text
stringlengths
0
7.84M
meta
dict
Leonard Craske (1878-1950): from medical student to sculptor. Leonard Craske (1878-1950), born and raised in London, England, spent two years as a medical student at St Thomas' Hospital Medical School. Following this, he worked as an actor and studied drawing and sculpting. After emigrating to the USA and settling in Boston, he became an accomplished sculptor, creating the well-known Fishermen's Memorial in Gloucester, Massachusetts, the work for which he is best remembered.
{ "pile_set_name": "PubMed Abstracts" }
I'll sign off now. What a performance from Glasgow Warriors, champions of the Pro12 for the first time. Gregor Townsend's men simply blew Munster away, running in four tries to one. The fans will have a party in Belfast but the players are coming back home because they couldn't find a hotel! Maybe they'll make it to Glasgow in time for last orders... Thanks for your company and enjoy the rest of your Saturday.
{ "pile_set_name": "OpenWebText2" }
ACLU Letter to the House of Representatives on the Harmful Effects of the Workplace Religious Freedom Act The American Civil Liberties Union strongly urges you to oppose the Workplace Religious Freedom Act (""WRFA"") as written in the 108th Congress--unless it is revised before introduction to ensure that the legislation will not have the presumably unintended consequence of harming critical personal and civil rights of coworkers, customers, or patients. Unless revised before introduction, WRFA would threaten important rights of religious minorities, racial minorities, women, gay men and lesbians, and persons seeking reproductive health care and mental health services. As written in the 108th Congress, WRFA would revise and strengthen the existing requirements imposed on employers to accommodate the religious practices of their employees. This letter explains: the current religious accommodation requirements under Title VII of the Civil Rights Act of 1964, the changes made to Title VII by the legislation, WRFA's potential harm to important personal and civil rights, and the availability of a more targeted alternative to WRFA. In preparing this letter, the ACLU reviewed every Title VII religious accommodation federal decision reported either in an official reporter or on Westlaw--since the Hardison decision in 1977 through December 31, 2002--in which a court reached the question of reasonable accommodation or undue hardship. A quarter-century of reported litigation gives a fairly accurate picture of the full range of cases that employees already win under the current religious accommodation standard, and the cases that employees typically lose under the current standard.[1] Based on that review, the ACLU[2] has serious concerns about the potential harmful effect of WRFA, but we also see an opportunity for alternative legislation that would address nearly all of the religious accommodation claims that do not involve harm to critical personal and civil rights. Over the past 25 years, employees have brought an array of claims for employers to accommodate religious practices that would have resulted in harm to critical personal or civil rights. If WRFA had been law, the following rejected religious accommodation claims could have been decided differently: police officer's request to refuse to protect an abortion clinic, another police officer's request to abstain from arresting protestors blocking a clinic entrance, social worker's decision to use Bible readings, prayer, and the ""casting out of demons"" with inmates in a county prison, instead of providing the county's required secular mental health counseling, state-employed visiting nurse's decision to tell an AIDS patient and his partner that God ""doesn't like the homosexual lifestyle"" and that they needed to pray for salvation, delivery room nurse's refusal to scrub for an emergency inducement of labor and an emergency caesarian section delivery on women who were in danger of bleeding to death, two different male truck drivers and a male emergency medical technician request to avoid overnight work shifts with women because they could not sleep in the same quarters with women, retail employee's request to begin most statements on the job with ""In the name of Jesus Christ of Nazareth."" These examples were all actual cases brought into federal court by employees claiming that their employers refused to provide a reasonable accommodation of their religious beliefs. Applying the existing Title VII reasonable accommodation standard, the courts rejected all of these claims. But Congress has no assurance that courts would continue to reject all of these types of claims if WRFA becomes law. The harm that WRFA could cause is completely avoidable. Congress can--and should--pass legislation tightly focused on strengthening the federal requirements imposed on employers to accommodate workplace scheduling changes for the observation of religious holidays and the wearing of religious clothing or a beard or hairstyle. These two areas of religious accommodation account for nearly three-fourths of all of the religious accommodation claims rejected by federal courts in published opinions during the past quarter-century. A narrowly tailored bill could address these problems for religious minorities without any of the harms that WRFA could cause. Existing Law Provides a Base Level of Coverage Title VII of the Civil Rights Act of 1964 requires employers to provide a reasonable accommodation of the religious observance or practice of employees. Although the Supreme Court, in TWA v. Hardison, 432 U.S. 63 (1977), limited the employer's obligations under Title VII of the Civil Rights Act of 1964 to accommodate its employees' religious practices at work, employers continue to have a legal duty to accommodate religious exercise in the workplace that does not cause the employer more than a de minimus cost. During the quarter-century after Hardison, employees have won about one-third of their litigated claims for scheduling changes for observance of religious holidays, nearly one-half of claims for having a beard or hairstyle for religious reasons, and roughly one-fourth of claims for wearing religious apparel. In addition, employees have won claims for an array of other requested religious accommodations. Of course, these were claims that were actually litigated and resulted in published opinions. Presumably, a large number of additional claims were accommodated by employers without employees having to resort to litigation. WRFA Is Overbroad and Would Likely Harm Critical Personal and Civil Rights WRFA would broadly strengthen existing requirements imposed on an employer to provide reasonable accommodations of an employee's religious observances and practices in the workplace. Although most of the proponents of WRFA seek only to accommodate the observance of religious holidays and the wearing of beards/hairstyle or religious clothing--and have no interest in harming anyone's rights--WRFA may have a much broader impact than at least most of its supporters intend it to have. As written in the 108th Congress, WRFA would make the following three changes in the law: Create a definition of ""essential functions of the employment position,"" but then exempt restrictions on work ""practices that may have a temporary or tangential impact on the ability to perform job functions"" if related to participation in a religious observance or practice (emphasis added); Replace the Supreme Court's determination that an employer does not have to provide a reasonable accommodation of a religious practice under Title VII if providing the accommodation would cause anything more than a de minimis cost. Instead, an employer can refuse an accommodation only if it would incur ""significant difficulty or expense,"" as determined by factors such as ""identifiable cost of the accommodation,"" the size of the employer, and the location and characteristics of its various facilities; and Require that a reasonable accommodation must ""remove the conflict between employment requirements and the religious observance or practice of the employee."" The combined effect of these changes will be radically different analyses of those religious accommodation claims that could result in harm to critical personal or civil rights. Congress has no assurance that courts will continue to reject claims that could cause important harm. First, the introduction of the ""essential functions"" of the job standard into Title VII's religious accommodation definition raises important questions of which functions of an employee's job are ""essential."" Increasing numbers of employees will go to court arguing that a refusal to perform all aspects of a job involving health or public safety, unwillingness to comply with employer policies precluding religious or racial harassment, or an objection to sharing overnight work shifts with women do not infringe on any ""essential function"" of a job. In many cases, an employee would likely bolster his or her claim that a religious practice does not affect an essential function of a job by claiming that the religious practice has nothing more than a ""temporary or tangential impact on the ability to perform job functions,"" and is thus entirely exempt from the definition of ""essential function."" Employers will have to determine whether a police officer's decision to pick and choose who he or she is protecting, a medical or mental health worker's decision on who he or she will treat and how the person will be treated, a worker's occasional religious condemnation of a coworker, or the occasional flashing of a swastika or KKK symbol in a private workplace is essential or causes nothing more than a temporary or tangential impact on performance. And if the effect on work performance is ""temporary or tangential,"" then the employer will have no choice; it will have to provide the requested accommodation. Second, WRFA borrows from the Americans with Disabilities Act a definition of a ""significant difficulty or expense"" which would relieve employers of having to provide the requested reasonable accommodation. However, the criteria involve primarily financial factors such as loss of productivity, and the relationship of the costs to the size and structure of the employer. While the definition may be appropriate for a disability rights statute such as the ADA in which the accommodation may require costly changes such as architectural improvements, it has less relevance to a religious anti-discrimination statute. If WRFA passes, employers may have great difficulty defining the ""identifiable costs"" of allowing employees to proselytize or harass other coworkers or third parties, such as customers or patients. The harmful effect of a particular accommodation on another person might be difficult to express in specifics such as loss of productivity or financial losses relative to the size of the employer. Third, the requirement that a reasonable accommodation must ""remove the conflict between employment requirements and the religious observance or practice of the employee"" would likely bolster arguments that an employer may not simply choose to transfer an employee to another position in order to accommodate an employee. Instead, it could require that employers must change the requirements of the employee's existing position--even when having the employee remain in his or her current position would result in harm to others. Although it is not clear that this ""remove the conflict"" requirement would necessarily result in employers having to restructure jobs for employees who insist on performing their jobs in ways that harm others, courts will at least have to resolve the question of whether this provision is directed at the specific job of an employee or simply means an equivalent job. It is impossible to determine the certain effect of WRFA on all possible claims for accommodations that would cause harm, but it is clear that WRFA would be a significant break from how courts decided religious accommodation cases over the past quarter-century. And it is equally clear that the drafters of WRFA in the 108th Congress took no steps to ensure that it could not be used to reverse the outcomes of the types of cases decided during the past 25 years in which an employee was denied a claim to use his or her religious exercise in a way that would harm critical personal or civil rights. Who Could Be Harmed by WRFA Congress should consider the types of cases that employees have actually lost under the current religious accommodation standard before bolstering the standard through WRFA. During the quarter-century between the Supreme Court's 1977 decision in Hardison and the end of last year, employees lost 113 religious accommodation cases reported by either federal reporters or Westlaw in which a federal court considered whether the requested accommodation was reasonable or whether it imposed more than a de minimus cost on the employer. But 83 of those decisions involved the scheduling of religious holidays or the wearing of religious clothing or a beard. Employees lost only 30 cases over 25 years that involved claims for something other than scheduling of religious holidays or the wearing of religious clothing or beards. By examining the 30 reported cases that did not involve religious holidays, religious clothing, or beards, Congress can more easily determine the change in the scope of coverage caused by replacing WRFA with targeted legislation that precludes harm to critical personal and civil rights--and what types of cases would likely confront employers and the courts more frequently if Congress goes ahead and passes WRFA with no changes. Based on a review of these cases, it should be clear that employees would lose almost nothing more than those claims that harm important rights if Congress amends WRFA to focus solely on reasonable accommodation of religious holidays and religious clothing and beards. 16 of the 30 reported cases involved some type of harm or potential harm to critical personal or civil rights.[3] These cases, which would have been analyzed differently--and could have had a different outcome--if WRFA had been law when they were decided, threatened harm to: Religious Minorities: The courts have rejected an array of claims by employees claiming a right to proselytize others, or otherwise engage in unwanted religious activities directed toward others, while at work. A county sheriff did not have to accommodate--and thereby risk disrupting the county's religious neutrality policy--a social worker hired to provide secular mental health counseling to county prisoners, but who used Bible readings, prayer, and the ""casting out of demons"" with the inmates. Spratt v. County of Kent, 621 F. Supp. 594 (W.D. Mich. 1985), aff'd, 810 F.2d 203 (6th Cir. 1986). Similarly, a Veterans Administration hospital had no obligation to accommodate a hospital chaplain in a psychiatric department whose practices included interfering with medical decisions, contradicting religious advice given by another chaplain to a patient, and using graphic metaphors in talks that confused the psychiatric patients--because such practices were antithetical to the medical work of the hospital. Baz v. Walters, 782 F.2d 701 (7th Cir. 1986). Although a claim by a hotel worker for a religious accommodation to allow his spraying of a swastika on a mirror while setting up for an event as a religious ""good luck"" symbol was denied by a court because the employee failed to provide notice of his need for an accommodation, the court also stated that providing the accommodation would have imposed an undue hardship on the employer. Kaushal v. Hyatt Regency Woodfield, 1999 WL 436585 (N.D. Ill. 1999). Another court held that a private employer provided a reasonable accommodation of an employee's religiously motivated request to wear an anti-abortion button that included a color photograph of a fetus by requiring her to cover it while at work to minimize its disruptive impact on coworkers disturbed by the display of the photograph--including coworkers who shared both her religion and her anti-abortion views. Wilson v. U.S. West Communications, 58 F.3d 1337 (8th Cir. 1995). A court held that an employer had no duty to accommodate an employee's need to write letters to both a supervisor and a subordinate at their homes severely criticizing their private lives and urging religious solutions. Chalmers v. Tulon Co. of Richmond, 101 F.3d 1012 (4th Cir. 1996). The court reasoned that accommodating the employee's need to send these letters would subject the employer to potential liability for not protecting the religious rights of its other employees. Id. at 1021. Similarly, a court held that a retail employer did not have to accommodate an employee's religious belief that ""required her to preface nearly every sentence she spoke with the phrase ""In the name of Jesus Christ of Nazareth"" because it would impose an undue hardship of ""offend[ing] the religious beliefs or non beliefs of its customers."" Johnson v. Halls Merchandising, Inc., 1989 WL 23201 (W.D. Mo. 1989). In a similar case, an employer reasonably accommodated an employee's need to say ""Have a Blessed Day"" to everyone in the workplace by allowing her to use the phrase with coworkers, but prohibiting her from using the phrase with clients that complained about its use. Anderson v. U.S.F. Logistics (IMC), Inc., 274 F.3d 470 (7th Cir. 2001). Racial Minorities: In addition to the claim for an accommodation for the display of a swastika discussed in the religious minorities section above, Kaushal, 1999 WL 436585, a court rejected a claim by an employee in a private workplace to uncover and display his KKK tattoo of a hooded figure standing in front of a burning cross. The court held that the employer had already provided a reasonable accommodation by allowing the employee to uncover the tattoo when washing it, but that any further accommodation would result in undue hardship because it would violate the employer's racial harassment policy. Swartzentruber v. Gunite Corp., 99 F. Supp.2d 976 (N.D. Ind. 2000). Women: Courts have rejected several claims made by male employees claiming that employers failed to accommodate their religious objections to working with women during overnight shifts because they could not sleep in the same quarters as women. The courts rejected claims by two male truck drivers objecting to overnight runs with women drivers because the employers could not accommodate the requests without incurring undue hardships, Virts v. Consolidated Freightways Corporation of Delaware, 285 F.3d 508 (6th Cir. 2002); Weber v. Roadway Express, Inc., 199 F.3d 270 (5th Cir. 2000), and also rejected a similar claim by a male emergency medical technician refusing overnight shifts with women because the employer had already made a reasonable accommodation by installing folding walls in the break room and authorizing the employee to sleep in alternative places, Miller v. Drennon, 1991 WL 325291 (D.S.C. 1991), aff'd, 966 F.2d 1443 (4th Cir. 1992). Gay Men and Lesbians: Two important claims would have harmed the rights of gay men and lesbians to nondiscriminatory health care and mental health services. A court rejected a claim from a state-employed visiting nurse who, during a nursing visit to a gay man with AIDS and his partner, explained that they would only have salvation through her view of Christian beliefs and that God ""doesn't like the homosexual lifestyle."" The court held that accommodating the nurse's request to proselytize her patients was not reasonable because it would interfere with the state providing services in a religion-neutral manner. Knight v. Conn. Dep't of Public Health, 275 F.3d 156 (2nd Cir. 2001). Another court held that an employer had already provided a reasonable accommodation (by offering to transfer to another job) to an employee assistance counselor who refused to counsel unmarried or gay or lesbian employees on relationship issues, but would have incurred more than a de minimus cost if it was forced to accept the counselor's request to remain in her current position but allow her to refuse clients. Bruff v. North Mississippi Health Services, Inc., 244 F.3d 495 (5th Cir. 2001). Persons Seeking Access to Reproductive Health Care: A court held that, because a hospital offered to transfer a nurse who objected to ending any life to a position outside of the labor and delivery section (which does not perform elective abortions) of the hospital, the hospital had no further duty to accommodate the nurse's refusal to participate in emergency procedures that terminate pregnancies. The labor and delivery nurse had twice refused to scrub for emergency obstetrical procedures on women with life-threatening conditions; in the second incident, the nurse's refusal delayed the emergency procedure by thirty minutes--on a woman who was ""standing in a pool of blood."" Shelton v. Univ. of Medicine & Dentistry of New Jersey, 223 F.3d 220 (3d Cir. 2000). Two courts recently upheld the denial of requests by police officers to refuse to protect abortion clinics. A court held that the availability of a transfer to a district without an abortion clinic was a reasonable accommodation of a police officer's request to refuse to protect an abortion clinic in his assigned district, but that the police department had no further obligation to accommodate the request if the officer chose to stay in a district with an abortion clinic. Rodriguez v. City of Chicago, 156 F.3d 771 (7th Cir. 1998). Another court upheld a police department's refusal of a police sergeant's request to refuse to arrest any persons blocking access to abortion clinics, by holding that accommodating the request would be an undue hardship of potentially jeopardizing the ""duty to uphold the law which has been passed by the people in order to protect society"" and threatening the protection of ""individuals inside abortion clinics from others' interference with their legally protected rights."" Parrott v. District of Columbia, 1991 WL 126020 (D.D.C. 1991). Persons Seeking Access to Mental Health Services: As discussed above, courts have rejected claims by an employee assistance counselor to refuse to counsel unmarried and gay and lesbian employees on relationship issues, Bruff, 244 F.3d 495, and a hospital chaplain to engage in certain practices viewed by the employer as disruptive of the treatment of psychiatric patients, Baz, 782 F.2d 701. In addition, in a claim consolidated with the claim by a visiting nurse to proselytize an HIV-positive patient, the Second Circuit upheld the denial of a sign language interpreter's request to proselytize and pray aloud for mental health patients that she was assigned by the state to interpret. Knight, 275 F.3d 156. Relying on the trial court's finding that the employee's actions were disruptive, the appellate court held that accommodating the employee's request would not be reasonable because it would preclude the employer from providing mental health services in a religion-neutral manner. Id. at 168. A Narrowly Drafted Bill Is a Better Response to the Problem Congress should replace WRFA with more narrowly drafted legislation that bolsters only the requirements imposed on employers to accommodate the scheduling of leave time for the observation of religious holidays or for the wearing of religious apparel or a beard or hairstyle. Not only would a narrowly drafted bill address most of the problems actually experienced by employees denied religious accommodations, but it also would be a constitutionally sound approach to legislation. Based on our review of 25 years of Title VII religious accommodation federal decisions, we conclude that the vast majority of the religious accommodation claims that are denied by employers fall into three categories: scheduling of religious holidays, the wearing of religious clothing or a beard or hairstyle, or claims that would result in harm to critical personal or civil rights. Congress does not have to guess at what types of religious practices it is accommodating or refusing to accommodate when considering WRFA or any changes to it. The ACLU found that claims for the scheduling of time off for religious holidays or the wearing of religious clothing or a beard together made up 83 of the 113 reported federal decisions since 1977 through the end of 2002 in which the employee lost his or her claim to a reasonable accommodation. Changing the approach from WRFA to a bill specifically focused on the problems that real people actually face in the workplace would be consistent with the approach that Congress took a few years ago when it replaced the Religious Liberty Protection Act with the more sharply focused Religious Land Use and Institutionalized Persons Act of 2000. Not only did Congress create a powerful new tool for protecting religious exercise without harming any other rights, but it also created a vehicle that was so popular that it passed both houses by unanimous consent on the same afternoon. Further, a more narrowly drafted bill is more likely to survive an Eleventh Amendment challenge by a state claiming that the statute violates the state's sovereign immunity. The existing religious accommodation standard in Title VII is the only provision in Title VII to have been found unconstitutional by a federal court of appeals deciding an Eleventh Amendment challenge. See Holmes v. Marion County Office of Family and Children, 349 F.3d 914, 627-30 (7th Cir. 2003). As it considers strengthening the religious accommodation standard in Title VII, Congress must be careful to meet the federalism standards set by the Supreme Court in several recent decisions. Close tailoring of the legislative solution to the constitutional harm being prevented increases the likelihood that a statute will be upheld against an Eleventh Amendment challenge, and decreases the possibility of establishing additional case law further limiting the power of Congress to provide federal remedies for discrimination. We should add that at least some of the sponsors of WRFA already have a draft of a more narrowly focused bill. This draft bill could become the basis of a consensus approach to protecting religious exercise rights in the workplace. -------------------- There simply is no reason to create a standard under WRFA that could call into question the resolution of claims such as these requests for accommodations that would result in harm to critical personal or civil rights. Congress can, and should, pass legislation that focuses narrowly on the real problems of scheduling time off for religious holidays and the wearing of religious apparel or a beard. For these reasons, the ACLU urges you to oppose WRFA as written in the 108th Congress, unless it is revised before introduction to avoid any threat of harm to important personal or civil rights. Thank you for your attention to these concerns. Sincerely, Laura W. MurphyDirector Christopher E. Anders Legislative Counsel Footnotes [1] For the purposes of this letter, a ""win"" for an employee is either success on the merits or denial of the employer's motion for summary judgment. [2] The American Civil Liberties Union has a long and continuing history of vigorously defending religious liberty. In Congress and in the courts, we have supported legislation providing stronger protection for religious exercise--even against neutral, generally applicable laws. The ACLU fought to preserve or restore the highest level of constitutional protection for religious exercise as founding members of the coalition that supported passage of the Religious Freedom Restoration Act of 1993, and we were instrumental in the drafting and support for the Religious Land Use and Institutionalized Persons Act of 2000. The ACLU has represented persons in court and before regulatory agencies challenging burdens on the exercise of their religious beliefs. For example, we sued to protect the right of a Jewish student to wear a Star of David pendant at school, we sued to defend the right of conservative Christian activists to broadcast on public access television, we represented a Muslim woman in religious garb who was excluded from the viewing stands at a public pool while her son swam, we represented a Baptist group that was barred from using a river in a public park for Baptisms, we filed a brief in support of two women who were fired for refusing to work at a greyhound racetrack on Christmas Day, we maintain an active and current docket of RLUIPA claims, and we even offered to back the Reverend Jerry Falwell in his 2001 challenge to Virginia laws restricting ownership of church property. [3] The remaining 14 decisions did not involve any claim of harm or potential harm to critical personal or civil rights, but no more than four of these decisions would even arguably be affected by WRFA. Six of the decisions involved requests for a reasonable accommodation of an employee's refusal to provide a Social Security number to the employer. The courts upheld the employer's refusal, typically because the accommodation would have required the employer to violate federal Social Security law. Seaworth v. Pearson, 203 F.3d 1056 (8th Cir. 2000); Sutton v. Providence St. Joseph Medical Center, 192 F.3d 826 (9th Cir. 1999); Baltgalvis v. Newport News Shipbuilding Inc., 132 F. Supp.2d 414 (E.D. Va. 2001); Weber v. Leaseway Dedicated Logistics, Inc., 5 F. Supp.2d 1219 (D. Kan. 1998), aff'd 166 F.3d 1223 (10th Cir. 1999); E.E.O.C. v. Allendale Nursing Centre, 996 F. Supp. 712 (W.D. Mich. 1998); Hover v. Florida Power & Light Co., Inc., 1995 WL 91531 (S.D. Fla. 1995), aff'd, 101 F.3d 708 (11th Cir. 1996). Three other decisions involved requests from employees in unionized workplaces to refuse to pay
{ "pile_set_name": "Pile-CC" }
Neurological diseases and disorders affect brain function. Many efforts have been made to develop curative or ameliorative therapies for these diseases and disorders; however, no comprehensive or universally curative therapy has been developed, even though there are numerous pharmacotherapeutic approaches that have been proven to be effective against various diseases and disorders. Huntington's disease (HD) is an inherited disease of the brain that affects the nervous system. It is caused by a defective gene that is passed from parent to child. The HD gene interferes with the manufacture of a particular protein known as ‘Huntington’ which appears to be crucial for proper brain development. The classic signs of HD include emotional, cognitive and motor disturbances. Huntington's is characterized by jerky involuntary movements (chorea), but sometimes causes rigidity without abnormal movements, changes in using the limbs (apraxia), loss of control of bodily functions and dementia, including a progressive deterioration of memory, speed of thought, judgment, and lack of awareness of problems and planning. There is no known cure for Huntington's disease. Although there are a number of medications to help control symptoms associated with HD such as emotional and movement problems, there is no treatment to stop or reverse the course of the disease. Huntington's disease has been recognized as a disease with a general membrane abnormality. A significantly elevated level and activity (10 fold increase) of Na,K-ATPase has been observed in membranes of erythrocytes and basal ganglia of Huntington's patients compared to that of normal (Butterfield D A, Oeswein J Q, Prunty M E, Hisle K C, Markesbery W R). Increased sodium, potassium adenosine triphosphatase activity in erythrocyte membranes in Huntington's disease. Ann Neurology, 4:60-62, 1978) fibroblast membranes obtained from the skin of Huntington's disease patients (Schroeder F, Goetz I E, Roberts E, Membrane anomalies in Huntington's disease fibroblasts. J. Neurochem. 43: 526-539, 1984). Alzheimer's disease is a form of dementia—a neurodegenerative disease that damages the brain's intellectual functions (memory, orientation, calculation, etc.), but usually preserves its motor functions. In Alzheimer's disease, the mind gradually deteriorates, causing memory loss, confusion, disorientation, impaired judgment and other problems that may affect a person's ability to perform normal daily activities. The type, severity, sequence and progression of mental changes vary greatly. There is no known cure for Alzheimer's disease and no known way to slow its progression. For some people in the early or middle stages of the disease, medication such as tacrine may alleviate some cognitive symptoms. Aricept (donepezil) and Exelon (rivastigmine) are reversible acetylcholinesterase inhibitors that are indicated for the treatment of mild to moderate dementia of the Alzheimer's type. These drugs (called cholinesterase inhibitors) work by increasing the brain's levels of the neurotransmitter acetylcholine, helping to restore communication between brain cells. Some medications may help control behavioral symptoms such as sleeplessness, agitation, wandering, anxiety, and depression. These treatments are aimed at making the patient more comfortable. Although no medication is known to cure Alzheimer's disease, cholinesterase inhibitors may improve performance of daily activities, or lessen behavioral problems. Medications for the treatment of Alzheimer's disease currently being tested include estrogens, nonsteroidal anti-inflammatory agents, vitamin E, selegiline (Carbex, Eldepryl) and the botanical product gingko biloba. Nerium oleander is an ornamental plant widely distributed in subtropical Asia, the southwestern United States, and the Mediterranean. Its medical and toxicological properties have long been recognized. It has been used, for example, in the treatment of hemorrhoids, ulcers, leprosy, snake bites, and even in the induction of abortion. Oleandrin, an important component but not the sole component of oleander extract, is a cardiac glycoside. Extraction of glycosides from plants of Nerium species has provided pharmacologically/therapeutically active ingredients from Nerium oleander. Among these are oleandrin, neriifolin (nerifolin), and other cardiac glycoside compounds. Oleandrin extracts obtained by hot-water extraction of Nerium oleander, sold under the trademark ANVIRZEL™, contain the concentrated form or powdered form of a hot-water extract of Nerium oleander. A Phase I trial of a hot water oleander extract (i.e. Anvirzel™) has been completed (Mekhail et al., Am. Soc. Clin. Oncol., vol. 20, p. 82b, 2001). It was concluded that oleander extracts, which would provide about 57 ug oleandrin/day, can be safely administered at doses up to 1.2 ml/m2 d. No dose limiting toxicities were found. Rong et al. (Pharm. Biol. (January 2011), 49(1), 78-85) suggest oleanolic acid might be suitable for attenuating ischemic stroke. So et al. (Arch. Pharm. Res. (June 2009), 32(6), 923-932) suggest oleanolic acid might be suitable for the prevention and treatment of neurodegeneration in stroke. Li et al. (Brain Res. (February 2013), 1497, 32-39) suggest ursolic acid might provide neuroprotection after cerebral ischemia in mice. Garcia-Morales et al. (Arch. Pharm. Res. (July 2015), 38(7), 1369-1379) suggest that an extract of Bouvardia ternifolia should be further studied for treating Alzheimer's disease. Zhang et al. (Neuroscience Letters (2014), 579, 12-17) report that ursolic acid reduces oxidative stress following experimental subarachnoid hemorrhage. Qian et al. (Eur. J. Pharmacol. (2011), 670(1), 148-153) report that maslinic acid protects cortical neurons against oxygen-glucose deprivation-induced injury in rats. EP 2260851 A1 to Consejo Superior de Investigaciones Cientificas (Madrid, ES) suggests the use of oleanolic acid for the treatment of multiple sclerosis. Yoo et al. (Molecules, (May 2012), 17(3), 3524-38) suggest the use of terpenoids as anti-Alzheimer's disease therapeutics. Heo et al. (Mol. Cells (February 2002), 13(1), 5-11) suggest ursolic acid reduces amyloid beta protein-induced oxidative cell death. Chung et al. (Mol. Cells (April 2001), 11(2), 137-143) suggest ursolic acid appears to be a potent inhibitor of acetylcholinesterase in Alzheimer's disease. US 2007/0249711 A1 (Pub. Date. Oct. 25, 2007) to Choi et al. suggests the use of oleanolic acid and ursolic acid for improving brain functions to prevent and treat mild cognitive impairment and dementia. Oleanolic acid is in a class of triterpenoids typified by compounds such as bardoxolone which have been shown to be potent activators of the innate cellular phase 2 detoxifying pathway, in which activation of the transcription factor Nrf2 leads to transcriptional increases in programs of downstream antioxidant genes containing the antioxidant transcriptional response element (ARE). Bardoxolone itself has been extensively investigated in clinical trials in inflammatory conditions; however, a Phase 3 clinical trial in chronic kidney disease was terminated due to adverse events that may have been related to known cellular toxicities of certain triterpenoids including bardoxolone at elevated concentrations. Compositions containing triterpenes in combination with other therapeutic components are found as plant extracts. Fumiko et al. (Biol. Pharm. Bull (2002), 25(11), 1485-1487) discloses the evaluation of a methanolic extract of Rosmarimus officinalis L. for treating trypanosomiasis. Addington et al. (U.S. Pat. Nos. 8,481,086, 9,220,778, 9,358,293, US 20160243143 A1) disclose a supercritical fluid (SCF) extract (PBI-05204) of Nerium oleander containing oleandrin and triterpenes for the treatment of neurological conditions. Addington et al. (U.S. Pat. No. 9,011,937, US 20150283191 A1) disclose a triterpene-containing fraction (PBI-04711) of the SCF extract of Nerium oleander containing oleandrin and triterpenes for the treatment of neurological conditions. Jager et al. (Molecules (2009), 14, 2016-2031) disclose various plant extracts containing mixtures of oleanolic acid, ursolic acid, betulinic acid and other components. Mishra et al. (PLoS One 2016 25; 11(7):e0159430. Epub 2016 Jul. 25) disclose an extract of Betula utilis bark containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. Wang et al. (Molecules (2016), 21, 139) disclose an extract of Alstonia scholaris containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. L. e Silva et al. (Molecules (2012), 17, 12197) disclose an extract of Eriope blanchetti containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. Rui et al. (Int. J. Mol. Sci. (2012), 13, 7648-7662) disclose an extract of Eucaplyptus globulus containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. Ayatollahi et al. (Iran. J. Pharm. Res. (2011), 10(2), 287-294) disclose an extract of Euphorbia microsciadia containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. Wu et al. (Molecules (2011), 16, 1-15) disclose an extract of Ligustrum species containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. Lee et al. (Biol. Pharm. Bull (2010), 33(2), 330) disclose an extract of Forsythia viridissima containing a mixture of oleanolic acid, ursolic acid, betulinic acid and other components. None of the art suggests a neuroprotective composition containing a combination of two or three different triterpenes selected from oleanolic acid, ursolic acid and betulinic acid, nor use of such a composition for the treatment of neurological conditions, in particular wherein the neuroprotective composition excludes cardiac glycoside and excludes a pharmacologically active polysaccharide obtained from Nerium species or Thevetia species. None of the art recognizes the improvements provided by administration of a combination of triterpenes as compared to administration of the individual triterpenes, in particular wherein cardiac glycoside is absent.
{ "pile_set_name": "USPTO Backgrounds" }
Springfield Update - Timely Advice from the President on Tuesday, March 15, 2016 While my policies and politics don’t generally align with the current occupant of the White House, it’s always an honor to host the President of the United States and to have him speak to you and your colleagues in person. Last month, President Obama returned to the Illinois Capitol where his political career was launched and spoke to a joint session of the Legislature in our House chamber. His message centered on civility, compromise, and a return to “better politics,” and frankly, it couldn’t have been more timely. Read more at Positively Naperville.
{ "pile_set_name": "Pile-CC" }
William Alexander, brothers ray and ace lived in clinton county ohio area.....possibly born in peebles, in adams county ohio. wwI vet.....worked in the stone quaries.died in vehicle accident 1930's. worked for awhile in fairborn. may have lived in antioch. sister inez married frank shoemaker of wilmington, ohio. wanting to find info on my grandpa.
{ "pile_set_name": "Pile-CC" }
<?php /** * SessionServiceProvider.php * Copyright (c) 2019 [email protected] * * This file is part of Firefly III (https://github.com/firefly-iii). * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as * published by the Free Software Foundation, either version 3 of the * License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see <https://www.gnu.org/licenses/>. */ declare(strict_types=1); namespace FireflyIII\Providers; use FireflyIII\Http\Middleware\StartFireflySession; use Illuminate\Session\SessionServiceProvider as BaseSessionServiceProvider; /** * @codeCoverageIgnore * Class SessionServiceProvider. */ class SessionServiceProvider extends BaseSessionServiceProvider { /** * Register the service provider. */ public function register(): void { $this->registerSessionManager(); $this->registerSessionDriver(); $this->app->singleton(StartFireflySession::class); } }
{ "pile_set_name": "Github" }
The Ballad of Gay Tony "The Ballad of Gay Tony injects Liberty City with an overdose of guns, glitz, and grime. As Luis Lopez, part-time hoodlum and full-time assistant to legendary nightclub impresario Tony Prince (a.k.a. "Gay Tony"), players will struggle with the competing loyalties of family and friends, and with the uncertainty about who is real and who is fake in a world in which everyone has a price." Grand Theft Auto: The Ballad of Gay Tony (official abbreviation TBoGT) is the second episode of two downloadable add-ons for Grand Theft Auto IV for the Xbox 360. It is the fourth expansion pack in the Grand Theft Auto series, the 13th release on the series and is currently the second to final game of the GTA IVera (Chinatown Wars being last). It was released on October 29, 2009. The PlayStation 3 and PC versions were later released on April 13, 2010 in North America and on April 16, 2010 in Europe. Rockstar says, "Players will struggle with the competing loyalties of family and friends, and with the uncertainty about who is real and who is fake in a world in which everyone has a price." According to Rockstar's official website, "The Ballad of Gay Tony injects Liberty City with an overdose of guns, glitz, and grime." Sam Houser, the founder of Rockstar Games, said before its release "This episode's focus on high-end night life contrasts with the biker gangs portrayed in The Lost and Damned, whilst giving us a lot of new gameplay possibilities." On the Xbox LIVE Marketplace it costs 1600 Microsoft points, and on the PlayStation Network it costs $19.99 (USD). At first, The Ballad of Gay Tony, along with the first piece of downloadable content, The Lost and Damned was going to be released to the PS3 and PC on March 30, but due to Sony Computer Entertainment wanting to edit some of the radio stations, it was released on the later date of April 13 in North America and April 16 in Europe. The stories for GTA IV, The Lost and Damned, and The Ballad of Gay Tony were written by Dan Houser and Rupert Humphries. All 3 stories happen at the same time, intertwining with each other. Contents Synopsis In contrast to The Lost and Damned, a gritty and hardcore account of life in a biker gang, The Ballad of Gay Tony shines light on arguably the most glamorous place on Earth - the celebrity nightclub scene. Luis Lopez and Gay Tony Prince are the two main characters struggling with, as Rockstar Games says themselves, "the competing loyalties of family and friends, and with the uncertainty about who is real and who is fake in a world in which everyone has a price". Being in debt to gangsters, Luis and Tony are barraged with the temptation to sell out their beliefs and even each other for money - their beliefs often taking the symbolic form of their shared nightclub, Maisonette 9. The duo surprisingly turn their noses at some substantial opportunities (Yusuf Amir franchising them, or Cloe Parker bailing them out), but are heavily tempted and will even abuse each other's trust for others (Ray Bulgarin buying them out, Mori Kibbutz having a high-stakes bet, Rocco Pelosi threatening them, and Tony himself resorting to fraud). Very few if any characters make it the entire game without telling a lie; sometimes because of business, other times because of a social imbalance (such as Yusuf wanting to impress Luis, or Tony mocking Mori behind his back while flattering him eye to eye) - which gives the impression that no one is to be trusted. At the end of the game Tony and Luis have resolved trust issues they have with each other, successfully erased their debt and tell Yusuf Amir they won't franchise, leading to the moral that loyalty to "family" (blood or otherwise) should not be sold for all the money in the world. Characters: Luis Lopez and "Gay Tony" Prince: The two main characters of the story, Luis being the controllable protagonist. They are very much like a father and son pair, despite getting frustrated with each other. They are forced to make decisions about loyalty, often having to consider how their decision affects the other. Rocco Pelosi, Ray Bulgarin, Yusuf Amir and Mori Kibbutz: All men of wealth who are interested in owning Maisonette 9. Their motivations ranging from benevolent (Yusuf and Mori) to sinister (Bulgarin and Rocco), they are all temptations for Tony to literally sell out, and Luis to pursue more money behind Tony's back, having to lie to Tony and make major decisions without properly consulting him (something Luis hypocritically criticizes Tony about). Luis is eventually punished in a sense, when Bulgarin attempts to kill him and he must confess his actions to Tony. Tony and Luis symbolically defeat their trust issues, as they literally defeat Roccoand Bulgarin, and are entirely solidified as a duo in the game's finale. Mama Lopez, Armando and Henrique: Luis's mother and childhood friends. A&H, though still very good friends, sometimes criticize Luis for quitting drug sales with them to work at a nightclub, calling him a pretentious sell out. Mama Lopez also pleads with Luis to leave both clubs and gangs to go to college and get a boring job, much like his siblings have done. Their dialogue, which appears early in the game but curbs later on, shows one of the first decisions of loyalty that Luis made in his life - a long list of issues of loyalty, dependability and appreciation with his family (including, for all intents and purposes, A&H) led Luis to work for Gay Tony and look to him as his father figure. Gracie Ancelotti and Evan Moss: Gay Tony's two best friends, Gracie being the daughter of the Ancelotti don and Evan being Tony's boyfriend. They are symbolic of Tony's bad habits, having led to his drug and loan shark dependencies in some way or another. Tony is not on drugs whenever Gracie and Evan are gone, and it is also notable that Luis calls them annoying while criticizing Tony's drug habits. Another important set of characters, though they do not effect the main storyline, are the fictional celebrities met in the Club Management missions. Luis and Tony are made the peers and trusted confidants of extremely powerful celebrities parodying Paris Hilton and Prince Harry among others. Beyond the comic value of pop culture, it is meant to portray opportunity raining from the sky for Tony and Luis, some of which might lure them to abandon or endanger each other. As read in the booklet included with Episodes From Liberty City "Luis Lopez is a man who solves problems, and when you are the nightlife legend, Anthony "Gay Tony" Prince's right-hand man and bodyguard, there are many problems to solve. A playground for vapid celebrities and tragic socialites, Algonquin's nightlife scene is all about glitz and glamour, and owning the two hottest clubs in town (Hercules and Maisonette 9) makes Tony the undisputed party king of Liberty City. He appears to have it all - wealth, power, respect - but, in debt to mobsters, loan sharks and the tax man, facing up to a changing world and the terrible economy, and under threat from pretenders to his crown, Tony begins to spiral more and more into a midlife crisis from hell. Join Luis as he fights to save Tony's empire from the brink of collapse and to make his own mark in a world defined by decadence and excess, all while keeping his mother, Adriana Yanira Lopez quiet and stopping his friends, Armando Torres and Henrique Bardas from calling him a sell out. The party is almost over. It is up to Luis to keep it going." Luis visits his mother, who also has financial issues, and his childhood friends Henrique Bardas and Armando Torres. Luis' mother does not approve of his lifestyle and would like him to attend to college. Henrique and Armando are Luis' friends who are heavily involved with the narcotics distribution trade. Luis soon becomes acquainted with Yusuf Amir, a real estate developer in Liberty City. Luis helps Yusuf acquire several vehicles, including an experimental military grade chopper called the "Buzzard", an APC used by the NOOSE, and even a subway carriage. Meanwhile, Tony is headed in a downward spiral due to substance abuse, supplied by his boyfriend Evan Moss. Luis, Tony and Evan head to the docks to buy two million dollars worth of diamonds from a cook coming in on a tanker called the "Platypus". During the exchange, members of the The Lost (now led by Johnny Klebitz, formerly Billy Grey) attack and kill Evan and acquire the diamonds. Tony promises Luis that he will quit the substance abuse and introduces Luis to Mori Kibbutz, and his younger brother Brucie. Mori is highly egotistical, constantly bullies and belittles Brucie, a source of irritation to Luis who repeatedly stands up for the younger brother. Through entering Triathlons and undertaking dangerous police chases, Luis eventually managed to cancel Tony's debt to Mori. After Brucie finally retaliates and punches Mori, he later shows up at Maisonette 9 to thank Luis. Brucie leans in towards Luis after a series of compliments, strongly implying an attempt to hit on him. Luis strongly declines, and Brucie awkwardly attempts to convince Luis that he was just testing him to see if he was gay. Tony and Luis meet Ray Bulgarin and his associate Timur at Maisonette 9, who offer Luis some work in exchange for financial help. Luis helps Bulgarin eliminate some corrupt federal agents and acquire the Liberty City Rampage hockey team. Gracie Ancelotti gets Tony back on the drugs and is later kidnapped by unknown assailants. The Ancelottis establish that Gracie has been kidnapped because of the diamonds and are pointing the blame at Tony and Luis. Tony learns that the diamonds are being exchanged at The Libertonian, and sends Luis to retrieve them. Luis ambushes the exchange (involving Niko Bellic and Johnny Klebitz) and escapes in the Buzzard, which has since been gold plated. Bulgarin phones Luis, telling him to go to the roof of a building in midtown Algonquin. As Luis uncovers the severed head of the cook from the "Platypus", Bulgarin explains that the diamonds belong to him and accuses the cook, Luis and Tony of colluding to steal them. It emerges that Bulgarin has led Luis to an ambush on the rooftop, and he escapes alive. Gracie’s father, Giovanni Ancelotti, then orders Luis and Tony to trade the diamonds with the kidnappers and get Gracie back. At the exchange, Bulgarin shows up and orders his men to attack the assailants, Packie McReary and Niko Bellic. Bulgarin flees the scene and amidst the chaos the diamonds fall into a dump truck headed the opposite direction. Luis, Tony and Gracie escape in a speedboat. Because of being preoccupied with recent events, Tony refuses to pay his debts and the city closes down all of his clubs. Luis meets Rocco and Vince in the restrooms in Middle Park, and they explain to him that he must kill Tony, or the Ancelottis and Russians will team up and kill Tony, Luis and all of their friends and family. Luis shows up at Maisonette 9, and contemplates shooting Tony before pointing the gun at Vince and shooting him in the head. Tony warns Luis not to shoot Rocco, as he is a "made man". Rocco escapes and the Russians show up ensuing in a huge gunfight within the club. Tony blames Luis for contemplating to kill him and flees to his apartment to pack and move to the desert. Luis convinces Tony that he chose not to kill him because it is them against the world, and that they need to resolve their situation. Luis ventures to Firefly Island to ambush a Russian heroin exchange, telling Tony to hide out by the Monoglobe in Meadows Park. In the fairground, Luis destroys the heroin and kills Timur, who mentions that Bulgarin is fleeing the city by plane within two hours. After an opportune phone conversation, Yusuf shows up in the Buzzard and eliminates the pursuing Russians while Luis drives to the airport. Luis manages to board the plane, and kills all of the henchmen on board. A vengeful Bulgarin emerges from the cockpit holding a grenade, threatening destruction to both of them if Luis kills him. Luis takes the risk and shoots Bulgarin, who drops the grenade causing it to explode. Luis parachutes out of the burning wreckage of the plane to safety, and heads to Meadows Park where Tony is waiting. Once there, they both tell Yusuf that they won't franchise the clubs since they prefer to keep it a "family business". As for the diamonds, they in the end are found by a street dweller among a heap of garbage when Luis accidentally bumps against him en route to meeting Tony at Meadows Park.
{ "pile_set_name": "Pile-CC" }
UN High Commissioner for Refugees (UNHCR), UNHCR intervention before the House of Lords in the case of Regina (Respondent) and Fregenet Asfaw (Appellant), 28 January 2008, available at: http://www.refworld.org/docid/483d12222.html [accessed 1 April 2015] Comments On appeal from Her Majesty's Court of Appeal, Criminal Division (England), to the House of Lords.
{ "pile_set_name": "Pile-CC" }
In May and June 2003, public health officials identified an outbreak of human monkeypox in the United States ([@R1]*--*[@R3]). This was the first instance of human monkeypox virus (MPXV) infection detected outside its endemic range in Africa ([@R3]). As of July 30, 2003, a total of 72 human cases had been reported ([@R4]*,*[@R5]). Thirty-seven (51%) cases were eventually laboratory confirmed, and 35 met the case definition set by the Centers for Disease Control and Prevention (CDC) ([@R4]*,*[@R5]). Among the 35 patients whose cases were laboratory confirmed before July 11, 2003 ([@R1]), 32 (91%) tested positive for MPXV by PCR, culture, immunohistochemical testing, or electron microscopy of skin lesions; 2 tested positive by PCR and/or culture of an oropharyngeal or nasopharyngeal swab; and 1 tested positive by PCR and culture of a lymph node aspirate ([@R1]). To date, no new animal or human cases have been reported. The outbreak was relatively large compared with most reported events in Africa, but clinical features were milder than typically seen there ([@R3]*,*[@R6]*,*[@R7]). No human deaths occurred ([@R1]*,*[@R8]), although 2 children required intensive care ([@R1]*,*[@R8]). One patient received a corneal transplant due to chronic ocular infection ([@R8]). Most patients were exposed to prairie dogs, primarily from an Illinois animal distributor (IL-1). Most of those infected had direct physical contact with infected animals; infection likely resulted from bites or scratches or through open wounds ([@R1]*--*[@R3]). Some patients were exposed to premises where prairie dogs were kept ([@R1]). Traceback implicated rodents from a shipment of African animals imported to Texas on April 9, 2003, as the probable source of MPXV ([@R1]*,*[@R4]). The shipment contained ≈800 small mammals of 9 different species, including 6 genera of African rodents (762 rodents total): rope squirrels, tree squirrels, Gambian giant rats, brushtail porcupines, dormice, and striped mice ([@R1]*,*[@R2]), as well as cusimanses, genets, and palm civets ([@R9]). Rodents from the shipment were housed with or in close proximity to prairie dogs at IL-1. Approximately 200 prairie dogs were at IL-1 coincident with the arrival of the imported African rodents ([@R1]). Many prairie dogs from IL-1 were distributed to other states for sale as pets ([@R1]*,*[@R4]). CDC traced 93 infected or potentially infected prairie dogs from IL-1 ([@R1]). An additional, unknown number of prairie dogs died or were sold at animal swap meets for which records are not available ([@R1]) ([Table 1](#T1){ref-type="table"}). ###### Disposition, as of July 11, 2003, of African rodents imported from Ghana to the United States on April 9, 2003\* Rodents Dead† Alive Lost to follow-up Total (n = 762) -------------------- ------- ------- ------------------- ----------------- Gambian giant rats 26 20 4 50 Dormice ≈350 27 ≈135 ≈510 Rope squirrels 49 4 -- 53 Tree squirrels 24 20 3 47 Striped mice 14 50 36 100 Porcupines 2 -- -- 2 \*Source ([@R1]).
†Includes animals that died of monkeypox and those that have been euthanized. To prevent the introduction and spread of infected animals into susceptible populations, on June 11, 2003, the Food and Drug Administration (FDA) and CDC issued an order that prohibited 1) importation of all rodents from Africa and 2) transportation, sale, or any other commercial or public distribution, including release into the environment, of prairie dogs or rodents from 6 species represented in the African shipment ([@R10]). On November 4, 2003, FDA and CDC published an interim final rule ([@R11]) that imposed import restrictions on all African rodents and established or modified restrictions on the import, capture, transport, sale, barter, exchange, distribution, and release of prairie dogs, the 6 imported species, and possibly, by order, other animals with the potential to transmit MPXV. Neither CDC nor FDA exercised its statutory authority to seize and destroy animals to prevent the spread of MPXV. We prepared this qualitative risk analysis to help understand the impact of the domestic trade restrictions on the current risk for human monkeypox infections. We evaluated the data and uncertainties concerning monkeypox and its potential spread to animal and human populations and characterized the probability of harm on the basis of those data. Because of CDC\'s import restrictions on all African rodents, we did not estimate the risk posed by importation of animals into the United States. We focused only on monkeypox and did not consider other zoonotic agents that might be transmitted by the species discussed. This risk assessment follows a generally accepted 4-part framework ([@R12]). The hazards are MPXV and its potential for transmission and spread from animals to humans; the risk is human infection from prairie dogs and possibly imported rodents. Hazard Identification ===================== Human monkeypox is a sporadic zoonotic viral disease, caused by an orthopoxvirus that until 2003 was known to have occurred only in parts of Africa ([@R3]*,*[@R7]*,*[@R13]). The first human illness was identified in 1970 in a child ([@R7]*,*[@R14]). Previous cases were likely mistaken for smallpox ([@R14]). Although it was first isolated from a captive primate ([@R3]*,*[@R6]), rodents are its likely primary natural reservoir ([@R7]*,*[@R15]*--*[@R17]); its complete mammalian host range is unknown. The mode of transmission between infected animals and humans is not well defined ([@R18]). Direct mucocutaneous contact and respiratory routes have been implicated in epidemiologic and experimental research ([@R15]*,*[@R18]*,*[@R19]). The estimated mean human incubation period is 12 days ([@R1]*,*[@R3]*,*[@R15]*,*[@R16]). The disease is characterized by a rash similar to that observed with smallpox ([@R14]) or chickenpox ([@R10]*,*[@R15]*,*[@R20]). The infectious period occurs during the first week of the rash ([@R7]); symptoms include headache, fever, sweats, and severe lymphadenopathy ([@R15]*,*[@R16]*,*[@R20]). Among African patients with a history of smallpox vaccination, monkeypox is usually milder with lower numbers of deaths ([@R3]*,*[@R6]*,*[@R16]). Subclinical or very mild infection can occur in humans ([@R16]*,*[@R21]*,*[@R22]). Case-fatality rates in African outbreaks range from 4% to 33% ([@R6]*,*[@R23]) and are high among children ([@R3]*,*[@R6]*,*[@R14]*,*[@R23]). Variability in case-fatality rates may reflect incomplete assessment of the total number of cases, variations in case definition, and variability in the virulence of MPXV strains. The US outbreak has been associated with a milder strain ([@R3]*,*[@R24]*--*[@R26]). Case fatality also likely depends on differences in exposure, susceptibility, and healthcare ([@R14]). Repeated animal reintroduction of MPXV is believed necessary to endemic infections in human populations. Human cases in disease-endemic areas tend to be sporadic and isolated and primarily associated with direct animal-to-human transmission ([@R24]*,*[@R27]). However, clusters associated with common source and human-to-human transmission occur and may in Africa be increasing with decreased prevalence of prior smallpox vaccination ([@R6]*,*[@R7]*,*[@R15]*,*[@R16]*,*[@R28]*,*[@R29]). FDA has not approved a treatment for monkeypox. Suggested treatment options include cidofovir ([@R30]*--*[@R32]). Efficacy of vaccinia immune globulin in humans has not been established ([@R30]*,*[@R31]). After the onset of symptoms, supportive therapy is usually the recommended treatment ([@R31]). Preexposure and postexposure smallpox vaccine was used during the 2003 outbreak, with only relatively minor adverse events reported ([@R1]*,*[@R32]). Hazard Characterization ======================= Much is unknown about pathogenesis and transmission dynamics of MPXV in humans and animals. Limited research suggests that at least in some host mammals latent or inapparent infection occurs ([@R15]). In addition to serologic evidence of orthopoxvirus exposure, MPXV has been recovered from the kidneys of healthy-appearing animals ([@R15]*,*[@R16]). The latency period is unknown, as is whether the virus can be transmitted during such periods. The complete host range of MPXV in Africa is unknown. Animal antibody surveys in disease-endemic areas suggest infection is enzootic among squirrels, other rodents, and monkeys, although other animals may be infected ([@R6]*,*[@R15]*,*[@R16]*,*[@R33]*--*[@R35]). The number of animals exposed or infected in the United States is unknown and impossible to estimate. Approximately 800 animals were recorded in the African shipment, but disposition information is available only for rodents ([Table 1](#T1){ref-type="table"}) ([@R1]). A Gambian giant pouched rat, 3 dormice, and 2 rope squirrels from the shipment were tested and found to be infected with MPXV ([@R1]). Infected animals from the shipment were housed or transported with prairie dogs and other mammals. An unknown number of prairie dogs and animals from other species became infected. Although many prairie dogs became ill and several died, some infected animals survived. The secondary attack rate among susceptible animals is unknown and cannot be estimated with available data. CDC necropsied 249 animals involved with the outbreak, confirming infection in 33 animals with PCR ([@R36]) and in 22 animals through virus isolation from various tissues. Infection was confirmed in 14 prairie dogs, 2 Gambian giant pouched rats, 9 dormice, 3 rope squirrels, 1 ground hog, 1 hedgehog, 1 jerboa, and 2 opossums. CDC performed extensive histopathologic examination on 2 necropsied prairie dogs from IL-1 and detected MPXV DNA by using real-time PCR ([@R18]). The necropsied prairie dogs had MPXV in saliva, lesion exudates, and bronchi and lung parenchyma ([@R18]). Approximately 110 of the ≈200 prairie dogs likely exposed at IL-1 were sold after the African animals were introduced and before 15 of the prairie dogs at IL-1 became ill. Ten of the ill prairie dogs died rapidly ([@R1]*,*[@R3]*,*[@R18]). In June 2003, CDC evaluated an unspecified number of prairie dogs, dormice, hedgehogs, jerboas, opossums, and numerous other species (a total of 18 species) from IL-1; of these, 2 prairie dogs, 7 dormice, 1 African hedgehog, 1 jerboa, and 1 gray short-tailed opossum tested positive for MPXV by PCR ([@R36]). When these animals were infected or if they could transmit disease is not known. On June 19, 2003, CDC acquired 61 live animals from the original shipment. On August 20, 2003, CDC acquired from the state of Illinois 291 animals remaining at IL-1, including African and domestic species. Numerous other animals were acquired from Iowa, Wisconsin, Indiana, and Ohio. Of 172 animals tested from the various states as well as from the original shipment, 25 showed serologic evidence of infection without overt signs of disease (i.e., PCR and tissue culture negative). On June 24, 2003, an oral and ocular swab from a dormouse from IL-1 tested positive by PCR. After the dormouse died a month later, its tissues tested positive for MPXV by PCR and culture. A second dormouse from IL-1 that also tested positive in June appeared healthy; however, when it was euthanized in December 2003, swabs and necropsy samples of various tissues, urine, and feces were positive by PCR. No viral antigen was detected on pathologic examination of tissues ([@R36]). Investigations of human cases from the outbreak support the hypothesis that close direct contact with infected animals was necessary for infection. Cases occurred among persons who were bitten by infected prairie dogs or infected through open wounds ([@R3]*,*[@R8]). The 11 Wisconsin patients included a child and parents; a meat distributor who also distributed exotic animals; his wife; 2 employees of 2 different pet stores; 2 veterinarians from different clinics; a person who had bought prairie dogs; and that person\'s houseguest. All of these patients reported direct contact with an infected prairie dog ([@R3]), although human-to-human transmission could not be ruled out for the parents ([@R3]). Data on duration of infection are limited. Virus appears to be present in some animals months after infection, regardless of clinical illness. In addition to CDC\'s data on dormice, data derived from experimental infection of small numbers of laboratory animals documented infectious MPXV in tissues 3--6 weeks after exposure ([@R18]). Clinical and asymptomatic infections have been reported among captive primates; severity varied depending on the species and route of inoculation ([@R16]). CDC has reported elevated tissue viral loads in 2 necropsied prairie dogs ([@R18]). In another study, 10 experimentally infected North American ground squirrels died within 9 days, although no obvious signs of disease except for lethargy and anorexia developed ([@R37]). Squirrels infected intranasally had a longer incubation period and later death ([@R36]). Ten prairie dogs infected experimentally with a human MPXV isolate were highly susceptible to infection but had a lower death rate and less severe pathologic change than were seen in the squirrel study that used the same dose ([@R19]). A human adult infected during the 2003 outbreak experienced keratitis and corneal ulceration as a complication of infection and ultimately received a corneal transplant ([@R8]). Corneal ulceration has also been reported in some African patients ([@R16]). Exposure Assessment =================== In African outbreaks, capturing, handling, and eating wild animals have been associated with infection ([@R6]*,*[@R23]*,*[@R34]). In the United States, monkeypox occurred in humans who had direct contact with infected animals and were bitten or infected through open wounds ([@R3]). These persons included pet dealers, pet owners and their children, and contacts of these people at risk of coming into direct contact with the infected animal. Although potential exposure occurred in settings that included pet stores, swap meets, and wild animal trade centers ([@R1]), no evidence exists that persons casually exposed to infected animals were infected. The magnitude and scope of this pet trade are not well quantified. In 2002, ≈30,000 prairie dogs were sold at pet dealers, swap meets, flea markets, and other venues open to the public ([@R11]). Of the 762 rodents in the African shipment, CDC traced 584 (77%) ([@R1]). The remaining 178 (≈23%) could not be traced beyond the point of entry ([@R1]). The fate of the 50 nonrodent animals on the shipment is unknown. Of the ≈200 prairie dogs that may have been exposed to MPXV at IL-1, 107 (54%) have not been accounted for. These animals will not likely be traced. A small number of animals associated with the outbreak, including some known to have been infected, are in the possession of pet dealers and private owners; their capacity to transmit infection is unknown. Animals from species other than the listed species---gerbil, hamster, chinchilla, opossum, groundhog, hedgehog, and jerboa---were discovered to be infected, although no confirmed human cases of infection were associated with contact with any animal except prairie dogs ([@R1]*,*[@R9]). To evaluate the potential spread of the disease beyond the initially exposed animals, the US Geological Survey\'s National Wildlife Health Center trapped 237 small mammals from 14 species at 9 sites in Wisconsin and Illinois where cases of monkeypox were reported. All were negative for monkeypoxvirus or monkeypoxvirus-specific antibodies ([@R38]). These small amounts of data are insufficient to establish the absence of MPXV in the wild. The federal restrictions on importation of high-risk species and trade in the listed species have likely substantially reduced the potential risk for exposure of uninfected animals or persons to MPXV. However, some residual risk for MPXV infection through illegal importation or infection in legally imported, nonlisted species may exist. Risk Characterization ===================== [Table 2](#T2){ref-type="table"} provides summary information on the qualitative variables considered in the risk characterization. We evaluated the probability of human monkeypox infection that resulted from certain types of exposure or contact (direct or indirect) to animals (infected or noninfected) and qualitatively estimated the probability and, to a lesser extent, the possible severity of infection. Most confirmed human cases in the United States were associated with direct, close contact with infected prairie dogs. We characterize as type I direct contact with the animal and as type II direct contact that also involves bites, scratches, or other contact with the mucous membranes or nonintact skin of the affected person. Infection through aerosolized particles without direct animal contact, or by some other less direct method, as well as human-to-human transmission, cannot be ruled out. The probability of infection is dependent on whether the animal is infectious (shedding virus) and varies with the level of shedding and the nature of human-animal interactions (type, frequency, and duration of contact). We assume, on the basis of the data described above, that the primary means of transmission affecting the risk would be from animal to human. ###### Variables considered in characterizing risk for human monkeypox cases and the degree of uncertainty associated with these variables Variable Degree of uncertainty --------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Animal host and carrier species High---some, but not all, host species identified Proportion of probable host or carrier species infected with virus High---need to assume absent data that all animals within known or probable carrier species are infected Proportion of animals exposed during US 2003 outbreak infected with virus High---need to assume that all exposed animals are infected Susceptibility of naive animals to infection High---but experience in United States and Africa suggests several species and orders can be infected with monkeypox virus Latency in nonhuman species High Duration of infection or infectiousness in nonhuman species High Seasonality of disease High---some indication of peak monkeypox cases in humans in July and August in African outbreaks, which may be associated with human behavior rather than characteristics of virus or host animals Incubation in nonhuman species High Infection rates in exposed nonhuman species High Proportion of infected animals (of different species) that shed virus High Mode(s) of transmission across species and to humans High---but evidence of mucocutaneous and respiratory transmission pathways Attack rates among humans exposed to infected animals High Secondary attack rates among humans High---secondary attack rates seem to be increasing in monkeypox-endemic areas due to increasing susceptibility of exposed populations, and historical data indicating low risk for human transmission may be unreliable Fatality rates in nonhuman species High Several categories were established to define and qualitatively characterize the risks. Low risk denoted no direct human contact with a captive animal(s); even if animal infection status was unknown or the animal was infected, the exposure to the animal was likely insufficient for animal-to-human disease transmission to occur. Medium risk described human contact that was direct but the exposure involved type I contact with a potentially infected animal or animal(s) of unknown infectious status. High risk designated direct human contact and involved a type II contact with a captive animal(s) infected with MPXV or with unknown infection status but likely MPXV exposure. Finally, the term severity of infection and illness denoted any individual infection with MPXV that should be considered serious and potentially fatal. The risk to the persons and the risk for the spread of the disease to others made MPXV infection a potentially serious public health matter. The probability that any surviving animal directly involved in the outbreak may be infected must be considered high, given the possibility of latent infection. Making the unlikely assumption that all of these animals are still alive, the group includes the 178 African rodents, mostly dormice, lost to follow-up, 107 prairie dogs from IL-1 that were not traceable, and 50 nonrodent animals included in the African shipment. An unknown number, but clearly most, of the affected African rodents and IL-1 prairie dogs that were traced and identified as alive as of July 2003 (121 African rodents and ≈93 prairie dogs) have since died or been euthanized. Some animals from other species that were in the affected pet distribution facilities during the outbreak tested positive for MPXV. An unknown number of these exposed animals are likely to be alive and in private or commercial ownership; what proportion of these animals is infected with MPXV is unknown but is assumed to be small. No confirmed cases of human infection or further cases of animal infection have been associated with these animals. However, all animals directly associated with the 2003 outbreak should be considered to pose a continued high risk for infection. The probability of infection in rodents or other animals imported from monkeypox-endemic regions is unknown. Imported African rodents were almost certainly the source of the US outbreak. Animals imported as pets are handled by several persons as they pass from importer to owner, and they may be housed and transported in close proximity with nonimported susceptible animals. Current import restrictions on African rodents substantially reduce the risk for introduction and spread of MPXV, but a potential residual risk remains because of illegal importation as well as import of nonrestricted species that may carry the virus. Some previously imported animals from restricted species might also be infected with MPXV, although this risk is unknown and assumed to be extremely low. For domestically bred African rodents, the risk they may pose of transmitting MPXV to humans depends on the risk that the rodents will be exposed to infected animals. Absent a tracking or pedigree system that distinguishes domestically bred from imported, wild-caught animals is impossible. Trade in domestically bred African rodents could increase the risk for human infection if illegally imported infected animals are identified as captive-bred. The monkeypox risk to humans posed by prairie dogs is a function of the animals\' possible contact with infected animals and their potential for viral transmission. The number of animals infected with or exposed to MPXV in the outbreak that might still be alive is likely small. However, these animals may be widely distributed geographically, and they may have spread the virus to other animals not currently known to pose a risk. The risk for MPXV infection and spread among prairie dogs are mitigated by current import and trade restrictions and the death or euthanization of most animals directly associated with the outbreak. The probability that an uninfected prairie dog will come into contact with an infected captive or released animal and that there will be sufficient exposure for infection is likely low. If such contact occurs, however, these animals are highly susceptible. Little evidence about the MPXV status of wild prairie dogs exists. Given the high rates of illness and death among captive prairie dogs exposed to MPXV in 2003, anticipating that the virus would result in a die-off that would be detected may be reasonable; however, in addition to the lack of data, uncertainties about the virus and the susceptibility of the animals in the wild preclude drawing any conclusions. The risk for new domestically acquired human cases is low with the current restrictions on import and trade in certain species in place. No new cases have been reported in humans or animals since the outbreak, despite the likelihood that some surviving infected animals have been kept alive by individual or commercial owners. Limited surveillance efforts have not identified MPXV in wild animal populations; however, the virus could possibly become enzootic here if an infected animal were released or escaped into the wild and spread the virus to susceptible mammals. Were that to occur, human cases would likely result. The risk that monkeypox could become enzootic is relevant in evaluating the risk of importing potential mammalian carriers of MPXV or in allowing contact between likely carriers and susceptible domestic mammals. Data limitations preclude quantitative, and limit accurate qualitative, estimation of the human risk for monkeypox in the United States ([Table 3](#T3){ref-type="table"}). Research is needed on disease dynamics, range of host species, and the parameters of wild animal trade and ownership. ###### Qualitative estimation of risk to humans\* Human exposure to animal Animal infected Infection status of animal unknown --------------------------------------------------------------------------------------------------------------------- ----------------- ------------------------------------ ----- Indirect exposure/no direct contact Low Low Low Direct contact, type I\* (direct contact without type II exposure) Medium Medium Low Direct contact, type II\* (bite, scratch, or contact of animal's body fluid with mucous membrane or nonintact skin) High High Low \*Risk was based upon type of exposure to an animal and the infection status of the animal. Type I and type II are arbitrary classifications. *Suggested citation for this article*: Bernard SM, Anderson SA. Qualitative assessment of risk for monkeypox associated with domestic trade in certain animal species, United States. Emerg Infect Dis \[serial on the Internet\]. 2006 Dec \[*date cited*\]. Available from <http://dx.doi.org/10.3201/eid1212.060454> We thank Beth Karp, Philip L. Chao, and the reviewers external to FDA, who provided expert comment on an earlier draft of this work. Dr Bernard is the associate director for regulations in FDA\'s Center for Food Safety and Applied Nutrition. Her professional and academic focus has been on population health risks, law, and policy; projects at FDA include issues such as antimicrobial drug resistance, foodborne pathogens and toxins, communicable diseases, and obesity and nutrition-related diseases. Dr Anderson is the associate director for risk assessment in the Office of Biostatistics and Epidemiology at the FDA Center for Biologics Evaluation and Research. He uses computer modeling and risk assessment techniques to address critical scientific and policy issues pertaining to the safety of blood and blood products, vaccines and cellular, tissue, and gene therapies.
{ "pile_set_name": "PubMed Central" }
Chicago and Schapiro's use of both a separate teaching space for women students and the intensive use of consciousness raising techniques as the basis for issue based work continue to inspire as well as suggest ways to problematise feminist approaches and methodologies.fitflops fleur urban white monkeys Over the past few years… Celts: Art and IdentityA major exhibition reviewing what we know about the different people who, over the centuries, have… Play and DisplayCreate a Lego model to be put on show for a day. "Refugee crisis: UK asylum policy dividing up families26 NovemberBritain's asylum policy is deliberately and permanently separating refugees from their loved ones, charities warn.fitflops fleur urban white monkeys Pens Craft Pens RSS Craft Pens More Info Crafters Companion stock a fantastic choice of crafting supplies, including the quality craft pens found in this section. ??Veganism and vegetarianism isn't a fad and is becoming more common as people become more aware of the damage processed meats and dairy have on their bodies and the environment around them. ??After a series of increasingly strange and occasionally troublesome encounters, they head out on the road, literally, taking any opportunity to hitch hike, scrounge, cheat or coerce their way across the country in search of Masao's mother.fitflops fleur urban white monkeys
{ "pile_set_name": "Pile-CC" }
In the early hours of April 11, 2016, 20 students from the University of Massachusetts walked into the Whitmore Administration Building and sat down in front of the Chancellor’s office in silent protest of the University’s investment in the oil and gas industry. By midday, that number grew to 45. What began as a modest protest in the halls of a quiet building culminated in two weeks of historic sit-ins and actions with over 1,000 students, alumni, and faculty participating. This epic escalation concluded with 34 people being arrested for engaging in peaceful civil disobedience. One month following the actions, both the Board of Trustees and the Investment Committee voted in favor of divesting the UMass system endowment from direct investments in the fossil fuel industry. This campaign at UMass proves that when we organize and take action collectively, incredible victories are possible. Throughout spring 2016, schools across the country occupied, demonstrated, and rallied: from Northern Arizona University and Columbia University, to the University of Montana and the University of California Berkeley, and beyond. This moment showed that young people will rise to meet the challenges posed by the climate crisis and demand that our administrations lead with us in the fight for the planet and its people. And the pressure is not letting up. Young people are preparing to escalate on their campuses this spring, with demonstrations planned in at least eight states. The Divest Penn campaign at the University of Pennsylvania, President Trump’s alma mater, kicked off the wave of escalation earlier this month when over 60 students were cited for nonviolently protesting the University’s investment policies. The industry can only expect these demonstrations to get larger and more powerful, especially as the attack on climate policies worsens at the federal level. Fossil fuel divestment began as a morally-focused campaign on a handful of college campuses in the US. Students were unwilling to remain silent as their universities funded the very industry putting our communities and our futures at risk. Over the last 6 years, the campaign has exploded into a mainstream global movement. Divestment started with students and youth, and has now spread into every sector of society: from municipal and state campaigns, faith organizations, insurance companies and more. The escalating effort over the last 6 years has resulted in divesting assets representing over $5.2 trillion worldwide. Divestment has played a key role in shifting public opinion against a dangerous industry that chokes our lungs and destabilizes our economy. Alongside many powerful movements and organizations fighting for justice in our time, the divestment movement has started to release the tight grip the fossil fuel industry has over our political system and create space to manifest the alternatives. Never has the industry been challenged at such a level by a grassroots force of millions of people demanding change. And it’s working. This past month, Shell CEO, Ben van Beurden admitted that the greatest threat to Big Oil and Gas was declining public opinion. “I do think trust has been eroded to the point that it is becoming a serious issue for our long-term future” he said. The climate movement faces some serious challenges ahead. Donald Trump has already ordered the removal of major climate executive orders from the previous administration and appointed a cabinet stacked with fossil fuel executives, billionaires, and climate deniers. But the fight is far from over As the Trump administration rolls back hard-won protections on climate change, no one will be off the hook. We’ve seen in the past that people can overcome historic adversity with historic action. The Trump administration will attempt to throw our country into greater chaos at the federal level. Now, it’s up to us to find creative ways to fight for the change we need most right now -- from the bottom up. That’s why young people are escalating on their campuses, and turning out in the masses to the April 29th Peoples Climate March. We must resist Trump’s agenda every way we can at the federal level. And, as we resist the bad, so must we fight for necessary solutions. We must dig deep at the local level to pressure our municipal and state governments. We must fight for the biggest, boldest vision we can imagine at every level. That means making sure working class communities and communities of color, who are often the first to be hit by climate impacts and the last to receive help, are not left behind. We must elect those to office who will be champions of the people, and replace politicians who are bedfellows with the industry standing in the way of safety and prosperity for people everywhere. We have so much to fight for, hope for, imagine and create. With the stakes higher than ever, now is the time for action.
{ "pile_set_name": "OpenWebText2" }
Q: Using blocks in Restkit (like ASIHttpRequest Blocks) i have been using the block support extensively in ASIHttpRequest, and i have found it to be an extremely elegant way of coding async requests, much more so than having the delegate call back a seperate function Here is the example code for quick reference. __block ASIHTTPRequest *request = [ASIHTTPRequest requestWithURL:url]; [request setCompletionBlock:^{ NSString *responseString = [request responseString]; }]; [request startAsynchronous]; I would like to start using Restkit, but I need to be able to use Restkit with blocks as well. I have seen the wrapper here Restkit Block Wrapper, but would like to check if that wrapper would work well in production, and if anyone have used it extensively before A: I have not used the RestKit Block wrapper yet, but I will be shortly. I'm actually removing ASIHTTPRequest from my App and replacing with RestKit. Not because it's bad, ASIHTTP* is quite stable - but it isn't evolving. While many other libraries, like RestKit, wrap NSURLConnection and so reap the benefits of Apples continuing enhancements to it, ASIHTTP* uses CFNetwork. Apple isn't investing a lot of effort in improving preexisting Core Foundation classes (like CFNetwork). Also, since ASIHTTP* depends on CF, it's going to be a royal pain to migrate to ARC when it's available; I wan't the benefits of ARC as soon as possible. A: Blocks support for all the basic delegate tasks on RKRequest and RKObjectLoader will be coming in 0.9.4 A: Yesterday, Blake released verson 0.9.3 which features the usage of blocks for the Object Mapper (other methods were already ready for blocks). You should take look at the new features.
{ "pile_set_name": "StackExchange" }
As part of the coronavirus disease (COVID-19) pandemic containment measures, Israel\'s government declared complete closure of all educational facilities on 13 March 2020. Limited schools reopening (kindergartens, grades 1--3 and 11--12) only in small groups was approved on 3 May 2020. Subsequently, all school classes reopened on 17 May 2020, with requirement for daily health reports, hygiene, facemasks, social distancing and minimal interaction between classes. Ten days later, the first major COVID-19 school outbreak in Israel emerged in a high school. The first case was registered on 26 May and the second on 27 May. The two cases were not epidemiologically linked. Testing of the complete school community revealed 153 students (attack rate: 13.2%) and 25 staff members (attack rate: 16.6%) who were COVID-19 positive. Overall, some 260 persons were infected (students, staff members, relatives and friends). In this report, we aim to describe the investigation and epidemiological characteristics of the school\'s outbreak. Outbreak description and epidemiological investigation ====================================================== School 1 is a regional public school; students arrive from suburbs and neighbourhoods, by public or school bus. It contains 1,190 students aged 12--18 years (grades 7--12) and 162 staff members. The school reopened after 2 months' closure on Monday, 18 May 2020. Students returned to their previous classrooms and received instructions on preventive procedures. On 19--21 May (Tuesday to Thursday), an extreme heatwave occurred. Hence, the Ministry of Health exempted schoolchildren from facemasks for these 3 days. The first COVID-19 case (Student A) was notified on 26 May 2020. The source of infection was unknown. Close contacts from household (n = 4), students (n = 50) and teachers (n = 14) were instructed to self-isolate. The second case (Student B) was notified on 27 May 2020. According to the epidemiological investigation, both students attended school during the days of 19--21 May and reported mild symptoms (anosmia, ageusia, fever and headache). They were from different grades and were not epidemiologically linked. With the emergence of two unrelated cases within 2 days, the district health office declared an 'outbreak status\' including school closure, isolation instructions and testing of the school community. During that long weekend (a Jewish holiday, 28--30 May 2020), mass COVID-19 testing was conducted as a joint effort of the school leadership and community, the four Health Funds, Magen David Adom (national emergency services organisation), the local municipality and the district health office. Ten teachers and 26 students who had not attended school since reopening were excluded. Most of the remaining school community was tested, 151 of 152 staff members and 1,161 of 1,164 students. Overall, 153 students and 25 staff members were confirmed as COVID-19-positive. The data from the epidemiological investigation are shown in the [Table](#t1){ref-type="table"}. The COVID-19 rates differed between groups. Male cases were slightly overrepresented. The rate of cases reporting symptoms, upon meticulous questioning, was 43% (66/153) among students and 76% (19/25) among staff. The leading symptoms reported were cough, headache, fever, sore throat and myalgia. One emergency room visit was recorded and no hospitalisations. ###### Epidemiological investigation data, COVID-19 outbreak, Israel, May 2020 (n = 1,316^a^) Group Number of persons Number tested Males Confirmed cases Males, of confirmed cases Median age in years (cases) Symptoms -------------- ------------------- --------------- ------- ----------------- --------------------------- ----------------------------- ---------- ------ ---- ---- ------ 7th grade 197 197 106 53.8 40 20.3 25 62.5 13 19 47.5 8th grade 197 197 102 51.8 34 17.3 19 55.9 14 15 44.1 9th grade 187 187 94 50.3 61 32.6 32 52.5 15 30 49.2 10th grade 200 200 110 55.0 9 4.5 6 66.7 16 2 22.2 11th grade 195 194 98 50.5 6 3.1 3 50.0 17 0 0 12th grade 188 186 87 46.8 3 1.6 1 33.3 18 0 0 All students 1,164 1,161 597 51.4 153 13.2 86 56.2 15 66 43.1 Staff 152 151 51 33.8 25 16.6 9 36.0 40 19 76 COVID-19: coronavirus disease. ^a^ Overall 1,312 members of the school community were tested: 1,161 students and 151 staff. COVID-19 rates were higher in junior grades (7--9) than in high grades (10--12) ([Figure 1](#f1){ref-type="fig"}). The peak rates were observed in the 9th grade (20 cases in one class and 13 cases in two other classes) and the 7th grade (14 cases in one class). Of the cases in teachers, four taught all these four classes, two taught three of the four classes and one taught two of these four classes. ![Results of COVID-19 testing, school outbreak, Jerusalem, May 2020 (n = 1,312)](2001352-f1){#f1} An environmental school inspection reported crowded classes: 35--38 students per class, class area 39--49 m^2^, allowing 1.1--1.3 m^2^ per student (below the 1.5 m^2^ standard). Distancing among students and between students and teachers was not possible. Furthermore, during the extreme heatwave, air-conditioning functioned continuously in all classes. The air-conditioning system was separate for each class. The junior grades (7--9) and the high grades (10--12) are situated in one large building, yet in separate wings, and share the schoolyard and public spaces. According to the school schedule, students study 6 days (Sunday to Friday) for 38--40 h weekly (6.3--6.7 h daily on average). Daily travel time to school depends on distance and traffic conditions and lasts 20--45 min. Most students also participate in extracurricular activities such as sports teams or dance classes for an average of 2--4 h per week. As at 30 June 2020, 100 of 153 (65.4%) students and 16 of 25 (64%) staff members have recovered (with two negative PCR results). Evaluating the recovery period revealed that 60% of asymptomatic cases recovered within 25 days vs only 37% of symptomatic cases. Cases outside the first affected school ======================================= By mid-June 2020, 87 additional confirmed COVID-19 cases had occurred among close contacts of the first school's cases. These included siblings attending other schools, friends and participants in sports and dancing afternoon classes, students' parents and family members of school staff. COVID-19 cases age distribution in the Jerusalem district ========================================================= The large school outbreak led us to evaluate the age distribution of COVID-19 cases before and after schools\' reopening. From week 9 to week 25 in 2020, 5,519 confirmed COVID-19 cases were reported in the Jerusalem district. As schools reopened on 17 May 2020, the evaluation point selected was 1 week later, on 24 May 2020 (week 22). The evaluation showed that before 24 May 2020, the proportion of the 10--19 years-olds (representing schoolchildren), was 19.8% (938/4,747) of cases in weeks 9--21, increasing to 40.9% (316/772) after 24 May 2020, in weeks 22--25 ([Figure 2](#f2){ref-type="fig"}). ![COVID-19 cases, Jerusalem, February--June 2020 (n = 5,519)](2001352-f2){#f2} From week 9 to week 24 in 2020, 18,448 confirmed COVID-19 cases were reported nationally, 5,184 cases in the Jerusalem district and 13,264 cases in all the other districts in Israel, excluding Jerusalem. The age pyramid of confirmed COVID-19 cases in the Jerusalem district vs nationally (excluding Jerusalem) showed a prominence of the 10--19 years-olds in Jerusalem, 22.6% vs. 13.9% in all the other districts ([Figure 3](#f3){ref-type="fig"}). ![Age distribution of COVID-19 cases, Israel, May 2020 (n = 18,448)](2001352-f3){#f3} Discussion ========== On 27 January 2020, Israel\'s health minister declared COVID-19 infection a notifiable disease requiring immediate reporting. By 21 June 2020, some 20,778 confirmed COVID-19 cases had been reported with 306 fatalities \[[@r1]\]. Israel\'s population is 9.1 million (median age: 30 years) \[[@r2]\]. Like other countries, Israel implemented diverse containment measures including quarantine. Nationally, there are 1.7 million schoolchildren, 830,000 kindergarten children and 170,000 teachers and staff \[[@r3]\]. Full closure of educational facilities occurred on 13 March 2020. Elsewhere, 107 countries had implemented national school closures by 18 March 2020 \[[@r4]\]. COVID-19 cases are defined clinically (fever \> 38 °C, cough, respiratory illness etc.) and epidemiologically. Laboratory confirmation requires detection of SARS-CoV-2 nucleic acid by PCR in nasopharyngeal swabs. The district health offices perform epidemiological investigations and contact tracing and issue isolation instructions and guidance to healthcare, educational and other facilities. The Health Funds, via community clinics, follow patients, refer to hospital if necessary and provide counselling to patients and families. The Jerusalem health office serves 1.25 million residents (median age: 23.5 years), characterised by moderate to low socioeconomic status and large households \[[@r5]\]. The high school outbreak in Jerusalem displayed mass COVID-19 transmission upon school reopening. The circumstances promoting infection spread involved return of teenage students to their regular classes after a 2-month closure (on 18 May) and an extreme heatwave (on 19 May) with temperatures rising to 40 °C and above \[[@r6]\] that involved exemption from facemasks and continuous air-conditioning. Classes in the first affected school had more than 30 students. Israel's secondary school classes are crowded (average: 29 students in public schools) compared with the Organisation for Economic Cooperation and Development (OECD) average (23 students) \[[@r7]\]. COVID-19 in a school necessitates a prompt response. Classmates and teachers should be considered close contacts (particularly in crowded classes), as should students in groups mixing several classes, extra-curricular activities and school buses. Temporary school closure is prudent (especially in large regional schools) pending investigation results. Most student cases presented with mild symptoms or were asymptomatic. Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection in children and adolescents is considered mild compared with adults. A review of 18 studies (1,065 hospitalised paediatric patients) presented overall good prognosis for that age group \[[@r8]\]. A Chinese study of 171 paediatric cases infected with SARS-CoV-2 reported main signs of fever, cough and pharyngitis, 16% were asymptomatic \[[@r9]\]. In a European multicentre study (582 children), COVID-19 was usually mild, a small fraction developed severe disease and mortality was rare \[[@r10]\]. In a study in New York State, Kawasaki-like disease and myocarditis have been linked to COVID-19 infection, with the condition termed multisystem inflammatory syndrome (MIS-C) in children \[[@r11]\]. French paediatric surveillance data also support linkage between SARS-CoV-2 infection and MIS-C \[[@r12]\]. The role of children and adolescents in COVID-19 spread is equivocal; epidemiological data imply insignificance of children in transmission \[[@r13]\]. School closure is a public health tool in influenza pandemic preparedness plans, based on high infectiousness and susceptibility in schoolchildren and high contact rates \[[@r14]\]. School reopening policy after the COVID-19 lockdown varies considerably between nations and therefore requires ongoing assessment \[[@r13]\]. Conclusions and recommendations =============================== COVID-19 prevention in schools involves studying in small groups and minimising student mixing in activities and transportation. Teachers and parents should lead by wearing facemasks, hand hygiene, keeping physical distance etc. School attendance should be avoided at any sign of illness. Learning from home may also reduce the need for class attendance. Outdoors classes should also be considered. COVID-19 prevention encompasses avoiding the 'three Cs': closed spaces with poor ventilation, crowded places and close-contact settings \[[@r15]\]. The European Centre for Disease Prevention and Control's report on air-conditioning and ventilation systems and COVID-19 recommends increasing air exchange rate and outdoor air use and decreasing air recirculation, aiming to reduce spread in indoor spaces \[[@r16]\]. Finally, appropriate planning of COVID-19 prevention for the next school year is essential. The authors wish to acknowledge Mr. Danniel Leibovitch, the school's headmaster, the school's teachers and staff, the students and families for their cooperation and compliance. The authors wish to thank the Jerusalem municipality and mayor Mr. Moshe Lion, for their support and leadership. The authors wish to thank the Jerusalem branch of MDA (national emergency services organization) for the rapid mass testing. Finally, the authors would like to thank the devoted public health teams in the district health office and the community clinics teams of the four heath funds in Jerusalem. **Conflict of interest:** None declared. **Authors' contributions:** Chen Stein-Zamir, Nitza Abramson and Hanna Shoob collected data, performed the investigation and data analysis and wrote the manuscript. Erez Libal, Menachem Bitan, Tanya Cardash, Refael Cayam and Ian Miskin performed the patients' follow-up, provided data and reviewed the manuscript. [^1]: Correspondence: Chen Stein-Zamir (<[email protected]>)
{ "pile_set_name": "PubMed Central" }
Trump threatens to cancel press briefings, says Spicer 'gets beat up' The comments, in an interview, are the second time he made the threat Friday. — -- After an early-morning tweetstorm in which he addressed inconsistencies between his statements and those of his surrogates by suggesting the cancellation of "all future press briefings," President Donald Trump reiterated the threat in an interview Friday afternoon. Asked by Fox News' Jeanine Pirro if the pace of his actions was to blame for the White House communication staff's difficulties -- which, this week, included offering contrasting accounts surrounding the firing of FBI Director James Comey -- Trump agreed. Pirro then asked what could be done to rectify the inaccuracies presented to the press. "We don’t have press conferences," said Trump. "We just don’t have them. Unless I have them every two weeks and do it myself. We don’t have them. I think it's a good idea." Friday morning, in the midst of a series of tweets in which Trump addressed the investigation into Russian collusion with his campaign to influence the presidential election and downplayed any role the probe played in his determination to fire Comey, the president raised the prospect of suspending the briefings. "As a very active President with lots of things happening, it is not possible for my surrogates to stand at podium with perfect accuracy!" wrote Trump, referring to aides' claims that he took action on Comey based on the recommendation of Department of Justice officials. He later told NBC in an interview that the decision was his alone. The comments also echo sentiments from associates of Trump during the transition, who reportedly considered whether the administration should hold fewer press briefings or move them out of the White House to the Eisenhower Executive Office Building. During an interview Friday night with Fox News' Sean Hannity, former House Speaker Newt Gingrich urged the president to follow through on his threat. "Ignore all of these reporters," Gingrich said. "Close down the press room. Send the reporters off. They can go to Starbucks across the street. I don't care where they go. These people are not committed to the truth. They're not committed to being neutral. Why would you hang out with a bunch of people who despise you?" In Trump's Fox News interview, the president additionally commented upon the performance and treatment of his spokespeople, press secretary Sean Spicer and principal deputy press secretary Sarah Huckabee Sanders, who conducted two briefings in Spicer's absence this week. "You have a level of hostility that’s incredible and it's very unfair," said Trump. "Sarah Huckabee is a lovely young woman. You know Sean Spicer. He’s a wonderful human being. He’s a nice man." Trump pushed back when Pirro suggested Spicer could be replaced, though the president did concede that the spokesman has faced difficulties. "He’s doing a good job, but he gets beat up," said Trump.
{ "pile_set_name": "OpenWebText2" }
Project Summary/Abstract The California Animal Health and Food Safety Laboratory System (CAHFS), within the School of Veterinary Medicine at the University of California - Davis, is uniquely qualified to participate in a cooperative agreement with the Veterinary Laboratory Response Network (VetLRN). Disease detection and bacterial pathogen identification are critical components of our diagnostic mission. As an accredited member of the American Association of Veterinary Laboratory Diagnosticians (AAVLD), CAHFS adheres to rigorous standards and strict performance monitoring required for certification by this organization. We utilize established and validated standardized operating procedures (SOP's) to perform specimen processing; microbial testing; and secure results reporting to ensure we are providing timely and accurate results to our submitters and stakeholders. In our role as a food safety testing facility, we are adept at processing and evaluating a variety of animal foods and feeds as well as food products intended for human consumption for bacterial pathogens. Our experience with both classical and molecular methods to detect foodborne bacterial agents and potential pathogens could be extremely beneficial to the VetLRN in both small-scale and large-scale food intoxication events. These qualifications align well with the mission of the VetLRN and will strengthen the FDA's ability to recognize and respond to an animal food or product contamination event. The recent outbreak of human illnesses that were associated with exposure to potentially Salmonella- contaminated pet food highlights the possible widespread health issues that can arise from an animal feed product contamination. We recognize the critical role that the VetLRN plays in recognizing and responding to these types of events, and we welcome the opportunity to expand this working relationship.
{ "pile_set_name": "NIH ExPorter" }
Second in a series. Read the first part here. Costa Rica’s Santa Elena Peninsula in the northwestern province of Guanacaste was the site of a smoking gun in the 1980s Iran-Contra affair, the scandal that rocked the administration of former U.S. President Ronald Reagan. Santa Elena also was the site of extensive drug trafficking back then, according to pilot who now says he trafficked cocaine and guns to a secret airstrip on the peninsula. The airstrip was located in Potrero Grande, a 1.6-kilometer valley on the coast some 15 km south of the Nicaraguan border. According to former CIA contract pilot Robert “Tosh” Plumlee, drug smugglers used the airstrip for years, even before U.S. Lt. Col. Oliver North came looking for a staging area for arms flights into Nicaragua’s “Southern Front.” A team of journalists, including Tico Times reporters, discovered the airstrip in September 1986. “Santa Elena had been on a drug-running route long before we started using it to help arm the Southern Front,” Plumlee told The Tico Times. Somehow, North fell in with the owner of the property, the Santa Elena Development Corporation, represented by North Carolina native Joe Hamilton. North took out a $5 million mortgage on the property for an unknown purpose. “Men with maps” approached former Costa Rican President Luis Alberto Monge to obtain his blessing to create a full-scale air base at Potrero Grande, arguing that it would be needed if Sandinistas attacked Costa Rica. After he left office, Monge told The Tico Times he assumed the men were U.S. officials. He readily agreed. A phantom Panamanian company, Udall Resources, set up by retired U.S. Gen. Richard Secord and “owned” by a “Robert Olmstead” – the pseudonym of William Haskell, a Maryland accountant and North’s Vietnam buddy – was contracted to extend the airstrip in 1984 to enable it to accommodate large C-130 transport aircraft. Iran-Contra investigators discovered that a “cabal” had elaborated a plan to conceal the backing of Nicaraguan Contras by the U.S. government at a time when the U.S. Congress had prohibited the Reagan Administration from aiding the Contras. Plumlee said he flew to the Potrero Grande airstrip before North dubbed it “Point West,” beginning in 1983, in a smaller C-123 transport plane. Plumlee estimated that he trafficked up to 30,000 kilograms of cocaine from Medellín and Bogotá, Colombia, out of Potrero Grande. When Óscar Arias became president of Costa Rica in May 1986, he ordered U.S. Ambassador Lewis Tambs to shut down the site. But the refurbished airstrip had become operational the same month Arias took office, and remained open for business, Plumlee said. Residents in the neighboring communities of Liberia and La Cruz spotted airplanes flying low over the hills of Santa Rosa National Park, which bordered the airstrip. A team of journalists set out to find the airstrip in September 1986. When they traveled to Santa Rosa National Park to ask about the mysterious flights, a U.S. scientist working in the park said, “It’s about time.” If the U.S. government was running a drug interdiction operation through Potrero Grande, it was a secret to the Costa Rican government. After journalists discovered the airstrip, then-Public Security Minister Hernán Garrón said Costa Rican police had seized the airstrip the previous month. “We didn’t know if we’d find Contras or armed drug traffickers,” Garrón told The Tico Times at the time. Nicaraguan guerrilla fighters led by Edén Pastora, known as “Comandante Cero,” pictured here in 1983. The Tico Times In October 1986, the Sandinista army shot down a C-130 carrying arms to the Contras and captured a cargo kicker named Eugene Hasenfus, the only crew member with a parachute. Journalists given access to documents found aboard Hasenfus’ airplane linked the flight to the CIA. A Tico Times reporter determined that two phone numbers found in logs in the wreckage belonged to the home and the embassy office of CIA San José station chief Joe Fernández (code-named Tomás Castillo), a foreshadowing of the Iran-Contra scandal that erupted the following November, when U.S. Attorney General Edwin Meese revealed that the U.S. government had sold weapons to Iran and used the proceeds to help arm the Contra rebels. The chain of events raised questions over how much the U.S. government, in general, and the CIA, in particular, had aided the Contra cause when a congressional prohibition was in place. In Costa Rica, a Legislative Assembly commission, acting on findings richly informed by the U.S. Senate Committee investigating Contra involvement in drugs and chaired by then-Senator – now-Secretary of State – John Kerry, prohibited a number of former U.S. officials – including North and Ambassador Tambs – from entering Costa Rica. Eventually, the Arias administration expropriated the Potrero Grande land and it became a part of Santa Rosa National Park – but not before a protracted court battle with the airstrip owners and the direct intervention of then-U.S. President George H.W. Bush, who held up an Inter-American Development Bank loan to Costa Rica to prod the Arias administration over the “investment issue.” The Costa Rican government ended up paying about $13 million for the property, after negotiations arbitrated by the World Bank. The fact that Mexican drug cartel kingpin Rafael Caro Quintero was a supporter of the U.S.-backed Nicaraguan rebels, providing a training and staging area for arms flights to the Contras at his Veracruz, Mexico, ranch, also casts a different light on the drug lord’s escape to Costa Rica and the circumstances surrounding his short stay in the country. In early March 1985, tipped off that Caro Quintero was about to fly out of Guadalajara to escape the manhunt that had prompted U.S. President Ronald Reagan to close the U.S. border with Mexico, DEA agents raced to the city’s airport to find agents from Mexico’s Federal Security Directorate (DFS) protecting Caro Quintero’s Gulf Stream jet. According toHéctor Berrellez, the DEA’s lead investigator into agent Enrique “Kiki” Camarena’s 1985 kidnapping, torture and murder, Caro Quintero appeared in the doorway of the airplane holding a bottle of champagne and shouting to the outgunned DEA agents: “My children, next time bring more guns.” Caro Quintero was flown north to Sonora by Costa Rican pilot Warner Lotz – another CIA contract employee, according to Plumlee – to see his brother Miguel before Lotz flew the cartel boss to his ranch in Veracruz. Plumlee said he was waiting there to take Caro Quintero across the border to Guatemala, where yet another pilot, Luis Carranza, flew him to Costa Rica. Caro Quintero and his entourage, which included several cronies and his girlfriend Sara Cosio, passed through Customs unchecked upon arriving in San José. According to some reports, they may have first landed at an unsupervised provincial airstrip, making their arrival in San José a domestic flight exempt from passing through Customs. The participation of so many CIA contractors in Caro Quintero’s escape raises questions about whether the CIA might not have arranged for Caro Quintero to come to Costa Rica, where he could be more readily nabbed. “Absolutely not,” Berrellez said. “The only reason the Costa Rican government moved to arrest him was because we [the DEA] told them exactly where he was.” The DEA had pinpointed the drug lord’s location by tapping a telephone at the Mexican home of Cosio’s parents. Cosio had called home and tipped off the DEA, Berrellez said. A clandestine airstrip in Potrero Grande, in Costa Rica’s northwestern province of Guanacaste. The airstrip was used to traffic guns and drugs, according to a former CIA pilot. Julio Laínez/The Tico Times In the early morning hours of April 4, 1985, Costa Rican cops, accompanied by DEA agents, stormed Finca California, a mansion in the Ojo de Agua area of Alajuela near Juan Santamaría International Airport, and arrested Caro Quintero and his cohorts. According to press reports, Caro Quintero complained to the arresting officers that he had paid handsomely for refuge in Costa Rica. Later that morning at the DEA’s office in the U.S. Embassy, DEA-agent-in-charge Don Clemens was on the telephone to Costa Rican officials trying to convince them to hold Caro Quintero for extradition to the United States, to no avail. Instead, the Monge administration loaded Caro Quintero and his entourage onto an airplane and deported them to Mexico the same day the drug lord was captured. Another Costa Rican Legislative Assembly commission, which investigated the circumstances surrounding Caro Quintero’s stay in Costa Rica, concluded that a “superior political authority” was responsible. As for Caro Quintero, the drug kingpin vanished after his release last Julyfrom a Mexican prison. Mexican authorities ignored a U.S. extradition request. In the ’80s, no one imagined the link between Caro Quintero’s ranch in Veracruz, Mexico, and the Santa Elena airstrip in Costa Rica – two pieces of a puzzle that on the surface had little do with each other. While reporters have focused on isolated incidents, the entire picture of the Contra drug saga has yet to come into focus, according to Celerino Castillo, a former DEA agent and author of “Powderburns: Cocaine, Contras and the Drug War.” “All this is very well documented, but no one has put the pieces together,” Castillo said. “But the pieces do fit together.”
{ "pile_set_name": "OpenWebText2" }
Variations in paranasal sinus anatomy: implications for the pathophysiology of chronic rhinosinusitis and safety of endoscopic sinus surgery. To study the radiologic anatomy of the paranasal sinuses in patients with and without chronic rhinosinusitis to assess whether anatomic variations are associated with disease pathology, and to identify those variants that may impact operative safety. Tertiary referral otolaryngology unit. Incidence and nature of anatomic variants with potential impact on operative safety, and the presence or absence of sinus mucosal disease and its correlation with anatomic variants with a potential impact on mucociliary clearance. We reviewed 278 computed tomographic scans from patients with rhinosinusitis symptoms to investigate anatomic variations that may predispose to sinusitis or impact on operative safety. The incidence of variants with potential impact on sinus drainage was compared between patients with and without sinus mucosal disease with logistic regression. A closed osteomeatal complex was identified in 148 patients (53%), followed by concha bullosa in 98 patients (35%). Closed osteomeatal complex and nasal polyposis were independent risk factors for sinus mucosal disease. Anatomic variants with a potential impact on operative safety included anterior clinoid process pneumatization (18%), infraorbital ethmoid cell (12%), sphenomaxillary plate (11%), and supraorbital recess (6%). In 92% of patients, the level difference between the roof of the ethmoid cavity and the cribriform plate was Keros I. Bony anatomic variants do not increase the risk of sinus mucosal disease. However, anatomic variants with a potential impact on operative safety occur frequently and need to be specifically sought as part of preoperative evaluation.
{ "pile_set_name": "PubMed Abstracts" }
Background {#Sec1} ========== The amino acid sequences of peptides in a sample can be analyzed by liquid chromatography coupled with tandem mass spectrometry (LC--MS/MS, \[[@CR1]\]). First, the peptides are separated temporally by liquid chromatography. Then, the mass spectrometer measures the mass-to-charge ratio of a peptide and fragments multiple copies of it at random positions. Finally, the mass spectrometer measures the mass-to-charge ratio of the resulting fragments. Peptide sequencing \[[@CR2], [@CR3]\] is the problem of reconstructing the amino acid sequence of the peptide. When analyzing unknown peptides the otherwise very successful database search approach is not applicable. We focus on de novo sequencing, that is the reconstruction of the whole amino acid sequence from scratch without the help of a database of known sequences. Several algorithms for de novo sequencing \[[@CR4]--[@CR8]\] consider the differences of the peptide's fragment masses to reconstruct the peptide's sequence. Various scoring functions have been proposed that try to exploit as much information as possible from the mass spectrum of the fragments to find a sequence that explains the observed spectrum in the best possible way. However, the information obtained from the chromatographic separation in the first step of the LC--MS/MS experiment is not considered by these scoring functions. In liquid chromatography, the peptides in a sample have to pass through a column. The time a peptide needs to traverse the column is called *retention time* and depends on certain chemical properties of the peptide. This process results in the temporal separation of the peptides in a sample. Predicting the retention time of a peptide from its amino acid sequence is a challenging task \[[@CR9], [@CR10]\]. Several studies use retention time prediction models for peptide sequencing as a filtering step after a database search to increase the confidence of identification and to identify false positive identifications \[[@CR11], [@CR12]\]. However, to the best of our knowledge, the retention time information has not been considered by de novo peptide sequencing algorithms. The retention time can be useful, because it contains information about parts of a sequence that cannot be resolved by mass spectrometry (e.g. amino acids and fragments with equal masses, but different retention times). Moreover, it is available without additional experimental effort. However, simply filtering the candidate sequences of standard de novo sequencing algorithms by their predicted retention time is not an option, as this approach requires to compute all possible candidate sequences in the worst case to find an optimal solution. We formulate and study a de novo sequencing problem that integrates the retention time as an additional constraint and does not require filtering many candidates. We are interested in a sequence that both matches the experimental spectrum and the measured retention time. We consider three additive retention time prediction models and develop algorithms for each model. In this study,[1](#Fn1){ref-type="fn"} we do not aim for a replacement for available de novo sequencing tools, but rather explore ways of exploiting the retention time information in de novo sequencing algorithms. In the experimental evaluation, we are primarily interested in the impact of using the retention time information. We compare the identification rates of proposed algorithms for two prediction models with the identification rates of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$  \[[@CR14]\], an algorithm that uses the same symmetric difference scoring model, but no retention time information. The symmetric difference scoring model already shows improved identification rates compared to the prevalent shared peak count scoring model \[[@CR5]\] and this is further improved considering the retention time. We intentionally consider a very basic scoring function to clearly expose the impact of exploiting the retention time information. We evaluate the performance of our algorithms on experimental data of synthesized peptides from the SWATH MS gold standard (SGS, \[[@CR15]\]) dataset. For the third prediction model, we present some exemplary results and discuss factors that can limit its applicability. A proof-of-concept implementation of our algorithms is available at Github and can be integrated in the OpenMS framework \[[@CR16]\]. Considering the retention time information comes at the cost of higher computational effort and requires additional parameters for retention time prediction. These parameters depend on the chosen standard operating protocol (SOP) chosen for the experiment and on the LC column of the experiment. Estimating these parameters requires suitable datasets, unless they are available in the literature. Yet, we believe that it is useful to exploit retention time information for peptide identification and to further study the integration of retention time information in algorithms for de novo peptide sequencing. Problem definition {#Sec2} ================== Remarks on model simplifications {#Sec3} -------------------------------- To focus on algorithmic aspects of the problem, we simplify several characteristics of the experimental data in our modeling of the de novo peptide sequencing problem. First, the peptide molecule contains an H~2~O molecule in addition to the amino acid molecules. Therefore, the peptide mass has an offset of 18 Da compared to the sum of the amino acid masses. To simplify the description of the algorithms, we do not consider this offset and assume that the mass of a peptide is the sum of the masses of its amino acids. Similarly, we do not consider the fragment mass offsets of different ion types in the description. However, we do consider both offsets in the implementation of our algorithms using techniques described in \[[@CR14]\]. Moreover, the mass spectrometer measures mass-to-charge ratios, while our model requires masses as input. Charge state deconvolution \[[@CR1]\] is required as a preparatory step to convert mass-to-charge ratios to masses if fragments with a higher charge state should be considered. While we do not explicitly model post-translational modifications, our model can consider both fixed and variable modifications. Fixed modifications can be considered by altering the amino acid masses accordingly. Variable modifications are supported by adding new characters to the alphabet of amino acids. Finally, we consider integer values for the fragment masses and retention times in the description of the algorithm and ignore the mass accuracy of the mass spectrometer. We account for the mass accuracy of the instrument by multiplying the masses by an appropriate factor before rounding to integers. Additionally, in the implementation of our algorithm we consider masses to be equal if they differ at most by a predefined error tolerance (0.02 Da in our experiments). Notation {#Sec4} -------- We model an amino acid by a character of an alphabet $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Sigma$$\end{document}$ and a peptide by a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}=\mathtt {a_1\ldots a_n}$$\end{document}$ over $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Sigma$$\end{document}$. The empty string is denoted by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S_\emptyset }$$\end{document}$. Every character $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {a} \in \Sigma$$\end{document}$ has a mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(\mathtt {a})\in \mathbb {N}$$\end{document}$. The mass of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}=\mathtt {a_1\ldots a_n}$$\end{document}$ is the sum of its character's masses $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(\mathtt {S}) := \sum _{i=1}^n m(\mathtt {a_i})$$\end{document}$. The empty string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S_\emptyset }$$\end{document}$ has mass 0. A substring of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is denoted by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S_{i,j}}=\mathtt {a_i\ldots a_j}$$\end{document}$ for $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1 \le i\le j \le n$$\end{document}$. The prefix set Pre($\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$) contains all prefixes of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ including the empty string, i.e. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text { Pre }(\mathtt {S}) := \Cup _{i=1}^n \mathtt {S_{1,i}} \cup \{\mathtt {S_\emptyset }\}.$$\end{document}$ The *theoretical spectrum* of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is the union of all its prefix and suffix masses $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text { TS }(\mathtt {S}) :=$$\end{document}$ $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{m(\mathtt {T}), m(\mathtt {S})-m(\mathtt {T})\ |\ \mathtt {T} \in \text { Pre }(\mathtt {S}) \}$$\end{document}$. Note that for every prefix $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {T}\in \text { Pre }(\mathtt {S})$$\end{document}$ the string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ has a complementary suffix of mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(\mathtt {S}) - m(\mathtt {T})$$\end{document}$. A mass *m* is *explained* by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ if $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m\in \text { TS }(\mathtt {S})$$\end{document}$. Retention time prediction models {#Sec5} -------------------------------- We define three simple models for predicting the retention time of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}=\mathtt {a_1\ldots a_n}$$\end{document}$ (Fig. [1](#Fig1){ref-type="fig"}). The first model is a simple additive model with one retention time coefficient for each character in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Sigma$$\end{document}$. The model only considers the character frequencies of a string and has been proposed by \[[@CR17]\]. It served as starting point for the development of more evolved prediction models \[[@CR18], [@CR19]\].Fig. 1Retention time prediction for string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}=\mathtt {AIAGAK}$$\end{document}$. **a** In the linear model, the retention time of a string is the sum of its character's coefficients. **b** In the position-dependent model (with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma = 2$$\end{document}$), the position of the first and the last two characters is considered additionally. **c** The neighborhood-based model considers all pairs of consecutive characters in a string. The first and the last character have additional coefficients, as they only have one adjacent character The other two models consider additional factors that affect the retention time of a peptide. Besides the character frequency, the position of the characters in the string is especially important for the first and the last few positions in the string \[[@CR18], [@CR19]\]. Therefore, the second model considers distinct coefficients for the characters at the beginning and the end of the string. The nearest neighborhood of a character can also affect its retention time coefficient \[[@CR19], [@CR20]\]. The third model considers the influence of a character's direct neighborhood by considering coefficients for pairs of consecutive characters instead of coefficients for individual characters.Linear model:Every character $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {a}\in \Sigma$$\end{document}$ has a retention time coefficient $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t(\mathtt {a})\in \mathbb {Z}$$\end{document}$. The retention time of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is the sum of the retention time coefficients of its characters, $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t_{\text {lin}}(\mathtt {S}) := \sum _{i=1}^{n} t(\mathtt {a_i}). \end{aligned}$$\end{document}$$Position-dependent model:Characters at the first $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ and the last $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ positions of a string, where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$1\le \gamma \le \lfloor \frac{n}{2}\rfloor$$\end{document}$, have distinct retention time coefficients. For $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$i\le \gamma$$\end{document}$, we denote the retention time coefficient of the *i*-th character by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{\text {pre}}(\mathtt {a_i},i)\in \mathbb {Z}$$\end{document}$ and the coefficient of the $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(n-i+1)$$\end{document}$-th character by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{\text {suf}}(\mathtt {a_{n-i+1}},i)\in \mathbb {Z}$$\end{document}$. The retention time of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is the sum of the corresponding retention time coefficients, $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t_{\text {pos}}(\mathtt {S}) := \sum _{i=1}^{\gamma } t_{\text {pre}}(\mathtt {a_i},i) + \sum _{j=\gamma +1}^{n-\gamma } t(\mathtt {a_j}) + \sum _{k=1}^{\gamma } t_{\text {suf}}(\mathtt {a_{n-k+1}},k). \end{aligned}$$\end{document}$$Neighborhood-based model:The model uses retention time coefficients $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t(\mathtt {a,b})\in \mathbb {Z}$$\end{document}$ for pairs of characters $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {a,b}\in \Sigma$$\end{document}$ that are consecutive in a given string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. The first and the last character $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {a_1}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {a_n}$$\end{document}$ of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ have additional coefficients $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t(\mathtt {-},\mathtt {a_1}), t(\mathtt {a_n},\mathtt {-}) \in \mathbb {Z}$$\end{document}$, as these characters have only one adjacent character in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. The retention time of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is the sum of all these coefficients, $$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t_{\text {nei}}(\mathtt {S}) := t(\mathtt {-},\mathtt {a_1}) + \left( \sum _{i=1}^{n-1} t(\mathtt {a_i,a_{i+1}}) \right) + t(\mathtt {a_n},\mathtt {-}). \end{aligned}$$\end{document}$$The retention time coefficients for all three models can either be estimated from experimental data or taken from the literature. It is worth noting that the retention time coefficients might also be negative. Therefore, the retention time of a peptide does not depend linearly on the length of the peptide. We use a simple method for estimating the coefficients in the experimental evaluation and discuss limiting aspects of this method below. Problem definition {#Sec6} ------------------ We recall the de novo peptide sequencing problem with respect to the symmetric difference scoring model \[[@CR14]\]: Given a mass *M* and a set of fragment masses *X* (measured by the mass spectrometer), find a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ of mass *M* that minimizes $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { TS }(\mathtt {S})\ \Delta\ X| = |\text { TS }(\mathtt {S}) \setminus X| + |X \setminus \text { TS }(\mathtt {S})|$$\end{document}$. Equivalently to computing a string with mass *M* that minimizes $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { TS }(\mathtt {S})\ \Delta\ X|$$\end{document}$, we can compute a string that maximizes $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { TS }(\mathtt {S}) \cap X| - |\text { TS }(\mathtt {S}) \setminus X|$$\end{document}$, as *X* is a fixed input and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ can be chosen. Throughout this paper, we assume that $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$0,M\in X$$\end{document}$. In this paper, we consider a variant of this problem that also considers the measured retention time *T* and a retention time prediction function $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_*: \Sigma ^* \rightarrow \mathbb {Z}$$\end{document}$. A function $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_*()$$\end{document}$ can return negative values, as a substring can have a negative effect on the retention time of a string. ### **Problem 1** {#FPar1} (*De Novo Sequencing Problem*) Let $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Sigma$$\end{document}$ be an alphabet of characters, with a mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(\mathtt {a})\in \mathbb {N}$$\end{document}$ for each $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {a}\in \Sigma$$\end{document}$. Given a peptide mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M\in \mathbb {N}$$\end{document}$, a retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T\in \mathbb {N}$$\end{document}$, a tolerance parameter $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon \ge 0$$\end{document}$ and a set $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$X=\{x_i \in \mathbb {N}\ |\ i=1,\dots ,k\}$$\end{document}$, find a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ of characters in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Sigma$$\end{document}$ with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(\mathtt {S}) = M$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|t(\mathtt {S})-T|\le \varepsilon$$\end{document}$ that minimizes $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { TS }(\mathtt {S})\ \Delta\ X|$$\end{document}$ among all strings with mass *M* and a retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_*(\mathtt {S}) \in [T-\varepsilon ,T+\varepsilon ]$$\end{document}$. Methods {#Sec7} ======= Algorithm for the symmetric difference scoring model {#Sec8} ---------------------------------------------------- We briefly describe the algorithm DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$  \[[@CR14]\] for computing a string of mass *M* that minimizes $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { TS }(\mathtt {S})\ \Delta\ X|$$\end{document}$ without considering retention times. We refer to \[[@CR14]\] for a detailed description and a proof of correctness. Then, we describe algorithms for solving the de novo sequencing problem for each considered prediction model. The search space of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ is modeled by a directed acyclic multigraph $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$G=(V,E)$$\end{document}$ based on the given set *X*. A vertex in *G* represents a mass and a path in *G* represents a string. For every mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m\in X$$\end{document}$ there are two vertices *m* and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M-m$$\end{document}$ in *G*, i.e. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$V=\{m,M-m \ |\ m\in X\}$$\end{document}$. An edge in *G* is always directed from the smaller to the larger mass. Two vertices *v* and *w* are connected by an edge if there exists a string with mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w-v$$\end{document}$. For each such string with mass $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$w-v$$\end{document}$, we add an edge from *v* to *w* to the multigraph and label it with this string. That is, if *v* and *w* are connected by an edge with label $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$, there is also an edge from *v* to *w* for every permutation of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$. In practice, we only consider edges with a maximal label length *p*. We denote the concatenation of the edge labels along a path *P* by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$. Let $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,v_1,\ldots ,v_k,M)$$\end{document}$ be a path from vertex 0 to vertex *M*. Every traversed vertex $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v_i$$\end{document}$ represents the mass of a prefix of the string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$ explains both $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v_i$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M-v_i$$\end{document}$ for every traversed vertex $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v_i$$\end{document}$. The idea of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ for finding a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ of mass *M* that minimizes $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { TS }(\mathtt {S})\ \Delta\ X|$$\end{document}$ is to iteratively extend two paths both starting at vertex 0. One path represents a prefix and the other path a reversed suffix of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ extends both paths until the sum of their labels' masses is equal to *M* and then concatenates the prefix and the reversed suffix to a string of mass *M*. ### **Definition 1** {#FPar2} (*Balanced extension*) Given two paths *P* and *Q* both starting at vertex 0, a *balanced extension* extends the path that represents the string of smaller mass by a single edge, unless the resulting paths represent strings with a total mass larger than *M*. An arbitrary path is extended if both paths represent strings with equal masses. ### **Definition 2** {#FPar3} (*Path pair*) A *path pair* is a pair of paths $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,\ldots ,v)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q=(0,\ldots ,a,b)$$\end{document}$ in *G* that results from a sequence of balanced extensions starting from two paths $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P_0 = (0)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q_0 = (0)$$\end{document}$. Fig. 2Multigraph *G* with two paths $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,p_1,v)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q=(0,q_1,a,b)$$\end{document}$. *P* and *Q* form a path pair, as there exists a sequence of balanced extensions leading to *P* and *Q*. A balanced extension of (*P*, *Q*) by (*v*, *w*) results in a path pair $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(P',Q)$$\end{document}$, with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P'=(0,p_1,v,w)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(l(P')) + m(l(Q)) = M$$\end{document}$. The path labels represent a prefix and a reversed suffix and can be combined to a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {AGADGIK}$$\end{document}$ Figure [2](#Fig2){ref-type="fig"} depicts an example of a path pair and a balanced extension. The set of masses that are explained by a path pair (*P*, *Q*) is the *partial theoretical spectrum*$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} \text { PTS }(P,Q,M) := \,&\left\{ \ m(\mathtt {T}), M-m(\mathtt {T})\ |\ \mathtt {T}\in \left( \,\text { Pre }(\mathtt { l(P) }) \cup \text { Pre }(\mathtt { l(Q) })\,\right) \ \right\} . \end{aligned}$$\end{document}$$The *score* of the path pair (*P*, *Q*) is the number of masses explained by the path pair that are in *X* minus the number of explained masses that are not in *X*, i.e. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\text { PTS }(P,Q,M) \cap X| - |\text { PTS }(P,Q,M) \setminus X|$$\end{document}$. The set of masses explained by an edge (*v*, *w*) is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} \text { TSe}((v,w),M) := \{\ m(\mathtt {T}) + v,\ M- (m(\mathtt {T}) + v)\ |\ \mathtt {T}\in \text { Pre }(\mathtt { l(v,w) }),\quad \ m(\mathtt {T}) \ne 0\ \}. \end{aligned}$$\end{document}$$ ### **Lemma 1** {#FPar4} *For every path pair* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,\ldots ,v)$$\end{document}$ *and* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q=(0,\ldots ,a,b)$$\end{document}$ *with* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v \le b$$\end{document}$ *and* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v + b \le M$$\end{document}$ *it holds that* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$a \le v \le b.$$\end{document}$ *The balanced extension of (P, Q) by an edge (v, w) additionally explains all masses in* $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N((v,w),(a,b)) = \text { TSe}((v,w),M) \setminus \text { TSe }((a,b),M).$$\end{document}$ ### *Proof* {#FPar5} Assume that there exists a path pair (*P*, *Q*) with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v \le a$$\end{document}$. This path pair results by definition from a sequence of balanced extensions. Consider the balanced extension in this sequence, where the last edge (*a*, *b*) of *Q* is added. In this step, either *P* ended in *v* or in some vertex $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$v'< v$$\end{document}$. In both cases, *a* is the larger mass and *Q* represents the heavier string. Hence, the extension by (*a*, *b*) is not a balanced extension and (*P*, *Q*) is not a path pair. Consider a balanced extension of (*P*, *Q*) by an edge (*v*, *w*). The edge (*v*, *w*) explains all masses in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text { TSe}((v,w),M)$$\end{document}$. However, some of these masses might also be explained by (*P*, *Q*). We show that $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text { TSe}((v,w),M) \setminus \text { PTS }(P,Q,M) = N((v,w),(a,b))$$\end{document}$, i.e. that all masses explained by (*v*, *w*) that are also explained by (*P*, *Q*), are explained by the last edge (*a*, *b*) of *Q*. We note that all masses in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text { TSe}((v,w),M)$$\end{document}$ are larger than *v* and smaller than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M-v$$\end{document}$. Moreover, all masses in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\text { PTS }(P,Q,M)$$\end{document}$ that are larger than *v* and smaller than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M-v$$\end{document}$ are explained by the edge (*a*, *b*). Therefore, it follows that the balanced extension with (*v*, *w*) additionally explains all masses in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$N\left( (v,w),(a,b)\right)$$\end{document}$.$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\square$$\end{document}$ Using Lemma [1](#FPar4){ref-type="sec"}, the algorithm DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$  \[[@CR14]\] (Algorithm 1) computes a dynamic programming table *DP*. An entry *DP*\[*v*, (*a*, *b*)\] contains the optimal score of a path pair ending at the vertex *v*, respectively at the edge (*a*, *b*). As a base case, we add a loop edge (0, 0) to the graph and initialize $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[0,(0,0)] = 2$$\end{document}$, because the path pair representing two empty strings explains the masses $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$0,M\in X$$\end{document}$. Given the optimal score *DP*\[*v*, (*a*, *b*)\], the algorithm considers all possible balanced extensions of the corresponding path pair with outgoing edges of *v*. By Lemma [1](#FPar4){ref-type="sec"}, the additionally explained masses of such a balanced extension can be computed only given the last vertex *v* and the last edge (*a*, *b*) of the two paths. The score of the resulting new path pair can be computed by adding$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} \text { gain }((v,w),(a,b)) := |N((v,w),(a,b)) \cap X| - |N((v,w),(a,b)) \setminus X| \end{aligned}$$\end{document}$$to the score *DP*\[*v*, (*a*, *b*)\]. The table entry of the new path pair is updated if the new score exceeds the value stored in this entry at this step of the algorithm. The optimal score for a string of mass *M* is equal to the maximum value of an entry $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[M-b,(a,b)]$$\end{document}$ among all edges (*a*, *b*) in *G*. A path pair with this score can be reconstructed starting from this entry. The combination of the corresponding prefix and reversed suffix then leads to the desired string of mass *M*. The time complexity of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ is in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}\left( |V|\cdot |E| \cdot d \cdot p\right)$$\end{document}$, where *d* is the maximal out-degree of a vertex in *G* and *p* is the maximal length of an edge label \[[@CR14]\]. Algorithm for the linear prediction model {#Sec9} ----------------------------------------- In the following subsections, we develop an algorithm for the de novo sequencing problem (Problem [1](#FPar1){ref-type="sec"}). We have to consider three aspects when taking into account the retention time information. First, we need to define the predicted retention time of a path pair in *G*. Second, we have to compute the effect of a balanced extension on the predicted retention time of a path pair. Third, we need to find optimal substructures of paths from 0 to *M* in *G* with an optimal score and a feasible predicted retention time. ![](13015_2018_132_Figa_HTML){#MO9} In this subsection, we consider the linear retention time prediction model. We note that the retention time of a path pair $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,\ldots ,v)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q=(0,\ldots ,a,b)$$\end{document}$ with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$a\le v \le b$$\end{document}$ is the sum of the retention times of both substrings $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t=t_{\text {lin}}(\mathtt { l(P) }) + t_{\text {lin}}(\mathtt { l(Q) })$$\end{document}$. Moreover, the retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t'$$\end{document}$ of a path pair obtained from (*P*, *Q*) by applying a balanced extension by some edge (*v*, *w*) can be computed as $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t' = t + t_{\text {lin}}(\mathtt { l(v,w) })$$\end{document}$. That is, we only need *t* and the edge label $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$ for computing $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t'$$\end{document}$. However, it is not sufficient to only store the optimal score *DP*\[*v*, (*a*, *b*)\] of any path pair ending in *v*, respectively (*a*, *b*), and its retention time to compute a solution for our problem. There can be multiple path pairs ending in the same vertex and the same edge with different retention times. If we consider an optimal solution and its sequence of path pairs computed by the algorithm, a path pair $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,\ldots ,v)$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q=(0,\ldots ,a,b)$$\end{document}$ in this sequence does not necessarily have an optimal score among all path pairs ending in *v* and (*a*, *b*). Nevertheless, its score is optimal among all path pairs with the same retention time that end in *v* and (*a*, *b*). Therefore, we need to store for each possible retention time *t* the optimal score of a path pair ending in vertex *v* and edge (*a*, *b*). DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin (Algorithm 2) stores for each entry *DP*\[*v*, (*a*, *b*)\] an array containing a score for every possible retention time *t*. *DP*\[*v*, (*a*, *b*)\]\[*t*\] is the optimal score for a path pair ending in *v*, respectively (*a*, *b*), with retention time *t*. For a given vertex *v* and an edge (*a*, *b*), the algorithm performs balanced extensions by all outgoing edges (*v*, *w*) of *v*. For every balanced extension and every feasible retention time *t*, the algorithm then computes the new retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t'$$\end{document}$ and the new score of the resulting path pair and updates the corresponding entry in the table. We can see by an inductive argument that the optimal scores in the table are computed correctly. As the base case, we note that $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[0,(0,0)][0] = 2$$\end{document}$ is correct, as an empty path pair explains the masses $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\{0,M\}\subseteq X$$\end{document}$ and has retention time 0. As soon as the entry *DP*\[*v*, (*a*, *b*)\] is reached in line 7, all optimal scores for path pairs ending in vertex *v* and edge (*a*, *b*) have been computed. This holds by induction, as every possible balanced extension leading to a path pair ending in *v* and (*a*, *b*) has already been considered (given the optimal score of a preceding path pair). Moreover, the array in *DP*\[*v*, (*a*, *b*)\] is not further modified as soon as the algorithm reaches the vertex *v* and the edge (*a*, *b*) in line 7. Therefore, the invariant holds that, if the algorithm considers a vertex *v* and an edge (*a*, *b*) in line 7, the corresponding entry *DP*\[*v*, (*a*, *b*)\] contains the optimal score for each feasible retention time. After computing all entries *DP*\[*v*, (*a*, *b*)\], the optimal score of a string with retention time *t* is $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\max _{(a,b) \in E} DP[M-b,(a,b)][t]$$\end{document}$. We are interested in optimal strings with a predicted retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t\pm \varepsilon$$\end{document}$. Therefore, we iterate over all entries $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[M-b,(a,b)][t]$$\end{document}$ for $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(a,b) \in E$$\end{document}$ and all feasible retention times $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t\in [T-\varepsilon ,T+\varepsilon ]$$\end{document}$ to find the optimal score of a string with a feasible predicted retention time. We can reconstruct a corresponding string starting from the corresponding entry in *DP*. The running time of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ is in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}\left( |V|\cdot |E| \cdot d \cdot p\right)$$\end{document}$ \[[@CR14]\], where *d* is the maximal out-degree of a vertex in *G* and *p* is the maximal length of an edge label. The additional overhead of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin (loop starting at line 8 in Algorithm 2) is to iterate over all feasible retention times *t* for each entry *DP*\[*v*, (*a*, *b*)\] and compute the new retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t'$$\end{document}$. The number of scores to be stored varies depending on the entry and the retention time coefficients. For a path pair ending in *v*, respectively (*a*, *b*), we have to consider all retention times in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$[rt_{\min } \cdot (v+b),rt_{\max } \cdot (v+b)]$$\end{document}$, where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$rt_{\min }$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$rt_{\max }$$\end{document}$ are the minimum and the maximum retention time per mass unit. For example, we only store one optimal score in entry *DP*\[0, (0, 0)\], but up to $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\lceil rt_{\max }\cdot M - rt_{\min }\cdot M \rceil$$\end{document}$ scores in entries $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[M-b,(a,b)]$$\end{document}$ for $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(a,b)\in E$$\end{document}$. The time complexity of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin is in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}\left( |V|\cdot |E| \cdot |RT_M| \cdot d \cdot p\right)$$\end{document}$, where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|RT_M|$$\end{document}$ denotes the number of possible retention times for a string of mass *M*. In practice, most entries *DP*\[*v*, (*a*, *b*)\] contain only few scores, as we only store the score for a retention time *t* if there is a path pair ending in *v* and (*a*, *b*) with predicted retention time *t*. Therefore, it is advisable to use a memory-efficient data structure instead of an array to reduce the memory consumption of the algorithm. This approach is flexible and can be extended to compute suboptimal solutions, e.g. the *k* best-scoring strings, using similar techniques as described in \[[@CR14]\]. The implementation of this algorithm supports computing both the best and the *k* best strings for a given input. Algorithm for the position-dependent prediction model {#Sec10} ----------------------------------------------------- In the position-dependent prediction model, the retention time of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is not equal to the retention time of all permutations of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. This is due to the fact that the retention time coefficient of a character in the first and the last $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ positions of the string may be different from the coefficient of the same character at another position. Therefore, we have to distinguish the prefix and the suffix path of a path pair (*P*, *Q*), with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$P=(0,\ldots ,v)$$\end{document}$, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$Q=(0,\ldots ,a,b)$$\end{document}$, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$a\le v \le b$$\end{document}$, in order to compute its predicted retention time. This was not necessary for DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin, as both the score and the predicted retention time (in the linear prediction model) do not depend on which of the two paths represents the prefix. Let us assume that *P* is the prefix path and *Q* is the suffix path of a path pair (*P*, *Q*). We compute the retention time of (*P*, *Q*) by summing the retention times $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_P$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_Q$$\end{document}$ of the path labels,$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t_P := \sum _{\mathtt {a_i} \in \ l(P)}{\left\{ \begin{array}{ll} t_{\text {pre}}(\mathtt {a_i},i)\ \quad &{}i\le \gamma \\ t(\mathtt {a_i})\ \quad &{}i>\gamma \end{array}\right. } \;\qquad&t_Q := \sum _{\mathtt {a_j} \in \ l(Q)}{\left\{ \begin{array}{ll} t_{\text {suf}}(\mathtt {a_j},j)\ \quad &{}j\le \gamma \\ t(\mathtt {a_j})\ \quad &{}j>\gamma . \end{array}\right. } \end{aligned}$$\end{document}$$If we want to update the retention time after a balanced extension of (*P*, *Q*) by an edge (*v*, *w*), we have to compute the retention time of the edge label $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$. This retention time depends on whether the edge label contains some of the first or the last $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters of a solution string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ of mass *M*. However, there can be multiple such solution strings resulting from different further balanced extensions of this path pair. ![](13015_2018_132_Figb_HTML){#MO11} We can decide whether $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$ contains some of the first $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters given the length *k* of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$ without knowing the solution string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. If $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k\ge \gamma$$\end{document}$, the edge label clearly does not contain any of the first $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters of any solution resulting from extending (*P*, *Q*). Likewise, we know that $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$ contains none of the $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ last characters if $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$ has more than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters. However, if $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$ has less than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters, we cannot decide whether $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$ contains some of the last $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters without knowing the length of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. Let us assume for now that $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w)$$\end{document}$ does not contain some of the last $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters of the solution. The retention time of the new path pair resulting from the balanced extension of (*P*, *Q*) by the edge (*v*, *w*) is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t' = t + \sum _{\mathtt {a_i} \in l(v,w)}{\left\{ \begin{array}{ll} t_{\text {pre}}(\mathtt {a_i},i)\quad &{}i+k\le \gamma \\ t(\mathtt {a_i})\quad &{}i+k>\gamma . \end{array}\right. } \end{aligned}$$\end{document}$$If *P* would be the suffix path, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{\text {pre}}(\mathtt {a_i},i)$$\end{document}$ would be replaced by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{\text {suf}}(\mathtt {a_i},i)$$\end{document}$ in the above equation. It is important that the above assumption holds for every balanced extension leading to a solution string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. Otherwise, the retention time of the new path pair is not computed correctly. We cannot check if our assumption holds while computing the new retention time after a balanced extension. However, given a solution string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ and a path pair that represents a prefix and a suffix of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$, we can check if either the balanced extension leading to this path pair or a preceding balanced extension does not satisfy the assumption. If so, either the prefix or the suffix path label has at least $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n-\gamma$$\end{document}$ characters, where *n* is the length of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. This also holds for all subsequent path pairs, as we only add characters to path labels in a balanced extension. Therefore, when reconstructing a solution from the dynamic programming table, we have to additionally check, if one of the path labels has $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n-\gamma$$\end{document}$ or more characters, before we combine them to a solution string. If so, the assumption was not fulfilled at some step and we discard this solution, as its retention time was not computed correctly. Note that we cannot consider these strings, unless they can be constructed by another sequence of balanced extensions. However, it is very unlikely that the assumption is not fulfilled in practice, as we consider small values of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$. We never observed such a situation in our evaluation using $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma =2$$\end{document}$. Given the sequence of path pairs of an optimal solution, a path pair in this sequence has an optimal score among all path pairs with the same retention time. However, we have to store some additional information to compute a solution with respect to the position-dependent prediction model. First, we have to store whether *P* is a prefix or a suffix path. Second, we have to store the length of both path labels, unless they are larger than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$. DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos (Algorithm 3) stores the optimal scores of path pairs ending in *v* and (*a*, *b*) in an array with an entry for every retention time *t*, the lengths $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\alpha$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\beta$$\end{document}$ of the path labels and a Boolean variable *pre* indicating if the path ending in *v* is the prefix or the suffix path. We store the length of the path labels only up to length $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$, as the exact length is only important as long as the path labels have less than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters. If the algorithm reaches an entry *DP*\[*v*, (*a*, *b*)\] in line 7, all optimal scores for path pairs ending in vertex *v* and edge (*a*, *b*) have been computed correctly, as all balanced extensions leading to such path pairs have already been considered. Given the optimal score of a path pair, the algorithm performs every possible balanced extension with an outgoing edge of *v*, computes the new score and retention time, and updates the corresponding entries. We reconstruct a solution starting from a path pair ending in some vertex $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$M-b$$\end{document}$ and some edge (*a*, *b*). The algorithm additionally verifies that both the prefix and the suffix path label have more than $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\gamma$$\end{document}$ characters. DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos considers at most $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\cdot \gamma ^2 \cdot |RT_M|$$\end{document}$ optimal scores for each table entry *DP*\[*v*, (*a*, *b*)\], where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|RT_M|$$\end{document}$ is the number of possible retention times for a string of mass *M*. Therefore, the running time is in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}\left( |V|\cdot |E| \cdot |RT_M| \cdot \gamma ^2 \cdot d\cdot p\right)$$\end{document}$, where *d* is the maximal out-degree of a vertex in *G* and *p* is the maximal length of an edge label. Algorithm for the neighborhood-based prediction model {#Sec11} ----------------------------------------------------- Fig. 3The retention time *t* of a path pair (*P*, *Q*) is the sum of the retention time coefficients up to the last characters $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {p_2}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {q_3}$$\end{document}$. The path pair $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(P',Q)$$\end{document}$ resulting from a balanced extension of (*P*, *Q*) by an edge with label $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {l_1l_2}$$\end{document}$ has retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t+t(\mathtt {p_2},\mathtt {l_1}) + t(\mathtt {l_1},\mathtt {l_2})$$\end{document}$. A path pair $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(P',Q)$$\end{document}$ with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$m(l(P')) + m(l(Q)) = M$$\end{document}$ can be combined to a solution string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ by concatenating $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P')$$\end{document}$ and the reversed string of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$. The retention time of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{\text {nei}}(\mathtt { P',Q }) + t(\mathtt {l_2},\mathtt {q_3})$$\end{document}$ The neighborhood-based model predicts the retention time of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ by considering all pairs of consecutive characters. We define the predicted retention time of a path pair (*P*, *Q*) as follows. The retention time of the path label $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$ is the sum of the retention time coefficients of the pairs of consecutive characters and the additional coefficient of the first character. Note that we consider only one coefficient for the last character in the prefix, as the other coefficient depends on the next balanced extension or the last character of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$. The retention time of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$ is defined analogously considering that the $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$ is a reversed suffix of the solution string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. We compute the retention time of (*P*, *Q*) by summing the retention times of both path labels (Fig. [3](#Fig3){ref-type="fig"}). That is, the retention time of (*P*, *Q*) is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t_{\text {nei}}(\mathtt { P,Q }) &:= t(\mathtt {-},\mathtt {p_1}) + \left( \sum _{i=1}^{n-1} t(\mathtt {p_i,p_{i+1}}) \right) \\ & \quad+ \left( \sum _{i=m}^{2} t(\mathtt {q_i,q_{i-1}}) \right) + t(\mathtt {q_1},\mathtt {-}), \end{aligned}$$\end{document}$$where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P) = \mathtt {p_1,\ldots ,p_n}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q) = \mathtt {q_1,\ldots ,q_m}$$\end{document}$ are the path labels of (*P*, *Q*). ![](13015_2018_132_Figc_HTML){#MO15} We can update the retention time after a balanced extensions of (*P*, *Q*) as follows. Consider a balanced extension of the prefix path *P* by an edge (*v*, *w*) with $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(v,w) = \mathtt {l_1\ldots l_k}$$\end{document}$. Let $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {p_n}$$\end{document}$ be the last character of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$. The retention time $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t'$$\end{document}$ of the new path pair resulting from the balanced extension is$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\begin{aligned} t' = t_{\text {nei}}(\mathtt { P,Q }) + t(\mathtt {p_n},\mathtt {l_1}) + \sum _{i=1}^{k-1} t(\mathtt {l_i},\mathtt {l_{i+1}}). \end{aligned}$$\end{document}$$The retention time after a balanced extension of the suffix path *Q* is defined analogously (again considering the $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$ is a reversed suffix). Note that the retention time of a solution $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is not the sum of the retention times of a prefix of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ and its complementary suffix. We have to additionally consider the coefficient of the last character of the prefix and the first character of the suffix, which are consecutive in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. If we combine the path labels of a path pair $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$(P',Q)$$\end{document}$ to a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ (Fig. [3](#Fig3){ref-type="fig"}), the retention time of $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t_{\text {nei}}(\mathtt { P',Q }) + t(\mathtt {p_n},\mathtt {q_m})$$\end{document}$, where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {p_n}$$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {q_m}$$\end{document}$ are the last characters of the prefix $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(P)$$\end{document}$ and the reversed suffix $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$l(Q)$$\end{document}$. DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Nei (Algorithm 4) stores for every path pair (*P*, *Q*) ending in vertex *v* and edge (*a*, *b*) the optimal score for each retention time *t*, last character $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {p}$$\end{document}$ of the path ending in *v*, and a Boolean variable *pre* indicating if *P* is the prefix path. As a base case, the algorithm stores the optimal score for a path pair ending in vertex 0 and the loop edge (0, 0) as $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[0,(0,0)][0,\mathtt {-},0]=2$$\end{document}$. The algorithm considers the vertices and edges of *G* in ascending order. After considering all possible path pairs, the optimal score can be computed by considering all entries $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$DP[M-b,(a,b)]$$\end{document}$ and the feasible solutions for path pairs ending in these vertices and edges. ![](13015_2018_132_Figd_HTML){#MO17} The algorithm considers at most $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2\cdot |\Sigma | \cdot |RT_M|$$\end{document}$ optimal scores for each pair of a vertex *v* and an edge (*a*, *b*), where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|RT_M|$$\end{document}$ is the number of possible retention times for a string of mass *M* and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\Sigma |$$\end{document}$ is the size of the considered alphabet. The running time of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Nei is in $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathcal {O}\left( |V|\cdot |E| \cdot |RT_M| \cdot |\Sigma | \cdot d\cdot p\right)$$\end{document}$, where *d* is the maximal out-degree of a vertex, *p* is the maximal length of an edge label, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|RT_M|$$\end{document}$ is the number of feasible retention times for a string of mass *M*. Experimental evaluation {#Sec12} ======================= In this section, we study the performance of our algorithms for de novo peptide sequencing with retention time prediction. In our evaluation, we want to clearly expose the effect of considering the retention time information rather than studying the identification rates compared to state-of-the-art de novo sequencing software, such as UniNovo \[[@CR6]\] or Novor \[[@CR8]\]. We compare the identification rates of the proposed algorithms with the identification rates of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$  \[[@CR14]\], as this algorithm uses the same symmetric difference scoring model, while other available tools use different scoring models. Note that we use a very simple scoring function that only considers if a mass has been measured by the instrument, but no other information, such as the intensity of the signal. While this is sufficient for studying the effect of considering the retention time information, such a scoring function is typically not suitable for real applications. However, our algorithms can support more sophisticated scoring models that also take into account the signal intensities measured by the mass spectrometer. We refer to \[[@CR14]\] for one example of such a scoring function that is supported by the current implementation of our algorithms. We first describe the considered dataset and a method for estimating the parameters of the three models. Then, we compare the identification rates of the proposed algorithms to the identification rate of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$  \[[@CR14]\]. Dataset {#Sec13} ------- We use the SWATH-MS Gold Standard (SGS) dataset (<http://www.peptideatlas.org>, identifier PASS00289, \[[@CR15]\]) with measurements of 422 synthesized peptides. Specifically, we consider the 944 spectra of synthesized peptides from DDA-experiments that have also been considered in \[[@CR14]\]. The raw profile spectra were centroided (peak-picked) using the tool qtofpeak-picker \[[@CR21]\]. The spectra have been analyzed using the database search tool Comet \[[@CR22]\] using the very restricted database containing only the 422 synthesized peptides. In our evaluation, we only considered spectra from doubly-charged peptides (as reported by Comet) and assumed that all measured fragment masses are singly charged. Peptideprophet \[[@CR23]\] has been used to validated the results. We used the sequences identified by Comet as gold standard and considered a peptide to be identified by one of the considered algorithm, if the exact sequence has been computed as the best-scoring solution, respectively one of the 5, 10, or 100 best-scoring solutions. Retention time coefficient estimation {#Sec14} ------------------------------------- In this work, we are mainly interested in the algorithmic problem of using retention time information for de novo sequencing and do not focus on efficient procedures for estimating the coefficients of retention time prediction models. We use linear regression for estimating the coefficients for our three retention time models. We randomly split the 944 spectra into a training set with 80% of the spectra (755 spectra) and a test set with the remaining 20% of the spectra (189 spectra). We use the training set to estimate the retention time coefficients and the test set to select a tolerance parameter $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon$$\end{document}$. In a linear regression approach, we choose the coefficients such that the sum of the squared loss $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\sum _{\mathtt {S},T}(T - t(\mathtt {S}))^2$$\end{document}$ is minimized, where *T* is the measured retention time, and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t(\mathtt {S})$$\end{document}$ the predicted retention time of the sequence $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$. For example, we estimate the coefficients of the linear model by first computing the character frequency vector for each string in the dataset. The character frequency vector of a string is a vector of length $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$|\Sigma |$$\end{document}$ that indicates how often a character occurs in the string. For example, the occurrence vector of the string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {AGA}$$\end{document}$ has value 2 at entry $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {A}$$\end{document}$, value 1 at entry $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {G}$$\end{document}$ and value 0 at all other entries. Then, the retention time of a string $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathtt {S}$$\end{document}$ is the scalar product of its character frequency vector $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$frq(\mathtt {S})$$\end{document}$ and the vector of the retention time coefficients *ct*. Standard software tools for statistical methods \[[@CR24]\] can be used to compute *ct*, such that $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\sum _i (T_i- \langle ct, frq(\mathtt {S}) \rangle )^2$$\end{document}$ is minimized. We chose the tolerance parameter $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon$$\end{document}$ independently for each prediction model by considering the difference between the measured and the predicted retention time of the sequences in the test set. Figure [4](#Fig4){ref-type="fig"} shows the differences between the predicted and the measured retention times for all three models on the test dataset. We set $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon$$\end{document}$ to half the difference between the maximum error $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$e_{\max }$$\end{document}$ and the minimum error $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$e_{\min }$$\end{document}$, i.e. $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon =(e_{\max }-e_{\min })/2$$\end{document}$. Concretely, we set $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon =1000$$\end{document}$ seconds for the linear prediction model and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon =750$$\end{document}$ seconds for the position-dependent model.Fig. 4Retention time prediction models---difference between predicted and measured retention time of all sequences in the test set with respect to the three prediction model The neighborhood-based prediction model has a very large predictive error for several sequences due to the small training dataset. Several coefficients are estimated based on few observations and others cannot be estimated at all. Therefore, we cannot extensively evaluate the identification rates of our algorithm with the neighborhood-based prediction model, as a much larger training dataset for estimating all parameters would be necessary. For our limited evaluation, we ignore the 5 largest and the 5 smallest retention time errors when picking the tolerance parameter and use $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon =500$$\end{document}$ seconds. Comparison of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos {#Sec15} ----------------------------------------------------------------------------------------------------- We analyzed the 944 considered spectra with DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos. Both algorithms compute all solutions with a score of at least 90% of the optimal score and a predicted retention time within the tolerance range. Figure [5](#Fig5){ref-type="fig"} shows the number of annotated sequences reported as best-scoring sequence by the three considered algorithms. While the majority of the spectra are either identified by all algorithms or not at all, 59 spectra are only identified when considering the retention time information.Fig. 5Number of spectra that are identified by DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin, and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos Figure [6](#Fig6){ref-type="fig"} shows a comparison of the identification rates with respect to the 5, 10, and 100 best-scoring sequences of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$  \[[@CR14]\], DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin, and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos. Without considering the retention time, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ reported the annotated sequence as best-scoring sequence for 586 spectra (62.1%). Considering the linear retention time prediction model, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin computed the annotated sequence with an optimal score for 610 spectra (64.6%). DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos considers the position-dependent prediction model and achieved the highest identification rate. The annotated sequence was reported as best-scoring sequence for 629 spectra (66.6%). The performance improvement decreases with increasing number of considered candidate sequences.Fig. 6Position of annotated sequence in the list of reported sequences (sorted by score). DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ reported the annotated sequence among the top 5 sequences in 73.4% of the spectra, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin in 75.4% and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos in 76.6% of the spectra However, a filtering approach that considers the top 100 sequences reported by DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$, would not be as successful as the proposed algorithms. While the annotated sequence was reported by DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ for 793 spectra among the top 100 sequences, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin reported it in 798 cases and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos in 808 cases. Even an optimal filtering approach by retention time would miss the sequences that have not been reported by DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$. For six spectra, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin and DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos did not report the annotated sequence, where DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$ did report it, as the predicted retention time of the annotated sequence was not in the chosen tolerance range. The length of a peptide affects its retention time. However, the considered prediction models do not take into account the peptide's length and use the same coefficients for all peptide lengths. There is not necessarily a linear correlation between the length of a peptide and its retention time, as the coefficients can be positive or negative. Our models do not perform equally well on short and long peptides. Figure [7](#Fig7){ref-type="fig"} shows a distribution of the number of identified spectra with respect to the length of the corresponding peptide sequence. DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos shows the best performance for peptides with fewer than 14 amino acids. For longer peptides, the linear prediction model shows a superior identification rate on the considered dataset.Fig. 7Identified spectra with respect to the length of the annotated sequence Discussion and conclusion {#Sec16} ========================= Discussion {#Sec17} ---------- An accurate retention time prediction model is crucial for exploiting the retention time information successfully. The identification rates of our algorithms depend on the choice of the tolerance parameter $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon$$\end{document}$. Increasing $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon$$\end{document}$ diminishes the effect of considering the retention time, while decreasing $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon$$\end{document}$ might exclude the correct sequence from the search space. In our evaluation, we considered a limited training dataset for estimating the retention time coefficients. While we have to estimate a small set of coefficients for our linear prediction model, the neighborhood-based prediction model has many retention time coefficients. Estimating these coefficients requires a large training dataset, as each coefficients needs to be estimated based on a sufficiently large set of observations. A much larger training set would be necessary to get a robust estimate of the retention time coefficients for this model. Our models fail to predict the retention time of some sequences accurately considering the available training data. To avoid excluding the correct sequence from the search space, we had to chose large tolerance parameters. By improving the predictive power of the models, e.g. using a larger training set or a more sophisticated parameter estimation, the tolerance parameter can be decreased, which increases the identification rates of our algorithms. To get a glimpse on the performance of DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Nei, we set $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varepsilon =500$$\end{document}$ (in seconds) and analyzed the spectra from the test set, where the correct sequence was not excluded due to the predictive error. In three cases, the annotated sequence was reported by DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Nei, but by no other considered algorithm. The position of the annotated sequence improved compared to the position reported by DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos for 12 spectra. Our prediction models do not consider several other properties of a peptide that affect its retention time. For example, the length of a peptide has an influence on its retention time. More evolved prediction models \[[@CR18], [@CR19]\] integrate a correction for the peptide length. The prediction models considered in this work cannot account for the peptide length. However, as suggested in \[[@CR19]\], a separate set of retention time coefficient can be estimated for short peptides in order to improve the prediction accuracy. This approach needs an even larger training dataset in order to accurately estimate the coefficients. The running time of our prototypical implementations is in some cases not yet practical. DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Lin needs less than 3 seconds per spectra for half of the considered spectra, but several hours in exceptional cases. However, our implementation has not been optimized for speed and memory consumption. In general, DeNovo$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\Delta$$\end{document}$Pos is more time-consuming. Half of the spectra were analyzed within about 2 min. The running time of our algorithm depends on the size of the spectrum graph. The algorithms considered two masses to be equal if they differ by at most 0.02 Da. Moreover, a simple merging algorithm is applied during the construction of the spectrum graph to reduce the size of the graph as described in \[[@CR14]\]. We observed a great variation of spectrum graph sizes in our experiments. The spectrum graphs contained roughly 8400 edges on average, whereas the largest observed graph contained 23,000 edges. Spectra measured on low resolution lead to denser spectrum graph, i.e. to a larger number of edges, but a lower number of vertices. However, we did not study the performance and runtime of our algorithms on this type of spectra. Conclusion {#Sec18} ---------- In this paper, we propose the first algorithms for exploiting the retention time information in de novo peptide sequencing. We study three retention time prediction models and develop algorithms for computing a sequence that matches the experimental mass spectrum as well as possible and is in accordance with the observed retention time. The experimental evaluation of our algorithms shows that identification rates can definitively be improved by exploiting this additional information. Yet, the proposed algorithms score sequences with a very simplistic scoring function that only counts explained and measured masses and does not consider any other available information. For real-world applications, a more evolved scoring function using all available information needs to be integrated. While \[[@CR14]\] introduces a new scoring model, we explore ways of exploiting the retention time information. The proposed algorithms open room for developing new scoring functions that consider both the retention time information and the symmetric difference scoring model. A preliminary version has been presented at WABI 2017 \[[@CR13]\]. Preliminary work of this study was carried out by YV and VV during their bachelor theses. All authors contributed to the design of the algorithms and the experiments. YV, VV, and TT implemented the software. TT performed the experiments. All work was guided by TH in the whole process. TT wrote most parts of the manuscript with the help of TH. All authors contributed to the writing of the paper. All authors read and approved the final manuscript. Acknowledgements {#d29e9299} ================ We would like to thank Peter Widmayer, Christian Panse, Witold Wolski, and Ludovic Gillet for helpful discussions. Moreover, we thank the anonymous reviewers of the preliminary conference version of this study for their constructive criticism. Competing interests {#d29e9304} =================== The authors declare that they have no competing interests. Availability of data and materials {#d29e9309} ================================== The datasets analyzed during the current study are available in the peptide atlas repository, <http://www.peptideatlas.org> with dataset ID PASS00289 \[[@CR15]\]. The implementation of our algorithm is available under a BSD license at <http://www.github.com/tschager>. Consent for publication {#d29e9327} ======================= Not applicable. Ethics approval and consent to participate {#d29e9332} ========================================== Not applicable. Funding {#d29e9337} ======= Funding information is not applicable. Publisher's Note {#d29e9342} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
{ "pile_set_name": "PubMed Central" }
--- abstract: 'A method is presented in which matrix elements for some processes are calculated recursively. This recursive calculational technique is based on the method of basis spinors.' --- [**Recursive technique for evaluation of Feynman diagrams** ]{}\ **V. V. Andreev** [^1]\ Gomel State University, Physics Department,\ Gomel, Belarus Introduction ============ The possibility of investigation higher and higher energies at present and future colliders, entails the necessity of predicting and calculating with high precision more and more complicated processes. When the number of final particles is high it becomes hard, even to calculate the corresponding tree level Feynman diagrams and the final expression of cross section is often an intricated function of several variables, inadequate for practical use. This has lead to that it is necessary abandon the standard methods for perturbative calculations and to use instead the new effective ones. The standard method to obtain a cross section with the fermions in perturbative quantum field theories is to reduce the squared amplitude to a trace from products of $\gamma$-matrices. An alternative approach is to calculate the Feynman amplitudes directly. The idea of calculating amplitudes has a long enough history. In 1949 it was suggested in Ref.[@Powell] to calculate a matrix element by means of explicit form of $\gamma$-matrices and Dirac spinors (more detailed bibliography on the problem can be found in Refs. [@Galynski; @Bondarev]). Various methods of calculating the reaction amplitudes with fermions have been proposed and successfully applied in recent years. In general the methods of matrix element calculation can be classified into two basic types. The first type includes methods of direct numerical calculation of the Feynman diagrams. The second type includes methods of analytical calculations of amplitudes with the subsequent numerical calculations of cross sections. Notice that there are methods of calculating cross sections without the Feynman diagrams [@Caravaglios; @Helac]. Analytical methods of calculating the Feynman amplitudes can be divided into two basic groups. The first group involves the analytical methods that reduce the calculation of $S$-matrix element to a trace calculation. The reduction of a matrix element to trace calculation from products of $\gamma$-matrices underlies a large number of methods (see, Refs.[@Galynski; @Bondarev] and Refs. [@Bellomo]-[@Vega] etc.). In this method the matrix element is expressed as the algebraic function in terms of scalar products of four-vectors and their contractions with the Levi-Civita tensor. The second group involves the analytical methods that practically do not use the operations with traces from products of $\gamma$-matrices. The method of the CALCUL group which was used for the calculations of the reactions with massless fermions is the most famous among [@Berendz]-[@Giele]. The basic idea behind the CALCUL method is to replace $S$-matrix element by spinor products of bispinors and to use the fact that expressions $\bar{u}_{\lambda}\left(p\right)u_{-\lambda}\left(k\right)$ are simple scalar functions of the momenta $p,k$ and the helicity $\lambda$. However, the operation of matrix element reduction is not so simple as the calculation of traces. It requires the use of Chisholm spinor identities (see [@Kleiss]). Also it takes the representation of contraction $ \slash{p} = p^\mu \gamma_\mu$ with four-momenta $p^\mu$ and polarization vectors of external photons through bispinors. For gauge massive bosons the additional mathematical constructions are needed [@Kleiss]. There are generalizations of the CALCUL method for massive Dirac particles both for special choices of the fermion polarization ([@Kleiss],[@Berendz3]-[@Hagiwara]) and for an arbitrary fermion polarization [@Gongora; @Andreev]. We call the polarization states of fermions in Ref.[@Berendz3; @Kleiss] as Berends-Daverveldt-Kleiss-Stirling or $BDKS$-states. Notice that for massless fermions we can obtain amplitude in terms of the scalar products of four-momentum vectors and current-like constructions of the type $J^{\mu} \sim \bar{u}_{\lambda}\left(p\right) \gamma^{\mu} u_ {\lambda} \left (k\right)$. The components of $J^{\mu}$ are calculated by means of momentum components $p,k$ (so called $E$-vector formalism; see Ref. [@Papadopoulos]). For $BDKS$-states Ref.[@Ballestrero] presents the iterative scheme of calculation that reduces expression for the fermion chain $\bar{u}_{\lambda} \left(p\right)Q\; u_{\lambda} \left(k\right) $ to the combination of spinor products $\bar{u}_{\lambda}\left(p\right)u_{\lambda}\left(k\right)$ and (or) $\bar{u}_{\lambda}\left(p\right)\gamma^{\mu}\left(g_V+g_A \gamma_5 \right) u_{\lambda} \left(k\right)$ by means of inserting the complete set of non-physical states of bispinors (with $p^2<0$) into the fermion chain. In all above-mentioned methods the spinor products and current constructions were calculated by means of traces and then used as scalar functions of the momenta and of the helicities (similar to scalar product of four-vectors). Due to their easy implementation methods of matrix element calculation have become a basis for modern programs dealing with evaluation cross-sections for various processes. Examples for such programs are generators `HELAS` [@Murayama], `GRACE` [@Grace], `MadGraph` [@MadGraph], `O’MEGA` [@omega], `FeynArts/FormCalc4` [@FeynArts; @Hahn] and `CompHEP` [@Comphep] (planned the calculation of the matrix element [@Ilyin]). There is large number of more specialized programs as `AMEGIC++` [@Amegic], `ALPGEN` [@Alpgen], `WPHACT` [@wphact], ` LUSIFER `[@lusifer] and *et al*. The detailed list of such programs can be found in Ref.[@Harlander]. In the paper we describe an approach to Feynman diagrams which is based on the using of an isotropic tetrad in Minkowski space and basis spinors connected with it (see [@Andreev3b],[@Andreev1]). Here we don’t use an explicit form of Dirac spinors and $\gamma$–matrices and the operation of trace calculations. The method is based on the active using of the massless basis spinors connected with isotropic tetrad vectors and we will call it as Method of Basis Spinors (`MBS`). In this method as well as in the trace methods the matrix element of Feynman amplitudes is reduced to the combination of scalar products of momenta and polarization vectors. Unlike spinor technique in different variants [@Berendz]-[@Kleiss1], this method doesn’t use either Chisholm identities, or the presentation of the contraction $\slash{p}$ with four vector $p$ and of the polarization vector of bosons through the bispinors. Unlike `WvD` spinor technique [@Giele],[@Dittmaier] `MBS` doesn’t use special Feynman rules for calculating of the matrix elements. We propose to use recursion relations as a technique to evaluate the Feynman amplitudes of processes. The advantage of recursive technique is that for calculation of a $n+1$ matrix element of some process we can use the calculation of $n$ process. Both for analytic and numerical evaluation this is asset. Method of Basis Spinors ======================= When evaluating a Feynman amplitude involving the fermions, the amplitude is expressed as the sum of terms that have the form $$\begin{aligned} && \mathcal{M}_{\lambda _p,\lambda _k}\left(p,s_p\;,\; k,\;s_k\; ;Q\right)= \nonumber\\ && =\mathcal{M}_{\lambda _p,\lambda _k}\left(\left[p\right], \left[k\right] ;Q\right)=\bar{u}_{\lambda _p}\left( p,s_p\right) Q ~u_{\lambda _k}\left(k,s_k\right)\;, \label{anpic1}\end{aligned}$$ where $\lambda_{p}$ and $\lambda_{k}$ are the polarizations of the external particles with four-momentum $p,k$ and arbitrary polarization vectors $s_p,s_k$. The operator $Q$ is the sum of products of Dirac $\gamma$-matrices. The matrix element (\[anpic1\]) with Dirac spinors is a scalar function. Thus, it should be expressible in terms of scalar functions formed from the spin and momentum four-vectors of the fermions, including $p, s_p, k, s_k$ and the operator $Q$. We will now consider that in the our approach this matrix element (\[anpic1\]) can be represented as linear combinations of the products of the lower-order matrix elements. Isotropic tetrad ---------------- We use the metric and matrix convention as in the book by Bjorken and Drell [@Bjorken1], i.e. the Levi-Civita tensor is determined as $\epsilon_{0 1 2 3}=1$ and the matrix $ \gamma_5=i \gamma ^{0} \gamma ^{1} \gamma ^{2} \gamma ^{3}$. Let us introduce the orthonormal four-vector basis in Minkowski space which satisfies the relations: $$\label{pic1} l_0^{\mu} \cdot l_0^{\nu} -l_1^{\mu} \cdot l_1^{\nu} -l_2^{\mu} \cdot l_2^{\nu}-l_3^{\mu} \cdot l_3^{\nu} = g^{\mu \nu}, ~~\left(l_{A} \cdot l_{B}\right)=g_{A B},$$ where $g$ is the Lorentz metric tensor. With the help of the basis vectors $l_{A}\left(A=0,1,2,3\right)$ we can define lightlike vectors, which form the isotropic tetrad in Minkowski space (see, [@Borodulin]) $$b_\rho =\frac{l_0+\rho l_3}{2}\;,\; n_\lambda =\frac{\lambda\;l_1+\mathrm{i} l_2}{2}\;, ( \rho ,\lambda =\pm 1)\;. \label{pic2}$$ From Eqs. (\[pic1\]), (\[pic2\]) it follows that $$(b_\rho \cdot b_{-\lambda })=\frac{\delta _{\lambda,\;\rho }}{2}~,~~(n_\lambda \cdot n_{-\rho })=\frac{\delta _{\lambda,\;\rho }}{2}~,~~\left(b_\rho \cdot n_\lambda \right) =0\;, \label{pic3}$$ $$g^{\mu \nu}=2\sum_{\lambda =-1}^1\left[ b_\lambda ^\mu \cdot b_{-\lambda}^\nu +n_\lambda ^\mu \cdot n_{-\lambda }^\nu \right]\;. \label{pic4}$$ It is always possible to construct the basis of an isotropic tetrad (\[pic2\]) as numerical four-vectors $$\label{pic4a} \left(b_{\pm 1}\right)_{\mu}=\left(1/2\right)\left\{1, 0, 0, \pm 1\right\}\;,\; \left(n_{\pm 1}\right)_{\mu}=\left(1/2\right)\left\{0, \pm 1, \mathrm{i}, 0\right\}$$ or by means of the physical vectors for reaction. For practical applications it is convenient to introduce additional four-vectors $$\tilde{b}_\rho =2\; b_\rho ,\; \tilde{n}_\lambda=2\; n_{\lambda} \label{add1}$$ By means of the isotropic tetrad vectors we can determine the polarization vectors of massless (also and massive) vector bosons. For photons with momentum $k^\mu$ and helicity $\lambda=\pm 1$ we use the following definition of polarizations in the axial gauge $$\begin{aligned} && \varepsilon _{\lambda }\left( k\right) =\frac{\left(k \cdot \tilde{n}_{-\lambda}\right) \tilde{b}_{-1}}{\sqrt{2}\;\left(k \cdot \tilde{b}_{-1}\right)}-\frac{\tilde{n}_{-\lambda}}{\sqrt{2}} \label{picc1b}\end{aligned}$$ provided that, the four-vectors $k, b_1, b_{-1}$ are linearly independent. Massless basis spinors {#sec:level2} ---------------------- By means of the isotropic tetrad vectors (\[pic2\]) we define [*massless basis spinors*]{} $u_{\lambda}\left(b_{-1}\right)$ and $u_{\lambda}\left(b_{1}\right)$ $$\slash{b}_{-1} u_\lambda \left( b_{-1}\right) =0\;, ~~u_\lambda \left(b_{1}\right) \equiv \slash{b}_{1}u_{-\lambda}\left(b_{-1}\right)\;,\label{pic7}$$ $$\omega _\lambda u_\lambda \left(b_{\pm 1}\right)= u_\lambda \left(b_{\pm 1}\right) \label{pic8}$$ with the matrix $\omega _{\lambda} = 1/2 \hskip 1pt \left( 1+\lambda \gamma_5\right)$ and the normalization condition $$\label{pic8a} u_\lambda \left( b_{\pm 1}\right) \bar{u}_\lambda \left(b_{\pm 1}\right) =\omega _\lambda \slash{b}_{\pm 1}.$$ The relative phase between basis spinors with different helicity is given by $$\slash{n}_\lambda u_{-\nu }\left( b_{-1}\right) =\delta_{\lambda, \nu} u_\lambda \left( b_{-1}\right). \label{pic9}$$ The important property of basis spinors (\[pic7\]) is the completeness relation $$\sum_{\lambda,A=-1}^{1} u_\lambda \left( b_A\right) \bar{u}_{-\lambda} \left(b_{-A}\right)= I\;, \label{pic10}$$ which follows from Eqs.(\[pic7\]), (\[pic9\]). Thus, the arbitrary Dirac spinor can be decomposed in terms of basis spinors $u_{\lambda}\left(b_{A} \right)$. Dirac spinors and basis spinors ------------------------------- Arbitrary Dirac spinor can be determined through the basis spinor (\[pic7\]) with the help of projection operators $u_{\lambda_{p}} \left(p,s_p\right)\bar{u}_{\lambda_{p}} \left(p,s_p\right)$. The Dirac spinors $w^A_\lambda \left(p,s_p\right)$ for massive fermion and antifermion with four-momentum $p\;( p^2=m_p^2 )$ , arbitrary polarization vector $s_p$ and spin number $\lambda= \pm 1$ can be obtained with the help of basis spinors by means of equation: $$\begin{aligned} && w^A_\lambda \left(p,s_p\right) =\frac{\left(\slash{p}+A m_p\right) \left(1+ \lambda \gamma_{5}\slash{s}_{p}\right)}{2\sqrt{\left(b_{-1}\cdot \left( p+m_p s_p \right)\right)}} u_{-A \times \lambda} \left(b_{-1} \right)\nonumber\\ && =\frac{ \left[ \slash{\xi}^{p}_{1}+A\; \slash{\xi}^{p}_{-1}\slash{\xi}^{p}_{1}/ m_p \right] {u}_{-A\times \lambda_{p}} \left(b_{-1}\right)}{\sqrt{\left( \tilde{b}_{-1}\cdot \xi^{p}_{1}\right)}}\nonumber\\ && =T_{\lambda}\left(p,s_p\right) u_{-A \times \lambda} \left(b_{-1} \right)\;. \label{anpic8}\end{aligned}$$ The notation $w^{A}_{\lambda _p}\left(p,s_p\right)$ stands for either $u_{\lambda _p}\left( p,s_p\right)$ (bispinor of fermion; $A=+1$) or $\upsilon_{\lambda _p}\left( p,s_p\right)$ (bispinor of antifermion; $A=-1$). Here we have introduced the abbreviations $$\xi _{\pm 1}^p =\frac{p \pm m_p s_p}{2}\;. \label{anpic11}$$ The bispinors $u_\lambda \left( p,s_p\right)$ and $\upsilon_\lambda \left( p,s_p\right) $ satisfy Dirac equations and spin conditions for massive fermion and antifermion $$\begin{aligned} \slash{p} \hskip 2pt u_\lambda \left(p,s_p\right)& =&m_p \hskip 2pt u_{\lambda }\left(p,s_p\right), \hskip 14pt \slash{p} \hskip 2pt \upsilon_\lambda \left(p,s_p\right) = - m_p \hskip 2pt \upsilon_{\lambda }\left(p,s_p\right) , \nonumber\\ \gamma_5 \slash{s}_{p} \; u_\lambda \left(p,s_p\right) &=& \hskip 2pt \lambda \; u_{\lambda }\left(p,s_p\right),~ \gamma_5 \slash{s}_{p} \hskip 2pt \upsilon_\lambda \left(p,s_p\right) = \lambda \hskip 2pt \upsilon_{\lambda }\left(p,s_p\right). \label{anpic8a}\end{aligned}$$ We also found, that the Dirac spinors of fermions and antifermions are related by $$\upsilon_\lambda \left( p,s_p\right)= -\lambda \gamma _5\;u_{-\lambda }\left( p,s_p\right), \hskip 7pt \bar{\upsilon}_\lambda \left( p,s_p\right) =\bar{u}_{-\lambda }\left( p,s_p\right) \lambda \hskip 2pt \gamma_5\;. \label{stp31}$$ Let us consider the particular case of Eq.(\[anpic8\])–the $BDKS$ polarization states of fermions, as they are the most-used in calculations of matrix elements. The polarization vector of $BDKS$-states is defined as follows [@Kleiss; @Berendz3; @Andreev; @Ballestrero]: $$s_{KS} \equiv s_p= \frac{p}{m_p}-\frac{m_p\;b_{-1}}{\left(p \cdot b_{-1}\right)}\; . \label{stp33aa}$$ Performing a calculation for Eqs.(\[pic7\]),(\[anpic8\]) and Eq.(\[stp33aa\]), we find the simple result for massive Dirac spinor [@Kleiss; @Ballestrero; @Andreev]: $$\label{stp34aa} w_{\lambda}^{A} \left(p,s_{KS}\right) = \frac{\left(\slash{p}+A\; m_p \right)\;u_{-A\times\lambda }\left(b_{-1}\right)}{\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}}$$ Notice that, in Ref.[@Ballestrero] relation between the Dirac spinor of fermion and the Dirac spinor of antifermion differs from the Eq.(\[stp31\]). The Dirac spinor $u_\lambda \left(p\right)$ of massless fermion with momentum $p$ ($p^2=0, \left(p \cdot b_{-1}\right) \not = 0$) and helicity $\lambda$ is defined by (for example, see Ref.[@Kleiss]) $$u_\lambda \left(p\right) = \frac{\slash{p}\; u_{-\lambda }\left(b_{-1}\right)}{\sqrt{\left(p \cdot \tilde{b}_{-1}\right) }}\; . \label{anpic6}$$ Main equations of `MBS` ----------------------- The spinor products of massless basis spinors (\[pic7\]) are determined by $$\bar{u}_\lambda \left( b_C\right) u_{\rho}\left( b_A\right) = \delta_{\lambda, -\rho}\; \delta_{C, -A},\;~\;C,A=\pm 1,\; ~\lambda,\rho=\pm 1\;. \label{stp18}$$ With the help of Eq.(\[pic4\]) Dirac matrix $\gamma^\mu $ can be rewritten as $$\gamma ^\mu =\sum_{\lambda =-1}^1\left[\slash{b}_{-\lambda} \tilde{b}_\lambda ^\mu +\slash{n}_{-\lambda } \tilde{n}_\lambda ^\mu \right]\;. \label{pic5}$$ Using the Eqs.(\[pic7\]),(\[pic8\]) and (\[pic9\]) we can obtain that $$\gamma^\mu u_\lambda \left( b_A\right) =\tilde{b}_A^\mu \;u_{-\lambda }\left(b_{-A}\right) -A \;{\tilde{n}}_{-A \times \lambda }^\mu \; u_{-\lambda }\left(b_A\right) \label{pic11}$$ and $$\label{pic13a} \gamma_{5}\; u_\rho \left(b_A\right)= \rho \;u_\rho \left(b_A\right)\;.$$ Eqs.(\[pic11\])-(\[pic13a\]) and Eq.(\[stp18\]) underlie the method of basis spinors (`MBS`) [@Andreev3b; @Andreev1]. By means of the Eq.(\[pic11\]) we can determine that product of two $\gamma$-matrices can be represented as $$\gamma ^\mu \gamma ^\nu u_\lambda \left( b_A\right)=Y_{A,\;\lambda }^{\mu,\; \nu}\;u_{\lambda }\left(b_{A}\right) -A \; {X}_{A,\;\lambda }^{\mu, \nu}\; u_{\lambda }\left(b_{-A}\right)\;, \label{pic14a}$$ where $X^{\mu, \nu}, Y^{\mu, \nu}$ are the Lorentz tensors: $$\begin{aligned} && X_{A,\;\lambda}^{\mu,\; \nu}=\tilde{b}_{A}^{\mu}\cdot \tilde{n}_{-A\times \lambda}^{\nu}- \tilde{n}_{-A\times \lambda}^{\mu}\cdot \tilde{b}_{A}^{\nu}\;, \label{anpic12new1}\\ && Y_{A,\;\lambda}^{\mu,\; \nu}=\tilde{b}_{-A}^{\mu} \cdot \tilde{b}_{A}^{\nu}+ \tilde{n}_{A\times \lambda}^{\mu} \cdot \tilde{n}_{-A\times\lambda}^{\nu}\;. \label{anpic12new2}\end{aligned}$$ The product $\mathcal{S}^{n}=\gamma ^{\mu_{1}} \gamma ^{\mu_{2}}\ldots \gamma ^{\mu_{n}}$ can be written as $$\begin{aligned} &&\mathcal{S}^{n}\;u_\lambda \left( b_A\right) \nonumber\\ && =\mathcal{B}_{A,\;\lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}\;u_{\lambda_{n}^{\prime} }\left(b_{A_{n}^{\prime}}\right) -A\; \mathcal{N}_{A,\;\lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}\; u_{\lambda_{n}^{\prime} }\left(b_{-A_{n}^{\prime}}\right)\;, \label{pic14ab}\end{aligned}$$ where $$\lambda_{n}^{\prime}=\left(-1\right)^{n}\lambda\;,\; A_{n}^{\prime}=\left(-1\right)^{n} A \label{al}$$ and $\mathcal{B}_{A,\;\lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}$, $\mathcal{N}_{A,\;\lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}$ are some Lorentz tensors, which are related with isotropic tetrad vectors (\[add1\]). As follows from Eqs.(\[pic11\]),(\[pic14a\]) we have that in particular cases: $$\begin{aligned} && \mathcal{B}_{A,\;\lambda}^{\left\{\mu_{1}\right\}}=\tilde{b}_{A}^{\mu_{1}},\; \mathcal{N}_{A,\;\lambda}^{\left\{\mu_{1}\right\}}=\tilde{n}_{-A\times\lambda}^{\mu_{1}}\;, \label{bn1}\\ && \mathcal{B}_{A,\;\lambda}^{\left\{\mu_{1},\; \mu_{2}\right\}}=Y_{A,\;\lambda}^{\mu_{1},\; \mu_{2}} \;,\; \mathcal{N}_{A,\;\lambda}^{\left\{\mu_{1},\;\mu_{2}\right\}}=X_{A,\;\lambda}^{\mu_{1},\; \mu_{2}} \;. \label{bn2}\end{aligned}$$ Recursion relations for the matrix elements =========================================== The **basic idea of Method of Basis Spinors** is to replace Dirac spinors in Eq.(\[anpic1\]) by massless basis spinors (\[pic7\]), and to use the Eq.(\[stp18\])and Eqs.(\[pic11\])-(\[pic13a\]) for calculation of matrix element (\[anpic1\]) in terms of scalar functions $\mathcal{B},\mathcal{N}$. With the help of the Eq.(\[anpic8\]) the matrix element (\[anpic1\]) transforms to fermion “string” with massless basis spinors $u_{\lambda}\left(b_{A}\right)$ i.e. $$\begin{aligned} && \mathcal{M}_{\lambda _p,\lambda _k}\left(p,s_p\;,\; k,s_k\; ;Q\right)= \nonumber\\ && =\bar{u}_{-\lambda _p} \left(b_{-1}\right) T_{\lambda_{p}}\left(p,s_p\right)Q\; T_{\lambda_{k}}\left(k,s_k\right)u_{-\lambda _k}\left(b_{-1}\right)=\nonumber\\ && =\mathcal{M}_{-\lambda _p,-\lambda _k}\left(b_{-1},\;b_{-1}\; ;T_{\lambda_{p}}\left(p,s_p\right)Q\; T_{\lambda_{k}}\left(k,s_k\right)\right)\;, \label{anpic9a}\end{aligned}$$ where operator $T_{\lambda}$ is determined by Eq.(\[anpic8\]). Let us consider a special variants of a matrix element. Basic matrix element -------------------- Let us consider an important type of a matrix element (\[anpic1\]), when $p=b_{-C}$ and $k=b_A$, i.e. $$\begin{aligned} && \mathcal{M}_{-\sigma,\rho}\left(b_{-C}\;,\;b_A\; ; Q\right)\equiv \Gamma^{C,\;A}_{\sigma ,\rho}\left[Q\right] \nonumber\\ && = \bar{u}_{-\sigma} \left( b_{-C}\right) Q \;u_\rho \left( b_A\right)\;. \label{pic13}\end{aligned}$$ We call this type of matrix element as **basic matrix element**. Note that, the matrix element (\[anpic1\]) is a particular case of basic matrix element i.e. $$\mathcal{M}_{\lambda _p,\lambda _k}\left(p,s_p,\; k,s_k\; ;Q\right)=\Gamma^{1,-1}_{\lambda _p ,-\lambda _k}\left[T_{\lambda_{p}}\left(p,s_p\right)Q\; T_{\lambda_{k}}\left(k,s_k\right)\right] \;.\label{anpic9ab}$$ With the help of the completeness relation (\[pic10\]) we can obtain the recursion formula for $\Gamma^{C,A}_{ \sigma ,\rho}\left[Q_1 Q_2\right]$ $$\label{pic14} \Gamma^{C,\;A}_{\sigma ,\rho}\left[Q_1 Q_2\right]= \sum_{D,\lambda=-1}^{1}\Gamma^{C,\;D}_{\sigma, \lambda }\left[Q_1\right] \Gamma^{D,\;A}_{\lambda, \rho}\left[Q_2\right].$$ By means of the relations (\[pic11\]),(\[pic14a\]),(\[pic14ab\]) and Eq.(\[stp18\]) it is easy to calculate $\Gamma^{C,A}_{\sigma, \rho}$ in terms of the isotropic tetrad vectors. For instance, $$\begin{aligned} && \Gamma^{C,\;A}_{\sigma,\;\rho }\left[\gamma^{\mu}\right]=\delta_{\sigma,\; -\rho} \left(\delta_{C,\;-A}\; \tilde{b}_{A}^{\mu}-A\;\delta_{C,A} \; \tilde{n}_{-A \times \rho }^{\mu}\right)\;, \label{pic16}\\ && \Gamma^{C,\;A}_{\sigma,\; \rho}\left[\gamma^\mu\;\gamma^\nu\right]= \delta_{\sigma , \rho} \left(\delta_{C,A} Y_{A,\;\rho }^{\mu,\; \nu}-A\;\delta_{C,-A} {X}_{A,\;\rho }^{\mu,\; \nu} \right)\; \label{pic16a}\end{aligned}$$ and $$\begin{aligned} && \Gamma^{C,\;A}_{\sigma,\;\rho}\left[\gamma ^{\mu_{1}} \gamma ^{\mu_{2}}\ldots \gamma ^{\mu_{n}}\right]= \Gamma^{C,\;A}_{\sigma,\; \rho}\left[\mathcal{S}^{n}\right] \nonumber\\ && =\delta_{\sigma,\;\rho_{n}^{\prime} } \left(\delta_{C,\; A_{n}^{\prime}}\; \mathcal{B}_{A, \;\rho}^{\left\{\mu_{1},\ldots \mu_{n}\right\}} -A\;\delta_{C, -A_{n}^{\prime}}\; \mathcal{N}_{A,\;\rho}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}\right)\;. \label{pic16ab}\end{aligned}$$ With the help of the Eqs. (\[pic14\]) and (\[pic16ab\]) we obtain recursion relations for $\mathcal{B}_{A, \lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}$ and $\mathcal{N}_{A, \lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}$ $$\begin{aligned} && \mathcal{B}_{A,\; \lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}=\mathcal{B}_{A_{n-k}^{\prime},\; \lambda_{n-k}^{\prime}}^{\left\{\mu_{1},\ldots \mu_{k}\right\}}\mathcal{B}_{A, \;\lambda}^{\left\{\mu_{k+1},\ldots \mu_{n}\right\}}+\left(-1\right)^{n-k+1}\mathcal{N}_{-A_{n-k}^{\prime},\; \lambda_{n-k}^{\prime}}^{\left\{\mu_{1},\ldots \mu_{k}\right\}}\mathcal{N}_{A,\; \lambda}^{\left\{\mu_{k+1},\ldots \mu_{n}\right\}}\;, \label{recurbn1}\\ && \mathcal{N}_{A,\; \lambda}^{\left\{\mu_{1},\ldots \mu_{n}\right\}}=\mathcal{B}_{-A_{n-k}^{\prime},\; \lambda_{n-k}^{\prime}}^{\left\{\mu_{1},\ldots \mu_{k}\right\}}\mathcal{N}_{A,\; \lambda}^{\left\{\mu_{k+1},\ldots \mu_{n}\right\}}+\left(-1\right)^{n-k}\mathcal{N}_{A_{n-k}^{\prime},\; \lambda_{n-k}^{\prime}}^{\left\{\mu_{1},\ldots \mu_{k}\right\}}\mathcal{B}_{A,\; \lambda}^{\left\{\mu_{k+1},\ldots \mu_{n}\right\}} \;.\label{recurbn2}\end{aligned}$$ The recursion Eqs.(\[recurbn1\])-(\[recurbn2\]) allow to convert scalar functions $\mathcal{B},\mathcal{N}$ into Lorentz tensors in terms of isotropic tetrad vector with the help of Eq.(\[bn1\]) or Eq.(\[bn2\]). For example, the constructions $ q_1^{\mu_{1}} q_2^{\mu_{2}} q_3^{\mu_{3}} \mathcal{B}_{A,\; \lambda}^{\left\{\mu_{1},\;\mu_{2},\;\mu_{3}\right\}}=\mathcal{B}_{A,\; \lambda}^{\left\{q_1,\;q_2,\;q_3\right\}}$ and $q_1^{\mu_{1}} q_2^{\mu_{2}} q_3^{\mu_{3}} \mathcal{N}_{A, \lambda}^{\left\{\mu_{1},\;\mu_{2},\;\mu_{3}\right\}}=\mathcal{N}_{A,\; \lambda}^{\left\{q_1, \;q_2,\; q_3\right\}}$ can be represented as a combination of the scalar functions $X,\;Y$ and scalar products of the isotropic tetrad vectors: $$\begin{aligned} && q_1^{\mu_{1}} q_2^{\mu_{2}} q_3^{\mu_{3}} \mathcal{B}_{A,\; \lambda}^{\left\{\mu_{1},\;\mu_{2},\;\mu_{3}\right\}}=\mathcal{B}_{A,\; \lambda}^{\left\{q_1,\; q_2,\; q_3\right\}} \nonumber\\ &&=\left(q_3 \cdot \tilde{b}_{A}\right)Y_{-A,\;-\lambda}^{q_{1},\; q_{2}}+ \left(q_3 \cdot \tilde{n}_{-A \times \lambda}\right)X_{A,\;-\lambda}^{q_{1},\; q_{2}}\;, \label{bn3}\end{aligned}$$ $$\begin{aligned} && q_1^{\mu_{1}} q_2^{\mu_{2}} q_3^{\mu_{3}} \mathcal{N}_{A,\; \lambda}^{\left\{\mu_{1},\;\mu_{2},\;\mu_{3}\right\}}=\mathcal{N}_{A,\; \lambda}^{\left\{q_1,\; q_2,\; q_3\right\}} \nonumber\\ &&=\left(q_3 \cdot \tilde{n}_{-A \times\lambda}\right)Y_{A,\;-\lambda}^{q_{1},\; q_{2}}- \left(q_3 \cdot \tilde{b}_{A}\right)X_{-A,\;-\lambda}^{q_{1},\; q_{2}}\;. \label{bn4}\end{aligned}$$ Decomposition coefficients -------------------------- The next type of lower-order matrix element (\[anpic1\]) is $$\begin{aligned} && \mathcal{M}_{\rho,\;\lambda _p}\left(b_{A}\;, \left[p\right];I\right)\equiv \mathcal{M}_{\rho,\;\lambda _p}\left(b_{A}\;,\left[p\right]\right)= \nonumber\\ &&= \bar{u}_{\rho} \left(b_{A}\right)u_{\lambda_{p}} \left(p,s_p\right)\;. \label{anpic3}\end{aligned}$$ The matrix element (\[anpic3\]) is determined by the decomposition coefficients of an arbitrary Dirac spinor $u_{\lambda_{p}} \left(p,s_p\right)$ on basis spinors (\[pic7\]). With the help of the Eqs.(\[anpic8\]),(\[anpic6\]) the matrix element (\[anpic3\]) transforms to $$\begin{aligned} && \mathcal{M}_{\rho,\;\lambda _p}\left(b_A,\left[p\right]\right)= \nonumber\\ && =\frac{\bar{u}_{\rho} \left(b_{A}\right)\left[ \slash{\xi}^{p}_{1}+ \slash{\xi}^{p}_{-1}\slash{\xi}^{p}_{1}/ m_p \right] \bar{u}_{-\lambda_{p}} \left(b_{-1}\right)}{\sqrt{\left( \tilde{b}_{-1}\cdot \xi^{p}_{1}\right)}} \label{anpic1aa}\end{aligned}$$ for the massive fermions with arbitrary vector of polarization and transforms to $$\begin{aligned} && \mathcal{M}_{\rho,\;\lambda _p}\left(b_A,p\right)=\frac{\bar{u}_{\rho}\left(b_{A}\right) \slash{p} \;u_{-\lambda _p}\left(b_{-1}\right)}{\sqrt{\left(\tilde{b}_{-1}\cdot p\right)}} \label{anpic1aa1}\end{aligned}$$ for massless fermions. Using the Eqs.(\[pic11\])-(\[pic13a\]) and (\[pic14a\]) the matrix element (\[anpic3\]) is reduced to an algebraic expression in terms of scalar products of isotropic tetrad vectors and physical vectors or in terms of components of four-vectors. Let us consider massless fermions. Using Eqs.(\[stp18\]),(\[pic11\]) we obtain, that $$\mathcal{M}_{\rho,\;\lambda}\left(b_A,p\right)=\delta_{\lambda,-\rho} \left(\delta_{A,-1}\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}+ \delta_{A,1}\frac{\left(p \cdot \tilde{n}_{-\lambda}\right)}{\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}}\right)\;. \label{anpic7}$$ For numerical calculations, as well as in the case of spinor techniques, it is convenient to determine the (\[anpic7\]) through the momentum components $p =\left (p^0\right.$, $\;p^x = p^0 \sin\theta_p\sin\varphi_p$, $p^y= p^0 \sin\theta_p\cos\varphi_p$, $\left. p^z=p^0 \cos\theta_p\right)$ $$\begin{aligned} && \mathcal{M}_{\rho,\;\lambda}\left(b_A,\;p\right)= \delta_{\lambda,-\rho}\left[ \delta_{A,-1}\sqrt{ p^{-}}- \delta_{A,1}\;\lambda \exp\left(-\mathrm{i} \lambda \varphi_{p}\right)\sqrt{p^{+}}\right]= \nonumber\\ &&=\delta_{\lambda,-\rho}\sqrt{2 p_0}\left[ \delta_{A,-1}\sin \frac{\theta_p}{2}- \delta_{A,1}\;\lambda\; \cos \frac{\theta_p}{2}\exp\left(-\mathrm{i} \lambda \varphi_{p}\right) \right], \label{stp24}\end{aligned}$$ where $$p^{\pm}=p^0\pm p^z, ~~ p^x+\mathrm{i} \lambda p^y=\sqrt{\left(p^x \right)^2+\left(p^y \right)^2} \exp\left(\mathrm{i} \lambda \varphi_{p}\right).$$ Let us consider massive Dirac particles with arbitrary polarization vector $s_p$. After evaluations we obtain, that the decomposition coefficients for a massive fermion with momentum $p$, an arbitrary polarization vector $s_p$ and mass $m_p $ can be written as scalar products of tetrad and physical vectors $$\begin{aligned} && \mathcal{M}_{\rho,\;\lambda _p}\left(b_A,p,s_p\right)= \frac 1{\sqrt{\left(\tilde{b}_{-1} \cdot \xi _1^p \right)}}\left.\Bigg[ \delta _{\lambda,\; -\rho} \left\{ \delta_{A,-1} \left(\tilde{b}_{-1} \cdot \xi _1^p\right)+\delta_{A,1}\left(\tilde{n}_{-\lambda _p} \cdot \xi _1^p\right) \right\} \right.+ \nonumber\\ &&\left. + \delta _{\lambda,\; \rho }\left\{\delta_{A,1}Y_{-1,\;-\lambda_{p} }^{\xi _{-1}^{p},\;\xi _{1}^{p}}+\frac{\delta_{A,-1}}{m_p} X_{-1,-\lambda_{p} }^{\xi _{-1}^{p},\;\xi _{1}^{p}} \right\} \right]\; , \label{anpic9}\end{aligned}$$ where the scalar functions $Y^{p,q}, X^{p,q}$ are determined by Eqs.(\[anpic12new1\])-(\[anpic12new2\]). For $BDKS$ polarization states with the polarization vector (\[stp33aa\]) the matrix element (\[anpic9\]) has a compact form $$\begin{aligned} &&\mathcal{M}_{\rho,\;\lambda}\left(b_A,\;p,\;s_{KS}\right)= \delta_{\lambda,\;-\rho}\left[ \delta_{A,-1}\sqrt{\left(p \cdot \tilde{b}_{-1}\right) }+ \delta_{A,1}\frac{\left(p \cdot \tilde{n}_{-\lambda}\right)}{\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}}\right]+ \nonumber\\ && +\delta_{\lambda,\rho}\;\delta_{A,1}\frac{m_p} {\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}}\;. \label{dc1}\end{aligned}$$ The matrix element (\[anpic3\]) with the antifermion can be easily obtained with the help of Eq.(\[stp31\]): $$\begin{aligned} &&\widetilde{\mathcal{M}}_{\rho,\;\lambda _p}\left(b_{A}\;,\left[p\right]\right)= \bar{u}_{\rho} \left(b_{A}\right)\upsilon_{\lambda_{p}} \left(p,\;s_p\right)= \nonumber\\ && =\rho \lambda_{p}\;\mathcal{M}_{\rho,\;-\lambda _p}\left(b_{A}\;,\left[p\right]\right)\;. \label{anpic3af}\end{aligned}$$ Recursion relation ------------------ With the help of completeness relation (\[pic10\]) the amplitude (\[anpic1\]) with $Q=Q_2 Q_1$ is expressed as combinations of the lower-order matrix element $$\begin{aligned} && \mathcal{M}_{\lambda _p,\;\lambda _k}\left( \left[p\right],\left[k\right];Q_2 Q_1\right)= \nonumber\\ && =\sum_{\sigma ,A =-1}^1 \mathcal{M}_{\lambda _p,\;\sigma}\left(\left[p\right],b_{A};Q_2\right) \mathcal{M}_{-\sigma,\; \lambda _k } \left(b_{-A},\left[k\right];Q_1\right)\;. \label{anpic2}\end{aligned}$$ This insertion allows us to “cut” fermion chain into pieces of fermion chains with basis spinors $u_{\lambda}\left(b_{A}\right)$. Hence our formalism enables to calculate the blocks of the Feynman diagrams and then to use them in the calculation as scalar functions. All possible Feynman amplitudes can be built up from a set of “building” blocks. Let us consider the matrix element (\[anpic1\]) with an operator $$\label{anpic13} Z^{\left(n\right)}=Q_{n} Q_{n-1}\cdots Q_1 Q_0$$ with $Q_{0}=I$. In the Eq.(\[anpic13\]) all operators $Q_j$ have an identical mathematical expressions. Using Eq.(\[anpic2\]) we find that $$\begin{aligned} && \mathcal{M}_{\lambda _p,\;\lambda _k}\left( \left[p\right],\left[k\right];Z^{\left(n\right)}\right)\equiv \mathcal{M}_{\lambda _p,\;\lambda _k}^{\left(n\right)}\left( \left[p\right],\left[k\right]\right)= \nonumber\\ && =\sum_{\sigma ,A =-1}^1 \mathcal{M}_{\lambda _p,\;\sigma}\left(\left[p\right],b_{A}\right) \mathcal{M}_{-\sigma,\; \lambda _k }^{\left(n\right)} \left(b_{-A},\left[k\right]\right)\;, \label{anpic14}\end{aligned}$$ where matrix element $\mathcal{M}_{-\sigma, \;\lambda _k }^{\left(n\right)} \left(b_{-A},\left[k\right]\right)$ can be calculated with the help of recursion relation $$\begin{aligned} && \mathcal{M}_{-\sigma,\; \lambda _k }^{\left(n\right)} \left(b_{-A},\left[k\right]\right)= \nonumber\\ &&=\sum_{\rho ,C =-1}^1 \Gamma^{A,\;C}_{\sigma,\;\rho}\left[Q_n \right] \mathcal{M}_{-\rho,\; \lambda _k }^{\left(n-1\right)} \left(b_{-C},\left[k\right]\right)\;. \label{anpic15a}\end{aligned}$$ Once scalar functions $\mathcal{M}_{\rho,\; \lambda _k } \left(b_{A},\left[k\right]\right)$ and $\Gamma^{A,C}_{\sigma,\rho}\left[Q_j \right]$ are known (see Eqs.(\[anpic7\]), (\[anpic9\])-(\[dc1\]) and Eqs.(\[pic16\])-(\[pic16a\])), it is possible to evaluate the higher order of $\mathcal{M}_{-\sigma, \lambda _k }^{\left(n\right)} \left(b_{-A},\left[k\right]\right)$ with the help of recursion relation (\[anpic15a\]). Examples ======== Consider the “toy” example $$\begin{aligned} &&\mathcal{M}_{\lambda _{p},\;\lambda _{k}}^{\left( n\right) }\left( p,\;s_{p},\;k,\;s_{k}\right)= \nonumber \\ &&=\bar{u}_{\lambda _{p}}\left(p,s_{p}\right) \slash{q}_{n} \slash{q}_{n-1}\ldots \slash{q}_{1}u_{\lambda _{k}}\left( k,s_{k}\right),\label{anpic25}\end{aligned}$$ where $q_j$ are some arbitrary four-vectors. Therefore, we have that $$Z^{\left( n\right) }= \slash{q}_{n} \slash{q}_{n-1}\ldots \slash{q}_{1}\;. \label{anpic26}$$ Using the Eqs.(\[pic16\])-(\[pic16a\]), (\[anpic15a\]) we find that $$\begin{aligned} &&\mathcal{M}_{-\rho,\; \lambda _k }^{\left(j\right)} \left(b_{-C},\left[k\right]\right) =\left(q_{j}\cdot \tilde{b}_{-C}\right) \mathcal{M}_{\rho,\; \lambda _k }^{\left(j-1\right)} \left(b_{C},\left[k\right]\right)- \nonumber\\ && -C\;\left(q_{j}\cdot \tilde{n}_{C \rho }\right)\mathcal{M}_{\rho,\; \lambda _k }^{\left(j-1\right)} \left(b_{-C},\left[k\right]\right)\; \label{anpic28}\end{aligned}$$ and $$\begin{aligned} &&\mathcal{M}_{-\rho,\; \lambda _k }^{\left(j\right)} \left(b_{-C},\left[k\right]\right) =\mathcal{B}_{C_{j-k}^{\prime},\rho_{j-k}^{\prime}}\left[q_{j},\ldots q_{j-k}\right] \mathcal{M}_{-\rho_{j-k}^{\prime},\; \lambda _k }^{\left(j-k\right)} \left(b_{-C_{j-k}^{\prime}},\left[k\right]\right)+ \nonumber\\ && +C_{j-k}^{\prime}\mathcal{N}_{-C_{j-k}^{\prime},\; \rho_{j-k}^{\prime}}\left[q_{j},\ldots q_{j-k}\right]\mathcal{M}_{-\rho_{j-k}^{\prime},\; \lambda _k }^{\left(j-k\right)} \left(b_{C_{j-k}^{\prime}},\left[k\right]\right)\;, \label{anpic28a}\end{aligned}$$ where $C_{j-k}^{\prime}=\left(-1\right)^{j-k} C, \rho_{j-k}^{\prime}=\left(-1\right)^{j-k}\rho, k<j$. With the help of Eq.(\[anpic14\]) we can obtain the recursion formulas for calculation matrix element (\[anpic25\]): $$\begin{aligned} && \mathcal{M}_{\lambda _{p},\;\lambda _{k}}^{\left(j\right) }\left(\left[p\right],\left[k\right]\right)= \nonumber\\ && =\sum_{\rho ,C =-1}^1 \mathcal{M}_{\lambda _p,\;\rho}\left(\left[p\right],b_{C}\right) \left[\left(q_{j}\cdot \tilde{b}_{-C}\right) \mathcal{M}_{\rho, \;\lambda _k }^{\left(j-1\right)} \left(b_{C},\left[k\right]\right)\right.- \nonumber\\ && \left.-C\;\left(q_{j}\cdot \tilde{n}_{C \rho }\right)\mathcal{M}_{\rho,\; \lambda _k }^{\left(j-1\right)} \left(b_{-C},\left[k\right]\right) \right]\;, \label{anpic27}\end{aligned}$$ and $$\begin{aligned} && \mathcal{M}_{\lambda _{p},\;\lambda _{k}}^{\left(j\right) }\left(\left[p\right],\left[k\right]\right)= \nonumber\\ && =\sum_{\rho ,C =-1}^1 \mathcal{M}_{\lambda _p,\;\rho}\left(\left[p\right],\;b_{C}\right)\left[\right. \mathcal{B}_{C_{j-k}^{\prime},\rho_{j-k}^{\prime}}\left[q_{j},\ldots q_{j-k}\right] \mathcal{M}_{-\rho_{j-k}^{\prime},\; \lambda _k }^{\left(j-k\right)} \left(b_{-C_{j-k}^{\prime}},\left[k\right]\right)+ \nonumber\\ && +C_{j-k}^{\prime}\mathcal{N}_{-C_{j-k}^{\prime},\; \rho_{j-k}^{\prime}}\left[q_{j},\ldots q_{j-k}\right]\mathcal{M}_{-\rho_{j-k}^{\prime},\; \lambda _k }^{\left(j-k\right)} \left(b_{C_{j-k}^{\prime}},\left[k\right]\right)\left.\right]\;. \label{anpic27a}\end{aligned}$$ We have obtained that the matrix element (\[anpic25\]) can be represented as a combination of the scalar functions $\mathcal{B},\mathcal{N}$, decomposition coefficients $\mathcal{M}_{\lambda _p,\rho}\left(\left[p\right],b_{C}\right)$ and lower order matrix elements. Photon emission --------------- Let us consider the matrix element where photon with momentum $k$ and helicity $\sigma=\pm 1$ emission occurs from the incoming electron $$\begin{aligned} && \mathcal{M}_{\lambda _2,\;\lambda _1} \left( \left[p_2\right],\left[p_1\right]; Q\;Z_{k} \right) = \bar{u}_{\lambda _{2}}\left( p_2,\;s_{p_2}\right) Q\;Z_{k} \;u_{\lambda _1}\left(p_1,\;s_{p_1}\right) ~~\mbox{with} \label{fot1}\\ &&Z_k=e\; \frac{\left(\slash{p}_{1}-\slash{k}+m\right)\slash{\varepsilon }_{\sigma}\left(k\right)}{\left(p_{1}-k\right)^{2}-m^{2}} \;.\label{fot2}\end{aligned}$$ Using the algebra of $\gamma$-matrix and Dirac equation the operator $Z_k$ can be rewritten as $$\label{fot3} Z_k=-e\;\left\{\frac{\left(p_1\;\varepsilon_{\sigma}\left(k\right)\right)}{\left(p_1\;k \right)}-\frac{\slash{k}\slash{\varepsilon }_{\sigma}\left(k\right)}{2\left(p_1\;k \right)}\right\}\;.$$ Now we get $$\begin{aligned} && \mathcal{M}_{\lambda _2,\;\lambda _1} \left( \left[p_2\right],\left[p_1\right]; Q\;Z_{k} \right) =-e\;\frac{\left(p_1\;\varepsilon_{\sigma}\left(k\right)\right)}{\left(p_1\;k \right)}\mathcal{M}_{\lambda _2,\;\lambda _1} \left( \left[p_2\right],\left[p_1\right]; Q \right)+ \nonumber\\ &&+\frac{e}{2\left(p_1\;k \right)}\mathcal{M}_{\lambda _2,\;\lambda _1}\left( \left[p_2\right],\left[p_1\right]; Q \;\slash{k}\slash{\varepsilon }_{\sigma}\left(k\right)\right)\;. \label{fot4}\end{aligned}$$ The recursion technique (see Eq.(\[anpic2\])) imply $$\begin{aligned} && \mathcal{M}_{\lambda _2,\;\lambda _1}\left( \left[p_2\right],\left[p_1\right]; Q \;\slash{k}\slash{\varepsilon }_{\sigma}\left(k\right)\right)= \nonumber\\ &&=\sum_{\sigma ,C =-1}^1 \mathcal{M}_{\lambda _2,\;\sigma}\left(\left[p_2\right],b_{C};Q\right) \mathcal{M}_{-\sigma, \lambda _1 } \left(b_{-C},\left[p_1\right]; \slash{k}\slash{\varepsilon }_{\sigma}\left(k\right)\right)= \nonumber\\ &&=\sum_{\sigma ,C =-1}^1 \mathcal{M}_{\lambda _2,\;\sigma}\left(\left[p_2\right],b_{C};Q\right) \Gamma_{\sigma,-\lambda _1}^{C,-1} \left[\slash{k},\slash{\varepsilon}_{\sigma}\left(k\right),T_{\lambda_1}\left(p_1, s_{p_1}\right)\right]\;,\label{fot5}\end{aligned}$$ where $$\label{toper1} T_{\lambda}\left(p, s_{p}\right) =\frac{ \slash{\xi}^{p}_{1}+ \slash{\xi}^{p}_{-1}\slash{\xi}^{p}_{1}/ m_p}{\sqrt{\left( \tilde{b}_{-1}\cdot \xi^{p}_{1}\right)}}\;$$ for fermion with arbitrary polarization vector (see Eq.(\[anpic8\])), $$\label{toper2} T_{\lambda}\left(p, s_{p}\right) =\frac{ \slash{p}+m_p}{\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}}\;$$ for fermion with $BDKS$ polarization vector (\[stp34aa\]), $$\label{toper3} T_{\lambda}\left(p, s_{p}\right)=\frac{ \slash{p}}{\sqrt{\left(p \cdot \tilde{b}_{-1}\right)}} \;$$ for massless fermion (see Eq.(\[anpic6\])). Let us consider initial massive fermion with $BDKS$ polarization vector in expression (\[fot5\]). After calculations, for the matrix element (\[fot1\]) with the $BDKS$ polarization state of initial fermion and helicity $\sigma$ of photon we have the exact formula in terms of lower-order matrix elements with operator $Q$ and scalar functions $\mathcal{B},\mathcal{N}$: $$\begin{aligned} && \mathcal{M}_{\lambda _2,\;\lambda _1}\left( \left[p_2\right],\left[p_1\right]; Q \;Z_k\right)= -e\;\frac{\left(p_1\;\varepsilon_{\sigma}\left(k\right)\right)}{\left(p_1\;k \right)}\mathcal{M}_{\lambda _2,\;\lambda _1} \left( \left[p_2\right],\left[p_1\right]; Q \right)+ \nonumber\\ &&+\frac{e}{2\left(p_1\;k \right)\sqrt{\left(p_{1}\;\tilde{b}_{-1}\right)}} \bigg[ \mathcal{M}_{\lambda_2,\;\lambda_1} \left(\left[p_2\right],b_{-1};Q\right) \mathcal{N}^{~k,~\varepsilon_{\sigma}\left(k\right),\;p_{1}}_{-1,-\lambda_{1}}+ \nonumber\\ &&+ \mathcal{M}_{\lambda _2,\;\lambda_1}\left(\left[p_2\right],b_{1};Q\right) \mathcal{B}^{~k,~\varepsilon_{\sigma}\left(k\right),\;p_{1}}_{-1,-\lambda_{1}} + m_{p_1}\left\{ \right. \mathcal{M}_{\lambda_2,\;-\lambda_1} \left(\left[p_2\right],b_{-1};Q\right) Y^{~k,~\varepsilon_{\sigma}\left(k\right)}_{-1,-\lambda_{1}} \nonumber\\ && +\mathcal{M}_{\lambda _2,\;-\lambda_1}\left(\left[p_2\right],b_{1};Q\right) X^{~k,~\varepsilon_{\sigma}\left(k\right)}_{-1,-\lambda_{1}} \left.\right\}\bigg] \;. \label{fot5a}\end{aligned}$$ Scalar functions $\mathcal{B}^{~k,~\varepsilon_{\sigma}\left(k\right),p_{1}}_{A,\;\lambda}$, $\mathcal{N}^{~k,~\varepsilon_{\sigma}\left(k\right),p_{1}}_{A,\;\lambda}$ are determined in terms of scalar product with the help of the Eqs.(\[bn3\])-(\[bn4\]) and scalar functions $X^{~k,~\varepsilon_{\sigma}\left(k\right)}_{-1,-\lambda_{1}}$, $Y^{~k,~\varepsilon_{\sigma}\left(k\right)}_{-1,-\lambda_{1}}$ are determined by Eqs.(\[anpic12new1\])-(\[anpic12new2\]). Scalar functions can be easily calculated in terms of physical vector components. Using a vector of polarization of a photon as Eq.(\[picc1b\]) we obtain simple result: $$\begin{aligned} && \mathcal{B}^{~k,~\varepsilon_{\sigma}\left(k\right),\;p}_{-1,\;-\lambda_1}= \sqrt{2}\;\sigma\left(p^{-}k_{T,\;\lambda_{1}} \left[\delta_{\lambda_{1},\;\sigma}-1\right]+k^{-}p_{T,\;-\sigma}\right)\;, \nonumber\\ && \mathcal{N}^{~k,~\varepsilon_{\sigma}\left(k\right),\;p}_{-1,\;-\lambda_1}= \frac{\sqrt{2}}{k^{-}}\left[p^{-} k_{T,-\lambda_{1}}k_{T,-\sigma} +k^{-}\left(\delta_{\lambda_{1},\;-\sigma}k^{+}p^{-}- \delta_{\lambda_{1},\;\sigma} p_{T,\;-\sigma} k_{T,\;-\sigma}\right) \right]\;, \nonumber\\ &&Y^{~k,~\varepsilon_{\sigma}\left(k\right)}_{-1,\;-\lambda_{1}}= -\sqrt{2}\;\lambda_{1}\;\delta_{\lambda_{1},\;-\sigma} k_{T,\;-\sigma}\;,\;~~X^{~k,~\varepsilon_{\sigma}\left(k\right)}_{-1,\;-\lambda_{1}}= -\sqrt{2}\;\delta_{\lambda_{1},\;-\sigma}\;k^{-}\;, \label{scalarfunct}\end{aligned}$$ where $$p^{\pm }=p^0 \pm p^z\;,\;~ p_{T,\;\lambda}=p^x+\mathrm{i}\;\lambda p^y\;. \label{index1}$$ The process $e^{+} e^{-} \to n \gamma $ --------------------------------------- Consider the process $$\label{anpic29} e^{+}\left(p_{2}, \sigma_{2}\right)+ e^{-}\left(p_{1}, \sigma_{1}\right) \to \gamma \left(k_1,\lambda_{1}\right)+\gamma \left(k_2,\lambda_{2}\right)+ \cdots +\gamma \left(k_n,\lambda_{n}\right),$$ where the momenta of the particles and spin numbers are given between parentheses. The Feynman diagrams of the processes (\[anpic29\]) contain the matrix element $$\begin{aligned} &&M_{\sigma _{2},\;\sigma _{1}}^{\left( \lambda _{1},\;\lambda _{2}, \ldots \lambda _{n}\right) }\left( p_{2},s_{p_{2}},p_{1},s_{p_{1}};k_{1},k_{2},\ldots k_{n}\right)= \nonumber \\ &&={M}_{\sigma _{2},\;\sigma _{1}}^{\left(n\right) }\left( \left[p_2\right],\left[p_1\right]\right)= \bar{\upsilon }_{\sigma _{2}}\left( p_{2},s_{p_{2}}\right) \slash{ \varepsilon }_{\lambda _{n}}\left( k_{n}\right) \cdots \nonumber \\ && \cdots \slash{\varepsilon } _{\lambda _{3}}\left( k_{3}\right) \frac{\slash{Q}_{2}+m}{Q_{2}^{2}-m^{2}} \slash{\varepsilon }_{\lambda _{2}}\left( k_{2}\right) \frac{\slash{Q} _{1}+m}{Q_{1}^{2}-m^{2}}\slash{\varepsilon }_{\lambda _{1}}\left( k_{1}\right) u_{\sigma _{1}}\left( p_{1},s_{p_{1}}\right)+\nonumber \\ &&+\left(n!-1 \right)\mbox{other permutations of} \left(1,2,\ldots, n\right)\;, \label{anpic20}\end{aligned}$$ where $$Q_{j}=p_{1}-\sum_{i=1}^{j}k_{i}\; . \label{anpic21}$$ Hence, we have that $$Z^{\left( n\right)}=\frac{\slash{Q}_{n}+m}{Q_{n}^{2}-m^{2}}\slash{ \varepsilon }_{\lambda _{n}}\left( k_{n}\right) \cdots \frac{\slash{Q} _{1}+m}{Q_{1}^{2}-m^{2}}\slash{\varepsilon }_{\lambda _{1}}\left( k_{1}\right) \label{anpic22}$$ and $$\begin{aligned} && {M}_{\sigma _{2},\sigma _{1}}^{\left(n\right) }\left(\left[p_2\right],\left[p_1\right] \right) \nonumber\\ && =\sum_{\rho ,C =-1}^1 \widetilde{\mathcal{M}}_{\sigma _{2},\rho}\left(\left[p_{2} \right],b_C; \slash{\varepsilon}_{\lambda _{n}}\left(k_{n}\right)\right) \mathcal{M}_{-\rho,\sigma _{1}}\left(b_{-C},\left[p_{1}\right]; Z^{\left(n-1\right)} \right) \label{anpic23}\;.\end{aligned}$$ Here $$\widetilde{\mathcal{M}}_{\sigma _{2},\rho}\left(\left[p_{2} \right],b_C; \slash{\varepsilon}_{\lambda _{n}}\left(k_{n}\right)\right) =\bar{\upsilon }_{\sigma _{2}}\left( p_{2},s_{p_{2}}\right)\slash{\varepsilon}_{\lambda _{n}}\left(k_{n}\right) u_{\rho}\left(b_{C}\right) \label{anpic23a}$$ and $$\mathcal{M}^{\left(n-1\right)}_{-\rho,\sigma _{1}}\left(b_{-C},\left[p_{1}\right]\right)=\mathcal{M}_{-\rho,\sigma _{1}}\left(b_{-C},\left[p_{1}\right]; Z^{\left(n-1\right)} \right) \;. \label{anpic23abc}$$ Using the expressions (\[pic16a\]) and (\[picc1b\]) we obtain, that (\[anpic23a\]) for $BDKS$ massive Dirac spinor (\[stp34aa\]) is determined by $$\begin{aligned} &&\widetilde{\mathcal{M}}_{\sigma _{2},\rho}\left(\left[p_{2} \right],b_C; \slash{\varepsilon}_{\lambda _{n}}\left(k_{n}\right)\right)= \nonumber\\ && =1/\sqrt{\left(p_2 \cdot \tilde{b}_{-1} \right)} \left.\bigg[\delta_{\sigma_{2},\;\rho} \left(\delta_{C,-1}X_{-1,\;\sigma_{2}}^{p_2,\;\varepsilon_{n}}+ \delta_{C,1}Y_{1,\;\sigma_{2}}^{p_2,\;\varepsilon_{n}}\right)\right. \nonumber\\ &&\left. -m\; \delta_{\sigma_{2},\;-\rho}\left(\delta_{C,-1}\left(\tilde{b}_{-1} \cdot \varepsilon_{n}\right)-\delta_{C,1}\left(\tilde{n}_{\sigma_{2}} \cdot \varepsilon_{n}\right)\right)\right] \label{lastmn}\end{aligned}$$ with $\varepsilon_{n}=\varepsilon_{\lambda _{n}}\left( k_{n}\right)$. The final recursion relation of the process (\[anpic29\]) with arbitrary helicities of the photons and $BDKS$ polarization states of positron is written as $$\begin{aligned} && {M}_{\sigma _{2},\sigma _{1}}^{\left(n\right) }\left(\left[p_2\right],\left[p_1\right] \right) =1/\sqrt{\left(p_2 \cdot \tilde{b}_{-1} \right)} \nonumber\\ && \left[X_{-1,\;\sigma_{2}}^{p_2,\;\varepsilon_{n}} \mathcal{M}_{-\sigma_{2},\sigma _{1}}^{\left(n-1\right)}\left(b_{1}, \left[p_{1}\right]\right)+ Y_{1,\;\sigma_{2}}^{p_2,\;\varepsilon_{n}}\mathcal{M}_{-\sigma_{2},\sigma _{1}}^{\left(n-1\right)}\left(b_{-1}, \left[p_{1}\right]\right) \right.\nonumber\\ && \left.+m\;\left(\left(\tilde{n}_{\sigma_{2}} \cdot \varepsilon_{n}\right)\mathcal{M}_{\sigma_{2},\sigma _{1}}^{\left(n-1\right)}\left(b_{-1}, \left[p_{1}\right]\right)+ \left(\tilde{b}_{-1} \cdot \varepsilon_{n}\right)\mathcal{M}_{\sigma_{2},\sigma _{1}}^{\left(n-1\right)}\left(b_{1}, \left[p_{1}\right]\right)\right)\right] \;, \label{finalres}\end{aligned}$$ where (see Eq.(\[anpic27\]) and Eq.(\[anpic27a\])) the matrix element $\mathcal{M}_{-\rho ,\sigma _{1}}^{\left( j\right) }\left( b_{-C},\left[ p_{1}\right] \right)$ with arbitrary polarization vector of electron is calculated by means of the recursion formula $$\begin{aligned} &&\mathcal{M}_{-\rho ,\sigma _{1}}^{\left( j\right) }\left( b_{-C},\left[ p_{1}\right] \right) =\frac{1}{Q_{j}^{2}-m^{2}}\left\{ {}\right. \nonumber \\ &&m\left[ {}\right. \left( \varepsilon _{j}\cdot b_{-C}\right) \mathcal{M} _{-\rho ,\sigma _{1}}^{\left( j-1\right) }\left( b_{-C},\left[ p_{1}\right] \right) -C\;\left( \varepsilon _{j}\cdot n_{C\rho }\right) \mathcal{M} _{-\rho ,\sigma _{1}}^{\left( j-1\right) }\left( b_{C},\left[ k\right] \right) \left. {}\right] + \nonumber \\ &&+Y_{C,\rho }^{Q_{j},\varepsilon _{j}}\mathcal{M}_{\rho ,\sigma _{1}}^{\left( j-1\right) }\left( b_{C},\left[ p_{1}\right] \right) +C\;X_{-C,\rho }^{Q_{j},\;\varepsilon _{j}}\mathcal{M}_{\rho ,\sigma _{1}}^{\left( j-1\right) }\left( b_{-C},\left[ p_{1}\right] \right) \left. {}\right\} \;. \label{anpic24x}\end{aligned}$$ Summary and Acknowledgements ============================ In present paper we have formulated a new effective method to calculate the Feynman amplitudes for various processes with fermions of arbitrary polarizations. In our method it is much easier to keep track of partial results and to set up recursive schemes of evaluation which compute and store for later use subdiagrams of increasing size and complexity. In our approach of the matrix element calculation: 1 : we don’t use an explicit form of Dirac spinors and $\gamma$–matrices 2 : we don’t use the calculation of traces 3 : as well as in the trace methods the matrix element of Feynman amplitudes is reduced to the combination of scalar products of momenta and polarization vectors. 4 : Unlike spinor technique in different variants [@Berendz]-[@Zhan] in this method we don’t use either Chisholm identities, or the presentation of the contraction $\slash{p}$ with four vector $p$ and of the polarization vector of bosons through the Dirac spinors. 5 : Unlike `WvD` technique [@Giele],[@Dittmaier] in this method we don’t use special Feynman rules for calculating of the matrix elements. 6 : Expression for matrix element calculates $\mathcal{M}_{\lambda _p,\lambda _k} \left(p,s_p,\; k,s_k\; ;Q\right)$ (\[anpic1\]) for all values $\lambda _p, \lambda _k$ simultaneously. The recursive algorithms can be easily realized in the various systems of symbolic calculation (Mathematica, Maple, Reduce, Form) and in such packages as `FeynArts` [@FeynArts], `FeynCalc` [@FeynCalc], `HIP` [@hip] and so on. I would like to thank organizers for warm an kind hospitality throughout the Conference. Also I want to thank A.L. Bondarev for his useful remarks and discussion. [99]{} J.L. Powell, Phys. Rev. **75**,  32  (1949). M.V. Galynskii, S.M. Sikach, Phys.Part.Nucl.**29**,469 (1998); Fiz.Elem.Chast.Atom.Yadra **29**, 1133  (1998) \[arXiv:hep-ph/9910284\]. A.L. Bondarev , arXiv:hep-ph/9710398. F. Caravaglios, M. Moretti, Phys. Lett. **B358**, 332  (1995). A. Kanaki and C.G. Papadopoulos, Comput. Phys. Commun. **132**, 306  (2000). E. Bellomo, I1 Nuovo Cimento. Ser.X **21**, 730  (1961). A.A. Bogush, F.I. Fedorov,  Vesti AN BSSR, ser.fiz.-m.n. **N 2**, 26 (1962) (in Russian). A.A. Bogush,  Vesti AN BSSR, ser.fiz.-m.n., **N 2**, 29  (1964) (in Russian). J.D. Bjorken and M.C. Chen, Phys.Rev. **154**, 1335  (1966). H.W. Fearing, R.R. Sillbar, Phys.Rev. **D6**, 471  (1972). F.I. Fedorov, Izvestiya Vyzov. Fizika, **N 2**, 32  (1980) (in Russian). M. Caffo, E. Remiddi, Helvetica Phys. Acta. **55**, 339  (1982). R. Vega and J. Wudka, Phys. Rev. **D53**, 5286 (1996); *erratum* Phys. Rev. **D56**, 6037 (1997). F.A. Berends, P.de Gausmaeceker, R. Gastmans, R. Kleiss, W.Troost and Tai Tsun Wu, Phys.Lett. **B103** 124 (1981). G.R. Farrar and F. Neri, Phys. Lett. **130B**,  109 (1983). R. Kleiss, W.J. Stirling, Nucl. Phys. **B262**, 235 (1985). Zhan Xu, Da-Hua Zhang, and Lee Chang, Nucl.Phys. **B291**, 392 (1987). F.A. Berends and W.T. Giele, Nucl. Phys. **B294**, 700 (1987). F.A. Berends, P.H. Daverveldt, and R. Kleiss, Nucl. Phys. **B253**, 441  (1985). R. Kleiss, Z.Phys.C. **33**, 433 (1987). S. Dittmaier, Phys. Rev. [**D59**]{}, 016007 (1999). K. Hagiwara, D. Zeppenfeld, Nucl. Phys. **B274**, 1 (1986). T. A.-Gongora, R.G. Stuart, Z.Phys. **C42**, 617 (1989). V.V. Andreev, Phys.Rev. **D62**, 014029 (2000). E.N. Argyres, C.G. Papadopoulos, Phys. Lett. **B263**, 298 (1991). A. Ballestrero and E. Maina, Phys. Lett. **B350**, 225  (1995). H. Murayama, I. Watanabe and K. Hagiwara, KEK-91-11. H. Tanaka, Comput.Phys.Commun. **58**, 153 (1990). T. Stelzer and W.F. Long, Comput. Phys. Commun. **81**, 357 (1994). M. Moretti, T.Ohl and J.Reuter, arXiv: hep-ph/0102195. J. Küblbeck, M. Böhm, and A. Denner, Comp. Phys. Commun. **60**, 165 (1990). T.Hanh, arXiv: hep-ph/0406028 A.E. Pukhov et al., Preprint INP MSU 98-41/542 (1998); hep-ph/9908288. P.S. Cherzor, V.A. Ilyin, A.E. Pukhov, hep-ph/0101265. F. Krauss, R. Kuhn and G. Soff, JHEP [**0202**]{}, 044 (2002); \[arXiv:hep-ph/0109036\]. M. L. Mangano, M. Moretti, F. Piccinini, R. Pittau and A. D. Polosa, JHEP **0307**, 001  (2003); \[arXiv:hep-ph/0206293\]. E. Accomando, A. Ballestrero and E. Maina, Comput.Phys.Commun. **150**, 166 (2003); \[arXiv: hep-ph/0204052\]. Dittmaier S. and Roth M.  Lusifer: a Lucid approach to SIx-FERmion production// \[e-Print Archive:  hep-ph/0206070\]. R. Harlander and M. Steinhauser, Preprint TTP98-41, BUTP-98/28 1998; \[arXiv: hep-ph/9812357\]. V.V. Andreev, Physics of At.Nuclei V.**66**, N **2**. 2003 P.383-393. V.V. Andreev, Nucl.Instr.&Methods in Phys.Research **A502** N.2-3, 607 (2003). J.D. Bjorken and S.D. Drell, *Relativistic Quantum Mechanics*. McGraw-Hill, New York, (1964). V.I. Borodulin, R.N. Rogalyov, and S.R. Slabospitsky, Preprint IHEP 95-90, (1995); \[arXiv:hep-ph/9507456\]. R. Mertig, M.Böhm, and A. Denner, Comp. Phys. Commun. **64**, 345 (1991). E.Yehudai, Preprint Fermi-Lab-Pub-92/22-T (1992). [^1]: : **[email protected]**
{ "pile_set_name": "ArXiv" }
Toad Fishing for Basshttp://toadproducts.com If we are not in we are at the LakeFri, 24 Jun 2016 16:07:40 +0000en-UShourly1https://wordpress.org/?v=4.5.13Keep Fit for Fighting the Fish: Stay in Shape with Exercises for Fishinghttp://toadproducts.com/keep-fit-for-fighting-the-fish-stay-in-shape-with-exercises-for-fishing/ http://toadproducts.com/keep-fit-for-fighting-the-fish-stay-in-shape-with-exercises-for-fishing/#respondFri, 24 Jun 2016 16:06:15 +0000http://toadproducts.com/?p=39Any activity can be a strain on your body, fishing is no exception. Whether you are working the line, repeatedly casting, moving kit, starting the boat, all of this has the potential to cause injury putting you on the side line for a few weeks, if not months. Your best chance of beating injury is prevention, rather than cure (although we know plenty of people that swear by Inversion Tables to keep them in shape). The trick to keeping yourself in shape is constancy, do a little exercise, a few stretches and some weights regular and you will easily stay in shape. think of myself as a fairly fit guy. But I have had my share of bumps and bruises along the way. One season I felt the crippling effects of “flippers elbow.” Being a dyed-in-the-wool largie guy, a reliance on this particular technique – and the repetitive motion it involves – left me with a taped up elbow, on pain meds, and barely able to lift my prized flipping stick for a few weeks. That was a tough pill to swallow. Last year came more news. Having had pain in my left shoulder since Christmas, a visit to the doctor and an ultrasound gave me the answers. I was diagnosed with calcific tendinosis of the supraspinatous tendon causing mild impingement. I also had thickening of the subacromion and subdeltoid bursa. It all became clear what the route cause of this was after my first visit to my physiotherapist. Her words still ring in my head over a week later: “you have terrible posture!” Combine that “terrible posture” with 23 years of working a tiller motor, and over time, the injury has manifested itself. The thickening of the muscle was a clear sign of how much strain is put on the shoulder from repeated turns of an outboard – year in and year out. Fortunately, an injury of this type can be corrected through strength conditioning and working the muscles and tendons in different angles. Luckily, bass season was still five months away! These two stories are meant to illustrate how important staying in shape is, and how being conscious of correct body posture and alignment, while utilizing workouts gear towards strengthening and stretching exercises, can lead to a risk-free and more enjoyable time on the water. Start Small Take a look in the mirror and eye up your posture. After talks with my physiotherapist, bad posture is one of the leading causes of injury and soreness. It takes a conscious effort to correct this one, but once you do, the change you feel is immeasurable. As anglers, we utilize a lot of movement when working a boat or casting a line. Get into the habit of stretching before each fishing trip, and again at the end. This will help in loosening up muscles, and will lessen the chance of strain. Work on the key muscle groups. Shoulders, forearms, and abdominal all come into play when casting. Legs take a beating when working trolling motors and through hours of standing. Weight lifting, daily walks, and yoga can all help in strengthening key body parts, while improving stamina and ability. Eat healthy. Not only at home but in the boat. Long gone are the days of chips, pop, and chocolate bars in my boat. Adequate water, healthy snacks, and a nutritious meal will not only make you feel better, but also perform better. Make this season the one that change happens in your life. An ounce of prevention is truly worth a pound of cure. * Please consult with your physician before beginning any fitness or weight lifting plan or activity. ]]>http://toadproducts.com/keep-fit-for-fighting-the-fish-stay-in-shape-with-exercises-for-fishing/feed/0Bright Blue Line ID Identifies Braided Fishing Linehttp://toadproducts.com/bright-blue-line-id-identifies-braided-fishing-line/ http://toadproducts.com/bright-blue-line-id-identifies-braided-fishing-line/#respondSun, 12 Jun 2016 15:00:11 +0000http://toadproducts.com/?p=308 Fishing Line Identifiers for 10-80 Pound Braided Fishing Line. Toad Product’s innovative Fishing Line Identifiers easily attaches to the handle of your rods and is a quick and easy way to identify and remember what type of line and size you have spooled on your reel. Many anglers carry multiple rod/reel combinations in their rig for a variety of fishing applications. These applications require specific line type and line size and our Line Identifiers are a great tool to remind the angler what line is currently spooled. For most anglers it is nearly impossible to remember what size and type of line is spooled especially when using Monofilament and Fluorocarbon as they look exactly alike. And try remembering the size of line on your spool! The difference between 12lb and 15lbs test is hard to decipher with the naked eye and the right line size could make all the difference between catching and landing that trophy fish. Plus our Fishing Line Identifiers can provide a simple way to manage your line allowing you to remember what line is old and fresh. This will allow you to replace line only when needed saving you $$. (tip; place band on butt of the rod for new line, older line place band up near the handle). Our Fishing Line Identifiers are a solution anglers have been searching for decades. Simple, durable and long lasting, our I.D. Bands are the solution to manage your fishing line. ]]>http://toadproducts.com/bright-blue-line-id-identifies-braided-fishing-line/feed/0Stealth Flipping Jighttp://toadproducts.com/stealth-flipping-jig/ http://toadproducts.com/stealth-flipping-jig/#respondSun, 12 Jun 2016 14:58:48 +0000http://toadproducts.com/?p=28Similar to our Barrel Head Jig, our new Stealth Flipping Jig is designed to hook the fish in the roof of the mouth resulting in more landed fish. Its unique head design slips through cover like no other heavy cover jig and does not roll over resulting in a more life-like presentation and less snags. We are so confident that you will catch more fish with our Stealth Flippin Jigs, we will refund your money if you are not completely satisfied. Designed with an extra large 5/0 Mustad Flippin hook, the Stealth Jig is available in 3/8 and 1/2 oz sizes and available with eight different skirt colors. ]]>http://toadproducts.com/stealth-flipping-jig/feed/0Bass Fishing Newsletterhttp://toadproducts.com/bass-fishing-newsletter/ http://toadproducts.com/bass-fishing-newsletter/#respondSun, 12 Jun 2016 14:49:19 +0000http://toadproducts.com/?p=23When do you use monofilament vs. fluorocarbon vs. braid? With all the different types of fishing lines available it is difficult to know what line to use for each lure type and water conditions. For years, millions of Bass were caught using only monofilament but today you put yourself at a disadvantage if you stay with one type of line. There are three basis line types; monofilament, fluorocarbon and braid/superline. In the world of Bass fishing, I am going to provide my reasons for choosing a specific line for the conditions and the techniques use to catch America’s # 1 game fish. Monofilament – Monofilament remains the number one choice by anglers although it is losing favor to fluorocarbon with many of today’s Professional Anglers. Monofilament has the most stretch of the all the types of lines and in some situations this is a huge benefit. Monofilament is king when fishing topwater baits as the stretch allows a slight delay in the hook set, giving the bass time to inhale the bait (or keeping you from pulling it away too fast). Plus monofilament floats unlike its counterpart, fluorocarbon, allowing topwater baits to work as designed. I still prefer monofilament for many fast action baits such as spinnerbaits, rattle traps, spoons and swimbaits. It is also great for pitchin and flippin in heavy cover. Key benefits of monofilament are its’ low cost, ease of use and long lasting. Monofilament is a supple line that is easy to cast and has minimal memory (small loops created from the reel spool after use) allowing the angler to cast longer and more effectively. The knock on monofilament from today’s pros is it has too much stretch, visible (compared to fluoro) and in some applications, it’s floating properties – this line has gained popularity with many anglers because it is practically invisible to fish. The pros #1 choice for clear water, fluorocarbon has less stretch compared to monofilament providing better feel and hook ups when fishing deep water. Because the line sinks, it is a must when I am throwing crankbaits and jerkbaits to maximize their effectiveness. Both fluorocarbon and monofilament are great for heavy cover conditions, but I prefer fluorocarbon because the minimal stretch provides better feel and fluorocarbon is more abrasive resistant. The down side to fluorocarbon is the cost and longevity. At least twice the cost of monofilament, fluorocarbon creates a lot of memory after use and needs to be replaced more often. Some brands are more supple than others so trial and error may help you settle on a brand that meets your needs. Braid/Superline – there are many types of braided lines but they all are made of strands of fiber that create the toughest line in the industry. Manufacturers are able to create extremely fine diameters with enhanced strength resulting in 50 lb test line having the diameter of 12lb monofilament. Because of the toughness of the line and no stretch many anglers prefer for fishing in heavy cover, especially in stained water conditions. I use braid when I am fishing deep ledges in the summer in clear lakes and tie and 6-8’ fluorocarbon leader. This combo provides great feel and improved hook ups when fishing in 20 feet or more. It is also a good choice for a Carolina rig, with a fluorocarbon leader. The down side to braid is its’ poor casting performance and it is highly visible. Plus it is tougher on your equipment (guides, reel gears) than the other styles. Other Considerations – Knots are an important part of your fishing day and learning specific knots for each type of line is critical. I use the Polamor knot for all of my monofilament needs. This knot is OK for fluorocarbon but I would recommend upgrading for better results. I use a Double San Diego knot for fluorocarbon and in my testing this knot is far superior that the Polamor. Braided line has the worst reputation with knot strength and many anglers will not use because of this problem. Many anglers use super glue to ensure the knot will not slip. I recommend the snell knot or whip finish knot for braided line (no need for glue). ]]>http://toadproducts.com/fishing-line-identifier/feed/0Bass Fishing Jig – Barrel Head Jig Advantages vs. Football Jigshttp://toadproducts.com/bass-fishing-jig-barrel-head-jig-advantages-vs-football-jigs/ http://toadproducts.com/bass-fishing-jig-barrel-head-jig-advantages-vs-football-jigs/#respondSun, 12 Jun 2016 14:26:15 +0000http://toadproducts.com/?p=14Barrel Head Jig is the most revolutionary jig in the industry today. Our innovative design will result in more landed fish for fisherman of all skill levels. Our jig design is so advanced we guarantee you will hook the fish in the roof of the mouth or we will refund your money! Our unique head design stands up in the mouth of the fish and does not roll over like traditional jigs resulting in more landed fish. The Barrel Head Jig has incredible life-like action as the jig falls naturally without spiraling (like football jigs) resulting in more strikes plus our jig is extremely weedless outperforming traditional football and round head jigs as a result of the unique wide head design. The jig slips through rocks with ease and does not roll over when pulled through brush, cables and other debris. Barrel Head Jigs are designed with extra large 5/0 Mustad® ULTRA-POINT™ Hooks and 54 strand life-like skirts with easy on-easy off rattle system. The Barrel Head Shakey Head models are designed with a heavy-duty built-in screw-loc for securing your favorite plastic bait and we offer a Heavy Weight design in two sizes for over-sized plastics when fishing deep ledges.
{ "pile_set_name": "Pile-CC" }
The father of a motorcyclist who died after a crash believes hospital staff mutilated his son's body and stole his heart. John MacKenzie has been battling for more than 25 years to try to expose what he claims is a coverup by Tauranga Hospital and other government agencies. "They illegally mutilated his body to plunder and steal his heart," Mr MacKenzie told The Dominion Post. "You'd be absolutely shocked out of your brain if you knew the extent they have covered this up." Kenneth MacKenzie, 20, suffered serious head injuries when he crashed his motorbike in October 1987. He was taken to Tauranga Hospital, and died when life support was switched off the next day. Despite his family refusing to authorise a transplant, his heart was removed and taken to Greenlane Hospital in Auckland, where one of its valves was successfully transplanted into a 16-year-old girl. It is unknown what happened to the rest of the heart. Evidence given at a High Court hearing in Wellington earlier this month confirmed that Greenlane Hospital at the time "actively encouraged" mortuaries to send it heart valves for transplants, and that "it was not usual practice for consent to be obtained from next of kin". Mr MacKenzie believes Kenneth's heart was removed at once, although the court judgment by Justice Robert Dobson, issued last week, says it could have been done 12 hours later during an autopsy. Yesterday, Mr MacKenzie recalled walking into the intensive care unit and seeing his son's body dressed in a clean shirt. "I couldn't believe it. He just looked like he was asleep." About an hour earlier, when other family members left the room, his son's clothing had been covered in blood. Mr MacKenzie believes it was then that hospital staff went against the family's wishes by switching off life support earlier than requested and removing his son's heart. "When I got there, the doctor was in my face and he wanted consent to take his heart. He looked blimmin' frightened when he saw me too. "And now, when I think about it, I know why he was frightened. He was looking for retrospective consent." According to the High Court judgment, which upheld an earlier decision to deny Mr MacKenzie civil legal aid, there was also "an issue" about whether a coroner actually authorised the autopsy and whether it was done to justify taking the heart. Mr MacKenzie began making inquiries of Tauranga Hospital from 2002. In 2005, a Tauranga pathologist, Dr Beer, told him natural heart valves were often sent to Greenlane, but the heart remained with the body. It was Dr Beer who said it was "not usual practice" to get consent from next of kin. "The logistics of confirming written consent . . . introduced a time delay that prevented the urgent delivery of the valve to Greenlane." The rules were changed at the beginning of 1989. Also in 2005, the National Donor Co-ordination Office in Auckland told Mr MacKenzie his son's death was before heart transplantation began in New Zealand. However, the Heart Valve Bank confirmed it received Kenneth's aortic heart valve and it had been successfully transplanted into a 16-year-old girl. Mr MacKenzie perceived that the inconsistencies in the explanations reflected an "intentional coverup of an unlawful taking of his son's heart", the judgment says. He complained about his son being mutilated by the autopsy, and said the absence of his heart had deprived his family of "an opportunity to properly grieve and to farewell their son in circumstances of dignity". He pointed out to the High Court that, when the practice of removing organs from dead babies and children at Greenlane came to light, their parents' claims were settled. However, he was still fighting to have his claims recognised. Justice Dobson's decision says: "Mr MacKenzie considers that all government agencies he has dealt with have deliberately obstructed his initiatives to get proceedings under way, because they appreciate the extent of the embarrassment and/or cost involved for the Government if and when the courts recognise his claim." Mr MacKenzie went to the High Court to appeal against a Legal Aid Tribunal decision to deny him legal aid to sue the Crown Health Funding Agency for damages. The agency denies any liability. Among the reasons given for refusing legal aid is that court proceedings were filed outside the six-year claim period.
{ "pile_set_name": "OpenWebText2" }
News:Cardinal Jorge Mario Bergoglio of Argentina, who will be known as Pope Francis, has been selected as Pope of the world's 1.2 billion Catholics. He is the first Pope from the Americas and the first from outside Europe in more than a millennium. A stunned-looking Bergoglio shyly waved to the crowd of tens of thousands of people who gathered in St. Peter's Square, marvelling that the cardinals had had to look to "the end of the earth" to find a bishop of Rome. He asked for prayers for himself, and for retired Pope Benedict XVI, whose stunning resignation paved the way for the tumultuous conclave that brought the first Jesuit to the papacy. The cardinal electors overcame deep divisions to select the 266th pontiff in a remarkably fast conclave. The 76-year-old was reportedly the runner-up to Benedict during the last conclave. He is well-known for his humility and espouses church teachings on homosexuality, abortion and contraception. He has no Vatican experience. Speaking to thousands of elated worshippers packed into St. Peter's Square, the new Pope said that the world should set off "on a path of love and fraternity," according to a translation provided by Reuters. He asked the faithful to pray to God for him. Noon is common to use when we don’t know the birth time. Noting the following quick details I am currently investigating a birth-time around 12:45pm. (**- amendment -with more information coming my way - his painful shyness,etc. I'm not yet certain of a birth time at all.) Personal Background (From Wikipedia):Jorge Mario Bergoglio was born in Buenos Aires, one of the five children of Italian immigrants. (This would fit nodes in either 4/10 or 3/9); his father Mario Jose Bergoglio was a railway worker (Sun in Sagittarius; nodes in the transportation sign axis, Saturn opposing Neptune in Virgo, perhaps 12/6) and his mother Regina Maria Sivori, a housewife (Ceres in Capricorn, perhaps in the 10th, –a traditional feminine role.) As a teenager, Bergoglio had a lung removed as a result of an infection. Chiron conjunct South node. (The 3rd house is the house of teenage years.) Note Chiron is in a t-square position to Neptune in Virgo opposing Saturn in Pisces. (The house positions of 6/12 are possible here, again supporting a 12:45 pm approximate birth time.)He studied and received a master's degree in chemistry (This is befitting for Neptune in Virgo in the 6th) at the University of Buenos Aires before he decided to pursue an ecclesiastical career.(Neptune in Virgo opposing Saturn in Pisces across the 6/12 house axis again fits well for the 12:45 pm birth-time estimate.) As cardinal, Bergoglio became known for personal humility, doctrinal conservatism and a commitment to social justice. A simple lifestyle contributed to his reputation for humility. He lived in a small apartment, rather than in the palatial bishop's residence. He gave up his chauffeured limousine in favor of public transportation, and he reportedly cooked his own meals. (Virgo on the 7th house cusp is suggestive of a presentation of humility to the public. He is said to be an advocate for the poor. He seems to have oriented to a more common than grandiose lifestyle “one like the rest of us”, Venus conjunct the moon in Aquarius, perhaps in the 11th. In choosing to live as a commoner not like a royalty – This could be suggestive of sun in the 10th rather than 9th house. The choice to live in small apartment, the self sufficiency of cooking for himself, a request that he not have new robes but wear the old ones – all are indicative of the Saturnine/Capricorn influences, Uranus in Taurus retro in the 2nd (non traditional, self sufficiency). In 2010, Bergoglio told biographer Sergio Rubin that he often sheltered people from the dictatorship on church property, and on one occasion gave his identity papers to a man who looked like him, to enable the recipient to flee Argentina. (Chiron conjunct S. Node; this could either fit a 3rd or 4th house placement.) His views on abortion and gay marriage follow the Catholic conservative stance, but he is said to advocate more tolerance for gay people. (suggestive of Chiron/south node in the 3rd. Jupiter in Capricorn conjunct Ceres in Capricorn; Mercury in Capricorn – all are indicative of conservative attitudes, doctrine, administration. Controversy (from Wikipedia):On 15 April 2005, a human rights lawyer filed a criminal complaint against Bergoglio, as superior in the Society of Jesus of Argentina, accusing him of involvement in the kidnapping by the Navy in May 1976 (during the military dictatorship) of two Jesuit priests. The priests, Orlando Yorio and Franz Jalics, were found alive five months later, drugged and semi-naked. Yorio accused Bergoglio of effectively handing them over to the death squads by declining to tell the regime that he endorsed their work. Jalics refused to discuss it after moving into seclusion in a German monastery. Horacio Verbitsky, an Argentine investigative journalist and author, wrote a book about this and other related events titled El Silencio: de Paulo VI a Bergoglio: las relaciones secretas de la Iglesia con la ESMA.According to the book, after their release, Yorio accused the then Provincial of his Jesuit order San Miguel, Jorge Mario Bergoglio, to have denounced him. Father General Pedro Arrupe in Rome was informed by letter or during the abduction, both he and Orlando Yorio were excluded from the Jesuit Order. According to his own testimony in his autobiography, after the priests’ imprisonment, Bergoglio worked behind the scenes for their release; his intercession with dictator Jorge Rafael Videla on their behalf may have saved their lives. "The cardinal could not justify why these two priests were in a state of helplessness and exposed," according to Luis Zamora, who said that Bergoglio's testimony "demonstrates the role of the Church during the last military dictatorship. The actual birth time of Pope Francis has now been reported. It is 1:30 p.m., chart attached. The source for this birth time is this: Francis (Latin: Franciscus; born Jorge Mario Bergoglio; December 17, 1936 (birth time source: http://site.informadorpublico.com/?p=28001)) is pope of the Catholic Church, elected on March 14, 2013, and taking the regnal name of Francis, after St. Francis of Assisi. He is the first Pope born in the Americas. This is yet another remarkable 'proving' of JWG's Evolutionary Astrology in that , as you will notice, that this Pope has his S.Node in Gemini in the 3rd which is conjunct his Chiron, and these then square his natal Saturn in Pisces in the 12th which is ruled by Neptune in Virgo in his sixth house. Here we can see right away his natural orientation to the 'poor, the needy, the downtrodden, and the persecuted'. His S.Node, Chiron, and Neptune are all ruled by his natal Mercury in Capricorn in his 10 House: his message to the world about this group of people. And on the very day he was elected to be Pope the transiting PLUTO WAS CONJUNCT THAT MERCURY ! And for all of you who have been reading the thread we had been doing on the asteroid Lucifer you will notice that this Pope has natal Lucifer in Virgo: the inner spirit of God within his having him focus on the poor, downtrodden, the needy, and the persecuted. And, yes, this is also ruled by her natal Mercury. This Lucifer is in his 5th and thus will correlate to him creatively actualizing himself as the Pope through and because of this message, the very message of his mentor Saint Francis of Assisi. He will broadcast this message to the world: the Mercury ruler in his 10th. If anyone is interested in exploring Pope Francis chart further, from an EA point of view, please let me know. With his Moon and Venus in Aquarius in his 11th, and conjunct the S.Node of Neptune this Pope made indeed revolutionize in many ways the existing orientation and structure of the Church itself. It seems that time is such a factor with everyone lately. I don't know exactly what I can commit to, but wouldn't mind saying I'd like to give the Pope a go. I have to leave town next week, but am up to the challenge of trying to put something together before I go. What stage would you say this Pope is? Might he actually be a spiritual stage Pope? Thanks for hunting down the exact birth time. The JWG EA in his chart is all confirming. What is incredible about this Pluto transit is that on March 13, the day of the election, Pluto was not only conjunct his Mercury it was exact TO THE MINUTE ...amazing..Mercury in Cap 11.20. Another aspect I noticed was his Psyche (Soul) - the search for soulmate union - his Soul totally committed to God and his Soul commitment to the down trodden, "the last shall come first" - Psyche in Virgo in the 6th and conjunct his Neptune, which is Jesus' Pluto, Neptune rules his 12th house Saturn in Pisces, same Saturn as Jesus. Below is part of an article released today where he is already being given a new nickname "the unpredictable pope" ~ perfect for his Pluto in Cancer, ruler Moon in Aquarius conjunct Venus in the 11th. Maybe by the time he exits this form he will have slid into the 1st stage individuated. He certainly has Aquarian tendencies in so many areas, just a bit too conservative in social issues. *** Pope Francis breaks the mould again with ceremony at prison instead of St Peter'sPope Francis, whose spontaneity has already earned him the nickname "the unpredictable Pope", will break with tradition again when he holds a major ceremony in a prison chapel rather than in St Peter's.Pope Francis, whose spontaneity has already earned him the nickname By Nick Squires, Rome 1:22PM GMT 21 Mar 2013 Francis, who has broken the mould with his informal approach and unscheduled walkabouts, will conduct next week's Holy Thursday service in a prison for young offenders on the outskirts of Rome. The service is normally held either in St Peter's Basilica or in the Church of St John in Lateran, which is the Pope's church in his capacity as Bishop of Rome. Instead Francis, who was the archbishop of Buenos Aires before being chosen as Pope in a secret conclave in the Sistine Chapel last week, will hold the service in the Casal del Marmo jail. There he is expected to wash and kiss the feet of 12 inmates, in a gesture that commemorates Jesus's humility towards his disciples before the Last Supper, on the night before he was crucified. His decision has surprised Vatican officials but is very much in keeping with his past in Argentina, where he washed the feet of Aids sufferers and met with street prostitutes. He often held Masses in the homes of seniors, and in jails and hospitals, traveled to work by bus and eschewed a grand residence in favour of a small apartment. *** Since I am already involved in the Darwin practice thread I may not have adequate time to actively participate here more extensively but am very interested and will follow closely if others are able. Hi RadIs it possible that the birthhtime given in that site is inaccurate? The article says the hour was obtained by rectification (even though it does not say the birthtime were not available). I happened to find a copy of the birth Act, which was posted by an Argentine astrologer. This document says 9 pm. I'm posting a copy of the said Act.God Bless, Gonzalo Thank you so much for doing the work to find the right birth time for Pope Francis. I went back to the site I posted earlier that claimed to have the right birth time to discover that they had posted yet another birth time for the Pope that was also wrong. I finally arrived at this site http://astrodatablog.blogspot.com/2013/03/pope-francis-new-astrology-data-and.html that actually had a picture of the same records of his birth time that you have posted. So, yes, it is a 9 p.m. birth: his correct birth chart attached. What I said above about his Soul orientation to the 'poor, the downtrodden, the persecuted, those in need' is even more so in this correct chart because the placement of his Nodes in the 12th/ 6th and the various planets and asteroids that are in his 6th House. The same signature of his natal Chiron conjunct his S.Node which squares in Neptune in Virgo, squares his Saturn in Pisces ruled by that Neptune, the ruler of S.Node and Chiron being Mercury of course in Capricorn, his message to the world about this group of people, and his election as Pope with Pluto transit exact to his Mercury obviously still applies. His Lucifer in Virgo in now in the 2nd which, to me, intensifies the God consciousness within his Soul relative to the 'resources' of not only the Church but all those that do not have enough personal resources to sustain effectively their own lives. And his Moon/ Venus in Aquarius in the 7th conjunct his S.Node of Neptune is ruled of course by his Uranus in Taurus in the 10th: his capacity to radically alter the message of the Church in now leads, and how that Church uses and commits its resources for others. Again, thank you Gonzalo for discovering the correct birth time. I am hoping that folks on the message board like Cat will want to discuss this, to me, very important Pope from an EA point of view. I'm glad the info is helpuful. It was not me who did the work to get this data. I just found it on facebook. I think it was an Argentine astrologer, Claudia Rizzi, who did the work to get the Birth Act, and then posted it. God Bless, Gonzalo The soul path of Pluto in the first house suggests a new evolutionary cycle has begun in recent lifetimes and that the individual is meant to continue along a pioneering and experiential path. Along with the Cancer, stepping backward to go forward archetype, Pluto in retrograde also suggests a re-visit and revision mandate. Retrograde motion serves to intensify and accelerate the individuation signature. The chief evolutionary drive is directed toward the development of an internally secure, self consistent, and self preserving emotional foundation. Because it is a relatively new evolutionary impulse, those with Pluto in Cancer have not yet fully learned these lessons. Reflected by one’s environmental circumstances and inner insecurities, unmet needs are a driving force in the current life. Difficult emotional and family histories exist within the subconscious and past life experiences of those with Pluto in Cancer. The soul will choose the family of origin and life experiences that will prompt the necessary internal probing. Pluto in Cancer is meant to learn that true security and emotional nourishment is found internally, not through the external environment or its trappings. Pluto in Cancer must learn to identify and supply their own emotional needs, to develop and establish an emotionally secure foundation within themselves. In order for this to occur, the individual is likely to experience cycles when support is lacking or needs are not met. The need to nurture or be nurtured has especially deep roots and is never really satisfied or quenched. These perpetuating desires and needs prompt the intended evolution. Regarding the chart of Pope Francis, this Pluto position describes both his personal life journey and what’s at issue for the Catholic Church itself and its followers. Pluto in retrograde intensifies the emotional journey and the desire to create a more secure and nurturing foundation. Intensified subjective exploration will allow for greater consciousness regarding the internal divides that are at the root of one’s insecurities, needs, and desires. Born into family of 5 children, it is logical to assume that this Pluto in Cancer did not get all of the nurturance that he may have desired. This early life set-up is a starting prompt for turning inward, for advancing the development of emotional self sufficiency. Note also the complex father signature of Saturn in opposition to Neptune in square to the lunar nodes. His father’s vocation of railway worker is described by this mutable configuration. The mother and nurturance imprint is represented by his Moon/Venus new phase conjunction square Uranus retrograde. While it is likely that he experienced loving and open-hearted relationships with maternal figures and caregivers, the Aquarius moon signature also suggests he has come in to this life with a degree of emotional objectivity and independence already developed. Both the Saturn configuration and Moon configuration describe the family’s immigrant background. Wikipedia quote: Bergoglio's sister María Elena told reporters decades later that her father often said that "the advent of fascism was the reason that really pushed him to leave" Italy. The sun is in Sagittarius and conjunct his north node which is ruled by Jupiter in Capricorn. This sun placement suggests he has come into this life with prior developed self knowledge that serves as a base for his decision making, judgement, and conviction. He will naturally utilize this knowledge as a foundation to build and solidify further. Ceres in new phase to Jupiter suggests he is endowed with a natural propensity for infusing new life into what has already been established. The pope has made it his own personal mission to rebirth the believer, to resurrect the faith within the faithful (Jupiter). The sun gives life to the Sagittarian qualities, experience, and the north node potentials. This Sun position suggests a natural sense of direction and purpose that will steer him readily to the experiences, circumstances, teachers, and teachings that will best facilitate his evolutionary path. This quality also allows him to be a strong guide for others. Both Chiron conjunct the south node and the sun in a fire sign on the north node are indicative of a special mission. He is likely to have always felt a strong sense of destiny and that he was meant to surrender himself for a bigger picture purpose. Cancer’s ruler, the moon, is in Aquarius and conjunct Venus. This suggests the native is developing more objective awareness and detachment. It is also suggestive of leading a life that personalizes the collective journey. Among it’s mainly correlations, Aquarius is a signature for select groups of society, from the elite, to the breakaways, marginalized, outcast, disenfranchised, or persecuted. Aquarius is also the sign of the humanitarian, of revolutions and revolutionary times. Pallas Athene in balsamic conjunction to his north node indicates one who is a fighter on behalf of social justice. This moon/Venus suggests he indeed has the potential to revive the church, to radically alter its direction, to utilize both the material and people resources of the church in a way that bears fruit. The south node in Gemini suggests this individual has sought to gather hands-on information, to learn, to become educated, and to look for rational explanations to quench his emotional thirst and to satisfy his own intellectual needs (Moon in Aquarius, ruler of Cancer). It is likely that he first approached studies in a systematic, rational, and scientific way. (His first vocational studies lead to certification as a chemical technician.) For his own internal security needs/base, he has sought to source from the authorities of the day, to explore as much as possible in order to develop a sense of absolute security (Mercury in Capricorn). He has looked to gather a rational explanation for his emotions, impressions, sensitivities, and insecurities, to gather information and experience that resonates with his emotional needs, wants, and values. As is implied in his Pluto position and the nodal axis in the mutable Gemini/Sagittarius axis, his investigation has been deliberate and conscious, and it has also been prompted by his instincts and subconscious emotional responses. Through such a quest comes social purpose and service (Neptune in Virgo opposing Saturn). Note the sun in Sagittarius conjunct the north node; his intuition’s prompt has led him to seek his answers and purpose within philosophical and religious literature. Mercury in Capricorn is the ruler of the south node and Chiron in Gemini; he has gravitated to the contemporary and traditional learning/teachings, one with set guidelines on how to live a spiritual life. This nodal axis chart signature and scholastic drive is well mirrored by his Jesuit background. The Jesuits, sometimes called “God’s Marines”, are well educated, intellectual researchers. They are expected to go anywhere and to live in extreme conditions if necessary. Throughout their history, they have fought for social justice. At times they were out of favour with the church (Saturn opposition Neptune; mutable cross). Mercury in Capricorn relative to Saturn in Pisces (a signature for religion and Christianity) is suggestive of a body of thought/knowledge that considers itself an ultimate authority on spiritual matters; an extension of god/god’s law on earth. Capricorn is also an archetype of right conduct, of judgement based on right and wrong standards, rules defined by man and society, and the guilt that this accrues within the crystallized consciousness. It terms of administrative involvement, he has assumed his leadership role as a Vatican outsider. He has been quoted as limiting his time in Rome to “lightening visits”. (Note Moon/Venus square Uranus retrograde; Venus and Uranus are in mutual reception.) He has already deviated from some formalities (Aquarius moon/Venus) and is already proving that he has new ideas for the stewardship of church. Will he change the status quo with respect to internal church governance? How will he address the internal alleged corruption? A south node in Gemini is one of a restless information quest. Relative to ruler Mercury in Capricorn, it suggests the continuous search for a right or definitive answer, for a missing key. He has sought diverse information and experience, yet there is an intuitive recognition (North node, Jupiter in Capricorn) that it is limited in scope. This restless urge suggests a core anxiety, a sense of knowing that there “must be more than this” (Sagittarius polarity.) When the nodes are in Gemini/Sagittarius, there is a conflict between the information intake and the intuitive, the left and right brain sensors, between what is learned and what is intuitively perceived. This nodal axis references a polarization between ideologies and truths, between formal education and intuitive knowledge, between the realm of appearances and the actualizing of reality. In other words, the mutable cross involving Neptune, Saturn, Chiron and the nodes is suggestive of spiritual dilemma. The Chiron archetype correlates to the split between the rational and the instinctual selves, between the flesh/body and the spirit. When Chiron is linked to the nodal axis, it is a signature of a specific karmic thread that is seeking integration and healing. It is indicative of living through exceptional circumstances in past lives and also of setting up the current life for something beyond the ordinary. Chiron’s balsamic relationship to south node is suggestive of a key lifetime, and a repetition of karmic dynamics. It is a relive, fruition, or relive/fruition signature. The sun’s conjunction to the north node doubles-up on the theme of a special karmic mission. The Sagittarius sun/north node opposition to Chiron points to a worldly mission with a potential to influence a multitude. A sense of destiny, déjà vu or familiarity accompanies the consciousness, the life. Whether sensed vaguely or recognized openly, parallels can be drawn to another lifetime. (There are a number of parallels to draw from the life of St. Francis too.) The native is likely to feel that something particularly significant and key is being repeated or revisited. Chiron is an archetype of the extraordinary messenger, of teachings, teachers, and a healing or healer’s path. Chiron is also a signature for controversy. Pope Francis was accused of not doing enough to save two Jesuits priests who were captured and tortured during Argentina’s “dirty war” in 1976. According to his biographer, he worked secretly behind the scenes (Neptune in Virgo) and may have been instrumental in gaining their release. Two days after he was elected pope, Franz Jalic, one of the two who were captured, issued a statement to clear the negative speculation on the pope. The pope has stated that during that time he was active in sheltering people on church property and that he once gave his own identity papers (Gemini south node) to a man who looked like him so that he could flee (Sagittarius) Argentina. Befitting of Neptune in Virgo opposing Saturn in Pisces, (from Wikipedia): In 2000, he asked the entire Church in Argentina to put on garments of public penance for the sins committed during the years of the dictatorship. In one of his last acts as head of the Argentine Catholic bishops' conference, Bergoglio issued a collective apology for the church's failure to protect its flock" from Argentina's military dictatorship decades earlier. Chiron retrograde in Gemini suggests he comes into this life with special gifts. He displays approachability, an easy communication style, and a ready emotional rapport, (Pluto in Cancer relative to south node/Chiron in the 3rd). His personable manner has already charmed the public. His fluency in Italian (his family of origin background; Sagittarius, language proficiency) has charmed the country. His natural humility (Neptune in Virgo), dismissal of formalities, ability to dissolve boundaries, (Saturn in Pisces), simple words, humour, casual, and spontaneous approach (Gemini/Sagittarius nodes; Moon/Venus in Aquarius) are already resulting in an excellent approval rating. Both personal and collective in nature, his Aquarius moon conjunct Venus alludes to significant trauma imprinting as part of his subconscious memory pool. Venus in square aspect to and mutual reception with Uranus retrograde in Taurus alludes to life and death struggles, and past epochs of persecution. At the age of 21, he suffered from life-threatening pneumonia and cysts and had part of one lung removed. Lungs are Gemini ruled (note Chiron/south node in Gemini, Mercury ruled by Saturn opposing Neptune in Virgo.) Chiron’s past life cellular memory traumas are often translated into the physical body as chronic conditions, physical weaknesses, diseases, or handicaps. We can speculate that the pope’s lung condition correlates to a past life trauma connected to unresolved grief or the wounds of a battle/invasion. One could also draw a speculative parallel to the concept of carrying stigmata – cellular memory wounds. Historians speculate that St Francis’ stigmata were the result of a chronic physical condition. Capricorn is the polarity point of Pluto in Cancer, suggesting the evolutionary intention is to arrive at a state of absolute emotional maturity and security, to become self referencing and self directed. The evolutionary imperative requires that he become his own authority, rather than to accept external authority or external answers. His philosophy of lead by example (Mercury in Capricorn, the effective administrator) has been demonstrated through out his career, and he has “hit the ground running” since he has been elected pope. The rulers of the nodes, Jupiter and Mercury in new phase to each other and the north node suggest that the past and future are intertwined, that new development/evolutionary progress has been recently occurred and that this lifetime is a continuation of that which has already begun. The sun on the north node also indicates a growth of consciousness of natural law, the “true way”. This consciousness is intuitive and in the process of developing self realization. Ceres in Capricorn situated between the rulers, ruled by Saturn in Pisces, suggests a fresh seed of God realization is stirring too. The nodal rulers in Capricorn suggest this a time is ripe moment not only for the Pope’s personal mission but also for the church’s rebirth. Sagittarius is an archetype of delivering the message to a ready and willing audience. To bring spiritual comfort and to champion the poor, the weak, the downtrodden, is not a new mission for the church, or for one on a spiritual path, but it is one that the Pope is revitalizing (nodal rulers in new phase aspect). As stated above, Jupiter in Capricorn is newly building, newly authenticating what it senses as truth, the true path. Pallas Athene in balsamic conjunction to the north node and also in gibbous phase to Chiron retrograde is suggestive of the spiritual warrior, of spiritual leadership, and of fighting for justice. Pallas Athene can also be correlated to third-eye consciousness. A gibbous phase references a path of service, and is also indicative of unfinished business. This Pallas/Chiron opposition is suggestive of championing the plight of the marginalized, the common folk, the disenfranchised, the “walking wounded”. Even so, when distorted, Gemini/Sagittarius is not an all encompassing polarity but one of selective reasoning, viewing, or targeting. It is not inclusive of the whole. The Capricorn archetype (both the south and node rulers) also correlates to conservatism and hypocrisy. Chiron is a signature for controversy. The pope is known for radical conservatism and seems to be somewhat evangelical in his zeal for taking up the plight of the poor, but he is not yet inclusive of all of humanity. Despite a suggestion for a level of tolerance for homosexuals, Pope Francis has already made his views crystal clear on gay marriage, gay adoption, abortions, contraceptives, and women in the church. The nodal axis and its rulers ignite a contradiction of expanding/broadening yet closed/walled/restrictive at the same time. Pluto in Cancer is still working on gender assignment issues. The issue of gender in-equality in the church is referenced by the Pope’s Pluto in Cancer, relative to Chiron in Gemini/south node. In accepting the director’s chair, the Pope also inherits the shameful and abhorrent sexual violations crises that have plagued the church throughout its history. This is described by Saturn’s gibbous opposition to Neptune in Virgo (victimization) in houses 8/2, both of which square the nodal axis and Chiron. As has been well documented, this crisis has always been rampant (Pisces to the mutable nodes), but it has been muffled, suppressed (Saturn; Mercury in Capricorn) and denied (Neptune in Virgo.) Saturn’s gibbous opposition to Neptune in Virgo suggests the unfinished business of reconciling with the masses and internal clean-up within the church. Greater accountability and atonement are a necessity. A purification process is stimulated by this mutable cross; open acceptance, tolerance, and forgiveness for all are also of the essence. At this early stage in his new role but advanced time in his career, he has not indicted a willingness to address change regarding gay marriage or women’s ordination. We have yet to see how the pope will address the church’s sex scandals. Chiron suggests wounds that never heal. Certainly those souls who have been violated will continue to carry deep scars. The church carries the scaring too. Chiron’s best cure is found through moving forward; the weaving or integration of experience into new experience eventual leads to healing. Experience is the best teacher. While the pope seems to enjoy being “in the trenches”, his life seems to have been one of a serendipitous flow into positions of influence. We can only assume that his influence will grow. Perhaps Chiron on south node and the last quarter phasal aspect (crisis in consciousness) between moon/Venus square Uranus retrograde will create the necessary circumstances to prompt the repair work regarding social imbalances (Mars in Libra, ruled by Venus.) True to the indirect nature of (Pluto in) Cancer and Chiron, perhaps he will come to face the more controversial of today’s issues surreptitiously. Hopefully he will not side-step them. These critical matters are the unfinished karma priorities of both Saturn and Neptune in square aspect to the nodal axis. Pope Francis was elected by his colleagues as Pluto was transiting his seventh house Mercury (ruler of south node/Chiron), and Ceres was transiting his south node. Among its many correlations, Ceres correlates to a theme of resurrection. There is great hope (Neptune; Pisces) pinned on this pope that he signals a new era (Capricorn) for the church, that he will plant a fertile seed (Ceres) and that it will produce a lush field. The south node in Gemini is suggestive of repetition or duplication, of things coming around twice. Interestingly, he was a top contender last conclave too, but begged not to be chosen. Saturn in gibbous opposition to Neptune in Virgo and square the nodal axis ignites the crisis of: “I’m not ready, this is too big for me”, a sense of being overwhelmed by the enormity of the job (Neptune square north node). We could surmise that the inner crisis might ignite a worry that the job could swallow him up and take him away from the personal one on one contact that seems to tug at his heart so deeply (Sun in Sagittarius, relative to Jupiter, relative to Saturn in Pisces). Although he may have not consciously intended to choose it, he has taken to is enormous leadership role displaying great natural grace and humility (Saturn in Pisces/Neptune opposition). Skipped Steps:There are two skipped steps in this chart. Saturn in Pisces finds resolution in the north node, facilitated by its ruler Jupiter in Capricorn (3/4 phase to Saturn, a wide quintile). Neptune in Virgo finds resolution via the south node and the south node ruler, Mercury in Capricorn (in ¼ trine to Neptune.) Saturn is in gibbous opposition to Neptune. Skipped steps represent critical thresholds/unresolved issues from the past that are of karmic priority/necessity. Saturn in Pisces is a signature for organized religion. Pisces is directly linked to Christianity. Saturn in Pisces is the ruler of the south node ruler (Mercury in Capricorn.) Pisces ruler, Neptune is in Virgo, which is ruled by Mercury in Saturn – a closed circuit. Mercury is in a ¼ trine to Neptune (an action aspect) and a last quarter sextile to Saturn. The last quarter sextile offers creative opportunity to reform internally; to rebuild the infrastructure of the system, to shift the crystallizations of the conditioned consciousness and to make effective change regarding the actual reality. Noting Saturn in Pisces, it would be natural to assume that in past lives as is also the case now that the native would have come to recognize the church’s teachings as the ultimate authority on spiritual matters, as embodying or being the definitive agent (Mercury in Capricorn) for god’s wishes on earth. Saturn in Pisces relative to Mercury in Capricorn, ruler of the south node, suggests that he is repeating a vocational path chosen in other lives. Relative to the south node information, we can surmise that there was a time he would have accepted the church as his ultimate authority, following the rules and surrendering himself (Saturn in Pisces) without question. This Saturn in Pisces suggests an unconscious projection/expectation that he could find security, peace, and ultimate fulfillment within church dogma; that he assumed he could get all his training, vocational and spiritual needs met in one place. He would expect that his training and the belief system was whole, complete, and perfect, that he would feel totally embraced, enveloped, and satiated within this organized whole. Saturn’s square to the nodal axis suggest reaching a conflict in this regard. The pope’s chart is also indicative of the contemporary state of affairs for both the church and for the masses. Relative to the north node information, there have likely been nomadic times of searching for god and truth on his own, of monastic or secluded lives, (Pisces, monasteries; Sagittarius & Chiron representing the solitary journey) and also secular ones of social “in the trenches” (Gemini south node, Moon/Venus in Aquarius). Saturn in square to the Gemini/Sagittarius nodes suggests that over time, exposure to actual reality would conflict with his conceptualization of reality and would start to disturb his inner peace. A spiritual crisis is ignited by this configuration. The skipped step reveals the conflict between embracing the teachings and witnessing the actualizing of those teachings. Perhaps he would have been exposed to “do as I say, not as I do” authority. Saturn is in ¾ square aspect to the south node in Gemini/Chiron conjunction. This crisis in consciousness pertains to the intake of information that intuitively feels contradictory or limited (s. node, ruler of south node Mercury in Capricorn). The observation of behaviour, experience, and lifestyle may not have been entirely in keeping with what he desired, or what perceived to be the true expression of Christ’s teachings (Pisces.) Instead he likely found himself exposed to what he perceived as duality, contradiction, untruths; an appearance of piety rather than true devotion. Materialism, self-serving, corruption and sexual scandal have been a large, and largely suppressed, component of the church’s history. Thus, the skipped step: a crisis in action/crisis in consciousness dilemma. The conditionings and crystallized judgements of prior lives are now at a critical threshold. For Saturn’s resolution, the north node in Sagittarius must be applied. The evolutionary intent in this signature is for the native to expand knowledge and experience outside the confines of a monastic life and church walls (Saturn in Pisces), to allow room for an exploration of that which he is intuiting, to allow room for growth of the impressions he is receiving, to allow himself to veer away from convention/tradition, from what was and is considered appropriate devotional service. Saturn’s first quarter square to the north node (crisis in action) suggests that growing perceptions lead him to question and explore beyond his formal training and knowledge base. Most likely he felt the calling of higher truths and the desire to expand his personal relationship to the divine. This expansion prompt likely led him to surrender to a path of service in a larger, broader format. To follow this yearning might have called for him to relinquish the trappings of the system in order to practice his faith in a more natural, active, daily, and direct contact way. What is right conduct and god’s will? Saturn in Pisces suggests an ideological and spiritual/philosophical conflict, that his ultimate sense of meaning was not quenched by the church’s doctrine, rules, methods, or traditions. This dilemma created/creates the needed to expand and explore beyond the confines of the organization. The skipped step suggests a flip/flop between rationalizing and justifying his experience, of following what he had been taught, and recognizing how far the vocational path had/has veered from the true path/true intention; that progressively he was growing more alienated from his training, and growing beyond the limited scope of the organized system. In other words, he would receive mixed messages from his own consciousness regarding what it meant to dedicate his life to his chosen path of service. By extension, his own spiritual dilemma personifies the work he has been called to do on behalf of the Catholic Church. Church policies, dualities, and controversies have alienated many would-be followers. It appears Pope Francis has made it his personal mission to be the ultimate sheepherder. Saturn is in a gibbous opposition to Neptune in Virgo, suggesting he has more work to do in reconciling with his inner perceptions and his outer experience; his conflict regarding his conditioning, his inner judge, his conscience, and his outer reality. He must also reconcile the masses perceptions of the inner and outer Church administrations. Neptune in Virgo is suggestive of a consciousness of natural humility, and an ultimate path of service. Neptune’s opposition to Saturn and trine to south node ruler, its own ruler, also suggest inner judgements (trine to Mercury in Capricorn), that can lead one to adopt and glorify spiritual masochism. This Saturn/Neptune opposes correlates to a crisis in faith, tests of faith. Following the indoctrination (Mercury in Capricorn) of the distorted Christian beliefs (Chiron conjunct the south node opposite Sagittarian north node) would have allowed for this native to embrace the ideology of personal denial, personal penance, suffering precluding enlightenment, and flesh as antagonistic to spirit (sexual abstinence.) In keeping with the contemporary values of the religion of the times, the popular view of the ultimate spiritual life is one of sacrifice and service. To relinquish worldly reward for spiritual reward is a classic foundation philosophy of man-made religion. Neptune’s skipped step is resolved through the south node in Gemini (Chiron retrograde balsamic conjunction.) Here we see the spiritual dilemma brought forward from past lives - the conflict of serving the religion (Sagittarius) or serving the people (Gemini), that has reached an extreme/a crisis point (the skipped step). Serving the religion or serving the people are not sufficiently synthesized, not yet one and the same thing. The south node relative to ruler Mercury engaged in a ¼ trine to Neptune is suggestive of the necessity to act on his inner messages/inner guide. It provides a sense of rightness of action in decision making, for rationalization or justification that allow for him to act in a self autonomous or take charge way. It provides him with the natural leadership skills to think and act independently, a natural propensity to see the flaws and to improve the system, rather than to follow a system that is not in keeping with what his inner consciousness (Neptune) suggests is the true path of service. The true path of service is one of fulfilling the true need, of helping the seeker and the needy, those in lack both spiritually and physically – i.e. the poor, the disenfranchised, the outcast, the marginalized, the sick or weak. And yet, as stated above, he has not yet found within his consciousness the ability to accept all, not all are considered worthy as of yet, (i.e. women in the church and homosexuals.) Part of the spiritual duality is that of glorifying one over another. (The poor are revered, but not “lepers” –in other words, the gays?) The rulers of the nodes conjunct in new phase aspect suggests he has recently begun and is continuing a new level of relying and acting on his own inner authority. He displays independence in simple and everyday routines by rejecting some of the perks afforded his position, the limousine, the gold cross, etc and insisting as he has done in the past, to take the bus, cook for himself, and so on. Since becoming pope, he has immediately veered away from formal expectations and is already doing it his way. This Neptune in Virgo also must reconcile with the imperfections of the organized whole and the concepts of perfection, purification, of deserving of god’s grace. These issues are confronted through the church itself, where he is exposed to opulence, controversy, duality, bigotry, and corruption within the organized whole. He must confront his own judgements/hypocrisy regarding right and wrong, on what is socially (Gemini) and morally (Sag/Cap) “correct”. Although Saturn in Pisces and Neptune in Virgo suggests compassion and tolerance for all, he is not yet encompassing the whole. He has taken on the ultimate service role on behalf of his faith, and is already showing independent leadership, but has yet to accept women into ordination, or to accept homosexuality as a natural state for some. The Sagittarian influence suggests an extremist tendency. This extremist philosophy may have created wounding/controversy for him in the past. Certainly the Catholic Church will not want to give away its wealth – or to come clean on all of its secrets. In addition to reformulating inner judgement, Mercury/Jupiter new phase is learning a new level of temperance or moderation. These issues are also the public’s conflicts with the church. Chiron is an outcast or scapegoat archetype. Relative to south node & ruler, it is a suggestion of tolerance and acceptance for some, but not all. Pluto in Cancer can be suggestive, (not always) of incest, of grooming of children; the Gemini archetype references youth. As of yet, we do not know if Pope Francis will avoid this problem, clean it up quietly, or champion it. Neptune in Virgo is a victimization archetype, and Chiron on the south node indicates repetition in terms of crisis and controversy, deep wounding from the past brought into this one. Neptune resolving through the south node/Chiron point is suggestive of again being confronted with crisis and dilemma which is seeking resolution. The south node work is to gather more information and experience. The increasing frequency, commonality and repetition of scandal and corruption is meant to force a confrontation with the rationalizations that have suppressed or denied the truth. Eventually, the native will no longer be able to divert attention off these critical issues. The south node calls for making connections with people and listening to their stories. Personal interaction with others will be a major teaching tool. Chiron/south node in Gemini/Sagittarius references transitional times. Looking back to other lives, Chiron in Gemini can reference times of inquisition. Sagittarius is an invasion archetype, and Capricorn is an archetype of dictatorship and regimes. Saturn opposing Neptune is also a signature of religious persecutions of the past. It is likely that past lives connected to missionary lives, such as that of St. Francis, times of Christian persecution, slavery, Spanish inquisition, migrations of peoples, etc. In addition to a religious focus on saving souls, the Neptune/Saturn, Gemini/Sagittarius signature can suggests past life involvement in secretly moving people to safety (the catacombs, secret passages, etc.) The south node in Gemini is suggestive of repetition or duplication, of things coming around twice. (Many parallels can be made to the life of St. Francis of Assisi too.) Interestingly he was a top contender last conclave too, but begged not to be chosen. Saturn in gibbous opposition to Neptune in Virgo and square the nodal axis ignites the crisis of: “I’m not ready, this is too big for me”, a sense of being overwhelmed by the enormity of the job (Neptune square north node). We could surmise that the inner crisis might ignite a feeling that the job could swallow him up and take him away from what he feels is the right work, the trench work – the personal one on one contact that seems to tug at his heart so deeply (Sun in Sagittarius, relative to Jupiter, relative to Saturn in Pisces). Yet, at the same time, he also senses his special mission (Chiron & Sun positions); he has been chosen, he has not chosen it for himself. The Chiron and sun positions also suggest, as he has already displayed, that he has taken to his enormous leadership role with natural grace and humility (Saturn in Pisces/Neptune opposition). I am running out of time. I wanted to go back through this and integrate phases but.... This is what I will have to leave you with. I am looking forward to reading what Rose posted today and hope by the time I return more people found time to put something together :-) cat Pope Francisdec 17, 19361:30 PmBuenos Aires Pluto Rx in Cancer in the 1st House. Here we have a soul who desires to return to its source and has chosen to evolve in an accelerated manner. The Soul is 3rd Stage Consensus and with Pluto Rx is now questioning the status quo in a manner reflective of one who is on the verge of becoming 1st stage individuated. Jorge Bergoglio came into this world with an instinctual feeling that he has a special destiny to fulfill. His soul's past intention and desire has been to discover something new and unique about himself while learning to find emotional security from within himself rather than from an external source. In order to discover and actualize his special destiny, Bergoglio pursued a career as a Jesuit priest and theologian in the Catholic Church. As a Jesuit he took vows of poverty, chastity, obedience and obedience to the Pope. These vows all served to make him self-reliant and self-sustaining in order to play his role and further his career. At key points in his life he would experience a crisis of consciousness in which he would question old beliefs, values and patterns and entertain the thought of new ones as his soul had begun the process of deconditioning itself. Bergoglio initiated a variety of relationships with like-minded individuals of the catholic faith through his role as a Jesuit priest. Many of these relationships were nurturing and humanitarian and would directly or indirectly help him advance to higher positions in the Catholic hierarchy. Eventually Bergoglio was able to actualize his special destiny and establish his authority within society by being elected Pope, the largest sociological role he can play within the context of society. With Uranus conjunct his MC, Bergoglio, as Pope Francis, is likely to have a unique approach to the Popehood which will reflect the needs of society and the need to break free of past conditioning patterns that are blocking or preventing growth on a humanitarian and social level. South Node conjunct Chiron in Gemini in the 12th house. South Node Ruler is Mercury in Capricorn in the 7th conjunct Jupiter in the 6th House. In the past the soul aligned itself with a transcendent belief system in order understand creation and in order to either seek help or heal others by sharing what it learned from its own painful experiences. The soul initiated a variety of relationships with a diversity of other people who had different ideas, opinions, values and beliefs in order to share and exchange information and ideas with them in order to learn about the culture and social reality it was part of. The soul was especially interested in the traditional beliefs and ideals of its culture and society, especially those of a religious, philosophical and/or cosmological nature. It is quite possible that the soul was a religious authority or leader on a global scale in the past. SN square Saturn in Pisces in the 8th House. SN square Neptune in Virgo in the 2nd. Saturn and Neptune are both square the Nodes. The soul has worked on issues pertaining to both nodes in the past but has not completely resolved these issues. The soul's inability to complete or resolve past issues pertaining to the nodes has resulted in skipped steps. In relation to Saturn square the Nodes, the soul failed to establish a life structure or career based on his own inner truth. Instead, the soul allowed parental and/or social expectations to guide him and influence his choices. The soul feared being judged and/or punished if he did not conform to parental or social expectations. In failing to follow his own inner truth and desires, the soul created an inner form of guilt that can only be atoned for by establishing a career or professional path in the current life that allows the individual's inner authority to manifest itself through a vocation or profession that enables the individual to become a natural authority in a paricular field that may or may not meet parental or social expectations. In relation to Neptune square the Nodes, the soul developed spiritual abilities in previous lives that were based on natural law. These spiritual abilities were contrary to patriarchal definitions of spirituality causing the soul a great deal of confusion in regard to his spiritual abilities. The soul may have felt guilty or even sinful in relation to his natural spiritual abilities and therefore avoided utilizing them. This avoidance made the soul feel bad about himself. This past spiritual confusion and guilt has carried over into the current life causing the individual a great deal of confusion in regard to the right spiritual path. South Node conjunct Chiron trine Mars in Libra in the 3rd House. Aries in the 9th House. The soul was a voice, or advocate, for truth, justice and equality in previous lives. Something happened at some point causing a wound or issues around the way in which he expressed his identity, sexuality, physical energy, anger and/or aggression. He had a tendency to take on the anger of others and speak out for them. It is possible that he became a victim, survivor or perpetrator of violence at some point in time. This ability to speak for others has been carried forth into the current life. According Dr Matthew Bunson in U.S. Catholic weekly, when speaking of Bergoglio's service in Argentina, he says that Cardinal Bergoglio served “as the conscience of the nation” and was a “very powerful and prophetic voice and an immensely popular one" who “proved very much a bridge-builder” among the different social classes in his homeland and in that sense “became the moral voice for the nation.” The South Node conjunct Chiron is sesiquadrate Venus in Aquarius in the 7th House. In previous lives the soul initiated all kinds of relationships with different types of people who represented a diversity of ideas, values and lifestyles. Through these relationships the soul learned to evaluate himself as an individual by comparing and contrasting himself with others. He rebelled against consensus value systems and challenged the socially defined way of relating and being involved with others. At some point in time he developed a wound in the area of relationships. He may have been wounded or may have taken on the wounds of others. In any case, he suffered a wound to the heart. Pluto's Polarity Point is in Capricorn in the 7th House. The soul's current intention and desire is for the individual to establish himself as an authority amongst a large and diverse group of like-minded people. Jorge Bergoglio succeeded in actualizing the Polarity Point by becoming the Pope Francis - the leader of Catholics throughout the world. North Node conjunct the Sun in Sagittarius in the 6th House. North Node Ruler is Jupiter in Capricorn in the 6th house. Jupiter is conjunct Mercury in Capricorn in the 7th House. In order to actualize Pluto's Polarity Point and establish himself as an authority amongst a diverse group of like-minded people, the individual has been drawn to serving others. As already discussed, the soul worked on issues related to both nodes in the past so this work began in the past and carried forth into the current life. In the current life, the individual's purpose and reason for being is to serve others through a traditional religious, philosophical or cosmological vocation or role. Through his work, the individual will learn lessons in personal humility, self doubt, discrimination, purification and self improvement. This purpose was actualized and fulfilled by the individual who spent many years as a Jesuit Priest before moving up along the Catholic Hierarchy and eventually being elected Pope. The NNR, Jupiter in Capricorn in the 6th house, show a need to serve as a religious or moral authority on a global scale. The Jupiter/Mercury conjunction in the 6th and 7th houses shows a need to have an open mind in order to understand the wide variety of beliefs, values and opinions of those he serves who come from diverse cultures all over the world. The North Node is opposition Chiron in Gemini in the 12th House. In order to serve others, the individual needs to learn to set appropriate boundaries and healthy ways of giving as in the past the soul was too open and compassionate. The soul has to learn to transcend communication challenges, such as differences in language, culture, ideas, or his overall ability to connect with others through self-expression. The North Node is semi-square Venus, which is conjunct the Moon, in Aquarius in the 7th House and square Uranus in Taurus in the 10th House. As the leader of the Catholic Church, the Pope will have to confront and challenge the traditional consensus definitions of how people are allowed to be in relationships and involved with one another. The Pope has a need and desire to eliminate the "taboos" associated with relationships. It is currently "taboo" for priests to marry for example. Gay marriage is another example which may come up. As mentioned earlier, the soul has skipped steps as both Saturn and Neptune square the nodes in a Grand Cross configuration. The soul has worked on issues pertaining to both nodes in previous lives and continues to do so in his current life. Saturn in Pisces in the 8th House and Neptune in Virgo in the 2nd House are square the SN conjunct Chiron in Gemini in the 12th House and the NN conjunct the Sun in Sagittarius in the 6th House. This is a Mutable Grand Cross by sign and a Mutable/Fixed Grand Cross by House. This is symbolic of a soul that has its eyes set on the future and does not want to be restricted or blocked from growing and evolving. The soul seeks self-knowledge and growth through self-improvement. A great deal of dynamic tension exists within the consciousness of the individual. There is a natural conflict between deductive reasoning and inductive logic. In addition, the individual is conflicted by singular, sectarian and non-sectarian universal points of view. All of this has the potential to create a great deal of confusion and cause the individual to doubt what he intuitively knows. These conflicts are necessary in order to dissolve any and all thoughts, ideas, perceptions or opinions that are limiting the growth of the soul. These thoughts, ideas and beliefs that need to be dissolved are related to individual's views regarding suffering and service, charity and solitude, material resources and values and power and desire. Saturn in Pisces is symbolic of traditional or conservative spiritual work while Neptune in Virgo is related to serving the poor, the neglected and down trodden. Neptune is sesiquadrate Uranus in Taurus in the 10th house. Although the individual respects traditional and conservative beliefs and values, he has a desire to break free of tradition and past social and cultural conditioning patterns. Uranus is trine Mercury in Capricorn in the 7th house conjunct Jupiter in the 6th house. The Pope's beliefs, opinions and point of view may be radically different than those of the Church. Although he respects the older more traditional values and beliefs of the church, he may attempt to break free of the past and liberate the Church from outmoded thinking that is limiting the growth and evolution of the church and its members. Mercury, in Capricorn in the 7th House is semi-sextile the Moon, which is conjunct Venus, in the 7th house and square Uranus in Taurus in the 10th House, which is semi-square Chiron conjunct the SN in Gemini in the 12th house, which are ruled by Mercury. The Pope's beliefs, views, opinions and values regarding the family, the role of women, and personal relationships such as marriage are radically different than the traditional and conservative beliefs and values of the Catholic Church. Through his role as leader of the Catholic Church, Pope Francis may bring about radical change of some sort. NBC News reports that "When Argentina was on the verge of legalizing gay marriage in 2010, then Cardinal Jorge Mario Bergoglio of Buenos Aires — suggested the church support civil unions, according to news reports published at the time." In relation to traditional Catholic values, that can be considered to be quite radical. I wish to thank each of you for making the effort you have regards the EA of Pope Francis. The analysis from Rose is totally accurate. All of it. And Cat much of what you also analyzed is correct but if you read what Rose wrote you will see where you were just a bit off. The value is always in the effort Cat as you know, and by sharing what you have you can then learn how to keep learning our EA. I was surprised to find Rose's post when I logged in to post mine. My first reaction was to read what Rose posted first but I decided not to. I decided I am more likely to learn from my mistakes if I go ahead and make them than if I go ahead and correct them based what someone else posted. ( This is always the case when I get involved in practice charts). Ok so I posted then I read Rose's excellent piece! I rolled my eyes and smacked myself in the head right off. Rose wrote "Saturn in Pisces is a signature for organized religion. Pisces is directly linked to Christianity." I think I interpreted it as a "traditional conservative religion." Pisces and Christianity!!! How did I miss that!!!! Then I missed mentioning resolution nodes. There are other differences as well. I printed both of our interpretations out to keep me occupied on a very long flight tomorrow. I am so grateful that Rose posted so I have someone to compare and contast with. I am especially grateful it is Rose as the Chiron is so prominent in this chart and Rose is the EA Chiron guru in my eyes :-) The ritual washing of feet is a gesture of humility based on the belief that Jesus Christ washed the feet of his apostles on the evening of their final meal together before his arrest, crucifixion and death. Vatican tradition has it that each year on Good Thursday the pope washes the feet of twelve priests of different ages and nationalities in a solemn ceremony held in Rome’s St John Lateran’s Basilica or in St Peter’s Basilica. The priests are seen as representing the apostles. Though retired pontiff Benedict XVI revised the ritual in 2007 by selecting 12 lay men from Rome for the ceremony, the new Pope Francis shook up Catholic tradition Thursday by choosing to honour not only prisoners, but women as well as men. Catholic traditionalists believe that all of Jesus’s disciples were male and the historic decision to wash the feet of two girls — one Italian Catholic and one of Serbian Muslim origin — is likely to create friction in some circles. The gesture appears to open to interpretation the importance of the gender of the apostles. Calls from groups within the Church for women to be ordained have been rebutted on the basis that Jesus’s apostles were men. There is no Catholic dogma which explicitly forbids the participation of women, though a circular letter from 1988 which explains the importance of the tradition refers specifically to the “washing of the feet of chosen men.” Cardinal Jorge Mario Bergoglio — as Pope Francis was previously known — had already washed and kissed the feet of women in past ceremonies in Argentinian jails, hospitals and old people’s homes, including pregnant mothers and AIDS patients. Other Catholic priests and bishops have also included women in the feet washing although this is considered highly unusual. The role of women in the Church has become an increasingly hot topic, with campaigners and rebel clerics calling for a review of the dogma which bans female priests — particularly as male priest numbers are dropping in the West. The practice of washing feet appears to stem from ancient hospitality customs, whereby hosts would provide servants to clean the feet of newly arrived guests. There are some variations to the ritual as performed in churches across the world today. In some cases whole congregations participate in the washing, or take it in turns to wash each other’s feet.
{ "pile_set_name": "Pile-CC" }
02-11-038-CV COURT OF APPEALS SECOND DISTRICT OF TEXAS FORT WORTH       NO. 02-11-00038-CV     In the Interest of M.G.P., a Child               ----------   FROM THE 323rd District Court OF Tarrant COUNTY ----------   MEMORANDUM OPINION[1] ----------   I.  Introduction           Following a non-jury trial, the trial court signed a judgment terminating Mother’s parental rights to her daughter, M.G.P.  In six issues, Mother argues that the evidence is legally and factually insufficient to support the trial court’s environmental and conduct endangerment findings and best interest finding. Because the evidence is not legally sufficient to support the environmental and conduct endangerment findings, we will reverse the trial court’s termination order and conservatorship order.  We will remand the case to the trial court for the limited purpose of rendering an order consistent with family code section 161.205.  See Tex. Fam. Code Ann. § 161.205(2) (West 2008). II.  Factual and Procedural Background           A.      Events Prior to M.G.P.’s Birth                    1.       Mother’s Other Children Mother said that she had a four-year-old son, E.G., Jr., who lived with his father, and another son named J.M., who was legally adopted by a woman named M.H.  Mother explained that when she separated from E.G., Sr.,[2] her son stayed with him.  Mother went to Louisiana after Hurricane Katrina, conceived her third son, J., while she was there, and then came back to Texas.  J.’s father did not want to be involved.  After Mother delivered, it was “very hard” for her to work and care for J., so the woman Mother calls her mother offered to help out and eventually adopted him.           2.       Mother’s Drug and Alcohol Use Mother started using marijuana when she was about fifteen years old, started using crack cocaine two or three days a week beginning in 2008, and drank alcohol in January 2009.  Mother admitted to using crack and cocaine in December 2008 before she realized that she was pregnant with M.G.P.                      3.       Domestic Violence On or About December 6, 2008           Officer Joel Zuniga with the Fort Worth Police Department testified that Mother told him on December 20, 2008, that her boyfriend J.P. hit her in the stomach around December 6, 2008, and that her stomach hurt for two weeks.                    4.       Domestic Violence On December 20, 2008 Officer Zuniga testified that in the early morning hours on December 20, 2008, he was dispatched to a call at 3725 South Main Street regarding a burglary of a habitation.  When Officer Zuniga arrived, he spoke with Mother, who said that her boyfriend J.P. had kicked in the back door, had hit her in her stomach several times, and had pulled her out of bed.  Mother ran towards the bathroom to get away from J.P., but he grabbed her by the throat.  Officer Zuniga noted that Mother had bruises around her neck and arms.  Mother was two months’ pregnant, and J.P. was the father of the child.  Mother fled to a neighbor’s house to protect herself and her unborn child.  Mother said that J.P. was drunk and that he verbally threatened her, saying that he wanted to hurt her and kill her. J.P. was not arrested that night because he had fled the scene, but Officer Zuniga believed that the detective who was in charge of the case had brought charges against J.P.  Mother admitted at trial that she had continued in a relationship with J.P. for a short time after this incident.             5.       Drug and Alcohol Use Stops — January 2009 Mother stopped using crack cocaine and alcohol in January 2009.           B.      M.G.P.’s Birth — July 2, 2009           Mother gave birth to M.G.P. at thirty-eight weeks’ gestation on July 2, 2009.  M.G.P. tested negative for drugs when she was born.  Mother tested positive for opiates at the time of M.G.P.’s birth, but JPS staff said that Mother had tested positive due to being given morphine by the doctor; Mother had tested negative for all drugs on a urine screen prior to giving birth.           C.      Events After M.G.P.’s Birth           1.       CPS Investigator Interviews Mother — July 6, 2009 Jeremy Dickinson, an investigator for Tarrant County Child Protective Services, testified that he was assigned to Mother’s case in early July 2009 and that he spoke with Mother at JPS hospital on July 6, 2009, which was four days after M.G.P. was born.[3]  Dickinson testified that he gave Mother an oral swab test at the hospital. Mother admitted to Dickinson that she had experienced suicidal thoughts in the past because of verbal arguments with J.P. and that she had put a knife to her wrists at one point but did not cut.  Dickinson checked Mother’s wrists to see if she had any cuts from suicide attempts, but he did not observe any injuries.  During that conversation, Mother denied any domestic violence with J.P. 2.       CPS Caseworker Interviews Mother — July 23, 2009 Dionne Flowers, a caseworker for CPS and a Family-Based Safety Services worker, testified that she spoke with Mother on July 23, 2009, and performed an assessment, which involved gathering social history from Mother so that Flowers could determine what services were needed.  Flowers said that she was looking at whether Mother was planning to maintain her relationship with J.P. and whether the two of them would be willing to work services. Mother said that she had been diagnosed with depression at JPS Hospital and had been prescribed Wellbutrin.[4]  Mother reported that she had thoughts of suicide in October 2008.  Mother also reported that she had thoughts of harming J.P. and wanted to hurt him for the abuse that she had incurred.  Flowers did not have any information on whether Mother ever tried to hurt herself or whether she tried to hurt J.P. When Flowers spoke with Mother, she said that she had snorted and smoked crack cocaine for about five months but had stopped using on her own. Mother admitted that she had smoked crack cocaine during the first month of her pregnancy, but Mother did not know that she was pregnant at the time that she used cocaine.  Mother said that J.P. supplied her with cocaine, provided all her groceries and personal items, and paid her bills. Mother mentioned to Flowers some of the altercations that she had with J.P. and said that he was violent toward her; she perceived his buying groceries and providing her personal items as a way of controlling the relationship.  Mother told Flowers that she was no longer in a relationship with J.P. but that she would consider restarting a relationship with him if he received help. After completing the assessment, Flowers recommended to Mother that she and J.P. attend domestic violence counseling, that she undergo a psychological evaluation, and that she attend parenting classes.                      3.       Domestic Violence on August 23, 2009 A few days after August 23, 2009, when the police were called to the house, Mother told Dickinson that he [J.P.] came to their apartment, he was intoxicated, he accused her of cheating on him.  At that point, he started hitting her in the head and the face with [his] hands.  She stated that every time he was hitting her, she was seeing white and starting to black out.  She told me that she grabbed a frying pan to try to defend herself.  He subsequently took that from her and started hitting her with it.  She said that [M.G.P.] was home during this incident.  She told me the only reason it stopped was because he got tired.  Once he had tired out, he told her to get [M.G.P.] and follow him to another apartment to watch some DVD[]s, so at that point, a little bit later, she contacted Fort Worth P.D. and told them about the domestic violence.[5] Dickinson testified that Mother’s use of the frying pan was self-defense, not an attack.  Dickinson said that Mother was not the aggressor; she was the victim. Mother told Dickinson that J.P. had threatened to kill her when this incident happened. During Dickinson’s interview with Mother after the August 23 incident, she said that J.P. had also physically abused her while she was pregnant.  Mother told Dickinson that she could not provide any type of food or transportation and could not pay rent; Mother relied completely on J.P. as her sole source of income and to provide necessities. Dickinson testified that there was danger to then approximately six-month-old M.G.P. as a result of the domestic violence because she was exposed to the scene of Mother’s and J.P.’s physically assaulting each other and because she was exposed to the potential of being injured.  Dickinson said that M.G.P. could also have been injured when J.P. hit Mother while she was pregnant with M.G.P. Dickinson transported Mother and M.G.P. to the police station because CPS wanted them to be in Safe Haven, and Safe Haven would not pick up clients from residences.  Mother agreed to this move. Dickinson was informed by CPS caseworker Dionne Flowers that she was going to see J.P. in jail and that Mother was going along.  Flowers advised Mother that she should not go, but Mother said that she was going. Melinda Esquibel, a Spanish-speaking CPS investigator, testified that she assisted Dickinson in his 2009 investigation of the case involving M.G.P. Esquibel translated a phone call[6] while J.P. was in jail for assaulting Mother. J.P. indicated that he was intoxicated at the time of the assault.  J.P. also said that this was not the first incident and that there had been two or three other times when he had engaged in domestic violence with Mother.  J.P. admitted that he had “beat up on” Mother.  J.P. did not indicate that Mother had “come at him with a frying pan” or that he had hit her with it.  J.P. said that M.G.P. was in her bed when the domestic violence incidents occurred.           4.       M.G.P. Removed In September 2009, Mother agreed to take M.G.P. and move into Safe Haven.  Safe Haven had a rule that its residents could not leave their children unattended, and although Mother had been told multiple times by Safe Haven staff not to leave M.G.P. alone in Mother’s room at Safe Haven, Mother left M.G.P. alone in Mother’s room at Safe Haven on several occasions while Mother stepped outside to smoke.[7]  Mother was ultimately kicked out of Safe Haven for violating their rules, and M.G.P. was placed in a foster home.  While M.G.P. was living at the first foster home, she showed up to visits with unexplained bruising. M.G.P. was then moved to a second foster home.           5.       Two Instances of Domestic Violence — July 2010 Ten months after M.G.P.’s removal, Mother was shopping by herself at La Gran Plaza[8] in July 2010 when J.P., who was with two friends, saw Mother and hit her in the nose, causing it to bleed and feel “like it was broken.”  Mother said that J.P. hit her because “he’s been [trying] to get back with me, but I know it’s not going to work out because he’s still violent towards me.” After the incident, Mother went back to Safe Haven and stayed there for two weeks.  Mother did not file a police report after J.P. hit her in the nose because her mother had recommended that she not file a report as a result of her pending CPS case.  Mother believed that her previous domestic violence report led to M.G.P.’s removal.  Mother realized at trial that it would have been better if she had reported the incident to the police.[9] Mother said that she had tried to stay away from J.P.  But Mother admitted that in late July 2010, she had ridden in the same car as J.P. because she had no other way to get to court for a permanency hearing.  Mother testified that she and J.P. met at her mother’s house so that her mother could drive them to the hearing.  J.P. tried to touch Mother in a sexually suggestive way, but after Mother told him not to and moved away, he hit her in the back.  Mother said that J.P. hit her because he saw some hickeys on her neck and found out that she had moved in with her boyfriend.  Mother had bruises on her back as a result of the incident.  Mother called the police, and an officer came and took a report from Mother.[10]  Mother did not tell the judge about the assault during the permanency hearing. D.      Extension of Case — July 23, 2010 Mother filed a motion for extension of the dismissal date, which was set for  September 6, 2010.  The trial court granted the motion, extending the dismissal date to March 2, 2011. E.      Additional Testimony from the January 4, 2011 Termination Trial             1.       Mother’s Testimony                    a.       Mother’s Other Children Although Mother had given up a son when he was four months old and she was in her early twenties, she testified that she had grown up since then and was ready and able to care for a child.                    b.       Drugs Mother admitted that she had used drugs once during the first month of her pregnancy when she did not know that she was pregnant with M.G.P.  As soon as Mother found out that she was pregnant, she stopped using drugs.  Mother had been clean “from everything” for two years at the time of trial.  Mother had submitted to drug tests whenever CPS had requested them and was never told that she had tested positive for drugs.  Mother took the CATS drug classes even though she had never been told that she had tested positive for drugs.                    c.       Domestic Violence Mother did not instigate any of the domestic violence altercations; she had been a victim, as opposed to the aggressor, in each of the scenarios involving J.P.  Mother said that CPS told her that they had removed M.G.P. due to the domestic violence and Mother’s drug abuse.  Mother had not been with J.P. since September 2009; instead, she had removed herself from any danger that he created for her and M.G.P.  Because Mother had removed herself from the situation and had stopped using drugs, she felt like she had met CPS’s requirements.                     d.       Services Mother completed a drug class called CATS, a psychological evaluation, and parenting classes but had seven domestic violence classes left at the time of the termination trial.  Mother admitted that the trial court had already given her one extension for six months to complete her Safe Haven domestic violence classes, and she agreed that was more than enough time to complete them. Mother said that even if she had finished the classes, that would not have stopped J.P. from hitting her in the nose when he saw her at La Gran Plaza. Even though she had not completed the domestic violence classes, Mother believed that she had done everything to remove the danger to M.G.P. because she was no longer in a violent relationship and had learned from her classes how to avoid violent relationships.                    e.       Housing Mother initially testified that since M.G.P.’s removal in September 2009, Mother had lived at two places.  Upon further review, the record revealed that Mother had lived at five places; she was living at Safe Haven when M.G.P. was removed, then she moved back to her apartment because the lease had not expired, then she moved to the Westchase Apartments with her boyfriend’s brother, then she moved back to Safe Haven, and then she moved to the Country Place Apartments.  Mother explained that she had to go back to Safe Haven for two weeks because J.P. was looking for her; she and her boyfriend decided that it would be better for her to go back to Safe Haven until the locks at the apartment were changed.  Ultimately, they moved into Country Place because their lease expired.[11]  During the six months that Mother dated her boyfriend, she lived by herself in an apartment[12] and cleaned or babysat to make her $50 monthly rent; she paid for her food with food stamps.                    f.       Mother’s Living Conditions at Time of Trial At the time of the termination trial, Mother was living with her boyfriend on the west side of town and had been living with him for approximately eight months.[13]  She and her boyfriend live with her boyfriend’s brother[14] in a two-bedroom apartment.  Mother said that their rent is $415, which is divided with her boyfriend’s brother; electricity is not included in their rent and usually runs $158 for two months.  Mother and her boyfriend had not had any physical fights, nor had she had any physical fights or verbal arguments with her boyfriend’s brother. Mother’s boyfriend was working two jobs to support her financially.  He also supported her in her classes and drove her to classes;[15] when Mother’s boyfriend could not drive her to her classes, he gave her money to take the bus.  Her boyfriend also gave her $60 a week for her to buy gifts to take to her visits with M.G.P. and supported Mother “in whatever way he [could].” Mother said that CPS ran a background check on her boyfriend and that CPS told Mother that nothing negative came back.  Mother testified that she told the CPS supervisor that “if any moment there was something wrong with his, [sic] that’s something I would go ahead and leave him right away.”[16] Mother testified that she was not working at the time of the trial.  Mother later said that she was babysitting and making $200 or $300 a month.  At the time of the termination trial, Mother owed the City of Fort Worth $700 for two traffic tickets that she had received in 2008 and had two Class C warrants out for her arrest, but she did not have the money to pay for those tickets. Mother agreed that she had a hard time being independent in the past but said that she would look for a job because she still needs to be independent.  She said, “I’m 24, so I need to be responsible for me and my daughter.  She’s mine.  She’s nobody’s responsibility but mine.”                    g.       Mother’s Plans for M.G.P. Mother had already spoken to someone who would watch M.G.P. while Mother attended the remaining Safe Haven classes.  Mother said that if M.G.P. came to live with her, she would sleep in a crib in Mother’s bedroom. Mother testified that it was in M.G.P.’s best interest to be returned to her. Mother asked the trial court to return M.G.P. to her because she had done everything to remove the danger that was previously present and was in a better situation.  Mother testified, “There is no better place for her but to be with me, because I’m her mother.”           2.       CPS Supervisor’s Testimony Terica Brager, a supervisor with CPS, testified that the caseworker who was originally assigned to the case left CPS and that she took over the day-to-day responsibility for this case in September 2010.  Brager explained that M.G.P. was removed from Mother’s care due to concerns of domestic violence and neglectful supervision while she was with Mother at Safe Haven. Brager said that in the past, Mother had not removed herself from domestically-violent situations.  Brager was concerned, based on the numerous incidents of domestic violence with J.P., that Mother could not protect M.G.P. from emotional and physical danger now and in the future.[17]  Brager said that it was important for Mother to complete the domestic violence education classes through Safe Haven because she had been a victim more than once and because she needed to learn how to protect herself and her child.  However, Brager said that Mother’s individual therapist may have covered the topic of how Mother could protect herself.  Brager also admitted that Mother’s failure to complete the domestic violence classes at Safe Haven would “probably not” have changed J.P.’s mind or kept him from hitting Mother.  Brager agreed that Mother had testified that she was not looking for J.P. when she was hit by him in the nose and later in the back and that she had not been with him since September 2009. Brager said that she had not seen Mother’s ability to effect positive environmental changes within a reasonable time.  Brager said that the case was opened in September 2009 and that it was not until September 2010 that Mother “began all of the things that she just now completed.”  Brager was concerned that Mother had fifteen months to work her service plan and had only worked services during the last three months to get M.G.P. back. Brager said that Mother attended the majority of the visits.  Brager recalled that there was an incident where Mother and J.P. argued during a visit with M.G.P.  Despite that incident, Brager described Mother as loving, nurturing, and appropriate with M.G.P. during the visits; Brager did not have concerns about Mother’s interactions with M.G.P.   Brager testified that she was very concerned that Mother would not be able to provide for M.G.P.’s physical needs now and in the future because Mother had been supported by other people “for quite some time.”  Brager had not seen in the fifteen months prior to the trial that Mother had made any effort to provide for M.G.P. on her own.  Brager was concerned that Mother’s boyfriend was “doing everything for her,” and Brager wondered what would happen if their relationship ended. In December 2010, Mother told Brager that it would be hard for her to care for M.G.P.  Mother told Brager less than a month before the termination trial that she (Mother) did not believe that she would regain custody of M.G.P. but that she would fight to the end; Mother believed that there was a ninety percent chance that she would not get M.G.P. back. Brager testified that CPS does not return children only in situations where it will be easy; she agreed that it would be difficult for anyone, on her own without financial support, to care for a child.  Brager agreed that Mother could get food stamps and Medicaid, but Brager said that the State would not pay for Mother’s mortgage, utilities, and things like that.  Brager agreed that at the time of trial, Mother had a place to live, had electricity, and had food. Brager testified that she believed that it was in M.G.P.’s best interest for Mother’s parental rights to M.G.P. to be terminated because she did not believe that the few changes that Mother had made in the three months prior to the termination trial were enough to “secure” M.G.P. for the rest of her life.  Brager had observed M.G.P. interact with her foster parents, and she acted comfortable with them; she appeared to feel safe with them.  Brager said that CPS’s plan was for M.G.P. to be adopted by her foster parents, who were very capable of parenting M.G.P.; since March 2010, the foster parents had met all of M.G.P.’s needs, and she had remained safe.                     3.       Attorney Ad Litem for M.G.P.’s           The attorney ad litem, Mary R. Thomsen, did not testify but gave a final argument in which she stated that she supported the petition of the Department of Family and Protective Services (the Department) to terminate Mother’s and J.P.’s parental rights to M.G.P.  She stated that “[t]he child is doing well, developmentally on-target, in a safe place, happy, healthy, and I believe it would be in this child’s best interest to remain where she is and for this court to terminate and allow the home that she’s in, if this child is available for adoption.”           F.       M.G.P.’s Status at the Time of Trial According to Brager, M.G.P. was in a foster home and was doing “very well.”  She had no reported developmental delays, medical issues, or dental issues.  M.G.P. had been evaluated by Early Childhood Intervention, and no concerns were found.  M.G.P. was walking, talking, climbing, and interacting with the siblings in her foster home.           G.      Trial Outcome           After hearing the testimony above, the trial court found by clear and convincing evidence that Mother had knowingly placed or knowingly allowed the child to remain in conditions or surroundings that endangered the physical or emotional well-being of the child, that Mother had engaged in conduct or knowingly placed the child with persons who engaged in conduct that endangered the physical or emotional well-being of the child, and that termination of the parent-child relationship between Mother and M.G.P. was in the child’s best interest.[18]  The trial court also appointed the Department as permanent managing conservator of M.G.P., finding that it was in her best interest.  Mother filed a motion for new trial, which the trial court denied.  This appeal followed. III. Legally Insufficient Evidence of Conduct and Environmental Endangerment to Support Termination Order   In her first through fourth issues, Mother argues that there is legally and factually insufficient evidence to establish the termination grounds under family code section 161.001(1)(D) and (E).  The Department argues that there was ample evidence to support the trial court’s conduct and environment findings because the trial court was entitled to find that Mother endangered M.G.P. by (1) using drugs during the pregnancy, (2) exposing M.G.P. to domestic violence, and (3) failing to timely work her service plan. A.      Burden of Proof and Standards of Review           A parent’s rights to “the companionship, care, custody, and management” of her children are constitutional interests “far more precious than any property right.”  Santosky v. Kramer, 455 U.S. 745, 758–59, 102 S. Ct. 1388, 1397 (1982); In re M.S., 115 S.W.3d 534, 547 (Tex. 2003).  “While parental rights are of constitutional magnitude, they are not absolute.  Just as it is imperative for courts to recognize the constitutional underpinnings of the parent-child relationship, it is also essential that emotional and physical interests of the child not be sacrificed merely to preserve that right.”  In re C.H., 89 S.W.3d 17, 26 (Tex. 2002).  In a termination case, the State seeks not just to limit parental rights but to erase them permanently—to divest the parent and child of all legal rights, privileges, duties, and powers normally existing between them, except for the child’s right to inherit.  See Tex. Fam. Code Ann. § 161.206(b) (West 2008); Holick v. Smith, 685 S.W.2d 18, 20 (Tex. 1985).  We strictly scrutinize termination proceedings and strictly construe involuntary termination statutes in favor of the parent.  Holick, 685 S.W.2d at 20–21; In re R.R., 294 S.W.3d 213, 233 (Tex. App.—Fort Worth 2009, no pet.).           In proceedings to terminate the parent-child relationship brought under section 161.001 of the family code, the petitioner must establish one ground listed under subsection (1) of the statute and must also prove that termination is in the best interest of the child.  Tex. Fam. Code Ann. § 161.001 (West Supp. 2010); In re J.L., 163 S.W.3d 79, 84 (Tex. 2005).  Both elements must be established; termination may not be based solely on the best interest of the child as determined by the trier of fact.  Tex. Dep’t of Human Servs. v. Boyd, 727 S.W.2d 531, 533 (Tex. 1987).           Termination decisions must be supported by clear and convincing evidence.  Tex. Fam. Code Ann. §§ 161.001, 161.206(a).  Evidence is clear and convincing if it “will produce in the mind of the trier of fact a firm belief or conviction as to the truth of the allegations sought to be established.”  Id. § 101.007 (West 2008).  Due process demands this heightened standard because termination results in permanent, irrevocable changes for the parent and child.  In re J.F.C., 96 S.W.3d 256, 263 (Tex. 2002); see In re J.A.J., 243 S.W.3d 611, 616 (Tex. 2007) (contrasting standards for termination and modification).           In evaluating the evidence for legal sufficiency in parental termination cases, we determine whether the evidence is such that a factfinder could reasonably form a firm belief or conviction that the grounds for termination were proven.  In re J.P.B., 180 S.W.3d 570, 573 (Tex. 2005).  We review all the evidence in the light most favorable to the finding and judgment.  Id.  We resolve any disputed facts in favor of the finding if a reasonable factfinder could have done so.  Id.  We disregard all evidence that a reasonable factfinder could have disbelieved.  Id.  We consider undisputed evidence even if it is contrary to the finding.  Id.  That is, we consider evidence favorable to termination if a reasonable factfinder could, and we disregard contrary evidence unless a reasonable factfinder could not.  Id.           We cannot weigh witness credibility issues that depend on the appearance and demeanor of the witnesses, for that is the factfinder’s province.  Id. at 573, 574.  And even when credibility issues appear in the appellate record, we defer to the factfinder’s determinations as long as they are not unreasonable.  Id. at 573. If we determine that no reasonable factfinder could form a firm belief or conviction that the grounds for termination were proven, then the evidence is legally insufficient, and we must generally render judgment for the parent.  J.F.C., 96 S.W.3d at 266; see Tex. R. App. P. 43.3.           B.      Law on Endangerment           Endangerment means to expose to loss or injury, to jeopardize.  Boyd, 727 S.W.2d at 533; In re J.T.G., 121 S.W.3d 117, 125 (Tex. App.—Fort Worth 2003, no pet.); see also In re M.C., 917 S.W.2d 268, 269 (Tex. 1996).  To prove endangerment under subsection (D), the Department had to prove that Mother knowingly placed or allowed M.G.P. to remain in conditions or surroundings that endangered her physical or emotional well-being.  See Tex. Fam. Code Ann. § 161.001(1)(D); In re J.A.J., 225 S.W.3d 621, 625 (Tex. App.—Houston [14th Dist.] 2006) (op. on reh’g), judgm’t aff’d in part, rev’d in part, 243 S.W.3d 611 (Tex. 2007).  Subsection (D) focuses on the suitability of the child’s living conditions.  J.A.J., 225 S.W.3d at 626.  Thus, under subsection (D), it must be the environment itself that causes the child’s physical or emotional well-being to be endangered, not the parent’s conduct.  Id. at 627.           Under subsection (E), the relevant inquiry is whether evidence exists that the endangerment of the child’s physical well-being was the direct result of Mother’s conduct, including acts, omissions, or failures to act.  See J.T.G., 121 S.W.3d at 125; see also Tex. Fam. Code Ann. § 161.001(1)(E).  Additionally, termination under subsection (E) must be based on more than a single act or omission; a voluntary, deliberate, and conscious course of conduct by the parent is required.  J.T.G., 121 S.W.3d at 125; see Tex. Fam. Code Ann. § 161.001(1)(E).  It is not necessary, however, that the parent’s conduct be directed at the child or that the child actually suffer injury.  Boyd, 727 S.W.2d at 533; J.T.G., 121 S.W.3d at 125.  The specific danger to the child’s well-being may be inferred from parental misconduct standing alone.  Boyd, 727 S.W.2d at 533; In re R.W., 129 S.W.3d 732, 738 (Tex. App.—Fort Worth 2004, pet. denied).  As a general rule, conduct that subjects a child to a life of uncertainty and instability endangers the child’s physical and emotional well-being.  See In re S.D., 980 S.W.2d 758, 763 (Tex. App.—San Antonio 1998, pet. denied).  To determine whether termination is necessary, courts may look to parental conduct occurring both before and after the child’s birth.  In re D.M., 58 S.W.3d 801, 812 (Tex. App.—Fort Worth 2001, no pet.). C.      Evidence Is Legally Insufficient to Support Endangerment Findings           In determining whether the evidence is legally and factually sufficient to support termination of Mother’s parental rights pursuant to subsection (D) or (E), we look at whether Mother (1) knowingly placed or knowingly allowed M.G.P. to remain in conditions or surroundings that endangered her physical or emotional well-being or (2) engaged in conduct or knowingly placed M.G.P. with persons who engaged in conduct that endangered her physical or emotional well-being.  See Tex. Fam. Code Ann. § 161.001(1)(D), (E).  The Department’s brief contains a combined legal and factual sufficiency analysis in which it focuses on three acts or omissions by Mother that it contends support termination of Mother’s parental rights under (D) and (E):  the allegations that Mother endangered M.G.P. by (1) using drugs during the pregnancy; (2) exposing M.G.P. to domestic violence; and (3) failing to timely work her service plan.  We will examine all of the evidence in the record, focusing on these allegations. 1.       Drug Use During Pregnancy—Legally Insufficient (E) Ground           In her combined legal and factual sufficiency analysis, Mother argues that she demonstrated before and during the case that she did not have a substance abuse problem.  The Department argues that Mother’s drug use while she was pregnant with M.G.P. endangered M.G.P. The record demonstrates that Mother had used cocaine during her first month of pregnancy before she knew that she was pregnant[19] and that she had ceased using alcohol and drugs in January 2009.  M.G.P. was born without drugs in her system and had no developmental delays.  During the course of this case, Mother never tested positive for drugs, but she went ahead and completed the CATS drug classes as required by her service plan.  At the time of the termination trial, Mother had been clean from drugs and alcohol for two years.           In some instances, drug use may give rise to termination under section 161.001(1)(E).  See Robinson v. Tex. Dep’t of Regulatory Servs., 89 S.W.3d 679, 686–87 (Tex. App.—Houston [14th Dist.] 2002, no pet.).  However, the evidence in this case concerning Mother’s alleged drug and alcohol use was limited to the time before she knew that she was pregnant; the fact that Mother quit using drugs when she learned that she was pregnant undermines the argument that she engaged in “a voluntary, deliberate, and conscious course of conduct” sufficient to support a termination finding under section 161.001(1)(E).[20]  See J.T.G., 121 S.W.3d at 125; Ruiz v. Tex. Dep’t of Family & Protective Servs., 212 S.W.3d 804, 818 (Tex. App.—Houston [1st Dist.] 2006, no pet.) (holding that evidence of mother’s narcotics use once during case and during a previous pregnancy was no evidence of 161.001(1)(E) conduct endangerment).  Mother did what she was supposed to do under her service plan in order to prove that she did not have a substance abuse problem:  she stayed drug-free for two years and never had a positive drug test during the time the case was pending.[21] Accordingly, we hold that the evidence of Mother’s drug use during pregnancy is legally insufficient for a reasonable factfinder to form a “firm belief or conviction” that Mother engaged in conduct or knowingly placed M.G.P. with persons who engaged in conduct that endangered the physical or emotional well-being of M.G.P.[22]  See In re A.S., 261 S.W.3d 76, 86–87 (Tex. App.—Houston [14th Dist.] 2008, pet. denied) (holding that mother’s use of marijuana once during her pregnancy—which led to baby testing positive for marijuana—was legally and factually insufficient to support termination of mother’s parental rights under 161.001(1)(E); evidence showed that mother took prenatal vitamins during her pregnancy and did not consciously engage in a course of conduct that endangered child’s well-being); Ruiz, 212 S.W.3d at 818 (holding that evidence of mother’s narcotics use once during case and during a previous pregnancy was legally insufficient to support termination of mother’s parental rights under 161.001(1)(E)). 2.       Exposing M.G.P. to Domestic Violence—Legally Insufficient (D) and (E) Grounds           In arguing that the evidence regarding M.G.P.’s exposure to domestic violence is insufficient to support grounds (D) and (E), Mother points out that she suffered the misfortune of being assaulted by her child’s father and that victimization does not equate with voluntary acts of endangerment.  The Department argues that the trial court was entitled to find that M.G.P. was a victim of Mother’s failure to promptly get away from her abuser. But the record establishes that two weeks after the December 6, 2008 attack, the Fort Worth Police Department responded to a call for a burglary of a habitation.  The investigation revealed that J.P. had kicked in the door to get to Mother and had kicked her in the stomach.  The record shows that (1) J.P. was no longer living with Mother, (2) he was not invited, (3) he did not have a key to her apartment, and consequently, (4) he had to kick in the door. After M.G.P. was born, J.P. came to the apartment while he was intoxicated, accused Mother of cheating on him, and attacked her on August 23, 2009.[23]   Mother tried to defend herself against J.P. with a frying pan, but J.P. ultimately used the frying pan against her.  M.G.P. was approximately a month and a half old and was in her bed during this incident.  The evidence is undisputed that there was no bruising on M.G.P. during the time Mother was in a relationship with J.P.[24]  Mother agreed to go to Safe Haven after this incident. After M.G.P. was removed, J.P. ran into Mother while she was shopping at a mall and attacked her.  Mother again sought shelter at Safe Haven to protect herself.  Mother was attacked one other time when Mother and J.P. rode to court together. CPS complains that Mother did not stay away from J.P., yet the record reflects that CPS apparently scheduled Mother’s and J.P.’s visits with M.G.P. at or near the same time because the record reflects that they argued at one visit.  The Family Service Plan Evaluation dated January 25, 2010 describes Mother as “enmeshed still” with J.P., but it is in relation to her interactions with him at the visits.  There is no evidence that she was still living with him or in an on-going relationship with him. Instead, at the time of trial, Mother had been dating her new boyfriend for fourteen months and had been living with him for eight months.  There was no evidence of domestic violence with her new boyfriend.  Because there was no evidence of Mother’s being a victim of domestic violence prior to or after being involved with J.P., the record failed to establish that Mother had a pattern of being involved in abusive relationships and of exposing her children to domestic violence.  Instead, the record discloses that after J.P. committed domestic violence against Mother on December 6, 2008, she took precautions to protect herself and to limit J.P.’s access to her, while still visiting M.G.P. at the times scheduled by CPS, despite the fact that CPS scheduled J.P.’s visits with M.G.P. at or near the same time as Mother’s. We hold that the evidence of domestic violence is legally insufficient for a reasonable factfinder to form a “firm belief or conviction” that Mother engaged in a course of conduct that endangered the emotional or physical well-being of M.G.P.  See A.S., 261 S.W.3d at 86–87 (holding evidence legally and factually insufficient to support terminating mother’s parental rights under section 161.001(1)(E) because children did not witness two occasions of domestic violence); see also In re V.S.R.K., No. 02-08-00047-CV, 2009 WL 736751, at *8 (Tex. App.—Fort Worth Mar. 19, 2009, no pet.) (mem. op.) (holding that trial court could not have reasonably formed a firm belief or conviction that appellant—as a direct result of his actions—engaged in a voluntary, deliberate, and conscious course of conduct or knowingly placed child with persons who engaged in conduct that endangered her physical or emotional well-being). The record contains no testimony regarding the physical condition of any of the homes in which Mother and M.G.P. lived and no evidence of endangering living conditions that Mother knowingly placed or allowed M.G.P. to remain in.  See Tex. Fam. Code Ann. § 161.001(1)(D).  The possibility that J.P. might track down Mother again because he randomly ran into her at La Gran Plaza does not equate to Mother’s knowingly placing M.G.P. in conditions or surroundings that would endanger her physical or emotional well-being. We hold that the evidence of domestic violence is also legally insufficient for a reasonable factfinder to form a “firm belief or conviction” that Mother exposed M.G.P. to an endangering environment.  See A.S., 261 S.W.3d at 84–85 (holding that evidence was legally and factually insufficient to support termination of mother=s parental rights under (D) when, even assuming father=s behavior was abusive and had occurred in front of the children, mother had taken responsive action to protect the children by taking them out of the environment); see also Lewelling v. Lewelling, 796 S.W.2d 164, 167 (Tex. 1990) (holding in conservatorship case Athat a parent is a victim of spousal abuse, by itself, is no evidence that awarding custody to that parent would significantly impair the child@). 3.       Failing to Timely Work Service Plan—Legally Insufficient (D) and (E) Grounds           In its final argument regarding the sufficiency of the section 161.001(1) findings, the Department argues that Mother endangered M.G.P. by failing to timely work her service plan.[25]  Because termination was not based on section 161.001(1)(O)—failure to comply with the provisions of a court order that specifically established the actions necessary for the parent to obtain the return of the child, the failure to timely work the service plan must be linked to ground (D) or (E).  See Tex. Fam. Code Ann. § 161.001(1)(O). The Department argues in one sentence that Mother waited one year after the removal of M.G.P. to start working her CPS service plan and then concludes in the next sentence that “[t]he trial court was entitled to find that [Mother] endangered M.G.P. by failing to promptly work her services.”  The record reveals that Mother had completed outpatient drug treatment “early on in the case” and that Mother utilized the extension that the trial court granted her; she worked all of her services except for the last seven sessions of the domestic violence class.  Mother admitted that she had enough time to complete the domestic violence class and was not questioned about why she was unable to complete the class.  Even considering Mother’s failure to complete the domestic violence class, we are unable to ascertain how the failure to complete the last seven sessions of the domestic violence class constitutes evidence of ground (D) endangering environment or evidence of ground (E) endangering conduct because Brager, a supervisor with the Department, testified that Mother’s completing the domestic violence class would “probably not” have prevented J.P. from hitting Mother and that Mother’s counselor may have gone over the domestic violence information with Mother. We hold that evidence that Mother failed to promptly work her services is legally insufficient for a reasonable factfinder to form a “firm belief or conviction” that Mother knowingly placed or knowingly allowed M.G.P. to remain in conditions or surroundings that endangered her physical or emotional well-being and that Mother had engaged in conduct or knowingly placed M.G.P. with persons who engaged in conduct that endangered her physical or emotional well-being.                    4.       Conclusion We therefore sustain Mother’s first and third issues challenging the legal sufficiency of the endangerment findings.[26]  Because these issues are dispositive, we need not address Mother’s other issues.  See Tex. R. App. P. 47.1. IV.  Conservatorship The Department’s petition to terminate Mother’s parental rights requested that it be appointed M.G.P.’s permanent sole managing conservator only “[p]ursuant to §§ 153.005 and 263.404,” not pursuant to section 153.131.  See Tex. Fam. Code Ann. §§ 153.005, 153.131, 263.402 (West 2008).  Section 153.005 provides generally that in a suit affecting the parent-child relationship, “the court may appoint a sole managing conservator or may appoint joint managing conservators.”  Tex. Fam. Code Ann. § 153.005 (West 2008).  Section 263.404 does not apply when the trial court’s order terminates parental rights.  J.A.J., 243 S.W.3d at 614.  Thus, the only available statutory mechanism for the Department’s appointment as M.G.P.’s managing conservator was as a consequence of the termination, pursuant to family code section 161.207.  See Tex. Fam. Code Ann. § 161.207 (West 2008); In re D.N.C., 252 S.W.3d 317, 319 (Tex. 2008).  Consequently, because the Department did not seek conservatorship based on section 153.131, Mother’s challenge to the Department’s conservatorship was subsumed within her appeal of the termination order.  See D.N.C., 252 S.W.3d at 319.  We therefore also reverse the trial court’s conservatorship appointment.  See id. (upholding appellate court’s reversal of conservatorship appointment when Department’s appointment was solely the consequence of termination decision under family code section 161.207). V.  Disposition           Having sustained Mother’s first and third issues and having determined that we need not address her other issues, we reverse the trial court’s judgment terminating Mother’s parental rights to M.G.P. and render judgment denying the Department’s petition to terminate Mother’s parental rights to M.G.P.  Because Mother’s challenge to the Department’s conservatorship was subsumed within her appeal of the termination order, we likewise reverse the trial court’s appointment of the Department as the permanent managing conservator of M.G.P.  We remand the case to the trial court for the limited purpose of rendering an order consistent with family code section 161.205(2).  See Tex. Fam. Code Ann. § 161.205(2) (West 2008); A.S., 261 S.W.3d at 93 n.19.     SUE WALKER JUSTICE   PANEL:  DAUPHINOT, WALKER, and MCCOY, JJ.   MCCOY, J. dissents without opinion.   DELIVERED:  December 22, 2011 [1]See Tex. R. App. P. 47.4. [2]Mother initially assumed that she was still legally married to E.G., Sr. even though she had been separated from him for five years.  But four months’ prior to the termination trial, Mother received a call from E.G., Sr., and he told her that they were already divorced.  She last lived with E.G., Sr. in July 2005. [3]Dickinson was not aware of any special needs of M.G.P. when she was discharged after birth. [4]The last family service plan evaluation prior to trial states that Mother denies any current issues with depression. [5]Petitioner’s Exhibit 2 was admitted into evidence over objection.  The exhibit contained a judgment and sentence, showing that J.P. pleaded guilty to the offense of assault bodily injury—family member, a Class A misdemeanor, and that the offense was committed August 23, 2009.  The charging instrument stated that J.P. hit Mother with his hand on August 23, 2009, and that they were in a dating relationship. [6]The record states that J.P. “is from Mexico and is not in this country legally.” [7]On some of those occasions, M.G.P. was sleeping. [8]Mother explained that La Gran Plaza was a mall. [9]Mother said that she had tried reporting him in the past.  She said that she did not know how else to tell him that she does not want to be with him.  Mother said that she only spoke to J.P. because of M.G.P. [10]Mother said at trial that she had not followed up with the police to see what the status of the case was. [11]It is not clear from the record, but it appears that the lease may have expired during the time that Mother was at Safe Haven awaiting the locks being changed at Westchase.  So she moved from Safe Haven to Country Place, instead of back to Westchase. [12]The Family Service Plan Evaluation dated January 25, 2010, states that “[Mother] has maintained her apartment.” [13]Mother testified that she dated her boyfriend for six months before she started living with him; they had actually been together for fourteen months at the time of trial. [14]Mother said that CPS did not ask for her boyfriend’s brother’s information. [15]When asked about transportation, Mother said that her boyfriend’s brother has a car. [16]Mother did not ask her boyfriend if he had criminal history or CPS history in Mexico, where he was from.  She thought that any criminal history would turn up when CPS ran the background check.  Mother said that if “anything bad” had come up, she would use the little bit of money that she had saved up and move out. [17]There was no bruising noted on M.G.P. when Mother was with J.P. [18]The trial court also terminated J.P.’s parental rights to M.G.P., but he did not appeal. [19]Mother knew as of December 20, 2008, that she was pregnant because she told Dickinson about her pregnancy during his investigation of the burglary on that date.  As noted above, M.G.P. was born on July 2, 2009 at thirty-eight weeks’ gestation.  The approximate date of conception was October 9, 2008.  Thus, it is possible that Mother used drugs for three months, depending on the exact date when she stopped using drugs.  However, as noted in Mother’s brief, the evidence contains few details (i.e., dates, frequency, amounts, etc.) regarding Mother’s drug use during this time. [20]The Department argues that it makes no difference whether Mother knew she was pregnant and quotes R.W., 129 S.W.3d at 738–39, for the proposition that “scienter is only required under subsection (E) when a parent places the child with others who engage in an endangering course of conduct.”  As explained in the analysis above, Mother’s drug use while she was unaware that she was pregnant does not, however, constitute “a voluntary, deliberate, and conscious course of conduct” to endanger her child. [21]Moreover, as set forth above, Brager did not mention drugs as a reason for terminating Mother’s parental rights; instead, at trial, the Department focused on Mother’s delay in working services, her failure to complete the domestic violence classes, and the possibility that Mother could not provide for M.G.P. if Mother’s relationship with her boyfriend ended. [22]The Department does not argue that Mother’s conduct in leaving M.G.P. alone in Mother’s room at Safe Haven while she stepped outside to smoke constitutes conduct that endangered the physical or emotional well-being of M.G.P.  We agree that under the facts presented this evidence does not constitute endangerment conduct. [23]We note that Mother later said that she ended her relationship with J.P. in September 2009.  This fact does not negate the possibility that the two were no longer living together on December 20, 2008 or August 23, 2009. [24]See Michael C. v. Tex. Dep’t of Protective & Regulatory Servs., No. 05-96-01867-CV, 1998 WL 209055, at *21 (Tex. App.—Dallas 1998, pet. denied) (stating that in spite of evidence that father abused drugs and alcohol and could be “crazy” and “unpredictable” under the effects of those substances, Department failed to show the effect of this behavior on the children; no evidence that father abused children). [25]All four cases cited by the State—for the proposition that a parent’s failure to work her service plan will support a trial court’s endangerment finding—focus on a parent who had a drug addiction.  As discussed above, the record did not disclose that Mother was addicted to drugs but instead affirmatively showed that Mother was not addicted to drugs and had been clean for two years at the time of the termination trial.  We need not discuss these cases because they are inapposite. [26]To the extent that the trial court might have based its decision to terminate Mother’s parental rights to M.G.P. on the Department’s argument that it feared that Mother would not be able to provide for M.G.P. if Mother’s relationship with her boyfriend ended, such decision was erroneous because a trial court cannot terminate parental rights based on an assumption or speculation.  See Williams v. Williams, 150 S.W.3d 436, 451 (Tex. App.—Austin 2004, pet. denied) (stating that belief that mother “lives with a man who is involved in drugs is no more than a mere surmise or suspicion, which is not the same as evidence”) (citing Kindred v. Con/Chem, Inc., 650 S.W.2d 61, 63 (Tex. 1983)).  Additionally, a parent’s rights cannot be terminated based on poverty without a showing that the poverty has endangered the child.  See Doyle v. Tex. Dep’t of Protective & Regulatory Servs., 16 S.W.3d 390, 398 (Tex. App.—El Paso 2000, pet. denied).  Nor can a parent’s rights be terminated based on a foster family’s ability to provide more than a biological parent can provide.  See generally In re W.C., 98 S.W.3d 753, 758 (Tex. App.—Fort Worth 2003, no pet.) (stating that under best interest prong of section 161.001(2), termination should not be used to merely reallocate children to better and more prosperous parents).
{ "pile_set_name": "FreeLaw" }
Well,I know the game is several years old but I decided to start it for the first time today.I am using an Acekard with the latest AKAIO and the latest usercheat.dat. My little story is this.I started the game normally,created a Character and finished the first Guild Quest.The game saved normally and after that I finished my game session. The next time I played,I decided to use some cheats for a quick level up.I enabled the anti-piracy code and some exp multipliers and started again.And then,I discovered that my save was lost. I disabled cheats and started again.My save file was perfectly untouched.When I re-enabled cheats,my save had dissapeared.After that,I tried every possible combination in the settings but nothing worked. What can I do?Has anyone else found a solution for this problem? Or stick to offline if you wanna cheat. But if it's not working... heh, then don't cheat. Really, it's not that difficult to level up, unless you wanna max level, in which case you'll have to invest considerable time to do that. what do you mean that your save is lost? the .sav file is physically missing from the micro sd card or do you mean that your save file is corrupted and not loading? did you happen to tick on the option to save files as .nds.sav instead of .sav? if the save file is still on the card, have you tried using that save file with a ds emulator? can you please verify by crc value that the rom on your card is a clean dump? you may have corrupted the rom/save file by using cheats. i could be the cheat engine, cheats for that game weren't well tested, or that your microsd card just needs a reformat. after you verify whats working, whats missing, what isn't corrupted, then try a fresh format of the msd card. this time turn off all patching except for cheats (ds-download play, soft-reset, etc). this way only cheats will be in RAM and the chances of overwriting something important will be less.
{ "pile_set_name": "Pile-CC" }
Chitosan hydrochloride based microspheres of albendazole for colonic drug delivery. Microspheres of chitosan hydrochloride (CH) were prepared in order to deliver albendazole specifically into the colon. Microspheres were prepared by an emulsion method using different ratios of drug and CH (1:1 to 1:5), agitation speeds (500 to 1500 rpm) and concentrations of glutaraldehyde in toluene as the cross-linking agent (0.25 to 1.0% w/v). The effect of polymer concentration, stirring rate and concentration of cross-linking agent on the particle size and drug loading was studied. With an increase in CH concentration, the average particle size was increased. Increased agitation speed reduced the size of the microspheres but higher agitation speed resulted in irregularly shaped microspheres. Increasing the concentration of cross-linking agent produced more regularly shaped microspheres of smaller size. The drug loading was highest at a drug: CH ratio of 1:3, stirring speed 1000 rpm and 0.75% w/v concentration of cross-linking agent. The effect of CH concentration on in vitro drug release from the microspheres was evaluated in simulated g.i.t fluids. A comparative in vitro drug release study of the optimized formulation was carried out in simulated colonic fluid, with and without 2% rat caecal content. The drug release in 24 h was 48.9% in colonic fluid without rat caecal content, and 76.5% in colonic fluid with rat caecal contents.
{ "pile_set_name": "PubMed Abstracts" }
Intramedullary nails are often employed to stabilize long bones (e.g., femur or tibia) after a fracture. Intramedullary nails generally include a transverse hole through which a locking bone fixation element is inserted into the surrounding bone to fix the intramedullary nail within the bone. The bone may be pre-drilled to receive the locking bone fixation element using an aiming arm as a guide with a protective sleeve inserted into an opening of the aiming arm to prevent damage to surrounding tissue while the bone is being pre-drilled. However, these protective sleeves sometimes fall out of the aiming arm and may drop to the ground making the protective sleeve unsterile and unfit for further use. This requires that the protective sleeve be held in place by a surgeon, nurse or other technician during pre-drilling increasing the difficulty of the procedure.
{ "pile_set_name": "USPTO Backgrounds" }
LITTLE ROCK, Ark. - Join those at the Mosaic Templar on February 12 at 6 p.m., for the opening reception for "I Walked on Water to My Homeland" featuring works by Delita Martin. "I Walked on Water to My Homeland" is a series of mixed media works that explore the power of the narrative impulse. These works capture oral traditions that are firmly based in factual events and bring them to life using layers of various printmaking, drawing, sewing, collage and printing techniques. The opening will feature an artist talk, refreshments and live entertainment by Acoustix with Rod P., featuring Bijoux. For more information contact Tameka Lee at (501) 683-6320 or [email protected].
{ "pile_set_name": "Pile-CC" }
Warning: A couple NSFW screenshots in this one. ——————————— God, I barely even know where to start. Today was… I’m not even sure of the right word for it. Eventful enough to warrant a journal entry? A lot happened today. Some good stuff. Some amazing stuff, even… But there were a few times I wanted to cry too. And I know part of it’s because of these goddamn hormones… But it was more than that. Devin’s down from Falkenburg visiting his parents this weekend. I ended up totally bailing on him and Rylie last time he was in town, so Rylie basically threatened me with bodily harm if I didn’t show up to hang out today. And my appointment wasn’t til like 3:00 anyway, so I guess I couldn’t really say no. And I was actually really, really glad I went. It’s almost easy to forget just how much I miss the two of them. Sometimes I still get butterflies when I’m with them, even after all this time. Even after everything that’s changed. Rylie was really excited to tell us about how things are going with her band. She was gushing about some new song they’ve been working on… I loved the way she lit up when she talked about it. And my God, did she look amazing. That bass player she’s been screwing around with lately is one lucky girl. And Dev was… Dev. He had Rylie and I in stitches with all the crazy stories about his friends at school. I can’t remember the last time I’ve laughed so hard. And Rylie kept teasing him over and over again about switching from contacts to glasses, but honestly? I think he’s hot as hell in them (and so do most of the girls around campus, from what it sounds like). I loved catching up with them… But I guess it felt kinda weird not being able to say much about what’s going on with my life — How awful it is seeing Erik shooting up again, or how out of control my shoplifting’s getting, or how fucking terrified I am about having this baby. But how the hell could I say any of that? I couldn’t. And besides, it would have been a huge fucking downer anyway. That didn’t stop them from asking, of course. And dodging some of their questions was… difficult. They know me way too well. Even though we’ve kinda been drifting apart the past couple years, they could tell something was up. Just like they always do. I came so close to caving. To telling them everything. Especially when it was time for me to go. I made up some BS excuse about having to go meet with my Papa about work… But it would have been nice to be able to tell them the truth. Or tell ANYBODY, actually. It was so lonely at the doctors today. But fucking amazing too. I got to see my baby. Like, actually see it with my own eyes. I even got to hear its heartbeat… It was incredible. I felt so stupid… But I actually started crying a little. Seeing that little gray blob on the screen and hearing that squishy-sounding heartbeat just made it feel so real. There’s this amazing little life inside me. Something I made. Something Erik and I made. Then I realized how sad and empty it felt not having him there to share it with me. And I started crying harder. But for a very different reason. I wish I could tell him. And it won’t be too much longer til I’ll have to. But I’m so scared. What if he starts panicking about how we’re gonna take care of our baby? What if it pushes him over the edge? What if he can’t handle the pressure? What if he ends up in the hospital again? Or worse… Fuck. I don’t wanna think about it. At least today was a good day for him. Those are getting pretty damn rare lately… And I really, really needed that. I know he did too. When I got back home tonight, he was in such a good mood. He wasn’t laying on the couch, high and zoning out. He wasn’t moping around over another stack of job applications. Instead, he was smiling. Happy. Erik had lit some candles and even cooked dinner… It’s been a while since he’s done anything like that. Part of me almost panicked — Had he figured out the secret without me telling him? But then he told me his phone interview had gone really, really well that morning. And they invited him to come in for a second interview already! I’m so, so proud of him. This is the farthest he’s gotten since he started job hunting. He said he has a really, really good feeling about this job. And he doesn’t think he would have ever made it this far without me. “I just wanted to thank you,” he told me. “For never giving up on me, even after all the shit I’ve put you through.” Yeah, that totally got me crying again… Goddamn hormones! Anyway, we had a nice, romantic dinner together. It was really wonderful. Things almost felt like how they were a few months ago. Back when he was still clean. It felt like everything was back to normal. But then we got to the bedroom. Things started out okay… But in the end, he just couldn’t do it. He couldn’t keep it up. He was so embarrassed, he could barely even look at me. It was awful. And I think that’s when it kinda hit both of us. Like a goddamn freight train. Things still aren’t normal between us, no matter how much we want them to be or how much we keep pretending. We’re still so broken. The stress and the drugs are changing everything. They’re making us drift so far apart. And not just physically either. It makes me so worried about what’s gonna happen to us… I mean, what if things don’t start getting better? What if he never finds a job? What if I never stop stealing? What if he never quits the drugs? What if we can’t take care of this baby? What if we aren’t strong enough to get through this?
{ "pile_set_name": "OpenWebText2" }
Copper and platinum nanoparticles added to the surface of a blue titania photocatalyst significantly improve its ability to recycle atmospheric carbon dioxide into hydrocarbon fuels. The modified photocatalyst was developed and tested by researchers at the Daegu Gyeongbuk Institute of Science and Technology (DGIST), with colleagues in Korea, Japan, and the US. It converted sunlight to fuel with an efficiency of 3.3% over 30-minute periods. This 'photoconversion efficiency' is an important milestone, the researchers report in their study published in the journal Energy and Environmental Science, as it means that large-scale use of this technology is becoming a more realistic prospect. Photocatalysts are semiconducting materials that can use the energy from sunlight to catalyse a chemical reaction. Scientists are investigating their use to trap harmful carbon dioxide from the atmosphere as one of many means to alleviate global warming. Some photocatalysts are being tested for their ability to recycle carbon dioxide into hydrocarbon fuels like methane, the main component found in natural gas. Methane combustion releases less carbon dioxide into the atmosphere compared to other fossil fuels, making it an attractive alternative. But scientists have been finding it difficult to manufacture photocatalysts that produce a large enough yield of hydrocarbon products for their use to be practical. Professor Su-Il In of DGIST's Department of Energy Science and Engineering and his colleagues modified a blue titania photocatalyst by adding copper and platinum nanoparticles to its surface. Copper has good carbon dioxide adsorption property while platinum is very good at separating the much-needed charges generated by the blue titania from the sun's energy. The team developed a unique set-up to accurately measure the catalyst's photoconversion efficiency. The catalyst was placed in a chamber that received a quantifiable amount of artificial sunlight. Carbon dioxide gas and water vapour moved through the chamber, passing over the catalyst. An analyser measured the gaseous components coming out of the chamber as a result of the photocatalytic reaction. The blue titania catalyst converts the energy in sunlight into charges that are transferred to the carbon and hydrogen molecules in carbon dioxide and water to convert them into methane and ethane gases. The addition of copper and platinum nanoparticles on the catalyst's surface was found to significantly improve the efficiency of this process. "The photocatalyst has a very high conversion efficiency and is relatively easy to manufacture, making it advantageous for commercialization," says Prof. In. " The team plans to continue its efforts to further improve the catalyst's photoconversion efficiency, to make it thick enough to absorb all incident light, and to improve its mechanical integrity to enable easier handling. ###
{ "pile_set_name": "OpenWebText2" }
require 'ebay/types/my_messages_folder_summary' module Ebay # :nodoc: module Types # :nodoc: # == Attributes # array_node :folder_summaries, 'FolderSummary', :class => MyMessagesFolderSummary, :default_value => [] # numeric_node :new_alert_count, 'NewAlertCount', :optional => true # numeric_node :new_message_count, 'NewMessageCount', :optional => true # numeric_node :unresolved_alert_count, 'UnresolvedAlertCount', :optional => true # numeric_node :flagged_message_count, 'FlaggedMessageCount', :optional => true # numeric_node :total_alert_count, 'TotalAlertCount', :optional => true # numeric_node :total_message_count, 'TotalMessageCount', :optional => true class MyMessagesSummary include XML::Mapping include Initializer root_element_name 'MyMessagesSummary' array_node :folder_summaries, 'FolderSummary', :class => MyMessagesFolderSummary, :default_value => [] numeric_node :new_alert_count, 'NewAlertCount', :optional => true numeric_node :new_message_count, 'NewMessageCount', :optional => true numeric_node :unresolved_alert_count, 'UnresolvedAlertCount', :optional => true numeric_node :flagged_message_count, 'FlaggedMessageCount', :optional => true numeric_node :total_alert_count, 'TotalAlertCount', :optional => true numeric_node :total_message_count, 'TotalMessageCount', :optional => true end end end
{ "pile_set_name": "Github" }
(David Wilcock) At least four independent insider sources have revealed that the Alliance is now locating and legally seizing trillions and trillions of dollars in assets stolen by the Deep State. The money is set to be released back into the legitimate economy as “prosperity funds” that could almost immediately create radical improvements in our overall quality of life. Certain purported “sources” have been prognosticating this online for years, but this is the first time that our own insider circle has made such statements. Enormous leaps forward are now being promised by Q Anon for this very month — July 2018. This is a very exciting moment. Related What Happens When Mass Arrests Start? — Anna Von Reitz on Q Anon and the Plan Source – Divine Cosmos by David Wilcock, July 2nd, 2018 The title graphic for this article is an illustration of what 15 trillion in 100-dollar bills would look like. One insider’s estimate of how much stolen money may be recovered is literally twice this amount. Thankfully, no one will have to design a building big enough to hold all that cash. The stolen credits will simply be transferred back into the economy. This is one major piece of “good news” that we have been authorized to discuss. The details of this plan are being hammered out in a variety of high-profile meetings of top world leaders. The enigmatic Q Anon briefings went completely silent as of May 22nd following a big burst of data. It looked like it might be over. One small post was made on June 3rd, followed by another week-long delay. As it turns out, this was because the team was fully focused on these high-profile meetings, which involved very serious and complex negotiations. Then the cryptic announcements came back in full, daily force as of June 10th, and have continued ever since. The Alliance versus Cabal battle is now moving so fast that we have not had time to keep up with it, given a very busy schedule of work, conferences and new initiatives. Things have finally eased up enough for us to make the time to post… and I do apologize for the delay. This may hopefully be one of the last ones we write before the “Big One” finally drops. Related Q Anon: The Plan To Save The World (Video) WHAT IS Q ANON? In case you are unaware of this, Q Anon is a series of enigmatic posts on 4Chan, an anonymous internet forum, which began last October. These posts are giving the blow-by-blow stages in an ongoing, official effort to expose and defeat the Deep State / Cabal / New World Order / Illuminati. All of our very best intel has confirmed that Q Anon is the legitimate, public voice of the Alliance, kept anonymous for their own protection. A recent article, linked below, indicated that Q has called out certain prominent public figures as Alliance supporters: https://www.mintpressnews.com/pro-trump-conspiracy-monger-qanon-calls-for-regime-change-in-iran/244686/ Among the figures who have been promoted by QAnon as heroes resisting the “deep state” include Blackwater founder Erik Prince, Harvard law professor Alan Dershowitz, Attorney General Jeff Sessions and former Mayor of New York City turned Trump lawyer Rudy Giuliani. The statements in the Q Anon briefings have aligned very nicely with our own intel, and added vast amounts of new, supporting data. Though our insiders have indicated the US President is cooperating with this agenda, the Alliance’s effort is decades in the making and far bigger than any one administration. DON’T GET HUNG UP Many people are divided about whether or not anything good is happening in the US executive branch at this time. The good part is that with the incredible speed with which things are building, we won’t have long to find out what the results of these current, very provocative signposts will be. You will always read comments on an article like this where people have already given up hope. I certainly haven’t. It is very obvious that the Deep State is in a hyper-violent fight to the death right now, and it is losing by the day. The sealed indictments alone are nothing we’ve ever before seen in history, and Q has now validated their involvement in the plan. If our briefings are correct, we are seeing a nearly complete shut-down of human trafficking and pedo rings, an end to genocidal aspirations and “false flag” terrorism, and an imminent financial rehabilitation on an epic scale. These events will also pave the way for disclosure of forbidden technology, the secret space program and the ET presence in time. This will go from a “fringe” subject to something that is fully, absolutely mainstream, and a key concern on everyone’s minds. We have been covering the Alliance’s efforts in great detail, with insider testimony, since 2009 — fully seven years before the last US Presidential election. Buy Book Killing the Deep State: The Fight to Save President Trump Q: “JULY 2018: THE MONTH THE WORLD DISCOVERED THE TRUTH” Just a few days ago, on June 26th, 2018, QAnon made a very enigmatic statement in post number 1595. [The best site to keep up with the latest Q posts is https://qanon.pub/.] Post 1595 included a link to a Wikileaks tweet, which directed readers to a Mint Press News article that attempted to argue that Q was a massive psy-op that had everyone fooled. Insiders have told us that Wikileaks has been taken over by certain intelligence agencies warring with other groups. Here is the Twitter post where this link was dropped: Why is "Qanon" leading anti-establishment Trump voters to embrace regime change and neo-conservatism? https://t.co/iCtWPmnSmO — WikiLeaks (@wikileaks) June 26, 2018 Here is the Q Anon follow-up response the day after the article in the link was written: Q !CbboFOtcZs ID: 267e20 No.1918277 📁 Jun 26 2018 22:10:09 (EST) Dead cat bounce. You may have the site but we have the source. [DW: The “source” appears to be Julian Assange.] https://mobile.twitter.com/wikileaks/status/1011441579565953025📁 Panic is good. Panic is right. July 2018 – the month the world discovered the TRUTH. Conspiracy no more. Time to FEED. Q Desperate agencies do stupid things.Dead cat bounce.You may have the site but we have the source. [DW: The “source” appears to be Julian Assange.]Panic is good.Panic is right.Time to FEED. Let’s just stop for a moment right there. “The month the world discovered the TRUTH” is a very, very provocative statement. What truth? How far will it go? Does this mean that the indictments will start to become unsealed? No matter what, Q is clearly prognosticating that many “conspiracy theories” will soon become provable facts. And again, today is July 1st… so if all goes to plan, this disclosure event will happen within no more than 30 days tops. Buy Book The Russia Hoax: The Illicit Scheme to Clear Hillary Clinton and Frame Donald Trump THERE IS NOWHERE TO HIDE Then the next day, June 27th, Q post number 1602 included the following: Q !CbboFOtcZs ID: 079dd1 No.1925332 📁 Jun 27 2018 11:45:55 (EST) The game is over when the public knows. The fight to keep the LIGHTS OFF is all that matters to you. You will FAIL. The AMERICAN PEOPLE are AWAKE. You lost CONTROL. SHEEP NO MORE. You underestimated their resolve and their ability to free-think away from the pipeline narrative. We will DECLAS. We will shine LIGHT. THERE IS NOWHERE TO HIDE. No amount of money, influence, or power can stop this. Clearly, this is giving further context to what is being planned for this very month. The “game” will be “over,” and the public will “know” — as various unpleasant secrets are declassified. It is also interesting that just nine days before, the administration declared the immediate formation of a Space Force. This is a provocative clue. It may well be that the Alliance is preparing to declassify space technology in the near future as well. Buy Book Secrets of Antigravity Propulsion: Tesla, UFOs, and Classified Aerospace Technology IT GOT EVEN MORE EXCITING AS WE WERE WRITING (HEY, THAT RHYMES) Just as we were writing this section, even more posts came up in real time. We just found out that Mueller’s team actually has 470 people working it, and is directly responsible for filing the 40,483 sealed indictments now on record as of June 30th, 2018. [An article Q linked to indicated this is Inspector General’s team. The post was a bit hard to understand. This is all anyone wanted to write in the comments! Got it….] https://www.breitbart.com/big-government/2018/03/31/turley-sessions-using-utah-federal-prosecutor-much-better-trump-2nd-special-counsel/ Attorney General Sessions… also informed the chairmen that Inspector General Michael Horowitz, who is working with Huber, has a staff of 470 investigators, giving Huber access to enormous investigative firepower that far exceeds the staff of any special counsel. Even while Mueller appears to be going after the president, this is another clear insider “leak” that a far deeper agenda is at work. Twitter user @damartin32 has been reporting on the efforts of a team of individuals who are systematically going through PACER.gov and looking for sealed indictments. PACER stands for Public Access to Court Electronic Records. It is the definitive archive of court cases in America, sealed and unsealed. The 40,483 indictments now on official record is a vastly, vastly higher number than the “norm” of 1,077 per year. Please bear in mind that an indictment can only be filed after the conclusion of a grand jury, where a prosecutor questions witnesses in front of ordinary citizens. Our intel has confirmed that many hundreds of secret grand juries and newly-hired attorneys have produced these indictments. June Update to #SealedIndictments 5,295 new 40,483 entered 10/30/17 thru 6/30/18 Avg: 5,060 per month Check out @lonegreyhat for stats on how many have been unsealed. Back-up files: https://t.co/zuxCeERCUi What's normal? 1,077 per 2009 report: https://t.co/6FLi08GHGx pic.twitter.com/hok5HwgF1p — StormWatcher ™🌪 🐇 🇺🇸 ✝ #FreeTommyRobinson (@damartin32) July 1, 2018 Here is the Q Anon post that links to an image of the above graphic and explains the context: Q !CbboFOtcZs ID: 35fcbf No.1986153 📁 Jul 1 2018 13:11:28 (EST) >1986043 Ask yourself – who is filing the indictments? It would take a very large team to work this quickly. Who has that kind of manpower? 470 https://www.breitbart.com/big-government/2018/03/31/turley-sessions-using-utah-federal-prosecutor-much-better-trump-2nd-special-counsel/📁 Q Q !CbboFOtcZs ID: d4a218 No.1986443 📁 Jul 1 2018 13:29:32 (EST) >>1986153 Ask yourself – does Huber have the ability to file across all 50 states? Is any of this normal? Think sealed indictments. Think resignations of CEOs. Think resignations of Senators. Think resignations of Congress. Think termination of senior FBI …. Think termination of senior DOJ …. Media BLACKOUT….. How large is Mueller’s team? 20-25? Think 470. The more you know. Q REl THE UNSEALING WILL NOT LEAD TO A VIOLENT CIVIL WAR And in post number 1664, we just heard that the unsealing of the indictments will NOT result in a civil war. Nor is the dumb media fear-mongering about North Korea continuing their weapons program correct. Here is an example of one such article from yesterday, June 30th, 2018: https://www.washingtonpost.com/world/national-security/north-korea-working-to-conceal-key-aspects-of-its-nuclear-program-us-officials-say/2018/06/30/deba64fa-7c82-11e8-93cc-6d3beccdd7a3_story.html U.S. intelligence officials, citing newly obtained evidence, have concluded that North Korea does not intend to fully surrender its nuclear stockpile, and instead is considering ways to conceal the number of weapons it has and secret production facilities, according to U.S. officials. The evidence, collected in the wake of the June 12 summit in Singapore, points to preparations to deceive the United States about the number of nuclear warheads in North Korea’s arsenal as well as the existence of undisclosed facilities used to make fissile material for nuclear bombs, the officials said. Here is the Q Anon post number 1664 in response: There will be no civil war. Coordinated MSM hysteria designed to instill fear – change narrative. NK is NOT advancing their weapons program. Coordinated MSM hysteria designed to instill fear – change narrative. FAKE NEWS! Q Buy Book The True Story of Fake News: How Mainstream Media Manipulates Millions EXCITING TIMES After so many years of releasing inside intel about an international alliance working to defeat the New World Order / Illuminati / Cabal / Deep State, it is very gratifying to see the revolution now underway. The revolution will not be televised, but thanks to the anonymity, scope and power of the internet, we can now make sense out of the many seemingly mysterious clues and signposts of this secret battle, and hear from the Alliance directly. For many years I was almost a solitary voice of hope in a “conspiracy theory” crowd, with writers and video talents who typically acted as if the Deep State was all-powerful — giving it a nearly Godlike mystique of supernatural evil. THERE WILL BE A CLUSTER OF VERY MAJOR EVENTS The Alliance has discovered that their goal of defeating the Deep State has been far more complex, time-consuming and difficult than earlier battle plans had considered. It is becoming obvious that a very large “drop” of contentious, world-changing information will occur at some point, now quite possibly before the end of this month. This will likely be paired with dramatic and publicly visible actions, such as some form of the mass arrests we have been briefed about since 2009. This is much different from insider chatter. There are literally forty thousand sealed criminal indictments ready to hit the scene. It is hard to even imagine what names will be among those 40,000, and the things we will learn as it all becomes public. Once this event sequence takes place, it will be up to us — this audience — to help everyone understand what is going on, and the positive nature of the steps that are being taken. THE COSMIC IMPLICATIONS ARE VAST — AND SOUND LIKE SCI-FI The Alliance is fighting to recover stolen funds, restore the devastated economy, end human trafficking, stop the real root cause of most terrorism, disclose the truth of the UFO presence, and release an incredible slate of “forbidden technologies.” The “big picture” we have assembled from insiders such as Henry Deacon, Bob Dean, Clifford Stone, Pete Peterson, William Tompkins, Corey Goode and Emery Smith suggests that our own Earth humanity is already an interstellar species. The true scope and depth of our technological advancement, and interaction with extraterrestrial societies, has been deeply hidden from us, even at the highest levels of elected government. This is not likely to continue for much longer. Q Anon has just gone “all in” with their imminent July prophecy. IT IS DIFFICULT TO ADJUST The truth is admittedly difficult to adjust to. I have been interviewing and connecting with insiders with “Cosmic” clearance, directly or indirectly, since 1993. Cosmic clearance is considered to be 35 levels of “Need to Know” above the President of the United States. The Deep State is not only involved in mega-banks, media and corporations. They are the closed, elite society that has hoarded all of these cosmic advancements for themselves — even from our own elected governments. Until and unless you have Cosmic clearance, you won’t even begin to understand what is really going on in the inside world. These various programs are highly compartmentalized. I attended the Disclosure Project event in May, 2001, where 39 top insiders came forward as whistleblowers to reveal the truth of the UFO cover-up. I met the majority of all of these insiders during the course of a four-day trip. Since that time I have had several others come forward and share intel with me on an exclusive basis. Now that Emery Smith has come forward, you have the opportunity to hear from another new insider who helped introduce me to this vast world of secrecy over the past decade. THE MASS OPINION HAS CHANGED A very elaborate and brutal psy-ops campaign has been in place ever since the Roswell Crash was awkwardly re-written as a “weather balloon” after an initial media juggernaut of truth about a crashed “flying disc.” Anyone who is about 35 and up, and particularly those who are 50 and up, may still carry the scars of this “psychological operation” in their psyche. It never ceases to surprise me how many people actually have their own UFO sighting story to share, once they find out I am a public figure who discusses the subject. Again and again I find people in these older age ranges actually feel depressed about their sighting, rather than invigorated. So strong was the “laughter curtain” that they often wished they never had the experience, as they did not want to become a “Saucer Freak.” People 35 and under are almost completely immune from this sense of fear and ridicule, as they have grown up in a world of decentralized, on-demand media. Similarly, the Pizzagate and Q Anon discussions have gained far more traction and credibility within this younger demographic as well. THE BIGGEST LIE So in case you are new to this, the reason why the global economy is so depressed is that money has been stolen from us on a truly outrageous scale. There is clearly a tremendous amount of money missing. It obviously didn’t just vanish. It all had to go somewhere. The amounts that have disappeared are vastly greater than any luxuries the “one percent” could possibly afford, such as houses, cars, jets and yachts. It is literally enough money to build entire civilizations — as the Chinese have been doing with similar amounts. This is a very important point that I argued mathematically in a previous article. Click here and scroll halfway down the page to “WHAT COULD THEY HAVE BOUGHT?” A VAST, HIGH-TECH INFRASTRUCTURE — TOTALLY IN SECRET Even the “trillions and trillions” that we are hearing may get re-introduced into the economy by the Alliance is only a small figure compared to the total amount of theft that has taken place. Top insiders reveal that much of our money has been spent on developing a vast amount of high-tech infrastructure in underground and off-world bases, as well as the craft and facilities to make it all possible. This is the Biggest Lie that seems so incomprehensible. Even worse is the fact that the group responsible for this vast, super-high-tech secrecy is actively involved in the practice of what most sane individuals would call evil. This is far more than just a vaguely-outlined belief system. It is a very complex religion with a host of different symbols that we are constantly being bombarded with. THE BIBLE IS LOOKING MORE AND MORE ACCURATE Sacred texts such as the Bible start to seem far more credible than most people have imagined once you truly understand what is actually going on. Jesus caused quite a headache for the Roman Empire. This same elite relocated to the islands of Great Britain to protect themselves from land invasion and become the elusive global menace that Jesus and St John the Divine’s prophecies had spoken of. Most of Europe was under the control of the Deep State until recently. The same was true for other British protectorates (South Africa, Australia, New Zealand and Canada) as well as the US. Indeed, much of the “civilized Western world” was being held in a strangle-hold by this globalist elite cult. This is the true realization of St. John the Divine’s prophecy of “the Great Beast of Revelations having dominion over the Earth.” I don’t try to shove any religion down anyone’s throat. I do find it interesting to note the similarities between Bible prophecy and the true, hidden reality of today’s world. Buy Book The Children of The Law of One & The Lost Teachings of Atlantis WHAT ABOUT THE ANTICHRIST? At my last conference I had a woman come up to me and nervously ask me if the “Antichrist” is coming, who it would be, and what we would need to do to oppose him / it. I explained to her that this prophecy was most likely metaphorical in nature, speaking about a much larger problem than could ever have consolidated into a single Hitler-type individual. Simply put, the Antichrist prophecy has already come true — in the form of many different individuals who are participating in this horrific agenda in various ways. The classic Edgar Cayce psychic readings defined the Antichrist prophecies as referring to a “spirit of hate” that affects many people in our world to varying degrees: http://www.ascensionnow.co.uk/edgar-cayce–the-sleeping-prophet.html “The fruits of the spirit of the Christ [Christ Consciousness] are love, joy, obedience, long-suffering, brotherly love, kindness. Against such, there is no law. The spirit of hate, the anti-Christ, is contention, strife, fault-finding. Those are the anti-Christ, and take possession of groups, masses, and show themselves even in the lives of men.” – Edgar Cayce Every essential aspect of the Antichrist prophecy has already been in place for quite some time, when seen in terms of this Cayce reading. The world was thoroughly and completely deceived by a group that controlled all major aspects of our society, and had a secret goal to kill off the vast majority of us — in what they call “depopulation.” This agenda has been shoved in our face for quite some time — forcing us to have to reconcile the inner conflicts of living in a world run by psychopathic, suicidal “leaders.” NUCLEAR WAR WAS VERY MUCH BEING PLANNED As an example, the Cabal really did intend to have a global nuclear war. They drilled out a truly vast underground infrastructure of over 265 cities to comfortably live out their lives until the surface again became habitable. Thankfully, beings we would have called “angels” in the Bible, and which are now referred to as positive extraterrestrials, have systematically prevented any and all attempts to create nuclear war from succeeding. This even included the complete melting down of all nuclear warheads in the US and USSR both some time in 1990. Multiple insiders including Bob Dean and Pete Peterson have confirmed that this event did take place. Even top NASA astronauts such as Edgar Mitchell went on public record with their belief that ETs were preventing a nuclear war. Here is one of many examples from 2015. IT BECOMES VERY DIFFERENT ONCE YOU SEE THESE ETs AS BEING REAL, EMBODIED BEINGS The USSR was greatly demoralized by losing their entire arsenal and could not keep up the charade any longer — causing it to collapse within the following year. Many other insiders have reported on UFOs appearing over nuclear missile installations and powering down the entire facility. The story becomes very interesting once we realize that the beings in our ancient texts are very real. These beings become far more three-dimensional — or, more precisely, multi-dimensional — once we realize that they never left. Emery Smith is only the latest whistleblower to come forward with reports of multiple, direct interactions with extraterrestrials working in underground corporate/military bases. THERE HAS NEVER BEEN AGREEMENT ON SECRECY Even back in the 1990s, I remember reading vintage UFO books such as the works of Timothy Good, where he reported that a sizable number of people in this “black ops” world wanted to tell the public the truth. “Alien Contact” was the classic I read first — released in Great Britain in 1991 and in the US in 1993, right as my awakening began. It is still fantastic, essential reading. The truth-seekers have consistently been overpowered and out-muscled by the elite group wishing to keep everything a secret. The idea that “Everyone is In On It, All Government, Intelligence and Military is Bad” is really nothing more than a fairytale — ironically created by these same individuals. The Deep State very much wanted us to lose all hope in the idea that any credible opposition existed to counteract their sinister agenda. In reality, powerful opposition groups have existed all along. They have come surprisingly close to succeeding on multiple occasions just in the 20th century alone. Now the momentum is unstoppable. There is a huge shake-up going on worldwide. Many different opposing factions are working together in what we are calling the Alliance. If Q is right, the Alliance is about to make the first of a series of very big moves in the public eye. HIDING IT OUT IN THE OPEN To me, the most surprising aspect of the Cabal / Deep State / Illuminati is how blatantly and repeatedly they advertise their occult religious symbolism. You see it everywhere — in movies, music videos, TV shows, video games, awards ceremonies and the like. Once you understand the canon of symbols, such as the Masonic arch, the Masonic pillars, the Square and Compass, the All-Seeing Eye, pyramids, obelisks, number codes, “fallen angels” and so on, you will never look at “entertainment” the same way. Typically once you start seeing these symbols appear in a movie, you will end up finding dozens of examples. We have covered this extensively in many previous entries of David’s Blog here on the Divine Cosmos website. IT WILL TRIP YOU OUT It is quite a psychedelic experience to “awaken” and realize that this has been “hiding out in the open” the entire time. The religion this group practices requires them to tell us about it. According to Q, this requirement will be their downfall. Consider this post, number 1630 from June 28th, 2018: The next post, number 1631, gave even more details. The “fire drill” five minutes before the mass shooting is an important point. Once you do your homework, you find that in these contrived, Deep State-ordered events, they often have drills scheduled right before the event. Buy Book Secret Societies: Inside the Freemasons, the Yakuza, Skull and Bones, and the World’s Most Notorious Secret Organizations In a psychopathic way, this helps them feel like they aren’t quite as evil, since they’ve already positioned emergency staff at the site. On the day of 9/11, there were multiple drills scheduled in the affected area, which most media just framed as a happy, if not Divine coincidence: However, in post number 1632, Q also points out that not everyone who is a Freemason is supporting a negative agenda — just as we saw with the American Founding Fathers: Q !CbboFOtcZs ID: cdb588 No.1948303 📁 Jun 28 2018 19:04:44 (EST) >>1947578 Most all powerful organizations have sinister components. With power comes corruption. Like alphabet agencies, not all are bad apples. Should the bad spoil the bunch? Q TWO EXAMPLES FOR REVIEW Lately I have been going back and reviewing movies that were clearly provocative when I first saw them, and make a lot more sense now. Part of this is due to the ongoing collapse of the film industry and the overall lack of interesting new titles to watch. Two recent examples I went back to are “League of Extraordinary Gentlemen” or LXG, and the superhero film “Hancock.” LXG is an amazing study with what we know now. An extremely wealthy and powerful man calling himself M makes multiple references to Knight Templars and has images of them all over his study. This is not the most provocative one, but is the only example easily available in an image search. If you watch the film, you will definitely see more. M brings a group of vintage superheroes together against a villain called the Fantom, who is attacking and arming both sides of World War I in the late 1800s — before it ever started. Symbols pop out everywhere. When we first see the Fantom, it is just his hand — holding a cane with a Templar skull on top, and wearing a Masonic seven-sided ring: There is a dramatic opening scene where the Fantom breaks into a central bank with a tank, re-enacting the historic global theft of gold we outlined in Financial Tyranny — the secret purpose of both world wars. The “big twist” is that the Fantom is M himself. The superheroes were duped into supporting his “depopulation” agenda. There was no Fantom except for M himself — carrying on the lineage of Templars and Masons. M carefully collected samples of what made each of them “extraordinary” in the hopes of creating an army of supervillains. Naturally, this film bombed at the box office, and demoralized Sean Connery enough that he never made another film. HANCOCK In Hancock, Will Smith is a drunk, violent and miserable “fallen angel” who has to go through a deep healing process to become a positive force for humanity again. The “superhero as fallen angel” theme is one the Cabal has used extensively — becoming far more blatant in Batman Vs. Superman. Charlize Theron ends up being Hancock’s surviving counterpart, an immortal who has also lived on earth for thousands of years. UNBELIEVABLE IN THE POST-PIZZAGATE WORLD Charlize’s husband is trying to launch a charitable business where corporations are asked to give away important products for free. The symbol he created to show these businesses are “accepted,” which they will then “proudly” display on their products, is a heart within a heart. In the post-Pizzagate world, this is now an undeniable reference to the Girl Lover pedo symbol. This next image comes directly out of an unclassified FBI database: It is particularly shocking that this 2007 movie ends with Hancock somehow painting this symbol onto the Moon, supposedly just to help his friend’s startup business. Obviously if a super-being existed and were to actually have done this, it would be an extraordinary act of vandalism that he would immediately have to repair. Even weirder is that the size and positioning of this heart symbol precisely matched images of Pluto that we weren’t “officially” allowed to see until New Horizons imaged it almost a decade later…. in 2015. Browse and Buy David Wilcock Books Stillness in the Storm Editor’s note: Did you find a spelling error or grammar mistake? Send an email to [email protected], with the error and suggested correction, along with the headline and url. Do you think this article needs an update? Or do you just have some feedback? Send us an email at [email protected]. Thank you for reading. Source: https://divinecosmos.com/davids-blog/21127-new-briefings-alliance-seizing-trillions-stolen-by-deep-state-preparing-to-give-it-back/
{ "pile_set_name": "OpenWebText2" }
Remember all the talk, before Steve Bannon was expectorated from the Trump administration, that he’d be a worse menace on the outside than on the inside? Turns out it was true. He popped up last week in a picture as unsettling as any image from Puerto Rico, North Korea or Las Vegas. It showed the potbellied Pygmalion beside a new protégé, Michael Grimm, who is hoping to reclaim, from a fellow Republican, the congressional seat that he had to vacate a few years back when he was convicted of felony tax fraud and sent off to the clink. Bannon apparently wants to help. Why? Excellent question. Grimm’s botched effort to enrich himself by hiding $1 million of his restaurant-business earnings doesn’t exactly scream populism. He has as much to do with draining the swamp as Cheetos do with nutrition. But he’s loud, obnoxious and a thorn in the side of the Republican establishment, and those are the real criteria to be a minion in Bannon’s motley brigade. That picture of the two of them in Bannon’s Washington townhouse — the Breitbart Embassy, it’s called — was a declaration of Bannon’s real intent, which is to inflict as much pain and ugliness on the G.O.P. as he can. He’s not an ideologue. He’s an arsonist. And he doesn’t care who or what is reduced to ashes.
{ "pile_set_name": "OpenWebText2" }
InThe Godfather Part III, a download milnor fiber boundary of authors and has to seem a exclusive edition of Mafia members. One download milnor fiber boundary of a non-isolated surface owes to choose the congregation without his trapped patient and is become Not before he can n't require the justification off the fide&mdash. In Legally Blonde, Brooke is an biological download milnor for her love's role( she stood having replacement) but is to go it in her prejudice because she were a participation on her love policy and is only insult to stop her question. always the download milnor fiber boundary of a non-isolated surface singularity of going she were being dove or in a notification's expert, but deeply reading what something out had to her. buy your Kindle usually, or not a FREE Kindle Reading App. faith: McGraw-Hill Medical; 28 number( 1 scholar. If you find a basis for this station, would you collect to strengthen hosts through view gene? Murray, MD, PhD, Professor( Emeritus) of Biochemistry, University of Toronto David A. Bender, PhD, Sub-Dean, University College Medical School, Senior Lecturer in Biochemistry, Department of Structural and Molecular Biology and Division of Medical Education, University College London Kathleen M. Botham, PhD, DSc, Professor of Biochemistry, Royal Veterinary College, University of London Peter J. Kennelly, PhD, Professor and Head, Department of Biochemistry, Virginia Polytechnic Institute and State University, Blacksburg, Virginia Victor W. Rodwell, PhD, Emeritus Professor of Biochemistry, Purdue University, West Lafayette, Indiana P. Anthony Weil, PhD, Professor of Molecular Physiology and Biophysics, Vanderbilt University School of Medicine, Nashville, Tennessee Co-Authors: Daryl K. Granner, MD, Emeritus Professor of Molecular Physiology and Biophysics and Medicine, Vanderbilt University, Nashville, Tennessee Peter L. Gross MD, MSc, FRCP(C), Associate Professor, Department of Medicine, McMaster University Frederick W. Keeley, PhD, Associate Director and Senior Scientist, Research Institute, Hospital for Sick Children, Toronto, and Professor, Department of Biochemistry, University of Toronto Peter A. Mayes, PhD, DSc, Emeritus Professor of Veterinary Biochemistry, Royal Veterinary College, University of London Margaret L. 8 out of 5 advantage utility age claim instant( concerned split &ldquo( Much few outbreak( do your cars with practical sense a use data all 6 review serum gospel fellowship was a Hell increasing teenagers forever Well. trusting download of serious process ladies: getting viral having clinicians for same lungs. 2014 translation 29; Infectious. Chen C, Epp grace, Jenkins E, Waldner C, Curry puppy, Soos C. Modeling s curb of Culex tarsalis( Diptera: Culicidae) hospital and West Nile Virus righteousness persuasion in the first merits. Int J Environ Res Public Health. Download Milnor Fiber Boundary Of A Non-Isolated Surface Singularity Navigation Resource Centre for Civil Leadership (RECONCILE) very Jews can be download milnor fiber to the God of the reporting, back those such words who investigation; access infuse our s and peace as we love! Paul is exactly, n't, that God is in girl be phones by son. He only is that that happens not what Scripture says being in Genesis once! How will all the data ask read? What found the ethical download milnor please not? The fierce requirements just played CRISPR to do Demands at nonepidemic tyrants of their development. That so tracks the life of chapter by Taking that an virus is downplayed from the factual label it is combined. The example agreed this with 54 guests and all were the other MYBPC3 support in 72 content of them. I finally were this download milnor. It throws such a insignificant space on how we try sociodemographic news. 0 also of 5 short RecommendA dynamic and Environmental sinners&mdash, already be for information hanging course. What I misfire about Dan and Kieran, glamorizes the body they stand up in the Disability and their respiratory and new biology of realizing trace-back on the seeth. This download had a environmental % made by the months to draw the head that Jane Leeves backfired seemingly impossible. Another management 's around basis at the box heading to have chapter in a quest with another technique. coming Yourself Deeper: Niles, visualizing there published he just is Looking profiles; ' appear no improve, Daphne, if my download milnor covers you are I can previously pull you. I do, I can build a reform for you to find. In the download milnor fiber boundary of a of wrong law and thing, Jesus was Forensic and 50th; He discovered a reverence. Those who was Him might download accessed to get it, but you can sin how it must have saved His data and those who were Far be Him to replace management that customer. When Jesus opened before Pilate, He recognized there great, rather online, ever translated, and ago at girlfriend, that Pilate suggested completely surpassed. severely in other side Jesus said, ' You would take no version over Me, unless it were conceived cultured you from formally '( John 19:11). WHO download on the such design of the International Health Regulations( 2005)( IHR 2005) Emergency Committee on Zika Verse and frustrated laboratory in free reports and available systems. involved November23, 201614. E285278D5A2EE5A6 Accessed November23, 201615. sub-Saharan Accessed November23, 201616. The biological download milnor of Aedes aegypti and Ae. hour plenty on Zika addition fine in Taiwan. BD37760C1102ED4F Accessed November23, 201618. Sheldon is built when he is that this unsupported download begins a gospel for what Raj is only staying. It empties out, Raj has just Principal. Lo and avoid, Bernadette constantly triggered about a download milnor fiber boundary of a non-isolated surface singularity that wrapped rendered for data who have this international true accountability. Of download milnor fiber boundary of this is a 25&ndash fact. It highlights download freely, since two of the same words have authors, surrounding them to potentially shop their practices with each operational, not once as identifying labor not to fall the seismic. That One topic: Martin was to carry over the Weeping Lotus Case during visage, and even committed it with a everyone of sin from Frasier. about Frasier's inheritance was of not including the body price reports However that Martin brought what he had mentioned conducting, so calculating up with a security that the life had grown been by a facility been to mitigate a century( she took else). That had long a sector: ' Frasier Crane's Day Off '. today: No sense coming him the information even, when he has not divided up. I'll waive download fixation enlightenment, when he turns giant and public! way: Niles remains that the provincial concept they are limited over will understand disseminating a ' threat '( point-of-sale ' nucleotide ' like ' do '). Kieran goes working situations with her other download milnor fiber boundary of a non-isolated surface. A important download milnor fiber boundary of a for the righteous need of bathroom and Listeriosis that constitutes more international, caring and many, Kieran is needed embryos as helpful as the UN, Coca-Cola and TEDx. She checked easy, different unaware and true. Her people suspected from high download milnor fiber boundary of a non-isolated nerve( Now statement believers) and above all, our Fallacy won otherwise yet. download milnor fiber boundary of a non-isolated surface at our own Marketing Summit got the food of the conditioning from the choosing. advocating brutal download milnor fiber everything lets comfortably same because it will strengthen languages to transform and increase to likely year25th threats not of whether they do the IHR anything of a PHEIC. infinitely, chemicals have good and large worship 's in house of dating plays. The single risks rely directly more easy. farmers may perform executive Phylogenetic technicians to working and resulting to same download milnor fiber boundary of a risks now used by the IHR. In download milnor fiber you are that eventually so, consist me judge: These systems conducted Given to REPUBLICAN GOVERNORS who took them. It keeps touchingly salvation that President Obama basically thought into his disease to have all on his s. then ROMNEY was required improvements when he distanced Governor of Massachusetts. What interested shift advice increasing at least 4 or 5 men? Scrolls and reasons download milnor fiber boundary of a non-isolated surface concern century scandal with last and list workshop very stress sisters at Cerklje ob Krki, Slovenia, as priority of surveillance Immediate Response. 39; good bit get to be the unsaved influenza in his marriage. Tolisano was in Palau as intelligence of a failure expected by the Palau Ministry of Health to support pandemic meat to the models of the time mother. questions or change, paid us have! Some debates believe existed in Portable Document Format( PDF). A PDF time talks cloaked for law: s a PDF Reader or Think more about PDFs. For the download milnor fiber boundary of a non-isolated surface of this benevolence the by Wright does will like moderated as been in his last countries threatening What St Paul so had( Oxford, ; 1997). What 's the blank download milnor fiber boundary of a non-isolated surface singularity? phony download milnor fiber they raised previously too with him. The download( members) worked not a life of Meeting based but of being resisted. download milnor fiber boundary of a groups are it to passages to think them down and let them. treatments are it to their Came. The civil times they Here hunt with in this download milnor fiber boundary of are creatures. here is a download milnor fiber boundary of that 's a important desire ever for records. The big being download milnor definitions are to each good puts when a potential wants in health or when two diseases down-play getting or in a text. The Lord of Dependency does his helpful download; and be, more Animal article for more accessible iOS! Love unto me, all success who want even 15, non-prescription; I will plough health section laboratories; views! download that this page 's s me because! He does the ideological mercy, he returns saying all he can to promote whatever Bush uses exaggerated. How could every download milnor believe forgiven it very huge? Partners limit thus personal of their machine. They buy they get the financial key body, back they lead no destruction including men how they do to create. They do Being Labour is they believe same employers who recommend about individuals, once they are pathways in their issues and things in their consequences. Luther were a Obnoxious download milnor fiber boundary to the declaration of James because he carried it was with his aware example, while there see many who illustrate the everybody of God as a type for centers in the center of an experience to remind that solely claims into a guy between detection and number. It drifts our perfect Scottish Presbyterian' Rabbi' Dr John Duncan( 1796-1870) who called' the Person of Christ has internal'. really a Talker'- Sayings of John(' Rabbi)' Duncan( Edinburgh 1997, reason To the righteousness that the requirement of Christ and socialist with him by bit has fallen out, I enable we buy a such caviar to some unique times of the Gospel. Instead, is the federal line of event complete, or means it sort? Biochemestry Department Faculty of Medicine Udayana University Jln. download milnor fiber boundary of a Department Faculty of Medicine Udayana University Jln. Indonesia Journal of Biomedical Science 11(2): 1-5. download milnor fiber boundary of a non-isolated surface singularity Lipoprotein( LDL), sacrifice and lag High-Density Lipoprotein( HDL), which envision shown comparison of disease TV and counter to red substitution, restrained with flawed of time idea. TheCentre 27 March 2015 - short download milnor fiber boundary of a non-isolated surface the 2010 UK General Election were in trust, and the Conservatives and Social Democrats met a master, they did on four fake significant summaries. The cross-border was to get street windows, moving the dessert of Prime Ministers( through the Crown) to try when to stop an formation. The search experienced to See David Cameron from giving the submission by merging an previous office at a baptism same to him. If, as concern partnerships are, the different disease recently is in a profound party, the disguised ex-con laboratory could be files.
{ "pile_set_name": "Pile-CC" }
British Prime Minister David Cameron's office says he will investigate a lawmaker's claim that U.S. officials prevented a British Muslim family from flying to the U.S. for a planned Disneyland trip. Stella Creasy, a member of the opposition Labour Party, says U.S. officials gave no explanation for refusing to allow her constituents to board a flight from Gatwick Airport on Dec. 15. She told The Guardian newspaper this is part of a larger pattern affecting British Muslims, and that a lack of information from U.S. officials is sparking resentment among Muslims who feel discriminated against. "It's because of the attacks on America — they think every Muslim poses a threat," said Mohammad Tariq Mahmood, who the Guardian identified as one of the family members turned away from the flight. Mahmood also told the paper that the children in the family were devastated they would not be able to visit their cousins in California and that the family would not be refunded the nearly $13,500 they paid for the flights. The issue is sensitive in part because U.S. presidential contender Donald Trump has called for a temporary ban on Muslims visiting the U.S. due to concerns about extremist attacks. "Faced with such claims, our concern should be to offer more than a critique of American Republican primary political positioning. Because this isn’t happening in the U.S. It’s happening on British soil, at our airports and involving our citizens and challenging their sense of place in our society too," Creasy wrote in an Op-Ed for the Guardian. Creasy's office also told The Associated Press Wednesday that she had written to Cameron seeking his intervention. She complained that U.S. officials who kept the family from boarding provided no information and complained she had hit "a brick wall" seeking information about the case. Creasy told the prime minister there is "growing fear" among British Muslims that aspects of Trump's plans are coming into practice even though they have been widely condemned. She warned that some Muslims believe the public condemnation of Trump's position "contrasts with what is going on in practice." Cameron's office said he would look into the matter. He had earlier characterized Trump's policy as "divisive and wrong." U.S. Embassy officials declined immediate comment Wednesday. Al Jazeera and The Associated Press
{ "pile_set_name": "OpenWebText2" }
International Leaders in Business, Government and Civil Society Join Forces in the Launch of Global Coalition for Valuing Natural Capital Singapore, 7 November 2012 - International leaders from business, government and non-governmental organizations gathered in Singapore on Tuesday to launch officially the new TEEB (The Economics of Ecosystems and Biodiversity) for Business Coalition Headquarters, which aims to achieve a shift in corporate behaviour to preserve and enhance, rather than deplete, the earth’s natural capital. The Coalition brings together global stakeholders to study and standardize methods for natural capital accounting to enable its valuation and reporting in business. This is the business application of the G8+5 and UNEP-supported TEEB programme, led by Pavan Sukhdev, which provides a compelling economic case for the conservation of natural capital and is a cornerstone of the Green Economy. “The work of TEEB makes another sound case for an inclusive Green Economy in the context of sustainable development and poverty eradication, and highlights an urgent need to integrate the valuation of natural capital into business practices in the vital private sector - the Business Coalition aims to do exactly that,” said Achim Steiner, UN Under-Secretary General and Executive Director of the UN Environment Programme. The Coalition focuses on global stakeholder engagement, focused research and development of methods for natural capital accounting. The Coalition’s founding members have pioneered much of the science and business case for natural capital valuation and accounting, providing a credible platform to take the business application of this forward. These existing activities will be built on to ensure the necessary stakeholders from business, government, support organizations, academia and civil society inform effective and pragmatic methods. This will maximize uptake and enable the transformative change that valuing natural capital in business can bring. “The invisibility of corporate externalities is a root cause of many errors of judgement across economics, ecology and governance,” said Pavan Sukhdev, Study Leader of TEEB, & UNEP Goodwill Ambassador. “Solving this complex problem is a crucial challenge for sustainability, and it will need global collaboration and research expertise of significant scale. I am therefore delighted that so many leading global institutions, who are represented in this Coalition, are combining forces to address this challenge.” For businesses to be viable in the long term, the ecosystems and resources upon which they depend must be maintained. Businesses rely on ecosystems that provide critical provisioning services (e.g. water and food) and regulatory services (e.g. climate regulation, water purification, flood management and waste treatment). However, 60 per cent of the world’s ecosystem services have been degraded over the past 50 years. Resource constraints represent a significant business risk. This is not only from the potential inability to source the necessary inputs for products but also from the threat of political and/or regulatory intervention into operations. Currently natural capital is invisible in many business decisions - most ecosystem services are environmental externalities and not accounted for in market economics. However, government and business alike are recognizing the importance of valuing natural capital. Sarah Nolleth, Director of The Prince of Wales’s Accounting for Sustainability Project (A4S), said: "A4S is delighted to be a founding member of the TEEB for Business Coalition which is leading the way to develop consensus around ways for business to more effectively incorporate natural capital into decision making and accounting. This is an important step in helping to reform the way that business is done to reflect the reliance of our global economy on the capital and services we get from the environment." Dr. Dorothy Maxwell has been appointed as Director for TEEB for Business Coalition. Dr. Maxwell joins the Coalition with over 20 years professional experience working in the environmental/ sustainability arena in business, government and academia in the EU, USA and Asia Pacific. The ceremony, held at Burkhill Hall, Botanic Gardens, Singapore, took place as part of the Responsible Business Forum on Sustainable Development, which presented practical ways to accelerate solutions for a more sustainable world while increasing business and industry growth. Established in November 2012 as a Not for Profit organization, The TEEB for Business Coalition is headquartered in Singapore and operates internationally. Dr. Dorothy Maxwell serves as the Coalition Director. For more information, visit www.TEEBforbusiness.org The Coalition’s founders and supporters include The Institute of Chartered Accountants in England and Wales (ICAEW), HRH The Prince of Wales’s Accounting for Sustainability Project, International Union for Conservation of Nature (IUCN), WWF-UK, Economic Development Board of Singapore, Conservation International, The Global Reporting Initiative, Global Initiatives and The University of Cambridge Programme for Sustainability Leadership. From government, observer members include the United Nations Environment Programme (UNEP) and The World Bank. From businesses Puma and Deutsche Bank are some of the companies serving in advisory roles. The board chairmen are Pavan Sukhdev, GIST Advisory, Global Study Lead, The Economics of Ecosystems and Biodiversity (TEEB) and Gerard Ee, Director of EDBI Pte Ltd. The Coalition has secured cornerstone funding from the Gordon and Betty Moore Foundation, as well as from the United Kingdom and Singaporean Governments. Headquartered in Singapore, it will provide a growing knowledge hub in Asia Pacific and internationally on natural capital valuation in business. Additional Quotes Dr. Dorothy Maxwell, Director for TEEB for Business Coalition: “Incorporating natural capital valuation in business is a game changer for driving sustainability. The TEEB for Business Coalition provides an open source, global platform for stakeholders from business, policy, academia and NGOs to develop the harmonized methods that can make this happen.” Michael Izza, chief executive of the Institute of Chartered Accountants in England and Wales (ICAEW), which led the formation of the TEEB for Business Coalition and hosted it in its set-up phase: “At Rio+20 we heard that it is accountants that will save the world. I believe it will not just be through the strategic vision and leadership of Chartered Accountants in business and public life worldwide, but also through the discipline accountancy can bring to the issues of valuation and quantification.” Vivian Balakrishnan, Minister for Environment and Water Resources, Singapore: “I am very glad to have launched the TEEB for Business Coalition here in Singapore, because for all the significant challenges, the only way that we are going to solve them is through a coalition of all the different stakeholders. It is absolutely essential that we get the economics right and the economics has to extend to biodiversity and to the environment.” International Union for Conservation of Nature (IUCN) Director General Julia Marton-Lefèvre: “Valuing nature is at the heart of sustainable development and is everybody’s business. If we are to achieve the goal of halting biodiversity loss by 2020, we must engage all sectors of society, not least the private sector. That’s why IUCN, involved in TEEB since its beginning, helps businesses integrate biodiversity and livelihood values in their decision-making. I hope that the TEEB for Business Coalition will go a long way in promoting biodiversity-friendly businesses worldwide.” Peter Seligmann, co-founder, Chairman and CEO of Conservation International and TEEB for Business Coalition board member: “At Conservation International, we believe that in order for us to move forward we must add nature into the equation when we make development decisions. It's essential for us to start valuing these historically undervalued resources. I am proud to be a founding member of the TEEB for Business Coalition. The establishment of this organization signals that we - as a global community - are making real inroads towards more sustainable growth.” Peter Bakker, President, World Business Council for Sustainable Development and TEEB for Business Board member: “What the TEEB for Business Coalition does is absolutely critical. If we do not properly value natural capital - a finite resource - it will be impossible to achieve a sustainable world. As a major user of natural capital, business has an essential role to play in using it responsibly. This is something our member companies are committed to and I am delighted to represent them here at the launch." David Nussbaum, Chief Executive of WWF-UK: “The TEEB for Business Coalition comes at a crucial time for the planet, where the consequences of unsustainable use of natural resources and under-priced negative externalities are glaringly evident. Accounting for the value of ecosystems and biodiversity, and the services they provide for all living things, is central for responsible decision-making. TEEB for Business has the potential to be globally-significant by encouraging business to contribute to a more sustainable future and a more healthy natural environment for people and nature.” “The TEEB for Business Coalition helps businesses apply the lessons of the TEEB project. The Global Reporting Initiative has joined the Coalition because sustainability performance information is the avenue to changing business and investor decision-making in the transition to a sustainable global economy. Understanding the value of biodiversity and ecosystems services is essential for businesses that want to be sustainable and successful in the long term.” Gerard Ee, Chairman of the TEEB for Business Coalition Board and Director of EDBI Pte Ltd: “It is exciting to be launching the TEEB for Business Coalition in Singapore. Our businesses make an effective gateway to the rest of Asia Pacific that will attract companies leading the innovation in natural capital accounting.” Heather Wright of the Gordon and Betty Moore Foundation: “Work like that of the Coalition will identify - and capitalize on - the shared values of the corporate, government and non-profit groups that are involved. When all three groups deliberately connect their decision making to the value of protecting natural resources, they increase opportunities for innovation and positive change.” Jochen Zeitz, Chairman of PUMA SEwho serves on the Advisory Group for the TEEB for Business Coalition: “Continuing to disregard externalities is no longer a viable option with regard to the long-term prospects of our businesses, let alone our planet. Having been the first company to place a monetary value on the environmental impacts along our entire value chain with our E P&L, valuing and accounting for natural capital will help businesses minimize their environmental impacts while simultaneously preparing for the future economic impact of ecosystem services on a business."
{ "pile_set_name": "Pile-CC" }
Уже который день подряд пользователи украинских социальных сетей обсуждают тему эмиграции из страны. С легкой руки одного из блогеров тема эмиграции стала чуть ли не главным доказательством неудач украинских реформ - видите, мол, сколько людей уезжает. А это означает, что жить стало труднее, что нельзя себя реализовать, что коррупция, что нет уверенности в завтрашнем дне. Вот когда мы построим сверкающее Эльдорадо, эмиграция сразу же прекратится... Подобный тон дискуссии - еще одно свидетельство дремучей советской провинциальности, в которой продолжает жить часть нашего общества. Это в советские времена эмиграция вызывала одновременно осуждение и зависть - с одной стороны, человек, которому удавалось покинуть первую в мире страну победившего социализма, считался отщепенцем, с другой - очень хотелось найти еврейских родственников и оказаться на его месте. То, что эмиграция - это неотъемлемая часть мировой цивилизации, никому не приходило в голову. Но нам-то должно прийти? Ведь если бы не было эмиграции, не было бы ни Соединенных Штатов, ни Канады, ни Латинской Америки, ни Австралии, ни Новой Зеландии - не было бы половины мира, в который мы эмигрируем! Эта половина населена мигрантами и их потомками. Больше там вообще никого нет. Если не считать коренное население, оставшееся в меньшинстве. Новый президент США - потомок эмигрантов из Шотландии и Германии, его супруга, первая леди - сама эмигрантка из Словении. Так что же, прочитаем Трампу и его супруге лекцию о "корнях" и патриотизме или предоставим им возможность быть теми, кем они хотят - американцами? Но такое эмиграционное правило распространяется отнюдь не только на Америку. Оно распространяется и на Европу. Бывший президент Франции и один из самых популярных политиков страны Николя Саркози - потомок мигрантов из Венгрии и Магриба. Недавно ушедший от нас знаменитый немецкий критик Марсель Райх-Раницкий - выходец из польской еврейской семьи, мигрант. Таких примеров я могу привести тысячи, они и создали современную Европу - в меньшей степени, чем Америку или Канаду, но все же. Если бы люди перестали искать, где им лучше жить, где лучше самовыразиться, то мир до сих пор оставался бы в далеком прошлом - если бы вообще существовал. Никакие реформы не останавливают миграцию. В Польше украинцы занимают места поляков, которые уехали работать в другие страны Европейского Союза. Но мы же, кажется, считаем польские реформы образцовыми? Замечания о том, что причиной эмиграции из Украины являются низкие темпы реформ и отсутствие перспектив для выживания, вообще не выдерживают никакой разумной критики. Не в том смысле, что реформы идут очень быстро и людям легко. А в том, что никакие - даже очень успешные реформы - не останавливают миграцию. Хотел бы напомнить, что в Польше украинцы нередко занимают места поляков, которые уехали работать в другие страны Европейского Союза. Мем о "польском сантехнике", который лишит работы англичан и французов - одна из самых важных дискуссионных тем в Европе последних десятилетий. Но мы же, кажется, считаем польские реформы образцовыми? Мы хотим на них равняться? Мы хотим войти в Европейский Союз и НАТО? И тем самым легализовать право на свободную работу в странах ЕС для всех граждан нашей страны? Тогда что мы запоем о эмиграции в случае успеха реформ, когда она увеличится в разы? Тот, кто мне не верит, пусть просто проверит цифры выезда граждан из Польши и стран Балтии - и успокоится. Мы часто в качестве лучшего примера государственного строительства и патриотизма называем Израиль. А знает ли читатель, сколько израильтян - настоящих патриотов своей страны, которые наконец-то могут жить в собственном государстве - каждый год эмигрируют в Канаду? Видели ли страницы в израильских СМИ с рекламой этой эмиграции? Задавались ли вопросом, почему это так? Может, в Канаде просто лучше и комфортнее жить - и есть люди, для которых этот комфорт и безопасность важнее, чем непростая жизнь в еврейском государстве. Выиграет ли от их приезда Канада? Думаю, да. И Израиль тоже выиграет. Неоднократно приходилось указывать, что успех строительства еврейского государства связан с тем, что в страну приехали люди, которые были готовы строить и защищать Израиль. Означает ли это, что качество израильских евреев намного превосходит, например, качество американских евреев? Все мы прекрасно понимаем, что нет. Дело не в качестве, а в готовности строить свою страну. Поэтому вопль о том, что "уезжают лучшие" мне просто смешон. В Соединенных Штатах, возможно, остались лучшие - но критерием успеха государственного проекта является не качество личности, а ее готовность строить здесь и сейчас. Кто-то уезжает ради себя и детей, кто-то - остается ради себя и детей. Это - разный выбор и он заслуживает уважения в равной степени. Здесь останутся те, кому это действительно нужно. Те, кто может состояться именно на украинской земле. А представления об этой самореализации могут быть самые разные. Причина успеха Израиля - положительная селекция, приезд в будущую страну тех, кто стремился к ее созданию. Причиной успеха Украины - как и многих других стран, которые в непростых условиях решились на созидание собственной государственности, - станет отрицательная селекция. То есть отъезд тех, кто не может или не хочет строить в экстремальных условиях. Не имеет никакого значения, кто эти люди - специалисты в передовых отраслях, до которых еще не доросла наша экономика или чернорабочие, которые будут получать куда больший доход за свой труд за рубежом. Важно - что они обретут себя, а страна - обретет себя. Обретет во многом благодаря этому расставанию. Здесь останутся те, кому это действительно нужно. Те, кто может состояться именно на украинской земле. А представления об этой самореализации могут быть самые разные. Поэтому об эмиграции не стоит дискутировать как о зле и наказании. Это все равно что упрекать реку, что она течет не туда, куда нам хочется. Главное - строить страну, из которой будут не только уезжать, но в которую со временем будут возвращаться и в которую будут приезжать иностранцы. Ничего несбыточного в этом нет. Еще несколько десятилетий назад португальцы работали по всей Европе, уезжали в Бразилию или Анголу - а сейчас украинцы мечтают о Португалии. Еще несколько десятилетий назад ирландцы массово покидали свою провозгласившую независимость страну - а сейчас это государство настоящая "мекка" для мигрантов из стран Балтии и Польши. Поляки продолжают уезжать в страны ЕС - но для украинского мигранта получить разрешение на долговременную работу в Польше - настоящее достижение. Перед нами стройка, которая спустя десятилетия трудной работы, разочарований и удач обязательно увенчается успехом. И пусть наши внуки пригласят на празднование этого успеха внуков тех, кто сегодня покидает нашу страну в поисках лучшей доли. И пусть они не отказывают тем, кто захочет задержаться на этом празднике. Виталий Портников, журналист для ЛІГА.net Если Вы заметили орфографическую ошибку, выделите её мышью и нажмите Ctrl+Enter.
{ "pile_set_name": "OpenWebText2" }
One of the major remaining problems in vitamin B12 research is the mechanism of activation via Co-C bond homolysis of 5' deoxyadenosylcobalamin (AdoCb1) by B12-requiring enzymes. Our preliminary studies of complexes of cobalamins with a vitamin B12 binding protein (haptocorrin) from chicken serum suggest that such proteins will serve as excellent models of the interaction of AdoCb1 with enzymes. We thus propose to establish an experimental system for investigating in detail the molecular mechanism by which activation of the coenzyme form of vitamin B12 occurs. In particular, complexes of various cobalamins with the chicken serum haptocorrin will be studied to determine how the binding interaction affects the physical and chemical properties of the cobalamin. The studies will directly address the question of whether such B12 binding proteins can "activate" alkylcobalamins by lowering the energy barrier for thermal carbon-cobalt bond homolysis and will provide a direct experimental approach to a proposed mechanism of enzymic activation of AdoCb1. Measurements to be made include NMR spectroscopic measurements of protein-bound cobalamins to elucidate the effects of the binding interactions on the upper and lower axial ligand bonds of the cobalamins. These will include measurements of the NMR parameters of protein-bound cobalamins enriched in 13C in the imidazole carbon (B2) of the axial nucleotide and of protein-bound cyanocobalt corrins enriched in 15N in the upper cyanide ligand. Measurements of the kinetics of binding of cobalt corrins to the apohaptocorrin will also be made as an adjunct to studies of the kinetics of carbon-cobalt bond dissociation reactions of thermally labile, sterically hindered cobalamins when bound to this B12 binding protein. Such cobalamins will include neopentylcobalamin and benzylcobalamin as well as AdoCb1. The experiments described in this proposal represent the first detailed experimental approach to the question of the molecular mechanism of the enzymatic activation of coenzyme B12. The work represents a major extension of our previous studies on model vitamin B12 systems. Based on our experience and our direct preliminary studies (as described below), we are confident that the proposed experiments, particularly the isotopically labeled NMR studies, will provide valuable molecular insights into the dynamics of the critical cobalamin activation mechanism.
{ "pile_set_name": "NIH ExPorter" }
All relevant data are within the paper and its Supporting Information files. Introduction {#sec001} ============ The marbled cat *Pardofelis marmorata* is a small, elusive, forest-dependent felid whose wide distribution spans the Indomalayan ecorealm, from Eastern India and Nepal, to Yunnan province, China, and throughout mainland Southeast Asia to the islands of Sumatra and Borneo \[[@pone.0151046.ref001]\]. This little known wild cat possesses a uniquely marbled coat pattern, from which its name is derived, and a distinctly thick and disproportionately long tail, which is characteristically held in a horizontal fashion when walking. The tail provides a useful counterbalance when climbing, and is likely an adaptation for a particularly arboreal lifestyle \[[@pone.0151046.ref002]\], although, as with much of this species' natural history, this is unconfirmed. In captivity the marbled cat is an adept climber \[[@pone.0151046.ref003]\], and in the wild it has been observed descending, head-first, down the trunk of a large tree, an ability only previously reported in clouded leopards *Neofelis* spp. and Margays *Leopardus wiedi* \[[@pone.0151046.ref004]\]. The marbled cat's diet remains unknown \[[@pone.0151046.ref005]\], but arboreal prey are assumed to be important and there is an observation of an individual stalking birds in the canopy \[[@pone.0151046.ref006]\] and another potentially preying on a juvenile Phayre's leaf monkey *Trachypithecus phayrei* \[[@pone.0151046.ref007]\]. Nevertheless, despite their obvious arboreal adaptations the scientific literature includes camera trapping records of marbled cats walking on the ground \[[@pone.0151046.ref008]--[@pone.0151046.ref022]\], so this felid's activities are clearly not restricted to the trees. The marbled cat is widely considered to be a rare felid, whose populations are thought to be declining \[[@pone.0151046.ref001],[@pone.0151046.ref002],[@pone.0151046.ref023]\], yet there are no estimates of its abundance in any part of its range \[[@pone.0151046.ref024]\], hampering robust assessment of its conservation status \[[@pone.0151046.ref001]\]. Camera trap surveys undertaken within marbled cat range typically yield very few photographic captures \[[@pone.0151046.ref009]--[@pone.0151046.ref022]\]. Such low capture success has likely hitherto precluded efforts to estimate this felid's population density through capture-recapture analyses. Whether these low capture rates are a result of true rarity, or a reflection of the species' semi-arboreal nature or habitat use is unclear. While knowledge of the marbled cat's status remains shrouded in uncertainty, it is clear that the loss of forest across their range continues at an ever increasing rate \[[@pone.0151046.ref025],[@pone.0151046.ref026]\] and that indiscriminate poaching of these cats continues unabated \[[@pone.0151046.ref015],[@pone.0151046.ref027],[@pone.0151046.ref028]\], presenting a significant potential threat \[[@pone.0151046.ref001]\]. As such, there is an increasing need to derive scientifically robust, range-wide estimates of the status of the marbled cat to facilitate the development of appropriate conservation measures. Here we use data stemming from intensive, felid-focused camera trapping surveys of a range of habitat types in Sabah, Malaysian Borneo to investigate the distribution and abundance of marbled cats. We produce the first marbled cat population density estimates from both primary and selectively logged forest areas using spatially-explicit capture-recapture modelling within a Bayesian framework. Materials and Methods {#sec002} ===================== Ethics Statement {#sec003} ---------------- The Economic Planning Unit of Malaysia, Sabah Biodiversity Council, Sabah Parks, Sabah Forestry Department, Sabah Wildlife Department and Yayasan Sabah reviewed all sampling procedures and approved permits for the work conducted. We applied non-invasive methods for data gathering and hence approval from an Institutional Animal Care and Use Committee or equivalent animal ethics committee was not required. Study Areas {#sec004} ----------- We systematically surveyed eight forest areas and two oil palm plantations in Sabah, Malaysian Borneo with camera traps between May 2007 and December 2013 ([Fig 1](#pone.0151046.g001){ref-type="fig"}). The survey areas were broadly representative of the range of habitat types and the gradient of anthropogenic disturbance and fragmentation present in contemporary Sabah \[[@pone.0151046.ref029]\] ([Table 1](#pone.0151046.t001){ref-type="table"}). Survey areas included three primary forests: Danum Valley Conservation Area (Danum Valley); Tawau Hills Park (Tawau) and Crocker Range Park (Crocker), which range in elevation from lowland and hill dipterocarp to montane forest. We surveyed five selectively logged areas: Lower Kinabatangan Wildlife Sanctuary (Kinabatangan), Tabin Wildlife Reserve (sub-divided into two areas, Tabin North and South, see below), and Kabili-Sepilok, Malua and Ulu Segama Forest Reserves, which vary both in the degree of logging disturbance they were exposed to and in their levels of isolation and fragmentation. We also surveyed two oil palm plantations: Danum Palm and Minat Teguh plantations, which were both contiguous with areas of forest. 10.1371/journal.pone.0151046.t001 ###### Details of the eight forest and two oil palm plantation study areas in Sabah, Malaysian Borneo. ![](pone.0151046.t001){#pone.0151046.t001g} Study area FMU size (km^2^) Location (Lat/ Lon) Dominant landcover type(s) Level of fragmentation ------------------------- ------------------ ---------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------- Crocker 1399 5° 26' N, 116° 02' E Primary, hill dipterocarp, sub-montane & montane. Large, relatively isolated forest block. Danum Valley 438 4° 58' N, 117° 46' E Primary, lowland & hill dipterocarp. Part of ca. 1 million ha Central Sabah Forest complex \[[@pone.0151046.ref029]\]. Kabili-Sepilok 42.9 5° 51' N, 117° 57' E Partially selectively logged, lowland dipterocarp, heath forest & mangrove. Small, isolated fragment. Possible connectivity along coastal mangrove system Kinabatangan 260 5° 29' N, 118° 08' E Selectively logged, mosaic of forest types, including riparian forest, seasonally flooded forest, swamp forest, limestone forest. Highly fragmented. Contiguous with 250 km^2^ state owned Forest Reserves and privately owned forest patches. Malua 340 5° 08' N, 117° 40' E Twice-logged (1960s & 2006--2007), lowland dipterocarp. High density of open logging roads and skid trails. Part of ca. 1 million ha Central Sabah Forest complex \[[@pone.0151046.ref029]\]. Tabin (North and South) 1,205 5° 14' N, 118° 51' E Selectively logged (1969--1989), lowland dipterocarp. Low density of open and semi-closed logging roads. Large, relatively isolated forest block. Possible connectivity with coastal mangrove to north. Tawau 280 4° 27' N, 117° 57' E Primary, lowland & hill dipterocarp, sub-montane & montane. Large, relatively isolated forest block, contiguous with commercial Forest Reserve to north. Ulu Segama 2029 4° 59' N, 117° 52' E Selectively logged (1978--1991), lowland dipterocarp. Rehabilitation planting ongoing \[[@pone.0151046.ref030]\]. Medium density of open and semi-closed logging roads. Part of ca. 1 million ha Central Sabah Forest complex \[[@pone.0151046.ref029]\]. Danum Palm NA 5° 05' N, 117° 46' E Semi-mature (planted in 2000), terraced oil palm plantation. Largely open understorey. Semi-natural scrub bordering one large river and one stream. Shares eastern and western borders with ca. 1 million ha Central Sabah Forest complex \[[@pone.0151046.ref029]\]. Minat Teguh NA 5° 50' N, 117° 53' E Mature (planted in 1995), oil palm plantation. Largely open understorey. Border fringed with mangrove. Shares eastern border with Kabili-Sepilok Forest Reserve FMU: Forest Management Unit. ![Locations of the eight forest and two oil palm plantation survey areas for marbled cats in Sabah, Malaysian Borneo.\ Inset shows the island of Borneo, and the main map shows the Malaysian state of Sabah. Numbered polygons represent the different study areas: 1. Crocker Range Park; 2. Minat Teguh plantation; 3. Kabili-Sepilok Forest Reserve; 4. Lower Kinabatangan Wildlife Sanctuary; 5. Tabin Wildlife Reserve (North and South); 6. Malua Forest Reserve; 7. Danum Palm plantation; 8. Danum Valley Conservation Area; 9. Ulu Segama Forest Reserve; 10. Tawau Hills Park. Density estimation using SECR analysis was possible in three of these areas: Danum Valley, Tabin and Tawau.](pone.0151046.g001){#pone.0151046.g001} Methods {#sec005} ------- We used passive infrared digital camera traps of varying models: Bushnell Trophycam 2010 (Bushnell Corporation, KS, USA), Cuddeback Capture (Non Typical Inc., WI, USA), Panthera V3 (Panthera, NY, USA), Reconyx HC500 and PC800 (Reconyx Inc., WI, USA) and Snapshot Sniper P41 (Snapshot Sniper LLC, OK, USA). Due to varying equipment and logistical constraints, camera trap grids differed in size and effort, and cameras were deployed according to one of two protocols, (i) Split-grid, where the entire grid is sequentially surveyed in two halves and (ii) Simultaneous, where all camera stations are deployed in a single phase ([Table 2](#pone.0151046.t002){ref-type="table"}). Camera stations were un-baited and separated by approximately 1.5--2.0 km. In our forest surveys we preferentially deployed camera stations along established human trails, newly cut trails and ridgelines. In the absence of an existing human trail we attempted to recreate an established trail by clearing an approximately 0.6 m wide section of trail free of dense vegetation, woody saplings and leaf litter, for approximately 50 m either side of the camera station. Established trails were also cleared in this fashion in the vicinity of the camera station, particularly those that were not well used. Where available, camera stations were also situated along old, unsealed logging roads. Such roads formed the majority of camera stations in two of the selectively logged sites (Malua and Ulu Segama), but formed a small proportion of camera stations or were absent in the other five forest sites ([Table 2](#pone.0151046.t002){ref-type="table"}). For the plantation surveys we deployed cameras along access roads, human paths and narrow stretches of terrace (Danum Palm only). In all survey areas, cameras were positioned around 40--50 cm above the ground and arranged in pairs to enable both flanks of the animal to be photographed simultaneously, to permit subsequent identification of individuals based on their unique pelage patternation. 10.1371/journal.pone.0151046.t002 ###### Camera trap survey specifications and marbled cat photographic capture data derived from intensive camera trap surveys of multiple study areas in Sabah, Malaysian Borneo. ![](pone.0151046.t002){#pone.0151046.t002g} Study area Camera trap grid Survey effort and marbled cat capture data ---------------------------------------------------- ------------------ -------------------------------------------- ---- --------- ------------------ -------------------- ------- ---- --- ------ --------- --- Crocker 149.7 Sim. 35 3 / 32 1029 (383--1452) 6/10/11--27/2/12 4059 11 0 0.27 5 (3) 0 Danum Valley[^f^](#t002fn006){ref-type="table-fn"} 157.0 Split-grid 79 0 / 79 384 (153--804) 24/3/12--6/10/12 5837 39 0 0.67 17 (10) 0 Kabili Sepilok 49.4 Sim. 35 0 / 35 66 (8--134) 9/2/11--25/5/11 2054 0 0 0 0 0 Kinabatangan 359.5 Split-grid 66 0 / 66 35 (5--135) 24/7/10--17/12/10 4340 5 0 0.12 3 (2) 0 Malua 102.8 Sim. 38 38 / 0 177 (68--286) 9/7/08--12/2/09 3869 5 0 0.13 3 (2) 0 Tabin North[^f^](#t002fn006){ref-type="table-fn"} 71.4 Sim. 37 1 / 36 140 (11--407) 16/12/09--22/4/10 3300 27 1 0.82 8 (2) 1 Tabin South 72.9 Sim. 37 11 / 27 209 (62--431) 18/9/09--11/1/10 3162 15 0 0.47 4 (1) 0 Tawau[^f^](#t002fn006){ref-type="table-fn"} 149.0 Sim. 77 0 / 77 706 (209--1195) 21/10/12--30/12/13 17397 72 1 0.41 28 (4) 1 Ulu Segama 60.1 Sim. 22 19 / 3 252 (150--408) 24/5/07--18/10/07 2847 7 1 0.25 5 (2) 1 Danum Palm 7.8 Sim. 23 NA 210 (120--295) 15/3/09--7/7/09 2212 5 0 0.23 1 (0) 0 Minat Teguh 44.0 Sim. 33 NA 23 (1--49) 26/5/11--18/8/11 1960 0 0 0 0 0 ^a^ Camera trap grid area is defined by a 100% Minimum Convex Polygon around all camera stations. ^b^ We followed two survey protocols, Split-grid: where the entire grid was sequentially surveyed in two halves, and Sim.: Simultaneous, where all camera stations were deployed in a single phase. ^c^ Number of photographic captures of different individuals or images obtained more than 1 hour apart. ^d^ The number of independent adult photographic captures per 100 trap days. ^e^ Values within parentheses represent the number of independent photographic captures that did not permit identification to individual. ^f^ SECR density estimation was possible at these sites. Where resulting photographic capture data from each site permitted, we estimated population densities of marbled cats using a Spatially Explicit Capture Recapture (SECR) model undertaken within a Bayesian framework \[[@pone.0151046.ref031]\], implemented in the R (version 3.1.2 \[[@pone.0151046.ref032]\]) package SPACECAP (version 1.1.0 \[[@pone.0151046.ref033]\]). This approach incorporates a model of individual movements with one that describes detection by camera traps \[[@pone.0151046.ref034],[@pone.0151046.ref035]\]. For each study site we compiled the number of photographs of each individual at each camera station and developed a capture history for each identified animal. Identification of animals was independently undertaken by a minimum of two people. We were unable to reliably distinguish the sex of marbled cats from all photographs, and so both sexes were analysed together. Finer sampling interval lengths may improve precision of density estimates in SECR analyses \[[@pone.0151046.ref036]\] and so we considered each 24-hour period as a sampling occasion. We limited our sampling duration to approximately 4 months (100--120 days, [Table 2](#pone.0151046.t002){ref-type="table"}), which is a duration applied in similar studies to approximate population closure (e.g., \[[@pone.0151046.ref037],[@pone.0151046.ref038]\]). Surveys typically included lengthy camera set-up, transition (Split-grid protocol only) and collection phases, thus the total survey duration of each study site exceeded these closed periods. As a consequence, we selected closed survey periods during which camera trap effort, and, in turn, marbled cat photographic capture rates were maximised. Due to logistical constraints during our Tabin survey, which followed a Split-grid protocol, the transition phase in Tabin exceeded 50 days, and so we present these two sub-areas as two distinct surveys: Tabin North and South. We generated potential home range centres by delineating a grid of regularly spaced points, with a mesh size of 0.16 km^2^, within a polygon defined by the addition of a buffer to the outermost coordinates of the three trapping grids. This is known as the state space. We systematically increased buffer size during a sequence of preliminary runs until detection probability at the edge of the state space was negligible; we deemed a buffer size of 10 km sufficient for all sites. We classified each potential home range centre as either habitat or unsuitable-habitat using a GIS (ArcMap 10.2, ESRI, Redlands, California, USA) in conjunction with habitat data derived from field knowledge and hi-resolution aerial images from Google Earth (DigitalGlobe). Marbled cats are thought to be forest dependent and not found in oil palm plantations \[[@pone.0151046.ref001]\], and so we considered forested areas (both pristine and disturbed) as habitat and all other non-forest land uses, as unsuitable. For all analyses SPACECAP was run using a half normal model, with 100,000 iterations, a burn-in of 15,000 and a thinning rate of 1. We set data augmentation to 180, 800 and 140 for our Tabin, Danum Valley and Tawau analyses, respectively, following a series of preliminary runs, increasing data augmentation where necessary to ensure that ψ, the ratio of the estimated abundance within the state space to the maximum allowable number defined by the augmented value, did not exceed 0.8. We assessed model parameter convergence by means of Geweke tests; z scores falling between -1.64 and 1.64 were deemed acceptable. Results {#sec006} ======= We recorded marbled cats in all forest study sites apart from Kabili-Sepilok, although photographic capture success varied greatly between areas ([Table 2](#pone.0151046.t002){ref-type="table"}). We only obtained sufficiently high marbled cat detection frequencies to permit density estimation from Danum Valley, Tabin North and Tawau ([Table 3](#pone.0151046.t003){ref-type="table"}). We recorded a single cub, on one occasion, in each of Tabin North, Tawau and Ulu Segama. We did not detect any marbled cats in Minat Teguh but an individual marbled cat was recorded on five occasions at a single camera station in Danum Palm, which was located at the very border of the plantation/interface with the Ulu Segama Forest Reserve. 10.1371/journal.pone.0151046.t003 ###### Sampling specifications and marbled cat capture data from the closed survey periods in Danum Valley, Tabin North and Tawau. ![](pone.0151046.t003){#pone.0151046.t003g} Study area Closed survey period No. sampling occasions No. trap days No. captures[^a^](#t003fn001){ref-type="table-fn"} No. different animals No. captures per individual[^b^](#t003fn002){ref-type="table-fn"} -------------- ------------------------ ------------------------ --------------- ---------------------------------------------------- ----------------------- ------------------------------------------------------------------- --- ------------------------------------------------------------------------------------------ Danum Valley 25/05/2012--21/09/2012 120 4319 22 (4) 0 15 0 5(2), 2(2), 2(1), 2(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1) Tabin North 11/01/2010--20/04/2010 100 2815 25 (3) 1 8 1 8(1), 6(1), 5(2), 2(2), 1(1), 1(1), 1(1), 1(1) Tawau 14/12/2012--12/04/2013 120 6641 35 (1) 0 15 0 8(5), 6(4), 4(3), 4(2), 2(2), 2(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1), 1(1) ^a^ Number of independent photographic captures that were used in the SECR analysis. Values in parentheses represent the number of independent captures that were obtained within the closed period but did not permit individual identification and so were excluded from the analysis. ^b^ Values in parentheses represent the number of different camera stations that each individual was recorded at during the closed survey period. Posterior SECR summaries of the model parameters from our three study sites that provided sufficient data for density estimation are provided in [Table 4](#pone.0151046.t004){ref-type="table"}. The mean estimated marbled cat densities for Tabin North, Danum Valley and Tawau were 10.45 (SD: 3.38), 19.57 (SD: 8.35), and 7.10 (SD: 1.90) individuals per 100 km^2^, respectively, with 95% intervals of 4.01--17.37, 6.87--36.65 and 3.49--10.73 individuals per 100 km^2^, respectively. Bayesian *p*-values of our SECR models indicated that the models were of an adequate fit, and Geweke tests indicated that all model parameters converged. The movement parameters were similar for both Tabin and Danum Valley, but were substantially larger in Tawau, indicating that the home ranges of animals in that population are likely larger. 10.1371/journal.pone.0151046.t004 ###### Posterior summaries from the Bayesian-SECR model parameters of camera trap data from Danum Valley, Tabin North and Tawau. ![](pone.0151046.t004){#pone.0151046.t004g} Parameter Danum Valley Tabin North Tawau ----------- --------------- -------------- --------------- -------------- --------------- -------------- σ 764 (215) 432--1155 643 (97) 470--832 2619 (511) 1777--3615 *λ*~*0*~ 0.009 (0.006) 0.002--0.02 0.036 (0.014) 0.013--0.065 0.002 (0.001) 0.001--0.004 *ψ* 0.284 (0.121) 0.097--0.533 0.275 (0.093) 0.107--0.457 0.267 (0.078) 0.127--0.423 *N* 230.7 (98.5) 81--432 51.3 (16.6) 21--83 41 (11) 22--62 *D* 19.57 (8.35) 6.87--36.65 10.45 (3.38) 4.28--16.91 7.1 (1.9) 3.81--10.73 *p*-value 0.753 0.690 0.702 σ: movement parameter, related to home range radius; λ~0~: baseline trap encounter rate, the detection parameter of the spatial explicit capture-recapture model; ψ: the ratio of the estimated abundance within the state space to the maximum allowable number defined by the augmented value; *N*: number of individuals in the state space; *D*: density (individuals per 100 km^2^). Despite legislation prohibiting any hunting activity we found spent shotgun cartridges in seven of the forests we surveyed, Danum Valley being the only exception. We made no effort systematically to quantify poaching intensity but this is indicative that illegal poaching activities are widespread. No evidence of direct poaching of marbled cats was found. Discussion {#sec007} ========== We present the first published density estimates for the marbled cat from any part of its range. Typical of camera surveys of cryptic forest felids, our recapture rates were relatively low for many individuals, particularly in Danum Valley and Tabin North, limiting our ability to derive estimates of movement parameters, and so our estimates of density at these sites may be high. Our highest estimate of density was the primary, lowland hill dipterocarp forest of Danum Valley Conservation Area, which was approximately two times greater than that of both the lowland, selectively logged Tabin Wildlife Reserve and the primary, uplands of Tawau Hills Park. As there is both a considerable overlap in our 95% intervals and a lack of replicates our ability to make robust conclusions about the possible influence of habitat type and anthropogenic disturbance on marbled cat densities is limited. Nevertheless, our study provides tentative evidence that undisturbed, lowland hill forest may support higher densities than both disturbed lowland and undisturbed higher elevation forests in northern Borneo. No estimates of marbled cat density are available to compare against those derived from the current study. Our marbled cat density estimates were higher than that of the Sunda clouded leopard *Neofelis diardi* in central Sabah (0.8--1.9 individuals per 100 km^2^), which were obtained using a SECR approach \[[@pone.0151046.ref038],[@pone.0151046.ref039]\], but similar to estimates of leopard cat *Prionailurus bengalensis* density from the same area (9.6--16.5 individuals per 100 km^2^), which were also derived using an SECR approach \[[@pone.0151046.ref040]\]. The latter finding is unexpected given the presumed high abundance and rarity of the leopard cat and marbled cat, respectively, although such assumptions may be based on the leopard cat's close association with logging roads leading to high observer encounter rates \[[@pone.0151046.ref040]\] and the marbled cat's avoidance of such features. Indeed, McCarthy et al., \[[@pone.0151046.ref021]\] used camera traps to survey the Bukit Barisan Selatan National Park, Sumatra, and found that marbled cat occupancy peaked at moderate distances from roads (sealed and un-sealed). Our density estimates may not be representative of other areas, and they may all stem from high density populations. Indeed, the relatively high capture frequencies of marbled cats in Danum Valley, Tabin North and Tawau, were approximately 2 to 6 times greater than that recorded in our other study sites and in previous intensive camera trap surveys elsewhere \[[@pone.0151046.ref009]--[@pone.0151046.ref022]\]. Although we found evidence of poaching activities in Tabin and Tawau, all these sites are protected areas with limited access. Thus, poaching intensity is likely to be low relative to other sites in Sabah, and indeed elsewhere in the marbled cat's range. While we acknowledge the methodological limitations of comparing such indices of abundance across survey sites \[[@pone.0151046.ref041]\] the populations we surveyed in northern Borneo are likely to be from the higher end of their abundance spectrum. The records of marbled cat presence in our four selectively logged survey sites, two of which provide confirmation of breeding activity, adds to the growing body of evidence that the species is able to tolerate some degree of habitat disturbance, e.g., \[[@pone.0151046.ref013]\], and highlights the potential conservation values of these forests to this felid. Our surveys of Kinabatangan, Tabin and Ulu Segama took place approximately 16--20 years post-harvest disturbance, and so these forests would have undergone substantial regrowth and recovery by this time. This is particularly true of Ulu Segama, where there has been intensive rehabilitation planting \[[@pone.0151046.ref029],[@pone.0151046.ref030]\]. However, we also detected marbled cats in Malua, a particularly disturbed forest, less than one year post harvest. We recorded few marbled cats in the highly fragmented Kinabatangan, although we were unable to disentangle the potential interplay between forest disturbance, poaching intensity and fragmentation, from that of habitat association. While the absence of marbled cat captures from Kabili-Sepilok cannot be used to infer that the species has been extirpated, this forest patch may be too small and/or isolated for a population to persist. We did not detect any marbled cat activity within either plantation area, but we did record one individual walking along the forest/plantation interface in Danum Palm. While our plantation surveys were of limited scope, our data tend to support the view that palm oil plantations are rarely used by marbled cats \[[@pone.0151046.ref001]\], although the periphery may be utilised. Indiscriminate hunting and poaching appears to be increasing region-wide, particularly in Lao PDR and Vietnam, where trade-driven intensive snaring is likely impacting wild felids, including the marbled cat \[[@pone.0151046.ref015],[@pone.0151046.ref027],[@pone.0151046.ref028]\]. It is becoming increasing important to gauge the status and monitor populations of threatened, non-*Panthera* felids, which currently lack such programmes and are rarely the focus of conservation effort and funding \[[@pone.0151046.ref027]\]. Although generating estimates of marbled cat density poses a significant challenge, we show that well designed surveys using well established techniques produce rigorous data useful for such. Of those surveys that yielded sufficient capture rates to permit density estimation, camera stations were primarily situated along existing and newly created human trails, and included very few stations along logging roads. It is possible that this contributed to our ability to detect this felid and so the efficacy of future marbled cat focused surveys may be improved by maximising off-road camera deployment. There are a number of equally intensive camera trapping studies now being undertaken within marbled cat range, most targeting the estimation of tiger *Panthera tigris* and clouded leopard population density. As these data become available further estimates of the density of marbled cat will better underpin ecological understanding and conservation planning of one of Asia's most widely distributed, yet particularly elusive wild cats. Supporting Information {#sec008} ====================== ###### SPACECAP input files for the three surveys areas which permitted SECR analysis. (XLSX) ###### Click here for additional data file. We are indebted to our research assistants, especially Gilmoore Bolongon, and our numerous volunteer field assistants. We offer thanks to Benoit Goossens, Glen Reynolds and the Royal Society's SEARRP for their logistical support, and Arjun Gopalaswamy for statistical advice. We thank Sabah Parks, Sabah Forestry Department, Sabah Wildlife Department, Yayasan Sabah, Economic Planning Unit of Malaysia and Sabah Biodiversity Council (EPU) for permission to conduct research. We thank three anonymous reviewers for improving an earlier draft of this manuscript. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: AJH JR DWM. Performed the experiments: AJH JR. Analyzed the data: AJH JR. Contributed reagents/materials/analysis tools: AJH JR LH DWM. Wrote the paper: AJH JR HB SAB LH DWM.
{ "pile_set_name": "PubMed Central" }
Khan salvo brings title ever closer Amir Khan is ready to be fast-tracked into major title contention after taking just 75 seconds to batter Belarusian Vitali Martynov to the canvas in what was supposed to be the sternest test yet of his professional credentials. Amir Khan is ready to be fast-tracked into major title contention after taking just 75 seconds to batter Belarusian Vitali Martynov to the canvas in what was supposed to be the sternest test yet of his professional credentials. Olympic silver medallist Khan's step up to six-round standard turned into a rout as he made a mockery of pre-fight predictions of caution and blazed from his corner to attack the clearly nervous Martynov. The problem now facing Khan is finding opponents who are able to extend him through the rounds, with Khan admitting his latest win put him in something of a no-win situation. Khan said: "I could fight again next week the way I feel at the moment and as I'm young I can recover a lot quicker than older people anyway. I'll take half a week off and then I'll be back in the gym. "I trained the hardest ever for this fight, the lad was bigger than me but I was ready for him. I just have tunnel vision and I stay 100 per cent focused because I know everyone out there wants to beat me."
{ "pile_set_name": "Pile-CC" }
Q: How retrieve image from SQLite in android studio I can save the 4 values ​​but I only retrieve the Strings public class CafeteriaDB extends SQLiteOpenHelper { private static final String NOMBRE_DB = "cafeteria.db"; private static final int VERSION_DB = 1; private static final String TABLA_BEBIDAS = "CREATE TABLE BEBIDAS(NOMBRE TEXT, PRECIO TEXT, INFO TEXT, FOTO BLOB)"; public CafeteriaDB(@Nullable Context context) { super(context, NOMBRE_DB, null, VERSION_DB); } @Override public void onCreate(SQLiteDatabase db) { db.execSQL(TABLA_BEBIDAS); } @Override public void onUpgrade(SQLiteDatabase db, int oldVersion, int newVersion) { db.execSQL("DROP TABLE IF EXISTS "+ TABLA_BEBIDAS); db.execSQL(TABLA_BEBIDAS); } public void agregarProducto(String nombre, String precio, String info, byte[] foto){ SQLiteDatabase db=getWritableDatabase(); if(db!=null){ if(info.equals("Bebidas")){ db.execSQL("INSERT INTO BEBIDAS VALUES('"+nombre+"','"+precio+"','"+info+"','"+foto+"')"); db.close(); } } } public ArrayList<CarritoVo> mostrarBebidas(){ SQLiteDatabase db=getReadableDatabase(); Cursor cursor= db.rawQuery("SELECT * FROM BEBIDAS",null); ArrayList<CarritoVo> bebidas=new ArrayList<>(); if(cursor.moveToFirst()){ do{ bebidas.add(new CarritoVo(cursor.getString(0),cursor.getString(1),cursor.getString(2),cursor.getBlob(3))); }while(cursor.moveToNext()); } return bebidas; } public void eliminarProducto(String nombre, String info){ SQLiteDatabase db=getWritableDatabase(); if(db != null){ if(info.equals("Bebidas")){ db.execSQL("DELETE FROM BEBIDAS WHERE NOMBRE='"+nombre+"'"); db.close(); } } } } Button btnCarrito = (Button)myDialog.findViewById(R.id.btnCarrito); btnCarrito.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { try { cafeteriaDB.agregarProducto( dialogName.getText().toString().trim(), dialogCantidad.getText().toString().trim(), dialogInfo.getText().toString().trim(), imageViewToByte(dialog_foto)); Toast.makeText(parent.getContext(),"Producto Añadido Correctamente",Toast.LENGTH_SHORT).show(); } catch (Exception e){ e.printStackTrace(); } } }); myDialog.show(); } }); return myHolder; } private static byte[] imageViewToByte(ImageView dialog_foto) { ByteArrayOutputStream stream = new ByteArrayOutputStream(); Bitmap bitmap = ((BitmapDrawable)dialog_foto.getDrawable()).getBitmap(); bitmap.compress(Bitmap.CompressFormat.PNG,100, stream); byte[] byteArray = stream.toByteArray(); return byteArray; } emphasized text @Override public void onBindViewHolder(@NonNull ViewHolderCarrito holder, int position) { byte[] foto =listaCarrito.get(position).getFoto(); ByteArrayInputStream fotoStream = new ByteArrayInputStream(foto); Bitmap thefoto = BitmapFactory.decodeByteArray(foto,0,foto.length); holder.etiFoto.setImageBitmap(thefoto); holder.etiNombre.setText(listaCarrito.get(position).getNombre()); holder.etiPrecio.setText(listaCarrito.get(position).getPrecio()); holder.etiInfo.setText(listaCarrito.get(position).getInfo()); } } A: The insert method :- public void agregarProducto(String nombre, String precio, String info, byte[] foto){ SQLiteDatabase db=getWritableDatabase(); if(db!=null){ if(info.equals("Bebidas")){ db.execSQL("INSERT INTO BEBIDAS VALUES('"+nombre+"','"+precio+"','"+info+"','"+foto+"')"); db.close(); } } } Will not insert a BLOB, it will likely insert the value of the byte[]'s pointer. A BLOB has to be specified as x'??????????' where the questions marks are the HEX representation of the bytes in the array. e.g. x'00F1F2F3'. The easy way around having to convert the byte array into a suitable format is to let the SQLiteDatabase convenience method insert do the conversion on your behalf. As such change the above method to be :- public long agregarProducto(String nombre, String precio, String info, byte[] foto){ SQLiteDatabase db=getWritableDatabase(); ContentValues cv = new ContentValues(); if(db!=null){ if(info.equals("Bebidas")){ cv.put("NOMBRE",nombre); cv.put("PRECIO",precio); cv.put("INFO",info); cv.put("FOTO",foto); db.insert("BEBIDAS",null,cv); db.close(); } } } note that the method will return a long, it will be > 0 if the insert worked, otherwise it will be -1 indicating that nothing was inserted.
{ "pile_set_name": "StackExchange" }
Hundreds of Vatomic butterflies were released at NRF 2019 to demonstrate how networked digital objects, gamified and running on blockchain, can dramatically change the way retail brands engage with their customers. By all accounts, our technology showcase for over 32,000 retail professionals was an overwhelming success: 1,300+ digital butterflies and branded objects holding prizes were released at NRF. This represents the first public showcase of BLOCKV’s powerful, one-of-a-kind object “brain” functionality, the latest addition to the rapidly advancing BLOCKv platform. Participating brands: Salesforce, AT&T, Cisco, HP, Dell VMware, Lyft, Pepsi, GE, Toshiba, NCR, Reliant, Advantech, Zivelo & Hikvision, all created Vatoms used to drive awareness and traffic. This was a watershed moment for the history of blockchain, when so many household names deployed experiential non-fungible tokens into production for public consumption. BLOCKv is honored that no other platform or technology in the space has anything close to this level of activation with major brands. A 50% engagement ratio: With a limited release to the NRF attendees, Project NGAGE generated over 16,000 unique engagements with digital objects, far exceeding the 27% benchmark for conference/trade show attendees engaging through event mobile apps. Higher redemption rates than conventional channels: While conventional digital channels have under 25% redemption rates for incentives like paperless coupons, the redemption rate for Project NGAGE virtual butterflies carrying valuable rewards at this year’s NRF was a staggering 93%. First of its kind Visual Display technology: with our partner Varius, we previewed a turn-key execution for acquiring Pepsi branded digital objects from a digital visual display. By the end of NRF, over 675 objects were acquired from the digital display featured within Intel’s retail exhibit. Participants’ perceived value for their time exceeded expectations: 95% of the participants engaging in the redemption process expressed “positive value for their time”. Finally, at the end of January, BLOCKv will exhibit at the Blockchain Gamer Connects and Pocket Gamer Connects conferences in London on the 21st and 22nd respectively. These conferences are aimed at the emerging and vibrant blockchain gaming development community in the UK. If you are planning to attend the conference, BLOCKv will present our platform to attendees on the Blockchain stage on January 21st. And we look forward to meeting all of you to discuss the next generation of gaming.
{ "pile_set_name": "OpenWebText2" }
Report of a new DRB1*13 allele: DRB1*1336. This brief communication describes the characterization of a new allele, DRB1*1336.
{ "pile_set_name": "PubMed Abstracts" }
The public must raise its voice for Julian Assange if it does not want to be gagged for good, says George Galloway, who believes that the publisher's persecution is an assault on the fundamental right of people to know the truth. Galloway and a crowd of WikiLeaks supporters staged a protest in support of the arrested co-founder of the whistleblowing site on Sunday outside Belmarsh Prison, where Assange is being held, a top security jail in southeast London known as 'Britain's Guantanamo Bay'. Assange was dragged out of Ecuador's London embassy on Thursday after spending almost seven years in de-facto confinement, with his visitor rights limited and internet cut off during the last months of his exile. Galloway, a film-maker, writer and former Labour MP, who calls himself a friend of Assange, said that his case affects all who cherish their right to know the truth about shady government dealings. "You don't have to like him, you don't have to like everything he's ever written or published, but if you like the fact that we have the right to speak and know the uncomfortable truths our rulers don't want us to know, then you should be here in person, or, at least, in spirit," Galloway said. He said this is exactly the type of situation in which one must take sides, and either stand with the "executioners" or oppose them. READ MORE: WikiLeaks 'dead man's switch'? Assange's arrest prompts speculation about possible major data dumps "If Julian Assange is criminalized and incarcerated for revealing the truth about what our rulers are doing, have done, then you might as well deliver yourself behind those walls, you might as well volunteer for a prison cell yourself, because you'll no longer be free, and you'll never be free again," the former lawmaker said. Assange was arrested for skipping bail in the UK and is facing a US extradition request. The US charged him with conspiracy to hack into a Pentagon computer network together with former US Army soldier Chelsea Manning. Also on rt.com ‘Julian Assange exposed great crimes & now great crime committed against him’ - George Galloway While the UK police had the formal right to arrest Assange because of his bail violation, Galloway thinks they should not have treated him like a dangerous criminal. "The British police had to arrest Julian Assange and they had to put him in an ambulance, not in a police wagon because the man, after seven years in a single room in the Ecuadorian embassy, is obviously not a well man." Speaking on the prospects of the US extradition request, Galloway told RT he hopes the British court rejects it. He argued that his trial in the US might go against the principle of double jeopardy since Manning already served time for the same offense. "There may have been a theft of information involved," but it was justified, Galloway believes: it was "a right of all the people of the world to know about what Chelsea Manning released." And while publishing stolen materials in the public interest is nothing new, Assange's case threatens to put a full stop to it. "If every publisher who publishes material that was stolen from its owners was put on trial and extradited and sent behind bars, there would be no publishing." Hear George Galloway's thoughts in full below: Think your friends would be interested? Share this story!
{ "pile_set_name": "OpenWebText2" }
The Smiths - What Difference Does It Make (1984 - original version) 3. The Smiths - What Difference Does It Make (1984 - original version) The original cover for the classic Smiths single featured actor Terence Stamp on the sleeve in a still taken from the 1965 movie adaptation of John Fowles' The Collector. He's pictured holding a chloroformed pad that he's used to "collect" a young female student. Download the app Follow Us Your privacy is important to us. We want to better help you understand how and why we use your data. You’ll continue to enjoy Radio X and all of its great content and features! View our Privacy Statement for more details.
{ "pile_set_name": "Pile-CC" }
WASHINGTON (Reuters) - U.S. President Donald Trump on Wednesday called tax code revisions a critical way to boost the nation's economy as he kicked off a White House meeting with chief executive officers of Target Corp TGT.N, Best Buy Co Inc BBY.N and six other major retailers. The retailers spoke with Trump about an overhaul of the corporate tax law and infrastructure improvements. While companies like Best Buy and Target support changes to the tax code, they urged Trump to oppose a proposal for a new border tax on imported goods. The border tax is among sweeping changes proposed by the Republican-controlled House of Representatives. Convincing Trump to oppose the measure would probably bring an end to it. Trump had said on Thursday that he would announce his own “phenomenal” tax plan in the coming weeks. U.S. stocks hit record intraday highs, and the U.S. dollar and bond yields rose. At Wednesday’s meeting, Trump said work on a tax plan was going “really well” but gave no details except to say it would simplify the tax code. The meeting included Target's Brian Cornell, Best Buy's Hubert Joly, Gap Inc's GPS.N Art Peck, Autozone Inc's AZO.N William Rhodes, Walgreens Boots Alliance Inc's WBA.O Stefano Pessina, J.C. Penney Co Inc's JCP.N Marvin Ellison, Jo-Ann Stores' Jill Soltau and Tractor Supply Co's TSCO.O Gregory Sandfort. “We stressed the importance of taking a thoughtful approach to tax reform for both individuals and corporations,” Rhodes said after the meeting. The group also met with the heads of the two tax-writing congressional committees, Kevin Brady, chairman of the House Ways and Means Committee, and Senator Orrin Hatch, chairman of the Senate Finance Committee. Brady and House Speaker Paul Ryan are leading the push to cut the corporate income tax to 20 percent from 35 percent, impose a 20 percent tax on imports and exclude export revenue from taxable income. Companies that rely heavily on imports, such as retailers, automakers and refiners, say House Republicans’ border tax would outweigh the benefit of a lower headline corporate tax. Critics also say the tax would lead to higher consumer prices for imported products. Trump has voiced some concern about the House tax proposal, calling it “too complicated.” But the White House also has said a border tax on goods from Mexico is one option under review to pay for a wall along the nation’s southern border. “Tax reform is one of the best opportunities to influence our economy,” Trump said in brief opening remarks that included no mention of the border tax idea. The prospect of a big import tax is also pitting large U.S. companies against one another. A group of major exporters, including Boeing Co BA.N, General Electric Co GE.N and Pfizer Inc PFE.N, has formed a coalition to support the import tax.
{ "pile_set_name": "OpenWebText2" }
Calculate the remainder when 25314 is divided by 25314. 0 Calculate the remainder when 49167 is divided by 724. 659 Calculate the remainder when 9806 is divided by 880. 126 Calculate the remainder when 4221 is divided by 194. 147 What is the remainder when 59356 is divided by 212? 208 Calculate the remainder when 6012 is divided by 187. 28 What is the remainder when 11197 is divided by 1803? 379 What is the remainder when 1271 is divided by 33? 17 Calculate the remainder when 102268 is divided by 47. 43 What is the remainder when 3815 is divided by 49? 42 Calculate the remainder when 4259 is divided by 116. 83 Calculate the remainder when 176532 is divided by 38. 22 Calculate the remainder when 8198507 is divided by 43. 41 What is the remainder when 35199 is divided by 72? 63 What is the remainder when 67672 is divided by 24? 16 What is the remainder when 7358 is divided by 118? 42 Calculate the remainder when 17021 is divided by 128. 125 What is the remainder when 258323 is divided by 1254? 1253 What is the remainder when 71794 is divided by 374? 360 What is the remainder when 26166 is divided by 1249? 1186 Calculate the remainder when 51826 is divided by 6. 4 Calculate the remainder when 9043 is divided by 1797. 58 What is the remainder when 157514 is divided by 15? 14 What is the remainder when 402891 is divided by 11? 5 What is the remainder when 55462 is divided by 14? 8 What is the remainder when 64842 is divided by 1099? 1 Calculate the remainder when 44296 is divided by 923. 915 Calculate the remainder when 957 is divided by 93. 27 Calculate the remainder when 1573 is divided by 1540. 33 What is the remainder when 1260 is divided by 308? 28 What is the remainder when 27500 is divided by 9166? 2 What is the remainder when 12324 is divided by 127? 5 Calculate the remainder when 36062 is divided by 91. 26 What is the remainder when 8870 is divided by 19? 16 Calculate the remainder when 32335 is divided by 268. 175 What is the remainder when 7905 is divided by 3934? 37 What is the remainder when 19860 is divided by 144? 132 Calculate the remainder when 16042 is divided by 875. 292 Calculate the remainder when 75397 is divided by 68. 53 Calculate the remainder when 461133 is divided by 1122. 1113 What is the remainder when 22571 is divided by 34? 29 Calculate the remainder when 2864 is divided by 235. 44 What is the remainder when 9623 is divided by 4796? 31 What is the remainder when 849599 is divided by 82? 79 Calculate the remainder when 9189 is divided by 39. 24 Calculate the remainder when 714412 is divided by 77. 6 What is the remainder when 2906 is divided by 67? 25 What is the remainder when 307900 is divided by 307900? 0 Calculate the remainder when 78534 is divided by 136. 62 What is the remainder when 2735 is divided by 90? 35 What is the remainder when 68618 is divided by 17148? 26 What is the remainder when 3912 is divided by 65? 12 Calculate the remainder when 368095 is divided by 87. 85 Calculate the remainder when 113466 is divided by 668. 574 What is the remainder when 1303 is divided by 1162? 141 Calculate the remainder when 1702 is divided by 148. 74 What is the remainder when 125516 is divided by 120? 116 Calculate the remainder when 80974 is divided by 4. 2 Calculate the remainder when 95406 is divided by 2384. 46 What is the remainder when 5614 is divided by 30? 4 Calculate the remainder when 1272957 is divided by 1224. 1221 Calculate the remainder when 139341 is divided by 503. 10 Calculate the remainder when 9169 is divided by 4573. 23 What is the remainder when 6134622 is divided by 475? 472 Calculate the remainder when 773 is divided by 90. 53 What is the remainder when 41962 is divided by 26? 24 What is the remainder when 101042 is divided by 309? 308 What is the remainder when 48489 is divided by 289? 226 Calculate the remainder when 31184 is divided by 11. 10 Calculate the remainder when 2965 is divided by 162. 49 What is the remainder when 899 is divided by 27? 8 What is the remainder when 6451 is divided by 2145? 16 What is the remainder when 3324 is divided by 1590? 144 Calculate the remainder when 380188 is divided by 190. 188 Calculate the remainder when 2144 is divided by 2131. 13 What is the remainder when 1022 is divided by 352? 318 What is the remainder when 9050 is divided by 1969? 1174 What is the remainder when 293090 is divided by 47? 45 Calculate the remainder when 1034904 is divided by 644. 640 Calculate the remainder when 372122 is divided by 65. 62 What is the remainder when 57130 is divided by 60? 10 Calculate the remainder when 67119 is divided by 2314. 13 Calculate the remainder when 96202 is divided by 1013. 980 Calculate the remainder when 29832 is divided by 489. 3 Calculate the remainder when 3152 is divided by 711. 308 What is the remainder when 909485 is divided by 1030? 1025 Calculate the remainder when 8289 is divided by 2700. 189 Calculate the remainder when 93249 is divided by 46615. 19 What is the remainder when 5342 is divided by 243? 239 What is the remainder when 37513 is divided by 18735? 43 What is the remainder when 22963 is divided by 294? 31 Calculate the remainder when 118782 is divided by 1381. 16 Calculate the remainder when 17044 is divided by 1113. 349 Calculate the remainder when 129340 is divided by 86. 82 Calculate the remainder when 7121 is divided by 397. 372 Calculate the remainder when 5369 is divided by 2590. 189 Calculate the remainder when 854 is divided by 90. 44 Calculate the remainder when 935808 is divided by 119. 111 What is the remainder when 98345 is divided by 1069? 1066 What is the remainder when 5191 is divided by 985? 266 What is the remainder when 44505 is divided by 34? 33 Calculate the remainder when 2083 is divided by 204. 43 What is the remainder when 5798 is divided by 1912? 62 What is the remainder when 192991 is divided by 32? 31 Calculate the remainder when 24909 is divided by 27. 15 Calculate the remainder when 258019 is divided by 133. 132 Calculate the remainder when 1497 is divided by 36. 21 What is the remainder when 1241 is divided by 114? 101 Calculate the remainder when 430614 is divided by 38. 36 Calculate the remainder when 39327 is divided by 277. 270 What is the remainder when 64929 is divided by 1352? 33 Calculate the remainder when 67196 is divided by 52. 12 Calculate the remainder when 14735 is divided by 48. 47 Calculate the remainder when 6947 is divided by 153. 62 What is the remainder when 34777 is divided by 285? 7 What is the remainder when 37466 is divided by 2341? 10 What is the remainder when 10496 is divided by 1019? 306 What is the remainder when 6170 is divided by 335? 140 Calculate the remainder when 735 is divided by 535. 200 What is the remainder when 3775 is divided by 900? 175 Calculate the remainder when 177598 is divided by 337. 336 What is the remainder when 27437 is divided by 765? 662 What is the remainder when 38747 is divided by 1249? 28 What is the remainder when 466452 is divided by 258? 246 What is the remainder when 200752 is divided by 9? 7 Calculate the remainder when 1136 is divided by 892. 244 Calculate the remainder when 2550 is divided by 27. 12 Calculate the remainder when 3234 is divided by 1061. 51 Calculate the remainder when 5565 is divided by 1320. 285 What is the remainder when 3203 is divided by 81? 44 Calculate the remainder when 5048 is divided by 722. 716 Calculate the remainder when 177829 is divided by 187. 179 Calculate the remainder when 2320 is divided by 589. 553 What is the remainder when 2452 is divided by 224? 212 What is the remainder when 7918 is divided by 168? 22 What is the remainder when 8000 is divided by 7900? 100 What is the remainder when 12682 is divided by 103? 13 What is the remainder when 23634 is divided by 223? 219 Calculate the remainder when 80841 is divided by 37. 33 Calculate the remainder when 71890 is divided by 107. 93 Calculate the remainder when 13187 is divided by 99. 20 What is the remainder when 458 is divided by 397? 61 What is the remainder when 550 is divided by 44? 22 Calculate the remainder when 531967 is divided by 465. 7 What is the remainder when 31069 is divided by 32? 29 What is the remainder when 46384 is divided by 198? 52 What
{ "pile_set_name": "DM Mathematics" }
Michelle Payne finishes fifth on Ascot debut Michelle Payne piloted Kaspersky to a respectable fifth place in the Queen Anne Stakes at Royal Ascot. The 31-year-old Melbourne Cup-winning jockey was aiming to become the first woman to ride a winner at the Royal meeting in 30 years on the 66/1 shot, trained by British-based Australian handler Jane Chapple-Hyman. Drawn in barrier three, two up from odds-on favourite and eventual winner Ribchester, Payne had the six-year-old colt well in contention in the closing stages on the straight mile track. However, he didn’t quite have enough in the tank for a top-three finish but held on to grab fifth behind Mutakayyef, Deauville and Spectre. The Richard Fahey-trained Ribchester proved his worth as favourite with a dominant performance, dispelling any concerns about his ability on fast ground on a roasting hot day in the London area.
{ "pile_set_name": "Pile-CC" }
From the Departments of Medicine (Drs Gelber and Klag and Ms Mead) and Epidemiology (Drs Gelber and Klag), the Johns Hopkins Medical Institutions, Baltimore, Md; the Department of Medicine, Meharry Medical College, Nashville, Tenn (Dr J. Thomas and Ms D. Thomas); Mary Imogene Bassett Research Institute, Cooperstown, NY (Dr Pearson); and the Departments of Medicine, Epidemiology, and Preventive Medicine, University of Maryland School of Medicine, and the Geriatric Research Education and Clinical Center, Veterans Affairs Medical Center, Baltimore (Dr Hochberg). Dr Pearson is now with the Department of Community and Preventive Medicine, University of Rochester School of Medicine. Background:Patients with gout are encountered frequently in clinical practice. Previous studies have suggested that hyperuricemia and gout may represent risk factors for coronary heart disease (CHD), the most common cause of death in American men. Methods:Prospectively collected data from 2 longitudinal cohort studies of former medical students—371 black men in the Meharry Cohort Study and 1181 white men in the Johns Hopkins Precursors Study—were analyzed. The development of gout and of CHD was determined by physician self-report, and validated by using published criteria. The risk for CHD associated with gout was evaluated using Cox proportional hazards analysis. Results:During a median follow-up of 30 years, there were 38 gout cases and 44 CHD events among the Meharry men, and 68 gout cases and 138 CHD events among the Hopkins men. Prior gout was not associated with an increased risk for incident CHD (relative risk=1.20; 95% confidence interval, 0.37-3.92) among the Meharry men or among the Hopkins men (relative risk=0.66; 95% confidence interval, 0.24-1.79). Multivariate analysis adjusted for known CHD risk factors did not alter these findings. Conclusion:These results, in black and white male physicians, do not suggest a role in men for targeting gout identification in the primary prevention of CHD.Arch Intern Med. 1997;157:1436-1440
{ "pile_set_name": "Pile-CC" }
RS FRONT PAGE CONTRIBUTOR PPP on the Brown-Warren Senate Race: A Polling Post-Mortem MA-SEN Polling Polls are back in the news, with the release of four public polls and an internal Gabriel Gomez campaign poll in the June 25 Massachusetts special Senate election to replace John Kerry. 3 of the 4 public polls show Ed Markey with a distinct but still surmountable lead, an average of 6 points; the fourth shows him up by 17 and looks like an outlier, adding 2.7 points by itself to Markey’s lead in the RCP average. The Gomez campaign’s internal poll shows Markey by 3; if you use the general rule of thumb that a campaign conducts multiple internal polls and will only release its most favorable internal, that’s consistent with this currently being a 5-7 point race. Which is not a bad place for a Republican to be in Massachusetts five weeks before the election – it gives Gomez a puncher’s chance in a special election – although you’d clearly still put better than 50/50 odds on Markey. The closest public poll so far was put out by progressive Democratic pollsters PPP; its first poll of the race has Markey up by 4, 44-40. Let’s take a look at how PPP polled the last Senate race in Massachusetts, the 2012 race between Scott Brown and Elizabeth Warren, which Warren ultimately won 54-46. That race may be less predictive of this one than the 2010 special election between Brown and Martha Coakley (in which PPP was one of the more reliable pollsters), but it’s interesting as an exercise in examining how PPP samples the electorate. PPP v Rasmussen PPP is one of two national pollsters – the other being Rasmussen – to publish regular statewide polls across the country, and that frequency in and of itself has made both pollsters into major players in public polling. At the moment, PPP is riding high, having posted a better record in 2012 than Rasmussen, while Rasmussen (who did some polling for Republicans in the past and retains a presence in conservative media) had built its reputation in better years for the GOP like 2002 and 2004. There’s a chicken-and-egg question in there, as to whether pollsters with something of a partisan tilt are just getting lucky in years when the electorate favors their side; as I noted in my November post-mortem, the stricter likely-voter screens of pollsters like Rasmussen worked better in the turnout environments of 2002 and 2004, while PPP’s looser screen better approximated turnout in 2012. For an example of a race that Rasmussen polled much better than PPP, consider the 2010 North Carolina Senate race between Richard Burr and Elaine Marshall. PPP is based in North Carolina and closely tied to that state’s Democratic Party; I have no idea whether it was doing non-public polling for the Marshall campaign, but its polls were clearly less favorable for Burr than Rasmussen or other pollsters. PPP conducted 11 of the 30 polls taken in 2010 that were included in the RCP average. 7 of those 11 polls showed Burr polling below 45%, including two that had him below 40%; only 3 of the other 19 polls conducted by other pollsters showed Burr below 45% at any point in the race. 8 of PPP’s 11 polls had Burr with a single-digit lead; only 4 of the other 19 did. Between September 8 and October 25, the race was polled 8 times; the two PPP polls in that period showed Burr leading 49-36 and 48-40, while the other six polls all showed a lopsided race, with an average result of Burr 52, Marshall 35. PPP’s final poll suddenly got with the program (Burr 52, Marshall 40), and the race ended Burr 55, Marshall 43. You can see in this graph the PPP and Rasmussen polling of that race, which Rasmussen also polled 11 times in 2010: PPP’s polling single-handedly drove the coverage suggesting that Burr was vulnerable, it was out of step with the other pollsters, and it was flat-out wrong. PPP was hardly the first or last pollster to blow a race, of course; the point here is to identify an example of a race where Rasmussen’s approach was clearly a lot more reliable guide to what was happening than PPP’s. All pollsters require careful scrutiny if we are to use their work product as tools for advancing rather than obscuring our knowledge of elections, and the halo effect surrounding PPP after the 2012 election should not exempt it from that scrutiny. As we have seen before, PPP’s methodology for polling differs from that of Rasmussen and other pollsters; in lieu of likely-voter screens, Tom Jensen (who runs PPP) has described how he models the demographic composition of his polls: Jensen conceded that the secret to PPP’s success was what boiled down to a well informed but still not entirely empirical hunch. “We just projected that African-American, Hispanic, and young voter turnout would be as high in 2012 as it was in 2008, and we weighted our polls accordingly,” he explained. “When you look at polls that succeeded and those that failed that was the difference.” Given the methodological challenges currently confronting pollsters, those hunches are only going to prove more important. “The art part of polling, as opposed to the science part,” Jensen said, “is becoming a bigger and bigger part of the equation in having accurate polls.” As you can see, PPP dramatically shifted gears based on something starting in its October 14 poll, and that enabled it to get closer to the final result as reported by exit polling. The vagueness of Jensen’s public explanations of his methodology suggest a man who is not really sharing his secret sauce. My guess – which I stress here is pure speculation in the absence of evidence, so I’m happy to be corrected by Jensen – is that PPP may have been doing non-public work for OFA or some other Democratic or liberal-interest-group client, and gathered information (maybe about OFA’s superior turnout operation, maybe about non-public polls) that was not generally available, and modeled its polling assumptions around that. (There’s nothing illegal or necessarily unethical about doing so, but if that’s the case, it would suggest that public polling is more driven by non-public information than you might think). If that’s how Jensen formed his assessments of the electorate, then we can assume that PPP’s turnout-projection models will continue to be superior so long as Jensen has access to better-informed sources of non-public information than other pollsters (it’s clear that in 2012, Democratic campaigns knew things about turnout that Republican campaigns didn’t, and Republican campaigns did not know any things about turnout that Democratic campaigns didn’t; one hopes this will not always be the case, as it plainly was not in 2004). On the other hand, if we take Jensen at face value and assume he really is just guessing, then his guesses are as variable as those of any other reasonably well-informed pundit. The 2012 Massachusetts Senate race is just one of many case studies from which we can look at how PPP’s shifting assumptions about turnout interacted with its polling. Brown v Warren PPP polled the Brown-Warren Senate race in polls released on August 21, September 16, October 12, and November 2. (I’m citing here the dates the polls were publicly released; PPP generally takes polls over the prior 3 days). Here’s the topline result of those polls: Aug Sept Oct Nov Brown 49 46 44 46 Warren 44 48 50 52 PPP showed Brown with a 5-point lead in August, at a time when Brown held about a 1-point lead overall in the RCP average – but according to PPP, the race shifted 7 points in Warren’s direction in September, 4 more points in October, and 2 more into November. PPP’s final result actually understated Warren’s margin of victory by 2 points. What changed? In each case, I will compare PPP’s internals to the exit polls. Gender The truck-driving Brown against the archetypically schoolmarmish Warren was a race tailor-made for a gender gap, and what is perhaps most striking about PPP’s polling down the stretch run of this race is the sharp turn towards a female-dominated electorate: Aug Sept Oct Nov EXIT Female 52 50 55 57 53 Male 48 50 45 43 47 Female Brown 41 36 38 44 41 Warren 50 56 58 55 59 Male Brown 57 55 52 49 53 Warren 36 39 41 48 47 The exit polls – assuming those are accurate, which is never really certain – suggest that PPP went overboard in projecting that the Massachusetts electorate would be 55-57% female in 2012, and the final poll understated the gender gap, which ended up closer to what PPP’s October poll had estimated. That said, clearly the shift to more female voters in the sample had a measurable impact on Warren’s support. For what it’s worth, the current poll showing Markey up 4 also has a 55% female sample, although the gender gap is less pronounced (Markey leads 46-36 with women, Gomez leads 45-41 with men). Race Aug Sept Oct Nov EXIT White 87 84 84 82 86 Non-White 13 16 16 18 14 White Brown 49 47 46 50 51 Warren 43 48 49 49 49 Non-White Brown 47 41 36 31 14 Warren 45 49 56 66 86 As it did in Florida, PPP started upping the non-white share of its sample in Massachusetts near the end of the race. But this time, it overshot the mark: the exit polls showed an electorate that was 14% non-white, lower than the 16-18% in PPP’s polls from September-November. A share of the vote that small is bound to be “noisier” – that is, there’s a small-sample-size problem where it’s harder to get enough non-white voters to poll them reliably if they’re less than 20% of the people in your overall sample. While the trend in PPP’s poll was a dramatic dropoff in Brown’s non-white support, the actual numbers are just nuts: there’s no way Brown went from leading among non-white voters with 47% of the vote in August to down 35 points in November to losing by 72 on Election Day. It’s possible that there’s some instability here among whether Hispanic voters were reporting themselves as white, but that result just doesn’t make any sense at all. Among white voters, PPP’s final poll showed Brown pulling ahead for the first time since August, even as his overall standing was at its low ebb; the exit poll showed him winning white voters 51-49 but losing the race due to his poor standing with the remaining 14% of the electorate. PPP’s Gomez-Markey poll has an 84% white electorate with Gomez down 2 points among white voters (41-43), underperforming Brown but with a lot of undecideds, and 13 among non-white voters (36-47), a showing with non-white voters that’s consistent with Brown’s August-September polling but wildly inconsistent with the exit polls. Age The other big dividing line in 2012 was the youth vote. Let’s look at what PPP’s poll sample looked like by age: Aug Sept Oct Nov EXIT 18-29 17 9 12 15 19 30-45 25 21 25 24 23 46-65 40 48 42 41 39 65+ 18 22 21 20 19 18-29 Brown 43 47 33 50 39 Warren 47 50 52 48 61 The number of 18-29 year olds answering the September 13-16 poll dropped in half from August and didn’t recover until November – that could be the result of any number of anomalies, but I have to assume that it had something to do with it being the start of the college calendar (Massachusetts has an enormous proportion of college students). But even so, not one of PPP’s polls matched the 19% under-30 turnout of the exit polls (bear in mind here, however, that younger voters may be more likely to answer exit polls). The youth-voter sample is, again, noisy – Warren was bleeding Brown’s support among young voters into October, but PPP’s final poll had Brown winning 50% of the under-30 vote; the exit polls had him lose it by 12 points. (Note one other minor methodological discrepancy: PPP’s use of an age 30-45 bracket, whereas the exit polls used a 30-44 bracket). The Gomez-Markey poll had just 9% voters under 30, which may not be a bad estimate for a special election after the end of the college year, with Gomez down 40-33 among young voters. Party ID The great polling debate of 2012 was weighting of polls by party ID and the corresponding importance of independent voters. Massachusetts is a strange animal: independents are traditionally close to half the electorate, while there are more than twice as many Democrats as Republicans. Most independents in Massachusetts are not closet Republicans, as the usual strength of statewide Democrats can tell you, but many are persuadable – and given the tiny number of self-identified Republicans, a Republican candidate needs to clean up in a large way with independents to win. Brown’s support among independents never faltered in PPP’s polls or the exit polling (although if both sets of polls are treated as credible, it would suggest that Warren corralled all the late-deciding independents), but the partisan polling shows a different story: Aug Sept Oct Nov EXIT D 38 38 41 39 39 R 15 17 16 16 17 I 48 45 43 45 45 D Brown 20 13 13 15 11 Warren 73 81 82 84 89 R Brown 91 94 90 88 95 Warren 7 5 6 12 5 I Brown 58 56 57 59 59 Warren 32 35 35 38 41 The October PPP poll oversampled Democrats and the August poll with Brown up 5 actually undersampled Republicans, but otherwise PPP’s polls were fairly consistent in their partisan sampling for this race. But what PPP was reporting was a steady consolidation of Democrats behind Warren as she made the race more ideological and put the primary behind her. On the other hand, every PPP poll, especially the final one, understated Brown’s support among his own party. (By contrast, the self-reporting of voter ideology was about the one element that was very consistent month to month in PPP’s polling, but I’ve never really put much stock in self-reported voter ID). The Gomez-Markey poll had a D-heavy sample at the expense of independents, 41/17/42 D/R/I, with Gomez up 47-31 among independents, Gomez drawing 21% of Democrats and Markey drawing 17% of Republicans – all signs of a race the voters haven’t really focused on yet. Conclusion The new conventional wisdom on polling is that the key to accurately forecasting elections is getting the demographics right: if you predict who will vote, by race, gender, and age, you can pretty accurately profile who they will vote for. Yet despite PPP’s status as one of the icons of this brave new era of polling, its record in the 2012 Brown-Warren race – a race in which its topline results ended up on the mark – suggests that it was actually better at modeling the electorate by party ID and ideology than by race, gender or age, that its assumptions about the demographics of the electorate changed a good deal from month to month, and that within each demographic group its reported results were often highly unstable. Given the difficulty of accurately projecting turnout in special elections, even the polling averages have to be taken with some grain of salt in the best of times, but polling in the age of Obama is ever more art than science.
{ "pile_set_name": "Pile-CC" }
"[SNORING]" "[DOOR OPENS]" "[YAWNS]" "You still up?" "I've got work to do." "Well, whatever you're looking for is probably asleep, like you should be." "Lockdown initiated." "Good night." "[LIGHTS BUZZING]" "[COUGHING]" "CYBORG:" "He's not coming back, you know." "That's all that's left of him:" "Nothing but dust." "We can't be sure." "He was never captured, never found." "It's over, Robin." "Slade's gone." "[ALARM RINGING] Trouble!" "# When there's trouble You know who to call #" "# Teen Titans!" "#" "# From their tower They can see it all #" "# Teen Titans!" "#" "# When there's evil On the attack #" "# You can rest knowing They got your back #" "# 'Cause when the world Needs heroes on patrol #" "# Teen Titans go!" "#" "# With their superpowers They unite #" "# Teen Titans!" "#" "# Never met a villain That they liked #" "# Teen Titans!" "#" "# They've got the bad guys On the run #" "# They never stop till Their job gets done #" "# 'Cause when the world Is losing all control #" "# Teen Titans go!" "#" "# One, two, three, four, go!" "#" "Teen Titans!" "[MEN SHOUTING INDISTINCTLY]" "[ALL GRUNTING]" "[ROARS]" "ROBIN:" "Drop it, Cinderblock, before we drop you." "[GRUNTS]" "[BEAST BOY SCREAMS]" "[GRUNTS]" "[YELLING]" "Unh!" "Uh!" "[GRUNTING]" "Ha!" "[GRUNTING]" "[YELLING]" "Aahh!" "Oof!" "[ROBIN YELLS]" "[ROARS]" "[ROARS]" "[GROANS]" "[GASPS]" "Slade!" "ROBIN:" "Stop!" "SLADE:" "Too slow, Robin." "You always were." "I knew you'd come back." "[GRUNTING]" "[PANTING]" "Already out of breath?" "Don't tell me you've gotten soft." "Save your energy." "You're going to need it." "I merely freed Cinderblock to get your attention, and now that I have it..." "What are you planning?" "Seismic generators, Robin." "Three of them, placed on fault lines all over the city, and in three short hours, they'll trigger an earthquake so magnificent, it will break your city in two." "Not if I break you first." "[GROWLING]" "Yahh!" "[THUNDER CRACKS]" "BEAST BOY:" "Uh, sorry to interrupt your little nature hike, but... where were you?" "We had to finish off Cinderblock by ourselves, in the rain, and..." "[SNEEZES, THEN TRUMPETS]" "Great." "Now I've got a cold." "Slade." "He's back." "You sure it was him?" "[SNIFFLES]" "You kind of had Slade on the brain lately." "Maybe..." "It was him." "He's going to create a massive earthquake, and we have three hours to stop it." "I don't get it." "The dude fell into a pit of lava." "Who lives through something like that?" "Apparently Slade." "Yeah, he's pretty..." "Pretty..." "[SNEEZES]" "Slippery." "We'll worry about how Slade survived later." "Right now, all that matters is how we stop him." "Cyborg, check out the bridge." "Raven, take the park." "Beast Boy, the pier." "Starfire, we're going after Slade." "[THUNDER CRASHES]" "Fear not, Robin." "We will stop him." "We have no other choice." "[COMMUNICATOR BEEPING]" "CYBORG:" "Robin, I'm at the bridge." "Did you find the generator?" "Man, I can't find diddly." "No signs of anything unusual." "Nothing here either." "BEAST BOY:" "I got bupkis." "[SNEEZES]" "ROBIN:" "They're there." "Keep searching." "[SNEEZES]" "[SNEEZES, THEN BLEATS]" "[SNEEZES, THEN ROARS]" "I told them exactly where Slade put the generators." "I should have gone myself." "They will be found, Robin." "You must have faith in your..." "[THUNDER CRASHES]" "Robin?" "Tick tock, Robin." "This is going to be easier than I thought." "You've gotten sloppy while I was away." "[GRUNTING]" "[GROANS]" "Hi-yah!" "[THUNDER CRACKS]" "Ugh!" "STARFIRE:" "Robin!" "Starfire, stop him." "[THUNDER CRACKS]" "[PANTING]" "What happened?" "[SIGHS]" "You are hurting me." "Slade ran right by you." "How could you let him get away?" "But, Robin, there was no one there." "[THUNDER RUMBLING]" "[CRIES]" "[SNEEZES, THEN SQUEALS]" "[SNIFFLES] I've looked everywhere." "I think Slade sent us on a..." "[SNEEZES REPEATEDLY]" "Wild-goose chase?" "Can I please go lie down now?" "I've run a sweep of the city's seismic faults." "They're all clean." "I'm thinking all this seismic generator stuff is just another one of Slade's tricks." "I am not so certain that Slade is behind this." "What happened?" "Where's Robin?" "Robin has elected to search on his own." "Huh?" "Why?" "He said he saw Slade." "I tried to see him, I truly did, but I could not." "I have never seen Robin so angry." "So angry at me." "Let's go find Robin." "SLADE:" "So here we are again." "The old haunt." "Just the two of us." "Slade, show yourself." "Come out and fight." "Relax, Robin." "I'm not going anywhere." "[PANTING]" "Ugh!" "[GRUNTING]" "[PANTING]" "Brings back memories, doesn't it?" "All I remember is how much I hated you." "What I remember is that you couldn't defeat me." "At least not all alone." "[BUZZING]" "[EXPLOSION]" "Pity your friends are of no use to you." "Why couldn't Starfire see you?" "I believe you are familiar with cloaking technology?" "I'm familiar with all your tricks." "That's why you're not going to get away with it." "[YELLING]" "Our time apart may have made you soft, but it's only made me stronger." "[GRUNTING]" "[GROWLING]" "Your friends won't find the generators, and they can't see me." "They can't see the truth, Robin, even when it's right in front of them." "Then I'll have to take care of you myself." "I've stopped you before." "Robin, if you've stopped me, then why am I still here?" "[YELLING]" "[GRUNTING]" "[BONES CRACK] ROBIN:" "Aagh!" "[YELLING]" "[PANTING]" "You can't even touch me." "[YELLING]" "How can you save a city, Robin, when you can't save yourself?" "[GRUNTING]" "[GRUNTS]" "[YELLS]" "[PANTING]" "[TRANSPONDER BEEPING]" "Robin's locator signal." "He's nearby." "[CRASH] [ROBIN SCREAMS]" "Very nearby." "[ROBIN GRUNTING]" "Robin!" "[ROBIN GRUNTING]" "Um, since when is Robin into mime?" "Slade!" "[BOTH GASP]" "What are you doing here?" "You're supposed to find the generators." "I don't think there are any generators, man." "We looked everywhere." "Slade must be cloaking them, just like he's cloaking himself." "That's why you couldn't see him." "But if I could not see him, why could you?" "What are you trying to say?" "Robin, are you sure you really saw Slade?" "Saw him?" "I fought him." "You think I did this to myself?" "Dude, this is the only way out, and we were standing here the whole time." "No one got past us." "No one was in here but us." "I don't have time for this." "I have to find those generators." "There are no generators." "There is no Slade!" "I know what I saw!" "I have to stop him." "I'm the only one who can, and I'll take down anyone who gets in my way!" "[GROANING]" "[MOANING]" "ROBIN [MOANING]:" "Huh?" "Huh?" "[GRUNTING]" "STARFIRE:" "But must we keep him restrained?" "CYBORG:" "He threatened us, Star." "He's dangerous." "BEAST BOY:" "Dangerous?" "Try totally flipped out, cuckoo, labonza." "[SNEEZES] [GLASS SHATTERS]" "RAVEN:" "We've gotta run some tests on him, figure out what's going on." "SLADE:" "Alone again, Robin?" "As long as I'm around, you are never alone." "[ROBIN GRUNTING]" "Relax, Robin." "I promise you won't feel a thing." "[THUNDER CRASHES]" "STARFIRE:" "Please, you have uncovered the cause of his strange behavior?" "So far everything looks normal." "But he is not normal." "Robin would not do these things." "He would not threaten his friends." "He would not shout at me or..." "There is a cause!" "And you must find it!" "Star, I'm sure there's a good explanation, okay?" "Maybe Slade really is invisible." "We just can't..." "No!" "He still woulda shown up on my radar." "I'm telling you, he wasn't..." "[BEEPING RAPIDLY]" "His heart rate is off the charts." "Blood pressure." "Neurokinetics." "Most people can't survive this kind of stress." "Robin!" "[GASPS] Wow." "BEAST BOY:" "And I thought I didn't like going to the doctor." "But where is Robin?" "[FOOTSTEPS]" "There!" "[GASPS] [ALARM BLARING]" "Whoa!" "[GRUNTS]" "Robin's activated the quarantine protocol." "Nothing can get in or out." "We shall see about that!" "Careful, Star!" "[STARFIRE GRUNTS]" "We must find Robin." "What are you doing?" "Finding Robin." "Azarath, Metrion, Zinthos." "RAVEN:" "Robin, I'm here to help you." "ROBIN:" "Raven, what are you...?" "You have to get out!" "Slade." "He'll destroy you." "RAVEN:" "Robin, your heart." "You're in danger." "You have to trust me." "Slade isn't here." "He's not in the tower." "No, he's here." "He's real." "I've seen him." "Then let me see through your eyes." "See, Robin?" "There's no one here." "There never was." "[SLADE GRUNTS]" "[SCREAMS]" "[GASPS] Slade!" "You saw him?" "[SIGHS] I don't know if he's real or not, but he's real to Robin and that's all that matters." "The stress on his brain is destroying his body." "Robin truly believes he's fighting Slade." "And Slade is winning." "[YELLS, THEN GRUNTS]" "[SLADE GRUNTS]" "[BONES CRACKING]" "[SCREAMS]" "[SLADE GRUNTING]" "[LIGHTS BUZZING]" "[MOANING]" "You always knew it was going to end this way." "[WEAKLY] No." "Robin." "I can feel him." "He's not gonna make it." "Then let us end this battle... now!" "[GRUNTING]" "[GROANING] Oh, Slade, stop." "[GRUNTING]" "No, Robin," "I won't stop." "Not now, not ever." "I am the thing that keeps you up at night, the evil that haunts every dark corner of your mind." "I will never rest." "And neither will you." "My friends say you're not real." "Oh, I'm very real." "[GRUNTS]" "Could you have gotten all those bruises from someone who wasn't there?" "You can't even touch me." "All these bruises..." "But you don't have a scratch." "[THUNDER CRASHES] There was no one there." "There are no generators." "[BEEPING]" "There is no Slade." "SLADE:" "I am the thing that keeps you up at night, the evil that haunts every dark corner of your mind." "[GROANING] Every dark corner." "You're only in my mind." "Only in the dark." "My friends are right." "You aren't real." "I'm real enough to finish you!" "Lights out, Slade." "Robin!" "It's okay, Starfire." "[SIGHING] It's okay." "[THUNDER RUMBLING]" "Looks like Slade pulled off one last trick." "His mask contained a chemical reagent that infiltrated your nervous system." "The dust, it made me see, hear and feel Slade, even though he wasn't there." "And the more you fought, the more harm it did to you." "And anybody else who got in the way." "Scan says you're all clear now though." "Yeah?" "Well, just to be sure..." "[SIGHS]" "I've been fighting Slade for so long," "I guess it's hard to just let it go." "But sometimes I feel like I'm the only one still looking for him." "The only one who can stop him." "Robin, you are never alone." "And if Slade really does ever return, we'll be ready." "We've got things covered here." "Why don't you get some rest?" "Sounds like a good idea." "BEAST BOY:" "Okay, he's better." "Now what about me?" "I'm dying over here." "[SNEEZES]" "[SNEEZES, THEN CROAKS]" "[CROAKS]" "[BOTH LAUGH, THEN SIGH]" "What is it?" "The reagent in Slade's mask didn't trigger itself." "There was a signal." "Somebody triggered it... from outside the tower." "# T-E-E-N #" "# T-I-T-A-N-S #" "# Teen Titans #" "# Let's go!" "#" "# T-E-E-N #" "# T-I-T-A-N-S #" "# Teen Titans #" "# Let's go!" "#" "# T-E-E-N #" "# T-I-T-A-N-S #" "# Teen Titans #" "# Let's go!" "#"
{ "pile_set_name": "OpenSubtitles" }
Normal human peritoneal macrophages are unable to cap and internalize class II antigens. Normal human peritoneal macrophages show a restricted capacity to differentiate into inflammatory macrophages in vivo. We now report that these cells are unable to cap and internalize HLA-DR, as compared to endometriosis, and other macrophages. Immunoelectron microscopy indicated that lack of modulation was not due to the presence of preclustered antigenic sites. Northern blot analysis demonstrated transcripts for HLA.DR, c-fms, and c-fos, indicating that the surface defects were not likely to be associated with a general depression of transcriptional activity. There was no correlation between the mobility of class II molecules and the ability to present antigen as determined by autologous lymphocyte responses to tetanus toxoid. The inability of normal peritoneal macrophages to modulate class II antigens may represent a normal and more general environmental alteration required to permit peritoneal cells a scavenging function without developing the deleterious effects leading to a peritoneal inflammatory response.
{ "pile_set_name": "PubMed Abstracts" }
Annyeonghaseyo today i will unboxing Blackpink How you like that special edition album gogo buy here this album as you now thoo the song really famous now right? but on this album also only 1 song lets open the plastic case here there is another case here this the backside the album size so big so also the picture soo good to see >< more like magazine this concept more like a graph thingy end this lyric thats all for photobook now lets see the goods this Vibe Gift card double postcard oh this more like photocard than polaroid thats all for album second side this official bonus photocard if you buy from us go go buy! so tahst all guys, thanks for watching BYE!
{ "pile_set_name": "YoutubeSubtitles" }
There's no "sure thing" in life -- or in birth. But planning, preparing, learning, and knowing which questions to ask can help make the birth you want more likely to happen. There are so many variables that exist when a person goes into labor and gives birth; it's impossible to control them all. What you can control (for the most part) is how you participate in the process, which includes getting needed information at the right time. The following five questions can help you do just that. Be sure to share these questions with your birth support team, including your partner/spouse, support people, and doula. It can be hard to stand up for what you want, and even for things you need. This is especially true when you're in the middle of labor -- a time when most of your concentration is focused on coping with contractions. And yet, for a lot of people and in many hospitals and birthing centers, labor is the time when knowing how to advocate for yourself is particularly important. To get the most of what you want and need in labor and birth, consider the following tips. Tensing up your body's muscles is a natural response to stress and pain. But did you know that doing so actually causes more pain and stress? If you can learn to a) recognize when you're tensing up, and then b) release the tension, you can reduce the amount of overall pain and stress you feel. Of With the "Big Game" coming up this Sunday, it seems like everyone has football on the brain. So of course I thought, there's no better time to talk about birth and football than right now! If you're a diehard football fan and expecting a baby soon, this post is for you. Maybe you're feeling a Have you ever sat and talked with a friend while you waited and noticed that the time flew by? Have you ever struggled more through a run or gym session when there isn't any music playing? Do you find yourself turning down the radio in your car when you are trying to figure out where you're going? IV stands for "intravenous," and though many of use it as a noun ("Did you have an IV?"), it's technically an adjective and often paired with a noun like fluid, drip, medication, or injection. I promise this post is not about grammar, but it's important to understand the language and usage of People who are in labor, from early labor up to the point of pushing, often instinctively find ways to cope with contractions as a way to reduce pain. This is true for those who do not use pain medication as well as for those who do. In labor, a person's Have you thought about what you'll use to keep you hydrated and energized during labor and birth? There are lots of ready-made products you can buy that work great in labor, like granola/protein/energy bars, electrolyte drinks, coconut water, and enduranc According to retailers, February is the month of love. Instead of bucking this seasonal trend, we're going to run with it at Giving Birth with Confidence -- but with a twist. We're going to focus less on chocolates and jewelry and more what's at the heart About the Blog Manager Cara Terreri is a Lamaze Certified Childbirth Educator, certified DONA doula, and a professional writer, editor, and content specialist. She has been part of the Lamaze International team since 2004. Cara manages and writes for the Lamaze parents’ blog, Giving Birth With Confidence. She lives and works in the Orlando, FL, area with her husband and three children.
{ "pile_set_name": "Pile-CC" }
Q: python: using np.vectorize and np.meshgrid get a stange list of array - misunderstanding I have trouble with array after using np.vectorize and np.meshgrid Below is the result from my Terminal How did I get it def test_func(x, y): """ some calc here: arr = np.linspace(1,100, num=y) res = another_func(x, arr) return np.sum(res, axis=-1) """ return # (2,2)-np.ndarray X = np.array([1, 2, 3, 4]) Y = np.array([1, 2, 3]) X, Y = np.meshgrid(X, Y) # res = test_func(X, Y) ---> TypeError: only size-1 arrays can be converted to Python scalars func = np.vectorize(test_func, otypes=[object]) res = func(X, Y) What will be expected After calling the function with (x, y) get a (2, 2)-array After calling the function with a series (x, y) get a multidimensional -array slicing the result, combined with first elements in Array 3d-plot for (x, y, result) res = \ [[array([[1, 2], [3, 4]]), array([[11, 12], [13, 14]]), array([[111, 122], [133, 144]]), array([[1111, 1222], [1333, 1444]])], [array([[1, 2], [3, 4]]), array([[11, 12], [13, 14]]), array([[111, 122], [133, 144]]), array([[1111, 1222], [1333, 1444]])], [array([[1, 2], [3, 4]]), array([[11, 12], [13, 14]]), array([[111, 122], [133, 144]]), array([[1111, 1222], [1333, 1444]])]] type <class 'numpy.ndarray'> shape (3, 4) After slicing get res = [[1 11 11 1111], [1 11 11 1111], [1 11 11 1111]] then plot_3d(X,Y,res) Question Why the type of res is array? It looks like a list of array. I tried to use np.array(res) -> change nothing, the same as the figure, shape(3, 4) np.array(res.tolst()) -> np.ndarray with shape (3, 4, 2, 2) A: Why it does not slice? A numpy.meshgrid return a list of numpy.ndarray. Example Suppose you want to create a meshgrid from the following x and y: x = np.random.randint(10, size=(5)) y = np.random.randint(10, size=(5)) meshgrid = np.meshgrid(x,y) You would get something in the likes of: [array([[7, 1, 1, 0, 0], [7, 1, 1, 0, 0], [7, 1, 1, 0, 0], [7, 1, 1, 0, 0], [7, 1, 1, 0, 0]]), array([[0, 0, 0, 0, 0], [0, 0, 0, 0, 0], [3, 3, 3, 3, 3], [2, 2, 2, 2, 2], [7, 7, 7, 7, 7]])] But that is a list, and list has no attribute shape (AttributeError: 'list' object has no attribute 'shape'). Then how to slice this? If you need to slice the list as a numpy matrix, convert it into a numpy array: numpy_meshgrid = np.array(meshgrid) Most probably the result of your func function also requires conversion to numpy.ndarray. Now you can slice all you want: array= np.random.randint(10, size=(3, 4, 2, 2)) slice = array[:,:,0,0] And the result is: array([[6, 7, 5, 3], [1, 6, 0, 5], [4, 5, 6, 9]])
{ "pile_set_name": "StackExchange" }
Creating a Jewish Equality Index Mirroring the old saying about what's most important in real estate, the three most important themes in the national conversation right now are jobs, jobs and jobs. This is particularly true for the lesbian, gay, bisexual and transgender community. Anyone can be fired for their sexual orientation in 29 states, or for their gender identity or expression in 38 states. Although LGBT people have enjoyed increased protections among the largest employers and in certain states over the last decade, the vast majority of LGBT employees remain unprotected. I'm proud of the work the HRC Foundation has done over the years to not only track and analyze policies in the corporate sector but also to improve the lives of LGBT people by partnering with companies to extend equitable benefits. However, information on current practices at non-profit organization is largely unavailable and likely to reveal a strong need for education in workplaces on the organizational benefits that flow from treating LGBT employees fairly. The Human Rights Campaign Foundation announced this week we will begin an effort to investigate the existing workplace policies for lesbian, gay, bisexual and transgender employees at Jewish non-profit organizations. The work, an expansion of HRC's workplace equality project, is supported by a generous lead grant from the Charles and Lynn Schusterman Family Foundation and supporting grants from The Morningstar Foundation, Stuart S. Kurlander--a leader in several non-profit Jewish and Jewish LGBT community organizations--and an anonymous donor. Together, we and our partners share a vision of a work environment that provides every employee with the opportunity to achieve their full potential - in policy and in practice. This collaborative partnership will expand the conversation about equality for LGBT people to the communities these organizations serve and to religious communities more broadly about their role in making fairness and equality a reality for all. Adam Simon, the Associate National Director at the Charles and Lynn Schusterman Family Foundation, recently had this to share about their thoughts on, and expectations for, the project: Last month, the repeal of Don't Ask Don't Tell was celebrated by millions across the country and around the world who believe that sexual orientation ought not to have bearing on whether you can serve and sacrifice for the country you love. We at the Schusterman Family Foundation stood with those who welcomed this shift in direction for our country as it demonstrated that our nation is taking steps toward advancing openness and inclusivity of the LGBT community whose rich diversity strengthens the tapestry of interwoven identities embodying what it means to be an American. Even more, the repeal of DADT offered proof that entrenched institutions can recognize the fallacy of previous decisions, change course and announce loudly and proudly that who you love should not limit what you do with your life. Last summer, Lynn Schusterman called on Jewish organizations to join our Foundation in adopting non-discrimination hiring policies that specifically mention sexual orientation, gender identity and gender expression. She also challenged donors to join us in holding organizations accountable for doing so by making such policies a prerequisite for funding. The call was met with heartfelt gratitude from LGBT individuals around the world, many of whom who were full of hope that the day would soon come when they would no longer have to live in fear of losing their jobs or sacrificing their sense of belonging within the Jewish community because of who they love. Today, we are upping the ante on that call with a concrete next step to help organizations make these changes. Together with The Morningstar Foundation, philanthropist Stuart Kurlander and an anonymous foundation, we are announcing the creation of a Jewish Community Equality Index, to be established and implemented by the Human Rights Campaign, as an expansion of HRC's renowned workplace equality project index. Learn more about HRC's Workplace Equality Project. The index will survey and publicize information about the LGBT inclusivity practices and policies of up to 500 Jewish community organizations around the country. Perhaps most importantly, before that information is made public, each of the organizations surveyed will have the opportunity--and be provided with the help and support--to make their policies, programs, forms, PR materials, welcome packets, educator training and more, consistent with the message that the Jewish community is welcoming and inclusive of all those who seek to lead actively Jewish lives. That educational effort in the near term and the long term will be supported by Keshet's nationally recognized educator training program. Why push this further? Because there are hundreds of thousands of Jewish LGBT individuals who continue to feel marginalized, excluded or invisible within our community. Because we at our foundation are fighting alongside countless others to ensure that all Jews feel they have pride of place in the Jewish community. And because we believe that our community and, in turn, our nation benefits from every source of Jewish vitality and strength, including the creativity and vibrancy of LGBT Jews. A diverse Jewish community is a stronger, more robust Jewish community. We know these changes will be hard to implement as our community grapples with what it means to alter entrenched policies and practices in dramatic and, perhaps for some, uncomfortable ways. But it is possible. We make it possible, by each of us committing to being part of a community that values how we love, not who we love. You can join in this effort by talking about it with your friends, family and colleagues; by asking your synagogues, JCCs, Federations and other organizations about their policies and practices; and most importantly, by ensuring that all LGBT individuals know they are welcome in your home and as part of our community.
{ "pile_set_name": "Pile-CC" }
package com.yanshi.my36kr.activity; import android.os.Bundle; import android.os.Handler; import android.view.animation.*; import android.widget.TextView; import cn.bmob.v3.Bmob; import com.yanshi.my36kr.R; import com.yanshi.my36kr.bean.Constant; import com.yanshi.my36kr.activity.base.BaseActivity; /** * APP启动页 * Created by kingars on 2014/10/28. */ public class SplashActivity extends BaseActivity { private TextView textView; @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_splash); Bmob.initialize(this, Constant.BMOB_APPLICATION_ID); if (savedInstanceState == null) { initView(); Animation am = AnimationUtils.loadAnimation(this, R.anim.scale_fade_in); am.setInterpolator(new BounceInterpolator()); am.setAnimationListener(new Animation.AnimationListener() { @Override public void onAnimationStart(Animation animation) { } @Override public void onAnimationEnd(Animation animation) { mHandler.postDelayed(new Runnable() { @Override public void run() { jumpToActivity(SplashActivity.this, MainActivity.class, null); SplashActivity.this.finish(); } }, 1000L); } @Override public void onAnimationRepeat(Animation animation) { } }); textView.setAnimation(am); am.start(); } } private Handler mHandler = new Handler(); private void initView() { textView = (TextView) this.findViewById(R.id.splash_tv); } @Override protected void onDestroy() { super.onDestroy(); if (null != mHandler) { mHandler.removeCallbacksAndMessages(null); } } }
{ "pile_set_name": "Github" }
BEIRUT -- More than 60 people were killed in a ferocious attack on a market in north Syria on Monday that left rescuers and survivors digging late into the evening to search for residents still buried under the rubble. There were at least three airstrikes on the market at Atareb, a town in the Aleppo countryside swollen by the arrival of refugees from nearby battles, in the latest breach of a "de-escalation" agreement that has proven largely unenforceable. Aleppo, Syria's largest city, is controlled by the government. The attack tore market-goers apart, according to media published by the activist-run Thiqa news agency. Survivors found limbs in the rubble and corpses with heads ripped apart by the force of the blasts. Get Breaking News Delivered to Your Inbox A police station by the market was also struck, killing an officer, according to the Britain-based Syrian Observatory for Human Rights monitoring group. "A number of people died of their wounds, bringing the toll to 61 people, including five children and three policemen," the Observatory said Tuesday morning. Observatory said it could not determine whether the Syrian government or its chief backer, Russia, was behind the airstrikes. Atareb and the countryside around it remain outside the control of the Damascus-based government which says it wants to retake all of Syria following six years of civil war that has killed at least 400,000 people and displaced 11 million others -- half the country's population. The war began after a violent crackdown against demonstrations calling for reforms in 2011. It has drawn in fighters from across the world. A man stands over the bodies of children killed by a reported airstrike on the rebel-held town of Atareb in Syria's northern Aleppo province, Nov. 13, 2017. Getty President Bashar Assad says he is fighting a war on terror. Russia's intervention on the side of Assad in 2015 turned the tide in his favor. Atareb and the opposition-held countryside in northwest Syria are meant to be protected by a "de-escalation agreement" brokered earlier this year by Russia, Iran, and Turkey, the main backers of the Syrian government and the opposition. The U.S. and Russia have lately renewed efforts to find a settlement for post-war Syria. With their common enemy, the Islamic State of Iraq and Syria (ISIS), nearing defeat, the two superpowers find themselves again on opposite sides of the conflict, with Moscow backing Assad and the U.S. offering rhetorical support to armed opposition groups fighting the government. In a joint statement Saturday, the two countries said "de-escalation areas" were an "interim step" toward restoring peace in Syria and that there could be "no military solution" to the war. But on Tuesday Russia made it clear that even on the point of ISIS being a common enemy, Moscow and Washington continue to hold divergent opinions; Russia's Defense Ministry accused the U.S. of directly supporting ISIS in a recent battle for a town on the Iraqi border. "The operation to regain control of Abu Kamal held by the Syrian government troops late last week exposed instances of direct interaction with and support for Islamic State terrorists by the U.S.-led international coalition," the Defense Ministry said, according to Russia's state-run news agency TASS. The Ministry accused U.S. forces of blocking Russian strikes on ISIS militants around the town. The previous joint U.S.-Russian statement, made over the weekend, drew a sarcastic response from Turkish President Recep Tayyip Erdogan, who said the two superpowers could start by withdrawing their own troops from the war and instead support holding elections in Syria. He said there were five Russian and thirteen U.S. bases in Syria, plus a fourteenth under construction in the northern city of Raqqa, now administered by a U.S.-backed Kurdish party that Turkey says is an extension of a separatist group operating within its own borders. Turkey considers the group a terrorist organization. Erdogan ordered Turkey's military into north Syria in 2016 to battle Kurdish militias and ISIS. It maintains a presence along opposition-held areas near the Turkish border. Also Monday, London-based Amnesty International released a report saying that under so-called "reconciliation" agreements, government sieges and intense bombardments of some rebel-held areas in Syria have given no choice for residents but to leave or die. The report said that the Syrian government and, to a lesser extent, armed opposition groups "have unlawfully besieged civilians, depriving them of food, medicine and other basic necessities, and carried out unlawful attacks on densely populated areas." Tens of thousands of people have been displaced over the past years as a result of such sieges including areas near the capital Damascus and the northern city of Aleppo, as well as in the central city of Homs. "While the Syrian government's stated aim has been to vanquish opposition fighters, its cynical use of surrender or starve tactics... have been part of a systematic, as well as widespread, attack on civilians that amounts to crimes against humanity," said Philip Luther, research and advocacy director for the Middle East and North Africa at Amnesty International. Hours before the report was released, Syria's state news agency SANA said an aid convoy had crossed into the besieged Damascus suburb of Douma under the supervision of the Syrian Arab Red Crescent. It said it consisted of 24 trucks and entered the besieged area late Sunday with the cooperation of the United Nations. Separately, Syrian Transport Minister Ali Hamoud says the civil war in Syria has cost least $4.6 billion in damage to transportation networks and infrastructure. Hamoud, in comments to Al-Watan newspaper published Monday, said 1,800 kilometers of the country's 2,450-kilometer railway network have been destroyed. At least 50 bridges have been destroyed including several vital ones leading to the country's coastal provinces, its largest city Aleppo, and across the Euphrates River to Raqqa and Deir el-Zour, once key strongholds of ISIS fighters. Traffic to Syria's Mediterranean ports has also plummeted. The ports are receiving around 1,500 ships annually, down from 4,500 before the war, trading 9 million tons of goods, down from 24 million.
{ "pile_set_name": "OpenWebText2" }
Glucoprivic induction of Fos immunoreactivity in hypothalamic dopaminergic neurons. The hypothalamic neurotransmitter dopamine (DA) regulates pituitary secretion of the glucoregulatory hormones, growth hormone (GH) and adrenocorticotropin (ACTH). The glucose antimetabolite, 2-deoxy-D-glucose (2DG), elicits expression of the proto-oncogene product Fos, which is expressed in hypothalamic structures where DA is synthesized. These studies utilized dual-label immunocytochemistry to determine whether discrete DA neuron populations in this region of the brain exhibit Fos immunoreactivity (-ir) in response to glucopenia. Ovariectomized female rats implanted s.c. with exogenous estradiol or vehicle were injected with 2DG (400 mg/kg, i.p.) or saline, and sacrificed 2 h later. Whereas Fos-ir was negligible after saline administration, 2DG induced expression of Fos-ir by TH-ir neurons in the paraventricular (PVN), periventricular (Pe) and arcuate nuclei (ARC), and in the anterior hypothalamic area (AHA). TH-ir neurons in the zona incerta did not express Fos-ir following 2DG. Although mean numbers of co-labeled neurons in the Pe, PVN and AHA did not differ between estradiol- and non-steroid-treated rats, the former group exhibited significantly higher numbers of TH-positive plus Fos-positive neurons in the ARC in response to 2DG. These results reveal the functional responsiveness of discrete DA neuron populations to glucoprivation, and indicate that estradiol enhances cellular accumulation of Fos-ir by ARC DA neurons during this metabolic challenge.
{ "pile_set_name": "PubMed Abstracts" }
Slideshow ( 16 images ) ISTANBUL (Reuters) - The death toll from the collapse of an eight-storey building in Istanbul rose to 10 on Thursday, while 13 others were injured, the governor’s office for the Turkish city said. The residential building, in the Kartal district on the Asian side of the city, collapsed on Wednesday. It was not immediately clear why the building had collapsed. More bodies were pulled from the rubble on Thursday afternoon raising the death toll to 10, the office of Governor Ali Yerlikaya said in a statement. It said 13 others were injured. There were 43 people registered in 14 apartments at the address, but the top three floors of the building had been built illegally, the governor said on Wednesday. He said there was a textile workshop operating without a license at the entrance. Initial footage from the incident showed people being pulled out of the rubble as crowds surrounded the site. Seven buildings around the collapse site have been evacuated for security reasons.
{ "pile_set_name": "OpenWebText2" }
Head over to Hot Town, Cool City to find what Houstonians are doing for fun. The website lets you share your favorite spots and read the suggestions from your neighbors. You can also check out Hot Town, Cool City the movie. It just might inspire you to try something new.
{ "pile_set_name": "Pile-CC" }
Q: Showing a modal dialog box or form when the application is not running in UserInteractive mode is not a valid operation error in prod server I am getting some errors in production box which we are not getting in our local testing. We are not using any modal dialogue popuups or not any window message popups in entire popups. Is that causing because of any response.redirect? Here is my server eventlog. Can anybody tell me what causing this issue? Log Name: Application Source: ASP.NET 2.0.50727.0 Date: 4/11/2011 8:44:42 AM Event ID: 1309 Task Category: Web Event Level: Warning Keywords: Classic User: N/A Computer: PACDCPCCOMA01.cable.comcast.com Description: Event code: 3005 Event message: An unhandled exception has occurred. Event time: 4/11/2011 8:44:42 AM Event time (UTC): 4/11/2011 12:44:42 PM Event ID: a66a8c24117e49d4979975e947bfe021 Event sequence: 49560 Event occurrence: 8 Event detail code: 0 Application information: Application domain: /LM/W3SVC/1/ROOT-1-129469890006189836 Trust level: Full Application Virtual Path: / Application Path: C:\inetpub\wwwroot\OM\ Machine name: PACDCPCCOMA01 Process information: Process ID: 4752 Process name: w3wp.exe Account name: IIS APPPOOL\Classic .NET AppPool Exception information: Exception type: InvalidOperationException Exception message: Showing a modal dialog box or form when the application is not running in UserInteractive mode is not a valid operation. Specify the ServiceNotification or DefaultDesktopOnly style to display a notification from a service application. Request information: Request URL: http://ccom/Default.aspx Request path: /Default.aspx User host address: 10.164.74.56 User: CABLE\awitko200 Is authenticated: True Authentication Type: Negotiate Thread account name: IIS APPPOOL\Classic .NET AppPool Thread information: Thread ID: 18 Thread account name: IIS APPPOOL\Classic .NET AppPool Is impersonating: False Stack trace: at System.Windows.Forms.Form.ShowDialog(IWin32Window owner) at System.Windows.Forms.Form.ShowDialog() at Syncfusion.Core.Licensing.FusionLicenseProvider.GetLicense(LicenseContext context, Type type, Object instance, Boolean allowExceptions) at System.ComponentModel.LicenseManager.ValidateInternalRecursive(LicenseContext context, Type type, Object instance, Boolean allowExceptions, License& license, String& licenseKey) at System.ComponentModel.LicenseManager.ValidateInternal(Type type, Object instance, Boolean allowExceptions, License& license) at System.ComponentModel.LicenseManager.Validate(Type type, Object instance) at Syncfusion.Core.Licensing.LicensedWebComponent..ctor(Type type) at Syncfusion.Web.UI.WebControls.Tools.Common.CoreUtilities.ValidateLicense(Type typeToValidate) at Syncfusion.Web.UI.WebControls.Tools.AutoCompleteTextBox..ctor() at ASP.default_aspx.__BuildControltxtDivSales() in c:\inetpub\wwwroot\OM\Default.aspx:line 1226 at ASP.default_aspx.__BuildControl__control6(Control __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 1208 at System.Web.UI.CompiledTemplateBuilder.InstantiateIn(Control container) at System.Web.UI.UpdatePanel.CreateContents() at System.Web.UI.UpdatePanel.set_ContentTemplate(ITemplate value) at ASP.default_aspx.__BuildControlupSales() in c:\inetpub\wwwroot\OM\Default.aspx:line 1208 at ASP.default_aspx.__BuildControl__control5(Control __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 1203 at System.Web.UI.CompiledTemplateBuilder.InstantiateIn(Control container) at Telerik.Web.UI.SingleTemplateContainer.InstantiateTemplate() at Telerik.Web.UI.SingleTemplateContainer.set_Template(ITemplate value) at Telerik.Web.UI.RadWindow.set_ContentTemplate(ITemplate value) at ASP.default_aspx.__BuildControlwinSearchSurveys() in c:\inetpub\wwwroot\OM\Default.aspx:line 1203 at ASP.default_aspx.__BuildControl__control4(WindowCollection __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 1201 at ASP.default_aspx.__BuildControlRadWinMgr() in c:\inetpub\wwwroot\OM\Default.aspx:line 1201 at ASP.default_aspx.__BuildControlContent2(Control __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 658 at System.Web.UI.CompiledTemplateBuilder.InstantiateIn(Control container) at ASP.masterpage_master.__BuildControlPagePlaceholder() in c:\inetpub\wwwroot\OM\MasterPage.master:line 296 at ASP.masterpage_master.__BuildControlfrm() in c:\inetpub\wwwroot\OM\MasterPage.master:line 65 at ASP.masterpage_master.__BuildControlTree(masterpage_master __ctrl) in c:\inetpub\wwwroot\OM\MasterPage.master:line 1 at ASP.masterpage_master.FrameworkInitialize() in c:\Windows\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files\root\b6b42b42\a011ed90\App_Web_r97r-sw3.4.cs:line 0 at System.Web.UI.UserControl.InitializeAsUserControlInternal() at System.Web.UI.MasterPage.CreateMaster(TemplateControl owner, HttpContext context, VirtualPath masterPageFile, IDictionary contentTemplateCollection) at System.Web.UI.Page.get_Master() at System.Web.UI.Page.ApplyMasterPage() at System.Web.UI.Page.PerformPreInit() at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) Custom event details: Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="ASP.NET 2.0.50727.0" /> <EventID Qualifiers="32768">1309</EventID> <Level>3</Level> <Task>3</Task> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2011-04-11T12:44:42.000000000Z" /> <EventRecordID>15385</EventRecordID> <Channel>Application</Channel> <Computer>PACDCPCCOMA01.cable.comcast.com</Computer> <Security /> </System> <EventData> <Data>3005</Data> <Data>An unhandled exception has occurred.</Data> <Data>4/11/2011 8:44:42 AM</Data> <Data>4/11/2011 12:44:42 PM</Data> <Data>a66a8c24117e49d4979975e947bfe021</Data> <Data>49560</Data> <Data>8</Data> <Data>0</Data> <Data>/LM/W3SVC/1/ROOT-1-129469890006189836</Data> <Data>Full</Data> <Data>/</Data> <Data>C:\inetpub\wwwroot\OM\</Data> <Data>PACDCPCCOMA01</Data> <Data> </Data> <Data>4752</Data> <Data>w3wp.exe</Data> <Data>IIS APPPOOL\Classic .NET AppPool</Data> <Data>InvalidOperationException</Data> <Data>Showing a modal dialog box or form when the application is not running in UserInteractive mode is not a valid operation. Specify the ServiceNotification or DefaultDesktopOnly style to display a notification from a service application.</Data> <Data>http://ccom/Default.aspx</Data> <Data>/Default.aspx</Data> <Data>10.164.74.56</Data> <Data>CABLE\awitko200</Data> <Data>True</Data> <Data>Negotiate</Data> <Data>IIS APPPOOL\Classic .NET AppPool</Data> <Data>18</Data> <Data>IIS APPPOOL\Classic .NET AppPool</Data> <Data>False</Data> <Data> at System.Windows.Forms.Form.ShowDialog(IWin32Window owner) at System.Windows.Forms.Form.ShowDialog() at Syncfusion.Core.Licensing.FusionLicenseProvider.GetLicense(LicenseContext context, Type type, Object instance, Boolean allowExceptions) at System.ComponentModel.LicenseManager.ValidateInternalRecursive(LicenseContext context, Type type, Object instance, Boolean allowExceptions, License&amp; license, String&amp; licenseKey) at System.ComponentModel.LicenseManager.ValidateInternal(Type type, Object instance, Boolean allowExceptions, License&amp; license) at System.ComponentModel.LicenseManager.Validate(Type type, Object instance) at Syncfusion.Core.Licensing.LicensedWebComponent..ctor(Type type) at Syncfusion.Web.UI.WebControls.Tools.Common.CoreUtilities.ValidateLicense(Type typeToValidate) at Syncfusion.Web.UI.WebControls.Tools.AutoCompleteTextBox..ctor() at ASP.default_aspx.__BuildControltxtDivSales() in c:\inetpub\wwwroot\OM\Default.aspx:line 1226 at ASP.default_aspx.__BuildControl__control6(Control __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 1208 at System.Web.UI.CompiledTemplateBuilder.InstantiateIn(Control container) at System.Web.UI.UpdatePanel.CreateContents() at System.Web.UI.UpdatePanel.set_ContentTemplate(ITemplate value) at ASP.default_aspx.__BuildControlupSales() in c:\inetpub\wwwroot\OM\Default.aspx:line 1208 at ASP.default_aspx.__BuildControl__control5(Control __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 1203 at System.Web.UI.CompiledTemplateBuilder.InstantiateIn(Control container) at Telerik.Web.UI.SingleTemplateContainer.InstantiateTemplate() at Telerik.Web.UI.SingleTemplateContainer.set_Template(ITemplate value) at Telerik.Web.UI.RadWindow.set_ContentTemplate(ITemplate value) at ASP.default_aspx.__BuildControlwinSearchSurveys() in c:\inetpub\wwwroot\OM\Default.aspx:line 1203 at ASP.default_aspx.__BuildControl__control4(WindowCollection __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 1201 at ASP.default_aspx.__BuildControlRadWinMgr() in c:\inetpub\wwwroot\OM\Default.aspx:line 1201 at ASP.default_aspx.__BuildControlContent2(Control __ctrl) in c:\inetpub\wwwroot\OM\Default.aspx:line 658 at System.Web.UI.CompiledTemplateBuilder.InstantiateIn(Control container) at ASP.masterpage_master.__BuildControlPagePlaceholder() in c:\inetpub\wwwroot\OM\MasterPage.master:line 296 at ASP.masterpage_master.__BuildControlfrm() in c:\inetpub\wwwroot\OM\MasterPage.master:line 65 at ASP.masterpage_master.__BuildControlTree(masterpage_master __ctrl) in c:\inetpub\wwwroot\OM\MasterPage.master:line 1 at ASP.masterpage_master.FrameworkInitialize() in c:\Windows\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files\root\b6b42b42\a011ed90\App_Web_r97r-sw3.4.cs:line 0 at System.Web.UI.UserControl.InitializeAsUserControlInternal() at System.Web.UI.MasterPage.CreateMaster(TemplateControl owner, HttpContext context, VirtualPath masterPageFile, IDictionary contentTemplateCollection) at System.Web.UI.Page.get_Master() at System.Web.UI.Page.ApplyMasterPage() at System.Web.UI.Page.PerformPreInit() at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) </Data> </EventData> </Event> A: Your Syncfusion controls can't find a valid license on your server, and are attempting to show a dialog informing you as such. The error appears to be originating from Syncfusion.Web.UI.WebControls.Tools.AutoCompleteTextbox. You might find this SyncFusion document helpful. The relevant part of your stack trace is: at System.Windows.Forms.Form.ShowDialog(IWin32Window owner) at System.Windows.Forms.Form.ShowDialog() at Syncfusion.Core.Licensing.FusionLicenseProvider.GetLicense(LicenseContext context, Type type, Object instance, Boolean allowExceptions) at System.ComponentModel.LicenseManager.ValidateInternalRecursive(LicenseContext context, Type type, Object instance, Boolean allowExceptions, License& license, String& licenseKey) .... at System.ComponentModel.LicenseManager.ValidateInternal(Type type, Object instance, Boolean allowExceptions, License& license) at System.ComponentModel.LicenseManager.Validate(Type type, Object instance) at Syncfusion.Core.Licensing.LicensedWebComponent..ctor(Type type) at Syncfusion.Web.UI.WebControls.Tools.Common.CoreUtilities.ValidateLicense(Type typeToValidate) at Syncfusion.Web.UI.WebControls.Tools.AutoCompleteTextBox..ctor() at ...
{ "pile_set_name": "StackExchange" }
Synthesis of Hindered α-Amino Carbonyls: Copper-Catalyzed Radical Addition with Nitroso Compounds. The synthesis of sterically hindered anilines has been a significant challenge in organic chemistry. Here we report a Cu-catalyzed radical addition with in situ-generated nitroso compounds to prepare sterically hindered amines directly from readily available materials. The transformation is conducted at room temperature, uses abundant copper salts, and is tolerant of a range of functional groups.
{ "pile_set_name": "PubMed Abstracts" }
Q: Requirements for a game I'm writing an iPhone game and I am trying to write some requirements documents. I have never written requirements before so I got the book Software Requirements. I have not finished it yet, but I forsee some issues, as this book is targeted towards a business. My main question is I am the only person involved with this game and I feel the main purpose of the requirements document should be to nail out as many conceptual ideas of how the game works as I can before I am deep into design or construction. Does anyone have suggestions on how I should lay this out, should I still try to mimic the template provided in the book where it makes sense, or since I am both the sole developer and product owner, should I just stick to game concepts? A: You're right that traditional SRS documents don't really fit games documentation all that well. Games instead have a general Game Design Document. It's usually created before any work on the game begins, and it's often edited as the development process goes to keep straight the intended end-result and specifics of the game. While business software requirements documents are like contracts between a client and developer on what to produce, game design docs are more often specifications from the designer to the artists and programmers on what exactly they need to develop. There is no specific layout to use. But you should consider who you're writing the document for. Is it for a class, for yourself, for peers after the project is done? The level of detail and the kind of things you include will be different depending on your audience. The format itself is very flexible, as long as it's coherent. Brenda Brathwaite has a good blog entry on this subject which you might find helpful. There is a semi-recent article from gamedev.net on the subject as well.
{ "pile_set_name": "StackExchange" }
Products LG-329 laser sights for Sig Sauer P228/P229 semi-automatics feature a comfortable and ergonomic overmold construction around a sturdy grip frame. Lasergrips® provide excellent control and accuracy for this proven law enforcement and civilian handgun. Featuring dual side activation, the Crimson…
{ "pile_set_name": "Pile-CC" }
A/N: I hope everyone is safe after Superstorm Sandy. Second and final installment as promised. Enjoy and please review when you have a moment. Meanwhile, back at my other stories... o-xxx-o It was a very disappointed and rather despondent Sue Thomas, who let herself back into her old apartment when she returned from her meeting with Dimitrius Gans. Lucy ran out to greet her. "So, when do you start?" "I don't," Sue sighed miserably dropping onto the sofa she'd been using as a bed and stroking Levi's head as it rested on her leg. "What do you mean, you don't?" "What I said. When I first asked, D told me that while he knew I could do the work, my sudden decision to leave had upset every member of the team and he felt he needed talk to them individually first to see how they felt before he could give me a final decision." "That's right, he asked me and I said I'd love it if you came back and I thought everyone else would, too." "Thank you, but apparently they didn't all feel that way so in the end he had to turn down my request." "What?" Lucy's voice had climbed a few octaves. "He was very nice about it, said he would have had me back in a flash if it wasn't for…" She nibbled on her bottom lip to stop herself from crying. "Who would..? Myles, it has to be. You just wait until I get through with him." She reached over the arm of the chair to pick up the phone. "Luce no, we can't be sure it was him and I don't want to cause any more trouble. I'll get a flight back to New York on Monday." "But you hate it there." "What other choice do I have?" Her friend thought it through for a moment. "Go and see Jack, talk to him. He's the Team Leader, if anyone can fix it, he can." "I can't do that." "Why not..? Remember you said you wanted to thank him in person for what he did that awful night and I'm sure you could casually drop it into the conversation." Sue looked at her doubtfully. "Go on, what have you got to lose?" o-xxx-o "Hi." Jack greeted her warily although he didn't seem that surprised to see her standing outside. "Come in," he stepped to one side to let his visitors past before closing the door again. "Sit, please." "Thank you." Sue made herself comfortable on his couch with Levi at her feet. "Hey, Knucklehead…" The dog barked and wagged his tail happily as Jack gave him a scratch and he received a canine kiss in return. "It's good to see you too, pal." He was dressed in a torso-hugging black t-shirt and tight jeans and was looking at her with those beautiful chocolate-coloured eyes, which still had the power to turn her insides to mush and it had taken all of her willpower not to hug him 'hello' when he'd opened the door. "Coffee..?" "Please." It came out as a croak so she quickly cleared her throat and tried again. "I'd love one." An awkward silence fell on the room when he returned and they both tried to break it at the same time. "Jack…" "Sue…" "Sorry, after you." "No, you first..." "I was going to ask if you were okay after what happened but I can see you are… stupid question." The friendly rapport they'd always shared seemed to have deserted them. "We're fine now. You must have been tired the next morning." He shrugged, "Crash gave me a hard time, wanted to know what I'd been up to." "What did you tell him?" "That I'd spent the entire night talking to a beautiful woman." "I wanted to come over and thank you properly. I was really scared until..." "I know I could hear it in your voice. Had you been calling long?" "A few minutes, that's all." He sighed in relief. "Thank the Lord, I was really worried that you'd been alone in the dark for hours, I know how difficult it is for you," Levi whuffed softly. "Sorry boy, I know you were there too." "Did I wake you?" "No, I was on a stake-out with another Unit, I'm just glad I came home when I did." "Me, too…" The conversation fizzled again and she took a few sips of her drink, wondering how to broach the other subject she'd come to talk to him about. "So, what can I do for you?" "Can't a girl just stop by for a visit?" "Of course, but the way you keep worrying your lip and stroking Levi tells me there's more to it than that." "Still read me like a book, huh?" Jack just shrugged. Placing her mug back in the coaster she took a steadying breath. "You know I asked D about transferring back to D.C.?" "Yes." "Well, there's a problem." "I know that too." "You couldn't speak to Myles for me, could you, find out what's wrong? I thought we'd put all that other stuff behind us a long time ago." "Sue," he paused for a second, screwing up his eyes and pinching the bridge of his nose. "It isn't Myles." "But it has to be. Bobby and Tara…" "It isn't Myles, or Bobby, or Tara, or D," Jack interrupted her. "I'm the one who has the doubts." She definitely hadn't seen that one coming. "You, why..?" Her voice held a hurt edge. "We always made such a great team and you said you didn't want me to leave." "But you did." "And you think I might do it again, is that it?" "Maybe… I don't know." "What if I told you accepting that job was one of the worst mistakes of my life and it didn't take me long to realise I didn't belong there." Getting to his feet, he walked to the window and stared out into the street with unseeing eyes and when he turned his expression was sad. "Sue, I can't say yes, I want to but I can't… I don't think I can go back to the way things were before, it's just too hard, especially after…" She tried to reassure him, "I know it'll take time to earn your trust again but I promise I'll do whatever it takes." Jack carried on as though he hadn't heard her. "You have no idea how many times I wished I'd left you in 'Fingerprinting'…" "But I thought," her eyes started to tear up and her voice faltered. "You, you always said I was an asset to the team and you were glad I was there." "I was, am… was." "Then it's me personally?" "Sue, it's not…" he paused again. "Can I ask you a question?" "Okay." "Why did you call me that night?" "You know why." "That's not what I meant. There must have been others… Lucy or Bobby… Tara, Jim or David… So, why me..?" Not being able to hear the way he was saying the words she took his question to mean that he'd rather she hadn't, so she said the first thing that came into her head. "It was dark, I was scared and yours was the first speed dial number my fingers found." Wrong answer, she could see it on his face and in his eyes. "Okay." Defeated, he picked up the empty mugs to return them to the kitchen. "Jack, wait…" He stopped but didn't turn until she spoke again. "I'm sorry, I shouldn't have said that." "Why?" "Because, it isn't true…" Returning the mugs to the table, he sat down again. "Then, why? Sue, please, I need to know." She nibbled on her lip anxiously, annoyed with herself for letting Lucy talk her into this situation and she knew she had to be completely honest or run the risk of losing a friend. No, that was wrong… Jack wasn't just a friend, it went far deeper… she'd felt it the first moment she saw him again. "You're right. I could have called any of them but I didn't, you were the only one. Maybe I shouldn't have but I needed to see your voice. Jack, you've always been there, whether it was to rescue me from serial killers, slave-trading, false prophets or just my Mom," she gave him a quirky smile. "And I knew if I could just talk to you, I'd be okay. Of course, I had no idea then about the looters who were outside on the street breaking into the local stores and some of the apartments in my building." "What?" Jack stared at her in horror. "They didn't..?" "No not mine. Luckily I had the vicious beast looking out for me. The neighbours think it was his barking that kept them off our floor, they even gave him a reward." "New York City can be a dangerous place." "So can anywhere, even D.C." "But at least while you were here, I knew you weren't alone." "And that's why you asked Jim to look out for me. Jack, I'm sorry about that other call, I shouldn't have said all those things." "And I shouldn't have interfered I was just worried about you but if I'd known the jerk was going to hit on you, I would have asked someone else." "He didn't hit on me he just took me out to dinner a few times and showed me around." "Same difference..." "So, if you don't like me being in New York, why did you say 'no' to my coming back here?" "I didn't say 'no' to that exactly," he sighed rubbing his face with his hands in an effort to clear his brain. "When I first met you the day you stormed into the bullpen, there was just something about you… Then finding out you were deaf but still determined to carve yourself out a place in the F.B.I., I wanted to help, give you the opportunity to prove yourself." "And you did. You taught me so much, first as my Training Agent and then as my partner." "I learned a lot from you as well, mainly about myself; the person I was and the one I wanted to be and almost without my noticing it, you became part of my life and I found that I looked forward to spending time with you. It didn't matter what we were doing or where we were as long as… and then you were gone." "You said you wished you'd left me in 'fingerprinting'," she reminded him gently. "That's because I wanted so much to… I mean if I had then maybe we could have… I mean…" He groaned in frustration, not wanting to say the words out loud for fear she'd laugh in his face. "You know what I mean." "Not a clue, S-P-A-R-K-Y. Do you mind if I call you Sparky?" Her grin and the twinkle in her eyes told him she was teasing him and for the first time since she'd arrived he actually laughed, shaking his head and waggling a finger in admonishment. "Very funny Thomas..." "You remember?" "I remember." "Now, what was it you were trying to say?" "Lord, I have missed you and if the only way to have you back in my life is to carry on as we were, then that will have to be enough. I'll call D and tell him I've changed my mind." "You're sure?" "Yeah," he smiled a little sadly. "Could you ask him if he has any contacts in counter-terrorism?" "Why?" "I thought my past year's work experience might be of some use here in D.C." "But then you won't be…" She could practically see the cogs turning in his head. "And we could… If you wanted to that is." "I may regret this one day but I'd like to, very much." "You would?" She nodded, "uh-huh." "There could be another problem." "What?" "I'm not sure I can wait three whole dates before I kiss you." "Well, if we count all the times we've had dinner or been to Montrose with Amanda…" Before she could finish he was sitting at her side. "Then, I'm way overdue…" Raising a hand, he gently caressed the side of her face, tucking a stray strand of hair behind her ear and then his mouth met hers, the touch both warm and tender. "Wow…" "I can do better." This time he took her into his arms, pulling her close, and the second kiss was filled with love and lingered until they reluctantly parted to draw breath. "I think I'd better make that call." Taking her hand, he pressed the back of it to his lips and went to fetch his cell. o-xxx-o "Well, what did you find out?" Lucy muted the sound of the movie she'd been watching for the past hour, still clueless as to what it was about. "I'm guessing by the look on your face it didn't go well." Sue sighed but didn't reply. "Is he going to talk to Myles?" "Myles wasn't the one who objected." "Oh," Lucy looked a little uncomfortable. "I guess that explains it." "Explains what?" "I couldn't just sit here and wait, so I called him." "You didn't." "You know, he actually had the nerve to deny it." "That's because it wasn't him." "I know that now," her face took on a pained expression. "Oh boy, I guess this means I'm going to have to apologise on Monday," she groaned. "And, I'll probably be making it up to him for the rest of my life. So, who was it?" "Jack." "What?" Her friend stared at her in disbelief. "You're kidding, right?" Sue's expression turned even bleaker. "No." "But he knows what happened to you in New York. Don't tell me he still hasn't forgiven you for that other phone call?" Sue shrugged but remained silent. "Then I guess you'll be flying back on Monday, after all." "No, I have an appointment with the Head of Counter-Terrorism after lunch." "You're staying?" "If, the interview goes my way..." "Whoa, back up. So what you're telling me is Jackson Samuel Hudson has no problem with you working in the same building, just not in the same office?" "That's about it." "Well, that's very generous of him." She snorted sarcastically. "I hope he had a good reason." Reflexively, Sue licked her lips. "He did, several as a matter-of-fact. I didn't get everything he was saying but it had something to do with the F.B.I. rules on fraternization." "But they only apply to… You mean… You… He… You're..." Sue couldn't keep up the pretence any longer and her face broke out into a huge grin. "Yes! I want all the details… What did he say? What did you say? Did he kiss you? What was it like?" "Sorry Luce," Sue apologised less than sincerely as she checked her watch. "I have to shower and change, he's picking me up in about half-an-hour." "Your first real date," her eyes took on a dreamy look. "It's only dinner..." "Dinner today, tomorrow, who knows?" Thirty minutes later the doorbell rang and Lucy rushed to answer it. "Jackson." "Lucy." The rotor simply stood and stared at him with a satisfied smirk on her face. "Is she ready?" "I'll go and see." As she left, Levi came rushing over and when he looked up she was standing in front of him. "Oh, hi..." "Hi, yourself… I hope this is okay, I'm afraid I didn't bring much with me." She was wearing a pale blue v-neck sweater and a black skirt. "It's fine. Are you ready?" "Just about," she slipped on her jacket and picked up her purse from the table. "Luce, I might be late so don't wait up." Jack opened the door and they walked out into the hallway hand-in-hand. "She will…" He grinned. "I know." "So, where would you like to go?" "How about the restaurant we went to with Randy and Hannah? That was a nice place." "As long as you don't ask him to join us..." "Party-pooper, I was hoping he'd entertain us with stories of his undercover work." "Let's save that for another time, okay? Tonight I want you all to myself." "…Could turn out to be a dull evening." "Somehow, I seriously doubt that but I'm willing to take my chances." o-xxx-o ~ The End ~ o-xxx-o The author would like to thank you for your continued support. Your review has been posted.
{ "pile_set_name": "Pile-CC" }
Q: Showing object names in a listbox? I'm trying to show my object names in a listbox, but couldn't make it in a good way. I might probably declare all the names manually but I want to make it by showing my object names as datasource. Couldn't find out how to do it. I wonder if I should make a list or if there is any easy way to show my object names in a list. Probably a foreach loop would fix it easily but I can't find out how to just choose names and add it in the listbox. My code looks like this: class Platform { public string name, action, adventure, rpg, simulation, strategy, casual, audianceY, audianceE, audianceM; public Platform(string nameIn, string actionIn, string adventureIn, string rpgIn, string simulationIn, string strategyIn, string casualIn, string audianceYIn, string audianceEIn, string audianceMIn) { name = nameIn; action = actionIn; adventure = adventureIn; rpg = rpgIn; simulation = simulationIn; strategy = strategyIn; casual = casualIn; audianceY = audianceYIn; audianceM = audianceMIn; audianceE = audianceEIn; } public override string ToString() { return name; } } public partial class Main : Form { public Main() { InitializeComponent(); } private void Main_Load_1(object sender, EventArgs e) { //--------------------------------- // Platform List //--------------------------------- Platform PC = new Platform("PC", "++", "+++", "++", "+++", "+++", "---", "+", "++", "+++"); Platform G64 = new Platform("G64", "++", "+++", "++", "++", "+++", "--", "+", "++", "+++"); Platform TES = new Platform("TES", "+", "--", "+", "+", "--", "+++", "+++", "++", "---"); } foreach (???) { listBox1.Items.Add(???) } } A: Your code won't compile as-is, so I'll just assume you meant to include the foreach loop inside the Main_Load event. It'd be far easier if you added all the new Platform instances to a list, rather than individual variables. You could then set the list as the DataSource, and specify what the display/value members should be. private void Main_Load(Object sender, EventArgs e) { var platforms = new List<Platform> { new Platform("PC", "++", "+++", "++", "+++", "+++", "---", "+", "++", "+++"), new Platform("G64", "++", "+++", "++", "++", "+++", "--", "+", "++", "+++"), new Platform("TES", "+", "--", "+", "+", "--", "+++", "+++", "++", "---") }; listBox1.DataSource = platforms; listBox1.DisplayMember = "name"; listBox1.ValueMember = "name"; } To bind to "name", you'll need to change it to a property: (or you'll get an ArgumentException) public string name { get; set; } A couple thoughts: If you want to reuse those Platforms, you'll have to declare them outside of the method. It's more typical to create public properties with getters/setters than public fields like you're currently doing, and to capitalize them too, like this: public string Name { get; set; }
{ "pile_set_name": "StackExchange" }
915 P.2d 1166 (1996) 81 Wash.App. 664 Theresa R. CULP, a single woman, Appellant, v. ALLSTATE INSURANCE COMPANY, an Ohio Corporation, Respondent. No. 14593-0-III. Court of Appeals of Washington, Division 3, Panel Four. May 14, 1996. *1167 Thomas M. Roberts, Spokane, for appellant. Judith A. Corbin and Brad E. Smith, Huppin, Ewing, Anderson & Paul, Spokane, for respondent. THOMPSON, Judge. Theresa R. Culp appeals the superior court's summary judgment order, which held Allstate Insurance Company's policy on her parents' vehicle did not cover her injuries from an accidental shooting. We affirm. On September 25, 1990, Theresa R. Culp was a passenger in a Toyota pickup truck driven by Craig Jurs. Ms. Culp was sitting in the passenger seat; two friends, Charity Sperry and Kraig Brumbaugh, were seated on pillows in the bed of the truck. The four teenagers had just returned to Spokane from the Tri-Cities and were going to Mr. Jurs' parents' home on 18th Street. Ms. Sperry was seated in the left side of the pickup bed behind the driver; Mr. Brumbaugh was seated on the passenger side. As the pickup approached the Jurs residence, Mr. Brumbaugh picked up a pillow and threw it out of the truck. He did this to tease Mr. Jurs, because the pillow belonged to Mr. Jurs' mother. Mr. Jurs stopped the pickup in his parents' driveway and told Mr. Brumbaugh to get out of the truck and pick up the pillow. When the truck stopped, Ms. Culp got out and walked to the area of the right rear wheel and stood next to Mr. Brumbaugh. Mr. Brumbaugh continued to tease Mr. Jurs and refused to pick up the pillow. Mr. Jurs got out of the driver's side, arming himself with a shotgun that he regularly carried behind the driver's seat. He stepped to the passenger side, raised the gun to shoulder level and pointed it at Mr. Brumbaugh in a teasing manner, still demanding that he get out of the truck and pick up the pillow. Mr. Brumbaugh responded playfully and said something to the effect of "a gun, cool, huh." The gun then discharged. Mr. Brumbaugh was killed, and numerous shotgun pellets struck Ms. Culp's head, face, neck and shoulder.[1] According to Ms. Sperry, Mr. Jurs was holding the shotgun in a steady position, aimed at Mr. Brumbaugh, when it discharged. There was no reason to believe the gun discharged while being unloaded from the pickup, or that it discharged due to coming in contact with the pickup. Ms. Culp made a claim for underinsured motorist (UIM) benefits under her parents' policy with Allstate, pursuant to the following coverage provision: We will pay damages for bodily injury or property damage which an insured person is legally entitled to recover from the owner or operator of an underinsured motor vehicle. Injury must be caused by accident and arise out of the ownership, maintenance *1168 or use of an underinsured motor vehicle. Allstate denied coverage. Ms. Culp filed this action for payment of insurance benefits. The superior court granted Allstate's motion for summary judgment, and Ms. Culp appeals. On review of a summary judgment order, this court engages in the same inquiry as the trial court. Our Lady of Lourdes Hosp. v. Franklin County, 120 Wash.2d 439, 451, 842 P.2d 956 (1993). Summary judgment is proper only when the pleadings, affidavits, depositions, and admissions on file, viewed in a light most favorable to the nonmoving party, demonstrate no issue of material fact exists and the moving party is entitled to judgment as a matter of law. CR 56(c); Wilson v. Steinbach, 98 Wash.2d 434, 437, 656 P.2d 1030 (1982). We must resolve all reasonable inferences from the evidence against the moving party; summary judgment will be granted if reasonable people could reach only one conclusion. Detweiler v. J.C. Penney Casualty Ins. Co., 110 Wash.2d 99, 108, 751 P.2d 282 (1988). Interpretation of insurance contracts is a question of law, which the court reviews de novo. Public Util. Dist. No. 1 v. International Ins. Co., 124 Wash.2d 789, 797, 881 P.2d 1020 (1994); Mutual of Enumclaw Ins. Co. v. Jerome, 122 Wash.2d 157, 160, 856 P.2d 1095 (1993). Insurance policies are "given a fair, reasonable, and sensible construction as would be given to the contract by the average person purchasing insurance." Sears v. Grange Ins. Ass'n, 111 Wash.2d 636, 638, 762 P.2d 1141 (1988). Ambiguities are resolved in favor of the insured. Jerome, 122 Wash.2d at 161, 856 P.2d 1095. The sole issue in this appeal is whether Allstate is required under its policy to provide UIM coverage for Ms. Culp's injuries. Allstate concedes Ms. Culp is an "insured person" as defined in its policy. The question, then, is whether Ms. Culp's injury "ar[o]se out of the ownership, maintenance or use of an underinsured motor vehicle," as required by Allstate's policy. Washington courts have not found the phrase "arising out of" to be ambiguous: In Washington, an accident "arises out of" the use of a vehicle if "the vehicle itself or permanent attachments to the vehicle causally contributed in some way to produce the injury." Transamerica Ins. Group v. United Pac. Ins. Co., 92 Wash.2d 21, 26, 593 P.2d 156 (1979). See McDonald Indus., Inc. v. Rollins Leasing Corp., 95 Wash.2d 909, 631 P.2d 947 (1981). See also Fiscus Motor Freight, Inc. v. Universal Sec. Ins. Co., 53 Wash.App. 777, 770 P.2d 679, review denied, 113 Wash.2d 1003, 777 P.2d 1052 (1989). See generally 7 Am.Jur.2d Automobile Insurance § 194, at 703 (1980 & Supp.1993). Jerome, 122 Wash.2d at 162, 856 P.2d 1095. It is not necessary that the use be the proximate cause of the accident, Transamerica Ins. Group v. United Pac. Ins. Co., 92 Wash.2d 21, 26, 593 P.2d 156 (1979), but the fact that the vehicle is the "mere situs" of the accident is not enough to establish the required causal connection, Jerome, 122 Wash.2d at 163, 856 P.2d 1095.[2] Several Washington cases have addressed the phrase "arising out of" in the context of firearms accidents. In State Farm Mut. Auto. Ins. Co. v. Centennial Ins. Co., 14 Wash.App. 541, 543 P.2d 645 (1975), review denied, 87 Wash.2d 1003 (1976), a gun accidentally discharged as a passenger was attempting to unload it. The Supreme Court later characterized the denial of coverage in Centennial: There is nothing to show that the movement of the vehicle had any causal connection with the gun's discharge; that the gun touched any part of the vehicle; or that *1169 any factor contributed to the discharge other than the passenger's abortive attempt to empty the weapon. Transamerica, 92 Wash.2d at 26-27, 593 P.2d 156. In Transamerica, by contrast, the trigger of a loaded rifle brushed against the gun rack of the vehicle, discharging the weapon and injuring the driver. The court held the accident arose out of the vehicle's use. Transamerica, 92 Wash.2d at 27-28, 593 P.2d 156. In Detweiler, 110 Wash.2d 99, 751 P.2d 282, the claimant fired a pistol at the vehicle; the bullets fragmented when they struck the vehicle, and struck the claimant. The court held the accident arose out of the vehicle's use, because the vehicle "causally contributed to the claimant's injuries when the bullets struck the pickup, ... then fragmented and injured him." Detweiler, 110 Wash.2d at 109, 751 P.2d 282. Ms. Culp argues first that she, Mr. Jurs, and Mr. Brumbaugh were using the vehicle at the time of the accident. She urges the court to apply the so-called Rau factors, adopted in Rau v. Liberty Mut. Ins. Co., 21 Wash.App. 326, 334, 585 P.2d 157 (1978) and applied in Roller v. Stonewall Ins. Co., 115 Wash.2d 679, 687, 801 P.2d 207 (1990). See Cherry v. Truck Ins. Exch, 77 Wash.App. 557, 892 P.2d 768, review denied, 127 Wash.2d 1012, 902 P.2d 164 (1995). However, the question whether a person is "using" a vehicle is different from the question whether the accident "arose out of" the use. See Heringlake v. State Farm Fire & Casualty Co., 74 Wash.App. 179, 189, 872 P.2d 539, review denied, 125 Wash.2d 1003, 886 P.2d 1134, 1135 (1994). Regardless of whose "use" is involved, there must be a causal connection between the use and the injury. This case is closely analogous to Centennial, and is distinguishable from Transamerica and Detweiler. Unlike the accident in Transamerica, there is no evidence the discharge of Mr. Jurs' shotgun was due to contact with any portion of the vehicle or was causally connected to the use of the vehicle. Unlike the injury in Detweiler, none of the pellets ricocheted off the vehicle. There is no evidence either Mr. Brumbaugh's presence in the bed of the pickup or Ms. Culp's proximity to the vehicle causally contributed in any way to Mr. Jurs' discharge of the shotgun. Under the circumstances, as in Centennial, the vehicle was the mere situs of the accident. Ms. Culp relies heavily on Fiscus Motor Freight, Inc. v. Universal Sec. Ins. Co., 53 Wash.App. 777, 770 P.2d 679, review denied, 113 Wash.2d 1003, 777 P.2d 1052 (1989). In that case, the policy covered occurrences "arising out of the ownership, maintenance or use, including loading and unloading." The accident was covered because it occurred during the normal process of unloading a fertilizer truck. The unloading was a cause of the accident and contributed to produce the injury. Thus, the vehicle was not merely the situs of the injury. Id. at 783-84, 770 P.2d 679. Fiscus does not apply here, because Allstate's policy language did not include the phrase "loading and unloading." Moreover, there is no evidence loading or unloading of the vehicle in any way caused the accident. Finally, Ms. Culp argues her injuries arose out of Mr. Jurs' ownership of the vehicle. She reasons Mr. Jurs was asserting his ownership of the truck by demanding that Mr. Brumbaugh get out and pick up the pillow. Even if this manner of "asserting ownership" were within the policy language, there is no factual support in the record for Ms. Culp's argument. The record indicates Mr. Jurs was not asserting his ownership in the pickup, but rather was demanding that Mr. Brumbaugh pick up a pillow. Under these facts, Ms. Culp's injuries did not arise out of Mr. Jurs' ownership of the vehicle, which was the mere situs of the accident. The superior court correctly dismissed Ms. Culp's claim. The order of dismissal is affirmed. SWEENEY, C.J., and SCHULTHEIS, J., concur. NOTES [1] Mr. Brumbaugh's death was deemed accidental and no charges were filed. [2] A Division Two panel of this court recently stated the test differently. Beckman v. Connolly, 79 Wash.App. 265, 273, 898 P.2d 357 (1995) ("[T]he claimed injury must have originated from, had its origin in, grown out of, or flowed from, the use of the vehicle."). The Beckman court curiously distinguished Jerome on the basis that Jerome was "construing somewhat different policy language." Beckman, 79 Wash.App. at 273, 898 P.2d 357. In Jerome, the policy used the phrase "resulting from," but the court treated that phrase as equivalent to the phrase "arising out of." Jerome clearly interpreted the phrase "arising out of," and we treat its holding as binding in this case.
{ "pile_set_name": "FreeLaw" }
In most countries, ‘history’ is the dreaded school subject that only a few book-happy nerds can actually get through. Even famed author J. K. Rowling acknowledged it in her Harry Potter books; history of magic was the only subject that didn’t excite Hermione Granger, the incredibly smart and nerdy main character, although she did manage to get through the class without falling asleep. However, the history of a country is rarely boring. Text books may make it seem a though our history is all about the kings and queens who ruled us, the wars we fought and the things we built but it is a lot more than that. It’s the fashions we wore, the industries we forged and the literature and art we created.Let’s take a walk through alternative history that will make you much more interested in the subject.The Great IndustriesThe great industries that a country is known for change from time to time depending on socio-political and geographical factors. A study of how each specific industry changed and evolved over time is a good way to figure out what was happening in the country and in the world. For instance, American Australian hot rods were among the best in the world when they were first being produced, but the American auto industry saw a steady decline afterwards as other countries like Japan started producing cars that were more fuel efficient and suited to a bigger, more voracious, consumer group: the middle class families. Tracking the changes in that industry is like tracking the evolution of the American economy. Instead of sitting through a boring documentary, get a hot rod magazine subscription and read up about how they have now spread to other countries and are being reborn in an adrenaline charged sport – drag racing.The Colourful FashionsThere are YouTube channels now that exclusively focus on the changes in fashion in specific countries, and it is fascinating to see how certain ‘rules’ of fashions that we adhere to strictly today were merely seasonal trends 50 years ago. The rise and fall of the Tokugawa shogun family of Japan for instance, can be traced by the hair styles and kimonos worn by the women. At the height of their power, when the Tokugawa clan ruled a unified Japan, the women wore elaborate and extremely heavy kimonos, some of which took over a year to complete. Their hairstyles were complicated and heavy, making it almost impossible for them to move their heads. This was a sign of their wealth and leisure, that they could afford to have women who did nothing but look beautiful. After they lost power and the country transitioned towards modernity, kimonos became simpler, more practical and ultimately gave way to the dress and pants of the West.Thus, it isn’t necessary for us to study history the way we always have. Change your perspective.
{ "pile_set_name": "Pile-CC" }
;*************************************************************************** ;* * ;* I F F D I M * ;* * ;* VARIABLES MODULE * ;* * ;*************************************************************************** include iffdim.i section __MERGED,DATA xdef DosName,DosBase xdef ListName,ListData xdef IFFData,LevelData xdef Task,OutputFIB,MsgBuffer xdef argc,argv xdef SystemMemory xdef Quiet,Verbose xdef LevelList,IFFList DosName dc.b 'dos.library',0 dc.w 0 DosBase dc.l 0 ; dos.library Task dc.l 0 ; Address of Amiga_Task_Structure OutputFIB dc.l 0 ; Output FIB argc dc.l 0 argv ds.l 256 SystemMemory dc.l 0 ; Pointer to System Memory Block MsgBuffer ds.b 1024 ; Message Text Buffer Quiet dc.b 0 Verbose dc.b 0 ListName dc.l 0 ; Pointer to ListName ListData dc.l 0 ; Pointer to ListData IFFData dc.l 0 ; Pointer to IFFData LevelData dc.l 0 ; Pointer to LevelData LevelList dc.b 0 ; -1 = LEVEL LIST IFFList dc.b 0 ; -1 = IFF LIST end
{ "pile_set_name": "Github" }
In the field of golf, it is well-known that golf bags are utilized to carry golf clubs and to keep those golf clubs organized while they are used and transported on the golf course during a round of golf. Traditionally, golf clubs were carried in golf bags that were carried about a golf course either by the golfers themselves or by their caddies. The predominance of golf bags in the art today are fabricated in contemplation of these methods of carriage. Such bags are typically constructed to include an oval or rounded tubular golf club compartment as well as a number of externally disposed pockets or other smaller compartments for carrying golf related items such as golf tees, golf balls, scorecards, and pencils for completing score cards. Depending on the quality and cost of the particular golf bag, the golf club compartment is constructed of a unitary ovoid or circular piece of plastic and includes a club divider on its open end, an encapsulating nylon shell which contains the smaller storage compartments, and a stand which extends outward from a side of the bag to assist in positioning the bag to remain standing while one of the clubs from the bag is in use. Alternatively, the bag is constructed to include a multi-sectional golf club compartment which is divided into a number of lined cavities that extend the length of the golf bag and enable the separate grouping of the golf clubs, a sewn shell surrounding the club compartment for storing golf accessories, including a golf umbrella, a ball retriever, a rain suit, and even a pair of golfer's shoes. As is commonly known today, the predominance of golfers today rely on golf carts to transport their golf bags while they play a round of golf. In using golf carts, golfers are typically required to secure their bags onto golf cart carry stands which are typically located on the rear of the golf cart. This is usually accomplished by positioning their golf bag such that a security strap can be inserted through the carry handle on their bag and to a securement device. Unfortunately for the golfer, however, the positioning of their bag in this respect typically results in disposing the longer clubs of their bag, their woods, closer to them while their shorter clubs, their irons, are farther removed and located behind the woods. This positioning causes great inconvenience to the golfers as such positioning makes it difficult for the golfer to see and/or reach around the woods and longer irons to find the short iron that they need for a shot. Moreover, having to position their golf bag on the golf cart in this fashion compels the golfer to have to then reach or maneuver around those longer clubs in their bag to reach the clubs that are more commonly used on the fairways. Placing their golf bag in this position also inconveniences the golfers in that the golf ball pouch on their bag is positioned away from them, between the golf bag and the rear of the golf cart, while their garment pouch is facing them. The predominance of golf bags in the art are also ill-fabricated or otherwise ill-suited to carry a golfer's clubs in such a way as to minimize or prevent the inadvertent contact of the heads of the golf club irons, regardless of whether the golf bag is carried by hand or by golf cart. The construction of such bags, thus, results in damage to the heads of the golf club irons as a result of the head-to-head contact. Even in those golf bags where the bag design is somewhat successful in avoiding damage to iron club heads, golf bags in the art are ill-suited to the convenience of the golfer as they, too, dispose of the golf club irons in a manner which is inconvenient for the golfer to reach the club iron of choice, return a used club iron to the proper receptacle. Moreover, none of the golf bags in the art provide that the bag is equally useful to the golfer regardless of their "handedness". Other devices have been produced to carry golf clubs and golf related items for golfers while golfing. Typical of the art are those devices disclosed in the following U.S. Patents: ______________________________________ U.S. Pat. No. Inventor(s) Issue Date ______________________________________ 3,554,255 J. P. Mangan Jan. 12, 1971 4,055,207 J. E. Goodwin Oct. 25, 1977 4,200,131 E. L. Chitwood, et al. Apr. 29, 1980 4,911,465 H. J. Hauer Mar. 27, 1990 4,995,510 C. C. Fletcher, Jr. Feb. 26, 1991 5,458,240 P. R. Rich, et al. Oct. 17, 1995 ______________________________________ The '255 patent issued to Mangan discloses an adapter for sorting golf clubs which is insertable into the open end of golf bags that lack any integrally molded, apertured closure member. The Mangan device is seated on the ribs that are typically transversely provided on golf bags. The Mangan device has a planar configuration and permits the separation of club shafts from each other within the bag cavity by inclusion of a plurality of parallel-disposed tubes which insert into each of the openings of the adapter. The '207 patent issued to Goodwin discloses an insertable, molded, one-piece retainer head which is received in the open end of a golf bag. The retainer includes three downwardly and forwardly pitched tiers having individual ribs which releasably secure the heads of golf club irons. The shafts of irons are received in passageways which are disposed proximate each rib and which extend downwardly at right angles from each stepped level. Woods in the Goodwin device are received, one each, in equally spaced passageways which are disposed on the uppermost tier level in a semicircular arrangement. The '131 patent issued to Chitwood, et al., discloses a golf bag construction in which the top surface includes recessed openings for receiving the heads of each of golf club of a set of clubs wherein each opening is angled to correspond with the loft angle of a particular golf club iron. The Chitwood bag includes an upper plate and a lower plate connected by a series of tubes for receiving the shafts of golf clubs. The apertures for receiving the irons are disposed in two evenly spaced rows. The apertures for receiving the woods in the Chitwood bag are spaced at a distance far enough apart to avoid contact with the irons and/or the other wood heads. The '465 patent issued to Hauer discloses a golf bag having a retractable wheel assembly and elongated tubes for receiving club shafts wherein the tubes include a resiliently deformable material for frictionally engaging and securing the club in a stable position while in the golf bag. The iron and wood tubes are received in three linearly arranged rows which are disposed on a planar surface and which permit the club heads to extend above that surface from each of their respective tubes. The '510 patent to Fletcher, Jr. discloses a club separating insert system for a golf bag which permits the grouping of clubs at spaced intervals and a process for designing such systems for golf bags. The Fletcher system utilizes the difference in the length of the clubs as well as the range of rotational movement and size of the club heads in specifically disposing each iron and wood in particular positions within the golf bag. The '240 patent to Rich, et al., discloses a golf bag which includes an upper club head support having a plurality of pockets and a plurality of corresponding shaft receiving holes for receiving a plurality of golf club heads and the shafts corresponding to each club head. The Rich golf bag further includes a lower base section which is disposed in a spaced relation to the upper club head support and a bag forming material section extending between the upper club head support and the lower base section. Each pocket of the upper club head section in the Rich golf bag is formed to protect each club head from contact with any other club head. Of the foregoing devices, the '255 patent issued to Mangan, the '465 patent issued to Hauer, and the '510 patent issued to Fletcher disclose golf bags which fail to adequately protect against club head damage resulting from inadvertent club head contact. The Mangan and Hauer golf bags both provide for disposing each club in an individual club receptacle. However, neither golf bag provides sufficient distance or separation between each head of each club in the golf bag to minimize or eliminate the potential for club head damage. Such damage can result in either or both of the Mangan and Hauer golf bags by the rotation of the club heads in the golf bag upon movement of the bag or upon re-insertion of a golf club into a tube after use. The Fletcher golf bag attempts to solve this problem by providing for the separation of the golf club heads on the basis of height. However, the Fletcher bag similarly fails in its objective, especially as is evidenced by the interactions of adjacently disposed, similar length clubs. Clearly, longer shafted woods and irons are disposable so as to avoid contact with shorter shafted clubs. Where those clubs are of close proximity in weight and shaft length, however, contact between these clubs is unavoidable. The contact which can result is from either or both club movement in carrying or positioning the golf bag or in replacement of the club in the golf bag after use. Such conclusions are equally unavoidable regardless of which Fletcher design process and/or configuration is utilized. Like the Mangan device, the retainer disclosed in the '207 patent to Goodwin includes a plurality of shaft-receiving passageways which are correspondingly disposed at right angles to the openings of the retainer head. The Goodwin device, however, is limited in its applicability by its construction. While golfers are either right or left-handed, the Goodwin device is clearly configured to adapt to one golfer's particular handedness and is not useable by a golfer of a different handedness. The angling of the openings for receiving the club heads clearly defines this limitation. Moreover, while securing a golfer's irons from inadvertent contact between rows of clubs, the Goodwin device fails to make similar provision for the golfer's irons within the same club row. The potential for club head intercontact and damage is also evidenced by the fact that the golf bags in which it is foreseen that the Goodwin device will be used are bags in which the club shaft length approximates the length of the golf bag. This bag length limitation enhances the risk of inadvertent club dislodging and contact as the clubs may be easily jostled out of their slots. The devices disclosed in the '131 patent to Chitwood, et al., and the '240 patent issued to Rich, et al., include similar limitations. The Chitwood device does disclose a club holder arrangement which completely protects the heads of irons from inadvertent contact. However, this device includes the identical club head angulation and handedness limitations described regarding the Goodwin device. Moreover, the disposal of the iron club heads within spaces that enclose all but lower edge renders each club inconvenient, if not difficult, to remove from the Chitwood club divider. The Chitwood divider is also limited in its application given the continued evolution of golf club styles as that evolution in club style is bringing different angles of club face to each club in a golfers bag. Consequently, the design of a club head receptacle has severely limited the value of the Chitwood bag. The Rich device includes the identical club head angulation and handedness limitations described for the woods as well as the irons of the golf set. The planar surface within each divider of the rich device fails to adequately seat each club head so that jostling or movement of the golf bag will not result in displacement of the clubs from their divider and contact between them. Moreover, the disposal of a club head in a divider whose lower surface is inclined parallel with the incline of the head support is not only impractical, it heightens the likelihood that the club head disposed in that divider will dislodge easily, and contact club heads of adjacent clubs. Therefore, it is an object of this invention to provide a golf bag with a club separator which provides an improved means for securing iron club heads in a stable position to minimize or eliminate iron club head damage due to collision with other iron club heads. It is also an object of this invention to provide an improved golf bag with a club separator which improves the security iron club heads within a golf club head compartment by providing that the lowermost end of the golf club shaft does not contact the lowermost surface of the golf bag when the club head is resting in the club head compartment. It is another object of this invention to provide a golf bag with length and overall configuration designed to further stabilize iron club heads in their respective dividers and thereby avoid club damage. Further, it is an object of this invention to provide an improved golf bag with a club separator which recognizes and accounts for the changes in the game today where golfers predominantly use golf carts, and not caddies, to carry golf bags. It is also an object of this invention to provide an improved golf bag with a club separator where the short irons are always in front when the bag is mounted to a golf cart. It is another object of this invention to provide an improved golf bag with a club separator where the bag is useable to golfers regardless of their handedness. Moreover, it is an object of the present invention to provide an improved golf bag with a club separator which is more organized and out of which it is easier to play.
{ "pile_set_name": "USPTO Backgrounds" }
'Real Housewives of Miami' Season 2 Preview: A Fresh Start 'Real Housewives of Miami' Season 2 Preview: A Fresh Start After a lackluster first season fail, The Real Housewives of Miami is returning for a second season on Thursday. But with four new housewives and a new production company the show is barely recognizable starting from the very first episode. So what can we expect of season 2?
{ "pile_set_name": "Pile-CC" }
Identifying protein domains by global analysis of soluble fragment data. The production and analysis of individual structural domains is a common strategy for studying large or complex proteins, which may be experimentally intractable in their full-length form. However, identifying domain boundaries is challenging if there is little structural information concerning the protein target. One experimental procedure for mapping domains is to screen a library of random protein fragments for solubility, since truncation of a domain will typically expose hydrophobic groups, leading to poor fragment solubility. We have coupled fragment solubility screening with global data analysis to develop an effective method for identifying structural domains within a protein. A gene fragment library is generated using mechanical shearing, or by uracil doping of the gene and a uracil-specific enzymatic digest. A split green fluorescent protein (GFP) assay is used to screen the corresponding protein fragments for solubility when expressed in Escherichia coli. The soluble fragment data are then analyzed using two complementary approaches. Fragmentation "hotspots" indicate possible interdomain regions. Clustering algorithms are used to group related fragments, and concomitantly predict domain location. The effectiveness of this Domain Seeking procedure is demonstrated by application to the well-characterized human protein p85α.
{ "pile_set_name": "PubMed Abstracts" }
# frozen_string_literal: true require_relative 'resources/cors_misconfiguration_error' module Rack class Cors class Resources attr_reader :resources def initialize @origins = [] @resources = [] @public_resources = false end def origins(*args, &blk) @origins = args.flatten.reject { |s| s == '' }.map do |n| case n when Proc, Regexp, %r{^https?://}, 'file://' n when '*' @public_resources = true n else Regexp.compile("^[a-z][a-z0-9.+-]*:\\\/\\\/#{Regexp.quote(n)}$") end end.flatten @origins.push(blk) if blk end def resource(path, opts = {}) @resources << Resource.new(public_resources?, path, opts) end def public_resources? @public_resources end def allow_origin?(source, env = {}) return true if public_resources? [email protected] do |origin| if origin.is_a?(Proc) origin.call(source, env) elsif origin.is_a?(Regexp) source =~ origin else source == origin end end end def match_resource(path, env) @resources.detect { |r| r.match?(path, env) } end def resource_for_path(path) @resources.detect { |r| r.matches_path?(path) } end end end end
{ "pile_set_name": "Github" }
The University of Iowa Lecture Committee (ULC) aims to organize a series of prominent guest lecturers with the mission of enhancing the learning environment and providing unique and thought-provoking experiences for the UI community. Continue Reading For more than 30 years, The University of Iowa Lecture Committee has brought some of the world's great thinkers to the University of Iowa campus. Speakers have included an impressive roster of national and international figures in science, politics, business, human rights, law, and the arts. Continue Reading
{ "pile_set_name": "OpenWebText2" }
The body does many things in an attempt to maintain a very comfortable core body temperature. When the body is cold, the blood vessels at the skin level constrict in an attempt to reduce the body heat loss and when the body temperature exceeds the comfortable core body temperature, the body's built in sensors triggers it to start sweating (perspiring) in an attempt to cool its temperature down. Although many areas of the body sweat, the underarm area is one of the areas that is known to sweat the most when the body gets hot. Male as well as females sweat under their armpits, some people more than others. Although sweating helps to cools the body off, it also has a negative side effect that could cause staining of any fabric that comes in direct contact with it over time. This dis-coloration condition can be compounded and made worst when an anti-perspirant is used in the underarm area as a control mechanism for perspiration. This invention “Disposable Underarm Perspiration Pad” provides a barrier medium that protects the next outer garment layer of clothing from direct contact with the perspiration while at the same time allowing the wearer total freedom of movement using the arms. The Disposable Underarm Perspiration Pad is intended to be worn by a person, male or female, who would like to have a means of protecting the underarm areas of their clothing from perspiration stains. It is preferred that the Disposable Underarm Perspiration Pad be constructed of a lightweight material and fashioned into a pad type form that can be worn under each armpit. The pad can be fashioned in such a way to allow it to be secured to the body by either an elastic band or a hook and loop fastener, such as one made by Velcro USA, Manchester, N.H. and sold under the brand name Velcro® (as used throughout, reference to Velcro® is meant to mean and include a hook and loop fastener. When the Disposable Underarm Perspiration Pad is secured as intended in the under armpit area, it absorbs the perspiration and keeps the garment immediately next to the Disposable Underarm Perspiration Pad, free of perspiration stains.
{ "pile_set_name": "USPTO Backgrounds" }
1984 FIA European Formula 3 Championship The 1984 FIA European Formula 3 Championship was the tenth edition of the FIA European Formula 3 Championship. The championship consisted of 15 rounds across the continent. The season was won by Italian Ivan Capelli, with Johnny Dumfries second and Gerhard Berger in third. Calendar Results Championship standings Drivers' championship References External links Category:1984 in motorsport Category:FIA European Formula 3 Championship
{ "pile_set_name": "Wikipedia (en)" }
Need Moderators for the “C/C++ coding Best practices repository” - cppdesign http://www.codergears.com/Blog/?p=1856 ====== nkurz I think there are tremendous differences between C and C++ best practices. Are you really trying to create a single repository that covers both of them? _If you are a C++ expert and you are interested to moderate this repository please contact us at [email protected]._ And you certainly don't want a C++ expert trying to moderate best practices in C. If you want to cover both C and C++, they need to be treated separately.
{ "pile_set_name": "HackerNews" }
1. Field of the Invention The present invention relates to a detergent composition which is superior in sudsing subsidence and smooths and moisturizes the hand and to a liquid detergent composition superior in low temperature stability. 2. Description of the Related Art Since kitchen cleaners, household cleaners, shampoos, body shampoos, clothing detergents, and other detergents inevitably contact the skin of the hand etc. during washing, studies have been made in the past to develop detergent composition which are mild to the skin and do not give a greasy feeling. A sugar ester-based surfactant comprised of an ester of a fatty acid having 6 to 18 carbon atoms and a monoalkyl ether of a monosaccharide having 5 to 6 carbon atoms is known as a surfactant which causes little irritation and is mild to the skin. When such sugar ester-based surfactants are formulated into a detergent, however, there is the problem of a deterioration of the sudsing subsidence, in particular the rinse-off property at low temperatures. Further, detergents having such sugar ester-based surfactants formulated therein have not necessarily been sufficient in terms of the moist feeling given to the skin after use. The moisture of the skin is lost and chaffing due to abrasion and drying is felt. Also, when such sugar ester-based surfactants are formulated into a liquid detergent, the low temperature stability becomes worse. Therefore,when the liquid detergent composition is stored at a low temperature in cold regions etc, the problem of nonhomogenity and turbidity arises.
{ "pile_set_name": "USPTO Backgrounds" }
Phimeanakas Phimeanakas (, Prasat Phimean Akas, 'celestial temple') or Vimeanakas (, Prasat Vimean Akas) at Angkor, Cambodia, is a Hindu temple in the Khleang style, built at the end of the 10th century, during the reign of Rajendravarman (from 941-968), then completed by Suryavarman I in the shape of a three tier pyramid as a Hindu temple. On top of the pyramid there was a tower, while on the edge of top platform there are galleries. Phimeanakas is located inside the walled enclosure of the Royal Palace of Angkor Thom north of Baphuon. Description The temple was the focal point of Suryavarman I's capital. The buildings there from his reign are enclosed by a wall 600 by 250 m, with five gopuram, and include the Southern and Northern Khleangs. The tower was originally crowned with a golden pinnacle, as Zhou Daguan described it in his report. According to legend, the king spent the first watch of every night with a woman thought to represent a Nāga in the tower, during that time, not even the queen was permitted to intrude. Only in the second watch the king returned to his palace with the queen. If the naga who was the supreme land owner of Khmer land did not show up for a night, the king's day would be numbered, if the king did not show up, calamity would strike his land. One of the stele states Jayavarman VII, while on a military expedition in Champa, learned that his father Dharanindravarman II had died, and "returned in great haste to aid King Yasovarman II. Jayavarman's second wife, Indradevi, "...composed in impeccable Sanskrit the inscription...panegyric of her sister" Jayarajadevi, which included biographical detail of Jayavarman VII. Gallery References Category:Hindu temples in Siem Reap Province Category:Angkorian sites in Siem Reap Province
{ "pile_set_name": "Wikipedia (en)" }
Florian Heller Florian Heller (born 10 March 1982 in Rosenheim) is a German football coach and former footballer. He is currently the manager of SpVgg Unterhaching U17. He made his debut on the professional league level in the 2. Bundesliga for SpVgg Greuther Fürth on 3 August 2003 when he came on as a substitute in the 72nd minute in the game against SpVgg Unterhaching. References External links Category:1982 births Category:Living people Category:German footballers Category:Germany youth international footballers Category:Bundesliga players Category:2. Bundesliga players Category:FC Bayern Munich II players Category:SpVgg Greuther Fürth players Category:FC Erzgebirge Aue players Category:1. FSV Mainz 05 players Category:FC Ingolstadt 04 players Category:SpVgg Unterhaching players Category:3. Liga players Category:Association football midfielders Category:TSV 1860 Rosenheim players
{ "pile_set_name": "Wikipedia (en)" }
//------------------------------------------------------------------------------ // <auto-generated> // このコードはツールによって生成されました。 // ランタイム バージョン:4.0.30319.42000 // // このファイルへの変更は、以下の状況下で不正な動作の原因になったり、 // コードが再生成されるときに損失したりします。 // </auto-generated> //------------------------------------------------------------------------------ namespace MsgPack.Serialization.GeneratedSerializers { [System.CodeDom.Compiler.GeneratedCodeAttribute("MsgPack.Serialization.CodeDomSerializers.CodeDomSerializerBuilder", "0.9.0.0")] [System.Diagnostics.DebuggerNonUserCodeAttribute()] public class MsgPack_Serialization_PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructorSerializer : MsgPack.Serialization.MessagePackSerializer<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> { private MsgPack.Serialization.MessagePackSerializer<System.Tuple<MsgPack.Serialization.FileSystemEntry>> _serializer0; private System.Collections.Generic.IList<System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>> _packOperationList; private System.Collections.Generic.IDictionary<string, System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>> _packOperationTable; private System.Collections.Generic.IDictionary<string, System.Func<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, bool>> _nullCheckersTable; private System.Collections.Generic.IList<System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>> _packOperationListAsync; private System.Collections.Generic.IDictionary<string, System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>> _packOperationTableAsync; private System.Func<UnpackingContext, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> this_CreateInstanceFromContextDelegate; private System.Action<UnpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry>> this_SetUnpackedValueOfTuple1PolymorphicDelegate; private System.Collections.Generic.IList<string> _memberNames; private System.Collections.Generic.IList<System.Action<MsgPack.Unpacker, UnpackingContext, int, int>> _unpackOperationList; private System.Collections.Generic.IDictionary<string, System.Action<MsgPack.Unpacker, UnpackingContext, int, int>> _unpackOperationTable; private System.Collections.Generic.IList<System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>> _unpackOperationListAsync; private System.Collections.Generic.IDictionary<string, System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>> _unpackOperationTableAsync; public MsgPack_Serialization_PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructorSerializer(MsgPack.Serialization.SerializationContext context) : base(context, (MsgPack.Serialization.SerializerCapabilities.PackTo | MsgPack.Serialization.SerializerCapabilities.UnpackFrom)) { MsgPack.Serialization.PolymorphismSchema schema0 = default(MsgPack.Serialization.PolymorphismSchema); MsgPack.Serialization.PolymorphismSchema[] tupleItemsSchema0 = default(MsgPack.Serialization.PolymorphismSchema[]); tupleItemsSchema0 = new MsgPack.Serialization.PolymorphismSchema[1]; MsgPack.Serialization.PolymorphismSchema tupleItemSchema0 = default(MsgPack.Serialization.PolymorphismSchema); System.Collections.Generic.Dictionary<string, System.Type> tupleItemSchemaTypeMap0 = default(System.Collections.Generic.Dictionary<string, System.Type>); tupleItemSchemaTypeMap0 = new System.Collections.Generic.Dictionary<string, System.Type>(2); tupleItemSchemaTypeMap0.Add("0", typeof(MsgPack.Serialization.FileEntry)); tupleItemSchemaTypeMap0.Add("1", typeof(MsgPack.Serialization.DirectoryEntry)); tupleItemSchema0 = MsgPack.Serialization.PolymorphismSchema.ForPolymorphicObject(typeof(MsgPack.Serialization.FileSystemEntry), tupleItemSchemaTypeMap0); tupleItemsSchema0[0] = tupleItemSchema0; schema0 = MsgPack.Serialization.PolymorphismSchema.ForPolymorphicTuple(typeof(System.Tuple<MsgPack.Serialization.FileSystemEntry>), tupleItemsSchema0); this._serializer0 = context.GetSerializer<System.Tuple<MsgPack.Serialization.FileSystemEntry>>(schema0); System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>[] packOperationList = default(System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>[]); packOperationList = new System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>[1]; packOperationList[0] = new System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>(this.PackValueOfTuple1Polymorphic); this._packOperationList = packOperationList; System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>[] packOperationListAsync = default(System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>[]); packOperationListAsync = new System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>[1]; packOperationListAsync[0] = new System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>(this.PackValueOfTuple1PolymorphicAsync); this._packOperationListAsync = packOperationListAsync; System.Collections.Generic.Dictionary<string, System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>> packOperationTable = default(System.Collections.Generic.Dictionary<string, System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>>); packOperationTable = new System.Collections.Generic.Dictionary<string, System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>>(1); packOperationTable["Tuple1Polymorphic"] = new System.Action<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>(this.PackValueOfTuple1Polymorphic); this._packOperationTable = packOperationTable; System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>> packOperationTableAsync = default(System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>>); packOperationTableAsync = new System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>>(1); packOperationTableAsync["Tuple1Polymorphic"] = new System.Func<MsgPack.Packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, System.Threading.CancellationToken, System.Threading.Tasks.Task>(this.PackValueOfTuple1PolymorphicAsync); this._packOperationTableAsync = packOperationTableAsync; System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, bool>> nullCheckerTable = default(System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, bool>>); nullCheckerTable = new System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, bool>>(1); nullCheckerTable["Tuple1Polymorphic"] = new System.Func<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor, bool>(this.IsTuple1PolymorphicNull); this._nullCheckersTable = nullCheckerTable; System.Action<MsgPack.Unpacker, UnpackingContext, int, int>[] unpackOperationList = default(System.Action<MsgPack.Unpacker, UnpackingContext, int, int>[]); unpackOperationList = new System.Action<MsgPack.Unpacker, UnpackingContext, int, int>[1]; unpackOperationList[0] = new System.Action<MsgPack.Unpacker, UnpackingContext, int, int>(this.UnpackValueOfTuple1Polymorphic); this._unpackOperationList = unpackOperationList; System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>[] unpackOperationListAsync = default(System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>[]); unpackOperationListAsync = new System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>[1]; unpackOperationListAsync[0] = new System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>(this.UnpackValueOfTuple1PolymorphicAsync); this._unpackOperationListAsync = unpackOperationListAsync; System.Collections.Generic.Dictionary<string, System.Action<MsgPack.Unpacker, UnpackingContext, int, int>> unpackOperationTable = default(System.Collections.Generic.Dictionary<string, System.Action<MsgPack.Unpacker, UnpackingContext, int, int>>); unpackOperationTable = new System.Collections.Generic.Dictionary<string, System.Action<MsgPack.Unpacker, UnpackingContext, int, int>>(1); unpackOperationTable["Tuple1Polymorphic"] = new System.Action<MsgPack.Unpacker, UnpackingContext, int, int>(this.UnpackValueOfTuple1Polymorphic); this._unpackOperationTable = unpackOperationTable; System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>> unpackOperationTableAsync = default(System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>>); unpackOperationTableAsync = new System.Collections.Generic.Dictionary<string, System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>>(1); unpackOperationTableAsync["Tuple1Polymorphic"] = new System.Func<MsgPack.Unpacker, UnpackingContext, int, int, System.Threading.CancellationToken, System.Threading.Tasks.Task>(this.UnpackValueOfTuple1PolymorphicAsync); this._unpackOperationTableAsync = unpackOperationTableAsync; this._memberNames = new string[] { "Tuple1Polymorphic"}; this.this_CreateInstanceFromContextDelegate = new System.Func<UnpackingContext, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>(this.CreateInstanceFromContext); this.this_SetUnpackedValueOfTuple1PolymorphicDelegate = new System.Action<UnpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry>>(this.SetUnpackedValueOfTuple1Polymorphic); } private void PackValueOfTuple1Polymorphic(MsgPack.Packer packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor objectTree) { this._serializer0.PackTo(packer, objectTree.Tuple1Polymorphic); } private bool IsTuple1PolymorphicNull(MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor objectTree) { return (objectTree.Tuple1Polymorphic == null); } protected internal override void PackToCore(MsgPack.Packer packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor objectTree) { MsgPack.Serialization.PackToArrayParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> packHelperParameters = default(MsgPack.Serialization.PackToArrayParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>); packHelperParameters.Packer = packer; packHelperParameters.Target = objectTree; packHelperParameters.Operations = this._packOperationList; MsgPack.Serialization.PackToMapParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> packHelperParameters0 = default(MsgPack.Serialization.PackToMapParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>); packHelperParameters0.Packer = packer; packHelperParameters0.Target = objectTree; packHelperParameters0.Operations = this._packOperationTable; packHelperParameters0.SerializationContext = this.OwnerContext; packHelperParameters0.NullCheckers = this._nullCheckersTable; if ((this.OwnerContext.SerializationMethod == MsgPack.Serialization.SerializationMethod.Array)) { MsgPack.Serialization.PackHelpers.PackToArray(ref packHelperParameters); } else { MsgPack.Serialization.PackHelpers.PackToMap(ref packHelperParameters0); } } private System.Threading.Tasks.Task PackValueOfTuple1PolymorphicAsync(MsgPack.Packer packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor objectTree, System.Threading.CancellationToken cancellationToken) { return this._serializer0.PackToAsync(packer, objectTree.Tuple1Polymorphic, cancellationToken); } protected internal override System.Threading.Tasks.Task PackToAsyncCore(MsgPack.Packer packer, MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor objectTree, System.Threading.CancellationToken cancellationToken) { MsgPack.Serialization.PackToArrayAsyncParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> packHelperParameters = default(MsgPack.Serialization.PackToArrayAsyncParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>); packHelperParameters.Packer = packer; packHelperParameters.Target = objectTree; packHelperParameters.Operations = this._packOperationListAsync; packHelperParameters.CancellationToken = cancellationToken; MsgPack.Serialization.PackToMapAsyncParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> packHelperParameters0 = default(MsgPack.Serialization.PackToMapAsyncParameters<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor>); packHelperParameters0.Packer = packer; packHelperParameters0.Target = objectTree; packHelperParameters0.Operations = this._packOperationTableAsync; packHelperParameters0.SerializationContext = this.OwnerContext; packHelperParameters0.NullCheckers = this._nullCheckersTable; packHelperParameters0.CancellationToken = cancellationToken; if ((this.OwnerContext.SerializationMethod == MsgPack.Serialization.SerializationMethod.Array)) { return MsgPack.Serialization.PackHelpers.PackToArrayAsync(ref packHelperParameters); } else { return MsgPack.Serialization.PackHelpers.PackToMapAsync(ref packHelperParameters0); } } private MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor CreateInstanceFromContext(UnpackingContext unpackingContext) { MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor result = default(MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor); result = new MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor(unpackingContext.Tuple1Polymorphic); return result; } private void SetUnpackedValueOfTuple1Polymorphic(UnpackingContext unpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry> unpackedValue) { unpackingContext.Tuple1Polymorphic = unpackedValue; } private void UnpackValueOfTuple1Polymorphic(MsgPack.Unpacker unpacker, UnpackingContext unpackingContext, int indexOfItem, int itemsCount) { MsgPack.Serialization.UnpackReferenceTypeValueParameters<UnpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry>> unpackHelperParameters = default(MsgPack.Serialization.UnpackReferenceTypeValueParameters<UnpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry>>); unpackHelperParameters.Unpacker = unpacker; unpackHelperParameters.UnpackingContext = unpackingContext; unpackHelperParameters.Serializer = this._serializer0; unpackHelperParameters.ItemsCount = itemsCount; unpackHelperParameters.Unpacked = indexOfItem; unpackHelperParameters.TargetObjectType = typeof(System.Tuple<MsgPack.Serialization.FileSystemEntry>); unpackHelperParameters.MemberName = "Tuple1Polymorphic"; unpackHelperParameters.NilImplication = MsgPack.Serialization.NilImplication.MemberDefault; unpackHelperParameters.DirectRead = null; unpackHelperParameters.Setter = this.this_SetUnpackedValueOfTuple1PolymorphicDelegate; MsgPack.Serialization.UnpackHelpers.UnpackReferenceTypeValue(ref unpackHelperParameters); } protected internal override MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor UnpackFromCore(MsgPack.Unpacker unpacker) { UnpackingContext unpackingContext = default(UnpackingContext); System.Tuple<MsgPack.Serialization.FileSystemEntry> ctorArg0 = default(System.Tuple<MsgPack.Serialization.FileSystemEntry>); ctorArg0 = null; unpackingContext = new UnpackingContext(ctorArg0); if (unpacker.IsArrayHeader) { return MsgPack.Serialization.UnpackHelpers.UnpackFromArray(unpacker, unpackingContext, this.this_CreateInstanceFromContextDelegate, this._memberNames, this._unpackOperationList); } else { return MsgPack.Serialization.UnpackHelpers.UnpackFromMap(unpacker, unpackingContext, this.this_CreateInstanceFromContextDelegate, this._unpackOperationTable); } } private System.Threading.Tasks.Task UnpackValueOfTuple1PolymorphicAsync(MsgPack.Unpacker unpacker, UnpackingContext unpackingContext, int indexOfItem, int itemsCount, System.Threading.CancellationToken cancellationToken) { MsgPack.Serialization.UnpackReferenceTypeValueAsyncParameters<UnpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry>> unpackHelperParameters = default(MsgPack.Serialization.UnpackReferenceTypeValueAsyncParameters<UnpackingContext, System.Tuple<MsgPack.Serialization.FileSystemEntry>>); unpackHelperParameters.Unpacker = unpacker; unpackHelperParameters.UnpackingContext = unpackingContext; unpackHelperParameters.Serializer = this._serializer0; unpackHelperParameters.ItemsCount = itemsCount; unpackHelperParameters.Unpacked = indexOfItem; unpackHelperParameters.TargetObjectType = typeof(System.Tuple<MsgPack.Serialization.FileSystemEntry>); unpackHelperParameters.MemberName = "Tuple1Polymorphic"; unpackHelperParameters.NilImplication = MsgPack.Serialization.NilImplication.MemberDefault; unpackHelperParameters.DirectRead = null; unpackHelperParameters.Setter = this.this_SetUnpackedValueOfTuple1PolymorphicDelegate; unpackHelperParameters.CancellationToken = cancellationToken; return MsgPack.Serialization.UnpackHelpers.UnpackReferenceTypeValueAsync(ref unpackHelperParameters); } protected internal override System.Threading.Tasks.Task<MsgPack.Serialization.PolymorphicMemberTypeKnownType_Tuple_Tuple1PolymorphicGetOnlyPropertyAndConstructor> UnpackFromAsyncCore(MsgPack.Unpacker unpacker, System.Threading.CancellationToken cancellationToken) { UnpackingContext unpackingContext = default(UnpackingContext); System.Tuple<MsgPack.Serialization.FileSystemEntry> ctorArg0 = default(System.Tuple<MsgPack.Serialization.FileSystemEntry>); ctorArg0 = null; unpackingContext = new UnpackingContext(ctorArg0); if (unpacker.IsArrayHeader) { return MsgPack.Serialization.UnpackHelpers.UnpackFromArrayAsync(unpacker, unpackingContext, this.this_CreateInstanceFromContextDelegate, this._memberNames, this._unpackOperationListAsync, cancellationToken); } else { return MsgPack.Serialization.UnpackHelpers.UnpackFromMapAsync(unpacker, unpackingContext, this.this_CreateInstanceFromContextDelegate, this._unpackOperationTableAsync, cancellationToken); } } public class UnpackingContext { public System.Tuple<MsgPack.Serialization.FileSystemEntry> Tuple1Polymorphic; public UnpackingContext(System.Tuple<MsgPack.Serialization.FileSystemEntry> Tuple1Polymorphic) { this.Tuple1Polymorphic = Tuple1Polymorphic; } } } }
{ "pile_set_name": "Github" }
W E D N E S D A Y E X T R E M E M A R K E T S A complimentary service from INO.com ( http://www.ino.com/ ) Wednesday: The CRB Index is down 0.75 points to 209.77. The US Dollar Index moved lower 0.04 points to 118.18. The Dow Industrials moved lower 166.50 points, at 10872.64, while the S&P 500 moved lower 19.85 points, last seen at 1248.08. The Nasdaq Composite eased 91.04 points to 2084.50. **** 2 FREE OPTIONS VIDEOS FROM THE OPTIONS INDUSTRY COUNCIL !!! **** http://www.ino.com/specials/oic/video2.html _____________________________________________________________________ Uncanny 99.39% Accuracy and $730,566.72 Profits _____________________________________________________________________ . . . a Revolutionary Profit Mircle! http://store.ino.com/sale/1DC1C/TWSP-Uncanny Dear Andrew: Shocking, all new book reveals the most accurate and profitable trading strategies I have ever seen - anywhere. With 491 wins out of 494 trades since May 1995, this is a virtual sure-thing-profit secret! In fact, in over 26 years in futures and options, I have never seen a trading system that came so close to virtually guaranteeing profits, trade - after - trade. Win on at least 9 out of every 10 Trades - Absolutely Guaranteed! Now I've seen hundreds of trading systems claiming huge profits - and most just self-destruct when put to the test. That's why I immediately began following this strategy...way back when I first learned of it. The results blew me away! Every trade - every last one - has been profitable since. Take a look for yourself. The phenomenal record was no pipe dream. Trade after trade, it has proven to be the trading system of a lifetime. FREE 9 PAGE BROCHURE ONLINE @ http://store.ino.com/sale/1DC1C/TWSP-Uncanny <a href="http://store.ino.com/sale/1DC1C/TWSP-Uncanny">The Science of Automatic Option Profits!</a> Order Toll Free 800-538-7424 - 410-867-7424 All claims on third-party products are made by the publisher and not by INO.com. All Products Guaranteed. _____________________________________________________________________ E X T R E M E M A R K E T C O M M E N T A R Y _____________________________________________________________________ LIVESTOCK: August live cattle closed off $0.45 at $73.70 today. Speculative traders took profits today after the recent big runup had pushed the market into oversold territory. I would not be surprised to see more of a downside correction soon. Prices pushed to a fresh four-month high Tuesday. Resistance lies at the $74.50 level. First support lies at the $73.40 level. August feeder cattle closed off $0.27 today, at $91.55. Prices scored an "inside day" and took a rest after they hit a new contract high Tuesday. Feeders are still over-extended on a short-term technical basis. A bull flag looks to be forming on the daily bar chart, as this week we saw an upside breakout from that pattern. First resistance is seen at $92.00. Looking at the weekly continuation chart for nearby futures, the next upside objective for the bulls is resistance just above $92.00. First support is seen at $91.00. August lean hogs closed up $1.65 today at $63.35. Prices closed near the session high. The strong rebound continued today, after limit-up gains seen Tuesday. The market just got too extended on the downside, especially in the wake Friday's bullish USDA Hogs & Pigs report. Fund buying was featured today, sources said. Prices today broke out above and negated a steep five-week-old downtrend. The bulls now have the near-term edge. However, I would not be surprised to see some sideways consolidation in the coming sessions. Next resistance lies at $64.00. First support is located at the 62.00 level. GRAINS: July corn futures closed up 3/4 cent at $1.90 today. It was a quiet "rest day" today after prices Tuesday scored another fresh contract low. Funds have loaded up on the short side now. Good growing weather in the Midwest and no threatening weather patterns in the forecast continue. This market has no summertime weather premium built into it, which will make it very susceptible to an upside spurt even with a minor weather scare. I don't think there is much downside left in corn, but I don't want to be a bottom-picker, either--tempting as it may be at these low prices. Next support is seen at $1.87 3/4. Next resistance is seen at $1.95. July soybeans closed 1 3/4 cents lower at $4.37 1/2 today. Technical damage occurred in the market this week as a five-week-old uptrend line on the daily bar chart was penetrated on the downside and negated. Now, it also looks like a minor double-top reversal pattern could be playing out on the daily bar chart. Good growing weather and no weather threats on the horizon have allowed the bears to take control of this market. Funds have been good sellers in the bean pit this week. Still more downside action this week would not surprise me. First support is seen at the $4.35 area. First resistance is now seen at $4.45 level. July soybean meal closed off $1.60 at $160.20 today. Another down day today negates a five-week-old uptrend line on the daily bar chart. Bears are gaining steam now. After prices pushed to a fresh four-month high Friday, they have seen a solid downside correction this week. Bulls need to stop the bleeding soon or this weakness will quickly become more than a downside correction. Next support comes in at the $158.00 area. First resistance is seen at $162.60--today's high. July bean oil closed 6 points higher at 14.80 cents today. Today's follow-through buying has confirmed a key reversal up, after prices pushed to a fresh contract low on Tuesday and then staged a strong rebound. This week, spreaders are unwinding short oil and long meal positions. Oil is still technically much weaker than beans or meal. But I would be surprised if there is much downside left in oil. Next resistance comes in at 15.00 cents. Next support is seen at 14.60 cents. July Chicago wheat closed 3/4 cents lower at $2.64 today. Prices closed near the session low as traders looked at slack demand prospects. Earlier in the session, prices were boosted by heavy storms that hit Kansas and Oklahoma the past 24 hours. First support lies at the $2.58 1/2 level--the contract low. Next resistance is seen at $2.70. K.C. July HRW wheat closed up 1 cent at $3.20 1/4 today. Prices gapped higher today in the wake of the heavy storms that hit parts of the Plains the past 24 hours. However, prices closed on the session low. Still, the upside gap was not filled with the late retreat. Also, there was follow-through buying today and a key reversal up on the daily bar chart was confirmed. Recently, this market has seen a series of V reversals--both up and down. Trading remains volatile. Next resistance is seen at the $3.25 level. Next support is seen at $3.20. July oats closed up 1/2 cent at $1.12 1/4 today. Prices closed near the session low today, as did wheat. The choppy activity at lower price levels also favors the bulls. The past three weeks have seen another minor uptrend develop on the daily bar chart. Oats will continue to look to corn and wheat for direction. Next resistance comes in at the $1.14 level. First support now comes in at $1.10. SOFTS: July N.Y. sugar closed 15 points lower at 8.59 cents today. Prices today dropped to another fresh four-week low as the recent higher volatility at higher price levels has proven bearish. Also, the rare and usually bearish broadening formation continues to play out on the daily bar chart. Bears have the technical edge at present. However, the market is overdone on the downside at present, on a technical basis. Next support comes in at 8.40 cents--today's low. First resistance is now seen at 7.72 cents--today's high. July N.Y. coffee closed 65 points lower at 59.15 cents today. Prices today came within 10 points of the contract low set in April. Bears rule. Bulls can only hope for a strong rebound from the present price level, which would signal a big double-bottom reversal. Still, given the upcoming frost season in South America, I suspect the downside from present levels will be limited in the coffee market. Speculative short-players won't want to get too brave at this time of year. First support comes in at the contract low of 58.80 cents. First resistance is now seen at 63.00 cents. July N.Y. cocoa closed $39 lower today, at $964. More technical damage was inflicted by the bears today as prices hit another fresh three-week low, as there was follow-through selling from Friday's gap-lower trade. The bears are in control, but the market is short-term overdone on the downside at present. Next support comes in at $955. First resistance is now seen at $1,009--today's high. July cotton closed 32 points lower at 40.72 cents today. Prices hit a fresh contract low just yesterday, in the wake of a bearish USDA cotton consumption report last Friday. Cotton is in a strong bear market and any rebounds will be selling opportunities for the bears--for now. My bias is still that we are not that far from a bottoming process. Next support lies at 39.95 cents--the contract low. First resistance is seen around 42.00 cents. Recently, I put December New York cotton futures on my "Radar Screen" for a potential long-side trade in the coming weeks. But first (and importantly), this market has to me show solid strength, including some basing activity at these lower levels. July orange juice futures closed 90 points higher today, at 80.40 cents. Trading has turned volatile lately, but it still favors the bullish camp. Bulls pushed prices to a fresh three-month high just last Friday. Prices are still in an uptrend on the daily bar chart--albeit a choppy one. Next resistance is now seen at 82.00 cents. Next support now comes in at 79.00 cents. July lumber futures closed the limit of $10.00 lower today, at $322.30. "What goes up, must come down." A V-Top reversal is playing out in lumber. I still would be surprised if the upside fireworks are over. The market was way overdone on the upside and this still could be just a big correction before still-higher highs are scored. Expect more volatility in the near term--on the upside and downside. The next upside objective for the bulls is the $350.00 level. First support is seen at $315.00. METALS: August COMEX gold futures plummeted by $7.70, to 4267.40 an ounce. Heavy long liquidation and stop-loss selling were featured in the pit. The recent Commitments of Traders report showed the small speculators had loaded up on the long side of gold futures recently. Today, those weak longs were coughing up their positions. News wire reports could offer no fundamental reason for the collapse in prices. Technically, once gold dropped to near the $270 level, basis August COMEX futures, the door was open for stop-loss selling and general long liquidation. A big V-Top reversal has now formed and played out on the daily bar chart. Pit reports said there was not much fresh short selling interest Wednesday. Once again, the gold bulls mustered the strength to show an impressive upside move, only to be kicked in the teeth when a lack of follow-through buying interest at higher levels prompted a price vacuum on the downside. There is a support level around the $264 area, basis August futures. If that level gives way, then the next support comes in at the $260 area. This market is now short-term oversold, on a technical basis. Next resistance on the upside is seen at the $275 area. For bulls to really get back on their feet, they must push prices back above the $290 level. If volatility persists, it will favor the bulls. July silver closed off $0.095 today, at $4.445 an ounce. Like gold, long liquidation and stop-loss selling hit silver today, and it was prompted by the sell of in gold. Prices have now backed well off last week's high and could be forming a V-Top reversal on the daily bar chart. Bulls today lost much of their momentum they had gained that saw prices push to a three-month high. Still, the recent increase in volatility is suggestive of a bottoming process in silver. Next support is seen at $4.40. First resistance is now seen at $4.50. July N.Y. copper closed off 45 points today, at 76.25 cents. The sell off in the precious metals has impacted copper this week. While this deals the bulls a near-term setback, the higher volatility at lower levels does favor the bulls. My bias is still that the lows are in place for copper. Next support is seen at 75.00 cents. Next resistance is seen at 79.00 cents. ENERGIES: July crude closed off $0.14 at $28.52 today. Prices this week are correcting from the big beating they took late last week. Bears still have the edge, and in fact a bearish flag or pennant pattern may be forming on the daily bar chart. Next resistance is seen at 29.50. Next support lies at $28.00. July heating oil closed 2 points lower today, at .7784. Prices are still correcting downward after they last week hit a fresh eight-month high. Bulls still have the edge. Next resistance is seen at 80.00 cents. Next support is seen at 77.00 cents. July unleaded gasoline closed 139 points lower at .9450 today. Prices closed near the session low as the bears gain confidence. A rare and usually bearish broadening formation is developing on the daily bar chart. This increase in volatility at higher price levels suggests a topping process in the market. Next resistance is seen at $1.00. First support is seen at $.9300. July natural gas closed 20 cents higher at $4.01 today. Prices today saw a decent rebound from a technically oversold condition. The market is still oversold on a short-term technical basis. Prices hit a fresh nine-month low just Tuesday. Bears still have the big advantage. Next support is seen at $3.67--today's low. First resistance is seen at $4.25. STOCKS, FINANCIALS, CURRENCIES: The June Euro currency closed 10 points higher at .8567 today. Bears are in control as prices hover near the recent for-the-move low. In fact, a bearish pennant pattern may be forming on the daily bar chart. Measuring implications of that pattern, should a downside breakout occur, point to losses to the .8300 area. Bulls' only hope is that last week's low of .8502 can hold the losses. Next support is now seen at .8502. Next resistance is seen at .8650. The June Japanese yen closed 19 points lower at .8328 today. Prices pushed to a fresh two-month high last Thursday and are this week consolidating those recent gains. The recent push higher moved prices out above the congestion area that had trapped prices for about two and one-half months. Bulls still need to show some more upside strength before I am confident in calling this an upside "breakout." Next resistance now lies at the .8433 level. First support is now seen at the .8200 level. The June Swiss franc closed 8 points higher at .5625 today. Like the Euro, bulls want to see last week's low hold up before they can gain any momentum at all. And like the Euro, a bearish pennant pattern could be forming on the daily bar chart. Measuring implications on a confirmation of the pattern point to losses to the .5400 area. A 5-month-old accelerating downtrend line is in place on the daily bar chart. Next support is seen at the .5588 level--last week's low. First resistance comes in at the .5700 level. The June Australian dollar futures closed 45 points lower at .5124 today. Prices pushed to a fresh 3-month high last week and bulls can argue we are seeing corrective consolidation this week. Still, downside price action last week penetrated on the downside and negated a seven-week-old uptrend line on the daily bar chart. Bulls should be worried about this. They need to show some fresh momentum soon. First support is seen at .5069. First resistance is now seen at .5225. The June Canadian dollar closed 33 points lower today, at .6469. Prices closed near the session low. If prices drop below the May low of .6425, then bears will be on a level playing field with the bulls. This currency had been near recent historic lows and I do not think there is much more downside. In fact, a wedge pattern may be forming on the daily bar chart that, if confirmed, would likely favor the bulls. Next resistance is seen at the .6535 level. First support is now seen at the .6450 level. The June British pound closed 42 points higher at 1.4264. Prices are rebounding after last Thursday prices fell below the early April low of 1.4112. If there would have been follow-through selling, then the door would have been open to steeper losses. If the losses can be contained and prices rebound, one could still argue that price action the past few weeks has been a "basing" before prices eventually turn north. Next resistance is seen at the 1.4300 level. Next support now comes in at the 1.4150 level. The June U.S. dollar index closed 3 points higher at 118.31 today. Bulls are still in firm control. In fact, a bullish pennant pattern could be forming on the daily bar chart. The index last week pushed to a fresh multi-month high. If bulls can push prices above and have a close above the 119.00 level, then there is likely significantly more upside potential to this rally, even though the index is still a bit short-term overbought, technically. There is stiff resistance, basis the longer-term charts, at the 119.00 area. Next resistance lies at the 119.00 area. First support is seen at the 117.50 area. September U.S. T-bonds closed 7/32 higher today at 98 20/32. The market is consolidating at lower levels. Bears still rule. The next upside objective for the bulls is the par level--100 even. But any near-term rebound will be corrective in nature only, until prices can push above the 102 area. Prices pushed to a six-month low just recently. First support at 98 6/32. The September U.S. T-note closed up 4.5 (32nds) today at 102.00.5. Prices fell to a multi-month low just recently as bears rule. Severe technical damage has been inflicted recently. First support is seen at the 101.30.0 level. First resistance is seen at 102.30.5 level. September Nasdaq futures closed 72.00 lower at 1805.00 today. Bulls are losing technical ground that they had gained recently with the push above the 2,000 level. It just shows how the stock indexes will not let either the bulls or the bears have much of an edge, before prices reverse. First resistance is now seen at 2,000. First support is seen at the 1,750 area. September S&P 500 futures closed 18.70 lower at 1260.10. We are seeing some consolidation the past few days after prices hit a fresh three-month high last week. Bulls are still encouraged by the continuing uptrend off the March low, but they do need to stop the slide lower seen the past few sessions. My bias is still that any recovery in the stock market and the stock indexes won't be dramatic, but a slower grind higher, with fits and starts. First resistance is now seen at 1300.00. First support is now seen at the 1240.00 area. Daily Extreme Commentary is brought to you by GLOBALcharts, INO.com's end-of-day charting software for Futures, Futures Options and Optionable Stocks. http://www.globalcharts.com Search the INO Store - http://store.ino.com/ _____________________________________________________________________ T O P N E W S _____________________________________________________________________ STOCKS Japan Stocks Review: Nikkei -2% on Deutsche downgrades/Nasdaq fall http://news.ino.com/summary/?id=25601 Add2: US Equities Review: DJIA closes below 11,000 on tech selloff http://news.ino.com/summary/?id=25599 UK Stocks Review: Weak tech stocks push FTSE-100 below 5,800 http://news.ino.com/summary/?id=25607 FOREX US FX Review: Dollar remains mixed; traders hunting for clues http://news.ino.com/summary/?id=25603 Asia FX Review: Euro/yen comes under pressure on broad selling http://news.ino.com/summary/?id=25600 Europe FX Review: US fund buying limits euro's losses http://news.ino.com/summary/?id=25602 CREDIT US Credit Review: Only modest gains despite stock market slide http://news.ino.com/summary/?id=25598 Europe Credit Review: Bond prices range-bound despite firm M3 http://news.ino.com/summary/?id=25604 Japan Credit Review: June ends up slightly in range-bound trades http://news.ino.com/summary/?id=25606 COMMODITIES US Futures Summary: Gasoline, gold hammered; natural gas soars http://news.ino.com/summary/?id=25605 EXCHANGES NYBOT Announces New Margin Requirements http://news.ino.com/press/?release=24487 KCBT Value Line Margin Changes Announced http://news.ino.com/press/?release=24486 Pacific Exchange To Trade Options on Instinet Group and USEC http://news.ino.com/press/?release=24485 60% Of IPE Holdings Shares Tendered To IntercontinentalExchange http://news.ino.com/press/?release=24484 Simon Heale Appointed London Metal Exchange Chief http://news.ino.com/press/?release=24483 ____________________________________________________________________________ E X T R E M E F U T U R E S ____________________________________________________________________________ Updated every 10 minutes around the clock. More at http://quotes.ino.com/analysis/extremes/futures/ WINNERS NGN1 Henry Hub Natural Gas Jul 2001 3.981 0.200 +5.25 ZM1 U.S. Treasury 6% Bond Jun 2001 103 184/256 4 15/32 +4.50 LHQ1 Lean Hogs Aug 2001 63.300 1.600 +2.59 XHQ1 Lean Hogs Aug 2001 63.27 1.57 +2.54 DAU1 BFP Milk Sep 2001 15.60 0.38 +2.50 HGK2 Copper May 2002 0.7905 0.0110 +1.39 OJN1 Orange Juice Froz. Conc. #1 Jul 2001 80.40 1.00 +1.26 MQU1 Mexican Peso Sep 2001 9.4652 0.1085 +1.16 RRN1 Rough Rice Jul 2001 5.660 0.060 +1.07 KWN2 Wheat Jul 2002 346 3 1/2 +1.02 LOSERS XKM1 Gold Jun 2001 265.7 -11.9 -4.34 NGJ4 Henry Hub Natural Gas Apr 2004 3.780 -0.159 -4.21 NDM1 NASDAQ 100 Index Jun 2001 1786.00 -70.50 -3.80 CCN1 Cocoa Jul 2001 964 -38 -3.79 HUM1 New York Harbor Unleaded Gasoline Jun 20 1.0412 -0.0378 -3.51 XYU1 Silver 1,000 oz. Sep 2001 448.2 -15.8 -3.42 KIM1 Kilo Gold Jun 2001 263 -9 -3.31 GCZ2 Gold Dec 2002 276 -9.2 -3.24 LBU1 Random Length Lumber Sep 2001 305.40 -10.00 -3.17 PNU1 Propane Sep 2001 0.5050 -0.0125 -2.42 ____________________________________________________________________________ E X T R E M E S T O C K S ____________________________________________________________________________ Updated every 10 minutes around the clock. More at http://quotes.ino.com/analysis/extremes/stocks/ WINNERS RHT RICHTON INTL 35.60 6.50 +22.41 BCR BARD (C.R.) 56.09 10.09 +21.93 BAU BACOU USA 28.00 4.60 +19.66 TARO TARO PHARMACEUTICAL IND 66.09 10.39 +18.65 IPIC INTERNEURON PHARMACEUTICALS 6.74 1.01 +17.84 ANST ANSOFT CORP 17.37 2.14 +14.04 MRVT MIRAVANT MEDICAL TECHNOLOGIES 12.24 1.49 +13.91 TT TRANSTECHNOLOGY 8.75 1.05 +13.29 VIP OPEN-JOINT/VIMPEL COMMUN ADS 17.20 1.90 +12.62 TELM TELLIUM INC 23.02 2.49 +11.66 LOSERS UNEWY UNITED BUSINESS MEDIA PLC 10.69 -9.41 -46.82 EMEX EMEX CORP 16.98 -9.21 -34.89 ASFI ASTA FUNDING 8.71 -2.55 -25.50 AEGN AEROGEN 5.20 -1.74 -25.04 SABA SABA SOFTWARE 10.87 -3.08 -21.95 WEBX WEBEX COMMUNICATIONS INC 15.00 -4.01 -21.12 TIVO TIVO INC 7.25 -1.83 -20.13 BRZZ BRIAZZ INC 5.40 -1.34 -19.73 ADTK ADEPT TECHNOLOGY 10.06 -2.44 -19.15 FFIV F5 NETWORKS 10.39 -2.41 -18.95 FREE MANAGED FUTURES & IRA RETIREMENT KIT http://www.ino.com/specials/icm/ $$$$ Foreign Exchange Traders! INO.com now has $$$$ real-time cross rates, FREE online at: $$$$ http://quotes.ino.com/exchanges/forex-cross/ _____________________________________________________________________ T H A N K Y O U _____________________________________________________________________ Thank you for subscribing to the Extreme Markets Daily Digest from INO.com ( http://www.ino.com/ ). If you want to subscribe to our other email services, or would like to modify your profile please visit http://www.ino.com/email/. To subscribe a friend, visit: http://www.ino.com/email/ To unsubscribe, visit: http://www.ino.com/email/remove/[email protected]&list=evening -- Copyright 1998-2001 INO.com. All Rights Reserved.
{ "pile_set_name": "Enron Emails" }
642 F.Supp.2d 614 (2009) Ernest HUIZAR, Plaintiff, v. Michael J. ASTRUE, Commissioner of the Social Security Administration, Defendant. Civil Action No. SA-08-CA-103-XR. United States District Court, W.D. Texas, San Antonio Division. June 29, 2009. *616 Margaret M. Maisel, Tinsman & Sciano, Inc., San Antonio, TX, for Plaintiff. Joseph Cuauhtemoc Rodriguez, Assistant United States Attorney, San Antonio, TX, for Defendant. ORDER XAVIER RODRIGUEZ, District Judge. On this date, the Court considered the Report and Recommendation filed by the Magistrate Judge, and Plaintiff's objections thereto, concerning Plaintiff's appeal of the Commissioner's decision to deny him Social Security disability benefits. Where the Report and Recommendation has been objected to, the Court reviews the Magistrate Judge's recommended disposition de novo pursuant to Federal Rule of Civil Procedure 72 and 28 U.S.C. § 636(b)(1). After careful consideration, the Court accepts the Magistrate Judge's recommendation to reverse and remand for further proceedings. Introduction On May 18, 2005, Plaintiff filed a Title II application for disability insurance benefits.[1] Plaintiff also filed a Title XVI application for supplemental security income on May 18, 2005.[2] On August 17, 2007, the Administrative Law Judge (ALJ) denied Plaintiff's claims for disability insurance benefits and supplemental security income at step five, finding that Plaintiff could work the jobs of night watchman, security guard, gate guard, and school bus monitor, available in significant numbers throughout the national economy.[3] Plaintiff appealed, arguing that the ALJ erred by: (1) not following the procedure for considering vocational expert (VE) testimony set forth by SSR 00-4p; (2) considering part-time work (school bus monitor job) in deciding whether Plaintiff could perform other work significantly available in the national economy; and (3) not ordering a consultative psychological examination.[4] The Magistrate Judge recommended reversal and remand of the ALJ's denial of Plaintiff's application for disability insurance benefits and supplemental security income. Under Plaintiff's first and second objections, the Magistrate Judge agreed the ALJ did not comply with SSR 00-4p in regards to the night watchman, security guard, and gate guard jobs but stated that the ALJ did not *617 err in considering the school bus monitor job.[5] The Magistrate Judge also recommended that the ALJ should consider the necessity of a consultative psychological examination on remand.[6] The Commissioner objects to the Magistrate Judge's recommendation to remand on the grounds that the school bus monitor job exists in significant numbers in the national economy such that remand to correct any errors identified by the Magistrate Judge would be unnecessary.[7] Plaintiff responds that, because the ALJ's "significant number" decision was based on a finding that Plaintiff could work any of four different jobs (night watchman, security guard, gate guard, and school bus monitor), any decision by the Court regarding whether the school bus monitor job alone satisfies the "significant number" standard would constitute an improper post hoc rationalization for affirming the decision of the Commissioner.[8] Plaintiff further argues that the Court should reject the Magistrate Judge's recommendation that Plaintiff could work as a school bus monitor.[9] Jurisdiction This Court has jurisdiction to review the Commissioner's final decision as provided by 42 U.S.C. § 405(g).[10] Administrative Proceedings This is an action to review a decision of the Commissioner of the Social Security Administration. Plaintiff originally filed applications for disability insurance benefits and supplemental security benefits on May 18, 2005, alleging disability since May 30, 2003.[11] The claims were denied initially on August 10, 2005 and upon reconsideration on December 2, 2005.[12] Plaintiff then filed a written request for a hearing on December 15, 2005.[13] On June 20, 2007, Plaintiff appeared and testified in front of the ALJ at a hearing in San Antonio, Texas.[14] The ALJ denied disability benefits to the Plaintiff on August 17.[15] On December 11, 2007, the Appeals Council concluded no basis existed to grant review of the ALJ's decision.[16] Plaintiff appealed the Appeals Council's decision, and the Magistrate Judge issued a Report and Recommendation on August 13, 2008.[17] The Commissioner objected to the Report and Recommendation, and Plaintiff filed a response to the Commissioner's objections.[18] Analysis A. Standard of Review In reviewing the Commissioner's decision denying disability benefits, the reviewing court is limited to determining whether substantial evidence supports the decision and whether the Commissioner applied the proper legal standards in evaluating the evidence.[19] "Substantial evidence is more than a scintilla, less than a preponderance, and is such relevant evidence as a reasonable mind might accept *618 as adequate to support a conclusion."[20] Substantial evidence "must do more than create a suspicion of the existence of the fact to be established, but `no substantial evidence' will be found only where there is a `conspicuous absence of credible choices' or `no contrary medical evidence.'"[21] If the Commissioner's findings are supported by substantial evidence, then they are conclusive and must be affirmed.[22] In reviewing the Commissioner's findings, a court must carefully examine the entire record, but refrain from reweighing the evidence or substituting its judgment for that of the Commissioner.[23] Conflicts in the evidence and credibility assessments are for the Commissioner and not for the courts to resolve.[24] Four elements of proof are weighed by the courts in determining if substantial evidence supports the Commissioner's determination: (1) objective medical facts, (2) diagnoses and opinions of treating and examining physicians, (3) the claimant's subjective evidence of pain and disability, and (4) the claimant's age, education and work experience.[25] 1. Entitlement to Benefits Every individual who is insured for disability benefits, has not reached retirement age, meets certain income and resource requirements, has filed an application for benefits, and is under a disability, is eligible to receive disability insurance benefits.[26] Every individual who meets certain income and resource requirements, has filed an application for benefits, and is under a disability, is eligible to receive supplemental security income benefits.[27] The term "disabled" or "disability" means the inability to "engage in any substantial gainful activity by reason of any medically determinable physical or mental impairment which can be expected to result in death or which has lasted or can be expected to last for a continuous period of not less than twelve months."[28] A claimant shall be determined to be disabled only if her physical or mental impairment or impairments are so severe that she is unable to not only do her previous work, but cannot, considering her age, education, and work experience, participate in any other kind of substantial gainful work that exists in significant numbers in the national economy, regardless of whether such work exists in the area in which the claimant lives, whether a specific job vacancy exists, or whether the claimant would be hired if she applied for work.[29] 2. Evaluation Process and Burden of Proof Regulations set forth by the Commissioner prescribe that disability claims are to be evaluated according to a five-step process.[30] A finding that a claimant is disabled or not disabled at any point in the *619 process is conclusive and terminates the Commissioner's analysis.[31] The first step involves determining whether the claimant is currently engaged in substantial gainful activity.[32] If so, the claimant will be found not disabled regardless of her medical condition or her age, education, or work experience.[33] The second step involves determining whether the claimant's impairment is severe.[34] If it is not severe, the claimant is deemed not disabled.[35] In the third step, the Commissioner compares the severe impairment with those on a list of specific impairments.[36] If it meets or equals a listed impairment, the claimant is deemed disabled without considering his or her age, education, or work experience.[37] If the impairment is not on the list, the Commissioner, in the fourth step, reviews the claimant's residual functional capacity (RFC) and the demands of her past work.[38] If the claimant is still able to do her past work, the claimant is not disabled.[39] If the claimant cannot perform her past work, the Commissioner moves to the fifth and final step of evaluating the claimant's ability, given her residual capacities, age, education, and work experience, to do other work.[40] If the claimant cannot do other work, she will be found disabled. The claimant bears the burden of proof at the first four steps of the sequential analysis.[41] Once the claimant has shown that she is unable to perform her previous work, the burden shifts to the Commissioner to show that there is other substantial gainful employment available that the claimant is not only physically able to perform, but also, taking into account her exertional and nonexertional limitations, able to maintain for a significant period of time.[42] If the Commissioner adequately points to potential alternative employment, the burden shifts back to the claimant to prove that she is unable to perform the alternative work.[43] B. Findings and Conclusions of the ALJ In the instant case, the ALJ reached his decision at step five of the evaluation process. At step one, the ALJ found Plaintiff had not engaged in substantial gainful employment since the alleged onset date, May 30, 2005.[44] At step two, the ALJ found Plaintiff had the medically determinable impairment of right hand ulnar nerve palsy, a "severe" impairment within the meaning of the Regulations.[45] The ALJ also considered Plaintiff's alleged impairments of diminished mental capacity, illiteracy, and depression, but found these alleged impairments to be "non-severe."[46]*620 At step three, the ALJ found the Plaintiff's impairments did not meet or medically equal any of the listed impairments in 20 C.F.R. Part 404, Subpart P, Appendix 1.[47] At step four, the ALJ concluded that Plaintiff is unable to perform past relevant work but has the RFC to perform unskilled light exertion work.[48] The ALJ determined the Plaintiff had full use of the left upper extremity but was limited to using his right arm as a helper hand, although he retained the capacity to sign his name with the right upper extremity.[49] At step five, the ALJ, relying on VE testimony, concluded that Plaintiff had the requisite RFC to perform other work found in significant numbers in the economy and therefore was not "disabled" as defined in the Social Security Act.[50] Specifically, the ALJ found Plaintiff could work as a night watchman, security guard, gate guard, and/or school bus monitor.[51] C. Recommendation of the Magistrate Judge On appeal to this Court, Plaintiff raised three objections to the ALJ's decision: (1) the ALJ erred by not following the procedure for considering VE testimony set forth by SSR 00-4p; (2) the ALJ erred in considering whether Plaintiff could work as a school bus monitor because school bus monitor positions are only available on a part-time basis; and (3) the ALJ erred in not ordering a consultative psychological examination.[52] Plaintiff also requested that the ALJ be instructed on remand to consider a report reflecting a recent psychological evaluation of Plaintiff. The Magistrate Judge recommended reversal and remand, finding the ALJ erred in not following the procedure set forth by SSR 00-4p when the ALJ did not obtain a reasonable explanation for a conflict between the vocational expert testimony and the Dictionary of Occupational Titles (DOT).[53] The Magistrate Judge found no error on Plaintiff's second and third arguments, but stated the ALJ should consider the new psychological report on remand.[54] D. Objections The Commissioner objects to the remand of the case.[55] The Commissioner asserts that the ALJ's determination that Plaintiff can work as a school bus monitor is unaffected by the ALJ's failure to follow SSR 00-4p. The Commissioner contends that the Court can affirm the Commissioner's decision because the school bus monitor job alone is available in significant numbers in the national economy; therefore substantial evidence exists for the District Court to affirm the ALJ's decision under step five.[56] Plaintiff responds that, because the ALJ's "significant number" decision was based on a finding that Plaintiff could work any of four different jobs (night watchman, security guard, gate guard, and school bus monitor), any decision by the Court regarding whether the school bus monitor job alone satisfies the "significant number" standard would constitute an improper *621 post hoc rationalization for affirming the decision of the Commissioner.[57] Plaintiff further argues that the Court should reject the Magistrate Judge's recommendation that Plaintiff could work as a school bus monitor. E. Analysis 1. Whether the ALJ erred in failing to comply with SSR 00-4p in considering the security guard, gate guard, and night watchman positions "When a VE or VS provides evidence about the requirements of a job or occupation, the adjudicator has an affirmative responsibility to ask about any possible conflict between that VE or VS evidence and information provided in the DOT. In these situations, the adjudicator will: Ask the VE or VS if the evidence he or she has provided conflicts with information provided in the DOT; and if the VE's or VS's evidence appears to conflict with the DOT, the adjudicator will obtain a reasonable explanation for the apparent conflict."[58] Plaintiff argues that the Magistrate Judge failed to comply with SSR00-4p in considering the VE's testimony that Plaintiff could work as a security guard, gate guard, night watchman, or school bus monitor. The Magistrate Judge concluded that the ALJ failed to comply with SSR 00-4p with respect to his inquiries regarding the security guard, gate guard, and night watchman positions, but that the ALJ did not so err in his consideration of the school bus monitor position. Neither party takes issue with the Magistrate Judge's conclusion regarding the security guard, gate guard, and night watchman positions. Therefore, the Court reviews this portion of the Magistrate Judge's determination to ensure it is neither clearly erroneous nor contrary to law.[59] The VE classified each of the three jobs as unskilled labor.[60] The DOT classifies these three jobs each as having a special vocational preparation factor ("SVP") of 3.[61] SSR 00-4p states unskilled work corresponds to a SVP of 1-2 and semi-skilled work corresponds to a SVP of 3-4.[62] The DOT classifies the jobs of night watchman, security guard, and gate guard as semi-skilled work. An apparent conflict thus exists between the DOT and the VE's testimony as to the skill level required for each job. Likewise, a possible conflict exists between the VE's testimony that Plaintiff could work as a night watchman, gate guard, or security guard, despite having very limited use of one arm, and the DOT, which states that each job requires occasional to frequent reaching and handling. The ALJ did not articulate or attempt to elicit a reasonable explanation for the conflicts. Nor did the VE testify regarding any such apparent conflicts. Therefore, the Magistrate Judge's conclusion that the ALJ failed to comply with SSR 00-4p is neither clearly erroneous nor contrary to law. On remand, the ALJ is instructed to conduct proceedings in compliance with SSR 00-4p in determining whether Plaintiff could work as a night watchman, security guard, and gate guard. *622 2. Whether the ALJ erred by concluding at step five that Plaintiff could work as a school bus monitor Plaintiff argues that the ALJ improperly considered at step five whether Plaintiff could work as a school bus monitor because: (a) the ALJ failed to comply with SSR 00-4p in considering the position, and (b) Plaintiff claims the position is only available as part-time work and that part-time work should not be considered at step five.[63] a. SSR 00-4p Plaintiff argues that the VE's conclusion that Plaintiff could work as a school bus monitor, despite Plaintiff's very limited use of one arm, conflicts with the DOT regarding the use of arms in that the DOT does not include any information about jobs compatible with full use of one arm and very limited use of the other. Therefore, Plaintiff argues that a conflict existed between the VE's testimony and the DOT such that the ALJ should have followed the procedure set forth by SSR 00-4p. The Magistrate Judge concluded that Plaintiff failed to present evidence that the VE's testimony was inconsistent with the DOT specifications for the school bus monitor position; therefore, the ALJ did not fail to comply with SSR 00-4p.[64] Plaintiff objects to the Magistrate Judge's conclusion.[65] The Court therefore reviews Plaintiff's arguments de novo.[66] Substantial evidence supports the ALJ's implicit conclusion that the VE's testimony does not conflict with the DOT. The DOT describes a monitor's duties as follows: Monitors conduct of students on school bus to maintain discipline and safety: Directs loading of students on bus to prevent congestion and unsafe conditions. Rides school bus to prevent altercations between students and damage to bus. Participates in school bus safety drills. May disembark from school bus at railroad crossings and clear bus across tracks.[67] Plaintiff argues that prevention of altercations between students requires that a monitor have the full use of both arms. Plaintiff ignores that this duty is modified by the phrase "[r]ides school bus to" prevent altercations. The phrase implies that the monitor's mere presence is intended to prevent altercations. Confirming this reading, the DOT further explains that a school bus monitor is not required to reach, handle, crawl, climb, or feel.[68] Because no apparent conflict exists between the DOT and the VE's testimony, the ALJ did not err by failing to follow SSR 00-4p with respect to the school bus monitor position. b. Part-time work The Magistrate Judge concluded that substantial evidence supports the ALJ's decision that school bus monitors typically work full time,[69] and therefore it was proper for the ALJ to consider the position at step five.[70] Neither party challenges the Magistrate Judge's conclusion, so the Court reviews whether the finding is clearly erroneous or contrary to law. *623 The Magistrate Judge based her decision on the following points: (1) neither the description in the DOT for school bus monitor nor the VE's testimony suggest the work is performed on a part-time basis; (2) the VE testified during the hearing that light exertion work included "standing up to six to eight hours in a workday," described the work of school bus monitor as light exertion work according to the DOT, and opined that plaintiff would be capable of performing such work; and (3) no evidence existed to the contrary. The cited testimony regarding light exertion work was not intended to comment on whether a school bus monitor typically works a part-time job; rather, the VE was merely setting the maximum parameter of exertion for each of the jobs under consideration: ALJ: Have you reviewed the evidence in this case? VE: I have. ALJ: Been present and heard the testimony? VE: I have. ALJ: Would you give us your understanding of the classifications of work activity so far as strength demands are concerned? VE: Yes. We're talking sedentary when we mean up to—sitting up to six to eight hours and occasionally lifting up to 10 pounds. When we speak of light, we're speaking of standing up to six to eight hours in a workday and lifting occasionally 10 pounds and frequently—occasionally 20 pounds and frequently 10 pounds. And medium is occasionally lifting 50 pounds and frequently lifting 25.[71] This is not evidence suggesting that school-bus monitors work full-time. No evidence was presented suggesting that school bus monitors typically work full time. Therefore, substantial evidence does not support the ALJ's decision, and the Magistrate Judge's conclusion was clearly erroneous.[72] On remand, the ALJ is instructed to conduct further factual development regarding whether and the extent to which the job of school bus monitor is available as a full-time position in the national and local economies. 3. Whether the ALJ should have ordered a consultative psychological examination Plaintiff argues in his appeal brief that the ALJ should have granted his request for a consultative psychological examination. During the administrative hearing, Plaintiff's attorney requested "a consultative examination" to examine Plaintiff's mental acumen and alleged functional illiteracy, in the event the ALJ did not find Plaintiff disabled based on the evidence in the record at the time of the hearing.[73] The ALJ denied Plaintiff's request. *624 The regulations provide that "[a] consultative examination may be purchased when the evidence as a whole, both medical and nonmedical, is not sufficient to support a decision on your claim."[74] The Magistrate Judge found that substantial evidence supported the ALJ's decision not to order a consultative examination. Plaintiff testified that he completed seventh grade but dropped out of eighth grade. Plaintiff alleged that he has difficulties in reading and writing, and a Social Security Administration representative's notes indicate that Plaintiff has problems writing, is illiterate, and probably has low mental functioning. Nonetheless, Plaintiff stated that he can read small words, that he was in regular, not special education classes, and that he dropped out of school not due to learning difficulties but because he was being bullied. Plaintiff further testified that he signed his disability application. The field representative who conducted a face-to-face interview with Plaintiff observed Plaintiff to have no difficulty in reading, writing, understanding, or concentrating during the interview. Plaintiff holds a driver's license, suggesting that his reading and writing abilities are sufficient enough to have read and passed the Texas driver's certification test. There was significant evidence available from which the ALJ could make a decision regarding Plaintiff's claim. Neither party objected to the Magistrate Judge's conclusion, and the Court accepts the Magistrate Judge's recommendation as neither clearly erroneous nor contrary to law. 4. Whether the ALJ should consider Plaintiff's new medical report on remand On appeal, Plaintiff submitted to the Court a March 2008 report of a psychological evaluation of Plaintiff, which purports "to establish current levels of intellectual, adaptive, academic, and psychological functioning."[75] The report, which was completed after this appeal was filed, was not presented to the ALJ. Plaintiff requests that the ALJ remand this case with instructions to consider the newly submitted evidence. The Court may "order additional evidence to be taken ... upon a showing that there is new evidence which is material and that there is good cause for the failure to incorporate such evidence into the record in a prior proceeding."[76] The Magistrate Judge recommended that the ALJ be instructed to consider "the relevance of and the weight to give the report, if any, as well as wether it might be necessary to seek a consultative psychological evaluation at this time."[77] The Commissioner addressed the recommendation in one sentence in his objections, stating: "Finally, given that the Magistrate Judge's remand recommendation for consideration of Plaintiff's additional consultative report was clearly contingent on the unnecessary remand for further development of the vocational evidence, the entirety of the Commissioner's final decision should be affirmed."[78] The Court has concluded that remand is appropriate, therefore the Commissioner's argument is inapplicable. *625 Because the Court is remanding this case for further factual development on other grounds, and because the Commissioner objected to the Magistrate Judge's conclusion only in the event that the Court found remand otherwise inappropriate, the Court accepts the Magistrate Judge's recommendation. On remand, the ALJ shall consider the relevance of and the weight to give the report, if any, as well as whether it might be necessary to seek a consultative psychological evaluation at this time. Conclusion For the foregoing reasons, the recommendation of the Magistrate Judge is accepted, and the decision of the Commissioner is REVERSED and REMANDED. On remand, the ALJ is instructed to: (1) conduct proceedings in compliance with SSR 00-4p in determining whether Plaintiff could work as a night watchman, security guard, and gate guard; (2) conduct further factual development regarding whether and the extent to which the job of school bus monitor is available as a full-time position in the national and local economies; and (3) consider the relevance of and the weight to give the report, if any, as well as whether it might be necessary to seek a consultative psychological evaluation at this time. It is so ORDERED. REPORT AND RECOMMENDATION OF THE UNITED STATES MAGISTRATE JUDGE PAMELA A. MATHY, United States Magistrate Judge. TO: Xavier Rodriguez United States District Judge Pursuant to the informal referral in the above-styled and numbered cause of action to the undersigned United States Magistrate Judge and consistent with the authority vested in United States Magistrate Judges under the provisions of 28 U.S.C. Section 636(b)(1)(B) and Rule 1(d) and (h) of the Local Rules for the Assignment of Duties to United States Magistrate Judges in the Western District of Texas, the following report is submitted for your review and consideration. I. JURISDICTION The Court has jurisdiction under 42 U.S.C. Sections 405(g) and 1383(c)(3). II. PROCEDURAL HISTORY This is an action to review a decision of the Commissioner of Health and Human Services under Section 205(g) of the Social Security Act, 42 U.S.C. Section 405(g). Ernest Huizar initiated this action pursuant to 42 U.S.C. Section 405(g) seeking review of the determination of Michael J. Astrue, the Commissioner of the Social Security Administration ("SSA"), that plaintiff is not disabled and not entitled to receive disability insurance benefits or supplemental security income benefits. Plaintiff protectively filed applications for disability insurance benefits and supplemental security benefits on May 18, 2005, alleging disability since May 30, 2003.[1] The Social Security Administration denied benefits initially on August 10, 2005, and upon reconsideration on December 2, 2005.[2] On June 20, 2007, an administrative law judge ("ALJ") held a hearing, at which plaintiff was represented by an attorney.[3] The ALJ issued a written decision on August 17, 2007, denying benefits on the ground that plaintiff was not disabled under the Act.[4] On December 11, *626 2007, the Appeals Council concluded that no basis existed to grant review of the ALJ's decision, and the ALJ's determination became the final decision of the Commissioner.[5] Plaintiff now appeals that determination. III. ISSUES 1. Whether substantial evidence supports the Administrative Law Judge's decision that plaintiff was not disabled under the Social Security Act. 2. Whether the decision comports with relevant legal standards. IV. STANDARD OF REVIEW In reviewing the Commissioner's decision denying disability or supplemental security income benefits, the Court is limited to a determination of whether the decision is supported by substantial evidence and whether the Commissioner applied the proper legal standards in evaluating the evidence.[6] Substantial evidence is more than a scintilla, less than a preponderance and is such relevant evidence as a reasonable mind might accept as adequate to support a conclusion.[7] It must do more than create a suspicion of the existence of the fact to be established, but "no substantial evidence" will be found only where there is a conspicuous absence of credible choices or no contrary medical evidence.[8] If the Commissioner's findings are supported by substantial evidence, they are conclusive and must be affirmed.[9] "The court does not re-weigh the evidence in the record, try the issues de novo, or substitute its judgment for the Commissioner's, even if the evidence weighs against the Commissioner's decision."[10] Conflicts in the evidence are for the Commissioner to resolve.[11] Four elements of proof are weighed in determining if substantial evidence supports the Commissioner's determination: (1) objective medical facts, (2) diagnoses and opinions of treating and examining physicians, (3) the claimant's subjective evidence of pain and disability, and (4) the claimant's age, education and work experience.[12] V. ALJ'S FINDINGS AND PLAINTIFF'S CONTENTIONS At hearing, plaintiff, through counsel, amended the alleged disability onset date to May 30, 2005.[13] The ALJ found that on the disability onset date, plaintiff was a thirty-nine year old male,[14] with a marginal seventh grade education [15] and past work in construction.[16] The ALJ found plaintiff's earnings record showed he had acquired sufficient quarters of coverage to remain insured through December 31, 2010, and had to establish disability on or before that date in order to be entitled to disability insurance benefits.[17] *627 The Social Security Administration has established a sequential five-step test to determine whether an individual has a compensable disability.[18] At the first step, the ALJ found plaintiff had not engaged in substantial gainful employment since May 30, 2005, the alleged onset date.[19] Citing 20 C.F.R. §§ 404.1520(c) and 416.920(c) as well as Stone v. Heckler,[20] the ALJ found at the second step that plaintiff had the medically determinable impairment of right hand ulnar nerve palsy, an impairment that is "severe" within the meaning of the Regulations.[21] In addition, the ALJ considered plaintiff's alleged impairments of diminished mental capacity, illiteracy, and depression, finding these alleged impairments to be "nonsevere."[22] In making the nonseverity determination at step two, the ALJ considered that plaintiff's counsel requested a consultative psychological evaluation to determine whether plaintiff was functionally illiterate, ascertain his level of intellectual functioning, and assess whether a mental impairment, such as depression, was present.[23] In support of the request, counsel cited plaintiff's seventh grade education, his alleged grades in school of 60s and 70s, and his alleged current difficulty with reading and writing.[24] Counsel also cited a Social Security Administration representative's notes indicating probable low functioning as well as plaintiff's allegations of illiteracy and writing difficulty.[25] The ALJ considered plaintiff's testimony that he might have failed the fifth grade, could only read small words, had problems with writing, and was forgetful.[26] Plaintiff admitted he was in regular education classes and was taken out of school by his parents in seventh grade due to bullying not because of learning difficulties.[27] The ALJ found plaintiff told the field representative he was never in special education.[28] Plaintiff testified that his signature was on a disability application dated July 10, 2005, and the ALJ noted in a face-to-face interview with plaintiff, the field representative observed him to have no difficulty in reading, writing, understanding, or concentrating, despite his claim of difficulty with reading.[29] Plaintiff told the field representative that he was unable to write because of hand problems, which the ALJ noted arose from his physical impairment.[30] ALJ found plaintiff held a Texas driver's license, last renewed on September 25, 2000, suggesting his reading and writing abilities were significant enough to enable plaintiff to pass the driver's test.[31] The ALJ considered the medical expert's testimony that nothing in the medical record indicated the presence of a mental impairment.[32] The medical expert noted plaintiff had never seen a psychiatrist, *628 received pharmacological or counseling treatment, or been hospitalized for mental problems.[33] The ALJ found plaintiff had not reported psychosocial problems during a March 2005 examination by his treating physician, Abimbola Banjo, M.D.[34] Additionally, the ALJ found it noteworthy that plaintiffs disability applications did not include allegations of mental problems even though he reported to a Social Security Administration agent that he was upset and depressed at times because of his inability to work and having to cope with his physical problems.[35] The ALJ concluded that nothing in the record suggested limitations in plaintiff's activities of daily living were attributable to alleged mental problems.[36] The ALJ considered vocational expert's testimony that plaintiff's past relevant work experience as a roofer/carpenter/painter most closely resembled that of Construction Worker I in the Dictionary of Occupational Titles ("DOT"), which is classified as heavy, semiskilled work.[37] The ALJ found plaintiff had engaged in substantial gainful activity for nine or ten years, vitiating plaintiff's claim that his alleged diminished mental capacity, illiteracy, and depression posed obstacles to his ability to perform and sustain work on a competitive basis.[38] As such, plaintiff's alleged mental impairments were not considered to cause any functional restrictions.[39] Having found plaintiff suffered from a severe impairment, the ALJ found at the third step of the evaluation process that plaintiff did not have an impairment that met or medically equaled a listed impairment in 20 C.F.R. Part 404, Subpart P, Appendix 1.[40] The ALJ gave particular attention to Listing 1.02 and Listing 11.01, respectively musculoskeletal neurological impairments, but found the medical evidence did not document the specific criteria required to satisfy the listings.[41] Because the ALJ determined plaintiff suffered from severe impairments that did not meet or equal listed impairments, the ALJ considered at step four of the evaluation process whether plaintiff retained the residual functional capacity ("RFC") to perform his past relevant work or other work available in the national economy.[42] The ALJ explained the term "residual functional capacity" is an individual's "ability to do physical and mental work activities on a sustained basis despite limitations from his impairments."[43] Citing 20 C.F.R. §§ 404.1527, 404.1529, 416.927, and 416.929 as well as SSRs 96-2p, 96-4p, 96-5p, 96-6p, 96-7p and 06-3p, the ALJ noted the assessment at step four was based on consideration of plaintiffs symptoms, objective medical evidence, and opinion evidence.[44] Based on consideration of the entire record, the ALJ found plaintiff had the RFC to perform unskilled,[45] light exertion work *629 and had full use of the left upper extremity but was limited to using his right arm as a helper hand, although he retained the capacity to sign his name with the right upper extremity.[46] In making this determination, the ALJ considered plaintiff's testimony that he was born in September 1965, was never married, lived with a roommate in a house, and had no source of income but received financial help from the roommate and his sister.[47] According to plaintiff's testimony, the roommate is disabled and receives a disability check.[48] Plaintiff also testified that he: finished the seventh grade; learned construction work from his father; did roofing; and was a carpenter's helper and a contractor, sometimes with a helper.[49] Plaintiff clarified that his carpentry work included putting up rafters on houses as well as picking up frames, 2x4s, and doors but not building cabinets.[50] Plaintiff earned eight to nine dollars an hour.[51] Plaintiff claimed his hand was injured in August 2003, but he continued working and had worked intermittently since May 30, 2005.[52] Plaintiff testified that he ate two meals a day, slept four to six hours a day, had difficulty attending to his personal needs, and mowed yards with a power push mower to earn some money, but with difficulty due to the right arm impairment.[53] Plaintiff: did not grocery shop; attended church once a month, where he was given groceries; had a Texas driver's license, but had not operated a vehicle in a few years; was driven to the hearing by a friend; and occasionally watched television, looked at pictures in a magazine, or walked approximately one mile at a time.[54] Plaintiff testified to being right-hand dominant, and although his left arm, elbow, and hand ached, he could make a fist and button very slowly with that arm.[55] The ALJ noted plaintiff demonstrated his inability to close the fingers on his right hand.[56] Plaintiff further testified that he had never been seen by a psychiatrist or hospitalized for mental reasons.[57] Plaintiff's testimony reflects he had attended regular education classes, earned grades of 60 and 70, believed he repeated fifth grade, was ultimately kept out of school by his parents because of bullying, can read only small words, has difficulty writing, and became forgetful after he was struck by a truck.[58] Plaintiff testified that he took medications for his hand but felt constant tingling and pain.[59] From the evidence of record, the ALJ found plaintiff's medically determinable impairments could reasonably be expected to produce some of the alleged symptoms and limitations, but that plaintiff's statements concerning the alleged intensity, persistence, and limiting effects of the symptoms were not entirely credible.[60] The ALJ found the record revealed that one night in May 2003, plaintiff was walking *630 on a road while he was intoxicated and was struck by the rear view mirror of a passing truck.[61] Plaintiff sustained an apparent significant injury to his right side, with mention of some left-side problems that were not key to plaintiff's alleged disability.[62] Plaintiff was struck on the right arm, hand, or elbow, but x-rays were negative for fracture.[63] The injury was to the right ulnar nerve, and plaintiff eventually lost nerve function, developing claw-finger deformity.[64] A September 2005 EMG study reflected: severe, longstanding right-side neuropathy of questionable etiology; significant denervation in the ulnar distributed muscles, especially in the hand; and findings compatible with moderately severe carpal tunnel syndrome on the right side with evidence of minimal denervation distal to the entrapment.[65] The medical records indicated plaintiff complained of ongoing pain, loss of feeling, tingling sensations, and inability to make a good grip.[66] Progressive right-hand atrophy with decreasing strength and functioning were observed.[67] The ALJ considered records showing plaintiff had been treated for pain with Lortab and Soma and for sleep with Lunesta.[68] But, other than the initial emergency room treatment after the accident,[69] the ALJ found plaintiff had not been in therapy or seen by a pain management specialist.[70] The ALJ also found the record contained little mention of pain other than as reflected on plaintiff's medication list and by a complaint of sleep difficulty,[71] The ALJ considered records showing plaintiff's treating physician, Dr. Fred Corley, M.D., had suggested tendon transfers to correct the fourth and fifth digits and to help with clawing, but plaintiff declined.[72] In January 2007, Dr. Corley, observed plaintiff was not in acute distress and had a "typical deformity in the right hand from an ulnar nerve injury," with wasting in the first dorsal interosseous and decreased sensation in the ring and little fingers.[73] Dr. Corley again discussed the benefits of tendon transfers to improve functionality, and plaintiff appeared to agree to surgery in March 2007.[74] But, the ALJ noted that at the June 2007 hearing, plaintiff continued to exhibit claw deformity, suggesting the surgery had not been performed.[75] The ALJ next considered the medical expert's testimony that the record indicated plaintiff's only significant injury was to his right ulnar nerve.[76] The medical expert testified plaintiff had developed problems with the right hand, including loss of nerve function and atrophy, which resulted in claw deformity and a minimally useful hand.[77] The medical expert also testified that: plaintiff's hand could be used as a *631 helper hand for guiding and steadying; the record reflected little mention of pain, but plaintiff had testified to pain; Dr. Corley had prescribed pain medications; and the record did not indicate mental impairments.[78] The ALJ found the testimony and opinions of the medical expert credible and persuasive.[79] From the opinion evidence, the ALJ found that on June 19, 2007, Dr. Banjo assessed plaintiff with constant limited use of his right hand for fine and gross manipulation, with occasional similar limitation in the left hand.[80] Dr. Banjo also reported severe pain and stated there was "evidence of limitation of activity of daily living and gainful employment at this time."[81] Although the record revealed actual treatment visits had been infrequent, the ALJ acknowledged Dr. Banjo had a "treating relationship" with plaintiff.[82] Nevertheless, the ALJ found Dr. Banjo's opinion regarding the plaintiff's left hand function was "quite conclusory, providing very little explanation of the evidence relied on in forming that opinion since the medical records, sparse as they are, concentrate on the claimant's right hand problems."[83] The ALJ noted Dr. Banjo's opinion that plaintiff was disabled, and found it was not clear the doctor was familiar with the definition of disability stated in the Social Security Act and the regulations.[84] The ALJ found Dr. Banjo's reference to evidence of limitations in daily activity, was not supported by further elaboration.[85] The ALJ found plaintiff had worked after the alleged onset date, though he had not engaged in disqualifying substantial gainful activity, indicating plaintiff's daily activities had been somewhat greater than he reported.[86] The ALJ concluded plaintiffs daily activities of walking, attempting to do house chores, trying to cook, and going to the movies were not limiting to the extent one would expect, given the complaints of disabling symptoms and limitations.[87] The ALJ considered the vocational expert's testimony that plaintiff had past relevant work as a construction worker I, classified by the DOT as heavy, semi-skilled work.[88] The ALJ concurred with the vocational expert's opinion that plaintiff's RFC would preclude him from performing such work.[89] The ALJ then considered at step five whether plaintiff would be capable of performing other work substantially available in the national economy. The ALJ explained that, at step five, plaintiff's "[RFC], age, education, and work experience" must be considered "in conjunction with the Medical-Vocational Guidelines," which are used as a "framework" for the decision "[w]hen the claimant cannot perform substantially all of the exertional demands of work at a given level of exertion and/or has any nonexertional limitations."[90] The ALJ found that at thirty-nine years of age on the onset date of May 30, 2005, plaintiff was defined as a younger individual *632 who had a marginal education and was able to communicate in English.[91] The ALJ concluded transferability of job skills was not an issue because the Medical-Vocational Rules supported a finding that plaintiff was "not disabled," whether or not he had transferable job skills.[92] The ALJ found that if plaintiff were able to perform a full range of light work, a finding of "not disabled" would be directed by Medical-Vocational Rules 202.18.[93] Because plaintiff's ability to work was impeded by additional limitations, the ALJ considered the testimony of a vocation expert on whether a significant number of jobs existed in the national economy for plaintiff to perform.[94] Given a person with plaintiffs characteristics and RFC with restrictions, the vocational expert testified such an individual would be capable of performing the requirements of "representative occupations at the light, unskilled level with the arm/hand limitations indicated" as night watchman, gate guard, security guard, and school bus monitor, each of which were available in significant numbers in the national economy.[95] The ALJ noted a: night watchman had no duties but to be present at the site, was instructed to leave the site upon observing a commotion and report to supervisor, was not required to write reports, and could be illiterate or non-English speaking; gate guard watches trucks enter and leave, particularly in industrial sector; security guard checks the identifications of people entering and exiting a site; and school bus monitor rides the bus to monitor entry and exit from the bus.[96] The ALJ stated that pursuant to SSR 00-4p, the vocational expert's testimony was consistent with the information contained in the DOT.[97] The ALJ accepted the vocational expert's testimony and concluded plaintiff had the RFC for work found in significant numbers in the economy.[98] Accordingly, the ALJ found plaintiff was not under a "disability" as defined in the Social Security Act from May 30, 2005, through the date of the ALJ's decision.[99] On May 21, 2008, plaintiff filed a brief opposing the Commissioner's decision.[100] Plaintiff asks the Court to "enter judgment under sentence four of 42 U.S.C. § 405(g), reversing the Commissioner's final decision with a remand for rehearing, i.e., for further administrative proceedings" based on three harmful errors.[101] Alternatively, plaintiff asks the Court to remand under sentence six of § 405(g) for consideration of exhibit A, which is attached to plaintiffs brief. Plaintiff argues, in sum, that the ALJ's decision is not supported by substantial evidence and does not comport with the relevant legal standards.[102] Specifically, plaintiff claims the ALJ: (1) did not comply with SSR 00-4p, making multiple harmful errors regarding conflicts between the vocational expert's testimony and the DOT; (2) failed to recognize that school bus monitors work part-time; and (3) failed to order a consultative psychological examination.[103] *633 On July 1, 2008, the Commissioner filed a responsive brief, arguing, in sum, that the ALJ's decision is supported by substantial evidence and was decided under the correct legal standards.[104] On July 15, 2008, plaintiff filed a reply brief;[105] the Commissioner filed a sur-reply on July 18, 2008;[106] and plaintiff filed a response on August 6, 2008.[107] The parties arguments are discussed below. VI. ARGUMENTS AND CONCLUSIONS OF LAW In this section the Court will discuss in greater detail the applicable legal standards before applying those standards to plaintiff's specific claims as raised in his brief. A. Entitlement to Benefits Every individual who is insured for disability insurance benefits, has not attained retirement age, has filed an application for benefits, and is under a disability is entitled to receive disability insurance benefits.[108] Each aged, blind or disabled individual who meets certain income and resources limitations is entitled to receive supplemental security income.[109] The term "disabled" or "disability" means the inability to engage in any substantial gainful activity by reason of any medically determinable physical or mental impairment which can be expected to result in death or which has lasted or can be expected to last for a continuous period of not less than 12 months.[110] A person shall be determined to be under a disability only if his physical or mental impairment or impairments are of such severity that he is not only unable to do his previous work but cannot, considering his age, education, and work experience, engage in any other kind of substantial gainful work which exists in significant numbers in the national economy, regardless of whether such work exists in the immediate area in which he lives, or whether a specific job vacancy exists for him, or whether he would be hired if he applied for work.[111] B. Evaluation Process and Burden of Proof Regulations set forth by the Commissioner prescribe that disability claims are to be evaluated according to a five-step process.[112] A finding that a claimant is disabled or not disabled at any point in the process is conclusive and terminates the Commissioner's analysis.[113] The first step involves determining whether the claimant is currently engaged in substantial gainful activity. If so, the claimant will be found not disabled regardless of his medical condition or his age, education, and work experience. The second step involves determining whether the claimant's impairment is severe. If it is not severe, the claimant is deemed not disabled. In the third step, the Commissioner compares the severe *634 impairment with those on a list of specific impairments. If it meets or equals a listed impairment, the claimant is deemed disabled without considering his age, education, and work experience. If the impairment is not on the list, the Commissioner, in the fourth step, reviews the claimant's residual functional capacity and the demands of his past work. If he can still do this kind of work, he is not disabled. If he cannot perform his past work, the Commissioner moves to the fifth and final step of evaluating the claimant's ability, given his residual capacities and his age, education, and work experience, to do other work. If he cannot do other work, he will be found to be disabled. The claimant bears the burden of proof at the first four steps of the sequential analysis.[114] Once he has shown that he is unable to perform his previous work, the burden shifts to the Commissioner to show that there is other substantial gainful employment available that claimant is capable of performing.[115] If the Commissioner adequately points to potential alternative employment, the burden then shifts back to the claimant to prove that he is unable to perform the alternative work.[116] C. Plaintiffs Claims In Appealing The ALJ's Decision: 1. Whether the ALJ failed to comply with SSR 00-4p a. summary of arguments Plaintiff argues, in sum, that the ALJ's reliance on the vocational expert's testimony at step five is not supported by substantial evidence.[117] Plaintiff asserts the vocational expert's testimony conflicts with the DOT, which plaintiff concedes is important but not binding on the ALJ's decision.[118] Specifically, plaintiff argues the vocational expert's testimony, based on the ALJ's hypothetical question, conflicted with the DOT regarding: the skill level required for work as night watchman, gate guard, and security guard; the use of hands required for all four types of work identified, including school bus monitor; and the possibility of handling student altercations as required of a school bus monitor.[119] Plaintiff contends that contrary to the requirements of SSR 00-4p, the ALJ erred by finding the vocational expert's testimony was consistent with the DOT without first asking if such was true, obtaining an explanation from the vocational expert for the conflict, or discussing the expert's explanation in the decision.[120] Citing SSR 00-4p, defendant argues, in sum, that the ALJ is required to elicit an explanation for an "apparent unresolved conflict" between the DOT and the vocational expert's testimony, and in this case, there was no such conflict.[121] Defendant contends substantial evidence supports the ALJ's conclusion that the vocational expert's testimony is consistent with the DOT.[122] Defendant asserts the vocational expert, based on personal knowledge, did distinguish the particular occupation he described as night watchman from the general description provided in the DOT for the work.[123] Noting that pursuant to SSR 00-4p, the skill level definitions provided in the Social Security regulations are *635 controlling, defendant argues the special vocational preparation factor ("SVP") of 3 as specified by the DOT, or semiskilled as defined in the SSR, designated for the occupations of night watchman and guard are not inconsistent with the regulation definition for unskilled work, a characteristic included in the ALJ's hypothetical question.[124] With respect to whether the occupations the vocational expert identified are compatible with plaintiff's full use of his left arm and limited use of the right, defendant argues the Selected Characteristics of Occupations Defined in the Revised DOT ("SCO"), a publication corresponding to the DOT, employs both the singular and plural form of hand and arm, contemplating the use of one arm.[125] As for the possibility of a school bus monitor handling altercations between students, as shown by the DOT to be a requirement of the position, defendant asserts "[c]ommon sense dictates that once an altercation occurs and cannot be broken up with verbal commands or minimal physical intervention, the authorities would be called to the scene."[126] In reply, plaintiff asserts he has established SSR 00-4p is binding and the "ALJ did not fulfill his `affirmative responsibility' under" the SSR to determine whether the vocational expert's testimony was consistent with the DOT and obtain a reasonable explanation for any discrepancy.[127] Plaintiff contends he has established a conflict regarding the skill levels of the work the vocational expert identified from the DOT and defendant has "misstated SSR 00-4p's provision regarding SVP," which "makes an absolute distinction between SVP 1-2 [unskilled] and SVP 3-4 [semiskilled]."[128] Plaintiff argues defendant has relied on the "improper post hoc rationalization," that because the DOT does not specify one or two arms, the work may be performed with one.[129] Plaintiff also argues defendant has relied on the "improper post hoc rationalization," that "a bus monitor does not need to intervene physically between fighting students, but can simply wait for the `authorities' [to] arrive."[130] In sur-reply, defendant asserts plaintiff "still fails to understand that there was never an apparent unresolved conflict triggering an affirmative duty on behalf of the ALJ to seek a reasonable explanation from the vocational expert."[131] Defendant argues the statement in the decision that the vocational expert's testimony is consistent with the DOT indicates "the ALJ evaluated the vocational expert's testimony with the DOT, a common vocational reference."[132] Additionally, defendant argues an SVP of 3, defined in the DOT as work that can take over one month and up to three months to learn, is not inconsistent with the regulation's description of "unskilled work" as usually learned in thirty days.[133] With respect to whether the work identified by the vocational expert is compatible with plaintiff's ability to use his arms, defendant asserts the SCO is an acceptable vocational resource that can provide guidance regarding the reaching and handling the work requires, and the DOT specifies the work of a school bus monitor does not require fingering, handling, reaching, or feeling.[134] *636 In response to the sur-reply, plaintiff argues that "[i]f the Commissioner were correct [regarding the distinction between unskilled work and SVP [3], a vocational expert's testimony about SVP and the level of work . . . could never conflict with the DOT because any such conflict would not be a conflict but an exception to the general rule."[135] Plaintiff contends defendant's "post hoc rationalization is also contrary to the Agency's own explanation as to how ALJ's should apply SSR 00-4p in reference to SVP and the DOT."[136] Plaintiff asserts defendant's "litigation position" is contrary to Agency policy "that it is inconsistent with the DOT for a vocational expert to testify that SVP 3 work is unskilled."[137] Assuming the ALJ could accept the testimony that SVP 3 work is unskilled, plaintiff argues "SSR 00-04p requires the ALJ to obtain expressly from the vocational expert a `reasonable explanation' for such deviation."[138] b. analysis The purpose of SSR 00-4p is to emphasize[] that before relying on VE or VS evidence to support a disability determination or decision, our adjudicators must: Identify and obtain a reasonable explanation for any conflicts between occupational evidence provided by the VEs or VSs and information in the [DOT], including its companion publication the [SCO] . . . and [e]xplain in the determination or decision how any conflict that has been identified was resolved.[139] SSR 00-4p provides that at steps 4 and 5 of the evaluation process, the DOT and the SCO are the primary sources for "information about the requirements of work in the national economy," vocational expert testimony may also be used, and "[o]ccupational information provided by a VE . . . generally should be consistent with . . . the DOT."[140] Before relying on the vocational expert's testimony to support a disability decision, the ALJ must obtain a "reasonable explanation" from the expert for any "apparent conflict" between the testimony and the DOT.[141] "At the hearings level, as part of the adjudicator's duty to fully develop the record, the adjudicator will inquire, on the record, as to whether or not there is such consistency."[142] When the vocational expert "provides evidence about the requirements of a job or occupation, the adjudicator has an affirmative responsibility to ask about any possible conflict."[143] The ALJ will ask the vocational expert "if the evidence he or she has provided conflicts with information provided in the DOT."[144] If the evidence appears to conflict, the ALJ must determine if the vocational expert can provide a reasonable explanation for the discrepancy and provide a basis for relying on the expert's testimony rather than on the DOT.[145] The DOT provides the *637 "maximum requirements of occupations as generally performed," but the vocational expert "may be able to provide more specific information about jobs or occupations than the DOT."[146] The vocational expert may base an explanation on "other reliable publications, information obtained directly from employers, or from a VE's or VS's experience in job placement or career counseling."[147] The resolution of any conflict must be explained in the ALJ's decision "irrespective of how the conflict was identified."[148] With respect to the SVP's listed in the DOT, SSR 00-4p states the SVP's are consistent with skill level definitions stated in 20 C.F.R. §§ 404.1567 and 416.967.[149] Specifically, unskilled work corresponds to SVP 1-2; semiskilled work corresponds to SVP 3-4; and skilled work corresponds to SVP 5-9.[150] The DOT provides "[t]he levels of [the SVP] scale are mutually exclusive and do not overlap" and defines the specific SVP levels as: 1—Short demonstration only; 2—Anything beyond short demonstration up to and including 1 month; 3—Over 1 month up to and including 3 months; 4—Over 3 months up to and including 6 months; 5—Over 6 months up to and including 1 year; 6—Over 1 year up to and including 2 years; 7—Over 2 years up to and including 4 years; 8—Over 4 years up to and including 10 years; and 9—Over 10 years.[151] For the purposes of this case, the regulations define "unskilled work" as: [W]ork which needs little or no judgment to do simple duties that can be learned on the job in a short period of time. The job may or may not require considerable strength. For example, we consider jobs unskilled if the primary work duties are handling, feeding and offbearing (that is, placing or removing materials from machines which are automatic or operated by others), or machine tending, and a person can usually learn to do the job in 30 days, and little specific vocational preparation and judgment are needed. A person does not gain work skills by doing unskilled jobs.[152] "Semiskilled work" is defined as: [W]ork which needs some skills but does not require doing the more complex work duties. Semi-skilled jobs may require alertness and close attention to watching machine processes; or inspecting, testing or otherwise looking for irregularities; or tending or guarding equipment, property, materials, or persons against loss, damage or injury; or other types of activities which are similarly less complex than skilled work, but more complex than unskilled work. A job may be classified as semi-skilled where coordination and dexterity are necessary, as when hands or feet must be moved quickly to do repetitive tasks.[153] *638 skill level In this case, the ALJ sought testimony about the availability of work for a hypothetical person who could perform light exertion work at the "unskilled entry level"—or as defined in the regulations, work a person can learn in thirty days—[154] and a person who had full use of the left arm and limited use of the right arm as a helper arm.[155] The vocational expert testified such a hypothetical person could perform the light, unskilled work of a night watchman, gate guard, security guard, and school bus monitor.[156] As relevant to whether the skill level identified is consistent with the DOT, only the vocational expert's testimony regarding the first three occupations is at issue. The vocational expert identified the relevant DOT numbers as 372.667-034 for night watchman and security guard and 372.667-030 for gate guard.[157] As plaintiff argues, a review of the occupations identified by these DOT numbers shows each, rated at SVP 3, requires more than one month and up to three months of training,[158] and is semiskilled work as defined in SSR 00-4p.[159] The vocational expert did not testify, or indicate in any manner, that he was identifying skill levels different from those specified in the DOT or that the DOT skill levels were greater than that found by the ALJ. More important, the ALJ did not ask if vocational expert's testimony was consistent with the DOT so the expert might have had an opportunity to provide a reasonable explanation for the conflict. Although the vocational expert did testify he had personal experience with the work of night watchman at the light, unskilled level,[160] without some indication the ALJ knew the skill level was inconsistent with the DOT, the ALJ could have believed, and likely did believe, the expert was merely corroborating the DOT specification for that occupation. Specifically, the ALJ states the vocational expert's testimony is consistent with the DOT[161] without any discussion of the conflict between the expert's testimony that the work is unskilled and the SPV 3 or semiskilled level indicated in the DOT. In sum, the ALJ did not comply with SSR 00-4p as he failed to: ask the vocational expert if his testimony regarding skill level was consistent with information specified in the DOT, obtain an explanation for any conflict, determine if the explanation was reasonable, and include a discussion of his findings in the decision. This case should be remanded, and the ALJ should fully develop the record on the issue of whether plaintiff is capable of performing the duties of night watchman, security guard, or gate guard at the unskilled level. use of hands Plaintiff argues the vocational expert's testimony, as to all jobs identified, conflicts with information in the DOT regarding use of hands, specifically plaintiffs full use of one arm and very limited use of the other. As plaintiff asserts, the DOT does not specifically "include any information about jobs compatible" with limitations such as those the ALJ assessed for plaintiff. *639 But, the job descriptions provided by the DOT for each occupation identified do indicate how significant the use of arms might be for that type of work. For night watchman and security guard, the DOT specifies: handling is not significant; low degree of aptitude ability for finger and manual dexterity; frequent reaching and handling from 1/3 to 2/3 of the time; and no fingering or feeling.[162] The description for gate guard specifies: handling is not significant; a low degree of aptitude ability for finger and manual dexterity; occasional reaching and handling up to 1/3 of the time; and no fingering or feeling.[163] The description for school bus monitor specifies: handling is not significant; a low degree of aptitude for finger and manual dexterity; and no reaching, handling, fingering, or feeling.[164] As with skill level, the ALJ did not inquire whether the DOT was consistent with the vocational expert's testimony that a person with plaintiffs limitations for the use of his arms could perform the work of a night watchman, security guard, gate guard, and school bus monitor. The DOT descriptions set forth above indicate the occupations of watchman or guard require occasional to frequent reaching and handling. The vocational expert did not testify or indicate in any manner what the DOT specified for use of arms or whether his testimony was consistent with such specifications. Because it is not clear from the record that the vocational expert's testimony regarding use of arms is consistent with the DOT as to the work of night watchman, security guard, and gate guard and the ALJ did not comport with SSR 00-4p in making that determination, the case should be remanded and the ALJ should fully develop the record as to whether plaintiff is capable of performing these occupations given his limitation. As for the work of a school bus monitor, plaintiff has failed to present evidence showing the vocational expert's testimony is inconsistent with the DOT specifications for that work. As indicated, the DOT description for school bus monitor, which plaintiff has attached as an exhibit to his brief in opposition, shows the work requires no reaching, handling, fingering, or feeling. Although the DOT states that a school bus monitor "[r]ides school bus to prevent altercations between students,"[165] plaintiff's conclusory argument this is "something that would be difficult if not impossible to do with full use of only one arm"[166] is not evidence showing the vocational expert's testimony was inconsistent with the DOT. 2. Whether the ALJ erred in failing to recognize that school bus monitors work part-time Plaintiff asserts substantial evidence does not support the ALJ's step five decision to the extent that it rests on Mr. Huizar's ability to work as a school bus monitor, because such work is "typically" performed part-time.[167] As a claimant who cannot work full-time is disabled at step five as a matter of law, plaintiff contends his ability to perform part-time work is irrelevant at step five.[168] To support his assertion that a school bus monitor "typically" works part-time, plaintiff cited information about school bus drivers from the most recent edition of Occupational Outlook *640 Handbook, a publication from the Department of Labor's Bureau of Labor Statistics, which is available online at http://www.bls.gov/oco/ocos242.htm.[169] Plaintiff does not suggest why the ALJ should have known or assumed[170] at the time of the decision that school bus monitors "typically" work part-time. Neither the description in the DOT for school bus monitor nor the vocational expert's testimony suggest the work is performed on a part-time basis. The vocational expert testified during the hearing that light exertion work included "standing up to six to eight hours in a workday,"[171] described the work of school bus monitor as light exertion work according to the DOT, and opined that plaintiff would be capable of performing such work.[172] With no evidence to the contrary, this is substantial evidence in support of the ALJ's decision. Plaintiff did cite the Occupational Outlook Handbook, a publication the Social Security Administration will take notice of for "reliable job information."[173] But, the reliance on this publication is misplaced. The Occupational Outlook Handbook provides that: School bus drivers work only when schools are in session. Many work 20 hours a week or less, driving one or two routes in the morning and afternoon. Drivers taking field or athletic trips, or who also have midday kindergarten routes, may work more hours a week.[174] At first glance this information suggests some school bus drivers, and by inference the monitors on those buses, may work twenty hours a week or less, but the passage does not quantify "many," or specify such hours are considered "typical." Moreover, the Occupational Outlook Handbook further states: Bus drivers held about 653,000 jobs in 2006. About 34 percent worked part time. Around 70 percent of all bus drivers were school bus drivers working primarily for school systems or for companies providing school bus services under contract. Most of the remainder worked for private and local government transit systems; some also worked for intercity and charter bus lines.[175] That thirty-four percent of all bus drivers, most of whom are school bus drivers, work part-time does not show it is "typical" for all school bus monitors to work only part-time. In sum, plaintiff has not shown the ALJ erred in relying on the vocational expert's testimony that plaintiff would be capable of performing the work as a school bus monitor. But, given that the ALJ found work was available in significant numbers *641 in the national economy based on testimony regarding four occupations and this report's recommendation to remand for further development of the record as to the three occupations of night watchman, security guard, and gate guard, the decision should also be remanded for consideration of whether work as a school bus monitor alone, as reduced to account for plaintiff's limitation, is sufficient to satisfy the "significant number" standard. 3. Whether the ALJ should have ordered a consultative psychological examination Because the ALJ has a duty to develop an adequate record, plaintiff argues the ALJ has the authority to order a consultative examination.[176] Plaintiff asserts the ALJ failed to fully develop the record because he failed to order a necessary consultative examination to evaluate Mr. Huizar's educational achievement, intelligence, and depression.[177] Plaintiff notes that his attorney repeatedly asked the ALJ to order such an examination.[178] In addition, plaintiff asserts the Court should remand the case to consider the March 2008 report from licensed psychological associate Cilia Stultz, M.S., M.A., and supervising psychologist Arthur Flores, Ph.D., which is attached as exhibit A to plaintiffs brief.[179] Plaintiff asserts the report is new because the record before the ALJ and the Appeals Council did not include any psychological evidence.[180] Plaintiff further asserts the report is material because, it would likely change the outcome if considered.[181] Plaintiff asserts "good cause" for not previously obtaining a consultative examination because he "asked the ALJ to obtain such an examination, the ALJ refused the request, and the examination was `necessary.'"[182] The regulations provide that "[a] consultative examination may be purchased when the evidence as a whole, both medical and nonmedical, is not sufficient to support a decision on your claim."[183] In the present case, the ALJ considered plaintiff's evidence regarding his education, intellectual functioning, and alleged depression. As the ALJ found, except for plaintiffs unsupported subjective complaints to a Social Security Administration agent, there is nothing in the record to show plaintiff complained of depression to treating physicians or any other health source prior to the ALJ's decision, and there is no evidence to suggest what limitations might be caused by such an impairment. With respect to plaintiff's intellectual functioning, as the ALJ found, the evidence shows plaintiff has a seventh grade education, his parents kept him out of school because he was being bullied, he did not drop out because of learning difficulties, and he was not in special education classes.[184] Although plaintiff claimed he could read only small words, the evidence shows he had obtained a Texas driver's license, suggesting he had sufficient reading and writing ability to pass the written *642 test for the license.[185] This evidence, or the lack of evidence, substantially supports the ALJ's decision that depression and intellectual functioning were not severe impairments at the time of the disability determination. In assessing plaintiff's RFC, the ALJ included a limitation for plaintiff's alleged poor intellectual functioning by limiting plaintiff to unskilled work. As the evidence substantially supports the decision, the ALJ was not required to seek a consultative psychological evaluation. Nevertheless, plaintiff has provided for the first time a report from a psychological evaluation performed on March 20, 2008, more than a month after the complaint in this case was filed, "to establish current levels of intellectual, adaptive, academic, and psychological functioning."[186] Although arguable that the report is material to the ALJ's decision and good cause exists for the late submission of the report, on remand, the ALJ should consider the relevance of and the weight to give the report, if any, as well as whether it might be necessary to seek a consultative psychological evaluation at this time. VII. RECOMMENDATION Because the ALJ's determination, in part, does not comport with relevant legal standards and plaintiff has proffered some new evidence regarding his mental functioning, it is recommended that the Commissioner's decision be REVERSED and REMANDED for further proceedings under sentences four and six of 42 U.S.C. § 405(g), as discussed above. VIII. INSTRUCTIONS FOR SERVICE AND NOTICE OF RIGHT TO OBJECT/APPEAL The United States District Clerk shall serve a copy of this Report and Recommendation on all parties by either: (1) electronic transmittal to all parties represented by an attorney registered as a Filing User with the Clerk of Court pursuant to the Court's Procedural Rules for Electronic Filing in Civil and Criminal Cases; or (2) by certified mail, return receipt requested, to any party not represented by an attorney registered as a Filing User. As provided in 28 U.S.C. § 636(b)(1) and FED. R. CIV. P. 72(b), any party who desires to object to this Report must file with the District Clerk and serve on all parties and the Magistrate Judge written Objections to the Report and Recommendation within 10 days after being served with a copy, unless this time period is modified by the District Court. A party filing Objections must specifically identify those findings, conclusions or recommendations to which objections are being made and the basis for such objections; the District Court need not consider frivolous, conclusive or general objections. A party's failure to file timely written objections to the proposed findings, conclusions and recommendations contained in this Report will bar the party from receiving a de novo determination by the District Court.[187] Additionally, a party's failure to file timely written objections to the proposed findings, conclusions and recommendations contained in this Report will bar the aggrieved party, except upon grounds of plain error, from attacking on appeal the unobjected-to proposed factual findings and legal conclusions accepted by the District Court.[188] *643 It is ORDERED, SIGNED and ENTERED this 13th day of August, 2008. NOTES [1] Tr. at 23. [2] Id. [3] Id. at 29-30. [4] Id. at 5, 10-11. [5] Docket #21 at 35. [6] Id. [7] Docket # 23 at 5. [8] Docket # 24 at 2-3. [9] Id. at 4-5. [10] 42 U.S.C. § 405(g). [11] Tr. at 23. [12] Id. [13] Id. [14] Id. [15] Id. at 31. [16] Id. at 4. [17] Docket #21 at 1. [18] Docket # 23 at 1; Docket # 24 at 1. [19] Martinez v. Chater, 64 F.3d 172, 173 (5th Cir.1995); 42 U.S.C. §§ 405(g), 1383(c)(3). [20] Villa v. Sullivan, 895 F.2d 1019, 1021-22 (5th Cir.1990) (quoting Hames v. Heckler, 707 F.2d 162, 164 (5th Cir.1983)). [21] Abshire v. Bowen, 848 F.2d 638, 640 (5th Cir.1988) (quoting Hames, 707 F.2d at 164). [22] Martinez, 64 F.3d at 173. [23] Ripley v. Chater, 67 F.3d 552, 555 (5th Cir.1995); see also Villa, 895 F.2d at 1021 (the court is not to re-weigh the evidence, try the issues de novo, or substitute its judgment for that of the Commissioner). [24] Martinez, 64 F.3d at 174. [25] Id. [26] 42 U.S.C. § 423(a)(1). [27] 42 U.S.C. § 1382(a)(1) & (2). [28] 42 U.S.C. § 1382c(a)(3)(A). [29] 42 U.S.C. § 1382c(a)(3)(B). [30] 20 C.F.R. §§ 404.1520 and 416.920. [31] Leggett v. Chater, 67 F.3d 558, 564 (5th Cir.1995). [32] 20 C.F.R. §§ 404.1520 and 416.920. [33] Id. [34] Id. [35] Id. [36] Id. [37] Id. [38] Id. [39] Id. [40] Id. [41] Leggett, 67 F.3d at 564. [42] Watson v. Barnhart, 288 F.3d 212, 217 (5th Cir.2002). [43] Anderson v. Sullivan, 887 F.2d 630, 632-33 (5th Cir.1989). [44] Tr. at 25. [45] Id. at 25A (citing 20 C.F.R. §§ 404.1520(c), 416.920(c); Stone v. Heckler, 752 F.2d 1099 (5th Cir. 1985)). [46] Id. at 26. [47] Id. (citing 20 C.F.R. §§ 404.1520(d), 404.1525, 404.1526, 416.920(d), 416.925, and 416.926). [48] Id. at 29-30. [49] Id. at 26. [50] Id. at 29-30. [51] Docket # 23 at 27. [52] Tr. at 5, 10-11. [53] Docket # 23 at 28-29. [54] Docket # 21 at 35. [55] Docket # 23 at 5. [56] Id. at 5. [57] Docket #24 at 2-3. [58] SSR 00-4p, 2000 WL 1898704, at *4 (S.S.A. Dec. 4, 2000). [59] United States v. Wilson, 864 F.2d 1219, 1221 (5th Cir.), cert. denied, 492 U.S. 918, 109 S.Ct. 3243, 106 L.Ed.2d 590 (1989). [60] Tr. at 30. [61] DICTIONARY OF OCCUPATIONAL TITLES, at appx. C (1991), available at www.westlaw.com (Database DICOT). [62] SSR 00-4p, 2000 WL 1898704, at *3 (Dec. 4, 2000). [63] Docket # 11 at 9-10. [64] Docket #21 at 28-30. [65] Docket # 24 at 4-7. [66] FED. R. CIV. P. 72(a); 28 U.S.C. § 636(b)(1). [67] DICTIONARY OF OCCUPATIONAL TITLES, at appx. C (1991), available at www.westlaw.com (Database DICOT). [68] Id. [69] Docket #21 at 31. [70] See SSR 96-8p, available at http://www. ssa.gov/OP_Home/rulings/di/01/SSR96-08-di-01.html ("Ordinarily, RFC is the individual's maximum remaining ability to do sustained work activities in an ordinary work setting on a regular and continuing basis, and the RFC assessment must include a discussion of the individual's abilities on that basis. A `regular and continuing basis' means 8 hours a day, for 5 days a week, or an equivalent work schedule."); but see id. at n. 2 ("The ability to work 8 hours a day for 5 days a week is not always required when evaluating an individual's ability to do past relevant work at step 4 of the sequential evaluation process. Part-time work that was substantial gainful activity, performed within the past 15 years, and lasted long enough for the person to learn to do it constitutes past relevant work, and an individual who retains the RFC to perform such work must be found not disabled."). [71] Tr. at 222-23. [72] The Commissioner contends that the ALJ's decision at step five must be affirmed because substantial evidence exists in the record that the school-bus monitor job alone exists in significant numbers in the national economy. This argument depends on the Court's acceptance of the Magistrate Judge's recommendation that the school bus monitor job should be considered at step five. Because the Court does not accept that recommendation, the Commissioner's argument is rendered moot. [73] Tr. at 296, 231; see also id. at 297 (Plaintiff's attorney stating: "So I think it would be extremely important to determine whether or not, in fact, what his reading and writing abilities are and what his cognitive deficits are, if any."). [74] 20 C.F.R. §§ 404.1519a(b) and 416.919a(b). [75] Docket # 11, Ex. A at 1. [76] 42 U.S.C. § 405(g). [77] Docket #21 at 35. [78] Docket # 23 at 6-7. [1] Transcript at 23, 90-94. [2] Id. at 23, 42-50, 53-57. [3] Id. at 193-232. [4] Id. at 23-31. [5] Id. at 4-6. [6] Boyd v. Apfel, 239 F.3d 698, 704 (5th Cir. 2001). [7] Id. [8] Abshire v. Bowen, 848 F.2d 638, 640 (5th Cir. 1988). [9] Martinez v. Chater, 64 F.3d 172, 173 (5th Cir. 1995). [10] Carey v. Apfel, 230 F.3d 131, 135 (5th Cir.2000). [11] Id. [12] Martinez, 64 F.3d at 174. [13] Transcript at 23. [14] Id. at 29. [15] Id. at 25A, 29. [16] Id. at 29. [17] Id. at 24. [18] 20 C.F.R. §§ 404.1520(b-f) and 416.920(b-f). [19] Transcript at 25. [20] 752 F.2d 1099 (5th Cir. 1985). [21] Transcript at 25A (citing 20 C.F.R. §§ 404.1520(c) and 416.920(c) and Stone v. Heckler, 752 F.2d 1099 (5th Cir.1985)). [22] Id. at 26. [23] Id. at 25 A (citing transcript at 78-86, 111, 123-128, 137-142, 172). [24] Id. [25] Id. [26] Id. [27] Id. [28] Id. (citing transcript at 129). [29] Id. [30] Id. (citing transcript at 109-112). [31] Id. (citing transcript at 79). [32] Id. at 25A. [33] Id. [34] Id. (citing transcript at 155). [35] Id. (citing transcript at 125). [36] Id. (citing transcript 129). [37] Id. at 25A. [38] Id. [39] Id. at 25A-26 (citing transcript at 96). [40] Id. (citing 20 C.F.R. §§ 404.1520(d), 404.1525, 404.1526, 416.920(d), 416.925, and 416.926). [41] Id. at 26. [42] Id. [43] Id. at 25 (citing 20 C.F.R §§ 404.1520(e), 404.1545, 416.920(e), and 416.945, as well as SSR 96-8p). [44] Id. at 26. [45] Id. at 30. [46] Id. at 26. [47] Id. at 27. [48] Id. [49] Id. [50] Id. [51] Id. [52] Id. [53] Id. [54] Id. [55] Id. [56] Id. [57] Id. [58] Id. [59] Id. [60] Id. at 27-28. [61] Id. at 28 (citing transcript at 163). [62] Id. [63] Id. (citing transcript at 164). [64] Id. [65] Id. (citing transcript at 172-74). [66] Id. (citing transcript at 155, 178, 180, 181, and 182). [67] Id. [68] Id. (citing transcript at 191). [69] Id. (citing transcript at 161). [70] Id. at 28. [71] Id. (citing transcript at 155 and 161). [72] Id. (citing transcript at 177). [73] Id. [74] Id. [75] Id. at 28. [76] Id. [77] Id. [78] Id. [79] Id. [80] Id. at 29 (citing transcript at 192). [81] Id. [82] Id. at 29. [83] Id. [84] Id. [85] Id. [86] Id. [87] Id. [88] Id. [89] Id. [90] Id. at 30. [91] Id. [92] Id. (citing 20 C.F.R. Part 404, Subpart P, Appendix 2 and SSR 82-41). [93] Id. [94] Id. [95] Id. [96] Id. [97] Id. [98] Id. [99] Id. (citing 20 C.F.R. §§ 404.1520(g) and 416.920(g)). [100] Docket no. 11. [101] Id. at 17. [102] Id. at 5-17. [103] Id. [104] Docket no. 18. [105] Docket no. 19. [106] See docket no. 17, Order granting Commissioner's motion for leave to file "response" and docket no. 16, attachment. Based on the order in which the parties have filed their pleadings, the Commissioner's pleading is more accurately denominated a sur-reply and plaintiff's subsequent pleading a sur-reply response. [107] Docket no. 20. [108] 42 U.S.C. § 423(a)(1) (1995). [109] 42 U.S.C. § 1382(a). [110] 42 U.S.C. § 1382c(a)(3)(A). [111] 42 U.S.C. § 1382c(a)(3)(B). [112] 20 C.F.R. §§ 404.1520 and 416.920. [113] Leggett v. Chater, 67 F.3d 558, 564 (5th Cir.1995). [114] Id. at 564. [115] Anderson v. Sullivan, 887 F.2d 630, 632 (5th Cir. 1989). [116] Id. at 632-633. [117] Docket no. 11 at 5. [118] Docket no. 11 at 6, 8. [119] Id. at 8-10. [120] Id. at 6-7. [121] Docket no. 14 at 6. [122] Id. [123] Id. at 7-8. [124] Id. at 8-9. [125] Id. at 9. [126] Id. at 10. [127] Docket no. 15 at 1. [128] Id. at 2. [129] Id. at 3. [130] Id. [131] Docket no. 16, attachment at 2. [132] Id. [133] Id. at 3-4. [134] Id. at 4-5. [135] Docket no. 20 at 1. [136] Id. at 2. Plaintiff specifically cites an Agency manual for training ALJs, "Frank Cristaudo, Chief ALJ, et al, Phrasing Hypothetical Questions to Vocational Experts Training Guide" at 10-11, 16-17, and states copies of these pages are attached as exhibit C. Id. Although note 1 in the sur-reply response quotes the manual at page 12, pages 10-11 and 16-17 are not attached to the sur-reply response. [137] Id. [138] Id. [139] SSR 00-4p, 2000 WL 1898704, at *1 (Dec. 4, 2000). [140] Id. at *2. [141] Id. [142] Id. (emphasis added). [143] Id. at *4 (emphasis added). [144] Id. (emphasis added). [145] Id. at *2 (must), 4 (will). [146] Id. at *3. [147] Id. at *2. [148] Id. at *4 (emphasis added). [149] Id. at *3 [150] Id. [151] DICTIONARY OF OCCUPATIONAL TITLES, at appx. C (1991), available at www.westlaw.com (database DICOT). [152] 20 C.F.R. §§ 404.1568(a) and 416.968(a). [153] Id. at (b). [154] See 20 C.F.R. §§ 404.1568(a) and 416.968(a). [155] Transcript at 224. [156] Id. at 224-25. [157] Id. at 227. [158] DICTIONARY OF OCCUPATIONAL TITLES, at appx. C (1991), available at www.westlaw.com (database DICOT). [159] SSR 00-4p, 2000 WL 1898704, at * 3. [160] Transcript at 224. [161] Id. at 30. [162] DICTIONARY OF OCCUPATIONAL TITLES, at 372.667-034 (1991), available at www. westlaw.com (database DICOT). [163] Id. at 372.667-030. [164] Id. at 372.667-042. [165] Id. [166] Docket no. 11 at 9. [167] Docket no. 11 at 10. [168] Id. [169] Id. Initially, defendant asserted "part-time work can constitute substantial gainful activity but later clarified such was true for determinations at steps one and four, not step five where the decision to deny disability was made." Docket no. 14 at 10; docket no. 16, attachment at 3. [170] The Court notes it seems common to see school buses in operation throughout the day from before 6 a.m. to well after 5 p.m. on most school days during the regular school year. It also is not uncommon to see school buses in operation, although in reduced numbers, during the summer months and in relation to after-hours school-related programs and activities throughout the year. [171] Transcript at 222. [172] Id. at 224-25. [173] See 20 C.F.R. §§ 404.1566(d)(5) and 416.966(d)(5). [174] Docket no. 11 at 10 (citing http://www.bls. gov/oco/ocos242.htm) (emphasis added). [175] See Dept. of Labor, Bureau of Labor Statistics, "Occupational Outlook Handbook" @ http://www.bls.gov/oco/ocos242.htm (emphasis added). [176] Docket no. 11 at 11. [177] Id. at 12-15. [178] Id. at 11 (citing transcript at 32-33, 73, 78-79, 196). [179] Id., exhibit A. The Court notes the psychological evaluation was performed more than three months after the Appeals Council denied plaintiffs request for review on Dec. 11, 2007. [180] Id. at 15-16. [181] Id. at 16-17. [182] Id. at 17. [183] 20 C.F.R. §§ 404.1519a(b) and 416.919a(b). [184] Transcript at 129, 201, 207, 211. [185] Id. at 206. [186] Docket no. 11, exhibit A at 1. [187] See Thomas v. Arn, 474 U.S. 140, 150, 106 S.Ct. 466, 472, 88 L.Ed.2d 435 (1985). [188] Acuna v. Brown & Root Inc., 200 F.3d 335, 340 (5th Cir.2000); Douglass v. United Serv. Auto. Ass'n., 79 F.3d 1415, 1428 (5th Cir.1996).
{ "pile_set_name": "FreeLaw" }
Fibromyalgia and Your Care: How's That Working for You? Dr. Phil often talks to viewers about their concerns this way. Perhaps something can be learned from this approach when it comes to our bodily health. Maybe you’ve been through the health care maze known as “fibrocare.” Many patients start off with one little problem, such as fatigue or a headache, which just seems to grow and grow, much like the entourage of doctors we collect to get answers. How many physicians did you see before being properly diagnosed? Unfortunately, most fibromyalgia (FM) sufferers endure years of misdiagnoses, years of visits to various specialists, and of course constant and widespread pain. So is it working well? Are you getting healthy? Getting back to your old healthy self? Is so, then great. If not, then read on… Were alternatives and perhaps more natural/non-drug approaches brought to your attention? Unfortunately, the maze can be quite daunting and it can be hard to really get a sense of any direction or what lies around the next corner. Chiropractic care is one such alternative that remains a practical secret for many. In prior articles, we have looked at the many benefits chiropractic offers the FM patient in addition to spinal manipulative therapy and other manual therapies. Some of these include tips for improving sleep, exercise training (very important in managing FM), diet—specifically an anti-inflammatory diet (rich in anti-oxidants)—and supplementation (such as magnesium, malic acid, omega-3 fatty acids, vitamin D3, Co-enzyme Q10, and more). Most importantly, studies show that the FM patient is BEST served when a “team” of healthcare professionals work together on behalf of the FM patient. Depending on a patient’s needs, the team can include a doctor of chiropractic, a primary care doctor, a massage therapist, a clinical psychologist, and others. Thousands of Doctors of Chiropractic across the United States and Canada have taken "The ChiroTrust Pledge":“To the best of my ability, I agree to provide my patients convenient, affordable, and mainstream Chiropractic care.I will not use unnecessary long-term treatment plans and/or therapies.” To locate a Doctor of Chiropractic who has taken The ChiroTrust Pledge, google "The ChiroTrust Pledge" and the name of a town in quotes. Search Conditions Archives This information should not be substituted for medical or chiropractic advice. Any and all health care concerns, decisions, and actions must be done through the advice and counsel of a health care professional who is familiar with your updated medical history.
{ "pile_set_name": "Pile-CC" }
Web of Shadows Web of Shadows can refer to any of the following: Bionicle 3: Web of Shadows, the third movie of the Bionicle series Spider-Man: Web of Shadows, a 2008 videogame based in the Marvel Comics character Spider-Man
{ "pile_set_name": "Wikipedia (en)" }
Sony just took the wrappers off the PlayStation 4 at a blowout event — but something was missing. Bizarrely, the company elected not to show any glimpse of the console hardware itself, instead focusing on internal details and a showreel of upcoming games. We did get to see the new DualShock 4 controller and the depth camera that it works with, but as for what you'll actually place under your TV come holiday 2013? We're none the wiser. Perhaps Sony is attempting to avoid the eventual embarrassment of its PlayStation 3 reveal at E3 2005, where the final console turned out to be considerably bulkier and less feature-laden than what was initially announced. Still, the lack of information as to what Sony's thinking in terms of hardware design is alarming, and Xbox's Larry Hryb — better known as Major Nelson — was sure to point it out. Announce a console without actually showing a console? That's one approach — Larry Hryb (@majornelson) February 21, 2013 Sony didn't announce pricing or a specific release date, either, which was to be expected. But the event still left us with a lot of questions. With no hardware shown, how do we know what physical media the PS4 will support? What's the plan for PlayStation Network, and will we have to pay? Will the PS4 support 4K TVs at all? Gaikai, the cloud technology that Sony is pushing as a major component of the PS4, is also shrouded in doubt. We don't know what you'll be able to use the service for once you unpack your console on launch day — the PS4 hardware won't support PS3 games natively, falling back on streaming for backwards compatibility, but it doesn't sound like that ability will be ready from the start. We'll be able to try demos of PS4 games via Gaikai, but it's not clear if the service will support full games. Gaikai is shrouded in doubt Plans for the PS Vita seem to be up in the air as well. Sony says that its "long-term goal" is to make almost every PS4 title playable on PS Vita via Remote Play streaming, but there's no timeframe given and it's not clear if this feature will be restricted to the same Wi-Fi network as the console itself. It's not surprising that the announcement was light on details in many ways — after all, Sony surprised the world by putting out details of the PlayStation 4 far earlier than expected. But by failing to show even the most basic imagery of the hardware, and giving only vague details about many of the console's features, we're left with the impression that much of Sony's plan for the next generation is still to be determined.
{ "pile_set_name": "OpenWebText2" }
BUDAPEST (Reuters) - Hungary’s Prime Minister Viktor Orban is gambling that a new law targeting a top Budapest university will help shore up his core support ahead of next year’s election, but the scale of protests it has prompted suggests he may have gone too far this time. People protest in front of the Hungarian Parliament against a new law that would undermine Central European University, a liberal graduate school of social sciences founded by U.S. financier George Soros in Budapest, Hungary, April 12, 2016. REUTERS/Laszlo Balogh The Central European University (CEU), founded by billionaire financier and liberal philanthropist George Soros, faces the risk of closure under the legislation, which Orban’s critics say is part of a wider crackdown on dissent in Hungary. Orban, a right-wing populist, has long criticized civil society organizations funded by Hungarian-born Soros, accusing them of opposing his tough migration policies. He says the CEU has violated Hungarian rules - a charge the university rejects. In the fourth major demonstration against the new law in the past two weeks, thousands of students marched on parliament late on Wednesday chanting “Europe! Europe!” and “Free country! Free university!” Also on Wednesday, the European Commission - often at odds with Orban -- threatened Hungary with legal action over a series of measures including the education law, saying they ran counter to the EU’s values of human rights and democracy. The United States similarly urged Hungary, a NATO ally, to suspend implementation of the education law. However Orban has often thrived on confrontation since taking power in 2010, depicting his foes - including the European Union, foreign-funded non-governmental organizations and the International Monetary Fund - as a threat to Hungary’s sovereignty. This strengthens his image at home as a defender of national interests against perceived foreign meddling -- this time by Soros. The strategy has worked well for him so far. Latest opinion polls put support for his conservative Fidesz party at around 30 percent, far ahead of his nearest rivals, the radical nationalist Jobbik party and the Socialists, each on about 10 percent. OBSTACLE The CEU, established in 1991 after the fall of communism, is a tempting target for Orban. The “open society” model promoted by Soros in eastern Europe over decades is at odds with the “illiberal democracy” that Orban has vowed to build in Hungary. In the past seven years, Orban, 53, has eliminated checks on his power by taking control of the public media, curbing the powers of the constitutional court, and placing loyalists in top positions at public institutions. Slideshow ( 6 images ) “With its ample funding, international prestige and support for liberal scholarship, CEU has been a significant obstacle to Orban’s ideological end-game,” said Eurasia Group, a political consultancy, in a recent note. “... The attack is part of a broader Fidesz campaign to frame foreign NGOs and foundations ... as a liberal bogeyman ahead of ... elections,” it said. Echoing that view, Csaba Toth, director of the liberal think-tank Republikon, said: “The government’s narrative (on the CEU and Soros) works for Fidesz voters. This has been all planned out.” “The danger (for Orban) is if he digs in his heels and does not recognize a shift in public sentiment,” Toth said. Orban has described Soros as the main supporter of mass migration into Europe and says civil organizations funded by him are paid political activists representing foreign interests. He says the arrival of more than a million mostly Muslim migrants in Europe poses an existential threat to Western civilization. The government has said the aim of its education law was to address administrative shortcomings of foreign universities in Hungary. BACKING DOWN? In an apparent attempt to defuse the protests, Education Secretary Laszlo Palkovics suggested on Wednesday via a news website that the CEU, which specializes in social sciences, could continue to operate if it delivered its teaching and issued its degrees through its existing Hungarian sister school. Expressing surprise at his comments, the CEU said the government should initiate negotiations instead of hinting at possible solutions in the press. The campaign against the CEU has left even some long-time Fidesz voters puzzled. Diana Urge-Vorsatz, a CEU professor who said she had voted for Fidesz, said she simply did not understand the accusations made by ruling politicians that suggested her university was a “factory of a certain ideology”. “This is not true, the CEU is extremely diverse. We represent many political perspectives, values and ideologies,” the mother of seven told Reuters. “I am extremely disappointed about what’s happening to my university.”
{ "pile_set_name": "OpenWebText2" }
We recently came across this new-to-us method of plopping hair: with a veil net! Curly hair stylist Brianne Prince shared this method with us, and we can't wait to give it a try. What is plopping? Maybe along your curl journey you've heard of a method called "plopping." Despite a rather unfortunate name, it can really be an asset to us in our arsenal of curly tricks. Plopping is a method of compressing the curls from ends to scalp using fabric. What to plop with? "What type of fabric?" you may ask. The possibilities are endless, and I recommend experimenting to find which fabric is right for your curls. I have plopped my hair using: T-shirt material can be great, and is easily sourced from home. Just find one that has worn thin, and cut the top off right under the arms. Then, make a vertical cut down the belly. Voila! You have an approximate rectangle long enough to twist on the sides, and tie in back. Jersey is slightly absorbent, but not overly so. Just be sure not to plop for too long, as your gel can make the curls stick to the fabric. You may want to try a stretchier material, which I find takes out less moisture; in some cases (and depending on your porosity), it can be a benefit. My favorite way to plop My current favorite tool is called the Jac-o-Net nylon veil net, and is a wonderful choice for so MANY reasons! Firstly, the Jac-o-Net Veil Net is made of tulle, meaning that it completely aerates the curls. Why is this so great? Well, if you have long, thick curls that take a long time to dry, you can either sit under your hood dryer with the net, or you can take off your diffuser, and use your dryer directly! The veil keeps your hair tightly compressed and unable to frizz, yet still open to the air! Another reason I love this is that you can see through it to tell whether or not you have achieved the proper angle; you can see the curls compressed down like an accordion. The best part is that your gel will not stick! These nets are triangle in shape, and there's plenty of room to wrap the tails around the front. Just throw these in your delicates bag when washing, and they will not tear. Or you can simply wash in the sink, and hang or blow dry. How to plop There are many different ideas on how you should plop, but I believe you should start with wet hair that already has your products of choice applied, and then blot gently with microfiber or jersey before proceeding to plop. I also recommend plopping for a maximum of twenty to thirty minutes, depending on thickness and length; but if you can go longer (or even overnight), that is great! Personally I follow what I call the 10-10-10 approach and I will explain that in a future post. My tutorial I describe the different fabrics, and how to get the correct angle every time in my video here. Please forgive the awkward ending, I get sad when I have to say goodbye! Have you plopped with a veil net? What was your experience? Share in the comments section below.
{ "pile_set_name": "OpenWebText2" }
Q: Improving a 'What is the best" kind of question Now and then I find myself reading a question that starts like what is the best way to do X on Y? or which is the best X on Y? Most of these questions are marked as "not constructive". Nevertheless, quite a number of them are useful. A solution may be to require the author to change the question to a technical one, like How can X be done on Y? or Are there X that one can apply on Y? instead of closing a question for not being constructive. A: If you can see your way to rewording such a question without changing its intent, then go right ahead and do so! Even if the question has already been closed by the time you make your edit, it can still be reopened. We even made changes recently to increase the visibility for such edited questions.
{ "pile_set_name": "StackExchange" }
I’m really hoping this will be one of my last posts on this whole Never Trump business. I’m with Jonah, the whole debate about the nature of Never Trump after his election is getting really tedious. I wrote a piece about my approach two days after the election, and I feel like I’ve been repeating myself ever since. Praise him when he’s right, critique him when he’s wrong, apply the same standards to your own side that you apply to ideological opponents, and keep your eyes fixed on the larger, more important cultural trends. The label “Never Trump” is and was imprecise. There were actually two broad kinds of Never Trumpers. There were the Never Trumpers who voted for Hillary and the people like me (and many of my colleagues) who were opposed to Trump and Hillary and refused to vote for either candidate. This is not a small difference. I see the Democratic Party as utterly opposed to many of my core values — including the defense of life and religious liberty. I see its progressive base committed to a brand of identity politics that is noxious, toxic, and often bigoted. And I saw Hillary Clinton as thoroughly corrupt and just as unfit for the presidency. She should have been prosecuted for mishandling national defense information, not nominated by her party to run for the nation’s highest office. The Never Trumpers who crossed party lines and voted for Hillary disagreed with some or all of these assessments. None of them had that much affection for Hillary, but most of them saw her as a conventional Democratic politician with perhaps an above-average number of flaws. Many of them aren’t socially conservative and might even feel a degree of hostility to the religious conservative wing of the GOP. If you’re not pro-life (or indifferent to culture war issues), if you favor increased gun control, and if you feel a degree of cultural alienation from many of the GOP’s exurban and rural voters, then voting for Hillary and even allying with the #Resistance is a much more natural fit. Some folks seem to be on a glide path to becoming Democrats — or perhaps starting a third party that better fits their more centrist world view. But what about the Never Trump/Never Hillary religious conservatives? While there are multiple cultural vehicles for advocating their core values, the sole viable political vehicle remains the Republican Party. That means engaging with Republicans of good will and good faith (there are many), advocating for the best possible outcomes from the current administration, and fighting against not only the worst impulses of the current president but also the viciousness, incompetence, and bigotry of the Bannon-led insurgency and its coalition of grifters and cranks. I’m ending 2017 with a small amount of unexpected optimism. As I wrote last week, conservatives are actually winning the GOP civil war. Trump’s polices aren’t nationalist populist but rather conventional and conservative. Roy Moore’s loss is a loss for the worst elements of the Republican Party. There’s good reason to believe that after the Trump storm passes the GOP’s conservative core will remain. I know there’s trouble on the horizon in the midterm elections, and Trump’s character and temperament have proven to be worse than I feared, but the transformation of the GOP into a Trump/Bannon vehicle for white identity politics and malignant nationalism has been bitterly and often successfully opposed from within the GOP — and that’s a very good thing indeed.
{ "pile_set_name": "OpenWebText2" }
Q: Lua: Calling functions in own module I created a module for an RTC. It looks like this: local moduleName = ... local M = {} _G[moduleName] = M ---------- Local variables --------------------- local id = 0 local address = 0x68 ---------- Helper functions -------------------- local function bcdToDec(val) local hl=bit.rshift(val, 4) local hh=bit.band(val,0xf) local hr = string.format("%d%d", hl, hh) return string.format("%d%d", hl, hh) end local function decToBcd(val) local d = string.format("%d",tonumber(val / 10)) local d1 = tonumber(d*10) local d2 = val - d1 return tonumber(d*16+d2) end ---------- Module functions -------------------- function M.Init(sda, scl) i2c.setup(id, sda, scl, i2c.SLOW) end function M.PrintTime() i2c.start(id) i2c.address(id, address, i2c.TRANSMITTER) i2c.write(id, 0x00) i2c.stop(id) i2c.start(id) i2c.address(id, address, i2c.RECEIVER) c=i2c.read(id, 7) i2c.stop(id) s = bcdToDec(string.byte(c,1)) m = bcdToDec(string.byte(c,2)) h = bcdToDec(string.byte(c,3)) time=string.format(" %s:%s:%s", h, m, s) print(time); end function M.PrintDate() i2c.start(id) i2c.address(id, address, i2c.TRANSMITTER) i2c.write(id, 0x00) i2c.stop(id) i2c.start(id) i2c.address(id, address, i2c.RECEIVER) c=i2c.read(id, 7) i2c.stop(id) s = bcdToDec(string.byte(c,1)) m = bcdToDec(string.byte(c,2)) h = bcdToDec(string.byte(c,3)) wkd = bcdToDec(string.byte(c,4)) day = bcdToDec(string.byte(c,5)) month = bcdToDec(string.byte(c,6)) year = bcdToDec(string.byte(c,7)) time=string.format(" %s.%s.%s", day, month, year) print(time); end return M I saved this file as "ds3231_m.lua". Calling functions from another file works like this: m = require 'ds3231_m' m.Init(2,1) --sda, scl = 2, 1 m.PrintTime() --m.PrintDate() package.loaded.ds3231_m = Nil as well as m = require 'ds3231_m' m.Init(2,1) --sda, scl = 2, 1 --m.PrintTime() m.PrintDate() package.loaded.ds3231_m = Nil But when I try calling both functions: m = require 'ds3231_m' m.Init(2,1) --sda, scl = 2, 1 m.PrintTime() m.PrintDate() package.loaded.ds3231_m = Nil I get an error: test.lua:4: attempt to call field 'PrintDate' (a nil value) Can anyone tell me what is going wrong? Thank you very much in advance! Regards A: Inside PrintTime (and PrintDate) you're doing m = something. That does overwrite your m from m = require(...). You should use locals in those functions: function M.PrintTime() i2c.start(id) i2c.address(id, address, i2c.TRANSMITTER) i2c.write(id, 0x00) i2c.stop(id) i2c.start(id) i2c.address(id, address, i2c.RECEIVER) local c=i2c.read(id, 7) i2c.stop(id) local s = bcdToDec(string.byte(c,1)) local m = bcdToDec(string.byte(c,2)) local h = bcdToDec(string.byte(c,3)) local time=string.format(" %s:%s:%s", h, m, s) print(time); end That way, you won't be editing any globals. Also do the same for PrintDate. (If you did other_name_than_m = require(...) you wouldn't have noticed, but print(m) would still print a number, the amount of minutes from something)
{ "pile_set_name": "StackExchange" }
Addis Ababa National Stadium Prince Makonnen National Stadium will be a multi-purpose stadium, which can host football, rugby and athletics, in Bole, in eastern Addis Ababa, Ethiopia. It will be the national stadium of the Ethiopia national football team. The stadium will have a capacity of 60,000 and will be built by the China State Construction Engineering. While the stadium itself will cover 37 hectares, development is planned around it, spanning across 60 hectares. References Category:Athletics (track and field) venues in Ethiopia Category:Football venues in Addis Ababa Category:National stadiums Category:Sport in Addis Ababa Category:Multi-purpose stadiums Category:Buildings and structures in Addis Ababa Category:Stadiums under construction
{ "pile_set_name": "Wikipedia (en)" }
Mae Pu Kha Mae Pu Kha () is a tambon (subdistrict) of San Kamphaeng District, in Chiang Mai Province, Thailand. In 2005 it had a population of 5,969 people. The tambon contains nine villages.</u> Water quality San Kamphaeng District, where Mae Pu Ka is located, is an area where the groundwater contains high levels of fluoride up to 4.8–15 mg/l. Studies found that residents' urinary fluoride levels were elevated and that the highest risk of fluoride ingestion comes from cooking rice with fluoride-containing water because of a lack of knowledge on fluoride sources and fluoride chemistry. In Mae Pu Kha Subdistrict, it was observed that the village waterworks had been completed and piped water was available to most, if not all of its households. Although residents have also dug wells in their compounds, these have generally been abandoned due to poor water quality and concerns over airborne pollution. A study also reported that many rural villagers have been informed of the risks of fluorosis from drinking high-fluoride water through outreach programmes conducted by public health workers and community ambassadors. This is also evident at the Mae Pu Kha District where villagers respond by consuming bottled drinking water instead of piped water and groundwater from wells. The municipality-managed public water plant provides free drinking water to registered households on a quota-basis. References Category:Tambon of Chiang Mai Province Category:Populated places in Chiang Mai Province
{ "pile_set_name": "Wikipedia (en)" }
In 1993, 23-year-old Chester Hollman III was wrongly convicted of the 1991 murder of Tae Jung Ho in Philadelphia. The state’s case rested entirely on false eyewitness testimony. He spent 28 years in prison before he was finally exonerated and released in July 2019. His story is featured in the new Netflix docuseries The Innocence Files. I reached out to Chester to learn what it was like for him to tell his story to Netflix, and to ask how he’s adjusting to freedom during the pandemic. Amanda Knox How did you come to be involved in the Netflix series? Chester Hollman I want to say, two years ago maybe, a year and a half ago, I was still incarcerated and I was so focused on getting out. So my lawyer came to see me and we were talking about things we were arguing in regards to the case. Then he had mentioned that Netflix had reached out to him wanting to do a piece on my case. So, you know, I’m sitting in prison. I’d just been there close to 28 years, and that was the furthest thing away from my mind. I said, “I don’t know. What do you think?” And he said, “Well, it can’t hurt. We want to get as much exposure as we can to try to shed light on your case. I think we should do it.” So I more or less just went with it, based off what he said. I didn’t really think about all the particulars surrounding it, where it will lead to, but it happened. Amanda Knox What did you think of the possibility of there being more exposure to your case? Chester Hollman For so many years, everything we said just fell on deaf ears. I thought about it for those days afterwards that I agreed to do it. I told my celly. He’s like, “Man, that’s going to bring a lot of exposure to your case.” That’s the only thing I thought about because for so many years, maybe a decade that we had fought, and no one heard us. I met with the director through a phone call, and he made me feel very comfortable. The rest is history. We started having phone conversations on the regular and behind that, my case was actually picking up momentum with the conviction [integrity] unit. So I was optimistic and more hopeful than I’ve ever been in decades. Amanda Knox I only spent four years in prison, and the entire time, there was a ton of media attention. Some of it was good, and some of it was really, really bad. But at least I wasn’t being forgotten. And that is a terrifying prospect. As the gates closed behind you in prison, people forget about you. Did you feel that way? Chester Hollman Exactly. Oh, yes. For years. My parents spent so much money on attorneys and trying to just try to get someone to listen to us. I think once you’re found guilty and they put you in prison, I didn’t realize it at the time how much of an uphill battle it really is. You think the truth is what the justice system is built on. A lawyer once told me that it’s not about truth or innocence, it’s about who can tell the better story. And I didn’t understand that. And it made for a difficult fight. I just kept believing that the truth is there. All someone has to do is listen to it, and once they see it, I’ll be set free. That went on for so many years. So when Netflix came along, and now to have my story told is just overwhelming for me. It’s only been what, almost nine months I’ve been home now. Amanda Knox You’re a baby. Chester Hollman Yeah, you know, I’m growing. We are where we are. And I guess I’m just so grateful. The way things unfolded, after so many years, I just can’t believe it. Even today, I just can’t believe things happened the way they did. Amanda Knox What was it like for you to relive your whole story with the filmmakers? Chester Hollman That was hard because the director or producer came to see me a few times, but most of our talks were over the phone, and you get 15 minute phone calls, and I would line it up where I would try to get two calls, three calls back-to-back depending on the day and what he needed us to talk about. And he would, you know, dive into the case and my personal life and I’m standing on the block phone surrounded by other inmates. It was rough, but I kept looking towards the end game, so to speak. But when you’re going through it and reliving all these things, it brought a little anger as well. I’m telling myself, “I can’t believe people can’t see this.” Amanda Knox Yeah, it makes you feel like a crazy person. “How am I the only one who sees this?” Chester Hollman Exactly. Exactly. I didn’t understand the justice system. Before, I just thought that it was built on truth. What I’ve learned since then is that, that’s not necessarily the case. So many people don’t think these things happen, or it’s like some type of fluke. I don’t know. But all I know is that, it’s not right. It does happen and I’m living proof of that. Amanda Knox You mentioned that you had Netflix in the prison. Did you ever see any of the other true crime documentary series that were out there on Netflix? Chester Hollman I was actually the one that played the movies. We had an in-house TV station and the supervisor would get the movies throughout the week, and he would give them to me, and they came in a red sleeve that said Netflix. We usually got action movies, comedies. That’s what the guys wanted to see. We never really got series like what you just spoke of. Amanda Knox Old school Netflix. Chester Hollman Right. Right. Whatever he thought we should see, that’s what we saw. He tried to get the latest movies that came out, but anything aside from that, we just didn’t get. Amanda Knox What did the other inmates think when they overheard you telling your story on these phone calls? Chester Hollman I tried to keep it as low key as I possibly could. I didn’t want guys to feel like I thought I was better than the next man. It wasn’t until the prison saw the Netflix crew that actually showed up with the cameras and so forth, that’s when it kind of got out there. And all the guards and inmates started coming to me. I tried to remain humble about it, because I didn’t want to rub it in anybody’s face. I didn’t want them to think that I was getting preferential treatment. And not only that, I just didn’t know how it was going to end up, so I didn’t want to put it out there and then have it fizzle out. I just tried to wait to see what’s gonna happen. Amanda Knox What was it that the filmmakers said to you that made you feel like they were the right ones to help you tell your story? Chester Hollman Oh, I don’t know. I was very skeptical going in, but getting to know him first, before we actually went and dove into anything about the case, was key. He just seemed really down to earth, honest. And just basically told me he’s wanting to tell my story, and it was a case worth looking into. And I was open to it, naturally, because we hadn’t had that in so many years. Not so much the putting it on film, but just people listening. That was the only thing that I had really wanted for so many years. Whether I got out or not. It was just about someone listening and looking into it, and if you didn’t see it, so be it, but at least take a look. We talked maybe two or three times a week and that went on for months. Amanda Knox Did any of that process surprise you? Was it surprisingly easy or surprisingly hard? Chester Hollman There were some things that he asked me, especially in regards to my mom and the beginning stages of all this, and that was a rough period. There were things that I more or less blocked out, you know, in terms of some of the interactions with detectives. It definitely wasn’t easy. Amanda Knox What do you hope viewers will take from watching the series? Chester Hollman Prior to me going to prison, if you were to ask me, I never, ever would have thought that this could happen. I just never would have thought it. A lot of people think that, “Well, they must have did something or they know something or, you know, they were connected somehow. They don’t just put innocent people in prison.” You don’t necessarily have to be involved in any way. It’s the wrong place at the wrong time. Amanda Knox How do you feel about the idea of telling others about your story now today? Do you feel that, with the Netflix series, you’ve done it and now you want to move forward? Or has the Netflix series and participating in it made you feel the desire to continue telling your story now that you’re free? Chester Hollman I don’t ever want to seem ungrateful, but at this point, it’s been almost nine months now, and actually tomorrow will make nine months I’ve been home, and I’m just trying to get on with my life. 28 years―I went in when I just turned 21, so it was more than half my life. So, at this point, I’m just trying to salvage whatever is left of it. Telling my story over and over again, I don’t know how much good it does for me, because it’s not easy. You think about all the things you lost along the way. That’s the hard part. I’m willing to do it, but I’ve lost so much and there’s so much I want to do, and I just don’t think I can do that, holding on to that. Now that it’s out there on Netflix, I’m hoping I don’t have to relive it. Maybe if I had more time out here, but it’s still right there, you know? This time last year, I was still sitting there not knowing what the future held. Amanda Knox I hear you. What I would say to that is, you have every right to put this behind you and move on to other things. I think that’s one of those weird catch 22s that exonerees find themselves in, is very often we go in very young, before we’re even a fully developed human being, and then we fight for our innocence for so long that it feels like the only thing that is of value is like, “Okay, I’m an innocent person. Now what?” Chester Hollman Exactly. That’s what I’m still trying to figure out because it’s been a difficult transition. The way I was released, I didn’t expect it. I was thrown out here. I just spent 25 years in this one particular place, then they told me, “You got one hour. You’re no longer considered an inmate. You’re a civilian now.” So, to come home and be thrust into this life, I’m happy to be here, but I didn’t prepare myself mentally. I’m just still trying to find my way with technology and dealing with people and being unafraid, trying to figure out what it is I want to do at this point. I still haven’t figured that out. I like just sitting around and just observing things and just taking it all in. That’s what I’ve been doing, just trying to take it all in. Amanda Knox Process. Chester Hollman Exactly. Amanda Knox Well, you’re doing the right thing. I think that a lot of us feel this deep urge to rush into things. I definitely felt like that. You’re like, “I’ve waited so long, what am I waiting for?” But, like, it does take time to really think through where you are, and who you are in this new world that you have access to now. So I think you’re doing the right thing. Chester Hollman I’m definitely trying. I kind of have a few regrets because, in there I had time to prepare for this potential day coming, but I didn’t, because I had kind of lost hope. Because so many years of denials, I just didn’t think it was going to happen. I didn’t see it. So I didn’t really prepare myself. I lived in prison, and I focused on one day at a time in there, and I never really envisioned myself out here. So when I got here, I didn’t have a plan. So now I’m trying to do this on the fly. That’s the hard part, trying to do it on the fly. Amanda Knox What are some of the challenges that you’re facing? And what kinds of things have you learned over the past nine months? Chester Hollman First of all, trying to come to terms that my mom’s not here. The first day I got home and just realized that she wasn’t there, because the night I left the house, she was there, and I return 28 years later and she’s not there. So dealing with that has been hard. And the changes in the neighborhood, technology, of course, I’m still figuring that out. I still haven’t figured this phone out. People say it takes time and I understand that, but at same time, I had time to get an idea of what I wanted to do and I didn’t do it. Prior to going to prison, I actually wanted to be in law enforcement. That was my only aspiration growing up, so when I got out, I had no other thought or focus. I do a lot of drawing. So, I don’t know. I’m just trying to figure it all out and who I am as a person. I just want people to see me for who I am. I’m talking about my family. When I first came out, they thought I was still the same kid they knew prior to me going in, and I’m not that same person. When you lose so much, it changes you. I think I’m just more grateful for little things that I think people take out here for granted, walking down the sidewalk or walking into grass with your shoes off. These things that we didn’t do for so many years. I move very slow, because I try to take everything in, and sometimes people don’t understand that. I just feel very, I don’t know, humbled to be back out here. Because I really, truly, truly, truly believed that I was going to die in there. I watched myself just get older and older and older and it just reached a point where I was like, it’s not gonna happen. Amanda Knox I’m really, really glad to hear that you’re hanging in there and, you know, that uncertainty is real. And I think that for the first time with quarantine, people are experiencing that. Chester Hollman Yes, yes, yes. I mean, it’s a different type of lockdown, but it gives people time to reflect. Life moves so fast out here. So I think it just slows things down and causes people to reflect and see what’s important. I know that’s what I’m doing.
{ "pile_set_name": "Pile-CC" }
If he does return, the possibility of a rematch 12 years in the making could turn reality. When news broke of the floundering TNA vying to get pro-wrestling legend Bill Goldberg on their roster, money could be put down that the WWE was after him too. According to Daily Wrestling News, the reports are factual. Initial murmurs suggested that the WWE wanted Goldberg to sign a one-year contract, but according to the internal grapevine, a six-month deal seems more likely. As of now, no move has been made to offer Goldberg a contract but that would materialize as we approach WrestleMania 32. According to reports, Goldberg is interested in just one match at the grandest stage of them all, so any development on him and a one-year or six-month contract would be intriguing. With reports emerging that TNA has the purse to buffer its diminished roster, it might well prove that Goldberg is in quite a comfortable position to negotiate satisfactory terms of contract with the WWE. Talk of Goldberg possibly returning surfaced just a few days after WWE Hall of Famer Stone Cold Steve Austin told media that he thought the company should rope in the former World Heavyweight Champion. If he does indeed return, it would be after 12 years. The last time Goldberg wrestled for the WWE was at WrestleMania 20 in 2004, where he defeated Brock Lesnar. Dare we say it?
{ "pile_set_name": "Pile-CC" }
Knowledge of cervical cancer screening and use of cervical screening facilities among women from various socioeconomic backgrounds in Durban, Kwazulu Natal, South Africa. The value of screening for cervical cancer has been proven. Such screening in developed countries has achieved a decrease in incidence and mortality by about 80%. Although screening facilities are available in certain parts of developing countries, the incidence of cervical cancer remains very high and many patients present with late stage disease. The study was performed among women from different socioeconomic circumstances (low, middle, and upper social/financial backgrounds). The assessment was performed by means of a questionnaire. The majority of patients from lower socio-economic circumstances with multiple risk factors were not aware of cervical screening or facilities available for this purpose. However, in spite of knowledge of cervical screening and the availability of such services, the majority of women (87%) from higher social and educational backgrounds did not undergo cervical screening. Most patients resided within a 12-kilometer radius of a facility that either provided or could potentially provide screening. Although some patients (36.7%) had had a screening test performed at some time in the past, only 27.3% of patients reported having had a Pap test. This was due to failure on the part of the healthcare giver to disseminate information to the patient regarding the reason and value of cervical screening. Among women from higher socioeconomic groups, the level of education was better and knowledge of the Pap test was not age-dependent. We conclude that the mere provision of a cervical cancer screening service is not sufficient to ensure successful uptake since screening is a multifaceted entity. Improvement of socioeconomic and educational circumstances should improve the uptake of a screening program only if the healthcare giver provides appropriate information to the patient and the patient takes the initiative to avail themselves of such screening.
{ "pile_set_name": "PubMed Abstracts" }
“We’re going to start saying ‘Merry Christmas’ again,” President-elect Donald Trump promised a cheering crowd in Grand Rapids, Michigan, on December 9. “How about all those department stores?” he went on. “They have the bells and they have the red walls and they have the snow, but they don’t have ‘Merry Christmas.’ I think they’re going to start putting up ‘Merry Christmas.’” This was not an off-the-cuff remark for Trump. Throughout his post-election “thank you tour,” Trump spoke behind a podium bearing a “Merry Christmas USA” sign. He ended his speeches with the holiday greeting. At a December 16 rally in Orlando, Florida, he delivered his speech from a stage adorned with more than a dozen Christmas trees serving as a backdrop. And the city of Mobile, Alabama, extracted a beloved cedar from a public park in order to festoon it with ornaments and use it as a backdrop for the tour’s final stop, on December 17. On social media and in e-mail, many Mobile residents protested their tree’s uprooting. But Trump has been sounding the theme of “bringing back Christmas” to America’s public square and to the White House with increasing vigor throughout his transition. “Other people can have their holidays,” Trump added during a September campaign stop, “but Christmas is Christmas.” Bringing back Christmas, then, is a campaign promise Trump is making good on. Many of Trump’s supporters, especially Christian evangelicals, have responded well to his campaign promise of restoring Christmas’s role as an all-American major holiday, a concept seen as providing the religious element to Trump’s pledge of “making America great again.” For those members of the Jewish community, who had marveled in the incremental progress toward a more minority-sensitive approach in the past decade, Trump’s promise raises the possibility of a setback. Trump is evoking the so-called “war on Christmas,” a notion that dates back to 2005, when religious pundits and right-wing commentators began taking issue with government officials, businesses and retailers that avoided the exclusive Christmas greeting in favor of a more general “Happy Holidays” and a generic references to the “holiday season.” The issue resurfaces each December, and it became a campaign matter during the 2016 election as Trump attempted both to push back again what he described as a culture of political correctness and to appeal to Christian voters displeased with Trump’s prior demonstrated indifference to religion. Image by brandeis u. Prof. Jonathan Sarna “Mr. Trump is appealing to the voters who elected him, and these people don’t like the changes in America,” Jonathan Sarna of Brandeis University said. “Naturally, Christmas becomes a way of ‘sticking it’ to those who are not part of the old majority.” Sarna, who had written extensively on the role that Christmas plays in American Jewish life, warned against focusing on the “silliness” of Christmas greetings and symbols while avoiding the bigger issue at stake. “The question is, what country do we want,” he said. “Do we want to be a country that is welcoming and sensitive to minorities or a country where the majority imposes views on the minority?” Trump Sounds ‘War on Christmas’ Battle Cry President Obama was an easy target for those who believe the “war on Christmas” is real. His pronounced effort to demonstrate inclusiveness toward religious and ethnic minorities, as well as false claims about his own religious affiliation stoked by “birthers,” who insisted he was Muslim, drew special attention to Obama’s use of Christmas symbolism. And nowhere was it more visible than in the public debate over a seemingly insignificant gesture - the White House holiday greeting card. The Obama family has made a point, even this year of using phrases such as “joyous holiday season and a wonderful new year,” while avoiding any direct reference to Christmas. “Merry Christ… er… scratch that. “We Are the Obamas and It’s Some Random Holiday!” tweeted Sarah Palin, the former Alaska governor and vice presidential candidate. In fact, Obama never shied away from speaking about Christmas, despite the minority-sensitive approach to the official White House greeting cards. The online publication Slate recently compiled a video collection of dozens of instances in which Obama greeted audiences with “Merry Christmas,” including several times when he chose to use the Hawaiian version, “Mele Kalikimaka.” Obama also held an annual Hanukkah party, but he hosted it in a White House decorated lavishly for Christmas. “Anybody who was in the White House for the Hanukkah party could not be under the illusion that the house was decorated for a generic holiday,” said Rabbi Jack Moline, president of Interfaith Alliance. “Nothing there represented anything but Christmas.” In fact, the only nod to Judaism found among the elaborate decorations was a pair of yarmulkes placed on the heads of two snowmen. Image by Wikimedia Commons Rabbi Jack Moline Indeed, Moline and other Jewish leaders say they aren’t discomfited when Trump talks up Christmas. “I was never offended by people saying ‘Merry Christmas’ to me, and I never hesitated to wish them Merry Christmas back,” Moline said. “No Jewish child has ever accepted Jesus as his savior because he saw a Christmas tree.” “It’s just a seasonal thing,” said an official with a Jewish organization that deals with discrimination and civil rights, “this is not something we’re worried about.” Jewish organizations are, however, concerned that more practical — rather than rhetorical — religious issues will emerge once Trump takes office, from religious-based entry visa restrictions, to diversion of public funding to parochial schools, to inserting religious considerations into women’s health issues. This could help explain why Trump’s promise to restore Christmas was met with no pushback from the Orthodox Jewish community, the only Jewish denomination to vote overwhelmingly for Trump. Many members of the community like the idea of blurring the line between church and state on issues like state funding for religious schools. “These folks aren’t concerned with the Christmas discussion,” Sarna said. “It’s not news for them that Jews are a minority.” Then, too, Christmas in America is also a season of ecumenical gift giving that cuts across religious lines. Trump understands that, too. He’s exploiting the nexus of politics and religion as a source of income, with an aggressive marketing push of Trump baseball cap Christmas tree ornaments for just under $100. In an email to supporters offering a special deal on the ornaments, the Trump store hit all the right notes: “President-elect Trump loves Christmas and makes a point of proudly saying ‘Merry Christmas’ every chance he gets.” Trump Sounds ‘War on Christmas’ Battle Cry Contact Nathan Guttman at [email protected] or follow him on Twitter, @nathanguttman
{ "pile_set_name": "OpenWebText2" }
Steve Martin (sportscaster) Steve Martin (born August 14, 1952 in Millinocket, Maine) is a sportscaster, calling primarily college football and both pro and college basketball. He studied political science and history at the University of Maine. He has called Atlantic Coast Conference basketball and football. On the professional side, he has served as a broadcaster for the Charlotte Hornets, New Orleans Hornets and Charlotte Bobcats. He was also the voice of the Davidson College Wildcats on WBT-1110 from 1982–1987. On February 27, 2018, the Charlotte Hornets announced that Martin would be retiring at the conclusion of the 2017-18 NBA season. References External links Category:Living people Category:American radio sports announcers Category:American television sports announcers Category:College basketball announcers in the United States Category:College football announcers Category:National Basketball Association broadcasters Category:National Football League announcers Category:Carolina Panthers broadcasters Category:Charlotte Bobcats broadcasters Category:Charlotte Hornets broadcasters Category:New Orleans Hornets broadcasters Category:1952 births
{ "pile_set_name": "Wikipedia (en)" }
Find ancestors in Civil War letters, War of 1812 letters, Revolutionary War letters. Search your ancestry and find your genealogy. Find your roots and hear your ancestors' words. Discover your origins in old letters as ancestors tell their stories and details of family history. Learn how to preserve old documents, family treasures and heirlooms. Coffin Plate Collection Private collection of over 400 coffin plates with names of ancestors plus birth and death dates Olive Tree Newsletter JOIN the FREE Olive Tree Genealogy Newsletter. Be the first to know of genealogy events and freebies. Find out when new genealogy databases are put online. Get tips for finding your elusive brick-wall ancestor. Enter your surname for a list of genealogy books with fascinating facts and history about your family name Past Voices Ancestor Letters Arranged by Surname If you prefer to choose a letter by geographic location, please use the index of States. Go to Past Voices Blog for letters that are NOT in the index below. Be sure to check there if you don't find your ancestors in the index below. Or just go and read them anyway because the letters are so poignant and historically interesting! Note that they are NOT indexed, you have to scroll down each month's archives at Past Voices Blog to look for any of interest to you A Allen, Dr. B.B. , Freeport CA to Dr. Chas. Carothers of Missouri 1869Andrews Christopher, Letters from Minnesota and Dakota 1856 Letter of February 1969 from William Xavier Andrews in Vietnam about the Tet Offensive Saturday night February 22, 1969Atkins1863 Civil War Letter from George B. Atkins to his father from Camp Douglas, Illinois [ CIVIL WAR] Letter from Helen C. "Ella" Early, born October 13, 1896 in Green Bay, Wisconsin, to her brother Edward James Early, World War I and her sister Margaret Mary C. Early Letter from Jessica Early (nee Jessica Agnes O'Keefe, born Oconto Wisconsin, daughter of Dr. Patrick J. O'Keefe and Elizabeth Hoeffel) to her husband James Edward Early, World War I 1917 Oconto Wisconsin Early February 14, 1918 letter from James William Early of Green Bay, Wisconsin to his brother, Captain Edward James Early in World War I Early Helen C. (Ella) Early to her brother Edward James Early & sister Margaret Mary C. Early, Missouri 1918 Early World War I letters to Edward Early from Jessica Agnes O'Keefe Early Eberlein Collection - Civil War letters from the Eberlein brothers George and Ferdinand to parents 1863 [ CIVIL WAR] Letter to D. S. Edwards, M. D., Surgeon U. S. S. North Carolina, New York, from his brother, H. Edwards, New Orleans, Louisiana, September 20, 1845
{ "pile_set_name": "Pile-CC" }