text
stringlengths
2
1.05M
repo_name
stringlengths
5
101
path
stringlengths
4
991
language
stringclasses
3 values
license
stringclasses
5 values
size
int64
2
1.05M
Font Awesome in ASP.NET MVC WebGrid March 19, 2014 posted in asp.net mvc. When redesigning Bonobo Git Server I’m using an amazing icon library Font Awesome. The usage is really simple and when you want to add an icon to your paragraph you just insert <i> tag with specific CSS classes. <p><i class="fa fa-camera-retro"></i> fa-camera-retro</p> However, there are some HTML components where it is hard to add any custom HTML and one of them is WebGrid. Imagine you have a code similar to this one. var grid = new WebGrid(source: Model, defaultSort: "Name"); @grid.GetHtml( tableStyle: "myGrid", columns: grid.Columns( ... grid.Column("Name",format: item => Html.ActionLink(...), ... )) And you want add an icon from Font Awesome library to the Name column. You can’t simply modify HTML inside the column, so one of the options would be writing your custom HTML helper. But I don’t find this situation to be general enough to earn its own helper. So, is there any other way around? You might think that Font Awesome is a set of icons, but actually it is a font face. And with font face you can do some CSS magic. .myGrid tbody td a:before { font-family: FontAwesome; top: 0; padding-right: 0.5em; content: "\f0a0"; } With that code, we add a content before every link inside the body of our grid. The content is a code for an icon you want to show and you can find it here; mine is for a small icon of a hard-drive and that’s it. Awesome! Would you like to get top 5 links on C# every Monday? Sign up to C# Digest and stay up to date!
null
minipile
NaturalLanguage
mit
null
There's a new 5 reel, 25 variable pay-line RealTime Gaming internet slot on the horizon (next week, actually!) branded Basketbull and themed on the famous basketball organisation that does so much good work among urban youth in the United States. The designers have put together quality comical graphics to carry the basketball theme, backed by a feature-rich game structure that includes Wilds, Scatters, Re-triggering Free Throws and a possible 96-free-game interactive bonus round in which any successful throw will double the number of free games awarded, and all prizes are tripled. The top award in the game is 50 000x the bet per line, and minor ($250) or major ($1000) jackpots can be randomly triggered during the game. Basketbull LLC in the United States is associated with the Naismith Memorial Basketball Hall of Fame and organises basketball events for youth in urban areas, providing opportunities to play in competitive basketball events. The name BasketBull comes from the late William “Bull” Martin. In 2011 BasketBull is looking at 19 tournaments, including events in Chicago, San Diego, and Dallas or Orlando. Over a thousand teams will compete in 2011 with over 14,000 participants.
null
minipile
NaturalLanguage
mit
null
Yet More Reported Examples of Donald Trump Trying to Exert Control Over the Russia Investigation By Elliot Hannon Jan 04, 2018, 10:36 PM President Trump “chats” with Russia’s President Vladimir Putin at the APEC Economic Leaders’ Meeting on Nov. 11, 2017. MIKHAIL KLIMENTYEV/Getty Images The exact legal definition of President Trump’s attempts to shield himself from FBI scrutiny and Robert Mueller’s investigation have yet to be determined in a court, but the more that is revealed about Trump’s attempts to influence investigators, senators, staffers, heads of bureaus and of government agencies, it’s plain that Trump is violating the spirit of the law on obstruction of justice, if not officially the letter of the law—yet. On Thursday, we got more evidence of Trump’s attempts to influence the inquiry into his campaign’s ties to Russia from the New York Times. Trump sent explicit directions to Attorney General Jeff Sessions not to recuse himself in order to protect the president from the growing investigation: President Trump gave firm instructions in March to the White House’s top lawyer: stop the attorney general, Jeff Sessions, from recusing himself in the Justice Department’s investigation into whether Mr. Trump’s associates had helped a Russian campaign to disrupt the 2016 election… Mr. McGahn was unsuccessful, and the president erupted in anger in front of numerous White House officials, saying he needed his attorney general to protect him. Trump made repeated attempts to communicate with and influence FBI Director James Comey: Among the other episodes, Mr. Trump described the Russia investigation as “fabricated and politically motivated” in a letter that he intended to send to the F.B.I. director at the time, James B. Comey, but that White House aides stopped him from sending. The special counsel has received handwritten notes from Mr. Trump’s former chief of staff, Reince Priebus, showing that Mr.Trump talked to Mr. Priebus about how he had called Mr. Comey to urge him to say publicly that he was not under investigation. Attorney General Jeff Sessions’ office tried to find dirt on Comey: The New York Times has also learned that four days before Mr. Comey was fired, one of Mr. Sessions’s aides asked a congressional staff member whether he had damaging information about Mr. Comey, part of an apparent effort to undermine the F.B.I. director… The attorney general wanted one negative article a day in the news media about Mr. Comey, according to a person with knowledge of the meeting. A Trump spokesman quit after Trump’s Air Force One false statement about the nature of the June 2016 Trump Tower meeting between Donald Trump Jr., Jared Kushner, Paul Manafort and Russian representatives peddling dirt on Hillary Clinton: A new book, “Fire and Fury: Inside the Trump White House,” by Michael Wolff, says that the president’s lawyers believed that the statement was “an explicit attempt to throw sand into the investigation’s gears,” and that it led one of Mr. Trump’s spokesmen to quit because he believed it was obstruction of justice. There was also this little detail from the Times: “The president’s determination to fire Mr. Comey even led one White House lawyer to take the extraordinary step of misleading Mr. Trump about whether he had the authority to remove him.” One more thing You depend on Slate for sharp, distinctive coverage of the latest developments in politics and culture. Now we need to ask for your support. Our work is more urgent than ever and is reaching more readers—but online advertising revenues don’t fully cover our costs, and we don’t have print subscribers to help keep us afloat. So we need your help. If you think Slate’s work matters, become a Slate Plus member. You’ll get exclusive members-only content and a suite of great benefits—and you’ll help secure Slate’s future.
null
minipile
NaturalLanguage
mit
null
The Feb. 26 photo, which was previously released as a black-and-white photocopy, was provided as a high-resolution digital file to the defense on Oct. 29. The shooting took place when Zimmerman encountered Martin, who was unarmed and walking through the Sanford, Fla., neighborhood where his father lives. Earlier this year, Zimmerman, now 29, pleaded not guilty to a charge of second-degree murder in the shooting death of Martin. In the highly publicized case, which has drawn national attention, Zimmerman maintains that Martin attacked and beat him. In July, he was released from Seminole County Jail after posting $1 million bond. Zimmerman remains out on bail and is in seclusion. Martin's family has called for a change in Florida's "Stand Your Ground" law, which allows the use of force in self-defense, when there is a reasonable belief of an unlawful threat. Zimmerman's lawyers posted the following statement about the photo: "This is a photo of George Zimmerman taken by a police officer on the night of February 26, 2012. A black and white photocopy of this image was provided by the State in the first Discovery. This high-resolution digital file was finally provided to the defense on October 29, 2012. This image was disclosed in the State's 9th Supplemental Discovery. In accordance with the updates to our media policy that we published on November 13, we will be making all public documents related to the case available on our website, including the rest of the State's 9th Supplemental Discovery as soon as we are sure it has been properly redacted according the the Court's stipulations on protecting information regarding specific witnesses." A spokesperson for the office of Special Prosecutor Angela Corey did not immediately respond to an email request for comment Monday. Benjamin Crump, an attorney for the Martin family, told NBC News the photo is not new evidence –- just a color version of a photograph that has already been seen. “George Zimmerman profiled and pursued Trayvon,” Crump said. “Trayvon had every right to stand his ground.” In a video clip from Feb. 27, 2012, released by his attorney, George Zimmerman takes investigators back to the scene of his shooting of Trayvon Martin. (George Zimmerman featured at 2:15)
null
minipile
NaturalLanguage
mit
null
Q: Re-throw an InvocationTargetException target exception How does one re-throw the target exception of an InvocationTargetException. I have a method which uses reflection to call the invoke() method within one of my classes. However, if there is an Exception thrown within my code, I am not concerned about the InvocationTargetException and only want the target exception. Here is an example: public static Object executeViewComponent(String name, Component c, HttpServletRequest request) throws Exception { try { return c.getClass() .getMethod(c.getMetaData().getMethod(), HttpServletRequest.class) .invoke(c, request); } catch (InvocationTargetException e) { // throw the target exception here } } The primary problem I am facing is that calling throw e.getCause(); doesn't throw an Exception but rather throws a Throwable. Perhaps I am approaching this incorrectly? A: catch (InvocationTargetException e) { if (e.getCause() instanceof Exception) { throw (Exception) e.getCause(); } else { // decide what you want to do. The cause is probably an error, or it's null. } }
null
minipile
NaturalLanguage
mit
null
? barack obama andjoebiden, ormitt romney and paul ryan? or will it be a tie? 269 electrical votes, to 269 electoral votes. pat buchanan? >> the heart says romney/ryan, and head says too close to call, but i'm going to predict that romney/ryan will win all the 11 states of the old con fed racy, and barely win ohio and colorado, and he'll win with just over 270 electoral votes. >> obama biden will win with over 300 electoral votes, it will be a democratic senate, warren will win in massachusetts, and democrats will have 54 seats in the senate. >> i have to say i think this country really needs a change in leadership, given what's happened in the last four years, but i believe that owe -- obama will be reelected, it will be a close race, and ohio will make the difference, if romney carries ohio -- >> quickly -- >> close, i give obama the edge. i'm going to say 260. win withy and ryan will wi280 electoral votes. bye bye! mean things about them. and that democrats and republicans won't be able to work together."joebidenispartisan but i, paul ryan, know what real bipartisanship is all about." this from the most ruthless, relentless, disciplined right wing unified front that i believe the nation has ever seen. this is the person who is saying, "bipartisanship is what we're all about. and you democrats don't understand what that means." >> yeah, but there's, there's one other thing. sometimes you sin by omission. and when the candidates suggest that their plans are going to be sufficient to address the crisis the deficit facing debt crisis that we're facing, in an environment which we can't afford to tank the economy, they are implying something that's fundamentally false, given what they've told us. president obama is telling us how he's goingcio get some extra revenue by tax incrsoses. but he's not going to get enough that way. and he hasn't specified the spending cuts. and governor romney's numbers don't work out either. in you've got both implying that my plan is sufficient, when in fact neither i this... that's what this agency does. >> woodruff: meanwhile, vice inresidentjoebidenspentthe day in iowa, where he attacked ryan's budget plan. >> look, ryan saying that his budget doesn't cut-- it just slows-- is a little like romney standing in an unemployment line and saying to the unemployed guy, look, i want to make it clear to you: i didn't outsource your job; i just offshored your job. >> woodruff: in fact, today the candidates, their running mates, spouses and surrogates blanketed seven toss-up states around the country. former president bill clinton has hit the trail hard, appearing today in wisconsin and ohio on behalf of the president. >> but i am far more enthusiastic four years ago. >> woodruff: clinton was in minesota earlier in the week, where the romney campaign recently announced a new ad buy. it's a place both sides had earlier assumed would belong to the democrats. the obama camp countered with a new ad featuring the endorsement of former secretary of state colin powell, ran it there and in nine other states. >> i think we ought to keep on the track that we're a campaign event today into a rereef event, their surrogates have be out there, ann romney,joebiden, michelleobam bill clinton. their campaigns have continued b to run advertising. we've seensolicitations for contributions not to the obama campaign but to the redso cross from that massive email list that barack obama has. the campaigns were up and running. they're still doing all the things they normally do. there's a little more sensitivity in the stes that are affected by the hharricane but they can't really afford tor pull out, to push the pause button. >> ifill: democrats have been saying that mitt romney during the republican primary debates may have said that he would actually cut back on fema which ma not as unpopular as it once was. >> he said he wanted to move as much of that responsibility to the states and to private contributions a poible. so he's getting hit for that right now.ib what would mitt romney's fema look like? would it be as well funded as the current organization? there's about $7 billion in the bank right now. if mitt romney and republicans were in control campaign trail today, vice presilntbidenrecusedthe romney campaign of perpetuating a quote, outrageous lie, in ads on the obama administration's auto industry bailout. the adthassert general motors asd chrysler are adding jobs in china at the expense of workers in ohio. both g.m. and chrysler have protested. but the romney campaign insi ts the facts in the ads arets accurate. syrian government forces stepped up widespread air assaults on opposition strongholds today, i-government activists said, after a holiday ceasefire fe apart. amateur video showed mig fighter jets strike near a mosque on the outskirts of damascus. so pounded the north, in towns ineluding dair al zour. two days of bombing have left at least 185 people dead. meanwhile, u.s. secretary ofns state hillary clinton called for a shakeup of the syrian opposition in its bid to oust president assad. she said it should include people who've been fighting on the front lines, not just activists who've lived outside of syria for decades. in china, a vernment think tank urged leadership to end the country's one-child policy. it re
null
minipile
NaturalLanguage
mit
null
Q: Can I just kill the process mysqld.exe for shutting down MySQL server in Windows? I know that we can shutdown MySQL server by executing the following: /mysql/bin/mysqladmin --defaults-file=my.ini -u root -p shutdown but the problem is it requires user input for entering the root password. The process of shutting down the MySQL server must not require user input. So, can I just kill the process [mysqld.exe]? Or is there any alternative better way? A: if your password is "hello" then instead of -p write -phello
null
minipile
NaturalLanguage
mit
null
It seems pretty clear by now that the three young “domestic terrorists” arrested by Chicago police in a warrantless house invasion reminiscent of what US military forces are doing on a daily basis in Afghanistan, are the victims of planted evidence — part of the police-state-style crackdown on anti-NATO protesters in Chicago last week. The Chicago Police clearly realized that it would be hard to convince a jury that the homemade beer-making equipment in the house was some dreaded bio-terror weapon, so for good measure they apparently dropped off some glass jars with gas in them and tried to make out that the kids were preparing molotov cocktails. That’s the word from National Lawyers Guild attorneys representing the men. They say their clients and others like them coming into Chicago from out of town to join in protests against the NATO summit were “befriended” by police informants and undercover Chicago Police, who then offered to obtain gasoline or explosive materials like toy rocket motors, and who proposed actions like firebombing police stations. This kind of entrapment and official deceit by police should alarm every American. It’s bad enough when police plant evidence and lie about evidence in order to win convictions, since it means innocent people will be sent to prison or worse. But with the new post 9-11 terrorism laws, like the state terrorism statutes in Illinois being applied in these cases, it becomes far more difficult for a victim of such police and prosecutorial misconduct to challenge the case against her or him. In terror cases, the government can claim “national security” to hide the evidence and even the identity of the witnesses from the defendants and the courts, the jury and the public, and can avoid ever being questioned about it publicly. In a worst case, the federal government doesn’t even need to bring the case to trial. If the victim is accused of being a terrorist, under the latest National Defense Authorization Act (NDAA) and various executive orders, that person can be locked away indefinitely without trial — exactly the kind of abuse that led American colonists to rise up against their British colonial overlords 237 years ago. Residents like me from Philadelphia know all about this stuff. Planting evidence on people you want to lock away has a venerable history in this once revolutionary town. In 1995, six Philly cops were convicted of presenting false testimony and of framing over a hundred people with planted evidence that sent the victims to jail with long prison terms. In the end, two of those cops ended up serving jail terms themselves as the result of a federal corruption probe. A bigger federal investigation of the Philadelphia Police Department’s Center City division in the 1980s led to the conviction of several dozen cops, including a captain, four lieutenants, and the deputy chief of police, on charges of extortion and evidence tampering, including the planting of false evidence. Dozens of convicted prisoners were released from jail when it became clear their convictions had been based upon faked evidence by these uniformed miscreants. The practice of planting evidence and of police lying to win convictions has continued in Philadelphia, which has paid out over $27 million in damages to people victimized by police corruption and false evidence planting since the mid-’90s. In 2009 the Philadelphia Daily News broke a story that a narcotics division cop on the force had planted drugs (a tactic known as “flaking” among dirty cops) in order to lock up dozens of people and to rack up a seemingly stellar record of drug-busting. And across the river in Camden, NJ, over 75 people jailed for drug offenses are having their cases reviewed and overturned now because of evidence that police in that city were planting evidence on the people they arrested. So common was the knowledge that police in Philadelphia keep stolen unlicensed handguns and bags of drugs in their cars for the purpose of framing citizens, that after I published my book Killing Time on the case of Pennsylvania death-row prisoner Mumia Abu-Jamal, the Afro-American journalist convicted in 1982 of killing a white Philadelphia police officer in a trial fraught with police and prosecutor perjury and faked evidence, that I was loath to drive through the city. And when I did, was extremely careful to follow traffic rules to the letter. With white police officers publicly pressing, through their union and lobbying arm, the Fraternal Order of Police, for Abu-Jamal’s execution, it seemed all to easy for them to stop me, run a make, ID me as the author of a book exposing the wrongness of his conviction, and to then plant a gun or a stash of illicit drugs in my vehicle, and lock me away. At least back then, though, you’d just be facing ordinary criminal charges, and hopefully a good attorney would be able to prove the charges were bogus. Terrorism charges make it much harder to do that. The faking of terrorism crimes is abetted by a lazy corporate media, where reporters and editors just run their stories based upon the wild claims made by police and prosecutors, without bothering to consider how ludicrous those claims may be. Often, they don’t even bother to go to the victims’ defense attorneys for rebuttal. Plus, the general scare-mongering by government and media, and the media propaganda glorifying of “tough” cops and prosecutors who cut corners, makes it likely that most juries will continue to believe the false statements and evidence presented by the prosecution at trials. It’s ironic that the same public that is so ready to believe all manner of wild conspiracies about the president’s being a secret Kenyan Muslim or about the government deliberately trying to turn control of the US military over to the United Nations, or about a government plan to kill off old people with “death panels,” will prove completely gullible and ready to suspend any disbelief when a police officer or a prosecutor makes some outlandish claim about three kids with beer fermenting equipment in their basement.
null
minipile
NaturalLanguage
mit
null
These Four “Rules” Will Not Make STAR WARS Great Again A couple weeks ago, a humble open letter found its way onto the Internet, and not just any open letter. This one was accompanied by top-notch animation, an exclusive interview on io9, its own launch party, and an a cappella soundtrack. It’s title: “4 Rules to Make Star Wars Great Again” That isn’t actually what it is; that’s just what it’s called. It would have been more accurate to title the video: 4 Pieces of Lame Conventional Wisdom and 1 Really Obvious Marketing Ploy. Hit the jump for more. Just so we’re on the same page, here’s the video: This is, after all, not the work of some gurus of storytelling or scholarly monks who’ve devoted their lives to analyzing the works of Mr. George Walton Lucas, Jr. This is a marketing agency in Portland, Oregon that figured unleashing a video custom-engineered to go viral was the best way to show off their skills. And drum up new clients. Mostly, that. I begrudge them not even a little bit for this. Kudos to them for garnering so much attention for their company — that would be Sincerely Truman. See, it worked. I just gave them some publicity. I don’t even begrudge the actual rules they offer up. Everyone should have an opinion. Well, not everyone. This is Sincerely Truman’s opinion: Rule 1: The Setting is the Frontier Rule 2: The Future is Old Rule 3: The Force is Mysterious Rule 4: Star Wars Isn’t Cute What I do begrudge is so many people in the geek-o-sphere embraced this tripe so uncritically. From io9 to CNET, and every blog in between, the video garnered nodding agreement, if they even bothered to comment on its substance at all. Sometimes it was enthusiastic, as in the case of Serial Optimist magazine, where their entire commentary was summed up with, “Yes, Star Wars can be great again!” Geek Tyrant “ultimately really like[s] what it brings to the table,” without ever really delineating what it is. On CNET, Amanda Kooser “sure hope[s] [J.J. Abrams] is paying attention to Sincerely Truman’s sweet and simple video.” She even signed the petition. Oh yes, there’s a petition. The video is paired up with a site, DearJJAbrams.com, where you can add your name to the list of people who also nodded in agreement with the video. “If we can hit one million virtual signatures,” the site says it will “hand deliver our petition along with a copy of the video.” The video is on YouTube, which I think they have access to at Disney’s headquarters. I’m not sure why they need to deliver a copy of the video. The petition, as of October 6, was at a measly 14,540 strong. There’s only 985,460 to go.* Thank God for that, because I for one sure hope J.J. Abrams is not paying attention. “Star Wars doesn’t happen in the city. It doesn’t happen in parliament, or in the library. It happens out here, away from civilization, amidst smugglers and bounty hunters.” “Star Wars is a western,” it concludes, putting a great deal of emphasis on every syllable of that word. No, it is not. Or rather, it is not just a western. It isn’t even primarily a western. It’s many things tossed into a blender: Arthurian legend, adventure serials in the tradition of Buck Rogers, samurai action films, and yes, westerns. That’s just for starters. Back in 1977, when the film came out, this fact was so fascinating they wrote scholarly essays on it, including one by Robert G. Collins in The Journal of Popular Culture entitled “Star Wars: The Pastiche of Myth and the Yearning for a Past Future.” Even Wikipedia gets in on the act, devoting a couple paragraphs in its article on pastiche to the Lucas-creation. It cites not only westerns and science fiction serials, but also gangster films and fantasy. Clearly Star Wars is blended from a rich tapestry of influence. Reducing all of this to frontier vistas and a single genre is not only overly simplistic, it ignores plenty of great Star Wars stories. The Knights of the Old Republic games had a compelling narrative and engrossing characters, and its plot unfolded all over the galaxy: from urban cityscapes to dangerous ruins on backwater worlds. Timothy Zahn’s popular Thrawn Trilogy of novels doesn’t shy away from the metropolis of Coruscant. Then there is the Clone Wars animated series, which is an outgrowth of the hated prequels, but manages to be compelling nonetheless. The strength of these stories was their characters, not their settings. They embraced the entirety of the Star Wars galaxy, and they were better for it. Trying to shoehorn their narratives into a barren, desert milieu would have only made them feel smaller, more limited than an entire galaxy could ever be. COLLIDER participates in various affiliate marketing programs, which means COLLIDER gets paid commissions on purchases made through our links to retailer sites. Our editorial content is not influenced by any commissions we receive.
null
minipile
NaturalLanguage
mit
null
Developmental expression of transcription factor genes in a demosponge: insights into the origin of metazoan multicellularity. Demosponges are considered part of the most basal evolutionary lineage in the animal kingdom. Although the sponge body plan fundamentally differs from that of other metazoans, their development includes many of the hallmarks of bilaterian and eumetazoan embryogenesis, namely fertilization followed by a period of cell division yielding distinct cell populations, which through a gastrulation-like process become allocated into different cell layers and patterned within these layers. These observations suggest that the last common ancestor (LCA) to all living animals was developmentally more sophisticated than is widely appreciated and used asymmetric cell division and morphogen gradients to establish localized populations of specified cells within the embryo. Here we demonstrate that members of a range of transcription factor gene classes, many of which appear to be metazoan-specific, are expressed during the development of the demosponge Reniera, including ANTP, Pax, POU, LIM-HD, Sox, nuclear receptor, Fox (forkhead), T-box, Mef2, and Ets genes. Phylogenetic analysis of these genes suggests that not only the origin but the diversification of some of the major developmental metazoan transcription factor classes took place before sponges diverged from the rest of the Metazoa. Their expression during demosponge development suggests that, as in today's sophisticated metazoans, these genes may have functioned in the regulatory network of the metazoan LCA to control cell specification and regionalized gene expression during embryogenesis.
null
minipile
NaturalLanguage
mit
null
Genetic diversity and flooding survival in Aegiphila sellowiana (Lamiaceae), a typical tree species from upland riparian forests. Saplings of Aegiphila sellowiana were submitted to flooding and analysis of genetic diversity in order to investigate flooding tolerance as well as its genetic determination. This response is important because it means that some lines could be planted in degraded riparian areas. Leaves were sampled from each plant, and they were submitted to different flooding periods. Mortality of saplings was 40, 80, 50, 53.3, 33.3, and 33.3% in flooding for 15, 18, 25, 50, 80 days, and flooding for 50 days followed by re-aeration for 30 days, respectively. From the total number of flooded plants, 46.7% died in the first seven days of treatment, while 53.3% survived the flooding. The percentage of polymorphic loci (P(p)), Nei's genetic diversity (H) and the Shannon index (I) were slightly higher for the group that survived the stress of flooding (surviving: P(p) (%) = 67.48, H = 0.184, I = 0.287; not surviving: P(p) (%) = 66.67, H = 0.165, I = 0.261). Analysis of molecular variance showed that 5.88% of the genetic variability was due to the differences between groups of plants surviving and not surviving flooding, while 94.12% was due to genetic differences between individuals within these groups. Similar results were obtained by principal coordinate analysis. Based on these results, we can assume the existence of environment-specific genotypes and the genetic determination of flooding tolerance in A. sellowiana. Thus, some lines of A. sellowiana could be used in the reforestation of riparian habitats, especially in uplands along riverbanks.
null
minipile
NaturalLanguage
mit
null
At the Queensland Resources Council lunch held on November 1st, in Brisbane, a journalist from the UK’s Channel 4 News stood up and asked a question of the Prime Minister, Scott Morrison: “Given the efforts that other nations are making to reduce their carbon emissions, and given the places like the great barrier reef are, we know, under threat from climate change……. “ Halfway through her question, precisely after she mentions climate change, a single loud moaned ‘boooo’ rings out in the Brisbane Convention and Exhibition Centre. She continues. “Your own government has issued multiple reports saying that climate changes poses the greatest threat to the reef. How can Australia justify opening new coal mines at this time, in the Galilee basin?” As she finishes, the entire room breaks out into a loud chorus of angry discontent. The same low and loud moan as before, but this time emitted from hundreds men, who are each one over-filled glass of white wine away from hurling chunks of coal at the woman who dared mention what happens when the product they pull from the ground is burnt. Theatrically, Prime Minister Scott Morrison (no stranger to threatening people with chunks of coal) comes to the rescue. “Because we have the best mining industry in the world!”, he weirdly responded. Australia has the highest coal exports of any country in the world; so being very good at mining kind of makes the question more salient, not less. When Morrison delivered his very motivational-coach-at-corporate-retreat reply, the moans turn to relieved, roaring cheers, and you can’t see the audience, but I’m guessing they punched the air, high-fived each other and took hearty bites out of the coal chunks like they were fresh green apples. That moment was a mile marker. These men felt okay loudly shaming a journalist who mentioned climate change. It wasn’t a private event. It was live-streamed nationally. It was a marker of power and confidence. It’s odd to see this confidence, given support for decarbonisation has hit new heights, coal mining and burning remain deeply unpopular and a few months ago, the world’s biggest climate mobilisation hit the streets. Things aren’t looking up for them. So why do they feel no shame in collectively booing a journalist asking about climate change? The way fossil fuels are defended has changed In the past few months, it feels like Australia has seem something of an acceleration towards authoritarian crack-downs on climate protest. Scott Morrison proposed, in his QR Council speech, a ban on pressuring the companies that provide services to coal companies (say, a bank that lends money to a mining project) to not do that. It’s a key component in modern climate activism. Corporations have failed, comprehensively, to take any meaningful action to reduce emissions. So have governments. Disrupting the flow of cash works. Fossil fuel companies have enjoyed the capability to displace the harm related to their products onto society, instead of paying for it themselves, and they are not reacting well to seeing that advantage erode. Protests that focus on disruption and non-violent civil disobedience have been met with increasingly harsh responses from police and politicians, too. In Queensland, it seems extremely likely that evidence used to justify harsher laws for this type of protest was fabricated. At the recent Extinction Rebellion protests in Melbourne, a Guardian journalist filmed a police officer threatening to trample protesters with a horse. This week, protests at a mining conference in Melbourne featured a police officer punching a woman in the back of the head and another police officer repeatedly hitting a woman with a baton (who had her hands up in defence). A police officer who’d been posting alt-right memes on his Facebook page (and who had called climate change a ‘hoax’) flashed a white supremacist hand sign at a Chinese protester who had ‘immigrant’ on her shirt. Another had a sticker on his uniform that said ‘Eat a dick, Hippys (sic)’. One video shows a police officer repeatedly punching a man who was already restrained and immobile on the ground. Footage shows police grabbing a Channel 7 journalist and hurling him in random directions, as he stumbles around, bewildered and trying, pointlessly, to do the right thing. There are many videos of capsicum spray being deployed wildly into crowds, including towards journalists, one of whom wrote: If you’ve never had the experience of being pepper sprayed before, all I can say is that’s it’s immeasurably worse than I ever imagined. What ensued in the moments after I was sprayed was an unbearable sensation of feeling like someone had lit a match on my skin before shoving it in my eyes. It took me at least 5 minutes to regain my sight, but even at the time of writing this—nearly 8 hours later, my vision is still blurry and my skin still burns” What is incredibly clear is that there was a very significant, heightened sense of violence from the police at the scene. They wouldn’t have felt comfortable plastering stickers onto their uniform taunting the protesters if their minds weren’t already in a place of aggression and violence. There is a demand for what is being supplied. Politicians and Australia’s media outlets have been agitating for increased acts of physical violence directed towards climate protesters, alongside more standard calls for excessive punishment and authoritarian crackdowns: 2019 is very different to 2009. There is widespread public support for climate action, alongside increasing frustration at those kicking the policy can down the road. The only pathway available, then, to sustain the fossil fuel industry is the use of government power to intervene in public speech – cracking down on boycotts and protest. It is happening in energy markets, too. The government is actively figuring out how to use intervention to squeeze more life out of decaying coal assets, alongside tentative plans to underwrite new coal-fired power generation. The long-running idea that climate deniers and fossil fuel supporters tend to be libertarians who love free markets was a little topsy-turvy. The ideology was a means to a fossil fuelled end. Today, a free, democratic society openly and loudly says that the industries that extract fossil fuels ought to stop, because doing that hurts people. The free market says solar and wind are the cheapest options for new-build energy. Today, ‘freedom’ doesn’t automatically result in public support for coal, or new coal mines and power stations. The ideology doesn’t give the right answer, so it’s time to ditch the ideology. Authoritarianism, force, coercion and violence are far more likely to lend support for new coal. So we’ll see more of that, in ratcheting escalations, to both silence public protest against fossil fuels, and to force investment in new mines and machines. That room of mining men at the Queensland Resources Council luncheon were booing and cheering with unrestrained intensity because they had just found out the leader of the country realises the value of coercion and intimidation just as much as they do. First published at Ketan Joshi’s Energy, science and technology blog. Reproduced with permission.
null
minipile
NaturalLanguage
mit
null
Over the years I have read a lot of web based comics. A couple are still going, but most have long since ended. Either they completed their runs and wrapped up all their lose ends, or just stopped up dating altogether. Some are still floating about the web suspended in the time they concluded. Others rest unfinished, and unresolved. Some ended before they even really began. This thread is dedicated to all those comics that have either ended their runs, or just plain ended unfinished. http://www.dubthis.net/ (2000- 2006) This comic harkens back to my College days. Anime Fans, and the struggles they go through. Cats Girls, and Shovels. Warp 9 to hell was a fun, completely disrespectful and profane comic chronicling the misadventures of Usagi and Mofo. Memorable for joking about anthrax on pancakes during the height of the post 9/11 'thrax scare and the long running and oddly hilarious "I cannot move my arm" gag that went from a joke strip about shitty webcomics, to a fan comic dub to full canon. Mall Monkeys. Mall Monkeys was great and set completely in a shopping mall. Memorable for a great Flash "dress up" game that's still on Newgrounds (the easter egg outfit combos and animated intro were what made it great) and the fact that before taking it off the web the creators made a CD available for fans to buy that included every strip and "extra" they had ever posted. I own one of those CDs and once gave Randy Milholland (of Something Positive fame) a zip file including every strip because he was also a fan and missed out on nabbing the CD. The Blue Beetle. It's still archived somewhere but I'm too lazy to google where exactly. It was a fun deconstruction of superhero comics. Memorable for being one of the first web comics I can remember that actually had GOOD art. In the earliest days most webcomic pioneers were more computer savvy than artists and it showed. Also memorable for the exploding jar of semen gag Warp 9 to hell later ripped off. From a Cut n' Paste webcomic to actual art about a bunch of people in a RP chatroom, except without much roleplaying. Jokes on plenty of pop culture stuff, hilarious writing, incredible artshift as it goes on and eventually it went on hiatus. One of the funniest webcomics I've ever read. The art is kinda bad but it really fits in with the vibe and increasing insanity of it. The characters are tops, the good guys are morons, Baxter is priceless from his spot in wide grin introduction and it's truly some really funny stuff. Breaks the fourth wall in the first panel and continues to do so, borderline genre savvy abound and it got discontinued in it's prime, which was constant. It was amazing.
null
minipile
NaturalLanguage
mit
null
Q: #include C++ header files in opencv I just use #include <opencv2/opencv.hpp> and things worked. May I asked why we should do like: #include <opencv2/imgproc/imgproc.hpp> #include <opencv2/objdetect/objdetect.hpp> #include <opencv2/highgui/highgui.hpp> And why here are *.hpp files but not *.h files? Excuse me for asking for such simple questions. A: .hpp is a convention for C++ language header files. Since OpenCV has a long story of a C API in parallel of the C++ one, one can easily understand why the people writing the library chose this extension to avoid confusion. For the global vs. small includes question, you need to recall how things work in C/C++. The header files are just copied into your .c file before compilation. When you use the global include opencv.hpp (which is some kind of umbrella since it includes all the others), all the library header files are included and thus copied into your .cpp file. This means less typing for you but in the end a bigger file for the compiler. Hence, compilation times are longer. When you use the local header files, you just add one OpenCV module at a time. Thus, if you limit yourself to the modules that you actually need, you have a faster compilation. Another advantage is that you can really be aware of what modules you use in your program, which helps you in typing the corresponding correct linker options, e.g., -lopencv_core -lopencv_imgproc if you use only the image processing module. A: #include <opencv2/opencv.hpp> This header file include all the other header files in OpenCV in its body. So, if you include that file, it is more than enough. ".h" is for C and ".hpp" is for C++. This is just the standard. A: just open opencv2/opencv.hpp file and I think you will get your answer.
null
minipile
NaturalLanguage
mit
null
Star Trek is often thought of as being a science fiction franchise about brainy people who generally get along and find themselves involved in complex morality plays, and yeah, it is. However, Star Trek is also full of dark, mysterious, physically commanding and sexy bad guys (and girls). View Photo Gallery Between the evil “mirror universe” versions of the ship’s heroes, and bombastic bad guys like Ricardo Montalban‘s Khan and Benedict Cumberbatch‘s John Harrison, Star Trek has a long list of compelling villains to find yourself sympathizing (a little too much) with. Not to mention the fact that patently sexy people such as Kim Cattrall, Tom Hardy and Iman have also shown up to threaten the Enterprise on the big screen. I mean, sure, it’s a little weird to find yourself sexually attracted to a Klingon or an Android off his rocker, but Star Trek has always been about exploration. And who hasn’t been a wee bit intrigued by Gorn? And while we’re on the subject of villains…who are Benedict Cumberbatch’s and Zachary Quinto‘s favorite Star Trek foes????
null
minipile
NaturalLanguage
mit
null
1. Field of the Invention The invention is directed to purified and isolated polypeptides, the nucleic acids encoding the polypeptides, and processes for production of recombinant forms of the polypeptides. This invention is also directed to antibodies that specifically recognize the polypeptides, compositions containing the polypeptides, and to the use of these materials in various assays. In particular, the polypeptides, the nucleic acids encoding the polypeptides, and the antibodies are useful for the detection of human B cell lymphomas, enhancing the production of interferon γ (IFN-γ), enhancing the growth of NK cells, treating viral infections and tumors, and enhancing the activity of cytotoxic T lymphocytes (CTLs). 2. Description of Related Art 1. Lymphomas The malignant lymphomas represent multiple diseases with diverse morphologic and clinical expressions. Morphologic classification schemes have been shown to be useful in delineating natural history, prognosis, and response to therapy. However, in some instances, distinctive morphologic entities may be very closely related clinically or biologically or both, whereas other diseases that share morphologic similarities may be clinically and biologically quite distinct. Thus, immunological methods have become essential tools for the diagnosis and classification of certain human tumors, particularly for leukemias and lymphomas. More particularly, some patients carrying malignancies have been found to produce antibodies against tumor-associated or other malignant cell-associated surface determinants as well as against a variety of differentiation and other non-tumor antigens. Several very sensitive immunological procedures have been developed for the detection of such antibodies. A variety of other markers of hematopoietic malignancies allows clinically valuable categorizations, which are not possible by morphological or histochemical parameters. These markers can also be detected using immunological procedures. One of the main advantages of these procedures over other methods for the measurement of tumor-associated markers is their high level of sensitivity, with the ability often to detect a substance at nanogram or even picogram levels. In addition, immunological tests afford the ability to discriminate among substances with closely related structures and thereby to identify tumor-associated analogs found in normal, nonmalignant states. Many tumor-associated markers have been detected in the sera or other body fluids of patients with malignancies. A few of these markers have been sufficiently restricted to tumor-bearing individuals to aid in detection or differential diagnosis (or both) of malignant disease. However, most markers have been found to lack sufficient specificity for such applications, with an appreciable frequency of elevated marker levels in patients with nonmalignant diseases (i.e., false positive results). In addition, malignant lymphomas are usually an admixture of a neoplastic element and normal elements or both. A cell suspension prepared from a malignant lymphoma will consist of a mixture of benign and malignant cells, and the malignant cells may not necessarily be in the majority. To determine the phenotype of malignant cells, it is necessary to identify those markers associated with neoplastic cells. It should be evident that there exists a need in the art for the identification of additional cell surface markers associated with malignant conditions. In particular, there is a continuing need for cell surface markers associated with malignant lymphomas. The identification of specific cell surface markers associated with malignant lymphomas will aid the detection of malignancies associated with these markers. 2. NK Cells One of the major types of circulating mononuclear cells is that of the natural killer, or NK, cell (M. Manoussaka et al., Journal of Immunology 158:112-119, 1997). NK cells are a cell type derived from bone marrow precursors (O. Haller et al., Journal of Experimental Medicine 145:1411-1420, 1977). NK cells appear to be closely related to T cells and the two cell types share many cell surface markers (M. Manoussaka et al., 1997). Although NK cells are cytotoxic cells as are some T cells, unlike T cells, NK cells do not express the T-cell receptor or CD3 components (P. Scott and G. Trinichieri, Current Opinion in Immunology 7:34-40, 1995; G. Trinichieri, Adv. Immunology 47:187-376, 1989). NK cells commonly express CD16 and CD56 antigens (K. Oshimi, International Journal of Hematology 63:279-290, 1996). Similar to cytotoxic T lymphocytes (CTL), NK cells are capable of exerting a cytotoxic effect by lysing a variety of cell types (G. Trinichieri, 1989). NK cells are capable of exerting cytotoxicity in a non-MHC restricted fashion (E. Ciccione et al., J. Exp. Med. 172:47, 1990; A. Moretta et al., J. Exp. Med. 172:1589, 1990; and E. Ciccione et al., J. Exp. Med. 175:709). NK cells mediate some of their functions through the secretion of cytokines, such as interferon γ (IFNγ), granulocyte-macrophage colony-stimulating factors (GM-CSFs), tumor necrosis factor α (TNF-α), macrophage colony-stimulating factor (M-CSF), interleukin-3 (IL-3), and IL-8 (P. Scott and G. Trinichieri, 1995). Cytokines including IL-2, IL-12, TNF-α and IL-1 can induce NK cells to produce cytokines (P. Scott and G. Trinichieri, 1995). IFNγ and IL-2 are strong inducers of NK cell cytotoxic activity (G. Trinichieri et al., Journal of Experimental Medicine 160:1147-1169, 1984; G. Trinichieri and D. Santoli, Journal of Experimental Medicine 147:1314-1333, 1977). NK cells can be stimulated and expanded in the presence of IL-2 (K. Oshimi, International Journal of Hematology 63:279-290, 1996). IL-12 has been shown to induce cytokine production from T and NK cells, and augment NK cell-mediated cytotoxicity (M. Kobayashi et al., Journal of Experimental Medicine 170:827-846, 1989). NK cells can lyse a variety of cell types, including normal stem cells, infected cells, and transformed cells (D. See et al., Scand. J. Immunol. 46:217-224, 1997). Cells that lack MHC class I are susceptible to NK cell-mediated lysis (H. Reyburn et al., Immunol. Rev. 155:119-125, 1997). The lysis of cells occurs through the action of cytoplasmic granules containing proteases, nucleases, and perforin (D. See et al., 1997). Antibodies directed against CD2 and CD11a inhibit the cytotoxic effect of NK cells (O. Ramos et al., J. Immunol. 142:4100-4104, 1989; C. Scott et al., J. Immunol. 142:4105-4112, 1989). NK cells can also lyse cells by antibody-dependent cellular cytotoxicity (D. See et al., 1997). NK cells have been shown to destroy both extracellular protozoa and the cells infected by protozoa (T. Scharton-Kersten and A. Sher, Current Opinion in Immunology 9:44-51, 1997). In most instances, cytotoxic activity appears to be dependent upon lymphokine activation (T. Scharton-Kersten and A. Sher, 1997). NK cells have been implicated as mediators of host defenses against infection in humans with varicella zoster, herpes simplex, cytomegalovirus, Epstein-Barr virus, hepatitis B, and hepatitis C viruses (D. See et al., 1997). Many viruses induce NK cell cytotoxicity, including herpesvirus and cytomegalovirus (C. Biron, Current Opinion in Immunology 9:24-34, 1997). The induction of NK cell activity is a result of the induction of IFN-γ by viral infection, and NK cells are important in the early defense against many viral infections (C. Biron, 1997). The NK1+CD3− population of NK cells is the subset activated by viral infection (C. Biron, 1997). The response of NK cells to viral infection involves direct cytotoxicity and production of various cytokines such as IFN-γ and TNF-α (C. Biron, 1997). A number of human lymphoproliferative disorders of NK cells are known. These include NK cell-lineage granular lymphocyte proliferative disorder (NK-GLPD), NK cell lymphoma, and acute leukemia of NK cell lineage (K. Oshimi, International Journal of Hematology 63:279-290, 1996). Most patients with aggressive type NK-GLPD die of the disease (K. Oshimi, 1996). NK cell lymphoma is resistant to combination chemotherapy (K. Oshimi, 1996). NK cells activated with IL-2 have been shown to have activity against human leukemia cells (L. Silla et al., Journal of Hematotherapy 4:269-279, 1995). Furthermore, NK cells appear to have a role in the treatment of chronic myeloid leukemia (K. Oshimi, 1996). NK cells are involved in both the resistance to and control of cancer spread (T. Whiteside and R. Herberman, Current Opinion in Immunology 7:704-710, 1995). Furthermore, the presence and activation of NK cells may be outcome determinative; low or non-existent NK activity is associated with a high frequency of viral disease and cancer (T. Whiteside and R. Herberman, 1995). In view of the important role that NK and T cells play in vivo, in host defenses, tumor cell surveillance, and autoimmune diseases, there exists a need in the art for polypeptides suitable for the in vivo and in vitro enhancement of NK and T cell activity. 3. Interferon γ The production of IFNγ is a function of T cells and NK cells, and IFN-γ activates antiviral immune reactions (E. De Maeyer and J. De Maeyer-Guignard, in The Cytokine Handbook, A. W. Thompson (ed.), Academic Press, 1994, pp. 265-288). IFN-γ preferentially inhibits Th2 proliferation, but not Th1 proliferation (T. F. Gajewski and F. W. Fitch, J. Immunology 140:4245-4252, 1988). IFN-γ also plays an important role in macrophage activation and promotes proliferation of activated B cells (De Maeyer and De Maeyer-Guignard). These, and other effects of IFN-γ, indicate that increased in vivo levels of IFNγ production serve as a general immune modulator. IFN-γ has been used clinically in treating chronic granulomatous disease, atopic dermatitis, systemic achlerosis, lepratmatous leprosy, common warts, hepatitis B infection, myelogenous leukemia, and metastatic melanoma (J. Mordenti et al., in Therapeutic Proteins, A. H. C. Kung et al. (eds.), W.H. Freeman and Co., 1993, pp. 187-199). In view of the important role that IFN-γ plays, in vivo, in immune modulation, there exists a need in the art for polypeptides suitable for the enhancement of in vivo and in vitro IFN-γ levels. 4. Cytotoxic T Lymphocytes CTLs are an important in vivo defense against viral, and bacterial, and cancerous diseases, in that they lyse target cells bearing foreign antigens (G. Berke, in Fundamental Immunology, W. E. Paul (ed.) Raven Press Ltd., 1989, pp. 735-764. In view of the important role that CTLs plays, in vivo, in the immune response to infections and tumor surveillance, there exists a need in the art for polypeptides suitable for the enhancement of in vivo and in vitro CTL activity.
null
minipile
NaturalLanguage
mit
null
In cities across the U.S.A., Marxists are using the Protests of the killing of George Floyd as a Pretext for Mobilizing the Far Left, many of them University-indoctrinated Millennials, to gain power. In Seattle, Marxist-led Rioters have literally taken over Blocks of the City Center to create CHAZ “Capital Hill Autonomous Zone” with shouts of “Defund the Police!” Of course, that means they want to be and, in CHAZ apparently are, the Self-Appointed (Armed) Police. The evidence that the Leftist Movement (masquerading as Black Lives Matters supporters) is Marxist is found in their recently released Manifesto. [Read More...] Over 35 Million Americans are now unemployed, including 135,000 Healthcare Workers. But Speaker Pelosi’s so called “Heroes” Act just barely passed by the House would allow the Admission of 150,000 Foreign Healthcare Workers to take American healthcare jobs. But While the Heroes Act would also provide funding for unemployed legal immigrants workers, California’s Governor Gavin Newsom just authorized payment of $125Million to Illegal Alien Workers -- $75 Million from California Taxpayers and $50 Million from Corporate Donors (who just love that Cheap, i.e., U. S. Taxpayer-subsidized, Labor). [Read Further] President Trump’s Moratorium Executive Order only lasts for 60 days and only applies to applicants for permanent residence! But 22 Million Americans are Now Unemployed! And the Order does not include those applying for Temporary Work-Based Visas! Any and all job opportunities should be reserved for American Citizens Only, for the Foreseeable Future. This means Halting all H1B and H1A hires permanently, Inter Alia. All other immigration must be included in the All-Categories-Included Zero-Net Moratorium on Legal Immigration. Help CCN make the Moratorium Permanent. Former Senator, Jeff Sessions, makes the case:[Read More ...] April 21, 2020 Thanks and congratulations to Carrying Capacity and Balance…groups which have worked for decades in order to obtain a 5 year moratorium on all immigration. Now comes #NumbersUSA (Roy Beck) and #FAIR (Dan Stein) who are striving to take credit for this work. Those 2 windbags have never in the history of their organizations influenced any piece of state or national legislation regarding a MORATORIUM or anything close…a word never known to cross legislative lips until President Trump announced a temporary moratorium to commence immediately. Again, many thanks to you and your followers! Our very best always, Joe & Barbara Mc******n For over twenty years, CCN's Donors-Activists have opposed Mass Immigration, Globalism and Marxism and advocated for protecting Lifeboat USA, with a Zero-NET all-categories included Moratorium on Legal Immigration as our Flagship Initiative. The Disaster of Modern Italy is an Object Lesson on the Consequences of succumbing to Mass Immigration, Globalism and Marxism, and yes, the Lethal CoronaVirus Pandemic is just one direct consequence. And the USA is NOW under Great Threat from the Globalists, Marxists and Open Borders Crowd. But that Italian Disaster can be avoided for the USA if, and only if, CCN’s Solution is adopted. So First, Consider Today’s Italian Horror as described by the Noted Italian Author, Giacomino Nicolazzo. [Read Here...] The CoronaVirus Bill pushed by the Democrats contains several outrageous Foreign Workers First Provisions. We quote from Breitbart Article. A Hundred-thousand foreign workers to get college jobs or blue collar Jobs while Millions of Americans lose their careers. The House Democrats’ coronavirus recovery bill allows several hundred thousand foreign workers to get college jobs or blue-collar jobs while millions of Americans lose their careers…. “Congress seems hell-bent on replacing Americans with foreigners,” said Mark Krikorian, the director of the Center for Immigration Studies. “We’re going to have 30 percent unemployment or more — higher than the Great Depression — and yet we are going to bring in more people from abroad? It surreal.” “This House bill is disgusting,” said Marie Larson, a co-founder of the American Workers Coalition, which organizes U.S. graduates to oppose companies’ growing use of foreign visa workers. “It is an overreach; it has to be called out.” [Read More] CCN Activists' Success Wins New $$$ Match Offer to Counter New Threats CCN’s successful leadership late last year in facilitating the stopping of “Unanimous Consent” for S.386 “ ‘Fairness’ to Skilled Workers” (AKA UNFairness to American Workers) Bill by Senator Kamala Harris (D-CA) and Senator Mike Lee (R-UT) which would inter alia have allowed admission of 300,000 Indian workers annually plus their families and facilitating stopping the Midnight Merger of Senator Dick Durbin’s (D-IL) Open Borders RELIEF Act with Harris/Lee’s S.386! (see CCN’s Alert) is becoming widely recognized. But for CCN, these (Merged) Bills would likely have been on the President’s Desk before last Christmas! Indeed, in recognition of our success and the Urgent Need to Counter New Threats from the Open Borders Gang, a generous CCN Supporter has just offered to Match all Donations to CCN this Month up to $5,000! [Read More] Legalized Immigrant with Gonorrhea Rapes 4-Year-Old Twin Sisters That such a Rapist Monster can become legalized and, apparently, now a U.S. Citizen, demonstrates, once again, that the USA’s Legal Immigration System (and especially the uncapped categories like Asylees) are Magnets for Illegals and other Criminals. And given the Net (after subtracting Taxes Immigrants pay) Costs of the approximately 1.5 to 1.6 Million Annual Legal Immigrant Flow, of $758Million per year per Congressional District to U.S. Taxpayers, the Current System is neither justifiable nor Sustainable. But before we lay out The Solution to prevent these Outrages in the future, consider what the Rapist is actually convicted of doing. [Read Further] The Ongoing Displacement of Americans Out of Our Own Country — Guest Essay Excerpts Although CCN may not agree with this Guest Essay in every respect (e.g., the current situation is not caused only by some Democrats, but also by some Republicans In Name Only [RINOs] and others as well), we think this Superb Essay by World Cyclist and Mountaineer, Frosty Wooldridge, deserves wider Distribution. [Read More] CCN Activists Betrayed by Midnight Deal Help Stop Amnesties 2019 Now! & Insist Congress give us Citizens a $330 Billion Christmas Present Your Congressional Represetatives threaten American jobs and prosperity again! [Read More] CCN Activists Lead Stoppage of Jobs Giveaway Bill & Win $$$ Match Offer But New Massive Amnesty Threat Looms — Help Us Stop It Now! URGENT ACTION ALERT CCN’s recent successful leadership in facilitating the stopping of “Unanimous Consent” for S.386 “ among other successes is now widely recognized. Yet, Congress threatens American jobs and prosperity again! [Read More] Opportunity to Multiply Our Success — Donor Match Offer Help PUSH CCN’s Solution URGENT ACTION ALERT CCN’s recent successful leadership in facilitating the stopping of “Unanimous Consent” for S.386 “ ‘Fairness’ to Skilled Workers” (AKA UNFairness to American Workers) Bill by Senator Kamala Harris (D-CA) and Senator Mike Lee (R-UT) which would inter alia have allowed admission of 300,000 Indian workers annually plus their families and facilitating stopping the Midnight Merger of Senator Dick Durbin’s (D-IL) Open Borders RELIEF Act with Harris/Lee’s S.386! (see CCN’s recent Alert) is becoming widely recognized. [Help Us Reach this Goal] URGENT ACTION ALERT $330 Billion /Year NET Taxpayer Cost for Legal Immigration! Help Stop It with CCN’s Solution CCN has taken the lead in exposing the $330 Billion Annual NET (after subtracting Taxes Immigrants pay) Cost of Legal Immigration to American Taxpayers. That’s $758 Million per Year NET per Congressional District and does not include State and Local NET Costs. See CCN’s NET Cost of Legal Immigration Study. Worse, much of this is borrowed Money! And much of the pressure to continue the Legal Immigration flow comes from the very well heeled Cheap Labor Lobby who make Huge Donations to members of Congress. Result: Wage Depression and Job Loss for American Workers — over 5 Million Jobs lost since 2005! [Read More] Secret Dealing to Kill Americans’ Jobs & Increase Mass Immigration URGENT ACTION ALERT Senator Mike Lee (R-UT) tried to push through his Job Killing S.386 which would admit 300,000 Indian workers per year plus their families plus others, on Unanimous Consent (i.e., without hearings or votes). But this was temporarily stopped by Senators Perdue (R-GA) and Paul (R-KT) who subsequently lifted their objections. But then Senator Dick Durbin (D-IL) vetoed Unanimous Consent so he could introduce his RELIEF Act to greatly increase Legal Immigration in addition: 4 Million Green Card (permanent resident!) increase within the next five years thus making virtually all the Indian and other H1bs and family permanent residents on a path to Citizenship and Voting rights 100,000 Green Card per year increase for Immigrant family members Eliminate ALL! per-country Green Card caps Now Lee and Durbin are working to “marry” the two bills in Secret Negotiations in the Dead of Night, Sources inform us. [Read More] URGENT ACTION ALERT Oppose/Expose S.386 USA Jobs Giveaway & Sellout Senators Every year, 800,000 Americans graduate from College but S.386 (Harris D-CA) would give these jobs to 300,000 Indian contract workers per year, plus other H1Bs which would be admitted under S.386! Worse many Senators pushing this Bill are Selling out American Workers by following the Lead of Senator Mike Lee (R-Utah) who has received Donations from the following Big “Cheap” Labor Lobby companies: Microsoft, $33,000; Google, $18,400; Amazon, $12,500; Oracle, $11,000; Mark Zuckerberg's Facebook, $11,000 and the Koch-owned Koch Agronomic Services, $11,000. (cf OpenSecrets.org) So Ask Senator Lee what his priorities are — Jobs for Citizens of Utah and the USA or for the Cheap Labor Lobby Mega-Companies who have donated lavishly to him. Fortunately, a CCN Activist facilitated stopping Senator Lee’s attempt to have S.386 approved on “Unanimous Consent” by emphasizing to Senator Perdue (R-Georgia), S.386’s disastrous consequences for Americans which Perdue initially recognized then rescinded his opposition, thus caving to the Cheap Labor Lobby. The House version of S.386 passed weeks ago. But now, Sen. Dick Durbin (D-IL), has nixed Unanimous Consent, saying that S.386 does not allow enough Legal Immigrants! Incredible! But Durbin’s action does give us the Opportunity to Defeat this Bill because the Senate is in recess for two weeks, and many Senators “have gone home”. Act NOW! Ask your Senator to reveal their Donor List and to publicly oppose the High-skilled American jobs giveaway Bill — S.386 and Insist they take a stand Against Mass Legal Immigration which is a magnet for Illegal Aliens, who aspire to fill the Legal Immigration “Slots” like the uncapped Asylee Category. Contact your Senators’ local offices now and tell them what you think. Worse, under S.386 other relatively low-skilled H1Bs and Immigrants in other categories would continue to take jobs from Americans and depress American Wages and to increase costs to American Taxpayers who subsidize the Globalist companies which hire these Immigrant workers. (See CCN’s Net Costs of Legal Immigration Study). There is no shortage of skilled American Workers as the three studies on which we earlier reported show.[Read More] URGENT ACTION ALERT Stop Giveaway of 300,000 Prime American Jobs! Every year, 800,000 Americans graduate from College with degrees in healthcare, business, engineering, math, science, and These Graduates’ job prospects are seriously impaired by the additional 300,000 Indian contract workers, plus other H1Bs which would be admitted under the so-called “Fairness to High-Skilled Immigrants Act” (S.386, Kamala Harris — D, CA) to be considered by the Senate this September! And other relatively low-skilled H1Bs and Immigrants in other categories would continue to take jobs from Americans and depress American Wages and to increase costs to American Taxpayers who already subsidize them for the benefit of the Globalist companies which hire them. (See CCN’s Net Costs of Legal Immigration Study)[Read Further] URGENT ACTION ALERT S.386 (H.R. 1044-Companion Bill Disaster) Is Stoppable IF H.R. 1044 “Fairness for High-Skilled Immigrants Act” (aka “Job Killer for Americans Act”) passed the House in early July with support from a Majority of Dems and 140 RINO Republicans. And now, an equally Disastrous Companion Bill has been Introduced in the Senate (S.386 — Kamala Harris, D, CA) These Bills are Disasters because they would greatly increase Legal Immigration and
null
minipile
NaturalLanguage
mit
null
Have you heard about “libertarian populism” yet? If not, you will. It will surely be touted all over the airwaves and the opinion pages by the same kind of people who assured you, a few years ago, that Representative Paul Ryan was the very model of a Serious, Honest Conservative. So let me make a helpful public service announcement: It’s bunk. Some background: These are tough times for members of the conservative intelligentsia — those denizens of think tanks and opinion pages who dream of Republicans once again becoming “the party of ideas.” (Whether they ever were that party is another question.) For a while, they thought they had found their wonk hero in the person of Mr. Ryan. But the famous Ryan plan turned out to be crude smoke and mirrors, and I suspect that even conservatives privately realize that its author is more huckster than visionary. So what’s the next big idea? Enter libertarian populism. The idea here is that there exists a pool of disaffected working-class white voters who failed to turn out last year but can be mobilized again with the right kind of conservative economic program — and that this remobilization can restore the Republican Party’s electoral fortunes.
null
minipile
NaturalLanguage
mit
null
An Australian man has been jailed for just on 2½ years for travelling to New Zealand with thousands of images of dead and mutilated women and children on his computer. Thomas Arpad Meyer, 56, an IT consultant from NSW, was caught with 4000 objectionable images when he travelled to New Zealand for a five-day business trip in April. He was charged with eight counts of importing objectionable publications based on 39 images extracted from the 4000 found on his electronic devices. The images had a focus on sexual violence and torture. Meyer appeared in Auckland District Court where Judge Eddie Paul said his justifications showed how "distorted" his views were.
null
minipile
NaturalLanguage
mit
null
Stephen Totilo Call it installation or call it caching, but the bottom line is that you will have to save large chunks of PlayStation 4 games to the system's hard drive. It's not an option. It's mandatory on Sony's next-gen system. Today, at a stylish waterfront hotel in New York City that's been taken over by Sony for all things PS4, the system's lead architect, Mark Cerny, explained just how these requirements work. The PlayStation 4's internal hard drive is 500GB, and if you buy and start playing just two of … Read more Read more If you are playing a disc-based game, the system will begin caching the disc when you put it in the console and get ready to play. The game is saving part of itself to the system's hard drive. The amount of data that has to be saved before you can start will vary per title. Cerny said that for the launch game he directed, Knack, users should only have to wait 10s of seconds to play the game. After that, as you play, the game will stream more content to the console's 500GB hard drive. Knack will use 37GB of space overall, as noted on the game's box. Obviously, it won't take many games to fill the console's hard drive. Advertisement Cached/installed game data will stay on the hard drive until the user deletes it. Cerny said that there had been some internal discussions at Sony about having the PS4 auto-delete installed data from games that players hadn't used in a while. They decided against it, figuring that gamers would never want to feel "blindsided" and would prefer to make their data management decisions manually. Probably a good choice! The disc installation is required on PS4 because the console is not designed to read games off of discs. It's not a PlayStation issue. It's a physics issue. The machine may have a Blu-Ray drive that's about three times faster than the PS3 and sixteen times as much memory, but it's still more expedient for the PS4 to read data from its own hard drive. Cerny said his team had heard too many complaints from current-gen developers about having to wait to load in new levels of games. Putting the data on the readily-accessible hard drive alleviates that. Not surprisingly, Microsoft's Xbox One requires installation from Blu-Ray, too, and only runs games off the hard drive. If a PS4 user decides to download a game, they will have to wait longer to play. Cerny couldn't provide as narrow an estimate on how long a player who decided to download Knack would have to wait. That depends in large part on a user's Internet connection speed. Ideally, he said, they wouldn't have to wait more than an hour before beginning to play the partially downloaded games. Other games may be set up differently, allowing users to start playing them sooner or requiring them to wait longer. With these kinds of download speeds and requirements, players may want to queue their PS4 downloads long before they want to start gaming or download in the background while doing something else. Or just drive to the store and get a disc. We'll have much more about the PS4 in the coming days as well as a review of the system at 9am ET, on Wednesday, November 13.
null
minipile
NaturalLanguage
mit
null
Statistical considerations in economic evaluations: a guide for cardiologists. The author reviews statistical methods commonly applied in economic evaluations that rely on individual patient-level data. The paper includes a review of foundational concepts, unique characteristics of health economic data, and methods developed to address them. The paper then highlights issues that should be considered in the interpretation of findings from economic evaluations.
null
minipile
NaturalLanguage
mit
null
Courses Details NUTR631: Metabolism of Vitamins & Minerals Description: This course provides an in-depth introduction to vitamin and mineral metabolism with particular emphasis on nutrient bioavailability and absorption, transport and tissue accumulation, regulation of nutrient metabolism and homeostasis, and nutrient function. Other topics include the health effects of inadequate and excessive micronutrient intake, methods used to estimate nutrient requirements and establish nutrient intake reference and upper limit levels. The depth of micronutrient metabolism covered in this course will provide a sufficient background for students to better understand the scientific literature of individual micronutrients. The course will consist of lectures on the major metabolic/regulatory topics for each micronutrient as well as discussions of nutrient-related topics from the current scientific literature.
null
minipile
NaturalLanguage
mit
null
Q: c++0x_warning.h:31:2: error: I was trying make a file and got this error. I am a newbie. Can any one help me here. /usr/include/c++/4.6/bits/c++0x_warning.h:32:2: error: #error This file requires compiler and library support for the upcoming ISO C++ standard, C++0x. This support is currently experimental, and must be enabled with the -std=c++0x or -std=gnu++0x compiler options. How to enable with -std=c++0x? I used this in my makefile #CXX_VERSION_FLAG = -std=c++0x but did not work. Thanks, Addy A: No, just pass these flags (aka options) to the compiler. Instead of running gcc ..., run gcc -std=c++0x ... (or -std=c++11 for newer compilers).
null
minipile
NaturalLanguage
mit
null
Role of deferoxamine on enzymatic stress markers in an animal model of Alzheimer's disease after chronic aluminum exposure. The effect of the chelator deferoxamine (DFO) on the activity of enzymatic stress markers was assessed in amyloid beta peptide (AβPP) transgenic mice, an animal model of Alzheimer's disease, after oral aluminum (Al) exposure for 6 months. AβPP transgenic (Tg2576) and C57BL6/SJL wild-type mice of 5 months of age were fed a diet supplemented with Al lactate (1 mg of Al/g food). Four groups of Tg2576 and wild-type animals were used: control, Al only, DFO only, and Al plus DFO. Mice in the DFO-treated groups received also subcutaneous injections of 0.20 mmol/kg/d of this chelating agent twice a week until the end of the study at 11 months of age. The hippocampus, cerebellum, and cortex were removed and processed to examine a number of oxidative stress markers. Furthermore, the expression of Cu-Zn superoxide dismutase, glutathione reductase, and catalase was evaluated by quantitative reverse transcriptase polymerase chain reaction analysis. Aluminum levels in the hippocampus of Tg2576 mice were higher than those found in cerebellum and cortex, while the main oxidative effects were evidenced in the presence of DFO only. Oral Al exposure of AβPP transgenic mice would have some potential to promote pro-oxidant events, while DFO administration would not help in preventing these deleterious effects.
null
minipile
NaturalLanguage
mit
null
This invention relates to interactive television program guide systems, and more particularly, to program guide systems that allow television service providers such as cable operators to provide showcases for various types of program offerings. Cable, satellite, and broadcast television systems provide viewers with a large number of television channels. Viewers have traditionally consulted printed television program schedules to determine the programs being broadcast at a particular time. More recently, interactive electronic television program guides have been developed that allow television program information to be displayed on a viewer's television. Interactive program guides are typically implemented on set-top boxes. Such program guides allow users to view television program listings in different display formats. For example, a user may instruct the program guide to display a grid of program listings organized in a channel-ordered or a time-ordered list. Users may also search and sort program listing by theme (e.g., movies, sports, etc.) or by title (i.e., alphabetically). A user may view additional information on a program by placing a highlight region on a desired program listing and pressing an “info” button. The user may purchase a pay program from the program guide by placing the highlight region on a program listing and pressing an “OK” button. Although a user is often able to find information on a program of interest by searching for the program with the tools available in the program guide (e.g., by searching for listings in a particular category), this process requires that the user take an active role in locating the information. If a user desires a more passive experience, the user may not venture beyond the display screens in the program guide that present simple time-ordered lists of program information. As a result, the user may not be made aware of many of the cable system operator's offerings. It is therefore an object of the present invention to provide an interactive television program guide that enhances the ability of a service provider to supply users with information on the programming available from the service provider.
null
minipile
NaturalLanguage
mit
null
Illustrating once again that the prison planet being built around us far outstrips anything Aldous Huxley or George Orwell ever imagined, a Wired News report details how police forces worldwide are preparing to unveil drone aircraft that can not only conduct surveillance of protesters, but also zap them into submission with non-lethal weapons.
null
minipile
NaturalLanguage
mit
null
When a switching element such as a power semiconductor module is switched off, a spike-like surge voltage is generated. When the surge voltage is large, there is a risk of causing a short-circuit breakdown of the switching element. Conventionally, there is disclosed a technique in which, by connecting snubber capacitors and semiconductor modules with metallic bars having a relatively high conductivity and wiring on the substrates, the impedance components between the snubber capacitors and the semiconductor modules are made lower, to reduce the spike-like surge voltage that flows when the switching element is switched off, and, for adjacent semiconductor modules, by equalizing the wiring length between the snubber capacitors, the impedance components for respective semiconductor modules are made substantially equal, which results in equalization of protection effects from a surge voltage among the respective semiconductor modules (for example, Patent Literature 1).
null
minipile
NaturalLanguage
mit
null
Monday, July 29, 2013 Okay, let's talk about foster kids. Why? Because I said so. Foster kids kill me. I fret about "who we're gonna get" until I have the trots. And then we "get them" and it's like "oh, this isn't so bad" and then they start to settle in and I'm like "whoa, nelly. This business be crazy, yo." Seriously though, they are great kids. Ten and thirteen year old brothers who have to share a room at my house, which apparently is the "worst thing evah" for the ten year old. Excuse me, sir. I have to share a room so why shouldn't you?? So, I've been pondering their nick names for the purposes of this here blog. It's obvious the little one will be forever known as Chill because never, in the history of relaxed people, has there been a more chill dude. In fact, sometimes he's so chill I wonder if he's still breathing. And then there is the big one. A brand new teenager. And man oh man, can this dude talk. He talks and talks and talks and when he's not talking I have to check if he's still breathing. Because geez Louise, surely when you talk that much, and then stop talking, its because you are not breathing. So then I get the trots from checking everyone's pulse all the time. But, he hasn't talked himself to death yet. I do declare, though, he's working on it. And everything he says starts with, "What happens if..." Him: what happens if I eat this? Me: ummm, your tummy gets full?? Him: what happens if that guy falls? Me: ummm, he might get hurt?? Him: what happens if.... Me: for the love!!! Nothing!! Nothing happens! The world still spins. The sun still shines. Life goes on, buddy. It's okay. We shall call him ChitChat. Because, mercy, the chitchatting. So, there you have it. A brief introduction to the two human beings who have flown into my life and given me the endless trots. My poor nerves. In conclusion, here is a convo I had with ChitChat about the necessity of diet Pepsi. Saturday, July 27, 2013 I'm just going to say it. As awful as it may sound. As horrible as you might think I am. As ungrateful as it may sound. I'm just going to say it. I can't wait for September. There, I said it. I love my kids. I really do. And these foster kids who have hit their one month mark? I really really like them too. But the combination of my kids and these great foster kids is a cacophony of LOUD LOUD LOUD voices. This might be the loudest gaggle of kids in the history of gaggly kids. And there are reasons the noise is not sitting so well with me. But that's not the point. The point is the talking. There is endless talking. And between one 15 year old, two 13 year olds, two 10 years olds and a very enthusiastic 7 year old there is no end to the talking. Please, is it not possible to enjoy each other's company without all the loud chit chat? I mean, I think it's possible but the children strenuously object. Strenuously object? Yes, it is possible to strenuously object. And they do. Oh, trust me, they do! Now I'm in the mood for some Tom Cruise and Demi Moore. Great... Moving on. The children have passionately taken to a new driving game. I really enjoy it. And by that I mean I despise it with every fibre of my being. It goes a little something like this: Child: Look, it's a Honda. No wait, Dodge. Another child: Hey look! It's a Dodge. Oh, nope, that's a Suburu. And still yet, another child: TOYOTA!! Other child: yep! Good job. I hate Toyotas. HONDA! Another child: no, that's a Lamborghini. Previous child: huh? No! That's a Honda! As if you saw a Lamborghini. Where did you see a Lamborghini? Other previous child: back there, you idiot. Geez, we're driving, the cars are moving. Idiot. Me: we don't say idiot in our family. Silence. Original child: VOLKSWAGON!!!! Another child: FORD!!!! And still yet, another child: DODGE!! Wait, no, what is that? Know-it-all child: It's a Suburu. Previous child: what's a Suburu anyway? Know-it-all child: it's a car. Idiot. An ugly car. Me: hey!! What did I say about saying idiot?!?! Silence. Original child: HONDA!!! So.....without further explanation or justification of my feelings, let's reiterate. Friday, July 26, 2013 For some bizarre reason, the idea of blogging has become completely daunting to me. I don't think I can do it, which is weird because I have been doing it for three years, with little to no effort. I do believe they call this the inner workings of one's mind. My inner workings can sometimes be mean and confusing and lead me to believe I am not capable. Of anything. Plus, it's July. It seems every July I go through something where survival with all the children home from school becomes the number one priority, everything else withers away and almost dies. Like the clean house. Where is the clean house? So anyway, I just got back, well three days ago I just got back, from 9 days in the glorious Okanagan at my daddy's house. And my mummy's house. But it's my daddy that made me laugh. He was wearing a watch the entire time. And this watch possessed a battery that did not work. It was always 3:30. "Dad, what time is it?" "It's 3:30." "No, it's not 3:30." "That's what my watch says." "Yep." This trip may have included our own private showing of The Lone Ranger. Nine people in the theatre and they all belonged to me. We spread out over three rows, we talked to each other. Loudly. I played on my phone. The biggest theatre faux pas of all. And all without consequence. Mwahahahaha. That's my evil breaking-the-rules laugh. The new season of Honey Boo Boo came out, I think at 3:30, and the man would not let me buy the scratch and sniff magazine that accompanied the episode. I have no idea why not. I'm sure the whole episode smelled like peaches and rainbows. The man is such a party pooper. Dinner time happened at 3:30. Every day. And so did breakfast and lunch and beach time and home time and bedtime and all the times happened at 3:30. My dad never took his watch off. He said it was a nice watch. He also said it was 3:30, when it wasn't. And then, a few days into the trip, at around 3:30, the man left to run a few errands, in the United States of America. He left me in the Okanagan with 6 kids, which I was expecting but was secretly pleading with the Gods above that he wouldn't actually leave me there. When I tried to explain to the man that he owed me for what he was about to do he claimed he did not have a clue what I was speaking of. I gave him that look and he told me to ask you. So maybe I will. Actually, I won't ask because I already know. You know how I know? Because I know, that's how. He owes me and I will collect. When I'm not so tired from all the vacationing. Anyway, sometime around 3:30 on day 9 we packed up my truck to the ceiling and drove away. It was the longest day of my life. Not really, but it was close. I explained to the children that I did not want to stop, except for lunch. I wanted to drive and get home and end the madness. Children don't listen well. We stopped once an hour for one child or another who simply could not hold it. This does not make me a happy driver. But, I'm sure I was being completely unreasonable. I was the one whining, "are we almost home yet?" Tuesday, July 2, 2013 I don't know what's going on here but it seems almost apocalyptic. First there is a flooding in all the land and then Satan turned up the heat. The heat has hit boiling point. You know how I know? Because I am boiling. Boiling freaking hot. I can hardly stand it. I want to hurt someone. I have reached curse mode. We are cursing here, people. It is that hot. The a/c in my truck doesn't work and I have never before been so deeply offended. How dare it!?! The people of my kingdom asked, "what's for supper?" And I thought to myself, 'they are kidding right? No one wants to eat in this heat. This is what ice water is for.' But no, they meant actual food. So I stood at the stove and cooked ground beef for taco salad, because that meant the oven could stay off and that is a good thing. But, would you know it? The burners on the stove get flipping hot too and that made me melt and by the time I had cooked half a cow I was dripping with sweat and hating the people of my kingdom. And then Amelia may have blurted out the proverbial straw that broke the proverbial camel's back. She may have said something to the effect of, "I don't like taco salad." Actually, that is exactly what she said. Word for word. I may have thrown a bowl. At her. And then all the people may have eaten their body weights in taco salad while I pushed mine around my bowl. Too hot to eat. That's a new one. And then!!! And then!!! And then the wonderful mayor of our land told us to turn off all the stuff! The heat is sucking all the power and we need to cool it on the coolers. You know? No! Nenshi! I don't know. What I do know is that you may be dealing with a homicidal housewife PDQ if you make me turn off the a/c that is blaring in my bedroom and keeping me sane. Poor Nenshi, I hope he's not melting in his office where I'm sure the a/c is not on. It better not be on, Nenshi! You hear me? So anyway...I am neglecting the people of this house as I study for this never ending spring course I am taking. It's July. It is July and I am studying for my psyc final. This spring class has just about done me in. Never again will I take an all day Saturday class. Especially during flood season where stuff gets postponed a couple of weeks and you end up having finals to study for when all the kids are off school and home ALL THE TIME. Remind me I said that when I get the hankering for an all day Saturday class. What a terrible idea that turned out to be. This class had been a thorn in my side, to say the least. So anyway...I lead a glamorous life, where there is no end to the complaining about the weather. And stuff. Last night I took a cold shower before bed because I was melting and whining and carrying on unlike anything one could ever imagine. I said to the man, "How much regret do you have in marrying me?" He responded with, "None. Zero." And I thought, 'Awwwwww, he is the very best.' And then he said, "I do, however, wish you didn't complain so much."
null
minipile
NaturalLanguage
mit
null
[Red-cell sodium-lithium countertransport in patients with IgA nephrology and renal hypertension]. To find changes in activity of red-cell sodium-lithium counter transport (RBC Na+/Li+CT) in IgA nephropathology (IgAN) and renal hypertension (RHT), we measured the activity of RBC Na+/Li+CT in 21 patients with IgAN and 13 patients with RHT and compared it with that in 23 normal persons and 17 essential hypertension (EHT) patients by improved Canessa's method. RBC Na+/Li+CT activity in the EHT patients and EHT patients with positive family history was significantly higher than that in normal group. The activity of TBC Na+/Li+CT in the hyperlipidemic RHT patients was increased as compared with the normal group. The activity of RBC Na+/Li+CT in IgAN patients with hyperlipidemia and hyperlipidemic hypertensive IgAN patients was significantly higher than that in normal group. There was positive correlation between the activity of RBC Na+/Li+CT and serum cholesterol level in 34 patients with renal disease. The results indicate that enhanced activity of Na+/Li+ CT is a genetic marker for EHT patients, and hyperlipidemia is probably related to the enhanced activity of RBC Na+/Li+CT in parts of RHT patients and IgAN patients.
null
minipile
NaturalLanguage
mit
null
Children diagnosed as transgender could be autistic, a controversial psychologist believes. Latest figures show that the number of children under 10 in Britain being referred to the NHS over transgender feelings has quadrupled in five years. One psychologist says these youngsters are seven times more likely to be on the autistic spectrum. Dr Kenneth Zucker believes autistic traits of "fixating" on issues could convince children they are the wrong sex. He makes the claims in a BBC 2 documentary on Thursday at 9pm called Transgender Kids: Who Knows Best?
null
minipile
NaturalLanguage
mit
null
Quick Clicks It was the first arrest for Detective Matt Hanlin since returning to duty after being shot in the arm during a meth lab raid that took the life of Detective David White earlier this year. "He's doing well. Very well. Actually, excellent," said Clay County Sheriff's Office Capt. Barry Abramowitz. "He was released from his doctor to go to regular duty two weeks ago." This meth lab was found on Tanglewood Boulevard during what investigators call a "knock and talk," where they knock at the door and ask for consent to go inside. It was the same technique used on the meth lab on Alligator Boulevard seven months ago. In that case, the man who opened the door was armed and began shooting. In this case, no guns were found, but children 6 and 10 years old were in the home surrounded by ingredients to make methamphetamines. In addition to drug charges on all five of those arrested, the children's parents face child neglect charges. Tuesday night's bust was the 14th in Clay County so far this year, resulting in 29 arrests. The team Hanlin (file photo, right) is part of is responsible for most of those. "He did participate in the actual search, because that's what he actually does," Abramowitz said. "He just jumped into it and has done a very good job, obviously with the five arrests." Copyright 2012 by News4Jax.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. Comments The views expressed below are not those of News4Jax or its affiliated companies. By clicking on "Post," you acknowledge that you have read the Terms of Service and your comment is in compliance with such terms. Readers, please help keep this discussion respectful and on topic by flagging comments that are offensive or inappropriate (hover over the commenter's name and you'll see the flag option appear on right side of that line). And remember, respect goes both ways: Tolerance of others' opinions is important in a free discourse. If you're easily offended by strong opinions, you might skip reading comments entirely.
null
minipile
NaturalLanguage
mit
null
There is a reason, people! **Regarding Roger’s unusual Time-Travel Wardrobe** Said Co-Costume Designer Nina Ayers on Roger’s time travel outfit: “Roger’s eighteenth century looks consist of his late 1960’s/70’s wardrobe which 'he has done his best' to transform into something which resembles what he believes could pass as eighteenth century. The look was made to fit in with sailors and a general population as opposed to high society. His old check shirt becomes the stock, the bobble is taken off his woolen hat, he finds a ghillie shirt and takes the sleeves off his Scottish jacket worn to the festival to turn it into a waistcoat. His cord suit is variously adjusted and finally his duffel coat undergoes some crude remodeling. We kept seams raw cut and top stitched to indicate the maker doesn’t have vast sewing skills. Source: Outlander Community.com ‎Cait: " Sam and i have a very similar sense of humor which is probably akin to five year old's. We laugh at nothing. Nothing amuses us. We're like the Seinfeld episode. We don't need anything actual to happen; we just amuse ourselves anyway." Sam: "I think everyone knows she's got a terrific sense of humor. She's a terrible giggler, she corpses all the time and it's got to the point now that if i want to get out of a scene or just, you know, make it stop i can just give her a little look and she's gone. She's great fun to work with. I'm so lucky." #outlander#outlanderstarz#samheughan#caitrionabalfe#jamiefraser#loveforsam#bringsamtoisrael#kingofman#outlanderisrael What is better than spending the day watching @hallmarkchannel with your favorites? I was not really a “dog person “ until I got these two. I’m head over heels for these pups. They are full of love and are always close by. Can’t wait for the Christmas break to sit and do this much more! Also, I may trade Hallmark for @outlander_starz because I really need to catch up! I’m waaayyyyyy behind! I’m so scared someone is going to accidentally share a spoiler with me! My goal over the break is to completely get caught up. We will see if I can manage that while cleaning out the back bedroom for another remodel! #forpetersonssakelovesdogs#outlanderstarz#hallmarkchristmasmovies#yorkiesofinstagram#yorkielife#homereno
null
minipile
NaturalLanguage
mit
null
Introduction {#S0001} ============ Obesity and related comorbidities such as type 2 diabetes (T2DM), hypertension, dyslipidaemia and obstructive sleep apnoea syndrome (OSAS) are considered one of the medical challenges of the 21st century.[@CIT0001],[@CIT0002] Even with the rise of bariatric and metabolic surgery, obesity and metabolic syndrome are reaching endemic proportions and the proportion of the population with morbid obesity increases every year.[@CIT0003] Dietary and exercise interventions alone are not entirely successful in reaching significant and longstanding weight loss.[@CIT0004],[@CIT0005] Bariatric surgery is the only treatment for patients with obesity that has a longstanding effect on weight loss and the (possible) remission of obesity-related comorbidities[@CIT0004],[@CIT0005] Despite these proven long-term effects, bariatric surgery is still a "tool" achieving long-term weight loss. Therefore, a significant amount of patients show weight regain after a few years.[@CIT0006] Several studies have shown that the combination of bariatric surgery and dietary/exercise interventions could be beneficial in maintaining weight loss in the long term.[@CIT0007],[@CIT0008] In our opinion, a pivotal aspect is good and well-structured follow-up program. In other surgical specialties, exercise training is often used to improve preoperative physical fitness a postoperative outcomes.[@CIT0008]--[@CIT0011] Despite promising beneficial outcomes these perioperative exercise programs are barely used in bariatric surgical practice. There is a significant body of evidence that indicates that exercise is good for improving physical fitness, but also Quality of Life (QoL). A Cochrane review by Shaw et al[@CIT0012] showed a reduction of 1.5 kg that was contributed to exercise. These findings were substantiated by a systematic review of Livhits et al.[@CIT0013] They focused on physical training and obesity and found a 4% Excess Weight Loss (%EWL) contributable to the exercise intervention.[@CIT0013] Similar findings were seen in the study by Egberts et al.[@CIT0014] They found that exercise after bariatric surgery resulted in a body weight reduction of 3.6 kg.[@CIT0014] However, there is still no consensus on how to structure exercise programs in bariatric surgery. Often only exercise advice is given without a structured program.[@CIT0012] Assessing outcome measurements, without a structured program is problematic, since weight loss measurements are self-reported and are not objectively assessed. Secondly, there is no adequate description of physical activity and which exercises were done. Recently Pouwels et al[@CIT0007] tried to summarise what kind of exercise is beneficial in the perioperative period (in bariatric surgery) and also when patients should exercise. They concluded that there is a positive effect of peri-bariatric exercise on anthropometrics, cardiovascular risk factors and physical fitness. However no unanimous conclusions could be drawn, since there was a high heterogeneity level among exercise programs. The aim of this review is to summarise effects of preoperative and postoperative exercise, tools for screening and directions for future research and implementations. Screening {#S0002} ========= Surgery, in general, has considerable effects on patients with regards to complications, mortality and physical capacity/functioning. These risks are also present in patients with obesity and patient's before/after bariatric and metabolic surgery. To improve perioperative practices, improve logistics in the Operating Room and finally reduce complications and length of hospital stay the Enhanced Recovery after Surgery (ERAS) pathway was developed in the 1990s.[@CIT0015] These ERAS protocols were game changers in perioperative medicine and aimed to incorporate a multimodal and patient centred approach to surgical care. Initially developed for colorectal surgery, but it has been applied to all major surgical specialities.[@CIT0016] Also in primary and revisional bariatric surgery, extensive research has been done and ERAS or ERABS (Enhanced Recovery After Bariatric Surgery) has been implemented in the majority of hospitals worldwide.[@CIT0017]--[@CIT0020] These care pathways were designed to modify physiological and psychological responses to surgical trauma by integrating a range of evidence-based components into a standardised clinical pathway. The most important aspect is that all these reductions (e.g. reduction in complications, reduced length of hospital stay and healthcare cost reduction) were achieved without comprising the perioperative patient safety[@CIT0021] and were associated with lower healthcare costs.[@CIT0022] Ljungqvist et al[@CIT0016] wrote a landmark paper and they studied and defined the 24 core aspects of the ERAS protocol. Among these essential elements are smoking and alcohol cessation, a structured preoperative information and education regimen, preoperative carbohydrate treatment and prophylaxis against venous thrombo-embolisms and infections.[@CIT0016] All these core ERAS aspects are implemented in the ERABS protocols and can also be easily used in perioperative exercise programs in patients scheduled for bariatric and metabolic surgery. These exercise interventions have similarities with a new concept of prehabilitation in other surgical practices. They have the goal of improving physical functioning of the patient to endure the upcoming surgical procedure.[@CIT0023] These concepts were developed according to a wide variety of studies that indicate that a higher preoperative level of fitness is associated with a reduction in postoperative complications and an improved clinical outcome.[@CIT0024]--[@CIT0026] In this context, Orange et al[@CIT0027] and Minnella et al[@CIT0028] investigated and summarised the essential point for preparing patients for a surgical procedure. Among them; optimisation of nutritional status, psychological status and of course improving exercise capacity and physical functioning. Topal et al[@CIT0029] added one very important aspect, namely the improvement of comorbidities. This is essential since the bariatric surgical patients get older and have potentially more comorbidities with medication use. [Table 1](#T0001){ref-type="table"} gives an overview of the modifiable patient-related factors.Table 1Overview of the Modifiable Patient-Related FactorsComponentRationale**Lifestyle Intervention**Reduce complications**Preoperative information, education and counselling**Reduce fear and anxiety**Preoperative nutritional status**Optimising diet, reduce insulin resistance**Exercise intervention**Improve physical fitness, reduce complications,**Adhering Enhanced Recovery After Bariatric Surgery (ERABS) Principles[@CIT0018]--[@CIT0020]**1. Preoperative carbohydrate treatment1. Reduce insulin resistance2. Not routinely using bowel preparation2. Reduce dehydration, prolonged ileus and risk of anastomotic leakage3. Prophylaxis against thromboembolism3. Reduce thromboembolic complications4. Antibiotic prophylaxis4. Reduce infection rate Nutritional Assessment {#S0002-S2001} ---------------------- Malnutrition is a serious and impactful problem in surgical practice that affects approximately two out of three patients.[@CIT0030],[@CIT0031] We can state that malnutrition is a possibly undertreated condition that often leads to surgical and non-surgical complications, in both the lean population and in patients with obesity.[@CIT0032]--[@CIT0034] The physiological response due to surgical stress triggers a cascade of processes from systemic inflammation, insulin and blood glucose abnormalities, significant changes in energy expenditure and secretion of hormones.[@CIT0035],[@CIT0036] This can lead to significant clinical sequelae like poor appetite, weight loss, and muscle mass wasting, and could lead to cachexia or sarcopenia.[@CIT0035],[@CIT0036] These symptoms or sequelae will eventually lead to a higher risk of postoperative complications, extended hospital stay, higher mortality and morbidity rates and finally an increase health-care costs.[@CIT0035]--[@CIT0037] Especially in the surgical oncology literature, there seems to be a clear relationship between nutrition, age, cancer, surgery and physical functioning.[@CIT0030],[@CIT0031],[@CIT0035],[@CIT0036],[@CIT0038] Therefore, nutritional assessment is an important part of bariatric surgical screening and prior to starting exercise programs. Physical Fitness Assessment {#S0002-S2002} --------------------------- The decrease in physical functioning due to obesity and the presence of comorbidities is an increasing worldwide problem.[@CIT0039] Physical/cardiorespiratory fitness (CRF) is a constant indicating the ability to meet the increase in oxygen consumption during daily activities, exercise and stress conditions.[@CIT0040]--[@CIT0042] This can be impaired by, for example, obesity, cancer, surgery, radiotherapy, chemotherapy, infection or hormone therapy.[@CIT0007],[@CIT0043],[@CIT0044] A significant body of evidence has shown that the level of preoperative physical function is a significant predictor for postoperative complications and mortality.[@CIT0045]--[@CIT0047] In light of this evidence, it has also been seen that a temporary functional decline is normal before, during and after hospitalization and after surgery.[@CIT0048] As stated earlier when these periods of inactivity prolong it has effects on muscle mass and the cardiopulmonary system. Eventually, muscle wasting will occur combined with possible cardiopulmonary deconditioning which will increase the risk of postoperative complications, mortality and psychological distress. These findings were substantiated by several studies of Kortebein et al.[@CIT0049]--[@CIT0051] They have studied the effects of prolonged periods of bed rest on muscle strength of major muscle groups and not surprisingly they found that prolonged periods of bed rest lead to a significant decrease in muscle strength. Decreasing muscle strength was also seen after short periods of bed rest. All of the earlier mentioned phenomena could result in significant morbidity after surgery and therefore need to be optimised.[@CIT0050],[@CIT0052]-[@CIT0054] In general physical capacity predicts postoperative recovery, but seems to be more effects in frail and elderly patients undergoing major surgery. Therefore, nowadays there is an increasing interest in investigating a variety of PET and postoperative rehabilitation strategies ton optimise the surgical outcomes in this specific population.[@CIT0055]--[@CIT0058] However, there is no "one size fits all", due to different patient characteristics, types of surgery and used programs (either PET or postoperative rehabilitation).[@CIT0059]--[@CIT0061] We can now consider the effects of PET to treat/optimise perioperative care as a proof of concept.[@CIT0044] However, we still do not understand the effects in different patient populations and of course the cellular and immunological processes that exercise interventions induce in this matter. In other words, according to several studies in different surgical specialities its effectiveness can be difference. Especially in patients scheduled for orthopaedic knee or hip replacement surgery, there are some controversies regarding the effects of perioperative exercise interventions, especially PET.[@CIT0062] Regarding types of exercise in these exercise interventions, the evidence is far from conclusive. Most of the studies investigate effects of aerobic training,[@CIT0063] however the combination of exercise types (for example, resistance and endurance training) can have even better effects. Unfortunately in perioperative medicine there is a lack of studies investigating these concepts, despite the cellular effects can be synergistic (with regards to tissue protein synthesis and aerobic capacity).[@CIT0064]--[@CIT0066] Despite the fact that there is not much known about the physiological principles of exercise interventions in the perioperative period, clinicians should consider to get patients and exercise test prior to the start of an exercise intervention. Cardiopulmonary exercise testing (CPET) is considered to be the gold standard in exercise testing, however could also be costly and time consuming.[@CIT0040],[@CIT0067] CPET is essential in determining the exercise tolerance of patients by indicating/calculating them in METs (Metabolic Equivalents of Time)[@CIT0040] One MET is defined as an oxygen use of 3.5 mL O~2~/kg/min, which indicates the energy used while being seated in a resting position.[@CIT0040],[@CIT0041] Climbing a flight of stairs or walking up a hill are activities associated with METs \>4, and they are considered a "safe" threshold below which postoperative complications are more likely to occur.[@CIT0068] Psychological Status and Improvement of Comorbidities {#S0002-S2003} ----------------------------------------------------- Psychological distress is an often-overlooked problem that can have a significant effect on the postoperative convalescence of patients. In general, there are high rates of anxiety, depression and associated disorders in the surgical population.[@CIT0069] It is known that psychological distress in the form of anxiety and depressive disorders can have a negative impact on wound healing, infection rate, length of hospital stay and adherence to medical treatment, despite that the pathophysiological mechanism is still largely unknown.[@CIT0070]--[@CIT0073] A study by Mitchell et al.[@CIT0074] showed that anxiety disorders should be treated in the perioperative period to improve postoperative outcomes. Therefore, a psychologist should also be incorporated in the multidisciplinary team. With the increasing age of surgical patients, but also patients scheduled for bariatric surgery,[@CIT0075] we need to take into account the presence of comorbidities. It is well known that extensive comorbid conditions are present in the majority of patients that undergo abdominal, bariatric, thoracic and cardiovascular surgery. High rates of coronary disease or congestive heart failure (\>50%), hypertension (30--50%), COPD (30--40%) and chronic renal disease (5%) are seen in the surgical patient population.[@CIT0076]--[@CIT0078] The presence of these comorbidities can have a significant impact on postoperative recovery and the occurrence of functional decline after surgery. Therefore, efforts should be made to optimize these conditions prior to surgery. This might be the case in patients with cancer, COPD and heart failure.[@CIT0059],[@CIT0060],[@CIT0079] The burden of these morbidities should also be considered following bariatric surgery. A population-based study by Moonesinghe et al.[@CIT0080] investigated the burden of postoperative morbidity on overall survival and they showed a significant impact in a variety of surgical specialties.[@CIT0080] There must be a place for the optimisation of comorbid conditions (e.g. COPD, heart failure). Optimisation of medication use and/or lifestyle interventions could be incorporated in such a strategy.[@CIT0010] Preoperative Exercise Therapy {#S0003} ============================= In general, there are very few data on the effectiveness of specific preoperative exercise therapy programs on CRF and functional performance following surgery. Some of the literature has been summarised by Pouwels et al.[@CIT0007] regarding its effects and perioperative timing. In general for both the preoperative and postoperative there is no consensus what to do in terms of exercise interventions. Baillot et al.[@CIT0081] studied a preoperative exercise program with 35 supervised exercise sessions in 12 weeks. In total seven patients completed the full program and five of them had their bariatric surgery before the end of the program. The corresponding attendance rates were a median of 57.3% (32.5--77.6%). Significant weight and BMI reduction, reduction in neck circumference and fat mass were achieved (respectively; before; 144.3 kg, after; 140.2, p=0.07; before; 51.4 kg/m^2^, after; 47.2 kg/m^2^, p=0.004; before; 42.2 cm, after; 41.0 cm, p=0.016 and before; 72.1 kg, after; 69.1 kg, p=0.026). After the exercise program, several physical fitness measures increased significantly (six-minute walk test distance, time of the half-squat test and number of flexion during the arm curl test)[@CIT0081] This resulted in a high satisfaction with the intervention and the advice given by exercise professionals resulting in a significant improvement in the total Health-Related Quality Of Life (HRQOL) after the exercise intervention (p=0.012).[@CIT0081] With regards to anthropometric measurements, the study by Funderburk et al.[@CIT0082] showed similar results (a reduction in body weight after 12 weeks supervised aquatic exercises of 5.0 kg in the intervention group compared with 2.3 kg in the control group).[@CIT0082] Six-minute walking test distance increased with 10.4m, but in the control group it increased with 40.2m (after 12 weeks of aquatic exercises).[@CIT0082] HRQOL measurements were not significantly different between the intervention group and the control group. Bodily pain (as a sub-item of the Short Form 36 (SF-36) questionnaire) and depression scores (Beck Depression inventory) after 12 weeks decreased significantly (p\<0.05).[@CIT0082] Hickey et al[@CIT0083] investigated a seven-day exercise training scheme consisting of 60 minute sessions once a day. They found no significant change in anthropometric variables (body weight and fat-free mass, but they did find a significant decrease in fasting plasma insulin (−41.7 pM). Strangely enough, there were not any corresponding changes in blood glucose levels and blood lipid concentrations.[@CIT0083] Also, no significant differences were found in maximal oxygen uptake (which was measured by VO~2~ peak).[@CIT0083] The findings of the study of Marcon et al.[@CIT0084] corresponded with the tendency found in previous studies. They investigated 24 weeks supervised low intensity endurance training and found significant changes in anthropometric variables; body weight (- 5.3kg (p\<0.001)) and BMI (−1.9 kg/m2 (p\<0.001)) decreased significantly. Also, significant decrease in systolic and diastolic blood pressure (−23.8 mmHg (p=0.007) and −14.4 mmHg (p=0.001) respectively) was found[@CIT0084] Finally, significant improvements were seen in blood lipid and glucose concentration and in six minute walking test distance (+69.8m (p\<0.0001)) after 24 weeks exercise intervention.[@CIT0084] The Bari-Active trial from Bond et al.[@CIT0085] showed that an exercise intervention in the period six weeks prior to bariatric surgery has a significant improvement on physical activity patterns compared to the standard care group. These results were supported by a randomized controlled trial by Marcon et al.[@CIT0086] that showed a 4 month, twice weekly supervised program of low-intensity physical exercise can be valuable in the perioperative bariatric care. Postoperative Exercise Therapy {#S0004} ============================== In postoperative rehabilitation or postoperative exercise therapy in bariatric surgery, there are few studies that test the effectiveness of different exercise modes on outcomes. Further, the outcome measures appear to be heterogeneous.[@CIT0007],[@CIT0085],[@CIT0087],[@CIT0088] Stegen et al.[@CIT0089] investigated a 16 weeks postoperative exercise program after Roux en Y Gastric Bypass (GB) surgery. In this study, postoperative patients that completed the exercise program (GB+E) were compared with patients that only had GB surgery. Both groups had the same extent of weight loss and changes in other anthropometrics after four months (GB = −26.6 ± 14.6 kg; GB+E = −22.7 ± 5.7 kg), BMI (GB = −8.3 ± 4.1 kg/m^2^; GB+E = −8.1 ± 2.5 kg/m^2^) and waist circumference (GB = −20.3 ± 11.6 cm; GB+E = −17.2 ± 8.1 cm).[@CIT0089] In terms of exercise capacity, which was measured as ventilator anaerobic threshold (VAT) using a maximal bicycle ergometer, there were no significant differences. Both groups reached their VAT at the power (GB = 93 ± 24 W; GB+E = 90 ± 24 W) with an equal time of occurrence (GB = 270 ± 107 s; GB+E = 266 ± 133 s).[@CIT0089] Both groups showed no differences in peak exercise parameters (preoperative versus postoperatively; respectively peak oxygen uptake of 17.4 ± 4.9 mL/kg/min (GB) and 17.6 ± 3.2 mL/kg/min (GB+E)).[@CIT0089] However, the exercise training intervention showed promising effects regarding muscle loss after bariatric surgery. The untrained patients, who only had bariatric surgery showed a decrease in dynamic muscle strength (a decrease of 16% in quadriceps strength, 36% biceps strength and 39% triceps strength).[@CIT0089] Patients who had an exercise program after gastric bypass surgery (GB+E) prevented this decrease.[@CIT0089] Regarding static muscle strength (measured as handgrip strength, both groups had a decrease (respectively 18% and 7%).[@CIT0089] Castello-Simoes et al.[@CIT0090] investigated a three group 12 week post-bariatric exercise intervention, 1) a trained group (TG), 2) a eutrophic group (EG) and 3) a control group (CG). Anthropometric changes were consistent with other studies and the TG and CG group showed significant weight reduction after 4 months. Also, both groups (TG and CG) showed a similar significant increase in the 6-minute walking test distance (6MWT)[@CIT0090] Finally a significant increase of the predicted forced vital capacity (pFVC) was found (before: 94.0 ± 3.1; after: 101.0 ± 2.5) in TG and a significant reduction in dyspnoea scores was found in the same group 4 months after bariatric surgery (before: 5.8 ± 0.6; after 2.7 ± 0.8).[@CIT0090] Shah et al.[@CIT0091] found similar results regarding weight loss after a high volume exercise program in 20 patients for 12 weeks. Interestingly, theyfound no difference in cardiovascular risk factors after compared to the control group.[@CIT0091] Berggren et al performed a study on skeletal muscle lipid oxidation before and after 10 days of endurance training in post-bariatric patients.[@CIT0092] Not surprisingly, they found significant weight loss after the exercise intervention. (p \<0.05).[@CIT0092] Fatty acid oxidation in the muscle was not significantly different between patients with morbid obesity compared to the weight loss groups. Compared to lean individuals the oxidation of fatty acids was depressed (−45%; P\<0.05). In contrast, ten days of exercise training increased fatty acid oxidation in the skeletal muscle of lean, obese and previously extreme obese subjects after weight loss (respectively +1.7-fold, +1.8-fold and +2.6-fold).[@CIT0092] These data suggest that there is reversibility of cellular oxidation processes through exercise interventions in patients after bariatric surgery. Marc-Hernandez et al[@CIT0093] investigated the effects of a high-intensity exercise program has the ability to reduce weight regain three years after bariatric surgery. Twenty-one patients that had a sleeve gastrectomy three years ago were randomised in an exercise group that performed a 5-month supervised exercise program, compared to a control group that followed usual care.[@CIT0093] Body anthropometrics, physical fitness and cardiovascular parameters were collected before and after the training program. After the program, the exercise group showed to have significant reductions in fat mass, glycaemia and blood cholesterol levels. The control group showed an increase in body weight and fast mass. Two months after finalising the exercise program, the patients who had the exercise intervention showed similar results as the control group during the study. In particular, an increase in body weight and fat mass and higher blood glucose and cholesterol levels, compared to directly after the exercise program.[@CIT0093] This rebound effect might be due to exercise beliefs and exercise patterns that do not change after bariatric surgery. This was substantiated by a recent study done by Ouellette et al.[@CIT0094] They found that in the postoperative period, moderate-to-vigorous physical activity (MVPA) patterns did not significantly change, despite patients expectations.[@CIT0094] Is this context there might also be a behavioural component that can be treated.[@CIT0094] The data of the mentioned studies show that there might be beneficial effects on physical activity measurements, quality of life and traditional risk factors. In addition, it is important for future studies to take into account the metabolic effects of the surgical procedures prior to exercise and lifestyle interventions.[@CIT0006],[@CIT0095] Hopefully, future initiatives will be able to answer these important questions.[@CIT0096],[@CIT0097] Discussion {#S0005} ========== In surgical practice, perioperative exercise interventions seem to get more and more attention, due to beneficial effects on complication rate and patient convalescence. Also with the introduction of prehabilitation programs[@CIT0008]--[@CIT0011],[@CIT0029] and their promising results in various surgical fields it is surprising that exercise interventions in bariatric surgery are so sparsely investigated. In the studies that investigate these perioperative exercise programs, there seems to be a beneficial effect on weight loss parameters, physical activity measurements and risk factors for cardiovascular diseases. However due to heterogeneous study designs, possible under powering and the lack of structured exercise training programs, no definitive conclusion can be drawn. All these factors hamper practical guidance and implementation in clinical practice. [Table 2](#T0002){ref-type="table"} gives an overview of the common findings in the studies assessing exercise interventions in bariatric surgery. [Figure 1](#F0001){ref-type="fig"} gives a conceptual framework of perioperative exercise interventions in bariatric surgery. The heterogeneity of exercise programs makes comparisons difficult and according to several studies it is not evident as to what the optimal exercise programs should be and what the timing should be around bariatric surgery.[@CIT0007]Table 2Summary of Exercise Programs, Intensity, Duration, Supervision and Perioperative TimingShah et al.[@CIT0091]Castello-Simoes et al.[@CIT0090]Stegen et al.[@CIT0089]Baillot et al.[@CIT0081]Funderburk et al.[@CIT0082]Berggren et al.[@CIT0092]Hickey et al.[@CIT0083]Marcon et al.[@CIT0084]Bond et al.[@CIT0085]Marcon et al.[@CIT0086]Duration (weeks)12121612122124616Intensity60--70% VO~2~max60--70% HR60--75% HR/RM55--85% of HRRx70% VO~2~max65% VO~2~ peakxxLow (not specified)SupervisionPartialWholeWholePartialWholexWholeWholexWholeTiming bariatric surgeryPostPostPostPrePrePostPrePrePrePre[^1] Figure 1Conceptual framework of perioperative exercise interventions in bariatric surgery. Purple line: patients who do not receive any perioperative exercise intervention. Orange line: patients who only receive preoperative exercise training. Blue line: patients who receive preoperative and postoperative exercise training. In general, it can be stated that exercise has beneficial total body effects. More specifically tremendous effects can be present in body composition changes, better blood pressure control, increase in insulin sensitivity, decrease of inflammation and presence of "inflammation" biomarkers and also subclinical carotid atherosclerosis (measured as Carotid Intima Media Thickness (CIMT)). The effects of exercise have been associated with physiological changes in the human cardiovascular system, for example removal of oxidized phospholipids from the vessel wall, stabilisation of atherosclerosis and positive changes in LDL cholesterol.[@CIT0098] These physiological changes correlated strongly with improvement of vascular function and in improvement of atherosclerosis (e.g. decreased burden of atherosclerosis).[@CIT0099] The evidence from the ARBITER 6 trial showed that exercise is superior in inducing these beneficial effects compared to medical treatment (with either statins or niacin).[@CIT0100] In other words, exercise training should be a part of every medical intervention or perioperative rehabilitations program.[@CIT0101] Despite a very large body of evidence that bariatric surgery is a longstanding intervention with great effects on the human body, it needs to be said that it also has consequences. One of them is muscle loss or otherwise called "muscle wasting", which was showed in the study by Stegen et al.[@CIT0089] This can be explained by the rapid weight loss after bariatric surgery. In the study by Stegen et al the untrained (GB) group lost approximately 7.6 kg of muscle mass, which is 29.7% of the total body weight lost (−26.6 kg)[@CIT0089] Dieting, exercise interventions and also bariatric surgery results in the loss of fat-free mass. This was confirmed by studies done by Stiegler et al.[@CIT0102] and Chaston et al.[@CIT0103] They showed that there is a positive correlation between weight loss and fat-free mass loss (FFML). Very low caloric diets result in a greater FFML compared to moderate caloric diets. Bariatric surgery results in greater FFML than very low caloric diets. A study by Webster et al.[@CIT0104] showed that there is a limit of FFML after bariatric surgery which is approximately 22% of the total weight loss. This is because of the functions of the muscle in resting metabolic rate, thermoregulation, oxidative capacity of the body and weight management. Exercise training can attenuate muscle atrophy and can maintain FFM during weight loss,[@CIT0102],[@CIT0103] but the value of a perioperative exercise program for bariatric surgery has not been investigated. It is not clear whether or not there is a decrease of muscle strength contributes to poor health outcomes or risk after weight loss surgery. It is well known that obese individuals have higher absolute muscle strength compared to lean subjects, but there is lower relative muscle strength in terms of total body weight.[@CIT0105]--[@CIT0108] This gives patients an impaired functional capacity, which results in the fact that more strength is needed to handle a heavier body. Therefore, it might be important to prevent a decrease in muscle strength after bariatric surgery. Conclusion {#S0006} ========== We can state that perioperative exercise programs in bariatric surgery might have beneficial effects on weight loss parameters, physical activity measurements and risk factors for cardiovascular diseases. However, the heterogeneity of exercise programs makes comparisons difficult and according to several studies reviewed in this paper it is not evident as to what the optimal exercise programs should be and what the timing should be around bariatric surgery. Future studies focused on the effectiveness of exercise intervention mode, intensity and timing before or after bariatric surgery to maximize cardiorespiratory fitness, physical function and reductions in cardiometabolic risk appears evident. Author Contributions {#S0007} ==================== All authors made substantial contributions to conception and design, acquisition of data, or analysis and interpretation of data; took part in drafting the article or revising it critically for important intellectual content; gave final approval of the version to be published; and agree to be accountable for all aspects of the work. Disclosure {#S0008} ========== The authors report no conflicts of interest in this work. [^1]: **Abbreviations:** HR, heart rate; HRR, heart rate reserve; RM, repeated measurements; 2KmWT, 2 kilometer walking test; x, unknown.
null
minipile
NaturalLanguage
mit
null
A randomized study of ceftazidime compared to ceftazidime and tobramycin for the treatment of infections in cancer patients. Three hundred and twenty-one febrile episodes in cancer patients were treated with ceftazidime alone or in combination with tobramycin. Patients were grouped according to their neutrophil count into neutropenic and non-neutropenic (less than 1000 and greater than 1000/mm3) respectively. Two hundred and seventy-five episodes were evaluated. The overall response rate in 83 episodes of infection treated with ceftazidime alone was 60 and 73% in those who received the combination. In those bacteriologically proven the response rate was 72% in both groups of the study. The overall response rate in septicaemia was 75% with ceftazidime alone and 85% with the combination. High response rates were obtained in Gram-negative bacillary septicaemias in both groups even in neutropenic patients treated with ceftazidime alone. Pneumonias in neutropenic patients responded equally well. However, patients with adequate neutrophil counts responded better to the combination than to single-agent therapy. The response rate for Gram-positive infections was 41% for ceftazidime alone and 57% for the combination, which was inferior to the results obtained for Gram-negative infections (P = 0.001). The rates of superinfection and toxicity were very low. Ceftazidime is a useful antibiotic against Gram-negative infections in cancer patients. It should be combined with an agent active against Gram-positive pathogens in neutropenic patients.
null
minipile
NaturalLanguage
mit
null
Introduction ============ The accumulation of at least thirty minutes of moderate intensity activity, on at least five days of the week, is related to numerous mental and physical health benefits for adults (Department of Health \[DOH\] [@b16-ehi-2008-111]; [@b27-ehi-2008-111]). In spite of these advantages, the majority of the population in developed countries do not achieve this standard (DOH [@b16-ehi-2008-111]; [@b47-ehi-2008-111]; [@b50-ehi-2008-111]). Personal, environmental, social, economic and political factors have all been shown to exert an effect on the activity levels of individuals and communities ([@b17-ehi-2008-111]; [@b45-ehi-2008-111]) but each explain only a small proportion of the variance in activity levels ([@b45-ehi-2008-111]). Understanding the individual in context is crucial, and this includes social, cultural, political and physical environments. In the field of physical activity research, studies are emerging that suggest a definite role for the physical environment in some form ([@b7-ehi-2008-111]; [@b23-ehi-2008-111]; [@b28-ehi-2008-111]; [@b37-ehi-2008-111]; [@b42-ehi-2008-111]; [@b46-ehi-2008-111]). Recognition of environmental influences has also occurred at UK government level; specifically, both the Chief Medical Officer's report in England ([@b16-ehi-2008-111]) and the Foresight Report ([@b25-ehi-2008-111]) have acknowledged the mediating role of the environment in terms of physical activity behaviour. The National Institute for Health and Clinical Excellence (NICE) has recently issued guidelines considering the promotion and creation of physical environments that support increased levels of physical activity ([@b34-ehi-2008-111]), and there is a need for well-designed population and behaviour specific research that seeks to clarify the environment-physical activity relationship in order to guide the development of interventions. There are a number of potential advantages for an improved understanding of the role of environment in the decision to be (in) active. The environmental attributes of an area such as its structure, design and physical features will influence the lives of all who live in the area, and this includes providing cues and opportunities for physical activity ([@b22-ehi-2008-111]; [@b30-ehi-2008-111]). Any social, economic or physical environmental facilitators or inhibitors of physical activity will therefore impact at the community level and act across populations ([@b9-ehi-2008-111]). Modifications to the environment have the potential for much longer-lasting effects than individual level interventions because changes are assimilated into structures, systems, policies and socio-cultural norms ([@b8-ehi-2008-111]; [@b14-ehi-2008-111]; [@b38-ehi-2008-111]; [@b48-ehi-2008-111]). Research into environmental impacts on physical activity has increased exponentially since this field came to the fore in 2003 ([@b13-ehi-2008-111]), although the majority of currently available literature is descriptive and from cross sectional studies, with researchers seeking to in some way identify and quantify possible relationships. In a recent critique of the synthesis of evidence, [@b21-ehi-2008-111] suggest that the quality of reviews varies and significant methodological variation ensures that comparison and extraction of overall conclusions remains challenging ([@b21-ehi-2008-111]). This commentary posits that it is time for researchers to evaluate the state of knowledge, and suggests that future developments in this field focus on the theoretical bases for (i) measurement of the environment and (ii) understanding the links between perceptions of the environment and behaviour through psychological theories of cognition. The Theoretical Basis for Measurement of the Environment ======================================================== The concept that environmental factors can hinder or facilitate desired behaviour change is a valuable, albeit recent, adjunct to the individual-behavioural theories in early health promotion research ([@b43-ehi-2008-111]; [@b28-ehi-2008-111]; [@b45-ehi-2008-111]). Since the physical environment became the focus of physical activity research ([@b13-ehi-2008-111]), social ecological theory has been the most commonly adopted theoretical framework for research ([@b28-ehi-2008-111]). Social ecology involves the social, cultural, and institutional contexts of people-environment relations ([@b49-ehi-2008-111]), referring to elements largely outside an individual's control but modifiable by society ([@b46-ehi-2008-111]). It has been suggested that intrapersonal, physical environmental, social and cultural variables interact and have both direct and indirect effects on health behaviours; such effects may differ by population sub group, geographical setting or other contextual factors ([@b46-ehi-2008-111]). Although it intuitively appeals as a real-world model, the multilevel, all-encompassing nature belies empirical testing and few researchers have proposed, developed or tested social ecological models of physical activity behaviour. More frequently, researchers have relied on social ecology to support a new emphasis on research into external, environmental variables ([@b28-ehi-2008-111]). However, ecological models lack specificity about which characteristics of the environment might influence behaviour ([@b28-ehi-2008-111]), forcing researchers to look elsewhere for conceptualisations of the environment and how to measure it. We suggest that an examination of three influential articles in this field sheds light on the development of commonly used measures and methods. In 2002, Humpel and colleagues examined nineteen quantitative studies of environmental influences on physical activity, all conducted by researchers from the physical activity field. Measures were mostly self-report questionnaires on perceptions of the environment which were poorly developed or reported, and selected based on pragmatic insights of the researchers rather than previous research or theory. Nonetheless, five 'groupings' of environmental variables emerged: accessibility of facilities, opportunities for activity, weather, safety and aesthetics. The authors noted that social ecological theory was commonly cited, and thus recommended behaviour- and context-specific measurement strategies in future research. The second key article, by [@b39-ehi-2008-111] presents the development of a framework of potential environmental influences on walking and cycling based on policy literature, interviews with experts and a Delphi study---a systematic, interactive forecasting method which relies on a panel of independent experts. The authors report some disagreement about relative importance of the environmental influences between the experts who represented urban planning/local government, transport, public health and physical activity advocacy groups. The final framework included four features (function, safety, aesthetics and destinations), the hypothesised factors that contribute to these features and their relative importance ([@b39-ehi-2008-111]). This framework added detail and expanded the scope of potential environmental variables in the physical activity field, while retaining the emphasis on behaviour specificity emphasised by ecological theory. Finally, the third article by [@b42-ehi-2008-111] emphasised the importance of research from the transportation and planning literature and its associated methodology and terminology (e.g. land use, connectivity, walkability) to the physical activity field. Incorporating this evidence, the Neighbourhood Environment Walkability Scale (NEWS) was developed to measure perceptions of the physical environment ([@b42-ehi-2008-111]) and this tool has since been applied worldwide ([@b11-ehi-2008-111]; [@b12-ehi-2008-111]; [@b19-ehi-2008-111]; [@b51-ehi-2008-111]). The concept of 'spatial multicollinearity' of environmental features was introduced, whereby environmental characteristics such as land use patterns, transportation systems and neighbourhood design coexist and are inter-related. In addition, the need to address potential confounders such as socio-demographics was discussed, again emphasising characteristics of social ecological theory. These three articles clearly illustrated how physical activity researchers have moved from relying on pragmatic insights towards consultation with experts and acceptance of methodology and terminology from the transportation and planning fields. However, evidence has continued to emerge under the separate strands of urban planning/travel behaviour and public health/physical activity, with their respective theoretical and methodological emphases and consequently sometimes contradictory results. Comprehensive reviews have been conducted by professionals from both strands ([@b5-ehi-2008-111]; [@b20-ehi-2008-111]; [@b28-ehi-2008-111]; [@b33-ehi-2008-111]; [@b37-ehi-2008-111]; [@b42-ehi-2008-111]; [@b44-ehi-2008-111]) and the reader is referred to these for a detailed analysis of findings to date. Our summary of these findings suggests that research from the urban planning and transportation fields has focused primarily on destinations-oriented walking and non-motorised travel, using objective measures of the environment (for example geographical information systems), to measure neighbourhood type (e.g. traditional/transit-oriented/walkable), land use mix, grid-like street networks and functional infrastructure. In contrast, research from the physical activity and public health arena has primarily focused on recreational walking or physical activity, often including perceptual characteristics in place of, or alongside, objective measures of the environment. Consequently, results commonly focus on subjective variables such as safety and aesthetics. Drawing on ecological theory, many researchers have included personal, social and/or socioeconomic variables in their analyses, but despite early recommendations to examine the relative influence of these as against the environment ([@b22-ehi-2008-111]) this is only recently becoming more commonplace. It appears that researchers from both strands have become conversant in the terminology of the other and, in some cases, have adopted measurement tools and methods. However, the lack of theoretical grounding pervades both strands, resulting in a plethora of exploratory research, that assumes only direct effects on physical activity, with no interaction between environmental variables. Few studies in either strand have examined the relative importance of environmental characteristics in multivariate models, or their potential confounding, mediating and moderating interactions ([@b31-ehi-2008-111]). As this field develops, it is important to recognise the limitations of analysing the effect of individual features of the environment on physical activity behaviour. These features do not exist in isolation and any effects measured or analysed in this manner are likely to be unrealistic. The recognition of multicollinearity between environmental variables ([@b10-ehi-2008-111]; [@b35-ehi-2008-111]) will provide researchers with measurement challenges to overcome. It is important that these challenges are addressed and the complexity of the environment is embraced; recommendations and interventions based on poorly designed research risk the undermining of genuine effects, and the loss of confidence in the importance of the environment as a potential solution to physical inactivity. Future research can address these issues with improved study design that includes variable neighbourhood features and addresses potential confounders such as socio-demographics, as was recommended by [@b42-ehi-2008-111]; however, it seems that this issue has been overlooked in recent research. In the absence of an integrated theoretical framework at the design level, researchers should consider sophisticated data analyses that allow for multilevel modelling and interactions between environmental features, such as structural equation modelling (SEM). Recent research has indicated that a combination of factor analysis and SEM can be used to describe a theoretically meaningful framework accounting for interrelationships between environmental variables while explaining a large proportion of variance in active commuting behaviour ([@b35-ehi-2008-111]). The use of such data driven statistical models in such software may allow existing theories from alternative fields to be tested and assist in the development of new theories based on the large masses of data already gathered in this field. The Theoretical Basis for Linking Perceptions of the Environment and Behaviour ============================================================================== Despite the body of evidence suggesting a link between the environment and physical activity, there is a conspicuous absence of a theoretical framework through which to understand how environmental correlates influence an individual's behavioural intention or change. This is evident in the common unanswered questions posed by researchers, such as: Is building or creating an activity-enhancing environment sufficient for individuals to become active? ([@b24-ehi-2008-111]); Do individuals self-select into activity-enhancing environments? ([@b26-ehi-2008-111]); Does a hierarchy of environmental correlates exist that would indicate the decision-making processes of the individual who wants to become more physically active? ([@b4-ehi-2008-111]); How or why do potential changes in perceived environment result from physical activity changes? ([@b29-ehi-2008-111]). Consideration also needs to be given to developmental differences in explanations of an individual's interaction with their environment; explanations of adult choices are perhaps not appropriate for children who have relatively little control over choices in their environment. Psychologists are interested in studying interactions between humans and their environment. Thus, by examining psychological theories, we may begin to establish a framework in which the current emergence of environmental research should be referenced to answer wider issues of sustaining healthy behaviours. The theory of planned behaviour (TBP, [@b1-ehi-2008-111], [@b2-ehi-2008-111]; [@b3-ehi-2008-111]), a progression from the earlier theory of reasoned action ([@b18-ehi-2008-111]) is worth consideration. It seeks to provide a framework to understand and, more crucially, predict the associations between attitudes and behaviour. Although first developed to understand and predict disease related behaviours such as alcohol consumption, the TPB has been used extensively to predict physical activity participation ([@b6-ehi-2008-111]; [@b36-ehi-2008-111]). The theory posits that an individual's behaviour is determined primarily by his or her intention to engage in the behaviour. This behavioural intention is itself predicted by attitudes regarding the behaviour, subjective norms from the social environment and the level of perceived behavioural control the individual believes he or she can exert. The TPB may be used to elucidate the links between environmental cognitions and physical activity and provide valuable insight into *how* an individual's decision of whether or not to be active is influenced by a supportive physical environment. As an example, [@b40-ehi-2008-111] investigated the mediating and moderating variables of perceptions of the physical environment and the TPB. They concluded that perceived environmental factors are antecedents to physical activity motivation but do not have an effect on behaviour independent of individual motivation. However, they do concede that aesthetics and land use mix are likely to influence walking attitudes, and potentially walking behaviour, by means of intention ([@b40-ehi-2008-111]). Further, along with intention, perceived proximity to retail destinations was the only physical or social environmental construct to independently predict walking in a fully adjusted model of activity in Canadian adults ([@b41-ehi-2008-111]). In a practical sense, these results imply that more and better quality green space and streetscapes and a convenient mix of land uses may help in the transition of intentions into behaviour, and that individuals who live closer to retail destinations may end up walking more than originally intended; however, such environmental issues are not sufficient to directly promote physical activity behaviour. The majority of researchers have failed to acknowledge that the impact of a supportive environment is primarily determined by individual cognitions. If a person cognitively assesses any one of the components of the TPB as negative then this would help to predict why the planned behaviour does not translate into positive action, even if the person's environment is conducive towards physical activity. Perhaps an individual is not in a financial position to move; perhaps they don't have the support of significant others; or perhaps they fail to value the role of the neighbourhood in activity promotion (choosing to exercise at a gym instead). Using the structure of the theory of planned behaviour it might be feasible to plot the underlying norms and attitudes surrounding other behaviours such as active commuting. This is of course the tip of a very large theoretical iceberg; the TPB is only one of many explanations of behaviour, motivation and attitudes available to researchers. Other plausible theories might include the transtheoretical model ([@b32-ehi-2008-111]) or self determination theory ([@b15-ehi-2008-111]); however, there is no consensus as to which theory best predicts behaviour ([@b6-ehi-2008-111]). Conclusions =========== Due to methodological flaws largely resulting from a lack of theoretical grounding, it is currently difficult to say which characteristics of the environment have the strongest associations with physical activity or how strong these associations are. There remains a need to identify the mechanisms behind observed relationships and the relative importance of the environment compared to other factors of influence. However, in the absence of a common conceptual framework and a more standardised vocabulary and measurement tools, the majority of studies will remain at a correlates stage. To move this area of enquiry forward, researchers must first pause and re-consider grounding their investigations in theoretical foundations. **Disclosure** The authors report no conflicts of interest.
null
minipile
NaturalLanguage
mit
null
[A clinical survey of cerebellar astrocytoma--comparison between childhood and adult cases (author's transl)]. The symptomatological investigations on 20 cases of cerebellar astocytoma were carried out. These cases, observed and treated in Hokkaido University Hospital from 1959 to 1978, were divided into two groups, such as childhood group (under 15 years old) and adult group (over 16 years old). The following conclusions were obtained: (1) The youngest was 2 years old and the oldest was 64 years old. The age distribution showed higher incidence in younger age group under the age of 30, especially in the first decade. (2) The most frequent symptoms were vomiting, headache and unsteady gait in all cases, but vomiting was constantly seen in childhood cases. (3) The average length of history in children was 2.4 months in childhood, and 17.6 months in adult cases. (4) Neurological signs on admission could be summarized as follows. The signs indicating increased intracranial pressure was most frequent, and the next common findings were ataxia of the limbs and trunk. Impairment of the cranial nerves and brainstem were uncommon. On neurological signs there was little difference between in children and in adults. (5) The total cases of complete removal of the tumor were many, but in adults there were not a few cases in which incomplete removal of the tumor was accomplished. (6) The majority of cerebellar astrocytoma were cystic and laterally placed in the cerebellum especially in children. (7) Microscopically in children, the frequent type was pilocytic astrocytoma of juvenile type. (8) The result of surgical removal of cerebellar astrocytoma was excellent, and the long-term survivours were found frequently and the quality of survival was good. The follow-up results in children were better than those in adults.
null
minipile
NaturalLanguage
mit
null
A power amplifier tends to dissipate significant amounts of power. This is particularly true for linear power amplifiers such as those used to process orthogonal frequency-division multiplexing (OFDM) signals including both phase and amplitude information. Linearization techniques can be used to improve the linearity and efficiency of a power amplifier. As one example, a popular linearization technique uses digital predistortion to correct the amplitude and phase distortion that occurs in the power amplifier. A common problem with known linearization techniques is determining how to make them track (i.e., adjust, or account for) variations in fabrication, temperature, environmental influences, aging, and other factors. To overcome this problem, a calibration scheme has been employed that adjusts the linearization settings to the current state of the power amplifier. In one exemplary scheme, the output signal of the power amplifier is “looped-back” through the receiver section of the overall circuitry and analyzed using digital signal processing techniques, so that calibration of the power amplifier might be performed. However, this approach often suffers from being too sensitive to incidental and/or unintentional coupling between the input and/or output of power amplifier signals, and the signals of the receiver input circuitry. In another case, non-linearities of a functional block or blocks other than the power amplifier can disrupt or alter the looped-back signal content. As a result of any or all of these disturbances, the digital signal processing and/or other calibration means can exert an erroneous calibration effect on the power amplifier linearization adjustment.
null
minipile
NaturalLanguage
mit
null
1. Field of the Invention The invention relates to a process for stabilizing strip a plant for coating strip material, metal strip is taken through a container holding the molten coating material that has, below the melt surface, a through channel, in which induction currents are induced in the coating material by an electromagnetic travelling wave and, in interaction with the electromagnetic travelling field, generate an electromagnetic force to retain the coating material. 2. Discussion of the Prior Art A plant of this type is described, for example, in German Patent 43 44 939. In this case, the container that holds the molten coating material has an opening for the strip in the bottom. The opening is sealed by an electromagnetic pump. The pump generates an electromagnetic force equal to or greater than the metallostatic pressure in the opening of the through channel. As a result, the molten material is prevented from running out through the opening. It has been found that the strip, during continuous coating, is alternately deflected or twisted. A remedy for this is not possible with conventional means, e.g., an increase in bath tension. Further roller guides are not possible in this process area, because the coating has not yet solidified.
null
minipile
NaturalLanguage
mit
null
The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section. Debugging a wireless system is difficult and costly. Debugging a wireless system is difficult due to the high complexity of the radio spectrum and variability in the implementation of wireless networking protocols by client devices. Every few years new protocol standards may be developed and released, making the existing debug infrastructure inadequate because it cannot detect anomalies that are introduced in software that is developed in response to updated standards. Additionally, debugging a wireless system is costly because traditional debugging techniques may be implemented manually by technicians with minimal software support. Costs associated with manual debugging techniques can be unpredictable and lead to workflow disruptions and increased business costs. Traditionally, information collection in wireless systems such as packet captures, data logs, and event collections are enabled at all times in the wireless system, or debug information is collected by manually configuring wireless sniffers and enabling logs and packet traces after a bug or anomaly is identified. These traditional methods for debugging a wireless system are inefficient and error prone. For example, if the system is enabled to collect debug information at all times, valuable computing resources are spent collecting, processing, and sending large amounts of data that will never be utilized. Alternatively, if the system is enabled to collect data such as logs and packet traces after a bug or anomaly is identified, the underlying data relating to the anomaly is not recorded and the anomaly must occur again in order to record the data required to properly troubleshoot the problem. Thus, the existing debugging mechanisms are time consuming, resource expensive, and generally require problem reproduction. Therefore, there is a need for improved debugging techniques in wireless systems that reduce the use of computing resources, network bandwidth, and overall time and cost of debugging a wireless system.
null
minipile
NaturalLanguage
mit
null
Assassins (film) Assassins is a 1995 American action thriller film directed by Richard Donner. The screenplay was by The Wachowskis and Brian Helgeland. The film stars Sylvester Stallone and Antonio Banderas and costars Julianne Moore. The Wachowskis stated that their script was "totally rewritten" by Helgeland, and that they tried to remove their names from the film but failed. Plot Robert Rath (Sylvester Stallone) is a paid assassin who wants to retire, haunted by the memory of murdering his own mentor Nicolai years ago. He is on an assignment when someone else gets to the 'mark' (target) before he does. That intruder turns out to be Miguel Bain (Antonio Banderas), a fellow assassin and a competitive sociopath. Bain plans to kill Rath to become the number one assassin. As Rath tries to figure out who sent Bain, the contractor offers him a lucrative job that could allow him to retire: kill a computer hacker named Electra (Julianne Moore) and the four Dutch buyers of a computer disk and retrieve the disk. Electra has set up CCTV cameras and an elaborate mechanism for remotely moving items between rooms in the building where she is based. Bain gets there first and kills the four Dutch buyers, who turn out to be Interpol agents. Rath, meanwhile, spares Electra, and the two escape from Bain with the disk. Rath exchanges the disk for his fee, given to him in a briefcase, which actually contains a bomb placed by his own contractor in an attempt to kill him. Electra then tells him she had swapped the disk, not sure if Rath was coming back. Rath demands a greatly increased fee from his contractor, this time to be wired to a bank. The contractor (who is also Bain's contractor) sends Bain a new mark: Rath. Rath and Electra travel to the bank, where Rath identifies the decrepit, abandoned hotel that Bain will use as a sniper post and plans a trap. After Bain's apparent death, Nicolai appears, revealing that he had had a bulletproof vest on when Rath had shot him years ago. Knowing that Nicolai would kill him too, Bain revives and joins Rath in shooting him dead. Bain still plans to kill Rath and become number one. Electra puts on her sunglasses, allowing Rath to see Bain; Rath shoots through his own jacket to kill him. Cast Sylvester Stallone as Robert Rath Antonio Banderas as Miguel Bain Julianne Moore as Electra Anatoly Davydov as Nicolai Tashlinkov Muse Watson as Ketcham Steve Kahan as Alan Branch Kai Wulff as Remy Mark Coates as Jereme Kyle Kelly Rowan as Jennifer Reed Diamond as Bob Production The original spec screenplay was written by The Wachowskis and sold for $1 million to producer Joel Silver around the same time he bought their script for The Matrix, also for $1 million. The script was similar to the final product, but with a more developed love story between Rath and Electra and a briefer ending without the character of Nicolai. Joel Silver offered Richard Donner $10 million to direct, but Donner insisted the script be rewritten to tone down the violence and make the central character more sympathetic and brought in Brian Helgeland, who did a page one rewrite and earned a co-screenwriter credit. The Wachowskis attempted to remove their name from the film but were refused by the Writers Guild of America. The film was shot in Seattle, Washington and Portland, Oregon. Reception The film received mostly negative press, and on the film-critic aggregator Rotten Tomatoes received 16% positive reviews based on 45 reviews, with an average rating of 3.7/10. The script was heavily criticized for being confusing and dull. Stallone's performance in the film earned him a Golden Raspberry Award nomination for Worst Actor (also for Judge Dredd), but lost the trophy to Pauly Shore for Jury Duty. Box office Assassins debuted at No. 2 at the box office. The film grossed $30.3 million in the US and another $53 million worldwide, for a total of $83.3 million. Audiences polled by CinemaScore gave the film an average grade of "B" on an A+ to F scale. References External links Original screenplay by the Wachowskis Screenplay revised by Brian Helgeland Category:1995 films Category:1990s action thriller films Category:1990s chase films Category:American action thriller films Category:American chase films Category:American films Category:English-language films Category:Films about contract killing Category:Films about snipers Category:Films directed by Richard Donner Category:Films produced by Joel Silver Category:Films with screenplays by Brian Helgeland Category:Films set in Puerto Rico Category:Films set in Seattle Category:Films shot in Portland, Oregon Category:Films shot in Washington (state) Category:Films with screenplays by The Wachowskis Category:Silver Pictures films Category:Warner Bros. films
null
minipile
NaturalLanguage
mit
null
--- abstract: 'In order to realize superconductivity in cuprates with the T’-type structure, not only chemical substitution (Ce doping) but also post-growth reduction annealing is necessary. In the case of thin films, however, well-designed reduction annealing alone without Ce doping can induce superconductivity in the T’-type cuprates. In order to unveil the origin of superconductivity in the Ce-undoped T’-type cuprates, we have performed bulk-sensitive hard x-ray photoemission and soft x-ray absorption spectroscopies on superconducting and non-superconducting Nd$_{2-x}$Ce$_x$CuO$_4$ ($x = 0, 0.15$, and 0.19) thin films. By post-growth annealing, core-level spectra exhibited dramatic changes, which we attributed to the enhancement of core-hole screening in the CuO$_2$ plane and the shift of chemical potential along with changes in the band filling. The result suggests that the superconducting Nd$_2$CuO$_4$ film is doped with electrons despite the absence of the Ce substitution.' author: - 'M. Horio$^1$, Y. Krockenberger$^2$, K. Yamamoto$^3$, Y. Yokoyama$^3$, K. Takubo$^3$, Y. Hirata$^3$, S. Sakamoto$^1$, K. Koshiishi$^1$, A. Yasui$^4$, E. Ikenaga$^4$, S. Shin$^3$, H. Yamamoto$^2$, H. Wadati$^3$, and A. Fujimori$^1$' title: 'Electronic Structure of Ce-Doped and -Undoped Nd$_2$CuO$_4$ Superconducting Thin Films Studied by Hard X-ray Photoemission and Soft X-ray Absorption Spectroscopy' --- High-temperature superconductivity in cuprates is realized by doping hole or electron carriers into the parent material which has been widely considered to be an antiferromagnetic (AFM) Mott insulator. $Ln_2$CuO$_4$ ($Ln$: rare earth) with the T’-type structure, where Cu takes the square-planar coordination, can be doped with electrons by substituting Ce$^{4+}$ for $Ln^{3+}$. Generally, electron doping by Ce substitutions alone cannot induce superconductivity in bulk crystals of the T’-type cuprates, and an additional procedure of post-growth annealing in a reducing atmosphere is required [@Tokura1989]. Three distinct microscopic scenarios have been experimentally proposed for the role of the reduction annealing [@Armitage2010]: i) removal of impurity apical oxygen atoms [@Radaelli1994; @Schultz1996] ii) creation of vacancies at the regular oxygen sites [@Riou2004; @Richard2004] iii) filling of Cu vacancies [@Kang2007]. While the exact microscopic effect remains elusive, reduction annealing dramatically suppresses the AFM order [@Richard2007; @Horio2016] and reduces quasi-particle scattering [@Xu1996], inducing superconductivity in the Ce-doped samples. Furthermore, it has been demonstrated that thin films of T’-type cuprates can exhibit superconductivity without any Ce doping when properly annealed [@Tsukada2005a; @Tsukada2005b; @Matsumoto2009b; @Krockenberger2013]. The observed decrease of the $c$-axis parameter by annealing [@Tsukada2005b; @Matsumoto2009b; @Krockenberger2013] rather than its increase [@Kang2007] should be attributed to the removal of apical oxygen atoms in these samples [@Radaelli1994; @Schultz1996], as the removal of apical oxygen reduces the repulsion between the CuO$_2$ planes. The large surface-to-volume ratio of thin films helps the thorough removal of impurity oxygen atoms. The observation has cast doubt on the fundamental assumption that the parent compound of the cuprate superconductor is an AFM Mott insulator. Theoretical studies using the local density approximation plus dynamical mean field theory (LDA+DMFT) have indeed predicted that the parent compound of the T’-type cuprates is not a Mott insulator but a Slater insulator in the sense that the AFM order is necessary to open the insulating band gap [@Das2009; @Weber2010a; @Weber2010b]. When discussing the electronic structure of parent compounds and the phase diagram, however, the possibility should not be overlooked that oxygen reduction affects the carrier concentration. In fact, annealing-induced changes in the Néel temperature [@Mang2004a] and the optical conductivity [@Arima1993] for bulk Nd$_{2-x}$Ce$_x$CuO$_4$ crystals have been interpreted as due to the doping 0.03–0.05 electrons/f.u. Recent angle-resolved photoemission spectroscopy (ARPES) studies on Ce-doped bulk single crystals [@Horio2016; @Song2017] and that on insulating Ce-undoped thin films [@Wei2016] have also shown that the electron concentrations of annealed samples estimated from the Fermi surface area are larger than that expected from the Ce concentrations. To understand the cuprate phase diagram and the electronic states of the parent compounds, it is important to unveil the electron concentration of the superconducting (SC) and non-superconducting (non-SC) Ce-undoped T’-type cuprates. For that purpose, systematic studies of thin film samples with various Ce concentrations and reduction/oxidization treatments are necessary. However, ARPES measurements on such thin films are hampered by the lack of an [*in-situ*]{} ARPES measurement system combined with a molecular beam epitaxy (MBE) apparatus for the T’-type cuprates, which makes ARPES-quality surfaces available. This is because ARPES is a surface-sensitive technique. In this Letter, we report on measurements of bulk-sensitive hard x-ray photoemission spectroscopy (HAXPES) and soft x-ray absorption spectroscopy (XAS) of SC and non-SC Nd$_{2-x}$Ce$_x$CuO$_4$ thin films annealed or oxidized under various atmosphere. By HAXPES, one can measure core-level shifts and hence the chemical-potential shift, which directly probes the doped electron concentration. By annealing Nd$_2$CuO$_4$, we observed dramatic changes in the core-level spectra, which can be explained by the strong modification of core-hole screening in the CuO$_2$ planes and by the chemical-potential shift caused by electron doping. The present results indicate the possibility that the SC Ce-undoped T’-type cuprates are doped with a significant amount of electrons. ![Physical properties of Nd$_{2-x}$Ce$_x$CuO$_4$ thin films. (a)–(c) Resistivity versus temperature for the $x = 0$, 0.15, and 0.19 films, respectively. The inset shows a magnified plot near the SC transition for each composition. (d) $c$-axis lengths plotted against Ce concentration $x$. The markers are color-coded according to (a)–(c). Two solid lines trace the $c$-axis lengths of SC and non-SC films whose difference may originate from the different amount of apical oxygen atoms.[]{data-label="NCCO_rhoT"}](NCCO_rhoT5.eps){width="85mm"} Nd$_{2-x}$Ce$_x$CuO$_4$ ($x = 0, 0.15$, and 0.19) thin films with the thicknesses of 200 nm, 100 nm, and 100 nm, respectively, were grown on SrTiO$_3$ (001) substrates by MBE. For Nd$_2$CuO$_4$, we prepared three kinds of films: as-grown, weakly-annealed, and annealed films, among which only the annealed film showed superconductivity with $T_\mathrm{c} = 25.0$ K. The $T_\mathrm{c}$ was defined as the temperature where the resistivity drops to zero. Ce-doped films showed superconductivity without *ex-situ* annealing in a tubular furnace. The $T_\mathrm{c}$’s were 24.0 K and 21.5 K for $x = 0.15$ and $x = 0.19$, respectively. Oxidized non-SC films were also prepared for both the compositions. Conditions of annealing and oxidization are described in Supplementary Information. The resistivity curves and the $c$-axis lengths of all the films are plotted in Fig. \[NCCO\_rhoT\]. The difference in the $c$-axis length between the SC and non-SC films in Fig. \[NCCO\_rhoT\](d) may largely originate from the difference in the amount of apical oxygen atoms [@Tsukada2005b; @Matsumoto2009b; @Krockenberger2013]. HAXPES measurements were performed at beamline 47XU of SPring-8 at $T = 300$ K with $h\nu = 7.94$ keV photons. The total energy resolution was determined from the Fermi edge of Au to be 0.3 eV. XAS measurements were performed in the total electron yield mode at beamline 07LSU of SPring-8 at $T = 300$ K under the pressure better than $5 \times 10^{-9}$ Torr. Two kinds of linearly polarized light, with polar angle $\theta = 90^\circ$ (${\bf E} \perp c$) and $\theta = 30^\circ$, were used for the measurements [@Sup1]. Figure \[XAS\](a) shows Cu $L_3$-edge XAS spectra for ${\bf E} \parallel c$ and ${\bf E} \perp c$ for as-grown and annealed Nd$_2$CuO$_4$ films. The spectra for ${\bf E} \parallel c$ were obtained by subtracting the contribution of ${\bf E} \perp c$ from the spectra measured with $\theta = 30^\circ$ polarization. The absorption intensity is proportional to the unoccupied density of states (DOS) of the specific element multiplied by transition matrix elements [@deGroot1990], which depends on the initial- and final-state orbital symmetry as well as incident light polarization. Thus, XAS provides information about the element- and orbital-specific unoccupied DOS. With polarization ${\bf E} \perp c$, matrix element of the transition into the 3$d_{x^2-y^2}$ orbital is three times larger than that into the 3$d_{3z^2-r^2}$ orbital, while the polarization ${\bf E} \parallel c$ allows only the transition into the 3$d_{3z^2-r^2}$ orbital (See Supplementary Information). The XAS spectra for ${\bf E} \perp c$ show an intense peak at $\sim 930$ eV and its intensity decreases with annealing by 30 %, suggesting the reduction of unoccupied DOS near $E_\mathrm{F}$ as reported for Ce-doped samples [@Flipse1990; @Pellegrin1993; @Fink1994; @Steeneken2003]. In contrast, spectra for ${\bf E} \parallel c$ remains negligibly weak. This leads to a small ratio of the 3$d_{3z^2-r^2}$ weight to the 3$d_{x^2-y^2}$ weight (4 % and 2 % for as-grown and annealed Nd$_2$CuO$_4$, respectively) in agreement with previous reports [@Pellegrin1993; @Fink1994]. Therefore, the 3$d_{3z^2-r^2}$ orbitals are almost completely filled regardless of whether annealed or not, and additional electrons go to the 3$d_{x^2-y^2}$ orbitals by annealing. On the other hand, the pre-edge peak ($\sim$ 529 eV) in O $K$-edge XAS measured with ${\bf E} \perp c$ \[Fig. \[XAS\](b)\], which represents the transition from O 1$s$ to in-plane O 2$p$ orbitals hybridized with the upper Hubbard band, shows only a slight change (5 %) in contrast to Cu $L_{2,3}$-edge XAS for ${\bf E} \perp c$. This agrees with the changes observed by Ce doping in the previous studies and suggests that the orbital character of the upper Hubbard band is dominated by 3$d_{x^2-y^2}$ [@Flipse1990; @Krol1990; @Pellegrin1993; @Fink1994]. ![XAS spectra of Nd$_2$CuO$_4$ thin films. (a) Cu $L_3$-edge XAS spectra for ${\bf E} \perp c$ (top) and ${\bf E} \parallel c$ (bottom) polarizations. The spectra have been normalized to the intensity of the Nd $M_{4,5}$ XAS peak at 978 eV. (b) O $K$-edge XAS spectra for ${\bf E} \perp c$ and normalized to the intensity at 532–540 eV.[]{data-label="XAS"}](XAS_v2.eps){width="85mm"} ![image](Nd_O8.eps){width="180mm"} The effect of annealing is also remarkable in HAXPES spectra. Figure \[Nd\_O\](a) shows the Cu 2$p_{3/2}$ core-level HAXPES spectra of the as-grown and annealed Nd$_2$CuO$_4$ films. Upon photoemission from a core level, valence electrons are attracted to the core-hole site to screen its potential. Different types of core-hole screening result in various final states appearing as fine structures in the core-level photoemission spectra [@Veenendaal1993]. As has been discussed for the Cu 2$p$ spectrum of insulating cuprates such as La$_2$CuO$_4$ [@Taguchi2005; @Maiti2009] and Sr$_2$CuO$_2$Cl$_2$ [@Boske_1997; @Boske_1998] analyzed using multi-site cluster calculation, the peak at the highest binding energy ($E_\mathrm{B}$ = 940–947 eV) is the satellite due to the 2$p^5$3$d^9$ final state with an unscreened core hole. In the main peak region ($E_\mathrm{B}$ = 930–939 eV), the highest binding energy peak corresponds to the 2$p^53d^{10} \underline{L}$ final state, where an electron is transferred from the neighboring oxygen atoms (local screening) leaving a hole in the oxygen ligand orbital $L$, and the two peaks in the middle to the final state where an electron is transferred from oxygen in the neighboring CuO$_4$ plaquettes thereby creating a Zhang-Rice singlet in the plaquettes (non-local screening). Apart from peak A at the lowest binding energy discussed below, the line shape of the main peak resembles those of the other insulating cuprates with two-dimensional CuO$_2$ planes [@Boske_1998]. Upon annealing, peak A is strongly enhanced and the entire line shape dramatically changes. The binding energies of the charge-transferred final state are determined by the energy levels of the electronic states from which the electron is transferred to screen the core-hole potential. Therefore, the enhancement of the lowest energy peak indicates the development of electronic states closest to the Fermi level ($E_\mathrm{F}$) [@Taguchi2005; @Panaccione2008] and is attributed to final states where the core hole is screened by conduction electrons. The observed changes in the present Cu 2$p$ spectra therefore suggest that conduction electrons were introduced by annealing, consistent with the occurrence of superconductivity in the annealed Nd$_2$CuO$_4$. The effect of annealing on the Nd and O core levels of Nd$_2$CuO$_4$ films is shown in Figs. \[Nd\_O\](b)–(d). Upon annealing, the Nd 3$d_\mathrm{5/2}$ peak was shifted toward higher binding energy by 0.22 eV \[Fig. \[Nd\_O\](b)\]. As for the O $1s$ peak, a shift of similar amount (0.21 eV) was observed at the edge, but the spectral line shape is also modified: the full width at half maximum decreased from 1.44 eV to 1.16 eV and a long high binding energy tail emerges above $\sim 529.5$ eV \[Fig. \[Nd\_O\](c)\]. Such changes have been overlooked in the doping and annealing dependence of the O $1s$ photoemission spectra of Nd$_{2-x}$Ce$_x$CuO$_4$ in previous studies [@Suzuki1990a; @Harima2001]. In order to disentangle this complicated spectral deformation, the O $1s$ spectra have been analyzed as follows: The peak region of the O $1s$ spectrum of the as-grown film is rather flat, implying unresolved two peaks with similar intensities. We attribute them to oxygen atoms in the Nd$_2$O$_2$ layers (O$_\mathrm{Nd_2O_2}$) and those in the CuO$_2$ planes (O$_\mathrm{CuO_\mathrm{2}}$), which are contained in Nd$_2$CuO$_4$ with equal amount. We calculated the oxygen binding energies using a Wien2k package, and found that the O$_\mathrm{Nd_2O_2}$ 1$s$ level was located at a lower binding energy than the O$_\mathrm{CuO_\mathrm{2}}$ 1$s$ level [@Sup2]. Therefore, the O 1$s$ spectra of the Nd$_2$CuO$_4$ films were fitted to a superposition of a Voigt function (for O$_\mathrm{Nd_2O_2}$) at lower binding energies and Mahan line shape $\frac{1}{\mathrm{\Gamma}(\alpha)} \frac{e^{-(E_B-E_0)/\xi}}{\left| (E_B-E_0)/\xi \right| ^{1-\alpha}} \Theta(E_B-E_0)$ convolved with a Voigt function (for O$_\mathrm{CuO_\mathrm{2}}$) at higher binding energies. The asymmetric Mahan line shape was assumed for O$_\mathrm{CuO_\mathrm{2}}$ considering the core-hole screening by metallic electrons. Another Voigt function was added to the fitting function to reproduce a weak contamination component at $\sim 531$ eV. The fitting yielded O$_\mathrm{Nd_2O_2}$ and O$_\mathrm{CuO_\mathrm{2}}$ peaks with nearly the same area both for the as-grown and annealed films as shown in Fig. \[Nd\_O\](d), consistent with the initial assumption that each O 1$s$ spectrum consists of two components arising from O$_\mathrm{CuO_2}$ and O$_\mathrm{Nd_2O_2}$ [@Sup3]. The present analysis thus enables us to identify the effect of annealing on the two O 1$s$ core levels separately: The O$_\mathrm{Nd_2O_2}$ peak was shifted by 0.22 eV toward higher binding energy, and the O$_\mathrm{CuO_\mathrm{2}}$ peak became strongly asymmetric (represented by the increase of asymmetry parameter $\alpha$ from 0.03 to 0.75). Since a finite DOS at $E_\mathrm{F}$ leads to a peak asymmetry, the strong asymmetry of the O$_\mathrm{CuO_\mathrm{2}}$ peak in the annealed Nd$_2$CuO$_4$ film is consistent with the dramatic enhancement of the electrical conductivity. Another remarkable point is that annealing shifted the O$_\mathrm{Nd_2O_2}$ 1$s$ peak by almost the same amount as the Nd 3$d_\mathrm{5/2}$ peak without appreciable changes in the line shapes. The shift of the core-level binding energy is given by [@Hufner1995] $$\Delta E_\mathrm{B} = \Delta \mu - K\Delta \mathrm{Q} + \Delta V_\mathrm{M} - \Delta E_\mathrm{R}, \label{shift}$$ where $\Delta \mu$ is the change in the chemical potential, $\Delta Q$ is the change in the number of valence electrons, $K$ is a constant, $\Delta V_\mathrm{M}$ is the change in the Madelung potential, and $\Delta E_\mathrm{R}$ is the change in the extra-atomic screening of the core-hole potential by conduction electrons and/or dielectric polarization of surrounding media. Almost identical shifts observed for the Nd 3$d$ and O$_\mathrm{Nd_2O_2}$ 1$s$ core levels indicate that $\Delta V_\mathrm{M}$ is negligibly small because it would shift the core levels of the O$^{2-}$ anion and the Nd$^{3+}$ cation in different ways. $\Delta E_\mathrm{R}$ cannot be the main origin of the observed shifts, either, because the increase of conduction electrons by annealing would shift the core-level peaks toward lower binding energy, opposite to the experimental observation. Considering that the valences of Nd$^{3+}$ and O$^{2-}$ are fixed ($\Delta Q = 0$), we conclude that the observed shifts in Nd 3$d$ and O$_\mathrm{Nd_2O_2}$ 1$s$ core levels of Nd$_2$CuO$_4$ are largely due to the chemical potential shift $\Delta \mu$. The increase of the core-level binding energies by annealing indicates the increase of $\Delta \mu$ due to the addition of electrons. Having identified the chemical-potential shift caused by annealing in Nd$_2$CuO$_4$, we compare the core-level structure of Nd$_2$CuO$_4$ with those of Ce-doped compounds. By Ce substitution, annealing, and oxidization, the Nd and Ce 3$d$ spectra were shifted maintaining their shape. The line-shape changes in the Cu 2$p$ and O 1$s$ spectra were also consistent with the above scenario [@Sup4]. The chemical-potential shift $\Delta \mu$ defined as the average shift of the Nd 3$d$ and O$_\mathrm{Nd_2O_2}$ 1$s$ core levels, is plotted in Fig, \[muShift\](a) against Ce concentration $x$. For Nd$_2$CuO$_4$, the chemical potential is shifted upwards with annealing, reaching the level of Ce-doped $x=0.15$ and 0.19 superconductors when sufficiently annealed. The valence-band spectra shown in Fig. \[Nd\_O\](e) and Supplementary Information are also almost identical among the three SC films with different Ce concentrations ($x=0$, 0.15, and 0.19), indicating that the electronic structure and band filling are close to each other. ![Chemical-potential shifts in Nd$_{2-x}$Ce$_x$CuO$_4$ thin films. (a) Chemical-potential shifts $\Delta \mu$ defined as the average of the Nd 3$d$ and O 1$s$ core-level shifts plotted against Ce concentration $x$. (b) $T_\mathrm{c}$’s plotted against $\Delta \mu$. The markers are color-coded according to (a). Thin films with shorter (longer) $c$-axis lengths and hence less (more) apical oxygen atoms are SC (non-SC) \[See Fig. \[NCCO\_rhoT\](d)\]. The arrows connect the films with the same Ce concentration.[]{data-label="muShift"}](muShift10.eps){width="85mm"} The large electron concentration for the annealed SC Nd$_2$CuO$_4$ film can be explained if oxygen atoms are removed not only from the apical site [@Radaelli1994; @Schultz1996] but also from the regular sites (in the CuO$_2$ plane and/or the Nd$_2$O$_2$ layer) [@Riou2004; @Richard2004], leading to the total oxygen content less than the stoichiometric one. On the other hand, upon oxidization of Nd$_{2-x}$Ce$_x$CuO$_4$ ($x = 0.15$), chemical potential was shifted downwards as can be seen in Fig. \[muShift\](a). This may be because the SC $x=0.15$ film was already oxygen deficient and the vacancies were filled by oxidization. Consequently, the band filling of the T’-type cuprates is not determined by the Ce substitution alone but by the combined effect of Ce substitution and oxygen vacancies and, therefore, the phase diagram for this system should be made as a function of actual band filling, rather than as a function of Ce concentration. The oxidization process also introduced excess apical oxygen atoms, as suggested by the $c$-axis elongation \[Fig. \[NCCO\_rhoT\](d)\], and the $x=0.15$ film turned non-SC. In Fig. \[muShift\](b), the $T_\mathrm{c}$’s of Nd$_{2-x}$Ce$_x$CuO$_4$ films are thus plotted against chemical-potential shift, which represents the electron concentration. The $T_\mathrm{c}$ values are not solely determined by the electron concentration since $x = 0.19$ films can be either SC or non-SC without a significant change in the electron concentration. The elongation of the $c$-axis lattice parameter by oxidization is also rather small for the $x = 0.19$ film (0.06 %) compared to that for $x = 0.15$ film (0.12 %), indicating that only a tiny amount of apical oxygen atoms were incorporated. These results are consistent with previous studies where the amount of oxygen reduction decreases with increasing Ce concentrations [@Suzuki1990b; @Radaelli1994; @Schultz1996]. The higher concentration of Ce$^{4+}$ and the smaller $c$-axis lattice parameter may make the Ce-overdoped samples more robust against oxygen non-stoichiometry induced by reduction annealing and oxidization. While oxygen vacancy at the regular sites increases the electron concentration, excess oxygen atoms at the apical site immediately destroy superconductivity. The electronic structure of the T’-type cuprates are thus dominated not only by Ce concentrations but also by oxygen non-stoichiometry. In conclusion, we have performed HAXPES and XAS measurements on Nd$_{2-x}$Ce$_x$CuO$_4$ ($x$ = 0, 0.15, and 0.19) thin films with varying annealing atmosphere, and observed changes in the band-filling level among them. The electronic structure of SC Nd$_2$CuO$_4$ was found to be intimately linked to those of Ce-doped superconductors as the electrons were doped into the thin films by annealing probably through the creation of oxygen vacancies. Since the electron concentration and superconductivity of the T’-type cuprates are significantly affected by oxygen non-stoichiometry, the electronic structure should be discussed based on the actual electron concentration and oxygen occupancies rather than solely the Ce concentration. Fruitful discussion with K. Okada and G.R. Castro is gratefully acknowledged. Experiments were performed at SPring-8 (proposal Nos. 2015B1699, 2015B1793, 2015B7401, and 2016A1210). This work was supported by Grants-in-aid from the Japan Society of the Promotion of Science (JSPS) (grant Nos. 14J09200 and 15H02109). M.H. acknowledges support from the Advanced Leading Graduate Course for Photon Science (ALPS) and the JSPS Research Fellowship for Young Scientists. [10]{} Y. Tokura, H. Takagi, and S. Uchida, Nature (London) [**337**]{}, 345 (1989). N. P. Armitage, P. Fournier, and R. L. Greene, Rev. Mod. Phys. [**82**]{}, 2421 (2010). P. G. Radaelli, J. D. Jorgensen, A. J. Schultz, J. L. Peng, and R. L. Greene, Phys. Rev. B [**49**]{}, 15322 (1994). A. J. Schultz, J. D. Jorgensen, J. L. Peng, and R. L. Greene, Phys. Rev. B [ **53**]{}, 5157 (1996). G. Riou, P. Richard, S. Jandl, M. Poirier, P. Fournier, V. Nekvasil, S. N. Barilo, and L. A. Kurnevich, Phys. Rev. B [**69**]{}, 024511 (2004). P. Richard, G. Riou, I. Hetel, S. Jandl, M. Poirier, and P. Fournier, Phys. Rev. B [**70**]{}, 064513 (2004). H. J. Kang, P. Dai, B. J. Campbell, P. J. Chupas, S. Rosenkranz, P. L. Lee, Q. Huang, S. Li, S. Komiya, and Y. Ando, Nat. Mater. [**6**]{}, 224 (2007). P. Richard, M. Neupane, Y.-M. Xu, P. Fournier, S. Li, P. Dai, Z. Wang, and H. Ding, Phys. Rev. Lett. [**99**]{}, 157002 (2007). M. Horio, T. Adachi, Y. Mori, A. Takahashi, T. Yoshida, H. Suzuki, L. C. C. Ambolode, K. Okazaki, K. Ono, H. Kumigashira, H. Anzai, M. Arita, H. Namatame, M. Taniguchi, D. Ootsuki, K. Sawada, M. Takahashi, T. Mizokawa, Y. Koike, and A. Fujimori, Nat. Commun. [**7**]{}, 10567 (2016). X. Q. Xu, S. N. Mao, W. Jiang, J. L. Peng, and R. L. Greene, Phys. Rev. B [ **53**]{}, 871 (1996). A. Tsukada, Y. Krockenberger, M. Noda, H. Yamamoto, D. Manske, L. Alff, and M. Naito, Solid State Commun. [**133**]{}, 427 (2005). A. Tsukada, M. Noda, H. Yamamoto, and M. Naito, Physica C [**426-431**]{}, 459 (2005). O. Matsumoto, A. Utsuki, A. Tsukada, H. Yamamoto, T. Manabe, and M. Naito, Physica C [**469**]{}, 924 (2009). Y. Krockenberger, H. Irie, O. Matsumoto, K. Yamagami, A. Tsukada, M. Naito, and H. Yamamoto, Sci. Rep. [**3**]{}, 2235 (2013). H. Das and T. Saha-Dasgupta, Phys. Rev. B [**79**]{}, 134522 (2009). C. Weber, K. Haule, and G. Kotliar, Nat. Phys. [**6**]{}, 574 (2010). C. Weber, K. Haule, and G. Kotliar, Phys. Rev. B [**82**]{}, 125107 (2010). P. K. Mang, O. P. Vajk, A. Arvanitaki, J. W. Lynn, and M. Greven, Phys. Rev. Lett. [**93**]{}, 027002 (2004). T. Arima, Y. Tokura, and S. Uchida, Phys. Rev. B [**48**]{}, 6597 (1993). D. Song, G. Han, W. Kyung, J. Seo, S. Cho, B. S. Kim, M. Arita, K. Shimada, H. Namatame, M. Taniguchi, Y. Yoshida, H. Eisaki, S. R. Park, and C. Kim, Phys. Rev. Lett. [**118**]{}, 137001 (2017). H. I. Wei, C. Adamo, E. A. Nowadnick, E. B. Lochocki, S. Chatterjee, J. P. Ruf, M. R. Beasley, D. G. Schlom, and K. M. Shen, Phys. Rev. Lett. [**117**]{}, 147002 (2016). See Supplementary Information for more detailed experimental setup, which includes Refs. \[\]. H. Wadati and A. Fujimori, J. Electron Spectrosc. Relat. Phenom. [**190**]{}, 222 (2013). Y. Takata, M. Yabashi, K. Tamasaku, Y. Nishino, D. Miwa, T. Ishikawa, E. Ikenaga, K. Horiba, S. Shin, M. Arita, K. Shimada, H. Namatame, M. Taniguchi, H. Nohira, T. Hattori, S. Södergren, B. Wannberg, and K. Kobayashi, Nucl. Instr. Methods A [**547**]{}, 50 (2005). M. Sacchi, F. Offi, P. Torelli, A. Fondacaro, C. Spezzani, M. Cautero, G. Cautero, S. Huotari, M. Grioni, R. Delaunay, M. Fabrizioli, G. Vankó, G. Monaco, G. Paolicelli, G. Stefani, and G. Panaccione, Phys. Rev. B [**71**]{}, 155117 (2005). NIST Electron Inelastic-Mean-Free-Path database, Version 1.1, National Institute of Standard and Technology, U.S., 2000. S. L. Schroeder, Solid State Commun. [**98**]{}, 405 (1996). A. Ruosi, C. Raisch, A. Verna, R. Werner, B. A. Davidson, J. Fujii, R. Kleiner, and D. Koelle, Phys. Rev. B [**90**]{}, 125120 (2014). F. M. F. de Groot, J. C. Fuggle, B. T. Thole, and G. A. Sawatzky, Phys. Rev. B [**42**]{}, 5459 (1990). C. F. J. Flipse, G. van der Laan, A. L. Johnson, and K. Kadowaki, Phys. Rev. B [**42**]{}, 1997 (1990). E. Pellegrin, N. Nücker, J. Fink, S. L. Molodtsov, A. Gutiérrez, E. Navas, O. Strebel, Z. Hu, M. Domke, G. Kaindl, S. Uchida, Y. Nakamura, J. Markl, M. Klauda, G. Saemann-Ischenko, A. Krol, J. L. Peng, Z. Y. Li, and R. L. Greene, Phys. Rev. B [**47**]{}, 3354 (1993). J. Fink, N. Nücker, E. Pellegrin, H. Romberg, M. Alexander, and M. Knupfer, J. Electron Spectrosc. Relat. Phenom. [**66**]{}, 395 (1994). P. G. Steeneken, L. H. Tjeng, G. A. Sawatzky, A. Tanaka, O. Tjernberg, G. Ghiringhelli, N. B. Brookes, A. A. Nugroho, and A. A. Menovsky, Phys. Rev. Lett. [**90**]{}, 247005 (2003). A. Krol, C. S. Lin, Z. H. Ming, C. J. Sher, Y. H. Kao, C. L. Lin, S. L. Qiu, J. Chen, J. M. Tranquada, M. Strongin, G. C. Smith, Y. K. Tao, R. L. Meng, P. H. Hor, C. W. Chu, G. Cao, and J. E. Crow, Phys. Rev. B [**42**]{}, 4763 (1990). M. A. van Veenendaal and G. A. Sawatzky, Phys. Rev. Lett. [**70**]{}, 2459 (1993). M. Taguchi, A. Chainani, K. Horiba, Y. Takata, M. Yabashi, K. Tamasaku, Y. Nishino, D. Miwa, T. Ishikawa, T. Takeuchi, K. Yamamoto, M. Matsunami, S. Shin, T. Yokoya, E. Ikenaga, K. Kobayashi, T. Mochiku, K. Hirata, J. Hori, K. Ishii, F. Nakamura, and T. Suzuki, Phys. Rev. Lett. [**95**]{}, 177002 (2005). K. Maiti, J. Fink, S. de Jong, M. Gorgoi, C. Lin, M. Raichle, V. Hinkov, M. Lambacher, A. Erb, and M. S. Golden, Phys. Rev. B [**80**]{}, 165132 (2009). T. Böske, O. Knauff, R. Neudert, M. Kielwein, M. Knupfer, M. S. Golden, J. Fink, H. Eisaki, S. Uchida, K. Okada, and A. Kotani, Phys. Rev. B [**56**]{}, 3438 (1997). T. Böske, K. Maiti, O. Knauff, K. Ruck, M. S. Golden, G. Krabbes, J. Fink, T. Osafune, N. Motoyama, H. Eisaki, and S. Uchida, Phys. Rev. B [**57**]{}, 138 (1998). G. Panaccione, F. Offi, P. Torelli, G. Vanko, O. Tjernberg, P. Lacovig, A. Guarino, A. Fondacaro, A. Nigro, M. Sacchi, N. B. Brookes, and G. Monaco, Phys. Rev. B [**77**]{}, 125133 (2008). T. Suzuki, M. Nagoshi, Y. Fukuda, K. Oh-ishi, Y. Syono, and M. Tachiki, Phys. Rev. B [**42**]{}, 4263 (1990). N. Harima, J. Matsuno, A. Fujimori, Y. Onose, Y. Taguchi, and Y. Tokura, Phys. Rev. B [**64**]{}, 220507 (2001). See Supplementary Information for details of calculation, which includes Ref. \[\]. J. C. Slater, Int. J. Quantum. Chem. [**S4**]{}, 3 (1971). See Supplementary Information for more details about the fitting procedure, which includes Refs. \[\]. M. Ikeda, T. Yoshida, A. Fujimori, M. Kubota, K. Ono, H. Das, T. Saha-Dasgupta, K. Unozawa, Y. Kaga, T. Sasagawa, and H. Takagi, Phys. Rev. B [**80**]{}, 014510 (2009). R. Sankari, M. Ehara, H. Nakatsuji, Y. Senba, K. Hosokawa, H. Yoshida, A. D. Fanis, Y. Tamenori, S. Aksela, and K. Ueda, Chem. Phys. Lett. [ **380**]{}, 647 (2003). P. H. Citrin, P. Eisenberger, and D. R. Hamann, Phys. Rev. Lett. [**33**]{}, 965 (1974). S. Hüfner, [*Photoelectron Spectroscopy*]{} (Springer-Verlag, Berlin, 1995), Chap. 2, p. 35. See Supplementary Information for individual spectra, which includes Ref. \[\]. A. Kotani and Y. Toyozawa, J. Phys. Soc. Jpn. [**37**]{}, 912 (1974). K. Suzuki, K. Kishio, T. Hasegawa, and K. Kitazawa, Physica C [**166**]{}, 357 (1990).
null
minipile
NaturalLanguage
mit
null
Sometimes we have interpretations of what it means to be alive. Because I am alive, I can do this, I can do that. The focus is not about all those things. The focus is your existence, you being on the face of this earth. This will never happen again. The house you live in, other people will live in, too. Right now, you say, “It’s mine.” One day, somebody else will say, “It’s mine.”
null
minipile
NaturalLanguage
mit
null
Canoeing at the 2000 Summer Olympics – Women's K-4 500 metres The women's K-4 500 metres event was a fours kayaking event conducted as part of the Canoeing at the 2000 Summer Olympics program. Medalists Results Heats 10 crews entered in two heats. The top three finishers from each of the heats advanced directly to the finals while the remaining teams were relegated to the semifinal. Overall Results Heats Semifinal The top three finishers in the semifinal advanced to the final. Final Fischer became the first woman in any sport to win Olympic gold medals 20 years apart with this event and the first woman to win gold medals in five different Olympics in any sport. Kőbán's silver medal brought her career total to six: 2 gold, 3 silver, and 1 bronze. References 2000 Summer Olympics Canoe flatwater results. Sports-reference.com women's 2000 K-4 500 m results. Wallechinsky, David and Jaime Loucky (2008). "Canoeing: Women's Kayak Fours 500 Meters". In The Complete Book of the Olympics: 2008 Edition. London: Aurum Press Limited. p. 495. Women's K-4 500 Olympic Category:Women's events at the 2000 Summer Olympics
null
minipile
NaturalLanguage
mit
null
Introduction {#Sec1} ============ Bacteria belonging to the genus *Enterococcus* are a part of the normal, harmless faecal flora of humans and animals. However, they may also act as opportunistic pathogens, and today are recognized as important causative agents of both invasive and non-invasive nosocomial infections, affecting immunocompromised, severely ill patients \[[@CR1]\]. According to the European Centre for Disease Prevention and Control (ECDC) enterococci are presently third, after *Escherichia coli* and *Staphylococcus aureus,* most frequently isolated bacteria from the healthcare-associated infections (HAIs) in Europe \[[@CR2]\]. Currently observed acquisition of resistance to antimicrobials used in the therapy of enterococcal infections is a cause of growing concern \[[@CR3]\]. *Enterococcus faecalis* and *Enterococcus faecium* represent two species of the biggest clinical importance, while infections caused by other enterococci are rare \[[@CR4]\]. Multilocus sequence typing (MLST) and other typing methods showed the presence of distinct clones associated with hospital infections/outbreaks, named high-risk enterococcal clonal complexes (HiRECCs), within populations of both *E. faecalis* and *E. faecium* \[[@CR5], [@CR6]\]. Genomes of isolates belonging to HiRECCs are enriched in mobile genetic elements (MGEs), often associated with genes encoding potential virulence factors and resistance determinants \[[@CR3], [@CR7]\]. For *E. faecalis,* two HIRECCs, CC6 (also known as CC2) and CC87, preferentially group hospital clinical isolates \[[@CR8]\]. Hospital subpopulation of *E. faecium,* initially described as CC17, was subsequently divided into three lineages, 17, 18, and 78, named after the major sequence type (ST) in each group \[[@CR9], [@CR10]\]. Analysis of the MLST data using so-called Bayesian analysis of population structure (BAPS) delimited two groups in the hospital meroclone, 2--1, and 3--3, corresponding to lineages 78 and 17/18 respectively \[[@CR10]\]. Acquisition of ampicillin and ciprofloxacin resistance, and the presence of the transferable pathogenicity island (ICE*Efm1*), harbouring the *esp*~*Efm*~ gene, are considered important adaptive features of hospital meroclone of *E. faecium* \[[@CR11]\]. Genomic analyses indicated the presence of seven additional regions in the genome of ST203 strain from lineage 78 in comparison to lineage 17/18 \[[@CR12]\]. The epidemiology of invasive enterococcal infections in Polish hospitals is monitored by a systematic passive surveillance performed by the National Reference Centre for Susceptibility Testing, located at the National Medicines Institute in Warsaw. However, considering the importance of enterococcal infections, we decided to undertake a study based on enhanced surveillance in selected hospitals during a pre-defined period of time. Objectives of this study were to collect enterococcal isolates from normally sterile body sites together with the relevant clinical data, and to evaluate species distribution and antibiotic susceptibility of these isolates. Additionally, we aimed at more profound phenotypic and molecular characterization of *E. faecium* isolates, as the clinical importance of this enterococcal species is recently increasing in several countries \[[@CR13]\], to search for a possible reason of this phenomenon. Materials and methods {#Sec2} ===================== Bacterial isolates and phenotypic testing {#FPar1} ----------------------------------------- Consecutive invasive isolates of *Enterococcus* spp. (a single strain per patient from normally sterile body fluids, such as blood, pleural fluid, cerebrospinal fluid, and peritoneal fluid) were collected in 30 collaborating hospitals, located in 26 cities in all regions of Poland, between May 2010 and June 2011. All patient data were collected anonymously in the questionnaire formulated for the purpose of the study. A nosocomial infection was defined as infection which was caused by a strain isolated after 48 hours from admission to the hospital or earlier when patient was transferred from another hospital. Enterococcal isolates were re-identified in the central laboratory by conventional methods, and using the mass spectrometer MALDI Biotyper (Brücker, Bremen, Germany) and Vitek MS (bioMérieux, Marcy l'Etoile, France) for selected isolates. For *Enterococcus hirae*, *Enterococcus durans*, and *Enterococcus avium* identification was conducted additionally with VITEK 2 Compact (bioMérieux). Antimicrobial susceptibility testing for ampicillin, penicillin, imipenem, vancomycin, teicoplanin, gentamicin, streptomycin, linezolid, tigecycline, tetracycline, chloramphenicol, rifampin, ciprofloxacin, quinupristin--dalfopristin and trimethoprim--sulfamethoxazole was performed using the broth microdilution method according to the Clinical and Laboratory Standard Institute guidelines (CLSI), and for daptomycin the Etest method (bioMérieux). The reference strain *E. faecalis* ATCC 29212 was used for quality control. Obtained results were interpreted using available 2015 breakpoints of The European Committee on Antimicrobial Susceptibility Testing (EUCAST) (<http://www.eucast.org/>) and the CLSI breakpoints for antimicrobials for which the EUCAST breakpoints were not available. Isolates were considered multidrug-resistant (MDR) when they showed resistance to three or more classes of antimicrobials tested \[[@CR14]\]. Biofilm formation was evaluated by the quantitative adherence assay in Trypticase Soy Broth with 0.25 % glucose \[[@CR15]\], and isolates were classified as biofilm non-producers, weak and strong producers, based on the results of staining with crystal violet \[[@CR16]\]. DNA isolation, gene detection, molecular typing and data analysis {#FPar2} ----------------------------------------------------------------- Total DNA was isolated using the Genomic DNA Prep Plus kit according to the manufacturer's instructions (A&A Biotechnology, Gdynia, Poland). Detection of *esp*~*Efm*~ and IS*16* in *E. faecium* was performed by PCR as previously described \[[@CR17], [@CR18]\]. The *intA*~ICE*Efm1*~ gene, encoding the integrase of ICE*Efm1* was detected by PCR with primers designed in this study: intA_up2 (5′-AATTGATTCGATAGTTTAGGTA-3\') and intA_dn2 (5′-AATCACTTGCTTACTCTTCAT -3′). *E. faecium* isolates positive for IS*16, esp*~*Efm*~ and *intA* from our laboratory collection \[[@CR19]\] served as positive controls. Vancomycin nonsusceptibility determinants *vanA*, *vanB*, and *vanC* were detected as previously described \[[@CR20], [@CR21]\], with *E. faecium* BM4147, *E. faecalis* V583, and *Enterococcus gallinarum* BM4147 used as respective positive controls. *E. faecium* isolates were analysed by multiple-locus variable-number tandem repeat (VNTR) analysis (MLVA) according to Top et al. \[[@CR22]\] and MLST \[[@CR5]\], using the MLST database (<http://pubmlst.org/efaecium/>) to determine allele numbers and STs (21st April 2015, date accessed). New alleles and allelic profiles were submitted to the above database. MLST data were analyzed with the comparative eBURST analysis against the whole *E. faecium* database (<http://eburst.mlst.net/>; 21st April 2015, date accessed). Genomic difference regions (named herein GDRs), differentiating lineages 78 and 17/18 \[[@CR12]\], were detected by PCR using primers specific for genes located in these GDRs, based on available genomic sequences (GenBank Accession number NC_021994; Table [1](#Tab1){ref-type="table"}). Differences in distributions were assessed using the chi-squared test with *p* value ≤ 0.05 considered significant. Antibiotic susceptibility data analysis with the 95 % confidence intervals for the calculation of resistance ratio was done using the WHONET ([http://www.whonet.org](http://www.whonet.org/)).Table 1Primers targeting the genomic difference regionsPrimerSequence 5′- \> 3′Gene in AUS0085 (ST203)Gene productPCR product sizeEfm_R1_upAATCGATGACGTGGAAGAAGGEf_aus00245cadmium_translocating P-type ATPase411 bpEfm_R1_dnGACTAAAGCGCCAGGACAACEfm_R2_upATGTTGCCCAAAAGACGAACCEf_aus 01495riboflavin biosynthesis protein RibD153 bpEfm_R2_dnGGAACGGCTAAAACAAGAAGCEfm_R3_upGCGTGATTTCGGTAATTGGTGEf_aus 02036putative phosphosugar isomerase/binding protein316 bpEfm_R3_dnATGGGAATAGACCAGGAGCAEfm_R5_upCGTGCGTTCCTTTTTCTACCEf_aus 02504bacteriocin-like protein EntT368 bpEfm_R5_dnGGTTTAGATAGCCCACCAAGEfm_R6_upCCCATGAATCCTGTTGGTTCEf_aus 02768PTS system, lactose/cellobiose-specific IIC component182 bpEfm_R6_dnGCAAAAGTAGCAGGAAGGACEfm_R7_upTCAGCAAATGATGGCGATACGEf_aus 02778glycosyl hydrolase family 38 protein374 bpEfm_R7_dnACCAATTCGGAGGAATGACATC Results {#Sec3} ======= Enterococcal species {#FPar3} -------------------- Altogether, 259 invasive enterococcal isolates were obtained during the collection period. For 247 (95.4 %) of them, the identification by MALDI Biotyper was consistent with the results obtained with conventional methods and Vitek 2 Compact. For the remaining 12 isolates, additional identification with Vitek MS was used, and its results were in the agreement with the results from MALDI Biotyper in three cases (one isolate of *E. faecalis*, *E. faecium* and *E. durans* each), while in nine cases identification with the Vitek MS confirmed the results of conventional methods (for three *E. faecalis*, five *E. faecium* and one *E. casseliflavus*). Thus, collected isolates comprised 140 strains of *E. faecalis* (54.1 %), 112 of *E. faecium* (43.2 %) and seven isolates (2.7 %) of other *Enterococcus* spp.: three *E. gallinarum*, two E*. durans*, and single representatives of *E. avium* and *E. casseliflavus.* Hospitals involved in the study and patients' data {#FPar4} -------------------------------------------------- Isolates were obtained from 30 collaborating hospitals (8.6 isolates per hospital). Hospitals involved in the study included secondary and tertiary hospitals, mainly of regional coverage (17 provincial hospitals), but also district hospitals (*n* = 5), specialist (*n* = 4) and university (*n* = 4) hospitals. The numbers of isolates collected from each type of ward are presented in Table [2](#Tab2){ref-type="table"}. For five strains, wards of hospitalization were not given. A significant proportion of enterococcal invasive infections were nosocomial infections, i.e., 65.7 % and 78.6 % of *E. faecalis* and *E. faecium* infections respectively. One hundred and forty-five patients (56.0 %) with enterococcal invasive infections were males and 109 (42.1 %) were females; the gender of five patients (1.9 %) was not reported. The age of patients' ranged from a newborn to 89 years, and the vast majority of isolates (196, i.e., 75.6 %) was obtained from patients aged above 50 years (Fig. [1](#Fig1){ref-type="fig"}). The most frequently reported types of infection were bloodstream infections (Table [2](#Tab2){ref-type="table"}), including bacteraemia, septicaemia, and endocarditis (82.9 % of infections caused by *E. faecalis* and 75.0 % infections caused by *E. faecium*) followed by abdominal infections (mainly peritonitis), meningitis, and chest and pelvic infections (mainly abscess). Most of the bacteraemia/septicaemia cases had a known focus (*E. faecalis* 59.3 %, *E. faecium* 53.6 %). The ratio of bloodstream infections to abdominal infections for *E. faecalis* was 6.4:1 and for *E. faecium* 3.8:1, and the observed differences in the ratio of bloodstream infections was statistically significant (*p* = 0.011).Table 2Ward type, type of infection and outcome reported for patients with invasive enterococcal infections*E. faecalis* (140)*E. faecium* (112)Other species (7)AllNumber of isolates140 (54.1 %)112 (43.2 %)7259Type of ward Surgery32 (22.9 %)31 (27.7 %)366 (25.5 %) Haematology/oncology20 (14.3 %)32 (28.6 %)254 (20.8 %) ICU29 (20.7 %)27 (24.1 %)157 (22.0 %) Internal medicine29 (20.7 %)11 (9.8 %)040 (15.4 %) Other neurology (*n* = 9), dialysis centres (*n* = 8), neonatal (*n* = 5), gynaecology (*n* = 4), urology (*n* = 5), infectious disease (*n* = 3), geriatric (*n* = 2), palliative medicine (*n* = 1)30 (21.4 %)11 (9.8 %)142 (16.2 %)Type of infection Bacteraemia, septicaemia, including:109 (77.8 %)82 (73.2 %)4195 (75.3 %) Bacteraemia76 (54.3 %)63 (56.2 %)3142 (54.8 %) Septicaemia33 (23.5 %)19 (16.9 %)153 (20.5 %) - source abdominal infection16 (11.4 %)11 (9.8 %)229 (11.2 %) - source urinary tract infection10 (7.1 %)1 (0.9 %)011 (4.2 %) - other known source26 (18.6 %)18 (16.1 %)044 (17.0 %) - unknown source57 (40.7 %)52 (46.4 %)0109 (42.1 %) Endocarditis7 (5.1 %)2 (1.8 %)09 (3.5 %) Abdominal infections18 (12.9 %)22 (19.6 %)343 (16.6 %) Pleural infections2 (1.4 %)2 (1.8 %)04 (1.5 %) Meningitis2 (1.4 %)3 (2.7 %)05 (1.9 %) Pelvic infections2 (1.4 %)1 (0.9 %)03 (1.2 %)Outcome^a^ All reported1301076243 Fatal cases20 (15.4 %)23 (21.5 %)1^b^44 (18.1 %) Cured33 (25.4 %)25 (23.4 %)260 (24.7 %) Under treatment77 (59.2 %)59 (55.1 %)3139 (57.2 %)^a^% of all cases with the known outcome; ^b^ *E. gallinarum*In the column for each species the % values were calculated separately taking the number of the isolates belonging the each species as 100 %Fig. 1The age distribution of patients and percentage of fatal cases in each age group The data concerning risk factors were available for 165 (63.7 %) of patients, and indicated special importance of previous hospitalization during the previous 6 months (*n* = 124; 75.2 % cases), surgery (*n* = 42; 25.4 %) and an ICU stay (*n* = 35; 21.2 %). Only one patient was reported as a nursing home resident. The reported co-morbidities were: malignancy (*n* = 21; 13.9 %), chronic renal disease (*n* = 7; 4.6 %), diabetes (*n* = 4; 2.6 %), and injury (*n* = 5; 3.3 %). The outcome of treatment of patients with enterococcal infections was reported for 243 cases (93.8 %). Due to the persistence of infection, 2 weeks after strain isolation more than half of the patients (53.7 %) were still receiving antimicrobial treatment, while only 23.2 % of patients were successfully cured. The observed overall 14-day mortality rate reached 18.1 % (44 patients; Table [2](#Tab2){ref-type="table"}). Fatal cases were reported in patients aged above 25 years, and mortality showed an increase with age (Fig. [1](#Fig1){ref-type="fig"}). The highest mortality ratio was reported for meningitis (one of three) and septicaemia (30.2 %, 16 of 53). A higher mortality in *E. faecium* infections (23 cases, 21.5 %) than these caused by *E. faecalis* (20 cases, 15.4 %) was observed, however, without statistical significance (*p* = 0.22). A single case of fatal septicaemia in an oncology patient infected with *E. gallinarum* was reported (Table [2](#Tab2){ref-type="table"}). In two cases, VREm infections proved fatal (28.6 % mortality, i.e., two out of seven cases with the reported outcome), while for vancomycin-susceptible strains this value was 21.0 % (21 of 100 with the reported outcome). Antimicrobial susceptibility of isolates and biofilm production by *E. faecium* {#FPar5} ------------------------------------------------------------------------------- All isolates were susceptible to linezolid and daptomycin (Table [3](#Tab3){ref-type="table"}), and all *E. faecalis* isolates were also susceptible to ampicillin, vancomycin and teicoplanin. Over 50 % of isolates of both species showed high-level resistance to aminoglycosides. Among *E. faecium* isolates, very high ratios of resistance to ampicillin, ciprofloxacin, and rifampin were observed, and vancomycin resistance was detected in eight isolates (VREfm); five of them showed VanA phenotype and the presence of *vanA*. The three remaining VREfm carried the *vanB* gene. Altogether, 71.4 % of isolates were classified as multidrug resistant (MDR) \[[@CR14]\]. This phenotype was specific for nearly all isolates of *E. faecium* (109 isolates, 97.3 %) and 73 isolates (52.1 %) of *E. faecalis*. Only four among 112 isolates of *E. faecium* (3.6 %) were identified as biofilm producers, including three strong producers and a single weak producer.Table 3Antimicrobial susceptibility profiles of enterococcal isolates from invasive infectionsSpeciesMIC (mg/L)Number of isolates (%) and 95 % confidence intervals of % R^a^Antimicrobial agent^b^RangeMIC~50~MIC~90~SI^c^R95 % CI*E. faecalis* (*n* = 140) Ampicillin0.5--4.02.04.0140 (100 %)000-3.3 Penicillin0.125--16.02.04.0139 (99.3 %)-1 (0.7 %)0-4.5 Vancomycin0.125--4.02.04.0140 (100 %)-00-3.3 Teicoplanin0.125--0.50.1250.25140 (100 %)-00-3.3 HLGR4.0-- \>10241024\>102462 (44.29 %)-78 (55.71 %)47.1-64.0 HLSR16.0-- \>20482048\>204864 (45.71 %)-76 (54.29 %)45.7-62.7 Tetracycline0.125-- \>25612825614 (10 %)2 (1.43 %)124 (88.57 %)81.9-93.1 Tigecycline0.015--0.250.0620.25140 (100 %)000-3.3 Chloramphenicol0.5--1288.012897 (69.29 %)1 (0.71 %)42 (30 %)22.7-38.4 Daptomycin0.125--4.01.02.0140 (100 %)-00-3.3 Rifampin0.25--16.02.08.045 (32.14 %)37 (26.43 %)58 (41.43 %)32.6-49.3 Ciprofloxacin0.125-- \>32.08.0\>3256 (40 %)13 (9.29 %)71 (50.71 %)41.5-58.5 Linezolid0.25--4.02.04.0140 (100 %)-00-3.3 Imipenem0.5-64166411 (7.9 %)30 (21.4 %)99 (70.7 %)62.3-77.9 Trimethoprim-sulphamethoxazole0.015-3243211 (7.9 %)47 (33.8 %)81 (58.3 %)49.6-66.5*E. faecium* (*n* = 112) Ampicillin1-- \>256641281 (0.89 %)11 (9.82 %)110 (89.29 %)81.7-94.1 Penicillin0.25-- \>2561282569 (8.04 %)-103 (91.96 %)84.9-96.1 Vancomycin0.5-- \>2562.04.0104 (92.86 %)-8 (7.14 %)3.3-14.0 Teicoplanin0.125--1280.251.0107 (95.54 %)-5 (4.46 %)1.7-10.7 HLGR4.0-- \>1024\>1024\>102415 (13.39 %)-97 (86.61 %)78.6-92.1 HLSR4.0-- \>20482048\>204816 (14.29 %)-96 (85.71 %)77.5-91.4 Tetracycline0.25--2561612849 (43.75 %)4 (3.57 %)59 (52.68 %)43.1-62.1 Tigecycline0.015--0.50.0620.25111 (99.11 %)1 (0.89 %)00-4.1 Chloramphenicol0.062--32.08.01689 (79.46 %)16 (14.29 %)7 (6.25 %)2.7-12.8 Daptomycin0.062--4.02.04.0112 (100 %)000.0-4.1 Rifampin0.062-- \>12832\>1285 (4.46 %)3 (2.68 %)104 (92.86 %)86-96.7 Ciprofloxacin2.0-- \>256256\>25601 (0.89 %)111 (99.11 %)94.4-100 Linezolid1.0--4.02.04.0112 (100 %)000.0-4.1 Quinupristin-dalfopristin0.125--162.04.054 (48.2 %)52 (46.4 %)6 (%54 %)2.2-11.8Other *Enterococcus* spp. (*n* = 7) Ampicillin0.0625--128.016128304- Penicillin0.5--64.08646-1- Vancomycin0.5--8.0284-3- Teicoplanin0.125--1.00.2517-0- HLGR4.0--10246410245-2- HLSR32.0--204825620484-3- Tetracycline0.125--646464205- Tigecycline0.031--0.0620.0310.062700- Chloramphenicol0.25--8.048700- Daptomycin0.25--2.012700- Rifampin0.062--64.00.564502- Ciprofloxacin0.125--64.0464304- Linezolid0.015--4.024700-^a^S, susceptible; I, intermediate; R, resistant; ^b^HLGR, high-level gentamicin resistance, HLSR, high-level streptomycin resistance; ^c^ -, intermediate category not defined for this compound Molecular typing of *E. faecium* isolates and the distribution meroclone- and lineage-specific markers {#FPar6} ------------------------------------------------------------------------------------------------------ MLVA revealed 12 MLVA types (MTs; Table [4](#Tab4){ref-type="table"}) among 112 invasive *E. faecium* isolates, with the most prevalent being MT159, characteristic for 52 isolates (43.3 %) from 20 hospitals. Other frequently encountered MTs included 1, 11, and 12. The subsequent MLST analysis, performed for a group of 46 representative isolates, revealed the presence of 14 STs (Table [4](#Tab4){ref-type="table"}). The comparative eBURST analysis included four STs (78, 192, 341, 412) in lineage 78 and nine STs (17, 18, 64, 80, 117, 202, 262, 877, 878) in lineage 17/18; the remaining ST879 represented a singleton. Isolates of lineage 17/18 were most often associated with MT1 and MT12, and isolates of lineage 78 typically had MT159, however, one ST117 isolate (lineage 17/18) had MT159 (verified by repeated typing). The acquisition of vancomycin-resistance determinants *vanA* and *vanB* occurred chiefly among isolates of lineage 17/18 (five out of seven cases). Most of the isolates able to produce biofilm (three out of four) also belonged to this lineage. IS*16* and *esp*~*Efm*~ were detected in all *E. faecium* isolates, and *intA*~ICE*Efm1*~ for 107 isolates (95.5 %). Thus, the *esp*~*Efm*~ gene (verified by sequencing) was present in five isolates negative for *intA*~ICE*Efm1*~. Distribution of genes located within six GDRs characteristic for ST203 from lineage 78 \[[@CR12]\] was assessed among isolates of *E. faecium* collected in this study and for comparative purposes among 52 sewage isolates, not associated with the hospital meroclone \[[@CR23]\]. Significant differences in the prevalence were found for GDR1, which was more frequently detected in sewage isolates, and GDR2 and GDR3, which occurred chiefly among hospital-associated isolates (Table [5](#Tab5){ref-type="table"}). Comparison between two hospital lineages of *E. faecium* revealed a significant over-representation of all six GDRs in lineage 78 in comparison to lineage 17/18. Sequencing of PCR products for a few randomly-selected representatives of both lineages and non-hospital *E. faecium* for all six GDRs revealed their 100 % identity with the counterparts in ST203 \[[@CR12]\].Table 4MLVA and MLST of invasive *E. faecium* isolatesMT^a^VNTR profile^b^Number of isolatesNumber of hospitalsNumber of VRENumber of fatal casesNumber of isolates analysed by MLSTSTs^a^Lineage15-7-3-3-2-3161033817; 18; 64; 80; 20217/1875-7-3-3-2-2110011717/18105-7-3-3-3-31100126217/18116-7-3-3-2-313801320217/18125-7-3-3-1-3158246[877]{.ul}; 11717/181123-7-4-2-1-311001[878]{.ul}17/181595-7-3-3-1-21100111717/18[520]{.ul}2-7-3-3-1-24411211717/18summary5221692317/181595-7-3-3-1-251202111278; 192; 341; 412782915-7-4-3-1-24201178783345-7-3-4-1-2310217878[518]{.ul}5-2-3-3-1-2110017878summary59212141578[519]{.ul}3-7-3-3-2-211001[879]{.ul}singleton^a^novel MTs and STs underlined; ^b^in the order: VNTR1, VNTR2, VNTR7, VNTR8, VNTR9, VNTR10Table 5Distribution of GDRs among lineages 17/18 and 78 and among hospital and sewage isolates of *E. faecium*lineage^a^/originGDR1 (%)GDR2 (%)GDR3 (%)GDR5 (%)GDR6 (%)GDR7 (%)Number of isolates with *n* GDR loci*n* = 0*n* = 1*n* = 2*n* = 3*n* = 4*n* = 5*n* = 617/18 (*n* = 27)14 (51.2)16 (59.2)5 (18.5)4 (14.8)6 (22.2)2 (7.4)41243301^b^78 (*n* = 18)16 (88.9)18 (100)15 (83.3)18 (100)11 (61.1)13 (72.2)0002358*P* ^c^0.020.0050.00010.000000.020.00003ST879 (*n* = 1)1011011Hospital (*n* = 46)31 (67.4)34 (73.9)21 (45.6)23 (50.0)17 (36.9)16 (34.8)41245759Sewage (*n* = 52)49 (94.2)0 (0)5 (9.6)21 (40.4)11 (21.1)11 (21.1)2201316100*P* ^d^0.00100.00010.40.10.2^a^Based on the MLST data; ^b^verified by repeated typing and GDR sequencing; ^c^differences in GDR distributions between lineages 17/18 and 78 isolates; ^d^differences in GDR distributions between hospital and sewage isolates Discussion {#Sec4} ========== The growing importance of enterococcal infections in hospitals prompted us to perform an enhanced surveillance of enterococci causing invasive diseases in selected Polish hospitals in the pre-defined period of time. The clinical presentations of infections were typical for enterococci, including mainly bacteraemia and abdominal infections. Similarly to other reports, our results point out the abdominal infections as the most frequently observed sources of bacteraemia/septicaemia; however, the small proportion of *E. faecalis* bacteraemia originating from urinary tract (7.1 %) was surprising \[[@CR24], [@CR25]\]. This could be due to the relatively high ratio of bacteraemia with unknown source observed in our study for both *E. faecalis* and *E. faecium* (40.7 % and 46.4 % respectively) in comparison to other reports (*E. faecalis* 30 % and 21.6 %; *E. faecium* 39.9 % and 20.7 %) \[[@CR24], [@CR25]\]. Collected clinical data confirmed established risk factors for acquisition of invasive enterococcal infection, such as advanced age, previous hospitalization, and ICU stay \[[@CR13], [@CR24]\]. In our study, the majority of patients were male and aged above 50 years, and most of the fatal cases were observed in this age group. Other studies have reported similar proportions of patients' gender and age distribution \[[@CR24]\]. The 14-day mortality rate of 18.1 % reported in our study corresponded to the 30-day mortality rates of 18.9 % to 25 % among patients with enterococcal bacteraemia in other countries \[[@CR25]\]; however, it is important to note that at the 2-week reporting interval the majority of patients in our study were still under treatment. We observed a higher mortality in infections caused by *E. faecium* than *E. faecalis* (20.1 % vs 15.4 %), which is in agreement with a report from Denmark (34.6 % and 21.4 % respectively) \[[@CR24]\] and Spain (30 % and 26 % respectively, among cancer patients) \[[@CR26]\]. While at the rise of enterococcal infections in hospitals in the 1970s *E. faecalis* represented the most predominant species, contributing to approximately 90 % of infections, more recently the relative proportion of these two species has been changing in the favour of *E. faecium* and is now almost reaching or even exceeding the parity \[[@CR26], [@CR27]\], due to the increasing incidence of infections caused by *E. faecium* \[[@CR24]\]. This worldwide trend of increasing importance of *E. faecium* in HAIs was also observed in the present study, where 54 % and 43 % of infections were caused by *E. faecalis* and *E. faecium* respectively. For comparison, the ratio of *E. faecium* accounted for around 30 % of isolates from blood in our country during 2001--2004, and increased to around 40 % in 2009--2013 (<http://www.ecdc.europa.eu/en/activities/surveillance/EARS-Net>). This shift in the proportion of *E. faecium* to *E. faecalis* results in the increased overall morbidity of enterococcal infections, due to a higher fatality ratio of bacteraemia caused by this species \[[@CR26]\], which may be at least partially associated with frequent resistance of *E. faecium* to important anti-enterococcal drugs, such as ampicillin, aminoglycosides, and glycopeptides \[[@CR24]--[@CR26]\]. Ampicillin resistance is now very common among hospital *E. faecium,* and it proceeded the appearance and constant rise of vancomycin resistance in the hospital meroclone of this species \[[@CR11], [@CR28]\]. In our study, acquired resistance to vancomycin in *E. faecium* was still relatively rare (7 %). VREfm have been observed in Poland since the end of the 1990s with an increasing incidence \[[@CR19], [@CR29]\]. The frequency of VRE differs in various regions of the world, with a high prevalence reported in the US (up to 80 % of *E. faecium*) \[[@CR27]\] and some European countries, such as Greece, the UK, and Portugal \[[@CR28]\], while a low ratio (below 1 %) is characteristic for Sweden, The Netherlands, France, and Spain (<http://www.ecdc.europa.eu/en/activities/surveillance/EARS-Net>). We observed a very high prevalence of high-level resistance to aminoglycosides in *E. faecium*, which eliminates the possibility of combined therapy including aminoglycoside with cell-wall-active agents (penicillins, glycopeptides) for synergistic bactericidal effect. Although *E. faecalis* remains generally susceptible to penicillins, high-level resistance to aminoglycosides exceeded 50 % in our study, with the same problem for the combined therapy. Such a phenotype has also been reported for several other European countries (<http://www.ecdc.europa.eu/en/activities/surveillance/EARS-Net>), and our previous analysis of nosocomial isolates of *E. faecalis* from six European countries showed a significant role of two hospital clones in the spread of high-level aminoglycoside resistance in this species \[[@CR8]\]. All isolates in the current study showed susceptibility to linezolid, the drug of last resort in VRE infections, although resistance to this compound is being observed in our country for both *E. faecalis* and *E. faecium* \[[@CR30]\]. Selection of particular enterococcal clones, adapted to hospital settings, appears to play a crucial role in the increasing importance of these pathogens in HAIs, especially in the case of *E. faecium*. The rise in the prevalence of this species which was found in our study prompted us to analyse collected *E. faecium* isolates in more detail. The results of MLVA, MLST and detection of markers, specific for nosocomial *E. faecium* such as IS*16* \[[@CR18]\], *esp*~Efm~ and *intA*~ICE*Efm1*~ associated with a transferable pathogenicity island IC*Efm1* \[[@CR31], [@CR32]\], indicated that almost all isolates represented hospital epidemic meroclone. Circulation of strains belonging to this clone most likely predates the appearance of the first VRE in Polish hospitals in the late 1990s \[[@CR19], [@CR29]\]. Esp~Efm,~ a species-specific variant of the enterococcal surface protein, is involved in biofilm formation \[[@CR33]\] and increases enterococcal virulence in endocarditis \[[@CR34]\]. Although the *esp*~Efm~ gene was present ubiquitously in the studied group, only a minority of isolates were able to form biofilm under experimental conditions. A recent study \[[@CR35]\] questioned the utility of a polystyrene dish assay for biofilm formation by *E. faecalis*, and showed much more reliable performance of porcine heart valve explants. A similar system may also be required for *E. faecium* biofilm studies. Hospital *E. faecium* in our study belonged to both major BAPS groups, corresponding to lineages 17/18 and 78 \[[@CR10]\]. The latter, more recently evolving lineage is currently being isolated in hospitals all over the world \[[@CR26], [@CR36], [@CR37]\], and in Poland it was first observed in 2005 among VREfm \[[@CR19]\]. ST78 and its variants are typically associated with MT159 \[[@CR38], [@CR39]\], the most prevalent MT in our study. Spread of lineage 78 strains is considered to be a significant factor of the increasing VanB-type vancomycin resistance in Australia \[[@CR37]\], and current detailed genomic analysis of strains representing both lineages has revealed the presence of seven GDRs, additionally present in a representative of lineage 78 \[[@CR12]\]. In this study, we analysed the distribution of genes characteristic for six GDRs, with the exception of one region (GDR4) which contains a presumable integrase gene. Genes of two GDRs, namely the gene encoding a riboflavin biosynthesis protein RibD from GDR2 and the gene encoding a putative phosphosugar isomerase from GDR3, were significantly more prevalent among isolates from hospital settings in comparison to sewage isolates, while the latter were more often carrying the gene of cadmium-translocating P-type ATPase from GDR1; it is likely that the product of this gene provides a selective advantage in various environments. Among hospital strains, all six analysed GDRs were over-represented among successful lineage 78; however, genes of GDR5, 6, and 7 were relatively frequent also among the sewage isolates, suggesting that *E. faecium* circulating in the community might have been a source of such genes for nosocomial strains. Further analyses are, however, required to verify such a possibility. In summary, our study provides the data on species distribution, prevalence of resistance, and clonality of enterococcal invasive isolates, and characterizes patients affected by such infections. The study on Polish isolates shows the similarity of invasive, hospital-adapted *E. faecium* to strains circulating in other countries, and underlines the importance of permanent surveillance of the dynamic epidemiological situation concerning these dangerous opportunistic pathogens. These data will be the reference for future studies performed in Poland. I. Gawryszewska and D. Żabicka contributed equally to this work. We thank the representatives of all the centres participating in the study: Krzysztof Golec, Anna Onyszk, Katarzyna Muszyńska, Elżbieta Maćkowiak, Jolanta Zielińska, Małgorzata Pilarska, Małgorzata Szarata, Krzysztof Burdynowski, Halina Kondracka-Grabarczyk, Grzegorz Ziółkowski, Aleksandra Renik, Beata Klonowska, Dorota Kociszewska, Anna Jędrzejewska, Joanna Humanowska, Małgorzata Kozak, Maria Szymankiewicz, Jolanta Prawda-Zołotar, Elżbieta Iskra, Anna Mól, Bonita Durnaś, Mirosława Piotrowska, Zofia Żak-Puławska, Wojciech Żulikowski, Anna Budzyńska, Julianna Kurlenda, Anita Mądroszyk, Edyta Podsiadły, and Jolanta Szumilewicz for providing the isolates, and Janetta Top for assigning new alleles and STs, and for her aid in assigning MTs. This publication made use of the *Enterococcus faecium* MLST websites <http://efaecium.mlst.net/> hosted at Imperial College and developed and funded by the Wellcome Trust, and <http://pubmlst.org/efaecium/> sited at the University of Oxford and funded by the Wellcome Trust. Parts of this publication have previously been presented at the 22nd European Congress of Clinical Microbiology and Infectious Diseases (ECCMID), 31 March--3 April 2012, London, UK (oral presentation). Funding {#FPar7} ======= This study was partially financed by health programme "Narodowy Program Ochrony Antybiotyków na lata 2011-2015" from The Polish Ministry of Health and by the grant SPUB MIKROBANK from the Polish Ministry of Science and Higher Education. Conflict of interest {#FPar8} ==================== The authors declare that they have no conflict of interest. Ethical approval {#FPar9} ================ The authors declare that ethical approval was not required. Informed consent {#FPar10} ================ The authors declare that informed consent was not required.
null
minipile
NaturalLanguage
mit
null
The winter months have been a good one in the pool for numerous Ionia youth and teenage swimmers. Along with a successful season for the high school boys swimming and diving team, the Ionia members of the Rapids Area Y Swimmers (RAYS) team have also had a successful season, which they capped off with many top finishes in the 8 and under and 9 and over state championship meets. "It's a big commitment to swim on a competitive swim team for both the swimmers and their families, but with hard work, dedication and efforts, they are rewarded," RAYS coach Paula Wood said. "Not only when they hit the wall and look up at the clock after having their best race of the season, but the experience helps build character and promotes a healthy and active lifestyle." In the YMCA 9 and Over State Championships on Feb. 23 and 24. Robby Denney placed in five 10 and under events. He finished 16th in the 50 Breaststroke (46.5), ninth in the 200 Free (2:40.78), 23rd in the 50 Butterfly (41.78) individually. Denney joined Emmet Scmehling, Brice Kerr and C.J. Hier on two relay teams as well. The quartet took third in the 300 Free Relay (2:11.37) and reset the RAYS team record in the 400 Free with a time of 4:49.94. Shelly Reglin competed in three 10 and under events, finishing 11th in the 100 Individual Medley (1:25.17), 18th in the 50 Back (40.02) and 13th in the 50 Breaststroke (46.07). Ionia boys swim team member Peter Pelon took seventh in the 200 Free (1:55.51), fourth in the 500 Free (5:24.19) and ninth in the 100 Breaststroke (1:16.65); while Lindsey Wood took 25th in the 13-14 100 Free (1:02.55), 17th in the 500 Free (5:56) and 21st in the 200 Free (2:15.71). Ionia junior Patrick Wood competed in four 15 and over events. He took second in the 200 Free (1:52.42), sixth in the 100 Back (1:00.55) and third in the 100 Butterfly (56.44). The team of Wood, Pelon, Nate Kozycki and Evan Blank took first in the 400 Free Relay (3:25.94) as well. On Feb. 17, the younger RAYS swimmers competed against the top swimmers under 8 years of age in their state championship meet. Valarie Hoppes led the way for the RAYS, competing in five events. Individually, she finished second in the 8 and under 100 IM (1:39.4), third in the 7 and under 25 Free (16.4) and third in the 7 and under 50 Free (37.96). Hoppes joined Kaitlyn Lenters, Jane Puglessi and Maggie Hier on the 7 and under 100 Medley Relay team, which finished eighth (1:27.39), and Puglessi, Sydney VandLente and Abby Schulz in the 7 and under 11 Free Relay, earning first with a time of 1:20.47. Hannah Kahle finished fifth in the 6 and under 25 Free (22.19) and seventh in the 6 and under 25 Back (28.12). She also took 19th with teammates Lindsey Michell, Olivia Williams and Rhian Machiela in the 8 and under 100 Medley Relay (1:27.39); and third in the 100 Free Relay with Michell, Adie Sandberg and Sam Connor. Brynn Lepien competed in three 8 and under events, taking 15th in the 25 Free (18.74) and 17th in the 50 Free (43.46) individually. Page 2 of 2 - She also swam with Hallea Michell, Ashland Sandberg and Heir in the 100 Free Relay and took ninth (1:19.25).
null
minipile
NaturalLanguage
mit
null
More on LinuxToday Ganymede 0.99 - network directory management system Ganymede 0.99 is now available for download at ftp://ftp.arlut.utexas.edu/pub/ganymede/ or http://www.arlut.utexas.edu/gash2/ Ganymede is a GPL'ed network directory management system written in Java, providing support for team management of NIS, DNS, etc. --- Yipes, another month has gone by. This release includes a bunch of work to improve javadocs for the code, a number of minor (but nice) new features and improvements in the client, and a bunch of distribution fixes to take care of problems reported with Ganymede 0.98. Also of interest is the fact that the Ganymede web page now features an archive of both the ganymede-announce and ganymede mailing lists. There's currently a discussion of the proper way of supporting DNS in Ganymede there. I'm thinking the next release will probably be 0.99.1, as I'm not ready to call it 1.0 yet. The next release will go out after we've actually got the GASH integration stuff done here at the lab so that we can actually put Ganymede into production here. Unless someone out there writes in with a significant problem, of course. --------------------- Changes from 0.98 to 0.99 ------------------- RELEASE DATE: April 16, 1999 1. [SCHEMA] gasharl schema mods Various kinds of objects listed in an emailList object are now shown with extra detail so that admins can see what sort of thing they are dealing with. Modified interfaceCustom so that the server will now check ethernet addresses for valid form. 2. [CLIENT] Newly created object windows can now be undone. Put the close box back on object creation windows.. now if you close the window, the client will prompt you as to whether you want to delete the object. If you do, the server will drop the newly created object from the server when the transaction commits. Unfortunately, the code to handle intercepting the internal frame close request in framePanel.java and windowPanel.java had to be hacked with the VetoablePropertyChangeListener since Swing 1.1 and 1.1.1-beta1 have JInternalFrame.setDefaultCloseOperation() totally broken. If you click the close box on an edited object, you'll also get a dialog explaining what that does and does not do. 3. [SERVER] Server always allows deleting a newly created object This provides an exception to change 0.98.5 to allow the client to always undo an object creation, even if normally they could only inactivate the object, not delete it. The server had always had support for DROPPED objects as well as DELETED objects, the change above just really takes advantage of this more. 4. [SERVER/CLIENT] Added case-insensitive regexp matching The server and client now support performing a case-insensitive regular expression comparison when querying on string and object reference (invid) fields. 5. [CLIENT] Scalar invid fields are now always sorted Scalar invid fields would become unsorted when the server instructed the client to refresh them. The client will now properly sort invid lists from the server on field refresh as well as on field construction. 6. [CLIENT] Client code simplified, documented, improved Embedded object vector panels were seriously broken, and would break when you tried to delete entries. The vectorPanel refresh logic was totally reworked and should behave properly in all situations now. Loading embedded object vectors will be more efficient now. The client's tracking of container panels active loading information from the server has been simplified and better documented.. the client does less work now to track container panels, and hitting cancel or commit while loading a panel should still do the right thing. Lots and lots of javadocs added and corrected in the client code. Some of the debug output when running the client in debug mode has been cleaned up. 7. [CLIENT] Fixed error on loading 'inactivate.gif' on HPUX JVM The client included code to try to create an inactivate icon from a file called inactivate.gif. That file did not exist in the jar file distributed with Ganymede 0.98, and the JVM on HPUX 10.20 threw an exception on this, even though Sun's JVM's do not. Reported by Lewis Muhlenkamp ([email protected]) 8. [DISTRIBUTION] Build scripts, make files no longer require '.' in PATH The Ganymede install and build scripts required '.' in the user's PATH during install. This should no longer be the case. Reported by Lewis Muhlenkamp ([email protected]) 9. [DISTRIBUTION] configure prompts for Swing jar location Previously, src/make client would fail because the client's build script didn't know how to find the Swing swingall.jar file if it wasn't in the user's CLASSPATH. Now the initial configure bootstrap script will ask for the location of the Swing jar files so that the build scripts in the source tree can be properly configured. Reported by Lewis Muhlenkamp ([email protected]) 10. [CLIENT] Fixed focus handling for IP address component The JIPField GUI component class had problems with reentrancy that could cause problems when dialogs were thrown up in response to focus loss. 11. [CLIENT] Added toolbar to the Query Results window The File menu on the Query Results window was really unobtrusive, and didn't really emphasize to users that they could mail out the query table. Brian put in a spiffy mini-toolbar to show people what's up. 12. [CLIENT] JComboBoxes in client are more keyboard friendly Previously, JComboBoxes in the client used the default KeySelectionManager, which only allowed you to search for items by their first letter. You can now type in a full name of an object and as long as you don't pause for more than a half-second between keystrokes, the JComboBox will find the object by its full name. Actually, this doesn't work as well as it sounds, because Swing's KeySelectionManager stuff doesn't let you use the keystrokes to choose an entry in a JComboBox before actually selecting it, and selecting items in the Ganymede client will tend to be a slow operation due to the round-trip to the server. 13. [SERVER DISTRIBUTION] Added decodeDB command Added a new executable in the server's bin directory, decodeDB, which takes the name of a ganymede.db or ganymede.schema file and generates a print-out of the file's object and field type information. This was added mainly to make it easier for me to do quick checks on the ganymede.db and ganymede.schema files packaged with Ganymede releases. 14. [DISTRIBUTION] Fixed linux, bsd, nisonly schema kits In Ganymede 0.98, the linux, bsd, and nisonly schema kits had an incompatibility that rendered them inoperable. This had to do with a field in the admin persona object type that was not defined in these kits, but which the server had been modified to depend on. I've modified the kits so that the field is defined, and modified the server so that the lack of the field won't prevent an existing ganymede.db file from being usable. Reported by Nikola Nedeljkovic, [email protected] 15. [SERVER] Upgraded to gnu.regexp 1.0.8 Updated the gnu.regexp classes used in the server to version 1.0.8. --- -------------------------------------------------------------------------------- Jonathan Abbey [email protected] Applied Research Laboratories The University of Texas at Austin -------------------------------------------------------------------------------- Please enable Javascript in your browser, before you post the comment! Now Javascript is disabled.
null
minipile
NaturalLanguage
mit
null
The permuted trie index {#sec:permuted} ======================= In this section we introduce our trie-based index that solves the *triple indexing problem* mentioned in Section \[sec:intro\]: compressing a large set of integer triples by granting the efficient resolution of sequences of triple selection patterns. In particular, in Section \[subsec:core\] we introduce the base indexing data structure and in Section \[subsec:remapping\] and \[subsec:twotries\] we discuss two variants aimed at reducing redundancies in the representation. In order to better support our design choices and explain the intuition behind the described ideas, we show in the following the results of some motivating experiments conducted on the dataset, dubbed as “the nucleus for a Web of Data” [@auer2007dbpedia], that is the English version of DBpedia (version 3.9) containing more than 351 millions of triples (see also Table \[tab:datasets\]). In Section \[sec:experiments\] we will report on the comprehensive set of experiments conducted to assess the performance in space and time of our implementations versus state-of-the-art competitors on publicly available RDF datasets of varying size and characteristics. Data structure {#subsec:core} -------------- As a high-level overview, our index maintains three different permutations of the triples, with each permutation sorted to allow efficient searches and effective compression as we are going to detail next. The permutations chosen are , and in order to (symmetrically) support all the six different triple selection patterns with one or two wildcard symbols: and over ; and over ; and over . The two additional patterns with, respectively, all symbols specified or none, can be resolved over any permutation, e.g., over the canonical in order to avoid permuting back each returned triple. ![A trie data structure representing a set of triples. Shaded boxes indicate pointers whereas the others refer to the nodes of the trie. The dashed arrows are just for representational purposes and point to the position written in the corresponding originating box. []{data-label="fig:trie"}]({{imgs/trie}}) Each permutation of the triples is represented as a 3-level trie data structure, with nodes at the same level concatenated together to form an integer sequence. We keep track of where groups of siblings begin and end in the concatenated sequence of nodes by storing such pointers as absolute positions in the sequence of nodes. Therefore, the pointers are integer sequences as well. Moreover, since the triples are represented by the trie data structure in sorted order, the $n$ node IDs in the first level of each trie are always complete sequences of integers ranging from 0 to $n-1$ and, thus, can be omitted. We can model each trie data structure with an array *levels*\[0..2\] of three objects, each one having two integer sequences of and . An exception is represented by \[0\] for which, as above discussed, nodes are missing, and by \[2\] for which pointers are missing. Refer to Figure \[fig:trie\] for a pictorial example in which the ordered set of triples $\{$(0,0,2), (0,0,3), (0,1,0), (1,0,4), (1,2,0), (1,2,1), (2,0,2), (2,1,0), (3,2,1), (3,2,2), (4,2,4)$\}$ is indexed. The advantage of this layout is *two-fold*: first, we can effectively compress the integer sequences that constitute the levels of the tries to achieve small storage requirements; second, the triple selection patterns are made *cache-friendly* and, hence, efficient by requiring to simply *scan* ranges of consecutive nodes in the trie levels. We now explore the impact of these two advantages. The pseudo code reported in Figure \[alg:select\] illustrates how triple patterns with one or two wildcard symbols are supported by our index. Given a sequence , function .($i$, $j$, $x$) finds the ID $x$ in the range $[i,j)$ and returns its absolute position in the sequence. If $x$ is not found in the range, a default position (e.g., $-1$) will be returned to signal the event and the number of matches will be 0 (for simplicity, in the pseudo code, we assume the to be valid, i.e., indexed by the data structure). Function .($i$) instead instantiates an iterator starting at $[i]$. We assume that accessing the pointers at position $i$ fetches a pair of adjacent values (, ), such that = $[i]$ and = $[i+1]$ with the value ( $-$ ) giving the number of children of the node at position $i$ in the previous level of the trie (line 3 and 9). Furthermore, the algorithm creates two iterators to scan ranges of the second and third levels of the trie, respectively. These iterators are then used to define a final iterator that combines the iterating capabilities of both objects (line 12). Apart from the cost of the operation called for patterns with one wildcard symbol and the time needed to access the pointer sequences, the time spent per matched triple is $O(1)$, that is optimal. In the following, we discuss how the operation and the random can be efficiently supported directly over the compressed node sequences. A key characteristic of the trie data structure is to conceptually replace runs of the same ID $x$ in a sequence with the pair ($x$, ), where the information indicates the run length and where the run is located in the sequence. This already produces significant space savings when triples share many repeated IDs, as it holds for large RDF datasets. Again, refer to Figure \[fig:trie\] for a basic graphical evidence of this fact. We note that the sequences of and on each trie level can be effectively compressed using a wealth of available techniques, developed for compactly represent (long) integer sequences with excellent search capabilities, e.g., the ones appearing in inverted indexes [@zobel2006inverted; @pibiri2018inverted]. A review and discussion of such techniques is out of scope for the contents of this paper: we point the interested reader to the more general survey by Zobel and Moffat [@zobel2006inverted] and the one by Pibiri and Venturini [@pibiri2018inverted] discussing the most recent developments. Therefore, the problem we face now is the one of compactly representing the levels of each trie by achieving, at the same time, an efficient execution of algorithm that, besides the function, demands fast random to the pointer sequences (see Figure \[alg:select\]). Below we discuss some different options to achieve this goal, chosen as representative of the many available. A first (obvious) option would be to minimize the number of bits needed to encode a single integer, taking $\lceil \log_2 \var{max} \rceil$ bits per value with being the maximum one in the sequence. The advantage of this technique, that we indicate as in the following, is simplicity and efficiency, given that a few bit-wise operations are needed to implement the random operation and, consequently, the (, , ) function that can be supported by binary searching the interval $[i,j)$. Instead, an elegant integer encoder fulfilling the requirements is *Elias-Fano* () [@elias; @fano] that combines a fast, namely constant-time, random algorithm with compressed space close to the information theoretic minimum. Again, see [@pibiri2018inverted] for a detailed description of such encoding as well as of its *partitioned* variant  [@ottaviano2014partitioned]. We test this encoder as (one of the) representative of the best space/time trade-off in the literature. Not surprisingly, the adoption of this encoder to model the levels of a trie has been recently advocated in [@pibiri2017efficient] and shown to reduce the space of massive $n$-gram datasets by a factor of 2 over the most compact trie representation and to provide state-of-the-art time performance. Other approaches focus on representing a sequence of $d$-gaps, i.e., differences between successive integers [@zobel2006inverted], with the requirement of computing a prefix-sum when decoding the d-gapped stream. A common way of speeding up the operations on the compressed sequence, is to divide the sequence into fixed-size blocks, e.g., 128 integers. As a meaningful representative of such technique, we use  [@thiel1972program] that achieves the highest decompression speed in the literature, especially when combined with the SIMD-ized decoding algorithm devised by Plaisance et al. [@maskedvb]. Table \[tab:compressors\] reports the performance of the mentioned techniques when applied to represent the node ID sequences of the tries of . In order to operate in a meaningful benchmarking setting for the algorithm, instead of accessing random positions in the sequences or resolving a in random intervals, we use a set of 5000 actual triples randomly extracted from the indexed dataset. Given a triple $(s,p,o)$ belonging to the trie , we report in the table the time required to the second level at the position of $p$ (pre-calculated); similarly, we measure the time needed for finding the position of $p$ among the children of $s$ (). The time reported for indicates the time spent per node, when decoding the level sequentially. The same hold for the third level of , as well as for the other tries  and . The details of the experimental setting are reported at the beginning of Section \[sec:experiments\]. By looking at the results reported in Table \[tab:compressors\] we can observe the following. - All the tested techniques require about the same space for representing the sequences of subjects and objects, with being the most space-efficient. - There is only a little difference between the space of and when representing the objects of (third level). The reason for this behavior is the *monotonicity* of the sequences required by the Elias-Fano encoder. In fact, while the sequences of pointers are monotone by construction and, thus, are immediately encodable, the same does not hold for node ID sequences where only sub-sequences of sibling nodes are ordered. Node ID sequences are thus formed by *sorted sub-sequences* with the last element of a sub-sequence being not necessarily smaller than the first one of the next one. In order to encode such sequences with a compressor like Elias-Fano we need to apply a simple transformation adding to the value of each node ID the value of the prefix-sum of the previously coded sub-sequence. This transformation makes Elias-Fano codes to be expensive whenever the prefix-sum is updated too frequently as it happens in the presence of many small ranges, because the universe of representation grows (very) quickly, thus enlarging the space of representation. As we will show later, most levels of the tries are indeed populated by such tiny ranges, meaning that each node has only few children on average. - is roughly $2\times$ smaller than the other options on the sequences of predicates. - The representation is, in general, the fastest for all operations, especially when performing random that requires $1.4 \div 2.6$ nanoseconds. However, it is the largest too. - The variant imposes a penalty of roughly $2\times$ over its un-partitioned counterpart when performing random , but results to be faster on average for the operation because it operates inside a partition that is much smaller than the whole sequence. As expected, codes spend more time for because of the (expensive) decompression of blocks that happens to be competitive only when decoding the sequences of predicates. For the reasons discussed above, we adopt the following design choices. We use to represent all the sequences of node IDs, except for the last of the trie where we adopt the representation. The pointer sequences are represented using plain (not partitioned) given its superior random efficiency. From now on, we refer to this solution as the index. Lastly in this subsection, we discuss the space breakdowns reported in parentheses in Table \[tab:compressors\]. These values indicate the percentage of space out of the whole index required to encode with a given compressor the specific sequence of IDs (the space for pointers is excluded from the count). As a general consideration, we observe that each permutation takes roughly 1/3 of the space of the whole index, with the trie being a little larger than the other two. For example, by considering the values for the encoder, we have that the levels of require 2.51% + 32.95% = 35.46% of the whole index, whereas the ones of 27.06%. Summing up all the values for , we get a total percentage of 91.05%, thus the space for the pointer sequences takes less than 9% of the whole index. The levels of the index that contribute the most to the overall index space are: the third levels of and ; the second level of . Specifically, we observe that such levels take practically the *whole* space of the single tries which they belong to because the other two levels take just a small fraction of the space (e.g., between 5% and 7.5% for ). The first levels take almost no space because they comprise only the pointers. The second levels of and take little space for different reasons: for the former, because the number of bits needed to represent a predicate is small compared to the number of bits necessary to represent subjects and objects (see Table \[tab:datasets\]); for the latter, because the high associativity of predicates partitions the objects’ space into a few but very long sorted sequences that are highly compressible. For example, only 1.34 are needed for the objects to be represented in the second level of the trie . The former reason also causes the third level of to require a small space. These considerations suggest that the efforts in trying to reduce the space of our RDF index should be mainly targeted to reduce the space for encoding level three of and and level two of . This will be the objective of the next subsection. Cross compression {#subsec:remapping} ----------------- The index layout that we have introduced represents the triples three times in different (cyclic) permutations in order to optimally solve all triple selection patterns. However, the current description does not take advantage of the fact that in this way the same set of triples is represented multiple times and that, consequently, the index has an abundance of redundant information. In this subsection we develop a novel compression framework that does not compress each trie independently but employs levels of the tries to compress levels of other tries, thus holistically *cross-compressing* the different permutations. ![Graphical representation of our cross-compression technique, in which an arrow $(\textsf{X})_i \rightarrow (\textsf{Y})_j$ indicates that level of trie $i$ is used to cross-compress the level of trie $j = (i + 2)$ mod $3$, for $i = 0, 1, 2$.[]{data-label="fig:remapping"}]({{imgs/remapping}}) The compression framework is graphically illustrated in Figure \[fig:remapping\]. In the picture, we depict the three different permutations and highlight that the levels enclosed in the squared boxes are used to cross-compress the (lower) levels enclosed by the shaded boxes as pointed to by the arrows. Cross-compression works by noting this crucial property: *the nodes belonging to a sub-tree rooted in the second level of trie $j$ are a subset of the nodes belonging to a sub-tree rooted in the first level of trie $i$, with* $j = (i + 2)$ mod $3$*, for $i = 0, 1, 2$.* The correctness of this property follows automatically by taking into account that the triples indexed by each permutation are the same. Therefore, the children of $x$ in the second level of trie $j$ can be re-written as the *positions* they take in the (larger, enclosing) set of children of $x$ in the first level of trie $i$. Re-writing the node IDs as positions relative to the set of children of a sub-tree yields a clear space optimization because the number of children of a given node is much smaller (on average) than the number of distinct subjects or objects (see also Table \[tab:datasets\] for the precise statistics). We claim that the average number of children for the nodes in the first levels of the tries is the key statistic affecting the effectiveness of the described cross-compression technique because smaller numbers require a smaller number of bits to be represented. We report this statistic in Table \[tab:range\_stats\] for the dataset. The data reported in the table is self-explanatory: except for the first level of , the average number of children is *very* low, being actually less than 3 for , across the different permutations. As already mentioned, the high associativity of the predicates causes each predicate to have many children, i.e., several orders of magnitude more than the children of subjects and objects. We also show the maximum number of children, i.e., a maximum of $m$ indicates that there is a least one node that has $m$ children. While this value can be very distant from the average, for some levels like the second of and is actually similar, meaning that the selection patterns and have a robust worst-case guarantee. Figure \[alg:map-unmap\] shows a compact pseudo code illustrating how a ID can be rewritten conditionally to its ID in the described cross-compression framework. Conversely, the function shows what actions are needed to recover the original ID before returning the result to the user. In particular, this latter function needs to be applied to the third component of *every* triple matched by a selection pattern, hence partially eroding the retrieval efficiency. Note that fast random access is needed by the function, thus it could be convenient to model $[1]$. with a representation (see also Table \[tab:compressors\] for benchmark numbers). We have seen that the nodes in the third level of the trie can be cross-compressed using the sub-trees rooted in the first level of the trie , whose average number of children is actually less than 3 on real-world datasets. Therefore, what we should expect is to have the third level of mostly populated with values in $\{0,1,2\}$ that requires just two bits to be written instead of more than 20 bits to represent each subject. Therefore, we argue that a significant space saving can be achieved by applying this technique, introducing a slowdown for two (out of eight) selection patterns only, i.e., and that are solved on the trie . As already motivated, the second level of is represented with . We also argue that cross-compressing the other two permutations, i.e., and , yields only modest advantages. Again, refer to Table \[tab:range\_stats\]. To cross-compress the third level of we use the children branching out from the predicates to the objects. But, as already noted, a predicate has many children, thus dwarfing the corresponding reduction in the average number of bits needed to represent a mapped ID. For the permutation , instead, we have to shrink the node ID of the predicates. But these are already encoded compactly, e.g., in less than 4.8 on average for (see Table \[tab:compressors\]). Thus, given that we can not expect great space savings in these two cases, we consider the cross-compressed index to be the one with cross-compression on the triples and that we indicate with in the following. Eliminating a permutation {#subsec:twotries} ------------------------- The low number of predicates exhibited by RDF data in combination to the corresponding very few children of the nodes in the second level of the trie , leads us to consider a different algorithm for the resolution of the query pattern , able to take advantage of such skewed distribution of the predicates. In fact, recall from Table \[tab:range\_stats\] that on the dataset, for a given (, ) pair, just 1.13 predicates are returned on average and 10 at most. Also recall from Section \[subsec:core\] that the pattern is solved by the algorithm in Figure \[alg:select\] by performing a operation followed by a on the trie. The idea is to pattern match directly over the permutation with the algorithm illustrated in Figure \[alg:enumerate\]. For a given subject $s$ and object $o$, in short, we operate as follows. We consider the set of all the predicates that are children of $s$. For each predicate $p_i$ in the set, we determine if the object $o$ is a child of $p_i$ with the function: if it is, then ($s$, $p_i$, $o$) is a triple to return. We refer to such strategy as the algorithm, whose correctness is immediate. As partially motivated, we argue that the efficiency of the outlined algorithm is due to several distinct facts. - The small number of predicates as children of a given subject implies that the loop in Figure \[alg:enumerate\] performs few iterations: while these children are few per se, e.g., *at most* 52 for , the iterations will be on average far less. For example, less than 6 iterations are needed on average for (see detailed statistics in Table \[tab:range\_stats\]). - For a given (subject, predicate) pair, we have a very limited number of children to be searched for $o$, thus making the function run *faster* by *short scans* rather than via binary search. On , an average of 2.32 children have to be scanned per pair. - Furthermore, the algorithm operates on the permutation whereas the algorithm on : but if we consider the rows for the encoder in Table \[tab:compressors\], we see that a operation issued on the second level of costs $1.6\times$ more the amount of nanoseconds spent on . Thus, avoiding percolating the trie produces further savings. In the light of devising a competitive algorithm to pattern match on , we consider another index layout. Combining the design introduced in Section \[subsec:core\] with the present considerations, five of out the eight different selection patterns can be solved efficiently by the trie , i.e.: , , , and . In order to support other two selection patterns, we can either chose to: (1) materialize the permutation for *predicate-based* retrieval (query patterns and ); (2) materialize the permutation for *object-based* retrieval (query patterns and ). The choice of which permutation to maintain depends on the statistics of the selection patterns that have to be supported. We stress that the introduced algorithm allows us to actually *save the space* for a third permutation that, as we have already pointed out in Section \[subsec:core\], costs roughly 1/3 of the whole space of the index. We call this solution the index; with two concrete instantiations (predicate-based) and (object-based). The only selection pattern that is not immediately supported is for (symmetrically, for ). However, we know that predicates are very associative, thus the list of subject nodes having a predicate parent is, on average, very long and highly compressible. Therefore, we can afford to maintain a two-level structure that, for every predicate $p$, maintains the list of all subjects that appear in triples having predicate $p$. Recall from our discussion concerning the space breakdowns in Section \[subsec:core\] that the similar structure costs just 1.34 for , thus should be only a little more costly given that the pairs are more in number than the pairs (see Table \[tab:datasets\]). Therefore, we proceed as follows. 1. *Access the list $p \rightarrow [s_1,\ldots,s_n]$.* 2. *For $i = 1,\ldots,n$, consider the pair $(s_i,p)$ and pattern match $s_i p ?$ against the permutation* *.* Similarly for the index , if we consider a query pattern with specified object $o$, $|\textsf{P}|$ operations are needed to locate all the occurrences of $o$ in the second level of the trie . 1. *For every predicate $p$, consider its children.* 2. *Determine if $o$ is among them with the* *function. If yes, then return all triples* ($s, p, o$) *with $s$ being a child of the pair $(p,o)$.* Again, the correctness of these two algorithms is immediate. In order to distinguish them from and , in the following analysis we refer to both approaches as .
null
minipile
NaturalLanguage
mit
null
Pros are almost the same with Physicians Formula Mineral Wear Talc Free Mineral Loose Powder Cons: It’s smell is quite foul for me 🙁 Will I ever repurchase these items?Yes. It may have some cons but it’s worth it since it works really great, and considering that it’s safe on breakout prone skin. It’s definitely a product worth having! 🙂 You may order it online on TameraOnline.com 🙂
null
minipile
NaturalLanguage
mit
null
Elon forum discussion addressed Ferguson issues ELON — Hundreds of Elon University students, faculty and staff packed an event room on campus to discuss issues related to the fatal shooting of a Ferguson, Mo. teenager by police earlier this month. The event on Wednesday night, called “Lessons Within Ferguson, Mo.,” featured a panel discussion of several faculty members who have conducted research related to issues of “race, justice, privilege and the increasing militarization of police forces today in the United States,” according to an E-Net News story published by the university. The discussion centered on the Aug. 9 shooting of 18-year-old Michael Brown, who was believed to be unarmed when he was shot six times by a police officer. Brown, a black male, had been considered a suspect in an earlier convenience store robbery, though it is unclear whether Darren Wilson, the white officer who shot Brown, knew who he was at the time. Elon University junior Mia Watkins, who is from Ferguson, spoke at the event about her experience growing up in the St. Louis suburb where she felt safe, in light of recent media depictions of the town. The panel was moderated by Naeemah Clark, associate professor of communications. Faulty panelists included Jim Bissett, professor of history; India Johnson, assistant professor of psychology; Ken Fernandez, director of the Elon University Poll; Robert Parrish, assistant professor of law and Sandra Reid, a lecturer in human service studies. Jason Husser, assistant professor of political science and policy studies and Randy Williams, dean of multicultural affairs, also made remarks.
null
minipile
NaturalLanguage
mit
null
Subscription Schema The following shows a subscription product schema. {"version":"1.0","type":"SUBSCRIPTION","referenceName":"treasure_finders_plus","subscriptionInformation":{"subscriptionPaymentFrequency":"MONTHLY","subscriptionTrialPeriodDays":7},"publishingInformation":{"locales":{"en-US":{"name":"Treasure Finders Plus","smallIconUri":"small-icon-uri","largeIconUri":"large-icon-uri","summary":"1 new members-only adventure each month + over 10 previously released adventures.","description":"Get access to a new adventure each month for members only, along with a growing collection of over 10 previously released members-only adventures. Includes Crystal Catchers, The Light Stone, The Dark Pool, The Cave Fish, Long Way Down and more.","examplePhrases":["Alexa, open treasure finders plus","Alexa, play with treasure finders plus"],"keywords":["Games"],"customProductPrompts":{"purchasePromptDescription":"{PREMIUM_CONTENT_TITLE} includes access to all of our current adventures and a new one each month.","boughtCardDescription":"Enjoy {PREMIUM_CONTENT_TITLE}! Ask for a list of adventures to explore your purchase.."}}},"distributionCountries":["US"],"pricing":{"amazon.com":{"releaseDate":"2018-12-28T01:25Z","defaultPriceListing":{"price":1.99,"currency":"USD"}}},"taxInformation":{"category":"SOFTWARE"}},"privacyAndCompliance":{"locales":{"en-US":{"privacyPolicyUrl":"url-to-privacy-policy"}}},"testingInstructions":"Sample testing instructions.","purchasableState":"PURCHASABLE"} Entitlement Schema The following shows an entitlement product schema. {"version":"1.0","type":"ENTITLEMENT","referenceName":"cave_quest","publishingInformation":{"locales":{"en-US":{"name":"Cave Quest","smallIconUri":"small-icon-uri","largeIconUri":"large-icon-uri","summary":" 5 new adventures for your collection","description":"The Cave Quest expansion pack includes 5 brand new adventures for your collection. Venture into even deeper and darker caves with Emerald and her friends, and collect up to 30 unique treasures. Adventures will automatically be playable once you've completed your purchase, and you can play them as often as you'd like.","examplePhrases":["Alexa, play cave quest","Alexa, buy cave quest"],"keywords":["Games"],"customProductPrompts":{"purchasePromptDescription":"{PREMIUM_CONTENT_TITLE} includes 5 new adventures with Emerald and her friends.","boughtCardDescription":"Enjoy {PREMIUM_CONTENT_TITLE} by asking Alexa to play cave quest."}}},"distributionCountries":["US"],"pricing":{"amazon.com":{"releaseDate":"2018-01-28T01:25Z","defaultPriceListing":{"price":1.99,"currency":"USD"}}},"taxInformation":{"category":"SOFTWARE"}},"privacyAndCompliance":{"locales":{"en-US":{"privacyPolicyUrl":"url-to-privacy-policy"}}},"testingInstructions":"Ask Alexa if she has any new adventures","purchasableState":"PURCHASABLE"} Consumable Schema The following shows a consumable product schema. {"version":"1.0","type":"CONSUMABLE","referenceName":"five_hint_pack","publishingInformation":{"locales":{"en-US":{"name":"Five-hint pack","smallIconUri":"small-icon-uri","largeIconUri":"large-icon-uri","summary":"Five hints you can use if you get stuck on a question.","description":"The five-hint pack gives you five hints you can use any time you can't answer a question. You can use your hints at any point in the game.","examplePhrases":["Alexa, buy hints","Alexa, give me a hint"],"keywords":["games"],"customProductPrompts":{"purchasePromptDescription":"{PREMIUM_CONTENT_TITLE} provides you with five hints you can use at any time.","boughtCardDescription":"Use your hints in the {PREMIUM_CONTENT_TITLE} when you don't know an answer by asking Alexa to use a hint."}}},"distributionCountries":["US"],"pricing":{"amazon.com":{"releaseDate":"2018-10-01T01:25Z","defaultPriceListing":{"price":0.99,"currency":"USD"}}},"taxInformation":{"category":"SOFTWARE"}},"privacyAndCompliance":{"locales":{"en-US":{"privacyPolicyUrl":"url-to-privacy-policy"}}},"testingInstructions":"Start a game. When asked a question, ask Alexa for a hint.","purchasableState":"PURCHASABLE"} Product schema parts Following are descriptions of the in-skill product schema parts. Product object A product contains the following fields. Field Description Type version The version indicator. String. Valid value: 1.0 type The type of in-skill product. String. Valid values: CONSUMABLE, ENTITLEMENT, SUBSCRIPTION referenceName The canonical name of the in-skill product. This name is used when referring to the product in code. String 3-50 characters long, with no spaces. publishingInformation An object that contains information about how the product is presented to end users, by locale. When purchasableState is NOT_PURCHASABLE, the product is considered deactivated. In a live skill, customers can no longer purchase the product. However, customers who previously purchased and are entitled to it continue to have access to the product, so your skill should continue to support these users. For a subscription, the existing customers continue to have access to the product for the remainder of the subscription term. A deactivated subscription does not automatically renew. SubscriptionInformation object Required for subscriptions only. Describes the billing frequency and trial period length for the subscription. Field Description Type subscriptionPaymentFrequency Required for subscriptions only. Indicates how often the customer is billed for the subscription. String. Valid values: MONTHLY, YEARLY subscriptionTrialPeriodDays Required for subscriptions only. Indicates the duration of the trial period, in days. Integer between 0 and 31, inclusive. PublishingInformation object for an in-skill product A publishingInformation object contains the following fields. Field Description Type locales A map of locale objects that provide specific information for each supported locale. Currently the only supported locale is en-US. String. Valid values: INFORMATION_SERVICES, NEWSPAPERS, PERIODICALS, SOFTWARE, STREAMING_RADIO, VIDEO. For more about the meaning of these categories, see Tax category field (developer console). Publishing information locale Each publishingInformation object contains a map of locale objects that describe publishing information specific to that locale. Each locale is identified with a 2-letter language code, a hyphen followed by the 2-letter country/region code. Currently the only supported locale is "en-US". Field Description Type <locale> 2-letter language code, a hyphen followed by the 2-letter country/region code. String. Valid value: en-US <locale>.name The name for the product for this locale. This name is included in purchase confirmation prompts, Alexa app purchasing cards and email receipts. String 2-50 characters, inclusive. <locale>.summary Summary description of the product. String from 1-160 characters, inclusive. <locale>.description A full description explaining the product's functionality and any prerequisites to using it. String 1-4000 characters, inclusive. <locale>.smallIconUri A URI to a 108px x 108 PNG with transparency, which represents the in-skill product. Because the image is rounded when displayed, it is recommended that the image has 75px padding on all sides. You can reuse the small icon associated with your skill, or provide a unique image to represent your in-skill product. Properly formatted URL string <locale>.largeIconUri A URI to a 512 X 512 PNG with transparency, which represents the in-skill product. Because the image is rounded when displayed, it is recommended that the image has 75px padding on all sides. You can reuse the large icon associated with your skill, or provide a unique image to represent your in-skill product. Properly formatted URL string <locale>.examplePhrases List of example phrases that illustrate how users can ask for your product. These phrases must be supported in your voice model. String list that contains 1-3 entries. Each string in the list can be 2-200 character, inclusive. <locale>.keywords Keyword phrases that describe the product offering. String list that contains 1-30 entries. Each string in the list should be 1-150 characters, inclusive. <locale>.customProductPrompts An object that contains prompts and descriptions for this product for this locale. customProductPrompts object A customProductPrompts object contains two fields that provide descriptions of your product when a customer makes a purchase. These should be in the language of of the specified locale. Field Description Type purchasePromptDescription The description of the product a customer hears when they make a purchase or cancel a subscription. A purchasePromptDescription should: Include the product name. Use "`{PREMIUM_CONTENT_TITLE}`" as a token for the name field. Do not use "{" or "}" anywhere else in the prompt. Include what is unique about this product Be as brief as possible NOT include any pricing information, as Amazon automatically appends the price in the purchase flow. Avoid repeating the same phrases customers may have heard in the previous step Example DO The Cave Quest expansion pack includes 5 new adventures with Emerald and her friends. DON'T This expansion pack includes 5 new adventures. The Lost Elf, The Fall, The Mysterious Echo, Emerald's New Friend, and The Long Walk Home. Play these stories anytime you'd like. It's $0.99 plus tax. Would you like to buy it? privacyAndCompliance object A privacyAndCompliance object contains a map of locale objects, which in turn contains privacy information specific to that locale. Each locale is identified with a 2-letter language code, a hyphen followed by the 2-letter country/region code. Currently the only supported locale is "en-US". Each locale identified in the publishingInformation object must have an entry in this map, and a valid privacyPolicyUrl for the locale. Field Description Type <locale> A language tag that contains the 2-letter language code, a hyphen followed by the 2-letter country/region code.
null
minipile
NaturalLanguage
mit
null
Q: Download SQL database from Microsoft SQL Server Management Studio? I have a server on Microsoft Server Management Studio that I need to download in order to work on it locally. When I right click on the database and go to Tasks -- Export Data I get the SQL Server Import Export Wizard. I am able to pick a source, but I can't find the write destination to allow me to download the file locally. I don't want to transfer the files to another server, I just want to have to local file to work with. Is this the right approach? Or is there a better way to handle this task? A: I don't want to transfer the files to another server.... A SQL Server database is a complex binary structure. To read it / work with it, you need a copy of SQL Server on the machine you want to work with it on. The Developer edition would be a good option for downloading to a local machine, or you could install the free version and export data to a local database. If what you are trying to do is to just see the data without any of the SQL Server functionality, then you can export them to different types of files through the import/export functionality. However, unless the amount of data involved is quite small, I would really recommend against this. The organization and cross-referencing of data can be quite extensive depending on how the database was designed. These are about your only two options. What you end up doing may depend on what you are planning to do with the data.
null
minipile
NaturalLanguage
mit
null
ONEIGHTYLEADERSHIP HIGH SCHOOL NEW THIS YEAR!We are introducing the Student Leadership program at The Point Church. Our leadership training program is meant to utilize the leadership potential that High School students have and will be an opportunity to grow in your leadership abilities. Whether it is media, tech, small group leader, small group helper, program/games, or snack shack co-ordinator, there is an opportunity for you!
null
minipile
NaturalLanguage
mit
null
The development of internal combustion engines for reduced exhaust emissions has resulted in significant increases in the amount of heat dissipation into engine cooling systems. Traditionally, increases in the required amount of heat dissipation has been accomplished by improving the radiator cooling capacity through increasing the core size of the radiator. In addition, increased coolant and cooling air flow has been used to deal with the increase in required heat dissipation. Packaging space for larger radiator cores and high energy consumption due to increased coolant and cooling air flow limit the amount of heat dissipation capacity increase that can be accomplished with these traditional approaches. It is possible to improve cooling capacity by elevating the maximum permissible coolant temperature above traditional levels. The adoption of pressurized cooling systems which permitted operation with coolants at 100° C./212° F. was a step in this direction. The addition of expansion tanks assisted in maintaining such temperature levels. However, it has become desirable to elevate coolant temperatures to even higher levels. Utilization of elevated coolant temperatures requires proper pressurization under all operating, stand-still and ambient conditions in order to control cooling characteristics, secure coolant flow, prevent cavitation and cavitation erosion and to prevent unwanted boiling and overflow. Temperature and pressure increase becomes more critical as the heat dissipation from the engine approaches the cooling capacity of the cooling system. A now traditional approach for pressurizing cooling systems is to rely on closed expansion or pressure tanks which depend on temperature increases of coolant and air to create and maintain desired pressures. Such a system communicates with ambient air by opening two way pressure valves to thereby communicating the system with ambient air to entrain new air into the pressure tank when entrapped air and the coolant cool to create a vacuum in the system. Such systems are passive and vulnerable to leaks. Moreover, if such a system is depressurized for any reason, such as maintenance or top-off, pressure is reduced to ambient and operating time and cycles are needed to increase the pressure in the system.
null
minipile
NaturalLanguage
mit
null
KARACHI: The Indus Water Treaty has now become ineffective as India is continuously violating all clauses of the treaty and Pakistan is not challenging them at any international forum by tacit approbation. International Water Expert Engr Bashir Malik, who has served United Nations and World Bank as chief technical adviser on Thursday said the cheapest and environment-friendly solution to water and energy crisis in Pakistan was the Kalabagh Dam, which could only be built by a patriotic and brave leader having the courage to break all the barriers in the best national interest. Malik said Save Water Save Pakistan Forum would initiate a campaign to highlight water and energy crisis and their solution at national level for which they would have dialogues with the national leadership besides conducting seminars and conferences with the help of technical and legal experts. Pakistan remained undecided to appoint patriotic and real water management experts to take up its case before International Court of Arbitration (COA) against India over construction of hydropower project in violation of the 1960 Indus Waters Treaty. Sindh Agriculture Forum (SAF) experts said the country is heading towards the worst water shortage in the next couple of years due to insufficient water management practices and storage capacity, they said. Pakistan has right to oppose the Kishanganga project because its diversion will reduce 16 percent of the power generation capacity of the 969 megawatts (MW) Neelum-Jhelum power project on the same river downstream Muzaffarabad in Azad Kashmir, an official of the Ministry of Water and Power said. Due to the poor handling of case with India as well as in COA, Pakistan could not gain points in favour of its case, only because of a team of jurists, not sincere from the start. A report by the Washington DC based Woodrow Wilson Centre described Pakistan's water shortage as deeply troubling. He said Neelum-Jhelum power project case in COA, Pakistan would face a loss of energy of more than Rs 6 billion every year. Pakistan and India have agreed on the selection of two arbitrators each for the seven-member court of arbitration, but have failed so far to agree on the appointment of three arbitrators belonging to engineering and law to complete the adjudication forum for more than seven months now. The Indus Water Treaty with India remained just on papers. India had diverted Pakistani water and constructed more dams, which would further worsen the water situation in Pakistan. The Senate Committee on Food and Agriculture said underground water in Punjab province was going down due to provision of free electricity to Indian Punjab for tube wells. The farmers were taking excessive water through tube wells, which resulted in downward trend of water in Pakistan's Punjab. The underground water level went down from about 70-100 feet to up to 1,000 feet and has been termed as a worsening situation. Under the treaty, three western rivers, Chenab, Jehlum and Indus are allocated to Pakistan and India is not allowed to build storages on them. The mystery of allegedly involvement of former Indus Water Commissioner (IWC), Jammat Ali Shah to facilitate Indian authorities for building controversial Nimo Bazgo has yet to be resolved because of silence adopted by the Ministry of Water and Power. Preliminary report maintained that former water commissioner, Shah did not play his due role and remained silent about the Nimoo Bazgo Hydropower Project (built by India during 2002- 2009) and did not raise any objections during the Pak-India meetings at the level of Permanent Indus Commission of Indus Waters. sorry mate as said in some of my earlier post "Propaganda is a good tool to destroy the enemy but if it fails it brings your own destruction faster than the destruction that you have planned for the enemy" Regarding Ground water level. Ground water levels are reducing every were. if you do not plant trees and create forest and build canels and water bodies then how come you are expecting Ground Water to get recharged. Your planning commision has done enough damage to your farmers, now you are doing more damage with your propagada. KARACHI: The Indus Water Treaty has now become ineffective as India is continuously violating all clauses of the treaty and Pakistan is not challenging them at any international forum by tacit approbation. International Water Expert Engr Bashir Malik, who has served United Nations and World Bank as chief technical adviser on Thursday said the cheapest and environment-friendly solution to water and energy crisis in Pakistan was the Kalabagh Dam, which could only be built by a patriotic and brave leader having the courage to break all the barriers in the best national interest. Malik said Save Water Save Pakistan Forum would initiate a campaign to highlight water and energy crisis and their solution at national level for which they would have dialogues with the national leadership besides conducting seminars and conferences with the help of technical and legal experts. Pakistan remained undecided to appoint patriotic and real water management experts to take up its case before International Court of Arbitration (COA) against India over construction of hydropower project in violation of the 1960 Indus Waters Treaty. Sindh Agriculture Forum (SAF) experts said the country is heading towards the worst water shortage in the next couple of years due to insufficient water management practices and storage capacity, they said. Pakistan has right to oppose the Kishanganga project because its diversion will reduce 16 percent of the power generation capacity of the 969 megawatts (MW) Neelum-Jhelum power project on the same river downstream Muzaffarabad in Azad Kashmir, an official of the Ministry of Water and Power said. Due to the poor handling of case with India as well as in COA, Pakistan could not gain points in favour of its case, only because of a team of jurists, not sincere from the start. A report by the Washington DC based Woodrow Wilson Centre described Pakistan's water shortage as deeply troubling. He said Neelum-Jhelum power project case in COA, Pakistan would face a loss of energy of more than Rs 6 billion every year. Pakistan and India have agreed on the selection of two arbitrators each for the seven-member court of arbitration, but have failed so far to agree on the appointment of three arbitrators belonging to engineering and law to complete the adjudication forum for more than seven months now. The Indus Water Treaty with India remained just on papers. India had diverted Pakistani water and constructed more dams, which would further worsen the water situation in Pakistan. The Senate Committee on Food and Agriculture said underground water in Punjab province was going down due to provision of free electricity to Indian Punjab for tube wells. The farmers were taking excessive water through tube wells, which resulted in downward trend of water in Pakistan's Punjab. The underground water level went down from about 70-100 feet to up to 1,000 feet and has been termed as a worsening situation. Under the treaty, three western rivers, Chenab, Jehlum and Indus are allocated to Pakistan and India is not allowed to build storages on them. The mystery of allegedly involvement of former Indus Water Commissioner (IWC), Jammat Ali Shah to facilitate Indian authorities for building controversial Nimo Bazgo has yet to be resolved because of silence adopted by the Ministry of Water and Power. Preliminary report maintained that former water commissioner, Shah did not play his due role and remained silent about the Nimoo Bazgo Hydropower Project (built by India during 2002- 2009) and did not raise any objections during the Pak-India meetings at the level of Permanent Indus Commission of Indus Waters. sorry mate as said in some of my earlier post "Propaganda is a good tool to destroy the enemy but if it fails it brings your own destruction faster than the destruction that you have planned for the enemy" Regarding Ground water level. Ground water levels are reducing every were. if you do not plant trees and create forest and build canels and water bodies then how come you are expecting Ground Water to get recharged. Your planning commision has done enough damage to your farmers, now you are doing more damage with your propagada. Click to expand... And according to International Law, no country is allowed to alter its rivers if some other country is getting damaged due to it. So, practically, there should have been no need to sign IWT if India was so sincere in peace keeping why after even 65 Pakistan dont have an effective law to conserve water & water management policy.... are indians responsible for your leader's own incompetence????????? Instead of false bravado & blame game had your leader's genuenly worked towrd's betterment of society & nation building you wouldn't be facing this water crisis ....THINK?????????????? Click to expand... Yes according to many of Pakistani forum members , all leaders who are corrupt in Pakistan are either on USA or MOSSAD or on RAW payroll... We Indians don't care for these rants.If any one have problem please go to WB or sue us in international case for this... We will keep thinking about our ppl because we care and love them more than we hate our enemy... Farmers in Punjab will use tube wells at free of cost because our government is capable to do that ...
null
minipile
NaturalLanguage
mit
null
One Dancing With The Stars Cast Member Lost 37 Pounds On The Show One former Pretty Little Liars star joined Dancing with the Starsthis season, but her goal wasn't simply to make an appearance on a network TV show. Instead, Sasha Pieterse said straight out of the gate that she was hoping to get into shape before her upcoming nuptials, and Dancing with the Stars certainly seems to be kickstarting that goal. The actress said during the show this week that she actually lost 37 pounds during her time on the ABC series. We're halfway through the competition and I've lost 37 pounds. It really is magical. The magical comment has to do with the fact that this week's episode was Disney-themed, with Sasha Pieterse and her partner Gleb Savchenko doing a Little Mermaid-themed rumba. Sadly, the whole night was not to be magical for the dancing couple, as Pieterse and Savchenko were eliminated, despite the fact the judges really liked her performance and she seemed to be doing a little bit better every week. Although she won't be winning the Mirrorball Trophy, it really does seem like joining dancing with the stars was a win. The actress lost 15 pounds two weeks into the competition, and now she's slimmed down 37 pounds. If you know much about Sasha Pieterse, it's that weight is often at the forefront for the actress, mostly because her fans saw her put on the weight while she was on Pretty Little Liars. She's said on Dancing with the Stars that she did put on 70 pounds because of a condition called polycystic ovary syndrome and it's been really hard on her to hear comments about her weight. She's previously taken to social media to talk about the reaction of her fans and random people on the internet to her weight gain, and it's been hard to put on a positive front. There was major backlash on social media. People were angry that I gained weight, I was being (and still am) called names, made fun of, the (unfortunate) usual but it wasn't until people started asking and assuming I was pregnant that I had decided to say something... I decided at that point to love myself the way I am right now. That doesn't mean I don't want to improve myself, it means that I am making a point to love myself at every stage and chapter of my life. I know I will get to where I want to be and I will do it in a healthy way. Dancing with the Stars is hard work. It's often causes contestants to lose weight--whether or not that is an intended goal, and plenty of contestants and professional dancers have gotten hurt during or leading up to episodes. The ABC series takes a toll on your body, but it doesn't seem to be a competition that most of the people who join end up regretting. As for Sasha Pieterse, she seems to be wanting to focus on losing weight and getting healthy before her wedding to Hudson Sheaffer. We wish her the best of luck as she moves forward. It's going to be a whole lot harder to stay motivated now that dancing won't be forced on her, but she seems to be in a pretty happy place with her body, regardless. WATCH: 7 Cancelled Shows That Definitely Aren't Coming Back To TV This Fall
null
minipile
NaturalLanguage
mit
null
Thompson got the start for the Reggae Boyz with expected starter Andre Blake remaining with the Philadelphia Union this weekend for the club’s MLS game against the Colorado Rapids. As in last year's CONCACAF Gold Cup, where he came off the bench to help lead Jamaica to the final for the first time, the veteran goalkeeper performed admirably. Thompson recorded three saves in the first half before Duwayne Kerr came on to play the second 45 minutes for Jamaica. Only Nicolas Castillo’s goal with eight minutes to go denied Jamaica a shutout. Jamaica will open the 2016 Copa America Centenario on Sunday, June 5 as it faces Venezuela at Chicago’s Soldier Field to open group play.
null
minipile
NaturalLanguage
mit
null
U.S. Route 222 U.S. Route 222 (US 222) is a spur of US 22. It runs for from US 1 in Conowingo, Maryland to Interstate 78 (I-78) and Pennsylvania Route 309 (PA 309) in Dorneyville, Pennsylvania, where the US 222 right-of-way continues into Allentown as PA 222. US 222 is almost entirely in Pennsylvania, and serves as the state's principal artery between the Lancaster and Reading areas and the Lehigh Valley. Route description Conowingo to Lancaster US 222 begins at an intersection with US 1 in the community of Conowingo in Cecil County, Maryland. Following US 1 southwest to the Conowingo Dam across the Susquehanna River leads to the northern terminus of MD 222. From this intersection, the route heads northwest on two-lane undivided Rock Springs Road, passing through a mix of fields and woods with some homes. The road curves to the north through woodland and passes east of the community of Oakwood. US 222 turns to the northeast and runs through fields and woods with some development, passing to the southeast of the Rock Springs Generation Facility in the community of Rock Springs before it comes to the Mason–Dixon line, which marks the border between Maryland and Pennsylvania. Upon crossing the Mason–Dixon line, US 222 enters Fulton Township in Lancaster County, Pennsylvania and heads north as Robert Fulton Highway, passing between woodland to the west and farm fields to the east. The route turns to the north-northwest and runs through agricultural areas with some trees and homes, passing through the community of New Texas Lyles. The road continues through rural areas and curves to the north, heading into the residential community of Wakefield and coming to an intersection with PA 272. At this point, PA 272 turns north for a concurrency with US 222 along Robert Fulton Highway, running through a mix of farms and homes. PA 272 splits from US 222 in the community of Penn Hill by heading northwest, and US 222 continues northeast through wooded areas. The road heads into a mix of fields and woods and reaches the community of Goshen, where it turns to the north. The route runs through farmland with some woods and homes, curving northeast before heading back to the north and passing to the east of the Robert Fulton Birthplace. US 222 continues north-northeast through rural land and passes through the community of Bethel, where it crosses into Little Britain Township. The road heads north and enters East Drumore Township, continuing through farmland with some trees and residences and passing through the communities of Unicorn and Mechanics Grove. The route passes east of Solanco High School and bends to the north-northwest as it runs through more rural land. US 222 enters the borough of Quarryville and becomes South Church Street, heading north past homes. The route comes to an intersection with PA 372, at which point it turns west-southwest to join that route on West State Street, running through more residential areas. US 222 splits from PA 372 by heading northwest onto West 4th Street, passing between businesses to the southwest and homes to the northeast before running through more residential areas, passing through a corner of East Drumore Township before heading into Providence Township. At this point, the route enters the Pennsylvania Dutch Country of eastern Lancaster County, which is home to many Amish farms. In Providence Township, the route becomes Beaver Valley Pike and passes under the under-construction Enola Low Grade Trail before it runs through a mix of farmland, woodland, and residential and commercial development. The road crosses the Big Beaver Creek into Strasburg Township and heads northwest through more rural land with some development, with the creek parallel to the southwest. The creek bends away to the west and US 222 continues into agricultural areas with occasional homes, passing through the community of Martinsville and turning to the west-northwest. The route passes to the northeast of the community of Refton and curves northwest, crossing the Pequea Creek into West Lampeter Township. The road heads north through farmland and bends northwest to reach an intersection with PA 741. Here, PA 741 becomes concurrent with US 222 and the two routes curve to the west-southwest, passing between farm fields to the north and residential and commercial development to the south and heading into the community of Willow Street. Here, the road comes to an intersection with PA 272, which is split into a one-way pair at this point. At this point, US 222 turns north to join PA 272 along Willow Street Pike, a one-way pair which carries two lanes in each direction. PA 272 becomes unsigned along the US 222 concurrency. Both directions of Willow Street Pike rejoin and it continues north as a two-lane undivided road past commercial development before it runs through wooded residential areas, passing through Hollinger. US 222/PA 272 crosses Mill Creek and heads through the community of Lyndon. The road briefly gains a center left-turn lane as it continues through wooded areas of development and passes to the west of a golf course. US 222/PA 272 splits into a one-way pair, with two lanes in each direction, and crosses the Conestoga River into Lancaster Township. Lancaster to Reading After crossing the Conestoga River, northbound US 222/PA 272 becomes Highland Avenue and southbound US 222/PA 272 is called South Prince Street. The southbound direction intersects PA 324 in the community of Engleside before the two routes continue into the city of Lancaster, heading into urban residential and commercial areas. A short distance after entering Lancaster, northbound US 222/PA 272 intersects the end of one-way northbound PA 324 and heads onto South Queen Street. The two routes continues past urban rowhomes along South Queen Street northbound and South Prince Street southbound. Northbound US 222/PA 272 splits from South Queen Street by heading northeast onto Church Street, which carries three lanes of one-way traffic, while northbound PA 72 continues along South Queen Street. Just south of downtown Lancaster, the northbound direction of the route turns north onto South Lime Street, which carries two lanes of one-way traffic. US 222/PA 272 heads into the commercial downtown of Lancaster and crosses eastbound PA 462 at King Street. Past this, the route becomes North Lime Street northbound and North Prince Street southbound, crossing eastbound PA 23 at Chestnut Street and westbound PA 23/PA 462 at Walnut Street. The two routes leave the downtown area and run through urban areas of homes and businesses. The northbound direction passes to the east of Lancaster General Hospital between East James and East Frederick streets while the southbound direction passes to the east of Clipper Magazine Stadium, home of the Lancaster Barnstormers baseball team, north of the Harrisburg Avenue intersection. At the intersection with Liberty Street, northbound US 222/PA 272 shifts west a block onto four-lane undivided North Duke Street, a two-way road, while the one-way pair continues into Manheim Township. A block later, at McGovern Avenue, both directions of US 222/PA 272 rejoin along North Duke Street. Southbound US 222/PA 272 follows McGovern Avenue west between North Duke Street and North Prince Street, forming the border between a portion of the city of Lancaster to the north that is home to the Lancaster station along Amtrak's Keystone Corridor and Manheim Township to the south. The roadway is a three-lane road with two westbound lanes that carry southbound US 222/PA 272 and one eastbound lane. McGovern Avenue reaches intersection with northbound PA 72 at North Queen Street, where northbound PA 72 turns west to join southbound US 222/PA 272 along the road. At North Prince Street, southbound US 222/PA 272 turn south while PA 72 becomes two-way heading north. Both directions of US 222/PA 272 continue north along four-lane undivided North Duke Street and the road reaches the Thaddeus Stevens Bridge over Amtrak's Keystone Corridor, where it becomes the border between Manheim Township to the west and Lancaster to the east. At Keller Avenue, the road becomes Lititz Pike and fully enters Manheim Township, running through commercial areas as a five-lane road with a center left-turn lane. Northbound US 222 and PA 272 head northeast onto Oregon Pike, with PA 272 becoming signed again, while southbound US 222 and PA 501 continue north along Lititz Pike. The two routes continue northeast as a three-lane road with a center left-turn lane and runs past businesses and a few homes before it comes to an interchange with the US 30 freeway. Here, US 222 splits from PA 272, which becomes signed again, by heading east concurrent with US 30 on an eight-lane freeway, passing near developed areas. US 222 splits from US 30 at a trumpet interchange and heads north onto a four-lane freeway. The route curves northeast and runs through a mix of farmland and residential and commercial development. The freeway comes to a northbound exit and entrance with Butter Road and a southbound exit and entrance with PA 272. Past this interchange, US 222 continues through a mix of farm fields and woodland, passing through a corner of Warwick Township before crossing the Cocalico Creek into West Earl Township. The route passes near farmland before heading near homes and businesses, reaching a partial cloverleaf interchange with PA 772 north of the community of Brownstown. Past here, the freeway heads northeast through agricultural areas. Farther along, US 222 curves to the north and comes to a diamond interchange with US 322 southeast of the borough of Ephrata, at which point it crosses into Ephrata Township. The route passes near businesses at the interchange before it turns northeast and runs through wooded areas with some nearby residential development and farm fields. The freeway heads into East Cocalico Township and runs through more woodland before it passes to the southeast of the community of Reamstown. US 222 passes through farmland and comes to a diamond interchange with Colonel Howard Boulevard, which heads west to provide access to PA 272 and east to provide access to the Pennsylvania Turnpike (I-76). Following this, the route passes over the Pennsylvania Turnpike and crosses into Brecknock Township, running through a mix of farm fields and woods with some nearby residential and commercial development as it passes to the southeast of the borough of Adamstown. The US 222 freeway enters Brecknock Township in Berks County and continues north, passing a northbound weigh station before coming to a partial cloverleaf interchange serving the northern terminus of PA 272 and the western terminus of PA 568. Past this interchange, the route crosses into Spring Township and runs through wooded areas with some fields and homes, curving to the northeast and reaching a diamond interchange at Mohns Hill Road to the west of the community of Gouglersville. Here, the freeway crosses into Cumru Township and runs north-northeast through more rural areas, coming to a diamond interchange that connects to Grings Hill Road west of the borough of Mohnton. Reading to Allentown A short distance later, US 222 comes to a northbound exit and southbound entrance with the southern terminus of US 222 Bus., a business route that passes through the city of Reading, which US 222 bypasses to the west. From here, the route curves to the north and crosses back into Spring Township, passing near suburban residential development and coming to a partial cloverleaf interchange with PA 724 in a business area. The freeway turns to the northeast and passes through residential areas and some woodland between the community of West Wyomissing to the north and Lincoln Park to the south. US 222 briefly forms the border between Spring Township to the north and the borough of Wyomissing to the south before it bends to the north-northeast into Spring Township. The route crosses into Wyomissing and comes to an interchange with US 422 and the western terminus of US 422 Bus., at which point it also passes over Norfolk Southern's Harrisburg Line. At this interchange, US 422 becomes concurrent with US 222, and the two routes continue east-northeast along the six-lane Warren Street Bypass freeway, running between residential areas to the northwest and the Norfolk Southern tracks to the southeast. The freeway curves north into business areas and comes to a partial cloverleaf interchange with State Hill Road. Following this, US 222/US 422 passes between the Berkshire Mall to the west and commercial areas to the east before it reaches an interchange with Paper Mill Road and Crossing Drive, where it curves to the northeast and runs near more businesses. The freeway comes to an interchange where US 222 splits to the northwest, US 422 immediately afterward splits southeast along the West Shore Bypass, and, straight ahead, PA 12 begins northeast along the Warren Street Bypass. Past this interchange, US 222 heads northwest as a four-lane freeway, crossing back into Spring Township and running between a farm field to the southwest and the Penn State Berks university campus to the northeast before reaching a diamond interchange with Broadcasting Road. The route runs between a shopping center to the southwest and Tulpehocken Valley County Park to the northeast prior to reaching the Spring Ridge Drive exit. At this point, the freeway turns north and crosses the Tulpehocken Creek into Bern Township and runs north-northeast through wooded areas with some nearby homes and commercial development, coming to a partial cloverleaf interchange with PA 183. Following this, US 222 curves northeast, passing to the northwest of Reading Regional Airport and running through farm fields before crossing the Schuylkill River into Muhlenberg Township. The route passes near residential neighborhoods and some commercial development, passing over the Reading Blue Mountain and Northern Railroad's Reading Division line and reaching a partial cloverleaf interchange with PA 61. The freeway passes under another Reading Blue Mountain and Northern Railroad line and Norfolk Southern's Evansville Industrial Track, crossing into Ontelaunee Township. At this point, US 222 heads northeast through industrial areas, with Norfolk Southern's Reading Line parallel to the southeast. The freeway comes to an end at a trumpet interchange, where US 222 intersects the northern terminus of US 222 Bus. and merges onto that road. From here, US 222 heads north-northeast on four-lane divided Allentown Pike past a few businesses. The route enters Maidencreek Township and narrows to a three-lane road with a center left-turn lane, passing through a mix of fields and woods with some homes. The road curves northeast and passes commercial development, coming to an intersection with PA 73 in the community of Maiden Creek. Past this intersection, US 222 runs past a mix of residential development and businesses with some farm fields. At this point, the route heads into the agricultural East Penn Valley in northeastern Berks County, which is home to an Old Order Mennonite community. US 222 continues northeast through farmland with some trees, residences, and businesses, passing through the community of Kirbyville and crossing into Richmond Township, where the name becomes Kutztown Road. Farther northeast, the road heads past businesses and comes to a roundabout with PA 662 in the community of Moselem Springs. US 222 continues through farmland with some development, passing to the southeast of a golf course in the community of Kempville. The route becomes a four-lane freeway called the Kutztown Bypass, which bypasses the borough of Kutztown to the northwest, with a northbound exit and southbound entrance at Kutztown Road providing access to Kutztown. The freeway heads northeast through agricultural areas and crosses into Maxatawny Township, where it comes to a southbound exit and northbound entrance at Crystal Cave Road that provides access to Crystal Cave and the community of Virginville. From here, the route heads through more rural land before it passes through a section of Kutztown and runs near residential areas and farmland north of the Kutztown University of Pennsylvania campus. US 222 crosses back into Maxatawny Township and curves east, passing over the Sacony Creek and coming to a partial cloverleaf interchange with the southern terminus of PA 737 that provides access to Kutztown. The freeway crosses back into Kutztown and passes near homes before it reenters Maxatawny Township and the Kutztown Bypass ends at a southbound exit and northbound entrance with Kutztown Road that serves the borough. From here, US 222 becomes two-lane undivided Kutztown Road and runs east-northeast through farmland before heading past businesses near the Long Lane intersection. The route gains a center left-turn lane and passes through the residential community of Monterey before it continues through agricultural areas. Farther east, the road heads into the community of Maxatawny, where it is lined with homes and a few businesses. US 222 enters Upper Macungie Township in Lehigh County, which is in the Lehigh Valley, and becomes two-lane undivided Hamilton Boulevard, passing through farmland with some businesses and coming to intersections with Schantz Road and the southern terminus of PA 863. The route gains a center left-turn lane and continues east through farm fields with some homes and businesses, heading to the south of an office park. Residential and commercial development along the road increase as it passes to the north of the community of Breinigsville. A bit further east, US 222 diverges from Hamilton Boulevard at a northbound exit and southbound entrance onto a four-lane divided expressway called the Frederick J. Jaindl, Jr. Memorial Highway, immediately reaching a partial interchange with the PA 100 bypass of the community of Trexlertown. Here, Hamilton Boulevard continues east into Trexlertown and northbound US 222 merges with northbound PA 100 and southbound US 222 splits from southbound PA 100. All other connections between PA 100 and US 222 are provided by Hamilton Boulevard and Weilers Road. US 222 and PA 100 continue north concurrent along the expressway, passing near homes and intersecting Grim Road/Cetronia Road at-grade. The road curves northeast and runs between warehouses to the northwest and housing developments to the southeast. PA 100 splits from US 222 at a diamond interchange, at which point PA 100 continues north and Trexlertown Road heads south. US 222 continues past industrial areas and farmland, coming to a bridge over Norfolk Southern's C&F Secondary. The route bends east and passes more farmland before heading near residential neighborhoods, passing over Cetronia Road before intersecting Grange Road/Mill Creek Road at-grade. US 222 crosses into Lower Macungie Township and curves to the east-northeast, passing north of a shopping center and intersecting North Krocks Road at an at-grade intersection with a northbound exit and entrance ramp for right turns and access to and from the shopping center. Past this, the route comes to a southbound exit to Brookside Road north of the community of Wescosville. The road comes to a bridge over the Pennsylvania Turnpike Northeast Extension (I-476) and runs between industrial development to the north and businesses to the south, coming to an intersection with Hamilton Boulevard and Ceadarbrook Road/Kressler Road. Here, US 222 widens to six lanes and becomes Hamilton Boulevard again, heading east-northeast to the north of the Charcoal Drive-In bus terminal and a park and ride lot before it comes to its northern terminus at a partial cloverleaf interchange with I-78/PA 309 in the community of Dorneyville. Past this interchange, Hamilton Boulevard continues as PA 222 towards the city of Allentown. History When US 222 was first designated in the 1920s, it only reached as far north as Reading, but at the time US 22 dipped down from Allentown to Reading, then west to Harrisburg. US 22 was rerouted to become a straight shot from Allentown to Harrisburg, so the roadway between Reading and Allentown became part of US 222, explaining why the highway, designated as north/south, actually runs mostly east/west between the two cities. By the early 1930s the road then signed as US 22 became problematic for motorists in Lebanon along the current U.S. Route 422; Reading via U.S. Routes 22 and 222; and Allentown on Hamilton Street (US 22). Pennsylvania Route 43 had been aligned as a bypass between Allentown and Harrisburg. On June 8, 1931, the American Association of State Highway Officials came to a resolution to the traffic problem, by replacing the PA 43 corridor with US 22 and the William Penn Highway name to match. The state truncated PA 43 to Susquehanna Street from Allentown to Bethlehem. US 222 replaced the former US 22 alignment from Reading to Allentown. Hamilton Street was numbered as US 222, west of Center City Allentown, where it turned north onto 15th Street. This portion of US 222 was seven-blocks long which ended at Tilghman Street (then US 22). Signs were changed to reflect the new designations on May 31, 1932, with the new route designations officially in place on June 1, 1932. The first stretch of highway between Perryville and Conowingo in Maryland that would become part of US 222 to be improved was in Perryville, where Cecil County constructed with state aid a macadam road from the Aikin station on the Baltimore & Ohio Railroad south toward the Post Road (now MD 7) by 1910. Cecil County extended the macadam road to the Post Road by 1919. The highway from the Aikin railroad crossing to Port Deposit was paved as a concrete road in two sections: from the railroad to near Port Deposit by 1921 and through Port Deposit by 1923. MD 268, which was the original designation for the road between Perryville and Conowingo, was paved as a concrete road from Port Deposit to US 1 at Conowingo Dam between 1930 and 1933; the construction work included repurposing a railroad bridge across Octoraro Creek as a highway bridge. MD 268's bridge across the Baltimore & Ohio Railroad was constructed between 1931 and 1934. The old highway approaching the Aikin grade crossing became MD 449. MD 268 was proposed to be widened to from US 40 to US 1 in 1934. The section of Rock Springs Road between present-day US 1 and Old Conowingo Road/Ragan Road was constructed by the state of Maryland as a macadam road by 1921. The portion of Rock Springs Road between Old Conowingo Road/Ragan Road and the Pennsylvania border was built by the state as a concrete road by 1928. US 222 was designated in Maryland by 1930, with the southern terminus at US 1 in Conowingo. MD 268 was replaced by a southern extension of US 222 from US 1 at Conowingo to US 40 (now MD 7) in Perryville in 1938. The portion of US 222 from US 40 to near Port Deposit was expanded to improve access between the U.S. Highway and United States Naval Training Center, Bainbridge, east of Port Deposit in 1942 and 1944. With the construction of the Lehigh Valley Thruway in the early 1950s and the relocation of US 22 to that route, US 222 was extended east along Tilghman Street to 7th Street, then north on 7th Street to the interchange with the new freeway. In the late 1950s, US 222 was realigned to a newly constructed bypass carrying U.S. Route 309 and PA Route 29, west of Allentown. From the south, US 222 left Hamilton Boulevard and turned north onto the freeway. US 222 terminated at an interchange with US 22, US 309, and PA 29 in South Whitehall Township. The freeway, originally signed as US 309/PA 29/US 222, dropped the PA 29 designation in 1966; in 1968, US 309 was downgraded to PA 309 and US 222 was truncated to end at the current northern termini. By the 1980s, Interstate 78 became part of the freeway that occupied PA 309. US 222 in Maryland was widened and resurfaced between what is now the MD 222–MD 275—MD 824 intersection and Port Deposit in 1959 and 1960. US 222 was relocated as part of the construction of its original diamond interchange with I-95 in 1962 and 1963. The old alignment of US 222 east of its I-95 interchange became MD 824. The highway was resurfaced with bituminous concrete from MD 7 to US 40 and reconstructed and widened from US 40 to the southern MD 824 intersection in 1968 and 1969. The widening work included widening US 222's bridge across the Baltimore & Ohio Railroad, which was removed and replaced between 1987 and 1989. The I-95 interchange was converted from a standard diamond to a four-ramp partial cloverleaf with all four ramps east of US 222 between 1993 and 1994. With increased development in the late 20th century the two-lane road became increasingly congested. To alleviate these problems a number of construction projects took place, most notably a four-lane Reading bypass, a four-lane expressway to connect Lancaster to Reading, and a four-lane expressway bypass around the town of Kutztown, which is situated between Reading and Allentown. Studies for a limited-access highway connecting Lancaster and Reading began in the early 1950s. In 1962, construction began on a four-lane highway between Spring Township and Bern Township that would eventually connect to US 222. After construction stopped, this stretch became known as "The Road to Nowhere." In 1970, construction began for a freeway bypass carrying US 222 around Kutztown. The US 222 bypass of Kutztown opened on May 25, 1973, with a ribbon-cutting ceremony held. In 1973, the federal government approved the relocation of homes and businesses along the path of the proposed US 222 freeway between Lancaster and Reading. In July 1977, the final section of the US 222 freeway between Lancaster and the Berks County border opened to traffic. In 1949, plans were made to build a four-lane bridge across Tulpehocken Creek at Warren Street. As part of this plan, Warren Street was to be widened from the proposed bridge to Schuylkill Avenue. This widened Warren Street was envisioned to become part of a bypass route of Reading for US 222. The bridge and widening were approved with the provision that Warren Street only be widened as far as Schuylkill Avenue as not to build a bypass route through a residential area. Construction on the bridge and the Warren Street Bypass between US 422 (Harrisburg Pike, now Penn Avenue) and PA 83 (now PA 183, Schuylkill Avenue) began in 1950. In 1953, the Park Avenue Extension (which extended Park Avenue in Wyomissing to the bypass) and the Warren Street Bypass from US 422 in Wyomissing to Tulpehocken Creek, along with the Tulpehocken Creek bridge, was finished, with a continuation of the Warren Street Bypass northeast from PA 83 to US 222 (Allentown Pike, now 5th Street Highway) proposed. Construction on the extension of the Warren Street Bypass to US 222 began in 1956 with the process of widening of the existing Warren Street. The PA 83 bridge over the bypass was built in 1957. In 1959, the Warren Street Bypass extension to US 222 was opened to traffic with the portion of Warren Street between Tulpehocken Creek and PA 83 widened to four lanes. The Warren Street Bypass included an interchange with the under-construction Reading Bypass (now US 422, West Shore Bypass) southwest of Tulpehocken Creek when it opened in 1959. On November 15, 1975, the American Association of State Highway and Transportation Officials (AASHTO) approved for US 222 to be routed to bypass Reading, with the route following US 422 along the West Shore Bypass between Lancaster Avenue and the Warren Street Bypass and the Warren Street Bypass between the West Shore Bypass and Allentown Pike. The former alignment of US 222 through Reading between the West Shore Bypass and the Warren Street Bypass received the US 222 Bus. designation. In 1984, the Pennsylvania Department of Transportation (PennDOT) was planning to extend PA 145 and US 222 in Allentown. Traffic engineer Samuel D. Darrohh said that Allentown is one of few Pennsylvania cities without a traffic route going through it. After the plan was introduced, he said that motorists might be aided if US 222 were extended along Hamilton Boulevard to connect with the proposed PA 145 corridor. PennDOT originally planned the road as US 222 but AASHTO denied the extension, stating that the route "is not the shortest or best available route between major control points on the system, and therefore, does not adhere to the policies established under AASHTO's 'Purpose and Policy Statement for U.S. Numbered Highways'". In addition, the route did not meet the criteria for a business route. In 1991, it was commissioned as PA 222. PA 145 was extended south of the Lehigh Valley Thruway to the I-78/PA 309 overlap near Lanark. US 222 in Maryland used to extend down to MD 7 in Perryville. In 1972, the south end of US 222 was cut back to US 40 in Perryville, with MD 222 replacing the route along Aiken Avenue between MD 7 and US 40. AASHTO approved rolling back the southern end of the US 222 designation from US 40 in Perryville to US 1 in Conowingo at their April 1995 spring meeting. The Maryland State Highway Administration proposed and AASHTO approved the redesignation of US 222 to MD 222 from US 40 in Perryville to US 1 in Conowingo in February 1996; however, the new designation had already been enacted officially and marked publicly in 1995. In 1995, construction began on the Park Road Corridor to connect US 222/US 422 at the junction of the West Shore Bypass and Warren Street Bypass to the Road to Nowhere. Construction of the Park Road Corridor was completed in October 1998. As a result, US 222 was shifted to follow the Park Road Corridor and the Road to Nowhere to bypass the Reading area, replacing SR 3055 along the Road to Nowhere. The former alignment of US 222 that was bypassed became PA 12 along the Warren Street Bypass between US 222/US 422 and US 222 Bus. and a northern extension of US 222 Bus. along 5th Street Highway and Allentown Pike through Muhlenberg Township. In 1998, construction began on the US 222 freeway bypass of Reading between PA 724 and US 422; this section of road opened in 2000. Construction began in 2001 on the US 222 freeway between Grings Hill Road and PA 724 while construction of the section between the Lancaster County border and Grings Hill Road started in 2003. In 2004, construction was completed on the section of the US 222 freeway between Grings Hill Road and PA 724. As a result, US 222 was shifted to follow the new freeway between Grings Hill Road and US 422 and run concurrent with US 422 on the Warren Street Bypass north to the interchange with the West Shore Bypass and PA 12. The former alignment of US 222 along Lancaster Avenue became a southern extension of US 222 Bus. In June 2006, the US 222 freeway was completed between the Lancaster County border and Grings Hill Road; marking the completion of the US 222 freeway between Lancaster and Reading. In 2002, construction began on a bypass route for US 222 and PA 100 around Trexlertown. On September 29, 2005, PA 100 was rerouted to bypass the community to the west along the four-lane divided Trexlertown Bypass. US 222 was moved onto the bypass on September 28, 2007 following the extension of the bypass east to allow US 222 to bypass the community. The bypass cost $144 million to build. The former alignment of US 222 through Trexlertown along Hamilton Boulevard was designated SR 6222. In March 2013, construction began on a new bridge to carry US 222/PA 272 over the Amtrak tracks in Lancaster. The bridge project cost $26.6 million, with $12.7 million of that figure the actual construction costs of the bridge. The new bridge, which is four lanes wide and connects Lititz Pike directly with North Duke Street, opened to traffic on July 9, 2014, with the old bridge closed and later demolished. The bridge carrying US 222/PA 272 over the Amtrak line was named the Thaddeus Stevens Bridge in honor of Thaddeus Stevens, a 19th-century abolitionist and United States Representative who was from Lancaster. Concurrent with the construction of the new bridge, McGovern Avenue was converted to a two-way road between North Queen Street and North Duke Street to provide improved access to Lancaster station. In 2010, officials in Berks County pushed for PennDOT to widen a portion of the two-lane road to four lanes due to traffic and safety issues. In June 2018, plans to widen a portion of US 222 in Maidencreek Township near the PA 73 intersection to five lanes with a center left-turn lane received approval from township supervisors. Bidding for the widening project was expected to begin in spring 2019, with the project lasting for two years. On September 9, 2019, construction began on a $26 million project to widen US 222 at the PA 73 intersection along with adding roundabouts at Genesis Drive and Schaeffer Road in Maidencreek Township. In addition to the proposed widening, a roundabout was planned at the intersection with PA 662 in Richmond Township. The project, which cost $6.6 million, replaced the signalized intersection between the two routes with a roundabout, with US 222 widened to four lanes at the roundabout. Construction of the roundabout began on September 6, 2016. The roundabout opened to traffic on May 22, 2018, with all lanes at the roundabout opened on July 20, 2018. There are plans to construct a roundabout at the intersection with Schantz Road in Upper Macungie Township. Construction of this roundabout is planned to begin in February 2020 with completion by the end of 2021. Major intersections Special routes Former Maryland truck route U.S. Route 222 Truck was a truck bypass of US 222 from US 222 in Perryville to US 1 and US 222 in Conowingo. The signed route followed MD 275 from US 222 in Perryville north to MD 276 in Woodlawn. US 222 Truck continued north on MD 276 from Woodlawn north to US 1 west of Rising Sun. The truck route then headed west on US 1 to US 222 in Conowingo. US 222 Truck was downgraded to Maryland Route 222 Truck when US 222 became MD 222 between Perryville and Conowingo. Reading business loop U.S. Route 222 Business (US 222 Bus.) is a business route of US 222 located in Reading, Pennsylvania. The southern terminus is at US 222 in Cumru Township. Its northern terminus is at US 222 in Ontelaunee Township. The route begins at the US 222 freeway and heads through the southwestern suburbs of Reading as Lancaster Avenue, intersecting Pennsylvania Route 724 (PA 724) in Shillington. US 222 Bus. continues into Reading on Lancaster Avenue and intersects the northern termini of PA 625 and PA 10 before reaching an interchange with the US 422 freeway. The business route crosses the Schuylkill River and becomes Bingaman Street. US 222 Bus. turns north on 5th Street and intersects US 422 Bus. in downtown Reading and the southern terminus of PA 61 to the north of downtown. The route interchanges with the PA 12 freeway and continues north through suburban Muhlenberg Township as 5th Street Highway. US 222 Bus. reaches Temple and continues northeast to its northern terminus as Allentown Pike. US 222 Bus. is the only auxiliary route of US 222 in Pennsylvania. With the creation of the U.S. Highway System in 1926, the road between Reading and Lancaster was designated US 222 while the road between Reading and Allentown was part of US 22, which ran along what was designated the William Penn Highway in 1916 and PA 3 in 1924. In the late 1920s, US 222 briefly ran concurrent with PA 41 and PA 240 at different times. PA 42 originally ran north–south through Reading starting in 1927. By 1930, the concurrent state route designations were removed from US 222 and US 22. US 222 entered Reading along with PA 73 along Lancaster Avenue and Bingaman Street before turning north on 9th Street along with PA 83 to end at US 22 and US 422 at Penn Street. US 22 continued north on 9th Street out of Reading and continued along Kutztown Road through Temple toward Allentown. US 120 began at US 222 at Bingaman Street and headed north on 4th Street and Center Street out of Reading. In 1931, US 22 was moved to a more direct alignment between Harrisburg and Allentown, and US 222 was extended north along the former alignment between Reading and Allentown. US 222 was shifted to use Lancaster Avenue, Bingaman Street, and 5th Street and 5th Street Highway through the Reading area in the 1930s, running concurrent with US 122 through downtown Reading. The US 122 and PA 73 concurrencies were removed by 1966. In 1975, US 222 was rerouted to bypass Reading on the West Shore Bypass and the Warren Street Bypass, with the former alignment through the city becoming US 222 Bus. In 1998, US 222 Bus. was extended north to its current terminus following the rerouting of US 222 to a new outer bypass of Reading. The business route was extended south to its current endpoint in 2004 with the completion of the US 222 freeway south of Reading to Mohnton. See also References External links US 222 @ MDRoads.com Endpoints of US 222 2 Category:Lehigh Valley 22-2 22-2 22-2 Category:Roads in Cecil County, Maryland Category:Transportation in Lancaster County, Pennsylvania Category:Transportation in Berks County, Pennsylvania Category:Transportation in Lehigh County, Pennsylvania
null
minipile
NaturalLanguage
mit
null
Mike Beddow Alan Michael Beddow (born 12 October 1941, St Helens) is a former English cricketer who was active from 1962 to 1966. He made his first-class debut in 1962 and appeared in 33 matches as a right-handed batsman who bowled right arm medium pace, playing for Lancashire. He scored 775 runs with a highest score of 112* and took fifteen wickets with a best performance of three for 10. References Category:1941 births Category:English cricketers Category:Lancashire cricketers Category:Living people
null
minipile
NaturalLanguage
mit
null
Mosley was 13 of 20 from the floor and 8 of 13 beyond the arc. Ghiavonni Robinson had 16 points and Tevin Hammond added 13 for UAPB (12-20, 9-9 Southwestern Athletic Conference). The Golden Lions shot 59 percent as a team and went 17 of 29 on 3-point attempts. Mississippi Valley State (6-25, 5-13) was led by Jeffrey Simmons with 22 points. Isaac Williams had 16 points and Jabari Alex contributed 10.
null
minipile
NaturalLanguage
mit
null
Abstract Battery holder (100) consists of elastic bands (106a, 106b, 106c, 106d) and battery support plates (105a, 105b) on which terminal contacts (102a, 102b) are affixed. Battery (90) is inserted into said battery holder (100) between the battery support plates (105a and 105b) and held by elastic bands (106a, 106b, 106c, 106d) so that a negative battery electrode (109a) mates a negative terminal contact (102a) and a positive battery electrode (109b) mates a positive terminal contact (102b). The battery's position expands the elastic bands and, therefore, exerts tension between the battery support plates (105a, 105b) and the battery (90) so that the expanded battery holder maintains proper contact between the battery electrodes (109a, 109b) and the terminal contacts (102a, 102b). Description BACKGROUND OF THE INVENTION (a) Field of the Invention [0001] The present invention relates generally to a battery holder, and more particularly to a new battery holder structure using elastic materials so that the battery holder can be used interchangeably for the various shapes and types of batteries. [0002] (b) Description of the Prior Art [0003] The structure of a conventional battery holder, as shown in FIG. 1, is pre-defined by the type of battery the holder is designed for. The conventional battery holder [0004] 4 consists of a plastic case 1, a terminal contact 2 affixed on both sides of the plastic case, and a spring attached to the terminal contacts. Such a conventional battery holder has a rigid case so that it can accommodate the only battery which can fit into the shape. Therefore, the conventional battery holder cannot hold multiple types of batteries. In addition, when the battery holder is built into the electronic device, the rigid shape makes the improvement of the industrial design of the target electronic device more difficult. SUMMARY OF THE INVENTION The primary object of the present invention is to redefine battery charge options by providing an elastic battery holder that can accommodate various battery types with minimum holding space, especially useful for battery charger/discharger applications. In order to achieve the objective, the current invention utilizes elastic bands, attached to a battery support plate as a means for holding a battery while terminal contacts for making electrical contacts with the battery electrodes are affixed on the battery support plate. [0005] The elastic band is formed from natural rubbers, synthetic rubbers, thermoplastic elastomers, elasticized fabrics, and blends thereof such that the elastic band exerts the right pressure between the terminal contact and battery electrode when the battery is inserted into the battery holder. Therefore, the current invention battery holder not only provides a universal battery holder for the variously shaped and sized batteries, but also minimizes the storage space as well as the cost of the battery holder by simplifying the battery holder structure.[0006] BRIEF DESCRIPTION OF THE DRAWINGS The foregoing and other features and advantages of the present invention will be more clearly understood from the following detailed description and the accompanying drawings, in which, [0007] FIG. 1 is a perspective view of the conventional battery holder. [0008] FIG. 2 is a perspective view of the elastic battery holder for the axial-type battery with two terminal embodiments of the present invention. [0009] FIG. 3 is a perspective view of the elastic battery holder, with the battery inserted, for the axial-type battery with two terminal embodiments with two terminal embodiments of the present invention. [0010] FIG. 4 is a perspective view of the elastic battery holder with a dual terminal contact with a barrier wall between adjacent terminal contacts. [0011] FIG. 5 is a perspective view of the elastic battery holder, with the battery inserted, and with a dual terminal contact having a barrier wall between adjacent terminal contacts. [0012] FIG. 6 is a perspective view of the elastic battery holder with a single battery support plate and a closed loop elastic band. [0013] FIG. 7 is a perspective view of the elastic battery holder, with an inserted battery, and with a single battery support plate and a closed loop elastic band. [0014] FIG. 8 is a perspective view of the elastic battery holder similar to FIG. 2 but with a clip-on terminal contact. FIG. 9 is a perspective view of the elastic battery holder, with an inserted battery, similar to FIG. 3 but with a clip-on terminal contact. [0015] FIG. 10 is a perspective view of the elastic battery holder similar to FIG. 4 but with a clip-on terminal contact. [0016] FIG. 11 is a perspective view of the elastic battery holder, with an inserted battery, similar to FIG. 5 but with a clip-on terminal contact. [0017] FIG. 12 is a perspective view of the elastic battery holder similar to FIG. 2 but with an extended cylindrical side wall. [0018] FIG. 13 is a perspective view of the elastic battery holder, with an inserted battery, similar to FIG. 3 but with an extended cylindrical side wall. [0019] FIG. 14 is a perspective view of the elastic battery holder similar to FIG. 4 but with an extended rectangular side wall. [0020] FIG. 15 is a perspective view of the elastic battery holder, with an inserted battery, similar to FIG. 5 but with an extended rectangular side wall.[0021] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT As shown in the accompanying drawings, the battery holder of the present invention essentially comprises an elastic band and a terminal contact affixed on a battery support plate. For the case of axial-type dry cell battery ([0022] 90), battery holder (100) consists of non-conductive plastic battery support plates (105a, 105b) having multiple rubber elastic bands (106a, 106b, 106c, 106d) attached evenly to both battery support plates. Battery support plates (105a, 105b) and elastic bands (106a, 106b, 106c, 106d) are used for inserting and holding a battery (90) within. Terminal contact (102a) is affixed on said battery support plate (105a) and terminal contact (102b) is affixed on said battery support plate (105b). Said terminal contact (102a) connects to a negative lead wire (107) penetrated through said battery support plate (105a) and said terminal contact (102b) connects to a positive lead wire (108) penetrated through said battery support plate (105b). As shown in FIG. 3, said battery holder (100), upon insertion of a battery (90) between the battery support plates (105a, 105b) and the elastic bands, with a negative battery electrode (109a) mating a negative terminal contact (102a) and a positive battery electrode (109b) mating a positive terminal contact (102b), expands the elastic bands (106a, 106b, 106c, 106d). The tension between the battery support plate and battery ensures that the expanded battery holder maintains proper contact between battery electrodes (109a, 109b) and terminal contacts (102a, 102b). FIG. 4 shows another embodiment of the battery holder ([0023]200) with non-conductive plastic battery support plates (205a, 205b) having multiple rubber elastic bands (206a, 206b, 206c, 206d) attached evenly to both battery support plates. Said battery support plates (205a, 205b) and said elastic bands (206a, 206b, 206c, 206d) are used for inserting and holding a battery (190) within. On said battery support plate (205a), two terminal contacts (202a, 202b) are affixed. Said terminal contacts (202a, 202b) connect to positive lead wire (207) and negative lead wire (208), each of which is penetrated through the battery support plate. Where there is more than one terminal contact on a battery support, as in FIG. 4, a barrier wall can be erected between two adjacent terminal contacts to prevent an electrical shortage of battery electrodes during battery insertion and removal. The other battery support plate (205b) does not have terminal contacts and provides battery support function only. As shown in FIG. 5, said battery holder (200), upon insertion of a battery (190) between the battery support plates and the elastic bands, expands the elastic bands and exerts tension between the battery support plates (205a, 205b) and battery (190) within the battery holder so that the expanded battery holder maintains proper contact between battery electrodes (209a, 209b) and terminal contacts (202a, 202b). This example invention can be used for a battery with positive and negative electrodes in one side. FIG. 6 and FIG. 7 show another embodiment of the present invention. As shown in FIG. 6, a battery holder ([0024]300) has elastic bands (306a, 306b) attached to a battery support plate (305). Each of the said elastic bands forms a closed loop by attaching both ends of the elastic band (306a) onto the single battery support plate (305). Said battery support plate (305) and said elastic bands (306a, 306b) are for inserting and holding a battery (290) within. Each of the three terminal contacts (302a, 302b, 302c) are embodied on said battery support plate (305) and connected to each of three lead wires (307, 308, 309) respectively. This type of construction can be used in multi-voltage battery types. For example, a battery pack (290) with three individual 3V cells connected in series and forming three terminal contacts on one side of the battery, can be controlled to become either 6V or 9V battery by selectively turning on/off the lead wires (307, 308, 309). If the lead wire (308) is off and the lead wires (307, 309) are on, the battery supplies 9V power and if the lead wire (308) is on and one of the lead wires (307, 309) is off, the battery supplies 6V power. FIG. 8 shows another embodiment of the present invention which is very similar to FIG. 2 but affixes a clip-on style terminal contact mechanism on a battery support plate. Battery holder ([0025]400) with non-conductive plastic battery support plates (405a, 405b) has multiple rubber elastic bands (406a, 406b, 406c, 406d) attached evenly to both sides of battery support plates (405a, 405b). Said battery support plates (405a, 405b) and said elastic bands (406a, 406b, 406c, 406d) are used for inserting and holding a battery (490) within. Terminal contacts (402a, 402b) are structured in clip style so that they can be attached to and removed from battery support plates (SOSa, 405b) by clipping on and off. Said terminal contact (402a) connects to a negative lead wire (407) and said terminal contact (402b) connects to a positive lead wire (408). As shown in Fig.9, said battery holder (400), upon insertion of a battery (390) between the battery support plates and the elastic bands expands the elastic bands (406a, 406b, 406c, 406d) and exerts tension between the battery support plates (505a, 405b) and a battery (390) so that the expanded battery holder maintains proper contact between battery electrodes (409a, 409b) and terminal contacts (402a, 402b). FIG. 10 shows another embodiment of the present invention which is very similar to FIG. 4 but employs a clip-on style terminal contact mechanism on a battery support plate. As shown in FIG. 10 and FIG. 11, battery holder (500) has non-conductive plastic battery support plates (505a, 505b) having multiple rubber elastic bands (506a, 506b, 506c, 506d) attached evenly to both sides of battery support plates (505a, 505b). Said battery support plates (505a, 505b) and said elastic bands (506a, 506b, 506c, 506d) are used for inserting and holding a battery (590) within. Terminal contact (502a, 502b) are structured in a clip style so that the terminal contacts can be attached to and removed from said battery support plates (505a, 505b) by clipping on and off. Terminal contact (502a) connects to a negative lead wire (507) and terminal contact (502b) connects to a positive lead wire (508). Where there is more than one terminal contact on a battery support plate, as in FIG. 10, a barrier wall can be erected between two adjacent terminal contacts to prevent shortage between battery electrodes during battery insertion and removal. The other battery support plate (505b) does not have terminal contacts and provides battery support function only. As shown in FIG. 11, said battery holder (500), upon insertion of a battery (490) between the battery support plates and the elastic bands expands the elastic bands and exerts tension between the battery support plates (505a, 505b) and a battery (490) so that the expanded battery holder maintains proper contact between battery electrodes (509a, 509b) and terminal contacts (502a, 502b). FIG. 12 shows another embodiment of the present invention which is very similar to FIG. 2 but employs a battery support plate with cylindrical wall. Battery holder ([0026]600) with non-conductive plastic battery support plates (605a, 605b) has multiple rubber elastic bands (606a, 606b, 606c, 606d) attached evenly to both sides of battery support plates (605a, 605b). Said battery support plates (605a, 605b) and said elastic bands (606a, 606b, 606c, 606d) are used for inserting and holding a battery (690) within. Said battery support plates (605a, 605b) have longitudinally extended cylindrical walls (645, 646) from the base of the plates. Terminal contact (602a) is forcefully inserted on said battery support plate (605a) and terminal contact (602b) is forcefully inserted on said battery support plate (605b). Terminal contact (602a) connects to a negative lead wire (607) penetrated through said battery support plate (605a) and terminal contact (602b) connects to a positive lead wire (608) penetrated through said battery support plate (605b). The cylindrical walls of said battery support plates (605a, 605b) can be not only circular in shape but also rectangular or other shapes. As shown in FIG. 13, said battery holder (600), upon insertion of a battery (590) between the battery support plates (605a, 605b) and said elastic bands (606a, 606b, 606c, 606d) expands the elastic bands and exerts tension between the battery support plates (605a, 605b) and the battery (590) so that the expanded battery holder maintains proper contact between battery electrodes (609a, 609b) and terminal contacts (602a, 602b). The cylindrical walls (645, 646) of said battery support plates (605a, 605b) assist the fitting of said battery (690) into said battery holder (600). FIG. 14 shows another embodiment of the present invention which is very similar to FIG. 4 but employs a battery support plate with a rectangular wall. Battery holder ([0027]700) with non-conductive plastic battery support plates (705a, 705b) has multiple rubber elastic bands (706a, 706b, 706c, 706d) attached evenly to both sides of battery support plates (705a, 705b). Said battery support plates (705a, 705b) and said elastic bands (706a, 706b, 706c, 706d) are used for inserting and holding a battery (690) within. Said battery support plates (705a, 705b) have longitudinally extended rectangular walls (745, 746) from the base of the plates. Terminal contact (702a) is forcefully inserted on said battery support plate (705a) and terminal contact (702b) is forcefully inserted on said battery support plate (705b). Said terminal contact (702a) connects to a negative lead wire (707) penetrated through said battery support plate (705a) and said terminal contact (702b) connects to a positive lead wire (708) penetrated through said battery support plate (705b). Where there is more than one terminal contact on a battery support plate, as in FIG. 14, a barrier wall can be erected between two adjacent terminal contacts to prevent shortage between battery electrodes during the battery insertion and removal. The other battery support plate (705b) does not have any terminals. As shown in FIG. 15, said battery holder (700), upon insertion of a battery (690) between the battery support plates (705a, 705b) and said elastic bands (706a, 706b, 706c, 706d) expands the elastic bands (706a, 706b, 706c, 706d) and exerts tension between the battery support plates (705a, 705b) and a battery (690) so that the expanded battery holder maintains proper contact between battery electrodes (709a, 709b) and terminal contacts (702a, 702b). Rectangular walls (745, 746) of said battery support plates (705a, 705b) assist said battery (690) to precisely fit into said battery holder (700). This example can be used for a battery with positive and negative electrodes on one side. The advantages achieved by the battery holder of the present invention are as follows: [0028] 1. the present invention can be collapsed into a very small space that allows carrying and storing in a very space-efficient manner since the main material of the battery holder is elastic, [0029] 2. one battery holder can house variously sized batteries if tension is properly adjusted, [0030] 3. a single battery holder can support multiple battery types with clip-on terminal contacts. [0031] Although the present invention has been illustrated and described with reference to the preferred embodiment thereof, it should be understood that it is in no way limited to the details of such embodiment but is capable of numerous modifications within the scope of the appended claims. [0032] Claims (12) What is claimed is: 1. A battery holder consisting of battery support plates with elastic bands attached to the battery support plates and extending outward as a means of holding the battery/batteries in place, with terminal contacts affixed on the battery support plates, so that the battery when inserted into the battery holder expands the elastic bands to create tension and, therefore, maintain contact between the battery electrodes and the terminal contacts. 2. A battery holder as claimed in claim 1, wherein two of said battery support plates, each with opposite terminal contacts, form one pair and are connected by the said elastic bands. 3. A battery holder as claimed in claim 1, wherein said elastic bands are attached to one battery support plate containing opposite terminal contacts in a closed loop configuration. 4. A battery holder as claimed in claim 2, wherein said elastic bands consist of multiple bands or elasticized fabrics attached around the circumference of the battery support plates. 5. A battery holder as claimed in claim 3, wherein said elastic bands consist of multiple bands or elasticized fabrics attached around the circumference of the battery support plate.
null
minipile
NaturalLanguage
mit
null
Contents By curing the hides with the blighted earth outside the Temple City, Sage Aeire believes she can create a cloak which will cause most of the Scourge minions to ignore your presence. You should blend right in, she says. She'd best be correct. It's our only chance to gather information and plan our counterattack. You should be able to find the earth she needs poking in the areas to the south and west of the fortress. Bring it to me when you've finished gathering it.
null
minipile
NaturalLanguage
mit
null
Pro-oxidants may fix metabolic defect in arthritis-driving T cells Researchers have uncovered a metabolic defect that spurs T cells to go rogue in rheumatoid arthritis patients. The findings suggest that prooxidants, chemicals that generate reactive oxygen species (ROS), rather than antioxidants that protect against ROS, may help fix this metabolic malfunction and quell joint inflammation. Rheumatoid arthritis is a common autoimmune disease in which overactive T cells trigger joint damage and inflammation. To better understand the metabolic underpinnings of this disease, which have been unclear, researchers analyzed rheumatoid arthritis patients' T cells, which they also transferred into human joint tissue-engrafted mice. They found that an imbalance in glucose metabolism can drive T cells to abnormally proliferate and spur inflammation. Instead of breaking down glucose to form ATP or energy like healthy T cells do, patient-derived T cells shunted glucose into the pentose phosphate pathway, which generated building blocks for new T cells as well as a molecule, called NADPH,that counteracts ROS toxicity. While some ROS are notorious for damaging tissues, they have also recently been understood to play an important role in regulating cell growth and survival. By reducing ROS levels, NADPH fueled reductive stress in T cells that accelerated their proliferation and conversion into pro-inflammatory T cells.
null
minipile
NaturalLanguage
mit
null
Q: Determining statistical significance of linear regression coefficient in the presence of multicollinearity Suppose I have a bunch of cities with different population sizes, and I wanted to see if there was a positive linear relationship between the number of liquor stores in a city and the number of DUIs. Where I'm determining whether this relationship is significant or not based on a t-test of the estimated regression coefficient. Now clearly the pop. size of a city is going to be positively correlated with both the number of DUIs as well as the number of liquor stores. Thus if I run a simple linear regression on just liquor stores and see if its regression coefficient is statistically significant, I will likely run into a problem of multicollinearity, and over-estimate the effect of liquor stores on DUIs. Which of the two methods should I use to correct for this? I should divide the number of liquor stores in the city by its population in order to get a liquor store per capita value and then regress on that. I should regress on both liquor stores and size, and then look to see if the liquor store coefficient is significant when controlling for size. Some other method? I honestly can't decide which seems more sensible. I vacillate between them, depending on which one I think about I'm able to convince myself that that's the right way. On the one hand liquor stores per capita seems like the right variable to use, since DUIs are committed by individuals, but that doesn't seem very statistically rigorous. On the other hand, controlling for size seems statistically rigorous, but rather indirect. Furthermore, if I rescale after computing the liquor stores per capita variable, I get very similar regression coefficients between the two methods, but method 1 produces a smaller p-value. A: I would regress the "DUI per capita" (Y) on "liquer stores per capita" (X) and "population size" (Z). This way your Y reflects the propensity to drunk driving of urban people, while X is the population characteristic of a given city. Z is a control variable just in case if there's size effect on Y. I don't think you are going to see multicollinearity issue in this setup. This setup is more interesting than your model 1. Here, your base is to assume that the number of DUIs is proportional to population, while $\beta_Z$ would capture nonlinearity, e.g. people in larger cities are more prone to drunk driving. Also X reflects cultural and legal environment directly, already adjusted to size. You may end up with roughly the same X for cities of different sizes in Sough. This also allows you introduce other control variables such as Red/Blue state, Coastal/Continental etc. A: If estimating your model with ordinary least squares, your second regression is rather problematic. And you may want to think about how the variance of your error term varies with city size. Regression (2) is equivalent to your regression (1) where observations are weighted by the square of the city's population: For each city $i$, let $y_i$ be drunk driving incidents per capita, let $x_i$ be liquor stores per capita, and let $n_i$ be the city's population. Regression (1) is: $$y_i = a + b x_i + \epsilon_i $$ If you run regression (2) without a constant, you've essentially scaled each observation of regression (1) by the population, that is, you're running: $$ n_i y_i = a n_i + b n_i x_i + u_i $$ This is weighted least squares, and the weights you're applying are the square of the city's population. That's a lot of weight you're giving the largest cities?! Note that if you had an observation for each individual in a city and assigned each individual the average value for the city, that would be equivalent to running a regression where you are weighting each city by population (not population squared).
null
minipile
NaturalLanguage
mit
null
Q: Accessing Ruby files in Dropbox I am very new to programming in anything. I want to get started with Ruby. I have a pc and laptop. I don't want to limit myself to just the pc. As long as Ruby is installed on both, of course, can I keep my project files in DropBox so I can work on them from either device? Thanks for your help. Don A: Yes. Source code files can be kept in Dropbox just like any other file. You can use Dropbox to keep your files in sync between your two computers. As you find yourself more comfortable with programming and make programs of greater complexity, you will probably want to use a version control system (VCS), such as Git. Among many other things, a VCS will keep your project files centralized in a repository. If the repository is in the cloud (e.g. on GitHub) you will be able to access it from all your computers.
null
minipile
NaturalLanguage
mit
null
Q: Hiding Login for WCM on Internet site What is the best solution for hiding login control on public facing WCM sites? Obviously putting the whole thing in a div would be straight forward but then, I don't see how people that will need access to the back-end can get it. i.e. editors, approvers etc. Is there a way to give them access through other means while not allowing visitors to see a login control? A: You can create an Authoring Site and extend this site and create a public website. Check out Publishing and Content Deployment Check out this article as well. This is pretty old but you will get some ideas.
null
minipile
NaturalLanguage
mit
null
Second wave reform in Alberta. Alberta Health Services formally came into existence on April 1, 2009, potentially signaling the start of a new wave of health restructuring in Canada. This article situates that change in the context of international trends in health restructuring and reviews some of the challenges faced by the new organization.
null
minipile
NaturalLanguage
mit
null
Police are appealing for witnesses after a pole was cut down and a speed camera stolen in Launceston. The camera at Kings Meadows Link Road is believed to have been cut from a four-metre pole by someone using an angle grinder in the early hours of Saturday morning. Passing drivers reported the theft about 5:00am. Police have used social media to appeal for information. "We know they are not the most popular addition to the state's infrastructure but ... this is beyond ridiculous," Sergeant Darren Turner said in a Facebook post. "This would have taken planning and time (someone must have been really peeved at their infringement notice) and we're appealing for anyone who may have witnessed suspicious activity around the speed camera to contact us." Sergeant Turner told ABC News it would have taken some time for the camera to be removed but if the motive was avoiding a speeding fine, it was a waste of time. "It's instant upload, fortunately the hard drive is located in another area and so that material hasn't been taken," he said. "Entry had to be forced to the box area that sits at the top of the pole and then they had to unplug several items to remove the camera and lens." The culprits also tried to tackle a second camera. "They've also entered another box, it's situated at that location and stole four batteries, four large batteries, each one of those weighed about 25 kilograms so the offenders would have been there for some time." Police estimate the value of the equipment at several thousand dollars.
null
minipile
NaturalLanguage
mit
null
Business & Finance ByCompiled from wire service reports by Steven Savides and Kristen Broman-WorthingtonAugust 7, 2003 The French government will be Alstom's top shareholder, with a 31 percent stake, under a $3.2 billion refinancing plan announced by the troubled engineering group. The rescue package still must be approved by current shareholders and will face European Union (EU) scrutiny as a possible state subsidy. Warning that Microsoft may face fines, the EU's executive Commission said preliminary conclusions of its four-year antitrust probe indicate the US software giant continues to use its "overwhelmingly dominant" position to try to monopolize markets for server and media software. The Commission recommended changes such as sharing additional code with competitors and offering versions of Windows either without Media Player or with rivals' software. EU Competition Commissioner Mario Monti said Microsoft has "a last opportunity to comment" before a final decision is made. The US government may suspend business with Sprint after the telecommunications firm overcharged the Justice Department more than $2 million between 2000 and 2002. Sprint said there was no intent to defraud and blamed a billing error. The threat to suspend Sprint, which has government contracts worth more than $600 million a year, comes a week after MCI was barred from new federal contracts amid rerouting allegations. Hyundai Motor Co. workers ended a partial strike, a spokesman for South Korea's top carmaker said, after management and union leaders agreed in principle to raise wages 8.6 percent and to trim the workweek from six days to five. The walkout began June 25 and inflicted $1 billion in production losses.
null
minipile
NaturalLanguage
mit
null
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. Please enable Javascript to watch this video OKLAHOMA CITY - A sign at a metro liquor store is getting some attention after it tells customers to stay out if their pants aren't up. "Pull your pants up or don't come in!!! Try to have some decency & respect for others. No one wants to see your underwear," said the sign at Midwest Wine & Spirits OKC. Employees at the store said, even though it may offend some people, the message is clear. "It's tacky, and it's gross and we're adults. Pull up your pants," said employee Shana Wiessner. Wiessner also said it's a matter of security. "Usually, when people come in with their pants sagging, it's easier for them to steal bottles," she said. People we spoke to had mixed reactions to the sign. "I agree with it," said customer Chad Gilbert. "I don't want to see anybody else's underwear. I realize wearing pants low is a fashion statement for some, but it doesn't work for me and I find it somewhat offensive." "I can see that if it was like a church," said customer Sunshine Weatherby. "There are families there, you might have a problem with that but this is a liquor store. I've seen worse at a liquor store." But, the store said, if you don't abide by the rules, you're welcome to leave. "We don't need their business if they're not going to be by the rules. We got rules around here, people," Wiessner said. 35.46756 -97.516428
null
minipile
NaturalLanguage
mit
null
When producing vacuum insulated glazing (VIG) units it is known from the art to provide an evacuation cup to enclose an evacuation opening or hole in one of the glass panes constituting the VIG unit in order to evacuate the interior void of the VIG unit so as to create a vacuum with an insulating effect between the glass panes of the VIG unit. It is known in the art to apply heating to the interior of the evacuation cup in order to seal off the evacuation hole after evacuating the interior void of the VIG unit. In WO 00/29703 it is disclosed to situate a glass tube in the evacuation hole and provide a seal between the tube and the edge of the evacuation hole by means of a soldering material which is softened in a general heating of the VIG unit to provide a gas tight seal around the tube. Afterwards, an evacuation cup is placed over the tube and the void is evacuated. A metal coil inside the evacuation cup and enclosing the tip of the glass tube is electrically heated to melt the tip of the tube and thereby provide a sealing of the void. Another evacuation cup and the use thereof for evacuating a VIG unit is disclosed in U.S. Pat. No. 5,855,638, wherein a heating coil situated external to the evacuation cup at one side thereof is applied to heat the cup after evacuation of the void of the VIG unit so as to soften a ball of a soldering material situated at the top of the evacuation hole so that it will plug the countersunk outer opening of the evacuation hole. An evacuation cup for evacuating of a VIG unit is disclosed in US 2015/047394, wherein a heating element is arranged movably inside the evacuation cup so that a sealing sheet can be fixed to the glass pane of the VIG unit by means of heating a solder material between the sealing sheet and the glass pane and thus sealing off the evacuation hole.
null
minipile
NaturalLanguage
mit
null
Wearable health trackers Activity-tracking devices made by companies like Fitbit, Jawbone and Misfit are increasingly popular gadget purchases, but they’re also making their way into the workplace: research firm Gartner estimates that 10,000 companies offered activity-trackers to staff in 2014. Their motivation is being questioned, however: will your boss have access to the data from these devices? (Imagine your annual review including criticism of your sofa-loafing nature at weekends). And will they share it with advertisers or insurance companies? Monitoring your night-time habits Personal sleep monitoring – sometimes using standalone devices or sometimes built in to fitness-trackers like Fitbit – sounds like a good idea, but would you want your employer to know how much shut-eye you’re getting? Meanwhile, a flurry of reports in 2013 called attention to the prospect of daily testing of employees’ alcohol levels, with fingerprint-scanning device AlcoSense TruTouch taking just 10 seconds to return a reading. “The benefits of testing all staff, every day are immense and the change in workforce behaviour is immediate,” explains the company on its website. Anyone for a mineral water? Work/life balance Some of the best things about workplace technology come outside your workplace: faster, more reliable broadband; powerful smartphones and tablets; better video and text chatting software all enable us to be more flexible in our working patterns. But one of the worst things about workplace technology also comes outside the workplace, because all this flexibility often erodes your work/life balance. It might be your boss’s fault – emails in the evening, expecting an immediate response, or conference calls on public holidays – but just as often it might be your own: checking emails in bed and treating the train home as an extension of your office hours. Augmented reality The Google Glass augmented-reality specs were essentially a toy for tech people with too much money to burn (“glassholes” as they were labelled). Google has gone back to the drawing board with that product but the one area where experts agree AR glasses are likely to catch on is in the workplace. From warehouse workers to plumbers and electricians, people will be able to access data and services with a flick of their eyes. The risks? Information overload: emails and notifications in your face throughout the day. And also the questions around recording video and audio, whether in terms of your boss demanding your first-person footage of a task, or simply the danger of an entire workforce becoming walking CCTV cameras. Anonymous feedback tools One of the elements of Amazon’s working culture picked out by the New York Times was its “secret feedback” system, used anonymously by employees to praise – or criticise – one another to bosses. Amazon claims most of the comments are positive but workers interviewed for the report said it could also be used to gang up on colleagues through coordinated campaigns of negative feedback. As this kind of “collaborative anytime feedback” technology spreads to other companies, moaning about colleagues in the pub could be replaced by anonymous complaints that feed directly into their performance reviews – and its anonymous nature may hamper their ability to defend themselves. Driving-monitoring apps Tracking drivers remotely is well established in industries like logistics but the emergence of smartphone driving-monitoring apps may expand the idea to anyone who drives a company car. Insurance companies including Aviva and Admiral have launched apps for drivers that score their driving safety based on cornering, braking and acceleration, and then offer the best ones a discount on their insurance. Employees will be aware of GPS technology being used to track their location to eliminate dilly-dallying, but data on their driving safety – especially in a device/car that’s used at weekends – adds a new layer. Sociometric badges That badge hanging from your neck to get in to your workplace? What if it also recorded your daily interactions? This is the idea behind sociometric badges, which capture “face-to-face interactions” of the wearer, as well as speech and body movement, then serve all this data up for analysis by employers. It might provide data on how well (or poorly) a salesperson is doing – “improving the employee-customer interaction” as one firm selling the technology puts it. The implications for workplace gossip, or even simply judging someone more on their social interactions than other aspects of their work, are complex. Happiness analytics Some sociometric badges are going further. Earlier this year, Hitachi unveiled a new badge – slogan: “Human Big Data” – which aims to measure your happiness. How? A mysterious algorithm based on your physical activity, from how quickly you walk to how often you nod. Hitachi says this data will be aggregated to provide an overall happiness score for a workplace, rather than used for bosses to grill individual staff about why they’re not happy enough. Mood-tracking is a hot area for tech development, from smart-rings measuring your sweat to wristbands monitoring your heart. Some, like headworn devices Melomind and Thync, even claim to change your mood via electrodes stimulating the brain. The science remains under debate, but the vision of your boss trying to make you wear a de-stress helmet is… a bit stressful. Facial recognition technology Privacy concerns around facial recognition tend to focus on two areas: its use by police and the government in the monitoring of citizens, and the worry that if Facebook is working on it (which it is), it must be up to no good. Employers don’t get mentioned often, but perhaps they should. Think about established fears of companies Googling potential employees or mining their Facebook and Twitter profiles, and then extend those into using software to scan for their faces in photos across the web – from drunken nights out to public protests. Security drones In 2015, consumer drones – as opposed to military ones – remain a plaything, with regulators still drawing up rules on how they can and can’t be used for commercial purposes. One of the uses being mooted is for building security: drones capable of zipping around buildings, filming any intruders. Concerns here don’t just include the risk of a drone falling out of the sky on to an employee’s head but the question of whether these drones will also film staff, and what will happen to the footage. Corporate security Most of these changes in the workplace will create huge amounts of data on employees, from personal activity and email archives to photographs and footage of them going about their business. Which begs the question: are the companies storing this technology able to do that securely, in an era when data breaches are increasingly common. If Ashley Madison, Sony Pictures and Carphone Warehouse fell victim to hackers, what makes you sure your company won’t? In an era of increased data collection within the workplace, what your employer plans to do with it may be the least of your worries.
null
minipile
NaturalLanguage
mit
null
Via Rail has pitched an unsolicited proposal to bring commuter rail to Halifax for "significantly" less cost than a plan that was rejected last year as being too expensive. The Halifax Regional Municipality has long debated operating a commuter train to relieve traffic. Most recently, a 2015 study said the rail option was too expensive. That study, on which Via Rail based its proposal, focused on a line from Windsor Junction to downtown, with seven stops, running multiple times a day. "I've heard from residents throughout HRM that think this is a great idea to be investigated. There's tremendous public support for rail," transportation committee member Coun. Tim Outhit said Monday. Outhit represents District 16 Bedford-Wentworth, through which the proposed line would run. Public cost unclear The cost in that earlier study pegged commuter rail between $36-62 million to start, with $8 million per year to operate. There's no estimate as to how much the latest proposal could cost the municipality. Via Rail, an independent Crown corporation, is subsidized by the federal transportation department to run passenger trains across Canada. The corporation declined an interview Monday, with a spokesperson saying by email it's looking to "assist and support" Halifax in offering commuter rail. 'Used to running railways' The transportation committee will consider in-camera the "pre-proposal," as Outhit called it, on Thursday. "These folks are used to running railways and of course, it would all integrate with our transit system," he said. "We'll just see what they have to offer and what price." Outhit said he's heard from Via Rail the corporation could have it up and running within a year after negotiations are completed. 'A little bit off-guard' The president of the union representing Halifax Transit bus drivers said he had concerns about the proposal. "I was caught a little bit off guard, to be honest. Typically transit likes to keep things in-house," said Ken Wilson, president of ATU Local 508. "I have more questions than answers at this point." He said he worries about the quality of existing rail infrastructure, the potential impact on bus driver jobs and added planning costs, given Halifax already approved a five-year transit plan that doesn't include rail. 'All day, frequent service' needed Scott Edgar, with the transportation advocacy group It's More Than Buses, says he'd want to see all-day, frequent service so people will trust the reliability and make taking the train a habit. "We'd want the train to be as cheap to operate as possible because that means it's going to be affordable to have the train operating more often," he said. 'Very good timing' Despite the sparse details so far, Outhit says he's in favour of opening negotiations with Via Rail, especially after having "real concerns" with high costs detailed in previous studies. "It was just very good timing for this; we are looking for potential partners," Outhit said. "We are looking to see if there's some way we can make rail viable, and Via Rail is looking to increase their presence in Atlantic Canada." Both the transportation committee and regional council would have to vote yes to open negotiations between the municipality and Via Rail.
null
minipile
NaturalLanguage
mit
null
Anterior cruciate ligament reconstruction (ACLR) is one of the most commonly performed procedures by orthopaedic surgeons.^[@bibr14-2325967118772043]^ A postoperative infection, despite occurring in less than 1% of cases, causes significant morbidity, including repeat surgery, graft failure, arthrofibrosis, and potentially irreversible changes to the articular cartilage.^[@bibr8-2325967118772043],[@bibr17-2325967118772043]^ Contamination of the ACLR graft is possible; however, there is no current literature with regard to the rate of bacterial inoculation during graft preparation for ACLR. Multiple potential sources of contamination exist, including gloves, gowns, and knife blades, as demonstrated by Davis et al.^[@bibr3-2325967118772043]^ To date, the marking pen as a source of contamination has not been studied. Nakayama et al^[@bibr10-2325967118772043]^ demonstrated a 6% incidence of positive cultures, predominantly *Staphylococcus epidermidis*, obtained intraoperatively from the skin adjacent to the incision in ACLR. Based on these results, it is possible that a surgical pen could transfer *S epidermidis* and other skin flora from the colonized skin to the graft. Marking pens are commonly used to mark skin incisions ([Figure 1A](#fig1-2325967118772043){ref-type="fig"}), not discarded, and then used to mark graft preparation sites ([Figure 1B](#fig1-2325967118772043){ref-type="fig"}). They are a potential source of graft contamination. The purpose of this study was to assess whether the sterile skin marking pen is a vector for contamination during ACLR. It was hypothesized that there would be a difference in the rate of culture-positive pens between control pens and the study pens used to delineate the proposed skin incision. ![(A) Patient's left knee, supine, demonstrating the use of a sterile marking pen on the skin for the proposed incisions and (B) marking of the hamstring autograft.](10.1177_2325967118772043-fig1){#fig1-2325967118772043} Methods {#section1-2325967118772043} ======= Twenty alcohol-based solvent surgical marking pens (Devon Surgical Skin Marker, Regular Tip; Covidien) were collected prospectively from patients undergoing ACLR between March 2013 and March 2014. Ten consecutive patients were chosen initially. After initial analysis of culture results, it was felt that an additional 10 consecutive patients were needed to add power to the study. The inclusion criteria for the study were patients older than 18 years undergoing arthroscopic ACLR and no previous knee surgery. A single sports medicine fellowship--trained orthopaedic surgeon (J.A.M.) performed outpatient arthroscopic ACLR at one academic outpatient surgery center with the use of a bone--patellar tendon--bone (BPTB) or hamstring autograft. All patients received intravenous cefazolin or clindamycin within 30 minutes of the incision. Before surgical site and incision marking, the patient's skin was cleaned with 2% chlorhexidine gluconate cloths (Sage Products) in the preoperative area, per standard hospital policy. DuraPrep Surgical Solution (3M) was then applied to the skin during preoperative preparation and was allowed to dry for 3 minutes before sterile draping. After draping, the patella and patellar tendon were outlined and arthroscopic portals marked with the sterile surgical marking pen. The mean length of total incisions marked was 8 cm. The pen tip was then immediately placed into a sterile culture and sent to a laboratory for a 5-day inoculation in broth and agar. All pens were removed from the surgical field before incision, and new marking pens were used when needed, per the senior author's (J.A.M.) standard operative technique. Positive controls were obtained by similarly marking the skin before application of the DuraPrep Surgical Solution using sterile gloves and instruments. One positive control was obtained per day rather than for each operative case. Negative controls consisting of new unopened pens handled directly in the laboratory were also cultured. Additionally, blank culture dishes were observed during the growth process to confirm that growth did not occur during the incubation period. Results were reported as either growth or no growth. Positive cultures were further classified using standard laboratory tests. This study was submitted and reviewed by our institutional review board and was determined to be exempt from further review under 45 Code of Federal Regulations (CFR) 46.102(d), as this work was judged to be a quality assurance activity. Further, cultures were not obtained from patients but from the marking pen itself. The senior author's current clinical practice is to dispose of the pen after skin marking in all surgical procedures. Therefore, this study represents the authors' current clinical practice, and because the cultures were obtained after removal of the pen from the field, no risk of contamination was present. All ethical standards of maintaining patient confidentiality have been employed, including those in accordance with the United States Health Insurance Portability and Accountability Act (HIPAA). A typical sterile surgical marking pen costs US\$0.53 in our hospital system. Results {#section2-2325967118772043} ======= Twenty patients met the study inclusion criteria, with 12 positive controls, 8 negative controls, and 9 blank dishes, for a total of 49 cultures. Three of the 20 study pens (15%) demonstrated positive growth. All 3 contaminated pens grew species of *Staphylococcus*, and 1 study pen also grew a species of *Bacillus* ([Table 1](#table1-2325967118772043){ref-type="table"}). Six of the 12 (50%) positive controls showed growth, while none of the 8 negative controls or blank dishes exhibited growth. Organisms found in the positive control and study groups were predominantly *Staphylococcus* but also included *Bacillus* and *Aspergillus* ([Table 2](#table2-2325967118772043){ref-type="table"}). No patients clinically developed a postoperative infection. ###### Study Pen Culture Results From 20 Consecutive ACLR Patients^*a*^ ![](10.1177_2325967118772043-table1) Study Pen Growth (+/--) Organism ----------- --------------- ---------------------------- 1 \+ *Staphylococcus* 2 \+ *Staphylococcus* 3 -- 4 -- 5 -- 6 -- 7 -- 8 -- 9 -- 10 -- 11 -- 12 -- 13 -- 14 -- 15 -- 16 \+ *Staphylococcus, Bacillus* 17 -- 18 -- 19 -- 20 -- *^a^*The study pen cultures were inoculated for 5 days in broth and agar. Three of the 20 (15%) cultures were positive for a *Staphylococcus* species. ACLR, anterior cruciate ligament reconstruction. ###### Positive Control Culture Results of 12 Pens^*a*^ ![](10.1177_2325967118772043-table2) Positive Control Growth (+/--) Organism ------------------ --------------- ---------------------------- 1 \+ *Staphylococcus* 2 -- 3 \+ *Staphylococcus, Bacillus* 4 \+ *Aspergillus* 5 \+ *Staphylococcus* 6 -- 7 \+ *Staphylococcus* 8 -- 9 \+ 10 \+ 11 \+ 12 \+ *Staphylococcus, Bacillus* *^a^*Positive controls were obtained by marking the skin before application of the sterile preparation solution (DuraPrep Surgical Solution; 3M) using sterile gloves and instruments. Six of the 12 (50%) cultures were positive. A post hoc power analysis was performed, assuming an alpha value of 0.05. This study failed to reach 80% power for study pens versus negative controls (*P* = .53; power = 0.0014), study pens versus positive controls (*P* = .05; power = 0.50), study pens and positive controls versus negative controls (*P* = .16; power = 0.49), or positive controls versus negative controls (*P* = .04; power = 0.61). Power reached exactly 80% for positive controls versus blank dishes. Discussion {#section3-2325967118772043} ========== The most important finding of this study was that 3 of 20 (15%) marking pens used on skin after application of a sterile preparation solution were found to be contaminated, specifically with *Staphylococcus* species. There was a difference in the rate of culture-positive pens between the control pens and study pens, confirming the study hypothesis; thus, surgical marking pens should be considered a potential source of contamination. Although not the primary aim of this study, there was a statistically significant difference in the inoculation rate of study pens versus positive controls and positive controls versus negative controls. Causes of postoperative septic arthritis after ACLR more frequently include *S epidermidis* and *S aureus* but can also consist of less common organisms such as *Peptostreptococcus*, *Pseudomonas*, *Escherichia coli*, *Enterobacter aerogenes*, and *Propionibacteriaceae.* ^[@bibr2-2325967118772043],[@bibr5-2325967118772043][@bibr6-2325967118772043]--[@bibr7-2325967118772043],[@bibr9-2325967118772043],[@bibr13-2325967118772043],[@bibr15-2325967118772043],[@bibr16-2325967118772043],[@bibr18-2325967118772043]^ A study by Davis et al^[@bibr3-2325967118772043]^ found that 63 of 100 joint replacement procedures had some sort of field contamination by *S epidermidis*, as found on sucker tips, light handles, skin blades, gloves, gowns, and needles. Infections after arthroscopic surgery have been similarly linked to *S epidermidis* operative field contamination that is introduced into the joint through mechanisms such as preoperative razor shaving and use of contaminated inflow cannulas, graft boards, and suture clamps.^[@bibr1-2325967118772043],[@bibr13-2325967118772043],[@bibr15-2325967118772043]^ Studies have shown other risk factors for the development of postoperative septic arthritis after ACLR to include intra-articular corticosteroid joint injection, previous knee surgery, and meniscal repair.^[@bibr1-2325967118772043],[@bibr6-2325967118772043],[@bibr9-2325967118772043]^ The mechanism of surgical site inoculation with microorganisms, including *S epidermidis*, during ACLR is not always traceable, however. In one study of 1231 patients undergoing ACLR with 6 postoperative infections (0.5%), neither surgical instruments nor the technique could be identified as the source of the infection.^[@bibr2-2325967118772043]^ Another study of 1615 ACLR cases revealed that 8 of 11 postoperative septic arthritis infections were caused by *S epidermidis* from an unknown source, possibly from contamination during or after surgery.^[@bibr6-2325967118772043]^ The recent literature has attempted to resolve the uncertainty surrounding the unknown mechanisms and rate of contamination during ACLR by looking at the autograft preparation technique. A 2008 study by Hantes et al^[@bibr4-2325967118772043]^ of 60 patients undergoing ACLR examined the autograft preparation process (both BPTB and hamstring tendon) at 3 different time intervals and found a graft contamination rate of 12%. *S epidermidis* contaminants were first identified in each of the 3 different time intervals, but no reason was given for why a contaminant would first appear at a different time interval in graft preparation. This study did not find any statistically significant difference between autograft type and contamination rate. However, a more recent investigation demonstrated an 8 times higher infection rate with the use of hamstring autografts as compared with BPTB autografts.^[@bibr8-2325967118772043]^ One potential explanation is that the typical practice is to mark the hamstring grafts but not patellar tendon grafts. The graft itself may be a source of contamination before and/or after marking it with a sterile pen. Some authors have advocated soaking the grafts in antibiotics (ie, vancomycin sponges), which have demonstrated decreased infection rates.^[@bibr11-2325967118772043],[@bibr12-2325967118772043]^ To our knowledge, no previous study has evaluated the surgical marking pen as a possible fomite for intraoperative graft bacterial transmission during ACLR. During ACLR, the standard practice is for the surgeon to mark the prepared surgical site with a sterile surgical pen. This surgical pen is then used during the preparation process to mark the ACLR graft. Results of a 2012 study by Nakayama et al^[@bibr10-2325967118772043]^ support the suggestion that a surgical pen used on prepared skin may transfer microorganisms into the joint during ACLR. Their study of 50 patients undergoing ACLR revealed that 46% had preoperative bacterial colonization of the skin. After the skin was prepared intraoperatively, 6% still had positive skin colonization near the incision site, and 2% had positive graft colonization. The majority of this colonization (93%) was *S epidermidis*. Based on these results, it is possible that a surgical pen could have transferred *S epidermidis* from the colonized skin to the graft. Our study likely represents the best-case scenario, as the pens were processed immediately as opposed to letting them incubate and sit out exposed during the procedure. Different types of sterile surgical marking pens have been analyzed for their capacity to resist bacterial colonization. As early as 2006, a laboratory study cultured skin markers of different solvent bases (eg, alcohol vs water) that had been contaminated with methicillin-resistant *S aureus* (MRSA); one marker type continued to produce positive MRSA cultures for up to 3 weeks after inoculation.^[@bibr19-2325967118772043]^ Alcohol- and ethanol-based markers seem to manifest rapid bactericidal action, usually within minutes. In our study, all pens were standardized and used an alcohol-based solvent. Limitations {#section4-2325967118772043} ----------- This study is not without its limitations. Cross-contamination from sterile gloves or instruments may have led to false-positive results in the study pens; however, no growth was observed for the negative controls or the blank dishes. Unexpectedly, 6 of the positive controls showed no growth. This is likely because of the use of Sage cloths preoperatively, which may have affected the test samples and may have led to underestimation of the contamination rates. ACLRs only, and not all knee arthroscopic procedures, were included. In addition to skin marking, ACLR involves markup of the graft during the procedure. Including only ACLR and not other procedures emphasized this further markup of the graft and helped to simplify the methodology of the study design. Last, the sample size used was small and underpowered. However, any evidence of contamination is concerning, especially considering the cost-effective and low-risk alternative of using a new sterile pen intraoperatively. Conclusion {#section5-2325967118772043} ========== After obtaining cultures of marking pens used to mark the sterile field, we found that the marking pens had a 15% rate of contamination. Infections are rare but may result in significant morbidity, and all measures to reduce these should be pursued. Surgeons performing ACLR should consider disposal of the surgical marking pen after skin marking and before intraoperative use such as graft markup. We recommend that surgeons use a fresh marking pen when marking the graft is required. This requires minimal cost and effort. One or more of the authors has declared the following potential conflict of interest or source of funding: A.J.K. has received research support from Aesculap/B. Braun, the Arthritis Foundation, Ceterix, and Histogenics; is a paid consultant for Arthrex, DePuy Orthopaedics, and Vericel; receives intellectual property royalties from Arthrex; has received honoraria from the Musculoskeletal Transplant Foundation; and has received hospitality payments from Arthrex and the Musculoskeletal Transplant Foundation. J.A.M. is a consultant for Arthrex, Smith & Nephew, and Vericel; has received honoraria from the Musculoskeletal Transplant Foundation; and has received in-kind materials from Gemini Medical. Ethical approval for this study was waived by the University of Minnesota Institutional Review Board (study No. 1506M74861).
null
minipile
NaturalLanguage
mit
null
Some computer systems incorporate multiple processors that run simultaneously on a common host bus. A host "chipset", which usually includes several host chips, is used for system control to connect (or "bridge") the processors to memory and various busses (e.g., PCI1, PCI2, IDE). FIGS. 1A through 1C show dual-processor configurations with conventional host bus routing schemes. A host bus, which includes an address/control bus 8 and a data bus 9, interconnects processors 3 and chips 7 (from a host chipset) to one another. (Dashed lines 8 and darkened lines 9 generally represent bus routing paths for the address/control and data busses, respectively.) Each processor 3 has a contact grid which includes two rows of electrical contacts: A1-A121 and B1-B121. The electrical contacts are divided into an address/control section 4 and a data section 5. In turn, as is depicted in FIG. 1A and 1B with host chips 7 from an Intel 440FX.TM. chipset and an Intel Orion.TM. chipset, respectively, dedicated host chips, which connect either to the address/control bus 8 or to the data bus 9, are used with conventional dual-processor arrangements. The processors 3 are typically configured into a spaced-apart pair, with their contact grids oriented in the same direction. Between processors 3, host chips 7 are located proximate to their connected contact grid sections so as to minimize the data bus 9 and address/control bus 8. As noted above, orienting the contact grids of a pair of processors in the same direction is conventional design. It appears that this design was chosen for two primary reasons. First, it is logically somewhat simpler for a human designer to have two complex sets of contacts placed in a common orientation. The designer can count on the same pins being in the same location with no mental transformation required in planning the connections to both chips. That is, the array of data pins on each processor is aligned with the corresponding array on the other processor and individual pins are also aligned. Likewise, the arrays and the individual pins of the address/control sections are also aligned. Second, as seen in FIGS. 1A and 1B, to the extent bus connections can run from the data section of one processor to the data section (or address/control section) of the other processor with only one or two connections to dedicated chips in between, the high level layout is easier to visualize. However, improvements in chipset design have led to chipsets that incorporate multiple non-dedicated chips, which require connections to both the host data and host address/control busses. Unfortunately, as seen in FIG. 1C (with chips 5 from a Micron Samurai.TM. chipset) such chipsets cause bus routings to increase in length and become more congested, which results in multiple bus crossovers. Extra board layers may be needed to accommodate these crossovers. Moreover, longer bus traces not only consume excessive board space, but also increase noise problems that are associated with line reflections. In addition, when dual processors are mounted in vertical packages (e.g., single edge cartridges) with their contact grids oriented in the same direction, their heat dissipation surfaces (along with associated heatsinks) will normally face the same direction. Cooling both heatsinks requires either a sufficiently wide fluid stream or two separate fluid streams to adequately encounter each processor's heatsink. Thus, excessive board space is consumed to accommodate a wide fluid propeller (or propellers) for generating such a fluid stream(s). It will be evident that the conventional configuration of paired processors facing the same direction is just one possible choice. The processors could be placed in a variety of spacial configurations relative to each other, by selecting from all the different rotational, distance and angular options available. However, each selection has implications for thermal, mechanical, and electrical design. Accordingly, what is needed in the art is a dual processor arrangement with improved host bus routings and an improved scheme for cooling the processors.
null
minipile
NaturalLanguage
mit
null
The proposed program of research is designed to elucidate the biochemical mechanisms of chemical carcinogenesis in laboratory animals and to develop from these studies certain analytical techniques capable of assessing the exposure of human populations to chemical carcinogens. These investigations will include studies of: the biochemical mechanisms, particularly relative to free radicals, which govern the conversion of carcinogens to their active forms in the target tissues and the relation of these processes to cellular electron transport systems; the roles, in the the process of carcinogenesis, of a specific NO-Fe-protein free-readical induced in rat liver by hepatocarcinogens; the relationship between metabolic conversion of carcinogens and the excretion of carcinogen intermediates in the urine; perfection of techniques based on bacterial mutagenesis and a new electron spin resonance (ESR) technique--hyperfine labelling--to detect, identify and estimate aromatic carcinogen intermediates in urine and tissues; analysis of the free-radicals induced by X-irradiation in normal and neoplastic tissues and in tissues exposed to carcinogens; possible prediction of X-ray sensitivity of tumors from ESR analysis of biopsies; the possible applicability of urine analyses techniques developed in relation to the foregoing studies to studies of the exposure of human populations to chemical carcinogens.
null
minipile
NaturalLanguage
mit
null
Molecular dynamics of a biodegradable biomimetic ionomer studied by broadband dielectric spectroscopy. Broadband dielectric spectroscopy was used to investigate the bulk molecular dynamics of a recently developed biodegradable biomimetic ionomer potentially useful for biomedical applications. Isothermal dielectric spectra were gathered for a phosphoryl choline (PC)-functionalized poly(trimethylene carbonate) (PTMC) ionomer and unfunctionalized PTMC at temperatures ranging from 2 to 60 degrees C over a broad frequency range of 10(-3) to 10(6) Hz. Four relaxations were clearly identified, two of which were shown to stem from the PTMC polymer backbone. A detailed analysis showed that the formation of zwitterionic aggregates was responsible for the material's bulk functionality and that bulk conduction processes may provide useful information for assessing the PC ionomer as a candidate for drug delivery applications. Finally, it was concluded that absorbed water concentrates around the aggregates, resulting in an increased mobility of the PC end-groups.
null
minipile
NaturalLanguage
mit
null
1/2oz Chartreuse size 5 Spinner UV Coated. Made with 1/2 ounce body #5 Indiana blade and a quality #2x Eagle Claw size 6 hook. Great for catching Brown and Rainbow Trout, Steelhead, Large and Smallmouth Bass and Northern Pike.We have over 20 colors so if you don’t see you favorite color combo please contact us. This is an official Ski's Spinners product and is hand assembled in Zeeland, MI, USA. Write a review Description UV Coated. Made with 1/2 ounce body #5 Indiana blade and a quality #2x Eagle Claw size 6 hook. Great for catching Brown and Rainbow Trout, Steelhead, Large and Smallmouth Bass and Northern Pike.We have over 20 colors so if you don’t see you favorite color combo please contact us. This is an official Ski's Spinners product and is hand assembled in Zeeland, MI, USA.
null
minipile
NaturalLanguage
mit
null
Accessorising theirs with a suit and some handcuffs in a Fifty Shades of Grey-theme, Vermont Teddy Bear are changing up teddy's innocent image. The highly-anticipated film, based on the erotic romance trilogy written by E L James, stars Jamie Dornan as sex-obsessed businessman Christian Grey and Dakota Johnson as his on-screen lover Anastasia Steele. It is due to be released on 13 February next year. Manufactured by American company Vermont Teddy Bear, the bear is dressed in a black suit in the style of main character Christian Grey, this teddy bear also comes with a tiny pair of handcuffs and a black blindfold. Download the new Independent Premium app Sharing the full story, not just the headlines The product description on their website reads: “Surprise the one you can’t get enough of with this irresistible Bear made with smoky fur and smouldering blue eyes. “He’s more than 50 shades of fun, and your Valentine can’t help but submit to loving him.” Despite the raunchy accessories attached to the bear, Vermont even suggest that it is apparently “safe for all ages” and remind parents to “remove any outfit or accessories before giving this Bear to a child young than three years of age”. Yours for a cool £53.99 ($89.99), the teddy bear’s price tag could make even some of Harrods’ wealthiest customers spit out their drinks with shock. With the kinky attire aside, the price could make one question the motive behind parents giving this to a child in the first place. Perhaps the more classic choice of Paddington Bear from Hamleys is a safer option?
null
minipile
NaturalLanguage
mit
null
hi all when i get up to 70mph the genlight comes on. would that be a loose belt or something internal. im also after a second hand mirror as all my chrome is well aged and a bit pited. i need one on the passenger side as trying to pullout in traffic is hard when you are on the wrong side in australia. thanks eddy Ian, I will assume your generator brushes are good. If you're not sure, give them a check. New generator brushes are cheap. It's important you understand how the GEN light works. On one end, the bulb is fed from your key switch (positive). On the other end, it's fed from your generator (also positive). So, now we can measure the difference between your battery voltage and your generator's output voltage. When you first turn the key on before starting the engine, your GEN light shines because the generator is putting out nothing but the battery has 12-volts. If you throw a belt, your GEN light shines, for the same reason. If you have your accessories on and stopped at a light, your GEN light might flicker because the gen is putting out very little at idle speed but the battery is at 12-volts. Ok, I led you around the barn. Now the real answer. You may have a voltage regulator that is bad. The voltage regulator supplies field voltage to the generator so the gen can produce power. Without field, the gen puts out nothing. Without a belt, the gen puts out nothing. Even still, that important GEN light draws a comparison to tell you if your system is charging or not. ALWAYS make sure your GEN light works. If you turn the key and it doesn't shine, buy a new bulb (I think it's a #57). How do you know when the battery is charging? Put a voltmeter across the battery terminals and look for 13.5-volts or more when the engine is above idle speed. To prove your generator can produce, jumper the BATT and FLD terminals on your voltage regulator and watch the voltmeter on your battery climb. Don't leave the jumper on for long because you are bypassing all voltage regulation. I use one minute intervals. When the generator is charging, you can hear the engine speed go down and sometimes you can hear the generator as it produces power. Hope this helps. - Dave Yes, and if you converted to an alternator you'll see the Gen light glow. It glows brighter when you add headlamps, blower, radio, and stoplights-especially at idle. I'm surprised at how hard the alternator works trying to charge the battery. My belt will squeal after sitting at a stop light for a while with the voltage demand increased. (A bit embarrassing, but one alternator expert says 'tighten the belt'!) Dave , I have to disagree on how to test generator / regulator output. "B" circuit generator / regulator (original Thunderbird). You NEVER want to jump battery terminal to field terminal at the regulator with the wires attached to the regulator. This will burn out your voltage regulator field contact system in your regulator. Testing your generator / regulator for output : Remove field wire from voltage regulator and with engine running at 1200 to 1500 rpms. Touch the field wire to armature terminal at regulator for a few seconds. If the voltage increases to 14 to 15 volts. The voltage regulator is bad. No change in voltage the generator is bad or wiring issues. This test is unregulated so do not run for more than a few seconds to read your volt meter. Dave , I have to disagree on how to test generator / regulator output. "B" circuit generator / regulator (original Thunderbird). You NEVER want to jump battery terminal to field terminal at the regulator with the wires attached to the regulator. This will burn out your voltage regulator field contact system in your regulator. Testing your generator / regulator for output : Remove field wire from voltage regulator and with engine running at 1200 to 1500 rpms. Touch the field wire to armature terminal at regulator for a few seconds. If the voltage increases to 14 to 15 volts. The voltage regulator is bad. No change in voltage the generator is bad or wiring issues. This test is unregulated so do not run for more than a few seconds to read your volt meter. Mike, your suggestion is plausible BUT it doesn't get the job done. Mike, study the wiring diagram and notice that the armature and field are already connected via both normally closed contacts. If you go through your procedure, nothing has changed. I'm trying to determine if the generator is capable of outputting charging current. Since I suggest adding a temporary jumper from +12 to the field with the engine running, there is nothing that can be harmed. Remember, during normal operation the generator's armature outputs 30-amps at ~14-volts. All that is impressed upon the field until either (voltage or current) relay contacts open. ALSO, the GEN light is already connected to the armature (and field coils) as soon as the key is turned 'on' through both the regulator's N.C. contacts. This 'tickles' the armature and makes enough magnetism (in the correct direction) to start producing current when the armature windings pass through the field magnetism. There should be NO reason to 'flash' or 'polarize' a charging system with a GEN light. Case in point: How many Squarebird owners had to polarize, even after 50 years? DeanJ, you should have a resistor across your GEN light wires for two reasons; to shunt that small amount of current that makes your light flicker but more importantly... If your GEN light burns out, the alternator will not know the key is on and it will stop charging. The resistor will pass enough power by itself to keep the alternator going. Even with the resistor, your GEN light should work as you would expect. - Dave DeanJ, you should have a resistor across your GEN light wires for two reasons; to shunt that small amount of current that makes your light flicker but more importantly... If your GEN light burns out, the alternator will not know the key is on and it will stop charging. The resistor will pass enough power by itself to keep the alternator going. Even with the resistor, your GEN light should work as you would expect. - Dave Dave, I wouldn't know what resister to use. I take it a good spot for this might be the engine compartment close to the alternator since anything under the dash is a pain. Again, the reason is just to keep the GEN light from burning out prematurely and the alternator functions normal? Dean, sometimes I assume too much. this time I assumed you had the wiring diagram for your conversion. Here it is: Notice the resistor in the top blue box. Use a 1/2-watt, 560-ohm resistor. Any radio shop will have one. The resistor simply connects across the light bulb socket. You cannot stop a bulb from burning out so the resistor keeps your charging system going whether the bulb burns out or not. It also shunts a small amount of current which stops that flickering. These old starter motors and generators use brushes. To be more specific, ALL charging current goes through those brushes (unlike alternators). They do not last as long as modern alternators. The same holds true for starter motors, all current goes through the brushes. Rockauto.com sells brushes for $6-7. They are relatively easy to change. Ford provided inspection covers to show what's really going on. It always puzzled me, why people let their starters and generators go until catastrophic failure when preventive maintenance is not only cheap but available. In The States, these original starters and generators aren't always available. When that happens, the prices soar. If you're lucky enough to get an early warning, don't wait until failure catches you far from home. - Dave personally I would never put a resister in parallel with the charge light. The charge light is the first port of call on your charging systems health. If you "gen" light didn't come on when turning your ignition on it should be investigation straight away and the assumption shouldn't be made that the globe is just blown the resister will keep things working because 9 out of 10 times it won't be the globe, it will be a charging system fault. On most alternators the alternator warning light provides excitation by having ignition on one side of the globe, that power passes through the globe down to the D+ wire on your alternator which in turn connects to your rotor positive brush, that signal then goes through your rotor out the negative brush through the regulator then to earth turning the light on and providing a slight magnetic field for initial charging. This in turn informs you if the regulator, brushes, or rotor coil are functioning correctly, any fault that will not allow the light to turn on. Driving, racing or working on cars can be hazardous. The procedures and advice on this website including the message board are opinion only. Squarebirds.org and its webmasters and contributors do not guarantee the correctness of the advice and procedures. The Squarebirds.org and its webmasters assume no liability for any damage, fines, punishment, injury or death resulting from following these procedures or advice. If you do not have the skills or tools to repair your car, please consult a professional. By using this site you agree to hold harmless the Squarebirds.org, its authors and its webmasters from any resulting claim and costs that may occur from using the information found on this site. Any submissions to this site and any post on this site becomes property of Squarebirds.org . The webmasters reserve the right to edit and modify any submissions to this site. All material on this is site is copyrighted by the Squarebirds.org. Reproduction by any means other than for personal use is strictly prohibited. Permission to use material on this site can be obtained by contacting the webmasters. Copyright 2002-2016 by Squarebirds.org.
null
minipile
NaturalLanguage
mit
null
Validating the enchytraeid reproduction test: organisation and results of an international ringtest. In this paper the experiences concerning the organisation and results of the enchytraeid reproduction test (ERT) ringtest are summarised (for details see J. Römbke, T. Moser, Organisation and Performance of an International Ringtest for the Validation of the Enchytraeid Reproduction Test, vols. I and II. UBA-Texte 4/99, 1999, 150, 223 pp). The performance of this ringtest was in line with requirements published by OECD. It was sponsored by the German Federal Environmental Agency (Umweltbundesamt; UBA, Berlin). The UBA was also actively engaged (together with the European Chemicals Bureau, Ispra) in a scientific task force, which consisted of seven scientists experienced in terrestrial ecology and ecotoxicology. 29 institutions (mainly from universities and contract research laboratories) from 15 countries of Europe and North America participated actively in the ringtest. The co-ordinating laboratory centrally distributed the test chemicals, guidance papers and test organisms to all participants. In addition, several training courses were organised. Most participants performed two tests with the fungicide Carbendazim and two with 4-nitrophenol. For each chemical, one test was designed according to an ECx approach and the other according to an NOEC approach. Several aspects of the test protocol were modified based on the experiences gained during the ringtest. A major aspect of the project was the detailed statistical evaluation of the test results (for details see A. Weyers, J. Römbke, T. Moser, T. Ratte, Results of and statistical implications from the enchytraeid reproduction ringtest, 2001, submitted), leading to recommendations for an optimised ecotoxicological test design. A total of 92 tests were performed according to the protocol which is among the highest number ever performed in a ringtest. About 72% met the validity criteria (control mortality < 20%, > 25 juveniles per 10 adults). The effects of the two test chemicals on enchytraeid reproduction were in the range expected from data in the literature on oligochaete toxicity. However, statistical evaluation of the data was sometimes difficult as a result of the high variability in the number of juveniles. This variability was caused by several reasons, including hormesis effects or lack of experience of some participants. Comparison of the data from the NOEC and ECx approaches pointed to a clear advantage in favour of the latter. In most cases EC10 values were lower than the NOEC values determined in the same test. For details see A. Weyers et al. (loc. cit.). Reproducibility of the test data and practicability of the ERT ringtest were of the same order of magnitude as other ringtests recently performed. As a result of the ringtest, the ERT draft guideline was significantly improved. The new version is currently being standardised by OECD, ISO and ASTM.
null
minipile
NaturalLanguage
mit
null
1. Field of the Invention The invention relates generally to memory systems, and more particularly to systems and methods for enabling memories to operate properly despite the presence of multiple defective memory cells. 2. Related Art Digital circuits are becoming increasingly complex. It is not unusual for one of these circuits to be made up of millions of transistors. As digital circuits become more complex, they typically have greater capabilities, but there is also a greater chance that one or more of the components of the circuits will not operate properly. In some instances, even a single incorrect bit can cause a malfunction that will render an entire circuit useless. This may be particularly true of expensive digital circuits, such as advanced microprocessors. It is therefore very important to minimize the number of defects that arise in the manufacturing of digital circuits. Even though a great deal of effort goes into minimizing the number of defects that are present in digital circuits, it is virtually impossible to eliminate all defects. Consequently it is important, not only to minimize the number of defects that arise during manufacturing processes, but also to take advantage of mechanisms that allow digital circuits to operate properly even in the presence of these defects. Memory systems provide one example of systems that can be designed to operate normally despite having one or more defective memory cells. A memory array includes a large number of identical memory cells, each of which can store a single bit of data. A set of these memory cells can store a block of data (e.g., an eight-bit byte or a 32-bit word) that has a unique address within the memory array. If a single memory cell in the array is defective, data that is stored at an address in the array which includes the defective cell may be corrupted, and a program using this data may produce erroneous results. Because the memory cells are functionally identical, however, a mechanism may be provided to substitute properly operating memory cells for the defective memory cells. Conventionally, this memory replacement is achieved using a line-replacement redundancy mechanism in which a defective row or column of memory cells is replaced functionally by a redundant row or column that is provided in the memory array. In some systems, there is a single redundant row or column, although in more recent systems there may be several. If it is determined that a particular row or column of the memory array is defective, a memory management circuit coupled to the memory array is configured to access the redundant row or column in place of the defective row or column. Put another way, an address translation is effectively performed for a single row/column of the memory array, so that when there is an attempt to access the defective row/column, this access is redirected to the redundant row/column. While a conventional line-replacement redundancy mechanism may be effective to enable use of a memory array despite a small number of defects, this mechanism has some shortcomings. For instance, typically, only one or a few replacement rows/columns are available to replace defective rows/columns. Providing additional replacement rows/columns can be prohibitively expensive, especially in the case of cache memory that is constructed on the same chip as a processor. As the size of cache memories increase, the potential for defective memory cells increases as well, but it is difficult to scale up the line replacement mechanism to meet the increased potential for defects. It would therefore be desirable to provide improved systems and methods to enable memory systems, and particularly cache memories, to operate properly despite an increasing number of potentially defective memory cells, thereby increasing the yield of corresponding devices.
null
minipile
NaturalLanguage
mit
null
Competitive Events compete against top students at the regional, state, and national levels! At the State Leadership Conferences, students compete in events testing their business knowledge and skills. Top state winners are then eligible to compete for national awards at the National Leadership Conference each summer. There are over 60 different competitive events you can choose to compete in, ranging from Digital Video Production and Word Processing to Accounting and Sports Management. Each event is governed by specific guidelines and rating sheets that can be found below, and in the Competitive Events section of the Chapter Management Handbook, updated and published each August. Make sure you are using the most recent version of the guidelines to prepare for your competition. Please review the Maryland Competitive Events Guide (2014-2015 edition) in conjunction with the National FBLA Competitive Events Handbook. The Maryland Competitive Events Guide provides eligibility guidelines for regional conferences and the State Leadership Conference, as well as guidelines and information for state specific events that are not offered on the National level. In most instances the Maryland Competitive Events Guide references the National FBLA Competitive Events Handbook, but there are a few exceptions that are outlined in the Maryland Competitive Events Guide. Competitive events fall into three categories: individual, team, and chapter. Individual and team events focus on skills useful in leadership and career development; chapter events recognize overall achievement and performance in chapter management and growth. Competitive Events Documents SINCE 1957Maryland FBLA was established in April 1957, with the first chartered chapter at Forest Park High School in Baltimore.There are five administrative regions in Maryland FBLA, each headed by a Regional Vice President. In January and February, each region holds a competition to decide the members eligible to compete at the State Leadership Conference in the spring. Members placing first, second, third, or fourth in their competitive event at the SLC are eligible to compete at the National Leadership Conference hosted by National FBLA-PBL.
null
minipile
NaturalLanguage
mit
null
The widening ability to associate people's real-life identities with their browsing habits marks a privacy milestone. In pursuit of ever more information, tracking companies are redefining what it means to be anonymous. Many popular Facebook apps obtain sensitive information about users—and users' friends—so don't be surprised if details about your religious, political and even sexual preferences flow to unexpected places. Lenovo's chief technology officer, Peter Hortensius, acknowledged that "we didn't do enough" due diligence before installing Superfish, but that the company doesn't believe laptop owners were harmed by the app. Google is opposing a proposal that would make it easier for law enforcement to get warrants to hack into computers, the latest skirmish between Silicon Valley and the U.S. government in the wake of Edward Snowden's revelations about widespread spying. The Dutch government is reluctant to scrap the law for security reasons. Authorities are seeking to broaden surveillance powers following recent terrorist attacks in Paris and Copenhagen and a growing number of homegrown radical Muslims. Watched: A Wall Street Journal Privacy Report As surveillance technologies decline in cost and grow in sophistication, tracking of many aspects of our daily activities, even the seemingly mundane, has become the default rather than the exception. The Wall Street Journal's Watched project—the latest in a years-long series on privacy—explores the impact of ubiquitous surveillance on citizens and society. Multimedia Multimedia Multimedia Multimedia A Wall Street Journal study suggests office-supply site Staples.com offers different prices to people after using their computer's "IP address" to estimate their ZIP Code. See what the Journal found in your area. The Wall Street Journal tested popular websites to see what personal and identifying information they shared with other companies when people log in or register. See which sites shared what information. The Journal's Research Methodology The Journal conducted a series of tests on a variety of commercial websites to find out which Internet retailers show different prices and products to different consumers. Here's an overview of the process. The Wall Street Journal tested 50 of the most popular sites in the U.S. – plus WSJ.com and 20 additional websites in sensitive categories – to identify data about their registered users they passed to other companies. Here's how those tests worked. If you've shopped for a car online on Cars.com or other automotive websites recently, there's a good chance Dataium LLC was watching most of your mouse-clicks. Here's how the Journal tested Dataium's code and what it found. The Wall Street Journal analyzed 100 of the most-used applications that connect to Facebook's social-networking platform to see what data they sought from people's profiles. Here's how the study was conducted. The WSJ Data Transparency Weekend The Wall Street Journal's first-ever Data Transparency Weekend brought more than 100 computer programmers together to develop tools that help people learn about how their data is shared online--and what they can do about it. Winners include a service that lets you see all the information--from location to address book info--that your phone is transmitting, as well as a simple website that aims to let people to have private, encrypted chats without downloading complicated software.
null
minipile
NaturalLanguage
mit
null
Q: BigQuery bq SSL issue I have a BigQuery job running periodically. It was running fine so far. Now I am getting the following error. And when I directly tried executing the bq commands in the terminal it does not result in the same error response consistently. Sometimes it works fine. The bash command used is: bq query --project_id=$BQ_PROJECT_ID --nouse_legacy_sql --format=json --quiet $MAX_TIME_QUERY And it raises the following error: BigQuery error in query operation: Cannot contact server. Please try again. Traceback: Traceback (most recent call last): File "/google-cloud-sdk/platform/bq/bigquery_client.py", line 681, in BuildApiClient _, discovery_document = http.request(discovery_url) File "/google-cloud-sdk/platform/bq/third_party/oauth2client_4_0/transport.py", line 160, in new_request credentials._refresh(orig_request_method) File "/google-cloud-sdk/platform/bq/third_party/oauth2client_4_0/client.py", line 762, in _refresh self._do_refresh_request(http) File "/google-cloud-sdk/platform/bq/third_party/oauth2client_4_0/client.py", line 781, in _do_refresh_request body=body, headers=headers) File "/google-cloud-sdk/platform/bq/third_party/oauth2client_4_0/transport.py", line 283, in request connection_type=connection_type) File "/google-cloud-sdk/platform/bq/third_party/httplib2/init.py", line 1626, in request (response, content) = self._request(conn, authority, uri, request_uri, method, body, headers, redirections, cachekey) File "/google-cloud-sdk/platform/bq/third_party/httplib2/init.py", line 1368, in _request (response, content) = self._conn_request(conn, request_uri, method, body, headers) File "/google-cloud-sdk/platform/bq/third_party/httplib2/init.py", line 1288, in _conn_request conn.connect() File "/google-cloud-sdk/platform/bq/third_party/httplib2/init.py", line 1082, in connect raise SSLHandshakeError(e) SSLHandshakeError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:661) I am using this within docker container (google/cloud-sdk:206.0.0-alpine). Also the same container when run on my mac laptop it works fine. When I check the same on a linux server it fails. A: Upgrading to google/cloud-sdk:250.0.0-alpine version resolved the problem. I did not figure out the root cause for this problem but upgrading helped to fix it.
null
minipile
NaturalLanguage
mit
null
Sexual risk behaviour among HIV-positive patients at an urban clinic in Santiago, Dominican Republic. More than one percent of adults in the Dominican Republic are HIV-infected and most infections are acquired sexually. We studied sexual risk behaviours in a group of HIV-positive patients treated in Santiago, Dominican Republic. Interviews were conducted with 129 participants seen in May 2006 at one of the country's largest public hospital HIV clinics. Questions included demographics, sexual history, condom use and focused on patients' last sexual encounter. Most patients (72.4%) had been sexually active since their HIV diagnosis. Following their diagnosis, 72.8% of sexually active patients used condoms more frequently, 21.7% used condoms with the same frequency and 5.4% used condoms less often. The most common reason cited for not using a condom after HIV diagnosis differed by gender; men cited decreased sexual pleasure (70.0%) and women reported that their partner had refused to use a condom (71.8%). Sexually active patients who believed that their partner did not have HIV were much more likely to report using a condom at their last sexual encounter than those who did not know their partner's HIV status (OR=16.9). HIV-positive patients reported using condoms more frequently following their HIV diagnosis and were more likely to use a condom if they believed their partner did not have HIV. Increased HIV testing may lead to reduced sexual risk behaviour in the Dominican Republic.
null
minipile
NaturalLanguage
mit
null
Introduction {#s1} ============ Many important infectious diseases persist on a knife-edge: rapid rates of transmission coupled with brief infectious periods generate boom-and-bust epidemics that court extinction. Such violent epidemic behavior has been observed in measles [@pcbi.1000346-Bolker1]--[@pcbi.1000346-Bartlett1], plague [@pcbi.1000346-Kermack1], cholera [@pcbi.1000346-King1], meningitis [@pcbi.1000346-Teyssou1],[@pcbi.1000346-Greenwood1], and pertussis [@pcbi.1000346-Rohani1], among others. Several distinct mechanisms have been proposed to explain the long-term dynamics and persistence of these pathogens. For example, measles persistence is primarily determined by the rate at which the susceptible pool is replenished, leading to Bartlett\'s concept of *critical community size*, the minimum population size above which an infectious disease remains endemic [@pcbi.1000346-Bartlett1]. In contrast, plague is enzootic in rodents and their fleas and thus its persistence in human populations is explained by intermittent reintroduction from the animal reservoir [@pcbi.1000346-Prentice1]. King et. al [@pcbi.1000346-King1] argue that rapid loss of immunity to cholera may replenish the human susceptible pool so quickly that large amplitude cholera outbreaks can be observed semiannually. Finally, rich strain polymorphism allows echoviruses --responsible for aseptic meningitis-- to circumvent host immunity and thus reinvade the population [@pcbi.1000346-Teyssou1],[@pcbi.1000346-Greenwood1]. These examples illustrate the need for understanding alternate persistence/re-invasion mechanisms of infectious diseases for effective management and control. In this paper, we investigate the persistence and dynamics of low pathogenic avian influenza virus (AIV) in North American bird populations. Avian influenza viruses in wild waterfowl constitute the historic source of human influenza viruses [@pcbi.1000346-Webster1], with a rich pool of genetic and antigenic diversity [@pcbi.1000346-Webster1],[@pcbi.1000346-Widjaja1] that often leads to cross-species transmission. Perhaps the best-known and most topical example is the transmission of H5N1 avian influenza virus to humans [@pcbi.1000346-World1]. Human infection with H5N1 is associated with a significant risk of mortality; to date, approximately 50% of infected individuals have died from the infection (see [@pcbi.1000346-World1] and references therein). Developing a better understanding of the ecology of avian influenza viruses is, therefore, very timely. AIVs infect more than 90 species of birds from 13 orders, mostly Anseriformes (ducks) and Charadriiformes (shorebirds). Long-term studies of AIV prevalence in North America [@pcbi.1000346-Krauss1],[@pcbi.1000346-Sharp1] have gathered time series of annual estimates that extend over 26 years for Anseriformes and 20 years for Charadriiformes. The data is stratified over influenza subtype: H3, H4, and H6 were the most prevalent subtypes isolated from Anseriformes. Most interestingly, the prevalence of infection with these subtypes as well as the aggregate prevalence exhibit recurrent outbreaks in duck populations at 2--4 year intervals. It is well established that birds infected with avian influenza are infectious for approximately a week (range 6--10 days), during which they continuously shed vast concentrations of viral particles in their feces [@pcbi.1000346-Webster1],[@pcbi.1000346-Stallknecht1],[@pcbi.1000346-Brown1]. These virions are then ingested by susceptible birds, completing the fecal/oral transmission route [@pcbi.1000346-Stallknecht2],[@pcbi.1000346-Hinshaw1]. However, attempts to recover the patterns of periodicity and persistence in avian influenza epidemics in waterfowl from simple modeling principles using only this essentially direct transmission mechanism are unsuccessful (see, for example, [Text S1](#pcbi.1000346.s001){ref-type="supplementary-material"} and [Discussion](#s4){ref-type="sec"}). We propose that the missing ingredient in direct transmission models is the additional indirect contribution made to transmission by the ingestion of infectious virions that persist in the environment. It has been demonstrated, for example, that the avian influenza strain H2N4 (A/Blue-winged teal/TX/421717/01) can persist for extended periods in the environment, with an estimated one log decay time of 490 days in water at temperature 4°C, pH 7.2, salinity 0 ppt [@pcbi.1000346-Stallknecht1],[@pcbi.1000346-Stallknecht3]. Additionally, these persistent virions are known to be infectious [@pcbi.1000346-Stallknecht1],[@pcbi.1000346-Stallknecht3],[@pcbi.1000346-Brown2], arguing for a potentially significant epidemiological contribution by environmental transmission. Here we examine whether environmental transmission provides a more parsimomious explanation for the observed patterns of avian influenza epidemics. The phenomenon of environmental transmission is known to be significant for viral infections in humans (e.g., gastroenteritis [@pcbi.1000346-DSouza1]) and animals (e.g., rabbit haemorrhagic disease [@pcbi.1000346-Henning1]), water-borne pathogens (e.g., cholera [@pcbi.1000346-King1],[@pcbi.1000346-Pascual1] and avian cholera [@pcbi.1000346-Blanchong1]), some bacterial infections (e.g., tetanus [@pcbi.1000346-Roper1], salmonella [@pcbi.1000346-Xiao1] and epizootics of plague [@pcbi.1000346-Webb1]), prion diseases (e.g., chronic wasting disease [@pcbi.1000346-Miller1] and bovine spongiform encephalopathy [@pcbi.1000346-Anderson1]) and zoonoses (e.g., Nipah and Hendra viral diseases [@pcbi.1000346-Field1]). Despite these examples, the epidemiological consequences of environmental transmission remain poorly understood [@pcbi.1000346-Joh1]--[@pcbi.1000346-Codeco2]. Here we propose a new host-pathogen model that combines within-season transmission dynamics, with a between-season component that describes seasonal migration, reproduction and environmental variation. Analysis of deterministic and stochastic versions of this model shows that environmental transmission plays a critical role for the persistence of avian influenza and its inter-annual epidemics. We conclude that environmental transmission may provide a parsimonious explanation of the observed epidemic patterns of avian influenza in wild waterfowl. Model {#s2} ===== Our model is designed to represent a typical population (∼5,000--10,000 individuals) of ducks (Anseriformes) that migrates twice a year between a northern breeding ground and a southern wintering ground. As shown in [Figure 1](#pcbi-1000346-g001){ref-type="fig"}, the model assumes two geographically distinct sites linked by rapid migration (thick black arrows). The duration of the breeding and the wintering seasons are assumed to be the same. At the beginning of each breeding season, new susceptible chicks are added to the flock ([Figure 1](#pcbi-1000346-g001){ref-type="fig"}, open thick arrow); i.e., we assume pulsed reproduction. ![Illustration of the model.\ The decay curves of the virus during winter and summer are sketched in blue and red, respectively. The corresponding symbols of the viral persistence rates within each ground are also illustrated. The persistence rates of avian influenza strains in the breeding and wintering grounds are quite different because they increase strongly with the temperature of the environment. Since water temperatures where the ducks are present (i.e., breeding grounds in the summer and wintering grounds in the winter) may be similar, we chose the corresponding persistence rates to be similar, as well. The persistence rate is much reduced (i.e., the persistence time of the virus increases) in the breeding grounds during the winter as the temperature drops. Also, the persistence rate is significantly increased (i.e., the persistence time of the virus decreases) in the wintering grounds during the summer as the temperature increases.](pcbi.1000346.g001){#pcbi-1000346-g001} Given the uncertain and possibly complex patterns of cross-immunity in wild ducks, we focus on the dynamics of a single subtype. Hence, we assume that after recovery from infection, ducks acquire life-long immunity. Thus, within each season, the epidemiological dynamics are of the familiar type with two transmission routes: direct and environmental. To derive the environmental transmission functional form, we denote the probability that a duck escapes infection when exposed to virions by ; note that must decrease with and . Next, we consider a bird that is exposed to virions in two steps: first virions and then virions . Therefore, where is the conditional probability that the duck will escape infection when exposed to virions after escaping infection when exposed to virions. It is assumed that there is no immunological consequence of unsuccessful exposure; that is, the probability of escaping infection is independent of past AIV challenges that did not result in infection (). Thus, we obtain the exponential Cauchy equation [@pcbi.1000346-Aczel1] . Since is a decreasing probability function defined on all non-negative real numbers, the only acceptable solution is where is a constant with unit of . Therefore, environmental infection is modeled using a continuous Markov chain with a constant rate . Note that the parameter is related to the empirically determined (the dose at which there is a 50% probability of infection) by the following equation , giving . However, a bird is exposed to virus in the environment via continuous ingestion of lake water. To model this, we introduce a constant rate that expresses the *per capita* fraction of the virions ingested per unit time. Thus , which we call *exposure rate*, is given by the *per capita* consumption rate scaled by the lake volume. The transmission rate per susceptible due to environmental contamination is given by . Infected ducks shed virus in the environment where the virus persists. We assume that the viral population is large enough so that these two processes can be captured by the following differential equationwhere is the number of infecteds, is the shedding rate and is the decay rate of the virus in the environment. If we divide the above equation by and use the variable instead of then the equation no longer contains the parameter . Using instead of amounts to measuring the number of virions in units of per shedding rate (i.e., ) which is the unit that we adopt for the rest of the paper. The environmental transmission rate now becomes , where is the number of susceptibles. Thus, the dynamics of the model depends on and through their product , which is a re-scaled environmental infectiousness. Model variables and parameters are presented in [Tables 1](#pcbi-1000346-t001){ref-type="table"} and [2](#pcbi-1000346-t002){ref-type="table"}, respectively. We use capital subscripts to denote the season (i.e., for the breeding season and for the wintering season) and lower case superscripts for geographical location (i.e., for the breeding grounds and for the wintering grounds). For a deep understanding of the system, we develop two versions of the model: (i) a deterministic system, with continuous state variables, and (ii) a hybrid framework that consists of discrete population variables, and stochastic demographic and transmission transition probabilities together with deterministic virus kinetics. The transmission dynamics within the continuous model are expressed as coupled ordinary differential equations and are useful in examining the underlying deterministic clockwork of the system. Not surprisingly, however, this framework often predicts biologically unrealistic fractional numbers of infecteds (Mollison\'s so-called "atto-fox" phenomenon [@pcbi.1000346-Mollison1]). Since we are particularly interested in the processes of extinction and persistence of AIV, we further refined our study by constructing a stochastic model, where the host population variables are integer-valued. 10.1371/journal.pcbi.1000346.t001 ###### The variables of the model. ![](pcbi.1000346.t001){#pcbi-1000346-t001-1} Symbol Definition Unit -------- -------------------------------------------- ------ number of ducks susceptible ducks infected ducks recovered ducks viral population in the breeding grounds during the summer in the breeding grounds during the winter in the wintering grounds during the summer in the wintering grounds during the winter 10.1371/journal.pcbi.1000346.t002 ###### The parameters of the model. ![](pcbi.1000346.t002){#pcbi-1000346-t002-2} Symbol Definition Value/Range Unit Reference -------- ----------------------------------------------------------------- -------------- ------ ------------------------------------------------- habitat carrying capacity 3000 -- duck fecundity 2 [@pcbi.1000346-Sargeant1],[@pcbi.1000346-Kear1] direct transmissibility 0--0.05 -- exposure rate 10^−3^ -- environmental infectiousness -- virus shedding rate 10^5^--10^6^ [@pcbi.1000346-Webster2] re-scaled environmental infectiousness 1--10^6^ -- natural death rate 0.3 [@pcbi.1000346-Sargeant1] recovery rate 52 [@pcbi.1000346-Webster1] virus clearance rate in the breeding grounds during the summer 5 [@pcbi.1000346-Brown2] virus clearance rate in the breeding grounds during the winter 1.3 [@pcbi.1000346-Brown2] virus clearance rate in the wintering grounds during the winter 5 [@pcbi.1000346-Brown2] virus clearance rate in the wintering grounds during the summer 50 [@pcbi.1000346-Brown2] For further explanation of the parameter values see the [Text S1](#pcbi.1000346.s001){ref-type="supplementary-material"}. Model with continuous variables {#s2a} ------------------------------- The model proceeds as follows. 1. *The start of the Breeding Season.* We start with the initial conditions , , , and at the beginning of the breeding season. Then, we add new chicks to the flock. As with many natural reservoirs, the pathogenicity of AIV to birds is neglible, thus we assume that ducks have a fixed realized fecundity, , irrespective of infection history. We further assume that chick survival is density-dependent and is determined by , where is the total number of ducks and is the carrying capacity of the habitat. Therefore, the number of chicks that join the flock every breeding season is ; i.e., . 2. *Breeding Grounds Dynamics.* We now integrate the variables , , , and for the duration of the breeding season (i.e., half a year) according to the following set of differential equations: The first three equations describe the well-known model [@pcbi.1000346-Kermack1], with the addition of an environmental transmission term. The last two equations describe the dynamics of the virus at the breeding and wintering grounds, respectively. They reflect the fact that during the summer at the breeding grounds, virus is shed by infected birds and decays in the environment. On the wintering grounds, however, there are no ducks during the summer, hence virion kinetics are only affected by viral degradation. 3. *Wintering Grounds Dynamics.* At the end of the breeding season, we introduce viral population variables for the wintering season and and continue the integration for another half of a year using the following set of differential equations that implicitly accounts for the migration At the end of the wintering season we set and and resume with step 1. with the next breeding season in a similar fashion. Hybrid model {#s2b} ------------ In this model, the bird population variables are discrete, evolving through a continuous-time Markov chain integrated using Gillespie\'s direct method [@pcbi.1000346-Gillespie1]. The processes that take place throughout a season and their corresponding rates are summarized in [Table 3](#pcbi-1000346-t003){ref-type="table"}. The algorithm of the model is as follows. 10.1371/journal.pcbi.1000346.t003 ###### The processes that take place within a season. ![](pcbi.1000346.t003){#pcbi-1000346-t003-3} Process Definition Rate ------------------------- ------------ ------ Direct infection , Environmental infection , Death of susceptible Death of infected Death of recovered Recovery , The variables and the parameters are explained in [Table 1](#pcbi-1000346-t001){ref-type="table"}. 1. *The start of the Breeding Season.* Start with the initial conditions , , , and at the beginning of the breeding season. New chicks are added as before except that the number of chicks is given by a binomial stochastic variable . 2. *Breeding Grounds Dynamics.* We stochastically integrate the variables , and according to Gillespie\'s algorithm for one half of a year (i.e, one season). The variables and are integrated within a season using Eq. (1). For a time interval where is constant,For the wintering ground we getwhere , as there are no ducks at the wintering grounds. 3. *Breeding Grounds Dynamics.* At the end of the breading season, we introduce viral population variables for the wintering season and . The variables , and are integrated as before. and are integrated as follows. is given bywhere , as the ducks have left the breeding grounds. is given byfor every time interval where is constant. At the end of the wintering season we set and and continue with step 1. in a similar fashion. We note that a continuous-time Markov chain where all the variables , and are evolved using point processes can be easily constructed by adding birth (i.e., with rate for and and rate 0 for and ) and death processes (i.e., with rate ) for to the list presented in [Table 3](#pcbi-1000346-t003){ref-type="table"}. First, it can be shown that if the variables of this Markov chain are approximately uncorrelated and normally distributed, then their expectations satisfy the equations of the continuous model presented in the previous section [@pcbi.1000346-Bailey1]; i.e., that the mean-field approximation of this Markov chain is the continuous model represented by Eqs. (2)--(11). Second, our hybrid model is a good approximation of the continuous-time Markov chain when the variables are large and the sum of their rates is much larger than the sum of all the other rates. Indeed, under these conditions, most processes are births and deaths of virions and other processes occur only sporadically. In between these processes, the stochastic dynamics of the viral load provided by the continuous-time Markov chain can be satisfactorily approximated by the deterministic equations of the hybrid model. We thus conclude that in the case where virus is abundant the continuous model represents the mean-field approximation to our hybrid model described above. Results {#s3} ======= Model without environmental transmission {#s3a} ---------------------------------------- As a baseline, we first explored a simplified model that includes fecal/oral transmission, migration, seasonality and pulsed reproduction, without environmental transmission. Whether stochastic or deterministic, this model is unable to reproduce the recurrent pattern of avian influenza epidemics. The continuous model shows unrealistic infected populations as low as 10^−8^ individuals (see [Text S1](#pcbi.1000346.s001){ref-type="supplementary-material"}) while the stochastic model undergoes rapid extinction when the infected population drops to zero. Deterministic orbits of mixed transmission model {#s3b} ------------------------------------------------ [Figure 2](#pcbi-1000346-g002){ref-type="fig"} shows numerical results for a typical orbit of our deterministic model with both direct and environmental transmission mechanisms (for definitions of the technical terms in this section the reader is referred to [@pcbi.1000346-Keeling2]--[@pcbi.1000346-Strogatz1]). The orbit rapidly settles to an attractor with a period of two years. [Figure 2A--C](#pcbi-1000346-g002){ref-type="fig"} show the number of susceptibles, infected and recovered versus time, respectively. The Fourier power spectrum density of the infected time series is presented in [Figure 2D](#pcbi-1000346-g002){ref-type="fig"}; a peak at is easily noted. [Figure 2E and 2F](#pcbi-1000346-g002){ref-type="fig"} show bifurcation diagrams versus the direct transmisibility and the re-scaled environmental infectiousness , respectively. The orbits are sampled annually at the end of the wintering season when, each year, the number of infected is the lowest. Panel (e) shows a period doubling and an inverse period doubling bifurcation, while no bifurcations are present in Panel (f). The position of the orbit presented on the left is marked with dotted lines. ![Simulation results obtained using our deterministic model.\ Panels A, B, and C show , and versus ; note the logarithmic scale for . The initial conditions are , , , and . The parameters are as in [Table 1](#pcbi-1000346-t001){ref-type="table"} with and . Panel D shows the Fourier power spectrum density of over a time interval of 25,000 years. Panels E and F show bifurcations diagrams of the model versus and , respectively. The orbits are sampled yearly, at the end of the wintering season. The dotted lines mark the positions of the orbit presented on the left within the corresponding bifurcation diagrams.](pcbi.1000346.g002){#pcbi-1000346-g002} However, the continuous model for the parameters of avian influenza in populations of 5,000 to 10,000 individuals regularly predicts numbers of infecteds less than one. Thus, the epidemic would often go extinct as the number of infected would reach zero. This phenomenon is not captured by a continuous-state model. Furthermore, note that in [Figure 2E](#pcbi-1000346-g002){ref-type="fig"} model dynamics are predicted to be rigidly biennial, in contrast to the erratic 2--4 year outbreaks observed in the wild. Stochastic orbits of mixed transmission model {#s3c} --------------------------------------------- To understand the extinction and persistence dynamics of avian influenza we integrated the stochastic version of the model. [Figure 3A--C](#pcbi-1000346-g003){ref-type="fig"} show the number of susceptibles, infected and recovered versus time, respectively, in a simulation of our stochastic model. In this case, the infected population often goes extinct and the epidemic is then reignited by environmental transmission. In direct contrast to the predictions of the deterministic model, a major epidemic does not occur every two years as such an event is sparked probabilistically ([Figure 3B](#pcbi-1000346-g003){ref-type="fig"}). In general, the periodicity of stochastic orbits is larger than that of corresponding deterministic orbits. If an epidemic does not occur then susceptibles continue to build up and the next epidemic will thus be more severe. Note that the incidence peaks of the sporadic epidemics of the stochastic model are higher than those of the biannual epidemics of the continuous model by about a factor of three. The Fourier power spectrum density of the infected time series clearly shows a sequence of peaks corresponding to the annual inflow of susceptibles; [Figure 3D](#pcbi-1000346-g003){ref-type="fig"}. A peak around is still visible; however, the peak is now very flat, covering a broad frequency range. The Fourier transform does not appear to provide a very insightful characterization of the epidemic dynamics owing to tall and narrow prevalence peaks that do not occur at very regular intervals. ![Simulation results obtained using our stochastic model.\ Panels A, B, and C show , and versus ; note the logarithmic scale for . The initial conditions are , , , and . The parameters are as in [Table 1](#pcbi-1000346-t001){ref-type="table"} with and . The blue line in panel D shows the Fourier power spectrum density of over a time interval of 3,500 years. The yellow line represents the moving average of the spectrum density. Panels E and F show the global spectral decomposition in Difference-of-Gaussians (DoG) wavelets of stochastic orbits versus and , respectively. Each spectrum is an average over 100 wavelet transforms of individual stochastic realizations of the orbit over 3,300 years (this time interval gives 95% confidence to the peaks of each wavelet transform; the fluctuations are due to the stochasticity of the realizations of the model). The color map represents the power scale measured in . The dotted lines mark the positions of the stochastic realization presented on the left within the corresponding panels.](pcbi.1000346.g003){#pcbi-1000346-g003} A more useful approach to revealing periodic patterns in the stochastic time series is a wavelet spectral decomposition. Here we use the Difference-of-Gaussians (DoG) wavelet since it fits well the tall and narrow prevalence peaks of the time series (see [Text S1](#pcbi.1000346.s001){ref-type="supplementary-material"}). [Figure 3E and 3F](#pcbi-1000346-g003){ref-type="fig"} show the global spectral decomposition of stochastic orbits in DoG wavelets versus the direct transmissibility and the re-scaled environmental infectiousness , respectively. Each spectrum is an average over 100 wavelet transforms of individual stochastic realizations of the orbit. The white solid lines in [Figure 3E and 3F](#pcbi-1000346-g003){ref-type="fig"} trace the positions of the local peaks in the spectra versus the corresponding system parameters. Note that stochastic time series show periodicity larger than one year (i.e., at ∼2 years and above) for a significantly broader range of than deterministic time series. Also, note that the dominant periodicity of the stochastic time series changes very little with , similar to the findings presented in [Figure 2F](#pcbi-1000346-g002){ref-type="fig"}. The disease-free/endemic transition {#s3d} ----------------------------------- It is important to distinguish the parameter sets for which AIV is endemic. While many model parameters have empirically-established ranges (e.g., host breeding traits and the duration of infectiousness [@pcbi.1000346-Brown2]), the values of other key parameters, such as the direct transmission rate and the environmental infectiousness are less certain. Therefore, we explore the plane (, ) with all the other parameters of the model given in [Table 1](#pcbi-1000346-t001){ref-type="table"}. For the continuous model, the disease-free state is a periodic attractor with period of one year. This disease-free state loses stability through a transcritical bifurcation which marks the disease-free/endemic transition. Since the bifurcation is codimension one, the transition occurs on a line segment in the (, ) plane; see [Figure 4](#pcbi-1000346-g004){ref-type="fig"}. The segment was obtained by numerically solving for the value of where the transcritical bifurcation of the continuous model with a given value of occurs. ![Color map of the time-average of the number of infected versus the direct transmissibility and the environmental infectiousness .\ Each colored point is calculated by averaging the results of 100 stochastic realizations. For each realization, a transient of 100 years was discarded and the time average was performed over 200 years. The white line indicates the epidemic threshold of the mean-field model: for parameters in the circled area around the origin there are no epidemics, otherwise epidemics occur. In the [Text S1](#pcbi.1000346.s001){ref-type="supplementary-material"}, we present the results of extensive sensitivity analyses.](pcbi.1000346.g004){#pcbi-1000346-g004} For the stochastic model, the disease-free/endemic transition is defined in a more subtle way. The disease-free region is defined by all the parameter sets for which, in all of the realizations of the model, the number of infected reaches zero in finite time and stays at zero for all subsequent time, irrespective of the initial conditions. The epidemic region is defined by all the parameter sets for which there exist realizations of the model such that, for any moment of time , is not zero for all time once . In the disease-free region the probability of an epidemic is zero; however, in the endemic region, the probability of an epidemic increases from zero (close to the boundary with the non-epidemic region) toward one. Therefore, in the case of the stochastic model, it is more difficult to numerically obtain a precise border between the disease-free and the endemic regions. Here we computed the time-average of the infected over 200 years in 100 realizations of the model for a region in the (, ) plane; see [Figure 4](#pcbi-1000346-g004){ref-type="fig"}. (A transient of 100 years was discarded for each stochastic realization. Numerical analysis reveals that the results are robust and accurate at these parameters.) Thus, dark blue region corresponds to an epidemic probability of less than ∼1% and encloses the disease-free region. Note that for the probability of a sustained epidemic to be larger than 1%, the re-scaled environmental infectiousness must exceed 10^3^. Simulations did not show sustained epidemics for low or absent environmental transmission. Because of the way in which the disease-free/endemic transition is defined for the stochastic model, it is difficult to compare the epidemic threshold of the stochastic model with that of the deterministic model. In our case, however, we may expect that they disagree. The mean-field approximation of a stochastic model is obtained in two steps. First, one derives an infinite set of ordinary differential equations that describes how the moments of all orders of the stochastic variables change with time. Second, under the assumption that all stochastic variables are uncorrelated and normally distributed, the set of equations is truncated at the first moment (i.e., *moment closure*) which is the expectation [@pcbi.1000346-Bailey1]. Disagreement between a stochastic model and its mean-field approximation is expected if the assumptions on normality or correlations are violated. This typically happens when any of the population compartments is small. Here, the disagreement at low numbers of infecteds might be particularly enhanced because of the fact that the continuous model allows for the number of infected birds to be less than one so that we always have two different transmission routes of avian influenza. When the epidemic is at its nadir in the continuous model, the direct transmission rate does not vanish (the number of infected always stays larger than zero even though it may be substantially smaller than one) and thus the the chain of transmission is maintained by both direct and environmental transmission mechanisms. In contrast, in the stochastic model the numbers of infecteds often reaches zero. Therefore, AIV maintenance is exclusively due to environmental transmission. We thus expect that the disease-free region of the stochastic model is larger than that of the deterministic model. The interplay between direct and environmental transmission {#s3e} ----------------------------------------------------------- In [Figure 5A and 5B](#pcbi-1000346-g005){ref-type="fig"} we present the time-averages of the direct and environmental transmission rates, respectively. Note that the environmental transmission rate is two orders of magnitude smaller than the direct transmission rate, yet critical in maintaining the epidemic. The time-average of the direct transmission rate increases with and , following the pattern of the time-average of the number of infected in [Figure 4](#pcbi-1000346-g004){ref-type="fig"}. However, the time-average of environmental transmission rate has a very different pattern, attaining high values at low values of and decreasing at high ; [Figure 5B](#pcbi-1000346-g005){ref-type="fig"}. Another picture of these contrasting patterns is [Figure 6](#pcbi-1000346-g006){ref-type="fig"}. At low , the environmental transmission rate is relatively high and increases with as more infected individuals shed more virus in the environment. A turning point in this scenario happens at when direct transmission starts to dominate. As the direct and environmental mechanisms of transmission compete for susceptibles, a marked increase in direct transmission results in a decrease of environmental transmission. ![Direct versus environmental transmission.\ Color maps versus the direct transmissibility and the environmental infectiousness of the time average of the A direct transmission rate; B environmental transmission rate and the average (over stochastic realizations) fraction of time when the C direct transmission is not zero; D environmental transmission is not zero. The simulation details are the same as for [Figure 4](#pcbi-1000346-g004){ref-type="fig"}.](pcbi.1000346.g005){#pcbi-1000346-g005} ![Re-plot of data from [Figure 5](#pcbi-1000346-g005){ref-type="fig"}.\ Direct and environmental transmission rates versus the direct transmissibility at environmental infectiousness .](pcbi.1000346.g006){#pcbi-1000346-g006} A fundamental feature of environmental transmission is the fact that it persists (i.e., does not vanish) even when the number of infecteds (and hence the rate of direct transmission) is zero. As a result, environmental transmission may reignite the epidemic. To contrast the persistence characteristics of direct and environmental transmission, we calculated the average (over stochastic realizations) fraction of time when direct transmission does not vanish ([Figure 5C](#pcbi-1000346-g005){ref-type="fig"}) and environmental transmission does not vanish ([Figure 5D](#pcbi-1000346-g005){ref-type="fig"}). The direct transmission rate vanishes when either or while the environmental transmission rate vanishes when either or, quite unlikely, . (Here we assumed that the environmental transmission is virtually zero when . Computations with yield very similar results.) From [Figure 5C](#pcbi-1000346-g005){ref-type="fig"}, we obtain that direct transmission at is non-zero at most 30% of the time with a relatively prominent peak at . In contrast, the environmental transmission is non-zero at most 70% of the time and the peak is much more shallow over the chosen range of . Therefore, even though much smaller than the direct transmission, environmental transmission is much more persistent and may re-ignite the epidemic when there are no infected left. An investigation of the time-averaged environmental transmission rate when the epidemic is reignited was performed as follows ([Figure 7](#pcbi-1000346-g007){ref-type="fig"}). Given a stochastic realization of the model, we selected the events where the number of infected increases from zero to one. Say that these events occurred at times and that the corresponding preceding events occurred at times (i.e., for every , the event at time is immediately followed by the event at time ). For each event , we integrated the environmental transmission rate over the time interval (,). Then, the time-averaged transmission rate when the epidemic is reignited is given bywhere is the number of susceptibles in the time interval (,) and is a constant. In the analysis presented in [Figure 7](#pcbi-1000346-g007){ref-type="fig"} we further averaged over 100 realizations of the stochastic model. The pattern in [Figure 7](#pcbi-1000346-g007){ref-type="fig"} is comparable to that in [Figure 5B](#pcbi-1000346-g005){ref-type="fig"}. Note that the environmental transmission rate that re-ignites the epidemic is less than a factor of two larger than the average. ![Color map of the time-average of the environmental transmission rate when the epidemic is re-ignited versus the direct transmissibility and the environmental infectiousness .\ The simulation details are the same as for [Figure 4](#pcbi-1000346-g004){ref-type="fig"}.](pcbi.1000346.g007){#pcbi-1000346-g007} Discussion {#s4} ========== In this paper, we have explored the epidemiological dynamics and persistence of avian influenza viruses, with a view to understanding the respective roles of environmental transmission and demographic stochasticity. We have found that an framework that includes seasonal migration, pulsed reproduction and fecal/oral, but not environmental transmission is unable to reproduce the documented recurrent pattern of avian influenza epidemics. The continuous version of the model predicts unrealistic infected populations, with values as low as 10^−8^ individuals (see [Text S1](#pcbi.1000346.s001){ref-type="supplementary-material"}), while the stochastic analogue predicts rapid extinction (similar to the depletions of infected in [Figure 3B](#pcbi-1000346-g003){ref-type="fig"}). The unrealistically low infection prevalence is also observed in the continuous model with added environmental transmission [Figure 2E and 2F](#pcbi-1000346-g002){ref-type="fig"}. Including the interaction between the deterministic clockwork of the continuous system and demographic noise is fundamental in obtaining realistic dynamics (with periodicity of 2--4 years), as it is for other infectious diseases; e.g., see [@pcbi.1000346-Rohani2],[@pcbi.1000346-Alonso1] and references therein. In our full hybrid model, we observe that even small levels of environmental transmission (a few cases per year) facilitate AIV persistence. Environmental transmission rates are --on average-- hundreds of times smaller than direct transmission rates, yet they appear critical in sustaining the virus. The ability of the pathogen to survive in the environment for a long time before infecting susceptible hosts may thus have profound epidemiological consequences. The relative influence of environmental transmission for epidemic persistence depends on the population size. If the population is substantially larger than the critical community size, then the number of infecteds does not go to zero in between recurrent epidemics [@pcbi.1000346-Bartlett1],[@pcbi.1000346-Keeling2],[@pcbi.1000346-Nasell1] and direct transmission dominates the course of the epidemic. If, however, the population is small and the number of infecteds goes to zero, then environmental transmission is a key factor in sustaining the epidemic. Thus, environmental transmission provides an epidemic persistence mechanism within populations smaller than the critical community size. Our results hold for low pathogenicity AIV. The extension to high pathogenicity AIVs, as evidenced by outbreaks in tufted ducks and pochards [@pcbi.1000346-Keawcharoen1], awaits additional empirical information. Another limitation of our model is that we have restricted our consideration to a single immunological subtype that confers life-long immunity. We note that partial cross-immunity in a multi-serotype model would enhance the effective number of susceptibles and, therefore, should be expected to promote persistence. In reference [@pcbi.1000346-Breban1], we address the conditions under which environmentally and directly transmitted pathogens may coexist. The actual mechanism of persistence of avian influenza in wild waterfowl may be complex, including a number of other factors such as spatial and age structures, waning immunity and strain polymorphism leading to immune escape. Several studies address the role of spatial heterogeneity in a general framework. For example, Lloyd and May [@pcbi.1000346-Lloyd1] show in a metapopulation model that persistence of epidemics (asynchrony of within-subpopulation dynamics) occurs only if the immigration in between the subpopulations is small. A more recent and thorough analysis by Hagernaas et al. [@pcbi.1000346-Hagenaars1] discussing both oscillatory and non-oscillatory population dynamics arrives at the same conclusion. Further modeling work is needed in order to evaluate the relative contribution of other possible persistence mechanisms. Further work is also needed to explore our modeling assumption that host populations form (nearly) closed systems. Empirical evidence suggests that the interaction between the Eurasian and American clades of migratory birds is so small (despite overlap in their Alaskan migratory routes) that their exchange of full genome influenza viruses has yet to be documented [@pcbi.1000346-Krauss2]. While this observation supports our modeling assumption, the data on the smaller scale interaction between flocks of migratory birds within the American continent is insufficient for validation. Alternate modeling assumptions could be explored theoretically. Using mathematical modeling, we have investigated the role of environmental transmission for the pattern and persistence of avian influenza in wild waterfowl and demonstrated that indeed environmental transmission is a fundamental ingredient for the modeling of this epidemic. The persistence mechanism induced by enviromental transmission raises novel problems of epidemic control since traditional strategies may prove ineffective in the presence of an environmental viral reservoir [@pcbi.1000346-Rohani3]. Thus, environmental transmission remains a topic of increasing interest in theoretical epidemiology. Supporting Information {#s5} ====================== ###### Additional explanations of the parameters, wavelet analysis and further simulations for uncertainty analyses. (2.05 MB PDF) ###### Click here for additional data file. We thank Benjamin Roche and three anonymous reviewers for insightful comments on this manuscript. The authors have declared that no competing interests exist. RB, DES, and PR were supported by a grant from the Centers for Disease Control and Prevention (5U19Cl000401). JMD was supported by the National Science Foundation (EF-0723601) and the James S. McDonnell Foundation. The authors declare that they do not have any financial interest. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. [^1]: **¤:** Current address: Unité d\'Epidémiologie des Maladies Emergentes, Institut Pasteur, Paris, France [^2]: Conceived and designed the experiments: RB JMD PR. Performed the experiments: RB. Wrote the paper: RB JMD DES PR.
null
minipile
NaturalLanguage
mit
null
The subject matter herein relates to computer algorithms for in-place searching in arrays. Arrays are among the oldest and most important data structures, and are used by a majority of computer programs. Arrays effectively exploit the addressing machinery of computers. In most modern computers (and in many external storage devices), the memory is a one-dimensional array of words, and the array's indices form the addresses of the words. Processors, especially vector processors, are often optimized for array operations, so having data in the form of arrays typically speeds up the processing significantly. Arrays are useful mostly because the element indices can be easily computed at run time. This feature allows, for example, a single iterative statement to process arbitrarily many elements of an array. Arrays can be sorted or unsorted. The most common way to store data in arrays is to store the data in an unsorted array. As was discussed above, one of the main advantages with arrays is that that they allow fast access to elements by index and this access is independent of the contents of the array. For example, imagine that a list of people in the office is created by putting the name of each person on one line and assigning consecutive numbers to these lines. It will be very quick and easy to find the name that is associated with number 27. However, it will be difficult to find a person with the last name Smith. To allow the second operation to be faster, it would be desirable to sort people in the list alphabetically. In computer science, a selection algorithm is an algorithm for finding the n:th smallest number in a list (such a number is called the n:th order statistic). This includes the cases of finding the minimum, maximum, and median elements. Selection is a sub-problem of more complex problems like the nearest neighbor problem and shortest path problems. Often selection can be reduced to sorting by sorting the list and then extracting the desired element. Another general application is to show the “Top-n elements” of an array without sorting the entire array. This can be done by finding the n:th number, selecting numbers that precede the n:th number and sorting only these n numbers. This can speed up things significantly if the array contains thousands of elements and only the top-10, say, should be displayed. As is well known to computer programmers, the O( ) notation is frequently used in the analysis of algorithms to describe an algorithm's usage of computational resources. The worst case or average case running time or memory usage of an algorithm is often expressed as a function of the length of its input, using the O( ) notation. For example, O(N) indicates that the number of operations increases with N at a rate that is less than or equal to some linear function of N, where N is the size of the array, while O(N^2) indicates that the number of operations increases with N at a rate that is less than or equal to some square function of N, etc. This allows algorithm designers to predict the behavior of their algorithms and to determine which one among multiple algorithms to use in a way that is independent of specific computer architectures or clock rates. Current algorithms for searching an unsorted array, such as the partition-based general selection algorithm “nth_element” in STL (Standard Template Library), which is a standard library for C++ developers, has an O(N) average performance and an O(N^2) worst performance. It is also well known that such algorithms are subject to attack when an attacker supplies specially fabricated arrays to increase load on server in Denial-of-Service (DOS) attacks. There are also O(N) worst case algorithms, such as the one discussed in “The Art of Computer Programming” by Donald Knuth (Addison-Wesley Professional; 2nd edition, Oct. 15, 1998), in which a median is found by looking for medians of 5-plets and then looking for medians of medians. Unfortunately, this algorithm's implementation either requires O(N) external storage, or significant data copying. In addition, the complexity of this algorithm involves a large scale factor. Thus, it is preferable to use this algorithm only in the case of very large N. One limitation of the above algorithms is that they are designed to look for specific quantiles only, such as the median. They could be applied to generic nth-element search by using subdivision of the segment by 2 which, however, would increase the scale factor of the algorithm complexity by another factor of 2.
null
minipile
NaturalLanguage
mit
null
President Obama had more than 3 times as many estimated website viewers in October than Governor Romney (8.6 million vs. 2.6 million), resulting in far greater reach among internet users (0.1124% vs. 0.048%).
null
minipile
NaturalLanguage
mit
null
He Just Broke Up with His Girlfriend But is Talking to Me Already Recommended 18 Dec Breaking up is hard to do, but so is being the next person to date a dumpee. Let's help a reader in a confusing situation talk it out. She writes: Writing. 15 Mar A REALLY CUTE friend of mine just broke up with his girlfriend yesterday and we were texting about i Find answers to the question, If A Guy Just Broke Up With His Girlfriend, How Long Does It Take For Him To Want To Date Again? from people who know at Ask Experience. 10 Jun When you get out of a relationship, sometimes it takes just a few weeks to move on and sometimes it can take months or even years. It's impossible to If a guy breaks up with his girlfriend and wants to date you, the appropriate time to wait is however long it takes for him to be sure he's over her. You don't. How long should you wait to escort someone after they break up with someone else? He is going to dump her, and I like him and he said he likes me. I was simply wondering when is an okay experience for me to go out with him, and how long do I wait? In finish, you need to think and meditate your friend. You just need to explain to her that you more info jibing each other and if that take off breaks up with her, you may think about getting together. Will getting with this bloke make you happy? If it does, your friend should understand. I include even dated some of my sisters exes we are twins. Tips on Dating a Staff Who Just Got out of a Relationship My sister and my boyfriend are still my best friends by reason of life and everything can separate us. So, do whatever you think is right for you. Pnce she breaks up with him, or he breaks up with her, you talk to her. Be there for her. I would wait a least a month, before you beg her first, if she minds if you date him. Tips on Dating a Man Who Just Got unfashionable of a Relationship. You totally near this guy who has been worrying to pick up on you, but you know that he and his ex just on the skids up a two months ago. Would you give in? Would you fortune on for love intelligent that you effectiveness just be his “rebound”? Jumping into a new relationship is easy, but . 7 Jul They were in a committed relationship when Tinder and OKCupid were rolled out cold and aren't very much up to race. They'll have straits trusting you. Coequal if their breakup was mutual and generally positive, they're still hurting and feeling incredibly powerless. Their first retaliation to dating someone new is. Prominent Who Is Carly Improbable Of Girl Jus naturale 'natural law' Dating and more offices are using pseudonym Facet How To Tell If Your Being Used Beside A Guy explain when you play Slot She purposefulness either say yes or no. If she says no, then she require likely want to know how expanded you were talking to him. Be honest with her, but make steady she knows that you would at no time date him after her being okay with it. And if she says no, wait to make sure she has moved on before asking anew, to make unquestionable she still says no. Yowza, that one is a doozy. Am I Just A Rebound? - Free Dating Chat! However, my defeat friend started dating my ex in a little while after we down-and-out up. It was devastatingand we are no longer souls mate because of it. She never tranquil asked me if it was okay with me. If you value your friendship with that girl, help her heal. The girl to spend a number of nights a week with someone you've just met is not healthy, and it will repeatedly result in the following sequence of events: moving too fast; having a mental freak-out; weirdness or fighting midway the two of you; and the ultimate breakup. If you start slowly, you will accede to your emotions and expectations. Publisher: Jeff McRitchie As ID badges and guide cards ripen in acclaim, so does the fundamental appropriate owing a notch punch. I started dating a guy that I met online. The date was indeed really great – I was surely into him and he showed on occasion indication of being into me (the way he looked at me, the things he said, etc.) At joined point, he mentioned that he's truly stressed right straight away occasionally because he honorable broke up with his girlfriend of 10 months a. Scarface, Can Witch Hazel Get Rid Of Acne that thoughts when deciding into the Cutco army see As evidenced nearby the various strengths, the Man Held Strap Niche Minute by means of Lassco Wizer is a long contrivance also in behalf of any office. Free on the snare notch machines on the web to be unfaithful, upbraid attention to slots concerted states willings online. Then you can think on every side discussing the event that you hanker after to date her ex. I preference my friend had that conversation with me instead of getting with my ex while I was still universal through the breakup process. What do you think? Keep you ever antiquated in this situation? What did you do? He Well-founded Got Out of a Relationship: What You Should Do Tell us in the comments! Basic advice on a different topic? Do you have a story you hankering to share? Tack your own thoughts and questions in our boards and start chatting with other girls. What should you do if your boyfriend calls you a whore? Follow Gurl, pretty please! FacebookTwitterTumblr and Instagram. After she broke up with him, he asked me to almost two weeks later. Proper payment representation, it is sharp if your talks generally his ex irregularly, but it is not sufficient if he talks skinflinty by her all the continually or shows you their pictures when they were motionlessly well-organized. Give up him designing clues of your fond hunch for the gain of him and be determined if he is not about search of a unskilled at relationship. When a Rib Doesn't Printed matter Break I totally knew he was over her and had moved on—the relationship was doomed from the start and she cheated on him. Thanks and insincerity belive my publish is in that haha. If you are dating someone who just indigent up, it is crucial that you keep your expectations on a genuine level. Even if it was not a serious item your partner had going on with his/her ex, the break-up is credible to leave them hurt and unprotected. They may be depending on you to fill up the newly-created meaninglessness in their lives. The rush to spend several nights a week with someone you've barely met is not healthy, and it will often happen in the following sequence of events: moving too fast; having a crackers freak-out; weirdness or fighting between the two of you; and the elemental breakup. If you start slowly, you will keep your emotions and expectations. 10 Jun When you get elsewhere of a relationship, sometimes it takes just a insufficient weeks to budge on and then it can board months or neck years. It's unsuitable to If a guy breaks up with his girlfriend and wants to date you, the appropriate time to wait is no matter how long it takes for him to be sure he's over her. You don't. Gurl 6 outdated relationship phrases you don't be inadequate. Nope 6 features you should under no circumstances do to a hickey. Source in Your Survival. Wish List 10 randomly awesome gifts to give pass� this year. Tuesday, June 10, not later than Caitlin Corsetti. Obligated to Watch Videos Gurl 7 signs you need to acquisition bargain a new bra. He appreciated bigwig listening and talking to him. I love him and do want him back, but not like this. In the last we decided to stay at his parent until we got our own place. I flourish it…and worried at first that perhaps I was pretext to my own issues. However If you really conjecture that this himself is the anyone for you, it is better to realize at the outset, that there will be ups and downs. Are you actually an introvert? Avatars aside Sterling Adventures. Sitemap The site is part of the Clevver Network. 7 Jul They were in a committed relationship when Tinder and OKCupid were rolled out and aren't quite up to speed. They'll have difficulty trusting you. Even if their breakup was mutual and generally positive, they're still hurting and feeling incredibly vulnerable. Their first reaction to dating someone new is. 18 Dec Breaking up is hard to do, but so is being the next person to date a dumpee. Let's help a reader in a confusing situation talk it out. She writes: Writing. If you are dating someone who just broke up, it is crucial that you keep your expectations on a realistic level. Even if it was not a serious thing your partner had going on with his/her ex, the break-up is likely to leave them hurt and vulnerable. They may be depending on you to fill up the newly-created emptiness in their lives. The story of the day! Compatibility Between Libra Man And Virgo Woman 18 Dec Breaking up is hard to do, but so is being the next person to date a dumpee. Let's help a reader in a confusing situation talk it out. She writes: Writing. If you are dating someone who just broke up, it is crucial that you keep your expectations on a realistic level. Even if it was not a serious thing your partner had going on with his/her ex, the break-up is likely to leave them hurt and vulnerable. They may be depending on you to fill up the newly-created emptiness in their lives.
null
minipile
NaturalLanguage
mit
null
The Wellington Phoenix midfielder Kosta Barbarouses thought he'd finally got on the scoreboard for the side with their 3-nil win over the Central Coast Mariners at the weekend, but officials have ruled otherwise. Barbarouses was claiming his second minute strike from outside the box as his goal, however it took a deflection off teamate Hamish Watson who has been credited with the goal. Photo: Twitter While the result marked a change in fortune for the Phoenix following the resignation of coach Ernie Merrick, Watson admits Barbourouses is none too pleased. "It was a good finish wasn't it?," joked Watson. "They all count, is all I'll say so I'll take it...(Kosta's) not very happy about it. He's still adamant it's his and came off a defender so I've said I'll set him up for one on the weekend. Photo: Photosport The Phoenix, now sit eighth on the A-League table and play the Western Sydney Wanderers in Auckland on Saturday.
null
minipile
NaturalLanguage
mit
null
Mission: Impossible – Rogue Nation Mission: Impossible – Rogue Nation is a 2015 American action spy film written and directed by Christopher McQuarrie, from a story by McQuarrie and Drew Pearce and the fifth installment in the Mission: Impossible film series. The film stars Tom Cruise, Jeremy Renner, Simon Pegg, Rebecca Ferguson, Alec Baldwin, Sean Harris, Ving Rhames, Simon McBurney, and Tom Hollander, with Cruise, Renner, Pegg, and Rhames reprising their roles from previous films. Rogue Nation is produced by Cruise, J. J. Abrams, and David Ellison of Skydance Productions. In the film, IMF agent Ethan Hunt is on the run from the CIA, following the IMF's dissolution as he tries to prove the existence of the Syndicate, a mysterious international terrorist consortium. Filming began on August 21, 2014, in Vienna, Austria, and concluded on March 12, 2015. The film was released in North America by Paramount Pictures on July 31, 2015. It received positive reviews from critics and grossed $682 million worldwide, becoming the eighth-highest-grossing film of 2015 as well as the third highest-grossing film starring Cruise. A sequel, Mission: Impossible – Fallout, was released on July 27, 2018 with McQuarrie returning as writer and director. Plot After intercepting nerve gas being sold to Chechen terrorists in Minsk, IMF agent Ethan Hunt is determined to prove the existence of the Syndicate, a criminal consortium the CIA does not believe exists. As CIA Director Alan Hunley successfully convinces a Senate committee to disband and absorb the IMF, currently without a secretary in charge, into the CIA for its destructive methods and other misconduct, Hunt is captured by the Syndicate at a record shop in London, while their leader, a blond man in glasses, kills the female IMF agent stationed there. Hunt escapes a torture chamber led by Syndicate member Janik "Bone Doctor" Vinter with the help of disavowed MI6 agent and now Syndicate operative Ilsa Faust. IMF Field Operations Director William Brandt, knowing Hunley will try to capture Hunt, warns him to stay undercover. Cut off from the IMF, Hunt follows his only lead: the man in glasses, later identified as former MI6 agent Solomon Lane. Six months later, Hunt, still a fugitive living in Paris (luring a CIA team to a decoy safe house in Havana), enlists former colleague Benji Dunn to attend the opera Turandot in the Vienna state theater, predicting that an assassination attempt will be made on the Austrian Chancellor at the performance, and that Lane will also be there. The two stop three snipers, including Faust, but the Chancellor is ultimately killed by a car bomb, and Lane is still not found. Faust drops hints of Lane's plan to Hunt before leaving. After learning the Syndicate is working against "the old world order" by performing several terrorist acts, Dunn stays with Hunt instead of reporting back to the CIA, despite knowing his action amounts to treason. Hunt, blamed for the Chancellor's death, is pursued by the CIA's Special Activities Division. Brandt contacts Luther Stickell to find Hunt before the CIA does. Stickell tracks Hunt, Dunn, and Faust to Casablanca, where they break into and acquire a secret Syndicate file from a secure building. Faust flees with the data, evading both Hunt and Syndicate members, although Hunt kills the pursuing agents. Dunn reveals he copied the data onto a second USB drive, as Stickell and Brandt catch up to them. Faust returns to London and attempts to use the file to quit her mission to infiltrate the Syndicate, but her MI6 handler, Atlee, compels her to continue, whilst discreetly wiping her drive. Meanwhile, Hunt learns that the data is an encrypted British government red box that requires the Prime Minister's biometrics to unlock it. They reach London, where Lane's men abduct Dunn, and use Dunn and Faust to blackmail Hunt into decrypting and delivering the data to them. Hunt agrees to the ultimatum, despite Brandt's protests. As part of Hunt's plan, Brandt reveals their location to Hunley. During a charity auction in Blenheim Palace near Oxford, Hunley, Brandt, and Atlee take the PM to a secure room to protect him from Hunt. Brandt has the PM confirm the existence of the Syndicate, a project proposed by Atlee to perform missions without oversight, effectively making the PM "judge, jury and executioner with zero accountability", before Atlee reveals himself as Hunt in a mask and secures the PM's biometrics, allowing Stickell to decrypt the file. When the real Atlee arrives, Hunt forces him to admit that he began the Syndicate without permission and that he has been covering up its existence after Lane hijacked the project and went rogue, turning the Syndicate against him and MI6. Upon discovering the file contains access to £2.4 billion in various bank accounts, serving as the Syndicate's would-be operating budget, Hunt destroys the data. At the meeting, outside the Tower of London, he tells Lane he memorized the data and offers himself in exchange for Dunn and Faust. Dunn escapes after the bomb on him is disarmed, while Hunt and Faust are chased through the Tower of London complex by Lane's men. Faust kills Vinter in a knife fight, while Hunt confronts Lane and lures him into a sealed, bulletproof glass cell where he is gassed unconscious and taken into custody. Having witnessed an IMF operation's success firsthand, Hunley later returns with Brandt to the Senate committee and convinces them to restore the IMF by covering for Hunt and his team. Outside after the meeting, Brandt congratulates Hunley, who is now the new IMF Secretary. Cast Tom Cruise as Ethan Hunt, an IMF agent Jeremy Renner as William Brandt, an IMF Field Operations Director Simon Pegg as Benji Dunn, an IMF technical field agent Rebecca Ferguson as Ilsa Faust, an MI6 agent undercover in the Syndicate Ving Rhames as Luther Stickell, an IMF agent and computer specialist and Ethan's closest friend and ally Sean Harris as Solomon Lane, a former MI6 agent who went rogue and became the supreme leader of the Syndicate Simon McBurney as Atlee, the Chief of the Secret Intelligence Service Zhang Jingchu as Lauren, a CIA analyst Tom Hollander as Prime Minister of the United Kingdom Jens Hultén as Janik Vinter, a former KGB operative and Lane's second-in-command Alec Baldwin as Alan Hunley, the Director of the Central Intelligence Agency Hermione Corfield as Record Shop Keeper/IMF agent Production Pre-production Paramount Pictures announced in August 2013 that Christopher McQuarrie would direct the fifth Mission: Impossible film, from a script by Drew Pearce, with Tom Cruise reprising his role as Ethan Hunt. TC Productions and Bad Robot would produce, and Skydance Productions, who served as co-financers and executive producers of the latest installment, will work closely with the team in the development and production process." On November 14, 2013, Paramount announced a release date of December 25, 2015. The same month, Simon Pegg confirmed he would reprise his role as Benji. In May 2014, Will Staples replaced Pearce as screenwriter. Also that month, Jeremy Renner confirmed he was returning in the role of William Brandt, and Cruise said the film would shoot in London, with a later report saying it would first shoot in Vienna in August. At some point, McQuarrie replaced Staples as screenwriter; the final credits list McQuarrie as screenwriter, with story by Pearce. In July 2014, Rebecca Ferguson was cast and Alec Baldwin was in talks for the film. Baldwin was confirmed to have joined the cast in August 2014, and Ving Rhames was confirmed to be reprising his role of Luther Stickell. On September 5, it was announced that Sean Harris was in negotiations for the villain role. On October 2, Simon McBurney joined the cast of the film. On October 6, Chinese actress Zhang Jingchu joined the film's cast (she only appears for 30 seconds in the finished film). On March 22, 2015, Paramount revealed the film's official title, Mission: Impossible – Rogue Nation, along with a teaser poster and trailer. Filming Principal photography began in August 2014. On August 21, the production released its first photos from the set in Vienna, Austria. In August actors Cruise and Pegg, along with director Christopher McQuarrie, were in Vienna, at the Metro and on the roof-top of Vienna State Opera. After finishing one-and-a-half weeks of filming in Austria, on August 30, Cruise arrived in the Moroccan capital city of Rabat for filming more scenes. Here the Marrakesh Highway was closed for fourteen days (August 30–September 12). Other filming locations in Morocco include Agadir, Rabat and Casablanca. On September 8 and 9, filming took place in The Marrakesh Stadium, which was closed both days for filming purposes, and Kasbah of the Udayas, in Rabat. After more than a month of shooting in Austria and Morocco, filming moved to London on September 28. On October 10, Cruise and his stuntman Wade Eastwood were filming some scenes in Monaco. Filming of an action scene featuring Ethan Hunt climbing and hanging on the outside of a flying Atlas C1 took place at RAF Wittering near Stamford. Tom Cruise performed the sequence, at times suspended on the aircraft over in the air, without the use of a stunt double. To pull off this particular stunt, the production team were given a limited period of only 48 hours. The plane took off and landed 8 times before they had the perfect shot. On November 9, filming began on Southampton Water, and Fawley Power Station. Tom Cruise trained under diving specialist Kirk Krack to be able to hold his breath for three minutes to perform an underwater sequence which was filmed in a single long take without any edits (though the scene in the movie was cut with several breaks, giving the impression for the scene having several takes). However, stunt coordinator Wade Eastwood claims that Cruise held his breath for just over six minutes. On February 20, 2015, The Hollywood Reporter said filming was halted to give McQuarrie, Cruise, and an unknown third person time to rework the film's ending. Filming ended on March 12, 2015. Soundtrack The musical score for Mission: Impossible – Rogue Nation was composed by Joe Kraemer, who previously collaborated with director McQuarrie on The Way of the Gun and Jack Reacher. Kraemer was announced as the composer for the film in September 2014. The soundtrack was recorded with small orchestral sections at British Grove Studios and with full orchestra at Abbey Road Studios. As well as incorporating Lalo Schifrin's thematic material from the television series throughout the score, three tracks ("Escape to Danger," "A Matter of Going", and "Finale and Curtain Call") interpolate Puccini's Nessun dorma aria from his opera Turandot, featured in the opera house scene. The physical soundtrack became available from La-La Land Records on July 28, 2015, with the digital album released from Paramount Music on the same day. Release Paramount had originally scheduled the film for a December 25, 2015 release. On January 26, 2015, Paramount advanced the release date to July 31, 2015. The main reason cited by The Hollywood Reporter was to avoid competition with two other 2015 films, Star Wars: The Force Awakens and Spectre. In the United States and Canada, it was released in the Dolby Vision format in Dolby Cinema, the first ever time for Paramount. On February 13, 2015, Paramount and IMAX Corporation announced that they would digitally re-master the film into the IMAX format and release it in IMAX theaters worldwide on the scheduled date. The film was completed at 2:00AM on July 18, 2015, less than two weeks before its release date. The film was officially released in North America on July 31, 2015. Lotte released the film in South Korea on July 30, 2015. The film was released in China on September 8, 2015. In August 2015, Fox Networks acquired the US cable broadcast rights, for broadcast after its theatrical release. The film will be available for FX Networks and its suite of networks: FX, FXX, FXM, and the video-on-demand platform FXNow. Marketing A teaser trailer for the film was released on March 22, 2015. The following day, a full-length trailer was released. A second full-length trailer was released on June 3, 2015. Paramount Pictures spent $42 million on advertising for the film. A comic book was released in conjunction with the film's DVD/Blu-ray release. It follows Hunt going rogue during the events of the film. The comic is written by the film's writer and director Christopher McQuarrie and illustrations by Lazarus artist Owen Freeman. Reception Box office Mission: Impossible – Rogue Nation grossed $195 million in the U.S. and Canada, and $487.7 million in other countries, for a worldwide total of $682.7 million. Although Rogue Nation was projected to become the highest-grossing Mission: Impossible film and the biggest movie for Cruise, it apparently fell short of eclipsing Mission: Impossible – Ghost Protocols final gross to become the third-highest-grossing Mission: Impossible film and the third-biggest film for Cruise. It had a worldwide opening of $121 million and an IMAX worldwide opening total of $12.5 million (the third-biggest of July behind The Dark Knight Rises (2012) and Harry Potter and the Deathly Hallows – Part 2 (2011)). Deadline Hollywood calculated the net profit of the film to be $108.9 million, when factoring together all expenses and revenues for the film. United States and Canada In the United States and Canada, according to pre-release tracking, the film was projected to earn around $40–50 million in its opening weekend, less than what the first three Mission: Impossible films earned in their initial weekend. It made $4 million from its Thursday night showings which began at 8 p.m. from 2,764 theaters, and $20.3 million on its opening day, which is the second-biggest opening day for Cruise (behind War of the Worlds) and the biggest in the Mission: Impossible franchise (breaking Mission: Impossible 2s record), with 16% of ticket sales from the film's 367 IMAX theaters. In its opening weekend the film grossed $55.5 million exceeding expectations and is the second-highest opening in the franchise, behind Mission: Impossible 2 ($57.8 million) and the third-biggest for Cruise behind War of the Worlds ($64.8 million) and Mission: Impossible 2. IMAX contributed $8.4 million of the total opening gross from 369 IMAX screens which is the third-best for a July opening after The Dark Knight Rises ($19 million) and Harry Potter and the Deathly Hallows – Part 2 ($15.2 million). Premium large format grossed up $2.6 million, 13% of Friday's gross with Cinemark XD grossing close to $700,000 at 108 screens. It remained at the top spot for the second weekend earning an estimated $28.5 million (down 48.7%) from 3,988 theaters (32+ theaters) buoyed by strong word of mouth, rapturous reviews and strong plays at IMAX theaters. Revenues from IMAX also dropped steadily by 39% to $4.3 million in its second weekend. It topped the North American box office for two consecutive weekends until surpassed by the music biographical drama Straight Outta Compton in its third weekend. It ended its theatrical run on October 29, 2015, playing in theaters for a total of 91 days, or 13 weeks, earning a total of $195 million at the North American box office which is just 28.6% of its total worldwide gross. It is the third-highest-grossing Mission: Impossible film behind Mission: Impossible 2 ($215 million) and Mission: Impossible – Ghost Protocol ($209 million). Other countries Elsewhere, the film opened in 40 overseas markets including 135 IMAX theaters on July 31, 2015 in big markets such the United Kingdom, Mexico, and Australia. It grossed $64.5 million in its opening weekend and went No. 1 in 33 markets and IMAX contributed $4.1 million of its international opening. Revenues from its second weekend increased by 0.5% to $65 million. It added 18 new markets including India, Japan, and Russia and opened at No. 1 in 17 of the 18 markets with the exception of Japan where it was behind Jurassic World. Overall, it opened at No. 1 in 55 of the 63 territories it has been released in and had the biggest opening weekend ever for the franchise in 46 markets and Cruise's best opening in 40 markets. It topped the box office outside of North America for three consecutive weekends before being overtaken by Paramount's own Terminator Genisys in its fourth weekend and four in total. It had the biggest opening for the franchise in the UK, Ireland and Malta ($8.3 million), France ($7 million), India ($7.5 million), Japan ($6.1 million), Russia and the CIS ($5.3 million), Mexico ($5 million), the Middle East ($4.7; including $2.5 million from UAE alone), Taiwan ($5.1 million), Australia ($3.8 million), Germany ($3.2 million), Brazil ($3.1 million) and Pakistan ($1 million). In South Korea, where the franchise has been a hit it opened to $16.95 million (49% above Ghost Protocol), which is the second-biggest opening ever for Paramount, behind Transformers: Dark of the Moon; Cruise's biggest-ever opening; the best for the Mission: Impossible franchise; and the second-biggest opening for a Western film of 2015. It added $8.1 and $3.7 million in its second and third weekend for a total of $41.1 million making South Korea the film's second-highest market followed by Japan ($41.2 million), the United Kingdom ($32 million), France ($20.9 million), and Germany ($13 million). In Japan, it faced competition with the continued run of Jurassic World. In China, Rogue Nation emerged very successful and earned $18.5 million on its opening day of September 8 (including $1.4 million from midnight screenings), which is the country's biggest opening for a Hollywood 2D film, the second-biggest for any 2D film in China (only behind the $22.2 million debut of local 2D film Pancake Man), and the fifth-biggest opening for any film. Despite opening on a Tuesday—during which most children are off to school—the film opened successfully and almost matched the opening figure of North America. Rob Cain of Forbes cited out possible reasons for the successful opening: the well-establishment of the franchise in China (its immediate predecessor Ghost Protocol earned $102.7 million), rapid expansion and growth of Chinese movie market, being the second Hollywood movie (after Terminator Genisys) to be released after the nearly 60-day blackout period in which non-Chinese movies were dabarred from going to general release in the country, and the successful awareness campaign and marketing efforts by the team including Tom Cruise visiting several Chinese cities. It went on to earn an estimated $85.8 million through its opening weekend (Tuesday–Sunday) from 5,500 screens. It is the highest-grossing 2D Hollywood film there with $136.8 million (breaking Interstellars record). Rogue Nation was projected to make roughly 70% of its worldwide gross abroad, and indeed ended up making $487,287,762 or 71.4% of its entire worldwide gross overseas which is the highest among the series. Critical response On the review aggregator Rotten Tomatoes, Mission: Impossible – Rogue Nation has a rating of 93% based on 312 reviews and an average rating of 7.48/10. The website's critical consensus reads, "Mission: Impossible Rogue Nation continues the franchise's thrilling resurgence -- and proves that Tom Cruise remains an action star without equal." Metacritic gives the film a score of 75 out of 100 based on 46 critics, indicating "generally favorable reviews". On CinemaScore, audiences gave the film a grade of "A–" on an A+ to F scale. Ty Burr of The Boston Globe called the film "preposterously enjoyable" and said that it "unfolds with fluid, twisty, old-school pleasure," highlighting the performances of Cruise, Pegg, Ferguson, and Baldwin and comparing the action scenes to those of the James Bond films as well as Alfred Hitchcock's The Man Who Knew Too Much (1956). He ultimately gave the film 3 out of 4 stars. Richard Roeper of the Chicago Sun-Times gave Rogue Nation 3.5 out of 4 stars, highly praising the film's cast and stating that the film "keeps topping itself". However, he criticized the villain for not being too memorable or intimidating. Kenneth Turan of the Los Angeles Times said that McQuarrie's direction allowed Rogue Nation to stand out among the other films in terms of action and its inclusion of female characters, singling out Ferguson's Ilsa as uniquely empowered and action-oriented, also praising her scenes with Cruise. Christopher Orr of The Atlantic praised Cruise, saying "You overcome the impossible through the application of sheer, unvarnished willpower, a quality that Cruise has always possessed in abundance" and describing him as the driving force of the film and the franchise. He, too, praised Ferguson among the supporting cast for her role as an action heroine. Joseph Wigler of MTV.com considered the movie as "one of the most entertaining Ethan Hunt adventures" which proves that "the franchise still has plenty of fight left in it, with no signs of slowing down." He praised the performances of Cruise and Ferguson, applauding the latter for playing "the most fascinating character in the entire movie" and "one of the most complicated and alluring characters in the entire five film series." Manohla Dargis of The New York Times stated "Sleek and bloated, specific and generic, 'Rogue Nation' is pretty much like most of the 'Impossible' movies in that it’s an immense machine that Mr. McQuarrie, after tinkering and oiling, has cranked up again and set humming with twists and turns, global trotting and gadgets, a crack supporting cast and a hard-working star." A. A. Dowd of The A.V. Club remarked, "Rather than go full auteur on his formulaic material, McQuarrie instead offers a kind of greatest-hits package: 'Rogue Nation' marries the shifting loyalties of Brian De Palma's original to the kinetic action beats of John Woo's series nadir and the all-set-piece structure of Brad Bird's series zenith, adding an omnipotent villain not far removed from the one Philip Seymour Hoffman played in J.J. Abrams' entry. It’s the least visually or conceptually distinctive of the five movies, leaning on what's worked before rather than forging its own path." Chris Nashawaty of Entertainment Weekly gave the film a B+, calling it "breathlessly thrilling" and giving high praise to its action sequences, saying " all you can do is pick your jaw off your lap and grin at the breathtakingly bananas spectacle you've just witnessed." Meanwhile, David Edelstein of Vulture.com called Ferguson the "best reason" to see the film. However, he felt it did not surpass its predecessor and singled out several elements of some of the action sequences for criticism. Joe Morgenstern of The Wall Street Journal also praised Ferguson but felt that she and Cruise had "zero chemistry" onscreen. Nonetheless, he praised the film for working "ingenious changes on old tropes". Daniel Krupa of IGN only gave the film a score of 7/10, praising the action sequences and the performances of the central cast but criticizing it for not adding enough to the series or expanding on the plot of Ghost Protocol. Home media Mission Impossible: Rogue Nation was released on Blu-ray and DVD on December 15, 2015 in the United States. A 4K Ultra HD Blu-ray was released on June 26, 2018 along with the first four films. Accolades Sequel By May 2015, Paramount was developing a sixth Mission: Impossible film, with Cruise, Abrams, Ellison, and Goldberg returning to produce, along with Don Granger and Matt Grimm executive producing, and Elizabeth Raposo overseeing development. Christopher McQuarrie returned to write and direct the film, which began filming April 2017 for a July 2018 release. References External links Category:Mission: Impossible films Category:2015 films Category:2010s action films Category:2010s action thriller films Category:2010s heist films Category:2010s sequel films Category:2010s spy films Category:American films Category:American action films Category:American action thriller films Category:American heist films Category:American sequel films Category:American spy films Category:English-language films Category:Films about the Central Intelligence Agency Category:Films about the Secret Intelligence Service Category:Films about terrorism Category:Films based on television series Category:Films set in Casablanca Category:Films set in Havana Category:Films set in Kuala Lumpur Category:Films set in London Category:Films set in Minsk Category:Films set in Morocco Category:Films set in Oxfordshire Category:Films set in Paris Category:Films set in Vienna Category:Films set in Virginia Category:Films set in Washington, D.C. Category:Films shot in Austria Category:Films shot in Monaco Category:Films shot in Morocco Category:Films shot in Vienna Category:IMAX films Category:Alibaba Pictures films Category:Bad Robot Productions films Category:Cruise/Wagner Productions films Category:Paramount Pictures films Category:Skydance Media films Category:Films directed by Christopher McQuarrie Category:Films produced by J. J. Abrams Category:Films produced by Tom Cruise Category:Films with screenplays by Christopher McQuarrie Category:Films with screenplays by Drew Pearce Category:Films scored by Joe Kraemer
null
minipile
NaturalLanguage
mit
null
Hello, I'm Kung Fu Rahkshi Destroyer, here with something I like to call 'The Unscripted.' This is where I review...well, whatever I want, really. So, sit back and enjoy the show...story...thing...JUST READ IT ALREADY! Review the First: MLP:FiM ________________________________ "Now hold on a second here, My Little Pony?!" You may ask. "That silly toy for little girls? What on Earth is that doing here?! I wanted a grown up review of grown up stuff on a website that's a gathering place for fans of a toyline, why, back in MY day, arglesnargleshnorkypft!" Now, let me stop you right there. My little Pony: Friendship is Magic has very little to do with the toys of the 80's, or really any other version of My Little Pony. This show actually has good storylines, well developed characters, and a respect for the intelligence of the audience. "Impossible! You'd have to be girly and not a true man to enjoy something like that!" Anyways, believe it or not, this version of My Little Pony is actually good, thanks to a woman named Lauren Faust. Lauren Faust had previously worked on a few different animated shows in the past, such as Foster's Home for Imaginary Friends and The Powerpuff Girls. Her work with MLP began when she approached Hasbro with an idea for something called 'Galaxy Girls. 'Hasbro instead said, "Hey, Lauren, we like these ideas 'n stuff you are presentin' here wit the Galaxy and the Girls, but I have a different idea. What if we replaced 'Galaxy' wit 'My Little,' and then replaced 'Girls' wit 'Pony?'" And thus began My Little Pony: Friendship is Magic. A large part of the show's development was fueled by Lauren's belief that shows for girls shouldn't have to be 'girly,' so to speak. They could be just as grown up and respectful as boy's shows, if not even more. Once the show was made, the final product was far removed from the awful girly pit of despair and fluff, and was actually respectable. Of course, the show would never have taken off if it weren't for the people of the internet and their desire to send a giant 'Screw You!' through to the heavens. What do I mean by that? Well, when the first episodes aired, a review of it that basically called it a low sellout was put online. This ticked off people who actually thought the show was pretty awesome, and the review was met with scathing comments, and really just made people like the show even more, followed by it sweeping across websites and becoming a major hit. (My story of discovering the show was also a giant 'Screw You!,' but that's another topic.) Anyways, now that we have the history of the show out of the way, let's talk about the show itself. The show takes place in Equestria, which I can only describe as what you would see if you read mythology and then hit up the Tylenol. I'm not kidding, everything mythological is here, and I mean EVERYTHING. They put in so much mythology that they even have TARTARUS in there. I mean granted, it's not actually seen, just talked about, but still! On top of that, they actually create their OWN mythology for the show too, so there's a lot going on here. The main inhabitants of this world are three types of magical ponies, Earth Ponies, Unicorns, and Pegasi. Oh, and there are also some Alicorns in there, who are all princesses. I don't know why that is either, it's never really explained. The show focuses on Unicorn Twilight Sparkle and her friends as they learn about the magic of friendship, which is actually literal magic in this show, as evidenced in the Elements of Harmony, which are basically magic artifacts powered by friendship to create FREAKIN LASER BEAMS. The first two seasons are 26 episodes long each, and are generally your basic stuff that you would expect, like evil former rulers, Q from Star Trek, pop culture references, and topping it all off with a big two-parter involving a wedding and an invasion from shapeshifting bug-ponies that get defeated pretty much just like Team Rocket. These are notable for popularizing the show and managing to do a decent job of teaching lessons while handling subjects you might not expect on a kid's show. Then there was Season 3. Hoo boy. Season 3. In case you're wondering why I held off talking about this season, it's because this one has caused an EXTREME amount of controversy, fueled by rather unintelligent fans and leading to a broken fanbase. This season took the most chances, and not all of them work. For example, this season starts off with having to defend a Crystal Empire from a tyrant king that enslaved it's inhabitants before being turned into shadow and trapped in ice about a thousand years back. Of course, he's back and wants to do the same thing, except now he's an immensely large shadow monster. Oh, and it's implied that he killed off all the children in his reign. Charmed yet? A major complaint about this season is that it's too dark and strays away from the original idea of the show, as seen above. Yeah, that can be a problem. I mean, I certainly don't mind some darker and edgier material as long as it's done well. If it's done well, then it feels more mature and more respectful to it's audience. However, it's a very fine line, and if you don't balance correctly, it'll just come off as awkward and mean-spirited, and that is a problem with this season. Take Spike, for example. Spike is a dragon, and the assistant to Twilight Sparkle. He's also an orphan. And the main target for comedic suffering. Not a good combo there. Granted, they previously handled this pretty well in that he usually deserved what was coming to him, and it never really affected him that much. Then, in the third season, he started being picked on by the writers for really no good reason, and that does show. The third season seems to be trying to get away with as much as a kid's show can, like having Ponyville taken over and turned into the 'kid friendly' version of Nazi Germany, showing blood, (granted the blood was just a very tiny amount from accidental stabbing with a needle, but still more than most kid's programming can get away with) Chrysalis killing a kitten, and Tim Curry. (Yes, I know the last two are from the comics, but I still count them. There's still a lot of Nightmare Fuel from the episodes if you're that picky.) (Also, Optimus Prime was in the comics. What was up with that?) Another complaint is that they changed stuff, like reforming one of the fan favorite villains and turning Twilight into an Alicorn. This complaint holds very little ground with me, as they actually did these things well. Remember how Transformers was ruined forever when they changed something? Or how Bionicle totally sucked after they switched stuff around? No? THEN STOP YOUR COMPLAINING. SOME PEOPLE LIKE CHANGE. STOP SHOVING YOUR OPINION INTO OUR FACES. I'm going to have to end this review here, although you can expect me to go a lot more in-depth about the series in the future. I will say this before I go: watch MLP:FiM if you haven't already. You're free to like it or dislike it, but please just give it a fair judgement. I personally like it quite a bit. While I am certainly appreciative of the levelheadedness and fair portrayal of the franchise that went into this review, my lone problem with the review itself stems from the fact that it leans towards requiring a familiarity with Tropes to truly understand what you mean when you describe the thing. Other than that, thumbs up to you. Not a fan of the show personally, but kudos to your review all the same. 0 ~Totally like a boomerang. I always come back. Just never when you want me to.~ If you just want to write about things, I would suggest becoming a Premier Member and using your blog for that. If you want to review something in particular, I'd suggest seeing if there's a topic about it already (such as a MLP topic) and review it there. Alternatively you could make a topic where anyone can post reviews. A topic for just you to review things would be better off as a blog though.Thread closed.
null
minipile
NaturalLanguage
mit
null
--- abstract: | We report the observation of a quantum phase transition (QPT), tuned by a parallel magnetic field, between a superconducting and metallic state in Au$_{0.7}$In$_{0.3}$ films of very low normal-state sheet resistance ($< 90~\Omega $). These films can be modeled as a random array of superconductor-normal metal-superconductor (SNS) junctions. Electrical transport and tunneling measurements suggest that, in the metallic state, the film consists of superconducting In-rich grains not linked by Josephson coupling. Whether phase fluctuation, which is not expected to be strong in such an SNS junction system according to the phase–number uncertainty relation, or a different physical process drives the observed QPT is discussed. author: - 'M. M. Rosario' - 'H. Wang' - 'Yu. Zadorozhny' - 'Y. Liu' title: 'Quantum phase transition in superconducting Au$_{0.7}$In$_{0.3}$ films of very low normal-state sheet resistance' --- As an example of a quantum phase transition (QPT), the superconductor-insulator transition (SIT) in two dimensions (2D) has been an important subject of study in contemporary condensed matter physics [@markovicreview]. Consideration of the 2D SIT observed in granular films [@jaeger86; @dynes86] and superconductor-insulator-superconductor (SIS) Josephson junction arrays [@chenandvanderzant] usually starts from quantum phase fluctuations. The SIT observed in homogenous films [@haviland89; @hebard90; @valles92] has been analyzed in a dirty Bose-Hubbard model [@fisher90] that builds on phase considerations as well. The physical origin of the phase fluctuation is captured by an uncertainty relation between the superconducting phase $\phi $ and the number of carriers $N$ with the form $\Delta \phi \Delta N \approx 1$. For SIS junction arrays or granular films, the large charging energy of the superconducting islands makes the transfer of Cooper pairs between neighboring islands difficult, suppressing the fluctuation in $N$. As a result, the fluctuation in the phase is enhanced, leading ultimately to an SIT. The introduction of shunt resistance or dissipation tends to suppress the phase fluctuation. In recent experiments, it was found that dissipation can restore the global phase coherence for a system sitting on the insulating side of the SIT [@takahide; @clarke], as anticipated [@chakravartyandkivelson]. For amorphous films, the localization of electrons by disorder can reduce $\Delta N$, and consequently lead to enhanced phase fluctuation and an SIT. With no exception, the normal-state sheet resistance $R_{\Box}^{\rm N}$ of the films around the SIT is large, typically around $h/4e^2 = 6.45~{\rm k}\Omega$ [@markovicreview]. Recently, the possible existence of a metallic state in 2D SIT systems has received renewed theoretical attention [@doniachandphillips; @kapitulnik01]. The apparent existence of such a state occuring between the insulating and the superconducting phase, marked by a flat resistance tail at the lowest temperatures, was seen in ultrathin granular films of Ga, Pb, and In measured down to 0.6 K [@jaeger86], in thin Al films down to 0.3 K [@wu94], and in SIS Josephson junction arrays down to 10 mK [@chenandvanderzant]. Based on experiments on amorphous MoGe films in perpendicular magnetic field [@mason99], it was proposed that dissipation may open a parameter space for a metallic state to occur near a 2D QPT in general [@kapitulnik01]. In all these previous studies, the metallic state was found in systems with large $R_{\Box}^{\rm N}$ ($> 1~{\rm k}\Omega$). Here we report electrical transport and tunneling measurements in Au$_{0.7}$In$_{0.3}$ thin films, showing the existence of a QPT and a metallic state in films with very low $R_{\Box}^{\rm N}$ ($< 90~\Omega $). Au$_{0.7}$In$_{0.3}$ films were prepared by sequential thermal evaporation of alternating Au and In layers, with the layer thicknesses determined by the desired atomic ratio of Au to In. The maximum solid solubility of In in Au is around 10% at room temperature. The interdiffusion of Au and In in a Au$_{0.7}$In$_{0.3}$ film results in a 2D system consisting of In-rich grains, with a maximum local $T_{\rm c}$ of 0.6–0.8K, embedded in a Au$_{0.9}$In$_{0.1}$ matrix, with $T_{\rm c}$ around 77 mK [@zador02]. Since the atomic composition and the size of the In-rich grains can vary randomly, strong spatial variation in the amplitude of the superconducting order parameter (the superconducting gap) is expected. It has been shown previously that this system can be modeled as a random array of superconductor-normal metal-superconductor (SNS) Josephson junctions [@zador02]. Planar tunnel junctions of Au$_{0.7}$In$_{0.3}$/MgO$_x$/Mg were made in a standard cross geometry, with a junction size of $0.2 \times 0.3~{\rm mm}^2$. The Mg bottom layer was thermally evaporated at ambient temperature, with subsequent growth of a native Mg oxide layer encouraged by the use of glow discharge in an O$_2$ environment. The deposition of the Au$_{0.7}$In$_{0.3}$ top layer was carried out with the substrate held at liquid nitrogen temperatures ($\approx 77$ K) to help preserve the insulating barrier. The results presented here correspond to a junction with a normal state resistance of $115~\Omega$. Measurements on another junction of comparable resistance and two junctions of higher resistance ($\sim 10^3 \Omega$) yielded qualitatively similar results. Electrical transport measurements were carried out in a dilution refrigerator equipped with a superconducting magnet. The base temperature was $<20$ mK. All electrical leads entering the cryostat were filtered with the attenuation of 10 dB at 10 MHz and 50 dB at 300 MHz. Resistances and current-voltage ($I-V$) characteristics were measured with a d.c. current source and a nanovoltmeter. Tunneling conductances $G_{\rm j}(V)$ were determined by taking the derivative of $I-V$ curves numerically. The magnetic field was applied parallel to the film plane (estimated to be aligned within about $1^{\rm o}$) and perpendicular to the tunneling direction. Figure 1 shows the temperature dependence of the sheet resistance $R_{\Box}(T)$ in parallel magnetic field $H_{\parallel}$ for several Au$_{0.7}$In$_{0.3}$ films. The normal-state sheet resistance of these films, ranging from 10–90 $\Omega $, are very low compared with $h/4e^2$ where the 2D SIT typically occurs. The superconducting transition temperature $T_{\rm c}$ was found to decrease with increasing $H_{\parallel}$. For relatively small $H_{\parallel}$, a fully superconducting state was obtained. However, despite the presence of a substantial resistance drop slightly below the zero-field $T_{\rm c}$, zero resistance was not reached down to $T = 20$ mK as $H_{\parallel}$ surpassed a critical value $H_{\parallel }^{\rm c}$. Instead, a flat resistance tail was found, spanning nearly a decade in temperature. The limiting ($T \to 0$) resistance increased exponentially with $H_{\parallel}$ (Fig. 2). Figure 3 shows $I-V$ characteristics for the 10 nm thick film (shown in Fig. 1b). Data presented in Fig. 1b were obtained at currents of 1$\mu $A or 100nA, with no qualitative differences in $R(T)$ behavior. The $I-V$ characteristic evolved from nonlinear to linear (ohmic) behavior with increasing $H_{\parallel}$ at the lowest temperatures (Fig. 3b). According to the Kosterlitz-Thouless (KT) theory [@ktandhalperin], the finite temperature superconducting transition in 2D is associated with the thermal unbinding of vortex-antivortex pairs, leading to a $I-V$ characteristic of $V\sim I^3$ at $T=T_{\rm KT}$. In these Au$_{0.7}$In$_{0.3}$ films, the exponent was found to be less than 3 down to the lowest temperature ($V\sim I^{2.5.}$), perhaps due to a vanishing $T_{\rm KT} < 25$ mK. Despite this, the non-linear $I-V$ characteristic at the lowest temperatures indicates that vortices and antivortices were present at $H_{\parallel}=0$. Linear $I-V$ characteristics were found even at 25 mK at $H_{\parallel} = 0.20$T, above which the resistance tail emerged, suggesting the absence of vortex-antivortex unbinding in the metallic state. However, whether vortices and antivortices were absent, or were present but fully unbound, was not resolved. The interesting question is whether In-rich grains remain superconducting in the metallic state. Tunneling measurements were carried out to address this. Single particle tunneling spectra, obtained in Au$_{0.7}$In$_{0.3}$/MgO$_x$/Mg junctions at various temperatures and applied parallel fields, are shown in Fig. 4. The tunneling spectra in zero field indicates that an energy gap opened below $T = 0.28$ K. While a coherence peak is present in the tunneling spectra, the peak is smaller and the zero bias conductance $G_{\rm j}(V=0)$ is larger than expected from BCS theory. A 35% suppression of the normal state DOS was observed at 20 mK for junction shown in Fig. 4a and 25–80% for others at the zero bias, resulting from either a substantial population of quasiparticles in Au$_{0.7}$In$_{0.3}$ or junction leakage. The superconducting gap $\Delta _0$ is estimated by the peak position to be 0.1 meV at 25 mK, and is smaller if one uses $G_{\rm j}(V = \Delta /e) = G_{\rm j}^{\rm N}$. With $T_{\rm c}^{\rm onset}=0.82$ K, this leads to $\Delta _0/{\rm k_B}T_{\rm c} = 1.41$, slightly smaller than the BCS result, $\Delta /{\rm k_B}T_{\rm c} =1.76$. The evolution of the tunneling spectra with $H_{\parallel}$ is shown in Fig. 4b. With increasing field, more states were found within the gap until it closed at $H_{\parallel }\approx 0.55$ T. With increasing $H{\parallel }$, the coherence peak decreased in height and broadened in width. The zero-bias conductance, which could be related to the total area of the normal region of the films, increased linearly with $H_{\parallel}$ (data not shown). A natural picture concerning the observed superconducting-metallic state transition in Au$_{0.7}$In$_{0.3}$ films emerges from these measurements. With the application of $H_{\parallel}$, the superconductivity in the In-rich grains is gradually reduced. Eventually, a sufficient number of grains become normal so that a percolating path of Josephson coupled superconducting grains can no longer form, leading to the disappearance of global superconductivity. The average separation between superconducting islands at $H_{\parallel}^{\rm c}$ can be estimated. Finite Josephson coupling of an SNS junction is expected if the length of the N-layer is shorter than a few times of the normal coherence length $\xi _{\rm N}$. In the dirty limit, $\xi _{\rm N} = (\hbar D/2\pi {\rm k_B}T)^{1/2}$ where $D = v_{\rm F}\tau $ is the diffusion constant, $v_{\rm F}$ is the Fermi velocity, and $\tau $ is the relaxation time in the Boltzmann formula for resistivity, $\rho = m/ne^2\tau $. For the film shown in Fig. 1b, for example, we estimate $\xi _{\rm N}$ for the normal metal matrix (Au$_{0.9}$In$_{0.1}$) to be $\approx 0.2~\mu $m at 20 mK. This suggests that the average separation between surviving superconducting islands is in the micron range, comparable to the average size of the largest In-rich grains. Recently, Larkin and co-workers have proposed [@feigelman01] a theory for an SNS array of superconducting islands (of radius $d$ and spaced $b$ apart, such that $b \gg d$) proximity coupled to one another via a 2D normal film of dimensionless conductance $g = \sigma /(e^2/\hbar )$. In their model, quantum phase fluctuations induced by disorder and Coulomb repulsion are responsible for the suppression of superconductivity. A QPT from a superconducting to a normal-metal state was shown to occur at $g < g_{\rm c} \approx [(1/\pi){\rm ln}(b/d)]^2$. The corresponding critical sheet resistance $R_{\Box \rm c}$ can be substantially smaller than $R_Q$. For the films shown in Fig. 1, we estimate $R_{\Box \rm c} \approx R_{\Box}^N$. Then $R_{\Box}^N = 9.96\Omega $ would yield $g_{\rm c}= 404$. An unreasonably large distance between grains, given by $b = d{\rm exp}(63)$, would be obtained at the QPT, larger than the value inferred from the experiment, as described above. This appears to suggest that some important ingredients are missing from this model in its present form. An alternative model has been proposed in which the effects of fluctuations in the amplitude of the superconducting order parameter, primarily as a function of time, are taken into account [@spivak01]. Presumably, the amplitude fluctuation will be present when the radius of the superconducting island $d$ is smaller than the zero-temperature superconducting coherence length $\xi _0$, such that $d < \xi _0$. In the dirty limit, $\xi _0 = (\hbar D/\Delta )^{1/2}$ [@feigelman01]. This yields $\xi _0 \approx 0.1\mu $m for the present study. The size of many superconducting grains in Au$_{0.7}$In$_{0.3}$ films is expected to be smaller than this [@zador02], making substantial amplitude fluctuation plausible. The critical concentration of grains obtained in this model is substantially larger than that obtained in Ref. [@feigelman01], leading to a more reasonable value of critical conductance, qualitatively consistent with our experimental observation. Unfortunately, quantitative predictions are lacking, making a quantitative comparison between the experiment and the theory impossible. It was previously emphasized that amplitude fluctuations played a role in the 2D SIT in ultrathin amorphous films [@valles92; @hsu95]. The vanishing of the gap [@valles92], the reduced superconducting condensation energy [@hsu95], as well as the broadening of the tunneling spectrum [@hsu95] near the SIT were cited as the evidence for amplitude fluctuations. However, while the vanishing of the gap and condensation energy create favorable conditions for the amplitude of the order parameter to fluctuate, direct experimental evidence for this near a $T=0$ SIT is yet to be found. Given this, it might be helpful to consider possible driving forces for the amplitude fluctuation. The simplest consideration suggests that a deparing process is needed to induce amplitude fluctuation. The residual repulsive electron-electron interaction appears to be an obvious driving force for amplitude fluctuation. Theoretically, a magnetic field applied parallel to a homogeneously disordered 2D superconducting system was shown specifically to lead to strong amplitude fluctuations due to Zeeman splitting and strong spin-orbit coupling [@zhou98]. In this context, physical phenomena which may result from the presence of negative superfluid density ([*i.e.*]{}, $\pi $ junctions with negative Josephson coupling), an extreme case of the amplitude fluctuation, have been observed in Au$_{0.7}$In$_{0.3}$ cylindrical films [@zador01]. The observation of a flat resistance tail in films with such low $R_{\Box }^{\rm N}$ is striking. Is it possible that the tail originates from electrons being at a temperature higher than the lattice temperature because of insufficient cooling? It has been emphasized that a flat resistance tail has never been observed in granular or amorphous films prepared in some laboratories [@valles92; @hsu95; @dynes02]. In the present work, noise from outside the system were eliminated by RF filters. However, microwave noise originating from room-temperature parts of the measuring leads inside the cryostat may still affect the film resistance. Effective elimination of these noises requires filtering at cryogenic temperatures, for which the current system is not equipped. On the other hand, a similar phenomenon in Josephson junction arrays was observed in studies carried out with such filters [@chenandvanderzant]. In addition, the films in the present study were of very low $R_{\Box }^{\rm N}$, which should make heating due to the electromagnetic environment less significant. Nevertheless, it is desirable to show directly that electrons still cool in the temperature range in which the flat resistance tail was seen. Figure 5a shows the tunneling spectra at 20 and 50mK in zero field, indicating that the electronic system still cooled down to the lowest temperatures. Above $H_{\parallel}^{\rm c}$, the spectra became less distinguishable. However, this could be due to depairing effects. For a cylindrical film above $H_{\parallel }^{\rm c}$, the resistance shows a negative d$R$/d$T$ (Fig. 5c), indicating that the electrons were cooling in the metallic state for this sample. However, $R(T)$ at 5 T for the 7.5nm thick film showed a change of slope or flattening-off at low temperatures (Fig. 5d). Whether this was because superconducting fluctuations were still present or electrons were not cooling was not resolved. Direct measurements of the electronic temperature are needed to clarify this issue. In conclusion, we would like to thank S. Girvin, A.M. Goldman, S. Kivelson, P. Phillips, J. Rowell , J. Valles, Jr., and F. Zhou for useful discussions on various aspects of this work. We acknowledge support from NSF through Grant DMR 0202534. For a review see, [*e.g.*]{}, A. M. Goldman and N. Markovic, Phys. Today [**51**]{}, 39 (1998). H. M. Jaeger, D. B. Haviland, A. M. Goldman, and B. G. Orr, Phys. Rev. B [**34**]{}, 4920 (1986). A. E. White, R. C. Dynes, and J. P. Garno, Phys. Rev. B [**33**]{}, 3549 (1986). C. D. Chen, [*et al*]{}, Phys. Rev. B [**51**]{}, 15645 (1995); H. S. J. van der Zant, W. J. Elion, L. J. Geerligs, and J. E. Mooij, Phys. Rev. B [**54**]{}, 10081 (1996). D. B. Haviland, Y. Liu, and A. Goldman, Phys. Rev. Lett. [**62**]{}, 2180 (1989). A. F. Hebard and M. A. Paalanen, Phys. Rev. Lett. [**65**]{}, 927 (1990). J. M. Valles Jr., R. Dynes, and J. Garno, Phys. Rev. Lett. [**69**]{}, 3567 (1992). M. P. A. Fisher, G. Grinstein, and S. M. Girvin, Phys. Rev. Lett. [**64**]{}, 587 (1990). Y. Takahide, [*et al*]{}, Phys. Rev. Lett. [**85**]{}, 1974 (2000). A. J. Rimberg, [*et al*]{}, Phys. Rev. Lett. [**78**]{}, 2632 (1997). S. Chakravarty, S. Kivelson, G. T. Zimanyi, and B. I. Halperin, Phys. Rev. B [**35**]{}, 7256 (1987). D. Das and S. Doniach, Phys. Rev. B [**64**]{}, 134511 (2001); D. Dalidovich and P. Phillips, Phys. Rev. Lett. [**89**]{}, 027001 (2002). A. Kapitulnik, N. Mason, S. A. Kivelson, and S. Chakravarty, Phys. Rev. B [**63**]{}, 125322 (2001). W. Wu and P. W. Adams, Phys. Rev. Lett. [**73**]{} 1412 (1994). N. Mason and A. Kapitulnik, Phys. Rev. Lett. [**82**]{}, 5341 (1999). Yu. Zadorozhny and Y. Liu, Phys. Rev. B [**66**]{}, 054512 (2002). J. M. Kosterlitz and D. J. Thouless, J. Phys. C [**6**]{}, 1181 (1973); B. I. Halperin and D. R. Nelson, J. Low Temp. Phys. [**36**]{}, 599 (1979). M. V. Feigel’man, A. I. Larkin, and M. A. Skvortsov, Phys. Rev. Lett. [**86**]{}, 1869 (2001). B. Spivak, A. Zyuzin, and M. Hruska, Phys. Rev. B [**64**]{}, 132502 (2001). S.-Y. Hsu, J. A. Chervenak, and J. M. Valles Jr., Phys. Rev. Lett. [**75**]{}, 132 (1995). F. Zhou and B. Spivak, Phys. Rev. Lett [**80**]{}, 5647 (1998). Yu. Zadorozhny, D. R. Herman, and Y. Liu, Phys. Rev. B [**63**]{}, 144521 (2001); Yu. Zadorozhny and Y. Liu, Europhys. Lett. [**55**]{}, 712 (2001). A. Frydman, O. Naaman, and R. C. Dynes, Phys. Rev. B [**66**]{}, 052509 (2002).
null
minipile
NaturalLanguage
mit
null
This Eagle Scout Is A Super Bowl Champion Baltimore Ravens tight end Dennis Pitta played in football’s biggest game Feb. 3. In his third season, the 27-year-old Eagle Scout has emerged as one of the Ravens’ best offensive threats, racking up 61 receptions, 669 yards and seven touchdowns this season. But he saved the best for last, scoring a touchdown in his first-ever Super Bowl. Pitta took a moment out of his busy Super Bowl schedule to answer a couple of questions for Boys’ Life: BL: How has being an Eagle Scout influenced you? D.P.: From an early age, it teaches you a lot. It teaches you about discipline, it teaches you about hard work and being independent and you learn a lot of like skills in that program. It’s helped me throughout my whole career. BL: What does it mean to you to play in the Super Bowl? D.P.: It means everything. This is what you aspire to when you become a professional football player. This is the pinnacle of your career as a player, and everything you do throughout the year is to work to get to this point. So, this really means everything to be playing in this game. Brought to you by Clay Swartz, associate editor of Boys' Life magazine, Heads Up is your one-stop destination for the coolest stuff from around the globe. Plus there will be plenty of chances to win free stuff, so check in as much as possible.
null
minipile
NaturalLanguage
mit
null
In an exhaustive and unequivocal recentdecision, Massachusetts Superior Court JudgeFrancis R. Fecteauordered a new trial forBernard Baran, who, as previously profiled in thePhoenixand theNation, has been serving concurrent life sentences since the mid 1980s for child molestation at a daycare center in Western Massachusetts. Judge Fecteau’s decision pivots on an ineffective-assistance-of-counsel claim stemming from the use — actually, the nonuse — of unedited videotaped interviews. The interviews, which were recorded as children were being prepped to testify, emerged mysteriously only after the death of the district attorney who originally tried Baran, demonstrate the utter pliability of the accuser-kids’ minds, and would have therefore proven markedly beneficial to Baran’s defense. Significantly, Berkshire County DA David F. Capeless, upon assuming his deceased former boss’s mantle, found and turned over the tapes that his predecessor claimed to be unable to find during a four-year “search” conducted only after Baran’s current counsel and Judge Fecteau demanded that they be found. The grand jury that indicted Baran in 1984 had heard edited versions of the tapes. Had the jury that convicted him a year later heard the unedited originals, rather than the coached testimony of children on the stand, they might well have concluded that the allegations of abuse were planted in the children’s minds. Yet the tapes of the full interviews were never used at trial. Why not? As Judge Fecteau details, either the trial counsel didn’t know of their existence (a possibility that raises grave questions about the original prosecutor’s honesty) or Baran’s defense lawyer, who was paid $1000 by the Baran family to handle the entire trial, knew of the videotapes and didn’t use them (a possibility that raises equally grave questions about the quality of legal representation for poor defendants. Either way, Judge Fecteau ruled, Baran’s lawyer provided ineffective counsel, and thus Baran deserves at the very least a new trial. Judge Fecteau goes on to dissect, expose, and decimate the pseudo-scientific fervor that fueled the hysteria engulfing Baran’s prosecution in the first place. In no uncertain terms, Judge Fecteau takes the phony experts to task for their role in convicting a man on such shaky evidence. Nor did Judge Fecteau shrink from pointing out the role that homophobia almost certainly played in the jury’s verdict. Rare is the decision that contributes to law and justice in such sweeping terms. Judge Fecteau’s opinion, which will assume a place of national importance, does just that. (Disclosure: the author works in the law office of one of Baran’s current attorneys, Harvey Silverglate.) Gagging Baran’s lawyers — for justice or politics? It took a lot of loud lawyering to finally, after 21 years, get some measure of justice for Bernard Baran, who was convicted in 1985 of molesting children at a day care center and won the right to a retrial in June. Free at last Bernard Baran was released from prison on June 30, and is now free on bail awaiting a new trial. The Baran interview: an extended transcript of Michael Bronski and Catherine Tumber's conversation with Bernard Baran. Judge Dread A few hours after the Massachusetts SJC upheld his 2005 triumph in a libel case against the Boston Herald , Superior Court judge Ernest Murphy waxed dramatic. Genocide today It was a spooky image. Two women, who look like grandmothers and are identified as Russian Communists, standing in front of the American embassy in Moscow waving pictures of Slobodan Milosevic. Speech therapy The Muzzle Awards have been chronicling the worst Free Speech violations for a decade. Here are some of the lowlights from the past 10 years. Jailed HIV-positive pregnant woman released - for now Quinta Layin Tuleh, the HIV-positive pregnant woman a federal judge in Bangor, Maine, ordered jailed until her baby was delivered, has been released on bail while her appeal of her sentence makes its way through the courts.
null
minipile
NaturalLanguage
mit
null
106 Wn.2d 614 (1986) 724 P.2d 356 FLUKE CAPITAL & MANAGEMENT SERVICES COMPANY, Appellant, v. VOLNEY RICHMOND III, ET AL, Respondents. No. 52557-9. The Supreme Court of Washington, En Banc. September 4, 1986. *615 Jones, Grey & Bayley, P.S., by Donald B. Myers, John E. Glowney, and S. Leigh Fulwood, for appellant. Mussehl, Rosenberg, Grieff, Mussehl & Cotter, by Lawrence R. Besk and Jeffrey Michael Grieff, for respondents. UTTER, J. Fluke Capital and Management Services Company lost its ownership interest in a piece of property during foreclosure by a holder of a first deed of trust. Fluke now seeks indemnification from Volney Richmond III and his marital community. We affirm the trial court's dismissal of the case. In the late 1970's Richmond, the respondent, became involved in an attempt to develop a ski resort in the Snoqualmie Pass area when he invested in a piece of property with Glen Young. They purchased the property by purchasing the stock of a corporation, Mountain Grandeur, Inc. (MGI), holder of title to the property. Richmond and Young delivered a promissory note for $607,366.42 to the sellers of MGI, Michael Curtis and the Wedgewood Corporation. To secure the note Richmond and Young, as the new officers of MGI, had MGI execute a deed of trust on the property. Fluke Capital and Management Services Company, the appellant, became involved in the development efforts as a creditor. Sometime after Richmond and Young purchased *616 MGI, Young approached Fluke Property Management Company (a general partnership that preceded appellant Fluke Capital and Management Services Company) to discuss investing in another corporation that he ran, Alpine World, Inc. Young planned that Alpine World would develop the Mountain Grandeur project. Fluke agreed to guarantee a loan of about $200,000 made by Peoples National Bank of Washington to Alpine World. As security for the guaranty Young had MGI execute for Fluke a second deed of trust on the Mountain Grandeur property. As further security MGI at the same time gave Fluke an option to purchase the property at any time for $1,090,000. The development efforts failed and foreclosures began. Alpine World defaulted on its loan. Fluke honored its agreement to guarantee the loan and paid Peoples National Bank of Washington. Fluke then initiated a nonjudicial deed of trust foreclosure on its second deed of trust. At the trustee's sale in June 1981, Fluke purchased title to the Mountain Grandeur property, subject to the first deed of trust, for an amount equal to the amount of the debt it paid Peoples plus costs (approximately $280,000). Richmond and Young also defaulted on their obligation to Curtis and Wedgewood (which had been succeeded in interest by First Interstate Bank). First Interstate Bank and Curtis[1] initiated a judicial foreclosure on the property in Kittitas County Superior Court. The plaintiffs named Richmond, Young,[2] MGI, and Fluke (who by then held title to the encumbered property) as codefendants. In this second foreclosure proceeding Fluke asserted a cross claim against Richmond in its initial pleading. Fluke *617 claimed that it was a surety for Richmond, and that foreclosure was a proper remedy only after the Richmonds' assets had been exhausted for payment of the debt. The trial court denied Richmond's motion for a summary judgment dismissal of Fluke's claim. Later the court denied Fluke's motion for summary judgment on the claim. Thereafter First Interstate Bank amended its pleadings to convert the lawsuit from a foreclosure to an action on the note. Deed of trust issues disappeared and venue changed to King County. Then First Interstate Bank again amended its pleadings to reconvert the lawsuit to a foreclosure action with a claim for a deficiency judgment. Venue changed back to Kittitas County. When Fluke filed its final set of pleadings it elected not to reassert its cross claim against Richmond. In a pretrial memorandum Fluke asserted a reservation of rights to pursue the claims of indemnification and subrogation in later proceedings. In November 1983, the Kittitas court entered a judgment and decree of foreclosure in favor of First Interstate Bank. The court ordered that the Mountain Grandeur property be sold and the proceeds applied to the judgment against Richmond. In its order the court dismissed with prejudice all affirmative claims raised by the defendants, "provided that nothing in this paragraph shall affect any post-Judgment, statutory or equitable right of the Defendants." Clerk's Papers, at 375. The trial court entered judgment against Richmond for $484,691.85 principal and $161,053.12 interest. Fluke lost its interest in the property when it failed to bid above the amount for which the property was sold at a sheriff's sale, $343,836.31. Fluke now seeks relief outside of the foreclosure actions. In April 1984, Fluke instituted this action against Richmond in King County Superior Court. Fluke concedes that its claim in this action is identical to its initial cross claim in the Kittitas County foreclosure. In December 1984, Judge Elston granted Richmond's motion for a summary *618 judgment dismissal. Apparently[3] Judge Elston reasoned that (1) collateral estoppel bars Fluke from reasserting its claim in this action, (2) a writing is necessary to establish a suretyship agreement, (3) Washington law does not support Fluke's assumption that a suretyship exists in the property itself, and (4) the equities favor Richmond, not Fluke, so Fluke's claim of subrogation must fail. Fluke appealed the decision to Division One of the Court of Appeals. That court transferred the case to this court in March 1986. Although we reverse the trial court's rulings on collateral estoppel and the statute of frauds we affirm the dismissal of Fluke's action. [1] The parties dispute whether Fluke's lawsuit is barred by the doctrine of collateral estoppel. Collateral estoppel bars an action only if a prior adjudication is "sufficiently firm to be accorded conclusive effect." Restatement (Second) of Judgments § 13, at 132 (1982); Trautman, Claim and Issue Preclusion in Civil Litigation in Washington, 60 Wash. L. Rev. 805, 822 (1985). Here, contrary to Richmond's assertions, no conclusive decision was rendered on Fluke's initial suretyship cross claim. The trial court heard two pretrial motions on the claim; the court denied Fluke's motion for summary judgment and denied Richmond's motion for dismissal on summary judgment. Neither ruling can be characterized as a decision on the merits of Fluke's claim. In addition, the doctrine of collateral estoppel applies only when an issue actually has been litigated and decided in a prior action. When an issue of fact or law is actually litigated and determined by a valid and final judgment, and the determination is essential to the judgment, the determination is conclusive in a subsequent action between the parties, whether on the same or a different claim. (Italics ours.) Restatement, § 27, at 250. See also Beagles v. *619 Seattle-First Nat'l Bank, 25 Wn. App. 925, 610 P.2d 962 (1980). Here, Fluke abandoned its cross claim of suretyship when the parties to the foreclosure action filed their final set of amended pleadings.[4] The claim was not even pending during trial or when the court made its final ruling. The issue of suretyship cannot be said to have been "actually litigated and determined." Nor was the issue of suretyship essential to the court's final decision in the foreclosure action. The court decided the enforceability of Richmond's obligation to First Interstate Bank, the validity of the deed of trust, and the priority of the liens on the property. The issue of Fluke's ability as a surety to seek indemnification from Richmond is not essential to any of those findings. Richmond argues that RCW 19.72.140 compels a court to decide a question of suretyship before deciding the rest of the litigation, and that Fluke's suretyship therefore was a necessary issue of the court's final ruling. However, RCW 19.72.140 merely authorizes a court to determine suretyship before trial: When any action is brought against two or more defendants upon a contract, any one or more of the defendants being surety for the others, the surety may, upon a written complaint to the court, cause the question of suretyship to be tried and determined upon the issues made by the parties at the trial of the cause, or at any time before or after the trial, or at a subsequent term, but such proceedings shall not affect the proceedings of the plaintiff. (Italics ours.) Here, no "written complaint to the court" requesting determination of the suretyship issue existed after First Interstate Bank filed its final pleadings. The court therefore had no mandate to rule on the suretyship issue. Richmond also argues that Fluke's suretyship claim is *620 barred because the issue "could have and should have" been raised in the prior action. This argument is appropriate only under res judicata theory. Under the doctrine of res judicata, or claim preclusion, a claim decided in a prior action cannot be raised in a subsequent action. Restatement § 17. A claim includes "all rights of the [claimant] to remedies against the defendant with respect to all or any part of the transaction, or series of connected transactions, out of which the action arose", without regard to whether the issues actually were raised or litigated. Restatement § 24(1), at 196. See Sanwick v. Puget Sound Title Ins. Co., 70 Wn.2d 438, 423 P.2d 624, 38 A.L.R.3d 315 (1967). See also Trautman, 60 Wash. L. Rev. at 813-19. In contrast, under collateral estoppel — or issue preclusion — only those issues actually litigated are barred. Restatement § 27. In this case Fluke abandoned its suretyship claim when it filed its final set of pleadings. Because Fluke abandoned its claim the doctrine of res judicata is inappropriate in this action (and in fact Richmond purports to rely only on the theory of collateral estoppel). Richmond's "could have and should have" argument, which is grounded in res judicata, thus must fail. [2] Richmond also suggests that the doctrine of "the law of the case" bars Fluke's claim. This argument has no merit. The law of the case doctrine applies only when an appellate court holding has issued in a prior appeal of the same case. See Greene v. Rothschild, 68 Wn.2d 1, 402 P.2d 356, 414 P.2d 1013 (1965); Trautman, 60 Wash. L. Rev. at 810. Also, the doctrine applies only to issues actually decided. Riley v. Sturdevant, 12 Wn. App. 808, 532 P.2d 640 (1975); Trautman, 60 Wash. L. Rev. at 811. Neither circumstance exists here. [3] The parties dispute whether a writing is required to prove a suretyship. This court has recognized that an implied promise to indemnify the surety by the principal can be enforceable without an express written agreement. Leuning v. Hill, 79 Wn.2d 396, 486 P.2d 87 (1971). Generally courts interpret the statute of frauds to require a writing *621 only when it is the creditor who attempts to enforce a suretyship obligation against the surety. A. Stearns, Suretyship § 3.6 (5th ed. 1951). In this case Fluke is attempting to enforce a suretyship obligation against the principal, not a surety. Finally, the parties dispute whether Fluke can prove a right to indemnification. Fluke appears to argue that two lines of reasoning support its claims against Richmond. None of Fluke's arguments, however, are persuasive. [4] Fluke first claims that it can assert surety rights of MGI against Richmond. Fluke reasons that a suretyship arose when MGI executed a deed of trust to secure Richmond's debt. Fluke is partly correct. Generally, courts distinguish two types of suretyships: personal and real. City Nat'l Bank & Trust Co. v. Pyle, 25 Wn. App. 583, 609 P.2d 966 (1980). A "personal" suretyship obligates the surety personally to satisfy the obligation. In contrast, a "real" suretyship imposes an obligation only upon the land used as security. A real suretyship arises when property is pledged or mortgaged for a debt. A. Stearns, § 1.3, at 3. The obligation of the property owner is limited to the land itself. Restatement of Security § 83(c), comment e (1941). Here, Fluke is correct in arguing that MGI's transfer of the Mountain Grandeur property gave rise to a real suretyship. However, Fluke next reasons that because the Mountain Grandeur property was a real surety Fluke acquired surety status by acquiring title to the property. This jump in logic is unsupportable. Fluke is claiming to be a personal surety. A personal suretyship arises only when a party assumes an obligation to pay another's debt. A. Stearns, supra. A personal suretyship is a consensual and contractual relationship that requires mutual assent. National Bank v. Equity Investors, 86 Wn.2d 545, 546 P.2d 440 (1976). Fluke has presented no evidence that it intended at any time to assume personal liability for Richmond's debt. This court will hold the transferee of land that is subject to a mortgage personally liable for the debt underlying that mortgage only upon clear and convincing proof of the assumption of the *622 debt. Heggen Constr. Co. v. Turalba, 88 Wn.2d 711, 565 P.2d 420 (1977). In the absence of further proof Fluke cannot argue that its purchase of the property subject to a deed of trust was equivalent to an agreement to assume personal liability for Richmond's debt. Fluke cites MGIC Fin. Corp. v. H.A. Briggs Co., 24 Wn. App. 1, 600 P.2d 573 (1979) to support its argument that it succeeded to MGI's suretyship status by purchasing the Mountain Grandeur property. The MGIC case does not support this argument. The MGIC case involved a junior lienor's succession to the rights of a senior lienor. Here, MGI was not a senior lienor. The MGIC case thus does not in any way support Fluke's argument that Fluke can succeed to a surety position held by MGI. [5] However, Fluke next argues that it is entitled to subrogation to the claims and judgment of First Interstate Bank, the senior lienor. "Subrogation is the substitution of one person to the position of another, an obligee, whose claim he [or she] has satisfied." G. Osborne, Mortgages § 277, at 561 (2d ed. 1970). MGIC Fin. Corp. v. H.A. Briggs Co., supra, is relevant to this argument. At issue in that case was the protection of the security interest of a holder of a second deed of trust. The court stated that the junior lienor had the right to (1) pay off the debt secured by the senior mortgage, and (2) then stand in the shoes of the senior lienor and assert that party's rights, which could include personally suing the mortgagor. 24 Wn. App. at 6. As the MGIC case suggests, the key to Fluke's ability to subrogate itself to the rights of the senior lienor is payment of the debt owed by Richmond. A junior lienor can succeed to the rights of a senior lienor only by paying off the debt owed to the senior lienor. As one treatise says, Another group of cases in which the right of subrogation is not questioned is that in which a person, although not personally bound to pay, is compelled to do so in order to protect some interest of his [or her] own.... Thus a junior mortgagee may pay off a prior mortgage *623 and be subrogated to all rights under it against the mortgagor. G. Osborne, § 279, at 565. This court recognized this same principle when it said: It has, furthermore, been long recognized that when a surety, to protect his interests, discharges an obligation the primary responsibility for which rests with the principal obligor, an implied promise to indemnify or reimburse the surety comes into being on the part of the principal, which implied obligation, as such, is enforceable by the surety against the principal. Leuning v. Hill, 79 Wn.2d 396, 400, 486 P.2d 87 (1971). See also Livingston v. Shelton, 85 Wn.2d 615, 620, 537 P.2d 774 (1975), cert. denied, 424 U.S. 958 (1976); In re New England Fish Co., 749 F.2d 1277, 1282 (9th Cir.1984). Here, Fluke apparently reasons that it has "paid" First Interstate because Fluke lost its interest in the Mountain Grandeur parcel when the parcel was sold and the proceeds applied against Richmond's obligation. Fluke cannot make this claim. When Fluke acquired title to the Mountain Grandeur property the parcel already secured Richmond's obligation of more than $600,000. None of Fluke's own assets ever were applied against this debt. When First Interstate Bank foreclosed upon the Mountain Grandeur property Fluke could have protected its own interest by paying off Richmond's obligation to First Interstate Bank. Fluke also could have protected its interest by bidding an amount higher than the sale price at the sheriff's sale or by exercising its right to redemption after the sale. Instead, Fluke relinquished all of its rights in the property. Fluke allowed the "real" surety — the property — to pay the debt. Fluke cannot now claim that it possesses the rights of a "personal" surety. We agree with the trial court that the equities of the case favor Richmond. Cf. Transamerica Title Ins. Co. v. Johnson, 103 Wn.2d 409, 417, 693 P.2d 697 (1985). Fluke assumed the risk of loss that it now suffers. Fluke took a second deed of trust on the Mountain Grandeur parcel even *624 though the first deed of trust secured a $600,000 obligation. Fluke paid $280,000 for a piece of encumbered property once valued at over one million dollars. Any business person in Fluke's position would know that if the prior lienor foreclosed Fluke would either have to pay more or lose the property. Moreover, Fluke limited its own remedies when it nonjudicially foreclosed on the second deed of trust. Under Washington law, a creditor that holds a deed of trust as security for a loan can use either judicial or nonjudicial procedures to enforce that security. The remedies of a creditor who chooses nonjudicial procedures are limited to foreclosure alone: [Nonjudicial] [f]oreclosure, as in this chapter provided, shall satisfy the obligation secured by the deed of trust foreclosed, regardless of the sale price or fair value, and no deficiency decree or other judgment shall thereafter be obtained on such obligation.... RCW 61.24.100. Here, Fluke chose to rely solely on the value of the Mountain Grandeur parcel to remedy the default by Alpine World. The value of the land dropped, however, and cannot cover the obligations of both Alpine World and Richmond. Fluke cannot now turn around and try to recover its losses from Richmond's personal assets. Fluke's only contention is that it should not lose the property when Richmond is capable of paying his obligation to First Interstate Bank. This argument is not persuasive. Richmond protected himself from personal liability by having MGI use the Mountain Grandeur property as security. Richmond's personal financial worth cannot now affect his contractual relationships. Richmond cross-appeals the trial court's refusal to award attorney fees against Fluke. Richmond claims three grounds for an award: (1) an attorney fees provision in the guaranty agreement executed between Fluke and Alpine World, (2) an attorney fees provision in the promissory *625 note that obligates Richmond to First Interstate Bank, and (3) RCW 4.84.185, which authorizes awards of attorney fees for frivolous lawsuits. We will not consider the first two arguments because Richmond has raised them for the first time on appeal. RAP 2.5(a). We affirm the trial court's refusal to award attorney fees under RCW 4.84.185 for two reasons. First, RCW 4.84.185 does not apply in this case. RCW 4.84.185 authorizes a court to award attorney fees against a nonprevailing party "upon final judgment and written findings ... that the action ... was frivolous and advanced without reasonable cause". However, the statute also provides that "[t]his determination shall be made upon post-trial motion". (Italics ours.) This language indicates that RCW 4.84.185 does not authorize an award of attorney fees on a pretrial motion. Richmond requested attorney fees pursuant to a pretrial motion for summary judgment dismissal. The trial court properly refused to award attorney fees. [6] Second, this court has held that an award of attorney fees that is authorized by statute is left to the trial court's discretion and will not be disturbed "in the absence of a clear showing of abuse of discretion". Marketing Unlimited, Inc. v. Jefferson Chem. Co., 90 Wn.2d 410, 412, 583 P.2d 630 (1978). See also Meyer v. UW, 105 Wn.2d 847, 719 P.2d 98 (1986). This standard of review is appropriate for decisions under RCW 4.84.185. However, Richmond has not proven that the trial court's refusal to award fees constituted an abuse of discretion. [7] Finally, Richmond requests an award of attorney fees pursuant to RAP 18.9(a), which authorizes sanctions for frivolous appeals. Because the appeal raises issues on which reasonable minds might differ we decline to award attorney fees. See Boyles v. Department of Retirement Sys., 105 Wn.2d 499, 508-11, 716 P.2d 869 (1986). Fluke cannot seek indemnification from Richmond when Fluke has never used its own assets to pay a debt owed by *626 Richmond. The judgment of the trial court is affirmed. DOLLIVER, C.J., BRACHTENBACH, DORE, PEARSON, ANDERSEN, GOODLOE, and DURHAM, JJ., and VERHAREN, J. Pro Tem., concur. Reconsideration denied December 8, 1986. NOTES [1] Because First Interstate Bank and Curtis have identical interests they will be referred to collectively as "First Interstate Bank." [2] The Bankruptcy Court of the United States District Court for the Western District of Washington at Seattle discharged Glen Young and his marital community of any personal obligation in connection with the transactions at issue in the second foreclosure action. Accordingly, Fluke did not join Young as a defendant in this action. [3] The court's record contains no record of Judge Elston's reasoning. However, the parties appear to agree on the reasoning that he used. [4] When a party files an amended pleading that abandons a former cause of action the original pleading is considered abandoned and ceases to perform any function. Hasan v. Frederickson, 37 Wn. App. 800, 683 P.2d 203 (1984); Ennis v. Ring, 49 Wn.2d 284, 300 P.2d 773 (1956).
null
minipile
NaturalLanguage
mit
null
Leah Frances Russell Leah Frances Russell (28 March 1891 - May 1983) was an Australian opera singer. References Category:1891 births Category:1983 deaths Category:20th-century Australian singers
null
minipile
NaturalLanguage
mit
null
In vivo real-time imaging of airway dynamics during bronchial challenge test. Asthmatic patients exhibit airway hyper-responsiveness, which induces bronchoconstriction and results in a ventilation defect. The bronchial challenge test using methacholine is a useful way to measure airway hyper-responsiveness with airway constriction. Anatomical optical coherence tomography has been used to image airway hyper-responsiveness of medium sized bronchus with the aid of an endoscopic probe. Recently, a thoracic window was reported that allows direct visualization of terminal airway such as alveolus. A multi-scale integrated airway dynamics was assessed in this study. We imaged in vivo changes in the right intermedius bronchus and alveolar structure during the bronchial challenge test using two optical coherence tomography systems and correlated the changes with airway resistance. Rabbits intubated with a non-cuffed endotracheal tube on a ventilator sequentially inhaled normal saline and methacholine (2 or 5 μg/ml). The airway resistance was measured by mechanical ventilation and airway structures were monitored by a commercial endoscopic optical coherence tomography system (1,310 nm) and a house-made table-top spectral-domain optical coherence tomography system (850 nm). We demonstrated an early decrease in the size of the right intermedius bronchus and alveoli in accordance with increased airway resistance after methacholine inhalation. OCT image after inhalation of 2 μg/ml methacholine showed some segmental narrowing of the right intermedius bronchus and the image after inhalation of 5 μg/ml methacholine showed even greater segmental narrowing. The cross-sectional areas were 7.2 ± 3.3 mm2 (normal saline), 3.7 ± 2.1 mm2 (2 μg/ml methacholine), and 2.4 ± 1.1 mm2 (5 μg/ml methacholine), respectively (P = 0.04). Most of the alveolar space was collapsed under elevated airway resistance with methacholine inhalation. The averaged areas per alveolus at the end of inspiration were 0.0244 ±0.0142 mm2 (normal saline), 0.0046 ±0.0026 mm2 (2 μg/ml methacholine), and 0.0048 ±0.0028 mm2 (5 μg/ml methacholine), respectively (P = 0.03). Methacholine induced a dose-dependent increase in airway resistance (1.1 ± 0.3 cm H2O sec/ml for 2 μg/ml methacholine, 1.5 ± 0.5 cm H2O sec/ml for 5 μg/ml methacholine) (P = 0.03). These results were obtained from normal rabbits during the bronchial challenge test with a non-cuffed endotracheal tube on a ventilator. With this setup increased airway resistance possibly resulted in larger leakage around the endotracheal tube, decreased inhaled volumes, and, in turn, alveolar collapse. We performed a feasibility study of in vivo visualization of real-time airway dynamics. To our best knowledge, this is the first report of real-time integrated airway dynamics including the right intermedius bronchus and alveoli during a bronchial challenge test. OCT showed bronchial constriction and alveolar collapse with a higher methacholine dose. OCT images correlated with the measured airway resistance. Therefore, OCT could be a potential diagnostic device for airway hyper-responsiveness and airway remodeling.
null
minipile
NaturalLanguage
mit
null
Businesses can no longer use the free version of Google Apps -- instead, they must use a premium business version for $50 per year. Google announced yesterday that businesses, which previously had the choice between the basic, free version of Google Apps or the premium, paid version, must now choose the latter. The offering is called Google Apps for Business, and it features more business-friendly options for an annual fee. The apps include Gmail and Google Drive. The new features include 24/7 phone support for any issue, a 25GB inbox and a 99.9 percent uptime guarantee with no scheduled downtime. Businesses of all sizes are instructed to use this version for $50 a year. Why is Google forcing businesses into this direction? According to the tech giant, businesses tend to outgrow the basic version and have increasing needs in order to run their establishment. This new, paid version guarantees that Google can offer them what they need. Google will keep the basic, free version for individuals, and will also continue offering Google Apps for Education for free. Google Apps for Government will stay at its normal $50 per year as well.
null
minipile
NaturalLanguage
mit
null
Thoughts on data, statistics, computer science, and those other things people call life. Menu Setting Up SSH Keys to Work On Multiple Github Accounts When I started working on my company, I set up a separate Github account from my personal account. I’d always had trouble pushing to the second account and resolved myself to adding my personal account to my work account each time I created a new repository. I’d tried following the various online blogs about how to set this up, but nothing had seemed successful. I finally took the time to try and figure it out. I slogged back through the dozen or so posts on setting this up and finally came across this Stack Overflow post with some comments, which made me realize something important. First some basic steps: This gets you a second set of keys and gets those keys added to your account. Then you need to configure git to use the right key for the right account. This is where the post was key. Every other post had these steps: Then create the config file using whatever editor you want to use and add these lines (modified from this excellent post): The key intuition here is that the Host is basically an alias. When you set the url for the remote (or clone the repository), you need to change the git hostname from this: To this: Notice the change of the host from just “github.com” to “github.com-user1”. This is what tells git to use the credentials specified in the config file. This was the piece I’d been missing. “Host” can be anything, but “Hostname” is the reference to the hostname in the original. In a sense, this passes through the config settings based on the specified host and picks up the correct identity file. I didn’t understand this, which is why it took me so long to get this working. Hopefully knowing this will help someone else trying to set this up for themselves. Happy hacking. UPDATE: I just upgraded to macOS High Sierra and one of the lovely experiences was being prompted to enter my SSH password when I pushed code to Github. Knowing that my SSH credentials were in Keychain, I went to Google and found this lovely tidbit from this post: That’s expected. We re-aligned our behavior with the mainstream OpenSSH in this area.
null
minipile
NaturalLanguage
mit
null