text
stringlengths
2
1.05M
repo_name
stringlengths
5
101
path
stringlengths
4
991
language
stringclasses
3 values
license
stringclasses
5 values
size
int64
2
1.05M
"I can calculate the motions of heavenly bodies but not the madness of people." -Isaac Newton Grab your coffee or boba. It’s time to talk Augur. Each Tuesday on The Augur Edge, I share one Tweet, one trade, and a two-minute musing on something I’ve been thinking about Augur. Let’s dive in. First off, I published a quick piece on How to Keep up to Speed on Augur. It’s geared toward folks who are already familiar with Augur and want to know the best ways to keep a pulse on what’s happening in the space. Weekly Tweet Vitalik throws out an intriguing idea on how to use prediction markets like Augur to, of all things, motivate good behavior on TikTok — see the Twitter thread for context. This is a reminder of the boundless possibilities of open prediction markets. Even the term “prediction market” is a trap, since predictions, along with trading and betting, is just one potential use case, even if it is the most salient and the best starting point. Augur *could* also be used for insurance markets, bounty markets, fact-checking, accountability, and Futarchy. Some of these are pipe dreams or things nobody actually wants…but some, I think, will happen. Is DAI Essential for Augur v2? Micah Zoltu, an independent dev and likely the person who will give you the fastest and most useful answer in the world to any question you have on Augur, publicized a vulnerability in MakerDao, the (de)central “bank” that issues the DAI stablecoin, a cryptocurrency whose value is pegged to the US Dollar. He describes a possible attack whereby a deep-pocketed individual or group of colluders could steal all of MakerDao’s collateral, summing to hundreds of millions of dollars worth of Ether. This connects to Augur, since Augur v2 is slated to use DAI. This gets at a broader point that even if Augur‘s own contracts are radically ownerless, Augur uses building blocks like DAI, 0x, and Uniswap that vary in their degree of centralization and censorship resistance. Micah makes the case that MakerDao is not only prone to centralized control, but that any actor, at least in theory, can steal this control with sufficient funds. This begs the question: how critical is Dai for Augur? I think using a stablecoin is a big step forward for Augur, *but* I don’t see it as a make-or-break factor for v2. With faster settlement, improved UIs with simplified onboarding, 0x mesh, and a *dream market fit for the product*, the 2020 election cycle, Augur v2 could still be a breakthrough without DAI. Especially, if the use of crypto was abstracted away in the UI at the onboarding and trading level and if users had some other simple means to hedge volatility risk. There’s even a world in which v2 gets *more* trading volume with Eth than with DAI, where the crypto market is booming and folks want to maximize Eth exposure while they’re betting on Augur. Actually, Augur’s highest-stakes trader to date, the anonymous bettor who wagered hundreds of thousands of dollars worth of Eth on the Midterms market last year, told me that he would *not* use Augur if it used Dai. All said, I still think the pros of DAI outweigh the cons and it should only be dropped as a last resort. To get fresh insights on Augur, including this newsletter, Subscribe Here Weekly Trade You can see my Augur trade history here. I’m holding my longs on Bernie and Mayor Pete in several PredictIt DemNom markets, for now, along with some hedges. Conventional thinking is that Bernie is a factional candidate with a low-ish ceiling of support and not what the Dems are looking for in a cycle where “electability” and beating Trump is top of mind. But a crowded field where everyone is competing to be seen as the most “electable”, the most reasonable, may also make it easier for an extreme candidate like Bernie to set himself apart from the crowd and squeeze through, even with a low ceiling of support. The whims of the Primary schedule are favorable to Sanders. The first two states, Iowa and New Hampshire, are not representative of the nation’s population, but carry disproportional weight in driving momentum. If the first two states were different, Bernie shares would likely be way overpriced, but he’s polling well in both Iowa and New Hampshire and decently in Nevada. In a cycle where electability is king, whoever wins the first couple states could get a big boost. I’m always a bit nervous going long candidates like Bernie that the young, white, male leaning Internet crowd that current prediction markets skew toward tend to favor. One reason that I’m also long Pete Buttigieg, the one candidate trading higher right now on Betfair than PredictIt — Betfair likely being less prone to these demographic biases. Note: This isn’t trading advice, just a look at what I’m up to. Say Hi I love hearing from readers, so shoot me an email if you have any thoughts or questions or just want to say hi. Happy predicting and best from Tulum Mexico, Ben
null
minipile
NaturalLanguage
mit
null
Q: Start IIS Express without opening default site When I launch my MVC4 project from Visual Studio 2012, IIS Express starts and then automatically launches the default page for the default site (i.e. the one I'm working on). How do I prevent it from opening the default page - is there a config option somwhere? A: If you want to open a different file in your browser when you start then right-click on a file in your Solution Explorer and choose "Set as start page". To not do anything (i.e. just start IIS without invoking your browser) then go to your project properties and go to the Web tab. There are some settings there.
null
minipile
NaturalLanguage
mit
null
Washington Gov. Jay Inslee signed an executive order in 2016 on telecommuting, noting that letting public employees work remotely can “reduce transportation-related greenhouse-gas emissions.” And those emissions do add up, especially if you commute from Morocco to Washington—as the Governor’s senior climate policy adviser, Chris Davis, has done since August. “ Heather and I have hoped to expose our two boys to life overseas and an opportunity to act on that long-held goal recently materialized when she was offered a teaching position [in] Marrakesh, Morocco,” Mr. Davis told his colleagues in an email last summer obtained by the Competitive Enterprise Institute’s Chris Horner. Lucky for him, “as our climate work has grown increasingly international in scope, the Governor asked me to continue to help build those networks from abroad.” When Mr. Davis traveled from Marrakesh to New York to Washington for work this fall, he incurred more than $3,700 in taxpayer-funded expenses. He emitted more than 4,500 pounds of carbon on the journey, according to a United Nations flight emissions calculator. The Governor’s office also approved $2,082 in expenses for Mr. Davis’s expedition from Morocco to Germany in November.
null
minipile
NaturalLanguage
mit
null
Q: Java; Runtime Interpretation; Strategies To Add Plugins I'm beginning to start on my first large project. It will be a program very similar to Rosetta Stone. It will be a program, used for learning a foreign language, written in Java using Swing. In my program I plan on the user being able to select downloaded courses to learn from. I will be able to create an English course since I am a native English speaker. However, I want people who speak other languages to be able to write courses for users to use as well (this is an essential part for my program to work). Since I want the users to be able to download courses of languages they want, having it hard-coded into the program is out of the question. The courses needed to be interpreted during the runtime. Also since I want others to collaborate with my work (ie make courses), I need to make it easy for them to do so. What would be the best way to go about doing this? The idea I have come up with is having a strict empty course outline (hard-coded) with a simple xml file which details the text and sounds to be used. The drawback to this is that it extremely limits the author. Different languages may need to start out with learning different parts. Any advice on the problem at hand as well as the project as a whole will be greatly appreciated. Any links to any relevant resources or information would also be greatly appreciated. Think you for your time and effort, Joseph Pond A: Simply, you should base your program on a system such as Eclipse RCP, or the Netbeans Platform. Both of these systems already deal with exactly this problem, and both are perfectly adequate for this task. They're not just for IDEs. It's a larger first step as you will need to learn one of these platforms beyond simply just Swing. But, they solve the problem, and their overall organization and technique will serve your program well anyway. Don't reinvent this wheel, just learn one of these instead. A: If you are set on doing this from scratch (Will's idea isn't bad), What I would do is first lay down the file format that would be easiest to create your language course in. It could be XML, plaintext or some other format you come up with yourself. You will probably need some flexibility in the language format because you will want to actually be able to specify things like questions and answers. XML is a pain because of all the extra terminators, but it gives a good amount of meta-data. If you like XML for that, you may consider defining your language file in YML, it gives you the data of XML but uses whitespace delineators instead of angle brackets. You probably also want to define your file in the language it's created for, so you might or might not want to require english words as keys. If you don't want any english, you may have to skip both XML and YML and come up with your own file format--possibly where the layout and/or special symbols define the flow and "functionality". Once you have defined the file format, you won't have to worry about hard-coding anything... you won't be able to because it will already be in the file. Plug-in functionality would be nice as well... This is where your definition file also contains information that tells you what class to instantiate (reflectively) and use to parse/display the data. In that way you could add new types of questions just by delivering a new jar file. If this is confusing, sorry, this is difficult in a one-way forum because I can't look at your face and see if you're following me or if I'm even going in the right direction. If you think I'm on the right track and want more details (I've done a bit of this stuff before) feel free to leave a follow-up question (or an email address) in a comment and I'd be glad to discuss it with you further.
null
minipile
NaturalLanguage
mit
null
In synchronous integrated circuits, the integrated circuit is clocked by an external clock signal and performs operations at predetermined times relative the rising and falling edges of the applied clock signal. Examples of synchronous integrated circuits include synchronous memory devices such as synchronous dynamic random access memories (SDRAMs), synchronous static random access memories (SSRAMs), and packetized memories like SLDRAMs and RDRAMs, and include other types of integrated circuits as well, such as microprocessors. The timing of signals external to a synchronous memory device is determined by the external clock signal, and operations within the memory device typically must be synchronized to external operations. For example, commands are placed on a command bus of the memory device in synchronism with the external clock signal, and the memory device must latch these commands at the proper times to successfully capture the commands. To latch the applied commands, an internal clock signal is developed in response to the external clock signal, and is typically applied to latches contained in the memory device to thereby clock the commands into the latches. The internal clock signal and external clock must be synchronized to ensure the internal clock signal clocks the latches at the proper times to successfully capture the commands. In the present description, “external” is used to refer to signals and operations outside of the memory device, and “internal” to refer to signals and operations within the memory device. Moreover, although the present description is directed to synchronous memory devices, the principles described herein are equally applicable to other types of synchronous integrated circuits. Internal circuitry in the memory device that generates the internal clock signal necessarily introduces some time delay, causing the internal clock signal to be phase shifted relative to the external clock signal. As long as the phase-shift is minimal, timing within the memory device can be easily synchronized to the external timing. To increase the rate at which commands can be applied and at which data can be transferred to and from the memory device, the frequency of the external clock signal is increased, and in modern synchronous memories the frequency is in excess of 100 MHZ. As the frequency of the external clock signal increases, however, the time delay introduced by the internal circuitry becomes more significant. This is true because as the frequency of the external clock signal increases, the period of the signal decreases and thus even small delays introduced by the internal circuitry correspond to significant phase shifts between the internal and external clock signals. As a result, the commands applied to the memory device may no longer be valid by the time the internal clock signal clocks the latches. To synchronize external and internal clock signals in modern synchronous memory devices, a number of different approaches have been considered and utilized, including delay-locked loops (DLLs), phased-locked loops (PLLs), and synchronous mirror delays (SMDs), as will be appreciated by those skilled in the art. As used herein, the term synchronized includes signals that are coincident and signals that have a desired delay relative to one another. FIG. 1 is a functional block diagram of a conventional SMD 100 that receives an applied clock signal CLK and generates a synchronized clock signal CLKSYNC in response to the CLK signal, the CLKSYNC signal being synchronized with the CLK signal. The SMD 100 includes an input buffer 102 that receives the CLK signal and generates a buffered clock signal CLKBUF in response to the CLK signal. The CLKBUF signal has a delay D1 relative to the CLK signal, where D1 corresponds to the inherent propagation delay of the input buffer. A model delay line 104 receives the CLKBUF signal and generates a forward delayed clock signal FDCLK having a model delay D1+D2 relative to the CLKBUF signal. The model delays D1 and D2 simulate the delay D1 introduced by the input buffer 102 and a delay D2 introduced by an output buffer 106 that generates the CLKSYNC signal, as will be explained in more detail below. The FDCLK signal propagates through a forward delay line 108 including a plurality of unit delays 110A-N coupled in series, each unit delay receiving an input signal from the prior unit delay and generating an output signal having a unit delay UD relative to the input signal. Each unit delay 110A-N may, for example, be an inverter as indicated for the unit delay 110A, with the inverter introducing the unit delay UD corresponding to the propagation delay of the inverter. In the forward delay line 104, the FDCLK signal propagates through the unit delays 110A-N from left to right in FIG. 1, as indicated by the orientation of the inverter in the unit delay 110A. The forward delay line 108 includes a plurality of outputs 112A-N, each output 112A-N being coupled to the output from the corresponding unit delay 110A-N, respectively. As the FDCLK signal propagates through the unit delays 110A-N, when the signal is present on a respective output 112A-N the signal is designated a delayed forward clock signal DFDCLK. A backward delay line 114 includes a plurality of unit delays 116A-N coupled in series as previously described for the forward delay line 108. Instead of providing the outputs from the unit delays 116A-N as with the forward delay line 108, however, the backward delay line 114 has a plurality of inputs 118A-N, each input being coupled to the input of the corresponding unit delay 116A-N, respectively. A mirror controller 120 is coupled to the outputs 112A-N of the forward delay line 108 and the inputs 118A-N of the backward delay line 114. In response to rising-edges of the CLKBUF signal, the mirror controller 120 applies the DFDCLK signal from the corresponding unit delay 110A-N in the forward delay line 108 to the input of the corresponding unit delay 116A-N in the backward delay line 114. For example, if the FDCLK signal has propagated to the output of the unit delay 110J, the mirror controller 120 outputs the DFDCLK signal on the output of the unit delay 110J to the input of the unit delay 116J in the backward delay line 114. The DFDCLK signal propagates through the corresponding unit delay 116A-N in the backward delay line 114 and through all unit delays to the left of that unit delay, and is output from the backward delay line 114 as a delayed clock signal CLKDEL. Thus, in the backward delay line 114, DFDCLK signal propagates through the unit delays 116A-N from right to left in FIG. 1, as indicated by the orientation of the inverter in the unit delay 116A. The output buffer 106 receives the CLKDEL signal and generates the CLKSYNC in response to the CLKDEL signal, with the CLKSYNC being delayed by the delay D2 introduced by the output buffer. As illustrated by a dotted line in FIG. 1, the output buffer 106 may correspond to a data driver that receives a data signal DQX and outputs the data signal in response to being clocked by the CLKDEL signal, as will be appreciated by those skilled in the art. The overall operation of the SMD 100 in synchronizing the CLKSYNC signal with the CLK signal will now be described in more detail with reference to FIG. 1 and a signal timing diagram of FIG. 2 illustrating various signals generated by the SMD during operation. In the example of FIG. 2, an initial rising-edge of the CLK signal occurs at a time T0. In response to the rising-edge of the CLK signal at the time T0, the input buffer 102 drives the CLKBUF signal high the delay D1 later at a time T1, with this initial rising-edge of the CLKBUF signal being designated the N edge of the CLKBUF signal. In response to the rising-edge transition of the CLKBUF signal at the time T1, the mode delay line 104 drives the FDCLK signal high the model delay D1+D2 later at a time T2. The FDCLK signal thereafter propagates through the unit delays 110A-N in the forward delay line 108 until a next rising-edge N+1 of the CLKBUF signal is applied to the mirror controller 120 at a time T3. At the time T3, the forward delay line 108 has delayed the FDCLK signal by a forward delay FD that equals TCK−(D1+D2) where TCK is the period of the CLK signal. This is true because, as illustrated in FIG. 2, the next rising-edge of the CLKBUF signal occurs TCK−(D1+D2) after the initial rising-edge of the FDCLK signal at the time T2. In response to the rising-edge of the CLKBUF signal at the time T3, the mirror controller 120 applies the FDCLK signal from the output of the appropriate unit delay 110A-N in the forward delay line 108 to the corresponding input 118A-N of the backward delay line 114. For example, assume that the delay TCK−(D1+D2) equals eleven unit delays UD so that the mirror controller 120 receives the DFDCLK signal from the output 112K of the unit delay 110K in the forward delay line 108. In this situation, the mirror controller 120 applies the DFDCLK signal to the input 118K of the unit delay 116K in the backward delay line 114. This is illustrated in FIG. 2 as a rising-edge of the DFDCLK signal at the time T3. The DFDCLK signal thereafter propagates through the appropriate unit delays 116A-N in the backward delay line 114, and at a time T4 the backward delay line 114 drives the CLKDEL signal high in response to the applied DFDCLK signal. At the time T4, the backward delay line 114 has delayed the DFDCLK signal by a backward delay BD that equals TCK−(D1+D2) which equals the forward delay FD of the forward delay line 108. This is true because the DFDCLK signal propagates through the same number of unit delays 116A-N in the backward delay line 114 as did the FDCLK signal to the unit delays 110A-N in the forward delay line 108, as will be appreciated by those skilled in the art. The total delay of the CLKDEL signal at the time T4 equals D1+D1+D2+TCK−(D1+D2)+TCK−(D1+D2), which equals 2TCK−D2. Thus, the rising-edge of the CLKDEL signal at the time T4 occurs the delay D2 of the output buffer 106 before a next rising-edge of the CLK signal at a time T5. In response to the CLKDEL signal at the time T4, the output buffer 106 drives the CLKSYNC signal high at the time T5 and in synchronism with the rising-edge of the CLK signal. In this way, the SMD 100 generates the CLKSYNC signal having rising-edges that are synchronized with the rising-edges of the CLK signal. In the SMD 100, although the input buffer 102 and output buffer 106 are illustrated as single components, each represents all components and the associated delays between the input and output of the SMD 100. The input buffer 106 thus represents the delay D1 of all components between an input that receives the CLK signal and the input to the model delay line 104, and the output buffer 106 represents the delay D2 of all components between the output of the backward delay line 114 and an output at which the CLKSYNC signal is developed, as will be appreciated by those skilled in the art. In SMD 100, the forward and backward delay lines 108, 114 each include the same number of unit delays 110A-N, 116A-N. A large number of unit delays 110A-N, 116A-N is desirable to provide the SMD 100 with better resolution in generating the forward and backward delays FD, BD, which hereinafter will collectively be referred to as a variable delay VD (i.e., VD=FD+BD). The resolution of the SMD 100 is the smallest increment of delay that can be added and subtracted from the variable delay VD, which equals twice the unit delay UD of the unit delays 110A-N, 116A-N in the SMD 100. Better resolution means the CLK and CLKSYNC signals will be properly synchronized, as will be appreciated by those skilled in the art. In addition, the forward and backward delay lines 108, 114 must be able to collectively provide a maximum variable delay VD corresponding to the CLK signal having the lowest frequency in the frequency range over which the SMD 100 is designed to operate. This is true because the forward and backward delay lines 108, 114 must each provide a delay of TCK−(D1+D2), which will have its largest value when the period TCK of the CLK signal is greatest, which occurs at the lowest frequency of the CLK signal. One approach that has been utilized to reduce the size and power consumed by the delay lines 108, 114 is illustrated in FIG. 3 which depicts an SMD 300 including a bi-directional delay line 302 for generating the required delay to synchronize a synchronized clock signal CLKSYNC with an applied clock signal CLK. The SMD 300 includes an input buffer 304, a delay line 306, and output buffer 308 that operate in the same way as previously described for the corresponding components in the SMD 100 of FIG. 1, and thus, for the sake of brevity, these components will not again be described in detail. The bi-directional delay line 302 includes a plurality of unit delays 310A-N that operate in a forward delay mode to receive a forward delayed clock signal FDCLK from the model delay line 306 and to sequentially delay this signal by a unit delay TPD as the signal propagates through each unit delay in a forward direction (left to right in FIG. 3). The FDCLK signal continues propagating through the unit delays 310A-N in the forward direction until a reflection signal REF is received from a control circuit 312. In response to the REF signal, the bidirectional delay line 302 commences operation in a backward delay mode and reverses the direction of the propagating FDCLK signal, which begins propagating through the unit delays 310A-N in a backward direction (right to left in FIG. 3). Once again, as the FDCLK signal propagates through the unit delays 310A-N in the backward direction each unit delay delays the signal by the unit delay TPD until the signal is output from the unit delay 310A as a delayed clock signal CLKDEL. The FDCLK signal propagates through the same number of unit delays 310A-N in the forward and backward delay modes. In operation, an initial rising edge of the CLK signal propagates through the input buffer 304 and the model delay line 306 to generate an initial rising edge of the FDCLK signal that is input to the unit delay 310A of the bi-directional delay line 302. In the following description, the edge of the FDCLK signal that is propagating through the bi-directional delay line 302 may simply be referred to as the FDCLK signal propagating through the bi-directional delay line for ease of description. The FDCLK signal continues propagating through the unit delays 310A-N in the forward direction until a subsequent rising edge of the CLKBUF signal from the input buffer 304 is applied to the control circuit 312. In response to the subsequent rising edge of the CLKBUF signal, the control circuit 312 applies an active REF signal to the bi-directional delay line 302 which, in turn, commences operation in the backward mode in response to the REF signal. Note that at this point, as indicated in FIG. 3, the delay introduced by the bi-directional delay line 302 equals a forward delay FD that is equal to TCK−(D1+D2). The FDCLK signal thereafter propagates through the unit delays 310A-N in the backward direction until the signal is output from the unit delay 310A as the CLKDEL signal. The bi-directional delay line 302 delays the FDCLK signal in the backward direction by a backward delay BD which approximately equals the forward delay FD of TCK−(D1+D2). In response to the CLKDEL signal, the output buffer 308 generates the CLKSYNC signal that is synchronized with the CLK signal. More specifically, in the simplified embodiment of FIG. 3 alternate rising edges of the CLKSYNC signal are synchronized with corresponding rising edges of the CLK signal. FIG. 4 illustrates one embodiment of the bi-directional delay line 302 of FIG. 3 and illustrates the unit delays 310A-N in more detail. Each unit delay 310A-N includes a first group of the PMOS and NMOS transistors 402-408 connected in series and connected to a second group of the PMOS and NMOS transistors 410-416 the connected in series, as illustrated. The PMOS transistors 402 and NMOS transistors 408 in each unit delay 310A-N receive a forward control signal FWD while the PMOS transistors 410 and NMOS transistors 416 receive a backward control signal BWD. The FWD and BWD signals are active high and are complementary signals, meaning that when the FWD signal is high the BWD signal is low and when the BWD signal is high the FWD signal is low. In each unit delay 310A-N, the transistor 406 receives a forward input signal FA−FN−1 from a forward output node 418 of the preceding unit delay, with the unit delay 310A receiving the FDCLK signal as the forward input signal applied to the transistor 406. In addition, each transistor 414 in the unit delays 310A-N receives a backward input signal BB−BN+1 from a backward output node 420 of the subsequent unit delay, with the backward output node 420 of the unit delay 310A providing the CLKDEL signal. In addition, in the final unit delay 310N the forward output node 418 may be coupled to the gate of the transistor 414 to apply the forward input signal FN as the backward input signal BN+1 in the unit delay 310N. The operation of the bi-directional delay line 302 of FIG. 4 will now be described in more detail with reference to a signal timing diagram of FIG. 5 that illustrates various signals in the bi-directional delay line during operation in the forward and backward modes. Prior to commencing operation of bi-directional delay line 302 in delaying the FDCLK signal, the delay line operates in an initialization mode to precharge various signals to desired values. To place the bi-directional delay line 302 in the initialization mode, the control circuit 312 (FIG. 3) drives the BWD signal active high, drives the FWD signal inactive low, and applies a high backward input signal BN+1 to the final unit delay 310N. In response to these signals, the bi-directional delay line 302 precharges the nodes 420 and thereby the CLKDEL and BB−BN signals high and the nodes 418 and thereby the FA−FN−1 signals low, as will now be described in more detail. In the following description, the BB−BN and FA−FN−1 signals will be described as being precharged either high or low, which means the corresponding nodes 418, 420 are either being charged or discharged to drive the corresponding BB−BN and FA−FN−1 signals to the desired voltage level, as will be appreciated by those skilled in the art. During the initialization mode, in response to the active high BWD signal, the transistors 410 and 416 in each unit delay 310A-N turn OFF and ON, respectively, and in response to the inactive low FWD signal the transistors 402 and 408 turn ON and OFF, respectively. Starting with the unit delay 310N, the high BN+1 signal turns ON the transistor 414 which, in turn, precharges the FN signal low and turns ON the transistor 404. The transistors 402, 404 are now both turned ON, precharging the BN signal high. In response to the high BN signal, the transistor 414 in the unit delay 310N−1 (not shown) turns ON. At this point, the transistors 414 and 416 in the unit delay 310N−1 are both turned ON, precharging the FN−1 signal low. This low FN−1 signal causes the transistor 404 in the unit delay 310N−1 to turn ON and the turned ON transistors 402, 404 to precharge the BN−1 signal high. The signals propagate through the unit delays 310A-N in this manner until the BB signal from the unit delay 310B is precharged high, turning ON transistors 414, 416 in the unit delay 310A and precharging the FA signal low which, in turn, drives the CLKDEL signal high through the turned ON transistors 402, 404. At this point, the bi-directional delay line 302 is initialized, having precharged the FA−FN−1 signals low and the CLKDEL and BB−BN signals high. Before a time T0 in FIG. 5, the CLKDEL, FA−FE, and BB−BF signals are shown at their precharged levels. After the bi-directional delay line 302 has been initialized and before the time T0, the control circuit 312 drives the FWD and BWD signal high and low, respectively, to place the delay line in a forward delay mode of operation in anticipation of a rising edge of the CLK signal. At the time T0, a rising edge of the CLK signal is applied to the input buffer 304, and in response to the rising edge of the CLK signal the input buffer 304 generates a rising edge of the CLKBUF signal the delay D1 later at a time T1. In response to the rising edge of the CLKBUF signal at the time T1, the model delay line 306 develops a rising edge of the FDCLK signal the model delay D1+D2 after the time T1, which occurs at just before a time T2. At the time T2, the high FDCLK signal turns ON the transistor 406, driving the CLKDEL signal low through the turned ON transistors 406, 408. In response to the low CLKDEL signal, the transistor 412 turns ON and the FA signal is driven high through the transistors 410, 412, which occurs just after the time T2. The high FA signal turns ON the transistor 406 in the unit delay 310B, which then drives the BB signal low through the transistors 406, 408. As shown in FIG. 5, this falling edge transition of the BB signal occurs a unit propagation delay TPD after the falling edge transition of the CLKDEL signal at just after the time T2. In the forward delay mode, the unit propagation delay TPD introduced by the unit delay 310A may more conveniently be viewed as corresponding to the delay between the rising edge of the FDCLK signal at just before the time T2 and the rising edge of the FA signal just after the time T2. At just before a time T3, the FB signal from the unit delay 310B goes high in response to the low BB signal, which turns ON the transistors 410, 412 in the unit delay 310B and thereby drives the FB signal high. At the time T3, the subsequent rising edge of the CLK signal is applied to the input buffer 304. The unit delays 310C-E (not shown in FIG. 4) operate in the same way as just described for the unit delays 310A-B, each unit delay 310 receiving the FX−1 signal from the preceding unit delay, which turns ON the transistors 406, 408 in the unit delay and drives the corresponding BX signal low, with the low BX signal turning ON the corresponding transistor 412 to thereby drive the FX signal high through the turned ON transistors 410, 412 in the unit delay, as illustrated for the corresponding signals in FIG. 5. At a time T4, which is the delay D1 of the input buffer 304 after the time T3, the next rising edge of the CLKBUF signal occurs. In response to this rising edge of the CLKBUF signal at T4, the control circuit 312 drives the FWD and BWD signals low and high, respectively, placing the delay line 302 in a backward delay mode of operation. In response to the low FWD signal, the transistors 408 in each unit delay 310A-N turn OFF and the transistors 402 turn ON, and in response to the high BWD signal the transistors 416 turn ON and the transistors 410 turn OFF. At the time T4, the FE signal from the unit delay 310E had begun going high to turn ON the corresponding transistor 406 in the unit delay 310F, as illustrated by the FE signal in FIG. 5. Moreover, at the time T4 the transistor 406 in the unit delay 310F had begun turning ON and started driving the BF signal low, as is also illustrated in FIG. 5. But at the time T4, due to the FWD and BWD signals being driven low and high, respectively, the BF signal in the unit delay 310F stops going low and is driven back high by the turned ON transistors 402, 404 in the unit delay 310G. As the BF signal is driven high, the high BF signal turns ON the transistor 414 in the unit delay 310E which, in turn, drives the FE signal back low through the turned ON transistors 414, 416. The unit delays 310E-A thereafter operate in the same way as just described for the unit delays 310E, each unit delay 310X receiving the BX+1 signal from the subsequent unit delay, which turns turn ON the transistors 416, 418 in the unit delay and drives the corresponding FX signal low, with the low FX signal turning ON the corresponding transistor 404 to thereby drive the BX signal high through the turned ON transistors 402, 404 in the unit delay, as illustrated for the corresponding signals in FIG. 5. The delay between the times T3-T4 corresponds to the forward delay FD of the delay line 302. At a time T5, the CLKDEL signal from the unit delay 310A goes high in response to the BB signal going low, with the interval T4-T5 defining a backward delay time BD of the delay line 302. At a time T6, which occurs the delay D2 of the output buffer 308 (FIG. 3) after the time T5, the output buffer drives the CLKSYNC signal in synchronism with a corresponding rising edge of the CLK signal. In the bi-directional delay line 302, the resolution of the delay line is defined by the analog operation of the last unit delay 310A-N that is utilized in delaying the applied FDCLK signal. In the example of FIG. 5, the unit delay 310F is the final unit delay used in delaying the applied FDCLK signal, and thus the analog operation of the unit delay 310F defines the resolution of the generated forward and backward delays FD+BD. This is true because the analog voltages developed in the final unit delay 310F at the point the delay line 302 terminates operation in the forward delay mode, which corresponds to the time T4 in FIG. 5, are utilized at the start of operation in the backward delay mode, which also corresponds to the time T4. For example, at the time T4 the BF signal in the unit delay 310F returns high from its value at the time T4 and is applied to the transistor 414 in the unit delay 310E to drive the FE signal back low from its value at the time T4. Thus, the time it takes the BF signal in the unit delay 310F to return high depends on its value at the time T4, and this time determines the time required to drive the FE signal back low from its current value at the time T4. The values of these signals at the time T4 thereby determine the propagation delay introduced by the final unit delay 310F. In the unit delays 310A-N, the delay introduced by the final unit delay 310F is ideally equal for the forward and backward delay modes of operation so that the forward delay FD is equal to the backward delay BD. Thus, in FIG. 5 the waveform of the BF signal around the time T4 is ideally symmetrical since the time T4 defines both the termination of the forward delay mode and the start of the backward delay mode. In order for the delay introduced by the final unit delay 310F to be equal in both the forward and backward delay modes, the NMOS transistors 406,408 and PMOS transistors 402, 404 must be formed having the proper sizes and operating characteristics or “matched”, as will be appreciated by those skilled in the art. More specifically, note that during operation in the forward delay mode the NMOS transistors 406,408 in the final unit delay 310F begin pulling the BF signal low in response to the high going FE signal from the prior unit delay 310E. When the mode of operation is switched to the backward delay mode, however, it is the PMOS transistors 402, 404 in the final unit delay 310F that drive the BF signal back high. Thus, the rate at which the NMOS transistors 406,408 drive the BF signal low during the forward delay mode is ideally equal the rate at which the PMOS transistors 402, 404 drive the BF signal high during the backward delay mode. In order to make the rates at which the NMOS transistors 406,408 and PMOS transistors 402, 404 drive the BF signal low and high during the forward and backward delay modes, respectively, the transistors must be designed having the required operating characteristics, as previously mentioned. For example, due to the lower majority charge carrier mobility in PMOS transistors, these transistors must be physically larger than corresponding NMOS transistors to provide the same voltage-current characteristics, as will be appreciated by those skilled in the art. For the PMOS transistors 402, 404 to drive the BF signal high during the backward delay mode at the same rate the NMOS transistors 406,408 drive the signal low during the forward delay mode the PMOS transistors must therefore be physically larger than NMOS transistors. The physically larger size of the PMOS transistors 402, 404, however, increases the capacitances of the PMOS transistors relative to the NMOS transistors 406,408. This increased capacitance of the PMOS transistors 402, 404 affects the operation the transistors and thus may result in operating characteristics that are different for the PMOS transistors 402, 404 and NMOS transistors 406, 408, which will result in different delays being introduced by the final unit delay 310F and will adversely affect the resolution of the SMD 300. As previously discussed for the SMD 100 of FIG. 1, the bi-directional delay line 302 in the SMD 300 must provide a maximum variable delay VD (FD+BD) corresponding to the CLK signal having the lowest frequency in the frequency range over which the SMD 300 is designed to operate. This may require the bi-directional delay line 302 to include a relatively large number of unit delays 310A-N which, as previously discussed, can result in significant power consumption by the SMD 300 and which may be undesirable, particularly in applications where the synchronous memory device is contained in a portable battery-powered device. Moreover, in the SMD 300 the required delay resolution may be difficult to obtain due to the inherent problems associated with properly sizing the NMOS and PMOS transistors in the unit delays 310A-N, as will be appreciated by those skilled in the art. As operating frequencies increase, even small variations in the variable delay VD can introduce undesirable delays or jitter of the CLKSYNC signal relative to the CLK signal. There is a need for an SMD having good resolution that occupies less space on a semiconductor substrate and consumes less power.
null
minipile
NaturalLanguage
mit
null
Liverpool need 'proven' partner for Danny Ings says Danny Murphy Liverpool have been urged to add to their attack despite the signing of Ings.Getty Images Liverpool have been urged to further improve their attack despite the signing of Danny Ings from Burnley. Ings, who netted 11 Premier League goals last season for the relegated Clarets, will join the Reds this summer -- alongside returning loanee Divock Origi -- following a tribunal to decide a fee Liverpool must pay for the striker. The England Under-21 international will join a Liverpool forward line which includes Fabio Borini, Rickie Lambert, Daniel Sturridge and Mario Balotelli, who mustered just eight league goals between them last term, and former midfielder Danny Murphy says more firepower is required. "Danny Ings is talented and he can score goals," he told talkSPORT. "It's tough to judge him on this season because he's been playing for Burnley. He's a talent, but he is unproven at the top level. "He's a great prospect and he's English, so that's good news for Liverpool. At this stage though, to get back into the top four, do they need a proven out and out striker? A bigger, more established, name? Or are they going to rely on Daniel Sturridge being fit? Because I'm not sure they can." Liverpool's failure to qualify for the Champions League last season was undermined by their summer of spending, with few of the signings made by Brendan Rodgers making an impact in their maiden campaign. With no top tier European football to attract players, Liverpool face a tough summer transfer widow despite having already acquired James Milner on a free from Manchester City. Former winger John Barnes says with the club now on the back foot in the window, Rodgers must find value in the market similar to when he signed Philippe Coutinho from Inter Milan for £8m in January 2013. "They can't take a gamble any more," he told Talksport. "They can't get the best in the world. Liverpool can't compete with Chelsea, Manchester City and Manchester United from a salary perspective so they are going to have to maybe find another [Philippe] Coutinho."
null
minipile
NaturalLanguage
mit
null
With the Possession range, Piaget inspires emotion. A small off-centred diamond, with a nonchalant air as though it has fallen from the ring, gives a fanciful touch to these earrings. The word Possession, engraved on the ring, expresses all the strength of a magnetic attachment. The Possession engraving gives brilliance. *Piaget luxury watches and jewellery are individually produced and thus the weight and carats of each product can vary from the displayed data. Suggested items Our designers continually revisit the themes that Piaget holds dear. They draw inspiration from a strong historical legacy and modern themes with a wide range of styles reminiscent of Hollywood glamor, magic gardens and the many facets of celebratory occasions.
null
minipile
NaturalLanguage
mit
null
Q: Comparison between hierarchical clustering and principal component analysis (PCA) I just read a article about the comparison between PCA and hierarchical clustering, but I cannot find the strengths and weakness of clustering compared Principal Component Analysis, what about other clustering algorithm? Could anyone provide some details about this? PCA - creates a low-dimensional representation of the samples from a data set which is optimal in the sense that it contains as much of the variance in the original data set as is possible. PCA also provides a variable representation that is directly connected to the sample representation, and which allows the user to visually find variables that are characteristic for specific sample groups. Hierarchical clustering - builds a tree-like structure (a dendrogram) where the leaves are the individual objects (samples or variables) and the algorithm successively pairs together objects showing the highest degree of similarity. Article: Comparison between clustering and PCA A: There is a very weak link because both PCA and k-means clustering try to minimize the least squared deviations. But that is a pretty much universal principle, and there exists so much more clustering than just k-means. And does not apply to general hierarchical clustering. See also: What is the relation between k-means clustering and PCA? The 'article' you linked, however, should probably go into the trash bin. That is just a sales brochure...
null
minipile
NaturalLanguage
mit
null
Introduction {#sec1} ============ Lichen planus (LP) is a common inflammatory dermatosis, which involves the skin, mucosa, and nails. The clinical presentation is highly variable with over 20 distinct morphologic forms described.[@bib1] Annular LP, which presents with circinate lesions with elevated borders, is a rare form of LP, comprising 7%-10% of LP cases.[@bib2] Annular LP has been reported in association with Sneddon syndrome, Crohn disease, and HIV infection.[@bib2], [@bib3] Drug-induced annular LP has not been described. Here, we report the first case of efavirenz-induced giant annular LP in a patient with HIV. Case report {#sec2} =========== A 40-year-old black man presented to the dermatology clinic at King Edward Hospital (Durban, South Africa) with an 18-month history of widespread pruritic annular plaques. He was diagnosed with HIV infection 22 months before presentation with a CD4 count of 8 cells/mm^3^ and viral load of 16,000 copies/mL. He was started on first-line antiretroviral (ARV) therapy with stavudine, lamivudine, and efavirenz as well as *Pneumocystis jirovecii* and *Toxoplasma gondii* prophylaxis with trimethoprim-sulfamethoxazole (TMP-SMX). Four months after initiation of drug therapy, he developed mildly pruritic large circinate plaques with raised erythematous scaly borders and hyperpigmented wood-grain centers involving the trunk, extremities, buttocks, and scrotum ([Figs 1](#fig1){ref-type="fig"} and [2](#fig2){ref-type="fig"}). The lesions started as small erythematous to violaceous plaques and spread outwards to attain an annular configuration, ranging from 2-30 cm in width. He had no mucosal, nail, or scalp involvement. He appeared well and denied fevers, chills, night sweats, weight loss, cough, or shortness of breath. He reported daily adherence to stavudine, lamivudine, efavirenz, and TMP-SMX. He took no other prescribed medications, vitamins, herbal supplements, or homeopathic remedies.Fig 1Giant annular lichen planus on trunk. The rash is not photo-distributed.Fig 2Giant annular lichen planus on buttocks and lower extremities. The patient was treated empirically for syphilis infection with benzathine penicillin G. Laboratory evaluation revealed that he was negative for rapid plasmin reagin, his CD4 count was 310 cells/mm^3^, and he had an undetectable viral load. A skin biopsy was performed that demonstrated lichenoid interface dermatitis with parakeratosis and dyskeratosis, a mononuclear perivascular infiltrate, and eosinophils consistent with a lichenoid hypersensitivity reaction ([Fig 3](#fig3){ref-type="fig"}).Fig 3Hematoxylin-eosin stain of punch biopsy. The patient started topical steroid therapy and subsequently stopped TMP-SMX for 3 months with no effect. ARV-induced hypersensitivity reaction was suspected; however, because of resource limitations for alternative ARV therapy, a treat-through approach was attempted. The patient was started on acitretin 30 mg/day for 3 months followed by prednisone 1 mg/kg for 6 weeks, neither of which resulted in clinical response. Ultimately, stavudine, lamivudine, and efavirenz were discontinued, and the patient had complete resolution of rash 2 weeks later ([Fig 4](#fig4){ref-type="fig"}). He was transitioned to stavudine, lamivudine, and lopinavir/ritonavir without recurrence of rash.Fig 4Clinical improvement after 2 weeks of cessation of antiretroviral therapy. Discussion {#sec3} ========== Annular LP is a rare variant of LP that presents as circinate lesions with elevated borders and central clearing. There are 2 proposed mechanisms by which the annular morphology is achieved; coalescing of lichenoid papules into a ring formation[@bib4] and central involution of a flat-topped plaque with advancing border.[@bib5] Annular LP most commonly presents with few localized lesions with distribution patterns that vary by ethnicity (eg, genitalia in black men, intertriginous sites in whites, and extremities in a Japanese cohort).[@bib2], [@bib5], [@bib6] Generalized annular LP, such as that seen in our patient, is rarely described, with one of the few other reported cases presenting in a patient at the time of HIV diagnosis.[@bib3] LP is an inflammatory dermatosis that can be either idiopathic or associated with exogenous antigens, such as hepatitis C virus, vaccines, contact allergens, and medications.[@bib7] Compared with idiopathic LP, drug-induced LP (lichenoid drug eruption) more commonly presents in photo-distributed areas, sparing the wrists and lower legs and rarely involves the mucosa.[@bib7] Eosinophils, parakeratosis, and deep involvement of the lymphocytic infiltrate are characteristic histologic findings of lichenoid drug eruption. However, histologic staining alone cannot be reliably used to distinguish between drug-induced and idiopathic LP.[@bib8] Our patient had many clinical and histologic features of drug-induced LP, including sparing of the distal extremities and mucosa as well as presence of eosinophils on pathology. He also scored highly on the Naranjo scale, demonstrating probable causality between efavirenz and the adverse cutaneous reaction.[@bib9] His morphologic presentation of generalized giant annular LP is the first described in relation to drug exposure. HIV infection predisposes to a variety of inflammatory and infectious skin conditions, which often have severe or atypical presentations. Cutaneous adverse drug reactions (CADRs) include drug hypersensitivity syndrome, Stevens-Johnson syndrome, toxic epidermal necrolysis, lichenoid, and fixed drug eruptions and are particularly common in people with HIV infection because of altered drug metabolism due to slow acetylator status, dysregulated immune system, multidrug regimen therapy, and predisposing viral infection.[@bib10] Nonnucleoside reverse transcriptase inhibitors are a major cause of CADRs, with cutaneous reactions occurring in 10%-17% of patients.[@bib11] Efavirenz, a nonnucleoside reverse transcriptase inhibitor, tends to cause milder forms of CADRs compared with its counterpart nevirapine, with Stevens-Johnson syndrome/toxic epidermal necrolysis occurring in only 0.1% of patients. Although efavirenz-induced eruptions have been poorly defined, a series of 5 photo-distributed, annular erythematous eruptions have been reported with disparate histology results, including spongiotic, vesiculobullous, and perivascular patterns.[@bib11] CADRs are common in HIV-infected patients due to a combination of host immunologic factors, as well as the complexity of drug regimens in HIV. In caring for patients with HIV, clinical suspicion of CADRs must remain high because they can present atypically and with novel morphology. In cases of mild CADRs, a treat-through approach is an option in order to continue important systemic medications, particularly in low-resource settings with limited options for alternative therapy. However, our case necessitated cessation of therapy. Our patient represents the first reported case of efavirenz-induced lichenoid drug eruption, which presented as a rare form of generalized annular LP, and thus, efavirenz should be included in the list of drugs that can cause lichenoid eruption. The authors would like to acknowledge Preetha Hariram, MBChB, MMed, FCDerm, and Mahendran Moodley, MBChB, FCDerm, for their efforts in the diagnostic workup and management of this case. Funding sources: None. Conflicts of interest: None declared.
null
minipile
NaturalLanguage
mit
null
Hikes 4 Gorgeous Spring Hikes at Mt. Rainier Spring is one of our favorite seasons at Mt. Rainier. It’s splendid to watch the environment slowly transforming and everything turning green once again. If you have spent the winter months hibernating, it’s time to crawl out of your cave and enjoy the refreshing mountain air! One of the best ways to explore Mt. Rainier is by foot, and the mountain is lined with hundreds of miles of beautiful trails for hikers of all ability and skill level. Spring hikes at Mt. Rainier are some of the best you can experience. While spring hikes are beautiful and give visitors the opportunity to see the mountain waking up, the weather can be erratic and calls for some preparation and planning ahead. Trail-goers should be prepared for both wintery and warm conditions. Make sure to have the hiking boots and layers of clothing appropriate for a variety of conditions. Even if it is warm and sunny, it is sure to be wet because of the snow melt. Because the weather can change quickly, make sure to always plan ahead. Check in on the weather status at the mountain and make sure the trail you are planning on hiking is open and safe. The following are 4 Mt. Rainier Trails that are perfect for hiking during the spring months: Ranger Falls: The snow is melting and the waterfalls at Mt. Rainier are magnificent. If you are up for a challenging hike with a big payoff, the hike to Ranger Falls is perfect for you. It is a hefty 11.2-mile hike that follows the Carbon River Road to the Ipsut Creek Campground. The trail is closed to traffic and takes hikers through beautiful old-growth forests, by Green Lake Trail, and then to Ranger Falls where you can view the breathtaking, multi-tiered waterfall. This is a Spring hike that is well worth the work. Trail of the Shadows: This trail is perfect for young families that are going stir crazy from being cooped up. It’s just under a mile with no elevation gain and captivating views created by the mineral springs. It takes visitors by the marsh, through the colorful meadows, and to Longmire Springs Hotel. Beyond the hotel you will pass Soda Springs and then come to Longmire Cabin, which is the oldest structure inside the park. The wildlife and historical sites will captivate people of all ages and is the perfect first trek, especially for those with little ones. Melmont Ghost Town: This is another easy hike that is perfect for both the beginner and intermediate hiker. It’s 3.84 miles with very little elevation gain. If you are the kind of hiker who enjoys exploring old towns and historical sites, this trail will not disappoint. Melmont is a fun Ghost town to explore and dates back to the early 1900s when the Northwest Improvement Company opened the Melmont coal mine. It quickly grew into a vibrant town until around1915 when it began to slowdown and deteriorate. By the1920s all of the coal mines had shut down and what was left of the town was burnt in a fire. Hikers are encouraged to explore this trail in the spring time before the greenery covers the artifacts. There’s a lot to explore and this hike makes for a wonderful day trip. Carter and Madcap Falls: If you are addicted to the beauty of waterfalls, the hike to Carter and Madcap Falls is much shorter than the Ranger Falls hike when you take off from the Cougar Rock Campground gate. 2.2 miles of trail make this a great family hike, but make sure the snow has melted and the trail is in good condition before you go. The trail runs along Paradise River and takes you through beautiful forested areas making it a scenic delight. You encounter Carter Falls first and then 50 yards farther down the trail Mad Cap Falls appears. If you want a slightly longer hike you can start at Longmire, extending it to 5.5 mile hike. We’re sure you’ll love these 4 spring hikes at Mt. Rainier. And when you’ve completed your hike, you can head back to one of our well-appointed Mt. Rainier cabins for a soak in the hot tub. For a full list of trails to explore visit Visit Rainier. This site will keep you updated on weather and road conditions and so much more.
null
minipile
NaturalLanguage
mit
null
--- abstract: 'We construct many examples of level one Siegel modular forms in the kernel of theta operators mod $p$ by using theta series attached to positive definite quadratic forms.' author: - 'Siegfried Böcherer, Hirotaka Kodama and Shoyu Nagaoka' title: On the kernel of the theta operator mod $p$ --- Introduction {#intro} ============ Ramanujan’s $\theta$ operator is a familiar topic in the theory of elliptic modular forms, defined by $$f=\sum a(n)e^{2\pi i nz}\longmapsto \theta(f)=\frac{1}{2\pi i} f'=\sum n a(n)e^{2\pi i nz}$$ For Siegel modular forms of degree $n$, the Fourier expansion runs over positive semidefinite half-integral matrices of size $n$ and we can define several analogues of the Ramanujan $\theta$ operator: For $1\leq r\leq n$ we may introduce $$\begin{aligned} F=\sum_T a(T) e^{2\pi i \text{tr}(TZ)}\longmapsto \Theta^{[r]}(F) &:= \frac{1}{(2\pi i)^r}\left(\frac{\partial}{\partial_{ij}}\right)^{[r]}F\\ &=\sum_T T^{[r]}a(T)e^{2\pi i \text{tr}(TZ)},\end{aligned}$$ where, for a matrix $A$ of size $n$, we denote by $A^{[r]}$ the matrix of all the determinants of its submatrices of size $r$ and $\partial_{ij}:=\frac{1}{2}(1+\delta_{ij})\frac{\partial}{\partial z_{ij}}$. In general, $\Theta^{[r]}(F)$ is no longer a modular form, but it is a modular form mod $p$ (even a $p$-adic modular form), vector-valued if $r<n$, see [@B-N3].\ Our aim in the present paper is to explore the existence and explicit construction of Siegel modular forms which are in the kernel of such $\Theta$-operators mod $p$. Obvious candidates for such modular forms are theta series $\vartheta_S^n$ $$\vartheta^n_S(Z)=\sum_{X\in {\mathbb Z}^{(n,n)}}e^{2\pi i \text{tr}({}^tXSXZ)},$$ attached to positive quadratic forms $S$ of rank $n$ and level being a positive power of $p$; we will also consider variants of this involving a harmonic polynomial. Looking at the Fourier expansion, evidently such theta series are in the kernel of $\Theta^{[n]}$ mod $p$. On the other hand, these theta series are not of level one and one has to do a level change to level one. This method only works for even degree $n$, because we otherwise enter into the realm of modular forms of half-integral weight, but we shall exhibit a somewhat weaker variant of our method also for the case of odd $n$. On the other hand, for even degree, our method provides plenty of examples for level one forms $F$ (of weight in an arbitrary congruence class modulo $p-1$) which satisfy $\Theta^{[j]}(F)\equiv 0 \pmod{p}$ and $\Theta^{[j-1]}(F)\not\equiv 0 \pmod{p}$. Here $j$ is almost arbitrary, the only obstruction comes from the arithmetic of quadratic forms, which puts some constraint on $(n,j,p)$.\ We have to make an important comment on what we mean by “explicit construction” here: The kernel of $\Theta^{[j]}$ mod $p$ is a notion which depends only on modular forms mod $p$, therefore the weight of the constructed modular form is only of interest mod $(p-1)$. On the other hand, one is also interested in explicit small weights for which we can get modular forms in the kernel mod $p$. In this paper we address both versions of explicit construction, we will call them “weak construction” and “strong construction” respectively; in most cases our “strong construction” also gives the smallest possible weight, which is called “filtration” in the work of Serre and Swinnerton-Dyer, see [@B-K-T] for details. In the final section we also show that some of the known examples of congruences for degree two Siegel modular forms can be explained by our methods.\ Finally we remark that most of our results are formulated for odd primes only. The reader interested in $p=2$ may adjust some of our results and methods to $p=2$. Preliminaries {#Prel} ============= Siegel modular forms {#Siegel} -------------------- For standard facts about Siegel modular forms we refer to [@A; @F; @Kl]. The group $Sp(n,\mathbb R)$ acts on the upper half space $\mathbb H_n$ in the usual way. For an integer $k$, a function $f:\mathbb H_n \longrightarrow \mathbb C$ and $M=\binom{AB}{CD}$ we define the slash operator by $$(f\mid_k M)(Z):=\mathrm{det}(CZ+D)^{-k}f((AZ+B)(CZ+D)^{-1}).$$ For a congruence subgroup $\Gamma $ of $Sp(n,\mathbb Z)$ and a character $\chi $ of $\Gamma$ we denote by $M_k(\Gamma ,\chi)$ the space of Siegel modular forms for $\Gamma $ of weight $k$ and character $\chi $ and $S_k(\Gamma ,\chi)$ the subspace consisting of cusp forms. If $\chi $ is trivial, we just omit it. We will mainly be concerned with congruence subgroups of type $$\Gamma _0^n(N):=\left\{M=\binom{AB}{CD}\mid C\equiv 0\bmod{N}\right\}$$ and with groups arising from these by conjugation within $Sp(n,\mathbb Z)$. If $N=1$ we just write $\Gamma ^n$ instead of $\Gamma_0^n(1)$. The only characters of $\Gamma_0^n(N)$ occuring are those arising from Dirichlet characters mod $N$ in the usual way (i.e. $\chi (M)=\chi (\mathrm{det}D)$), the most important one will be the quadratic character $$\chi _p(*):=\left(\frac{(-1)^{\frac{p-1}{2}}p}{*}\right)$$ for an odd prime $p$. If $f$ is an element of $M_k(\Gamma)$ for an arbitrary $\Gamma$, then $f$ has a Fourier expansion $$f(Z)=\sum_Ta(T;f)e^{2\pi i\mathrm{tr}(TZ)}$$ where $T$ runs over positive semidefinite rational symmetric matrices with bounded denominator. In particular, for $\Gamma =\Gamma _0^n(N)$, $T$ runs over positive semidefinite matrices in $$\Lambda _n:=\left\{T=(t_{ij})\in \mathrm{Sym}_n(\mathbb Q)\mid t_{ii},2t_{ij}\in \mathbb Z\right\}.$$ For a subring $R$ of $\mathbb C$ we denote by $M_k(\Gamma )(R)$ the set of $f\in M_k(\Gamma )$ whose Fourier coefficients lie in $R$. Traces {#Traces} ------ We need the explicit form of the trace map $$\mathrm{Tr}:\begin{cases}M_k(\Gamma_0^n(p)) \longrightarrow M_k(\Gamma^n)\\ \ \ \ \ \ \ f \ \ \ \ \ \longmapsto \sum_\gamma f\mid _k\gamma \end{cases}$$ where $\gamma $ runs over $\Gamma_0^n(p)\setminus \Gamma ^n$, see also [@B-F-S]. To obtain an explicit set of representatives for these cosets we start from a Bruhat decomposition over the finite field $\mathbb F_p:$ $$Sp(n,\mathbb F_p)=\bigcup_{j=0}^nP(\mathbb F_p)\cdot \omega_j \cdot P(\mathbb F_p),$$ where $P\subset Sp(n,\mathbb F_p)$ denotes the Siegel parabolic defined by $C=0$ and for $0\leq j\leq n$ we put $$\omega _j=\begin{pmatrix}0_j&0&-1_j&0\\0&1_{n-j}&0&0_{n-j}\\1_j&0&0_j&0\\0&0_{n-j}&0&1_{n-j}\end{pmatrix}.$$ Using the Levi decomposition $P=MN$ with Levi factor $$M=M_n=\left\{m(A)=\begin{pmatrix}A&0\\0&{}^tA^{-1}\end{pmatrix}\mid A\in GL_n(\mathbb F_p)\right\}$$ and unipotent radical $$N=\left\{n(B)=\begin{pmatrix}1_n&B\\0&1_n\end{pmatrix}\mid B\in M_n(\mathbb F_p) \ \ \text{symmetric}\right\}$$ we easily see that $$\left\{\omega _j\cdot n(B_j)\cdot m(A)\mid B_j\in M_j(\mathbb F_p) \ \text{symmetric}, A\in P_{n,j}(\mathbb F_p) \setminus GL_n(\mathbb F_p)\right\}$$ is a complete set of representatives for the cosets $P(\mathbb F_p)\setminus P(\mathbb F_p)\cdot \omega _j\cdot P(\mathbb F_p)$. Here $M_j$ is naturally embedded into $M_n$ by $B_j\longmapsto \begin{pmatrix}B_j&0\\0&0_{n-j}\end{pmatrix}$ and $P_{n,j}$ is a standard parabolic subgroup of $GL_n$ defined by $0^{(n-j,j)}$ being the lower left corner of $g$. We tacitly identify the matrices above with corresponding representatives with entries in $\mathbb Z$ and obtain sets of representatives for $\Gamma _0^n(N)\setminus \Gamma^n$.\ We analyse the contribution of fixed $j$ to the trace of a given $f\in M_k(\Gamma_0^n(p)):$\ The function $f\mid _k\omega _j$ is itself a modular form for the group conjugate to $\Gamma_0^n(p)$ by $\omega_j$, it has a Fourier expansion $$f\mid _k\omega _j(Z)=\sum_{T=(t_{lm})}a_{j}(T;f)e^{2\pi i\mathrm{tr}(TZ)},$$ where the $t_{lm}$ are integral or semi-integral except for the $t_{lm}$ in the upper left block of size $j$ in $T$, where $p$ may occur in the denominator. Then an elementary calculation using orthogonality of exponential sums shows that $$\sum_{B_j}(f\mid_k\omega_j)\mid_k n(B_j)(Z)=p^{\frac{j(j+1)}{2}}\sum_{T\in \Lambda _n}a_{j}(T;f)e^{2\pi i\mathrm{tr}(TZ)}.$$ The result of the action of the matrices $m(A)$ is $:$ $$\sum_{B_j,A}f\mid _k(\omega _j\cdot n(B_j)\cdot m(A))=p^{\frac{j(j+1)}{2}} \sum_{T\in \Lambda _n}b_{j}(T;f)e^{2\pi i\mathrm{tr}(TZ)}$$ with $$b_{j}(T;f)=\sum_{A}a_{j}\left(A^{-1}T\ ^tA^{-1};f\right).$$ We can therefore write the contribution of a fixed $j$ to the trace as $$p^{\frac{j(j+1)}{2}}f\mid_k\omega_j \mid \widetilde{U} _j(p),$$ where $\widetilde{U} _j(p)$ is an operator which maps a Fourier series to a new Fourier series, where the new coefficients are certain finite sums of the Fourier coefficients in the series we started from. Most of time the exact shape of this operator will not be important for us. At some point however we have to consider the actions of $n(B_j)$ and $m(A)$ separately and we split the operator accordingly into two pieces as $$\label{Up} \widetilde{U}_j(p)= \widetilde{U}^0_j(p) \circ D_j(p).$$ We just mention the extreme cases$:$ For $j=0$ the operator $\widetilde{U}_0(p)$ is just the identity and $\widetilde{U} _n(p)$ is quite similar to the usual $U(p)$-operator$:$ $$\widetilde{U} _n(p): \sum_{T\in \frac{1}{p}\Lambda _n}a(T)e^{2\pi i\mathrm{tr}(TZ)}\longmapsto \sum_{T\in \Lambda _n}a(T)e^{2\pi i\mathrm{tr}(TZ)}.$$ Using this terminology we decompose the trace into $n+1$ pieces: For $f\in M_k(\Gamma_0^n(p))$ $$\mathrm{Tr}(f)=\sum_{j=0}^n Y_j$$ with $$Y_j:=p^{\frac{j(j+1)}{2}}(f\mid_k\omega_j)\mid \widetilde{U} _j(p).$$ It should be clear that this expression for the trace has an analogue for the more general case of taking the trace from $\Gamma _0^n(NR)$ to $\Gamma _0^n(N)$ if $N$ and $R$ are coprime and $R$ is squarefree (see e.g.[@B-F-S]). Congruences {#Congruences} ----------- For a prime number $p$ we denote by $\nu _p$ the normalized additive valuation on $\mathbb Q$ (i.e. $\nu_p(p)=1$). For a Siegel modular form $f\in M_k(\Gamma )(\mathbb Q)$ with Fourier expansion $f(Z)=\sum_Ta(T;f)e^{2\pi i\mathrm{tr}(TZ)}$ we define $$\nu _p(f):=\mathrm{min}\left\{\nu _p(a(T;f))\mid T\geq 0\right\}.$$ Note that this minimum is well defined because the Fourier coefficients of $f$ have bounded denominators. We also remark that $\nu_p(f)$ makes sense not only for modular forms with rational Fourier coefficients but also for the general case $f\in M_k(\Gamma)({\mathbb C})$ by tacitly extending the valuation to the field generated by all Fourier coefficients. For two modular forms $f$ and $g$ we define $$f\equiv g \pmod{p}:\Longleftrightarrow \nu _p(f-g)\geq 1+\nu _p(f).$$ We finally remark that in this setting $\nu _p(f\mid _k\gamma )$ also makes sense for arbitrary $\gamma \in \Gamma^n$. In particular, for $f\in M_k(\Gamma_0^n(p),\chi )$ we may consider $\nu _p(f\mid _k \omega _j);$ the Fourier expansions of $f\mid _k \omega_j$ may be viewed as “ expansion of $f$ in the cusp $\omega _j$ ”. (Strictly speaking, we should consider the double coset $\Gamma_0^n(p)\cdot \omega _j\cdot P(\mathbb Z)$ as a cusp for $\Gamma_0^n(p);$ by abuse of language we will call the $\omega _j$ “ the cusps for $\Gamma _0^n(p)$” ). For basic results concerning fields generated by Fourier coefficients and boundedness of denominators we refer to [@Shi]. We will however use these notions in the sequel only for theta series, where such properties are accessible in a much more elementary way. Lattices and theta series {#Lattices} ------------------------- For an even integral positive definite matrix $S$ of size $m=2k$ we define the degree $n$ theta series in the usual way: $$\vartheta _S^n(Z):=\sum_{X\in \mathbb Z^{(m,n)}}e^{\pi i\mathrm{tr}(S[X]Z)} \ \ \ \ (Z\in \mathbb H_n).$$ where $S[X]=\ ^tXSX$. We will freely switch between the languages of matrices $S$ and corresponding lattices $L$ and we write sometimes $\vartheta^n(L)$ instead of $\vartheta ^n_S$. For the transformation properties of such theta series see e.g. [@A]. Following [@B-N2] a lattice $L$ will be called $p$-special, if it has an isometry of order $p$ with no fixed point in $L\setminus \{0\}$. The theta series of such a lattice automatically satisfies $$\vartheta ^n(L)\equiv 1 \pmod{p}.$$ There are many such lattices, see [@B-N1]: Let $p$ be an odd prime, then there are $p$-special (positive definite, even) lattices of rank $p-1$, level $p$ and determinant $p^t$ for all $1\leq t\leq p-2$. Linear combinations of theta series for such lattices provide modular forms with convenient congruence properties in [*all*]{} cusps, see Theorem 2 and Theorem 2’ in [@B-N1] (and also the erratum at the end of this paper).\ In the case $m=n$, we consider the series $$\vartheta_{S,\mathrm{det}}^{n}(Z):=\sum_{X\in \mathbb{Z}^{(n,n)}}\mathrm{det}X\cdot e^{\pi i\text{tr}(S[X]Z)},\ \ (Z\in \mathbb H_n).$$ It is known that the series becomes a modular form of weight $1+\frac{n}{2}$ and vanishes identically if and only if there exists a matrix $U\in M_n(\mathbb Z)$ such that $$S[U]=S,\ \ \ \ \ \ \ \ \mathrm{det}\,U=-1,$$ (e.g.  cf.  [@F]).\ As in [@Ma], the theta series of this type allows us to construct cusp forms with accessible properties. Theta series in the cusps $\omega_j$ {#ThetaSeries} ------------------------------------ We need precise information about theta series in the cusps $\omega_j$, in particular about the denominators, which occur in the Fourier expansions in the cusps. To quote the results from [@BS; @B-F-S], it is more convenient to use the geometric notation here: Let $(V,q)$ be a positive definite quadratic space over ${\mathbb Q}$ with attached bilinear form $B(x,y)=q(x+y)-q(x)-q(y)$ and let $L$ be an even lattice on $V$ (i.e. $q(L)\subseteq {\mathbb Z}$ of level $p$, which means $q(L^{\sharp})\cdot {\mathbb Z}=\frac{1}{p} {\mathbb Z}$, where $L^{\sharp}$ denotes the dual of $L$.) After fixing a basis of $V$ we may identify $V$ with ${\mathbb Q}^m$. The associated Gram matrix with respect to this basis will be denoted by $S$; for ${\bf x}=(x_1,\dots, x_n)\in V^n$ we then define the $n\times n$ matrix $q({\bf x})$ by $q({\bf x})_{ij}=\frac{1}{2} B(x_i,x_j)$. Let $P: {\mathbb C}^{(m,n)}\longrightarrow {\mathbb C}$ be a pluriharmonic polynomial with $P(XA)=\text{det}(A)^{\nu}P(X)$ for $A\in GL(n,{\mathbb C})$. In this language, with $$\vartheta^n(P,L,Z):=\sum_{{\bf x}\in L^n} P({\bf x}) e^{2\pi i\text{tr}(q({\bf x})\cdot Z)}.$$ and $$\vartheta^{(n-j,j)}(P,L,L^{\sharp},Z):=\sum_{{\bf x}\in L^{n-j}\times (L^{\sharp})^j} P({\bf x})\, e^{ 2\pi i \text{tr}(q({\bf x})\cdot Z)}$$ we get for all $j$ $$\vartheta^n(P,L,Z)\mid_{\frac{m}{2}+\nu} \omega_j= (\gamma_ps_p(V))^j \det(L)^{-\frac{j}{2}}\vartheta^{(n-j,j)}(P,L,L^{\sharp},Z).$$ Here $s_p(V)$ is the Hasse-Witt invariant at $p$ (as normalized in [@Sch]) and $\gamma_p$ depends only on $\det(L)\cdot ({\mathbb Q}_p^{\times})^2$, in particular it is one, if $\det(L)$ is a square. There are obvious generalizations of this, if $L$ is of more general level. mod $\boldsymbol{p}$ kernel of theta operator {#Kernel} ============================================= We are interested in constructing Siegel modular forms $F$ of level one, scalarvalued, such that $F\not\equiv 0\bmod p$ and $\Theta^{[j]}(F)\equiv 0\bmod p$ for some $j>0$. Thanks to the results on level changing in [@B-N3] it is sufficient to construct such modular forms for groups $ \Gamma_0^n(p^N)$, possibly with nebentypus character $\chi_p$. Some generalities {#generalities} ----------------- If $\Theta^{[r]}(F) \equiv 0 \pmod{p}$, then $\Theta^{[r']}(F)\equiv 0 \pmod{p}$ for all $r'\geq r$. Suppose that $F=\sum a(T;F)e^{2\pi i\mathrm{tr}(TZ)}\in M_k(\Gamma^n)$ is mod $p$ singular of rank $l$, i.e. $a(T;F)\equiv 0 \pmod{p}$ for all $T$ with $\text{rank}(T) >l$ and $a(T_0;F)\not\equiv 0 \pmod{p}$ for some $T_0$ of rank $l$, then $F$ automatically satisfies $\Theta^{[j]}(F)\equiv 0 \pmod{p}$ for all $j>l$. Such modular forms were investigated in [@B-K], they always satisfy $$2k-l\equiv 0 \pmod{p-1}.$$ Weak Constructions {#Weak} ------------------ Let $S$ be an even integral positive definite matrix of size $n$, with $n$ even. We assume that the rank of $S$ over the finite field $\mathbb{F}_p$ is $r<n$ and that the level of $S$ is a power of $p$, denoted by $p^l$. The determinant of $S$ can then be written as $p^d$. Then $\vartheta^n_S\in M_{\frac{n}{2}}(\Gamma_0^n(p^l),\chi_p^d)$ satisfies $$\begin{aligned} \vartheta_S^n & \not\equiv & 0 \pmod{p},\\ \Theta^{[j]}(\vartheta^n_S) & \equiv & 0 \pmod{p} \qquad (j>r).\end{aligned}$$ If moreover the order of $\text{Aut}_{\mathbb Z}(S)$ is coprime to $p$, then we have the stronger property $$\Theta^{[r]}(\vartheta_S^n)\not\equiv 0 \pmod{p},$$ because the coefficient of this Fourier series at $S$ is just $\sharp \text{Aut}_{\mathbb Z}(S) \cdot S^{[r]}$.\ Now we assume in addition that $S$ has no automorphism of determinant $-1$ and that the order of $\text{Aut}_{\mathbb Z}(S)$ is coprime to $p$. Then $\vartheta_{S,\det}^n\in S_{\frac{n}{2}+1}(\Gamma^n_0(p^l),\chi_p^d)$ and it also satisfies the congruences above.\ [**Conclusion:**]{} [*Under the assumption, that quadratic forms $S$ with the properties above exist, we get Siegel modular forms [(]{}cusp forms respectively[)]{} $F$ of level one and with weight congruent to $\frac{n}{2}+d\cdot\frac{p-1}{2}$ $\pmod{(p-1)}$ [(]{} $\frac{n}{2}+1+d\cdot \frac{p-1}{2}$ respectively[) ]{} satisfying the congruences above.*]{}\ \ Note that in general the actual weight of the level one form (using [@B-N3] or similar techniques) will be much larger. The arithmetic of quadratic forms tells us, under which conditions on $(n,p,r,d)$ such forms $S$ exist or not. We also note that an inspection of the Fourier expansion shows that a set of $h$ pairwise inequivalent quadratic forms $S_i$ with the properties above gives a set of $h$ pairwise linearly independent modular forms mod $p$ in the kernel of $\Theta^{[n]}$, provided that none of the $S_i$ has an integral automorphism of order $p$. There is a simpler construction, which covers more weights modulo $p-1$ and produces modular forms in the simultaneous kernel mod $p$ for [*all*]{} $\Theta$-operators: Suppose that $f\in M_k(\Gamma_0^n(p^l))({\mathbb Z}_{(p)})$ satisfies $\nu_p(f)=0$. Then $f(pz)$ is congruent mod $p$ to a modular form $F$ of level one which satisfies $\Theta^{[j]}(F)\equiv 0\bmod p$ for all $j\geq 1$. An analogous statement holds true if $f$ has nontrivial nebentypus $\chi_p$. The remark above is quite usefull: We recall from [@F] that $$\Theta^{[r]}(f\cdot g)= \Theta^{[r]}(f)\cdot g +\cdots \quad ,$$ where $\cdots$ is an integral linear combination of products of entries of $\Theta^{[i]}f$ and of entries of $\Theta^{[j]}g$ ($i+j=r$). Combining the conclusion above with the remark 3.3. and keeping in mind that there always exist (integral, cuspidal) modular forms of level one and sufficiently large weight $k$, provided that $kn$ is even, we obtain elements in the kernel of $\Theta^{[j]}$ for almost all weights, if $n$ is even: Under the same assumption on the existence of quadratic form $S$ as above we obtain the existence of modular forms [(]{}resp. cusp forms[)]{} $F$ of level one and weight congruent mod $p-1$ to $$\frac{n}{2}+d\cdot\frac{p-1}{2}+k\qquad \left(resp.\; \frac{n}{2}+1+d\cdot\frac{p-1}{2}+k\right),$$ which satisfy the congruence above. Here $k$ is now arbitrary mod $p-1$. A variant, in particular for odd degree ---------------------------------------- For $n$ arbitrary we choose an even integer $m$ with $m>n$ and a positive definite even integral quadratic form of size $m$ with $\text{rank}_{{\mathbb F}_p}(S)=m'<n$ and level($S$) a power of $p$. Then $\vartheta^n_S$ is in the kernel of $ \Theta^{[n]}\bmod p$. This construction gives weaker results than before, because a lot of linear dependencies among the theta series may arise here (over ${\mathbb Q}$ or over ${\mathbb F}_p$).[^1] Strong Constructions ==================== \[Theorem1\] For $n\equiv 0 \bmod 4$ and all primes $p\geq n+3$ there exists $F\in M_{\frac{n}{2}+p-1}(\Gamma^n)$, $F\not\equiv 0 \pmod{p}$ such that $ \Theta^{[n-1]}(F)\equiv \Theta^{[n]}(F)\equiv 0 \pmod{p}.$ If the prime $p$ satisfies $p\equiv 1 \pmod{4}$, the condition $p\geq n$ is sufficient. \[Theorem2\] For $n\equiv 2 \pmod{4}$ [(]{}if $p\equiv 3 \pmod{4}$[)]{} or $4\mid n$ [(]{}if $p\equiv 1 \pmod{4}$ [)]{} and all primes $p\geq 2n+3$ there exists $F\in M_{\frac{n}{2}+\frac{p-1}{2}}(\Gamma^n)$, $F\not\equiv 0 \pmod{p}$ such that $ \Theta^{[n]}(F)\equiv 0 \pmod{p}$. A similar result, using Eisenstein series was shown by the third author [@Nag]. Our method of proof provides examples beyond Eisenstein series. The proofs of these theorems are quite similar, they rely on results from [@B-N1]; we mainly have to assure the existence of appropriate even integral quadratic forms of rank $n$. In all cases, we have just to consider $n\bmod 8$, because we may add even unimodular quadratic forms as orthogonal summands if necessary.\ To prove Theorem \[Theorem1\], we first observe, that there exist even integral quadratic forms $S$ in dimension $n\equiv 0 \bmod 4$ with $\text{det}(S)=p^2$, level $p$ and with rank $n-2$ over ${\mathbb F}_p$: For $n=4$ we may choose a lattice corresponding to a maximal order in the definite rational quaternion algebra ramified only at $p$. For $n=8$ we recall that locally at $p$ the even unimodular lattice $E_8$ corresponds to an orthogonal sum of hyperbolic planes. The requested quadratic form is then shown to exist by scaling one of the hyperbolic planes by the factor $p$. The theta series attached to such $S$ satisfies $$\nu_p(\vartheta^n_S\mid_{\frac{n}{2}} \omega_j)= -j$$ for all $j$. Theorem 4 from [@B-N1] asserts the existence of $F\in M_{\frac{n}{2}+p-1}(\Gamma^n)$ with $\vartheta^n_S\equiv F \pmod{p}$. Concerning the second theorem, even integral quadratic forms $S$ of level $p$ and determinant $p$ are known to exist in the dimensions mentioned in the theorem: For $p\equiv 3\bmod 4$ and $n=2$ we may chose the binary form $(x,y)\mapsto x^2+xy+\frac{p+1}{4}y^2$. For $p\equiv 3\bmod 4$ and $n=6$ we consider the orthogonal sum of a binary form of determinant $p$ and a quaternary form of determinant $p^2$. A maximal overlattice then has the requested property (see the next section for the notion of maximality). For $p\equiv 1 \bmod 4$ and $n=4$ the existence is shown e.g. in [@Pet p.350]. For $n=8$ we may take the orthogonal sum of quaternary forms of determinant $p$ and $p^2$ and go to a maximal overlattice. For a local-global proof of existence in the case $p\equiv 1 \bmod 4$ see [@Wald lemme 19].\ We may then construct $F$ from $\vartheta^n_S$ by $$F:= \text{Tr}(\vartheta^n_S\cdot {\mathcal E}),$$ provided that we can find ${\mathcal E}\in M_{\frac{p-1}{2}}(\Gamma^n_0(p),\chi_p)({\mathbb Z})$ with ${\mathcal E}\equiv 1 \pmod{p}$ and $$\nu_p({\mathcal E}\mid\omega_j)\geq -\frac{j^2}{2}+1\qquad (j\geq 1).$$ Then all the $Y_j$ in the trace above are congruent zero mod $p$ except for $Y_0$. The existence of such $\mathcal E$ is asserted by (the corrected version of) Theorem 2, [@B-N1] (see, Erratum, Theorem 2’). Unfortunately, the procedure above does not work for the theta series $\vartheta_{S,\det}^n$; it breaks down because we get an additional factor $p$ in the denominators of the $Y_j$. This is the main reason for a different approach in the next section . Strong construction with harmonic polynomial ============================================ Motivation {#Motivation} ---------- We want to explain the numerical examples for degree 2 (see the last section) by a refined version of our construction, in particular, we aim at \[binary\] Let $p$ be a prime congruent 3 mod 4, let $S$ be a binary quadratic form of discriminant $-p$ [(]{}without improper automorphism [)]{}. Then there exists $F\in S_{2+3\cdot\frac{p-1}{2}}(\Gamma^2)$ such that $$F\equiv \vartheta^2_{S,\det} \pmod{p}.$$ This will be proved in a more general framework, using a variant of the calculus of traces. Our method strongly relies on the arithmetic of maximal lattices; we recall that a lattice $L$ in a quadratic space $(V,q)$ with $q(L)\subset {\mathbb Z}$ is called maximal, iff the only overlattice $L'$ of $L$ with $q(L')\subset {\mathbb Z}$ is $L$ itself. For basic properties of maximal lattices we refer to [@B-Ne]. In particular, even integral positive definite matrices $S$ with squarefree determinant correspond to maximal lattices. The proposition from above is just a special case of the following general result \[Theorem 3\] Let $n$ be an even positive integer and $p$ a prime with $p\equiv 3\bmod 4$ satisfying $n+p-1\equiv 0 \bmod 4$. Let $S$ be an even positive definite quadratic form of rank $n$ and with $\det(S)=p$. Then there exists $F\in S_{\frac{n}{2}+1+3\frac{p-1}{2}}(\Gamma^n)$ such that $$F\equiv \vartheta^n_{S,\det} \pmod{p}$$ A similar result should hold for primes $p\equiv 1\bmod 4$, but our method seems not to be applicable in this case. The case $n+p-1\equiv 4\pmod{8}$, $p\equiv 3\bmod 4$ ---------------------------------------------------- We start from the following situation (with $n$ and $p$ as above). $S$ is a lattice of level and determinant $p$ with even rank $n$. The existence of such $S$ is guaranteed, because of $p\equiv 3 \pmod{4}$ and $n\equiv 2 \pmod{4}$. Furthermore, let $L$ be a $p$-special lattice of rank $p-1$, level and determinant $p$, we may e.g. take the root lattice $A_{p-1}$, see [@B-N2]. We observe that $S\perp A_{p-1}$ is maximal (of determinant $p^2$) provided that $n+p-1\equiv 4 \pmod{8}$ (in this case there is no even unimodular lattice; we also note that for $n+p-1\equiv 0 \pmod{8}$ there is no maximal lattice of determinant $p^2$). Under these assumptions we consider $$p\cdot \text{Tr}\left( \vartheta^n_{S,\det}\cdot \vartheta^n(L) \vartheta^n(L) \vartheta^n(L)\right)=\sum_{j=0}^n Y_j.$$ We can view this as the trace of a theta series attached to the quadratic form $$Q:=S\perp L\perp L\perp L$$ of rank $2k=n+3(p-1)$ and with determinant $p^4$. The transformation properties of such theta series give $$\begin{aligned} & \vartheta^n(Q)\mid_k \omega_j\\ &= s_p(V) ^j p^{-2j} \sum_{X,R_1,R_2,R_3} \det((X^{(n-j)}, S^{-1}X^{(j)}))\text{exp}(2\pi i \text{tr}{\mathcal L}\cdot Z)\end{aligned}$$ where $$\begin{aligned} {\mathcal L}=S[X^{(n-j)},S^{-1}X^{(j)}]&+ L[R_1^{(n-j)},L^{-1}R_1^{(j)}]\\ & +L[R_2^{(n-j)},L^{-1}R_2^{(j)}]+ L[R_3^{(n-j)},L^{-1}R_3^{(j)}].\end{aligned}$$ Furthermore, $s_p(V)$ is the Witt-invariant of the quadratic space underlying the lattice $Q$ , and we decompose $X\in {\mathbb Z}^{(n,n)}$ and $R_i\in {\mathbb Z}^{(p-1,n)}$ into components with $n-j$ and $j$ columns. Evidently we have $\nu_p(Y_0)=1$ and from the transformation formula above we obtain for $j\geq 1$ $$\nu_p(Y_j) \geq 1+ \frac{j(j+1)}{2}-2j -1$$ The last summand $-1$ comes from the harmonic polynomial. For $j\geq 4$ this is strictly positive and only for $1\leq j\leq 3$ need further investigation. Actually, thanks to the arithmetic of maximal lattices, stronger integrality properties will be shown: All contributions $Y_j$ will be integral and only $j=1$ and $j=2$ may possibly be nonzero mod $p$ We analyse the contributions of $\vartheta^n(Q)\mid \omega_j \widetilde{U}_j(p)$ separately for fixed $j\geq 1$: First we recall the decomposition of the Hecke operator $\widetilde{U}_j(p)$: $$\widetilde{U}_j(p)=\widetilde{U}_j^0(p)\circ D_j(p)$$ (cf. $\S$ \[Traces\], (\[Up\])). Furthermore we recall that $L$ is $p$-special, therefore we can write $$\vartheta^n(L)\mid_{p-1} \omega_j\sim p^{-\frac{j}{2}} (1+\vartheta_j^n(L)^0),$$ where $\vartheta_j^n(L)^0$ is a Fourier series with $\vartheta_j^n(L)^0\equiv 0 \pmod{p}$. Therefore, $$\left(\vartheta^n(L)\mid \omega_j\right)^3\sim p^{-\frac{3j}{2}} (1+3\vartheta_j^n(L)^0+p^2\cdot W_j) \label{three}$$ where $W_j$ is a Fourier series with integral Fourier coefficients and $\sim$ means equality up to a $p$-adic unit as factor. According to (\[three\]), $\left(\vartheta^n_{S,\det}\cdot \vartheta^n(L)^3\right)\mid_k{ \omega_j}\mid U_j^0(p)$ decomposes into 3 pieces: To analyse them we recall a crucial property of maximal lattices of rank $l$: If $M$ denotes a Gram matrix corresponding to such a lattice, then\ For any ${\mathfrak x}\in M^{-1}{\mathbb Z}^l$ with $M[{\mathfrak x}]\in {\mathbb Z}$ there exists ${\mathfrak x}^0\in {\mathbb Z}^l$ with ${\mathfrak x}= M\cdot {\mathfrak x}^0$, i.e. $$M[{\mathfrak x}]= M[{\mathfrak x}^0],$$ see e.g. [@B-Ne]. The first piece is (up to a unit mod $p$) equal to $$\begin{aligned} & p^{-2j} \vartheta_{S,\det}^n\mid \widetilde{U}_j^0(p)\\ & =p^{-2j}\sum_X\text{det}(X^{(n-j)}, S^{-1}X^{(j)}) \text{exp}(2\pi i \text{tr}(S[X^{(n-j)},S^{-1}X^{(j)}]Z))\mid \widetilde{U}_j^0(p).\end{aligned}$$ The maximality of $S$ implies that $X^{(j)}=S\cdot \widetilde{X}$ with $\widetilde{X}\in {\mathbb Z}^{(n,j)}$. Therefore this part just equals $$p^{-2j}\vartheta^n_{S,\det}.$$ The second part is $$\begin{aligned} 3p^{-2j} \sum_{X, Y} \det &(X^{(n-j)}, S^{-1}X^{(j)}) \\ & \cdot \text{exp}(2\pi i\text{tr}( S[X^{(n-j)},S^{-1}X^{(j)}]Z+ L[Y^{(n-j)},L^{-1}Y^{(j)}]Z)).\end{aligned}$$ Here $Y\in {\mathbb Z}^{(p-1,n)}$ satisfies the additional condition $Y\ne 0$. We use that the lattice $S\perp L$ is maximal and we obtain by the same reasoning as before (keeping in mind that $L$ is $p$-special) that this contribution equals (up to a unit) $$p^{-2j} \vartheta^n_{S,\det} \cdot \sum_{Y\not=0} \text{exp}( 2\pi i \text{tr}(L[Y] Z)) = p^{-2j+1}W,$$ where $W$ is a Fourier series with integral Fourier coefficients.\ Finally the last contribution will have its Fourier coefficients in $$p^{-2j+1}\cdot {\mathbb Z}$$ because of the factor $p^2$ in front of $W_j$; note that the harmonic polynomial may bring in an additional $p$ in the denominator. So far we have ignored the contribution of the operator $D_j(p)$; actually, in the first two contributions, thanks to the maximality of $S$ and $S\perp L$ the result after applying $\widetilde{U}_j^0(p)$ is already invariant under $GL(n,{\mathbb Z})\hookrightarrow Sp(n,{\mathbb Z})$ and only the number $d(j)$ of left cosets enters defining $D_j(p)$ really matters; this is a group index $$d(j)=[GL(n,{\mathbb F}_p): P_{n,j}({\mathbb F}_p)]= \prod_{i=1}^j\frac{p^{j+i}-1}{p^i-1}$$ see e.g. [@Kr], p.73, in particular it is congruent 1 mod $p$. Now we collect everything into a precise formula for $Y_j$ ($1\leq j\leq n$): $$Y_j= p^{1+\frac{j(j+1)}{2}-2j} s_p(V)^{j}\times \left\{d(j)\cdot \vartheta^n_{S,\det} + 3(*) +(**)\right\}$$ where $(*)$ and $(**)$ are Fourier series with coefficients divisible by $p$. The $p$-power in front of $Y_j$ is (for $0\leq j\leq n$) $$p^1,\quad p^{0},\quad p^{0}, \quad p^{1},\quad \cdots$$ where the $\cdots$ are divisible by $p$. Therefore only $j=1$ and $j=2$ is relevant. We summarize our calculation in the formula $$p\cdot {\rm Tr}(\vartheta^n_{S,\det}\cdot\vartheta^n(L)^3)\equiv \left(s_p(V)+s_p(V)^2\right)\vartheta_{S,\det}^n\pmod{p}. \label{Witt}$$ Concerning $s_p(V)$, we remark that the dimension of $V$ is $n+3(p-1)$; then $s_p(V)=1$ iff $n+3(p-1) \equiv 0 \pmod{8}$; this is assured for $p\equiv 3 \pmod{4}$ under the assumption $n+p-1\equiv 4 \pmod{8}$.\ This proves Theorem 3 for the case in question. Variant: The case $n+p-1\equiv 0 \pmod{8}$ {#variant} ------------------------------------------ In this case, there are no maximal lattices of determinant $p^2$ of rank $n+p-1$; therefore we take an auxiliary prime $q$ different from $p$ and we consider $q\cdot S\perp L$. This quadratic form is of determinant $q^n\cdot p^2$ and of rank $n+p-1$. Its Witt invariant at $q$ can be computed as $$s_q(q\cdot S\perp L)=s_q(S)\cdot \left(\frac{-1}{q}\right)^{\frac{n(n-1)}{2}}\cdot \left(\frac{p}{q}\right)^{n-1}= \left(\frac{-p}{q}\right)$$ We choose $q$ such that $$\left(\frac{-p }{ q}\right)=-1 \label{cong}$$ holds. In view of $s_{\infty}(q\cdot S\perp L)=1$ this implies that $s_p(q\cdot S\perp L)=-1$, in particular both $q\cdot S$ and $q\cdot S\perp L$ are maximal at $p$. Then we can use essentially the calculation above to find a modular form $F$ of level $q$ and weight $\frac{n}{2}+1+3\cdot\frac{p-1}{2}$ such that $F\equiv \vartheta^n_{qS,\det}\pmod{p}$. We have to mention one subtle point here: The quadratic space $V'$ in question is now given by $qS\perp L\perp L\perp L$ with Witt invariant $$s_q(V')=-1 \quad, s_{\infty}(V')=-1$$ and therefore (by the product formula) $s_p(V')=1$. This is necessary for the nonvanishing mod $p$ of the analogue of (\[Witt\]). The lemma below then assures the existence of a modular form $\tilde{F}$ of level one and weight $\frac{n}{2}+1+3\cdot\frac{p-1}{2}$ such that $$\tilde{F}\equiv \vartheta^n_{S,\det}\pmod{p}.$$ \[Lem1\] Let $p$ and $q$ be different primes with $\prod_{i=1}^n(1+q^i)$ coprime to $p$. Let $f\in M_k(\Gamma_0^n(p),\chi_p)({\mathbb Z}_{(p)})$ be given and assume that there exists $G\in M_l(\Gamma_0^n(q))({\mathbb Z}_{(p)})$ for some weight $l$ such that $$g\equiv G \pmod{p} ,$$ where the modular form $g$ of level $pq$ is given by $g(Z):=f(qZ)$. Then there exists a level one form $F$ of weight l such that $$f\equiv F \pmod{p}.$$ We choose $E\in M_{l-k}(\Gamma_0^n(p),\chi_p)$ such that $E\equiv 1 \pmod{p}$.\ Then $$g\cdot E(qZ)- G= p\cdot H,$$ where $H\in M_l(\Gamma_0^n(pq))$ has $p$-integral coefficients. We apply the operator $U(q)$ to obtain $$f\cdot E=G\mid U(q) + p\cdot H\mid U(q)$$ Now we take the trace from $\Gamma_0^n(pq)$ to $\Gamma_0^n(p)$ on both sides. On the left side it just means that we multiply the function by the index $[\Gamma_0^n(p):\Gamma_0^n(pq)]=\prod_{i=1}^n(1+q^i)$, which is coprime to $p$; the formula for the index can be found e.g. in [@Kl0]. On the right side we observe that the trace does not affect the $p$-integrality, in particular, the $H$-part plays no role mod $p$. This follows from the $q$-expansion principle, see e.g. [@Ich Theorem 2]. Moreover, to compute the trace of $G\mid U(q)$, we observe that this trace has level one, because $G\mid U(q)$ has level $q$.\ At the end, $f$ is congruent mod $p$ to a level one form of weight $l$. : Note that it is possible to choose the prime $q$ in such a way that both the condition of the lemma and (\[cong\]) are satisfied. : It should be possible to prove the statement above concerning the $p$-integrality of a trace from $\Gamma_0^n(pq)$ to $\Gamma_0^n(p)$ by a more elementary method for our special case (using properties of theta series), avoiding the $q$-expansion principle. Some special properties ----------------------- We cannot expect that all elements in the kernel mod $p$ for the theta operator arise by theta series as in the sections above. In fact, our construction gives modular forms with amusing additional congruence properties:\ For a positive integer $d$ and a modular form $f\in M_k(\Gamma^n_0(N),\chi)$ with Fourier expansion $f(Z)=\sum_{T} a(T;f) e^{2\pi i tr(TZ)}$ we define $$a_d(f):=\sum_T \frac{1}{\epsilon^+(T)}a(T;f)$$ where $T$ runs over representatives of the $SL(n,{\mathbb Z})$-equivalence classes of elements $T$ in $\varLambda_n$ with $T>0$ and $\det(2T)=d$ and $$\epsilon^+(T):=\sharp\{U\in SL(n,\mathbb{Z})\,\mid\, T[U]=T\,\}.$$ These numbers appear naturally in the Koecher-Maa[ß]{} Dirichlet series attached to $f$, see [@Maass]: $$KM(f,s):=\sum_d a_d(f) d^{-s}$$ For $f=\vartheta_{2S}^n$ and $f=\vartheta_{2S,\det}^n$ with half integral $S$ of size $n$ the Koecher-Maa[ß]{} Dirichlet series are very special: $$KM(\vartheta^n_{2S},s)=\det(2S)^{-s}\sum_X \mid \det(X)\mid^{-2s}$$ $$KM(\vartheta^n_{2S,\det},s)=\det(2S)^{-2s} \sum_X \text{det}(X)\mid \det(X)\mid^{-2s}=0$$ Here $X$ runs over all non-degenerate integral matrices in ${\mathbb Z}^{(n,n)}$ modulo the action of $SL(n,{\mathbb Z})$. \[average1\] Let $p$ be a prime, $n$ even, and $S_1,\dots S_h$ half integral positive definite matrices of size $n$ with $\det(2S_i)=p$ for all $i$; we consider the modular form $$f:=\sum a_i \vartheta^n_{2S_i}$$ with $a_i\in {\mathbb Z}_{(p)}$. Let $F$ be a modular form of level one with $F \equiv f \pmod{p}$. Then $$a_d(F)\equiv 0 \pmod{p}$$ holds for all $d$ provided that $\sum_i a_i\equiv 0 \pmod{p}$. \[average2\] Let $p$ be a prime, $n$ even, and $S$ a half integral positive definite matrix of size $n$ with $\det(2S)=p$; we consider the level one modular form $F$ with $F\equiv \vartheta^n_{2S,\det} \pmod{p}$. Then we have for all $d$ $$a_d(F)\equiv 0 \pmod{p}.$$ Degree 2 case ============= Explicit examples of degree $2$ modular forms in the kernel of the theta operator mod $p$ were known before our construction:\ Let $\Delta _{12}$ denote the Ramanujan delta function and $[\Delta_{12}]$ the corresponding Klingen-type Eisenstein series of degree $2$. In [@B], the first author showed that $$\Theta ([\Delta _{12}])\equiv 0 \pmod{23}.$$ Then Mizumoto [@Mi] showed that the Klingen-type Eisenstein series $[\Delta_{16}]$ attached to a weight $16$ elliptic cusp form satisfies the congruence $$\varTheta ([\Delta_{16}])\equiv 0 \pmod{31}.$$ The second and the third author and Kikuta found the congruence $$\varTheta (X_{35}) \equiv 0 \pmod{23},$$ where $X_{35}$ is Igusa’s cusp form of weight 35 (cf. [@K-K-N]).\ They also predicted the existence of a form $X_{47}$ of odd weight $47$ satisfying $$\varTheta (X_{47}) \equiv 0 \pmod{31}.$$ In fact, such modular form was constructed in [@K-N] by using Igusa’s generators.\ In subsection 6.3 we will show that these examples can all be explained by our constructions, using appropriate binary quadratic forms. Estimation of dimensions ------------------------ In this section, we consider the dimension of the kernel of theta operator over $\mathbb{F}_p$. Let $B_D$ be the set of positive-definite, integral binary quadratic forms with discriminant $D$, i.e., $$B_D:=\left\{\, S=\begin{pmatrix} a & b/2 \\ b/2 & c \end{pmatrix}\;\Big{|}\; a,\,b,\,c\in\mathbb{Z},\,S>0,\,b^2-4ac=D\,\right\}.$$ In the following, we mainly treat the case $D<0$. We denote the class number by $h(D):=\sharp (B_D/SL(2,\mathbb{Z}))$. \[dim\] Let $p$ be a prime number with $p \equiv 3 \pmod{4}$ and $p>3$. Then\ [(i)]{}${\rm dim}_{\mathbb{F}_p}\langle \widetilde{\vartheta}^2_{2S}\,\mid\, S\in B_{-p}\rangle_{\mathbb{F}_p} =\frac{h(-p)+1}{2}$,\ [(ii)]{}${\rm dim}_{\mathbb{F}_p}\langle \widetilde{\vartheta}^2_{2S,{\rm det}}\,\mid\, S\in B_{-p}\rangle_{\mathbb{F}_p} =\frac{h(-p)-1}{2}$,\ where $\widetilde{\vartheta}^2_{2S}$ [(]{}resp. $\widetilde{\vartheta}^2_{2S,{\rm det}}$[)]{} is the Fourier coefficientwise reduction modulo $p$ of $\vartheta^2_{2S}$ [(]{}resp. $\vartheta^2_{2S,{\rm det}}$[)]{}. \[Fp\] For a modular form $F$, $\widetilde{F}$ is considered as a formal power series over $\mathbb{F}_p$ via Fourier expansion (see [@Nag2]). \(i) Since the number of prime divisor dividing $D=-p$ is just one, $B_{-p}/SL(2,\mathbb{Z})$ has a unique ambiguous class (cf. [@Z], p.112, Korollar). We fix a representative $S_{p,0}$ of the ambiguous class and take a set of representatives of $B_{-p}/SL(2,\mathbb{Z})$ as $$\{\, S_{p,0},\;S_{p,i},\,\overline{S}_{p,i} \;\;(1\leq i\leq\tfrac{h(-p)-1}{2})\;\},$$ where $S_{p,i}$ and $\overline{S}_{p,i}$ are $GL(2,\mathbb{Z})$-equivalent.\ We consider the Fourier expansion of $\vartheta^2_{2S_{p,i}}$: $$\vartheta^2_{2S_{p,i}}(Z)=\sum a(T;\vartheta^2_{2S_{p,i}})e^{2\pi i\text{tr}(TZ)}.$$ Then we have $$\begin{aligned} a(S_{p,j};\vartheta^2_{2S_{p,i}}) &= \sharp\{\,U\in GL(2,\mathbb{Z})\,\mid\, S_{p,i}[U]=S_{p,j}\,\}\\ &= \begin{cases} 4 & \text{if $i=j=0$},\\ 2 & \text{if $i=j>0$},\\ 0 & \text{otherwise}. \end{cases}\end{aligned}$$ This implies that $$\widetilde{\vartheta}^2_{2S_{p,i}}\qquad (1\leq i\leq\tfrac{h(-p)-1}{2})$$ are linearly independent over $\mathbb{F}_p$.\ (ii) It should be noted that $\vartheta^2_{2S,{\rm det}}$ is non-trivial if and only if $S$ has no proper automorphisms. A similar argument in (i) shows that $$\widetilde{\vartheta}^2_{2S_{p,i},{\rm det}}\qquad (1\leq i\leq\tfrac{h(-p)-1}{2})$$ are linearly independent over $\mathbb{F}_p$. This proves (ii). For a prime number $p$, we define the following $\mathbb{F}_p$-vector spaces: $$\begin{aligned} & \widetilde{V}_{k,p}:=\{\,\widetilde{f}\,|\, f\in M_k(\Gamma^2)(\mathbb{Z}_{(p)}),\, \Theta (f) \equiv 0 \pmod{p}\,\},\\ & \widetilde{V}_{k,p}^{\text{cusp}}:=\{\,\widetilde{f}\,|\, f\in S_k(\Gamma^2)(\mathbb{Z}_{(p)}),\, \Theta (f) \equiv 0 \pmod{p}\,\}.\end{aligned}$$ As we noted in Remark \[Fp\], these spaces are considered as subspaces of certain vector space consisting of formal power series over $\mathbb{F}_p$ (cf. [@Nag2]). Considering Theorem \[Theorem 3\], we can get the following estimates: Under the same assumption in Proposition \[dim\], we have\ [(i)]{}${\rm dim}_{\mathbb{F}_p}\widetilde{V}_{\frac{p+1}{2},p}\geq \frac{h(-p)+1}{2}$,\ [(ii)]{}${\rm dim}_{\mathbb{F}_p}\widetilde{V}_{\frac{3p+1}{2},p}^{\rm cusp}\geq \frac{h(-p)-1}{2}$. We consider the case $p=23$. In this case we have $h(-23)=3$. Under the previous notation, we can take a set of representatives of $B_{-23}/SL(2,\mathbb{Z})$ as $$\label{S} \left\{ S_{23,0}=\begin{pmatrix} 1 & 1/2 \\ 1/2 & 6 \end{pmatrix},\;\; S_{23,1}=\begin{pmatrix} 2 & 1/2 \\ 1/2 & 3 \end{pmatrix},\;\; \overline{S}_{23,1}=\begin{pmatrix} 2 & -1/2 \\ -1/2 & 3 \end{pmatrix} \right\}.$$ In this case, we have $$\widetilde{V}_{12,23}=\langle \widetilde{\vartheta}^2_{2S_{23,0}}, \widetilde{\vartheta}^2_{2S_{23,1}} \rangle_{\mathbb{F}_{23}},$$ namely we have $$\text{dim}_{\mathbb{F}_{23}}\widetilde{V}_{12,23}=2.$$ We also obtain $$\widetilde{V}_{12,23}^{\rm cusp}= \langle \widetilde{\vartheta}^2_{2S_{23,1},{\rm det}} \rangle_{\mathbb{F}_{23}}.$$ Average of Fourier coefficients ------------------------------- The congruence $\varTheta ([\Delta_{12}]) \equiv 0 \pmod{23}$ was proved by the first author in [@B]. In this paper, he remarked that the “average” of the Fourier coefficients is divisible by $23$ as below. This phenomenon can be explained by the result obtained in Proposition \[average1\].\ \ The congruences given below are proved by checking them numerically for finitely many Fourier coefficients, using a “Sturm bound” from [@C-C-K].\ **The case** $\boldsymbol{p=23}:$\ We use the notation above. We have the congruence $$[\Delta_{12}] \equiv 12(\vartheta^2_{2S_{23,0}}-\vartheta^2_{2S_{23,1}}) \pmod{23}.$$ By Proposition \[average1\], we obtain $$a_d([\Delta_{12}]) \equiv 0 \pmod{23}.$$ In the case of cusp forms, the following congruence holds $$X_{35} \equiv 12\vartheta^2_{2S_{23,1},{\rm det}} \pmod{23},\quad\text{and}\quad a_d(X_{35}) \equiv 0 \pmod{23},$$ (Proposition \[average2\]).\ \ **The case** $\boldsymbol{p=31}:$\ In this case, we have $h(-31)=3$. $$[\Delta_{16}] \equiv 16(\vartheta^2_{2S_{31,0}}-\vartheta^2_{2S_{31,1}}) \pmod{31}.$$ This implies $$a_d([\Delta_{16}]) \equiv 0 \pmod{31}.$$ In the case of cusp forms, we have $$X_{47} \equiv 16\vartheta^2_{2S_{31,1},{\rm det}} \pmod{31},\quad\text{and}\quad a_d(X_{47}) \equiv 0 \pmod{31},$$ where $X_{47}$ is the cusp form introduced before.\ \ **The case** $\boldsymbol{p=47}:$\ This case is more interesting than the above two cases because $h(-47)=5$ and $\text{dim}_{\mathbb{C}}S_{24}(\Gamma^1)=2$. We consider a couple of Klingen Eisenstein series $$[E_4^3\Delta_{12}]\quad \text{and}\quad [\Delta_{12}^2],$$ where $E_4$ is the normalized degree one Eisenstein series of weight $4$. The following congruence relations hold: $$\begin{aligned} & [E_4^3\Delta_{12}] \equiv 24(\vartheta^2_{2S_{47,0}}-9\vartheta^2_{2S_{47,1}}+8\vartheta^2_{2S_{47,2}}) \pmod{47},\\ & [\Delta_{12}^2] \equiv 24(\vartheta^2_{2S_{47,1}}-\vartheta^2_{2S_{47,2}}) \pmod{47}.\end{aligned}$$ Consequently $$a_d([E_4^3\Delta_{12}]) \equiv a_d([\Delta_{12}^2]) \equiv 0 \pmod{47}.$$\ [**Erratum**]{}\ to our paper [@B-N1] The formula in theorem 2 is incorrect, here is a correct version (Theorem 5 should then also be modified accordingly).\ \ [**Theorem 2**]{}’ : [*Assume that $p\geq 2n+3$. Then there exists a modular form $h$ of weight $\frac{p-1}{2}$, level p and nebentypus $\chi_p$ such that $$h\equiv 1 \pmod{p},$$ $$\nu_p(h\mid \omega_j)\geq -\frac{j^2}{2}+1\qquad(1\leq j\leq n).$$* ]{} We write down an explicit linear combination of theta series with the requested property: Let $L_j$ denote a $p$-special lattice of rank $p-1$ and discriminant $2j+1$ with $0\leq j\leq n$. We put $a_0=1$ and for $j\geq 1$: $$a_j:=(-1)^j\cdot p^{\frac{j^2+j}{2}}$$ We define $$h:= \sum_{j=0}^n a_j \vartheta^n(L_j)$$ Evidently, we have $h\equiv 1 \pmod{p}$.\ We analyse the Fourier expansion of $h $ in all cusps $\omega_i$ with $1\leq i\leq n$: $$a_j\vartheta^n(L_j)\mid \omega_i= (-1)^{i} p^{-\frac{i(2j+1)}{2}}(-1)^j\cdot p^{\frac{j^2+j}{2}}\left(1+\cdots\right).$$ We first check that for $j<i-1$ and for $j>i$ the value of $\nu_p(a_j\vartheta^n(L_j)\mid \omega_i)$ is larger or equal to $-\frac{i^2}{2}+1$:\ The case $j=0$, $i\geq 2$ is clear because $-\frac{i}{2}\geq -\frac{i^2}{2}+1$.\ For $j\geq 1$ our claim is equivalent to $$-i(2j+1)+j^2+j\geq -i^2+2$$ To consider the case $j<i-1$ we put $i=j+1+t$ with $t\geq 1$.\ We have to check that $$-2(j+1+t)-(j+1+t)+(j+1+t)^2+(j+1+t)-2\geq 0$$ This expression equals $t^2+t-2$.\ Now we consider the second case, i.e. $j=i+t$ with $t>0$: We have to check that $$-2(i+t)-i +(i+t)^2+i+t+i^2-2\geq 0$$ This expression equals $t^2+t-2$.\ It remains to consider the crucial cases $j=i-1$ and $j=i$. In both cases we seem to pick up a denominator $p^{-\frac{i^2}{2}}$ when applying $\omega_i$ to $a_{i-1}\vartheta^n(L_{i-1})$ and to $a_i\vartheta^n(L_i)$. The key point is to analyze the constant term of $$\left(a_{i-1}\vartheta^n(L_{i-1})+a_i\vartheta^n(L_i)\right)\mid \omega_i. \label{constant}$$ This is equal to $$(-1)^{i+i-1}p^{\frac{-i(2i-1)+(i-1)^2+i-1}{2}}+p^{\frac{-i(2i+1)+i^2+i}{2}}=0$$ The nonconstant parts of the Fourier expansion of (\[constant\]) satisfy an additional congruence mod $p$ because the $L_i$ are special lattices. Acknowledgement: We thank T. Ichikawa, T. Kikuta, R. Schulze-Pillot and S. Takemori for helpful discussions related to this work. [9]{} A.N. Andrianov: [*Quadratic Forms and Hecke operators.*]{} Grundlehren Math. Wiss. **286**, Springer-Verlag, 1987 H. Aoki and T. Ibukiyama: Simple graded rings of Siegel modular forms, differential operators and Borcherds products, Int. J. Math. **16**, 249-279(2005) S. Böcherer: Über gewisse Siegelsche Modulformen zweiten Grades, Math. Ann. **261**, 23-41(1982) S. Böcherer, J. Funke and R. Schulze-Pillot: Trace operator and theta series, J. of Number Theory, **78**, 119-139(1999) S. Böcherer and T. Kikuta: On mod $p$ singular modular forms, Forum Math. **28**, 1051-1065(2016) S. Böcherer and S. Nagaoka: On mod $p$ properties of Siegel modular forms, Math. Ann. **338**, 421-433(2007) S. Böcherer and S. Nagaoka: On Siegel modular forms of level $p$ and their properties mod $p$, manuscripta math. **132**, 501-515(2010) S. Böcherer and S. Nagaoka: On $p$-adic properties of Siegel modular forms, In: Automorphic Forms, (editors B. Heim et al) Springer Proceedings in Mathematics and Statistics **115**, Springer-Verlag, 47-66(2014) S. Böcherer, G. Nebe: On theta series attached to maximal lattices and their adjoints, J. Ramanujan Math. Soc. **25**, no.3, 265-284(2000) S. Böcherer , J. Funke and R. Schulze-Pillot: Trace operator and Theta series, J. Number Theory. **78**, 119-139(1999) S. Böcherer, T. Kikuta and S. Takemori: Weights of mod $p$ kernels of theta operators. arXiv:1606.06390v1\[math.NT\] (to appear in Canadian J.Math.) S. Böcherer and R. Schulze-Pillot: Siegel modular forms and theta series attached to quaternion algebras. Nagoya Math. J. **121**, 35-96(1991) D. Choi, Y. Choie and T. Kikuta: Sturm type theorem for Siegel modular forms of genus 2 modulo $p$. Acta Arith. **158**, 129139(2013) E. Freitag: [*Siegelsche Modulfunktionen.*]{} Grundlehren Math. Wiss. **254**, Springer-Verlag, 1983 T. Ichikawa: Vector-valued $p$-adic Siegel modular forms. J.reine angew.Math. **690**, 35-49(2014) J.-I. Igusa: On the ring of modular forms of degree two over $\boldsymbol{Z}$, Am. J. Math. **101**, 149-183(1979) T. Kikuta, H. Kodama and S. Nagaoka: Note on Igusa’s cusp form of weight 35, Rocky Mountain J. Math. **45**, 963-972(2015) H. Klingen: Bemerkungen über Kongruenzuntergruppen der Modulgruppe $n$-ten Grades. Archiv der Math.**10**, 113-122(1959) H. Klingen: [*Introductory Lectures on Siegel Modular Forms.*]{} Cambridge University Press, Cambridge, 1990 H. Kodama and S. Nagaoka: A congruence relation satisfied by Siegel cusp form of odd weight (Japanese): J. School Sci. Eng. Kinki Univ. **49**, 9-15(2013) A. Krieg: Hecke Algebras, Memoirs of AMS, **435**, 1990 H. Maaß: Konstruktion von Spitzenformen beliebigen Grades mit Hilfe von Thetareihen, Math. Ann. **226**, 275-284(1977) H. Maaß: [*Siegel’s modular forms and Dirichlet series*]{}, Lecture Notes in Math. **216**, Springer-Verlag, 1971 S. Mizumoto: On integrality of certain algebraic numbers associated with modular forms, Math. Ann. **265**, 119-135(1983) S. Nagaoka: On the mod $p$ kernel of the theta operator. Proc. Amer. Math. Soc. **143**, 4237-4244 (2015) S. Nagaoka: Note on mod $p$ Siegel modular forms. Math. Z. **235**, 405-420 (2000) M. Peters: Ternäre und quaternäre quadratische Formen und Quaternionenalgebren. Acta Arithm. **XV**, 329-365 (1969) W. Scharlau: [*Quadratic and Hermitian Forms*]{}, Grundlehren Math. Wiss. **270**, Springer-Verlag, 1985 G. Shimura: On the Fourier coefficients of modular forms in several variables. Nachrichten der Akademie der Wissenschaften in Göttingen, Mathematisch-Physikalische Klasse 1975, 261-268 (=\[75d\] in Collected Papers II) J.-L. Waldspurger: Engendrement par des séries thêta de certains espaces de formes modulaires. Invent.math.**50**, 135-168 (1978) series de theta. D.B. Zagier: [*Zetafunktionen und quadratische Körper*]{}, Springer-Verlag, 1981 S. Böcherer\ Kunzenhof 4B, 79117 Freiburg,\ Germany\ e-mail:[email protected]\ \ H. Kodama\ Academic Support Center, Kogakuin Univ.\ Hachioji, Tokyo 192-0015\ Japan\ e-mail:[email protected]\ S. Nagaoka\ Dept. Mathematics, Kindai Univ.\ Higashi-Osaka, Osaka 577-8502\ Japan\ e-mail:[email protected] [^1]: This case appeared in a discussion with S.Takemori.
null
minipile
NaturalLanguage
mit
null
Hillary Clinton needs a better campaign slogan Bill Clinton had “It’s the economy, stupid.” George W. Bush had “compassionate conservatism.” Barack Obama had “Change you can believe in.” Donald Trump has “Make America great again.” Hillary Clinton has … The Democratic nominee does have 40 bullet-point programs on everything from childcare to mental health to the Middle East. But she has no memorable rallying cry to capture her candidacy and rationale to be president. To test that, simply ask a bunch of Clinton supporters to summarize in a sentence or two what her candidacy is about. You usually get multiple paragraphs in response. Be the first to know. No one covers what is happening in our community better than we do. And with a digital subscription, you'll never miss a local story. This is more a political than a substantive issue. Slogans are no substitute for governing policies. Trump’s perverse platitudes (“Pay for the wall”) are Exhibit A. Still, a catchphrase can be a powerful and moving expression of a candidate’s authentic ambitions. Clinton’s lack of one says something about her struggle to excite voters about her vision for the future — which is usually what’s at stake in a presidential election that doesn’t involve an incumbent. Trump champions the past with a promise to make America what it was. Clinton proposes to seize the future and make America greater. She often talks about change, but usually by focusing on a list of programs rather than broad priorities or overarching meaning. She does have a not-Trump campaign slogan — “Stronger Together” — but most voters don’t identify with it or draw inspiration from its language. She will have an opportunity to inspire on Monday during the first of two presidential debates. That kind of forum, however, usually focuses more on policy specifics than campaign themes. Some Democrats hope she’ll take a lesson from her husband’s 1992 general election campaign, when the habitually prolix Bill Clinton grew hoarse and had to condense his stump speech. That made him more effective, the theory goes. Maybe Hillary Clinton, too, could make more impact with a few well-chosen words.
null
minipile
NaturalLanguage
mit
null
About Our motto "Excellence you can feel" drives us to increase customer care, comfort and satisfaction with professional conduct through friendly and honest service. We offer a variety of state-of-the-art, energy efficient comfort solutions for replacement or new install and provide service and preventive maintenance to keep your existing heating and/or cooling system performing at its best. Give us a call to see how we can help make you and your home or work place more comfortable. Since 2001 we have been serving the Quartzsite Salome Bouse triangle in south-western Arizona. In early 2012 we moved our office to Prescott, expanding to serve the quad-city area around Prescott. Quality of workmanship is very important to us. We receive continued training through organizations such as: - NATE (North American Technician Excellence) - ACCA (Air Conditioning Contractors of America) - RSES (Refrigeration Service Engineers Society) - The Electric League & The Heat Pump Council Our primary equipment manufacturers: -Trane, Fujitsu, Honeywell, Aquahot, Rinnai, etc Services Air Conditioning Air Conditioning Installation Air Conditioning Maintenance Energy Efficiency Forced Air Systems HVAC Heater Installation Heater Maintenance Heating Radiant Systems Tankless Water Heaters Languages English German Insurance Most insurance accepted Payments American Express Cash Check Debit Discover Financing Mastercard Visa Certifications & Memberships What others had to say 5 stars Kathy (Main House) EFeatured review The Comfort Pro team is very professional. They arrived when they said they would, did a thorough inspection and explained in detail their findings and suggestions. We knew more about our system and what we could expect from it by the time the inspection was finished. We will definitely use Comfort Pro for all of our HVAC checkups and, if needed, repairs. What I love about comfort pro is their attention to detail! Never have I felt that the job was sub-par. Rob always goes above and beyond to do it right. It is as if he really takes of the ownership for my current problem and wants to make it, not just work, but be perfect when he is done. Thanks so much! You guys are awesome! You went above and beyond to take care of the issue I was having with the furnace, and fixed the problem fast. You were the only company that called me back and followed up with me afterward. Comfort Pro (Rob Kunzmann) personifies the lost art of professional customer service. His personal approach to problem solving is refreshing. He is a personable no nonsense professional who takes all the time needed to answer any questions asked. Rob installed a Mitsubishi multi head heater/AC in our new construction project. He made several trips, and kept in contact as our layout evolved. When it came time to actually install the system, Rob contacted us to advise us that he would be able to save us some money on the unit on a special promotion. He continues to be responsive, and stays in touch to ensure that we continue to be happy with our purchase, and the system is trouble free. We would highly recommend Comfort Pro to anyone who needs installation, replacement or service.
null
minipile
NaturalLanguage
mit
null
The 'Victor' classic waistcoat is British style personified, worn by all-walks of men throughout the 20th century, and sits as well on it's own as with a single-breast, double-breast, peak or notch lapel jacket. Our 'Victor' is actually based on an original waistcoat from the late 1930s from our personal collection. It features two functional waist pockets, with the addition of a stylish watch chain buttonhole, and can be adapted to the perfect fit with a buckle adjustment at the back. Fabric is 100% wool - woven in England. The 'Victor' features a top quality navy lining in viscose for a little added finesse.
null
minipile
NaturalLanguage
mit
null
Q: java.lang.ClassFormatError after minor code change I restrated my program and it just blew up. All I changed in it were some String.format() returns and reverting those changes did not make this error go away. When I research the error it appears to be related to Maven? But im using ANT to build the project. Exception in thread "Thread-2" java.lang.ClassFormatError: Absent Code attribute in method that is not native or abstract in class file InHouseLeague/Workers/BotListener at java.lang.ClassLoader.defineClass1(Native Method) at java.lang.ClassLoader.defineClass(ClassLoader.java:791) at java.security.SecureClassLoader.defineClass(SecureClassLoader.java:142) at java.net.URLClassLoader.defineClass(URLClassLoader.java:449) at java.net.URLClassLoader.access$100(URLClassLoader.java:71) at java.net.URLClassLoader$1.run(URLClassLoader.java:361) at java.net.URLClassLoader$1.run(URLClassLoader.java:355) at java.security.AccessController.doPrivileged(Native Method) at java.net.URLClassLoader.findClass(URLClassLoader.java:354) at java.lang.ClassLoader.loadClass(ClassLoader.java:423) at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:308) at java.lang.ClassLoader.loadClass(ClassLoader.java:356) at org.schwering.irc.moep.MoepIRC.run(MoepIRC.java:831) at java.lang.Thread.run(Thread.java:722) The code its referenceing (I havent touched in weeks) public void run() { updateTab(Util.CONSOLEWINDOWINDEX, "# Trying to connect to "+ host, serverColor); enableConnectMenuItem(false); username = username.toLowerCase(); if (!useSSL) { conn = new BotConnection(host, portMin, portMax, password, nickname, username, realname); } else { BotSSLConnection sslconn = new BotSSLConnection(host, portMin, portMax, password, nickname, username, realname); if (!autoAcceptSSLCerts) sslconn.addTrustManager(new AskTrustManager()); conn = sslconn; } conn.addIRCEventListener(new BotListener(this)); //ERROR POINTS TO HERE conn.setColors(true); conn.setPong(false); conn.setDaemon(true); try { conn.connect(); this.isConnected = conn.isConnected(); } catch (Exception exc) { String reason = ""; if (exc.getMessage() != null) { reason = ": "+ exc.getMessage(); } updateTab(Util.CONSOLEWINDOWINDEX, "# Couldn't connect"+ reason, serverColor); enableConnectMenuItem(true); exc.printStackTrace(); this.isConnected = false; } } The changes I made before this happened: From: @Override public String toString() { String returnStr = String.format("%s(ELO: %d):", getTeamName(), teamELO); for (IPlayer player : roster) { returnStr = String.format("%s %s", returnStr, player.getUserName()); } return returnStr; } To public String toString() { String returnStr = String.format("%s[%d]:", getTeamName(), teamELO); for (IPlayer player : roster) { returnStr = String.format("%s %s;", returnStr, player.getUserName()); } return returnStr; } A: The diagnostic is: Absent Code attribute in method that is not native or abstract in class file InHouseLeague/Workers/BotListener You did not say if code changes was in the class InHouseLeague.Workers.BotListener, or is it a library class. Anyway, normally any code changes cannot make a compiler to produce a method without code attrubute. The class file was spoiled in another way, for example, it was a hardware device error.
null
minipile
NaturalLanguage
mit
null
I don't know how many people remember this anymore, but Dunny Series 2 contained — within the blind box assortment — 6 unique hand-painted Dunnys. This was essentially the first 'golden ticket' and the artists who made them were never revealed. In fact, talking with folks who worked at Kidrobot at the time, none remembered who did all six! But, with two months worth of perseverance, I was able to track down who all six artists were. If you want to see the pieces and find out who the artists were, read on…https://coartmag.com/news/feature/dunny ... r-secrets/ Bravo, nice work finding this info! I'd only seen rumor-ish stuff about them, but glad to know the scoop! Question is, do I put them in Dunnydex since they're essentially (probably impossible to locate) one-off customs? The completist in me would be sad to see my complete series 2 set suddenly missing 6 impossible items. Open to suggestions on that. On an unrelated note, I still haven't added the Batman series to Dunnydex, kinda waiting to see if I ever get a request from anyone delicious62 wrote:Question is, do I put them in Dunnydex since they're essentially (probably impossible to locate) one-off customs? The completist in me would be sad to see my complete series 2 set suddenly missing 6 impossible items. Open to suggestions on that. You might as well. I think AllVinyls has had this info on their site for quite a while QTPie wrote:Great article! I never heard about these. I really wish they would do it again since its such a great concept. Maybe more hand painted ones will appear. Thanks! And I hope so too. I understand why they had to stop doing the proper Golden Tickets, due to legal concerns, but things like this inside random blind boxes seems completely plausible. Of course, I'm not a lawyer, so… who knows. delicious62 wrote:Bravo, nice work finding this info! I'd only seen rumor-ish stuff about them, but glad to know the scoop! Thanks! It was literally about two months of talking with various people who worked at KR at the time as well as artists who were associated with them around then to uncover all six. It was a LOT of work, but I smiled for about a full day after I finally identified the sixth and final one! delicious62 wrote:Question is, do I put them in Dunnydex since they're essentially (probably impossible to locate) one-off customs? The completist in me would be sad to see my complete series 2 set suddenly missing 6 impossible items. Open to suggestions on that. Well, that becomes a weird question, really. They were promoted as part of Dunny Series 2, but no reference to them was made on the outside of the box. Unless you consider the one Dunny outline filled with three question marks to refer to these as a whole as well as to the Sket One variant. therealchinaman wrote:I think AllVinyls has had this info on their site for quite a while Yes, AllVinyls had all six listed, but without artists except in two or three cases, one of which was actually wrong. Though I see Paul is on top of things and has them all listed now with the artist now. You're welcome, Paul! :P You're going to have to wait until my in-depth coverage of the Golden Tickets. :P In all seriousness, my understanding was that it was a legal concern. If you're offering an instant win mail-in (or redemption) prize, which the Golden Tickets were, then you have to offer a way for people to enter without purchasing. It's why there's always that "No purchase necessary. To enter without purchase, mail blah blah blah to blah blah blah with…" You get the idea. It's not the companies being kind, it's something they legally have to offer. And the cost of employee hours to sort through this mail, devise a manner in which these mail-in people could potentially win, and then reply to them, would've just been too expensive for Kidrobot. At least, this is my recollection of why they stopped offering Golden Ticket and shifted to case exclusives and the one Build-a-Dunny attempt. If anyone knows differently, please correct me.
null
minipile
NaturalLanguage
mit
null
C4D to FBX to Unity Issues My colleague and I are trying to export a C4D model to Unity to be used for virtual reality. We have tried numerous file formats and problem solving techniques but every time we import the FBX file form C4D into Unity there are issues. Some of these issues include: 1. Certain polygons do not even show up in the model at all 2. Polygons become flipped or backwards 3. Textures apply incorrectly or not at all 4. (the most puzzling) Depending on which angle you are looking at something in the model you can either see it or not. For example, we have cabinets that are solid with a back on them and at one angle they appear to be see-through and at another angle they are normal. I know that there seems to be a CV-Smart-Exporter plug-in that is supposed to help with the C4D to Unity exportation process, but we do not have access to it. I have attached an image of an example of issue #2 - The desktops screens are being placed at the back of the computer. Attached Files: Which release of C4D do you use? Cinema 4D's native FBX export has been improved continually over the last years and should work well enough in most situations. However, there are always some restrictions and a number of details to pay attention to. Flipped polygons mean that your normals point in the wrong direction. With the Reverse Normals function in C4D affected polygons can be flipped manually. Enable Backface Culling in the C4D viewport options to spot / avoid flipped polygons. 1- turn on backface culling in C4d and the polys will be invisible there as well- it is as stated in the previous post- the normals are probably reversed 2- they were probably already flipped in C4d- with backface culling off you cannot tell in C4d- so best to keep it on for Unity work 3- you need to UV map everything for Unity- you can't use cubic or any other projection modes- also C4d shaders are not supported in Unity- bake all shaders to textures for use in Unity 4- take a look at the fbx file you imported in Unity and allow Unity to recalculate the normals and/or tangents- adjust the smooth angle slider and check the results- I find Unity's recalculated normals usually look better than the ones imported from C4d Oops... "Unity", Unity logos, and other Unity trademarks are trademarks or registered trademarks of Unity Technologies or its affiliates in the U.S. and elsewhere (more info here). Other names or brands are trademarks of their respective owners.
null
minipile
NaturalLanguage
mit
null
Nancy Peacock Friendly House and Dog Sitteri Want To Connect With Nancy? House Sitter in Sun City I am a retired teacher and have time to love on dogs and watch your home for you. I live in Sun City, AZ which puts me close to Glendale, Peoria, Avondale, and Goodyear. You may reach me at nspeacock@yahoo.
null
minipile
NaturalLanguage
mit
null
Why the Interlaken? A beautiful location in the mountains and lakes of the Southern Berkshires Comfortable meeting and gathering spaces available all weekend long - all night if you wish! Exceptional dining at Morgan's Restaurant, rated "very good" by the New York Times Double-queen or king bedded guest rooms for attendees, all with private baths Privacy, and a distraction-free environment Flexibility in space set-up for your event All-inclusive retreat packages Rates that are extremely competitive A friendly, knowledgable and professional team of staff to assist you and your event every step of the way DISTRACTION FREE. We provide a truly distraction free environment for your group. Your meeting spaces are private and dedicated, and you're likely to feel that you are the only group in house. For our Scrapbookers and Quilters, we have two large meeting spaces able to accommodate up to 30 people in each room. Generous crafting space is provided in either 6' or 8' sections - plenty of room for all of your crafting supplies! For a Religious or Marriage Retreat, our set-ups are completely flexible from u-shape style to theater style - whatever your needs may be. Warm and friendly service that starts from the dedicated meeting planner and meeting service attendant. Always infused with a "yes, we can" attitude, we will make certain that we go out of our way to make sure your experience here at the Interlaken is memorable and that you'll want to visit us every year, perhaps even twice a year! Please ensure the Check Out Date is set to come after the Check In Date.
null
minipile
NaturalLanguage
mit
null
Influence of imidazole carboxamide on platelet functions and coagulation in vitro. Influence of imidazole carboxamide (DTIC, NSC-45388) on some platelet functions, plasma coagulation, and fibrinolysis in vitro was investigated, using different concentrations of the drug (80 and 160 microgram/ml). The lower concentration, which corresponds to that obtained in plasma after administration of therapeutic doses in man, did not significantly influence any of the important platelet functions. It is concluded that after current dosage of the drug, bleeding disorders caused by impairment of platelet functions are improbable. However, following the higher concentration of DTIC, a significant inhibition of the increase in light transmission of platelet-rich plasma provoked by standardized freezing and thawing procedure, was demonstrated. Furthermore, the same dose of the drug caused partial retardation of the retraction of reptilase clots. The authors assume that DTIC has a "stabilizing effect" on the cell membrane, particularly in higher concentrations.
null
minipile
NaturalLanguage
mit
null
Consequences of revised CLSI and EUCAST guidelines for antibiotic susceptibility patterns of ESBL- and AmpC β-lactamase-producing clinical Enterobacteriaceae isolates. This study aimed to: (i) analyse the antibiotic susceptibility testing (AST) profiles of extended spectrum β-lactamase (ESBL)- and AmpC β-lactamase-producing clinical Enterobacteriaceae isolates applying EUCAST 2013 AST guidelines; and (ii) evaluate discrepancies in AST profiles according to EUCAST 2010 guidelines, EUCAST 2013 guidelines, CLSI 2009 guidelines and CLSI 2013 guidelines. The 195 ESBL- and/or AmpC β-lactamase-producing Enterobacteriaceae isolates used in this study were systematically characterized by disc diffusion AST interpreted according to the 2013 guidelines of EUCAST and CLSI, the EUCAST 2010 guidelines and the CLSI 2009 guidelines. Individual cephalosporin AST patterns according to EUCAST 2013 guidelines were described for individual ESBL and AmpC β-lactamase genotypes. Significant differences in the susceptibility rates of important cephalosporins such as cefepime, ceftazidime and cefotaxime applying EUCAST 2013 and CLSI 2013 AST guidelines were demonstrated for ESBL- and AmpC β-lactamase-producing isolates. The confirmation of ESBL and/or AmpC β-lactamase production can support the selection of an adequate antibiotic drug therapy. Despite a harmonized CLSI and EUCAST 'report as found' strategy for cephalosporins and ESBL-producing isolates, AST interpretation according to the CLSI 2013 and EUCAST 2013 guidelines shows significant differences in susceptibility rates for mainstay cephalosporins such as cefepime, ceftazidime and cefotaxime. Thus, further harmonization of clinical breakpoints is warranted.
null
minipile
NaturalLanguage
mit
null
Say hello to HiTea We were passing by while getting a boba drink at Half and Half at the restaurants of the Mar center in Monterey Park, we noticed there was a bright red banner on top of the grand opening store’s building. The sign explained that there would be free drinks on Sept. 28 and 30, giving us a great deal where you buy one and get another free on Oct. 1. Unfortunately, we did not come to those days with the great deals. When you walk into the shop, you immediately will see two small tables with chairs on each side. There are also benches decorated with beautiful flowers where you can sit and just talk with your friends. The plants were beautiful, and the colors were matching with the shop itself. Entering the shop, there was nice greeting towards us and ask us to take our time on ordering. Taking a glance around the place where you can actually bring your laptop to work on upcoming reports or even study for your upcoming tests. The place also has free wifi if you want to go there to play your mobile phone games or scroll through your social media. It is not too crowded nor too empty. HiTea has three snacks: Universal curry fish eggs, Creme bruise, and Bake crispy sausage. All the drinks have their drinks had dependable prices on basic how the drink is made in. The drinks and foods in the shop price are the range to $2.75 to $5.95. The items are we have ordered is the oreo milk tea that cost about $4.95 and the puff cream bubble milk tea, which cost $4.25, one slice of Green Tea Melaleuca Cake cost around $9.25. The oreo milk tea mostly tastes like cookies and cream ice cream but in a milk tea form. Sophomore Jaelen Nguyen went to the HiTea once and got the puff cream bubble milk tea. He explains how the boba meets his expectations on how he likes the boba taste like. “The puff cream bubble milk tea since I order with boba in it, the boba has a bite to it, yet it not too hard not too soft; it’s just right. The drink itself has a creamy texture. I highly recommend this place for the people who like to study outdoor,” Nguyen said. However, for the one piece of the Green Tea Melaleuca Cake was a bit pricey for one slice of cake. If you like matcha tea favor stuff, then this piece of cake will meet your taste bud. For all that, the cake was a bit dry, since they put the whole cake in the fridge for display. We highly recommend HiTea if you’re looking for another boba shop nearby the Monterey Park city or a place where you can hang out with your friends.
null
minipile
NaturalLanguage
mit
null
Gay Rights: An Unnecessary Battle As a gay American I am repeatedly warned throughout the media that my status as a citizen and my constitutionally held rights are at the very mercy of an angry, bigoted and unreasonable mob of Christian authoritarians controlling the country. This is evidenced by the opposition to same-sex marriage and states like Arizona and Mississippi (among others) passing “anti-gay” segregation laws. Liberal articles declare that even my ability to receive HIV treatment is at risk, as did the Huffington Post in an article stating: "...restaurants could turn away same-sex couples celebrating an anniversary, and pharmacists could refuse HIV... drugs.” Allow me to consider the weight of this claim and provide a reasonable perspective in response. The assumption is that if given the legal authority, Christians would readily exploit said laws to intentionally discriminate against gay, lesbian, transgendered, or any other category of person they do not support religiously. The result would be a world similar to pre-1960’s America in which black people were denied access to restaurants and other businesses. Naturally this would be a nightmare for Jews, women, and other minorities who rely on the continued fight against conservative demands for domination of the public voice and public policy. The curious thing, however, is that Christians currently have the ability to discriminate against gays, or whomever they wish, in all walks of life and yet do not take advantage of said power. America is a majority Christian country and so logically my personal experience, as well as the experience of all non-Christian Americans should be heavily restricted in terms of everyday access to goods and services according to liberal cries of outrage. Somehow we walk freely and unmolested. To examine the idea that, if allowed to have become law, the Arizona bill (SB 1062) would have allowed pharmacists to refuse HIV prescriptions, we must first consider the current state of pharmacists in America. Are Christian pharmacists currently or have they in the recent past refused gay customers or denied filling HIV prescriptions as a result of their religious beliefs? Has a Christian-owned pharmacy or store containing a pharmacy made a policy to selectively deny HIV medication requests? Have Christians working in the prescription industry boycotted, or refused to sell, produce, or distribute HIV medications? Have Christian medical professionals or scientists refused to participate in the innovation of HIV drugs or actively stood in the way of their advancement? Take a step back and see if any Christian doctors have refused to treat gay HIV patients or prescribe them HIV treatment. Are there Christian organizations devoted, even in part, to boycotting, suing, protesting, or limiting the innovation, sales, distribution or fulfillment of HIV treatment drugs to gay patients? Do Christian churches, in any form, across the country advocate against HIV treatment for gays? The answer is, of course, that all of the above would be ridiculous. Christians working in the medical profession simply do not have any concern whatsoever with assisting gay patients with HIV treatment, or any treatment for that matter. Christians do not have a moral opposition to treating gay people with any disease, let alone HIV. These sets of questions can be applied to any industry across our nation. Are Christian restaurant owners currently refusing to serve gays? Is there even a single instance of a Christian restaurant owner silencing and removing a gay couple from their establishment once it was discovered they were celebrating a romantic anniversary? Gays are not denied entry into any public space owned by Christians. Gays are not limited to what they can and cannot purchase in any store or establishment open to the public. Gays are not excluded from Christian themed stores, restaurants, or theme parks. Gays aren’t even restricted from entering churches across the land! To be sure, gays experience absolutely no limitation of their natural rights and this includes the right to bear arms, to vote, or the right to free speech, assembly or religion. Gays are not restricted in legal protections, property ownership, reproduction, education, business creation, taxation, political activism, or any other activity, civil or otherwise, enjoyed by all Americans. Actually, gays are not intentionally excluded under any law in the land. Any law, policy or decision made by a business or government office that liberal gay activists cite as proof of their second-class citizenship can be more accurately understood in terms of discrimination towards single individuals in favor of married couples. Classic examples of hospital visits, property transfers, and adoption are misrepresented as “anti-gay” when they are actually issues related to being single. If a gym offers a “spousal discount” and a gay couple is denied, this is not an “anti-gay” policy. Any couple not married would be denied this discount. The same can be argued in all other cases. Examples related to interracial discrimination are invalid. If a man and a woman of a certain age and status (not currently married, citizen) are eligible under state law to be legally recognized as married but a new law is introduced to specifically prevent a black and white coupling then it is understood as intentional discrimination. Gay people are not intentionally excluded from marriage; the coupling was just not anticipated. Same-sex marriage is really a request to add to the current state eligibility requirements for recognition. Gays have equal access to the same legal mechanisms and free-market options all Americans have to influence desired changes in policy or law. Conservatives encourage and support this fully despite not always agreeing on the desired goal. Any addition to law or policy to benefit same-sex couples is currently possible. To further the point, Christians do not oppose legal recognition or access for gays. The opposition to same–sex marriage has nothing to do with limiting access to property transfers or hospital visits for gays. If this were the case Christians would be protesting hospitals that offer services to gay couples, protesting legal firms that negotiate property transfers for gay couples after death and suing to nullify wills written by gay people designating property or funds to their partner or children. Christians have no interest in interfering with the personal lives of gay Americans. Civil Unions are barely a concern at all and only become a point of interest when used as a tool to enforce gay mores onto public opinion. The reality is that Christians, as a general group, are uninterested in discrimination and conservatives are typically focused on curtailing liberal overreach. Christians are not protesting gay weddings just as Christian bakers did not kick out gay clients preceding the controversy in Arizona. The issue is on liberal enforcement of their values as an absolute that we, as Conservatives and Libertarians, fight. We oppose business owners being coerced into participating or associating with events they deeply oppose religiously. I, as a gay Jewish person, have nothing to fear in regards to my rights from Christian interference. The work of Christians and Conservatives alike is to ensure the natural rights of all citizens are preserved. There simply is no evidence to the contrary. Chad Felix Greene, author of Jewish Children’s Books, Non–Fiction and Social Commentary (www.chadfelixgreene.com)
null
minipile
NaturalLanguage
mit
null
327 A.2d 831 (1974) Donat A. CASAVANT et ux. v. HAZEL CAMPOPIANO et al. and Recamp Enterprises, Inc. No. 73-172-Appeal. Supreme Court of Rhode Island. November 13, 1974. *832 Almonte, Lisa & Pisano, Paul J. Pisano, Providence, for plaintiffs. Higgins, Cavanagh & Cooney, Gerald C. DeMaria, Providence, for defendants. OPINION ROBERTS, Chief Justice. This civil action was brought by the plaintiffs, Donat A. and Frances L. Casavant, against Hazel and Remo Campopiano and Recamp Enterprises, Inc.[1] to recover damages incurred by the defendants' alleged breach of an implied warranty of habitability. The case was tried to a justice of the Superior Court sitting without a jury, who denied a motion to dismiss the suit as against Hazel Campopiano, the wife of Remo Campopiano, and found that by reason of the defendants' breach of warranty the plaintiffs had been damaged to the extent of $4,500. From that judgment the defendants are prosecuting an appeal in this court. It is not disputed that defendant Remo Campopiano had been engaged in the business of building residential structures on speculation for approximately 20 years. The construction of these homes was undertaken without any specific prospective purchasers being in mind. It further appears from the evidence that, upon completion of the basic structure of the house here involved, defendants rented it to a married couple who intended to purchase the house as soon as they were able to secure the necessary financing. Sometime within a year after taking possession, the tenants vacated the premises, and shortly thereafter defendants sold the house to plaintiffs, the deed thereto being dated October 24, 1968. In April of 1969 plaintiffs discovered that the roof of the house was sagging visibly. An inspection disclosed that the roof construction was defective and that such condition constituted a threat to the safety of the occupants. The trial justice found that the value of the house in October of 1968 was $13,000. The defendants concede that in Padula v. J.J. Deb-Cin Homes, Inc., 111 R.I. 29, 298 A.2d 529 (1973), the court established in this state the rule that a builder-vendor impliedly warrants to a buyer that he constructed the building to be transferred with reasonably good workmanship and that the dwelling is fit for human habitation. They argue, however, that the rule laid down in Padula has no *833 application in the instant case. In support of this position, they contend that because of the intervening occupancy by others prior to the sale to plaintiffs, the dwelling was at the time of transfer not a new but a used home, the sale of which is not within the purview of the Padula rule. We cannot agree. In the first place, the thrust of the Padula rule was to afford protection to home buyers from the over-reaching of knowledgeable builder-vendors. That there had been an intervening tenancy should not, standing alone, deprive the buyer of that protection. The defendant, Mr. Campopiano, was in a much stronger bargaining position than plaintiff, Mr. Casavant. The former was an experienced developer who had built and sold many homes. Clearly, Mr. Campopiano, who built the house, was in a far better position to determine the condition of the structure of the roof than was Mr. Casavant. The latter, with a ninth-grade education, had purchased a house only once before the instant transaction. The evidence discloses that there was no access to the open space beneath the roof so that if plaintiffs had been sufficiently knowledgeable to evaluate effectively the condition thereof, the lack of access to make such an inspection would have rendered such expertise of no assistance in these circumstances. Secondly, defendants' argument, as we understand it, is that because the house had been occupied prior to the sale to plaintiffs, the warranty should not be implied in the subsequent purchaser's favor because the structure is not a new house as contemplated in Padula. With this we do not agree. This argument might have merit if the intervening occupancy appeared to be causally connnected with the defective condition of the roof or was of such extended duration as to make an application of the warranties unreasonable. In the absence of such findings, the court will assume that the builder-vendor was responsible for the existence of the defect and that the structure was a "new" house as contemplated in Padula. Thirdly, defendants retained title to the premises for the purpose of selling the house. It is clear that the intention of the builder-vendor was to sell as soon as an advantageous offer was made and that Mr. Campopiano did not intend to use the dwelling as a personal residence or as rental property. Compelling public policy discussed in Padula favors implying such warranties in appropriate cases, and this court will not allow that policy to be defeated solely because of an intervening tenancy, particularly where the builder-vendor created such intervening tenancy for the purpose of promoting the sale of the property. In short, we are of the opinion that the intervening tenancy in this case was merely a device to promote a sale by the builder-vendor and, thus, does not require us to hold that the case is outside the purview of the rule laid down in Padula. The defendants contend further that the following clause in the purchase and sale agreement constituted an effective exclusion of the implied warranties of reasonable workmanship and habitability: "Full possession of the said premises, free of all tenants is to be delivered to the party of the second part at the time of the delivery of the deed, the said premises to be then in the same condition in which they now are, reasonable use and wear of the buildings thereon, and damage by fire or other unavoidable casualty excepted." (emphasis added) To effectuate the policies underlying the implied warranties of habitability and reasonable workmanship, the court will construe exclusionary provisions of doubtful meaning strictly against those parties raising such provisions as defenses. The defendants contend that, by reason of plaintiffs' agreeing to taking the premises "in the same condition in which they now are," plaintiffs agreed to accept them "as is" or *834 "with all faults." Courts have been reluctant to construe "acceptance in present condition" clauses as providing sufficient grounds for exclusion of implied warranties with respect to the sale of personalty unless the language is used with specific reference to its effect on warranties. Compare Hull-Dobbs, Inc. v. Mallicoat, 57 Tenn. App. 100, 415 S.W.2d 344 (1966), First Nat'l Bank of Elgin v. Husted, 57 Ill. App.2d 227, 205 N.E.2d 780 (1965), with Tibbitts v. Openshaw, 18 Utah 2d 442, 425 P.2d 160 (1967). The language in the instant case does not meet this standard of specificity of exclusion. For all these reasons, the court holds that plaintiffs' signing the agreement did not constitute a waiver of their rights to the protection of implied warranties. The defendants argue that plaintiffs' inspection of the premises put plaintiffs on notice of the true condition of the house. It should be noted that plaintiffs had no access to the attic and, thus, even if they had the expertise to determine the quality of construction, they could not have done so. The defendants' argument here is wholly illusory. General Laws 1956 (1969 Reenactment) § 9-21-10 does not govern cases other than those sounding in tort. Isserlis v. Director of Pub. Works, 111 R.I. 164, 300 A.2d 273 (1973). Consequently, the trial justice properly refused to apply this provision in awarding interest at 6% from the date of the deed. Thus, we reject the argument of both parties that the statute to which they allude controls the assessment of interest in this case. The defendants contend that the trial court erred in denying their motion to dismiss the suit as against Mrs. Campopiano. The record indicates that Mrs. Campopiano was a hairdresser by occupation and took no part in her husband's business management or dealings. Her only connection with this case was the signing of the deed and the holding with her husband of a joint checking account from which Mr. Campopiano drew checks to pay subcontractors. This evidence is insufficient to establish vicarious liability through either a partnership or agency theory. Thus, it is our opinion that the trial justice erred in denying Mrs. Campopiano's motion to dismiss the plaintiffs' suit against her. The defendant Hazel Campopiano's appeal is sustained, and the order of the trial justice denying her motion to dismiss from which she appealed is reversed; the defendant Remo Campopiano's appeal is denied and dismissed, the judgment from which he appealed is sustained, and the cases are remanded to the Superior Court for further proceedings. NOTES [1] The action against Recamp Enterprises, Inc. was dismissed at trial.
null
minipile
NaturalLanguage
mit
null
Simulation and Reconstruction of Metabolite-Metabolite Association Networks Using a Metabolic Dynamic Model and Correlation Based Algorithms. Biological networks play a paramount role in our understanding of complex biological phenomena, and metabolite-metabolite association networks are now commonly used in metabolomics applications. In this study we evaluate the performance of several network inference algorithms (PCLRC, MRNET, GENIE3, TIGRESS, and modifications of the MRNET algorithm, together with standard Pearson's and Spearman's correlation) using as a test case data generated using a dynamic metabolic model describing the metabolism of arachidonic acid (consisting of 83 metabolites and 131 reactions) and simulation individual metabolic profiles of 550 subjects. The quality of the reconstructed metabolite-metabolite association networks was assessed against the original metabolic network taking into account different degrees of association among the metabolites and different sample sizes and noise levels. We found that inference algorithms based on resampling and bootstrapping perform better when correlations are used as indexes to measure the strength of metabolite-metabolite associations. We also advocate for the use of data generated using dynamic models to test the performance of algorithms for network inference since they produce correlation patterns that are more similar to those observed in real metabolomics data.
null
minipile
NaturalLanguage
mit
null
Q: How to send the TAB button using Python In SendKey and PywinAuto Modules This is the my code which will open the window and send the keys to the window but some screen s are not working from pywinauto.application import * import time app=Application.Start("Application.exe") app.window_(title="Application") time.sleep(1) app.top_window_().TypeKeys("{TAB 2}") A: Be sure you are using exactly needed window. top_window_() may return quite another window. To check, run: app.top_window_().DrawOutline() #Highlight the window 2.The window can be not active, set it focus before the typing: window = app.top_window_() window.SetFocus() window.TypeKeys("{TAB 2}") 3.More, you may need to click on the window. window.Click() window.TypeKeys("{TAB 2}")
null
minipile
NaturalLanguage
mit
null
Q: How To Call NSLog in Nativescript on iOS Programming Nativescript on a laptop with a terminal only 100x wide looks like this: https://s3.postimg.org/arqwz0utv/Screen_Shot_2016_08_16_at_11_29_39_PM.png I don't know about you, but I can't even see what I'm logging from my app... Here's the plan for my console.log module I'd like to create: Colors based on log, info, warn, error with options to help the colorblind (me) Customizable options for every user's preference Declutter the terminal to actually make sense of what's being logged from the app What I've tried so far: tns-core-module console - tried a bunch of different things; can't even figure out how iOS logs to the terminal at all tns-core-module trace - tried calling trace.write but unsuccessful trying Swift's print and println In my attempt to create a cleaner console.log, how do I call NSLog inside my Nativescript app? I have no problem calling android.util.Log.v on Android so that part's all set. A: You can not access Variadic Objective-C methods in the iOS runtime. Here is the list of limitations Limitations The following members can not be accessed from JavaScript: Unions Variadic Objective-C methods, function pointers, blocks Structs with constant size array members Vectors Inline functions int64_t, uint64_t outside the [-2^53, 2^53] range long double, int128_t, uint128_t Link to documentation section: http://docs.nativescript.org/runtimes/ios/Limitations.html
null
minipile
NaturalLanguage
mit
null
Trivial Pursuit (American game show) Trivial Pursuit is an American game show that ran on The Family Channel from June 7, 1993 to December 30, 1994. Loosely based on the board game of the same name, it was hosted by Wink Martindale with Randy West announcing. Format The show was played in two halves. The first half was an interactive game show, while the other half was a traditional game show. Interactive Game Nine players (originally twelve) competed for three spots in the second half of the show. Round One Five questions with four multiple-choice answers were asked by the host. The players had 10 seconds to answer by pressing a number from 1–4 on a keypad in front of them. They scored points based on how fast they answered the question correctly, with a maximum of 1,000 points available. After five questions, the six players with the highest scores played round two and the other players were eliminated. Round Two This round was played in the same way as Round 1, except the three highest-scoring players won a prize and a chance to play Trivial Pursuit in the next half-hour show. Classic Game Main Game As in the board game, three contestants raced to complete their game pie first by answering questions from categories that match the colored wedge. Unlike the board game, however, it took two questions to complete a wedge, and no board or die was used. Red replaced the brown-colored wedge. In the first three rounds, each player received two turns consisting of a category choice followed by a question posed by host Martindale. A correct answer lit up a wedge but an incorrect answer gave the two opponents a chance to buzz-in and steal the wedge. Round One In the first round, the six traditional Trivial Pursuit categories were used. Round Two This round used either the categories from the Movie Edition or Television Edition. In the second half of Round 2, a new set of categories were played. (In early episodes, the questions related to a certain year in history.) The category sets used were different each show, and were borrowed from multiple versions of the board game. Round 2 included three special questions known as "Bonus Questions". When chosen, the player who answered an audio or video question correctly had an opportunity to answer a follow-up question which awarded the player $100 and another half-wedge in the color of their choice with a correct answer. Round Three Round three again used the traditional basic categories as in Round 1, but the round was played in a different manner. The round started with a toss-up question, and the first player to buzz-in and answer correctly controlled the round. The player in control kept choosing categories and answering questions until he/she either filled his or her pie (thereby winning the game), or missed a question, at which point the other two players could buzz-in and steal control and the wedge. If nobody answered the question another toss-up was played. The first player to completely light up the entire pie (or the player with the most lit wedges when time ran out) won the game, $500, an additional prize, and played the bonus round. Challenge Round The winning player had 45 seconds to answer six questions (again from the six basic categories) in order to fill up a pie shown on a monitor. Each correct answer lit a color in the pie. A wrong answer or a pass automatically moved to the next category. After the first six questions the player went back to questions from the categories missed as time permitted. The winning player received $100 for each wedge lit and if they lit up all six wedges before the 45 seconds expired, he/she won $1,000 and a trip. Audience game If there was extra time at the end of the show, an audience member was called on stage and given the opportunity to answer five multiple-choice questions (much like the "Interactive" portion of the show) worth $20 apiece, for a maximum payoff of $100. Interactive Components The show launched a series of "interactive" games called playbreaks, all produced by Martindale and his associates. Originally, ten "Trivial Pursuit" playbreaks were interspersed throughout FAM's game show block. Three of them were during Trivial Pursuit: The Interactive Game and one was during Trivial Pursuit: The Classic Game. A question would be shown on the screen, along with four choices, and the answer would be revealed 10 seconds later. Home viewers were given an opportunity to call a special 1–900 number ($4.98 per call) and play a "TP: Interactive Game" typed, using a slightly modified scoring system, and players answered by using their touch-tone telephone. The winner of each "playbreak" won a prize and competed on Friday in a playoff game against the other winners for a vacation. The ad would last about 100 seconds, as seen by an on-screen clock (even though the clock read ":99" as it faded in). On New Year's Day 1994, all of the weekly playoff winners up to that point were given the opportunity to compete in a "Tournament of Champions"-style grand playoff for a new car, which aired in between a Trivial Pursuit marathon FAM was running that day. Trivial Pursuit proved popular in its initial airing during the summer of 1993, as The Family Channel's ratings vastly increased during the 12:30–1:00 pm time slot. MTM Entertainment, an independent distribution company owned by the network's parent organization, International Family Entertainment, planned to syndicate a new version of the show to local stations for the 1994–1995 season. The plan was to produce 130 new episodes and air them along with the 130 episodes already taped for The Family Channel. However, efforts to interest local stations were largely unsuccessful, and the syndicated version never materialized. Other interactive games aired on the network – a board-game adaptation of Boggle, the list-oriented Shuffle, and an adaptation of the newspaper game Jumble. Trivial Pursuit: The Interactive Game was cancelled on March 4, 1994 to make way for Boggle and Shuffle, only to return on September 7 and be cancelled again on December 30, along with the entire interactive game block. However, reruns of Trivial Pursuit: The Classic Game continued with no interactive playbreaks until July 21, 1995. Home game A home version of the game was released by Parker Brothers in 1993 as Trivial Pursuit Game Show. Some question material was taken directly from the show, and the box cover featured Martindale on the slightly different set of the show's 1993 pilot (which was intended for syndication; producer Jay Wolpert also produced at least one pilot in 1987 with Worldvision Enterprises that was not picked up; Martindale posted both pilots to his YouTube channel in 2014). This was the second home version that was based on a board game itself, the first was TV Scrabble by Selchow & Righter in 1987 and then Celebrity Name Game (based on the board game Identity Crisis) by PlayMonster (formerly Patch) in 2016. See also Trivial Pursuit Board game Game show Счастливый случай – analog in Russia References External links The Trivial Pursuit Rules Page Category:Cable game shows Category:1990s American game shows Category:1993 American television series debuts Category:1994 American television series endings Category:The Family Channel original programming Category:Television programs based on board games Category:English-language television programs Category:Television shows based on Hasbro toys
null
minipile
NaturalLanguage
mit
null
Tic-Tac-Toe In Erlang Neal over at nealabq.com has a long tutorial on Erlang Tic-Tac-Toe, which is incidentally the first program I wrote when learning Erlang. Programmers may want to take a look at the tutorial, but perhaps the most interesting aspect of the tutorial is the way he takes the problem space and shrinks it down by analyzing the algorithm and the properties of a game of tic-tac-toe.
null
minipile
NaturalLanguage
mit
null
Governor orders NJ state flags lowered for Colts Neck Marine By order of Governor Chris Christie today, flags at New Jersey state buildings will be raised to half-staff on Tuesday, July 25, in memory of Marine Corporal Dan Baldassare of Colts Neck. U.S. Marine Dan Baldassare (Facebook/Dan Baldassare) The 2015 Colts Neck High School graduate was one of 16 victims of the July 10 crash of a KC-10 in Mississippi, including 14 other Marines and a U.S. Navy sailor. Baldassare enlisted in the Marines the same year he graduated, serving honorably in the Special Operations Battalion at Camp Lejeune, North Carolina. He was a recipient of the Global War on Terrorism Service Medal and the National Service Defense Medal. "Our State and nation were shocked by the news of this tragic accident," Christie said in prepared comments.. "Corporal Baldassare and his fellow armed service members deserve our honor and solemn remembrance. Mary Pat, I, and the rest of our State lift up our thoughts and prayers to the families and friends hurt by this painful incident. Their selfless sacrifice should not and cannot go without thanks and gratitude."
null
minipile
NaturalLanguage
mit
null
Q: I want to display only 100 characters in Kendo Grid Ok, I don't really have a better title, but here's the thing. I just had a requirement for a change in my kendo grid. Here's a picture of it. And here's the code. @(Html.Kendo().Grid<TekstenViewModel.Tekst>() .Name("Grid") .Columns(columns => { columns.Template(@<text></text>).ClientTemplate("<input type='checkbox'/>").Width(10).Hidden(!Model.Administrator); columns.Bound(product => product.RESOURCE_SET_NAAM).ClientTemplate("#= RESOURCE_SET_NAAM#"); columns.Bound(product => product.Naam).ClientTemplate("#= Naam#"); columns.Bound(product => product.Waarde).ClientTemplate("<div id='editorDiv'><div class='input'>#=Waarde#</div><div class='editor'>" + Html.WebCore().LinkButton(type: ButtonType.Edit, htmlAttributes: new { onclick = "openPopupDemo('#: Waarde #', '#: ID #', 'Waarde')" })); columns.Bound(product => product.Opmerking).ClientTemplate("<div id='editorDiv'><div class='input'>#=Opmerking#</div><div class='editor'>" + Html.WebCore().LinkButton(type: ButtonType.Edit, htmlAttributes: new { onclick = "openPopupDemo('#: Opmerking #', '#: ID #', 'Opmerking')" })); columns.Template(@<text></text>).ClientTemplate("<div id='deleteDiv'><div class='delete'><a class=\"delete iconBtn\" onclick=\"deleteResourceItem(#: ID #, '#: Naam #')\"></a></div></div>").Width(10).Hidden(!Model.Administrator); }) .Pageable() .Sortable() .Filterable() .Events(events => events.Edit("onCellEdit").DataBinding("onDataBinding")) .Groupable() .Navigatable() .Editable(editable => editable.Mode(GridEditMode.InCell).DisplayDeleteConfirmation(false)) .DataSource(dataSource => dataSource .Ajax() .Batch(true) .Events(e => e.Error("error_handler")) .Model(model => { model.Id(product => product.ID); model.Field(product => product.Naam).Editable(Model.Administrator); model.Field(product => product.Opmerking).Editable(Model.Administrator); model.Field(product => product.Waarde).Editable(!Model.ReadOnly); model.Field(product => product.RESOURCE_SET_ID).DefaultValue(Model.SetID); model.Field(product => product.Type).DefaultValue(Domain.Agromilieu2.Common.Objects.Entities.Resources.ResourceType.GLOBAL_RESOURCES); model.Field(product => product.Taal).DefaultValue(Domain.Agromilieu2.Common.Agromilieu2Constants.Resources.DEFAULT_TAAL_CODE); }) .Create(create => create.Action(MVC.BeheerTeksten.ActionNames.ResourceItems_Create, MVC.BeheerTeksten.Name).Data("onCreateAdditionalData")) .Read(read => read.Action(MVC.BeheerTeksten.ActionNames.ResourceItems_Read, MVC.BeheerTeksten.Name, new { setID = Model.SetID }).Data("onReadAdditionalData")) .Update(update => update.Action(MVC.BeheerTeksten.ActionNames.ResourceItems_Update, MVC.BeheerTeksten.Name)) .Destroy(destroy => destroy.Action(MVC.BeheerTeksten.ActionNames.ResourceItems_Delete, MVC.BeheerTeksten.Name)) ) ) In the Waarde column, for example, we have text and a button in each cell. That button opens a Kendo Editor with that text. What was asked to do is display a maximum of 100 characters in the cell and then, as I open the Kendo Editor, to show the full text. I have no idea if this is even possible. A: Ya sure Can , I see you have Client Templates for the Column add this as the template #if(Waarde.length>100){# # var myContent =Waarde; # # var dcontent = myContent.substring(0,100); # <span>#=kendo.toString(dcontent)#</span> #}else{# <span>#=Waarde#</span> #}# NOTE: Not Tested , Might have to check the template a bit Add any other HTML You like its a Kendo Template with IF ELSE , For more Info Check the Docs http://docs.telerik.com/kendo-ui/getting-started/framework/templates/overview#internal-vs-external-templates A: Another way to write the ClientTemplate is to use a javascript function for the logic. This way you evade the complex hashtag system. First you define the function: <script type="text/javascript"> function getTheSubstring(value, length) { if (value.length > length) return kendo.toString(value.substring(0, length)) + "..."; else return kendo.toString(value); } </script> Then you use it in the column ClientTemplate function: columns.Bound(p => p.Value).ClientTemplate("#:getTheSubstring(data.Value,40)#"); Works and tested.
null
minipile
NaturalLanguage
mit
null
<!-- This file is generated by a tool. Do not edit directly. For open-source contributions the docs will be updated automatically. --> *Last updated: 2020-09-16.* <div itemscope itemtype="http://developers.google.com/ReferenceObject"> <meta itemprop="name" content="tf_quant_finance.math.random.mv_normal_sample" /> <meta itemprop="path" content="Stable" /> </div> # tf_quant_finance.math.random.mv_normal_sample <!-- Insert buttons and diff --> <table class="tfo-notebook-buttons tfo-api" align="left"> </table> <a target="_blank" href="https://github.com/google/tf-quant-finance/blob/master/tf_quant_finance/math/random_ops/multivariate_normal.py">View source</a> Generates draws from a multivariate Normal distribution. ```python tf_quant_finance.math.random.mv_normal_sample( sample_shape, mean=None, covariance_matrix=None, scale_matrix=None, random_type=None, validate_args=False, seed=None, dtype=None, name=None, **kwargs ) ``` <!-- Placeholder for "Used in" --> Draws samples from the multivariate Normal distribution on `R^k` with the supplied mean and covariance parameters. Allows generating either (pseudo) random or quasi-random draws based on the `random_type` parameter. #### Example: ```python # A single batch example. sample_shape = [10] # Generates 10 draws. mean = [0.1, 0.2] # The mean of the distribution. A single batch. covariance = [[1.0, 0.1], [0.1, 0.9]] # Produces a Tensor of shape [10, 2] containing 10 samples from the # 2 dimensional normal. The draws are generated using the standard random # number generator in TF. sample = multivariate_normal(sample_shape, mean=mean, covariance_matrix=covariance, random_type=RandomType.PSEUDO) # Produces a Tensor of shape [10, 2] containing 10 samples from the # 2 dimensional normal. Here the draws are generated using the stateless # random number generator. Note that a seed parameter is required and may # not be omitted. For the fixed seed, the same numbers will be produced # regardless of the rest of the graph or across independent sessions. sample_stateless = multivariate_normal(sample_shape, mean=mean, covariance_matrix=covariance, random_type=RandomType.STATELESS, seed=1234) # A multi-batch example. We can simultaneously draw from more than one # set of parameters similarly to the behaviour in tensorflow distributions # library. sample_shape = [5, 4] # Twenty samples arranged as a 5x4 matrix. means = [[1.0, -1.0], [0.0, 2.0],[0.3, 1.4]] # A batch of three mean vectors. # This demonstrates the broadcasting of the parameters. While we have # a batch of 3 mean vectors, we supply only one covariance matrix. This means # that three distributions have different means but the same covariance. covariances = [[1.0, 0.1], [0.1, 1.0]] # Produces a Tensor of shape [5, 4, 3, 2] containing 20 samples from the # batch of 3 bivariate normals. sample_batch = multivariate_normal(sample_shape, mean=means, covariance_matrix=covariance) #### Args: * <b>`sample_shape`</b>: Rank 1 `Tensor` of positive `int32`s. Should specify a valid shape for a `Tensor`. The shape of the samples to be drawn. * <b>`mean`</b>: Real `Tensor` of rank at least 1 or None. The shape of the `Tensor` is interpreted as `batch_shape + [k]` where `k` is the dimension of domain. The mean value(s) of the distribution(s) to draw from. Default value: None which is mapped to a zero mean vector. * <b>`covariance_matrix`</b>: Real `Tensor` of rank at least 2 or None. Symmetric positive definite `Tensor` of same `dtype` as `mean`. The strict upper triangle of `covariance_matrix` is ignored, so if `covariance_matrix` is not symmetric no error will be raised (unless `validate_args is True`). `covariance_matrix` has shape `batch_shape + [k, k]` where `b >= 0` and `k` is the event size. Default value: None which is mapped to the identity covariance. * <b>`scale_matrix`</b>: Real `Tensor` of rank at least 2 or None. If supplied, it should be positive definite `Tensor` of same `dtype` as `mean`. The covariance matrix is related to the scale matrix by `covariance = scale_matrix * Transpose(scale_matrix)`. Default value: None which corresponds to an identity covariance matrix. * <b>`random_type`</b>: Enum value of `RandomType`. The type of draw to generate. For `PSEUDO_ANTITHETIC` and `STATELESS_ANTITHETIC` the first dimension of `sample_shape` is expected to be an even positive integer. The antithetic pairs are then contained in the slices of the `output` tensor as `output[:(sample_shape[0] / 2), ...]` and `output[(sample_shape[0] / 2):, ...]`. Default value: None which is mapped to `RandomType.PSEUDO`. * <b>`validate_args`</b>: Python `bool`. When `True`, distribution parameters are checked for validity despite possibly degrading runtime performance. When `False` invalid inputs may silently render incorrect outputs. Default value: False. * <b>`seed`</b>: Seed for the random number generator. The seed is only relevant if `random_type` is one of `[STATELESS, PSEUDO, HALTON_RANDOMIZED, PSEUDO_ANTITHETIC, STATELESS_ANTITHETIC]`. For `PSEUDO`, `PSEUDO_ANTITHETIC` and `HALTON_RANDOMIZED` the seed should be a Python integer. For `STATELESS` and `STATELESS_ANTITHETIC `must be supplied as an integer `Tensor` of shape `[2]`. Default value: `None` which means no seed is set. * <b>`dtype`</b>: Optional `dtype`. The dtype of the input and output tensors. Default value: None which maps to the default dtype inferred by TensorFlow. * <b>`name`</b>: Python `str` name prefixed to Ops created by this class. Default value: None which is mapped to the default name 'multivariate_normal'. * <b>`**kwargs`</b>: parameters, specific to a random type: (1) `skip` is an `int` 0-d `Tensor`. The number of initial points of the Sobol or Halton sequence to skip. Used only when `random_type` is 'SOBOL', 'HALTON', or 'HALTON_RANDOMIZED', otherwise ignored. (2) `randomization_params` is an instance of `tff.math.random.HaltonParams` that fully describes the randomization behavior. Used only when `random_type` is 'HALTON_RANDOMIZED', otherwise ignored (see halton.sample args for more details). If this parameter is provided when random_type is `HALTON_RANDOMIZED`, the `seed` parameter is ignored. Default value: `None`. In this case with randomized = True, the necessary randomization parameters will be computed from scratch. #### Returns: A `Tensor` of shape `sample_shape + batch_shape + [k]`. The draws from the multivariate normal distribution. #### Raises: * <b>`ValueError`</b>: (a) If all of `mean`, `covariance_matrix` and `scale_matrix` are None. (b) If both `covariance_matrix` and `scale_matrix` are specified. (c) If `random_type` is either `RandomType.STATELESS` or `RandomType.STATELESS_ANTITHETIC` and `seed` is not supplied * <b>`NotImplementedError`</b>: If `random_type` is neither RandomType.PSEUDO, RandomType.STATELESS, RandomType.PSEUDO_ANTITHETIC, RandomType.STATELESS_ANTITHETIC, RandomType.SOBOL, RandomType.HALTON, nor RandomType.HALTON_RANDOMIZED.
null
minipile
NaturalLanguage
mit
null
Chievo Chievo (4,500 inhabitants) is a frazione of Verona located to the west of the city, around from the historic city centre, on the shores of the river Adige. It is best known for its football team, A.C. ChievoVerona, which competes in the second tier of Italian professional football, Serie B. History The name came from the Latin "clivium mantici" which means "the hill of the magic wood". Pastoral and farming activities date back to pre-Roman Celtic settlers. Placed on the shores of the river Adige the early inhabitants established a port, some mills and a water-powered saw on the river. Pipin, son of Charles, gifted the entire zone to the monastery of St. Procolo, near S. Zeno in Verona. In the 12th century Chievo had a church, a hospital and a stronghold in which Federico Barbarossa spent some nights. The Corte Bionde is the best preserved medieval building. Around 1450 the entire village was moved about nearer to the city where the climate was healthier and vegetation more gorgeous. The actual parish church with a reliquary was built at that time. In 1892 the ten church bells were cast, and are still rung today in the style of the Veronese bellringing art. Points of interest Forte Chievo: polygonal fort built between 1850 and 1852 by the Austrians as part of Verona's defensive system. Villa Pellegrini Marioni Pullè: 17th–18th century villa; the walls of its estate fence the western side of Chievo's main square. Nowadays it is owned by INPS (Italian national social security institute) and in a state of disrepair. Ponte diga del Chievo: dam and footbridge over the river Adige, built in the 1920s. References Category:Verona Category:Frazioni of the Province of Verona
null
minipile
NaturalLanguage
mit
null
Peptidylarginine deiminase type 4: identification of a rheumatoid arthritis-susceptible gene. Recent studies using linkage disequilibrium and SNPs uncovered a rheumatoid arthritis (RA)-susceptible haplotype in the gene encoding peptidylarginine deiminase (PADI) type 4. This gene is one of four known PADI genes that encode enzymes to change arginine into citrulline in proteins. Post-translational modifications of proteins, including peptidyl citrullination, are related to autoimmunity, and peptidyl citrulline is a known target of one of the most RA-specific autoantibodies. Further research on PADI4, its citrullination of native peptides, subsequent breakdown of tolerance, and the role of these peptides in the development of RA, is expected to bring a better understanding of autoimmunity and arthritis, and advancements in the medical care of RA.
null
minipile
NaturalLanguage
mit
null
Anaphylactic reaction after ongoing exposure to hair glue: a novel case report. Latex allergy is thought to be present in up to 6.5% of the general population, and can be much higher among those with chronic exposure. It is, however, uncommonly associated with severe anaphylactic reactions. Hair-care practices, such as the application of a hair weave, are a potential cause of latex-related anaphylaxis because the adhesives often contain natural rubber latex. We report the first case in the emergency medicine literature of successful treatment of a patient with airway compromise secondary to hair glue exposure. This case involved a 29-year-old woman who presented to the emergency department with severe angioedema and airway compromise. The patient had recently had an adhesive substance applied to her scalp for a hair weave placement. The patient did respond initially to antihistamine and alpha-adrenergic medication, however, because the allergen could not be removed, she relapsed, was subsequently intubated, and admitted to the intensive care unit. The latex-containing hair glue was removed over a period of several hours using an oil-based hair-conditioning product. WHY SHOULD AN EMERGENCY PHYSICIAN BE AWARE OF THIS?: This unique and potentially lethal situation required innovative management. Successful resolution of this case required a high degree of cultural literacy leading to the correct diagnosis and treatment, and utilization of resources outside of the health care field. Clinicians treating patients in areas where similar hair-care practices are prevalent should be aware of this pathology, and consider similar management strategies.
null
minipile
NaturalLanguage
mit
null
The University of Vermont (UVM) has again been ranked among the top 100 best-value public colleges in the U.S. by Kiplinger's Personal Finance magazine. UVM ranked 63rd for in-state students and 67th for out-of-state students in the publication's annual ratings. The magazine narrows its list from a field of nearly 600 public colleges and universities. To compile the list, Kiplinger's initially sorts schools on quality measures, such as admissions rate, test scores of incoming first-year students, and four- and six-year graduation rates. It then adds cost data, including tuition, fees, room-and-board and financial aid, and re-ranks the schools. In addition to its overall rank, UVM came in 25th for its four-year graduation rate of 58 percent. Two years ago, Kiplinger's ranked UVM 73rd for in-state and 85th for out-of-state students, respectively. Last year, UVM ranked 59th and 77th respectively in those categories.
null
minipile
NaturalLanguage
mit
null
Q: FormGroup in angular does not correctly see single changes of its children if they listen to each other through valueChanges I have got simple situation. There is a html form with two fields: firstName lastName I want lastName to change for something when user changes firstName. I implemented it through valueChanges observable in Angular (8). Besides I have two subscription to listen and log changes: one on whole form one on lastName Here is how it is implemented: ngOnInit(){ this.form = new FormGroup({ firstName: new FormControl('', {updateOn: 'blur'}), lastName: new FormControl('', {updateOn: 'blur'}), }); this.form.get('lastName').valueChanges.subscribe(value => console.log('lastName', value)); this.form.valueChanges.subscribe(value => console.log('Value', value)); this.form.get('firstName').valueChanges .subscribe(firstName => { this.form.get('lastName').setValue(`firstName ${firstName} ${new Date().getMilliseconds()}`); }); } In general - from a user point of view - this behaves as expected. User changes firstName and then lastName changes itself. But when I look at the console log, here is what I've got: lastName firstName test 850 Value > {firstName: "test", lastName: "firstName test 850"} Value > {firstName: "test", lastName: "firstName test 850"} I expected two logs from whole, but one with first name changed, and second with lastName changed. Something more like this: Value > {firstName: "test", lastName: ""} lastName firstName test 850 Value > {firstName: "test", lastName: "firstName test 850"} Here is a whole example on stackblitz. Ok, so when I changed a way I update lastName from this: this.form.get('lastName').setValue(`firstName ${firstName} ${new Date().getMilliseconds()}`); to this: setTimeout(() => this.form.get('lastName').setValue(`firstName ${firstName} ${new Date().getMilliseconds()}`)); then logs are in order which I expected: Value > {firstName: "test", lastName: ""} lastName firstName test 850 Value > {firstName: "test", lastName: "firstName test 850"} However, setTimeout seems to be tricky hack here. Here is whole code on stackblitz. The question is: What is going on here? Why FormGroups works in that way? Is there a pattern to process such events in Angular (when one form affects another)? A: This is how event loop works What's happening in both cases : Without setTimeout User set firstName firstName.valueChanges is added to EventLoop queue EventLoop runs and call operation firstName.valueChanges lastName.setValue is called lastName.setValue add lastName.valueChanges and form.valueChanges to eventLoop queue lastName.valueChanges add form.valueChanges to eventLoop queue lastName.valueChanges is dequeued form.valueChanges (from lastName.valueChanges) is dequeued form.valueChanges (from firstName.valueChanges) is dequeued With setTimeout User set firstName firstName.valueChanges is added to EventLoop queue EventLoop runs and call operation firstName.valueChanges setTimeout(lastName.setValue) is not called but added to the event loop queue firstName.valueChanges adds form.valueChanges to event loop queue setTimeout is dequeued, he sets lastName value and adds lastName.valueChanges to tevent loop queue form.valueChanges (from firstName.valueChanges) is dequeued lastName.valueChanges is dequeued and adds form.valueChanges to event loop queue form.valueChanges (from lastName.valueChanges) is dequeued
null
minipile
NaturalLanguage
mit
null
As a slew of powerful and influential men—from former President George H.W. Bush to MSNBC political analyst Mark Halperin to filmmaker James Toback—are facing hundreds of new sexual assault and harassment accusations in the aftermath of the explosive and horrifying Harvey Weinstein revelations, activists and commentators are increasingly coming to believe that something of a "culture-rattling revolution" is underway, one that many hope will change the way such behavior is perceived, discussed, and addressed in the United States and around the world. "There is Harvey Weinstein-like behavior is every industry. The floodgates are just opening up." —Alex Berg, Buzzfeed"There is Harvey Weinstein-like behavior in every industry," wrote Buzzfeed journalist Alex Berg. "The floodgates are just opening up." "Harvey Weinstein will go down as an historic figure, just not for the reasons he assumed," added Axios's Mike Allen. "His outing as a sexist, dangerous pig triggered an uprising rarely seen: Abused women feel liberated to bring down powerful men in government, media, tech, politics, business and pop culture.... Every sexual predator in every walk of professional life is—and should be—nervous that they will be exposed by this uprising." The feeling that a massive dam has broken has been echoed in recent days by long-time activists, as allegations and accounts of sexual harassment and assault continue to pour in from all angles, seemingly by the hour. SCROLL TO CONTINUE WITH CONTENT Never Miss a Beat. Get our best delivered to your inbox. When asked by MSNBC's Chris Hayes in a segment Wednesay night to characterize the present moment—which has prompted thousands of women to come forward with their experiences in a wide variety of personal and professional contexts—actress and activist Jane Fonda said she believes the U.S. has finally reached "tipping point." "It feels different. It feels like something has shifted," Fonda observed. "It's too bad that it's probably because so many of the women that were assaulted by Harvey Weinstein are famous and white and everybody knows them. This has been going on a long time to black women and other women of color and it doesn't get out quite the same." Prominent feminist Gloria Steinem agreed that a fundamental shift seems to be taking place, but highlighted the fact that there is "still a critical mass of bias in this country" that allows sexist and racist behavior to persist. "If you steal money, you probably get arrested and convicted, because everybody says stealing is wrong," Steinem said. "But if you do something that is very sexist or racist, because there still is a critical mass of bias in this country, it takes more cumulative instances for it to be recognized. So we have reached a tipping point I think."
null
minipile
NaturalLanguage
mit
null
Naga peace accord: India is not our threat, says NSCN(IM) chief New Delhi, Aug 14: The complete details of the Naga peace accord may not still be clear, but leader of the NSCN(IM) Thuingaleng Muivah has indicated that it is an honourable solution accepting the wishes of the people to share sovereign powers. Muivah the Ato Kilonser (prime minister) of the Government of People's Republic of Nagaland (GPRN) is reaching out to all factions and neighbours to ensure that the peace accord works out. He however maintains that the people of Nagaland should not expect a 100 per cent as yet as the accord paves the way for discussions. Sharing of sovereign powers: The exact wordings in the framework agreement reached between the NSCN (IM) and the Government of India reads, "Accordingly both parties have reached an agreement on August 3, 2015 as an honourable solution accepting the wishes of people for sharing the sovereign powers." Muivah maintains that this would broadly mean that both sides will respect each other and the wish of the people to share sovereign powers. It is an understanding that we have reached with the government of India, he says while also adding that framework agreement provides for an inclusive and new relationship of peaceful co-existence. The Nagas must understand it is difficult for the government of India to accept all the demands and we need to understand the difficulties of the Indian government as well. Give and take policy: The NSCN (IM) also spelt out that it is not possible for to expect a 100 per cent out of the framework agreement immediately. It has the set in motion a negotiation process and gradually everything will fall in place. We have understood the difficulties of the Indian government and they ours, the NSCN (IM) chief says. It is a give and take policy and both sides will negotiate. If the government of India has taken a positive approach to the situation then it is our duty to do the same, the leaders also said. Both have decided to work out a solution. Both sides cannot turn their backs on each other now. The negotiations will be carried out with utmost care and all contentious issues will be removed. We cannot afford to go wrong on this as it would hurt us, Muivah also said. Bringing the neighbours on board: The NSCN (IM) chief admitted that brigning the neighbours onboard was crucial. There are issues that are persistent with the neighbours in Assam, Manipur and Arunachal Pradesh. We need to seek out peace with all them through mutual understanding. There is no point in dealing with this situation by means of confrontation. We need to have a peaceful approach and also make our neighbours understand our point of view. He also reiterated that the threat to the Naga people were not the Indians. It is the will of God that we must follow, the leader also said.
null
minipile
NaturalLanguage
mit
null
A ferroelectric memory (FeRAM) which attracts attention as a new memory device in recent years is to read/write information actively utilizing spontaneous polarization characteristics of a ferroelectric thin film, and is expected as an excellent memory which can overcome drawbacks of previous DRAM, SRAM, FLASH memory and the like, in view of volatility, write speed, reliability, cell area and the like. As a ferroelectric material for FeRAM, metal oxide materials such as lead zirconate titanate (PZT, PLZT) and bismuth layer-structure Perovskite ferroelectric (BLSF) have been proposed and studied. Usually, for formation of such a ferroelectric thin film, a film formation method such as a physical vapor deposition method (PVD) such as a sputtering method or a chemical vapor deposition method such as a MOCVD method, or a chemical solution film formation method (solution method) has been proposed. Among them, the solution method is known to be useful to form a ferroelectric thin film most simply at the lowest cost without any special and expensive apparatus required. Further, the solution method has such advantages that the composition can easily be controlled precisely, and that a change in characteristics due to a difference in composition, which is shown in many ferroelectric materials, can be suppressed, and accordingly it is being studied as one of very useful processes for producing a ferroelectric thin film. Preparation of a ferroelectric thin film by the solution method is a process for forming a ferroelectric thin film by coating on a substrate a solution having a metal compound (precursor) of components as a material homogeneously dissolved, drying the resulting coating film, and pre-baking the coating film as the case requires, and then baking the coating film, for example, in the air at about 700° C. or higher temperature to form a thin film of a crystalline metal oxide. As a soluble metal compound as the material, an organic metal compound such as a metal alkoxide or its partial hydrolysate, or an organic acid salt or a chelate complex compound has been commonly used. Further, with respect to a cell structure employing the above FeRAM, several cell structures have been proposed, and practically used at present is a so-called planar structure wherein a ferroelectric capacitor and a transistor are connected with local wiring, having a structure disadvantageous in view of reduction of the cell area i.e. high integration. As a structure which overcomes the above drawback, a stack structure wherein a ferroelectric capacitor is formed on a plug has been proposed, but the reducing atmosphere at the time of formation of multilevel interconnection causes fatal deterioration of characteristics of the ferroelectric thin film. Further, as a structure which overcomes such problems, such a structure has been proposed that after formation of multilevel interconnection i.e. after completion of the logic process, a ferroelectric thin film and a plate line are formed on an outermost layer. In such a structure, a film is formed on a logic circuit, and accordingly the baking temperature at the time of formation of a ferroelectric thin film is required to be decreased to a level of from 400° C. to 450° C. To cope with the above, various means have been proposed to reduce the crystallization temperature also in preparation of a ferroelectric thin film by the solution method. They may, for example, be a method of appropriately controlling the structure of a precursor as shown in e.g. U.S. Pat. No. 5,925,183, a method of preliminarily adding bismuth silicate as a paraelectric to a coating liquid (Ferroelectrics, vol. 271, p. 289 (2002)), a method of using a lead titanate layer as a seed layer (Jpn. J. Appl. Phys., vol. 35, p. 4,896 (1996)), selection of a proper substrate (J. Am. Ceram. Soc., vol. 75, p. 2,785 (1992)) and a vacuum annealing method (Jpn. J. Appl. Phys., vol. 38, p. 5,346 (1999)). However, reduction of the baking temperature in such conventional methods is limited to a level of 550° C. Accordingly, heretofore, formation of a ferroelectric thin film on a logic circuit which is required for high integration has been considered practically difficult in a case of the solution method. Further, it has been attempted to form a thin film by using a composition wherein fine ferroelectric particles coexist with a soluble metal salt (Jpn. J. Appl. Phys., vol. 41, p. 6,969 (2002)). However, since the fine ferroelectric particles are particles obtained by long term mechanical grinding, crystallinity or the like of the particles tends to decrease, and no desired chrematistics have been obtained.
null
minipile
NaturalLanguage
mit
null
Inhibition of JNK by HGF/SF prevents apoptosis induced by TNF-alpha. We investigated whether repression of JNK by hepatocyte growth factor/scatter factor (HGF/SF) in MDCK epithelial cells is linked to its ability to protect cells from apoptosis. To this purpose, cells were treated by TNF-alpha, a well-known inducer of JNK and of cell death, and the effects of HGF/SF were investigated under these conditions. We identified repression of JNK as a signaling target of HGF/SF for protection against TNF-alpha-induced cell death. This effect of HGF/SF occurs via the activation of the PI3K and MEK1 pathways.
null
minipile
NaturalLanguage
mit
null
--- abstract: 'Several recent papers have suggested that the cosmological constant $\Lambda$ directly influences the gravitational deflection of light. We place this problem in a cosmological context, deriving an expression for the linear potentials which control the cosmological bending of light, finding that it has no explicit dependence on the cosmological constant. To explore the physical origins of the apparent $\Lambda$-dependent potential that appears in the static Kottler metric, we highlight the two classical effects which lead to the aberration of light. The first relates to the observer’s motion relative to the source, and encapsulates the familiar concept of angular-diameter distance. The second term, which has proved to be the source of debate, arises from cosmic acceleration, but is rarely considered since it vanishes for photons with radial motion. This apparent form of light-bending gives the appearance of curved geodesics even within a flat and homogeneous universe. However this cannot be construed as a real lensing effect, since its value depends on the observer’s frame of reference. Our conclusion is thus that standard results for gravitational lensing in a universe containing $\Lambda$ do not require modification, with any influence of $\Lambda$ being restricted to negligible high-order terms.' author: - Fergus Simpson - 'John A. Peacock' - 'Alan F. Heavens' bibliography: - 'M:/Routines/dis.bib' title: On lensing by a cosmological constant --- Conventional wisdom (e.g. [@1983PhLA...97..239I; @2006astro.ph..1044F]) states that the cosmological constant plays no direct role in gravitational lensing, other than the inevitable modification to the angular diameter distance. This is reinforced by the intuition that lensing is sourced by inhomogeneities in the density field, whereas the cosmological constant is wholly uniform. This position was challenged by Rindler & Ishak [@2007PhRvD..76d3006R], who presented a term associating the cosmological constant with a diminished bending angle for a photon. This was followed by a further two papers [@2007arXiv0710.4726I; @2008arXiv0801.3514I] analysing this phenomenon in greater detail. Indeed the former claims to place observational constraints on the value of $\Lambda$ based on applying this result to strong lensing by clusters, in a ‘Swiss-cheese’ model, where the matter in a spherical vacuole collapses to the centre to form the lensing object. Although the effects are relatively small, they are certainly large enough to be important in next-generation applications of lensing as a tool for precision cosmology. However, opinion seems divided as to whether the Ishak-Rindler analysis is correct: Park [@2008arXiv0804.4331P] and Khriplovich & Pomeransky [@2008arXiv0801.1764K] have shed doubt on these calculations, although Schücker , and Lake [@2007arXiv0711.0673L] are in agreement. Work by Gibbons et al. [@GibbonsWerner] explore the properties of the Kottler optical metric, while Sereno [@2008PhRvD..77d3004S; @2008arXiv0807.5123S] revealed a different term contributing to the deflection angle. In this work we aim to clarify the source of these discrepancies and to investigate the bending of light in an expanding Universe. In §\[sec:vac\], we translate the metric inside a vacuole from the static Kottler [@1918AnP...361..401K] form to a perturbed Friedmann-Robertson-Walker (FRW) metric. We do not exclude a contribution of $\Lambda$ to the lensing equations at some level, but show that the linear potential is unaffected by $\Lambda$, with the apparent $\Lambda r^2/3$ contribution appearing as a consequence of the choice of a static metric. We verify this with numerical solutions in §\[sec:numerics\]. The remainder of this work aims to clarify the physical interpretation of the apparent light bending. We revisit the analysis of Ishak [@2008arXiv0801.3514I] in §\[sec:angles\], before extending this to evaluate the photon’s deflection angle from different perspectives within the Kottler metric. The source of the extra term is revealed in §\[sec:origins\], and its relation to the angular-diameter distance is outlined in §\[sec:worked\]. Final discussions are presented in §\[sec:conc\]. \[sec:vac\] We now consider the Ishak–Rindler vacuole from the point of view of the standard approach to cosmological perturbations, as described by e.g. Dodelson [@2003moco.book.....D] or Mukhanov [@2005pfc..book.....M]. Our goal is to find an explicit linear expression for the perturbing potentials responsible for the cosmological bending of light within the vacuole model. In order to avoid coordinate-dependent artefacts, one looks for gauge-independent measures of inhomogeneity; in practice, this is achieved by working in the Newtonian gauge. Scalar metric fluctuations are then described by scalar potentials, $\Phi$ and $\Psi$, which act to modify the Robertson–Walker metric: $$ds^2 = (1+2\Phi)\, dt^2 - a^2(t)\, (1-2\Psi)\, (d\chi^2 + \chi^2 d\psi^2).\label{eq:FRW}$$ We take $c=G=1$ throughout. $\chi$ is comoving radius, and $d\psi$ is an element of angle on the sky. We also restrict attention to the case of a flat universe, and no anisotropic stresses, so that $\Psi=\Phi$. We will always be interested in the case where the fluctuations causing lensing are well within the horizon, in which case the potential $\Phi$ obeys the Poisson equation, sourced by the fractional matter fluctuation $\delta_m$. In this apparatus, a homogeneous density from $\Lambda$ appears only implicitly, through its contribution to the scale factor $a(t)$. Conventionally, light deflection would be computed by integrating twice the component of $-{\bf\nabla}\Phi$ perpendicular to the line of sight, and the conclusion would be that $\Lambda$ has no direct lensing effect. Clearly this is true in a homogeneous universe that contains $\Lambda$, since the FRW metric defines the path of unperturbed light rays. Indeed, no true lensing can arise from a homogeneous background: the photon would require a preferential direction in which to bend – and doing so would break the symmetry of the cosmology. How does the perturbed FRW metric compare with the exact Kottler metric inside the vacuole? The comparison can only be made if we understand the relation between the coordinates used in the two forms. The key to doing this is the transverse part of the metric, which would be $-r^2 d\psi^2$ in the Kottler form: $$ds^2 = f(r)\, dT^2 - f(r)^{-1} dr^2 - r^2 d\psi^2,$$ for some time coordinate $T$, and where $$f(r) = 1 -{2m\over r} -{\Lambda r^2\over 3}.\label{eq:Kottler}$$ This means that the proper radius in the perturbed FRW form is, to first order in $\Phi$, $$r \equiv (1-\Phi) a(t) \chi, \label{eq:perturbed}$$ and the metric is $$ds^2 = (1+2\Phi)\, dt^2 - a^2(t)\, (1-2\Phi)\, d\chi^2 - r^2 d\psi^2.$$ In order to eliminate $d\chi$, we must differentiate the definition of $r$. To first order in $\Phi$, this gives $$a^2(1-2\Phi)d\chi^2 = \left[ (1+\chi \Phi')\, dr - Y\, dt\right]^2,$$ where $Y\equiv \dot a\chi(1-\Phi) - a\chi\dot\Phi + \dot a \chi^2 \Phi'$, where we have defined $\Phi' \equiv {\mathrm{d}}\Phi / {\mathrm{d}}\chi$ and $\dot\Phi \equiv {\mathrm{d}}\Phi / {\mathrm{d}}t$. Note that we always work to first order in the perturbation, so that e.g. $(1-\chi \Phi')^{-1}$ can be replaced by $(1+\chi \Phi')$. Note also that differentiating the definition of $r$ introduces $\dot a$: $\Lambda$ enters at this point, since it is related to $\dot a$ via the Friedmann equation. In order to eliminate the $dr\, dt$ cross term, we define the time coordinate $dT = A\, dt + B\, dr$, and solve for $A$ and $B$ by requiring that the metric be written in the desired Kottler form, $$ds^2 = f(r)\, dT^2 - f(r)^{-1} dr^2 - r^2 d\psi^2.$$ Solving this problem as written gives $$f = { 1+2\Phi - Y^2 \over (1+\chi \Phi')^2(1+2\Phi) }.$$ To first order in $\Phi$, our expression for $f$ is $$\eqalign{ f = 1 &-2\chi\Phi' - \dot a^2\chi^2 (1-4\Phi - 2\chi\Phi') \cr &+2 \dot a a\chi^2\dot\Phi -2 \dot a^2 \chi^3 \Phi' \cr = 1 &-2\chi\Phi' - \dot a^2\chi^2 \left[1-2\Phi \left(\frac{\partial \ln |\Phi|}{\partial \ln a}+2\right)\right]. }\label{eq:main}$$ We proceed initially by ignoring the terms proportional to $\Phi$ in the square brackets, in comparison to unity. This is justified because the vacuole should be small compared with the Hubble length: $\dot a \chi \ll 1$. Thus, $\dot a^2\chi^2\Phi$ will be negligible in comparison with $\chi \Phi' = \Phi (\partial\ln \Phi/\partial\ln \chi)$. We show below that this assumption yields a consistent solution for $\Phi$, with the neglected term shown to be second order. In practice, therefore, the perturbed FRW metric reduces to the Kottler form with $$f = 1-2\chi\Phi' - \dot a^2\chi^2.$$ The Kottler metric is expressed in terms of $r=(1-\Phi)a(t)\chi$, but we have already treated $\dot a^2\chi^2\Phi$ as negligible in deriving this expression for $f$, so the same level of approximation allows us to set $r=a(t)\chi$ here: $$f = 1-2r\Phi'/a - (\dot a^2/a^2)r^2.$$ The Friedmann equation says that $$\dot a^2/a^2 = \Lambda/3 + 2m/R^3,$$ where $R=a(t)R_v$ is the proper radius of the vacuole of fixed comoving radius $R_v$. Using this and the Kottler metric yields $$f = 1-2r\Phi'/a -2mr^2/R^3 - \Lambda r^2/3.$$ Note that the Friedmann equation has yielded a term $- \Lambda r^2/3$, which will cancel the corresponding term in the Kottler expression for $f(r)$. Recalling that $\Phi'$ denotes the derivative of $\Phi$ with respect to comoving radius, we solve this using the Kottler form for $f(r)$, equation (\[eq:Kottler\]), which requires $$\Phi' = a\left({m\over r^2} - {mr\over R^3}\right) = {m\over a\chi^2} - {m\chi\over aR_v^3},$$ where again the error in writing $r=a(t)\chi$ is of second order in $\Phi$. The solution is $$\Phi =-{m\over a\chi} - {m\chi^2\over 2 a R_v^3} + {3m\over 2 a R_v} = -{m\over r} - {mr^2\over 2R^3} + {3m\over 2R} , \label{solution}$$ where the additive constant is determined by requiring $\Phi=0$ at the boundary of the vacuole. This expression for $\Phi$ agrees with what one would expect from a simple Newtonian calculation with a point mass and a spherical vacuole underdensity. We can dispose of the technical issue that for a point mass, $\Phi \rightarrow -\infty$ as $\chi\rightarrow 0$, by considering a spherical mass of finite radius, and appealing to Birkhoff’s theorem so that our solution for $\Phi$ applies in the vacuole outside the mass. To verify that we have a consistent linear solution for $\Phi$, we note that $\partial\ln|\Phi|/\partial \ln a=-1$, and substitution into (\[eq:main\]), retaining the full relation (\[eq:perturbed\]) to linear order in $\Phi$, gives a complete cancellation of the $\Lambda$ terms: $$\Phi' = \frac{m}{a\chi^2} - {m\chi\over a R_v^3} + \Phi\left({m\over a \chi^2} + {2m \chi\over a R_v^3}\right).$$ The last term on the right, which we neglected, is indeed seen to be second-order in $\Phi$. Having now described the vacuole metric as a perturbed FRW metric, we find no evidence for $\Lambda$-dependence in the linear peculiar gravitational potential, and the standard cosmological lensing results follow. The potential-like term $\Lambda r^2/3$ in the Kottler $f(r)$ arises simply by virtue of the introduction of $\dot a$ in the coordinate transformation from the FRW form, plus the fact that $\dot a$ is related to $\Lambda$ through the Friedmann equation. But this term does not arise from the true potential $\Phi$, and thus it should not be taken to cause lensing. From this point of view, it seem fair to assert that the appearance of a lensing effect from $\Lambda r^2$ in the Ishak–Rindler analysis is purely a gauge artefact. Our expression for the potential $\Phi$ is correct only to lowest order, and we have neglected corrections of order $(H^2r^2)\Phi$. Nevertheless, it is clear that the disputed $\Lambda r^2/3$ term is of an altogether larger magnitude. In most of the volume of the vacuole, $r\sim R$ and $\Phi \sim m/R$. The ratio between the disputed term and $\Phi$ is then $\sim \Lambda R^3/m$, which is of order the ratio between the vacuum and matter densities – i.e. an order unity correction at the present epoch. While $\Lambda$ may appear in higher order corrections to $\Phi$, it is clear that such corrections cannot involve a $\Lambda r^2/3$ term in the potential. \[sec:numerics\] We now derive expressions for the linear peculiar gravitational potential for a spherical vacuole in a universe containing arbitrary densities of non-relativistic matter and a cosmological constant, in which the mass $m$ in the vacuole is concentrated at the centre. Otherwise, the universe is assumed to be homogeneous and isotropic. The perturbed FRW metric is written in the Newtonian gauge as $$ds^2 = (1+2\Phi) dt^2 - a^2(t)(1-2\Phi)[d\chi^2 + S_k^2(\chi)d\psi^2]$$ where $S_k(\chi)=R_0 \sin(\chi/R_0), \chi, R_0\sinh(\chi/R_0)$ for $k=1,0,-1$, and $R_0 = (1/H_0)\sqrt{k/(\Omega-1)}$. We wish to find $\Phi(\chi,a)$ by coordinate transformation from the known Kottler metric (\[eq:Kottler\]) in terms of static coordinates $r$ and time coordinate $T$. Equating the coefficients of $d\psi^2$ gives (working always only to linear order in $\Phi$) $$r(\chi,a) = a(t)(1-\Phi)S_k(\chi).$$ We also have $T=T(\chi,a)$ and hence $dT = T_t dt + T_\chi d\chi$ where $T_t = \partial T/\partial t$ etc. Substitution into the Kottler metric (\[eq:Kottler\]), equating coefficients of $dt^2$, $d\chi^2$ and $dt d\chi$, eliminating $T_t$ and $T_\chi$ gives $$r_\chi^2 (1+2\Phi) - a^2(1-2\Phi)r_t^2 - a^2 f(r) = 0.$$ Since $$\begin{aligned} r_\chi &=& a(1-\Phi)C_k - a \Phi_\chi S_k\nonumber\\ r_t &=& \dot a (1-\Phi)S_k - a \Phi_t S_k,\end{aligned}$$ where $C_k(\chi) \equiv \cos(\chi/R_0), 1, \cosh(\chi/R_0)$ for $k=1,0,-1$, we obtain (to $O(\Phi)$), $$1 - \frac{2m}{a S_k }(1+\Phi) - \frac{a^2\Lambda S_k^2}{3}(1-2\Phi) = C_k^2 - 2 \Phi_\chi S_k C_k - \dot a^2 S_k^2 (1-4\Phi) + 2\dot a^2 a S_k^2 \Phi_a.$$ Since $1-C_k^2 = k S_\chi^2 /R_0^2$, we have the equation for $\Phi(\chi,a)$: $$\eqalign{ \Phi_\chi = \frac{S_k}{C_k}\left[\frac{-k}{2 R_0^2} - \frac{\dot a^2}{2}(1-4\Phi-2a \Phi_a) + \frac{m}{a S_k^3}(1+\Phi) + \frac{\Lambda a^2}{6}(1-2\Phi)\right].}$$ Substituting Friedmann’s equation $\dot a^2/a^2 = 8\pi \rho_m/3 + \Lambda /3-k/(a^2 R_0^2)$ gives $$\Phi_\chi = \frac{S_k}{C_k}\left[- \frac{4\pi m}{3 V_b a}(1-4\Phi-2a \Phi_a) + \frac{m}{a S_k^3}(1+\Phi) + \left(\frac{\Lambda a^2}{3} - \frac{k}{R_0^2}\right)(\Phi+a\Phi_a)\right],$$ ![The potential $a\Phi(\chi/\chi_b,a)$ of an open universe, with $\Omega_m=0.27, \Omega_\Lambda=0$. Here we have taken the vacuole size to be $\chi_b=0.1$.[]{data-label="fig:matter"}](kot1.eps){width="80mm"} ![The difference between the matter-only potential presented in Figure \[fig:matter\], and that of a cosmology with both matter and a cosmological constant: $\Omega_m=0.27$, $\Omega_\Lambda=0.27$ .[]{data-label="fig:difference"}](kot2.eps){width="80mm"} where the comoving volume of the vacuole in terms of its boundary coordinate $\chi_b$ is given by $$V_b = \pi R_0^3 \left[ \sinh \left( \frac{2 \chi_b}{R_0} \right) - \frac{2 \chi_b}{R_0} \right] ,$$ resulting in a vacuole of mass $$m = \frac{3 V_b \Omega_m h^2}{8 \pi} .$$ Note that when modifying the cosmological parameters such that $R_0$ changes, we iteratively adjust the vacuole radius $x_b$ in order to maintain a constant enclosed mass $m$. Figure \[fig:matter\] shows Mathematica solutions for $a\Phi$ against $\chi/\chi_b$ (plotted from 0.1 to 1) and $a$ (plotted from 0.5 to 1) for $\Omega_m=0.27$ and $\Omega_\Lambda=0$, with $\chi_b = 0.1 c H^{-1}_0$. The leading-order term is given by $$\Phi(r) \simeq - \frac{m}{r} .$$ When introducing a contribution from the cosmological constant, Ishak & Rindler predict a change in the potential given by a new term $$\eqalign{ \Phi_{\Lambda}(r) & = - \frac{\Lambda r^2}{12} \cr &= - \Omega_\Lambda h^2 \frac{(r-r_b)^2}{4} , }$$ where the $r_b$ term arises due to the boundary condition imposed at the edge of the vacuole. For a cosmology with $\Omega_\Lambda=0.27$ this leads us to predict $\Phi_\Lambda(r_b/2) = -1.7 \times 10^{-4}$, where we have adopted $r=r_b/2$ as the benchmark value. However the signal in Figure \[fig:difference\] is more than two orders of magnitude smaller than this, an amplitude consistent with the $O(\Phi^2)$ terms we discarded earlier. In the following sections we will explore why the Ishak-Rindler term does not manifest itself in the potential. \[sec:angles\] Now let us see how the above section can be made consistent with the Ishak and Rindler computation of deflection within a static Kottler metric. We begin by reassessing the treatment outlined by Ishak [@2008arXiv0801.3514I], which relies on superposing two metrics, and applying classical Newtonian dynamics, a valid approximation provided we restrict ourselves to the weak field regime. For a flat universe consisting of non-relativistic matter and a cosmological constant, its evolution may be well described by an appropriate choice of potential. This was applied by Ishak [@2008arXiv0801.3514I] to evaluate the deflection angle of a photon by considering the gradient of the Newtonian potential. $$\label{eq:delf} \alpha = \int \nabla_\bot (\Phi + \Psi) \, {\mathrm{d}}x ,$$ where we integrate along the path of the photon. The potentials $\Phi$ and $\Psi$ are extracted from the space and time components of the metric, and differ from the FRW potentials in equation (\[eq:FRW\]). Ishak superposes the Schwarzschild and de-Sitter metrics in static coordinates, $$d s^2 = \left(1+2\Phi\right) d t^2 - \left( 1-2\Psi\right) \left( d r^2 + r^2 d \Omega^2\right)$$ leading to the potentials (see eg [@2003CQGra..20.2727K; @2008arXiv0801.3514I]). $$\label{eq:potentials} \eqalign{ \Phi \simeq - \frac{m}{r} - \frac{\Lambda r^2}{6} , \cr \Psi \simeq - \frac{m}{r} + \frac{\Lambda r^2}{12}.}$$ The mass terms are only an approximation, but are accurate to first order provided $m/R \ll 1$. It is the terms involving the cosmological constant to which we will pay the greater attention. In the frame of the lens, the gradients of the potentials are $$\label{eq:alpha1} \eqalign{ \nabla_\bot \Phi &= \frac{mR}{r^3} - \frac{\Lambda R}{3} ,\cr \nabla_\bot \Psi &= \frac{mR}{r^3} + \frac{\Lambda R}{6} . }$$ Therefore a photon passing within a distance $R$ becomes deflected by $$\eqalign{\alpha & = \int_{-x_b}^{x_b} \nabla_\bot (\Phi + \Psi) \, {\mathrm{d}}x \cr & = \left(\frac{4M}{R}-\frac{\Lambda R r_b}{3} \right) \sqrt{1 - R^2/r_b^2}} \label{eq:alpha2}$$ where $r=\sqrt{R^2+x^2}$, and $r_b$ is the radius of the vacuole. This result corrects for the discontinuity which arises at the boundary $R=r_b$ from Ishak [@2008arXiv0801.3514I]. ![The weak gravitational lensing of light by a vacuole, where all matter within a sphere of radius of radius $r_b$ is collected to a central mass. The observer is located at $O$.[]{data-label="fig:fig1"}](fig1ps.eps){width="80mm"} From (\[eq:alpha2\]), the first term within the parentheses is readily recognisable as the conventional result for gravitational lensing. However it is the second term which is of greater interest. Why does the cosmological constant now appear to reduce the value of $\alpha$? Part of the reason is that, unlike the mass $m$, the cosmological constant has a potential which appears centred on whichever frame we choose. If the potential associated with the cosmological constant is now centred on the observer at $O$, then for the limit of a very weak lens the photon’s motion is purely radial, with no component perpendicular to the potential’s gradient, and thus the integral in (\[eq:alpha2\]) trivially vanishes. Yet we have not fully resolved the anomaly, since for non-negligible deflection angles, the photon’s path *does* have a transverse component before reaching the lens, as illustrated in Figure \[fig:fig1\]. Note however that the observable, $\theta$, remains constant. If the conventional deflection angle induced by the matter in the lens, $\alpha_m$, is small, then our modified deflection angle requires the inclusion of an extra term given by $$\eqalign{ \alpha_\Lambda & = \int_{0}^{r_S} \nabla_\bot (\Phi + \Psi)\, {\mathrm{d}}x \cr & = \int_{0}^{r_S} \nabla_\bot (-\frac{\Lambda r^2}{6} + \frac{\Lambda r^2}{12})\, {\mathrm{d}}x \cr & = \int_{r_L}^{r_S} -\frac{\Lambda}{6} r \sin \phi \,{\mathrm{d}}x \cr & = \int_{r_L}^{r_S} -\frac{\Lambda}{6} r_L \sin \alpha_m\, {\mathrm{d}}x \cr & \simeq - \frac{\Lambda}{6} \sin \alpha_m\, r_L (r_S - r_L) ,} \label{eq:final}$$ where $r_L$ and $r_S$ are the distances to the lens and source respectively. The angle between the observer’s line of sight and the path of the photon is denoted by $\phi$, and we have used $r \sin \phi = r_L \sin \alpha_m$. To clarify, $\alpha_\Lambda$ corresponds to the extra angle through which the photon appears to be deflected when tracking its motion in a physical coordinate system in the frame of $O$. The local deflection $\alpha_m$ occurs at the closest approach to $L$, while the extra $\Lambda$ contribution is a cumulative effect. The $\Lambda$-dependent terms given in (\[eq:alpha2\]) and (\[eq:final\]) appear particularly problematic since they do not vanish when the lensing mass is taken to be zero. Ordinarily the local deflection $\sin \alpha_m$ would vanish, yet it could equally have been a mirror we used to deflect the photon, maintaining a non-zero $\alpha_m$ in an otherwise pure de Sitter universe. ![A comparison of a photon’s path in different flat cosmologies, using the physical distances from the perspective of the observer at the origin. The lens $L$ and source $S$ appears at the same angular-diameter distance in all cases, and the true deflection angle is taken to be $\alpha=1^\circ$. The lines correspond to de Sitter ($\Omega_\Lambda=1$, dotted), Einstein-de Sitter ($\Omega_m=1$, dot-dash), and the neutral $w=-1/3$ cosmology ($\Omega_m=2/3$, $\Omega_\Lambda=1/3$, solid).[]{data-label="fig:coords"}](fig2ps.eps){width="80mm"} How can we reconcile this modified deflection angle with the concept that light travels in straight lines within FRW models? The difference is highlighted in Figure \[fig:coords\] where we see the influence of our coordinate system. The lines plotted in Figure \[fig:coords\] have a physical interpretation as those which would be marked on a sheet of graph paper centred on the observer. Aside from the deflection, the photon follows a Euclidean trajectory in comoving space, since the geometry is conformally flat. However when we map this trajectory onto a coordinate system with proper distances – that measured by a ruler – the transverse motion of a photon appears bent by the acceleration of the cosmology, and the deflection angle induced at $L$ appears to change. Yet the observable angle $\theta$ remains constant, as does the deflection angle for a set of comoving observers, since we have fixed the angular diameter distances. Note that in de Sitter space, the same distance corresponds to a substantially lower redshift, so the magnitude of the apparent bending is reduced. Now we quantify the relation between the angle in a comoving coordinate system, and that observed in terms of proper distances. Consider a photon at a comoving coordinate $(x,y)$ travelling at a small angle $\alpha$ with respect to the radial direction (which we take to be the $x$-axis, so $y=0$). The proper distance of the photon, and its derivative with respect to the scale factor, is given by $$\eqalign{ x_p &= a x \cr x_p' &= x + ax' }$$ and similarly for $y$. The angle of the trajectory in terms of comoving and proper distances is given by $$\eqalign{ \tan \alpha &= \frac{y'}{x'} , \cr \tan \alpha_p &= \frac{y+ay'}{x + ax'} .}$$ To first order in $x /ax'$ this leads to $$\eqalign{ \tan \alpha_p &= \frac{y'}{x'} - \frac{y'x}{ax'^2} \cr &= \left(1-\frac{x}{ax'} \right) \tan \alpha .}$$ Note that for $\alpha = 0$ then $\alpha_p= 0$, and as we expect, radial trajectories remain radial in terms of proper distances. This may be simplified to leave $$\tan \alpha_p = \left(1 - r\frac{da}{dt}\right) \tan \alpha ,$$ For a homogeneous cosmology with equation of state $w$ then this may be expressed as $$\tan \alpha_p = (1 - rH_0 a^{-\frac{1+3w}{2}}) \tan \alpha ,$$ highlighting the significance of $w=-1/3$, which corresponds to a cosmology with zero acceleration. The photon trajectories plotted in Figure \[fig:coords\] appear distorted as a result of the aforementioned coordinate transformation. However we stress that any observable such as $\theta$ will remain unaltered, since only distant motion with some transverse component may be affected. The deflection angle is modified, as given by (\[eq:final\]), yet remains unobservable since we cannot measure the angle of emission. We consider the physical interpretation of these results in the following section. \[sec:origins\] To illustrate the meaning of this bent trajectory, consider a photon reflecting off the interior walls of a box of proper size $\ell$ within a de Sitter background. In the frame of the box the photon simply bounces back and forth, only subject to a small degree of blue- and red-shifting depending on which side of the box we sit. Yet for an observer located at a distance $y$ transverse to this motion, as illustrated in Figure \[fig:box\], both the box and photon must appear to be accelerated. This can be thought of in terms of an angular aberration, which to first order in $v$ and $\theta$ is given by $$\label{eq:aberr} \theta' = \theta(1+v_x) + v_y ,$$ where $v_x$ and $v_y$ denotes the vertical and horizontal velocities of the frame of $S'$ with respect to $S$, and the photon is travelling in the positive $x$ direction. The proper distance $y$ is simply related to the comoving coordinate $\chi$ by $$\label{eq:comove} y(t) = \chi a(t) .$$ While the value of $\chi$ between two points remains fixed, our distance $y$ changes at a rate governed by the Friedmann equations. $$\eqalign{ \ddot{y} &= \chi \ddot{a} \cr &= \chi a \left(-\frac{4 \pi \rho_m}{3} + \frac{\Lambda}{3} \right) . }\label{eq:comove2}$$ \[fig:box\] ![The bending of a photon trajectory in the absence of any lensing mass, in de Sitter space. To begin on the left we sit in the frame of a reflective box and observe the photon bouncing back and forth. The central illustration shows the appearance of the same box now receding from some displaced viewpoint. As the box accelerates in de Sitter space, the angle of incidence must enlarge to match this, giving the illusion of lensing. This demonstrates the main problem associated with measuring the deflection of light in the rest frame of the lens.](box.eps "fig:"){width="80mm"} For de Sitter space $\rho_m = 0$ and so $v_y = Hy$. Therefore at the first bounce the photon appears to have a trajectory given by $$\label{eq:aberr2} \theta' = \sqrt{\frac{\Lambda}{3}} \chi ,$$ but accumulates an additional vertical velocity after travelling a distance $\ell$ across the width of the box, $$\label{eq:comove3} \eqalign{ v_y & = v_0 + \int \ddot{y}\, {\mathrm{d}}t \cr &= \sqrt{\frac{\Lambda}{3}} \chi + \frac{\Lambda \ell \chi}{3} ,}$$ provided $v \ll c$ and $\ell \ll \chi$. The photon’s angle of incidence exceeds the angle of the previous bounce, and this is interpreted as a bend angle of $$\label{eq:comove4} \alpha_\Lambda = \frac{\Lambda \ell \chi}{3}.$$ This deflection is actually an angular aberration arising from acceleration, due to the change in velocity attained by a freefalling body at a distance $\chi$. Note that the term relates to that in (\[eq:alpha2\]), but here the bend angle has been defined as positive since in this case the photon is receding from the observer. The analogy here is that one side of the box is the source, the other side the observer, and the reference frame is the lens (which in this case is massless). In the frame of the box - be it source or observer - no deflection is observed, yet the lens frame shows this anomalous bending. Switching between different inertial frames therefore leaves us with an angular aberration associated with the relative velocity between the two frames. But of what physical significance are the aberrations? They are “real" angles in the sense that if a physical tube were to be constructed down which light could be shone over cosmological distances, it would need to be bent in this manner. However it would also be in a non-inertial reference frame, as the tube would need to be continuously accelerated in order to counteract the gravitational forces which would otherwise have led to it joining the Hubble flow. Therefore locally it would appear that the photon is travelling straight while the bent physical structure is accelerated in just the right manner so as to allow the photon to pass. Despite the temptation to consider the intuitive physical coordinates, this example illustrates that it is much more natural to think in terms of a comoving framework, such that a fixed point corresponds to an appropriate inertial reference frame. Recently Sereno [@2008arXiv0807.5123S] highlighted the presence of an additional term given by $2mb\Lambda/3$. In contrast to the aberration terms outlined above, which appear to reduce the deflection angle due to cosmic acceleration, this increases the deflection angle due to the cosmic expansion rate. In the Appendix we present a heuristic approach that provides a physical interpretation of the Sereno term. Essentially any transverse motion by the lens will modify the deflection angle, due to the time-dependent impact parameter. This term is found to be consistent with the motion associated with the cosmological expansion. One might worry that peculiar velocities may modify the cosmic shear signal via this mechanism, though this contribution has been shown to be too small to be of concern [@2008arXiv0810.0180B]. \[sec:worked\] ![Photons from sources $A$ and $B$, located at either end of a rigid body of length $R$, propagate to the observer $O$ at a proper distance $r$ in de Sitter space. As viewed from the reference frame of $O$ (top-right), A (bottom-left), and B (bottom right). The top-left panel illustrates the configuration at the time of emission. Note that from the perspective of the observer, the distance traversed by the photons does not match the source-observer separation. $r$.[]{data-label="fig:worked"}](fig3ps.eps){width="80mm"} We have already established the angle at which the photon appears to impact an observer, from a distant perspective. Now we assess the relative appearance of a more physically meaningful angle, the path crossing of two photons. The setup involves two sources $A$ and $B$ separated by a fixed distance $R$, and an observer $O$ at a distance $r/(1+z) \gg R$. Therefore the initial angle of interest is $\theta_i = R(1+z)/r$, as illustrated in Figure \[fig:worked\]. By the time the photon reaches $O$, the physical angle separating the bodies is $\theta_f = R/r$. Consider the angle of incidence as determined by the source at $B$ (bottom-right panel). In the time taken for the photon to travel the distance $r$, the photon from $A$ acquires a vertical velocity, leading to a bending angle such that $$\label{eq:std} \theta_B = \theta_f - \frac{\Lambda R r}{3},$$ From the perspective of $A$, its own photon now appears straight yet the photon from $B$ is deflected, and by symmetry we have $\theta_A = \theta_B$. The relative motion of the comoving observer is $$v_x= \sqrt{\frac{\Lambda }{3}} r ,$$ so once again by utilising (\[eq:aberr\]) we arrive at $$\eqalign{ \theta_O & = \theta_f (1 + v_x) \cr & = \theta_f \left(1 + \sqrt{\frac{\Lambda }{3}} r \right) \cr & = R (1+z) /r , }$$ where the redshift $z$ represents the horizontal recession velocity. So we recover the expression for the angular-diameter distance. Alternatively, consider an observer on $A$ studying the angle at which a telescope on $O$ is pointing in order to detect the source at $B$. What angle must the telescope be pointed in order to let the photon pass? The Lorentz contraction of the telescope actually increases its apparent inclination, though this is an $O(v^2)$ effect. The problem is resolved simply by the motion of the telescope, which allows the photon to pass at an angle of approximately $\theta_t=\theta_p (1+v)$. This process provides a alternative picture of how the factor of $(1+z)$ arises in the angular-diameter distance. \[sec:strong\] As an aside, since we have been considering the limit of a weak field, let us address the stronger regime. If $\Lambda$ were to modify the deflection of light, this would be expected to become most apparent in a scenario were the length scales involved exceeded the event horizon, $r_\Lambda = \sqrt{3/\Lambda}$. Naturally the Source-Observer distance is restricted to a sub-horizon scale, but suppose a mass was positioned with a large transverse displacement $R$, beyond the event horizon. One might be tempted to believe that, for reasons of causality, the event horizon “shields" the photon from the distant mass, thereby nulling the lens. This is evidently not the case, as the Kottler metric is still valid for the regime $r>\sqrt{3/\Lambda}$, in much the same way as a black hole gravitates beyond its event horizon. Causality is preserved since no information is transmitted – for instance any gravitational waves emitted by the mass will remain confined within the horizon. Reassuringly, this scenario also suggests that in the context of gravitational lensing, no terms involving $\Lambda r^2$ arise. \[sec:conc\] In this work we have placed light bending by a spherically symmetric mass distribution with Lambda into a cosmological context, and attempted to reconcile the apparent bending of light as described in , with the conventional view that the cosmological constant does not directly influence gravitational lensing. To confirm that the cosmological constant does not contribute at linear order to the deflection of light by a density fluctuation, we explicitly transformed a perturbed FRW metric into the Kottler metric. In the former metric, the linear lensing potential has no explicit dependence on $\Lambda$, so the $\Lambda$-dependent bending claimed to exist in the Kottler metric appears to be a gauge artefact, with no direct implications for observations. The source of explicit $\Lambda$-dependence primarily arises by adopting physical distances to define the angles, and doing so in the frame of reference of the lens rather than the observer merely exacerbates the problem. Whilst physical scales provide an intuitive picture of the photon’s trajectory, it fails to take into account the relative motion between local and distant comoving observers, and the frame-dependence of the metric. Terms involving $\Lambda r^2$ essentially arise from measuring the photon’s trajectory within a non-inertial frame of reference – that of a particular physical coordinate, within the context of an accelerating cosmology. This effect should therefore be considered distinct from genuine gravitational lensing effects, where the deflection angle is gauge invariant. Broadly, we are in agreement with the analyses of Sereno [@2008PhRvD..77d3004S; @2008arXiv0807.5123S] in concluding that at linear order, there is no influence of Lambda on light bending. Indeed, for light bending on cluster scales, Sereno [@2008arXiv0807.5123S] shows that the influence of Lambda on the bend angle is third-order in the two mass- and Lambda-related small quantities he introduces (of comparable size for clusters). This term is several orders of magnitude smaller than second-order mass terms which are routinely neglected. Of course, the cosmological constant does still influence the lens geometry, and it is primarily this modification to the distance-redshift relation which allows weak lensing surveys to constrain dark energy models. Our belief is that this application can proceed without requiring modification of the basic lensing theory. [**Acknowledgements**]{}\ FS was funded by an STFC rolling grant, and is grateful for the generous welfare support from the University of Edinburgh. We particularly thank Wolfgang Rindler and Mustapha Ishak for many stimulating discussions. \[sec:app\] In the case of Newtonian Gravitational Lensing, we can evaluate the deflection angle of a particle of arbitrary velocity by considering the integrated force perpendicular to the direction of motion. Consider a particle of horizontal motion $v_x=v$ and initial vertical motion $v_y=0$. After passing a gravitating mass the particle accrues a vertical velocity determined by $$v_y = \int F_y {\mathrm{d}}t ,$$ where $$F_y = \frac{GM}{r^2} \sin{\theta} .$$ A change of variable leads to $$\eqalign{ v_y = & \frac{GM}{v} \int_{-\infty}^\infty \frac{R}{r^3} {\mathrm{d}}x . \label{eq:newt} \cr = & \frac{2GM}{Rv}}$$ since $r^2 = R^2 + x^2$. For small angles, the Newtonian deflection is then simply given by $$\eqalign{ \alpha_N = & \frac{v_y}{v_x} \cr = & \frac{2GM}{Rv^2}}$$ For the case $v=c$, this result is of course half that predicted by General Relativity, and this discrepancy can be attributed to the matching contribution from the spatial component of the metric, which is otherwise negligible for $v \ll c$. The Newtonian approach allows us to gain some intuition on the influence of a lens in transverse motion. A lens travelling with a velocity $v_L$ introduces a time-dependence to the vertical displacement $R$ which we parameterise as $R=R_0 + v_L x$ and we have set $v=1$. In this case we find (\[eq:newt\]) becomes $$\eqalign{ v_y = & GM \int_{-\infty}^\infty \frac{R_0 + v_L x}{\left[ (R_0 + v_L x)^2 + x^2\right]^{3/2}} {\mathrm{d}}x , \cr = & \frac{2GM}{R \sqrt{1-v_L^2}}} .$$ This corresponds to a modification to the Newtonian deflection angle given by $$\delta \alpha_N \simeq \frac{GMv_L^2}{R}$$ If we define the velocity to correspond to the Hubble flow, then the transverse lens velocity is given by $v_L = HR$, and reintroducing the factor of two from General Relativity leaves us with $$\delta \alpha \simeq 2GMRH^2 .$$ Finally taking $H^2 = \Lambda/3$ corresponds to the term from Sereno $$\delta \alpha \simeq 2GMR \Lambda/3 .$$ In most practical cases the peculiar motion of the lens will likely far exceed this influence.
null
minipile
NaturalLanguage
mit
null
.. _gallery-fng-model: FNG Model ============== Download the :download:`full notebook <../../examples/fng_model.ipynb>`. .. notebook:: ../../examples/fng_model.ipynb
null
minipile
NaturalLanguage
mit
null
Nina Davis had 28 points and 14 rebounds while Makenzie Robertson gave 11 points for the Lady Bears (25-3, 15-1 Big 12), who have won 11 straight games. Aaryn Ellenberg scored 29 points and added six rebounds and five assists for the Sooners (17-12, 8-8), who had won two straight coming in. Nicole Kornet had 16 points and nine rebounds off the bench. Baylor led this game from start to finish as the team scored 16 of the first 18 points of the game and eventually took a 53-31 lead into the break. The Lady Bears had built their lead to 32 early in the second half, but a 20-5 run from the Sooners got the team back into the game as Kaylon Williams' three-point play made it a 76-59 lead with 8 1/2 minutes to play. Oklahoma continued to chip away and Kornet's 3-pointer with just over a minute to play made it a 91-85 game, but Baylor was able to nab the win thanks to making its free throws in the final minute.
null
minipile
NaturalLanguage
mit
null
Isolation and some structure analyses of a copolymeric chondroitin sulfate-dermatan sulfate proteoglycan from post-burn, human hypertrophic scar. A D-glucuronic acid rich, copolymeric chondroitin sulfate (CS)-dermatan sulfate (DS) proteoglycan (PG) from post-burn hypertrophic scar tissue (HSc) was obtained by DEAE-cellulose chromatography and differential ethanol fractionation, and further purified on a Sepharose CL-6B column. CS-DS-PG protein content was 14% (w/w). The amino-terminal amino acid sequence of the first ten residues was as follows: NH2-Asp-Glu-Ala-B-Gly-Ile-Gly-Pro-Glu-Val. This sequence is identical to that of human embryonic fibroblast cell (IMR-90) CS-DS-PG, as well as to human HSc-DS-PG. After chondroitinase ABC treatment, two peptides (Mr 22,000 and 16,000 daltons) were detected by sodium dodecyl sulfate-(polyacryl)amide gel electrophoresis (SDS-PAGE). ELISA analysis using rabbit antiserum raised against a synthetic peptide that contained 15 amino acids in the same sequence as the amino terminus of human fetal membrane PG showed significant reactivity with HSc CS-DS-PG. HSc CS-DS-PG had an apparent Mr of approximately 78,000 daltons, as determined by Sepharose CL-6B chromatography and SDS-PAGE. Alkaline borohydride treatment of CS-DS-PG liberated CS-DS glycosaminoglycan (GAG) chains having an Mr of 29,000 daltons. The conversion of xylose to xylitol indicated that the GAG chains are attached to the PG protein core at O-3 through a xylosyl-seryl linkage. CS-DS-PG also contained both N and O-linked oligosaccharides and did not aggregate with hyaluronic acid. These results, together with those reported previously, showed that HSc CS-DS-PG and DS-PG have the same A1-A15 amino acid sequence at the amino terminus but different protein cores. HSc CS-DS-PG was completely digested with chondroitinase AC and is, therefore, distinctly different from HSc DS-PG.
null
minipile
NaturalLanguage
mit
null
The Florida School Shooting: Students are Standing Up for Gun Reform The Florida School Shooting: Students are Standing Up for Gun Reform On Valentine’s Day this year, after being expelled, a 19-year-old came back into Marjory Stoneman Douglas High School and shot 17 people. This tragic event has caused many of the high school’s students and parents to speak up about gun laws. According to CNN, young survivors are organizing advocacy for gun reform. Darren Levine, a teacher of the high school, stated, “They can change the world, and we can only go with them.” Furthermore, there will be several official meetings with law enforcement, school administrators, teachers, and mental health experts to determine better ways to protect the safety of students within schools. The high school will be reopening in phases as the school will run on a modified schedule to ease students back into classes within 1 week. Some students opened up about the terror they experienced within the high school that day. As stated on People Magazine, Lorena Sanabria, a student of the school, explained, “We were all desperate. We were all crying. We were on our phones trying to stay in touch with our families and read the news.” Her mother stated, “I heard the gunshots. My daughter was talking to me and I was hearing the gunshots.” Time Magazine notes that people from all over the country are in protest, hoping to place added pressure on Congress due to the aftermath of this horrific event. Over 100 students from the high school are heading to Florida’s capital to urge lawmakers to take action on gun laws as to prevent a repeat of the event that happened on Valentine’s Day. Another group of protesters in Los Angeles rallied for stricter background checks and other safety-related measures, with some even holding up signs that said “Our Children Are Counting On You”. Thus far, the Senate is preparing a package that includes increasing the minimum age to purchase a firearm to 21, establishing a waiting period to purchase a firearm, creating gun-violence restraining orders, and more. Hopefully with more people speaking up, we can persuade Congress to take a stance for children – and everyone – all over the country. Placing more safety measures could potentially prevent some of what has unfortunately happened already this year. Hidden within the seclusion of a lush estate, the residential homes of Avalon Malibu sit, offering the privacy and premiere clinical treatment you want for your loved one. Our treatment programs offer both mental health and substance use disorder care. As one of California’s only primary certified treatment centers, our ability to provide holistic, personalized, co-occurring care is unparalleled. Call us today for information: 888-958-7511.
null
minipile
NaturalLanguage
mit
null
Summer of Sonic The Summer of Sonic is an annual convention focusing on all aspects relating to the Sonic the Hedgehog franchise. The event was created by computer game journalist and Sonic fan site owner Svend Joscelyne (AKA "Dreadknux"), and is organised by a large team of volunteers from the UK Sonic fan community. It is officially recognised and supported by SEGA and Sonic Team, whilst maintaining its close ties to the fan base. Since its debut in 2008, the convention has been a high-profile gathering place for like-minded fans from around the world. Special guests have included Richard Jacques, TJ Davis, Bentley Jones, Nigel Kitching, Nigel Dobbyn, Crush 40, SUMO Digital, Ian Flynn, Tracy Yardley, Yuji Naka and Takashi Iizuka. Origins Summer of Sonic was created in July 2006 in the form of a collaborative website celebrating Sonic the Hedgehog's 15th anniversary. Fellow community webmasters, fan artists and other creatives were invited to contribute content to the website, which remained open until the end of August. Buoyed by the relative success of this, along with several community meet ups in London, England in 2007, Joscelyne went on to plan a one-day event to be held during the summer of 2008. This gained the attention of Kevin Eva (known as "AAUK" to fans), SEGA Europe's Community Manager at the time, who himself had been thinking of the possibilities for such an event. The pair agreed to co-organise Summer of Sonic, and were able to secure a degree of backing from SEGA Europe. The level of support increased with each successful year, leading to sponsorship in 2011 and official recognition from Sonic Team in 2012. Summer of Sonic is now part of an annual lineup of celebratory events that include the SEGA-organised Sonic Boom in North America. Eva remained co-organiser and host of the convention until he retired from the position in 2011 after leaving SEGA, although continues to take an active interest in the event. Long-standing community member Rory Joscelyne assumed the role of co-organiser with his brother from 2012, whilst Adam Tuff (known to fans as "T-Bird") took over Svend Joscelyne's role as of the 2013 convention. Svend receiving an emotional send-off near the end of SOS13. While the co-organisers are seen as the lead contributors to the convention's success, the event relies on a great deal of community participation from volunteers. SOS 2008 (9 August) The Summer of Sonic 2008 was held at Dragon Hall, Covent Garden, London, UK, on the 9 August 2008. Features from the event included live performances from Bentley Jones, TJ Davis and Richard Jacques. Bentley Jones also did a remix of the song "His World" from Sonic The Hedgehog 2006 for the event as a gift to the fans. There were also playable demos of the then upcoming Sonic Chronicles: The Dark Brotherhood, months before its release. Whilst Nigel Kitching writer/artist of Fleetway's Sonic the Comic also attended, signing autographs for fans. A Guinness World Records Gamer's Edition entry attempt was also hosted, with fans competing for the quickest completion time of the Emerald Hill Zone, the first zone of the game Sonic The Hedgehog 2 the best time being 20 seconds by Louis Tsiattalou. Whilst other stage events included a fan quiz, and competitions including a Sonic fanart contest which was won by 10 year old Liam Ashcroft. The event whilst receiving little in the way of promotion managed to attract die hard fans from not just all over the United Kingdom and mainland Europe but as far afield as America and even Australia. Eva later commented to fans he'd been told that Sonic Team themselves had "loved" the idea and a 2009 follow-up was confirmed the following February. SOS 2009 (29 August) Due to the increase in exposure and numbers, the location of the 2009 event was moved to the Old Truman Brewery Boiler House on Brick Lane, London. It was noted by Eva that SEGA Europe were even more on board than before though in discussions with fans at an event for Sonic Unleashed noted the difficulty in improving the scale and professionalism of the event whilst maintaining the community spirit of the show. The Summer of Sonic now operates as a SEGA endorsed and sponsored event, with backing provided by SEGA but organised and run essentially in its entirety by Eva, Joscelyne and senior Sonic fans. Events were slow in being confirmed for the 2009 show, due in part to the difficulty in securing the venue, however it has since been confirmed that Nigel Kitching would again be attending the event alongside artist and fellow Fleetway stalwart Nigel Dobbyn. Dobbyn was chiefly responsible for the Knuckles and Tails spinoffs and side storylines that accompanied the main Sonic story. In July, Bentley Jones was confirmed to again be attending, whilst on 7 August it was confirmed representatives from SUMO Digital, the developers behind games such as Sega Superstars Tennis and Outrun Online Arcade would be attending. It was later confirmed by Eva that following on from the early showing of Sonic Chronicles in 2008 that both Wii and DS versions of Mario & Sonic at the Olympic Winter Games and Sonic & Sega All-Stars Racing (also being developed by SUMO Digital) would be getting their UK public premieres at the event. Other confirmed events at this time included a Sonic cosplay competition. The winner was Ciara Thrush who cosplayed as Rouge, Thrush chose to cosplay as Rouge because she was "sexy and sassy". SOS 2010 (7 August) The third Summer of Sonic convention was held on 7 August at The Pavilion, located in Shepherd's Bush. Over nine hundred people attended the event. The headline act for 2010 was rock band Crush 40 (Jun Senoue and Johnny Gioeli) who gave a one-hour live performance - their first performance outside of Japan. Earlier in the day, Jun Senoue also performed a short solo set, and both Senoue and Gioeli answered fan questions in a Q&A session. Games playable at the event included the E3 demos of two unreleased games: Sonic the Hedgehog 4: Episode 1 (Xbox 360) and Sonic Colors (Wii and DS). There were also several Xbox 360 booths featuring older Sonic games including Sonic Heroes, Sonic Unleashed and Sega Mega Drive Ultimate Collection. A Sonic & Sega All Stars Racing tournament also took place. The Sonic Wrecks karaoke competition made a return from 2009, as did the cosplay competition, won in 2010 by Euan Kennedy as a Dr. Eggman cosplayer. SOS 2011 (25 June) At the end of the 2010 event, Summer of Sonic 2011 was announced. It was held on 25 June for the first time to coincide with the 20th anniversary of Sonic the Hedgehog, and not to be held in August when the previous three SEGA events (2008–2010) were held. The venue for this year's event was revealed as the Camden Centre in London. The venue opened from 9am-8pm making it the longest Summer of Sonic event ever. Reservations for the event opened up on 1 May at 10AM British time and within 8 hours the event was sold out. The organizers announced that they are aiming to have more spaces open for people who couldn't make a reservation on the official website. The special guests included writers of the Archie Sonic comics and Sonic the Comic including Tracy Yardley, Nigel Dobbyn, Ian Flynn and Nigel Kitching, Crush 40 guitarist and SEGA composer Jun Senoue, techno rock-band Julien-K, SEGA programmer Takashi Iizuka and the creator of the Sonic series Yuji Naka. Mike Pollock, voice actor for Doctor Eggman, also attended although only as a normal visitor. A showcase section was opened up to give the fans of past events to showcase their talent in both the art and musical areas. A playable demo of Sonic Generations was confirmed to appear at the event along with older Sonic games including Sonic Adventure 2 and Sonic Gems Collection. During the 2010 Crush 40 performance, Johnny Gioeli announced his intention to return for Summer of Sonic 2011, but was unable to return due to scheduling issues. The Wrecks Factor Karaoke contest returned for the last time, but will still continue to run on Radio REDUX. The cosplay contest was won by Bekka Jackson, a Silver the Hedgehog cosplayer and the prize was a limited edition Sonic 20th Anniversary statue. An art competition also took place and a 2nd 20th Anniversary statue was also given away. A charity raffle was also held and £440 was raised for the Tokyo, Japan earthquake and tsunami that took place in March 2011. Also, a proposal was held, Antony Turner proposed to Carly Cridge, with a Chaos Emerald replica instead in lieu of an actual ring (which had been left behind). SOS 2012 (7 July) It was revealed on 2 February that the 5th Summer of Sonic will take place on 7 July in London. Details at this point are vague and the official logo has been revealed with similarities to that of the Sonic Boom logo which is the US's equivalent of SOS. The website for the event is now live and more information will be revealed over the following weeks and months. The venue for the event has been revealed as The Hove Centre in Brighton. The decision for choosing Brighton over the normal location of London was easy for the organisers as they wanted to avoid any clashes with the 2012 London Olympics in terms of hotels and travel. The first of the guests will be unveiled on 4 May 2012. On 13 May at 12:30 British Time, the first wave of tickets were open to registration. Within 3 minutes, the first wave of tickets were sold out. Wave 2 sold out in 48 seconds and Wave 3 beat that by 20 seconds making this the fastest selling Summer of Sonic ever. Confirmed guests include Jun Senoue and Johnny Gioeli of Crush 40, Sonic Team head Takashi Iizuka, SUMO Digital producer Steve Lycett and Nigel Dobbyn and Nigel Kitching from Sonic the Comic. Features for Summer of Sonic 2012 include Club Sonic, a playable demo of Sonic & All-Stars Racing Transformed, a Q&A session with Takashi Iizuka and Steve Lycett and a fan artists showcase section where a select few Sonic fans will attend and show their fan drawings to the public. The cosplay contest has returned for Summer of Sonic 2012 but has a few different rules this time it was judged by 3 judges and the contestants will need to fill out entry sheets upon arrival if they wish to compete. This year's winner was a cosplayer who went as Sonic's Werehog form out of Sonic Unleashed. An honorable mention went to two people cosplaying Banjo and Kazooie (from the Banjo-Kazooie series), who - while not technically considered Sega characters, appear in the Xbox 360 version of Sonic and Sega All-Stars Racing. SOS 2013 (3 August) The sixth annual Summer of Sonic 2013 convention took place on 3 August 2013. Like the previous SOS conventions, it was held in the United Kingdom. References External links Summer of Sonic - Official Website The Sonic Stadium - Associated fan site Last Minute Continue (Formerly Sonic Wrecks) - Associated fan site The Sonic Show - Associated fan site (Broadcasts Video Live Feed) RadioSEGA - Associated fan site (Broadcasts Radio Live Feed) Emerald Coast - Associated fan site Official Twitter Page Official Facebook Page SEGA Europe Category:Fan conventions Category:Recurring events established in 2008 Category:Sonic the Hedgehog Category:Video games in the United Kingdom Category:2008 in London Category:2008 establishments in England
null
minipile
NaturalLanguage
mit
null
Janet Omorogbe Janet Omorogbe (born 22 November 1942) is a Nigerian sprinter. She competed in the women's 4 × 100 metres relay at the 1968 Summer Olympics. References Category:1942 births Category:Living people Category:Athletes (track and field) at the 1968 Summer Olympics Category:Athletes (track and field) at the 1970 British Commonwealth Games Category:Nigerian female sprinters Category:Olympic athletes of Nigeria Category:Place of birth missing (living people)
null
minipile
NaturalLanguage
mit
null
Atomic Energy Organization of Iran EghtesadOnline: Diplomatic achievements such as Iran's 2015 nuclear deal need to be preserved to protect multilateralism from the current chaos, the head of the Atomic Energy Organization of Iran said on Monday. EghtesadOnline: Iran said on Monday it will surpass the uranium stockpile limit set by its nuclear deal with world powers in the next 10 days, but added that Europe still has time to salvage the agreement, which has been on the verge of breakdown since the US withdrawal last year. EghtesadOnline: The head of the Atomic Energy Organization of Iran (AEOI) says the Islamic Republic is capable of resuming the enrichment of uranium to the 20-percent level at its Fordow facility within a maximum of five days if need be.
null
minipile
NaturalLanguage
mit
null
Q: accessing foreignKey inside the template well it's quiet simple. 2 models with ManyToMany relation: class Artist(models.Model): name = models.CharField(max_length=100, unique=True) slug = models.SlugField(max_length=100, unique=True, help_text='Uniq value for artist page URL, created from name') birth_name = models.CharField(max_length=100, blank=True) class Song(models.Model): title = models.CharField(max_length=255) slug = models.SlugField(max_length=255, unique=True, help_text='Unique value for product page URL, create from name.') youtube_link = models.URLField(blank=False) artists = models.ManyToManyField(Artist) my view suppose to display latest 5 songs: def songs(request, template_name="artists/songs.html"): song_list = Song.objects.all().order_by('-created_at')[:5] return render_to_response(template_name, locals(), context_instance=RequestContext(request)) and the problem is in the template... i want to display the artist name but just dont realy know how to do it, i tried: {% for song in song_list %} {{ artists__name }} - {{ song.title }} {% endfor %} would appreciate any help ! A: Try changing your template code to: {% for song in song_list %} {% for artist in song.artists.all %} {{ artist.name }} - {{ song.title }} {% endfor %} {% endfor %}
null
minipile
NaturalLanguage
mit
null
A CALIFORNIA CONGRESSMAN, AFTER ALL. Republican Devin Nunes, the chairman of the House Intelligence Committee, represents Fresno and the agricultural Central Valley of California, a district he won over his Democratic challenger in 2016 by a whopping 36 percentage points. But he’s still a congressman from California — and that means protests in his home district over his actions. “Embattled Republican congressman Devin Nunes was met by about 300 angry protesters when he returned to his California district on Friday for a speaking engagement,” reported ABC News. “Armed with signs that read, ‘Get out of bed with Trump,’ ‘What are you hiding #Russia,’ ‘Nunes step down now,’ and ‘Recuse or replace Nunes,’ Nunes’ detractors were very vocal about their disdain for him.” Fourth-generation Central Valley farmer Suzanne Fortier told the Fresno Bee, “I have very serious concerns about Nunes. He has not been on the right side of a lot of issues as far as I was concerned for a long time, but now with his antics on the Intelligence Committee, I’m very concerned.” Kay Bertken, 70, protests Rep. Devin Nunes, who visited Fresno, Calif., on Friday. Nunes, a Republican, is facing intense criticism as chair of the House Intelligence Committee for his handling of an investigation into Russian meddling in the 2016 presidential election. (Photo: Scott Smith/AP Photo) A small group of seniors calling themselves the “Raging Grannies” sang, “Our congressman just doesn’t get it. He wasn’t elected by Trump. He better learn we are his bosses, and stop kissing Trump on his rump.” “Nunes was there for a private meeting, to talk about water issues in the valley. Many of the demonstrators said they want the local politician to recuse himself from the Russian probe, and said he’s too close to the President to be effective,” reported YourCentralValley.com. Protester Charles Markham told the site, “We need to get Nunes to step down. He’s not qualified to do his job because he’s tied in too deeply with the White House.” A group affiliated with the Indivisible activist network is planning to hold weekly vigils outside his office on Tuesdays. REMINDER ???????? EVERY TUESDAY VIGIL ???????? REMINDER Tuesday 4/4/17, 1145am – 1245pm at @DevinNunes Clovis Office 3rd / Clovis Ave Clovis CA pic.twitter.com/celgcqjSxg — Fire Devin Nunes (@realFireNunes) April 3, 2017 Story continues PROTEST PARTY AT IVANKA’S. Ivanka Trump’s neighbors in the Kalorama area of Washington, D.C., were already miffed by Secret Service intrusions — and disruptions — to their exclusive, quiet, residential neighborhood. Saturday night’s “Queer Dance Party for Climate Justice” protest in the street outside her residence did little to help smooth those ruffled feathers. It may have quietly amused those of her neighbors whose front yards spot pro-immigrant signs in what seems like a clear rebuke of her father’s policies. But protesters twerking for change and chanting “Ivanka Trump, come dance!” led to a confrontation with at least one neighbor, who told the boisterous young crowd to scram. Massive Queer Dance Party for Climate Justice brings The Resistance to @IvankaTrump doorstep in DC #WERK4MotherEarth #Resist pic.twitter.com/d74ch58rEB — Anthony Torres (@avtorres4) April 1, 2017 During the transition, it appeared that Ivanka might emerge as the administration point person on climate change issues, having invited Al Gore to Trump Tower for a meeting. But the Trump administration, now that it has taken office, has aggressively sought to roll back Obama-administration measures designed to slow the advance of human-created climate change. THE BATTLE AGAINST GORSUCH. A coalition of some of the more leftward leaning of the new activist groups, along with some older ones, is pressing the Democratic Party to abandon support for senators who say they will vote to confirm U.S. Supreme Court nominee Judge Neil Gorsuch. “Liberal activist leaders plan to deliver a petition Monday to the Democratic Senatorial Campaign Committee (DSCC) urging party leaders not to give campaign funds to any senator who votes for Gorsuch or strikes a deal to advance his nomination,” reported The Hill. It added that activists heading to DSCC headquarters Monday include Claire Sandberg, co-founder of #AllofUs and WeWillReplaceYou.org; Erich Pica, president of Friends of the Earth Action; Kurt Walters, director of Demand Progress; Shaunna Thomas, co-founder of Ultraviolet Action; and Sabrina Williams of #VoteProChoice. That meeting comes on the heels of a strong anti-Gorsuch push from a different coalition of progressive groups over the weekend, which held small rallies in a dozen cities around the country under the banner of The People’s Defense over the weekend. The campaign, using the hashtag #WeObject, aims to filibuster the Gorsuch nomination, and follows a six-figure ad buy by the coalition of groups urging Senate Democrats to filibuster Gorsuch. “Activists are now vowing to make Republicans pay a political price if they decide to rip up Senate rules to push Gorsuch through with a simple majority vote,” reported Politico. “And if Majority Leader Mitch McConnell does kill the Supreme Court filibuster to confirm Gorsuch, liberals say they’ll still come out on top — having further emboldened a base that wants Democrats to brook no compromise with Trump.” It would take forty-one senators opposing Gorsuch to block his nomination or force Republicans to trigger the “nuclear option,” doing away with the Senate filibuster for Supreme Court votes. The People’s Defense vote tracker counted 36 Democrats opposing as Monday dawned, with 3 supporting his nomination, and the rest still undecided. By midday Monday, the count had grown to 40 against. And Indivisible — as well as a number of other groups — are tying Gorsuch’s nomination to the ongoing investigations into Trump’s campaign ties to Russia, arguing that until those investigations into the campaign are settled no Democrat should back a lifetime appointment made by the president. TAX MARCH PARTNER LIST GROWS. The April 15 Tax March on Washington now has more than 100 sister marches planned across the country, up from 80 less than a month ago. Last week the march planners expanded their partner organization list by a whopping 27 groups as well. They are: Change.org, 32BJ SEIU, Demos, the National Domestic Worker’s Alliance, Alliance for Democracy, Center for Economic and Social Rights, Coalition on Human Needs, Coming Clean, Demand Universal Healthcare, Endangered Species Coalition, IOWA CCI, Moms Rising, Money Out Voters In, National Low Income Housing Coalition, National Partnership for Women & Families, National Women’s Law Center, NELP Action, Other 98, Patriotic Millionaires, People’s Action, People for the American Way, ProgressNow, Roots Action, State Innovation Exchange, UltraViolet, Urban Citizens for Social Justice, and Workmen’s Circle. Groups that signed on earlier to back the Tax March — and that provided early organizing or material support — include the American Federation of Teachers, Americans for Tax Fairness, Center for Popular Democracy, Indivisible Project, MoveOn.org, Our Revolution, and the Working Families Party. BILL NYE SAYS MARCH. The popular science star wrote a blog post for the Planetary Society announcing he will help lead the Earth Day march: “The Planetary Society will join the March for Science on April 22, 2017. I am serving as an honorary Co-Chair for the March, and The Planetary Society is an official partner. I will march at the main event in Washington, D.C., but there will be upward of 400 sister marches around the world. We will assemble with citizens everywhere, whether they are formal scientists or thoughtful citizens from other walks of life, to march in support of science.” IT BURNS. Someone built a robot that prints Trump tweets and then burns them. The latest from @BurnedYourTweet: Read more from Yahoo News:
null
minipile
NaturalLanguage
mit
null
Yorkshire Terriers 2014 Wall Calendar List Price $14.99Our Price $4.49ID: 201400004218 Yorkshire Terriers Wall Calendar: The Yorkshire Terrier's doll-like appearance and size are somewhat misleading, for this is not a meek dog. It prefers not to be pampered, as it is rather independent and bold. At one time it was a distinguished hunter of rats! But after all, with those wide eyes and that lovely blue and tan coat, they are undeniably darling. Yorkie fans will find this wall calendar quite delightful. EAN: 9781465020451
null
minipile
NaturalLanguage
mit
null
1. Field of the Invention This invention relates to broilers for cooking meat products, such as hamburgers, chicken, steaks, fish, ribs, etc. 2. Description of the Prior Art Broilers used in restaurants, fast-food establishments and the like generally comprise a grill on which meat products are placed and under which one or more heater units are located to broil the meat. Heat generated during the broiling process drives grease as well as meat juices from the meat. These drop into the hot interior of the broiler as well as onto the heating units, causing at least a portion thereof to vaporize and/or burn, resulting in a greasy smoke. Such smoke generally vents into the atmosphere to become unwanted air pollution. This type of pollution, resulting from burned meat greases and juices, as well as minute particles of the meat itself, is particularly obnoxious and unhealthful, especially in densely populated areas, so much so, that stringent laws have been enacted to limit emissions of the same and heavy fines are levied against violators. Also, the smoke tends to deposit on the interior of the venting equipment for the broiler, giving rise to the possibility of dangeorous fires, thus requiring frequent and time consuming cleaning. Further, the greases and meat juices upon dropping into the hot interior of the broiler tend to deposit on the heating units and on the hot floor of the broiler to form a carbonized coating which is unsightly and difficult to remove. In addition, the burning smoke tends to deposit on the meat itself, resulting in an unhealthful carbonaceous layer which is believed to be carcinogenic.
null
minipile
NaturalLanguage
mit
null
... I have the same problem. I've had cracklinginmy neck for about ten years now. It has gotten progressively worse over the years. With the increased cracklinginmy neck I also have a lot of problems waking up in the morning with a stiff and painful neck as if I slept on my neck wrong. ... (3 replies)
null
minipile
NaturalLanguage
mit
null
News WE GO THE EXTRA MILE. EVERY DAY. Keep up to date with statutory rates The proposed statutory rates due to come into force from April were announced at the end of last year, despite fears that Brexit might delay their publication. But with the start of the 2019/2020 financial year now just a few weeks away, we thought we’d post a little reminder for HR professionals to ensure they have planned their budgets and amended contracts and policies where necessary. The revised rates for maternity, paternity, shared parental and adoption pay will occur on Sunday 7th April 2019 and the rate of statutory sick pay will increase on 6th April 2019. From 1st April 2019, minimum hourly rates of pay will also rise. The National Living Wage, applicable to workers aged 25 and over, will increase almost 5% from £7.83 per hour to £8.21 per hour. This is estimated to benefit around 2.4 million workers and give those working full-time an annual pay rise of £690. In line with recommendations from the Low Pay Commission (LPC), other National Minimum Wages will be increased as well. Louise Woodward (Chartered MCIPD) Associate Director Louise is an experienced specialist accounting & finance recruitment professional with over 30 years’ experience specialising in the sector during which time she has gained an esteemed reputation as one of the region’s leading recruiters evidenced by her long list of loyal and happy clients. Louise is also Group Secretary …
null
minipile
NaturalLanguage
mit
null
Acting commerce secretary leaving administration Acting Commerce Secretary Rebecca Blank is leaving the Obama administration to serve as chancellor of the University of Wisconsin-Madison. President Barack Obama announced Blank's departure in a statement Monday. He says Blank has distinguished herself as a "steady leader and a vital member of my economic team." Blank joined the Commerce Department in 2009 as an economic adviser and was later promoted to deputy secretary. She was named acting secretary last year after John Bryson suffered a seizure and resigned. The president has not named a nominee to run the department permanently. Top Obama fundraiser Penny Pritzker is considered a leading candidate for the post.
null
minipile
NaturalLanguage
mit
null
This proposal will create an open speech signal processing platform. The open computational framework will be used for developing algorithms that will help accelerate acoustic and hearing science research. It will permit researchers to more rapidly and easily test new algorithms with greater control, performance, and ease. Several example systems will be created to show that the platform can be adapted to a wide range of applications. Example designs will include a hearing aid processor, a cochlear processor, and a general purpose sound processor that can connect to a wide range of audio I/O interfaces. The open framework will leverage a new class of computational devices that represent the future for embedded systems needing significant digital signal processing (DSP) capability. These devices, known as system-on-chip field programmable gate arrays (SoC FPGAs), enable algorithms to run with deterministic and extremely low-latency abilities that are not possible with conventional CPUs. The open platform will enable the research community to create the next generation hearing aids and sound processors.
null
minipile
NaturalLanguage
mit
null
LONDON (Reuters) - A lawmaker in British Prime Minister Theresa May’s Conservative Party, Anne-Marie Trevelyan, resigned on Thursday from her position as an aide to education ministers, citing concerns over the government’s Brexit deal. Reporting by William James. Editing by Andrew MacAskill Our Standards: The Thomson Reuters Trust Principles.
null
minipile
NaturalLanguage
mit
null
SUMMIT COUNTY— More local families now have access to financial assistance for child care, thanks to an increase in the income eligibility limit for the Summit County Child Care Assistance Program (CCCAP). The Summit County Human Services Division, which administers the program, implemented the new eligibility range this month. CCCAP provides assistance with the cost of care either through a child care center or home care provider. “Given the financial strains our community is facing right now with the high costs of housing and child care, we couldn’t be more excited about being able to provide this assistance to a greater number of local families,” County Commissioner Thomas Davidson said. Summit County raised the income eligibility level from 175 percent of Federal Poverty Level (FPL) to 190 percent of FPL, effective Oct. 1. This increases the gross monthly income eligibility level for a family of four by about $300, to a pre-tax total of $3,847. The eligibility expansion became possible because of unanticipated CCCAP funding from the state. CCCAP is one of several critical programs that offers child care assistance in Summit County. Head Start, Breckenridge Child Care Tuition Assistance, CATCH, and the Colorado Preschool programs are among those who work in collaboration with CCCAP to serve the child care needs of the county. Currently, more than 70 families utilize CCCAP in Summit County. Summit County Human Services estimates that the eligibility increase will open the program up to about 15-20 additional local families. “This increases the number of families who can access quality child care,” Summit County Economic Security Programs Manager Michael Whitaker said. “This can be a significant source of financial and emotional relief to families who are working hard to make ends meet, and it helps improve school readiness and other outcomes for young children in our community.” Eligibility for the CCCAP program is based on income and household size, as well as participation in an eligible activity. For more information about CCCAP, including how to apply for CCCAP, visit www.summitcountyco.gov/326/Child-Care-Assistance , or call Human Services at 970-668-9160. Human Services is located in the Summit County Medical Office Building, 360 Peak One Dr., Ste. 230, Frisco.
null
minipile
NaturalLanguage
mit
null
1. Field of the Invention The present invention relates to a resist composition, a method of forming a resist pattern using the resist composition, and a novel compound useful as a quencher for the resist composition. Priority is claimed on Japanese Patent Application No. 2010-273831, filed Dec. 8, 2010, the content of which is incorporated herein by reference. 2. Description of Related Art In lithography techniques, for example, a resist film composed of a resist material is formed on a substrate, and the resist film is subjected to selective exposure of radial rays such as light or electron beam through a mask having a predetermined pattern, followed by development, thereby forming a resist pattern having a predetermined shape on the resist film. A resist material in which the exposed portions become soluble in a developing solution is called a positive-type, and a resist material in which the exposed portions become insoluble in a developing solution is called a negative-type. In recent years, in the production of semiconductor elements and liquid crystal display elements, advances in lithography techniques have led to rapid progress in the field of pattern miniaturization. Typically, these miniaturization techniques involve shortening the wavelength of the exposure light source. Conventionally, ultraviolet radiation typified by g-line and i-line radiation has been used, but nowadays KrF excimer lasers and ArF excimer lasers are now starting to be introduced in mass production. Furthermore, research is also being conducted into lithography techniques that use an exposure light source having a wavelength shorter than these excimer lasers, such as F2 excimer lasers, electron beam, extreme ultraviolet radiation (EUV), and X-ray. Resist materials for use with these types of exposure light sources require lithography properties such as a high resolution capable of reproducing patterns of minute dimensions, and a high level of sensitivity to these types of exposure light sources. As a resist material that satisfies these conditions, a chemically amplified resist composition is used, which includes a base material component that exhibits a changed solubility in an alkali developing solution under the action of acid and an acid generator component that generates acid upon exposure. For example, as a chemically amplified positive resist composition, a chemically amplified resist composition is used, which includes a resin component (base resin) that exhibits increased solubility in an alkali developing solution under the action of acid, and an acid generator component. If the resist film formed using the resist composition is selectively exposed during formation of a resist pattern, then within the exposed portions, acid is generated from the acid generator component, and the action of this acid causes an increase in the solubility of the resin component in an alkali developing solution, making the exposed portions soluble in the alkali developing solution. Currently, resins that contain structural units derived from (meth)acrylate esters within the main chain (acrylic resins) are now typically used as base resins for resists that use ArF excimer laser lithography, as they exhibit excellent transparency in the vicinity of 193 nm (for example, see Patent Document 1). As acid generators usable in a chemically amplified resist composition, various types have been proposed including, for example, onium salt acid generators such as iodonium salts and sulfonium salts; oxime sulfonate acid generators; diazomethane acid generators; nitrobenzylsulfonate acid generators; iminosulfonate acid generators; and disulfone acid generators. Furthermore, currently, in addition to the base resin and the acid generator, a nitrogen-containing organic compound such as an alkylamine, an alkylalcoholamine or the like is added to chemically amplified resist compositions. The nitrogen-containing organic compound functions as a quencher which traps the acid generated from the acid generator, and contributes to improving various lithography properties. In recent years, as quenchers, studies have been made on photodegradable bases which are decomposed by light or radiation. The photodegradable bases included in the resist composition are those in which the unexposed portions function as a quencher whereas the exposed portions lose the quenching capacity due to decomposition of the nitrogen-containing organic compound itself, thereby maintaining, without reducing too much, the acid concentration within the exposed portions to an adequate level.
null
minipile
NaturalLanguage
mit
null
Howard O'Neal Barn The Howard O'Neal Barn was a historic barn near Russell, Arkansas. It was located southeast of the city off Roetzel Road. It was a two-story wood frame structure, with a gambrel roof. In layout it has a transverse crib plan, and was designed to house equipment, farm animals, and feed. Built about 1938, it was a good example of a period barn in White County. The barn was listed on the National Register of Historic Places in 1992. It has been listed as destroyed in the Arkansas Historic Preservation Program database. See also National Register of Historic Places listings in White County, Arkansas References Category:Barns on the National Register of Historic Places in Arkansas Category:Buildings and structures in White County, Arkansas Category:Barns in Arkansas Category:Demolished buildings and structures in Arkansas Category:National Register of Historic Places in White County, Arkansas Category:1930s establishments in Arkansas
null
minipile
NaturalLanguage
mit
null
Working with prisoners who self-harm: A qualitative study on stress, denial of weakness, and encouraging resilience in a sample of correctional staff. Rates of self-harm are high among prisoners. Most research focuses on the vulnerable prisoner, and there is little on the impact of these behaviours on staff. To investigate staff perceptions of self-harming behaviours by prisoners, including their views on its causes, manifestation, prevention in institutions, and impact on them. Semistructured interviews were conducted with 20 administrative and 21 therapeutic prison staff who are responsible in various ways for prisoners who self-harm. Their narratives were explored using interpretative phenomenological analysis. Despite prison staff being experienced with prisoners' self-harming behaviours, including severe acts of self-harm, they were apt to reject any negative impact on their own mental health or well-being. This denial of negative impact was accompanied by perceptions of the inmate's actions being manipulative and attention seeking. Prison staff also perceived institutional responses to self-harming behaviours by prisoners as being mixed, ambiguous, or showing preference for relying on existing suicide protocols rather than task-specific guidance. Although staff gave explanations of prisoner self-harm in terms of "manipulative behaviour," prisoners' self-harm is, in fact, complex, challenging, and often severe. This staff perception may reflect denial of impact of often distressing behaviours on them personally and their own coping mechanisms. This could be feeding in to a perceived lack of clear and effective institutional responses to the self-harm, so further research is needed to determine how staff could broaden their views, and respond more effectively to prisoners. Psychologically informed group work and/or reflective practice are among the candidates for such help for staff.
null
minipile
NaturalLanguage
mit
null
These days it seems that we are witnessing waves of extreme disruption rather than incremental technology change. While some tech news stories have been just so much noise, unlikely to have long-term impact, a few are important signals of much bigger, longer-term changes afoot. From bots to blockchains, augmented realities to human-machine convergence, a number of rapidly advancing technological capabilities hit important inflection points in 2016. We looked at five important emerging technology news stories that happened this year and the trends set in motion that will have an impact for a long time to come. Immersive experiences were one of three top-level trends identified by Gartner for 2016, and that was evident in the enormous popularity of Pokémon Go. While the hype may have come and gone, the immersive technologies that have been quietly advancing in the background for years are ready to boil over into the big time—and into the enterprise. The free location-based augmented reality (AR) game took off shortly after Nintendo launched it in July, and it became the most downloaded app in Apple’s app store history in its first week, as reported by TechCrunch. Average daily usage of the app on Android devices in July 2016 exceeded that of the standard-bearers Snapchat, Instagram, and Facebook, according to SimilarWeb. Within two months, Pokémon Go had generated more than US$440 million, according to Sensor Tower. Unlike virtual reality (VR), which immerses us in a simulated world, AR layers computer-generated information such as graphics, sound, or other data on top of our view of the real world. In the case of Pokémon Go, players venture through the physical world using a digital map to search for Pokémon characters. The game’s instant global acceptance was a surprise. Most watching this space expected an immersive headset device like Oculus Rift or Google Cardboard to steal the headlines. But it took Pikachu and the gang to break through. Pokémon Go capitalized on a generation’s nostalgia for its childhood and harnessed the latest advancements in key AR enabling technologies such as geolocation and computer vision. Just as mobile technologies percolated inside companies for several years before the iPhone exploded onto the market, companies have been dabbling in AR since the beginning of the decade. IKEA created an AR catalog app in 2013 to help customers visualize how their KIVIK modular sofa, for example, would look in their living rooms. Mitsubishi Electric has been perfecting an AR application, introduced in 2011, that enables homeowners to visualize its HVAC products in their homes. Newport News Shipbuilding has launched some 30 AR projects to help the company build and maintain its vessels. Tech giants including Facebook, HP, and Apple have been snapping up immersive tech startups for some time. The overnight success of Pokémon Go will fuel interest in and understanding of all mediated reality technology—virtual and augmented. It’s created a shorthand for describing immersive reality and could launch a wave of technology consumerization the likes of which we haven’t seen since the iPhone instigated a tsunami of smartphone usage. Enterprises would be wise to figure out the role of immersive technology sooner rather than later. “AR and VR will both be the new normal within five years,” says futurist Gerd Leonhard, noting that the biggest hurdles may be mobile bandwidth availability and concerns about sensory overload. “Pokémon is an obvious opening scene only—professional use of AR and VR will explode.” Blockchains, the decentralized digital ledgers of transactions that are processed by a distributed network, first made headlines as the foundation for new types of financial transactions beginning with Bitcoin in 2009. According to Greenwich Associates, financial and technology companies will invest an estimated $1 billion in blockchain technology in 2016. But, as Gartner recently pointed out, there could be even more rapid evolution and acceptance in the areas of manufacturing, government, healthcare, and education. By the 2020s, blockchain-based systems will reduce or eliminate many points of friction for a variety of business transactions. Individuals and companies will be able to exchange a wide range of digitized or digitally represented assets and value with anyone else, according to PwC. The supervised peer-to-peer network concept “is the future,” says Leonhard. But the most important blockchain-related news of 2016 revealed a weak link in the application of technology that is touted as an immutable record. In theory, blockchain technology creates a highly tamper-resistant structure that makes transactions secure and verifiable through a massively distributed digital ledger. All the transactions that take place are recorded in this ledger, which lives on many computers. High-grade encryption makes it nearly impossible for someone to cheat the system. In practice, however, blockchain-based transactions and contracts are only as good as the code that enables them. Case in point: The DAO, one of the first major implementations of a “Decentralized Autonomous Organization” (for which the fund is named). The DAO was a crowdfunded venture capital fund using cryptocurrency for investments and run through smart contracts. The rules that govern those smart contracts, along with all financial transaction records, are maintained on the blockchain. In June, the DAO revealed that an individual exploited a vulnerability in the company’s smart contract code to take control of nearly $60 million worth of the company’s digital currency. The fund’s investors voted to basically rewrite the smart contract code and roll back the transaction, in essence going against the intent of blockchain-based smart contracts, which are supposed to be irreversible once they self-execute. The DAO’s experience confirmed one of the inherent risks of distributed ledger technology—and, in particular, the risk of running a very large fund autonomously through smart contracts based on blockchain technology. Smart contract code must be as error-free as possible. As Cornell University professor and hacker Emin Gün Sirer wrote in his blog, “writing a robust, secure smart contract requires extreme amounts of diligence. It’s more similar to writing code for a nuclear power reactor, than to writing loose web code.” Since smart contracts are intended to be executed irreversibly on the blockchain, their code should not be rewritten and improved over time, as software typically is. But since no code can ever be completely airtight, smart contracts may have to build in contingency plans for when weaknesses in their code are exploited. Importantly, the incident was not a result of any inherent weakness in the blockchain or distributed ledger technology generally. It will not be the end of cryptocurrencies or smart contracts. And it’s leading to more consideration of editable blockchains, which proponents say would only be used in extraordinary circumstances, according to Technology Review. Application programming interfaces (APIs), the computer codes that serve as a bridge between software applications, are not traditionally a hot topic outside of coder circles. But they are critical components in much of the consumer technology we’ve all come to rely on day-to-day. One of the most important events in API history was the introduction of such an interface for Google Maps a decade ago. The map app was so popular that everyone wanted to incorporate its capabilities into their own systems. So Google released an API that enabled developers to connect to and use the technology without having to hack into it. The result was the launch of hundreds of inventive location-enabled apps using Google technology. Today, millions of web sites and apps use Google Maps APIs, from Allstate’s GoodHome app, which shows homeowners a personalized risk assessment of their properties, to Harley-Davidson’s Ride Planner to 7-Eleven’s app for finding the nearest Slurpee. Ultimately, it became de rigueur for apps to open up their systems in a safe way for experimentation by others through APIs. Technology professional Kin Lane, who tracks the now enormous world of APIs, has said, “APIs bring together a unique blend of technology, business, and politics into a transparent, self-service mix that can foster innovation.” Thus it was significant when Apple announced in June that it would open up Siri to third-party developers through an API, giving the wider world the ability to integrate Siri’s voice commands into their apps. The move came on the heels of similar decisions by Amazon, Facebook, and Microsoft, all of which have AI bots or assistants of their own. And in October, Google opened up its Google Assistant as well. The introduction of APIs confirms that the AI technology behind these bots has matured significantly—and that a new wave of AI-based innovation is nigh. The best way to spark that innovation is to open up AI technologies such as Siri so that coders can use them as platforms to build new apps that can more rapidly expand AI uses and capabilities. Call it the “platformication” of AI. The value will be less in the specific AI products a company introduces than in the value of the platform for innovation. And that depends on the quality of the API. The tech company that attracts the best and brightest will win. AI platforms are just beginning to emerge and the question is: Who will be the platform leader? In June, Swiss citizens voted on a proposal to introduce a guaranteed basic income for all of its citizens, as reported by BBC News. It was the first country to take the issue to the polls, but it won’t be the last. Discussions about the impact of both automation and the advancing gig economy on individual livelihoods are happening around the world. Other countries—including the United States—are looking at solutions to the problem. Both Finland and the Netherlands have universal guaranteed income pilots planned for next year. Meanwhile, American startup incubator Y Combinator is launching an experiment to give 100 families in Oakland, California, a minimum wage for five years with no strings attached, according to Quartz. The world is on the verge of potential job loss at a scale and speed never seen before. The Industrial Revolution was more of an evolution, happening over more than a century. The ongoing digital revolution is happening in relative hyper speed. No one is exactly sure how increased automation and digitization will affect the world’s workforce. One 2013 study suggests as much as 47% of the U.S workforce is at risk of being replaced by machines over the next two decades, but even a conservative estimate of 10% could have a dramatic impact, not just on workers but on society as a whole. The proposed solution in Switzerland did not pass, in part because a major political party did not introduce it, and citizens are only beginning to consider the potential implications of digitization on their incomes. What’s more, the idea of simply guaranteeing pay runs contrary to long-held notions in many societies that humans ought to earn their keep. Whether or not state-funded support is the answer is just one of the questions that must be answered. The votes and pilots underway make it clear that governments will have to respond with some policy measures. The question is: What will those measures be? The larger impact of mass job displacement, what future employment conditions might look like, and what the responsibilities of institutions are in ensuring that we can support ourselves are among the issues that policy makers will need to address. New business models resulting from digitization will create some new types of roles—but those will require training and perhaps continued education. And not all of those who will be displaced will be in a position to remake their careers. Just consider taxi drivers: In the United States, about 223,000 people currently earn their living behind the wheel of a hired car. The average New York livery driver is 46 years old, according to the New York City Taxi and Limousine Commission, and no formal education is required. When self-driving cars take over, those jobs will go away and the men and women who held them may not be qualified for the new positions that emerge. As digitization dramatically changes the constructs of commerce and work, no one is quite sure how people will be impacted. But waiting to see how it all shakes out is not a winning strategy. Companies and governments today will have to experiment with potential solutions before the severity of the problem is clear. Among the questions that will have to be answered: How can we retrain large parts of the workforce? How will we support those who fall through the cracks? Will we prioritize and fund education? Technological progress and shifting work models will continue, whether or not we plan for their consequences. In April, a young man, who was believed to have permanently lost feeling in and control over his hands and legs as the result of a devastating spine injury, became able to use his right hand and fingers again. He used technology that transmits his thoughts directly to his hand muscles, bypassing his injured spinal cord. Doctors implanted a computer chip into the quadriplegic’s brain two years ago and—with ongoing training and practice—he can now perform everyday tasks like pouring from a bottle and playing video games. The system reconnected the man’s brain directly to his muscles—the first time that engineers have successfully bypassed the nervous system’s information superhighway, the spinal cord. It’s the medical equivalent of moving from wired to wireless computing. The man has in essence become a cyborg, that term first coined in 1960 to describe “self-regulating human-machine systems.” Yet the beneficiary of this scientific advance himself said, “You’re not going to be looked on as, ‘Oh, I’m a cyborg now because I have this big huge prosthetic on the side of my arm.’ It’s something a lot more natural and intuitive to learn because I can see my own hand reacting.” As described in IEEE Spectrum, the “neural-bypass system” records signals that the man generates when thinking about moving his hand, decodes those signals, and routes them to the electric sleeve around his arm to stimulate movement: “The result looks surprisingly simple and natural: When Burkhart thinks about picking up a bottle, he picks up the bottle. When he thinks about playing a chord in Guitar Hero, he plays the chord.” What seems straightforward on the surface is powered by a sophisticated algorithm that can analyze the vast amounts of data the man’s brain produces, separating important signals from noise. The fact that engineers have begun to unlock the complex code that controls brain-body communication opens up enormous possibilities. Neural prostheses (cochlear implants) have already reversed hearing loss. Light-sensitive chips serving as artificial retinas are showing progress in restoring vision. Other researchers are exploring computer implants that can read human thoughts directly to signal an external computer to help people speak or move in new ways. “Human and machine are converging,” says Leonhard. The National Academy of Engineering predicts that “the intersection of engineering and neuroscience promises great advances in healthcare, manufacturing, and communication.” Burkhart spent two years in training with the computer that has helped power his arm to get this far. It’s the result of more than a decade of development in brain-computer interfaces. And it can currently be used only in the lab; researchers are working on a system for home use. But it’s a clear indication of how quickly the lines between man and machine are blurring—and it opens the door for further computerized reanimation in many new scenarios. This fall, Switzerland hosted its first cyborg Olympics, in which disabled patients compete using the latest assistive technologies, including robot exoskeletons and brainwave-readers. Paraplegic athletes use electrical simulation systems to compete in cycling, for example. The winners are those who can control their device the best. “Instead of celebrating the human body moving under its own power,” said a recent article in the IEEE Spectrum, “the cyborg games will celebrate the strength and ingenuity of human-machine collaborations.” Feature Article — At a time when the global energy industry is undergoing dramatic change, South Australia could very well be the epicenter of innovation. The South Australian government just announced plans for a solar power plant that will generate up
null
minipile
NaturalLanguage
mit
null
Q: Get positions of elements in list of strings in Haskell my title might be a bit off and i'll try to explain a bit better what i'm trying to achieve. Basically let's say i have a list: ["1234x4","253x4",2839",2845"] Now i'd like to add all the positions of the strings which contain element 5 to a new list. On a current example the result list would be: [1,3] For that i've done similar function for elem: myElem [] _ = False myElem [x] number = if (firstCheck x) then if digitToInt(x) == number then True else False else False myElem (x:xs) number = if (firstCheck x) then (if digitToInt(x) == number then True else myElem xs number) else myElem xs number where firstCheck x checks that the checked element isn't 'x' or '#' Now in my current function i get the first element position which contains the element, however my head is stuck around on how to get the full list: findBlock (x:xs) number arv = if myElem x number then arv else findBlock xs number arv+1 Where arv is 0 and number is the number i'm looking for. For example on input: findBlock ["1234x4","253x4",2839",2845"] 5 0 The result would be 1 Any help would be appreciated. A: The function you want already exists in the Data.List module, by the name of findIndices. You can simply use (elem '5') as the predicate. http://hackage.haskell.org/package/base-4.8.1.0/docs/Data-List.html#v:findIndices If, for some reason, you're not allowed to use the built-in one, it comes with a very pretty definition (although the one actually used has a more complicated, more efficient one): findIndices p xs = [ i | (x,i) <- zip xs [0..], p x] By the way, I found this function by searching Hoogle for the type [a] -> (a -> Bool) -> [Int], which (modulo parameter ordering) is obviously the type such a function must have. The best way to find out of Haskell has something is to think about the type it would need to have and search Hoogle or Hayoo for the type. Hoogle is better IMO because it does slightly fuzzy matching on the type; e.g. Hayoo wouldn't find the function here by the type I've given, because it take the arguments in the reverse order. A: An implementation of findIndices, for instructional purposes: findIndices ok list = f list 0 where f [] _ = [] f (x:xs) ix | ok x = ix : f xs (ix+1) | otherwise = f xs (ix+1) Use it like findIndices (elem '5') my_list_o_strings
null
minipile
NaturalLanguage
mit
null
alosetron, Lotronex Omudhome Ogbru, PharmD Dr. Ogbru received his Doctorate in Pharmacy from the University of the Pacific School of Pharmacy in 1995. He completed a Pharmacy Practice Residency at the University of Arizona/University Medical Center in 1996. He was a Professor of Pharmacy Practice and a Regional Clerkship Coordinator for the University of the Pacific School of Pharmacy from 1996-99. Jay W. Marks, MD Jay W. Marks, MD, is a board-certified internist and gastroenterologist. He graduated from Yale University School of Medicine and trained in internal medicine and gastroenterology at UCLA/Cedars-Sinai Medical Center in Los Angeles. GENERIC NAME: alosetron BRAND NAME: Lotronex DRUG CLASS AND MECHANISM: Alosetron is used to treat diarrhea and abdominal discomfort that occurs in some women with irritable bowel syndrome (IBS). It works in a similar fashion as granisetron (Kytril), ondansetron (Zofran) and dolasetron (Anzemet) that are used for preventing nausea and vomiting. The discomfort and diarrhea of IBS is believed to be due to abnormal activity of the muscles of the intestines and/or the nerves that control the muscles. One of the chemical messengers which is important in coordinating the activity of intestinal nerves is serotonin. (Chemical messengers are chemicals produced and released by nerve cells that and cause changes in the activity of other nerve cells.) Alosetron belongs to a class of drugs that block one type of serotonin receptor called the 5-HT3 receptor. Serotonin and its receptors in the intestines may control pain sensation, contraction of intestinal muscle, and release of fluid into the intestines. These actions of serotonin can result in pain and diarrhea. The exact cause of IBS is unknown, but it is thought that stimuli such as food, medications, hormonal changes, or stress may trigger an excessive release or excessive response to serotonin. This may cause pain, and diarrhea seen in patients with diarrhea-predominant IBS. Alosetron, by blocking 5-HT3 receptors, reduces the actions of serotonin. Alosetron (Lotronex) was approved for marketing by the FDA in February, 2000 but was withdrawn from the market in November 2000, because of serious, life-threatening, gastrointestinal side effects. In June 2002, it was approved again by the FDA for marketing but in a restricted manner as part of a drug company-sponsored program for managing the risks associated with treatment. Use of alosetron is allowed only among women with severe, diarrhea-predominant IBS who have failed to respond to conventional treatment for IBS.
null
minipile
NaturalLanguage
mit
null
[Prevalence of mycobacteriosis and tuberculosis in a reference hospital, Cordoba province]. Environmental mycobacteria (EM) constitute an important group of bacteria species found in the environment. They can colonize and occasionally produce disease in man. Sixteen thousand three hundred samples from 9300 adult symptomatic patients from the Hospital Regional of Tuberculosis in Cordoba were bacteriolocally investigated. The isolations were performed by culture on Lowenstein Jensen and Stonebrink culture media. The colonies of acid fast bacilli (AFB) were identified by biochemical and molecular tests. Among 716 culture positive cases, 684 (95.5%) were due to Mycobacterium tuberculosis complex and 32 to environmental mycobacteria. Serial samples allowed the confirmation of the etiological agent in culture and correlated with consistent clinical and radiological abnormalities. Seventy-five percent of these patients were affected by M. avium complex, 15.6% by M. fortuitum, 3.1% Mycobacterium kansasii and 6.3% Mycobacterium chelonae. Among tuberculosis cases, 94.5% and 5.5% had pulmonary and extrapulmonary disease respectively.
null
minipile
NaturalLanguage
mit
null
PlayStation Vita shown running Sega Genesis titles Still mulling whether or not to pick yourself up a PlayStation Vita? Obsessed with retro gaming titles? If you answered "yes" to both, you should probably start socking away a few extra coins, buster. YouTube user frwololo has just upped a video showcasing the Half Byte Loader running the Picodrive emulator on Sony's PS Vita -- the first major proof that this kind of wizardry is indeed a possibility. The nuts and bolts of how it happened are being kept under wraps for now, and he seems certain that Sony's inbuilt security will make the mod unusable as soon as it's released. That said, there's still a lot of hope to be found in the clip just after the break, and c'mon -- who doesn't need a little hope to kick off a year where we're all supposed to perish?
null
minipile
NaturalLanguage
mit
null
Paul McMullan (journalist) Paul McMullan (born 1963) is a British former tabloid journalist. He was educated at Trinity School, Croydon and Cambridgeshire College of Arts and Technology. Journalism career McMullan started his newspaper career at the Sunday Sport. He went on to work as a features journalist at the now-defunct News of the World between 1994 and 2001, briefly becoming deputy features editor in 2000. In 2011, McMullan admitted to regrets over a series of articles he had written in the 1990s about Jennifer Elliott, the daughter of the late actor Denholm Elliott. McMullan had obtained information from the police that she had been living on the streets and working as a prostitute. She committed suicide in 2003. In July 2011, actor Steve Coogan described him as "morally bankrupt" after appearing with him on BBC Newsnight. Hugh Grant attempted to secretly tape him making claims about phone hacking in a visit to McMullan's pub, The Castle Inn in Dover. McMullan asked Grant during the conversation, "Are you taping me? If you are, good luck to you; I don't really care anyway." He was one of only a few journalists to claim on the record that phone hacking was rife at the newspaper. In November 2011 he made a notable contribution to the Leveson Inquiry where he not only confessed to a wide range of illegal activities in the pursuit of news but defended them as necessary. In his testimony he opposed the concept of privacy, despite claiming his own personal privacy being compromised, and that he had long disguised his personal whereabouts and circumstances, primarily by registering himself (for various purposes) at his parents' home address. McMullan notably told the enquiry that "Privacy is for paedos". McMullan testified to having undertaken a wide range of illegal or unethical activities to get stories besides phone hacking: bribing police officers, stealing documents, going through celebrities' rubbish bins, and at one point posing as a "teenage rent boy" to entrap a paedophile priest. "[I]t was hard to think of any dubious news-gathering technique he had not confessed to," wrote New York Times reporter Sarah Lyall, "short of pistol-whipping sources for information." He defended those techniques as "perfectly acceptable ... if all we're trying to do is get at the truth." "[Do] we really want to live in a world where the only people who can do the hacking are MI5 and MI6?" he asked. "For a brief period of about 20 years, we have actually lived in a free society where we can hack back". He scoffed at the very notion of privacy, calling it "the space bad people need to do bad things in." Lyall commented, "At times he sounded like a satirist's rendition of an amoral tabloid hack"." More recently, McMullan has been a freelance journalist. He often works in Kent with KOS Media titles, including the Kent on Sunday paper. Pub owner and politician McMullan owns several properties in Kent, giving his address as the Castle Inn, Dover, when appearing at the Leveson inquiry. In January 2011, McMullan became the landlord of The Bull public house in the village of Eastry for Punch Taverns. McMullan employed a bar manager to run the pub. After residents' complaints about noise from the pub he handed in his resignation as leaseholder. The bar manager took over and the pub was under investigation by Dover District Council and Kent Police before it closed completely. McMullan owns and runs The Castle Inn, a public house near the Port of Dover, Kent. In August 2011, he tried to apply for a licence for topless barmaids in the pub. This was later refused. As part of The Castle Inn, McMullan opened a low budget hostel called Dover Backpackers, providing accommodation in dormitory-style. He stood as an independent in the 2013 Kent County Council elections for the Dover Town Ward. He originally wanted to stand as a UKIP candidate but was not supported by the party. He came third behind the Conservatives and Labour. Personal life McMullan is the father of four children, the first two from his former marriage to former News of The World journalist Maria McMullan, and the two younger children are from a more recent relationship with a Kent local newspaper editor. McMullan is often filmed and interviewed at his pub by TV companies from all over the world including Turkey, India, Europe and Australia about phone hacking and journalism. He has written a book about the News of the World phone hacking and other practices at the paper. References Category:1963 births Category:Place of birth missing (living people) Category:Living people Category:British male journalists Category:News of the World people Category:People associated with the News International phone hacking scandal Category:British publicans
null
minipile
NaturalLanguage
mit
null
A protest is set to take place outside the venue where UK politician Nigel Farage will speak on Tuesday evening. Tāmaki Anti-Fascist Action says it will hold a "peaceful anti-racism public demonstration" outside the Pullman Hotel and speakers will include Green MP Golriz Ghahraman. Mr Farage is the former leader of the pro-Brexit political party UKIP. He quit as leader after the UK voted to leave the European Union in mid-2016. In the description for his speaking event, promoter Markson Sparks said Mr Farage is "the most important British politician of the last decade" and the "world's most charismatic politician". Mr Farage said he would be coming with "a message of hope and optimism - that if the man or woman in the street, the average Joe or Jane is prepared to stand up and be counted, and push back against the political elite and the media establishment, they can take back their democracy and, ultimately, their country." "Never in the history of Western civilisation has the fight for democracy, individual liberties and free speech been more important. So I come to you from the UK with a message of hope and optimism - that if the man or woman in the street, the average Joe or Jane is prepared to stand up and be counted, and push back against the political elite and the media establishment, they can take back their democracy and, ultimately, their country." Pacific Panthers member Te Ao Pritchard, South Auckland Muslim Association member Azad Khan, a Tāmaki Makaurau Anarchists member, a Dayenu - Jews Against the Occupation member are also set to speak at the protest. Tāmaki Anti-Fascist Action spokesperson Katjoesja Buissink said: "We are taking action because Farage's anti-Semitic, Islamophobic and misogynist views are repugnant and indefensible. His scapegoating of vulnerable communities is reprehensible. "The real problems rest with the vast and grotesque levels of global inequality caused by capitalist exploitation, ongoing colonialism and endless wars of aggression. He doesn't want to do anything about those things, instead he uses 'divide and rule' tactics to stir up hatred and fear among the white working and middle class." Newshub.
null
minipile
NaturalLanguage
mit
null
In pelletizing or sintering plants the bulk material to be treated, for example iron ore or zinc ore, is charged onto pallet car which form an endless chain of pallet cars also referred to as traveling grate (cf. FIG. 1). The pallet cars are filled with the bulk material and pass through various treatment stations, in which a thermal treatment of the material, such as drying, firing and cooling, is effected. By a lifting or drive wheel, the pallet car chain is moved through the treatment stations along a top strand, wherein the wheels of the pallet cars are guided in rails. At the end of the top strand, the heat-treated material is dumped by gravity at a lowering wheel or tipping wheel (discharge station), whereupon the empty pallet cars are returned upside down along a bottom strand to the lifting wheel. During conveyance in the top strand and the bottom strand, a contact pressure between the individual pallet cars brings about the necessary chain connection. Gear wheels of the lifting and lowering wheels engage pressure rollers which are arranged on the axle of the pallet cars beside the track rollers, in order to lift the pallet cars and convey the same in vertical direction. Since the pallet cars with their components are subject to a high thermal and mechanical wear during the production, they must be exchanged after a certain degree of wear or damage. Conventionally, such change requires stopping of the lifting wheel for 5 to 10 minutes, which can lead to an additional thermal damage of the pallet cars in the top strand. Moreover, production must also be stopped in this shut-down period. After the pallet car change, the pelletizing and sintering process must then again adjust to a stable production level. This adjustment phase, which in most cases only is terminated after a few turnaround cycles, likewise has an adverse effect on the product quality. To avoid the above-described disadvantages of the discontinuous changing devices, it has also been proposed already to perform a continuous pallet car exchange. The pallet car to be changed here is removed from the pallet car chain and a new pallet car is inserted in the free chain position. The change is effected with running traveling grate, so that two different plant positions are required for the partial functions of bringing out and bringing in. The changing device consists of two separate units which operate one after the other. An example of a continuous changing device is described in U.S. Pat. No. 6,523,673. The changing device is arranged in the lifting wheel bottom strand and in the lifting wheel top strand. Removal of the pallet car is effected in the bottom strand. For this purpose, the guide rail is opened downwards and the pallet car is brought out on a movable conveying means. The conveying means is a sliding table which has the same translatory direction of action as the traveling grate conveyance in the bottom strand. In the top strand, a new pallet car is lifted into the traveling grate by means of a rotatable gripping mechanism, wherein the necessary insertion opening in the curve rails is generated by means of a rotatable flap which is opened upwards. Here as well, however, additional lifting and conveying means are required for removing and inserting the pallet cars.
null
minipile
NaturalLanguage
mit
null
[Formation of paroxysmal brain activity in the liquidators of the consequences of the Chernobyl nuclear disaster]. To investigate the effect of ionizing radiation on the formation of paroxysmal brain activity (PBA) in the liquidators of the consequences of the Chernobyl nuclear disaster in view of their age on the date of exposure to radiation. EEG examinations were performed in 105 liquidators of the consequences of the nuclear disaster (LCND) and 90 people without radiation anamnesis (control group). It has been determined that the formation of paroxysmal brain activity in LCND occurs 3.5 times more frequent (p<0.001) and 15-17 years earlier (p<0.001) than in the control group and mainly during the first 10 years after the exposure to radiation. The history of the exposure to ionizing radiation is associated with the increased risk of the development of convulsive PBA as focal seizures by 5.5 times (p<0.001), interictal epileptiform discharges (IED) in EEG by 3.3 times (p<0.001). Radiation effect on LCND under 30 years old increases (as compared to the control group) the risk of the formation of elevated paroxysmal brain activity by 19 times (p<0.001), convulsive epileptic seizures by 33.3 times (p<0.001), interictal epileptiform discharges in EEG by 12 times (p<0.001), asymptomatic focal epileptoid nidus in EEG by 9.3 times (p<0.001). Stimulating effect of ionizing radiation on the development of PBA related to the age on the date of exposure to radiation was found.
null
minipile
NaturalLanguage
mit
null
Derived from the Greekἀνατομήanatomē "dissection" (from ἀνατέμνωanatémnō "I cut up, cut open" from ἀνά aná "up", and τέμνω témnō "I cut"),[5] anatomy is the scientific study of the structure of organisms including their systems, organs and tissues. It includes the appearance and position of the various parts, the materials from which they are composed, their locations and their relationships with other parts. Anatomy is quite distinct from physiology and biochemistry, which deal respectively with the functions of those parts and the chemical processes involved. For example, an anatomist is concerned with the shape, size, position, structure, blood supply and innervation of an organ such as the liver; while a physiologist is interested in the production of bile, the role of the liver in nutrition and the regulation of bodily functions.[6] The discipline of anatomy can be subdivided into a number of branches including gross or macroscopic anatomy and microscopic anatomy.[7]Gross anatomy is the study of structures large enough to be seen with the naked eye, and also includes superficial anatomy or surface anatomy, the study by sight of the external body features. Microscopic anatomy is the study of structures on a microscopic scale, along with histology (the study of tissues), and embryology (the study of an organism in its immature condition).[3] Anatomy can be studied using both invasive and non-invasive methods with the goal of obtaining information about the structure and organization of organs and systems.[3] Methods used include dissection, in which a body is opened and its organs studied, and endoscopy, in which a video camera-equipped instrument is inserted through a small incision in the body wall and used to explore the internal organs and other structures. Angiography using X-rays or magnetic resonance angiography are methods to visualize blood vessels.[8][9][10][11] The term "anatomy" is commonly taken to refer to human anatomy. However, substantially the same structures and tissues are found throughout the rest of the animal kingdom and the term also includes the anatomy of other animals. The term zootomy is also sometimes used to specifically refer to non-human animals. The structure and tissues of plants are of a dissimilar nature and they are studied in plant anatomy.[6] Unlike plant cells, animal cells have neither a cell wall nor chloroplasts. Vacuoles, when present, are more in number and much smaller than those in the plant cell. The body tissues are composed of numerous types of cell, including those found in muscles, nerves and skin. Each typically has a cell membrane formed of phospholipids, cytoplasm and a nucleus. All of the different cells of an animal are derived from the embryonic germ layers. Those simpler invertebrates which are formed from two germ layers of ectoderm and endoderm are called diploblastic and the more developed animals whose structures and organs are formed from three germ layers are called triploblastic.[13] All of a triploblastic animal's tissues and organs are derived from the three germ layers of the embryo, the ectoderm, mesoderm and endoderm. Connective tissues are fibrous and made up of cells scattered among inorganic material called the extracellular matrix. Connective tissue gives shape to organs and holds them in place. The main types are loose connective tissue, adipose tissue, fibrous connective tissue, cartilage and bone. The extracellular matrix contains proteins, the chief and most abundant of which is collagen. Collagen plays a major part in organizing and maintaining tissues. The matrix can be modified to form a skeleton to support or protect the body. An exoskeleton is a thickened, rigid cuticle which is stiffened by mineralization, as in crustaceans or by the cross-linking of its proteins as in insects. An endoskeleton is internal and present in all developed animals, as well as in many of those less developed.[13] Epithelial tissue is composed of closely packed cells, bound to each other by cell adhesion molecules, with little intercellular space. Epithelial cells can be squamous (flat), cuboidal or columnar and rest on a basal lamina, the upper layer of the basement membrane,[14] the lower layer is the reticular lamina lying next to the connective tissue in the extracellular matrix secreted by the epithelial cells.[15] There are many different types of epithelium, modified to suit a particular function. In the respiratory tract there is a type of ciliated epithelial lining; in the small intestine there are microvilli on the epithelial lining and in the large intestine there are intestinal villi. Skin consists of an outer layer of keratinized stratified squamous epithelium that covers the exterior of the vertebrate body. Keratinocytes make up to 95% of the cells in the skin.[16] The epithelial cells on the external surface of the body typically secrete an extracellular matrix in the form of a cuticle. In simple animals this may just be a coat of glycoproteins.[13] In more advanced animals, many glands are formed of epithelial cells.[17] Muscle cells (myocytes) form the active contractile tissue of the body. Muscle tissue functions to produce force and cause motion, either locomotion or movement within internal organs. Muscle is formed of contractile filaments and is separated into three main types; smooth muscle, skeletal muscle and cardiac muscle. Smooth muscle has no striations when examined microscopically. It contracts slowly but maintains contractibility over a wide range of stretch lengths. It is found in such organs as sea anemone tentacles and the body wall of sea cucumbers. Skeletal muscle contracts rapidly but has a limited range of extension. It is found in the movement of appendages and jaws. Obliquely striated muscle is intermediate between the other two. The filaments are staggered and this is the type of muscle found in earthworms that can extend slowly or make rapid contractions.[18] In higher animals striated muscles occur in bundles attached to bone to provide movement and are often arranged in antagonistic sets. Smooth muscle is found in the walls of the uterus, bladder, intestines, stomach, oesophagus, respiratory airways, and blood vessels. Cardiac muscle is found only in the heart, allowing it to contract and pump blood round the body. The body of a fish is divided into a head, trunk and tail, although the divisions between the three are not always externally visible. The skeleton, which forms the support structure inside the fish, is either made of cartilage, in cartilaginous fish, or bone in bony fish. The main skeletal element is the vertebral column, composed of articulating vertebrae which are lightweight yet strong. The ribs attach to the spine and there are no limbs or limb girdles. The main external features of the fish, the fins, are composed of either bony or soft spines called rays, which with the exception of the caudal fins, have no direct connection with the spine. They are supported by the muscles which compose the main part of the trunk.[27] The heart has two chambers and pumps the blood through the respiratory surfaces of the gills and on round the body in a single circulatory loop.[28] The eyes are adapted for seeing underwater and have only local vision. There is an inner ear but no external or middle ear. Low frequency vibrations are detected by the lateral line system of sense organs that run along the length of the sides of fish, and these respond to nearby movements and to changes in water pressure.[27] Sharks and rays are basal fish with numerous primitive anatomical features similar to those of ancient fish, including skeletons composed of cartilage. Their bodies tend to be dorso-ventrally flattened, they usually have five pairs of gill slits and a large mouth set on the underside of the head. The dermis is covered with separate dermal placoid scales. They have a cloaca into which the urinary and genital passages open, but not a swim bladder. Cartilaginous fish produce a small number of large, yolky eggs. Some species are ovoviviparous and the young develop internally but others are oviparous and the larvae develop externally in egg cases.[29] The bony fish lineage shows more derived anatomical traits, often with major evolutionary changes from the features of ancient fish. They have a bony skeleton, are generally laterally flattened, have five pairs of gills protected by an operculum, and a mouth at or near the tip of the snout. The dermis is covered with overlapping scales. Bony fish have a swim bladder which helps them maintain a constant depth in the water column, but not a cloaca. They mostly spawn a large number of small eggs with little yolk which they broadcast into the water column.[29] Amphibians are a class of animals comprising frogs, salamanders and caecilians. They are tetrapods, but the caecilians and a few species of salamander have either no limbs or their limbs are much reduced in size. Their main bones are hollow and lightweight and are fully ossified and the vertebrae interlock with each other and have articular processes. Their ribs are usually short and may be fused to the vertebrae. Their skulls are mostly broad and short, and are often incompletely ossified. Their skin contains little keratin and lacks scales, but contains many mucous glands and in some species, poison glands. The hearts of amphibians have three chambers, two atria and one ventricle. They have a urinary bladder and nitrogenous waste products are excreted primarily as urea. Amphibians breathe by means of buccal pumping, a pump action in which air is first drawn into the buccopharyngeal region through the nostrils. These are then closed and the air is forced into the lungs by contraction of the throat.[30] They supplement this with gas exchange through the skin which needs to be kept moist.[31] In frogs the pelvic girdle is robust and the hind legs are much longer and stronger than the forelimbs. The feet have four or five digits and the toes are often webbed for swimming or have suction pads for climbing. Frogs have large eyes and no tail. Salamanders resemble lizards in appearance; their short legs project sideways, the belly is close to or in contact with the ground and they have a long tail. Caecilians superficially resemble earthworms and are limbless. They burrow by means of zones of muscle contractions which move along the body and they swim by undulating their body from side to side.[32] Reptiles are a class of animals comprising turtles, tuataras, lizards, snakes and crocodiles. They are tetrapods, but the snakes and a few species of lizard either have no limbs or their limbs are much reduced in size. Their bones are better ossified and their skeletons stronger than those of amphibians. The teeth are conical and mostly uniform in size. The surface cells of the epidermis are modified into horny scales which create a waterproof layer. Reptiles are unable to use their skin for respiration as do amphibians and have a more efficient respiratory system drawing air into their lungs by expanding their chest walls. The heart resembles that of the amphibian but there is a septum which more completely separates the oxygenated and deoxygenated bloodstreams. The reproductive system has evolved for internal fertilization, with a copulatory organ present in most species. The eggs are surrounded by amniotic membranes which prevents them from drying out and are laid on land, or develop internally in some species. The bladder is small as nitrogenous waste is excreted as uric acid.[33] Turtles are notable for their protective shells. They have an inflexible trunk encased in a horny carapace above and a plastron below. These are formed from bony plates embedded in the dermis which are overlain by horny ones and are partially fused with the ribs and spine. The neck is long and flexible and the head and the legs can be drawn back inside the shell. Turtles are vegetarians and the typical reptile teeth have been replaced by sharp, horny plates. In aquatic species, the front legs are modified into flippers.[34] Tuataras superficially resemble lizards but the lineages diverged in the Triassic period. There is one living species, Sphenodon punctatus. The skull has two openings (fenestrae) on either side and the jaw is rigidly attached to the skull. There is one row of teeth in the lower jaw and this fits between the two rows in the upper jaw when the animal chews. The teeth are merely projections of bony material from the jaw and eventually wear down. The brain and heart are more primitive than those of other reptiles, and the lungs have a single chamber and lack bronchi. The tuatara has a well-developed parietal eye on its forehead.[34] Lizards have skulls with only one fenestra on each side, the lower bar of bone below the second fenestra having been lost. This results in the jaws being less rigidly attached which allows the mouth to open wider. Lizards are mostly quadrupeds, with the trunk held off the ground by short, sideways-facing legs, but a few species have no limbs and resemble snakes. Lizards have moveable eyelids, eardrums are present and some species have a central parietal eye.[34] Snakes are closely related to lizards, having branched off from a common ancestral lineage during the Cretaceous period, and they share many of the same features. The skeleton consists of a skull, a hyoid bone, spine and ribs though a few species retain a vestige of the pelvis and rear limbs in the form of pelvic spurs. The bar under the second fenestra has also been lost and the jaws have extreme flexibility allowing the snake to swallow its prey whole. Snakes lack moveable eyelids, the eyes being covered by transparent "spectacle" scales. They do not have eardrums but can detect ground vibrations through the bones of their skull. Their forked tongues are used as organs of taste and smell and some species have sensory pits on their heads enabling them to locate warm-blooded prey.[35] Crocodilians are large, low-slung aquatic reptiles with long snouts and large numbers of teeth. The head and trunk are dorso-ventrally flattened and the tail is laterally compressed. It undulates from side to side to force the animal through the water when swimming. The tough keratinized scales provide body armour and some are fused to the skull. The nostrils, eyes and ears are elevated above the top of the flat head enabling them to remain above the surface of the water when the animal is floating. Valves seal the nostrils and ears when it is submerged. Unlike other reptiles, crocodilians have hearts with four chambers allowing complete separation of oxygenated and deoxygenated blood.[36] Birds are tetrapods but though their hind limbs are used for walking or hopping, their front limbs are wings covered with feathers and adapted for flight. Birds are endothermic, have a high metabolic rate, a light skeletal system and powerful muscles. The long bones are thin, hollow and very light. Air sac extensions from the lungs occupy the centre of some bones. The sternum is wide and usually has a keel and the caudal vertebrae are fused. There are no teeth and the narrow jaws are adapted into a horn-covered beak. The eyes are relatively large, particularly in nocturnal species such as owls. They face forwards in predators and sideways in ducks.[37] The feathers are outgrowths of the epidermis and are found in localized bands from where they fan out over the skin. Large flight feathers are found on the wings and tail, contour feathers cover the bird's surface and fine down occurs on young birds and under the contour feathers of water birds. The only cutaneous gland is the single uropygial gland near the base of the tail. This produces an oily secretion that waterproofs the feathers when the bird preens. There are scales on the legs, feet and claws on the tips of the toes.[37] Mammals are a diverse class of animals, mostly terrestrial but some are aquatic and others have evolved flapping or gliding flight. They mostly have four limbs but some aquatic mammals have no limbs or limbs modified into fins and the forelimbs of bats are modified into wings. The legs of most mammals are situated below the trunk, which is held well clear of the ground. The bones of mammals are well ossified and their teeth, which are usually differentiated, are coated in a layer of prismatic enamel. The teeth are shed once (milk teeth) during the animal's lifetime or not at all, as is the case in cetaceans. Mammals have three bones in the middle ear and a cochlea in the inner ear. They are clothed in hair and their skin contains glands which secrete sweat. Some of these glands are specialized as mammary glands, producing milk to feed the young. Mammals breathe with lungs and have a muscular diaphragm separating the thorax from the abdomen which helps them draw air into the lungs. The mammalian heart has four chambers and oxygenated and deoxygenated blood are kept entirely separate. Nitrogenous waste is excreted primarily as urea.[38] Mammals are amniotes, and most are viviparous, giving birth to live young. The exception to this are the egg-laying monotremes, the platypus and the echidnas of Australia. Most other mammals have a placenta through which the developing foetus obtains nourishment, but in marsupials, the foetal stage is very short and the immature young is born and finds its way to its mother's pouch where it latches on to a nipple and completes its development.[38] Human anatomy, physiology and biochemistry are complementary basic medical sciences, which are generally taught to medical students in their first year at medical school. Human anatomy can be taught regionally or systemically; that is, respectively, studying anatomy by bodily regions such as the head and chest, or studying by specific systems, such as the nervous or respiratory systems.[3] The major anatomy textbook, Gray's Anatomy, has been reorganized from a systems format to a regional format, in line with modern teaching methods.[41][42] A thorough working knowledge of anatomy is required by physicians, especially surgeons and doctors working in some diagnostic specialties, such as histopathology and radiology. [43] Academic anatomists are usually employed by universities, medical schools or teaching hospitals. They are often involved in teaching anatomy, and research into certain systems, organs, tissues or cells.[43] Invertebrates constitute a vast array of living organisms ranging from the simplest unicellular eukaryotes such as Paramecium to such complex multicellular animals as the octopus, lobster and dragonfly. They constitute about 95% of the animal species. By definition, none of these creatures has a backbone. The cells of single-cell protozoans have the same basic structure as those of multicellular animals but some parts are specialized into the equivalent of tissues and organs. Locomotion is often provided by cilia or flagella or may proceed via the advance of pseudopodia, food may be gathered by phagocytosis, energy needs may be supplied by photosynthesis and the cell may be supported by an endoskeleton or an exoskeleton. Some protozoans can form multicellular colonies.[44] Marcello Malpighi, the father of microscopical anatomy, discovered that plants had tubules similar to those he saw in insects like the silk worm. He observed that when a ring-like portion of bark was removed on a trunk a swelling occurred in the tissues above the ring, and he unmistakably interpreted this as growth stimulated by food coming down from the leaves, and being captured above the ring.[47] Arthropods comprise the largest phylum in the animal kingdom with over a million known invertebrate species.[48] Insects possess segmented bodies supported by a hard-jointed outer covering, the exoskeleton, made mostly of chitin. The segments of the body are organized into three distinct parts, a head, a thorax and an abdomen.[49] The head typically bears a pair of sensory antennae, a pair of compound eyes, one to three simple eyes (ocelli) and three sets of modified appendages that form the mouthparts. The thorax has three pairs of segmented legs, one pair each for the three segments that compose the thorax and one or two pairs of wings. The abdomen is composed of eleven segments, some of which may be fused and houses the digestive, respiratory, excretory and reproductive systems.[50] There is considerable variation between species and many adaptations to the body parts, especially wings, legs, antennae and mouthparts.[51] Spiders a class of arachnids have four pairs of legs; a body of two segments—a cephalothorax and an abdomen. Spiders have no wings and no antennae. They have mouthparts called chelicerae which are often connected to venom glands as most spiders are venomous. They have a second pair of appendages called pedipalps attached to the cephalothorax. These have similar segmentation to the legs and function as taste and smell organs. At the end of each male pedipalp is a spoon-shaped cymbium that acts to support the copulatory organ. Superficial or surface anatomy is important as the study of anatomical landmarks that can be readily seen from the exterior contours of the body.[3] It enables physicians or veterinary surgeons to gauge the position and anatomy of the associated deeper structures. Superficial is a directional term that indicates that structures are located relatively close to the surface of the body.[52] Comparative anatomy relates to the comparison of anatomical structures (both gross and microscopic) in different animals.[3] Ancient Greek anatomy and physiology underwent great changes and advances throughout the early medieval world. Over time, this medical practice expanded by a continually developing understanding of the functions of organs and structures in the body. Phenomenal anatomical observations of the human body were made, which have contributed towards the understanding of the brain, eye, liver, reproductive organs and the nervous system. The Hellenistic Egyptian city of Alexandria was the stepping-stone for Greek anatomy and physiology. Alexandria not only housed the biggest library for medical records and books of the liberal arts in the world during the time of the Greeks, but was also home to many medical practitioners and philosophers. Great patronage of the arts and sciences from the Ptolemy rulers helped raise Alexandria up, further rivalling the cultural and scientific achievements of other Greek states.[54] Some of the most striking advances in early anatomy and physiology took place in Hellenistic Alexandria.[54] Two of the most famous anatomists and physiologists of the third century were Herophilus and Erasistratus. These two physicians helped pioneer human dissection for medical research. They also conducted vivisections on the cadavers of condemned criminals, which was considered taboo until the Renaissance—Herophilus was recognized as the first person to perform systematic dissections.[55] Herophilus became known for his anatomical works making impressing contributions to many branches of anatomy and many other aspects of medicine.[56] Some of the works included classifying the system of the pulse, the discovery that human arteries had thicker walls then veins, and that the atria were parts of the heart. Herophilus's knowledge of the human body has provided vital input towards understanding the brain, eye, liver, reproductive organs and nervous system, and characterizing the course of disease.[57] Erasistratus accurately described the structure of the brain, including the cavities and membranes, and made a distinction between its cerebrum and cerebellum [58] During his study in Alexandria, Erasistratus was particularly concerned with studies of the circulatory and nervous systems. He was able to distinguish the sensory and the motor nerves in the human body and believed that air entered the lungs and heart, which was then carried throughout the body. His distinction between the arteries and veins—the arteries carrying the air through the body, while the veins carried the blood from the heart was a great anatomical discovery. Erasistratus was also responsible for naming and describing the function of the epiglottis and the valves of the heart, including the tricuspid.[59] During the third century, Greek physicians were able to differentiate nerves from blood vessels and tendons [60] and to realize that the nerves convey neural impulses.[54] It was Herophilus who made the point that damage to motor nerves induced paralysis.[61] Herophilus named the meninges and ventricles in the brain, appreciated the division between cerebellum and cerebrum and recognized that the brain was the "seat of intellect" and not a "cooling chamber" as propounded by Aristotle [62] Herophilus is also credited with describing the optic, oculomotor, motor division of the trigeminal, facial, vestibulocochlear and hypoglossal nerves.[63] 13th century anatomical illustration Great feats were made during the third century in both the digestive and reproductive systems. Herophilus was able to discover and describe not only the salivary glands, but the small intestine and liver.[63] He showed that the uterus is a hollow organ and described the ovaries and uterine tubes. He recognized that spermatozoa were produced by the testes and was the first to identify the prostate gland.[63] In the 2nd century, Galen of Pergamum, an anatomist, clinician, writer and philosopher,[67] wrote the final and highly influential anatomy treatise of ancient times.[68] He compiled existing knowledge and studied anatomy through dissection of animals.[67] He was one of the first experimental physiologists through his vivisection experiments on animals.[69] Galen's drawings, based mostly on dog anatomy, became effectively the only anatomical textbook for the next thousand years.[70] His work was known to Renaissance doctors only through Islamic Golden Age medicine until it was translated from the Greek some time in the 15th century.[70] Anatomy developed little from classical times until the sixteenth century; as the historian Marie Boas writes, "Progress in anatomy before the sixteenth century is as mysteriously slow as its development after 1500 is startlingly rapid".[70]:120–121 Between 1275 and 1326, the anatomists Mondino de Luzzi, Alessandro Achillini and Antonio Benivieni at Bologna carried out the first systematic human dissections since ancient times.[71][72][73] Mondino's Anatomy of 1316 was the first textbook in the medieval rediscovery of human anatomy. It describes the body in the order followed in Mondino's dissections, starting with the abdomen, then the thorax, then the head and limbs. It was the standard anatomy textbook for the next century.[70] Leonardo da Vinci (1452–1519) was trained in anatomy by Andrea del Verrocchio.[70] He made use of his anatomical knowledge in his artwork, making many sketches of skeletal structures, muscles and organs of humans and other vertebrates that he dissected.[70][74] In the United States, medical schools began to be set up towards the end of the 18th century. Classes in anatomy needed a continual stream of cadavers for dissection and these were difficult to obtain. Philadelphia, Baltimore and New York were all renowned for body snatching activity as criminals raided graveyards at night, removing newly buried corpses from their coffins.[79] A similar problem existed in Britain where demand for bodies became so great that grave-raiding and even anatomy murder were practised to obtain cadavers.[80] Some graveyards were in consequence protected with watchtowers. The practice was halted in Britain by the Anatomy Act of 1832,[81][82] while in the United States, similar legislation was enacted after the physician William S. Forbes of Jefferson Medical College was found guilty in 1882 of "complicity with resurrectionists in the despoliation of graves in Lebanon Cemetery".[83] The teaching of anatomy in Britain was transformed by Sir John Struthers, Regius Professor of Anatomy at the University of Aberdeen from 1863 to 1889. He was responsible for setting up the system of three years of "pre-clinical" academic teaching in the sciences underlying medicine, including especially anatomy. This system lasted until the reform of medical training in 1993 and 2003. As well as teaching, he collected many vertebrate skeletons for his museum of comparative anatomy, published over 70 research papers, and became famous for his public dissection of the Tay Whale.[84][85] From 1822 the Royal College of Surgeons regulated the teaching of anatomy in medical schools.[86] Medical museums provided examples in comparative anatomy, and were often used in teaching.[87]Ignaz Semmelweis investigated puerperal fever and he discovered how it was caused. He noticed that the frequently fatal fever occurred more often in mothers examined by medical students than by midwives. The students went from the dissecting room to the hospital ward and examined women in childbirth. Semmelweis showed that when the trainees washed their hands in chlorinated lime before each clinical examination, the incidence of puerperal fever among the mothers could be reduced dramatically.[88] An electron microscope from 1973 Before the modern medical era, the main means for studying the internal structures of the body were dissection of the dead and inspection, palpation and auscultation of the living. It was the advent of microscopy that opened up an understanding of the building blocks that constituted living tissues. Technical advances in the development of achromatic lenses increased the resolving power of the microscope and around 1839, Matthias Jakob Schleiden and Theodor Schwann identified that cells were the fundamental unit of organization of all living things. Study of small structures involved passing light through them and the microtome was invented to provide sufficiently thin slices of tissue to examine. Staining techniques using artificial dyes were established to help distinguish between different types of tissue. Advances in the fields of histology and cytology began in the late 19th century[89] along with advances in surgical techniques allowing for the painless and safe removal of biopsy specimens. The invention of the electron microscope brought a great advance in resolution power and allowed research into the ultrastructure of cells and the organelles and other structures within them. About the same time, in the 1950s, the use of X-ray diffraction for studying the crystal structures of proteins, nucleic acids and other biological molecules gave rise to a new field of molecular anatomy.[89] Equally important advances have occurred in non-invasive techniques for examining the interior structures of the body. X-rays can be passed through the body and used in medical radiography and fluoroscopy to differentiate interior structures that have varying degrees of opaqueness. Magnetic resonance imaging, computed tomography, and ultrasound imaging have all enabled examination of internal structures in unprecedented detail to a degree far beyond the imagination of earlier generations.[90] ^Rosner, Lisa. 2010. The Anatomy Murders. Being the True and Spectacular History of Edinburgh's Notorious Burke and Hare and of the Man of Science Who Abetted Them in the Commission of Their Most Heinous Crimes. University of Pennsylvania Press
null
minipile
NaturalLanguage
mit
null
Q: How to "return" to a specific page with a tab in a Controller? @RequestMapping(value = "/update/updateTask", method = RequestMethod.POST){ ... return "updateContract"; } How would I specify a page with a tab ? For example, what I need is "updatecontract#tab1". IF I specify that, it doesn't work. Help!! A: You need to use "redirect" in your return statement Example @RequestMapping(value = "/update/updateTask", method = RequestMethod.POST){ ... return "redirect:updateContract#tab1"; }
null
minipile
NaturalLanguage
mit
null
The city of Charlottesville plans to appeal its defeat in a lawsuit challenging the City Council’s decision to remove two downtown Confederate monuments. At the end of its meeting late Monday night, the council authorized the City Attorney’s Office to appeal the lawsuit once a final ruling comes down. The lawsuit has sat idle in Charlottesville Circuit Court since mid-September, but a hearing is scheduled for next week. The case started in 2017 after the council voted to remove a downtown statue of Robert E. Lee and then later added the statue of fellow Confederate Gen. Thomas “Stonewall” Jackson. A group of area residents filed a lawsuit in March 2017 claiming that the vote violated state code. By Jan. 1, none of the five councilors who made the vote will be in office. The city also has since lost at least a baker’s dozen of high-ranking officials including its city attorney, police chief and city manager. Judge Richard Moore ruled last month that the monuments do not send a racially discriminatory message and issued a permanent injunction preventing their removal.
null
minipile
NaturalLanguage
mit
null
Q: Combining lstinline escapes with a macro I tried to use the escapechar option with lstinline. In order to "activate it", I used the approach described here. However, when using it within a macro, it breaks. This is shown below. Is there a way to fix this? \documentclass{article} %for lstinline \usepackage{listings} %for highlighting \usepackage{xcolor} %to allow escapechar inside lstinline \usepackage{etoolbox} \makeatletter \patchcmd{\lsthk@TextStyle}{\let\lst@DefEsc\@empty}{}{}{\errmessage{failed to patch}} \makeatother %the example macro \def\mymacro#1{\lstinline[escapechar=§]|§#1§|} %for demonstration purposes \def\perfectly{perfectly} %highlight lstinline \lstset{ basicstyle=\ttfamily\color{blue} } \begin{document} \lstinline[escapechar=§]|works §\perfectly§| - listinline no more active \mymacro{doesn't work} - lstinline is still active here \end{document} A: If you really want to have this done via the listings-package: I don't know what TeX-engine you use (whether it is based on traditional TeX with single-byte/8bit-ASCII as internal character-representation scheme or it is based on XeTeX/LuaTeX with multi-byte-utf8/unicode as internal character-representation scheme). Therefore in the example below the single-byte -encoding latin1 is specified as input-encoding explicitly. If you wish to copy-paste the example for testing, make sure that the resulting text-file on your platform also is latin1-encoded. (Or adjust the call to the inputenc-package to that 8bit/single-byte-encoding in use on your platform.) As long as \mymacro does always get its arguments by reading and tokenizing portions of the .tex-input-file and does never get things passed as arguments by other macros (whereby things probably got tokenized under the wrong category-code-régime when the arguments were gathered for those other macros before passing them on to \mymacro), you can have \mymacro read and tokenize its arguments under verbatim-catcode-régime and then pass them, inclusive the call to \lstinline, to \scantokens. For having \mymacro read and tokenize its arguments under verbatim-catcode-régime I use the +v-argument-type provided by the xparse-package. The process is straightforward: \mymacro inside a newly opened local scope changes some category-codes and TeX-parameters. Then it calls \innermymacro. \innermymacro gathers three arguments under verbatim-catcode-régime and surrounds them with phrases (phrase 1: \lstinline[escapechar=§]|, phrase 2: §, phrase 3: |%), which at the time of defining \innermymacro also were gathered under verbatim-catcode-régime. This way you get a sequence in terms of tokens in verbatim-catcode-régime \lstinline[escapechar=§]|<Argument 1>§<Argument2>§<Argument3>|%. This sequence is passed on to \scantokens, prefixed by \endgroup so that the first thing that happens at the time when \scantokens re-tokenizes and processes things will be closing the local scope. \documentclass{article} % You need some 8bit-encoding with the listings-package: \usepackage[latin1]{inputenc} % xparse's verbatim-arguments are handy: \usepackage{xparse}% % To allow patching commands: \usepackage{etoolbox} % To typeset code-listings: \usepackage{listings} % To allow escapechar inside lstinline: \makeatletter \patchcmd{\lsthk@TextStyle}{\let\lst@DefEsc\@empty}{}{}{\errmessage{failed to patch}} \makeatother % For highlighting: \usepackage{xcolor} % The example macro's syntax: % % \mymacro{<stuff inside \lstinline before the LaTeX-escape>}% % {<stuff inside \lstinline inside the LaTeX-escape>}% % {<stuff inside \lstinline after the LaTeX-escape>}% % \newcommand*\mymacro{% \begingroup \catcode`\^^I=12\relax \catcode`\^^M=12\relax \newlinechar=\endlinechar\relax \innermymacro }% \NewDocumentCommand\innermymacro{+v+v+v}{% \RenewDocumentCommand\innermymacro{+v+v+v}{% \scantokens{\endgroup#1##1#2##2#2##3#3}% }% }% \innermymacro{\lstinline[escapechar=§]|}{§}{|%}% %for demonstration purposes \def\perfectly{perfectly} %highlight lstinline \lstset{ basicstyle=\ttfamily\color{blue} } \begin{document} \lstinline[escapechar=§]|works §\perfectly§| -- listinline no more active \mymacro{Before \LaTeX-escape. }% {{\frenchspacing Inside \LaTeX-escape: \perfectly.}}% { After \LaTeX-escape.} -- lstinline no more active \end{document}
null
minipile
NaturalLanguage
mit
null
BEIJING (Reuters) - China has sacked three officials for testing genetically modified rice on children as part of a Sino-U.S. research project, state media said on Thursday. The officials from the Chinese Center for Disease Control and Prevention and the Zhejiang Academy of Medical Sciences were sacked for violating regulations, scientific ethics and academic integrity, Xinhua news agency said. The controversial test first came to light when environmental group Greenpeace said a U.S. Department of Agriculture-backed study used 24 Chinese children aged between six and eight to test genetically modified "golden rice". Tufts University, located outside Boston, said it had begun reviewing its 2008 research in August and has a five-member team investigating whether the study was in compliance with Chinese, U.S. and Tufts standards. "While we respect China's review process which led to the statement, it would be premature for Tufts University to reach any conclusions before investigations currently under way in the United States are completed," university spokeswoman Andrea Goodman said in an e-mail. Golden rice, a new type of rice that contains beta carotene, is intended to alleviate vitamin A deficiency. The three officials who were fired are Yin Shi'an from the Chinese Center for Disease Control and Prevention, Hu Yuming from the center's Hunan office, and Wang Yin from the Zhejiang Academy of Medical Sciences, Xinhua said. The researchers had been criticized on Weibo, China's version of Twitter, and were accused of behaving unethically by running tests on poor, rural children whose families may not have been properly informed. China is already the world's largest grower of GMO cotton and the top importer of GMO soybeans. Although Beijing has approved homegrown strains of GMO rice, it is cautious about introducing the technology on a commercial basis due to food safety concerns. (Reporting by Koh Gui Qing; Additional reporting by Scott Malone in Boston; Editing by Michael Roddy)
null
minipile
NaturalLanguage
mit
null
Esophagectomy with three-field lymph node dissection for esophageal carcinoma with a nonrecurrent inferior laryngeal nerve. In rare cases, the inferior laryngeal nerve branches directly from the vagus trunk. A 58-year-old man with carcinoma of the thoracic esophagus was referred to our hospital. A nonrecurrent anomaly of the right recurrent laryngeal nerve associated with an aberrant right subclavian artery was detected preoperatively by computed tomography and magnetic resonance imaging. This artery ran on the right side between the esophagus and the vertebral column. Recognition of this nerve before upper mediastinal lymph node dissection was thought to be important for avoiding unexpected neural injuries. For a successful esophagectomy with three-field lymph node dissection in patients associated with this anomaly, a cervico-abdominal procedure followed by a thoracic procedure, which is the reverse of the usual process, could be useful for a safe operation. However, this anomaly made it difficult to dissect lymph node along the left recurrent laryngeal nerve.
null
minipile
NaturalLanguage
mit
null
What a good dog! Poppet Puppy sits so well on his soft little bottom! Look how excited he is to see friends! Those praline paws are splendidly squishy and everyone loves his funny flopsy ears. One thing’s for sure: he loves a good cuddle, and brings so much love to any new companion. Hand wash only; do not tumble dry, dry clean or iron. Not recommended to clean in a washing machine.
null
minipile
NaturalLanguage
mit
null
This invention relates to a sport device of the type used in striking a sport object and propelling it at a distance from the user and in particularly, an improved golf club wherein player control is enhanced. A number of sporting activities require the participant to grasp and move a sport device, be it a golf club, croquet or polo mallet in a controlled manner to strike and propel an object typically, a ball, toward a defined goal. In case of the game of golf, the goal is very much reduced in size so that very precise strokes are needed to ultimately place the sport object in the hole. The overall weight of the club determines whether or not the user has sufficient strength to handle the club. Adjustments to the overall weight are typically made by adding material at the handle and/or in the region where the clubhead or striking surface is joined to the end of the club shaft. In the case of golf clubs, this region proximate to the head is termed the hosel. While overall weight is significant for the user, performance is affected as well by the swing weight of the club. In the athletic goods industry, swing weight of a club refers to the relationship of the clubhead weight to the overall weight of the club. The swing weight scale has sixty gradations each of which signifies a certain ratio of weights apart from the overall club weight. As the clubhead weight increases with an increasing swing weight, the shaft bends more during the swing and the club swings heavier and slower. The traditional method of altering swing weight in a golf club is to disassemble the club and add or subtract lead in the hosel region where the head meets the shaft. However, the swing weight can also be altered during manufacture by adding weight to the handle region if the clubhead can no longer tolerate the removal of additional material. The combination of simultaneously changing clubhead and handle-region weights to accommodate a particular player's preference without altering the overall weight of the club has been suggested in the past. The adjustments needed to move several gradations on the swing weight scale are slight since one gradation is approximately equal to the weight of a dollar bill. An experienced golfer can typically sense a variation of three gradations in swing weight. While swing weight is important for the feel and performance of clubs used to propel the ball large distances, the significance thereof decreases when the distances are shorter. Stability of the club when within the player's grasp is increasingly important as the accuracy demanded of the club increases, the most sensitive club being the putter with which the ball is taken to the hole. The need for enhanced stability has generated a family of golf clubs wherein weight distribution within the club head has been altered without changing overall club weight or the swing weight. Primarily this occurred through the concentration of the head weight in regions on either side of the striker by making the surface area smaller or reducing its thickness. These steps to provide clubs with variable swing weights or altered clubheads have concentrated their efforts on maintain- ing the overall weight characteristics constant. These changes have relied upon the use of techniques acting within the length of the club and to this end have not directed their attention to providing stabilization by intentionally moving the center of gravity of the club closer to the hand-grip region of the club. Accordingly, it is an object of the present invention to provide sport clubs with improved stability especially those clubs wherein the need for accuracy is paramount. This invention enables the user to alter the distance with which the center of gravity of the club is moved along the shaft without requiring assistance from the manufacturer or a technician. Furthermore, this invention can be installed on existing clubs and still permit modification of the effect by the user according to his perception of the stabilizing effect required for his game.
null
minipile
NaturalLanguage
mit
null
Attention A T users. To access the menus on this page please perform the following steps. 1. Please switch auto forms mode to off. 2. Hit enter to expand a main menu option (Health, Benefits, etc). 3. To enter and activate the submenu links, hit the down arrow. You will now be able to tab or arrow up or down through the submenu options to access/activate the submenu links. Office of Public and Intergovernmental Affairs VA Reaches Medical Records Landmark WASHINGTON – The computerized patient record system of the Department of Veterans Affairs (VA), already a world leader among health care providers, has achieved a major milestone with the entry of its billionth “vital sign.” “This latest achievement attests to the capability and reliability of VA’s electronic health records,” said the Honorable R. James Nicholson, Secretary of Veterans Affairs. “VA sets the standard for patient record systems, and the ultimate winners are the veterans we serve.” Vital signs – data such as temperature, blood pressure, pulse, weight or pain levels – are routinely recorded for all VA patients. The nationwide system, known as VistA, collects more than 80,000 vital signs per hour during busy times, and the 995 vital signs entered in one minute during the morning of April 19 pushed the total over 1 billion. VA began consistently storing that information electronically on August 13, 1990. “No matter where or when a patient receives care within VA, complete records are available to health care providers throughout the system,” said Dr. Jonathan B. Perlin, VA’s Under Secretary for Health. “This ensures that the veterans we are privileged to serve receive the high-quality, comprehensive care they need when they need it.” VistA was developed by VA’s health care professionals and information technology experts. It is available free-of-charge to health care professionals in the United States. VA operates the nation’s largest integrated health care system, treating 5.3 million veterans last year at more than 1,400 sites of care, including hospitals, clinics and nursing homes.
null
minipile
NaturalLanguage
mit
null
Welcome to The Daily Sail Search Support Ocean race for midgets Today 60 21ft ocean going skiffs will set off across the Atlantic from France to Brazil What is the Mini Transat? Defying all manner of attempts to get itself banned in legislation heavy France, the Mini Transat is an utterly unique event in the yachting calendar. The event was created by Bob Salmon and first run from Penzance in 1977. Having witnessed the start of the 1976 Observer Singlehanded TransAtlantic Race (OSTAR), which at the time had no maximum length restriction and so included giants such as Alain Colas' 236ft four master Club Mediterranee, Salmon was intent on the idea of racing a boat across the Atlantic singlehanded, but could not afford one of the size considered the minimum by the OSTAR's organisers, the Royal Western Yacht Club. So the Mini Transat was born, as a rogue offshoot of the OSTAR in which there was just one rule - maximum size of the boats could be no greater than 21ft. Early races race from Penzance to Antigua, but in the late 1970s and early 1980s, the beginning of the French revolution in offshore racing was taking place spurred on by Eric Tabarly and a number of French sailing heroes. At this time there were many starry-eyed young French skippers who wanted to emulate the exploits of their heroes. Many went on to become great sailing legends in their own right in later years. Current French stars who have done well in the Mini Transat include Vendee Globe veterans Jean-Luc van den Heede (1977 and 1979), Isabelle Autissier (1987), Yves Parlier (winner in 1985), Michel Desjoyeaux (1991) and Thierry Dubois (winner in 1993), multihull sailors such as Bruno Peyron (1977), Loick Peyron (1979) and Laurent (1987) and Yvan Bourgnon (winner 1995) and Marc Guillemot (1989), even Whitbread winner Lionel Pean (1979). It has also been responsible for launching several careers in solo sailing for British sailors most notably Ellen MacArthur (1997), MEMBERSplease log in to read the full article. Password sharing is not permitted and is in breach of our Terms of Use
null
minipile
NaturalLanguage
mit
null
The FBI just got its hands on data that Twitter wouldn’t give the CIA The FBI has a new view into what’s happening on Twitter. Last week, the bureau hired Dataminr, a Twitter-linked analytics firm, to provide an “advanced alerting tool” to over 200 users. Twitter owns a 5 percent stake in Dataminr and provides it with exclusive access to the full “firehose” of live tweets, making it a valuable resource for anyone looking for illegal activity on the service. “Twitter is used extensively by terrorist organizations and other criminals to communicate, recruit, and raise funds for illegal activity,” the FBI wrote in a contracting document. “With increased use of Twitter by subjects of FBI investigations, it is critical to obtain a service which will allow the FBI to identify relevant information from Twitter in a timely fashion.” In order to identify that information, Dataminr agreed to provide its tool “to search the complete Twitter firehose, in near-real time, with customizable filters.” However, the FBI contract seems to violate a key clause in Twitter’s Developer Agreement, which specifically forbids using the provided data to "investigate, track or surveil Twitter’s users." In practice, that has often meant banning third-party companies found to be reselling data. This isn’t the first time Dataminr has run up against Twitter’s anti-surveillance clause. In May, Twitter revoked CIA access to Dataminr, a move that was taken as part of a larger ban on US intelligence agencies using the product. “Data is largely public,” Twitter said in a statement at the time, “and the U.S. government may review public accounts on its own, like any user could.” The Verge has asked Twitter to clarify whether the FBI constitutes a similar violation of the developer agreement. The company did not immediately respond.
null
minipile
NaturalLanguage
mit
null
For several days the top anti-Mafia bloggers in Italy have refrained from posting, in solidarity with a media strike to protest Berlusconi’s “gag” bill which if enacted, will inhibit media access to information on ongoing criminal investigations. Some 50,000 demonstrators took to the streets in Rome over the weekend. Yesterday, a huge arrest of Calabrian Mafia took place which included picking up the Calabrian godfather, Domenico Oppedisano-“il Capo di Capi”– the chief of chiefs, head of all of the southern clans. The wire services provided a mainstream account of the arrests, noting that the Italian government has issued reports that the organization– the ‘Ndragheta– is organized hierarchically, with great sophistication like the Cosa Nostra, as opposed to being a loose federation of families as has been thought. The complexity of mob hierarchy historically has prevented getting the cancer at the root. There were no posts on the Calabrian anti-Mafia blogs yesterday about the bust– evidently because the underground bloggers and journalists obtained copies of the government’s report, have their own sources, and were feverishly writing up stories. Accordingly a detailed and fascinating post on the Calabrian anti-Mafia coalition La Rete’s blog today discusses an interesting character referred to as “The Oracle,” a businessman and accountant, who appears to be operating as in insider within the Carbinieri and the special forces, the ROS, as well as being cozy with the Mafia to the extent that he warned them of the sweep five hours in advance. This guy is an amazing operative. Quotes from the investigation, in virtually incomprehensible Calabrese dialect, show him playing smoothly to the invesitagors, all the while alluding to the fact that the ‘ndragheta “are the worst pigs in the world” and yet is predictably so vast that the coup of the arrest is not a coup. A somewhat rough translation of the La Rete post on The Oracle follows (I really did try….): “The Oracle of Reggio has a name and a surname. John Zumbo, a businessman and accountant Reggio class 67 was the “oracle” of the Ndrangheta. He innformed members of the “society” of the investigation against them and operations that were to be carried out against them shortly beforehand.. Much emerges from the intercepted conversations that the same Zumbo had with the members of the Ficara and Pelle clans and the head cheese Domenico Oppedisano. By not being part of the organization, Zumbo reinforced it with the right information and predictions; in particular, shortly before the operation Reale, the accountant had guaranteed boss Giuseppe Pello that he could announce the beginning of the bust five hours in advance. All of this means, in fact, that Zumbo functioned like a true oracle; a procession of ndranghetisti was kept from leaving their residences during a search and were subsequently arrested, according to information about the investigation by the police and judicial officials. This is disturbing because Zumbo, not being personally involved in the investigation, has to have obtained information in another manner. : He called himself, in conversation with Pelle in the apartment of the latter, “lo sbirro.” — the cop. The same Zumbo, apparently, was aware of the Patriarch operation, a very big branch of the Crimine, which he personally knew by name– which gangs would be involved and above all that the investigators were rushing to intercept the Polsi summit (convocation of Calabrian mobsters) of 2007. “We heard this “sotto voce” at the Lady of the Mountain, when we refuted new charges, around 2006; we heard this, (yet)we made films, started a bordello…” said Ficara, talking with Zumbo. . From Ficara’s words, therefore, emerges that the news was immediately diffused to the interior of the organization and and for this reason a series of persons from the area of Milano were already untraceable…. And still Ficara denies: “Ah these charges…, what things. At the end of the previous year I was ignorant of these things. I did not have, nor did I know… I didn’t know that these existed. Then one by one the little scams like this. I have said no…We have dealt with all the microscopic bugs.” In sum the ndranghetisti knew everything regarding the investigation and were still not worried. And the same Ficara that spoke with Pelle about the Patriarchy operation and reassured him of the reliability of his sources, or better, of those of Zumbo, asserts that “two or three people know that I am ROS and they know that I am Secret Service.” So John Zumbo was the informant through a system of information to the Ndrangheta, while the source was another. Zumbo, however, was well aware of the personal qualities of his associates; he himself says: “I’m still part of a system that is much, much more extensive than that … … but I tell you one thing and see that I speak it in all honesty. “ “These are worst pigs in the world. And I am an honest person and I know to be honest. Many times what one should do is done and what one shouldn’t isn’t done, because I can’t avoid it, but I feel sure that if I don’t, the “cold” will come!” -trans jra July 14, 2010 The intercepted conversation demonstrates the Mafia’s “coldness”– liberally “whacking” those in its way– that it laughs in the face of all attempts to shut it down. The “Oracle” himself is crafty enough to be untouchable, and a braggard. Hats are off to the bloggers who have the cajones to post the not so subtle realities of what it means to try to put a dent in organized crime in southern Italy. The chokehold continues. Those of you who believe in synchronicity might find it interesting that I was working on my novel yesterday, writing about an undercover Calabrian operation netting big fish, with of course, absolutely no idea that something big was going down on the other side of the world even as I was imagining it! Quel chance. History is writing itself and falling into my hands even as I explore what it might be like to be dealing with all of this in person living in a fishing town on the toe of the boot as an expat writer drawn into all of it. ??? Italian police mounted one of the biggest crackdowns ever on the shadowy ‘Ndrangheta mafia today, seizing assets worth millions of euros and arresting 300 people including the organisation’s alleged boss of bosses. The raids, in which 3,000 officers took part, were part of an investigation which has allowed a glimpse of the Calabrian mafia’s new pyramid power structure and exposed its creeping control over businesses and politicians in northern Italy, where 160 of the arrests were carried out. The Italian senate stood to applaud the arrests, which were described by the interior minister, Roberto Maroni, as “absolutely the most important operation against the ‘Ndrangheta in recent years”. The arrests of leading members of many of the group’s 150 clans, on charges ranging from murder to drugs and arms trafficking to loan sharking, was a blow “to the heart of the ‘Ndrangheta’s organisational and financial structure,” added Maroni. Once a poor relation of Sicily’s Cosa Nostra and the Neapolitan Camorra, the ‘Ndrangheta started life kidnapping for ransom and hiding its victims in the mountainous wilds of Calabria before it entered the cocaine trade in partnership with Colombian cartels and built its revenue to an estimated €44bn, equal to the combined GDP of Slovenia and Estonia. With clan affiliation based on blood lines, turncoats have been rare and the ‘Ndrangheta has kept a low profile, with the notable exception of the massacre of six men in Duisberg, Germany, in a clan feud in 2008. Magistrates believed the group was organised in a loose, federation with no overall leader. But after yesterday’s dawn raids investigators said they now believe that, as it has grown, the ‘Ndrangheta has adopted a pyramid-shaped hierarchy similar to Cosa Nostra, and was led by Domenico Oppedisano, 80, who was taken into custody in Rosarno, Calabria. Oppedisano was reportedly appointed head of the organisation at the marriage of two children of bosses in August 2009 and assumed power at a banquet held at a shrine to the Madonna last September. In one wiretapped conversation he talked of 1,000 affiliates attending one mob congress. Oppedisano was “the reference point for the entire organisation”, brokering peace among factions in the south and dividing up public works contracts in northern Italy, police said. But wiretaps also revealed him to be a consensus seeker. “For the love of God, when you make a proposal, you listen to the others to see what they think,” he told one mobster. Oppedisano’s rule extended to Genoa where his local commander, fruit and vegetable trader Domenico Gangemi, was arrested, and to Milan, the new economic hub for the ‘Ndrangheta, where mob-backed businesses have allegedly sought building contracts for the city’s Expo in 2015. In a region that has traditionally ridiculed the south for its fear of the mafia, local businesses were too scared to inform the police of any of hundreds of episodes of intimidation and extortion uncovered by investigators. Mob justice was equally tough on dissidents within the ranks. In 2008, Milan boss Carmelo Novella was murdered in a bar after he sought to break free from the control of his elders in Calabria. Investigators said that in addition to the arrest of the mob’s current number one in Lombardy, Pino Neri, a number of local politicians, a health authority chief and four police men were under investigation for collaborating with the ‘Ndrangheta. Such was the mob’s sense of impunity in the north that a get together last October was held in a hall named after Giovanni Falcone and Paolo Borsellino, a pair of magistrates murdered by the Sicilian mafia.Despite speaking in thick dialect to thwart police wiretappers, today’s ‘Ndrangheta mobsters are polished gangsters, said Calabria-based magistrate Giuseppe Pignatone. “This is the second and third generation,” he said. “They are graduates and can count on a network of professionals, bureaucrats and politicians and therefore have the ability to infiltrate any part of Italy and abroad.” Please visit award-winning, published writer Jenne’ Andrews ‘ new WordPress blog at http://www.loquaciouslyyours.com . Click the “comment” link at the bottom of any post, and sign up to receive an e-mail flash of new content.
null
minipile
NaturalLanguage
mit
null
WA Architecture Award Winners Announced Celebrating the state’s best buildings, from hostels to high schools. Willetton Senior High School 1/4 East Pilbara Arts Centre 1/4 Boranup House 1/4 Published on 24 June 2017 by Clare Ryan It was clever design and sustainable architecture for the win at last night’s WA Architecture Awards. The state’s architecture community gathered at Crown Perth to recognise this year’s recipients of the prestigious named awards, Architecture Awards or a Commendation. This year’s highest accolade, the George Temple Poole Award, was awarded to Willetton Senior High School. The school also won the Hillson Beasley Award for Educational Architecture. Designed by HASSELL the project was noted as a significant contribution to the advancement of educational architecture in WA. Suzanne Hunt, WA President of the Australian Institute of Architects, was thrilled that Willetton Senior High School won the award, citing that students were vital to the future of both the state and the industry. The Leighton Beach Change Rooms and Kiosk (by Bernard Seeber), The Guildford Hotel (by Fratelle Group) and the Perry Lakes Redevelopment Project (by CODA Studio) not only received attention from their local communities during development, but also caught the eye of the judges with all three winning commendations in their categories. Projects in regional WA were also celebrated. The East Pilbara Arts Centre by Officer Woods Architects awarded the Jeffery Howlett Award for Public Architecture, as well as commendations for Sustainable Architecture and the Colorbond award for Steel Architecture. The Australian Institute of Architects WA Architecture Awards entries exhibition is in the lobby of Allendale Square (77 St Georges Terrace, Perth) runs till Friday June 30th. The exhibition is open from 9am to 5pm Monday to Friday.
null
minipile
NaturalLanguage
mit
null
Q: S3 Checkpoint with Structured Streaming I have tried the suggestions given in the Apache Spark (Structured Streaming) : S3 Checkpoint support I am still facing this issue. Below is the error i get 17/07/06 17:04:56 WARN FileSystem: "s3n" is a deprecated filesystem name. Use "hdfs://s3n/" instead. Exception in thread "main" java.lang.IllegalArgumentException: java.net.UnknownHostException: s3n I have something like this as part of my code SparkSession spark = SparkSession .builder() .master("local[*]") .config("spark.hadoop.fs.defaultFS","s3") .config("spark.hadoop.fs.s3.impl", "org.apache.hadoop.fs.s3native.NativeS3FileSystem") .config("spark.hadoop.fs.s3n.awsAccessKeyId","<my-key>") .config("spark.hadoop.fs.s3n.awsSecretAccessKey","<my-secret-key>") .appName("My Spark App") .getOrCreate(); and then checkpoint directory is being used like this: StreamingQuery line = topicValue.writeStream() .option("checkpointLocation","s3n://<my-bucket>/checkpointLocation/") Any help is appreciated. Thanks in advance! A: For checkpointing support of S3 in Structured Streaming you can try following way: SparkSession spark = SparkSession .builder() .master("local[*]") .appName("My Spark App") .getOrCreate(); spark.sparkContext.hadoopConfiguration.set("fs.s3n.impl", "org.apache.hadoop.fs.s3native.NativeS3FileSystem") spark.sparkContext.hadoopConfiguration.set("fs.s3n.awsAccessKeyId", "<my-key>") spark.sparkContext.hadoopConfiguration.set("fs.s3n.awsSecretAccessKey", "<my-secret-key>") and then checkpoint directory can be like this: StreamingQuery line = topicValue.writeStream() .option("checkpointLocation","s3n://<my-bucket>/checkpointLocation/") I hope this helps!
null
minipile
NaturalLanguage
mit
null
Prerequisites After this track, what will my level be? Track Summary Coming from a Symfony background, Drupal 8 looks like a developers playground. The code you write is less magic, you can override anything, and the debugging tools are amazing. And to make things sweeter, all the skills you'll need to master Drupal 8 - OO, namespaces, services, etc - are global skills that will make you more dangerous in anything you use. The goal of this track is simple: prepare you for the new object-oriented paradigm and keep going until you've positively mastered the nuts and bolts behind how Drupal 8 actually works. The Plan 1) OO Prerequisites If you're getting your feet wet with OO code, PHP namespaces or dependency injection, start here. By the time you get to the Drupal 8-specific stuff, you will fly! 2) Dive into D8 Now we get to the good stuff. Not how to use Drupal 8, but deeper: how D8 works. And for the themer in your life, let them learn Twig and code along with the coding challenges. And don't forget the extra credit!
null
minipile
NaturalLanguage
mit
null
Q: Is it possible to disable kubernetes dashboard tls check I am login kubernetes dashboard in my local machine(http://kubernetes.dolphin.com:8443/#/login), and I define a virutal domain name in /etc/hosts: 192.168.31.30 kubernetes.dolphin.com and now I am login kubernetes dashboard uing this domain, but it give me tips: Insecure access detected. Sign in will not be available. Access Dashboard securely over HTTPS or using localhost. is it possbile to close kubernetes dashboard(kubernetesui/dashboard:v2.0.3) tls security check in kubernetes dashboard yaml? Because my kubernetes in localhost machine and do not need TLS security.Now my login dashboard look like this. A: enable kubernetes dahboard http access: containers: - name: kubernetes-dashboard image: 'kubernetesui/dashboard:v2.0.3' args: - '--namespace=default' - '--insecure-port=5443' so you could using 5443 port to forward kubernetes dashboard access data, and do not need to login. But you should not do like this in production environment.
null
minipile
NaturalLanguage
mit
null
Q: How to copy entire sheets from large excel files without parsing them using Apache POI? I am new as an official user, I always found my answers here but now I have got to ask. I am working with the last apache-poi 3.8 release (from 2012/03/26) and I have to manipulate a single file with multiple sheets in which only one contains a big amount of data (over 1000 columns and 10 000 rows). I only need to had more columns to the big sheet. Therefore, with the current tools that exist I should use SAX to read it and SXSSF to rewrite it. The Excel file is already preformatted with different styles and images in every sheet therefore it will be helpful to be able to make a copy of the file without the big sheet. There goes my question: How can I make a copy of sheet with SAX (from the input stream in ) without parsing it? I tried to do like in here but the field sheets in XSSFWorkbook has a visibility set to private. The awesome thing would be to have something like a SXSSFWriter.SheetIterator if it is in future plans for POI Developers. Thanks for reading, Arthur **Update** The file is too big to be able to open it as a common XSSFWorkbook (OutOfMemoryException). Could it be possible to create and XSSFSheet from an InputStream? Like in the following: XSSFReader.SheetIterator iter = (XSSFReader.SheetIterator) xssfReader .getSheetsData(); int index = 0; while (iter.hasNext()) { InputStream stream = iter.next(); String sheetName = iter.getSheetName(); if (!sheetName.equalsIgnoreCase("BigSheetThatIDontWant")) { Sheet newSheet = new XSSFSheet(stream); stream.close(); } ++index; } Thanks a lot for your answers. A: You will have to read the file. Regarding second question see public java.util.Iterator<XSSFSheet> XSSFWorkbook.iterator() Allows foreach loops: XSSFWorkbook wb = new XSSFWorkbook(package); for(XSSFSheet sheet : wb){ }
null
minipile
NaturalLanguage
mit
null
Activated oxygen species produced by photoexcited furocoumarin derivatives. Furocoumarin derivatives (FCD) are investigated in order to determine their ability to photosensitize the production of activated oxygen species. Using the method based on the specific singlet oxygen (1O2) oxydation of cholesterol, all FCD except bergaten appeared to be able to produce 1O2 with various efficiencies. EPR spin trapping experiments show that photoexcited FCD produce hydroxyl radicals as detected by the formation of a DMPO-OH signal which can be abolished when the photosensitization reaction is carried out in the presence of specific OH scavengers. Moreover, the photo-ejection of hydrated electron (e-) by FCD is demonstrated by the loss of paramagnetic absorption of nitroxide free radicals as e- trap.
null
minipile
NaturalLanguage
mit
null
407 A.2d 655 (1979) DISTRICT OF COLUMBIA, Appellant, v. M. E. K., Appellee. No. 79-203. District of Columbia Court of Appeals. Argued September 20, 1979. Decided October 15, 1979. *656 David P. Sutton, Asst. Corp. Counsel, Washington, D. C., with whom Judith W. Rogers, Corp. Counsel, Louis P. Robbins, Principal Deputy Corp. Counsel, Washington, D. C., at the time the brief was filed, and Richard W. Barton, Deputy Corp. Counsel, Washington, D. C., were on the brief, for appellant. Shelly Finch, Washington, D. C., for appellee. Before NEWMAN, Chief Judge, and FERREN and PRYOR, Associate Judges. FERREN, Associate Judge: This interlocutory government appeal presents one question: whether the government established probable cause based on an informant's tip under the two-pronged test set forth in Aguilar v. Texas, 378 U.S. 108, 114, 84 S.Ct. 1509, 12 L.Ed.2d 723 (1964), and Spinelli v. United States, 393 U.S. 410, 413, 89 S.Ct. 584, 21 L.Ed.2d 637 (1969). The informant's "veracity" is uncontested. The motions judge found, however, that the "basis of knowledge" prong of the Aguilar-Spinelli test had not been met because the arresting officers, upon arriving at the scene, had not observed appellee either at the precise location or engaging in the illegal drug sale reported by the informant. Accordingly, the judge granted appellee's motion to suppress the Preludin tablets seized incident to appellee's arrest. Because the arresting officers need not personally corroborate a reliable informant's tip if the informant states that he personally has witnessed the illegal activity, we reverse. I. At approximately 7:30 p. m. on or about January 6, 1979,[1] Metropolitan Police Detective Ross E. Swope received a telephone call at Third District Headquarters from a person who identified himself as a known police informant. The informant had provided reliable information to Drug Enforcement officers on six previous occasions.[2] The informant told Detective Swope that he had "observed a subject in front of the Republic [Restaurant] selling Bam[]."[3] The informant described the individual as "a Negro male, 17 to 18 years old, approximately five feet six inches tall, with a slim build . . . [who] was wearing a light blue, denim-type windbreaker and a black and white knit cap and black and white tennis shoes." Within 15 to 20 minutes after receiving the call, Detective Swope and another officer, Detective Larry Thomas, drove to the Republic Restaurant and saw appellee, M. E. K., crossing the street. M. E. K. matched the informant's physical description in every detail. M. E. K., however, *657 was neither standing directly in front of the restaurant nor selling anything when the officers observed him. They placed him under arrest; a contemporaneous search resulted in the seizure of 17 pink tablets which the officers identified as Preludin. The government brought a juvenile proceeding against M. E. K., charging him with possession of a controlled substance (Preludin) with intent to distribute or dispense, in violation of 21 U.S.C. § 841 (1976). See District of Columbia v. P. L. M., D.C.App., 325 A.2d 600 (1974). After a hearing at which only Detective Swope testified, the judge granted M. E. K.'s motion to suppress the seized tablets. The government filed this interlocutory appeal pursuant to D.C. Code 1973, § 23-104. II. In Rutledge v. United States, D.C.App., 392 A.2d 1062 (1978), we recently summarized the criteria for judging probable cause based on data supplied by an informant, rather than by observation of the arresting officer. Aguilar-Spinelli requires that when probable cause is to be justified by an informant's tip, it must be established by sufficient evidence (1) that the informant had a sound basis for his knowledge of the particular, reported criminal activity, and (2) that the informant himself is a truthful person. [Rutledge, supra at 1065.][4] In the present case, the informant's veracity is not questioned, but the motions judge held that the government had not satisfied the "basis of knowledge" criterion. More specifically, relying on Nance v. United States, D.C.App., 377 A.2d 384 (1977) and Rushing v. United States, D.C.App., 381 A.2d 252 (1977), the judge granted the motion to suppress because she found that the arresting officers had not been able to corroborate either the exact location or the illegal activity specified in the informant's tip. On appeal, the government contends that our recent decision in Rutledge, supra, supports its position that the knowledge criterion is satisfied where, as here, the informant's tip is based on his own personal observation. We agree with the government. Our decisions recognize that the knowledge criterion is satisfied when "the informant's tip [is] based on personal knowledge acquired by first-hand observation." Rutledge, supra at 1065.[5] Here, as in Rutledge, supra, the informant stated that he personally had observed a described individual in front of the Republic Restaurant. The motions judge's reliance on Rushing, supra, and Nance, supra, is misplaced. In those cases, the knowledge criterion was not met because there was no direct indication as to how the informant had obtained the information, and the description of the suspect and the circumstances were otherwise insufficient to provide assurance that the informant had personally witnessed the transaction or otherwise "gained his information in a reliable way." Spinelli, supra, 393 U.S. at 417, 89 S.Ct. at 589 (footnote omitted).[6] *658 In the present case, the fact that the police observed appellee crossing the street near the restaurant, rather than standing in front of it where the informant had observed the sale, does not undercut the basis of knowledge established by the informant's personal observation of the described individual making the sale.[7] Reversed. NOTES [1] The record gives several dates for the challenged arrest and seizure: January 8, 1979 (tr. at 3); January 7, 1979 (appellee's motion to suppress); January 6, 1979 (tr. at 5, 20) (petition; appellant's opposition to motion to suppress). [2] On those six occasions, the informant had furnished information leading to the arrest of two individuals and the seizure of four types of narcotics worth over $5,000. The informant had never, to Detective Swope's knowledge, provided information that later proved false or unreliable. [3] "BAM" is a street term for phenmetrazine, also known as Preludin. [4] This court has endorsed two shorthand expressions, "basis of knowledge" (or "knowledge") and "veracity" for the first and second Aguilar-Spinelli criteria, respectively. Nance v. United States, D.C.App., 377 A.2d 384 (1977). We use that terminology in this opinion. [5] E. g., United States v. Davis, D.C.App., 387 A.2d 1091 (1978) (informant's basis for knowing suspect was selling BAM was that he had seen appellee sell pills from her purse "shortly before"); Smith v. United States, D.C.App., 348 A.2d 891 (1975) (informant stated that he had watched suspect selling tin foil packets from a cigarette package); Banks v. United States, D.C.App., 305 A.2d 256 (1973) (informant stated that he "personally knew" the suspect had "dope" on him). [6] In Rushing, supra at 256-57 (footnote omitted), there was "no evidence" indicating how the caller obtained her information or on what grounds she concluded that the defendants were selling narcotics." In Nance, supra at 387, the informant's statement that the suspect "was selling bam" did not indicate that the informant personally had observed the sale, and the information provided to the police was not otherwise detailed enough to assure that the informant was "`relying on something more substantial than a casual rumor circulating in the underworld or an accusation based merely on an individual's general reputation.'" (quoting Spinelli, supra, 393 U.S. at 416, 89 S.Ct. 584). Although "personal observations are the most frequently endorsed ground for finding an informant's report to be soundly based," Rutledge, supra at 1065 (citations omitted), the Supreme Court has made clear that the knowledge criterion need not be satisfied by first-hand knowledge; the informant's own reliance on hearsay may, in some circumstances, provide sufficient reliability. See Spinelli, supra 393 U.S. at 416-17, 425, 89 S.Ct. 584. [7] This case, accordingly, is not one in which, despite the informant's reported personal knowledge of the illegal activity, the suspect is too remote from the scene to justify a finding of probable cause.
null
minipile
NaturalLanguage
mit
null
'Skills for growing up': supporting autonomy in young people with kidney disease. End-stage kidney disease (ESKD) may interfere with children's developmental task of acquiring autonomy and participation. The Skills for Growing Up tool encourages normal development towards independence and autonomy during paediatric rehabilitation. This study aimed to adapt this self-management tool for use in paediatric nephrology, and to test whether its use is feasible in daily practice. A Delphi study was conducted among patients, their parents, professionals and experts to adjust the tool for use in nephrology. Feasibility was studied through individual and group interviews with professionals in all Dutch paediatric nephrology centres. Agreement was reached on the areas of social participation and medical management of ESKD. Compared with the original, the new instrument holds considerable more attention for autonomy in the renal healthcare area; for example, dealing with medication and transplantation. Professionals used and appreciated the tool, but the paper form was seen to limit feasibility. Making the tool available online is important. The challenge for professionals is to move beyond the focus on medical management and to consider developmental tasks when coaching their patients into adulthood. The Skills for Growing Up-Nephrology (SGU-N) tool is a promising instrument for use by professionals in paediatric nephrology. Its use can help young people achieving autonomy and may contribute to their successful transition to adulthood and adult care.
null
minipile
NaturalLanguage
mit
null
Heterotopic gastrointestinal mucosa in the oral cavity of adults. Heterotopic gastrointestinal mucosa (HGM) is a rare entity observed in the head and neck region and occurs more frequently in male infants and children. The floor of the mouth and anterior aspects of the tongue are the most commonly affected sites. Histologically, HGM resembles gastric, intestinal or colonic mucosa with areas of squamous epithelium, which can be cystic or solid. In the current report, 2 cases of HGM affecting the oral mucosa in patients over 35 years of age are presented, and one of these cases presented 2 nodules in different locations. Both cases represented solid lesions instead of the more common cystic presentation showing gastric glandular-type tissue that was lined with pseudostratified columnar epithelium containing crypts and fundic glands. Immunohistochemical analysis revealed positive expression of cytokeratins 7, 8 and 18 and smooth muscle actin (SMA). In both cases, the final diagnosis was HGM, and conservative surgical excision was performed.
null
minipile
NaturalLanguage
mit
null
Battery cables are typically attached to the terminal post of a battery using a clamp type battery connector. These connectors include a barrel portion for accommodating a stripped end of the battery cable and a clamping portion which is positioned about the upstanding terminal post. The clamping portion may be tightened around the terminal post to provide secure connection thereto. The clamping portion of most battery connectors includes a pair of arms defining a circular portion therebetween which may be positioned around the battery terminal post. The ends of the arms may be brought together with a fastening device such as a nut and bolt to tightly secure the arms about the battery post. The art has also seen a number of quick connection clamp type cable connectors where clamping is facilitated by an actuator attached to the clamp. This enables the user to connect the cable to the battery terminal post without need of operating a fastener such as a nut and bolt. Many of these quick connect battery connectors employ a lever arm which is attractable to bring two halves of a clamp connector together about the upstanding battery post. However, certain disadvantages are inherent in these types of two-piece lever actuated connectors. First and foremost, the connector must include two connector components which must be attached to one another so that they are movable about the battery terminal post upon actuation of the lever. In addition, these lever type battery connectors provide for urging the connector components together around the battery post upon actuation of the lever. Release of the lever does not affect reverse movement of the component so as to facilitate removal of the battery connector from the post. It is, therefore, desirable to provide a clamp type cable connector for attachment to a battery terminal post where the connector includes an actuation mechanism which clamp and unclamps the connector to the terminal post.
null
minipile
NaturalLanguage
mit
null
The story of Sarah Palin's anointing by Bishop Thomas Muthee was posted on this site on September 5th, and in the related Bruce Wilson video. Muthee's testimony about transforming Kiambu, Kenya by driving out a witch has now been picked up by press around the world including the London Times and Countdown by Keith Olbermann. The most significant aspects of this story are being missed, especially policy impact of the 1999 "Transformations" video documentary originally discussed in the story. Some journalists have steered the emphasis on Palin's churches toward the denomination of the Assemblies of God and away from the Third Wave and New Apostolic Reformation. This is unfortunate, as the significance of both Thomas Muthee and the other activities at Palin's churches does not concern the Assemblies of God or speaking in tongues, but is rooted in the growth of an independent apostolic network that is being rapidly institutionalized worldwide. To understand Palin's churches, attention should be turned toward the Third Wave and the New Apostolic Reformation. The Muthee story was featured on a video, Transformations, produced in 1999 by George Otis, Jr. and the Sentinel Group. This video, as well as later media produced by Sentinel Group, presented documentation for the effectiveness of some of the activities of the Third Wave. These activities included the use of spiritual mapping to expel territorial demons from their strongholds. This new tool for evangelical missionary work was popularized by Otis and C. Peter Wagner, former professor of Church Growth at Fuller Theological Seminary. Wagner has continued in the years since to further institutionalize this movement and has given it the name, New Apostolic Reformation. This movement has taken root in numerous Assembly of God churches around the world but is not synonymous with that denomination or any other. The movement is, in fact, drawing people from across the spectrum of Christianity. Leadership defines the movement as the independent, post-denominational, unified church of the end times. Before describing the Transformations video and its significance, it is important to again note that this movement is not synonymous with the Assemblies of God or any other denomination. The burdensome terminology of Third Wave/New Apostolic Reformation is repeatedly used throughout this series of articles because the terms represent two slightly different meanings. The term Third Wave was coined over two decades ago to describe a loosely linked network of groups that remained or were reemerging from a movement called Latter Rain that was denounced as heresy by the Assemblies of God in 1949. In recent years these groups have coalesced into a much larger and more institutionalized structure. A central figure in the movement is C. Peter Wagner, founder of Global Harvest Ministries and the World Prayer Center in Colorado Springs. In the late 1990s Wagner gave the name New Apostolic Network to his organization which now includes over 500 Apostles under his authority, or Apostolic Covering, in the International Coalition of Apostles. Some of these Apostles also have hundreds or even thousands in their own networks. There are numerous other interconnected apostolic networks around the world tied to this movement by their common belief system and also interconnected activities, conventions, media, schools, and parachurch ministries. [image above, right: Kalnins and Muthee show off John Bevere books they distributed in Africa] Wasilla Assembly of God, where Sarah Palin attended until 2002 and continues to visit, and Juneau Christian Church, where Palin attends when in residence at the capital, have close links to major leadership and organizations in this movement. Ed Kalnins, seen in the above pictures with Thomas Muthee, is senior pastor at Wasilla Assembly of God. The books they are distributing are by Rick Joyner, founder of MorningStar Ministries, and John Bevere. Wasilla Assembly of God has very close ties with Morningstar and uses curriculum in their Master's Commission program produced by Morningstar's prophecy director, Steve Thompson, and curriculum by John Bevere. The Transformation I video features the story of four cities that the narrator, George Otis, Jr, claims have been transformed through the power of intercessory prayer and the expulsion of demons. The video served the purpose of introducing the revolutionary new evangelizing methods developed by C. Peter Wagner and his colleagues. The use of Strategic Level Spiritual Warfare to expel territorial demons is facilitated by Spiritual Mapping and then intercessory prayer and fasting. The World Prayer Center in Colorado Springs developed by Wagner and Ted Haggard houses the computer systems for organizing the prayer intercessors as well as the Spiritual Mapping media. The video was based on the book Breaking the Strongholds in Your City: How to Use Spiritual Mapping to Make Your Prayers More Strategic, Effective and Targeted.See the second book review for a good summary. The first Transformations video featured the successes of this spiritual warfare process in four cities - Cali, Colombia; Kiambu, Kenya; Hemet, California; and Almolonga, Guatemala. The videos claim to show dramatic transformations in each of these cities after groups of born again believers target the source of the demonic influence and then use intercessory prayer to drive out the demons. George Otis, Jr., the narrator states that the witch claimed to be a Christian and had a sign for the Emmanuel Clinic on her property. Muthee believed that God had pointed out this woman as the source of witchcraft and spiritual oppression that was keeping the town from receiving the gospel. The movie shows celebrating believers in the streets after the woman has been driven from town. Otis claims that after the believers took authority over the town, all the bars were remodeled into churches, crime and alcoholism were reduced, and the town began to enjoy a new prosperity. The third town featured in the movie is Hemet, California. Otis and two local pastors narrate the supposed transformation of this Hemet/San Jacinto area from a center of Satanism, witchcraft, Moonies, Transcendental Meditation, and Scientology. He reports that Hemet had serious gang and drug problems. In this segment Otis describes how Spiritual Mapping was used to direct the prayer intercessors in fighting the strongholds of the enemy. Pastor Bob Beckett of the Dwelling Place Church organized intercessory prayer to save the city. Otis reports, "The Transcendental Meditation center was literally burned out. Shortly after the intercessors prayed for its removal, a brush fire started on the mountain on the west side of the valley. It burned only the Transcendental Meditation facility and didn't touch any of the buildings on either side." Consequently Otis claims that the drug trade dropped 75% and many gang members as well as other residents have been saved. Beckett states that the city now has "a professing mayor, a professing police chief, a professing fire chief, and a professing city manager." The mayor, Debbie Cornett, is interviewed and states, I feel that God called me to this...I see him opening doors to more churches, more Christians, to really bring them together and say you want Christians in leadership." Pastor Beckett adds that the city now has an exceptional number of high school teachers, coaches and principals that are believers and that now nearly 85% of staff candidates are Christians. (Beckett also authored a chapter in C. Peter Wagner's book, Breaking Strongholds.) Pastor Gordon Houston states that God has turned the school system around. The last city segment features Almolonga, Guatemala. Otis begins this segment by claiming that Almolongo is now 80% born again after the transformation of this town of about 19,000. Again he tells of a town in the grip of demonic strongholds, this time the demons of folk deities and syncretism. He states that previously the gospel could not take hold and evangelical Christians were a despised minority. Again a group of intercessors prayed and "after many signs and wonders and deliverances from demonic possession" the town was transformed. Otis then catalogs the miraculous changes in this once poor town plagued with crime and alcoholism. He claims that all four jails have been closed as there is no longer crime. Two dozen evangelical churches have replaced 36 bars and cantinas. The streets and buildings have been renamed after biblical places. But more remarkably Otis claims that this spiritual transformation has healed the land and revived the agricultural economy. Harold Cabelleros, founder of El Shaddai Church in Guatemala City, claims that Almolonga farmers now have three harvest per year, and that once God came to town, the harvest time for a radish dropped from 60 days to 40, and then 25. He continues to say, "There is a parallel between people's faith and improving the soil. At the same time people started believing in Jesus Christ as their Savior, the vegetables started growing." Gigantic vegetables are shown as evidence of the transformation. Mell Winger adds, "The wisdom that God gave the farmers in Almolonga produced a better crop than the scientific method yielded." The Protestant churches are described as very active and very militant with many members still fasting as often as three times a week and continuing to assault the forces of darkness. Cabelleros also contributed to Wagner's 1993 book, Breaking Strongholds in Your City. Mell Winger was the director of the Bible Institute at El Shaddai Church in Guatemala City and later served with Ted Haggard at New Life Church, which shares the campus of the World Prayer Center. See Richard Bartholomew's Notes on Religion. This video has been shown all over the world and has helped to popularize the idea that spiritual transformation through spiritual mapping, intercessory prayer, and the expulsion of demonic influences is the only effective method of transforming society. Transformation became a buzzword that was used by not only the Third Wave and New Apostolic Reformation movement, but by those who believe that only faith-based transformation and placement of born again Christians in leadership results in true societal change. investigated the film's claims about the other three towns targeted with spiritual mapping? Did Hemet's gang and drug problems really clear up and stay that way? Have the two dozen new churches really eliminated 36 bars and cantinas in Almolonga and how is the agriculture there these days? And what were the claims about Cali, Colombia? There are quite a few sites online that claim to have done research to debunk the video's claims. I can not vouch for these sites and do not agree with all of the statements of these authors, but here are the links: www.deceptioninthechurch.com/transformations.html www.geocities.com/smithtj.geo/transformations1.html Note that the first author claims that the videos were circulated to 80,000 churches and organizations by YWAM, the National Prayer Committee and the World Prayer Center. The other thing that disturbs me about this whole incident is that Muthee and the Third Wave seem to want us to return to the sixteenth century, with a belief in witches and community scapegoating. Such scapegoating of usually poor, uneducated and abandoned women had lethal results for the women involved. I don't know how George Otis, Jr. was able to claim that Hemet was a "transformed" city, considering that then (as now) the Church of $cientology has a huge complex on the north side of town. Maybe because "Gold Base" isn't exactly within the borders of Hemet, it doesn't count. But during the time of this video, literally hundreds of "Sea Org" members (people who had signed "billion year" contracts to serve $cientology from lifetime to lifetime) were living in apartment complexes in Hemet. Based on my personal experience with Hemet, CA and $cn, I'm going to assert that probably the rest of the cities on the "Transformations" video are just as much a crock as Hemet. There are studies which indicate that Almolonga farms are involved in the extensive overuse of dangerous pesticides and fertilizers. Kiambu, Kenya, a suburb area of Nairobi, is still a violent place with a high rate of crime. UNICEF, the Kenyan Human Rights League, and others have written about the ongoing violence there. Hopefully the point is made in my article about the possible dangers of witch hunting and demon expulsion as a form of community transformation. The video and the use of this video in the years since, demonstrate the movements' goal of taking control of the physical realm in their battle with those they see as evil. Also, this example clearly demonstrates that this particular brand of spiritual warfare does not remain in the spiritual domain. They are acting on these beliefs in concrete and physical ways that affect the lives of others. Having been accused of following witchcraft because I practice the Way of the Square Ground (to the best of my ability)- a traditional Native American form of religion, I wonder what the person talked about actually did. Maybe that person was following traditional ways (anathema to the fundies/dominionists). Maybe they chose this person because they didn't go along with the steeplejacking of their village? Maybe the woman had a pet cat that she loved??? (The jackleg preachers that regularly try to offend people into the "Kingdom of God" at my school have even said that talking to your pets will send you to hell!!! Another person who visits this blog can verify that!) This is as clear an example of the need for separation of church and state as I've seen in a while- persecuting someone based upon religious prejudice/belief SHOULD be against the law!!! Yes, this demonstrates the importance of complete separation of church and state! The fact that this movement is excited about the burning of the TM center building and brags about it on video is quite startling. There are many other Transformations testimonies that are equally frightening. Much of their work to transform communities is directed against Roman Catholics who they believe are held back from "true belief" by a powerful territorial demon called the "Queen of Heaven." They befriend Catholics and work closely with them in order to convert them, while at the same time teaching that they are under the influence of this demon and therefore a major obstacle to the purifying and transformation of these cities. It is important to understand the movement because they have some distinct differences from other groups who are fighting to tear down the wall of separation. The Third Wave allows women to have leadership roles including role of Prophet. One of Wagner's most trusted leaders is Cindy Jacobs who heads Generals of Intercession. Also they embrace people of all different races and ethnicities and from all different segments of Christianity as well as different nations,as long as the participants embrace their belief system. They view their mission as a global battle between the godly and the ungodly and no other divisions matter. to women in leadership roles (at least in the formative stage of a movement) among those Christian groups whose main focus is spirtual gifts than those whose focus is Biblical literalism or Church tradition. Well, it was rather an informative one than what I have thought. The depth in which the subject was presented was really brilliant and it did help me to understand different aspects which I never have given a thought about, before. Did God Engineer Trump's Win? Political analysts have postulated a number of theories to explain the victory of Donald J. Trump in the presidential election: Hillary Clinton failed to......ByRob Boston (5 comments) "America - love it or LEAVE!" I've been hearing that and similar sentiments fairly frequently in the last few days - far FAR more often than ever before. Hearing about "consequences for burning the flag (actions) from Trump is chilling!......ArchaeoBob(1 comment) "Faked!" Meme Keep your eyes and ears open for a possible move to try to discredit the people openly opposing Trump and the bigots, especially people who have experienced terrorism from the "Right" (Christian Terrorism is......ArchaeoBob(4 comments) See if you recognize names on this list This comes from the local newspaper, which was conservative before and took a hard right turn after it was sold. Hint: Sarah Palin's name is on it! (It's also connected to Trump.) ......ArchaeoBob(0 comments) Unions: A Labor Day Discussion This is a revision of an article which I posted on my personal board and also on Dailykos. I had an interesting discussion on a discussion board concerning Unions. I tried to piece it......Xulon(4 comments) Capitalism and the Attack on the Imago Dei I joined this site today, having been linked here by Crooksandliars' Blog Roundup. I thought I'd put up something I put up previously on my Wordpress blog and also at the DailyKos. As will......Xulon(0 comments) Alternate economy medical treatment Dogemperor wrote several times about the alternate economy structure that dominionists have built. Well, it's actually made the news. Pretty good article, although it doesn't get into how bad people could be (have been)......ArchaeoBob(4 comments) Evidence violence is more common than believed Think I've been making things up about experiencing Christian Terrorism or exaggerating, or that it was an isolated incident? I suggest you read this article (linked below in body), which is about our great......ArchaeoBob(5 comments) Demon Mammon? An anthropologist from outer space might be forgiven for concluding that the god of this world is Mammon. (Or, rather, The Market, as depicted by John McMurtry in his book The Cancer Stage of......daerie(1 comment)
null
minipile
NaturalLanguage
mit
null
There’s a truism when it comes to dating: the problems you have in your dating life are a reflection of the problems you have in your daily life. One of key aspects to the NerdLove approach to dating is that the key to having more success in your social life – whether it’s more sex, more dates or just finding an amazing relationship – is to become a better, more interesting, more authentic person. It’s trying to get there that’s the problem. This is one of the reasons why people like to toss out platitudes like “just be yourself” as dating advice – it sounds like a profound and meaningful answer that covers up the real answer of “I really don’t know what to tell you”. Unfortunately, when it comes to self-improvement, most advice tends to focus on the surface issues and quick fixes. This is why pick-up artistry is so appealing; it offers magic bullet solutions and push-button answers to dating. But dealing with the surface issues is like giving a house a fresh coat of paint; it may look nicer on the outside, but the foundation problems are going to make everything worse. There are no quick fixes when it comes to self-improvement; if you want a better life, you have to dig deep and put in the work. But there are ways to make the process easier, less stressful and get you the lasting results you actually want. You Have To Believe You Can Change This seems like something that’s so obvious it shouldn’t bear mentioning. However, even the people who presumably want to improve will fight against any idea that change is possible, never mind necessary. I’ve lost track at the number of people I’ve encountered who ostensibly want advice but push against any and all suggestions about how to go about actually achieving those changes. They reject any suggestions out of hand as impossible or say it won’t work because of X, Y and Z and will actively fight against brainstorming alternative ideas. They lash out over criticism – criticism they asked for – or insist that some troublesome aspect cannot or should not be changed because it would be a form of selling out. The problem is that often when people are asking for advice or help, what they’re asking for is validation. They want someone to tell them that yes, they are uniquely fucked and the system is unfair and there’s nothing that they can do. What they want is permission to not change. And that’s all well and good. You don’t need to do anything different if you don’t want to. But doing everything exactly the same just means you’re going to get the exact same results. The results that, by your own admission, you are not happy with. You can demand that the universe change to accommodate your wishes all you like. See what good it does you. Any form of true self-improvement means that you’re willing to admit that what you’ve been doing isn’t working and it’s time to do something different. Don’t get me wrong: I’m not saying you won’t have challenges, or that you don’t have legitimate reasons to be frustrated; we’ll be talking about that later on. What I am saying is that in order to improve, you have to acknowledge that, whatever difficulties you may have you are ultimately in charge of your life. And your brain will fight against it; when you absorb information and make it part of your identity, your brain will cling to it for dear life. In many ways, forcing yourself to take responsibility and embrace the possibility of change is the first and frequently hardest step. Focus On What Can Be Measured One of the mistakes people make when it comes to self-improvement is that they focus on nebulous or ephemeral goals. It’s all well and good to say “I want to lose weight” or “I want to get better at dating”, but that’s not actual improvement, that’s a desired result. For all intents and purposes, that’s a Disney princess’ “I Want” song – a whole lot of talking the talk but not a lot of walking the walk. You can talk about how you want to improve all you like but unless you’re making definitive plans as to how to get there, it’s not going to do you any actual good. What does “lose weight” mean? What does “get better at dating” mean? What does that actually look like? What changes are necessary to get you there? How are you going to know when you’ve actually achieved this goal? When it comes to building to your best self, you want to focus on things that can actually be measured. When you focus on nebulous, ephemeral goals, you get frustrated easily; you have no real way of tracking your progress or your improvement. It’s that much easier to just throw your hands up in the air and declare it all bullshit because nothing’s getting better. Having visible, quantifiable evidence of improvement on the other hand, will keep you moving forward. This is part of how video games get us hooked into repetitive actions that actually bore the piss out of us; we’re able to actually track our improvement. Something even as mundane as collecting 50 goat-asses or enough elfroot to render the plant endangered becomes strangely addictive when you’re watching that progress bar tick up. The same principle applies to self-improvement, especially if you’re fighting against the belief that change is impossible. Those little victories are proof that you are getting better, that you’re conquering that particular mountain one step at a time. When you’re coming home at the end of the night out feeling like a loser, looking at your metrics and realizing that you talked to more people and hung in those conversations longer than the last time you went out can mean the difference between giving up and soldiering onward. Once you’ve decided on a goal, start putting your focus on building skills and track your progress. Whether it’s memorizing more vocabulary words or mastering grammar with a foreign language or simply becoming more sociable at a party, tracking your improvement is the key to staying committed to your quest to be your best self. One Change At A Time To Avoid Burnout One of the mistakes people make when it comes to trying to improve their lives is that they bite off more than they can chew. If you’re trying to improve your dating life, for example, trying to become more social AND working on your flirting technique AND your body language AND trying to find an acceptable level of touching is a very good way to burn yourself out quickly. Alternately, trying to learn a foreign language and train for a triathlon and learning to code in C++ means you’re going to run out of both time and focus. Something is going to fall to the wayside simply through sheer attrition. Taking on too many changes at once makes it almost impossible to actually succeed at any of them. To start with, there’s the fact that there are only so many hours in the day. Taking on any project means devoting time to it and that time has to come from somewhere. The more you take on, the more time it takes… so what are you going to give up? Hanging out with your friends? Time spent on the PS4? Sleeping? Focus is another limited resource. Dividing your attention over several self-improvement projects at once means that something is going to suffer. Unless the skills you’re trying to develop are incredibly complimentary, you’re going to be continually shifting headspace, trying to cram entirely different movements into your long-term memory and muscle memory is going to be to the detriment of everything. Your brain has limited bandwidth; trying to do too much at once means you’re going to burn through that bandwidth like a computer with too little RAM trying to run Photoshop and After Effects at the same time. You may get it done, but it’s going to take goddamn forever. Unless you’re a natural polymath, you want to focus your attention on a couple of changes at a time. Now, this doesn’t mean that you need to put in the proverbial 10,000 hours before moving on to the next step – just pick one or two complimentary aspects and let them be your primary focus for a month or two. As you improve and they become more natural, then you can divert your focus to other skills. You’re Going to Fail. A Lot. And That’s OK. How many times have you done some form of self-improvement – whether it be getting into shape, learning a new language or simply picking up a new skill – and ended up giving it up after a couple of months? It’s more common than you think; in fact, most people give up their New Years resolutions before January is even over. The rest tend to give up by February. This is great for people like me who get tired of all the strangers taking up the elliptical runners at the gym after New Year’s, but when you’re trying to actually build towards your best self it can be disheartening. One of the biggest reasons for this drop-off is that we find out oh, hey, this is way harder than you expected it to be. Even when we consciously know better, we all have a tendency to expect to be if not instant experts then profoundly competent pretty quickly. Unfortunately in reality, we find out fairly quickly that no, we totally suck at this. That seeming failure to achieve perfection in a 4 minute montage while jamming out to “Eye of the Tiger” is incredibly disheartening; it seemingly confirms that, yeah, we’re just not going to get any better. What we rarely get is that failure at something new is part of how we learn. We all go through stages of learning a new skill and that first one – conscious incompetence – is a motherfucker. It makes you feel like a loser. But here’s the thing: you’re trying to do something you’ve never done before. It’s inevitable that you’re going to fuck up at first. Even those seemingly simple basics are going to be hard. In fact, in some cases, you may get worse before you get better. You’re having to think about things in new and different ways than you have before as you try to commit everything to muscle memory. You fell down a lot when you first learned how to walk and you’re going to trip over yourself when you’re learning how to be a better flirt. Failure is part of how we all learn and adapt. You make mistakes, you learn from them and you try again. Letting those initial failures scare you away just guarantees that you’ll never get better. You want to master a new skill? Embrace failing. You’ll find ways that don’t work and move on to try other ways that do work for you. Speaking of… When God Closes A Door, You Blow Open A Wall One of the things that you don’t hear from self-help gurus is that there will be things that you simply can’t change no matter how hard you try. Your facial features are fixed unless you want to invest in expensive and painful surgery. If you’re introverted, you’re not going to be able to will yourself into being an extrovert regardless of how much you want it. Some people will never be able to run a marathon. You may not have the finances to do something you desperately want to. You may simply just suck at something even though you love it with all of your heart and soul. When you run into your limitations, you have two choices: you can give up… or you can find a way to work around them. Sometimes it’s a matter of finding an alternative path that works instead – you can’t run a marathon, but perhaps bicycle endurance challenges may be possible. Instead of trying to emulate Ryan Gosling’s smooth player in Crazy, Stupid, Love you embrace your natural goof-ball and model yourself after Peter Venkman instead. Other times it’s simply learning how to do things differently. Instead of trying to force yourself into a specific build, you learn to love your body as it is and let your confidence shine through. You may be short, so you cultivate presence that makes you seem taller to people. Your may not be conventionally attractive so you focus on your personality and ability to connect with people instead. And sometimes it means trying something entirely different. What you think you want isn’t necessarily what you need. I spent over a decade trying (and failing) to make it as a professional artist before I admitted that it wasn’t for me. Once I realized this and redirected my focus into writing, everything fell into place. I was more fulfilled, creatively. I didn’t struggle with motivating myself or have to force myself to produce. And while I couldn’t draw the graphic novels of my dreams, I could still work on them as a writer instead. Trying to force myself into the club-hopping player mode didn’t work for me either; I found much more satisfaction in a lower-key approach to meeting women. There’s a lot of trial and error when it comes to building your new and improved life. But when you hang in there and focus your growth in the right way… the results are amazing.
null
minipile
NaturalLanguage
mit
null
Evolving concepts in the treatment of heart failure: should new inotropic agents carry promise or paranoia? Heart failure is a common disorder caused by many different diseases. At the root of the problem is diminished myocyte contractility, which ultimately results in failure of the pump to generate adequate peripheral flow. An interplay of hemodynamic, neurohumoral, and inflammatory perturbations initially improves cardiac flow and cellular respiration, but ultimately worsens the syndrome. Inotropic drug therapy was an attractive option in patients with heart failure even before the pump failure aspect of the disease was recognized. Increased contractility should lead to increased cardiac output, which would likely ameliorate hemodynamic and metabolic derangements. Although inotropes increase cardiac contractility at least transiently, this effect does not generally translate into improved survival in clinical trials. Indeed, in patients with advanced heart failure, these drugs frequently increase death rates. It is important to put the issue of inotropic therapeutics into perspective when considering treatment options for these patients. It may well be that certain inotropes in yet to be defined dosages will substantially improve morbidity and mortality when combined with drugs designed to interdict metabolic and neurohumoral components of the syndrome.
null
minipile
NaturalLanguage
mit
null
Trevor Law Group The Trevor Law Group was a three-member Beverly Hills law firm notable in California and nationally for their heavy-handed tort law abuse. In 2002, it was alleged that they engaged in a form of extortion by threatening to sue thousands of businesses for violating a now defunct provision of the Business & Professions Code, then offering to "settle" for a few thousand dollars apiece. They were investigated for this action and three principals of the firm were recommended for disbarment. They eventually gave up being lawyers. The Trevor lawyers appear to have gone further than many other law firms accused of similar abuses. The Group is now often cited in discussions of tort law abuse. References External links Category:Law firms based in Los Angeles Category:Defunct law firms of the United States Category:Law firms with year of establishment missing Category:Law firms with year of disestablishment missing
null
minipile
NaturalLanguage
mit
null
684 S.E.2d 71 (2009) 285 Ga. 731 In the Matter of Leonanous A. MOORE (two cases). Nos. S09Y0117, S09Y0485. Supreme Court of Georgia. September 8, 2009. William P. Smith III, General Counsel State Bar, Kellyn O. McGee, Asst. General Counsel State Bar, for State Bar of Georgia. PER CURIAM. Currently before us are six disciplinary actions initiated against Leonanous A. Moore stemming from conduct that took place in June 2006 and May 2007—January 2008. The June 2006 conduct is the subject of S09Y0485, in which a special master has recommended the imposition of disciplinary action ranging from a two-year suspension to disbarment for violations of Rules 1.15(I)[1] and 8.4(a)(4)[2] of the Georgia Rules of Professional Conduct found in Rule 4-102(d) of the Rules and Regulations of the State Bar of Georgia. The remaining conduct is the subject of a Notice of Discipline in which the Investigative Panel of the State Disciplinary Board of the State Bar of Georgia found that Moore violated Rules 1.3,[3] 1.4,[4] 1.15(I), (II),[5]*72 1.16,[6] 8.4, and 9.3[7] and recommends that Moore be disbarred.[8] In both disciplinary actions, Moore was served by publication (see Bar Rule 4-203.1(b)(3)(ii)) and did not file a timely answer or notice of rejection of discipline, causing him to be in default and the facts alleged and violations charged to be deemed admitted. See Bar Rules 4-208.1(b) and 4-212(a). The complaint in S09Y0485 is based upon Moore's service in June 2006 as the closing attorney for a real estate transaction. At closing, the HUD-1 settlement statement listed a sales price $9,000 higher than the price listed on the sales contract. The settlement statement also listed "cash to seller" of $16,329.84. Of this amount, the seller received $8,079.84 through a wire transfer and Moore wrote a check to the seller for the balance, but gave the check to the buyer's loan officer. The check has two endorsements, the first from the seller, which the seller's wife contends is a forgery, and the second from a third person who purportedly loaned money to the buyer to cover the buyer's down payment. The facts deemed admitted in S09Y0117 show that Moore received $75,000 in May 2007 to hold in escrow pending the sale of real property and did not release the funds upon the buyer's default. In November 2006, Moore received $10,000 to hold in escrow pending the sale of real property and, upon the buyer's default, did not pay the funds to the seller as the parties had agreed, and has not paid the judgment the seller won by suing Moore for the funds. Moore served as a title agent for a title company from October 2006 until September 2007 and did not record the deeds in several of the real estate transactions which he closed. Moore's service as a title agent was terminated by the company in September 2007 following his payment of title insurance premiums with checks drawn on his trust account in which there were insufficient funds to cover the checks. Moore did not communicate with the title company and did not return files to the company after his termination. In October 2007 and January 2008, the State Bar received information of insufficient funds in two of Moore's trust accounts and Moore did not respond to requests for information regarding the accounts. In none of the instances chronicled in S09Y0117 did Moore submit a sworn response to the notice of investigation. After a review of the record in S09Y0485, we conclude that Moore violated Rules 1.15(I) and 8.4(a)(4) by his actions in June 2006. After reviewing the record in S09Y0117, we conclude that Moore violated Rules 1.3, 1.4, 1.15(I), (II), 1.16, 8.4, and 9.3. We determine that disbarment is the appropriate sanction for these violations. Accordingly, it is hereby ordered that the name of Leonanous A. Moore be removed from the rolls of persons authorized to practice law in the State of Georgia. Moore is reminded of his duties pursuant to Bar Rule 4-219(c). Disbarred. All the Justices concur. NOTES [1] A lawyer who receives funds in which a client has an interest shall promptly deliver the funds to the client, and where both lawyer and client have an interest in the funds, the funds shall be kept separate until there is an accounting and severance of interests. [2] A lawyer shall not engage in professional conduct involving dishonesty, fraud, deceit or misrepresentation. [3] A lawyer shall act with reasonable diligence and promptness in representing a client and shall not wilfully abandon or disregard a legal matter entrusted to the lawyer. [4] A lawyer shall keep the client reasonably informed about the status of matters and shall promptly comply with reasonable requests for information. [5] Rule 1.15(II) provides that all funds held by a lawyer for a client shall be deposited in and administered from a trust account; a lawyer shall not commingle personal funds in that account; records of trust account shall reflect at all times the balance held for each client; and a lawyer shall not withdraw funds from such trust account for the lawyer's personal use except earned attorney fees. [6] Upon termination of representation, a lawyer shall take steps to the extent reasonably practicable to protect a client's interests, such as giving reasonable notice to the client, allowing time for employment of other counsel, surrendering papers and property to which the client is entitled and refunding any advance payment of fee that has not been earned. [7] During a grievance investigation, a lawyer shall respond to disciplinary authorities in accordance with State Bar Rules. [8] We note that this Court imposed an interim suspension of Moore from the practice of law in December 2008 due to his failure to respond to a notice of investigation concerning his failure to pay bar dues. That suspension was lifted in May 2009 on motion of the Office of General Counsel of the State Bar following Moore's filing of a response. In the Matter of Moore, S09Y0358.
null
minipile
NaturalLanguage
mit
null
Q: How to redirect multiple domain to same ip but different port? I wan to install many Apache with php servers in the same virtual machine running in different ports because I want to host N number of different websites into the same virtual machine to avoid creating N number of virtual machines to host N number of websites. is there any easy DNS configuration for redirect a different domain to same ip in different port? Example: www.example1.com 172.217.14.100:80 www.example2.com 172.217.14.100:81 www.example3.com 172.217.14.100:82 www.example4.com 172.217.14.100:83 A: Achieving what you want to do via DNS Records cannot be done as far as I know. Apache Apache, through Name Base Virtual Host blocks and configuring Apache to listen on the required ports. # Listens on all IP Addresses and ports 80 - 83 Listen 80 Listen 81 Listen 82 Listen 83 Using your Name Based virtual hosts allows you to catch each request based on name passed in the host value; <virtualhost example1.com:80> # all your configuration for example1.com </virtualhost> <virtualhost example2.com:81> # all your configuration for example2.com </virtualhost> Ports Requiring users to enter a port is not a great solution and is likely to fail in the long run. We cannot rely on users knowing how to add a port or to even remember they need to add a port. Nginx Reverse Proxy A better solution would be to have Nginx as your front end which receives requests and passes that request to Apache using the port structure you require. Server { listen 80; server_name example1.com www.example1.com # other stuff as required proxy_pass http://192.168.100:80; } Server { listen 81; server_name example2.com www.example2.com # other stuff as required proxy_pass http://192.168.100:81; } By using Nginx the client enters example2.com (without port) and Nginx receives it, processes it and gets results from Apache listening on port 81. Nginx Reverse Proxy Nginx will also give you a performance boost. There is a learning curve and some configuration fine tuning to do but in the long run it would be a better solution. There are hundreds of examples of Reverse Proxy using Nginx. Google is your friend.
null
minipile
NaturalLanguage
mit
null
Monday, November 30, 2015 Recent revelations about a botched police response to a 2014 domestic dispute that preceded a Hyde Park woman’s slaying has turned the spotlight on police officers who have amassed a substantial number of citizen complaints against them. The officer involved in that case, who failed to arrest the man later accused of murder, had nearly two dozen complaints filed against him over the course of a 28-year career. The disciplinary process in the Hyde Park case has taken more than six months. But a Globe review of Boston police records reveals that the officer’s record and the time it has taken to mete out punishment are not an anomaly. One dozen officers have faced 20 or more complaints over the past 20 years; internal affairs investigations can languish for years. “Everybody has a right to due process, and we have to cross our Ts and do it all right,” Police Commissioner William B. Evans said. “It’s not as easy a process as people think it is.” The officers with the most complaints work in the department’s homicide unit, and in stations downtown, in South Boston, Roxbury, Dorchester, and Jamaica Plain, and have been the subject of complaints regarding untruthfulness, use of force, disrespectful treatment, unbecoming conduct, and criminal violations. Lawrence D. Welch, a 26-year veteran of the force, has accumulated 55 complaints, 31 of which were at least partially substantiated. In an incident similar to the recent Hyde Park case, Welch was suspended for three days after failing to document a domestic violence incident in 2001 involving a Boston police officer. Welch, who now works in District C11 in Dorchester, did not return calls seeking comment. Sergeant Martin B. Kraft, who worked for the department for 32 years before retiring last year with charges pending, amassed 40 complaints with 15 upheld. In an interview last week, Kraft said he received a lot of complaints because he made “the most arrests of any sergeant in the police department” at that time. Kraft retired after coming under fire for accepting a job as the security chief at a marijuana shop in Roxbury. An attorney who represents officers in legal matters said a high number of complaints does not necessarily mean an officer is bad at his or her job. “There are some officers who are very active and by virtue of that they’re going to get more complaints,” said Kenneth H. Anderson, a Boston lawyer who represents police officers. “Some officers work in areas where they’re going to generate more complaints than others,” said Jack McDevitt, director of Northeastern University’s Institute on Race and Justice, noting that most officers have few or no complaints at all. Complaints filed by residents can serve as an early warning system. “If lots of people are saying an officer is overly aggressive or swearing, you have to look at the complaints,” Boston civil rights attorney Howard Friedman said. “Police officers operate mostly outside of view of their supervisors, and complaints are a way of getting feedback.” Overall, complaints against Boston police officers were down last year, to 386, compared with 527 in 2013. Use-of-force complaints are at a more-than-two-decade low. Now, most complaints allege disrespectful treatment. The decline in use-of-force complaints means the department is moving in the right direction, policing experts say, but the disrespectful treatment allegations should be cause for concern. “If we have interactions with the police that continue to build on the perception that people already have, it continues to erode the community’s trust and the community’s confidence in the police,” said Ivan Espinoza-Madrigal, executive director of the Lawyers Committee for Civil Rights and Economic Justice. Complaints against police officers can be filed by any civilian or by a fellow member of the police department. For example, in the November 2014 Hyde Park domestic dispute case, the complaint against Officer Robert Boyle and Officer William Hubbard was initiated in April by a lieutenant detective who learned the pair had shirked their duty. The officers had failed to check a computerized system to verify the restraining order Stephanie McMahon had against Randall Tremblay, whom she wanted ejected from her home. McMahon was killed the next day, allegedly by Tremblay. Some civic leaders say they are troubled by years-long delays in resolving even the simplest concerns. A 2005 accusation that an officer was negligent was investigated and upheld in just four days. But three years passed before the officer was disciplined — simply because the case file lacked the proper signatures. A report this year by the city’s civilian oversight panel found that while most complaints were resolved in fewer than two years, “significant delays persist” — 30 percent of cases it reviewed took more than two years to be resolved. “We need results in a year; after that, who cares?” said Jorge Martinez, executive director of Project RIGHT, a Grove Hall antiviolence organization. A review of 45 complaint files shows the problems caused or exacerbated by a protracted process: Civilians get frustrated and stop cooperating. Officers sometimes do not recall certain incidents after several years or become difficult to reach. In other cases, complainants fail to present the evidence necessary to support their claim, contributing to a delay. Police Superintendent Frank Mancini, commander of the Bureau of Professional Standards, which includes the Internal Affairs Division, said internal affairs investigations are also affected by civil lawsuits or criminal prosecutions. In those instances, his investigations take a backseat. Mancini said he does not believe a timeframe should be set for resolving complaints, such as in New Orleans, where complaints must be resolved within 90 days. “My concern is more to do a thorough investigation even if it takes nine months,” Mancini said. “I want the right answer — the truth — rather than the quick and fast answer.” Officials hope a mediation program launched in September can help reduce the backlog in complaints. Under the program, the complainant, the officer, and two mediators from the Harvard Mediation Program at Harvard Law School would meet at a neutral location to discuss the matter, a move Mancini said will “bring the community closer together with police officers.” Mancini said his unit is currently identifying complaints that could be eligible for mediation. The remainder, such as those involving misconduct, will continue to be investigated by the Internal Affairs Division, and those involving serious criminal allegations will be reviewed by the city’s Anti-Corruption Unit. Boyle and Hubbard — the officers who allegedly mishandled the Hyde Park domestic violence case in 2014 — will have a disciplinary hearing, and Evans, the commissioner, will decide whether the officers should be suspended. Evans said meting out discipline can be a difficult task. “We’ve had several officers that deserved to be terminated and we’ve had [those decisions] overturned by an arbitrator,” Evans said. “It’s very frustrating to us.” In one ongoing case, officer David C. Williams was twice terminated for using excessive force and was reinstated both times. He was last fired in 2012 after using an improper chokehold to arrest former Middlesex County correction officer Michael P. O’Brien, who was awarded $1.4 million in a settlement. The city is fighting Williams’s reinstatement. But, in the last 10 years, the Civil Service Commission has sided with the police department in 29 cases, affirming the commissioner’s disciplinary action. The commission ruled to overturn the department’s decision in 13 cases, according to records provided by the commission. Boston Police Patrolmen’s Association Union president Patrick Rose said officers who feel they have been wrongly accused deserve due process. “To point the finger at civil service or an arbitrator is absolute foolishness,” he said. “The officer has a right to defend themselves.” (And don't forget your ration of Wicked Thoughts for today. Now hosted on Wordpress. If you cannot access it, go to the MIRROR SITE, where posts appear as well as on the primary site. I have reposted the archives (past posts) for Wicked Thoughts HERE or HERE No comments: Dedication In memory of Fatty Arbuckle, a good and innocent man whose movie career as a comedian was ruined by an opportunistic prosecution. The woman he was accused of murdering almost certainly died of natural causes. He was eventually cleared but the damage was done. A thought I love the Mae West story where some judge wearing a robe during the middle of the day, and seated in a high chair peered down and asked her, 'Are you showing contempt for my court?' To which she replied, 'I’m doing my best not to show it, your honor.' Maybe we need to give up trying to not show it."
null
minipile
NaturalLanguage
mit
null