text
stringlengths 0
7.84M
| meta
dict |
---|---|
1. Field of the Invention
The present invention relates to a wireless communication system and, more particularly, to a method for reducing the transmission delay of packet data in a mobile radio communication system.
2. Description of the Background Art
A universal mobile telecommunications system (UMTS) is a third generation mobile communication system that has evolved from a standard known as Global System for Mobile communications (GSM). This standard is a European standard which aims to provide an improved mobile communication service based on a GSM core network and wideband code division multiple access (W-CDMA) technology. In December, 1998, the ETSI of Europe, the ARIB/TTC of Japan, the T1 of the United States, and the TTA of Korea formed a Third Generation Partnership Project (3GPP) for the purpose of creating the specification for standardizing the UMTS.
The work towards standardizing the UMTS performed by the 3GPP has resulted in the formation of five technical specification groups (TSG), each of which is directed to forming network elements having independent operations. More specifically, each TSG develops, approves, and manages a standard specification in a related region. Among them, a radio access network (RAN) group (TSG-RAN) develops a specification for the function, items desired, and interface of a UMTS terrestrial radio access network (UTRAN), which is a new RAN for supporting a W-CDMA access technology in the UMTS.
The TSG-RAN group includes a plenary group and four working groups. Working group 1 (WG1) develops a specification for a physical layer (a first layer). Working group 2 (WG2) specifies the functions of a data link layer (a second layer) and a network layer (a third layer). Working group 3 (WG3) defines a specification for an interface among a base station in the UTRAN, a radio network controller (RNC), and a core network. Finally, Working group 4 (WG4) discusses requirements desired for evaluation of radio link performance and items desired for radio resource management.
FIG. 1 shows a structure of a 3GPP UTRAN. This UTRAN 110 includes one or more radio network sub-systems (RNS) 120 and 130. Each RNS 120 and 130 includes a RNC 121 and 131 and one or more Nodes B 122 and 123 and 132 and 133 (e.g., a base station) managed by the RNCs. RNCs 121 and 131 are connected to a mobile switching center (MSC) 141 which performs circuit switched communications with the GSM network. The RNCs are also connected to a serving general packet radio service support node (SGSN) 142 which performs packet switched communications with a general packet radio service (GPRS) network.
Nodes B are managed by the RNCs, receive information sent by the physical layer of a terminal 150 (e.g., mobile station, user equipment and/or subscriber unit) through an uplink, and transmit data to a terminal 150 through a downlink. Nodes B, thus, operate as access points of the UTRAN for terminal 150.
The RNCs perform functions which include assigning and managing radio resources. An RNC that directly manages a Node B is referred to as a control RNC (CRNC). The CRNC manages common radio resources. A serving RNC (SRNC), on the other hand, manages dedicated radio resources assigned to the respective terminals. The CRNC can be the same as the SRNC. However, when the terminal deviates from the region of the SRNC and moves to the region of another RNC, the CRNC can be different from the SRNC. Because the physical positions of various elements in the UMTS network can vary, an interface for connecting the elements is necessary. Nodes B and the RNCs are connected to each other by an Iub interface. Two RNCs are connected to each other by an Iur interface. An interface between the RNC and a core network is referred to as Iu.
FIG. 2 shows a structure of a radio access interface protocol between a terminal which operates based on a 3GPP RAN specification and a UTRAN. The radio access interface protocol is horizontally formed of a physical layer (PHY), a data link layer, and a network layer and is vertically divided into a control plane for transmitting a control information and a user plane for transmitting data information. The user plane is a region to which traffic information of a user such as voice or an IP packet is transmitted. The control plane is a region to which control information such as an interface of a network or maintenance and management of a call is transmitted.
In FIG. 2, protocol layers can be divided into a first layer (L1), a second layer (L2), and a third layer (L3) based on three lower layers of an open system interconnection (OSI) standard model well known in a communication system.
The first layer (L1) operates as a physical layer (PHY) for a radio interface and is connected to an upper medium access control (MAC) layer through one or more transport channels. The physical layer transmits data delivered to the physical layer (PHY) through a transport channel to a receiver using various coding and modulating methods suitable for radio circumstances. The transport channel between the physical layer (PHY) and the MAC layer is divided into a dedicated transport channel and a common transport channel based on whether it is exclusively used by a single terminal or shared by several terminals.
The second layer L2 operates as a data link layer and lets various terminals share the radio resources of a W-CDMA network. The second layer L2 is divided into the MAC layer, a radio link control (RLC) layer, a packet data convergence protocol (PDCP) layer, and a broadcast/multicast control (BMC) layer.
The MAC layer delivers data through an appropriate mapping relationship to between a logical channel and a transport channel. The logical channels connect an upper layer to the MAC layer. Various logical channels are provided according to the kind of transmitted information. In general, when information of the control plane is transmitted, a control channel is used. When information of the user plane is transmitted, a traffic channel is used. The MAC layer is divided two sub-layers according to performed functions. The two sub-layers are a MAC-d sub-layer that is positioned in the SRNC and manages the dedicated transport channel and a MAC-c/sh sub-layer that is positioned in the CRNC and manages the common transport channel.
The RLC layer forms an appropriate RLC protocol data unit (PDU) suitable for transmission by the segmentation and concatenation functions of an RLC service data unit (SDU) received from an upper layer. The RLC layer also performs an automatic repeat request (ARQ) function by which an RLC PDU lost during transmission is re-transmitted. The RLC layer operates in three modes, a transparent mode (TM), an unacknowledged mode (UM), and an acknowledged mode (AM). The mode selected depends upon the method used to process the RLC SDU received from the upper layer. An RLC buffer stores the RLC SDUs or the RLC PDUs received from the upper layer exists in the RLC layer.
The packet data convergence protocol (PDCP) layer is an upper layer of the RLC layer which allows data items to be transmitted through a network protocol such as the IPv4 or the IPv6. A header compression technique for compressing and transmitting the header information in a packet can be used for effective transmission of the IP packet.
The broadcast/multicast control (BMC) layer allows a message to be transmitted from a cell broadcast center (CBC) through the radio interface. The main function of the BMC layer is scheduling and transmitting a cell broadcast message to a terminal. In general, data is transmitted through the RLC layer operating in the unacknowledged mode.
The PDCP layer and the BMC layer are connected to the SGSN because a packet switching method is used, and are located only in the user plane because they transmit only user data. Unlike the PDCP layer and the BMC layer, the RLC layer can be included in the user plane and the control plane according to a layer connected to the upper layer. When the RLC layer belongs to the control plane, data is received from a radio resource control (RRC) layer. In the other cases, the RLC layer belongs to the user plane. In general, the transmission service of user data provided from the user plane to the upper layer by the second layer (L2) is referred to as a radio bearer (RB). The transmission service of control information provided from the control plane to the upper layer by the second layer (L2) is referred to as a signaling radio bearer (SRB). As shown in FIG. 2, a plurality of entities can exist in the RLC and PDCP layers. This is because a terminal has a plurality of RBs, and one or two RLC entities and only one PDCP entity are generally used for one RB. The entities of the RLC layer and the PDCP layer can perform an independent function in each layer.
The RRC layer positioned in the lowest portion of the third layer (L3) is defined only in the control plane and controls the logical channels, the transport channels, and the physical channels in relation to the setup, the reconfiguration, and the release of the RBs. At this time, setting up the RB means processes of stipulating the characteristics of a protocol layer and a channel, which are required for providing a specific service, and setting the respective detailed parameters and operation methods. It is possible to transmit control messages received from the upper layer through a RRC message.
The aforementioned W-CDMA system attempts to achieve a transmission speed of 2 Mbps indoors and in a pico-cell circumstance, and a transmission speed of 384 kbps in a general radio condition. However, as the wireless Internet becomes more widespread and the number of subscribers increases, more diverse services will be provided. In order to support these services, it is expected that higher transmission speeds will be necessary. In the current 3GPP consortium, research is being performed to provide high transmission speeds by developing the W-CDMA network. One representative system is known as the high-speed downlink packet access (HSDPA) system.
The HSDPA system is based on WCDMA. It supports a maximum speed of 10 Mbps to the downlink and is expected to provide shorter delay time and an improved capacity than existing systems. The following technologies have been applied to the HSDPA system in order to provide higher transmission speed and enlarged capacity: link adaptation (LA), hybrid automatic repeat request (HARQ), fast cell selection (FCS), and multiple input, multiple output (MIMO) antenna.
The LA uses a modulation and coding scheme (MCS) suitable for the condition of a channel. When the channel condition is good, high degree modulation such as 16QAM or 64QAM is used. When the channel condition is bad, low degree modulation such as QPSK is used.
In general, low degree modulation methods support a lesser amount of transmission traffic than high degree modulation methods. However, in low degree modulation methods, a transmission success ratio is high when a channel condition is not desirable and therefore, it is advantageous to use this form of modulation when the influences of fading or interference is large. On the other to hand, frequency efficiency is better in high degree modulation methods than in low degree modulation methods. In the high degree modulation methods, it is possible, for example, to achieve a transmission speed of 10 Mbps using the 5 MHz bandwidth of W-CDMA. However, high degree modulation methods are very sensitive to noise and interference. Therefore, when a user terminal is located close to a Node B, it is possible to improve transmission efficiency using 16QAM or 64QAM. And, when the terminal is located on the boundary of the cell or when the influence of fading is large, low modulation method such as QPSK is useful.
The HARQ method is a re-transmission method which differs from existing re-transmission methods used in the RLC layer. The HARQ method is used in connection with the physical layer, and a higher decoding success ratio is guaranteed by combining re-transmitted data with previously received data. That is, a packet that is not successfully transmitted is not discarded but stored. The stored packet is combined with a re-transmitted packet in a step before decoding and is decoded. Therefore, when the HARQ method is used together with the LA, it is possible to significantly increase the transmission efficiency of the packet.
The FCS method is similar to a related art soft handover. That is, the terminal can receive data from various cells. However, in consideration of the channel condition of each cell, the terminal receives data from a single cell which has the best channel condition. The related art soft handover methods increase the transmission success ratio using diversity, and more specifically, by receiving data from various cells. However, in the FCS method, data is received from a specific cell in order to reduce interference between cells.
Regarding the MIMO antenna system, the transmission speed of data is increased using various independent radio waves propagated in the dispersive channel condition. The MIMO antenna system usually consists of several transmission antennas and several reception antennas, so that diversity gain is obtained by reducing correlation between radio waves received by each antenna.
The HSDPA system, thus, to adopt a new technology based on a WCDMA network. However, in order to graft new technologies, modification is unavoidable. As a representative example, the function of Node B is improved. That is, though most control functions are located in the RNC in a WCDMA network, new technologies for the HSDPA system are managed by the Node B in order to achieve faster adjustment to the channel conditions and to reduce a delay time in the RNC. The enhanced function of the Node B, however, is not meant to replace the functions of the RNC but rather is intended to supplement these functions for high speed data transmission, from a point of view of the RNC.
Thus, in an HDSPA system, the Nodes B are modified to perform some of the MAC functions unlike in the WCDMA system. A modified layer which performs some of the MAC function is referred to as a MAC-hs sub-layer.
The MAC-hs sub-layer is positioned above the physical layer and can perform packet scheduling and LA functions. The MAC-hs sub-layer also manages a new transport channel known as HS-DSCH (High Speed-Downlink Shared Channel) which is used for HSDPA data transmission. The HS-DSCH channel is used when data is exchanged between the MAC-hs sub-layer and the physical layer.
FIG. 3 shows a radio interface protocol structure for supporting the HSDPA system. As shown, the MAC layer is divided into a MAC-d sub-layer, a MAC-c/sh sub-layer, and a MAC-hs sub-layer. The MAC-hs sub-layer is positioned above the physical layer (PHY) of a Node B. The MAC-c/sh and MAC-d sub-layers to are located in the CRNC and the SRNC. A new transmission protocol referred to the HS-DSCH frame protocol (FP) is used between the RNC and the Node B or among the RNCs for the delivery of HSDPA data.
The MAC-c/sh sub-layer, the MAC-d sub-layer, and the RLC layer positioned above the MAC-hs sub-layer perform the same functions as the current system. Therefore, a slight modification of the current RNC can fully support the HSDPA system.
FIG. 4 shows the structure of a MAC layer used in the HSDPA system. The MAC layer is divided into a MAC-d sub-layer 161, a MAC-c/sh sub-layer 162, and a MAC-hs sub-layer 163. The MAC-d sub layer in the SRNC manages dedicated transport channels for a specific terminal. The MAC-c/sh sub-layer in the CRNC manages the common transport channels. The MAC-hs sub-layer in the Node B manages the HS-DSCH. In this arrangement, the functions performed by the MAC-c/sh sub-layer 162 in the HSDPA system are reduced. That is, the MAC-c/sh sub-layer assigns common resources shared by various terminals in the conventional system and processes the common resources. However, in the HSDPA system, the MAC-c/sh sub-layer simply performs a flow control function of the data delivery between the MAC-d sub-layer 161 and the MAC-hs sub-layer 163.
Referring to FIG. 4, it will be described how data received from the RLC layer is processed and delivered to the HS-DSCH in the MAC layer. First, the path of the RLC PDU delivered from the RLC layer through the dedicated logical channel, (i.e. a dedicated traffic channel (DTCH) or a dedicated control channel (DCCH)), is determined by a channel switching function in the MAC-d layer. When an RLC PDU is delivered to the dedicated channel (DCH), a related header is attached to the RLC PDU in the MAC-d sub-layer 161 and the RLC PDU is delivered to the physical layer through the DCH. When the HS-DSCH channel of the HSDPA system is used, the RLC PDU is delivered to the MAC-c/s h sub-layer 162 by a channel switching function. When a plurality of logical channels use one transport channel, the RLC PDU passes through a transport channel multiplexing block. The identification information (control/traffic (C/T) field) of the logical channel, to which each RLC PDU belongs, is added during this process. Also, each logical channel has a priority. Data of a logical channel has the same priority.
The MAC-d sub-layer 161 transmits the priority of a MAC-d PDU when the MAC-d PDU is transmitted. The MAC-c/sh sub-layer 162 that received the MAC-d PDU simply passes the data received from the MAC-d sub-layer 161 to the MAC-hs sub-layer 163. The MAC-d PDU delivered to the MAC-hs sub-layer 163 is stored in the transmission buffer in the scheduling block. One transmission buffer exists per each priority level. Each MAC-hs SDU (MAC-d PDU) is sequentially stored in the transmission buffer corresponding to its priority.
An appropriate data block size is selected by the scheduling function depending on the channel condition. Accordingly, a data block is formed by one or more MAC-hs SDUs.
A priority class identifier and a transmission sequence number are added to each data block and each data block is delivered to the HARQ block.
A maximum 8 HARQ processes exist in the HARQ block. The data block received from the scheduling block is delivered to an appropriate HARQ process. Each HARQ process operates in a stop and wait (SAW) ARQ. In this method, the next data block is not transmitted until a current data block is successfully transmitted. As mentioned above, because only one data block is transmitted in a TTI, only one HARQ process is activated in one TTI.
Another HARQ processes waits until its turn. Each HARQ process has a HARQ process identifier. A corresponding HARQ process identifier is previously known to the terminal through a downlink control signal, so that a specific data block passes through the same HARQ process in the transmitter (the UTRAN) and the receiver (the terminal). The HARQ process that transmitted the data block also stores the data block to provision the future re-transmission. The HARQ process, re-transmits the data block when NonACKnowledge (NACK) is received from the terminal.
When ACK is received from the terminal, the HARQ process deletes the corresponding data block and prepares the transmission of a new data block. When the data block is transmitted, a transport format and resource combination (TFRC) block selects an appropriate TFC for the HS-DSCH.
FIG. 5 shows a structure of the MAC layer of the terminal used in the HSDPA system. This MAC layer is divided into a MAC-d sub-layer 173, a MAC-c/sh sub-layer 172, and a MAC-hs sub-layer 171. Unlike the UTRAN, the above three layers are located in the same place. The MAC-d sub-layer and the MAC-c/sh sub-layer in the terminal are almost same as those in the UTRAN, but the MAC-hs sub-layer 171 is slightly different because the MAC-hs sub-layer in the UTRAN performs only transmission and the MAC-hs sub-layer in the terminal performs only reception.
The manner in which the MAC layer receives the data from the physical layer and delivers it to the RLC layer will now be described. The data block delivered to the MAC-hs sub-Payer 171 through the HS-DSCH is first stored in one of the HARQ processes in the HARQ block. In which process the data block is to stored can be known from the HARQ process identifier included in the downlink control signal.
The HARQ process, in which the data block is stored, transmits the NACK information to the UTRAN when there are errors in the data block and requests the re-transmission of the data block. When no errors exist, the HARQ process delivers the data block to a reordering buffer and transmits the ACK information to the UTRAN. A reordering buffer has a priority like the transmission buffer in the UTRAN. The HARQ process delivers the data block to the corresponding reordering buffer with the aid of a priority class identifier included in the data block. A significant characteristic of the reordering buffer is that it supports in-sequence delivery of data.
Data blocks are sequentially delivered to an upper layer based on a transmission sequence number (TSN). More specifically, when a data block is received while one or more previous data blocks are missing, the data block is stored in the reordering buffer and is not delivered to the upper layer. Rather, the stored data block is delivered to the upper layer only when all previous data blocks are received and delivered to the upper layer. Because several HARQ processes operate, a reordering buffer usually receives data blocks out of sequence. Therefore, an in-sequence delivery function is used for the reordering buffer so that the data blocks can be delivered to the upper layer sequentially.
One difference between the reordering buffer of the terminal and the transmission buffer of the UTRAN is that the reordering buffer stores data in units of data block which is composed of one or more MAC-hs SDUs, while the transmission buffer stores data in units of MAC-hs SDU (=MAC-d PDU). Because the MAC-d sub-layer 173 processes data in units of MAC-d PDUs, when the reordering buffer of the terminal MAC-hs sub-layer 171 delivers the data block to the MAC-d sub-layer 173, the reordering buffer must first disassemble the data block into the MAC-d PDUs and then deliver them to the MAC-d sub-layer. The MAC-c/sh sub-layer 172 passes the MAC-d PDUs received from the MAC-hs sub-layer 171 to the MAC-d sub-layer. The MAC-d sub-layer 173 that received the MAC-d PDU checks the logical channel identifier (C/T field) included in each MAC-d PDU in the transport channel multiplexing block and delivers the MAC-d PDUs to the RLC through the corresponding logical channel.
FIG. 6 shows processes for transmitting and receiving a data block in an HSDPA system. The MAC-d PDUs are actually stored in a transmission buffer 180. However, for the sake of convenience, it is shown as a data block (=one or more MAC-d PDUs). The sizes of the respective data blocks can vary. However, the sizes are shown to be the same because the data blocks for illustrative purposes. Also, it is assumed that eight HARQ processes 181 through 188 exist.
The process includes transmitting data blocks to the receiver for data blocks having transmission sequence numbers from TSN=13 to TSN=22 in the transmission buffer, A data block with a lower TSN is served first to an empty HARQ process. For example, as shown, the data block TSN=13 is delivered to HARQ process #1 181, and data block TSN=14 is delivered to HARQ process #8. From this explanation, it is clear that the TSN is not related to the HARQ process number.
When the HARQ process receives an arbitrary data block, the HARQ process transmits the data block to the receiver in a specific TTI and stores the data block for re-transmission that might be performed later. Only one data block can be transmitted in a certain TTI. Accordingly, only one HARQ process is activated in a single TTI. The HARQ process that transmitted the data block informs the receiver of its process number through a downlink control signal which is transmitted through a different channel than that of the data block.
The reason why the HARQ process of the transmitter coincides with the HARQ process of the receiver is that a stop-and-wait ARQ method is used by is each HARQ process pair. That is, HARQ process #1 181 that transmitted data block TSN=13 does not transmit another data block until the data block is successfully transmitted. Because a receiver HARQ process #1 191 can know that data is transmitted thereto for a corresponding TTI through the downlink control signal, the receiver HARQ process #1 transmits the NACK information to the transmitter through an uplink control signal when the data block is not successfully received within a defined transmission time interval (TTI). On the other hand, when a data block is successfully received, the receiver HARQ process #1 transmits the ACK information to the transmitter, and at the same time delivers the corresponding data block to the reordering buffer according to the priority.
The reordering buffer exists per priority level. The HARQ process checks the priority included in the header information of the data block and delivers the data block to the reordering buffer according to the priority. The data block delivered to the reordering buffer is then delivered to the upper layer when all of the previous data blocks are delivered to the upper layer. However, when one or more previous data blocks are not delivered to the upper layer, the data block is stored in the reordering buffer 190. That is, the reordering buffer must support in-sequence delivery of data blocks to the upper layer. A data block that is not delivered to the upper layer is stored in the reordering buffer.
To illustrate the foregoing, FIG. 6 shows that when data block TSN=14 is received but data block TSN=13 is not received, data block TSN=14 is stored in the reordering buffer until data block TSN=13 is received. When data block TSN=13 is received, both data blocks are delivered to the upper layer in the order of TSN=13 and TSN=14. When the data blocks are delivered to the upper layer, they are disassembled in units of MAC-d PDUs and are delivered as described above.
FIG. 7 is a data block (MAC-hs PDU) format adopted in the HSDPA system. As shown in FIG. 7, the data block consists of a MAC-hs header including control information and a MAC-hs payload carrying the upper layer PDU.
The MAC-hs header includes a Queue ID field and a TSN field, and the MAC-hs payload includes a plurality of MAC-hs SDUs (MAC-d PDUs). Each MAC-d PDU includes the C/T field and the MAC-d SDU (RLC PDU). The C/T field is included in the MAC-d PDU header if multiplexing on MAC is applied, and it provides identification of the logical channel when multiple logical channels are carried on the same transport channel. Four bits are currently allocated for C/T field in order to identify up to 15 different logical channels (1111 is reserved). Since a radio bearer is usually mapped to one logical channel, the C/T field can be further used for identification of radio bearer.
FIG X is a flowchart illustrating how to deliver the received data blocks to re-ordering buffer in UE side MAC-hs sublayer.
As shown in FIG X, the UE side MAC-hs establishes the reordering buffer according to the logical channel priority (SX1), and checks if a Data Block is received from HARQ entity (SX2). If the Data Block is received from HARQ entity, the MAC-hs checks the logical channel priority field (SX3) and forwards the Data Block to the reordering buffer of same priority (SX4). Then, the MAC-hs checks the sequence number of the Data Block, i.e. TSN of the Data Block, (SX5), and determines whether the Data Block can be delivered or not (SX6). If the Data Block is determined that it can be delivered, the MAC-hs disassembles the Data Block into data units (SX7), and checks the logical channel identity of each data units by the C/T field (SX8). Each of the disassembled data units is then delivered is to the corresponding logical channel, respectively (SX9).
In step SX6, if the Data Block is determined that it can not be delivered due to one or more missing Data Blocks preceding it, the MAC-hs stores the Data Block in the reordering buffer according to its sequence number instead of delivering it (SX10). After the Data Block is processed in the above manner, the UE side MAC-hs determines whether or not the HS-DSCH connection is released (SX11). If the HS-DSCH connection is not released, the algorithm goes to the step SX2.
FIG. 9 is an exemplary view for illustrating how data blocks consisting of MAC-d PDUs from different logical channels are transmitted in the HSDPA system.
In FIG. 9, 4 data blocks are transmitted from the UTRAN side MAC-hs. For example, Data Block #10 is composed of 3 MAC-d PDUs where 1 MAC-d PDU is originated from a logical channel #1 and 2MAC-d PDUs originated from a logical channel #2. The figure illustrates the case when Data Block #10, #12, and #13 are successfully received by the UE side MAC-hs while Data block #11 is lost during transmission. Since Data Block #10 has been successfully received, the reordering buffer forwards the Data Block #10 to the upper layer immediately. However, since Data Block #11 is not received, the correctly received Data Block #12 and #13 can not be delivered to the upper layer but just stored in the reordering buffer until Data Block #11 is received or until some stall avoidance mechanism is terminated.
From the viewpoint of logical channel #2, the received MAC-d PDUs are seen as consecutive, since there are no missing MAC-d PDUs between the two adjacent MAC-d PDUs. In other words, since the Data Block #11 does not contain is any PDUs from logical channel #2 , whether Data Block #11 is received or not does not affect the in-sequence delivery of logical channel #2. Accordingly, if the reordering buffer knows the in-sequence delivery of MAC-d PDUs of a specific logical channel, the MAC-d PDUs can be immediately delivered to the upper layer without being delayed in the reordering buffer.
As described above, the multiplexing of logical channels has a drawback in that delivery of MAC-d PDUs of one logical channel may be unnecessarily delayed due to a missing MAC-d PDU of other logical channel. Moreover, the delayed MAC-d PDUs sometimes become useless because of the discards in the RLC layer. | {
"pile_set_name": "USPTO Backgrounds"
} |
Muncie SM465 transmission
The Muncie SM465 is a heavy-duty, four-speed manual transmission built by General Motors for use in light and medium duty trucks from 1968 to 1991. The SM465 can be found in Chevrolet and GMC full-size trucks, Blazers, Suburbans, among other models. Some applications beyond one-ton pickup trucks came with larger input shafts. Favored by off-road drivers, the SM465 has a very low first gear suitable for rock-crawling. The SM465 has developed a reputation as a highly durable transmission. For the 1992 model-year, the SM465 was replaced in 3/4- and 1-ton pickup truck applications by the New Venture Gear 4500 transmission.
The "SM" in the transmission's designation does not stand for Synchro-Mesh, contrary to popular belief. "SM" stands for "SAGINAW MUNCIE".
GM literature also often referred to this as a CH465, referencing Chevrolet.
Gear ratios are:
First - 6.55:1
Second - 3.58:1
Third - 1.70:1 -Sometimes incorrectly listed as 1.57:1.
Fourth - 1.00:1
Reverse - 6.09:1
The SM465 features dual provisions for power take-offs. The 1988-91 versions have an aluminum top with improved shift feel. The 1986 pickup truck versions utilize a hydraulic clutch release, replacing a mechanical linkage in older versions. A common wear factor in the form of abuse leads to having to manually hold the gear selector in third. There have been three different output shafts for pickup trucks. Early four-wheel drive was a short 10 spline, late 4WD was long 32 spline, and all two-wheel drives were 35 spline. Early 4WDs came mated to New Process 205 transfer cases. The 1981 and later versions came with a New Process 208 if not a 205. New Process 241 was used behind the 465 starting in 1989 when it replaced the New Process 208 in the V-series trucks. The 465 was the only manual transmission available for V-series trucks (1987-1991).
References
Category:Automobile transmissions
Category:General Motors transmissions | {
"pile_set_name": "Wikipedia (en)"
} |
import Component from '@ember/component';
import { action } from '@ember/object';
import { inject as service } from '@ember/service';
import HotKeys from 'datahub-web/services/hot-keys';
// Top level component class selector
const emberAppElementSelector = '.ember-application';
/**
* GlobalHotkeys component provides a way to listen for registered keypress events on the DOM by handling the binding or unbinding of listener
* event
* @export
* @class GlobalHotkeys
* @extends {Component}
*/
export default class GlobalHotkeys extends Component {
/**
* A set of DOM keyup event targets for which the hotkey listener will be ignored. Ineligible targets are not useful for the hotkey feature, or
* conflict with the default behavior of the target element for example input elements
*/
inEligibleTargets = new Set(['INPUT', 'TEXTAREA']);
/**
* Service that assists with actually triggering the actions tied to a particular
* target hotkey
*/
@service
hotKeys: HotKeys;
/**
* Returns true if target exists, is not an input, and is not an editable div
* @param {Element} target - target element
*/
isEligibleTarget(target: Element): boolean {
return (
!this.inEligibleTargets.has(target.tagName) &&
!(target.tagName === 'DIV' && target.attributes.getNamedItem('contenteditable'))
);
}
/**
* Method for handling the global keyup.
* @param {KeyboardEvent} e - KeyboardEvent triggered by user input
*/
@action
onKeyUp(e: KeyboardEvent): void {
const target = e.target as Element | null;
if (target && this.isEligibleTarget(target)) {
this.hotKeys.applyKeyMapping(e.keyCode);
}
}
/**
* On DOM insertion, apply handler for keyup events
*/
didInsertElement(): void {
const app = document.querySelector(emberAppElementSelector);
if (app) {
app.addEventListener('keyup', this.onKeyUp);
}
}
/**
* On component destruction, remove hot-keys event handler
*/
willDestroyElement(): void {
const app = document.querySelector(emberAppElementSelector);
if (app) {
app.removeEventListener('keyup', this.onKeyUp);
}
}
}
| {
"pile_set_name": "Github"
} |
Pirelli World Challenge and the Blancpain GT Series have announced a partnership where there will be cross-collaboration and promotion at several races in 2015 and 2016.
As previously reported by Sportscar365, the top three in World Challenge from this year will go to the Baku World Challenge, the season finale for the Blancpain Sprint Series.
Meanwhile, the Blancpain GT Series will come stateside at next year’s race in Circuit of the Americas in March. WC Vision president and CEO Scott Bove announced both series will be in action on March 4-6, 2016.
This will mark the first time both championships will race at the same track on the same weekend.
“The Pirelli World Challenge and Blancpain GT Series share similar desires to expand their product outside their existing markets,” Bove said.
“Pirelli is the common denominator being the official tire for both series. PWC has developed a strong worldwide presence with international drivers, teams and manufacturers competing in our series.
“It’s now time to take our brand of racing to the global stage as a true World Challenge.”
Bove also announced during Friday’s press conference that the GT class will run either at Misano or Vallelunga in late 2016, while also noting that the series will invite several Blancpain teams to its St. Petersburg round next year.
Stephane Ratel, founder and CEO of SRO Motorsports Group, has targeted a U.S. round for several years.
“Getting an American circuit on the Blancpain GT Series’ calendar has always been one of my pet projects,” Ratel said. “The best way to do that is to work together with people who know the ins and outs of racing in the United States.
“The organizers of the Pirelli World Challenge and the people at SRO Motorsports Group share the same philosophy on GT racing: it should be competitive, spectacular and entertaining for the fans.
“It is no use for each of us to do our own thing in our own corner, when sharing our knowledge could produce far better results.” | {
"pile_set_name": "OpenWebText2"
} |
Q:
Determining when to create a new JavaScript file (organizing source code)
I'm about to set out on a large map application project that is going to be around 5,000 lines of JavaScript in total.
My normal way of going about a project like this would be to create a single file called 'main.js' and then include everything all in that one file. I think it's about time I broke out of this habbit and started to store the JavaScript files more sensibly by splitting up components into more JavaScript files. Is this a good idea? I want the project to be more organized.
My question is, what's the best practice for doing this? When should I say "Hmm, this should probably go in its own file". Is there a general rule of thumb I should stick to when deciding to put code in a new file?
A:
Yes, you should break your code up into separate files. There are lots and lots of different ways to decide what should go in a given file - it all depends upon what your code is and how you think it can be best organized. Here are some of the possible ways you can organize things:
Code in reusable objects where similar objects are combined into a module and a small module is contained in one file. Then each file is a module.
Group a set of objects and functions related to one particular type of functionality in one file. For example if you have a set of functions that help you do animation, then you might group all those together in one file.
If you have a set of utility functions that are reusable across a number of different applications, group those together in one or more files so they can be more easily used in multiple projects without reorganizing them.
When considering reusability, put the smallest chunks that you may want to reuse into their own files so you can include only what is desired in your future projects. Also make sure any dependent functions, utilities, etc... are also separately includeable in their own files. The idea is that in a future project you should just be able to include existing files without reorganizing the code and without having to include a bunch of stuff that you don't need.
Put code that is specific to this particular application and/or this specific user interface into it's own files so it is separate from other parts that you may be more likely to want to reuse in other applications.
Also keep in mind that the most efficient deployment strategy is to recombine most of your separate files into a single, larger file that is minimized as this is more efficient for a browser to download and cache and improves the performance of your web site. This recombination of files should be an automatated build step that concatenates files together before minimizing the combined result. It isn't something you do with your editor as you should keep your files separate in your source control system.
| {
"pile_set_name": "StackExchange"
} |
The Bristol Jeffersonvile will celebrate Valentine’s Day with special menus during dinner service on Thursday, Feb. 14 through Saturday, Feb. 16. Guests can enjoy the dinner specials, or order from the regular menu. | {
"pile_set_name": "Pile-CC"
} |
Electrical and gas sensing properties of polyaniline functionalized single-walled carbon nanotubes.
Electrical and gas sensing properties of single-walled carbon nanotube networks functionalized with polyaniline (PANI-SWNTs) were systematically investigated to understand the gas sensing mechanisms and optimize sensing performance. The temperature-dependent electrical resistance and field-effect transistor (FET) transfer characteristics indicated that the electrical properties of PANI-SWNTs are dominated by the PANI coating. The FET transfer characteristics of PANI-SWNTs exposed to different NH(3) concentrations indicated that the dominant sensing mechanism is the deprotonation of PANI by NH(3). Sensing experiments with different gas analytes revealed that PANI-SWNTs responded positively to NH(3), and negatively to NO(2) and H(2)S with sensitivities of 5.8% per ppm(v) of NH(3), 1.9% per ppm(v) of NO(2), and 3.6% per ppm(v) of H(2)S. The lower detection limits were 50, 500, and 500 ppb for NH(3), NO(2), and H(2)S, respectively. | {
"pile_set_name": "PubMed Abstracts"
} |
The Feminist Revolution
You are here
Letty CottinPogrebin
“Our goal at Ms. was to make such lives visible, to honor women's work, and to expose the legal, economic, and social barriers that stand in the way of women's full humanity.” – Letty CottinPogrebin
Statement
I started working on this article in the fall of 1980, in response to the anti-Semitic incidents that had besmirched the United Nations conference in Copenhagen. I wanted to discover whether those outbursts were peculiar to women operating in an international context, or whether some comparable form of anti-Semitism existed among feminists in the United States. So I spent 18 months doing in-depth interviews with more than 80 women from all parts of the country and writing the piece entitled “Anti-Semitism in the Women’s Movement” that eventually appeared in the June 1982 issue of Ms.
Artifacts
The preview issue of Ms. magazine, issued in Spring 1972.
Copyright 1972 Ms. Foundation for Education and Communication.
The minute the magazine hit the newsstands, I was invited to discuss anti-Semitism on television and radio, at universities from Yale to UCLA, and at public forums sponsored by Jewish groups ranging from the New England Anti-Defamation League to the Jewish Center of Dallas. The article was reprinted twice and was photocopied innumerable times as a catalyst for friends and enemies to discuss the problem in classrooms, meetings, and living rooms from Anchorage to Miami, from Toronto to Jerusalem.
Things have changed since my article was published in 1982. An affirmative Jewish feminism has flourished in secular contexts. But while thousands of women have claimed or reclaimed their Jewishness in proud, positive ways, Jewish negativity and shame are also flourishing.
After evaluating the results of my anti-Semitism survey and writing the article for Ms., I saw the importance of being a public, affirmative Jew – even when ethnicity or religion “didn’t matter.” As much as I might wish for a world of universalist values and de-emphasized differences, I would no longer tolerate a women’s movement in which Jews are the only group asked to relinquish their own interests while other women were allowed to push their private agendas and subvert feminist ideals when it suited them. I would no longer assume all women were my sisters.
I still have universalist dreams – visions of one world without the rancors of nationalism, tribalism, and patriarchy – but now I dream them only when fully awake, and I take my inspiration not from some naive UNICEF greeting card but from a pluralist feminism founded on a mutual respect for each other’s “identity politics,” which include the particularities of culture, peoplehood, and history.
Adapted from Deborah, Golda, and Me, Crown Publishers, 1991.
Biography
Letty Cottin Pogrebin earned her B.A. from Brandeis University and became a writer and strong advocate for women’s rights in the early 1970s. In 1971, she was one of the founding editors of Ms. magazine, where she worked for 17 years, and a co-founder of the National Women’s Political Caucus. She was also a consultant on Free To Be You And Me, an album of non-sexist children’s stories and songs, and edited Stories for Free Children. When the United Nations International Women’s Decade Conference equated Zionism with Racism in 1975, Pogrebin was provoked to combat anti-Semitism within the women’s movement just as she fought sexism within Judaism. Over the last three decades, Pogrebin has been a fixture in feminist, Jewish, and Jewish-feminist causes, as well as an outspoken political activist on issues including hunger, the Israel-Palestine conflict, and Black-Jewish relations. She is a prolific author whose publications include Getting Yours: How to Make the System Work for the Working Woman; Growing Up Free: Raising Your Child in the 80s; Deborah, Golda, and Me: Being Female and Jewish in America; and Three Daughters. | {
"pile_set_name": "Pile-CC"
} |
1994 Florida Marlins season
The Florida Marlins' 1994 season was the second season for the Major League Baseball (MLB) franchise in the National League. It would begin with the team attempting to improve on their season from 1993. Their manager was Rene Lachemann. They played home games at Joe Robbie Stadium. They finished with a record of 51-64, last in the National League East. The season ended early as a result of the 1994 players strike.
Offseason
December 15, 1993: Mario Díaz was signed as a Free Agent with the Florida Marlins.
December 20, 1993: Charlie Hough was signed as a free agent by the Marlins.
December 20, 1993: Kerwin Moore was traded by the Marlins to the Oakland Athletics for Kurt Abbott.
December 22, 1993: Mike Jeffcoat was signed as a Free Agent with the Florida Marlins.
March 30, 1994: Mario Díaz was released by the Florida Marlins.
Regular season
By Friday, August 12, the Marlins had compiled a 51-64 record through 115 games. They had scored 468 runs (4.07 per game) and allowed 576 runs (5.01 per game).
Charlie Hough was 46 when he took the hill on Opening Day for the Marlins. He was the second oldest pitcher to pitch on opening day. Jack Quinn started for the Brooklyn Dodgers on Opening Day in 1931 at the age of 47.
Season standings
Record vs. opponents
1994 Opening Day lineup
Notable transactions
April 3, 1994: Matt Turner was traded by the Marlins to the Cleveland Indians for Jeremy Hernandez.
May 30, 1994: Mario Díaz was signed as a Free Agent with the Florida Marlins.
June 2, 1994: Josh Booty was drafted by the Marlins in the 1st round (5th pick) of the 1994 Major League Baseball draft. Player signed July 14, 1994.
June 27, 1994: Mike Jeffcoat was released by the Florida Marlins.
Roster
Player stats
Batting
Starters by position
Note: Pos = Position; G = Games played; AB = At bats; H = Hits; Avg. = Batting average; HR = Home runs; RBI = Runs batted in
Other batters
Note: G = Games played; AB = At bats; H = Hits; Avg. = Batting average; HR = Home runs; RBI = Runs batted in
Pitching
Starting pitchers
Note: G = Games pitched; IP = Innings pitched; W = Wins; L = Losses; ERA = Earned run average; SO = Strikeouts
Other pitchers
Note: G = Games pitched; IP = Innings pitched; W = Wins; L = Losses; ERA = Earned run average; SO = Strikeouts
Relief pitchers
Note: G = Games pitched; W = Wins; L = Losses; SV = Saves; ERA = Earned run average; SO = Strikeouts
Farm system
References
External links
1994 Marlins
1994 Florida Marlins at Baseball Almanac
Category:Miami Marlins seasons
Florida Marlins season
Miami Marl | {
"pile_set_name": "Wikipedia (en)"
} |
The Officer Refused Field Sobriety Test Because He Doesn't Trust CopsIt is a bizarre video in which the officer accused the Milwaukee County Sheriff's deputy of stopping him out of revenge -- indicating the two have known each other for decades.The video begins with the deputy pulling over a truck that was swerving near 83rd and Bluemound early on Sunday, January 1st.Eventually the driver, identified as Milwaukee Police Officer Michael Boden stepped back with the deputy -- wanting no part in a field sobriety test.A spokesman with the Milwaukee Police Department said an internal investigation is underway, adding that Boden faces discipline from the department.Long story short, Officer Boden was drunk and refused the field sobriety tests because he didn't trust the cops. He was arrested for DUI and having a weapon in his possession while intoxicated.[Video Released By Milwaukee County Sheriff's Office] | {
"pile_set_name": "OpenWebText2"
} |
---
abstract: |
It is known that the so-called Bercovici-Pata bijection can be explained in terms of certain Hermitian random matrix ensembles $\left( M_{d}\right)
_{d\geq1}$ whose asymptotic spectral distributions are free infinitely divisible. We investigate Hermitian Lévy processes with jumps of rank one associated to these random matrix ensembles introduced in [@BG] and [@CD]. A sample path approximation by covariation processes for these matrix Lévy processes is obtained. As a general result we prove that any $d\times d$ complex matrix subordinator with jumps of rank one is the quadratic variation of an $\mathbb{C}^{d}$-valued Lévy process. In particular, we have the corresponding result for matrix subordinators with jumps of rank one associated to the random matrix ensembles $\left(
M_{d}\right) _{d\geq1}$.
**Key words***: *Infinitely divisible random matrix, matrix subordinator, Bercovici-Pata bijection, matrix semimartingale, matrix compound Poisson.
**AMS 2010 Subject Classification**: 60B20; 60E07; 60G51; 60G57.
author:
- |
J. Armando Domínguez-Molina[^1]\
Facultad de Ciencias Físico-Matemáticas\
Universidad Autónoma de Sinaloa, México
- |
Víctor Pérez-Abreu[^2]\
Departamento de Probabilidad y Estadística\
CIMAT, Guanajuato, México
- |
Alfonso Rocha-Arteaga[^3]\
Facultad de Ciencias Físico-Matemáticas\
Universidad Autónoma de Sinaloa, México
title: '**Covariation representations for Hermitian Lévy process ensembles of free infinitely divisible distributions** '
---
Introduction
============
New models of infinitely divisible random matrices have emerged in recent years from both applications and theory. On the one hand, they have been important in multivariate financial Lévy modelling where stochastic volatility models have been proposed using Lévy and Ornstein-Uhlenbeck matrix valued processes; see [@BNSe07], [@BNSe09], [@BNS11] and [@PiSe09a]. A key role in these models is played by the positive-definite matrix processes and more general matrix covariation processes.
On the other hand, in the context of free probability, Bercovici and Pata [@BP] introduced a bijection $\Lambda$ from the set of classical infinitely divisible distributions to the set of free infinitely divisible distributions. This bijection was explained in terms of random matrix ensembles by Benaych-Georges [@BG] and Cabanal-Duvillard [@CD], providing in a more palpable way the bijection $\Lambda$ and producing a new kind of infinitely divisible random matrix ensembles. Moreover, the results in [@BG] and [@CD] constitute a generalization of Wigner’s result for the Gaussian Unitary Ensemble and give an alternative simple infinitely divisible random matrix model for the Marchenko-Pastur distribution, for which the Wishart and other empirical covariance matrix ensembles are not infinitely divisible.
More specifically, it is shown in [@BG] and [@CD] that for any one-dimensional infinitely divisible distribution $\mu$ there is an ensemble of Hermitian random matrices $(M_{d})_{d\geq1}$, whose empirical spectral distribution converges weakly almost surely to $\Lambda(\mu)$ as $d$ goes to infinity. Moreover, for each $d\geq1$, $M_{d}$ has a unitary invariant matrix distribution which is also infinitely divisible in the matrix sense. From now on we call these models BGCD matrix ensembles. We consider additional facts of BGCD models in Section 3.
A problem of further interest is to understand the matrix Lévy processes $\left \{ M_{d}(t)\right \} _{t\geq0}$ associated to the BGCD matrix ensembles. It was pointed out in [@DRA], [@PAS] that the Lévy measures of these models are concentrated on rank one matrices. This means that the random matrix $M_{d}$ is a realization, at time one, of a matrix valued Lévy process $\left \{ M_{d}(t)\right \} _{t\geq0}$ with rank one jumps $\Delta M_{d}(t)=M_{d}(t)-M_{d}(t-).$
The purpose of this paper is to study the structure of a $d\times d$ Hermitian Lévy process $\left \{ L_{d}(t)\right \} _{t\geq0}$ with rank one jumps. It is shown in Section 4 that if $L_{d}$ is a $d\times d$ complex matrix subordinator, it is the quadratic variation of an $\mathbb{C}^{d}$-valued Lévy process $X_{d}$, being the converse and extension of a known result in dimension one, see [@CT Example 8.5]. The process $X_{d}$ is constructed via its Lévy-Itô decomposition. In Section 5 we consider new realizations in terms of covariation of $\mathbb{C}^{d}$-valued Lévy process for matrix compound Poisson process as well as sample path approximations for Lévy processes associated to general BGCD ensembles. A new insight on Marchenko-Pastur’s type results for empirical covariance matrix ensembles was recently given in [@BGCD] by considering compound Poisson models (then infinitely divisible). In this direction our results show the role of covariation of $d$-dimensional Lévy processes as an alternative to empirical covariance processes.
For convenience of the reader, and since the material and notation in the literature is disperse and incomplete, we include Section 2 with a review on preliminaries on complex matrix semimartingales and matrix valued Lévy processes that are used later on in this paper.
Preliminaries on matrix semimartingales and matrix Lévy processes
=================================================================
Let $\mathbb{M}_{d\times q}=\mathbb{M}_{d\times q}\left( \mathbb{C}\right) $ denote the linear space of $d\times q$ matrices with complex (respectively real) entries with scalar product $\left \langle A,B\right \rangle
=~\mathrm{tr}\left( AB^{\ast}\right) $ and the Frobenius norm $\left \Vert
A\right \Vert =\left[ \mathrm{tr}\left( AA^{\ast}\right) \right] ^{1/2}$ where $\mathrm{tr}$ denotes the (non normalized) trace. If $q=d,$ we write $\mathbb{M}_{d}=\mathbb{M}_{d\times d}$. The set of Hermitian random matrices in $\mathbb{M}_{d}$ is denoted by $\mathbb{H}_{d}$. Likewise, let $\mathbb{U}_{d\times q}=\mathbb{U}_{d\times q}\left( \mathbb{C}\right)
=\left \{ U\in \mathbb{M}_{d\times q}:U^{\ast}U=\mathrm{I}_{q}\right \} .$ If $q=d,$ $\mathbb{U}_{d}=\mathbb{U}_{d\times d}$.
We denote by $\mathbb{H}_{d(1)}$ the set of matrices in $\mathbb{H}_{d}$ of rank one and by $\mathbb{H}_{d}^{+}$ ($\overline{\mathbb{H}}_{d}^{+}$) the set of positive (nonnegative) definite matrices in $\mathbb{H}_{d}$. Likewise $\mathbb{H}_{d(1)}^{+}=\mathbb{H}_{d(1)}\cap \overline{\mathbb{H}}_{d}^{+}$ is the closed cone of $d\times d$ nonnegative definite matrices of rank one. Let $\mathbb{S}(\mathbb{H}_{d(1)})$ denote the unit sphere of $\mathbb{H}_{d(1)}$.
\[Decomp\](a) Every $V\in \mathbb{H}_{d(1)}^{+}$ can be written as $V=xx^{\ast}$ where $x\in \mathbb{C}^{d}$. One can see that $x$ is unique if we restrict $x$ to the set $C_{+}^{d}=\{x=\left( x_{1},x_{2},\ldots
,x_{d}\right) \allowbreak:\allowbreak x_{1}\allowbreak \geq \allowbreak
0,\allowbreak$ $x_{j}\allowbreak \in \allowbreak \mathbb{C},\allowbreak$ $j\allowbreak=2,\allowbreak...,\allowbreak d\}$.
\(b) Every $V\in \mathbb{H}_{d\left( 1\right) }$ can be written as $V=\lambda
uu^{\ast}$ where $\lambda$ the eigenvalue of $V$ and $u$ is a unitary vector in $\mathbb{C}^{d}$. In this representation the $d\times d$ matrix $uu^{\ast}$ is unique.
#### Covariation of complex matrix semimartingales
An $\mathbb{M}_{d\times q}$-valued process $X=\left \{ (x_{ij})(t)\right \}
_{t\geq0}$ is a matrix semimartingale if $x_{ij}(t)$ is a complex semimartingale for each $i=1,...,d,j=1,...,q.$ Let $X=\left \{ (x_{ij})(t)\right \} _{t\geq0}$ $\in \mathbb{M}_{d\times q}$ and $Y=\left \{
(y_{ij})(t)\right \} _{t\geq0}\in \mathbb{M}_{q\times r}$ be semimartingales. Similar to the case of matrices with real entries in [@BNSe07], we define the matrix covariation of $X$ and $Y$ as the $\mathbb{M}_{d\times r}$-valued process $\left[ X,Y\right] :=\left \{ \left[ X,Y\right] (t):t\geq
0\right \} $ with entries$$\left[ X,Y\right] _{ij}(t)=\sum \limits_{k=1}^{q}\left[ x_{ik},y_{kj}\right] (t)\text{,} \label{DefCov}$$ where $\left[ x_{ik},y_{kj}\right] (t)$ is the covariation of the $\mathbb{C}$-valued semimartingales $\left \{ x_{ik}(t)\right \} _{t\geq0}$ and $\left \{ x_{kj}(t)\right \} _{t\geq0}$; see [@Pr04 pp 83]. One has the decomposition into a continuous part and a pure jump part as follows$$\left[ X,Y\right] (t)=\left[ X^{c},Y^{c}\right] (t)+\sum_{s\leq t}\left(
\Delta X(s)\right) \left( \Delta Y(s)\right) \text{,} \label{ForCov}$$ where $\left[ X^{c},Y^{c}\right] _{ij}(t):=\sum \nolimits_{k=1}^{q}\left[
x_{ik}^{c},y_{kj}^{c}\right] (t).$ We recall that for any semimartingale $x$, the process $x^{c}$ is the $a.s.$ unique continuous local martingale $m$ such that $\left[ x-m\right] $ is purely discontinuous.
We will use the facts that $\left[ X\right] =\left[ X,X^{\ast}\right] $ is a nonnegative definite $d\times d$ matrix, that $\left[ X,Y\right] ^{\top
}=\left[ Y^{\top},X^{\top}\right] $ and that for any nonrandom matrices $A\in \mathbb{M}_{m\times d},C\in \mathbb{M}_{r\times n}$ and semimartingales $X\in \mathbb{M}_{d\times q},Y\in \mathbb{M}_{q\times r}$,$$\left[ AX,YC\right] =A\left[ X,Y\right] C\text{.} \label{CovBil}$$
The natural example of a continuous semimartingale is the standard complex $d\times q$ matrix Brownian motion $B=\left \{ B(t)\right \} _{t\geq
0}=\left \{ b_{jl}(t)\right \} _{t\geq0}$ consisting of independent $\mathbb{C}$-valued Brownian motions $b_{jl}(t)=\operatorname{Re}(b_{jl}(t))+\mathrm{i}\operatorname{Im}(b_{jl}(t))$ where $\operatorname{Re}(b_{jl}(t)),\operatorname{Im}(b_{jl}(t))$ are independent one-dimensional Brownian motions with common variance $t/2$. Then we have $\left[ B,B^{\ast
}\right] ^{ij}(t)=\sum \nolimits_{k=1}^{q}\left[ b_{ik},\overline{b}_{jk}\right] (t)=qt\delta_{ij}$ and hence the matrix quadratic variation of $B$ is given by the $d\times d$ matrix process:$$\left[ B,B^{\ast}\right] (t)=qt\mathrm{I}_{d}\text{.} \label{CovCB}$$ The case $q=1$ corresponds to the $\mathbb{C}^{d}$-valued standard Brownian motion $B$.$\ $We observe this corresponds to $\left[ B,B^{\ast}\right]
_{t}=t\mathrm{I}_{d}$ instead of the common $2t\mathrm{I}_{d}$ used in the literature.
Other examples of complex matrix semimartingales are Lévy processes considered next.
#### Complex matrix Lévy processes
An infinitely divisible random matrix $M$ in $\mathbb{M}_{d\times q}$ is characterized by the Lévy-Khintchine representation of its Fourier transform $\mathbb{E}\mathrm{e}^{\mathrm{itr}(\Theta^{\ast}M)}\allowbreak
\ =\ \allowbreak \exp(\psi(\Theta))$ with Laplace exponent $$\psi(\Theta)={}\mathrm{itr}(\Theta^{\ast}\Psi \text{ }){}-{}\frac{1}{2}\mathrm{tr}\left( \Theta^{\ast}\mathcal{A}\Theta^{\ast}\right) {}+{}\int_{\mathbb{M}_{d\times q}}\left( \mathrm{e}^{\mathrm{itr}(\Theta^{\ast}\xi)}{}-1{}-\mathrm{i}\frac{\mathrm{tr}(\Theta^{\ast}\xi)}{1+\left \Vert
\xi \right \Vert ^{2}}{}\right) \nu(\mathrm{d}\xi),\ \Theta \in \mathbb{M}_{d\times q}, \label{LKRgen}$$ where $\mathcal{A}:\mathbb{M}_{q\times d}\rightarrow \mathbb{M}_{d\times q}$ is a positive symmetric linear operator $($i.e. $\mathrm{tr}\left( \Phi^{\ast
}\mathcal{A}\Phi^{\ast}\right) \geq0$ for $\Phi \in \mathbb{M}_{d\times q}$ and $\mathrm{tr}\left( \Theta_{2}^{\ast}\mathcal{A}\Theta_{1}^{\ast}\right)
=\mathrm{tr}\left( \Theta_{1}^{\ast}\mathcal{A}\Theta_{2}^{\ast}\right) $ for $\Theta_{1},\Theta_{2}\in \mathbb{M}_{d\times q})$, $\nu$ is a measure on $\mathbb{M}_{d\times q}$ (the Lévy measure) satisfying $\nu(\{0\})=0$ and $\int_{\mathbb{M}_{d\times q}}(1\wedge \left \Vert x\right \Vert ^{2})\nu(\mathrm{d}x)<\infty$, and $\Psi \in \mathbb{M}_{d\times q}$. The triplet $(\mathcal{A},\nu,\Psi)$ uniquely determines the distribution of $M$.
\[ObsGaPart\]The notation $\mathcal{A}\Theta^{\ast}$ means the linear operator $\mathcal{A}$ from $\mathbb{M}_{q\times d}$ to $\mathbb{M}_{d\times
q}$ acting on $\Theta^{\ast}\in \mathbb{M}_{q\times d}$. Some interesting examples of $\mathcal{A}$ and its corresponding matrix Gaussian distributions are:
\(a) $\mathcal{A}\Theta^{\ast}=\Theta$. This corresponds to a Gaussian matrix distribution invariant under left and right unitary transformations in $\mathbb{U}_{d}$ and $\mathbb{U}_{q}$, respectively.
\(b) $\mathcal{A}\Theta^{\ast}=\Sigma_{1}\Theta \Sigma_{2}$ for $\Sigma_{1}\in$ $\overline{\mathbb{H}}_{d}^{+}$ and $\Sigma_{2}\in \overline{\mathbb{H}}_{q}^{+}$. In this case the corresponding matrix Gaussian distribution is denoted by $\mathrm{N}_{d\times q}(0,\Sigma_{1}\otimes \Sigma_{2})$ and $\Sigma_{1}\otimes \Sigma_{2}$ is called a Kronecker covariance. It holds that if $N$ has the distribution $\mathrm{N}_{d\times q}(0,\mathrm{I}_{d}{}\otimes \mathrm{I}_{q})$, then $\Sigma_{1}^{1/2}N\Sigma_{2}^{1/2}$ has distribution $\mathrm{N}_{d\times q}(0,\Sigma_{1}\otimes \Sigma_{2})$.
\(c) When $q=d$, $\mathcal{A}\Theta^{\ast}=$ $\mathrm{tr}(\Theta)\mathrm{I}_{d}$ is the covariance operator of the Gaussian random matrix $g\mathrm{I}_{d}$ where $g$ is a one-dimensional random variable with a standard Gaussian distribution.
Let $\mathbb{S}_{d\times q}$ be the unit sphere of $\mathbb{M}_{d\times q}$ and let $\mathbb{M}_{d\times q}^{0}=\mathbb{M}_{d\times q}\backslash \{0\}$. If $\nu$ is a Lévy measure on $\mathbb{M}_{d\times q}$, then there are a measure $\lambda$ on $\mathbb{S}_{d\times q}$ with $\lambda(\mathbb{S}_{d\times q})\geq0$ and a measure $\nu_{\xi}$ for each $\xi \in \mathbb{S}_{d\times q}$ with $\nu_{\xi}((0,\infty))>0$ such that $$\nu(E)=\int_{\mathbb{S}_{d\times q}}\lambda(\mathrm{d}\xi)\int_{(0,\infty
)}1_{E}(u\xi)\nu_{\xi}(\mathrm{d}u),\qquad E\in \mathcal{B}(\mathbb{M}_{d\times
q}^{0}).$$ We call $(\lambda,\nu_{\xi})$ a polar decomposition of $\nu$. When $d=q=1$, $\nu$ is a Lévy measure on $\mathbb{R}$ and $\lambda$ is a measure in the unit sphere $\mathbb{S}_{1\times1}=\left \{ -1,1\right \} $ of $\mathbb{R}$.
Any $\mathbb{M}_{d\times q}$-valued Lévy process $L=\left \{ L(t)\right \}
_{t\geq0}$ with triplet $(\mathcal{A},\nu,\Psi)$ is a semimartingale with the Lévy-Itô decomposition $$L(t)=t\Psi+B_{\mathcal{A}}(t)+\int_{[0,t]}\int_{\left \Vert V\right \Vert \leq
1}V\widetilde{J}_{L}(\mathrm{d}s\mathrm{,d}V)+\int_{[0,t]}\int_{\left \Vert
V\right \Vert >1}VJ_{L}(\mathrm{d}s,\mathrm{d}V)\text{, }t\geq0, \label{LID}$$ where:
\(a) $\left \{ B_{\mathcal{A}}(t)\right \} _{t\geq0}$ is a $\mathbb{M}_{d\times
q}$-valued Brownian motion with covariance $\mathcal{A}$, i.e. it is a Lévy process with continuous sample paths (a.s.) and each $B_{\mathcal{A}}(t)$ is centered Gaussian with $$\mathbb{E}\left \{ \mathrm{tr(}\Theta_{1}^{\ast}B_{\mathcal{A}}(t){})\mathrm{tr}\left( \Theta_{2}^{\ast}B_{\mathcal{A}}(s){}\right) {}\right \}
=\min(s,t)\mathrm{tr}\left( \Theta_{1}^{\ast}\mathcal{A}\Theta_{2}^{\ast
}\right) {}\text{for each }\Theta_{1},\Theta_{2}\in \mathbb{M}_{d\times q},$$
\(b) $J_{L}(\cdot,\cdot)$ is the Poisson random measure of jumps on $[0,\infty)\times \mathbb{M}_{d\times q}^{0}$. That is, $J_{L}(t,E)=\# \{(0\leq
s\leq t:\allowbreak \Delta L_{s}\in E\},$ $E$ $\in \mathbb{M}_{d\times q}^{0},$ with intensity measure $Leb\otimes \nu$, and independent of $\left \{
B_{\mathcal{A}}(t)\right \} _{t\geq0}$,
\(c) $\widetilde{J}_{L}$ is the compensator measure of $J_{L}$, i.e. $$\widetilde{J}_{L}(\mathrm{d}t,\mathrm{d}V)=J_{L}(\mathrm{d}t,\mathrm{d}V)-\mathrm{d}t\nu(\mathrm{d}V);$$ see for example [@Ap07] for the most general case of Lévy processes with values in infinite dimensional Banach spaces.
An $\mathbb{M}_{d\times q}$-valued Lévy process $L=\left \{ L(t)\right \}
_{t\geq0}$ has bounded variation if and only if its Lévy-Itô decomposition takes the form $$L(t)=t\Psi_{0}+\int_{[0,t]}\int_{\mathbb{M}_{d\times q}^{0}}VJ_{L}(\mathrm{d}s,\mathrm{d}V)=t\Psi_{0}+\sum_{s\leq t}\Delta L(s)\text{, }t\geq0,
\label{LIFV}$$ where $\Psi_{0}=$ $\Psi-\int_{\left \Vert V\right \Vert \leq1}V\nu
(\mathrm{d}V).$
The matrix quadratic variation (\[ForCov\]) of $L$ is given by the $\overline{\mathbb{H}}_{d}^{+}$-valued process $$\lbrack L](t)=\left[ B_{\mathcal{A}},B_{\mathcal{A}}^{\ast}\right]
(t)+\int_{[0,t]}\int_{\mathbb{M}_{d\times q}^{0}}VV^{\ast}J_{L}(\mathrm{d}s,\mathrm{d}V)=\left[ B_{\mathcal{A}},B_{\mathcal{A}}^{\ast}\right]
(t)\mathcal{+}\sum_{s\leq t}\Delta L(s)\Delta L(s)^{\ast}. \label{QVLP}$$
In Section 3 we prove a partial converse of the last result in the case $q=1.$
\[ObsGaPartqv\] On the lines of Remark \[ObsGaPart\] we have the following observations for the quadratic variation of the continuous part in (\[QVLP\]):
\(a) When $\mathcal{A}\Theta^{\ast}=\Theta,$ $\left[ B_{\mathcal{A}},B_{\mathcal{A}}^{\ast}\right] (t)=qt\mathrm{I}_{d}$. This follows from (\[CovCB\]) since $B_{\mathcal{A}}(t)$ is a standard complex $d\times q$ matrix Brownian motion.
\(b) When $\mathcal{A}\Theta^{\ast}=\Sigma_{1}\Theta \Sigma_{2}$ for $\Sigma
_{1}\in$ $\overline{\mathbb{H}}_{d}^{+}$ and $\Sigma_{2}\in \overline
{\mathbb{H}}_{q}^{+}$, we have $B_{\mathcal{A}}(t)=\Sigma_{1}^{1/2}B(t)\Sigma_{2}^{1/2}$ where $B=\left \{ B(t)\right \} _{t\geq0}$ is a standard complex $d\times q$ matrix Brownian motion. Then, using (\[CovBil\]) we have $$\left[ B_{\mathcal{A}},B_{\mathcal{A}}^{\ast}\right] (t)=\left[ \Sigma
_{1}^{1/2}B\Sigma_{2}^{1/2},\Sigma_{2}^{1/2}B^{\ast}\Sigma_{1}^{1/2}\right]
(t)=\Sigma_{1}^{1/2}\left[ B\Sigma_{2}^{1/2},\Sigma_{2}^{1/2}B^{\ast}\right]
(t)\Sigma_{1}^{1/2}=t\mathrm{tr}(\Sigma_{2})\Sigma_{1},$$ where we have also used the easily checked fact $\left[ B\Sigma_{2}^{1/2},\Sigma_{2}^{1/2}B^{\ast}\right] (t)=t\mathrm{tr}(\Sigma_{2})I_{d}$.
\(c) When $q=d$ and $\mathcal{A}\Theta^{\ast}=$ $\mathrm{tr}(\Theta
)\mathrm{I}_{d}$, we have $\left[ B_{\mathcal{A}},B_{\mathcal{A}}^{\ast
}\right] (t)=t\mathrm{I}_{d}$ since $B_{\mathcal{A}}(t)=b(t)\mathrm{I}_{d}$ where $b=\left \{ b(t)\right \} _{t\geq0}$ is a one-dimensional Brownian motion.
The extension of the notion of a real subordinator to the matrix case relies on cones. A cone $K$ is a nonempty, closed, convex subset of $\mathbb{M}_{d\times q}$ such that if $A\in K$ and $\alpha \geq0$ imply $\alpha A\in K$. A cone $K$ determines a partial order in $\mathbb{M}_{d\times q}$ by defining $V_{1}\leq_{K}V_{2}$ for $V_{1},V_{2}\in \mathbb{M}_{d\times q}$ whenever $V_{2}-V_{1}\in K$. A $\mathbb{M}_{d\times q}$-valued Lévy process $L=\left \{ L(t)\right \} _{t\geq0}$ is $K$- increasing if $L(t_{1})\leq
_{K}L(t_{2})$ for every $t_{1}<t_{2}$ almost surely. A $K$-increasing Lévy process with values in $\mathbb{M}_{d\times q}$ is called a matrix subordinator. It is easy to see that if $L=\left \{ L(t)\right \} _{t\geq0}$ is a Lévy process in $\mathbb{M}_{d\times q}$ then $L$ is a subordinator if and only if $L$ takes values in $K$. In this sense the matrix quadratic variation Lévy process in (\[QVLP\]) with values in the cone $\overline{\mathbb{H}}_{d}^{+}$ is a matrix subordinator$.$
#### Approximation of Lévy processes
The following are useful results on the sample path approximation of complex matrix Lévy processes; see [@Ka Th 15.17] and [@Sato1 Th. 8.7]. They follow from their corresponding real vector case by the usual identification of $\mathbb{M}_{d\times q}\rightarrow$ $\mathbb{R}^{2dq}$ via $A\rightarrow \mathrm{vec}(A),$ $A\in$ $\mathbb{M}_{d\times q}$ and the fact that $\mathrm{tr}\left( A^{\ast}B\right) =\mathrm{vec}(A)^{\ast}\mathrm{vec}(B)$, where $\mathrm{vec}(A)$ is the $dq$ column complex vector obtained by stacking the columns of $A$ one down each other.
\[convproc\]Let $L$ and $L^{n}$ $n=1,2,...$ be complex matrix Lévy processes in $\mathbb{M}_{d\times q}$ with $L^{n}(1)\allowbreak \overset
{\mathcal{L}}{\rightarrow}L(1)$. Then there exist processes $\tilde{L}^{n}$ with the same distribution that $L^{n}$ such that$$\sup_{0\leq s\leq t}\left \vert \tilde{L}^{n}(s)-L(s)\right \vert \overset{\Pr
}{\longrightarrow}0,\quad \forall t\geq0.$$
\[convternas\]Let $M^{n},n=1,2,...$ be infinitely divisible random matrices in $\mathbb{M}_{d\times q}$ with triplet $(\mathcal{A}^{n},\nu
^{n},\Psi^{n})$. Let $M$ be a random matrix in $\mathbb{M}_{d\times q}$. Then $M^{n}\overset{\mathcal{L}}{\rightarrow}M$ if and only if $M$ is infinitely divisible whose triplet $(\mathcal{A},\nu,\Psi)$ satisfies the following three conditions:a) If $f:\mathbb{M}_{d\times q}\rightarrow \mathbb{M}_{d\times q}$ is bounded and continuous function vanishing in a neighborhood of $0$ then$$\lim_{n\rightarrow \infty}\int \nolimits_{\mathbb{M}_{d\times q}}f(\xi)\nu
^{n}(\mathrm{d}\xi)=\int \nolimits_{\mathbb{M}_{d\times q}}f(\xi)\nu
(\mathrm{d}\xi)\text{.}$$ b) Define the positive symmetric operator $\mathcal{A}^{n,\epsilon}:\mathbb{M}_{q\times d}\rightarrow \mathbb{M}_{d\times q}$ by$$\mathrm{tr}\left( \Theta^{\ast}\mathcal{A}^{n,\epsilon}\Theta^{\ast}\right)
=\mathrm{tr}\left( \Theta^{\ast}\mathcal{A}^{n}\Theta^{\ast}\right)
+\int \nolimits_{\left \Vert \xi \right \Vert \leq \varepsilon}\left \vert
\mathrm{tr}\left( \Theta^{\ast}\xi \right) \right \vert ^{2}\nu_{n}(\mathrm{d}\xi)\quad \text{for }\Theta \in \mathbb{M}_{d\times q}\text{.}$$ Then $$\lim_{\varepsilon \downarrow0}\limsup_{n\rightarrow \infty}\left \vert
\mathrm{tr}\left( \Theta^{\ast}\mathcal{A}^{n,\epsilon}\Theta^{\ast}\right)
-\mathrm{tr}\left( \Theta^{\ast}\mathcal{A}\Theta^{\ast}\right) \right \vert
=0,\quad \text{for }\Theta \in \mathbb{M}_{d\times q}\text{.}$$ c) $\Psi^{n}\rightarrow \Psi$.
BGCD random matrix ensembles
============================
We now consider the matrix Lévy processes associated to the BGCD matrix ensembles $(M_{d})_{d\geq1}$ mentioned in the introduction.
When $\mu$ is the standard Gaussian distribution, $M_{d}$ is a Gaussian unitary invariant random matrix, $\Lambda(\mu)$ is the semicircle distribution and $\left \{ M_{d}(t)\right \} _{t\geq0}$ is the Hermitian matrix valued process given by $M_{d}(t)=\left( 1/\sqrt{d+1}\right) (B(t)+dg(t)\mathrm{I}_{d})$ where $B\left( t\right) $ is a $d\times d$ Hermitian matrix Brownian motion independent of the one-dimensional Brownian motion $g(t);$ see [@BG Remark 3.5].
Likewise, if $\mu$ is the Poisson distribution with parameter $\lambda>0,$ $\left \{ M_{d}(t)\right \} _{t\geq0}$ is the $d\times d$ matrix compound Poisson process $M_{d}(t)=\sum_{k=1}^{N(t)}u_{k}^{d}u_{k}^{d\ast}$ where $\left \{ u_{k}^{d}\right \} _{k\geq1}$ is a sequence of independent uniformly distributed random vectors on the unit sphere of $\mathbb{C}^{d}$ independent of the Poisson process $\left \{ N(t)\right \} _{t\geq0}$, and $\Lambda(\mu)$ is the Marchenko-Pastur distribution of parameter $\lambda>0$; see [@BG Remark 3.2]. We observe that in this case $\left \{ M_{d}(t)\right \} _{t\geq0}$ is a matrix covariation (quadratic) process rather than a covariance matrix process as in the Wishart or other empirical covariance processes.
Proposition \[polar\] below collects computations in [@BG], [@CD] and [@DRA] to summarize the Lévy triplet of a general BGCD matrix ensemble in an explicit manner. Let $\nu|_{(0,\infty)}$ and $\nu
|_{(-\infty,0)}$ denote the corresponding restrictions to $\left(
0,+\infty \right) $ and $\left( -\infty,0\right) $ for any Lévy measure $\nu$, respectively.
\[polar\]Let $\mu \ $be an infinitely divisible distribution in $\mathbb{R}$ with Lévy triplet $(a^{2}$,$\mathcal{\psi},\nu)$ and let $(M_{d})_{d\geq1}$ be a BGCD matrix ensemble for $\Lambda(\mu)$. Then, for each $d\geq1$ $M_{d}$ has the Lévy-Khintchine representation (\[LKRgen\]) with Lévy triplet $(\mathcal{A}_{d},\Psi_{d},\nu_{d})$ where
a\) $\Psi_{d}=\mathcal{\psi}\mathrm{I}_{d}$
b\) $$\mathcal{A}_{d}\Theta=a^{2}\frac{1}{d+1}(\Theta+\mathrm{tr}(\Theta
)\mathrm{I}_{d}),\quad \Theta \in \mathbb{H}_{d}. \label{GPBGCD}$$
c\) $$\nu_{d}\left( E\right) =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})}\int
_{0}^{\infty}1_{E}\left( rV\right) \nu_{V}\left( \mathrm{d}r\right)
\Pi \left( \mathrm{d}V\right) \text{,\quad}E\in \mathcal{B}\left(
\mathbb{H}_{d}\backslash \left \{ 0\right \} \right) \text{,} \label{PDBGCD}$$ where $\nu_{V}=\nu|_{(0,\infty)}$ or $\nu|_{(-\infty,0)}$ according to $V\geq0$ or $V\leq0$ and $\Pi$ is a measure on $\mathbb{S}(\mathbb{H}_{d(1)})$ such that $$\Pi \left( D\right) =\int \limits_{\mathbb{S}(\mathbb{H}_{d(1)})\cap
\overline{\mathbb{H}}_{d}^{+}}\int \limits_{\left \{ -1,1\right \} }1_{D}\left( tV\right) \lambda \left( \mathrm{d}t\right) \omega_{d}\left(
\mathrm{d}V\right) \text{,\quad}D\in \mathcal{B}\left( \mathbb{S}(\mathbb{H}_{d(1)})\right) \text{,} \label{pi}$$ where $\lambda$ is the spherical measure of $\nu$ and $\omega_{d}$ is the probability measure on $\mathbb{S}(\mathbb{H}_{d(1)})\cap \overline{\mathbb{H}}_{d}^{+}$ induced by the transformation $u\rightarrow V=uu^{\ast}$, where $u$ is a uniformly distributed column random vector in the unit sphere of $\mathbb{C}^{d}$.
\(a) It follows from the first term in the Lévy exponent of $M_{d}$ in page $635$ of [@CD], where the notation $\Lambda_{d}(\mu)$ is used for the distribution of $M_{d}$. For (b), the form of the covariance operator $\mathcal{A}_{d}$ was implicitly computed in the first example in Section II.C of [@CD]. Finally, the polar decomposition of the Lévy measure (\[PDBGCD\]) was found in [@DRA].
The Lévy-Itô decomposition of the Lévy process associated to the BGCD model $M_{d}$ is given by $$M_{d}(t)=\mathcal{\psi}td\mathrm{I}_{d}+B_{\mathcal{A}_{d}}(t)+\int
_{[0,t]}\int_{\left \{ \left \Vert V\right \Vert \leq1\right \} \cap
\mathbb{H}_{d(1)}}V\widetilde{J}_{d}(\mathrm{d}s\mathrm{,d}V)+\int_{[0,t]}\int_{\left \{ \left \Vert V\right \Vert >1\right \} \cap \mathbb{H}_{d(1)}}VJ_{d}(\mathrm{d}s,\mathrm{d}V)\text{,} \label{LIDbgcd}$$ where $t\geq0$, $\mathcal{A}_{d}\Theta=a^{2}\frac{1}{d+1}(\Theta
+\mathrm{tr}(\Theta)\mathrm{I}_{d})$, $J_{d}(t,E)=\# \left \{ 0\leq s\leq
t:\Delta M_{d}(s)\in E\right \} =J_{d}(t,E\cap \mathbb{H}_{d(1)})$ for any measurable $E$ $\in \mathbb{H}_{d}\backslash \{0\}$. Its quadratic variation is obtained by (\[QVLP\]) as the matrix subordinator
$$\left[ M_{d}\right] (t)=a^{2}t\mathrm{I}_{d}+\int_{[0,t]}\int_{\mathbb{H}_{d(1)}\backslash \{0\}}VV^{\ast}J_{d}(\mathrm{d}s,\mathrm{d}V)=a^{2}t\mathrm{I}_{d}+\sum_{s\leq t}\Delta M_{d}(s)\left( \Delta M_{d}(s)\right)
^{\ast}.\nonumber$$
It is possible to obtain BGCD models of symmetric random matrices rather than Hermitian. Indeed, slight changes in the proof of [@BG Theorem 3.1] give for each $d\geq1$, a $d\times d$ real symmetric random matrix $M_{d}$ with orthogonal invariant infinitely divisible matrix distribution. The asymptotic spectral distribution of the corresponding Hermitian and symmetric ensembles is the same, similarly as the semicircle distribution is the asymptotic spectral distribution for the Gaussian Unitary Ensemble and Gaussian Orthogonal Ensemble.
Bounded variation case
======================
It is well known that the quadratic variation of a one-dimensional Lévy process is a subordinator, see [@CT Example 8.5]. The following result gives a converse and a generalization to matrix subordinators with rank one jumps. The one dimensional case is given in [@Se10 Lemma 6.5].
\[Sub\] Let $L_{d}=\left \{ L_{d}(t):t\geq0\right \} $ be a Lévy process in $\overline{\mathbb{H}}_{d}^{+}$ whose jumps are of rank one almost surely. Then there exists a Lévy process $X=\left \{ X(t):t\geq0\right \}
$ in $\mathbb{C}^{d}$ such that $L_{d}(t)=\left[ X\right] (t)$.
We construct $X$ as a Lévy-Itô decomposition realization. Using (\[LIFV\]), for each $d\geq1$, $L_{d}$ is an $\overline{\mathbb{H}}_{d}^{+}$-process of bounded variation with Lévy-Itô decomposition$$L_{d}(t)=\Psi_{0}t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{H}_{d\left( 1\right) }^{+}\backslash \{0\}}VJ_{L_{d}}(\mathrm{d}s,\mathrm{d}V)\text{, }t\geq0\text{,}$$ where $\Psi_{0}\in \mathbb{H}_{d}^{+}$ and $J_{L_{d}}$ is the Poisson random measure of $L_{d}$. Let $Leb\otimes \nu_{L_{d}}$ denote the intensity measure of $J_{L_{d}}$.
Consider the cone $C_{+}^{d}=\left \{ x=\left( x_{1},x_{2},\ldots
,x_{d}\right) :x_{1}\geq0,\text{ }x_{j}\in \mathbb{C},\text{ }j=2,...,d\right \} $ and let $\varphi_{+}:\mathbb{R}_{+}\times \mathbb{H}_{d(1)}^{+}\rightarrow \mathbb{R}_{+}\times C_{+}^{d}$ be defined as $\varphi_{+}\left( t,V\right) =(t,x)$ where $V=xx^{\ast}$ and $x\in
C_{+}^{d}$. Let $\overline{\varphi}_{+}:\mathbb{H}_{d(1)}^{+}\rightarrow
C_{+}^{d}$ be defined by $\overline{\varphi}_{+}\left( V\right) =x$ for $V=xx^{\ast}$ and $x\in C_{+}^{d}$. By Remark \[Decomp\] (a) the functions $\varphi_{+}$ and $\overline{\varphi}_{+}$ are well defined.
Let us define $J(\mathrm{d}s,\mathrm{d}x)=\left( J_{L_{d}}\circ \varphi
_{+}^{-1}\right) \left( \mathrm{d}s,\mathrm{d}x\right) $ the random measure induced by the transformation $\varphi_{+}$ which is a Poisson random measure on $\mathbb{R}_{+}\times C_{+}^{d}$. Observe that $\mathbb{E}\left[
J(t,F)\right] =\mathbb{E}\left[ J_{L_{d}}\circ \varphi_{+}^{-1}\left(
\left \{ t\right \} \times F\right) \right] =t\nu_{L_{d}}\left(
\overline{\varphi}_{+}\left( F\right) \right) =t\left( \nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}\right) \left( F\right) $ for $F\allowbreak \in \allowbreak \mathcal{B(}\allowbreak C_{+}^{d}\allowbreak
\backslash \left \{ 0\right \} )$. Let us denote $\nu=\nu_{L_{d}}\circ
\overline{\varphi}_{+}^{-1}$ which is a Lévy measure on $C_{+}^{d}$ since$$\int_{C_{+}^{d}\backslash \left \{ 0\right \} }\left( 1\wedge \left \vert
x\right \vert ^{2}\right) \nu(\mathrm{d}x)=\int_{C_{+}^{d}\backslash \left \{
0\right \} }\left( 1\wedge \left \vert x\right \vert ^{2}\right) \nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}(\mathrm{d}x)$$$$=\int_{C_{+}^{d}\backslash \left \{ 0\right \} }\left( 1\wedge \mathrm{tr}\left( xx^{\ast}\right) \right) \nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}(\mathrm{d}x)=\int_{\mathbb{H}_{d(1)}^{+}\backslash \left \{ 0\right \}
}\left( 1\wedge \mathrm{tr}\left( V\right) \right) \left( \nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}\right) \circ f^{-1}(\mathrm{d}V)$$$$=\int_{\mathbb{H}_{d(1)}^{+}\backslash \left \{ 0\right \} }\left(
1\wedge \mathrm{tr}\left( V\right) \right) \nu_{L_{d}}(\mathrm{d}V)<\infty \text{,}$$ where $\left( \nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}\right) \circ
f^{-1}=\nu_{L_{d}},$ with $f\left( x\right) =xx^{\ast}$ and we have used that $\mathrm{tr}\left( V\right) \leq \alpha \left \Vert V\right \Vert $ for some constant $\alpha>0$. Thus $Leb\otimes \nu$ is the intensity measure of the Poisson random measure $J$.
Let us take the Lévy process in $\mathbb{C}^{d}$$$X(t)=\left \vert \Psi_{0}\right \vert ^{1/2}B_{I}(t)+\int \nolimits_{\left[
0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert x\right \vert \leq
1\}}x\widetilde{J}(\mathrm{d}s,\mathrm{d}x)+\int \nolimits_{\left[ 0,t\right]
}\int_{\mathbb{C}^{d}\cap \{ \left \vert x\right \vert >1\}}xJ(\mathrm{d}s,\mathrm{d}x)\text{, }t\geq0\text{,} \label{LIX}$$ where $B_{I}$ is a $\mathbb{C}^{d}$-valued standard Brownian motion with quadratic variation $tI_{d}$, (i.e. (\[CovCB\]) with $q=1$). Thus the quadratic variation of $X$ is given by$$\left[ X\right] (t)=\left[ \left \vert \Psi_{0}\right \vert ^{1/2}B_{I},B_{I}^{\ast}\left \vert \Psi_{0}\right \vert ^{1/2}\right] (t)+\int
\nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\backslash \{0\}}xx^{\ast
}J(\mathrm{d}s,\mathrm{d}x)$$$$=\Psi_{0}t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\backslash \{0\}}xx^{\ast}J_{L_{d}}\circ \varphi_{+}^{-1}(\mathrm{d}s,\mathrm{d}x)=\Psi_{0}t+\int \nolimits_{\left[ 0,t\right] }\int
_{\mathbb{H}_{d(1)}^{+}\backslash \left \{ 0\right \} }VJ_{L_{d}}\circ
\varphi_{+}^{-1}\circ h^{-1}(\mathrm{d}s,\mathrm{d}V)$$$$=\Psi_{0}t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{H}_{d(1)}^{+}\backslash \left \{ 0\right \} }VJ_{L_{d}}(\mathrm{d}s,\mathrm{d}V)=L_{d}(t),$$ where $J_{L_{d}}\circ \varphi_{+}^{-1}\circ h^{-1}=J_{L_{d}},$ with $h\left(
t,x\right) =\left( t,xx^{\ast}\right) .$
For the general bounded variation case we have the following Wiener-Hopf type decomposition.
\[Bdv\]Let $L_{d}=\left \{ L_{d}(t):t\geq0\right \} $ be a Lévy process in $\mathbb{H}_{d}$ of bounded variation whose jumps are of rank one almost surely. Then there exist Lévy processes $X=\left \{ X(t):t\geq
0\right \} $ and $Y=\left \{ Y(t):t\geq0\right \} $ in $\mathbb{C}^{d}$ such that $$L_{d}(t)=\left[ X\right] (t)-\left[ Y\right] (t). \label{WHTD}$$ Moreover, $\left \{ \left[ X\right] (t):t\geq0\right \} $ and $\left \{
\left[ Y\right] (t):t\geq0\right \} $ are independent processes.
For each $d\geq1$, $L_{d}$ is an $\mathbb{H}_{d}$-process of bounded variation with Lévy-Itô decomposition$$L_{d}(t)=\Psi t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{H}_{d(1)}\backslash \{0\}}VJ_{L_{d}}(\mathrm{d}s,\mathrm{d}V)\text{, }t\geq0\text{,} \label{LIDBV}$$ where $\Psi \in \mathbb{H}_{d}$ and $J_{L_{d}}$ is the Poisson random measure of $L_{d}$. Let $Leb\otimes \nu_{L_{d}}$ denote the intensity measure of $J_{L_{d}}$.
First we prove that $L_{d}=L_{d}^{1}-L_{d}^{2}$ where $L_{d}^{1}$ and $L_{d}^{2}$ are the Lévy processes in $\overline{\mathbb{H}}_{d}^{+}$ given by (\[Quad1decomp\]) and (\[Quad2decomp\]).Every $V\in \mathbb{H}_{d\left( 1\right) }$ can be written as $V=\lambda uu^{\ast}$ where $\lambda$ the eigenvalue of $V$ and $u$ is a unitary vector in $\mathbb{C}^{d}$. Let us define $\left \vert V\right \vert =\left \vert
\lambda \right \vert uu^{\ast}$ and $V^{+}=\lambda^{+}uu^{\ast}$, $V^{-}=\lambda^{-}uu^{\ast}$ where $\lambda^{+}=\lambda$ if $\lambda \geq0$ and $\lambda^{-}=-\lambda$ if $\lambda<0$.
Let $\varphi_{+}:\mathbb{R}_{+}\times \mathbb{H}_{d(1)}\rightarrow
\mathbb{R}_{+}\times \mathbb{H}_{d(1)}^{+}$ and $\varphi_{-}:\mathbb{R}_{+}\times \mathbb{H}_{d(1)}\rightarrow \mathbb{R}_{+}\times \mathbb{H}_{d(1)}^{+}$ be defined as $\varphi_{+}\left( t,V\right) =(t,V^{+})$ and $\varphi_{-}\left( t,V\right) =(t,V^{-})$ respectively. Let $\overline
{\varphi}_{+}:\mathbb{H}_{d(1)}\rightarrow \mathbb{H}_{d(1)}^{+}$ and $\overline{\varphi}_{-}:\mathbb{H}_{d(1)}\rightarrow \mathbb{H}_{d(1)}^{+}$ be defined as $\overline{\varphi}_{+}(V)=V^{+}$ and $\overline{\varphi}_{-}(V)=V^{-}$ respectively. By Remark \[Decomp\] (b) the functions $\varphi_{+},$ $\overline{\varphi}_{+},$ $\varphi_{-}$ and $\overline{\varphi
}_{-}$ are well defined and hence $V=\overline{\varphi}_{+}(V)-\overline
{\varphi}_{-}(V)$.
Let us define $J^{+}(\mathrm{d}s,\mathrm{d}x)=\left( J_{L_{d}}\circ
\varphi_{+}^{-1}\right) \left( \mathrm{d}s,\mathrm{d}x\right) $ and $J^{-}(\mathrm{d}s,\mathrm{d}x)=\left( J_{L_{d}}\circ \varphi_{-}^{-1}\right)
\left( \mathrm{d}s,\mathrm{d}x\right) $ the random measures induced by the transformations $\varphi_{+}$ and $\varphi_{-}$ respectively, which are Poisson random measures both on $\mathbb{R}_{+}\times \mathbb{H}_{d(1)}^{+}$. Observe that $\mathbb{E}\left[ J^{+}(t,F)\right] =\mathbb{E[}J_{L_{d}}\circ \allowbreak \varphi_{+}^{-1}(\allowbreak \left \{ t\right \} \allowbreak
\times \allowbreak F)]=t\nu_{L_{d}}\left( \overline{\varphi}_{+}^{-1}\left(
F\right) \right) =t\left( \nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}\right) \left( F\right) $ for $F\in \mathcal{B}\left( \mathbb{H}_{d(1)}^{+}\backslash \left \{ 0\right \} \right) $ and similarly $\mathbb{E}\left[ J^{-}(t,F)\right] =t\left( \nu_{L_{d}}\circ
\overline{\varphi}_{-}^{-1}\right) \left( F\right) $. Let us denote $\nu_{L_{d}}^{+}=\nu_{L_{d}}\circ \overline{\varphi}_{+}^{-1}$ and $\nu_{L_{d}}^{-}=\nu_{L_{d}}\circ \overline{\varphi}_{-}^{-1}$. Note that $\nu_{L_{d}}^{+}$ is a Lévy measure on $\mathbb{H}_{d(1)}^{+}$ since$$\begin{aligned}
\infty & >\int_{\mathbb{H}_{d(1)}\backslash \left \{ 0\right \} }\left(
1\wedge \left \Vert V\right \Vert \right) \nu_{L_{d}}(\mathrm{d}V)\geq
\int_{\mathbb{H}_{d(1)}\backslash \left \{ 0\right \} }\left( 1\wedge
\left \Vert \overline{\varphi}_{+}(V)\right \Vert \right) \nu_{L_{d}}(\mathrm{d}V)\\
& =\int_{\mathbb{H}_{d(1)}^{+}\backslash \left \{ 0\right \} }\left(
1\wedge \left \Vert W\right \Vert \right) \nu_{L_{d}}^{+}(\mathrm{d}W)\text{.}$$ Hence $Leb\otimes \nu_{L_{d}}^{+}$ is the intensity measure of $J^{+}$. Similarly, one can see that $Leb\otimes \nu_{L_{d}}^{-}$ is the intensity measure of $J^{-}$.
There exist $\Psi^{+}$ and $\Psi^{-}$ in $\mathbb{H}_{d}^{+}$ such that $\Psi=\Psi^{+}-\Psi^{-}$. Let us take the Lévy processes $X$ and $Y$ in $\mathbb{C}^{d}$$$X(t)=\left \vert \Psi^{+}\right \vert ^{1/2}B_{I}(t)+\int \nolimits_{\left[
0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert x\right \vert \leq
1\}}x\widetilde{J}^{+}(\mathrm{d}s,\mathrm{d}x)+\int \nolimits_{\left[
0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert x\right \vert >1\}}xJ^{+}(\mathrm{d}s,\mathrm{d}x)\text{, }t\geq0\text{,}$$$$Y(t)=\left \vert \Psi^{-}\right \vert ^{1/2}B_{I}(t)+\int \nolimits_{\left[
0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert x\right \vert \leq
1\}}x\widetilde{J}^{-}(\mathrm{d}s,\mathrm{d}x)+\int \nolimits_{\left[
0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert x\right \vert >1\}}xJ^{-}(\mathrm{d}s,\mathrm{d}x)\text{, }t\geq0\text{,}$$ where $B_{I}$ is a $\mathbb{C}^{d}$-valued standard Brownian motion with quadratic variation $tI_{d}$.
Observe that$$\left[ X\right] (t)=\Psi^{+}t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\backslash \{0\}}xx^{\ast}J_{+}(\mathrm{d}s,\mathrm{d}x)=\Psi^{+}t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{H}_{d(1)}^{+}\backslash \{0\}}VJ_{L_{d}}(\mathrm{d}s,\mathrm{d}V) \label{Quad1decomp}$$ and$$\begin{aligned}
\left[ Y\right] (t) & =\Psi^{-}t+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\backslash \{0\}}xx^{\ast}J^{-}(\mathrm{d}s,\mathrm{d}x)=\Psi^{-}t-\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\backslash \{0\}}\left( -xx^{\ast}\right) J_{L_{d}}(\mathrm{d}s,\mathrm{d}x)\nonumber \\
& =\Psi^{-}t-\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{H}_{d(1)}^{-}\backslash \{0\}}VJ_{L_{d}}(\mathrm{d}s,\mathrm{d}V), \label{Quad2decomp}$$ where $\mathbb{H}_{d(1)}^{-}$ denotes the cone of negative (nonpositive) definite matrices of rank one in $\mathbb{H}_{d}$. The first assertion follows from (\[LIDBV\]). Finally, since $J_{L_{d}}$ is a Poisson random measure and $\mathbb{H}_{d(1)}^{+}\backslash \{0\}$ and $\mathbb{H}_{d(1)}^{-}\backslash \{0\}$ are disjoint sets, from the last expressions in (\[Quad1decomp\]) and (\[Quad2decomp\]) we have that $\left[ X\right] $ and $\left[ Y\right] $ are independent processes, although $X$ and $Y$ are not.
Next we consider the matrix Lévy processes associated to the BGCD matrix ensembles $(M_{d})_{d\geq1}$. We have the following two consequences of the former results.
\[corBG\]Let $M_{d}=\left \{ M_{d}(t):t\geq0\right \} $ be the matrix Lévy process associated to the BGCD random matrix ensembles.
a\) Let $\mu$ be the infinitely divisible distribution with triplet $\left(
0,\psi,\nu \right) $ associated to $M_{d}$ such that $$\int_{\left \vert x\right \vert \leq1}\left( 1\wedge x\right) \nu
(\mathrm{d}x)<\infty,\ \ \nu((-\infty,0])=0\ \text{ and\ }\mathcal{\psi}_{0}:=\mathcal{\psi}-\int_{x\leq1}x\nu(\mathrm{d}x)\geq0.$$ Let us consider the Lévy-Itô decomposition of $M_{d}(t)$ in $\overline{\mathbb{H}}_{d}^{+}$ $$M_{d}(t)=\mathcal{\psi}_{0}tdI_{d}+\int \nolimits_{\left[ 0,t\right] }\int_{\mathbb{H}_{d(1)}^{+}\backslash \{0\}}VJ_{M_{d}}(\mathrm{d}s,\mathrm{d}V).$$ Then there exists a Lévy process $X=\left \{ X(t):t\geq0\right \} $ in $\mathbb{C}^{d}$ such that $M_{d}(t)=\left[ X\right] (t)$, where $$X(t)=\left \vert \mathcal{\psi}_{0}\right \vert ^{1/2}B_{I}(t)+\int
\nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert
x\right \vert \leq1\}}x\widetilde{J}(\mathrm{d}s,\mathrm{d}x)+\int
\nolimits_{\left[ 0,t\right] }\int_{\mathbb{C}^{d}\cap \{ \left \vert
x\right \vert >1\}}xJ(\mathrm{d}s,\mathrm{d}x)\text{, }t\geq0\text{,}$$ $B_{I}$ is a $\mathbb{C}^{d}$-valued standard Brownian motion with quadratic variation $tI_{d}$, and the Poisson random measure $J$ is given by $J=J_{M_{d}}\circ \varphi_{+}^{-1}$.
b\) If $M_{d}$ has bounded variation then there exist Lévy processes $X=\left \{ X(t):t\geq0\right \} $ and $Y=\left \{ Y(t):t\geq0\right \} $ in $\mathbb{C}^{d}$ such that $M_{d}(t)=\left[ X\right] (t)-\left[ Y\right]
(t),$ where $\left \{ \left[ X\right] (t):t\geq0\right \} $ and $\left \{
\left[ Y\right] (t):t\geq0\right \} $ are independent.
Covariation matrix processes approximation
==========================================
We now consider approximation of general BGCD ensembles by BGCD matrix compound Poisson processes which are covariation of $\mathbb{C}^{d}$-valued Lévy processes.
The following results gives realizations of BGCD ensembles of compound Poisson type as the covariation of two $\mathbb{C}^{d}$-valued Lévy processes. Its proof is straightforward.
\[BGCDCPP\] Let $\mu$ be a compound Poisson distribution on $\mathbb{R}$ with Lévy measure $\nu$ and drift $\mathcal{\psi}\in \mathbb{R}$ and let $(M_{d})_{d\geq1}$ be the BGCD matrix ensemble for $\Lambda(\mu).$ For each $d\geq1$, assume that
i\) $(\beta_{j})_{j\geq1}$ is a sequence of i.i.d. random variables with distribution $\nu/\nu \left( \mathbb{R}\right) $.
ii\) $(u_{j})_{j\geq1}$ is a sequence of i.i.d. random vectors with uniform distribution on the unit sphere of $\mathbb{C}^{d}$.
iii\) $\left \{ N(t)\right \} _{t\geq0}$ is a Poisson process with parameter one.
Assume that $(\beta_{j})_{j\geq1}$, $(u_{j})_{j\geq1}$ and $\left \{
N(t)\right \} _{t\geq0}$ are independent. Then
a\) $M_{d}$ has the same distribution as $M_{d}(1)$ where $$M_{d}(t)=\mathcal{\psi}tI_{d}+\sum_{j=1}^{N(t)}\beta_{j}u_{j}u_{j}^{\ast
},\quad t\geq0. \label{BGCP1}$$
b\) $M_{d}(\cdot)=[X_{d},Y_{d}](\cdot)$ where $X_{d}=\left \{ X_{d}(t)\right \}
_{t\geq0},$ $Y_{d}=\left \{ Y_{d}(t)\right \} _{t\geq0}$ are the $\mathbb{C}^{d}$-valued Lévy processes$$X_{d}(t)=\sqrt{\left \vert \mathcal{\psi}\right \vert }B(t)+\sum_{j=1}^{N(t)}\sqrt{\left \vert \beta_{j}\right \vert }u_{j},\quad t\geq0,
\label{BGCP2}$$$$Y_{d}(t)=\mathrm{sign}\left( \mathcal{\psi}\right) \sqrt{\left \vert
\mathcal{\psi}\right \vert }B(t)+\sum_{j=1}^{N(t)}\mathrm{sign}\left(
\beta_{j}\right) \sqrt{\left \vert \beta_{j}\right \vert }u_{j},\quad t\geq0,
\label{BGCP3}$$ and $B=\left \{ B(t)\right \} _{t\geq0}$ is a $\mathbb{C}^{d}$-valued standard Brownian motion independent of $(\beta_{j})_{j\geq1}$, $(u_{j})_{j\geq1}$ and $\left \{ N(t)\right \} _{t\geq0}$.
For the general case we have the following sample path approximation by covariation processes for Lévy processes generated by the BGCD matrix ensembles.
\[General\] Let $\mu$ be an infinitely divisible distribution on $\mathbb{R}$ with triplet $(a^{2},\psi,\nu)$ and let $(M_{d})_{d\geq1}$ be the corresponding BGCD matrix ensemble for $\Lambda(\mu).$ Let $d\geq1$ fixed and assume that for $n\geq1$
i\) $(\beta_{j}^{n})_{j\geq1}$ is a sequence of i.i.d. random variables with distribution $\mu^{\ast \frac{1}{n}}$.
ii\) $(u_{j}^{n})_{j\geq1}$ is a sequence of i.i.d. random vectors with uniform distribution on the unit sphere of $\mathbb{C}^{d}$.
iii\) $N^{n}=\left \{ N^{n}(t)\right \} _{t\geq0}$ is a Poisson process with parameter $n$.
iv\) $B^{n}=\left \{ B^{n}(t)\right \} _{t\geq0}$ is a $\mathbb{C}^{d}$-valued standard Brownian motion.
v\) $(\beta_{j}^{n})_{j\geq1}$, $(u_{j}^{n})_{j\geq1},N^{n}$ and $B^{n}$are independent.
Let $$X_{d}^{n}(t)=\sqrt{\left \vert \mathcal{\psi}\right \vert }B^{n}(t)+\sum
_{j=1}^{N^{n}(t)}\sqrt{\left \vert \beta_{j}^{n}\right \vert }u_{j}^{n},\quad
t\geq0, \label{Gen1}$$$$Y_{d}^{n}(t)=\mathrm{sign}\left( \mathcal{\psi}\right) \sqrt{\left \vert
\mathcal{\psi}\right \vert }B^{n}(t)+\sum_{j=1}^{N^{n}(t)}\mathrm{sign}\left(
\beta_{j}^{n}\right) \sqrt{\left \vert \beta_{j}^{n}\right \vert }u_{j}^{n},\quad t\geq0. \label{Gen2}$$ Then for each $d\geq1$ there exist $\mathbb{M}_{d}$-valued processes $\widetilde{M}_{d}^{n}=\left \{ \widetilde{M}_{d}^{n}(t)\right \} _{d\geq1}$ such that $\widetilde{M}_{d}^{n}\overset{\mathcal{L}}{=}[X_{d}^{n},Y_{d}^{n}]$,$$\sup_{0<s\leq t}\left \Vert \widetilde{M}_{d}^{n}(s)-M_{d}(s)\right \Vert
\underset{n\rightarrow \infty}{\overset{\Pr}{\longrightarrow}}0\text{,\quad
}\forall t\geq0\text{,}$$ where $\left \{ M_{d}(t):t\geq0\right \} $ is the $\mathbb{M}_{d}$-valued Lévy process associated to $(M_{d})_{d\geq1}$.
By the compound Poisson approximation for infinitely divisible distributions on $\mathbb{R}$ (see [@Sato1 pp 45])$,$ we choose $\mu_{n}$ an infinitely divisible distribution such that $\mu_{n}\longrightarrow \mu,$ where we take the triplet of $\mu_{n}$ as $\left( 0,\psi^{n},\nu^{n}\right) ,$ $\psi
^{n}=\int \frac{x}{1+\left \vert x\right \vert ^{2}}\nu^{n}\left( dx\right) $ and $\nu^{n}=n\mu^{\ast \frac{1}{n}}$, satisfying (see [@Sato1 Theorem 8.7]) that for every bounded continuous function $f$ vanishing in a neighborhood of zero$$\int_{\mathbb{R}}f\left( r\right) \nu^{n}\left( dr\right) \longrightarrow
\int_{\mathbb{R}}f\left( r\right) \nu \left( dr\right) \text{ as
}n\rightarrow \infty \text{,} \label{lev}$$ for each $\varepsilon>0$$$\int_{\left \vert r\right \vert \leq \varepsilon}r^{2}\nu^{n}\left( dr\right)
\longrightarrow a^{2}\text{ as }n\rightarrow \infty, \label{gau}$$ and $\psi^{n}\rightarrow \psi$.
A similar proof as for Proposition \[BGCDCPP\] gives$$M_{d}^{n}(t):=\left[ X_{d}^{n},Y_{d}^{n\ast}\right] (t)=\mathcal{\psi
}t\mathrm{I}_{d}+\sum_{j=0}^{N^{n}(t)}\beta_{j}^{n}u_{j}^{n}u_{j}^{n\ast},$$ which is a matrix value compound Poisson process with triplet $\left(
\mathcal{A}_{d}^{n},\psi_{d}^{n},\nu_{d}^{n}\right) $ given by $\mathcal{A}_{d}^{n}=0,\ \psi_{d}^{n}=\psi \mathrm{I}_{d}$ and$$\nu_{d}^{n}\left( E\right) =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})}\int
_{0}^{\infty}1_{E}\left( rV\right) \nu_{V}^{n}\left( \mathrm{d}r\right)
\Pi \left( \mathrm{d}V\right) ,\quad E\in \mathcal{B}\left( \mathbb{H}_{d}\backslash \left \{ 0\right \} \right) \text{,} \label{nudn}$$ where $\nu_{V}^{n}=\nu^{n}|_{(0,\infty)}$ or $\nu^{n}|_{(-\infty,0)}$ according to $V\geq0$ or $V\leq0$ and $\Pi$ is the measure on $\mathbb{S}(\mathbb{H}_{d(1)})$ in (\[pi\]).
We will prove that $M_{d}^{n}\overset{\mathcal{L}}{\longrightarrow}M_{d}$ by showing that the triplet $\left( \mathcal{A}_{d}^{n},\psi_{d}^{n},\nu_{d}^{n}\right) $ converges to the triplet $\left( \mathcal{A}_{d},\psi_{d},\nu_{d}\right) $ of the BGCD matrix ensemble in Proposition \[polar\] in the sense of Proposition \[convternas\]:
We observe that $\psi_{d}^{n}=\psi \mathrm{I}_{d}$ for each $n$.
Let $f:\mathbb{H}_{d(1)}\longrightarrow \mathbb{R}$ be a continuous bounded function vanishing in a neighborhood of zero. Using the polar decomposition (\[PDBGCD\]) for $\nu_{d}^{n}$ we have$$\begin{aligned}
\int_{\mathbb{H}_{d(1)}}f\left( \xi \right) \nu_{d}^{n}\left( d\xi \right)
& =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})}\int_{0}^{\infty}f\left( rV\right)
\nu_{V}^{n}\left( dr\right) \Pi \left( dV\right) \nonumber \\
& =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})\cap \overline{\mathbb{H}}_{d}^{+}}\int_{\left \{ -1,1\right \} }\int_{0}^{\infty}f\left( trV\right) \nu
_{V}^{n}\left( dr\right) \lambda^{n}\left( dt\right) \omega_{d}\left(
dV\right) . \label{intfb}$$ For $V\in \mathbb{S}(\mathbb{H}_{d(1)})\cap \overline{\mathbb{H}}_{d}^{+}$ fixed, $$\begin{aligned}
\int_{\left \{ -1,1\right \} }\int_{0}^{\infty}f\left( trV\right) \nu
_{V}^{n}\left( dr\right) \lambda^{n}\left( dt\right) & =\lambda
^{n}\left( \left \{ 1\right \} \right) \int_{0}^{\infty}f\left( rV\right)
\nu^{n}\left( dr\right) \\
& +\lambda^{n}\left( \left \{ -1\right \} \right) \int_{-\infty}^{0}f\left( rV\right) \nu^{n}\left( dr\right) \text{.}$$ As a function of $r$, $f\left( rV\right) $ is a real valued continuous bounded function vanishing in a neighborhood of zero, hence using (\[lev\])$$\lambda^{n}\left( \left \{ 1\right \} \right) \int_{0}^{\infty}f\left(
rV\right) \nu^{n}\left( dr\right) \longrightarrow \lambda \left( \left \{
1\right \} \right) \int_{0}^{\infty}f\left( rV\right) \nu \left( dr\right)$$ and$$\lambda^{n}\left( \left \{ -1\right \} \right) \int_{-\infty}^{0}f\left(
rV\right) \nu^{n}\left( dr\right) \longrightarrow \lambda \left( \left \{
-1\right \} \right) \int_{-\infty}^{0}f\left( rV\right) \nu \left(
dr\right) .$$ Then from (\[intfb\])$$\begin{aligned}
\int_{\mathbb{H}_{d(1)}}f\left( \xi \right) \nu_{d}^{n}\left( d\xi \right)
& \longrightarrow d\int_{\mathbb{S}(\mathbb{H}_{d(1)})\cap \overline
{\mathbb{H}}_{d}^{+}}\int_{\left \{ -1,1\right \} }\int_{0}^{\infty}f\left(
trV\right) \nu_{V}\left( dr\right) \lambda \left( dt\right) \omega
_{d}\left( dV\right) \\
& =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})}\int_{0}^{\infty}f\left( rV\right)
\nu_{d}\left( dr\right) \Pi \left( dV\right) =\int_{\mathbb{H}_{d(1)}}f\left( \xi \right) \nu_{d}\left( d\xi \right) .\end{aligned}$$
Next, we verify the convergence of the Gaussian part.
Let us define, for each $\varepsilon>0$ and $n\geq1,$ the operator $\mathcal{A}^{n,\varepsilon}:\mathbb{H}_{d}\longrightarrow \mathbb{H}_{d}$ by $$\mathrm{tr}\left( \Theta \mathcal{A}^{n,\varepsilon}\Theta \right)
=\int_{\left \Vert \xi \right \Vert \leq \varepsilon}\left \vert \mathrm{tr}\left(
\Theta \xi \right) \right \vert ^{2}\nu_{d}^{n}\left( d\xi \right) .$$ From (\[nudn\]) we get $$\begin{aligned}
& \int_{\left \Vert \xi \right \Vert \leq \varepsilon}\left \vert \mathrm{tr}\left( \Theta \xi \right) \right \vert ^{2}\nu_{d}^{n}\left( d\xi \right)
=d\int_{\mathbb{S}(\mathbb{H}_{d(1)})}\int_{0}^{\infty}\mathbf{1}_{\left \{
\left \Vert rV\right \Vert \leq \varepsilon \right \} }\left( rV\right)
\left \vert \mathrm{tr}\left( r\Theta V\right) \right \vert ^{2}\nu_{V}^{n}\left( dr\right) \Pi \left( dV\right) \\
& =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})\cap \overline{\mathbb{H}}_{d}^{+}}\int_{\left \{ -1,1\right \} }\int_{0}^{\infty}\mathbf{1}_{\left \{
r\leq \varepsilon \right \} }\left( rtV\right) r^{2}\left \vert \mathrm{tr}\left( \Theta V\right) \right \vert ^{2}\nu_{V}^{n}\left( dr\right)
\lambda \left( dt\right) \omega_{d}\left( dV\right) \\
& =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})\cap \overline{\mathbb{H}}_{d}^{+}}\int_{\mathbb{R}}\mathbf{1}_{\left \{ r\leq \varepsilon \right \} }\left(
rV\right) r^{2}\left \vert \mathrm{tr}\left( \Theta V\right) \right \vert
^{2}\nu^{n}\left( dr\right) \omega_{d}\left( dV\right) \\
& =d\int_{\mathbb{S}(\mathbb{H}_{d(1)})\cap \overline{\mathbb{H}}_{d}^{+}}\left \vert \mathrm{tr}\left( \Theta V\right) \right \vert ^{2}\int_{\left \vert r\right \vert \leq \varepsilon}r^{2}\nu^{n}\left( dr\right)
\omega_{d}\left( dV\right) .\end{aligned}$$ Then using (\[gau\]),$$\int_{\left \Vert \xi \right \Vert \leq \varepsilon}\left \vert \mathrm{tr}\left(
\Theta \xi \right) \right \vert ^{2}\nu_{d}^{n}\left( d\xi \right)
\longrightarrow da^{2}E_{u}\left \vert \mathrm{tr}\left( \Theta uu^{\ast
}\right) \right \vert ^{2}\text{,}$$ where $u$ is a uniformly distributed column random vector in the unit sphere of $\mathbb{C}^{d}$. Finally $$da^{2}E_{u}\left \vert \mathrm{tr}\left( \Theta uu^{\ast}\right) \right \vert
^{2}=\frac{a^{2}}{d+1}\left( \mathrm{tr}\left( \Theta^{2}\right) +\left(
\mathrm{tr}\left( \Theta \right) \right) ^{2}\right) =\mathrm{tr}\left(
\Theta^{\ast}\mathcal{A}_{d}\Theta^{\ast}\right) , \label{covgau}$$ where $\mathcal{A}_{d}$ is as in (\[GPBGCD\]) and the first equality in (\[covgau\]) follows from page $637$ in [@CD]. Thus $M_{d}^{n}\overset{\mathcal{L}}{\longrightarrow}M_{d}$ and the conclusion follows from Proposition \[convproc\].
Final remarks
=============
1. For the present work we do not have a specific financial application in mind. However, infinitely divisible nonnegative definite matrix processes with rank one jumps as characterized in Theorem \[Sub\], might be useful in the study of multivariate high-frequency data using realized covariation, where matrix covariation processes appear; see for example [@BNSh04]. Moreover, it seems interesting to explore the construction of financial oriented matrix Lévy based models as in [@BNSe09] for the specific case of rank one jumps matrix process of bounded variation.
2. In the direction of free probability, it is well known that the so-called Hermitian Brownian motion matrix ensemble $\left \{ B_{d}(t):t\geq0\right \} $, $d\geq1,$ is a realization of the free Brownian motion. It is an open question if the matrix Lévy processes from BGCD models $\left \{ M_{d}(t):t\geq0\right \} $, $d\geq1$, are realizations of free Lévy processes. A first step in this direction would be to prove that the increments of a BGCD ensemble become free independent. A second step, more related to our work, would be to have an insight of the implication of the rank one condition of the matrix Lévy BGCD process in Corollary \[corBG\] as realization of a positive free Lévy process. These two problems are the subjects of current research of one of the coauthors.
3. In [@BG07] a new Bercovici-Pata bijection for certain free convolution $\boxplus_{c}$ is established and a $d\times d^{\prime}$ random matrix model for this bijection which is very close to the one given by the BGCD random matrix model is established. It can be seen that the Lévy measures of these rectangular BGCD random matrices are supported in the subset of $d\times d^{\prime}$ complex matrices of rank one, in a similar way as done in [@DRA] for the BGCD case. It would be of interest to have the analogue results on bounded variation of Section 4 for the Lévy processes associated to these rectangular BGCD random matrices, considering an appropriate nonnegative definite notion for rectangular matrices.
**Acknowledgement**. *This work was done while Victor Pérez-Abreu was visiting Universidad Autónoma de Sinaloa in January and May of 2012. The authors thank two referees for the very carefully and detailed reading of a previous version of the manuscript and for their comments that improved Theorems \[Sub\] and \[Bdv\] and the presentation of the present version of the manuscript.*
[99]{}
D. Applebaum (2007): Lévy processes and stochastic integrals in Banach spaces, *Probab. Math. Statist.* **27**, 75-88.
O. E. Banrdorff-Nielsen and N. Shephard (2004): Econometrics analysis of realised covariation: high frequency covariance, regression and correlation in financial economics. *Econometrika* **72**, 885-925.
O. E. Barndorff-Nielsen and R. Stelzer (2007): Positive-definite matrix processes of finite variation. *Probab. Math. Statist.* **27**, 3-43.
O. E. Barndorff-Nielsen and R. Stelzer (2011): The multivariate supOU stochastic volatility model. *Math. Finance.* To appear.
O. E. Barndorff-Nielsen and R. Stelzer (2011): Multivariate supOU processes. *Ann. Appl. Probab.* **21**, 140-182.
F. Benaych-Georges (2005): Classical and free infinitely divisible distributions and random matrices. *Ann. Probab.,* **33**, 1134-1170.
F. Benaych-Georges (2007): Infinitely divisible distributions for rectangular free convolution: classification and matricial interpretation. *Probab. Theory Relat. Fields*, **139,** 143-189.
F. Benaych-Georges and T. Cabanal-Duvillard (2012): Marchenko-Pastur theorem and Bercovici-Pata bijections for heavy-tailed or localized vectors. Preprint.
H. Bercovici and V. Pata, with an appendix by P. Biane (1999): Stable laws and domains of attraction in free probability theory. *Ann. of Math.*, **149**, 1023-1060.
T. Cabanal-Duvillard (2005): A matrix representation of the Bercovici-Pata bijection. *Electron. J. Probab.*, **10**, 632-661 (electronic).
R. Cont and P. Tankov (2004): *Financial Modelling with Jump Processes*. Chapman & Hall/CRC.
J. A. Domínguez-Molina and A. Rocha-Arteaga (2012): Random matrix models of stochastic integrals type for free infinitely divisible distributions. *Periodica Mathematica Hungarica.* **64** (2), 145-160.
O. Kallenberg (2002): *Foundations of Modern Probability. Second Edition.* Springer.
V. Pérez-Abreu and N. Sakuma (2008): Free generalized gamma convolutions. *Elect. Comm. in Probab*. **13**, 526-539.
C. Pigorsch and R. Stelzer (2009): On the definition, stationary distribution and second order structure of positive-semidefinite Ornstein-Uhlenbeck type processes. *Bernoulli* **15**, 754-773.
P. Protter (2004): *Stochastic Integration and Differential Equations.* Stoch. Model. Appl. Probab. **21**, Springer.
K. Sato (1999): *Lévy Processes and Infinitely Divisible Distributions.* Cambridge Univ. Press, Cambridge.
R. Stelzer (2010): Multivariate COGARCH(1, 1) processes. *Bernoulli* **16** (1), 80-115.
[^1]: [email protected]
[^2]: [email protected]
[^3]: [email protected]
| {
"pile_set_name": "ArXiv"
} |
The Olig1 gene encodes a basic helix-loop-helix (bHLH) transcription factor, OLIG1 that along with the OLIG2 regulates key stages of early oligodendrocyte development. Myelinating oligodendrocytes fulfill diverse functional roles, such as ensheathment of neurons to facilitate electrical conductivity, maintenance of axonal integrity and participation in signaling networks with neurons. Olig1 gene function is critical for regulation of oligodendrogenesis during embryonic and fetal stages of CNS development, and it continues to be expressed in mature oligodendrocytes (Ligon et al. 2006). Elevated Olig1 expression has also been found in certain brain tumors, particularly oligodendrogliomas (Hoang-Xuan et al. 2002).
There exists a significant need for promoter elements which are capable of driving expression in specific cell types and/or in specific regions of the brain. Identification of minimal elements required for adequate expression and specificity will allow ease of use in expression constructs. | {
"pile_set_name": "USPTO Backgrounds"
} |
Provincial Highway 24 (Taiwan)
Provincial Highway 24 is a Taiwanese highway that started from Pingtung City and ended in Wutai. The entire highway is within Pingtung County. The highway is also known as Wutai Highway (霧台公路). The route length is and connects the population centers in Pingtung to the mountainous aboriginal townships of Sandimen and Wutai.
Route description
The highway begins at downtown Pingtung City at the intersection with Highway 3. The highway continues eastbound towards Changzhi, where it meets Freeway 3. The road continues toward the mountains, passing through Yanpu, Neipu, Sandimen, and ends at Wutai. A stretch of the highway in Wutai was severely damaged by Typhoon Morakot in 2009 and was closed to traffic ever since.
The highway was known as Highway 22 until 1993, when it was assigned its current number. The initial plan was to extend the highway from Wutai to Chihpen in Beinan, Taitung, but was formally abandoned in 2011 due to environmental concerns.
See also
Highway system in Taiwan
References
External links
Category:Highways in Taiwan | {
"pile_set_name": "Wikipedia (en)"
} |
{
module Main where
import Control.Exception as Exception
}
%tokentype { Token }
%token A { A }
%name parse
%%
parse : A { () }
{
data Token = A | B
test1 = parse [B]
main = do Exception.try (print test1 >> fail "Test failed.") :: IO (Either ErrorCall ())
putStrLn "Test worked"
happyError = error "parse error"
}
| {
"pile_set_name": "Github"
} |
vuurvvr. What is prob of picking 2 u, 1 v, and 1 r?
1/14
Calculate prob of picking 1 w and 1 m when two letters picked without replacement from {m: 1, d: 1, w: 13}.
13/105
Calculate prob of picking 1 l, 1 h, and 2 g when four letters picked without replacement from {g: 5, l: 2, h: 6}.
24/143
What is prob of picking 1 w and 1 c when two letters picked without replacement from {w: 1, k: 3, c: 5, d: 3, f: 6}?
5/153
Two letters picked without replacement from joobebokjkyy. What is prob of picking 1 b and 1 j?
2/33
Calculate prob of picking 2 t when two letters picked without replacement from tttt.
1
Calculate prob of picking 2 e when two letters picked without replacement from fneew.
1/10
Four letters picked without replacement from {l: 1, w: 12, b: 5}. Give prob of picking 1 b and 3 w.
55/153
Three letters picked without replacement from giggaaoaoioiooiaui. Give prob of picking 2 a and 1 g.
3/136
Two letters picked without replacement from {i: 4, b: 4, x: 2, w: 1}. Give prob of picking 1 i and 1 x.
8/55
Calculate prob of picking 1 z and 2 c when three letters picked without replacement from {c: 11, j: 1, z: 3}.
33/91
Four letters picked without replacement from {f: 3, r: 4, p: 1, d: 2}. What is prob of picking 3 r and 1 f?
2/35
What is prob of picking 2 x and 1 r when three letters picked without replacement from {t: 1, r: 2, x: 4, i: 3}?
1/10
Two letters picked without replacement from {l: 1, o: 1, y: 1, i: 2, h: 1, b: 1}. Give prob of picking 2 i.
1/21
Calculate prob of picking 1 x, 1 h, and 1 f when three letters picked without replacement from mxfmhfmm.
1/28
Calculate prob of picking 1 s and 2 x when three letters picked without replacement from {x: 7, e: 2, s: 2, g: 1}.
21/110
Four letters picked without replacement from vvqqqqvqqqvqqqqvqqq. Give prob of picking 3 v and 1 q.
35/969
Calculate prob of picking 1 b and 2 x when three letters picked without replacement from bxxxbbxxxx.
21/40
What is prob of picking 1 d and 1 s when two letters picked without replacement from dsxdxfd?
1/7
What is prob of picking 1 c and 1 n when two letters picked without replacement from {n: 1, c: 1, s: 2, f: 1, o: 1, x: 1}?
1/21
Four letters picked without replacement from {b: 7, n: 6, c: 2}. What is prob of picking 3 n and 1 b?
4/39
What is prob of picking 1 u and 1 a when two letters picked without replacement from {a: 1, i: 1, m: 1, u: 1, o: 1}?
1/10
What is prob of picking 2 e and 1 c when three letters picked without replacement from qqeecqeqccqccqe?
6/91
Two letters picked without replacement from eofyeeeoggeogg. What is prob of picking 2 e?
10/91
Calculate prob of picking 2 l when two letters picked without replacement from {t: 3, l: 4}.
2/7
Three letters picked without replacement from {b: 3, d: 4}. What is prob of picking 3 d?
4/35
What is prob of picking 2 y and 2 g when four letters picked without replacement from pinnipipigygynngnnn?
1/1292
Calculate prob of picking 1 w and 1 m when two letters picked without replacement from {f: 3, h: 6, m: 4, w: 6}.
8/57
Three letters picked without replacement from vvocvov. What is prob of picking 2 v and 1 o?
12/35
Four letters picked without replacement from kakggxkbxkaakk. What is prob of picking 1 b, 2 a, and 1 x?
6/1001
Two letters picked without replacement from ouppuuoppppopupu. What is prob of picking 1 p and 1 o?
1/5
Calculate prob of picking 1 n, 1 v, and 1 x when three letters picked without replacement from {w: 2, h: 2, x: 8, v: 1, n: 1}.
2/91
Four letters picked without replacement from xxxlxxlmll. What is prob of picking 1 m and 3 l?
2/105
Three letters picked without replacement from {o: 12, s: 3}. What is prob of picking 3 s?
1/455
Three letters picked without replacement from {g: 5, e: 7}. What is prob of picking 3 e?
7/44
Three letters picked without replacement from fkcfoyfcoc. Give prob of picking 1 f, 1 o, and 1 y.
1/20
Three letters picked without replacement from ucuucuuccccccccc. What is prob of picking 2 u and 1 c?
11/56
Four letters picked without replacement from rirroroozooiiir. What is prob of picking 3 o and 1 r?
10/273
Calculate prob of picking 2 q, 1 w, and 1 m when four letters picked without replacement from wuqomdudq.
1/126
What is prob of picking 1 v, 1 i, 1 m, and 1 f when four letters picked without replacement from fivmh?
1/5
Two letters picked without replacement from gddgdddddddgdddddd. Give prob of picking 1 d and 1 g.
5/17
Two letters picked without replacement from tkkttklktkkmtf. What is prob of picking 1 l and 1 t?
5/91
Two letters picked without replacement from {p: 1, w: 1, g: 1, q: 1, k: 1}. Give prob of picking 1 p and 1 w.
1/10
Three letters picked without replacement from jhkrs. What is prob of picking 1 j, 1 s, and 1 h?
1/10
Two letters picked without replacement from {a: 2, q: 2, t: 1}. Give prob of picking 2 q.
1/10
What is prob of picking 3 a and 1 s when four letters picked without replacement from alskklakaa?
2/105
What is prob of picking 2 r and 1 e when three letters picked without replacement from {a: 1, v: 1, r: 2, e: 2, x: 1}?
2/35
What is prob of picking 1 o and 2 i when three letters picked without replacement from oeomoomiomeiooooe?
9/680
Calculate prob of picking 2 c when two letters picked without replacement from {i: 3, c: 3, b: 1}.
1/7
Four letters picked without replacement from {w: 2, j: 3, f: 3, i: 7}. What is prob of picking 1 f and 3 i?
1/13
What is prob of picking 1 g, 2 h, and 1 x when four letters picked without replacement from {k: 1, y: 2, x: 1, h: 6, g: 2}?
2/33
Calculate prob of picking 2 o when two letters picked without replacement from oyyobyibyyco.
1/22
Two letters picked without replacement from cgggggggggggccggccg. Give prob of picking 2 g.
91/171
Three letters picked without replacement from {j: 1, i: 2, n: 1, x: 2, r: 1, l: 1}. What is prob of picking 1 i and 2 x?
1/28
Three letters picked without replacement from mmyymymymmmmmm. Give prob of picking 2 y and 1 m.
15/91
Calculate prob of picking 1 d and 1 u when two letters picked without replacement from {d: 4, w: 3, u: 1, q: 2}.
4/45
Two letters picked without replacement from {f: 1, s: 7, u: 2}. What is prob of picking 1 s and 1 f?
7/45
Calculate prob of picking 1 z and 1 a when two letters picked without replacement from {z: 2, a: 8}.
16/45
Four letters picked without replacement from vgpvgjjjpgj. Give prob of picking 2 j, 1 g, and 1 p.
6/55
Three letters picked without replacement from pppbzpzppzpnzpp. What is prob of picking 1 b, 1 p, and 1 z?
36/455
Calculate prob of picking 1 p, 1 l, and 2 k when four letters picked without replacement from {l: 2, k: 2, t: 1, x: 1, p: 1, a: 1}.
1/35
Three letters picked without replacement from kvvkkvvuv. What is prob of picking 1 u, 1 k, and 1 v?
5/28
Two letters picked without replacement from gqdkzzk. Give prob of picking 2 z.
1/21
Calculate prob of picking 1 x and 1 m when two letters picked without replacement from {m: 1, x: 2, p: 1, g: 3}.
2/21
What is prob of picking 1 k and 1 n when two letters picked without replacement from {l: 2, n: 1, k: 1}?
1/6
What is prob of picking 1 q and 1 i when two letters picked without replacement from iqqqii?
3/5
Two letters picked without replacement from hiiiqrvi. What is prob of picking 1 h and 1 r?
1/28
What is prob of picking 1 y, 2 f, and 1 i when four letters picked without replacement from wfffyfffwywiwf?
6/143
Calculate prob of picking 4 y when four letters picked without replacement from yysiysssssysss.
1/1001
Three letters picked without replacement from {w: 3, v: 1, f: 5}. Give prob of picking 3 w.
1/84
Four letters picked without replacement from pjprprrjpprprpr. Give prob of picking 1 j and 3 r.
8/273
Calculate prob of picking 1 a and 1 c when two letters picked without replacement from acacaaaaacabaab.
2/7
Calculate prob of picking 2 f and 2 v when four letters picked without replacement from vvfvvvffff.
10/21
Two letters picked without replacement from aznnznssno. Give prob of picking 1 a and 1 n.
4/45
Calculate prob of picking 1 h and 1 i when two letters picked without replacement from {a: 1, h: 1, l: 2, b: 1, g: 2, i: 1}.
1/28
What is prob of picking 2 j and 1 m when three letters picked without replacement from jjlrtrrrmqqmmrjmmqmj?
3/95
Calculate prob of picking 4 a when | {
"pile_set_name": "DM Mathematics"
} |
In 402AD, Constantine’s son, also Constantine, was king having invaded Britain reportedly at the request of Guithelimus, the Archbishop of London, to defend against the growing intrusions of the Anglo Saxons, but was murdered by an unknown Pict in 420AD. His son Constans who had wished to avoid all the perils of kingship had become a monk at Winchester, but was sought out and made High King by the northern leader Vortigern and ruled for seventeen years until, having fallen out with Vortigern, was himself killed and Vortigern assumed the role, thus earning himself the title of “usurper” from Gildas. It was Vortigern who first brought Anglo Saxon mercenaries, led by Hengist and Horsa, into the country to aid him in repelling attacks from Pictish and Scottish raiders in return for promises of land.
It should not be assumed that these titles such as “High King” or “King of the Britons” indicates nationwide acceptance of one sovereign, although Vortigern would seem to have wielded much authority in his time, so much so that he was even able to arrange the migration of an entire tribe, the Votadini under their leader Cunedda, who were forced to leave Lothian and made to resettle in North Wales as a buffer against raiders from Ireland. Cunedda was celebrated as a strong leader and did much to stop the many raids from north of Hadrian’s Wall by the Picts. This relocation on Vortigern’s orders can be seen as part of his attempt to halt the increasing incursions from foreign invaders as well as from his former Saxon allies who had rebelled against his rule. Cunedda married the daughter of Coel Hen, the ruler of Eboracum, the modern York.
He is said to have had nine sons and the early Welsh kingdoms of Ceredigion and Meirionyydd were supposedly named after his two sons, Ceredig and Meirion. Cunedda’s successors went on to establish the kingdom of Gwynedd. Alliances and mergers were constantly being made and broken as noted by Tacitus many years before, the situation being further muddled by the interference of Rome who would award the title “King of the Britons” to whoever was currently in favour.
By the last years of the fifth century, the formerly prosperous and once orderly Britain had descended into tribalism. Large areas in the South East were in the control of the invading Anglo Saxons from North Germany, driving the natives northward and westward while the Celtic Britons remained preoccupied with appointing and deposing various kings. To make matters worse, the entire empire was hit by an outbreak of plague, similar to the Black Death in medieval times. The plague reached Britain in 446AD, the rising death toll adding to the breakdown in civil order.
In the middle of the sixth century, the monk Gildas wrote of the ruin of Britain by the Anglo Saxons, a race he describes as “hateful to God”. He tells of the destruction wrought by the invaders in haunting detail, “in the middle of the streets lay the tops of lofty towers tumbled to the ground, stones of high walls, holy altars, fragments of human bodies covered with livid clots of congealed blood looking as though they had been squeezed together in a press, and with no possibility of being buried save in the ruins of their houses or in the ravening bellies of wild beasts”.
If ever the Celts needed a leader it was now and if they did not have one, he would need to be invented. Step forward Arthur, styled “King of the Britons” by some writers, although history mostly records him as a war leader. Some believe that Arthur was an authentic historical figure while others think him a romantic wish fulfilling myth, indeed the very name Arthur can be traced to a number of possible roots such as the Roman Artorius (meaning ploughman) or to the Welsh “Art” meaning “Bear”. Tag this to “Ur”, old Welsh for “Man” and we have Arthur or Bear Man, i.e., man of strength.
The name might even derive from the Saxon “Ar Thur” or the Eagle of Thor. It was not unusual for leaders to be known by a title that indicated strength and power, the name Vortigern has the meaning “Great King”, while both the names Hengist and Horsa have root meanings of “powerful horsemen”. The probable truth is that Arthur was a romantic amalgam of many Celtic leaders involved in the fight against the Anglo Saxons.
It has been pointed out that no reference to Arthur was recorded by Bede, Gildas or the Chronicle and this omission has been used to discount his existence. It must be remembered however, that these writers wrote from an Anglo Saxon point of view and would not necessarily wish to give him currency.
Much of what we know about Arthur comes from the pen of Geoffrey ap Arthur, later known as Geoffrey of Monmouth in his “Historia Regum Britaniae”, written in the twelfth century, but the first reference to him appears in 594AD when the northern monk St Gildas records a character known as “The Bear”. A reference to the name is also found in the writings of the Welsh monk Aneirin, who, in a passage in his poem Y Gododdin, tells of a warrior who “glutted black ravens on the ramparts of the fort though he was no Arthur”. There are later references to him in the “Historia Britonium”written by Nennius in 830AD, although none refer to him as king. He is described as “Dux Bellorum” or Duke of Battle.
The Welsh Easter Annuals, or Annales Cambriae, thought to have been written in the period that they cover, mentions Arthur by name and noted that, in the Battle of Baydon, thought to have taken place in 516AD, “Arthur carried the cross of Our Lord Jesus Christ for three days and three nights on his shoulders and the Britons were victors”. This passage need not be taken literally, it may be a reference to an amulet of some sort containing a fragment of the True Cross or, more likely, a poor translation of the word shoulder for shield and could indicate an armorial design.
The modern received view of King Arthur is one of round tables, chivalry, Camelot, courtly behaviour and brave and noble knights such as Lancelot and Galahad, arising from tales by the twelfth century writer Geoffrey of Monmouth, who claims that his tales were translations of an ancient Celtic document found in Armorica (Britanny) by Walter Mapes, Deacon of Oxford. The first reference to Excaliber and the sword in the stone legend appears in the twelfth century French writer Robert de Boron’s story “Merlin”.
Sir Thomas Malory added his own slant to the legends in his “Le Morte d’Arthur” written three hundred years later, but the reality is rather more mundane. The very word chivalry has changed its meaning many times and originally referred to a company of mounted knights or simply being a knight. In title deeds, reference to land held in chivalry can imply land tenure held in which military service was owed. Other meanings include worthy action in battle. It was to be another 500 years before the modern meaning of moral and knightly conduct came into use.
Arthur is claimed as the King of almost every Celtic kingdom from Cornwall to Scotland and it would be of use to examine his roots a little more carefully.
Geoffrey of Monmouth recorded that Arthur, the son of Uther Pendragon was from Breton stock, his grandfather, Constans, having been sent to Britain by King Aldrien of Britanny who had been asked to help rescue the country from the turmoil created when the Romans left. The name Pendragon, from the Welsh for Head Dragon or Chieftain was often bestowed on a leader and Uther may well have been a composite character similar to his son. Geoffrey believed that Arthur’s grandfather was none other than Constantine, the last self styled Emperor of Britain, who had withdrawn the last of the Roman garrison to Gaul in 407AD, but more of this later.
One of the earliest battles recorded took place in 429AD, somewhere in the mountainous west or north between the native Britons and an alliance of Saxons and Picts, known as the Alleluia Battle. The British forces were led by St Germanus, Bishop of Auxerre who had been sent by the Pope to suppress the Pelagian Heresy, which taught that men could achieve salvation through their own efforts rather than from divine grace. St Germanus was an excellent choice, having had military experience as well as a reputation as a miracle worker. The story is first told in “The Life of the Saints” written by Constantius of Lyon around 480AD and repeated in Bede’s “History of the English Church 200 years later.
The beleaguered Britons sought the help of Germanus to stop this tide of invaders and he promised to direct the battle in person. The historians tell of Germanus placing his newly baptised troops in hiding all around the valley through which the invaders must come. | {
"pile_set_name": "Pile-CC"
} |
Search
Happy Halloween week! Hopefully your pumpkins are carved, treats are bought, and you have your best Richard Simmons costume ready to go. Halloween week is a fun week with all of the decorations, kiddos running around in their costumes, and the seemingly never-ending candy bowls. Although delicious, the extra treats can be detrimental to your […]
Happy (almost) middle of October! I’m hoping you had as fantastic of a weekend as I did and were able to get out and enjoy the weather. It’s a good thing I was able to enjoy the weather this previous weekend because if we have more Packer football games like we encountered yesterday, my poor […]
10/6/14 October! Woohoo! I’m not sure if this happens to you, but there are some days I come home from work and just sit in silence, thinking about how much of a whirlwind my life is and trying to recap everything I did during my day. Usually, the recap is a fail and I end […]
Hey friends-Hard to believe we’ve reached the end of September, and in true Wisconsin fashion, a 30° temperature difference than yesterday. I had the privilege to go to a Worksite Wellness seminar last week Thursday in Milwaukee (yes, my boss let me out). In addition to learning about techniques to engage employees with wellness programs, […]
9/18/2014 Hey Hey Hey everyone! It became very apparent last weekend and a little into this week that fall is coming quickly, and if you’re not ready—too bad! I ran a 5k this previous weekend, and the temperature at the start of the race was 41 degrees! Holy moly! I had to pull the gloves […]
9/3/14 September has made it! I know people say that Labor Day marks the ‘end of summer’, but I don’t see it that way. After all, it seems like summer just began! One of my favorite parts of summer is exercising outdoors. I love that the sun is up early in the morning when I […]
Hey friends! Wednesday already?! End of August?! Summer is FLYING by! If you’re like me, your weekdays and weekends are crammed full of every activity under the sun. My weekdays are filled with swim team, work, classes, and the occasional eating and sleeping; even less on the sleeping because I love to eat! Although eating, […]
The Giving Circle of Fort Memorial Hospital Foundation is pleased to announce the grants that were awarded from funds raised during its 2013 program year. The grants totaling $14,550 were awarded to three health and wellness initiatives at Fort HealthCare. A grant for $6,500 was awarded to support the services of Dr. David Rutledge at […]
Most of us are ready to say goodbye to the ice, snow, and cold. Icy conditions can contribute to a slip hazard. When that happens to you, it’s easy to want to stay inside until the Spring thaw. But inactivity can be equally harmful. If you or someone you know would like to overcome a […]
“I will take better care of my diabetes.” Diabetes is a scary diagnosis because it is about more than just blood sugars. It is a disease that affects your blood vessels, and it can lead to a stroke or heart attack. Other than heart disease, diabetes is a disease that affects the eyes, kidneys, nerves […] | {
"pile_set_name": "Pile-CC"
} |
Check out my FIM title card project jowybean.deviantart.com/galler…
I have started an Indiegogo campaign to help me fund my trip to Baltimore for Bronycon which I will be vendoring at even if you can not give money. words of encouragement are just as appreciated.
I think I am high high with ideas after the new episodewow there were too many great gags i was tempted to draw but I figured lets just go expressive and trippy with Tree Hugger and good old Discord
Until next deviation LATERS Bronies
speed painted in Photoshop CS6 with my Wacom tablet in 2 hours.
Like it hate it its up to you not marmite
| {
"pile_set_name": "OpenWebText2"
} |
On the Front Lines of Healthcare: A Conversation with a Behavioral Health Nurse
This week, we asked Springstone Nurse Manager, Kara Markowski, BSN, RN, how her job has changed in light of our current healthcare crisis.
How did you choose a
career in behavioral health nursing with all of the other nursing careers
available?
I became an inpatient behavioral healthcare nurse over a decade ago fresh out of college and by accident. A temp agency sent me to my first assignment at a behavioral health hospital, and I knew that I was in a field where I could make a difference and help others, and so my career began.
How has your work
changed due to the pandemic?
Like many, my job has changed significantly because of the current health crisis. I have new responsibilities to my patients and my co-workers. First, we work hard to understand and follow the direction I am receiving from Springstone’s Coronavirus Committee, a special group of infectious disease nurses, doctors and other health professionals. We are also keeping up with other federal, state, and local guidelines designed to help us flatten the curve while treating patients. My team’s response to implementing those directions needs to be fast and effective.
What specific steps
are you taking to provide the highest level of behavioral health care while
maintaining the highest level of safety in the facility?
The definition of the “highest level of patient care” looks
and means something different now. All employees complete a health screening,
including having our temperatures taken at the facility when we report to work and prior to coming on the unit.
Workers in all departments who present with symptoms are asked to go home
because we have an even greater responsibility to our patients to help them be
well both physically and mentally. Patient care team members and patients are
wearing masks at all times to protect each other. Employees who are admitting
new patients are conducting screens and following important protocols to
protect our current patients and employees.
“This is a stressful time for those with mental health or addiction issues but help is available.”
The new precautions we have in place, which include extra infection
prevention efforts from our housekeeping team, are making everyone feel safer. My
team added a COVID-19 education group for our patients that helps to educate
them, keep them safe, and calm their fears. Last week, I worked with a patient
who needed inpatient mental healthcare, but exhibited symptoms of the virus, so
he had to be isolated from other patients. I spent time talking to him, while
we were both masked, and I took him outside to get some fresh air and unwind a
bit. We can all use a little extra care right now. He was able to get the inpatient
mental health treatment he truly needed to stabilize him, and then he was able
leave our facility after treatment to continue his care as an outpatient,
joining one of our Partial Hospitalization programs using telemedicine while in
his own home.
Overall, our patients have adapted to more frequent health
screenings, wearing surgical masks, and visiting
with their families on phones or tablets, and they understand and accept the
need for increased protection. Our patients are grateful that we remain open to
help them because mental health and addiction treatment is so important.
I recognize that staff members are equally concerned about
exposure, but we are teaching them how to work safely. That’s why my efforts to
educate our direct patient care workers will continue. I’m so proud of the
important work our team does every day.
What would you say to
anyone struggling right now with mental health or addiction issues who is also
concerned about COVID-19 safety?
I would encourage anyone who may be confused or scared about
getting treatment now to call us so their questions can be answered by a
healthcare professional. We offer initial assessments over the phone or by
video as an additional safety measure, and there is no obligation for the
caller.
As a healthcare worker, my job is to help people in crisis
even under challenging circumstances. This is a stressful time for those with
mental health or addiction issues but help is available, and I urge people to
make the call and let our team guide you to a care plan that is both
therapeutic and safe.
I am caring for a patient now who has been with us before and needed our help to manage her worsening symptoms and medication. We had a good laugh together when she saw that I had drawn a big smile on my mask. She said our staff had been so kind during her last stay with us, and she was happy to be with us now when she needed us most. It’s our mission to change the lives of our patients in a positive way – especially now. | {
"pile_set_name": "Pile-CC"
} |
Resource & Cost Management for Operations
Valuable course for: both experienced industry personnel looking to take their career to the next level as well as management who want to take their facility to the next level. This 2-day advanced Carver workshop will provide students with top-quartile, interactive, training with practical and industry specific case studies. Students will recognize the importance of managing all aspects of their supply chain and work force to be most cost effective and achieve Operational Excellence. | {
"pile_set_name": "Pile-CC"
} |
Liver metastases from unknown primary site: demonstration on MR images.
To demonstrate the MR imaging features of liver metastases in patients with the clinical and histologic diagnosis of tumors of unknown primary tumors, a retrospective 7-year study was performed that included a total of 14 consecutive patients (7 men and 7 women; age range, 39-82 years; mean age, 60.6 years) with liver metastases from unknown primary site who had undergone MR imaging. The following lesion features were evaluated: a) number, b) diameter, c) signal intensity on T1 and T(2)-weighted images, and d) pattern of enhancement on immediate, 45 s and 90 s post gadolinium images. Lesions were classified as hypovascular, hypervascular and nearly isovascular relative to liver parenchyma as shown on immediate post gadolinium images. Patients were separated into four major groups, related to the histologic diagnosis of the lesions: (I) poorly differentiated neoplasms; (II) well-differentiated and moderately differentiated adenocarcinoma; (III) squamous cell carcinoma; (IV) combined poorly differentiated carcinoma and poorly differentiated adenocarcinoma. MRI findings were correlated with histologic information obtained by chart review and confirmed by retrospective histopathology review. All patients had the histologic diagnosis of adenocarcinoma: 8 patients belonged to group II (1 patient with the subtype well-differentiated and 7 patients with the subtype moderately differentiated) and 6 patients to group IV. Eleven patients (79%) presented with multiple lesions distributed throughout both hepatic lobes; 3 patients exhibited solitary lesions. All solitary metastases possessed a diameter equal or larger than 5 cm. Patients with multiple metastases demonstrated a wide range of diameter, ranging from less than 1.5 cm to more than 5 cm. Regarding lesion vascularity, 4 of 13 of the patients had hypovascular metastases and 9 of 13 of the patients had hypervascular lesions. One patient demonstrated both types of lesions. Five of six patients with the histopathologic diagnosis of poorly differentiated adenocarcinoma demonstrated hypervascular metastases. Solitary metastases were most often hypovascular (2 of 3); however no correlation with the histologic subtype was possible. Liver metastases from unknown primary site are often multiple and often hypervascular. Poorly differentiated tumors are the most common histologic type. Metastases are not uncommonly hypovascular, and these are often solitary. | {
"pile_set_name": "PubMed Abstracts"
} |
Study of aromatic nucleophilic substitution with amines on nitrothiophenes in room-temperature ionic liquids: are the different effects on the behavior of para-like and ortho-like isomers on going from conventional solvents to room-temperature ionic liquids related to solvation effects?
The kinetics of the nucleophilic aromatic substitution of some 2-L-5-nitrothiophenes (para-like isomers) with three different amines (pyrrolidine, piperidine, and morpholine) were studied in three room-temperature ionic liquids ([bmim][BF4], [bmim][PF6], and [bm(2)im][BF4], where bmim = 1-butyl-3-methylimidazolium and bm(2)im = 1-butyl-2,3-dimethylimidazolium). To calculate thermodynamic parameters, a useful instrument to gain information concerning reagent-solvent interactions, the reaction was carried out over the temperature range 293-313 K. The reaction occurs faster in ionic liquids than in conventional solvents (methanol, benzene), a dependence of rate constants on amine concentration similar to that observed in methanol, suggesting a parallel behavior. The above reaction also was studied with 2-bromo-3-nitrothiophene, an ortho-like derivative able to give peculiar intramolecular interactions in the transition state, which are strongly affected by the reaction medium. | {
"pile_set_name": "PubMed Abstracts"
} |
Contents
Bambi - 1.2.8.411 Build
Update: Changes have been rolled back. Attachments with spaces in file names are still an issue. (June 23, 2011)
(June 21, 2011)
Key Highlights
This update fixed the Known Issue where file attachments to the Mail tool and the Discussions tool could not be opened if the file had spaces in the file name. Attachments should now open with no problems.
Mid Fall 1.2.3 Build
(October 24, 2010)
Key Highlights
Unpublished icon is now displayed
Published/attempted quizzes can be edited and auto re-grade possible for some quizzes (if a quiz uses a question pool the edit has to be made to the question pool question and it did not flow into the quiz however stand-alone questions can be edited and regarded)here's the updates page now
The confusion caused by adding users with their email ID has been removed, the “Add Participants” only allows one to add users based on their UFID’s or gatorlink usernames | {
"pile_set_name": "Pile-CC"
} |
A decision to lift the ban on using frozen human eggs could help thousands of women - including those delaying motherhood for career reasons.
The clinic which has won the right to thaw and use the eggs for IVF already holds eggs from 10 women who have chosen to freeze them for "social" purposes.
However, most of those likely to benefit immediately have stored eggs before undergoing cancer treatment likely to make them sterile.
A-level student Joanne Sprawson, 17, from Faversham, Kent, was diagnosed with
breast cancer in October and told that chemotherapy might make her infertile.
She said: "I'm very young and didn't think much about having kids before I
was told I had cancer.
"But when they said I might be made infertile, I thought, oh God, because I love children so much and want to have them when I'm older, in my 20s or 30s.
The ruling, by the Human Fertilisation and Embryology Authority (HFEA), represents a victory for a vigorous campaign by fertility clinics and women whose eggs are stored there.
While there is no restriction on using the technique to help women who wish to delay motherhood for career reasons, guidelines on the use of donated eggs, published last week, said that doctors should consider the relative risks to mother and child of pregnancy at a later age before going ahead.
Despite the technique being widely-used abroad, with up to 50 babies born in the US alone, the HFEA had previously considered it too risky - but now an independent report says it is safe.
Carolyn Neill can now go ahead with treatment
The Assisted Reproduction and Gynaecology Centre in London now holds the only licence for thawing and using the eggs.
Its director, Dr Mohamed Taranissi, said: "It will give them hope and give them a positive focus at a very difficult time in their life - because they can see the light at the end of the tunnel."
The decision to lift the ban was prompted by an independent report commissioned from Dr Sharon Paynter, lecturer in obstetrics and gynaecology at the University of Wales, Cardiff.
She said that while the technique did carry risks, results abroad had been "very encouraging".
'Always sympathetic'
In a statement, the HFEA's chairman Ruth Deech said: "The HFEA has always been sympathetic to the plight of women suffering a serious illness, such as cancer, whose condition or treatment may prevent them producing eggs, but we must guard against any potential risks to any child who may be born.
She told the BBC that the HFEA was confident that once babies were born, they would be healthy.
She said: "Many of the eggs do not survive the freezing process, many do not survive the thawing process, so many get lost along the way."
Prior to this ruling, clinics in this country have been licensed to freeze and store the eggs, but not to thaw and use them.
The BBC highlighted the case of Carolyn Neill, from Belfast, who now wants to start a family but was told she cannot even take her frozen eggs abroad to a country which permits the procedure.
She and the Assisted Reproduction and Gynaecology Centre in London, were threatening to launch a judicial review of the decision - but now she will be able to go ahead with the treatment.
She told the BBC: "The cancer is gone - the chemotherapy has taken everything, but I froze the eggs so that I would still be able to have a family."
She has nine eggs stored at the clinic, and at least 50 other women are understood to have eggs stored there.
However, the use of frozen eggs carries a much lower success rate than conventional IVF, between 1% and 10% as opposed to approximately 20% for normal IVF. | {
"pile_set_name": "Pile-CC"
} |
Q:
PHP - Removing tags from a string
What's the best way to remove these tags from a string, to prepare it for being passed to eval() ?
for eg. the string can be something like this:
<?php
echo 'hello world';
?>
Hello Again
<?php
echo 'Bye';
?>
Obviously str_replace won't work because the two php tags in the middle need to be there (the the 1st and the last need to be removed)
A:
Sounds like a bad idea, but if you want the start and end ones removed you could do
$removedPhpWrap = preg_replace('/^<\?php(.*)(\?>)?$/s', '$1', $phpCode);
This should do it (not tested).
Please tell me also why you want to do it, I'm 95% sure there is a better way.
A:
Usually, you wouldn't want to pass a function to eval.
If you're wishing to just remove the tags, string_replace would do the job just fine, however you might be better off using a regex.
preg_replace(array('/<(\?|\%)\=?(php)?/', '/(\%|\?)>/'), array('',''), $str);
This covers old-asp tags, php short-tags, php echo tags, and normal php tags.
| {
"pile_set_name": "StackExchange"
} |
Am i the only one around here Who celebrates Halloween on October 31?
132 shares | {
"pile_set_name": "OpenWebText2"
} |
The present invention relates to a new and improved construction of a marine vessel containing at least one vessel propeller.
Generally speaking, the marine vessel of the present development is of the type wherein the aforementioned at least one propeller is located essentially over one-half of its circumference within a tunnel formed at the floor or bottom of the hull or body of the vessel. The tunnel possesses a flow-favorable transitional shape which follows the flow lines of the water and which transitional shape is developed at the region of the floor of the vessel. At the transition region between the surface of the vessel floor and the tunnel there is arranged a retractable and extendable control plate which is pivotably mounted at the hull or body of the vessel and merges with the floor surface of such vessel.
Such type of marine vessel has been disclosed in the aforementioned copending U.S. application Ser. No. 06/191,381 and the cognate German Patent application No. 30 05 682.7. With such design of marine vessel the control plate is pivotably connected in a hinge-like fashion at a shaft arranged transversely with respect to the direction of travel of the marine vessel and can be positionally adjusted by means of a piston-and-cylinder mechanism between a retracted position, where the control plate bears against the surface of the tunnel, and an extended position remote from such tunnel surface. With such arrangement there can arise at the transition location between the vessel floor and the control plate at both of these parts damage because of cavitation erosion. Furthermore, the transition location can become contaminated by foreign bodies or particles, and thus, can impair the mobility and functional reliability of the control plate. | {
"pile_set_name": "USPTO Backgrounds"
} |
Sen. Ben Sasse Benjamin (Ben) Eric SasseGovernment watchdog recommends creation of White House cyber director position Chamber of Commerce endorses McSally for reelection Ben Sasse is mistaken with idea for the election of senators in America MORE (R-Neb.) said on Wednesday the Republican National Committee's (RNC) decision to resume its support for GOP Alabama Senate candidate Roy Moore was a "bad decision" and signaled a "sad day."
"This is a bad decision and very sad day. I believe the women--and RNC previously did too. What's changed? Or is the party just indifferent?" Sasse said in a tweet.
This is a bad decision and very sad day. I believe the women--and RNC previously did too. What's changed? Or is the party just indifferent? https://t.co/sNCiQbOgIg — Ben Sasse (@BenSasse) December 6, 2017
If the political committee that I'm a part of (the NRSC) decides to contribute here, I will no longer be a donor to or fund-raiser for it. https://t.co/uN8nsPfCBU — Ben Sasse (@BenSasse) December 6, 2017
The RNC announced earlier this week that it would support Moore after originally severing ties with him over the numerous allegations of sexual misconduct against the former judge.
ADVERTISEMENT
Several women alleged that Moore pursued relationships with them while they were teenagers and he was in his 30s.
President Trump endorsed Moore on Monday, citing the need for a Republican in the Senate.
Democrats refusal to give even one vote for massive Tax Cuts is why we need Republican Roy Moore to win in Alabama. We need his vote on stopping crime, illegal immigration, Border Wall, Military, Pro Life, V.A., Judges 2nd Amendment and more. No to Jones, a Pelosi/Schumer Puppet! — Donald J. Trump (@realDonaldTrump) December 4, 2017
Other Republicans have pushed back on Trump's endorsement, most notably Sen. Jeff Flake Jeffrey (Jeff) Lane FlakeJeff Flake: Republicans 'should hold the same position' on SCOTUS vacancy as 2016 Republican former Michigan governor says he's voting for Biden Maybe they just don't like cowboys: The president is successful, some just don't like his style MORE (R-Ariz.), who went as far as donating to Moore's Democratic opponent Doug Jones.
Sasse stopped short of that, though, saying it was a bad idea. | {
"pile_set_name": "OpenWebText2"
} |
How
It Was Done in ParisRussian
Émigré Literature and French Modernism Leonid
Livak
“It was said a long time ago that each human
being had two homelands: one’s ownand France.”Georgii Adamovich, Friends and Enemies
Here, reintroduced into literary circulation, is an ignored
yet rich and original page in Russian literary historythe
“unnoticed generation” of Russian writers who took
up residence in France after the Bolshevik coup of 1917. Leonid
Livak analyzes the position of these writers in the context of
French modernist literature, examining the ways in which French
literary life influenced émigré artistic identities
and oeuvre. The book challenges commonly accepted notions of
émigré isolation from French literature and culture
and is instrumental in reaching a fuller understanding of the
cultural mechanisms involved in the effort by an expatriate community
to carry on a creative existence.
“Livak
is extremely intelligent and focused, and in everything he does
combines the best qualities of a traditional Soviet philological
background . . . with a stellar American-style grounding in critical
thinking.”David M. Bethea, University of WisconsinMadison
Leonid Livak is assistant professor of Slavic languages
and literatures at the University of Toronto. He is editor of
the annual scholarly review From the Other Shore: Russian
Writers Abroad, Past and Present.
Media & bookseller inquiries regarding review copies, events, and interviews can be directed to the publicity department at [email protected] or (608) 263-0734. (If you want to examine a book for possible course use, please see our Course Books page. If you want to examine a book for possible rights licensing, please see Rights & Permissions.) | {
"pile_set_name": "Pile-CC"
} |
Stay ahead with the world's most comprehensive technology and business learning platform.
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, tutorials, and more.
Preface
Mention FPGAs to most people, and they will either give you a blank stare or think you are talking about some kind of golf league. To most of us Makers, the term conjures up thoughts of hardware creativity, exploration, and discovery, but many of you may have written it off as being way too complicated to even consider for your next project. This book is for you! It’s all about learning what amazing, easy, and affordable projects you can construct with field programmable gate array (FPGA) technology. We will be doing this with hands-on experiments, in a fun and practical way.
This book is not a university textbook providing in-depth studies on hardware description languages (HDLs), HDL coding techniques, digital logic design theory, ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more. | {
"pile_set_name": "Pile-CC"
} |
WASHINGTON, D.C. - Like many artists, Corrina Mehiel sometimes harbored deep insecurities about the direction her art was taking her.
"I've spent a whole lot of time and energy in my life trying to understand and 'become' an artist - whatever that means," she wrote late last year.
But Mehiel, who grew up in central Pennsylvania, graduated from Penn State and later headed the Harrisburg nonprofit arts organization, Danzante, was always clear about the purpose of her art and the lofty goal she held for its power and potential.
"I ... continue to try to use my visual language to communicate ideas of healing and peace," the 34-year-old artist wrote, finding a clarity of purpose even as questions, doubts and second-guesses swirled around where exactly her journey would lead.
By all accounts, artist Corrina Mehiel's creative spirit had been stoked by her experiences in Washington, D.C. Then, Mehiel's gentle artist's journey inadvertently intersected with the path of a brutal killer, identified as 29-year-old El Hadji Toure. She never made it out of D.C. alive. Here, she is pictured creating her "Parking Meter Gardens" art project in Cincinnati in 2016, part of a life-long journey of engaging disadvantaged communities through art.
Most recently, Mehiel's quest to produce art with the power to heal brought her to the nation's capital. There, she joined the artist Mel Chin, serving as his program assistant at the Corcoran School of the Art & Design, where he was a visiting professor.
Their collaboration was precisely the kind of art Corrina Mehiel (pronounced Carina Meal) craved to create. It had Mehiel reaching out to engage children at D.C.'s city schools while rubbing elbows at high-powered exhibit openings with the likes of House Democratic Leader Nancy Pelosi and other political figures.
In the process, the art, dubbed the "Fundred" project, empowered children to "mint" their own form of currency to shed the light of change on the lead water crisis afflicting struggling cities such as Flint, Michigan.
The project perfectly exemplified the community engagement that once had Mehiel planting blooming flowers in the hollowed-out heads of old parking meters on an otherwise stark urban streetscape in Cincinnati.
By all accounts, Mehiel's two-month stint assisting Chin at the Corcoran was a smashing success. A final, celebratory dinner at the artist's residence on the evening of March 19 marked the end of this leg of Mehiel's artist's journey.
By Monday morning, March 20, Mehiel was busy lugging her belongings from a rented basement apartment on the 600 block of 14th Street on Capitol Hill and packing them into her Toyota Prius, parked on the quiet residential block's curb.
Mehiel was preparing to return to her family's home in Burnsville, N.C. The next phase of her artist's journey remained to be determined. But by all accounts, Mehiel's creative spirit had been stoked by her experiences in D.C.
Without doubt, big things awaited her.
Then, in a single, random instant, everything changed. Mehiel's gentle artist's journey intersected with the path of a brutal killer.
'It's really tragic'
Less than a block away, a man, later identified by police as 29-year-old El Hadji Alpha Madiou Toure, exited a municipal bus around 10 a.m. Monday, March 20.
Residential security cameras showed the tall, hooded figure walking down 14th Street, lingering among the well-kept row homes along the 600 block.
He crossed the street, then waited. Observed. Paced. Then he made his move.
Toure turned toward where Mehiel was packing her Prius.
The security camera footage didn't show what happened next, but authorities said Toure crept up on Mehiel, pushing her inside her basement apartment in broad daylight.
In the nearly four hours that followed, that home became a brutal torture chamber, according to court documents.
Toure took a "sharp object," those documents said, and proceeded to "torture" Mehiel, stabbing her repeatedly in the neck area while she was tied up. There were defensive stab wounds on one of her palms, as well.
Suspect El Hadji Toure, 29, has been arrested and charged with premeditated first-degree murder, accused of robbing, tying up, torturing and stabbing to death artist Corrina Mehiel, 24, as she was packing to leave Washington, D.C., on March 20, after having just completed her most recent art project in the nation's capital.
It's believed Toure tortured Mehiel to gain the pass code for her ATM card. By the early afternoon, he apparently had what he wanted.
Toure left Mehiel for dead inside the apartment and drove off in her Prius, according to court documents. Among his first stops was a convenience store ATM to test the stolen bank card and the pass code he so brutally procured.
It worked, to the tune of $400, according to court documents.
Within hours, Toure was at another convenience store ATM, that time withdrawing $500.
Over the course of the next week, Toure withdrew a total of more than $4,000 from Mehiel's bank account in a series of transactions ranging from $400 to $800 at various ATMs around the D.C. area. Those withdrawals proved to be major clues that eventually helped police catch him, according to court documents.
Meanwhile, Mehiel's body wasn't discovered until late Tuesday afternoon. Her parents, expecting her return to North Carolina, called 911 when Mehiel didn't show up and wouldn't answer her cellphone.
Something was wrong. But no one expected just how wrong. Not until police found her bloody remains in the back room of the basement apartment.
An autopsy showed Mehiel suffered major stab wounds to her neck. The worst of them pierced the carotid artery, the jugular, her voice box and her airway.
But there also were lighter puncture wounds on her neck, suggesting those were meant to torture her, court documents said.
Finally, her left lung, spleen, and her spinal cord all were punctured by deep stab wounds to her torso, according to the autopsy.
Neighbor Elizabeth Risley, who said she was gardening around the same time Mehiel was attacked just feet away, called Toure "a monster."
"We're used to break-ins of cars on the street and maybe a mugging," Risley tells a PennLive reporter. "But he was a monster. He loitered here a long time. He saw an opportunity. He bound her and stabbed her. He was in there a long time. He tortured her to get a few hundred dollars from her ATM. People are shocked. It's really tragic. I feel so sorry. My heart goes out to her family and friends and co-workers."
Watch as Risely recounts the shocking crime that has unsettled her Capitol Hill neighborhood:
Proud Feminist
Mehiel was a self-described proud feminist who used her teenage reading of Hillary Clinton's "It Takes a Village" as an early marker for her entire life. This evolved into her passionate pursuit of art with the power to engage and heal communities, particularly disadvantaged ones.
The bedrock beliefs that shaped so much of her artist's journey took a brutal beating throughout the tumultuous events of 2016. Mehiel was left reeling.
In a December, 2016, blog entry on her website, www.corrinamehiel.com, she questioned everything, including the very direction of her art and where it was taking her.
Here, she was dispirited over a series of police shootings of unarmed black males, as well as the terrorist shooting at a gay nightclub in Florida:
"So many tragedies (are) inflicted on the full spectrum of non-white males in my country. I have spent many days trying to understand this moment in our history. Feeling so proud of what we have all accomplished. Sobbing with the country at the death of the young, beautiful people in Orlando. Crying to my father after watching Philando Castile pass in real time in front of the whole world," Mehiel writes.
Then, there was the presidential election, which brought Donald Trump to power in D.C., not Mehiel's teen role model, Hillary Clinton:
"And through it all (I am) watching the women in my life spend the year in worried apprehension. Trying to be excited for the future, and all the while listening as others rallied around chants of hate and fear toward people of color, people of other religions, people of the lesser sex, people who don't check one gender box," she writes.
And while these events caused Mehiel to question her artist's journey, there was never a thought of backing down or turning away:
"Even in this sub-category of who I am -- an "artist" -- I am aware of what it is to be "woman" and what our role has been. To be an object. To be either an object of beauty or a "nasty woman." I thought back to my graduate school work and the mentors who helped me find a voice that I'm still looking to understand... I'm certain my work will have new meaning to me forever."
As the artist Mel Chin said in wake of her killing: "Corrina was a feminist. She wanted to end violence against women."
Only now, her story has become the most cautionary of tales.
Closing in
El Hadji Toure, known in D.C. circles as Elie Brown, left plenty of bread crumbs for pursuing police. Yet a full week after Mehiel's brutal killing, he remained at large and deadly dangerous.
From the very start of the manhunt, police tracked the continuing series of withdrawals using Mehiel's ATM card. This led to a trove of security footage showing the same suspect who was caught on tape on Mehiel's block before and after her killing.
Soon, Toure's face was leading newscasts all across metropolitan Washington. Police also were tracking Mehiel's stolen Toyota Prius, along with a mass transit card that Toure allegedly purchased with her bank card.
Police were able to turn the many images of their suspect, along with other evidence, into a name and a rap sheet. The suspect was quickly identified as Toure, who had an address in Laurel, Maryland. He was also a wanted fugitive in Tennessee, where he allegedly violated probation on a robbery conviction.
The combination of Toure's continuing ATM withdrawals, along with his movements using the transit card, allowed police to draw ever closer to their suspect. Yet, maddeningly, they remained a step behind.
Finally, a parking ticket turned up Mehiel's Prius on Thursday, March 23. Police believed they finally had their break. They staked out the car, but Toure never returned to it. Police just couldn't seem to catch him - even as he continued to move freely around the D.C. area, as if taunting them.
Then early on Monday, March 27, an informant, perhaps spurred by a $25,000 reward in the case, phoned D.C. detectives.
The informant had been in touch with Toure and shared many details about him, all contained in court documents:
Toure knew "he's hot," the informant said. So much so, Toure complained about the near-constant newscasts featuring his image. At one point, Toure even watched a newscast about the case on his phone, then asked the informant, "Does that really look like me?"
Already, Toure said he was down to $400, from the $4,000 he allegedly withdrew. He told the informant he "needs to make a move." Toure knew he couldn't return to his job. He was MIA there all week.
Finally, Toure told the informant that while he intended to rob Mehiel, he never meant to kill her -- but did admit stabbing her, according to court documents.
Yet the big break in the case came when the informant told detectives about the Ford Taurus that Toure was now driving. The car was bought for $1,000 on Friday, March 24, with cash likely siphoned from Mehiel's bank account.
The recent car purchase was why Toure never returned again to his victim's Toyota while it was being watched by police. This move of switching vehicles might have kept Toure on the run indefinitely. But the informant's case-clinching tip included the car's Maryland plates, along with the last location Toure was seen in it -- the 1700 block of Hamlin Street in the city.
D.C. police stopped the suspect's vehicle sometime before 7 a.m. Monday, March 27.
Toure was behind the wheel.
By Tuesday, he was arraigned in District of Columbia Superior Court on a charge of premeditated first-degree murder in Mehiel's killing.
An unfinished life
Mehiel's artist's journey wasn't supposed to end that way. Not days short of her 35th birthday. And certainly not in such an ugly, violent manner.
Her life's work was to bring color and beauty to stark urban landscapes, such as the streets where she planted flowers in old parking meter heads or in inner-city Harrisburg working with Danzante from 2008 to 2010.
At its best, her art was an outstretched hand to downtrodden communities and the often-invisible, forgotten people populating them.
In her eyes, art held the power to change those things. Her strength was embodying that belief on a daily basis, even when she didn't know where her journey would ultimately lead.
Corrina Mehiel's artist's journey wasn't supposed to end this way. Not days short of her 35th birthday. And certainly not in such an ugly, violent manner. Her life's work was to bring color and beauty to stark urban landscapes. Ironically, those who Corrina sought to help most likely would have included her accused killer.
As her obituary states:
"She was a balance of force and beauty. She lived her life fearlessly. Even as a child, she was artistic and creative, taking the ordinary and making it extraordinary. She was thoughtful and provocative; using art to bring awareness to the rights of women and minorities and to the injustices of the world. She was compassionate and friendly, making friends through experiences all over the world."
Her most recent collaborator, the artist Mel Chin, praised the beautiful contradictions that defines both Mehiel - and all great art:
"It is hard to be smart and sensitive at the same time. Corrina was," Chin, who declined an interview request from PennLive.com, said in a written statement.
"She was intellectually powerful, physically strong and capable of taking on any challenge," he added. "She raised the quality of the collective experience. As an artist, she couldn't hold back. She would leap to help someone in need."
Ironically, those who Mehiel sought to help most likely would have included her accused killer.
"She would be the first to point out that victims of violence in D.C. are disproportionately people of color," Chin said in his statement. "She was committed to fairness and justice, and always fought for the rights of others."
Most of all, Mehiel was still seeking to unlock all those hidden secrets of what it meant to be both a woman and an artist.
From her blog:
"To be a woman, for the first part of my life, meant to be human," she wrote late last year. "I loved being a girl! I loved all things soft and hugs and daydreaming about being a mom. I looked up to the women in my life. I loved how the women I was around were caring and nurturing. My Mom spent a lot of time talking to me about my worth, how to find a path toward loving myself, loving others, and being loved... Take from it what you will."
All that's left now is the art she gave to the world. Captured within it is nothing less than her spirit, one Mehiel was still working to understand and share.
That can never be taken away.
"To the person who did this to her: You are too late. You failed," the artist Chin defiantly concluded in his written statement.
"Corrina Mehiel has already liberated and emboldened so many people to fight for their beliefs. Her spirit will continue," he said.
And so it does, like a lone flower blooming on a hardscrabble city street. | {
"pile_set_name": "OpenWebText2"
} |
2020 Polaris Ranger 1000 EPS
$13,999
Request More Information
Request Information
Calculate Payment
Price
$
Down Payment
$
Interest Rate
%
Loan Term
Estimated Monthly Payment
$
Your down payment cannot be greater than the price.
This is not an offer for credit and should be used for estimation purposes only based on the information you provided. You should not base your decision on this estimate alone. Title, registration, tax and other fees, and personal circumstances such as employment status and personal credit history, were not considered in the calculations.
Schedule a Test Ride
2020 Polaris Ranger 1000 EPS •
$13,999
Condition
New
Category
Utility Vehicles
Model Type
Ranger: 3-Seat
Model Code
R20TAE99B7
Color
Solar Red
ULTIMATE COMBINATION OF PRICE & PERFORMANCE
We took the best-selling RANGER of all time, the RANGER XP 900, and gave it the capability to haul more, tow more and last longer while delivering more comfort, more convenience and more value for your hard-earned dollar.
Features
Specs
Options
Photos
Promotions
Features
ENGINEERED FOR WORK: Our legendary hardest working, smoothest riding promise beats on in the heart of the RANGER 1000. Smoother low-speed drivability and increased agility combine for a perfect balance of big-work capability and ultra-smooth precision.
DESIGNED FOR COMFORT: The refined cab has been redesigned with rider-centric plush seating for all-day comfort and innovative storage solutions for your gear and tools. Industry-leading 18.6 gallons of in-cab storage, 25% Thicker seats*, 5 in. more room for easy entry and exit, driver and passenger under seat storage and Up to 8 cup holders.
BUILT TO LAST: The more robust one-piece chassis, full-body skid plate and large front bumper provide the protection needed for taking on tough terrain. The enhanced protection and increased ease of maintenance make the all RANGER 1000 built to last. 25% more rigid one-piece chassis*, 50% More Protection from skid plate and bumper*, Sealed Bushings and Bearings, Quick Release Grille for Easy Radiator Access and Easy-Access Air Filter. | {
"pile_set_name": "Pile-CC"
} |
1. Field of the Invention
The present invention relates to a glass bulb for a cathode ray tube having a two-dimensional matrix code comprised of a plurality of dots in a predetermined portion of an outer side surface of the glass bulb, a method for producing such glass bulb and a method for producing a cathode ray tube using such glass bulb.
2. Discussion of the Background
There has been known a technique that information on the glass bulb or information on operating conditions (including information on the particulars of operations) is directly written as marked characters or a code in an outer side surface of a glass bulb for a cathode ray tube (hereinbelow, referred to as a glass bulb), and manufacturing steps for the glass bulb are controlled based on the information read. Generally, the writing of such information in the outer side surface of the glass bulb is conducted by directly printing a heat-resistant material or attaching a heat-resistant label, or marking by sand-blasting or laser.
For example, JP-A-2-87442 proposes a method for controlling manufacturing procedure wherein a bar code is marked by using a CO2 gas laser masking method and the bar code is read whereby a mistake in combining parts of a cathode ray tube, which may take place in manufacturing, can be prevented. Further, such a technique that the particulars of a product manufactured can be obtained from characters marked by laser is also known from JP-U-63-20251.
However, the conventional techniques using printing or laser masking to write the characters or the code had a problem that all required information had to be separately given to individual products. For example, in the laser masking method, since laser beams had to be passed through a mask to write information, it was impossible to change the particulars of information without changing the mask. Accordingly, it was difficult to write information for a relatively short time for a large quantity of glass bulbs conveyed during manufacturing steps.
In the conventional technique, there was a quantitative restriction on information to be written in by means of characters and a bar code. Accordingly, information inherent to the glass bulb such as the kind (size), the transmittance of the glass bulb, application or non-application to an anti-reflection treatment, a manufacture line used and so on and information on operating conditions have been given to a large number of products which were grouped for controlling in mass production. That is, the conventional techniques are inappropriate as an information means to identify a large number of glass bulbs.
Heretofore, conventional characters or a bar code marked by laser on the outer side surface of glass bulbs by a glass bulb manufacturer are insufficient for a cathode ray tube manufacturer to utilize the information written by the glass bulb manufacturer. Accordingly, the cathode ray tube manufacturer has written its own information by means of characters or a bar code so that manufacturing steps can be controlled. That is, glass bulb manufacturers and cathode ray tube manufacturers have not used common characters or a bar code.
There has been known a general technique of using a laser to mark characters or bar codes on glass products. However, there has not been proposed such a technique that characters or the like including a large amount of information which can identify individually glass bulbs are marked on the surface of a glass product such as a glass bulb which is transparent, does not have a flat surface and has a mat-surface-like fine recesses and projections, and the information marked therein can be read by means of a pick-up device.
Further, in the steps of producing panels and funnels in the glass bulb manufacturers, there are a variety of combinations among a processing line, a mold, a forming machine, a hot processing machine and so on. Accordingly, if a trouble or a defective product takes place in a step of producing, it takes much time to trace the cause, and on the other hand, an appropriate way of resolution has not been proposed.
Further, there is a problem in manufacturing steps for the glass bulb such that, for example, it is difficult to supply products manufactured by the same mold or the same machine in a forming or hot processing step, in the intentionally optimum combination, to the next polishing step at which there are a large number of lines for polishing. This difficulty is applicable also to cathode ray tube manufacturers.
In short, due to restrictions to an amount of information to be written in and difficulty in writing the characters and so on for glass bulbs, there is a limit in using the characters or codes in manufacturing steps in each of the glass bulb manufacturers and cathode ray tube manufacturers. Thus, there has not been known a method for producing a glass bulb or a cathode ray tube wherein marked characters or codes can be used commonly for both manufacturers, to make it is unnecessary for the cathode ray tube manufacturer to use its own characters or codes.
On the other hand, there has recently been an increased spread of using bar codes and needs for coding a greater amount of information and putting information in a smaller space. In response to this, a two-dimensional matrix code has been known. The two-dimensional matrix code is a code system wherein information is written in both directions of longitudinal and lateral, i.e., two-dimensional directions. However, the application of the two-dimensional matrix code, in particular, a two-dimensional matrix code comprised of a plurality of dots, to a glass bulb has not been studied. Further, a technique of identifying glass bulbs by using the two-dimensional matrix code comprised of a plurality of dots, and a technique of controlling manufacturing steps for glass bulbs or cathode ray tubes based on the information of the two-dimensional matrix code marked in the glass bulbs, have not been known.
It is an object of the present invention to provide a glass bulb wherein a two-dimensional matrix code comprised of a plurality of dots which is usable commonly for a glass bulb manufacturer and a cathode ray tube manufacturer is marked in a predetermined portion of an outer side surface of the glass bulb and which is capable of writing information capable of identifying individually glass bulbs, and a method for producing a glass bulb or a cathode ray tube, wherein manufacturing steps are controlled by using the two-dimensional matrix code.
In accordance with the present invention, there is provided a glass bulb for a cathode ray tube which has an outer side surface in which a two-dimensional matrix code comprised of a plurality of dots marked by laser is formed, wherein each dot has a recess having a depth of 5-100 xcexcm and a diameter of 50-400 xcexcm.
Further, in accordance with the present invention, there is provided a method for producing a glass bulb for a cathode ray tube which comprises a step of marking by laser a two-dimensional matrix code comprised of a plurality of dots in an outer side surface of a glass bulb, which is in a state of being heated at 200-500xc2x0 C. after having been formed, a step of reading information contained in the two-dimensional matrix code, and a step of controlling processing operations after the forming of the glass bulb based on the read information, wherein the two-dimensional matrix code includes at least the information which can identify individually glass bulbs for cathode ray tubes.
Further, in accordance with the present invention, there is provided a method for producing a cathode ray tube which comprises a step of identifying a glass bulb for a cathode ray tube by reading a two-dimensional matrix code comprised of a plurality of dots formed in an outer side surface of the glass bulb, a step of determining by a control device at least desirable operating conditions for the identified glass bulb in response to the information inherent to the identified glass bulb, a step of reading sequentially the two-dimensional matrix code in manufacturing steps to extract information for desirable operating conditions determined for the glass bulb from the control device, and a step of conducting operations instructed by the control device, wherein the two-dimensional matrix code includes at least the information which can identify individually glass bulbs for cathode ray tubes, and a part or all of the manufacturing steps are controlled on the basis of the information. | {
"pile_set_name": "USPTO Backgrounds"
} |
As regulations change and social pressures grow, it has become necessary to increase the efficiency of and lower NOx emissions from gas turbines.
One way to improve gas turbine efficiency is by increasing turbine inlet temperature. However, increasing combustion temperature can cause an increase in the amount of NOx emissions.
Japanese Patent Publication No. 2005-106305 publication shows a fuel combustion nozzle including a fuel nozzle to supply fuel to a chamber, and an oxidizer nozzle to supply an oxidizer to the chamber disposed downstream from the fuel nozzle where a fuel hole of the fuel nozzle and a oxidizer nozzle of the oxidizer nozzle are on the same axis. JP2005-106305 also shows a plate including the oxidizer nozzle where an outer peripheral portion is configured to be thicker than an inner peripheral portion in order to be able to initiate re-ignition when the flame generated from the coaxial jet of fuel and air blow off (see FIG. 1 of JP2005-106305). | {
"pile_set_name": "USPTO Backgrounds"
} |
Updated March 2020 to include iOS13 screenshots of App Store Reviews and Ratings
An App’s visibility on the Apple App Store is enhanced by its ratings and reviews. We’ve received many great ratings and reviews for our JoSara MeDia apps that are in the Apple App Store. And the steps to provide App Store reviews and ratings have changed slightly between the current iOS10, iOS11 (which was in preview with this article was initially written) and iOS13.
What some users are not aware of is that the rating visibility of an App is reset with each new version. Even a minor change to an app will cause the ratings to reset. For example, we made a minor change to our Grand Canyon app to make the videos fit better when the iPhone 7 and 7+ were released. Even though the Grand Canyon app has only five star ratings (13 at last count) those ratings are not visible on the new version unless a user explicitly selects to look for reviews and ratings for “All Versions.”
There are several ways to ensure re-ratings, such as in-app pop-ups (Update: this will change with iOS11 and beyond as Apple will require developers to use its own in-app rating API, which will limit the number of times a user is prompted). But users can also go into the App Store from their iPhone or iPad and easily rate apps.
The main differences between App Store reviews and ratings in iOS10 and the iOS11 preview are:
the app developer will be given a method (most likely in iTuneConnect) to select whether they would like ratings to carry across updates (hat tip to Reddit user emlombardo for pointing this out)
to rate an app on iOS11 can be done from the app’s page in the app store without going into the “Write a Review” section. This should provide for more ratings, albeit without reviews.
The main difference with reviews and ratings in iOS13 (besides some minor word changes) is…NIGHT MODE! (which is obvious in the screenshots).
Here are the steps. Screenshots are below.
Tap on the App Store Icon Tap in Search Type in “josara” to search for JoSara MeDia apps (or any other app name or app developer if you want to rate their apps) Scroll to the app you want to rate and tap on that apps name For iOS 10 and earlier versions: tap on the “Reviews” tab (between “Details” and “Related) tap on “Write a Review” tap on a star rating (5 stars is best, 1 star is worst) if you like, enter a title and a review of the app For iOS 11 (as of the current beta) through to iOS13 scroll down to the “Ratings and Reviews” section tap on a star rating if you like tap on “Write a Review”
Click on the screenshots for App Store reviews and ratings in the table below to see larger versions.
iOS10 and earlier iOS11 iOS13 Locate App Store Locate Search icon Enter Search Terms View Search Results Select App to Rate and/or Review For iOS10, tap on "Reviews" header.
For iOS13 through iOS11 , scroll down to "Reviews" section For iOS 10, tap on the "All Versions" tab to see ratings and reviews for all versions.
For iOS11, as of the preview release, I can find no such option
For iOS13, tap on "See All" To Rate an App:
For iOS 10, tap on "Write a Review." Star ratings are inside the "Write a Review" section. Tap a star, then tap send. Reviews are optional.
For iOS11 through iOS13, simply tap on the star rating. To Review an App, tap on the "Write a Review" label in both versions
Spread the Word:
Tweet
Email
Telegram
WhatsApp
| {
"pile_set_name": "OpenWebText2"
} |
Muni Jobs Training Failed for Many of the Temporary Workers
There were graduation speakers, food (paid for by the graduates) and in some cases family, but instead of celebrating the passage from trainee to skilled worker, the graduates of Muni’s Entry-Level Training Program recalled a year-long jobs program that offered little training and in some cases paid workers to sit on a bus or look for other work, according to several of the graduates.
Cake on graduation day.
“We were told we needed to stay out of the way,” said Michael Perry, a maintenance trainee. “We asked why this was happening, but didn’t get any answers.”
Paul Rose, spokesman for the San Francisco Municipal Transportation Authority, which operates Muni, acknowledged that Muni had only moderate success with the program.
The Services Employees International Union 1021, which represents Muni workers, did not want temporary workers doing union jobs, Rose said. Some of the temporary workers, he added, were reassigned and restricted to answering phones and hand-washing the bus platforms.
Union spokesman Steve Stallone said that the situation last year was different. In previous years, the union worked with Muni to hire people from the community for similar training programs. “This time they brought on many more people at the same time as they were doing layoffs,” Stallone said. “They were bringing people to do the work while union contract workers were being told that there were budget problems.”
Whatever the reason, trainees say they were caught in the middle.
The Muni program was one of many jobs programs paid for by California’s $1.8 billion share of the federal jobs stimulus money and organized under a national program known as Jobs Now. The city’s share of $25 million paid for one year of employment for 1,300 city and 3,000 private-sector positions.
The final paycheck.
The Muni program represented only 65 of those positions, but the experience of the 52 workers who completed it underscores the difficulties even a long-standing training program can run into when temporary workers are hired in the midst of layoffs. The Muni Entry Level Training Program has been in existence for nine years.
Most of the troubles, the temporary workers said, occurred at Muni’s Woods Division, a bus barn located on Indiana Street where 40 of the temporary workers were assigned — 34 as maintenance trainees and six as receptionists.
Perry said the training that ran from September 2009 to September 2010 began to lose steam in November, two months after it started. The change, he and others said, came when budget cuts forced Muni layoffs.
“The Muni employees felt that we were taking over their jobs,” said Perry, who cleaned buses at Woods until managers of the Muni training program moved him to a custodial position at Arriba Juntos in March. “But we were only brought on as a part of the training program. The jobs would have been lost anyway.”
As the relationship between the Jobs Now workers at the Woods Division and the Muni employees became increasingly hostile, trainees could no longer work on the vehicles and were asked by supervisors to move off Muni property and pick up garbage along the perimeter of the bus barn, according to Perry and five other graduates. All 33 maintenance trainees assigned to the Woods Division were relegated to the perimeter of the bus barn, they said.
Allowed inside the yard only to get cleaning equipment, they began picking up garbage on the sidewalk along the Woods perimeter at 8 a.m. and finished after a few hours.
Unable to do any work inside the yard, many, like Perry, spent the remaining time in their cars catching up with reading — or left to search for employment elsewhere.
Others said that Muni supervisors told them to sit on an empty bus — at times for nearly eight hours.
Maintenance trainees were not just sitting on the bus for eight hours, Rose said, but maintaining and cleaning the bus. “According to our personnel at site, at no point were people not allowed on the campus. They were working in the bus yard.”
But several workers offered a different version. “The equipment closets were locked. We were told to sit on the bus and stay out of the way,” one said.
When told that none of the workers supported his version of events, Rose said he didn’t know why they disagreed.
Receptionists Also Complained
The Muni temporary program also hired a total of 19 receptionists, including six at the Woods Division. They too said the Muni jobs proved difficult. “Working for Muni hasn’t been the best. Our services were utilized but we were not well-treated,” said Carla Guadamuz, a Cal Works recipient who until the training program had been raising three children on food stamps and welfare.
Guadamuz and others said that after the Muni layoffs in November, their workloads increased substantially and they were often doing work they had not been trained to do. “I was hired as a receptionist but my work was secretarial,” Guadamuz said. “I’m leaving with the same skills I came in with. In fact, when I was at Flynn [another Muni bus division on Harrison Street], I was made to train a person that came after me.”
Carmen Becerra, an office assistant in Muni’s accounts division at One South Van Ness, agreed that the temporary workers did not always have the training to do their assigned work. However, she relished the job.
“I’m so glad for this program,” Becerra said, adding that she was able to go to City College for 10 hours a week.
Most trainees said they expected to get on-the-job training and certificates attesting to that training. But the 34 temporary maintenance workers unable to go onto Muni property at the Woods Division after January said they failed to receive the automotive service and Class B training for a commercial license to drive buses and larger vehicles that carry more than 16 passengers.
Rose said Muni could not provide such training to temporary workers because the agency believed it to be a violation of union rules.
Some trainees did manage to get the certificates because Muni volunteer Iola Brown — a former trainee later hired by Muni — offered to provide training to those willing to do it off Muni property.
Complaints
Workers first complained to Arriba Juntos, a nonprofit job center in the Mission District where the managers of the Muni training program had a desk. The overall program was run by the city’s Human Services Agency.
When complaints were sent to that agency, Pamela Tebo, an executive assistant to Trent Rhorer, the executive director, said the agency only handled complaints that Muni had about the temporary workers. When temporary workers complained, she directed them to Muni’s employment offices. Once there, workers such as Guadamuz were told to file a complaint with Muni’s Equal Opportunity Office.
Guadamuz said she decided against taking that step because she feared it would impact her position.
A few workers were moved to Arriba Juntos in March, and the Human Services Agency told others to take three days a week off to search for other jobs.
From May to August, the employees said, they received a list of openings with job descriptions and pay scales. But these too were voucher jobs funded by Jobs Now, and scheduled to end on September 30.
Muni Training Program was Nine Years Old
Although this was the first year that federal funds paid for it, Muni’s training program has existed for nine years, funded first by Muni and then by the San Francisco Human Services Agency.
In the past, 45 candidates were trained for six months, after which Muni selected 15 to stay on for another six months.
Any of the 45 candidates who completed six months could apply for permanent jobs with Muni, usually in maintenance. It’s not clear how many of the program’s graduates have been hired permanently by Muni.
None of the employees hired by Muni this year became permanent. When Jobs Now ended in September, Mayor Gavin Newsom unveiled a $9 million plan to save at least half of the 3,000 private-sector jobs funded by the program.
For now, the 1,300 city workers paid for by Jobs Now funds, including the Muni trainees, move back to the unemployment line.
Union scumbags? Give me a break. As the reporter says, these problems don’t exist when the City isn’t laying off MUNI workers. It is unimaginable that these “temporary workers” were not slated to at least take up some of the slack produced by the layoffs. And no, the union does not have to sacrifice for the public good. The union exists to fight for its members – “fight” being the operative word, especially in a time of severe economic retrenchment and restructuring. For years MUNI workers (drivers in particular) have been scapegoated for the City’s incompetence and corruption. The hysteria has only mounted since 2008. “Jobs Now” like much of the stimulus was never meant to be more than a temporary band-aid. The legacy of the stimulus is already greater public cynicism and resignation. Before beating up on the victims (including MUNI riders)we would all do well to take a deep breath and recall the words of the great Willie Sutton, who when asked why he robbed banks, responded famously “Because that’s where the money is.”
okay.. suree work for the public and dont make sacrifices for the public good… that’ll leave a great feeling with the public.. (which is the very reason why you have a job in the first place) but that aside, there is something said when workers are uncooperative and demeaning towards others. The union sure doesn’t like to do well with their PR. And they wonder why everyone is against them…
Its unfortunate how MUNI has behaved. Many of their employees give unions a bad name. That is also unfortunate. If you think unions are bad, you should look at factory and blue collar working conditions before unionization. They were horrible. Factory safety was non existent. Most workers lived far below the poverty level. This is why it is important to study history. It helps to understand where we came from and how far we have come. | {
"pile_set_name": "Pile-CC"
} |
Q:
Powering two 8-Ohm speakers in parallel with a 4-Ohm per channel audio amplifier
Are there any possible problems powering two 8-Ohm speakers in parallel with an audio amplifier designed to drive 4-Ohm per channel? (Both the speakers and amplifier are generic, and the speakers are identical). The amplifier's power rating is greater than the sum of the speakers, and would not be pushed beyond the combined power rating of the speakers. I can't think of any reason for there to be any drop in audio quality, or for there to be any other issues, but I just wanted to do a sanity check by asking.
Thanks
A:
Parallelling identical 8 Ohm speakers to get a 4 Ohm load (and the opposite: putting 4 Ohms speakers in series to get an 8 Ohm load) is normal practice.
"The amplifier's power rating is greater than the sum of the speakers" - That can get problematic: at full power the speakers might be damaged. You want the speakers (combined) rated power to be at least the maximum power produced by the amplifier.
| {
"pile_set_name": "StackExchange"
} |
Q:
How to prevent auto-closing of console after the execution of batch file
What command can I put at the end of a batch file to prevent auto-closing of the console after the execution of the file?
A:
In Windows/DOS batch files:
pause
This prints a nice "Press any key to continue . . . " message
Or, if you don't want the "Press any key to continue . . ." message, do this instead:
pause >nul
A:
Depends on the exact question!
Normally pause does the job within a .bat file.
If you want cmd.exe not to close to be able to remain typing, use cmd /k command at the end of the file.
A:
If you want cmd.exe to not close, and able to continue to type, use cmd /k
Just felt the need to clarify what /k does (from windows website):
/k : Carries out the command specified by string and continues.
So cmd /k without follow up command at the end of bat file will just keep cmd.exe window open for further use.
On the other hand pause at the end of a batch file will simply pause the process and terminate cmd.exe on first button press
| {
"pile_set_name": "StackExchange"
} |
Introduction {#sec1-0300060517718771}
============
Infertility is an important health problem with a multifactorial etiology that affects approximately 15% of couples who attempt pregnancy.^[@bibr1-0300060517718771]^ Its cause in approximately 50% of infertile couples is male factors, which may exist either alone or in combination with female factors.^[@bibr2-0300060517718771]^ Spermatogenesis is an extremely complex cell differentiation process involving 2,300 genes that regulate germ cell development and maturation.^[@bibr3-0300060517718771]^ The prevalence of numerical and structural chromosomal abnormalities in the infertile population ranges from 2%--10%,^[@bibr4-0300060517718771],[@bibr5-0300060517718771]^ with 8% reported in severe oligospermia (SOS) cases^[@bibr6-0300060517718771]^ and up to 20% in non-obstructive azoospermia (NOA);^[@bibr7-0300060517718771]^ many other genetic abnormalities causing infertility remain unknown.
Molecular defects and genetic alterations associated with infertility have negative effects on hormonal homeostasis, spermatogenesis, and sperm quality.^[@bibr8-0300060517718771][@bibr9-0300060517718771]--[@bibr10-0300060517718771]^ Among the various chromosomal defects detected in severely infertile males, structural aberrations of the autosomes, such as the Robertsonian translocation, balanced translocations, and inversions, are found in some SOS cases, while microdeletions on AZF regions of the Y chromosome and aneuploidies of sex chromosomes such as 47,XXY (i.e., Klinefelter syndrome, KS) account for 1%--3% in NOA cases.^[@bibr11-0300060517718771][@bibr12-0300060517718771]--[@bibr13-0300060517718771]^
Infertile males with SOS and NOA can have offspring with the help of assisted reproduction techniques (ART), particularly intracytoplasmic sperm injection (ICSI). However, the risks of passing genetic aberrations to their descendants are increased.
The main purpose of this multicenter study was to evaluate the frequency and types of major chromosomal abnormalities of SOS and NOA, and to highlight the urgent need for genetic counseling and testing prior to ART treatments.
Materials and methods {#sec2-0300060517718771}
=====================
Patients {#sec3-0300060517718771}
--------
From January 2011 to December 2015, 912 infertile men, including 378 with SOS and 534 with NOA, from reproductive medical centers in the International Peace Maternity and Child Health Hospital, the Shanghai Ji Ai Genetic and IVF Institute and Center for Reproductive Medicine, and the Ren Ji Hospital were prospectively enrolled in this study. A total of 215 male volunteers (aged 22--45 years) with normozoospermia from the Shanghai Human Sperm Bank who already have offspring were recruited as controls. Informed consent was obtained from all individual participants included in the study. All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional research and ethic committee of Shanghai Jiaotong University.
SOS was defined as a sperm cell count ≤5 × 10^6^/ml. NOA was first established on the basis of at least three semen evaluations performed on separate occasions, when the seminal specimen after centrifugation showed no sperm under the microscope and was then diagnosed according to several clinical parameters. The investigation included a medical history, a physical examination including a thorough evaluation of the scrotum and testes, and laboratory tests, and imaging in some cases. The history was based on general health, sexual health, past fertility, libido, and sexual activity. Past exposure to a number of agents, including medical agents such as hormone/steroid therapy, antibiotics, 5-ASA inhibitors (sulfasalazine), alpha-blockers, 5 alpha-reductase inhibitors, chemotherapeutic agents, pesticides, and recreational drugs (marijuana, excessive alcohol), as well as heat exposure of the testes, was queried. A history of surgical procedures of the genital system was also elicited. The family history was assessed to identify genetic abnormalities. Additionally, elevated serum follicle-stimulating hormone, testicular volume, and histopathology of testicular biopsy or testicular sperm aspiration, if available, were taken into consideration. All patients underwent an andrological work-up, including physical examination, two semen analyses, hormonal analysis, testicular ultrasonography, karyotyping, and Y chromosome microdeletion screening. Other possible causes of spermatogenic failure, such as abnormal endocrinology, varicocele, cryptorchidism, and seminal duct obstruction, were excluded. Semen samples were obtained after a 3- to 7-day period of ejaculatory abstinence, and semen analysis was performed according to 2010 World Health Organization (WHO) guidelines,^[@bibr14-0300060517718771]^ based on the parameters of semen volume, sperm count, sperm motility, and sperm morphology. WHO regards 1.5 ml as the lower semen volume reference limit and \>15 × 10^6^/ml sperm as a normal sperm count. Sperm with progressive motility and non-linear motility should be over 32%, and ≥4% of observed sperm should have a normal morphology.
Cytogenetic analysis and fluorescence in situ hybridization {#sec4-0300060517718771}
-----------------------------------------------------------
Karyotyping was performed using standard G-banding. A total of 20 GTG-banded metaphases with a minimum resolution of 550 bands per haploid set were analyzed in each case. Chromosomal abnormalities were reported according to the current international standard nomenclature.^[@bibr15-0300060517718771]^
PCR analysis of microdeletions in the AZF region of the Y chromosome {#sec5-0300060517718771}
--------------------------------------------------------------------
Genomic DNA was extracted from whole blood using a Blood Genomic DNA Mini Kit (CoWin Biosciences, Co., Ltd, Beijing, China) according to the manufacturer's instructions. The DNA concentration and purity were measured using the BioPhotometer Plus (Eppendorf, Hamburg, Germany). The following six sequence tagged sites were analyzed using a Y chromosome deletion detection kit (Shanghai Tellgen Corporation Co., Ltd., Shanghai, China): sY84 and sY86 (AZFa), sY127 and sY134 (AZFb), and sY254 and sY255 (AZFc). The SRY (sY14) gene and ZFX/Y gene (located on both X and Y chromosomes) were used as internal controls. Two multiplex PCRs were performed for each sample using the ABI 7500 Real-Time PCR System (Life Technologies, Gaithersburg, MD, USA), with the following program: 2 min at 50℃, 5 min at 95℃, and 38 cycles of 15 s at 95℃, 30 s at 60℃, and 30 s at 72℃. Fertile male samples, female samples, and deionized water were used as positive, negative, and blank controls, respectively. A positive amplification result on the real-time instrument FAM(Control)/VIC(AZFa)/ROX(AZFb)/Cy5(AZFc) channel generated a Ct value (Ct \< 32) and a typical S-shaped amplification curve. A negative amplification result generated no Ct value or amplification curve.
Statistical analyses {#sec6-0300060517718771}
--------------------
Statistical analyses were performed using SPSS 16.0 software (Chicago, IL, USA). Differences in group frequencies were assessed by the χ^2^-test, and significance was declared at P ≤ 0.05.
Results {#sec7-0300060517718771}
=======
Cytogenetic evaluation {#sec8-0300060517718771}
----------------------
The mean ages of each group (± SD) were 33.1 ± 12.9 years (NOA group), 35.2 ± 14.7 years (SOS group), and 30.8 ± 9.6 years (control group); these values did not differ statistically. The mean sperm count was 2.1 ± 1.7 × 10^6^/ml (range, 0.1--5 × 10^6^/ml) in the SOS group, and the mean motility was also reduced to 10.3 ± 6.5% (range, 2%--32%). In the control group, the mean sperm count was 41 ± 23 × 10^6^/ml (range, 15--105 × 10^6^/ml), and the mean motility was 45 ± 13% (range, 32%--62%).
Karyotyping showed that a total of 22.6% (206/912) of severely infertile patients had genetic abnormalities, including 27.3% (146/534) of NOA patients and 15.9% (60/378) of SOS patients, while 1.9% (4/215) of chromosomal abnormalities were detected in the control group. Characteristics of the patient's chromosomal abnormalities are summarized in [Table 1](#table1-0300060517718771){ref-type="table"}. In the NOA group, 94.5% (138/146) of genetic abnormalities were sex chromosomal abnormalities and Y chromosome deletions. Sex chromosomal abnormalities accounted for 25.8% (138/534) of all abnormal karyotypes, of which approximately 6.7% (36/534) were represented by a 47,XXY karyotype, and 1.3% (7/534) bore 47, XXY/46,XY or other types of mosaic. Approximately 17.8% (95/534) of NOA cases showed various categories of Y chromosome deletions. The remaining 1.5% (8/534) of NOA men had autosomal abnormalities, including six chromosomal translocations and two chromosomal inversions. Table 1.Genetic abnormalities in non-obstructive azoospermia, severe oligozoospermia, and control groups.Genetic abnormalitiesNon-obstructive azoospermia, n (%)Severe oligozoospermia, n (%)Controls, n (%)**Abnormal sex chromosome43/534 (8)**\***4/378 (1)**\***0 (0)**\*47,XXY36/534 (6.7)1/378 (0.26)0 (0)46,XY/ 47,XXY7/534 (1.3)3/378 (0.79)0 (0)**YqAZF microdeletion95/534 (17.8)**\*\***50/378 (13.2)**\*\***0 (0)**\*\***Abnormal autosome8/534 (1.5)**\*\*\***6/378 (1.5)**\*\*\***4/215 (1.9)**\*\*\*Balanced translocation6/534 (1.1)4/378 (1)1/215 (0.46)Pericentric inversion2/534 (0.4)2/378 (0.5)3/215 (1.4)**Total146/534 (27.3)**\*\*\*\***60/378 (15.9)**\*\*\*\***4/215 (1.9)**\*\*\*\*[^2]
In the SOS group, 1.1% (4/378) showed 47, XXY/46, XY or mosaic, which is significantly lower than that of NOA men (8%, 43/534, P = 0.002), and 13.2% (50/378) had Y chromosome deletions. The other 1.6% (6/378) had autosomal abnormalities, including four cases of chromosomal translocations and two cases of chromosomal polymorphisms or inversions. No sex chromosomal abnormalities were detected in the control group. The eight abnormal control cases were all autosomal abnormalities, including six chromosomal inversions, and two chromosomal translocations.
Prevalence and type of Yq microdeletions {#sec9-0300060517718771}
----------------------------------------
NOA and SOS patients were analyzed for the incidence of Y chromosome deletions, which included AZFa, AZFb, AZFc, AZFab, AZFac, AZFbc, and AZFabc in this study. As shown in [Table 2](#table2-0300060517718771){ref-type="table"}, 15.9% (145/912) of severely infertile males presented with Y chromosome microdeletions. Table 2.Frequency of different YqAZF microdeletions in non-obstructive azoospermia, severe oligozoospermia, and control groups.AZF regionNon-obstructive azoospermia, n (%)Severe oligozoospermia, n (%)Controls, n (%)AZFa8 (8.4)2 (4)0 (0)AZFb6 (6.3)0 (0)0 (0)AZFc49 (51.6)48 (96)0 (0)AZFab1 (1)0 (0)0 (0)AZFbc21 (22.1)0 (0)0 (0)AZFac0 (0)0 (0)0 (0)AZFabc10 (10.5)0 (0)0 (0)Total95 (100)50 (100)0 (0)
In the NOA group, the prevalence was 17.8% (95/534), which is slightly higher than that of SOS males (13.2%, 50/378) although the difference was not significant. Deletion of AZFc was the most frequent Y chromosome deletion type in both groups; 9.2% (49/534) of NOA males and 12.3% (48/378) of patients with SOS had deletions in the AZFc region. Other deletion types, such as the deletion of AZFabc and AZFbc, were found in the NOA group but were not detected in the SOS group ([Table 2](#table2-0300060517718771){ref-type="table"}).
Discussion {#sec10-0300060517718771}
==========
Chromosomal anomalies are closely associated with male infertility. Several previous studies have reported their high prevalence in infertile males; for example, 11%--24% of patients with NOA and 2%--16% of patients with oligospermia^[@bibr16-0300060517718771][@bibr17-0300060517718771][@bibr18-0300060517718771]--[@bibr19-0300060517718771]^ have chromosomal anomalies. The reasons for discrepancies between studies might reflect the criteria used for patient selection or dissimilar compositions of the studied populations, such as the extent of spermatogenesis dysfunction. In the present study, 1.3% (8/603) of volunteers with normozoospermia had chromosomal abnormalities, while 15.9% (60/378) of patients with SOS and 27.3% (146/534) with NOA had abnormalities. All eight abnormal cases with normozoospermia were autosomal aberrations: six were balanced translocations, and two were pericentric inversions. Carriers of structural chromosomal abnormalities with normal phenotypes may nevertheless experience fertility problems. Therefore, patients with unexplained infertility with normal semen parameters should be referred for cytogenetic analysis because of their high chance of miscarriage and live birth of children with unbalanced karyotypes.
Of the 146 patients in the NOA group with chromosomal abnormalities, 5.5% (8/146) had pericentric inversions, and 94.5% (138/146) had gonosomal abnormalities, which is in line with other studies.^[@bibr20-0300060517718771]^ The combined incidence of structural aberrations in sex and autosomal chromosomes was higher for NOA than for SOS (27.3% vs 15.9%). In contrast to other published data, Y chromosomal terminal deletions accounted for most karyotypic abnormalities identified in our work. The frequency of AZF microdeletions was 17.7% (95/534) in NOA men, which is higher than the 13.2% frequency (50/378) observed in patients with SOS. These results are similar to the published frequencies of 0%--15% in NOA patients and 5%--10% in oligozoospermic patients.^[@bibr21-0300060517718771]^ Deletions of the different AZF regions occurred with different frequencies. We found that AZFc deletions were the most frequent in severely infertile males, representing 66.9% of all deletion categories, followed by deletions in ACFbc (14.5%), AZFabc (6.9%), ACFb (4.1%), AZFa (6.9%), and AZFab (0.7%) regions.
Molecular research into the Y chromosome has demonstrated that each AZF subregion acts during a different phase of spermatogenesis.^[@bibr22-0300060517718771]^ Therefore, complete deletion of the AZFa region results in Sertoli cell-only syndrome and azoospermia, while deletion of the AZFb region causes Sertoli cell-only syndrome or arrested spermatogenesis at the early spermatocyte stage, with phenotypic azoospermia. Deletions of the AZFc locus manifest in cases of moderate oligozoospermia (0.7%), SOS (4%--14%), or azoospermia (11%--18%).^[@bibr23-0300060517718771]^ Deletion of the AZFc region results in various phenotypes, from unaffected to oligozoospermia to azoospermia. Because ART techniques such as ICSI, testicular sperm extraction, and *in vitro* fertilization can assist infertile men with Y chromosome microdeletions to achieve pregnancies, Y microdeletion screening is strongly recommended for men with severe sperm defects ranging from azoospermia to oligozoospermia.^[@bibr24-0300060517718771]^ Additionally, although pre-implantation genetic diagnosis (PGD) technology is not routinely used in the evaluation of male infertility, it could potentially prevent the transmission of Y microdeletions to male offspring.
KS was the next most common condition observed in our study, in keeping with the fact that KS (47,XXY) is the most common sex chromosomal defect detected in newborn males (0.1%--0.2%).^[@bibr25-0300060517718771]^ Ferlin et al.^[@bibr16-0300060517718771]^ previously reported a KS prevalence of 10% in NOA and 5% in SOS patients. In our cohort, the incidence of KS was 6.7% (36/534) in NOA and 1.1% (4/378) in SOS patients. Recent studies have suggested that the impact of KS on pregnancy outcomes is limited.^[@bibr26-0300060517718771]^ Sperm can be retrieved in approximately 50% of azoospermic KS cases from focal areas of spermatogenesis in the testis using the microsurgery testicular sperm retrieval technique. Moreover, although the abnormal embryo rate of ICSI--PGD of patients with KS was reported to be 12.6%, retrospective reviews of 200 normal babies born with ICSI without PGD demonstrate that most of these children are chromosomally normal.
The loss of one of the X chromosomes from spermatogonia may represent a particular characteristic of the X chromosome; for example, X inactivation as suggested by Sciurano et al.^[@bibr27-0300060517718771],[@bibr28-0300060517718771]^ This phenomenon is seen in mammals with more than one X chromosome, in which the genes on all but one X chromosome are not expressed. It occurs in XXY males as well as in normal XX females.^[@bibr29-0300060517718771]^ Levron et al.^[@bibr30-0300060517718771]^ speculated that during multiplication of the primordial germ cells in the prenatal testis, 'correcting mitotic errors' might give rise to isolated testicular mosaicism, with normal germ lines surviving to produce sperm later in adulthood. Mroz et al.^[@bibr31-0300060517718771]^ demonstrated in a mouse model that surviving germ cells are all XY and restricted to single continuous segments, indicating that they arose from the clonal proliferation of single germ cells that had lost an X chromosome.
In conclusion, our results on the frequencies of AZF microdeletions and chromosomal abnormalities in infertile men from eastern China are largely in agreement with previous reports performed in different societies and ethnic groups. However, they show a relatively higher incidence of chromosomal anomalies and Y chromosome deletions in NOA in our centers. Because of the small sample size in the SOS group, further studies with larger patient groups should be conducted to clarify the chromosomal abnormality incidence in our region. Screening for chromosomal abnormalities and Yq microdeletions is strongly recommended for infertile patients during diagnosis and before ART. Specific PGD should also be performed to minimize the risk of transmitting genetic defects to offspring.
Author contributions {#sec11-0300060517718771}
====================
PP and XFC designed the study. CX drafted the manuscript, CX, XFC, YLL and ZMW collected and interpreted the data. XFC critically revised the paper for intellectual content, and PP reviewed the paper. All authors read and approved the final manuscript.
Declaration of conflicting interest {#sec12-0300060517718771}
===================================
The authors declare that there is no conflict of interest.
Funding {#sec13-0300060517718771}
=======
The research was supported by the National Natural Science Foundation of China (No. 81671511) and Scientific Research Project of Shanghai Municipal Commission of Health and Family Planning (No.201440009).
[^1]: Chong Xie, Xiangfeng Chen, and Yulin Liu contributed equally to this work.
[^2]: \*There is significant difference between any two groups. P \< 0.01. \*\*There is significant difference between any two groups. P \< 0.01. \*\*\*There is no significant difference between any two groups. P \> 0.05. \*\*\*\*There is significant difference between any two groups. P\<0.01.
| {
"pile_set_name": "PubMed Central"
} |
Ovarian hormones and pain response: a review of clinical and basic science studies.
Most clinical pain disorders are more common in women than in men, particularly during the peak reproductive years. This suggests that fluctuations in the ovarian hormones encountered during the female menstrual cycle may increase pain response. This article examined whether pain severity and experimental pain thresholds vary during the phases of the menstrual cycle in women with and without clinical pain disorders. It also reviewed the effect of ovarian hormones on behavioral responses to painful stimuli (pain reactivity) in animal models and the potential mechanisms through which ovarian hormones modulate pain reactivity. A narrative review was performed to ascertain the relationship between ovarian hormones and pain response. Relevant English-language publications describing pain reactivity in premenopausal women and female rodents were identified through searches of MEDLINE and PubMed from January 1, 1967, through May 1, 2008, as well as through the reference lists of identified articles. In the clinical studies reviewed, most pain disorders were reported to worsen during the late luteal and early follicular phases of the menstrual cycle. Pain thresholds and tolerance times also varied during different phases of the menstrual cycle in healthy premenopausal women in the majority of studies. Basic science studies suggested that ovarian hormones have distinct effects-on inflammation, affective states, stress responses, modulatory pain systems, and afferent sensory systems-that increase or decrease pain reactivity. Fluctuations of ovarian hormones in the course of the menstrual cycle appear to be associated with a mild to moderate effect on pain response. Greater knowledge of the mechanisms by which ovarian hormones modulate pain would broaden our understanding of why pain disorders are more frequent, severe, and disabling in women than in men. | {
"pile_set_name": "PubMed Abstracts"
} |
---
title: b
author: mrmrs
date: 2016-07-18
awslink: https://d26aqo05ggejx9.cloudfront.net/bvsb.gif
further_reading:
- title: b
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#b
- title: B
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#B
- title: w
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#w
- title: W
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#W
- title: e
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#e
- title: E
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#E
- title: ge
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#ge
- title: gE
url: http://vimdoc.sourceforge.net/htmldoc/motion.html#gE
---
b will move the cursor back one word. b will treat - as a word, B will skip it.
B will move the cursor back one word, will ignore many special characters that b does not.
| {
"pile_set_name": "Github"
} |
/*
* Copyright (c) 2001-2004 Swedish Institute of Computer Science.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without modification,
* are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright notice,
* this list of conditions and the following disclaimer in the documentation
* and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
* SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
* OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
* OF SUCH DAMAGE.
*
* This file is part of the lwIP TCP/IP stack.
*
* Author: Adam Dunkels <[email protected]>
*
*/
#ifndef __LWIP_DEBUG_H__
#define __LWIP_DEBUG_H__
#include "lwip/arch.h"
#include "lwip/opt.h"
/** lower two bits indicate debug level
* - 0 all
* - 1 warning
* - 2 serious
* - 3 severe
*/
#define LWIP_DBG_LEVEL_ALL 0x00
#define LWIP_DBG_LEVEL_OFF LWIP_DBG_LEVEL_ALL /* compatibility define only */
#define LWIP_DBG_LEVEL_WARNING 0x01 /* bad checksums, dropped packets, ... */
#define LWIP_DBG_LEVEL_SERIOUS 0x02 /* memory allocation failures, ... */
#define LWIP_DBG_LEVEL_SEVERE 0x03
#define LWIP_DBG_MASK_LEVEL 0x03
/** flag for LWIP_DEBUGF to enable that debug message */
#define LWIP_DBG_ON 0x80U
/** flag for LWIP_DEBUGF to disable that debug message */
#define LWIP_DBG_OFF 0x00U
/** flag for LWIP_DEBUGF indicating a tracing message (to follow program flow) */
#define LWIP_DBG_TRACE 0x40U
/** flag for LWIP_DEBUGF indicating a state debug message (to follow module states) */
#define LWIP_DBG_STATE 0x20U
/** flag for LWIP_DEBUGF indicating newly added code, not thoroughly tested yet */
#define LWIP_DBG_FRESH 0x10U
/** flag for LWIP_DEBUGF to halt after printing this debug message */
#define LWIP_DBG_HALT 0x08U
#ifndef LWIP_NOASSERT
#define LWIP_ASSERT(message, assertion) do { if(!(assertion)) \
LWIP_PLATFORM_ASSERT(message); } while(0)
#else /* LWIP_NOASSERT */
#define LWIP_ASSERT(message, assertion)
#endif /* LWIP_NOASSERT */
/** if "expression" isn't true, then print "message" and execute "handler" expression */
#ifndef LWIP_ERROR
#define LWIP_ERROR(message, expression, handler) do { if (!(expression)) { \
LWIP_PLATFORM_ASSERT(message); handler;}} while(0)
#endif /* LWIP_ERROR */
#ifdef LWIP_DEBUG
/** print debug message only if debug message type is enabled...
* AND is of correct type AND is at least LWIP_DBG_LEVEL
*/
#define LWIP_DEBUGF(debug, message) do { \
if ( \
((debug) & LWIP_DBG_ON) && \
((debug) & LWIP_DBG_TYPES_ON) && \
((s16_t)((debug) & LWIP_DBG_MASK_LEVEL) >= LWIP_DBG_MIN_LEVEL)) { \
LWIP_PLATFORM_DIAG(message); \
if ((debug) & LWIP_DBG_HALT) { \
while(1); \
} \
} \
} while(0)
#else /* LWIP_DEBUG */
#define LWIP_DEBUGF(debug, message)
#endif /* LWIP_DEBUG */
#endif /* __LWIP_DEBUG_H__ */
| {
"pile_set_name": "Github"
} |
/*
* Licensed to Elasticsearch under one or more contributor
* license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright
* ownership. Elasticsearch licenses this file to you under
* the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.elasticsearch.search.aggregations.pipeline;
import org.elasticsearch.common.xcontent.ObjectParser;
import org.elasticsearch.common.xcontent.XContentBuilder;
import org.elasticsearch.common.xcontent.XContentParser;
import org.elasticsearch.search.aggregations.metrics.ParsedSingleValueNumericMetricsAggregation;
import java.io.IOException;
public class ParsedSimpleValue extends ParsedSingleValueNumericMetricsAggregation implements SimpleValue {
@Override
public String getType() {
return InternalSimpleValue.NAME;
}
private static final ObjectParser<ParsedSimpleValue, Void> PARSER = new ObjectParser<>(ParsedSimpleValue.class.getSimpleName(), true,
ParsedSimpleValue::new);
static {
declareSingleValueFields(PARSER, Double.NaN);
}
public static ParsedSimpleValue fromXContent(XContentParser parser, final String name) {
ParsedSimpleValue simpleValue = PARSER.apply(parser, null);
simpleValue.setName(name);
return simpleValue;
}
@Override
protected XContentBuilder doXContentBody(XContentBuilder builder, Params params) throws IOException {
boolean hasValue = Double.isNaN(value) == false;
builder.field(CommonFields.VALUE.getPreferredName(), hasValue ? value : null);
if (hasValue && valueAsString != null) {
builder.field(CommonFields.VALUE_AS_STRING.getPreferredName(), valueAsString);
}
return builder;
}
} | {
"pile_set_name": "Github"
} |
// SPDX-License-Identifier: MIT
/*
* Copyright © 2020 Intel Corporation
*/
#include <linux/mm.h>
#include <linux/pagemap.h>
#include <linux/shmem_fs.h>
#include "gem/i915_gem_object.h"
#include "shmem_utils.h"
struct file *shmem_create_from_data(const char *name, void *data, size_t len)
{
struct file *file;
int err;
file = shmem_file_setup(name, PAGE_ALIGN(len), VM_NORESERVE);
if (IS_ERR(file))
return file;
err = shmem_write(file, 0, data, len);
if (err) {
fput(file);
return ERR_PTR(err);
}
return file;
}
struct file *shmem_create_from_object(struct drm_i915_gem_object *obj)
{
struct file *file;
void *ptr;
if (obj->ops == &i915_gem_shmem_ops) {
file = obj->base.filp;
atomic_long_inc(&file->f_count);
return file;
}
ptr = i915_gem_object_pin_map(obj, I915_MAP_WB);
if (IS_ERR(ptr))
return ERR_CAST(ptr);
file = shmem_create_from_data("", ptr, obj->base.size);
i915_gem_object_unpin_map(obj);
return file;
}
static size_t shmem_npte(struct file *file)
{
return file->f_mapping->host->i_size >> PAGE_SHIFT;
}
static void __shmem_unpin_map(struct file *file, void *ptr, size_t n_pte)
{
unsigned long pfn;
vunmap(ptr);
for (pfn = 0; pfn < n_pte; pfn++) {
struct page *page;
page = shmem_read_mapping_page_gfp(file->f_mapping, pfn,
GFP_KERNEL);
if (!WARN_ON(IS_ERR(page))) {
put_page(page);
put_page(page);
}
}
}
void *shmem_pin_map(struct file *file)
{
const size_t n_pte = shmem_npte(file);
pte_t *stack[32], **ptes, **mem;
struct vm_struct *area;
unsigned long pfn;
mem = stack;
if (n_pte > ARRAY_SIZE(stack)) {
mem = kvmalloc_array(n_pte, sizeof(*mem), GFP_KERNEL);
if (!mem)
return NULL;
}
area = alloc_vm_area(n_pte << PAGE_SHIFT, mem);
if (!area) {
if (mem != stack)
kvfree(mem);
return NULL;
}
ptes = mem;
for (pfn = 0; pfn < n_pte; pfn++) {
struct page *page;
page = shmem_read_mapping_page_gfp(file->f_mapping, pfn,
GFP_KERNEL);
if (IS_ERR(page))
goto err_page;
**ptes++ = mk_pte(page, PAGE_KERNEL);
}
if (mem != stack)
kvfree(mem);
mapping_set_unevictable(file->f_mapping);
return area->addr;
err_page:
if (mem != stack)
kvfree(mem);
__shmem_unpin_map(file, area->addr, pfn);
return NULL;
}
void shmem_unpin_map(struct file *file, void *ptr)
{
mapping_clear_unevictable(file->f_mapping);
__shmem_unpin_map(file, ptr, shmem_npte(file));
}
static int __shmem_rw(struct file *file, loff_t off,
void *ptr, size_t len,
bool write)
{
unsigned long pfn;
for (pfn = off >> PAGE_SHIFT; len; pfn++) {
unsigned int this =
min_t(size_t, PAGE_SIZE - offset_in_page(off), len);
struct page *page;
void *vaddr;
page = shmem_read_mapping_page_gfp(file->f_mapping, pfn,
GFP_KERNEL);
if (IS_ERR(page))
return PTR_ERR(page);
vaddr = kmap(page);
if (write)
memcpy(vaddr + offset_in_page(off), ptr, this);
else
memcpy(ptr, vaddr + offset_in_page(off), this);
kunmap(page);
put_page(page);
len -= this;
ptr += this;
off = 0;
}
return 0;
}
int shmem_read(struct file *file, loff_t off, void *dst, size_t len)
{
return __shmem_rw(file, off, dst, len, false);
}
int shmem_write(struct file *file, loff_t off, void *src, size_t len)
{
return __shmem_rw(file, off, src, len, true);
}
#if IS_ENABLED(CONFIG_DRM_I915_SELFTEST)
#include "st_shmem_utils.c"
#endif
| {
"pile_set_name": "Github"
} |
Salmonella infections in patients with the acquired immunodeficiency syndrome.
Defects in T-cell function have been seen in patients with the acquired immunodeficiency syndrome. Although the cellular immune system plays a key role in host defense against Salmonella, there have been no detailed reports of salmonellosis in patients with this syndrome. We report our experience with salmonella infections in six patients. Salmonellosis in these patients was unusually severe, characterized by widespread infection, bacteremia, and relapse, despite standard antibiotic treatment. Because of the difficulty in eradicating salmonella infection in patients with the acquired immunodeficiency syndrome, long-term suppressive treatment with antibiotics seems warranted. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Points A,B,C (fix) and X (variable) such that |AX| + |BX| = |CX|
Let $A,B,C$ (fix) points of the plane. Where are points $X$ (variable) in the plane with $|AX| + |BX| = |CX|$ ?
It seems $X$ need to lie on the arc under $AB$ of the circumscribed circle of the triangle $ABC$.
How can I prove that?
Note: There is no Trapezium $AXBC$.
A:
From the equation for $X$ we can get
$$4 |A-X|^2 |B-X|^2 = (|C-X|^2 - |A-X|^2 - |B-X|^2)^2$$
which gives you a quartic polynomial in the coordinates of $X$. If this doesn't factor (which in general it won't), the locus of $X$ will not be an arc of a circle, nor any conic section.
Here's a picture of it in the case $A = (0,0)$, $B=(1,0)$, $C = (0,1)$.
EDIT: In this particular case, the curve has genus $0$ and therefore has a rational parametrization:
$$ \eqalign{X_1 &= {\frac {64\,{t}^{3}-1024\,{t}^{2}+4096\,t}{9\,{t}^{4}-96\,{t}^
{3}+512\,{t}^{2}-4096\,t+16384}}\cr
X_2 &= {\frac {12\,{t}^{4}-160\,{t}^{3}+512\,{t}^{2}}{9\,{t}^{4}-96\,
{t}^{3}+512\,{t}^{2}-4096\,t+16384}}\cr
0 \le &t \le 8
}$$
In most cases, it appears the curve has genus one and is an elliptic curve, with no rational parametrization.
| {
"pile_set_name": "StackExchange"
} |
Accenting and detection of timing variations in tone sequences: different kinds of accents have different effects.
The effect of intensity and pitch accents on the perception of timing was examined in two experiments using a signal detection procedure. Analyses of sensitivity and response bias revealed opposite effects of intensity and pitch accents under similar conditions. Time intervals preceding intensity accents were perceived as longer, but time intervals preceding pitch accents were perceived as shorter. These results showed that listeners found it easier to detect timing variations that were contrary to expectations, as compared with variations that were consistent with expectations. In the present case, listeners should have expected shorter time intervals before intensity accents and longer intervals before pitch accents. The fact that the effects were observed with stimuli that had minimal musical structure demonstrated the contribution of psychoacoustic factors to such phenomena. | {
"pile_set_name": "PubMed Abstracts"
} |
We’re really excited to announce the launch of our new Aviator range and the first beers will be available from this weekend. The range is inspired by the Brewery Balloon and as a result Colin has come up with a fantastic and unique design for the new pump clips.
The first two beers from the range will be available this weekend at the Melton Mowbray Choc Fest which will be held at the Cattle Market on Saturday and Sunday. Choc’s Away is a gorgeous 4.3% Double Chocolate Stout and it went down a storm in the brewery tasting session to decide which chocolate beers would get the nod (well…somebody has to test them!).
The second beer chosen was something a bit different…and it’s certainly something a bit special. White Knuckle Ride is a 4.3% White Chocolate Stout and although it’s probably not the first thing you’d think of for a Chocolate beer it really does work, and the result of our tasting session proves it!
Choc’s Away is a one off beer so make sure you get down to the festival to enjoy a pint otherwise you’re really missing out. The good news is that White Knuckle Ride will be available in the future so make sure you put a word in with your local landlord and you won’t be disappointed. Choc Fest is open from 10am – 5pm on Saturday and 10am – 4pm on Sunday so if you’re lucky enough to make it please let us know what you think of the beers.
The third beer from the range will be this year’s festive special. Star Chaser is a 4.4% refreshing golden beer with a generous citrus fruit aroma, and if it tastes as good as it smells then whoever is lucky enough to enjoy it is in for a real Christmas treat.
Star Chaser was brewed on Wednesday and will be racked next week so is now available to order…and as an added bonus, if you order a firkin of Star Chaser along with two other firkins of our beer we’ll throw in a copy of our 2017 Belvoir Brewery calendar…for free! Featuring six great photos of everything beer, it also has six fantastic photos of our Balloon out and about on its travels along with various interesting beer related dates throughout the year.
The calendars will be available to buy from the brewery for a very reasonable £5 and of course will make an excellent present for any lover of beer…or balloons…or both!
Looking ahead to 2017 we’ll now be aiming to brew an Aviator special every month so keep checking our social media for news of some new and exciting beers coming out of the Vale. | {
"pile_set_name": "Pile-CC"
} |
I'll Go
"I'll Go" is a song by American neo soul/R&B singer Rahsaan Patterson.
The song was co-written, co-produced by Patterson and Steve Hurley, never officially released on any Patterson albums. R&B singer Donell Jones recorded his cover of the tune that's on the soundtrack album, Love & Basketball released in April 2000.
Patterson's version is featured on SoulTogetherness2001 a compilation album featuring various artists (including Al Green, The Spinners and Reggie Calloway), released under Expansion Records.
References
External links
www.play.com soultogetherness
www.amazon.co.uk soultogetherness
Category:2001 songs
Category:Rahsaan Patterson songs
Category:Songs written by Steve "Silk" Hurley
Category:Songs written by Rahsaan Patterson | {
"pile_set_name": "Wikipedia (en)"
} |
Prednisolone does not prevent hypersensitivity reactions in antiretroviral drug regimens containing abacavir with or without nevirapine.
To determine the effect of adjuvant prednisolone use on the development of abacavir (ABC)- and nevirapine (NVP)-associated hypersensitivity reactions (HSR). Randomized open-label study in antiretroviral-naive adult HIV-1 infected patients using a factorial design in which NVP and/or hydroxyurea (HU) and/or prednisolone are added to a regimen of ABC, zidovudine and lamivudine. Prednisolone (40 mg once daily) was added for the first 2 weeks of treatment. As it was difficult to distinguish ABC-associated HSR from NVP-associated HSR, these events were treated as a composite endpoint. The odds ratio (OR) of developing HSR for prednisolone-use was calculated with and without stratification by NVP and/or HU. Logistic regression was performed to identify risk factors for developing HSR. Of the 229 patients 115 were randomized to prednisolone and 114 to no-prednisolone; 19 (17%) and 11 (10%) patients, respectively, developed HSR. The expected prevention of HSR by prednisolone use was not observed. In fact use of prednisolone showed an increased risk for HSR although this did not reach statistical significance [OR, 1.82; 95% confidence interval (CI), 0.82-4.03]. There was a higher incidence of HSR in the NVP group than in the non-NVP group (20% versus 6%; P = 0.002). An additional risk factor identified in a multivariate logistic model was a high baseline CD4 cell count (OR, 1.26 per 100 x 10(6) cells/l increase; 95% CI, 1.06-1.51). The simultaneous start of ABC and NVP in first-line antiretroviral regimens should be avoided because of a high (20%) incidence of HSR. Short-term therapy with prednisolone did not prevent HSR in patients using ABC with or without NVP. | {
"pile_set_name": "PubMed Abstracts"
} |
###### Key questions
What is already known about this subject?
=========================================
Gated cardiovascular CT can be used to evaluate the aorta and the coronary arteries in patients being considered for transcatheter aortic valve implantation. It is not known whether newer high-pitch acquisition protocols perform as well as standard-pitch approaches for coronary and aortic evaluation.
What does this study add?
=========================
A high-pitch, dual-source acquisition provides comparable diagnostic information and image quality to a standard-pitch approach with respect to the aorta and the whole coronary tree, but with significantly less radiation and contrast exposure. However, if information is required about the proximal coronary vessels, a standard-pitch protocol is preferable.
How might this impact on clinical practice?
===========================================
For aortic root assessment, the high-pitch protocol is recommended. However, if coronary assessment is critical, this should be followed by a conventional standard-pitch, low-dose, prospectively gated CT-coronary angiogram if the high-pitch scan is non-diagnostic.
Introduction {#s1}
============
Transcatheter aortic valve implantation (TAVI) is increasingly being performed as an alternative to conventional aortic valve replacement surgery, particularly for those who have a high surgical risk.[@R1] However, the percutaneous devices used for TAVI are only available in a restricted range of sizes.[@R3] With conventional surgery, the operator can size the valve prosthesis by directly measuring the aortic root. However, for TAVI, the operator is reliant on preoperative or intraoperative imaging to assess the suitability of the patient and guide device selection.[@R3] Incorrect device sizing can result in periprocedural complications, including significant paravalvular aortic regurgitation, which has been associated with adverse outcomes in this high-risk cohort.[@R8]
Gated multidetector CT-cardiovascular angiography (CTCA) allows the reproducible non-invasive assessment of the aortic root, access routes and the distance to the coronary ostia.[@R3] However, patients being considered for TAVI often have significant coronary artery disease, which may impact on outcomes,[@R9] and can also potentially be simultaneously assessed by CTCA. High-pitch, dual-source protocols are increasingly being used in CTCA to minimise radiation dose[@R10] and iodine-based contrast medium load, but it is unclear whether they perform as well as standard-pitch prospective or retrospective ECG-gated protocols for aortic and coronary evaluation in this cohort. We compared diagnostic image quality with respect to the aorta and coronary arteries obtained using a single-acquisition, high-pitch combined whole-body angiogram and gated CT-aortogram/CT-coronary angiogram protocol against a conventional protocol with standard pitches involving a separate non-ECG-gated CT whole-body angiogram and an ECG-gated CT-aortogram/coronary angiogram in patients being considered for TAVI. The protocol evaluation was performed as part of an ongoing service development and improvement programme.
Methods {#s2}
=======
We retrospectively assessed 95 consecutive studies performed for TAVI assessment. Midway through this period, our institution switched from using two acquisitions with standard pitches to obtain a separate whole-body angiogram and gated CT-coronary angiogram/aortogram, respectively, to a high-pitch protocol involving a single acquisition combined CT whole-body angiogram and coronary angiogram/aortogram for imaging TAVI patients. All patients gave written consent for the use of their images for audit and clinical research. The requirement for specific formal ethical approval was waived by the local research and development office as the study involved retrospective review of image quality for studies performed purely for clinical purposes.
Image acquisition {#s2a}
-----------------
All images were acquired using a dual-source multidetector scanner (SOMATOM Definition Flash, Siemens, Erlangen, Germany). Neither beta-blockers nor glyceryl trinitrate was administered to any patients in view of their underlying severe aortic stenosis. Patients were scanned with either a single-acquisition high-pitch protocol or with two standard-pitch protocols. For the high-pitch protocol, a single contrast-enhanced acquisition was performed at 80 kV (for patients with a body mass index (BMI) \<20 kg/m^2^) and at 100 kV or 120 kV (for BMI \>30 kg/m^2^) from the circle of Willis to the lesser femoral trochanter to allow simultaneous assessment of the aorta, coronary arteries and access routes, with ECG gating used to time the acquisition over the thoracic aortic section at 70% R-R. For the standard-pitch group, a conventional helical CT whole-body angiogram was performed at 120 kV from the circle of Willis to the lesser trochanter to assess access routes, followed by a second gated acquisition of the heart and thoracic aorta at 80 kV (for patients with a BMI \<20 kg/m^2^) and at 100 kV or 120 kV (for BMI \>30 kg/m^2^). For the latter, patients were scanned with a prospective gating technique with full tube current applied at 70% of the cardiac cycle for stable heart rates ≤60 beats/min, or at 60%--80% of the cardiac cycle for unstable heart rates ≤60 beats/min, or at 30%--80% for heart rates of 61--70 beats/min. In patients with significant heart rate variability or heart rates \>70 beats/min, retrospective gating with dose modulation was used.
For all patients, a biphasic injection protocol was used. The contrast circulation time was determined using a 15 mL test bolus, followed by a 40 mL 0.9% saline chaser. The delay time for coronary imaging was the time of peak attenuation in the aortic root plus 3 s for the standard-pitch protocols or plus 8 s for the high-pitch protocols. For patients being imaged with the high-pitch protocol, an 80 mL bolus of contrast (iopromide 370 mg iodine/mL; Ultravist 370, Bayer Healthcare, Berlin, Germany) was given at 6 mL/s, followed by a 0.9% saline chaser of 40 mL at 6 mL/s via a dual-headed injection pump (Stellant D; Medrad UK, Strawberry Hill, Berkshire, UK). For patients imaged with the standard-pitch approach, the whole-body angiogram to assess access routes was performed with a 90 mL contrast bolus injected at 6 mL/s, followed by 40 mL 0.9% saline at 6 mL/s. Subsequently, the CT-coronary angiogram was performed with a 60 mL contrast bolus at 6 mL/s, followed by 40 mL 0.9% saline at 6 mL/s.
Image analysis {#s2b}
--------------
All images were analysed by two experienced cardiovascular imagers using commercially available software (Aquarius, TeraRecon, San Mateo, California, USA). Images were reconstructed using 0.75 mm sections every 0.6 mm with a B26f convolution kernel. For retrospectively gated studies, phases were reconstructed at 10% intervals from 10% to 100% of each cardiac cycle. Axial and orthogonal reconstructions of the aortic root and curved multiplanar reformats of the epicardial coronary arteries were assessed for artefact using a 3-point scale (1=artefact significantly limiting diagnosis; 2=minimal artefact without diagnostic impact; 3=no artefact). For coronary assessment, scans were considered diagnostic if all three epicardial coronary arteries had a score \>1. Mean contrast enhancement was also assessed at the level of the aortic root and in the distal aorta at the level of the aortic bifurcation. Contrast to noise ratio (CNR) at each location was calculated using:
$$CNR = \frac{{ROI_{lumen}} - ROI_{background}}{Noise}$$
where ROI~lumen~ is the mean CT number in Hounsfield units for a region of interest (ROI) in the aortic lumen, and ROI~fat~ is the mean CT number of a similarly sized background ROI placed in an area of body fat. Noise was calculated as:
$$Noise = \sqrt{\frac{\sigma_{lumen}^{2} + \sigma_{background}^{2}}{2}}$$
where σ~lumen~ and σ~background~ are the SD of the CT numbers for the same similarly sized ROIs in the aortic lumen and background body fat, respectively. The CNR was measured in this way three times in non-adjacent slices and the mean value used.
The radiation dose for each study was calculated as the total dose-length product (DLP, mGy cm) as previously described,[@R12] together with the volume CT dose index (CTDI~vol~) for the whole-body angiogram. Effective dose for a standard-sized patient was estimated using the ImPACT dose calculator in accordance with International Committee on Radiation Protection (ICRP) 60.[@R13]
Statistical analysis {#s2c}
--------------------
The Shapiro-Wilks test was used together with histograms to assess the normality of continuous data. Continuous variables are expressed as mean±SD for normally distributed variables and as medians with IQRs for non-parametric data. Differences between parametric continuous variables were assessed using Student\'s t-test, and for non-parametric data the Mann-Whitney U test. Categorical data are presented as frequencies and percentages. Differences between categorical variables were assessed using the χ^2^ and Fisher\'s exact tests as appropriate. All data were analysed using MedCalc V.13 (MedCalc Software, Mariakerke, Belgium). Two-tailed values of p\<0.05 were considered statistically significant.
Results {#s3}
=======
Overall, 44/95 (46%) of studies were performed using the high-pitch protocol and the remainder were performed at a standard-pitch using either retrospectively gated or prospectively gated protocols depending on heart rate. There were no significant differences between the groups with respect to gender, age, weight or heart rate ([table 1](#T1){ref-type="table"}).
######
Baseline characteristics of the study cohort
High-pitch (n=44) Standard-pitch (n=51) p Value
-------------------------------------- ------------------- ----------------------- ---------
Male, n (%) 24 (55) 26 (51) 0.837
Age, median (IQR) years 83.5 (75.5--85.0) 81.0 (71.0--86.0) 0.261
Weight (mean±SD), kg 73.5±15.5 71.5±13.0 0.532
Heart rate, median (IQR), per minute 70.5 (61.0--80.0) 69.0 (63.0--79.0) 0.925
The contrast enhancement (mean±SD) achieved at the level of the aortic root was comparable for the two cohorts but was significantly higher in the high-pitch cohort in the distal aorta ([table 2](#T2){ref-type="table"}). The CNR obtained with the standard-pitch approach was statistically significantly higher than that obtained with the high-pitch protocol for both the aortic root and distal aorta ([table 2](#T2){ref-type="table"}).
######
Contrast enhancement and aortic artefact grades for the high-pitch versus standard-pitch groups
High-pitch (n=44) Standard-pitch (n=51) p Value
-------------------------------------------------- ------------------- ----------------------- ---------
Contrast enhancement (mean±SD), Hounsfield units
Aortic root 455±161 464±123 0.760
Distal aorta 491±193 362±74 \<0.001
Contrast to noise ratio (mean±SD)
Aortic root 18.0±3.98 26.1±6.52 \<0.001
Distal aorta 14.2±5.72 16.7±4.93 \<0.001
Aortic artefact grade, n (%)
1 0 (0) 0 (0) 0.340
2 13 (29.5) 11 (21.36)
3 31 (70.5) 40 (78.4)
With respect to the aortic root, with either protocol, none of the patients had any significant artefact that limited diagnosis, and there was also no statistically significant difference in the frequency of scans without any artefact affecting the aorta ([table 2](#T2){ref-type="table"}). Examples are illustrated in [figure 1](#F1){ref-type="fig"}. For the coronary reconstructions, 10 (23%) scans in the high-pitch group and 15 (29%) in the standard-pitch group were considered fully diagnostic (p=0.493). However, when considering only the proximal coronary vessels, there was a significantly higher frequency of diagnostic studies with the standard-pitch protocol (high-pitch: 16 (36%) vs standard-pitch: 30 (59%) diagnostic studies, p=0.04). When analysed by vessel, there was no significant difference between the two protocols for whole coronary tree assessment ([table 3](#T3){ref-type="table"}). When considering only the proximal vessels, the proximal circumflex was significantly more liable to artefact with the high-pitch versus the standard-pitch acquisition ([table 3](#T3){ref-type="table"}). Examples of each of the artefact grades are illustrated in [figure 2](#F2){ref-type="fig"}.
{#F1}
{#F2}
######
Coronary artefact grades for the high-pitch versus standard-pitch groups broken down by whole epicardial coronary artery and proximal coronary artery
--------------------------------------------------------------------------
High-pitch\ Standard-pitch\
(n=44) (n=51)
------------------------------------------ ------------- -----------------
Left anterior descending, n (%) 0.545
1 14 13
2 15 23
3 15 15
Left circumflex artery, n (%) 0.089
1 24 18
2 13 16
3 7 17
Right coronary artery, n (%) 0.927
1 22 26
2 12 15
3 10 10
Proximal left anterior descending, n (%) 0.402
1 6 3
2 11 12
3 27 36
Proximal left circumflex artery, n (%) 0.006
1 18 7
2 12 14
3 14 30
Proximal right coronary artery, n (%) 0.238
1 18 13
2 10 12
3 16 26
--------------------------------------------------------------------------
The distributions by weight of total exam DLP and CTDI~vol~ for the whole-body angiogram are illustrated in [figures 3 and 4](#F3 F4){ref-type="fig"}, respectively. These reveal a linear relationship between both DLP and CTDI~vol~ and weight for the standard-pitch protocol, reflecting the automatic adjustment of tube current with patient size. In contrast, both DLP and CTDI~vol~ rise in a stepwise fashion with weight for the high-pitch protocol, indicating that the prescribed tube current would exceed the maximum available and is therefore capped; the increase in dose is therefore simply due to the change in tube voltage with BMI. The median (IQR) total exam DLP was significantly lower in the high-pitch group than the standard-pitch group (high-pitch: 347 (318--476) vs standard-pitch: 1227 (1150--1474) mGy cm, p\<0.001). Similarly, the median (IQR) CTDI~vol~ for the whole-body acquisition was significantly lower in the high-pitch versus the standard group (high-pitch: 3.60 (3.34--3.79) vs standard-pitch: 8.96 (8.03--11.4) mGy, p\<0.001). The effective dose for a standard-sized patient, estimated using the ImPACT dose calculator in accordance with ICRP 60, was 6 mSv for the high-pitch protocol and ranged between 13 and 29 mSv for the standard-pitch protocol depending on the gating technique used. The iodine-based contrast medium load required for the high-pitch studies was 80 mL vs 150 mL in the standard-pitch study.
{#F3}
{#F4}
Discussion {#s4}
==========
The use of a high-pitch versus standard-pitch protocol significantly reduces radiation and iodine-based contrast medium load, while achieving comparable diagnostic image quality both with respect to the aorta and the whole coronary tree in patients being assessed for TAVI. However, a high-pitch acquisition is not sufficient if evaluation of the proximal coronaries is required.
Patients being considered for TAVI often undergo numerous investigations to assess their suitability for the procedure.[@R3] These focus on the measurement of aortic root dimensions to facilitate device selection and assessment of potential access routes for the procedure.[@R6] Although other modalities such as cardiovascular magnetic resonance (CMR) can provide comparable information,[@R3] a significant number of patients have implanted devices that contraindicate this, or experience difficulty with lying flat in the scanner for significant lengths of time.
Cardiovascular CT offers the versatility of being able to assess access routes and aortic root dimensions in a single study.[@R6] In contrast to CMR, it also has the temporal and spatial resolution to be potentially able to simultaneously assess the coronary arteries. This represents a significant advantage over other modalities as the height of the coronary ostia from the aortic valve annulus can be readily determined by CT and may significantly impact on the safety of device deployment.[@R4] It is therefore an important consideration when determining the appropriateness of TAVI. Cardiovascular CT can also potentially allow the concomitant detection of significant coronary disease, which may increase the risks of ischaemia during the procedure, particularly during the rapid ventricular pacing required immediately prior to device deployment. Given the high burden of coronary disease in this population, this has traditionally been determined by invasive coronary angiography. The latter imposes an additional contrast load, and for those who ultimately prove unsuitable for TAVI, exposure to the risks of the invasive procedure with minimal gain. It would therefore be desirable to obviate the risks of this additional invasive assessment using CT-coronary angiography. Such an approach has been successfully used in other patient groups undergoing non-coronary cardiothoracic surgery[@R15] and in other settings where it is desirable to obviate invasive assessment.[@R16]
We found that gating the acquisition of the CT-aortogram undertaken as part of TAVI assessment regardless of which protocol was used produced comparable results in terms of aortic assessment. None of the patients in either the high-pitch or standard-pitch groups experienced any artefact that significantly affected image quality when assessing the aorta. We also found that with the use of a test bolus to optimise the timing of contrast delivery and image acquisition, similar degrees of contrast enhancement were obtained in the aortic root irrespective of which protocol was employed. However, the mean CT number for the distal aorta was significantly higher with the high-pitch protocol, reflecting the combined effects of the lower kV generally employed with this approach, and the greater X-ray attenuation by the denser abdominal viscera versus the less attenuating air-filled lungs in the thorax. The CNR was statistically significantly higher with the standard pitch protocols, again reflecting the generally higher tube potentials employed. These small although statistically significant differences in objective image quality however did not translate into meaningful clinical differences. The mean aortic attenuations and CNR achieved in the high-pitch protocol were higher or comparable to those described by Wuest *et al*,[@R17] who used a high-pitch only approach, with a similar effective radiation dose. However, the latter study did not make any direct comparisons with standard-pitch approaches or formally evaluate the coronary tree. Nevertheless, the work by Wuest *et al* demonstrates that further reductions in contrast dose are possible with high-pitch approaches.[@R17]
In the present study, there was no significant difference in the subjective diagnostic quality of aortograms obtained by either protocol. Furthermore, motion artefact significantly affected the quality of the CT-coronary angiograms obtained, regardless of protocol, such that over two-thirds were non-diagnostic across the whole cohort. The choice of protocol had no impact on the ability to obtain diagnostic image quality with respect to motion artefact when the entire coronary tree was considered. However, the standard-pitch protocol performed significantly better than the high-pitch approach when considering only the proximal segments of the three main epicardial coronary arteries. Disease in the proximal segments may be of greater potential prognostic importance than distal disease, particularly if there is concomitant left ventricle (LV) dysfunction.[@R18] Information about these vessel segments alone may therefore retain utility in some clinical settings.
Coronary imaging in this patient cohort is particularly challenging as beta-blockers are contraindicated in severe aortic stenosis, making adequate heart rate control difficult to achieve. The median heart rate for patients in both groups was \~70 beats/min, significantly higher than the regular 60 beats/min or less normally desirable for coronary CT-angiography.[@R10] This reflects the fact that with a limited aortic valve area, and therefore stroke volume, such patients maintain their cardiac output by augmenting their resting heart rate. It is likely that this had a greater impact on the frequency of diagnostic scans than the choice of protocol.
Although this was not formally assessed in this study, we have previously found that patients being considered for TAVI have significant coronary calcification in association with their aortic valve disease, which can preclude adequate coronary evaluation by CT-coronary angiography, regardless of image quality.[@R19] This is unsurprising given that the majority of these patients are being considered for TAVI rather than conventional surgery for the very reason that they are elderly or have significant comorbidities such as chronic kidney disease, diabetes and coronary disease. Based on these considerations and the low diagnostic yield obtained in the present study, irrespective of the protocol employed, we suggest that CT-coronary angiography can still as yet not routinely be used to evaluate the coronary arteries in patients being considered for TAVI.
However, if information is required about the coronary arteries, particularly the proximal vessel segments, a standard CT-coronary angiogram should be considered, although even with this approach we found that the diagnostic yield was at most 59%. The high-pitch approach however by definition only provides one single phase for coronary evaluation offering less versatility for coronary evaluation, particularly at more rapid heart rates. More recently, we and others have found that end-systolic imaging (20%--40%) with our dual-source scanner is adequate for coronary assessment at higher heart rates,[@R20] and so the highest dose retrospective acquisitions are no longer performed in our institution.
Although with respect to both the aorta and the coronary arteries we found no significant differences in the rates of diagnostic imaging using the high-pitch or the standard-pitch approaches, the total radiation dose and contrast load with the high-pitch protocols were significantly lower than with the standard-pitch approach. Given their underlying severe aortic stenosis, age and other comorbidities, radiation dose may seem of less relevance to patients being considered for TAVI[@R6]; however, iodine-based contrast medium load is important as many patients being considered for TAVI have associated chronic renal impairment. Our data suggest that high-pitch protocols should be considered as part of efforts to adhere to the 'As Low As Reasonably Achievable' principle and to minimise the contrast load used in these patients. While attempts to reduce radiation dose should not be at the expense of image quality, our data suggest that the adoption of high-pitch protocols has the potential to significantly minimise radiation exposure and more importantly contrast load without compromising diagnostic value. With improvements in TAVI techniques and devices, this technique may in future be used for lower risk patients in whom open surgery would have been previously considered.[@R21] We speculate that lowering radiation exposure among this cohort may therefore assume greater importance on a population basis as TAVI begins to be offered for younger patients with fewer comorbidities and longer anticipated life expectancy.
Limitations {#s4a}
-----------
Our study has several potential limitations. First, it was retrospective in nature risking selection bias. Second, patients were not randomly assigned to one protocol or another, but the impact of a systematic change in protocol was assessed as part of an ongoing programme of service improvement and protocol development. However, consecutive patients were studied over the period during which the protocol change took place and both groups were comparable with respect to heart rate and demographic factors that may have influenced image quality. Finally, all patients were scanned at a single tertiary centre on the same platform. While this facilitated the use of a standardised approach, it is possible that different results may be obtained on different platforms or with different hardware. Careful evaluation of any new strategy is therefore essential as part of any service improvement or systematic change in scan protocols.
Conclusion {#s5}
==========
The use of a high-pitch versus standard-pitch imaging protocol did not significantly impact on the ability to obtain diagnostic images with respect to significant motion artefact for either the aorta or whole coronary tree assessment in patients being considered for TAVI. Where available, high-pitch techniques should therefore replace standard-pitch approaches for TAVI assessment and will afford significant reductions in radiation and contrast dose, without any significant decrement in diagnostic image quality. The only caveat to this advice is for those patients where concomitant CT assessment of the coronary arteries is critical. In this clinical scenario, we recommend a high-pitch CT-aortogram for TAVI assessment, which if not diagnostic for the coronaries should be followed by a standard-pitch, low-dose CT-coronary angiogram, with end-systolic prospective acquisition preferred where available rather than retrospective gating for patients with heart rates \>70 beats/min.
The authors wish to thank the radiographers and the PACS team for their assistance with undertaking this work. None of the authors report any relevant disclosures.
**Contributors:** All authors contributed significantly to the work. TFI, EC and EDN devised and planned the study. TFI and EC performed clinical image analysis. LK and IC performed image noise/CNR evaluation, statistical analysis and dosimetry work. TFI drafted the manuscript. EC, LK, SN, OL, NG, SP, MBR, IC and EDN critically reviewed and revised the manuscript for important intellectual content. EDN was responsible for overall study supervision.
**Funding:** No funding was required for this work.
**Competing interests:** None declared.
**Ethics approval:** Research and Development Office, Royal Brompton Hospital.
**Provenance and peer review:** Not commissioned; externally peer reviewed.
**Data sharing statement:** No additional data are available.
[^1]: TI and EC contributed equally and are joint first author
| {
"pile_set_name": "PubMed Central"
} |
SCIENTISTS have created flesh-like mini robots which can move when they detect light.
The fleet of walking "bio-bots" are powered using muscle cells and controlled using electrical and optical pulses.
1 Skeletal muscle tissue is bonded to a 3D printed flexible skeleton Credit: Array
The sinewy robots are under a centimetre in size and made from 3D printed hydrogels and living cells.
Last year the researchers were able to make bots powered by rat's heart move.
Videos on YouTube show the bio-bots pulsing and wriggling in the lab.
They have been considered such a success that researchers at University of Illinois at Urbana-Champaign have released instructions for scientists to 3D print them in their own labs.
These bio-bot recipes are detailed in the paper A modular approach to the design, fabrication, and characterisation of muscle-powered biological machines.
Ritu Raman, a postdoctoral fellow in the Department of Bioengineering and first author of the paper said: "The protocol teaches every step of building a bio-bot, from 3D printing the skeleton to tissue engineering the skeletal muscle actuator, including manufacturers and part numbers for every single thing we use in the lab."
The tiny cell-based robots could change the way we design machines and systems.
Related stories DRIVERLESS REVOLUTION Brits will be able to 'sue a robot' under new legislation paving the way for driverless cars SHOP-POCALYPSE Amazon planning to open robotic supermarket staffed by just THREE humans, sources claim MAN TO MACHINE Robots will REPLACE 250,000 civil servants to save taxpayers billions by 2030, report claims WHEELY SCARY Meet the terrifying wheeled robot that's actually designed to give you 'nightmares' R2-better-than-you Boffins spending £22 MILLION to make sure robots don't behave as badly as violent, selfish humans frankenswine Scientists make PIG HUMAN babies by splicing stem cells in amazing new trial
The paper states: "Biological machines consisting of cells and biomaterials have the potential to dynamically sense, process, respond, and adapt to environmental signals in real time."
That means that biological systems or machines of the future could one day assemble themselves or even self heal.
We pay for your stories! Do you have a story for The Sun Online news team? Email us at [email protected] or call 0207 782 4368 | {
"pile_set_name": "OpenWebText2"
} |
Berlin (dpo) - Der Fraktionsvorsitzende der Unionsparteien, Volker Kauder, hat heute unmittelbar nach der Abstimmung des Bundestags über ein drittes Hilfspaket für Griechenland 63 mit Fluorwasserstoffsäure gefüllte Fässer bestellt . Das erfuhr deraus Insiderkreisen. Wozu der Politiker soviel Säure braucht, ist bislang nicht bekannt.Kauder selbst wollte den mutmaßlichen Kauf nicht kommentieren. "Ich möchte heute keine Auskünfte über meine privaten Einkäufe geben", erklärte der Politiker dem Postillon, während er sich Gummihandschuhe überzog und ein längeres Stück Draht um beide Hände wickelte. "Mir haben ganze 63 Abweichler bei der Griechenland-Abstimmung den Tag versaut. Da können Sie sicher verstehen, dass ich nicht so gesprächig bin."Für ihn stehe nach dem peinlichen Abstimmungsergebnis die Fehleranalyse an oberster Stelle, so Kauder. "Wir müssen jetzt gemeinsam schauen, was falsch gelaufen ist", gelobte er. "Es wird viele Gespräche unter vier Augen geben. Ich bin mir sicher, dann werden sich alle Meinungsverschiedenheiten zwischen mir und den Abweichlern ganz einfach auflösen." | {
"pile_set_name": "OpenWebText2"
} |
The campaign finance system has come under attack by both parties. It may be the only issue Hillary Clinton, Donald Trump, and Bernie Sanders all agree on. In the past few years, several existing campaign finance restrictions have been struck down by the Supreme Court, opening the floodgates for nearly-unlimited political expenditures: just 158 families now provide half of all the political campaign money in the country.
H.R. 20, the Government by the People Act introduced by Rep. John Sarbanes (D-MD3), is a leading Democratic congressional proposal to level the playing field. The bill would give every citizen a voucher worth up to $50 through a “My Voice Tax Credit” for campaign contributions in $5 increments, and it would aim to make small donations as influential as large donations by matching any donation on a six-to-one level through the establish of a Freedom From Influence Fund.
What supporters say
“We know that if the role of money in our elections were reduced and the level of civility in our politics increased, the result would be the election of more women, more minorities, more young people and more people dedicated to serving the public interest, not special interests,” Sarbanes and House Minority Leader Nancy Pelosi (D-CA) wrote. “Most members of Congress would leap at the chance to fund their campaigns without having to turn to a familiar cast of big donors and entrenched interests. Today, that’s virtually impossible.”
The vast majority of Democrats have come on board, with 157 Democratic cosponsors out of the 188 Democrats in the House. One Republican has cosponsored: Rep. Walter Jones (R-NC3). “I am greatly troubled by the undue influence that fat cat lobbyists and special interests have” over federal policy, Jones said. “Now, more than ever, secretive special interest money plays an enormous role in our electoral process and in governing.”
What opponents say
Most Republicans have celebrated the recent Supreme Court deregulation decisions such as Citizens United v. FEC and McCutcheon v. FEC as victories for First Amendment free speech rights. They contend this bill would amount to government funding of private speech, plus that it would contribute to levels of unsustainable government spending. (Democrats claim that the My Voice Tax Credit would not increase the deficit; see below.)
The bill therefore faces stiff opposition from the Republicans, pretty much every other congressional Republican besides Walter Jones. For comparison, a 2010 bill to re-implement most of the provisions struck down by the Supreme Court in Citizens United v. FEC only received two House Republican yes votes and was filibustered by Senate Republicans. And that was in 2010 — House Republicans on average have only moved further to the right since then.
Outlook
A companion bill in the Senate introduced by Sen. Dick Durbin (D-IL) has essentially the same components though a different title: S. 1538, the Fair Elections Now Act. With 23 cosponsors, none of whom are Republicans, the Senate version makes the House bill look bipartisan by comparison. Durbin claimed in a press release announcing the legislation that even though the bill would create a new source of spending, it wouldn’t increase the deficit, raising the revenue to offset it by instituting a .05% fee on annual federal contracts over $10 million.
Sarbanes’s bill didn’t even come up for a vote after it was introduced last Congress, just as yet to come up for a vote this time around. | {
"pile_set_name": "OpenWebText2"
} |
North Korea is expanding operations of its sophisticated cyber-espionage unit, which is poised to unleash attacks against aerospace and defense industries, according to a new study.
California-based cyber-security company FireEye said a Pyongyang-linked group poses an “advanced threat” by using holes in the internet to carry out its attacks, the Washington Post reported.
The rogue regime bans the internet for ordinary citizens but has poured an enormous amount of time and money into building a cyberarmy that can outsmart other countries, including South Korea.
“Our concern is that this could be used for a disruptive attack rather than a classic espionage mission, which we already know that the North Koreans are regularly carrying out,” said John Hultquist, the company’s head of intelligence analysis.
FireEye said it has “high confidence” that a group it dubbed “APT37” — for “advanced persistent threat” — is behind several “zero-day vulnerability” attacks not just in South Korea but also in Japan, Vietnam and in the Middle East.
Hackers launch zero-day attacks by finding and exploiting flaws in software before the developers have a chance to create a patch to fix it.
“It’s like your security system is a big wall but someone knows that there’s a hole somewhere in that wall and can crawl through it,” Hultquist said. “It’s fairly rare.”
Analysts say Pyongyang has ramped up hacking operations partly to raise money for the cash-strapped regime, which is under heavy sanctions over its nuclear weapons and ballistic missile programs.
The North has previously been blamed for the WannaCry ransomware that briefly wreaked global havoc last year — an accusation it vehemently denies.
APT37, which has been active at least since 2012, previously focused its efforts on “government, military, defense industrial base and media sector” in the South. It now targets industries ranging from chemicals to telecommunications in other countries.
“This group should be taken seriously,” FireEye said.
FireEye’s first APT was identified in a 2013 report by company division Mandiant, which said that hackers who broke into American newspapers, government agencies and companies “are based primarily in China and that the Chinese government is aware of them,” Agence France-Presse reported.
One group, it said, was believed to be Unit 61398, a branch of the People’s Liberation Army in Shanghai. US federal prosecutors indicted five of its members on charges of stealing information from American companies.
“We have seen both North Korean and Chinese operations range from simplistic to very technically sophisticated,” Hultquist told AFP.
“The sharpest difference between the two really lies in the aggressive nature of North Korean operations.”
“Whereas Chinese actors have typically favoured quiet espionage, North Korea has demonstrated a willingness to carry out some very aggressive activity, ranging from attack to outright global crime,” he said.
The hermit kingdom’s cyberwarfare prowess first came to prominence when it was accused of hacking into Sony Pictures Entertainment to take revenge for “The Interview,” a satirical film that mocked its leader Kim Jong Un. | {
"pile_set_name": "OpenWebText2"
} |
// Copyright (c) Microsoft Corporation. All rights reserved.
// Licensed under the MIT License.
namespace Microsoft.Quantum.Tests {
open Microsoft.Quantum.Preparation;
open Microsoft.Quantum.Intrinsic;
open Microsoft.Quantum.Canon;
open Microsoft.Quantum.Measurement;
operation MeasureWithScratchTest () : Unit {
using (register = Qubit[2]) {
PrepareEntangledState([register[0]], [register[1]]);
X(register[1]);
let xxScratch = MeasureWithScratch([PauliX, PauliX], register);
let xx = Measure([PauliX, PauliX], register);
if (xx != xxScratch) {
fail $"〈XX〉: MeasureWithScratch and Measure disagree";
}
let yyScratch = MeasureWithScratch([PauliY, PauliY], register);
let yy = Measure([PauliY, PauliY], register);
if (yy != yyScratch) {
fail $"〈yy〉: MeasureWithScratch and Measure disagree";
}
let zzScratch = MeasureWithScratch([PauliZ, PauliZ], register);
let zz = Measure([PauliZ, PauliZ], register);
if (zz != zzScratch) {
fail $"〈ZZ〉: MeasureWithScratch and Measure disagree";
}
ResetAll(register);
}
}
}
| {
"pile_set_name": "Github"
} |
1970 Kentucky Wildcats football team
The 1970 Kentucky Wildcats football team represented the University of Kentucky in the Southeastern Conference during the 1970 NCAA University Division football season.
References
Kentucky
Category:Kentucky Wildcats football seasons
Kentucky Wildcats | {
"pile_set_name": "Wikipedia (en)"
} |
Automated noninvasive determination of mixed venous pCO2.
The determination of mixed venous pCO2 is desirable for assessing the metabolic and respiratory status of a patient. A totally automated, laboratory computer-controlled noninvasive system has been developed to determine mixed venous pCO2 by an equilibrium rebreathing method or by an exponential compartmental analysis for cases in which equilibrium is not achieved. A gas mixture is charged to a 2-liter anesthesia bag contained in a thermostatically controlled chamber used to maintain the temperature at 37 degrees C. This feature improves upon past rebreathing methods and eliminates water vapor as a variable in gas composition measurement. This bag is connected to a rebreathing circuit controlled by a minicomputer. The subject breathes from a mouthpiece attached to a two-way valve and rebreathes the gas mixture for a period of 30 seconds. Inspirate and expirate hoses are placed in the rebreathing bag to ensure a more uniform gas distribution than is generally found in rebreathing systems. Exchange of CO2 takes place between lungs and rebreathing bag, and the concentration of CO2 is continuously monitored by a mass spectrometer. After a period of time, the concentration of CO2 in the rebreathing bag, the alveoli, and the mixed venous blood come into equilibrium, demonstrated by a plateau on the record of CO2 concentration vs. time. Compartmental analysis predicts the mixed venous pCO2 even if an equilibrium is not established. This feature is a significant benefit of this new method, eliminating problems associated with establishing an equilibrium, such as gas mixture volume adjustment, recirculation, and poor ventilation. The predicted value agrees with the equilibrium valve for cases in which equilibrium is reached.(ABSTRACT TRUNCATED AT 250 WORDS) | {
"pile_set_name": "PubMed Abstracts"
} |
//
// RootViewController.swift
// Model2App
//
// Created by Karol Kulesza on 6/19/18.
// Copyright © 2018 Q Mobile { http://Q-Mobile.IT }
//
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
import UIKit
/**
* Root menu view controller responsible for presenting a collection view of all model classes shown as menu items,
* with the option to show a list of objects of a given model class, by tapping on a selected class / menu item
*/
open class RootViewController: UICollectionViewController, UICollectionViewDelegateFlowLayout, BasePresenter {
// MARK: -
// MARK: Properties & Constants
public private(set) var classes = [ModelClass.Type]()
private let cellReuseIdentifier = "RootCollectionViewCell"
private let transitionDelegate = TransitioningDelegate()
// MARK: -
// MARK: UIViewController Methods
override open func viewDidLoad() {
super.viewDidLoad()
let bundle = M2A.config.menuDefaultBackgroundImageName == M2AConstants.menuBackgroundImageName ? ModelManager.shared.bundle : Bundle.main
let backgroundImage = UIImage.init(named: M2A.config.menuDefaultBackgroundImageName, in: bundle, compatibleWith: nil)
collectionView?.backgroundView = UIImageView(image: backgroundImage)
collectionView?.register(RootViewCell.self, forCellWithReuseIdentifier: cellReuseIdentifier)
collectionView?.contentInsetAdjustmentBehavior = .always
classes = ModelManager.shared.allRootClasses
}
// MARK: -
// MARK: UICollectionViewDataSource Methods
override open func collectionView(_ collectionView: UICollectionView, numberOfItemsInSection section: Int) -> Int
{
return classes.count
}
override open func collectionView(_ collectionView: UICollectionView, cellForItemAt indexPath: IndexPath) -> UICollectionViewCell
{
let modelClass: ModelClass.Type = classes[indexPath.row]
let cell = collectionView.dequeueReusableCell(withReuseIdentifier: cellReuseIdentifier, for: indexPath) as! RootViewCell
let cellSize = getCellSizeForCollectionSize(size: collectionView.bounds.size)
cell.updateForCellSize(cellSize)
cell.updateForClass(modelClass)
return cell
}
// MARK: -
// MARK: UICollectionViewDelegateFlowLayout Methods
open func collectionView(_ collectionView: UICollectionView, layout collectionViewLayout: UICollectionViewLayout, sizeForItemAt indexPath: IndexPath) -> CGSize
{
return getCellSizeForCollectionSize(size: collectionView.bounds.size)
}
open func collectionView(_ collectionView: UICollectionView, layout collectionViewLayout: UICollectionViewLayout, insetForSectionAt section: Int) -> UIEdgeInsets
{
let inset = M2A.config.menuDefaultInset
return UIEdgeInsets(top: inset, left: inset, bottom: inset, right: inset)
}
open func collectionView(_ collectionView: UICollectionView, layout collectionViewLayout: UICollectionViewLayout, minimumLineSpacingForSectionAt section: Int) -> CGFloat
{
return M2A.config.menuDefaultMinimumLineSpacing
}
open func collectionView(_ collectionView: UICollectionView, layout collectionViewLayout: UICollectionViewLayout, minimumInteritemSpacingForSectionAt section: Int) -> CGFloat
{
return M2A.config.menuDefaultMinimumInteritemSpacing
}
// MARK: -
// MARK: UICollectionViewDelegate Methods
override open func collectionView(_ collectionView: UICollectionView, didSelectItemAt indexPath: IndexPath)
{
let itemAttributes = collectionView.layoutAttributesForItem(at: indexPath)
let itemFrame = itemAttributes?.frame
transitionDelegate.initialFrame = collectionView.convert(itemFrame!, to: collectionView.superview)
showObjectListVCForClass(classes[indexPath.row])
}
// MARK: -
// MARK: UIContentContainer Methods
override open func viewWillTransition(to size: CGSize, with coordinator: UIViewControllerTransitionCoordinator) {
super.viewWillTransition(to: size, with: coordinator)
if let collectionView = collectionView {
collectionView.collectionViewLayout.invalidateLayout()
coordinator.animate(alongsideTransition: { (context) in
let cellSize = self.getCellSizeForCollectionSize(size: size)
collectionView.visibleCells.forEach { cell in
(cell as? RootViewCell).flatMap { $0.updateForCellSize(cellSize) }
}
}, completion: nil)
}
}
// MARK: -
// MARK: RootViewController Methods
func showObjectListVCForClass(_ modelClass: ModelClass.Type, presenter: BasePresenter? = nil) {
let presenter = presenter ?? self
let objectListVC = ObjectListViewController(objectClass: modelClass)
let navigationVC = UINavigationController(rootViewController: objectListVC)
navigationVC.transitioningDelegate = transitionDelegate
navigationVC.modalPresentationStyle = .custom
presenter.present(navigationVC, animated: true, completion: nil)
}
// MARK: -
// MARK: Helper Methods
private func getCellSizeForCollectionSize(size: CGSize) -> CGSize {
let numberOfColumns = M2A.config.menuDefaultNumberOfColumns
let iteritemSpacing = M2A.config.menuDefaultMinimumInteritemSpacing
let insetsAndSpacings = 2 * M2A.config.menuDefaultInset + collectionView!.safeAreaInsets.left + collectionView!.safeAreaInsets.right + iteritemSpacing * CGFloat(numberOfColumns - 1)
let itemWidth = ((size.width - insetsAndSpacings) / CGFloat(numberOfColumns)).rounded(.down)
return CGSize(width: itemWidth, height: itemWidth)
}
}
| {
"pile_set_name": "Github"
} |
And Chill
What’s New on Netflix in November
From left; Courtesy of Netflix, from Warner Bros./Everett Collection, by Jan Thijs/Netflix.
Sunrise, sunset; as the days get shorter and colder, there are a few endlessly re-watchable films and TV series leaving Netflix. (Haaaave you met How I Met Your Mother?) But not to worry: the streaming service is replacing them with intriguing prospects, like a new series from the mind of Spike Lee and an indie hit that lit up Sundance. Read on to learn the best of what Netflix is bringing to the screen next month—as well as what to catch now, before it fades into the black hole of the Internet.
Movies
What’s Arriving . . .
Michael Clayton
A whistleblower thriller with an ache at its heart, Tony Gilroy’s intelligent, gripping film feels like one of those movies they don’t make anymore—except it was only made 10 years ago. The film stars a perhaps never-better George Clooney as a cynical fixer, a lawyer who doesn’t practice law so much as he cleans up powerful people’s problems. When he gets embroiled in a scandal involving Big Agra and a detestable, yet pitiable, Tilda Swinton (in an Oscar-winning performance), he suddenly finds the weary conscience he’s been sublimating for years. Robustly entertaining and galvanizing in its own way, Michael Clayton is great for-grown-ups studio filmmaking. Plus, it features one of the best closing shots of the new century: troubled, ambiguous, and quietly hopeful.
The Homesman (11/5)
Unfairly overlooked when it was released in 2014, writer-director-star Tommy Lee Jones’s sad, bitter Western tells a forlorn story about hardscrabble life on the windswept frontier. As Mary Bee, a tough independent woman nonetheless longing for companionship, Hilary Swank is the best she’s been since her pair of Oscar wins in the late 90s/early 2000s. She and Jones—as a n’e’r-do-well who finds his moral way when he’s tasked by Mary to help her transport three insane women back east to civilization—have a warm and prickly chemistry, holding the center of this eclectic film as a roving cast of characters comes meandering through. (Including one played by none other than Meryl Streep.) Though it’s not an easy story—and features at least one seriously jarring plot turn—The Homesman nonetheless has a rueful grace to it, one that bears some reconsideration after its inauspicious initial release.
Mudbound (11/17)
A sensation at Sundance back in January, director Dee Rees’s big, rumbling, occasionally lumbering literary adaptation has serious heft. A story of race and class in the post-WWII Deep South, Mudbound perhaps tries to cram in too much from Hillary Jordan’s novel—the film is dense and long, yet not everything gets its proper consideration. Still, it’s a film of undeniable power, with commanding lead performances from Jason Mitchell and Garrett Hedlund, revealing talents I didn’t know he had. Once considered an Oscar sure thing, it will be interesting to see how Mudbound fares in the ongoing Academy vs. Netflix cold war. Regardless of its awards chances, Mudbound is a heavy meal worth digging into. Violent, angry, and tragic, it’s not exactly a feel-good family movie. But you’ll get enough of that at Thanksgiving, won’t you?
Piranha (11/20)
A complete piece of junk, yes. But sometimes you just need to see a severed penis get devoured by a murderous fish just before the holidays begin.
What’s Leaving . . .
Twilight (11/1)
We all got older. Kids grew up; 20-somethings became 30-somethings. Singletons became spouses. Couples became parents, became grandparents, became dead. Time has passed since 2008. Almost a decade. And now Twilight is leaving us, abandoning Netflix to go live its immortal life elsewhere. Because we have all gotten too old for it. So wave it one last goodbye, then watch it bound off into eternity—sparkling as it goes—while we mortals age ever more and darkness descends.
TV
What’s Arriving . . .
Alias Grace (11/3)
With four on-screen adaptations this year alone, Stephen King may be the author most dominating the pop-culture landscape in 2017—but Canada’s Margaret Atwood isn’t far behind. An adaptation of her novel The Handmaid’s Tale proved a major coup for Netflix’s competitor Hulu, making it the first streaming platform to score an Emmy for best dramatic series. Alias Grace, Netflix’s own six-episode Atwood mini-series, is unlikely to stir up as much awards-season buzz, but is nonetheless an engrossing adaptation of Atwood’s 1996 historical novel. The show and book follow Grace Marks (the mesmerizing Sarah Gadon), a real-life convicted 19th-century Canadian murderess who nonetheless keeps both the audience and her fictional interrogator, the Atwood-created Dr. Simon Jordon (Edward Holcroft), guessing as to her innocence and mental state. The six-part mini-series—made for the CBC, adapted by Canadian triple threat Sarah Polley (Away from Her), directed by Mary Harron (American Psycho—so she knows her way around an axe murder)—may not contain the genre elements of Handmaid, but its psycho-sexual themes are classic feminist Atwood. Polley has also packed this series with Canadian luminaries including Anna Paquin and married stage legends (and Slings and Arrows stars) Paul Gross and Martha Burns. A compelling watch for lovers of Canadian history, period dramas, and seductive, morally ambiguous leads.
The Punisher (11/17)
While we’re on the subject of morally ambiguous killers: Netflix will unveil its seventh Marvel Comics series in November, with The Walking Dead’s Jon Bernthal reprising his role as the brain-damaged, gun-toting Frank Castle from Daredevil Season 2. Deborah Ann Woll’s Karen Page is another familiar Daredevil face joining Bernthal, and ensuring that The Punisher will have a soft landing among fans of Matt Murdock’s show. Given Castle’s fetish for firearms—unlike Netflix’s other Marvel stars, he has no superpowers other than deadly aim—there was some question as to whether Netflix would delay the Punisher premiere in light of the recent (slash ongoing) national debate around gun control. But Netflix is plowing ahead anyway, and this series is, perhaps, the character’s best shot at on-screen fame. Bernthal’s supporting turn as the vigilante, who was previously played, with mixed success, by Dolph Lundgren,Thomas Jane, and Ray Stevenson, was well received by Daredevil fans. But the jury’s still out on whether Castle’s unrelentingly grim outlook and hair-trigger finger can carry a story all on their own.
She’s Gotta Have It (11/23)
In the latest salvo of what FX President John Landgraf called the “epic, titanic battle for talent” Netflix is waging against cable television, here comes the first TV series from writer/director Spike Lee. Based on his 1986 first full-length feature of the same name, She’s Gotta Have It stars DeWanda Wise (Underground) as Nola Darling—a character originally played by Tracy Camilla Johns.Anthony Ramos (Hamilton), Cleo Anthony (Extant), and Lyriq Bent (12 Monkeys) co-star as her suitors. Over 30 years later, Nola Darling still hasn’t decided which of the three very different men she likes best. But this time, the Brooklyn resident will have 10 half-hour episodes to make up her mind—or not. (The original film famously throws cold water on a neat and tidy happy ending.) Lee directed the entire first season, which will prove must-see viewing for any fan of Lee or the original indie movie—which is still taught in film schools as, among other things, an example of what can be achieved on a shoestring budget.
What’s Leaving . . .
How I Met Your Mother Seasons 1-9
If you are several years behind on your TV and still haven’t figured out how, exactly, Ted Mosby met the mother of his children, well, you only have a few days to catch up. What’s more likely is that the nine-season adventures of Ted, Robin, Marshall, Lily, and Barney have turned into comfort Netflix background TV, much the same way the show’s spiritual predecessor, Friends, has. The day Friends leaves Netflix forever is the day a million millennials will cry out in pain. How I Met Your Mother hasn’t enjoyed quite the same cultural resonance as Friends, thanks, in part, to the sour taste its emotionally manipulative finale left in the mouths of fa,s and how poorly Neil Patrick Harris’s womanizing, emotionally manipulative character, Barney, has aged in just three short years. Perhaps it’s not so legen—wait for it—dary after all.
Claire Underwood, House of Cards
She may have started out as Frank Underwood’s cool, if slightly icy, wife who stands on the sidelines, but Claire Underwood (played by Robin Wright) quickly transforms into the show’s stealthy Lady Macbeth with a chic pixie cut, delivering quiet, but shocking blows to her enemies. “I’m willing to let your child wither and die inside you,” she once said to a pregnant former employee. “Am I really the sort of enemy you want to make?” Not. At. All.
Photo: Courtesy of David Giesbrecht/Netflix.
Frank Underwood, House of Cards
Well, if it isn’t the most corrupt, murderous fictional president to ever step foot in the White House. Frank Underwood (played by Kevin Spacey) is basically a caricature of a dirty politician—he’s ruthless, manipulative, power-hungry, and violent, willing to do or say anything to stay at the top of the food chain. Get in his way and prepare to be bowled over—or shoved in front of a moving train.
Photo: Courtesy of David Giesbrecht /Netflix.
Vee, Orange Is the New Black
Orange Is the New Black is filled season to season with new villains, from the Season 1 terror of crazed religious freak Pennsatucky (who is, thankfully, reformed now), to Season 4’s sadistic guard who forces an inmate to eat a baby mouse. But none have had the perfect open and close villainy of Vee (played by Lorraine Toussaint) in Season 2, a manipulative force who will do whatever it takes to get people to do her bidding, whether it requires shallow sweet talk or a blunt smack in the head.
Photo: Courtesy of Netflix/Courtesy Everett Collection.
Kilgrave, Jessica Jones
Kilgrave (played by David Tennant) showed us exactly what can happen when an incredible power gets into the wrong hands. The Marvel baddie had the power to control other people, a chilling gift he used to achieve violent ends.
Photo: Courtesy of Myles Aronowitz/Netflix.
Dr. Hunter Aloysius, The OA
He was a villain who swore he was doing work in the name of a greater good. Aloysius (Jason Isaacs) trapped literal angels in his basement for years so he could conduct scientific experiments on them—experiments that included killing them over and over and wiping their memories so they couldn’t remember what he did to them.
Photo: Courtesy of JoJo Whilden/Netflix.
Bryce, 13 Reasons Why
From Hannah’s perspective, technically everyone who got a tape is a villain of sorts. However, none were more insidious than Bryce (Justin Prentice), the jock who was not only your typical high school bully, but also later revealed to be a serial rapist.
Photo: By Beth Dubber/Netflix.
Rory Gilmore, the Gilmore Girls revival
We’re only kind of kidding. Sure, Rory (Alexis Bledel) was the precocious protagonist of the original series, but the all grown up version in Netflix’s revival is a bit of a narcissistic mess, consistently messing up career opportunities, sleeping with her married ex-boyfriend (although it takes two to play, Logan, you flawed, filthy rich philanderer) while straight up forgetting her actual boyfriend—poor Paul.
Photo: Courtesy of Saeed Adyani/Netflix.
Claire Underwood, House of Cards
She may have started out as Frank Underwood’s cool, if slightly icy, wife who stands on the sidelines, but Claire Underwood (played by Robin Wright) quickly transforms into the show’s stealthy Lady Macbeth with a chic pixie cut, delivering quiet, but shocking blows to her enemies. “I’m willing to let your child wither and die inside you,” she once said to a pregnant former employee. “Am I really the sort of enemy you want to make?” Not. At. All.
Courtesy of David Giesbrecht/Netflix.
Frank Underwood, House of Cards
Well, if it isn’t the most corrupt, murderous fictional president to ever step foot in the White House. Frank Underwood (played by Kevin Spacey) is basically a caricature of a dirty politician—he’s ruthless, manipulative, power-hungry, and violent, willing to do or say anything to stay at the top of the food chain. Get in his way and prepare to be bowled over—or shoved in front of a moving train.
Courtesy of David Giesbrecht /Netflix.
Vee, Orange Is the New Black
Orange Is the New Black is filled season to season with new villains, from the Season 1 terror of crazed religious freak Pennsatucky (who is, thankfully, reformed now), to Season 4’s sadistic guard who forces an inmate to eat a baby mouse. But none have had the perfect open and close villainy of Vee (played by Lorraine Toussaint) in Season 2, a manipulative force who will do whatever it takes to get people to do her bidding, whether it requires shallow sweet talk or a blunt smack in the head.
Courtesy of Netflix/Courtesy Everett Collection.
Kilgrave, Jessica Jones
Kilgrave (played by David Tennant) showed us exactly what can happen when an incredible power gets into the wrong hands. The Marvel baddie had the power to control other people, a chilling gift he used to achieve violent ends.
Courtesy of Myles Aronowitz/Netflix.
Pablo Escobar, Narcos
Sometimes a show’s greatest villain can also be its star. Pablo Escobar (played by Wagner Moura) on Narcos is just that, and is based on the real life drug lord who got rich by peddling cocaine in Colombia, leaving a trail of blood and terror in his wake.
By Daniel Daza/Netflix/Everett Collection.
Count Olaf, A Series of Unfortunate Events
There are few things more villainous than committing yourself to a lifetime mission of killing children. Alas, that’s Olaf’s (played by Neil Patrick Harris) lot in life, a commitment that constantly requires him to take his cartoonish villainy to the next level, constantly disguising himself so he can finally rid the world of those damn Baudelaire orphans.
Courtesy of Joe Lederer/Netflix.
Reverend Richard Wayne Gary Wayne, Unbreakable Kimmy Schmidt
Unbreakable Kimmy Schmidt may be a comedy, but it still has one of the most twisted plot lines around, thanks to the Reverend (played by Jon Hamm). He trapped Kimmy and three other women in a bunker for 15 years, forcing Kimmy to marry him and tricking all the women into thinking the world was on the verge of an apocalypse.
Courtesy of Eric Liebowitz/Netflix.
Cottonmouth, Luke Cage
He may be seductive, but he’s also a snake. Cottonmouth (played by Mahershala Ali) was one of the more ruthless overlords of Harlem, a man with a perilously short temper and an unquenchable thirst for the total destruction of his enemies.
Courtesy of Myles Aronowitz/Netflix.
The Demogorgon, Stranger Things
Dr. Martin Brenner, Eleven’s evil father, might seem like the obvious villain on this show. And don’t get us wrong, he’s definitely a villain . . . but, when push comes to shove you have to admit you would rather be up against him than the Demogorgon (played by a suited up Mark Steger), the horrifying demon-like creature who lives in the Upside-Down and feasts on both fear and flesh.
Courtesy of Netflix.
Dr. Hunter Aloysius, The OA
He was a villain who swore he was doing work in the name of a greater good. Aloysius (Jason Isaacs) trapped literal angels in his basement for years so he could conduct scientific experiments on them—experiments that included killing them over and over and wiping their memories so they couldn’t remember what he did to them.
Courtesy of JoJo Whilden/Netflix.
Bryce, 13 Reasons Why
From Hannah’s perspective, technically everyone who got a tape is a villain of sorts. However, none were more insidious than Bryce (Justin Prentice), the jock who was not only your typical high school bully, but also later revealed to be a serial rapist.
By Beth Dubber/Netflix.
Rory Gilmore, the Gilmore Girls revival
We’re only kind of kidding. Sure, Rory (Alexis Bledel) was the precocious protagonist of the original series, but the all grown up version in Netflix’s revival is a bit of a narcissistic mess, consistently messing up career opportunities, sleeping with her married ex-boyfriend (although it takes two to play, Logan, you flawed, filthy rich philanderer) while straight up forgetting her actual boyfriend—poor Paul. | {
"pile_set_name": "Pile-CC"
} |
Whenever we head into the holiday season, a family vacation, or into visits with grandparents, aunts, uncles, and cousins, there's one awkward situation that will arise in many families that most parents will be unprepared to deal with: relatives who expect hugs and kisses from little ones — even when those little ones don't want to show them affection.
To spare a relative's feelings, many of us will urge a small child to endure or even return this unwanted physical contact. But should we? What messages are we sending to our kids about their body boundaries when we do this?
How to Avoid Teaching the Wrong Lessons
A CNN article entitled I Don't Own My Child's Body that explores these questions is the subject of lively discussion here. Katia Hetter, its author, asserts that, "Forcing children to touch people when they don't want to leaves them vulnerable to sexual abusers, most of whom are people known to the children they abuse."
ADVERTISEMENT
Assuming that giving Grandma a kiss on the cheek could have anything at all to do with the sexual abuse of a child might seem crazy at first blush, but Nichole M. feels Hetter's connection makes perfect sense. "You're violating their comfort zone and the kids may learn to accept anyone into those uncomfortable spaces." Lisa E. also agrees, and shares how she's teaching her own son about respecting his body and his own physical space:
"The boundary we're teaching our child is to listen to his own 'gut feeling.' He tells us whenever he feels uncomfortable around someone (usually whispering so he doesn't hurt feelings). He never has to touch or be touched if he feels uncomfortable — family or otherwise. I will never force him to kiss anyone — even if a great aunt is visiting who may get her feelings hurt. Hugs and kisses are his to give and are not compulsory."
Hetter also reminds us that forcing our kids to be affectionate when they don't want to can impact their sexual relationships as teens, because it "teaches them to use their body to please you or someone else in authority or, really, anyone."
"Affection should never be forced."
In addition to preventing abuse, many moms feel it's important to try to understand how your child feels when a relative demands physical affection. Jenni D. references her own memories from childhood as a guideline in her parenting: "As a kid, I didn't like to be hugged or kissed much except by my mom, and hated when my grandma would force me to kiss her goodbye. As an adult, I love giving kisses and snuggles to my kids, but if they would ever seem like they didn't want me to hug or kiss them I would respect that."
As Jenni D.'s comment points out, forced affection between a parent and child is concerning as well. Stacey's kids became uncomfortable when her husband, who is their stepfather, became too demanding of hugs and kisses. In situations like this, members urge Stacey to have her husband back down. Lorena M. explains that "kisses and hugs should come out because one feels like giving them and not because they're pressured." A reader who goes by "Dove" is even more emphatic: "Affection should never be forced."
How to Head Off a Relative's Hurt Feelings
Toddlers often test our patience by refusing to do things that we actually do have to find a way to make them do, such as eating, bathing, and behaving well. However, refusing affection should not be equated with bad manners or bad behavior. Hetter asserts that children can (and should) be polite and respectful while still maintaining their own personal boundaries: "Manners — treating people with respect and care — is different than demanding physical displays of affection."
A good first step may be to explain your policy to relatives. Adults, even close relatives, should be able to respect your decision. Hetter found that while it can be more work, it can also lead them to truly appreciate the affection they do get from your child. "I explain to relatives who want to know why we're letting her decide who she touches, and when she does hug them, the joy is palpable — not from obligation or a direct order from Mom," she says.
Hetter also offers suggestions for greetings that are less intimate, and that are perfect for a child in the early stages of getting to know a new family member. Instead of kisses and hugs, encourage a handshake or a high-five: "When kids are really little and shy, parents can start to offer them choices for treating people with respect and care. Even shy kids can shake somebody's hand or wave or do something to communicate respect and care."
Far from disappointing, these alternatives can actually strengthen a relative's relationship with your young child, as Angie S.'s story shows: "You could do what my boyfriend and our son do, they have a special hand shake. He will even stay awake, and when he hears his dad come home from work he'll come out just to do their shake."
How do you and your child handle social situations?
The views expressed in this article are those of the author and do not necessarily represent the views of, and should not be attributed to, POPSUGAR. | {
"pile_set_name": "OpenWebText2"
} |
// Code generated by protoc-gen-go. DO NOT EDIT.
// source: google.golang.org/appengine/internal/urlfetch/urlfetch_service.proto
package urlfetch
import proto "github.com/golang/protobuf/proto"
import fmt "fmt"
import math "math"
// Reference imports to suppress errors if they are not otherwise used.
var _ = proto.Marshal
var _ = fmt.Errorf
var _ = math.Inf
// This is a compile-time assertion to ensure that this generated file
// is compatible with the proto package it is being compiled against.
// A compilation error at this line likely means your copy of the
// proto package needs to be updated.
const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
type URLFetchServiceError_ErrorCode int32
const (
URLFetchServiceError_OK URLFetchServiceError_ErrorCode = 0
URLFetchServiceError_INVALID_URL URLFetchServiceError_ErrorCode = 1
URLFetchServiceError_FETCH_ERROR URLFetchServiceError_ErrorCode = 2
URLFetchServiceError_UNSPECIFIED_ERROR URLFetchServiceError_ErrorCode = 3
URLFetchServiceError_RESPONSE_TOO_LARGE URLFetchServiceError_ErrorCode = 4
URLFetchServiceError_DEADLINE_EXCEEDED URLFetchServiceError_ErrorCode = 5
URLFetchServiceError_SSL_CERTIFICATE_ERROR URLFetchServiceError_ErrorCode = 6
URLFetchServiceError_DNS_ERROR URLFetchServiceError_ErrorCode = 7
URLFetchServiceError_CLOSED URLFetchServiceError_ErrorCode = 8
URLFetchServiceError_INTERNAL_TRANSIENT_ERROR URLFetchServiceError_ErrorCode = 9
URLFetchServiceError_TOO_MANY_REDIRECTS URLFetchServiceError_ErrorCode = 10
URLFetchServiceError_MALFORMED_REPLY URLFetchServiceError_ErrorCode = 11
URLFetchServiceError_CONNECTION_ERROR URLFetchServiceError_ErrorCode = 12
)
var URLFetchServiceError_ErrorCode_name = map[int32]string{
0: "OK",
1: "INVALID_URL",
2: "FETCH_ERROR",
3: "UNSPECIFIED_ERROR",
4: "RESPONSE_TOO_LARGE",
5: "DEADLINE_EXCEEDED",
6: "SSL_CERTIFICATE_ERROR",
7: "DNS_ERROR",
8: "CLOSED",
9: "INTERNAL_TRANSIENT_ERROR",
10: "TOO_MANY_REDIRECTS",
11: "MALFORMED_REPLY",
12: "CONNECTION_ERROR",
}
var URLFetchServiceError_ErrorCode_value = map[string]int32{
"OK": 0,
"INVALID_URL": 1,
"FETCH_ERROR": 2,
"UNSPECIFIED_ERROR": 3,
"RESPONSE_TOO_LARGE": 4,
"DEADLINE_EXCEEDED": 5,
"SSL_CERTIFICATE_ERROR": 6,
"DNS_ERROR": 7,
"CLOSED": 8,
"INTERNAL_TRANSIENT_ERROR": 9,
"TOO_MANY_REDIRECTS": 10,
"MALFORMED_REPLY": 11,
"CONNECTION_ERROR": 12,
}
func (x URLFetchServiceError_ErrorCode) Enum() *URLFetchServiceError_ErrorCode {
p := new(URLFetchServiceError_ErrorCode)
*p = x
return p
}
func (x URLFetchServiceError_ErrorCode) String() string {
return proto.EnumName(URLFetchServiceError_ErrorCode_name, int32(x))
}
func (x *URLFetchServiceError_ErrorCode) UnmarshalJSON(data []byte) error {
value, err := proto.UnmarshalJSONEnum(URLFetchServiceError_ErrorCode_value, data, "URLFetchServiceError_ErrorCode")
if err != nil {
return err
}
*x = URLFetchServiceError_ErrorCode(value)
return nil
}
func (URLFetchServiceError_ErrorCode) EnumDescriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{0, 0}
}
type URLFetchRequest_RequestMethod int32
const (
URLFetchRequest_GET URLFetchRequest_RequestMethod = 1
URLFetchRequest_POST URLFetchRequest_RequestMethod = 2
URLFetchRequest_HEAD URLFetchRequest_RequestMethod = 3
URLFetchRequest_PUT URLFetchRequest_RequestMethod = 4
URLFetchRequest_DELETE URLFetchRequest_RequestMethod = 5
URLFetchRequest_PATCH URLFetchRequest_RequestMethod = 6
)
var URLFetchRequest_RequestMethod_name = map[int32]string{
1: "GET",
2: "POST",
3: "HEAD",
4: "PUT",
5: "DELETE",
6: "PATCH",
}
var URLFetchRequest_RequestMethod_value = map[string]int32{
"GET": 1,
"POST": 2,
"HEAD": 3,
"PUT": 4,
"DELETE": 5,
"PATCH": 6,
}
func (x URLFetchRequest_RequestMethod) Enum() *URLFetchRequest_RequestMethod {
p := new(URLFetchRequest_RequestMethod)
*p = x
return p
}
func (x URLFetchRequest_RequestMethod) String() string {
return proto.EnumName(URLFetchRequest_RequestMethod_name, int32(x))
}
func (x *URLFetchRequest_RequestMethod) UnmarshalJSON(data []byte) error {
value, err := proto.UnmarshalJSONEnum(URLFetchRequest_RequestMethod_value, data, "URLFetchRequest_RequestMethod")
if err != nil {
return err
}
*x = URLFetchRequest_RequestMethod(value)
return nil
}
func (URLFetchRequest_RequestMethod) EnumDescriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{1, 0}
}
type URLFetchServiceError struct {
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *URLFetchServiceError) Reset() { *m = URLFetchServiceError{} }
func (m *URLFetchServiceError) String() string { return proto.CompactTextString(m) }
func (*URLFetchServiceError) ProtoMessage() {}
func (*URLFetchServiceError) Descriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{0}
}
func (m *URLFetchServiceError) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_URLFetchServiceError.Unmarshal(m, b)
}
func (m *URLFetchServiceError) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_URLFetchServiceError.Marshal(b, m, deterministic)
}
func (dst *URLFetchServiceError) XXX_Merge(src proto.Message) {
xxx_messageInfo_URLFetchServiceError.Merge(dst, src)
}
func (m *URLFetchServiceError) XXX_Size() int {
return xxx_messageInfo_URLFetchServiceError.Size(m)
}
func (m *URLFetchServiceError) XXX_DiscardUnknown() {
xxx_messageInfo_URLFetchServiceError.DiscardUnknown(m)
}
var xxx_messageInfo_URLFetchServiceError proto.InternalMessageInfo
type URLFetchRequest struct {
Method *URLFetchRequest_RequestMethod `protobuf:"varint,1,req,name=Method,enum=appengine.URLFetchRequest_RequestMethod" json:"Method,omitempty"`
Url *string `protobuf:"bytes,2,req,name=Url" json:"Url,omitempty"`
Header []*URLFetchRequest_Header `protobuf:"group,3,rep,name=Header,json=header" json:"header,omitempty"`
Payload []byte `protobuf:"bytes,6,opt,name=Payload" json:"Payload,omitempty"`
FollowRedirects *bool `protobuf:"varint,7,opt,name=FollowRedirects,def=1" json:"FollowRedirects,omitempty"`
Deadline *float64 `protobuf:"fixed64,8,opt,name=Deadline" json:"Deadline,omitempty"`
MustValidateServerCertificate *bool `protobuf:"varint,9,opt,name=MustValidateServerCertificate,def=1" json:"MustValidateServerCertificate,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *URLFetchRequest) Reset() { *m = URLFetchRequest{} }
func (m *URLFetchRequest) String() string { return proto.CompactTextString(m) }
func (*URLFetchRequest) ProtoMessage() {}
func (*URLFetchRequest) Descriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{1}
}
func (m *URLFetchRequest) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_URLFetchRequest.Unmarshal(m, b)
}
func (m *URLFetchRequest) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_URLFetchRequest.Marshal(b, m, deterministic)
}
func (dst *URLFetchRequest) XXX_Merge(src proto.Message) {
xxx_messageInfo_URLFetchRequest.Merge(dst, src)
}
func (m *URLFetchRequest) XXX_Size() int {
return xxx_messageInfo_URLFetchRequest.Size(m)
}
func (m *URLFetchRequest) XXX_DiscardUnknown() {
xxx_messageInfo_URLFetchRequest.DiscardUnknown(m)
}
var xxx_messageInfo_URLFetchRequest proto.InternalMessageInfo
const Default_URLFetchRequest_FollowRedirects bool = true
const Default_URLFetchRequest_MustValidateServerCertificate bool = true
func (m *URLFetchRequest) GetMethod() URLFetchRequest_RequestMethod {
if m != nil && m.Method != nil {
return *m.Method
}
return URLFetchRequest_GET
}
func (m *URLFetchRequest) GetUrl() string {
if m != nil && m.Url != nil {
return *m.Url
}
return ""
}
func (m *URLFetchRequest) GetHeader() []*URLFetchRequest_Header {
if m != nil {
return m.Header
}
return nil
}
func (m *URLFetchRequest) GetPayload() []byte {
if m != nil {
return m.Payload
}
return nil
}
func (m *URLFetchRequest) GetFollowRedirects() bool {
if m != nil && m.FollowRedirects != nil {
return *m.FollowRedirects
}
return Default_URLFetchRequest_FollowRedirects
}
func (m *URLFetchRequest) GetDeadline() float64 {
if m != nil && m.Deadline != nil {
return *m.Deadline
}
return 0
}
func (m *URLFetchRequest) GetMustValidateServerCertificate() bool {
if m != nil && m.MustValidateServerCertificate != nil {
return *m.MustValidateServerCertificate
}
return Default_URLFetchRequest_MustValidateServerCertificate
}
type URLFetchRequest_Header struct {
Key *string `protobuf:"bytes,4,req,name=Key" json:"Key,omitempty"`
Value *string `protobuf:"bytes,5,req,name=Value" json:"Value,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *URLFetchRequest_Header) Reset() { *m = URLFetchRequest_Header{} }
func (m *URLFetchRequest_Header) String() string { return proto.CompactTextString(m) }
func (*URLFetchRequest_Header) ProtoMessage() {}
func (*URLFetchRequest_Header) Descriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{1, 0}
}
func (m *URLFetchRequest_Header) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_URLFetchRequest_Header.Unmarshal(m, b)
}
func (m *URLFetchRequest_Header) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_URLFetchRequest_Header.Marshal(b, m, deterministic)
}
func (dst *URLFetchRequest_Header) XXX_Merge(src proto.Message) {
xxx_messageInfo_URLFetchRequest_Header.Merge(dst, src)
}
func (m *URLFetchRequest_Header) XXX_Size() int {
return xxx_messageInfo_URLFetchRequest_Header.Size(m)
}
func (m *URLFetchRequest_Header) XXX_DiscardUnknown() {
xxx_messageInfo_URLFetchRequest_Header.DiscardUnknown(m)
}
var xxx_messageInfo_URLFetchRequest_Header proto.InternalMessageInfo
func (m *URLFetchRequest_Header) GetKey() string {
if m != nil && m.Key != nil {
return *m.Key
}
return ""
}
func (m *URLFetchRequest_Header) GetValue() string {
if m != nil && m.Value != nil {
return *m.Value
}
return ""
}
type URLFetchResponse struct {
Content []byte `protobuf:"bytes,1,opt,name=Content" json:"Content,omitempty"`
StatusCode *int32 `protobuf:"varint,2,req,name=StatusCode" json:"StatusCode,omitempty"`
Header []*URLFetchResponse_Header `protobuf:"group,3,rep,name=Header,json=header" json:"header,omitempty"`
ContentWasTruncated *bool `protobuf:"varint,6,opt,name=ContentWasTruncated,def=0" json:"ContentWasTruncated,omitempty"`
ExternalBytesSent *int64 `protobuf:"varint,7,opt,name=ExternalBytesSent" json:"ExternalBytesSent,omitempty"`
ExternalBytesReceived *int64 `protobuf:"varint,8,opt,name=ExternalBytesReceived" json:"ExternalBytesReceived,omitempty"`
FinalUrl *string `protobuf:"bytes,9,opt,name=FinalUrl" json:"FinalUrl,omitempty"`
ApiCpuMilliseconds *int64 `protobuf:"varint,10,opt,name=ApiCpuMilliseconds,def=0" json:"ApiCpuMilliseconds,omitempty"`
ApiBytesSent *int64 `protobuf:"varint,11,opt,name=ApiBytesSent,def=0" json:"ApiBytesSent,omitempty"`
ApiBytesReceived *int64 `protobuf:"varint,12,opt,name=ApiBytesReceived,def=0" json:"ApiBytesReceived,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *URLFetchResponse) Reset() { *m = URLFetchResponse{} }
func (m *URLFetchResponse) String() string { return proto.CompactTextString(m) }
func (*URLFetchResponse) ProtoMessage() {}
func (*URLFetchResponse) Descriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{2}
}
func (m *URLFetchResponse) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_URLFetchResponse.Unmarshal(m, b)
}
func (m *URLFetchResponse) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_URLFetchResponse.Marshal(b, m, deterministic)
}
func (dst *URLFetchResponse) XXX_Merge(src proto.Message) {
xxx_messageInfo_URLFetchResponse.Merge(dst, src)
}
func (m *URLFetchResponse) XXX_Size() int {
return xxx_messageInfo_URLFetchResponse.Size(m)
}
func (m *URLFetchResponse) XXX_DiscardUnknown() {
xxx_messageInfo_URLFetchResponse.DiscardUnknown(m)
}
var xxx_messageInfo_URLFetchResponse proto.InternalMessageInfo
const Default_URLFetchResponse_ContentWasTruncated bool = false
const Default_URLFetchResponse_ApiCpuMilliseconds int64 = 0
const Default_URLFetchResponse_ApiBytesSent int64 = 0
const Default_URLFetchResponse_ApiBytesReceived int64 = 0
func (m *URLFetchResponse) GetContent() []byte {
if m != nil {
return m.Content
}
return nil
}
func (m *URLFetchResponse) GetStatusCode() int32 {
if m != nil && m.StatusCode != nil {
return *m.StatusCode
}
return 0
}
func (m *URLFetchResponse) GetHeader() []*URLFetchResponse_Header {
if m != nil {
return m.Header
}
return nil
}
func (m *URLFetchResponse) GetContentWasTruncated() bool {
if m != nil && m.ContentWasTruncated != nil {
return *m.ContentWasTruncated
}
return Default_URLFetchResponse_ContentWasTruncated
}
func (m *URLFetchResponse) GetExternalBytesSent() int64 {
if m != nil && m.ExternalBytesSent != nil {
return *m.ExternalBytesSent
}
return 0
}
func (m *URLFetchResponse) GetExternalBytesReceived() int64 {
if m != nil && m.ExternalBytesReceived != nil {
return *m.ExternalBytesReceived
}
return 0
}
func (m *URLFetchResponse) GetFinalUrl() string {
if m != nil && m.FinalUrl != nil {
return *m.FinalUrl
}
return ""
}
func (m *URLFetchResponse) GetApiCpuMilliseconds() int64 {
if m != nil && m.ApiCpuMilliseconds != nil {
return *m.ApiCpuMilliseconds
}
return Default_URLFetchResponse_ApiCpuMilliseconds
}
func (m *URLFetchResponse) GetApiBytesSent() int64 {
if m != nil && m.ApiBytesSent != nil {
return *m.ApiBytesSent
}
return Default_URLFetchResponse_ApiBytesSent
}
func (m *URLFetchResponse) GetApiBytesReceived() int64 {
if m != nil && m.ApiBytesReceived != nil {
return *m.ApiBytesReceived
}
return Default_URLFetchResponse_ApiBytesReceived
}
type URLFetchResponse_Header struct {
Key *string `protobuf:"bytes,4,req,name=Key" json:"Key,omitempty"`
Value *string `protobuf:"bytes,5,req,name=Value" json:"Value,omitempty"`
XXX_NoUnkeyedLiteral struct{} `json:"-"`
XXX_unrecognized []byte `json:"-"`
XXX_sizecache int32 `json:"-"`
}
func (m *URLFetchResponse_Header) Reset() { *m = URLFetchResponse_Header{} }
func (m *URLFetchResponse_Header) String() string { return proto.CompactTextString(m) }
func (*URLFetchResponse_Header) ProtoMessage() {}
func (*URLFetchResponse_Header) Descriptor() ([]byte, []int) {
return fileDescriptor_urlfetch_service_b245a7065f33bced, []int{2, 0}
}
func (m *URLFetchResponse_Header) XXX_Unmarshal(b []byte) error {
return xxx_messageInfo_URLFetchResponse_Header.Unmarshal(m, b)
}
func (m *URLFetchResponse_Header) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
return xxx_messageInfo_URLFetchResponse_Header.Marshal(b, m, deterministic)
}
func (dst *URLFetchResponse_Header) XXX_Merge(src proto.Message) {
xxx_messageInfo_URLFetchResponse_Header.Merge(dst, src)
}
func (m *URLFetchResponse_Header) XXX_Size() int {
return xxx_messageInfo_URLFetchResponse_Header.Size(m)
}
func (m *URLFetchResponse_Header) XXX_DiscardUnknown() {
xxx_messageInfo_URLFetchResponse_Header.DiscardUnknown(m)
}
var xxx_messageInfo_URLFetchResponse_Header proto.InternalMessageInfo
func (m *URLFetchResponse_Header) GetKey() string {
if m != nil && m.Key != nil {
return *m.Key
}
return ""
}
func (m *URLFetchResponse_Header) GetValue() string {
if m != nil && m.Value != nil {
return *m.Value
}
return ""
}
func init() {
proto.RegisterType((*URLFetchServiceError)(nil), "appengine.URLFetchServiceError")
proto.RegisterType((*URLFetchRequest)(nil), "appengine.URLFetchRequest")
proto.RegisterType((*URLFetchRequest_Header)(nil), "appengine.URLFetchRequest.Header")
proto.RegisterType((*URLFetchResponse)(nil), "appengine.URLFetchResponse")
proto.RegisterType((*URLFetchResponse_Header)(nil), "appengine.URLFetchResponse.Header")
}
func init() {
proto.RegisterFile("google.golang.org/appengine/internal/urlfetch/urlfetch_service.proto", fileDescriptor_urlfetch_service_b245a7065f33bced)
}
var fileDescriptor_urlfetch_service_b245a7065f33bced = []byte{
// 770 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x94, 0x54, 0xdd, 0x6e, 0xe3, 0x54,
0x10, 0xc6, 0x76, 0x7e, 0xa7, 0x5d, 0x7a, 0x76, 0xb6, 0x45, 0x66, 0xb5, 0xa0, 0x10, 0x09, 0x29,
0x17, 0x90, 0x2e, 0x2b, 0x24, 0x44, 0xaf, 0x70, 0xed, 0x93, 0xad, 0xa9, 0x63, 0x47, 0xc7, 0x4e,
0x61, 0xb9, 0xb1, 0xac, 0x78, 0x9a, 0x5a, 0xb2, 0xec, 0x60, 0x9f, 0x2c, 0xf4, 0x35, 0x78, 0x0d,
0xde, 0x87, 0xa7, 0xe1, 0x02, 0x9d, 0xc4, 0xc9, 0x6e, 0xbb, 0xd1, 0x4a, 0x5c, 0x65, 0xe6, 0x9b,
0xef, 0xcc, 0x99, 0x7c, 0xdf, 0xf8, 0x80, 0xb3, 0x2c, 0xcb, 0x65, 0x4e, 0xe3, 0x65, 0x99, 0x27,
0xc5, 0x72, 0x5c, 0x56, 0xcb, 0xf3, 0x64, 0xb5, 0xa2, 0x62, 0x99, 0x15, 0x74, 0x9e, 0x15, 0x92,
0xaa, 0x22, 0xc9, 0xcf, 0xd7, 0x55, 0x7e, 0x4b, 0x72, 0x71, 0xb7, 0x0f, 0xe2, 0x9a, 0xaa, 0xb7,
0xd9, 0x82, 0xc6, 0xab, 0xaa, 0x94, 0x25, 0xf6, 0xf7, 0x67, 0x86, 0x7f, 0xeb, 0x70, 0x3a, 0x17,
0xde, 0x44, 0xb1, 0xc2, 0x2d, 0x89, 0x57, 0x55, 0x59, 0x0d, 0xff, 0xd2, 0xa1, 0xbf, 0x89, 0xec,
0x32, 0x25, 0xec, 0x80, 0x1e, 0x5c, 0xb3, 0x4f, 0xf0, 0x04, 0x8e, 0x5c, 0xff, 0xc6, 0xf2, 0x5c,
0x27, 0x9e, 0x0b, 0x8f, 0x69, 0x0a, 0x98, 0xf0, 0xc8, 0xbe, 0x8a, 0xb9, 0x10, 0x81, 0x60, 0x3a,
0x9e, 0xc1, 0xd3, 0xb9, 0x1f, 0xce, 0xb8, 0xed, 0x4e, 0x5c, 0xee, 0x34, 0xb0, 0x81, 0x9f, 0x01,
0x0a, 0x1e, 0xce, 0x02, 0x3f, 0xe4, 0x71, 0x14, 0x04, 0xb1, 0x67, 0x89, 0xd7, 0x9c, 0xb5, 0x14,
0xdd, 0xe1, 0x96, 0xe3, 0xb9, 0x3e, 0x8f, 0xf9, 0xaf, 0x36, 0xe7, 0x0e, 0x77, 0x58, 0x1b, 0x3f,
0x87, 0xb3, 0x30, 0xf4, 0x62, 0x9b, 0x8b, 0xc8, 0x9d, 0xb8, 0xb6, 0x15, 0xf1, 0xa6, 0x53, 0x07,
0x9f, 0x40, 0xdf, 0xf1, 0xc3, 0x26, 0xed, 0x22, 0x40, 0xc7, 0xf6, 0x82, 0x90, 0x3b, 0xac, 0x87,
0x2f, 0xc0, 0x74, 0xfd, 0x88, 0x0b, 0xdf, 0xf2, 0xe2, 0x48, 0x58, 0x7e, 0xe8, 0x72, 0x3f, 0x6a,
0x98, 0x7d, 0x35, 0x82, 0xba, 0x79, 0x6a, 0xf9, 0x6f, 0x62, 0xc1, 0x1d, 0x57, 0x70, 0x3b, 0x0a,
0x19, 0xe0, 0x33, 0x38, 0x99, 0x5a, 0xde, 0x24, 0x10, 0x53, 0xee, 0xc4, 0x82, 0xcf, 0xbc, 0x37,
0xec, 0x08, 0x4f, 0x81, 0xd9, 0x81, 0xef, 0x73, 0x3b, 0x72, 0x03, 0xbf, 0x69, 0x71, 0x3c, 0xfc,
0xc7, 0x80, 0x93, 0x9d, 0x5a, 0x82, 0x7e, 0x5f, 0x53, 0x2d, 0xf1, 0x27, 0xe8, 0x4c, 0x49, 0xde,
0x95, 0xa9, 0xa9, 0x0d, 0xf4, 0xd1, 0xa7, 0xaf, 0x46, 0xe3, 0xbd, 0xba, 0xe3, 0x47, 0xdc, 0x71,
0xf3, 0xbb, 0xe5, 0x8b, 0xe6, 0x1c, 0x32, 0x30, 0xe6, 0x55, 0x6e, 0xea, 0x03, 0x7d, 0xd4, 0x17,
0x2a, 0xc4, 0x1f, 0xa1, 0x73, 0x47, 0x49, 0x4a, 0x95, 0x69, 0x0c, 0x8c, 0x11, 0xbc, 0xfa, 0xea,
0x23, 0x3d, 0xaf, 0x36, 0x44, 0xd1, 0x1c, 0xc0, 0x17, 0xd0, 0x9d, 0x25, 0xf7, 0x79, 0x99, 0xa4,
0x66, 0x67, 0xa0, 0x8d, 0x8e, 0x2f, 0xf5, 0x9e, 0x26, 0x76, 0x10, 0x8e, 0xe1, 0x64, 0x52, 0xe6,
0x79, 0xf9, 0x87, 0xa0, 0x34, 0xab, 0x68, 0x21, 0x6b, 0xb3, 0x3b, 0xd0, 0x46, 0xbd, 0x8b, 0x96,
0xac, 0xd6, 0x24, 0x1e, 0x17, 0xf1, 0x39, 0xf4, 0x1c, 0x4a, 0xd2, 0x3c, 0x2b, 0xc8, 0xec, 0x0d,
0xb4, 0x91, 0x26, 0xf6, 0x39, 0xfe, 0x0c, 0x5f, 0x4c, 0xd7, 0xb5, 0xbc, 0x49, 0xf2, 0x2c, 0x4d,
0x24, 0xa9, 0xed, 0xa1, 0xca, 0xa6, 0x4a, 0x66, 0xb7, 0xd9, 0x22, 0x91, 0x64, 0xf6, 0xdf, 0xeb,
0xfc, 0x71, 0xea, 0xf3, 0x97, 0xd0, 0xd9, 0xfe, 0x0f, 0x25, 0xc6, 0x35, 0xdd, 0x9b, 0xad, 0xad,
0x18, 0xd7, 0x74, 0x8f, 0xa7, 0xd0, 0xbe, 0x49, 0xf2, 0x35, 0x99, 0xed, 0x0d, 0xb6, 0x4d, 0x86,
0x1e, 0x3c, 0x79, 0xa0, 0x26, 0x76, 0xc1, 0x78, 0xcd, 0x23, 0xa6, 0x61, 0x0f, 0x5a, 0xb3, 0x20,
0x8c, 0x98, 0xae, 0xa2, 0x2b, 0x6e, 0x39, 0xcc, 0x50, 0xc5, 0xd9, 0x3c, 0x62, 0x2d, 0xb5, 0x2e,
0x0e, 0xf7, 0x78, 0xc4, 0x59, 0x1b, 0xfb, 0xd0, 0x9e, 0x59, 0x91, 0x7d, 0xc5, 0x3a, 0xc3, 0x7f,
0x0d, 0x60, 0xef, 0x84, 0xad, 0x57, 0x65, 0x51, 0x13, 0x9a, 0xd0, 0xb5, 0xcb, 0x42, 0x52, 0x21,
0x4d, 0x4d, 0x49, 0x29, 0x76, 0x29, 0x7e, 0x09, 0x10, 0xca, 0x44, 0xae, 0x6b, 0xf5, 0x71, 0x6c,
0x8c, 0x6b, 0x8b, 0xf7, 0x10, 0xbc, 0x78, 0xe4, 0xdf, 0xf0, 0xa0, 0x7f, 0xdb, 0x6b, 0x1e, 0x1b,
0xf8, 0x03, 0x3c, 0x6b, 0xae, 0xf9, 0x25, 0xa9, 0xa3, 0x6a, 0x5d, 0x28, 0x81, 0xb6, 0x66, 0xf6,
0x2e, 0xda, 0xb7, 0x49, 0x5e, 0x93, 0x38, 0xc4, 0xc0, 0x6f, 0xe0, 0x29, 0xff, 0x73, 0xfb, 0x02,
0x5c, 0xde, 0x4b, 0xaa, 0x43, 0x35, 0xb8, 0x72, 0xd7, 0x10, 0x1f, 0x16, 0xf0, 0x7b, 0x38, 0x7b,
0x00, 0x0a, 0x5a, 0x50, 0xf6, 0x96, 0xd2, 0x8d, 0xcd, 0x86, 0x38, 0x5c, 0x54, 0xfb, 0x30, 0xc9,
0x8a, 0x24, 0x57, 0xfb, 0xaa, 0xec, 0xed, 0x8b, 0x7d, 0x8e, 0xdf, 0x01, 0x5a, 0xab, 0xcc, 0x5e,
0xad, 0xa7, 0x59, 0x9e, 0x67, 0x35, 0x2d, 0xca, 0x22, 0xad, 0x4d, 0x50, 0xed, 0x2e, 0xb4, 0x97,
0xe2, 0x40, 0x11, 0xbf, 0x86, 0x63, 0x6b, 0x95, 0xbd, 0x9b, 0xf6, 0x68, 0x47, 0x7e, 0x00, 0xe3,
0xb7, 0xc0, 0x76, 0xf9, 0x7e, 0xcc, 0xe3, 0x1d, 0xf5, 0x83, 0xd2, 0xff, 0x5f, 0xa6, 0x4b, 0xf8,
0xad, 0xb7, 0x7b, 0x2a, 0xff, 0x0b, 0x00, 0x00, 0xff, 0xff, 0x1d, 0x9f, 0x6d, 0x24, 0x63, 0x05,
0x00, 0x00,
}
| {
"pile_set_name": "Github"
} |
The broken, disastrous marriage between Pablo Sandoval and the Boston Red Sox, an ill-fated union exceeded in its dysfunction only by a Kardashian coupling, could be nearing its end. Here’s how ugly it has gotten, major league sources told Yahoo Sports: Sandoval wants to stay in Boston only if he can play every day, and the Red Sox have no intention of playing him unless he loses weight and others in their current lineup struggle.
Pablo Sandoval could be on his way out of Boston. (AP Photo) More
Facilitating an exit for Sandoval won’t be easy because of the more than $75 million remaining on his Red Sox contract and the team’s desire not to eat all of the money by cutting him. Sandoval’s trip to the 15-day disabled list Wednesday – a trip caused by a supposed left shoulder injury that took everyone, including the team, by surprise – buys the Red Sox enough time to explore all their options and determine whether any trade market exists before possibly jettisoning him.
The curiosity of the DL move grew as the day went on. Sandoval complained of mysterious left shoulder pain, and the Red Sox chose to immediately place him on the disabled list without having tried to diagnose the severity of the injury with an MRI, sources told Yahoo Sports. By the end of Wednesday, Sandoval still hadn’t visited an MRI machine, a standard procedure that precedes a DL trip in nearly every case but catastrophic injuries.
Perhaps both sides saw the DL trip as mutually beneficial. Sandoval, a two-time All-Star and World Series MVP who lost his starting job at third base during spring training, no longer had to watch manager John Farrell choose others ahead of him as pinch hitters or defensive replacements. The Red Sox, ostensibly using a 24-man roster, could free up a roster spot for someone Farrell actually might play.
Both parties, at least publicly, did their part to maintain the façade of détente. Farrell told reporters: “I still firmly believe that Panda is going to be a contributor to this team.” Said Sandoval: “I signed here for five years, so I’m here. ... I love being here.”
Rival teams know this much: Sandoval’s value is less than nil, and the Red Sox’s new regime, never shy to bury a player, spent all spring treating the 29-year-old third baseman as a sunk cost. From the start of camp, when Sandoval’s waistline turned into a headline and devolved into a punchline, his fit with the Red Sox was iffy. Boston shoehorned Travis Shaw in at third base, and when the experiment worked, Sandoval was out of a starting job.
His travails during the season’s first week didn’t help. Sandwiched in between two failed pinch-hitting appearances was one start in which Sandoval went 0 for 4 and destroyed his belt in the act of swinging. This was not the player on whom the Red Sox a year earlier had lavished a five-year, $95 million deal.
Where Sandoval could end up remains a mystery. The team with which he has been tied most often, San Diego, has cooled on Sandoval since pursuing him in free agency during the 2014-15 offseason, according to a source. Considering the widespread interest in Sandoval during his free agency – he was coming off a postseason in which he hit .366 and won his third championship with the San Francisco Giants, erasing concerns with some teams about an average regular season – his parched market remains slightly surprising.
Story continues | {
"pile_set_name": "OpenWebText2"
} |
Narrative therapy vs. cognitive-behavioral therapy for moderate depression: empirical evidence from a controlled clinical trial.
Systematic studies of the efficacy of Narrative Therapy (NT) for depression are sparse. To evaluate the efficacy of individual NT for moderate depression in adults compared to Cognitive-Behavioral Therapy (CBT). Sixty-three depressed clients were assigned to either NT or CBT. The Beck Depression Inventory-II (BDI-II) and Outcome Questionnaire-45.2 (OQ-45.2) were used as outcome measures. We found a significant symptomatic reduction in both treatments. Group differences favoring CBT were found on the BDI-II, but not on the OQ-45.2. Pre- to post-treatment effect sizes for completers in both groups were superior to benchmarked waiting-list control groups. | {
"pile_set_name": "PubMed Abstracts"
} |
361 F.Supp.2d 510 (2005)
Matthew J. BENNETT, Plaintiff,
v.
UNITED STATES of America, Defendant.
No. CIV.A. 7:04CV00705.
United States District Court, W.D. Virginia, Roanoke Division.
March 29, 2005.
*511 Matthew J. Bennett, Troutville, VA, pro se.
Charles H. Keen, United States Department of Justice, Washington, DC, for Defendant.
*512 MEMORANDUM OPINION
CONRAD, District Judge.
Michael J. Bennett ("Bennett") brings this action pursuant to 26 U.S.C. § 7433 claiming that the Internal Revenue Service ("IRS") improperly requested that his employer disregard his W-4 and withhold federal income taxes in accordance with its direction. Bennett seeks an injunction to prevent the IRS from continuing its action as well as the return of all funds withheld in accordance with IRS instructions. This case is before the court on defendant's motion to dismiss pursuant to Federal Rules of Civil Procedure 12(b)(1) and 12(b)(6). For the reasons stated below, the court will grant defendant's motion to dismiss.
FACTUAL BACKGROUND
In a letter dated December 5, 2003, Stephen P. Warner, an Operations Manager, Collection, with the Questionable W-4 Program at the Internal Revenue Service office in Fresno, California requested that Roanoke County Fire & Rescue, the employer of Matthew J. Bennett, disregard Bennett's W-4 and withhold tax as if he were claiming single filing status with zero allowances. Bennett's employer complied with the IRS's request. Bennett believed that the IRS had taken an unauthorized action and wrote a series of letters communicating his position to Stephen Warner; Marilyn Brincefield at Fresno Compliance Services; Representative Bob Goodlatte; the Inspector General for Tax Administration; and the Commissioner of the IRS.
In March of 2004, the Fresno IRS office forwarded Bennett's initial letter to the IRS Appeals Office in Fresno. The Appeals Officer incorrectly believed that Bennett was appealing a $500 penalty assessed because of an incorrect W-4 form. Bennett responded that he was not appealing a penalty but was contesting the validity of the IRS's instruction to his employer. On July 13, 2004, the Appeals Officer sent a second letter to Bennett informing him that the appeal procedure did not apply to refusals to comply with the tax laws because of constitutional or similar grounds. The Appeals Office then returned Bennett's file to the W-4 Unit as a premature referral.
On August 1, 2004, Bennett reiterated his position in another letter to Stephen Warner at the Questionable W-4 Unit in Fresno. Bennett stated that he believed the IRS had no authority to override his W-4 and to require his employer to withhold federal income tax in accordance with its instructions. In a letter dated August 25, 2004, Warner responded that the IRS did have the authority to enact regulations to administer and enforce the tax laws and that those regulations gave the IRS the authority to determine whether withholding certificates are correct. In a final letter sent on September 6, 2004, Bennett again stated his position and requested that the IRS rescind its earlier request to his employer. Bennett then filed this suit on November 30, 2004.
On February 14, 2005, the United States filed its motion to dismiss claiming that Bennett's suit is barred by the doctrine of sovereign immunity, the court lacks subject matter jurisdiction, and the complaint seeks prohibited declaratory and injunctive relief. Bennett filed a timely response to the government's motion on March 7, 2005.
STANDARD OF REVIEW
When deciding a motion to dismiss under Rule 12(b)(6), the court must determine "whether the complaint, under the facts alleged and under any facts that could be proved in support of the complaint, is legally sufficient." Eastern Shore Markets, Inc. v. J.D. Assocs., Ltd. Partnership, 213 F.3d 175, 180 (4th Cir.2000). The court must accept the allegations *513 in the complaint as true, and draw all reasonable factual inferences in favor of the plaintiff. The court should not dismiss a complaint for failure to state a claim, unless it appears beyond doubt that the plaintiff can prove no set of facts in support of his claim that would entitle him to relief. Conley v. Gibson, 355 U.S. 41, 45-46, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957).
DISCUSSION
I. Was the action of the IRS a collection action to which the remedy afforded by 26 U.S.C. § 7433 applies?
A taxpayer may bring an action against the United States in a district court if an officer or employee of the IRS, in connection with the collection of any federal tax, recklessly, intentionally, or negligently disregards any statutory or regulatory provision. 26 U.S.C. § 7433(a) (emphasis added). This waiver of sovereign immunity, however, "must be strictly observed and construed in favor of the sovereign." Gonsalves v. I.R.S., 975 F.2d 13, 15 (1st Cir.1992) (internal citations omitted). Therefore, the United States Court of Appeals for the Fourth Circuit has held that "§ 7433 provides for a `civil action' only for damages arising from the `collection' of taxes, not for damages arising from the investigation and determination of tax liability." Judicial Watch, Inc. v. Rossotti, 317 F.3d 401, 411 (4th Cir.2003). Furthermore, liability under that section arises only "where an IRS agent has violated the taxing statutes or the regulations promulgated under them." Gonsalves v. I.R.S., 975 F.2d 13, 16 (1st Cir.1992).
The government contends that the withholding process is a pre-assessment process and not a collection of tax in the usual sense of the word. The government also points out that a taxpayer need not initiate a lawsuit to recover excess withholdings because any excess withheld would be returned to the taxpayer when he filed his income tax return. The government concludes that, because there has been no collection action, the court lacks jurisdiction over Bennett's cause of action and his suit should be dismissed accordingly. Bennett responds that the correspondence he received from the IRS as well as various Internal Revenue Code sections do characterize withholding payments as "collections," not assessments or determinations of tax.
The assessment of a tax is "the decision to impose tax liability," while collection activity describes the "conduct of an agent trying to collect the taxes owed." Shaw v. United States, 20 F.3d 182, 184 (5th Cir.1994). If Bennett were disputing the withholding at issue here solely because he believed the IRS had improperly determined the correct number of allowances or his filing status, he would have no claim under § 7433 because such a claim would relate to the decision to impose tax liability and the determination of tax, rather than its collection.
In this case, however, Bennett claims that he is disputing the method of the withholding in that he claims the IRS improperly overrode his W-4 with its own instructions to his employer. In Gonsalves, supra, the Court described IRS action with regard to that plaintiff's income taxes as "collections" of the taxes withheld from the plaintiff's salary. 975 F.2d at 14. In fact, Title 26, Chapter 1, Subchapter C of the Code of Federal Regulations deals with the withholding of employment taxes and is entitled "Employment Taxes and Collection of Income Tax at the Source." (Emphasis added). It appears that the withholding of income taxes and the subsequent payment of those taxes to the government by an employer does fall within the definition of collection activities rather than assessment activities. *514 Therefore, Bennett's claim properly falls under 26 U.S.C. § 7433.
II. Did Bennett fail to properly exhaust his administrative remedies?
The government contends that Bennett failed to properly exhaust his administrative remedies and that, therefore, the court does not have jurisdiction to hear his claims. A taxpayer may not bring suit under 26 U.S.C. § 7433 until he has exhausted the administrative remedies available within the IRS. 26 U.S.C. § 7433(d)(1). Internal Revenue regulations lay out the proper procedure for bringing an administrative claim against the United States. See 26 C.F.R. § 301.7433-1(e). The regulations state that any administrative claim must be sent in writing to the Area Director, Attn: Compliance Technical Support Manager of the area in which the taxpayer resides. 26 C.F.R. § 301.7433-1(e)(1). A 2003 Internal Revenue Bulletin changed this provision and stated that claims should be sent to the case processing site for the area in which the taxpayer resides.2003-19, 2003-14 IRB 703, April 7, 2003.
The administrative claim must include the following information:
(i) The name, current address, current home and work telephone numbers and any convenient times to be contacted, and taxpayer identification number of the taxpayer making the claim;
(ii) The grounds, in reasonable detail, for the claim [];
(iii) A description of the injuries incurred by the taxpayer filing the claim [];
(iv) The dollar amount of the claim, including any damages that have not yet been incurred but which are reasonably foreseeable []; and
(v) The signature of the taxpayer or duly authorized representative.
26 C.F.R. § 301.7433-1(e)(2). The regulations go on to state that a taxpayer may not bring an action in federal district court for any amount in excess of that sought in the administrative claim, unless the taxpayer can show that "the increased amount is based upon newly discovered evidence not reasonably discoverable at the time the administrative claim was filed, or upon allegation and proof of intervening facts relating to the amount of the claim." 26 C.F.R. § 301.7433-1(f).
The government contends that Bennett failed to properly present his claim as required by the regulations. The government notes that, even if Bennett's letters were to be construed as a claim under § 7433, they fail to satisfy all of the requirements of the regulation. Specifically, none of Bennett's letters were sent to the correct place, only some contain the proper contact information, and none state a precise dollar amount of his claim. The government also notes that courts have interpreted the exhaustion requirement as jurisdictional, see e.g., Simmons v. United States, 875 F.Supp. 318, 319 (W.D.N.C.1994), and concludes that the court lacks jurisdiction here because Bennett failed to properly present his claim and exhaust his administrative remedies.
The plaintiff responds by characterizing the regulation at issue, 26 C.F.R. § 301.7433-1, as an "interpretive Treasury decision" not authorized by any particular statute and concludes that the provisions of the regulation are not binding on him and his claim. Contrary to plaintiff's contention, however, Congress has expressly delegated the administration and enforcement of the Internal Revenue Code to the Secretary of the Treasury who may prescribe regulations in furtherance of the purposes of the Code. 26 U.S.C. § 7801(a)(1). There is no allegation that *515 the regulation at issue here was improperly enacted.
Bennett next asserts that IRS employees, including Stephen Warner and Marilyn Brincefield, told him that his only remaining remedy was to file a lawsuit. Plaintiff also claims that he had written a letter directly to the IRS Commissioner who failed to respond or inform him of the proper steps to file his administrative claim. Bennett also contends that his letters to various personnel within the IRS did include all the necessary information required by the regulation. Finally, Bennett argues that he failed to include the specific amount of his claim because that amount continues to increase as his employer withholds the tax.
In Hunt v. United States, the plaintiff had also had voluminous correspondence with the IRS regarding allegedly improper liens. Hunt v. United States, 178 F.Supp.2d 537 (D.Md.2002). However, the plaintiff in Hunt had failed to provide the IRS with any documentation indicating the amount of damages he had allegedly suffered. 178 F.Supp.2d at 538. The Court held that "assertion of the amount of alleged damage is an essential part of the administrative remedy process; a claimant cannot recover an amount in excess of the dollar amount sought in the administrative claim." Id. Therefore, the Court found that all of the plaintiff's claims failed because he had failed to exhaust his administrative remedies. Id.
Likewise, in this case, Bennett failed to provide any representative of the IRS with the amount he claimed in damages. In addition, he failed to send his requests to the correct location for an administrative claim and failed to include the required information in some of the letters he did send to various offices. It does appear that Bennett has failed to follow the proper procedure for an administrative claim within the IRS and, as a result, has failed to exhaust his administrative remedies. Regardless of whether plaintiff has properly exhausted his administrative remedies, however, his claim would still fail because of the operation of the Anti-Injunction Act and the statute governing civil actions to obtain refunds of income taxes, as discussed below.
III. Is Bennett's requested relief barred by statute?
The government contends that the relief Bennett seeks, an injunction to prevent the IRS from refusing to accept his own W-4, is barred by the Anti-Injunction Act. The Anti-Injunction Act provides as follows:
[N]o suit for the purpose of restraining the assessment or collection of any tax shall be maintained in any court by any person, whether or not such person is the person against whom such tax was assessed.
26 U.S.C. § 7421(a). The Fourth Circuit has described the effect of the Act as "simple and obvious: courts lack jurisdiction to issue injunctive relief in suits seeking to restrain the assessment or collection of taxes." Judicial Watch, Inc. v. Rossotti, 317 F.3d 401, 405 (4th Cir.2003). Furthermore, the prohibition in the Act applies whenever "the IRS action represents `a good-faith effort to enforce the technical requirements of the tax laws.'" Id. at 407 (quoting Bob Jones University v. Simon, 416 U.S. 725, 740, 94 S.Ct. 2038, 40 L.Ed.2d 496 (1974)). Because Bennett seeks to restrain the IRS from collecting certain taxes, the Anti-Injunction Act would appear to apply unless one of two exceptions applies.
First, an action will not be barred if the plaintiff can show that (1) under no circumstances could the government ultimately prevail and (2) equity jurisdiction exists. Id. at 407. The plaintiff *516 bears this burden of proof and the government will obtain a dismissal if it has a good faith basis for its claim. Elias v. Connett, 908 F.2d 521, 525 (9th Cir.1990). To succeed in his claim, Bennett must prove that the IRS or its agents recklessly, intentionally, or negligently failed to follow the prescribed methods for the collections of taxes as established by statute or regulation. 26 U.S.C. § 7433(a). See also, Gonsalves v. IRS, 975 F.2d 13, 16 (1st Cir.1992); Shaw v. United States, 20 F.3d 182, 184 (5th Cir.1994). Bennett claims that the IRS had neither statutory nor regulatory authority to order his employer to withhold taxes from his paycheck at a rate other than that determined by the W-4 provided by Bennett to his employer. Specifically, Bennett claims that the regulation cited by the IRS as the basis of its authority to instruct his employer to disregard his W-4 is not authorized by any specific provision of the Internal Revenue Code.
Bennett's contention with regard to the invalidity of the regulation is without merit. As noted previously, the administration and enforcement of the Internal Revenue Code is delegated by statute to the Secretary of the Treasury who may prescribe regulations in furtherance of the purposes of the Code. See 26 U.S.C. § 7801(a)(1). Furthermore, all persons liable for any tax or the collection of any tax under the terms of the Internal Revenue Code are required to comply with the rules and regulations prescribed by the Secretary. 26 U.S.C. § 6001. One of those requirements is that an employer must deduct and withhold from its employees' wages the tax determined in accordance with the provisions of the Code. 26 U.S.C. § 3402. In fact, the employer itself can be liable to the government for the amount of the tax that must be withheld in accordance with the Code. 26 U.S.C. § 3403.
In furtherance of these purposes, regulations specify that the IRS may find that a withholding exemption certificate is defective and may instruct the employer to withhold taxes from the employee on the basis of instructions from the IRS rather than in accordance with the W-4 furnished by the employee. 26 C.F.R. § 31.3402(f)(2)-1(g)(5). Courts have noted that an employer is obligated to comply with the instructions of the IRS in withholding sums from the paychecks of its employees, even when those directions conflict with the information provided by the employee on his withholding certificate, because the employer is simply complying with applicable IRS code sections and regulations governing withholding. See, e.g., Chandler v. Perini Power Constructors, Inc., 520 F.Supp. 1152, 1153 (D.C.N.H.1981); McFarland v. Bechtel Petroleum, Inc., 586 F.Supp. 907, 910 (N.D.Cal.1984).
Here, the IRS appears to have acted in accordance with properly authorized regulations that permit it to override an employee's withholding certificate. In this case, there is no indication that the IRS did anything other than follow those requirements in notifying Bennett's employer to withhold at a different rate. Regardless of whether Bennett could ultimately prove that the IRS improperly calculated the proper number of exemptions, it appears that the IRS followed prescribed methods of collection and that, therefore, Bennett's claim under 26 U.S.C. § 7433 is without merit. Therefore, the first exception to the Anti-Injunction Act would not apply.
The second exception applies "where ... Congress has not provided the plaintiff with an alternative legal way to challenge the validity of the tax." Judicial Watch Inc., 317 F.3d at 408 (quoting South Carolina v. Regan, 465 U.S. 367, 373, 104 *517 S.Ct. 1107, 79 L.Ed.2d 372 (1984)). The exception would not apply, however, where a plaintiff has any access to judicial review, even if the plaintiff did not have access to a legal remedy for the precise harm allegedly suffered or did not like the available remedy. Id. In Bennett's case, he does have a legal remedy to reclaim any excess amount of income tax withheld. He can simply file his income tax return for the year and receive a full refund of any overpayment.[1] Therefore, this exception does not apply.
Bennett contends that, while the Anti-Injunction Act may bar an injunctive remedy for the authorized collection or assessment of tax, the Act does not apply here because the IRS has used an unauthorized collection method. Again, this goes back to his argument that the IRS has no authority to override the W-4 he provided to his employer and require his employer to withhold taxes at a higher rate. As noted previously, however, the regulations do appear to authorize the IRS to take such action. The Anti-Injunction Act is, therefore, a bar to Bennett's request for an order to restrain the IRS from taking its collection action.
In addition to his request for injunctive relief, Bennett has also requested that the court order the IRS to return all the income taxes withheld by his employer in accordance with the IRS's direction. Bennett claims that he will not ultimately owe any federal income tax.
Civil actions to obtain refunds of taxes are governed by 26 U.S.C. § 7422 which provides, in pertinent part, as follows:
No suit or proceeding shall be maintained in any court for the recovery of any internal revenue tax alleged to have been erroneously or illegally assessed or collected, ... or of any sum alleged to have been excessive or in any manner wrongfully collected, until a claim for refund or credit has been duly filed with the Secretary, according to the provisions of law in that regard, and the regulations of the Secretary established in pursuance thereof.
26 U.S.C. § 7422(a). The regulations regarding claims for credit or refund of income taxes specify that "in the case of an overpayment of income taxes, a claim for credit or refund of such overpayment shall be made on the appropriate income tax return." 26 C.F.R. § 301.6402-3(a)(1). A claim under § 7433 "was not intended to supplement or supersede, or to allow taxpayers to circumvent" the proper procedures under § 7422. Gonsalves v. I.R.S., 975 F.2d 13, 16 (1st Cir.1992). Therefore, unless a taxpayer files the proper refund claim, the district court lacks jurisdiction over a refund action. Szego v. C.I.R., 911 F.2d 724, 1990 WL 116744 (4th Cir.1990). Bennett has not alleged that he has made such a claim on any income tax return. As a result, it appears that he may not maintain a separate civil action under § 7433 to recover the amount of income tax that he alleges was excessive or wrongfully collected.
CONCLUSION
Bennett's cause of action is generally governed by 26 U.S.C. § 7433 because the withholding of federal income taxes and their subsequent payment to the government is properly considered a collection activity. Bennett's suit probably may be dismissed based upon his failure to exhaust his administrative remedies. Even if those remedies were properly exhausted, however, the court would lack jurisdiction *518 to entertain his claim because the relief Bennett requests is barred by the Anti-Injunction Act and the operation of 26 U.S.C. § 7422 governing suits for the refund of income taxes. In any case, Bennett has not suffered any real injury here because he has the opportunity to file his federal income tax return and receive the full amount of any income taxes withheld that are in excess of his ultimate tax liability. The court will grant the defendant's motion to dismiss.
The Clerk is directed to send certified copies of this Memorandum Opinion and the accompanying Order to plaintiff and all counsel of record.
ORDER
For the reasons stated in the accompanying Memorandum Opinion, it is hereby
ORDERED
that the defendant's motion to dismiss is GRANTED.
The Clerk is directed to send certified copies of this Order to plaintiff and all counsel of record.
NOTES
[1] Bennett has made no claim as to any interest potentially lost between the time his federal income taxes were withheld and the time of any tax refund, therefore the court need not address that issue.
| {
"pile_set_name": "FreeLaw"
} |
<%= javascript_include_tag "methods" %>
<style>
h2 {
text-align: center;
padding-top: 20px;
}
#topics {
columns: 3;
padding-left: 15%;
margin-bottom: 30px;
}
</style>
<div class="col-lg-12">
<div style="text-align:center;">
<h1 style="font-size:3.4em;margin-top:40px;"><%= raw translation('notes.tools_places.tools_and_techniques') %></h1>
<h4 style="color:#888;"><%= raw translation('notes.tools_places.subtitle') %></h4>
<p><i>Public Lab's community collaboratively develops many different DIY environmental monitoring and advocacy methods.</i></p>
<p><i>Browse them here and learn how to get involved.</i></p>
</div>
<div class="row">
<div class="col-lg-3"></div>
<div class="col-lg-6">
<div id="topics">
<% @topics.each do |topic| %>
<div><a data-topic="<%= topic %>" href="/methods/<%= topic %>"><%= topic %></a></div>
<% end %>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-3"></div>
<form class="topic-search col-lg-6 form-inline input-group" style="text-align:center; margin-left: 20px; margin-right: 20px;">
<input tabindex="1" class="form-control input-lg" type="text" placeholder="Search for methods by topic" />
<span class="input-group-btn" >
<button class="btn btn-lg btn-outline-secondary" type="submit"><i class="fa fa-search"></i></button>
</span>
</form>
</div>
<p><center>Find methods by topic or choose from the categories above.</center></p>
<div id="methods">
<% if params[:topic] %>
<h2>Methods related to "<%= params[:topic] %>"</h2>
<%= render partial: "notes/notes", locals: { notes: @nodes } %>
<% if @nodes.length == 0 %>
<p style="text-align:center;padding:10px;">No methods yet shared for this topic; <a href="">Reach out for help</a> or <a href="">learn how to share a relevant method</a>.</p>
<% end %>
<% else %>
<h2 class="recent">
<span class="no-results" style="display:none;text-align:center;">No matches / </span>
Recently updated
</h2>
<h2 class="related" style="display:none;">Related to "<span class="topic-title"></span>"</h2>
<%= render partial: "notes/notes", locals: { notes: @nodes } %>
<% end %>
</div>
<hr style="clear:both;" />
</div>
| {
"pile_set_name": "Github"
} |
As most members of the Jewish faith will confess in moments of candor, former President Jimmy Carter knows their struggle better than they do themselves. On Tuesday, Carter demonstrated his command of the issues confronting Jews around the globe when he insisted that the spate of anti-Semitic violence sweeping across Europe should for the most part be ignored.
Via The Washington Free Beacon, Carter recently sat down with Huffington Post Live host and college professor Marc Lamont Hill where he weighed in on the terrorist attacks in Paris as well as Israeli Prime Minister Benjamin Netanyahu’s invitation to French Jews to immigrate to Israel. Carter suggested that French Jews would be walking into a lion’s den if they took Netanyahu up on his offer.
“My guess is that the Jews who live in France will maybe not take this as a positive step, and say the only way you can be safe is to go to Israel,” Carter said in an interview with HuffPost Live. “I would guess that you may be, on the average, maybe safer in France than some places in Israel, but I’m not trying to make a judgment.”
In a sense, he’s right. There are some places in Israel that are not especially safe for Jews: Those areas within range of Hamas’s Qassam rockets or in West Bank settlements beyond Jerusalem’s protection, for example.
Despite Carter’s flippant dismissal, European Jews are well aware of their tenuous situation.
“Even among those inclined to condemn racism in any form, fighting anti-Semitism is no longer seen as a priority, with Jews often perceived as privileged compared with Muslims and other minorities confronted with discrimination” The New York Times reported last September.
With Europe still shaking from a populist backlash against fiscal austerity, some Jews speak of feeling politically isolated, without an ideological home. Many left-wing political parties are anti-Israel. Many right-wing parties, some with anti-Semitic origins, are extremist and virulently anti-immigrant. And many Jews who have voted with the Socialist Party in France and Belgium worry that those parties are weak and becoming more dependent on fast-growing Muslim voting blocs.
The Israeli war in Gaza this summer did nothing to end the isolation Europe’s Jews increasingly feel. This August, thousands of police were deployed across Europe in order to prevent anti-Semitic violence from flaring any further.
“Protesters have attacked synagogues, smashed the windows of Jewish-owned business and torched others, in scenes disturbingly reminiscent of the 1938 Kristallnacht in France,” The Telegraph reported ominously. “The marchers have chanted ‘Jews to the gas chambers’, and Jewish people have been attacked on the streets of Berlin.”
“Phrases like ‘Anne Frank Was a Liar,’ ‘Dirty Jews,’ ‘Jews your end is near,’ and ‘Israel executioner’ were written in spray paint alongside Celtic crosses and rows and rows of swastikas,” The Daily Beast confirmed.
France has the third largest Jewish population in the world, after Israel and the US. But the number of French Jews emigrating to Israel has risen sharply in recent years by 70 per cent in 2013, according to the Jewish Agency. In part, this may be fuelled by France’s economic problems, but many observers believe it is also being fuelled by a rise in anti-Semitic attacks in the country.
The latest wave of European Jews fleeing the hostile continent was even the subject of a Newsweek profile over the summer. “Thousands had gathered to demonstrate against the Israeli bombardment of Gaza. But the protest soon turned violent – and against Jews in general,” that piece read. “Two weeks later, 400 protesters attacked a synagogue and Jewish-owned businesses in Sarcelles, in the north of Paris, shouting ‘Death to the Jews’. Posters had even advertised the raid in advance, like the pogroms of Tsarist Russia.”
In America, the prospect of a new wave of European anti-Semitism of a scale unseen since World War II is enough to send the left into fits of condescending mockery. They are assured of that which is untrue, that Europe has progressed beyond anti-Semitic violence and hatred. It is ironic that those so possessed of their own correctness are equally determined to avoid confronting information that fails to comport with their worldview.
Despite Israel’s failings, that state’s Jewish residents can rest assured knowing their businesses will not be vandalized or that they will be assaulted on the streets by violent and prejudiced mobs.
For all their self-professed erudition, it is a wonder that the left seems so unwilling to address the inconvenient truths right under their noses. | {
"pile_set_name": "OpenWebText2"
} |
The owners have built a reputation on ultra-luxe Italian with their restaurants. They showcase regional Italian cuisines at these spectacular restaurants in the heart of D.C. The chef opened the bigger restaurant of the group in October specialized in Spanish cuisine.
INTERESTED? APPLY BELOW!
When are you available for a call?MondayTuesdayWednesdayThursdayFridaySaturdaySunday
What time do you prefer?MorningAfternoon
When you would like to come to the United States?
Year: *
Where would you like to go? Please choose a maximum of 3.Washington, D.CNew YorkMiamiSeattleVirginiaCalifornia
CV Upload
If you wish to apply for any of our opportunities, please send your resume to [email protected] and contact us through phone, message or whats up to +1 917 312 5184 from Monday to Friday during New York Business hours: from 9:00 a.m. to 6:30 p.m. For more information, please visit our website www.cheftrainingus.com | {
"pile_set_name": "Pile-CC"
} |
Stein Islands
Stein Islands () is a two rock islands in the east part of Publications Ice Shelf, about 8 nautical miles (15 km) southeast of the Sostrene Islands. Mapped from air photos by the Lars Christensen Expedition (1936) and named Steinane (the stones).
See also
List of antarctic and sub-antarctic islands
Category:Islands of Princess Elizabeth Land | {
"pile_set_name": "Wikipedia (en)"
} |
With the hiring of Axel Schuster on Friday, the Vancouver Whitecaps finally got their long-awaited Sporting Director. Here are some of the things that he had to say in his first press conference:
The global search has landed and found its target.
Early Friday morning, it was reported that the Vancouver Whitecaps had hired Axel Schuster as their new Sporting Director, putting an end to their search for someone to head the football department in the front office.
After announcing the start of their search nearly 100 days ago, it was announced Thursday that they were prepared to announce their selection Friday, much to the relief of fans. They later confirmed reports on Friday that Schuster, a former Schalke 04 and Mainz executive in Germany, had been selected to fill that much-awaited Sporting Director role.
Schuster brings an outsider perspective to MLS, after having worked his whole life in his native Germany, first through his hometown club Mainz, and then most recently with Schalke. He helped Mainz develop their way from a smaller club, to one that consistently pumped out quality coaches and players, before moving to Schalke, where they had 2 solid seasons before a dip last year.
While he was eventually let go, as a new executive came in and swept many people such as Schuster from the front office out, Schalke has bounced back massively this year, doing so with many of the players brought on by Schuster and the previous staff.
In Vancouver, he faces a unique challenge, as he must help rebuild a club that has fallen off the path since their expansion year in MLS. Expected to regularly contend for playoff spots, they missed out on the dance in both 2018 and 2019, with 2019 being one of the worst ever for the club.
“The biggest challenges are to make the right decisions, to make the first step, and I said to the owners, I am only the right person if they are okay with that,” Schuster said to gathered media on Friday, as he was officially presented in his new role. “I don’t want to change something in principle, but I want to make step by step development on an existing basis here. We want to push everybody hard in this club, to make now the right decisions to reach the first target, to make the first step.”
“Of course, we are already in the middle of a transfer period, even if the window opens in January, but Mark and his team have been travelling around a lot. We are not comfortable with time, so we have to start immediately and find the right decisions.”
On the surface, it seems that the biggest influence he will bring will be on the youth development side, as Mainz found themselves in a similar situation in the Bundesliga as the Whitecaps do in MLS. Fighting against the richest clubs, they had to rely on good youth development, along with a shrewd transfer policy, to flirt with the European spots, as they did a couple of seasons.
The Whitecaps have an esteemed academy around MLS, boosted by the successes of Alphonso Davies and Theo Bair these recent years, but have yet to transition as many players as originally hoped to the 1st team. Given that Schuster is going to have control over all aspects on that side of the club, it’s hoped that the Caps start pumping more consistent talent out of their youth ranks, which will aid the club in both the long and short term.
In the short term, they still need some talent for their squad, especially on the top end, as they pick over what was a tumultuous campaign for the team. While they did technically fill all 3 DP roles, it too often felt like the Caps lacked the presence of a true game-breaker, someone that can twist matches completely on their head.
While Ali Adnan and Hwang In Beom showed glimpses that indicated that they had the potential to maybe be one of those players, they mostly looked like pieces that would compliment that bigger fish, as they were unable to turn around the bus on their own. To remedy that, head coach Marc Dos Santos has promised some aggressive spending this window, and the Caps already have been linked with some World Cup winners, but until names are brought in, people will be understandably skeptical.
“We have to make the right transfers right now. In and out,” Schuster said. “Out doesn’t always mean that the player is not a good player, but maybe he does not fit the philosophy. We have to find the exact right profiles to come in, to be short on time and a little bit under pressure is not always the best, but yeah I’m optimistic that we can do a good job, that is the biggest challenge right now.”
The Whitecaps have some good pieces, like Hwang In Beom, but they will need a lot more to be able to compete in MLS (Keveren Guillou)
A lot of similarities have been brought up about Schuster’s time at Mainz, and understandably so, given how they and the Whitecaps line up in terms of club profile relative to their respective leagues. When he arrived at Mainz, there wasn’t much in terms of scouting infrastructure and front office staff, much like the Whitecaps, so he has an experience of building those things up from the ground-up.
“The whole situation here, and everything we want to do within the next few years, reminds me a little bit of the situation of Mainz,” Schuster said. “It was not a good moment when I was there at the beginning like I’m (doing now) at this club, this club is some steps ahead, but of course, we are in another competition here now, but it was the same (idea). We were a very small club. There have been some others who spend more money, who seems to be bigger, more attractive with everything.”
He added: “We thought about how we can be successful in this league, how we can improve and we found good ways to do that. First thing was to define ourselves as a developing club for clubs to make transitions for players, to be a step on the ladder in the development of players, and then to find the right profiles, who are ready to come to Mainz to make the next step to lead to bigger clubs.”
“And then, we used that to regenerate money to invest again in the team. We have been very straight with our decisions, and we have been very successful. I think sometimes we had to make hard decisions, and not everybody likes the decisions, but we always trusted that it was (done) the right way.”
It’s an interesting move for someone who has worked for a long time in a good league, with the Bundesliga being reputed as one of the best in the world. Moving stateside to MLS, a relative unknown for a lot of Europeans, is a big move for someone of his stature to make. Especially after concluding a stint recently with Schalke, a team that did some damage in the Champions League during his tenure, accepting a challenge like the one in Vancouver is a bold move.
But for Schuster, who did law in his hometown of Mainz before latching on with the local club, he’s always been fascinated by the complexity of a job like this. Having a lot of rules allows teams to have more level ground in terms of starting points, and while we’ve seen a decrease of parity in recent years, teams can still catch up to the big dogs if they invest smartly.
“Yes, I studied law. I don’t know if everyone knows that. I was at university at Mainz and studied law, and I have been always interested in rules and guidelines of leagues,” Schuster said. “And for that reason I’ve been always interested in the MLS, because it’s really different to everything we have in Europe, they’re big differences to Europe, so I know the rules in general. I know what’s TAM and GAM and DPs and everything like that.”
“But of course, I’m really happy to have (VP of Footballing Operations) Greg Anderson on my side, who is an expert on that, because I think nobody can expect that I’m an expert on the first day, I know the rules really good and I will go with Greg through everything and develop progress.”
Now, he’s going to have a busy couple of months, as he and his new staff play catchup in the offseason. While he did say that he has started contributing to decision-making for a while now, it’s time to officially get things underway, starting with the re-opening of a trade window next week. After being relatively silent in the last trade window, despite having many assets that people see as valuable around MLS, it’s expected the Caps pounce on a couple of moves within the league.
After that, it’ll be onto the opening of the global transfer window in January. It’s expected that Vancouver makes some aggressive moves in that window, as they have at least 1 DP spot open, with the possibility of another opening up depending on changes in the salary cap. With that kind of freedom, and someone with Schuster’s network now on board, it gives he and Dos Santos a chance to start chasing some big fish.
As said by Dos Santos on Friday, that process is already ongoing, as they have already started to compile a solid list of targets. While it’s unsure how many of them will be successful purchases, if they can hit on most of them, Dos Santos promises that it would have been a good offseason.
“Our targets are very clear right now, if you want a lot of answers, you could steal my computer,” Dos Santos joked Friday. “But yeah, our targets are clear, what we want to do is clear, now it’s a question of pulling the trigger and trying to get the deals done. So, yes, there was a moment of waiting in some of the key players, to also have the approval of our sporting director, making sure that everybody was on the same page, some decisions like taking options of players had to be done before.”
“But today it’s very clear what we need, very clear what we want. Are we going to be able to get all the targets that we want? It’s not going to be easy, but if we do, it’s going to be very successful offseason, so we hope it’s going to happen.”
For Schuster, in between transfer dealings, jumping into improving infrastructure and taking a look at youth development, it’s going to be a busy period to start things off. It won’t be easy, as the Whitecaps have some big steps to take, but he seemed confident in the process Friday. After a season like that, it’ll be interesting now to see what decision he and the team now take, starting with moves in the immediate future.
No matter that direction, expect a full effort from Schuster, who seems invigorated by this job opportunity. For the first time, he works without the highly-esteemed Christian Heidel, who was seen as a big part of the jobs done at Mainz and later at Schalke. With Schuster now on his own for the first time, people will be keeping a close eye on how he does, as that lack of frontman experience was seen as the main criticism of him despite his pedigree.
Based on the glowing review he gave on Friday, he already believes that Vancouver has the structure to help him do that. After years of disappointment in the club, now it’s to see if he’ll be able to succeed in his mission, as the road towards MLS relevance continues.
So far, it seems like positive marks for Schuster, who definitely has the ability to do that.
“I want to make step-by-step development with sustainability. That is always something we did at Mainz, we don’t want to overpay so we don’t want to reach two or three steps in one with the danger to fall back again,” Schuster said. “So we had to build up everything there. And we have not been a big group, and we have been only good people with good energy, and this is also something, I found here as well. A lot of people with this passion and energy for this job and for this club. All of them want to make it happen, all of them gives a little bit more than a normal employee, (even) after a year such as last year.”
“Now it’s up to us to find the right strategy, to find the right pathway to bring all the energy together, we have to make some decisions and move on step-by-step.”
With this long-needed announcement out of the way, that long pathway has officially begun.
Like this: Like Loading... | {
"pile_set_name": "OpenWebText2"
} |
Effective dose of dual-energy X-ray absorptiometry scans in children as a function of age.
Effective dose, a parameter utilized to assess biological risk related to radiation exposure, may be used to evaluate risk associated with dual-energy X-ray absorptiometry (DXA). We estimated the effective dose from DXA (Hologic QDR 4500A) scans of the lumbar spine (fast array mode), total body, hip (fast array mode), and forearm for children ages 1, 5, 10, and 15 yr and for adults. Entrance dose incorporating backscatter was determined for each scan type. Depth-dose curves were derived using Plexiglas slabs simulating tissue attenuation. Organ depth was estimated using pediatric phantom models. For all scan types, the effective dose decreased as age increased. The effective dose values for a 1-yr-old and an adult, respectively, were 4.7 microSv and 2.2 microSv for a lumbar spine scan performed in fast array mode, 3.4/3.5 microSv and 1.8/2.1 microSv (male/female) for a total body scan, and 0.14 microSv and 0.03 microSv for a forearm scan. There were marked sex differences in the effective dose associated with hip scans (fast array mode) ranging from 15.2 microSv for a 1-yr-old male to 4.6 microSv for an adult female. A comprehensive uncertainty analysis indicated that the effective dose values were reliable within a factor of 3. With the exception of the hip scans in 1- and 5-yr-olds, the effective doses were below the negligible individual dose limit of 10 microSv/yr. | {
"pile_set_name": "PubMed Abstracts"
} |
Which Marvel events from the past 16 years would you consider to be the best? * | {
"pile_set_name": "OpenWebText2"
} |
Introduction {#sec1-1}
============
Cancer is the second most common cause of death worldwide\[[@ref1]\] and the third most common cause of death in Iran.\[[@ref2]\] Breast cancer is the most common cancer in women\[[@ref3]\] and is expected to result in significant loss of human and financial resources in the coming years.\[[@ref3]\] Various factors such as smoking, alcohol consumption, diet, obesity, and lack of physical activity can lead to cancer.\[[@ref4]\] The negative effects of these factors can be reduced using health-care measures which require providing the necessary information for patients, especially women.\[[@ref5]\] Health conditions of women can directly affect the health situation of families and society as a whole due to their core role in families.\[[@ref6]\] Credible and easy-to-understand information can lead to better participation of patients in their own treatment procedure.\[[@ref7]\] Health information is one of the bases of any health-care system and is required to promote self-care and improve health literacy\[[@ref8]\] and is directly affected by health information-seeking behaviors of patients. Health information-seeking behavior is defined as "the sum of activities attempted by an individual after determining their information needs to meet this need." Health information-seeking behavior includes several aspects including health information needs, health information sources, health information barriers, and patients\' attitude toward health information.\[[@ref9]\]
Among concepts related to health information seeking are:
The type of health information soughtThe extent of the acquired health informationFactors related to information sources such as credibility and accuracyFactors related to massages in information sources such as clarity or ambiguityPersonal characteristics of the information seeker including their understanding about their condition\[[@ref10]\]Health information behavior studies are divided into several main phases including information needs, information resources, and barriers, with backgrounds for each phase presented, respectively.
Information needs {#sec2-1}
-----------------
The study by Tilleul *et al*. showed that, if patients are not informed about their level of activity after a surgery, they might have to visit hospitals to acquire the necessary information, increasing the cost of care, and stress in themselves and their caregivers.\[[@ref11]\] Keinki *et al*. reported that cancer patients, despite understanding regarding the importance of diet, are uncertain regarding their diet due to conflicting information.\[[@ref12]\] Tariman *et al*. determined the information need priorities or middle-aged patients suffering from bone marrow cancer. They identified three most important information needs as treatment, diagnosis, and self-care with internet, physicians, family, and friends being the most important information sources.\[[@ref13]\]
Gholami *et al*., in their study, investigated information needs of cardiovascular patients. Their findings showed that information regarding prognosis, their roles, physical and mental health, health-care system performance, novel, traditional, and Islamic medical practices were among the information sought by these patients. Therefore, they concluded that it is necessary to provide the information using various sources to meet the information needs of patients and increase their participation in the treatment process.\[[@ref14]\]
Nasrollahzadeh stated that the most important health information needs of women include psychological needs, nutrition, maternal care, and childbirth methods with lack to time, lack of ability for validating information sources, and high level of knowledge available acting as the most important barriers.\[[@ref15]\]
The findings of the study by Riahi *et al*. showed that general health and medical information are the most important information needs.\[[@ref16]\]
Robinson *et al*. reported that analysis of questions asked by patients is a useful and powerful method for determining their information needs. In this case, identification and evaluation of patients\' information needs are carried out based on their own reports. With the increased ability of surgeons to meet their patients\' information needs, their patient-centric view improves, leading to improve patient satisfaction and improvement in clinical instructions.\[[@ref17]\]
Information resources {#sec2-2}
---------------------
Robinson *et al*. found that analyzing patients\' questions was a useful and powerful way to meet patients\' information needs. Because researchers identify and edit patients\' information needs which are reported by the patients who are directly involved. By enhancing the surgeons\' ability to inform patients about their needs, their patient viewpoints improve, which in turn increases both patient satisfaction and improved clinical guidelines.\[[@ref17]\] The findings of Riahi *et al*. research showed that families, friends, relatives, and other immigrants are the most important channels for access to information.\[[@ref16]\] Kahouei *et al*. reviewed the information needs regarding women\'s health who have been under surgery. The manual and the doctor were their most important source of information.\[[@ref7]\] Valero-Aguilera *et al*. surveyed the information needs and use of the internet in patients with breast cancer and urinary and reproductive system cancer. Patients were eager to share their experiences with other patients to help them cope with the disease.\[[@ref18]\] Tariman *et al*. reviewed the priority information needs of adults with active bone marrow cancer. The Internet, doctors, family, and friends were the most important sources of health information.\[[@ref13]\] Mayer *et al*. studied the cancer survived information-seeking behavior of patients. The internet was the most important source of information for them.\[[@ref19]\] Feizi *et al*. reviewed information seeking about the carcinogenic factors and cancer warning signs. The most important sources of information about cancer were, respectively, media, personal studies, and friends.\[[@ref20]\] Zare Gavgani *et al*. studied the health information of members of public libraries in Qazvin. The most common ways to get health information were watching TV and browsing search engines.\[[@ref21]\]
Obstacles {#sec2-3}
---------
Findings of research by Riahi *et al*. showed that lack of mastery of the use of print and internet information resources is the most important barrier to access to information.\[[@ref16]\] Latifi *et al*. examined the barriers to the health information of women with breast cancer after mastectomy. The findings showed that three factors including "fears," "shame," and "inadequate information literacy" were the main individual barriers.\[[@ref22]\] Milewski and Chen reviewed the barriers to obtaining medical information in patients with diabetes. The most important obstacles were lack of motivation, passivity, inconsistency in information, and inability to find useful information.\[[@ref23]\] Nasrollahzadeh studied the health information behavior of pregnant women. The most important barriers to gain information were lack of time, inability to assess material credibility, and high scientific levels of book content.\[[@ref15]\]
Generally, studies have shown that patients require more education regarding treatment and self-care. However, this education is not possible without proper need assessment. Therefore, it is necessary to first determine the health information-seeking behavior of patients (including needs, barriers, sources, and attitudes regarding health information). It is also necessary to attempt and remove all health information barriers for patients to achieve health-care goals.
Seyed-Al-Shohada Hospital of Isfahan is the only public cancer treatment center in Isfahan which services patients from Isfahan as well as surrounding cities and provinces. Studies show that breast cancer is the most prevalent cancer in Isfahan,\[[@ref24]\] with an increasing trend of breast cancer prevalence also being observed in Iran.\[[@ref25]\] However, despite the importance of this topic, few studies have been conducted regarding health information-seeking behavior of breast cancer patients in Iran. Since patients\' access to relevant, credible, and timely information in a usable format can help prevent waste of time and resources as well as repeated and unnecessary treatments, providing relevant health information is one of the duties of medical informatic experts due to their role as a bridge between information sources and information users.\[[@ref26][@ref27]\] To better perform this duty, it is necessary to first identify health information needs of patients and then provide them with the necessary sources of information. To this end, the goal of the current study is to determine health information-seeking behavior of female breast cancer patients in Seyed-Al-Shohada Hospital of Isfahan in year 2017. Specific objectives include determining the health information needs of women with breast cancer in Seyed-Al-Shohada Hospital, determining the barriers to accessing health information from their point of view, and determining the attitudes of these patients. Some of the practical goals are to provide the necessary suggestions to medical information professionals to fit the resources and channels of information based on patients\' information needs, provide suggestions for removing the barriers and problems of women with breast cancer in accessing health information, provide suggestions for the development of health information sources, and provide a solution to hospital authorities and policymakers to provide appropriate infrastructure for easy access of patients to valid information. The results of this study will be given to these individuals.
Methods {#sec1-2}
=======
This is an applied type study carried out using survey method. The statistical population is female breast cancer patients visiting Seyed-Al-Shohada Hospital of Isfahan in year 2017 (1396). According to the hospital logs, there was a total of 150 breast cancer patients, 60 of which visited the hospital for follow-up checks in summer 2017. The questionnaire was distributed among these sixty patients. The questionnaire of Riahi *et al*.\[[@ref16]\] was used for data gathering after some adjustments to match the current study. The items of this questionnaire included questions on health information, health information sources, health information-seeking barriers, and patients\' attitude toward health information. Data were gathered through visiting the hospital. After explaining the study to patients, their consent and their family\'s consent were acquired for participation in this study. The validity of the questionnaire was determined by librarianship and medical informatics experts, oncology experts, and nursing faculty members (patient education). To determine the reliably of the questionnaire, it was first distributed among 25% of the statistical population (15 patients) and the results were used to calculate the Cronbach\'s Alpha coefficient which was equal to 0.83. After gathering data, the results were analyzed using descriptive (frequency, percentage, and average) and analytical statistics (independent *t*-test, ANOVA, and Spearman and Pearson\'s correlation tests) using SPSS software version 18 (IBM Company, Armonk, NY, USA).
Results {#sec1-3}
=======
Findings showed that the majority of participants (35%) were in the 40--49 age group with the least number of participants in the 29--35 age group (5%). The majority of participants (61.7%) were married and only 5% were single. The majority of participants lived in surrounding cities (38.33%) with 28.33% living in rural areas. The majority of participants (45%) had elementary school level literacy with very few having PhD level education (1.67%).
The study findings regarding information needs of female breast cancer patients in Seyed-Al-Shohada Hospital of Isfahan showed that information regarding "Self-care," "emotional-psychological support information," and "treatment length and chance of relapse" was the most sought-after health information by patients with average scores of 4.80, 4.53, and 4.33, respectively. Data presented in [Table 1](#T1){ref-type="table"} are percentages and scores from 1 to 5 Likert scale \[[Table 1](#T1){ref-type="table"}\].
######
Frequency and average score of information needs in female breast cancer patients

The findings regarding health information-seeking barriers of female breast cancer patients in Seyed-Al-Shohada Hospital of Isfahan showed that "high cost of information sources," "lack of response from treatment personal (physicians and nurses)," and "lack or trust in website information," with respective average scores of 4.63, 4.53, and 4.52 were the most important information-seeking barriers. Data presented in [Table 2](#T2){ref-type="table"} are percentages and scores from 1 to 5 Likert scale \[[Table 2](#T2){ref-type="table"}\].
######
Frequency and average score of health information-seeking barriers in female breast cancer patients

Research findings regarding information sources of female breast cancer patients in Seyed-Al-Shohada Hospital of Isfahan showed that "brochure and catalog provided by the hospital," "other cancer patients," and "physicians and nurses" were the most important information sources with respective scores of 4.25, 4.22, and 4.20.
In questions regarding patients\' attitude, participants were asked whether access to medical information can help in controlling their conditions and fulfilling their social roles and whether access to medical information can improve hopefulness and adaptability or leads to increased fear and anxiety. The results showed that access to health information can help patients in "controlling their conditions," "adapting to their conditions," "stress and anxiety control" (with joint average score of 4.67), and "performing their social roles" and "hopefulness" (with average scores of 4.33 and 4, respectively).
Discussion {#sec1-4}
==========
Breast cancer is one of the most prevalent and costly cancers among women.\[[@ref28]\] One of the methods to reduce the costs of this condition is to provide cancer patients with valid, credible, and relevant information and encourage them toward self-care. The findings showed that, according to patients, information regarding "Self-care," "emotional-psychological support information," and "treatment length and chance of relapse" were their most important information needs. These results are similar to the results reported by several studies including Tariman *et al*. regarding information needs of middle-aged bone marrow cancer patients,\[[@ref13]\] Valero-Aguilera *et al*. regarding information needs of orology and breast cancer patients,\[[@ref18]\] Mistry *et al*. regarding health information needs of cancer patients during their treatment,\[[@ref29]\] Riahi *et al*. regarding health information needs of immigrants,\[[@ref16]\] Nasrollahzadeh regarding information needs of pregnant women,\[[@ref15]\] and Nasiri *et al*. regarding information needs of patients after heart valve replacement.\[[@ref30]\] On the other hand, these results are different from those reported in some studies including the results of Goossens *et al*. on "cancer patients\' and professional caregivers\' needs, preferences, and factors associated with receiving and providing fertility-related information,"\[[@ref31]\] the study by Kahouei *et al*. regarding health information needs of women undergoing obstetrics surgery,\[[@ref7]\] and the study by Zare Gavgani *et al*. on Information-Seeking Behavior of Members of Public Libraries.\[[@ref21]\] It seems that the most important reason for this incompatibility between results is the differences between statistical population, the type of disease investigated, and environmental facilities. In the current study, all participants knew about their condition and therefore required no further information on diagnosis. It also appears that, since participants in the current study were not informed regarding different treatment methods, they categorized information on different treatment methods as low priority. Patients preferred information on self-care which could help them improve their quality of life.
The findings showed that participants used "brochure and catalog provided by hospital," "other cancer patients," and "physicians and nurses" to meet most of their information needs. These results are similar to those reported by Kahouei *et al*. regarding health information needs of women undergoing obstetrics surgery\[[@ref7]\] and by Valero-Aguilera *et al*.,\[[@ref18]\] while there were differences between these results and those reported by Tariman *et al*,\[[@ref13]\] Mayer *et al*. on comparison of survivors who do and do not seek information about cancer,\[[@ref19]\] Feizi *et al*. regarding awareness level about warning signs of cancer,\[[@ref20]\] the study by Zare Gavgani *et al*. on Information-Seeking Behavior of Members of Public Libraries,\[[@ref21]\] and the study by Riahi *et al*. regarding health information needs of immigrants.\[[@ref16]\] The reason for this difference can be the fact that the participants in the current study spent long hours undergoing chemotherapy where their only source of information was other patients. There were also no other sources of information regarding breast cancer and treatment methods in the chemotherapy department of the target hospital.
The findings of the current study showed that high cost of information sources," "lack of response from treatment personal (physicians and nurses)," and "lack or trust in website information" were the most important information-seeking barriers among the patients. These results are similar to those reported by Latifi *et al*. regarding barriers of access of women with breast cancer to health information\[[@ref22]\] and the study by Milewski and Chen regarding barriers of meeting the information needs of diabetic patients.\[[@ref23]\] However, these results were different than those reported by Nasrollahzadeh regarding information needs of pregnant women\[[@ref15]\] and Riahi *et al*. regarding health information needs of immigrants.\[[@ref16]\] The reason for this difference can be differences in the disease type and study population. For example, Nasrollahzadeh mentions time constraints as the most important limitation of their study of information-seeking behavior of pregnant women.\[[@ref15]\] Furthermore, time constraints of oncology specialists making them unable to answer questions and there is a lack of patient familiarity with websites related to breast cancer which led them to use websites with easy-to-understand content which lacked proper credibility.
The findings of the current study showed that participants had a positive attitude toward health information and consider the use of health information to be beneficial. They believed that health information can help them in "controlling their conditions," "adapting to their conditions," "stress and anxiety control" as well as "preforming their social roles" improving their "hopefulness." These results are similar to those reported by Leydon *et al*. regarding information-seeking behavior of cancer patients,\[[@ref32]\] Jenkins *et al*.,\[[@ref33]\] and Barzabadi Farahani regarding information needs of patients undergoing chemotherapy,\[[@ref34]\] Mufunda *et al*. regarding diabetic patients,\[[@ref35]\] Mayer *et al*.,\[[@ref19]\] and Yan regarding information-seeking behavior on the internet.\[[@ref36]\]
Limitations of the current study include lack of proper sources on information-seeking behaviors of female cancer patients in Iran. Fatigue and pain in patients and lack of cooperation from some of the patients\' families were also among limitations of the current study. To reduce these limitations, researchers read the questionnaire carefully to patients and provided additional explanations when required. The strengths of this study included investigating female cancer patient population due to their important role in their own self-care and that of their family members.
Conclusion {#sec1-5}
==========
The results showed that participants potentially seek to gather relevant health information. Therefore, if health information is presented to them in a useful format, it can help improve their treatment as well as help prevent breast cancer in others. This is due to the culture of sharing information and experiences in the society. It is worth mentioning that information sharing and transfer process can be managed using question-- answering system to prevent sharing of wrong information.
Patients\' lack of knowledge about credible and useful information sources regarding breast cancer reveals the need to making them informed in this area. Most patients are unfamiliar with credible and validated websites and media which is one of the most important reasons for not using these sources.
To remove these barriers, it is necessary to evaluate printed and electronic information sources regarding breast cancer and determine credible and validated sources. The information needs of patients should be fulfilled from various sources based on their level of skill and health literacy. Given these results, it is suggested for easy-to-understand sources of information to be accessible to patients freely or at a low cost. Since these sources of information lead to better self-care among patients, the cost of their creation and distribution is justified due to reduced cost in the health-care system. To produce and evaluate easy-to-understand sources of information, it is possible to use the knowledge and expertise of librarians and medical information experts since their familiarity with various sources of information makes them the most qualified individuals for production and evaluation of information sources. The cooperation between these librarians and medical information experts as well as experts in medicine, nursing, and paramedical experts (due to their clinical knowledge and direct contact with patients) can lead to suitable results in producing quality sources of information.
The current study investigated health information-seeking behavior of female breast cancer patients to provide the necessary information for better planning and policymaking in hospitals and facilitating patients\' access to health information. Therefore, we suggest that future studies should investigate cancer patients\' motivations for seeking health information. It is also possible to use qualitative studies of health information-seeking behaviors to determine the depth of patients\' information needs, leading to production and publication of health-related knowledge, and design of websites to inform the patients and influence their information-seeking behavior. The results of the current study are relevant for the current study population and care should be taken in generalization of these results to other populations.
Financial support and sponsorship {#sec2-4}
---------------------------------
Nil.
Conflicts of interest {#sec2-5}
---------------------
There are no conflicts of interest.
Researcher team appreciates the hospital officers for their cooperation, the Center for Health Information Technology Research center on financial support, the patients because of answering questions kindly, and experts who have contributed to the review and modifying the article.
| {
"pile_set_name": "PubMed Central"
} |
Will My Ex Girlfriend Remain Closed Off to Me Forever?
Dan Bacon
Dan Bacon is a dating and relationship expert and the creator of Get Your Ex Back Super System, a video program that teaches you the fastest way to get your ex back. Dan is married to the woman of his dreams and has been helping men succeed with women for more than 14 years.
In the Press"Dan is a man that has found out how to make women feel intense attraction for you. So many guys do need help. What a good thing you’re doing Dan. What a great thing you’re doing."Jenny McCarthy, Sirius XM radio"Dan Bacon is the best at giving relationship advice to modern men."MensXP"Dan has some great tips. Some men need that sort of thing just the way some of us women need fashion advice or cooking tips."Joy Pullmann, The Federalist
It depends on the following:
1. Do you know what will make her feel attracted to you again?
Making your ex feel attracted to you again has almost nothing to do with your physical appearance.
Why?
Attraction to physical looks fades, so if you’ve been with her for a while, she’s not going to be impressed by subtle changes to your appearance.
So, before you rush out and get a new gym membership, or blow a months of your salary on buying lots of new clothes, you need to understand that a woman’s attraction to a guy is mostly based on how he makes her feel when she’s interacting with him.
Of course, there are some women who are more impressed by superficial things like a man’s appearance, money or social status.
However, for most women, falling in love and staying in love with a guy is based on how he makes her feel when she’s with him, how he behaves around her and the way he thinks and takes action in his life.
So, don’t make the mistake of thinking that you need to get a physical makeover to re-attract your ex.
You can improve your physical appearance if you want to (e.g. lose some weight if you need to, build some muscle at the gym, overhaul your wardrobe), but your main focus needs to be on finding new ways to re-attract her emotionally.
By the way…
If you’re not sure where to start, here are some questions that will help you get a clearer picture on how to re-attract her in the ways that really matter…
When you interact with your ex, do you make her feel feminine and girly in your presence, or does she feel more like a neutral friend or worse, does she feel more dominant and powerful than you?
Are you confident and emotionally strong when you interact with her and believe in your value to her, or do you feel insecure, self-doubting and believe that she’s too good for you?
Are you living up to your true potential as a man, or are have you been drifting through life just doing ‘whatever’ and not really caring about building a future for yourself?
Are you emotionally masculine enough to handle her when she tests your confidence (e.g. by throwing a tantrum over nothing, being closed off towards you and saying she will never give you another chance), or do you crumble and become insecure?
Do you and her want the same things in life (e.g. to settle down, get married and start a family together, or to party and have fun for as long as possible), or are you going in completely different directions in life?
Is your relationship intelligence at the same level as hers, or do you still need to educate yourself about what it takes to maintain a relationship and keep it together for life?
When you understand what your ex girlfriend really wants, you can start letting her see that you now understand it and have changed (e.g. begin making her feel more feminine around you, start being more emotionally dominant than her or start being more confident and self-assured).
Don’t tell her that you’ve changed; let her sense it and see it based on how you now talk, behave and act around her and in life.
When she can see that you now understand what she really wants, her guard starts to come down and she naturally opens back up to you.
On the other hand, if you try to get her back without changing anything at all, or by offering her the wrong things (e.g. working hard to improve your physical appearance, sucking up to her by being extra nice, offering to do whatever she wants), she will most-likely remain closed off to you forever (or at least until you start re-attracting her in the ways that are actually important to her).
The next thing to consider is…
2. If your ex interacts with you, will she be able to sense that you would end up making the same kind of mistakes that lead to the break up?
In some cases, a woman will break up with a guy without telling him exactly what turned her off.
Instead, she will say something like, “I don’t think we should see each other anymore,” or “I need a break from being in a relationship for a while so I can focus more on my studies/work/finding myself.”
Yet, that isn’t her real, secret reasons for breaking up with him.
For example, some of the real reasons why she broke up with him could include the fact that:
She feels turned off by how he lost the confidence she first felt attracted to. He ended up becoming too needy, insecure and clingy in the relationship with her.
He failed to keep the spark alive between them, so she stopped feeling like an attractive, desirable woman around him. She felt more like his roommate or a neutral friend.
She initially felt drawn to him because he was nice and sweet, but soon realized that he wasn’t manly enough for her (e.g. he sucks up to her all the time, lets her get away with bad behavior), so she feels more emotionally dominant than him.
He gave her too much power in the relationship. She wants to be in a relationship with a guy who makes her feel like his girl, rather than her feeling like his mother or feeling as though she always needs to help him emotionally.
He seemed cool initially, but he ended up showing a side of himself that made her feel as though they weren’t on the same level socially.
So, if you don’t want your ex girlfriend to remain closed off to you forever, you need to make sure that when you interact with her from now on, you show her (via your actions, conversation style and the way you respond to her), that you’re no longer making the same old mistakes that turned her off.
For example:
You’re more confident and self-believing.
You no longer feel unsure of yourself when she’s being closed off towards you.
You’re not afraid to flirt with her to create sexual tension between you and her.
You can now laugh at her (in a loving way) when she creates drama and says things like, “I can never trust you again after what happened between us,” or “I just can’t forgive you for the pain you caused me.”
When she experiences the changes in you first hand (i.e. on a phone call or in person), she won’t be able to stop herself from opening up to you, even if only a little bit initially.
Then the more she sees for herself that you really have changed, the more she will start to respect you.
When she respects you, she will also start to feel sexual and romantic attraction for you and from there, it’s only a matter of time before she will re-connect with her original feelings of love for you.
On the other hand, if you keep trying to get her to open up to you while making the same old mistakes you made that led to the break up, she will just keep pushing you away and saying things like, “I’m sorry, but it’s over. We had our chance and it didn’t work. You need to accept that and move on.”
The next thing to ask yourself is…
3. How would you rate her level of love for you out of 10 after the relationship had settled down?
To answer this question, think about your relationship with your ex and how serious it really was before your break up.
For example:
Were you and your ex girlfriend talking about getting married and starting a family (which means her level of love for you would have been at about a 9 or 10), or were you just seeing each other from time to time (which could mean that her level of love was probably a 7 or less)?
Did you and her have the same values, beliefs and philosophy towards life and the future, or were you complete opposites?
Did you want the same things in life (e.g. a successful career, to travel the world, to help others, to settle down and start a family), or did you want separate things?
Was she always honest and loyal towards you (and you to her), or did she sometimes lie and betray you?
Was she often flirting with other guys behind your back or worse, in front of you?
Did she cheat?
Who was more invested in the relationship, you or her?
By honestly answering those questions, you will have a clearer picture of the depth of your relationship with your ex.
For example: If you and your ex girlfriend wanted different things in life, it’s possible that she didn’t really believe you were her ideal man.
She may even have been thinking things like, “He’s a nice guy and I do enjoy being with him for now, but I can see that we won’t be able to stick together in the long-term, because we want very different things in life.”
Naturally, after you and her broke up, she will have then closed herself off from you as a way of not giving you hope that you and her could get back together again.
So, if you want her back, you need to interact with her and let her see that you and her are now an even better match than you were before.
When you level up and are able to attract her in new and interesting ways, her feelings automatically start to come back to life.
Then, even if her level of love for you was originally low, it will begin to change and become stronger.
She will feel as though, if she doesn’t give you another chance, she might end up regretting it for the rest of her life.
As a result, her walls will begin to come down and she will open up to you again.
Another thing to ask yourself is…
4. Are you trying to get her to open up to a relationship before you’ve even re-attracted her?
After a break up, a guy will sometimes rush to try and convince his ex to give him another chance.
For example: He might repeatedly try to discuss the relationship and how he’s willing to do whatever it takes to make things right, so they can get back together again.
Yet, if she’s not feeling respect and sexual attraction for him anymore, she isn’t going to feel motivated to want to get into a relationship.
As a result, she remains closed off and thinks things like, “I know that he means well, but I just don’t have feelings for him anymore. Besides, him pushing me to commit to the idea of a relationship only proves to me that he still doesn’t understand why we broke up in the first place. It’s almost as if he believes we can just sweep our problems under the carpet and start over, just because he wants to. What about what I want? He doesn’t even make me feel attracted anymore, but he wants me back. Why should I give him another chance? That wouldn’t be fair on me. ”
This is why, if you sincerely want your ex back, you have to stop trying to get her to open up to a relationship.
Instead, you need to focus on reawakening her feelings of respect, sexual attraction and love for you, by making the interactions that you have with her from now on, feel fun, exciting and interesting.
When you use that approach, she will naturally open back up to you again because you are now something that she wants.
She will worry that if she remains closed off to you, it might cause you to move on with a new woman, which will then cause her to regret it and feel as though she is the one who got left behind.
As a result, she will open up to you and try to make something happen between you and her again.
Another thing to ask yourself is…
5. How badly did you behave leading up to, during and after the break up?
In some cases, a woman will remain closed off to her ex for a long time (or even forever) due to his behavior before, during and after the break up turned her off.
For example: Some guys might…
Beg, plead and even cry in front of her.
Throw a tantrum and demand that she change her mind.
Accuse her of cheating.
Insult her.
Say that he never loved her anyway.
Become aggressive or even violent towards her.
Demand that she allow him look through her phone, messages and emails.
Although those behaviors can turn a woman off and convince her that she wants to move on, not all of them are unforgivable.
Most reactions can be fairly easily forgiven, unless it was a violent reaction, or extreme stalker behavior reaction.
So, if you behaved in a way that you now regret, don’t keep beating yourself up about it.
Instead, realize that you’re not that guy anymore.
You have improved and become a better man already and when you interact with her again, your actions, behavior, vibe and conversation style will prove that to her.
When she sees that you really have changed, she will naturally begin to open up to you, even if just a little bit.
From there, you can show her that falling back in love with each other will be even better than it was the first time.
Don’t tell her that though.
Show it to her based on how you talk to her, behave, act and think around her and in life in general.
Let her see that you have changed and that she really does feel differently about you now.
When that happens, she won’t want to remain closed off to you anymore.
Another question to ask yourself is…
6. Have you tried all options to get her back?
Most guys don’t use the option of re-attraction because they simply don’t know how to do it.
Instead, most guys do all of the usual things like buying flowers and gifts, apologizing and promising to change if she gives him another chance.
Alternatively, a guy might use No Contact and ignore her for 30 or 60 days in the hope that she will start to miss him and open back up to him again.
Yet, none of these things work as well as re-attracting her.
For example: Watch this video to understand the truth about cutting off contact with a woman and hoping that she comes back…
The same applies to getting a gift for your ex, or trying to suck up with her with flowers, poems or letters.
It just doesn’t work.
You’ve got to focus on re-attracting her sexually and romantically, which is done when you talk to her on the phone and in person.
If you haven’t done that yet, then you haven’t tried what really works to get a woman back in today’s world.
2 Common Problems That Guys Encounter When Trying to Get an Ex Woman to Open Up Again
When a woman is closed off to her ex, she usually won’t make it easy for him to get her back (e.g. she won’t answer his calls, she will refuse to meet up with him in person, be cold and distant when they talk).
1. She is being stubborn about her decision to not give him another chance
In most cases, an ex woman will only be stubborn because the guy is going about the ex back process backwards.
Essentially, he’s pushing her to open up so that they can be a couple again, but he hasn’t fully reawakened her feelings of respect, sexual attraction and love for him yet.
Remember: A relationship is the last step in the ex back process, not the first.
So, if you want your ex girlfriend back, don’t waste time trying to convince her to open back up to the idea of having a relationship.
Instead, just focus on using every interaction that you have with her (e.g. especially over the phone and in person) to re-spark her feelings of respect and sexual attraction for you.
The more she starts to associate positive feelings to interacting with you, the more her defenses come down.
You don’t have to force it to happen because it will happen naturally, even if she tries to stop herself from feeling it.
She will feel drawn to you and begin to want you back for her own reasons (i.e. so she doesn’t regret losing you).
However, if you keep trying to force her to open up to you so you can then convince her to want a relationship, she will remain closed off forever (or at least until you change your approach).
2. Trying to open her back up via text
When a guy is faced with a situation where his ex girlfriend is refusing to interact with him in any other way (e.g. she won’t talk over the phone or meet up with him in person), he will often resort to texting her.
It’s understandable and it can help, but texting isn’t the best option to properly get an ex woman back, as I explain in this video…
You can spark some attraction, but you shouldn’t try to use text to get her to commit being with you again.
That approach won’t work.
Unfortunately, a lot of guys don’t find this out until it’s too late.
As a result, a guy thinks that it’s okay to send his ex woman long walls of text where he tries to explain things, convince her to change her mind and get her to understand his point of view.
Yet, to her, his attempts to get her back seem needy, selfish or even annoying.
As a result, rather than make her think, “Maybe he’s right about me being too closed off. Maybe I should give him a chance,” she just closes herself off even more.
Why?
When a woman can’t see a guy’s body language or hear the tonality of his voice, rather than give him the benefit of the doubt and assume that he’s being confident and self-assured, she usually assumes the worst of him based on her past experiences with him (e.g. he used to be insecure/self-doubting/wimpy before).
This is why, if you keep trying to make your ex open up to you via text, you’re probably going to achieve the exact opposite.
She will close up and potentially even block your number.
On the other hand, if you get her on a phone call and reawaken some of her feelings of respect and sexual attraction for you by making her laugh, smile and feel good to be talking to you again, it will be a lot more difficult for her to keep pushing you away.
Then, when you meet up with her in person (something that she will be more willing to do after you’ve made her feel good on a call), you can build on her feelings and bring down her walls once and for all.
Don't waste time ignoring your ex or trying to convince her to give you another chance. This simple trick will change her mind and make her want you back today...
Yes, I want free tips via email from Dan Bacon. I can unsubscribe at anytime with a click. Privacy policy.
Almost there! Please complete this form and click the button below to gain instant access.
Enter your email address and click the button below to get started.
Yes, I want free tips via email from Dan Bacon. I can unsubscribe at anytime with a click. Privacy policy.
Author: Dan Bacon
Dan Bacon is an ex back expert. He has helped men from all over the world to get a woman back and he can help you too. Watch this free training and he will explain what you need to do to get her back. | {
"pile_set_name": "Pile-CC"
} |
---
abstract: 'The nonlinear dynamics of resistive flow with a chemical reaction is studied. Proceeding from the Lagrangian description, the influence of a chemical reaction on the development of fluid singularities is considered.'
author:
- |
A.R. Karimov\
[^1] Institute for High Temperatures,\
Russian Academy of Sciences,\
Izhorskaya 13/19, Moscow 127412, Russia\
and Department of Electrophysical Facilities,\
National Research Nuclear University MEPhI,\
Kashirskoye shosse 31, Moscow, 115409, Russia\
A.M. Korshunov\
Department of Electrophysical Facilities,\
National Research Nuclear University MEPhI,\
Kashirskoye shosse 31, Moscow, 115409, Russia\
V.V. Beklemishev\
Department of Electrophysical Facilities,\
National Research Nuclear University MEPhI,\
Kashirskoye shosse 31, Moscow, 115409, Russia
date:
title: Influence of chemical reactions on the nonlinear dynamics of dissipative flows
---
Introduction
============
The clustering of matter in different physical conditions remains a topic of interest in modern science because of its importance for understanding the behavior of natural and artificial systems far from equilibrium [@lev]-[@kur]. The process of clustering typically develops in particle ensembles with long-range forces, such as gravity or electric interactions and it may lead to the formation of stable spatially inhomogeneous structures [@zel] - [@dn]. However, there is another possibility of structure formation in dissipative systems, and typical example of such systems is flow with some chemical reactions. In this paper, we are going to examine some special features of the nonlinear dynamics of such flows.
The macroscopic dynamics of dissipative systems with chemical reactions is, as a rule, described by diffusion equations [@lev]-[@nic]. However, such description is valid only for the systems with microscopic flow-transfer near some equilibrium state. If it is not the case, and we wish to consider the flow far from equilibrium, such approach is inadequate since the dynamics can involve several time and space scales that usually differ by several orders of magnitude. As a result, a full nonlinear treatment on the basis of hydrodynamic equations with chemical sources will be required to investigate the evolution of such system.
Here we consider a particularly simple form of nonlinear dynamics of dissipative, one-dimensional flow moving in an external field with model chemical terms. We present a class of exact solutions of the fully nonlinear hydrodynamic equations describing the flow with a chemical reaction which may be useful to define the direction of the real system behavior. Based on this description, we compare the formation of density profile in the dissipative flows with a chemical reaction with the corresponding evolution in the flows without chemical reactions.
Model
=====
We shall study the one-dimensional, time-dependent pattern for the infinite medium containing movable, particles of type $A$ and immobile particles of the $B$ type between which there is a chemical reaction leading to the formation of new immobile component $AB$. Such situation can be realized when $m_A \ll m_B$, where $m_A$ and $m_B$ are the mass of $A$ and $B$ particles, respectively. It is assumed that the movement of the component $A$ is caused by an external force (for definiteness, let this be the gravitational field and all particles are the neutral ones) and friction force (Stokes force) only. The macroscopic model of these processes can be present in an uniform form as $$% ------------ (1_chem) -------------
{\partial n_A \over \partial t} + {\partial \over \partial x}(n_A u) = -W\/,
\label{1_chem}$$ $$% ------------ (1a_chem) -------------
{\partial n_B \over \partial t} = -W\/,
\label{1a_chem}$$ $$% ------------ (1b_chem) -------------
{\partial n_{AB} \over \partial t} = W\/,
\label{1b_chem}$$ $$% ------------ (2_chem) -------------
{\partial u \over \partial t} + u {\partial u \over \partial x} = -\left(\nu + {W\over n_A}\right) u + g\/,
\label{2_chem}$$ where $u$ is the velocity of the $A$ component, $n_A$, $n_B$ and $n_{AB}$ is the density of the $A$, $B$ and $AB$ components, respectively, $\nu$ is the collision frequency, $g$ is the acceleration of freedom fall (note that the direction of the $0x$ axis is assumed to coincide with the direction of the acceleration of freedom fall $g$) and $W$ is the rate of the chemical reaction in the system. The concrete form of $W$ is defined by the order of reaction with respect to the components $A$ and $B$. Here we take for consideration the reactions of first ($s=1$) and second $(s=2)$ order only, and in this case we have $$W = \left\{\begin{array}{ll}
k_1 n_A, & s=1, \\
k_2 n_A n_B, & s=2,
\end{array}
\right.$$ where $k_s$ is the chemical reaction constant. For simplicity, here we neglect the dependence of the friction coefficient $\nu$ on the medium parameters, as well as the dependence of the reaction constants $k_s$, setting $k_s$=const. and $\nu$=const. since these dependences are not important for our study of qualitative properties of the flow dynamics.
Lagrangian frame
================
In order to see how these factors manifest themselves in the system dynamics it is convenient to pass from the Euler description of the original system (\[1\_chem\])-(\[2\_chem\]) to the Lagrangian frame. According to the definition (see, for example, [@sch_2; @dav]) $$% ------------ (4_chem) -------------
\tau=t,\hspace{11mm} \xi=x-\int_0^t u(\xi,t^{\prime})dt^{\prime}\/,
\label{4_chem}$$ where $x(\xi, t)$ satisfies the initial condition $$x( \xi, 0)=\xi$$ and provides $$% ------------ (U) -------------
u(\xi, \tau) =\left({\partial x \over \partial
\tau} \right)_{\xi}\/,
\label{U_nature}$$ the temporal and spatial derivatives are transformed as $$% ------------ (6_chem) -------------
{\partial \over \partial t} \to {\partial \over \partial \tau} - {u \over J}
{\partial \over \partial \xi},
\hspace*{11mm}
{\partial \over \partial x} \to {1 \over J}
{\partial \over \partial \xi}
\label{6_chem}$$ with Jacobian $$% ------------ (5_chem) -------------
J(\tau, \xi ) = {\partial x\over \partial \xi} > 0\/,
\label{5_chem}$$ besides, the condition of sign conservation of $J( \xi,\tau)$ eliminates singularities of the flow.
Under the transformation (\[6\_chem\]), the Eq.(\[2\_chem\]) is reduced to $$% ------------ (9_chem) -------------
{\partial u \over \partial \tau} + \gamma u = g\/,
\label{9_chem}$$ where $$% ------------ (g_chem) -------------
\gamma= W/n_A +\nu\/.
\label{g_chem}$$ At the same time the continuity equations (\[1\_chem\]) is transformed into $$% ------------ (14_chem) -------------
{\partial \over \partial \tau}\ln(J n_A)=-{W \over n_A}\/.
\label{14_chem}$$ In such form this equation will be needed for the exposition in the next sections.
Dynamics for $s=1$
==================
Following [@chm], we start from the flow with a chemical reaction of first order. In fact, if $\gamma$=const., then Eq. (\[9\_chem\]) is the Newton equation for a particle, moving under the influence of gravity and friction. Such situation occurs when the chemical reaction is first order, i.e. $s=1$. Physically this means that the concentration of one component is excessive, for example, in our model $n_A \ll n_B$. In this case the solution of Eq. (\[9\_chem\]) has the exact solution $$% ------------ (10_chem) -------------
u(\xi,\tau) = u_0(\xi) e^{-\gamma \tau} + {g \over \gamma}
\left(1 - e^{-\gamma \tau}\right)\/,
\label{10_chem}$$ where $u_0(\xi)$ is initial velocity and $\gamma= k_1 +\nu$. With the help of the relation (\[U\_nature\]) bearing in mind $x(\xi, \tau=0) = \xi$, we may deduce the path of a fluid element $$% ------------ (12_chem) -------------
x(\xi,\tau) = \xi + {g\over \gamma}\tau + {1\over \gamma}
\left( u_0 - {g \over \gamma}\right)(1 - e^{-\gamma \tau})\/,
\label{12_chem}$$ from which we find $$% ------------ (J_chem) -------------
J(\xi,\tau) = 1 + {u_0^{\prime}\over \gamma}(1 - e^{-\gamma \tau})\/.
\label{J_chem}$$ Finally, substitution of this relation and $W$ for $s=1$ into (\[14\_chem\]) leads to $$% ------------ (Na_chem) -------------
n_A(\xi, \tau) = {\gamma n_{0A} e^{-k_1 \tau}\over \gamma + (1 - e^{-\gamma \tau}) u_0^{\prime}}\/,
\label{na_chem}$$ where $n_{0A} = n(\xi, \tau=0)$. Also, from relation $${\partial u\over \partial x} = {1 \over J} {\partial u \over \partial \xi}$$ taking in account (\[10\_chem\]) and (\[J\_chem\]) we get $$% ------------ (u_chem) -------------
{\partial u\over \partial x} = {\gamma u_0^{\prime} e^{-\gamma \tau}\over \gamma + (1 - e^{-\gamma \tau}) u_0^{\prime}}\/,
\label{u_chem}$$
As is seen from (\[na\_chem\]) and (\[u\_chem\]), the chemical reaction affects the flow via the parameter $\gamma$. It is worth noting that in the limit $\gamma \to 0$ the relations (\[na\_chem\]) and (\[u\_chem\]) pass to $$% ------------ (15b_chem) -------------
n_A = {n_{0A} e^{-k_1 \tau}\over 1 +\tau u_0^{\prime}}, \hspace{11mm} {\partial u\over \partial x} = {u_0^{\prime} \over 1 + \tau u_0^{\prime}}\/.
\label{15b_chem}$$ In absence of a chemical reaction ($W \to 0$) and/or friction ($\nu \to 0$) these relations describe the flow by inertia in collisionless neutral gas. When $ u_0^{\prime} <0 $, it predicts a singular behavior for finite time. A discontinuous pattern is a well-known intrinsic feature of fluids especially in inviscid pressureless limit. As is seen from (\[12\_chem\]), on times $\tau < \gamma^{-1}$ the motion of fluid elements occurs in a similar way.
However, in our model of dissipative flow with chemical a reaction some new peculiarities appear. In the case when $\gamma \neq 0$ and $W \neq 0$ the collapse condition is $$% ------------ (16_chem) -------------
1 + {1 - e^{-\gamma \tau}\over \gamma} u_0^{\prime} = 0
\label{16_chem}$$ from which follows the collapse time $$\tau_*= -{1\over \gamma }\ln\left(1 + {\gamma \over u_0^{\prime}}\right)\/.$$ If $\gamma \to 0$, this estimation transforms into $\tau_* = -1/ u_0^{\prime}$ for the Eq. (\[15b\_chem\]). It is clear that $\tau_*$ for the dissipative flow with a chemical reaction is larger than the corresponding values for the collisionless flow. Thus, the chemical reaction and the friction add some restriction on the parameters of the problem but do not limit the development of singularity in the system.
The physically admissible parameters $u_0$ and $\gamma$ are determined by the condition that the density should be positive for all time, i.e. the following inequality must be fulfilled $$% ------------ (17_chem) -------------
u_0^{\prime} <0, \hspace{11mm} \mid u_0^{\prime} \mid \geq \mid \gamma \mid\/.
\label{17_chem}$$ It should be noted that in this simplest case the nonlinear dynamics for some initial conditions can lead to the formation of dynamical space structures [@ks; @kss] in which the initial conditions play the role of a driving parameter precluding the formation of singularities but providing for the formation of transient dynamical structures.
Dynamics for $s=2$
==================
Now we move on to a more realistic case of $s=2$. For simplicity, in this section we shall restrict our consideration to the limit $W/n_A \ll \nu$ when we may use the relation (\[J\_chem\]) for our estimations. The Eq. (\[14\_chem\]) then reduces to $$% ------------ (18_chem) -------------
{\partial \over \partial \tau}\ln(J n_A)=- k_2 n_B\/.
\label{18_chem}$$ Differentiating relation (\[18\_chem\]) with respect to $\tau$ and using (\[1a\_chem\]), we get $$% ------------ (19_chem) -------------
{\partial^2 \over \partial \tau^2}\ln(J n_A)= k_2^2 n_B n_A\/.
\label{19_chem}$$ Then eliminating $n_B$ from (\[19\_chem\]) with the help of (\[18\_chem\]) we obtain $$% ------------ (20_chem) -------------
J{\partial^2 y\over \partial \tau^2} + k_2 {\partial e^y \over \partial \tau}=0\/,
\label{20_chem}$$ where we introduce $$% ------------ (21_chem) -------------
y = \ln(J n_A)\/.
\label{21_chem}$$ It should be noted that in the framework of model worked out the Eq. (\[20\_chem\]) is an exact equation, one that has been correct for any $J$.
Now we have to define the initial conditions for Eq. (\[20\_chem\]) which follow from the initial conditions for $n_A$, $n_B$ and $J$. Without losing too much generality, we can set $n_{0A}=1$ and $n_{0B}=\varepsilon<1$ so we have $y(\tau=0)=0$. Proceeding from obvious relations $${\partial y\over \partial \tau}= {J\dot{n}_A+n_A\dot{J} \over J n_A}, \hspace{7mm} {\partial J\over \partial \tau} = u_0^{\prime}\/,$$ where the overhead dot now denotes derivative with respect to $\tau$, and Eq. (\[18\_chem\]) rewritten for $\tau=0$ in the form $$\left.{\partial n_A\over \partial \tau}\right|_{\tau=0}=-n_{0A} u_0^{\prime} - k_2n_{0A}n_{0B}$$ we get $$\left.{\partial y\over \partial \tau}\right|_{\tau=0}=-k_2\varepsilon\/.$$ Thus, the Eq. (\[20\_chem\]) together with the initial conditions $$% ------------ (22_chem) -------------
y(\tau=0)=0, \hspace{11mm} \left.{\partial y\over \partial \tau}\right|_{\tau=0}=-k_2\varepsilon\/.
\label{22_chem}$$ defines the evolution of the flow with a chemical reaction of second order.
Unfortunately, this equation cannot be solved analytically but proceeding from a Chaplygin comparison theorem for nonlinear differential equations [@bel] we are able to obtain the apriori estimates for the solutions of problem (\[20\_chem\])-(\[22\_chem\]). Applying this theorem to our issue, the functions $y_{min}(\tau)$ and $y_{max}(\tau)$ satisfying the initial conditions (\[22\_chem\]) shall hold the relation $$y_{min} \leq y \leq y_{max}$$ in the interval $0 \leq \tau \leq \tau_*$ if the following inequalities are fulfilled $$\Lambda(y_{min}) <0, \hspace{11mm} \Lambda(y_{max}) >0$$ where $$% ------------ (23_chem) -------------
\Lambda(y) = J{\partial^2 y\over \partial \tau^2} + k_2 {\partial y \over \partial \tau} e^y\/.
\label{23_chem}$$
As such functions we can take $$% ------------ (24_chem) -------------
y_{min}= - k_2 \varepsilon \tau, \hspace{11mm} y_{max}={a \over 2}\tau^2 - k_2 \varepsilon \tau \/,
\label{24_chem}$$ where $a$ is some unknown parameter to be determined. Indeed, for $y_{min}$ we get $$\Lambda(y_{min}) = -k_2^2\varepsilon \exp(-k_2\varepsilon \tau) <0\/,$$ which means that we can consider $y_{min}$ as a lower boundary of the exact solution for Eq. (\[20\_chem\]). We now look for the parameter $a$ for which $y_{max}$ becomes an upper boundary of the exact solution Eq. (\[20\_chem\]). Substitution of $y_{max}$ into (\[23\_chem\]) yields $$% ------------ (25_chem) -------------
\Lambda(y_{max}) = (1 + \tau u_0^{\prime}) a - k_2(k_2\varepsilon - a \tau) \exp\left({a\over 2}\tau^2 - k_2\varepsilon \tau\right)\/.
\label{25_chem}$$ If we set $$% ------------ (26_chem) -------------
a > k_2^2\varepsilon, \hspace{11mm} a > k_2\varepsilon \mid u_0^{\prime} \mid\/.
\label{26_chem}$$ then the curve $y_1(\tau) = k_2^2\varepsilon - k_2a \tau$ always is lower than the curve $y_2(\tau) = a + u_0^{\prime}a\tau$ in the interval $\tau \geq 0$. Moreover, it easy to see that $$k_2(k_2\varepsilon - a \tau) \exp\left({a\over 2}\tau^2 - k_2\varepsilon \tau\right) \leq k_2(k_2\varepsilon - a \tau)$$ in the interval $0 \leq \tau \leq k_2\varepsilon /a$. For $\tau \geq k_2\varepsilon /a$ the second term of (\[25\_chem\]) becomes a positive value and the condition $\Lambda(y_{max})>0$ always holds true if the parameter $a$ belongs to the interval defined by the relation (\[26\_chem\]). It implies that the functions $y_{min}(\tau)$ and $y_{max}(\tau)$ have no peculiarities in the interval $0 \leq \tau \leq \tau_*$. Then from the relation (\[21\_chem\]) it follows that in the present case there may be only one hydrodynamic peculiarity associated with $J = 0$ which is similar to the situation occurring in flow with the reaction of first order.
{width="9.cm"}
\
\
As an illustration of exact dynamics of the flow for case $s=2$, in Fig.1 we present the numerical solution of (\[20\_chem\]) for $k_2 =1$, $u_0^{\prime}=-10^{-3}$ and $k_2\varepsilon=-0.96$. This solution exhibits regular behavior up to the moment of development of hydrodynamic collapse $\tau_*$ and the function $y(\tau)$ holds negative in the interval $0 \leq \tau < \tau_*$. Thus, this partial case indicates that our conclusion about character of $y(\tau)$ remains valid and collapse can be caused only by the flow hydrodynamics.
{width="9.cm"}
\
\
In Fig.2 we graph this exact solution with the lower $y_{min}$ and upper $y_{max}$ boundaries for small times. As is seen from these graphs, we have a good approximation of the exact solution near initial state but for large times the boundaries can point out some rough estimate of the exact solution. However, such method of estimates seems sufficient enough for the study of the effect of chemical reactions on the formation of singularities and the influence of initial conditions on the dynamics of the system worked out.
Conclusion
==========
In this paper we have focused on the influence of a chemical reaction on the dynamics of the dissipative, one-dimensional flow. In order to get a full analytical description we have considered the reaction of first and second orders. These reactions belong to the simplest type of possible reactions. However, the present results indicate that the same features can be observed in more complex systems.
In particular, we have shown that the wave breaking may occur in the flow under analysis \[see Eq. (\[14\_chem\])\] similarly to what happens in a collisionless flow \[see Eq. (\[15b\_chem\])\]. In the present example the dissipative physical processes changed only the kind of singular dynamics but did not eliminate the phenomenon itself. It is important to stress that the above-described behavior can be observed only for the initial conditions and the parameters stated in Eq. (\[17\_chem\]). However, in the present case the evolution of the resistive flow is not restricted by any physical mechanism, such as the pressure gradient, which is usually presumed to limit the growth of the density peak (see, for example, [@sch_2; @k02]).
Such type of solution represents a collapse-like class of nonlinear solutions that may arise in different physical situations. In particular, the results describing the formation of time-dependent structures in dissipative flow may be of interest for some biophysical experiments in laboratory conditions [@es; @ep; @van] and aerosol applications [@reist; @smir]. Besides, we believe that our present approach can be generalized, for instance, to an inhomogeneous, many-component fluid or plasma flows in gravitational or electrostatic fields [@kur; @sch_2; @ep; @smir; @ss09; @kys12; @inh].
It should thus be of interest to examine such flows in the cylindrical and spherical geometries, which have more natural rotational degrees of freedom (see, for example, [@es; @sch_2; @s96]). Owing to different kinds of interactions which may exist in such multidimensional systems and due to a variety of their initial states, different modes of collective motion are possible [@ss09]-[@k09]. Therefore, in higher spatial dimensions, a large variety of nonlinear dynamical structures can be expected [@sch_2; @nat]. However, one should be noted that depending on the ratio between nonlinearity and dispersion, one can expect the formation of hydrodynamic collapses or nonlinear wave structures (see, for example, [@dav; @nat; @ir]). In our case, the present results for reactions of first and second orders (in the limit $W/n_A \ll \nu$) indicate that there is a relatively weak effect of chemical terms on the flow dynamics since the nonlinearity is too strong that the system experiences a collapse-like behavior for small times. Proceeding from this point one may expect that singularities form cellular structures in multidimensional geometry. As a result, the intensity of the chemical reactions strongly can increase at these points. Such special features are expected to play an important role, in particular, for the understanding of basic properties of aerosol systems in various environments and laboratory conditions [@smir; @smir_2]. But it is only our assumption or guess and no more. In order to show the realization of this hypothetical mechanism we should study the above-outlined script of dynamics for dissipative flows with a chemical reaction in multidimensional geometry.
[99]{} Levich V G 1977 [*Physicochemical Hydrodynamics*]{} (London: Adv. Publications Ltd.) Gray P and Scott S K 1990 [*Chemical Oscillations and Instabilities*]{} (Oxford: Oxford University Press) Nicolis G and Prigogine I 1977 [*Self-organization in Nonequilibrium Systems*]{} (New York: Wiley) Kuramoto Y 1984 [*Chemical Oscilations, Waves and Turbulence*]{} (Berlin: Springer) Shandarin S F and Zeldovich Ya B 1989 [*Rev. Mod. Phys.*]{} [**61**]{} 185 Sack Ch and Schamel H 1987 [*Phys. Rep.*]{} [**156**]{} 311 Dubin D H E and O$^{\prime}$Neil T M 1999 [*Rev. Mod. Phys.*]{} [**71**]{} 20 Epstein I R and Pojman J A 1998 [*An Introduction to Nonlinear Chemical Dynamics: Oscillations, Waves, Patterns, and Chaos*]{} (New York: Oxford University Press) Schamel H 2004 [*Phys. Rep.*]{} [**392**]{} 279 Davidson R C 1972 [*Methods in Nonlinear Plasma Theory*]{} (New York: Academic Press) Karimov A R 2005 [*J. Russ. Laser Res.*]{} [**26**]{} 283 Karimov A R and Schamel H 2001 [*Phys. Plasmas*]{} [**8**]{} 1180 Karimov A R, Schamel H and Shcheglov V A 2000 [*Phys. Lett. A*]{} [**272**]{} 193 Beckenbach E F and Bellman R 1961 [*Inequalities*]{} (Berlin: Springer-Verlag) Karimov A R 2002 [*Phys. Scripta*]{} [**65**]{} 356 Epstein I R and Showalter K 1996 [*J. Phys. Chem.*]{} [**100**]{} 13132 Vanag V K 2004 [*Phys. Usp.*]{} [**47**]{} 923 Reist P C 1984 [*Introduction to Aerosol Science*]{} (New York: Macmillan) Smirnov B M 2000 [*Clusters and Small Particles in Gases*]{} (New York: Springer) Stenflo L and Shukla P K 2009 [*J. Plasma Phys.*]{} [**75**]{} 841 (2009) Karimov A R, Yu M Y and Stenflo L 2012 [*Phys. Plasmas*]{} [**19**]{} 092118 Karimov A R, Yu M Y and Stenflo L 2011 [*Phys. Lett. A*]{} [**375**]{} 2629 Stenflo L 1996 [*Phys. Scripta*]{} [**T63**]{} 59 Stenflo L and Yu M Y 1996 [*Nature*]{} [**384**]{} 224 Stenflo L and Yu M Y 1998 [*Phys. Plasmas*]{} [**5**]{} 3122. Karimov A R 2009 [*J. Plasma Physics*]{} [**75**]{} 817 Infeld E and Rowlands G 2000 [*Nonlinear Waves, Solitons and Chaos*]{} (Cambridge: Cambridge University Press) Smirnov B M 2014 [*Phys. Usp.*]{} [**57**]{} 1041
[^1]: E-mail:[email protected], [email protected]
| {
"pile_set_name": "ArXiv"
} |
# shellcheck disable=SC2154
mavlink stream -r 50 -s DISTANCE_SENSOR -u $udp_gcs_port_local
| {
"pile_set_name": "Github"
} |
Senate approves Tillerson as secretary of state
WASHINGTON (CNN) -- The Senate has approved former ExxonMobil CEO Rex Tillerson as the next secretary of state, filling one more slot on President Donald Trump's national security team despite questions about his approach to Russia and state sponsors of terror, such as Iran.
The Senate voted 56 to 43, with all Republican in support and most Democrats voting against him. Three Democratic senators split with their party to back Tillerson: Joe Manchin of West Virginia, Heidi Heitkamp of Nor | {
"pile_set_name": "Pile-CC"
} |
CMMG's Mutant
Had a chance to spend a few moments with the folks at CMMG today at SHOT Show. The big news, of course, is the unveiling of the Mk47 rifle, a.k.a. The Mutant. It's an AR-15-style rifle chambered in 7.62x39 mm that takes standard AK-47-pattern magazines.
Shouldering The Mutant, it has an instantly recognizable look and feel to it, and the CMMG heritage is unmistakable. From the KeyMod handguard to the proprietary muzzle brake, it's obvious this new rifle has many touches inherited from the existing CMMG line.
CMMG has done a masterful job of integrating the AK-47's round and magazine into AR-15 guise. The company has made a number of improvements, such as a much larger bolt, to insure proper operation and long life. Look to Shooting Illustrated for more coverage of this new rifle in 2015. | {
"pile_set_name": "Pile-CC"
} |
Determination of pH using water protons and chemical exchange dependent saturation transfer (CEST).
Solution pH was measured using water proton NMR via chemical exchange dependent saturation transfer (CEST) with selected chemical exchange sites. Several useful pH-sensitive proton chemical exchange agents were found: 5,6-dihydrouracil, 5-hydroxytryptophan, and a combination of 5-hydroxytryptophan and 2-imidazolidinethione. A ratiometric approach was developed that permitted pH determinations that were independent of water T(1) or exchange site concentration. | {
"pile_set_name": "PubMed Abstracts"
} |
/*
* Copyright Camunda Services GmbH and/or licensed to Camunda Services GmbH under
* one or more contributor license agreements. See the NOTICE file distributed
* with this work for additional information regarding copyright ownership.
* Licensed under the Zeebe Community License 1.0. You may not use this file
* except in compliance with the Zeebe Community License 1.0.
*/
package io.zeebe.el;
import org.agrona.DirectBuffer;
/** The context for evaluating an expression. */
public interface EvaluationContext {
/**
* Returns the value of the variable with the given name.
*
* @param variableName the name of the variable
* @return the variable value as MessagePack encoded buffer, or {@code null} if the variable is
* not present
*/
DirectBuffer getVariable(String variableName);
}
| {
"pile_set_name": "Github"
} |
Knowledge Center
TOP 5 ICONIC STAR WARS VILLAINS
STAR WARS NIXON LAUNCHES
Nixon Watches have created a special Star Wars collection of watches, Star Wars Nixon. They are launching this #ForceFriday so what better time to discuss the most iconic Star Wars Villains. Phase one of the Star Wars Nixon Watches include: Imperial Pilot series, Stormtrooper series, and the Darth Vader Automatic. More Star Wars Nixon Watches will be launched in November.
5. IMPERIAL PILOT
The Imperial Pilots are the pilots for the Galactic Empire. The Imperial Pilots flew the TIE fighters. They needed to use their lightning quick reflexes during attacks. The Imperial Pilot uniform looks like a black color version of a stormtrooper uniform, but there are a lot of differences. While the helmets may look similar, the Imperial Pilot had a larger helmet that was vacuum sealed. Other than that the Imperial Pilot wore no armor. This was so they could move better in the TIE fighter. If the stormtroopers are the ground-force, the Imperial Pilots acted as the Galactic empire's Air-force. While Piloting they had very little protection so they had to be fearsome and calculating or they may not survive.
Their armor and training are modified for their environment, the cockpit of a TIE fighter. The Imperial Pilot Uniform was designed by legendary concept artist and illustrator Ralph McQuarrie.
4. DARTH MAUL
"A figure from your worst nightmare" is how Star Wars creator George Lucas described Darth Maul. Darth Maul is the only character from the prequel series mentioned in this article. He might have only been in "Episode 1" for mostly the second half of the movie, but he instantly became an icon.
Darth Maul is quite a character with his black and red color scheme and crown of horns. Darth Maul was designed by Ian McCaig, David Dozoretz& Gavin Bocquet.
3. STORMTROOPER
The Stormtrooper is one of the most iconic designs in the Star Wars universe. These soldiers with their white armor and black detailing have a striking look and have become Star Wars icons. While it is debatable if they are really good soldiers, they never seem to hit anything with their guns, they instantly scream “Star Wars”. Stormtroopers are the ground-force of the Galactic Empire.
Their armor and training are modified for their environment. Some of the specialized stormtrooper armor include, Snowtroopers, Sandtroopers, Shadow troopers and Imperial Scout Troopers. The stormtrooper armor was designed by legendary concept artist and illustrator Ralph McQuarrie.
2. BOBA FETT
Boba may have only a few minutes of screen time in the original Star Wars movies, but he left a legacy. By far one of the most popular characters in the Star Wars universe is Boba Fett. Just what makes Boba Fett such an iconic character? The mystery? The fact that he is a bounty hunter? The fact that Darth Vader seems to respect him? Whatever you think about Boba, he is surely a man of mystery.
Boba Fett's character was inspired by gunslingers of the old west. Much of Boba's design was originally designed for Darth Vader. The overall design of Boba Fett is attributed to Joe Johnston.
1. DARTH VADER
Darth Vader is the most iconic designs in the Star Wars universe. You can never go wrong with all black. The story of Star Wars are really about the Skywalker family, especially Darth Vader. Once a heroic Jedi knight, he was seduced by power and became a Sith Lord.
Darth Vader was once Anakin, a Jedi Knight. It was believed that he would bring balance to the force. Darth Vader is such a cultural icon that he was voted as third greatest movie villain by the American Film Institute. Darth Vader's Mask was designed by legendary concept artist and illustrator Ralph McQuarrie.
THERE’S BEEN AN AWAKENING. HAVE YOU FELT IT?
Introducing Star Wars Nixon Collection. The Star Wars Nixon Watch collection is a series of watches designed after the iconic Star Wars Characters. These Star Wars Nixon watches would look just as awesome on you, as it would on a stormtrooper, Boba Fett or even Darth Vader. | {
"pile_set_name": "Pile-CC"
} |
In the
United States Court of Appeals
For the Seventh Circuit
No. 07-3331
Y UMING D ENG ,
Plaintiff-Appellant,
v.
S EARS, R OEBUCK AND C O .,
Defendant-Appellee.
Appeal from the United States District Court for the
Northern District of Illinois, Eastern Division.
No. 04 C 6571—Joan B. Gottschall, Judge.
A RGUED S EPTEMBER 11, 2008—D ECIDED JANUARY 5, 2009
Before E ASTERBROOK, Chief Judge, and P OSNER and
E VANS, Circuit Judges.
E ASTERBROOK , Chief Judge. Yuming Deng was a
statistical modeler at Sears Roebuck. His job was to de-
velop software and compile data that could be analyzed
to shed light on which customers should be extended
how much credit. In February 2001 his supervisors
gave Deng a performance review that he deemed unwar-
ranted. Tempers flared, and Deng soon stopped working,
2 No. 07-3331
claiming to be disabled. But while on leave he
repeatedly came to his office, only to be ushered out,
because Sears forbids persons on leave to come to work
(something that they are supposedly unable to do). Deng
once threatened a supervisor before departing—and he
continued to pay surreptitious visits. On one of these,
shortly before he quit, Deng deleted a great deal of data
and the models he had been using to analyze the infor-
mation. When Deng’s supervisor discovered the deletions,
Sears had much of the material restored from backup
tapes, but Sears could not tell whether the restoration
was complete—and the restoration not only was costly
(Sears estimates that $40,000 to $50,000 in labor and
computer time went into the task) but also delayed
projects that Deng’s co-workers were conducting using
these data and models.
Supervisors concluded that Deng had erased the infor-
mation in retaliation for the bad review and asked
Marc Peskin, Sears’s Manager of Corporate Investigations,
to look into the affair. Peskin concluded that Deng had
maliciously destroyed valuable data and reported the
matter to the police in Hoffman Estates, Illinois, where
Deng had been employed. Detective Carl Baumert con-
cluded that Deng had violated 720 ILCS 5/16D-3(a)(3),
which prohibits tampering with computer files without
the permission of the files’ owner. (Deng had not asked
for permission to delete these files.) Baumert tried to
discuss the subject with Deng, but he left Illinois without
notifying Baumert (or anyone at Sears) of his new ad-
dress. A prosecutor agreed with Baumert’s assessment and
filed formal charges. Eighteen months later Deng
No. 07-3331 3
was found in Massachusetts, arrested on a bench war-
rant, and returned to Illinois—where the charge was
dismissed at the preliminary hearing after a witness failed
to appear. The prosecutor asked the judge to continue
the hearing; when the judge refused, the prosecutor filed
a nolle prosequi and turned the papers over to another
Assistant State’s Attorney. Deng still could have been
indicted (a preliminary hearing is necessary in Illinois
only when the prosecutor wants to avoid presenting
the case to a grand jury), but was not.
Deng then turned the tables and sued Sears for
malicious prosecution. The parties are of diverse citi-
zenship, and the stakes exceed $75,000, so 28 U.S.C. §1332
permits the suit to be filed in federal court. Illinois
law governs. To prevail, Deng must show (among other
things) that the criminal case ended in his favor, that the
charge was not supported by probable cause, and that the
accuser made the charge with malice. See Swick v. Liautaud,
169 Ill. 2d 504, 512, 662 N.E.2d 1238, 1242 (1996). A dis-
missal is a favorable disposition—if the charge is not
refiled, as this was not—in the sense that the criminal
prosecution is over. But Swick holds that a dismissal by
way of a nolle prosequi does not count as “favorable” to the
accused if “the abandonment is for reasons not indicative
of the innocence of the accused.” 169 Ill. 2d at 513, 662
N.E.2d at 1243. The district court concluded that the
prosecutor dismissed the charge against Deng because
the state judge had declined to grant a continuance, not
because the prosecutor had come to think Deng innocent.
That led to a grant of summary judgment in Sears’s favor.
4 No. 07-3331
As Deng sees matters, a statement in Swick that the
court “adopt[s]” the discussion of favorable termination
in Restatement (Second) of Torts §660 (1977) means that a
dismissal must be taken as favorable to the accused
unless one of the four particular contra-indications men-
tioned in §660 has been established. None of these
four—compromise with the accused, misconduct by
the accused designed to avert a trial, mercy requested
by the accused, or the reinstitution of charges following
the dismissal—occurred here and therefore, Deng insists,
he is entitled to prevail on this subject. But a restatement
is not a statute; it summarizes doctrines already
articulated but does not freeze the development of the
common law. Nothing in §660 or anywhere else in the
Restatement (Second) of Torts says that the dismissal of
charges when a witness does not appear at a preliminary
hearing must be treated as a resolution favorable to the
accused. This is an open question in Illinois.
One may doubt whether it is sensible to answer the
question. If criminal charges are dismissed and never
reinstated, the accused has won. A technical knockout is
a knockout nonetheless. The former accused still must
demonstrate the absence of probable cause, and the
presence of malice, to win the civil suit. When these
things can be established, it is most likely that the crim-
inal charges were dismissed because the prosecutor
could not win. How is the prosecutor going to show guilt
beyond a reasonable doubt, when the charge is not sup-
ported by probable cause? But Illinois has not taken
the simplifying step of treating all favorable dismissals
the same, and the ambiguous formulation in Swick
No. 07-3331 5
creates potential problems. How can a judge or jury tell
whether the dismissal is “indicative of the innocence of the
accused”? A prosecutor may dismiss without giving
reasons (as happened here), and a statement in open
court may not be comprehensive or tailored to the stan-
dards of later tort litigation. Deng dragged the prosecutor
through a deposition, an intrusion on the prosecutorial
function. The prosecutor gave the “lack of continuance”
reason; Deng counters that the prosecutor was a
computer illiterate and unable to distinguish good
charges from bad. It is hard to believe that Illinois really
wants its criminal prosecutors subjected to this kind of
inquisition, or that a federal district judge should be
opining on an Assistant State’s Attorney’s competence
and the reasons for an exercise of prosecutorial discretion.
A federal court cannot take Ockham’s Razor and slice
Swick’s approach out of Illinois law. Swick takes sides on
a subject that has divided the states; we must respect its
choice. But we can avoid Swick’s complexities by skipping
to the probable-cause question, for if the charge was
supported by probable cause then other issues do not
matter. Deng contends that we must pretermit this
subject, because his opening brief did not broach it, but
that misunderstands federal appellate practice. As the
prevailing party, Sears may defend its judgment on any
ground preserved in the district court, as this ground
was, whether or not the district judge addressed the
point. See Massachusetts Mutual Life Insurance Co. v. Ludwig,
426 U.S. 479 (1976); Jordan v. Duff & Phelps, Inc., 815
F.2d 429, 439 (7th Cir. 1987).
6 No. 07-3331
The facts stated in this opinion’s first paragraph estab-
lish probable cause to believe that Deng, a disaffected
employee, erased valuable data on his way out the door.
Deng contends that this impression is mistaken—that
Sears’s statistical modelers are not only authorized but
also expected to delete information that has served its
purpose, in order to free up space on the company’s
servers. One problem with this perspective is that Deng,
who was on leave, could not know whether his super-
visors and co-workers were still using, or planning to use,
the data he erased—he did not ask anyone. Nothing in
this record would permit a jury to find that Deng’s superi-
ors at Sears believed that all of the information he
erased was no longer useful; if they believed that, why
spend $40,000 or more to restore it?
A second problem is that, because Deng was on leave,
he was not supposed to be at the office in the first place
and therefore was not authorized to perform any act at
all with or to the data. A third problem is that probable
cause is an objective concept. See Whren v. United States,
517 U.S. 806 (1996). A person’s ability to explain away
seemingly damning facts does not negate the existence
of probable cause, even though it might provide a good
defense should the case go to trial.
Deng left Illinois shortly after deleting the data, and
flight adds to the impression that a crime has been com-
mitted. See Illinois v. Wardlow, 528 U.S. 119, 124–25 (2000).
Detective Baumert invited Deng to tell his side of the
story; he did not use the opportunity and is in no position
to complain that Sears, the police, and the prosecutor all
drew inferences against him.
No. 07-3331 7
Deng’s other arguments have been considered but do not
require discussion. The judgment is
AFFIRMED
1-5-09
| {
"pile_set_name": "FreeLaw"
} |
Crataegus pinnatifida. Known in traditional Chinese medicine as shan zha, Chinese hawthorn is a very ornamental small tree. Spring trusses of white flowers reminiscent of bridal wreath are followed in the fall by the glossy fruit so beloved by Asian gardeners and cooks. The leaves are frequently mistaken for oak and they turn a burnished red before dropping a month after the fruit ripens.
The berries are eaten fresh, in pies or jams, as a tea, or dried and sold on skewers by Chinese street vendors in the fall.
Chinese hawthorn fruit is antibacterial and contains numerous bioactive constituents including flavonoids and organic acids. Recent trials have demonstrated its efficacy in lowering blood cholesterol, improving blood circulation, and acting as a heart tonic. The fruit is also being reviewed for its anti-tumor properties on skin cancer lesions.
Easy to grow in most areas. Self-fertile. Can take wet or dry soil and is somewhat drought tolerant when established. Full sun for best fruit set. Mature size about 20' x 15'. Zones 6-9.
Orders received by 5 pm Friday ship the following Monday, weather permitting. Shipping charges: 25% to CA, 30% to OR and WA, 40% to rest of continental U.S. Shipping charges are applied at check-out. No shipping to AK or HI. | {
"pile_set_name": "Pile-CC"
} |
Nanoporous Metal-Phenolic Particles as Ultrasound Imaging Probes for Hydrogen Peroxide.
Nanoporous metal-phenolic particles are fabricated through the nanostructural replication of dense FeIII -TA complexes in nanoporous CaCO3 template particles. The particles have potential for the diagnostic detection of endogenous levels of H2 O2 ex vivo and in vivo by ultrasound imaging, which is based on the catalytic activity of the coordinated Fe3+ in the particles to break down H2 O2 to O2 microbubbles. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
How can I set the background of a linearLayout to be at half opacity but not it's children?
Basically i want an activity with half transparent/black backgound.ie the parent activity gets dimmed when the new activity is launched.
I was able to get a fully transparent background but using the following in my manifest.xml
<activity android:name="com.xxx.FullPhotoActivity" android:theme="@android:style/Theme.Translucent.NoTitleBar" ></activity>
But i need the background to be kind of dark but also transparent.
I have also tried adding alpha to my linearlauout but that applies it to the child elements as well.
A:
Thanks to blackbelt's comment i managed to get it to work with a combination of the following
Linearlayout background color #EA000000
Activity declaration <activity android:name="com.xxx.FullPhotoActivity" android:theme="@android:style/Theme.Translucent.NoTitleBar" ></activity>
| {
"pile_set_name": "StackExchange"
} |
309 N.W.2d 441 (1981)
David Lyle FRYER, Appellant,
v.
David SCURR, Warden at the Iowa State Penitentiary, Fort Madison, Iowa, and State of Iowa, County of Lyon, Appellees.
No. 65969.
Supreme Court of Iowa.
August 26, 1981.
*442 Christopher A. Bjornstad of Cornwall, Avery, Bjornstad & Scott, Spencer, for appellant.
Thomas J. Miller, Atty. Gen., Gary L. Hayward, Asst. Atty. Gen., and Thomas Albers, Lyon County Atty., for appellees.
Considered by REYNOLDSON, C. J., and UHLENHOPP, McGIVERIN, LARSON, and SCHULTZ, JJ.
UHLENHOPP, Justice.
This appeal involves the validity of a guilty plea to a murder charge.
David Lyle Fryer, having been informed that the penalty for first-degree murder is life imprisonment, pled guilty in 1974 to a charge of murder. In the course of the proceedings the sentencing court made sure that Fryer understood the penalty for first-degree murder. The court asked the following question and Fryer gave the following answer:
The Court: And what is the penalty for murder in the first degree?
Mr. Fryer: Life.
The sentencing court gave Fryer the information required by State v. Sisco, 169 N.W.2d 542 (Iowa 1969). The court then accepted the plea, held a degree-of-guilt hearing, found Fryer guilty of first-degree murder, and sentenced him to life imprisonment. This court affirmed on direct appeal. State v. Fryer, 226 N.W.2d 36 (Iowa 1975). We set forth the facts of the case in that decision. Fryer has been incarcerated in the Iowa State Penitentiary since that time.
In 1980 Fryer sought postconviction relief, which the trial court denied after a hearing. Fryer appealed, and in this court he presents only one issue for review. He argues the 1974 sentencing court erred by failing to tell him that a conviction of first-degree murder precludes parole from the life sentence. We will assume arguendo that Fryer was not aware of the ineligibility for parole.
The question of whether a court must advise of ineligibility for parole is a case of first impression with us, although we have faced related issues. See, e. g., State v. Boone, 298 N.W.2d 335 (Iowa 1980) (eligibility for deferred judgment or suspended sentence); State v. Fluhr, 287 N.W.2d 857 (Iowa 1980); Manley v. State, 278 N.W.2d 1 (Iowa 1979) (failure to inform of lesser included offenses); Adams v. State, 269 N.W.2d 442 (Iowa 1978); State v. Reaves, 254 N.W.2d 488 (Iowa 1977); Brainard v. State, 222 N.W.2d 711 (Iowa 1974); State v. Reppert, 215 N.W.2d 302 (Iowa 1974); State v. Sargent, 210 N.W.2d 656 (Iowa 1973); State v. Bell, 210 N.W.2d 423 (Iowa 1973); State v. Sisco, 169 N.W.2d 542 (Iowa 1969); State v. Rife, 260 Iowa 598, 149 N.W.2d 846 (1967).
I. Fryer cites opinions from six federal courts of appeals which have required federal trial judges to inform defendants in guilty-plea proceedings of ineligibility for parole: Bye v. United States, 435 F.2d 177, 179 (2nd Cir. 1970); Harris v. United States, 426 F.2d 99, 101 (6th Cir. 1970); Jenkins v. United States, 420 F.2d 433, 437 (10th Cir. 1970); Berry v. United States, 412 F.2d 189, 192-93 (3rd Cir. 1969); Munich v. United States, 337 F.2d 356, 361 (9th Cir. 1964), overruled on other grounds, *443 Heiden v. United States, 353 F.2d 53 (9th Cir. 1965). See also Bailey v. MacDougall, 392 F.2d 155, 161 (4th Cir.), cert. denied, 393 U.S. 847, 89 S.Ct. 133, 21 L.Ed.2d 118 (1968).
Two circuits have held to the contrary: Trujillo v. United States, 377 F.2d 266 (5th Cir.), cert. denied, 389 U.S. 899, 88 S.Ct. 224, 19 L.Ed.2d 221 (1967); Smith v. United States, 324 F.2d 436, 441 (D.C.Cir.1963), cert. denied, 376 U.S. 957, 84 S.Ct. 978, 11 L.Ed.2d 975 (1964). Cf. United States ex rel. Brooks v. McMann, 408 F.2d 823, 825 n.1 (2nd Cir. 1969) (question open in this circuit).
The federal cases cited by Fryer involved federal statutes specifically denying eligibility for parole under sentences for terms of years on account of certain narcotic violations. 21 U.S.C. §§ 173, 174 (1964); 26 U.S.C. § 7237(d) (1964). At that time rule 11 of the Federal Rules of Criminal Procedure expressly required that defendants be made aware of the "consequences" of their pleas. In 1975 that rule was amended by substituting language requiring that defendants be told of the possible maximum and minimum penalties. In 1977 Iowa adopted amended rule 11 in substance in rule 8 of the Iowa Rules of Criminal Procedure. Our rule 8 was part of the new Iowa Criminal Code, and we note that the criminal code "was primarily a restatement of prior law." State v. Dohrn, 300 N.W.2d 162, 163 (Iowa 1981).
Since rule 11 was amended, the federal courts have taken a different approach.
The Eighth Circuit has ruled as follows:
Here, as in McRae [infra], an examination of the record discloses substantial, if not literal, compliance with Rule 11 and discloses no prejudice resulting from the court's failure to personally advise defendant of the special parole term provision of the statute and its effect upon the defendant.
United States v. Ortiz, 545 F.2d 1122, 1123 (8th Cir. 1976) (per curiam); see McRae v. United States, 540 F.2d 943, 947 (8th Cir. 1976), cert. denied, 429 U.S. 1045, 97 S.Ct. 750, 50 L.Ed.2d 759 (1977).
The Sixth Circuit has taken a similar stand in a habeas corpus proceeding involving a Michigan conviction. Armstrong v. Egeler, 563 F.2d 796, 800 (6th Cir. 1977), upholding People v. Armstrong, 390 Mich. 693, 213 N.W.2d 190 (1973). That circuit affirmed a federal district court decision which did not require that the defendant be told by the state judge of parole ineligibility. The Sixth Circuit stated:
Recognizing that the voluntariness and intelligence of a plea of guilty depends upon an understanding of its consequences, e. g., Kercheval v. United States, 274 U.S. 220, 223, 47 S.Ct. 582 [583], 71 L.Ed. 1009 (1927), we nevertheless are unwilling to hold, as a constitutional requirement applicable in habeas corpus cases to state prosecutions, that a guilty plea requires any precise litany for its accomplishment. Here, as Judge Feikens [the federal district judge] found, the state trial judge in the clearest terms advised the defendant that he was subject to the maximum penalty of solitary confinement at hard labor in a state prison for life. He stressed that "there is no discretion in this court" and that "the sentence that this Court must impose will be life imprisonment." (emphasis added).
Judge Feikens' opinion noted:
"Was it reasonable for petitioner to assume that `solitary confinement at hard labor in State Prison for life' included the possibility of parole? No evidence was presented to this court that would establish any reasonable basis for such an assumption. An individual who is advised that he would be placed for solitary confinement at hard labor for life can only conclude that this would be for the duration of his life. Petitioner was emphatically told this by Judge Newblatt, that is, that he would be confined to prison for life.
"The requirement that a plea be intelligently and voluntarily made does not impose upon the trial judge a duty to discover and dispel any unexpressed misapprehensions that may be harbored by a defendant. This is especially true as to mistaken assumptions for which there is no reasonable basis."
*444 In weighing the disputed evidence, the district court was not clearly erroneous in finding that any expectation of parole eligibility harbored by the defendant was unreasonable under the circumstances. The district court was not bound to accept Armstrong's testimony years later in the face of the colloquy which took place at the time of the plea.
We agree with the district judge here that the defendant at the time he entered his plea was sufficiently informed of the consequences to enable him to make an intelligent judgment concerning whether he should plead guilty.
563 F.2d at 799-800. Cf. Timmreck v. United States, 577 F.2d 372, 374 (6th Cir. 1978), rev'd, 441 U.S. 780, 99 S.Ct. 2085, 60 L.Ed.2d 634 (1979) (Sixth Circuit held failure of district court to explain to the defendant in guilty-plea proceedings that statute required special five-year parole term tacked to end of prison term for ten years was reversible errorUnited States Supreme Court reversed and upheld district court decision).
We find the Armstrong analysis to be persuasive. The facts of that case are analogous to the present ones.
II. The controlling Iowa decision at the time Fryer entered his guilty plea was State v. Sisco, 169 N.W.2d 542 (Iowa 1969). In that case this court quoted from and adopted the American Bar Association Standards on guilty pleas. Id. at 547-48. Those standards require, inter alia, that an accused entering a plea of guilty understand the nature of the charge, the waiver of jury trial he makes by the plea, and the maximum and mandatory minimum sentences including enhanced punishment. A.B.A. Standards Relating to Pleas of Guilty § 1.4(c) (Approved Draft, 1968). Nowhere do those standards require that the court inform the defendant of ineligibility for parole. The language of those standards is the model for both current federal rule 11 and, more significantly to our analysis, Iowa rule 8. This court stated regarding those standards: "This does not mean a determination by trial courts of the matters here involved requires any ritualistic or rigid formula be fixed upon or followed. There must, however, be meaningful compliance with these guideline standards." Sisco, 169 N.W.2d at 548. See State v. Sargent, 210 N.W.2d 656, 659 (Iowa 1973); State v. Bell, 210 N.W.2d 423, 426 (Iowa 1973). We hold that Sisco and the cases applying it which were in existence at the time of Fryer's guilty plea did not require a sentencing court to inform a defendant of ineligibility for parole.
We need not decide whether present Iowa rule 8 and the Sisco-type cases decided by us since 1974 are retrospective, for they do not require a different result. Rule 8 has language similar to federal rule 11 and to the American Bar Standards we considered in Sisco, which do not require a statement of parole ineligibility. See also Brainard v. State, 222 N.W.2d 711, 715 (Iowa 1974) (decided subsequent to this guilty plea: "The trial judge through interrogation must establish that the defendant is aware of the possible maximum punishment, any mandatory minimum punishment, and any enhanced punishment for the offense charged, and he must insure the defendant understands he waives his constitutional trial rights by a guilty plea."). "Enhanced punishment" refers, for example, to increased penalty for the offense charged, such as an added period of incarceration because the offense is charged as a second or subsequent one. Compare State v. Boone, 298 N.W.2d 335, 338 (Iowa 1980) ("It would not have been necessary for the court to inform the defendant that he was ineligible for a deferred judgment or suspended sentence."); State v. Woolsey, 240 N.W.2d 651, 653 (Iowa 1976); and State v. Christensen, 201 N.W.2d 457, 459 (Iowa 1972), with A.B. A. Standards Relating to Pleas of Guilty § 1.4(c)(iii), Commentary at 28 ("It seems clear that a defendant should be told of the possible added punishment under multiple offender statutes.") (Approved Draft, 1968); 21 Am.Jur.2d Criminal Law § 490 (1965); and Annot., 97 A.L.R.2d 549, 581 (1964).
*445 A court receiving a plea of guilty to a murder charge is not required to tell the defendant that he is ineligible for parole upon conviction of first-degree murder.
AFFIRMED.
| {
"pile_set_name": "FreeLaw"
} |
Q:
Spark. Data caching?
I'm testing below script in spark-shell - single partition scan of partitioned table.
val s = System.nanoTime
var q =
s"""
select * from partitioned_table where part_column = 'part_column_value'
"""
spark.sql(q).show
println("Elapsed: " + (System.nanoTime-s) / 1e9 + " seconds")
First execution takes around 30 seconds while all subsequent executions take around 2 seconds.
If we have a look at runtime statistics - there are two additional jobs before first execution
Looks like job with 1212 stages scans all the partitions in a table (total num of partitions 1199, total num of HDFS files for this table - 1384).
I did not find a way to discover what exactly scala/java or SQL code is running for Job 0 but I suspect it's for caching.
Each time I exit spark-shell and start it again - I see this two additional jobs before first executions.
Of course, similar observations are true for other queries.
Questions
Is it possible to prove or negate hypothesis about caching?
If it's for caching - how to disable cache and how to clean it up?
Update. Details about job.
A:
The problem was occurring for specific Spark version 2.0.2.
Spark has been scanning of all the partitions while building the plan and before query execution.
The issues has been logged and fixed in Spark 2.1.0
https://issues.apache.org/jira/browse/SPARK-16980
| {
"pile_set_name": "StackExchange"
} |
The optical propagation dynamics in nonlinear periodic systems has become a considerate topic in nonlinear optics, because of their intriguing physical properties and their potential applications[@b1]. One of the physical mechanisms that support the existence of spatial solitons is the optical induced lattices, these periodic structures with or without defects induced by nonlinearity can confine a light beam propagating in their interior or along the surface, many fantastic optical solitons supported by photonic and optical lattices have been investigated theoretically[@b2] and observed experimentally[@b3]. Since their existence was predicted by Musslimani *et al*. in ref. [@b4], optical solitons in parity-time (PT) symmetric periodic potentials have attracted much special interest for their unique properties. Noteworthily, a new integrable nonlocal nonlinear Schrödinger equation with PT-symmetry is introduced by Ablowitz *et al*., and it is shown that pure soliton solutions can be supported by this integrable Hamiltonian system[@b5]. Quantum mechanics shows that a wide class of non-Hermitian Hamiltonians can also have an entirely real spectrum in a certain region of parameters provided they respect PT-symmetry, which indicates that the real part of the complex potential should be an even function of position and the imaginary part should be an odd one. It is noteworthy to point out that this condition is just necessary but not sufficient. The realization of complex PT-symmetric potentials within the framework of optics has paved the way towards several novel optical control schemes with intriguing and unexpected properties[@b6]. At present, spatial solitons have been studied in several types of PT-symmetric optical systems, including Kerr media[@b4][@b7], nonlocal media[@b8], quadratic nonlinear media[@b9], superlattice[@b10], mixed linear-nonlinear lattices[@b11], competing nonlinear media[@b12].
Theory and experiment have demonstrated that a saturable nonlinear medium is promising for the propagation and control of spatial solitons. Among these optical solitons, photorefractive optical solitons forms a specific branch[@b13], thanks to their feature of formation at low laser power level, stability in more than one transverse dimension due to the saturable nonlinearity and a variety of potential important applications in all optical switching and signal processing. Another saturable mechanism that can support the existence of solitons is logarithmically nonlinearity. Although the real materials with logarithmically nonlinearity has not been realized, some meaningful physical interpretations have been given to the presence of the logarithmic nonlinearity, and it has proved useful for the modeling within the context of several nonlinear phenomena, which appears, for example, in Klein-Gordon model[@b14], in atomic physics[@b15][@b16], in magma transport[@b17], and in optics[@b18][@b19][@b20][@b21][@b22][@b23][@b24]. For example, the Schrödinger equation with nonlinearity has been applied to atomic physics[@b15][@b16]. Here, *b* is a positive constant, *a* is a length and its value is not physically significant, since a change in its value can be compensated by multiplying the wave function by a phase, or by adding a constant potential to *U*. It is shown that the form of this logarithmic nonlinearity satisfies the condition of the separability of noninteracting subsystems, and a neutron interferometer experiment was proposed to test the physical reality of such a nonlinearity[@b15][@b16]. In the area of nonlinear optics, it is also difficult to find a optical medium whose optical response can satisfy this nonlinear requirement, however, the logarithmic Schrödinger equation, where the perturbed index nonlinear change for the incident beam intensity *I* is scales with ln(*I*), has been employed as a relevant equation of nonlinear wave mechanics including Gausson, periodic and quasiperiodic evolution[@b18][@b19], soliton interaction[@b20], modulated nonlinear solitons[@b21], mighty morphing spatial solitons[@b22], incoherent solitons[@b23], as well as, localized soliton solutions supported by modulated lattice[@b24].
In this paper, we address the existence and stability of solitons in PT-symmetric periodic systems with a saturable nonlinearity, the perturbed index nonlinear change of which varies logarithmically incident optical beam normalized intensity *I* and is scales with ln(*σ* + *I*), where *σ* = 1 and 0 is an relevant saturable parameter, corresponding to the self-focusing nonlinearity and changing nonlinearity (i.e., the logarithmic function is positive at *I* \> 1 and negative at *I* \< 1), respectively. Note that a logarithmic nonlinearity of this sort given by ln(*I*) was employed by Snyder and Mitchell in their study of mighty morphing spatial solitons and bullets[@b22]. In their model, there is a concern only for the tails of the beam at an infinite distance from its center. If *I* ≫1, negligible power exists in the tails for intensities below *I* \< 1. In this model *σ* = 0, the limit *I* → 0 might appear unphysical for the realistic materials[@b22]. In fact, the Schrödinger equation with nonlinearity ln(*I*) can support stable and localized Gaussian soliton solutions of the form , where *A* is the soliton amplitude, *k* and *φ* represent the soliton frequency and phase, respectively[@b19]. In this paper, we investigate the presence of stable soliton solutions of the nonlinear Schrödinger (NLS) equation with the above two logarithmically nonlinearity, which can provide valuable insight into other nonlinear wave mechanics and still maintain the characteristic features of the underlying physical process. For both mentioned types of nonlinearities, there exist two distinct types of solitons, namely on-site and off-site solitons, depending on whether the soliton is centered at a maximum or minimum of the real part of PT-symmetric periodic potential. The properties of these solitons with self-focusing nonlinearity (σ = 1) are qualitatively similar to those of solitons in nonlinear Kerr media supported by PT-symmetric potentials. The most intriguing result is that the above solitons in the case of σ = 0, can be realized inside the several higher-order bands of the band structure, due to the change of nonlinear type with the soliton power. The stabilities of these solitons are also investigated.
Results
=======
Theory model
------------
We consider the propagation of an optical beam in a PT-symmetric lattice with logarithmically saturable nonlinearity. The propagation dynamic of the beam is governed by the following one-dimensional nonlinear Schrödinger (NLS) equation for the dimensionless complex amplitude of the light field *q* :
where the transverse *x* and longitudinal *z* coordinates are scaled to the characteristic beam width and diffraction length, respectively. In [Eq. (1)](#eq7){ref-type="disp-formula"}, we consider that the PT-symmetric periodic potential is given by the functions and , where *V*~0~ and *ω*~0~ are amplitudes of real and imaginary parts of periodic potential, respectively; *φ* = 0, *π*/2 correspond to two different complex refractive index distributions, namely on-site and off-site nonlinearity, depending on whether the real part of modes is symmetric and antisymmetric, in *x*. Note that there is no difference between the above two refractive index landscapes except a *π* phase shift, as shown in [Fig. 1(a,b)](#f1){ref-type="fig"}. In this paper, we just study the soliton solutions on both sides of the lattice center (*x* = 0), in fact, both on-site (odd mode) and off-site (even mode) solutions exist for the two values of *φ* at appropriate initial conditions. [Figure 1 (a,b)](#f1){ref-type="fig"} show the profiles of the PT-symmetric periodic potential for *V*~0~ = 4 and *ω*~0~ = 0.8 with *φ* = 0 and *π*/2, respectively. *σ* is an relevant saturable parameter. According to the values of *σ* one can distinguish two different cases. (i) *σ* = 1: it represents a self-defocusing nonlinearity; (ii) *σ* = 0: the logarithmic function is positive at \|*q*\|^2^ \> 1 and negative at \|*q*\|^2^ \< 1; that is to say, the type of nonlinearity would be changed with light intensity.
We search the stationary soliton solutions of [Eq. (1)](#eq7){ref-type="disp-formula"} in the form *q* = *f*(*x*)exp(*iμ*z) that can be characterized by the propagation constant *μ*, *f*(*x*) = *h*(*x*) + *ie*(*x*) is a complex-valued function. [Eq. (1)](#eq7){ref-type="disp-formula"} can be rewritten in the following coupled equations,
The stationary solutions can be solved numerically by the Newton's iteration, spectral renormalization[@b25] and developed squared-operator methods[@b26]. The total power of the system can be defined as:. Furthermore, in order to comprehensively examine the soliton linear stability, we search for perturbed solution to [Eq. (1)](#eq7){ref-type="disp-formula"} in the form[@b27]:
where *g*(*x*) and *t*(*x*) are small perturbations that can grow with the complex rate *δ* = *δ*~r~ + *iδ*~i~ upon propagation and the asterisk means complex conjugation. Linearization of [Eq. (1)](#eq7){ref-type="disp-formula"} around *f*(*x*) leads to the following eigenvalue problem,
which we solve numerically to find the growth rate. If *δ*~r~\>0, solitons are unstable, otherwise, they are stable.
It is instructive to analyze the linear propagation of light beams in the optical lattice. When the energy flows of soliton beams are small, the optical lattices induce a bandgap structure in the linear Schrödinger spectral problem, . Bounded solutions of this linear equation are called Bloch modes, and the corresponding frequencies *μ* form the Bloch bands. Based on the Floquet-Bloch theory, we can obtain the Bloch spectrum by solving the above equation with, where *k* is the Bloch wave number bounded between −1 ≤*k* ≤ 1, *w*(*x*) = *w*(*x* + *T*) is a Bloch function with the same periodicity as the lattices. A typical lattice spectrum obtained by the plane wave expansion method is depicted in [Fig. 1(c)](#f1){ref-type="fig"} at *V*~0~ = 4 and *ω*~0~ = 0.8. All possible propagation constant values are arranged into bands (gray regions), where [Eq. (1)](#eq7){ref-type="disp-formula"} admits Bloch wave solutions, while in the gaps (white regions) periodic waves do not exist. These gaps from top to bottom are called sequentially as the semi-infinite band gap (*μ* ≥ 2.657), first finite band gap (2.584 ≥ *μ* ≥ 0.8407), second finite band gap (0.138 ≥ *μ* ≥ −0.5137), and so on in this paper. It should be pointed out that there exists a phase transition point (or threshold) , below which all the propagation eigenvalues are real. Once *ω*~0~ exceeds this critical value, an abrupt phase transition occurs because of the spontaneous symmetry breaking, the first two bands start to merge together and form an oval-like structure and a complex band diagram forms, as shown in [Fig. 1(d)](#f1){ref-type="fig"}. Further increasing *ω*~0~, it is shown that the real parts of the first two bands begin to overlap with each other, with the imaginary parts taking nonzero opposite signs.
Lattice solitons in PT-symmetric periodic systems with logarithmical nonlinearity
---------------------------------------------------------------------------------
To begin with, in this section, we investigate solitons and their stability supported by PT-symmetric periodic lattice with logarithmical self-focusing nonlinearity (*σ* = 1). Numerically, we find two types of lattice solitons bifurcating from band edge in the semi-infinite band gap.
In the nonlinear case, [Eq. (1)](#eq7){ref-type="disp-formula"} support a family of on-site lattice soliton at *φ* = 0 and *σ* = 1 and the results are shown in [Figs 2](#f2){ref-type="fig"} and [3](#f3){ref-type="fig"}. [Figure 2(a)](#f2){ref-type="fig"} gives the existence curves (solid line). Obviously, this family of solution bifurcates from the base of the first band into the semi-infinite band gap. *P* is a monotonic function of *μ*, and increases with *μ* in the existence domain. Representative profiles of two solitons at low and high powers are shown in [Fig. 3(a,b)](#f3){ref-type="fig"}. Notice that real part of on-site lattice soliton modes are centered at a refractive index maximum, and as the total power increases, these solitons have the tendency to become more spatially localized inside the lattice. A comprehensive linear instability analysis based on [Eqs. (5](#eq10){ref-type="disp-formula"}) and ([6](#eq11){ref-type="disp-formula"}) is performed. Our result shows this family of lattice solitons in the semi-infinite band gap is completely stable in the entire existence domain. We also test the stability of the solitons by direct simulation of propagation of perturbed soliton solutions in [Eq. (1)](#eq7){ref-type="disp-formula"}. [Figure 2(c,d)](#f2){ref-type="fig"} show two examples of the stable evolution of these solitons corresponding to profiles displayed by [Fig. 2(a,b)](#f2){ref-type="fig"} at *μ* = 2.75 and 4.5, which are robustness and propagate without any noticeable deformations under 5% random initial perturbation.
We also find that a family of off-site lattice soliton supported by PT-symmetric periodic lattice with logarithmical nonlinearity can exist in the semi-infinite band gap at *φ* = *π*/2 and *σ* = 1. Corresponding real parts of soliton mode are centered at a refractive index minimum. [Figure 2(a)](#f2){ref-type="fig"} shows the existence domain of such off-site lattice solitons (dash lined). Apparently, for the existence curve of off-site lattice soliton, a similar trend is observed to on-site lattice solitons, the soliton energy flow monotonically increases with the increase of propagation constant *μ*. As can be seen in [Fig. 2(a)](#f2){ref-type="fig"}, the power of off-site lattice soliton is higher than that of off-site one at the same propagation constant. Thus the on-site soliton is energetically favorable. Two representative profiles at high and low powers are displayed in [Fig. 4(a,b)](#f4){ref-type="fig"}. Similar to the above on-site lattice solitons, these off-site solitons here also localize at high power. Linear stability analysis indicates that such off-site lattice solitons are unstable in the entire domain of their existence, where the real part of the perturbation growth rate *δ*~r~ \> 0 and the exponential instability develops, shown in [Fig. 2(b)](#f2){ref-type="fig"}. These results are confirmed by direct simulations of propagation of perturbed soliton solutions in [Eq. (1)](#eq7){ref-type="disp-formula"}. [Figure 4(c,d)](#f4){ref-type="fig"} display examples of the evolution of unstable solitons corresponding to [Fig. 4(a,b)](#f4){ref-type="fig"}. The insets in the [Fig. 4 (c,d)](#f4){ref-type="fig"} show the intensity profiles of off-site lattice soliton after a distance of *z* = 500. When the off-site soliton has high power, under the random initial perturbation, its energy periodically shift between two adjacent lattice sites, and always exhibits chain-type evolution due to the oscillator instability. However, the soliton with low power will shift all its energy into one lattice site and evolve into an on-site lattice soliton after a distance, as shown in [Fig. 4(c)](#f4){ref-type="fig"}.
Inband solitons in PT-symmetric periodic systems with logarithmical nonlinearity
--------------------------------------------------------------------------------
In this section, we constrain our studies on solitons and their stability supported by PT-symmetric periodic lattice in the case *σ* = 0, where the type of nonlinearity would be changed with increasing soliton power. Both on-site and off-site inband solitons inside several higher-order bands of the linear spectrum are found.
In the model with *φ* = 0 and *σ* = 0, the existence area of the on-site inband solitons inside higher-order bands on the (*μ*, *P*) plane is presented in [Fig. 5(a)](#f5){ref-type="fig"}, which shows that the solitons with high power can be readily found in semi-infinte gap, as the power decreases, the existence curve penetrates inside the band, and further into higher-order band gap, and these solitons in the higher-order band and band gap have a very low intensity. This property is attributed to the change of nonlinear type with beam intensity. It is well known that periodic waveguide structures, including waveguide arrays, optically induced lattices, usually support Floquet--Bloch modes, all possible periodical guided modes are arranged into bands which are separated by gaps between them, and periodic waves do not exist in the gaps. Recently, it is shown that some soliton modes can reside inside the Bloch bands in some periodic systems. For example, localized solutions known as embedded solitons can exist inside the linear spectrum for discrete values of the propagation constant, which is possible if the spectrum of the linearized system possesses two branches, one corresponding to exponentially localized solutions and the other to radiation modes[@b28]. The another self-localized solutions, named nonlocal lattice solitons supported by thermal nonlocal nonlinearity with an infinite range of nonlocality, also can exist inside the bands of the band structure, which is attributed to the infinite range of nonlocality as well as to the boundary condition applied to the system[@b29]. In our models, on-site inband solitons supported by PT-symmetric periodic lattice can also be realized inside the several higher-order bands of the band structure, due to the change of nonlinear type with the soliton power. Similar to the gap solitons in other periodic systems, when the power is high (\|*q*\|^2^\>1), [Eq. (1)](#eq7){ref-type="disp-formula"} represents a self-focusing nonlinearity, and solitons can exist in the semi-infinite gap. Nonlinearity will be turned into self-defocusing type at \|*q*\|^2^\<1, and solitons can be found in finite band gaps. As a result, these solitons can exist in several bands and gaps, due to the change of nonlinear type with the soliton power. It should be note, for \|*q*\|^2^ → 0, [Eq. (1)](#eq7){ref-type="disp-formula"} would have an infinite nonlinearity and an unpleasant feature might appear. It requires that the light intensity should not be too low. In our simulation, it is found that the solitons with low power *P* = 0.01 can also be readily found. [Figure 6(a,b)](#f6){ref-type="fig"} display two representative soliton profiles with low and high power at *μ* = 0.5 and 4.5, respectively. Different from lattice solitons in the previous section, these inband solitons here do not localize at high power. The stability of these solitons is tested by direct simulation and linear stability analysis. It is shown that, when these inband on-site soliton do not have extremely low powers, they are found to be stable in whole existence domain. [Figure 6(c,d)](#f6){ref-type="fig"} show the examples of soliton stable evolution propagation corresponding to [Fig. 6(a,b)](#f6){ref-type="fig"}, which show that these inband solitons supported by the combined effect of PT-symmetric potential and logarithmic nonlinearity can propagate without any noticeable deformations under 5% random initial perturbation after a distance of z = 500.
In this subsection, we examine off-site inband solitons inside the higher-order band of the linear spectrum. The power diagram is shown in [Fig. 5(a)](#f5){ref-type="fig"}, which reveals that these off-site inband solitons also can exist in several bands and band gaps, and the power of off-site inband soliton has a higher power than on-site one at the same propagation constant. Both the linear stability analysis and direct numerical simulation indicate that these off-site inband solitons are linearly unstable, shown in [Fig. 5(b)](#f5){ref-type="fig"}. [Figure 7(a,b)](#f7){ref-type="fig"} depict two typical soliton profiles at parameters *μ* = 0.5 and 4.5, whose evolution propagations are shown in [Fig. 7(c,d)](#f7){ref-type="fig"}, respectively. And the intensity patterns of off-site inband soliton after a distance of *z* = 500 are shown in the insets of [Fig. 7 (c,d)](#f7){ref-type="fig"}. Similar to on-site inband solitons, these off-site inband solitons also do not localize in high power domain. [Figure 7(c)](#f7){ref-type="fig"} shows that low power soliton also shift its energy into one lattice site but not be found to evolve into an on-site soliton, which is different from the off-site lattice soliton at *φ* = *π*/2 and *σ* = 1, shown in [Fig. 4(c)](#f4){ref-type="fig"}. In high power domain, it also always exhibits chain-type evolution due to the oscillator instability, which is similar to the unstable evolution of off-site lattice soliton. This property is attributed to the nature of nonlinearity associated with the soliton power in [equation (1)](#eq7){ref-type="disp-formula"}. In the high soliton power domain, numerical beam propagation in this ln(*I*) model is indistinguishable from that of the ln(*σ* + *I*) nonlinearity.
Summary and discussion
----------------------
To conclude, Solitons and their stability in PT-symmetric periodic systems with the logarithmically saturable nonlinearity have been analyzed. Two families of solitons, i.e., on-site and off-site solitons supported by the PT-symmetric periodic potential can be formed for both the self-focusing nonlinearity and varied nonlinearity. Both on-site and off-site lattice solitons for the case of self-focusing nonlinearity have been found in the semi-infinite band gap, and bifurcate from the edge of Bloch band into the corresponding band gap. On-site lattice solitons belonging to the semi-infinite band gap can propagate stably in whole existence domain, but off-site lattice solitons belonging to this band gap are unstable in the entire domain of their existence. These off-site lattice solitons with high power exhibit chain-type unstable evolution under random initial perturbation, whereas an off-site soliton in low power domain would evolve into an on-site lattice soliton after a distance. In the case *σ* = 0, both the on-site and off-site inband solitons can also be realized in the PT-symmetric periodic systems, where the type of nonlinearity would be changed with light intensity. The most intriguing property is that the two families of solitons can exist inside the high-order bands of the band structure. This property is attributed to the change of nonlinear type with the soliton power. It is shown that existence curves of inband solitons penetrate inside the relatively high-order band gap, where solitons have very low power. Similar to lattice solitons under a self-focusing nonlinearity, on-site inband solitons are linearly stably, and off-site inband solitons are unstable in their existence domain. At high power domain, it also always exhibits chain-type evolution, the low power soliton can also shift its energy into one lattice site but not be found to evolve into an on-site soliton.
A critic might question whether our model can be realized physically, indeed, the logarithmic Schrödinger equation has no direct application in nonlinear optics. This law arises in various fields of contemporary physics. Various meaningful physical interpretations have been given to the presence of the logarithmic potential[@b30]. Our results about the beam propagations in the logarithmically nonlinear systems might provide some valuable insight into other nonlinear wave mechanics. These results can be extended to other periodic settings, where the type of nonlinearity can be changed with the intensity, and may provide several novel ways for beam controlling in micro structure. In addition, in this paper, we address the general properties of logarithmical solitons supported by PT-symmetric lattices below the phase transition points. Nonlinear wave dynamics with logarithmically nonlinearity in PT-symmetric lattices near the phase transition points and in nonlinear real lattice have not been explored yet.
Additional Information
======================
**How to cite this article**: Zhan, K. *et al*. Solitons in PT-symmetric periodic systems with the logarithmically saturable nonlinearity. *Sci. Rep.* **6**, 32990; doi: 10.1038/srep32990 (2016).
This work was supported by the Natural Science Foundation of China (Grant No. 11247259, 61605251), Shandong Provincial Natural Science Foundation, China (Grant No. ZR2012AQ005), and the Fundamental Research Funds for the Central Universities (Grant No. 14CX02156A, 16CX02052A).
**Author Contributions** K.Z. and H.T. conceived the idea and presented the overall theoretical analysis; X.L. and X.X. carried out the numerical simulations; Z.J. and Y.J. analyzed theoretically the numerical results.
{#f1}
{#f2}
{#f3}
{#f4}
{#f5}
{#f6}
{#f7}
| {
"pile_set_name": "PubMed Central"
} |
// Copyright 2019 The Prometheus Authors
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package sysfs
import (
"fmt"
"io/ioutil"
"path/filepath"
"strings"
)
const (
notAffected = "Not Affected"
vulnerable = "Vulnerable"
mitigation = "Mitigation"
)
// CPUVulnerabilities retrieves a map of vulnerability names to their mitigations.
func (fs FS) CPUVulnerabilities() ([]Vulnerability, error) {
matches, err := filepath.Glob(fs.sys.Path("devices/system/cpu/vulnerabilities/*"))
if err != nil {
return nil, err
}
vulnerabilities := make([]Vulnerability, 0, len(matches))
for _, match := range matches {
name := filepath.Base(match)
value, err := ioutil.ReadFile(match)
if err != nil {
return nil, err
}
v, err := parseVulnerability(name, string(value))
if err != nil {
return nil, err
}
vulnerabilities = append(vulnerabilities, v)
}
return vulnerabilities, nil
}
// Vulnerability represents a single vulnerability extracted from /sys/devices/system/cpu/vulnerabilities/
type Vulnerability struct {
CodeName string
State string
Mitigation string
}
func parseVulnerability(name, value string) (Vulnerability, error) {
v := Vulnerability{CodeName: name}
value = strings.TrimSpace(value)
if value == notAffected {
v.State = notAffected
return v, nil
}
if strings.HasPrefix(value, vulnerable) {
v.State = vulnerable
v.Mitigation = strings.TrimPrefix(strings.TrimPrefix(value, vulnerable), ": ")
return v, nil
}
if strings.HasPrefix(value, mitigation) {
v.State = mitigation
v.Mitigation = strings.TrimPrefix(strings.TrimPrefix(value, mitigation), ": ")
return v, nil
}
return v, fmt.Errorf("unknown vulnerability state for %s: %s", name, value)
}
| {
"pile_set_name": "Github"
} |
Q:
How to check if server control text contains html entity(Checkmark, cross etc.)?
Weird but it is becoming problem for me!
I have added an html checkmark with this code ✔ to my linkbutton text but when I am trying to check this
if(headerLinkButton.Text == "✔")
it returns me false!
and when I check its text putting breakpoint, it shows the same checkmark that it shows on browser!
Strange How can I simulate a checkmark in my code?
A:
Try this instead :
switch(HttpUtility.HtmlEncode(headerLinkButton.Text))
{
case "✔":
// do your stuff
}
Or Alternately
if(headerLinkButton.Text == HttpUtility.HtmlDecode("✔"))
Hope this will help !!
| {
"pile_set_name": "StackExchange"
} |
Fetal and Neonatal Physiology
4th
Edition
Expert Consult - Online and Print, 2-Volume Set
By Richard A. Polin, MD, William T. Speck Professor of Pediatrics, College of Physicians and Surgeons, Columbia University; Director, Division of Neonatology, Morgan Stanley Children's Hospital of New York - Presbyterian, New York, New York
and Steven H. Abman, MD, Professor of Pediatrics, University of Colorado School of Medicine; Director, Pediatric Heart Lung Center, The Children?s Hospital, Denver, Colorado
VII. Perinatal Iron, Trace Minerals, and Vitamin Metabolism: Iron Metabolism during Fetal and Neonatal Life ? Trace Element Metabolism in the Fetus and Neonate ? Metabolism of Vitamin A and Water Soluble Vitamins During Fetal and Neonatal Life ? Vitamin E Metabolism in the Fetus and Neonate ? Vitamin K Metabolism during the Fetal and Neonatal Periods
VIII. Lipid Metabolism in the Fetus and Newborn: Placental Transport of Free Fatty Acids, Glycerol, and Ketone Bodies ? Lipid Accretion in the Fetus and Newborn ? Brown Adipose Tissue: Development and Function ? Lipids and an Energy Source for the Premature and Full-Term Neonate ? Ketone Body Production and Metabolism in the Fetus and Newborn ? Very Long Chain Fatty Acids in the Developing Retina and Brain ? Physiological Effects of Lipid Infusions ? Developmental Physiology of Lipoproteins and Cholesterol ? Lipoprotein Lipase
IX. Carbohydrate Metabolism: Metabolism of Glucose and Methods of Investigation in the Fetus and Newborn ? Maternal Metabolism During Pregnancy ? Carbohydrate Metabolism in the Fetus ? Role of Glucoregulatory Hormones on Hepatic Glucose Metabolism During the Perinatal Period ? Cell Glucose Transport and Glucose Handling During Fetal and Neonatal Development ? Glucose Metabolism During the Transition to Postnatal Life ? Hypoglycemia and Hyperglycemia in the Newborn
XII. Skin: Structural and Biochemical Organogenesis of Skin and Cutaneous Appendages in the Fetus and Newborn ? Development of the Cutaneous Circulation ? Composition of Skin Lipids ? Sweating in the Neonate ? pH Patterns in Newborn Skin ? Skin Barrier Function ? Bacterial Colonization of the Skin of the Newborn
XIII. Fetal and Neonatal Cardiovascular Physiology: Development of the Fetal Heart ? Molecular Development of the Heart ? Role of Peptide Growth Factors in Cardiovascular Development ? Fetal and Neonatal Cardiovascular Physiologic Development ? Developmental Electrophysiology in the Fetus and Neonate ? Developmental Biology of the Pulmonary Vasculature ? Development of the Pulmonary Circulation: Metabolic Aspects ? Development of the Gastrointestinal Circulation in the Fetus and Newborn ? Regulation of the Fetal Cerebral Circulation ? Autonomic and Central Neuroregulation of Fetal Cardiovascular Function ? Endocrine Regulation of the Fetal Circulation ? Nitric Oxide and the Perinatal Circulation ? Regulation of Umbilical Blood Flow ? Fetal and Placental Circulation During Labor ? Cardiovascular Diagnosis in the Fetus and the Effects of Congenital Heart Lesions on Developing Physiology ? Response of the Fetal Circulation to Stress ? Fetal and Neonatal Congestive Heart Failure ? Physiology of Resuscitation
XIV. The Lung: Normal and Abnormal Structural Development of the Lung ? Fetal and Neonatal Lung-liquid Balance ? Functional Development of the Upper Airway ? Functional Development of the Lower Airway ? Functional Development of Respiratory Muscles ? Mechanics of Breathing ? Pulmonary Gas Exchange in the Developing Lung ? Oxygen Transport and Delivery ? Control of Breathing in Fetal Life and Onset and Control of Breathing in the Neonate ? Pathophysiology of Apnea of Prematurity ? Evaluation of Pulmonary Function in the Neonate ? Pathophysiology of Hyaline Membrane Disease (Excluding Surfactant) ? Pathophysiology of Lung Injury and Repair: Special Features of the Immature Lung ? Pathophysiology of Chronic Lung Disease ? Physiologic Effects of Conventional Mechanical Ventilation ? Physiology of High Frequency Ventilation ? Liquid Ventilation ? Physiology of Extracorporeal Membrane Oxygenation
XVI. Physiology Of The Gastrointestinal Tract in the Fetus and Neonate: Cellular and Molecular Aspects of Human Gastrointestinal Development ? Organogenesis, Innervation, and Histologic Development of the Gastrointestinal Tract ? Development of the Enteric Nervous System ? Development of Gastric Secretory Function ? Development of Intestinal and Colonic Motility ? Motility of the Upper Gastrointestinal Tract in the Fetus and Neonate ? Development of Exocrine Pancreatic Function ? Digestive and Absorptive Function in the Fetus and Infant ? Pathophysiology of Gastroesophageal Reflux ? Pathophysiology and Epidemiology of Necrotizing Enterocolitis
XVII. Liver and Bilirubin Metabolism: Organogenesis and Histologic Development of the Liver ? Fetal and Postnatal Hepatic Vasculature and Blood Flow ? Bile Acid Metabolism during Development ? Bile Secretion and its Control in the Mature and Immature Organism ? Hepatic Disposition of Xenobiotics during Prenatal and Early Postnatal Development ? Bilirubin Metabolism and Toxicity in the Newborn ? Pathophysiology of Breast-Milk Jaundice ? Phototherapy for Neonatal Jaundice ? Pathophysiology of Metabolic Diseases of the Liver ? Pathogenesis of Neonatal Cholestasis ? Evaluation of Liver Function
XVIII. The Kidney: Embryogenesis and Anatomic Development of the Kidney ? Renal Function in Utero ? Postnatal Maturation of Renal Blood Flow ? Development of the Renin-Angiotensin System ? Postnatal Development of Glomerular Filtration ? Measurement of Glomerular Filtration Rate in Neonates ? Renal Transport of Sodium During Early Development ? Potassium Transport in Early Development ? Transport of Calcium and Phosphorus ? Transport of Amino Acids During Early Development ? Developmental Aspects of Organic Acid Transport ? Concentration of the Urine ? Dilution of the Urine ? Urinary Acidification ? The Response to Nephron Loss in Early Development ? Regulation of Blood Pressure During Fetal and Newborn Life ? Clinical Significance of Developmental Renal Physiology ? Pathophysiology of Acute Renal Failure in the Neonatal Period ? Continuous Hemofiltration in Neonates
XIX. Fluid and Electrolyte Metabolism: Fluid Distribution in the Fetus and Neonate ? Fetal and neonatal Body Fluid Composition with Reference to Growth and Development ? Colloid Pressure and Osmoregulation in the Pregnant Woman, Fetus, and Neonate ? Regulation of Acid-Base Balance in the Fetus and Neonate ? Hydrops Fetalis and Other Causes of Neonatal Edema and Ascites
XXIII. Neurology: Development of the Nervous System ? Development of the Blood-Brain Barrier ? Development of Neurotransmitters ? Biochemistry of Hypoxic-ischemic Brain Injury ? Perinatal Brain Metabolism and Prevention of Asphyxial Injury ? Developmental Biochemistry: Studies in vivo with Nuclear Magnetic Resonance Spectroscopy ? Electroencephalography in the Premature and Full-term Infant ? Development of Tone and Reflexes in the Fetus and Newborn ? Cerebral Blood Flow in Premature Infants: regulation, Measurement, and Pathophysiology of Intraventricular Hemorrhage ? Intraventricular Hemorrhage in the Premature Infant: Morphologic Characteristics ? Deleterious Effects of Intrauterine Drug Exposure of the Nervous System ? Nutritional and Hormonal Regulation of Brain Development ? Ontogenesis of Striated Muscle
XXIV. Special Sensory Systems in the Fetus and Neonate: Development of Touch, Pain, and Temperature Sensation in the Fetus and Neonate ? Anatomical and Functional Development of the Eye and Pathophysiology of Retinopathy of Prematurity ? Anatomical and Functional Development of Hearing ? Development of Taste and Smell in the Neonate
XVII. The Pituitary: Neurosecretions and Neurotransmitters of the Fetal Hypothalamus ? Growth Factors and Development ? Growth Hormone and Prolactin ? LH and FSH Secretion in the Fetus and Newborn ? Development of the Corticotropin-releasing Factor ACTH/Beta Endorphin System in the Mammalian Fetus ? Fetal and Neonatal Neuropophyseal Hormones | {
"pile_set_name": "Pile-CC"
} |
Response to Dr. Ventres' Q-List Manifesto.
Comments on the article by William B. Ventres (see record 2015-01771-001). Dr. Ventres' article clearly defines why a checklist approach that is appropriate to procedurally oriented specialties is often not appropriate in primary care. For those of us in primary care who felt uneasy about a checklist approach, it is a welcome reflection on some of the underlying reasons for that unease. | {
"pile_set_name": "PubMed Abstracts"
} |
Primary structure of the hemoglobins from the greater Kudu antelope (Tragelaphus strepsiceros).
The adult greater Kudu antelope has two hemoglobin components, Hb A and Hb B, with one alpha and two beta chains. The complete amino-acid sequences of these three chains are presented. The two beta chains differ only in one residue at position 16 (Gly----Ser) and may be the product of two allelic genes. The primary structure of the chains was determined by sequencing the tryptic peptides after their isolation from the tryptic digest of the chains by high performance liquid chromatography. The alignment of these peptides was deduced from homology with the chains of bovine hemoglobin. Between the Kudu hemoglobins and those of cattle a high degree of homology was found. | {
"pile_set_name": "PubMed Abstracts"
} |
Description
Wielding his famous shield, Captain America™ springs out
of the comic book pages on this action-packed bedding, encouraging little super heroes to dream of crime-fighting adventures. DETAILS THAT MATTER Pure cotton percale. 200-thread count. Duvet cover is finished with ... | {
"pile_set_name": "Pile-CC"
} |
Yoshiko Tanaka (table tennis)
is a former international table tennis player from Japan.
Table tennis career
She won a gold medal in the women's team event at the World Table Tennis Championships in 1954.
In addition she won six other World Championship medals; one in the singles, two in the doubles, one in the mixed doubles and two in the team event.
See also
List of table tennis players
List of World Table Tennis Championships medalists
References
Category:Japanese female table tennis players | {
"pile_set_name": "Wikipedia (en)"
} |
/*
* Linux network driver for QLogic BR-series Converged Network Adapter.
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License (GPL) Version 2 as
* published by the Free Software Foundation
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*/
/*
* Copyright (c) 2005-2014 Brocade Communications Systems, Inc.
* Copyright (c) 2014-2015 QLogic Corporation
* All rights reserved
* www.qlogic.com
*/
/* BNA Hardware and Firmware Interface */
/* Skipping statistics collection to avoid clutter.
* Command is no longer needed:
* MTU
* TxQ Stop
* RxQ Stop
* RxF Enable/Disable
*
* HDS-off request is dynamic
* keep structures as multiple of 32-bit fields for alignment.
* All values must be written in big-endian.
*/
#ifndef __BFI_ENET_H__
#define __BFI_ENET_H__
#include "bfa_defs.h"
#include "bfi.h"
#define BFI_ENET_CFG_MAX 32 /* Max resources per PF */
#define BFI_ENET_TXQ_PRIO_MAX 8
#define BFI_ENET_RX_QSET_MAX 16
#define BFI_ENET_TXQ_WI_VECT_MAX 4
#define BFI_ENET_VLAN_ID_MAX 4096
#define BFI_ENET_VLAN_BLOCK_SIZE 512 /* in bits */
#define BFI_ENET_VLAN_BLOCKS_MAX \
(BFI_ENET_VLAN_ID_MAX / BFI_ENET_VLAN_BLOCK_SIZE)
#define BFI_ENET_VLAN_WORD_SIZE 32 /* in bits */
#define BFI_ENET_VLAN_WORDS_MAX \
(BFI_ENET_VLAN_BLOCK_SIZE / BFI_ENET_VLAN_WORD_SIZE)
#define BFI_ENET_RSS_RIT_MAX 64 /* entries */
#define BFI_ENET_RSS_KEY_LEN 10 /* 32-bit words */
union bfi_addr_be_u {
struct {
u32 addr_hi; /* Most Significant 32-bits */
u32 addr_lo; /* Least Significant 32-Bits */
} __packed a32;
} __packed;
/* T X Q U E U E D E F I N E S */
/* TxQ Vector (a.k.a. Tx-Buffer Descriptor) */
/* TxQ Entry Opcodes */
#define BFI_ENET_TXQ_WI_SEND (0x402) /* Single Frame Transmission */
#define BFI_ENET_TXQ_WI_SEND_LSO (0x403) /* Multi-Frame Transmission */
#define BFI_ENET_TXQ_WI_EXTENSION (0x104) /* Extension WI */
/* TxQ Entry Control Flags */
#define BFI_ENET_TXQ_WI_CF_FCOE_CRC BIT(8)
#define BFI_ENET_TXQ_WI_CF_IPID_MODE BIT(5)
#define BFI_ENET_TXQ_WI_CF_INS_PRIO BIT(4)
#define BFI_ENET_TXQ_WI_CF_INS_VLAN BIT(3)
#define BFI_ENET_TXQ_WI_CF_UDP_CKSUM BIT(2)
#define BFI_ENET_TXQ_WI_CF_TCP_CKSUM BIT(1)
#define BFI_ENET_TXQ_WI_CF_IP_CKSUM BIT(0)
struct bfi_enet_txq_wi_base {
u8 reserved;
u8 num_vectors; /* number of vectors present */
u16 opcode;
/* BFI_ENET_TXQ_WI_SEND or BFI_ENET_TXQ_WI_SEND_LSO */
u16 flags; /* OR of all the flags */
u16 l4_hdr_size_n_offset;
u16 vlan_tag;
u16 lso_mss; /* Only 14 LSB are valid */
u32 frame_length; /* Only 24 LSB are valid */
} __packed;
struct bfi_enet_txq_wi_ext {
u16 reserved;
u16 opcode; /* BFI_ENET_TXQ_WI_EXTENSION */
u32 reserved2[3];
} __packed;
struct bfi_enet_txq_wi_vector { /* Tx Buffer Descriptor */
u16 reserved;
u16 length; /* Only 14 LSB are valid */
union bfi_addr_be_u addr;
} __packed;
/* TxQ Entry Structure */
struct bfi_enet_txq_entry {
union {
struct bfi_enet_txq_wi_base base;
struct bfi_enet_txq_wi_ext ext;
} __packed wi;
struct bfi_enet_txq_wi_vector vector[BFI_ENET_TXQ_WI_VECT_MAX];
} __packed;
#define wi_hdr wi.base
#define wi_ext_hdr wi.ext
#define BFI_ENET_TXQ_WI_L4_HDR_N_OFFSET(_hdr_size, _offset) \
(((_hdr_size) << 10) | ((_offset) & 0x3FF))
/* R X Q U E U E D E F I N E S */
struct bfi_enet_rxq_entry {
union bfi_addr_be_u rx_buffer;
} __packed;
/* R X C O M P L E T I O N Q U E U E D E F I N E S */
/* CQ Entry Flags */
#define BFI_ENET_CQ_EF_MAC_ERROR BIT(0)
#define BFI_ENET_CQ_EF_FCS_ERROR BIT(1)
#define BFI_ENET_CQ_EF_TOO_LONG BIT(2)
#define BFI_ENET_CQ_EF_FC_CRC_OK BIT(3)
#define BFI_ENET_CQ_EF_RSVD1 BIT(4)
#define BFI_ENET_CQ_EF_L4_CKSUM_OK BIT(5)
#define BFI_ENET_CQ_EF_L3_CKSUM_OK BIT(6)
#define BFI_ENET_CQ_EF_HDS_HEADER BIT(7)
#define BFI_ENET_CQ_EF_UDP BIT(8)
#define BFI_ENET_CQ_EF_TCP BIT(9)
#define BFI_ENET_CQ_EF_IP_OPTIONS BIT(10)
#define BFI_ENET_CQ_EF_IPV6 BIT(11)
#define BFI_ENET_CQ_EF_IPV4 BIT(12)
#define BFI_ENET_CQ_EF_VLAN BIT(13)
#define BFI_ENET_CQ_EF_RSS BIT(14)
#define BFI_ENET_CQ_EF_RSVD2 BIT(15)
#define BFI_ENET_CQ_EF_MCAST_MATCH BIT(16)
#define BFI_ENET_CQ_EF_MCAST BIT(17)
#define BFI_ENET_CQ_EF_BCAST BIT(18)
#define BFI_ENET_CQ_EF_REMOTE BIT(19)
#define BFI_ENET_CQ_EF_LOCAL BIT(20)
/* CQ Entry Structure */
struct bfi_enet_cq_entry {
u32 flags;
u16 vlan_tag;
u16 length;
u32 rss_hash;
u8 valid;
u8 reserved1;
u8 reserved2;
u8 rxq_id;
} __packed;
/* E N E T C O N T R O L P A T H C O M M A N D S */
struct bfi_enet_q {
union bfi_addr_u pg_tbl;
union bfi_addr_u first_entry;
u16 pages; /* # of pages */
u16 page_sz;
} __packed;
struct bfi_enet_txq {
struct bfi_enet_q q;
u8 priority;
u8 rsvd[3];
} __packed;
struct bfi_enet_rxq {
struct bfi_enet_q q;
u16 rx_buffer_size;
u16 rsvd;
} __packed;
struct bfi_enet_cq {
struct bfi_enet_q q;
} __packed;
struct bfi_enet_ib_cfg {
u8 int_pkt_dma;
u8 int_enabled;
u8 int_pkt_enabled;
u8 continuous_coalescing;
u8 msix;
u8 rsvd[3];
u32 coalescing_timeout;
u32 inter_pkt_timeout;
u8 inter_pkt_count;
u8 rsvd1[3];
} __packed;
struct bfi_enet_ib {
union bfi_addr_u index_addr;
union {
u16 msix_index;
u16 intx_bitmask;
} __packed intr;
u16 rsvd;
} __packed;
/* ENET command messages */
enum bfi_enet_h2i_msgs {
/* Rx Commands */
BFI_ENET_H2I_RX_CFG_SET_REQ = 1,
BFI_ENET_H2I_RX_CFG_CLR_REQ = 2,
BFI_ENET_H2I_RIT_CFG_REQ = 3,
BFI_ENET_H2I_RSS_CFG_REQ = 4,
BFI_ENET_H2I_RSS_ENABLE_REQ = 5,
BFI_ENET_H2I_RX_PROMISCUOUS_REQ = 6,
BFI_ENET_H2I_RX_DEFAULT_REQ = 7,
BFI_ENET_H2I_MAC_UCAST_SET_REQ = 8,
BFI_ENET_H2I_MAC_UCAST_CLR_REQ = 9,
BFI_ENET_H2I_MAC_UCAST_ADD_REQ = 10,
BFI_ENET_H2I_MAC_UCAST_DEL_REQ = 11,
BFI_ENET_H2I_MAC_MCAST_ADD_REQ = 12,
BFI_ENET_H2I_MAC_MCAST_DEL_REQ = 13,
BFI_ENET_H2I_MAC_MCAST_FILTER_REQ = 14,
BFI_ENET_H2I_RX_VLAN_SET_REQ = 15,
BFI_ENET_H2I_RX_VLAN_STRIP_ENABLE_REQ = 16,
/* Tx Commands */
BFI_ENET_H2I_TX_CFG_SET_REQ = 17,
BFI_ENET_H2I_TX_CFG_CLR_REQ = 18,
/* Port Commands */
BFI_ENET_H2I_PORT_ADMIN_UP_REQ = 19,
BFI_ENET_H2I_SET_PAUSE_REQ = 20,
BFI_ENET_H2I_DIAG_LOOPBACK_REQ = 21,
/* Get Attributes Command */
BFI_ENET_H2I_GET_ATTR_REQ = 22,
/* Statistics Commands */
BFI_ENET_H2I_STATS_GET_REQ = 23,
BFI_ENET_H2I_STATS_CLR_REQ = 24,
BFI_ENET_H2I_WOL_MAGIC_REQ = 25,
BFI_ENET_H2I_WOL_FRAME_REQ = 26,
BFI_ENET_H2I_MAX = 27,
};
enum bfi_enet_i2h_msgs {
/* Rx Responses */
BFI_ENET_I2H_RX_CFG_SET_RSP =
BFA_I2HM(BFI_ENET_H2I_RX_CFG_SET_REQ),
BFI_ENET_I2H_RX_CFG_CLR_RSP =
BFA_I2HM(BFI_ENET_H2I_RX_CFG_CLR_REQ),
BFI_ENET_I2H_RIT_CFG_RSP =
BFA_I2HM(BFI_ENET_H2I_RIT_CFG_REQ),
BFI_ENET_I2H_RSS_CFG_RSP =
BFA_I2HM(BFI_ENET_H2I_RSS_CFG_REQ),
BFI_ENET_I2H_RSS_ENABLE_RSP =
BFA_I2HM(BFI_ENET_H2I_RSS_ENABLE_REQ),
BFI_ENET_I2H_RX_PROMISCUOUS_RSP =
BFA_I2HM(BFI_ENET_H2I_RX_PROMISCUOUS_REQ),
BFI_ENET_I2H_RX_DEFAULT_RSP =
BFA_I2HM(BFI_ENET_H2I_RX_DEFAULT_REQ),
BFI_ENET_I2H_MAC_UCAST_SET_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_UCAST_SET_REQ),
BFI_ENET_I2H_MAC_UCAST_CLR_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_UCAST_CLR_REQ),
BFI_ENET_I2H_MAC_UCAST_ADD_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_UCAST_ADD_REQ),
BFI_ENET_I2H_MAC_UCAST_DEL_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_UCAST_DEL_REQ),
BFI_ENET_I2H_MAC_MCAST_ADD_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_MCAST_ADD_REQ),
BFI_ENET_I2H_MAC_MCAST_DEL_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_MCAST_DEL_REQ),
BFI_ENET_I2H_MAC_MCAST_FILTER_RSP =
BFA_I2HM(BFI_ENET_H2I_MAC_MCAST_FILTER_REQ),
BFI_ENET_I2H_RX_VLAN_SET_RSP =
BFA_I2HM(BFI_ENET_H2I_RX_VLAN_SET_REQ),
BFI_ENET_I2H_RX_VLAN_STRIP_ENABLE_RSP =
BFA_I2HM(BFI_ENET_H2I_RX_VLAN_STRIP_ENABLE_REQ),
/* Tx Responses */
BFI_ENET_I2H_TX_CFG_SET_RSP =
BFA_I2HM(BFI_ENET_H2I_TX_CFG_SET_REQ),
BFI_ENET_I2H_TX_CFG_CLR_RSP =
BFA_I2HM(BFI_ENET_H2I_TX_CFG_CLR_REQ),
/* Port Responses */
BFI_ENET_I2H_PORT_ADMIN_RSP =
BFA_I2HM(BFI_ENET_H2I_PORT_ADMIN_UP_REQ),
BFI_ENET_I2H_SET_PAUSE_RSP =
BFA_I2HM(BFI_ENET_H2I_SET_PAUSE_REQ),
BFI_ENET_I2H_DIAG_LOOPBACK_RSP =
BFA_I2HM(BFI_ENET_H2I_DIAG_LOOPBACK_REQ),
/* Attributes Response */
BFI_ENET_I2H_GET_ATTR_RSP =
BFA_I2HM(BFI_ENET_H2I_GET_ATTR_REQ),
/* Statistics Responses */
BFI_ENET_I2H_STATS_GET_RSP =
BFA_I2HM(BFI_ENET_H2I_STATS_GET_REQ),
BFI_ENET_I2H_STATS_CLR_RSP =
BFA_I2HM(BFI_ENET_H2I_STATS_CLR_REQ),
BFI_ENET_I2H_WOL_MAGIC_RSP =
BFA_I2HM(BFI_ENET_H2I_WOL_MAGIC_REQ),
BFI_ENET_I2H_WOL_FRAME_RSP =
BFA_I2HM(BFI_ENET_H2I_WOL_FRAME_REQ),
/* AENs */
BFI_ENET_I2H_LINK_DOWN_AEN = BFA_I2HM(BFI_ENET_H2I_MAX),
BFI_ENET_I2H_LINK_UP_AEN = BFA_I2HM(BFI_ENET_H2I_MAX + 1),
BFI_ENET_I2H_PORT_ENABLE_AEN = BFA_I2HM(BFI_ENET_H2I_MAX + 2),
BFI_ENET_I2H_PORT_DISABLE_AEN = BFA_I2HM(BFI_ENET_H2I_MAX + 3),
BFI_ENET_I2H_BW_UPDATE_AEN = BFA_I2HM(BFI_ENET_H2I_MAX + 4),
};
/* The following error codes can be returned by the enet commands */
enum bfi_enet_err {
BFI_ENET_CMD_OK = 0,
BFI_ENET_CMD_FAIL = 1,
BFI_ENET_CMD_DUP_ENTRY = 2, /* !< Duplicate entry in CAM */
BFI_ENET_CMD_CAM_FULL = 3, /* !< CAM is full */
BFI_ENET_CMD_NOT_OWNER = 4, /* !< Not permitted, b'cos not owner */
BFI_ENET_CMD_NOT_EXEC = 5, /* !< Was not sent to f/w at all */
BFI_ENET_CMD_WAITING = 6, /* !< Waiting for completion */
BFI_ENET_CMD_PORT_DISABLED = 7, /* !< port in disabled state */
};
/* Generic Request
*
* bfi_enet_req is used by:
* BFI_ENET_H2I_RX_CFG_CLR_REQ
* BFI_ENET_H2I_TX_CFG_CLR_REQ
*/
struct bfi_enet_req {
struct bfi_msgq_mhdr mh;
} __packed;
/* Enable/Disable Request
*
* bfi_enet_enable_req is used by:
* BFI_ENET_H2I_RSS_ENABLE_REQ (enet_id must be zero)
* BFI_ENET_H2I_RX_PROMISCUOUS_REQ (enet_id must be zero)
* BFI_ENET_H2I_RX_DEFAULT_REQ (enet_id must be zero)
* BFI_ENET_H2I_RX_MAC_MCAST_FILTER_REQ
* BFI_ENET_H2I_PORT_ADMIN_UP_REQ (enet_id must be zero)
*/
struct bfi_enet_enable_req {
struct bfi_msgq_mhdr mh;
u8 enable; /* 1 = enable; 0 = disable */
u8 rsvd[3];
} __packed;
/* Generic Response */
struct bfi_enet_rsp {
struct bfi_msgq_mhdr mh;
u8 error; /*!< if error see cmd_offset */
u8 rsvd;
u16 cmd_offset; /*!< offset to invalid parameter */
} __packed;
/* GLOBAL CONFIGURATION */
/* bfi_enet_attr_req is used by:
* BFI_ENET_H2I_GET_ATTR_REQ
*/
struct bfi_enet_attr_req {
struct bfi_msgq_mhdr mh;
} __packed;
/* bfi_enet_attr_rsp is used by:
* BFI_ENET_I2H_GET_ATTR_RSP
*/
struct bfi_enet_attr_rsp {
struct bfi_msgq_mhdr mh;
u8 error; /*!< if error see cmd_offset */
u8 rsvd;
u16 cmd_offset; /*!< offset to invalid parameter */
u32 max_cfg;
u32 max_ucmac;
u32 rit_size;
} __packed;
/* Tx Configuration
*
* bfi_enet_tx_cfg is used by:
* BFI_ENET_H2I_TX_CFG_SET_REQ
*/
enum bfi_enet_tx_vlan_mode {
BFI_ENET_TX_VLAN_NOP = 0,
BFI_ENET_TX_VLAN_INS = 1,
BFI_ENET_TX_VLAN_WI = 2,
};
struct bfi_enet_tx_cfg {
u8 vlan_mode; /*!< processing mode */
u8 rsvd;
u16 vlan_id;
u8 admit_tagged_frame;
u8 apply_vlan_filter;
u8 add_to_vswitch;
u8 rsvd1[1];
} __packed;
struct bfi_enet_tx_cfg_req {
struct bfi_msgq_mhdr mh;
u8 num_queues; /* # of Tx Queues */
u8 rsvd[3];
struct {
struct bfi_enet_txq q;
struct bfi_enet_ib ib;
} __packed q_cfg[BFI_ENET_TXQ_PRIO_MAX];
struct bfi_enet_ib_cfg ib_cfg;
struct bfi_enet_tx_cfg tx_cfg;
};
struct bfi_enet_tx_cfg_rsp {
struct bfi_msgq_mhdr mh;
u8 error;
u8 hw_id; /* For debugging */
u8 rsvd[2];
struct {
u32 q_dbell; /* PCI base address offset */
u32 i_dbell; /* PCI base address offset */
u8 hw_qid; /* For debugging */
u8 rsvd[3];
} __packed q_handles[BFI_ENET_TXQ_PRIO_MAX];
};
/* Rx Configuration
*
* bfi_enet_rx_cfg is used by:
* BFI_ENET_H2I_RX_CFG_SET_REQ
*/
enum bfi_enet_rxq_type {
BFI_ENET_RXQ_SINGLE = 1,
BFI_ENET_RXQ_LARGE_SMALL = 2,
BFI_ENET_RXQ_HDS = 3,
BFI_ENET_RXQ_HDS_OPT_BASED = 4,
};
enum bfi_enet_hds_type {
BFI_ENET_HDS_FORCED = 0x01,
BFI_ENET_HDS_IPV6_UDP = 0x02,
BFI_ENET_HDS_IPV6_TCP = 0x04,
BFI_ENET_HDS_IPV4_TCP = 0x08,
BFI_ENET_HDS_IPV4_UDP = 0x10,
};
struct bfi_enet_rx_cfg {
u8 rxq_type;
u8 rsvd[1];
u16 frame_size;
struct {
u8 max_header_size;
u8 force_offset;
u8 type;
u8 rsvd1;
} __packed hds;
u8 multi_buffer;
u8 strip_vlan;
u8 drop_untagged;
u8 rsvd2;
} __packed;
/*
* Multicast frames are received on the ql of q-set index zero.
* On the completion queue. RxQ ID = even is for large/data buffer queues
* and RxQ ID = odd is for small/header buffer queues.
*/
struct bfi_enet_rx_cfg_req {
struct bfi_msgq_mhdr mh;
u8 num_queue_sets; /* # of Rx Queue Sets */
u8 rsvd[3];
struct {
struct bfi_enet_rxq ql; /* large/data/single buffers */
struct bfi_enet_rxq qs; /* small/header buffers */
struct bfi_enet_cq cq;
struct bfi_enet_ib ib;
} __packed q_cfg[BFI_ENET_RX_QSET_MAX];
struct bfi_enet_ib_cfg ib_cfg;
struct bfi_enet_rx_cfg rx_cfg;
} __packed;
struct bfi_enet_rx_cfg_rsp {
struct bfi_msgq_mhdr mh;
u8 error;
u8 hw_id; /* For debugging */
u8 rsvd[2];
struct {
u32 ql_dbell; /* PCI base address offset */
u32 qs_dbell; /* PCI base address offset */
u32 i_dbell; /* PCI base address offset */
u8 hw_lqid; /* For debugging */
u8 hw_sqid; /* For debugging */
u8 hw_cqid; /* For debugging */
u8 rsvd;
} __packed q_handles[BFI_ENET_RX_QSET_MAX];
} __packed;
/* RIT
*
* bfi_enet_rit_req is used by:
* BFI_ENET_H2I_RIT_CFG_REQ
*/
struct bfi_enet_rit_req {
struct bfi_msgq_mhdr mh;
u16 size; /* number of table-entries used */
u8 rsvd[2];
u8 table[BFI_ENET_RSS_RIT_MAX];
} __packed;
/* RSS
*
* bfi_enet_rss_cfg_req is used by:
* BFI_ENET_H2I_RSS_CFG_REQ
*/
enum bfi_enet_rss_type {
BFI_ENET_RSS_IPV6 = 0x01,
BFI_ENET_RSS_IPV6_TCP = 0x02,
BFI_ENET_RSS_IPV4 = 0x04,
BFI_ENET_RSS_IPV4_TCP = 0x08
};
struct bfi_enet_rss_cfg {
u8 type;
u8 mask;
u8 rsvd[2];
u32 key[BFI_ENET_RSS_KEY_LEN];
} __packed;
struct bfi_enet_rss_cfg_req {
struct bfi_msgq_mhdr mh;
struct bfi_enet_rss_cfg cfg;
} __packed;
/* MAC Unicast
*
* bfi_enet_rx_vlan_req is used by:
* BFI_ENET_H2I_MAC_UCAST_SET_REQ
* BFI_ENET_H2I_MAC_UCAST_CLR_REQ
* BFI_ENET_H2I_MAC_UCAST_ADD_REQ
* BFI_ENET_H2I_MAC_UCAST_DEL_REQ
*/
struct bfi_enet_ucast_req {
struct bfi_msgq_mhdr mh;
u8 mac_addr[ETH_ALEN];
u8 rsvd[2];
} __packed;
/* MAC Unicast + VLAN */
struct bfi_enet_mac_n_vlan_req {
struct bfi_msgq_mhdr mh;
u16 vlan_id;
u8 mac_addr[ETH_ALEN];
} __packed;
/* MAC Multicast
*
* bfi_enet_mac_mfilter_add_req is used by:
* BFI_ENET_H2I_MAC_MCAST_ADD_REQ
*/
struct bfi_enet_mcast_add_req {
struct bfi_msgq_mhdr mh;
u8 mac_addr[ETH_ALEN];
u8 rsvd[2];
} __packed;
/* bfi_enet_mac_mfilter_add_rsp is used by:
* BFI_ENET_I2H_MAC_MCAST_ADD_RSP
*/
struct bfi_enet_mcast_add_rsp {
struct bfi_msgq_mhdr mh;
u8 error;
u8 rsvd;
u16 cmd_offset;
u16 handle;
u8 rsvd1[2];
} __packed;
/* bfi_enet_mac_mfilter_del_req is used by:
* BFI_ENET_H2I_MAC_MCAST_DEL_REQ
*/
struct bfi_enet_mcast_del_req {
struct bfi_msgq_mhdr mh;
u16 handle;
u8 rsvd[2];
} __packed;
/* VLAN
*
* bfi_enet_rx_vlan_req is used by:
* BFI_ENET_H2I_RX_VLAN_SET_REQ
*/
struct bfi_enet_rx_vlan_req {
struct bfi_msgq_mhdr mh;
u8 block_idx;
u8 rsvd[3];
u32 bit_mask[BFI_ENET_VLAN_WORDS_MAX];
} __packed;
/* PAUSE
*
* bfi_enet_set_pause_req is used by:
* BFI_ENET_H2I_SET_PAUSE_REQ
*/
struct bfi_enet_set_pause_req {
struct bfi_msgq_mhdr mh;
u8 rsvd[2];
u8 tx_pause; /* 1 = enable; 0 = disable */
u8 rx_pause; /* 1 = enable; 0 = disable */
} __packed;
/* DIAGNOSTICS
*
* bfi_enet_diag_lb_req is used by:
* BFI_ENET_H2I_DIAG_LOOPBACK
*/
struct bfi_enet_diag_lb_req {
struct bfi_msgq_mhdr mh;
u8 rsvd[2];
u8 mode; /* cable or Serdes */
u8 enable; /* 1 = enable; 0 = disable */
} __packed;
/* enum for Loopback opmodes */
enum {
BFI_ENET_DIAG_LB_OPMODE_EXT = 0,
BFI_ENET_DIAG_LB_OPMODE_CBL = 1,
};
/* STATISTICS
*
* bfi_enet_stats_req is used by:
* BFI_ENET_H2I_STATS_GET_REQ
* BFI_ENET_I2H_STATS_CLR_REQ
*/
struct bfi_enet_stats_req {
struct bfi_msgq_mhdr mh;
u16 stats_mask;
u8 rsvd[2];
u32 rx_enet_mask;
u32 tx_enet_mask;
union bfi_addr_u host_buffer;
} __packed;
/* defines for "stats_mask" above. */
#define BFI_ENET_STATS_MAC BIT(0) /* !< MAC Statistics */
#define BFI_ENET_STATS_BPC BIT(1) /* !< Pause Stats from BPC */
#define BFI_ENET_STATS_RAD BIT(2) /* !< Rx Admission Statistics */
#define BFI_ENET_STATS_RX_FC BIT(3) /* !< Rx FC Stats from RxA */
#define BFI_ENET_STATS_TX_FC BIT(4) /* !< Tx FC Stats from TxA */
#define BFI_ENET_STATS_ALL 0x1f
/* TxF Frame Statistics */
struct bfi_enet_stats_txf {
u64 ucast_octets;
u64 ucast;
u64 ucast_vlan;
u64 mcast_octets;
u64 mcast;
u64 mcast_vlan;
u64 bcast_octets;
u64 bcast;
u64 bcast_vlan;
u64 errors;
u64 filter_vlan; /* frames filtered due to VLAN */
u64 filter_mac_sa; /* frames filtered due to SA check */
} __packed;
/* RxF Frame Statistics */
struct bfi_enet_stats_rxf {
u64 ucast_octets;
u64 ucast;
u64 ucast_vlan;
u64 mcast_octets;
u64 mcast;
u64 mcast_vlan;
u64 bcast_octets;
u64 bcast;
u64 bcast_vlan;
u64 frame_drops;
} __packed;
/* FC Tx Frame Statistics */
struct bfi_enet_stats_fc_tx {
u64 txf_ucast_octets;
u64 txf_ucast;
u64 txf_ucast_vlan;
u64 txf_mcast_octets;
u64 txf_mcast;
u64 txf_mcast_vlan;
u64 txf_bcast_octets;
u64 txf_bcast;
u64 txf_bcast_vlan;
u64 txf_parity_errors;
u64 txf_timeout;
u64 txf_fid_parity_errors;
} __packed;
/* FC Rx Frame Statistics */
struct bfi_enet_stats_fc_rx {
u64 rxf_ucast_octets;
u64 rxf_ucast;
u64 rxf_ucast_vlan;
u64 rxf_mcast_octets;
u64 rxf_mcast;
u64 rxf_mcast_vlan;
u64 rxf_bcast_octets;
u64 rxf_bcast;
u64 rxf_bcast_vlan;
} __packed;
/* RAD Frame Statistics */
struct bfi_enet_stats_rad {
u64 rx_frames;
u64 rx_octets;
u64 rx_vlan_frames;
u64 rx_ucast;
u64 rx_ucast_octets;
u64 rx_ucast_vlan;
u64 rx_mcast;
u64 rx_mcast_octets;
u64 rx_mcast_vlan;
u64 rx_bcast;
u64 rx_bcast_octets;
u64 rx_bcast_vlan;
u64 rx_drops;
} __packed;
/* BPC Tx Registers */
struct bfi_enet_stats_bpc {
/* transmit stats */
u64 tx_pause[8];
u64 tx_zero_pause[8]; /*!< Pause cancellation */
/*!<Pause initiation rather than retention */
u64 tx_first_pause[8];
/* receive stats */
u64 rx_pause[8];
u64 rx_zero_pause[8]; /*!< Pause cancellation */
/*!<Pause initiation rather than retention */
u64 rx_first_pause[8];
} __packed;
/* MAC Rx Statistics */
struct bfi_enet_stats_mac {
u64 stats_clr_cnt; /* times this stats cleared */
u64 frame_64; /* both rx and tx counter */
u64 frame_65_127; /* both rx and tx counter */
u64 frame_128_255; /* both rx and tx counter */
u64 frame_256_511; /* both rx and tx counter */
u64 frame_512_1023; /* both rx and tx counter */
u64 frame_1024_1518; /* both rx and tx counter */
u64 frame_1519_1522; /* both rx and tx counter */
/* receive stats */
u64 rx_bytes;
u64 rx_packets;
u64 rx_fcs_error;
u64 rx_multicast;
u64 rx_broadcast;
u64 rx_control_frames;
u64 rx_pause;
u64 rx_unknown_opcode;
u64 rx_alignment_error;
u64 rx_frame_length_error;
u64 rx_code_error;
u64 rx_carrier_sense_error;
u64 rx_undersize;
u64 rx_oversize;
u64 rx_fragments;
u64 rx_jabber;
u64 rx_drop;
/* transmit stats */
u64 tx_bytes;
u64 tx_packets;
u64 tx_multicast;
u64 tx_broadcast;
u64 tx_pause;
u64 tx_deferral;
u64 tx_excessive_deferral;
u64 tx_single_collision;
u64 tx_muliple_collision;
u64 tx_late_collision;
u64 tx_excessive_collision;
u64 tx_total_collision;
u64 tx_pause_honored;
u64 tx_drop;
u64 tx_jabber;
u64 tx_fcs_error;
u64 tx_control_frame;
u64 tx_oversize;
u64 tx_undersize;
u64 tx_fragments;
} __packed;
/* Complete statistics, DMAed from fw to host followed by
* BFI_ENET_I2H_STATS_GET_RSP
*/
struct bfi_enet_stats {
struct bfi_enet_stats_mac mac_stats;
struct bfi_enet_stats_bpc bpc_stats;
struct bfi_enet_stats_rad rad_stats;
struct bfi_enet_stats_rad rlb_stats;
struct bfi_enet_stats_fc_rx fc_rx_stats;
struct bfi_enet_stats_fc_tx fc_tx_stats;
struct bfi_enet_stats_rxf rxf_stats[BFI_ENET_CFG_MAX];
struct bfi_enet_stats_txf txf_stats[BFI_ENET_CFG_MAX];
} __packed;
#endif /* __BFI_ENET_H__ */
| {
"pile_set_name": "Github"
} |
Q:
Reading a file with two words per line into 2 different vectors
As the title says I'm trying to read a file into two vectors.
The file would look like this
1 hello
2 how
3 are
4 you
Right now I have this, but it doesn't seem to work
int number;
string word;
std::vector<int> first;
std::vector<string> second;
ifstream inFile(File);
if (inFile.is_open()) {
while (inFile >> number >> word) {
first.push_back(number);
second.push_back(word);
}
}
A:
Change the type of number to int.
Also the is_open() is superfluous (unless you have an else statement that handles the case when the file can't be opened) as the while loop will fail anyway if the file cannot be opened
| {
"pile_set_name": "StackExchange"
} |
The pelvic examination. The first vaginal examination for a healthy young woman.
At a young woman's first vaginal examination the doctor has the opportunity to explain the female genitalia, to assess the patient's attitude to her own sexuality and to reassure her that she is 'normal'. | {
"pile_set_name": "PubMed Abstracts"
} |
Haruni, Yazd
Haruni (, also Romanized as Hārūnī; also known as Horūnī) is a village in Esfandar Rural District, Bahman District, Abarkuh County, Yazd Province, Iran. At the 2006 census, its population was 469, in 129 families.
References
Category:Populated places in Abarkuh County | {
"pile_set_name": "Wikipedia (en)"
} |
The revisionist history about what caused the collapse of Bear Stearns and other financial stocks continues apace. In addition to the SEC's emergency attack on naked shortselling (shorts are scapegoated in every market downturn), the propaganda campaign by former Bear Stearns execs appears to be persuading more and more people that Bear was killed by an organized hit job.
Specifically, Lehman (LEH) CEO Dick Fuld and former Bear Stearns CEO Alan Schwartz continue to point fingers at Goldman Sachs and other trading firms for spreading false rumors that caused trading partners to flee. Both execs have reportedly confronted Goldman CEO Lloyd Blankfein about this allegation, the WSJ says. Blankfein says through a spokesman that he doesn't recall the Schwartz conversation.
Meanwhile, the SEC has subpoenaed several hedge funds for their trading and communications records:
The SEC investigation into Bear's collapse partly involves trading documents, which have been reviewed by The Wall Street Journal. The documents indicate that in the weeks before March 16, when Bear Stearns reached its initial agreement to sell itself to J.P. Morgan, Goldman Sachs International, which encompasses the firm's European trading units, was one of the most-active parties in trading securities known as credit default swaps that it had bought from or sold to Bear Stearns -- more than most other Bear trading partners.
Goldman cut much of its exposure to Bear just before the collapse. Goldman denies wrongdoing and insists that the nature of its trading business is complex--which it certaily is.
An SEC dragnet will undoubtedly unearth some scandalous emails and IMs. Until we see irrefutable evidence to the contrary, however, we will continue to believe that the rumors that hit Lehman and Bear were Wall Street business as usual. Good firms are built to survive such rumors, and Bear and Lehman weren't. In our opinion, Fuld and Schwartz have no one to blame but themselves. They took too much risk, and destroyed their own credibility. And now they're paying for it.
See Also: Lehman's Odds Of Survival Now Almost As Bad As Bear Stearns
Bear Stears Was Not An Act Of God | {
"pile_set_name": "OpenWebText2"
} |
Subsets and Splits