meta
dict | text
stringlengths 2
641k
|
---|---|
{
"pile_set_name": "Pile-CC"
} | Josh, this character posted 143 topics into the Introduction forum, each nothing more than a commercial promotion for drubs. I reported several, and hope you realize what this person has managed to accomplish. Unfortunately, I doubt there is much of anything that can be done to prevent others from doing the same thing, and this could mean the demise of not only these forums, but those of anyone who trash like this can infiltrate.
Roadside, thanks for the report. I've banned the user and deleted the spam. Unfortunately, because we have such a large amount of views happening on this site, we will always be the target of spammers. I usually check the site a few times a day and delete the spam as I can. I'm constantly on the lookout for new ways to block these idiots, but they keep finding new ways in.
Feel free to just report one of the instances of spam, know that I will read it and take action. I can delete all of the postings by one user in one fell swoop, so if they post repeatedly all of those posts will be gone with one keystroke. |
{
"pile_set_name": "OpenWebText2"
} | If the last three days still are a blur to Amanda Duffy, she’s very good at hiding it. Of course, part of that could be because she’s had ample time to practice over the last three years.
In the fall of 2015, the then-36-year old ECU alum had just been named the president of Louisville City FC after their wildly successful maiden season.
The appointment, which made her the first female executive in the USL to lead a team, capped off a meteoric rise in the American second division, which in just 12 months saw her hired from the league office to Vice President of Operations then promoted to Asst. GM and GM.
Now 39 and the de facto commissioner of the NWSL, she was seen just this past Saturday in Portland, handing out the 2018 NWSL Championship Trophy to her hometown team, the North Carolina Courage. A day earlier, she presented the MVP Award to Thorns and USWNT standout Lindsay Horan.
The final in the Rose City was attended by 21,144 fans -- an all-time record for a women’s final -- and watched live by thousands more on Lifetime, who now are in year two of a broadcast deal she helped close.
Sounds like a serious candidate for any top executive role in MLS. So when might the Galaxy give her a ring? And if they did, why wouldn’t she immediately hang up?
* * *
As I explored last week, one of the reforms the Galaxy should strongly consider ahead of the 2019 offseason is the hiring of a full-time Sporting Director, similar to Claudio Reyna at New York City FC or Carlos Bocanegra at Atlanta United.
Just to remind everyone, a sporting director is not the same thing as a general manager, although there may be some overlap in their duties. Several clubs around the league, including the two mentioned above, have one to whom either a separate GM or a head coach/GM reports.
The Galaxy don’t even have the latter. Team President Chris Klein is responsible for managing both the business and soccer sides of the organization, and it’s under this arrangement that they could miss the playoffs twice in a row for the first time in 10 years.
In addition to Duffy, here are some possible names that could change that.
Ali Curtis
To many, this the most obvious person for the job. Curtis is a proven young executive himself, who will almost assuredly be considered for every future open SD or GM role until he’s hired.
The 39-year old former Blue Devil played three years in Major League Soccer before going to work for JP Morgan and later, the league office, as Senior Director of Player Relations and Competition.
In 2014, he was hired by the New York Red Bulls to align the academy, reserves, first team and scouting department with the club's European affiliates. The top brass were impressed with his now famous 300-page plan, which apparently included firing popular coach Mike Petke and eschewing the team’s pursuit of aging superstars.
Before the 2017 campaign, Curtis negotiated his exit, citing "different views" as his reason. He's been self-employed as a consultant since, although was considered a finalist for the new USMNT GM job.
Why he’d be a good fit: Curtis clearly knows how to form a coherent, long-term plan and execute it, even if it requires some short-term pain. He’s also not shy about explaining his decisions to hostile crowds. Both traits mark a welcome contrast from Chris Klein, who, despite saying many of the right things, has been criticized by some fans and pundits for being aloof. Finally, Curtis’s success in building a youth-first culture at Red Bulls should be especially appealing to a Galaxy team that hasn’t had a homegrown star since Gyasi Zardes, even with what some have said is the most talented academy class in MLS history.
Why he wouldn’t: Though there’s much to like about Curtis, some questions linger. Arguably the biggest one is: just what happened in New York? Rumors abound of a power struggle between him and then-head coach Jesse Marsch, who he hired. Curtis denies them, but it’s evident his relationship soured with someone important and he couldn’t continue on any longer. Another issue is whether or not his extreme focus on youth is right for LA. Some would be happy if the Galaxy never signed a player of Zlatan’s stature again; many wouldn’t be. And while Curtis is a big community guy, the vision he comes in with could alienate half the LAG fanbase before he has the chance to win them over.
Would he even answer the phone? After narrowly losing out on the USMNT GM job to Earnie Stewart this year, we know Curtis isn’t done with soccer. His time at Red Bulls may have ended far sooner than anyone expected, and because of that, the Galaxy could certainly use his motivation and skillset as they try to recover their status as the league’s glamor team. But NYRB weren’t the Continental Tire™ fire the Galaxy are when he joined them, and if he’s afraid of being overruled again, he’d do well to get proof of his authority in writing or walk away.
Amanda Duffy
The aforementioned Duffy brings a wealth of experience to draw upon from her time in the USL and NWSL. There’s not much else to say about her that wasn't covered in the intro, so let’s advance to the all-important question of job aptitude.
Why she’d be a good fit: In 2014, with less than four months before their inaugural season, Louisville were a team without a GM. Djorn Buchholz had resigned less than a few weeks after hiring Duffy, and now she was tasked with assembling a roster of a professional men’s side with little help. That year, Louisville not only made the playoffs but the Eastern Semifinal. A year later, while she was president, they replicated that same feat. Her ability to work in highly dynamic environments and still succeed proves her rapid ascent is no accident. And the connections she's forged in the USL and NWSL would surely benefit a Galaxy team with no holistic plan for their academy or USL team. Could she help land LA a NWSL franchise? Who knows, but it’s hard to think she hurts the Galaxy’s chances.
Why she wouldn’t: Let’s be clear from the start: Duffy’s potential success or failure in this role won’t hinge on the fact that she’s a woman. Even before joining Louisville, her resume was highly-decorated, and she’s since gone from strength to strength, serving as Managing Operations Director of the NWSL ever since previous commissioner Jeff Plush stepped down in 2017. If there are any concerns unique to her candidacy, it’s that she seems to rarely stay in one place for long. Throw in the fact that she’s never been in MLS and that big red disclaimer about Dan Beckerman and Klein, and one starts to see why this may not work.
Would she even answer the phone? Honestly, the answer to this question for so many candidates is "I have no idea". But of course, what fun is it to hear that? Duffy has left the women’s side of the league for the men’s before, and a position in MLS is about as high as many can climb in this sport -- barring a position with USSF, CONCACAF or FIFA. The longer the NWSL goes without finding a new full-time commissioner though, the more likely it is they just give Duffy the job. That could in fact be what she’s angling for now, and despite all the issues the NWSL has, it’s still debatable which situation would appeal to her more.
Craig Waibel
After being fired from the New York Red Bulls by new Sporting Director Ali Curtis, Mike Petke remained unattached for nearly two years. In 2017, he finally resurfaced in Utah, now as the head coach of Real Salt Lake’s USL affiliate, the Monarchs.
It was a move that surprised as many people as his firing did. Here was a coach who won a Supporter’s Shield as recently as 2013 and made it to the Eastern Conference Final in 2014... yet all he could get was a lowly USL job?
Then all of a sudden, Jeff Cassar was out, and Petke was in. As if GM Craig Waibel planned it all along.
Waibel, a former MLS journeyman who suited up for the Galaxy en route to their first ever Cup, has been a ruthless exponent of playing the kids in MLS. Earlier this year, RSL fielded seven homegrown players against Sporting Kansas City and later made history with FC Dallas for the most homegrown players in a single match. The game was also the first time a team fielded an all-homegrown backline in MLS history.
RSL has always been one of the more economical teams in the league since their inception, and Waibel has continued the doctrine of getting more with less since 2015.
Why he’d be a good fit: Waibel’s commitment to youth is one few can match. His brutal firing of Jeff Cassar and disposal of forwards Alfredo Ortuno and Yura Movsisyan reveals a willingness to make changes as soon as they’re necessary. The Petke hire was calculated and opportunistic. If he brought the same values to the Galaxy as he’s shown at RSL, one would have to think he could do a lot better than the current regime.
Why he wouldn’t: For all his success at RSL, there’s a concern about whether he’s actually done all he can to build them into a contender. A stat often used to highlight an inept defense is unforced errors, and Waibel seems to have a few, like keeping Cassar around for a whole offseason -- only to can him three games into the 2017 season-- and signing Ortuno and Movsisyan. What good is it to atone for your mistakes if you keep making them? Another question is whether he’s utilized the Monarchs to develop homegrowns enough. If either of these seem familiar, it’s because we’ve heard them asked of Klein and VP of Soccer Operations, Peter Vagenas. Perhaps here though, it’s more a case of being hamstrung by financial limitations and a meddlesome owner.
Would he even answer the phone? Well, let’s say this: if not, you know the Galaxy’s restructuring efforts are screwed. Waibel’s contract is up at the end of this year, and some fans think he should go. A position with the Galaxy isn’t only leaving before he’s pushed, it’s leaving for a bigger and better opportunity. However, if he doesn’t consider it one, what does that say about this FO? Almost certainly that they don’t have a chance of hiring many top-shelf candidates to this role.
Garth Lagerwey
The second Duke alum on this list, Lagerwey is arguably its most recognizable name and the most successful.
After serving as RSL’s GM for seven years -- a period that saw the club move into a new stadium, make four Cup finals, and sell to a new ownership group -- the 45-year old retired goalkeeper traded his view of the Rockies for gloomy PNW skies.
His time with the Seattle Sounders has already seen the biggest shake-up at the organization since joining MLS in 2008.
It has also seen the Sounders appear in their first two MLS Cup Finals ever, winning it all in 2016.
How could such an accomplished executive come on the market, and could his style of management work in LA? Let’s examine.
Why he’d be a good fit: If Craig Waibel deserves credit for anything he’s done at RSL, that’s not messing with the framework laid by his former boss. Lagerwey’s analytical approach in Sandy put RSL on the map after many doubted whether they could contend with their better-funded rivals. His emphasis on youth development is something that he’s since carried over to Seattle, honing the academy and S2 into one of the better set-ups in the country. And his ability to scout impactful central and South American players like Roman Torres, Nicolas Lodeiro and Raul Ruidiaz is unimpeachable. In LA, he’d be reunited with chief scout Kurt Schmid and presumably turn his attention to bolstering the team’s presence in the southern hemisphere. Oh, and getting the academy-to-first team pipeline up to code.
Why he wouldn’t: Despite having the resume he does, there's no such thing as a flawless candidate, and Lagerwey’s efforts to disrupt traditional thinking in the Emerald City have drawn resistance from a vocal minority of fans (more on that later). He’s still blamed for disbanding one of the most lethal duos in MLS history by selling striker Obafemi Martins to China plus forcing Sigi Schmid out without giving him a chance with Lodeiro. And while the team would later rally around interim coach Brian Schmetzer to win the MLS Playoffs that year, it illustrates the dangers of his fanatical devotion to moneyball tactics. There was a time under Arena when the Galaxy, not Seattle, were known for going on late season runs. That didn’t make it sustainable then, and that doesn’t make it sustainable now.
Would he even answer the phone? Probably the biggest factor in all of this will be his status come October, when the Sounders’ Alliance Council decides whether he should be retained or not. Letting fans vote on the fate of team officials isn’t unheard of in other parts of the world but is unique in North America. If he loses the vote (and this Sunday's defeat to LA improves those odds), he could become available for the Galaxy. Hell, if he wins but by a close margin, he could become available for the Galaxy. LA in theory offers him more resources and more job security. And they already saved him the trouble of firing Sigi.
So far, all the names we’ve reviewed have had a large enough body of work to safely draw conclusions about their strengths and weaknesses. That’s in turn made it easier to predict how they’d each interface with this Galaxy FO.
It also makes Dunivant, the 37-year old Galaxy legend-turned-executive, the most wildcard entry on this list. He could have the most upside of any of the candidates or none at all.
As a player, Dunivant always seemed destined for a career in management. In 2002, a year before being drafted by the San Jose Earthquakes, he graduated early from Stanford with a BA in Economics. Known as a defender with an immense soccer IQ, he then helped the Galaxy win four of their five MLS Cups, two Supporter’s Shields and one US Open Cup.
Dunivant retired in 2015, after negotiating a new CBA as a representative for the Players Union. The following year, he was tapped as the Director of Business and Soccer Operations for the SF Deltas. It was there he hired Marc Dos Santos and built a roster that won the NASL Championship in their first and only season.
Now, he’s the GM of Sacramento Republic FC, an MLS expansion hopeful that sits fourth in the USL West.
Why he’d be a good fit: Dunivant is very much an idealist who dreams of building great things. His decision to join the Deltas and then Sacramento knowing the risks demonstrates this. He’s already started a youth movement with Republic and would, like all the other candidates mentioned here, undoubtedly work to fix LA’s broken development system. But Dunivant is unique in that he played under the current regime, and that may give him an edge. If your criticism of the FO is that they’ve lost their way and just need to be nudged back on track, then hiring Dunivant, himself an advocate of promoting from within, makes a lot of sense.
Why he wouldn’t: The challenge the FO already have is refuting the perception that they’re an old boys’ club; Dunivant, however capable he is, doesn’t help that. That could cost him support, particularly if his ideas are too similar to what we’ve seen before. After all, what good is trading in your old Chris Klein for this year's model? To that point, Dunivant has the least experience of any candidate when it comes to managing a professional team, and there will always be those who say luck was responsible for everything he’s achieved.
Would he even answer the phone? You don’t make 193 appearances in two stints with the Galaxy only to let that call go to voicemail. Does he answer? Of course he does. The better question is, would he accept the job? Because for a team that employs as many ex-players as they do, it’s hard to buy the idea that Dunivant was never offered so much as a ceremonial janitor role. That could indicate he didn’t like management or they didn’t like him. And similar to Duffy, it’s far from given he’d surrender his gig at Sacramento just because the LA job is higher profile.
* * *
In the end, there’s definitely no shortage of qualified candidates the LA Galaxy might have if they agree that hiring a Sporting Director is within their best interests. I may have only gone over five of them, but if you have another idea, shout it out.
For all we know, the Galaxy’s search could take them in an entirely different direction than we’re expecting. A Jurgen Klinsmann sighting at Stubhub this weekend generated plenty of speculation before ESPNFC reporter Jeff Carlisle tweeted that he's not a candidate for a front office role. I guess we'll find out how true that is soon enough. |
{
"pile_set_name": "Pile-CC"
} | Sound and Keys
The Alesis VI61 is an advanced USB/MIDI keyboard MIDI controller that lets you take command of your music software with a series of pads, knobs, and buttons. With 61 velocity-sensitive semi-weighted keys with aftertouch and Octave Up/Down buttons, you can expand the keyboard to the full melodic range and play bass lines, chords, and melodies. VI25 also features 12 assignable knobs and 36 assignable buttons for manipulating effect plugins and virt...
The Alesis VI49 is an advanced USB/MIDI keyboard MIDI controller that lets you take command of your music software with a series of pads, knobs, and buttons. With 49 velocity-sensitive semi-weighted keys with aftertouch and Octave Up/Down buttons, you can expand the keyboard to the full melodic range and play bass lines, chords, and melodies. VI25 also features 12 assignable knobs and 36 assignable buttons for manipulating effect plugins and virt...
The 3I-2918-14BE Pro Audio Utility Case measures an impressive 29” Long x 18” Wide x 14” Deep, is molded of ultra high-strength polypropylene copolymer resin, and features a gasketed, water and dust tight, submersible design (IP67) that is resistant to corrosion and impact damage, and an automatic ambient pressure equalization valve (MIL-STD-648C) to assist with moisture control.This 3I Series size was the first developed specif...
SKB has introduced a custom i Series Injection Molded case for the PreSonus 16.0.2 digital performance/recording mixer. The 3I Series of waterproof cases are the perfect solution for storing and transporting your delicate electronics, A/V equipment, microphones, mixers, cables, computers or percussion and music accessories. The custom foam is housed in a 3i2217 8B i Series case that features a waterproof design and (4) SKB patented trigger latche...
The Steinberg UR242 is a 4 x 2 USB 2.0 Audio Interface with 2 x D-PRE and 192 kHz support & MIDI I/O. Be ready to record music in studio quality on your notebook or iPad with the UR242. With outstanding audio and build quality for its price class, the UR242 combines choice components with advanced onboard DSP-powered FX to offer solutions for a huge range of mobile production scenarios.Features: 24-Bit/192 kHz: Top of the range conve...
Take Command.Samson's Conspiracy MIDI Control Surface lets you command your software with authority. Featuring an ultra-portable design and impressive array of customizable, tactile controls, the Conspiracy is the answer for producers/DJs, performers and mobile musicians looking to expand their creativity in live and studio production settings.The core of the Conspiracy is made up of 25 velocity-sensitive trigger pads with aftertouch for sequenci...
Samson's DK607 7-Piece Drum Mic Set offers everything you need to achieve great sounding drums live or in the studio. Each microphone in the DK607 has been meticulously designed and tested to capture the natural tone of your kit.The DK607 features Samson's Q6K kick drum microphone, four Q6I snare/tom microphones and a matched pair of C602 pencil condenser microphones. Each mic features a shock-mounted neodymium element and precise capsule porting... |
{
"pile_set_name": "USPTO Backgrounds"
} | The invention relates to an intracardiac blood pump and in particular to a blood pump which can be completely inserted through adjacent vessels into the heart to support the natural pumping function of the heart or replace it by continuous pumping operation.
A pump device for supporting the heart function is described in WO94/09835 (Jarvik). Said pump device comprises pumps operating independently of each other, each pump being provided with a pump section and a drive section rigidly connected with the pump device. The pump section of the one pump is inserted through an apecal operation opening into the left ventricle such that it delivers from the left ventrical into the aorta. The other pump section is inserted through another preferably apecal operation opening into the right-ventricle so that it delivers from the right atrium into the pulmonary artery. Each of the pumps is extended at its pump outlet by a hose-type outlet canula which may be guided through the respective heart valve.
An intracardiac blood pump which is inserted from the aorta through the aortic valve into the left ventricle is known from WO97/37696 (Rau et al). Here the pump inlet is extended by a hose passing through the aortic valve.
From WO97/37697 (Rau et al.) an intravascular blood pump is known which can moved through a blood vessel. This blood pump, too, is, extended at its outlet end by an intake hose. Said intake hose comprises an inflatable balloon serving as isolating device and preventing blood from flowing laterally along the outside of the intake hose.
Finally, U.S. Pat. No. 4,753,221 (Kensey et al.) describes a pump catheter having a pump to be placed in the heart. Said pump comprises an impeller and a pump casing surrounding said impeller. The pump casing can be placed in the heart when the former is in the collapsed condition and subsequently unfolded by inflating a balloon connected with the pump casing.
Further, small-lumen catheters for pressure and volumetric flow measurement are known which serve for diagnostic purposes and comprise an inflatable balloon at the distal catheter end. Said balloon is used for positioning the catheter tip in the pulmonary artery.
Intracardiac blood pumps which are inserted through a blood vessel into the heart are difficult to correctly place in the heart. In particular when the blood pump is inserted through the upper vena cava to pump blood from the right atrium into the pulmonary artery, correct placing of the blood pump is difficult since the pump must perform a bend of approximately 180xc2x0 to ensure that the intake opening is located in the right atrium and the outlet opening in the pulmonary artery. Further, numerous fibres and tendines exist in the right ventricle, which retain the tricuspid valve, protect the leaflet of the valve against bulging inside out and ensure inherent stability of the heart. A blood pump inserted through a vena cava must be guided between such fibres and tendines.
It is the object of the invention to provide an intracardiac blood pump which can be relatively easily placed in the heart.
According to the invention this object is solved by means of the features stated in claim 1.
A flexible hose is attached to the pump outlet of the blood pump according to the invention with the distal end of the hose comprising a balloon acting as guide element in the blood flow. The invention utilizes the fact that the blood naturally flows in the heart from the vena cava into the right atrium and through the right ventricle into the pulmonary artery. The blood pump which comprises a balloon at the distal end of the hose is inserted along this path with the balloon floating in the blood flow automatically finds its way from the right atrium into the pulmonary artery. The hose outlet is subsequently stabilized in the pulmonary artery wheras the pump section is positioned in the right atrium. The pump hose performs a bend of approximately 180xc2x0. In this way it is possible to correctly place the blood pump including the pump hose in the heart without the hose outlet pushing against the ventricular septa or diagnostic aids (X-rays or ultrasound) being required.
The term intracardiac within the meaning of the present invention includes the heart chambers (ventricles), the atria and the adjacent vascular stumps.
The pump hose should prefably be prebent according to its final position which it will assume in the heart. This requires bending by at least approximately 150xc2x0. Although the pump hose must be capable of being elongated for insertion through the vena cava it should assume a U-form or a V-form in the slackened condition. It would be particularly preferred that the pump hose displays a flexural rigidity which decreases from the proximal end to the distal end. In this way the distal end as path finder can be easily moved so that the balloon can better follow the natural blood flow.
The balloon must not necessarily be directly attached to the pump hose. It may also be fixed to a catheter which forms part of the pump hose and extends on the inside or the outside of the latter. In any case a lumen must extend towards the balloon via which the balloon can be inflated. A second lumen may additionally be provided into which a guide wire is inserted which facilitates advancing of the pump hose through the vascular system. After removal of the guide wire said second lumen may be used as pressure measuring lumen.
According to a preferred embodiment the balloon is configured as annular balloon and surrounds the pump hose. The advantage of such a configuration is that owing to the presence of the balloon the distal hose end has an increased outside diameter and is thus retained by the pulmonary valve. In this way the balloon helps to anchor the hose end to the pulmonary valve while the hose outlet is located in the pulmonary artery. This prevents the hose outlet from slipping out the pulmonary artery. Another advantage is that the annular balloon forms a rounded blunt end of the pump hose so that the pump hose cannot damage the vascular or heart walls or other parts of the heart. Finally, the hose end is prevented from hooking at the valve margin or tendines in the heart.
Since the pump section pumps into the pump hose, the pump hose is automatically kept open. Thus a collapsible hose can be used as pump hose, e. g. a hose made of sheet material, whose wall is not inherently stable. Through this hose a catheter may extend to the balloon arranged at the distal end.
When an intracardiac blood pump with a flexible pump hose is used there is the danger that the blood leaving the hose outlet causes a recoil at the hose, which may result in a retrograde displacement of the hose. Thus the hose may slip out of the pulmonary valve. It is thus a further object of the invention to provide an intracardiac blood pump in which displacements of the hose due to hydraulic reaction forces are prevented.
According to the invention this object is solved by means of the features stated in claim 13. To the distal end of the hose a traction element is fixed to which the pumped flow is directed. Said traction element may be a leaflet or a balloon. The blood flow leaving the hose end pushes against the traction element, which produces a forward directed force acting against the retraction force of the hose. In this way the traction element serves for a stabilized positioning of the pump hose. |
{
"pile_set_name": "PubMed Central"
} | *Müller MA, Meyer B, Corman VM, et al. Presence of Middle East respiratory syndrome coronavirus antibodies in Saudi Arabia: a nationwide, cross-sectional, serological study. Lancet Infect Dis 2015; **15:** 559--64*---In this Article, the affiliation for the authors Malak Al-Masri, Raafat F Alhakeem, Abdullah M Assiri, and Ziad A Memish should have been "Ministry of Health, Riyadh, Saudi Arabia". Additionally, the affiliation for Abdulhafeez Turkestani should have been "Makkah Regional Health Affairs, Ministry of Health, Makkah, Saudi Arabia" only. These corrections have been made to the online version as of May 19, 2015.
|
{
"pile_set_name": "Pile-CC"
} | Text Your Ex Back
tisdag 4 mars 2014
Should Co-Workers Date
Working closely together five days a week can definitely cause some enviable heat to ignite between certain co-workers. Sometimes it’s a true chemistry that causes two people to be attracted to each other. It can also be due to loneliness at home, which can actually happen whether the person is single or married. In fact, many times marital problems are the root cause of office romances and affairs. Then, there are times when two people are drawn to each other and just happen to work at the same place.
To start with, the subject of affairs needs to be addressed because these are always very bad ideas, particularly between two married co-workers. Even worse is the idea of an affair between boss and staff member. These NEVER end well, and when they do, as they WILL, there will be at least one person out of a job. On occasion, both boss and staff member can be joining the ranks of the unemployed. If you’re that staff member and are flattered by the attentions of your boss, please keep things on a professional level, for your own good.
Married co-workers should never engage in anything romantic. They can be friends and enjoy each other’s company, but they should never take that fatal step of going over the line and falling into bed together. When the spouses find out, and never doubt that they will, things will begin to crumble for both of the people that were unfaithful. Actually, there are at least four people in that scenario that can be hurt.Then, there are those couples that simply feel drawn to each other and probably would be attracted to each other no matter how they met. This connection isn’t necessarily a bad one, but it can be a tricky one. That’s because these couples may be in a budding relationship that shouldn’t be tested by the dangers of being together TOO much. What happens when the two of you have an argument? Something like that can easily have a huge effect on the quality of work that the two of you deliver at work while the argument lasts.
Something else to think about is the amount of time you’ll be spending with each other. If you just work for the same company, chances are good that you will be working in separate offices and will only see each other during breaks and at lunch. An arrangement like that doesn’t put as much stress on a relationship as working in the same office a desk or two apart from each other. Just working in the same building can actually enhance a romantic relationship. You can always meet at lunch for a sandwich and a quickie to really spice things up.
On the other hand, if you do work in the same office, it may be beneficial to the relationship for one of you to try to transfer to another office or department in the company. Some couples make a professional and personal relationship work out nicely. If you follow some common sense ground rules, it may work out that way for you, too.
If you are in pain and confused?
Here’s some good news…
Did you know that most relationships CAN be salvaged? You may find it difficult to believe that almost every break up for whatever reason…infidelity, plain old lost passion, loss of interest, a stolen heart and worse…even the worst situations you can imagine…like men serving prison sentences have salvaged their relationships. Yes, even Ex-cons have got back together with girlfriends and wives after being away for years!
There is hope…
Now I can almost see you shaking your head in disbelief…
And it’s okay…let me ask?
Don’t you know couples that have gotten back together? A girl that has taken a guy back?…or vice versa?
I bet you do…and here’s the strange real clincher…
Do you remember why they broke up in the first place? I bet you know at least one guy or gal that took their lover back after an affair…or unfaithfulness…or worse even?
Think about it for a sec…
Sure! And I bet you know of…or have heard of at least one girl that has taken a guy back that REALLY should not have…you know the ones I am talking about…(and I know this is kind of dark)… the girls or guys that are in verbally or physically abusive relationships.
Now, that is some really dark stuff and I am not recommending to anyone to take someone back if the relationship was abusive…I am using it as a point that almost NO SITUATION is unsalvageable…
“Couples reunite every day REGARDLESS of the situation!”
Seriously, Doesn’t that make sense? That if most of us can think of couples that have gotten back together…under even some horrible circumstances…that there could be somehidden recipe, or secret even, to reigniting passion and recapturing lost love?
Now…I am not saying they were holding some “secret love spell” book and doing weird chants…not at all…at the same time somehow, by MOSTLY accident they said and did the RIGHT THINGS at the RIGHT TIME…and won back the heart of their lover…or at least created the circumstances where their ex gave them a second chance.
Allow me to repeat…they did this by mostly ACCIDENT!
Imagine…
What if? What they said…and what they did…could be “bottled” so to speak? And then you could “unbottle” it and put it to use? To erase old hurts…to reignite passion again…to turn back to a time when your relationship was fresh, new and exciting.
Yes…A Magic Love Recipe…in a sense…
You see there IS a “recipe for love” as well as a recipe for winning back and keeping some ones interest, desire, passion, heart and love…
What they did by “accident” can be repeated over and over on PURPOSE!
And you know what?
If I were you…I would be somewhat skeptical right now…that’s totally fine! I am going to show you some concrete proof. Just bear with me okay?
Do you have these symptoms?
-Leaving the radio off because every song makes you cry
-Loss of appetite
-Binge eating for comfort
-Calling your ex several times a day
-Text messaging and emailing constantly (Text Message Terrorism)
-Constantly checking your email and voice mail to see if he/she called
-Not going out because you are afraid to miss a call
-Thinking non-stop about why they REALLY left you
-Feeling massively depressed
-Feeling urges to spy on them
-Endlessly rehearsing what you should have said
-Endlessly rehearsing what you will say if you bump into them
…and when you do get a hold of them, it usually turns ugly because without a clear plan of what you are supposed to do…what happens? P-A-N-I-C…defensiveness…arguments…and then it gets really nasty.
Do you make these mistakes with your ex?
-We try to convince them we are the love of their life
-We will apologize profusely for everything
-Promise to change for good this time
-Try to get them to see that it wasn’t really our fault
-Even beg with them to take us back
…and of course with every word we utter, regardless of our intention, the more and more defensive, angry and distant they become.
Please know…this is not your fault! You weren’t taught this in school. You probably weren’t taught this by your parents…and there is no “get your ex back” night school…
Yeah?
And it is really a shame too because what could be more important than love?..Cars?…Money?…Clothes?…ALGEBRA?
So why? Are there all kinds of books, magazines and help on fixing a car,managing money and all the latest fashions, yet very little USEFUL information on how to fix a broken relationship…manage your emotions or getting the love of your life back?
Crazy huh?
And now as you will soon see…all that has changed.
“T Dub” Discovers His “Love Recipe”
Please allow me to introduce myself…My name is T.W. Jackson, I know kinda weird…it’s a long story…you can just call me “T Dub”…I want to say right off the bat, that I am not a psychologist, Doctor or some relationship guru…In fact I royally piss off the academic types and I’ll tell you why in a second…
I have been a military brat…or in the military for a majority of my life. In fact I joined the US Navy when I was a ripe old 17 years of age. Because of my life long military experience I’ve had dozens of homes…in 11countries… and lived long term in 5 states in the U.S.
And because I have lived in so many places and changed schools so often as a kid…I had to learn…and learn REALLY FAST…how to get along with people. And people from ALL WALKS OF LIFE. I can sit down and have some sake with my friend in Tokyo…or pop open a can of suds and fish Lake Dardanelle with an Arkansas “redneck” buddy of mine…makes no difference…
More importantly…I became really good at reading people, understanding what makes them “tick” and even got to a point where I could influence their behavior and actions.
In fact, I got quite good at doing this, so good in fact that I was the “go to” guy whenever my friends had just about any kind of “people problem”…I kind of felt like the male version of “Dear Abby”…
Maybe you even know someone a little like me?…someone that you go to when you have “people problems”…
Anyway…I got a ton of practice keeping relationships together…and putting them back together after they had come apart…because the divorce rate for military couples is MUCH HIGHER than average.
WARNING: Unconventional Methods!
At this point, I must WARN YOU…STRONGLY WARN YOU…my advice and methods are VERY unconventional. I get relationship counselors and the like REALLY ANGRY because they are charging $50 to $100 an hour (sometimes for months and even years) and I can whisper just one of my methods in my friends ear…he DOES IT… And next thing you know… he’s back home, laying back on the couch and watching HOUSE with his fiance on Monday nights.
Now you are free to make up your own mind about me. I just don’t believe that any amount of sitting in a classroom can make up for the REAL WORLD experience that I have under my belt…
I mean, what’s a more valuable experience?…Listening to a lecture on libido? Or BEING THERE when my buddy’s girlfriend is chucking his clothes and skivvies out the bedroom window because she thinks he was with some tart the night before?
I don’t know about you, my money is on the guy with the real world experience any day.
Now, if you are hanging out with me here today, I am guessing you have “relationship troubles” too? If you do…I think I can help…
Here’s how I can help you…
If you have broken up and want to get your guy or gal back, obviously I can’t talk too or be with everyone, I just don’t have enough time…but I have done what I believe to be the next best thing…
I have put my years of experience…into a really easy to follow… love recipe for”getting back together”…and again I forewarn you right now…these are techniques and strategies that are NOT conventional wisdom…and I doubt you have ever read or heard these techniques before.
…and I’ll tell you…
this stuff works!…maybe too well?
Frankly, I get a little freaked out about just how well it works…and worry that it may be used for less than honorable intentions. I mean I want to help GOOD people…I don’t want to help JERKS get girls back that would be better off without them. I do NOT want to help “psycho chick” steal away a married man.
Like a knife, these techniques and principles can be used for great good or grave harm.
This is NOT FOR
-Stalkers
-Ex Convicts
-People with severe mental problems
-Other Crazies, Cuckoos or Whack Jobs
Okay?
Anyway, I have titled the “recipe” simply The Magic Of Making Up…See, it is my opinion that there are really no impossible situations. I have seen women not only wait on a man for months, but take back men that have spent years in prison…and… I have seen men take women back that have had MORE THAN ONE AFFAIR…
And everything else in between! How crazy is that?
And…
You know what?
By now, I bet you really want to see some proof that this works? I would too if I were you.
Here’s PROOF This Works
The best way I know to prove to you that these techniques really work is by giving you some free samples and by showing you testimonials from guys and gals that have already used these techniques successfully.
(Over 50,119 Customers In 77Countries Have Used This Proven System!)
Works For Long Distance Relationships Too…
Just wanted to thank you and let you know how much you have helped me. I followed the [your guide] after a very bitter breakup of a two-year plus relationship (my first since my divorce from a21-year marriage). It started out being one of the most difficult things I have ever attempted in my life and after the initial two weeks I started feeling stronger each day and better about myself. My ex sent me an apology email three weeks in …By now, I had the strength to actually “sleep on it” and sent him a response the next day…within seconds he called me and asked to see me and was crying because he was glad I was talking to him. We are starting out very slowly again as friends (which is difficult for me since I am still deeply in love with him). An interesting note is this is a long distance relationship and your program still worked!! I am so happy to have him in my life again.Thanks again,Denise
Dating Again!
Just wanted to say thank you soooooooooo much for the amazing advice in your book the magic of making up. Yesterday was that all important First Date and it was absolutely fantastic… i just had an email from him saying what a great time he had and how he can’t believe how cool it was to be together. Also back when we split up, your book picked me up out of the mud when I was feeling the worst I ever felt in my life, and doing all the things you advised gave me a life line – now I am so much stronger and happier. I’m still going to take things slowly with my ex (I’m not at the end of your plan yet!!) but I can’t believe how well life is going only 2 months after I felt like I was half dead. Thank you so much.Alice
Ex POPS The Question…
…just an email to say thanks for all the support and knowledge. my boyfriend has just proposed. we are the happiest we have ever been. wedding booked for 2011.
Talking Again…
Just wanted to say THANKS!!
Me and my ex are talking now. The letter thing worked, even though I thought it wouldn’t….
-Delois
Best Money Ever Spent…
You are the best!!! After one day, again one day, my changed attitude had my ex calling and wanting to see me. I won’t take his calls but this showed me that the changes you showed me, worked…you have helped me more than you will ever know…
Casey gets his girl back!
I have good news, my ex did get back with me! She said to me the guy she went out with before was a cover up and she was lying to herself the whole time. Thanks for the support.
Casey
Married Again…
got him back we were married again on the 25th of January ….
Linda
Not A Scam…
I am beside myself that something actually came of this…I was SO skeptical putting in $39 to an e-book. I was positive it would be a waste of money, and there wouldn’t even be a book as promised.PLEASE make it clear somewhere on your page that this is NOT A SCAM and that there are 62 PAGES FOR THIS BOOK, PLUS BONUSES.I was beside myself.Thank you so much…Sara
“Impossible Not To Work”
Just wanted to let you know your advice is so rational and so sound… At such a horrible and tough time it is reassuring to read the correct way to handle yourself and go about respecting someone’s wishes (a breakup) but at the same time try to get them back. A lot of people don’t realize how simple and easy it is, patience is a virtue and because of you … I am now dating the love of my life again, we were together for 4 years, split for only 2 1/2 months and are now back together. I did what you… told me was the ONLY option and it worked. If it is true love and meant to be, your advice is impossible not to work. Thanks for the guidance. You’re a good man!CC
“On her hands and knees”
well it tool some time but i got my girl back. she pretty [much] got down on her hands and knees coming back to me thanks buddy.
Rob
Talking Like Friends Again!
I have just downloaded the materials from the website. I am eager to read and learn.I ALREADY HAVE WONDERFUL NEWS!!Just from the video via your website, before attaining the reading materials, Italked with my ex yesterday for 40 MINUTES!! It has been months since we havetalked that long like friends. He even hinted around that we could have afuture together. MY ATTITUDE WAS DIFFERENT!! I WAS FRIENDLY AND ACTED LIKE THEBREAKUP IS OK!!Thanks for the free advice and I can’t wait to get to reading!!I’ll keep in touch.
“Dude It’s Working…”
DUUDE ITS WORKING MAN. After a few weeks of being cool and ok with it, i said we should be friends, and now shes saying im going to give you another chance to get to know me, and if im paying attention to her like i said i would, then ill find the right time to ask her out… thank you!
Taylor
Can’t Believe This Worked…
OMG THANK YOU SO MUCH! I GOT MY EX BACK JUST AN HOUR AGO ! I CANT BELIEVE THIS WORKED ! !!
Tiger
Planning A Beach Getaway!
Just wanted to thank you for all your help! Your book is amazing and got my man and I back together within a few weeks of reading it. Now to clarify, it had already been some time since we had even spoken to each other, and I was really starting to miss him. I read your instructions very carefully and fallowed them to the tee, and it worked! … I could not have done it without you! We are now blissfully celebrating are Birthdays together, and are even planning a beach getaway just us two.Thank you sooooo much!!!
Finally Married!!
thanks for all you help and encouraging words,quotes and what to do. He proposed and we are finally married thank you very much.
Antonett
Another “OMG!!! This Works” Note…
OMG!!! This totally worked….nothing I had tried worked and then I texted him that message and he returned my call!! I cannot wait to see where this goes….
Jessica
Broke Part Of The Wall Between Us…
I downloaded your book and me and my ex talked for an hour and a half. IT was the first time we talked since November of last year! I followed the instructions in the book and am happy with the fact that we were able to just talk even though no progress was made as far as getting back together yet. She is still living with her boyfriend, but I feel like we broke part of the wall between us.
If this book helps me to get her back, I will drive to Arkansas and personally shake your hand! So, on that note, hopefully I’ll see ya soon!
Back Together In One Week…
I did buy the book, and got back together in one week. [removed due to personal nature]
Gina
Ex Flying Back From England!
Hi there! Wishing you a very happy Christmas too! Thank you so much for your help, your ideas really managed to open my eyes and to see you from another perspective!!i never used to think of it that way. I have learned a lot about myself too, and i now know how to speak to him whilst keeping in control of the situation at the same time. My ex and i had a long distance relationship and he is flying over to see me here in England to try and sort all this mess out!Regards and many thanksNadia |
{
"pile_set_name": "PubMed Central"
} | All relevant data are within the paper.
Background {#sec005}
==========
Colorectal cancer (CRC) is the third major cause of cancer mortality and morbidity worldwide. Despite rising incidence of CRC, the overall mortality tends to be decreased in recent years, likely due to the early detection and improved treatment strategy \[[@pone.0204866.ref001], [@pone.0204866.ref002]\]. The oncogenesis of CRC is positively correlated with age, alcoholism, smoking, excessive red meat and fat consumption, family history of CRC, and the presence of genes with potential to precipitate chronic intestinal diseases \[[@pone.0204866.ref003]\].
Several prognostic biomarkers and genes have been reported to have some benefit to CRC patients by permitting early detection and ensuing treatment, which can improve their prognosis \[[@pone.0204866.ref004]--[@pone.0204866.ref007]\]. However, clinicians still encounter difficulties when attempting to choose a definitive approach for curing CRC patients or significantly improving their prognosis, largely due to the diverse oncogenesis that leads to cancer progression and metastasis \[[@pone.0204866.ref007], [@pone.0204866.ref008]\]. Much research is now attempting to unveil references that can reveal the degree of a particular malignancy. Thus, a great demand exists for novel noninvasive biomarkers that can aid in the diagnosis of CRC malignancies with high recurrence rates or metastatic potential \[[@pone.0204866.ref007], [@pone.0204866.ref008]\].
PDZ-binding kinase/T-LAK cell-originated protein kinase (PBK/TOPK) is a 322 amino acid mitogen-activated protein kinase (MAPK) kinase (MAPKK)-like serine/threonine kinase that regulates cell cycle processes, including cell growth, immune responses, DNA damage repair, apoptosis, and inflammation \[[@pone.0204866.ref009]--[@pone.0204866.ref012]\]. This protein is barely detectable in normal somatic tissues, except for testicular and embryonic tissues and proliferating brain neural stem cells. Many studies have shown overexpression of PBK/TOPK in malignancies such as Ewing sarcoma, lymphoma, leukemia, melanoma, breast cancer, lung cancer, cholangiocarcinoma, and CRC \[[@pone.0204866.ref013]--[@pone.0204866.ref016]\].
Previous research has shown that the complex of PBK/TOPK and cdk1/cyclin B1 promotes cytokinesis by phosphorylation of protein regulator cytokinesis 1 (PRC1) \[[@pone.0204866.ref017]\]. The subsequent downstream targets of PBK/TOPK include two MAPKs (JNK1 and ERK2); ERK2 forms a positive feedback loop with PBK/TOPK, which may facilitate the initiation of CRC during mitotic phase of the cell cycle by enhancing the polymerization of microtubules \[[@pone.0204866.ref012]\]. PBK/TOPK also may accelerate tumorigenesis in CRC through inhibition of p53 expression \[[@pone.0204866.ref010]\]. Although the expression of PBK/TOPK is closely related to the malignancies mentioned above, its prognostic role still remains complicated and unclear.
Previous studies have rarely confirmed a correlation between PBK/TOPK expression and the clinicopathological features of CRC. In this study, we provide a correlation between PBK/TOPK expression and clinicopathological features and show that this correlation has prognostic significance for CRC patients, as well as providing a capability to assess their clinical outcome.
Materials and methods {#sec006}
=====================
Study subjects and ethics statement {#sec007}
-----------------------------------
Tumor tissues were collected from 162 patients with confirmed histological CRC diagnosis at Changhua Christian Hospital between 1997 and 2000. Patients with history of other malignancy or missing clinical data were excluded. Among 162 patients, 136 died during the follow up survey. Cancers were staged according to the AJCC Colon Cancer Staging, 7th edition (2010). Clinical data, including gender, age, stage, T, N, and M stages, and follow-up information, were obtained from medical records and the cancer registry. This study was approved and the consent was waived by the Institutional Review Board and the Ethics Committee of the Changhua Christian Hospital, Changhua, Taiwan (IRB no. 121008).
Immunohistochemistry staining and evaluation of PBK/TOPK immunoreactivity {#sec008}
-------------------------------------------------------------------------
Immunohistochemistry (IHC) staining was performed at the Department of Surgical Pathology, Changhua Christian Hospital, as previously described \[[@pone.0204866.ref018], [@pone.0204866.ref019]\]. IHC analyses were performed on tissue microarray sections (4 μm) of formalin-fixed, paraffin-embedded, pre-chemotherapy primary colorectal tumors. The antibody used was anti-human PBK/TOPK (PBK/TOPK antibody, sc-136026, 1:150 dilution, Santa Cruz Biotechnology). Immunoreactivity was analyzed by pathologists, using a previously described scoring system \[[@pone.0204866.ref018], [@pone.0204866.ref020]\]. Briefly, immunoreactivity scores were defined as the cell staining intensity (0 = nil; 1 = weak; 2 = moderate; and 3 = strong) multiplied by the percentage of stained cells (0--100%), leading to scores from 0 to 300. Positive and negative control staining were shown in [S1 Fig](#pone.0204866.s001){ref-type="supplementary-material"}.
Statistical analysis {#sec009}
--------------------
The Student *t* test, Fisher's exact test, and the χ^2^ test were applied for continuous or discrete data analysis. The associations between PBK/TOPK score and patient survival were estimated using the Kaplan--Meier method and assessed using the log-rank test. Potential confounders were adjusted by Cox regression models, with the PBK/TOPK score fitted as indicator variables. Overall survival time was defined as the interval between the date of surgery and the date of last follow-up or death. All statistical analyses were conducted using the SPSS statistical software program (version 15.0) (SPSS, Inc., Chicago, IL). All statistical tests were 2-sided, and the values of *P* \<0.050 were considered statistically significant.
Results {#sec010}
=======
Patient characteristics {#sec011}
-----------------------
Overall, 162 patients (92 males and 70 females) with a mean age of 64.3 ± 13.2 years (range from 22--93 years) were enrolled in this retrospective study. The histological tumor type of all 162 patients was adenocarcinoma with 152 patients of non-mucinous and 10 patients with mucinous type. As to the tumor location, 56 patients had tumor located in the rectum, 26 patients with tumor located in the sigmoid. Other locations included 14 in the ascending, 10 in the rectosigmoid, 8 in the descending, 4 in the cecum, and 1 in the transverse (43 missing data). In total, 133 patients had early stage tumors (I+II+III) and 29 patients had advanced stage tumors (IV). Thirty-one (19.1%) patients had tumor metastasis (M1). The overall survival time ranged from 0.01 to 13.1 years, with a mean survival time of 5.1 years.
Correlation between PBK/TOPK expression and clinicopathological features {#sec012}
------------------------------------------------------------------------
PBK/TOPK was expressed in the cytoplasm and nucleus. Representative images of IHC staining are shown in [Fig 1](#pone.0204866.g001){ref-type="fig"}. The cytoplasmic PBK/TOPK expression score was 74.3±61.3 (mean±SD) and the median value was 70. Therefore, we defined cytoplasmic PBK/TOPK expression level \<70 as low expressions. We analyzed nuclear PBK/TOPK expression in negative (57 cases) and positive (105 cases) groups. The expression score for nuclear PBK/TOPK was 23.7±24.2 (mean±SD) with median value of 10. We combined the expression level of PBK/TOPK in the cytoplasm and nucleus into a total PBK/TOPK expression score. Patients with high cytoplasmic PBK/TOPK and positive nuclear PBK/TOPK were defined as having high total PBK/TOPK expression.
{#pone.0204866.g001}
The relationships between various clinical parameters and PBK/TOPK expression are listed in [Table 1](#pone.0204866.t001){ref-type="table"}. Among all parameters, high cytoplasmic expression and high total PBK/TOPK expression in tumor cells were significantly associated with a high T value (P = 0.015). In particular, a significant association was noted between a high T value and high total PBK/TOPK expression (P = 0.019). However, no significant association was noted between PBK/TOPK expression and age, gender, lymph node metastasis, distant metastasis, or tumor stage.
10.1371/journal.pone.0204866.t001
###### Relationships of PBK/TOPK expression with clinical parameters in 162 colorectal cancer patients.
{#pone.0204866.t001g}
Parameters Case number Cytoplasm PBK/TOPK p value Nucleus PBK/TOPK p value Total PBK/TOPK p value
---------------- ------------- -------------------- ----------- ------------------ ----------- ---------------- --------- ----------- ----------- -------
Age (year) 62.5±12.6 66.0±13.6 0.095 63.6±13.6 64.6±13.0 0.631 63.3±13.1 65.4±13.4 0.320
Gender
Female 70 28 (40.0) 42 (60.0) 0.052 24 (34.3) 46 (65.7) 0.834 35 (50.0) 35 (50.0) 0.215
Male 92 51 (55.4) 41 (44.6) 33 (35.9) 59 (64.1) 55 (59.8) 37 (40.2)
LN involvement
No 82 36 (43.9) 46 (56.1) 0.210 24 (29.3) 58 (70.7) 0.110 40 (48.8) 42 (51.2) 0.079
Yes 80 43 (53.8) 37 (46.2) 33 (41.3) 47 (58.8) 50 (62.5) 30 (37.5)
Stage
I+II+III 133 63 (47.4) 70 (52.6) 0.446 43 (32.3) 90 (67.7) 0.103 72 (54.1) 61 (45.9) 0.436
IV 29 16 (55.2) 13 (44.8) 14 (48.3) 15 (51.7) 18 (62.1) 11 (37.9)
T value
1+2 26 7 (26.9) 19 (73.1) 0.015 5 (19.2) 21 (80.8) 0.063 9 (34.6) 17 (65.4) 0.019
3+4 136 72 (52.9) 64 (47.1) 52 (38.2) 84 (61.8) 81 (59.6) 55 (40.4)
N value
0 95 45 (47.4) 50 (52.6) 0.672 30 (31.6) 65 (68.4) 0.252 50 (52.6) 45 (47.4) 0.372
1+2 67 34 (50.7) 33 (49.3) 27 (40.3) 40 (59.7) 40 (59.7) 27 (40.3)
M value
0 131 61 (46.6) 70 (53.4) 0.249 42 (32.1) 89 (67.9) 0.087 70 (53.4) 61 (46.6) 0.264
1 31 18 (58.1) 13 (41.9) 15 (48.4) 16 (51.6) 20 (64.5) 11 (35.5)
Prognostic value of PBK/TOPK expression in CRC tumor tissues {#sec013}
------------------------------------------------------------
The Kaplan-Meier survival curves demonstrated a relationship between patient prognosis and PBK/TOPK expression ([Fig 1](#pone.0204866.g001){ref-type="fig"}). We evaluated the prognostic impacts of various parameters by univariate and multivariate analyses (Tables [2](#pone.0204866.t002){ref-type="table"} and [3](#pone.0204866.t003){ref-type="table"}). The univariate analysis revealed that advanced disease stage, low cytoplasm PBK/TOPK expression, negative nuclear PBK/TOPK expression, and low total PBK/TOPK expression were significantly associated with poor overall patient survival (P = 0.023, P = 0.042, P = 0.011, and P = 0.005, respectively, [Table 2](#pone.0204866.t002){ref-type="table"}). As expected, patients with advanced stage disease had poorer 5-year survival when compared with those with early stage disease (50.4% vs 20.7%, log rank P = 0.023). The 5-year survival rate was greater for patients with high PBK/TOPK expression than with low PBK/TOPK expression, based on cytoplasmic, nuclear, or total expression (5-year survival data are listed in [Table 2](#pone.0204866.t002){ref-type="table"} and [Fig 2](#pone.0204866.g002){ref-type="fig"}). Multivariate analysis was performed to identify whether PBK/TOPK expression could be an independent prognostic marker in our population. Low cytoplasmic PBK/TOPK expression (HR = 1.469, 95% CI: 1.038--2.081, P = 0.030), negative nuclear PBK/TOPK expression (HR = 1.604, 95% CI: 1.123--2.291, P = 0.009), and low total PBK/TOPK expression (HR = 1.737, 95% CI: 1.220--2.472, P = 0.002) were correlated with significantly poor overall patient survival, after adjusting for age, gender, and stage ([Table 3](#pone.0204866.t003){ref-type="table"}). We also subdivided the patients according to various clinical parameters and used multivariate analysis to examine the influence of total PBK/TOPK expression ([Table 4](#pone.0204866.t004){ref-type="table"}). The prognostic value of total PBK/TOPK expression was significant in patients with age≥65, positive lymph node involvement, advanced stage disease (including T and N value), and no distant metastasis. The advanced-staged patients had poorer prognosis if they also had low rather than high PBK/TOPK expression (HR = 2.332, 95% CI: 1.370--3.969, P = 0.002). The hazard ratio for overall survival in patients with lymph node involvement was 2.419 (95% CI = 1.345--4.348, P = 0.007) for low total PBK/TOPK expression compared to high total PBK/TOPK expression ([Fig 2D](#pone.0204866.g002){ref-type="fig"}). However, patients with distant metastasis showed no significantly different survival rate (P = 0.298) regardless of whether they had high or low total PBK/TOPK expression. These results showed that the prognostic value of PBK/TOPK was more significant in specific subgroups.
{#pone.0204866.g002}
10.1371/journal.pone.0204866.t002
###### Univariate analysis of the influence of various parameters on overall survival in colorectal cancer patients.
{#pone.0204866.t002g}
Parameter Category Overall survival
-------------------- ------------------- ------------------ ------- -------------- -------
Age, y ≥65/\<65 44.2/46.3 1.294 0.916--1.829 0.144
Gender Male/Female 44.6/45.7 1.172 0.833--1.649 0.362
Stage IV/I+II+III 20.7/50.4 1.658 1.071--2.568 0.023
Cytoplasm PBK/TOPK Low/High 36.7/53.0 1.421 1.013--1.992 0.042
Nucleus PBK/TOPK Negative/Positive 31.6/52.4 1.574 1.110--2.232 0.011
Total PBK/TOPK Low/High 34.4/58.3 1.629 1.155--2.298 0.005
10.1371/journal.pone.0204866.t003
###### Multivariate analysis of the influence of various parameters on overall survival in colorectal cancer patients.
{#pone.0204866.t003g}
Parameter Category Overall survival
---------------------------------------------------------- ------------------- ------------------ ------- -------------- -------
Age, y ≥65/\<65 44.2/46.3 1.330 0.939--1.885 0.108
Gender Male/Female 44.6/45.7 1.228 0.871--1.732 0.242
Stage III+IV/I+II 33.8/55.3 1.685 1.087--2.613 0.020
Cytoplasm PBK/TOPK[^2^](#t003fn002){ref-type="table-fn"} Low/High 36.7/53.0 1.469 1.038--2.081 0.030
Nucleus PBK/TOPK[^3^](#t003fn003){ref-type="table-fn"} Negative/Positive 31.6/52.4 1.604 1.123--2.291 0.009
Total PBK/TOPK[^4^](#t003fn004){ref-type="table-fn"} Low/High 34.4/58.3 1.737 1.220--2.472 0.002
^1^Adjusted for age, gender, and stage
^2^Adjusted stage: HR = 1.678, 95% CI = 1.082--2.601, p = 0.021
^3^Adjusted stage: HR = 1.593, 95% CI = 1.026--2.475, p = 0.038
^4^Adjusted stage: HR = 1.707, 95% CI = 1.101--2.648, p = 0.017
10.1371/journal.pone.0204866.t004
###### Multivariate analysis of the influence of total PBK/TOPK expression according to clinical parameters on overall survival in colorectal cancer patients.
{#pone.0204866.t004g}
Parameter Overall survival[^1^](#t004fn001){ref-type="table-fn"}
------------ -------------------------------------------------------- ------- -------------- -------
All cases 34.4/58.3 1.798 1.260--2.566 0.001
Age (year)
\<65 37.2/62.5 1.383 0.783--2.442 0.264
≥65 31.9/56.3 2.094 1.335--3.285 0.001
Gender
Female 37.1/54.3 1.963 1.128--3.418 0.017
Male 32.7/62.2 1.638 1.031--2.604 0.037
LN meta
No 42.5/59.5 1.640 0.993--2.706 0.053
Yes 28.0/56.7 2.071 1.218--3.522 0.007
Stage
I+II 47.8/64.1 1.433 0.882--2.329 0.146
III+IV 20.5/51.5 2.332 1.370--3.969 0.002
T value
1+2 66.7/76.5 1.292 0.456--3.657 0.629
3+4 30.9/52.7 1.750 1.192--2.569 0.004
N value
0 46.0/60.0 1.554 0.973--2.483 0.065
1+2 20.0/55.6 2.419 1.345--4.348 0.003
M value
0 40.0/63.9 1.792 1.207--2.659 0.004
1 15.0/27.3 1.776 0.601--5.247 0.298
^1^Adjusted for age, gender, and stage
^2^Total PBK/TOPK expression: Low/High
Discussion {#sec014}
==========
CRC is one of the most common malignancies in the world. Most cases of CRC start as small, benign clumps called adenomatous polyps, with few other symptoms, making this cancer hard to detect in its beginning stages. However, current screening methods for CRC, including the test for occult blood and regular sigmoidoscopies (with consistent performance of polypectomy when needed), have increased the sensitivity and specificity of screening. The occult blood test can reduce the mortality of CRC by 14%, whereas the polypectomy technique can diminish the incidence of CRC by 50--70% \[[@pone.0204866.ref021], [@pone.0204866.ref022]\]. Nevertheless, the difficulty in diagnosis at early stages and the poor prognosis and complicated molecular mechanisms of CRC emphasize the urgency for developing a more thorough understanding of the biomarkers of CRC, in order to differentiate CRC patients with poor prognosis as early as possible and to increase the overall survival rate.
The 162 CRC patients recruited in the present study showed no significant differences between PBK/TOPK expressions and patient age, gender, lymph node metastasis, distant metastasis, or tumor stage. However, the patients with either advanced or positive lymph node CRC showed a clear relationship between low total PBK/TOPK expression and poor outcome. Overall, PBK/TOPK expression might be related to the cytogenesis of tumor cells, as we found that a lower expression of total PBK/TOPK gave a poorer prognosis for a CRC patient. Nevertheless, the complete role of PBK/TOPK in CRC still remains unclear.
We found that the PBK/TOPK appears to be overexpressed in different cellular locations (nucleus or cytoplasm) in different CRC patients. The CRC patients with low-scoring and cytoplasmic PBK/TOPK expression, with negative nuclear PBK/TOPK expression, with advanced stage tumors (stage IV), or with low total PBK/TOPK expression were revealed, for the first time, to have a relatively poor prognosis. These findings suggest that the benefit of using PBK/TOPK inhibitor might be limited due to the relatively favorable clinical outcome of patients with high PBK/TOPK expression. Even though PBK/TOPK inhibitor can significantly suppress tumor growth as well as increasing colon cancer cell apoptosis in cell model \[[@pone.0204866.ref023]\]. The underlying mechanism responses for our clinical finding is unclear and further analysis of under lying mechanism might solve this problem.
The studies of the correlations between PBK/TOPK and malignancies in recent years have confirmed that PBK/TOPK is overexpressed in proliferative cells. For example, PBK/TOPK is upregulated during the cytogenesis of tumor cells, most likely by phosphorylation of Thr9 and activation by cyclin B1/cdk1. Therefore, PBK/TOPK is hypothesized to play an important role in cytokinesis \[[@pone.0204866.ref017], [@pone.0204866.ref024], [@pone.0204866.ref025]\]. A recent study showed that PBK/TOPK down-regulation is significantly associated with poor prognosis in patients with cholangiocarcinoma \[[@pone.0204866.ref014]\]. Another study reported that PBK/TOPK expression was decreased due to EWS--FLI1 inhibition, which promoted a reduction in the cell proliferation rate and prevented the cells of Ewing sarcoma from growing and coalescing.
Parameters other than PBK/TOPK expression have also been found to affect tumorigenesis \[[@pone.0204866.ref003]\]. The present finding that low total PBK/TOPK expression is closely related to poor outcomes might be contrary to a previously hypothesized mechanism, which viewed PBK/TOPK as a gene related to cytogenesis that is overexpressed in tumor cells. Other signaling pathways probably exist that have not yet been identified and could affect the clinical course of CRC. Another explanation is that various parameters not considered in the present study are also closely connected with tumor growth. Otherwise, the role of PBK/TOKP might influence by the mutations or amplifications of oncogenes. Patients with high PBK/TOKP expression had unfavorable prognosis in sporadic patients with KRAS (KRAS proto-oncogene) or BRAF (B-Raf proto-oncogene) mutations \[[@pone.0204866.ref026]\]. However, there was no association between VEGFA (vascular endothelial growth factor A) amplification and KRAS gene status or with the PBK/TOKP protein expression \[[@pone.0204866.ref027]\]. These results suggest complex role of PBK/TOKP integration with gene mutation or amplification which might change the response of treatment targeting PB/TOKP K or the prognostic role of PBK.
Most cell cycle research has emphasized the timing of cell cycle regulator activation; however, the localization of the regulators also plays a pivotal role in the final activation. For instance, Cdc14, a nucleolar protein phosphatase present during most of the cell cycle, is able to cause the breakdown of its target, cyclin, only after release from the nucleolus during nuclear division \[[@pone.0204866.ref028], [@pone.0204866.ref029]\]. A key finding in the present study is that PBK/TOPK is present in both nuclear and cytoplasmic locations in CRC patients and that the location of PBK/TOPK has a significant influence on the clinical course in these patients. The CRC patients with low-scoring cytoplasmic PBK/TOPK expression and negative nuclear PBK/TOPK expression had the poorest prognosis. This is the first time that the location of PBK/TOPK expression in CRC patients has been linked to patient outcome. There are several limitations in this study. Considering the limited sample size and patients are from the same country, further investigations are necessary. Since this study is a retrospective analysis based on tissue microarrays, limited size of tissue microarray could not represent the protein expression of the whole tumor. Moreover, there is no information about the cancer specific death, adjuvant or neoadjuvant chemotherapy which would influence the prognosis. Otherwise, the surgical interventions were done between 1997 and 2000 which could not reflect the influence of the improved skills with advanced surgical devices or medications in the prognosis of CRC patients.
Previous studies have discussed the details of the mechanism and interactions of PBK/TOPK in the cell cycle \[[@pone.0204866.ref013], [@pone.0204866.ref015], [@pone.0204866.ref016], [@pone.0204866.ref024], [@pone.0204866.ref025]\]. The present study focused on the relationship between CRC cancer and PBK/TOPK expression, and especially on the localization of PBK/TOPK, and we concluded that expression and localization are correlated with the prognosis of CRC patients. Subsequent research should look for different mechanisms and functions of PBK/TOPK at different sites, with the aim of developing new screening methods or therapies for CRC.
Conclusions {#sec015}
===========
PBK/TOPK expression might be used as an independent prognostic marker for colorectal cancer patients. However, considering the limited sample size of this study, further investigation with larger population is necessary before clinical application as prognostic marker or therapeutic target.
Supporting information {#sec016}
======================
###### Representative PBK/TOPK IHC staining of (A) negative (colon tissue) and (B) positive (liver tissue) control.
(DOCX)
######
Click here for additional data file.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
|
{
"pile_set_name": "PubMed Abstracts"
} | Effects of scleral buckling of refraction and ocular growth in young rabbits.
There have been a series of reports indicating that scleral buckling (SB) surgery may induce high myopia in advanced retinopathy of prematurity. The mechanism of SB on refractive change in children, however, is not clearly known. We designed this study to investigate the effects of SB on refractive error and ocular growth in young rabbits and demonstrate their mechanisms. For the study, SB surgery was performed on the right eyes of nine 5-week-old rabbits and 11 8-week old rabbits, with encircling buckle. The left eyes were monitored for control. Spherical equivalent, corneal power, and axial length were measured before SB and postoperatively at 2, 4, and 8 weeks. We compared the experimental group with the control group and analyzed the influence of age at the time of operation. In the control group of eyes, corneal power decreased, axial length increased, and spherical equivalent developed emmetropization with aging. In all eyes that underwent SB surgery, high myopia developed, with the increase in axial length as a major factor in inducing myopia. These changes were greater in the 5-week-old group than in the 8-week-old group. In the eyes that underwent SB surgery, axial length increased more than the eyes in the control group up to 2 weeks after surgery, but ocular growth was arrested after that time. SB in young rabbits effects ocular growth and results in high myopia, and an increase of axial length plays a major role in this mechanism. Also, the difference in the effects of SB according to age at the time of surgery may suggest that SB in premature infants could induce a significant axial myopia and secondary amblyopia. |
{
"pile_set_name": "NIH ExPorter"
} | This proposal is to study the mechanism(s) of malignant transformation in cell culture using various DNA inhibitors and other agents. The majority of these drugs are also chemotherapeutic agents now being used or proposed for use in man. Thus, the relative potential for these agents to produce secondary malignancies should be determined. The cell cycle specificity of malignant transformation will be also studied as well as specific chromosomal changes produced. Finally, mutagenic activity, effect on DNA repair; semiconservative DNA synthesis; C-type RNA virus activation and fibrinolysin and DNA strand break production following treatment with these agents will be investigated. |
{
"pile_set_name": "Pile-CC"
} | 04/08/2012
Seafaring and the importance of weaving
Nearly every time I say something like that, at least one person laughs and objects. Weaving – important for ships??? Oh, come off it, you weavers always want to show off.
Well.
The first "boats" were probably raft-like: timbers lashed together by... ropes, perhaps?
Some time later, so called "sails" were invented. And sails are... woven, right?
Sailing ships were around for a long time – according to Wikipedia from about 3200 BC, until the birth of the steam-driven ships (Wikipedia, again: [...]France, by 1774 [...]working steamboat with rotating paddles [...]sailed [...] 1776, apparently the first steamship to sail successfully.)
Several of the sailing ships had rather large sails.
It is believed that Santa Maria, Columbus’ flag ship, had a sail area of around 350 square metres – and the biggest ever sailing ship (Preussen, built in 1902) sported 4650 square metres of sails. (Even with a weaving width of 2 metres, that means a roll of 2325 m, or more that 2500 yds, of sailcloth.)
I think I have made my point: before there could be sailing ships, both spinning and weaving must have been invented...
On a trip to Karlskrona, I saw some examples of "fibre arts" pertaining to sea-faring:
The sloops were built between 1830 and 1860, and are now used for (small, but still…) regattas every Thursday during summers. Read more here. |
{
"pile_set_name": "OpenWebText2"
} | Confessions of a Frigid Man
: A Philosopher’s Journey into the Hidden Layers of Men’s Sexuality (2005, 2013, 2017 Tokyo Philosophy Project) Masahiro Morioka > General information about this book (Foreword Preface Ch.1 Ch.2 Ch.3 Ch.4 Ch.5 Epilogue ) Confessions of a Frigid Man : A Philosopher’s Journey into the Hidden Layers of Men’s Sexuality Paperback Book: Amazon.com
Kindle: Amazon.com Kindle eBook
Open Access PDF: PDF Chapter 4
Delving into the Psychology of Men with “Lolita Complexes”
Section 1: Japan, a great “lolicon” power 1. Japan, a great “lolicon” power Japan has become a “leading nation” when it comes to lolicon. This country has long been known internationally for its production of pornography featuring young girls. But pornography is not what I want to talk about here. Mainstream television and other media are full of instances in which young girls are viewed sexually to such an extent that the current state of affairs seems to me quite bizarre. Yukiko Hayami has identified lolicon as the “national illness” of Japan (Men Who Cannot Love [Ren’ai Dekinai Otokotachi], Daiwashobō, 2002, p. 40). In this chapter I will examine lolicon, but this is a problem that is very difficult to discuss. Feminism views lolicon as an illness of adult men. This is of course not incorrect, but in fact it is not only men who are sexually attracted to pretty young girls; I am personally acquainted with adult women who are sexually attracted to beautiful young girls, and it is a well-known fact that young female entertainers acquire many adult women as fans. One young woman told me that other women look at her with sexual interest. Young girls seem to be the sexual targets of both men and women. It may be assumed, however, that there are significant differences between cases in which men are sexually attracted to young girls and cases in which women feel this kind of attraction. Putting aside these differences as a topic for future inquiry, here I would like to begin by examining, with myself as an example, what occurs in the minds of men like me when they are attracted to young girls. 2 “I” understand how men with lolicon feel In this book I am attempting to look deep inside myself and examine my own internal sexuality. By dispassionately analyzing what goes on inside myself, I hope to contribute to the elucidation of male sexuality. When it comes to the topic of lolicon, however, this examination of my own internal sexuality is extremely difficult and painful, because in order to pursue it I must publically acknowledge that I understand lolicon, or, in other words, that I have experienced sexual attraction to young girls. I will discuss this in more detail later on, but I must begin by admitting that I have experienced erotic feelings towards still-innocent young girls around the age of twelve. I am also a professor at a university. For someone even slightly connected to education to openly declare that he is sexually attracted to young girls is one of this society’s greatest taboos. But this is something I want to publicly admit. I understand the feeling of lolicon. Without acknowledging this, it would be impossible to elucidate lolicon’s internal psychological aspects. Of course, I have never actually engaged in sexual relations with a young girl or attempted to do so. But I cannot avoid acknowledging the fact that, however slight, this kind of sexual interest exists within me. As I mentioned in Chapter 3, one of the professions that makes it hardest to publicly admit this kind of thing is that of a “teacher” at a school. Even if this kind of sexual interest in young girls exists within a teacher, at school he must act as if it does not, and he cannot discuss it even when he goes drinking with friends. These men’s lolicon swells under this pressure and may eventually erupt in the form of sexual behaviors like peeping or prostitution involving young girls. Of course, I have no desire to defend the men who commit these sorts of crimes. Individuals working in the field of education must indeed hold themselves to a higher moral standard in this regard. If so, should we then say that “teachers” must not feel sexual attraction to young girls? Or that if they do have such feelings they must bury them deep inside themselves and never discuss them openly with other people? I myself do not have a definite answer, but sometimes I think that our response to these questions must simply be “yes.” But before arriving at this conclusion, I would like to thoroughly clarify the essential nature of the lolicon that existed within me. I would also like you to ask yourself whether there is not even a slight sexual attraction to young girls (or cute young boys) within you, and carefully examine whether you are being entirely truthful when you say “I find them cute but I am not sexually attracted to them at all.” 3 Girls harmed by lolicon men Here I must note that there are many young girls who are sexually harmed by men with lolicon. There is an extremely large number of women who have painful memories of being molested by strangers or groped on the train when they were young, or who were repeatedly sexually abused by their fathers or other family members. The harm done to these women is indeed great. Detailed accounts of individual cases can be found in the excellent reportage of Takako Yoshida (See Children and Sexual Harm [Kodomo to Seihigai], Shūeisha Shinso, 2001). As it is difficult to talk about this kind of incident with other people, there are presumably many women who have kept this damage they received as children to themselves and continue to carry it long after they have become adults. Some of the readers of this book may be women who have had this kind of experience, and others may have such individuals among their acquaintances. What will these women think when they read this chapter? Other readers may have a family member who was the victim of abduction by a lolicon criminal. When I imagine these sorts of readers I am reluctant to continue writing this chapter. But in the end I keep going, because I think that in order to reduce these crimes it is necessary for us to better understand what is happening in the minds of men with these tendencies and how the mechanisms that give rise to these sexual crimes spread throughout society. For the sake of eliminating this kind of harm we must uncover, to the greatest extent possible, what lies buried in the minds of lolicon men. I do not want to conduct this investigation by harshly condemning these men from a distance while turning a blind eye to the susceptibility to lolicon I have within myself. 4 Dividing lolicon into two types I would like to begin with a bit of clarification regarding the concept of lolicon. Lolicon is a mental state of being sexually attracted to young girls. The word is also used to refer to men who have this mental state (in this chapter I focus mainly on lolicon men). Here I would like to divide lolicon men into two types. One type actually sexually abuses young girls or pays them for sex. There is nothing to stop us from describing these men as criminals who prey on actual young girls to satisfy their own physical desires. In Men in the Dark [Mænd i mørket] (Tiderne Skifter, 2003), Jacob Billing reports on the actual state of affairs regarding pedophiles in Denmark. I cannot in any sense support these individuals who tear apart the lives of real, flesh and blood children without compunction in order to satisfy their own desires. What I write in this chapter is in no way intended to defend these sorts of men. The other type of lolicon men is those who feel sexually attracted to young girls but do not actually engage in sexual relations with them. This category includes men who collect photographs of young girls and videos of “idol bands.” Among such men, there are presumably those who are satisfied with consuming only images, those who refrain from engaging in sexual relations with young girls through rational self-control, and those who simply have not yet considered having sexual relations with an actual young girl. The chance that these men will at some point become criminals is of course not zero. There may indeed be this kind of “reserve corps” of sex criminals. What I want to discuss in this chapter is mainly the second type of lolicon men. They cannot be called criminals, but it is because of them that the “loliconification” of society as a whole continues to progress. Such people may indeed be unimaginably numerous. They include the majority of men who like “idols” [“aidoru” in Japanese; cute young girls, mostly singers or actresses, who appear in various popular media including music, film and television]. I would not deny having belonged to this category myself. I hope that you too will reexamine what exactly your own feelings are as you read what follows. Research has been carried out concerning the psychology of people who commit sex crimes involving children, but up to now almost nothing has been said about this more general form of lolicon. I want to make this my objective here. With this end in mind, I will also discuss the psychology of criminals when necessary, as there is a great deal of overlap between what goes on in the minds of both of these types of lolicon men. 5 How old are the girls on whom lolicon men fixate? So how old are the “young girls” I have been talking about? In his novel Lolita, Nabokov makes Lolita twelve years old. A website called “Moeeki” has put together a survey of the age distribution of young female anime and video game characters (characters who appear to be young girls). The results show five characters who are nine years old, nine who are ten, fifteen who are eleven, twelve who are twelve, nine who are thirteen, nine who are fourteen, and seven who are fifteen. It seems safe to conclude that popular characters of this type in Japan are mainly eleven and twelve years old, and the age range of girls who inspire lolicon is roughly ten to fourteen. This range extends from the fourth year of elementary school to the second year of junior high school. It is very interesting to note that on average Japanese girls begin to menstruate at twelve years and a half of age. This almost perfectly fits the age range of girls who are the target of lolicon; lolicon men are fixated on girls who are just beginning to menstruate. In other words, these men could also be seen as impatiently waiting until girls are capable of bearing children. I would like to put this idea aside for now and return to it later. Here I should note that men who are sexually attracted to girls (or boys) under the age of ten or so are often referred to as “pedophiles” and distinguished from lolicon men. Lolicon and pedophilia are completely different. I myself cannot imagine what kind of feelings or thoughts exist in the minds of pedophiles. I will therefore limit my discussion in this chapter to lolicon, something I can discuss based on my own experiences. 6 Why are they drawn to young girls? I would like to note at the start that lolicon has been explained as being the result of immature men who cannot have romantic relationships with full grown women seeking to use young girls who are weak and obedient as sexual outlets. There are almost certainly some men who molest or sexually abuse young girls for this reason. This pattern may be especially prevalent in pedophiles who molest young girls who have just started elementary school. At the same time, however, this does not seem an adequate explanation of the attraction to girls in junior high school or the upper years of elementary school. The teachers and school board employees arrested for buying sex from schoolgirls, for example, are often men who occupy a position of high social status and have families. These men bought sex with young girls while at the same time engaging in sexual relationships with adult women; they cannot be described as immature men who approach young girls because they cannot have a relationship with a full-grown woman. In 2001, Tokyo High Court judge Yasuhiro Muraki was arrested for paying for sex with girls between the ages of fourteen and sixteen and sentenced to prison by the Tokyo District Court. Muraki was forty-three years old at the time. There is almost no position with a higher social standing than that of judge, and by the normal standards of society Muraki was a very successful man. A few years later, in 2004, a reasonably successful movie director named Akiyoshi Imazeki was arrested on suspicion of paying for sex with two girls aged twelve and fourteen and sentenced to prison by the Yokohama District Court. Why would Imazeki, who had produced a solid body of work as a film director, become involved in child prostitution? He is forty-four years old and therefore belongs to my generation. These men presumably sought out young girls because they were looking for something they could not find in adult women. We must try to clarify what this something is. 7 Is lolicon an “illness”? The desire to gaze at and admire a pretty young girl you see in front of you is presumably a very normal emotion. However, lolicon men begin fantasizing about going on a date with her, becoming her lover, bringing her home, or making her their younger sister or daughter. As for how far these sorts of fantasies go, they eventually reach the point of wanting to touch the girl and ultimately ejaculate on her. Put this way, most men would presumably say that lolicon is clearly an illness and something that has nothing to do with them. But what happens if you think about it in a different way? For example, imagine that an adult woman who is “your type” is standing in front of you dressed in a way you find attractive. Upon seeing her, you will presumably feel a spark of excitement and your heart will begin to beat a bit faster. Now imagine you are alone with her on a date. You have dinner, chat while staring into each other’s eyes, and go for a drink. It would not be strange for the idea that if possible you would like to have sex with her to begin to form in your mind. After dinner you take her for a ride in your car, and this is an implicit invitation. You may even want to take her somewhere right away if she doesn’t have any strong objection. You may have an erection at this point. An expectation of sexual intercourse and ejaculation begins to build in the mind of a man in this situation. There are surely few people who would criticize as an “illness” this kind of physical response in a man when it is directed toward an adult woman. When a woman you find attractive appears in front of you and you notice this and your heart begins to beat faster, I think this is because in some corner of your mind you have a vague feeling that “I might have the chance to have sex with this woman and ejaculate, and it would be great if I could.” Even if you know that there is no way it could actually happen, a fleeting fantasy nevertheless crosses your mind. It is this vague feeling of anticipation that makes a man’s pulse quicken. But since the man is in a slightly excited state of mind, it is hard for him to be consciously aware of this psychological mechanism. 8 What lies at the bottom of the “feeling of excitement” When a pretty young girl appears before the eyes of a lolicon man, or when he sees the image of a pretty young girl on TV, a DVD, or in a magazine, or even when he views a representation of a pretty young girl in manga, anime, or computer-generated animation, his pulse quickens and he experiences a “feeling of excitement” towards her just as described above. When a lolicon man feels this excitement, it is not as though he immediately gets an erection and wants to take the girl somewhere right away. This feeling of excitement fills his mind and he enters a slightly paralyzed, trance-like mental state; in nearly all cases this is all that occurs. At the same time, however, when a man has this “feeling of excitement” towards a young girl, he begins to focus a thin, vaporous desire to have sex and ejaculate – a desire so indistinct he himself may not be consciously aware of it – on the young girl in question. This is exactly the same mechanism that operates when a man is attracted to an adult woman. Of course, there are presumably very few men who actually carry out these sorts of acts. But a man may have a vague sense of anticipation in the back of his mind even if he would never actually engage in these sorts of actions. This is the essence of the sexual gaze directed towards young girls. Lolicon men are men who experience this “feeling of excitement” toward young girls or images of young girls. And I think that at the bottom of this “feeling of excitement” there is a hidden desire, not easily perceived even by the man in question himself, for sexual intercourse and ejaculation. If we redefine “lolicon” in this way, we cannot help but conclude that a truly enormous number of adult Japanese men are in some sense affected by this condition; Japanese mass media, including TV and magazines, skillfully portray young girls in a sexual light, and we are unknowingly being refashioned into people with the mental disposition to take pleasure in viewing them in this way. Section 2: Adults Who Skillfully Package “Young Girls” 9 The “young girls filled with sexual desire” message Nationally renowned idol groups such as Morning Musume are representative of this phenomenon. Morning Musume was formed in 1997, and in 2000, when a girl of the lolicon target age of twelve joined its ranks, it became a group that attracted attention throughout Japan. In 2003, XYX [Jikkusu], a group comprised of Mari Yaguchi and five girls in elementary school, made its debut. Its members included elementary school students as young as eleven. Around the same time a different company produced SweetS, a group of five eleven- to thirteen-year-old girls, and in 2004, Berryz Kōbō, a group of eight young girls, made its debut. The latter’s members included two sixth-year elementary school students, four fifth-year elementary school students, one fourth-year elementary school student, and one third-year elementary school student; the lowering of the age of members included in such groups had finally led to the appearance of a nine-year-old. Superficially, these groups are sold with the image of cheerful young girls who like to sing, but under the surface, the “young girls filled with sexual desire” message is cunningly and subliminally constructed. This is immediately evident if we look at the debut photograph of XYX, for example, in which girls who are still in elementary school are dressed in feminine, revealing clothes of the sort normally worn by adult women and their navels and bared midriffs are emphasized. Adult men have been trained to automatically read “women filled with sexual desire” into images of this sort, and the result is that sexual gazes are concentrated and directed toward girls who are still in elementary school. The same can also be said in the case of SweetS. These girls are photographed wearing adult clothing, baring their legs beneath miniskirts, and giving inviting, “come hither” looks towards the camera. The message that permeates these photographs is, “We are sexually mature children.” The title of their debut single, “LolitA,” is clearly suggestive. The elementary school students in Berryz Kōbō also wear full makeup like adult women, and present an appearance that would make it difficult, if you looked only at their photographs, to imagine they are elementary school students. Their audience is given the message that, although they are still in elementary school, their bodies are already those of adults; they are to be seen as women capable of fully engaging in romantic relationships. And the age of the girls presented in this way is getting lower every year. There have of course been child actors and celebrities in the past. Idol groups like those mentioned above, however, do not appear in the media simply as children. They are presented as sexually awakened young women; they are, in other words, portrayed and constructed as women with whom you, the viewer, could conceivably have a sexual relationship. The clothing of a mature woman, full makeup, seductive gestures and glances, miniskirts, exposed midriffs, bare thighs: all of these things are part of a scheme that inundates the viewer with subliminal messages. How many men are there who, when they see these girls in the mass media, actually view them just as “cute little girls”? I suspect that quite a large number of men have a somewhat shameful feeling towards these girls when they look at them. I have asked men I know about this, and there do indeed seem to be men for whom this is the case. In discussions on Internet forums like “2channeru” it is taken for granted that groups like Morning Musume are to be targets of sexual desire. 2channeru, the largest online forum in Japan, is a rare space where people can freely declare their lolicon feelings, and sexual fantasies involving young female idols are discussed there openly and explicitly. 10 Skillful creators of young female “idols” In this way, “sexual gazes” directed toward girls around the age of twelve have been skillfully cultivated in the popular media, and this is now one of Japan’s largest industries. What men see when they look at these idols is nothing other than the “sex” of these young girls, skillfully presented and wrapped in a candy-like atmosphere. I made this point at a meeting attended mostly by women and asked for their reaction. Many of these women responded that they had never noticed that idol groups are viewed sexually. Here we see the magic of mass media; both men and women are shown the same images, but what they take from them is very different. Upon seeing a model in a miniskirt, for example, the reaction of many women is to think, “What beautiful legs she has!”, while the reaction of a man who likes miniskirts is a shiver of excitement at the way in which her panties are hidden but seem about to be revealed. In the same way, when an actress of elementary school age appears on TV wearing red lipstick, while a normal woman may simply think, “Little girls are so precocious nowadays. How cute!,” a lolicon man superimposes an adult, fully mature woman on this red lipstick, reads it as a sign that it is OK to approach her sexually, and may for an instant even imagine her genitals, which presumably gleam with the same color. The creators of young female idols make optimal use of this kind of “perception gap” (different messages being received by different viewers). They surreptitiously bury messages of sexual temptation beneath images of healthy young girls. As a result, lolicon men consume the images of cheerfully cavorting young girls they see on television as public displays of underage pornography. 11 The hidden message in a Minimoni video An example of the sort of thing discussed above can be seen in a music video called “Minimoni – Jankenpyon!” (Zetima-Sony 2001) featuring members of Minimoni, a spinoff of the idol group Morning Musume. This was the video for a song that was a big hit when it was released, and it was frequently broadcast on Japanese television. Minimoni is a group consisting of four members of Morning Musume, all of whom are under 150 cm in height. In the first half of the video, there is a scene in which two members of the group who lose a game of “jan ken pon” (rock, paper, scissors) are made to drink milk. Against a backdrop of footage of copious amounts of milk being poured, close-ups of the girls’ faces are shown as they drink milk from bottles with their eyes closed. The gleam of the girls’ lips after they have finished drinking is striking. What this imagery of young girls drinking a white liquid signifies is obvious enough to require no explanation. Another message of a very different nature has thus been skillfully buried beneath the superficial narrative of “Mari Yaguchi hates milk, so let’s make her drink some if she loses the game.” The video incorporating this message was broadcast over and over again on television (the same year also saw the release of a controversial collection of photographs in which idol Ryoko Hirosue was splattered with milk on her face). What is the result of being subjected to many of these sorts of messages on a daily basis? The idea that “these girls are sexually mature, and they want you to view them sexually just as you would an adult woman” presumably becomes lodged in the back of men’s minds. These images of idols also function as a kind of template that ordinary young girls are supposed to imitate. Girls are brainwashed into thinking it is cool to project their sexual value like these idols who are as young as they are. These messages operate selectively on the men and young girls who consume popular media. Even though they see the same images, there may be many adult women and mothers who do not perceive the existence of these messages at all. Adult women may get no further than being intoxicated by the excitement of superimposing their younger selves on idols and thinking, “How cute!” 12 Sexual presentation used in collections of photographs of beautiful young girls When it comes to other media like books of photographs, here too a large number of works that can be seen as targeting lolicon men have entered circulation. For an example of this sort of publication, let us look at an idol photograph collection published in 2000 (I will refrain from giving its title). This is a collection of beautiful photographs of a young female celebrity I will refer to as S who has also appeared in movies and TV programs. At the time the book was published, S was an eleven-year-old elementary school student, and the advertising sleeve wrapped around the book proclaimed “The debut of a very beautiful young girl.” There is indeed nothing false about this claim. On the cover of the book there is a close-up of S, and her lips, set in a somehow adult-looking face, are covered in pink lipstick. She is wearing an elementary school uniform with shoulder straps. While employing the power of the uniform discussed in Chapter Three, the message that “even though this girl is still an elementary school student, sexually she is already an adult” is broadcast to the reader. This is the main theme of this photograph collection. Turning the pages we find several pictures taken in the yard of what appears to be S’s elementary school. Unlike the first photograph, in these shots she does not appear to be anything other than a young girl in elementary school. But the pink lipstick is still carefully applied. One photo that stands out in this series shows S spraying water from a hose in the schoolyard. She is smiling mischievously as she enthusiastically shoots water from the hose, and the navy blue skirt of her school uniform is being blown quite high by the wind. The shot is contrived in such a way that while nothing is revealed anyone seeing it will wonder what is under her skirt. The subliminal intention of this photograph is clear. A girl with her skirt hiked up and water being energetically emitted by the hose. This can only be interpreted as an image of ejaculation towards the genital area of this young female elementary school student. The photographer presumably took a large number of photos in the schoolyard, and we cannot help but discern the intention of the creator of this collection in the selection of this particular shot. Next there are several photographs taken at the school’s swimming pool. S is sitting on the diving board wearing a white blouse and a navy blue pleated skirt with shoulder straps. The toes of her bare feet are extended as though she is trying to touch the surface of the water in the pool. She is staring fixedly in the direction of the viewer, and her skirt is pulled up above her thighs in an unnatural manner that we can only suppose was the result of it being intentionally hiked up by the photographer or one of his assistants when the photograph was being taken. Her oddly bared legs and lipstick visible even at a distance combine to produce a sense of coquettishness. It is a photograph designed to have the viewer look at this elementary school student as they would an adult woman. Her uniform, hiked-up skirt, made-up face, and round eyes staring in the direction of the viewer – this sort of “presentation of a woman” is being extended even to a young girl still in elementary school. Around the middle of the collection of photographs, the same girl is shown in regular clothing (not a uniform) standing in front of a traditional Japanese-style candy store. Her hair is braided and she is wearing a high-waisted cotton dress that emphasizes the fact that she is a child, but what she is holding in her hand is a freshly opened bottle of milk. She is bringing the bottle of white milk to her lips as though about to drink from it. Here the “young girl drinking milk” motif that appeared in the Minimoni video is once again being employed. There are all kinds of juices and soft drinks in the candy store’s fridge, so why did they decide to have her drink “milk”? I can think of only one reason. It does not need repeating. Of course, this collection also includes many photographs portraying the everyday life of an innocent elementary school student. These include images of a pretty young girl playing and having fun. Amongst these, however, “contrived” shots like those described above are slipped in very naturally. This naturalness allows a subliminal message to circumvent our conscious judgment and imprint itself on our brains as we look at the photographs in the collection. The message is that this young girl is a child but sexually available; it signals to men that she is prepared to accept their semen. Presumably, the men who receive this message subconsciously get a mysterious “feeling of excitement” from looking through the photographs in this collection. This “feeling of excitement” is an arousal born of their looking at a young girl sexually. I think it is the intention of the producers of these books to stimulate this sense of excitement and thereby cause men who see the photographs to buy the book without really knowing why. You do not have to go to some kind of specialty store to buy the book of photographs I have been discussing; you can easily find it in any bookstore’s “idol corner.” The girl who is the subject of its photographs is a “junior idol” who appears on TV and in films. The current state of Japanese society is thus one in which the gradual encroachment of this subliminal scheme occurs even in the broad daylight of mainstream culture. 13 Bold pink lipstick on a nine-year-old girl Let us look at another book of photographs. This beautifully presented collection was published in 2004 and features a nine-year-old model I will call “K” (I will once again refrain from stating the title of the book in question). Like the book discussed above, this collection can also be found in regular bookstores. On the cover there is a picture of a young girl dressed in a white gymnastics outfit and navy blue bloomers, smiling at the camera. Her face does indeed look innocent and like that of a nine-year-old girl. But her lips are covered in lipstick. “First collection of photographs of this new little elementary school student junior idol” is written on the book’s promotional sleeve, and on the inside cover her date of birth is listed along with her height of 129 cm. Turning the pages, we find several photographs of this girl dressed in regular clothing (not a uniform) and staring into the camera. Her hair has been neatly blow-dried and she has had makeup applied to such an extent that looking only at her face you might mistake her for a junior high or high school idol. Her immature body, however, is immediately recognizable as that of a child. The names of the hair and makeup professionals involved are listed on the book’s title page. The impression created is that this nine-year-old model has been photographed using the same sort of production techniques employed at a junior high or high school “idol” photo shoot. Next comes the most shocking photograph. The girl has been made up like an adult woman with thick pink lipstick and mascara, and she has been posed staring at the camera with a red “randoseru” (a leather satchel or backpack used by elementary school students in Japan) strapped to her back. Her outfit of sneakers, white socks, a checkered skirt, and a red ribbon around her collar resembles a school uniform; a recorder and a stuffed animal hang from her randoseru, and she is staring at the camera with a seductive expression on her face, her eyes languidly half closed and her red mouth half open. With makeup the face of this young girl becomes that of an adult woman. While taken outdoors in the street, no matter how you look at it, this photograph cannot be seen as anything other than a sexual invitation to male readers. This sort of expression and pose is often seen in photographs of adult idols, but here exactly the same look is being given to a girl in elementary school. The large randoseru makes her body look small by comparison and heightens the sense of innocence and youth. She is nine years old; this means that she is a third-year elementary student. Next comes a series of pictures in which K is posed holding a recorder. There are shots of her holding it in both hands and shots of her lying sprawled out on the veranda of an old-fashioned Japanese dwelling clutching the instrument and staring provocatively at the camera. The red randoseru is still strapped to her back. One the next page there is a photograph of her lying sideways on the veranda with her head resting on the randoseru. She is holding the recorder in front of her chest and staring up at the camera directly above her with her mouth half open. In this shot, the viewer’s perspective is that of someone looking directly down on the young girl’s upturned face and body stretched out on the veranda. It is as though the viewer is standing astride her and looking down at her body splayed out below him. Her skirt is hiked up exposing her white thighs. The next shot is a close-up showing her face as she softly places the thick tip of the recorder between her lips. The gaze of the girl with the recorder in her mouth is focused directly on the camera, the sunlight is blocked as though someone is standing over her, and her stuffed animal is tucked under her shoulder. The meaning of this series of photographs is once again obvious enough to require no explanation. Next there are many typical school swimsuit shots and idol photographs. As I mentioned earlier, the creator of this collection demands from K exactly the same poses and clothing normally seen in books devoted to junior high or high school idols. Is it strange for this girl who clearly has the body of a child to show this kind of adult coquetry, or nowadays is it indeed not so strange? Towards the end of the book comes the most unequivocal close-up. Wearing a red blouse, the girl looks directly at the camera as she inserts a freshly-peeled banana into her mouth. Her lips are wide open and look as if they are being pushed apart by the white flesh of the banana. What more need be said? In the collection’s final photograph she is wearing a swimsuit and staring provocatively at the camera with her thighs open. 14 What are the parents of these girls thinking? What I have discussed above constitutes just a tiny sample of the many “junior idol” photograph collections that are currently in circulation. A solid market for these sorts of publications has been established, and they are openly sold in normal bookstores and online shops. On seeing these sorts of photographs, one cannot help but wonder what the parents of these girls could be thinking. Of course, there are presumably some cases where the girl’s parents are deeply in debt or are somehow threatened or coerced. But it is impossible to believe that such circumstances always exist. We can only speculate about the reasons parents would consent to their children being photographed in this way, but it may be that mothers superimpose themselves on their daughters, who as “idols” will presumably enjoy public adulation and the glow of the mass media spotlight, and in doing so vicariously experience a feeling of achievement as a woman. But what about these girls’ fathers? Do they not object to this sexual treatment of their daughters? If we consider the age of fathers with nine- to fourteen-year-old daughters, however, they will presumably be somewhere in their late thirties to mid-forties. That’s right – the same age group as the man arrested on suspicion of looking up the skirts of high school students and the man sent to prison for paying a twelve-year-old girl for sex mentioned earlier. In other words, there is a possibility that the fathers of these girls are lolicon men. These fathers themselves may be turned on by these photographs of their daughters. Considered in this light, the situation is extremely disturbing. The parents make no objection and the girls themselves are happy to have their pictures taken. The reach of “junior idol” photo collections and DVDs will thus presumably expand and continue to drive the loliconification of society as a whole. 15 People who flock to “child pornography in disguise” The phenomenon discussed above is currently limited to a certain type of photography collection, but in the future its range may expand to include the mainstream media. Morning Musume has already opened this door. With lolicon having permeated teachers, scholars, film directors, and people in other such influential professions, and taken hold among men in the age group that forms the central pillar of Japanese society, it feels as though there may even be no going back. What is to be done if lolicon has deeply and silently penetrated the men whose age gives them social responsibility for advocating and embodying social norms? Of course, even today there are more explicit photographs and videos of the sexual abuse of young girls circulating below the surface of this society. These images violate the human rights of the girls involved in their creation, and have the potential to lead the inveterate lolicon men who buy them to further criminal acts. Pornography depicting the sexual abuse of young girls must be strictly prohibited. This is something I would like to make absolutely clear before proceeding any further. Having said this, what I would like to focus on in this chapter involves a force that is promoting the loliconification of society by a completely different route. This is the force that disseminates, in the form of perfectly legal photography collections and TV programs that on the surface carry no hint of sexuality, the kind of subliminal sexual presentation of young girls I have described, and, without running afoul of any laws, engages in large scale advertising of these “big hits,” openly marketing and selling this “child pornography in disguise.” As our society values freedom of expression and freedom of taste, as long as no young girls are actually being sexually abused it is difficult to regulate these products. The result of this is a structure in which many men quietly draw shameful sexual pleasure out of works that on the surface bear no sign of being child pornography. This is the scheme I see when I look at projects like Morning Musume. I cannot see it as “the story of a group of happy and cheerful young girls learning to sing and dance.” We who have an internal psychological response to this “child pornography in disguise” and seek sexual gratification on the sly while saying, “Aren’t those girls cute?” must take a hard look at ourselves. 16 The loliconification of society won’t stop!? So far we have looked at books of photographs and DVDs, but the same state of affairs can also be observed on the Internet. For example, there is a certain site that offers access to photographs and videos of girls under fifteen years of age for a fee. The youngest girls featured are ten years old. The images include photographs of girls in school uniforms and swimwear, and here too girls can be seen wearing makeup. In the title sequence of the sample video, a girl in a school swimsuit, her thighs open, is shown from the waist down, and the message being sent to viewers is extremely direct. Another related site also markets girls under fifteen, and once again the youngest girls shown are ten years old. These Internet sites are not so-called “adult” websites. Anybody can view them without restriction, and their presentation is clean and cute. The models appear to be Japanese “junior idols.” Recently, even photography collections of the sort I have discussed are often sold together with a DVD. It would seem that going forward there are various routes by which videos of young girls will be disseminated for sexually oriented consumption. This is how things stood as of the summer of 2004. The entertainment industry changes very quickly, so the specific circumstances surrounding the commoditization of young girls can shift in a very short period of time. The viewing of young girls in a sexual light, however, seems certain to continue for the foreseeable future without any fundamental change. What will happen if the degree to which “child pornography in disguise” permeates the mainstream media steadily increases? For one thing, it seems likely that these girls will be troubled when they become adults and realize the meaning of what they did as children. This is a major problem that is not openly addressed. Second, just by watching normal TV programs and reading normal magazines, men will be subjected to a barrage of stimulation from this “child pornography in disguise,” and as a result, even men who do not acquire actual child pornography will gradually and unknowingly develop a sexual sensitivity to young girls. There is thus a danger that the loliconification of society as a whole will continue unabated, with ever larger markets for products related to young girls being created and ever more skillful schemes of stimulation being implemented. Section 3: Why Do Lolicon Men Desire Young Girls? 17 Analyzing the thoughts and desires of lolicon men Now let us attempt to look inside the minds of people with lolicon, because the causes of this phenomenon are to be found not only within society but also within the minds of the individuals who experience it. In order to bring these causes to light, I will attempt to dispassionately analyze the lolicon feelings I myself have experienced. In The Frequently Occurring Prostitution of Young Girls: Men Who Buy Children (Tahatsusuru Shojyokaishun: Kodomo wo Kau Otoko, Shinhyōron, 2001), Setsuko Inoue examines men who buy young girls both in Japan and overseas. In her book she speculates as follows on the reason these men pay young girls for sex: [W]hen a woman cannot build a strong interpersonal relationship with the man to whom she is married, she tries to find a substitute for this in her son, a person of the same gender as her husband, and becomes an “education mama” [a Japanese term for mothers who are obsessed with ensuring their children’s educational achievement] who, in the name of what is best for her son, pursues her own self-realization through her child. While at first glance this behavior may appear to be motivated by love for the child in question, these actions are in fact those of a mother who cannot attain independence stoking her own self-love. As a result, in order to sever this emotional connection with their mothers, these sons try to protect themselves by engaging in behaviors that separate love from sex. One of these behaviors is engaging in child prostitution. (pp.79-80) This alone, however, does not explain why these men turn to “young girls” rather than “adult women.” Elsewhere Inoue writes that “men who like cute little girls are themselves childish and immature” (p.79), but this seems to be a weak explanation of why the sexuality of these men is focused on little girls (Inoue’s focus on a son’s separation from his mother in her investigation of the cause of child prostitution is interesting, however, and I will return to it later). Steady progress has been made in research on men who sexually abuse young girls. One of the things this has brought to light is the existence of a “cycle of abuse” in which men who were sexually abused as children go on to sexually abuse young girls when they grow up. Other psychological factors such as leading an isolated lifestyle and having an underdeveloped self have also been identified (see, for example, Chapter Five of Yoshiyuki Ishikawa’s Sexual Abuse by Relatives (Shinzoku ni yoru Seigyakutai, Minerva Shobo, 2004). This kind of work must continue in order to reduce the number of young girls who become victims of sexual abuse, but one troubling aspect this of research is that its focus is almost entirely limited to men who have actually committed sex crimes. What I want to address in this book is the psychology of men who have never committed a sex crime but nevertheless carry lolicon thoughts and desires in their minds. The issue I want to examine is that the large number of men whose lolicon does not take them as far as breaking the law are promoting the loliconification of society and creating an environment in which young girls become objects of sexual consumption. 18 The “dangerous” cuteness of young girls So what does lolicon feel like? Men who have abducted young girls have sometimes stated that they took them “because they were cute.” I can understand this feeling well. Girls in elementary school and junior high school are unfailingly cute, at least when seen from a distance. And this “cuteness” already contains a sexual element, because for me the feeling of “cuteness” elicited by a young girl is clearly different from the feeling of “cuteness” elicited by a young boy of the same age. When it comes to boys there is a straightforward feeling of “isn’t he cute!”, but when it comes to girls, in addition to this sort of feeling there is also the sense of a “dangerous” cuteness that cannot easily be put into words. This awareness of a “dangerous” cuteness comes from something being shaken deep within me, and intuitively it seems that it must be something sexual. As I have already noted, lolicon men seem to most desire girls around the age of eleven or twelve. This corresponds to girls in their last year of elementary school and first year of junior high school. While this age marks the peak of desirability, the range of girls that lolicon men may be attracted to extends roughly from nine to fourteen. In the photography collections discussed above, girls of nine and eleven years of age wear makeup and clearly noticeable lipstick. And in photos of them in their swimsuits and other outfits, they adopt the same sorts of sexy poses and expressions normally used by adult idols. What should we make of this? Sometimes girls around this age put on their mother’s lipstick and pretend to be grown-up, and one interpretation would be that these photographs are a depiction of this sort of behavior. But this cannot be anything more than a poor excuse offered by those who produce these images. Another interpretation is that making these elementary school students look like adult women implicitly signals that it is OK to have sex with them. This message appeals directly to the sexual interest of lolicon men, and accurately expresses the intentions of the producers of the photographs. The use of adult makeup such as mascara is saying to the viewer, “this girl is still a child, but you can treat her like an adult woman.” Lipstick, adult makeup, and provocative poses are all forms of “impression management” (deception through appearance) designed to raise the perceived age of the young girl in question. Conversely, there are also “lolicon photos” taken using models that are over eighteen, and in such cases an exactly opposite phenomenon occurs; “impression management” is used to make the models appear as though they might be very young. These girls are photographed with braided hair, hardly any make-up, and intentionally innocent expressions. These models’ bodies are inevitably adult in shape, and this adultness must be obscured and their apparent age lowered through their hairstyle and clothing. As for how far this reverse aging is intended to go, for the most part these girls appear as though they might be junior high school students. 19 The meaning of “secondary sex characteristics” So what is the significance of this age of eleven to twelve years old? What I would like to focus on here is the fact that this is the age when girls begin to show “secondary sex characteristics” and is also the average age at which girls begin to menstruate. Both of these facts are deeply significant, and I will address each of them in turn. Secondary sex characteristics arise when gonadotropins are released by the pituitary gland and a child’s body transforms into that of an adult. In the case of girls their breasts grow larger, their bodies become more curvaceous, and their waists begin to narrow in comparison with their hips. For example, a certain website that sells photographs of girls under fifteen features the following text about a twelve-year-old girl I will refer to as “A”: “Her eyes look straight ahead, emitting the light possessed only by young girls who remain unsullied. This earnest charm made me feel ‘she really is still a child,’ but on the other hand her slightly averted gaze when she posed in her school swimsuit and her slightly melancholy look in her school uniform gave me a foreshadowing of her transformation into an adult woman that made me very excited.” The following was written about the ten-year-old “T” on a different website: “But looking at this girl’s face and silhouette without focusing too sharply, it seems that before much time has passed she will begin climbing the stairway out of girlhood, and I felt as though these photographs might just have captured this exquisite moment.” What can be seen from these descriptions is the obsession-like desire on the part of the creators of these photography collections to witness the transformation from girl to woman occurring in eleven and twelve-year-old girls. It would seem that this desire is also shared by the people who buy these books of lolicon photography. In other words, lolicon men have a strange fixation on the moment of transformation when a girl becomes a woman. They are not fixated on “grown-up women” but rather the “moment” at which an adult woman comes into being. So why do they feel such a strong attraction to this moment of transformation? Feminism may see a cause of this obsession in patriarchies that place a special value on the possession of virgins, but I would like to look at it from a different angle. Secondary sex characteristics arise during the period in which girls’ bodies become “feminine” and boys’ bodies become “masculine.” The state of affairs before secondary sex characteristics begin to emerge is thus one in which the bodies of boys and girls, while their reproductive organs differ, are quite similar in size and general appearance. Statistics show that up until around the sixth year of elementary school the average height of boys is almost exactly the same as that of girls (146 cm for sixth-graders). At this point in their development most boys have not yet acquired much muscle and most girls’ bodies are still skinny and linear. In fact, during this period, a boy dressed up in female clothing could pass for a cute girl. In Japan there used to be a custom of dressing young boys in the sort of attire normally worn by women. And since at this age boys’ voices have not yet begun to change, there is little discernible difference between the voices of male and female children. There may of course be differences in behavior and ways of playing between boys and girls, but when it comes to children’s bodies themselves there does not seem to be a pronounced difference between the sexes. While boys and girls at this age are well aware of the differences between their bodies, compared to the split that occurs when secondary sex characteristics begin to appear these differences are negligibly small. Considering customs like dressing boys in the clothing of the opposite sex, it can be suggested that at this age both boys and girls have a seemingly “unisex” body (a body of undifferentiated sex) that could still become either male or female. It is the emergence of secondary sex characteristics, triggered by the release of gonadotropins, that all at once transforms this unisex body into either a “female body” or a “male body.” From a state of affairs like that of a bud whose ultimate form is unknown, a “male body” or “female body” suddenly blossoms. Images of puberty of this kind are evocatively depicted in many books and movies. It is an experience everyone can relate to. A young girl is a being who, at the point of puberty’s bifurcation into “man” or “woman,” is attempting to bend itself towards the body of a woman. Lolicon men are those who carry aspirations toward girls in this state and fixate on them. So why are these men so interested in this moment when a child begins to turn towards the “female side”? 20 The idea of having grown into a “man’s body” by mistake I will use my own case as an example. There is an idea that has settled at the bottom of my consciousness. This idea is that at the point of bifurcation during puberty I may have taken the wrong path. Perhaps I was supposed to have blossomed into a “female body” but by some mistake I took a wrong turn toward the “body of a man,” or, to put it more accurately, I was forcibly compelled to take the path leading to the body of an adult male without my conscious will having any say in the matter. This is the sort of thing you often hear from people with gender identity disorder. I would speculate, however, that a much wider range of men are also able to understand this feeling. As for why I have this idea of having grown into a man’s body by mistake, I think it is because ever since I hit puberty and my body began to change I have been unable to affirm myself as a being with a “man’s body.” As my body became that of an adult, it began to produce male hormones, grow muscles, acquire a more rugged, angular shape, grow more hair, and dirty itself with seminal fluid, and a strange odor began to emanate from somewhere inside me. That I was becoming this sort of body was something I could not accept at all during my adolescence. Even now I cannot honestly say that I am really happy to have the body of a man. Of course there is nothing to be done about it now, but I suspect there are in fact many men who feel as I do. They have perhaps remained silent about it because it is an extremely difficult thing to say out loud. They also probably try not to think about it very much, as in our society, having sufficient confidence in one’s own male body is connected to male honor. Deep down inside me, there is a longing to return to the body I had when I was a young boy, a body that had not yet been transformed by male hormones, muscles, body hair, and semen. There is also a longing to take the other path, if I could, at the point of bifurcation during puberty and make a sharp about-face towards a “female body” that does not have any of these attributes. Deep within my consciousness I ruminate on these longings over and over again. And I am drawn to the bodies of eleven and twelve-year-old girls that stand at puberty’s point of bifurcation and are just beginning to turn towards a “female body.” I think to myself, “I wish I could have taken that other path like the body of this young girl,”and I feel a desire to slip my consciousness into her body and while inhabiting it experience her puberty from the inside. This is how my lolicon mentality arises. Here we see once again the psychological mechanism described at the end of Chapter Three. 21 “I am the young girl, the young girl is me” I wish I could try living in a girl’s body. Uniform fetishes and lolicon have this sentiment in common. I am the young girl, the young girl is me. Uniforms and lolicon are the things that can, for a brief moment, make this aberrant fantasy come true. Most men have not spoken about this psychological secret out loud, but there must in fact be many who will immediately understand what I am trying to say. In his well-known book Folklore of Young Girls (Shōjo Minzokugaku, Kōbunsha, 1989), Eiji Ōtsuka writes, “Inside of me, and inside of you, the reader, there is a ‘young girl’” (p. 112), and I think the true meaning of this statement must be understood in the sense described above. Regarding the cause of lolicon, my hypothesis is thus that it can be found in lolicon men’s inability to affirm their own bodies. In his imagination a lolicon man escapes his own body and secretly transports himself into the body of the young girl in front of him. It is said that most male “otaku” [geeks] are lolicon men, and this hypothesis can explain both why these men tend to be extremely indifferent to their own appearance and why they have a tendency to identify themselves with young girl characters on the Internet (on this identification with young girl characters see Hiroki Azuma, ed., Net Speech Revision F [Mōjyō Genron F Kai], Seidosha, 2003). Through this identification with young girl characters, a male otaku succumbs to the illusion that his appearance is that of a young girl and thus becomes indifferent to how he actually looks to others. I would also suggest that these lolicon men spend a lot of time every day surfing the Internet, looking at magazines, and watching anime in search of bodies of young girls worth transporting themselves into. Mamoru Oshii’s animated film Ghost in the Shell (based on a manga series by Masamune Shiro) depicts a world in which a mind or spirit that has lost its own body can move from one new body to the next. The creator of this work calls these replacement bodies “prosthetic bodies” (“gitai” in Japanese), and for lolicon men I suspect that the bodies of young girls or young girl characters appear to be their own “prosthetic bodies” (in this sense, the final scene of Ghost in the Shell can be described as a rendering of a lolicon man’s dream come true). With this in mind, the new meaning of “moe” becomes clear. When otaku see a young female anime character or figurine and say they feel “moe,” they are saying that they would like to implant themselves within the object of this attraction; they want to “wear” the body of a beautiful young girl. It is thus the wearing of a young girl’s body that constitutes the core of an otaku’s “moe.” A transvestite wears women’s clothing, but a lolicon man wears a young girl’s body. Here I would like to mention The Murder of Childhood (Penguin Books, 1995), a book by Tim Tate and Ray Wyre about a British sex criminal named Robert Black. Black was reputed to have sexually abused hundreds of girls and killed at least a few of his victims. One very interesting passage reads as follows: But tucked away at the end of the section, question 27 and 28 asked whether Black had ever enjoyed transvestism or sought to be a transsexual. Slowly he nodded. As to transvestism, he had sometimes dressed himself in little girls’ clothes. And as to seeking out the life of a transsexual, Black simply recorded: ‘Yes. I always wanted to dress up as a girl.’ . . . The second, and in some ways corollary, force was a powerful yearning not to be what he was, a young boy growing into a man. He would far rather have been born a girl: certainly he did not want, much less like, his own penis. (pp. 85-86) In the mind of this lolicon criminal, the authors discovered a reluctance to become an “adult man” and a strong desire to have been born a girl. This agrees with what I have asserted so far. Tate and Wyre, however, do not seek a more penetrating explanation of why these feelings exist. I must go beyond their analysis and conduct a deeper investigation. I suspect there will be critics who dismiss analysis such as that I have engaged in above as pertaining only to the lolicon tendencies of feeble “weaklings” who failed to become “real men.” But how would they explain the fact that a sense of having not wanted to become a man and a desire to have been able to experience being a girl has also been found in the mind of a brutal murderer like Black? It seems clear that a similar structure exists in the minds of lolicon men regardless of whether they are “well built” or physically weak. I am sure there are also some readers who would doubt my account and suggest that, far from being unable to affirm their own bodies, most men on the contrary think too highly of their own powerful physiques, and it is because of this that they view women with contempt and commit rape. I will analyze these points in greater detail while referencing my own case in the next chapter. 22 What wriggles at the deepest level of the desire for young girls We have seen that lolicon superimposes a wish to have been able to take the path towards a female body on top of young girls on the verge of making this transition from the unisex body of a child to that of an adult woman. This alone, however, cannot explain why lolicon men attempt to become “sexually” involved with young girls, and why they are “sexually” aroused by their photographs, because if superimposing themselves on the body of a young girl is all they want then simply fantasizing about transporting themselves into a girl’s body and being absorbed in that delusion while having a cup of tea should satisfy them. It should be enough to quietly savor this kind of fantasy as one might enjoy sitting in the South of France and taking in the beautiful scenery depicted in Van Gogh’s landscapes. But the lolicon feeling I myself have actually experienced is not so calm and gentle. There is a shameful, thrilling sensation, as though sex with a young girl were always tacitly being assumed from the start. As I stated earlier, since I experience the same feelings towards a young girl that I feel during sexual contact with an adult woman, I cannot help but admit that ultimately these fantasies terminate in sexual intercourse and ejaculation. To unravel this further, let us recall what has been pointed out so far. “Secondary sex characteristics” appear in girls between the ages of eleven and twelve. This age range is nearly identical to the “average age of first menstruation.” I have already sufficiently examined “secondary sex characteristics,” so here I would like to focus my investigation on the “average age of first menstruation.” From this perspective, lolicon men exhibit a strange attachment to the age at which girls normally menstruate for the first time. What is the significance of this? A girl getting her first period means she is capable of becoming pregnant. Her body is now able to take semen from a man, combine it with an egg, and conceive a child. Presumably this is what lolicon men are fixated on. Now I will attempt to enter the deepest levels of lolicon desires. Please read the following as nothing more than a single hypothesis aimed at better understanding lolicon. I think that what is hidden in the deepest level of the minds of lolicon men like me is a desire to be the first to insert their semen into a young girl who has now become capable of ovulation and make her pregnant by combining her egg with their sperm. So whose child would be born if this happened? Let us think about it one more time. What do I see in the young girl in front of me? The answer is already clear. In the young girl’s body in front of me I see nothing other than an image of myself. In the body I am looking at, I see an image of “another me” that would have become a cute young girl if by some quirk of fate I had gone the other way at the point of bifurcation during puberty. If this is the case, then my desire to have the young girl I am looking at give birth to my child is actually a desire to have “another me,” in the form of the young girl, give birth to my child. I want a child created by the synthesis of my sperm and the egg of another me. This would indeed be nothing other than my own rebirth; a new me born without the intervention of anyone else other than me. This is the drama that unfolds at the deepest levels of my consciousness when I feel a desire to have sex with a young girl and ejaculate inside her. And this sexual intercourse must occur at the point of pubescent bifurcation when she is just beginning to turn down the path to the other side, because it was at this decisive moment I took the wrong path toward a “male body” and only by thus starting over again from this bifurcation will I have the opportunity to affirm myself. In other words, what is in the back of my mind is a desire to have sex with “another me” in the form of a young girl and in doing so give birth to myself once again without the intervention of anyone else. 23 Why do I want “myself” to be reborn? So what kind of self-affirmation could be achieved by having sex with a young girl and giving birth to myself once again? My thoughts on this are as follows. Since the new me would be conceived using my sperm and my egg and would be born out of my own belly, this newly reborn me would be completely cut off from any external “mother.” It would be “I,” not my “mother,” who gave birth to this me, and there would in fact be no “mother” involved in my birth. By giving birth to myself, I would be able to affirm my existence in a way that has no connection to a “mother.” I would thereby be able to completely separate myself from any kind of “mother.” This sort of drama is being played out inside lolicon men like me. It is often said that men who cannot psychologically separate from their mothers become “lolicon men” (for example, one proposed explanation of lolicon is that men whose wives rebuff their demands for mothering may try to have these needs met by their daughters. See Yoshiyuki Ishikawa’s Sexual Abuse by Relatives, p. 243). But does this explanation not have it completely backwards? Is lolicon not in fact an attempt, in the convoluted manner outlined above, to achieve a separation from one’s “mother”? There are certain things that come to mind when the phenomenon is considered in this way. I first came to know lolicon feelings directly when I was around twenty years old. At that time, so-called “lolicon magazines” and “lolicon manga” were beginning to be available at bookstores, it wasn’t until I reached this age that I suddenly started to pay attention to them. I first left the countryside and came to live on my own in Tokyo around this time, and it was a period of sudden self-awakening for me. For the first time in my life I was attempting to stand on my own two feet. And I began to fight with my mother. I will refrain from discussing the specifics here, but it was when I began fighting with my mother and severed my ties with her that lolicon feelings, as if to replace her, arose within me. In other words, the struggle with my real mother was over but the battle with “mother” as an abstract concept took the form of lolicon and continued within me after that. If you really want to understand the feelings of lolicon men, I think you must attempt to understand psychological mechanisms of this kind from the inside. It is wholly inadequate to simply view this phenomenon as sexual violence committed against weak young girls by immature men who cannot obtain an adult female partner. Yukiko Hayami’s Men Who Cannot Love, for example, contains interesting reportage on lolicon men, but seems unable to break free of this prevailing picture of immature, “mother complex” men abusing young girls who cannot put up much resistance. Of course, it goes without saying that the “rebirth theory” I have proposed cannot explain everything either. This hypothesis should, however, offer one means of more deeply elucidating the lolicon mind. I have said that the ultimate goal of lolicon men like me is to transport ourselves into the body of a cute young girl who is at the point of pubescent bifurcation, live inside it, savor the experience of being inside it to our heart’s content, dress it up in various outfits and interact with other people from within it, be treated gently as something precious by other people, and come to truly love our own bodies. I then want to ejaculate into the girl’s womb from inside her, become pregnant, and give birth to myself. By doing this I will finally be able to escape from my mother’s sphere of influence. I will become an entity born of myself, and in doing so obtain absolute freedom without ever needing to be subordinate to anyone. I will obtain the physical ideal of the body of a young girl, feel self-affirmation towards my own body, and also obtain the internal freedom of psychological independence. The world will bless me, I will bless myself, and my existence will become one of perfect self-fulfillment and satisfaction. But I cannot attain self-affirmation by clinging to this conceptual drama – life is not that easy. Lolicon results in a self-enclosed world in which this convoluted drama of self-affirmation is repeated over and over again like a tape playing in an endless loop. It is I who impregnate, it is I who am impregnated, and it is I who am given birth to. It is a self-centered labyrinth of extreme self-reference with no way out. A flesh and blood young girl is used as nothing more than a trigger or prosthetic body; once she is no longer needed she is to be discarded. She is also to be molested, abused, commoditized, and subjected to severe trauma. These are the consequences of lolicon. There is indeed no escaping them. (End of Chapter 4)
>> Go to Chapter 5 |
{
"pile_set_name": "Pile-CC"
} | Ubisoft, the company responsible for the Just Dance franchise, looks like they will be cranking out these titles until the end of time. This is great news for fans of the dance game genre.
Just Dance is an annual release that includes updated song lists and dance routines. Anyone who enjoys dancing like a crazy person in front of their friends is in for a treat here. Just don’t be ashamed to dance in front of your kids… it’s our job to embarrass them!
LEGO branded games have been the surprise hit of this console generation and LEGO Marvel Super Heroes looks like it is one of the best. It is lower priced than other games on the market ($50) and is loaded with super heroes. Your child favorite is all but guaranteed to be playable. This is an excellent gift for the Marvel fan on your list!
There are a lot of racing games coming to market soon. Forza Motorsports is getting a lot of press right now (and rightfully so) because it is beautiful. But, we have to remember that the Forza series is a racing simulation.
If your kids are expecting to be able to race around tracks like they do in Mario Kart they will be VERY disappointed. Forza isn’t impossible, but they are trying to simulate a real driving experience. There are some “assists” that can be turned on to help smooth out the experience for less experienced drivers though so your mileage may vary (pun intended).
Peggle 2
Note: Peggle 2 isn’t out yet, but will be available on Xbox One before Christmas.
Peggle has been one of the most popular games on the web for a very, very long time. You can give the previous game a try on PopCap’s website. I would take advantage of the chance to try it out before you send your money on this one.
Full disclosure: Links on this guide point towards Amazon.com. Purchasing products using those links provides us with advertising revenue that will help us keep our operation going! |
{
"pile_set_name": "Wikipedia (en)"
} | 2005 Guinea-Bissau presidential election
Presidential elections were held in Guinea-Bissau on 19 June 2005, with a second round runoff on 24 July. The elections marked the end of a transition to democratic rule after the previously elected government was overthrown in a September 2003 military coup led by General Veríssimo Correia Seabra. The result was a victory for former President and independent candidate João Bernardo Vieira.
Background
Following the coup, a civilian government was nominated to oversee the transition and sworn in on 28 September 2003. Henrique Rosa was appointed interim President following talks with military, political, and civil society leaders, while Artur Sanhá of the Party for Social Renewal (PRS) was named Prime Minister.
A legislative election, delayed numerous times during the presidency of Kumba Ialá, took place on 28 March 2004. The poll was declared free and fair by election observers and the former ruling party, the African Party for the Independence of Guinea and Cape Verde (PAIGC), won a plurality of the seats. Ialá's party, the PRS, placed second, followed by the United Social Democratic Party (PUSD). PAIGC leader Carlos Gomes Júnior took office as Prime Minister in May 2004.
The transitional period has been one of increased political and national stability. The caretaker government has managed to improve Guinea-Bissau's human rights record, as evidenced in the most recent U.S. State Department Country Reports on Human Rights Practices entry for Guinea-Bissau (released 28 February 2005, which says "The [Transitional] Government generally respected the human rights of its citizens; however, there were problems in some areas". The previous report (released 25 February 2004) stated "The [Ialá] Government's human rights record remained poor, and it continued to commit serious abuses".
The biggest threat to stability came on 6 October 2004 when a mutiny by soldiers—instigated by unpaid wages—turned violent. General Veríssimo Correia Seabra and his lieutenant were killed by the revolting soldiers. Despite this setback, the tense relations between the government and the military improved with the signing of a memorandum of understanding.
Candidates
On 10 May 2005, the Supreme Court published a list of candidates that will contest the election. Three previously barred candidates were allowed to contest the poll and appeared on the final list of candidates published on 18 May. The 13 candidates are:
Adelino Mano Queta - Independent
Antonieta Rosa Gomes - Guinean Civic Forum-Social Democracy (FCG-SD). Contested the 1994 presidential election and won 1.79% of the vote.
Aregado Mantenque Té - Workers' Party (PT)
Paulino Empossa Ié - Independent
Faustino Fadut Imbali - Manifest Party of the People (PMP). Prime Minister from March to December 2001.
Francisco Fadul - United Social Democratic Party (PUSD). Prime Minister from 3 December 1998 to 19 February 2000.
Mamadú Iaia Djaló - Independent
Idrissa Djaló - National Unity Party (PUN)
João Bernardo "Nino" Vieira - Independent. President from 1980 to 1999. Like Ialá, he was banned from national politics for five years but his candidacy was approved by the supreme court.
João Tátis Sá - Guinean People's Party (PPG)
Kumba Ialá - Party for Social Renewal (PRS). He contested the country's first democratic elections in 1994, losing to incumbent João Bernardo Vieira, and won the 1999/2000 election. He served as president from 17 February 2000 until his ouster by the military in September 2003. His nomination is controversial because the transitional government announced a five-year ban on political activities for former leaders following the coup. Despite this, the Supreme Court approved his candidacy.
Malam Bacai Sanhá - African Independence Party of Guinea and Cape Verde (PAICG). He served as acting president from 14 May 1999 to 17 February 2000. Sanhá ran in the previous presidential elections, held on 28 November 1999 and placed second with 23.37% of the vote to Kumba Ialá's 38.81%. In the run-off held on 16 January 2000, he was soundly defeated by Ialá, who received 72% of the vote.
Mário Lopes da Rosa - Independent
Diplomats and political analysts say that the participation of the two ex-presidents Vieira and Ialá may exacerbate tensions among ethnic groups and the military that could destabilize the country. Ex-President Vieira has a troubled relationship with the armed forces. Ex-President Ialá, on the other hand, has a very poor reputation among potential donor countries and financial institutions, with the International Monetary Fund and World Bank freezing aid to the country during his presidency. He has a considerable amount of support from the Balanta ethnic group which dominates the military, but has little support from the other groups. There are unconfirmed reports of the establishment of armed groups along ethnic lines in Bissau.
Four candidates who were approved to contest the election withdrew in the weeks leading up to the poll; Abubacar Baldé of the UNDP, Iancuba Indjai of the PST (who subsequently declared his support for Malam Bacai Sanhá), independent candidate Ibraima Sow (who backed Vieira) and Salvador Tchongó of the RGB-MB.
Campaign
On 2 July Ialá announced his support for Vieira's candidacy in the second round runoff. He called Vieira "a symbol of the construction of the Guinean state and of national unity because he proclaimed our independence in the hills of Boe" and said that he could "be relied upon to defend our national independence, to oppose neo-colonialism, to build the republic and promote peace, stability and above all, national reconciliation". Given Ialá's sharp hostility to Vieira in previous years, this endorsement was viewed as surprising by many, and there was reportedly significant dissatisfaction with the decision among Ialá's supporters.
It has been alleged that Vieira's re-election campaign was partly funded by Colombian drug dealers, who use Guinea-Bissau as a transit route to transport drugs to Europe.
Conduct
Voting took place peacefully in the first round on 19 June. Chief EU election monitor Johan Van Heck said his group noted no major irregularities, adding, "We have the impression that throughout the country everyone has had the chance to express themselves without being intimidated." The next day, Van Heck praised the fact that "the military forces abstained from intervening in the process and rather helped the conduct of the election." The EU observer added, "More than 90 percent of the polling stations were fully operational an hour after they had opened, and the secret ballot was guaranteed."
On 22 June, provisional tallies put Sanhá in first place, followed by Vieira and Ialá in third. Members of Ialá's Party for Social Renewal (PRS) deemed the results "false". Two days later, at least two people died when police fired tear gas and live bullets at a crowd of Ialá supporters, who were protesting the released results.
Beginning on 25 June, Senegalese President Abdoulaye Wade held separate meetings with the three main candidates; Wade said that he was mediating at the request of the Economic Community of West African States (ECOWAS) and was not interfering in Guinea-Bissau's affairs. Kumba Ialá, speaking at a press conference in Dakar on 27 June, accepted the results "in the interests of peace and stability", although he still maintained that he had actually received the most votes. According to Ialá, he won 38%, Sanhá won 28%, and Vieira won 26%; he alleged that the votes were manipulated so that his total went to Sanhá and Sanhá's total went to Vieira. Also on 27 June, Vieira promised to "respect the verdict of the ballot boxes", as did Sanhá, who described himself as "a man of peace and stability".
Results
Final results of the first round were released on 25 June. Malam Bacai Sanhá received 35.45% of the vote, João Bernardo "Nino" Vieira won 28.87%, and Kumba Ialá 25.00%. Ten other candidates split the remaining votes. Electoral commission head Malam Mané made "a strong appeal for moderation and public-spiritedness." Voter turnout for the first round was placed at 87.3%.
On July 28, the electoral commission reported that Vieira had garnered 20,000 vote more than Sanhá in run-off voting, however, the results were "provisional" since the PAIGC demanded a recount, citing irregularities in the capital and in the west. After the provisional results were announced, Vieira praised his rival Sanha, called him a democrat and said he hoped he would help unify the country; he also vowed that "from today, Guinea-Bissau will change in the right direction". A spokesman for Sanha alleged fraud, however.
References
Further reading
External links
PAIGC website
PUSD website
Francisco Fadul website
Guinea-Bissau US Department of State
Category:2005 elections in Africa
2005
Election, Presidential
Category:June 2005 events in Africa |
{
"pile_set_name": "ArXiv"
} | ---
abstract: 'In this paper we investigate the geometric properties of the configuration consisting of a subspace $\Gamma$ and a canonical subgeometry $\Sigma$ in ${\mathrm{PG}}(n-1,q^n)$, with $\Gamma\cap\Sigma=\emptyset$. The idea motivating is that such properties are reflected in the algebraic structure of the linear set which is projection of $\Sigma$ from the vertex $\Gamma$. In particular we deal with the maximum scattered linear sets of the line ${\mathrm{PG}}(1,q^n)$ found by Lunardon and Polverino in [@LP2001] and recently generalized by Sheekey in [@Sh]. Our aim is to characterize this family by means of the properties of the vertex of the projection as done by Csajbók and the first author of this paper for linear sets of pseudoregulus type. With reference to such properties, we construct new examples of scattered linear sets in ${\mathrm{PG}}(1,q^6)$, yielding also to new examples of MRD-codes in ${{\mathbb F}}_q^{6\times 6}$ with left idealiser isomorphic to ${{\mathbb F}}_{q^6}$.'
author:
- 'Corrado Zanella and Ferdinando Zullo [^1]'
title: 'Vertex properties of maximum scattered linear sets of ${\mathrm{PG}}(1,q^n)$'
---
51E20, 05B25, 51E22
Linear set, linearized polynomial, $q$-polynomial, finite projective line, subgeometry, scattered linear set
Introduction
============
Let $\Lambda={\mathrm{PG}}(W,{{\mathbb F}}_{q^n})={\mathrm{PG}}(1,q^n)$, where $W$ is a vector space of dimension $2$ over ${{\mathbb F}}_{q^n}$. A point set $L$ of $\Lambda$ is said to be an *${{\mathbb F}}_q$-linear set* of $\Lambda$ of rank $\rho$ if it is defined by the non-zero vectors of a $\rho$-dimensional ${{\mathbb F}}_q$-vector subspace $U$ of $W$, i.e. $$L=L_U=\{{\langle}{\bf u} {\rangle}_{\mathbb{F}_{q^n}} \colon {\bf u}\in U\setminus \{{\bf 0} \}\}.$$ Two linear sets $L_U$ and $L_W$ of ${\mathrm{PG}}(1,q^n)$ are said to be *$\mathrm{P\Gamma L}$-equivalent* if there is an element $\phi$ in $\mathrm{P\Gamma L}(2,q^n)$ such that $L_U^{\phi} = L_W$. It may happen that two ${{\mathbb F}}_q$–linear sets $L_U$ and $L_W$ of ${\mathrm{PG}}(1,q^n)$ are $\mathrm{P\Gamma L}$-equivalent even if the ${{\mathbb F}}_q$-vector subspaces $U$ and $W$ are not in the same orbit of $\Gamma \mathrm{L}(2,q^n)$ (see [@CSZ2015] and [@CMP] for further details).
Lunardon and Polverino in [@LuPo2004] (see also [@LuPoPo2002]) show that every linear set is a projection of a canonical subgeometry, where a *canonical subgeometry* in ${\mathrm{PG}}(m-1,q^n)$ is a linear set $L$ of rank $m$ such that ${\langle}L {\rangle}={\mathrm{PG}}(m-1,q^n)$ ([^2]). In particular, by [@LuPo2004 Theorems 1 and 2] (adapted to the projective line case), for each ${{\mathbb F}}_q$-linear set $L_U$ of the projective line $\Lambda={\mathrm{PG}}(1,q^n)$ of rank $n$ there exist a canonical subgeometry $\Sigma\cong{\mathrm{PG}}(n-1,q)$ of $\Sigma^*={\mathrm{PG}}(n-1,q^n)$, and an $(n-3)$-subspace $\Gamma$ of $\Sigma^*$ disjoint from $\Sigma$ and from $\Lambda$ such that $$L_U={{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)=\{\langle \Gamma,P\rangle \cap \Lambda \colon P \in \Sigma\}.$$ We call $\Gamma$ and $\Lambda$ the *vertex* (or *center*) and the *axis* of the projection, respectively.
In this paper we focus on [*maximum scattered*]{} ${{\mathbb F}}_q$-linear sets of ${\mathrm{PG}}(1,q^n)$, that is, ${{\mathbb F}}_q$-linear sets of rank $n$ in ${\mathrm{PG}}(1,q^n)$ of size $(q^n-1)/(q-1)$. In this case, we also say that the related ${{\mathbb F}}_q$-subspace is *maximum scattered*. Recall that the *weight of a point* $P=\langle \mathbf{u} \rangle_{{{\mathbb F}}_{q^n}}$ is $w_{L_U}(P)=\dim_{{{\mathbb F}}_q}(U\cap\langle \mathbf{u} \rangle_{{{\mathbb F}}_{q^n}})$. A linear set $L_U$ is scattered if and only if each of its points has weight one.
If ${\langle}(0,1) {\rangle}_{{{\mathbb F}}_{q^n}}$ is not contained in the linear set $L_U$ of rank $n$ of ${\mathrm{PG}}(1,q^n)$ (which we can always assume after a suitable projectivity), then $U=U_f:=\{(x,f(x))\colon x\in {{\mathbb F}}_{q^n}\}$ for some linearized polynomial (or *$q$-polynomial*) $f(x)=\sum_{i=0}^{n-1}a_ix^{q^i}\in {{\mathbb F}}_{q^n}[x]$. In this case we will denote the associated linear set by $L_f$.
The first example of maximum scattered ${{\mathbb F}}_q$-linear set, found by Blokhuis and Lavrauw in [@BL2000], is known as linear sets of *pseudoregulus type* and can be defined (see [@LuMaPoTr2014 Section 4]) as any linear set $\mathrm{P\Gamma L}$-equivalent to $$L^1=\{{\langle}(x,x^q) {\rangle}_{\mathbb{F}_{q^n}} \colon x \in {{\mathbb F}}_{q^n}^*\}.$$
A characterization of the linear sets of pseudoregulus type has been given by Csajbók and Zanella in [@CsZ20162] as particular projections of a canonical subgeometry (see Theorem \[chPseudo\]).
[@CsZ20162 Theorem 2.3]\[chPseudo\] Let $\Sigma$ be a canonical subgeometry of ${\mathrm{PG}}(n-1,q^n)$, $q>2$, $n \geq 3$. Assume that $\Gamma$ and $\Lambda$ are an $(n-3)$-subspace and a line of ${\mathrm{PG}}(n-1,q^n)$, respectively, such that $\Sigma \cap \Gamma=\Lambda \cap \Gamma= \emptyset$. Then the following assertions are equivalent:
1. The set ${{\mathrm p}}_{\Gamma, \Lambda}(\Sigma)$ is a scattered ${{\mathbb F}}_q$-linear set of pseudoregulus type;
2. A generator $\hat{\sigma}$ exists of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise, such that $\dim(\Gamma\cap\Gamma^{\hat{\sigma}})=n-4$; furthermore $\Gamma$ is not contained in the span of any hyperplane of $\Sigma$;
3. There exists a point $P_\Gamma$ and a generator $\hat{\sigma}$ of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise, such that ${\langle}P_\Gamma,P_\Gamma^{\hat{\sigma}},\ldots, P_\Gamma^{\hat{\sigma}^{n-1}} {\rangle}={\mathrm{PG}}(n-1,q^n)$, and $$\Gamma={\langle}P_\Gamma,P_\Gamma^{\hat{\sigma}},\ldots, P_\Gamma^{\hat{\sigma}^{n-3}} {\rangle}.$$
Few other families of maximum scattered linear sets of ${\mathrm{PG}}(1,q^n)$ are known, see [@CMPZ; @CsMZ2018]. We will deal with the only remaining family of maximum scattered linear sets existing for each value of $n$. Such a family has been introduced by Lunardon and Polverino in [@LP2001] for $s=1$ and generalized by Sheekey in [@Sh] and is defined as follows $$\label{LPform}
L_{s,\delta}^n=\{{\langle}(x,\delta x^{q^s} + x^{q^{n-s}}){\rangle}_{{{\mathbb F}}_{q^n}}\colon x\in {{\mathbb F}}_{q^n}^*\},$$ with $n\geq 4$, ${{\mathrm N}}_{q^n/q}(\delta)\notin \{0,1\}$ ([^3]) and $(s,n)=1$. More generally, we will call each linear set equivalent to a maximum scattered linear set of the form , with $\delta \neq 0$, of *Lunardon-Polverino type* (or shortly *LP-type*). For some values of $s$, $\delta$ and $n$, ${{\mathrm N}}_{q^n/q}(\delta)\notin \{0,1\}$ is a necessary condition for $L_{s,\delta}^n$ to be scattered, see Section \[Geo\]. Up to our knowledge, no scattered $L_{s,\delta}^n$ is known satisfying ${{\mathrm N}}(\delta)=1$.
Our aim is to prove characterizations of maximum scattered linear sets of LP-type in the spirit of the characterization of the linear sets of pseudoregulus type, cf. Theorem \[chPseudo\]. As a consequence, we will construct new examples of maximum scattered linear sets in ${\mathrm{PG}}(1,q^6)$. As showed in [@Sh Sect. 5], this also yields to new examples of MRD-codes in ${{\mathbb F}}_q^{6\times 6}$ with left idealiser isomorphic to ${{\mathbb F}}_{q^6}$ [@CMPZ Proposition 6.1] (see also [@CSMPZ2016; @CsMPZ2019; @ShVdV]), see last section for more details on the connections with MRD-codes.
We will work in the following framework. Let $x_0,\ldots,x_{n-1}$ be the homogeneous coordinates of ${\mathrm{PG}}(n-1,q^n)$ and let $$\Sigma=\{{\langle}(x,x^{q},\ldots,x^{q^{n-1}}) {\rangle}_{{{\mathbb F}}_{q^n}} \colon x \in{{\mathbb F}}_{q^n} \}$$ be a fixed canonical subgeometry of ${\mathrm{PG}}(n-1,q^n)$. The collineation $\hat{\sigma}$ of ${\mathrm{PG}}(n-1,q^n)$ defined by ${\langle}(x_0,\ldots,x_{n-1}){\rangle}_{{{\mathbb F}}_{q^n}}^{\hat{\sigma}}={\langle}(x_{n-1}^{q},x_0^{q},\ldots,x_{n-2}^{q}){\rangle}_{{{\mathbb F}}_{q^n}}$ fixes precisely the points of $\Sigma$. Note that if $\sigma$ is a collineation of ${\mathrm{PG}}(n-1,q^n)$ such that $\mathrm{Fix}(\sigma)=\Sigma$, then $\sigma=\hat{\sigma}^s$, with $(s,n)=1$.
Possible configurations of the vertex of the projection
=======================================================
Following [@GiuZ Section 3], we are able to describe the structure of the vertex of the projection, under certain assumptions regarding the dimension of the intersections with some of its conjugates w.r.t. a collineation of ${\mathrm{PG}}(n-1,q^n)$ fixing the chosen subgeometry pointwise.
We start by recalling the following lemma.
[@Lun99 Lemma 3]\[int\] If $S$ is a nonempty projective subspace of dimension $k$ of ${\mathrm{PG}}(n-1,q^n)$ fixed by $\sigma$, then $S$ meets $\Sigma$ in an ${{\mathbb F}}_q$-subspace of dimension $k$. In particular, $S \cap \Sigma \neq \emptyset$.
Since the vertex of the projection is disjoint from $\Sigma$, we have that $\dim(\Gamma \cap \Gamma^\sigma)\leq \dim\Gamma-1$. We characterize the extremal case, i.e. when $\dim(\Gamma \cap \Gamma^\sigma)= \dim \Gamma-1$.
\[k-1\] Let $\Gamma$ be a subspace of ${\mathrm{PG}}(n-1,q^n)$ of dimension $k$ and such that $\Gamma \cap \Sigma=\emptyset$. If $\dim (\Gamma \cap \Gamma^\sigma)=k-1$, then there exists exactly one point $P$ in ${\mathrm{PG}}(n-1,q^n)$ such that $$\Gamma={\langle}P,P^\sigma,\ldots,P^{\sigma^k} {\rangle}.$$ Furthermore, $P^{\sigma^{n-1}}\not\in\Gamma$.
The hypotheses imply $k\ge0$. For $k=0$, $\Gamma$ is a point $P$. If $P^{\sigma^{n-1}}\in\Gamma$, then $P\in\Sigma$, a contradiction. The remaining statements are trivial for this $k$.
Now suppose that the assertion is true for $(k-1)$-dimensional subspaces, and $k\ge1$. Let denote by $\Omega=\Gamma\cap\Gamma^\sigma$. Clearly, $\langle\Omega,\Omega^\sigma\rangle \subseteq \Gamma^\sigma$ and $\dim \Gamma^\sigma=k$. By our assumption, $\dim \Omega=k-1$ and also $\dim (\Omega \cap \Omega^\sigma)=k-2$. Indeed, $$\dim(\Omega\cap\Omega^\sigma)=2(k-1)-\dim {\langle}\Omega, \Omega^\sigma{\rangle}\geq 2k-2-k=k-2.$$ So, $$k-2 \leq \dim(\Omega\cap\Omega^\sigma) \leq k-1,$$ and since $\Omega\neq\Omega^\sigma$, otherwise by Lemma \[int\] we should have $\Gamma \cap \Sigma \neq \emptyset$, we get $\dim(\Omega\cap\Omega^\sigma)=k-2$. Therefore, there exists a point $P' \in \Omega$ such that $$\Omega=\Gamma\cap\Gamma^\sigma={\langle}P',P'^\sigma,\ldots,P'^{\sigma^{k-1}} {\rangle}.$$ By induction hypothesis, $P'^{\sigma^{n-1}} \notin \Gamma\cap \Gamma^\sigma$. So, $$\Gamma={\langle}P,P^\sigma,\ldots,P^{\sigma^k} {\rangle},$$ with $P=P'^{\sigma^{n-1}}$.
Regarding the uniqueness, if $\Gamma={\langle}Q,Q^\sigma,\ldots,Q^{\sigma^k}{\rangle}$ for some point $Q$, then $\Omega={\langle}Q^\sigma,\ldots,Q^{\sigma^k}{\rangle}$. By induction, this implies $Q^\sigma=P'$ above defined, and $Q=P$.
Finally note that $P^{\sigma^{n-1}}\in\Gamma$ would imply $\Gamma^{\sigma^{n-1}}=\Gamma$ and $\Gamma\cap\Sigma\neq\emptyset$, a contradiction.
The next result follows for $r=1$ from Theorem \[k-1\].
\[k-2\] Let $\Gamma$ be a subspace of ${\mathrm{PG}}(n-1,q^n)$ of dimension $k\ge0$ such that $\Gamma \cap \Sigma=\emptyset$, and $\dim(\Gamma\cap\Gamma^\sigma)\ge k-2$. Let $r$ be the least positive integer satisfying the condition $$\label{def_r}
\dim(\Gamma\cap\Gamma^\sigma\cap\Gamma^{\sigma^2}\cap\ldots\cap\Gamma^{\sigma^r})>k-2r.$$ Then there is a point $P\in{\mathrm{PG}}(n-1,q)$ satisfying
(i) $P$, $P^\sigma$, $\ldots$, $P^{\sigma^{k-r+1}}$ are independent points contained in $\Gamma$;
(ii) $P^{\sigma^{n-1}}\not\in\Gamma$.
If $r<(k+2)/2$, then the point $P$ satisfying conditions (i) and (ii) is unique.
We will call the integer $r$ of the above statement the *intersection number of* $\Gamma$ w.r.t. $\sigma$ and we will denote it by $\mathrm{intn}_{\sigma}(\Gamma)$.
*Preliminary remarks.* Since $\sigma$ is a collineation and since $\dim (\Gamma \cap \Gamma^\sigma)\geq k-2$, for any positive integer $t$ it holds $$\begin{gathered}
\dim(\Gamma\cap\Gamma^\sigma\cap\ldots\cap\Gamma^{\sigma^{t+1}})=\\
\dim\Gamma+\dim(\Gamma^\sigma\cap\ldots\cap\Gamma^{\sigma^{t+1}})
-\dim\left({\langle}\Gamma\cup(\Gamma^\sigma\cap\ldots\cap\Gamma^{\sigma^{t+1}}){\rangle}\right)\ge\\
\dim\Gamma+\dim(\Gamma\cap\ldots\cap\Gamma^{\sigma^t})
-\dim\left({\langle}\Gamma\cup\Gamma^\sigma{\rangle}\right)\ge
\dim(\Gamma\cap\ldots\cap\Gamma^{\sigma^t})-2.\end{gathered}$$ This implies $\dim(\Gamma\cap\ldots\cap\Gamma^{\sigma^t})=k-2t$ for any $0\le t<r$; so, taking $t=r-1$, $k-2(r-1)\ge-1$, that is $r\le(k+3)/2$. Furthermore, if $\dim(\Gamma\cap\ldots\cap\Gamma^{\sigma^t})\ge0$, then $$\label{stepconeccez}
\dim(\Gamma\cap\Gamma^\sigma\cap\ldots\cap\Gamma^{\sigma^{t+1}})
\le
\dim(\Gamma\cap\ldots\cap\Gamma^{\sigma^t})-1,$$ for otherwise $\Sigma\cap\Gamma\cap\ldots\cap\Gamma^{\sigma^t}\neq\emptyset$. This implies $$\label{pre-unicita}
\dim(\Gamma\cap\Gamma^\sigma\cap\Gamma^{\sigma^2}\cap\ldots\cap\Gamma^{\sigma^r})=k-2r+1\quad
\mbox{ for }r\neq\frac{k+3}2.$$ [Note that for $r=\frac{k+3}2$ then $\dim(\Gamma\cap\Gamma^\sigma\cap\Gamma^{\sigma^2}\cap\ldots\cap\Gamma^{\sigma^r})=k-2r+2=-1$.]{}
*Existence of $P$, by induction on $r$.* For $r=1$, the assertion follows from Theorem \[k-1\]. Assume then that Theorem \[k-2\] holds (except possibly for the uniqueness part) for $r-1$, and $r\ge2$. Let $\Omega=\Gamma\cap\Gamma^\sigma$ and $\dim\Omega=k-2=:k'$. If $k'=-1$, then the thesis is trivial.
Now suppose $k'\geq0$. Then it holds $$\dim(\Omega\cap\ldots\cap\Omega^{\sigma^t})=k'-2t$$ for $t<r-1$, whereas $$\dim(\Omega\cap\ldots\cap\Omega^{\sigma^{r-1}})>k'-2(r-1)=k-2r.$$ By induction hypothesis there is a point $P'\in{\mathrm{PG}}(n-1,q^n)$ satisfying
(A) $P',P'^{\sigma},\ldots,P'^{\sigma^{k'-(r-1)+1}}=P'^{\sigma^{k-r}}$ are independent points;
(B) $P',P'^{\sigma},\ldots,P'^{\sigma^{k-r}}\in\Omega$;
(C) $P'^{\sigma^{n-1}}\not\in\Omega$.
Let $P=P'^{\sigma^{n-1}}$. Then (B) implies that $P$, $P^\sigma$, $\ldots$, $P^{\sigma^{k-r+1}}$ are points contained in $\Gamma$; both (C) and (A) imply that they are independent. $P^{\sigma^{n-1}}\in\Gamma$ would imply $$P^{\sigma^{r-2}},P^{\sigma^{r-1}},\ldots,P^{\sigma^{k-r+1}}\in\Gamma\cap\Gamma^\sigma\cap\ldots
\cap\Gamma^{\sigma^{r-1}},$$ contradicting $\dim(\Gamma\cap\Gamma^\sigma\cap\ldots \cap\Gamma^{\sigma^{r-1}})=k-2r+2$.
*Uniqueness of $P$.* By the previous considerations it follows that there exists at least one point $P$ such that $P$, $P^\sigma$, $\ldots$, $P^{\sigma^{k-r+1}}$ are independent points contained in $\Gamma$. From (\[pre-unicita\]) it follows that $$\Lambda:=\Gamma\cap\Gamma^\sigma\cap\Gamma^{\sigma^2}\cap\ldots\cap\Gamma^{\sigma^r}= {\langle}P^{\sigma^r}, \ldots, P^{\sigma^{k-r+1}} {\rangle},$$ has dimension $k-2r+1>-1$. Furthermore, $\dim(\Lambda \cap \Lambda^\sigma)=k-2r$, otherwise $\Gamma\cap\Sigma\neq\emptyset$. It follows that $\Lambda$ satisfies the hypotheses of Theorem \[k-1\] and hence the point $P$ is unique.
\[L(P)\] It is clear that $P$ is as in the previous result, it follows that $$\dim L(P)\geq k-r+2,$$ where $L(P)={\langle}P,P^\sigma,\ldots,P^{\sigma^{n-1}} {\rangle}$.
A similar idea to the intersection number for a vertex of a linear set has been presented in [@NPH] (see also [@GiuZ; @NPH2]), where the authors used sequences of the dimensions of certain intersections as invariants for rank metric codes. See also the last section.
Characterization of linear sets of LP-type
==========================================
Sufficient conditions
---------------------
We are now ready to state sufficient conditions for a linear set to be of LP-type. In the following we denote by $\operatorname{N}(-)$ the norm over ${\mathbb F_q}$, for short.
\[charact1\] In ${\mathrm{PG}}(n-1,q^n)$, $n\ge4$, let $\Gamma$ be a subspace of dimension $n-3$, $\Lambda$ a line, and $\Sigma\cong{\mathrm{PG}}(n-1,q)$ a canonical subgeometry, such that $\Gamma \cap \Sigma=\emptyset=\Gamma\cap\Lambda$. Assume $L={{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)$ is a scattered linear set of $\Lambda$. If $\mathrm{intn}_{\sigma}(\Gamma)=2$ for some generator $\sigma$ of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise, then there exists a unique point $P$ such that $$\Gamma=\langle P,P^{\sigma},\ldots,P^{\sigma^{n-4}},Q \rangle.$$ Furthermore, if the line $\langle P^{\sigma^{n-1}}, P^{\sigma^{n-3}} \rangle$ meets $\Gamma$, then $L$ is of LP-type.
An integer $s$ exists such that $(s,n)=1$ and $\sigma=\hat{\sigma}^s$, i.e. the $i$-th component ([^4]) of ${\langle}(x_0,x_1,\ldots,x_{n-1}){\rangle}_{{{\mathbb F}}_{q^n}}^\sigma$ is $x_{i+s}^{q^s}$, where $i+s$ is seen modulo $n$. By Theorem \[k-2\], there exist $P$ and $Q$ in $\Gamma$ such that $$\Gamma={\langle}P,P^\sigma,\ldots,P^{\sigma^{n-4}},Q {\rangle}.$$ Denote by $R=P^{\sigma^{n-2}}$, then $$\Gamma={\langle}R^{\sigma^2},R^{\sigma^3},\ldots,R^{\sigma^{n-2}},Q {\rangle},$$ and $Q$ may be chosen in ${\langle}R^\sigma, R^{\sigma^{n-1}}{\rangle}$. If $\dim \langle R,R^\sigma,\ldots,R^{\sigma^{n-1}}\rangle<n-1$, then, since $Q \in {\langle}R^\sigma, R^{\sigma^{n-1}}{\rangle}$, it follows that $$\Gamma \subseteq \langle R,R^\sigma,\ldots,R^{\sigma^{n-1}}\rangle,$$ i.e. $\Gamma$ is contained in a subspace fixed by $\sigma$ of dimension either $n-3$ or $n-2$. In both the cases we get a contradiction because of $\mathrm{intn}_{\sigma}(\Gamma)=2$. So, $\dim {\langle}R,R^\sigma,\ldots,R^{\sigma^{n-1}}{\rangle}=n-1$, and by [@BoPol Proposition 3.1] there exists a linear collineation $\mathbf{k}$ fixing $\Sigma$ such that $R^{\mathbf{k}}={\langle}(1,0,\ldots,0){\rangle}_{{{\mathbb F}}_{q^n}}$. Clearly, $\Gamma^{\mathbf{k}}$ satisfies the same hypothesis as $\Gamma$, since $\mathbf{k}$ and $\sigma$ commute. For these reasons, we may assume that $R={\langle}(1,0,\ldots,0){\rangle}_{{{\mathbb F}}_{q^n}}$. In particular, it follows that the coordinates of $R^{\sigma^i}$ are $\mathbf{e}_{is \pmod{n}}$, where $\mathbf{e}_j$ is the vector whose $j$-th component is one and all the others are zero. And by hypothesis we may assume that $Q={\langle}\mathbf e_s-\delta\mathbf e_{s(n-1)}{\rangle}_{{{\mathbb F}}_{q^n}}$. Hence we can choose as $\Lambda={\langle}R,R^{\sigma^{n-1}} {\rangle}$, so $\Gamma$ has equations $x_0=0$, $x_{s(n-1)}=-\delta x_s$, and $\Lambda$ is defined by $x_i=0$ for $i \in \{s,\ldots,s(n-2)\}$.
Therefore, $$L={{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)\simeq \{ {\langle}(x,\delta x^{q^s}+x^{q^{s(n-1)}}) {\rangle}_{{{\mathbb F}}_{q^n}} \colon x \in {{\mathbb F}}_{q^n} \},$$ i.e. $L$ is of LP-type.
Each linear set of LP-type $L_{s,\delta}^n$ of ${\mathrm{PG}}(1,q^n)$, with $n\geq 4$ and $(s,n)=1$, can be realized as the projection of $\Sigma$ choosing $\Gamma$ and $\Lambda$ as follows $$\Gamma \colon \left\{ \begin{array}{llr} x_0=0 \\ x_{s(n-1)}=-\delta x_s \end{array} \right. \,\,\, \text{and} \,\,\, \Lambda\colon x_i=0, \quad i \in \{s,\ldots,s(n-2)\}.$$ Therefore, as a direct consequence of Theorem \[charact1\] we provide a characterization result of linear sets of LP-type.
\[charact1.1\] Let $\Sigma$ be a canonical subgeometry of ${\mathrm{PG}}(n-1,q^n)$, $q>2$ and $n\geq 4$. Let $L$ be a scattered linear set in $\Lambda={\mathrm{PG}}(1,q^n)$. Then $L$ is a linear set of LP-type if and only if
(i) there exists an $(n-3)$-subspace $\Gamma$ of ${\mathrm{PG}}(n-1,q^n)$ such that $\Gamma \cap \Sigma=\Gamma\cap\Lambda=\emptyset$ and $L={{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)$;
(ii) there exists a generator $\sigma$ of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise, such that $\mathrm{intn}_{\sigma}(\Gamma)=2$;
(iii) there exist a unique point $P\in{\mathrm{PG}}(n-1,q^n)$ and some point $Q$ such that $$\Gamma=\langle P,P^{\sigma},\ldots,P^{\sigma^{n-4}},Q \rangle;$$
(iv) the line $\langle P^{\sigma^{n-1}}, P^{\sigma^{n-3}}\rangle$ meets $\Gamma$.
Necessary conditions
--------------------
Very recently, Csajbók, Marino and Polverino in [@CMP] have investigated the equivalence problem between ${{\mathbb F}}_q$-linear sets of rank $n$ on the projective line ${\mathrm{PG}}(1,q^n)$. The idea is first to study the $\Gamma\mathrm{L}(2,q^n)$-orbits of the subspace $U$ defining the linear set $L_U$ and then to study the equivalence between two linear sets. More precisely, they give the following definition of $\Gamma\mathrm{L}$-class (see [@CMP Definitions 2.5]) of an ${{\mathbb F}}_q$-linear set of a line.
Let $L_U$ be an $\mathbb{F}_q-$linear set of ${\mathrm{PG}}(V,\mathbb{F}_{q^n})={\mathrm{PG}}(1,q^n)$ of rank $n$ with maximum field of linearity $\mathbb{F}_q$ ([^5]).
We say that $L_U$ is of $\Gamma\mathrm{L}$-*class* $s$ if $s$ is the greatest integer such that there exist $\mathbb{F}_q$-subspaces $U_1,\ldots,U_s$ of $V$ with $L_{U_i}=L_U$ for $i \in \{1,\ldots,s\}$ and there is no $f \in \Gamma \mathrm{L}(2,q^n)$ such that $U_i=U_j^f$ for each $i\neq j$, $i,j \in \{1,2,\ldots,s\}$.
If $L_U$ is of $\Gamma \mathrm{L}$-class one, then $L_U$ is said to be *simple*, i.e. when the $\Gamma\mathrm{L}(2,q^n)$-orbit of $U$ completely determine the $\mathrm{P}\Gamma\mathrm{L}(2,q^n)$-orbit of $L_U$. For $n\le4$, any linear set in ${\mathrm{PG}}(1,q^n)$ is simple [@CMP Theorem 4.5].
The $\Gamma\mathrm{L}$-class of a linear set is a projective invariant (by [@CMP Proposition 2.6]) and play a crucial role in the study of linear sets up to equivalences. Using these notions and by developing some new techniques, the authors in [@CsMP2018] prove that in ${\mathrm{PG}}(1,q^5)$ each ${{\mathbb F}}_q$-linear set $L_f$ of rank $5$ and with maximum field of linearity ${{\mathbb F}}_q$ is of $\Gamma\mathrm{L}$-class at most $2$, proving also that if $L_U$ is equivalent to $L_f$ then $U$ is $\Gamma\mathrm{L}$-equivalent to either $U_f$ or to $U_f^\perp=U_{\hat{f}}$, where the non-degenerate symmetric bilinear form of ${{\mathbb F}}_{q^n}$ over ${{\mathbb F}}_q$ defined by $${\langle}x,y{\rangle}= {\hbox{{\rm Tr}}}_{q^n/q}(xy),$$ for each $x,y \in {{\mathbb F}}_{q^n}$ is taken into account. Then the *adjoint* $\hat{f}$ of the linearized polynomial $\displaystyle f(x)=\sum_{i=0}^{n-1} a_ix^{q^i} \in \tilde{\mathcal{L}}_{n,q}$ with respect to the bilinear form ${\langle},{\rangle}$ is $$\hat{f}(x)=\sum_{i=0}^{n-1} a_i^{q^{n-i}}x^{q^{n-i}},$$ i.e. $${\hbox{{\rm Tr}}}_{q^n/q}(xf(y))={\hbox{{\rm Tr}}}_{q^n/q}(y\hat{f}(x)),$$ for each $x,y \in {{\mathbb F}}_{q^n}$.
For linear sets of LP-type the following is known.
\[classLP\][@CsMP2018; @CsMZ2018] A maximum scattered linear set of LP-type $$L_{s,\delta}^n=L_f=\{{\langle}(x,\delta x^{q^s} + x^{q^{n-s}}){\rangle}_{{{\mathbb F}}_{q^n}}\colon x\in {{\mathbb F}}_{q^n}\}\subseteq{\mathrm{PG}}(1,q^n),$$ with $(s,n)=1$ and $f(x)=\delta x^{q^s} + x^{q^{n-s}}$, is of $\Gamma\mathrm{L}$-class less than or equal to $2$ for $n \in \{5,6,8\}$. Furthermore, $L_U$ is equivalent to $L$ if and only if $U$ is $\Gamma\mathrm{L}(2,q^n)$-equivalent to either $U_{f}$ or to $U_f^\perp=U_{\hat{f}}$.
Furthermore, in [@CMP; @PhDthesis], it has been shown that there are maximum scattered linear sets of LP-type of both $\Gamma\mathrm{L}$-classes one and two.
For our purpose it is important to look to the $\Gamma\mathrm{L}$-class in a more geometric way. The following result has been stated in [@CMP Section 5.2] as a consequence of [@CSZ2015 Theorems 6 & 7].
\[GLclassGeom\] The $\Gamma\mathrm{L}$-class of $L_U$ is the number of orbits in $\mathrm{Stab}(\Sigma)$ of $(n-3)$-subspaces of ${\mathrm{PG}}(n-1,q^n)$ containing a $\Gamma$ disjoint from $\Sigma$ and from $\Lambda$ such that ${{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)$ is equivalent to $L_U$.
As a consequence of Theorems \[classLP\] and \[GLclassGeom\], we have the following characterization for linear sets of LP-type.
\[charact3\] Let $L$ be a maximum scattered linear set in $\Lambda={\mathrm{PG}}(1,q^n)$ with $n\le6$ or $n=8$. Then $L$ is a linear set of LP-type if and only if for each $(n-3)$-subspace $\Gamma$ of ${\mathrm{PG}}(n-1,q^n)$ such that $L={{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)$, the following holds:
(i) there exists a generator $\sigma$ of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise, such that $\mathrm{intn}_{\sigma}(\Gamma)=2$;
(ii) if $P$ is the unique point of ${\mathrm{PG}}(n-1,q^n)$ such that $$\Gamma=\langle P,P^{\sigma},\ldots,P^{\sigma^{n-4}},Q \rangle,$$ then the line $\langle P^{\sigma^{n-1}}, P^{\sigma^{n-3}}\rangle$ meets $\Gamma$.
Because of Theorem \[classLP\] and [@CMP Theorem 4.5], if $n\le6$ or $n=8$, then the two (possibly) not $\Gamma\mathrm{L}(2,q^n)$-equivalent representation for a linear set of LP-type are $$U_{\delta x^{q^s} + x^{q^{n-s}}} \,\,\,\text{and}\,\,\,U_{\delta^{q^{n-s}} x^{q^{n-s}} + x^{q^{s}}}.$$ Therefore, by Theorem \[GLclassGeom\] we have that all the possible vertices of the projections to obtain a linear set of LP-type satisfy the hypothesis of Theorem \[charact1.1\] and the assertion then follows.
Note that Theorem \[charact3\] guarantees that each vertex of the projection of a linear set of LP-type satisfies conditions $(i)$ and $(ii)$, whereas Theorem \[charact1.1\] asserts the existence of a vertex of the projection of a linear set of LP-type satisfying these conditions.
As we will see in Section \[newconstruction\], this result may turn out to be useful to construct new examples of maximum scattered linear sets in ${\mathrm{PG}}(1,q^n)$.
A purely geometric description for odd $n$ {#Geo}
==========================================
The next lemma proves that, for $n$ odd, the only scattered linear sets of LP-type are exactly those described by Lunardon and Polverino in [@LP2001] and Sheekey [@Sh].
\[norm\] Let $L:=\{{\langle}(x,\delta x^{q^s} + x^{q^{n-s}}){\rangle}_{{{\mathbb F}}_{q^n}}\colon x\in {{\mathbb F}}_{q^n}\}\subseteq {\mathrm{PG}}(1,q^n)$, with $(s,n)=1$, and let $n>3$ be odd. Then $L$ is scattered if and only if ${{\mathrm N}}(\delta)\neq 1$.
We only have to prove that if ${{\mathrm N}}(\delta)= 1$, then $L$ cannot be scattered. The linear set $L$ is scattered if and only if in the following set of polynomials $$A=\{\alpha x+\delta x^{q^s} + x^{q^{n-s}} \colon \alpha\in {{\mathbb F}}_{q^n}\}$$ there are no polynomials with more than $q$ roots, for otherwise there would be a point $\langle(1,-\alpha)\rangle_{{{\mathbb F}}_{q^n}}$ of weight greater than one. Equivalently in the following set of polynomials $$A'=\{f_{\alpha}(x)=\delta^{-1}x+\alpha x^{q^{s}}+ x^{q^{2s}} \colon \alpha\in {{\mathbb F}}_{q^n}\}$$ there are no polynomials with more than $q$ roots. For any $\xi \in {{\mathbb F}}_{q^n}^*$ with ${{\mathrm N}}(\xi)=1$, the polynomial $$\label{polform}
\frac{f_{\alpha}(x) \circ \xi x}{\xi^{q^{2s}}}=\delta^{-1} \xi^{1-q^{2s}}x+\alpha \xi^{q^s-q^{2s}}x^{q^s}+x^{q^{2s}}$$ has the same number of roots of $f_{\alpha}(x)$. Note that since $n$ is odd, for any $m\in{\mathbb F_{q^n}}$ such that $\operatorname{N}(m)=1$ there is $\xi\in{\mathbb F_{q^n}}$ such that $m=\xi^{1-q^{2s}}$. Taking into account $\operatorname{N}(\delta)=1$, this implies that for any polynomial of the form $P(x)=\gamma x+\beta x^{q^s}+x^{q^{2s}}$, with $\gamma,\beta\in{\mathbb F_{q^n}}$ and ${{\mathrm N}}(\gamma)=1$, there are $\alpha$ and $\xi\in{\mathbb F_{q^n}}$ such that coincides with $P(x)$. This is a contradiction, since there exist polynomials of type $\gamma x+\beta x^{q^s}+x^{q^{2s}}$, $\operatorname{N}(\gamma)=1$, with $q^2$ roots, e.g. $$\frac{1}{u^{q^s}v^{q^{2s}}-u^{q^{2s}}v^{q^s}}\det \left( \begin{array}{cccccc} x & x^{q^s} & x^{q^{2s}} \\ u & u^{q^s} & u^{q^{2s}} \\ v & v^{q^s} & v^{q^{2s}} \end{array}\right)$$ where $u,v \in {{\mathbb F}}_{q^n}$ are ${{\mathbb F}}_q$-linearly independent.
The previous lemma was already proved for $n=4$ in [@CsZ2018] and for $s=1$ in [@BartoliZhou].
\[charact2\] Let $\Gamma$ be a subspace of ${\mathrm{PG}}(n-1,q^n)$, $n$ odd, of dimension $n-3\geq 2$, and $\Sigma\cong{\mathrm{PG}}(n-1,q)$ a canonical subgeometry of ${\mathrm{PG}}(n-1,q^n)$, such that $\Gamma \cap \Sigma=\emptyset$. Assume that a generator $\sigma$ exists of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise, such that $\mathrm{intn}_{\sigma}(\Gamma)=2$. Then there exists a point $R\in{\mathrm{PG}}(n-1,q^n)$ such that $$R^{\sigma^2},R^{\sigma^3},\ldots,R^{\sigma^{n-2}}\in\Gamma.$$ Furthermore assume that ${\langle}R^\sigma,R^{\sigma^{n-1}}{\rangle}$ and $\Gamma$ meet in a point $Q$ and $R^\sigma\neq Q\neq R^{\sigma^{n-1}}$. Let $Q'$ be the point such that the pair $\{R^\sigma,R^{\sigma^{n-1}}\}$ separates $\{Q,Q'\}$ harmonically. Such $Q'$ is defined by the property that there are two representative vectors $v_0$ and $v_1$ for $R^\sigma$ and $R^{\sigma^{n-1}}$, respectively, such that ${\langle}v_0+v_1{\rangle}_{{\mathbb F_{q^n}}}=Q$, ${\langle}v_0-v_1{\rangle}_{{\mathbb F_{q^n}}}=Q'$. Under the assumptions above, the linear set $L={{\mathrm p}}_{\Gamma,\Lambda}(\Sigma)$, with $\Lambda$ a line disjoint from $\Gamma$, is a maximum scattered linear set of LP-type if and only if $$\label{strana}
\Sigma\cap{\langle}R,R^{\sigma^2},R^{\sigma^3},\ldots,R^{\sigma^{n-2}},Q'{\rangle}=\emptyset.$$
As in Theorem \[charact1\] it may be assumed that the coordinates of $Q$ are $x_s=1$, $x_{s(n-1)}=-\delta\in{{\mathbb F}}_{q^n}^*$, $x_i=0$ otherwise. The coordinates of $Q'$ are $x_s=1$, $x_{s(n-1)}=\delta\in{{\mathbb F}}_{q^n}^*$, $x_i=0$ otherwise. The span $W={\langle}R,R^{\sigma^2},R^{\sigma^3},\ldots,R^{\sigma^{n-2}},Q'{\rangle}$ and $R^\sigma$ are complementary subspaces of ${\mathrm{PG}}(n-1,q^n)$. So, $W$ is a hyperplane and its equation is $-\delta x_s+x_{s(n-1)}=0$. A point ${\langle}(u,u^q,\ldots,u^{q(n-1)}){\rangle}_{{{\mathbb F}}_{q^n}}$ of $\Sigma$ belongs to $W$ if and only if $-\delta u^{q^s}+u^{q^{s(n-1)}}=0$, equivalent to $$\label{menodelta}
\delta=u^{q^s(q^{s(n-2)}-1)}.$$ Since $n$ is odd, $s(n-2)$ is coprime with $n$. This implies that an $u\in{{\mathbb F}}_{q^n}^*$ exists satisfying (\[menodelta\]) if and only if ${{\mathrm N}}(\delta)=1$, which is a contradiction because of Lemma \[norm\].
New constructions {#newconstruction}
=================
In this section we will deal with the following family of linear sets $$\mathcal{L}:=\{ \langle (x,x^q-x^{q^2}+x^{q^4}+x^{q^5})\rangle_{{{\mathbb F}}_{q^6}} \colon x \in {{\mathbb F}}_{q^6}^* \} \subseteq {\mathrm{PG}}(1,q^6),\quad q \equiv 1 \pmod{4}.$$ We will show that for some choices of $q$ we may get new examples of maximum scattered linear sets. This family of linear sets can be obtained by projecting the canonical subgeometry $\Sigma=\{ \langle(x,x^q,x^{q^2},x^{q^3},x^{q^4},x^{q^5})\rangle_{{{\mathbb F}}_{q^6}} \colon x \in {{\mathbb F}}_{q^6}^* \}$ from $$\Gamma \colon \left\{ \begin{array}{ll} x_0=0 \\ x_5=-x_4-x_1+x_2 \end{array} \right.$$ to $$\Lambda \colon \left\{ \begin{array}{llll} x_1=0\\ x_2=0\\ x_3=0\\ x_4=0. \end{array} \right.$$ Let us consider $\sigma\in \mathrm{P}\Gamma\mathrm{L}(6,q^6)$ defined as $$\left({\langle}(x_0,x_1,x_2,x_2,x_4,x_5){\rangle}_{{{\mathbb F}}_{q^6}}\right)^\sigma=
{\langle}(x_5^q,x_0^q,x_1^q,x_2^q,x_3^q,x_4^q){\rangle}_{{{\mathbb F}}_{q^6}}$$ and $\overline{\sigma}:=\sigma^5$, which are the two generators of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(6,q^6)$ fixing $\Sigma$ pointwise. Then $$\Gamma^{\sigma} \colon \left\{ \begin{array}{ll} x_1=0 \\ x_0=-x_5-x_2+x_3 \end{array} \right. \,\,\, \text{and} \,\,\, \Gamma^{\sigma^2} \colon \left\{ \begin{array}{ll} x_2=0 \\ x_1=-x_0-x_3+x_4. \end{array} \right.$$ Therefore, $$\Gamma\cap\Gamma^\sigma \colon \left\{ \begin{array}{llll} x_0=0\\ x_1=0 \\ x_4=2x_2-x_3 \\ x_5=-x_2+x_3 \end{array} \right. \,\,\, \text{and} \quad \Gamma\cap\Gamma^\sigma\cap\Gamma^{\sigma^2} =\emptyset.$$ Hence, $\dim_{{{\mathbb F}}_{q^6}} (\Gamma \cap \Gamma^\sigma)=1$ and since $q$ is odd $\dim_{{{\mathbb F}}_{q^6}} (\Gamma \cap \Gamma^\sigma\cap \Gamma^{\sigma^2})= -1$. Since $\Gamma \cap \Gamma^{\overline{\sigma}}=(\Gamma\cap\Gamma^\sigma)^{\sigma^5}$ and $\Gamma \cap \Gamma^{\overline{\sigma}}\cap \Gamma^{\overline{\sigma}^2} =(\Gamma\cap\Gamma^\sigma\cap\Gamma^{\sigma^2})^{\sigma^4}$, we have that $\dim_{{{\mathbb F}}_{q^6}} (\Gamma \cap \Gamma^{\overline{\sigma}})=1$ and $\dim_{{{\mathbb F}}_{q^6}} (\Gamma \cap \Gamma^{\overline{\sigma}}\cap \Gamma^{\overline{\sigma}^2})= -1$. Therefore, $$\mathrm{intn}_{\sigma}(\Gamma)= \mathrm{intn}_{\overline{\sigma}}(\Gamma)= 3.$$ This implies the non-equivalence of $\mathcal L$ with the linear set of pseudoregulus type and also it cannot be of LP-type because of Theorem \[charact3\].
Computational results show that for $q \equiv 1 \pmod{4}$ the linear set $\mathcal{L}$ is maximum scattered for $q\leq 29$. We show that for $q\leq 17$ and $q \not\equiv 0 \pmod{5}$ it is also new. For $q\equiv 0 \pmod{5}$ we will prove in Proposition \[trin0\] that $\mathcal{L}$ is equivalent to the linear set defined in [@CsMZ2018].
Known examples of maximum scattered linear sets in ${\mathrm{PG}}(1,q^6)$ {#EquivIssue}
-------------------------------------------------------------------------
In order to decide whether the linear set $\mathcal{L}$ is new, we describe the known maximum scattered linear sets in ${\mathrm{PG}}(1,q^6)$.
We start by listing the non-equivalent (under the action of $\Gamma\mathrm{L}(2,q^6)$) maximum scattered subspaces of ${{\mathbb F}}_{q^6}^2$, i.e. subspaces defining maximum scattered linear sets.
\[exKnownscattered\]
1. $U^{1}:= \{(x,x^{q}) \colon x\in {{\mathbb F}}_{q^6}\}$, see [@BL2000; @CsZ20162];
2. $U^{2}_{\delta}:= \{(x,\delta x^{q} + x^{q^{5}})\colon x\in {{\mathbb F}}_{q^6}\}$, ${{\mathrm N}}_{q^6/q}(\delta)\notin \{0,1\}$ [^6], see [@LP2001; @LTZ; @Sh];
3. $U^{3}_{\delta}:= \{(x,\delta x^{q}+x^{q^{4}})\colon x\in {{\mathbb F}}_{q^{6}}\}$, ${{\mathrm N}}_{q^6/q^{3}}(\delta) \notin \{0,1\}$, satisfying further conditions on $\delta$ and $q$, see [@CMPZ Theorems 7.1 and 7.2] [^7];
4. $U^{4}_{\delta}:=\{(x, x^q+x^{q^3}+\delta x^{q^5}) \colon x \in {{\mathbb F}}_{q^6}\}$, $q$ odd and $\delta^2+\delta=1$, see [@CsMZ2018; @MMZ].
In order to simplify the notation, we will denote by $L^1$ and $L^{i}_{\delta}$ the ${{\mathbb F}}_q$-linear set defined by $U^{1}$ and $U^{i}_{\delta}$, respectively. Therefore, $L_\delta^2=L_{s,\delta}^6$ as defined in . We will also use the following notation: $\mathcal{U}:=U_{x^q-x^{q^2}+x^{q^4}+x^{q^5}}$.
In [@CsMZ2018 Propositions 3.1, 4.1 & 5.5] the following result has been proved.
\[equiv\] Let $L_f$ be one of the maximum scattered of ${\mathrm{PG}}(1,q^6)$ listed before. Then a linear set $L_U$ of ${\mathrm{PG}}(1,q^6)$ is $\mathrm{P}\Gamma\mathrm{L}$-equivalent to $L_f$ if and only if $U$ is $\Gamma\mathrm{L}$-equivalent either to $U_f$ or to $U_{\hat{f}}$. Furthermore, the linear set $L^3_{\delta}$ is simple.
The previous lemma includes results on linear sets of LP-type.
\[closedadjoint\] If $U_f$ is an ${\mathbb F_q}$-subspace of type 1. or 2. above, then $U_{\hat f}$ and $U_f$ are $\Gamma\mathrm{L}$-equivalent. By Lemma \[equiv\], this holds also for ${\mathbb F_q}$-subspaces of type 3.
The linear set $\mathcal{L}$
----------------------------
Here we deal with the equivalence issue between the linear sets defined by Example \[exKnownscattered\] and the linear set $\mathcal{L}$. As already noted, we just have to check the equivalence with the linear sets $L^3_{\delta}$ and with $L^4_{\delta}$ defined by the subspaces 3. and 4. in Example \[exKnownscattered\], because of the construction of $\mathcal{L}$ and Theorems \[chPseudo\] and \[charact3\].
The linear set $\mathcal{L}$ is not $\mathrm{P}\Gamma\mathrm{L}$-equivalent to $L^3_{\delta}$.
By Lemma \[equiv\], we have to check whether $\mathcal{U}$ and $U^3_{\delta}$ are $\Gamma\mathrm{L}$-equivalent, with ${{\mathrm N}}_{q^6/q^{3}}(\delta) \notin \{0,1\}$. Suppose that there exist $\sigma \in \mathrm{Aut}({{\mathbb F}}_{q^6})$ and an invertible matrix $\left( \begin{array}{llrr} a & b \\ c & d \end{array} \right)$ such that for each $x \in {{\mathbb F}}_{q^6}$ there exists $z \in {{\mathbb F}}_{q^6}$ satisfying $$\left(
\begin{array}{llrr}
a & b\\
c & d
\end{array} \right)
\left(
\begin{array}{ccc}
\hspace{1cm}x^\sigma\\
x^{\sigma q}-x^{\sigma q^2}+x^{\sigma q^4}+x^{\sigma q^5}
\end{array} \right)
=\begin{pmatrix} z\\
{\delta z^q+ z^{q^4}} \end{pmatrix}.$$ Equivalently, for each $x \in {{\mathbb F}}_{q^6}$ we have $$cx^\sigma+d(x^{\sigma q}-x^{\sigma q^2}+x^{\sigma q^4}+x^{\sigma q^5})=\delta [a^qx^{\sigma q}+$$ $$+b^q(x^{\sigma q^2}-x^{\sigma q^3}+x^{\sigma q^5}+x^\sigma)]+a^{q^4}x^{\sigma q^4}+b^{q^4}(x^{\sigma q^5}-x^\sigma+x^{\sigma q^2}+x^{\sigma q^3}).$$ This is a polynomial identity in $x^{\sigma}$ and hence we have the following relations: $$\label{binZ}
\left\{
\begin{array}{llllll}
c=\delta b^q- b^{q^4}\\
d=\delta a^q\\
-d=\delta b^q+b^{q^4}\\
0=-\delta b^q+ b^{q^4}\\
d= a^{q^4}\\
d=\delta b^q+ b^{q^4}.
\end{array}\right.$$
From the second and the fifth equations, if $a \neq 0$ then $\delta=(a^q)^{q^3-1}$ and so ${{\mathrm N}}_{q^6/q^3}(\delta)=1$, which is not possible. So $a=0$ and then $d=0$. Hence we have $\delta b^q+b^{q^4}=0$ and $-\delta b^q+b^{q^4}=0$, from which we get $b=0$, which is not possible. Therefore, $\mathcal{L}$ is not equivalent to $L^3_{\delta}$.
\[trin0\] The linear set $\mathcal{L}$ is $\mathrm{P}\Gamma\mathrm{L}$-equivalent to $L^4_{\delta}$, for $q$ odd and $\delta^2+\delta=1$, if and only if there exist $a,b,c,d \in {{\mathbb F}}_{q^6}$ such that $ad-bc \neq 0$ and either $$\label{trin}
\left\{
\begin{array}{llllll}
c=b^q+\delta b^{q^5}\\
d=a^q+b^{q^3}-\delta b^{q^5}\\
-d=b^q+b^{q^3}\\
0=-b^q+a^{q^3}+\delta b^{q^5}\\
d=b^{q^3}+\delta b^{q^5}\\
d=b^q-b^{q^3}+\delta a^{q^5},
\end{array}\right.$$ or $$\label{trin2}
\left\{
\begin{array}{llllll}
c=\delta b^q+ b^{q^5}\\
d=\delta a^q+b^{q^3}- b^{q^5}\\
-d=\delta b^q+b^{q^3}\\
0=-\delta b^q+a^{q^3}+ b^{q^5}\\
d=b^{q^3}+ b^{q^5}\\
d=\delta b^q-b^{q^3}+ a^{q^5}.
\end{array}\right.$$ In particular, when $q \equiv 0 \pmod{5}$ the linear set $\mathcal{L}$ is $\mathrm{P}\Gamma\mathrm{L}$-equivalent to $L^4_{2}$.
By Lemma \[equiv\] we have to check whether $\mathcal{U}$ is equivalent either to $U^4_{\delta}$ or to $(U^4_{\delta})^\perp$. Suppose that there exist $\sigma \in \mathrm{Aut}({{\mathbb F}}_{q^6})$ and an invertible matrix $\left( \begin{array}{llrr} a & b \\ c & d \end{array} \right)$ such that for each $x \in {{\mathbb F}}_{q^6}$ there exists $z \in {{\mathbb F}}_{q^6}$ satisfying $$\left(
\begin{array}{llrr}
a & b\\
c & d
\end{array} \right)
\left(
\begin{array}{ccr}
\hspace{1cm}x^\sigma\\
x^{\sigma q}-x^{\sigma q^2}+x^{\sigma q^4}+x^{\sigma q^5}
\end{array} \right)
=\left(
\begin{array}{ccr}
\hspace{1cm}z\\
z^q+z^{q^3}+\delta z^{q^5} \end{array}
\right).$$ Equivalently, for each $x \in {{\mathbb F}}_{q^6}$ we have $$cx^\sigma+d(x^{\sigma q}-x^{\sigma q^2}+x^{\sigma q^4}+x^{\sigma q^5})=a^q x^{\sigma q}+b^q(x^{\sigma q^2}-x^{\sigma q^3}+x^{\sigma q^5}+x^{\sigma})+$$ $$+a^{q^3} x^{\sigma q^3}+b^{q^3}(x^{\sigma q^4}-x^{\sigma q^5}+x^{\sigma q}+x^{\sigma q^2})+$$ $$+\delta[a^{q^5}x^{\sigma q^5}+b^{q^5}(x^{\sigma}-x^{\sigma q}+x^{\sigma q^3}+x^{\sigma q^4})].$$ This is a polynomial identity in $x^{\sigma}$ and hence we have the Equations .
Now, suppose that there exist $\sigma \in \mathrm{Aut}({{\mathbb F}}_{q^6})$ and an invertible matrix $\left( \begin{array}{llrr} a & b \\ c & d \end{array} \right)$ such that for each $x \in {{\mathbb F}}_{q^6}$ there exists $z \in {{\mathbb F}}_{q^6}$ satisfying $$\left(
\begin{array}{llrr}
a & b\\
c & d
\end{array} \right)
\left(
\begin{array}{ccr}
\hspace{1cm}x^\sigma\\
x^{\sigma q}-x^{\sigma q^2}+x^{\sigma q^4}+x^{\sigma q^5}
\end{array} \right)
=\left(
\begin{array}{ccr}
\hspace{1cm}z\\
\delta z^q+z^{q^3}+ z^{q^5} \end{array}
\right).$$ As before, we get the Relations .
The second part follows from the fact that for $q \equiv 0 \pmod{5}$, $\delta=2$, $a=-1, b=1, c=3$ and $d=3$ satisfy (\[trin\]).
Thanks to GAP computations we are able to prove that the Systems and have no solutions in $a,b,c$ and $d$ ($ac-bd\neq0$) for $q \leq 17$ and $q \not\equiv 0 \pmod{5}$. Therefore, we have the following result.
\[new\] If $q\le17$, $q\equiv 1 \pmod4$, $q\neq5$, then $\mathcal{L}$ is a maximum scattered linear set of ${\mathrm{PG}}(1,q^6)$ not equivalent to any of those listed in Example \[exKnownscattered\].
Recall that $\mathcal{L}$ is computationally proved to be scattered for $q\le29$, $q\equiv1\pmod4$.
We conclude this section proposing the following conjecture.
The linear set $\mathcal{L}$ is a new maximum scattered linear set of ${\mathrm{PG}}(1,q^6)$ for each $q$ such that $q \equiv 1 \pmod{4}$ and $q\not\equiv 0 \pmod{5}$.
MRD-codes and scattered ${{\mathbb F}}_q$-subspaces
===================================================
The most natural way to look to the connection between maximum scattered linear sets and MRD-codes is through the ${{\mathbb F}}_q$-subspaces defining such linear sets, i.e. maximum scattered ${{\mathbb F}}_q$-subspaces. We briefly recall some basic definitions and results on rank metric codes, that have been intensively investigated for their applications in cryptography, space-time coding and distributed storage and for their links with remarkable geometric and algebraic objects (see e.g. [@BartoliZhou; @GPT; @delaCruz; @Lusina; @NRS; @Silb]).
In 1978, Delsarte [@Delsarte] introduced rank metric codes as follows. The set of $m \times n$ matrices ${{\mathbb F}}_q^{m\times n}$ over ${{\mathbb F}}_q$ is a rank metric ${{\mathbb F}}_q$-space with rank metric distance defined by $$d(A,B) = \mathrm{rk}\,(A-B)$$ for $A,B \in {{\mathbb F}}_q^{m\times n}$. A subset $\operatorname{\mathcal{C}}\subseteq {{\mathbb F}}_q^{m\times n}$ is called a *rank metric code* (or *RM*-code for short). The *minimum distance* of $\operatorname{\mathcal{C}}$ is $$d = \min\{ d(A,B) \colon A,B \in \operatorname{\mathcal{C}},\,\, A\neq B \}.$$ We are interested in ${{\mathbb F}}_q$-*linear* RM-codes, i.e. for which $\operatorname{\mathcal{C}}$ is an ${{\mathbb F}}_q$-linear subspace of ${{\mathbb F}}_q^{m\times n}$. We will say that such a code has parameters $(m,n,q;d)$. In [@Delsarte], Delsarte also showed that the parameters of these codes must fulfill a Singleton-like bound, i.e. $$|\operatorname{\mathcal{C}}| \leq q^{\max\{m,n\}(\min\{m,n\}-d+1)}.$$ When the equality holds, we call $\operatorname{\mathcal{C}}$ *maximum rank distance* (*MRD* for short) code.
From now on, we will only consider ${{\mathbb F}}_q$-linear RM-codes of ${{\mathbb F}}_q^{n\times n}$, i.e. those which can be identified with ${{\mathbb F}}_q$-subspaces of $\mathrm{End}_{{{\mathbb F}}_q}({{\mathbb F}}_{q^n})$. Since $\mathrm{End}_{{{\mathbb F}}_q}({{\mathbb F}}_{q^n})$ is isomorphic to the ring of $q$-polynomials over ${{\mathbb F}}_{q^n}$ modulo $x^{q^n}-x$, denoted by ${{\mathcal L}}_{n,q}$, with addition and composition as operations, we will consider ${{\mathcal C}}$ as an ${{\mathbb F}}_q$-subspace of ${{\mathcal L}}_{n,q}$. Given two ${{\mathbb F}}_q$-linear RM-codes, ${{\mathcal C}}_1$ and ${{\mathcal C}}_2$, they are *equivalent* if and only if there exist $\varphi_1$, $\varphi_2\in {{\mathcal L}}_{n,q}$ permuting ${{\mathbb F}}_{q^n}$ and $\rho\in \mathrm{Aut}({{\mathbb F}}_q)$ such that $$\varphi_1\circ f^\rho \circ \varphi_2 \in {{\mathcal C}}_2 \text{ for all }f\in {{\mathcal C}}_1,$$ where $\circ$ stands for the composition of maps and $f^\rho(x)= \sum f_i^\rho x^{q^i}$ for $f(x)=\sum f_i x^{q^i}$. For a rank metric code ${{\mathcal C}}$ given by a set of linearized polynomials, its *left* and *right idealisers* can be defined as: $$L({{\mathcal C}})= \{ \varphi \in {{\mathcal L}}_{n,q}\colon \varphi \circ f \in {{\mathcal C}}\text{ for all }f\in {{\mathcal C}}\},$$ $$R({{\mathcal C}})= \{ \varphi \in {{\mathcal L}}_{n,q}\colon f \circ \varphi \in {{\mathcal C}}\text{ for all }f\in {{\mathcal C}}\}.$$ If $L(\operatorname{\mathcal{C}})$ has maximum cardinality $q^n$, then we may always assume (up to equivalence) that $$L(\operatorname{\mathcal{C}})=\mathcal{F}_n=\{\tau_{\alpha}=\alpha x \colon \alpha \in {{\mathbb F}}_{q^n}\}\simeq {{\mathbb F}}_{q^n};$$ the same holds for the right idealiser, see [@CMPZ Theorem 6.1] and [@CsMPZh Theorem 2.2]. Hence, when the left idealiser is $\mathcal{F}_n$, $\operatorname{\mathcal{C}}$ results to be closed with respect to the left composition with the ${{\mathbb F}}_{q^n}$-linear maps; while if the right idealiser is $\mathcal{F}_n$, then $\operatorname{\mathcal{C}}$ is closed with respect to the right composition with the ${{\mathbb F}}_{q^n}$-linear maps. For this reason, when $L(\operatorname{\mathcal{C}})$ (resp. $R(\operatorname{\mathcal{C}})$) is equal to $\mathcal{F}_n$ we say that $\operatorname{\mathcal{C}}$ is ${{\mathbb F}}_{q^n}$-*linear on the left* (resp. *right*) (or simply ${{\mathbb F}}_{q^n}$-*linear* if it is clear from the context).
The notion of Delsarte dual code can be written in terms of $q$-polynomials as follows, see for example [@LTZ Section 2]. Let $b:{{\mathcal L}}_{n,q}\times{{\mathcal L}}_{n,q}\to{{\mathbb F}}_q$ be the bilinear form given by $$b(f,g)=\mathrm{Tr}_{q^n/q}\left( \sum_{i=0}^{n-1} f_ig_i \right)$$ where $\displaystyle f(x)=\sum_{i=0}^{n-1} f_i x^{q^i}$ and $\displaystyle g(x)=\sum_{i=0}^{n-1} g_i x^{q^i}$, and $\mathrm{Tr}_{q^n/q}$ is the trace function ${{\mathbb F}}_{q^n}\to{{\mathbb F}}_q$. The *Delsarte dual code* $\operatorname{\mathcal{C}}^\perp$ of a set of $q$-polynomials $\operatorname{\mathcal{C}}$ is $$\operatorname{\mathcal{C}}^\perp = \{f \in {{\mathcal L}}_{n,q} \colon b(f,g)=0, \hspace{0.1cm}\forall g \in \operatorname{\mathcal{C}}\}.$$
Only few families of MRD-codes are known, due to the results in [@BartoliZhou; @ByrneRavagnani; @H-TNRR]. In [@Delsarte], Delsarte gives the first construction for linear MRD-codes (he calls such sets *Singleton systems*) from the perspective of bilinear forms. Few years later, Gabidulin in [@Gabidulin Section 4] presents the same class of MRD-codes by using linearized polynomials. Although these codes have been originally discovered by Delsarte, they are called *Gabidulin codes*. Kshevetskiy and Gabidulin in [@kshevetskiy_new_2005] generalize the previous construction obtaining the so-called *generalized Gabidulin codes* $$\mathcal{G}_{k,s}=\langle x,x^{q^s},\ldots,x^{q^{s(k-1)}} \rangle_{{{\mathbb F}}_{q^n}},$$ with $\gcd(s,n)=1$ and $k\leq n-1$. The RM-code $\mathcal{G}_{k,s}$ is an ${{\mathbb F}}_{q}$-linear MRD-code with parameters $(n,n,q;n-k+1)$ and $L(\mathcal{G}_{k,s})=R(\mathcal{G}_{k,s})\simeq {{\mathbb F}}_{q^n}$, see [@LN2016 Lemma 4.1 & Theorem 4.5]. Note that, as proved in [@Gabidulin; @kshevetskiy_new_2005], this family is closed with respect to the Delsarte duality, more precisely $\mathcal{G}_{k,s}^\perp$ is equivalent to $\mathcal{G}_{n-k,s}$. This family of MRD-codes has been characterized by Horlemann-Trautmann and Marshall in [@H-TM] as follows.
\[gabidulind\][@H-TM Theorem 4.8] An ${{\mathbb F}}_{q^n}$-linear MRD-code ${{\mathcal C}}\subseteq \mathcal{L}_{n,q}$ having dimension $k$ (over ${{\mathbb F}}_{q^n}$) is equivalent to a generalized Gabidulin code ${{\mathcal G}}_{k,s}$ if and only if there is an integer $s<n$ with $\gcd(s,n)=1$ and $\dim_{{{\mathbb F}}_{q^n}} ({{\mathcal C}}\cap{{\mathcal C}}^{[s]})=k-1$, where ${{\mathcal C}}^{[s]}=\{f(x)^{q^s} \colon f \in {{\mathcal C}}\}$.
Very recently, Neri in [@Neri] removed the hypothesis on $\operatorname{\mathcal{C}}$ to be an MRD-code.
Sheekey in [@Sh] proves that with $\gcd(s,n)=1$, the set $$\mathcal{H}_{k,s}(\eta,h)=\{a_0x+a_1x^{q^s}+\ldots+a_{k-1}x^{q^{s(k-1)}}+a_0^{q^h}\eta x^{q^{sk}} \colon a_i \in {{\mathbb F}}_{q^n}\},$$ with $k\leq n-1$ and $\eta \in {{\mathbb F}}_{q^n}$ such that ${{\mathrm N}}_{q^n/q}(\eta)\neq (-1)^{nk}$, is an ${{\mathbb F}}_q$-linear MRD-code of dimension $nk$ with parameters $(n,n,q;n-k+1)$. This code is called *generalized twisted Gabidulin code*. Lunardon, Trombetti and Zhou in [@LTZ], generalizing the results of [@Sh], determined the automorphism group of the generalized twisted Gabidulin codes and proved that, up to equivalence, the generalized Gabidulin codes and the twisted Gabidulin codes are both proper subsets of this class. Clearly, for $\eta=0$ we have exactly the generalized Gabidulin code $\mathcal{G}_{k,s}$. Also, the authors in [@LTZ Corollary 5.2] determined the left and right idealisers: if $\eta \neq 0$, then $$\label{leftrightidealH}
L(\mathcal{H}_{k,s}(\eta,h))\simeq{{\mathbb F}}_{q^{\gcd(n,h)}} \,\, \text{and} \,\, R(\mathcal{H}_{k,s}(\eta,h))\simeq{{\mathbb F}}_{q^{\gcd(n,sk-h)}}.$$ The class of generalized twisted Gabidulin codes is closed with respect to the Delsarte duality, more precisely $\mathcal{H}_{k,s}(\eta,h)^\perp$ is equivalent to $\mathcal{H}_{n-k,s}(-\eta,n-h)$, [@Sh Theorem 6] and [@LTZ Propositions 4.2]. We are interested in the case when $h=0$, i.e. $$\mathcal{H}_{k,s}(\eta):=\mathcal{H}_{k,s}(\eta,0)=\langle x+\eta x^{q^{sk}}, x^{q^s},\ldots, x^{q^{s(k-1)}}\rangle_{{{\mathbb F}}_{q^n}},$$ which is ${{\mathbb F}}_{q^n}$-linear (more precisely it is an ${{\mathbb F}}_{q}$-linear MRD-code ${{\mathbb F}}_{q^n}$-linear on the left). This family has been characterized in [@GiuZ].
[@GiuZ Theorem 3.9]\[thm:charcGTG\] Let ${{\mathcal C}}\subseteq \mathcal{L}_{n,q}$ be an ${{\mathbb F}}_{q^n}$-linear MRD-code having dimension $k>2$. Then, the code ${{\mathcal C}}$ is equivalent to a generalized twisted Gabidulin code if and only if there exists an integer $s$ such that $\gcd(s,n)=1$ and such that the following two conditions hold
1. $\dim ({{\mathcal C}}\cap {{\mathcal C}}^{[s]})=k-2$ and $\dim({{\mathcal C}}\cap {{\mathcal C}}^{[s]} \cap {{\mathcal C}}^{[{2s}]})=k-3$, i.e. there exist $p(x),q(x) \in {{\mathcal C}}$ such that $${{\mathcal C}}= \langle p(x)^{q^s}, p(x)^{q^{2s}}, \ldots, p(x)^{q^{s(k-1)}} \rangle_{{{\mathbb F}}_{q^n}} \oplus \langle q(x) \rangle_{{{\mathbb F}}_{q^n}};$$
2. $p(x)$ is invertible and there exists $\eta \in {{\mathbb F}}_{q^n}^*$ such that $p(x)+\eta p(x)^{q^{sk}} \in {{\mathcal C}}$.
Apart from the two infinite families of ${{\mathbb F}}_{q^n}$-linear MRD-codes (i.e. ${{\mathcal G}}_{k,s}$ and ${{\mathcal H}}_{k,s}(\eta)$), there are few other examples known for $n \in \{6,7,8\}$, which arise from the connection with scattered linear sets we are going to explain.
In [@Sh Section 5] Sheekey showed that scattered ${{\mathbb F}}_q$-subspaces of ${{\mathbb F}}_{q^n}\times{{\mathbb F}}_{q^n}$ of dimension $n$ yield ${{\mathbb F}}_q$-linear MRD-codes with parameters $(n,n,q;n-1)$ with left idealiser isomorphic to ${{\mathbb F}}_{q^n}$; see [@CSMPZ2016; @CsMPZ2019; @ShVdV] for further details on such kind of connections. Let us recall the construction from [@Sh]. Let $U_f:=\{(x,f(x))\colon x\in {{\mathbb F}}_{q^n}\}$ be a scattered ${{\mathbb F}}_q$-subspace of ${{\mathbb F}}_{q^n}\times{{\mathbb F}}_{q^n}$. The set $$\operatorname{\mathcal{C}}_f:=\langle x,f(x)\rangle_{{{\mathbb F}}_{q^n}}$$ corresponds to a set of $n\times n$ matrices over ${{\mathbb F}}_q$ forming an ${{\mathbb F}}_q$-linear MRD-code with parameters $(n,n,q;n-1)$. Also, since $\operatorname{\mathcal{C}}_f$ is an ${{\mathbb F}}_{q^n}$-subspace of ${{\mathcal L}}_{n,q}$, its left idealiser $L(\operatorname{\mathcal{C}}_f)$ is isomorphic to ${{\mathbb F}}_{q^n}$. For further details see [@CMPZ Section 6]. Furthermore, let $\operatorname{\mathcal{C}}_f$ and $\operatorname{\mathcal{C}}_h$ be two MRD-codes arising from maximum scattered subspaces $U_f$ and $U_h$ of ${{\mathbb F}}_{q^n}\times {{\mathbb F}}_{q^n}$. In [@Sh Theorem 8] the author showed that there exist invertible matrices $A$, $B$ and $\sigma \in \mathrm{Aut}({{\mathbb F}}_{q})$ such that $A \operatorname{\mathcal{C}}_f^\sigma B=\operatorname{\mathcal{C}}_h$ if and only if $U_f$ and $U_h$ are $\Gamma\mathrm{L}(2,q^n)$-equivalent, i.e. he proved that the equivalence of the rank metric codes coincides with the $\Gamma\mathrm{L}$-equivalence of the corresponding subspaces.
As a consequence we get the following result.
\[thm:newMRD\] If $q\leq 17$, $q \equiv 1 \pmod{4}$ and $q\neq 5$, then the RM-code $\operatorname{\mathcal{C}}=\langle x, x^q-x^{q^2}+x^{q^4}+x^{q^5} \rangle_{{{\mathbb F}}_{q^6}}$ is an ${{\mathbb F}}_q$-linear MRD-code with parameters $(6,6,q;5)$ and left idealiser isomorphic to ${{\mathbb F}}_{q^6}$, and is not equivalent to any previously known MRD-code.
From [@CMPZ Section 6], the previously known ${{\mathbb F}}_q$-linear MRD-codes with parameters $(6,6,q;5)$ and with left idealiser isomorphic to ${{\mathbb F}}_{q^6}$ arise, up to equivalence, from one of the maximum scattered subspaces of ${{\mathbb F}}_{q^{6}}\times{{\mathbb F}}_{q^{6}}$ described in Section \[EquivIssue\]. From Corollary \[new\] the result then follows.
Scattered linear sets and MRD-codes
-----------------------------------
Lunardon in [@Lunardon2017 Section 3] (see also [@ShVdV Theorem 3.4] and [@CsMPZ2019 Section 4.1]) proved that if $U_f=\{(x,f(x)) \colon x \in {{\mathbb F}}_{q^n}\}$, with $f(x)=a_0x+a_1x^q+\ldots+a_{n-1}x^{q^{n-1}}$, is a scattered[^8] ${{\mathbb F}}_q$-subspace of ${{\mathbb F}}_{q^n}\times{{\mathbb F}}_{q^n}$, then it can be obtained as a special quotient. By [@Sh Section 5], it follows that $$\operatorname{\mathcal{C}}_f=\langle x,f(x) \rangle_{{{\mathbb F}}_{q^n}},$$ is an MRD-code. We may assume that the coefficient of $x$ in $f(x)$ is zero and $f(x)=x^{q^k}+\sum_{j\neq k} b_j x^{q^j}$. Denoting with $\{i_1,\ldots,i_{n-2}\}=\{1,\ldots,k-1,k+1,\ldots,n-1\}$ and $$h_{i_j}(x)=x^{q^{i_j}}-b_{i_j}x^{q^k}, \,\,\, j=1,\ldots,n-2,$$ it is straightforward to see that $$\operatorname{\mathcal{C}}^\perp=\langle h_{i_1}(x),\ldots,h_{i_{n-2}}(x) \rangle_{{{\mathbb F}}_{q^n}}.$$
We can embed $ U_{f} $ in ${{\mathbb F}}_{q^n}^n$ in such a way that the vector $(x,f(x))$ corresponds to the vector $(a_0,\ldots,a_{n-1})\in {{\mathbb F}}_{q^n}^n$ with $a_i=0$ if $i\neq 0,k$, $a_0=x$ and $a_k=f(x)$. Note that $W=\langle U_{f} \rangle_{{{\mathbb F}}_{q^n}}$ corresponds to the $2$-dimensional subspace with equations $x_j=0$ where $j\neq 0,k$.
Let $V$ be the ${{\mathbb F}}_{q^n}$-subspace of ${{\mathbb F}}_{q^n}^n$ of dimension $n-2$ represented by the equations $$V \colon \left\{\begin{array}{ll} x_{0}=0 \\ x_k=-\sum_{j\neq 0,k} b_j x_j \end{array}\right.,$$ and let $S=\{(x,x^q,\ldots,x^{q^{n-1}}) \colon x \in {{\mathbb F}}_{q^n}\}$. Note that $$\label{eq:vertMRD}
V=c_{\mathcal{N}}(\operatorname{\mathcal{C}}^\perp),$$ where $c_{\mathcal{N}}(\alpha_0x+\ldots+\alpha_{n-1}x^{q^{n-1}})=(\alpha_0,\ldots,\alpha_{n-1})$. It can be seen that $V \cap S= \{{\bf 0}\}$ and $$\label{eq:MRDvertex}
U_{f}= \langle V,S \rangle_{{{\mathbb F}}_q} \cap W.$$
This link suggests a new proof of the equivalence between the assertions 1. and 2. of Theorem \[chPseudo\]. In the following we will assume that $L=L_f$ is a scattered linear set of ${\mathrm{PG}}(1,q^n)$ with rank $n$.
(Theorem \[chPseudo\]) Assume that $L_f$ is of pseudoregulus type, then by [@CSZ2015] we have that if $L_U=L_f$ then $U$ is $\Gamma\mathrm{L}(2,q^n)$-equivalent to $$U_s=\{(x,x^{q^s}) \colon x \in {{\mathbb F}}_{q^n}\}.\,\,\,\text{with}\,\,\gcd(s,n)=1 \, \text{and} \, s<n/2.$$ Therefore if $U=U_s$, then $U_s= \langle V,S \rangle_{{{\mathbb F}}_q} \cap W$, with $$V\colon \left\{ \begin{array}{ll} x_0=0\\ x_s=0 \end{array}\right. \,\,\,\text{and}\,\,\, W\colon x_i=0\,\text{for}\,i\neq 0,s,$$ i.e. $L_f=p_{\Gamma,\Lambda}(\Sigma)$ with $\Gamma={\mathrm{PG}}(V,{{\mathbb F}}_{q^n})={\mathrm{PG}}(n-3,q^n)$, $\Sigma={\mathrm{PG}}(S,{{\mathbb F}}_q)={\mathrm{PG}}(n-1,q)$ and $\Lambda={\mathrm{PG}}(W,{{\mathbb F}}_{q^n})={\mathrm{PG}}(1,q^n)$. Denote by $\sigma$ the collineation of ${\mathrm{PG}}(n-1,q^n)$ defined by ${\langle}(x_0,\ldots,x_{n-1}){\rangle}_{{{\mathbb F}}_{q^n}}^{\sigma}={\langle}(x_{n-1}^{q},x_0^{q},\ldots,x_{n-2}^{q}){\rangle}_{{{\mathbb F}}_{q^n}}$, which fixes precisely the points of $\Sigma$. Therefore, we have that $\dim(\Gamma\cap\Gamma^{\sigma^s})=n-4$ and clearly $\sigma^s$ is a generator of the subgroup of $\mathrm{P}\Gamma\mathrm{L}(n,q^n)$ fixing $\Sigma$ pointwise.
Conversely, let $L=p_{\Gamma,\Lambda}(\Sigma)$ with $\dim(\Gamma\cap\Gamma^{\sigma^s})=n-4$, $\gcd(s,n)=1$, $\Gamma={\mathrm{PG}}(V,{{\mathbb F}}_{q^n})={\mathrm{PG}}(n-3,q^n)$, $\Sigma={\mathrm{PG}}(S,{{\mathbb F}}_q)={\mathrm{PG}}(n-1,q)$. Note that $V=c_{\mathcal{N}}(\mathcal{C})$ with $${{\mathcal C}}=\langle g_1(x),\ldots,g_{n-2}(x) \rangle_{{{\mathbb F}}_{q^n}},$$ for some linearized polynomials $g_1(x),\ldots,g_{n-2}(x)$. It follows that $$V \colon \left\{ \begin{array}{ll} a_0x_0+\ldots+a_{n-1}x_{n-1}=0 \\ a_0'x_0+\ldots+a_{n-1}'x_{n-1}=0 \end{array} \right.,$$ where $\operatorname{\mathcal{C}}^\perp=\langle f_1(x), f_2(x)\rangle_{{{\mathbb F}}_{q^n}}$ and $$f_1(x)=a_0x+\ldots+a_{n-1}x^{q^{n-1}},$$ $$f_2(x)=a_0'x+\ldots+a_{n-1}'x^{q^{n-1}}.$$ We may assume that $a_j=a_k'=1$ and $a_k=a_j'=0$ for some $j\neq k$, choose $W$ as the ${{\mathbb F}}_{q^n}$-subspace having equations $x_i=0$ for $i\neq j,k$. Therefore, we have $$(V+S)\cap W\simeq U:=\{(f_1(x), f_2(x)) \colon x \in {{\mathbb F}}_{q^n}\}.$$ So, $L=L_U$ and $U$ results to be a scattered ${{\mathbb F}}_q$-subspace of ${{\mathbb F}}_{q^n}\times{{\mathbb F}}_{q^n}$, i.e. by [@Sh Section 5] ${{\mathcal C}}^\perp$ is an MRD-code. It follows that ${{\mathcal C}}$ is an MRD-code with $\dim_{{{\mathbb F}}_{q^n}} {{\mathcal C}}=n-2$ and $\dim_{{{\mathbb F}}_{q^n}} ({{\mathcal C}}\cap{{\mathcal C}}^{[s]})=n-3$. By Theorem \[gabidulind\], $\operatorname{\mathcal{C}}$ is equivalent to ${{\mathcal G}}_{n-2,s}$. It follows that $U$ is $\Gamma\mathrm{L}(2,q^n)$-equivalent to $U_s$ and hence $L$ is of pseudoregulus type.
In [@Neri], Neri gives a characterization of generalized Gabidulin codes using the standard form of their generator matrix. This suggests a further different approach to the characterization of linear sets of pseudoregulus type.
For linear sets of LP-type, as done for the pseudoregulus case, it follows that one of the possible ${{\mathbb F}}_q$-subspaces representing a linear set of LP-type can be obtained as in , choosing $V$ in such a way that $V=c_\mathcal{N}(\mathcal{H}_{n-2,s}(\eta))$. Since a characterization of generalized twisted Gabidulin codes is known, see Theorem \[thm:charcGTG\] with $k=n-2$, it follows that a scattered linear set $L$ is of LP-type if and only if there exists an ${{\mathbb F}}_q$-subspace $U$ of ${{\mathbb F}}_{q^n}\times{{\mathbb F}}_{q^n}$ such that $L_U=L$, where $U$ is as in and the rank-metric code associated to $V$ satisfies the hypothesis of Theorem \[thm:charcGTG\] with $k=n-2$. In contrast to the above characterization, those presented in the previous sections are purely geometric and take into account the problem of the possible ${{\mathbb F}}_q$-subspaces representing a linear set of LP-type.
[100]{}
Exceptional scattered polynomials, *J. Algebra* [**509**]{} (2018), 507–534.
Scattered spaces with respect to a spread in $\mathrm{PG}(n,q)$, *Geom. Dedicata* [**81**]{} (2000), 231–243.
$\mathbb{F}_q$-linear blocking sets in ${\mathrm{PG}}(2,q^4)$, [*Innov. Incidence Geom.*]{} [**2**]{} (2005): 35–56.
Partition-balanced families of codes and asymptotic enumeration in coding theory, <https://arxiv.org/abs/1805.02049>.
, *J. Combin. Theory Ser. A* [**157**]{} (2018), 402–426.
, *Ars Math. Contemp.* [**16(2)**]{}(2019), 585–608.
A new family of MRD-codes, *Linear Algebra Appl.* [**548**]{} (2018), 203–220.
Maximum Rank-Distance codes with maximum left and right idealisers, <https://arxiv.org/abs/1807.08774>.
Maximum scattered linear sets and MRD-codes, [*J. Algebraic Combin.*]{} [**46**]{} (2017), 1–15.
A special class of scattered subspaces, [arXiv:1906.10590](https://arxiv.org/abs/1906.10590).
New maximum scattered linear sets of the projective line, *Finite Fields Appl.* [**54**]{} (2018), 133–150.
On the equivalence of linear sets, *Des. Codes Cryptogr.* [**81**]{} (2016), 269–281.
On scattered linear sets of pseudoregulus type in ${\mathrm{PG}}(1,q^t)$, [*Finite Fields Appl.*]{} [**41**]{} (2016), 34–54.
Maximum scattered ${{\mathbb F}}_q$-linear sets of ${\mathrm{PG}}(1,q^4)$, *Discrete Math.* [**341**]{} (2018), 74–-80.
Algebraic structures of MRD Codes, [*Adv. Math. Commun.*]{} [**10**]{} (2016), 499–510.
Bilinear forms over a finite field, with applications to coding theory, [*J. Combin. Theory Ser. A*]{} [**25**]{} (1978), 226–241.
Theory of codes with maximum rank distance, *Problems of information transmission*, [**21(3)**]{} (1985), 3–16.
Ideals over a Non-Commutative Ring and Their Application in Cryptology, in *Workshop on the Theory and Application of of Cryptographic Techniques*, Springer (1991), 482-–489.
Identifiers for MRD-codes, *Linear Algebra Appl.* **575** (2019), 66–86.
New criteria for MRD and Gabidulin codes and some rank-metric code constructions, [*Adv. Math. Commun.*]{} [**11(3)**]{} (2017), 533–548.
The new construction of rank codes, *International [Symposium]{} on [Information]{} [Theory]{}*, 2005. [ISIT]{} 2005. [Proceedings]{}, pages 2105–2108, Sept. 2005.
: Automorphism groups of Gabidulin-like codes, [*Arch. Math.*]{} [**107(4)**]{} (2016), 355–366.
Normal spreads, [*Geom. Dedicata*]{} [**75**]{} (1999), 245–261.
MRD-codes and linear sets, [*J. Combin. Theory Ser. A*]{} [**149**]{} (2017), 1–20.
Maximum scattered linear sets of pseudoregulus type and the Segre Variety ${\cal S}_{n,n}$, *J. Algebraic. Combin.* **39** (2014), 807–831.
A geometric characterisation of linear k-blocking sets, [*J. Geom.*]{} [**74 (1-2)**]{} (2002), 120–122.
Blocking Sets and Derivable Partial Spreads, *J. Algebraic Combin.* [**14**]{} (2001), 49–56.
Translation ovoids of orthogonal polar spaces, [*Forum Math.*]{} [**16**]{} (2004), 663–669.
Generalized Twisted Gabidulin Codes, *J. Combin. Theory Ser. A* [**159**]{} (2018), 79–106.
Maximum rank distance codes as space-time codes, *IEEE Trans. Info. Theory* [**49**]{} (2003), 2757-–2760.
MRD-codes arising from the trinomial $x^q+x^{q^3}+cx^{q^5}\in{{\mathbb F}}_{q^6}[x]$, [arXiv:1907.08122](https://arxiv.org/abs/1907.08122).
Systematic encoders for generalized Gabidulin codes and the $q$-analogue of Cauchy matrices, <https://arxiv.org/abs/1805.06706>.
On the genericity of maximum rank distance and Gabidulin codes, [*Des. Codes Cryptogr.*]{} [**86(2)**]{} (2018), 1–23.
Invariants and Inequivalence of Linear Rank-Metric Codes, [arXiv:1905.11326](https://arxiv.org/abs/1905.11326).
Equivalence and Characterizations of Linear Rank-Metric Codes Based on Invariants, [arXiv:1911.13059](https://arxiv.org/abs/1911.13059).
Fuzzy Authentication using Rank Distance, [arXiv:1703.03235](https://arxiv.org/abs/1703.03235).
A new family of linear maximum rank distance codes, [*Adv. Math. Commun.*]{} [**10(3)**]{} (2016), 475–488.
Rank-metric codes, linear sets and their duality, [arXiv:1806.05929](https://arxiv.org/abs/1806.05929).
Optimal locally repairable codes via rank-metric codes, *IEEE Int. Symp. Inf. Theory (ISIT)* (2013), Istanbul (Turkey).
Linear codes and Galois geometries: between two worlds, *Ph.D. thesis*, Università degli Studi della Campania “*Luigi Vanvitelli*”.
Corrado Zanella and Ferdinando Zullo\
Dipartimento di Tecnica e Gestione dei Sistemi Industriali\
Università degli Studi di Padova\
Stradella S. Nicola, 3\
36100 Vicenza VI\
Italy\
*{corrado.zanella,ferdinando.zullo}@unipd.it*
Ferdinando Zullo\
Dipartimento di Matematica e Fisica,\
Università degli Studi della Campania “Luigi Vanvitelli”,\
I–81100 Caserta, Italy\
[[*[email protected]*]{}]{}
[^1]: The research was supported by the Italian National Group for Algebraic and Geometric Structures and their Applications (GNSAGA - INdAM).
[^2]: Angle brackets without the indication of a field will denote the projective span of a set of points in a projective space.
[^3]: This condition implies $q\neq 2$.
[^4]: Starting to count from zero.
[^5]: The *maximum field of linearity* of an ${{\mathbb F}}_q$-linear set $L_U$ as ${{\mathbb F}}_{q^\ell}$ if $\ell$ is the largest integer such that $\ell \mid n$ and $L_U$ is an ${{\mathbb F}}_{q^\ell}$-linear set.
[^6]: This condition implies $q\neq 2$.
[^7]: Also here $q>2$, otherwise it is not scattered.
[^8]: The statement is more general, we have adapted it to our case.
|
{
"pile_set_name": "Pile-CC"
} | application
Every Network Administrator or Security Administrator should have a few basic tools installed and ready to go at a moments notice. Advanced IP scanner is a reliable and freenetwork scanner. It offers complete analysis of your entire LAN, showing live IP addresses and giving you the ability to remotely control systems with RDP and Radmin. It’s installable or fully portable, so you can keep it in your Dropbox or NextCloud folder for convenient access. |
{
"pile_set_name": "StackExchange"
} | Q:
Nested flexbox adds empty space on IE10 and 11
I'm using flexbox for a layout. My constraint is that the image must be situated at the middle.
I've made a minimal markup that reproduces the issue: http://codepen.io/anon/pen/xwNomN
It works perfectly well in all browsers EXCEPT on IE 10 and 11, where (as shown in the CodePen) a big amount of empty space is added at the top and bottom of the image.
.collection__list {
display: flex;
flex-wrap: wrap;
}
.product-item {
display: flex;
flex-direction: column;
justify-content: space-between;
}
.product-item__figure {
position: relative;
display: flex;
align-items: center;
justify-content: center;
flex: 1 0 auto;
}
.product-item__figure > a {
display: flex;
position: relative;
flex: 1;
}
.product-item__image-wrapper {
position: relative;
width: 100%;
}
.product-item__image {
display: block;
margin: 0 auto;
max-width: 100%;
}
I've tried a lot of fixes, played with flex-shrink, flex-grow... but after 1 whole day lost, I'd love to know what I'm doing wrong.
Thanks
A:
Oh... I've found it by chance. Adding overflow: hidden to product-item__figure made the trick....
|
{
"pile_set_name": "PubMed Abstracts"
} | Cerebrospinal fluid carnitine levels in patients with Alzheimer's disease.
We assessed free carnitine (FC) and acylcarnitine esters (AC) in both cerebrospinal fluid (CSF) and plasma from 24 patients with diagnostic criteria for Alzheimer's disease (AD), and from 28 healthy matched-controls. We found no significant correlation between FC and AC levels in CSF. FC and AC levels in CSF did not differ significantly between AD patients and controls, but plasma FC levels were significantly lower in AD patients. CSF and plasma FC and AC levels did not correlate with age, age at onset of AD, duration of AD, and scores of the Minimental State Examination of Folstein. Although these results suggest that CSF carnitine levels are apparently unrelated with the risk for AD, the trend of the FC/AC ratio to be higher in AD patients might suggest the possibility of a lower carnitine acetyltransferase activity in AD, as previously reported in some brain areas. |
{
"pile_set_name": "OpenSubtitles"
} | "SUMMERTIME" " You didn't take any corn at all?" " No." "Antoine's parents are starting to plant it." "Sweetie, the day you have a husband, you can ask him to plant corn." "But if you keep letting them go one after another..." "Your friends are faster." "I don't want to get married." "I don't want to get married." "What are you doing every night?" "Getting home in the middle of the night." "I walk around." "Are you seeing anyone?" "No." " Is it Antoine?" " No." "You can't stay alone all your life." "Solitude is awful." "I'm getting married in September." "Who to?" "Pierre Coubin." "You love him?" "I don't know." "I don't really know him." "I mean," "I've known him all my life, but I don't know if he'll make a good husband." "He seems nice." "He's ambitious, he wants to go live in Limoges." "Oh, yeah, very ambitious." "Do you want to stay here all your life?" "Yeah." "I like everything here." "We need to move on, Delphine." "We're not kids anymore." "What happened between us doesn't matter to you?" "It does." "Of course it does, but, it wasn't serious." " Hey." " Hey." " What are you doing here?" " Nothing, just walking." "You?" " You want it?" " No, thanks." "You'll get caught someday." "Will you go to the dance in Aubusson?" "Dunno." "We could go together." "I don't know, Antoine." "We'll see." "Where's Delphine?" "I don't know." "Delphine." "Delphine?" "PARIS SPRING 1971" "The President welcomed, this morning at the Élysée Palace, 11 mothers, with at least 10 children each." "Mr. Pompidou awarded them the Medal of the French Family." "And during an improvised speech, the president spoke about the role of family." ""Raising kids is a lot of work but it's rewarding. "" ""The notion of family is threatened by the current climate. "" ""A climate emphasized by the violence spreading everywhere. "" ""France can't become a dictatorship, but the government must act to stop this violence. "" "Hey!" " Hey, you're having fun?" " Yeah, it's your time for once!" " You're laughing now?" " Leave her alone!" "Tarts!" "Close the door!" "Sluts!" "Go fuck yourself!" "You see how he acted?" "If we had stolen his wallet, he'd run the same." "We did worse than steal his wallet." "We stole his virility." "Thank god you were here." " You don't scare easily!" " He was threatening." " He wasn't that dangerous." " Really?" "He was crazy." "Was it a dare?" "No, it was to show them how it feels." "When it's our arse it's normal, when it's theirs, they don't like it so much." " Next time we do it to cops!" " Yeah!" "What do you demonstrate for?" "Women's rights." "The right to not be bothered in the street for starters." "The right to do what we want, when we want it, and with whoever we want to." "Don't you agree?" "I don't know." "You don't feel like there are things you can't do because you're a woman?" "I'm looking for a meeting, but I don't really know about what." "All I know is that there's women, and it's on Thursdays." "Oh, the hotheads?" "It's in the lecture theater on the right." "You're being sectarian!" "Our strength is to blend." "What men need to understand is that for now, they don't belong here!" "And I know what people'll say." "They'll say we're against men." "But we're not." "We're not!" "Besides, half the women here are involved with a guy." "We're not against men, we're for the women!" "For us!" "I'm sorry," "I'm sorry but when there's a guy around, a woman's attitude changes." "Her speech is different." "And even an educated woman, when she's around a man, whether she knows him or not, she censors her speech and her thoughts." "What we want right now, is to get back our free speech without caring what the boyfriend, boss or dad will think of it, and talk between women." "OK, I agree with the separatism, but in this case, there's a journalist who wants to attend our meeting..." "Down with the straight journalism!" "Let everyone talk!" "If even within Women's Lib we can't agree, we're doomed!" "Men in the kitchen, women at the bar!" "♪ Us who don't have history ♪ ♪ from time immemorial, women ♪ ♪ we're the dark continent ♪ ♪ slave women, get up ♪" "♪ and let's break our chains ♪ ♪ Get up, get up, get up ♪ ♪ women enslaved and humiliated ♪ ♪ bought, sold and raped ♪" "♪ women in every house ♪ ♪ are kept out of the world ♪ ♪ slave women, get up ♪ ♪ and let's break our chains ♪" "♪ Get up, get up, get up ♪" "I really didn't envision you sitting at a desk all day long." "I envisionned you... doing something more physical." "Oh yeah?" "Like what?" "Swimming teacher." "Yeah, you'd be good at that." "You need to be serious, focused, and it's physical." " And what do you do?" " Guess." "It's too difficult, I barely know you." "You have two attempts, then you'll have a forfeit." "Saleswoman?" "No, I'm not a saleswoman." "Last attempt." "Um... doctor?" "Why do you think that?" "Well, you speak well, so it means you studied, and you seem to care about others." " Forget it, it's stupid." " No, not at all." "I'm a teacher." "Spanish teacher." "So, what's the forfeit?" "You must come to the next meeting Thursday." "Ah." "It's a strong sentence, but we have to compromise." "We're talking about people who never speak about themselves." "There's no union for prisoners, so if we don't represent them there's no point." "You know how feeble bourgeois journalists are." "Le Monde won't accept it." "If we don't stir up a hornets' nest..." "How many articles about French prisons are there?" " Zero." " We'll be the first ones, and it'll be shot down." "It's stupid." "We're not gonna censure ourselves until Fauvert does it." "What's our goal here?" "To publish a good article, or to be published in Le Monde?" "Being published in Le Monde would gives it importance." "We have something to say, we worked for a year, and in order to be published, we're gonna write what they want to read?" "If it's just a reported speech, it's pointless." "It's demagogic!" "Demagogic?" "Really?" "Of course it is." "Prison creates new criminals." "That's what we think." "Can you take my blue dress too?" "Put it aside though, so I don't have to search for hours in your mess." "I know, I need to clean up." " I don't have enough time." " Oh, yeah, it's hard to do everything, free your sisters from the male superiority and clean your clothes." "Yeah." "What would I do without you?" "Women can't live without men." "Chauvinist." " Shrew." " Boor." " Virago." " Supporter of slavery." "Suffragette." " Pompidou's voter." " Ah, no, no." " No names!" " You didn't answer so you lost." "No, no, no, you're cheating." "You're cheating!" " A punishment for you!" " Go ahead." "I won, I won." "Hey." "Delphine, you're here." "You missed a lot." "We laughed so much at Ménie Grégoire." "Everyone went on the set." "People were screaming," " "Liberty!" "Liberty!"" " Ah, Delphine." "Hey." " How are you?" " I'm good, you?" "I'm telling her about Ménie Grégoire." "Oh la la, it was something!" "I thought she'd faint." "Wanna try?" "The magazine really doesn't stick its neck out." "They say: "The 343 sluts:" "it's either courage or exhibitionism. "" "Of course." "Like their article is courageous." "It's OK." " Sorry." " It's OK." "It's OK." ""We're calling on our sisters:" "Let's demand, hand in hand, appropriate wages, on par with the work produced, and equal to men;" "that women stop being treated as objects." "Meeting in Amphitheater B, April 23."" "How are we doing with the banners?" "On the fourth." "We need more, right?" " Maybe one." " Yeah, it'll be better." "♪ This is the final orgasm ♪ ♪ Let us sleep, and tomorrow ♪ ♪ Dykes and queers ♪ ♪ Will be the human race ♪" " You OK?" " Yeah." "You're on the pill?" "No." "Why?" "Are you crazy?" "You have to." "I keep saying so to my students." "Discreetly though, I don't want to get fired." "Why don't you take it?" "You think it's too expensive?" " No, that's not it." " My duty as a doctor, is to do everything possible to help a human life." "Whoever he is, regardless of race, sex, religion... and if we don't make any distinction based on race, religion or sex, why should we make one based on age?" "What if one day we say that our seniors aren't humans, so we can simply kill them." "No, no." "Medicine isn't on the side of death." "It's on the side of life." "So when women have the chance to be with child, but still want to abort," "I want to tell them:" ""Be responsible." "When you drive a car, you respect the traffic laws." "Well, pregnant women and their little passenger, it's life." "It's a child to be born. "" " My body is not a car!" " Here, a human life!" "What's going on?" " Enough!" " Your mother should have done" " everyone a favor and abort!" " Asshole!" "Fascist!" "Stick it!" "What are you doing?" "Hurry up!" " For a free abortion law." " Just don't fuck." " You didn't fuck?" " Of course, but I was careful." " How?" " We managed." ""Dear Antoine." "Paris really is an incredible city. "" ""Even though I hadn't realized it before." "Every day is different. "" "So much is happening here." ""I met a great girl. "" ""A great girl. "" ""An amazing girl. "" ""A fantastic girl. "" ""Her name's Carole. "" "Sorry, I probably got the wrong door." " You're here for the meeting?" " Yes." "It's the right door." "Come in." " Get out!" " I'm being kicked out of my own place now." "We don't need you anymore." " See ya." " See ya." " You good?" " Yeah." " Isn't this Carole's?" " It is." "Carole and Manuel's." "The boudoir." "He's not crazy at all." "He is a specialist in literature, he is super smart, very funny." "But he's queer." "So his fucking parents put him in a mental institution to cure him." "Long live family." "Adeline, for us it's a no, we don't deal with such cases, that's all." "We have to stay on point:" "abortion, contraception, otherwise we're gonna divide ourselves." "So I should leave my best friend there enduring electroshocks, and maybe a lobotomy, just because it's not what we fight for, and it's too far away?" "That's not what we said." "Wait, it's legal to do that to someone?" "Yes it's legal, and that's the problem." "Put a queer in a mental institution is legal." "So, what's your plan?" "My plan's easy." "We go there and we grab him." "I'm sorry, Adeline, but it's not our business to handle men's problems." "We're not gonna start messing with minority groups' struggles." "Minority?" "You've got a nerve to say that." "I fight for the pill, but it's not my girlfriend's who's gonna knock me up." " I'm really disappointed in you guys." " Don't take it personally." "We pick the fights, we have to be coherent." "We can't disperse like that." "It doesn't have to be done under the Women's Lib's flag." " Obviously." " Well, that's it then." "I don't get it." "Adeline is always the first to support you, she always sticks with you no matter what, she was there for Chambart, and you can't even be there for her?" "Thanks a lot." "Thank you." "It's her best friend, seriously." " Carole, come on, you're coming?" " I don't know." "What?" "Do you need your boyfriend's approval?" "What's up with you?" " You don't go, but I will." " It's stupid." "One group goes to Plessis-Robinson, the other one goes to grab your friend." "Why did you change your mind?" "I'm going to be there for my friend." "That's a very good reason." "So, you go this way." " And the second right..." " On the map, we're there." "But I was thinking about taking this blue path." " No, you can't." "That's a stream." " Ah." "Maybe if you row, but otherwise, I don't think so." "I'm sorry, my husband always says I can't read a map." " Yes." " We're gonna make it." "We're here, and the castle's there." " No, madam, look." " Where are we?" "We're here, right?" "Not at all, Mrs." "Give me your hand." "Hey!" " Stop!" " Go, go, go!" "Where are you going?" "I can't open my eyes anymore." " Hello, auntie." " Hello, sweetie." " Are you OK?" " Yes." " I'm happy to see you." " Me too." " This is my aunt:" "HéIène." " Hello, ma'am." " What's going on?" " Just a little accident." "Nothing serious." " Are you sure?" " We made a crazy turn." " You want anything to drink?" " Oh, yes, please, good idea." "You OK, Guitou?" "He's coming back." "Here we are." "Here." "I've never been in the south before." "It's weird." "Don't drag too much." "No, not that, the landscape." "It's different back home." "It always feels like the soil is drenched." "Here when you walk, the soil is hard." "Your foot bounces back, it gives you momentum." "Back home, even in the summer, your foot sinks in." "As if the soil was going to swallow it." "As if you have to fight just to walk." "You know what I mean?" "Yeah, yeah, I think so." "We're out of sleeping bags." "I never fought with a man, it's always with women back at the dojo." "Cheers." "In the country, it's like an unwritten law." " Here, taste this." " Thank you." "For example, my mother doesn't have a salary, no social security, no checkbook." "But she works all day long." "And when a decision must be made about the farm," " she doesn't have a say." " It's crazy." "Shift your weight back, push him forward, you pin him and you do an armlock." " Oh." " Do that really fast." "If you do that, he can't move." "Why didn't you say something during the meetings?" "I thought no one would be interested to hear about it." "Are you kidding?" "Everyone would have loved to hear about it." "That's exactly against such things we're fighting for." " Adeline." " No, wait, wait." " I'm embarrassed." " Why?" "Thanks." "I don't want to talk about it in front of everyone." "Can I sleep in your bed?" "Adeline snores like a trooper." "Sure." "Thanks." "What?" "The situation at the farm can't keep going." "You need to take it back." "You need to do a farmers collective or something." "Something unique." " Did you smoke again?" " Barely." "What?" "I never said I wanted to kick my dad out of the farm." "You're a chicken." " No." " Yes, like most women." "Men still have a bright future." "What are you doing?" "Go away, Carole." "Go sleep elsewhere." "It's OK, it's no big deal." " We drank too much." " No, you drank too much." "Go away, Carole!" ""I was sixteen and a half." "I was in a coed high school." "I was sick, and I didn't have my period, so a friend told me:" "'You're pregnant. ' She gave me the address of a doctor in Pigalle." "The first time I went to see him, he was on a first name basis with me." "He told me, 'You're one month pregnant. '" "I was panicked and completely disoriented." "He asked me: 'What are you gonna do?" "' I had no idea." "I didn't want to get married." "I didn't have a boyfriend." "The father was in La Rochelle," "I had no way to reach him... "" "Hello." "Hey." "You weren't at the meeting yesterday." "No, I didn't feel like it." "Look, I wanted to tell you about last time," "I'm not shocked, not at all." "I..." "I was just taken aback." "But..." "I mean..." "I have lesbian friends, but I'm not, that's all." "Me neither." "I'm taking the banners." " Well, you're pretty late." " Yeah, yeah, don't tell me off." "I don't." "Take the banners instead." "You OK?" "Yeah, I'm fine." "We can make the first trip." "Put everything in the car." "We need to be first in the rally." "Who's taking that?" "Delphine." "Let's go to your place." "What the hell are you talking about?" "Is it to prove to yourself you're a free woman?" "I'm not trying to prove anything." "I didn't wake up one morning thinking" ""Oh, today I'm sleeping with a girl. "" "It happened, that's all." "I thought it'd only be a one-time thing." " But it's lasting, and..." " What?" "You want to break up?" "No, otherwise I wouldn't tell you about it." "Is it just a sex thing or are you in love?" "I don't know, Manuel." "I don't know." "Are you seeing her today?" "I don't know." "You're lying." "I know you." "You dislike lying so much, when you have, you become all yellow." "I swear." "It's not a sure thing, but we might see each other." "OK." "Find a place to spend the night then." "You're not coming in our bed after you fucked her." "No!" "Calm down, calm down, calm down." "Bad girl." "Shh." "Oh, come on." "Down with the bourgeoise society!" "Te quiero." " Te quiero." " Te quiero?" "Mi amor." "Mi amor." "Me gustan tus pechos." " What does it mean?" " Repeat it." " Me gustan..." " Tus pechos." " Tus pechos." " Good." "Me gustan... what does it mean." "Nothing." " That's the "pechos"?" " Yes!" "Ah, the pechos." "Yeah, me gustan tus pechos." "You've got it, my love!" "Hey." "Hello." "Miss Vinatier?" " Yes." " I have a telegram for you." "I don't get it." "If he was tired, why didn't he stop?" "He didn't look tired, he was like usual." "I didn't see it coming." "Just the day before, he was running around." "You know how he is." "Then, yesterday morning, he was loading some cans, and I saw him fall on the ground." "The doctors told me, there's no warning signs for that type of thing." "We're lucky he's still here." "Does it look like we're lucky?" "It's hard for me too." "I..." "I thought about it, and I don't have a choice." "I don't have a brother, an uncle or a cousin." "If I don't do it, no one else will." "Are you crazy?" "You can't cut yourself off again out there." "It's too much for my mom!" "And we can't afford a farm hand." "We're just starting something you and I..." "You can't tell me that over the phone like that, Delphine." "We need to meet." "I'm on my way." "Where are you?" "Not now, Carole." "It's OK." "I'm sure she's gonna come back." "She loves you, it's obvious." "What's going on?" "I waited here, because she's not feeling well." "Did you know the Liéjard brothers are ready to buy your farm?" "Your father had been at the hospital for less than a day, and they were already talking about it to your mother." "Bunch of jerks." "She didn't even tell him." "In their dreams!" "You changed." "I did?" "Yeah, I don't know." "You look less childish, more woman." "Or maybe more Parisian." "That's funny." "In Paris, I always felt like a ninny, and you tell me I look more Parisian." "You know," "I'm really sorry about Maurice." "But I'm really happy you're here." "Stop going through your father's things, he doesn't like it." "I have a meeting with the bank." "Why?" "To pay the share." "Do you have a health insurance policy?" "No." "We're not gonna pay two of them." "We're not as rich as the Giscards." "Seven letters." " How many letters?" " We're going to have to shell out." "Guys, regarding the purchase of the agricultural equipment:" "we're only getting a combine harvester," " every agrees?" " Yes." "I think it's too expensive." "We should renegotiate the price." " You're getting cold feet again?" " No, I'm not!" "But we're not as rich as Croesus." "Once we've settled on the model we want, we'll calculate everybody's share, and we'll get your checks." " I'll come pick everyone's check..." " Yeah, Antoine will pick them up." " OK for everyone?" " About Maurice, what do we do?" "I'll pay our share." "So, if you pay the share," "I'll have to schedule a bank appointment for you." "No, that's fine." "I have an appointment early next week." "You took an appointment on your own?" "Well, yeah." "It's my role as president of the cooperative so you should have told me, and we would have come with you." "You would have been more credible." "I thought it would be faster that way." "Maybe, but that's not how we do it." "It's not correct." "Well, if the appointment is scheduled, we'll see..." " So..." " We need to appoint drivers too." "Your father woke up!" " What?" " Your father woke up!" "They say he's still weak, but he's conscious." "He doesn't speak but he can understand." "Don't take that many, you're only leaving for a few days." "He loves the wild boar one." "You know he's a big eater." "Ouch." "We look like two little girls running around." "Kiss him hello for me." " If you have a problem, call Antoine." " Yeah, don't worry." "Kiss him for me!" "You said working the land was non-stop work, but it feels OK to me." "That's because I woke up at 4:00 am to do everything before you arrive." "Really?" "You must be exhausted." "No, I'm OK." "I still have energy." "What kind of energy?" "Come on, go, go, go!" "Go, go, go!" "Come on, Laura!" "Stop!" "Stop!" "Come on, Margot!" "What's missing... ah, the jug of water." "When I was a kid, we'd play house, and I didn't feel anything when I kissed boys." "One day, there weren't enough boys, so I played the dad." "I kissed a girl and it really made an impression." "And then?" "Then I slept with a girl for the first time." "How old were you?" "I was 16 and she was 22." "Was she from around here?" "No, a city girl, like you." "She was on holidays near our place." "My parents were completely in the dark." "They were happy that I made friends with a college girl, from Limoges." "And then?" "What "then"?" "Don't make me believe there was no one between your 16 years old and now." "I had a heartache with a girl from here." "And then I met you." "I knew it." "I knew it, but I couldn't believe you'd do that." "You're pathetic." "You say you're confused, that you don't wanna break up, and ten days later you go join her for the weekend, without even warning me." "You must be joking." "Are you waiting for my approval?" "You have no self-discipline, Carole." "None." "Commitment is not just in the amphitheater with your friends." "It's in your life too." " Hello." " Hello." "Let's get him out." "Help me." "Give me his bathrobe." "Thank you." "No need to thank me." "Are you certain of what you're doing?" "I just left her and I already miss her." "I really miss her, you know?" "I never felt this way before." "So I'm going back," "I don't have a choice." "I never wanted for you to miss me." "What I loved about you is that you didn't need me, that you were free, and strong." "So what are you saying now?" "That love, for you, is not being able to stay apart from someone?" "Chasing someone, tongue rolling out, like in cartoons?" " That's not you, Carole." " Maybe." "I don't know anymore," "I just let myself drift away by my feelings." "I don't want to debate about this." "You don't have to stop thinking either." "Mom?" "A friend from Paris will come visit us for a few days, if you don't mind." "I don't." "Quite the opposite actually." "It's good for you, it'll take your mind off things." "Between handling the farm and your father, you deserve some entertainment." "Is she a colleague of yours?" "Yeah." "She just left her boyfriend, so she needs to take a break." " Do they have kids?" " No." "Oh, it's easier then." "She'll take Grandma's bedroom." "It's the most comfortable one." "Oh my god!" "I gotta warn you, we won't sleep in the same room." "Why?" "My dad just had a heart attack a month ago," "I don't want my mom to have one as well." "We're gonna take it easy, OK?" "OK." "Dad." "This is Carole, she came to see me." "Hello, sir." "Delphine told me a lot about you," "I'm really glad to meet you." "See you later." "What kind of work do you do at Félix Potin?" "Oh, but I don't work at Félix Potin at all." "Well, I thought..." "I'm a Spanish teacher." "We met at a women's group." "What kind of group?" "Uh, a pottery group, just for women." "They're workshops around the material." "We work on the feelings, we sculpt, we knead." "We work with clay." "It's pleasurable, and very relaxing." "You do that kind of thing?" "Oh yeah, and she's very gifted." "She makes cute little vases, you'll see." " Right, Delphine?" " Hmm." "Is that dessert?" "Can I?" " I'm gonna get you a plate." " Oh no, don't bother." "Shh." " Up already?" " Yeah." " You didn't sleep well?" " I did, but I'm coming with you." " We're gonna go work." " I know." " Do you want some coffee?" " Yes." " Here you go." " Thanks." "Thank you." "That's no work for a teacher." "Oh, am I too slow?" "No, no." "It's just that if I didn't have to do it, I wouldn't." "Really?" " But you're proud of what you do?" " Proud?" "No." "Why would I be?" "You and your daughter manage to keep the farm running, that's not nothing." "It's the proof that a farm can be managed by women." "It's true that women are as good as men for work, but that's not how it's done." " What?" " Nothing." "Here." "It's easier with a man, don't you agree?" "I didn't say anything." "What do you have against men?" "What?" " What?" " Nothing..." "What you do is marvelous." "You should be proud, Monique." "Got it." "Look." "Touch it." "Ah, Monique!" "Come dance!" "♪ tu m'allumes, le matin tu m'éteins ♪" " You're not tired?" " Come on!" "Come on, Monique." "Come on, come on." "Come on, Monique." "Come on, come on." "Come on!" "Come on, come on, come on." "♪ Mon chéri ♪ ♪ Hello chéri ♪" "♪ Toi, tu me fais de I'électricité, ♪ ♪ Tu fais monter ma tension, Monique ♪" "♪..." "I'électrici... ♪ ♪ Moi, I'électrici..." "Moi, I'électricité ♪" "Monique!" "You're awesome." "I didn't even touch you yet." " Did you feel it?" " No." "You see." " And now?" " No." " Did you tell him we made hay?" " He doesn't understand what we say." "Of course he does." "Right, Dad?" "We made hay." "We have to talk to him." "That's what keeps him alive." "You can bury your head in the sand." "I see what I see." "Sorry." "Here." "Do it!" "Come on, Delphine!" " To Delphine being back, and welcome to..." " Carole." "I'm Josette." "To Carole and Delphine." "Cheers." " So, was it good in Paris?" " Yeah." " I did unexpected things." " Like what?" "Politics." "Politics?" "You're gonna do a kolkhoz?" "Maybe not a cooperative, but making sure women get a salary for the work they do would be a great start." "I do have a salary." "My husband's salary." "It's already nice that she can dip into it, no?" "Yes." "It seems nice." "Do you want a drink?" "No, thanks." "I can't right now." "Well, I feel like drinking tonight." "It's well deserved, look." "Practice makes perfect." "How long have you known Delphine?" "Since forever." "What was she like as a kid?" "Like now." "You know, you can't know someone in just three months." "Delphine won't leave." "Really?" "How can you be certain?" "Have you seen Maurice?" "He'll never be able to handle the farm." "And Delphine would rather die than sell it." "I know that." "♪ together oppressed, women ♪ ♪ together we revolt ♪" " ♪ get up ♪" " Shh." "You're gonna wake up my folks." "I doubt I'll wake up your dad." "Hello!" "Stop, please." "Sorry, we drank a little bit too much." ""Relax, we're gonna work on our own today." "I love you. "" "I can't figure out if Delphine really likes this life, or if she can't imagine something else." "I'm sure she could do a ton of other things." "Your daughter's smart." "But you know that." "She's an egg-head." "You know..." "I'm not here to make hay." "Or to be on holidays in the countryside." "I don't care about the countryside at all." "I came here because of your daughter." "Because I love her." "There, I said it." "I'm crazy about her." "I never thought I could love someone like this." "I've got it." "Delphine." "Don't you miss Paris?" "No, not really." "When we met, you seemed to like it." "That's because you were there." "If you had been on Mars, I would have liked Mars too." "You're a sweet-talker." "I didn't think one day, I'd miss Paris." "The smell of fumes." "The car horns." "The coffee I drink at the bar before going to work." "Sitting between a worker and a boss, and everyone has the same status for five minutes." "I even miss the cops." "Oh no, don't throw all that." "You're wasting it." " Ah, really?" " Yeah, let me do it." "Hello, Monique." " Hello, Antoine." " How are you?" " Hi." " Hello." "If only... she were to marry him." "That'd be nice." "Why do you say that?" "When she left for Paris, I thought it would never happen." "I thought Antoine would get bored." "But now that she's back..." "I don't see what's stopping them." "Did he ask her?" "He's waiting for her." "That's his way of asking her." "And are you sure Delphine knows that?" "Everybody knows." "And she's got eyes." "Carole, what are you doing?" "I've been looking for you everywhere." "Unless I'm abducted by aliens, I can't see what could happen to me here." "Why are you pissed off?" "Do you realize that your mom thinks you're going to marry Antoine?" "Do you realize that?" "So what." "It makes her happy." "She's allowed to dream." "Yeah, right." "You keep her hoping because it works out well for you." "What do you want me to say to her?" "That we're together?" "Yeah!" "You can't lie to her your whole life." "Maybe she'll stop thinking I'm a Parisian who wants to get back to nature." "I can't rush her out of nowhere." "She doesn't even know such things exist." "Oh right." "Keep thinking your mom's an idiot." "It's convenient for you." "Carole." "Carole." "Please, open the door." "Carole." "Oh, shut up." "No comments." "What?" "What are you trying to do exactly?" "Your mom asked me to set this up." "You're doing it wrong." "You're good at that." "Monique is fond of you now." "She's always asking you to do things." "Yeah, she likes me." "It's a good thing she doesn't know all the dirty we're doing." "Carole." " Hello." " Hello." "He's gonna spread rumors around:" ""Maurice's daughter is a lesbian, hide your... "" "Stop, it's not funny." "Delphine." "It's stuck." "I can't put my hand in it." "Ah, that's it, I got it." "He's coming, he's coming!" "Yes!" "Yes, come on!" " Come on, girl!" " Keep going!" "Yeah." "Yes!" "Here you go." "Your baby." "You scared us, girl." "It was off to a bad start." "Thanks, Antoine." " A coffee, Antoine?" " Yes, please." " Coffee?" " Yeah." "I can't stand it." "I'm going home." "Whatever." "Go back to Manuel too." "I left him for you, remember?" "Did you ever wonder if that wouldn't bother me?" " You turning up like this?" " What?" "What was I going to tell my folks, I'm just supposed to be out and proud?" "That's small." "That's very small of you." "I'm not like you." "I do care what people think." "Say you're ashamed of me while you're at it!" "Shit, I..." "I kept my mouth shut, I said yes to everything..." "It's not other people who look at you." "You're monitoring yourself." "You're your own guardian." " Your own guardian!" " I can't do everything at once!" "I can't manage the farm and be with you!" "You keep saying women must be independent." "Well, I fight everyday so that this farm exists." " That's concrete!" " Yeah, great!" "Congrats!" "You're a pioneer, good for you!" "Great!" "You fight more for your farm than for us!" "You're heartless, Delphine." "All I sacrificed for you!" "Don't you get it?" "I'm here for you!" "Delphine, you found your place?" "Yeah." " You good?" " Yeah, you?" "Have you seen it?" "Where were you?" "We didn't even toast." "It's a nice machine." "Yeah, it's nice." "Kiss me." " What?" " Kiss me." "Why do you do that?" "You have a finger in every pie?" "What?" "I saw you with your girl friend." "I know why she's here." "What do you mean, what did you see?" "Don't take me for a fool, it's even worse!" "Stop." "Antoine." " Antoine." " What game are you playing?" "Huh?" "What do you want?" "You want me to cover for you?" "I won't say a word." "Don't worry about that." "You mean too much for me." "It took you a while to see that machine." "You better?" " Uh?" " Yeah." "My little cowboy." "It's gonna be OK." "It's gonna be OK." "It's OK." "Shh." "Delphine." "Delphine." "07:30 am." " Fuck." " Well, now she knows." "Fuck, fuck, fuck." "It's not happening." "Fuck!" "Don't fucking laugh!" "You weren't awake, so I did the milking." "Thanks." "I forgot the alarm clock." "It won't happen tomorrow." "I hope." "I'm sorry." " I'm gonna go to the market." " OK." "That gives you two hours to leave." "When I'm back, it has to be as if you were never here." " You think Delphine will be OK with this?" " This is my house!" "So I want you to get out, to leave." " Let's talk about this." " No." "My daughter's sane." "She's a good girl." "You damaged her." "You're..." "You're nasty." "I'm the same person you've been working with all these weeks, Monique." "You didn't think I was nasty back then." "Because I didn't know!" "You're a liar" " on top of being a pervert!" " Yes, we lied to you." "But Delphine was afraid to hurt you." "And I agreed to lie, because I love her." "Shut up!" "Shut up." "What are you gonna do now?" "You're gonna tell me the nasty things you did?" "All the disgusting things?" "I don't wanna know!" "It's not disgusting!" "I'm talking about your daughter!" "Get out!" "You're the devil in my house!" "Stop!" "Stop it!" " The devil in my house." " Stop, Monique." "Delphine!" "Delphine!" "I'm leaving!" "I'm catching a train, I can't stay here." "I can't..." "She threw me out!" "Carole." "If you leave, I leave." "I'm coming with you, Carole." "I'm coming with you!" ""Mom, I'm leaving with Carole. "" ""I was too afraid to tell you about myself, but I hope one day you'll get it. "" ""Forgive me for hurting you. "" ""You and Dad will always be in my heart. "" ""I'm still your daughter." "Delphine. "" "Adeline won't believe it." "I'll grab my things, and we'll find a place." "The connection is in 45 minutes." "There's not even a café around." "I'm so hungry." "When we arrive, I'll take you to the restaurant." "A great one." "You're not hungry?" "Not really." "Carole, I can't." "What?" "I don't want to hurt you, but I can't." "That's not possible." "You can't change your mind like this... in an hour, for something this important." "I can't do it." "I can't." "Come with me, I'm begging you." "Delphine." "What was the chance for us to meet?" "One in a million?" "One in two millions?" "We were at the same place at the same time." "If you have gotten in the bus five minutes earlier, you would have never seen me." "We would have never met." "It's a sign!" "I do believe in signs!" "Let's catch this train." " Carole." " We have to go." "Train's coming." "Let's go." "Take your suitcase." "Come on." "Delphine!" "You missed your train?" "No, I came back." "I'm here." "You're back?" "And the other one?" "Carole is back in Paris, she won't return." "Do your parents know?" " Are you afraid?" " No." "Is it gonna hurt?" "No, don't worry." "The doctor is going to do a suction aspiration." "It's a simple, less risky, and painless abortion." "You're three weeks, so you came here at the right time." "Is everything clear to you?" "Yes, I think." "Thanks." "Now, did you ever think about going on the pill?" "I don't know." "Take a pill every day... we don't really know what it does, how it works." "I can explain to you how it works, that way you'll stop imagining things." "Are you on the pill?" "No, I'm not." "Why don't you if it's that good?" "I don't take the pill because I don't need contraception." "I'm with a woman." "You remember Coralie," " we saw her three weeks ago?" " Mm-hm." " She's staying at my place." " Ugh." "Don't "Ugh" me." "She had nowhere to go, and I didn't want to send her to some shelter." "Sigrid." "You're too nice." "It's a quality too." "One day, you'll let people walk all over you." "It's only the third time." "But the timing's good, I was starting to feel lonely." "You OK?" "Yeah, yeah, I'm fine." "Excuse me a minute." ""Dear Carole," "I hope you get this letter." "I wanted to tell you that I left my parents' farm." "What I couldn't do when you were there by my side," "I did it a few years later." "I thought about you a lot." "I follow the movement's news." "I still can't believe everything you achieved." "Now I wonder what cause you're fighting, who you're living with, what you became." "I live in the south now." "I've got my own farm." "It's small but it's mine." "I wish I could go back in time." "Go back to that day on the train, and have the courage I lacked back then, but... that's not possible." "I cried a lot after you left." "But at least, I understand that we can't go back." "We can only move forward." "That's what I'm trying to do now." "Love." "Delphine. "" |
{
"pile_set_name": "OpenWebText2"
} | Skyrox: How did you come up with the idea for The Giving Block? What would be your biggest dream for The Giving Block? Thank you for answering our questions.
We first started talking about the concept of The Giving Block during the 2017 bull run where we saw millions of dollars in cryptocurrency being donated to nonprofits even though not many nonprofits were equipped to accept crypto donations. We then quickly realized that crypto/blockchain could really benefit the nonprofit space whether that be for raising more money in a tax efficient way for donors, or using blockchain for transparency initiatives. Our longer term goal is to encourage every nonprofit to eventually accept cryptocurrency donations just like they would accept credit card donations. Ultimately, we want to bring together the nonprofit and blockchain community.
We love nonprofit strategy, and we love crypto. Combining the two under the umbrella of a sustainable business model is a dream come true. We believe strongly that crypto and blockchain will help nonprofits generate attention and revenue. We also believe that widespread adoption in the nonprofit community will not only drive adoption of the technology, but acceptance as well. It won't just get people exploring crypto, but respecting it and acknowledging its power to improve the world.
mtimetraveller: How can INGOs/NGOs on the blockchain have a greater impact than the regular ones?
Well there can be a tremendously positive impact on a couple fronts here: How can NGOs elevate their own impact with blockchain/crypto: immutable ledgers mean transparency like we've never seen it before. The nonprofits can make sure that funds are reaching the people and causes they ought to. This also means that the donors will get to directly see the impact of their donations.
How can NGO engagement elevate blockchain/crypto: Simply by accepting cryptocurrency donations, nonprofits are casting blockchain in a positive light. When they pilot the technology, or create their own solutions to elevate their impact, the world gets to see blockchain in a positive light. Both of these fronts I believe to be keys to crypto acceptance and, ultimately, adoption.
t5_1r1f2q: You guys have ads on Brave, right? I think I’ve seen them but I just started using brave recently. how successful has the ad campaign been? Do you guys advertise on other platforms as well? And if so how are the stats in comparison?
Our company, The Giving Block does not have ads but our clients, The Human Rights Foundation and Code to Inspire are receiving Ad Grants (and we'll continue to onboard additional nonprofits). On a monthly basis, the ads have resulted in hundreds of thousands of impressions and 20%+ click through rates. From our experience, this click-through rate is significantly higher than other platforms. Brave is likely the best place to advertise for nonprofits that want to engage a very tech savvy (and particularly crypto savvy) user base.
Sammy0881: Can you shed some light on your experience with how Brave and BAT have helped (or not) in realizing the overarching vision that you have? What do you see the biggest challenge downstream and how do you plan to overcome it?
Brave Ads have proven to be a great way for crypto-friendly nonprofits to reach the crypto community. Using Brave is one of the most targeted ways of reaching this community because there isn't an easy way to target the community being in or a part of the community. This gives nonprofits that direct link. It's been very helpful in bringing together the nonprofit and blockchain community. On the challenge front, the biggest challenge is still education for people who have no or little exposure to crypto. We still spend a lot of time educating nonprofit leadership teams on the basics of crypto and why they should care. Like with any new technology, this will improve over time but we are still in the early days. Nonprofits who embrace this technology early on though will be those that benefit most as they are able to build a brand in this space and have a first mover advantage.
Our Brave Ad Grants collaboration has been a phenomenal tool for our nonprofit clients thus far. In my opinion, it's the best way for nonprofits to target the crypto/blockchain community with digital ads, given the makeup of their user base.
mtimetraveller: There are already tons of NPOs out there, so why do we need NPO wallet doing the same job? In what aspect The Giving Block is unique from the rest?
Think of us like a blockchain consultancy for nonprofits. We are not a wallet provider, payment processor or an exchange. Funds never pass through us and always go directly to the nonprofit we are working with. We get them setup to take donations, give them a program that automatically converts those donations to USD (if they request that) and help them build a brand in the crypto community by matching them with partners like Brave.
The first problem we need to solve is not how nonprofits fundraise crypto but, rather, we need to increase the number of nonprofits who understand blockchain/crypto and are ready to leverage it to elevate their impact. We are the ones focused on that. We aren't just looking to satisfy a need. We are working to create a nonprofit ecosystem that understands the technology and can leverage it, and vouch for it. When the nonprofit world is behind the technology, everyone in the blockchain ecosystem is empowered as a result.
WhyAlwaysMe1991: What do you think will be the next BIG step for cryptocurrencies to get global adoption? Would more companies accepting it as payment or government policies allowing the use of it on a large scale or something else?
The biggest barrier to global adoption is that the "blockchain brand" is shrouded in negativity. People don't know that illicit activity constitutes a minuscule percentage of traffic, just like with fiat currency.
In more developed parts of the world, people aren't afraid of the government's power to print money, potentially turning your savings into monopoly money overnight.
People don't understand that if our taxes were collected in crypto, the accompanying immutable ledger would mean that citizens could audit every dollar the government spends, where it's going and when. The list goes on, but there are not enough people in our community trying to educate people on what crypto and blockchain means for human rights, individual sovereignty, institutional accountability, etc… What we need more than anything is for our community to stop turning inward and nodding to the people who already "get it", hiding from the potential disapproval of those who view crypto as nonsense. My recommendation: have the courage to post about this amazing technology, and talk about it at the office, regardless of what your high school friends and colleagues might think at the beginning.
Education is still the largest barrier. We spend more time on education than anything else but see this is the groundwork that needs to be done before we can see real adoption happening. This is like the internet in the 90's. Google "1994 today show what is the internet" and watch that video. That is the stage we are in now. Working with nonprofits is a great way to increase global adoption. They are large organizations with huge marketing engines. When they embrace crypto, it legitimizes it to many of their followers. Nonprofits make great partners for crypto projects because there are so many relevant crypto use cases that elevate the impact of nonprofits whether that be donations, transparency or sending aid more cheaply/quickly.
trieasycx: Do you ever see a future where once the Brave/BAT ecosystem grows to substantial amount that there will be more people willing to use BATs to support charities? How do you see the Giving Block working accordingly with various non-profits and charities to develop a seamless experience for charitable users?
Our hope is that people are already using BAT to tip nonprofit websites and engage with them through Ads. The tips give people an option of donating their BAT they earn from viewing ads to the causes they love without having to reach into their own pocket. Ultimately, we hope this builds a stronger connection between the nonprofit and crypto community in additional ways. Part of this is through the Brave Ad Grants program we've been managing to give crypto-friendly nonprofits (so far the Human Rights Foundation and Code to Inspire) Brave Ads. We'll continue on-boarding additional nonprofits to Brave, growing both awareness and attention for the nonprofit causes and Brave.
On the second piece of your question, we believe that once people are aware of the fact that donating their crypto saves them more money on taxes than fiat donations, crypto donations will occur more frequently. The user experience for crypto donations being as seamless as BAT tipping is a high bar, but we hope to get there.
EddyTarantulo: How is charity with crypto better than regular charities? Is it possible to track how donated crypto travels to the people receiving Charity?
There are a few different pieces to this. Crypto donations provide a new source of revenue for nonprofits and provide donors with a tax efficient way to donate since crypto donations are treated like stock donations (meaning no capital gains tax and can be written off on taxes)
This is a new donor base for nonprofits to engage with and build long term relationships, particularly with a younger demographic that is traditionally not as engaged with nonprofits.
There are a lot of interesting use cases for charities to use blockchain depending on their industry. Transparency, like you alluded to, is one of the big ones. A charity could verify they distributed aid to certain wallet addresses which was previously very difficult in the traditional financial system. Not only can they show the money moving, but they can move the money more cheaply so it allows them to more efficiently distribute that aid. In some cases, that means distributing the aid directly to the end beneficiary and being able to avoid middlemen that might slow down the process or charge additional fees. Right now many of these use cases are still in the early pilot stages. The biggest challenge is spreading crypto adoption to charity partners and beneficiaries so they can interact with the crypto on both ends.
bat-chriscat: How do you see Brave and BAT benefiting nonprofits and charities moving forward? Do you think there is a deep nexus between what BAT is doing with attention, and what charities are doing? (After all, charities and nonprofits want to raise awareness or attention for certain causes!)
The short answer is yes. As Pat likes to say, attention is the new currency. Often we've found that our nonprofits are just as interested in raising awareness as they are raising money (although money is required to do what they do!). Brave specifically is playing an important role in this on two fronts: Our Brave Ad Grants Program: We kicked this off a few months ago and just on-boarded the second nonprofit, Code to Inspire (www.codetoinspire.com). The ads are generating significant impressions and clicks. They are likely the best way for crypto-friendly nonprofits to engage with crypto community. Where else can you target a potential 6+ million tech savvy users? We're looking forward to onboarding additional nonprofits and getting them involved in this community. BAT Rewards: The concept of sharing ad revenue (70%) with the user and allowing them to tip (or in this case, donate) to the cause of their choice is a great way for people to donate money they are earning by viewing ads to their favorite causes. In some cases this might mean people who didn't have the financial means previously now have some extra $ to donate. In other cases this might mean someone is able to support a cause more than they could before. Either way, it’s more money coming from the crypto community and shining a positive light on this space and spreading adoption.
mtimetraveller: If you guys were to compare the BAT project to a superhero, which superhero would it be? Because BAT is also a giving project and care for its users! |
{
"pile_set_name": "Github"
} | import * as React from 'react';
import { observer } from 'mobx-react-lite';
import {
ICON_STAR,
ICON_STAR_FILLED,
ICON_KEY,
ICON_MAGNIFY_PLUS,
ICON_MAGNIFY_MINUS,
} from '~/renderer/constants/icons';
import { ipcRenderer } from 'electron';
import { parse } from 'url';
import store from '../../store';
import { ToolbarButton } from '../ToolbarButton';
const showAddBookmarkDialog = async () => {
const star = document.getElementById('star');
const { right, bottom } = star.getBoundingClientRect();
ipcRenderer.send(`show-add-bookmark-dialog-${store.windowId}`, right, bottom);
};
const showZoomDialog = async () => {
if (store.zoomFactor != 1) {
const zoom = document.getElementById('zoom');
const { right, bottom } = zoom.getBoundingClientRect();
ipcRenderer.send(`show-zoom-dialog-${store.windowId}`, right, bottom);
}
};
const onStarClick = (e: React.MouseEvent<HTMLDivElement>) => {
showAddBookmarkDialog();
};
const onZoomClick = (e: React.MouseEvent<HTMLDivElement>) => {
showZoomDialog();
};
const onKeyClick = () => {
const { hostname } = parse(store.tabs.selectedTab.url);
const list = store.autoFill.credentials.filter(
(r) => r.url === hostname && r.fields.username,
);
ipcRenderer.send(`credentials-show-${store.windowId}`, {
content: 'list',
list,
});
};
ipcRenderer.on('show-add-bookmark-dialog', () => {
showAddBookmarkDialog();
});
ipcRenderer.on('show-zoom-dialog', () => {
showZoomDialog();
});
ipcRenderer.on('zoom-factor-updated', (e, zoomFactor, showDialog) => {
store.zoomFactor = zoomFactor;
if (!store.dialogsVisibility['zoom'] && showDialog) {
showZoomDialog();
}
});
export const SiteButtons = observer(() => {
const { selectedTab } = store.tabs;
let hasCredentials = false;
if (selectedTab) {
hasCredentials = selectedTab.hasCredentials;
}
const dense = !store.isCompact;
return (
<>
{process.env.ENABLE_AUTOFILL && hasCredentials && (
<ToolbarButton
dense={dense}
icon={ICON_KEY}
size={16}
onClick={onKeyClick}
/>
)}
{(store.dialogsVisibility['zoom'] || store.zoomFactor !== 1) && (
<ToolbarButton
id="zoom"
toggled={store.dialogsVisibility['zoom']}
icon={store.zoomFactor >= 1 ? ICON_MAGNIFY_PLUS : ICON_MAGNIFY_MINUS}
size={18}
dense={dense}
onMouseDown={onZoomClick}
/>
)}
<ToolbarButton
id="star"
toggled={store.dialogsVisibility['add-bookmark']}
icon={store.isBookmarked ? ICON_STAR_FILLED : ICON_STAR}
size={18}
dense={dense}
onMouseDown={onStarClick}
/>
</>
);
});
|
{
"pile_set_name": "USPTO Backgrounds"
} | Voicemail is a popular telephone service feature, and is often included in the price paid for telephone service. When a called line with voicemail functionality does not answer or is busy, a call can be handled by a voicemail system. A voicemail system can store recordings and/or announcements for a user. When a call is passed to a voicemail system, the voicemail system can play one or more recordings and/or announcements for the calling party or a generic message and can prompt the calling party to leave a message, for example, a spoken message. The voicemail system can record the calling party's message and store the message, for example, as audio data in a storage device. Call data associated with the message, for example, the calling party's telephone number, the date and time of the call, and the like, can also be stored by the voicemail system and associated with the stored message. Some voicemail systems also allow calling parties to leave alphanumeric messages for a called party. In any event, the voicemail system can store the message or data and associated call data.
Among the close to 100 million cellular telephone service users in the United States, a growing trend includes replacing terrestrial telephone services with cellular telephone services. In the event that a user determines to replace other telephone service with a cellular telephone line, a cellular telephone service may be the user's only telephone number. As such, voicemail service associated with a cellular telephone line can be relied upon by a user to report all missed telephone calls, whether those calls relate to personal or business matters.
The increased reliance upon cellular telephone service has been accompanied by a corresponding increased demand and increased reliance upon other cellular telephone features and functionality, for example, text messaging, email, Internet browsing, data transfer, and other features. As reliance upon and demand for cellular telephone services and voicemail increases, demand for enhanced voicemail services will likely continue to experience a corresponding increase. |
{
"pile_set_name": "Pile-CC"
} | Muddled Vetting
While presidential candidates Barack Obama and John McCain survey the political landscape for running-mate options, they have also found time to pick apart each other’s search committee, criticizing the members’ links to special interests.
Obama’s leading VP vetter, Jim Johnson, was the first to come under fire from Republicans. The former CEO of Fannie Mae resigned from the search committee after being criticized by John McCain for getting mortgages with help from Countrywide Financial Corp., which Obama has condemned for its role in the subprime mortgage mess. The day after Johnson resigned, McCain drew attention to one of the remaining two people on Obama’s search committee, former deputy attorney general Eric Holder. McCain argues that because Holder served under President Clinton during his second term, he is linked to the president’s pardoning of Democratic campaign contributor Marc Rich, a commodities trader who fled the country after being charged with tax evasion. Holder is currently a partner with law and lobbying firm Covington and Burling LLP, which has made nearly $3 million in the first quarter of this year lobbying for such clients as Qualcomm Inc, the Pharmaceutical Research and Manufacturers of America and the National Football League.
The Obama campaign shot back with criticism of the man leading McCain’s VP search, former lobbyist Arthur Culvahouse. According to The Hill, although Culvahouse is no longer registered to lobby, he is the chairman of the firm for which he once lobbied, O’Melveny and Myers. Earlier in Culvahouse’s career, he was a legislative assistant to Howard Baker and then counsel to President Reagan during the Iran-Contra scandal. He began lobbying for O’Melveny and Myers in 1998. In addition to lobbying, Culvahouse uses his own income to play politics. During this election cycle, Culvahouse has donated at least $200 to McCain and $5,000 to McCain’s leadership PAC, Straight Talk for America, CRP has found. The Obama camp might not want to be too critical of the international law firm that Culvahouse leads; individuals at O’Melveny and Myers have given the Obama campaign at least $110,675 compared to just $42,300 for McCain. Interestingly, while lobbying at O’Melveny, one of Culvahouse’s clients was Fannie Mae–the former employer of Jim Johnson.
Except for the Revolving Door section, content on this site is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License by OpenSecrets.org. To request permission for commercial use, please contact us. |
{
"pile_set_name": "OpenWebText2"
} | To Deborah E. Savage, a trip to the doctor was frequently an exercise in humiliation.
For more than 15 years, Savage’s doctors doled out the same advice: You need to stop gaining weight. When Savage replied that she had tried watching her diet and exercising, only to pack on more pounds, it was clear they simply didn’t believe her. Her family was equally skeptical.
“I would eat like my sister, and I would gain weight but she wouldn’t,” recalled Savage, a civil engineer who lives in Montgomery County and turns 31 next month.
[Doctors were startled to find the cause of this 24-year-old’s excruciating pain]
Savage’s inexorable weight gain, which began in middle school and resulted in obesity, was not her only problem: For years, she also struggled with eruptions of painful acne and facial hair. “These things made me feel ugly,” she said.
For years, Debbie Savage kept gaining weight. She was plagued by horrific acne and apathetic doctors. (Courtesy of Debbie Savage)
Last year, after Savage had trouble getting pregnant, an inability she suspected was linked to her irregular periods, she consulted a new obstetrician/gynecologist. The doctor suggested that Savage’s constellation of problems might have a single cause. But it took a second OB/GYN to conduct the proper tests, which led to a definitive diagnosis of a common — and consequential — disorder.
“It’s frustrating to me that so many doctors” didn’t think of this, she said. “If I’d known, I would have made changes years ago.”
Comparisons rankled
From the time she was 12, Savage recalled, her inability to lose weight became one of the defining elements of her life. And because she is short — 5-foot-3 — extra pounds were particularly noticeable. Her family’s comparisons with her older, thinner sister rankled.
[He couldn’t eat, drink or work. And doctors couldn’t explain his searing pain.]
At her mother’s suggestion, Savage joined a gym, but that didn’t help her lose more than a few pounds.
Savage said she was too intimidated to ask her doctors why her weight didn’t budge much, even when she faithfully followed a diet and worked out.
Nor did she mention the other problems that plagued her. “The facial hair thing was embarrassing, so I didn’t want to talk about it,” she recalled. “Same with the acne. I felt so sensitive about it.”
1 of 26 Full Screen Autoplay Close Skip Ad × The case files: Medical mysteries View Photos From a daily afternoon fever to a debilitating reaction to chemotherapy, here’s a look at perplexing medical mystery cases. Caption From a daily afternoon fever to a debilitating reaction to chemotherapy, here’s a look at perplexing medical mystery cases. Doctors were stumped by this 2-year-old boy’s symptoms. He had swollen thumbs, bleeding gums and anemia. He cried whenever anyone touched his legs. Doctors were running out of time. Read the case Cam Cottrill/For The Washington Post Buy Photo Wait 1 second to continue.
Savage wasn’t sure what to make of her irregular menstrual periods, but doctors did not seem concerned. At times she went three months without a period; at other times they lasted for two weeks. She managed to lose a little weight in college, but her acne and other problems persisted.
[Odd teeth: A mother’s Internet sleuthing led to her daughter’s troubling diagnosis]
In her early 20s, Savage said, her gynecologist chided her about how heavy she was; every year, she seemed to gain 10 pounds. “I explained that I had tried diet and exercise, but he said I was not trying hard enough,” Savage recalled.
To regulate her menstrual cycle and tame her acne, the doctor prescribed oral contraceptives, which helped clear her skin and made her periods somewhat less irregular.
When she got married in 2010, Savage and her husband joined a popular weight-loss program to see whether they could motivate each other.
Savage said she lost only about eight pounds after several months, while her husband, who followed the same diet, had no trouble shedding much more weight.
“It was very frustrating,” she recalled. “I was serious about following the rules, but it didn’t pay off. I kind of gave up.”
[A simple test proved that a teen with stomach pain wasn’t a hypochondriac after all]
By early 2015, she was desperate. She had stopped taking the pill nearly a year earlier, in hopes of getting pregnant; without it, her acne had roared back and her facial-hair problem had worsened. Savage was at her heaviest weight — about 240 pounds — and her family doctor warned that her cholesterol, at 210 mg/dL, was too high.
In March, sheswitched gynecologists. Her new doctor zeroed in on her irregular periods and her weight and asked Savage whether she had heard of a metabolic disorder called polycystic ovarian (or ovary) syndrome.
Polycystic ovarian (or ovary) syndrome is a condition that affects up to five million American women, but it often goes undiagnosed. Here are the basics. (Gillian Brockell/The Washington Post)
Savage replied that a friend in college had been diagnosed with PCOS. She was surprised when the doctor responded that she suspected Savage might have it, too.
An explanation at last
PCOS is a common hormonal imbalance that often begins in puberty and affects as many as 10 percent of women. Its cause is unknown, but heredity appears to play a role: Women whose mothers or sisters have the disorder are at higher risk. Many women with PCOS have enlarged ovaries containing fluid-filled cysts that produce excess androgens — male sex hormones, which interfere with ovulation. Other signs of PCOS include irregular, absent or prolonged periods, acne and excess facial and body hair, a condition known as hirsutism.
Because it also disrupts the regulation of insulin, many women with PCOS are overweight or obese. The disorder, which can be controlled but not cured, also increases the risk of Type 2 diabetes, high blood pressure and heart attack.
[Doctors dismissed his pain as migraines. Then they said he had 24 hours to live.]
The gynecologist told Savage that she also suffered from PCOS. When Savage asked whether it was possible to test for the disorder, she said that the gynecologist told her, erroneously, that there were no tests. The best way to treat the problem was to lose weight, the doctor advised. And, the gynecologist added, she held weight-loss seminars in her office and urged Savage to sign up.
Savage declined. Two weeks later, she consulted a third OB/GYN, Neil Horlick, who practices in Montgomery and Frederick counties.
Horlick, after taking her history and performing an exam, said he suspected she had PCOS. When Savage told him she had been told there was no test for it, he assured her that testing was available and that he would order it.
Because abnormalities of the thyroid or adrenal glands can cause similar symptoms, those must be ruled out first. PCOS is essentially a diagnosis of exclusion, made on the basis of blood tests, a patient’s symptoms and an ultrasound of the ovaries.
[At first, this man thought he had food poisoning. It turned out to be something far worse.]
“We generally look for two out of three criteria for PCOS,” Horlick said. These include a history of irregular or absent periods, elevated levels of male hormones, particularly testosterone, and the presence of ovarian cysts. In Savage’s case, an ultrasound showed no cysts, but she did have an elevated testosterone level.
Horlick said he was surprised that Savage’s condition went undiagnosed for so long. “PCOS is always on our radar” when a patient with irregular periods complains of weight gain and hirsutism, Horlick said.
He told Savage that her best chance of getting pregnant involved losing weight. Horlick prescribed metformin, a diabetes drug that can promote weight loss. Metformin is commonly given to PCOS patients and may help promote ovulation as well.
Savage decided to take a new approach to food. She began following a paleo diet, which emphasizes meat, vegetables, nuts and fruit, and drastically reduces the intake of carbohydrates, sugar and processed foods.
The first month, she said, she was elated to discover that she had lost 15 pounds; between April and September, she shed 50 pounds and her cholesterol dropped 20 points. Her acne also improved, her level of testosterone dropped, and her menstrual cycle became more regular.
Savage said she asked relatives whether anyone else had been diagnosed with PCOS. “My parents had never heard of it,” she said.
In October 2015, she and her husband were elated to learn that she was pregnant with identical twin boys. Savage spent six weeks hospitalized at Maryland’s Shady Grove Medical Center under close observation, because her twins have a rare condition in which they share a single amniotic sac and placenta, a condition unrelated to PCOS. The babies were born April 22.
Savage said she hopes that her experience will spare other women from “struggling for years the way I did.”
“This isn’t a bizarre disorder,” she said. “It shouldn’t take [this many] doctors to find out, when I have a textbook case.”
Read more:
He went from playful little boy to a ‘zombie.’ Why wouldn’t the doctors listen?
It seemed like a heart attack, but the tests said no.
He had hallucinations. The doctors said it was dementia, but they were wrong.
Submit your solved medical mystery to [email protected]. No unsolved cases, please. Read previous mysteries at wapo.st/medicalmysteries. |
{
"pile_set_name": "OpenWebText2"
} | 15 sets of any unlocked designs!
+ eat me enamel pin
+ 1 Kickstarter exclusive D20
Prices do not include shipping or fees imposed by your country. Shipping will be charged on top of your order after the Kickstarter concludes via BackerKit. VAT taxes, import fees, customs fees, and duties are not included.
Less |
{
"pile_set_name": "Pile-CC"
} | Where:
Restrictions:
Website:
Related Artists:
Six60 are teaming up with Norwegian duo Nico & Vinz for The New Waves World Tour - taking the two acts across Europe in October and November, before heading downunder for four massive New Zealand dates in January.
The band has spent much of 2017 working on new music, recording in Auckland, London and LA alongside Printz Board, who also produced the band’s platinum second self titled album - an album that remains in the NZ top 40 charts after a staggering 128 weeks.
The band has just touched down in New Zealand after their latest stint in the recording studio in LA, and promise that new music will definitely be included in the setlist for the tour.
Six60 frontman Matiu Walters says that the band can’t wait to get back on stage. “This tour is really exciting because we’ll be travelling across Europe supporting Nico & Vinz in their part of the world, before they come to New Zealand for the first time to support us on the New Zealand dates.”
“We met Nico & Vinz when we were recording in their studio in LA and discovered that we’ve got a lot in common in what we believe about music and the way it affects and connects people, and how our music is influenced by our roots and genres like R&B.”
“The New Waves World Tour represents how music is like the tides that ebb and flow, eventually ending up on the other side of the world. Both bands have got new parts of the world to see, and fresh music to share with our fans."
Nico & Vinz are best known in NZ for their hits ‘In Your Arms’ and ‘That’s How You Know’ and #1 single ‘Am I Wrong’.
Nico & Vinz say “New Zealand has been a market that has supported our music so strongly, so we are really excited to get down there and play in front of the fans. We saw some of the footage of Six60 tours from the past and it's exciting to think about playing in front of such a passionate incredible crowd.”
Also joining the tour is Kiwi hip hop musician and producer Kings, who burst on the scene last year with ‘Don’t Worry ‘Bout It’ seeing him named Breakthrough Artist of the Year at the Vodafone New Zealand Music Awards last year his continuing success garnering him four Vodafone Pacific New Zealand Music Awards this June. |
{
"pile_set_name": "Pile-CC"
} | Sigmund Freud called dreams the “royal road to the unconscious,” but to bestselling author and world-renowned dream explorer Robert Moss, they are more: portals to the imaginal realm, a higher reality that exists at the intersection of time and eternity.
The traveler’s tales in Moss’s new book, Mysterious Realities: A Dream Traveler’s Tales from the Imaginal Realm, are just-so stories in the sense that they spring from direct experience in the many worlds. As you journey from the temple of the Great Goddess at Ephesus to an amazing chance encounter on an airplane, from Dracula country in Transylvania to the astral realm of Luna, you’ll confirm that the doors to the otherworld open from wherever you are. You’ll see what it means to live on a mythic edge and to make a deal with your personal Death for a life extension. At any moment, you may fall, like the author, into the lap of a goddess or the jaws of an archetype.
In ancient and indigenous understanding, dreaming is traveling. In big dreams, we make visits and receive visitations. We travel across time and space and to places where the dead are alive, as well as to alternate realities. Once we connect with our dreams and wake up to what is going on, we can begin to develop the practice of lucid dream travel.
An ideal departure lounge is the half-dream state of what sleep researchers call hypnagogia. In the middle of the night or the early morning, you find yourself drifting between asleep and awake. If you can train yourself to maintain a state of relaxed attention in this in-between state, you will notice that you may be receiving a whole menu of possibilities for lucid dream travel.
This twilight state is a good place to become aware of your ability to travel beyond the body. I often find myself lifting out of the body quite effortlessly in this state. Sometimes when I am very tired, I simply rest half in and half out of my physical form. Sometimes I float up to the ceiling. Quite often I like to go flying like a bird to places far away.
This is one of the royal roads to lucid dreaming. The other is a practice I call “dream reentry,” which is when a dream has some energy and you choose to consciously go back into the dream to continue it. You may want to reenter a dream to clarify what was going on, or talk to your deceased grandmother, or explore a parallel world, or scout out a possible future. You may need to reenter a dream because there are terrors to be overcome, or a mystery to be explored, or simply because you were having fun and adventure and would like to have more.
Many of the stories in Mysterious Realities involve awakening to the possibility that we are living parallel lives in parallel worlds. How can we explore our own parallel worlds?
In physics, the hypothesis of the “Many Interactive Worlds” suggests that we live, right now, in one of countless parallel universes that impact one another. Part of the secret logic of our lives may be that our paths constantly interweave with those of numberless parallel selves. The gifts and failings of these alternate selves may influence us in ways that we generally fail to recognize.
We are connected to our parallel selves in a multidimensional drama, and this may generate events in all our parallel lives that may appear as “chance” to those who do not understand the trans-temporal patterns. The hidden hand suggested by synchronistic events may be that of another personality within our multidimensional family, reaching out to us from what we normally perceive as “past” or “future” or from a parallel or other dimension.
When we experience déjà vu and feel certain that we have been in a certain situation before, this may mean that we are close on the heels of a parallel self. Serial dreams, in which we find ourselves returning to the same people and places, may also be glimpses of a continuous life of a parallel self in a parallel world, in which different choices were made. Physicist Brian Greene speculates that we all have “endless doppelgangers” leading parallel lives in parallel universes.
Once you have mastered serial dreaming, you may be ready to journey as a lucid dream traveler into a parallel life to dismiss old regrets and claim gifts and knowledge from your selves who made different choices. This can effect a quantum shift in your present reality and life story.
The stories in Mysterious Realities are full of encounters with the dead, both interactions with the deceased and visits to places where the dead are living on the Other Side. Is contact with the deceased really as natural and easy as you suggest?
I am often among the dead in my dreams. Sometimes I remember that they are dead, and other times I don’t. My father has come many times since his death with helpful advisories for me and our family. Sometimes my dream travels take me to new environments on the Other Side where the dead are enjoying new lives. They show me around, and I learn firsthand about this new lifestyle and the real-estate options available after death.
Contact with the deceased, especially in dreams, isn’t weird or unusual or even truly supernatural. It happens for any of three reasons: the dead have never “left” and are still with us; the dead want to visit us from wherever they are; or we travel to the realms of the dead where they are now living.
The immense body of scientific research and data on near-death experiences (NDEs) is evidence of the survival of consciousness after the physical body has closed down. When you become a conscious dream traveler, you confirm through your own experience that awareness is not confined to the body and brain and therefore is able to survive death. You are ready to learn that healing and forgiveness are always available across the apparent barrier of death and to develop your personal geography of the afterlife.
One of the most interesting things I have learned is that the living may be called upon to play guides and counselors for the dead. “The Silent Lovers” in Mysterious Realitiesis a just-so story about interacting with the dead. It was quite shocking to me as it unfolded — I was called to play advocate for a dead man who was otherwise a stranger. Irish poet William Butler Yeats was right when he said with poetic clarity that the living have the ability to “assist the imaginations of the dead.”
Your book’s subtitle is A Dream Traveler’s Tales from the Imaginal Realm. What is the “imaginal realm?”
There is a world between time and eternity with structures created by thought that outlast anything on Earth. This is the imaginal realm. You may enter it through the gate of dreams, or the gate of death, or on nights when you drop your body like a bathrobe. Here you will find schools and palaces, places of adventure, healing, and initiation.
The imaginal realm is a fundamental ground of knowledge and experience. In this realm human imagination meets daimons — take on guises humans can begin to perceive and understand.
The great medieval Sufi philosopher Suhrawardi insisted both on the objective reality of the imaginal realm and that the way to grasp it is the way of experience: “Pilgrims of the spirit succeed in contemplating this world, and they find there every object of their desire.” To know the realm of true imagination, you must go there yourself. Happily for you — once you wake up to what is going on — the doors may open to you any night in dreams, or in the fertile place between sleep and waking, or in a special moment of synchronicity when the universe gets personal.
# # #
Robert Moss is the author of Mysterious Realities and numerous other books about dreaming, shamanism, and imagination. He is a novelist, poet, independent scholar, and the creator of Active Dreaming, an original synthesis of dreamwork and shamanism. He leads creative and shamanic adventures all over the world. Visit him online at www.mossdreams.com. |
{
"pile_set_name": "FreeLaw"
} | 434 F.2d 648
Maurice R. DYER, Petitioner-Appellant,v.Bert M. ROSENBERG, Defendant-Appellee.
No. 25259.
United States Court of Appeals, Ninth Circuit.
Nov. 25, 1970.
Maurice R. Dyer, in propria persona, for petitioner-appellant.
No appearance for defendant-appellee.
Before BROWNING, DUNIWAY and TRASK, Circuit Judges.
PER CURIAM:
1
Dyer retained Rosenberg, an attorney, to defend him in a California criminal prosecution. Dyer was convicted and appealed. He alleges that his appeal was dismissed because Rosenberg failed to file an opening brief on appeal. The District Court dismissed for want of jurisdiction, and we affirm.
2
Dyer rests jurisdiction on 28 U.S.C. 1343, which confers jurisdiction of actions for violation of the Civil Rights Act of 1871, 42 U.S.C. 1983. That section does not apply here. Rosenberg was not acting 'under color of' state law. Kregger v. Posner, E.D.Mich. 1966, 248 F.Supp. 804, 806. See also Mulligan v. Schlachter, 6 Cir., 1968, 389 F.2d 231, 233, where the defendant had been the plaintiff's court-appointed counsel in the state case.
3
Affirmed.
|
{
"pile_set_name": "Pile-CC"
} | I'm done with cliche New Year's Resolutions. Like, go to the gym more, or eat less processed foods. #LA My New Year's Resolution is to GET MORE ATTENTION. Here's how I am going to get more attention this year -)
This video was taken last year when I went to visit my brother Joe who recently moved with his company to Florida. I will be moving to Florida soon with my family and get a job there or trying to get a transfer from my job. Also, as I mention to this video, my plan to go to Colombia to see my grandmother and my relatives. Then I have come through a decision to meet with one of the models who have sites in Europe as I pvt with them recently.
This was video taped at my brothers Joes house last year when we decided to move to Florida this year for the new year resolution. All Joes friends were there to say goodbye for him for his new home, new job and new house there in Florida. He already installed and living in Florida now. Happy New Year to All! |
{
"pile_set_name": "Pile-CC"
} | Concrete5 Version 5.7 is now Released!
The much anticipated release of Concrete5 content management system version 5.7.0 is now available. This version is the largest release by the Concrete5 team since 5.5. New interfaces, new tools and some pretty slick functional changes come with this big release. So is it time for you to upgrade?
In Pixo's opinion, although this release has some great stuff you will want to wait a few weeks until you start using it. With any CMS release there will be bugs and some minor performance issues that will be in any new release. The Concrete5 team is usually pretty quick in coming out with a new release within weeks of the .0 release and that is anticipated for this release. As Andrew Embler with the Concrete5 team has stated, "5.7.0 is not as fast as 5.7.1 will be. We have a long history of building big new stuff in a .0 release and then optimizing in a .1 release. Expect more attention to performance in the next version."
A possibly bigger issue with using 5.7.0 is possible problems with add-ons and themes that your site is using that might not be compatible with the latest release of Concrete5. Often developers tend to be kind of slow in putting out upgrades with the latest release so it often works to your advantage to wait a week or two until after the release of 5.7.1 to upgrade your website.
Having said all of that, version 5.7 is a leap forward for the content management system. Once a user becomes familiar with the new interface (which will take a bit of time) we believe that most concrete5 users will find this latest release will have a multitude of advantages and only help a businesses website.
It is worth noting, that at this time there is no way to upgrade from version 5.6 to 5.7. I'm guessing that may come in the future, but at this time because of permissions and other issues there is no way to do that.
Some highlights of what comes in version 5.7:
A completely new layout engine allows for inline editing of content, layouts and style customization. Blocks can be dragged into the page and easily rearranged.
The Dashboard user interface is completely updated. Navigating it is much easier, and the interface is much more attractive.
concrete5's user interface is now powered by Bootstrap 3.
The concrete5 Dashboard, main toolbar and Elemental theme are all fully responsive.
Themes can optionally refer to grid frameworks, and can have full grid support built in. Layouts have been substantially updated to support these grid frameworks (as well as be fully responsive.)
Theme controllers can control many aspects of a theme, including its grid framework, custom CSS classes that are available for different block types, which assets a theme supports, and more.
Theme customization is completely rewritten, far more powerful and based on LESS.
A completely new image editor is now built-in. Resize and crop images, and add filters.
Conversations are now built-in, with the Conversations block replacing the Guestbook block. Conversations is a reusable, object-oriented way to build conversations throughout a site, and use the same system for powering a guestbook as ultimately powering a forum. Conversations features threading, asynchronous loading, file attachments, spam filtering, flagging, rating and more.
Tags:
Concrete5, CMS, content management system
For more information about this blog or Concrete5 please contact Jamie Johnson. |
{
"pile_set_name": "Github"
} | using System.Collections.Generic;
using System.Runtime.Serialization;
using ServiceStack.Model;
using ServiceStack;
namespace RedisAdminUI.ServiceModel.Operations.Hash
{
[DataContract]
public class HashContainsEntry
: IHasStringId
{
[DataMember]
public string Id { get; set; }
[DataMember]
public string Key { get; set; }
}
[DataContract]
public class HashContainsEntryResponse
{
public HashContainsEntryResponse()
{
this.ResponseStatus = new ResponseStatus();
}
[DataMember]
public bool Result { get; set; }
[DataMember]
public ResponseStatus ResponseStatus { get; set; }
}
} |
{
"pile_set_name": "Pile-CC"
} | The kitchen isn't just for cooking. It's for making memories.
Archive
Monthly Archives: March 2015
“Abuela’s Kitchen”YouTube Channel has done far more than I ever imagined. You probably don’t know the process of how we go about video taping a dish because I really haven’t shared it. It begins with discussing possible dishes. It’s really a family affair. Most of the time we discuss it face to face and on busy occasions we talk it over the phone. When we have face to face contact, Abuela, my mom, my Uncle Art and myself sit around over coffee, tea, water and Coke ( you can probably guess who has what). Everyone brings up different dishes. Abuela, being a Ghost-Social Media addict, begins to bring up all the dishes left by those that comment on any of the platforms. My mom brings up dishes she remembers growing up (she is a true foodie) and Uncle Art nods away in agreement or disagreement. I write down all their suggestions. We consider the season we are in, your requests and of course, what we want to taste in the near future. 😛 We finally arrive at a consensus after much deliberation. Sometimes we throw away all deliberation if Abuela is adamant about a particular dish. So we all give in.
On a usual Monday, I shoot her a text about 9:00 a.m. telling her I’m about to leave to pick her up. If everything is a go, she won’t respond. If she calls; something has come up. 9:30 am I head out on my 20 minute drive to get her. I pull up and turn off the car, go through my phone knowing it will still be a while before we leave. Before I know it, she is at the fence waving with her 2 … 3 dogs at her side (Solovino a Chihuahua that recently stopped by her house and never left.). I get out of the car, we have our usual exchange of words, “Que Honda Abuela?”. “Aqui nomas corriendo limpiando el cochinero. Pasale a lo barrido.” She zooms past me into the kitchen where she is cooking all kinds of crazy things. She drops everything she is doing. If she is cooking, she doesn’t care if the food is half cooked. She begins to show me what she already has bought for the dish we will be video taping. I patiently watch as she shows me every single item and explains how the dish goes. She hands me the bags, and dashes to her room to get her cleanly pressed apron. Her loud-crazy birds start squawking like crazy and she begins to fight with them, “Callense animales!” The exchange goes on for a while. Then she exclaims in a surprised voice, “Las Cocas!!!!” She runs back into the kitchen and pulls out cold Cokes for everyone who will be at the taping and puts them in a plastic grocery bag. We head to the car, pack it up, get in and start it up. “Ayyyy se me olvido XYZ!!!” And out jumps Abuela. She is running around like crazy, meanwhile I’m freaking out about her falling as she runs around. And then we are off to the store to pick up whatever we still need.
The day is a memorable adventure, but my FAVORITE part is our drive. I’m driving and she is in the passenger side talking her little head off. We have all kinds of conversations and array of topics. I have learned so much about her life when she was young, about my Great-Grandmother- another wonderful lady that I had the honor of actually spending time with as a kid. I have learned more about her home town of Purepero, Michoacan, about my Abuelo, about her life experiences, and even current events. And she keeps me up to date on the family. All this in our weekly 20 minute drives (not counting random lunches or hang outs). But those particular 20 minutes, just her and I, have opened up a whole other world to me that one day will be gone. Those 20 minutes have become our time warp… our time… that will live in me forever.<3 |
{
"pile_set_name": "StackExchange"
} | Q:
Disabling viewport attribute for Firefox on Android
For an unknown reason this command creates problems on Firefox for Android. It is located in the header above the javacript copied below and is working on all other mobile systems.
<head>
<meta name="viewport" id="viewport" content="user-scalable=0"/> <!--320-->
So, in order to disable it for Firefox Android I implemented this javascript (reversing the scalable to =1):
<script>
var is_android = ua.indexOf("android") > -1;
var is_firefox = ua.indexOf('firefox') > -1;
if(is_firefox && is_android)
{
alert ('pouet'); /// working - I get the alert on Firefox Android only
document.getElementById("viewport").setAttribute("content", "user-scalable=1");
}
</script>
</head>
The reversing process do not work and I wonder why. Thanks for your help.
A:
Here is my workaround, I set up the viewport tag only with this script:
var ua = navigator.userAgent.toLowerCase();
var is_android = ua.indexOf("android") > -1; //&& ua.indexOf("mobile");
var is_firefox = ua.indexOf('firefox') > -1;
if(is_firefox && is_android)
{
// alert ('FF');
document.write('<meta name="viewport" content="user-scalable=1"/><!--320-->');
} else {
// alert ('NoFF');
document.write('<meta name="viewport" content="user-scalable=0"/><!--320-->');
}
|
{
"pile_set_name": "StackExchange"
} | Q:
Idiomatic F# - Simple Statistical Functions
As part of a simple challenge I am to write a couple of simple statistical functions by scratch and I'm trying to write them in the most "idiomatic F#" way possible. I am fairly new to Functional Programming so I'm looking to learn how to create simple stuff from the start.
Here's what I have so far:
let mean (x : float list) : float =
(List.sum x) / (float (List.length x))
let variance (x : float list) : float =
x
|> List.map (fun a -> pown (a - (mean x)) 2)
|> mean
let stdDev =
variance >> Math.Sqrt
I like how the stdDev function is defined using composition but I get the feeling there might be some prettier, more idiomatic way of defining the first two.
Any suggestions?
A:
Your code is perfectly fine and idiomatic.
Personally, I prefer one liners whenever possible. That way I can align the code to highlight similarities and differences between the functions. Patterns just jump at you that way.
let mean x = (Seq.sum x) / (float (Seq.length x))
let variance x = let m = mean x
x |> Seq.map (fun a -> pown (a - m) 2) |> mean
let stdDev x = x |> variance |> Math.Sqrt
I also prefer seq to list because they can be used with lists, arrays, sets or any other sequence.
do [| 5. ; 6. ; 7. |] |> stdDev |> printfn "%A"
do [ 5. ; 6. ; 7. ] |> stdDev |> printfn "%A"
Set [ 5. ; 6. ; 7. ] |> stdDev |> printfn "%A"
seq [ 5. ; 6. ; 7. ] |> stdDev |> printfn "%A"
seq { 5. .. 7. } |> stdDev |> printfn "%A"
In F# is better to avoid the >> composition operator and use the pipe |> instead.
There are many issues with composing functions like that. For instance the above code would not be possible (using different types like lists and arrays).
|
{
"pile_set_name": "PubMed Central"
} | Introduction {#Sec1}
============
Neutral sphinghomyelinase 2 (nSMase2) catalyzes the formation of ceramide, a required step in the formation and release of extracellular vesicles (EVs)^[@CR1]^. EVs are involved in intercellular communication underlying many physiological and pathological processes^[@CR2]--[@CR4]^. While transient increases in nSMase2 activity are part of normal physiological function, chronic inflammation, largely through TNFα and IL-1β signaling, is known to upregulate nSMase2^[@CR5]^. Upregulation of nSMase2 activity is associated with cognitive impairment in HIV infection^[@CR6]^, and with plaque deposition in AD^[@CR7],[@CR8]^. Moreover, astrocyte-derived EVs (ADEVs) isolated from the plasma of AD patients contain increased amounts of complement proteins, implying that glial activation leads to the release of EVs that may play some role in regulating innate immunity^[@CR9]^. Our group has shown that brain inflammation, a common theme in many neurodegenerative disorders^[@CR10]^, can trigger the release of EVs from astrocytes which primes the infiltration of immune cells into the brain via upregulation of cytokines in the periphery^[@CR11]^. Taken together, inhibition of EV secretion through inhibition of nSMAse2 is emerging as a novel avenue for the treatment of diseases associated with aberrant exosomal intercellular communication^[@CR11]--[@CR13]^. Unfortunately, limitations of currently available nSMase2 inhibitors have prevented a detailed evaluation of the role of nSMase2 in disease models and the advancement of drug-like nSMase2 inhibitors to the clinic. Currently available nSMase2 inhibitors have low potency (IC~50~'s in µM level), poor aqueous solubility, and/or limited brain penetration. GW4869^[@CR14]^, the most widely used inhibitor, has low inhibitory potency (IC~50~ = 1 µM) in biochemical assays and very poor solubility (practically insoluble in water with poor solubility in organic solvents such as DMSO (0.2 mg/ml). These attributes have hampered GW4869′s clinical development. Cambinol, an inhibitor our group identified from a pilot screen of commercially available small chemical libraries^[@CR15]^ showed better solubility, but it was metabolically unstable and exhibited a poor *in vivo* pharmacokinetic profile. Chemistry efforts by our laboratory to improve cambinol's potency (IC~50~ = 5 µM) and stability were unsuccessful. Herein, we report on a high throughput screening (HTS) campaign of over 365,000 compounds that identified a potent inhibitor of nSMase2 termed DPTIP, with an excellent pharmacokinetic profile including significant brain penetration, which was capable of dose-dependently blocking EV release from primary astrocytes. Moreover, in a mouse model of brain inflammation that recapitulates common features of neurodegenerative diseases, DPTIP potently inhibited IL-1β-induced ADEV release, peripheral cytokine upregulation and neutrophil migration into the brain.
Results and Discussion {#Sec2}
======================
Development of a 1536-well cell-free human recombinant nSMase2 enzyme activity assay {#Sec3}
------------------------------------------------------------------------------------
Human nSMase2 catalyzes the hydrolysis of sphingomyelin (SM) to phosphorylcholine and ceramide. As we reported previously, we used the Amplex Red system to monitor nSMase2 activity^[@CR15]^. In this reaction, one of the enzymatic products, phosphorylcholine, is stoichiometrically converted through a series of enzyme-coupled reactions to fluorescent resorufin, so that fluorescence signal is directly proportional to nSMase2 activity (Fig. [1A](#Fig1){ref-type="fig"}). An enzymatic assay protocol was developed in 1536-well format for implementation for HTS. Several parameters were first optimized through the measurement of the fluorescence signal. Fluorescence signal increased with longer times of incubation (15--150 min) and increasing nSMase2 concentrations (0.03 to 0.5 µg protein/mL) at a constant SM concentration (20 µM) (Fig. [1B](#Fig1){ref-type="fig"}). Similarly, fluorescence signal increased with longer time of incubation (30--150 min) and increasing SM concentrations (5--40 µM) at a constant enzyme concentration (0.063 µg protein/ml) (Fig. [1C](#Fig1){ref-type="fig"}). Based on these results, we chose 0.1 µg protein/mL human nSMase2 cell lysate, 20 µM SM in a total volume of 4 µL and 2 h incubation at 37 °C to assess assay performance in HTS format. Under these conditions, reaction rate was linear with a robust fluorescence signal of approximately 2500 relative fluorescent units (RFU). Cambinol was used as the positive inhibitor control^[@CR15]^; it was pre-incubated with human nSMase2 for 15 min prior to addition of SM. Final DMSO concentration was 0.57%. The assay exhibited signal/background = 21 and Z' = 0.8 (Fig. [1D](#Fig1){ref-type="fig"}). We also evaluated the dose response of inhibition by cambinol and GW4869 to determine variability in the IC~50~ values from plate to plate. GW4869 was insoluble in DMSO and appeared as a yellow pellet at the 3 highest concentrations so it was excluded as a positive control. Cambinol's average IC~50~ from 4 independent determinations was 27 ± 1 µM (Fig. [1E](#Fig1){ref-type="fig"}). The final stage of validation of the assay for HTS was the screening of the Library of Pharmacologically Active Compounds (LOPAC) in 1536-well plates using the same assay conditions at four different inhibitor concentrations (0.4, 2, 11 and 57 µM). Overall, the sample field was even, there were no plate positional effects and the number of active hits increased as the concentration increased.Figure 1Validation of the human nSMase2 fluorescence-based assay in 1536-well format to screen for inhibitors of the enzyme in dose response quantitative HTS. (**A**) Schematic representation of the assay - Human nSMase2 catalyzes the hydrolysis of sphingomyelin (SM) to ceramide and phosphorylcholine. Using alkaline phosphatase, choline oxidase, horse radish peroxidase and Amplex Red, phosphorylcholine is stoichiometrically converted through enzyme-coupled reactions to fluorescent resorufin; fluorescence is directly proportional to nSMase2 activity. (**B**) Dependence of fluorescence signal on time of incubation (in min) at several enzyme concentrations (0.03 to 0.5 µg protein/µL) in the presence of 20 µM SM. (**C**) Dependence of fluorescence signal on time of incubation at different SM concentrations (0.005 to 0.04 mM) in the presence of 0.063 µg protein/µL. (**D**) Scatter plot of fluorescence signal from a 1536-well assay plate. - Human nSMase2 cell lysate (0.1 µg/µL) was incubated with SM (20 µM) and coupling reagents for 2 h at 37 °C before measuring fluorescence. When using cambinol as positive control, compound was preincubated with human nSMase2 for 15 min. Column 1: Cambinol dose response. Column 2: Negative control (no enzyme). Column 3: Positive control (bacterial SMase 0.02 U/mL). Columns 4--48 human nSMase2 (Final DMSO concentration: 0.57%). Fluorescence signal is expressed as relative fluorescent units (RFU) on the y-axis. Plate number is shown on x-axis. (**E**) Dose response of inhibition of nSMase2 by cambinol, a known inhibitor of nSMase2^[@CR15]^. -- Wells contained cell lysate prepared from cells expressing nSMase2 (0.1 µg/µL) and SM (20 µM) with increasing concentrations of cambinol as indicated. During the screen, cambinol was used to track plate-to-plate variability; it was delivered onto each plate in 16 doses, at 1:2 dilutions in the range 285 µM -- 17 nM.
HTS campaign and data analysis of hits led to the identification of seven potent nSMase2 inhibitors {#Sec4}
---------------------------------------------------------------------------------------------------
Following assay validation, we screened 365,000 compounds from the Molecular Libraries Small Molecule Repository (MLSMR) and 2816 compounds from the NCGC pharmaceutical collection (NPC) library for human nSMase2 inhibitors. Compounds were screened at 4 concentrations: 1.1, 11, 57 and 114 µM. Cambinol (full dose response in each plate) was used as positive control. After eliminating promiscuous compounds, 1990 compounds that had maximal inhibitory responses \>50% at the highest concentration tested and robust curve response classes (CRC)^[@CR16]^ were selected for re-testing in the same human nSMase2 activity assay and counter screen. The purpose of the counter screen was to identify false positives, i.e., compounds that inhibited the enzyme-coupled reactions of the assay system; it was carried out in the absence of human nSMase2 and SM and using phosphorylcholine as substrate. Out of the 1990 compounds, 1782 (90%) were confirmed in the 7 dose-response hnSMase2 confirmatory assay, but most (1718; 86%) were found to be false positives in the counter screen, resulting in 64 bona fide nSMase2 inhibitors. We also considered the difference between potency and response in the counter screen to select 156 additional hits that showed robust inhibition of the overall reaction, but were weakly active in the counter screen. There were a total of 220 compounds for follow-up confirmation (Fig. [2A](#Fig2){ref-type="fig"}). Out of the 220 compounds tested, 7 compounds exhibited dose responses with IC~50~ ≤ 10 µM that were also inactive in the counter assay (Fig. [2B](#Fig2){ref-type="fig"}).Figure 2Identification of nSMase2 inhibitors from qHTS. (**A**) Flowchart illustrates the filtering of HTS hits that led to the confirmation of 7 nSMase2 inhibitors with IC~50~ \< 50 µM that were inactive in the counter assay. CRC: curve response classes. (**B**) Structures of the 7 human nSMase2 inhibitors with corresponding IC~50~s for inhibition of human nSMase2. None of these compounds showed inhibition in the counter assay at 100 μM.
DPTIP is the most potent nSMase2 inhibitor reported to date {#Sec5}
-----------------------------------------------------------
Filtering of the HTS hits as outlined above resulted in the identification of MLS000523327 or DPTIP (2,6-Dimethoxy-4-(5-Phenyl-4-Thiophen-2-yl-1H-Imidazol-2-yl)-Phenol) as the most promising compound based on potency and chemical optimization feasibility. The IC~50~ for DPTIP using an extended inhibitor concentration range (10 pM -- 100 µM) was 30 nM (Fig. [3A](#Fig3){ref-type="fig"}). This IC~50~ is 30- and 160-fold more potent than the prototype inhibitors GW4869 (1 µM)^[@CR14]^ and cambinol (5 µM)^[@CR15]^. To our knowledge, this is the first nSMase2 inhibitor described with nanomolar potency. Because DPTIP contains a hydroxyl group which could be a metabolic liability *in vivo* (Fig. [3A](#Fig3){ref-type="fig"}), we determined the importance of this group for inhibitory activity. We synthesized the des-hydroxyl analog of DPTIP (Fig. [3B](#Fig3){ref-type="fig"}) and showed that it was inactive against human nSMase2 (IC~50~ \> 100 µM) (Fig. [3B](#Fig3){ref-type="fig"}). These results demonstrate the importance of the hydroxyl group for inhibition, and also provide a structurally similar inactive DPTIP analog for use as a comparison compound in subsequent pharmacological assays.Figure 3Inhibition of nSMAse2 by (**A**) DPTIP and (**B**) des-hydroxyl analog **-** Human nSMase2 (0.1 µg/µL) was added to a reaction mixture containing SM (20 µM), coupling reagents and DPTIP or JHU3398 in the 10 pM -- 100 µM range. Percent inhibition was obtained from \[(rate of change of fluorescence in the presence of inhibitor divided by rate of change of fluorescence in the absence of inhibitor) × 100\]. Each data point corresponds to the average of two independent experiments run in replicate. Error bars correspond to S.E.M. (**C**) Rate of reaction vs concentration of SM in the presence of several DPTIP concentrations. Human nSMase2 cell lysate (0.1 µg/µL) was incubated with increasing concentrations of SM and coupling reagents for 2 h at 37 °C before measuring fluorescence. V~max~ and K~m~ values were obtained from non-linear regression fits to Michaelis-Menten kinetics using prism.
DPTIP exhibited non-competitive mode of inhibition and showed selectivity for nSMase2 versus related enzymes {#Sec6}
------------------------------------------------------------------------------------------------------------
DPTIP exhibited the hallmarks of noncompetitive inhibition; when the rate of reaction with respect to SM concentrations was monitored at increasing inhibitor concentrations, there was a decrease in maximal rate (V~max~) while the Michaelis constant (K~m~) was unchanged (Fig. [3C](#Fig3){ref-type="fig"}). V~max~ and K~m~ for each data set at a given inhibitor concentration were obtained from non-linear regression fits to Michaelis-Menten kinetics (Fig. [3C](#Fig3){ref-type="fig"}).
DPTIP did not inhibit members of two related enzyme families including alkaline phosphatase (IC~50~ \> 100 µM in counter screen), a phosphomonoesterase, or acid sphingomyelinase (IC~50~ \> 100 µM), a phosphodiesterase closely related to nSMase2 (results not shown). Inhibitor selectivity with respect to enzymes from related families is consistent with a noncompetitive mode of inhibition, as DPTIP is likely acting at a site other than the catalytic site. Additional data also indicate that DPTIP exhibits specificity for nSMase2; DPTIP has been screened in 759 bioassays assays at NCATS and only weak activity (2--50 µM) was observed in 19 (2.5%) of these assays. (<https://pubchem.ncbi.nlm.nih.gov/compound/5446044#section=BioAssay-Results>).
DPTIP showed metabolic stability in mouse and human liver microsomes {#Sec7}
--------------------------------------------------------------------
One potential liability when using chemical probes *in vivo* is lack of metabolic stability which structurally inactivates the compound before it can reach its molecular target. We evaluated DPTIP for metabolic stability using human and mouse liver microsomes as we have previously described^[@CR17]^. Percent of drug remaining over time was determined by liquid chromatography--tandem mass spectrometry analysis (LC/MS/MS). In the presence of NADPH, DPTIP remained intact (100% remaining at 1 h) in both mouse and human liver microsomes (Fig. [4A](#Fig4){ref-type="fig"}) indicating that the compound is not affected by CYP-450-mediated metabolism. These *in vitro* results indicate DPTIP does not have major liver metabolic liabilities that would preclude its use as an *in vivo* probe.Figure 4Metabolic stability and *in vivo* pharmacokinetics of DPTIP. (**A**) Metabolic stability in mouse and human liver microsomes. DPTIP was stable in mouse and human liver microsomes fortified with NADPH suggesting stability to phase I oxidation. (**B**) Plasma and brain profiles and pharmacokinetic parameters following 10 mg/kg IP dose showed DPTIP to be a brain penetrable compound with AUC~brain~/AUC~plasma~ = 0.26. Brain levels of the compound exceeded its IC~50~ for nSMase for 4 h post dose.
DPTIP exhibited plasma exposure and brain penetration after systemic dosing in mice {#Sec8}
-----------------------------------------------------------------------------------
In the next set of experiments, we evaluated the *in vivo* pharmacokinetic profile of systemically administered DPTIP. Mice were given DPTIP (10 mg/kg IP) and plasma and brain levels of DPTIP were measured at 0.25, 0.50, 1, 2, 4 and 6 h post dose (n = 3 per time point). DPTIP peak concentration in both plasma and brain was at 0.5 h (C~max~ plasma = 11.6 ± 0.5 µM; C~max~ brain = 2.5 µM) (Fig. [4B](#Fig4){ref-type="fig"}). The AUC~0-∞~ of DPTIP in plasma and brain was 10 ± 1 and 2.6 ± 0.5 µM\*h, respectively, resulting in an AUC~brain~/AUC~plasma~ = 0.26. Brain levels of DPTIP exceeded its IC~50~ for inhibition of nSMase2 up to 4 h following 10 mg/kg systemic dosing (Fig. [4B](#Fig4){ref-type="fig"}).
DPTIP inhibited EV release from primary astrocytes whereas its inactive analog had no effect {#Sec9}
--------------------------------------------------------------------------------------------
Independent laboratories have shown that pharmacological and genetic inhibition of nSMase2 blocks EV secretion from glial cells^[@CR12]^. Consequently, we evaluated DPTIP for its ability to inhibit EV release from primary glial cells *in vitro*. Mouse primary astrocytes were activated by FBS withdrawal as we have previously described^[@CR11]^ and treated with DPTIP or its closely related inactive des-hydroxyl analog (Fig. [5A](#Fig5){ref-type="fig"}) at a dose range of concentrations (0.03--30 µM) using DMSO (0.02%) as vehicle control. Two hours after treatment, EVs were isolated from the media and quantified by nanoparticle tracking analysis. DPTIP inhibited EV release from astrocytes in a dose dependent manner (Fig. [5A](#Fig5){ref-type="fig"}). In contrast, its closely related inactive analog had no effect on EV release suggesting DPTIP inhibits EV release via inhibition of nSMase2. We also determined the activation status of (+/−) serum-deprived astrocytes after DPTIP treatment. Rat primary astrocytes were treated with DPTIP (10 μM) or inactive analog for two hours along with (+/−) serum deprivation-induced stress. Cells were fixed and immunofluorescence labeling for GFAP was performed. DPTIP and inactive analog without serum starvation did not change GFAP levels (Fig. [5B,C](#Fig5){ref-type="fig"}). Serum deprivation resulted in activation of astrocytes as evidenced by increase in GFAP fluorescence intensity compared to non-treated controls. Treatment with DPTIP prevented astrocyte activation in response to serum starvation, while the inactive analog failed to prevent astrocyte activation (Fig. [5B,C](#Fig5){ref-type="fig"}).Figure 5Inhibition of EV release by DPTIP in astrocytes. (**A**) Rat primary astrocytes were treated in parallel incubations with DPTIP or its des-hydroxyl inactive analog at 0.3, 1, 3, and 10 μM; DMSO (0.02%) was used as vehicle control. Media was collected after 2 h incubation and centrifuged at 2700 × g for 15 min at 4 °C. Supernatant was collected and the number of extracellular vesicles (EVs) was quantified using ZetaView Nanoparticle Tracker. The mean concentration of EVs/mL (±SEM) was calculated from 4 replicate experiments. (**B**) Rat primary astrocytes were treated with DPTIP or inactive analog (+/−) serum-deprivation-induced stress for 2 h. Astrocytes grown in complete medium were used as no treatment control. Cells were fixed and stained with anti-GFAP antibody (1:500, Sigma). Fluorescence intensity was measured using Image J. (**C**) Quantitation of fluorescence in (**B**). Bar graph represents background corrected mean fluorescence intensity measured from 100 astrocytes per condition. Error bars represent standard error of mean. One-way ANOVA followed by Tukey's posthoc test was performed.
DPTIP inhibited biomarkers of brain inflammation *in vivo* whereas its inactive analog had no effect {#Sec10}
----------------------------------------------------------------------------------------------------
Given DPTIP's brain penetration in mice and its ability to inhibit EV release *in vitro*, we next evaluated the ability of DPTIP to ameliorate EV release from astrocytes, cytokine upregulation in liver and neutrophil migration into brain in an *in vivo* mouse model of brain inflammation. As we have previously shown^[@CR11],[@CR18]^, striatal injection of IL-1β in mice expressing GFP-GFAP in astroglia triggers a release of GFP-labelled EVs that rapidly enter into plasma, resulting in cytokine upregulation in liver and peripheral immune cell migration into brain^[@CR11]^. Mice were dosed (10 mg/kg IP, DPTIP or inactive analog) 0.5 h prior to IL-1β striatal injection. At this dose, brain concentrations of DPTIP are above its IC~50~ for nSMase2 inhibition for at least 4 h after compound administration (Fig. [4C](#Fig4){ref-type="fig"}). There were two groups of mice: the first group was sacrificed 2 h after IL-1β administration by heart puncture, and GFP-labeled circulating EVs were measured with liver cytokines. Mice in the second group were dosed a second time with DPTIP or inactive analog at 12 h and sacrificed at 24 h after IL-1β administration to measure brain neutrophils (Fig. [6A](#Fig6){ref-type="fig"}). Counting of astrocyte-released EV (GFP+) from blood and liver cytokine analysis was conducted by single injection of DPTIP. Although release of EVs from astrocytes can be initiated immediately after intracranial injection of IL-1β, infiltration of neutrophils in brain parenchyma occurred 12h-24h after the IL-1β injection. Since the pharmacokinetic profiles of DPTIP in plasma and brain following 10 mg/kg IP dose showed that brain levels of DPTIP exceeded its IC50 for nSMase2 for only 4 h post dose, we administered DPTIP twice after IL-1β injection to ensure inhibition of nSMase2 was sustained during the experiment. When mice were dosed with DPTIP, number of astrocyte-derived EVs was reduced by 51 ± 13% 2 h post IL-1β administration (Fig. [6B](#Fig6){ref-type="fig"}). Western analysis using the isolated exosomal fraction confirmed the presence of CD63 (transmembrane protein), TSG101 (cytosolic protein) and Flotilin-1 (lipid raft associated protein), commonly used EV markers^[@CR19],[@CR20]^. The GFP signal was an indication that these EVs originated in brain^[@CR11]^ while lack of mitofilin and α-actinin signals indicated the vesicles were not of mitochondrial^[@CR21]^ or cytoskeletal^[@CR22]^ origin respectively (Fig. [6B](#Fig6){ref-type="fig"}).Figure 6Effects of DPTIP in mouse model of brain inflammation. (**A**) Experiment Timeline -- Four groups of GFAP-EGFP mice were administered saline, IL-1β, IL1-β + DPTIP (10 mg/kg) or IL-1β + inactive analog (10 mg/kg). Compounds were given 0.5 h before IL-1β dosing. One group of mice was sacrificed 2 h after IL-1β administration to determine effects of the various treatments on extracellular vesicles (EVs) releases from brain and liver cytokine analysis. The second group was dosed a second time 12 h after IL-1β administration and sacrificed at 24 h to evaluate the effects of different treatments on neutrophil infiltration into brain. (**B**) GFP-labeled EVs in plasma under different treatments. Data are mean ± SD, n = 5 mice per condition. \*p \< 0.05 compared to saline control; ^\#\#\#^p \< 0.001 compared to IL1-β group; \*\*\*p \< 0.001 compared to saline group. There was no difference observed between IL-1β and IL-1β plus des-hydroxyl analog groups. Panel to the right shows Western analysis using EVs when evaluating against GFP, exosomal (CD63, flotilin-1, TSG101), mitochondrial (mitofilin) and cytoskeletal (α-actinin) markers. Full blot rows and columns are shown in Supplementary Information (Fig. [1S](#MOESM1){ref-type="media"}). (**C**) Liver cytokine levels under different treatments as measured by qRT-PCR of RNA isolated from fresh frozen liver tissue. Samples were analyzed in triplicate. \*\*p \< 0.01 and \*p \< 0.05 compared to saline control; ^\#\#^p \< 0.01 and ^\#^p \< 0.05 compared to IL1-β group. (**D**) Neutrophil levels in brain as measured by immunohistochemistry using coronal brain sections and Ly6b antibody. (**E**) Quantitation of (**D**); \*\*p \< 0.01 compared to saline control; ^\#\#^p \< 0.01 compared to IL1-β group.
Upregulation of liver cytokines upon IL-1β treatment was inhibited by DPTIP (Fig. [6C](#Fig6){ref-type="fig"}). Neutrophils, as measured by immunohistochemistry of coronal brain sections using LY6b antibody, showed reduced staining in sections from animals treated with DPTIP compared to IL-1β-treated animals (Fig. [6D](#Fig6){ref-type="fig"}); corresponding quantification showed neutrophil migration into brain was reduced by 80 ± 23% compared to IL-1β-treated animals (Fig. [6E](#Fig6){ref-type="fig"}). Administration of the closely related inactive analog, had no statistically significant effect on IL-1β-induced EV release (Fig. [6B](#Fig6){ref-type="fig"}). The effects of the inactive des-hydroxyl DPTIP on production of TNF-α and IL-6 were marginal and not statistically significant. Although the magnitude of reduction in CCL2 production by the inactive analog was high, the data were variable and also not statistically significant (Fig. [6C](#Fig6){ref-type="fig"}). Finally, des-hydroxyl DPTIP had no effect on neutrophil migration (Fig. [6D,E](#Fig6){ref-type="fig"}). Results with the inactive analog were consistent with the suggestion that DPTIP effects occur through nSMase2 inhibition. Importantly, these results are in agreement with our previous findings that co-injection of IL-1β with nSMase2 inhibition (either GW4869, altenusin, lentivirus targeting astrocytic nSMase2, or using nSMase2 KO mice) suppress neutrophil infiltration into brain parenchyma^[@CR11]^. The same studies also indicated that nSMase2 inhibition suppressed activation of astrocytes and microglia^[@CR11]^.
Within this study, we focused our efforts on astrocytes because of the intimate association of these cells with the blood-brain barrier (BBB), and because in our previous study we knocked down nSMase2 expression selectively in astrocytes and showed that this inhibited the release of astrocyte-derived EVs (ADEVs) and prevented the liver cytokine response, and leukocyte trafficking into brain following parenchymal injection of IL-1beta^[@CR11]^. Although it remains possible that neuronal or microglial- derived EV are also affected by nSMase2 inhibition, these earlier findings suggest that ADEVs are a major source of brain EVs that regulate the peripheral response to CNS injury. Future studies will include the use of neuronal and microglial derived EVs.
The exact mechanism of serum deprivation-induced EV release is not known. Serum deprivation is known to produce a stress response that stimulates secretory pathways in astrocytes^[@CR23]^. Additionally, nutrient deprivation has been shown to cause accumulation of ceramides in astrocytes, likely due to a stress response activation of nSMase2^[@CR24]^. Nutrient starvation has been reported to increase nSMase2 activity and induce its expression in other cell types^[@CR25]^. Serum deprivation induced EV release observed in our experiments may therefore be the result of nSMase2 activation in response to nutrient deprivation stress.
A schematic illustration of the *in vivo* experiment are shown in Fig. [7](#Fig7){ref-type="fig"} which are consistent with the data detailed above as well as previous literature. In brief, striatal IL-1β injection activates the IL-1β receptor on the plasma membrane of astrocytes that in turn activates nSMase2 enzymatic activity to catalyze the hydrolysis of sphingomyelin to produce ceramide^[@CR26]^. Ceramide is used to manufacture intracellular vesicles (IVs)^[@CR1]^ that are released from astrocytes as EVs and migrate into plasma where they induce a peripheral acute cytokine response, mainly in liver, and prime immune cells to transmigrate to the brain^[@CR11]^. In the presence of DPTIP, inhibition of nSMase2 prevents ceramide production, EV formation and secretion (Fig. [6B](#Fig6){ref-type="fig"}) cytokine upregulation (Fig. [6C](#Fig6){ref-type="fig"}) and neutrophil migration (Fig. [6D](#Fig6){ref-type="fig"}).Figure 7Proposed mechanism for the role of nSMase2 during inflammatory brain injury and effect of nSMase2 inhibition by DPTIP -- Intracerebral injection of IL-1β activates the IL-1β receptor which in turn activates nSMase2. nSMase2-catalyzed hydrolysis of sphingomyelin (SM) produces long-chain ceramides (Cer). Increase in ceramide production at multivesicular bodies (MVBs) leads to the formation of intraluminal vesicles (IVs) and budding of extracellular vesicles (EVs) that are then shed from astrocytes and released into the periphery. Astrocyte-generated EVs can be identified in plasma because they are GFP-labeled. Astrocytic EVs promote crossing of neutrophils into brain as a result of cytokine upregulation in liver. In the presence of DPTIP, nSMase2 is inhibited, ceramide is not available for EV biosynthesis resulting in blockade of both cytokine upregulation and neutrophil infiltration.
In summary, DPTIP is the most potent nSMase2 inhibitor identified to date (IC~50~ 30 nM), exhibits selectivity, is metabolically stable and brain penetrant. DPTIP is an inhibitor of EV release in primary glial cells and *in vivo*. In addition, biomarkers that have been associated with EV release from brain, including cytokine upregulation and immune cell migration to brain, were also inhibited by DPTIP. The des hydroxyl inactive analog of DPTIP did not inhibit EV release *in vitro* and had no effect on IL-1β-induced cytokine regulation or neutrophil migration to brain *in vivo*. DPTIP is a considerable improvement over other nSMase2 inhibitors identified to date, it can be used as a probe in animal models of disease associated with EV dysregulation and it contains a structural scaffold that is actively being optimized for clinical translation.
Methods {#Sec11}
=======
Expression of human nSMase2 {#Sec12}
---------------------------
Full length human nSMase2 cDNA with a C-terminal Flag tag cloned into a pCMV6-Entry expression vector (Origene) was transfected into HEK293 cells using lipofectamine 2000 (Life Technologies). Selection of transfected cells was carried out for two weeks with 500 µg/ml G418 in EMEM containing 10% FBS (ATCC) and 2 mM glutamine (Life Technologies). Expression of human nSMase2 was confirmed by Western-blot analysis using an antibody specific against nSMase2 (R&D) diluted to 0.4 µg/ml in Tris-buffered saline with 0.1% Tween 20 and 5% bovine serum albumin. Cells expressing human nSMase2 were grown to confluency in 150 mm dishes, washed twice with cold PBS and harvested using a cell scraper in lysis buffer pH 7.5, Tris-HCl 100 mM, 1 mM EDTA, 100 mM sucrose, 100 µM PMSF, 1X protease inhibitor cocktail III (Calbiochem), 1 ml per dish. Cell lysis was achieved by sonicating 3 times on ice for 30 sec. Protein concentration was determined using the bicinchoninic acid (BCA) assay. Aliquots of cell lysate were snap frozen and stored at −80 °C. Activity of recombinant human nSMase2 from cell lysates remained stable for at least six months.
Fluorescence-based nSMase2 activity assay in 1536-well format {#Sec13}
-------------------------------------------------------------
Measurements of nSMase2 activity using fluorescence as readout was optimized for dose response quantitative HTS (qHTS). The assay was carried out in black solid bottom, medium binding, 1536-well plates (Greiner, 789176-F). Fluorescence response was optimized with respect to nSMase2 concentration, incubation time and SM concentration. Recombinant human nSMase2 preparations (2 µL) at various concentrations (0.03 to 0.5 µg protein/µL solution) were incubated with substrate/detection reaction mixture (2 µL) containing various concentrations of SM (5 to 40 μM), coupling enzymes (alkaline phosphatase 4 U/mL, choline oxidase 0.1 U/mL and horseradish peroxidase 0.1 U/mL) and Amplex red® (50 μM). Hydrolysis of SM was carried out for different incubation times (15--160 min) at 37 °C in pH 7.4 Tris-HCl buffer 100 mM, containing 10 mM MgCl~2~ and 0.2% Triton X-100. Phosphorylcholine made during the nSMase2-catalyzed reaction is dephosphorylated by alkaline phosphatase to produce choline, which in turn undergoes oxidation in the presence of choline oxidase to produce betaine and peroxide. Peroxide in the presence of horseradish peroxidase and Amplex Red generates fluorescent resorufin (Ex 525/Em 598). Resorufin was monitored with Viewlux µHTS Microplate Imagers (Perkin Elmer) at energy levels 1,000 or 3,000 and exposure times of 1 or 2 sec. Fluorescence readings varied when using Viewlux offline (assay characterization) vs. Viewlux online (HTS); in order to account for differences in fluorescence efficiency, assay performance was monitored from machine to machine based on assay dynamic range and cambinol IC~50~ reproducibility. Based on results of the different conditions outlined above, the HTS campaign was carried out using 0.1 µg protein/µL nSMase2 preparation, 20 μM SM and 2 h time of incubation. Control inhibitors or test compounds (23 nL) were added from various concentrations in DMSO solution into to the nSMase2 preparation and incubated for 15 min prior to the addition of substrate and enzyme-coupling detection reagents. Compounds were screened in 4 doses, starting at 57 µM, and doing 5-fold dilutions. A customized screening robot (Kalypsys) was used for the primary screen. A step-by step HTS assay protocol is given in the Supplementary Data (Table [S1](#MOESM1){ref-type="media"}). Inhibitors of nSMase2 were selected using compound dose response curve algorithms developed at NCGC to score actives, which assigns each tested compound a compound response class (CRC) number^[@CR16]^. This method classifies primary hits into different categories according to their potency (IC~50~), magnitude of response (efficacy), quality of curve fitting (r2), and number of asymptotes. For example, CRC of −1.1 represents complete curve and high efficacy; CRC of −1.2 represents complete curve but partial efficacy. Compounds with CRCs of −1.1, −1.2, −2.1 and −2.2 were generally selected for confirmation and validation. Structural analysis of selected compounds was performed and promiscuous compounds were filtered out. A counter-assay to rule out compounds that inhibited the detection reaction was carried out in the absence of human nSMase2. The reaction was initiated with addition of phosphorylcholine (alkaline phosphatase substrate), added at a final concentration of 2 μM. Compounds that showed inhibitory activity in the counter-assay were removed from further validation.
IC~50~ determination of selected compounds {#Sec14}
------------------------------------------
Human nSMase2 (0.1 µg protein/µL) was added to a reaction mixture containing SM (20 µM), and detection reagents as indicated above and different compound concentrations in the 10 pM -- 100 µM range in a total volume of 100 µL (96-well format). Kinetic measurements were obtained from 2 h traces when the reaction was linear. Percent inhibition was obtained using the formula \[(rate of change of fluorescence in the presence of inhibitor divided by rate of change of fluorescence in the absence of inhibitor) × 100\].
Synthesis and characterization of DPTIP and des-hydroxyl DPTIP {#Sec15}
--------------------------------------------------------------
Detailed descriptions of the synthesis of DPTIP and its des-hydroxyl analog along with corresponding authentication information are given in Supplementary Data.
Metabolic stability {#Sec16}
-------------------
Metabolic stability assay was conducted in mouse or human liver microsomes as we have described previously with minor modifications^[@CR17]^. Briefly, the reaction was carried out using potassium phosphate buffer (100 mM, pH 7.4), in the presence of an NADPH regenerating system (compound final concentration was 1 μM; 0.2 mg/mL microsomes). Compound disappearance was monitored over time using a liquid chromatography and tandem mass spectrometry (LC/MS/MS) method. Chromatographic analysis was performed using an Accela ultra high-performance system consisting of an analytical pump and an autosampler coupled with a TSQ Vantage mass spectrometer (Thermo Fisher Scientific Inc., Waltham, MA). Separation of analyte was achieved at ambient temperature using Agilent Eclipse Plus column (100 × 2.1 mm i.d.) packed with a 1.8 μm C18 stationary phase. The mobile phase consisted of 0.1% formic acid in acetonitrile and 0.1% formic acid in water with gradient elution. The \[M + H\]^+^ ion transition of DPTIP (m/z 378.956 → 363.073, 200.055) and losartan (IS) (m/z 423.200 → 207.107, 180.880).
*In vivo* pharmacokinetics {#Sec17}
--------------------------
Pharmacokinetic studies in mice were approved by the Animal Care and Use Committee at Johns Hopkins University. Male CD1 mice between 25 and 30 g were obtained from Harlan and maintained on a 12 h light−dark cycle with ad libitum access to food and water. Test compounds were dosed at 10 mg/kg IP at a dosing volume of 10 mL/kg. Blood and brain tissue were collected at 0.25, 0.5, 1, 2, 4 and 6 h post dose (n = 3 per time point). Blood was obtained via cardiac puncture and plasma was harvested from blood by centrifugation at 3000 × g for 15 min and stored at −80 °C. Brain tissues were harvested following blood collection and immediately snap frozen in liquid nitrogen and stored at −80 °C until LC−MS analysis. Calibration standards were prepared using naïve mouse plasma or brain spiked with DPTIP. DPTIP standards and samples were extracted from plasma and brain by a one-step protein precipitation using acetonitrile (100% v/v) containing internal standard (losartan: 0.5 µM). The samples were vortex mixed for 30 secs and centrifuged at 10000 × g for 10 min at 4 °C. Fifty microliter of the supernatant was diluted with 50 µL water and transferred to a 250 µL polypropylene vial sealed with a Teflon cap and analyzed via LC/MS/MS as described above. Plasma concentrations (pmol/mL) as well as tissue concentrations (pmol/g) were determined and plots of mean plasma concentration versus time were constructed for PK analysis. Non-compartmental-analysis modules in Phoenix WinNonlin version 7.0 (Certara USA, Inc., Princeton, NJ) were used to assess pharmacokinetic parameters including maximal concentration (C~max~), time to C~max~ (T~max~), and area under the curve extrapolated to infinity (AUC~0-∞~).
Inhibition of EV release from primary glial cells {#Sec18}
-------------------------------------------------
Potential inhibition of test compounds on EV release from primary astrocytes was carried out as previously described (Dickens *et al*., 2017). Briefly, rat primary astrocytes were seeded onto 6-well plates at a density of 20,000 cells/well. Twenty-four hours after seeding, astrocytes were washed with PBS and the medium changed to media without FBS. Absence of FBS mimics a trophic factor withdrawal stimulus causing EVs to be released from astrocytes via an nSMase2-dependent pathway. Astrocytes were then treated with test compounds at different concentrations: 0.03, 0.1, 0.3, 1, 3, and 10 μM. DMSO (0.02%) was used as control. Two hours after treatment, media was collected and centrifuged at 2700 × g for 15 min at 4 °C. The supernatant was collected and the number of EVs quantified using ZetaView Nanoparticle Tracker (Particle Metrix GmBH, Meerbusch, Germany) and the corresponding ZetaVeiw software (8.03.04.01). Nanosphere size standard 100 nm (Thermo Scientific) was used to calibrate the instrument prior to sample readings. Instrument pre-acquisition parameters were set to 23 °C, a sensitivity of 65, a frame rate of 30 frames per second (fps), a shutter speed of 100, and laser pulse duration equal to that of shutter duration. Post-acquisition parameters were set to a minimum brightness of 25, a maximum size of 200 pixels, and a minimum size of 10 pixels. For each sample 1 mL of the supernatant was injected into the sample-carrier cell and the particle count measured at 5 positions, with 2 cycles of reading per position. The cell was washed with PBS after every sample. Mean concentration of EVs/mL (±SEM) was calculated from 4 replicates.
Inhibition of EV release *in vivo* {#Sec19}
----------------------------------
All experimental protocols using vertebrate animals were reviewed by the Institutional Animal Care and Use Committee at Johns Hopkins University and are in accordance with the guidelines of the NIH guide for the care and use of laboratory animals. Striatal injections and EV measurements were performed as previously described by our group in adult (2--3 month) male GFAP-GFP mice (Jackson Laboratories)^[@CR11],[@CR18]^. Mice were anesthetized with 3% Isoflourane (Baxter) in oxygen (Airgas), and placed in a stereotaxic frame (Stoelting Co.). A small burr hole was drilled in the skull over the left striatum using a dental drill (Fine Scientific Tools). IL-1β (0.1 ng/3 µL) was injected (total volume of 3 μL) at the rate 0.5 µL/min *via* a pulled glass capillary tip diameter \<50 µm^[@CR18]^; using the stereotaxic coordinates: A/P + 0.5; M/L −2; −3 D/V. Saline was used as a control. When DPTIP or its des-hydroxyl analog were used, they were given IP (10 mg/kg, 5% DMSO, 5% Tween-80 in saline) 30 min before IL-1β injection. Following infusion, the capillary was held in place for 5 min to allow for solution to diffuse into the tissue. Animals were sacrificed at 2 h by an overdose of anesthetic, and transcardially perfused with ice-cold saline containing heparin (20 µL per 100 ml, Sigma). Blood was collected *via* cardiac puncture using a heparin (Sigma Aldrich) coated syringe and EDTA tubes (BD) 2 h following striatal injections. Blood was immediately centrifuged at 2,700 x *g* for 15 min (20 °C) to obtain plasma. Plasma was further centrifuged at 10,000 g for 15 min (4 °C) to generate platelet free plasma. This procedure removes large particles such as apoptotic bodies.
### Quantitation of *Plasma EVs* {#Sec20}
Dynabeads M-450 Epoxy (Invitrogen) were coupled with anti-GFP antibody (Thermo Fisher) at a ratio of 200 μg antibody per 4 × 10^8^ beads. Plasma from GFAP-GFP mouse (50 μL) was incubated with 2 × 10^7^ anti-GFP antibody-coupled Dynabeads at 4 °C overnight. The beads were washed and placed on a magnet to separate EVs bound to anti-GFP antibody-coupled Dynabeads. The precipitated EVs were eluted using 0.1 M glycine (pH 3.0). The concentration of immunoprecipitated GFP + EVs was quantified using ZetaView nanoparticle tracking analysis (Particle Metrix) as described above.
### Western analysis {#Sec21}
Proteins were resolved by 10% SDS--polyacrylamide gel electrophoresis and transferred to polyvinylidene difluoride membranes (Bio-Rad). Nonspecific binding sites were blocked with 5% (w/v) milk in TBS containing 0.1% Tween 20 (TBS-T). After blocking, blots were incubated overnight with the primary polyclonal antibodies to GFP (1:1000; Thermo Fisher) CD63 (1:200; Santa Cruz Biotechnology), flotillin1 (1:1000; Abcam), TSG101 (1:1000; BD Biosciences), mitofilin (1:5000 Thermo Fisher Scientific) and α-actinin (1:1000; Gentex). After washes with TBS-T, blots were incubated for 2 h with the corresponding IgG horseradish peroxidase--linked secondary antibody (1:1000; Cell Signaling Technology) and developed by enhanced chemiluminescence. Image analysis was performed using a G: BOX imaging system (Syngene).
### Cytokine measurements {#Sec22}
RNA was isolated from fresh frozen tissues (10 to 50 mg) using the RNeasy Mini Kit (Qiagen). Total RNA was reverse-transcribed and quantified using previously published methods^[@CR27]^. For quantitative real-time PCR (qRT-PCR), each reaction contained SYBR Green Master Mix (12.5 ml; Life Technologies), diethyl pyrocarbonate H~2~O (10.5 ml), forward and reverse primers to CCL2, TNFα, IL-6, IL-1b, IL-17a, IL-10, IGFR1, and CXCL1 (0.5 ml each; Sigma-Aldrich), and cDNA (1 ml). Each 96-well plate included a nontemplate control, and samples were analyzed in triplicate on an Applied Biosystems 7300 (Life Technologies). Cycling parameters were as follows: one cycle for 2 min at 50 °C, one cycle for 10 min at 95 °C, and 40 cycles for 15 s at 95 °C and for 1 min at 60 °C. The change in threshold cycle (ΔC~t~) for each sample was normalized to β-actin, and ΔΔC~t~ was calculated by comparing ΔC~t~ for the treatment group to the average ΔC~t~ of the control group^[@CR28]^.
### Immunohistochemistry {#Sec23}
Coronal brain sections (30 µm) were prepared using a cryostat microtome (Leica). Endogenous peroxidase activity was quenched using a 1% solution of H~2~O~2~ in methanol, and primary antibody Ly6b (1:1000, AbD Serotec), was incubated at 4 °C overnight. Sections were washed (3 × PBS), and biotinylated secondary antibody (1:100, Vector Laboratories) was added at room temperature for 2 hours. Staining was visualized using an avidin-biotin complex (1:100 of A and B, Vector Laboratories) and DAB-HCl using a microscope to monitor staining progression. Stereological quantitation was performed using a one-in-five series (270-µm spacing), from the rostral point of bregma +1.10 mm to the caudal point of bregma −0.58 mm as previously described^[@CR29]^.
Ethical approval {#Sec24}
----------------
All experimental protocols using vertebrate animals were reviewed by the Institutional Animal Care and Use Committee at Johns Hopkins University and are in accordance with the guidelines of the NIH guide for the care and use of laboratory animals. Johns Hopkins Medical Institution is fully accredited by the American Association for Accreditation in Laboratory Animal Care (AAALAC).
Electronic supplementary material
=================================
{#Sec25}
Supplementary Information
**Publisher's note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Electronic supplementary material
=================================
**Supplementary information** accompanies this paper at 10.1038/s41598-018-36144-2.
This research was supported by NIH grants RO1 MH107659 (CR) and P30 MH075673 (BSS and NH).
C.R., J.M., R.R., T.T., Norman H., M.F. and B.S.S. were responsible for experimental design and writing of manuscript. E.B., X.H., N.S. were responsible for H.T.S. and data analysis. Nyada H. and O.S. were responsible for chemical synthesis and authentication. A.G.T. carried out IC~50~ determinations and mechanism of inhibition studies. Y.W., S.C.Z. and A.G.G. performed metabolic stability and PK studies. ADC carried out *in vitro* inhibition of EV secretion in glial cells. S.-W.Y. was responsible for *in vivo* studies using GFAP-GFP mice and for the illustration in Figure 7.
Experimental data used to generate the results reported in this manuscript are available upon request.
Competing Interests {#FPar1}
===================
The authors declare no competing interests.
|
{
"pile_set_name": "Pile-CC"
} | Something that’s become incredibly popular as of late is faux panels. Maybe you’re someone that has a kitchen that totally needs a bit of an upgrade, or maybe you’re someone that just really wants to truly make their home the best that it can be. Sometimes being able to have a nice kitchen on a budget seems impossible, and maybe you’re looking for a means to truly make it look better, without it breaking the bank. Well, did you know that you can do that? With faux stone panels, you actually can do this yourself, and it’s totally affordable.
You probably like to sit around and watch those HGTV shows, and the key point in many of these, is actually DIY. It is virtually everywhere, and it’s super popular. You can literally get anything, and it’s related to DIY. For example, going to Pinterest will get you some great results too, since most of the time, you’ll see some projects that you can make yourself, and they look amazing. You don’t even need to spend a ton of money to get that feel either, and that’s what’s super awesome about it. Plus, you don’t even have to hire out when you can do it yourself, which is great. Everyone is creative, you just have to go dig deep in order to find it, but once you find it and actually express this, it creates a sense of accomplishment that you may not have known before.
Instead of having to spend a bunch of money remodeling, you can actually create a great backsplash for your kitchen with panels. You can get stuff for a temporary look, or even an infused tile look. If you want an industrial feel, you can use concrete or asphalt. You can use this as a backsplash and if you use the right kind, it can make your place look like it’s out of a magazine. It’s that wild.
You can do this by yourself, without needing heavy machinery, and in truth, you really just need panels, adhesive screws, a screwdriver, and even a caulking gun. That’s really all there is to it. You can get these at home improvement store, and the best part, is that you don’t need to actually spend a ton of money on remodeling, and you don’t need for it to be a super expensive project. You can in essence make sure that you have all of this together by simply putting faux stone panels all around, and even just getting a bit of faux paneling will make a difference. The best part as well, is that they’re actually waterproof too, and they’re impervious to it. It’s amazing what this can do for you, and you’ll definitely be able to remodel the kitchen.
Remember, remodeling doesn’t always have to involve having something super expensive put in, nor do you need to have this kind of work put into it that takes a lot of money. What you need instead, is some faux paneling, and some great DIY skills that you can develop, and you can really just get started with this immediately.
If you do need some extra help on making this the best place that you can make it, you can always consult someone for some extra help. It’s amazing what you can do, and you’ll be able to improve your home fast, and without too many issues. There are some great DIY experts out here, and you’ll be able to find out for yourself what the best way to go about getting all of this together is, and you’ll be able to from there create the best kitchen that you can. You’ll feel good, and it will definitely look good as well, and you’ll be able to create the home of your dreams, and be able to do so pretty fast, with the help of faux paneling. It’s remarkable just how a little change in the way that your paneling looks can make a difference, and you’ll be able to create the best and most remarkable space that you can with this, and from there, you can choose the paneling you want and install it very fast. |
{
"pile_set_name": "Wikipedia (en)"
} | Saint-Laurent-de-Belzagot
Saint-Laurent-de-Belzagot is a former commune in the Charente department in southwestern France. On 1 January 2017, it was merged into the new commune Montmoreau.
Population
See also
Communes of the Charente department
References
Category:Former communes of Charente
Category:Charente communes articles needing translation from French Wikipedia |
{
"pile_set_name": "StackExchange"
} | Q:
How to change displayed value in dojox DropDownSelect
I have DropDownSelect declared with tags:
<select id="someId" dojoType="dojox.form.DropDownSelect" >
<option>Loading...</option>
</select>
Then when xhr load function is called I would like to remove the option above and create the new one "Choose Option", for example.
load: function(response) {
//remove option, but it stays as displayedValue, displayed
dojo.byId("someId").removeChild(dojo.byId("someId").lastChild);
//I would like to show the option below
dijit.byId("someId").addOption({label: "Choose Option", value:"Select"});
//dijit.byId("someId").setAttribute('displayedValue','Select'); // not working
dijit.byId("someId").addOption(response); // add ajax options.
return response;
},
Please, tell me how to show different option in DropDownSelect??? The version 1.3 is used.
A:
//1. html: define drop down
<select id="ddselect" name="select" dojoType="dojox.form.DropDownSelect">
<option value="none">
Loading...
</option>
</select>
// 2. onLoad handler:
load: function(response) {
// get widget by id
var dd = dijit.byId("ddselect");
// remove loading option
dd.removeOption(0);
// add new option
dd.addOption({ label: 'newValue1', value: 'nv1'});
// or add array of options
dd.addOption([{ label: 'newValue2', value: 'nv2' }, { label: 'newValue3', value: 'nv3'}]);
}
|
{
"pile_set_name": "StackExchange"
} | Q:
How best to power down an Arduino for ~5 minutes at a time?
Reading over the datasheet it appears the longest it can shutdown for is 8s so should I just keep a counter in the loop method that checks if it's run 38 times and then execute the code I want? Would this wakeup every 8s hurt battery life much if it's doing nothing but incrementing a counter?
A:
Yes, if you want to wake an ATMEGA (the chip in the Arduino) spontaneously (no outside trigger) from Power Down mode at periodic intervals, the you will need to rely on an interrupt generated by the watchdog timer, which has a maxim timeout of 8s.
Your goal should be to wake, increment and check the timer, and get back to sleep as quickly as possible since the amount of time you are awake will dominate your average power usage while asleep.
Some things to keep in mind...
The arduino uses a power regulator which always draws current. If you are going for long battery life, you will need to replace or eliminate this regulator. Much better to have an ATMEGA connected directly to a battery.
Turn off as much of the chip as possible before going to sleep. Take a look at the power control registers.
Make sure you are not driving any unnecessary loads with the GPIO pins when sleeping.
BTW, common wisdom has been that it is best to wake up and run at as fast a clock speed as possible to get your work done and get back to sleep as quickly as possible. However, Jack Ganssle recently published an article that makes a great case for doing the opposite. You will actually get longer battery life if you wake up to a slow clock speed, since this means you can run down the battery to lower voltage (this assumes you don'y need higher voltages for some other part of your circuit). Lots of other great info for designing long running battery-powered systems here...
http://www.ganssle.com/tem/tem275.html
Here is another relevant article about long running Arduinos...
http://www.openhomeautomation.net/arduino-battery/
|
{
"pile_set_name": "Pile-CC"
} | Should states ban religious exemptions for student vaccinations? Researchers weigh in
In June, New York became the fifth state to require its schoolchildren to be vaccinated despite their parents’ religious beliefs or philosophical objections.
Amid a surge in measles cases nationwide this year, legislators and community leaders are debating ways to boost the number of kids who are up to date on their school-mandated shots. Many have focused on restricting or eliminating vaccination exemptions based on religion or personal opinions, which are common and have been offered by school districts across the United States for decades.
But three recent academic studies suggest this might not be the most effective way to improve childhood vaccination rates. In fact, the research indicates banning these exemptions could backfire.
Scholars studied student vaccination rates in California, the nation’s most populous state, and discovered that when parents cannot get an exemption based on their personal beliefs, some seek other ways for their children to stay in school while skipping one or more vaccinations. The researchers also learned that while California lawmakers have targeted personal belief exemptions, which are used by a relatively small group of students, a larger group of children is being allowed to enter kindergarten on a “conditional status” basis with incomplete vaccinations.
Paul L. Delamater, the lead researcher on one of the three studies and the co-author of another, says helping conditional status students finish getting their shots would be a more effective way to boost vaccination rates than banning personal belief exemptions.
Also, he says, it likely would be easier to encourage the parents of conditional status students to get their kids up to date than it would be to convince parents who want their children to be able to opt out of the vaccine requirement.
“Trying to focus on parents who are not vaccine hesitant first may be a good way forward,” says Delamater, a fellow at the Carolina Population Center who’s also an assistant professor at the University of North Carolina at Chapel Hill. “I think parents with real vaccine hesitancy are going to search for ways to not vaccinate their children.”
All three studies examine vaccination rates among kindergarteners in California, which, in 2015, became the first state in almost 30 years to eliminate non-medical exemptions. The new law, referred to as Senate bill 277, took effect in 2016.
Among their key findings:
While the percentage of kindergarteners who were up to date on their shots increased in 2016, the vast majority of the increase was linked to a different change made by school officials. Schools cut back on the number of children allowed to enter kindergarten on a conditional basis.
After schools in California did away with personal belief exemptions, they saw a sharp increase in students submitting medical exemptions. The researchers suspect that some parents who could no longer use personal belief exemptions obtained authorization from doctors to skip vaccinations for medical reasons.
While a larger share of kindergarteners had all their required vaccinations after Senate bill 277 took effect in 2016, the trend reversed the following year. The drop in up-to-date students, researchers explain, is connected to the spike in children using medical exemptions as well as an increase in the number of kindergarteners enrolled in school who were designated as “overdue” for vaccinations, oftentimes because they had missed a dose of a vaccine. In addition, Senate bill 277 effectively created a new exemption, allowing more than 5,000 kindergarteners in 2017 to forgo vaccinations if they attended a school without classroom-based instruction or had what are called “individualized education plans.”
Delamater says other states can learn a lot from California.
“California has been trying to be very proactive about this via legislation and for us, as researchers, it gives us a very interesting opportunity to evaluate how these big changes in policy relating to vaccinations – how people actually react to that,” he says. “As you’ve probably seen from looking at these papers, it’s not a really straightforward and easy-to-understand thing. There is a lot of nuance to this.”
Chelsea Richwine, the lead author on a working paper from the National Bureau of Economic Research that investigated the effects of Senate bill 277, stressed the importance of kids getting all their required vaccinations. It’s as dangerous for a child to have incomplete vaccinations as it is to skip them altogether, she says.
She recommends restricting vaccine exemptions while also making it clear when and under what circumstances youth should be allowed medical exemptions from one or more required vaccines. In many cases, kids need only to delay vaccinations for a certain period of time, not avoid them completely. Both the American Medical Association and American Academy of Pediatrics support eliminating non-medical exemptions.
Under the proposed legislation, the State Department of Health would review vaccination reports from doctors who submit five or more medical exemption forms in a calendar year.
“Exemptions are appropriate in certain circumstances, especially medical exemptions,” explains Richwine, a fourth-year doctoral candidate studying health policy at George Washington University. “I think we have to take a more holistic approach to looking at medical and non-medical exemptions. It’s not an effective policy on its own — if there’s an opportunity to substitute [one exemption for another].”
——-
Below, we’ve summarized the three recent studies that Delamater, Richwine and their colleagues authored. We also included other research we think you’ll find helpful, including a study that finds that the parents who were most likely to file personal belief exemptions before California banned them were white and from upper-income levels.
For this study, researchers examined the impact that three California initiatives — including Senate bill 277 — had on the vaccination rates of kindergarteners. In 2014, a new state law made it harder for parents to get a personal belief exemption. In 2015, school officials began limiting the number of children they allowed to start kindergarten on a conditional admission basis. Then, in 2016, Senate bill 277 was enacted, eliminating personal belief exemptions.
The researchers find that between 2000 and 2017, 9.3 million California kids entered kindergarten, 721,593 of whom were not up to date on their required vaccinations. During the period the three initiatives were launched, the percentage of kindergarteners with incomplete vaccinations fell. In 2013, 9.84% of kindergarteners were missing some or all school-mandated immunizations. That number dropped to 4.42% in 2016 but then rose slightly to 4.87% in 2017.
Most of the reduction in kindergarteners with incomplete vaccinations is linked to the crackdown on conditional admissions, the rate for which dropped from 6.5% in 2013 to 1.84% in 2017, find the researchers, led by S. Cassandra Pingali, a fellow in the Immunization Services Division of the U.S. Centers for Disease Control and Prevention. Meanwhile, the slight increase in 2017 is related to the rising number of children using medical exemptions and a jump in the number of kindergarteners who are overdue for vaccinations. Senate bill 277 also allowed 5,310 kindergarteners in 2017 to forgo vaccinations s if they attended a school without classroom-based instruction or had individualized education plans.
The authors find that California communities reacted differently to the three interventions. In 2016 and 2017, reductions in the share of kindergarteners with incomplete vaccinations appear to be largest in the southern part of the state. “Northern California maintained the highest predicted rate of students without up-to-date vaccination status throughout the study period with relatively minor changes during the implementation of the 3 interventions compared with the rest of the state,” the authors write.
This study looks at Senate Bill 277’s effect on the percentage of California students entering kindergarten with incomplete vaccinations. A key takeaway: While the percentage of kindergarteners whose vaccinations were not up to date fell during the first year of the law, it rose in the second year.
Researchers tracked three categories of children who had not received all school-mandated vaccinations: those who were allowed to start kindergarten as conditional entrants, students who were overdue to receive one or more vaccinations and those who were “exempt” because they either attend a school without classroom-based instruction or have individualized education plans.
The researchers find that the percentage of kindergartners starting school not up to date on their vaccinations fell from 7.15% to 4.42% during the first year after Senate Bill 277 was enacted. But much of this drop was due to a reduction in the number of children who entered kindergarten on a conditional basis, the researchers note. The conditional entrance rate fell from 4.43% to 1.91% in 2016. In the second year after the law took effect, the percentage of kindergartners who weren’t up to date on their vaccinations increased by 0.45%.
It appears that personal belief exemptions “were replaced by other mechanisms allowing kindergarteners not up-to-date on vaccinations to enter school,” writes the research team, led by Delamater.
“Some parents who would have claimed a personal belief exemption before SB277 may have initiated the series of vaccines to meet the requirements for conditional entrance after the law’s implementation,” the authors write. “Yet, data reporting progression toward series completion are not available and we are not able to know whether or when students became fully up-to-date on vaccinations.”
The authors also find that many of the parents who sent their children to school with incomplete vaccinations after Senate Bill 277 was enacted lived in the same geographical areas where many parents previously had filed personal belief exemptions. “Previous geographic patterns of vaccine refusal persisted after the law’s implementation,” the authors write.
While other studies established a relationship between California Senate Bill 277 and higher childhood vaccination rates, this study finds that the new rule actually caused California vaccination rates to improve. This study also differs from others by examining changes in vaccination rates for each of the four vaccines required for kindergarten. The three researchers — Richwine, Avi Dor and Ali Moghtaderi of George Washington University — find that vaccination rates rose among all four vaccines in California, ranging from an increase of 2.5% for the measles, mumps and rubella (MMR) vaccine to an increase of 5% for the polio vaccine.
As part of their analysis, Richwine, Dor and Moghtaderi looked at parents’ use of personal belief exemptions and medical exemptions in California before and after Senate Bill 277 was enacted and compared it to parents’ use of these exemptions in seven control states — Arizona, California, Connecticut, Kansas, Minnesota, Pennsylvania and Rhode Island. What they learned is this: Compared to control states, California had lower vaccination rates and higher rates of students using personal belief exemptions in 2015, the year before the legislation took effect. After California banned personal belief exemptions, the rate of students using them there fell below that of the control states. However, California also “experienced a sharp increase in medical exemptions while control states’ exemption rates remained unchanged.”
Richwine, Dor and Moghtaderi find that California’s policy change reduced the rate at which children used personal belief exemptions by 3.4 percentage points. But that drop was offset by “a significant 2 percentage-point increase in medical exemptions in several of our analyses, which limits the overall decline in total exemptions to just 1 percentage-point.”
This study’s main finding: White, upper-income parents were most likely to seek personal belief exemptions in California before the state banned them. The research team — led by Y. Tony Yang, currently executive director of George Washington University’s Center for Health Policy and Media Engagement — analyzed millions of kindergarteners’ vaccination data to identify where in the state personal belief exemptions were most prevalent. The team combined vaccination data from the 2007-08 to 2013-14 academic years with data from the U.S. Census Bureau’s 2008–2012 American Community Survey to better understand the characteristics of families who used these exemptions.
The researchers find that the percentage of California kindergartners who used personal belief exemptions to forgo vaccinations rose from 1.54% in 2007-08 to 3.06% in 2013-14. The share of private school students using these exemptions was almost twice as high as the share of children using them in public schools.
Yang and his colleagues also find that the “areas of California with higher household income and proportion White population are associated with higher overall PBE [personal belief exemption] percentages as well as greater increases in PBEs [personal belief exemptions].”
“An increase in percentage White population from 20% to 35% yielded 1 additional PBE [personal belief exemption] per 280 students in 2013, and an increase from 65% to 80% yielded 1 additional PBE [personal belief exemption] per 139 students,” they write.
For this study, researchers analyzed data collected through a national, online survey to better understand why some families delay childhood vaccinations. A total of 7,019 U.S. adults responded to the September 2018 survey, 31% of whom were parents with children under age 18 living at home. The parents answered a series of questions about childhood vaccinations.
Researchers find that parents with high levels of “conspiratorial thinking” and those uncomfortable with needles were more likely to say they have followed a vaccination schedule that differs from what’s recommended by the CDC. Parents with high levels of conspiratorial thinking agreed with statements such as “Even though we live in a democracy, a few people will always run things anyway” and “Much of our lives are being controlled by plots hatched in secret places.”
“Compared to those who scored lowest on conspiratorial thinking, those who scored highest were 15% more likely to report having delayed vaccinating their children, 11% more likely to have chosen their doctors based on their willingness to delay, 25% more likely to have only vaccinated their children for schools, and 18% more likely to state that they would be willing to relocate in order to attend a school that does not strictly enforce vaccination requirements,” write the authors, led by Timothy Callaghan, an assistant professor of health policy and management at Texas A&M University.
The authors also find that “individuals most sensitive to needles are between 14 and 16% more likely than those without sensitivity to display [vaccine] hesitant behavior.” The analysis also indicates “fathers are more likely than mothers to display many vaccine delay behaviors.” |
{
"pile_set_name": "USPTO Backgrounds"
} | The present invention relates to apparatus for establishing an electrical circuit between a plurality of contact points. More particularly, the present invention relates to devices for completing the electrical circuit between a plurality of contact points on a momentary basis. Still further, this invention is concerned with apparatus for completing an electrical circuit between a plurality of contact points for only so long as the switch is continuously actuated, the electrical contact being automatically opened when actuation is removed. Although various applications of the present invention will be readily apparent, the invention is especially useful in conjunction with surgical apparatus which requires sealing of the contact switch externally so that it can perform reliable long-term operations without being internally contaminated from seepage while tolerating relatively high temperature and/or chemical fluid environment exposures such as are associated with sterilization of surgical instruments.
A relatively large variety of momentary switch devices have developed in the past. For instance, U.S. Pat. No. 2,343,060 by Horning shows a resilient casing for a switching apparatus wherein raised buttons on the casing indicate the switch positions. By pressing on a selected one of these raised portions, an underlying rocker switch arrangement can be actuated through deflection of the external casing. Similarly, U.S. Pat. No. 3,732,384 by Fischel shows an elongated flexible plunger arrangement for deforming metal contacts into electrical connection.
More recently, there has been extensive activity towards the development of inexpensive switches for use in various keyboard operations such as the input keyboard for a calculator. Many such devices use a generally rigid key cap which is held in a guiding frame and overlies a spring-like metal dome. By pushing the cap downward through its guideway and against the upper perimeter of the metal dome, the dome is deformed temporarily downward against the contact points to establish the circuit therebetween. It has also been suggested that these keyboard caps can be molded as a single unit for application over a dome cage. For instance, U.S. Pat. No. 3,684,842 by Boulanger shows examples of both aforementioned key input arrangements. An arrangement for providing externally sealed switches of possible use in electro-surgical applications is shown in copending application Ser. No. 315,678, filed Dec. 15, 1972 entitled SWITCHING DEVICE FOR ELECTRO-SURGICAL INSTRUMENTS by J. W. Jarrard, now U.S. Pat. No. 3,911,241, which is assigned to the same assignee of the present application.
There has been a continuing need for a keyboard switch actuating cap arrangement which is adaptable for any keyboard configuration somewhat like the relatively rigid plastic cap apparatus but which is suitable for total sealing of the keyboard cap from the environment. Further, there is a need for such a keyboard actuator switch cap which does not require special molds for all potential key positions but which can employ a relatively standard cap arrangement. This need is particularly acute in conjunction with surgical apparatus which is exposed to various potential contaminants and which must be capable of enduring sterilization processing particularly using elevated temperatures in a chemical fluid environment. The use of momentary contacts for hand-held devices as electro-surgical switch controls hazards several problems which have not been satisfactorily resolved by the prior art devices. For instance, entry of blood which is a good electrical conductor into the switch housing not only can erroneously short the switch contacts but also can provide a path for the radio frequency or RF signals into the hand of the surgeon. In addition, the switch arrangement must be such as to prevent migration of contaminants or foreign matter from the switch into the sterile field or wound area. |
{
"pile_set_name": "PubMed Abstracts"
} | Myosin tails and single α-helical domains.
The human genome contains 39 myosin genes, divided up into 12 different classes. The structure, cellular function and biochemical properties of many of these isoforms remain poorly characterized and there is still some controversy as to whether some myosin isoforms are monomers or dimers. Myosin isoforms 6 and 10 contain a stable single α-helical (SAH) domain, situated just after the canonical lever. The SAH domain is stiff enough to be able to lengthen the lever allowing the myosin to take a larger step. In addition, atomic force microscopy and atomistic simulations show that SAH domains unfold at relatively low forces and have a high propensity to refold. These properties are likely to be important for protein function, enabling motors to carry cargo in dense actin networks, and other proteins to remain attached to binding partners in the crowded cell. |
{
"pile_set_name": "PubMed Abstracts"
} | Diphenyl diselenide modulates splenic purinergic signaling in silver catfish fed diets contaminated with fumonisin B1: An attempt to improve immune and hemostatic responses.
The aim of this study was to determine whether purinergic signaling is a pathway associated with fumonisin B1 (FB1)-induced impairment of immune and hemostatic responses. We also determined whether dietary supplementation with diphenyl diselenide (Ph2Se2) prevents or reduces these effects. Splenic nucleoside triphosphate diphosphohydrolase (NTPDase) activity for adenosine triphosphate (ATP) and adenosine diphosphate (ADP) as substrates and total blood thrombocytes counts were significant lower in silver catfish fed with FB1-contaminated diets than in fish fed with a basal diet, while splenic adenosine deaminase (ADA) activity and metabolites of nitric oxide (NOx) levels were significant higher. Also, glutathione peroxidase (GPx) and superoxide dismutase (SOD) activities were significant lower in silver catfish fed with FB1-contaminated diets than in fish fed with a basal diet. Dietary supplementation with 3 mg Ph2Se2/kg of feed effectively modulated splenic NTPDase (ATP as substrate), ADA, GPx and SOD activities, as well as NOx levels, and was partially effective in the modulation of spleen NTPDase activity (ADP as substrate) and total blood thrombocytes count. These data suggest that splenic purinergic signaling of silver catfish fed with FB1-contaminated diets generates a pro-inflammatory profile that contributes to impairment of immune and inflammatory responses, via reduction of splenic ATP hydrolysis followed possible ATP accumulation in the extracellular environment. Reduction of ADP hydrolysis associated with possible accumulation in the extracellular environment can be a pathophysiological response that restricts the hemorrhagic process elicited by FB1 intoxication. Supplementation with Ph2Se2 effectively modulated splenic enzymes associated with control of extracellular nucleotides (except ADP; that was partially modulated) and nucleosides, thereby limiting inflammatory and hemorrhagic processes. |
{
"pile_set_name": "StackExchange"
} | Q:
Basic JS: Adding characters at cursor position, while maintaining cursor position
Say I am making a basic Calculator that allows whole expressions to typed by the user. I'll use a simple <input> tag.
The user can type whatever they want, but I want to make it even easier for the client, I want to add a closing parenthesis immediately after they type (, so I set up my javascript to detect when ( is input by into the input field, then += a ) to the input field.
The problem with my code is that it adds the parenthesis to the end of the input, regardless of where they type the parenthesis, even at the beginning.
How can I add a character where ever the cursor is?
My code is as follows:
input = document.querySelector("input[type=text]");
input.addEventListener(`keyup`, (event)=>
{
if(event.key === `(`)
{
input.value+=`)`;
}
});
<input type="text" placeholder="Put mathematical expression"></input>
A:
I believe that should solve your problem.
let input = document.querySelector("input[type=text]");
input.addEventListener(`keyup`, (event) => {
if(event.key === '(') {
let cursorPos = input.selectionStart;
input.value = input.value.substr(0, cursorPos) + ')' +
input.value.substr(cursorPos);
}
});
|
{
"pile_set_name": "Wikipedia (en)"
} | Thomson Reuters Foundation News
Thomson Reuters Foundation News, formerly Alertnet, is an award winning global news service available free of charge to hundreds of smaller media outlets and non-government organisations around the world. It is run by the Thomson Reuters Foundation, the charitable arm of Thomson Reuters.
Correspondents and stringers shed light on stories that are often overlooked by mainstream media. We are truly global. We have correspondents in London, Barcelona, New York, Delhi, Bangkok, Bogota, Nairobi, Dakar, Mumbai, Chennai, Jakarta, Rio and freelancers in most developing nations.
The global editorial team of over 45 journalists and 150 freelancers covers the world’s under-reported stories at the heart of aid, development, women’s rights, human trafficking, property rights, climate change and resilience.
Awards
In 2017, Nita Bhalla won Journalist of the Year at the SOPA Awards.
In 2015, the team won the Asian Environmental Journalism Award for Excellence in Environmental Reporting by a Media Organisation, as well as a United Nations Correspondents Association UN Foundation prize
In 2012, the Climate editorial team was selected as an Official Honouree of the 16th Annual Webby Awards in the Green category.
In 2011, the team was awarded the “Voices of Courage” Award by the Women’s Refugee Commission (WRC)
In 2011, AlertNet was awarded an EPPY Award for the "Best News Website" category.
AlertNet received a gold trophy for “Best News Site” at the Lovie Awards.
In March 2011, the Foundation won the "Best Use of New Media" award for its Emergency Information Service (EIS) at the Third Annual Social Innovation Awards hosted by Justmeans.
In 2010, “Surviving the Tsunami: Stories of Hope”, a Thomson Reuters Foundation multimedia documentary created for the fifth anniversary of the Indian Ocean tsunami, was nominated for an Emmy award and won a prize at the Best of Photojournalism Awards. The documentary was also a finalist in the 2010 Dart Awards for Excellence in Coverage of Trauma and named Best Web Special Feature by Editor & Publisher.
AlertNet was named a Millennium Product by the British government, an award for outstanding application of innovative technology.[35]
See also
Index of journalism articles
References
Category:News agencies based in the United Kingdom |
{
"pile_set_name": "StackExchange"
} | Q:
is there any performance impacts of using whole methods as public in java?
Are there any performance impacts of using method as a public even there is no need to access that method outside the class?
A:
No. There is no performance impact to making your methods more visible. But, it is not considered a best practice to expose more methods then necessary for the function of your code.
A:
There is a tiny performance impact but it is related to whether the method is override-able and not to whether the method is public. Roughly speaking a method which meets all of the following:
non private
non static
non final
Is considered overridable (that is: can be overridden by a method in a subclass) and thus the compiler cannot determine (at compilation time) the exact implementation that is to be invoked at a given call site. Thus, there is a runtime machinery to carry out this resolution when the call is actually made (a.k.a dynamic binding). This runtime resolution is realized by a very efficient implementation, and is typically heavily optimized by the JVM based on the program's behavior, so the overall penalty is minimal.
|
{
"pile_set_name": "OpenWebText2"
} | Pressing need to act to mitigate risk of no deal, says financial policy committee
The Bank of England has issued its strongest warning yet to the EU that its lack of adequate planning for Brexit has created growing risks for almost £70tn of complex financial contracts.
Threadneedle Street said the bloc had made only limited progress to protect the financial system and time was running out, with little more than six months before the UK is due to leave the EU.
Stressing the urgency of the situation in a statement from its financial policy committee, the Bank said: “In the limited time remaining, it is not possible for companies on their own to mitigate fully the risks of disruption to cross-border financial services.”
Brexit anxiety for businesses 'at highest since referendum' Read more
Without action, the contracts governing the financial derivatives – currently sold across the UK-EU border by banks to companies looking to protect themselves from movements in interest rates and changes in global markets – could be rendered illegal the moment Britain leaves, it warned.
EU firms have about £69tn of outstanding derivatives contracts that are handled through a process known as “clearing” in the UK, while as much as £41tn mature after Britain exits the EU in March 2019.
In a corner of the finance industry worth more than three times the overall value of the EU economy, the process of clearing derivatives involves banks organising their trades through a central third-party organisation – known as a clearing house – which takes on the risk of either party defaulting.
Clearing has become increasingly important since the financial crisis as the EU introduced rules forcing banks to trade greater volumes via clearing houses, with the idea of improving transparency and to avoid the confusion of banks going bust with complex webs of contracts with multiple parties – as was the case in 2008.
EU-authorised clearing houses must handle EU banks’ trades, but UK organisations such as the London Stock Exchange’s LCH handle the bulk of business and could fall outside the rules in the event of a hard Brexit. As much as 90% of EU firms’ interest rate swaps – one of the most common types of financial derivative – are cleared in the UK.
The UK has already taken action to arrange temporary permissions to grant EU banks access to the British market, although parliament has yet to pass the legislation with just months to go before Brexit. The Bank has previously issued warnings to the EU, but there is a growing sense of urgency.
Threadneedle Street warned the EU had shown little willingness to reciprocate the UK plan with potentially damaging consequences for financial sector risk, adding: “The need for authorities to complete mitigating actions is now pressing.”
The game of brinksmanship between the UK and the EU could be seen as a potential way for Brussels to grab more financial services industry activity away from the City of London to European financial centres such as Frankfurt and Paris.
Clearing houses need three months’ notice from banks before they relocate business to another institution, which means failure by the EU to announce any contingency plan by Christmas could force banks to begin relocations.
While that might appear tempting for Brussels, there are fears the EU is ill-prepared to manage the huge influx of derivatives business. Very few contracts have moved in the two years since the Brexit vote, despite repeated warnings over the risks.
Senior bankers have warned that relocating derivatives contracts is akin to handling “nuclear waste”, while British officials believe there is too little time for banks to act given the scale of the challenge.
Sign up to the daily Business Today email or follow Guardian Business on Twitter at @BusinessDesk
The Bank sounded the alarm over other emerging risks to the UK financial system besides Brexit, including rapid growth of leveraged lending to high-risk companies, in a worrying parallel to the US sub-prime market before the 2008 crash.
It also said it would announce the results of its annual banking industry stress tests on 5 December, which would include an economic scenario worse than Brexit. The Bank said it continued to judge that the UK banking system would be strong enough to serve households and businesses through a disorderly cliff-edge Brexit. |
{
"pile_set_name": "Pile-CC"
} | Barbra Streisand - The Way We Were (1973)
“The single of this song is the one to hear. There are so many different versions from the movie out there, but that’s the sweet stuff. All the versions have the same strings, but on the single you can hear the solid drums and the bass part that I created.
“It was all cut live - strings, the band, and Barbra sing right there with us. I think we did 32 takes, which was quite a lot. I was trying to work around Barbra’s vocals, but Marvin Hamlisch, the producer, kept getting annoyed. ‘Stick to the part, Carol. Don’t ad-lib,’ he told me.
“I was getting pretty bored playing such a simple part, so after 31 takes I just decided, ‘Oh hell, I’m gonna go for it.’ [laughs] I played some real interesting lines and fills. Barabra’s voice held this long note, and the feeling was electrifying. She gave it her all, I gave it my all, and the whole thing came together.” |
{
"pile_set_name": "Pile-CC"
} | Generally, we take the natural freedom of movement for granted, until it becomes limited. Knee pain is a very common problem with various causes but usually it’s a result of severe injury or arthritis. Though this era is an era of technological advancement, ayurvedic medicines cannot be underestimated. Ayurveda stands ahead of the allopathic medications and surgery that has been practiced since ancient times. In certain problems such as joint pain, ayurvedic medicines/oils work as a miraculous tool to eliminate the root cause of the pain.
Ayurveda is an oldest branch of medicine that was discovered about 3000 years ago. It is considered as a divine gift; not man made. Ayurvedic medicines are protective, health primitive, preventive as well as curative in nature. At the same time, these are natural, nutritive, self-contained and harmless. They offer a constructive approach against the critical forces harming our body. The base ingredients of ayurvedic medicines are fruits, flowers, vegetables, plants, herbs and all vegetation that grows around us.
Join pain, especially knee pain, is one of the largest problems around whole world. The foot contains around 26 bones and more than 30 joints. The pain occurs due to malfunction in any of these joints. The pain may be caused by redness, stiffness, swelling, bruising, tenderness or increased warmth over the affected joints. Ayurvedic Medicines are one-stop, permanent solution for all kinds of joint pains.
Asthijivak is one such natural knee pain relief oil & paste that provides quick relief in all kinds of joint pains, knee pain, muscular pain, etc. It is the combination of rare herbal medicines that help heal the damaged nerves. This herbal medication has been prepared by following all the ayurvedic rules & regulations to help our joints of the body regain smoothness.
The herbs have been used in their ‘ark’ form and ‘raw’ form to ensure efficient relief and restore the normal functioning of the body. The oil and paste will penetrate into the skin and provide relief in the affected area. By this way, Asthijivak also helps in increasing the lubrication between the joints. |
{
"pile_set_name": "Wikipedia (en)"
} | 1958 South American Basketball Championship for Women
The 1958 South American Basketball Championship for Women was the 7th regional tournament for women in South America. It was held in Lima, Peru and won by Brazil. Five teams competed.
Final rankings
Results
Each team played the other teams twice, for a total of eight games played by each team.
External links
FIBA Archive
South
B
Category:1958 in Peruvian sport
Category:Sports competitions in Lima
Category:South American Basketball Championship for Women
Category:April 1958 sports events
Category:May 1958 sports events
Category:1950s in Lima |
{
"pile_set_name": "StackExchange"
} | Q:
Is it possible to have a usercontrol in WPF receive notification that a (multiple) property on a binded class has changed?
I have a usercontrol that uses several properties on a binded class. I would like to update the control if any of the properties on this class change.
INotifyPropertyChanged only works if I bind to the property directly. (this will work but I would have to bind to several properties for each instance of the control)
Below is a striped down version of the issue I am having. The DirectProperty works as expected. The ParentPropertyChangedCallback() is only fired when the ParentClass is assigned to the user control, not when any of the properties change.
Please tell me I doing something stupid =)
UserControl1.xaml.cs
public partial class UserControl1
{
public static readonly DependencyProperty DirectPropertyProperty =
DependencyProperty.Register(
"DirectProperty",
typeof(bool),
typeof(UserControl1),
new PropertyMetadata(default(bool), DirectPropertyChangedCallBack));
public static readonly DependencyProperty ParentClassProperty =
DependencyProperty.Register(
"ParentClass",
typeof(ParentClass),
typeof(UserControl1),
new PropertyMetadata(default(ParentClass), ParentPropertyChangedCallback));
public UserControl1()
{
InitializeComponent();
}
public bool DirectProperty
{
get { return (bool)GetValue(DirectPropertyProperty); }
set { SetValue(DirectPropertyProperty, value); }
}
public ParentClass ParentClass
{
get { return (ParentClass)GetValue(ParentClassProperty); }
set{ SetValue(ParentClassProperty, value); }
}
// private void parentProperty_Changed(object)
private static void DirectPropertyChangedCallBack(
DependencyObject dependencyObject,
DependencyPropertyChangedEventArgs dependencyPropertyChangedEventArgs)
{
var sourceObject = dependencyObject as UserControl1;
if (sourceObject == null) return;
//set rectangle 1 base on Direct Property
sourceObject.Rectangle1.Fill =
sourceObject.ParentClass.DirectProperty
? new SolidColorBrush(Colors.Green)
: new SolidColorBrush(Colors.Red);
}
private static void ParentPropertyChangedCallback(
DependencyObject dependencyObject,
DependencyPropertyChangedEventArgs dependencyPropertyChangedEventArgs)
{
var sourceObject = dependencyObject as UserControl1;
if (sourceObject == null) return;
//set rectangle 2 base on ParentClass Property
sourceObject.Rectangle2.Fill =
sourceObject.ParentClass.ParentProperty
? new SolidColorBrush(Colors.Green)
: new SolidColorBrush(Colors.Red);
//set rectangle 3 base on ChildClass Property
sourceObject.Rectangle3.Fill =
sourceObject.ParentClass.ChildClass.ChildProperty
? new SolidColorBrush(Colors.Green)
: new SolidColorBrush(Colors.Red);
}
}
ParentClass.cs
public class ParentClass :INotifyPropertyChanged
{
private ChildClass _childClass;
private bool _directProperty;
private bool _parentProperty;
public event PropertyChangedEventHandler PropertyChanged;
public ChildClass ChildClass
{
get { return _childClass; }
set
{
if (Equals(value, _childClass)) return;
_childClass = value;
OnPropertyChanged();
}
}
public bool DirectProperty
{
get { return _directProperty; }
set
{
if (value.Equals(_directProperty)) return;
_directProperty = value;
OnPropertyChanged();
}
}
public bool ParentProperty
{
get { return _parentProperty; }
set
{
if (value.Equals(_parentProperty)) return;
_parentProperty = value;
OnPropertyChanged();
}
}
[NotifyPropertyChangedInvocator]
protected virtual void OnPropertyChanged([CallerMemberName] string propertyName = null)
{
var handler = PropertyChanged;
if (handler != null) handler(this, new PropertyChangedEventArgs(propertyName));
}
}
ChildClass.cs
public class ChildClass : INotifyPropertyChanged
{
private bool _childProperty;
public event PropertyChangedEventHandler PropertyChanged;
public bool ChildProperty
{
get { return _childProperty; }
set
{
if (value.Equals(_childProperty)) return;
_childProperty = value;
OnPropertyChanged();
}
}
[NotifyPropertyChangedInvocator]
protected virtual void OnPropertyChanged([CallerMemberName] string propertyName = null)
{
var handler = PropertyChanged;
if (handler != null) handler(this, new PropertyChangedEventArgs(propertyName));
}
}
**** Working Modified ParentClass
public class ParentClass :INotifyPropertyChanged
{
private ChildClass _childClass;
private bool _directProperty;
private bool _parentProperty;
public event PropertyChangedEventHandler PropertyChanged;
public ParentClass()
{
PropertyChanged += OnPropertyChanged;
}
public ChildClass ChildClass
{
get { return _childClass; }
set
{
if (Equals(value, _childClass)) return;
_childClass = value;
OnPropertyChanged();
_childClass.PropertyChanged += OnPropertyChanged;
DirectProperty = !DirectProperty;
}
}
public bool DirectProperty
{
get { return _directProperty; }
set
{
if (value.Equals(_directProperty)) return;
_directProperty = value;
OnPropertyChanged();
}
}
public bool ParentProperty
{
get { return _parentProperty; }
set
{
if (value.Equals(_parentProperty)) return;
_parentProperty = value;
OnPropertyChanged();
DirectProperty = ! DirectProperty;
}
}
[NotifyPropertyChangedInvocator]
protected virtual void OnPropertyChanged([CallerMemberName] string propertyName = null)
{
var handler = PropertyChanged;
if (handler != null) handler(this, new PropertyChangedEventArgs(propertyName));
}
private void OnPropertyChanged(object sender, PropertyChangedEventArgs propertyChangedEventArgs)
{
if (propertyChangedEventArgs.PropertyName == "DirectProperty") return;
// Properties that are bound to the UI you want to update
DirectProperty = ! DirectProperty;
}
}
A:
What you can do on your classes is to subscribe to property changed event. INotifyPropertyChanged gives you the ability to subscribe for PropertyChanges
public ParentClass()
{
this.PropertyChanged += OnPropertyChanged;
}
private void OnPropertyChanged(object sender, PropertyChangedEventArgs propertyChangedEventArgs)
{
// Properties that are bound to the UI you want to update
OnPropertyChanged("PROPERTYNAME");
}
Now that'll trigger for any property changed and gets repeated if you just update everything on each property name that was changed. You can customize how it behaves but the idea is there. You can also access properties in PropertyChangedEventArgs to what properties are being changed.
|
{
"pile_set_name": "Pile-CC"
} | Enjoy your favorite movies for more than just 2 hours.IN ASSOCIATION WITH: Amazon, Ebay, Zazzle, AllPosters, CafePress.All transactions are safe and secure with a reliable history in online purchasing behind our associates. Explore film adaptations by browsing 2003 movies based on books, including Freaky Friday.
2003 Movies Based on Books
Read the Book Before You See the Movie. Which is better? You decide. Browse movies based on books.
Freaky Friday(Switching Roles, Teenage, Fairy Tale, Adaptation)PLOT: Based on the book by author Mary Rodgers, this remake features Jamie Lee Curtis playing Ellen, a widow about to be remarried who argues constantly with her daughter, Annabel (Lindsay Lohan). The two wish they could exchange bodies so that they could see what life is like in the other's shoes, and then it happens! AUTHOR: Mary Rodgers |
{
"pile_set_name": "Pile-CC"
} | Tuesday, July 1, 2008
As I pulled up to the east shore of the lake at Mormon Island State Park during Heather and Nate’s engagement session, Heather asked me if I have a hard time getting some couples to do the things I want them to do during engagement sessions.
“Not really,” I said, answering without a lot of consideration. “Then again, I haven’t been able to convince anybody to use this shower. I think that might make for some interesting photos.”
Nate and Heather are anything but a boring couple. I had a blast photographing their engagement session. The two of them are awesome and put up with some pretty good heat, some stinky locations and one of the worst mosquito spells I’ve had to endure as a photographer. |
{
"pile_set_name": "PubMed Central"
} | Zucchini was first noted as a gene essential for female fertility in *Drosophila*. Multiple independent alleles caused fully penetrant sterility and the production of eggs with dorsoventral patterning defects^[@R7]^. Subsequent studies have traced the impacts of Zucchini on germ cell development to its function in the piRNA pathway. Animals lacking Zucchini fail to silence transposons and show a general collapse of primary piRNA populations^[@R6],[@R8],[@R9]^. Mutant animals also accumulate transcripts from piRNA clusters, indicating a failure to process these precursors into small RNAs^[@R5]^. Thus, Zucchini was strongly implicated as a factor promoting primary piRNA biogenesis.
Zuc belongs to the phospholipase D (PLD) family of phosphodiesterases, which share a common biochemical mechanism and a signature H(X)K(X4)D (HKD) motif within their active site (reviewed in Selvy et al.^[@R10]^). Notably, one of the *zuc* alleles that emerged from the original forward genetic screen was a point mutation that changed the catalytic histidine to a tyrosine. This produced a phenocopy of the presumed null allele, including similar effects on piRNA populations, strongly suggesting that the catalytic activity of Zucchini was critical for piRNA production or stability^[@R5],[@R6]^.
Biochemical and genetic studies of the mouse Zucchini homolog, mZuc/PLD6, led to the conclusion that it acted as a phospholipase which affected mitochondrial fusion in a manner linked to its processing of the mitochondrial lipid, cardiolipin^[@R11]--[@R13]^. Thus, it was suggested that the impact of Zucchini on the piRNA pathway was indirect, through alterations in lipid levels or through changes in the structure of mitochondria. Yet, the proposed model of Zucchini activity required an enzyme that localized to the outer mitochondrial membrane and faced the cytoplasm to hydrolyze a lipid that is almost exclusively found on the inner mitochondrial membrane^[@R14]^. We therefore sought to discriminate between the two divergent hypotheses for Zucchini function in piRNA biogenesis, namely that it acts indirectly through its role as a phosphodiesterase or that it acts directly as a nuclease.
To enable biochemical analysis of mZuc, we expressed an amino-terminally truncated form of the protein in Sf9 cells ([Fig. 1a](#F1){ref-type="fig"}). This produced a soluble enzyme by removal of the transmembrane domain that normally anchors it to the mitochondrial outer membrane. One of the hallmarks of the PLD family is the presence of two HKD motifs that are brought together to create the catalytic center^[@R10]^. This active site can arise from a single polypeptide that contains two copies of the motif, an arrangement typical of PLDs with phospholipid substrates. Alternatively, the catalytic center can be assembled as an intermolecular dimer, a form most common with the PLDs that act as nucleases (reviewed in Selvy et al.^[@R10]^). mZuc has only one HKD motif, but the protein formed a stable, \~41 kDa dimer in Sf9 cells, as indicated by both gel filtration chromatography and multi-angle light scattering ([Fig. S1](#SD1){ref-type="supplementary-material"}). For comparison, we also produced a mutant version of the protein, which lacks an intact catalytic motif (H153N).
We used two assays to test whether recombinant mZuc could function as a phospholipase, liberating phosphatidic acid (PA) from cardiolipin as previously reported^[@R11]^. Liposomes containing commercial cardiolipin were incubated with recombinant proteins, and PA was measured by thin layer chromatography. This did not reveal the production of measurable amounts of PA by mZuc, while a commercially available PLD from *Streptomyces chromofuscus* (scPLD) completely hydrolyzed the substrate ([Fig. S2a](#SD1){ref-type="supplementary-material"}). We also employed a more sensitive assay based upon mass spectrometry (MS). Selected reaction monitoring MS (SRM-MS) provides an extremely accurate and sensitive method for measuring reaction components. Using this approach, no significant changes in cardiolipin or PA were observed when comparing buffer controls to either wild-type or catalytically inactive mZuc proteins ([Figs. 1bM](#F1){ref-type="fig"}; [S2b,c](#SD1){ref-type="supplementary-material"}); whereas scPLD again completely hydrolyzed the substrate. These results failed to provide support for Zucchini acting as a phospholipase to promote piRNA biogenesis and prompted us to examine alternative activities.
PLD family enzymes that have been demonstrated to act as nucleases, cleaving double-stranded DNA substrates^[@R15]--[@R17]^. For example, prototypic PLD nucleases, Nuc and BfiI, cleave dsDNA either non-specifically or at a defined recognition site^[@R10]^. We therefore incubated mZuc with a selection of end-labeled DNAs: single-stranded, double-stranded, or partially duplexed ([Fig. 1c](#F1){ref-type="fig"}). The wild-type enzyme hydrolyzed single-stranded DNA or the single-stranded portions of partially duplexed substrates but did not cleave dsDNA. The mutant enzyme (H153N) was inactive against all substrates. As expected from studies of related PLD-family nucleases^[@R17]^, mZuc activity did not depend upon the presence of divalent cations for substrate cleavage, but it could be stimulated by the presence of specific cations, particularly Mn^2+^, Ca^2+^, and Zn^2+^ ([Fig. S3a](#SD1){ref-type="supplementary-material"}). The impact of Zn^2+^ may be explained by structural effects (see below), but as yet we do not understand how the other cations enhance activity.
The known catalytic mechanisms of PLD-family nucleases, including bacterial Nuc, suggest that cleavage proceeds via a two-step reaction scheme^[@R15]^. This includes the formation of a short-lived, covalent enzyme-substrate intermediate, joining a phosphate to the histidine in the HKD motif ([Fig. S4a](#SD1){ref-type="supplementary-material"}). A similar mechanism for mZuc is supported by our ability to label the enzyme simply by incubation with ^32^P-labeled inorganic phosphate in manner that depends on the presence of the HKD histidine ([Fig. 1d](#F1){ref-type="fig"}). The specificity of this adduct was confirmed by performing a similar incubation of mZuc with PO~4~^3-^ followed by denaturation, proteolysis, and SRM-MS which detected phosphorylation of a His153-containing peptide. The fragmentation of this peptide was able to further resolve the location of the phosphorylation to residues 152--155 ([Fig. S4b](#SD1){ref-type="supplementary-material"}). Our phosphate-labeling data combined with the proposed catalytic mechanism for PLD family nucleases suggested that mZuc might be inhibited by phosphate analogs. Indeed, sodium orthovanadate completely abolished the ability of mZuc to cleave ssDNA substrates ([Fig. 1e](#F1){ref-type="fig"}).
If mZuc functions as a nuclease in the piRNA pathway, it would most likely act on RNA substrates, and the biochemical mechanism used by PLD-family enzymes is consistent with their potentially cleaving either DNA or RNA. We therefore tested the ability of mZuc to cleave a variety of single-stranded or duplexed RNA substrates. mZuc cleaved only single stranded RNA, and this reaction was fully inhibited by orthovanadate ([Fig. 2a](#F2){ref-type="fig"}). The mZuc mutant bearing an alteration in its catalytic site was inactive in these assays ([Figs. 2b](#F2){ref-type="fig"}, [S3b](#SD1){ref-type="supplementary-material"}). These data indicate that mZuc can function as a backbone non-specific, single-strand specific nuclease, cleaving either RNA or DNA substrates. The binding affinity of mZuc for single stranded DNA or RNA substrates was nearly identical, measured at roughly 50 nM in each case ([Fig. S5](#SD1){ref-type="supplementary-material"}); however, in vivo, the physiologically relevant targets of mZuc are probably determined by its subcellular localization and perhaps with the help of additional proteins, which would focus its activity toward certain substrates.
HKD-family nucleases are predicted to leave 5\' phosphate and 3\' hydroxyl termini. These termini also correspond to the end polarities that would be expected of a nuclease that participated in the processing of primary piRNA transcripts. We tested whether the nucleolytic products of mZuc bore such termini in several ways. β-elimination shifted mZuc cleavage products by a single base, a reaction that is diagnostic of the presence of a 3\' OH terminus ([Fig. 2b](#F2){ref-type="fig"}). We also confirmed the presence of a 3\' OH group by extending the cleavage products with poly A polymerase ([Fig. 2b](#F2){ref-type="fig"}). DNA cleavage also produced 5\' phosphate and 3\' hydroxyl termini ([Fig. S3c](#SD1){ref-type="supplementary-material"})
In order to gain further insight into mZuc activity and substrate specificity we determined its structure to 1.75 Å resolution. Like other members of the HKD family, the structure of mZuc consists of a conserved β-sheet core sandwiched between two α-helical layers ([Fig. 3a](#F3){ref-type="fig"}). As seen in the crystal structure of the bacterial family member, Nuc^[@R18]^, the monomers of the mZuc dimer are related by a crystallographic two-fold axis. The dimer interface is extensive, with a buried surface area of 2600 Å^2^ as calculated by PISA^[@R19]^. The resulting arrangement of the active site residues and the distance between the catalytic histidines (His153) is consistent among both monomeric and dimeric PLD structures as evidenced by both the apo structure and the structure of the protein in complex with tungstate, a phosphate mimic that binds to the active site of the enzyme similar to Nuc^[@R18]^ ([Fig. 3b](#F3){ref-type="fig"}, [S6](#SD1){ref-type="supplementary-material"}).
Whilst mZuc is clearly an HKD family enzyme, a number of features unique to this structure support its biological activity as a nuclease and, more specifically, a single-stranded RNase. First, and most strikingly, a long, ordered loop is inserted between β1 and α2 (residues Pro44-Ser75). This loop extends away from the active site and contains three cysteines (Cys49, Cys66, and Cys68) as well as a histidine (His72) that form an unexpected CCCH "zinc wing" ([Figs. 3c](#F3){ref-type="fig"}, [S7](#SD1){ref-type="supplementary-material"}). While zinc finger motifs are widely used for nucleic acid binding, this particular instance had escaped bioinformatic detection due to the atypical primary sequence of the CCCH (CX~16~CPCX~3~H as opposed to the canonical CX~6--14~CX~4--5~CX~3~H; see ref. ^[@R20]^). Interestingly, the CCCH class of zinc fingers, in particular, has been implicated in the binding of ssRNA molecules such as mRNA^[@R21]--[@R23]^ and viral RNAs^[@R24]^ in accord with ssRNA being the likely *in vivo* substrate for mZuc.
PLD family members that are responsible for lipid metabolism typically place the active site in a structural "pocket." In contrast, we observed that those with nucleic acid substrates typically provide a larger substrate-binding "groove" ([Figs. 4](#F4){ref-type="fig"}, [S8](#SD1){ref-type="supplementary-material"}). In the mZuc structure, the active site is flanked by a positively charged groove that extends to the zinc wings ([Figs. 4a](#F4){ref-type="fig"}, [S9](#SD1){ref-type="supplementary-material"}), likely serving as a nucleic acid binding interface. When compared to the structure of Nuc, a PLD nuclease that acts on dsDNA ([Fig. 4b](#F4){ref-type="fig"}), the width of the groove in mZuc is considerably narrower, consistent with the biochemically observed single-strand specificity of the enzyme.
We constructed a hypothetical model to examine the potential interaction between the proposed substrate-binding groove of mZuc and a single-stranded RNA. This was subjected to energy minimization using GROMACS^[@R25]^. The resulting model ([Figs. 4a](#F4){ref-type="fig"}, [S10](#SD1){ref-type="supplementary-material"}) illustrates the shape and charge complementarity that a single-stranded nucleic acid substrate provides, including appropriate placement of the scissile phosphate in the active site. The surface complementarity is particularly striking; however, based on the projections of the bases away from the core of the protein, it seems unlikely that mZuc would display a strong sequence bias for binding or cleavage.
Our results strongly imply that Zucchini functions as a nuclease to promote primary piRNA biogenesis. Given the results of elegant biochemical analyses performed in silkworm extracts, it is highly probable that the mature 3\' ends of piRNAs are formed by exonucleolytic trimming of precursor piRNAs that are already loaded into PIWI proteins^[@R3]^. This leaves open the possibility that Zucchini could generate the 5\' ends of primary piRNAs. mZuc does produce products with the correct phosphate polarity. Yet, primary piRNAs show an overwhelming bias for a terminal U residue^[@R2],[@R26],[@R27]^, which does not seem to be a preference of mZuc, based either upon biochemical or structural studies. Therefore, if Zucchini does generate piRNA 5\' ends, the prevalence of their characteristic terminal residue must result either from an unknown co-factor or from the selectivity of a 5\' end-binding pocket within PIWI-family proteins. The latter is a reasonable possibility as there is ample biochemical and structural support within the Argonaute sub-family for strong binding preferences for 5\' terminal nucleotides^[@R28],[@R29]^. We must also consider the possibility that Zucchini proteins could contribute an additional, yet unanticipated activity, perhaps generating intermediate 3\' ends of precursor piRNAs that are further resected by trimming to form mature termini. Attributing a definitive role to Zucchini will rest on further studies, perhaps ultimately requiring a full biochemical reconstitution of primary piRNA biogenesis to finally resolve its function.
In addition to their implications for piRNA production, our studies also highlight some general features of the phosphodiesterases, which use HKD motifs as their active sites. A comparison of the available structures of the PLD/nuclease family proteins indicates that these enzymes define their substrate specificity by their binding properties. While phospholipases within this family seem to harbor pocket-like substrate binding structures, nucleases display extended binding grooves for nucleic acid chains. These structural motifs are nearly diagnostic of the substrate specificity of these proteins. That having been said, based solely on our biochemical assays and taking into account existing literature^[@R11]--[@R13]^, we cannot exclude that mZuc can act in some circumstances as a phospholipase. We can simply argue that structural features are more consistent with its action as a nuclease. The ability to divide enzymes within this family into classes based upon their structural and biochemical features may also suggest that the PLD nomenclature for some of these enzymes, particularly for mZuc and Nuc, has become misleading and deserves reconsideration.
Online Methods {#S8}
==============
Cloning, expression, and purification of mZuc fragments {#S9}
-------------------------------------------------------
In order to screen for well-behaved targets, a panel of mZuc constructs was generated from *M. musculus* cDNA by SLIC cloning. These constructs presented various N- or C-terminal tags for enhanced expression and purification using either *E. coli* or baculoviral-induced insect cell culture systems. The sequence of each construct was verified by the Cold Spring Harbor Laboratory DNA Sequencing Facility.
The data presented herein resulted from a 30-residue N-terminal deletion of mZuc to create a protein that spans residues 31--221 fused to a Thrombin-cleavable *Strep*-tag at the C-terminus (mZuc△30-ThStrep~2~). This construct was cloned into the vector pFL for expression in Sf9 cells using the baculovirus expression system^33^. After expression, cells were harvested by centrifugation at 1000×*g*, resuspended in lysis buffer (0.1 MMES, pH 6.5, 0.15 M NaCl, 1 mM DTT) (\~20 mL per liter culture), and lysed by sonication. The cell lysate was then clarified by ultracentrifugation at 125,000×*g* for 1 h and the supernatant applied to a *Strep*-Tactin (IBA) column equilibrated with lysis buffer. The bound mZuc△30-ThStrep~2~ was subsequently washed with lysis buffer, further washed with lysis buffer containing 2 mM ATP, and finally eluted in lysis buffer containing 5 mM D-desthiobiotin. To remove the C-terminal affinity purification tag, 15 units of thrombin protease were added per mg of purified protein and incubated overnight at 4 °C. The cleaved mZuc△30 (herein referred to as mZuc) was the further purified by gel filtration using a Superdex75 column equilibrated with lysis buffer. Once purified, the protein was concentrated to 5--10 mg/mL and stored at 4 °C for short periods or in 50% (v/v) glycerol at −20 °C for extended periods. Typical yields were 1--2 mg of purified protein (\>98% purity as assessed by SDS-PAGE) per liter culture. Active site mutants were constructed using SLIC cloning methods. Purification of mutant proteins was identical to that for the wild type.
For SRM-MS experiments, mZuc wildtype + H153N heterodimer was purified by co-expressing mZucΔ30-ThStrep~2~ and mZucΔ30-ThHis~6~ H153N. After *Strep*-Tactin purification, a second round of affinity purification with Ni-NTA resin was performed to isolate heterodimers. The purified protein was immediately concentrated and desalted into 20 mM MES, pH 6.5, 0.15 M NaH~2~PO~4~, 1 mM DTT for subsequent SRM-MS processing.
Multiangle Light Scattering (MALS) {#S10}
----------------------------------
Multiangle light scattering was utilized to determine the oligomeric state of the purified proteins. Roughly 1 mg of purified protein (at 2 mg/mL) was taken for in-line gel filtration on a Superdex75 column followed by light scattering analysis. MALS was measured with a Wyatt Dawn Heleos-II and processed using the included software (ASTRA Version 5.3.4). Bovine Serum Albumin (BSA) was used as a control to ensure proper calibration.
Mass Spectrometry (MS) -- Intact mass measurements {#S11}
--------------------------------------------------
Each purified protein was diluted in water to 1 μM and applied to a Zorbax 300SB-C8 enrichment chip at 600 nL/min. In total, \~20 pmol of material was injected. A mobile phase gradient from 0.1% formic acid and 3% acetonitrile in water to 0.1% formic acid and 90% acetonitrile was used to chromatograph each sample, which was then taken for in-line electrospray ionization mass spectrometry. Mass spectra were obtained on an Agilent 6520 Accurate-Mass quadrupole time-of flight mass spectrometer with an accelerating voltage of 1850 V. Deconvolution was performed with the included software, Agilent MassHunter Qualitative Analysis Version B.04.00. Masses of all proteins were within 1.0 Da of those predicted.
Liposome preparation {#S12}
--------------------
In order to assess the phospholipase activity of the mZuc, cardiolipin-containing liposomes were prepared. Defined liposomes (PC:PE:PS:CL at 2:2:1:1) or extract-based liposomes (made with bovine heart lipid extract supplemented with CL) were made using standard methods. Briefly, lipids (Avanti Polar Lipids) in chloroform were mixed then dried using a stream of nitrogen followed by vacuum evaporation. Lipid films were then resuspended in 10 mM HEPES, pH 7.4, 0.1 M NaCl such that the final concentration of total lipids was 1 mg/mL. The resuspended lipids were vortexed vigorously and sonicated using a bath sonicator for \~15 minutes, until the suspension clarified. Absorbance measurements of the pre- and post-sonication liposomes were used to estimate the effective diameters^34^ of the resulting small unilamellar vesicles (SUVs) at less than 200 nm. Lipids and liposomes were stored under nitrogen at −20 °C and 4 °C, respectively, to limit oxidation when not in use.
Cardiolipase activity assay -- Thin Layer Chromatography (TLC) {#S13}
--------------------------------------------------------------
Cardiolipin cleavage assays were performed in a similar manner to those previously reported^[@R11]^. For each reaction, 20 μL of liposome solution (20 μg of total lipids) were mixed with 5 μg purfied protein in a reaction buffer of either 50 mM MES, pH 6.5, 75 mM NaCl, 1 mM DTT (nuclease buffer conditions) or 50 mM HEPES, pH 7.4, 80 mM KCl, 3 mM MgCl~2~, 2 mM CaCl~2~, 1 mM DTT (previously reported lipase conditions^[@R11]^). Commercially available PLD from *S. chromofuscus* (MP Biomedicals) was used as a positive control. Each 200 μL reaction was incubated at 37 °C for two hours, then quenched by the addition of 750 μL of methanol:chloroform (2:1).
Lipids were extracted by sequentially adding 250 μL chloroform and 250 μL 0.5 M NaCl in 0.1 M HCl (in water) with vigorous vortexing following each addition. The lower (organic) phase was removed, dried by vacuum evaporation, and resuspended in a small volume of methanol:chloroform for TLC analysis.
Each of the extracts was spotted onto 2.5 × 7.5 cm, glass-backed silica 60 F~254~ TLC plates (EMD). The extracts were chromatographed using a running solvent of chloroform:methanol:water:ammonium hydroxide (120:75:6:2), stained using permanganate (0.75% KMnO~4~, 5% KH~2~PO~4~, 0.06% NaOH), and developed by heating. Extract components appeared as yellow spots on a magenta background. Lipid identification was based on standards run in parallel.
Cardiolipase activity assay -- Selected Reaction Monitoring (SRM) Mass Spectrometry (MS) {#S14}
----------------------------------------------------------------------------------------
To confirm the findings of the TLC-based phospholipase activity assay and to obtain higher sensitivity for detecting the presumed phosphatidic acid product, an SRM-MS assay was employed. After performing the lipase reaction described above, 5 μ each (non-extracted) defined liposome lipase reaction were infused into a Thermo Scientific triple stage quadrupole (TSQ) Vantage mass spectrometer. Mass-to-charge ratio (*m/z*) peaks corresponding to cardiolipin \[(18:2)~4~ species with a +1 charge state at 1448 Da; (18:2)~4~ species with a +2 charge state at 723 Da\] and phosphatidic acid \[(18:2)~2~ species with +1 charge state at 695 Da\] were monitored. Injections were performed in triplicate.
Nuclease activity assays {#S15}
------------------------
DNA and RNA oligonucleotides ordered from Integrated DNA Technologies (IDT) or Dharmacon. TGGCACTGTACCTCATCGACATTGAGAAGTGGCTCTCTGACTGGCGAATA (50 nt DNA)TATTCGCCAGTCAGAGAGCCACTTCTCAATGTCGATGAGGTACAGTGCCA (50 nt DNA)TATTCGCCAGTCAGAGAGCCACTTC (25 nt DNA)TCAATGTCGATGAGGTACAGTGCCA (25 nt DNA)TATTCGCCAGTCAGAGAGCC (20 nt DNA)GTCGATGAGGTACAGTGCCA (20 nt DNA)UGGCACUGUACCUCAUCGACAUUGAGAAGUGGCUCUCUGACUGGCGAAUA (50 nt RNA)UAUUCGCCAGUCAGAGAGCCACUUCUCAAUGUCGAUGAGGUACAGUGCCA (50 nt RNA)UAUUCGCCAGUCAGAGAGCC (20nt RNA)GUCGAUGAGGUACAGUGCCA (20nt RNA)UGGCACUGUACCUCAUCGAC (20nt RNA)GGCUCUCUGACUGGCGAAUA (20nt RNA)
Oligonucleotides were 5\'-labeled with ^32^P γ-ATP (PerkinElmer) or ATP (Sigma-Aldrich) using T4 polynucleotide kinase (NEB) according to the manufacturer\'s instructions. Free ATP was removed and the buffer exchanged using illustra MicroSpin™ G-25 Columns (GE Healthcare). Double-stranded substrates were annealed by mixing equimolar amounts of the complementary strands in water, denaturing at 95 °C for one minute, then cooled slowly from 65 °C to 25 °C in the presence of 30 mM NaCl, 10 mM MES, pH 6.5.
For enzymatic assays, mZuc was stored in 50% (v/v) glycerol at −20 °C. scPLD (EMD) was freshly prepared from the lyophilized stock according to the manufacturer\'s protocol. To assess nuclease activity, substrates were incubated with recombinant protein in 50 mM MES, pH 6.5, 75 mM NaCl, 2 mM CaCl~2~,1 mM DTT for DNase activity, or 5 mM MES, pH 6.5, 7.5 mM NaCl, 2 mM CaCl~2~,1 mM DTT for RNase activity at 37 °C for three hours ([Fig. 1c](#F1){ref-type="fig"} and [Supplementary Fig. 3c](#SD1){ref-type="supplementary-material"}) or six hours ([Figs 1e](#F1){ref-type="fig"}, [2](#F2){ref-type="fig"} and [Supplementary Fig. 2b](#SD1){ref-type="supplementary-material"}). DNA and RNA substrates were used at a final concentration of 5 μM ([Fig. 1](#F1){ref-type="fig"} and [Supplementary Fig. 3](#SD1){ref-type="supplementary-material"}), or 50 nM ([Fig. 2](#F2){ref-type="fig"}). Recombinant mZuc-dimer was used at a final concentration of 5 μM ([Fig. 1](#F1){ref-type="fig"}) or 50 μM ([Fig. 2](#F2){ref-type="fig"} and [Supplementary Fig. 2b](#SD1){ref-type="supplementary-material"}). When RNA was used as a substrate, RNasin® Plus RNase Inhibitor (Promega) was added. Protein was removed from the cleavage reactions by proteinase K treatment (Roche) at a final concentration of 2 mg/mL (in 50 mM Tris-HCl, pH 7.5, 75 mM NaCl, 6 mM EDTA, 1% (w/v) SDS) at 50 °C for 30 minutes. Nucleic acids were extracted using phenol/chloroform (Ambion), precipitated with sodium acetate/ethanol and separated by 15% urea-polyacrylamide gel electophoresis (urea-PAGE). Low Molecular Weight Marker 10--100 nt (Affimetrix) was labeled with ^32^P γ-ATP and used as a size ladder. Visualization was accomplished using a Storm PhosphorImager.
To assess the chemical properties of mZuc cleavage products, nucleic acids were recovered from the cleavage reactions using proteinase K and phenol/chloroform extraction followed by an additional chloroform extraction and sodium acetate/ethanol precipitation. For DNA products, Terminal deoxynucleotidyl Transferase (TdT) (NEB) was incubated with the extracted oligonucleotides in the presence of ddATP or dATP according to the manufacturer\'s protocol. For RNA products, β-elimination was performed according to Vagin *et al*.^35^. Poly-A-tailing was performed using Poly(A) tailing kit (Ambion) at 37 °C for 15 minutes.
Detection of the phosphohistidine intermediate using ^32^P-disodium phosphate {#S16}
-----------------------------------------------------------------------------
mZuc wt and H135N (at a dimer concentration of 50 μM) were incubated with 0.4 mM ^32^P-disodium phosphate (PerkinElmer) in 50 mM MES, pH 6.5, 75 mM NaCl, 1 mM DTT at 37 °C for 3 hours. Proteins were separated by SDS-PAGE on a 10% NuPAGE gel (Invitrogen) and transferred to a nitrocellulose membrane. Proteins bound to the membrane were visualized by Ponceau S staining (0.1% Ponceau S, 5% acetic acid), and ^32^P was detected by phosphoimaging.
Detection of the phosphohistidine intermediate -- Selected Reaction Monitoring (SRM) Mass Spectrometry (MS) {#S17}
-----------------------------------------------------------------------------------------------------------
To confirm the findings of the ^32^PO~4~^3-^ labeling assay and further resolve the phosphorylation site, SRM-MS was employed. mZuc wildtype + H153N heterodimer was incubated in 50 mM MES, pH 6.5, 0.15 M NaH~2~PO~4~, 1 mM DTT for 1 hour at 4 °C. The protein (20 μg) was then denatured and reduced by adding 0.1% Protease-Max surfactant (Promega) and 5 mM TCEP in 200 mM triethylammonium bicarbonate, pH 10, and incubated at 55 °C for 20 min. The sample was then treated with 5 mM methyl methanethiosulfonate and proteolyzed with 2 μg Lys-C overnight at 37 °C. After digestion, 1 μg of the proteolytic fragments were applied to a home-packed C18 column. Peptides were chromatographed with a mobile phase gradient from 0.1% formic acid and 3% acetonitrile in water to 0.1% formic acid and 90% acetonitrile followed by in-line electrospray ionization mass spectrometry.
Mass spectra were collected on a Thermo Scientific triple stage quadrupole (TSQ) Vantage mass spectrometer. In the first round of MS, mass-to-charge ratio (*m/z*) peaks corresponding to a Lys-C generated, His153-containing peptide (AGIQVRHDQDLGYMHHK) were selected (+4 charge state masses of 522.0 Da and 502.0 Da for the phosphorylated and non-phosphorylated precursors, respectively). These precursors were then fragmented while monitoring for several y and b ion transitions.
Fluorescence Polarization {#S18}
-------------------------
The affinity of mZuc for ssDNA and ssRNA was assessed using fluorescence polarization. Fluorescein-labeled 20-mer probes (5\'--[acagagtgccacttctcaac]{.smallcaps}--F[luorescein]{.smallcaps}--3\' DNA, Sigma; 5\'--[acagagugccacuucucaac]{.smallcaps}--F[luorescein]{.smallcaps}--3\' RNA, Dharmacon) at 10 nM were mixed with mZuc at various concentrations in a binding buffer of 0.1 M MES, pH 6.5, 75 mM NaCl, 1 mM DTT and incubated at room temperature for 10 minutes. Fluorescence polaration was then measured at ambient temperature (27 °C) on a BioTek Synergy4 microplate reader using excitation and emission wavelengths of 485 and 528 nm, respectively. Readings were performed in duplicate.
Crystallization {#S19}
---------------
Crystals of mZuc were grown by hanging-drop vapor diffusion on siliconized glass coverslips (Hampton Research, Aliso Viejo, CA). Immediately prior to crystallization, the purified protein was mixed in a 1:100 (m/m) ratio with chymotrypsin. Two microliters of the protein solution at 3 mg/mL were then mixed with an equal volume of reservoir solution containing 50 mM Bis-Tris, pH 6.5, 18% PEG-3350, and 2% tascimate, pH 6.0, and suspended over 0.5 mL of reservoir solution. Rectangular prismatic crystals (\~150 μm × 50 μm × 50 μm) grew at 4 °C within 24 h. Crystals were harvested and frozen in liquid nitrogen after serial transfer to 50 mM Bis-Tris, pH 6.5, 18% PEG-3350, and 2% tascimate, pH 6.0, and 20% ethylene glycol in increasing steps of 5% ethylene glycol. Tungstate-derivatized crystals were obtained by co-crystallization with 10 mM Na~2~WO~4~ added to the crystallization drop.
Data collection, crystal parameters, structure determination, and refinement {#S20}
----------------------------------------------------------------------------
Data were collected at 100 K using synchrotron radiation at the ×29 beamline at the National Synchrotron Light Source (NSLS) at Brookhaven National Laboratory, Upton, NY. Data were processed with XDS^36^ and scaled with SCALA^37^. Additional processing was performed with programs from the CCP4 suite^37^.
The crystals belong to the space group P4~3~2~1~2 with a=b=38.7 Å, c=213.1 Å, α=β=γ=90° with one molecule per asymmetric unit and a solvent content of \~35%. The structure was solved by molecular replacement with the program Phaser^38^ using the structure of Nuc, a bacterial PLD-family nuclease (PDB: 1BYR) as a search model^[@R18]^. Automatic model building was performed using ARP/wARP^39^, which correctly built approximately 140 residues of the 158 in the final structure. Subsequent model building and inspection were carried out using the program Coot^40^. Model refinement was performed using REFMAC5^41^. TLS refinement was carried out using one TLS group. The final native model consists of residues 35--58, 66--126, and 130--209 in addition to one coordinated Zn^2+^ and 106 water molecules. The final models were validated by Molprobity^42^. All residues in the final structures were in the allowed regions of the Ramachandran plot with 152 / 158 residues being in favored regions. Data collection and refinement statistics are listed in [Supplemental Table I](#SD1){ref-type="supplementary-material"}.
In addition to native crystals, tungstate-derivatized crystals were also produced. These diffracted to similar resolution and had nearly identical unit cell parameters. Initial processing was performed as described above. The native structure was used as an isomorphous replacement search model then refined accordingly. To avoid over-fitting, refinement of the tungstate derivative utilized the same R~free~ set as the native. To confirm the identity of the Zn^2+^, two data sets were collected from a single tungstate-derivatized crystal at ±100 eV from the Zinc K edge. Anomalous maps for each data set confirmed the identity of the metal. The r.m.s.d. for all protein atoms in the native and tungstate derivative was 0.49 Å. Crystallographic statistics for the tungstate-derivatized crystals are also presented in [Supplemental Table I](#SD1){ref-type="supplementary-material"}.
Figures {#S21}
-------
Figures of molecular models were generated using PyMOL^43^. Electrostatic surface calculations were performed with APBS^[@R30]^ with a solvent ion concentration of 0.15 M using the PARSE force field. Superpositioning of structural homologs was performed by the DALI server^44^.
Data deposition {#S22}
---------------
Coordinates and structure factors have been deposited in the Protein Data Bank (PDB) with the accession numbers 4GGJ (native) and 4GGK (tungstate derivative).
RNA Modeling and Energy Minimization {#S23}
------------------------------------
The refined mZuc structure was used as a template for manual model building of a short, ssRNA using Coot^40^. The initial ssRNA model placed the phosphate backbone along the observed positively-charged active site groove (with the scissile phosphate positioned at the tungstate position in the derivative structure) while maintaining approximate two-fold symmetry of phosphates with respect to the homodimer (the RNA breaks the strict two-fold symmetry due to its polarity). Energy mimization was performed using GROMACS v. 4.5.5^[@R25]^ with the AMBER-99SB-ILDN force field^45^ and Particle-mesh Ewald (PME) long-range electrostatic modeling^46^ with a conjugate gradient energy minimization algorithm, keeping the protein model (including Zn^2+^) fixed while allowing minimization of the RNA molecule and solvent model. A nearly indistinguishable model was also generated using the steepest descent algorithm.
Supplementary Material {#SM}
======================
We thank Witold Filipowicz, Robert MacDonald, and members of the Hannon and Joshua-Tor labs for fruitful discussions; Gyula Bencze, Keith Rivera, and Darryl Pappin of the CSHL proteomics facility, which is funded in part by an NCI Cancer Center Support Grant (CA045508), for support with mass spectrometry; and Howard Robinson for help at the National Synchrotron Light Source, which is supported by Department of Energy, Office of Basic Energy Sciences. J.J.I. was supported by the Harvey L. Karp award and by a Ruth L. Kirschstein National Research Service Awards NIH fellowship F32GM97888. This work was supported by US National Institutes of Health grant R01GM062534. G.J.H. and L.J. are Howard Hughes Medical Institute Investigators.
**Author Contribution Statement** LJ, GJH, ADH, and JII planned studies and wrote the paper. ADH and JII performed the experiments and SRK analyzed datasets.
{#F1}
{#F2}
{#F3}
![Electrostatic surfaces of PLD family proteins indicate distinct binding surfaces for specific substrates\
**a)** The electrostatic surface for mZuc displays a long, narrow, positively-charged grove laying across the zinc wings and active site. A short RNA molecule was manually built into the structure of mZuc, then subjected to energy minimization using GROMACS^[@R25]^. The minimized model shows the phosphates of the RNA backbone positioned in the most positively charged areas of the groove with the bases extending away from the dimer core. **b)** In Nuc (PDB ID 1BYR^[@R18]^), which acts on double-stranded DNA, the equivalent groove is significantly wider. **c)** A *bone fide* phospholipase, PLD (PDB ID 2ZE9), uses the same active site architecture in a strikingly different structural context. PLD has a small pocket for binding phospholipids, rather than an elongated groove. Each surface depicts the solvent-accessible surface contoured at ± 2 k~B~ T/e using ABPS^[@R30]^.](nihms-400298-f0004){#F4}
[^1]: These authors contributed equally
|
{
"pile_set_name": "PubMed Abstracts"
} | One-pot synthesis of highly monodispersed ferrite nanocrystals: surface characterization and magnetic properties.
In the present study, a facile one-pot synthetic route, utilizing a strong polar organic solvent, N-methyl 2-pyrrolidone (NMP), is demonstrated to obtain highly monodispersed ferrite nanocrystals. The equimolar mixture of oleic acid, C(17)H(33)COOH (R-COOH), and oleylamine, C(18)H(35)NH(2) (R'-NH(2)), was used to coat the magnetic nanocrystals. Structural and magnetic properties of the ferrite nanocrystals were studied by a multitechnique approach including X-ray diffraction (XRD), high resolution transmission electron microscopy (HRTEM), Fourier transform infrared (FTIR) spectroscopy, thermogravimetric analysis (TGA), X-ray photoelectron spectroscopy (XPS), vibrating sample magnetometry (VSM), and Mössbauer spectroscopy. FTIR spectral analysis indicates oleylamine helps in deprotonation of oleic acid, resulting in the formation of an acid-base complex, R-COO¯:NH(3)(+)-R', which acts as binary capping agent. Structural and coordination differences of iron were studied by XPS and Mössbauer spectral analysis. XPS analysis was carried out to examine the oxidation state of iron ions in iron oxide nanocrystals. The presence of a magnetically dead layer (∼0.38 and ∼0.67 nm) and a nonmagnetic organic coating (∼2.3 and ∼1.7 nm) may substantially reduce the saturation magnetization values for CoFe(2)O(4) and Fe(3)O(4) nanocrystals, respectively. The energy barrier distribution function of magnetic anisotropy was derived from the temperature dependent decay of magnetization. A very narrow energy barrier distribution elucidates that the ferrite nanocrystals obtained in this study are highly monodispersed. |
{
"pile_set_name": "Wikipedia (en)"
} | 2011 Baku Cup
The 2011 Baku Cup was a professional tennis tournament played on hard courts. It was the first edition of the Baku Cup which was part of the 2011 WTA Tour. It took place in Baku, Azerbaijan between 18 and 24 July 2011.
WTA entrants
Seeds
Rankings are as of July 11, 2011.
Other Entrants
The following players received wildcards into the singles main draw:
Nigina Abduraimova
Kamilla Farhad
Nina Khrisanova
The following players received entry from the qualifying draw:
Elena Bovina
Yana Buchina
Eirini Georgatou
Valeria Solovieva
The following players received entry from a lucky loser spot:
Tatia Mikadze
Champions
Singles
Vera Zvonareva def. Ksenia Pervak, 6–1, 6–4.
It was Zvonareva's second title of the year and 12th of her career.
Doubles
Mariya Koryttseva / Tatiana Poutchek def. Monica Niculescu / Galina Voskoboeva, 6–3, 2–6, [10–8].
References
External links
Official Website
Category:2011 in Azerbaijani sport
Baku Cup
Category:Baku Cup |
{
"pile_set_name": "Github"
} | # cmcstl2 - A concept-enabled C++ standard library
#
# Copyright Casey Carter 2015, 2017
#
# Use, modification and distribution is subject to the
# Boost Software License, Version 1.0. (See accompanying
# file LICENSE_1_0.txt or copy at
# http://www.boost.org/LICENSE_1_0.txt)
#
# Project home: https://github.com/caseycarter/cmcstl2
#
add_stl2_test(functional.invoke invoke invoke.cpp)
add_stl2_test(functional.not_fn not_fn not_fn.cpp)
|
{
"pile_set_name": "ArXiv"
} | ---
author:
- 'Scott G. Gregory,$^{1}$ Jean-Fran[ç]{}ois Donati,$^{2,3}$ Gaitee A. J. Hussain$^{4}$'
bibliography:
- 'sgregory\_magnetic.bib'
title: 'The multipolar magnetic fields of accreting pre-main-sequence stars: B at the inner disk, B along the accretion flow, and B at the accretion shock'
---
Introduction: the magnetic topology of accreting pre-main-sequence stars {#intro}
========================================================================
Over the past decade, high-resolution optical spectropolarimeters have greatly enhanced our ability to study stellar magnetism across the Hertzsprung-Russell diagram. Low-mass, accreting, pre-main-sequence (PMS) stars are of particular interest, as they reveal the history of the Sun at a time when the planets of the Solar System were forming.
The first magnetic maps of an accreting PMS star, V2129 Oph, were published by @don07. Constructed using the Zeeman-Doppler imaging technique, they revealed the long-suspected multipolar nature of PMS magnetism. The maps are constructed from a time series of circularly polarised spectra, and for accreting stars, by simultaneously considering the polarisation information contained in photospheric absorption lines and in accretion-related emission lines. Magnetic maps have now been published for the following accreting PMS stars, most at more than one epoch: V2129 Oph, BP Tau, V2247 Oph, AA Tau, TW Hya, V4046 Sgr AB, GQ Lup, DN Tau, CV Cha, and CR Cha [@don07; @don08; @don10b; @don10a; @don11a; @don11b; @don11c; @don12; @don13; @hus09]. All of them have multipolar magnetic fields. The majority of the magnetic maps were obtained as part of the multi-year Magnetic Protostars & Planets (MaPP) large-observing program with the ESPaDOnS spectropolarimeter at the Canada-France-Hawaii telescope, and its twin instrument NARVAL at T[é]{}lescope Bernard Lyot. The MaPP program spawned several additional, multi-wavelength, ground and space-based observations (e.g. @arg11 [@arg12; @kas11; @ale12]), as well as multiple theoretical / modelling papers (e.g. @gre08 [@gre10; @gre11; @jar08; @lon11; @rom11; @joh14]).
As more magnetic topology information becomes available for accreting PMS stars it is becoming clearer that the internal structure of the star plays an important role in controlling the external, large-scale, magnetic field topology [@gre12; @gre14]. Accreting PMS stars, at least those more massive than $\sim$0.5$\,{\rm M}_\odot$, host strong axisymmetric large-scale magnetic fields while fully convective with the relative strength of the octupole to the dipole component increasing with age, see Figure \[BoctBdip\]. The large-scale magnetic field then becomes more complex and non-axisymmetric once the stellar interior becomes mostly radiative. This stellar structure transition, and associated increase in magnetic field complexity, also has a signature in X-rays. The coronal X-ray emission decays once PMS stars have evolved onto Henyey tracks [@gre16].
![The magnitude of the ratio of the polar strength of the octupole to the dipole component, $|B_{\rm oct}/B_{\rm dip}|$, versus age for accreting PMS stars. All stars shown are fully convective or have just developed radiative cores, based on their position in the Hertzsprung-Russell diagram. The vertical bars connect stars observed at two epochs. Accreting PMS stars with published magnetic maps and more complex magnetic fields (5 stars), that are not well represented by a dipole-plus-octupole component, are not shown. Figure from @gre14.[]{data-label="BoctBdip"}](BoctBdip.pdf){width="0.88\linewidth"}
Little is known about the magnetic topology of accreting PMS stars of mass $\lesssim$0.5$\,{\rm M}_\odot$. However, based on the similarities between the magnetic topologies of main sequence M-dwarfs and of accreting PMS stars, see @gre12, it is expected that low-mass accreting PMS stars will show a variety of large-scale magnetic geometries, from simple and axisymmetric, to complex and non-axisymmetric.
Our goal in this conference proceedings is to highlight some of the ways in which multipolar magnetic fields influence magnetospheric accretion / the star-disk interaction and (hopefully) to clear up some lingering misconceptions that persist in the literature. We do this using several straightforward, semi-analytic, back-of-the-envelope style calculations. In §\[fields\] we describe the field components for a stellar magnetic field consisting of a dipole plus an octupole component, an adequate first order approximation for the magnetosphere of many (but not all) accreting PMS stars (see @gre11 for extensive discussion). In §\[disk\] we demonstrate that, in most cases, the dipole component alone can be used to estimate the disk truncation radius, although little else in the star-disk system. In §\[column\] we illustrate the strong departure of $B$ along the accretion column from that of a pure dipole. In §\[shock\] we show that $B$ in the accretion shock can be multiple kilo-Gauss, even for accreting PMS stars with sub-kilo-Gauss dipole components, and that the disk truncation radius can be overestimated if $B$ at the accretion shock is (erroneously) assumed to be representative of a dipole large-scale magnetic field. We conclude in §\[conclusions\].
Axisymmetric dipole-octupole magnetic fields {#fields}
============================================
Several accreting PMS stars (those plotted in Figure \[BoctBdip\]) have large-scale magnetic fields that are well described by a tilted axisymmetric dipole component, plus a tilted axisymmetric octupole component, although in all cases higher order and non-axisymmetric multipole components are present too [@gre11]. Some have large-scale magnetic fields where the dipole and octupole components are close to parallel, where the main positive pole of the dipole and of the octupole are in the same hemisphere. For other stars the main negative pole of one component is in same hemisphere as the main positive pole of the other, and the dipole and octupole moments are closer to an anti-parallel configuration.
For simplicity, and to make progress analytically, here we consider the straightforward example of an accreting PMS star with a disk in the midplane, hosting a magnetic field consisting of a parallel, and aligned, dipole component plus an octupole component. A detailed mathematical description of such magnetic fields, and the anti-parallel case, can be found in @gre11 and Gregory [*et al.*]{} (in prep.).
Assuming the dipole and octupole magnetic moments are aligned with stellar rotation axis, then, in standard spherical polar coordinates $(r,\theta,\phi)$, the field components can be written as (see @gre10 for a derivation), $$\begin{aligned}
B_r &=& B_{\rm dip} \left(\frac{R_\ast}{r} \right)^3\cos\theta \nonumber \\
&+& \frac{1}{2}B_{\rm oct}\left(\frac{R_\ast}{r}\right)^5(5\cos^2\theta-3)\cos\theta, \label{equ_Br} \\
B_\theta &=& \frac{1}{2}B_{\rm dip} \left(\frac{R_\ast}{r}\right)^3\sin\theta \nonumber \label{equ_Bt} \\
&+& \frac{3}{8} B_{\rm oct} \left(\frac{R_\ast}{r}\right)^5(5\cos^2\theta-1)\sin\theta, \\
B_\phi &=& 0 \label{equ_Bp},\end{aligned}$$ where $B_{\rm dip}$ and $B_{\rm oct}$ are the polar field strengths of the dipole and octupole field components respectively. As the magnetic field being considered here is axisymmetric, $B_\phi=0$. The field lines exterior to the star can be plotted by solving the differential equation, $$\frac{B_r}{{\rm d}r} = \frac{B_\theta}{r{{\rm d}\theta}}.
\label{diffshape}$$ An example for a star with $B_{\rm oct}/B_{\rm dip} = 5$ is shown in Figure \[fieldlineplot\]. Note that the field topology depends on the ratio $B_{\rm oct}/B_{\rm dip}$ alone, although $B$ along the loops does depend on the values of $B_{\rm dip}$ and $B_{\rm oct}$.
![A star with a dipole-plus-octupole magnetic field where the dipole and octupole moments are parallel and aligned with the stellar rotation axis for $B_{\rm oct}/B_{\rm dip}=5$. $B_r=0$ along the dashed red line and $B_\theta=0$ along the dashed blue line. Field lines passing through the magnetic null point, see equation (\[rnull\]), are highlighted in bold.[]{data-label="fieldlineplot"}](align_large.pdf){width="0.88\linewidth"}
For the case of parallel octupole and dipole magnetic moments considered here, it is clear that a magnetic null point (where all field components are zero) exists in the mid plane ($\theta=\pi/2$) at a radius of, $$\frac{r_{\rm null}}{R_\ast} = \left(\frac{3}{4}\frac{B_{\rm oct}}{B_{\rm dip}}\right)^{1/2}.
\label{rnull}$$ $r_{\rm null}$ marks the transition point between field lines that connect the disk midplane to high latitudes on the stellar surface (for $r>r_{\rm null}$) and field lines that connect to lower latitudes (for $r<r_{\rm null}$), see @gre11. In Figure \[fieldlineplot\] the field lines that pass through $r_{\rm null}$ are highlighted in bold. If the inner disk is truncated at $r<r_{\rm null}$ a portion, or all, of the accretion flow would impact the star at low latitudes.
B at the disk truncation radius {#disk}
===============================
The influence of multipolar magnetic fields (as constructed via field extrapolation from magnetic maps of accreting PMS stars) on the disk truncation radius $R_t$ has been considered by @gre08 and @joh14. Details of how dipole-plus-octupole magnetic fields affect $R_t$ can be found in @ada12. Below, and in order to make progress analytically, we provide an overview of the results for dipole-plus-octupole magnetic fields.
In the equatorial plane, $\theta=\pi/2$ and from equations (\[equ\_Br\]-\[equ\_Bp\]), $B = |\mathbf{B}| = (B_r^2+B_\theta^2+B_\phi^2)^{1/2}$ reduces to, $$B=\frac{1}{2}B_{\rm dip}\left(\frac{R_\ast}{r}\right)^3-\frac{3}{8}B_{\rm oct}\left(\frac{R_\ast}{r}\right)^5.
\label{Bmid}$$ It is immediately obvious that the influence of the octupole component compared to that of the dipole diminishes rapidly with increasing distance from the star (and even more so for higher order magnetic field components not being considered in this simple example). For typical disk truncation radii of $R_t \approx 5-10 R_\ast$ the relative contribution of the octupole compared to the dipole component to $B$ in the midplane \[to $B$ in equation (\[Bmid\])\] is $(3/100)(B_{\rm oct}/B_{\rm dip})$ to $(3/400)(B_{\rm oct}/B_{\rm dip})$. Observed values of $|B_{\rm oct}/B_{\rm dip}|$ range from $\sim0.25-6$, see Figure \[BoctBdip\], with most $\lesssim2$. With $B_{\rm oct}/B_{\rm dip}=2$ the contribution to B at the disk truncation radius from the octupole component is only 6% that of the dipole component for $R_t=5R_\ast$, dropping to 1.5% for $R_t=10R_\ast$. Notice from equation (\[Bmid\]) that B at the inner disk is less than it would be for a pure dipole, which will result in a smaller disk truncation radius for the dipole-plus-octupole magnetic fields.[^1]
{width="0.44\linewidth"} {width="0.44\linewidth"}
The location of the disk truncation radius not only depends on $B$ (and therefore on $B_{\rm dip}$ and $B_{\rm oct}$) but also on the mass accretion rate through the disk, $\dot{M}$. This is not necessarily the $\dot{M}$ that ultimately accretes through columns on to the star, as a fraction may be diverted to outflows (e.g. @moh08). The disk is truncated at a fraction of the radius where the magnetic pressure provided by the stellar magnetosphere is balanced with the ram pressure of the bulk flow of material through the disk. This is the Alfv[é]{}n radius, $r_A$, reduced by a numerical constant to account for the difference between spherical accretion and magnetospheric accretion (e.g. @kon91 [@joh14]). For spherical infall at the free-fall speed, $v = (2GM_\ast/r)^{1/2}$, equating the magnetic energy density with the kinetic energy density, $B^2/(8\pi)=\rho v^2/2$, and using the equation of mass continuity $\dot{M}=4\pi r^2 \rho v$, gives at the Alfv[é]{}n radius, $$B^2 = (2GM_\ast)^{1/2}\dot{M}r_A^{-5/2}.
\label{Bsq}$$ Equation (\[Bsq\]) is evaluated in the midplane ($\theta=\pi/2$) with $B$ given by equation (\[Bmid\]). If the field was a pure dipole, $B_{\rm oct}=0$, then using equation (\[Bmid\]), equation (\[Bsq\]) reduces to the well known result, $$R_{t,{\rm dip}} = cr_{A,{\rm dip}} = c \frac{\mu_{\rm dip}^{4/7}}{(2GM_\ast)^{1/7}\dot{M}^{2/7}},
\label{Rtdip}$$ where $\mu_{\rm dip} = B_{\rm dip}R_\ast^3/2$ is the dipole moment[^2], $c$ is the constant ($<1$) that accounts for the difference between spherical infall and accretion along columns from the inner disk to the stellar surface, and we have added “dip” subscripts to the radius terms to emphasis that the equation is valid for dipole magnetic fields. The magnetohydrodynamic simulations of @lon05 of the star-disk interaction with a dipole magnetic field suggest that $c = 1/2$, although this may not be applicable for multipolar magnetic fields. Therefore, in the plots described below, we plot $r_A/R_\ast$ as the abscissa and remind readers that the true disk truncation radius is $R_t/R_\ast = cr_A/R_\ast$.
{width="0.44\linewidth"} {width="0.44\linewidth"}\
{width="0.44\linewidth"} {width="0.44\linewidth"}
For the dipole-plus-octupole magnetic fields considered here, $r_A$ can again be calculated by equating the magnetic pressure and the ram pressure of the disk material in the midplane, $$\begin{aligned}
\frac{1}{8\pi}\Bigg[\frac{1}{2}B_{\rm dip}\left(\frac{R_\ast}{r_A}\right)^3 &-& \frac{3}{8}B_{\rm oct}\left(\frac{R_\ast}{r_A}\right)^5\Bigg]^2 \nonumber \\ &=& \frac{1}{8\pi}(2GM_\ast)^{1/2}\dot{M}r_A^{-5/2},
\label{bigequ}\end{aligned}$$ which, using equation (\[Rtdip\]), can be written as, $$\frac{r_A}{R_\ast}\left[1-\frac{3}{4}\frac{B_{\rm oct}}{B_{\rm dip}}\left(\frac{R_\ast}{r_A}\right)^2\right]^{-4/7} = \frac{r_{A,{\rm dip}}}{R_\ast}.\label{allt}$$ Equation (\[allt\]) can be expanded to leading order, see @ada12, although it is straightforward to solve the full equation numerically for $r_A/R_\ast$, with the disk truncation radius then $R_t/R_\ast = cr_A/R_\ast$.
In Figure \[Rtall\] we demonstrate how the disk truncation radius changes as a function of $B_{\rm oct}/B_{\rm dip}$ for different mass accretion rates and various strengths of the dipole component.[^3] A larger mass accretion rate and/or a weaker dipole component and/or a stronger octupole component (albeit to a lesser extent than the other quantities) corresponds to a smaller disk truncation radius. It is also clear, that in most cases, the disk truncation radius is well approximated by the polar strength of the stellar dipole component alone (i.e. there is little variation in $r_A/R_\ast$, and therefore in $R_t/R_\ast$, with increasing $B_{\rm oct}/B_{\rm dip}$). Exceptions to this are: (i) stars with very weak dipole components (or equivalently very strong higher order magnetic components); (ii) star-disk systems with large mass accretion rates; (iii) stars with highly tilted large-scale magnetospheres, where the field threading the disk midplane departs strongly from the vertical direction. All of these exceptions would allow the inner disk to push closer to the star, where the influence of higher order magnetic components is greater. This can be seen in Figure \[Rtall\], where for parameters that result in smaller disk truncation radii, the change in $r_A$ with increasing $B_{\rm oct}/B_{\rm dip}$ is more significant.
{width="0.44\linewidth"} {width="0.44\linewidth"}\
{width="0.44\linewidth"} {width="0.44\linewidth"}
For certain parameters there is a discontinuity where the inner disk edge moves closer to the star, and then increases in radius again as $B_{\rm oct}/B_{\rm dip}$ is further increased. A particular case is highlighted in Figure \[Rt\_pressure\], and this behaviour can be understood as follows. Starting at a large radius in the midplane, and moving towards the star, both the gas and magnetic pressures increase. If the ratio $B_{\rm oct}/B_{\rm dip}$ and/or $\dot{M}$ is small, then the disk is truncated at a radius greater than the magnetic null point, see Figure \[Rt\_pressure\] top panels. As we move further towards the star the magnetic pressure increases to a maximum[^4] before decaying to zero at $r_{\rm null}$. Once $r<r_{\rm null}$ the magnetic pressure increases again, rapidly, towards the stellar surface in the portion of the magnetosphere dominated by the octupole component. The minimum in the magnetic pressure means that as $B_{\rm oct}/B_{\rm dip}$ is increased further, see Figure \[Rt\_pressure\] bottom left panel, the disk truncation radius suddenly jumps from $r>r_{\rm null}$ to $r<r_{\rm null}$. Further increasing $B_{\rm oct}/B_{\rm dip}$ then increases the disk truncation radius, see Figure \[Rt\_pressure\] bottom right panel, as the contribution to the magnetic pressure from the octupole component becomes increasingly significant. This has the implication that for some stars a portion, or all, of the accretion flow will be channeled into low latitude hot spots; and that small variations in the polar strengths of the magnetic components and/or the mass accretion rate will allow the accretion flow to switch between high and low latitude hot spots (or a combination of both), altering the observed variability.
B along the accretion column {#column}
============================
In the previous section we demonstrated that the dipole component alone can, in many cases, provide an adequate estimate of the disk truncation radius. However, the dipole component provides a poor approximation to the field strength along the accretion column, the shape of magnetic loops carrying accretion flow, and to the field strength at the accretion shock, as we demonstrate below.
In order to calculate the field strength along loops carrying accreting gas, we must derive an equation that describes the path of the magnetic field lines from the disk to the stellar surface. This is achieved by solving the differential equation (\[diffshape\]). For a dipole \[equations (\[equ\_Br\]) and (\[equ\_Bt\]) with $B_{\rm oct}$=0\], and integrating from the midplane $(r=r_m,\theta=\pi/2)$ to a point $(r,\theta)$ along the magnetic loop, equation (\[diffshape\]) yields the simple result, $r/R_\ast = (r_m/R_\ast)\sin^2\theta$. For the parallel dipole-plus-octupole magnetic fields considered here, the equivalent field line equation is, $$\begin{aligned}
&& \left[\left(\frac{r_m}{R_\ast}\right)^2 -\frac{1}{4}\frac{B_{\rm oct}}{B_{\rm dip}} \right]\left(\frac{r}{R_\ast}\right)^3-\left(\frac{r_m}{R_\ast}\right)^3\sin^2\theta\left(\frac{r}{R_\ast}\right)^2 \nonumber \\
&-& \frac{1}{4}\left(\frac{r_m}{R_\ast}\right)^3\frac{B_{\rm oct}}{B_{\rm dip}}(5\cos^2\theta-1)\sin^2\theta=0,
\label{dipoctshape}\end{aligned}$$ which cannot be written in the form $r=r(\theta)$ (see Gregory [*et al.*]{}, in prep. for a full derivation of this result). Equation (\[dipoctshape\]) reduces to the result for a dipole magnetic loop, given above, when $B_{\rm oct}=0$. Parallel dipole-plus-octupole magnetic fields can also have higher latitude shells of closed field lines, see Figure \[fieldlineplot\]. These magnetic field lines do not pass through the midplane and are described by a different equation that is not needed here as in our magnetic field geometry they do not carry accretion flow.
Using equation (\[dipoctshape\]) to determine points along a loop from the disk midplane at $r=r_m$ to the stellar surface at $r=R\ast$, we can calculate the field strength $B = (B_r^2+B_\theta^2)^{1/2}$ at any point along the loop using equations (\[equ\_Br\]) and (\[equ\_Bt\]). In Figure \[Bfieldlines\] we plot the field line shape for two different values of $B_{\rm oct}/B_{\rm dip}$, as well as the field strength along magnetic loops from the disk to the star. In each plot, the dashed red line is a dipole magnetic loop that threads the disk at the same $r_m$ as the dipole-plus-octupole magnetic loop. The influence of the octupole component on the field lines is clear, with their shape becoming more and more distorted from that of a dipole while approaching the star and for larger values of $B_{\rm oct}/B_{\rm dip}$.
At the inner disk truncation radius $B$ is well approximated using the strength the dipole component alone (see section \[disk\]). However, the influence of the octupole component is clear as we approach the star, where $B$ can significantly exceed that found for a dipole. As we discuss in the following section, $B$ at the accretion shock can reach several kilo-Gauss, even for stars with sub-kilo-Gauss dipole components.
B in the accretion shock {#shock}
========================
First reported for an accreting PMS star by @joh99, strong circular polarisation can be measured in accretion-related emission lines, such as HeI 5876[Å]{}. This particular line, which forms in the accretion shock, probes the magnetic field where accreting gas impacts the star. Independent studies have measured longitudinal fields of $\gtrsim$6${\rm kG}$ using the HeI 5876[Å]{} emission line for the accreting PMS star GQ Lup [@don12; @joh13], a star with a dipole component of only $\sim$1$\,{\rm kG}$. Longitudinal fields measured from the accretion hot spots are more typically $\sim$1-$\sim$4$\,{\rm kG}$ (e.g. @don10b [@don11a; @don13; @che13]), at least for stars with large-scale magnetospheres well described by a dipole plus an octupole component. Such field strengths are, commonly, well in excess of the polar strengths of the dipole components, ranging from $\sim$0.3 to $\sim$1.9$\,{\rm kG}$ for the same stars.
Although the polar strength of the dipole component ($B_{\rm dip}$) provides a good estimate of $R_t$ in most cases, see section \[disk\], if it is assumed that the stellar magnetic field is a dipole, and therefore that the accreting field lines are dipolar, $B$ at the accretion shock can be severely underestimated. As measured from the accretion-related emission lines, $B$ where material impacts the star can be several kilo-Gauss, even for stars where the dipole component itself is only a few hundred Gauss. This is due to the presence of higher order magnetic field components. Likewise, if $B$ in the accretion hot spot is assumed to be representative of the dipole component, the disk truncation will be greatly overestimated.
As one example, in Figure \[Bfieldlines\] (left hand panels) $B_{\rm dip}=0.5\,{\rm kG}$ and $B_{\rm oct}=1.5\,{\rm kG}$. At the stellar surface, for the considered field lines, $B$ at the accretion shock is $\sim$1.8$\,{\rm kG}$, while it is four times smaller, $\sim$450$\,{\rm G},$ if pure dipole magnetic field lines are used. If we assume that the star has a dipole magnetic field and that 1.8$\,{\rm kG}$ at the accretion hot spot is representative of $B_{\rm dip}$, then the disk truncation radius would be overestimated \[see equation (\[Rtdip\])\] by a factor of $4^{4/7}\approx 2.2$.[^5]
Conclusions
===========
Models of accretion flow, of the star-disk interaction, and of accretion shocks should incorporate multipolar magnetic fields. Dipole magnetic fields provide a poor representation of the true magnetic complexity of PMS stars. Even AA Tau, whose magnetic field is closest to a dipole [@don10b], has a non-negligible $\sim$0.5$\,{\rm kG}$ octupole component. However, the large-scale magnetic fields of many accreting PMS stars are still somewhat simple, being dominantly axisymmetric and well-described by a (tilted) dipole component plus a (tilted) octupole component [@gre11]. Some of the best studied PMS stars have such magnetic field topologies, including AA Tau, BP Tau, V2129 Oph, TW Hya, and others, although other higher order magnetic modes, and non-axisymmetric components are present too. Other stars, typically those that have developed large radiative cores, host more complex, multipolar, and non-axisymmetric large-scale magnetic fields [@hus09; @gre12; @gre14].
In this conference proceedings we used a simple model of a star with a dipole plus an octupole component. In order to make progress analytically, we assumed that both magnetic moments were aligned with the stellar rotation axis, and were parallel (the main positive pole of the octupole coincident with the main positive pole of the dipole).[^6] Although these models are still simplified, they provide a far more realistic approximation to the true complexity of the magnetic fields of many accreting PMS stars than what can be achieved with a dipole. We have shown that:
- In most cases, as the higher order magnetic components decay faster with distance from the stellar surface, the disk truncation radius can be well approximated by using the polar strength of the dipole component alone. However, there are exceptions, including: i) when the mass accretion rate is large; ii) when the dipole component is weak; iii) when the higher order magnetic field components are very strong; iv) when the large-scale magnetosphere of the star is highly multipolar or tilted; and v) some combination of all of these which will result in a smaller disk truncation radius, where the impact of higher order magnetic components is larger.
- For the parallel dipole-plus-octupole magnetic fields, when the disk is truncated close to the magnetic null point, small changes in the mass accretion rate or the strengths of the magnetic field components can result in all of, or a portion of, the accretion flow impacting the star in low latitudes hot spots. This diversion of material from high to low latitude hot spots will alter the stellar variability.
- Although $B_{\rm dip}$ can often be used to calculate $R_t$, $B$ along the magnetic loops departs strongly from that of dipole magnetic field lines, as does the shape of the magnetic loops.
- $B$ in the accretion shock can reach multiple kilo-Gauss, even for stars with dipole components of only a few hundred Gauss.
- If the high field strengths measured in accretion hot spots are erroneously taken to be representative of the strength of the dipole component, and a dipole magnetic field is assumed, then the disk truncation radius will be overestimated. Likewise, use of the dipole component alone will often result in a significant underestimation of $B$ at the accretion shock.
In this work we have considered the impact of magnetic fields consisting of a dipole plus an octupole component on the disk truncation radius, $B$ along the accretion flow, and $B$ at the accretion shock. Dropping the observationally unrealistic assumption that accreting PMS stars have dipole magnetic fields has several additional effects on magnetospheric accretion, the star-disk system, and the stellar rotational evolution, which we have not discussed here. For example, the specific angular momentum transferred to the star through the star-disk interaction is an order of magnitude less for stars with octupole dominated fields compared to those with dominantly dipolar magnetic fields [@bat13]. For multipolar magnetic fields, and including the dipole-plus-octupole magnetic fields considered here, material accretes into smaller hot spots, with a (usually) smaller accretion filling factor (e.g. @ada12). The accretion flow being funnelled into smaller spots increases the pre-shock density of the hot spots [@gre07; @gre08; @ada12] and increases their temperature [@ada12]. Although we can use $B_{\rm dip}$ to calculate $R_t$ in most cases, the dipole component alone provides a poor representation of the structure of accretion flow, of $B$ along accretion columns, and of $B$ where material impacts the star. Models of magnetospheric accretion, of accretion flow, and of accretion shocks, must incorporate multipolar magnetic fields.
Acknowledgements {#acknowledgements .unnumbered}
================
[SGG acknowledges support from the Science & Technology Facilities Council (STFC) via an Ernest Rutherford Fellowship \[ST/J003255/1\]. JFD and GAJH warmly thank the IDEX initiative at Universit[é]{} F[é]{}d[é]{}rale Toulouse Midi-Pyr[é]{}n[é]{}es (UFTMiP) for generous funding related to this research project.]{}
[^1]: If the dipole and octupole moments were anti-parallel then $R_t$ would be larger than for a pure dipole.
[^2]: Many literature sources use $\mu_{\rm dip}=B_\ast R_\ast^3$, where $B_\ast$ is the strength of the dipole at the stellar equator. At the pole $B_{\rm dip} = 2B_\ast$ [@gre10].
[^3]: For the accreting PMS stars with large-scale magnetic fields that are well described by a tilted dipole plus a titled octupole component, listed in section \[intro\], $B_{\rm dip}$ ranges from $\sim$0.3 to $\sim$1.9$\,{\rm kG}$ and $B_{\rm oct}$ from $\sim$0.5 to $\sim$2.8$\,{\rm kG}$, with values of $|B_{\rm oct}/B_{\rm dip}|$ as plotted in Figure \[BoctBdip\].
[^4]: This maximum occurs at $r/R_\ast = [5B_{\rm oct}/(4B_{\rm dip})]^{1/2}$ and corresponds to the point in the midplane where the radius of curvature of the field lines is infinite (Gregory [*et al.*]{}, in prep.). Between this radius and $r_{\rm null}$ field lines are pinched towards the null point, see Figure \[fieldlineplot\].
[^5]: As the accretion spot is not at the pole, $B_{\rm dip}$ would be even larger, increasing the overestimation of $R_t$.
[^6]: Some stars, such as AA Tau and TW Hya, have field configurations that are closer to an anti-parallel dipole-plus-octupole, where the main positive pole of the octupole is close to coincident with the main negative pole of the dipole. For brevity we have not considered such magnetic fields in this work. Details can be found in @gre11 and Gregory [*et al.*]{}, in prep.
|
{
"pile_set_name": "StackExchange"
} | Q:
c# Openfiledialog
When I open a file using this code
if (ofd.ShowDialog() == DialogResult.OK)
text = File.ReadAllText(ofd.FileName, Encoding.Default);
A window appear and ask me to choose file (The File Name is blank as you can see on the image)
If I press second time the button Open to open a file the File Name show the path of the previous selected file (see on image) How I can clear this path every time he press Open button?
A:
You are probably using the same instance of an OpenFileDialog each time you click the button, which means the previous file name is still stored in the FileName property. You should clear the FileName property before you display the dialog again:
ofd.FileName = String.Empty;
if (ofd.ShowDialog() == DialogResult.OK)
text = File.ReadAllText(ofd.FileName, Encoding.Default);
A:
try this:
ofd.FileName = String.Empty;
A:
You need to reset the filename.
openFileDialog1.FileName= "";
Or
openFileDialog1.FileName= String.Empty()
|
{
"pile_set_name": "FreeLaw"
} | 562 F.2d 106
UNITED STATES of America, Appellant,v.Frederick H. MOORE et al., Defendants, Appellees.
No. 76-1355.
United States Court of Appeals,First Circuit.
Sept. 9, 1977.As Amended On Denial of Rehearing Oct. 25, 1977.
James E. O'Neil, Asst. U. S. Atty., Boston, Mass., with whom James N. Gabriel, U. S. Atty., Boston, Mass., was on brief, for appellant.
Evan T. Lawson, Boston, Mass., with whom Lawson & Wayne, Boston, Mass., was on brief, for defendants, appellees.
Before COFFIN, Chief Judge, ALDRICH and CAMPBELL, Circuit Judges.
LEVIN H. CAMPBELL, Circuit Judge.
1
Appellees Frederick H. Moore and Brock P. Bobisink, and another, were charged with conspiracy to manufacture and distribute and with manufacturing and distributing phencyclidine, a Schedule III controlled substance, in violation of 21 U.S.C. §§ 841(a)(1) and 846. Prior to trial, they moved to suppress evidence seized by government agents after an investigation during which electronic beepers were used both to help monitor appellees' movements and to keep track of the whereabouts of certain chemicals in their possession. Holding that the use of the beepers violated the fourth amendment, the district court allowed the suppression motion. United States v. Bobisink, 415 F.Supp. 1334 (D.Mass.1976). From that order, the Government appeals. See 18 U.S.C. § 3731.
2
The facts were before the district court in the form of two affidavits of DEA agents submitted with the applications for search warrants, and the testimony at the suppression hearing of Special Agent Francis J. Elliott. Agent Elliott had received a call from the manager of the Doe & Ingalls Chemical Company of Medford, Massachusetts, informing him that Moore, purportedly representing a company called Plastico at 26 Allston Street, Allston, Massachusetts, had placed an order for a substantial quantity of chemicals and had picked up the chemicals for $776.36 in cash. While picking up the first batch of chemicals, Moore had placed another larger order for mostly different chemicals. (The names and amounts of all the chemicals were obtained by Agent Elliott and later listed in his affidavit; in the affidavit the agent stated that he was "familiar with the basic processes involved in the production of Schedule III controlled substances.")1 Upon investigation, Agent Elliott found that 26 Allston Street, Allston, Massachusetts, was an apartment house. On April 11, 1975, with the permission of Doe & Ingalls, DEA Agent Witt placed a self-powered electronic signalling device (a "beeper") within one of the cardboard boxes containing the chemicals which Moore had ordered on March 26. On April 14, Moore and Bobisink came to Doe & Ingalls to pick up the chemicals. Driving a U-Haul van, they parked in the lot of a nearby shopping center and went inside. The chemicals ordered on March 26 were available, with the exception of peperidine. While the two were inside, Agent Elliott placed a second beeper on the left rear undercarriage of the van. Moore and Bobisink got in the van with the chemicals and went on their way. Elliott and another DEA agent followed, alternately relying on visual surveillance and on the two beepers. The beepers were broadcasting at different frequencies, and the agents could receive only one signal at a time. At a point when the van was travelling on Route 6 on Cape Code, the agents lost visual contact and could not receive a signal from either beeper. But observing the van on Route 124 crossing over Route 6, the agents quickly exited themselves, proceeded down Route 124 approximately one mile, and saw the van parked in front of a house in Brewster, Massachusetts. Agent Elliott testified that the agents relied on the beepers 50% of the time while following defendants. From April 14 to April 29, the agents maintained sporadic surveillance of the Brewster home. Until the battery became worn, they used the beeper in the box of chemicals to determine that the box was still in the residence. On April 23, Elliott searched the records of the DEA computer bank of registrants and determined that neither Moore nor Plastico was licensed to manufacture controlled substances.
3
On April 29, Moore and Bobisink returned to Doe & Ingalls to pick up the one chemical, peperidine, that had not been available on April 14. While Moore and Bobisink were inside, Agent Elliott attached a beeper to the gasoline tank of Moore's 1966 Mustang. Elliott testified that he did not follow the Mustang, but instead the vehicle was trailed by another agent, who he assumed used the beeper to maintain surveillance. The vehicle was driven to the Brewster residence, where defendants were observed carrying the package of peperidine inside. Beginning on April 29, a 24-hour surveillance was maintained on the Brewster residence. That evening, according to Elliott's affidavit, he "detected a strong odor of ether emanating from the house and also observed the house being cross-ventilated by the opening of doors." The affidavit avers further that at that time "(t)he electronic surveillance signal placed in the chemicals . . . indicated the chemicals acquired on the 14th of April and observed and deposited at that house on the 14th of April remained in that house." On May 2, DEA agents made application for a search warrant for the Brewster property. The warrant was executed on May 7, and a number of chemicals and apparatus was seized. The following day a search warrant issued for the Allston apartment; its execution resulted in seizure of small amounts of chemicals and apparatus.
4
At the suppression hearing, appellees' primary argument went to the alleged illegality of the beepers, but they also argued, as they do on appeal, that no search warrants should have issued since the affidavits did not establish that the chemicals purchased and appellees' activities were directed towards manufacturing the controlled substance, phencyclidine. The district court, dealing only with the beeper issue, suppressed the evidence obtained from the searches because it held that "placement of the beepers under the circumstances of this case was a search and seizure under the Fourth Amendment requiring issuance of a search warrant." The Government asserts that was error. It urges us to sanction use of the beeper as a new and useful surveillance device.
5
Before turning to the question of the beepers, we consider the sufficiency of the affidavits underlying the warrants to search the Brewster house and the Allston apartment. Affidavits are most often criticized as being too conclusory, i. e. lacking in sufficient underlying facts and circumstances. See, e. g., Aguilar v. Texas, 378 U.S. 108, 84 S.Ct. 1509, 12 L.Ed.2d 723 (1964). The opposite difficulty is present here: while in his affidavit for the Brewster property Agent Elliott carefully itemized by name and quantity the chemicals that were sold to appellees, he never actually stated, on the basis of his asserted familiarity with the processes in the production of Schedule III controlled substances, that these chemicals in these amounts were predictable precursors of phencyclidine. However, the affidavit strongly implies that he held such an opinion. It declares that the affiant has reason to believe that "controlled substances, including, but not limited to, Phencyclidine, substances, salts and isomers of the same and immediate precursors of the same . . . and manufacturing apparatus and items for the manufacture of controlled substances . . ." are being stored on the premises. In support of this, the affiant recounts how the manager of Doe & Ingalls initiated contact with DEA agents, advising of the purchase of certain named chemicals in the designated amounts, and details the other events leading up to the detection of a strong ether odor from the Brewster house. Emphasizing that the chemicals remained in the house, he concludes that he "therefore" had probable cause to search and seize "controlled substances, precursors, manufacturing apparatus and material for manufacturing controlled substances". Peperidine, one of the chemicals, was described as "a necessary chemical for creating Phencyclidine".
6
A commonsense reading of the affidavit indicates that Agent Elliott, being familiar with the basic processes of manufacturing controlled substances, had determined from the nature and quantity of the purchased chemicals, and from associated facts such as that Moore was operating out of a residence and the defendants' later conduct, that an illegal substance was being manufactured. While he did not state that chemicals of this type and amount comprise the formula for phencyclidine, or enough of it to show that phencyclidine was a probable end-product, that conclusion seems implicit. In United States v. Ventresca, 380 U.S. 102, 108, 85 S.Ct. 741, 746, 13 L.Ed.2d 684 (1965), the Court pointed out that affidavits "are normally drafted by nonlawyers in the midst and haste of a criminal investigation." Courts should not invalidate a warrant by interpreting the affidavit "in a hypertechnical, rather than a commonsense manner." Id. at 109, 85 S.Ct. at 746. A magistrate's determination of probable cause is entitled to great deference. Jones v. United States, 362 U.S. 257, 270-271, 80 S.Ct. 725, 4 L.Ed.2d 697 (1960), cited with approval in Spinelli v. United States, 393 U.S. 410, 419, 89 S.Ct. 584, 21 L.Ed.2d 637 (1969). While the Government's failure better to explain its conclusions reflects adversely on whoever drafted the affidavit, we believe the magistrate was given adequate cause to determine that the proposed search was likely to uncover evidence of crime, and the same is true with respect to the second affidavit and warrant.
7
We come next to use of the beepers, a question that, in the broad sense, is unlikely to be settled finally in this court. Beepers, which do not relay oral communications, are not within the definition of wiretapping devices. See 18 U.S.C. § 2510(5). Giving off a steady signal which may be picked up by a receiver, they are useful to keep track of a vehicle, person or object. They do not permit a pinpoint fix, but enable agents to know when the beeper is nearby. The question is whether use of a beeper constitutes, in different settings, such an intrusion upon personal privacy as to violate the fourth amendment.
8
In Katz v. United States, 389 U.S. 347, 88 S.Ct. 507, 19 L.Ed.2d 576 (1967), the Court held the "Government's activities in electronically listening to and recording (defendant's) words", spoken while he was inside a public telephone booth, "violated the privacy on which he justifiably relied while using the telephone booth and thus constituted a 'search and seizure' within the meaning of the Fourth Amendment." Id. at 353, 88 S.Ct. at 512. The Court's premise was that Katz was entitled to assume when he entered the telephone booth "that the words he utters into the mouthpiece will not be broadcast to the world." Id. at 352, 88 S.Ct. at 512. Behind this premise was the Court's earlier conclusion that the fourth amendment extends to the recording of oral statements. Id. at 353, 88 S.Ct. 507; see Berger v. New York, 388 U.S. 41, 87 S.Ct. 1873, 18 L.Ed.2d 1040 (1967); Silverman v. United States, 365 U.S. 505, 81 S.Ct. 679, 5 L.Ed.2d 734 (1961). Under the Katz analysis, the question would be whether attachment of the beepers, monitoring of the movements of the U-Haul van and 1966 Mustang, or use of the beeper in the package of chemicals to determine its continued presence inside the Brewster property, violated any "privacy on which (appellees) justifiably relied".
9
The defendants argue that citizens have "a reasonable expectation of privacy in their movements", and that the "possibility of being followed about in public by governmental agents" does not mean that they anticipate "that their every movement will be continuously monitored by a secret transmitter". Defendants draw an analogy to Katz : while the telephone booth itself was public, the defendant was entitled to keep out the "uninvited ear". While transporting chemicals on the public highway is "subject to the eyes of the public", defendants, so they assert, may keep out the "uninvited monitoring device".
10
We find no merit in the Government counter argument that the beeper was justified simply because the substance being manufactured was a dangerous drug which the public would not want to go undetected. Conduct which violates the fourth amendment is not made legal merely because it helps ferret out crime. If that were so, any invasion of privacy would be acceptable if it helped the police. It is true that the reasonableness of a search and seizure is sometimes said to involve balancing the Government's interest in the intrusion against the individual's interest in privacy. See, e. g., United States v. Martinez-Fuerte, 428 U.S. 543, 555, 96 S.Ct. 3074, 49 L.Ed.2d 1116 (1976); United States v. Klein, 522 F.2d 296, 300-01 (1st Cir. 1975). But under the Government's formulation, we are not asked to balance the competing interests but simply to ignore the individual's interest altogether.
11
The Government may be struggling to argue another proposition. We and other courts have upheld the placing of beepers, without warrant, in contraband, stolen goods and the like on the theory that the possessors of such articles have no legitimate expectation of privacy in substances which they have no right to possess at all. United States v. Emery, 541 F.2d 887 (1st Cir. 1976); United States v. Bishop, 530 F.2d 1156 (5th Cir. 1976); United States v. Perez, 526 F.2d 859, 863 (5th Cir. 1976). The Government may be trying to expand that principle to include the warrantless insertion of a beeper in legally possessed non-contraband substances whose probable use is to make an illegal drug. But there is a clear line of demarcation between, on the one hand, contraband and other items, such as stolen goods, whose possession is illegal, and on the other, goods, whatever their suspected use, whose possession is legal. The narcotics peddler in whose heroin a beeper is planted has no privacy interest in the substance; but the same is not so of legally-possessed substances into which a beeper is placed, even if these are destined later to be used in the commission of a crime. We would limit the authority of cases such as Emery to concealment of beepers in contraband substances or, at least, in items which are part and parcel of an ongoing criminal transaction (United States v. Perez, supra, beeper concealed in TV set taken in exchange for sale of heroin.)
12
The present case involves two generic uses of the beepers; first, to keep track of the motor vehicles;2 and second, to ascertain if the chemicals were still in the house in Brewster. Each of these uses requires, we believe, separate analysis. While we hold that both uses of beepers intruded to some degree upon defendants' reasonable privacy expectations, we believe that the privacy interest affected by using a beeper to maintain surveillance of a vehicle on public roads is much less than in the later instance. We hold, therefore, that given probable cause, no warrant was required for the vehicular surveillance.
13
Turning first to the vehicular surveillance, we do not find it critical that the beeper placed in the package of chemicals was inserted before title to the chemicals passed to defendants, while the beepers affixed directly to the vehicles were attached without the owners' permission and hence involved a trespass. See United States v. Hufford, 539 F.2d 32 (9th Cir. 1976). Whatever the legal situation at the moment when the beeper was put in the chemicals, the Government intended the device to be operative, without defendants' acquiescence or knowledge, after the chemicals were lawfully in their possession. And the trespass involved in affixing the beepers to the underbody of the vehicles was, standing alone, so minimal as to be of little consequence. See Cardwell v. Lewis, 417 U.S. 583, 94 S.Ct. 2464, 41 L.Ed.2d 325 (1974) (no fourth amendment violation in removing paint scrapings from a parked car). The agents had a right to be in the parking area; they did not open or search the vehicles. See United States v. Frazier, 538 F.2d 1322, 1326 (8th Cir. 1976) (Ross, J., concurring); United States v. Holmes, 537 F.2d 227, 230 (5th Cir. 1976) (Ainsworth, J., dissenting). As with insertion of the beeper in the chemicals, the important factor seems to be not that there was or was not a common law trespass ab initio, but that a honing device was surreptitiously implanted in private property in order to enhance the agents' ability to shadow the property and its possessors.
14
The basic question is simply whether the use of beepers so implanted to monitor the movements of the U-Haul van and the 1966 Mustang from Doe & Ingalls in Medford to the residence in Brewster violated defendants' reasonable expectations of privacy. Defendants argue, that they had a reasonable expectation that their vehicle's movement would not be continuously monitored and tracked by use of a transmitter implanted without their knowledge or consent on or in the vehicle in which they were riding.
15
But while this may be so, we agree with the Government that the privacy expectations of one operating a vehicle on public roads are considerably less than those of one speaking on the telephone from a closed booth, as in Katz. In Katz the Court spoke of the "vital role that the public telephone has come to play in private communication", and expressed the urgency of extending the fourth amendment to oral statements meant to be kept private. 389 U.S. at 352-53, 88 S.Ct. at 512. But the Court also pointed out that a person had no reasonable expectation of privacy in that which is knowingly exposed to others. Id. at 351, 88 S.Ct. 507. Defendants here had no reason to believe that their movements on the public highway would remain private that their route from Medford to Brewster would be their secret. "A car has little capacity for escaping public scrutiny. It travels public thoroughfares where both its occupants and its contents are in plain view." Cardwell v. Lewis, supra, 417 U.S. at 590, 94 S.Ct. at 2469. Accord, United States v. Chadwick, --- U.S. ----, 97 S.Ct. 2476, 53 L.Ed.2d 538 (1977). Moreover, defendants had no right to assume that law enforcement officers would not enhance their ability to see or track them by use of various artificial means such as binoculars or even radar, or by observing them from the air. See, e. g., United States v. McCall, 243 F.2d 858 (10th Cir. 1957).
16
Use of a beeper to monitor a vehicle involves something more, however, than magnification of the observer's senses as in the use of a helicopter, binoculars, radar, or the like. Whether or not the beeper is legally implanted by use of stealth or attached by a technical trespass to the vehicle, it transforms the vehicle, unknown to its owner, into a messenger in the service of those watching it. While a driver has no claim to be free from observation while driving in public, he properly can expect not to be carrying around an uninvited device that continuously signals his presence.
17
We conclude that while the intrusion involved in surveillance of a vehicle by beeper is considerably lessened by the fact that one driving on public roads knows that he is subject to public scrutiny, still the intrusion cannot be written off as non-existent. And even though searches of automobiles often present exigent circumstances that permit the Government to dispense with warrants, see United States v. Chadwick, supra, --- U.S. at ----, 97 S.Ct. at 2483-2484, it does not follow that searches coming within this exception can be conducted in all situations at the unlimited discretion of the police. The fourth amendment still places clear limits on official behavior in this context. We think it in keeping with Supreme Court precedent in other vehicular contexts, see, e. g., Almeida-Sanchez v. United States, 413 U.S. 266, 279, 93 S.Ct. 2535, 37 L.Ed.2d 596 (1973) (Powell, J., concurring); Chambers v. Maroney, 399 U.S. 42, 90 S.Ct. 1975, 26 L.Ed.2d 419 (1970), to hold that while the lessened expectancy of privacy associated with motor vehicles justifies the use of beepers without a warrant to track vehicles, this can be done only if the officers have probable cause at the time. Cf. United States v. Holmes, supra, 537 F.2d at 228-29 (Ainsworth, J., dissenting).3 A rule disposing of a warrant requirement where the movement of vehicles on public roads is involved, accommodates the genuine law enforcement interest in moving quickly to keep track of suspected criminals and is analogous with the application of the fourth amendment to motor vehicles in other contexts. On the other hand, by not licensing the indiscriminate use of beepers, it maintains a significant degree of protection.
18
On the record before us, we find ample evidence that at the time the vehicular surveillance was undertaken, the agents had probable cause to believe that a controlled substance was about to be made illegally. The call from the drug company, the discovery that the address given by the purchasers was not one where a chemical manufacturer would operate, and the nature of the chemicals purchased, in light of the agents' familiarity with the manufacture of controlled substances, together created a sufficient basis for believing a criminal enterprise was under way.4 We therefore hold that the use of the beepers to monitor the vehicles did not violate the fourth amendment even though no warrant was obtained.
19
This does not end the matter, however, since the beeper inside the box of chemicals was used after April 14 to determine the continued presence of the package inside the Brewster residence. Agent Elliott so testified; his affidavit filed in support of the search warrant for the Brewster property indicates that the beeper was used on April 29 to determine that the chemicals were still in the house. With respect to the need for a warrant, this use of a beeper must be distinguished from its use to monitor the movements of a vehicle on public highways. United States v. Chadwick, supra. The lessened expectancy of privacy applicable to vehicles has no relevance to this situation, and we can think of no other exception or analogy that might excuse the agents in these circumstances from securing a warrant, which provides the safeguard of the "detached scrutiny of a neutral magistrate". Id. --- U.S. at ----, 97 S.Ct. at 2482. As Chadwick recently reiterates, judicial warrants are the normal prerequisite to governmental conduct covered by the fourth amendment. When defendants withdrew from the public view, taking the box of chemicals inside with them, they had every right to expect that their activities inside the house which they sought to preserve as private would be free from warrantless intrusion by the Government. Doubtless the limited data transmitted by a beeper was far less revealing than the conversation recorded in Katz ; the level of intrusion was less severe. Still, as the chemicals containing the transmitter were not contraband or otherwise wrongfully in appellees' possession, the Government had no right to determine their continued presence in the house by use of warrantless electronic surveillance.
20
"It may be that it is the obnoxious thing in its mildest and least repulsive form; but illegitimate and unconstitutional practices get their first footing in that way, namely, by silent approaches and slight deviations from legal modes of procedure."
21
Boyd v. United States, 116 U.S. 616, 635, 6 S.Ct. 524, 535, 29 L.Ed. 746 (1886).
22
Because warrantless use of the one beeper inside the box of chemicals to determine their continued presence in the Brewster residence infringed on defendants' fourth amendment rights, evidence obtained from the searches must be suppressed unless it was come at not by exploitation of the illegality but instead by distinct means which purge the evidence of the primary taint. Wong Sun v. United States, 371 U.S. 471, 488, 83 S.Ct. 407, 9 L.Ed.2d 441 (1963); United States v. Race, 529 F.2d 12, 15 (1st Cir. 1976). The parties did not focus on this issue below, and we are in a poor position to decide the question ourselves. It is by no means clear that the Government placed no importance on the information received from the beeper inside the house; Agent Elliott's affidavit refers to the beeper in this regard. On the other hand, this bit of information seems quite minor in comparison to the other facts known to Elliott the suspicious purchase; the drive to the secluded residence; the odor of ether and the cross-ventilation and, moreover, the beeper appears to have worn out at some point. The district court should make a finding on this question upon remand and take action accordingly.
23
The order is vacated and the matter remanded for further proceedings in accordance herewith.
1
Although the alleged end-product, phencyclidine, is a controlled substance, none of the chemicals that were purchased are within that category; they may be possessed legally. One of the ordered chemicals, peperidine, was described by Agent Elliott in his affidavit as "a necessary chemical for creating Phencyclidine"
2
For the fourth amendment purposes, where the issue is whether there was an invasion of a privacy interest, we think it makes better sense to classify the beepers functionally, i. e. by whether or not they were used to tail a vehicle, or else for some different purpose, rather than by whether the beepers were in a package or affixed to the vehicle's underbody. To the extent the packaged beeper was used to follow the vehicle, we think it presents the same fourth amendment problems as the attached beepers
3
Judge Ainsworth urges a more relaxed "reasonable cause" standard. See United States v. Holmes, 537 F.2d at 228-29 (5th Cir. 1976). Cf. South Dakota v. Opperman, 428 U.S. 364, 369-70, 96 S.Ct. 3092, 49 L.Ed.2d 1000 (1976); United States v. Martinez-Fuerte, supra; Terry v. Ohio, 392 U.S. 1, 30-31, 88 S.Ct. 1868, 20 L.Ed.2d 889 (1968). We need not decide that question here, as the government met its burden under either standard. Based on what has so far been argued to us, we do not see that a standard less than probable cause would be warranted, but we do not foreclose further consideration of the issue
4
The duration of the planned surveillance in this case was for a period limited to the delivery of the materials to the place of manufacture. We do not consider what if anything might be additionally required if the planned surveillance by beeper contemplated an extensive period of time
|
{
"pile_set_name": "Pile-CC"
} | Month: May 2016
Pyrography also known as woodburning, is beautiful and much simpler than any other drawing or painting medium. Luckily it is also rather easy to master when you understand that pyrography is a physical rather than a mechanical process and so…
In a report done in 2012, the federal government recorded 62,939 conditions of child sexual abuses and only 30% of sexual assaults was described. Despite the fact that the decrease in child abuse reportedly decrease in the past handful of…
Needless to say, some of you already have an infinite list of chores in your minds that call for a big Thank You to your mother, for being the all-rounder that she is. Mothers are a blessing, especially if you…
Picture the scene: A man is blackmailed as revenge for cuckolding. He brings $75,000 in $500 bills – cash that he’s acquired from a home equity line of credit – to a meeting on a bridge, as the other man…
Almost nothing can ruin property possession a lot more than acquiring a conflict with a single of your neighbors. If you’ve got ever been unlucky enough to stop up in a condition like this, you know that it would not…
Because rates, deductibles, copayments, and coinsurance concentrations for smaller enterprise group wellbeing insurance insurance policies in Texas can change widely from prepare to prepare, it pays to shop about. Have a very good being familiar with of your employees’ healthcare…
Choosing the right college is not an easy decision, as many variables must be considered before a choice can be made. You have to decide if you want to stay in-state or go out-of-state, if you want to attend a…
Everybody has butterflies in their stomach the first day of school. Starting a new school can make you even more nervous. But there are concrete steps you can take to make your transition to a private school easier. Everyone is…
A stress interview is one where an uncomfortable situation is deliberately created to test how the candidate reacts under pressure. It is not a pleasant situation to be in and the ethics of such interviewing methodology is questionable; as is… |
{
"pile_set_name": "PubMed Abstracts"
} | Alterations in cell-wall glycosyl linkage structure of Arabidopsis murus mutants.
Methylation (glycosyl-linkage) analyses of the cell walls from Arabidopsis (Arabidopsis thaliana L., Heynh.) murus mutants revealed variations in the linkage structure compared to wild type. Linkage analyses revealed new features for mutations whose defective gene has not been identified. For example, the low-rhamnose mur8 mutant also shows deficiencies in 4-GalA linkages. No change in the 2-Rha to 2,4-Rha ratio indicates the mutant had lower amounts of rhamnogalacturonan I, but no alteration in its fine structure. For all mur mutants, methylation analysis revealed that changes in other polysaccharides occur indirectly as a result of mutation. All mutants were resolved by Principal Components Analyses applied to normalized mole% values for the total set of linkage groups. The 'loadings' responsible for discrimination of mutant and wild type revealed variation in linkage groups otherwise difficult to discern and, in certain instances when the gene is known, resolved the specific deficiency from indirect effects altering other sugar linkage distributions. |
{
"pile_set_name": "Github"
} | /* $%BEGINLICENSE%$
Copyright (c) 2007, 2009, Oracle and/or its affiliates. All rights reserved.
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; version 2 of the
License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
02110-1301 USA
$%ENDLICENSE%$ */
#ifndef _NETWORK_SOCKET_H_
#define _NETWORK_SOCKET_H_
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include "network-exports.h"
#include "network-queue.h"
#ifdef HAVE_SYS_TIME_H
/**
* event.h needs struct timeval and doesn't include sys/time.h itself
*/
#include <sys/time.h>
#endif
#include <linux/version.h>
#include <sys/types.h> /** u_char */
#ifndef _WIN32
#include <sys/socket.h> /** struct sockaddr */
#ifdef HAVE_NETINET_IN_H
#include <netinet/in.h> /** struct sockaddr_in */
#endif
#include <netinet/tcp.h>
#ifdef HAVE_SYS_UN_H
#include <sys/un.h> /** struct sockaddr_un */
#endif
/**
* use closesocket() to close sockets to be compatible with win32
*/
#define closesocket(x) close(x)
#else
#include <winsock2.h>
#include <Ws2tcpip.h>
#endif
#include <glib.h>
#include <event.h>
#include "network-address.h"
typedef enum {
NETWORK_SOCKET_SUCCESS,
NETWORK_SOCKET_WAIT_FOR_EVENT,
NETWORK_SOCKET_ERROR,
NETWORK_SOCKET_ERROR_RETRY
} network_socket_retval_t;
typedef enum {
AUTOCOMMIT_UNKNOWN,
AUTOCOMMIT_TRUE,
AUTOCOMMIT_FALSE
} network_socket_autocommit_t;
typedef enum {
SOCKET_LISTEN,
SOCKET_SERVER,
SOCKET_CLIENT
} network_socket_dir_t;
typedef struct{
GString *default_db;
network_socket_autocommit_t autocommit_status;
gboolean savepoint_flag;
GQueue* set_vars; // 当前设置的系统变量列表
GString* charset_client;
GString* charset_results;
GString* charset_connection;
} conn_attr_t;
typedef struct network_mysqld_auth_challenge network_mysqld_auth_challenge;
typedef struct network_mysqld_auth_response network_mysqld_auth_response;
typedef struct {
int fd; /**< socket-fd */
struct event event; /**< events for this fd */
network_address *src; /**< getsockname() */
network_address *dst; /**< getpeername() */
int socket_type; /**< SOCK_STREAM or SOCK_DGRAM for now */
void *srv;
network_socket_dir_t socket_dir;
guint64 ts_connected; // the time to create socket
guint8 last_packet_id; /**< internal tracking of the packet_id's the automaticly set the next good packet-id */
gboolean packet_id_is_reset; /**< internal tracking of the packet_id sequencing */
network_queue *recv_queue;
network_queue *recv_queue_raw;
network_queue *send_queue;
off_t header_read;
off_t to_read;
/**
* data extracted from the handshake
*
* all server-side only
*/
network_mysqld_auth_challenge *challenge;
network_mysqld_auth_response *response;
conn_attr_t conn_attr;
gboolean is_authed; /** did a client already authed this connection */
} network_socket;
#define EMPTYSTR ""
#define NOCLIENT EMPTYSTR
#define NOBACKEND EMPTYSTR
#define NOUSR EMPTYSTR
#define NODB EMPTYSTR
#define INVALID_THID 0
#define NETWORK_SOCKET_SRC_NAME(ns) ((ns) ? (ns)->src->name->str : NOCLIENT)
#define NETWORK_SOCKET_DST_NAME(ns) ((ns) ? (ns)->dst->name->str : NOBACKEND)
#define NETWORK_SOCKET_USR_NAME(ns) ((ns) ? ((ns)->response ? (ns)->response->username->str : NOUSR) : NOUSR)
#define NETWORK_SOCKET_THREADID(ns) ((ns) ? ((ns)->challenge ? (ns)->challenge->thread_id : INVALID_THID) : INVALID_THID)
#define NETWORK_SOCKET_DB_NAME(ns) ((ns) ? (ns)->conn_attr.default_db->str:NODB)
#define NETWORK_SOCKET_SRC_IPADDR(ns) ((ns) ? inet_ntoa((ns)->src->addr.ipv4.sin_addr) : EMPTYSTR)
NETWORK_API network_socket *network_socket_init(void) G_GNUC_DEPRECATED;
NETWORK_API network_socket *network_socket_new(network_socket_dir_t socket_dir);
NETWORK_API void network_socket_free(network_socket *s);
NETWORK_API void network_socket_set_chassis(network_socket *s, void *srv);
NETWORK_API network_socket_retval_t network_socket_write(network_socket *con, int send_chunks);
NETWORK_API network_socket_retval_t network_socket_read(network_socket *con);
NETWORK_API network_socket_retval_t network_socket_to_read(network_socket *sock);
NETWORK_API network_socket_retval_t network_socket_set_non_blocking(network_socket *sock);
NETWORK_API network_socket_retval_t network_socket_connect(network_socket *con);
NETWORK_API network_socket_retval_t network_socket_connect_finish(network_socket *sock);
NETWORK_API network_socket_retval_t network_socket_bind(network_socket *con);
NETWORK_API network_socket *network_socket_accept(network_socket *srv);
NETWORK_API network_socket_retval_t network_socket_connect_setopts(network_socket *sock);
#endif
|
{
"pile_set_name": "PubMed Central"
} | Introduction {#s1}
============
The Mediterranean basin is ranked first among regions in the export of fresh market citrus fruits (FAO, [@B33]). This region has some adverse biotic and abiotic conditions that affect citrus cultivation. The rootstock is a key element for citrus production because it can confer tolerance to these constraints. The graft-transmissible disease tristeza, caused by the *Citrus tristeza virus* (CTV), is one of the most important limiting factors and has a strong economic impact that necessitates dramatic changes in citrus production (Cambra et al., [@B15]; Moreno et al., [@B77]). The damage brought by CTV is caused by the scion-rootstock combination, the CTV strain, and the environmental conditions (Ballester-Olmos et al., [@B6]). Most agricultural lands in the Mediterranean basin have two soil limiting conditions: alkalinity and, to a lesser extent, salinity. Soil alkalinity was traditionally managed using sour orange (SO) or *Citrus aurantium* L. as rootstock. Nevertheless, SO is very sensitive to Quick Decline disease caused by CTV. This limiting condition has forced the use of alternative rootstocks despite the highly desirable agronomic traits that SO induces to citrus trees. Among the main rootstocks, Cleopatra mandarin (*C. reshni* Hort. ex Tan.) and *C. macrophylla* W. (CM) are tolerant to calcareous soils, although CM is sensitive to severe CTV strains (Cambra et al., [@B15]). One of the main rootstocks used worldwide is Carrizo citrange (CC) \[*C. sinensis* (L.) Osb. × *Poncirus trifoliata* (L.) Raf.\] which is tolerant to CTV but sensitive to iron chlorosis in alkaline soils (Castle et al., [@B17]). Citrus is among the most salt-sensitive perennial crops (Maas, [@B72]). The tolerance of citrus trees to soil salinity depends greatly on the rootstock ability to restrict ion transport to the scion and this is a heritable trait (Walker, [@B118]). Cleopatra mandarin and CM are suited for saline soils because they restrict ion transport to the aerial part, whereas CC is sensitive to this condition as it quickly accumulates the ions and reaches toxic concentrations (Gomez-Cadenas et al., [@B43]). CC is considered a good rootstock for inducing high yield, big fruit size and high fruit quality to the grafted variety. CM induces vigor to citrus trees, early bearing, very high yield, and has an excellent adaptation to calcareous and saline soils. However, this rootstock is sensitive to cold temperatures, moderately sensitive to CTV, and reduces fruit quality. Therefore, CC and CM, used as citrus rootstocks, have complementary characteristics.
Rootstock breeding programs are carried out by sexual or somatic hybridization. The recovery of rootstock hybrids by sexual hybridization is hampered by citrus reproductive biology (apomixis) and the high heterozygosity of the citrus genomes. Most citrus genotypes are apomictic, except for citrons (*C. medica* L.), pummelos (*C. maxima* (L.) Osb.), clementines (*C. clementina* Hort. ex Tan.), and some mandarin hybrids. The seeds of non-apomictic genotypes generally contain only one sexual embryo, whereas the seeds of apomictic genotypes generally contain one sexual embryo and one or more nucellar embryos. The development of nucellar embryos in citrus apomictic genotypes can be initiated before fertilization, and the competition between the zygotic and nucellar embryos often results in the failure of the zygotic embryos (Wakana and Uemoto, [@B117]; Koltunow, [@B67]). In addition, the high heterozygosity level of citrus species (Herrero et al., [@B60]; Ollitrault et al., [@B90]; Barkley et al., [@B7]) produces a wide segregation pattern of parental traits in the progenies. The probability of having individuals that combine all the desired traits is usually very low. Therefore, a large number of individuals in these progenies need to be evaluated to find and select those that combine the desirable characteristics of the two parents. In contrast, somatic hybridization by protoplast fusion allows combining the genomes of both parents in only one genotype regardless of their level of heterozygosity, adding their dominant complementary characters (Ollitrault et al., [@B93]) and to overcome the sexual incompatibility between parents. This methodology is used worldwide for rootstock breeding (Grosser et al., [@B51]; Ollitrault et al., [@B88]; Dambier et al., [@B28]; Grosser and Gmitter, [@B48]).
Somatic hybridization in citrus is performed by the fusion of protoplasts derived from leaf mesophyll with protoplasts derived from embryogenic callus. In citrus, it has not yet been possible to regenerate plants from leaf protoplasts. Protoplasts isolated from embryogenic callus or leaf protoplasts that incorporate the mitochondrial genome from callus protoplasts are the only ones that have the ability to produce embryos and subsequently, plants (Kobayashi et al., [@B66]; Grosser and Gmitter, [@B47]; Guo et al., [@B56]). Therefore, it is necessary to have different callus lines of rootstock genotypes with favorable traits for the establishment of rootstock breeding programs based on somatic hybridization. Embryogenic callus can be easily obtained in apomictic mandarins and sweet oranges by *in vitro* ovule culture (Rangan et al., [@B100]; Ollitrault et al., [@B86]; Perez et al., [@B99]). However, it can be very difficult or has never been achieved in other genotypes that are essential for rootstock breeding such as SO, *P. trifoliata*, and the interspecific hybrids citranges and citrumelos (*C. paradisi* Macf. × *P. trifoliata*). Selective agents are not needed to select citrus somatic hybrids after somatic hybridizations. Instead, potential hybrids are identified among all the regenerated plants by ploidy and genetic composition analyses. The genetic analysis is often performed using a small number of molecular markers (Guo et al., [@B56]; Dambier et al., [@B28]; Grosser and Gmitter, [@B48]) that display the complementary allelic configuration of the parents disregarding their homogeneous distribution in the different linkage groups (LGs), hence impeding a detailed study of chromosome stability. Besides molecular analysis, a large number of plants is required for detailed physiological and agronomical evaluations of the somatic hybrids to determine their potential utility as new rootstocks (Dambier et al., [@B28]). Somatic hybrids go through a long juvenile phase, which often takes more than 6 years, delaying the production of seeds to obtain the plants needed to carry out the experiments (Krajewski and Rabe, [@B68]). This citrus juvenile phase is one of the main constraints in rootstock breeding programs. However, *in vitro* micropropagation allows the generation of a large number of clonal plants in a short time, avoiding the delay that juvenility would impose, which is a great advantage for rootstock breeding programs (Bordas et al., [@B11]). In this study, the genetic composition of two somatic hybrids, obtained by CM and CC protoplast fusion (Pensabene-Bellavia et al., [@B98]), was analyzed using single sequence repeats (SSR), single nucleotide polymorphism (SNP), and insertion or deletion (InDel) markers. Both somatic hybrids were morphologically described and their behavior was evaluated under salinity, iron deficiency, and CTV inoculation. The main objective of this study was to perform an early and detailed evaluation of the somatic hybrids to determine their potential utility as rootstocks for the Mediterranean citrus industry.
Materials and methods {#s2}
=====================
Plant material and greenhouse conditions
----------------------------------------
Diploid CC and CM and allotetraploid somatic hybrids SMC-58 and SMC-73 were used for the experiments. Diploid CC and CM seeds were collected from the Citrus Germplasm Bank of pathogen-free plants at the Instituto Valenciano de Investigaciones Agrarias (IVIA) (Navarro et al., [@B82]; Navarro, [@B81]) and somatic hybrids SMC-58 and SMC-73 were recovered by protoplast fusion isolated from CM embryogenic callus and CC leaf mesophyll leaves (Pensabene-Bellavia et al., [@B98]). The somatic hybrids were micropropagated by Agromillora Research S.L. using the methodology described by Bordas et al. ([@B11]). The seeds of CC and CM were germinated in a greenhouse using a sterile substrate composed of peat, coconut fiber, and perlite (50:25:20:5), supplemented with 1.38 g kg^−1^ of calcium superphosphate, and irrigated twice weekly with the Hoagland and Arnon ([@B61]) nutrient solution modified for citrus (5 mM Ca(NO~3~)~2~, 1.4 mM KNO~3~, 2 mM MgSO~4~, 0.6 mM H~3~PO~4~, 20 μM Fe-EDDHA, 7.6 μM ZnSO~4~·7H~2~O, 0.50 μM CuSO~4~·5H~2~O, 50 μM H~3~BO~3~, 0.50 μMMoO~3~, and 54 μM MnSO~4~·H~2~O). The pH of the nutrient solution was adjusted to 6.0 with 1 M of KOH or H~2~SO~4~. After eight weeks, homogeneous seedlings, which were selected based on size uniformity, were transplanted individually to opaque plastic 0.5 L pots filled with a substrate composed of peat, coconut fiber, sand, and perlite (40:25:25:10). Seedlings and micropropagated plants of similar size were then randomized over the experimental area. A row of plants, not included in the experiment, was placed around the perimeter as a border. Plants were grown under greenhouse conditions with supplementary light (250 μmol m^−2^ s^−1^, 400--700 nm) to extend the photoperiod to 16 h. The temperature ranges were 16--18°C at night and 26--28°C during the day. Relative humidity (RH) was maintained at around 80%.
Genetic characterization
------------------------
Nuclear genomes were characterized using 23 SSR and 59 SNP markers selected from the 9 LG of the Clementine genetic map (Ollitrault et al., [@B91]; Tables [1](#T1){ref-type="table"}--[4](#T4){ref-type="table"}). Cytoplasmic genomes were characterized with 3 mitochondrial InDel markers, 5/*rrn*18-1 (Duminil et al., [@B30]), *nad*2/4-3, and *nad*7/1-2 (Froelicher et al., [@B37]), and 5 chloroplastic SSR markers: NTCP7, NTCP9 CCMP2, CCMP5 (Cheng et al., [@B20]), and CCMP6 (Bryan et al., [@B12]; Weising and Gardner, [@B121]; Table [4](#T4){ref-type="table"}). All the analyses were performed in the somatic hybrids, the parents (CM and CC), and the CM embryogenic callus used for protoplast fusion. For these characterizations, genomic DNA was isolated using the methodology described by Dellaporta et al. ([@B29]) with few modifications (0.5 M EDTA, pH 8.0, 1 M Tris-HCl, pH 8.0, 5 M NaCl, 2% MATAB, 1% PEG 6000 and 0.5% Na~2~SO~3~) and was performed using different DNA extractions from leaves of different branches of both somatic hybrids.
######
Molecular markers analyzed indicating the type of marker, locus name, linkage groups (LGs) 1 and 2 and location within LG in centimorgans (cM), bibliographic reference in the literature, and GeneBank accession.
**Type** **Locus** **Location** **References**
---------- --------------------------------------------- -------------- ---------------- --------------------------- ----------
SNP [^\*^](#TN1){ref-type="table-fn"}CiC4827-01 1 20.5 Ollitrault et al., [@B92] ET072918
SNP CiC2110-01 1 28.8 Ollitrault et al., [@B92] ET099643
SSR CiBE5720 1 58.5 Ollitrault et al., [@B85] ET082224
SNP [^\*^](#TN1){ref-type="table-fn"}CiC4581-01 1 63.7 Ollitrault et al., [@B92] ET109034
SNP [^\*^](#TN1){ref-type="table-fn"}ACO-P353 1 80.4 Ollitrault et al., [@B91] JX630066
SNP ACO-C601 1 83.4 Ollitrault et al., [@B91] JX630065
SNP CiC0599-01 1 102.4 Ollitrault et al., [@B92] ET093125
SNP TSC-C80 1 111.6 García-Lor et al., [@B38] JX630084
SSR JK-taa15 1 119.7 Kijas et al., [@B65] none
SNP [^\*^](#TN1){ref-type="table-fn"}F3H-M309 2 19.6 García-Lor et al., [@B38] JX630066
SNP [^\*^](#TN1){ref-type="table-fn"}F3H-C341 2 20.0 García-Lor et al., [@B38] JX630067
SNP [^\*^](#TN1){ref-type="table-fn"}F3H-P30 2 20.0 García-Lor et al., [@B38] JX630066
SNP [^\*^](#TN1){ref-type="table-fn"}PEPC-M316 2 32.6 García-Lor et al., [@B38] JX630067
SNP PEPC-C328 2 32.6 García-Lor et al., [@B38] JX630067
SSR mCrCIR07D05 2 75.6 Cuenca et al., [@B25] FR677574
SNP SOS1-M50 2 78.5 García-Lor et al., [@B38] JX630068
SNP [^\*^](#TN1){ref-type="table-fn"}CiC3712-01 2 93.9 Ollitrault et al., [@B92] ET079481
SNP CCC1-P727 2 110.9 García-Lor et al., [@B38] JX630069
SNP [^\*^](#TN1){ref-type="table-fn"}CCC1-M85 2 110.9 García-Lor et al., [@B38] JX630069
SSR JK-TAA41 2 131.8 Kijas et al., [@B65] none
SNP [^\*^](#TN1){ref-type="table-fn"}PKF-C64 2 131.2 García-Lor et al., [@B38] JX630076
SNP TRPA-M593 2 132.3 García-Lor et al., [@B38] JX630070
SNP PKF-M186 2 133.5 García-Lor et al., [@B38] JX630076
*Non-polymorphic markers*.
######
Molecular markers analyzed indicating the type of marker, locus name, linkage groups (LGs) 3, 4, and 5 and location within LG in centimorgans (cM), bibliographic reference in the literature, and GeneBank accession.
**Type** **Locus** **Location** **References**
---------- --------------------------------------------- -------------- ---------------- --------------------------- ------------
SNP INVA-M437 3 30.2 García-Lor et al., [@B38] JX630071
SNP MDH-M519 3 34.8 García-Lor et al., [@B38] JX630072
SNP [^\*^](#TN2){ref-type="table-fn"}MDH-MP69 3 34.8 García-Lor et al., [@B38] JX630072
SNP [^\*^](#TN2){ref-type="table-fn"}CiC4681-02 3 92.8 Ollitrault et al., [@B92] ET109640
SNP NCED3-M535 3 101.3 García-Lor et al., [@B38] JX630086
SNP CiC5796-12 3 109.9 Ollitrault et al., [@B92] ET0822752
SNP ATMR-M728 3 141.9 García-Lor et al., [@B38] JX630073
SNP ATMR-C372 3 141.9 García-Lor et al., [@B38] JX630073
SSR Ci08A10 3 144.9 Froelicher et al., [@B37] AJ567414
SNP CHS-M183 3 167.3 García-Lor et al., [@B38] JX630074
SNP [^\*^](#TN2){ref-type="table-fn"}CHS-P57 3 167.3 García-Lor et al., [@B38] JX630074
SNP [^\*^](#TN2){ref-type="table-fn"}CiC4240-04 4 7.1 Ollitrault et al., [@B92] ET106812
SNP CHI-M598 4 11.0 García-Lor et al., [@B38] JX630075
SSR mCrCIR07D06 4 16.3 Cuenca et al., [@B25] FR677581
SNP CiC2840-01 4 17.0 Ollitrault et al., [@B92] ET103429
SNP CiC3740-02 4 43.9 Ollitrault et al., [@B92] ET079647
SSR mCrCIR03G05 4 75.1 Cuenca et al., [@B25] FR677578.1
SNP [^\*^](#TN2){ref-type="table-fn"}CiC6213-07 4 85.5 Ollitrault et al., [@B92] ET085253
SNP CiC1380-05 5 17.2 Ollitrault et al., [@B92] ET072553
SNP CiC5788-16 5 41.5 Ollitrault et al., [@B92] ET082679
SNP [^\*^](#TN2){ref-type="table-fn"}CiC5842-02 5 77.3 Ollitrault et al., [@B92] ET083106
SNP [^\*^](#TN2){ref-type="table-fn"}NADK2-M285 5 86.0 García-Lor et al., [@B38] JX630077
SSR mCrCIR06A12 5 98.7 Froelicher et al., [@B37] AM489742
SNP DFR-M240 5 105.7 García-Lor et al., [@B38] JX630074
*Non-polymorphic markers*.
######
Molecular markers analyzed indicating the type of marker, locus name, linkage groups (LGs) 6 and 7 and location within LG in centimorgans (cM), bibliographic reference in the literature, and GeneBank accession.
**Type** **Locus** **Location** **References**
---------- ---------------------------------------------- -------------- ---------------- --------------------------- ----------
SSR [^\*^](#TN3){ref-type="table-fn"}mCrCIR04H09 6 0.0 Ollitrault et al., [@B91] FR692370
SNP CiC4356-06 6 6.2 Ollitrault et al., [@B92] ET107540
SSR MEST132 6 26.9 Aleza et al., [@B3] DY276930
SSR CiBE4818 6 28.3 Ollitrault et al., [@B85] ET110604
SSR CiBE0733 6 42.2 Ollitrault et al., [@B85] ET094202
SNP [^\*^](#TN3){ref-type="table-fn"}CiC2128-01 6 61.2 Ollitrault et al., [@B92] ET111354
SSR mCrCIR02B11 6 69.2 Ollitrault et al., [@B91] FR692358
SNP PSY-M30 6 69.7 García-Lor et al., [@B38] JX630080
SNP PSY-C461 6 69.7 García-Lor et al., [@B38] JX630080
SNP CiC3056-02 6 70.5 Ollitrault et al., [@B92] ET075329
SSR [^\*^](#TN3){ref-type="table-fn"}CiBE6256 6 84.6 Ollitrault et al., [@B85] ET085615
SNP [^\*^](#TN3){ref-type="table-fn"}AocM290 6 85.9 Ollitrault et al., [@B92] JX630079
SNP AocC593 6 85.9 Ollitrault et al., [@B92] DY293375
SSR MEST123 6 93.0 Aleza et al., [@B3] DY276100
SSR CiBE5866 6 99.8 Ollitrault et al., [@B85] ET083232
SSR mCrCIR07E05 7 13.1 Froelicher et al., [@B37] AM489749
SNP [^\*^](#TN3){ref-type="table-fn"}CiC1444-03 7 13.6 Ollitrault et al., [@B92] ET073216
SNP DXS-M618 7 40.7 García-Lor et al., [@B38] JX630082
SNP DXS-C545 7 40.7 García-Lor et al., [@B38] JX630082
SNP FLS-P129 7 46.0 García-Lor et al., [@B38] JX630083
SSR [^\*^](#TN3){ref-type="table-fn"}mCrCIR03E06 7 75.1 Ollitrault et al., [@B91] FR692363
SSR Ci07C07 7 98.0 Froelicher et al., [@B37] AJ567409
*Non-polymorphic markers*.
######
Molecular markers analyzed indicating the type of marker, locus name, linkage groups (LGs) 8 and 9 and location within LG in centimorgans (cM), bibliographic reference in the literature, and GeneBank accession.
**Type** **Locus** **Location** **References**
---------- ----------------------------------------------- --------------- --------------------------- --------------------------- ----------
SSR mCrCIR07B05 8 31.7 Froelicher et al., [@B37] AM489747
SSR CiBE0214 8 40.4 Ollitrault et al., [@B85] ET088913
SNP CiC5164-02 8 45.6 Ollitrault et al., [@B92] ET111943
SNP CiC1749-05 8 103 Ollitrault et al., [@B92] ET097636
SNP [^\*^](#TN4){ref-type="table-fn"}CiC4876-07 9 2.7 Ollitrault et al., [@B92] ET080580
SNP [^\*^](#TN4){ref-type="table-fn"}CiC5087-01 9 15.9 Ollitrault et al., [@B92] ET111514
SSR mCrCIR07F11 9 49.6 Kamiri et al., [@B64] FR677567
SNP CiC2518-02 9 53.5 Ollitrault et al., [@B92] ET101955
SSR Ci08C05 9 55.1 Froelicher et al., [@B37] AJ567415
SNP [^\*^](#TN4){ref-type="table-fn"}LCYB-P736 9 78.9 García-Lor et al., [@B38] JX630084
SNP LCYB-M480 9 78.9 García-Lor et al., [@B38] JX630084
SNP HYB-M62 9 102.3 García-Lor et al., [@B38] AF315289
SNP HYB-C433 9 102.3 García-Lor et al., [@B38] JX630087
Indel *nad*2/4-3 Mitocondrial Froelicher et al., [@B37]
Indel *[^\*^](#TN4){ref-type="table-fn"} nad*7/1-2 Mitocondrial Froelicher et al., [@B37]
Indel [^\*^](#TN4){ref-type="table-fn"} 5/*rrn*18-1 Mitocondrial Duminil et al., [@B30]
cpSSR CCMP2 Chloroplastic Cheng et al., [@B21]
cpSSR CCMP5 Chloroplastic Cheng et al., [@B21]
cpSSR CCMP6 Chloroplastic Cheng et al., [@B21]
cpSSR NTCP7 Chloroplastic Cheng et al., [@B21]
cpSSR [^\*^](#TN4){ref-type="table-fn"} NTCP9 Chloroplastic Cheng et al., [@B21]
*Non-polymorphic markers*.
SSR markers
-----------
PCR amplifications were performed using Thermocycler ep gradient S (Eppendorf®, Germany) in 10 μL final volume, containing 0.8 U of *Taq* DNA polymerase (Fermentas®, Germany), 10 ng of citrus template DNA, 0.2 mM wellRED (Sigma®, Germany) dye-labeled forward primer, 0.2 mM non-dye-labeled reverse primer, 0.2 mM each dNTP, and PCR reaction buffer 10X composed of 750 mM Tris-HCl, pH 9.0, 50 mM KCl, 200 mM (NH~4~)~2~SO~4~, 1.5 mM MgCl~2~, and 0.0001% BSA. The cycling program was set as follows: denaturation for 5 min at 94°C followed by 40 repeats of 30 s at 94°C, 1 min at the annealing temperature of each primer pair, 45 s at 72°C, and a final elongation step of 4 min at 72°C. Capillary electrophoresis was carried out using a CEQ™ 8,000 Genetic Analysis System (Beckman Coulter Inc., USA). The PCR products were initially denatured for 2 min at 90°C, injected for 30 s at 2 kV, and subsequently separated for 35 min at 6 kV. Alleles were sized based on a DNA size standard (400 bp). The GenomeLab™ GeXP v.10.0 genetic analysis software was used for data collection. Allele dosage was calculated using MAC-PR (microsatellite DNA allele counting-peak ratio) method (Esselink et al., [@B31]), validated in citrus by Cuenca et al. ([@B25]).
SNP markers
-----------
Genetic analysis of SNP markers was performed using KASPar technology by LGCgenomics (<http://www.lgcgenomics.com>). Primers were designed by LGCgenomic from each SNP locus flanking sequence (approximately 50 nt on each side of the SNP). The KASPar genotyping system is a competitive allele-specific dual Förster Resonance Energy Transfer (FRET)-based assay for SNP genotyping. A detailed description of specific conditions and reagents can be found in Cuppen ([@B26]). Identification of allele dosage in heterozygous somatic hybrids was carried out based on the relative allele signals described by Cuenca et al. ([@B24]) and Aleza et al. ([@B2]).
Identification of the genetic structure of somatic hybrids and their parents
----------------------------------------------------------------------------
Allelic configurations of the somatic hybrids SMC-58 and SMC-73 and their parents, CM and CC, were determined using the SSR and SNP genotyping data. For markers showing different alleles for the parents (A~1~A~2~ + A~3~A~4~, and A~1~A~2~ + A~3~A~3~), the somatic hybrids genotype was directly annotated. In the case of parents sharing alleles for a given marker (A~1~A~2~ + A~2~A~2~ o A~1~A~2~ + A~2~A~3~), the allelic configuration of the somatic hybrids was based on the estimated allele dosage.
Morphologic characterization
----------------------------
Plant morphology was evaluated on 9-month-old plants that were cultivated in the greenhouse under the above described conditions. Twelve plants of CC, CM, and the somatic hybrids (SMC-58 and SMC-73) were chosen for performing the evaluation. Measurements were taken on plant height, internodal length, and leaf number. Leaf greenness of 3 mature leaves was measured in each plant using a SPAD device (Minolta®, Japan) and the mean value of 5 readings was taken. The length (l) and width (w) of the main leaflet were also registered in the same leaves. Leaf index, representative of leaf shape, was calculated from l/w relations. Additionally, all the relevant International Plant Genetic Resources Institute (IPGRI) descriptors for each genotype were annotated (IPGRI, [@B63]).
Iron chlorosis tolerance evaluation
-----------------------------------
Twelve homogeneous plants of each genotype were trimmed to a single stem and transplanted to 0.5 L pots and then grouped into two groups based on substrate type. Control substrate was composed of peat and sand (2:3) with added 0.4% (w/v) Ca(H~2~PO~4~)~2~, whereas chlorosis-inducing substrate had additional 10% (v/v) of CaCO~3~ added to the mix. Plants were previously acclimated and were maintained for 4 weeks under the irrigation and climatic conditions previously described. Any new lateral branching shoots were detected and eliminated every 3 days to focus the growth in a single shoot. A plastic ring was placed on top of the stem to differentiate the newly developed biomass prior to the initiation of irrigation treatments. Plants growing on normal substrate were irrigated with the solution previously described, which contained 20 μM Fe-EDDHA, and were chosen as the control treatment (Ct). Plants growing on the chlorosis-inducing substrate were irrigated with a similar solution than Ct treatment but deficient in iron (2 μM Fe-EDDHA) and containing carbonates (10 mM NaHCO~3~). These conditions were considered the chlorosis-inducing treatment (Ch). Plants were randomized over the experimental area with a guard row and irrigated twice weekly for 10 weeks. After treatments, the new shoot was taken from each plant, rinsed with deionized water, and separated into leaves and stems. They were then fresh-weighed individually and dried in a forced draft oven at 70°C for 48 h until constant dry weight (DW) was obtained. Plant growth was measured using the shoot (leaf and stem) DW and iron content analysis was performed using leaves. The chlorophyll content in leaves was monitored by measuring changes in leaf greenness with a SPAD chlorophyll meter (Minolta, Japan). Two fully expanded leaves per plant were marked with labels and five readings were taken per leaf, avoiding the midrib, at the initial and final days of the trial period. Leaf greenness index was calculated as the ratio of final/initial SPAD readings. Values below 1 indicate greenness descent over the trial period (Castle et al., [@B17]). The iron concentration was measured from dry tissues (0.5 g) that were burnt in a muffle furnace for 12 h at 550°C. Iron was extracted with 2% nitric acid (Hiperpur, Panreac) in an ultrasonic bath (Fungilab®, Spain) for 30 min at 40°C and the concentration was measured using atomic absorption spectrometry in an ASS Analyst200 (Perkin Elmer®, USA).
Salinity tolerance evaluation
-----------------------------
Forty homogeneous plants of each genotype trimmed to a single stem were selected and divided into groups that were irrigated with the basal nutrient solution described above. Either 0 (control, Ct) or 40 mM NaCl (salt-treated, +S) was added to each group. Pots were irrigated with 400 mL of solution per pot every 3 days. Excess solution was drained out of the pot to avoid salt accumulation in the substrate. A plastic ring was placed at the top of the stems to differentiate the newly developed biomass before irrigation treatments were initiated. Leaf gas exchange parameters were registered weekly using a portable infra-red gas analyzer LCpro+ (ADC Bioscientific Ltd., UK). Net CO~2~ assimilation (*A*~CO2~) and transpiration (*E*) rates were monitored between 10 a.m. and 2 p.m. The measurements were taken in two mid-stem leaves of 9 plants per treatment and genotype by taking 3 consecutive measurements on each leaf. Photosynthetically active radiation (PAR) at the leaf surface was adjusted to 1,000 μmol m^−2^ s^−1^, which exceeds the saturating value for citrus, and atmospheric CO~2~ concentration was not manipulated. Relative humidity and temperature in the greenhouse were recorded during each measurement event and were maintained by the conditions previously described. Dry weight of new leaves, leaf abscission percentage, and leaf burned area percentage were evaluated on leaves after 20 days of salt treatment and 5 mid-stem leaves, roots, and stems were sampled for analysis. Plant organs were rinsed with deionized water and 10% (w/v) Tween 20 (Sigma-Aldrich Co., Germany) and dried in a forced draft oven at 65°C for 48 h until reaching constant DW. Dried samples were crushed separately in a hammer-mill and were stored at room temperature to determine iron concentration in different organs. Chloride (Cl^−^) was determined by silver ion titration using a Corning 926 chloridometer (Corning®) as described by Gilliam ([@B41]). Sodium (Na^+^) and potassium (K^+^) concentration were determined by inductively coupled plasma atomic emission spectroscopy (ICP-AOES iCAP 6000, Thermo Scientific). Samples (0.5 g) were pre-digested overnight with 2% HNO~3~ and 0.1% (w/v) Triton-X 100 (Sigma-Aldrich Co.) prior to processing on a digestion block at 120°C. The digestion tubes were then removed and cooled at room temperature. 2.0 mL of a 70% ultra-trace-metal-grade HClO~4~ was then added to the sample and heated at 220°C until white fumes were produced. Digest was diluted to a 25 mL with ultrapure water (Campbell and Plank, [@B16]) and filtered in n° 1 Whatman paper.
CTV tolerance evaluation
------------------------
Six plants of CC, CM, SMC-58, and SMC-73 were inoculated by bark grafting with CTV T388 strain (+CTV), which is a very aggressive strain to CM (Moreno et al., [@B78]; Ballester-Olmos et al., [@B6]). The inoculum was obtained from the IVIA citrus virus and virus-like collection. After 25 days, plants were pruned leaving 5 cm above the inoculum to induce a new shooting. Control treatment (Ct) was applied to 3 plants that were not inoculated with the virus. The plants were cultivated under the above-described greenhouse conditions for 12 months. Plant size and the weight of roots and aerial parts were registered, and CTV symptoms were evaluated in leaves and stem wood.
Statistical analysis
--------------------
Data were subjected to analysis of variance (ANOVA). Means were separated using Duncan\'s multiple range test at *P* \< 0.05 with the Statgraphics Plus, version 5.1 (Statistical Graphics, Englewood Cliffs) software.
Results {#s3}
=======
Genetic characterization
------------------------
Genetic analysis of the CM callus used for protoplast fusion did not show any differences when compared to the tree of the IVIA Citrus Germplasm Bank for the 34 SSR markers analyzed (Pensabene-Bellavia, [@B97]). Somatic hybrids SMC-58 and SMC-73 and their parents (CC and CM) were analyzed using 90 markers (82 from the nuclear genome and 8 from the cytoplasmic genome). Fifty-nine of the markers analyzed in nuclear genome were SNPs, whereas 23 were SSRs. All of them were distributed on the 9 LGs of the reference genetic citrus map (Ollitrault et al., [@B91]) with a coverage between 5 and 15 markers per LG. Thirty six of the fifty-nine SNPs analyzed were polymorphic between parents, whereas polymorphism was found in 20 of the 23 SSRs analyzed (Tables [1](#T1){ref-type="table"}--[4](#T4){ref-type="table"}).
The LG 1 was analyzed with 7 polymorphic markers, consisting of 5 SNPs and 2 SSRs (Table [5](#T5){ref-type="table"}). Somatic hybrids SMC-58 and SMC-73 displayed allelic configurations that correspond with the addition of both genome parents as seen with the JK-TAA15 SSR marker (Figure [1A](#F1){ref-type="fig"}) or the ACO-C601 SNP marker (Figure [1B](#F1){ref-type="fig"}). The LG 2 was analyzed using 5 SNP markers and 2 SSRs that were polymorphic between parents. The addition of the alleles from both parents was observed in the two somatic hybrids for all the analyzed markers, except for the JK-TAA41 SSR marker (Figure [2A](#F2){ref-type="fig"}) that showed the loss of the 142 nt allele from CC in both somatic hybrids. The LG 3 was analyzed using 6 SNPs and 1 SSR marker that were polymorphic between parents. Somatic hybrids combined all the alleles from each parent, except for Ci08A10 SSR marker (Figure [2B](#F2){ref-type="fig"}) that lost the 156 nt allele from CC in both somatic hybrids. The LG 4 was analyzed using 3 SNPs and 2 SSR markers (Table [6](#T6){ref-type="table"}) and both somatic hybrids combined all the parental alleles. Figure [3A](#F3){ref-type="fig"} shows results obtained for Ci07D06 SSR marker as an example. The LG 5 was analyzed using 3 SNPs and 1 SSR marker and results did not show allelic losses in these loci. The LG 6 was analyzed using 5 SNPs and 6 SSR markers. Somatic hybrids showed allelic losses in 5 of the 6 SSR markers analyzed (CiBE4818, CiBE0733, mCrCIR02B11, MEST123, and CiBE5866). The origin of lost alleles was CM, except for the locus CiBE0733 that lost the CC allele. Three of these losses were shared between the somatic hybrids, whereas 1 and 2 of them affected SMC-58 and SMC-73, respectively. Besides, on 3 of the 5 SNP markers (CiC4356-06, PSY-C461, and AocC593), the SMC-58 somatic hybrid lost the T allele from CM, whereas these differences were not observed in SMC-73 (Table [6](#T6){ref-type="table"}). Figures [3B and C](#F3){ref-type="fig"} are examples of the results obtained for the PSY-C461 and AocC593 SNP markers, displaying the T allele lost in the SMC-58 somatic hybrid. The LG 7 was analyzed with 3 SNPs and 2 SSR markers. The 239 nt allele from CM was lost on Ci07C07 SSR locus in both somatic hybrids. On the LG 8, 2 SNPs and 2 SSR markers were analyzed, whereas on the LG 9, 4 SNPs and 2 SSR markers were used. In both LGs, the hybrids displayed allelic configurations that correspond with the addition of both genome parents (Table [7](#T7){ref-type="table"}).
######
Genetic analysis using SNP and SSR nuclear markers located on LGs 1, 2, and 3 performed on SMC-58 and SMC-73 somatic hybrids that were obtained by protoplast fusion between *C. macrophylla* (CM) and Carrizo citrange (CC).
**Locus** **LG** **CC** **CM** **SMC-58** **SMC-73**
------------- -------- ----------------------------------------- -------- ------------ ------------ ----- ----- ----- ----- ----- ----- ----- -----
CiC2110-01 1 *[^*y*^](#TN5){ref-type="table-fn"}*C A A A C A A A C A A A
CiBE5720 *[^*z*^](#TN6){ref-type="table-fn"}*308 329 308 320 308 329 308 320 308 329 308 320
ACO-C601 G G A G G G A G G G A G
CiC0599-01 G A G G G A G G G A G G
TSC-C80 G G G T G G G T G G G T
JK-TAA15 143 165 168 143 165 168 143 165 168
PEPC-C328 A A A G A A A G A A A G
mCrCIR07D05 2 189 195 189 195 189 195
SOS1-M50 A G A A A G A A A G A A
CCC1-P727 C T C C C T C C C T C C
JK-TAA41 142 154 132 154 142 154 132 154 142 154 132 154
TRPA-M593 C G C C C G C C C G C C
PKF-M186 T T C T T T C T T T C T
INVA-M437 C T C C C T C C C T C C
MDH-M519 3 C T C C C T C C C T C C
NCED3-M535 G T T T G T T T G T T T
CiC5796-12 A A C C A A C C A A C C
ATMR-M728 T T G G T T G G T T G G
ATMR-C372 A A A G A A A G A A A G
Ci08A10 156 154 156 154 156 154
CHS-M183 C C G G C C G G C C G G
*SNP alleles: A, adenine; C, cytosine; T, thymine; G, guanine*.
*SSR allele: Numbers are the allele size in nucleotides. Lost alleles are marked in gray*.
{#F1}
{#F2}
######
Genetic analysis using SNP and SSR nuclear markers located on LGs 4, 5, and 6 performed on SMC-58 and SMC-73 somatic hybrids that were obtained by protoplast fusion between *C. macrophylla* (CM) and Carrizo citrange (CC).
**Locus** **LG** **CC** **CM** **SMC-58** **SMC-73**
------------- -------- ----------------------------------------- -------- ------------ ------------ ----- ----- ----- ----- ----- ----- ----- -----
CHI-M598 4 *[^*y*^](#TN7){ref-type="table-fn"}*C C G C C C G C C C G C
mCrCIR07D06 *[^*z*^](#TN8){ref-type="table-fn"}*162 188 167 172 162 188 167 172 162 188 167 172
CiC2840-01 T T C C T T C C T T C C
CiC3740-02 G C G G G C G G G C G G
mCrCIR03G05 213 219 199 213 219 199 213 219 199
CiC1380-05 5 T T C C T T C C T T C C
CiC5788-16 G A A A G A A A G A A A
mCrCIR06A12 92 103 86 92 103 86 92 103 86
DFR-M240 C G C C C G C C C G C C
CiC4356-06 6 C C C T C C C T C C C T
MEST132 231 244 244 231 244 244 231 244 244
CiBE4818 151 162 154 151 162 154 151 162 154
CiBE0733 240 245 235 240 245 235 240 245 235
mCrCIR02B11 232 232 248 232 232 248 232 232 248
PSY-M30 C G G G C G G G C G G G
PSY-C461 A A A T A A A T A A A T
CiC3056-02 G A A A G A A A G A A A
AocC593 C C C T C C C T C C C T
MEST123 239 246 250 239 246 250 239 246 250
CiBE5866 214 222 214 222 214 222
*SNP alleles: A, adenine; C, cytosine; T, thymine; G, guanine*.
*SSR allele: Numbers are the allele size in nucleotides. Lost alleles are marked in gray*.
{#F3}
######
Genetic analysis using SNP and SSR nuclear markers located on LGs 7, 8, and 9 and mitochondrial (mt) and chloroplastic (cp) markers performed on SMC-58 and SMC-73 somatic hybrids that were obtained by protoplast fusion between *C. macrophylla* (CM) and Carrizo citrange (CC).
**Locus** **LG** **CC** **CM** **SMC-58** **SMC-73**
------------- -------- ------------------------------------------ -------- ------------ ------------ ----- ----- ----- ----- ----- --- --- ---
mCrCIR07E05 7 *[^*z*^](#TN10){ref-type="table-fn"}*119 128 116 119 128 116 119 128 116
DXS-M618 *[^*y*^](#TN9){ref-type="table-fn"}*G G A A G G A A G G A A
DXS-C545 G G C G G G C G G G C G
FLS-P129 C T T T C T T T C T T T
Ci07C07 212 239 212 239 212 239
mCrCIR07B05 8 196 203 210 196 203 210 196 203 210
CiBE0214 312 309 312 309 312 309
CiC5164-02 C C T T C C T T C C T T
CiC1749-05 G T T T G T T T G T T T
mCrCIR07F11 9 160 162 164 160 162 164 160 162 164
CiC2518-02 T A T T T A T T T A T T
Ci08C05 153 153 156 153 153 156 153 153 156
LCYB-M480 T C T T T C T T T C T T
HYB-M62 A A C C A A C C A A C C
HYB-C433 G G A G G G A G G G A G
*nad*2/4-3 mt 261 251 251 251
CCMP2 cp 197 203 197 203 197
CCMP5 cp 93 95 93 95 93
CCMP6 cp 133 135 133 135 133
NTCP7 cp 182 188 182 188 182
*SNP alleles: A, adenine; C, cytosine; T, thymine; G, guanine*.
*SSR allele: numbers are the allele size in nucleotides. Lost SSR alleles and modified SNP alleles are marked in gray*.
In summary, somatic hybrids SMC-58 and SMC-73 combine the parental alleles from CC and CM in 45 of the 56 nuclear markers analyzed (80%). However, allelic losses were found in 11 of the loci analyzed. The origin of lost alleles was CM in 8 loci and CC in 3 loci. Most of the lost alleles, 8 of the 11, were located on the LG 6 (Table [6](#T6){ref-type="table"}) and 2 of them have a CC origin, whereas 6 come from CM. The rest of lost alleles were located on LGs 2, 3 (Table [5](#T5){ref-type="table"}), and 7 (Table [7](#T7){ref-type="table"}). On LGs 2 and 3, the origin of lost alleles was CC, whereas on LG 7, the origin of lost alleles was CM. We found alleles that are lost only in one or the other when comparing the genetic configuration of both somatic hybrids. Therefore, they are genetically different. SMC-58 lost 3 SNP alleles from CM (Figures [3B and C](#F3){ref-type="fig"}) that were identified in SMC-73 and SMC-73 lost 2 SSR alleles (mCrCIR02B11 and MEST 123 loci), one from CM and the other one from CC, although these alleles were present in the SMC-58 somatic hybrid. We investigated the parental origin of these 11 lost alleles. CM is a hybrid of *C. micrantha* W. and *C. medica* (Curk et al., [@B27]), two of the *Citrus* ancestral species. CC has *C. sinensis* and *P. trifoliata* in its pedigree and *C. sinensis* is a secondary species that originated from crosses between *C. maxima* and *C. reticulata* (García-Lor et al., [@B39]). In Ci08A10, Cibe4818, and Cibe5866 SSR markers, we cannot decipher the parental origin of the lost alleles because Ci08A10 is homozygous for CC and for the last 2 markers, the lost allele is shared between *C. micrantha* and citron. Regarding Ci07C07 SSR marker and CiC4356-06, PSY-C461 and AoC-C593 SNP markers, the lost allele comes from citron, whereas for mCrCIR02B11, JK-TAA41, and Cibe0733 SSR markers lost alleles come from *C. micrantha, P. trifoliata*, and *C. sinensis*, respectively. The later lost allele is shared between *C. maxima* and *C. reticulata* parental species of sweet orange.
The cytoplasmic genome was analyzed using 1 mitochondrial marker (*nad*2/4-3) and 4 chloroplastic markers (CCMP*2*, CCMP*5, CCMP6*, and NTCP*7*) (Table [8](#T8){ref-type="table"}) that were polymorphic between CC and CM. Both somatic hybrids had the 251 nt allele of the mitochondrial marker *nad*2/4-3 that belongs to the embryogenic parental CM. However, chloroplastic genome analysis showed that the origin of SMC-73 chloroplasts was CC for the 4 markers analyzed, whereas SMC-58 combined both CM and CC alleles for these markers (Table [7](#T7){ref-type="table"}). As an example, in Figure [4](#F4){ref-type="fig"}, we display the addition of both parental alleles in the SMC-58 somatic hybrid for the NTCP*7* SSR marker.
######
Plant morphology of 9-month-old plants of the somatic hybrids SMC-58 and SMC-73 obtained by protoplast fusion between Carrizo citrange (CC) and *C. macrophylla* (CM).
**Genotype** **Plant height (cm)** **Leaf number** **Internodal length (cm)** **Leaf greenness (SPAD)** **Leaf morphological index (l/w)**
-------------- ----------------------- ----------------- ---------------------------- --------------------------- ------------------------------------
CC 143.6a 41.9a 3.43a 73.82a 2.51a
CM 111.9b 36.8b 3.05b 60.93b 2.14b
SMC-58 59.1d 19.2d 3.08bc 72.78a 1.74c
SMC-73 81.5c 26.6c 3.14c 75.99a 1.79c
*Values are the mean of 12 plants (n = 12). Different letters within each column indicate significant differences for P ≤ 0.05 on multiple range Duncan\'s test*.
{#F4}
Plant morphology
----------------
Plant morphology was evaluated in 9-month-old plants of CC, CM, SMC-58, and SMC-73. Somatic hybrids had a slower growth than both the parents and were prone to lateral branching (Figures [5A--D](#F5){ref-type="fig"}). The height of both the somatic hybrids was shorter than CC or CM (Table [8](#T8){ref-type="table"}). Differences in growth were also found between the hybrids as SMC-58 grew 20% less than SMC-73. Internodal length was longer in CC than in CM, whereas SMC-58 was similar to CM, and SMC-73 had an intermediate length between parents. The leaf morphological index obtained from the length/width ratio of the main leaflet was lower in somatic hybrids than in both the parents and was similar between SMC-58 and SMC-73. This indicates that the morphology of the measured leaves is round shaped, which is a character that is typical of tetraploid citrus plants (Barrett and Hutchison, [@B8]). Leaf greenness of somatic hybrids was similar between them and resembled CC, whereas CM had 12% lower leaf greenness than these genotypes. Somatic hybrid plants, SMC-58 and SMC-73, have a spiral phyllotaxis pattern, where leaves and straight thorns of intermediate length (16--40 mm) appear together. These characteristics are similar to those of both the parents. The leaves, showing brevipetiolate attachment to the lamina, are odd-pinnate, and the number of leaflets within the same plant varies between one, as seen with CM, and three, as seen with CC (Figures [5C and D](#F5){ref-type="fig"}). The somatic hybrid SMC-58 shows mainly one or two leaflets per leaf and trifoliate leaves are also present. The somatic hybrid SMC-73 shows mainly trifoliate leaves, even though simple and bifoliate leaves also appear. The leaf size is small (10--20 cm^2^) and heterogeneous. The petiole is shorter than the lamina and has narrow obdeltate wings with articulate junction to the lamina. The main leaflet has a length/width ratio between 1.5 and 1.8 and shape varies from elliptic, like in CC, to obovate, as in CM. The leaf margins are crenate, and the apex is obtuse in both somatic hybrids.
{#F5}
Tolerance to iron deficiency
----------------------------
Leaf greenness decreased in all the genotypes under the chlorosis-inducing treatment (Ch). Carrizo citrange had a greater greenness decline than CM and the somatic hybrids showed intermediate values between parents (Table [9](#T9){ref-type="table"}). In terms of growth, the shoot developed under the Ch treatment in somatic hybrids had similar leaf biomass than in CM, whereas these values were higher than in CC. In control conditions, SMC-73 had similar growth to that of CC and SMC-58 grew less than both parents. Iron concentration in the leaves developed under the Ch treatment was higher in CM than in CC and somatic hybrids had intermediate concentrations between them (Table [9](#T9){ref-type="table"}).
######
Leaf greenness (f:i), increase in shoot biomass (DW g) and iron concentration in shoot leaves (DW ppm) of Carrizo citrange (CC), *C. macrophylla* (CM) and the somatic hybrids SMC-58 and SMC-73 cultivated in greenhouse conditions for 10 weeks, either in control conditions (20 μM Fe-EDDHA) or in iron-deficient conditions (10% (v/v) CaCO~3~ 10 mM NaHCO~3~, 2 μM Fe-EDDHA).
**Treatment** **Genotype** **Leaf greenness (f/i)[^X^](#TN11){ref-type="table-fn"}** **Increase in shoot biomass (DW g)** **Iron concentration (ppm)**
---------------- -------------- ----------------------------------------------------------- -------------------------------------- ------------------------------
Control CC 0.84 a 1.36 b 48.3 a
CM 1.11 b 1.76 c 46.7 a
SMC-58 1.02 b 0.89 a 38.7 a
SMC-73 0.89 ab 1.21 b 43.5 a
Iron-deficient CC 0.30 a 0.42 a 16.5 a
CM 0.70 c 0.56 b 33.1 b
SMC-58 0.56 b 0.52 b 23.9 ab
SMC-73 0.52 b 0.61 b 21.7 ab
*SPAD final/initial, values below 1 indicate greenness decrease. Values are the mean of six plants (n = 6). Different letters in each column indicate significant differences for P ≤ 0.05 on multiple range Duncan\'s test*.
Tolerance to salinity
---------------------
The differences in behavior between somatic hybrids and their parents under salinity (+S) were evaluated according to the growth rates, leaf symptoms, ion accumulation, and gas exchange parameters. Carrizo citrange plants subjected to salinity had 25% lower DW than control plants at the end of the experimental period (Figure [6A](#F6){ref-type="fig"}), indicating their sensitive behavior. In contrast, CM, that is salt-tolerant, showed similar growth in both, +S or Ct treatments. The SMC-73 hybrid had similar behavior to CM regarding growth, given that +S treatment did not affect this parameter. SMC-58 had 16% lower DW under the +S treatment than in Ct conditions, although this growth reduction was lower than in the sensitive CC. Leaf symptoms induced by salt toxicity were intense in CC plants that had 20% of their leaf area burned. Meanwhile, leaves of the tolerant CM were free of burns (Figure [6B](#F6){ref-type="fig"}) and somatic hybrids showed very mild leaf toxicity symptoms with only 2% (Figure [6C](#F6){ref-type="fig"}) of their leaf area affected by burns (Figure [6B](#F6){ref-type="fig"}). Leaf abscission was lower in SMC-73 or SMC-58 than in CC with 6, 3, and 7% of leaves affected, respectively. Nevertheless, the tolerant CM did not suffer this symptom.
{#F6}
Overall, Cl^−^ and Na^+^ molar concentrations in leaf tissue water were higher in the saline treatment (+S) than in the Ct treatment for all the genotypes (Table [10](#T10){ref-type="table"}). The parent CM, which is tolerant to salinity, had the lower Cl^−^ and Na^+^ concentrations under the +S treatment, and were 2.2 and 1.4-fold, respectively, higher than in control plants. Carrizo citrange, which is considered salt-sensitive, raised Cl^−^ and Na^+^ leaf concentrations that were 4.1 and 2.6-fold higher in +S treatment than in Ct treatment, respectively. Somatic hybrid SMC-58 subjected to +S treatment had lower Cl^−^ concentration and similar Na^+^ concentration than CC. Specifically, Cl^−^ and Na^+^ leaf concentration in SMC-58 were 4.2 and 1.8-fold, respectively, higher in +S than in Ct plants. The SMC-73 plants subjected to +S treatment had leaf Cl^−^ concentrations similar to CC, whereas leaf Na^+^ concentration was higher than in CC plants. More precisely, leaf Cl^−^ and Na^+^ concentrations in SMC-73 increased by 3.9 and 2.3-fold, respectively, in salt-treated plants when compared to Ct plants. Therefore, the data show that both somatic hybrids had lower Cl^−^ exclusion capacity than the salt-tolerant parent CM. However, SMC-58 had greater exclusion capacity than the salt-sensitive parent CC, whereas SMC-73 had similar exclusion capacity to CC. Regarding Na^+^ exclusion, the behavior observed in SMC-58 was similar to CC, whereas SMC-73 plants accumulated less Na^+^ in their leaves, showing more tolerance than the sensitive parent CC. The concentration of K^+^ in plants subjected to salinity was not different from Ct plants in the tolerant CM. Leaf concentration of K^+^ decreased by 21%, 20%, and 33%, respectively, in CC, SMC-58, and SMC-73. Salt-treated CM plants did not differ from Ct plants in their *A*~CO2~ and *E* rates (Table [11](#T11){ref-type="table"}). The salt-sensitive parent CC had reduced *A*~CO2~ rates by 39% and *E* rates by 18% when compared to Ct plants. Somatic hybrids SMC-58 and SMC-73 subjected to salinity reduced *E* rates by 33% and 43%, respectively, when compared to Ct plants. Similarly, these salt-treated plants reduced *A*~CO2~ by 32% and 53%, respectively. The data show that gas exchange parameters were more affected by salinity in SMC-73 than in SMC-58. Therefore, the former genotype was similar to CC, whereas the latter had a behavior more similar to CM. In summary, results show that somatic hybrids have an intermediate behavior between the tolerant rootstock CM and the sensitive CC. However, the differences found between SMC-58 and SMC-73 indicate that SMC-58 is better adapted to salinity than SMC-73 because the response was globally more similar to the tolerant parent CM.
######
Leaf Cl^−^, Na^+^ and K^+^ concentration (mM in tissue water) in Carrizo citrange (CC), *C. macrophylla* (CM) and SMC-58 and SMC-73 somatic hybrids.
**Treatment** **Ion** **CC** **CM** **SMC-58** **SMC-73**
--------------- --------- -------- -------- ------------ ------------
Control Cl^−^ 56.3a 36.5a 43.5a 53.4a
Na^+^ 140.0b 85.7a 217.9c 202.0c
K^+^ 571.1a 607.0b 556.2a 609.0b
Saline Cl^−^ 233.2c 80.9a 183.0b 205.4c
Na^+^ 367.8b 117.5a 393.7b 466.0c
K^+^ 462.0a 621.2b 446.0a 468.4a
*Values are the mean of 3 plants (n = 3). Different letters in each line indicate significant differences for P ≤ 0.05 at Duncan\'s multiple range test. Plants were cultivated in a greenhouse for 20 days, either in saline (40 mM NaCl) or control conditions*.
######
Transpiration (*E*, mmol H~2~O·m^−2^·s^−1^) and net assimilation (*A*~CO2~, μmol CO~2~·m^−2^·s^−1^) rates in Carrizo citrange (CC), *C. macrophylla* (CM) and SMC-58 and SMC-73 somatic hybrids.
**Treatment** **Parameter** **CC** **CM** **SMC-58** **SMC-73**
--------------- --------------- -------- -------- ------------ ------------
Control *E* 0.76 c 1.37 a 1.32 a 1.16 b
*A*~CO2~ 6.23 b 9.99 a 9.21 a 8.74 a
Saline *E* 0.62 c 1.32 a 0.89 b 0.66 c
*A*~CO2~ 3.82 c 10.1 a 6.23 b 4.14 c
*Values are the mean of six plants (n = 6). Different letters in each line indicate significant differences for P ≤ 0.05 at Duncan\'s multiple range test. Plants were cultivated in a greenhouse for 20 days, either in saline (40 mM NaCl) or control conditions*.
Tolerance to CTV
----------------
Plants inoculated with T388 CTV strain were evaluated for growth and symptoms. CM showed reduced growth as evident by the shorter height of the plants (Figure [7A](#F7){ref-type="fig"}) and the lower aerial and root biomass (Figures [7B and C](#F7){ref-type="fig"}). Overall, plant biomass decreased by 35% (Figure [7D](#F7){ref-type="fig"}) in CM. These plants also showed yellow leaves with vein corking (Figure [8A](#F8){ref-type="fig"}) and stem pitting (Figure [8B](#F8){ref-type="fig"}). Meanwhile, CC plants and the somatic hybrids SMC-58 and SMC-73 were not different from control plants in their growth (Figure [7D](#F7){ref-type="fig"}), and neither showed the disease symptoms (Figures [8C--H](#F8){ref-type="fig"}).
{#F7}
{#F8}
Discussion {#s4}
==========
Genetic characterization of the somatic hybrids
-----------------------------------------------
Two allotetraploid somatic hybrids were previously obtained from protoplasts isolated from callus of CM and from leaves of CC (Pensabene-Bellavia et al., [@B98]). These somatic hybrids, their parents, and the embryogenic callus of CM were analyzed to verify their origin and genetic structure of the hybrids. Fifty-six nuclear molecular markers distributed uniformly on the 9 LGs of the clementine genetic map (Ollitrault et al., [@B91]) and 5 cytoplasmic markers that were polymorphic between the parents were used for the analysis. Nuclear molecular markers confirmed that (i) the embryogenic callus of CM did not show differences compared to leaves of CM for all these markers and (ii) the somatic hybrids added the parental genomes although some parental alleles were lost. Specifically, 11 lost alleles have been identified on different LGs (2, 3, 6, and 7) although most of them are located on LG 6 (8 of the 11 alleles). Differences in 5 markers have also been found between the somatic hybrids. Most of the lost alleles observed in the somatic hybrids have their origin in the embryogenic parent CM (7 of them) even though 4 of them correspond to the leaf parent CC. For some markers, it has been possible to identify the parental origin of the lost allele. Most of the lost alleles come from *C. medica*, whereas others come from *C. micrantha, C. sinensis*, and *P. trifoliata*. These results suggest that the loss of parental alleles occurred during the somatic hybridization process and the differences observed between hybrids seem to be limited to sub-chromosomal level because the flow cytometry analysis did not show differences in the number of chromosomes (2n = 4x = 36) between somatic hybrids or when compared to the tetraploid control. Furthermore, genetic analysis has been performed using leaf samples of the somatic hybrids taken from different branches and the same differences between somatic hybrids and parents were found. However, no differences were identified between analyses of different DNA preparations, discarding the presence of chimeras. Most of the absent alleles that have been identified are located on the same LG and consist of deleted fragments (SSR allele absence) and punctual variations in a small number of nucleotides (non-observed SNP alleles). This indicates that there is chromosome instability in this complex intergeneric combination given that the genomes of the four citrus ancestral species and related genera are present in the somatic hybrids. Previous studies performed in citrus (Xu et al., [@B124]) and other species (Sundberg and Grimelius, [@B112]; Sun et al., [@B111]; Smyda-Dajmund et al., [@B108]) state that chromosome losses, genomic deletions, and epigenetic alterations are more frequent in somatic hybrids between parents that have a distant genetic relationship than in those from closely related parents. In SMC-58 and SMC-73, most lost alleles do not come from the species that are genetically more distant, *C. micrantha* and *P. trifoliata*. This finding suggests that there is no bias against the most dissimilar genomes when somatic hybridization is performed. Therefore, the identified losses might be either random or caused by some other effect. It has also been reported that genomic losses in citrus somatic hybrids are parent-biased toward the callus parent (Xu et al., [@B124]), which might explain that most of the alleles lost in SMC-58 and SMC-73 come from CM. Overall, the wide diversity of the genomes combined in SMC-58 and SMC-73 and the different origin of the parental protoplasts used to perform the fusions might explain the uneven genomic losses that we observed. Nevertheless, further studies would be required to verify these hypotheses.
Differences between SMC-58 and SMC-73 have also been found in the cytoplasmic genome. Both hybrids have the CM mitochondrial genome. However, SMC-73 has the CC chloroplastic genome, whereas chloroplastic genome recombination was detected in SMC-58. Citrus somatic hybrids predominantly inherit the mitochondrial genome from the embryogenic parent (Kobayashi et al., [@B66]; Saito et al., [@B104]; Yamamoto and Kobayashi, [@B125]; Moriguchi et al., [@B79]; Moreira et al., [@B76]; Cabasson et al., [@B13]; Ollitrault et al., [@B87]; Guo et al., [@B55]; Xiao et al., [@B123]) even though there are some reports of mitochondrial recombination events (Vardi et al., [@B116]; Moriguchi et al., [@B79]; Cheng et al., [@B21]; Dambier et al., [@B28]). Recently, Cai et al. ([@B14]) have demonstrated that mitochondrial genome of protoplasts isolated from embryogenic callus is essential for plant regeneration after protoplast fusion experiments. However, chloroplastic genome is randomly inherited from one of the parents or shows recombination (Grosser et al., [@B51]; Dambier et al., [@B28]; Aleza et al., [@B4]). It has also been proven that mitochondrial and chloroplastic genomes are involved in differences in aroma and organoleptic fruit properties (Fanciullino et al., [@B32]; Satpute et al., [@B106]), disease resistance (Tusa et al., [@B115]; Omar et al., [@B94]), floral developmental disturbances, and male sterility (Guo et al., [@B54]; Zheng et al., [@B126]). Nevertheless, there is no information available about how these new combinations and rearrangements occurring on the cytoplasmic genome affect the agronomical behavior of citrus rootstocks. Most publications on citrus somatic hybridization report the symmetric addition of nuclear parental genomes (Ollitrault et al., [@B89]) although subchromosomal variations have been detected in citrus somatic hybrids (Olivares-Fuster, [@B84]; Froelicher, [@B36]; Guo et al., [@B56]; Xu et al., [@B124]). However, studies describing them are scarce. Different hypotheses have been suggested for these kind of changes such as extended periods of *in vitro* culture (Oberwalder et al., [@B83]; Guo and Deng, [@B53]), genetic divergence between parents, and increased ploidy level (Sundberg and Grimelius, [@B112]; Miranda et al., [@B75]). Genetic analysis of somatic hybrids has been usually performed with a small number of molecular markers, enough to confirm their hybrid origin but not sufficient to identify these variations (Oberwalder et al., [@B83]; Guo and Deng, [@B53]). In potato (*Solanum* spp) somatic hybrids, similar variations have also been recently described using DArT markers (Diversity Array Technology) (Smyda-Dajmund et al., [@B108]). More than 5,000 markers distributed across the potato genome were analyzed in the somatic hybrids and 2,000 were found to be polymorphic between parents. Among them, between 13.9% and 29.6% of alleles were found to be lost in the somatic hybrids. The identification of genomic changes in somatic hybrids justifies the need for performing a detailed genetic analysis of the plants obtained by somatic hybridization to gather information on their genetic structure. This information is key to optimize and interpret the data on physiological behavior of the somatic hybrids to use them as rootstocks.
Performance of SMC-58 and SMC-73 somatic hybrids as potential citrus rootstocks
-------------------------------------------------------------------------------
Several rootstock breeding programs based on somatic hybridization are currently being carried out across the world. In Florida, a large number of somatic hybrids have been obtained, which stand out for their good adaptation to the local soil, inducing good fruit quality, and high yields (Grosser et al., [@B44]). Breeding programs focused on somatic hybridization have also been carried out in the Mediterranean basin (Dambier et al., [@B28]), as well as in China (Guo et al., [@B55], [@B56]), Brazil (Mendes-da-Gloria et al., [@B74]; Mourao et al., [@B80]), and Mexico (Medina-Urrutia et al., [@B73]). These data reveal that somatic hybridization is an efficient approach to produce new citrus rootstock candidates. The morphology of somatic hybrids SMC-58 and SMC-73 shows some intermediate characters between the parents. This type of inheritance has also been described in somatic hybrids between *Citrus* and related genera such as *Citropsis, Severinia*, and *Microcitrus* (Smith et al., [@B107]) and also between different *Citrus* species (Olivares-Fuster, [@B84]). The growth of somatic hybrids when compared with their parents is slower as it has also been described in several citrus allotetraploid somatic hybrids (Grosser et al, [@B50]; Grosser et al., [@B52]). This character is related to the increase in ploidy level (Lee, [@B69], [@B70]). Citrus tetraploid hybrids have been used to increase the tree density in orchards to maximize the management efficiency. Furthermore, tetraploid rootstocks do not reduce the yield efficiency of the scion (Ruiz et al., [@B101]) and produce fruits with excellent organoleptic qualities (Grosser et al., [@B44]). Therefore, the profitability of citrus plantations can be increased using tetraploid citrus rootstocks (Grosser et al., [@B49], [@B44]; Grosser and Chandler, [@B45]).
We have evaluated the tolerance/susceptibility of CM + CC somatic hybrids to the severe T388 CTV strain. This strain causes different symptoms in susceptible citrus genotypes. The symptoms include seedling yellows, vein corking, or stem pitting when used either as varieties or rootstocks and the quick-decline of trees grafted onto SO (Moreno et al., [@B77]; Lee and Keremane, [@B71]). CM was found very sensitive to T388, whereas CC and the two CM + CC somatic hybrids were found to be tolerant. In Spain and in other Mediterranean countries, severe strains of CTV have been identified even though the incidence is low (Moreno et al., [@B77]). However, *Toxoptera citricida* (Kirkaldy), which is a very efficient vector of severe CTV strains, is already present in northern Portugal and north western Spain. The probable introduction of this aphid into the citrus producing areas would predictably cause a dispersion of severe CTV strains that would affect the trees grafted onto CM (Ilharco et al., [@B62]). Therefore, it is very important to have alternatives to this rootstock that can be used in alkaline and saline soils, where CC is not a good choice. In other studies, the quick decline was evaluated in somatic hybrids obtained from SO and several tolerant species, but global conclusions could not be reached. While somatic hybrids between SO and Rangpur lime (*C. limonia* Osb.) or Rough lemon (*C. jambhiri* Lush) were tolerant, hybrids obtained from SO and trifoliate orange (*P. trifoliata*) or Cleopatra mandarin were susceptible to this disease (Grosser et al., [@B46]). The inheritance of some traits such as CTV tolerance in the somatic hybrids is clearly coupled with the dominance or codominance of the trait in relation to the parental combinations (Bassene et al., [@B9]; Gmitter et al., [@B42]).
The performance of the somatic hybrids in the presence of soil carbonates, which are abundant in the Mediterranean citrus producing areas, is similar to the tolerant CM and much better than CC. The CM + CC hybrids are also more tolerant to salinity than CC. Enhanced tolerance to these stresses as well as to drought and boron excess has also been described in citrus rootstocks with increased ploidy (Saleh et al., [@B105]; Grosser et al., [@B52]; Allario et al., [@B5]; Tan et al., [@B113]; Ruiz et al., [@B101],[@B102],[@B103]). These somatic hybrids have already started to yield fruits even though fruits are still sporadic and scarce. A large number of apomictic seeds per fruit were found. This characteristic is very important for citrus rootstocks as their clonal propagation and cultivation in nurseries are made easy. Field experiments have already been initiated in collaboration with Agromillora Research S.L. and will allow, within a few years, to confirm the data obtained in the greenhouse experiments and to collect additional information about fruit quality and yield induced by the grafted variety. All this information will be analyzed to determine if any of the studied somatic hybrids can be used commercially, which would be a great advantage for the Mediterranean citriculture.
The importance of performing in-depth molecular and physiological characterization of somatic hybrids
-----------------------------------------------------------------------------------------------------
The main goal of citrus rootstock improvement based on somatic hybridization by protoplast fusion is to recover allotetraploid somatic hybrids between parents displaying complementary characteristics as seen in our study. Previous studies on somatic hybridization variability carried out in the past decades reveal that characters expressed by the hybrids can be non-additive. The hybrid phenotype can differ from the addition of parental effects given that allopolyploidization triggers gene expression changes and modifies epigenetics altering the phenotype (Bassene et al., [@B9], [@B10]; Dambier et al., [@B28]; Xu et al., [@B124]). Some studies discuss to what extent these changes are caused by *de novo* interactions established between genomes coming from different species (Hegarty et al., [@B58]) or to the ploidy gain (Dambier et al., [@B28]; Tan et al., [@B114]). Allopolyploidization, generated either by sexual or somatic hybridization, involves the coexistence of parental genomes in a single nucleus. Additionally, in the case of allotetraploid somatic hybrids, changes also take place in cytoplasmic genome composition. The new genomic configuration is associated with diverse reorganizations and modifications affecting the structure and regulation of the new somatic hybrid genome (Comai et al., [@B23]; Ozkan et al., [@B96]; Wang et al., [@B120]; Soltis and Soltis, [@B109]; Flagel and Wendel, [@B35]). This event, coined as genomic *shock* (Song et al., [@B110]), has a dynamic and stochastic nature and is composed of diverse processes such as fragment elimination or exchange at sub-chromosomic or chromosomic level, modifications in the methylation pattern, gene repression/expression changes, and activation of transposable elements (Chen, [@B18]; Xu et al., [@B124]) among others. These changes modify the gene expression either by altering the sequence or by epigenetic regulation (Comai, [@B22]). In addition, these changes may confer genome plasticity to improve the adaptation of the hybrids to the environment (Chen, [@B18]). The neoregulation of parental genomes in allopolyploid plants would greatly explain the obtention of genotypes and phenotypes that were absent in the diploid pool (Osborn et al., [@B95]) and the non-additive inheritance (He et al., [@B57]; Albertin et al., [@B1]; Hegarty et al., [@B59]; Wang et al., [@B120],[@B119]; Chen, [@B18], [@B19]; Flagel et al., [@B34]; Flagel and Wendel, [@B35]). The study of genome expression in neopolyploids has recently gained importance, as it has been proposed as a useful approach to understand how genomes work and evolve (Gmitter et al., [@B42]; Gianinetti, [@B40]).
Somatic hybridization is more efficient than sexual hybridization as a method for citrus breeding when parents display a complex reproductive biology such as apomixis and high heterozygosity, as in the case of most of the rootstocks used. Nevertheless, it is still necessary to regenerate an adequate number of plants from each fusion to perform further screenings that verify their characteristics and agronomic behavior. This is essential to properly assess their usefulness in breeding programs, yet, the molecular basis of the traits that shape the rootstock agronomical behavior is still unknown. The new genetic (Ollitrault et al., [@B91]) and genomic (Wu et al., [@B122]) tools available nowadays along with the affordable sequencing technologies are paving the way for the availability of numerous molecular markers and genetic information. This knowledge will contribute to the understanding of the molecular processes behind these traits and shorten the time required to perform additional evaluations. It is also essential to have rapid screening methods for early evaluations in greenhouse conditions. This will maximize the efficiency of breeding programs in terms of time, resources, and labor costs. Only those traits that are strictly necessary should be considered for long-term field evaluations.
Conclusion {#s5}
==========
Somatic hybrids SMC-58 and SMC-73 are promising citrus rootstocks for areas with the presence of CTV and calcareous and saline soils. They have punctual sub-chromosomic losses and show differences in morphology and physiological behavior, both between them and when compared with their parents. This is an evidence of genomic alterations that affect each hybridization event individually and are somehow independent from parental combinations. These identified genetic variations, along with the possible neoregulation events, the new cytoplasmic combinations, and the ploidy gain, might be the underlying phenotypic differences found between the hybrids and the phenotypic deviation from parental additive inheritance. Further investigation on somatic hybrids can add great value to citrus breeding programs as it can reveal information crucial to understand the principles operating in citrus genome expression, regulation, and evolution.
Author contributions {#s6}
====================
LN, EP-M, PO, and RM conceived the study and were in charge of the direction and planning. MR, AQ, GP-B, EP-M, LN, and RM contributed in the experiment design. MR, AQ, GP-B, and AG-L performed the experiments. MR, AG-L, and PA analyzed the data. MR and PA took the lead in interpreting the results and writing the manuscript with input and review from LN, EP-M, and PO.
Conflict of interest statement
------------------------------
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
This work was financed by the Spanish MINECO Ministry, Project AGL2011-26490 and by agreement between IVIA and Agromillora Research S.L. MR was supported by grant co-funded by the Centre de Coopération International en Recherche Agronomique pour le Développement (CIRAD) and the Valencian Institute for Agricultural Research (IVIA), DOCV \[2010/8910\]. We are very grateful to Dr. Mireia Bordas from Agromillora Research that made the micropropagation of the rootstocks, Dr. José Guerri, and Dr. Karelia Velázquez for their help in the CTV analysis, the technical assistants Frederique Ollitrault, Mª Carmen Prieto, Enric Alcaide, Carmen Casamayor, Teresa García, Carmen Ortega, and Antonio Navarro, and the greenhouse technical team headed by José Antonio Pina, Rafa Montalt, and Diego Conchilla for their kind support. We would also like to thank Yoko Hiraoka for her useful editing suggestions.
[^1]: Edited by: Jaime Prohens, Universitat Politècnica de València, Spain
[^2]: Reviewed by: Sergio J. Ochatt, INRA UMR1347 Agroécologie, France; Wen-Wu Guo, Huazhong Agricultural University, China
[^3]: This article was submitted to Plant Breeding, a section of the journal Frontiers in Plant Science
|
{
"pile_set_name": "OpenWebText2"
} | Ilskan efter SFM-föreläsaren: ”Han kränker kvinnor”
Av: Olof Svensson
Publicerad: 29 mars 2017 kl. 14.09
Uppdaterad: 30 mars 2017 kl. 10.40
SFM:s föreläsare hävdar att unga tjejer hamnar i helvetet om de inte täcker sig.
– Jag blev chockad när jag läste det här. Han kränker alla kvinnor, säger muslimen Helena Atilaian, 39.
Hon kräver nu en hårdare granskning av religiösa organisationer som får statsbidrag.
1 av 2 | Foto: Privat Helena Atilaian, arbetar med kvinnor som utsätts för hedersförtryck
Flera muslimer som Aftonbladet pratat med reagerar kraftigt på hur Sveriges förenade muslimers, SFM:s, föreläsare uttrycker sig.
En av dem är Helena Atilaian, 39, från Sala som arbetar på ett skyddat boende för kvinnor. Hon möter ofta kvinnor som behandlats illa av sina män och som tvingats fly från släktingar på grund av hedersförtryck.
– Det den här imamen säger är inte islam, det är att utöva makt över kvinnor. Och ingen reagerar, ingen säger ifrån, ingen vågar göra något, säger hon.
Helena Atilaian föddes i Afghanistan, flyttade till Iran och kom till Sverige 2011. Att den här formen av kvinnoförtryck, som hon själv flydde från, nu finns i Sverige, tycker hon är mycket allvarligt.
– Det står ingenstans i Koranen att 12-åringar ska vara täckta. Han hittar bara på. Den här imamen kränker alla kvinnor och det gör mig jättearg.
Inspirerar unga killar
Helena Atilaian har själv en dotter, som nu är vuxen, och reagerar kraftigt på att någon vill bestämma hur hon ska se ut.
– Hon tar på sig vilka kläder hon vill. Jag kan inte styra hennes liv och jag vill inte att någon annan gör det heller.
Hon reagerar också på SFM:s föreläsares jämförelse med kvinnor och choklad, och menar att andemeningen är att kvinnor som inte täcker sig är orena och smutsiga. Hon fruktar också att unga killar inspireras av det som imamen säger och för kvinnoförtrycket vidare.
– Det är unga killar, i 16,17,18-årsåldern som hör vad imamen säger. De kanske tänker ”han kanske har rätt, jag ska inte låta min syrra få kille” eller ”min syrra måste täcka sig”. Det är det som är det stora problemet.
Helena Atilaian kräver nu att staten blir bättre på att granska religiösa organisationer innan de får bidrag.
– Det här måste stoppas. Vi har haft ett helvete i vårt land, vi hade inga egna liv, vi kunde inte bestämma själva. Vi vill inte uppleva det här också.
Salafistisk inriktning
En annan som reagerar på SFM:s föreläsare är Samir Muric, imam vid Arlövs moské. Han anser att föreläsaren kommer med svepande generaliseringar.
– Slöjan, liksom alla andra handlingar, är något man gör för gud och varje persons utövande av dennes tro är upp till personen själv. Det är ingen imams eller föreläsares uppgift att döma vem som hamnar i helvetet eller ej.
Vad anser du om att staten ger bidrag till en sådan här organisation?
– Det är inte första gången något kontroversiellt dyker upp från den här organisationen. De uttrycker sig på ett sätt som jag och många andra muslimer inte håller med om. De kallar sig Sveriges förenade muslimer men representerar en salafistisk inrikting. Det är ett problem att de här människorna talar i en halv miljon människors namn.
KOPIERA LÄNK
Publicerad: 29 mars 2017 kl. 14.09 |
{
"pile_set_name": "Pile-CC"
} | Despite strong evangelical push, Cruz fails to win a single South Carolina county
Ted Cruz's strategy to win the South Carolina Republican primary by appealing to evangelical voters failed Saturday when the Texas senator finished in third place, trailing just behind Sen. Marco Rubio, R-Fla., and failing to win a single county.
Republican voters instead overwhelmingly went for billionaire businessman Donald Trump, and handed the casino tycoon a decisive victory that saw him winning 44 of the Palmetto State's 46 counties.
Rubio, for his part, carried two counties.
Cruz not only failed to win a single county, but he also lost the evangelical vote to Trump. This comes despite an intense push this month by the Texas senator's campaign surrogates to appeal to the largest religious denomination in South Carolina.
"The strength of this nation will not be this Constitution, but the laws of God that the Constitution is based on. You get rid of God, you get him out and keep him from being your anchor — when you start allowing men to determine what is right, what is wrong, what is good, what is evil," he added. "You let men do it and they do not vet it with through this book. Our Founding Fathers warned us over and over again, what you will end up doing is saying, 'Well, now I know it sounds like a violation of commandment number six, which says do not murder, but we're just going to go ahead and tell these ladies — ladies in America — they can kill their children." |
{
"pile_set_name": "FreeLaw"
} | Filed 4/11/16; pub. order 5/3/16 (see end of opn.)
COURT OF APPEAL, FOURTH APPELLATE DISTRICT
DIVISION ONE
STATE OF CALIFORNIA
In re D.O., a Person Coming Under the
Juvenile Court Law.
D069105
SAN DIEGO COUNTY HEALTH AND
HUMAN SERVICES AGENCY,
(Super. Ct. No. SJ11191D)
Plaintiff and Respondent,
v.
JESSICA A.,
Defendant and Appellant,
SCOTT O.,
Defendant and Respondent,
JE.O., et al.,
Objectors and Appellants.
APPEAL from an order of the Superior Court of San Diego County, Sharon
Kalemkiarian, Judge. Affirmed.
William Hook, under appointment by the Court of Appeal, for Defendant and
Appellant Jessica A.
Michele Anne Cella, under appointment by the Court of Appeal, for Appellants,
minors Je.O., Y.O., and Jo.O.
Thomas E. Montgomery, County Counsel, John E. Philips, Chief Deputy County
Counsel, and Kristen Ojeil, Deputy County Counsel, for Plaintiff and Respondent.
Linda Rehm, under appointment by the Court of Appeal, for Respondent Scott O.
Jessica O. (mother) and Scott O. (father) are the parents of D.O., who was one
year old when this case began. The mother has three older children (Je.O., Y.O, and
Jo.O., who were 11, 10, and nine years old, respectively, when this case began; together,
the Siblings) by another father. The juvenile court terminated parental rights as to D.O.
and ordered adoption as her permanent plan. On appeal, the mother and the Siblings
(together, appellants) contend the juvenile court erred by finding the sibling relationship
exception to adoption does not apply.1 (Welf. & Inst. Code, § 366.26, subd.
(c)(1)(B)(v).)2 Specifically, they contend the trial court erred when determining whether
there would be substantial interference with D.O.'s sibling relationships by improperly
considering the caregivers' assurances that sibling visits would continue, instead of by
considering the factors specifically enumerated in the statute. We find no error and
affirm.
1 The Siblings do not challenge the juvenile court's handling of their own
dependency cases.
2 All further statutory references are to the Welfare and Institutions Code.
2
FACTUAL AND PROCEDURAL BACKGROUND
On July 31, 2014, the San Diego County Health and Human Services Agency
(Agency) filed a petition under section 300, subdivision (b), after D.O.'s mentally ill
father committed several acts of domestic violence and the mother failed to take
protective action or otherwise cooperate with the Agency. The juvenile court issued a
protective custody warrant for D.O. and the Siblings.
After the Agency filed the petitions, the mother absconded with D.O. and Y.O. As
of the August 1, 2014 detention hearing, their whereabouts were unknown, and neither
parent attended the hearing. The court made a prima facie finding on the petition and
ordered D.O. detained out of the parents' custody.
One week later, police located D.O. with the father in a grocery store parking lot
when the mother was caught shoplifting. D.O. and Y.O. were detained together in one
foster home; their brothers were detained together in another.
In its August 26, 2014 jurisdiction report, the Agency stated the mother's
whereabouts were unknown. The father's had also been, until he was arrested about one
week earlier. The mother had not visited her children since their removal, and the father
was restrained by the court from doing so.
The juvenile court made true findings on the Agency's petitions, declared the
children dependents of the court, and ordered them removed from parental custody. The
court further ordered that "sibling visitation shall occur." The court set a six-month
review hearing, but deferred addressing reunification services for the mother until she
made herself available to the Agency.
3
In its February 2015 six-month status review report, the Agency updated the court
on the children's placements. D.O. was moved from foster care to her paternal
grandmother's home on September 17, 2014. One month later, Y.O. was moved from her
initial foster home to her brothers' foster home. Neither of the parents visited D.O. or
made themselves available to the Agency during the six-month review period. The
Agency recommended the court set a section 366.26 hearing to determine D.O.'s
permanent plan. After the juvenile court found there was not a substantial probability
D.O. would be returned to her parents' custody within six months, the court terminated
their reunification services and set a section 366.26 hearing as to D.O. for July 8, 2015.
The Siblings' father continued to receive reunification services, and their dependency
case proceeded on a separate track. The court ordered that sibling visits continue.
The Agency's section 366.26 report recommended the juvenile court terminate
parental rights and select adoption as D.O.'s permanent plan. Neither parent had visited
D.O. "due to their limited contact with the Agency." The report stated D.O. was
adoptable and advised that the paternal grandmother was committed to adopting her.
D.O. and the Siblings were visiting each other twice per month. The Agency stated, "The
caregiver[s] of [D.O.] and the [Siblings] are committed to maintaining the sibling
interaction and visitation. Therefore, the sibling exception does not apply."
Meanwhile, the paternal grandmother reported to the Agency that she heard from
the mother, who said she was in her first trimester of pregnancy with the father's baby.
The paternal grandmother told the mother "she would be 'more than willing without any
question' to provide a home for the child."
4
In an addendum report, the Agency advised that a social worker had facilitated a
supervised visit between the mother and D.O. During the 20-minute visit, D.O. did not
recognize the mother and "appeared independent as she engaged in play individually
despite [the mother]'s efforts to engage her." The mother did not maintain contact with
the Agency after the visit. The father was incarcerated and had no contact with the
Agency or D.O.
The Siblings filed a petition under section 388 to establish their standing at the
section 366.26 hearing to assert the sibling relationship exception to adoption. The court
granted the petition without objection.
At the section 366.26 hearing, the juvenile court received in evidence certain of
the Agency's reports and addenda, and the stipulated testimony of two social workers and
the Siblings.
The social workers concluded "there's no interference with the sibling
relationship" because the paternal grandmother "is open to facilitating sibling visits and
contact, even after adoption." The paternal grandmother "consistent[ly] . . . remained
compliant with the social worker and [the] Agency," making D.O. available for visits and
compliance checks. The Siblings visited D.O. twice per month, and the paternal
grandmother had never been unavailable for a visit. The paternal grandmother had lived
with the Siblings (who are not her blood relatives) at one point, and had "demonstrated
her capacity and dedication to the maintenance of the sibling contact" by taking in the
mother's new baby (whose paternity had not been established) "so the siblings can stay
together." Thus, the Agency had "no current concerns with the caregiver's willingness
5
and capacity to continue facilitating sibling visits." Even if there were interference with
the sibling relationship, the Agency opined it would not be detrimental to D.O. "from her
perspective." (Italics added.) The Agency noted D.O. "does not discuss her siblings,"
and "speaks consistently in regards to [the paternal grandmother]."
The Siblings' stipulated testimony established that they lived with D.O. for
approximately the first year of her life, until the children were removed from parental
custody. Once in foster care, they visited at a fast food restaurant that had a playground.
Je.O. stated he "help[ed] [D.O.] play on the playground"; they hugged each other at the
beginning and end of the visits; and D.O. told Je.O. at the end of visits that she loves him.
Je.O. acknowledged that "sometimes [D.O.] knows [him] and sometimes she doesn't."
Je.O. wished for weekly visits with D.O., and was comfortable having them at the
paternal grandmother's home (having been there once before). Je.O. would "feel mad and
bad" if he did not live with D.O. again; he would "feel bad" if he could not visit her
again.
Y.O. said she and D.O. were very close.3 Y.O. often acted as D.O.'s caretaker.
During visits, Y.O. played with and helped feed D.O. Y.O. said, "[D.O.] enjoys herself at
the visits because she laughs and smiles. She reaches for me when she needs help while
playing." Y.O. also stated, "[D.O.] and I love each other. She runs up to me at the visits
and says she loves me every time we see each other. She and I are still very close, and
she calls me 'sissy.' I miss living with her. She used to cry at the end of our visits when
3 The Agency's detention report, filed 14 months earlier, stated "[D.O.] appeared
bonded with her older sister [Y.O.]."
6
we said goodbye, but she has gotten over it. When our visits end, we always hug
goodbye and tell each other, 'I love you.' " Y.O. wanted to see D.O. more often and
would be sad if they could not live together again; she would be "even more sad" if they
could not visit each other anymore. Y.O. acknowledged she did not "know how [D.O.]
would feel if she couldn't see [Y.O.] again."
Jo.O. stated in his stipulated testimony that D.O. seemed happy to see the Siblings
during visits and said things like " 'Brother' " and " 'Sissy!' " Jo.O. would help D.O. play
and "hold her hand a lot." At the end of visits, D.O. seemed sad and would cry a little,
and the children would all hug and say they love each other. Jo.O. wished he could see
D.O. every day, said he would be "really sad" if he could not, and would be "sad, sad,
sad" if he were unable to continue visiting her.
After receiving evidence, the juvenile court heard argument from counsel. The
Agency argued D.O. was adoptable and no exceptions to the statutory preference for
adoption existed. D.O.'s counsel (who was also her guardian ad litem) joined in the
Agency's argument, as did the father. The Siblings and the mother argued that the sibling
relationship exception applied. The mother argued that the parent-child beneficial
relationship exception also applied.
The juvenile court found D.O. adoptable, found neither of the invoked exceptions
to adoption applied, terminated parental rights over D.O., and selected adoption as her
permanent plan. The court explained that the sibling relationship exception "really only
comes into light . . . if there is a demonstrated interference" with such a relationship. The
court found that although there is "some evidence" that D.O. feels a sibling bond, there is
7
"absolutely no evidence that that bond would be interfered with." (Italics added.) The
court based this finding on the following evidence: (1) the paternal grandmother's proven
track record of facilitating visits with D.O. and the Siblings (whom the court observed are
not related to the paternal grandmother); (2) the fact the paternal grandmother took in the
mother's new baby, "who she's not even sure is related to her by blood"; (3) the Siblings'
nonrelative caregivers' proven track record of facilitating sibling visits; (4) the maternal
grandmother's participation in at least one visit; (5) the fact that neither parent objected to
placing D.O. with the paternal grandmother; and (6) the lack of any evidence that the
paternal grandmother, the Siblings' caregivers, or the maternal grandmother "would in
any way interfere" with the sibling relationship. The court concluded, "So I don't find
that there would be substantial interference." The court clarified it was not relying on the
existence of a postadoption contact agreement.
DISCUSSION
Appellants contend the juvenile court "did not conduct the analysis required by"
section 366.26, subdivision (c)(1)(B)(v) because the court based its finding of no
substantial interference solely on the caregivers' "unenforceable commitment to continue
sibling visits" and not on the factors expressly enumerated in the statute. We find no
error.
I. Overview of the Sibling Relationship Exception
"At a section 366.26 hearing the court is charged with determining a permanent
plan of care for the child." (In re Casey D. (1999) 70 Cal.App.4th 38, 50.) The court
may order one of three alternatives: adoption, legal guardianship, or long-term foster
8
care. (In re Autumn H. (1994) 27 Cal.App.4th 567, 573 (Autumn H.); § 366.26,
subd. (b)(1)-(5).) "Adoption, where possible, is the permanent plan preferred by the
Legislature." (Autumn H., at p. 573.) Adoption necessarily involves termination of the
biological parents' legal rights to the child. (Id. at p. 574.) Once the court determines by
clear and convincing evidence that a child is likely to be adopted, the burden shifts to any
party opposing adoption to show that termination of parental rights would be detrimental
to the child under one of the exceptions listed in section 366.26, subdivision (c)(1). (In re
C.F. (2011) 193 Cal.App.4th 549, 553; In re S.B. (2008) 164 Cal.App.4th 289, 297.)
The "sibling relationship" exception codified in section 366.26, subdivision
(c)(1)(B)(v) provides an exception to termination of parental rights when "[t]here would
be substantial interference with a child's sibling relationship, taking into consideration the
nature and extent of the relationship, including, but not limited to, [1] whether the child
was raised with a sibling in the same home, [2] whether the child shared significant
common experiences or has existing close and strong bonds with a sibling, and
[3] whether ongoing contact is in the child's best interest, including the child's long-term
emotional interest, as compared to the benefit of legal permanence through adoption."
(§ 366.26, subd. (c)(1)(B)(v); see In re Valerie A. (2007) 152 Cal.App.4th 987, 998.)
Under section 366.26, subdivision (c)(1)(B)(v), the juvenile court "is directed first
to determine whether terminating parental rights would substantially interfere with the
sibling relationship. . . ." (In re L.Y.L. (2002) 101 Cal.App.4th 942, 951-952; see In re
Daisy D. (2006) 144 Cal.App.4th 287, 293 ["The exception . . . applies only when
adoption would result in 'substantial interference with a child's sibling relationship.' "].)
9
"If the court determines terminating parental rights would substantially interfere with the
sibling relationship, the court is then directed to weigh the child's best interest in
continuing that sibling relationship against the benefit the child would receive by the
permanency of adoption." (In re L.Y.L., at p. 952, italics added; § 366.26, subd.
(c)(1)(B)(v).) The sibling bond exception is evaluated from the perspective of the child
who is being considered for adoption, not the perspective of that child's siblings. (See In
re Celine R. (2003) 31 Cal.4th 45, 54-55.)
"The author of the legislation adding the sibling relationship exception anticipated
that 'use of the new exception "will likely be rare," ' meaning 'that the child's relationship
with his or her siblings would rarely be sufficiently strong to outweigh the benefits of
adoption.' " (In re Daisy D., supra, 144 Cal.App.4th at p. 293; see In re Valerie A.,
supra, 152 Cal.App.4th at p. 1014 ["application of this exception will be rare, particularly
when the proceedings concern young children whose needs for a competent, caring and
stable parent are paramount"].)
To the extent appellants contend the juvenile court erroneously construed the
factors it was required to consider under section 366.26, subdivision (c)(1)(B)(v), we
review the claim de novo. (See In re A.L. (2010) 190 Cal.App.4th 75, 78.) To the extent
appellants challenge the juvenile court's ultimate determination, we apply the substantial
evidence standard to the juvenile court's underlying factual determinations, and the abuse
of discretion standard to the court's weighing of competing interests. (See In re Anthony
B. (2015) 239 Cal.App.4th 389, 395.)
10
II. Analysis
Before we address the merits of appellants' contention, we reiterate the rarity with
which the sibling relationship exception applies. (See In re Daisy D., supra, 144
Cal.App.4th at 293; In re Valerie A., supra, 152 Cal.App.4th at p. 1014.) The fact D.O.'s
counsel and guardian ad litem argued against the exception's applicability suggests this is
not one of those rare instances in which the exception applies. We turn now to the
merits.
Appellants' overarching premise—that the juvenile court could consider only those
factors expressly enumerated in section 366.26, subdivision (c)(1)(B)(v), and no others—
is undermined by the statute's plain language. (See, e.g., Young v. Gannon (2002) 97
Cal.App.4th 209, 223 ["The court looks first to the language of the statute; if clear and
unambiguous, the court will give effect to its plain meaning."].) Although the statute
expressly enumerates three factors, it also provides that the court's analysis should "tak[e]
into consideration the nature and extent of the [sibling] relationship, including, but not
limited to," those expressly enumerated factors. (§ 366.26, subd. (c)(1)(B)(v), italics
added; see In re L.Y.L., supra, 101 Cal.App.4th at p. 952, fn. 6 ["[A]s the Legislature
noted, the list in the statute is not exclusive."].) "The phrase 'including, but not limited to'
is a term of enlargement, and signals the Legislature's intent that [a statute] applies to
items not specifically listed in the provision." (Major v. Silna (2005) 134 Cal.App.4th
1485, 1495; see People v. Arias (2008) 45 Cal.4th 169, 181 ["the proviso 'including, but
not limited to' 'connotes an illustrative listing, one purposefully capable of
enlargement' "]; In re M.W. (2008) 169 Cal.App.4th 1, 5-6 ["use of the term 'including,
11
but not limited to' . . . suggests a legislative intention to allow broad discretion"].) Thus,
the plain language of section 366.26, subd. (c)(1)(B)(v) authorized the juvenile court to
consider factors other than those expressly articulated in the statute—such as a proven
history of, and expressed commitment to, sibling visits.
Appellants argue by analogy that because a juvenile court cannot rely on an
unenforceable promise of future visitation when deciding whether the parent-child
beneficial relationship exception applies (see In re C.B. (2010) 190 Cal.App.4th 102, 128-
129), the court likewise cannot consider promises of future visitation when deciding
whether the sibling relationship exception applies. The analogy is inapt. (See In re S.B.,
supra, 164 Cal.App.4th at p. 300.) Freeing a child for adoption necessarily requires
terminating—that is, substantially interfering with—the parent-child relationship. (See In
re Autumn H., supra, 27 Cal.App.4th at p. 574.) But "[u]nlike the parent-child
relationship, sibling relationships enjoy legal recognition after termination of parental
rights." (In re S.B., supra, 164 Cal.App.4th at p. 300.)4 Thus, it is not a foregone
conclusion that terminating parental rights will substantially interfere with a sibling
relationship, and the juvenile court must make this factual determination.
The Agency cites several cases that indicate assurances of continued sibling visits
are relevant to this determination. (See In re L.Y.L., supra, 101 Cal.App.4th at pp. 951-
4 Consistent with this distinction, the subdivision that sets forth the parent-child
beneficial relationship exception does not require the juvenile court to determine whether
there will be substantial interference with the relationship, whereas the subdivision setting
forth the sibling relationship exception does. (Compare § 366.26, subd. (c)(1)(B)(i) with
§ 366.26, subd. (c)(1)(B)(v).)
12
952; In re Daisy D., supra, 144 Cal.App.4th at p. 293; In re Salvador M. (2005) 133
Cal.App.4th 1415, 1422; In re Valerie A., supra, 152 Cal.App.4th at p. 1014; In re Jacob
S. (2002) 104 Cal.App.4th 1011, 1019.) We find these cases persuasive. We
acknowledge that the juvenile courts in the cited cases did not rely exclusively on evidence
regarding sibling visits, but also considered (to varying degrees) the factors enumerated in
section 366.26, subdivision (c)(1)(B)(v). Given the potential tenuousness of future sibling
visits, it is the better practice for juvenile courts to also consider the expressly enumerated
factors. However, we conclude it was not error to depart from that practice here, where
the record contains substantial evidence that would have allowed the juvenile court to
otherwise reach the same conclusion by considering the expressly enumerated factors.
Although appellants frame their challenge primarily as a legal one directed at the
propriety of considering future sibling visits at all, they also assert that "no evidence
supported the juvenile court's finding that the sibling relationship would remain intact,
except for speculation that the caregivers would continue to allow it." This argument
ignores that it was appellants' burden to establish there would be substantial interference,
not the Agency's burden to establish there would not. The juvenile court found there was
"absolutely no evidence that the bond would be interfered with." (Italics added.) Thus,
appellants' unsubstantiated assertion on appeal that "many things can happen over the
next 16 years" is speculative. (See, e.g., In re Daisy D., supra, 144 Cal.App.4th at p. 293
["it was anticipated that the minor would be adopted by her paternal grandparents, who
intended to maintain contact between the minor and her half siblings. Appellant's
assertion that animosity between her and the paternal grandparents would lead to a
13
cessation of sibling visits after the adoption is speculative and unsupported by the
record."]; In re Jacob S., supra, 104 Cal.App.4th at p. 1019 ["The grandparents have said
they . . . are open to maintaining ties between [the adoptive children] and their siblings.
The grandparents have done so thus far, and there is no evidence they intend to stop once
they have adopted [the adoptive children]."]; In re Salvador M., supra, 133 Cal.App.4th
at p. 1422 ["there is nothing in this record to suggest that the brothers' relationship would
be terminated, as both [the mother] and the grandmother have indicated they recognize
the value of the sibling relationship"].)
In any event, the juvenile court cited five evidentiary bases (discussed above)
supporting its conclusion. Notably, the court did not rely solely on unsupported
assurances from the caregivers that they would allow future visits; rather, the court cited
the caregivers' proven track record of facilitating visits, and the paternal grandmother's
commitment to the mother's new baby (who is related to D.O. but may not be related to
the paternal grandmother). The court did not err.
Even if the juvenile court erred in determining there would be no substantial
interference with the sibling relationship, the error would not be prejudicial because it
does not appear reasonably probable appellants would have obtained a more favorable
result absent the error. (See In re Jonathan B. (1992) 5 Cal.App.4th 873, 876; People v.
Watson (1956) 46 Cal.2d 818, 836.) Appellants cite the Siblings' stipulated testimony
and the juvenile court's finding that there was "some evidence" that D.O. feels a sibling
14
bond.5 At most, this establishes the existence of a sibling relationship;6 it says nothing
about the detriment, if any, D.O. would suffer if that relationship were substantially
interfered with, or whether that detriment would outweigh the benefits to D.O. of the
stability and permanence of adoption. In the case of a two-year-old dependent who spent
only the first year of her life with her siblings and then visited them only twice each
month during the second year, we find it is not reasonably probable that the juvenile court
would have resolved that balancing test in the Siblings' favor. (See, e.g., In re Daisy D.,
supra, 144 Cal.App.4th at p. 293 [finding no prejudice where "the minor was just over
one and one-half years old when she was placed separately from her half siblings in the
home of the paternal grandparents. In the ensuing two years, the minor had visits with
her half siblings between two and four times a month. And although the minor clearly
enjoyed the time she spent with her half siblings, there was no evidence that the detriment
she might suffer if visits ceased presented a sufficiently compelling reason to forgo the
stability and permanence of adoption by caretakers to whom she was closely bonded."].)
5 Although the focus of the sibling relationship exception is the impact on the
adoptive child and not her siblings (see In re Celine R., supra, 31 Cal.4th at pp. 54-55),
"evidence of the [siblings'] relationship with the child . . . might be relevant as indirect
evidence of the effect the adoption may have on the adoptive child" (In re Naomi P.
(2005) 132 Cal.App.4th 808, 823).
6 Although substantial evidence supports the juvenile court's finding of a sibling
bond, the record suggests the bond may not have been a strong one. Je.O. acknowledged
that "sometimes [D.O.] knows [him] and sometimes she doesn't." Y.O. acknowledged
that D.O. used to cry at the end of visits but has "gotten over it," and that she (Y.O.) does
not "know how [D.O.] would feel if [D.O.] couldn't see [Y.O.] again."
15
DISPOSITION
The order is affirmed.
HALLER, J.
WE CONCUR:
BENKE, Acting P. J.
MCDONALD, J.
16
Filed 5/3/16
CERTIFIED FOR PUBLICATION
COURT OF APPEAL, FOURTH APPELLATE DISTRICT
DIVISION ONE
STATE OF CALIFORNIA
In re D.O., a Person Coming Under the
Juvenile Court Law.
D069105
SAN DIEGO COUNTY HEALTH
AND HUMAN SERVICES AGENCY,
(Super. Ct. No. SJ11191D)
Plaintiff and Respondent,
v.
JESSICA A.,
ORDER CERTIFYING OPINION
Defendant and Appellant, FOR PUBLICATION
SCOTT O.,
Defendant and Appellant,
JE.O., et al.,
Objectors and Appellants.
THE COURT:
The opinion in this case filed April 11, 2016, was not certified for publication. It
appearing the opinion meets the standards for publication specified in California Rules of
Court, rule 8.1105(c), the request pursuant to rule 8.1120(a) for publication is GRANTED.
IT IS HEREBY CERTIFIED that the opinion meets the standards for publication
specified in California Rules of Court, rule 8.1105(c); and
ORDERED that the words "Not to Be Published in the Official Reports" appearing
on page 1 of said opinion be deleted and the opinion herein be published in the Official
Reports.
HALLER, Acting P. J.
Copies to: All parties
2
|
{
"pile_set_name": "Wikipedia (en)"
} | Maes pils
Maes pils is a Belgian pils brewed by Alken-Maes. The beer was first produced in 1930 for Antwerp's Universal Exposition and called Prima Maezenbier. After Jupiler and Stella Artois, it is the third best-selling pilsner in Belgium.
In 2008, Alken-Maes was taken over by the Dutch Heineken Brewery.
In 2009, Alken-Maes changed the recipe of Maes Pils, resulting in a slight change in taste and a rise in the percentage of alcohol from 4.9% to 5.2%. To mark the change, Maes was rebranded with a new logo, a new embossed bottle, and a new descriptive slogan: "Extra Mout/Extra Malt".
Summary
Alcohol: 5.2% ABV
Available in 25 cl, 33 cl and 75 cl bottles or in 25 cl, 33 cl and 50 cl cans. Can also be found in 5 litre kegs.
External links
Official site
Collection of glass beer mugs from Maes
Category:Belgian beer brands
Category:Belgian brands
Category:Heineken brands |
{
"pile_set_name": "OpenSubtitles"
} | "(DOCTOR WHO THEME)" "The power's still dropping, Vorg." " What are you doing?" " I wish I knew..." "Routine maintenance, your worship." "Aaagh!" "Eradicator detachment, stand by!" " It's one of the Tellurians." " It must be eradicated." "He hasn't done anything." "Are you all right?" "Don't touch it." "It's crawling with germs." "He's right." "The thing must be destroyed." "Eradicator detachment, one charge, maximum intensity..." " Wait!" " Stand aside, Kalik." " This procedure is not in order." " Not in order?" "The eradicator cannot be used without authority." " In an emergency..." " One alien is hardly an emergency." "The function of this tribunal is to keep this planet clean." "This creature comes from outside our solar system and is a carrier of contagion." "The creature may be hostile." "Will you stop referring to me as the creature?" "Or I may become exceedingly hostile." "Silence!" "The tribunal is deliberating." "The tribunal is not deliberating." "The tribunal is arguing." "Quite nonsensically, if I may say so." "The tribunal will not tolerate insolence from unauthorised life forms!" "Will one of you kindly explain to me where I am?" "Which planet, I mean." "You are on Inter Minor." "Inter Minor?" "Not Metebelis 3, the blue planet of the Acteon Galaxy?" "Oh, no." "I see." "Thank heavens the Tardis is safe anyway." " This container is yours?" " Yes, it is indeed." "Ah, yes." "Just as I thought." "A miniscope." "This is outrageous." "Who is responsible for this?" "Is it yours?" "Certainly not." "It is the property of this Lurman." "The female is his assistant." "And you, sir?" "You are?" "Chairman Pletrac of the Admissions Tribunal." "One wonders why the tribunal is submitting to questioning." "Shouldn't it be the other way round?" "I'm sorry to have to tell you, but you are all in very serious trouble." "One almost admires its audacity." "You are, I take it, the representatives of authority here?" "One's authority comes direct from President Zarb himself." "You have allowed the importation of a machine that is forbidden by inter-galactic law." "One did not allow it!" "One is deporting the Lurmans and their machine." "But the machine is here and it is in operation." "You cannot deny that." "Well, strictly speaking, one must concede that, in a sense..." "Then you are responsible, are you not?" "As a direct result of your carelessness, my young companion is trapped inside this machine in extreme peril." "One must remind you that the question before this tribunal is your eradication as a menace to public health." "If you'll allow me to rescue my young companion and give what help I can to the unfortunates in here," "I'm prepared to overlook the matter." "One is indeed overwhelmed." "If not...then you'll just have to take the consequences." "Let me know when you've made up your mind." "Marvellous, Shirna." "What audacity, eh?" "I believe he's one of us." "One of us?" "He's a Tellurian." "He's in the carnival business, I'm sure." "Look at his manner and his clothes." "I've worked many a Tellurian fair." "You may be right." "He's got the style." "I'd wager on it." "He's got the measure of these grey-faced idiots." "One is against this whole thing." "One might have expected that from you, Kalik." "Orum, are you for or against the use of the eradicator?" "Against." "You are outvoted, Pletrac." "Very well." "Eradicator detachment, stand down." "Thank you for your timely intervention, sir." "Wait!" "Where are you going?" "Just over there." "You're very nervous, Pletrac." "Not nervous so much as puzzled." " What use is the Tellurian to you?" " Of no use." "You never do anything without a reason." "Why did you save its life?" "Out of mercy and compassion." "Vorg will tell you." "I bet he understands the parlare." "Listen." " Eh?" " The Tellurian carnival lingo." "Parlare la carny?" " I beg your pardon?" " Varda the Bona Palone?" "I'm sorry." "Niente dinari round here, y'jills." "I must apologise." "I'm afraid I do not understand your language." "You understand, all right." "You're a showman like me." "Are you a showman?" "Allow me to introduce myself." "I am the Great Vorg." "This beautiful young lady is Shirna, my assistant." "Delighted, Miss Shirna." "I am the Doctor." "Great title." "Doctor, Professor always pulls them in." "Are you in charge of this disgraceful device?" " Yes." "Why?" "Something wrong?" " Yes." "Very wrong." "I too have an assistant, and she's trapped inside this machine." "Somehow I've got to get her out." "I wouldn't put your hand in there." "The Drashigs can take a lump out of you." " Drashigs?" " They followed you." "They're running wild inside there." "Doing terrible damage." "The stato fields are gone." "I'm going to lose the collection." "Lose them?" "That would be a tragedy." "Yes." "My insurance doesn't cover the replacement of livestock." "Livestock?" "!" "Let me tell you, the people inside that ship are human beings!" "Tellurians, Ogrons." "Marvellous collection." "The collection of the simplest life forms is a dubious pursuit, sir, but the collection of civilised intelligent beings is a crime!" "I warn you that I intend to put an end to this shameful business." " It's putting an end to itself." " What does that mean?" "It's packing up." "All the support systems are going." "The power is almost down to critical." " How long will it last?" " Who knows?" "Not much longer." "Then every living creature in there will die, including my assistant!" "I've got to find a way of saving them." " Have you seen her?" " Not this side." "She can't get away." "We'll get a search party together." "What is the Tellurian doing?" "Trying to rescue the other Tellurian, one imagines." " They are clearly social creatures." " And harmless." "Pletrac is growing suspicious." "If he should decide to examine the eradicator, he will discover that one has rendered it useless." "You worry too much." "Zarb still decrees the death penalty for acts of treason." " Have you destroyed the part?" " What part?" " From the eradicator." " You mean the trizon." "Yes, it's here." "We will conceal it in the Lurman's baggage." "Then if anything should go wrong, one of us can discover it." "Of course." "Blame it on the Lurman." "An alien spy and saboteur." "Doctor?" "Doctor, are you there?" "There she is!" " Now then, miss..." " All right." "I know the routine." "You know, Shirna, he could lose that nose of his just like that." "Vorg." "That's odd." "The Drashigs!" "If they get out, they'll expand to full size." "Come on." "It's time we left." " Where are you going?" " Where?" " Home." " We thought we'd take a shuttle." "A transporter will take you and your machine to the thruster base." "We can find our own way." "You can keep the Scope." "You will remain here until the transporter arrives!" "The quarantine regulations on the conveyance of aliens are explicit." "You will be taken in a transporter which will then be disinfected." "Disinfected?" "Back." "Back!" "Back!" " I'm going to lock you in here..." " Until the Captain sees me." "I know." "Right." "Sensible girl." "Vorg?" "Doctor, I shouldn't stay near the Scope." "The Drashigs..." "Vorg, I need your help." " I've got to get back inside." " What?" "It's the only way to get Jo out and save your "livestock"." "I need you to trigger the settings." " Settings?" " This is your machine, isn't it?" " Of course." " Then you know how it works?" " He won it, Doctor." " He what?" "During the Great Wallarian Exhibition." "Wallarians are great gamblers." "Vorg had the Magnum pod concession." "Three Magnum pods and a yarrow seed." "Quickness of the hand deceives the eye..." "Yes, I've seen it." "So you won this machine?" "And you don't know how it works?" "I see." "This Wallarian that you got it from, did he give you a green or a blue disc - a thing about this big?" "He gave me a few odds and ends." "They're in my bag." " Go and have a look." " What's the idea, Doctor?" "It's simple, really." "The Scope's Omega circuit is broken." "If I can link it to the Tardis, I can reprogramme the Scope." " What will that do?" " Two things." "It will enable me to get Jo out of this wretched contraption, and return the others to their original co-ordinates." " Back to where they came from?" " I hope so." "Is this it?" "A bit mucky." "Yes." "Thank heavens you kept it." "I'll tell you what I want you to do." "Would you mind just waiting there for a moment?" "Do nothing till you get the signal." "Is that clear?" "Good." "About your business." "The transporter must arrive shortly." "So you think my plan has failed?" " One is conscious of certain flaws." " Indeed?" "One gathers the intention is the escape of these Drashigs in order to cause a disaster that will reflect badly upon Zarb." " Admirably put." " One has sabotaged the eradicator in order the leave the city defenceless?" "Precisely." "The bigger the disaster, the better for us." "But is it not possible that one might become part of that disaster?" "There is a certain minimal risk." "One has no wish to be devoured by alien monstrosities, even in the cause of political progress." "When the Drashigs burst out, the city will be taken by surprise." "We, on the other hand, will be ready to remove ourselves from danger." "One trusts the removal will be speedy." "The Lurman said the ferocity of the Drashigs is formidable." "No doubt he exaggerates." "I'm sure, as commissioners of Inter Minor, we'll be more than a match for these primitive life forms." "Have no fear, Orum." "My plan will not fail." "It will if the Drashigs don't escape!" "And there's no sign of that." "Sshh!" "Isn't there?" "They'll never break through those plates." "They're molectic bonded disillum." "Perhaps one better give them a little help." " Will it work, Doctor?" " Of course it will." " It's not very well insulated." " Then don't touch any metal." "Listen to me." "This is the phase one switch here." "This is the phase two." "Don't touch that till the last possible moment." "Got that." "Phase one, phase two." " What are you doing?" " He's going back in the Scope." "You will remain here." "You came here illegally." "Regulations demand you be sent to the ICCA." "What's the ICCA?" "The Inner Constellation Corrective Authority." " Prison?" " You admit you are a vagabond." "Oh, yes, yes, very much so." "Phase one." "Stop!" " Oh, no!" " We'll never get him back now!" " Can you fix it?" " I don't know." "All these wires!" " You must try." " I'm doing my best." " The Doctor's relying on us." " Put your finger on there." " Here?" "Ow!" " Good." "That's the live terminal." "Doctor?" "Doctor, can you hear me?" "Jo?" "Jo, is that you?" "Doctor!" "Doctor, where have you been?" "Stop asking silly questions and come on." "Haven't you found that sprock yet?" "I think you've lost that too." "You'll have to hurry." "The transporter's due." " Keep Pletrac busy." " One will try." "Orum." "Is this part of something, Vorg?" " Where did you get that?" " Your bag." "What is it?" "I haven't seen one of these since my national service days." "The old 14th Heavy Lasers." "What an outfit!" "Our battery sergeant was a Crustacoid mercenary..." "Vorg!" "The power's almost critical." "Is the phase two switch ready?" "I've just got to fix this junction box." " Come on, Jo." " I can't..." " Come on!" " I can't get my breath." "The circuits are going." "Come on, Jo!" "One last effort." "We're nearly there." "Daddy..." "Claire." " Oh, Daddy." " My dear." " What's the matter?" " Help me." "Heat exhaustion." "I should never have brought her out here." "The transporter has arrived at last?" " Time to get the aliens aboard." " Why was it delayed?" "The Functionaries at the depot are refusing to work double shifts." "What impudence!" "They are getting above themselves." "We live in troubled times." "Oh, do get out of the way, Orum." "(ROARING)" "Quick!" "The eradicator!" "Sabotage!" "Run for your lives!" "This way!" "Vorg, here!" "Look out!" "Vorg...." "Vorg." "The phase two switch." " Well, that's that." " What about the Doctor?" " It must be too late." " Well, we can try." "If you like." "It's no use." "The power's completely gone." "No..." "No, wait a minute." "(LOW HUMMING)" " I'll have to switch it off." " You can't." "Well, that's it, then." "No, wait!" "It worked!" "Hello, Vorg." "You cut that a bit fine, didn't you?" "We had a spot of bother here." "Doctor?" "It's all right, Jo." "We've made it." "What about the others?" " Others?" " On the ship." "I reversed the settings and linked them to the Tardis." " They should still be on the ship." " Back in 1926 in the Indian Ocean?" "Exactly." "(KNOCKING)" " Who is it?" " Only me." " I didn't wake you, did I?" " No." " I just wanted to say goodnight." " I've been reading." " Have you finished it?" " Yes." "Seems like the longest book I ever read." "It does seem to have been a long trip somehow." " Daddy?" " Yes?" "Oh..." "Nothing." "Disappointing ending, you know." "Fellow became a missionary." "I thought he'd marry her." "You are an old romantic, aren't you, Daddy?" "I bet half your stories about the East are romances." "You'll see for yourself tomorrow." "Bombay." " I'm looking forward to it." " I don't think young Andrews is." "That's what I mean, you see, romantic." " Goodnight, Daddy." " Goodnight, my child." "Sleep well." "The second monster was barrelling in at 90 degrees, and I swung like this, you see, keeping low, and I gave him a quick burst right in the vitals." "We are all extremely grateful." "Your valour will not be forgotten." "It's my natural reaction to fight." "Our President will wish to honour our Lurman guests for their courage." "A decoration, perhaps?" "How will we live?" "The Scope's had it and we've no credit-bars." "Leave that to me." "I say, Pletrac, let me show you a little trick." "Sorry." "Now, I have here three Magnum pods and a yarrow seed." "Now, I place the seed under the middle pod, like so." "Now, I move them very, very slowly." "Watch." "(VORG) Are you watching?" "You tell me which pod you think the seed is under." " The middle one." " The middle one?" "You wouldn't like to wager a couple of credit-bars on your judgement?" "Certainly." "One will wager two credit-bars that it's under the middle pod." "One can hardly discount the evidence of one's eyes." "Oh." "You're unlucky." "One was obviously too hasty." "One will not make the same mistake again." "Another little wager?" "Five credit-bars." "No...ten." "Whatever you say, Pletrac." "Thank you." "I'm going to like it here." "You remind me of the Wallarians." "They're great sportsmen too." "I don't think we need to worry about our friend Vorg." "He'll probably wind up president!" "..Very slowly, like that." "Keep watching." "You tell me which pod you think the seed is under." "(TARDIS WHOOSHES)" |
{
"pile_set_name": "Pile-CC"
} | AT&T, Cablevision, Comcast, Time Warner Cable, and Verizon have reached an agreement with music and movie publishers that will help enforce copyright infringement while giving the ISPs a chance to level with their customers. According to Ars Technica, copyright owners will continue to scour the dark corners of the net looking for anyone downloading and illegally sharing their content. If an IP is found to be downloading or sharing illegal content — likely via P2P networks — the music and movie companies will alert the ISP directly. ISP’s will then send a note to the offending customer, without passing off private information unless there is a court order to do so. Users may get up to four alerts from the ISP, but after that the ISP can choose to start implementing “temporary reductions of Internet speeds, redirection to a landing page until the subscriber contacts the ISP to discuss the matter or reviews and responds to some educational information about copyright, or other measures that the ISP may deem necessary to help resolve the matter.” If a user believes he or she has been targeted without merit, an appeals process can be started for a $35 fee but, as Ars Technica notes,it’s unclear who will be the judge in that process. Read on for the full details on the six strikes.
First Alert: In response to a notice from a copyright owner, an ISP will send an online alert to a subscriber, such as an email, notifying the subscriber that his/her account may have been misused for content theft, that content theft is illegal and a violation of published policies, and that consequences could result from any such conduct. This first alert will also direct the subscriber to educational resources which will (i) help him/her to check the security of his/her computer and any Wifi network, (ii) provide explanatory steps which will help to avoid content theft in the future and (iii) provide information about the abundant sources of lawful music, film and TV content.
Second Alert: If the alleged activity persists despite the receipt of the first alert, the subscriber may get a second similar alert that will underscore the educational messages, or the ISP may in its discretion proceed to the next alert.
Third Alert: If the subscribers account again appears to have been used for content theft, he/she will receive another alert, much like the initial alerts. However, this alert will provide a conspicuous mechanism (a click-through pop-up notice, landing page, or similar mechanism) asking the subscriber to acknowledge receipt of this alert. This is designed to ensure that the subscriber is aware of the third copyright alert and reminds the subscriber that content theft conducted through their account could lead to consequences under the law and published policies.
Fourth Alert: If the subscribers account again appears to have been used for content theft, the subscriber will receive yet another alert that again requires the subscriber to acknowledge receipt.
Fifth Alert: If the subscribers account again appears to have been used for content theft, the ISP will send yet another alert. At this time, the ISP may take one of several steps, specified in its published policies, reasonably calculated to stop future content theft. These steps, referred to as Mitigation Measures, may include, for example: temporary reductions of Internet speeds, redirection to a landing page until the subscriber contacts the ISP to discuss the matter or reviews and responds to some educational information about copyright, or other measures that the ISP may deem necessary to help resolve the matter. ISPs are not obligated to impose any Mitigation Measure which would disable or be reasonably likely to disable the subscribers voice telephone service (including the ability to call 911), e-mail account, or any security or health service (such as home security or medical monitoring). The use of the mitigation measure is waivable by the ISP at this point.
Sixth Alert: Whether or not the ISP has previously waived the Mitigation Measure, if the subscribers account again appears to have been used for content theft, the ISP will send another alert and will implement a Mitigation Measure as described above. As described above, it’s likely that very few subscribers who after having received multiple alerts, will persist (or allow others to persist) in the content theft.
i don’t think this is going to work… first of all just use a proxy… but hypothetically speaking, if i were to pirate something and you dont like it, i’ll take my money elsewhere
BluDD
no likey
Scott
Clad I don’t see Cox listed in there. But this should be illegal. Yeah, what I may be downloading isn’t legal, but giving the ISP right to shut me down? I pay my bill and that’s all they should care about. They’re just a dump pipe that provides internet. Why not go after the torrent sites? I guess that seems too logical.
Anonymous
Torrent sites don’t host illegal content… they just help in downloading the content
Anonymous
If you’re doing something illegal, you shouldn’t complain. People who break the law shouldn’t have the same rights as law abiding citizens.
Also, would you rather the ISP just turn you in? That’s the alternative if you get caught. This way you just get a warning.
Anonymous
Are you going to trust the ISP’s and their controlled arbitration system to be fair and just. I wouldn’t count on it. The threats will be based on IP addresses and not physical addresses. Your kids friend could be doing it, your neighbor could be stealing your WiFi because you can’t figure out how to lock down your WiFi Router (they all suck at simple configurations).
Anonymous
If that’s the case, that means you get a… warning?
So you can be aware that someone is misusing your connections?
Anonymous
You are amazingly naive. And what if you aren’t breaking the law? Hello $35 appeals process! Doesn’t it just give you a warm fuzzy feeling that you have to pay to prove that you are innocent? Very UN-American.
Aaron Bartholomew
Laws are relative. By your logic, one who runs a red light should not have the same rights as those who don’t.
This is about morals, free speech, and privacy on a broader scale. Not about the law. Go away.
Anonymous
When you sign up for the service, there are terms of use associated with it. I’m pretty sure conducting illegal activity on their service is a violation of the terms of use. All and all, this is a GOOD thing that the ISPs would rather give you warnings and benefit of the doubt rather than just turn you over at the first indication of possible infringement.
http://twitter.com/Kevniv Kevin N
Horse shit!
Anonymous
Thank goodness for usenet.
Kchristainsen
explain please
Anonymous
with the Usenet, he is probably not uploading/sharing any content. The copyright laws are about illegal distribution of the content.
http://twitter.com/1fuzzybear Carl Mason
Silence! The first rule of Usenet is never to speak of Usenet! Ten de-merits each and you are all on double-secret probation!
Anonymous
what happens to those who goto starbucks and download. theyll never get caught doing it that way.
Proexodus
How do you remove someone’s ability to call 9-1-1? I have an issue with that…
Anonymous
My thought exactly. Even a cell phone that’s not registered to a network (via SIM, etc) can make an emergency call
Anonymous
“including the ability to call 911” and “health service (such as home security or medical monitoring)” Ummm isn’t that illegal ?? i know they want to prevent piracy but disabling these services may get them sued into oblivion.
911 is a essential service and shouldn’t be touched.
Anonymous
I suggest you and Proexodus go and re-read that section…
Anonymous
Reading comprehension is fun.
It says they won’t do that. Obviously, they would be in legal doodoo.
http://twitter.com/WillieFDiazSF William Diaz ✔
And how many times are you allowed to get these alerts before they are reset? Once a month? Once a year? Once a life time? Once as a customer?
Anonymous
How about once a lifetime? How f-ing hard is it to not steal? I don’t understand the sense of entitlement of some of the other posters above (not necessarily you). Most folks wouldn’t steal from a store, even if they knew they wouldn’t get caught. Why is copyrighted material any different? What are parents teaching their kids these days??
Anonymous
Well said.
Anonymous
So you get wrongly accused, that happens all the time. You are relying on major corporations including these ISP’s who are ALSO content providers. Do you not see the conflict of interest here. There is no legitimate court hearing these cases, its the ISP’s deciding if you are guilty and the media companies filing the complaint.
The real answer is simple, make the friggin media affordable and readily available for people to LEGALLY buy. Do you know what a PITA it is to actually buy media that isn’t DRM’d to death. Do you really like buying from iTunes.
I simply buy the DVD’s I want, rip the files for portable consumption as I see it that IS fair use. I own a copy in physical form, I have it on my portable device since I don’t carry a DVD player and a TV with me.
Not everyone is a criminal, but good luck getting the stink off once you are called one and you never did it to begin with.
Anonymous
I rip DVDs that I personally own, it falls under fair use despite when the copyright holders may say.
Not the same as illegally downloading content off the Internet. Besides the morality, they can’t track what you do offline.
Also, the ISPs and copyright holders cannot judge you guilty. They have no civil or criminal powers in the legal system. This is a warning system. The worst the ISP can do is curb or cancel your service, and the worst the copyright holder can do is file a civil lawsuit. Which they already can do.
This is a formality so that ISPs can protect their own necks legally.
http://www.twitter.com/hokes Brendan
Every good/service that operates with a flawed and broken business model of this magnitude deserves to have a black market of the same magnitude.
Anonymous
It doesn’t make it not stealing.
Copyright holders don’t owe you anything. Why is it people feel entitled to things?
Dejan Jancevski
There is a reason black markets exist. And as Brendan stated, it’s a flawed and broken business model that exists in the entertainment industry. Mind you, forget the idea that most people who actually “download illegally” end up actually purchasing a legal copy of the work if they like it. The way I look at it is this way: If I want to purchase a Ford Mustang (or any other car), most dealerships will allow me to test drive the car BEFORE I decide to purchase it. Ok, that may be because of the cost of the vehicle, I’ll give you that. Instead, what about the toaster that you bought at your local Walmart? You can easily take it home, test it, decide you hate it after making say…a few hundred toasted slices of bread, barely clean the crumbs out, re-package it up, and return it with the receipt for a full refund with no questions asked! Can you do that with a music CD or any DVD? Obviously not…the second you open that plastic cover…you now OWN that garbage, even if you hate it. There is where the problem is found. The cost to make a music CD is in the realm of $0.01 to $0.05 per CD…AT MOST! DVDs are MAYBE a full $0.50 to $1.00 more.
Now think about the cost involved. You buy a crappy CD thinking your favorite artist is going to put out a great album (hey, the critics liked it), but when you listen to it…you think it sucks and don’t want to be stuck with it. Return it to Best Buy you say? Can’t do it. Unless there is something physically wrong with the media (basically, the ONLY option here would be if the media is warped due to a manufacturing process, not simply b/c you left it out in the sun to bake or b/c you purposely scratched it), you can’t even get a new copy of it (receipt or no receipt). So…you’re stuck. UNLESS, you opt to download the media, listen to it, and then opt to purchase those songs you like (or the entire CD since it might be cheaper).
But having companies like AT&T or Comcast be told by other companies what their customers are doing AND assuming that such allegations are true is insane. This is true corporate greed at its worst. Instead of complaining about the people who download stuff illegally, how about doing something about these corporations that flat out charge far too much for the garbage that they provide. After all…since when does “unlimited” data have an actual monthly cap of 150GB anyway? The point here is this…the people who are “ripping off” these entertainment companies would have either never bothered to purchase the content and end up deleting it long before any ISP provider would be alerted to it, OR they have already ended up purchasing a legal copy anyway. In the end, this type of behavior by these companies is what causes people to feel disenfranchised and no longer care. Well, time for us to stand up for our own FAIR USE! It should be fair to make a copy of your legally purchased media. It should NOT be a crime nor impossible to return media that a customer is dissatisfied with. So…time for us Americans to stand up and start demanding more for far less from these companies! Who’s with me?!? (HINT: You ALL should be).
Anonymous
@google-93549b4915fc0cb3c23769f500dbae2a:disqus I enjoyed your little quip there. You now have permission to play with my boobs.
http://twitter.com/snidely1459 Snidely
The problem is that the copyright holders have no idea what’s legally shared content and illegally shared. If I am Bono’s best friend and he allows me to download a song from him, the RIAA could still say that’s illegal, even though it is a totally legal transaction. The RIAA doesn’t investigate both ends of the download, they just assume it’s all illegal. Under this process, you have no recourse. This policy is a travesty of American law. You are no longer innocent until proven guilty by a court of law. You’re assumed to be guilty by some industry that’s in collusion with your internet provider. Bye bye due process. Here’s how it should work —
1. RIAA suspects person of illegally downloading songs and grabs their IP address
2. RIAA goes to court to get the name of the person associated with the IP address.
3. Court orders ISP to turn over name and ISP does so.
4. RIAA sues person for infringement in court.
5. Court decides whether person is guilty or not.
This is how the system works for other infringement. Why doesn’t Big Content have to follow the same rules? Why can they just accuse you without due process? The accused have the same rights as anyone else Enerji. That is the foundation of our legal system.
Anonymous
Here’s the issue I have with your comment. You’re giving far too much leverage to a media industry which has more than outplayed its existence (in its current form) and walked all over certain constitutional rights we as a free people are entitled too. If you think this agreement will do more to prevent the pirating of music, you’re misled. In fact, I surmise that this will only make it easier to for the true pirates (the one’s who perform MASSIVE illegal downloads) to continue on their current course while the bottom feeders like a 12 year old who knows little to nothing about consequences in life burns his families existing service agreement.
http://twitter.com/androidhelpers Android Helpers
Funny part is, you most likely infringe copyright a least a dozen times a day. It’s nearly impossible not to.
Anonymous
Given these major ISP’s decision to buckle under the media empires thumb, shouldn’t this also remove their “safe harbor” protection. I mean if they are going to track our every move and warn us and make us watch propaganda materials then why are they not liable for so much more. Comcast is already getting away with altering their agreement’s since buying NBC.
There is already a simple remedy available for people who pirate content, its called the US Court’s. They are free to file lawsuits and claim damages. But no they want the government to play policeman for them. Once again our government is FAILING to protect the very citizens who elected them with due process.
Anonymous
As I read this, it says the copyright holder is responsible for monitoring and reporting misuse. They then contact the ISP who may, at it’s discretion, issue multiple warnings.
If you’re guilty, it’s a heads up. If you’re not, it’s a head’s up so you can figure out what’s going on.
It strikes me that the people who are freaking out are likely the same ones who will likely be getting warnings.
And due process? Where are the criminal charges being filed? You have a contract with the ISP, and their contract reserves them the right to terminate their service if it’s being used for illegal purposes. Thus, it falls under contract law.
First_wd40
True on what you are saying BUT wait till YOU are wrongly accused then you will see what others are trying to say. Read part that says if you feel you are wrongly accused it will cost you 35.00 to start a appeals process. So by that when they say you are guilty they won’t even listen to you till you pay 35.00.
I can hear A T and T now when you call , be a script they will read.. I am sorry but you will need to go to this site and pay 35.00 and start an appeal before I can discuss this with you. That in itself sounds wrong to me , opening the door to all services saying we can accuse you of whatever, limit or even shut down your service and if you don’t like it pay 35.00 and we will talk to you about it.
Anonymous
If I was innocent, I would refuse to pay, cancel my service, and refuse to pay any cancellation fee, mailing a certified letter threatening legal action.
If you make a stink, it will go away.
Anonymous
This sounds like a good fair and balanced agreement (and not in a Faux News sort of way).
Wait till YOU are wrongly accused then you will see what others are trying to say. Read part that says if you feel you are wrongly accused it will cost you 35.00 to start a appeals process. So by that when they say you are guilty they won’t even listen to you till you pay 35.00.
I can hear A T and T now when you call , be a script they will read.. I am sorry but you will need to go to this site and pay 35.00 and start an appeal before I can discuss this with you. That in itself sounds wrong to me , opening the door to all services saying we can accuse you of whatever, limit or even shut down your service and if you don’t like it pay 35.00 and we will talk to you about it.
Anonymous
Then cancel your service with them.
First_wd40
only problem is where I live I can only get fast internet from AT&T so say this happens I cancel , I still pay cause then only option I have is ..dial up. They win. I see a door opening for all services to get more money and why not? Economy is doing so well, plenty of jobs , making tons of money. Economy got to be doing great with prices on all going up, umm even gas went up today 11 cents a gallon.
Anonymous
And go where? I hope you live in one of those all to rare markets in the US where there is actual competition in broadband. However the vast majority of Americans don’t have real choices when it comes to broadband service. Its one company and that’s it.
Shocked
Disgusting mega capitlists boosting their own wealth at the expense of the common people to propagate their obsolete business models.
http://twitter.com/derrickisonline Derrick -Lex-
LMAO! What a joke. This has already been going on, less the landing page and Internet speed reduction part. What a waste of time. You think that minimum wage making customer service rep is really going to give a flying fuck? Even still, would Comcast, Verizon, AT&T, Cox rather lose a customer because they reduced their Internet speed when they’re paying for service. Yeah right. One threat to cancel service after having your internet speeds reduced and I’m sure that “throttle” will be lifted. MPAA, and RIAA are getting desperate.
Not to mention you could use the whole “I must have had a virus or something”….”Pirate Pay? I don’t know anything about a Pirate Pay, I just used the Internet to check my email”
Andy Howard
Maybe this will be the thing that pushes more people to fully encrypt all their web traffic.
KCRic
This will work about as good as red light cameras. Prove it was me ‘driving the car’.
http://twitter.com/Atst4 Steve J
SOOOOO… WHat happens if you one of those happy people that shares an open wifi hotspot with your neighbors/passers-by… do you get F’ked?
Steve Jenkins
Sharing is Caring…..f**k the ISP’s, “Big Content” and their masters.
Anonymous
Nice… The heavy hand of government is back at it again, screwing consumers while protecting corporations yet again.
Anonymous
As long as I can still download free porn then I don’t care.
Anonymous
Can someone please tell me when this goes into effect? Or has it already?
Garratt
Does anybody else see a problem with this? Now ISP’s are spying on what we’re doing on the Internet? How is invading the privacy of American citizens any better than pirating warez on the web? |
{
"pile_set_name": "Pile-CC"
} | "Considered by many to be a sure-fire first round pick after his junior season, Te'o surprised many when he decided to put the NFL on hold and return to the Irish for the 2012 season. After leading Notre Dame in tackles the past two seasons, he is poised for another banner year as a senior and has a chance to make his mark in the Fighting Irish record books.
Te'o was widely considered the top linebacker recruit out of high school in 2008 and the top defensive prospect by many, choosing Notre Dame over USC and several other top programs.
He worked his way into the starting line-up as a true freshman and started nine games, finishing fourth on the team in tackles with 63 stops. Te'o emerged as a defensive leader in 2010 as a sophomore, leading the team with a career-best 133 tackles. He again led the Irish defense in tackles in 2011 as a junior with 128 stops, adding 13.5 tackles for loss and 5.0 sacks and earning All-American honors."
Analysis:
"Te'o is an intense competitor and covers a lot of ground with his rangy, active playing style and lateral agility to cover both sidelines. He trusts his eyes and attacks the action quickly, showing a high football IQ to play smart, assignment football. Te'o needs to tighten his angles in space and get stronger at the point of attack to consistently finish once he gets his hands on the ballcarrier. He is a smooth, thickly-built athlete and his ability to quickly diagnose the play is why he projects as a starter at the next level."
I wanted to create a thread strictly for Manti Te'o. There is some indecision on the board about his NFL future and whether or not he would be a good fit on the Cincinnati Bengals. Figured we could air out everyones own personal analysis of Te'o and why you would or would not want him on our team.
WE WOULD DRAFT BETWEEN 8-12! (Thanks HammerStripes)
I voted YES! I think Te'o would be a phenomenal pick up for us and worthy of our first pick in the 2013 NFL Draft. His leadership skills and overall talent and abilities speek for themselves He is the best at his position in the draft class. Leadership goes a long way in the NFL. He can cover in the passing attack and can stuff holes in the running attack. He is a sure tackler; once he gets to you, hes not letting you get by him. Very good instincts that get him to the ball. Makes the propers adjustments throughout the game (showed that against Pittsburgh this last weekend). He is an all-around solid prospect. It is hard to find any flaws in his play. He is praised by his coaches and his teammates as one of the most sincere guys in the locker room. I would be upset if he were on the board and we passed on him. He would be a great addition to this team and would make not only our defesne better, but the whole team as well.
I voted yes simply because I believe Jones would be gone before we pick. If he were available, Jones in a heartbeat.
The only other MLB that I would even want besides Te'o is Ogletree, but he still may stay in college. Te'o has the leadership that we desperately need. I think Burfict could use a motivator like Te'o to boost his game even more. If we get neither Te'o nor Ogletree, I'd prefer to then move Burfict back to MLB and draft a WILL
1.) Leadership. Te'o gives you that. He would be the much needed QB on defense and a significant player in the lockerroom. We all know that the Bengals culture is probably the worst in the league. A guy like Te'o can help change the culture.
2). Playmaking - Te'o has a nose for the ball. He makes things happen. In essence, he is the anti-Maulaluga. He could be a Polumalu type player at the LB position.
Give me Barret Jones at the top of round 2 (or trade up to the end of 1) to get him and the best RB, S or WR available with the second pick in the 2nd and I am a happy man.
Last week, Te'o looked timid and afraid, which the last thing that we need on our team is another Rey. He also looked horrible guarding the tight end, which is a huge red flag for any backer that plays in our division, especially for us.
Ogletree is an option but I think he would end up playing SAM for us because, even though he says he likes playing outside, where I think he's a stud, I think we should put Burfict at MIKE. I'm also not a fan of Ogletree's failed drug test.
CJ Mosley is a stud that I'd like to see at SAM.
__________________.
Just in case Fred ever asks me to post where I've ever proven him wrong because he seems to have no memory of it, even though he has made me do it multiple times, here are four examples.
I'm kind of thinking with the way the board falls that a WR might be the the area offering the best value. It's not my preference, but that's where i see the value at. There could be the top receiver in the whole draft sitting there between 10-15.
I think Te'o is a good option, but Im afraid he is a little over valued. He is a significant upgrade over Maulaluga but he is locked into the MLB role from what I've seen. Assuming we are picking between 12-20 and I've got a choice between Te'o and Ogletree Id look at Burfict's future and decide which to draft. Ogletree is more athletic than Te'o which I think will be proven at the combine. All in alll Im a biased UGA fan but I like Ogletree better with our current scheme because I can see him as an OLB in our system as well.
I think Te'o is a good option, but Im afraid he is a little over valued. He is a significant upgrade over Maulaluga but he is locked into the MLB role from what I've seen. Assuming we are picking between 12-20 and I've got a choice between Te'o and Ogletree Id look at Burfict's future and decide which to draft. Ogletree is more athletic than Te'o which I think will be proven at the combine. All in alll Im a biased UGA fan but I like Ogletree better with our current scheme because I can see him as an OLB in our system as well.
I like Te'o too, Im just not sure he is right for our current system given our personnel. I think he would be a great MIKE LB for us but with Burfict Im not sure that I wouldn't rather look at Ogletree from UGA who I think is more athletic and looks much better in coverage
The guy was being considered for the Heisman. This crowd's a bit rough on the best ILB in college football.
Quote:
Originally Posted by BengalHawk62
agreed
and he's still in the top five for voting.
Great college player on a team who is undefeated. Only reason he is up there for the Heisman. The guy has been a non-factor more often than you expect a Heisman finalist to be. If he was on any other team he wouldn't be up there but for some reason most CFB guys have some sort of nostalgia with Notre Dame |
{
"pile_set_name": "ArXiv"
} | ---
abstract: 'The all-electron exact muffin-tin orbitals method in combination with the coherent-potential approximation has been employed to investigate the ideal tensile strengths of bcc ferromagnetic Fe and Fe$_{1-x}M_{x}$ (*M*=Cr, Ni, Al, Co, Mn, and V) random alloys in the $[001]$ direction. The present ideal strength is calculated to be $11.0$ GPa for pure bcc Fe, in good agreement with the available theoretical data. For the Fe-based alloys, we predict that Co, Cr and V increase the ideal tensile strength, while Ni and Al decrease it. Manganese yields a non-monotonous alloying behavior. We show that the limited use of the previously established ideal tensile strengths model based on structural energy differences in the case of Fe-bases alloys is attributed to the effect of magnetism.'
author:
- Xiaoqing Li
- Stephan Schönecker
- Jijun Zhao
- Börje Johansson
- Levente Vitos
title: 'Ideal strength of ferromagnetic Fe-based alloys from first-principles theory'
---
\[sec:introduction\]Introduction
================================
The mechanical strength of real materials is usually controlled by the occurrence of grain boundaries, cracks, dislocations and other micro-structural defects. If such defects were not present, the strength would be limited by the stress at which the lattice itself becomes unstable with respect to a homogeneous strain. This stress referred to as the ideal strength or ideal tensile strength (ITS) is an upper bound strength of an ideal single crystal. The ideal strength is an inherent property of a defect-free material and can offer insight into the correlation between the intrinsic chemical bonding and the crystal symmetry, and has been accepted as an essential mechanical parameter of single crystal materials [@inherent:property]. The experimental data on the ideal strength are rather limited. The few available values were obtained from tensile tests for whiskers [@Kelly:1986; @Brenner:1956] and from nanoindentation experiments. [@Yoshida:2007]
In recent years, considerable attention was paid to the computation of the ITS of elements or ordered alloys by first-principle methods. The ideal strength of refractory metals (such as Mo, Nb, V, and W), noble transition metals (such as Cu, Pt and Au), elements crystallizing in the diamond structure (Si, Ge, and C) as well as few ordered alloys (TiAl and Ni$_{3}$Al) was extensively investigated. [@study:1; @study:2; @study:3; @study:4; @study:5; @study:6; @study:7; @study:8; @study:9; @Mo:1; @stress; @v:pp; @Cerny:2010] Among the body-centered cubic (bcc) metals, Fe received a great scientific interest. [@inherent:property; @Cerny:2007; @Liu; @idealandmagnetic:2002; @Sob:2004; @Cerny:2010] It was reported that, the $[001]$ direction of Fe is the weakest direction in response to an uniaxial stress. It has been shown, that a bifurcation from the primary tetragonal deformation path (the Bain path) to a secondary orthorhombic deformation path occurs after the ITS on the primary path is reached. [@inherent:property] Thus, bcc Fe strained along the $[001]$ direction fails by cleavage and not by shear as opposed to bcc V and Nb. [@study:8] In spite of all these theoretical efforts, the first-principles description of the ITS in substitutionally disordered alloys is rather limited. Li *et al.* [@Xiaoqing:2012] investigated the composition dependent ITS of bcc vanadium-based nonmagnetic (NM) random solid solutions alloyed with chromium and titanium in various crystallographic directions employing the coherent potential approximation (CPA). To the best of our knowledge, no experimental or theoretical study has focused on the alloying effect on the ITS of Fe-based alloys. It is the purpose of this paper to bring forward a comprehensive study of the ideal strength to bcc ferromagnetic (FM) Fe-based random alloys.
Iron alloys are the most widely used engineering materials due to their excellent mechanical properties. For example ferritic Fe-Cr-based stainless steels have been considered as the primary structural materials in the first wall and blanket structure of future fusion reactor [@Klueh:2002; @Klueh:2002; @Kohyama:1984]. Alloying plays a central role in designing advanced engineering materials with desired properties. Different solute atoms produce different effects on fundamental mechanical properties. Previous works focused on the effects of various typical solute atoms on the mechanical properties of Fe in the small deformation region, where the stress-strain relations are linear. [@Speich:1972; @Speich:1973; @Takeuchi:1969; @Zhang:2010; @Razumovskiy:2011; @xiaoqingFe:2012] However, the ideal strength describes the mechanical properties of the material beyond the elastic region.
In this work, using the exact muffin-tin orbitals method, we study the composition dependence of the ITS of FM Fe$_{1-x}M_{x}$ alloys for various alloying elements, *M*=Cr, Ni, Al, Co, Mn, and V. The primary purpose of our work is to give an account of the application of the alloy theory to the ITS of bcc FM random alloys. Second, we aim to provide a consistent theoretical guide to further optimization of the composition of Fe-based alloys in multiscale materials design.
The structure of the manuscript is as follows. In Section \[sec:computationalmethod\], we describe the computation tool and the important numerical details. The results are presented and discussed in Section \[sec:resultsanddiscussion\]. Here, first we assess the accuracy of our calculations by considering pure bcc Fe. Then we study the effects of the alloying elements on the ideal strength of Fe-based alloys.
\[sec:computationalmethod\]Computational method
===============================================
Total energy calculation
------------------------
The first-principle method used in this work is based on density functional theory (DFT) [@DFT]. We adopted the generalized gradient approximation (GGA) of the Perdew-Burke-Ernzerhof (PBE) [@PBE] functional to describe the exchange-correlation interaction, which is well known to give the correct FM bcc ground state for Fe. The Kohn-Sham equations were solved using the EMTO method. [@EMTO:1; @EMTO:2; @EMTO:3] The problem of disorder was treated within the CPA and the total energy is computed via the full charge-density technique. [@cpa:1; @cpa:2; @cpa:3; @cpa:4]
The EMTO method is an improved screened Korringa-Kohn-Rostoker (KKR) method, [@EMTO:1] where the full potential is represented by overlapping muffin-tin potential spheres. Inside these spheres, the potential is spherically symmetric and constant in between. By using overlapping spheres, one describes more accurately the exact crystal potential compared to conventional muffin-tin methods. Further details about the EMTO method and its self-consistent implementation can be found in previous works. [@EMTO:1; @EMTO:2; @EMTO:3; @cpa:3; @cpa:4] The accuracy of the EMTO method for the equation of state, elastic properties, and the ideal strength in tension of metals and alloys has been demonstrated in a number of previous works. [@cpa:2; @EMTO:2; @work:3; @work:4; @work:5; @work:6; @work:7; @Xiao; @Xiaoqing:2012]
The paramagnetic state of the Fe-based alloys was simulated by the so-called disordered local moment (DLM) model. [@Gyorffy:1985] Within the DLM picture, the paramagnetic Fe and Fe$_{1-x}M_{x}$ binary alloys were described as a binary alloy Fe$\uparrow$Fe$\downarrow$ and a quaternary (Fe$\uparrow$Fe$\downarrow$)$_{1-x}$($M\uparrow$$M\downarrow$)$_{x}$ alloy, with an equal amount of spin-up ($\uparrow$) and spin-down ($\uparrow$) components, respectively.
Ideal tensile strength calculations for bcc crystals
----------------------------------------------------
The principles of the response of bcc crystals to uniaxial loading were developed in a series of works by Milstein *et al.* [@Milstein:1970; @Milstein:1971; @Milstein:1988] In this work, we computed the ITS in the $[001]$ direction of bcc Fe and Fe-based alloys. Since $[001]$ was already identified to be the weakest direction of bcc Fe, [@Cerny:2007; @Sob:2004; @Liu] here we concentrated on this direction only. Assuming an uniaxial tensile load, the tensile stress $\sigma (\varepsilon)$ can be calculated by [@stress] $$\sigma(\varepsilon)=\frac{1}{\Omega(\varepsilon)}\frac{\partial\emph{E}}{\partial\varepsilon},
\label{eq:stress}$$ where $\emph{E}$ is the total energy per atom and $\Omega(\varepsilon)$ is the volume per atom at a given tensile strain, $\epsilon$. The first maximum on the stress-strain curve defines the ITS, $\sigma_{\text{m}}$, for the selected deformation path with corresponding maximum strain, $\epsilon_\text{m}$.
Uniaxial loading along the $[001]$ direction reduces the symmetry of the bcc lattice to the body-centered tetragonal (bct) one on the primary deformation path. Clatterbuck *et al.* [@inherent:property] reported a bifurcation from the primary deformation path to a secondary orthorhombic (orth) deformation path in Fe, however, the branching occurs for strains well above $\epsilon_\text{m}$. Thus, an isotropic Poisson contraction along the Bain transformation path describes appropriately the symmetry of the distorted Fe lattice up to $\epsilon_\text{m}$. The ideal tensile strength of the present Fe-alloys may nevertheless be influenced if this branching point shifts towards strains smaller than the maximum strain along the primary deformation path. We account for this possibility in this work.
On the primary tetragonal deformation path, the uniaxial strain energy, [@Xiaoqing:2012] $\Delta\emph{E}(c;[001])$, describes the total energy change upon deforming the bcc crystal in the $[001]$ direction, and relaxing it with respect to the dimensions in the $(001)$ plane, $$\Delta\emph{E}(c;[001])= \min_{a} E(a,c) - E_0,
\label{eq:energy:001}$$ here $a$ and $c$ denote the lattice constants of the quadratic basal plane and the height of the bct unit cell, respectively. The initial undistorted state corresponds to the equilibrium bcc structure with energy $E_0$ and $c=a$. At $c/a=\sqrt{2}$, the bct lattice coincides with the face-centered cubic (fcc) lattice. On the secondary orthorhombic deformation path, we consider $\Delta\emph{E}(a_{\text{orth}},b_{\text{orth}};[001])$ and minimize the total energy with respect to the lattice parameters of the face-centered orthorhombic lattice, $a_{\text{orth}}$ and $b_{\text{orth}}$ (to describe the bifurcation from the primary tetragonal to the secondary orthorhombic strain path, the face centered tetragonal reference frame of the Bain transformation is used [@Xiaoqing:2012]).
For a more detailed technical description of ideal strength simulations with EMTO, we also refer the reader to Ref.
\[sec:resultsanddiscussion\]Results
===================================
\[sec:equilibrium\]Ideal strength of bcc iron
---------------------------------------------
To assess the reliability of our computational approach, we first performed the simulation of a tensile test in FM bcc Fe for uniaxial loading along the $[001]$ direction. The theoretical equilibrium lattice parameter of bcc Fe is $2.829$ [Å]{} from our calculation, which agrees well with a full-potential value of, $2.830\,\textrm{\AA}$ [@Tran:2007]. The experimental lattice parameter, $2.868$ [Å]{}, [@Staroverov:2004] is $1.4\%$ larger than the theoretical equilibrium value. The calculated spin magnetic moment of FM bcc Fe is $2.27$ $\mu_{\text{B}}$, which is approximately 2% larger than the measured value $2.22$ $\mu_{\text{B}}$. [@Kittel:1986] This overestimation of the magnetic moment of Fe is due to the employed GGA functional.
The magnetic order of the strained Fe lattice may change along the uniaxial loading process, which is for strains up to the branching point governed by the Bain transformation as discussed in the previous section. At zero strain, the ground state magnetic order is FM (bcc phase). The fcc state of Fe lying on the Bain transformation path (albeit at strains much larger than $\epsilon_{\text{m}}$) exhibits a non-collinear spin arrangement as measured in fcc Fe precipitates and in thin fcc Fe films. [@Tsunoda:1989; @Tsunoda:2007; @Meyerheim:2009] That indicates that the ground state magnetic order of the strained bct Fe lattice begins to differ from FM order at some particular strain in the range between bcc and fcc along the primary transformation path. If this would be the case for $\epsilon \le \epsilon_{\text{m}}$, then additional magnetic order should be considered. However, there are strong indications that the FM order is the prevailing magnetic state for strains smaller than and somewhat above $\epsilon_{\text{m}}$. [@idealandmagnetic:2002; @Tsetseris:2005; @Friak:2001]
Clatterbuck *et al.* [@idealandmagnetic:2002] computed the ideal strength of Fe in the \[001\] direction considering the FM order, a collinear anti-ferromagnetic structure (AFM, magnetic moment sequence $\uparrow \downarrow$) and a collinear double layer anti-ferromagnetic structure (DAFM, magnetic moment sequence $\uparrow \uparrow \downarrow\downarrow$). Their results show that Fe remains FM up to the point of its elastic instability during uniaxial tension, which lies at approximately $\epsilon_\text{m}=15\,\%$ with $c/a\approx 1.16$ and $\Omega/\Omega_{\text{exp}}> 1$ ($\Omega_{\text{exp}}$ denotes the experimental atomic volume of bcc Fe). Further evidence is given by Tsetseris [@Tsetseris:2005] and Friák *et al.* [@Friak:2001] which published minimum energy contour plots with respect to various magnetic orders (FM, AFM, and DAFM order by Fri�ak et al. and non-collinear magnetism via a spin spiral formalism by Tsetseris) as a function of the bct geometry thereby defining magnetic phase boundaries between different magnetic states. According to both references, FM order is the predominant magnetic order in the configuration space for $c/a\le 1.25$ and $\Omega/\Omega_{\text{exp}}\ge 0.95$. Both references hence indicate that the point of elastic instability of Fe reported by Clatterbuck *et al.* is indeed located far from the borderline of FM order towards any other investigated magnetic ground state order. Hence, here we assume that Fe and also the present Fe-rich binary alloys stay FM during the deformation process.
-- --------------- --------------------------- -------------------------------
$\sigma_{\text{m}}$ (GPa) $\varepsilon_{\text{m}} (\%)$
EMTO 11.0 14
PAW Ref. 12.6 15
PAW Ref. 12.4 16
PAW Ref. 12.4 14
FP-LAPW Ref. 14.2 15
FP-LAPW Ref. 12.7 15
-- --------------- --------------------------- -------------------------------
: \[table:one\]The ideal tensile strength $\sigma_{\text{m}}$ and the corresponding strain $\varepsilon_{\text{m}}$ from our and published computations in $[001]$ direction for a pure iron crystal. FP-LAPW stands for full-potential linearized augmented plane wave.
The ideal tensile strength $\sigma_{\text{m}}$ corresponding to the strain $\epsilon_{\text{m}}$ from our and other calculations in $[001]$ direction for iron are listed in Table \[table:one\]. It can be seen that the three projector-augmented wave (PAW) works [@inherent:property; @Cerny:2007; @Liu] show similar stress values, however scatter somewhat in $\epsilon_{\text{m}}$. Namely, Clatter *et al.* [@inherent:property] reported a value of $\sigma_{\text{m}}=12.6$ GPa at $\varepsilon_{\text{m}}= 15$% and Liu *et al.* [@Liu] gave a value of $\sigma_{\text{m}}$=$12.4$ GPa at $\epsilon_{\text{m}}$=$14$%. Furthermore, the two $\sigma_{\text{m}}$ values obtained by the all-electron full-potential linear augmented plane wave (FP-LAPW) method differ by $1.5$ GPa ($\sim11\%$). Compared to these theoretical full-potential data, the EMTO result for the stress of Fe is slightly smaller but still in reasonably good agreement. We obtained $c/a\approx 1.18$ and $\Omega/\Omega_{\text{exp}}\approx 1.04$ for the point of instability of Fe in agreement with Clatterbuck *et al.* [@idealandmagnetic:2002]Finally, we computed that the bct to orth branching occurs at $\epsilon=19\,\%$ well above $\epsilon_{m}$ in accordance with Ref. .
On the experimental side, the only attempt to measure the ideal tensile strength of Fe was by Brenner [@Brenner:1956] who tested Fe whiskers for tension was measured to be the $[001]$ direction. The ITS of these Fe whiskers at room temperature was measured to be approximately $5$ GPa. Compared to the theoretical data, the experimental value seems to be considerably lower. However, the observed failure initiated at the surface and, therefore, the measured value cannot be considered to represent bulk strength.
Based on the above results, we concluded that our theoretical tool is able to describe the ITS of bcc Fe with sufficiently high accuracy.
\[sec:strengthFe\]Ideal strength of Fe-based alloys
---------------------------------------------------
In the following we turn to bcc Fe-based alloys and investigate the effect of alloying elements *M*=Cr, Ni, Al, Co, Mn, and V on the ITS of Fe$_{1-x}M_{x}$ random solid solutions. The selected solute atoms are common in commercial Fe-based steel alloys and they represent simple metal (Al), nonmagnetic (V) and magnetic (Cr, Co, Ni, and Mn) transition metals. The total concentration of these solutes was varied in the range from 0 to 10% except for Mn which the maximum concentration was 5%. The theoretical equilibrium lattice parameters of Fe$_{1-x}M_{x}$ (*M*=Cr, Ni, Al, Co, Mn and V) random alloys are displayed in Table \[table:alloyslattice\]. We can see that compared to pure Fe, all alloying elements increase the lattice constant. Our computed lattice constants practically reproduce the earlier results from Ref. .
[l\*[6]{}[c]{}]{} &\
& Fe-Cr & & & & &\
2.5 &2.843 &2.837 &2.842 &2.843 &2.844 &2.839\
5 &2.849&2.842&2.849&2.852&2.853&2.843\
7.5&2.850&2.845&2.850&2.858&2.860\
10&2.849&2.848&2.858&2.861&2.866\
Figure \[fig:alloysstress\] shows the composition dependence of the ITS of binary bcc Fe-based random alloys along the $[001]$ direction and the corresponding numerical data for selected compositions are listed in Table \[table:alloyslattice\]. The calculated ideal strength is found to increase with Cr, Co and V and decrease with Ni and Al addition to Fe. For instance, when $10\%$ Cr, Co, or V is added to bcc Fe, the ITS of Fe increases by $1.4$, $0.8$ and $2.4$ GPa, respectively. If however $10$% Ni or Al are added to the Fe matrix, the ITS reduces by $1.5$ GPa. For Mn, first the ITS increases weakly with increasing Mn amount below $2.5\%$, i.e., from $11.0$ GPa to $11.3$ GPa, then reduces by $0.3$ GPa when up to $5\%$ Mn is added to Fe compared to pure Fe. According to Fig. \[fig:alloysstress\], it is clear that Al, Ni, and V show the strongest average alloying effect ($\Delta \sigma_{\text{m}}/\Delta x$) on the ITS of bcc Fe, whereas Mn, Ni and Cr produce intermediate alloying effect.
[l\*[6]{}[c]{}]{} & $\sigma_{\text{m}}$ (GPa) & $\varepsilon_{\text{m}} (\%)$ & $\sigma_{\text{m}}$ (GPa) & $\varepsilon_{\text{m}} (\%)$ & $\sigma_{\text{m}}$ (GPa) & $\varepsilon_{\text{m}} (\%)$\
& & &\
2.5 &12.1& 14.0& 11.1& 14.2&11.9 &14.8\
5 &12.4& 14.7 &11.5&15.2&12.6 &15.3\
7.5 &12.4 &14.5 &11.7&14.9 &13.2 &15.3\
10 &12.4 & 14.2&11.8&15.1 &13.4& 15.3\
& & &\
2.5 &10.9&14.3&10.5&14.7&11.3&14.6\
5 &10.6 &14.3 &10.2 & 14.6&10.7 &14.4\
7.5 &10.1 &13.6 &9.7 &14.4\
10 &9.5 &13.9 & 9.5& 14.3\
We also considered the possibility of a branching from the primary bct deformation path to the secondary orthorhombic deformation path for the present Fe-based alloys. Based on these additional calculations, we can exclude a bifurcation from the primary bct deformation before the ideal strength is reached, i.e., for all alloys considered here the branching occurs at strains larger than $\epsilon_{\text{m}}$.
\[sec:discussions\]Discussions
==============================
Failure of the structural energy difference model for ITS
---------------------------------------------------------
Understanding the alloying effects on the ITS of Fe-based alloys is highly desirable. To this end, we start from a previously established simple model based in structural energy differences. For binary and ternary vanadium based V$_{1-y-z}$Cr$_{y}$Ti$_{z}$ random solid solutions, $0\le y+z\le 0.1$, we established a qualitative correlation between the change of the ITS due to alloying and the change of the fcc-bcc structural energy difference (SED) of the alloy. [@Xiaoqing:2012] Accordingly, the maximum stress ($\sigma^{\phantom{S}}_{\text{m}}$) was approximated by $\sigma^{\text{SED}}_{\text{m}}$ along the $[001]$ direction defined as $$\sigma^{\phantom{S}}_{\text{m}}\approx \sigma^{\text{SED}}_{\text{m}} = \frac{1}{\Omega_{\text{bcc}}}\frac{\Delta E^{\text{SED}}}{\Delta \epsilon},
\label{eq:stress:strdiff}$$ where $\Delta E^{\text{SED}}$ denotes the SED at fixed volume (here of the bcc ground state, $\Omega_{\text{bcc}}$) and $\Delta \epsilon$ is the strain at constant volume necessary to transform the bcc lattice into the fcc lattice along the Bain transformation ($\Delta \epsilon\approx 0.260$).
Equation. is based on the fact that the fcc structure corresponds to the nearest maximum to the bcc phase of the uniaxial strain energy curve. [@inherent:property; @Liu; @idealandmagnetic:2002; @Sob:2004] Thus, the uniaxial strain energy must level off to the fcc-bcc energy difference, which implies a limitation on the maximum stress since it restricts $\Delta\emph{E}(c;[001])$ to the SED within the strain interval to accomplish the transformation from bcc to fcc, i.e., the ratio $\Delta E^{\text{SED}}/\Delta \epsilon$ is bounded.
The alloying trend is captured by Eq. if there is a correlation between the change of the ITS as a function of concentration, $\Delta\sigma_{\text{m}}(x)$, and the change of the fcc-bcc SED, $\Delta(\Delta E^{\text{SED}})(x)$. The prefactor $1/\Omega_{\text{bcc}}$ is weakly concentration dependent and does not change the conclusions drawn here. We show in the following that the correlation suggested by Eq. fails for the bcc FM Fe-based alloys as opposed to the nonmagnetic V$_{1-y-z}$Cr$_{y}$Ti$_{z}$ alloys. [@Xiaoqing:2012]
First, we assumed a FM state for both fcc Fe and the Fe-based alloys, since the FM fcc state of Fe was shown to be the nearest maximum of the uniaxial strain energy curve. [@inherent:property; @Liu; @idealandmagnetic:2002; @Sob:2004]
Figure \[fig:FM\] displays $\Delta\sigma_{\text{m}}(x)$, obtained from the values in Table \[table:alloys stress\], as a function of $\Delta(\Delta E^{\text{SED}})(x)$ calculated with EMTO-CPA. In figure, the alloying effect was obtained by increasing the concentration of the solute from 0% to 5%. We can see that Ni, Mn, and Al decrease the ITS and also decrease the SED, however, Co, Cr, and V increase the ITS but decrease the SED. We also investigated the correlation between $\sigma_{\text{m}}$ and $\Delta E^{\text{SED}}$ increasing the concentration of the solute from 5% to 10%, however the result is qualitatively identical to the one depicted in Fig. \[fig:FM\]. From these results, we infer that the anticipated correlation between the ITS and the FM SEDs following Eq. can not capture the observed alloying trend of $\sigma_{\text{m}}$.
Next we tried to establish a correlation between the PM SEDs obtained from paramagnetic (PM) fcc Fe$_{1-x}M_{x}$ alloys and their FM bcc phases. Using the above described procedure and a concentration increase of the solute from 0% to 5%, we plotted the stress change versus the PM SED change in Fig. \[fig:PM\]. From that figure, it can be clearly seen that Ni and Mn decrease the ITS and likewise decrease the SED, while Cr, Co, and V increase the ITS as well as they increase the PM SED. However, FeAl is outlying as the ITS decreases with Al, but the PM SED increases with Al. Assuming a paramagnetic fcc state thus captures somewhat better the observed alloying trends than a FM fcc but the correlation dictated by Eq. is still not perfect.
One possible reason why Eq. is not a good estimate for the alloying trend of $\sigma_\text{m}$ for Fe alloys may be related to the different employed deformations paths. Along the unconstrained primary deformation path of tensile stress, the volume of the unit cell can change and $a$ is determined from Eq. . Fcc-bcc SEDs on the other hand were computed at the bcc equilibrium volume, i.e., on a Bain deformation path at constant volume $\Omega_{\text{bcc}}$, where $a$ is given by $2\Omega_{\text{bcc}}/c^2$. Equation captures the alloying trend on $\sigma_\text{m}$, if the effect of alloying on the total energy is comparable for both strain paths. That was indeed the case for nonmagnetic V-based random alloys [@Xiaoqing:2012]. However, for the present FM Fe-based alloys the interplay between magnetism and the structure in Fe along the deformations paths should also be considered. We provide arguments in the following section, that the above failure can indeed be originated in the effect of magnetism.
Magnetic effects on the ITS
---------------------------
To achieve a better understanding of the matter, we computed an auxiliary ideal stress assuming a constant volume deformation, i.e., the maximum stress according to Eq. was deduced from the total energy computed as a function of strain for fixed unit cell volume. The constant volume for each Fe-alloy is the one of its theoretical equilibrium volume (Table \[table:alloyslattice\]). The so-calculated maximum stress at constant volume, $\sigma^{\Omega}_\text{m}$, with maximum strain, $\epsilon^{\Omega}_{\text{m}}$, is then correlated to FM $\Delta E^{\text{SED}}$ from Eq. . Since both values were obtained for the same strain path, we expect that the correlation between $\sigma^{\Omega}_\text{m}$ and $\Delta E^{\text{SED}}$ significantly improves for all alloys, despite possible interference from magnetism. First, $\sigma^{\Omega}_\text{m}$ as an approximate to the ideal strength of Fe-based alloys as a function of the alloying elements is displayed in Fig. \[fig:fitting\]. Notice the difference between Fig. \[fig:alloysstress\] and Fig. \[fig:fitting\], the prior corresponding to relaxed volume and the latter to constrained volume. According to Fig. \[fig:fitting\], the constrained ITS decreases with increasing composition for all alloying elements compared to the value of Fe. Al, Ni, and Mn solutes have a stronger effect than the other elements.
Compared to the ideal stresses depicted in Fig. \[fig:alloysstress\] (with variable volume), the constrained-ITSs keep their trends as a function of $x$ in the case of Al, Ni, and Mn, but the ITS shows an opposite trend for Cr, Co, and V addition. Figure \[fig:b\] displays the correlation between the change of the constrained-ITS calculated at the constant volume, $\Delta \sigma^{\Omega}_\text{m}(x)$, and the change of the FM SED ($\Delta (\Delta E^{\text{SED}})(x)$). Both alloying effects for an increase of the concentration of the solute from 0% to 5% and for an increase from 5% to 10% are displayed. Quite interestingly, we obtain that the change in the constrained-ITS correlates well with the SED change.
--------------------------------------- --
**[Energy]{} & **[Magnetic moment]{}\
&\
&\
****
--------------------------------------- --
By comparing Fig. \[fig:fitting\] with Fig. \[fig:alloysstress\], it is immediately evident that the ideal strength of Fe is most significantly affected by the fixed volume constraint, i.e., it increases from $11.0$ GPa to $16.0$ GPa. This is unlike the Fe-alloys with moderate solute concentrations, where the ideal strength increases are considerably smaller the higher the solute concentration are, e.g., we obtained an increase from $13.4$ GPa to $15.1$ GPa for Fe-$10$V.
An answer to the observed correlation may be given by considering magnetism in Fe and its alloys. In the following we chose Fe-$10$V as a representative of all investigated binary alloys. The total energy and the spin magnetic moment of Fe are opposed to those of Fe-$10$V in Fig. \[fig:5\], where we plotted both quantities as a function of the tetragonal axial ratio ($c/a$) and the Wigner-Seitz radius, $\omega$. We also displayed the corresponding uniaxial deformation path in the range from $\epsilon=0 \ldots \epsilon_{\text{m}}$.
As visible from the contour plots, the magnetic moment increase of Fe along the deformation allowing for a volume change from $\epsilon=0 \ldots \epsilon_{\text{m}}$ is much stronger than the one of Fe-$10$V; the numbers read $0.27\,\mu_{\text{B}}$ and $0.09\,\mu_{\text{B}}$ for Fe and the Fe-$10$V alloy, respectively. These numbers are in contrast to the deformation at constant volume (in the range $\epsilon=0 \ldots \epsilon^{\Omega}_{\text{m}}$), where the changes are $0.09$ $\mu_{\text{B}}$ for Fe and $0.03$ $\mu_{\text{B}}$ for Fe-$10$V. That indicates that the increase of the atomic volume has a more pronounced influence on the relaxation of the magnetic moment than the structural change ($c/a$), a result which can be clearly associated with the contour lines in Fig. \[fig:5\]. It should be noted that $|\epsilon^{\Omega}_{\text{m}}-\epsilon_{\text{m}}|$ is at most 1.5% (for one and the same material), i.e., $\epsilon^{\Omega}_{\text{m}}$ is quite similar to $\epsilon_{\text{m}}$ for Fe and the present Fe-alloys.
Now, alloying Fe with any of the solutes under investigation in this work increases the equilibrium volume (Table \[table:alloyslattice\]). Unconstrained uniaxial tensile loading is also accompanied by an increase of the volume per atom, as depicted in Fig. \[fig:volume\] for Fe and for the Fe-based alloys with the highest considered solute concentrations. In the region of the maximum strains, both Fe and the Fe alloys have rather similar volumes as opposed to the situation at equilibrium. The volume change of Fe due to the deformation is thus distinctly larger than those of the Fe-based alloys. According to our numerical data (also Fig. \[fig:5\]), the larger volume increase of Fe is paralleled by a larger magnetic moment increase along the uniaxial deformation from equilibrium to $\epsilon_{\text{m}}$, despite the fact that Fe contributes only by a factor of $1-x$ to the magnetic moment of the alloys.
The comparatively large increase of the magnetic moment in Fe along the uniaxial deformation path with unconstrained volume and the pronounced difference between $\sigma^{\Omega}_{\text{m}}$ and $\sigma_{\text{m}}$ (5 GPa) may, at least in parts, be related. We recall, that both the increase of the magnetic moment and the difference $\sigma^{\Omega}_{\text{m}}-\sigma_{\text{m}}$ of all Fe-alloys are smaller than the values of Fe. To substantiate this correlation, we recalculated the ITSs for the previously determined unconstrained strain paths but with fixed magnetic moments, i.e., the magnetic moments were not allowed to relax to self-consistency. We employed the respective ground state magnetic moments of Fe and the Fe-V alloys.
Fixing the magnetic moment increases the resulting computed strengths, but the increase is strongly diminished with higher solute concentration, e.g., approximately $4.0$ GPa for Fe but only $0.2$ GPa for Fe-10V. The previous numbers may be obtained by comparing $\sigma_{\text{m}}$ from Fig. \[fig:alloysstress\] with the ITSs obtained with the fixed-spin moment constraint depicted in Fig. \[fig:fitting\] (open pentagons). The latter strength values are plotted in comparison to the previously determined ITSs computed without a constraint on the magnetic moments but for fixed volume ($\sigma^{\Omega}_{\text{m}}$). The alloying trend that both curves for Fe-V follow in Fig. \[fig:fitting\] is alike, and the resulting stresses are essentially much larger than $\sigma_{\text{m}}$ of Fe ($4.0$ GPa for the fixed-spin moment value and $5.0$ GPa for $\sigma^{\Omega}_{\text{m}}$) but only slightly to moderately larger than $\sigma_{\text{m}}$ of Fe-10V ($0.2$ GPa for the fixed-spin moment value and $1.6$ GPa for $\sigma^{\Omega}_{\text{m}}$). Thus, fixing the volume but allowing for a relaxation of the magnetic moments produces essentially the same alloying effect than fixing the magnetic moment but taking into account structural relaxations.
However, as we pointed out above, the magnetic moment is almost unchanged along the constant volume deformation owing to the weak influence of the $c/a$ ratio. Thus, we conclude, that the main contribution to the difference of $\sigma^{\Omega}_\text{m}$ and $\sigma_{\text{m}}$ originates from a magnetic contribution to the total energies which is associated with the relaxation of the spin magnetic moment to its self-consistent value. This magnetic contribution is accordingly the largest for Fe, which can be partly ascribed to the comparatively small volume at equilibrium. Both the reduced volume change and the involved reduced magnetic contribution to the stress bring forth the convergence of $\sigma^{\Omega}_{\text{m}}$ to $\sigma_\text{m}$ for the investigated Fe-alloys with 10% solute concentration.
Returning in conclusion to Eq. , the correlation between $\sigma_\text{m}$ and $\sigma^{\text{SED}}_{\text{m}}$ fails due to magnetism in Fe and the investigated Fe alloys. That is, the alloying trend on the fcc-bcc SEDs at fixed volume can not capture the alloying trend on the energy-strain landscape and hence the ITS of the uniaxial deformation path as opposed to nonmagnetic V-Ti-Cr alloys. [@Xiaoqing:2012]
Conclusions
===========
The ideal tensile strengths of bcc ferromagnetic Fe and Fe$_{1-x}M_{x}$ (*M*=Cr, Ni, Al, Co, Mn, and V) random alloys in the $[001]$ direction have been investigated using the all-electron exact muffin-tin orbitals method in combination with the coherent-potential approximation. The present calculated ideal strength value of Fe and the branching point from the primary bct deformation path to the secondary orthorhombic deformation path of Fe agree well with previously published results, which thus confirms that our methodology has the accuracy needed for such kind of calculations. For the Fe-based alloys, we found that the ideal strength increases with increasing concentration of Cr, Co, and V and decreases with Ni and Al addition into pure Fe. Mn shows a non-monotonous alloying behavior. Unlike the nonmagnetic bcc V-based alloys investigated in our previous paper, [@Xiaoqing:2012] constant volume fcc-bcc structural energy differences can not entirely capture the alloying effect on the ideal tensile strength for the FM bcc Fe-based alloys. By calculating auxiliary ideal strengths assuming a constant volume deformation ($\sigma^{\Omega}_{\text{m}}$) and fixed-spin moment calculations along the (kept unaltered) tetragonal deformation paths, we showed that mainly the interplay between the volume increase and magnetic moment increase along the tetragonal deformation paths lead to a failure of the correlation between $\sigma_\text{m}$ and $\sigma^{\text{SED}}_{\text{m}}$.
The present results offer a consistent starting point for further theoretical modeling of the micro-mechanical properties of Fe-based alloys. Based on these achievements, we conclude that the EMTO-CPA approach provides an efficient and accurate theoretical tool to design the mechanical strength of ferromagnetic bcc random solid solutions Nevertheless, in such applications one should always monitor the basic muffin-tin and single-site CPA errors and make sure that they remain at acceptable level as a function of the lattice distortion and chemical composition.
ACKNOWLEDGEMENTS
================
The Swedish Research Council, the Swedish Steel Producers’ Association, the European Research Council, the China Scholarship Council and the Hungarian Scientific Research Fund (research project OTKA 84078), and the National Magnetic Confinement Fusion Program of China (2011GB108007) are acknowledged for financial support. S. S. gratefully acknowledges the Carl Tryggers Stiftelse för Vetenskaplig Forskning and Olle Erikssons stiftelse för materialteknik.
[58]{}ifxundefined \[1\][ ifx[\#1]{} ]{}ifnum \[1\][ \#1firstoftwo secondoftwo ]{}ifx \[1\][ \#1firstoftwo secondoftwo ]{}““\#1””@noop \[0\][secondoftwo]{}sanitize@url \[0\][‘\
12‘\$12 ‘&12‘\#12‘12‘\_12‘%12]{}@startlink\[1\]@endlink\[0\]@bib@innerbibempty @noop [****, ()]{} @noop [**]{} (, , ) @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [ ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} in @noop [**]{}, (, , ) p. @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [**]{} (, , ) @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [**]{}, Vol. (, , ) @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{} @noop [****, ()]{}
|
{
"pile_set_name": "Pile-CC"
} | 1. I like it when she has really good taste in music, even if it’s different than mine. I just like a girl who’s passionate about music.
-Lucas, 22
2. Good artistic abilities. Like she’s got some kind of interesting talent – painting, drawing, singing, writing, playing an instrument, whatever. It makes me want to learn more about her.
-Trey, 23
3. A woman who always smiles. There’s nothing more attractive than a woman who’s smiling all the time.
-Chase, 30
4. I love it when she’s always really happy to see me. Like when she gives me a big huge or smiles a lot when we see each other. It just makes me even more excited to be around her.
-Jackson, 19
5. Somebody who you can talk to really easily. Where you don’t have to try very hard and the conversation just flows really easily and really naturally. It’s nice when a girl’s attractive but if you can’t talk to her you can only go so far.
-Liam, 26
6. Boldness. When she’s really confident and fearless when it comes to doing anything.
-Nicholas, 26
7. Independence and confidence: she’s not afraid to speak up and share her thoughts. She’ll talk to anyone about anything and she’s very sure of herself in front of other people.
-Alex, 25
8. Someone who is open-minded and won’t judge you. I need to be with someone who makes me feel comfortable bringing stuff up to her and doesn’t make me worry about what she’s going to think of me.
-William, 26
9. She has to be comfortable enough to let me have my freedom and she’s got to have her own independent life too. I have to know that she trusts me and I don’t have to worry about her ever freaking out about me having my own friends and my own social life.
-Kevin, 22
10. Honesty. There’s nothing I admire more in a woman than honesty and the ability to be truthful and open with me.
-Daniel, 28
11. Being good with kids. I want to have a family and I want to know that she’s nurturing and would be a good mother.
-Logan, 29
12. She can easily befriend anyone and literally have a conversation with anybody. If I’m going to introduce her to my family or my friends I don’t want to have to worry about her sitting in the corner feeling awkward. I just love a girl who can navigate her way through any social situation.
-Connor, 25
13. A girl who doesn’t get jealous easily. We’re both gonna have plenty of friends of the opposite sex and it’s just so much easier to be with someone who isn’t constantly getting jealous and feels confident about our relationship.
-Jack, 21
14. When she’s not obsessed with social media and taking pictures every five seconds. There’s nothing more annoying than a girl trying to update her Snapchat story constantly. It’s so much more attractive when a girl can just be in the moment.
-Michael, 22
15. Someone who shares my values.
-James, 26
16. A girl with an awesome sense of humor and a love of goofing around and being silly. She doesn’t take life too seriously.
-Stephen, 24
17. A girl who doesn’t worry constantly about what everybody thinks of her. That’s exhausting.
-Mark, 22
18. We’ve got to have chemistry. That doesn’t have to be only physical. Just chemistry in the sense that we can joke around together and have interesting conversations and talk easily together. Something where you just “click” with her.
-Anthony, 28
19. Integrity.
-Bryce, 31
20. A happy attitude. Someone who can be optimistic.
-Chris, 25
21. A girl who takes care of herself, like she exercises and treats her body well. I want to be with someone who’s going to be healthy for the long haul.
-Mike, 27
22. A girl who’s comfortable with herself. She likes herself and she’s not trying to be anyone else. Then we can spend less time on me trying to make her feel like she’s good enough and more time enjoying each other.
-Dan, 23
23. A girl who doesn’t need to go on fancy dates all the time. Someone who’s comfortable hanging out on the couch and drinking beer.
-Blaise, 24
24. A girl who has ambition and doesn’t feel weird about it.
-Cory, 28
25. A girl who surprises me, by liking things or doing things that I wouldn’t expect from her. And when she does something sweet to surprise me, like showing up with my favorite beer when she comes over.
-Nate, 26
26. When she has a really cute and infectious laugh. It just makes me laugh too.
-Ben, 22
27. When she has a really sweet scent that’s not overwhelming. Not too much perfume or anything. She just has a really fresh, unique scent.
The cover and theme for my newest book was inspired by the concept of kintsugi. All that is dark or cracked within us has the capacity to be fixed, to be filled with light. We are never broken. We are always becoming. ✨
“Live a life that is driven; not by fear, but by love.” — Bianca Sparacino
Creativity can strike at any moment — make sure you’re prepared for it.
To help you do that, we created a functional backpack with the everyday artist in mind. Whether you’re going to school, embarking on a new adventure, or simply just exploring the world around you, take your passion with you.
We hope that this backpack becomes a home for the stories you love, the stories you’ve told and the stories you’ve yet to tell.
[…] Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: 18 Uplifting Things To Tell Yourself When You Have A Broken Heart Read this: 10 Truths Every Unapologetic Girl Learns By Age 25 Cataloged in […]
https://thoughtcatalog.com/kim-quindlen/2015/02/the-high-you-get-from-doing-the-thing-that-scares-you-the-most/ The High You Get From Doing The Thing That Scares You The Most | Thought Catalog
[…] Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: How To Study Abroad Without Making Anyone Hate You Read this: 10 Truths Every Unapologetic Girl Learns By Age 25 Cataloged in […]
https://syukriarabi.wordpress.com/2015/02/02/the-type-of-woman-i-wanna-married-to/ The type of woman I wanna married to – Pause & Reflect
[…] found this interesting article of ThoughtCatalog about “27 Guys On The One Personality Trait They Can’t Resist In A Girl“. It is a list of woman character that men found interesting and can’t resist it. I […]
https://thoughtcatalog.com/heidi-priebe/2015/02/12-habits-every-youngest-child-in-the-family-carries-into-their-20s/ 12 Habits Every Youngest Child In The Family Carries Into Their 20s | Thought Catalog
[…] Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: 15 Intimate Things Happy Couples Do That Have Nothing To Do With Sex Read this: Devastating: Man Finds Out His Wife Is Cheating, Liveblogs His Private Investigator Catching Her In The Act, Finds Out His Sister-In-Law Is Involved Cataloged in […]
https://thoughtcatalog.com/kim-quindlen/2015/02/18-things-you-should-know-about-girls-who-seem-put-together-but-are-secretly-a-hot-mess/ 18 Things You Should Know About Girls Who Seem Put Together (But Are Secretly A Hot Mess) | Thought Catalog
[…] Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: The High You Get From Doing The Thing That Scares You The Most Read this: 10 Truths Every Unapologetic Girl Learns By Age 25 Cataloged in […]
[…] Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: 33 Ways To Be An Insanely Productive, Happy Balanced Person Read this: 36 Quotes For When You Need To Motivate Yourself To Keep Going Cataloged in […]
https://thoughtcatalog.com/heidi-priebe/2015/02/heres-where-you-should-live-based-on-your-myers-briggs-personality-type/ Here’s Where You Should Live Based On Your Myers-Briggs Personality Type | Thought Catalog
[…] this: 36 Quotes For When You Need To Motivate Yourself To Keep Going Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: 33 Ways To Be An Insanely Productive, Happy Balanced Person Cataloged […]
https://thoughtcatalog.com/johanna-mort/2015/02/17-reasons-harry-potter-fans-are-the-best-people-to-date/ 17 Reasons Harry Potter Fans Are The Best People To Date | Thought Catalog
[…] this: 15 Details In The Harry Potter Books You Missed The First Time Around Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: 23 Things You Didn’t Think About When You Said You Want To Live In The Harry Potter […]
https://thoughtcatalog.com/johanna-mort/2015/02/what-guarded-people-are-trying-to-tell-you-vs-what-they-actually-say/ What Guarded People Are Trying To Tell You Vs. What They Actually Say | Thought Catalog
[…] Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: “I Was Aware Of Everything”: Man Awakens From 12-Year Coma Read this: 10 Ways You’re Making Your Life Harder Than It Has To Be Cataloged in […]
[…] this: 20 Beautifully Honest Quotes About Love Read this: 9 Ways Guarded People Show They Love You Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Cataloged […]
https://thoughtcatalog.com/johanna-mort/2015/04/17-people-you-undoubtedly-knew-while-in-high-school-band/ 17 People You Undoubtedly Knew While In High School Band | Thought Catalog
[…] more writing like this from Johanna, follow her on Facebook. Read this: 27 Guys On The One Personality Trait They Can’t Resist In A Girl Read this: 27 Guys On The One Personality Trait They Can’t Resist In A […]
http://www.topwebcamchatsites.com/how-to-tell-which-cam-girls-are-worth-private-chats/ How To Tell Which Cam Girls Are Worth Taking Private | Top Webcam Chat Sites
[…] after simply watching her for a minute or two, only to realize in their private show that they hate her personality, her attitude, or even her laugh. Make sure you take some time to talk to a cam girl during her […] |
{
"pile_set_name": "StackExchange"
} | Q:
Auto align "var" under JavaScript in PhpStorm (7.0.1)
I've been using PhpStorm (now 7.0.1) for several months now and am more than satisfied, especially with the code formatting. However, even though the auto formatting works very well in PHP and HTML, I just can't figure out how to make PhpStorm automatically align vars from this:
var my_variable = "my value";
var your_variable = "your value";
to this:
var my_variable = "my value";
var your_variable = "your value";
I've spent hours playing around with the code styling settings but still can't get it done. I would have expected the option Settings > Code Style > JavaScript > Other > Align object properties: On value would be what I'm looking for but unfortunately it does not change anything, neither in the current nor in a fresh project.
Any ideas?
A:
First of all: Settings > Code Style > JavaScript > Other > Align object properties: On value has nothing to do with variable alignment.
Second: This option (Align multiline variable declaration) is NOT available in v7 -- ONLY in upcoming v8.
EAP (Early Access Program) for PhpStorm v8 has already started and option is there. Unfortunately, it is buggy (IDE just hangs straight away when this option is activated). Issue has been fixed already .. but I cannot tell in which of next EAP builds it will be available -- just keep an eye on build number (Help | About) -- it should be 136.1141 or newer.
A:
just adding a thought here on the option Align multiline variable declaration:
This option would NOT give you exactly what you asked for in your question, but what it would do is turn this:
var first = "something",
second = "something else";
...into this:
var first = "something",
second = "something else";
..which i.m.o. does make more sense w.r.t. formatting. Aligning separate statements (like the two var statements in the question) may not always make sense.
|
{
"pile_set_name": "Pile-CC"
} | Moi has posted quite a bit about autism. Studies indicate that the incidence of autism is growing in the population. In order for children with autism to reach their full potential there must be early diagnosis and treatment. Alice Park of Time reported in the article, U.S. Autism Rates Jump 30% From 2012 http://time.com/#40524/u-s-autism-rates-jump-30-from-2012/ In Archives of Pediatrics and Adolescent Medicine study: Kids with autism more likely to be bullied moi wrote:
Science Daily reported in the article, Study Details Bullying Involvement for Adolescents With Autism Spectrum Disorder:
A study based on information collected from 920 parents suggests an estimated 46.3 percent of adolescents with an autism spectrum disorder were the victims of bullying, according to a report published Online First by Archives of Pediatrics & Adolescent Medicine, a JAMA Network publication….http://www.sciencedaily.com/releases/2012/09/120903221126.htm
There are signs that a particular child may be vulnerable to bullying.
In School bullying: Office of Juvenile Justice and Delinquency report, moi wrote:
The Department of Justice’s Office of Juvenile Justice and Delinquency has issued the report, Bullying in Schools: An Overview by Ken Seeley, Martin L. Tombari, Laurie J. Bennett, and Jason B. Dunkle. Among the study’s findings are:
• Bullying is a complex social and emotional phenomenon that plays out differently on an individual level.
• Bullying does not directly cause truancy.
• School engagement protects victims from truancy and low academic achievement.
• When schools provide a safe learning environment in which adults model positive behavior, they can mitigate the negative effects of bullying.
• Any interventions to address bullying or victimization should be intentional, student-focused engagement strategies that fit the context of the school where they are used.
The report makes the following recommendations:
• Increase student engagement.
• Model caring behavior for students.
• Offer mentoring programs.
• Provide students with opportunities for service learning as a means of improving school engagement.
• Address the difficult transition between elementary and middle school (from a single classroom teacher to teams of teachers with periods and class changes in a large school) (Lohaus et al., 2004).
• Start prevention programs early.
• Resist the temptation to use prefabricated curriculums that are not aligned to local conditions.
Increase Student Engagement
Bullied children who remain engaged in school attend class more frequently and achieve more. Challenging academics, extracurricular activities, understanding teachers and coaches, and a focus on the future help keep victimized children engaged in their education (Bausell, 2011). Schools, administrations, and districts that wish to stave off the negative effects of bullying must redouble their efforts to engage each student in school. Typical school engagement strategies include (Karcher, 2005):
• Providing a caring adult for every student through an advisory program or similar arrangement.
• Carefully monitoring attendance, calling home each time a student is absent, and allowing students the ability to make up missed work with support from a teacher.
• Adopting and implementing the National School Climate Standards from the National School Climate Council (2010).
• Promoting and fostering parent and community engagement, including afterschool and summer programs.
• Providing school-based mentorship options for students. http://www.ojjdp.gov/pubs/234205.pdf
A widely publicized case of two Maryland teenagers charged with assault for bullying a classmate with autism—a classmate who later strongly defended them—illustrates the complexities that schools face with youth whose disabilities are based in social interactions.
Autism spectrum disorder, characterized by social impairment and communication difficulties, leaves some youths less able to recognize teasing or bullying when it occurs, said Ellen F. Murray, a clinical manager at the Center for Autism and Related Disorders in Alexandria, Va.
“They may not even understand teasing if it’s happening right in front of them, much less if it’s behind their back,” said Ms. Murray. “A lot of our kids would definitely not pick up on those social cues and understand the perspective of another student.”
With those challenges in mind, experts say that one way for schools to address bullying of students with autism is to take a step back and examine the entire school environment. And, while social-skills training is commonly a part of the individualized education program, or IEP, for students with autism, such instruction should not be limited just to them, experts say….
Fostering Connections
Schools are using a variety of approaches and individual programs to improve social interactions between students with developmental disabilities such as autism and their typically developing peers.
Peer Adovcacy
The Parent Advocacy Coalition for Educational Rights Center, or PACER, based in Bloomington, Minn., has several bullying-prevention resources for schools, including a toolkit to help start a peer-advocacy program. Such programs use the power of peer influence, and students can often spot problem behavior before adults do.
Positive Behavioral Supports
This schoolwide intervention framework supported by the U.S. Department of Education, offers schools a way to organize and monitor behavioral expectations for students and adults.
Second Step
This program, used in more than 30,000 schools and aimed at students ages 4 to 14, includes in-school lessons on empathy, emotion management, and problem-solving. It also includes lessons for all students in how to recognize, respond to, and report bullying.
Remaking Success
Currently being studied in several schools, this program enlists paraprofessionals who often “shadow” students with disabilities as active coaches on the playground, bringing children together and creating opportunities for joint play. The program has shown some success in expanding the social networks of students.
SOURCES: The National Bullying Prevention Center; StopBullying.gov; Autism Intervention Research Network on Behavioral Healthhttp://www.edweek.org/ew/articles/2014/05/07/30autism_ep.h33.html?tkn=SQXF7qgMjGrAX60B0LbyHDeFR8O3wkbWbRkr&intc=es
The American Psychological Association (APA) has information about bullying.
The APA has the following suggestions for teachers and administrators:
Be knowledgeable and observant
Teachers and administrators need to be aware that although bullying generally happens in areas such as the bathroom, playground, crowded hallways, and school buses as well as via cell phones and computers (where supervision is limited or absent), it must be taken seriously. Teachers and administrators should emphasize that telling is not tattling. If a teacher observes bullying in a classroom, he/she needs to immediately intervene to stop it, record the incident and inform the appropriate school administrators so the incident can be investigated. Having a joint meeting with the bullied student and the student who is bullying is not recommended — it is embarrassing and very intimidating for the student that is being bullied.
Involve students and parents
Students and parents need to be a part of the solution and involved in safety teams and antibullying task forces. Students can inform adults about what is really going on and also teach adults about new technologies that kids are using to bully. Parents, teachers, and school administrators can help students engage in positive behavior and teach them skills so that they know how to intervene when bullying occurs. Older students can serve as mentors and inform younger students about safe practices on the Internet.
Set positive expectations about behavior for students and adults
Schools and classrooms must offer students a safe learning environment. Teachers and coaches need to explicitly remind students that bullying is not accepted in school and such behaviors will have consequences. Creating an anti-bullying document and having both the student and the parents/guardians sign and return it to the school office helps students understand the seriousness of bullying. Also, for students who have a hard time adjusting or finding friends, teachers and administrators can facilitate friendships or provide “jobs” for the student to do during lunch and recess so that children do not feel isolated or in danger of becoming targets for bullying. http://www.apa.org/helpcenter/bullying.aspx
Stop Bullying.gov has some great advice about bullying.
According to the Stop Bullying.gov article, What You Can Do:
What to Do If You’re Bullied
There are things you can do if you are being bullied:
• Look at the kid bullying you and tell him or her to stop in a calm, clear voice. You can also try to laugh it off. This works best if joking is easy for you. It could catch the kid bullying you off guard.
• If speaking up seems too hard or not safe, walk away and stay away. Don’t fight back. Find an adult to stop the bullying on the spot.
There are things you can do to stay safe in the future, too.
• Talk to an adult you trust. Don’t keep your feelings inside. Telling someone can help you feel less alone. They can help you make a plan to stop the bullying.
• Stay away from places where bullying happens.
• Stay near adults and other kids. Most bullying happens when adults aren’t around.http://www.stopbullying.gov/kids/what-you-can-do
Even though children are encouraged to report bullying, they often don’t. We must encourage children to report bullying.
Resources:
For more information on neurological disorders or research programs funded by the National Institute of Neurological Disorders and Stroke, contact the Institute’s Brain Resources and Information Network (BRAIN) at:
BRAIN
P.O. Box 5801
Bethesda, MD 20824
(800) 352 9424 http://www.ninds.nih.gov |
{
"pile_set_name": "Pile-CC"
} | This very minimalistic plugin allows you to create a tab (file? view?) that lists all tabs (files? views?) in the current window. You can move down/up with n/p or j/k and you can select the current one with Return and you can quit the whole thing with q.
I find that a list in this format is easier to digest than the horizontal list of tabs across the top of the window. |
{
"pile_set_name": "Pile-CC"
} | After reading a Columbus Dispatch review of the Greater Cleveland Aquarium, we decided to test the waters ourselves.
Located in the FirstEnergy Powerhouse, the Greater Cleveland Aquarium has re-purposed this national historic landmark in a way that takes architectural juxtaposition to a new height.
Designed by New Zealand based Marinescape, hard surfaces of exposed brick walls and steel girders contrast with flowing water and the constant movement of its inhabitants. A worm’s-eye view looking up through the massive overhead smokestacks provides a reminder of the building’s original purpose – generating electricity for the city’s 19th century streetcar system.
Nestled in the Cleveland Flats, the aquarium could be viewed as a phoenix risen from the ashes of Cleveland’s industrial past – a positive image for the crooked river that lays to rest Cuyahoga River’s former reputation of the river that once burned. |
{
"pile_set_name": "Pile-CC"
} | Press
HONG KONG and LOS ANGELES, Oct. 29, 2013 /PRNewswire/ -- IMAX Corporation (NYSE: IMAX, TSX: IMX) and TCL Multimedia Technology Holdings Limited (HKSE stock code: 01070), one of the world's leading consumer electronics companies, today announced a joint venture agreement to design, develop and manufacture a premium home theatre system that will deliver a best-in-class home entertainment experience. The companies expect to launch the new system inChina and select other global markets in 2015.
The new 4K fully integrated home theatre system will provide a more accessible and versatile solution that complements the IMAX Private Theatre, IMAX's recent entry into the ultra-high-end market. The new system will incorporate components of IMAX's best-in-class projection and sound technology adapted for a broader home environment. Customers will also be able to access current theatrical releases that have been digitally re-mastered into the IMAX format, and will receive unrivaled maintenance and service.
"Our recent introduction of the cinema-grade IMAX Private Theatre, the partnership with PRIMA and, now, our joint venture with TCL, are all part of our carefully designed effort to expand the IMAX brand to additional platforms. While we are very excited about these opportunities, we remain firmly committed to our critical, long-term relationships with our commercial exhibition and studio partners, and to the success of the cinema industry in general," said IMAX CEO Richard L. Gelfond. "As one of the fastest-growing and most innovative players in the global entertainment technology marketplace, with a strong expertise in display and manufacturing, TCL is an ideal partner to help us change the way people around the world experience their favorite content in the home environment."
"As content viewing in the home is constantly improving, we wanted to stake out an entirely new position in the premium home theatre market," said TCL Chairman Mr.Li Dongsheng, "There is no company better-equipped and more knowledgeable than IMAX to deliver that premium experience. Together, we plan to leverage the complementary assets of our companies to create a high-quality, end-to-end home theatre solution."
The parties' 50/50 joint venture will initially operate in Hong Kong and Mainland China and include research and development, sales, marketing and manufacturing, and feature IMAX-enhanced, current theatrical content delivered to the home through PRIMA Cinemas' secure transmission system. The parties are also in discussions with local content providers regarding a variety of options in and aroundGreater China. The joint venture's board will consist of representatives from both companies, with IMAX Chief Business Development Officer Robert D. Lister serving as chairman.
About TCL & TCL MultimediaTCL Corporation (TCL) is one of the largest consumer electronics groups in the world. The Group's global production and sales network spans over 80 countries and regions, selling TCL TVs, mobile phones and household appliances, along with Thomson TVs in Europe and Alcatel mobile phones.
With 40 sales offices around the world and around 70,000 employees, TCL operates 18 R&D centers, with more than ten centers in Asia, North America andEurope, and owns 20 manufacturing bases in Asia, Europe and Latin America.
In 2012, TCL Corporation achieved global sales of US$11.2 billion with 10.9 million LCD TV sets and 43.6 million handsets sold globally. The TCL brand was worthUS$10.5 billion as of September 2013, and according to DisplaySearch, the Group's global LCD TV market share increased from 5.8% in Q4 2012 to 6.7% in H1 2013, ranking among the world's top 3.
About IMAX CorporationIMAX, an innovator in entertainment technology, combines proprietary software, architecture and equipment to create experiences that take you beyond the edge of your seat to a world you've never imagined. Top filmmakers and studios are utilizing IMAX theatres to connect with audiences in extraordinary ways, and, as such, IMAX's network is among the most important and successful theatrical distribution platforms for major event films around the globe.
IMAX is headquartered in New York, Toronto and Los Angeles, with offices inLondon, Tokyo, Shanghai and Beijing. As of Sept. 30, 2013, there were 785 IMAX theatres (653 commercial multiplexes, 19 commercial destinations and 113 institutions) in 55 countries.
This press release contains forward looking statements that are based on IMAX management's assumptions and existing information and involve certain risks and uncertainties which could cause actual results to differ materially from future results expressed or implied by such forward looking statements. These risks and uncertainties are discussed in IMAX's most recent Annual Report on Form 10-K and most recent Quarterly Reports on Form 10-Q. |
{
"pile_set_name": "PubMed Abstracts"
} | Increased mortality rate in diabetic rats submitted to acute experimental myocardial infarction.
Diabetes mellitus is well known to increase the death rate after acute myocardial infarction in humans. The mechanisms of this adverse effect of diabetes, however, remain unknown. In the present study an animal model was developed in which the influence of diabetes on the survival rate after acute myocardial infarction could be studied in more detail. Male Wistar rats were rendered diabetic with streptozotocin (45 mg X kg-1 intravenously) and kept in the study if one week later their tail blood glucose concentration was between 13.9 and 22.2 mmol X litre-1 after a four hour fast. Ten weeks later they underwent acute left coronary artery ligation. In comparison with control rats (n = 30), diabetic rats (n = 32) had a higher mortality in the first 20 minutes after acute coronary artery ligation (78% vs 53%; p less than 0.05 by chi 2 test). Creatine kinase-MB isoenzyme activity tended to increase less in surviving diabetic rats than in their non-diabetic counterparts. Moreover, blood samples collected a few minutes before the surgical procedure showed that diabetic rats dying within the first 20 minutes (n = 25) had higher mean (SEM) plasma glucose concentrations (26.9(0.5) vs 23.4(1.2) mmol X litre-1; p less than 0.01) and lower mean(SEM) plasma insulin concentrations (20(1) vs 26(2) mU X litre-1; p less than 0.05) than those (n = 7) that survived that critical period.(ABSTRACT TRUNCATED AT 250 WORDS) |
{
"pile_set_name": "USPTO Backgrounds"
} | 1. Field of the Invention
This invention relates to thermally regenerated, reciprocating, internal combustion engines that employ a movable regenerator.
2. Description of the Related Art
Thermal regeneration is the capturing of waste heat from a thermodynamic cycle (or a heat engine operating on some thermodynamic cycle), and the utilization of that energy within the cycle or engine to improve the cycle or engine's performance. This is commonly done with many heat engines, including Stirling engines, gas turbines, and Rankine cycle devices. In a gas turbine, consisting of a compressor, combustor, and turbine, the temperature of the air leaving the turbine is often greater than the temperature of the air leaving the compressor. If the energy in the turbines exhaust can be transferred to the air leaving the compressor, it will not be necessary to add as much heat (fuel) in the combustor to raise the air temperature to the desired turbine inlet temperature. This means that the same work is accomplished, but less fuel is employed. Therefore, the specific fuel consumption of such a thermally regenerated gas turbine is improved. Thermal regeneration of gas turbines is commonly accomplished by the use of a heat exchanger that transfers energy from the exhaust gases to the compressed air.
Gasoline and diesel engine operation is generally approximated by a thermodynamic cycle referred to as the Otto cycle. In principle, an Otto cycle can also be thermally regenerated. This would be done by transferring heat from the gases at the conclusion of the expansion stroke to the gases of the next cycle at the conclusion of the compression stroke. The benefits that can be thus attained are substantial. Fuel consumption is reduced in a manner similar to that of the regenerated gas turbine. In addition, a regenerated Otto cycle is thermodynamically capable of providing higher gas temperatures during the cycle, which results in even greater improvements in efficiency and power. Since reciprocating engines only experience these higher temperatures for brief times, they can withstand these higher temperatures to some extent. Thus the benefits of regeneration are even greater for an Otto cycle device than they are for the temperature limited gas turbine.
The advantages of thermally regenerated gasoline or diesel engines are readily apparent and quite substantial. Unfortunately, viable and effective means by which this can be accomplished have not previously been developed. The difficulty lies in the fact that the compression, heating and expansion processes occur in the same location--i.e. within the cylinder. This makes it difficult to conceive of some means by which the heat can be captured and transferred to the compressed air at a different time in the cycle. For a gas turbine, which is a steady flow device with the cycle processes separated in space, it is relatively easy to add a heat exchanger at the appropriate place. It is much more difficult to do this in a non-steady flow, reciprocating engine where all the processes occur in the same location.
The approach taken by most inventors who attempted to incorporate regeneration into reciprocating internal combustion engines was to separate the engine processes in space. In this way it becomes relatively easy to insert a heat exchanger between the engine components that accomplish each process. This has led to a number of approaches such as those of Hirsch (1874, U.S. Pat. No. 155,087), Martinka (1937, U.S. Pat. No. 2,239,922), Pattas (1973, U.S. Pat. No. 3,777,718), Bland (1975, U.S. Pat. No. 3,871,179), Pfefferle (1975, U.S. Pat. No. 3,923,011), Cowans (1977, U.S. Pat. No. 4,004,421), Stockton (1978, U.S. Pat. No. 4,074,533), Webber (1986, U.S. Pat. No. 4,630,447), Ruiz (SAE paper 930063, 1993), and Carmichael (Chrjapin Master's thesis, MIT, 1975). All of these approaches involve at least two cylinders, generally one in which compression occurs and a second where the combustion and expansion occur. In the flow passage connecting these cylinders or in one of the cylinders there is a stationary permeable material that comprises the regenerator. The regenerator is an alternating flow heat exchanger. The expanded combustion gases are passed through the regenerator and transfer thermal energy to it. During the next cycle compressed air is forced through the regenerator and absorbs this energy. Thus heat is transferred from the hot exhaust gases to the compressed air--the essence of thermal regeneration.
Unfortunately, none of these earlier approaches for regeneration of internal combustion reciprocation engines have been successful. The reason for their failure lies in a basic feature of those approaches--the separation of the processes into different cylinders. Because some air and exhaust is always trapped in the transfer passages, because of "blowdown" losses between cylinders in some designs, and because not all of the air can be regeneratively heated or cooled, or be in the appropriate locations at the optimum times, the performance of these engines is reduced.
More recently, a new approach has been conceived. This new approach allows the processes to occur within a single cylinder. The most unique feature of this new approach is a movable regenerator. This regenerator is in the form of a thin disc with a diameter essentially equal to the engine bore. This regenerator disc is located between the cylinder head and the piston. This moving regenerator sweeps through all of the internal volume of the cylinder twice during each engine operating cycle. As it moves through the gas in the cylinder, it exchanges energy with that gas. One sweep removes energy from the expanded combustion products. The other sweep transfers this energy to the compressed working fluid near the conclusion of the next compression stroke. The regenerator movement that occurs near the end of the expansion stroke and cools the combustion products is referred to as the regenerative cooling stroke. The regenerator movement that starts near the end of the compression stroke and heats the compressed air is referred to as the regenerative heating stroke. Inventions based upon this approach of a movable regenerator are included in the patents of Ferrenberg (1988, U.S. Pat. No. 4,790,284 and 1990, U.S. Pat. No. 4,928,658) and Millman (1981, U.S. Pat. No. 4,280,468).
Regenerated engines employing movable regenerators that sweep through the interior volume of the cylinder can be divided into two classes: those in which the combustion occurs between the piston and the regenerator (hot piston designs) and those in which the combustion occurs between the regenerator and the cylinder head (cool or cold piston designs). The "hot volume" is always the volume where the combustion occurs and the "cold volume" lies on the other side of the regenerator. The side of the regenerator that faces the hot volume is referred to as the hot side of the regenerator and the side of the regenerator that faces the cold volume is the cold side of the regenerator.
In addition to other regenerated engine inventions unrelated to this patent application, Millman (U.S. Pat. No. 4,280,468) discloses and claims a hot piston regenerated engine operating on a four stroke cycle. This engine of Millman's lacks a regenerative cooling stroke. Instead, he maintains the regenerator stationary and adjacent to the valves in the cylinder head while the blowdown and the exhaust occur. This is a serious deficiency in the manner in which the energy is extracted from the working fluid by the regenerator that can substantially degrade engine performance. In addition, Millman does not consider the use of different compression to expansion ratios, cool piston regenerated engines, two stroke regenerated engines, and regenerated engines incorporating many of the other features and innovations disclosed in this patent application.
The previous disclosures of Ferrenberg (U.S. Pat. Nos. 4,790,284 and 4,928,658) cover both two and four stroke, and hot and cool piston regenerated engines. However, these earlier inventions have some basic deficiencies that are corrected by the substantially different operation of the regenerated engine disclosed herein. In addition, these earlier engines do not include the use of, or means for, differing compression and expansion ratios, the introduction of fuel by means other than direct injection into the combustion region, throttling as a means to reduce power and maintain high efficiency, the use of flush mounted valves in cool piston engines, the use of regenerators made from ceramic foam materials, pneumatic regenerator lifters, and other features and innovations disclosed herein. In addition, these earlier patents of Ferrenberg maintain the regenerator stationary during the blowdown or fail to substantially complete the regenerative cooling stroke prior to the blowdown. This is similar to the deficiency of Millman's engine. Also, the earlier disclosures and claims of Ferrenberg specifically close the exhaust valve prior to the opening of the intake valve in all regenerated engines employing valves. It is highly advantageous to have both valves open at the same time, for a short period.
Other substantial differences exist between the earlier inventions of Millman and Ferrenberg, and the regenerated engine disclosed herein. All of these are discussed in greater detail in the section entitled "Detailed Description of the Invention". |
{
"pile_set_name": "StackExchange"
} | Q:
How can i convert strings placed in JtextField component into an integer
I'm new to java and I have tried a lot in converting strings placed in a JTextField Component into an integer type, but I couldn't. So kindly help me with this problem.
A:
I guess you're trying to parse the String got from the user input on JTextField and not the JTextField at all, so it should be something like this.
JTextField myTextField = new JTextField();
String textFromTextField = myTextField.getText();
int number = Integer.parseInt(textFromTextField);
System.out.println(number);
|
{
"pile_set_name": "OpenWebText2"
} | Bryan Caplan argues that economists’ use of math has not passed the cost-benefit test, claiming that our intuition is a much more important tool. Paul Krugman responds by mostly agreeing, but noting that sometimes mathematical models help you think through complicated concepts. I’m not sure Caplan’s follow-up addresses Krugman’s point, and, in my opinion, Krugman is right. The point is that models can help our intuition and economics is better off because of it.
My summary of Krugman’s argument: intuition isn’t always right. He gives as an example his experience in trade theory, specifically his development of economies of scale theories of specialization. He notes that there were economists who did foresee his contribution, but that they had mainly come away with erroneous conclusions. Specifically, they were using the economies of scale argument to advocate protectionism. When Krugman developed a simple model and used it to think through these issues he found that, surprise surprise, these economists’ intuitions were wrong and that economies of scale was not a good argument, on its own, for certain types of protections (e.g. tariffs to protect infant industries).
Another example: Austrian business cycle theory. ABCT has been pretty well developed, mostly through the use of intuition (although, Hayek very much believed in the strength of using a simplified mathematical model). However, there continues to be certain ambiguities that have probably gotten worse over time. Take, for example, the differences between Garrison’s and Hayek’s theories (of where inputs are allocated during the boom). If we had a good model, these differences would be easier to work through. Likewise, Austrians generally have only a very broad idea of what the bust looks like, and a model might help stimulate intuitive insights in this area.
When there are only a handful of variables to think about, intuition without a model can be useful. But, we can think of intuition as having diminishing returns and these returns can be manipulated by increasing the “productivity of intuition” with a model. They help keep our thinking straight, especially when we have to keep track of so many things that it muddles our thinking. I’m not using economic terms only as analogies, either. One of the points made by Daniel Kahneman in Thinking, Fast and Slow is that our brains can only think about so many things. By using a model you can “automate” some thinking (e.g. keeping assumptions and variables straight), allowing your brain to work where it’s most useful: intuitive insights. I’d argue, even, that a use of a model not only helps guarantee greater intuitive accuracy, but helps achieve results faster than would otherwise be the case.
One thing that should be said, and that is on Caplan’s side of the debate, is that you can’t substitute models for intuition. Krugman, on his blog, is not saying that you can. But, some of my experience with his writing says otherwise. One of my favorite textbooks is actually Krugman, Obstfeld, and Militz, International Economics, but one of my complaints is that the intuition is not always very clear. For example, the third chapter covers comparative advantage, but the lesson heavily relies on simple algebra to make the point. (Update: I realize that this isn’t the type of modeling most economists have in mind, but the simplicity of algebra, I think, makes the point stronger.) The algebra tells us that specialization follows where opportunity cost is the lowest, but the intuition is poorly explained. In fact, when I took trade theory as an undergrad — using this textbook —, a surprisingly large amount of my classmates failed the first midterm (covering the first five chapters). It wasn’t that the subject material was hard, it was that for a lot of people the intuition was difficult to get. People didn’t know where to start; but, with the use of intuition, I was able to get through the simple math, because I had an idea of where to go.
No intuition, no party. But, sometimes the party gets difficult without a model, because you’re approaching diminishing returns. The best way of keeping things straight is through a model, by increasing our mental productivity. That a lot of people aren’t trained to use models isn’t an argument against them. The average blog reader is not going to come up with a deep theoretical insight, and, to a large extent, blog readers require economists who have thought about complicated issues long enough to be able to simplify them and communicate them through clear prose. Economists are trained to think through models because they’re the ones who are ultimately doing the hard work, thinking about problems that are difficult to sort out in our brains.
Of course, none of this implies, as Krugman notes, that math isn’t also subject to diminishing returns. The key is finding the right balance: where the benefits meet, or exceed, the costs. |
{
"pile_set_name": "StackExchange"
} | Q:
Rails : Devise gem authentication and EULA user acceptance
We are using Devise gem on our app and wondering how we could add a Contract acceptance in the process of the gem.
As Devise doesn't do that we thought of 2 solutions, one clean and one a bit dirty.
When user signs in, he is temporarly redirected to EULA page (using @resource from Devise). If accepts, sign in is successful and user enters the app, if rejected, the user is stuck on log in page.
When user signs in, he enters into the app and has a EULA page that he should accept. We then pass a flag to "yes" or "no" depending if he accepts or not. If not, he is redirected to sign in page.
The second solution is the easiest one but I feel it a bit unsecure (and perhaps server loads useless?).
The first one would be better, but we can't find any doc, tips to help us doing this and we are stuck in it.
Does anyone have developped similar thing? What's the best practice?
Thanks!
A:
i think your second option is cleaner: create a bool field in your users table and check that (at login or in every request -> before_filter) and redirect if not set. that way, if you change your eula and the user has to re-accept it, you can clear all the bool flags in your users table to force your users to accept the new version.
|
{
"pile_set_name": "Pile-CC"
} | Privacy Policy
Personal Information
MentorshipBC is committed to providing
visitors with a website that
respects their privacy. Our website does not collect personal
information other
than the content of your blog comments. Comments may be made anonymously
or you may choose to post via a social media profile.Although your social media profile will be displayed, MentorshipBC only
stores the profile name and profile image url. We do not store your
account information such as username or password.
Cookies
This site does not use cookies to store user
information. However, it may use some session cookies to track session
state information from page to page.
A cookie is a piece of text asking permission to be placed on your
computer's hard drive. If you agree, then your browser adds the text in a small
file.
The purpose of a cookie is to help us analyze web traffic or let us
know when you visit a particular site. Cookies allow a web application to
respond to you as an individual. By gathering and remembering information about
your preferences, the web application can tailor its operation to your needs,
likes and dislikes. For example, when you visit our website a cookie can keep
track of the pages you like. We can then highlight certain pages for you in
order to make subsequent visits easier.
We use traffic log cookies to identify what pages are being used and
which ones aren't. This helps us analyze data about traffic and make
improvements to our site to better meet your needs. MentorshipBC uses this
information only for statistical analysis purposes and then the data is removed
from the system. Denial of a traffic log cookie should not prevent you from
viewing any of the information pages on our site.
MentorshipBC’s website may use both temporary and persistent
cookies. Temporary cookies are used to facilitate your tour through our site
for that session only. For example choices you make on one page may be collected
and set as a cookie to be used on a subsequent page. These temporary cookies
disappear when you leave the site. A persistent cookie is used to tell if a
particular user is new or returning. You can certainly browse our site with
cookies turned off but some functions may require you to accept them as a
security measure.
Overall, cookies help us give you a better website, by letting us
monitor what's working and what isn't through site traffic analysis. Accepting
a cookie in no way gives us access to your computer or any personal information
about you, other than the data you chose to share with us.
You may set your web browser to notify you of cookie placement
requests or decline cookies completely. You can delete the files that contain
cookies; those files are stored as part of your Internet browser. Most browsers
automatically accept cookies, but you can usually refuse cookies, or
selectively accept certain cookies, by adjusting the preferences in your
browser. If you turn off cookies, though, there may be some features of our
site that will not be available to you and some web pages may not display
properly.
Links to Other Sites
Parts of our site contain links to third-party websites for your
convenience and information. The existence of these links does not imply our
endorsement of any information contained in them.
If you use these links, you will leave the MentorshipBC site. Please
understand that we do not control the content of these linked sites and are not
responsible for their privacy practices. We suggest that you carefully review
the privacy policies of each site you visit.
This privacy policy statement does not cover the information
practices of those websites linked to our site. These other sites may send
their own cookies to users, collect data or solicit personal information.
Privacy
The content
of your blog comments may be collected by the Ministry of Jobs, Tourism and
Skills Training under s. 26(c) of the Freedom of Information and Protection
of Privacy Act. To protect your own privacy and the privacy of others,
please do not include any personal information including phone numbers and
email addresses in the body of your comment. Please do not share personal
information about others. If you have any questions about the collection of
your personal information, please contact us atinfo
“at” mentorshipBC.ca |
{
"pile_set_name": "StackExchange"
} | Q:
Qt shared library in windows, not generating .lib file
I have a simple class (the analog clock from the Qt examples) that I want as a test to compile into a shared library. So what I want in the end is to have a .dll file and a .lib file.
What I did was simply create a new project, add the analog clock header and source file and then configure TEMPLATE = lib in the pro file.
Yet this only creates a .dll file and the article I found on the docs is not very helpful.
Does anyone know how can I solve this, and end up with both the dll and lib files?
EDIT 1
After doing this
#if defined(TEST)
#define AnalogClockPlug Q_DECL_EXPORT
#else
#define AnalogClockPlug Q_DECL_IMPORT
#endif
and then simply adding AnalogClockPlug in front of my main class and defining TEST in my pro file, qt generated a lib file.
Yet I am not sure I understand why exactly, or even if it is correct.
A:
Q_DECL_EXPORT is just the same (under Windows) as __declspec(dllexport) pragma. It makes all the methods of your class to go to the dll 'exports' table (a special section in dll binary file).
Lib utility just reads the dll exports, and produces what is called 'the import library' - it's not like a usual static lib, containing actual code, but just a bunch of records stating that 'such procedure name' is to be found in 'such dll name'.
If you don't have that pragma, your dll exports table is empty, and lib utility refuses to output empty lib file. That's all.
|
{
"pile_set_name": "USPTO Backgrounds"
} | The need for efficient storage systems and methods for massive amounts of data continues to grow. Currently, large data centers commonly employ blade servers that access a storage system including scalable arrangements of physical shelves of memory devices (disks and/or flash) and storage controllers. Typically, the servers access the storage controllers over a network (Internet, local area network (LAN), storage area network (SAN), etc.), while the storage controllers communicate among themselves via a private backplane and communicate with memory via fibre channel or serial-attached SCSI. The use of virtual machines (VM) for server functions allows for dynamic allocation of hardware resources, and has become a characteristic of modern data centers. Another characteristic of modern data centers is the increased use of solid state drive (SSD) devices (e.g. Flash devices) for caching data at various points in the storage architecture to increase I/O operations per second (IOPS). While current storage architectures for VMs improve upon older designs, they retain some legacy characteristics that prevent these architectures from being optimally efficient, both in terms of cost and in terms of ease of use. For example, current storage systems must define an elaborate data storage structure (LUNs, Volumes, etc.). Some current systems also require a layer of software to translate multiple transfer protocols into one proprietary protocol (see for example, SpinNP, and NetApp).
FIG. 1 is a block diagram of a prior art data storage system 100. There are multiple servers 102A-102G on the “server side”. Each of the servers 102 hosts multiple virtual machines (VMs) that communicate with each other and with a network 104 via a driver 103. A VM comprises virtual versions of the standard components of a physical machine (not shown). These may include a virtual CPU, virtual RAM, and a virtual disk drive. The VM host stores the data associated with a virtual disk drive in a file referred to as a vDisk. These vDisks are stored in the physical storage 106 (right side of the diagram). In storage 106, dedicated storage controllers 110A-110D handle communications from the server side via a standard network interface. Then the storage controllers 110 access physical storage nodes 108 via fibre channel. The storage controllers also communicate with each other via a dedicated backplane 112. System 100 includes disk devices 111 and Flash devices 108. The Flash devices may be used as either a fast tier of storage or as a cache. In either case, because the flash must be accessed via the network 104 and fibre channel 114 (using various protocols), there can be additional access latency attributable to this architecture.
In order for large scale data storage to truly migrate to a virtualized networked environment, it is desirable to have a storage system and method that includes a single, large, relatively inexpensive storage pool accessed directly over a network and managed remotely over the network by server-side compute servers or VMs. It is also desirable to have a storage system and method that employs server-side Flash memory optimally for enhanced performance. |
{
"pile_set_name": "USPTO Backgrounds"
} | The crustaceans, especially krill, represent a vast resource as biological material. The amount of Antarctic krill (Euphausia superba), depending on the calculation method and investigation, is roughly 1 to 2×109 tons and the possible weight of the annual catch is estimated at 5 to 7×106 tons. These small crustaceans, which live in the cold waters around the Antarctic, are interesting as a source for proteins, lipids such as phospholipids, poly-unsaturated fatty acids etc., chitin/chitosan, astaxanthin and other carotenoids, enzymes and other materials.
Several methods for isolating above-mentioned materials have been developed. One problem is that the products may contain unwanted trace material included in the exoskeleton (also called integument or cuticle) of the crustaceans. For example, krill accumulates fluoride in their exoskeleton, thereby increasing the fluoride amount of any produced material either through the inclusion of parts of the exoskeleton or through extraction processes not taking into account the transfer of fluoride to the final material. In this case free fluoride or loosely bound fluoride may diffuse from the exoskeletal material and into the further processed material, making the end product high in fluoride ions and/or fluorinated compounds.
Fluoride is a compound that in high concentrations is detrimental for the health of land-dwelling animals as well as all kind of fish and crustaceans and especially fresh-water fish species, since fluoride atoms have the tendency of entering into the bone structure of such organisms and creating fluorosis, or weakening of the bone structure similar in its effect to osteoporosis, but different since it is the bone structure itself, and not the porosity of the bone that is affected. Skeletal fluorosis is a condition characterized by skeletal abnormalities and joint pain. It is caused by pathological bone formation due to the mitogenic action of fluoride on osteoblasts. In its more severe forms, skeletal fluorosis causes kyphosis, crippling and invalidism. Secondary neurological complications in the form of myelopathy, with or without radiculopathy, may also occur. High fluoride intake has also been shown to be toxic to the male reproductive system in rat experiments, and in humans high fluoride intake and symptoms of skeletal fluorosis have been associated with decreased serum testosterone levels. Consequently, if krill material is used as a starting material for food or feed products, precautions have to be taken for removing fluoride through the processing steps. However, the diffusion of fluoride and the presence of miniscule particles of the exoskeleton represent a problem that is difficult to overcome when processing krill material in an industrial scale.
Polar lipids such as phospholipids are essential for cell membranes and are also called membrane lipids. For most known animal species the content of polar lipids is nearly constant. However, this does not hold for the Antarctic krill. The phospholipids content varies from 2% up to 10% depending on the season. The high content, e.g. more than 5%, of the phospholipids is in principle good, but means also a problem, because it may result in strong emulsions in industrial processes. The emulsions complicate the separation of the lipid and proteinaceous fractions in the processes, such as hydrolysis.
The krill oil is one the valuable products made from krills. It contains inter alia phospholipids, triglycerides and carotenoid astaxanthin while being essentially free of protein, carbohydrates and minerals. Different portions of the krill material are separated from each other by, inter alia: i) crushing krill mechanically; ii) pressing them, iii) hydrolysis with heat and enzymes; iv) centrifugal force in rotating devices; and v) solvent extraction.
What is needed in the art are significant improvements to these rather conventional approaches and are described within many embodiments of the present invention (infra). For example, a disintegrated raw crustacean material may be separated and/or extracted into various enriched low-fluoride crustacean meal and/or oil compositions. |
{
"pile_set_name": "PubMed Abstracts"
} | Analytical potential energy functions and spectroscopic properties for the ground and low-lying excited states of KRb.
The potential energy curves (PECs) of the ground state X(1)Σ(+) and two low-lying excited states 1(3)Σ(+) and 1(3)П of KRb molecule have been calculated using the multireference configuration interaction method and the effective core potential basis set. The PECs are fitted into analytical potential energy functions (APEFs) using the Morse long-range potential. The spectroscopic parameters for the states are determined using the analytical derivatives of APEFs. The vibrational energy levels have been calculated by solving the radial Schrödinger equation of nuclear motion based on the APEFs, and compared with the theoretical and experimental works available at present. |
{
"pile_set_name": "StackExchange"
} | Q:
Create a Loop for Arcpy
I am looking for help to write a loop a arcpy.CalculateField_maagement process where the User is asked with the 'raw_input', prior to the tool running "Do you need to change a field value(yes/no):",
if he types 'yes' into the input he is then prompted to enter a VB expression to replace a specific field like so "Replace([Column],"Value","newvalue"),
and the calculate field tool runs,if he types 'no' the script skips the Calculate field process and continues on to the next tool,
if the tool has run he is then asked, "Are there anymore fields you wish to update(Yes/no):" if he types 'yes' he is asked to enter another VB expression to replace a field value,
if he types 'no' the script skips the Calculate field process and continues on to the next tool.
I just need help writing the loop I have a giant python application that works but is not flexible in terms of allowing the user to edit data, and this will provide a lot of flexibility by allowing the user to choose if he wishes to edit a value or not.
here is a snippet of where I would like the Loop, I am currently also working on a way to Loop it and will edit the question with any progress I have made.
YesNo = raw_input(Do you need to change a field value(yes/no): ) #Ask User if there is a field value he wants to change, if his answer is yes then he is prompted to enter a SQL query that will run in the the Calculate Field Process, if he says no, the code skips the Calculate Field Process
VBexp = raw_input("Enter VB Expression to Update Field Names : ") #Enters a replace for his desired field expression
arcpy.CalculateField_management("featureclass", "Column", VBexp , "VB", "")
Again = raw_input("Are there anymore fields you wish to update(Yes/no): ") #If the user specifies Yes he will be prompted to enter a new VB expression to change a different field & and if he says no the script will continue running
A:
Alright great I managed to solve it, I hope this answer helps others.
while True:
try:
YesNo = raw_input("Do you need to change a field name (Yes/No): ")
except ValueError:
print("Your Input is invalid")
continue
if YesNo == "Yes":
VB = raw_input("Enter VB Expression to change Your Field: ") ##This is the expression I use: Replace([Column],"FieldtoChange","NewValue")
arcpy.CalculateField_management("featureClass", "Columnwherenewvalueswillgo", VB , "VB", "")
continue
else:
break
|
{
"pile_set_name": "PubMed Abstracts"
} | Serotonin-induced smooth muscle hyperplasia in various forms of human pulmonary hypertension.
Hyperplasia of pulmonary artery smooth muscle cells (PA-SMCs) is a hallmark pathological feature of pulmonary hypertension (PH). Serotonin (5-HT) is involved in the hyperplasia through its interactions with specific receptors and internalization by a specific plasma membrane transporter. We investigated the expression and role of the 5-HT transporter (5-HTT) and 5-HT1B, 5-HT2A, and 5-HT2B receptors in lungs and isolated PA-SMCs from patients with primary PH (n=14), pulmonary veno-occlusive disease (n=4), or secondary PH (SPH, n=8) and nonpulmonary hypertensive control subjects. Whereas strong immunostaining for the three receptor types and 5-HTT was seen in remodeled pulmonary vessels from patients in all PH categories, only 5-HTT expression was increased in lungs and cultured PA-SMCs from patients versus controls. The increased growth response of PA-SMCs from patients with primary PH, pulmonary veno-occlusive disease, or SPH to 5-HT or serum was entirely attributable to 5-HTT overexpression, because 5-HTT inhibitors but not 5-HT receptor antagonists abolished 5-HT mitogenic activity and reduced the serum-induced growth response to similar levels in patients as in controls. The L-allelic variant of the 5-HTT gene promoter, which is associated with 5-HTT overexpression, was present homozygously in 14 of 25 (56%) lung transplantation patients with SPH but in only 27% of controls. Polymorphism of the 5-HTT gene promoter was only partly responsible for the increased 5-HTT expression in PH, because PA-SMCs from patients exhibited higher 5-HTT levels than same-genotype cells from controls and no additional promoter sequence alterations were found. We conclude that 5-HTT overexpression is a common pathogenic mechanism in various forms of PH. |
{
"pile_set_name": "USPTO Backgrounds"
} | Fluorinated sulfonates are useful as surfactants in various applications. Commercially available fluorinated surfactants usually contain a perfluoroalkyl terminal chain. Honda, et al., in “Molecular Aggregation Structure and Surface Properties of Poly(fluoroalkylacrylate) Thin Films” Macromolecules (2005), 38(13), 5699-5705, disclose that a perfluoroalkyl chain of at least 8 carbons is necessary to maintain the perfluoroalkyl chains in a parallel orientation. For such perfluoroalkyl chains containing less than 8 continuous perfluorinated carbons, a reorientation occurs which decreases or eliminates the ability for exhibiting desirable surface properties. Thus longer perfluoroalkyl chains which contain a higher fluorine content at a given concentration typically provide better performance. However, the fluorinated materials derived from longer perfluoroalkyl chains are more expensive. Reducing the fluorine content with delivery of the same or better performance is therefore desirable.
U.S. Pat. No. 6,201,122, discloses a fluoroaliphatic radical-containing sulfonamido anionic compound, wherein the fluoroaliphatic radical group contains 3 to 20 carbons, and is preferably CnF2n+1 wherein n is 4 to 10. The compounds are useful as anionic surfactants in liquid systems. However, anionic surfactants are known to precipitate out of formulations commonly used in fire fighting applications and oilfield applications.
It is desirable to have surfactants containing partially fluorinated or shorter fully fluorinated terminal groups, or containing perfluoroalkyl chains interrupted with other atoms or moieties, to achieve equivalent or improved surface performance at lower expense. It is also desirable to have surfactants that do not precipitate out of end use formulations. The present invention provides such surfactants. |
{
"pile_set_name": "DM Mathematics"
} | et h = 3/161 - -313/483. Sort -1/4, -4/7, h, 0.3 in increasing order.
-4/7, -1/4, 0.3, h
Let h = -2044 - -2021. Put 1, -3, h in descending order.
1, -3, h
Suppose -5*x = 3*x + 24. Sort x, -7, -2 in ascending order.
-7, x, -2
Suppose -c = 2*c + r + 9, 0 = 5*c + 5*r + 15. Suppose d + p - 4 + 3 = 0, -3*d + 5*p - 5 = 0. Let b = d - -3. Sort c, 1, b in descending order.
b, 1, c
Suppose s = 6 - 3. Let o = -34 + 19. Let v be 4/(-30) + 88/o. Sort s, v, -1 in increasing order.
v, -1, s
Suppose -17*f + 544 = 306. Put 15, -1/4, f in descending order.
15, f, -1/4
Let r be 44/(-14) - ((-17 - -11) + 3). Put 10, 0.5, 3/8, r in decreasing order.
10, 0.5, 3/8, r
Let q be ((-10)/4)/(7/42*-3). Sort 37, -1, q, 4.
-1, 4, q, 37
Let f(z) = 12*z**2 - 14*z + 13. Let s be f(1). Sort s, -4, -2, -3 in descending order.
s, -2, -3, -4
Let i be 3 - ((3 - -2) + -1). Put -6, i, -13 in decreasing order.
i, -6, -13
Let v = -0.1 + -0.1. Let k = -4.35 - -0.35. Let p = -5 - k. Sort v, -0.3, p in descending order.
v, -0.3, p
Suppose -2*s - 3*w = 13, -4*s - 3*w + 13 = 30. Put s, -4, 1, 0 in increasing order.
-4, s, 0, 1
Suppose -727 + 730 = -3*j. Put 7, j, 5 in descending order.
7, 5, j
Let t be (-3 + 3 + -12)/(-3). Sort t, 3, 10, 2 in ascending order.
2, 3, t, 10
Let d = -0.04 + -3.96. Let m = -1.568 + 1.168. Put 0.1, d, 1, m in increasing order.
d, m, 0.1, 1
Let i = 5.58 + -5.88. Put 0.43, -2/7, i in ascending order.
i, -2/7, 0.43
Let q be (-80)/(-14) + 2/7. Suppose 5*c - f + q - 1 = 0, -10 = -c - 2*f. Suppose 4*g - 6*g - 6 = c. Sort g, 3, 0 in decreasing order.
3, 0, g
Let z = 50 + -54.8. Let m = 0.4 - z. Let q = m + -5. Sort 0.4, 3, q in descending order.
3, 0.4, q
Let u be 4/(-12) + 16/3. Suppose -2*h - 2*r + u + 5 = 0, -19 = h - 5*r. Let n be -1 - (-2 - -1 - h). Sort 3, 5, n in decreasing order.
5, 3, n
Let x = -2.05 - -0.05. Sort -1/5, x, -84 in decreasing order.
-1/5, x, -84
Let m be (-72)/(-20) - (-6)/15. Let q = 2 - m. Let x = -0.05 - 0.05. Sort x, q, 2 in descending order.
2, x, q
Let l(a) = -9*a**2 - 5*a. Let o be l(-1). Let p be ((-12)/8)/(1/o). Put p, -5, 5 in ascending order.
-5, 5, p
Suppose 14*f = 35 - 7. Sort 3, -145, 1, f in descending order.
3, f, 1, -145
Let r = 3.05 - 0.05. Suppose -10*f = -5*f - 25. Let l = -7.16 - -7.66. Sort f, l, r in decreasing order.
f, r, l
Suppose -11*w - 7 = -8*w + 5*h, w + 5*h = -9. Let r = 14 + -10. Put r, -5, w in ascending order.
-5, w, r
Suppose -10*t + 5*c = -12*t - 10, 5*c = -4*t - 10. Put -16, 8, t, 4 in descending order.
8, 4, t, -16
Let r(z) = z**2 + 11*z + 15. Let b be r(-9). Suppose -7*t + 4*w = -4*t - 16, 20 = -t - 5*w. Suppose -12 = 4*s - s. Put b, s, t in descending order.
t, b, s
Let v = -8 + 10. Suppose -7 = -v*c - 1. Suppose 4*o + 12 = -0*o. Put c, 12, o in decreasing order.
12, c, o
Let k be (162/(-216))/((135/24)/5). Sort k, 4/3, 0.16, -0.4 in decreasing order.
4/3, 0.16, -0.4, k
Let p be (-3*(-1)/9*18)/(-2). Put 0.4, -5, p, 2 in ascending order.
-5, p, 0.4, 2
Let m(y) = -y**2 - 7*y - 5. Let w = -5 + 3. Let i be m(w). Sort 3, -2, i, 4 in increasing order.
-2, 3, 4, i
Let m = -477 - -479. Put 3, -250, m in descending order.
3, m, -250
Let s = 7 + -4. Let k be 2/s*(3 - 6). Let r = 0.3 - 0.1. Sort k, r, -1/4 in decreasing order.
r, -1/4, k
Let n be -2*(-1)/(-2) - 2. Let m = -1 - n. Let k = 899 + -902. Put m, 4, k in descending order.
4, m, k
Let u = -1 + 3. Let s = -438 + 1316/3. Put u, -6, s in increasing order.
-6, s, u
Let d be 12/(-756)*7*3. Let q = 57/2 - 29. Put d, 3, q in decreasing order.
3, d, q
Let h be 0 + -1 + 3 + 3. Let k be (1 - h) + -5*(-12)/20. Sort k, -4, 0, 4 in descending order.
4, 0, k, -4
Let p(v) = -3*v - 11. Let n be p(-8). Let k = 1 - n. Put -4, k, -1 in descending order.
-1, -4, k
Suppose -67 = 3*u + 113. Let o = u - -58. Put -9, o, 1 in ascending order.
-9, o, 1
Let t = 24 - -24. Let z = t + -47.86. Put z, 2/5, -4/5 in descending order.
2/5, z, -4/5
Let y = -1063.992 - -1060. Let q = -0.072 - y. Let m = 0.08 + q. Sort 2/7, -4, m in ascending order.
-4, 2/7, m
Let n(i) = -i**2 - 3*i + 4. Let o be n(-3). Suppose 10 = o*v + 2. Suppose -v*y = -2*b - 6, 4*b = -5*y + 3*y + 18. Put 1, 5, b in descending order.
5, b, 1
Let r = -32 - -27. Let p = -0.08 + -3.92. Put p, r, -1/4, 2/9 in ascending order.
r, p, -1/4, 2/9
Suppose 1 - 13 = -6*j. Let i(g) = g**3 + 7*g**2 + 5*g - 5. Let w be i(-6). Sort j, -4, w.
-4, w, j
Let q = 2 + -1. Let k = 3860 + -3857. Put q, k, 22 in descending order.
22, k, q
Let v = -7.592 + -3.903. Let i = -1.285 - v. Let t = i - 0.21. Put t, 1/3, -3 in increasing order.
-3, 1/3, t
Let s = 16/5113 - -1717088/281215. Let n = -31/5 + s. Suppose 22 = 4*y - 2*j, -j - 2*j = 4*y - 7. Put n, 5, y in ascending order.
n, y, 5
Let s = -60 + 40. Let r be 17/(-5) + 12/s. Let c(z) = -z**3 - 5*z**2 + 6*z + 3. Let n be c(-6). Put n, 1, r in decreasing order.
n, 1, r
Let n = 1/50 + -3/25. Let f = -81 + 1703/21. Let w = -6/13 - -80/117. Sort f, n, w in decreasing order.
w, f, n
Let j = -64 + 64.4. Let l = -2.93 - 0.07. Let o = -3/2 - -2. Put o, j, l in decreasing order.
o, j, l
Let d be (-6 - (0 - 1))*-1. Suppose -3*n + 4*o - 13 = 0, -n + 5*o - 26 + 7 = 0. Sort 19, n, d, -3.
-3, n, d, 19
Let x be 47/94 + 5/6. Put x, -3/4, 1/6, -3/70 in decreasing order.
x, 1/6, -3/70, -3/4
Let m(i) = -i**3 - 4*i**2 + 5*i + 6. Let k be m(0). Let w = 11 - 8. Suppose 3*x - w*v = -27, -k = -v - v. Sort x, 3, -3 in ascending order.
x, -3, 3
Let z = -14 + 19. Put 4, 2, z, 3 in descending order.
z, 4, 3, 2
Let b(m) = -m - 9. Let l be b(-5). Let v = -8 - l. Put 0.4, v, -0.3 in ascending order.
v, -0.3, 0.4
Suppose 4*j + 4 = 2*x, -5*j + x = -4*x + 10. Let c be (-3)/(1 - -2)*j. Sort -5, c, -3.
-5, -3, c
Let c(g) = 2*g + 11. Let h be c(-16). Let j = h + 28. Put -2/15, j, 2/19 in increasing order.
-2/15, 2/19, j
Suppose 99 = 5*z - 4*m, -3*m - 2 = -5*z + 101. Let d = -32 + z. Suppose 4*v + 1 - 17 = 0. Sort -2, v, d in increasing order.
d, -2, v
Let r = -5 - -4.97. Let q = -433 + 434. Sort q, r, -5.
-5, r, q
Let w = -20243/9 - -2249. Sort 14, -0.3, w.
-0.3, w, 14
Suppose 21*h + 6 = 23*h. Sort h, 5, -5 in increasing order.
-5, h, 5
Let i be (-3)/((-29)/((-232)/(-96))). Sort 4.7, 2/15, i in increasing order.
2/15, i, 4.7
Let h(m) = -m**2 + 5*m - 4. Let o be h(5). Let n be -368 - -381 - 2*4. Suppose -r - 4*a = 8, 0*a = -5*r + 3*a + 29. Put r, o, n in ascending order.
o, r, n
Let z be (-1 + 3)/(-4 - -6). Let d(k) = -8*k**2 - 2*k + 3. Let y be d(z). Sort -3, y, -2, 4 in descending order.
4, -2, -3, y
Let p be 104/(-30) + 5*1. Let s = 37/30 - p. Sort -5, -0.1, s, 0.5 in increasing order.
-5, s, -0.1, 0.5
Let c = 17.6 + 0.4. Let m = -17.5 + c. Let q = -13/18 + 2/9. Put q, -2, m in decreasing order.
m, q, -2
Let n = -15 + 16. Let q be 161/(-392) + (-1)/(-24)*3. Sort 2/11, q, 1/9, n in decreasing order.
n, 2/11, 1/9, q
Let d = -8 + 0. Let c = 5.3 + 2.7. Let b = d + c. Sort 4, 2, b in increasing order.
b, 2, 4
Let q = -239 + 243. Sort 5, -16, q in descending order.
5, q, -16
Suppose -21*x + 8*x - 52 = 0. Put 3, 5, -2, x in decreasing order.
5, 3, -2, x
Let d = 0.069 + -0.269. Put 3/8, d, -4, -19 in descending order.
3/8, d, -4, -19
Suppose 0 = 2*n + 2*t - 8, -2*n - 4*t - 29 = -3*n. Suppose -4*z = -7*z + n. Sort 6, 0, z in increasing order.
0, z, 6
Suppose c - 3 = -n - 2*c, -9 = -n + 3*c. Suppose n = -t + 7. Sort t, -2, -1 in decreasing order.
t, -1, -2
Suppose 9 = 3*x - 6*x. Let o = x - -8. Suppose -2*c + 0*c - o*s - 14 = 0, 4*c + 5*s = -18. Sort c, 1, 2 in descending order.
2, 1, c
Suppose w + 20 = 5*w. Let b(c) = -4*c - 3. Let l be b(3). Let v = -11 - l. Sort v, 1, w in increasing order.
1, v, w
Let p(x) = 18*x + 17. Let h be p(-1). Sort h, -22, 1, 5.
-22, h, 1, 5
Let f be 6/52*(10 - 338/39). Sort -5, 2/5, 0.5, f in descending order.
0.5, 2/5, f, -5
Let z = 1 - 0.8. Let a = 59 - 58.5. Let p = 2 + -2.5. Sort p, a, z in ascending order.
p, z, a
Let s(v) = -v**2 - 8*v + 131. Let c be s(8). Sort 5, -4, -1, c.
-4, -1, c, 5
Let n = 46 - 14. Let y be 3 - n/12 - 1. Sort 1, 5, 1/2, y in descending order.
5, 1, 1/2, y
Suppose 2*z = -2*z + 4*x - 16, z + 4 = -5*x. Let g = -8.79 - 0.21. Let n = g - -9.5. Put z, 1, n in decreasing order.
1, n, z
Let c(v) be the first derivative of -v**3/3 + 3*v**2/2 + 8*v + 7. Let f be c(4). Let o be (6/8)/(2/8). |
{
"pile_set_name": "Wikipedia (en)"
} | Association of Jesuit Colleges and Universities in Asia Pacific
The Association of Jesuit Colleges and Universities in Asia Pacific (AJCU-AP) is an association of 22 Jesuit higher educational institutions on the territory of the Jesuit Conference of Asia Pacific.
Members
Current list of members.
Ateneo de Davao University
Ateneo de Naga University
Ateneo de Manila University
Ateneo de Zamboanga University
Xavier University Ateneo de Cagayan
Loyola College of Culion
Loyola School of Theology
Sanata Dharma University
Polytechnic ATMI Surakarta
Elisabeth University of Music
Sophia University
Sogang University
Fu Jen Catholic University
Fu Jen Faculty of Theology of St. Robert Bellarmine
Newman College (University of Melbourne)
Jesuit College of Spirituality
Myanmar Leadership Center
Instituto Sao Joao de Brito
Xavier Learning Community
Ricci Hall, University of Hong Kong
References
External links
Category:Jesuit universities and colleges
Category:International college and university associations and consortia |
{
"pile_set_name": "Pile-CC"
} | Belgian lawmakers vote to ban full-face veils in public
PARIS — Belgian lawmakers on Thursday passed a nationwide ban prohibiting women from wearing full-face Islamic veils in public places, the first move of its kind in Western Europe.
The unanimous vote in the lower house of Parliament came in response to growing irritation in Belgium and other West European countries over the increasing numbers and visibility of Muslims whose customs and attitudes often present a challenge to the continent’s largely Christian heritage.
[…]
Similar bills have been introduced in the parliaments of Italy and the Netherlands, where local jurisdictions have already imposed more-limited anti-veil measures. Two dozen communities in Belgium also have decreed local bans, including Brussels, the capital.
According to Human Rights Watch, the U.S.-based advocacy group, political figures in Switzerland and Austria have suggested that legislation such as Belgium’s would be a good idea in their countries as well. Farther north, Denmark’s government issued a statement in January saying the full-face veil was out of sync with Danish values, but decided against legislation because few women wear such garments.
Swiss voters, in a referendum in December, barred Muslims from building minarets, or towers, to call the faithful to prayer. Their vote, widely decried as anti-Islamic by Muslim and human rights groups, generated favorable comment from conservative French politicians along with suggestions that France should impose a similar minaret ban.
But nothing has aroused more resentment than the sight of women on the streets of European cities covered from head to toe in dark robes with only a slit or a screen at eye level.
[…]
(Article continues below this ad)
Taking a break?
The full veil has been condemned by European politicians of the right and left as an affront to the dignity of women and, because it hides a woman’s face, as a security risk in schools, banks and government offices. André Gerin, a member of Parliament who led a nine-month inquiry into the full-face veil in France, also qualified it as the tip of an iceberg behind which lurk radical Islamic preachers seeking to impose a fundamentalist and politicized vision of their religion on French Muslims.
[…]
The bill forbids anyone to appear in public with his or her face hidden in a way that makes identification impossible. Violators would face fines of $18 to $28 and prison terms of one to seven days.
The measure must now be voted on by the Senate. With elections on the horizon and only a caretaker government in place, it could be some time before it is promulgated and goes into effect.
[…more…] |
{
"pile_set_name": "Wikipedia (en)"
} | Olive Oil Commission of California
The Olive Oil Commission of California (OOCC) was founded in 2014 by California olive oil farmers. It is an entity of the State of California which was established as a result of a bill introduced by Lois Wolk. The primary goal is to improve the sales of olive oil grown in California.
Grades and Standards
The OOCC has developed its own grading and standards for olive oils from California out of its belief that the standards set by the International Olive Council were not applicable to olive oils from California. The organization collects samples of olive oils from member producers and has them tested in a laboratory in Australia for sensory and chemical analysis.
The standards have been criticized by the North American Olive Oil Association. The NAOOA claims that commission's standards fail to address product adulteration and "do not ensure authenticity or quality of the olive oil".
Board Members
Adam Englehardt, Kbar Farming
Larry Maben, Maben Family LLC
John Williams, Cal Ag Properties LLC
Deborah Rogers, McEvoy of Marin LLC
Jeff Colombini, Lodi Farming
Richard Marchini, Marchini Ag
Liz Tagami, Lucero Olive Oil
Jim Lipman, California Olive Ranch
Jim Etters, Seka Hills Olive Mill
Brady Whitlow, Corto Olive LP
Bruce Golino, Santa Cruz Olive Tree Nursery
Advisory Committee
Philip Asquith, Ojai Olive Oil Company – Ojai, CA
Lillian Dickson, Dickson Napa Ranch – Napa, CA
Eric Halverson, Halverson Ranch – Wallace, CA
Albert Katz, KATZ – Suisun Valley, CA
Jan de Luz, Leplus, Inc. – Carmel Valley, CA
Bob Roos, Homestead Olive Ranch – Templeton, CA
Ronald Sbragia, Collina di Mela – Placerville, CA
References
External links
Category:Government of California
Category:Olive oil
Category:Agriculture in California |
{
"pile_set_name": "StackExchange"
} | Q:
Import pattern for in Typescript with AngularJS?
This may be Typescript 101 but can't seem to get a clear answer for this.
I am new to Typescript and have come across some existing code (its AngularJS) that follows this format
module App.Login {
import IStateService = angular.ui.IStateService;
export class LoginController {
private _state: IStateService;
constructor($state: angular.ui.IStateService, ...) {
this._state = $state;
}
}
}
Through reading around and some experimentation I discovered this can be rewritten in a far leaner manner as the following:
module App.Login {
export class LoginController {
constructor(private $state: angular.ui.IStateService, ...) {
}
}
}
My questions are:
Why was it created the first way originally? Lack of knowledge or for some reason I don't understand
Why we need to use import just to alias the interface
A question of style, but later in my class to use $state I have to use this.$state. Coming from Angular v1 this feels odd, I presume this is ok though?
A:
Why was it originally this way? If you mean the import, convenience. angular.ui.IStateService is right on the edge of annoyingly long. They author probably just wanted a more convenient version. If you mean the declaration of the private var, some folks (especially coming from a C#/Java background) would prefer to declare class parameters explicitly. The visibility modifier (public/protected/private) on constructor parameters syntax is pretty unique to typescript so folks aren't used to it / don't like it.
You don't. You can use the type keyword instead.
Yep, that's totally fine.
|
{
"pile_set_name": "StackExchange"
} | Q:
Assign a function's returned IEnumerable value to another object
I am calling this function from another function:
private static IEnumerable<MovingAverage> SimpleMovingAverage(
IEnumerable<IexTradingStock> queue, int period)
.
. (omitted code)
.
{ return movingAverages;
This is the function that calls MovingAverage:
MovingAverage SMA = new MovingAverage();
SMA = SimpleMovingAverage(stocks, period);
I get an error on this line "SMA = SimpleMovingAverage(stocks, period);" The error is "Cannot implicitly convert type 'System.Collections.Generic.IEnumerable' to 'myBackEnd.Models.MovingAverage' an explicit conversions e xists (are you missing a cast)
A:
Your function return type should be IEnumerable not a single object. When you have declared this function you set its return type as IEnumerable but when in your return statement your are returning a single object of MovingAverage. The returned object should be same as you have declared your return type. Secondly when you are getting the list from SimpleMovingAverage(stocks, period); and setting the list in MovingAverage SMA = new MovingAverage(); is wrong. It should be.
IEnumerable<MovingAverage> SMA = SimpleMovingAverage(stocks, period);
|
{
"pile_set_name": "OpenWebText2"
} | An out-of-towner who stashed his loaded handgun under the mattress in his Brooklyn hotel room, and then called the front desk after checking out to say he forgot it, will be spending at least one more night in the Big Apple — as a guest of the state.
Torrie Flock, 23, of Charlotte, N.C., rang the front desk at the Harbor Motor Inn on Shore Parkway in Gravesend Monday afternoon to say he’d left a .45-caliber Smith & Wesson under the mattress in Room 218, officials said.
When he returned to retrieve the firearm around 1:30 p.m., cops were waiting and arrested him.
A maid had previously gone in to grab up the gun, wrapped it in a towel, and handed it over to police.
The firearm had seven rounds in it, according to prosecutors, who said Flock told officers , “I didn’t know it was such a big deal.”
Defense attorney Dara Hebert said her client had just been in town doing “touristy stuff,” like visiting the Statue of Liberty and Times Square. North Carolina is an open-gun state, Hebert added, saying her client did not need a license to purchase the weapon there.
Flock was arraigned on criminal possession of a weapon charges Tuesday, and held on $7,500 bail.
His gal pal and her father, who were in court with him, declined to comment. |
{
"pile_set_name": "StackExchange"
} | Q:
NLogConfigurationException - Invalid cast from 'System.String' to 'System.Uri'
Nlog is throwing an exception now that I have updated from 1.0 -> 2.0.
When NLog.Config.XmlLoggingConfiguration.Initialize is called the following exception occurs:
"Error when setting property 'Url' on WebService Target[Target_AuditLog_WebService_Global]"
with an innerException of: "Invalid cast from 'System.String' to 'System.Uri'.
the target looks like this:
<target name="Target_AuditLog_WebService_Global" xsi:type="WebService" namespace="http://ourLoggingServer.corp/" protocol="Soap12" methodName="AddLog" url="http://ourLoggingServer.corp/Logger.asmx">
<parameter /> <!-- Several params, none of type system.uri -->
</target>
I found this however it seems they think its fixed:
http://nlog.codeplex.com/workitem/5352
A:
This is a bug and has been fixed, however, a version with the fix has not yet been released officially or via NuGet, if you run across this issue you will need to use a nightly build version: http://nlog.codeplex.com/releases/view/64708 (which I have confirmed works) If there has been an official release after 4/27/2011 you should try using it.
http://nlog.codeplex.com/releases
|
{
"pile_set_name": "StackExchange"
} | Q:
push data from UITableView to view controller programmatically
I am trying to push data from a tableView to a View controller. I can successfully transfer some of the data over, but I am still missing some key points. I will try to illustrate my question to the best of my abilities. In my notificationTableView, I have data that is stored such as a userName, userImage, jobName and jobImage. I can succesfully push over the users image and name, however The jobName and JobImage fails to be transferred over as we can see in the Images below.
In this image, we can see the tableView sections that have the userName, userImage, jobName and jobImage.
In the second image, we can see that the usersName, and Image is succesfully pushed. However, the jobImage and name are not transferred.
the code that I use to push over the information is
override func tableView(_ tableView: UITableView, didSelectRowAt indexPath: IndexPath) {
let notification = notifications[indexPath.row]
if notification.notificationType != .swipe {
let acceptWorker = jobProgressViewController()
acceptWorker.workerUser = myUser
acceptWorker.workerUser = notification.user
jobProgressView?.myParentViewController = self
let navController = UINavigationController(rootViewController: acceptWorker)
present(navController, animated: true, completion: nil)
} else {
print("something else should go here")
}
and the code that I use to retrieve the information is below. which is my jobProgressViewController
var notification: userNotifications?
var workerUser: User? {
didSet {
let name = workerUser?.name
workerNameLabel.text = name
guard let profileImage = workerUser?.profileImageUrl else { return }
workerImageView.loadImageUsingCacheWithUrlString(profileImage)
if let post = notification?.poster {
jobImageView.loadImageUsingCacheWithUrlString(post.imageUrl1!)
jobLabel.text = post.category
addressLabel.text = post.category
}
}
}
fileprivate func setupView(){
let postUser = workerUser.self
let uid = Auth.auth().currentUser?.uid
let userName = postUser?.name
let posterId = postUser?.uid
let post = notification?.poster
guard let userImage = workerUser?.profileImageUrl else { return }
Database.database().reference().child("users").child(uid!).observeSingleEvent(of: .value, with: { (snapshot) in
guard let dictionary = snapshot.value as? [String : Any] else { return }
let user = User(dictionary: dictionary as [String : AnyObject])
let currentUser = MyUser(dictionary: dictionary as [String : AnyObject])
self.posterImageView.image = #imageLiteral(resourceName: "user")
self.posterImageView.loadImageUsingCacheWithUrlString(userImage)
self.userNameLabel.text = userName
self.userNameLabel.font = UIFont.systemFont(ofSize: 30)
self.userNameLabel.textColor = UIColor.black
self.workerImageView.image = #imageLiteral(resourceName: "user")
self.workerImageView.loadImageUsingCacheWithUrlString(currentUser.profileImageUrl!)
self.workerNameLabel.text = currentUser.name
self.workerNameLabel.font = UIFont.systemFont(ofSize: 30)
self.workerNameLabel.textColor = UIColor.black
self.addressLabel.text = postUser?.address
self.addressLabel.font = UIFont.systemFont(ofSize: 30)
self.addressLabel.textColor = UIColor.black
self.jobLabel.text = post?.category
self.jobLabel.font = UIFont.systemFont(ofSize: 30)
self.jobLabel.textColor = UIColor.black
}, withCancel: { (err) in
print("attempting to load information")
})
print("this is your uid \(posterId!)")
}
below is how I populate my notificationCell which shows the users information in my tableView
var jobProgressView: jobProgressViewController? = nil
var delegate: NotificationCellDelegate?
var notification: userNotifications? {
didSet {
guard let user = notification?.user else { return }
guard let profileImageUrl = user.profileImageUrl else { return }
profileImageView.loadImageUsingCacheWithUrlString(profileImageUrl)
configureNotificationLabel()
configureNotificationType()
if let post = notification?.poster {
postImageView.loadImageUsingCacheWithUrlString(post.imageUrl1!)
}
}
}
func configureNotificationLabel() {
guard let notification = self.notification else { return }
guard let user = notification.user else { return }
guard let poster = notification.poster else { return }
guard let username = user.name else { return }
guard let notificationDate = configureNotificationTimeStamp() else { return }
guard let jobName = poster.category else { return }
let notificationMessage = notification.notificationType.description
let attributedText = NSMutableAttributedString(string: username, attributes: [NSAttributedString.Key.font: UIFont.boldSystemFont(ofSize: 14)])
attributedText.append(NSAttributedString(string: notificationMessage , attributes: [NSAttributedString.Key.font: UIFont.systemFont(ofSize: 14), NSAttributedString.Key.foregroundColor: UIColor.black]))
attributedText.append(NSAttributedString(string: jobName, attributes: [NSAttributedString.Key.font: UIFont.systemFont(ofSize: 14), NSAttributedString.Key.foregroundColor: UIColor.black]))
attributedText.append(NSAttributedString(string: " \(notificationDate).", attributes: [NSAttributedString.Key.font: UIFont.systemFont(ofSize: 14), NSAttributedString.Key.foregroundColor: UIColor.gray]))
notificationLabel.attributedText = attributedText
}
if there is anyInformation I may have left out to help with getting an answer please let me know. please and thank you.
A:
As discusstion, you forget set notification for jobProgressViewController
In func didSelectRowAt indexPath add below code:
acceptWorker.notification = notification
|
{
"pile_set_name": "StackExchange"
} | Q:
Find limit of sum
I suspect that $\lim_{n \to \infty} \sum_{k = 0}^{n - 1}\frac{k}{a^k(n - k)} = 0$ for $a > 1$. I know that this product represents the taylor coefficients of $\frac{-ax\ln(1 - x)}{(a - x)^2}$ by the Cauchy product. Unfortunately the limit as $x \to 1^{-1}$ is not defined so I can't use Abel's theorem. How can I prove this?
A:
The limit is zero as expected. First, write the sum as
$$ \sum_{k=0}^{n-1} \frac{k}{a^k(n-k)} = \sum_{k=0}^{\infty} \frac{k}{a^k(n-k)} \mathbf{1}_{\{k < n\}}$$
Since each term is uniformly bounded by
$$ \left| \frac{k}{a^k(n-k)}\mathbf{1}_{\{k < n\}} \right| \leq \frac{k}{a^k} $$
and $\sum_{k=0}^{\infty} \frac{k}{a^k} < \infty$, the dominated convergence theorem tells that
$$ \lim_{n\to\infty} \sum_{k=0}^{\infty} \frac{k}{a^k(n-k)} \mathbf{1}_{\{k < n\}}
= \sum_{k=0}^{\infty} \lim_{n\to\infty} \frac{k}{a^k(n-k)} \mathbf{1}_{\{k < n\}}
= \sum_{k=0}^{\infty} 0 = 0. $$
|
Subsets and Splits