25 and an output terminal connected to the data input terminal of the D-type flip-flop 22; an OR gate 26 having a non-inverting output terminal Q of the D-type flip-flop 25 and the output terminal of an OR gate 28 connected to first and second input terminals, respectively; and a D-type flip-flop 27 having the output terminal of the OR gate 26 connected to its data input terminal and having the output clock of the VCO 206 input to its clock terminal. The D-type flip-flop 27 has an inverting output terminal QB connected to the second input terminal of the OR gate 21. The non-inverting output terminal Q of the D-type flip-flop 25 is input to the clock input terminal of the D-type flip-flop 29 and the inverting output terminal QB of the D-type flip-flop 29 is connected to its own data input terminal to thereby construct a frequency dividing circuit. The non-inverting output terminal Q of the D-type flip-flop 29 is input to the clock input terminal of the D-type flip-flop 30 and the inverting output terminal QB of the D-type flip-flop 30 is connected to its own data input terminal to thereby construct a frequency dividing circuit. The non-inverting output terminal Q of the D-type flip-flop 30 is output to the A counter 209 and B counter 210 as the frequency-divided output of the prescaler 207. The MC signal and the non-inverting output terminals Q of the D-type flip-flops 29 and 30 are input to the OR gate 28, the output of which is input to the OR gate 26. Assume that the MC signal is at logic “1” (=HIGH). At such time the OR gate 28, one input of which is the MC signal, outputs logic “1”. The OR gates 26 outputs “1” at all times. In response to the output clock of the VCO 206, the D-type flip-flop 27 latches logic “1”, which is applied to its data input terminal, outputs logic “0” from its inverting output terminal QB and delivers this output to the OR gate 21. The prescaler 207 is of the type that performs frequency division by 32 or 33. First, however, the 4-stage shift register comprising the D-type flip-flops 22, 23, 24, and 25 is driven by the output clock of the VCO 206 to perform frequency division by 8. More specifically, the 4-stage shift register comprising the D-type flip-flops 22, 23, 24, and 25 composes a 4-bit ring counter driven by the output clock of the VCO 206. If the inverting output terminal QB of the D-type flip-flop 25 is “1”, the output of the OR gate 21 is “1”. One round is completed by eight clocks, which enter one at a time as the output clock from the VCO 206. The states of the D-type flip-flops 25, 24, 23, and 22 undergo a transition as follows: The state initially is “0000” and becomes “0001”, “0011”, “0111”“1111”, “1110”, “1100”, “1000”, and “0000” at the first, second, third, fourth, fifth, sixth, seventh and eighth clocks, respectively, of the output clocks from the VCO 206. The D-type flip-flop 25 alternatingly outputs four clocks of successive “1”s and four clocks of successive “0”s. Thus, the output of the D-type flip-flop 25 is a signal obtained by 1/8 division of the frequency of the output clock from the VCO 206. The output of the D-type flip-flop 25 is input to the OR gate 26. The OR gate 26 inputs “1” to the data input terminal of the D-type flip-flop 27 and the inverting output terminal QB of the D-type flip-flop 27 is made “0”. The non-inverting output terminals Q of the D-type flip-flops 29 and 30 enter the OR gate 28, the output of which is input to the data input terminal of the D-type flip-flop 27 via the OR gate 26. The two stages of D-type flip-flops 29 and 30 compose a divide-by-4 frequency dividing circuit. The output of the 4-stage shift register comprising the D-type flip-flops 22, 23, 24 and 25 is divided by 4 by the D-type flip-flops 29 and 30. Thus, division by 32 is achieved. When the MC signal is at logic “0” (=LOW), on the other hand, the OR gate 28 outputs logic “0” when the non-inverting output terminals Q of the D-type flip-flops 30 and 29 are both “0”. The OR gate 26 transmits the output at the non-inverting output terminal Q of D-type flip-flop 25 to the data input terminal D of the D-type flip-flop 27. More specifically, the flip-flops 29 and 30 clocked by the 1/8 frequency-divided output of the 4-stage register comprising the D-type flip-flops 22, 23, 24 and 25 changes in state in the manner “1010”, and “1100”. The output of the OR gate 28 becomes “0” if the outputs of the flip-flops 29, 30 both become “0”, i.e., at a rate of once per four clocks output from the D-type flip-flop 25. When the output of the OR gate 28 is “0”, the D-type flip-flop 27 constructs a shift register together with the D-type flip-flops 22, 23, 24, and 25. At the moment the output of the OR gate 28 changes to “0”, the state of the D-type flip-flop 27 is “1” (because the output of OR gate 28 is “1” immediately prior thereto and “1” enters the data input terminal D of the D-type flip-flop 27 via the OR gate 26), the inverting output terminal QB of the D-type flip-flop 27 is “0”, the state of the D-type flip-flop 25 is “0” and the inverting output terminal QB of the D-type flip-flop 25 becomes “1”. If the output of the OR gate 28 is “0”, the OR gate 26 transmits the output of the D-type flip-flop 25 to the data input terminal of the D-type flip-flop 27 as is. Whenever the output clock of the VCO 206 enters, the states of the D-type flip-flops 27, 25, 24, 23, and 22 undergo a transition in nine clock cycles in the following manner: “10000”, “00001”, “00011”, “00111”, “01111”, “11111”, “11110”, “11100”, “11000”, and “10000”. That is, the shift register of prescaler 207 implements frequency division by 9. Among the four cycles of the divide-by-4 frequency dividing circuit of D-type flip-flops 29 and 30, division by 8 are executed in three cycles and division by 9 in one cycle. Accordingly, when signal MC=“0” holds, the frequency-dividing factor of prescaler 207 is8×3+9=33 Described next will be a case where frequency division by N is carried out using a pulse-swallow-type variable frequency dividing circuit that employs the prescaler 207 and two programmable counters 209 and 210. Let N represents the total frequency-dividing factor. If a represents the quotient and b the remainder (where 0<b<32 holds) when N is divided by 32 (though a number other than 32 may be used, 32 is adopted here owing to the relationship to FIG. 15), then N will become as follows:N=32×a+b In a case where N is obtained by frequency division by 32, 33, the above is transformed toN=32×(a−b)+33×b(where a>=b holds) and remainder b can be implemented by an operation dividing by 33 and dividing by 32 the remaining number of times. A pulse-swallow counter is implemented by the combination of two binary counters 209 and 210. In case of frequency division by 32, 33, a is the quotient obtained by dividing N by 32, e.g., a value of the six higher order bits or more, and b takes on the value of the five lower order bits. When an actual operation is performed, the A counter 209 and B counter 210 both count up to set count values A′, B′ or count down from the set values A′, B′ simultaneously in response to the output of the prescaler 207. In this case, the values A′, B′ become a, b, respectively. Until the prescribed value b is attained or until the B counter 210 counts down to 0 starting from the count value b, the MC signal is placed at LOW level and the prescaler 207 performs division by 33. In other words, the B counter 210 counts the 1/33 frequency-divided output of the prescaler 207 b times. After the B counter 210 has counted the 1/33 frequency-divided output of the prescaler 207 b times, the MC signal is placed at HIGH level. The A counter 209 counts the 1/32 frequency-divided output of the prescaler 207 (a−b) times, namely the remaining number of times until the count value a is attained or until 0 is reached starting from a. The frequency-dividing factor N, namelyN=32×(a−b)+33×bis realized by this series of operations. Thus it is possible to realize any frequency-dividing factor N. With regard to publications relating to the above-described pulse-swallow-type variable frequency dividing circuit equipped with a prescaler having two frequency-dividing factors P and (P+1) and two counters, see the specifications of JP Patent Kokai Publication JP-A-6-69788 and JP-A-6-120815, by way of example. In a case where the structure of the above-described pulse-swallow-type variable frequency dividing circuit is such that the output frequency of the VCO 206 is close to the boundary operating frequency of the device constituting the prescaler 207, adopting a hierarchical arrangement for the counters is a useful technique for obtaining any number of frequency divisions in an efficient manner. However, since it is necessary to operate the shift register of the prescaler 207 by the output clock of the VCO 206, a large number of elements that operate at high speed are required. Further, reducing power consumption is difficult because the A counter 209 and B counter 210 are operated simultaneously. Furthermore, the MC signal supplied to the prescaler 207 is required to operate earlier than the output period of the prescaler 207, which performs a high-speed frequency dividing operation. This makes it difficult to design the proper timing.
Mid
[ 0.616632860040567, 38, 23.625 ]
Ben Branam was born in California and moved to Austin in 2004. Four months ago, he moved to San Antonio to help start a church and pursue his own business, Modern Self Protection. Ben spent 10 years in the Marine Corps, did a combat tour in Iraq, spent a year as part of an anti-terrorist company, and taught anti-terrorism, shooting, and advance combat skills. He left to take a job as a private contractor for the Army in Iraq. Note: This is an mySA.com City Brights Blog. These blogs are not written or edited by mySA or the San Antonio Express-News. The authors are solely responsible for the content. AH! PTSD! Post Traumatic Stress Disorder is everywhere, and people are trying to blame it for everything. Even the Fort Hood shooting was blamed on PTSD (even-though the shooter had never been overseas). Post-traumatic stress happens to everyone. It’s probably happened to you. Ever have a close call while driving and had your pulse race when you thought about it later? That’s post-traumatic stress. The disorder part comes when you can’t stop reliving that stress. Every person that comes close to death will have post-traumatic stress. The more people around you that have gone through the same thing makes it easier to break the stress. When you have a close call in the car, everyone can relate, and talk about a car accident. Not many people will talk about having someone try to kill them during a bank robbery. So not many people can relate, and it feels like no one understands. In the next couple weeks I’m going to discuss the things I went through after combat in 2003. I have pictures of bullet holes that should have killed me. My entire unit should have been wiped out more then once. I can’t even remember how many times I should have died in the first four months in Iraq. If you are dealing with anything that people don’t understand, keep talking to people until you find someone that does understand. It doesn’t have to be a counselor. Your close friends and family are a good place to start. If you can’t find anyone, e-mail me at ben@modernselfprotection and I’ll talk to you.
High
[ 0.6732673267326731, 34, 16.5 ]
Arabidopsis thaliana CML25 mediates the Ca(2+) regulation of K(+) transmembrane trafficking during pollen germination and tube elongation. The concentration alteration of cytosolic-free calcium ([Ca(2+) ]cyt ) is a well-known secondary messenger in plants and plays important roles during pollen grain germination and tube elongation. Here we demonstrate that CML25, a member of calmodulin-like proteins, has Ca(2+) -binding activity and plays a role in pollen grain germination, tube elongation and seed setting. CML25 transcript was abundant in mature pollen grains and pollen tubes, and its product CML25 protein was primarily directed to the cytoplasm. Two independent CML25 loss-of-function T-DNA insertion mutants suffered a major reduction in both the rate of pollen germination and the elongation of the pollen tube. Also, pollen grains of cml25 mutants were less sensitive to the external K(+) and Ca(2+) concentration than wild-type pollen. The disruption of CML25 increased the [Ca(2+) ]cyt in both the pollen grain and the pollen tube, which in turn impaired the Ca(2+) -dependent inhibition of whole-cell inward K(+) currents in protoplasts prepared from these materials (pollen grain and pollen tube). Complementation of cml25-1 mutant resulted in the recovery of wild-type phenotype. Our findings indicate that CML25 is an important transducer in the Ca(2+) -mediated regulation of K(+) influx during pollen germination and tube elongation.
High
[ 0.6900269541778971, 32, 14.375 ]
Combine flour, sugar, soda and salt; add eggs, salad oil (do not beat). Add pineapple and juice, bananas, nut. Put in a 9 x 13 pan. Bake at 350 for approximately 60 minutes or until a toothpick inserted in the center comes out clean. Cream cheese frosting is perfect on this cake. The cake can be frozen and brought out and iced at a future date.
Mid
[ 0.654292343387471, 35.25, 18.625 ]
Company Rating 49 FB users likes Curtains Drapes Toronto, set it to 22 position in Likes Rating for Mississauga, Ontario in Home improvement category Interesting fact: When a silkworm is born it eats more than 50,000 times his initial body weight in mulberry leaves within six weeks. Are you considering getting silk curtains for your home? If so, check out some of the possibilities at http://curtainsdrapestoronto.ca/. Published on 2015-04-09 02:53:00 GMT Did you know: All but ten percent of the world’s silk is produced by the Bombyx mori silkworm. That silkworm makes it possible for us to provide beautiful silk curtains for our customers. If you’d like to see the silk and other curtains that we have available, visit us at http://curtainsdrapestoronto.ca/. Published on 2015-04-07 02:53:01 GMT Did you know: 7% of the world’s cotton comes from Texas. If you’d like to see what we do with cotton, take a look at our cotton curtains and drapes at http://curtainsdrapestoronto.ca/. Published on 2015-04-03 07:07:00 GMT Interesting fact: A regulation Major League baseball has 150 yards of cotton. Even if you don’t like baseball, cotton has plenty of other important uses. Check out some of our cotton drapes at http://curtainsdrapestoronto.ca/. Published on 2015-04-01 06:56:45 GMT Did you know: While most people think that money is made out of paper, it is actually made out of cotton. Of course, we have other uses for this important material. If you’d like to see some of our beautiful cotton curtains, visit http://curtainsdrapestoronto.ca/. Published on 2015-03-30 18:00:00 GMT Did you know: The world’s most expensive fabric is vicuña wool. Including the gold woven into it, the price tag rings in at $1,800/yard. Fortunately, the fabric we use to make curtains and drapes is considerably more affordable. You can see our selection by visiting http://curtainsdrapestoronto.ca/. Published on 2015-03-28 05:10:02 GMT Interesting fact: While most people associate measurements of yards with football, the expression “the whole nine yards” refers to the amount of fabric once needed to make fancy men’s coats. We put fabric to different use: creating beautiful curtains and drapes. Take a look at what we carry at http://curtainsdrapestoronto.ca/. Published on 2015-03-26 05:10:00 GMT Did you know: Just 35% of American textiles become clothes. The rest are used to make a variety of other products, including curtains and drapes. If you are looking for new curtains and drapes for your home, look no further than http://curtainsdrapestoronto.ca/. Published on 2015-03-24 03:59:00 GMT Did you know: Blackout curtains can be a great choice for media rooms. Not only can they block outside light, but they can also limit the noise that comes in. To see some blackout drapes and other options, visit http://curtainsdrapestoronto.ca/. Published on 2015-03-20 00:04:01 GMT Interesting fact: Blackout curtains can save you money because they provide more insulation than other curtains do. Whether you prefer to go with the blackout option or would like something different, we can help you get curtains that are just perfect for every room in your home. You can see some of what we have on offer at http://curtainsdrapestoronto.ca/. Published on 2015-03-18 00:04:01 GMT Did you know: For most people, blackout drapes are not appropriate for bedrooms because there are health benefits to being awakened by the sun. Whether you want blackout drapes or other kinds, we can help you find exactly what you need. Learn more at http://curtainsdrapestoronto.ca/. Published on 2015-03-16 18:00:00 GMT Did you know: The highest quality of cotton grown anywhere in the world is grown in two countries, Egypt and Australia. If you are interested in having some of this cotton adorning the windows of your home, visit http://curtainsdrapestoronto.ca/ to see some of your options. Published on 2015-03-13 23:43:55 GMT Interesting fact: One of the reasons that cotton is such a popular fabric is that it is so readily available. In fact, there are roughly 70 countries that grow cotton. To see some of the cotton drapes that we have available to our customers, visit http://curtainsdrapestoronto.ca/. Published on 2015-03-11 18:00:00 GMT Did you know: The word “cotton” comes from the Arabic “kutun”, a word used to describe fine textiles. Cotton drapes are among our most popular both because they look and feel great and because they are washable. If you would like to see some of the cotton drapes that you could have in your home, visit http://curtainsdrapestoronto.ca/. Published on 2015-03-09 18:00:00 GMT Did you know: While most fabrics are stronger dry than they are wet, linen actually becomes stronger when it is wet. We have some fantastic linen drapes, as well as other options, at http://curtainsdrapestoronto.ca/. Published on 2015-03-06 22:55:00 GMT Interesting fact: If you are looking for drapes that will stand the test of time in maintaining their color through wear, sun, and cleaning, you should strongly consider polyester. If you would like to see some options for polyester drapes, among others, visit us at http://curtainsdrapestoronto.ca/. Published on 2015-03-04 22:44:29 GMT Did you know: People have been using cotton for about five thousand years. Today, it is a popular fabric in making curtains and drapes. If you would like to see some of the curtains and drapes that we have available, visit http://curtainsdrapestoronto.ca/. Published on 2015-03-02 18:00:00 GMT Did you know: Your drapes can have a major impact on your electric bills, especially during winter. Make sure that you have drapes that contribute to your home’s insulation, or that you are prepared to spend considerably more to heat your home. If you are looking for drapes that can help keep you and your family warm for the rest of this blustery winter, look no further than http://curtainsdrapestoronto.ca/. Published on 2015-02-27 18:00:00 GMT Interesting fact: Blackout drapes can keep out all unwanted light to ensure that your bedroom is dark for sleeping. While this is ideal when you’re sleeping in, it can make it more difficult to wake up in the morning since you will not have the help of slowly brightening natural light. If you want more guidance in selecting the best drapes for your home, turn to http://curtainsdrapestoronto.ca/. Published on 2015-02-25 18:00:00 GMT Did you know: Drapes made from different color fabrics look better during different times of the year. White, off-white, and cream colored fabrics are great for winter while bright colors look better in the spring. If you would like beautiful drapes for every season, visit http://curtainsdrapestoronto.ca/. Published on 2015-02-23 18:00:00 GMT Did you know: Thermal curtains can be a critical part of your home’s insulation during cold winter months. If you’d like to look at some curtains that could help you keep your heating bills down, turn to http://curtainsdrapestoronto.ca/. Published on 2015-02-20 18:00:00 GMT Interesting fact: While the curtain call, i.e. the practice of actors and actresses thanking the audience at the end of a play, originated in the theater, some baseball players have adopted the custom by coming out of the dugout and waving their cap after hitting home runs. If you want to hit your own home run by getting beautiful curtains for your home, visit http://curtainsdrapestoronto.ca/. Published on 2015-02-18 18:00:00 GMT Did you know: The Mechitza was used in Jewish houses of worship to separate men from women. To the contrary, you likely want the curtains of your home to create an inviting feeling that brings people together. To see some examples of such curtains, turn to http://curtainsdrapestoronto.ca/. Published on 2015-02-16 18:00:00 GMT Did you know: The first household textiles had little to do with privacy or aesthetics. Instead, they were designed primarily for warmth. Today, though, form should come with function. If you want curtains and drapes that not only insulate your home and maintain your privacy but also look great, turn to http://curtainsdrapestoronto.ca/. Published on 2015-02-13 18:00:00 GMT Interesting fact: The original curtains were made from animal hides and hung between doorways with hooks. While effective for creating privacy, they were not especially aesthetically pleasing. If you want curtains and drapes that will look great in your home, turn to http://curtainsdrapestoronto.ca/.
Low
[ 0.49448123620309004, 28, 28.625 ]
Q: How to control safety nets in discovery writing Even though discovery writing is about letting the story go without interference, you still don't want the characters to get killed in the first chapter. For this exists safety nets, people, objects, or forces that protect the protagonists. Three MacGuffins a day keeps George R. R. Martin at bay. Problems arose when we use people as safety nets, sure they counter any and everything, but in (my) the worst case scenario they've got no strings on them that would hold their power down. These are typically stuff like Elminster from Forgotten Realms or the Giant Eagles from Lord of the Rings. Their ability to solve the plot upon a whim makes them an implacable force, that can only be countered with an even stronger villain, said stronger villains will eat the protags for dinner. And we're back at where we started. Very specific weaknesses, like the One Ring's corrupting influence that is quadratically proportional to the user's power level, can't work on either side. Reasons: "Nomen est omen." Removing them and their influence is sometimes possible (Giant Eagles) and sometimes not (Elminster). I want to keep my safety net with minimal modification, but prevent him from stealing the show. How should I do that? A: As a discovery writer, I echo Michael's comment, I absolutely control the direction of the story. I personally write with an end in mind; which I record as notes (not prose) about what finally happens; what is revealed, etc. I very much do give my characters personalities and proclivities; while writing I feel like they are real people I know, and will only write for them actions, dialogue and ideas consistent with their personality. So, for an extreme example to illustrate my point, I am not going to force my virgin sidekick to volunteer to seduce a guard because that would be a convenient distraction. My devout priest isn't cutting any throats. But giving my characters loose reins doesn't make me obligated to follow every move that occurs to them. I aim for their most plausible (or most conflict-producing) response, but even us real people have a handful of plausible responses to deploy in most situations. We do it, we don't do it, we find a safer way, we find a more dangerous way because we are impatient. We get angry, or get angry and control ourselves. We act on our love, or hide it with nonchalance, or hide it and suffer because it is doomed or wrong or breaks a vow. I don't mind detours, but if I as an author am much attracted to a great idea I had whilst writing a scene, I have a rule: If that makes my current notion of the ending no longer viable, I must come up with a better ending, or think harder and rewrite the scene in some other manner to preserve my current better ending. I have to choose from a different but plausible reaction for my character(s). If that seems impossible, and I've written myself into a corner, then I unwind more of the story until I am no longer in a corner. When I am in a corner it is not that there is NO ending if I keep writing, it is that I won't know the ending or I know it won't be good; e.g. I write reasonably happy endings. I will note that Stephen King is a discovery writer that does the same thing; while writing The Stand he said he discarded months of work because he wrote himself into a corner. I control the story. I know good stories will fit pretty well into the three act structure and their timing points; that is something I expect to see emerge as I am writing; another compass to keep me on path. Unlike plotters I don't plan these ahead of time; but the three act structure was derived by analyzing a lot of pre-existing successful stories and taking averages; it describes what successful storytellers were doing naturally, by instinct and experience. So I have a "feel" for how long my hero needs to show us her normal world, when she needs to be ejected from it, when it is time for her path to change and something new to happen. If you don't have a feel for that yet; read up on the three act structure and where the inflection points are.
Mid
[ 0.607709750566893, 33.5, 21.625 ]
Russian bombers delivered air strikes at terrorists’ strongholds in Dei ez-Zor province, where Islamic State militants massacred about 300 civilians to intimidate the local population Read also Russia warplanes in Syria made 5662 sorties since operation start — general staff MOSCOW, January 19. /TASS/. Russia’s warplanes have made 157 sorties over the past four days destroying 579 terrorist targets, Russia’s Defense Ministry's spokesman Maj. Gen. Igor Konashenkov said on Tuesday. "Over the past four days the planes of Russia’s air group in the Syrian Arab Republic made 157 sorties against 579 facilities of the terrorist infrastructure in the provinces of Aleppo, Deir ez-Zor, Homs, Hama, Raqqah and Latakia," he said. The Su-34 bomber delivered air strikes on the strongholds of the Islamic State (IS) group’s gunmen at the high points near Kabakli in the Latakia province, Konashenkov said. The strikes destroyed four SUV with installed large-caliber machine guns and around 20 gunmen. Over 60 Islamic State gunmen killed in Russian air strikes in Syria’s Deir ez-Zor province Konashenkov elaborated that more than 60 Islamic State militants were killed in Russian air strikes in the Syrian province of Dei ez-Zor, where Islamic State massacred about 300 civilians. "Russian Su-34 bombers delivered air strikes at terrorists’ strongholds in the vicinity of the settlement of Bgelia in the Dei ez-Zor province, where Islamic State militants massacred about 300 civilians to intimidate the local population," he said. He said more than 60 terrorists had been killed in the air strike. Apart from that, three trucks with munitions and two Jeeps with ZU-23 artillery systems had been destroyed, he added. Last weekend, France Presse reported mass killings of civilians by Islamic State gunmen in the city of Deir ez-Zor. Apart from that, terrorists reportedly took hostage more than 400 people, including women and children. Russian warplanes destroy militants’ convoys in Syria’s Aleppo, Hama provinces According to the spokesman, Russia’s warplanes have destroyed a weapons warehouse and terrorists’ convoys in Syria’s Aleppo and Hama provinces. "A Sukhoi-25 fighter-bomber has wiped out terrorists’ weapons and ammunition depot near Tell Rifaat, Aleppo province. Objective monitoring means registered the detonation of explosives stored in the building and the full destruction of the facility and the items in store," he said. In the area of Ahras, in the same province, Sukhoi-34 bombers destroyed 20 off-road vehicles carrying weapons and militants from the Turkish border to Aleppo, Konashenkov said. "In the area of Narb Nafsa, Hama province, direct bomb strikes by a Sukhoi-25 fighter-bomber destroyed five off-road vehicles carrying large-caliber machine-guns and mortars," he added. Russia’s air task force in Syria destroys 23 fuel tanker trucks heading for Turkey Konashenkov also said Russia’s combat aircraft have destroyed an oil pumping station in the Syrian province of Raqqa and a convoy of fuel tanker trucks in the province of Aleppo. "During the operation to undermine the sources of terrorists’ criminal incomes, Russian warplanes have destroyed a large depot of fuel and lubricants and an oil pumping station in the province of Raqqa over the past four days," the spokesman said. Also, Russia’s air reconnaissance detected a convoy of fuel tanker trucks near the settlement of Herbol in the province of Aleppo carrying smuggled oil towards the border with Turkey. During its air raid, the Russian bomber Su-24 destroyed 23 fuel tanker trucks, the spokesman said. Gang of 30 militants deserts after Syrian troops liberate capital of mountainous Latakia According to the official, the gang of warlord Abu Khaldun numbering about 30 people has deserted after the Syrian government troops liberated the Salma locality in the Latakia province. "The facts of militants’ mass desertion and evasion of whole their units from further participation in hostilities have been observed. Thus, a gang of warlord Abu Khaldun comprising about 30 people deserted their positions en masse on Sunday," Konashenkov said. According to the official, after the liberation of Salma the activity of militants in the area of the Jabal al-Akrad mountain group significantly decreased. According to media reports, the Syrian government forces entered Salma on January 12. According to the head of the Main Operations Directorate of the Russian army’s General Staff, Sergei Rudskoi, the opposition detachment "Desert Falcons" actively helped to liberate one of the "main strongholds" of the Islamic State militants and the capital of mountainous Latakia. "In the north of the province of Latakia, three settlements were liberated with the active participation of the Desert Falcons opposition group, including the town of Salma that is the main stronghold of militants and capital of mountainous Latakia," Rudskoi said on Friday (Jan 15). According to him, Syrian government forces also seized 10 settlements in the province of Hama. "Twenty-four armed militants have voluntarily surrendered to government forces in combat near the town of Jarjis," Rudskoi said. "Government forces and militias took seven settlements near the Kweires airfield." Read also Russian General Staff: Syrian opposition actively helped in freeing one of IS strongholds The Syrian democratic opposition forces operating in conjunction with the governmental troops have been playing an ever more important part in the fight against the terrorists in Syria. "At present, the personnel strength of such opposition forces exceeds 10,500 men," Rudskoi said. According to him, the opposition forces led by Aiman flyat al-Ghanim have advanced by 8 km toward al-Raqqa considered the ‘capital city’ of the Islamic State and liberated for towns. "The Soureim and Chelobiya detachments have driven the IS militants from an area totaling 60 square km on the eastern and western side of the dyke on the Euphrates River near al-Ahmar," Rudskoi added. More than 200 settlements have been liberated from Islamic State terrorists since the beginning of the Russian operation in Syria. "In all, 217 settlements have been retaken and an area of more than 1,000 square km has been liberated from the Islamic State terrorists over the 100 days of the operation being carried out by the Russian Aerospace Force’s task group in Syria," General Rudskoi said. "People are returning to Syrian towns, and peaceful life is being restored," he added. Russia's military operation in Syria Russia’s Aerospace Forces launched a military operation in Syria on September 30 after the Federation Council unanimously approved President Vladimir Putin’s request for the use of the armed forces against terrorists outside the territory of Russia. On the same day, Russia’s aviation group started to deliver the first pinpointed airstrikes against the militants’ positions. The Russian aviation grouping comprises more than 50 aircraft and helicopters, including the Sukhoi Su-34 and Su-24M bombers, Su-25 attack aircraft, Su-30SM fighters and Mil Mi-8 and Mi-24 helicopters. Also, overnight to October 7, the Caspian Flotilla ships delivered a massive strike on the IS objectives in Syria, using Kalibr NK shipborne cruise missiles. Read also Russian Navy ships in fight against Islamic State
Mid
[ 0.567816091954022, 30.875, 23.5 ]
Q: Forward implied volatility Can one price accurately by only using vanilla options a derivative that is exposed/sensitive mainly to the forward volatility ? If it is impossible, why do we hear sometimes "being long a long dated straddle and short a short dated straddle" is being exposed to forward vol ? Here are some examples : a) In equity markets : - pricing a volatility swap starting in 1y and expiring 1y later. - pricing a forward starting option with the strike determined in 1y as 100% of the spot and expiring in 5y. b) In rates markets : (FVA swaption) a 1y5y5y Swaption, which is 6y5y swaption with the strike determined in 1y. In the equity world, a way to express the question is : If we use a sufficiently rich model like Stochastic Local Volatility model (SLV) where the local component of the model is calibrated on vanillas (hence the price of any vanillas will be unique regardless of the choice of the stochastic part). Would our model provide a unique price of the above instruments regardless of the stochastic component choice ? A: From an equities perspective, there are two concepts that should not be confused in my opinion and context should make the distinction self-explicit: Forward variance swap volatility (A) Forward implied volatility smile (B) I really recommend reading Bergomi's "Stochastic Volatility Modeling" which is an excellent book for equity practitioners. The topics you mentioned are discussed in a great amount of details. To give more of a theoretical insight, in what follows I'll assume that the underlying follows a pure diffusion process (i.e. no jumps). I'll also consider two types of instruments: Idealised variance swaps that payout at maturity $$ \phi_{VS}(T) = A \,\,\underbrace{\frac{1}{N-1}\sum_{i=1}^N \ln\left(\frac{S_{t_i}}{S_{t_{i-1}}}\right)^2}_{\text{realised $\delta t = T/N$ returns variance}} - \underbrace{\hat{\sigma}^2}_{\text{VS variance}}$$ where $t_0 = 0 < \dots < t_i < \dots < t_N = T$ represents a partition of the horizon $[0,T]$, $A = N/T$ is an annualisation factor and where by idealised I mean that $N \to \infty$ such that the realised returns variance over the horizon may be replaced by the quadratic variation of the log price process over $[0,T]$ such that $$ \phi_{VS}(T) = \frac{1}{T}\langle \ln S \rangle_T - \hat{\sigma}^2_T $$ Since the variance swap is entered at zero cost at inception we have that \begin{align} \hat{\sigma}^2_T &= \frac{1}{T} \Bbb{E}_0^\Bbb{Q} \left[ \langle \ln S \rangle_T \right] \\ &= -\frac{2}{T} \Bbb{E}_0^\Bbb{Q} \left[ \ln\left( \frac{S_T}{F_T} \right) \right] \tag{1} \end{align} see for instance this excellent answer by Gordon. Forward start options, e.g. a forward start call paying out: $$ \phi_{FS}(T=T_2) = \left( \frac{S_{T_2}/F_{T_2}}{S_{T_1}/F_{T_1}} - k \right)^+ $$ for a forward forward starting date $T_1$ and tenor $\tau = T_2-T_1$ with fixed moneyness $k$. To make my point, I'll further consider a homogeneous diffusion model such that we can successively write the price of the forward start option as \begin{align} V(k,T_1,T_2) &= \Bbb{E}_0^\Bbb{Q}\left[ \left( \frac{S_{T_2}/F_{T_2}}{S_{T_1}/F_{T_1}} - k \right)^+ \right] \\ &= \Bbb{E}_0^\Bbb{Q}\left[ \Bbb{E}_1^\Bbb{Q}\left[ \left( \frac{S_{T_2}/F_{T_2}}{S_{T_1}/F_{T_1}} - k \right)^+ \right] \right] \\ &= \Bbb{E}_0^\Bbb{Q}\left[ \frac{F_{T_1}}{S_{T_1} F_{T_2}} C\left( S_{T_1}, K=k S_{T_1} \frac{F_{T_2}}{F_{T_1}} , \tau=T_2-T_1; \hat{\sigma}^{T_1T_2}_k \right) \right] \\ &= \frac{F_{T_1}}{F_{T_2}} \Bbb{E}_0^\Bbb{Q}\left[ C\left(1, K=k \frac{F_{T_2}}{F_{T_1}} , \tau=T_2-T_1; \hat{\sigma}^{T_1 T_2}_k \right) \right] \tag{2} \end{align} where we have defined $\hat{\sigma}^{T_1T_2}_k$ as the future implied volatility at $T_1$ of options of tenors $T_2-T_1$ and moneyness $k$. As you might have guessed, the two "forward volatility" concepts (A) and (B) I've introduced in the beginning are related to the two former instruments as follows: Forward VS volatility as seen of $T_1$ for the tenor $T_2-T_1$, which I will denote by $\hat{\sigma}_{T_1 T_2}$, can be defined as $$ \hat{\sigma}_{T_1 T_2}^2 = \frac{1}{T_2-T_1} \Bbb{E}_0^\Bbb{Q}\left[ \int_{T_1}^{T_2} d\langle \ln S \rangle_t \right] = \frac{T_2 \hat{\sigma}_{T_2}^2 - T_1 \hat{\sigma}_{T_1}^2}{T_2-T_1} $$ As you can see this amounts to trading in a calendar spread of fresh-start VS of maturities $(T_1,T_2)$. As per formula $(1)$, the price of each of these fresh-start VS only depends on the unconditional distribution of $S_t$ at $t = T_1$ and $t=T_2$. By the Breeden-Litzenberger identity this means that as soon as you know (or have a model calibrated to perfectly match) the prices of all vanillas at maturities $T_1$ and $T_2$ then forward VS will be priced unequivocally. Consequently, both a LV and a SV model perfectly calibrated to the vanilla market will yield the same prices for these instruments under the modelling assumptions I've made (pure diffusion + idealised variance swaps). As per formula $(2)$ you see that for a forward start option, the real underlying of the option is not 'the stock' itself but rather the future implied volatility $\sigma_k^{T_1 T_2}$, an information which is simply not encoded in a European vanilla option. As such, forward implied volatilities $\sigma_k^{T_1 T_2}$ cannot in general be determined from the now-prevailing vanilla smile. The dynamics of $\sigma_k^{T_1 T_2}$ is rather "embedded" in the model (or equivalently the assumptions you are willing to use as Attack68 mentions in his answer). This means that a LV and a SV lodel both perfectly calibrated to the vanilla market will in general yield different implied volatility dynamics, hence different forward start option prices. Some additional remarks: In LSV models as you described you'll generally set up the parameters of the SV layer to tune the dynamics of the model (i.e. conditional distributions) and calibrate the LV layer to make sure that the statics of your model is consistent with the now-prevailing smile (i.e. unconditional distributions). At least this is what a tractable LSV model should allow you to do. So the answer is no, if your only target is calibrating your model to the vanilla market then definitely the price of forward start options will not be unique because there are infinite many ways to do this. The calendar spread of straddles you mention is similar to the calendar spread of variance swaps in the sense that its price will unequivocally be determined by the unconditional distribution of the underlying (it's a calendar spread of European vanilla instruments). So yes, it gives you exposure to what you could call "forward vol" but it is more akin to a "forward VS vol" above than to a forward start option. A: It is possible, yes, but it requires assumptions. But, philosophically speaking, this is the case as with all pricing, of any instrument. For example, given only the price of a 6Y and 7Y IRS can you correctly price the 6.5Y IRS rate? Well, yes you can, but it depends upon your assumptions about interpolation which is a subjective choice. Lets look specifically at your swaption question: Can one price the 5Y5Y vol 1Y forward, denoted $\sigma^{5Y5Y\_1Y}$? Component 1: Forward Volatility The two components I need to price this forward volatility are: The 6Y5Y vol (6y expiry 5y swap), The 1Y5Y5Y vol (1y expiry 5Y5Y swap). Modelling assumptions. You now have a framework to equate this mathematically by modelling the assumptions about market movements. If, for example you model with normal distributions of market movements the resultant formula is fairly generic: $$\sigma^{5Y5Y\_1Y} = \sqrt{\frac{6(\sigma^{6Y5Y})^2-1(\sigma^{1Y5Y5Y})^2}{6-1}}$$ Graphically you have: +-------------------------+------------------+ | 6Y EXPIRY | 5Y SWAP | = Benchmark price +-------------------------+------------------+ | 1Y EXP. | 5Y FWD | 5Y SWAP | = Composit price +-------------------------+------------------+ | 1Y FWD | 5Y EXPIRY | 5Y SWAP | = Implied, required price. +-------------------------+------------------+ Component 2: Volatility of a forward, i.e. midcurve You will observe that the above used the vol info on the 1Y5Y5Y. However, this doesn't exist as a benchmark product. In fact it isn't even a vanilla traded swaption. To calculate this price you need the information about: 1Y5Y vol (1y expiry 5y swap) 1Y10Y vol (1y expiry 10y swap) the expected correlation between the above rates in the next year. some modelling assumptions about change in deltas and discount factors modelled over all scenarios. Graphically you have: +-------------------------+ | 1Y EXP. | 5Y SWAP | = Benchmark price +-------------------------+------------------+ | 1Y EXP. | 10Y SWAP | = Benchmark price +-------------------------+------------------+ | 1Y EXP. | 5Y FWD | 5Y SWAP | = Composit Price +-------------------------+------------------+ The correlation component can sometimes be inferred from exotic swaption markets where curve spread options are priced, eg a call on 5s10s curve for example. Conclusion I started this answer with it is possible, yes but in light of the complexity I can see why many people simply say no because the variance of accuracy, subject to all of the model assumptions, leading to weak confidence levels on the price is far from the confidence of pricing a 6.5Y swap from 6Y and 7Y IRS price. As for trading the risk exposure to specifically this component, I don't know the answer but I seriously doubt it is possible, lest it be very complicated with some mechanical process that is far to expensive constantly hedging the changes in exotic exposures. References: This material is better explained and clearer in Darbyshire: Pricing and Trading Interest Rate Derivatives. A: The procedure outlined by @attack68 is correct for estimating forward vol assuming you are in a world where volatility is deterministic and uncorrelated with the underlying. If these assumptions are not valid, the situation is more complicated. Taking his (or her) example, suppose you sell a usd100mm forward Vol contract on a 5yr 5yr swaption straddle, settling in 1yr from now, at a normalized volatility of 70bp per annum. This means in one year you will sell to your client $100mm of a 5yr 5yr swaption straddle struck at the then ATM 5yr 5yr forward rate. As a hedge , you buy usd100 mm of a 6yr 5yr swaption straddle and sell usd100mm of a 1 yr option on a 5yr5yr rate , both struck at today's forward rate (say 3pct ). What happens ? If over the next year , the market migrates a long way from 3pct (say 5pct), your hedge is in fact equal to the value of usd200mm of a then 5yr 5yr 3pct receiver swaption, which doesn't have much vega exposure , certainly much less than the trade you are trying to hedge. Thus, in order to keep the hedge vega neutral versus the trade , you need to acquire more hedge as the underlying moves away from 3pct. The new hedge depends where implied volatility is on those future dates. Hence you are very dependent on the path of volatility versus rates , and the interrelationship between them. So the simple forward vol calculation by @attack68 works as a good estimate of the market expectation of forward vol, but it doesn't form a static hedge so it can't be used to actually lock in the forward vol.
Mid
[ 0.6072186836518041, 35.75, 23.125 ]
Tory MP questions 'plebgate element' in six-month racism probe A former minister will ask a chief constable today if there was an “element of ‘plebgate’” in the force’s decision to launch a six-month racism investigation into his description of a gypsy as looking "unkempt". Tim Loughton: “Political correctness seems to have taken grip within certain sections of the police."Photo: Rex Features By Wesley Johnson, Home Affairs Correspondent 10:00PM GMT 03 Mar 2013 Tim Loughton, the ex-Children’s Minister, said he wanted to know if officers simply wanted to “have a pop at a Tory MP” as they carried out the inquiry which saw him interviewed under caution by detectives for 90 minutes last August. In a strongly-worded email, Mr Loughton told Kieran Francis, 42, he agreed with council officials’ description of him as “unkempt” on a blacklist of “customers of concern”. Mr Francis, who claims Romany Gipsy heritage, complained to police who interviewed the MP, his staff and trawled through his correspondence before the Crown Prosecution Service finally dropped the case last month. Mr Loughton, who will meet Sussex Police Chief Constable Martin Richards today, said “any reasonable person would have realised this was not a criminal matter”. Mr Richards will have to answer whether there was “an element of ‘plebgate’ in this as well – the idea to have a pop at a Tory MP”, Mr Loughton said. It follows the controversy over Andrew Mitchell, the former chief whip, who was accused of calling police "plebs" during a Downing Street row, an allegation he has repeatedly denied. Mr Loughton said: “I’m seriously concerned that political correctness seems to have taken grip within certain sections of the police, particularly with anything to do with mentions of racism or travellers - they go into overdrive. “It seems that common sense has gone completely out of the window.” Asked about the estimated £100,000 cost of the inquiry, Mr Loughton added: “Why didn’t somebody say ‘this is a case where there’s clearly not a case to answer’, rather than rack up a long investigation which has cost goodness knows how much?” It also has implications for every MP dealing with vexatious complaints from constituents and will be debated in the Commons, he added. “I hope this does not signal a green light that anybody can be as rude as they like to their MP knowing their MP can’t respond robustly.” The row followed repeated calls to the council and the Worthing and Shoreham-by-Sea MP’s staff, as well as an online blog, by Mr Francis, whom Mr Loughton described as a “serial complainer”. But it escalated when the constituent emailed Mr Loughton, saying he was insultingly described in an official council document as unkempt. Mr Loughton, 50, who said neither he nor Adur council had any idea of Mr Francis's traveller background, sent a strongly-worded email rejecting the complaints. “As regards the specific whinge about being described as "unkempt", given the meaning of the word as "untrimmed, dishevelled and rough" it strikes me as eminently accurate,” he wrote. He added the complaint was “another example of the whingeing, self-serving, poisonous b******s that seem to have become your hallmark”. Mr Francis, who is unemployed, said he was disappointed the investigation had been dropped ““What he called me was racist and disrespectful,” he told the Mail on Sunday. “My mother was from a Romany family and my Member of Parliament basically called me dirty.” Sussex Police said in a statement: “An allegation of malicious communication was reported to Sussex Police, and was fully investigated in the same way it would be for any member of the public.”
Mid
[ 0.5519480519480521, 31.875, 25.875 ]
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <title>CSS Images Module Level 4: image-resolution scaling from image with animorphic aspect ratio</title> <link rel="author" title="Mike Bremford" href="http://bfo.com/"> <link rel="help" href="https://drafts.csswg.org/css-images-4/#propdef-image-resolution"> <link rel="match" href="../reference/100x100-blue.html"> <style> img { image-resolution: from-image; } </style> </head> <body> <img src="support/swatch-blue-48x192dpi.png" /> </body> </html>
Low
[ 0.47619047619047605, 23.75, 26.125 ]
<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>API addData() and clearData() / Gio.js</title> <script src="js/three.min.js"></script> <script src="js/jquery.min.js"></script> <script src="../build/gio.min.js"></script> <link rel="stylesheet" href="css/common.css"> <style> #globalArea { height: 100%; width: 100%; margin: 0; padding: 0; } #enable, #disable { position: absolute; left: 100px; width: 150px; height: 40px; color: #cbcbcb; text-align: center; line-height: 40px; cursor: pointer; user-select: none; box-sizing: border-box; transition: 1s; border-radius: 5px; background-color: rgba(110, 110, 110, 0.8); } #enable:hover, #disable:hover { color: #fff; background-color: #929292; } #enable { top: 200px; } #disable { top: 300px; } </style> </head> <body> <header>API addData() and clearData() can be used to add or clear data to globe</header> <div id="globalArea"></div> <div id="enable">Add Data</div> <div id="disable">Clear Data</div> <div class="view_source"> <a href="https://github.com/syt123450/Gio.js/blob/master/examples/23_API_addData(clearData).html">View Source</a> </div> <script> var container = document.getElementById( "globalArea" ); var controller = new GIO.Controller( container ); var data; $.ajax( { url: "data/sampleData.json", type: "GET", contentType: "application/json; charset=utf-8", async: true, dataType: "json", success: function ( inputData ) { data = inputData; // data can be add before init() function be called controller.addData( inputData ); controller.init(); } } ); $( "#enable" ).click( function () { // data can be add after init() function be called, after add new data, the system will be automatically updated controller.addData(data); } ); $( "#disable" ).click( function () { // can use clearData API to clear data in globe controller.clearData(); } ); </script> </body> </html>
Mid
[ 0.5469387755102041, 33.5, 27.75 ]
During my keynote at GUADEC this year I mentioned that we should not just look for people who can contribute on the same level as we do in the Free Software community. But that we need to find actions, with a low barrier to participate so our friends, parents, children can also take part. Matthias Kirschner on stage at GUADEC, CC-By Garrett LeSage This includes showing others that you support software freedom by using T-shirts, bags, pins, or stickers. I was mentioning that once in Berlin I saw a GNOME sticker over the button of a pelican crossing. But unfortunately I could not find that picture before the talk as I remembered it just the night before the talk, and could not find it on my laptop. Still, during GUADEC several people asked me about that picture again. All I could say was that it was during one of the Linuxtage in Berlin. On my way back I checked my laptops's hard disk again, but still without success. A few weeks ago while I was polishing up the notes for the speech about universal computing---so others can reuse them when talking about software freedom---I remembered the picture and I challenged myself to find it. So I spent some more time to dig through my backup disks. Finally I found it, and this week I was also able to find out who the author is. Dear GNOME community, as a modest gift for the holiday season, here the picture from Linuxtag 2009 taken by Christoph Göhre (can be used under a Creative Commons Attribution 4.0 International License): If you could not participate at GUADEC you missed meeting a lot of awesome Free Software contributors, but you can still watch the talk: The video from my keynote is now online. There is also a shorter version from Akademy, as well as a German recording from FrOSCon.
Mid
[ 0.6237424547283701, 38.75, 23.375 ]
Search form Join the open source coding forum You are here How to EMS tracking 17Track EMS tracking By following the aforementioned constraints, you can get the results with the proper record that includes the current location of the EMS tracking. Whether you are a sender or a receiver, you can accomplish the https://www.17-tracking.com/ EMS tracking and it will present you the correct results with the valid EMS tracking number. 17Track offers you the mobile application along with the online website to cope up with the modern technologies and methodologies. With the use of the mobile application, you can easily and conveniently realize the information about the EMS tracking parcel with the double taps. It is the highly developed interface and you can obtain the results very efficiently without any hassles. The mobile application of 17Track is more convenient than the online website of the 17Track.
Mid
[ 0.6139088729016781, 32, 20.125 ]
En streaming Wild Wild West Legless Southern inventor Dr Wild Wild West Film Complet. Arliss Loveless plans to rekindle the Civil War by assassinating President U.S Wild Wild West Film Complet. Grant Wild Wild West Film Complet. Only two men can stop him: gunfighter James West and master-of-disguise and inventor Artemus Gordon Wild Wild West Film Complet. The two must team up to thwart Loveless' plans. Wild Wild West
Mid
[ 0.639308855291576, 37, 20.875 ]
Labrum and rotator cuff injuries in the throwing athlete. The large amount of force imparted across the shoulder during the act of throwing makes the glenohumeral joint highly susceptible to injury in the athlete performing overhead throwing motions. The bony incongruity of the shoulder enables greater range of motion than any other joint in the body, but it also results in significant strain on the surrounding soft tissues during the throwing motion. Throwers can present with acute injuries, but more commonly they suffer from chronic overuse conditions resulting from repetitive overload. Proper management requires early recognition with treatment directed toward the athlete's safe return to sports. Failure to institute an appropriate management strategy may result in significant complications, including prolonged disability, progression of symptoms, and further injury. We discuss the functional anatomy, pathophysiology, clinical presentation, evaluation, and treatment of common injuries of the glenoid labrum and rotator cuff in the overhead throwing athlete.
High
[ 0.701030927835051, 29.75, 12.6875 ]
People v Garrow (2019 NY Slip Op 03238) People v Garrow 2019 NY Slip Op 03238 Decided on April 26, 2019 Appellate Division, Fourth Department Published by New York State Law Reporting Bureau pursuant to Judiciary Law § 431. This opinion is uncorrected and subject to revision before publication in the Official Reports. Decided on April 26, 2019 SUPREME COURT OF THE STATE OF NEW YORK Appellate Division, Fourth Judicial Department PRESENT: CENTRA, J.P., CARNI, LINDLEY, TROUTMAN, AND WINSLOW, JJ. 1380 KA 15-02037 [*1]THE PEOPLE OF THE STATE OF NEW YORK, RESPONDENT, vROBERT GARROW, DEFENDANT-APPELLANT. FRANK H. HISCOCK LEGAL AID SOCIETY, SYRACUSE (ELIZABETH RIKER OF COUNSEL), FOR DEFENDANT-APPELLANT. WILLIAM J. FITZPATRICK, DISTRICT ATTORNEY, SYRACUSE (NICOLE K. INTSCHERT OF COUNSEL), FOR RESPONDENT. Appeal from a judgment of the Onondaga County Court (Joseph E. Fahey, J.), rendered October 8, 2015. The judgment convicted defendant, upon a jury verdict, of predatory sexual assault against a child and rape in the first degree. It is hereby ORDERED that the judgment so appealed from is affirmed. Memorandum: Defendant appeals from a judgment convicting him following a jury trial of rape in the first degree (Penal Law § 130.35 [3]) and predatory sexual assault against a child (§ 130.96). Defendant's conviction stems from his rape of a four-year-old girl. Defendant's first trial ended in a hung jury, and he was convicted after a second jury trial. On appeal from that judgment, we reversed on the basis of an O'Rama violation and granted a new trial (People v Garrow, 126 AD3d 1362 [4th Dept 2015]). Defendant did not challenge the weight of the evidence on that appeal. The third trial then proceeded, and a jury again convicted defendant. The victim, who was 11 years old at the time of this third trial, testified that she was very familiar with defendant. She testified that defendant did a "bad touch" to her by putting his "front private part" inside her "front private part," and that it hurt. Shortly after the incident, the victim disclosed to her mother that her vagina hurt. When asked why, the victim told her that defendant "did something bad" to her. After having her recollection refreshed, the victim more specifically testified that she told her mother that defendant did it "[w]ith his penis." The victim's mother gave similar testimony regarding the victim's disclosure, and explained that she taught the victim terminology for body parts at a young age because the mother was sexually molested as a child. The victim testified that her cousin did the "same thing" to her as defendant and that it happened more than once. She testified that this occurred at her aunt's house. After the victim disclosed defendant's abuse to her mother, the mother immediately confronted defendant and asked why the victim was making the allegation against him. Defendant was non-responsive at first, but eventually stated, "I don't know. She said something about [her cousin] earlier." When the mother asked the victim if the cousin had done anything to her, the victim responded in the affirmative. The mother testified that the last time she recalled the victim spending the night at the cousin's house was more than a month prior to the disclosure she made regarding defendant. The cousin admitted that he had sexually abused the victim; he was 11 years old at the time. The victim testified that she was not confused about the incident with defendant or the incident with her cousin. The mother took the victim to the hospital the same day she made the disclosure regarding defendant. The victim was examined by medical personnel and diagnosed with possible sexual abuse and diaper rash, but the victim was not wearing diapers at the time. She was prescribed a cream that treated yeast infections, of which the victim had a history. The [*2]victim was taken to the police station where she was questioned by a detective, and she testified that she told the detective that defendant had raped her. The detective testified that the victim disclosed that she had been sexually abused by both defendant and her cousin. The following day, as instructed by the police and medical personnel, the mother brought the victim to a medical facility where a sexual assault examination was performed. Due to the victim's age, the gynecological examination was performed externally only and showed some redness to the external part of the victim's genitals, but no damage to the hymen. Testimony was given that most female rape victims do not exhibit injury to their genital area. A nurse testified that, although she would expect to see some damage in a four year old who had been raped by an adult male with full penetration and no lubrication, there may be no injury if the penetration was slight or there was lubrication. The nurse practitioner who examined the victim did not observe symptoms indicative of a yeast infection. She could neither confirm nor deny that sexual abuse had occurred to the victim. The underwear that the victim was wearing the day she went to the hospital was secured and examined. In addition, dried secretion swabs were taken from three areas on the victim's thighs and buttocks that showed areas of fluorescence under a black light. A forensic scientist who examined the evidence testified that semen was not detected on any of the vaginal, anal, oral, or dried secretion swabs from the sexual assault examination kit. Using an alternate light source, she saw areas of fluorescence on the underwear, indicating potential bodily fluids in areas where drainage from the vaginal or anal cavity were most likely to be found. She took three very small cuttings of those areas to view under a microscope and identified sperm on those three locations, which were in the front interior crotch area, the middle crotch area, and on the back of the underwear near where there would be a tag. The forensic scientist testified that the presence of sperm indicated the presence of semen at those locations inasmuch as sperm is a component of semen. She further testified that she conducted another "presumptive" test for the presence of semen, the acid phosphatase (AP) test, and those tests on 20 different sections of the underwear were negative. Another forensic scientist conducted DNA testing of the sperm fraction from the middle crotch area of the inside of the underwear and testified that it matched that of defendant. The forensic scientists admitted that they were aware of the concept of secondary sperm cell transfer from one item of clothing to another in the washing machine. The mother testified that she would launder defendant's clothing and the victim's clothing together. The second forensic scientist testified that, where the AP test was negative for the presence of semen but sperm were present on clothing, transfer of sperm through the washing machine was a possibility. She further testified, however, that she did not believe that was the most probable explanation for the sperm being present in the underwear based on the number of sperm that she observed and the amount of DNA that was extracted. In his summation, defense counsel argued that the victim had a yeast infection, which caused the victim's statement to her mother that her vagina hurt; that the mother, who had been sexually abused as a child, turned the victim's innocent comment that "[defendant] did it" into an accusation that defendant raped the victim, which the mother repeated in front of the victim numerous times; that the victim had been abused by her cousin, and the mother steered the investigation towards defendant instead of the cousin; that the victim's testimony showed that she easily remembered the abuse by her cousin but was confused about the alleged abuse by defendant; that physical evidence of injury would be expected in this case but the victim did not sustain such injury; and that the presence of sperm on the victim's underwear was explained by secondary transfer through the washing machine. The prosecutor urged the jury to consider the victim's demeanor when she talked about the abuse and argued that she was worthy of belief. The prosecutor further argued that it was not a simple coincidence that defendant's "semen" was found in the crotch of the victim's underwear the same day she made her complaint. In this appeal, defendant's primary contention is that he was denied a fair trial by prosecutorial misconduct. Defendant failed to object to the alleged instances of misconduct and therefore failed to preserve his contention for our review (see People v Black, 137 AD3d 1679, 1680 [4th Dept 2016], lv denied 27 NY3d 1128 [2016], reconsideration denied 28 NY3d 1026 [2016]). In any event, we conclude that defendant's contention is without merit. First, defendant contends that the prosecutor and witnesses erroneously and repeatedly stated that semen was found in the victim's underwear. The first forensic scientist testified that semen was present in [*3]the underwear by virtue of the presence of sperm, even though the AP tests had been negative. We disagree with defendant that the prosecutor elicited false testimony or misled the jury on this point (see generally People v Mulligan, 118 AD3d 1372, 1374 [4th Dept 2014], lv denied 25 NY3d 1075 [2015]). The defense theory was that the sperm could have transferred to the victim's underwear in the wash, but that was only a theory. The other possibility was that the sperm cells were deposited on the underwear through semen. As the first forensic scientist testified, while the AP test is a specific screening test for semen, the actual observation of sperm on an item of clothing is an even more specific test for the presence of semen. The prosecutor's comment on summation regarding the presence of semen in the underwear was fair comment on the evidence (see People v Jackson, 141 AD3d 1095, 1096 [4th Dept 2016], lv denied 28 NY3d 1146 [2017]). Second, defendant contends that the testimony of the second forensic scientist that secondary sperm transfer probably did not take place in the washing machine was based on a factor, i.e., the large amount of sperm and DNA on the underwear, that was shown not to be the case in the two prior trials. Any alleged inconsistency between the witness's testimony at this trial and the previous trials should have been developed during cross-examination (see generally People v Hurd, 71 AD2d 925, 925 [2d Dept 1979]). We reject defendant's contention that the prosecutor elicited knowingly false testimony from the witness (see generally People v Colon, 13 NY3d 343, 349 [2009], rearg denied 14 NY3d 750 [2010]). Third, defendant contends that the prosecutor's opening and closing statements improperly appealed to the emotions of the jury. We conclude, however, that most of the prosecutor's statements were fair response to defense counsel's statements (see Jackson, 141 AD3d at 1096). " Faced with defense counsel's focused attack on [the victim's] credibility, the prosecutor was clearly entitled to respond by arguing that the witness[ ] had, in fact, been credible' " (People v Roman, 85 AD3d 1630, 1632 [4th Dept 2011], lv denied 17 NY3d 821 [2011]). To the extent that any comments exceeded the bounds of proper comment, we conclude that they were not so pervasive or egregious as to deprive defendant of a fair trial (see People v Pendergraph, 150 AD3d 1703, 1703-1704 [4th Dept 2017], lv denied 29 NY3d 1132 [2017]). Fourth, defendant contends that the People improperly suggested that there had been more than one incident of abuse. The two prosecutors at the third trial, who were not the same ones from the prior trials, were under the mistaken impression that the two rape counts in the indictment were based on two separate incidents, when in fact it was two theories of rape based on only one incident. Defense counsel, who did not represent defendant at the prior trials, agreed with the prosecutors that the charges in the indictment were based on two incidents of rape. During the victim's testimony, the prosecutor asked her about a possible second incident. The victim initially testified that she could not remember, but then testified that it did occur. The victim admitted, however, that she was confused about whether there was a second incident, and testified that she did not think defendant did it a second time. Later during the trial, and after the victim's testimony, County Court reviewed the grand jury minutes and concluded that the charges had stemmed from just one incident. The court therefore struck the victim's testimony regarding the second alleged incident and instructed the jury that there was no evidence of more than one incident of rape. The court also dismissed the second count of rape charged in the indictment to avoid any possible confusion. The court found that the prosecutor's suggestion of a second incident was an honest mistake, and we conclude that the court's instructions were sufficient to alleviate any prejudice resulting from the testimony (see People v Spears, 140 AD3d 1629, 1630 [4th Dept 2016], lv denied 28 NY3d 974 [2016]). In any event, we conclude that defendant was not denied a fair trial by the prosecutor's erroneous elicitation of that testimony inasmuch as the testimony regarding the second incident was equivocal, at best. Fifth, defendant contends that the prosecutor engaged in misconduct when she refreshed the victim's recollection regarding her disclosure to her mother. The victim testified that she told her mother that defendant "did something bad" to her, but she could not remember specifically what she told her mother that defendant did. The court allowed the prosecutor to refresh the victim's recollection using a transcript from the mother's testimony at the second trial. Her recollection having been refreshed, the victim testified that she told her mother that defendant did it "with his penis." Contrary to defendant's contention, a witness's testimony may be refreshed using any writing, whether or not made by the witness (see People v Betts, 272 App Div 737, 741 [1st Dept 1947], affd 297 NY 1000 [1948]; People v Goldfeld, 60 AD2d 1, 11 [4th Dept 1977], [*4]lv denied 43 NY2d 928 [1978]). There was therefore no misconduct by the prosecutor in refreshing the victim's recollection. Defendant's next contention is that he was denied effective assistance of counsel based on counsel's failure to object to the above instances of alleged prosecutorial misconduct. Inasmuch as we conclude that the prosecutor either did not engage in misconduct, or that any error did not deny defendant a fair trial, we conclude that defendant was not denied effective assistance of counsel based on counsel's failure to object (see People v Lewis, 140 AD3d 1593, 1595 [4th Dept 2016], lv denied 28 NY3d 1029 [2016]; People v Lyon, 77 AD3d 1338, 1339 [4th Dept 2010], lv denied 15 NY3d 954 [2010]). Defendant's further contention that counsel was ineffective in failing to call an expert witness to testify regarding the washing machine theory is without merit (see People v Loret, 56 AD3d 1283, 1283 [4th Dept 2008], lv denied 11 NY3d 927 [2009]). Defendant failed to establish the absence of any strategic or other legitimate explanation for the failure to call such an expert (see generally People v Caban, 5 NY3d 143, 152 [2005]). We now turn to defendant's contention on which we part ways with our dissenting colleague, i.e., the weight of the evidence. It is well settled that, in reviewing the weight of the evidence, we must first determine whether, "based on all the credible evidence[,] a different finding would not have been unreasonable" (People v Bleakley, 69 NY2d 490, 495 [1987]; see People v Danielson, 9 NY3d 342, 348 [2007]). We all agree that a different finding here would not have been unreasonable; the jury could have accepted the defense theory as set forth above and rejected the testimony of the victim. Our next step is to "weigh conflicting testimony, review any rational inferences that may be drawn from the evidence and evaluate the strength of such conclusions" (Danielson, 9 NY3d at 348; see Bleakley, 69 NY2d at 495). In undertaking such an analysis, "[g]reat deference is accorded to the fact-finder's opportunity to view the witnesses, hear the testimony and observe demeanor" (Bleakley, 69 NY2d at 495). There was no conflicting testimony here, only conflicting inferences that could be drawn from the evidence. We conclude that, viewing the evidence in light of the elements of the crimes as charged to the jury (see Danielson, 9 NY3d at 349), the verdict is supported by the weight of the evidence. The victim testified that defendant placed his penis inside her vagina and that it hurt when he did so. The victim made a prompt disclosure of the abuse to her mother and then to the police detective, and both of those witnesses testified consistently with the victim regarding the disclosure. After the victim's disclosure, her mother immediately confronted defendant, who was sleeping in a bedroom, and asked him why the victim was saying that he hurt her vagina with his penis. The mother repeated that three times before defendant said, "[h]uh, what?" The mother testified that she was "very agitated because [she] knew that he heard me the first time," and upon shouting it for a fourth time, defendant responded, "I don't know. She said something about [her cousin] earlier." Defendant never denied the accusation, and we agree with the prosecutor's statement in summation that defendant's response does not seem to be that of a man who has been wrongfully accused of sexually assaulting someone he is close with. The victim's sexual assault examination revealed that the victim had redness to the external part of the genital area. Testing of the underwear that the victim was wearing at the time she made the disclosure to her mother showed that sperm later identified as matching defendant's DNA were on three locations of the underwear where drainage from the vaginal or anal cavity was most likely to be found. The jury's determination to reject the defense theory was in accord with the weight of the evidence. The defense theory was that the victim's vagina hurt because she had a yeast infection, but the evidence was not clear on that issue. A yeast infection did not appear to be the diagnosis of the hospital, which appeared to diagnose the victim with possible sexual abuse and diaper rash, even though she no longer wore diapers. Although medical personnel at the hospital prescribed a cream that treated yeast infections, and the victim's mother testified that the victim had a history of yeast infections, the examining nurse who conducted the sexual assault examination testified that she did not observe symptoms that were indicative of a yeast infection and thus the victim was not tested for that condition. The defense theory was also that the victim made an innocent comment to her mother that "[defendant] did it" after stating that her vagina hurt, and the mother jumped to conclusions that defendant had raped the victim. The victim's actual statement to her mother, however, was not so innocent or innocuous. Even disregarding the victim's statement after having her memory refreshed, she testified that she remembered telling her mother that "[her] vagina hurt and that [defendant] did something bad to [her]." The defense theory was also that the victim was confused by her cousin's abuse of her and the alleged abuse by defendant. The victim testified, however, that, although her cousin had done the same thing to her, she was not confusing the abuse by her cousin with the incident involving defendant. We note that the victim was only 4 years old at the time of this incident, the cousin was 11 years old, and defendant was 32 years old. We find it unlikely that the victim would confuse the abuse of her by another child with that by a grown man. Defense counsel also argued to the jury that physical evidence of injury would be expected in this case. Indeed, a nurse testified that she would expect to see some injury in a four year old who had been raped by an adult male with full penetration. That nurse, however, further testified that there may be no injury if the penetration was slight or there was lubrication. The jury heard that it was not uncommon for female rape victims not to exhibit injury to their genital area. Lastly, the defense theory was that the sperm on the victim's underwear was explained by the washing machine theory, i.e., that defendant's sperm had transferred from an item of clothing in the washing machine to the victim's underwear. The jury heard testimony that this was certainly a possibility, but the other possibility was that the sperm had been deposited on the victim's underwear through defendant's semen. The second forensic scientist testified that the defense theory was not the most probable explanation, and the jury apparently agreed. In sum, in a case such as this where the credibility of a witness is crucial to the determination of the defendant's guilt, we must be cognizant that we did not see or hear the victim testify. "[T]hose who see and hear the witnesses can assess their credibility and reliability in a manner that is far superior to that of reviewing judges who must rely on the printed record" (People v Lane, 7 NY3d 888, 890 [2006]). "The memory, motive, mental capacity, accuracy of observation and statement, truthfulness and other tests of the reliability of witnesses can be passed upon with greater safety by those who see and hear than by those who simply read the printed narrative" (People v Gaimari, 176 NY 84, 94 [1903]). The prosecutor urged the jury during her opening statement to pay careful attention to the victim when she testified: "watch her eyes, watch her demeanor, watch her as she tells you about those memories." In the prosecutor's summation, she again urged the jury to consider the victim's demeanor as she testified. It appears from the jury notes that the jury was focused on the victim's testimony, asking to have it read back to them and also asking to hear a readback from that part of the police detective's testimony where the victim disclosed the abuse to him. We see "no reason to disturb the jury's clear resolution of the issue of credibility in favor of the victim" (People v Beauharnois, 64 AD3d 996, 999 [3d Dept 2009], lv denied 13 NY3d 834 [2009]), and we are "convinced that the jury was justified in finding that guilt was proven beyond a reasonable doubt" (People v Delamota, 18 NY3d 107, 117 [2011]). Finally, we conclude that the sentence is not unduly harsh or severe. All concur except Lindley, J., who dissents and votes to reverse in accordance with the following memorandum: I respectfully dissent. In my view, the People failed to prove defendant's guilt beyond a reasonable doubt, necessitating reversal of the judgment and dismissal of the indictment. The four-year-old complainant was examined at the hospital within a day of when she alleged that defendant had raped her. Defendant had no criminal record and had never been accused of inappropriate sexual conduct by the victim or anyone else. The examination of the victim revealed a rash in the genital area but no damage to her hymenal tissue and no trauma to her vagina. As one of the nurses who examined the complainant acknowledged at trial, it is not typical for such a young girl who has been raped by a grown man to have no damage to her hymen. Although rape does not require penetration, the People's theory in this case was that defendant ejaculated inside the victim and that the sperm later drained onto her underwear, meaning that there must have been significant penetration. In an attempt to explain away the lack of physical injury, the People called as an expert witness a pediatric nurse practitioner who has examined approximately 5,000 children for suspected sexual abuse. According to the expert, only 5-10% of the female child victims displayed an injury in the genital area. On cross-examination, however, the expert clarified that the 5-10% figure includes female victims up to age 21, and that most of the 5,000 victims she examined were not "acute" patients, i.e., they were not, unlike the complainant herein, examined immediately after the alleged sexual abuse occurred. Thus, the expert's testimony with respect to the lack of physical injury is close to meaningless in this case. I note that the expert acknowledged that studies show that between 50 and 90% of female rape victims sustain physical injury to the genital area. The People assert that the complainant had pain and redness in her genital region, and that this therefore corroborates her testimony. But the complainant also had a yeast infection, which could just as plausibly explain the pain and redness, and, again, it is undisputed that there was no damage to the hymenal tissue notwithstanding the People's theory that the four-year-old complainant had been forcibly raped by an adult who ejaculated inside her. A second problem with the case is that, although defendant's sperm was found on the victim's underwear, the attending nurse performed 20 separate AP tests on the underwear, and all 20 tests were negative for semen. The People's expert testified that the sperm, which is only a small component of semen, was likely the result of "discharge" from the victim's vagina. If there was such discharge, it stands to reason that the non-sperm portions of semen would also be on the underwear, but none were found. The People have no explanation for how defendant's sperm but not semen could be on the underwear. The only explanation that has been proffered is defendant's theory that the sperm was transferred onto the underwear in the wash from clothes or bedding that contained his semen. The People's experts acknowledged at trial that this is a scientifically valid theory, as the sperm could survive the wash and become embedded in the underwear while the other components of semen would get washed away. Nevertheless, the People's DNA expert testified that she did not believe that the laundry explanation was "the most probable explanation for the sperm being there." Of course, it is not enough for the People to prove that defendant is probably guilty (see People v Carter, 158 AD3d 1105, 1106 [4th Dept 2018]); they must prove his guilt beyond a reasonable doubt. I note that none of the People's witnesses testified that the AP test can result in false negatives. I am also troubled by the complete absence of any semen or sperm on any of the swabs taken from the victim's legs, buttocks, vaginal area and anal area. If the sperm drained onto the underwear, as the People posit, one would think that it would have drained onto the victim's thighs or near her vagina. But no semen or sperm was found in any of those areas, notwithstanding that the victim had not showered or bathed since the attack. It is true, as the People point out, that we generally afford great deference to credibility determinations made by the trier of fact, who is in a far superior position to assess the veracity of witnesses (see People v Bleakley, 69 NY2d 490, 495 [1987]), and here the jury evidently believed the victim's testimony that defendant placed his penis in her vagina. The victim was only four years old when this happened, however, and she repeatedly testified that she could not remember much about the incident, other than it happened on the bed and that she was on top of defendant, which seems at odds with how the rape of a young child would usually occur. I note that the prosecutor, who was under the misapprehension that defendant had been charged with two separate rapes, asked the victim whether "this" happened another time, and the victim answered "yes." As the court later determined, defendant had been charged with only one rape, and the victim had never previously made any allegations about a second incident. The victim's affirmative response to the question about a second incident that never occurred raises concerns about the reliability of her testimony with respect to the first incident, especially considering that it is undisputed that the victim was raped by her older cousin shortly before she claimed she was raped by defendant. Concerned "about the incidence of wrongful convictions and the prevalence with which they have been discovered in recent years," the Court of Appeals has stressed the importance of the role of the Appellate Division in serving, "in effect, as a second jury," to "affirmatively review the record; independently assess all of the proof; substitute its own credibility determinations for those made by the jury in an appropriate case; determine whether the verdict was factually correct; and acquit a defendant if the court is not convinced that the jury was justified in finding that guilt was proven beyond a reasonable doubt" (People v Delamota, 18 NY3d 107, 116-117 [2011] [emphasis added]; see People v Oberlander, 94 AD3d 1459, 1459 [4th Dept 2012]). Here, I am not convinced that defendant's guilt was proven beyond a reasonable doubt. I therefore vote to reverse the judgment and dismiss the indictment. Entered: April 26, 2019 Mark W. Bennett Clerk of the Court
Mid
[ 0.557377049180327, 29.75, 23.625 ]
Establishment of Croton stellatopilosus suspension culture for geranylgeraniol production and diterpenoid biosynthesis. Diterpenoids in higher plants are biosynthesized from isoprene units obtained from two distinct pathways: the mevalonate pathway and the deoxyxylulose phosphate pathway. The metabolic partitioning of both pathways in plant species is dependent upon the type of culture. In order to study the diterpenoid biosynthesis in Croton stellatopilosus cell culture, callus culture was firstly induced from C. stellatopilosus young leaves in Murashige and Skoog (MS) medium in the presence of 1.0 mg/l 2,4-dichlorophenoxyacetic acid (2,4-D), 1.0 mg/l benzyladenine (BA), 3% (w/v) sucrose and 0.8% (w/v) agar. The suspension culture was further induced from its callus in the same medium without gelling agent. Detection of diterpenoid accumulation by gas chromatography-mass spectrometry revealed that a cell culture could accumulate a low amount of geranylgeraniol (GGOH) and a high content of fatty acids and phytosterols. To improve the GGOH production, the culture conditions were optimized by medium manipulation in terms of hormonal factors. The growth rates of cell cultures were similar in all kinds of media. The GGOH production curve indicated that GGOH plays an important role as a primary metabolite in the cell culture. The optimum medium for GGOH production was MS medium supplemented with 2.0 mg/l 2,4-D and 2 mg/l BA that could produce GGOH with a yield of 1.14 mg/g FW.
High
[ 0.6666666666666661, 34.5, 17.25 ]
YEREVAN, DECEMBER 7, ARMENPRESS. During the 13th session of the Second Protocol to the Hague Convention of 1954 for the Protection of Cultural Property in the Event of Armed Conflict at the headquarters of the UNESCO on December 7 the members of the committee unanimously made a decision to grant Monastery of Geghard and the Upper Azat Valley with Enhanced protection. As ARMENPRESS was informed from the press service of the MFA Armenia, by this decision Monastery of Geghard and the Upper Azat Valley became the first cultural heritage of Armenia to be granted with Enhanced protection. The monastery of Geghard and the Upper Azat Valley contains a number of churches and tombs, most of them cut into the living rock, which illustrate Armenian medieval architecture at its highest point. The complex of medieval buildings is set into a landscape of great natural beauty, at the entrance to the Azat Valley. High cliffs from the northern side surround the complex while the defensive wall encircles the rest. The monuments included in the property are dated from the 4th to the 13th century. At the early period, the Monastery was called Ayrivank (Monastery in the Cave) because of its rock-cut construction. The monastery was founded, according to tradition by St. Gregory the Illuminator, and was built following the adoption of Christianity as a state religion in Armenia (beginning of the 4th century AD). The main architectural complex was completed in the 13th century AD and consists of the cathedral, the adjacent narthex, eastern and western rock-cut churches, the family tomb of Proshyan princes, Papak’s and Ruzukan’s tomb-chapel, as well as various cells and numerous rock-cut cross-stones (khachkars). The Kathoghikè (main church) is in the classic Armenian form, an equal-armed cross inscribed in a square in plan and covered with a dome on a square base, linked with the base by vaulting. The east arm of the cross terminates in an apse, the remainder being square. In the corners are small barrel-vaulted two-storey chapels. On the internal walls there are many inscriptions recording donations. The masonry of the external walls is particularly finely finished and fitted. A gavit (entrance hall) links it with the first rock-cut church. The first rock-cut church was built before 1250, entirely dug into the rock and on an equal-armed cruciform plan. To the east, a roughly square chamber cut into the rock was one of the princely tombs (zhamatoun) of the Proshyan Dynasty. This gives access to the second rock-cut church built in 1283. The second zhamatoun, reached by an external staircase, contains the tombs of the princes Merik and Grigor. A defensive wall encircled the monastery complex in the 12th to 13th centuries. Most of the monks lived in cells excavated into the rock-face outside the main defensive wall, which have been preserved, along with some simple oratories. St. Astvatsatsin (Holy Mother of God) chapel is the most ancient preserved monument outside the ramparts and is located on the western side. It is partially hewed in the rock. There are engraved inscriptions on the walls, the earliest of which date back to 1177 and 1181 AD. Residential and economic constructions were built later, in the 17th century. The monastery of Geghard is a renowned ecclesiastical and cultural centre of medieval Armenia, where a school, scriptorium, library and many rock-cut dwelling cells for clergymen could be found in addition to the religious constructions. Historians Mkhitar Ayrivanetsi, Simeon Ayrivanetsi, who lived and worked there in the 13th century, contributed to the development of the Armenian manuscript art. It was also renowned for the relics housed there. The most celebrated of these was the spear, which had wounded Christ on the Cross and was allegedly brought there by the Apostle Thaddeus, from which comes its present name, Geghardavank (the Monastery of the Spear). The spear was kept in the Monastery for 500 years. Relics of the Apostles Andrew and John were donated in the 12th century and pious visitors made numerous grants of land, money, and manuscripts over the succeeding centuries. The Monastery of Geghard, with its remarkable rock-cut churches and tombs, is an exceptionally well preserved and complete example of medieval Armenian monastic architecture and decorative art, with many innovatory features which had a profound influence on subsequent developments in the region. The Geghard complex is an exceptionally complete and well preserved example of a medieval monastic foundation in a remote area of great natural beauty. There have been no changes on the components of the inscribed property since the time of inscription. In addition, the property is surrounded by a substantial buffer zone, established in 1986, within which there are strict controls over any form of development and change. However, its location in an active seismic zone, the pollution of the surrounding environment, the risk of rockslides, as well as the active tourism route are the main threats to the integrity of the site. The Monastery of Geghard, with its remarkable rock-cut churches and tombs, is still preserved in its natural setting. The authenticity of the group is high, not least because the property has been in continuous use as a monastery for many centuries. All constructions included in the property, as well as the landscape, are not threatened in spite of restorations carried out during course of time. To meet conservation challenges, scientific research, renovation, fortification, design and preventive measures have been undertaken in order to ensure that authenticity is retained. Due to the passage of time, a part of the wall adjacent to the auxiliary construction collapsed and was renovated in 2006-2007, keeping the original materials. The designs for water isolation of the rock-hewn part and comprehensive interventions for Geghard Monastery were drafted in order to strengthen the complex. The property is under the ownership of the Armenian Apostolic Holy Church. Notwithstanding the ownership, the monuments are protected by the Law “On protection and usage of the historical and cultural immovable monuments and historical environment” of the Republic of Armenia, and by the regulation “On State registration, study, protection, fortification, restoration, reconstruction and usage of the historical and cultural immovable monuments”. Additional articles exist also in Civil, Administrative, Land, and Criminal Codes of the Republic of Armenia for the protection of monuments. The Ministry of Culture of Armenia, with its specialized units acting as authorized republican bodies, and the Armenian Apostolic Holy Church with its specialized units and the diocese as owner, as well as non-governmental, nature protection units and people interested in Armenian heritage conservation are engaged in the protection of the monastery complex. Edited and translated by Tigran Sirekanyan
High
[ 0.7028423772609811, 34, 14.375 ]
Optimizing A* for grid maps - smcgivern http://simblob.blogspot.com/2015/02/optimizing-for-grid-maps.html ====== sago Take a look at Mikko Minonen's excellent open source Detour and Recast libraries: [https://github.com/memononen/recastnavigation](https://github.com/memononen/recastnavigation) He does automatic graph construction from dense data. Recast can generate this dense data automatically by populating a graph at voxel centers based on the level geometry, but it can also accept a tile-grid at that point. It is a terrific system, and if you want to learn about how robust pathfinding should be done in games, you can do much worse that find out how it works. ~~~ revelation Seconded, Recast+Detour is terrific. You can feed it raw tris, the same stuff you would send to the graphics card to render, and get out a high quality, extremely fast navigation mesh. ------ LewisJEllis Related to this idea is the "Jump Point Search" algorithm, an optimization of A* which does this sort of straight-line optimization for exactly this use case. [http://zerowidth.com/2013/05/05/jump-point-search- explained....](http://zerowidth.com/2013/05/05/jump-point-search- explained.html) ------ willyg302 > Navigation meshes, visibility graphs, and hierarchical approaches are all > worth a look. Navigation meshes in particular are worth consideration. There is a great reference here [1] from Epic Games about navigation meshes, and why they made the switch from a traditional node-based graph to them for the Unreal Engine. Although for most simple cases, a graph is much easier to conceptualize and implement. [1] [https://udn.epicgames.com/Three/NavigationMeshReference.html](https://udn.epicgames.com/Three/NavigationMeshReference.html) ~~~ yoklov Navmeshs are pretty common these days. My perspective is that they're much more common for high end games than any other technique (nodes, grids, ...), but that might just be because we use them at work. ------ chinpokomon This was basically what a lot of Quake era bots did to improve their AI. In order to find their way around a map, they precomputed paths. Later bots, when put in a map that wasn't precomputed, they would build a similar mapping on the fly, pruning "symmetrical" nodes and therefore reducing their path finding. When the not would discover the location of an item, it would graft that new branch back into the graph. ------ stcredzero I've been thinking about doing this for procedurally generated dungeon maps. Basically, randomly add some subset of grid squares, then work out naive as- the-crow-flies connectivity between the closest neighbors to generate the sparse graph. For straightforward corridor and room maps, each corridor/room object just becomes a node. ------ darylteo I attempted the recent MIT AI competition, but stumbled at the point where I wanted to build something like the post suggests, except that the map is not initially discovered. :( if anyone could point me to a method for constructing such a graph through discovery, that would be great. ~~~ sgift Not a solution but a starting point: [http://en.wikipedia.org/wiki/D*](http://en.wikipedia.org/wiki/D*) I used this for a similar problem in my computer science studies. We had a map with an unknown layout of fields, each with a different travel cost and had to drive a tour of multiple flags in the fastest way possible. It worked quite well.
Mid
[ 0.6125356125356121, 26.875, 17 ]