text
stringlengths
0
7.84M
meta
dict
![](londedinbmonjmedsci90128-0019){#sp1 .439} ![](londedinbmonjmedsci90128-0020){#sp2 .440} ![](londedinbmonjmedsci90128-0021){#sp3 .441} ![](londedinbmonjmedsci90128-0022){#sp4 .442} ![](londedinbmonjmedsci90128-0023){#sp5 .443} ![](londedinbmonjmedsci90128-0024){#sp6 .444}
{ "pile_set_name": "PubMed Central" }
Health Highlights: May 27, 2014 Here are some of the latest health and medical news developments, compiled by the editors of HealthDay: Most Wikipedia Health Articles Contain Errors: Study Ninety percent of health articles on Wikipedia contain errors, a new study finds. American researchers compared the online encyclopedia's entries about 10 conditions with peer reviewed medical research and found that most Wikipedia articles contained "many errors," BBC News reported. The 10 conditions included in the study were the "most costly" in the United States and included asthma, depression, lung cancer, diabetes, heart disease, back problems and osteoarthritis. The Wikipedia articles used in the analysis were printed off on April 25, 2012. "While Wikipedia is a convenient tool for conducting research, from a public health standpoint patients should not use it as a primary resource because those articles do not go through the same peer-review process as medical journals," said lead author Dr Robert Hasty, of the Wallace School of Osteopathic Medicine in North Carolina, BBC News reported. The "best resource" for people with health concerns is their doctor, he added. The study was published in the Journal of the American Osteopathic Association. Higher-Than-Expected Medicaid Enrollment Concerns States Unexpectedly high numbers of Americans who were previously eligible for Medicaid but were not enrolled are now signing up, and states are facing unanticipated costs for that coverage. Part of the reason why millions of these people have now decided to sign up for Medicaid is the widespread publicity about the need to be insured under the federal health care law, according to the Associated Press. Under the law, states can expand Medicaid eligibility to people with incomes up to 138 percent of the federal poverty line -- about $16,100 for an individual. The federal government will pay the entire cost of coverage through 2016. After that, Washington's share will gradually be reduced to 90 percent. This method of expanding Medicaid coverage has been accepted by about half the states. In states that don't take this approach, the federal government will pay an average of about 60 percent of the cost of coverage for people who were previously Medicaid-eligible, the AP reported. In California, about 300,000 more previously-eligible people are expected to enroll in Medicaid than was estimated last fall. "Our policy goal is to get people covered, so in that sense it's a success," said state legislator Richard Pan, a Democrat who heads the California State Assembly's health committee, the AP reported. "We are going to have to deal with how to support the success." There are many reasons why previously-eligible people didn't sign up for Medicaid coverage in the past, including not being aware, not requiring coverage, or shame. But many have decided to sign up now due to the new health care law's requirement that nearly all Americans have coverage or face fines. States that strongly supported the federal health care law -- such as California, Rhode Island and Washington -- launched campaigns to promote all people to sign up for coverage, which likely helped convince many previously-eligible people to finally sign up for Medicaid. But even states that opposed the health care law have seen significant rises in Medicaid enrollment, the AP reported. For example, there have been increases of 10 percent in Montana, 6 percent in Georgia and 5 percent in South Carolina, according to the market research firm Avalere Health. "Anyone who didn't budget for this is going to be behind the eight ball," Avalere CEO Dan Mendelson told the AP. "It's the kind of thing governors will want to discuss with the White House." "States are concerned about this," Ray Scheppach, the former top staffer for the National Governors Association, told the AP. "It's something they had been worried about right along." Michelle Obama to Tout Success of School Meals Standards A White House event Tuesday hosted by Michelle Obama will highlight the success of the healthier school meal standards that are meant to help reduce childhood obesity. The event is being held in response to a House Republican bill that would allow schools to opt out of the standards. The bill, approved by a House subcommittee last week, would permit schools to disregard the standards if they have a net loss on school food programs over a six-month period, the Associated Press reported. The bill is a "real assault" on White House efforts to make meals healthier for children, according to Sam Kass, a White House chef and director of the first lady's Let's Move initiative to fight childhood obesity. Tuesday's event is meant to highlight the successes of some schools that have implemented the standards. Nutrition officials from schools across the nation will explain how well the standards are working, the AP reported. This content is reviewed regularly and is updated when new and relevant evidence is made available. This information is neither intended nor implied to be a substitute for professional medical advice. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with questions regarding a medical condition.
{ "pile_set_name": "Pile-CC" }
1. Field One or more aspects of the present invention relate to a magnetic head tracking control method, a servo signal verification method, a magnetic tape drive, and a servo writer. 2. Description of Related Art In accordance with the trend toward higher recording density in the realm of information storage technologies, the data tracks of a magnetic tape designed in recent years should have extremely narrow widths. To enable the magnetic head to precisely follow such a narrow data track, a servo signal indicating a reference position of the data track is written beforehand in the magnetic tape. In a magnetic tape drive which records or retrieves data in the magnetic tape, a track-following servo control is exercised in which the servo signal recorded in advance is read out to work out an amount of deviation in position between the data track in which data is just to be recorded or retrieved and the magnetic head so that the magnetic head is regulated based on the amount of shift in position to follow the data track. Such a servo signal is formed by writing a servo pattern at predetermined intervals in the direction of transport of a magnetic tape. In a magnetic tape for use in perpendicular magnetic recording (i.e., the magnetic tape in which a magnetic material contained in the magnetic tape is magnetized in a thickness direction of the magnetic tape to thereby record information), for example, the servo pattern may include a first portion magnetized in one direction of two opposite thickness directions of the magnetic tape, and a second portion magnetized in a direction opposite to the one direction. See JP 2009-20943 A, for example. In a servo writer for writing a servo signal, a servo signal is written by a fixed servo signal write head in a magnetic tape that is being transported. Therefore, in order to accurately write a servo signal in the magnetic tape, the magnetic tape is transported with extremely high accuracy in position so that the magnetic tape being transported does not wobble from side to side or subject to change in transport speed. However, in actuality, the servo signal written in the magnetic tape being transported is inevitably subject to undesirable variations (fluctuation) in a direction of transport of the magnetic tape due to fluctuation in current-carrying time of the pulsed signal (recording current for each pulse) outputted to the servo signal write head and variation in tension of the magnetic tape. The present invention has been made in an attempt to eliminate the above disadvantages, and illustrative, non-limiting embodiments of the present invention may overcome the above disadvantages and other disadvantages not described above.
{ "pile_set_name": "USPTO Backgrounds" }
Being destructive can save you money! It’s simple maths. Whether you store your documents onsite or use an offsite management company, ridding yourself of files you no longer need will save you time, space and money. Of course, you’re required to keep all financial documentation for 7 years for VAT purposes (and your industry may have additional rules and regulations), but by disposing of unwanted files you’ll create space, cut storage costs and rid yourself of unnecessary clutter. So, what should you do with your obsolete files? With identity theft on the increase, it’s wise to dispose of them securely. We provide a speedy collection service for confidential waste: we’ll ensure your files are shredded and disposed of securely, and that the waste is recycled. Then we’ll issue you with a certificate of destruction. If your files are stored with us, just send us written notification and we’ll do the rest. A COST SAVING STORY Our premises could easily become swamped in paper, so we routinely check our old files and Doxbond dispose of those which we no longer need in a secure and confidential manner. We receive a certificate of secure destruction for each batch of files, and the process allows us to limit our storage costs. We’ve found Doxbond to be reliable and efficient service providers. We’ve worked well together for more than 10 years. Practice ManagerSolicitors, Bury St Edmunds When clients want to keep their documents, they are safely held in our highly secure archives, and they’re still winning on cost. Their documents are protected by Red Care intruder alarms, 24-hour CCTV, and a fire detection system. When they need something from the archive, we deliver it quickly – Next Day, Same Day or 90-min Express – and at a time that fits their schedule.
{ "pile_set_name": "Pile-CC" }
--- abstract: 'The observed sequence variation at a locus informs about the evolutionary history of the sample and past population size dynamics. The standard Kingman coalescent model on genealogies – timed trees that represent the ancestry of the sample – is used in a generative model of molecular sequence variation to infer evolutionary parameters. However, the state space of Kingman’s genealogies grows superexponentially with sample size $n$, making inference computationally unfeasible already for small $n$. We introduce a new coalescent model called Tajima heterochronous n-coalescent with a substantially smaller cardinality of the genealogical space. This process allows to analyze samples collected at different times, a situation that in applications is both met (*e.g.* ancient DNA and RNA from rapidly evolving pathogens like viruses) and statistically desirable (variance reduction and parameter identifiability). We propose an algorithm to calculate the likelihood efficiently and present a Bayesian nonparametric procedure to infer the population size trajectory. We provide a new MCMC sampler to explore the space of Tajima’s genealogies and model parameters. We compare our procedure with state-of-the-art methodologies in simulations and applications. We use our method to re-examine the scientific question of how Beringian bison went extinct analyzing modern and ancient molecular sequences of bison in North America, and to reconstruct population size trajectory of SARS-CoV-2 from viral sequences collected in France and Germany.' author: - | Lorenzo Cappello$^1$[^1], Amandine Véber$^{2*}$, Julia A. Palacios$^{1,3*}$\ $^1$Department of Statistics, Stanford University\ $^2$CMAP, CNRS, École Polytechnique, I.P. Paris\ $^3$Department of Biomedical Data Science, Stanford Medicine title: '**The Tajima heterochronous $n$-coalescent: inference from heterochronously sampled molecular data**' --- \#1 1 [1]{} 0[1]{}[ ]{} [*Keywords:*]{} Bayesian nonparametric, Kingman $n$-coalescent, multi-resolution, ancient DNA, Gaussian process. Introduction {#sec:intro} ============ Statistical inference of evolutionary parameters from a sample of $n$ DNA sequences accounts for the dependence among samples and models observed variation through two stochastic processes: an ancestral process of the sample represented by a genealogy [**g**]{}, which depends on the *effective population size trajectory* $(N_e(t))_{t\geq 0}$, and a mutation process with a given set of parameters $\mu$ that, conditionally on [**g**]{}, models the phenomena that have given rise to the sequences. However, state-of-the-art methodologies are not scalable to the amount of data available because the latent space of genealogies lives in a high dimensional space. In this paper, we tackle the problem of scalability from a modeling perspective: we propose a new ancestral process for heterochronous data that dramatically reduces the state space of genealogies. We complement this model with a new algorithm for fast likelihood calculations. Inference for $(N_e(t))_{t\geq 0}$ has important applications in many fields, such as genetics, anthropology, and public health. In the absence of natural selection, the effective population size can be used to approximate census population size. While census population size estimates can be difficult to obtain due to high costs and challenging sampling designs, we can reconstruct past population sizes from observed signatures of genetic diversity in a sample of the population. For example, one can estimate the population size of a virus from genetic samples in a situation where census counts are believed to be inaccurate, as it is common during an epidemic. Inferring population size dynamics – timing of population events, growth and decline rates – rather than estimating census counts, may be of scientific interest. For example, [@sha04] reconstructed bison population dynamics, providing new insights into the extinction of Beringian bison. In this paper, we include two studies supporting the motivations highlighted above: in one study we analyze viral samples of SARS-CoV-2, the virus responsible for the coronavirus disease, and in a second study, we analyze ancient samples of bison in North America (dataset described by [@fro17]). Both Bayesian and frequentist methods rely on the marginal likelihood computed by integrating over the space $\mathcal{G}_n$ of tree topologies with $n$ leaves, and over the space of branch lengths. That is: $$\label{marg} P(\textbf{Y}\mid (N_e(t))_{t\geq 0}, \mu)= \int_{\mathbf{g} \in \mathcal{G}_n\times \mathbb{R}_+^{n-1}} P(\textbf{Y}\mid \mathbf{g}, (N_e(t))_{t\geq 0}, \mu) \,{{\rm d}}\pi (\mathbf{g}\mid (N_e(t))_{t\geq 0}),$$ where the $n-1$ random variables with values in $\mathbb{R}_+$ are the times between consecutive coalescence events in the genealogy, and $\pi(\cdot \mid(N_e(t))_{t\geq 0})$ denotes the probability distribution on $\mathcal{G}_n\times \mathbb{R}_+^{n-1}$ implied by the ancestral process as a function of the past population size trajectory $(N_e(t))_{t\geq 0}$. The genealogy [**g**]{} is an auxiliary variable introduced to compute $P(\textbf{Y}\mid \mathbf{g}, N_e(t), \mu)$ because direct calculation of the marginal $P(\textbf{Y}| N_e(t), \mu)$ is intractable. The prevailing consensus in the literature is to compute with $\pi$ defined as the Kingman-coalescent prior law on leaf-labeled genealogies (formally introduced in [@kingn82; @king82]). However, the cardinality of $\mathcal{G}_n$ grows superexponentially with $n$ ($|\mathcal{G}_n|=n!(n-1)!/2^{n-1}$), creating a computational bottleneck in the calculation of the integral . ![image](genealogy_intro-eps-converted-to){width=".5\textwidth"} An alternative to the Kingman $n$-coalescent is to use a lower resolution coalescent process, known as the Tajima $n$-coalescent [@taj83; @sai15; @pal19]. While the state space of the Kingman $n$-coalescent is in bijection with the set of timed and *labeled* binary trees with $n$ leaves, the state space of the Tajima $n$-coalescent is in bijection with the set of timed and *unlabeled* binary trees with $n$ leaves. The cardinality of the space of the timed and unlabeled binary tree topologies with $n$ leaves is given by the $(n-1)$-th Euler zigzag number [@di13], which behaves like $2 (2/\pi)^{n} \, (n-1)!$ when $n$ increases. While the cardinality of the space of Tajima trees still grows superexponentially in $n$, its rate of growth is drastically smaller than that of the space of Kingman trees. [@pal19] show that when all sequences are sampled at the same time, employing the Tajima coalescent allows fast inference of $(N_e(t))_{t\geq 0}$. The main focus of this work is to develop a scalable model for sequences observed at different time points like those at the tips of the genealogy in Figure \[fig:coalescent\]. The need to model heterochronous data is motivated by both applications and statistical reasons. In applications, viral samples (HIV, influenza) are routinely collected serially. Ancient DNA studies are another very active area of research in which the sampling design is intrinsically sequential. At least two statistical reasons are motivating this model. First, it usually leads to a decrease in the variance of the estimate [@rod99]. In coalescent-based inference, the smaller the number of extant lineages in a given time interval, the greater the variance of our estimate of the interval length, and consequently, the greater the variance of any estimate that depends on that length such as $(N_e(t))_{t\geq 0}$. By including heterochronous samples, we can increase the number of active lineages in the past, and thus obtain better estimates. Second, [@par19] show that including heterochronous samples is necessary (in some cases) to make the parameters describing $(N_e(t))_{t\geq 0}$ identifiable. The Tajima heterochronous $n$-coalescent fundamentally differs from the Tajima *isochronous* $n$-coalescent in that sequences sampled at different times are not exchangeable. The Tajima isochronous $n$-coalescent distinguishes between singletons and *vintaged* lineages, where a singleton lineage refers to a lineage that subtends a leaf in [**g**]{}, and a vintaged lineage refers to a lineage that subtends an internal node in [**g**]{}. Singletons are indistinguishable while vintages are labeled by the ranking of the coalescence event at which they were created. When dealing with heterochronous samples, singletons are instead implicitly labeled by their underlying sampling times. To account for this difference, we define a new Markov chain. The present paper contains three main contributions: first, we propose a new lower-resolution continuous-time Markov chain (CTMC) which we call the Tajima *heterochronous* $n$-coalescent, that allows to model partially-labeled genealogies of heterochronous samples. Second, we introduce a new algorithm to compute the likelihood. Likelihood calculation in [@pal19] called BESTT relies on a backtracking algorithm that is computationally unfeasible for sample sizes greater than $35$. Our new algorithm can accommodate up to $100$ sequences. Lastly, we introduce new MCMC proposals for efficient exploration of the space of Tajima genealogies and do Bayesian nonparametric inference on $(N_e(t))_{t\geq 0}$. The main challenge in employing Tajima genealogies for coalescent-based inference is that the sequence data can be allocated, *i.e.* mapped, to a given genealogy, in many possible ways. The allocation is necessary to compute the likelihood. To find all possible maps, [@pal19] use a backtracking algorithm that proceeds in a bottom-up fashion: starting from the tips of the tree, the algorithm moves along the tree to the root checking for possible allocations of subsets of the data [**Y**]{} to clades of the tree [**g**]{}. Our proposal reverts this process and proceeds in a top to bottom fashion eliminating the backtracking step and reducing its computational complexity. While there is no exact analytical expression for the computational complexity of the backtracking algorithm, a loose upper bound of the backtracking algorithm is $\mathcal{O} (n!)$, which we bring down to $\mathcal{O}(n^2)$ with our new proposal. The lower bound is of the order of $\mathcal{O}(n)$ for both algorithms. The algorithm relies on a novel graphical representation of the data as a tree structure. We note that this tree is related to the definition of the directed acyclic graph (DAG) used in [@pal19], with some important differences. The DAG depends on [**g**]{} whereas the tree we introduced is solely a function of the data. This implies that we need to define it only once. Also, the DAG groups sequences differently since it does not incorporate sampling time information. The rest of the paper proceeds as follows. In Section \[sec:hettaj\], we define the Tajima heterochronous $n$-coalescent. In Section \[lik\], we introduce the mutation model we shall assume, describe the data, define the likelihood and the new algorithm to compute it. Section \[mcmc\] describes the MCMC algorithm for posterior inference, and in Section \[sim\], we present a comprehensive simulation study outlininghow the model works and comparing our method to state-of-the-art alternatives. In Section \[app\], we analyze modern and ancient bison sequences described in [@fro17]. In Section \[covid\], we apply our method to SARS-CoV-2 viral sequences collected in France and in Germany. Section \[concl\] concludes. An open-source implementation is given in `R` package `phylodyn`, which is available for download at `https://github.com/JuliaPalacios/phylodyn.` The Tajima heterochronous $n$-coalescent {#sec:hettaj} ======================================== The Tajima heterochronous $n$-coalescent is an inhomogeneous continuous-time Markov chain that describes the ancestral relationships of a set of $n$ individuals sampled, possibly at different times, from a very large population. The set of ancestral relationships of the sample is represented by a ranked genealogy as the one depicted in Figure \[fig:hetTaj\]. Every organism is dated and labeled according to the time in which the organism lived (if ancient, by radiocarbon date) or in which the living organism was sequenced. In this generalization of the Tajima coalescent, each pair of extant ancestral lineages merges into a single lineage at an instantaneous rate which depends on the current effective population size $N_e(t)$, and new lineages are added when one of the prescribed sampling times is reached. In this work, we do not model the stochasticity of sampling times but we condition on them as being fixed. ![[]{data-label="fig:hetTaj"}](markov_chain-eps-converted-to) Let us introduce some notation. Let $m$ be the number of sampling time points and $n$ be the total number of samples. Let ${\textbf{n}}{}=(n_1,\ldots,n_{m})$ denote the number of sequences collected at times ${\textbf{s}}{}=(s_{1},\ldots,s_{m})$, with $s_{1}=0$ denoting the present time, and $s_{j}>s_{j-1}$ for $j=2,\ldots,m$ (time goes from present towards the past). We refer to the sequences counted in $n_i$ as “belonging to sampling group $s_i$”. Let ${\textbf{t}}{}=(t_{n+1}, \ldots, t_{2})$ be the vector of coalescent times with $t_{n+1}=0<t_{n}<...<t_{2}$; these are the times when two lineages have a common ancestor. Note that the subscript in $t_{k}$ does not indicate the current number of lineages, as it is often done in the coalescent literature, but it indicates the number of lineages that have yet to coalesce (some sequences may not have been sampled yet). We use the rank order of the coalescent events (bottom-up) to label the internal nodes of the genealogy. That is, the node corresponding to the coalescent event occurring at time $t_n$ is labeled $1$ (see $t_{10}$ in Figure \[fig:hetTaj\]), the node corresponding to the coalescence event occurring at time $t_{n-1}$ is labeled $2$, *etc*. We refer to the internal node labels as *vintages* (*i.e.*, rankings). The Tajima heterochronous $n$-coalescent is the process $({\textbf{a}}{}(t), b(t))_{t \geq 0}$ that keeps track of ${\textbf{a}}{} (t)$, a vector of length $m$ whose $j$-th position indicates the number of singletons (*i.e.*, lineages that have not been involved in a coalescence event) from sampling group $s_j$ at time $t$, and $b (t)$ is the set of vintaged lineages at time $t$. The process starts at $t=0$ in state $({\textbf{a}}{}(0)=(n_1,0,\dots,0), b(0)=\emptyset)$, jumps deterministically at every sampling time and jumps stochastically at every random coalescent time until it reaches the unique absorbing state $({\textbf{a}}{(t_2)}=(0,\ldots, 0), b(t_2)=\{n-1\})$ at time $t_2$, when all $n$ samples have a single most recent common ancestor at the root (Figure \[fig:hetTaj\]). At each sampling time $s_i$, the state of the Tajima coalescent jumps deterministically as follows: $$({\textbf{a}}{}(s_i), b(s_i))=({\textbf{a}}{}(s_i-)+ n_i\textbf{e}_i, b(s_i-)),$$ where $f(s_i-)$ denotes the left-limit of the function $f$ at $s_i$ and $\textbf{e}_i$ is the $i$-th unit vector. Let us now turn to the embedded jump chain at coalescent times. At time $t_i$, two extant lineages coalesce to create a new lineage with vintage $n+1-i$. Four types of coalescence transitions are possible depending on which and how many sampling groups are involved: (1) two singletons of the same sampling group coalesce (up to $m$ possible moves for the chain), (2) two singletons of different sampling groups coalesce (up to $m (m-1)/2$ possible moves), (3) one singleton lineage and one vintaged lineage coalesce (up to $m$ possible moves), or (4) two vintaged lineages coalesce (only one possibility because for vintages, the sampling information is irrelevant). Each pair coalesces with the same probability and the transition probabilities at coalescent times are thus given by $$\begin{aligned} \label{transition} P\Big[({\textbf{a}}{(t_i)}, &b(t_i))\Big| ({\textbf{a}}{(t_i-)},b(t_i-))\Big]\\ & =\left\{ \begin{array}{ll} \frac{\mathlarger\prod_{j=1}^m \dbinom{a_j(t_i-)}{a_j(t_i-)-a_j(t_i)}}{\dbinom{\sum_{j=1}^m a_j(t_i-)+|b(t_i-)|}{2}} \,\ \,\ \,\ \,\ & \text{if} \ \,\ ({\textbf{a}}{(t_i)},b(t_i)) \prec ({\textbf{a}}{(t_i-)},b(t_i-))\nonumber\\ \,\ \\ 0 \,\ \,\ \,\ \,\ \,\ \,\ \, \,\ \,\ & \text{otherwise} \end{array} \right.\end{aligned}$$ where $({\textbf{a}}{(t_i)},b(t_i)) \prec ({\textbf{a}}{(t_i-)},b(t_i-))$ means that $({\textbf{a}}{(t_i)},b(t_i))$ can be obtained by merging two lineages of $({\textbf{a}}{(t_i-)},b(t_i-))$ and $|b|$ denotes the cardinality of the set $b$. Observe that the quantity $\sum_{j=1}^m a_j(t_i-)+|b(t_i-)|$ appearing in corresponds to the total number of extant lineages just before the event at $t_i$. Furthermore, since only two lineages coalesce at time $t_i$, at most two terms in the product appearing in the numerator of are not equal to one. Finally, if $m=1$, degenerates into the transition probabilities of the Tajima isochronous $n$-coalescent; on the other hand if $m=n$, the process degenerates into the Kingman heterochronous $n$-coalescent since all singletons are uniquely labeled by their sampling times. Figure \[fig:hetTaj\] shows a possible realization from the Tajima heterochronous $n$-coalescent. To define the distribution of the holding times, we introduce the following notation. We denote the intervals that end with a coalescent event at $t_{k}$ by $I_{0,k}$ and the intervals that end with a sampling time within the interval $(t_{k+1},t_{k})$ as $I_{i,k}$ where $i\geq 1$ is an index tracking the sampling events in $(t_{k+1},t_{k})$. More specifically, for every $k\in \{2,\ldots,n\}$, we define $$I_{0,k}=[\max\{t_{k+1},s_{j}\},t_{k}),\quad \text{ where the maximum is taken over all } s_{j}<t_{k},$$ and for every $i\geq 1$ we set $$I_{i,k}=[\max\{t_{k+1},s_{j-i}\},s_{j-i+1}) \text{ with the max taken over all } s_{j-i+1}>t_{k+1} \text{ and } s_{j}<t_{k}.$$ We also let $n_{i,k}$ denote the number of extant lineages during the time interval $I_{i,k}$. For example, in Figure \[fig:hetTaj\], in $(t_9, t_8)$ we have $I_{0,8}=[s_2,t_8)$, $I_{1,8}=[t_9,s_2)$ and no $I_{i,8}$ for $i\geq 2$. The vector of coalescent times [**t**]{} is a random vector whose density with respect to Lebesgue measure on $\mathbb{R}_+^{n-1}$ can be factorized as the product of the conditional densities of $t_{k-1}$ knowing $t_k$, which reads: for $k=3,...,n+1$, $$\label{prior_time} p(t_{k-1}\mid t_{k},\mathbf{s},\mathbf{n},(N_{e}(t))_{t\geq 0})=\frac{C_{0,k-1}}{N_{e}(t_{k-1})} \exp \left\lbrace - \int_{I_{0,k-1}} \frac{C_{0,k-1}}{N_{e}(t)}{{\rm d}}t+\sum^{m}_{i=1}\int_{I_{i,k-1}} \frac{C_{i,k-1}}{N_{e}(t)}{{\rm d}}t\right\rbrace,$$ where $t_{n+1}=0$ by convention, $C_{i,k}:=\binom{n_{i,k}}{2}$, and the integral over $I_{i,k-1}$ is zero if there are less than $i$ sampling times between $t_k$ and $t_{k-1}$. The distribution of the holding times defined above corresponds to the same distribution of holding times in the heterochronous Kingman coalescent [@rod99]. Although the heterochronous Tajima coalescent takes value on a different state space, it remains true that every pair of extant lineages coalesces at equal rate. Finally, given [**n**]{}, [**s**]{} and ${\textbf{t}}{}$, a complete realization of the Tajima heterochronous $n$-coalescent chain can be uniquely identified with a partially labeled binary ranked tree shape $g$ of $\mathbf{n}=(n_{1},\ldots,n_{m})$ samples at $(s_{1},\ldots,s_{m})$ with its $n-1$ coalescent transitions, so that $$\label{prior_rts} P(g \mid {\textbf{t}}{},{\textbf{s}}{},{\textbf{n}})=\prod_{i=2}^{n} P\Big[({\textbf{a}}{(t_i)},b(t_i))\,\Big|\, ({\textbf{a}}{(t_i-)},b(t_i-))\Big].$$ Equation  gives the prior probability of the tree topology under the Tajima heterochronous $n$-coalescent. Putting together and , we obtain a prior $\pi({\textbf{g}}{}\mid {\textbf{s}}{},{\textbf{n}}{}, (N_e(t))_{t\geq 0})$ $$\label{prior} \pi({\textbf{g}}{}\mid {\textbf{s}}{},{\textbf{n}}{}, (N_e(t))_{t\geq 0})=P(g \mid {\textbf{t}}{},{\textbf{s}}{},{\textbf{n}}) \prod_{k=3}^{n+1}p(t_{k-1}\mid t_{k},\mathbf{s},\mathbf{n},(N_{e}(t))_{t\geq 0}),$$ which can be used in . Data and Likelihood {#lik} =================== Infinite Sites Model and the Perfect Phylogeny {#data} ---------------------------------------------- We assume that the observed data [**Y**]{} consists of $n$ sequences at $z$ polymorphic (mutating) sites at a non-recombining contiguous segment of DNA of organisms with low mutation rate. Under these assumptions, a widely studied mutation model is the *infinite sites model* (ISM) [@kim69; @wat75] with Poissonian mutation, which corresponds to throwing a Poisson point process of mutations on the branches of [**g**]{} at rate $\mu$ such that every mutation occurs at a different site and no mutations are hidden by a second mutation affecting the same site. An important consequence of the ISM is that [**Y**]{} can be represented as an incidence matrix ${\textbf{Y}}{}_1$ and a frequency counts matrix ${\textbf{Y}}{}_2$. ${\textbf{Y}}{}_1$ is a $k \times z$ matrix with $0$-$1$ entries, where $0$ indicates the ancestral type and $1$ indicates the mutant type; $k$ is the number of unique sequences (or haplotypes) observed in the sample, and the columns correspond to polymorphic sites. ${\textbf{Y}}{}_2$ is a $k \times m$ count matrix where the $(i,j)$th entry denotes how many haplotype $i$ sequences belonging to group $s_j$ are sampled. For example, the $n = 10$ sequences defined by the realizations of the ancestral and mutation processes depicted in Figure \[fig:coalescent\] can be summarized into ${\textbf{Y}}_1$ and ${\textbf{Y}}_2$ displayed in Figure \[perfect\_phylo\](A). ![[]{data-label="perfect_phylo"}](perf_phylo2-eps-converted-to){width="100.00000%"} ${\textbf{Y}}{}_1$ and ${\textbf{Y}}_2$ can alternatively be represented graphically as an *augmented perfect phylogeny* ${\textbf{T}}$. This graphical representation of the data is exploited by our likelihood algorithm. The augmented perfect phylogeny representation is an extension of the *gene tree* or *perfect phylogeny* [@gus91; @gri94b; @pal19] representation to the heterochronous case. The standard perfect phylogeny definition leaves out the information carried by ${\textbf{Y}}_2$. To our knowledge, Gusfield’s approach has never been generalized to the heterochronous case. In the augmented perfect phylogeny ${\textbf{T}}=({\textbf{V}},{\textbf{E}})$, ${\textbf{V}}{}$ is the set of nodes of [**T**]{}, and ${\textbf{E}}{}$ is the set of weighted edges. We define [**T**]{} as follows: 1. Each haplotype labels at least one leaf in ${\textbf{T}}$. If a haplotype is observed at $k$ different sampling times, then $k$ leaves in ${\textbf{T}}$ will be labeled by the same haplotype. The pair (haplotype label, sampling group) uniquely labels each leaf node. 2. Each of the $z$ polymorphic sites labels exactly one edge. When multiple sites label the same edge, the order of the labels along the edge is arbitrary. Some external edges (edges subtending leaves) may not be labeled, indicating that they do not carry additional mutations to their parent node. 3. For any pair (haplotype $h_{k}$, sampling group), the labels of the edges along the unique path from the root to the leaf $h_{k}$ specify all the sites where $h_{k}$ has the mutant type. Figure \[perfect\_phylo\](B) plots [**T**]{} corresponding to ${\textbf{Y}}_1$ and ${\textbf{Y}}_2$ displayed in Figure \[perfect\_phylo\](A). Observe that [**T**]{} includes sampling information in the leaf labels. In the example, $h_C$ labels two leaves because it is observed at times $s_1$ and $s_2$. The corresponding edges $E_3$ and $E_4$ are unlabeled, *i.e.*, no mutations are allocated to those edges because the underlying nodes carry identical sequences (same haplotype). We “augment" Gusfield’s perfect phylogeny because the sampling information is crucial in the likelihood calculation. [**T**]{} implicitly carries some quantitative information that can be quickly summarized. We denote the number of observed sequences subtended by an internal node $V$ by $|V|$. If $V$ is a leaf node, $|V|$ denotes the frequency of the haplotype $h$ observed at the corresponding sampling time $s$. Similarly, we denote the number of mutation labels assigned to an edge $E$ by $|E|$. If no mutations are assigned to $E$, then $|E|=0$. For parsimony, the edge that connects node $V_i$ to its parent node is denoted by $E_i$. See Figure \[perfect\_phylo\](C) for an example. [@gus91] gives an algorithm to construct the “traditional perfect phylogeny" [**T**]{}’ in linear time. Constructing [**T**]{} from [**T**]{}’ is straightforward since all we need is to incorporate the sampling information and add leaf nodes if a haplotype is observed at multiple sampling times. If we drew ${\textbf{T}}'$ from the data in Figure \[perfect\_phylo\], it would not have node $V_4$, but only a single node $V_3$ labeled by haplotype $h_C$. A description of the algorithm can be found in the supplementary material. Likelihood ---------- The crucial step needed to compute the likelihood of a Tajima genealogy ${\textbf{g}}{}$ is to sum over all possible allocations of mutations to its branches. This can be efficiently done by exploiting the augmented perfect phylogeny representation of the data [**T**]{} and by first mapping nodes of [**T**]{} to subtrees of [**g**]{}. We stress that the need for an allocation step arises only when working with Tajima genealogies. In Kingman’s coalescent, tree leaves are labeled by the sequences to which they correspond, and so there is a unique possible allocation. In Tajima’s coalescent, leaves are unlabeled, creating potential symmetries in the tree, and so we have to scan all the possible ways in which the observed sequences may be allocated to [**g**]{}. ### Allocations {#sec:alloc} Let [**a**]{} denote a possible mapping of nodes of $\textbf{T}$ to subtrees of ${\textbf{g}}$. [**a**]{} is encoded as a vector of length $n-1$, where the $i$-th entry gives the node in ${\textbf{T}}$ which is mapped to the subtree with vintage $i$, ${\textbf{g}}_i$ (including the branch that subtends vintage $i$). Our algorithm first maps all *non-singleton* nodes $\mathbf{V}$ of $\mathbf{T}$ to subtrees of ${\textbf{g}}{}$, that is, only nodes such that $|V|>1$ are entries of [**a**]{}. Singleton nodes in $\mathbf{T}$ ($V\in \mathbf{V}$ such that $|V|=1$) are treated separately and are initially excluded from the allocation step. For example, Figure \[sub\_all\] shows a possible vector [**a**]{} whose entries are the non-singleton nodes $V_{0},V_{1},V_{2},$ and $V_{5}$ of ${\textbf{T}}$ of Figure \[perfect\_phylo\]. We note that nodes can appear more than once in [**a**]{}, meaning that they can be mapped to more than one subtree. On the other hand, a single node $V_i$ is not necessarily mapped to all the vintages, leaves and internal branches of ${\textbf{g}}_j$; different nodes may be mapped to some subtrees of ${\textbf{g}}_j$ (including external branches), leading to a situation where $V_i$ is mapped to only a subset of the vintages and branches constituting ${\textbf{g}}_j$. For example, in Figure \[sub\_all\], $V_1$ is mapped to ${\textbf{g}}_6$ and ${\textbf{g}}_3$, but $V_2$ is mapped to ${\textbf{g}}_1$, a subtree of both ${\textbf{g}}_6$ and ${\textbf{g}}_3$; hence $V_{1}$ is only mapped to the green part of ${\textbf{g}}_{6}$ and ${\textbf{g}}_{3}$ as depicted in the Figure. The precise mapping of nodes in ${\textbf{T}}$ to subtrees of ${\textbf{g}}$ described below is needed to allocate mutations in [**T**]{} to branches of ${\textbf{g}}$. We will explain the allocation of mutations on ${\textbf{g}}$ for a given ${\textbf{a}}{}$ in the next subsection. ![image](subtree_allocations-eps-converted-to){width=".5\textwidth"} We now define an algorithm to efficiently find all possible mappings [**a**]{} for a given ${\textbf{g}}{}$. We encode the set of all possible [**a**]{}, as an $\#{\textbf{a}}\times (n-1)$ matrix $\mathbf{A}$, where each row is a possible ${\textbf{a}}{}$ ($n-1$ columns) and the number of rows $\#{\textbf{a}}$ is equal to the number of possible allocations. To generate $\mathbf{A}$, the algorithm proceeds recursively from top to bottom in [**g**]{}, by sweeping through subtrees in [**g**]{} and matching them to nodes in $\mathbf{T}$ according to parent-offspring relationships and number of descendants in both [**T**]{} and [**g**]{}. To be more precise, the algorithm is initialized by setting the $1 \times (n-1)$ $\mathbf{A}$ matrix to $\mathbf{A}=(V_0,\ldots,V_0)$, *i.e.*, $V_0$ is mapped to all subtrees in ${\textbf{g}}{}$. The algorithm proceeds iteratively, adding and removing rows from $A$, iterating over an index $i$ going from $n-2$ to $1$. The first step is to define $A(i)$, the set of node allocations in the $i$-th column of $\mathbf{A}$. Then for all $V \in A(i)$, the algorithm iterates through the following steps: define $T_{V}$ as the set of child nodes of $V$ that have $|{\textbf{g}}_{i}|$ descendants. If the number of child nodes of $V$ is at least $3$, $V$ is also included in $T_{V}$. If $T_V=\emptyset$, for example if $V$ is a leaf node, the algorithm does nothing. If $|T_{V}|=1$, the algorithm replaces $V$ by the element of $T_{V}$ in the columns $I$ of $\textbf{A}$ corresponding to all subtrees of ${\textbf{g}}_{i}$. If $|T_{V}|>1$, the matrix $\mathbf{A}$ is augmented by stacking $|T_{V}|-1$ copies of $\mathbf{A}_{V}(,I)$, the submatrix of $\mathbf{A}$ obtained by extracting all the row vectors whose $I$-th elements are $V$. The original submatrix $\mathbf{A}_{V}(,I)$ is referred to as $\mathbf{A}^{(1)}_{V}(,I)$, and $\mathbf{A}^{(2)}_{V}(,I),\ldots,\mathbf{A}^{(|T_{V}|)}_{V}(,I)$ denote its copies. Lastly, the algorithm replaces $V$ by the first element of $T_{V}$ in $\mathbf{A}^{(1)}_{V}(,I)$, by the second element of $T_{V}$ in $\mathbf{A}^{(2)}_{V}(,I)$ and so on, until the last element of $T_{V}$ is substituted in $\mathbf{A}^{(|T_{V}|)}_{V}(,I)$. The simple rule described above is fast to compute but it leads to incorrect allocations because nodes may be mapped a redundant number of times. For example, it is easy to see that implementing the algorithm above, we could define an allocation [**a**]{} where node $V_2$ is allocated to all subtrees of size two; however, $V_2$ should be allocated at most once. This issue can be avoided by noting that internal nodes in [**V**]{} should appear in each [**a**]{} a number of times equal to their number of child nodes minus one, while leaf nodes, say $V' \in {\textbf{V}}{}$, should appear $|V'|-1$ times. Hence, we complete each iteration by eliminating rows of $\mathbf{A}$ where this rule is violated. A second elimination rule is needed to account for the constraints imposed by the sampling time information: rows are eliminated when their assignments involve nodes labeled by a sampling time $s'$ “matched” to subtrees of [**g**]{} that have leaf branches terminating at a different sampling time. Algorithm \[all\] in the Appendix summarizes the above description. ![[]{data-label="allocations"}](allocations-eps-converted-to) Figure \[allocations\] gives examples of possible allocations of [**T**]{} to two different genealogies [**g**]{} and [**g**]{}’. The second genealogy [**g**]{}’ differs from [**g**]{} by the order of the coalescent events $3$ and $6$ which are inverted. [**g**]{} and [**g**]{}’ share the common allocation ${\textbf{a}}_1=(V_2,V_5,V_1,V_5,V_0,V_1,V_0,V_0,V_0)$; however, [**g**]{} has a second possible allocation ${\textbf{a}}_2=(V_5,V_2,V_5,V_1,V_1,V_0,V_0,V_0,V_0)$ that it is not compatible with ${\textbf{g}}{}$’. This difference is due to the fact that $V_5$ has three descendants belonging to sampling group $s_1$, while [**g**]{} has two subtrees with $3$ leaves sampled at $s_1$, and [**g**]{}’ has only one. We note that singleton nodes also need to be allocated, both in ${\textbf{a}}_1$ and ${\textbf{a}}_2$. We will elaborate on this point in the next subsection. ### Likelihood Calculations {#fastlik} To calculate the likelihood, we assume the ISM of mutations and that mutations occur according to a Poisson point process with rate $\mu$ on the branches of [**g**]{}, where $\mu$ is the total mutation rate. To compute the likelihood we need to map mutations in [**T**]{} to branches of [**g**]{} and this is done for each mapping ${\textbf{a}}_{i}$ of non-singleton nodes of [**T**]{} to subtrees of [**g**]{} . For every $V$ in [**T**]{} such that $|V|>1$, we define ${\textbf{E}}_{V}$ as the set formed by the edges in ${\textbf{T}}$ that subtend singleton children of $V$ and, with the exception of $V=V_{0}$, ${\textbf{E}}_{V}$ in addition includes the edge that subtends $V$. For the example in Figure \[perfect\_phylo\](B), ${\textbf{E}}_{V_{1}}=\{E_{1},E_{3},E_{4}\}$. Let ${\textbf{V}}^*$ be the set of all $V \in {\textbf{V}}$ such that $|V|>1$, then the likelihood function is defined as $$\begin{aligned} \label{lik_2} P(\textbf{Y}\mid {\textbf{g}}, N_e,\mu)&=\sum_{i=1}^{\#{\textbf{a}}} P(\textbf{Y}, {\textbf{a}}{}_i \mid {\textbf{g}}, N_e, \mu)\nonumber\\ &= \sum_{i=1}^{\#{\textbf{a}}} \prod_{V \in {\textbf{V}}^*} P(V, {\textbf{E}}_{V}, {\textbf{a}}{}_i \mid {\textbf{g}}, N_e, \mu),\end{aligned}$$ where we recall that $\#{\textbf{a}}$ is the number of possible allocations, we have written $N_e=(N_e(t))_{t\geq 0}$, and $P(V, {\textbf{E}}_{V}, {\textbf{a}}{}_i \mid {\textbf{g}}, N_e, \mu)$ is the probability of observing the mutations of the ${\textbf{E}}_{V}$ edges along the corresponding branches of ${\textbf{g}}{}$ defined by the mapping ${\textbf{a}}_i$ as follows. If $V$ has no singleton child nodes, then ${\textbf{E}}_{V}=\{E\}$ and $$\label{intern_mut} P(V, \{E\}, {\textbf{a}}_{i} \mid {\textbf{g}}, N_e, \mu) \propto (\mu l)^{|E|} e^{-\mu \mathcal{T}},$$ where $l$ is the length of the branch in ${\textbf{g}}$ that subtends ${\textbf{g}}_{j}$, $j$ is the largest index such that ${\textbf{a}}_{i,j}=V$, and $\mathcal{T}$ denotes the length of the subtree in ${\textbf{g}}$ to which $V$ is mapped in ${\textbf{a}}_{i}$ (as described in Subsection \[sec:alloc\]). For example, considering $V_2$ in Figure \[sub\_all\], we have $\mathcal{T}_2= 2 t_n +(t_{n-2}-t_n)$ and $l=(t_{n-2}-t_n)$ is the length of the branch connecting vintage $1$ to vintage $3$. If node $V$ has singleton child nodes, $$\label{leaf_all} P(V, \{E, E_{ch_1}, \ldots, E_{ch_k} \}, {\textbf{a}}_{i} \mid {\textbf{g}},N_e, \mu) \propto (\mu l)^{|E|} e^{-\mu \mathcal{T}} \sum_{\textbf{R} \in \Pi({\textbf{E}}_{V})} \prod_{j=1}^k (\mu l_{R_j})^{|E_{ch_j}|},$$ where the first term on the r.h.s is defined exactly as the quantity on the r.h.s. of , while the second term corresponds to the probability of all possible different matchings between $R_{1},\ldots,R_{k}$, the first $k$ indexes such that ${\textbf{a}}_{i,R_{j}}=V$, and $|E_{ch_1}|,|E_{ch_2}|,\ldots,|E_{ch_k}|$, the $k$ numbers of mutations observed on the edges $E_{ch_1}, \ldots, E_{ch_k}$ leading to the child nodes of $V$. In this expression, $\Pi({\textbf{E}}_{V})$ is the set of all possible such matchings **R**. Before defining $\Pi({\textbf{E}}_{V})$ more precisely, we make two observations. First, not all matchings are possible since not all leaf branches terminate at the same time (heterochronous sampling). Second, it is enough to consider the allocations that contribute to distinct likelihood values, *i.e.* allocations for which the underlying samples are “distinguishable" in the sense that they have a different number of mutations. We define $\Pi({\textbf{E}}_{V})$ as the set of all possible “distinct matchings of number of observed singleton mutations to singleton branches", that is, allocations which lead to a distinct likelihood values. To construct $ \Pi({\textbf{E}}_{V})$, we first partition the singleton edges $E_{ch_1}, \ldots, E_{ch_k}$ according to the sampling times of the corresponding nodes $V_{ch_1}, \ldots, V_{ch_k}$. Let $k_i$ be the number of nodes in $\{V_{ch_1}, \ldots, V_{ch_k}\}$ with sampling time $s_i$, *i.e.*, the size of each subset of the partition. We then further partition these subsets by grouping together the edges carrying the same number of mutations (defined as $|E_{ch_1}|, \ldots, |E_{ch_k}|$). For each given sampling time $s_j$, let $k^{(1)}_j, \ldots, k^{(m_j)}_j$ denote the cardinalities of the $m_j$ sub-subsets obtained by this procedure, so that $k_j=\sum_{h=1}^{m_j} k^{(h)}_j$. The cardinality of $\Pi({\textbf{E}}_{V})$ is then $$\label{perm} |\Pi({\textbf{E}}_{V})|=\prod_{j=1}^m \frac{k_j!}{k^{(1)}_j! \dots k^{(m_j)}_j!},$$ where the product in is the number of permutations with repetition of the different edges that are compatible with the data in terms of sampling times and numbers of mutations carried. Note that Equation  is not the same as Equation (6) in [@pal19] because here we account for the different sampling groups. It degenerates into Equation (6) in [@pal19] in the isochronous case. Lastly, we note that knowing a priori the full matrix $\mathbf{A}$ allows to compute efficiently the likelihood via a sum-product algorithm. Indeed, for each $V\in {\textbf{V}}^*$ there may be several rows ${\textbf{a}}$ of $\mathbf{A}$ such that $P(V, {\textbf{E}}_{V}, {\textbf{a}}{} \mid {\textbf{g}}, N_e, \mu)$ is the same, due to the fact that $V$ is mapped to the same subtree in all these allocations. For such a $V$, one could compute the likelihood corresponding to these $r$ allocations ${\textbf{a}}'_1,\ldots,{\textbf{a}}'_r$ in the following way: $$\begin{aligned} \label{eq:sumprod} \sum_{i=1}^{r} & \prod_{V \in {\textbf{V}}^*} P(V, {\textbf{E}}_{V}, {\textbf{a}}'_i \mid {\textbf{g}}, N_e, \mu)\nonumber \\ & =P(V, {\textbf{E}}_{V}, {\textbf{a}}'_1 \mid {\textbf{g}}, N_e, \mu)\sum_{i=1}^{r} \prod_{V' \in {\textbf{V}}^*\setminus \{V\}} P(V', {\textbf{E}}_{V'}, {\textbf{a}}'_i \mid {\textbf{g}}, N_e, \mu).\end{aligned}$$ The exact sum-product formulation of is specific to the observed [**Y**]{} and $\mathbf{A}$. Bayesian Model and MCMC inference {#mcmc} ================================= In Section \[sec:hettaj\] we have introduced a new prior for genealogies and in Section \[lik\], we have expounded how to compute the likelihood of heterochronous data [**Y**]{} generated by a Poisson process of mutations superimposed on this new genealogy. We finally need to specify a prior distribution on $(N_e(t))_{t\geq 0}$ to complete our Bayesian model. In this paper, we follow [@pal13], who place a Gaussian process (GP) prior on $(\log(N_e(t)))_{t\geq 0}$ (the logarithm is used to ensure that $N_e(t)\geq 0$ for all $t$). We thus have: $$\begin{aligned} \label{model} {\textbf{Y}}{}\mid {\textbf{g}}{},\mu, (N_e(t))_{t\geq 0},{\textbf{n}}{},{\textbf{s}}{} & \sim \text{Poisson process} \nonumber \\ {\textbf{g}}\mid (N_e(t))_{t\geq 0},{\textbf{s}}{}, {\textbf{n}}{} & \sim \text{Tajima heterochronous $n$-coalescent}\\ (\log( N_e(t)))_{t\geq 0} \mid \tau& \sim \text{GP} (0, C(\tau)) \nonumber\\ \tau &\sim {\text{Gamma}}(\alpha, \beta) \nonumber\end{aligned}$$ where $C(\tau)$ is the covariance function of the Gaussian process. As in [@pal13], for computational convenience we use Brownian motion with covariance elements $$\mathrm{Cov} (\log(N_e(t)), \log(N_e(t'))= \tau \min (t, t')$$ for any $t,t' >0$ as our GP prior. From , the posterior distribution can be written as $$\label{posterior} \hspace{-1cm}\pi((\log(N_e(t)))_{t\geq 0}, \tau, {\textbf{g}}{}| {\textbf{Y}}{}, \mu) \propto P ({\textbf{Y}}| {\textbf{g}}{}, (\log(N_e(t)))_{t\geq 0}, \mu) \pi({\textbf{g}}{}|(\log(N_e(t)))_{t\geq 0}) \pi((\log(N_e(t)))_{t\geq 0}|\tau) \pi (\tau),$$ which we approximate via MCMC methods. Full conditionals are not available, and so we use Metropolis-within-Gibbs updates. At each MCMC iteration, we jointly update $((\log(N_e(t)))_{t\geq 0}, \tau)$ via a Split Hamiltonian Monte Carlo (HMC) [@shah14] suitably adapted to phylodynamics inference by [@lan15]; then we update the topology $g$ and ${\textbf{t}}{}$. We propose two Metropolis steps to update $g$ and ${\textbf{t}}{}$. The latter may also be combined in a single step. The transitions for $g$ and [**t**]{} are tailored to the Tajima $n$-coalescent genealogies. To update $g$, we employ the scheme in [@pal19]. To update ${\textbf{t}}{}$, we propose a new sampler, which allows to propose branch lengths that account for the observed sampling times constraints, an issue specific to heterochronous samples under the ISM assumption and detailed in the next subsection. Constraints imposed by the ISM hypothesis ----------------------------------------- Under the ISM hypothesis, mutations partition the observed sequences into two sets: the sequences that carry the mutations and the sequences that do not. This recursive partitioning of the sequences is graphically represented by [**T**]{}. As a consequence, not all topologies $g$ and not all vectors [**t**]{} are compatible with the data, i.e. have posterior probability or density greater than 0. The combinatorial constraints imposed by the ISM on the space of topologies are discussed in detail in [@cap19]. The constraints on [**t**]{} solely arise in the heterochronous case. First note that the definition of the Tajima heterochronous $n$-coalescent implies that there can be at most $n_1-1$ coalescence events before $s_2$, at most $n_1+n_2-1$ events before $s_3$, and so on. Moreover, if there are shared mutations between some (but not all) samples with different sampling times, the maximum number of coalescent events between the involved sampling times is further restricted. In the example of Figure \[perfect\_phylo\](A), there is a shared mutation $l_{3}$ between 3 samples with sampling time $s_{1}$ and a sample with sampling time $s_{2}>s_{1}$. Out of the 7 samples obtained at time $s_{1}$, the 3 samples that share the $l_3$ mutation could coalesce first some time between $s_{1}$ and $s_{2}$ (at most $2$ coalescent events among the 4 sequences descending from node $V_{1}$), but they need to coalesce with the sample at time $s_2$ in node $V_1$ before they coalesce with the other 4 samples collected at time $s_{1}$(those can coalesce at most 3 times between $s_{1}$ and $s_{2}$). Therefore, there are at most 5 coalescent events before $s_{2}$. To encode the constraints imposed by the sampling information, we define a vector **c** of length $m$, where the $i$th entry denotes the maximum number of coalescent events that can happen (strictly) before time $s_{i}$ for given [**Y**]{}, [**s**]{} and [**n**]{}. Trivially $c_1$=0 because there are no samples. Let us stress that **c** does not define the number of coalescent events in a given interval (a quantity determined by [**t**]{}), but it is the maximum number of coalescent events that can happen before each sampling time to ensure compatibility with the data. In the example of Figure \[perfect\_phylo\](A), we have $\textbf{c}=(0,5)$. Note that $c_2$ is $5$ and not $n_1-1=6$. In the online supplementary material, we provide a greedy search algorithm to define **c**. Coalescent times updates ------------------------ Let $\Delta\mathbf{t}:=(t_{n}-t_{n+1}, \ldots, t_{2}-t_{3})$ be the vector of intercoalescence times, and $(\Delta t_i)_{i \in I}$ the subvector of elements of $\Delta\mathbf{t}$ at positions $I \subseteq\{1,\ldots,n-1\}$. The proposal is generated in three steps. First, we uniformly sample the number of intercoalescent times proposal moves – *i.e.*, the cardinality of $I$, then we uniformly choose which times to modify – *i.e.*, we define $I$, and lastly, we sample the proposals $(\Delta t_i)'_{i \in I}$. The first two steps balance between fast exploration of the coalescent times state-space and a high acceptance probability – few changes are expected to lead to higher acceptance rates while many changes are expected to lead to faster exploration of the state space. In our implementation we limit the maximum possible number of intercoalescent times moves to a fixed number $Z \ll n-1$. Lastly, we sample new states $(\Delta t_i)'$, for $i \in I$ from a truncated normal with mean $\Delta t_i$ and standard deviation $ \sigma \Delta t_i$. The left tail is truncated by a parameter $lo_i$, and the right tail is left unbounded. Three reasons motivate this choice: it has positive support, it can be centered and scaled around the current $\Delta t_i$ using a single parameter $\sigma$, and we can set the lower bound $lo_i$ to ensure that only compatible times ${\textbf{t}}{}'$ are proposed. To set the values of $lo_i$, we rely on $\textbf{c}$, the vector that specifies the maximum number of coalescent events possible before each sampling time. We note that the elements of $\textbf{c}$ can be used to index coalescent times. In particular, $t_{n-c_i}$ denotes the time of the $(c_i+1)$th coalescent event. For example in Figure \[fig:hetTaj\], $t_{n-c_1}=t_{10}$ is the first coalescent event, and $t_{n-c_2}=t_5$ is the sixth coalescent event. Given $\textbf{c}$, $lo_i$ is set to $$\label{eq:lower_time} lo_i= \max_{j=1,\ldots,m} \{0,\{[s_j-(t_{n-c_j}-\Delta t_i)] \mathbbm{1}(i \leq c_j+1)\}\},$$ where $\mathbbm{1}(i \leq c_j+1)$ is an indicator function. Equation  ensures the proposal $t'_{n-c_j} \geq s_j$ for all $j$. Indeed, note that $t_{n-c_j}=\sum_{k=1}^{c_j+1}\Delta t_k$. Hence, if $(t_{n-c_j}-\Delta t_i)-s_j>0$ for any given $j$ such that $i \leq c_j+1$, then the proposed value of $(\Delta t_i)'$ could be zero and still $t'_{n-c_j}$ would be a compatible time. In this case, we do not need to impose any restriction on the lower bound of the truncated normal. On the other hand, if the vector considered in has one or more positive values, the proposed value $(\Delta t_i)'$ should be large enough to ensure that for all sampling times $s_j$, there will never be more than $c_j$ coalescent events before $s_j$. In other words, we truncate the proposal distribution support to ensure the compatibility of [**t**]{}’. We discuss how to set $Z$ and $\sigma$ in Section \[sim\]. The transition density of coalescent times is given by $$\label{timeMH} k({\textbf{t}}{},{\textbf{t}}')= \frac{1}{Z} \binom{n-1}{|I|}^{-1} \prod_{i \in I}\text{Truncated} \, {\text{N}}(\Delta t_i, \sigma \, \Delta t_i, lo_i, \infty),$$ with $\text{Truncated} \, {\text{N}}(\Delta t_i, \sigma \, it_i, lo_i, \infty)$ denoting a truncated normal density function with mean $\Delta{\textbf{t}}_i$, standard deviation $\sigma \Delta{\textbf{t}}_i$, lower bound $lo_i$ and upper bound $\infty$. Simulations {#sim} =========== We explore the ability of our procedure to reconstruct $(N_e(t))_{t\geq 0}$ in simulation across a range of demographic scenarios which capture realistic and challenging population size trajectories encountered in applications. The code for simulations and inference is implemented in `R `package `phylodyn`, which is available for download at `https://github.com/JuliaPalacios/phylodyn.` *Simulation setup.* Given [**n**]{}, [**s**]{}, and $(N_e(t))_{t\geq 0}$, we simulate genealogies under the Tajima heterochronous $n$-coalescent (Section \[sec:hettaj\]). Given a realized ${\textbf{g}}{}$ and fixed $\mu$, we draw $M$ mutations from a Poisson distribution with parameter $\mu L$ ($L$ is the length of the tree [**g**]{}: the sum of all branch lengths of ${\textbf{g}}{}$) and place them independently and uniformly at random along the branches of the timed genealogy. ${\textbf{Y}}_1$, ${\textbf{Y}}_2$ and [**T**]{} are then constructed as described in Section \[data\]. We simulate genealogies with three population scenarios: 1\. A bottleneck (“bottleneck”): $$\label{bottle} N_e(t)=\begin{cases} 3 & \qquad \hbox{if } t \in [0,0.1),\\[-0.3cm] 0.1 & \qquad \hbox{if }t \in [0.1,0.3),\\[-0.3cm] 2 & \qquad \hbox{if }t \in [0.3,\infty). \end{cases}$$ 2\. An instantaneous drop (“drop”): $$\label{drop} N_e(t)=\begin{cases} 0.5 & \qquad \hbox{if }t \in [0,0.5),\\[-0.3cm] 2 & \qquad \hbox{if } t \in [0.5,\infty). \end{cases}$$ 3\. Two periods of constant population size with an exponential growth in between (“exp”): $$\label{exp} N_e(t)=\begin{cases} 10 & \qquad \hbox{if } t \in [0,0.1),\\[-0.3cm] 10\,\exp(2-20\,t) & \qquad \hbox{if }t \in [0.1,0.25),\\[-0.3cm] 0.5 & \qquad \hbox{if }t \in [0.25,\infty). \end{cases}$$ For each scenario, we generated genealogies with three numbers of leaves ($n =14,\, 35,\, 70$) and different ${\textbf{n}}, {\textbf{s}}{}$ as summarized in Table \[sim\_summary\]. The mutation parameter is varied to analyze the effect of the number of segregating sites on the quality of the estimation. We empirically assess the accuracy of our estimates with three commonly used criteria. The first one is the sum of relative errors (SRE). $$SRE=\sum^{k}_{i=1}\frac{|\widehat{N}_e(v_{i})-{N_e(v_{i})}|}{{N_e(v_{i})}},$$ where $(v_1, \ldots, v_k)$ is a regular grid of $k$ time points, $\widehat{N}_e(v_{i})$ is the posterior median of $N_e$ at time $v_{i}$ and $N_e(v_i)$ is the value of the true trajectory at time $v_i$. The second criterion is the mean relative width, defined by $$MRW=\frac 1 k \sum^{k}_{i=1}\frac{|\hat{N}_{97.5}(v_{i})-\hat{N}_{2.5}(v_{i})|}{N(v_{i})},$$ where $\hat{N}_{97.5}(v_{i})$ and $\hat{N}_{2.5}(v_{i})$ are respectively the $97.5\%$ and $2.5\%$ quantiles of the posterior distribution of $N(v_{i})$. Lastly, we consider the envelope measure defined by $$ENV= \frac 1 k \sum^{k}_{i=1}\mathbf{1}_{\{\hat{N}_{2.5}(v_{i})\leq N_e(v_{i}) \leq \hat{N}_{97.5}(v_{i})\}},$$ which measures the proportion of the curve that is covered by the 95% credible region. In this simulation study we fix $k=100$, $v_1=0$ and $v_k=.8 \, t_2$. *MCMC tuning parameters.* The posterior approximation is sensitive to both the initial values of ([**g**]{}, $(N_e(t))_{t\geq 0}$) and the MCMC parameters. We initialize [**g**]{} with the serial UPGMA [@dru00]. In addition to the usual MCMC parameters such as chain length, burnin and thinning, there are three parameters specific to our method: the HMC step size $\epsilon$, the maximum number of intercoalescent times proposals ($Z$), and the standard deviation $\sigma$ that parametrizes the transition kernel $k({\textbf{t}}{},{\textbf{t}}{'})$. While all three parameters contribute to the mixing of the Markov chain and acceptance rates, in our experience, $\epsilon$ and $\sigma$ are the most influential. In settings similar to the ones analyzed here (time scale, type of trajectory patterns, and mutation rate), parameter values $\epsilon \in [0.03, 0.09]$, $Z \in \{1,2,3\}$, and $\sigma \in [0.01,0.03]$ lead to a similar mixing of the Markov chain and accuracy (w.r.t the metrics considered). We based these guidelines on extensive simulation studies on the $9$ datasets considered (Table \[sim\_summary\]), which we believe to be representative of a broad set of settings encountered in applications. In our simulations, we set $\epsilon=0.07$, $Z=2$, and $\sigma=0.02$ for the “bottleneck” and “drop” trajectories, and we set $\epsilon=0.08$, $Z=2$, and $\sigma=0.02$ for the “exp” trajectories. Inference is carried out with $3 \times 10^5$ iterations for $n=14$, $4 \times 10^5$ iterations for $n=35$ and $5 \times 10^5$ iterations for $n=70$. Posterior distributions are approximated after a burn-in period of $5 \times 10^4$ iterations and after thinning every $20$ iterations. *Comparison to other methods.* To our knowledge, no other method simultaneously deals with heterochronous data, assumes the ISM, samples Tajima genealogies and does Bayesian nonparametric inference. All available methodologies rely on the Kingman coalescent coupled with finite sites mutation models, with the Jukes-Cantor model [@juk69] being the closest to the ISM. Hence, it is not fully possible to isolate the impact of using Tajima’s genealogies in lieu of Kingman’s. Nevertheless, we include some alternative estimates for completeness. We compare our results to two popular methodologies implemented in BEAST [@drummond2012bayesian]: the Bayesian Skyline (SKY) [@dru05] and the Gaussian Markov Random Field Skyride (GMRF) [@min08]. For the SKY and GMRF, we use the Jukes– Cantor mutation model [@juk69], and approximate posterior distributions with $10^7$ iterations after a burn-in period of $10^6$ iterations and after thinning every $10^3$ iterations. We also compare our results to an oracle estimator that infers $(N_e(t))_{t\geq 0}$ from the “true” [**g**]{}. The oracle estimation is obtained using the method of [@pal12] with the same Gaussian process prior on $(N_e(t))_{t\geq 0}$. Note that the goal of the comparison is not to determine whether our method is superior, rather see if the performance of Tajima-based inference is in line with the results obtained through two popular Kingman-based methods in some challenging population scenarios. *Results.* The results of the nine curves estimated with our method are plotted in Figure \[fig:sim1\]. The supplementary material includes the plots for SKY and GMRF. True trajectories are depicted as dashed lines, posterior medians as black lines and $95\%$ credible regions as gray shaded areas. Table \[tab:sim1\] summarizes SRE, MRW, and ENV for the $9$ simulated data sets achieved with our method (“Tajima"), SKY, GMRF, and “Oracle". SKY estimates for “Exp" $n=14$ are not included because we could not obtain convergent runs. Accuracy increases with sample size: credible regions shrink substantially in all three scenarios. As $n$ increases, posterior medians track more closely the true trajectories. It is well known in the literature that abrupt population size changes are the most difficult to recover. The “drop" and “bottleneck" scenarios are less accurate for $n=14$, as exhibited by the wider credible region. We recover the bottleneck (panel first row and first column), but we do not recover the instantaneous drop (panel first row and third column). \[tab:sim\_results\] ![[]{data-label="fig:sim1"}](figure1_simulations-eps-converted-to) Table \[tab:sim\_results\] largely confirms the analysis of Figure \[fig:sim1\]. Recall that SKY and GMRF rely on Kingman coalescent rather than Tajima coalescent; SKY and GMRF methods assume a different mutation model, whereas Oracle relies on knowing the true [**g**]{} rather than computing its posterior. First, no method unequivocally outperforms the others. The oracle methodology is the method with the best overall performance more frequently. Surprisingly, the advantage of knowing [**g**]{} is not as big as one would expect. Both SKY and GMRF have much narrower credible regions for the bottleneck trajectory. On the other hand, Tajima has the best overall performance in the “drop" trajectory (low SRE and MRW). Note that $100\%$ ENV is not always an indicator of accuracy because it can be achieved with a very wide credible region. Lastly, note that no method outperforms the others. This is consistent with theoretical expectations as we are comparing two resolutions of the same ancestral process. Reassuringly, Tajima-based estimates are competitive with Kingman-based estimates. The current simulation study cannot single out the benefit of employing Tajima vs Kingman topologies because no available implementations rely on an identical mutation model and MCMC scheme. This analysis is out of the current scope and will be the subject of future research. North American Bison data {#app} ========================= ![image](bison_data-eps-converted-to){width=".5\textwidth"} Recent advances in molecular and sequencing technologies allow recovering genetic material from ancient specimens [@paa04]. In this section, we analyze modern and ancient bison sequences. These mammals offer a case study of a population experiencing a population growth followed by a decline. It was a long-standing question whether the drop was instigated by human intervention or by environmental changes. [@sha04] first reconstructed the genetic history of Beringian bisons. Their estimate for the start of the decline supports the environmental hypothesis, in particular, they suggest that the decline may be due to environmental events preceding the last glacial maxima (LGM). This data-set has been the subject of extensive research in the past decade. We analyze new bison data recently described by [@fro17]. We fit our coalescent model to these sequences and estimate population size dynamics. To our knowledge, there is no phylodynamics analysis of this data set in the literature. Two motivations underlie this study: first, [@sha04] sequences include $602$ base pairs from the mitochondrial control region, while [@fro17] provide the full mitochondrial genome ($16322$ base pairs after alignment); second, we are interested in testing whether the previously published overwhelming evidence in favor of the environmentally induced population decline is confirmed by this new data. [@fro17] data comprises $50$ sequences ($14$ modern and $36$ ancient). DNA was extracted from bison specimens from Canada (28, three locations), USA (9, two locations); Siberia (7, three locations), and unknown locations (5). It includes sequences of $37$ (extinct ancient bison), $1$ (extinct ancient bison), $11$ (modern bison), and $4$ (control group). We selected $38$ out of $50$ sequences. We removed the control group sequences and the Siberian sequences to analyze samples from a single population ([@fro17] (Figure 1) suggested population structure). We removed the sequence because it has $3803$ ambiguities *i.e.*, sites in a sequence that cannot be unambiguously assigned to a unique nucleotide basis at sites where all the other samples have valid entries. Out of the $94$ observed polymorphic sites, we retain $91$ sites compatible with the ISM assumption. To encode data in the $0-1$ incidence matrix representation ${\textbf{Y}}_1$, we use the root of the UPGMA tree reconstructed using `R` function `upgma` (`phanghorn`) as the ancestral state. Figure \[fig:bison\_data\] displays the perfect phylogeny [**T**]{} and the vectors [**s**]{} and [**n**]{}. For our inference procedure, we set $\epsilon=0.09$, $Z_1=2$, $\sigma=0.02$, and approximated the posterior distribution with $1.5 \times 10^6$ iterations after a burn-in of $8 \times 10^5$ and after thinning every $200$ iterations. As a comparison, we ran GMRF on BEAST and approximated the posterior distribution with $1 \times 10^7$ iterations after a burn-in of $1 \times 10^6$ and after thinning every $1000$ iteration. We used the default values for all GMRF hyperparameters. We initialized both methods with the same genealogy (serial UPGMA). To compute the likelihood, we used the BEAST mutation rate estimate per site per year of $2.52 \times 10^{-8}$. ![[]{data-label="fig:bison"}](bison_figure-eps-converted-to) The first panel of Figure \[fig:bison\] plots a summary of the effective population size pattern recovered by a recent analysis of [@sha04] data by [@fau20]. While the precise timings and the details of the trajectory differ from method to method, the broad patterns are consistent. The population peak is estimated to be between 41.6 and 47.3 kya. The timing of the start of the decline is the main feature of interest. We plot the posterior medians (black lines) of $(N_e(t))_{t\geq 0}$ along with the $95\%$ credible regions (gray area) obtained from posterior samples by sampling Tajima’s trees (“Tajima", second panel) and Kingman’s trees (“GMRF", third panel). Both our method and GMRF recover the pattern described in the first panel. We detect the population decline only up to about $60$kya ago, afterward the median trajectory is quite flat while the credible regions are wide. This can be explained by the fact that we have no samples from $42$kya to $128.5$kya. On the other hand, GMRF detects more clearly the population decline. The GMRF median time estimate of the population peak is $29.6$ kya, while the median time estimate for our method is $29.7$ kya. Thus, the estimates of the main event of interest, the population decline, are practically identical. The difference between the estimates obtained analyzing $2017$ data differ substantially from the estimates of a population peak between 41.6 and 47.3 kya obtained analyzing the $2004$ data. The LGM in the Northern hemisphere reached its peak between $26.5$ and $19$ kya [@cla09]. Hence, the analysis of the $2017$ data still supports the hypothesis of a decline that initiated before the LGM. However, our estimates suggest an initial decline much closer to the LGM peak than the analysis of the $2004$ data. Human arrival in North America via the Berigian bridge route should have happened around $14-16$ kya [@lla16]. Therefore, despite the mismatch of the timing, the human-induced decline hypothesis has little evidence also according to our analysis of this new dataset. SARS-CoV-2 {#covid} ========== ![[]{data-label="fig:covid"}](covid_figure-eps-converted-to) SARS-CoV-2 is the virus causing the pandemic of novel coronavirus disease in 2019-2020 and it is of interest to explore the utility of viral molecular sequences for surveillance during the outbreak of the epidemic. Here, we analyze $123$ whole genome sequences collected in France, and $32$ sequences collected in Germany that were made publicly available in the GISAID EpiCov database [@shu2017gisaid]. We note that our estimates may not reflect the whole countries effective population sizes but simply local effective population trajectories of the locations in which our samples were obtained. We only analyzed high coverage sequences with more than 25000 base pairs and performed multiple sequence alignment with Mafft [@katoh2013mafft]. To encode nucleotide data as binary sequences ${\textbf{Y}}_1$, we used the GenBank MN908947 [@wu20] sequence as ancestral reference and eliminated sites that were not present in the ancestral sequence. The numbers of variable sites observed are $137$ and $45$ for France and Germany respectively. The observed patterns of mutations in both datasets are compatible with the ISM (no site was further removed). The Gisaid reference numbers of the sequences included in this study and data access acknowledgment are included in the supplementary material. We note that observed differences may be caused by sequencing errors and these are being ignored in our study. The heat maps included in each panel of Figure \[fig:covid\] show the sampling frequency information. In the French dataset, $109$ out of $123$ samples were collected in March (at least one sample every day from $03/01/20$ to $03/22/20$), $9$ in February (spread over $5$ different dates), $5$ in January (spread over $3$ days, oldest sample dated $01/23/20$). In the German dataset, $25$ out of $32$ samples were collected in March (spread over $7$ different dates and $03/16/20$ last sampling day), $6$ in February (spread over $4$ dates), $1$ in January (oldest sample $01/28/20$). We include in each dataset the reference sequence. For our inference procedure, we set $\epsilon=0.11$, $Z_1=2$, $\sigma=0.02$, and approximate the posterior distribution with $1.4 \times 10^6$ iterations after a burn-in of $8 \times 10^5$ and after thinning every $100$ iterations. For comparison, we ran GMRF on BEAST assuming the HKY mutation model [@hky] as proposed in previous studies [@scire2020phylodynamic] and approximate the posterior distribution with $5 \times 10^7$ iterations after a burn-in of $5 \times 10^6$ and after thinning every $1000$ iteration. We used the default values for all GMRF hyperparameters. We initialized both methods with the serial UPGMA genealogy [@dru00]. BEAST estimates a mutation rate of $5.99 \times 10^{-4}$ mutations per site per year in the French dataset, and $7.41 \times 10^{-4}$ mutations per site per year in the German dataset. Our estimate follows the method discussed by [@rambaut2016exploring] obtained by regressing the Hamming distance of the sequences to the ancestral reference sequence on time difference between the sampling times and the reference sampling time. We estimated a mutation rate of $1.07 \times 10^{-3}$ mutations per site per year in the French dataset, and $8.54 \times 10^{-4}$ mutations per site per year in the German dataset. We show the estimates of effective population size with our method in the first column of Figure \[fig:covid\] and with BEAST in the second column. Results for Germany correspond to the first row and for France to the second row. Both analyses of the French dataset exhibit exponential growth from mid-December of $2019$ to the end of February (Tajima estimate of median population peak is 2020/02/29, GMRF estimate is 2020/03/1). Following the exponential growth, both methods suggest a decline. Both analyses of the German dataset recover nearly constant trajectories, possibly due to sampling time concentration in mid-march and spatial sampling concentration in Duesseldorf (see online supplementary material for details). A final remark. Our estimates should be interpreted as estimates of genetic diversity over time and not as number of infections. Our model ignores recombination, population structure and selection. Viruses tend to exhibit antigenic drifts, selective sweeps, and tend to cluster spatially following migration events [@ram08]. All these aspects may hinder the use of coalescent-based models to analyze viral population size dynamics. Indeed, the scientific knowledge on this virus is still limited and the validity of our model assumptions to SARS-CoV-2 is an active area of research. Discussion {#concl} ========== We have introduced a new methodology for Bayesian nonparametric inference of population size trajectory from heterochronous DNA sequences collected at a single non-recombining locus. The main focus of this work is scalability. In this respect, we developed a fast alternative to the Kingman’s coalescent that can be used for nonparametric inference of serially sampled sequences. We also developed a fast algorithm to compute the likelihood of Tajima genealogies, which is in itself a relevant contribution to the literature. We applied our method to a recent data set including modern and ancient bison sequences. There has been a lot of interest in determining whether the decline in the bison population was human-induced or climate-induced. Genetic evidence supported the environmental hypothesis, estimating the population peak to be approximately 45kya. Our analysis reconstructed a similar population size pattern. However, we estimated the peak to be about $29.5$ kya. These analyses confirm that the population decline started sometimes before the LGM. We believe that this brings further genetic evidence to the environmentally induced population decline hypothesis. This paper makes important steps in the direction of a more scalable coalescent-based inference. However, the Tajima heterochronous $n$-coalescent has some limitations which need to be addressed. An obvious one is that we do not model population structure. In the ancient bison application, we removed the Beringian sequences, keeping only North-American ones, because population structure violated the assumption of the standard coalescent, and consequently of any of its “resolutions”. We have also stressed the importance of this feature in the analysis of viral data. In addition, throughout the paper, we assumed the infinite site model of mutation. This prevented us from analyzing the original bison data of [@sha04], as well as many other data that violate the ISM assumption. Given the promise of Tajima based inference shown here, incorporating other mutation models seems to be an interesting avenue of research. Appendix {#app:algo .unnumbered} ========= **Inputs:** [**T**]{}, [**s**]{} **Output:** $A$ 1. Initialize $A=(V_0,\ldots,V_0)$ 2. **For** $i=n-2$ to $1$ **do** 1. Define $A(i)$ unique nodes in the $i$th column of $A$ 2. **For all** $V \in A(i)$ **do** 1. Define $T_V$, set of (non-singleton) child nodes of $V$ having $|g_i|$ descendants 2. Include $V$ in $T_V$ if it has more than two child nodes 3. Define $I$, set of vintages corresponding to all subtrees of $g_i$ 4. **If** $|T_V|=0$: do nothing **Else if** $|T_V|=1$: set column $A_V(\cdot,I)$ equal to $T_V$ **Else if** $|T_V|>1$: copy $A_V(,I)$ $|T_V|-1$ times, attach the copies to $A$ and set each copy equal to one element of $T_V$ 5. Eliminate rows in $A$ where $V$ appears too frequently (rule in the paper) 6. Eliminate rows not compatible with [**s**]{} and [**t**]{} 3. Return $A$. [1]{} [xx]{} Cappello, L.  Palacios, J. A. 2020, ‘Sequential importance sampling for multi-resolution [Kingman]{}-[Tajima]{} coalescent counting’, [*Annals of Applied Statistics*]{} [**in press**]{}. Clark, P. U., Dyke, A. S., Shakun, J. D., Carlson, A. E., Clark, J., Wohlfarth, B., Mitrovica, J. X., Hostetler, S. W.  McCabe, A. M. 2009, ‘The last glacial maximum’, [ *Science*]{} [**325**]{}(5941), 710–714. Disanto, F.  Wiehe, T. 2013, ‘Exact enumeration of cherries and pitchforks in ranked trees under the coalescent model’, [*Mathematical biosciences*]{} [**242**]{}(2), 195–200. Drummond, A. J., Rambaut, A., Shapiro, B.  Pybus, O. G. 2005, ‘Bayesian coalescent inference of past population dynamics from molecular sequences’, [*Molecular biology and evolution*]{} [**22**]{}(5), 1185–1192. Drummond, A.  Rodrigo, A. G. 2000, ‘Reconstructing genealogies of serial samples under the assumption of a molecular clock using serial-sample [UPGMA]{}’, [ *Molecular Biology and Evolution*]{} [**17**]{}(12), 1807–1815. Drummond, A., Suchard, M., Xie, D.  Rambaut, A. 2012, ‘Bayesian phylogenetics with [BEAU]{}ti and the [BEAST]{} 1.7’, [*Molecular Biology and Evolution*]{} [**29**]{}(8), 1969–1973. Faulkner, J. R., Magee, A. F., Shapiro, B.  Minin, V. N. 2020, ‘Horseshoe-based [Bayesian]{} nonparametric estimation of effective population size trajectories’, [ *Biometrics*]{} [**in press**]{}. Felsenstein, J.  Rodrigo, A. G. 1999, [C]{}oalescent approaches to [HIV]{} population genetics, [*in*]{} ‘The [E]{}volution of [HIV]{}’, [Johns Hopkins University]{} Press, pp. 233–272. Froese, D., Stiller, M., Heintzman, P. D., Reyes, A. V., Zazula, G. D., Soares, A. E., Meyer, M., Hall, E., Jensen, B. J., Arnold, L. J. et al. 2017, ‘Fossil and genomic evidence constrains the timing of bison arrival in [North]{} [America]{}’, [ *Proceedings of the National Academy of Sciences*]{} [**114**]{}(13), 3457–3462. Griffiths, R. C.  Tavare, S. 1994, ‘Sampling theory for neutral alleles in a varying environment’, [*Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences*]{} [**344**]{}(1310), 403–410. Gusfield, D. 1991, ‘Efficient algorithms for inferring evolutionary trees’, [*Networks*]{} [**21**]{}(1), 19–28. Hasegawa M, Kishino H, Y. T. 1985, ‘Dating of the human-ape splitting by a molecular clock of mitochondrial [DNA]{}’, [ *Journal of Molecular Evolution*]{} [**2**]{}, 160–164. Jukes, T. H.  Cantor, C. R. 1969 , ‘Evolution of protein molecules’, [*Mammalian protein metabolism*]{} [ **3**]{}(21), 132. Katoh, K.  Standley, D. M. 2013 , ‘Mafft multiple sequence alignment software version 7: improvements in performance and usability’, [*Molecular biology and evolution*]{} [ **30**]{}(4), 772–780. Kimura, M. 1969, ‘The number of heterozygous nucleotide sites maintained in a finite population due to steady flux of mutations’, [*Genetics*]{} [**61**]{}(4), 893. Kingman, J. F. 1982[*a*]{}, ‘On the genealogy of large populations’, [*Journal of Applied Probability*]{} [ **19**]{}(A), 27–43. Kingman, J. F. C. 1982[*b*]{}, ‘The coalescent’, [*Stochastic processes and their applications*]{} [ **13**]{}(3), 235–248. Lan, S., Palacios, J. A., Karcher, M., Minin, V. N.  Shahbaba, B. 2015, ‘An efficient [Bayesian]{} inference framework for coalescent-based nonparametric phylodynamics’, [ *Bioinformatics*]{} [**31**]{}(20), 3282–3289. Llamas, B., Fehren-Schmitz, L., Valverde, G., Soubrier, J., Mallick, S., Rohland, N., Nordenfelt, S., Valdiosera, C., Richards, S. M., Rohrlach, A. et al. 2016, ‘Ancient mitochondrial [DNA]{} provides high-resolution time scale of the peopling of the americas’, [ *Science advances*]{} [**2**]{}(4), e1501385. Minin, V. N., Bloomquist, E. W.  Suchard, M. A. 2008, ‘Smooth skyride through a rough skyline: Bayesian coalescent-based inference of population dynamics’, [*Molecular biology and evolution*]{} [**25**]{}(7), 1459–1471. P[ä]{}[ä]{}bo, S., Poinar, H., Serre, D., Jaenicke-Despr[é]{}s, V., Hebler, J., Rohland, N., Kuch, M., Krause, J., Vigilant, L.  Hofreiter, M. 2004, ‘Genetic analyses from ancient [DNA]{}’, [*Annu. Rev. Genet.*]{} [**38**]{}, 645–679. Palacios, J. A.  Minin, V. N. 2012, Integrated nested [Laplace]{} approximation for [Bayesian]{} nonparametric phylodynamics, [*in*]{} ‘Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence’, UAI’12, AUAI Press, Arlington, Virginia, United States, pp. 726–735. Palacios, J. A.  Minin, V. N. 2013, ‘Gaussian process-based [Bayesian]{} nonparametric inference of population size trajectories from gene genealogies’, [ *Biometrics*]{} [**69**]{}(1), 8–18. Palacios, J. A., V[é]{}ber, A., Cappello, L., Wang, Z., Wakeley, J.  Ramachandran, S. 2019, ‘Bayesian estimation of population size changes by sampling [Tajima]{}’s trees’, [*Genetics*]{} [**213**]{}(2), 967–986. Parag, K. V.  Pybus, O. G. 2019 , ‘Robust design for coalescent model inference’, [*Systematic biology*]{} [**68**]{}(5), 730–743. Rambaut, A., Lam, T. T., Max Carvalho, L.  Pybus, O. G. 2016, ‘Exploring the temporal structure of heterochronous sequences using tempest (formerly path-o-gen)’, [*Virus evolution*]{} [**2**]{}(1), vew007. Rambaut, A., Pybus, O. G., Nelson, M. I., Viboud, C., Taubenberger, J. K.  Holmes, E. C. 2008, ‘The genomic and epidemiological dynamics of human influenza a virus’, [ *Nature*]{} [**453**]{}(7195), 615–619. Sainudiin, R., Stadler, T.  V[é]{}ber, A. 2015, ‘Finding the best resolution for the [Kingman]{}–[Tajima]{} coalescent: theory and applications’, [*Journal of Mathematical Biology*]{} [**70**]{}(6), 1207–1247. Scire, J., Vaughan, T. G.  Stadler, T. 2020, ‘Phylodynamic analyses based on 93 genomes’. Shahbaba, B., Lan, S., Johnson, W. O.  Neal, R. M. 2014, ‘Split [Hamiltonian]{} [Monte]{} [Carlo]{}’, [*Statistics and Computing*]{} [**24**]{}(3), 339–349. Shapiro, B., Drummond, A. J., Rambaut, A., Wilson, M. C., Matheus, P. E., Sher, A. V., Pybus, O. G., Gilbert, M. T. P., Barnes, I., Binladen, J. et al. 2004, ‘Rise and fall of the beringian steppe bison’, [*Science*]{} [**306**]{}(5701), 1561–1565. Shu, Y.  McCauley, J. 2017, ‘Gisaid: Global initiative on sharing all influenza data–from vision to reality’, [*Eurosurveillance*]{} [**22**]{}(13). Tajima, F. 1983, ‘Evolutionary relationship of dna sequences in finite populations’, [*Genetics*]{} [ **105**]{}(2), 437–460. Watterson, G. 1975, ‘On the number of segregating sites in genetical models without recombination’, [ *Theoretical Population Biology*]{} [**7**]{}(2), 256–276. Wu, F., Zhao, S., Yu, B., Chen, Y.-M., Wang, W., Song, Z.-G., Hu, Y., Tao, Z.-W., Tian, J.-H., Pei, Y.-Y. et al. 2020 , ‘A new coronavirus associated with human respiratory disease in china’, [*Nature*]{} [**579**]{}(7798), 265–269. [**SUPPLEMENTARY MATERIAL**]{} Algorithm Description: Augmented Perfect Phylogeny. : The algorithm below uses Gusfield’s perfect phylogeny as an input, duplicates nodes corresponding to haplotypes that are sampled more than once, and returns the augmented perfect phylogeny [**T**]{}. **Inputs:** [**T**]{}’ [@gus91], [**s**]{}, ${\textbf{Y}}_2$ **Output:** [**T**]{} 1. **For** $i=1$ to $k$ **do** **If** $h_{i}$ is observed at multiple sampling times (from ${\textbf{Y}}_2$): \[let w.l.o.g. $r$ be the number of sampling groups in which $h_i$ is observed, and $ s_{i_1},\dots, s_{i_r} $ the corresponding sampling times\] 1. Take the leaf node $V'$ in [**T**]{}’ labeled by $h_{i}$ (each haplotype labels a unique node in Gusfield [**T**]{}’) 2. **If** $|E'|=0$: make $r-1$ copies of $V$ ($r-1$ nodes with edges connecting them to the same parent of $V$ with no edge labels). Then label each of these nodes uniquely with a pair $(h_i,s_{i_1}),\dots,(h_i,s_{i_r})$ **Else if** $|E'|\geq 1$: create $r$ new nodes with unlabeled edges connecting them to $V'$. Then label each of these nodes in a unique way with a pair $(h_i,s_{i_1}),\dots,(h_i,s_{i_r})$ **Else if** $h_{i}$ is observed at a single sampling time (from ${\textbf{Y}}_2$): 1. Identify $V'$ in [**T**]{}’ labeled $h_{i}$ 2. Label $V'$ with a pair ($h_{i}$, its corresponding sampling time) 2. Return [**T**]{}. Algorithm Description: Computing **c**. : We compute **c** through greedy search. The idea is simple: it is not possible to build a compatible topology $g$ conditionally on an incompatible vector [**t**]{}. We initially assume that ISM does not impose any constraints on [**t**]{}, check if we can build a compatible topology, if we are, it will mean that indeed ISM does not impose constraints, if not, it will mean that we need to add some constraints. We continue iteratively until we manage to sample a compatible $g$. To do this process, we consider one sampling group at a time. We define a vector **add** of length $m$ whose $i$th entry is the number of coalescent events that happens before $s_i$. Note that if we are interested in sampling $g$ (ignoring branch information), **add** is the only time information we need. We can sample compatible $g$’s through a simple extension of an Algorithm 2 in [@cap19]. We refer to that paper for details. **Inputs:** [**T**]{}, [**s**]{} **Output:** **c** 1. Initialize $\textbf{c}=(n_1-1,n_1+n_2-1,\dots,\sum_{i=1}^{m-1}n_i-1,n-1)$ 2. **For** $i=1$ to $m-1$ **do** 1. Set $\textbf{add}=(0,\ldots, add_i=0, add_{i+1}=\sum_{i=1}^{i}n_i-1,\ldots,add_{m}=\sum_{i=1}^{i}n_i-1)$ 2. Given **add**, try to sample a compatible topology $g$ 3. **If** $g$ compatible: set $c_i=add_{i+1}$ **Else if** $g$ not compatible: set $add_{i+1}=a_{i+1}-1,\ldots, add_{m}=add_m-1$ and return to (b) 3. Return $\textbf{c}$. Simulation study: : Plots of the estimates obtained from BEAST of the methods GMRF and SKY for the examples discussed in Section \[sim\]. ![[]{data-label="fig:sim2"}](figure_simulations_appendix-eps-converted-to) SARS-CoV-2 Molecular Data Description: : Data set used in the study in Section \[covid\]. We acknowledge the following sequence submitting laboratories to Gisaid.org: - Charité Universitätsmedizin Berlin, Institute of Virology. Victor M Corman, Julia Schneider, Talitha Veith, Barbara Mühlemann, Markus Antwerpen, Christian Drosten, Roman Wölfel. - Bundeswehr Institute of Microbiology. Mathias C Walter, Markus H Antwerpen and Roman Wölfel. - Center of Medical Microbiology, Virology, and Hospital Hygiene, University of Duesseldorf. Ortwin Adams, Marcel Andree, Alexander Dilthey, Torsten Feldt, Sandra Hauka, Torsten Houwaart, Björn-Erik Jensen, Detlef Kindgen-Milles, Malte Kohns Vasconcelos, Klaus Pfeffer, Tina Senff, Daniel Strelow, Jörg Timm, Andreas Walker, Tobias Wienemann. - CNR Virus des Infections Respiratoires - France SUD. Antonin Bal, Gregory Destras, Gwendolyne Burfin, Solenne Brun, Carine Moustaud, Raphaelle Lamy, Alexandre Gaymard, Maude Bouscambert-Duchamp, Florence Morfin-Sherpa, Martine Valette, Bruno Lina, Laurence Josset. - National Reference Center for Viruses of Respiratory Infections, Institut Pasteur, Paris. Mélanie Albert, Marion Barbet, Sylvie Behillil, Méline Bizard, Angela Brisebarre, Flora Donati, Fabiana Gambaro, Etienne Simon-Lorière, Vincent Enouf, Maud Vanpeene, Sylvie van der Werf, Lèa Pilorge. - Laboratoire Virpath, CIRI U111, UCBL1, INSERM, CNRS, ENS Lyon. Olivier Terrier, Aurélien Traversier, Julien Fouret, Yazdan Yazdanpanah, Xavier Lescure, Alexandre Gaymard, Bruno Lina, Manuel Rosa-Calatrava. It follows a description of all sequence sampling locations and dates. gisaid\_epi\_isl date country division ------------------ ------------ --------- ------------------------ EPI\_ISL\_412912 2020-02-25 Germany Baden-Wuerttemberg EPI\_ISL\_406862 2020-01-28 Germany Bavaria EPI\_ISL\_414520 2020-03-02 Germany Bavaria EPI\_ISL\_414521 2020-03-02 Germany Bavaria EPI\_ISL\_413488 2020-02-28 Germany North Rhine Westphalia EPI\_ISL\_414497 2020-02-25 Germany North Rhine Westphalia EPI\_ISL\_414499 2020-02-26 Germany North Rhine Westphalia EPI\_ISL\_414505 2020-02-27 Germany North Rhine Westphalia EPI\_ISL\_414509 2020-02-28 Germany North Rhine Westphalia EPI\_ISL\_417457 2020-03-10 Germany Duesseldorf EPI\_ISL\_417458 2020-03-11 Germany Duesseldorf EPI\_ISL\_417459 2020-03-11 Germany Duesseldorf EPI\_ISL\_417460 2020-03-11 Germany Duesseldorf EPI\_ISL\_417461 2020-03-11 Germany Duesseldorf EPI\_ISL\_417462 2020-03-11 Germany Duesseldorf EPI\_ISL\_417463 2020-03-13 Germany Duesseldorf EPI\_ISL\_417464 2020-03-14 Germany Duesseldorf EPI\_ISL\_417465 2020-03-14 Germany Duesseldorf EPI\_ISL\_417466 2020-03-14 Germany Duesseldorf EPI\_ISL\_417467 2020-03-15 Germany Duesseldorf EPI\_ISL\_417468 2020-03-16 Germany Duesseldorf EPI\_ISL\_419541 2020-03-14 Germany Duesseldorf EPI\_ISL\_419542 2020-03-15 Germany Duesseldorf EPI\_ISL\_419543 2020-03-15 Germany Duesseldorf EPI\_ISL\_419544 2020-03-15 Germany Duesseldorf EPI\_ISL\_419545 2020-03-15 Germany Duesseldorf EPI\_ISL\_419546 2020-03-15 Germany Duesseldorf EPI\_ISL\_419548 2020-03-15 Germany Duesseldorf EPI\_ISL\_419549 2020-03-15 Germany Duesseldorf EPI\_ISL\_419550 2020-03-16 Germany Duesseldorf EPI\_ISL\_419551 2020-03-16 Germany Duesseldorf EPI\_ISL\_419552 2020-03-16 Germany Duesseldorf EPI\_ISL\_402125 2019-12-26 China Hubei gisaid\_epi\_isl date country division ------------------ ------------ --------- ---------------------- EPI\_ISL\_418412 2020-03-15 France Auvergne-Rhône-Alpes EPI\_ISL\_418413 2020-03-15 France Auvergne-Rhône-Alpes EPI\_ISL\_418414 2020-03-15 France Auvergne-Rhône-Alpes EPI\_ISL\_418416 2020-03-16 France Auvergne-Rhône-Alpes EPI\_ISL\_418417 2020-03-16 France Auvergne-Rhône-Alpes EPI\_ISL\_418418 2020-03-16 France Auvergne-Rhône-Alpes EPI\_ISL\_418419 2020-03-16 France Auvergne-Rhône-Alpes EPI\_ISL\_418420 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418422 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418423 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418424 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418425 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418426 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418427 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418428 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_419168 2020-03-17 France Auvergne-Rhône-Alpes EPI\_ISL\_418429 2020-03-18 France Auvergne-Rhône-Alpes EPI\_ISL\_418430 2020-03-18 France Auvergne-Rhône-Alpes EPI\_ISL\_418431 2020-03-18 France Auvergne-Rhône-Alpes EPI\_ISL\_418432 2020-03-18 France Auvergne-Rhône-Alpes EPI\_ISL\_419169 2020-03-21 France Auvergne-Rhône-Alpes EPI\_ISL\_419170 2020-03-21 France Auvergne-Rhône-Alpes EPI\_ISL\_419171 2020-03-21 France Auvergne-Rhône-Alpes EPI\_ISL\_419172 2020-03-21 France Auvergne-Rhône-Alpes EPI\_ISL\_419173 2020-03-21 France Auvergne-Rhône-Alpes EPI\_ISL\_419174 2020-03-20 France Auvergne-Rhône-Alpes EPI\_ISL\_419175 2020-03-21 France Auvergne-Rhône-Alpes gisaid\_epi\_isl date country division ------------------ ------------ --------- ------------------------ EPI\_ISL\_419176 2020-03-21 France Auvergne-Rhône-Alpes EPI\_ISL\_419177 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419178 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419179 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419180 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419181 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419182 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419183 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419184 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419185 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419186 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419187 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_419188 2020-03-22 France Auvergne-Rhône-Alpes EPI\_ISL\_418219 2020-02-26 France Bretagne EPI\_ISL\_416502 2020-02-26 France Bretagne EPI\_ISL\_416503 2020-03-01 France Bretagne EPI\_ISL\_416504 2020-03-02 France Bretagne EPI\_ISL\_416505 2020-03-02 France Bretagne EPI\_ISL\_416506 2020-03-03 France Bretagne EPI\_ISL\_416507 2020-03-05 France Bretagne EPI\_ISL\_416508 2020-03-06 France Bretagne EPI\_ISL\_416509 2020-03-06 France Bretagne EPI\_ISL\_416510 2020-03-06 France Bretagne EPI\_ISL\_416511 2020-03-07 France Bretagne EPI\_ISL\_416512 2020-03-07 France Bretagne EPI\_ISL\_416513 2020-03-07 France Bretagne EPI\_ISL\_415651 2020-03-05 France Bourgogne-France-Comté EPI\_ISL\_415652 2020-03-05 France Bourgogne-France-Comté EPI\_ISL\_416757 2020-03-07 France Auvergne-Rhône-Alpes EPI\_ISL\_417340 2020-03-07 France Auvergne-Rhône-Alpes EPI\_ISL\_418222 2020-03-04 France Centre-Val de Loire EPI\_ISL\_416752 2020-03-04 France Auvergne-Rhône-Alpes EPI\_ISL\_416751 2020-03-05 France Auvergne-Rhône-Alpes EPI\_ISL\_414623 2020-02-25 France Grand Est EPI\_ISL\_414631 2020-03-04 France Grand Est EPI\_ISL\_414632 2020-03-04 France Grand Est gisaid\_epi\_isl date country division ------------------ ------------ --------- ----------------- EPI\_ISL\_418218 2020-02-21 France Hauts de France EPI\_ISL\_418220 2020-02-28 France Hauts de France EPI\_ISL\_414626 2020-02-29 France Hauts de France EPI\_ISL\_414627 2020-03-02 France Hauts de France EPI\_ISL\_414630 2020-03-03 France Hauts de France EPI\_ISL\_414635 2020-03-04 France Hauts de France EPI\_ISL\_414637 2020-03-04 France Hauts de France EPI\_ISL\_414638 2020-03-04 France Hauts de France EPI\_ISL\_415649 2020-03-05 France Hauts de France EPI\_ISL\_418223 2020-03-05 France Hauts de France EPI\_ISL\_418224 2020-03-08 France Hauts de France EPI\_ISL\_418225 2020-03-08 France Hauts de France EPI\_ISL\_415654 2020-03-09 France Hauts de France EPI\_ISL\_416493 2020-03-08 France Hauts de France EPI\_ISL\_416495 2020-03-10 France Hauts de France EPI\_ISL\_416496 2020-03-10 France Hauts de France EPI\_ISL\_416497 2020-03-10 France Hauts de France EPI\_ISL\_418226 2020-03-09 France Hauts de France EPI\_ISL\_418227 2020-03-12 France Hauts de France EPI\_ISL\_418228 2020-03-12 France Hauts de France EPI\_ISL\_418231 2020-03-15 France Hauts de France EPI\_ISL\_418236 2020-03-16 France Hauts de France EPI\_ISL\_418237 2020-03-16 France Hauts de France EPI\_ISL\_418238 2020-03-16 France Hauts de France EPI\_ISL\_418239 2020-03-16 France Hauts de France EPI\_ISL\_406596 2020-01-23 France Ile de France EPI\_ISL\_406597 2020-01-23 France Ile de France EPI\_ISL\_411219 2020-01-28 France Ile de France EPI\_ISL\_408430 2020-01-29 France Ile de France EPI\_ISL\_408431 2020-01-29 France Ile de France gisaid\_epi\_isl date country division ------------------ ------------ --------- ---------------------- EPI\_ISL\_415650 2020-03-02 France Ile de France EPI\_ISL\_416498 2020-03-11 France Ile de France EPI\_ISL\_416499 2020-03-11 France Ile de France EPI\_ISL\_416501 2020-03-10 France Ile de France EPI\_ISL\_418229 2020-03-12 France Ile de France EPI\_ISL\_418230 2020-03-13 France Ile de France EPI\_ISL\_418232 2020-03-15 France Ile de France EPI\_ISL\_418233 2020-03-15 France Ile de France EPI\_ISL\_418234 2020-03-14 France Ile de France EPI\_ISL\_418235 2020-03-16 France Ile de France EPI\_ISL\_418240 2020-03-16 France Ile de France EPI\_ISL\_417333 2020-03-04 France Auvergne-Rhône-Alpes EPI\_ISL\_417334 2020-03-04 France Auvergne-Rhône-Alpes EPI\_ISL\_416753 2020-03-06 France Auvergne-Rhône-Alpes EPI\_ISL\_416754 2020-03-06 France Auvergne-Rhône-Alpes EPI\_ISL\_416756 2020-03-06 France Auvergne-Rhône-Alpes EPI\_ISL\_417337 2020-03-07 France Auvergne-Rhône-Alpes EPI\_ISL\_417336 2020-03-06 France Auvergne-Rhône-Alpes EPI\_ISL\_417339 2020-03-08 France Auvergne-Rhône-Alpes EPI\_ISL\_416758 2020-03-08 France Auvergne-Rhône-Alpes EPI\_ISL\_416747 2020-03-04 France Auvergne-Rhône-Alpes EPI\_ISL\_416748 2020-03-04 France Auvergne-Rhône-Alpes EPI\_ISL\_416750 2020-03-06 France Auvergne-Rhône-Alpes EPI\_ISL\_417338 2020-03-07 France Auvergne-Rhône-Alpes EPI\_ISL\_414624 2020-02-26 France Normandie EPI\_ISL\_416494 2020-03-04 France Normandie EPI\_ISL\_414625 2020-02-26 France Pays de la Loire EPI\_ISL\_416745 2020-03-10 France Auvergne-Rhône-Alpes EPI\_ISL\_416746 2020-03-03 France Auvergne-Rhône-Alpes EPI\_ISL\_416749 2020-03-04 France Auvergne-Rhône-Alpes [^1]: The authors gratefully acknowledge partial funding from the France-Stanford Center for Interdisciplinary Studies. JAP acknowledges support from National Institutes of Health grant R01-GM-131404 and the Alfred P. Sloan Foundation. AV acknowledges partial funding from the chaire program Mathematical Modeling and Biodiversity (Ecole polytechnique, Museum National d’Histoire Naturelle, Veolia Environment, Foundation X).
{ "pile_set_name": "ArXiv" }
<?php /** * NOTE: This class is auto generated by the swagger code generator program. * https://github.com/swagger-api/swagger-codegen * Do not edit the class manually. */ namespace SquareConnect\Model; /** * BatchDeleteCatalogObjectsRequestTest Class Doc Comment * * @category Class * @package SquareConnect * @author Square Inc. * @license http://www.apache.org/licenses/LICENSE-2.0 Apache Licene v2 * @link https://squareup.com/developers */ class BatchDeleteCatalogObjectsRequestTest extends \PHPUnit_Framework_TestCase { /** * Setup before running each test case */ public static function setUpBeforeClass() { } /** * Clean up after running each test case */ public static function tearDownAfterClass() { } /** * Test BatchDeleteCatalogObjectsRequest */ public function testBatchDeleteCatalogObjectsRequest() { } }
{ "pile_set_name": "Github" }
Tag Archives: volunteer firefighter VOWING TO WIN | Nikki Araguz says she will appeal her case all the way to he U.S. Supreme Court if necessary. (Courtesy of Nikki Araguz) No. 8 The Texas Constitution defines marriage as between one man and one woman, but how will the state define “man” and “woman”? Transgender marriage cases in Dallas and Houston could force the Texas Supreme Court — or even the U.S. Supreme Court — to ultimately decide the thorny issue. In Houston, transgender widow Nikki Araguz has appealed a district judge’s ruling denying her death benefits from her late husband, Thomas Araguz III, a volunteer firefighter who was killed in the line of duty in 2010. The judge, Randy Clapp, granted summary judgment to Thomas Araguz’s family, which filed a lawsuit alleging the couple’s 2008 marriage is void because Nikki Araguz was born male, and Texas law prohibits same-sex marriage. The Araguz family’s argument relies heavily on a San Antonio appeals court’s 1999 ruling in Littleton v. Prange, which found that gender is determined at birth and cannot be changed. However, LGBT advocates say the Littleton ruling is unconstitutional, goes against medical science and isn’t binding in other parts of the state, where it has not always been followed. In Dallas, a district judge apparently reached the opposite conclusion from Clapp this November — denying a similar motion for summary judgment. James Allan Scott, a transgender man, is seeking a divorce settlement from his wife of 13 years, Rebecca Louise Robertson. However, Robertson wants to have the marriage declared void because Scott was born a biological female. District Judge Lori Chrisman denied Robertson’s motion for summary judgment, which leaned heavily on Littleton. The judge provided no explanation for her ruling allowing the matter to proceed as a divorce, at least for now. It’s unclear whether Texas Attorney General Greg Abbott plans to intervene in the Dallas case. Abbott has intervened in same-sex divorce cases in Austin and Dallas, seeking to block them. But thus far he has stayed above the fray on transgender marriage, even though it presents overlapping issues. After a transgender woman and a cisgender woman applied for a marriage license in 2010, the El Paso County clerk requested a ruling from Abbott about whether to grant it. But Abbott opted not to weigh in, with his office saying it would instead wait for court rulings in the Araguz case. The El Paso couple was later able to marry in San Antonio, where the county clerk went by Littleton v. Prange. In response to the Araguz case, a bill was introduced in the Texas Legislature this year to ban transgender marriage. The bill would have removed proof of a sex change from the list of documents that can be used to obtain marriage licenses. Strongly opposed by LGBT advocates, it cleared a Senate committee but never made it to the floor. Trans advocates said the bill also would have effectively prohibited the state from recognizing their transitioned status — or, who they are — for any purpose. The problem for socially conservative lawmakers is, they can’t have it both ways. Marriage is a fundamental right that courts have said can’t be taken away from a person completely. So no matter what, Texas will be forced to allow a version of same-sex marriage. Which is why some believe the cases could help undo the marriage amendment. — John Wright This article appeared in the Dallas Voice print edition December 30, 2011.
{ "pile_set_name": "Pile-CC" }
A Frente Comum dos Sindicatos da Função Pública lembra que os trabalhadores podem recorrer aos tribunais – nomeadamente, ao Tribunal Constitucional – caso se sentiam injuriados por causa das progressões na carreira, conta o Diário de Notícias esta quarta-feira. “Qualquer trabalhador que se sinta lesado pode recorrer aos tribunais e pode recorrer ao Tribunal Constitucional” ao tentar “que alguém peça [esse recurso]” para perceber “se o podem discriminar em relação a outro”, disse ao DN Ana Avoila, acrescentando que “não é uma questão de pedir, é uma questão de direitos”. Questionado sobre a reivindicação de vários profissionais para o Governo contabilize todos os anos que estiveram congelados para efeitos de progressão de carreira, o primeiro-ministro, António Costa, disse aos jornalistas que é necessário “negociar com bom senso, com responsabilidade, procurando responder às ansiedades das pessoas, mas com um princípio fundamental: Portugal não pode sacrificar tudo o que conseguiu do ponto de vista da estabilidade financeira”. “O senhor primeiro-ministro, António Costa, incorre num erro porque certamente desconhece que o direito que os trabalhadores da administração pública têm relativamente à carreira”, sublinhou ao matutino Ana Avoila, lembrando que é um direito que está “consagrado na lei”. Segundo a responsável do sindicato, “a contagem dos anos do tempo de serviço e a avaliação de desempenho são dois requisitos fundamentais para a evolução da carreira” e “o que está na lei é para todos”. “As pessoas não podem perder direitos e nem se suspende a democracia, nem se suspendem os direitos”, explicou ao mesmo diário. Os deputados começam esta quarta-feira as votações na especialidade do Orçamento do Estado para 2018 (OE2018) e das mais de 600 propostas de alteração apresentadas pelos partidos, dando início à reta final da discussão orçamental no Parlamento. Na função pública, a discussão mais acesa deverá ser em torno das carreiras dos professores e da contagem do tempo de serviço para efeitos de descongelamento das progressões.
{ "pile_set_name": "OpenWebText2" }
Video fluorescence microscopic techniques to monitor local lipid and phospholipid molecular order and organization in cell membranes during hypoxic injury. Digitized video microscopy is rapidly finding uses in a number of fields of biological investigation because it allows quantitative assessment of physiological functions in intact cells under a variety of conditions. In this review paper, we focus on the rationale for the development and use of quantitative digitized video fluorescence microscopic techniques to monitor the molecular order and organization of lipids and phospholipids in the plasma membrane of single living cells. These include (1) fluorescence polarization imaging microscopy, used to measure plasma membrane lipid order, (2) fluorescence resonance energy transfer (FRET) imaging microscopy, used to detect and monitor phospholipid domain formation, and (3) fluorescence quenching imaging microscopy, used to spatially map fluid and rigid lipid domains. We review both the theoretical as well as practical use of these different techniques and their limits and potential for future developments, and provide as an illustrative example their application in studies of plasma membrane lipid order and topography during hypoxic injury in rat hepatocytes. Each of these methods provides complementary information; in the case of hypoxic injury, they all indicated that hypoxic injury leads to a spatially and temporally heterogeneous alteration in lipid order, topography, and fluidity of the plasma membrane. Hypoxic injury induces the formation of both fluid and rigid lipid domains; the formation of these domains is responsible for loss of the plasma membrane permeability barrier and the onset of irreversible injury (cell death). By defining the mechanisms which lead to alterations in lipid and phospholipid order and organization in the plasma membrane of hypoxic cells, potential sites of intervention to delay, prevent, or rescue cells from hypoxic injury have been identified. Finally, we briefly discuss fluorescence lifetime imaging microscopy (FLIM) and its potential application for studies monitoring local lipid and phospholipid molecular order and organization in cell membranes.
{ "pile_set_name": "PubMed Abstracts" }
303 F.3d 1074 Tausha PRINCE, a minor, by and through her parents; James Prince; Kimberly Prince, Plaintiffs-Appellants,v.Jill JACOBY, Superintendent of Bethal School District; Tim Sherry, Principal of Spanaway Lake High School; Bonnie Kenigson, Assistant Principal of Spanaway Lake High School, Bethel School District in their official capacities; Bethel School District, Defendants-Appellees. No. 99-35490. United States Court of Appeals, Ninth Circuit. Argued and Submitted July 9, 2001. Filed September 9, 2002. COPYRIGHT MATERIAL OMITTED Keith A. Kemper, Ellis, Li & McKinstry, Seattle, WA, Walter M. Weber, The American Center for Law and Justice, Washington, DC, David A. Cortman, Panama City Beach, FL, for the plaintiff-appellant. John H. Binns, Jr. & Daniel C. Montopoli, Vandeberg Johnson & Gandara, Tacoma, WA, for the defendants-appellees. Aaron H. Caplan for the American Civil Liberties Union of Washington, Seattle, WA, and Sue Stengel for the Anti-Defamation League of B'nai B'rith, Las Angeles, CA, amici in support of defendants-appellees. Appeal from the United States District Court for the Western District of Washington Franklin D. Burgess, District Judge, Presiding. Before HALL, WARDLAW and BERZON, Circuit Judges. Opinion by Judge WARDLAW; Concurrence by Judge HALL; Partial Concurrence and Partial Dissent by Judge Berzon. OPINION WARDLAW, Circuit Judge. 1 In this private right of action under the Equal Access Act (the "Act") and the First Amendment, Tausha Prince, an eleventh grade student at a Bethel School District ("School District") public high school, challenges the school's refusal to allow her Bible club to meet as an Associated Student Body ("ASB") club, entitled to the same benefits as other student clubs. Instead, Prince's club was recognized only as a "Policy 5525 club," which limited her club's access to benefits offered by the high school. Prince appeals from the district court's grant of summary judgment in favor of the School District, in which the district court found that the Equal Access Act and the Establishment Clause forbid offering a religious club the various advantages offered to other student clubs. 2 We consider each of Prince's access claims separately, first under the Act, and then the First Amendment, to the extent we find them outside the scope of the Act. Having done so, we hold that the School District violated either the Act or Prince's First Amendment rights by denying her Bible club the same rights and benefits as other School District student clubs and by refusing to allow the Bible club equal access to school facilities on a religion-neutral basis. We have jurisdiction pursuant to 28 U.S.C. § 1291, and we reverse the district court's decision. I. Background 3 Tausha Prince, an eleventh grade student at Spanaway Lake High School, and other students established a Christian Bible club called the "World Changers." The purpose of World Changers is to address issues of interest to students from a religious perspective, including service to the student body and the community, diversity and acceptance of all people, helping students to cope with daily pressures, as well as "celebrating" and "sharing" the Gospel of Jesus Christ. The School District rebuffed Prince's attempt to form the club as an officially recognized ASB noncurriculum-related club. Prince, through counsel, wrote to the School District suggesting that the refusal to recognize the World Changers as an ASB group violated the Act. In response, the School District stated that under District Policy 5525, religious organizations could be formed only as Policy 5525 clubs. After the school denied her second request to form as an ASB group, Prince submitted an application to form her club as a Policy 5525 group. 4 The School District enacted Policy 5525 in June 1994 in an attempt to comply with the Equal Access Act. Modeled on section 4071(c) of the Act, the policy authorizes student sponsored and initiated student groups to meet at the school, subject to approval by the principal. The policy provides for approval, so long as the groups 1) remain voluntary and student initiated; 2) are not sponsored by the school or its staff; 3) hold meetings that do not materially and substantially interfere with the orderly operation of the school; 4) require that students, rather than outsiders, are responsible for the direction, control, and conduct of the meetings; 5) do not require students to participate in any religious activity; 6) do not use school funds for other than incidental and/or monitoring costs; 7) do not compel any staff member to attend; and 8) respect the constitutional rights of all persons. Policy 5525 clubs are not entitled to the same benefits as ASB clubs. 5 Prince claims that by denying the World Changers access to the same benefits as ASB groups, the School District denies her equal access to this forum in violation of the Act. These benefits include access to ASB money to fund club activities, as well as free participation in ASB fund-raising events such as the annual craft fair, the school auction, and other fund-raising events. Likewise, ASB groups appear in the school yearbook, produced with ASB funds, free of charge and are permitted to meet during student/staff time during school hours. ASB groups also receive greater access to facilities to publicize their events, including the right to post flyers throughout the school, rather than on a single bulletin board, and the use of the public address system. Finally, ASB groups benefit from the expenditure of School District funds as they may use school supplies, have priority access to audio/visual equipment, and use school vehicles for field trips. 6 The School District maintains that while Prince is welcome to form the World Changers as a Policy 5525 group, granting the World Changers equal status with ASB groups would "destroy the careful balance between the Free Speech and Establishment clauses of the First Amendment" found in the Act. Specifically, because the ASB regulations increase School District scrutiny of the budget, constitution, bylaws, fund-raising, and activities of ASB groups, granting ASB status to religious clubs would result in excessive entanglement between the state and religion, and would attach the school's imprimatur to the club in violation of the Establishment Clause. Moreover, the School District contends that by creating two separate forums, the Policy 5525 forum and the ASB forum, it avoids viewpoint discrimination in violation of the First Amendment. 7 In ruling for the School District, the district court first determined that the Act does not require absolute equality of student groups; thus, the School District's distinction between ASB groups and Policy 5525 groups did not violate it. The court also found that the school was a "nonpublic" forum and, accordingly, the School District's distinction between ASB and Policy 5525 groups neither violated Prince's rights to free speech or the free exercise of religion under the First Amendment. Finally, because the nonpublic nature of the school forum did not implicate fundamental rights of freedom of speech or exercise of religion, the School District policy did not violate the Equal Protection Clause of the Fourteenth Amendment. II. Standard of Review 8 We review de novo a grant of summary judgment. We must determine whether, viewing the evidence in the light most favorable to Prince, there are any genuine issues of material fact and whether the district court correctly applied the substantive law. Lopez v. Smith, 203 F.3d 1122, 1131 (9th Cir.2000) (en banc). III. The Equal Access Act 9 A. Three Distinctions in the Act: Equal Access, Fair Opportunity, and Discrimination 10 The Equal Access Act, 20 U.S.C. §§ 4071-74 (1984), guarantees public secondary school students the right to participate voluntarily in extracurricular groups dedicated to religious, political, or philosophical expressive activity protected by the First Amendment when other student groups are given this right. The impetus for its enactment in Congress was anecdotal evidence that secondary school students suffered discrimination at the hands of school administrators, sanctioned by federal district courts, who believed that the First Amendment precluded equal access for religious student groups to the public school. See, e.g., 130 Cong. Rec. S8331 (daily ed. June 27, 1984) (statement of Sen. Hatch). The Act was designed to transport the right of equal access to religious activities to limited open forums established with respect to college level students in Widmar v. Vincent, 454 U.S. 263, 102 S.Ct. 269, 70 L.Ed.2d 440 (1981), to the secondary school level. The Supreme Court upheld the Act's constitutionality against Establishment Clause challenges in Board of Education v. Mergens, 496 U.S. 226, 110 S.Ct. 2356, 110 L.Ed.2d 191 (1990). The key provision of the Act provides: 11 It shall be unlawful for any public secondary school which receives Federal financial assistance and which has a limited open forum to deny equal access or a fair opportunity to, or discriminate against, any students who wish to conduct a meeting within that limited forum on the basis of the religious, political, philosophical, or other content of the speech at such meetings. 12 20 U.S.C. § 4071(a) (2000). 13 The Act sets forth certain "triggers" for its applicability. It applies only if the school in question is (1) a public secondary school that (2) receives federal funding, and (3) has established a "limited open forum" by allowing other "non-curriculum" groups to meet on school premises. Spanaway Lake High School is a public high school that receives federal funding. The parties stipulate that Spanaway has created a "limited open forum" under the Act and that the Bible Club is a "non-curriculum" group. Therefore, as both sides agree, the Act is "triggered" in this case. 14 Left to us to decide is whether the School District's refusal to afford World Changers and other Policy 5525 groups the same benefits afforded ASB groups denies "equal access or a fair opportunity to, or discriminates against," Prince and World Changers. Prince argues that the Act mandates that religious groups such as World Changers be afforded all the same benefits afforded other groups. Specifically, she contends that the terms "equal access" and "discriminate," interpreted in light of the Act's statutory purpose, suggest that the Act requires absolute equality between religious and non-religious groups. The School District contends that the addition of the phrase "fair opportunity" to the requirements of the Act suggests that uniform access to the ASB forum is not required, as long as a "fair opportunity" for access is provided. 15 Our analysis of the Act begins with its language. Hughes Aircraft Co. v. Jacobson, 525 U.S. 432, 438, 119 S.Ct. 755, 142 L.Ed.2d 881 (1999). "In matters of statutory construction [our] duty ... is to give effect to the intent of Congress, and in doing so our first reference is of course to the literal meaning of words employed." Flora v. United States, 357 U.S. 63, 65, 78 S.Ct. 1079, 2 L.Ed.2d 1165 (1958). Where the intent of Congress "has been expressed in reasonably plain terms, that language must ordinarily be regarded as conclusive." Griffin v. Oceanic Contractors, Inc., 458 U.S. 564, 570, 102 S.Ct. 3245, 73 L.Ed.2d 973 (1982) (internal quotation marks omitted); United States v. Am. Trucking Ass'ns., Inc., 310 U.S. 534, 543, 60 S.Ct. 1059, 84 L.Ed. 1345 (1940) ("There is, of course, no more persuasive evidence of the purpose of a statute than the words by which the legislature undertook to give expression to its wishes."). Our job is to ascertain what Congress has written, not "to add [or] to subtract, ... to delete [or] to distort," 62 Cases, More or Less, Each Containing Six Jars of Jam v. United States, 340 U.S. 593, 596, 71 S.Ct. 515, 95 L.Ed. 566 (1951), and "to avoid rendering what Congress has plainly done... devoid of reason and effect." Great-West Life & Annuity Ins. Co. v. Knudson, 534 U.S. 204, 122 S.Ct. 708, 717, 151 L.Ed.2d 635 (2002). 16 Although revised many times, as enacted, section 4071, entitled "Denial of Equal Access Prohibited," begins by making unlawful the denial of "equal access" or "fair opportunity" or discrimination against students desiring to conduct a meeting in a "limited open forum" on the basis of the "religious, political, philosophical, or other content of the speech at such meetings." It then defines some, but not all, of the terms set forth in the prohibition, including "limited open forum," § 4071(b), and "fair opportunity criteria," § 4071(c). It does not set forth a definition of the terms "equal access" or "discriminate against." Next, the Act limits the authority of the school board in section 4071(d). In section 4072, Congress further defines the terms "secondary school," § 4072(1), "sponsorship," § 4072(2), "meeting," § 4072(3), and "non-instructional time," § 4072(4). 17 The disjunctive prohibition renders the denial of equal access or fair opportunity or discrimination unlawful. The use of the disjunctive "or" suggests that "equal access" and "discriminate against" have meaning independent of "fair opportunity." "The cardinal principle of statutory construction is to save and not destroy. It is our duty to give effect, if possible, to every clause and word of a statute." United States v. Menasche, 348 U.S. 528, 538-39, 75 S.Ct. 513, 99 L.Ed. 615 (1955) (internal quotation marks and citations omitted). 18 Although the Act does not specify the meaning of the terms "equal access" and "discriminate against," Congress did not need to do so. We presume that Congress, in enacting the Act, was aware of the settled judicial construction of these phrases. See Pierce v. Underwood, 487 U.S. 552, 567, 108 S.Ct. 2541, 101 L.Ed.2d 490 (1988) (citing Lorillard v. Pons, 434 U.S. 575, 580-81, 98 S.Ct. 866, 55 L.Ed.2d 40 (1978)). "In adopting the language used in the ... [A]ct, Congress must be considered to have adopted also the construction given by this Court to such language, and made it a part of the enactment." Shapiro v. United States, 335 U.S. 1, 16, 68 S.Ct. 1375, 92 L.Ed. 1787 (1948); see also South Dakota v. Yankton Sioux Tribe, 522 U.S. 329, 351, 118 S.Ct. 789, 139 L.Ed.2d 773 (1998) (Supreme Court assumes that Congress is aware of existing law when it passes legislation). 19 As the legislative history of the Act spells out quite clearly, the Act was written to enact the policy of equal access and nondiscrimination against religious speech enunciated by the Court in Widmar, 454 U.S. at 267-71, 102 S.Ct. 269. S.Rep. No. 98-357, at 38-39 (1984), reprinted in 1984 U.S.C.C.A.N. 2348, 2384-85.1 As explained in the Senate Report: 20 The standard of `equal access' was used by the Supreme Court in Widmar v. Vincent, to describe the free speech principle safeguarded by Section 2(a). In Section 2(a), as in the Supreme Court decision, the guarantee of equal access means that religiously oriented student activities of an extracurricular nature would be allowed under the same terms and conditions as other extracurricular activities. Under Section 2(a), it would be unlawful to single out a voluntary student religious activity for discriminatory treatment based on the fact that the form or content of its expression is religious. The opportunity for an extracurricular religious group to meet and have access to public school facilities could not be restricted solely because the activity included religious speech or prayer. This provision follows the Supreme Court decision in Widmar v. Vincent, which held that religious speech is entitled to the same First Amendment protections as non-religious speech. 21 Id. at 38-39. Thus, the term "equal access" means what the Supreme Court said in Widmar: religiously-oriented student activities must be allowed under the same terms and conditions as other extracurricular activities, once the secondary school has established a limited open forum. Widmar, 454 U.S. at 267-71, 102 S.Ct. 269. 22 The legislative history also sheds light on the term "discrimination." The Senate Judiciary report states that "discrimination" includes the denial of permission for students to engage in voluntary extracurricular activities that include prayer or religious speech when a school permits students to meet for non-religious extracurricular speech. S.Rep. No. 98-357, at 39. It also notes that discriminatory actions in the form of harassment or unequal penalties, as well as clearcut denial, constitute a violation of the law. Id. The report clarifies that Congress did not intend the terms "equal access," "discrimination," and "fair opportunity" to have the same meaning, by recognizing distinctions in the type of proof each term would require. It acknowledges that proof of discrimination under current law could require proof of a discriminatory motive on the part of the school district, but that such a higher standard of proof would not be necessary to show denial of "access and opportunity" in violation of the Act. Id. ("The motive of the school, which could be important to a finding of discrimination, is not therefore decisive in determining whether there has been a denial of equal access and opportunity in violation of section 2(a)."). 23 Nothing in the Act suggests that Congress meant to use these words as synonyms. The School District and the district court's restrictive reading of the Act to require only "fair opportunity" renders superfluous the words "equal access" and "discrimination" in Section 4071(a). They would read "equal access" and "discrimination" right out of the Act, making what "Congress has plainly done ... devoid of reason and effect." Great-West Life, 122 S.Ct. at 717. 24 Moreover, the Act's outline of the "fair opportunity" criteria does not address the School District's affirmative obligations regarding "equal access" and "discrimination," but rather circumscribes what the school may do. This provision was included to avoid excess entanglement with religion, so that the Act would withstand an Establishment Clause challenge. See Gibbons, supra note 1, at 1164-65. Under the Act, a school "shall be deemed to offer a fair opportunity to students who wish to conduct a meeting within its limited open forum" if the school "uniformly" provides that: 25 (1) the meeting is voluntary and student-initiated; 26 (2) there is no sponsorship of the meeting by the school, the government, or its agents or employees; 27 (3) employees or agents of the school or government are present at religious meetings only in a nonparticipatory capacity; 28 (4) the meeting does not materially and substantially interfere with the orderly conduct of educational activities within the school; and (5) nonschool persons may not direct, conduct, control, or regularly attend activities of student groups. 29 20 U.S.C. § 4071(c). 30 If the School District went beyond the limits of section 4071(c), its activities could be deemed to violate the Establishment Clause. For example, if a public school required student participation in or itself participated in or sponsored religious meetings on the high school campus, it would bump squarely into Establishment Clause jurisprudence prohibiting such government sponsorship of religion. See McCollum v. Bd. of Ed., 333 U.S. 203, 209-11, 68 S.Ct. 461, 92 L.Ed. 649 (1948). Likewise, the school retains the authority to prohibit meetings that would materially or substantially interfere with the orderly conduct of educational activities within the school. See Tinker v. Des Moines Indep. Comm. Sch. Dist., 393 U.S. 503, 509, 513, 89 S.Ct. 733, 21 L.Ed.2d 731 (1969). Thus, merely meeting the criteria for "fair opportunity" could not possibly satisfy the affirmative requirements of equal access and non-discrimination. Similarly, section 4071(d), which, among other things, prevents the School District from influencing and requiring participation in the religious activity, limits the authority of the school board within the constitutional orbit. 31 The Supreme Court's interpretation of the Act in Mergens, where it grappled with a similar question, supports our conclusion. 496 U.S. at 248, 110 S.Ct. 2356. There, a group of students requested permission to form a Christian club at the school, whose purpose would have been, among other things, to permit the students to read and discuss the Bible, to have fellowship, and to pray together. Id. at 232, 110 S.Ct. 2356. The school board denied outright Mergens's request for official recognition. It reasoned that if the student religious meetings were held under the school's aegis and the state compulsory attendance laws brought students together, thus providing an audience for student evangelists, an objective observer would perceive official school support for the meetings. Id. at 249, 110 S.Ct. 2356. Instead, the school board allowed the Christian group only to meet informally on the school premises after school. The Supreme Court disagreed with the school district's reasoning, noting that the logic of Widmar applied with equal force to the Act: "the purpose of granting equal access is to prohibit discrimination between religious or political clubs on the one hand and other noncurriculum-related student groups on the other." Id. at 238, 110 S.Ct. 2356. The Court held that "[o]fficial recognition [by the school] allows student clubs to be part of the student activities program and carries with it access to the school newspaper, bulletin boards, the public address system, and the annual Club Fair." Id. at 247, 110 S.Ct. 2356. Denying the Christian club those same benefits was a denial of "equal access," not just "fair opportunity," under the Act. Id. Similarly here, we must reject the School District's contention that providing "fair opportunity" is sufficient to provide "equal access." 32 We find this interpretation consistent with the overall legislative purpose behind the Act. The Supreme Court has stressed repeatedly that "[i]n expounding a statute, we must not be guided by a single sentence or member of a sentence, but look to the provisions of the whole law, and to its object and policy." U.S. Nat'l Bank of Or. v. Indep. Ins. Agents of Am., Inc., 508 U.S. 439, 455, 113 S.Ct. 2173, 124 L.Ed.2d 402 (1993) (quoting United States v. Heirs of Boisdore, 49 U.S. (8 How.) 113, 122, 12 L.Ed. 1009 (1850)). The object of Congress in enacting the Act was "to prohibit discrimination between religious and political clubs on the one hand and other noncurriculum-related student groups on the other...." See Mergens, 496 U.S. at 238, 110 S.Ct. 2356. The Act, "which was passed by wide, bipartisan majorities in both the House and the Senate, reflects at least some consensus on a broad legislative purpose. The Committee Reports indicate that the Act was intended to address perceived widespread discrimination against religious speech in public schools...." Id at 239, 110 S.Ct. 2356. (citing H.R.Rep. No. 98-710, at 4 (1984), S.Rep. No. 98-357, at 10-11 (1984)). Accordingly, a "broad reading of the Act would be consistent with the views of those who sought to end discrimination by allowing students to meet and discuss religion before and after classes." Id. We therefore reject the School District's claim that even if it provided fair opportunity to the World Changers, it need not provide equal access. 33 B. "Sponsorship" of a Religious Organization 34 The School District also argues that Washington State regulations require such substantial control over the activities of ASB clubs that granting ASB status to a religious student group would result in prohibited "sponsorship" of that group in violation of the Act and the Establishment Clause. Washington State regulations provide that a student group be "formed with the approval, and operated subject to the control, of the board of directors of a school district" to secure ASB status. Wash. Admin. Code § 392-138-010(1) (1999). They also require each ASB organization to "submit a financial plan (budget)... to the district superintendent ... for consolidation into a district associated student body program fund budget and then present such budget to the board of directors of the district for review, revision, and approval." Wash. Admin. Code § 392-138-040 (1999). The School District contends that because it is bound by these regulations, it cannot grant a religious group ASB status without "sponsoring" that group. This argument fails on a number of grounds. 35 First, the regulations in question do not require "sponsorship" as defined in the Act. Section 4072(2) defines "sponsorship" to include "promoting, leading, or participating in a meeting." 20 U.S.C. § 4072(2) (emphasis added). "Meeting" is defined to "include[] those activities of student groups which are permitted under a school's limited open forum." 20 U.S.C. § 4072(3). The regulations cited by the School District do not require that the district promote, lead, or participate in any World Changers meeting in any way. 36 Second, the School District offers an overbroad reading of the regulations to support its contention that conferring ASB status on religious groups would result in unlawful "sponsorship" of the club. Importantly, the regulations define "[a]ssociated student body organization" as a "formal organization of students, including subcomponents or affiliated student groups such as student clubs, which is formed with the approval, and operated subject to the control, of the board of directors of a school district." Wash. Admin. Code § 392-138-010(1) (1999). Nowhere do the regulations state that the School District itself approves the constitution and bylaws of each affiliated club. As the Spanaway Lake High School principal admitted in his deposition, it is the student council that approves the constitution and bylaws of each student group. As to the student budget, regulations provide that it is the "associated student body," not each individual student club, which must submit a budget to the district superintendent who then consolidates that budget into a district-wide student budget. The school board reviews, revises, and approves the district-wide student budget. Again, it is the student council that approves each individual group's budget. 37 The Washington State regulations thus require only limited involvement by the School District in the particular activities of ASB groups. They certainly do not require that the District "promote" the World Changers, "lead" it, or "participate" in its activities. Similar procedures were addressed by the Supreme Court in Mergens. There, although there was no written school board policy, students who wished to form a club presented their request to a school official who determined whether the proposed club's goals and objectives were consistent with school board policies and with the school district's "Missions and Goals." Mergens, 496 U.S. at 232, 110 S.Ct. 2356 (describing a broadly worded document that expressed the school district's commitment to academic, physical, civic, and personal skills and values). Like the Supreme Court in Mergens, we reject the argument that simply because of a limited approval and oversight process by the district, the district impermissibly sponsors the club within the meaning of the Act or as proscribed by the First Amendment. At most, Washington State regulations require that the School District "[r]etain and exercise the general powers, authority, and duties expressed in law with respect to the administration of the school district." Wash. Admin. Code § 392-138-030(1) (1999). That sort of involvement is recognized by the Act: "Nothing in this subchapter shall be construed to limit the authority of the school... to maintain order and discipline on school premises, to protect the well-being of students and faculty, and to assure that attendance of students at meetings is voluntary." 20 § U.S.C. 4071(f). Because we are obligated to construe a state statute as valid, where possible, Lorillard, 434 U.S. at 577, 98 S.Ct. 866, we cannot agree that the regulations are inconsistent with the Act. 38 Even if these regulations were construed to require the School District to "sponsor" student clubs, however, they could not shield the School District's violation of the Act. Under the Act, once the School District establishes a "limited open forum," it must provide the World Changers with equal access to that forum. If state regulations did require the School District to "sponsor" the club as prohibited by the Act, then it is the regulations that must give way, not the District's obligation to provide equal access. The rationale of Garnett v. Renton School District, 987 F.2d 641 (9th Cir.1993), compels this conclusion. There, Washington State argued that despite creating a limited open forum within the school district for noncurriculum-related clubs to meet, the Washington State Constitution precluded the Act from requiring the use of school premises by a religious club. We disagreed, holding that the Washington State Constitution's Establishment Clause did not absolve school districts of their obligations under the Act: "state[s] cannot abridge rights granted by federal law.... The EAA provides religious student groups a federal right. State law must therefore yield." Garnett, 987 F.2d at 646 (citations omitted). If the Washington State Constitution must yield to the Act, then so too must the state's administrative regulations. We must, therefore, examine each of the specific benefits requested by the World Changers to determine whether Prince and her group are entitled to access equal to that given ASB groups under the Act. C. Individual Access Claims under the Act 39 1. Access to ASB funding, including participation in the craft fair, school auction, and fund-raising during the school day 40 The Act prohibits school districts from "expend[ing] public funds beyond the incidental cost of providing the space for student-initiated meetings." 20 U.S.C. § 4071(d)(3). The School District argues that the use of ASB funds, including participating in the annual craft fair free of charge, fund-raising during the school day, and participating in the school auction, each require the expenditure of public funds and thus are prohibited by the Act. That the School District classifies ASB funds as "public funds" is irrelevant for the purposes of construing the Act. See Garnett, 987 F.2d at 644-46 (finding that the Equal Access Act preempts state law). Rather, we must examine the precise nature of the ASB program funds and determine, according to the broad purpose of the Act and analogous interpretations of federal law, whether those funds are "public." 41 The ASB funds at issue are accounted for separately from general School District funds. They are not commingled. No School District funds are allocated to an ASB account. The funds are generated from the sale of ASB cards, which cost $20 and entitle the holder to participate in school sports and to receive discounts at ASB events such as sporting events and dances. Payment for the cards is voluntary. ASB clubs also raise funds by selling crafts in the annual craft fair, participating in an ASB auction, and through other fund-raising activities, such as candy sales and car washes, ongoing throughout the school year. 42 Although Policy 5525 clubs may participate in the craft fair, they must pay a $60 fee. They are prohibited from participating in the auction, and from fund-raising during the school day or at any other time that would compete with ASB fund-raising. ASB clubs access ASB funds by submitting purchase order requests to pay activity expenses such as transportation, lodging, and registration fees. 43 Although the Act does not define the phrase "expend public funds," the Supreme Court's decision in Rosenberger v. Rector and Visitors of the University of Virginia, 515 U.S. 819, 115 S.Ct. 2510, 132 L.Ed.2d 700 (1995), provides a useful starting point for our analysis. While Rosenberger involves the Establishment Clause of the First Amendment, rather than the Act, the Act was drafted against the background protections of the Establishment and Free Exercise Clauses. Mergens, 496 U.S. at 259, 110 S.Ct. 2356 (Kennedy, J., concurring). Similarly, like the other limitations on School District activity contained in the Act, section 4071(d)'s statement that the Act does not authorize schools to "expend public funds" on religious groups appears to be intended to avoid Establishment Clause issues. Indeed, had the Act actually authorized schools to "expend public funds" on religious groups, it could have run afoul of a long line of Establishment Clause decisions forbidding direct subsidies to religious groups. See Rosenberger, 515 U.S. at 842, 115 S.Ct. 2510 (collecting cases). Accordingly, we look to Rosenberger to guide our reasoning. 44 In Rosenberger, the school imposed activities fees on students, maintained those fees, kept them separate from general university funds, and then allowed groups of students to apply for their use. Id. at 841, 115 S.Ct. 2510. The Court emphasized that the 45 $14 paid each semester by the students is not a general tax designed to raise revenue for the University ....[T]he money goes to a special fund from which any group of students with CIO status can draw for purposes consistent with the University's educational mission; and to the extent the student is interested in speech, withdrawal is permitted to cover the whole spectrum of speech, whether it manifests a religious view, an antireligious view, or neither. Our decision, then, cannot be read as addressing an expenditure from a general tax fund. Here, the disbursements from the fund go to private contractors for the cost of printing that which is protected under the Speech Clause of the First Amendment. This is a far cry from a general public assessment designed to provide financial support for a church. 46 Id. (citing United States v. Butler, 297 U.S. 1, 61, 56 S.Ct. 312, 80 L.Ed. 477 (1936), for the proposition that a "tax, in the general understanding of the term, and as used in the Constitution, signifies an exaction for the support of the Government"). 47 As in Rosenberger, the ASB funds here subsidize club expenditures consistent with Spanaway Lake High School's educational mission. In light of Rosenberger, we hold that the ASB funds do not constitute "public funds" for purposes of the Act. The School District discriminates against Prince and the World Changers by denying them equal access to those funds. The School District also unlawfully discriminates against the World Changers, based on their viewpoint, when it prohibits them from engaging in or charges them to participate in other fund-raising activities, including the auction and the craft fair, on an equal basis with other ASB groups. 2. Free appearance in yearbook 48 Nor can the School District justify charging Policy 5525 groups for appearance in the yearbook on the basis that the yearbook is subsidized by public funds, as it contends. Because the ASB funds are not "public funds" as defined in the Act, the School District denies equal access to Policy 5525 clubs by charging them advertising fees to appear in the school yearbook, which is produced with ASB funds. Again, as in Rosenberger, the disbursements from the fund for club photographs go to the yearbook vendors, not the individual clubs, and its purpose is consistent with the school's educational mission. It is unlawful viewpoint discrimination under the Act for the school to allow ASB clubs to appear in the yearbook free of charge, but to require Policy 5525 clubs to pay. 49 3. Use of the public address system and school bulletin boards 50 The School District argues that no club, ASB or Policy 5525, has a right to use the public address system and that all clubs, including Policy 5525 clubs, are allowed access to school bulletin boards. Prince asserts that in practice, ASB clubs have been allowed to use the public address system and to post flyers throughout the school, unlike Policy 5525 clubs, which are restricted to the use of only one bulletin board. While these factual matters are best left for resolution in the district court, we hold that the Act requires the School District to afford the World Changers the same access to the public address system and bulletin boards enjoyed by ASB groups to publicize their activities. 51 In Mergens, the Supreme Court considered the right of religious clubs to publicize their events on an equal basis with other officially recognized school clubs. It held that the Act required equal access to the school's limited open forum in the form of official recognition, which included access to the school newspaper, bulletin boards, and the public address system. See Mergens, 496 U.S. at 247, 110 S.Ct. 2356. Here, as in Mergens, equal access to the school forum includes access to the use of more than one bulletin board and the public address system to publicize club activities. There is no qualification in the Act or in Mergens that would allow the school to limit bulletin board space based on the religious nature of the activity. Access to such space must be "equal." Likewise, to the extent that the school allows ASB clubs to announce meeting times or events over the public address system, it cannot then discriminate against Policy 5525 clubs that seek the same privilege. While the school is certainly permitted to maintain order and discipline in the school hallways and classrooms by limiting the number and manner of both printed and oral announcements for all student groups, 20 U.S.C. § 4071(f), it may not discriminate among student groups based on the religious content of the expression or proposed meeting. This is not to say that World Changers has the right to pray or proselytize in any manner through the school's public dissemination systems. Nonetheless, the logic of Mergens compels equal access to publicize Policy 5525 club events. See Mergens, 496 U.S. at 247, 110 S.Ct. 2356. 4. Meetings during student/staff time 52 The School District contends that because attendance is taken and instruction may occur in the classroom during student/staff time at Spanaway Lake High School, student/ staff time does not qualify as noninstructional time and the School District may not permit Policy 5525 groups to meet during this time. The Act provides that a school's limited open forum extends to whenever groups are permitted to meet "on school premises during noninstructional time." 20 U.S.C. § 4071(b). We have already held that the plain meaning of "noninstructional time" is defined unambiguously in the statute as the "time set aside by the school before actual classroom instruction begins or after actual classroom instruction ends." Ceniceros v. Board of Trustees, 106 F.3d 878, 880 (9th Cir.1997) (holding that there is no need to rely on the legislative history to come to this conclusion because there was no ambiguity in the language of the statute). However, we have not yet fully delineated the contours of the statutory term "actual classroom instruction." 53 At Spanaway Lake High, student/staff time is a scheduled class where attendance is taken, and where no formal classroom instruction takes place, except on a voluntary, individual basis. During this time, a student may work on homework, receive one-on-one tutoring with a teacher, attend school assemblies, or, with prior arrangement and scheduling, participate in a student club meeting. Students are not permitted to leave campus, and attendance is taken. 54 Prince argues that Ceniceros requires us to find that the Act mandates equal access to student/staff time for the World Changers. In Ceniceros, the public high school allowed noncurriculum-related clubs to meet during the lunch period in empty classrooms, but denied the same opportunity to a religious club. Ceniceros 106 F.3d at 880. Relying on the parties' stipulation that "no classroom instruction occurs" during the school's lunch hour and that students were not required to remain on campus during the lunch hour, we concluded that the "plain meaning of `noninstructional time,' as defined in section 4072(4), includes the lunch period." Id. 55 We do not view Ceniceros as controlling, because there are significant differences between the lunch hour and the scheduled student/staff time here. Although, as in Ceniceros, the School District concedes that no "formal" instruction takes place during student/staff time, it does not concede that no "actual classroom instruction" takes place, nor can it, given that students may receive individual instruction in the classroom during this time. The statute is ambiguous as to whether "actual classroom instruction" means something akin to formal instruction given to an entire class during a structured period or whether it encompasses instruction in a class room where mandatory attendance is required. Because the text is ambiguous, it is necessary to turn to the legislative history. See Ram v. INS, 243 F.3d 510, 515 (9th Cir. 2001). 56 The legislative history makes clear that once student attendance is required, "actual classroom instruction" begins. The Congressional debates between Senator Hatfield, the author of relevant amendments to the Act, and Senator Metzenbaum illustrate this point: 57 Sen. Metzenbaum: If there is a homeroom session at the beginning of the day, that would be considered as part of the actual classroom instructional day? 58 Sen. Hatfield: I think most schools will make an interpretation of that, according to my experience in education, as to the required time to be in school. If a school is to begin at 9 o'clock, that is the required hour for students to begin their day. They do not open with geography or mathematics or something, but they open with a homeroom period of 20 minutes, when they get instructions, announcements, and so forth and so on. They are still required to be there at 9 o'clock. So you could not hold an activity of this kind at 9 o'clock until 9:20 because it is a preinstructional period, in that sense, because it is required of the instructional period to begin at 9 o'clock. Sen. Metzenbaum: So you could not hold it during that period? 59 Sen. Hatfield: That is right. 60 130 Cong. Rec. at 19234-35. 61 The conclusion that mandatory attendance marks the beginning of "actual classroom instruction" is supported by revisions made to earlier versions of the Act that would have encompassed certain class periods during the school day. See S. 1059, 98th Cong. (1983); H.R. 5345, 98th Cong. (1983); see also, e.g., 130 Cong. Rec. 20933 (statement of Rep. Frank) ("The original bill would have given the force of law to the right of students to meet during the school day. The bill we have before us now deals with before school and after school. As to during the school day, that is left up to the local schools to do as they wish."). Consistent with this understanding of the bill's evolution, numerous members of Congress made clear in the floor debate that they opposed the earlier version of the bill because it would have reached activities periods during the school day, but that they supported the bill as passed precisely because it did not.2 Other members of Congress who supported both the original and revised language also expressed their definite understanding that the final version, unlike the earlier one, applies only before and after the school day.3 Statements that could be read to the contrary tended to be rather vague on the issue, came few and far between, and were made by members of Congress who either did not support the legislation at all or opposed the revision of the bill to its current version.4 See Edward J. DeBartolo Corp. v. Florida Gulf Coast Bldg. and Constr. Trades Council, 485 U.S. 568, 585, 108 S.Ct. 1392, 99 L.Ed.2d 645 (1988) ("The views of opponents of a bill with respect to its meaning... are not persuasive.... It is the sponsors that we look to when the meaning of the statutory words is in doubt.") In light of the legislative history, we conclude that the Act cannot be read to require the School District to allow the World Changers to meet during student/ staff time. 62 5. Use of school supplies, audio/visual equipment, and school vehicles 63 The School District also argues that allowing Policy 5525 clubs equal access to supplies, audio/visual ("AV") equipment, and school vehicles would result in the unlawful "expenditure of public funds beyond the incidental cost of providing the space for student-initiated meetings" in contravention of § 4071(d)(3) of the Act. Unlike access to the fund-raising activities and the yearbook, use of school supplies, AV equipment, and school vehicles does involve the "expend[iture of] public funds" because School District funds, rather than ASB funds, are used to purchase and maintain the equipment. Accordingly, if funds for this equipment exceed the incidental cost of providing "space" for student-initiated "meetings," it is not authorized under the Act. Again, we look to the plain language of the Act. The term "meeting" is defined to include "those activities of student groups which are permitted under a school's limited open forum and are not directly related to the school curriculum." 20 U.S.C. § 4072(3). We agree that interpreting the term "space" to include access to school supplies, AV equipment, and vehicles, would stretch the term too far. Although basic additional elements, such as chairs, lighting, or desks, may be encompassed in the term, the Act does not compel the school to provide these additional supplies and equipment to Prince. 64 Because we hold that access to ASB funding, the yearbook, the public address system, and the bulletin boards is required by the Act, while the Act does not similarly encompass Prince's request for access to student/staff time, school supplies, vehicles, or AV equipment, we must determine whether the First Amendment requires a different result as to the latter. 65 IV. Individual Access Claims under the First Amendment 66 We reach the constitutional question only as to those access claims not covered by the Act. The Act is not to be construed to authorize the states "to abridge the constitutional rights of any person." 20 U.S.C. § 4071(d)(7). While the Act was an attempt to codify and clarify the Supreme Court's decisions on the First Amendment rights of students, First Amendment jurisprudence has continued to evolve since the Act was passed in 1984. We do not read the Act to designate the outer limits of state compliance with the First Amendment. Therefore, we must consider whether the Bethel School District violates Prince's First Amendment rights by denying the World Changers access to student/staff time, supplies, AV equipment, and school vehicles. We first address whether the school's admittedly discriminatory policy violates Prince's right to free speech and, if so, whether the violation is excused by the Establishment Clause's prohibitions. A. The Free Speech Clause 67 The School District, having offered ASB clubs access to student/staff time, school supplies, AV equipment, and school vehicles to convey their club messages, violated the free speech clause by excluding the Policy 5525 clubs from access to the same benefits. In Widmar, the Supreme Court declared unconstitutional a university's policy of preventing student groups from using school facilities for religious worship or discussion. Widmar, 454 U.S. at 267, 102 S.Ct. 269. The Court held that "[t]hrough its policy of accommodating their meetings, the University has created a forum generally open for use by student groups. Having done so, the University has assumed an obligation to justify its discriminations and exclusions under applicable constitutional norms." Id.; see also Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260, 267, 108 S.Ct. 562, 98 L.Ed.2d 592 (1988) (noting that school facilities may be deemed to be public forums if school authorities have "by policy or by practice" opened those facilities to some segment of the public, including student organizations); cf. Mergens, 496 U.S. at 242, 110 S.Ct. 2356 (noting that Congress's deliberate choice to use and define the term "limited open forum" in the Act meant that it intended to establish a standard different from the "limited public forum" used in free speech cases). By discriminating against students groups based on their desire to use a generally open forum to engage in religious worship and discussion, the university discriminated against them on forms of speech and association protected by the First Amendment. Id. at 269, 110 S.Ct. 2356. "[T]o justify discriminatory exclusion from a public forum based on the religious content of a group's intended speech, the University... must show that its regulation is necessary to serve a compelling state interest and that it is narrowly drawn to achieve that end." Widmar, 454 U.S. at 269-70, 102 S.Ct. 269. 68 As in Widmar, Spanaway Lake High School has created a limited public forum in which student groups are free to meet during student/staff time, as well as to use school vehicles for field trips, to have priority for use of the AV equipment, and to use school supplies such as markers, posterboard, and paper. While certainly not required to grant student clubs access to these benefits, the school has chosen to do so. Having done so, it cannot deny access to some student groups because of their desire to exercise their First Amendment rights without a compelling government interest that is narrowly drawn to achieve that end. Id. at 269, 102 S.Ct. 269; see also Good News Club v. Milford Cent. Sch., 533 U.S. 98, 121 S.Ct. 2093, 2099-2100, 150 L.Ed.2d 151 (2001) (noting that the State's restrictions on speech are subject to stricter scrutiny in traditional or open public forums, than are restrictions in a limited public forum); Davey v. Locke, 299 F.3d 748, 756 (9th Cir.2002) ("Once [the government] opens a neutral `forum' (fiscal or physical), with secular criteria, the benefits may not be denied on account of religion."). 69 Moreover, even if we held that the ASB forum was not an open forum, as the School District argues, the State does not have unlimited power to restrict speech. Widmar, 454 U.S. at 269, 102 S.Ct. 269. Under the more lenient restrictions of a closed forum, the distinctions drawn over access to the forum must continue to be "reasonable in light of the purpose served by the forum" and viewpoint neutral. Cornelius v. NAACP, 473 U.S. 788, 806, 105 S.Ct. 3439, 87 L.Ed.2d 567 (1985). "Discrimination against speech because of its message is presumed to be unconstitutional." Rosenberger, 515 U.S. at 828, 115 S.Ct. 2510. "The government must abstain from regulating speech when the specific motivating ideology or the opinion or perspective of the speaker is the rationale for the restriction." Id. at 829, 115 S.Ct. 2510; see also Lamb's Chapel v. Ctr. Moriches Union Free Sch. Dist., 508 U.S. 384, 392-94, 113 S.Ct. 2141, 124 L.Ed.2d 352 (1993) (finding that it was viewpoint discrimination to prohibit a film exhibit that addressed family values from a religious viewpoint). 70 The School District's restriction on access to facilities is based purely on the World Changer's religious viewpoint in violation of the First Amendment. The purpose of the ASB forum created by the School District is broad, recognizing groups that engage in "any lawful activity which promotes the academic, vocational, personal, or social/civil/cultural growth of students." The World Changers club has a similar purpose: "to teach students leadership and responsibility through the teaching of Jesus Christ and the Bible," "to facilitate the spiritual growth of its student members," and "to support the community of Spanaway through various charity events, volunteer activity, and various other philanthropic activities." Like the church in Lamb's Chapel, the World Changers seeks to address a subject otherwise permitted under this forum, the teaching of personal, social, civil and cultural growth, from a religious standpoint. See Good News, 121 S.Ct. at 2101. That these more secular goals are pursued through a religious perspective or religious means cannot form the basis of excluding them from the ASB forum. See, e.g., id. (holding that denying access to school facilities to Bible club that sought to teach "morals and character" from an evangelical religious perspective was viewpoint discrimination); Rosenberger, 515 U.S. at 831, 115 S.Ct. 2510 (holding that refusing student funds to a newspaper that wrote from a religious perspective was viewpoint discrimination); Lamb's Chapel, 508 U.S. at 393-94, 113 S.Ct. 2141 (1993) (finding that it was viewpoint discrimination to prohibit use of school facilities for a film exhibit that addressed family values from a religious viewpoint). Accordingly, the reasoning invoked by the School District to deny World Changers equal access to student/staff time, school supplies, AV equipment, and school vehicles cannot be sustained under the free speech clause. B. The Establishment Clause 71 The School District argues that it cannot allow Policy 5525 groups access to the same benefits as ASB groups without violating the Establishment Clause. A significant factor in evaluating whether a governmental program violates the Establishment Clause is its neutrality toward religion. Rosenberger, 515 U.S. at 839, 115 S.Ct. 2510; see also Good News, 121 S.Ct. at 2104, 121 S.Ct. 2093 ("Because allowing the Club to speak on school grounds would ensure neutrality, not threaten it, [the school district] faces an uphill battle in arguing that the Establishment Clause compels it to exclude the Good News Club."). Like the Good News Club, the World Changers seek nothing more than to be treated neutrally and given access to speak about the same topics as other groups. Id. There is no question that requiring that the School District grant religious groups access to the ASB forum would ensure neutrality. 72 Our analysis is not altered by the possibility that these funds may be used to subsidize devotional exercises. "It does not violate the Establishment Clause for a public[school] to grant access to its facilities on a religion-neutral basis to a wide spectrum of student groups, including groups that use meeting rooms for sectarian activities, accompanied by some devotional exercises." Rosenberger, 515 U.S. at 842, 115 S.Ct. 2510. "This is so even where the upkeep, maintenance, and repair of the facilities attributed to those uses are paid from a student activities fund to which students are required to contribute." Id. at 842-43, 115 S.Ct. 2510. As in Rosenberger, we are not confronting a case where the government is making direct money payments to an institution or group engaged in religious activity. Id. at 842, 115 S.Ct. 2510. Providing meeting space during student/staff time, school supplies and bus transportation is not a direct payment to the World Changer's coffers, even though it may facilitate the World Changer's own religious speech. "If the expenditure of governmental funds is prohibited whenever those funds pay for a service that is, pursuant to a religion-neutral program, used by a group for sectarian purposes, then Widmar, Mergens, and Lamb's Chapel would have to be overruled." Id. at 843, 115 S.Ct. 2510. "Any benefit to religion is incidental to the government's provision of secular services for secular purposes on a religion-neutral basis." Id. at 843-44, 115 S.Ct. 2510. 73 Our focus on the criteria used to distribute funds that may benefit a religious group differs from those cases in which government programs have provided aid directly to religious schools. Zelman v. Simmons-Harris, ___ U.S. ___, ___, 122 S.Ct. 2460, 2465, 153 L.Ed.2d 604 (2002); Mitchell v. Helms, 530 U.S. 793, 810-14, 120 S.Ct. 2530, 147 L.Ed.2d 660 (2000) (plurality opinion). In cases involving direct aid to parochial schools, there is a risk that the mixture of public funding and religious schools could result in the "impermissible effect of state-sponsored indoctrination" or a "symbolic union between government and religion." Agostini v. Felton, 521 U.S. 203, 223, 117 S.Ct. 1997, 138 L.Ed.2d 391 (1997) (O'Connor, J. opinion). Here, however, "[t]he incidental advancement of a religious mission, or the perceived endorsement of a religious message, is reasonably attributed to the individual recipient, not to the government, whose role ends with the disbursement of benefits." Zelman, ___ U.S. at ___, 122 S.Ct. at 2467. The School District distributes funds to dozens of student groups to facilitate their speech and club activities. "[I]f numerous private choices, rather than a single choice of government, determine the distribution of aid, pursuant to neutral eligibility criteria, then a government cannot, or at least cannot easily, grant special favors that might lead to a religious establishment." Mitchell, 530 U.S. at 810, 120 S.Ct. 2530 (cited with approval in Zelman, ___ U.S. at ___, 122 S.Ct. at 2467). There is no risk of government indoctrination of students if student/staff time, school supplies and transportation are provided to all student groups, no matter how vociferously the World Changers make their point. In light of the numerous and diverse student clubs on the school's campus, the School District cannot easily grant special favors that might lead to a religious establishment. Widmar, 454 at 277, 102 S.Ct. 269. "It is precisely for these reasons that we have never found a program of true private choice to offend the Establishment Clause." Zelman, ___ U.S. at ___, 122 S.Ct. at 2467. 74 As the School District admits: (1) the ASB fund was comprised entirely of student fees; (2) like the newspaper at issue in Rosenberger, World Changers is a student organization and thus the School District would not be "paying the bills of a church or similar organization"; (3) there is no indication that World Changers intends to conduct "religious services," and indeed its stated purpose suggests otherwise; and (4) no funds are paid directly to the student organization, but rather are paid to outside vendors. Under the logic of Supreme Court precedent, the expenditure of governmental funds cannot be prohibited whenever those funds pay for a service that is, pursuant to a religion-neutral program, used by a group for sectarian purposes. Rosenberger, 515 U.S. at 843, 115 S.Ct. 2510 (noting that "[i]f a religious student organization obtained access on [a] religion-neutral basis and used a computer to compose or a printer or copy machine to print speech with a religious content or viewpoint, the States's action in providing the group with access would no more violate the Establishment Clause than would giving those groups access to an assembly hall"). 75 That the provision of school supplies and school vehicles in this case involves public, rather than ASB, funds does not change our consideration. In Mitchell v. Helms, 530 U.S. 793, 120 S.Ct. 2530, 147 L.Ed.2d 660 (2000), the Supreme Court upheld against an Establishment Clause challenge a Louisiana program that provided "library books, computers, and computer software, and also slide and movie projectors, overhead projectors, television sets, tape recorders, VCR's, projection screens, laboratory equipment, maps, globes, filmstrips, slides, and cassette recordings" to parochial schools. Id. at 803, 120 S.Ct. 2530. The Court found that it was permissible for the government to provide such benefits to religious schools so long as the aid was offered on a neutral basis and was secular in content. Id. at 835-36, 120 S.Ct. 2530. There is no question that the provision of school supplies, even when purchased with School District funds, would be offered on a neutral basis to school clubs and is secular in content. For the same reason, providing school vehicles for field trips would not result in the direct funding of religious organizations. As in Rosenberger, it would simply require providing equal access to a "service" that happens to be paid for by public funds. Moreover, there is no doubt that religious Policy 5525 groups would receive access to publicly owned vehicles as part of a neutral program. 76 Second, we must consider whether the high school community would feel coercive pressure to engage in the Club's activities. Mergens, 496 U.S. at 251, 110 S.Ct. 2356. In Mergens, the Supreme Court specifically rejected the contention that high school students would perceive equal access for religious groups as endorsement of religion. The Court explained: 77 [T]here is a crucial difference between government speech endorsing religion, which the Establishment Clause forbids, and private speech endorsing religion, which the Free Speech and Free Exercise Clauses protect. We think that secondary school students are mature enough and are likely to understand that a school does not endorse or support student speech that it merely permits on a nondiscriminatory basis. 78 Id. at 250, 110 S.Ct. 2356. Moreover, the Court explained, the school's fear of a "mistaken inference of endorsement is largely self-imposed, because the school itself has control over any impressions it gives its students." Id. at 251, 110 S.Ct. 2356. As in Mergens, the School District here can dispel any "mistaken inference of endorsement" by making it clear to students that a club's private speech is not the speech of the school. There is no indication in this case, at least as to inclusion in the ASB forum, that requiring access to religious groups would endorse religion any more than in Mergens. 79 Accordingly, we hold that the First Amendment requires that the School District grant the World Changers equal access to the school yearbook, audio/visual equipment, school supplies, and school vehicles. V. Conclusion 80 Because the School District has violated Prince's rights under the Act and the Free Speech Clause of the First Amendment, the judgment of the district court is REVERSED and REMANDED for proceedings consistent with this opinion. 81 REVERSED and REMANDED. Notes: 1 Senate Report 98-357 was written by the Senate Committee on the Judiciary to accompany the committee's favorable recommendation to the Senate of Senate Bill 1059, a proposed Equal Access ActSee S.Rep. No. 98-357, at 1. Although Senate Bill 1059 was not the bill that ultimately became the Equal Access Act, much of the Act was derived from Senate Bill 1059, and the Senate report accompanying that bill is relevant to our analysis. See id.; see also Timothy M. Gibbons, Note, The Equal Access Act and Mergens: Balancing the Religion Clauses in Public Schools, 24 Ga. L.Rev. 1141, 1161-64 (1990). 2 See, e.g., 130 Cong. Rec. at 20933 (statement of Rep. Frank) ("I opposed the last version of the equal access bill, I spoke against it, and I voted against it. I intend to vote in favor of [the Act as passed]. The bill as it initially came before us had some flaws. Those flaws that bothered me have been corrected.... The original bill would have given the force of law to the right of students to meet during the school day. The bill we have before us now deals with before school and after school."); id. at 20938 (statement of Rep. Ratchford) ("[A]s someone who opposed the earlier version of this bill, I stand here today and say that what we now are offered deserves our support. This bill is distinguished dramatically from the legislation which we were earlier called upon to consider earlier this year. First of all, it limits activities to before and after school hours, and we do not get into the very gray question of what is noninstructional time."); id. at 20946-47 (colloquy between Reps. Smith and Perkins) (Rep. Smith: "I am one of those who voted against the original bill, but as I understand it almost every objection has been met in this bill that most of us had to the original bill.... The school will have complete control during school hours over their meetings and it is only after school hours they can either deny a group the right to meet, but, if they deny or grant a right to meet to any group of students they must treat all the same, is that right?" Rep. Perkins: "That is correct."); id. (statement of Rep. Slattery) ("I rise in support of the equal access legislation we are considering today.... I could not support the earlier version of the Equal Access Act because I felt that its provision contained tremendous potential for abuse. That bill did not require that student-initiated religious meetings be held before or after the schoolday. I believe that the Senate debate on this amendment makes it clear that religious meetings cannot take place side by side with other school activities where attendance would be compulsory."); id. at 20948 (statement of Rep. Synar) ("I am glad to have the opportunity today to support a true equal access bill — one that ... assures that religious meetings are student led and only occur before and after school hours."); id. at 20949 (statement of Rep. Schneider) ("[M]y original reservations have been met, and I will now be able to support the bill.... [S]tudent-initiated meetings can now take place only before or after school hours...."). 3 See, e.g., 130 Cong. Rec. at 20943 (statement of Rep. Smith of Nebraska) ("I supported Mr. Bonker's equal access bill when it was considered by this House on May 15 [H.R. 5345], and I rise in even stronger support of the improved equal access provisions we have before us today .... This improved equal access language .... applies only to groups meeting before or after school."); id. at 20948 (statement of Rep. Hall) ("It says that voluntary groups can meet in classrooms during off-hours."); id. at 19235-36 (statement of Sen. Levin) ("[I]f students voluntarily, outside of school hours, want to have a religious meeting ... they are allowed to do so .... The pending amendment will allow students equal access to secondary schools student-initiated religious meetings before and after school where the school generally allows groups of secondary school students to meet during those times."). 4 See, e.g., 130 Cong. Rec. 20938 (statement of Rep. Kastenmeier, an opponent of the bill) ("I am pleased to see that the equal access proposal before us today is a significant improvement... however, I believe that several important problems are still outstanding.... Also unclear in [sic] the matter of when the activities authorized by the legislation may take place. In both the House and Senate, colloquy has suggested that these activities are not to take place during the school day, but before and after school only. Again, this meaning may be clear to some legislators, but not to the thousands of school administrators who will be trying to interpret the law and to others who may mean to challenge it."); id. at 20942 (statement of Rep. Oakar, an opponent of the bill) ("Supporters of this legislation state that the revised version of the bill will provide access to school facilities before and after school. The legislation permits use of school buildings during noninstructional hours which I interpret to mean nonclass periods. This does not limit these religious meetings to before and after school but to periods when actual instruction is not taking place.... I urge my colleages [sic] to vote `no' on this legislation."); id. at 19237 (statement of Sen. Denton, original sponsor of S. 1059) ("My interpretation would be that, if the school allows noninstructional periods before or after actual `classroom instruction' — which is the term used — sometime during the day, then the school cannot discriminate against student-initiated groups who wish to meet voluntarily at that time; for example, during lunch periods, open activity periods, and in schools with staggered schedules where students are free to meet. I am willing to let that be subject to interpretation in the future.... It was this written perfecting amendment which I accept."); id. at 19241 (statement of Sen. Cranston, an opponent of the bill) ("What this amendment does, however, that I find objectionable, is to compel school districts to allow religious activity during the school day."). HALL, Circuit Judge, concurring: 82 I join the court's opinion in its entirety and write separately merely to respond to the dissent's argument that the Establishment Clause bars equal treatment of the World Changers and ASB clubs during student/staff time. 83 First, although the dissent sees no reason why Illinois ex rel. McCollum v. Bd. of Educ. of Sch. Dist. No. 71, Champaign County, 333 U.S. 203, 68 S.Ct. 461, 92 L.Ed. 649 (1948) does not control the question, the reason follows directly from first principles. "We must in each case inquire first into the purpose and object of the governmental action in question." Rosenberger v. Rector and Visitors of the Univ. of Virginia, 515 U.S. 819, 838-39, 115 S.Ct. 2510, 132 L.Ed.2d 700 (1995); see also Mitchell v. Helms, 530 U.S. 793, 807, 120 S.Ct. 2530, 147 L.Ed.2d 660 (2000). "A central lesson of our decisions is that a significant factor in upholding governmental programs in the face of Establishment Clause attack is their neutrality towards religion." Rosenberger, 515 U.S. at 839, 115 S.Ct. 2510. 84 In McCollum, the purpose and object of the school was to promote religion, not to administer a student speech forum. 333 U.S. at 210, 68 S.Ct. 461. The school in question was opened up to religious teachers once a week so that they could come and conduct classes offering religious instruction. Id. at 205, 68 S.Ct. 461. To facilitate this program, the school disseminated printed cards to parents for use in granting permission to attend the classes. Id. at 207 n. 2, 68 S.Ct. 461. Although students who did not choose to take religious instruction were allowed to go to some other school room to pursue their secular studies, id. at 209, 68 S.Ct. 461, regular classes were not offered at the time, and only religious teachers from outside the school were permitted to enter in order to teach. Id. at 208 n. 3, 68 S.Ct. 461. Based on these facts, the Supreme Court held, "[t]his is beyond all question a utilization of the tax-established and tax-supported public school system to aid religious groups to spread their faith." Id. at 210, 68 S.Ct. 461. 85 McCollum does not stand for anything near so broad a principle as that "the Establishment Clause forbids student religious activities in the public school building during periods when students are compelled by law to attend school in that building." Dissent at p. 1099. Nor do any of the other cases cited by the dissent focus on fact patterns in which students are merely permitted to attend club meetings during school hours. Rather, they focus on situations in which students were coerced by mandatory attendance policies or other official pressures to be exposed to religious instruction or exercises. See Lee v. Weisman, 505 U.S. 577, 581, 586, 112 S.Ct. 2649, 120 L.Ed.2d 467 (1992) (prayer at graduation ceremony for which attendance was "in a fair and real sense obligatory"); Edwards v. Aguillard, 482 U.S. 578, 581, 586-88, 107 S.Ct. 2573, 96 L.Ed.2d 510 (1987) (statute requiring teaching creationism whenever evolution is taught); School Dist. of Abington Township v. Schempp, 374 U.S. 203, 205, 83 S.Ct. 1560, 10 L.Ed.2d 844 (1963) (law requiring school day to begin with recitations from the Bible). Like McCollum itself, these cases support the more modest proposition that schools may not administer programs during the school day that are for the purpose of advancing religion. Thus, the fact that the Supreme Court has not elaborated a doctrine to underpin the dissent's argument that any religious activities must be banned from school grounds during the school day is not surprising — it has never adopted such a position. 86 Moreover, although we must be highly sensitive to the particular facts of each case where there is a potential conflict between free speech and the Establishment Clause, see Rosenberger, 515 U.S. at 847, 115 S.Ct. 2510 (O'Connor, J., concurring), the essential substance of the dissent's endorsement argument — that the school would create the perception of endorsement by granting religious clubs permission to use school facilities to meet during student/staff time while denying use of those facilities for other activities such as "hanging out" or playing base-ball — has been repeatedly rejected by the Supreme Court. See Good News Club v. Milford Central School, 533 U.S. 98, 118-19, 121 S.Ct. 2093, 150 L.Ed.2d 151 (2001); Rosenberger, 515 U.S. at 841-42, 850-51, 115 S.Ct. 2510 (opinion of Kennedy, J., for the Court and O'Connor, J., concurring); Bd. of Educ. of Westside Comm. Schools v. Mergens, 496 U.S. 226, 249-51, 110 S.Ct. 2356, 110 L.Ed.2d 191 (1990). In Good News, Rosenberger, and Mergens, the school at issue created a limited speech forum and restricted access to those groups whose activities were consistent with the purposes of the forum. Good News, 533 U.S. at 102, 108, 121 S.Ct. 2093; Rosenberger, 515 U.S. at 823-34, 115 S.Ct. 2510; Mergens, 496 U.S. at 231-32, 110 S.Ct. 2356. In each, the Court held that the school at issue must give equal access to that forum to groups speaking on included subjects from a religious viewpoint. Good News, 533 U.S. at 120, 121 S.Ct. 2093; Rosenberger, 515 U.S. at 845-46, 115 S.Ct. 2510; Mergens, 496 U.S. at 247-48, 110 S.Ct. 2356. The pertinent issue for Establishment Clause purposes was not the privileged position that such groups had compared to those which were excluded as incompatible with the purposes of the forum, but rather their treatment compared to other groups who were included. See Good News, 533 U.S. at 114, 121 S.Ct. 2093; Rosenberger, 515 U.S. at 841-42, 115 S.Ct. 2510; Mergens, 496 U.S. at 252, 110 S.Ct. 2356. And the reason for this is simple: when a speech forum with constitutionally permissible restrictions based on the speaker's identity or the content of speech is established, it is not endorsement to treat like groups with respect to those criteria equally and unlike groups differently. 87 As the dissent emphasizes, the use of school facilities to meet during student/staff time involves an additional factual element in that student/staff time occurs during part of the day in which attendance at school is mandatory. But while this fact tinges the distinction between those activities that are compatible with the ASB forum from those that are not with the patina of official compulsion, it does not establish endorsement of religion or necessarily create the perception of such endorsement. There is no reason to believe that the school would have to administer a rule allowing all ASB and Policy 5525 clubs to meet during student/staff time on anything other than an equal basis. Nor is such equal treatment in this context any more likely to be seen as somehow unequal than in any other. See Mergens, 496 U.S. at 250, 110 S.Ct. 2356. At most, permission to meet during student/staff time merely shows the strength with which Spanaway Lake High School and the Bethel School District endorse activities which promote academic, vocational, personal, or social/civil/cultural growth of students, not that it endorses religion. Finally, as to the dissent's "entanglement" argument, the Establishment Clause does not prohibit all entanglements; only excessive ones that demonstrate that a government program has the impermissible effect of advancing religion. See Agostini v. Felton, 521 U.S. 203, 232-234, 117 S.Ct. 1997, 138 L.Ed.2d 391 (1997). In this context, it is simply not true that teachers will be placed in the untenable position of requiring religious worship, indoctrination, or even discussions. During student/staff time the World Changers would presumably be allowed to discuss any club-related issue regardless of its religious content. In the unlikely event that members of the World Changers or a similar club decide to engage in impermissible activities such as playing hand-held video games during student/staff time, a teacher can simply direct them to stop doing so or return to their home room for normal activities such as homework and individualized instruction. While teachers admittedly do take on more than a merely custodial role during student/staff time, their required role in monitoring groups permitted to meet during that time is at most to limit speech activities to those that are consistent with the speech forum that the school has provided, not specifically to require religious speech. Nor must we presume that the teachers' exposure to a sectarian group will induce them to participate in inculcating religion. Id. at 234, 117 S.Ct. 1997. 88 Thus, there is simply no reason to distinguish this context from others in considering the primary effect of granting the World Changers and other like groups equal access to the ASB forum. In this case, as in prior ones, the broad spectrum of officially recognized student clubs and the fact that students are free to organize more such clubs counteract any message of official endorsement. See Mergens, 496 U.S. at 252, 110 S.Ct. 2356; Rosenberger, 515 U.S. at 850, 115 S.Ct. 2510 (O'Connor, J., concurring). Here, as in other contexts, "petitioners' fear of a mistaken inference of endorsement is largely self-imposed, because the school itself has control over any impressions it gives its students." Mergens, 496 U.S. at 251, 110 S.Ct. 2356. Without more, a school does not violate the Establishment Clause by granting permission for groups to meet during the school day on a religious-neutral basis. 89 BERZON, Judge, concurring in part and dissenting in part: 90 I join the court's opinion with the exception of Part IV(B). I do not join Part IV(B) for two reasons: First, requiring the Spanaway Lake High School ("the High School") to permit religious activity1 during student/staff time ("SS Time") violates the Establishment Clause. SS Time is a period integral to the school day at which attendance is mandatory. The distinction between activities that occur during mandatory attendance periods and those that take place during time periods when attendance is voluntary is a critical one. 91 Second, I cannot agree with Part IV(B) of the majority's opinion to the extent that it holds that the Establishment Clause permits the provision for religious purposes of school vehicles, school supplies, and school audio and visual equipment, all paid for by public funds. In so holding, the majority goes beyond Mitchell v. Helms, 530 U.S. 793, 120 S.Ct. 2530, 147 L.Ed.2d 660 (2000), by sanctioning governmental use of tax funded supplies and services for religious activities in public schools. I. STUDENT STAFF TIME 92 The period that Spanaway Lake High School sets aside for SS Time cannot fairly be characterized as anything but an integral part of the instructional school day. The SS Time period falls right in the middle of the student's daily schedule every Tuesday and Friday, as a regular class period from 10:10 a.m. to 10:40 a.m. Attendance at SS Time is mandatory, not voluntary. Students can receive an "F" grade for not attending, and must engage in "school-related" activities, such as school-affiliated club meetings, school assemblies, career surveys, work on homework, or one-on-one instruction from teachers. To the young people at Spanaway Lake High School, SS Time may be a brief respite from mathematics, chemistry, and Spanish, but it is still school, not free time. 93 The majority concludes, correctly, that Congress in devising the Equal Access Act saw a fundamental difference between periods of time when school attendance is mandatory and periods when it is not, requiring equal access only during the latter. Congress' decision to exclude from the Act's coverage class periods such as SS Time that form an integral part of the school day mirrors Establishment Clause jurisprudence. A long line of Supreme Court cases recognizes a heightened risk of unconstitutional entanglement and actual or perceived endorsement when public schools' mandatory attendance laws and religious instruction intertwine in public school classrooms. 94 In 1948, the Supreme Court in Illinois ex rel. McCollum v. Bd. of Educ. of Sch. Dist. No. 71, Champaign County, 333 U.S. 203, 68 S.Ct. 461, 92 L.Ed. 649 (1948), held unconstitutional under the Establishment Clause a public school program in which students were released from class to attend religious classes taught in the regular classrooms of the public school by non-public school teachers who volunteered at no cost to the school. The Court explained the school's system this way: 95 Students who did not choose to take the religious instruction were not released from public school duties; they were required to leave their classrooms and go to some other place in the school building for pursuit of their secular studies. On the other hand, students who were released from secular study for the religious instructions were required to be present at the religious classes. Reports of their presence or absence were to be made to their secular teachers. 96 Id. at 209, 68 S.Ct. 461. Thus, as in this case, the school in McCollum did not require any student to attend religious classes, but instead gave students the option of doing so in lieu of attending nonreligious activities. 97 The Court in McCollum nonetheless focused on the school's mandatory attendance policy in finding an Establishment Clause violation: 98 Pupils compelled by law to go to school for secular education are released in part from their legal duty upon the condition that they attend the religious classes. This is beyond all question a utilization of the tax-established and tax-supported public school system to aid religious groups to spread their faith. 99 Id. at 209-210, 68 S.Ct. 461. And, further: 100 Here not only are the State's tax supported public school buildings used for the dissemination of religious doctrines. The State also affords sectarian groups an invaluable aid in that it helps to provide pupils for their religious classes through use of the State's compulsory public school machinery. This is not separation of Church and State. 101 Id. at 212, 68 S.Ct. 461. 102 I see no reason why McCollum does not control the question whether the Spanaway Lake High School may absolve students from engaging in one or another of the secular activities that they must otherwise engage in during SS Time to participate on public school premises in a religious meeting of the World Changers. Much time has passed since McCollum, it is true. But despite the well-noted vagaries of the Supreme Court's Establishment Clause jurisprudence, see Jesse H. Choper, A Century of Religious Freedom, 88 Cal. L.Rev. 1709, 1741 (2000), the Court has never departed from the premise that the Establishment Clause forbids student religious activities in the public school building during periods when students are compelled by law to attend school in that building. 103 For example, the Court recently held, in Good News Club v. Milford Cent. Sch., 533 U.S. 98, 121 S.Ct. 2093, 150 L.Ed.2d 151 (2001), that the Establishment Clause did not preclude a school from allowing a religious group to meet in a classroom after the school day. In so holding, the Court distinguished McCollum precisely on the ground that the Good News Club's "activities take place after the time when the children are compelled by state law to be at the school." Id. at 116 n. 6, 68 S.Ct. 461 (emphasis in original); see also id. at 115-16, 68 S.Ct. 461 (distinguishing Lee v. Weisman, 505 U.S. 577, 112 S.Ct. 2649, 120 L.Ed.2d 467 (1992), because in Lee the Court "concluded that attendance at the graduation exercise was obligatory," and explaining that in Good News, "where the school facilities are being used for a nonschool function and there is no government sponsorship of the Club's activities, Lee is inapposite."); id. at 117, 112 S.Ct. 2649 (distinguishing Edwards v. Aguillard, 482 U.S. 578, 107 S.Ct. 2573, 96 L.Ed.2d 510 (1987), on the ground that "Edwards involved the content of the curriculum taught by state teachers during the schoolday to children required to attend.") (first emphasis in original); cf. id. at 117 n. 7, 107 S.Ct. 2573 (School Dist. of Abington Township v. Schempp, 374 U.S. 203, 83 S.Ct. 1560, 10 L.Ed.2d 844 (1963), "is inapposite because this case does not involve activity by the school during the schoolday."). Compare Zorach v. Clauson, 343 U.S. 306, 311 n. 6, 72 S.Ct. 679, 96 L.Ed. 954 (1952) (upholding release time program where religious classes were not held on school property and there was no "indication that the public schools enforce[d] attendance at religious schools by punishing absentees from the released time programs for truancy"). 104 Not surprisingly, this concern with religious instruction as part of the mandatory school day came up the first time the Supreme Court considered the Equal Access Act. Critically, in holding that the Act does not on its face violate the Establishment Clause, the Supreme Court in Bd. of Educ. of Westside Cmty. Schs. v. Mergens, 496 U.S. 226, 251, 110 S.Ct. 2356, 110 L.Ed.2d 191 (1990), expressly relied on the fact that because the Act applies only to "noninstructional time" it "avoids the problems of ... mandatory attendance requirements." Id. (opinion of O'Connor, J.) (citing Edwards, 482 U.S. at 584, 107 S.Ct. 2573; also citing McCollum, 333 U.S. at 209-10, 68 S.Ct. 461, for the proposition that: "release time program invalid where students were `released in part from their legal duty to attend school upon the condition that they attend the religious classes'"); see also id. at 261, 110 S.Ct. 2356 (Kennedy, J., concurring) (finding no Establishment Clause violation in part because "the meetings take place while school is not in session.").2 105 Ceniceros v. Bd. of Trustees of the San Diego Unified Sch. Dist., 106 F.3d 878, 880 (9th Cir.1997) is fully consistent with this line of Supreme Court cases. Ceniceros held that a public school's lunchtime qualified as noninstructional time under the Equal Access Act. In so holding, the court described the factual context this way: 106 At [the school], classroom instruction begins at 7:25 a.m. and ends at 11:30 a.m.; it resumes at 12:15 p.m. and continues until 2:10 p.m. The parties specifically stipulated that no classroom instruction occurs during the school's lunch hour. In fact, students are not even required to remain on campus during this time. 107 Id. (emphasis added). Ceniceros further pointed to the Establishment Clause concerns discussed in Mergens: 108 The only timing issue with which the Court concerned itself in Mergens is the Act's restriction of meetings to "noninstructional time." The Court found this limitation significant because it avoids the problems of mandatory attendance requirements, which the Court had previously struck down. Since the lunchtime meetings proposed by Ceniceros would resemble in every significant respect the[after school] meetings approved by the Court in Mergens, permitting Ceniceros' group to meet during lunchtime would not violate the Establishment Clause. 109 Ceniceros, 106 F.3d at 882 (citations omitted) (emphasis added). The majority does not cite any case in this court or any other appellate court holding religious activity on school premises during a period when attendance is mandatory permissible under the Establishment Clause, and I am not aware of any such case.3 110 Although neither the Supreme Court nor this court has had an opportunity to explain in doctrinal terms why religious activities during periods when school attendance is required, recorded, and graded violates the First Amendment, recent Establishment Clause jurisprudence suggests two compelling reasons: 111 First, ensconcing a religious meeting in a public school classroom during the school day will be seen as — and will actually be — an endorsement of religion. See Santa Fe Indep. Sch. Dist. v. Doe, 530 U.S. 290, 307-08, 120 S.Ct. 2266, 147 L.Ed.2d 295 (2000); Rosenberger v. Rector and Visitors of Univ. of Virginia, 515 U.S. 819, 841-42, 115 S.Ct. 2510, 132 L.Ed.2d 700 (1995). As the School's Vice Principal reported, SS Time is a time for students to "do school-related sorts of things." Students who must choose from one of a set of school-related activities during a mid-school-day period are only in a limited sense "voluntarily" attending the World Changers meeting. They do not have the option to go home and "hang out" with friends, play baseball, practice piano, skateboard around the neighborhood, or do a wide range of other activities that children engage in during truly free time. Instead, they are required to attend one of the activities the School District has chosen to allow them to attend during a certain time period, because the School District has determined that the activities have some school-related value. The likely perception that the School District is "endorsing" the activities that students are permitted to engage in during the mandatory school day is an accurate one. 112 Second, the mandatory attendance factor dictates entanglement of school employees in religious activity. See Mitchell, 530 U.S. at 845, 120 S.Ct. 2530 (O'Connor, J., concurring); Mergens, 496 U.S. at 252-53, 110 S.Ct. 2356 (opinion of O'Connor, J.). According to the Vice Principal, SS Time "is considered a scheduled class and it's on the student's schedule as such ... and ... roll is taken." Teacher involvement necessarily becomes more than custodial when the teacher is supervising a scheduled class. 113 If, for example, the World Changers met during SS Time, but instead of engaging in activities pertaining to the club such as prayer and religious singing chose to spend the time discussing non-club related issues — movies or sports, for instance — the students would not be participating in the "school-related" activities for which the School District designed SS Time and mandates attendance. Presumably, to fulfill the purposes of SS Time the assigned teacher would be required to redirect the discussion to the religious purpose of the meeting. After school, in contrast, the teacher-supervisor's concerns would relate not to the content of the meeting but only to safety, decorum, and other "custodial" matters. 114 To avoid precisely such impermissible endorsement and entanglement, Congress chose to extend the reach of the Act only to the limited open forum created by public schools before and after actual classroom instruction takes place, not to instructional periods during the school day. The majority so recognizes, but then concludes that the free speech provisions require otherwise and that there is in fact no Establishment Clause violation created. Because the majority holds that religious activity at a public school site during a regularly scheduled class period, when students are required to be on the premises, does not violate the Establishment Clause, I respectfully dissent. 115 II. SUPPLIES, VEHICLES, & AUDIO /VISUAL EQUIPMENT 116 The majority holds that Spanaway Lake High School must provide the World Changers religious club access to the School District's supplies (e.g., markers, paper), vehicles, and audio and visual equipment, utilizing the same standards as apply to non-religious student groups' access to such supplies and services. I disagree. The Establishment Clause prohibits the School District from giving or lending to the World Changers for direct use in religious activities supplies and services paid for by public tax funds. This crucial prohibition on the use of public tax funds for supplies to be used for religious purposes is set forth in Justice O'Connor's concurring — and controlling — opinion in Mitchell, 530 U.S. at 836, 120 S.Ct. 2530, which the majority here does not address.4 117 The Mitchell Court upheld against an Establishment Clause challenge a program under which the federal government distributes funds to state and local agencies, which in turn use those funds to provide public and private schools, including religious schools, with educational materials and equipment similar to those at issue here. A majority of the Court in Mitchell reaffirmed that neutrality, although an important consideration in an Establishment Clause analysis, does not alone permit the conclusion that public aid used for religious purposes is constitutional. Id. at 840, 120 S.Ct. 2530 (O'Connor, J., concurring); id. at 883-84, 120 S.Ct. 2530 (Souter, J., dissenting). Rather, Mitchell turned upon the consideration that the public aid at issue in that case supported secular functions of religious schools, not avowedly religious classes or services. 118 Of critical importance here, Justice O'Connor "disagree[d] with the plurality's conclusion that actual diversion of government aid to religious indoctrination is consistent with the Establishment Clause." Id. at 840, 120 S.Ct. 2530 (O'Connor, J., concurring); see also id. (O'Connor, J., concurring) ("[A]ctual diversion is constitutionally impermissible."); id. at 857, 120 S.Ct. 2530 (O'Connor, J., concurring) ("To establish a First Amendment violation, plaintiffs must prove that the aid in question actually is, or has been, used for religious purposes."). Justice O'Connor relied upon the following "constitutionally sufficient" statutory and agency safeguards that, among others, prevented diversion of public aid to religious purposes: the aid included only secular materials and equipment; use of the aid for "religious worship or instruction" was prohibited; non-public schools signed assurances that the aid would be used only for secular purposes; and agencies conducted monitoring to detect impermissible uses. Id. at 861-63, 120 S.Ct. 2530 (O'Connor, J., concurring). 119 Without addressing the import for this case of Justice's O'Connor's opinion in Mitchell, the majority here, relying largely on the Court's decision in Rosenberger, 515 U.S. 819, 115 S.Ct. 2510, 132 L.Ed.2d 700, allows actual diversion for religious purposes of the School District's supplies, AV equipment, and vehicles. The cost of purchasing and maintaining the School District's supplies and services, however, comes not from the ASB student fund, but from the School District's general, tax-derived public funding. For this reason, Rosenberger, 515 U.S. 819, 115 S.Ct. 2510, 132 L.Ed.2d 700, is inapposite. See id. at 841, 115 S.Ct. 2510 ("[T]he $14 paid each semester by the students is not a general tax designed to raise revenue for the University.... Our decision, then, cannot be read as addressing an expenditure from a general tax fund."); id. at 847, 851-52, 115 S.Ct. 2510 (O'Connor, J., concurring) ("Our cases have permitted some government funding of secular functions performed by sectarian organizations.... These decisions, however, provide no precedent for the use of public funds to finance religious activities.... The Student Activities Fund... represents not government resources, whether derived from tax revenue, sales of assets, or otherwise, but a fund that simply belongs to the students.").5 120 The majority also attempts to characterize the School District's policy of giving or lending supplies, AV equipment, and transportation to student groups as one of "private choice," in order to bring this case within the Supreme Court's recent decision in Zelman v. Simmons-Harris, ___ U.S. ___, 122 S.Ct. 2460, 153 L.Ed.2d 604 (2002), upholding an educational program that provides tuition aid "vouchers" for students to use to pay to attend public or private, including religious, schools. See id., slip op. at 10-14 (discussing the importance of the fact that the voucher program involves individual private choice, rather than government distribution of financial aid to religious organizations). This is not, however, a "private choice" case. The School District, not private choice, decides whether a student club will receive access to the School's supplies, AV equipment, and transportation for field trips. 121 Although the distribution of the type of supplies and services at issue would not perhaps as readily lend itself to a private choice program as does the payment of tuition aid, a private choice program could operate to distribute the School's supplies and services for purposes of extracurricular activities. For instance, the School District could provide each student with a certain number of markers and sheets of construction paper for that student to use for any student group activity in which the student chose to participate. Or the school could provide each student with a $10 "voucher" to go toward the expenses of a field trip selected by the student. 122 No such private choices, however, are made by individual students at Spanaway Lake High School. The distribution of supplies and services to the various student groups instead resembles the distribution of similar supplies and services to the various schools in Mitchell, which Justice O'Connor made clear did not qualify as a private choice program. See 530 U.S. at 841, 120 S.Ct. 2530 (O'Connor, J., concurring); see also id. at 842-43, 120 S.Ct. 2530 (O'Connor, J., concurring) (rejecting the notion that a per capita endorsement program equates with a private choice program for Establishment Clause analysis). 123 Finally, were it sufficient for Establishment Clause purposes that "[p]roviding... school supplies and bus transportation is not a direct payment to the World Changer's coffers," as the majority asserts, see ante at 1092, Justice O'Connor would have had little reason to write her separate opinion in Mitchell. The supplies lent by the government to the religious schools in that case likewise did not constitute a "direct payment" to a religious organization's "coffers." 124 As I see it, Mitchell controls, and under Mitchell, the School District must allow the World Changers equal access to the School District's supplies and services for non-religious uses but must, as did the aid program in Mitchell, also prevent the club from using the supplies and services for religious purposes, including "religious worship or instruction." 530 U.S. at 861, 120 S.Ct. 2530 (O'Connor, J., concurring). For instance, the World Changers should have access (assuming other noncurricular groups do) to School District supplies to announce meetings or for other secular purposes, but using School District supplies to create a proselytizing poster cannot be permitted. Likewise, the School District could transport the World Changers in a School District vehicle to a homeless shelter for the students to perform community service work, but not to a church meeting or service. 125 The School District should, I believe, have the first opportunity to decide what safeguards it will employ to ensure that publicly-funded supplies and services are not put to religious uses. Mitchell requires, at a minimum, however, that the supplies and services consist only of secular services, materials, and equipment, and that the School District establish a policy limiting the use of its tax-funded property and services to only secular purposes. Id. at 861-62, 120 S.Ct. 2530 (O'Connor, J., concurring). 126 The majority opinion does not acknowledge the necessity of such limitations under the Establishment Clause jurisprudence as clarified in Mitchell. I therefore respectfully dissent. Notes: 1 It is quite clear that the World Changers club does engage in religious observance. The club's constitution sets forth the following goals: 1) Encourage Christian leadership in students at SLHS; 2) Evangelize our campus for Jesus Christ; 3) Through love, praise, and prayer, bring hope to the students of SLHS; 4) Provide uplifting messages to bring enjoyment to everyday life; 5) Through songs, dance, drama, and comedy teach students that Jesus Christ is the Answer to the confusion, pain, and uncertainty this world offers. The club's constitution further requires that the club's president "open and close each meeting with prayer .... [and] oversee the spiritual direction and oversight of the World Leaders Club and the spiritual content of the regular weekly meetings." The constitution also provides for a "Worship Leader" officer who must "select the praise and worship songs and lead the World Leaders Club ... in prayer and worship...." 2 The section of Justice O'Connor's opinion inMergens discussing the Establishment Clause issue commanded only four votes, but because it relied on narrower grounds than did Justice Kennedy's opinion for two Justices, which reached the same result, Justice O'Connor's opinion controls. See Smith v. Univ. of Washington, Law Sch., 233 F.3d 1188, 1199 (9th Cir.2000) ("When a fragmented Court decides a case and no single rationale explaining the result enjoys the assent of five Justices, the holding of the Court may be viewed as that position taken by those Members who concurred in the judgments on the narrowest grounds.") (quoting Marks v. United States, 430 U.S. 188, 193, 97 S.Ct. 990, 51 L.Ed.2d 260 (1977)). 3 As far as I have been able to determine, there has been exactly one published decision adopting a view similar to that of the majority with regard to religious activities during the mandatory public school day on public school premisesBender v. Williamsport Area Sch. Dist., 563 F.Supp. 697 (M.D.Pa.1983). Bender was reversed by the Third Circuit, for reasons similar to those expressed in this dissent, but the Supreme Court vacated the Third Circuit's decision with instructions to dismiss the appeal because the appellant lacked standing to bring it. Bender v. Williamsport Area Sch. Dist., 741 F.2d 538 (3d Cir.1984), vacated 475 U.S. 534, 106 S.Ct. 1326, 89 L.Ed.2d 501 (1986). 4 Justice O'Connor's concurring opinion inMitchell controls the outcome of any case that, as here, turns on a distinction between her opinion and the plurality opinion in that case. No opinion in Mitchell commanded a majority vote. Justice O'Connor's concurring opinion rested on narrower grounds than did the plurality's opinion, and is therefore the governing precedent. See Smith, 233 F.3d at 1199 (quoting Marks, 430 U.S. at 193, 97 S.Ct. 990). 5 Justice O'Connor's concurring opinion inRosenberger is of particular importance because her vote was necessary to the majority and she joined the opinion of the majority "[s]ubject to these comments" in her separate opinion, which relied on narrower grounds than did the majority opinion. Id. at 852, 115 S.Ct. 2510. Likewise, to the extent broad statements made in Rosenberger are narrowed by Justice O'Connor's opinion in Mitchell, the Mitchell opinion, more recently issued, controls.
{ "pile_set_name": "FreeLaw" }
Mr Nesbitt advised the street protesters to lower their expectations. He warned them that no amount of protest will get the Union flag flying on Belfast City Hall 365 days a year. He added that, even though he didn’t agree with it, the vote was a democratic one which won’t be reversed, no matter how badly a minority feel about it. Up to now the unionist parties handled the situation so badly that they will struggle to get things on an even keel. It will take leadership to steer things away from street protests and into practical negotiations with Alliance and the nationalists. Mr Robinson and Mr Nesbitt must rise to the challenge. They would have done better to have prepared the ground in advance. The flags issue at City Hall has dragged on for years. Unionists did well to delay change for so long despite a nationalist majority. Prudent leadership would have pointed out that a compromise was inevitable. They might have explained that there were designated days issued by Buckingham Palace and that these would be the backstop position from which they would try to advance. Instead, 40,000 hysterical leaflets were issued demonising the Alliance Party in what Mr Nesbitt defended as a “public awareness exercise”. The unionist parties wound people up and got a reaction they did not bargain for. “We now see that a lot of people don’t really understand the arithmetic in the City Hall” one DUP activist explained. The result was attacks on Alliance offices, a former BNP activist addressing a leaderless mob at City Hall and a spate of death threats. Through it all, Alliance showed courage. The party is no pushover, it can be reasoned with, but it does not buckle to intimidation. Traders suffered in the run-up to Christmas, lives were disrupted, police officers were attacked and one nearly killed. The week of madness did real damage to our reputation but got the protesters nowhere. It threatens to split Mr Nesbitt’s party as part of the collateral damage. This is reminiscent of the Drumcree protests. Then, the Orange Order refused to give an inch or talk until it was too late. The result, after years of agony, was defeat. In contrast, the Apprentice Boys, after decades of conflict around their parades, found wise leaders who cut a deal allowing them to march in Derry, a mainly nationalist city. That is the only way. Martin McGuinness of Sinn Fein said he wants to find a way forward “on how best to represent and protect the identity and symbols of both nationalists and unionists” through “cross-party and cross-community discussions”. The protesters may not like Mr McGuinness, but he has the power to deliver nationalist consent where protests can’t. That makes him the man to talk to and unionists should put him to the test. There is something in the unionist mindset which distrusts process and change. As David Ervine, the former PUP leader, put it: “The unionist community are an extremely literal people. How do you get a literal people to sign up to things that have no basic parameters?” That desire for boundaries is echoed in the frustration of the protesters. Some see the peace agreement as a line in the sand and any change as an erosion of their Britishness. It is the task of leadership to project confidence and vision amidst change — not to present council votes as last-ditch stands. Not many people in Britain, whose town halls often abide by the same rules agreed in Belfast, have publicly identified with the protesters. Rather than bringing us closer to Britain, the scenes of the last week have put more strain on the relationship than a flag vote ever could. As Patrick Mercer, the Tory MP who served here in the Army told me: “Looked on from here, this behaviour is a disservice to the unionist cause.” Your Comments COMMENT RULES: Comments that are judged to be defamatory, abusive or in bad taste are not acceptable and contributors who consistently fall below certain criteria will be permanently blacklisted. The moderator will not enter into debate with individual contributors and the moderator’s decision is final. It is Belfast Telegraph policy to close comments on court cases, tribunals and active legal investigations. We may also close comments on articles which are being targeted for abuse. Problems with commenting? [email protected]
{ "pile_set_name": "Pile-CC" }
Vortragsreiheurn:uuid:914a5f31-3c85-3808-8c8e-e57f7bcde5432019-02-22T14:00:17.836591ZLektor Atom PluginIngrid Lossius Falkum – Count-mass polysemy: A pragmatic approachurn:uuid:75e61de3-6ef3-334d-9c65-28bb726c727f2019-02-22T14:00:17.723445Z<div class="rubbullets rublinks text"> <p>In this talk I discuss a subtype of polysemy which in English (and several other languages) appears to rest on the distinction between count and mass uses of nouns (e.g., <em>shoot a rabbit</em>/<em>eat rabbit</em>/<em>wear rabbit</em>). I question the widespread assumption that such meaning alternations are mainly linguistically generated and argue, based on the variety of interpretations that the alternation between count and mass uses of nouns may give rise to, that the linguistic component provided by count-mass syntax leaves a more underspecified semantic output, subject to pragmatic modulation in context, than what some semantic theories tend to assume.</p> </div>Kilian Evang – Exploring transition-based methods for semantic parsing to Discourse Representation Structuresurn:uuid:e5f279ad-f0b2-38a2-a7cf-448792fd66a42019-02-22T14:00:17.727086Z<div class="rubbullets rublinks text"> <p>Der Abstract für den Vortrag wird zwei bis drei Wochen vor dem Termin bekanntgegeben.</p> </div>Roberto Zamparelli – On using verbs as nounsurn:uuid:9cbb23ce-a40d-36e9-957a-c4619e9b73562019-02-22T14:00:17.730600Z<div class="rubbullets rublinks text"> <p>Der Abstract für den Vortrag wird zwei bis drei Wochen vor dem Termin bekanntgegeben.</p> </div>Radek Šimík – A situation-sensitive approach to bare NP interpretation: Evidence from Slavicurn:uuid:88423fa8-a754-3f6c-924a-3fce3e60cfd02019-02-22T14:00:17.734194Z<div class="rubbullets rublinks text"> <p>Der Abstract für den Vortrag wird zwei bis drei Wochen vor dem Termin bekanntgegeben.</p> </div>Tristan Miller – Sense-based clustering for the interpretation of humorous ambiguityurn:uuid:99bfcceb-6f48-3a08-87dc-51379e3685572019-02-22T14:00:17.738001Z<div class="rubbullets rublinks text"> <p>Word sense disambiguation (WSD) – the task of determining which meaning a word carries in a particular context – is a core research problem in computational linguistics. Though it has long been recognized that supervised approaches to WSD can yield impressive results, they require an amount of manually annotated training data that is often too expensive or impractical to obtain. This is a particular problem for processing the sort of lexical-semantic anomalies employed for deliberate effect in humour and wordplay. In contrast to supervised systems are knowledge-based techniques, which rely only on pre-existing lexical-semantic resources (LSRs) such as dictionaries and thesauri. In this talk, we treat the task of extending the efficacy and applicability of knowledge-based WSD, both generally and for the particular case of English puns. In the first part of the talk, we present two approaches for bridging the “lexical gap” problem and thereby improving WSD coverage and accuracy. In the first approach, we supplement the word’s context and the LSR’s sense descriptions with entries from a distributional thesaurus. The second approach enriches an LSR's sense information by aligning and clustering the senses to those of other, complementary LSRs. In the second part of the talk, we describe how these techniques, along with evaluation methodologies from traditional WSD, can be adapted for the “disambiguation” of puns, or rather for the automatic identification of their double meanings.</p> </div>Hana Filip – Two kinds of count nounsurn:uuid:1e4c2d3f-e0ba-3166-81d0-ced2fc4571ad2019-02-22T14:00:17.741927Z<div class="rubbullets rublinks text"> <p>There is a class of Ns that are grammatically count such as <em>fence</em>, <em>wall</em>, <em>twig</em>, that are non-quantized like bona fide singular count Ns (<em>cat</em>) but also not cumulative like mass Ns (<em>mud</em>, <em>water</em>). Furthermore, puzzlingly, many of these Ns are felicitous in pseudo-partitive, measure NPs: <em>Thick woolen drapes of red and gold covered every inch of wall</em> (COCA). We address this puzzle, which, to our knowledge, has so far not been noticed in contemporary mass/count debates in formal semantics. We argue that <em>fence</em>-like nouns admit of multiple individuation schemas which leads to overlap with respect to what counts as one in their denotations. As a result: (i) <em>fence</em>, like <em>cat</em>, but unlike <em>mud</em> is quantized at specific counting contexts (and so is grammatically count), (ii) <em>fence</em>, like <em>mud</em>, but unlike <em>cat</em> is non-quantized at the null counting context which make them felicitous in measure NPs.</p> </div>Paolo Acquaviva – Internalist semantics and the grammatical construction of individualsurn:uuid:e1cc2897-b2a2-38da-95c2-6ff71025a7442019-02-22T14:00:17.745544Z<div class="rubbullets rublinks text"> <p>Our use of language presupposes a domain of entities, but this domain is at least in part a result of a conceptualization encoded in language. How to analyze linguistic conceptualization without falling into a simplistic Sapir-Whorf relativism? I address this challenge by distinguishing a basic domain of abstract entities, each named by a noun, from the domain of discourse referents, denoted by DPs. In between, grammar provides a template organizing part-structural information in different ways across languages. This explains a cluster of phenomena relative to kind-interpretation, number, and countability, unifies the analysis of nouns with that of names, and makes possible a predictive theory of possible nouns in natural language. In this way, lexical semantics can be integrated with a “grounded” approach to cognition, as the form for representing the substance provided by the mental recreation of experience.</p> </div>Guillaume Thierry – Is language under control or in control?urn:uuid:0a50833b-de38-35ca-9829-b0d5c08e21612019-02-22T14:00:17.749201Z<div class="rubbullets rublinks text"> <p>In this talk, I will show how bilingual adults spontaneously access native translations of second language words unconsciously and unknowingly stop accessing these representations when second language words are unpleasant. Even more surprising, bilinguals unconsciously access the sound of words in their native language while speaking in their second. More surprising still, cross-language effects extend to the domain of syntax: Welsh-English bilinguals spontaneously transfer to English a morpho-phonological transformation rule of Welsh that is entirely alien to their native language! And perhaps worryingly, bilinguals engaging in a gambling task for money take more risk when receiving verbal feedback in their native as compared to their second language. Taken together these findings reveal unsuspected levels of automaticity and cognitive diversity linked to language variations within and between individuals. This realization calls for a reconsideration of the way in which we conceptualise free will and operations classically regarded as volitional.</p> </div>Ana Marasović – A mention-ranking model for abstract anaphora resolutionurn:uuid:8ee9fb6e-7cbc-37ec-b54a-aad95b4dca372019-02-22T14:00:17.752896Z<div class="rubbullets rublinks text"> <p>Abstract anaphora resolution (AAR) is a challenging task that aims to resolve anaphoric reference of pronominal and nominal expressions that refer to abstract objects like facts, events, propositions, actions or situations, in the (typically) preceding discourse. A central property of abstract anaphora is that it establishes a relation between the anaphor embedded in the anaphoric sentence and its (typically non-nominal) antecedent. In this talk, I will present a mention-ranking model that learns how abstract anaphors relate to their antecedents with an LSTM-Siamese Net. I will describe how we harvested training data from a parsed corpus using a common syntactic pattern consisting of a verb with an embedded sentential argument. I will show results of the mention-ranking model trained for shell noun resolution and results on an abstract anaphora subset of the ARRAU corpus. The latter corpus presents a greater challenge due to a mixture of nominal and pronominal anaphors and a greater range of confounders. Finally, I will talk about ideas on how the training data extraction method and the mention- ranking model could be further improved for the challenges ahead.</p> </div>Heike Adel – Deep learning methods for knowledge base populationurn:uuid:2553c2c5-ed56-36fc-bf71-44b59eea203b2019-02-22T14:00:17.756555Z<div class="rubbullets rublinks text"> <p>Knowledge bases store structured information about entities or concepts of the world and can be used in various applications, such as information retrieval or question answering. A major drawback of existing knowledge bases is their incompleteness. In this talk, I will present deep learning methods for automatically populating them from text, addressing the following tasks: slot filling, type-aware relation extraction and uncertainty detection. Slot filling aims at extracting information about entities from a large text corpus. I will present the system we developed for this task and especially focus on its classification module for which we designed contextCNNs, convolutional neural networks based on context splitting. In the second part of the talk, I will present our investigations of type-aware relation extraction with neural networks and introduce novel models for joint entity and relation classification: a jointly trained model and a globally normalized model. The last part of the talk focuses on assessing the factuality of statements extracted from text. I will introduce external attention, a novel attention variant which can incorporate external knowledge sources. To the best of our knowledge, we are the first to integrate an uncertainty detection component into a slot filling pipeline, extending the applicability of the system to another use case.</p> </div>Vibeke Rønneberg – Cognitive predictors of shallow-orthography spellingurn:uuid:858a8e17-d033-39dc-9db7-e956ed8a25892019-02-22T14:00:17.760219Z<div class="rubbullets rublinks text"> <p>This study investigates spelling behavior in a sample of 121 Norwegian 6th graders completing a standardized spelling-to-dictation task. Students spelled on computers with accurate recordings of initial onset latency and keystroke latencies (the time interval between pressing keys). Measures of keyboard familiarity, typing speed, short term memory, RAN, word reading, and non- verbal cognitive skills were also collected. The present research had two aims.</p> <p>First, we wanted to investigate what student-level cognitive factors affect spelling performance, both spelling accuracy and the spelling process.</p> <p>Second we aimed to develop understanding of time course of orthographic planning in Norwegian, a language with a relatively shallow orthography, and specifically the extent to which orthographic planning is complete before typing onset. Results suggest that the activation of the orthographic representation of a word is not complete when the children start to spell.</p> </div>Artemis Alexiadou – The many faces of pluralurn:uuid:54e52eb1-2929-3fd2-9f6a-1992e87ce67b2019-02-22T14:00:17.763837Z<div class="rubbullets rublinks text"> <p>The category Number and in particular plural Number has received a lot of attention in the literature. In this talk, I will re-visit the question of whether plurals behave alike across languages. The focus will be on languages that have distinct Number systems (i.e. they differ in terms of the interpretation of the plural and the availability of general number).</p> <p>I will introduce two distinct views on plurality and make particular assumptions about its morpho-syntactic representation. I will then discuss phenomena that show the non-uniform behavior of plurals across languages; these relate to semantic vs. morphological markedness. I will evaluate various theoretical approaches to plurality partially on the basis of experimental data. Finally, I will examine how the morpho-syntactic analysis of plurality can be used to understand the role of plural in nominalizations.</p> <p>The empirical domain will include data from English, German, Greek, Hungarian, and Turkish.</p> </div>Detmar Meurers – Analyzing learner language: Conceptual challenges and opportunities for computational linguisticsurn:uuid:3143dba7-47d9-3545-81f9-59de134e7f6d2019-02-22T14:00:17.767493Z<div class="rubbullets rublinks text"> <p>Learner corpora as collections of language produced by second language learners have been systematically collected since the 90s, and with computer-based language learning environments the opportunities for collecting data about the process and product of learning are substantially increasing. This offers a growing empirical basis on which theories of second language acquisition and interlanguage systems can be informed (cf. Meurers & Dickinson, 2017).</p> <p>Yet, as soon as the research questions go beyond the acquisition of vocabulary and constructions with unambiguous surface indicators, corpora must be enhanced with linguistic annotation to support efficient retrieval of the data that is relevant for such research questions. In contrast to the different types of linguistic annotation schemes which have been developed for native language corpora, the discussion on which linguistic analysis and annotation is meaningful and appropriate for learner language is only starting.</p> <p>When formulating linguistic generalizations, one generally relies on a long tradition of linguistic analysis that has established an inventory of categories and properties to abstract away from the surface strings. In this talk, we will see that traditional linguistic categories are not necessarily an appropriate index into the space of interlanguage realizations and their systematicity, which research into second language acquisition aims to capture. Complementing the language explicitly given in the corpus, we also consider the need for information about the tasks (i.e., the functional context) that resulted in the texts collected in the corpus in order to annotate and support valid interpretations of the data.</p> </div>Paramita Mirza – Mining temporal and causal relations from texturn:uuid:163b551d-802c-3d09-93fd-437b381aa7392019-02-22T14:00:17.771464Z<div class="rubbullets rublinks text"> <p>Structured information resulting from temporal information processing is crucial for a variety of natural language processing tasks, for instance to generate timeline summarization of events from news documents, or to answer temporal/causal-related questions about events.</p> <p>In this talk, automatic extraction of temporal information from texts will be discussed, with more emphasis on temporal ordering and causal relations, and their interaction based on the presumption about event precedence in causality, that causing events must happened BEFORE resulting events. Several resources and techniques to improve temporal/causal relation extraction systems will also be discussed, including word embeddings and common sense knowledge.</p> </div>Grzegorz Chrupala – Representations of language in visually grounded neural modelsurn:uuid:4868734e-bd47-3720-a012-7a37ccccaee32019-02-22T14:00:17.775141Z<div class="rubbullets rublinks text"> <p>The task of learning language in a visually-grounded setting, with weak and noisy supervision, is of interest to scientists trying to understand the human mind as well as to engineers trying to build smart conversational agents or robots. In this talk I present models of grounded language learning based on recurrent neural networks which learn language from sentences paired with images of corresponding visual scenes. Input sentences are given at different levels of granularity: as sequences of words, sequences of phonemes, or as an acoustic signal.</p> <p>I evaluate the internal representations induced by the models in these scenarios and present quantitative and qualitative analyses of their characteristics. I show how they encode language form and function, and specifically how they are selectively sensitive to certain aspects of language structure such as word boundaries, lexical categories and grammatical functions.</p> </div>Sabine Schulte im Walde – Distributional approaches to semantic relatednessurn:uuid:eba7511e-b9c6-3682-8253-3dd21146595e2019-02-22T14:00:17.778818Z<div class="rubbullets rublinks text"> <p>Distributional models assume that the contexts of a linguistic unit (such as a word, a multi-word expression, a phrase, a sentence, etc.) provide information about the meaning of the linguistic unit (Harris, 1954; Firth, 1957). They have been widely applied in data-intensive lexical semantics (among other areas), and proven successful in diverse research issues, such as the representation and disambiguation of word senses; selectional preference modelling; the compositionality of compounds and phrases, or as a general framework across semantic tasks.</p> <p>While it is clear that distributional knowledge does not cover all the cognitive knowledge humans possess with respect to word meaning (Marconi, 1997; Lenci, 2008), distributional models are very attractive, as the underlying parameters are accessible from even low-level annotated corpus data. We are thus interested in maximizing the benefit of distributional information for lexical semantics, by exploring the meaning and the potential of comparatively simple distributional models.</p> <p>In this respect, this talk will present four case studies on semantic relatedness tasks that demonstrate the potential and the limits of distributional models: (i) the availability of various German association norms in standard web and newspaper corpora; (ii) the prediction of compositionality for German multi-word expressions; (iii) the distinction between the paradigmatic relations synonymy, antonymy and hypernymy with regard to German nouns, verbs and adjectives; and (iv) the integration and evaluation of distributional semantic information into an SMT system.</p> </div>Maria Rauschenberger – Detection and intervention of dyslexiaurn:uuid:63dca8a8-d395-3c8c-b10a-55b2ca0f92872019-02-22T14:00:17.782532Z<div class="rubbullets rublinks text"> <p>Dyslexia is a specific reading disorder, which is probably caused by the “phonological skills deficiencies associated with phonological coding deficits” (Vellutino, Fletcher, Snowling, & Scanlon, 2004). A person with dyslexia has visual and auditory difficulties that cause problems in reading and writing (Deutsches Institut für Medizinische Dokumentation und Information, 2008). Dyslexia is frequent: worldwide, about 10% of the population and from 5 to 12% of the German students have dyslexia.</p> <p>The problem is that children with dyslexia can learn the spelling of words or decode words for reading but they need more time to practice. For example, two years instead of one for learning how to spell phonetically accurate words (Schulte-Körne, 2010). Therefore we will first show the power of misspellings for intervention and how a game can help children to decrease their spelling mistakes. We will present the annotation of the errors, the creation of the exercises, and the Dyseggxia application in German.</p> <p>In contrast to the intervention with misspellings - linguistic features have also the power to predict the risk of dyslexia for children. Therefore the linguistic features which are implemented in the game Dytective will be presented.</p> <p>Finally, we show the concept of a possible and different approach of “How to predict dyslexia without linguistic features”.</p> </div>Heike Zinsmeister – Zur Funktion und Resolution von nicht-nominalen Anaphernurn:uuid:e55e83f5-23da-350e-8a13-fb0f0850b6422019-02-22T14:00:17.786256Z<div class="rubbullets rublinks text"> <p>Anaphern (sprachliche Wiederaufnahme von anderweitig im Text eingeführten Referenten) tragen maßgeblich dazu bei, dass ein Text als kohärente Einheit wahrgenommen wird. Wiederaufgreifende Elemente sind dabei typischerweise pronominale Formen oder definite Nominalphrasen. Eine besondere Form der Anapher liegt dann vor, wenn sich die Wiederaufnahme auf Ereignisse, Tatsachen oder Zustände bezieht, die im Text nicht durch Nominalphrasen, sondern durch Sätze oder andere nicht-nominale Strukturen etabliert wurden.</p> <p>(1) Hunde nehmen Farben anders wahr als Menschen. Hersteller von Hundespielzeug nehmen <em>darauf</em> / auf <em>diese Tatsache</em> jedoch keine Rücksicht.</p> <p>Nicht-nominale Anaphern stellen besondere Herausforderungen an die (auto-matische) Interpretation, da die Kandidatenmenge der möglichen Bezugselemente unübersichtlich ist und anders als bei Anaphern mit nominalen Antezedenten hier nicht auf Kasus, Genus oder ähnliche Filter zurückgegriffen werden kann.</p> <p>Der Vortrag richtet sich sowohl an Linguist/innen als auch an Computerlinguist/innen und nähert sich dem Phänomen nicht-nominaler Anaphern von drei Seiten: (i) Besonderheiten der Interpretation, (ii) textlinguistische Funktionen und (iii) ein Ausblick auf aktuelle Ansätze der automatischen Resolution.</p> </div>Jana Häussler – Experimentelle Syntax im Sprachvergleich: Parallelexperimente zu Superioritätseffekten in 7 Sprachenurn:uuid:51142666-4130-32d9-8251-f854683a15432019-02-22T14:00:17.789845Z<div class="rubbullets rublinks text"> <p>Die Bewegung eines <em>Wh</em>-Objekts vor ein <em>Wh</em>-Subjekt wie in <em>Was sagt wer?</em> führt typischerweise zu verminderter Akzeptabilität. Dies wird als Superioritätseffekt bezeichnet. Im Vortrag werde ich eine Studie vorstellen, die den Effekt in sieben Sprachen (Deutsch, Englisch, Isländisch, Niederländisch, Schwedisch, Spanisch, Tschechisch) mithilfe mehrerer, weitgehend paralleler Erhebungen von Akzeptabilitätsurteilen untersucht.</p> <p>Die Ergebnisse zeigen, dass mehrere Faktoren zum Superioritätseffekt beitragen, wie etwa Verarbeitungsschwierigkeiten aufgrund von Cue-Konflikten und langen Abhängigkeiten sowie ein Malus für <em>Wh</em>-Subjekte in situ. Entscheidend jedoch ist die Verfügbarkeit overter Kasusmarkierungen.</p> </div>Michael Franke – Complex probability expressions & higher-order uncertainty: Compositional semantics, probabilistic pragmatics, and experimental dataurn:uuid:219f7348-89f2-389f-9c5b-0d7915cefeb52019-02-22T14:00:17.793383Z<div class="rubbullets rublinks text"> <p>[joint work with Michele Herbstritt]: We present novel experimental data pertaining to the use and interpretation of simple probability expressions (such as “possible” or “likely”) and complex ones (such as “possibly likely”) in situations of higher-order uncertainty, i.e., where speakers may be uncertain about the probability of a chance event. The data is used to critically assess a probabilistic model of speaker production and listener comprehension. The model embeds a simple compositional threshold-semantics for probability expressions, following recent work in formal linguistics, and formalizes general Gricean reasoning on top of it, taking the speaker’s higher-order uncertain belief states into account.</p> </div>Bert Cappelle – Short-circuiting: How constructions constrain what ‘can’ can mean in contexturn:uuid:b102d3d3-693a-34d0-affb-67b532926f042019-02-22T14:00:17.796845Z<div class="rubbullets rublinks text"> <p>Der Abstract für den Vortrag wird zwei bis drei Wochen vor dem Termin bekanntgegeben.</p> </div>Anne Temme – Die besondere Natur von Experiencer-Objekt-Strukturenurn:uuid:fcfc311f-7c15-3375-8a2f-147a0bc352b02019-02-22T14:00:17.800324Z<div class="rubbullets rublinks text"> <p>Der Abstract für den Vortrag wird zwei bis drei Wochen vor dem Termin bekanntgegeben.</p> </div>James Henderson – Learning non-parametric vectorial representations for semantic entailmenturn:uuid:06f1bf06-1392-3d50-b44c-58f67fcb20552019-02-22T14:00:17.803899Z<div class="rubbullets rublinks text"> <p>Distributional semantics uses the distribution of words in their contexts in text to induce vector-space representations of words (word embeddings). It has been very successful at capturing semantic similarity between words. But previous work has had difficulty using these representations to capture lexical entailment, such as hyponymy, which is an asymmetric relation measuring information inclusion.</p> <p>This talk presents distributional semantic models where the induced vector representations are designed to capture entailment. These models use the recently proposed entailment-vectors framework to model the semantic relationship between a word and its context. Training these models on a large corpus of text induces entailment-vector representations of words, which indicate when one word’s vector entails another word’s vector. We evaluate these entailment predictions on the task of hyponymy detection, achieving a substantial improvement over previous results.</p> </div>Vivi Nastase – Investigations in knowledge graphsurn:uuid:7cc7d944-f797-3716-99c1-939c6feeaeac2019-02-22T14:00:17.807503Z<div class="rubbullets rublinks text"> <p>Knowledge graphs are useful and flexible knowledge representation structures that can facilitate the integration of information in NLP tasks. They are however incomplete, and not only that, but also skewed in the type of knowledge they include. In this talk I will present an investigation into two existing knowledge graphs – <em>Freebase15k</em> and <em>WordNet18</em> – and show how particular characteristics influence the quality of knowledge graph embeddings, which ultimately impact knowledge graph completion and other tasks. I will also talk about knowledge discovery in knowledge graphs – as paths associated with direct relations – and how these patterns can be used for both "internal" knowledge graph completion and targeted information extraction from external textual sources.</p> </div>Manfred Stede – The Potsdam argumentative microtext corpus: Classification experiments and new extensionsurn:uuid:1af117af-eb94-35da-9abe-02aa5a12bb642019-02-22T14:00:17.811084Z<div class="rubbullets rublinks text"> <p>Argumentative “microtexts” are short texts produced by students in response to a trigger question that invites taking a stance and providing arguments in support of that stance. Our original corpus of 115 texts of this kind, collected in a classroom setting, was published in 2015, together with annotations of the underlying argumentation structure. In the talk, I first describe our experiments on automatically classifying those structures, which make use of the minimum-spanning tree algorithm, and of Integer Linear Programming. Then I turn to various extensions made to the corpus just recently: New annotation layers that allow for computing correlations with properties of argumentation structure, as well as an extension of the overall data set by 200 new texts that were obtained via crowdsourcing. I will summarize our experiences with this approach to text production and explain the extra steps needed to make the crowdsourced data compatible to the original corpus.</p> </div>Lucas Champollion – Donkeys without bordersurn:uuid:39deac9e-7f38-3939-b4e8-d6398e7f8d072019-02-22T14:00:17.814885Z<div class="rubbullets rublinks text"> <p>Donkey sentences have existential and universal readings, but they are not often perceived as ambiguous. We extend the pragmatic theory of non- maximality in plural definites by Križ (2016) to explain how hearers use Questions under Discussion to fix the interpretation of donkey sentences in context. We propose that the denotations of such sentences involve truth- value gaps – in certain scenarios the sentences are neither true nor false – and demonstrate that Križ’s pragmatic theory fills these gaps to generate the standard judgments of the literature. Building on Muskens’s (1996) Compositional Discourse Representation Theory and on ideas from supervaluation semantics, we define a general schema for dynamic quantification that delivers the required truth-value gaps. (This talk presents joint work with Dylan Bumford and Robert Henderson. Paper at <a href="http://ling.auf.net/lingbuzz/003333">http://ling.auf.net/lingbuzz/003333</a>)</p> </div>Dirk Hovy – Texts come from people: Computational sociolinguistics and NLPurn:uuid:4544f7be-d801-3568-86e3-9b68ad7312b32019-02-22T14:00:17.818553Z<div class="rubbullets rublinks text"> <p>In this talk, I will show how we can combine statistical NLP methods and sociolinguistic theories to the benefit of both fields. I present research on large-scale statistical analysis of demographic language variation to detect factors that influence performance (and fairness) of NLP systems, and how we can incorporate demographic information into statistical models to address both problems.</p> <p>Sociolinguistics has long investigated the interplay of demographic factors and language use, and the same factors are also present in the data we use to train Natural Language Processing (NLP) systems.</p> <p>NLP models, however, are based on a small demographic sample and approach all language as uniform. As a result, NLP models perform worse for demographic groups that differ from the training data. This bias harms performance and can disadvantage entire user groups. I will show how adding demographic information to NLP models can improve performance and create fairer systems for everyone.</p> </div>Berit Gehrke – ‘Good’ as an evaluative intensifierurn:uuid:337962ec-90f7-384a-bbea-607c15a08fb62019-02-22T14:00:17.822224Z<div class="rubbullets rublinks text"> <p>This talk aims to contribute to the ongoing debate on the semantics of evaluative modifiers from the perspective of the interaction between meaning types, and in view of two related Catalan modifiers, namely the ad-nominal <em>bon</em> ‘good’(e.g. <em>una bona estona</em> ‘a good while’) and the ad-adjectival <em>ben</em> ‘well’ (e.g. <em>ben clar</em> ‘well clear’). We build on the lexical semantics of the predicate good and the subsective composition mode to claim that good selects the good instances in the extension of N/A. This yields intensification whenever the extension is ordered. Moreover, a monotonicity inference is conveyed through a Conventional Implicature, which makes evaluative modifiers unacceptable under negation.</p> </div>Peter Auer – Projektionen im Rahmen der Online-Syntaxurn:uuid:334fe9f7-4cc9-3065-9c40-26ca0a8c37702019-02-22T14:00:17.825929Z<div class="rubbullets rublinks text"> <p>Trotz des inszenierten medialen Rätselratens über die missglückte Twitter-Nachricht des amerikanischen Präsidenten: <em>Despite the constant negative press covfeve</em> war diese relativ eindeutig dekodierbar. Das lag einerseits daran, dass der Wortanfang <em>cov</em> Vorhersagen über das geplante Wort möglich macht und anderseits der Satzanfang in dem Slot nur eine begrenzte Anzahl von Weiterführungen nach <em>press</em> bis zum Abschluss des Konzessivsatzes erlaubt. In Kombination führt dies zur Interpretation 'coverage'.</p> <p>Das Beispiel zeigt, dass die Rezeption von Sprache (selbst im schriftlichen, noch mehr aber im mündlichen Medium) inkrementell und „online“ erfolgt, d. h. in und mit der Produktionszeit. Ich sehe „Grammatik“ (u. a.) als ein Verfahren menschlicher Sprache an, um in diesem Prozess Projektionen über den weiteren Verlauf der emergenten Äußerung möglich zu machen. In meinem Vortrag werde ich zeigen, warum dies für die menschliche Kommunikation äußerst sinnvoll ist und außerdem darauf eingehen, wie verschiedene syntaktische Verfahren dem Ziel der Projektionsoptimierung mehr oder weniger gut dienen.</p> </div>Lewis Bott – What structural priming tells us about implicaturesurn:uuid:3e0aa2ac-646b-3759-904d-8072820467b52019-02-22T14:00:17.829429Z<div class="rubbullets rublinks text"> <p>Utterances communicate much more than the literal meaning of the words. For instance, a letter of reference describing a student as punctual might imply that their academic ability is modest, or a grant application rated as good might suggest that the reviewer thought that it wasn’t excellent. These sorts of enrichments are commonly referred to as implicatures.</p> <p>I will present experiments investigating the underlying representation and processing of implicatures and related phenomena. The approach I take is to test whether implications such as those above can be primed, that is, whether enrichment in preceding context leads to enrichment in the current context. The results help us to understand the psycholinguistics of Gricean implications and pragmatic processing more generally.</p> </div>Patrick Rebuschat – Implicit-statistical learning of words and syntax: Evidence from cross-situational learningurn:uuid:caf0fe25-a6d3-333b-9191-442e8b9728462019-02-22T14:00:17.833010Z<div class="rubbullets rublinks text"> <p>In this talk, I will present recent experiments that bring together methodological insights from two related, yet completely distinct research strands, namely “implicit learning” (Reber, 1967) and “statistical learning” (e.g., Saffran et al, 1996). In the first part, I will discuss experiments that used verbal reports and subjective measures of awareness to determine what strategies subjects followed in the learning task and whether they became aware of rules or patterns. Results indicate that provision of prior (explicit) knowledge significantly boosts implicit-statistical learning. In the second part, I will introduce a novel artificial language paradigm that is part of a long-term project on individual differences in language learning across the lifespan. Our results demonstrate that adult learners can simultaneously acquire lexical and syntactic information by keeping track of cross-trial statistics, after brief exposure, without feedback and without the conscious intention to learn. We conclude by discussing implications for future research.</p> </div>Ekaterina Lapshinova-Koltunski – Discourse analysis and annotation for contrastive linguistics and translation studiesurn:uuid:247ad731-1f03-3ea1-b5e6-87e44293887f2019-02-22T14:00:17.836591Z<div class="rubbullets rublinks text"> </div> <div class="rubbullets rublinks text"> <p>In this talk, I will report on the ongoing work on discourse analysis in a multilingual context. I will present two approaches in the analysis of coreference and discourse-related phenomena: (1) top-down or theory-driven: here we start from some linguistic knowledge derived from the existing frameworks, define linguistic categories to analyse and create an annotated corpus that can be used either for further linguistic analysis or as training data for NLP applications; (2) bottom-up or data-driven: in this case, we start from a set of features of shallow character that we believe are discourse-related. We extract these structures from a huge amount of data and analyse them from a linguistic point of view trying to describe and explain the observed phenomena from the point of view of existing theories and grammars.</p> </div>
{ "pile_set_name": "Pile-CC" }
Q: Auto sizing Silverlight controls I am using Silverlight 4 for a project. I want to know if there is a way I can get the main canvas to stretch to the height and width of the browser window it is hosted in? I want the controls within to resize in proportion to the main control that hosts all the rest of the controls in the host browser window. This is a Prism application which has a Shell.xaml and a ContentControl within the shell. In this prism case I want the content control to span to 100% of the screen height and width.. and when a Page.xaml loads within it I want the Page's usercontrol to fill up the entire content control of the xaml. Similarly, within the Page.xaml if I have a grid I want the grid to grow to a size no more than a fixed number of pixels The Grid within the Page.xaml's user control seems to be sizing properly. I am having trouble getting the root user control of the Page.xaml to stretch to the entire width of the browser window. Is there a way this can be done using xaml properties only? I dont want to specify the height and width to 800 and 1200 like I have done below. This is my code <UserControl x:Class="MyNamespace.MyClass" xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns:d="http://schemas.microsoft.com/expression/blend/2008" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="d" d:DesignHeight="300" d:DesignWidth="400" xmlns:sdk="http://schemas.microsoft.com/winfx/2006/xaml/presentation/sdk" Background="#FF2D8543" Height="800" Width="1200" > <Grid x:Name="LayoutRoot" Background="#FFEB0A0A" VerticalAlignment="Center" HorizontalAlignment="Center" Height="Auto" Width="Auto" > </Grid> Thanks for your time. A: Yes, use Grid instead of Canvas as top level element. Grid takes all the available space by default. Learn more about Silverlight layout system here and here. Update: Just remove Width and Height attributes from the UserControl: Height="800" Width="1200" By setting those explicitly you are giving the control fixed size. If you don't specify Width and Height the control will take all the available space.
{ "pile_set_name": "StackExchange" }
Introduction ============ Hypertension is 1 of the most important risk factors of atrial fibrillation (AF).^[@b1]^ In the Framingham Heart Study and the Manitoba Follow‐up Study,^[@b2]--[@b3]^ hypertensive patients have a 1.4‐ to 1.9‐fold greater risk of AF than do normotensive subjects. Hypertension is also the number one independent risk factor for AF simply because of its worldwide prevalence.^[@b4]^ However, although the association of hypertension with AF has been well established, its underlying mechanism in the development of AF remains unknown. Current experimental evidence suggests that hypertension associated with left ventricular (LV) hypertrophy and impaired LV diastolic function may increase left atrial (LA) pressure (and result in enlargement), thereby slowing atrial conduction velocity; this favors the development and maintenance of AF.^[@b5]--[@b6]^ However, there is distinct lack of clinical data describing the electroanatomic properties in hypertensive patients with or without AF. Recently, Medi et al^[@b7]^ compared right atrial (RA) electrophysiological activity in hypertensive patients without AF with the activity in a normotensive group. They found a significantly slowed conduction with slightly shortened event‐related potentials (ERPs) in hypertensive patients, which may be associated with an increased inducibility of AF. Nevertheless, studies have yet to be conducted detailing the role of the LA in the context of pulmonary vein (PV) electrophysiology, which acts as a critical substrate for AF initiation and maintenance^[@b8]--[@b9]^ and therefore remains an important therapeutic target in AF management.^[@b10]--[@b11]^ In the current study, we aimed to prospectively evaluate electroanatomic properties in hypertensive patients with and without AF. We sought to identify whether hypertensive patients exhibited abnormal electrophysiology and any anatomic substrate for the development of AF. In addition, we aimed to determine whether such abnormities varied in severity in comparing hypertensive patients with and without AF. Methods ======= The study protocol was preapproved by the Research Development and Human Ethics Committee at the First Affiliated Hospital of Dalian Medical University. All patients gave written informed consent before enrolling in the study. Study Population ---------------- Of 68 patients who were referred to the First Affiliated Hospital of Dalian Medical University for ablation procedures for paroxysmal supraventricular tachycardia (PSVT) or paroxysmal AF (PAF) between February 2011 and July 2012, 44 patients were included in the present study. Seventeen patients had PSVT due to concealed left atrioventricular accessory only. Fifteen patients of these had a history of longstanding systemic hypertension with PSVT (6.27±3.65 years) with an average blood pressure ≥140/90 mm Hg in 24 hours. And, 12 of 44 patients were diagnosed with longstanding systemic hypertension (10.83±6.69 years) and PAF (4.67±1.97 years). Exclusion criteria included persistent AF (AF onset lasting \>7 days) or permanent AF; any current or previous amiodarone use; LV ejection fraction \<50%; congenital, ischemic, or valvular heart disease; stroke; diabetes mellitus; body mass index \>30 kg/m^2^; and renal impairment. Clinical Examination -------------------- The clinical examinations and questionnaires included 12‐lead ECG, 24‐hour Holter study, transthoracic echocardiography, computer tomography, and a detailed history of conditions and review of medications. All antiarrhythmic medications were discontinued for \>5 half‐lives before any procedures were performed. Hypertension was defined as systolic blood pressure ≥140 mm Hg or diastolic blood pressure ≥90 mm Hg. PSVT was diagnosed with ECG recorded at PSVT onset and confirmed on the basis of the following electrophysiology study. PAF was defined as episodes of AF that were detected with use of the Holter monitor and were spontaneously terminated within 7 days of onset. EP Studies ---------- Electrophysiological studies were performed in sinus rhythm on fasting patients with conscious sedation. The following catheters were positioned via the femoral venous approach ([Figure 1](#fig01){ref-type="fig"}A): (1) 20‐pole decapolar Lasso catheters (Biosense‐Webster, Inc) at the antrum of the PVs; (2) 10‐pole catheter (St Jude Medical Inc) within the coronary sinus (CS); (3) 3.5‐mm‐tip catheter (Biosense‐Webster, Inc) at the high RA (HRA); and (4) 2‐pole catheter (St Jude Medical Inc) at the inferior RA (IRA). Standard surface ECGs and bipolar endocardial electrograms with filter from 30 to 500 Hz were continuously monitored and stored. ERPs were measured at 8 different sites: left superior PV, left inferior PV, right superior PV, right inferior PV, HRA, IRA, and proximal and distal CSs (CSp and CSd, respectively). Each ERP was measured at twice diastolic threshold at cycle lengths of 500 ms. The average ERP tested twice at each site was used. The "ERP" was defined as the longest coupling interval failing to propagate to the atrium ([Figure 1](#fig01){ref-type="fig"}B). "Dispersion of ERP" was defined as the range between the longest and shortest ERP for each patient within any designated area.^[@b12]^ ![Dispersion of effective refractory periods (ERPs) in 3 groups. A, Dispersion of EPR among left atria (LA) and pulmonary veins (PVs). B, Dispersion of ERP between right atria (RA) and LA. C, Dispersion of ERP among RA, LA, and PVs. \**P*\<0.05, \*\**P*\<0.01 vs PSVT; \#*P*\<0.05, \#\#*P*\<0.01 vs HT with PSVT. HT indicates hypertension; PAF, paroxysmal atrial fibrillation; PSVT, paroxysmal superior ventricular tachycardia.](jah3-3-e001033-g1){#fig01} "AF" was defined as any rapid atrial activity (rate \>350 beats/min) with irregular cycle length, polarity, configuration, and amplitude on atrial electrograms lasting \>5 cycles.^[@b12]^ "Vulnerability window" (VW) was defined as the range of coupling intervals of the extrastimulus at which AF was induced.^[@b12]^ Interatrial and intra‐atrial activation times were measured at a cycle length of 500 ms. Activation time between PV and LA was calculated by subtracting the earliest PV signal from the last CSp activation signal. LA intra‐atrial activation time was calculated by subtracting the earliest CSp signal from the last CSd signal recorded on the CS catheter. Interatrial activation time was calculated by subtracting the earliest HRA signal from the last CSd signal recorded. Measurement of the Hemodynamics With Echocardiography ----------------------------------------------------- Transthoracic echocardiography was performed using an ultrasound system (Vivid 7; GE), equipped with a 3.5‐MHz transducer. Chamber dimensions were evaluated at standard sections, including LA diameter, LV end‐diastolic diameter, LV end‐systolic diameter, LV wall thickness, LA volume index, and LV ejection fraction. Measurement of the PV Diameters With Computed Tomography Scanning ----------------------------------------------------------------- Multislice computed tomography was performed using a GE LightSpeed VCT 64 Slice CT (GE Medical Systems) at a thickness of 0.625 mm with a prospective ECG‐triggered x‐ray tube modulation in all patients. Nonionic contrast was used to image PVs. PV diameters were measured with the maximal anterior--posterior distance in the oblique‐sagittal view by consensus of 2 observers unaware of the clinical data. Statistical Analysis -------------------- Continuous variables were expressed as mean±SD, and categorical variables were expressed as frequencies and percentages. ANOVA was used to compare 3 groups. Comparisons between 2 groups were made using the unpaired Student\'s *t* test for continuous variables and the χ^2^ test for categorical variables. Values of *P*\<0.05 were considered significant. All analyses were performed by using SPSS version 16.0 for Windows (SPSS Inc). Results ======= Baseline Demographics of the Study Population --------------------------------------------- As shown in [Table 1](#tbl01){ref-type="table"}, the average age of the 44 patients was 57.09±7.11 years, and 50% of patients were male. There was no significant difference in age (*P*=0.257) or sex (*P*=0.939) among the 3 groups. Hypertensive patients had significantly increased systolic and diastolic blood pressures (*P*\<0.0001 versus the normotensive patient with PSVT). Duration of PSVT history had no significant difference in patients with or without hypertension (*P*=0.379). Patients with PAF had a longer history of hypertension (\~4 years) than did those with PSVT (*P*=0.006), while the average blood pressure was comparable (*P*=0.406 for systolic blood pressure, *P*=0.809 for diastolic blood pressure). PAF patients had used more angiotensin‐converting enzyme inhibitors or angiotensin II receptor blockers than had the hypertensive patients with PSVT (75% versus 33%, *P*\<0.01). However, there was no significant difference in the use of calcium channel blockers (*P*=0.357) or β‐receptor blockers (*P*=0.21). ###### Patient Characteristics PSVT (n=17) HT With PSVT (n=15) HT With PAF (n=12) *P* Value ----------------------------- ------------- --------------------- -------------------- ----------- Mean age, y 54.82±7.20 58.60±5.95 58.42±8.28 0.257 Males 9 (52.9%) 7 (46.7%) 6 (50%) 0.939 Systolic BP, mm Hg 119.12±9.06 155.33±8.96 152.50±7.83 \<0.0001 Diastolic BP, mm Hg 75.29±7.39 93±3.02 93.5±3.78 \<0.0001 HT history, y --- 6.27±3.65 10.83±6.69 0.006 PSVT history, y 13.82±6.00 15.33±4.80 --- 0.379 PAF history, y --- --- 4.67±1.97 --- ACEI/A2RB use, % 0 5 (33) 9 (75) \<0.0001 Calcium channel blockers, % 6 (35) 9 (60) 5 (42) 0.357 β‐Receptor blockers, % 4 (24) 8 (53) 4 (33) 0.210 PSVT indicates paroxysmal superior ventricular tachycardia; HT, hypertension; PAF, paroxysmal atrial fibrillation; BP, blood pressure; ACEI, angiotensin‐converting enzyme inhibitor; vARB, angiotensin II receptor blocker. Changes of ERPs in the Hypertensive Patients -------------------------------------------- Eight ERP sites were tested and compared among the 3 groups ([Table 2](#tbl02){ref-type="table"}). Hypertensive patients had significantly shortened PV ERPs (*P*\<0.05) compared with normotensive patients. Furthermore, PV ERP shortening was particularly pronounced in hypertensive patients with PAF (*P*\<0.01). Atrial ERPs, tested at CSp, CSd, HRA, and IRA, were slightly prolonged in hypertensive patients with PSVT compared with normotensive patients with PSVT (*P*=NS). Atrial ERPs were slightly shortened in hypertensive patients with PAF (*P*=NS). ###### Effective Refractor Periods in 8 Sites PSVT (n=17) HT With PSVT (n=15) HT With PAF (n=12) *P* Value ------ ------------- --------------------- -------------------- ----------- LSPV 218±26 201±25\* 175±17†§ \<0.0001 LIPV 221±24 202±18\* 184±22†‡ \<0.0001 RSPV 224±22 202±28\* 173±24†§ \<0.0001 RIPV 225±17 206±31\* 183±26†\# \<0.0001 CSp 230±25 242±12 228±9 0.092 CSd 226±19 240±26 224±17 0.117 HRA 217±17 229±25 221±17 0.204 IRA 223±14 232±21 220±14 0.151 PSVT indicates paroxysmal superior ventricular tachycardia; HT, hypertension; PAF, paroxysmal atrial fibrillation; LSPV, left superior pulmonary vein; LIPV, left inferior pulmonary vein; RSPV, right superior pulmonary vein; RIPV, right inferior pulmonary vein; CSp, paroxysmal of coronary sinus vein; CSd, distal of coronary sinus vein; HRA, high right atria; IRA, inferior right atria. \**P*\<0.05, †*P*\<0.01 vs PSVT; ‡*P*\<0.05, §*P*\<0.01 vs HT with PSVT. Increased Heterogeneity of ERPs in the Hypertensive Patients ------------------------------------------------------------ As shown in [Figure 1](#fig01){ref-type="fig"}, dispersion was defined as the difference in ERPs from site to site. Dispersion of ERPs was compared between the LA (CSp and CSd) and PVs (left inferior PV, left superior PV, right inferior PV, right superior PV) (PV‐LA, [Figure 1](#fig01){ref-type="fig"}A), between the LA and RA (HRA and IRA) (LA‐RA, [Figure 1](#fig01){ref-type="fig"}B), and among the RA, LA, and PVs (LA‐RA‐PV, [Figure 1](#fig01){ref-type="fig"}C), respectively. Compared with normotensive patients with PSVT, hypertensive patients with PSVT showed significantly increased dispersion of ERPs either between PVs and LA (67.67±30.64 versus 45.09±12.98, *P*\<0.05) or among the RA, LA, and PVs (86.0±22.85 versus 53.24±13.57, *P*\<0.05). Furthermore, significant changes in ERP dispersion were detected in hypertensive patients with PAF, compared with hypertensive patients with PSVT (92.5±23.4, *P*\<0.01 for PV‐LA, 94.17±21.51, *P*\<0.05 for LA‐RA‐PV versus the hypertensive patients with PSVT) and the normotensive patients with PSVT (*P*\<0.01 for both PV‐LA and LA‐RA‐PV). However, ERP dispersions between LA‐RA were comparable among the 3 groups (*P*=0.67). Increased Intra‐atrial and Interatrial Activation Times in Hypertensive Patients -------------------------------------------------------------------------------- The interatrial (HRA‐CSd) and intra‐atrial (CSp‐CSd) activation times during HRA pacing were slightly prolonged in hypertensive patients with PSVT compared with those in normotensive patients (*P*=0.08 in HRA‐CSd, *P*=0.09 in CSd‐CSp) ([Table 3](#tbl03){ref-type="table"}). However, prolongations became more remarkable and significant in hypertensive patients with PAF (*P*\<0.01 versus hypertensive patients with PSVT, *P*\<0.001 versus normotensive patients). More important was that activation times from PVs to CSp during PV pacing were prolonged significantly in hypertensive patients with PSVT compared with those in normotensive patients (*P*\<0.05) and in hypertensive patients with PAF (*P*\<0.001 versus normotensive patients, *P*\<0.01 versus hypertensive patients with PSVT). ###### Interatrial and Intra‐atrial Conduction Times PSVT (n=17) HT With PSVT (n=15) HT With PAF (n=12) *P* Value ---------- ------------- --------------------- -------------------- ----------- LSPV‐CSp 39±13 51±11\* 67±15†§ \<0.0001 LIPV‐CSp 32±12 40±10\* 54±11†§ \<0.0001 RSPV‐CSp 43±14 53±11\* 70±14†§ \<0.0001 RIPV‐CSp 35±12 42±10 56±11†§ \<0.0001 CSp‐CSd 37±13 44±9 54±13†‡ \<0.01 HRA‐CSd 69±16 79±15 99±10†§ \<0.0001 PSVT indicates paroxysmal superior ventricular tachycardia; HT, hypertension; PAF, paroxysmal atrial fibrillation; LSPV, left superior pulmonary vein; CSp, paroxysmal of coronary sinus vein; LIPV, left inferior pulmonary vein; RSPV, right superior pulmonary vein; RIPV, right inferior pulmonary vein; CSd, distal of coronary sinus vein; HRA, high right atria. \**P*\<0.05, †*P*\<0.01 vs PSVT; ‡*P*\<0.05, §*P*\<0.01 vs HT with PSVT. Increased VWs, Inducibility, and Duration of AF in the Hypertensive Patients ---------------------------------------------------------------------------- AF inducibility and VWs were examined in 3 groups at pacing sites of the left superior PV with programmed pacing (S1S2). The VWs of AF were significantly wider in hypertensive patients than in normotensive patients with PSVT (46±8.9 ms versus 16±4.8 ms, *P*\<0.01), and VWs were even wider in hypertensive patients with PAF (70±14.1 ms versus normotensive patients, *P*\<0.01, versus hypertensive patients with PSVT, *P*\<0.01), as shown in [Figure 2](#fig02){ref-type="fig"}A. ![Increased vulnerability window, and duration of induced‐AF in the 3 groups. A, Increased VW in the hypertensive with PSVT and with PAF. B, Duration of induced nonsustained AF. C, Duration of induced sustained AF. HT indicates hypertension; PAF, paroxysmal atrial fibrillation; PSVT, paroxysmal superior ventricular tachycardia; VW, vulnerable windows of atria. \*\**P*\<0.01 vs PSVT; \#\#*P*\<0.01 vs HT with PSVT.](jah3-3-e001033-g2){#fig02} Nonsustained AF (\<30 seconds) was induced in 3 (18%) of 17 normotensive patients with PSVT, in 7 (47%) of 15 hypertensive patients with PSVT (*P*\<0.05 versus normotensive patients), and in 8 (67%) of 12 hypertensive patients with PAF (*P*\<0.05 versus normotensive patients, *P*=0.132 versus hypertensive patients with PSVT). Compared with normotensive patients, longer durations of induced nonsustained AF were shown in hypertensive patients with PSVT (15.0±5.89 versus 3.6±2.08 seconds in normotensive patients, *P*\<0.01) and with PAF (22.4±5.63 seconds, *P*\<0.01 versus normotensive patients or versus hypertensive patients with PSVT) ([Figure 2](#fig02){ref-type="fig"}B). Moreover, as shown in [Figure 2](#fig02){ref-type="fig"}C, sustained AF (lasting \>30 seconds) was not induced in any of the normotensive patients with PSVT but was inducible in 3 (20%) of 15 hypertensive patients with PSVT (*P*\<0.01 versus normotensive patients) and in 5 (41.67%) of 12 hypertensive patients with PAF (*P*\<0.01 versus normotensive or versus hypertensive patients with PSVT). The average duration of sustained AF was longer in hypertensive patients with PAF (864±226 seconds) than in those with PSVT (90±30 seconds, *P*\<0.01). Dilated PVs in the Hypertensive Patients ---------------------------------------- Anatomic features of the heart were evaluated on echocardiography and computed tomography scanning. As shown in [Table 4](#tbl04){ref-type="table"}, average LV ejection fraction was 64%, with no significant difference among the 3 groups (*P*=0.196) during sinus rhythm. Compared with normotensive patients, hypertensive patients had increased LV mass index (*P*\<0.0001) and thickness (*P*\<0.05). There were no differences in LV end‐diastolic diameter (*P*=0.79), LV end‐systolic diameter (*P*=0.781), and volume index (*P*=0.152) of the LA among the 3 groups. However, compared with normotensive patients with PSVT, the diameters of 4 PVs in hypertensive patients with PSVT were enlarged significantly (*P*\<0.01) and became remarkably large in hypertensive patients with PAF (*P*\<0.0001). ###### Anatomic and Dynamic Features PSVT (n=17) HT With PSVT (n=15) HT With PAF (n=12) *P* Value ----------------------------- ------------- --------------------- -------------------- ----------- Echocardiography LA diameter, mm 34.59±1.46 37.33±6.26 38.33±7.23 0.149 LAVI, mL/m^2^ 36.00±12.03 41.96±10.20 42.40±5.64 0.152 LVEDd, mm 44.59±3.39 45.67±6.15 45.66±4.91 0.79 LVEDs, mm 27.24±2.11 26.6±3.79 27.33±3.08 0.781 LV septal thickness, mm 10.47±1.55 11.6±1.68\* 11.83±1.4\* 0.045 LV mass index, g/m^2^ 98.69±14.01 112.45±16.84\* 115.02±22.92\* \<0.0001 LVEF, % 62±5.5 65.5±6.12 64.4±4.48 0.196 Computed tomography imaging LSPV diameter, mm 17.24±1.35 18.60±1.45\* 20.00±1.75†‡ \<0.0001 LIPV diameter, mm 14.59±1.23 15.67±1.11\* 16.75±1.06†‡ \<0.0001 RSPV diameter, mm 17.65±1.46 19.27±2.05\* 20.83±2.04†‡ \<0.0001 RIPV diameter, mm 14.24±1.39 15.13±0.74\* 16±0.74†‡ \<0.0001 PSVT indicates paroxysmal superior ventricular tachycardia; HT, hypertension; PAF, paroxysmal atrial fibrillation; LA, left atrium; LAVI, left atrial volume index; LVEDd, left ventricular diameter in diastole; LVEDs, left ventricular diameter in systole; LV, left ventricle (ventricular); LVEF, left ventricular ejection fraction; LSPV, left superior pulmonary vein; LIPV, left inferior pulmonary vein; RSPV, right superior pulmonary vein; RIPV, right inferior pulmonary vein. \**P*\<0.05, †*P*\<0.01 vs PSVT; ‡*P*\<0.05 vs HT with PSVT. Discussion ========== Main Findings ------------- In the present study, compared with normotensive patients with PSVT, hypertensive patients with PSVT have evidence of (1) significantly shortened ERP in PVs but not in atria; (2) increased dispersion of ERPs; (3) slowing of interatrial and intra‐atrial conduction velocities, especially conduction from PVs to the LA; (4) increased inducibility and VWs of AF; and (5) enlarged diameters of PVs but not of atria. In addition, these changes were more pronounced in hypertensive patients with PAF than in those with PSVT. Electroanatomic Remodeling of PVs in Hypertensive Patients Predisposes to AF ---------------------------------------------------------------------------- A series of studies have shown the established role of shortened ERP and its increased spatial dispersion heterogeneity in the promotion of AF.^[@b12]--[@b14]^ However, regarding ERPs in hypertensive patients, previous experimental studies indicated inconsistent results. Some studies showed shortened ERPs,^[@b15]--[@b17]^ but others showed prolonged ERPs or no changes in ERPs.^[@b7],[@b18]--[@b19]^ Our findings not only concur with the recently reported findings of Medi et al^[@b7]^(demonstrating prolonged atrial ERP and globally slowed conduction in the RA of hypertensive patients) but also are the first to report that hypertension shortened PV ERPs and slowed conduction from PVs to atria to a greater extent than in atrial ERPs and intra‐atrial conduction. The shortening of PV ERPs was independent of PAF, in which AF may shorten PV ERPs as a mechanism of "AF begets AF."^[@b9],[@b16],[@b20]^ In addition, anatomic remodeling of PVs was detected in hypertensive patients with PSVT, when the function and volume of LV and LA were in normal ranges. This suggests PV remodeling may be the earliest sign of hypertension‐related structural remodeling long before atria are affected, and this is consistent with electrical remodeling in PVs. Therefore, electroanatomic remodeling of PVs could be 1 mechanism by which hypertension predisposes individuals to AF.^[@b15],[@b21]^ Potential Mechanisms of Hypertension in AF ------------------------------------------ ### Trigger activity Previous studies demonstrated the role of PVs in the initiation and maintenance of AF by multiple wavelet reentry and focal (trigger) activities.^[@b20],[@b22]--[@b23]^ In hypertension, persistent elevations of ventricular pressure result in impaired dysfunction of LV diastole, as well as increased intra‐atrial pressure. As a stretch stimulus, increased intra‐atrial pressure can acutely produce afterdepolarizations through stretch‐activated channels.^[@b24]^ Kalifa et al^[@b25]^demonstrated that increased intra‐atrial pressure promoted trigger activity within PVs on a stretch‐related AF mode but not within the LA. Antihypertensive therapy also resulted in a decreased frequency of AF episodes or premature atrial contractions.^[@b26]--[@b27]^ Additionally, in hypertension, the activated sympathetic nervous system and the renin‐angiotensin system shortened action potential duration and delayed conduction, promoting AF.^[@b28]--[@b29]^ Also, any burst of sympathovagal activities could facilitate AF induction by causing phase 3 early afterdepolarizations, resulting in triggered activity.^[@b30]^ ### Multiwave reentry In the present study, diverse or opposite ERPs between atria and PVs in response to hypertension will further increase heterogeneities within the adjoining areas between the LA and PVs (also called the PV antrum). Therefore, these distinct differences in ERPs formed functional conduction delays within the PV antrum, which is also reflected by prolonged conduction times through the PV antrum. Combination of the shortening of refractoriness and slowing of conduction resulted in a shorter atrial wavelength, which increased the maximum number of wavelets with small sizes, established in the multiple wavelet theory of AF.^[@b21],[@b31]--[@b32]^ ### Arrhythmogenic substrate LA dilation is associated with an increased risk of AF. Increased LA size changes its electrophysiological properties and may result in ERP shortening and conduction slowing.^[@b7],[@b18]--[@b19]^ In the Framingham study, the adjusted risk of AF increased by 39% for every 5‐mm increment in LA size.^[@b4]^ And, reduced LA diameter with antihypertension therapy was associated with reduced incidence of new‐onset AF.^[@b26]^ It also reported that 21% of hypertensive patients were found with an enlarged LA without evidence of ventricular hypertrophy.^[@b33]^ The present study indicated that significantly enlarged PVs developed in hypertensive patients with increased inducibility of AF without significant LA changes, which might be an earlier detectable change than the atrial changes. Additionally, PV enlargement became more significant in hypertensive patients with PAF, as indicated by arrhythmogenic PVs.^[@b34]--[@b35]^ Study Limitations ----------------- This was an observational study to investigate the mechanism of increased AF in hypertensive patients who underwent catheter ablation for PSVT or PAF. The patient population may not be comprehensively representative of a hypertensive population. Only consenting patients, who met strict inclusion and exclusion criteria, were enrolled; therefore, patient selection bias may limit clinical adaption of the results. Therefore, a larger study is warranted as the conclusions of this study are limited to poorly controlled hypertensive patients, especially with the relatively small size of the patient population in this study. It would be beneficial to evaluate whether patients with well‐controlled hypertension have PV changes or that, as blood pressure control worsened, PV changes became more pronounced. The sample size may not be sufficient to reach the conclusion that hypertension is the only reason for increased risk of AF to hypertensive patients. However, PV changes in such poorly controlled hypertensive patients may indicate some electroanatomic remodeling earlier than in atrial dimension. There are 2 possible explanations: one is that the electric remodeling reflects the heart\'s functional reservoir, which provides early and fast adaptation to stretch stress, and the other is that the parameters of ERP, VW, and duration of AF are more sensitive to electroanatomic remodeling in PVs than those of atrial dimension. Another limitation of the study was that antihypertensive regimens were not controlled in the 3 groups. In particular, angiotensin‐converting enzyme inhibitors were used more often in hypertensive patients with PAF than in the other 2 groups, which may inhibit the electroanatomic remodeling as previous reported.^[@b36]^ However, changes in hypertensive patients with PAF were more remarkable than in the hypertensive patients with PSVT, which provided important information of early remodeling of PVs in hypertension as a potential therapeutic target in the prevention of AF development. Perspectives ------------ Clinically, both the success rate and long‐term recurrence rate of PV isolation were lower in AF patients with hypertension than those without.^[@b10]^ It has been speculated that there might be other mechanisms behind this association other than the role of PVs.^[@b37]^ However, the present study indicated a measurable phenomenon of electroanatomic remodeling in PVs, detectable earlier than atrial dimensional changes, which may provide a substrate of AF pathogenesis in hypertensive patients. The changes in PVs appear to increase heterogeneity between PVs and atria, thereby promoting AF development. These changes suggest that PV electroanatomic remodeling is one of the (if not the main) mechanism of AF in hypertensive patients in this study. In the development of AF in hypertensive patients, there exists an early quantifiable stage of electroanatomic remodeling not in atria but in PVs. Although the heterogeneous sample study was small, our data suggest such patients sustain a higher risk of AF. Aggressive intervention should be considered, from adequately controlling blood pressure to PV isolation. However, a large, well‐designed study on a cohort of hypertensive patients with long‐term follow‐up would help to solidify the mechanism between early remodeling and AF. Conclusion ========== The present study suggested for the first time, to our knowledge, that hypertensive patients possess shortened ERPs with increased dispersion in PVs, dilated PV diameters, and increased vulnerability and inducibility of AF with prolonged duration compared with normotensive patients with PSVT. The changes became remarkable and dramatic when AF episodes manifest in the hypertensive patient. None. Acknowledgments =============== We thank Dr Mehul Patel for his careful proofreading of the manuscript.
{ "pile_set_name": "PubMed Central" }
The clinical characteristics of coronary artery fistula anomalies in children and adults: A 24-year experience. The aim of our work is to investigate the clinical characteristics of coronary artery fistula (CAF) anomalies in South Vietnam. This is a retrospective analysis of 119 patients with diagnosis of definite CAF between January 1992 and April 2016. The demographic, clinical, echocardiographic, and angiographic characteristics and management of CAF with short-term outcomes are described. The median age was 15 years (range, 1-79 years), with 49 male (41%) and 70 female (59%). There were 77 symptomatic patients (64.7%) and 91 patients (76.5%) who presented with a murmur. The electrocardiogram was abnormal in 45.4% and cardiac enlargement or increased pulmonary vasculature were seen in 76 patients (63.9%) on chest X-ray. The sensitivity of echocardiography for CAF diagnosis was 79%. The source of the fistula was most often from the RCA (54%), most commonly to right atrium (34.5%) or right ventricle (31.1%). In comparison with surgery, transcatheter closure had a shorter hospital length of stay (5.4 ± 3.8 days vs 12.6 ± 6.5 days, P = .02) and better postprocedural left ventricular ejection fraction (67.9 ± 8.1% vs 62.9 ± 6.0%, P = .03). The majority of fistula in this study originated from the RCA and terminated in the right atrium or the right ventricle. Transcatheter and surgical closure are both relatively safe and effective, with the potential for shortened length of hospital stay following transcatheter closure.
{ "pile_set_name": "PubMed Abstracts" }
When most political followers hear “Republican senator” and “maverick,” they probably think of John McCain. He ran as part of a “team of mavericks” with Sarah Palin in 2008, after all. But whether or not McCain deserves the “maverick” label in general, he’s certainly not the Republican senator most likely to cross the aisle. That title belongs to Maine Sen. Susan Collins. Collins has voted against President Trump more than any other Republican senator so far. While she has still voted with Trump’s position most of the time (85 percent), she’s the only GOP senator to vote with Trump less than 90 percent of the time so far. She was the lone Republican to vote against two of Trump’s Cabinet nominees (Betsy DeVos for secretary of education and Scott Pruitt for secretary of the EPA). And she was the only Republican to vote against the repeal of the stream protection rule for mining, even as some Democrats voted for it. Collins’s record indicates that she may end up voting against Trump even more in months to come. From 1997 to 2015, Collins voted with her party a little less than 60 percent of the time in the average Congress. Only five of 225 senators in the average Congress (for whom we have a score) voted with their party less often during that period — and none of those five currently serves in the Senate. Throughout her time in office, Collins has consistently voted against her party’s position more often than the average senator. So where might Collins differentiate herself in the rest of this Congress? Collins has already tried to stop repeal of the Affordable Care Act without a replacement. She co-introduced a replacement package that was middle-of-the-road enough to be called the “Obamacare Forever Act” by the Washington Examiner’s Philip Klein. Another area where Collins could be a thorn in Trump’s side is on immigration: Collins came out forcefully against the now-stalled travel ban, and she could be a vote against him on immigration were he to try to usher a bill through Congress. The bad news for Trump’s opponents is that even if Collins does vote against the president on these issues, it may not be enough. On any vote requiring a bare majority, 51 Republican senators have voted with Trump 90 percent of the time or more.
{ "pile_set_name": "OpenWebText2" }
Swords Against Wizardry Swords Against Wizardry is a fantasy short story collection, first published 1968, by Fritz Leiber and Harry Fischer, featuring their sword and sorcery heroes Fafhrd and the Gray Mouser. Fischer's contribution was limited to ten thousand words of The Lords of Quarmall. The book is chronologically the fourth volume of the complete seven volume edition of the collected stories devoted to the characters. It was first published in paperback format during 1968 by Ace Books company, which reprinted the title numerous times up to October 1990; later paperback editions were issued by ibooks (2003) and Dark Horse (2007). It has been published in the United Kingdom by Grafton (1986). The first hardcover edition was issued by Gregg Press during December 1977. The book has been collected, along with others in the series, in various omnibus editions: Swords' Masters (1990), Lean Times in Lankhmar (1996), The First Book of Lankhmar (2001), and Lankhmar (2008). The book collects four short stories, three of which were originally published in the magazines Fantastic for November 1965 and August 1968 and Fantastic Stories of Imagination for January and February 1964, and one of which first appeared in the book itself. Contents "In the Witch's Tent" (1968) "Stardock" (1965) "The Two Best Thieves in Lankhmar" (1968) "The Lords of Quarmall" (1964) Plot The Fafhrd and Gray Mouser stories concern the lives of two larcenous but likable rogues as they adventure across the fantasy world of Nehwon. In Swords Against Wizardry the duo consult a witch regarding an upcoming adventure ("In the Witch's Tent"); ascend Stardock, the Nehwonian Everest, in search of treasure ("Stardock"); are revealed, as their gains are stolen from them, not to be the best thieves in Lankhmar, as they so smugly deem themselves ("The Two Best Thieves in Lankhmar"); and take service with two opposing claimants to the sorcerous throne of the ancient city of Quarmall ("The Lords of Quarmall"). Relation to other works "The Two Best Thieves in Lankhmar" includes an appearance by Joanna Russ's heroine Alyx. Awards "Stardock" was nominated for the 1966 Hugo Award for Short Fiction. References Category:1968 short story collections Category:Nehwon books Category:Fantasy short story collections Category:Short story collections by Fritz Leiber Category:Ace Books books
{ "pile_set_name": "Wikipedia (en)" }
The Port of Leixoes rests on an artificial harbor off the Atlantic Ocean on Portugal’s northern shores in the town of Matosinhos. The City of Porto can not have a deep-water harbor due to a sandbar that blocks access to the river. The Port of Leixoes, an artificial harbor, is protected by two curved breakwaters. The Port of Leixoes exports the city of Porto’s most famous product, port wine, which was named after the city that makes it. One of the country’s most important seaports, the Port of Leixoes serves the city of Porto some nine kilometers to the south. Porto (or Oporto) is the second biggest city in Portugal and the regional capital of the Porto region. The city’s historic center was recognized by UNESCO as a World Heritage Site in 1996. Porto is the economic and cultural center of the region, home to about 220 thousand people; however, the urban area contains over 1.7 million people. Port History The Port of Leixoes was established in 1890 when the first docks were completed. The Port of Leixoes was expanded again in the 1930s and 1970s. While the Port of Leixoes exported hundreds of thousands of tons of port wines during the 20th Century, it was remodeled to support large-scale container traffic in the late 1990s and can now handle Panamax container ships.
{ "pile_set_name": "Pile-CC" }
Unseen Things The rain drizzled most of the day in New York City on Sunday. It was the kind of day you wanted to be inside, warm and dry. Many of us NYC girls were eagerly awaiting the season premiere of “Sex and the City” so the television got turned on early in my house. As I channel surfed, I saw a brief sound bite of something about animals on 60 Minutes and decided to keep it there, while I waited for Sarah Jessica Parker’s arrival. I am glad I did. Turned out one of the segments was on Harvard University Design Professor John R. Stilgoe, author of Outside Lies Magic: Regaining History and Awareness in Everyday Places. Stilgoe believes that the majority of Harvard students, (and the rest of the population, for that matter) are visually illiterate. That most people lack a sense of visual spontaneity. The reason? Stilgoe states that once people learn to read, they stop looking around. In his book, Stilgoe provides a history of the American landscape: he dissects our visual surroundings and his observations will challenge the way you see electrical grids, manhole covers and fire hydrants (and how they both have evolved graphically over the last one hundred years—this in and of itself is a wonderful history lesson in iron welding), fences, abandoned railroads, vacant lots, front lawns, and trolley pulls. He waxes sentimental over the beauty of a small mass of brass doorbells outside the door of a dilapidated building…some with names, some without. It was all very poignant and necessary…seeing the things that we don’t see but could and should. Then it got a bit disturbing. Stilgoe started talking about all the things we don’t see in marketing. First he told of the (now famous) example of the hidden arrow in the Fedex logo, then he showed a scary example of American Express sending out identical magazines with different covers, one targeted to men (happy man with pretty girl on his arm) and one targeted to women (woman with horse, men behind a fence). Then he revealed one that startled me. Apparently, if you take a “duck walk” (the level that kids see) down the cereal aisle in any supermarket in the world, you will notice that all the eyes of the cereal characters (Snap, Crackle and Pop, Capt’n Crunch, Tony the Tiger, etc) are all looking down, to make eye contact with the children. Apparently, “this is to create an emotional bond early on that will stay with the kids throughout their lives.” So it got me thinking…what else is out there that we see but don’t see? Have you ever been asked to minimize or maximize something more “subliminal” in a design piece? Are you aware of other hidden messages that have happened by accident, like the FedEx logo arrow? And last but not least…if you slow down a minute today, and move more deliberately, can you see anything that you haven’t seen before?
{ "pile_set_name": "OpenWebText2" }
Q: Random linebreaks when using file() I'm creating a flatfile database, in one of my functions that I use to add fields to a pre-existing table, I use file() to get the table, the first line is always contains the fields of the table so I can easily just append the new field to the pre-existing fields public function addFields($table_fields) { // Make sure he opened a connection to the table if(empty($this->table_name)) throw new Exception('There is no connection to a table opened.'); // Make sure table_fields is an array if(is_array($table_fields) === FALSE) throw new Exception('TABLE_FIELDS must be an array'); // Build the data $table_data = file($this->table_name); $table_header = $table_data[0].self::$field_deliemeter; $table_header .= implode(self::$field_deliemeter, $table_fields); $table_data[0] = $table_header; // Put the data in the table file_put_contents($this->table_name, implode(self::$linebreak, $table_data)); } } The problem is that, after adding the fieldname to the pre-existing fieldnames using this $table_data = file($this->table_name); $table_header = $table_data[0].self::$field_deliemeter; $table_header .= implode(self::$field_deliemeter, $table_fields); $table_data[0] = $table_header; The first index which is 0 seems to contain a linebreak, even though file() is supposed to remove that since file implodes by linebreaks so for example, if my table was Name Email Password IP Login_Date somename someemail 123 123 123 Then after running the class by doing this $db = new FlatDB; $fields = array("Last_Click"); $db->openTable('Test'); $db->addFields($fields); It becomes this Name Email Password IP Login_Date Last_Click Ali [email protected] 123 123 123 As you see, it is adding a random linebreak after the first line and I have no idea why is it doing so since file() is supposed to remove linebreaks Note: $field_deliemeter is "\t" Does anyone have any idea why is it doing this? By running a print_r($table_data) before inserting, I get this Array ( [0] => Name Email Password IP Login_Date Last_Click [1] => somename someemail 123 123 123 ) A: "why is it doing so since file() is supposed to remove linebreaks"? Only if you use FILE_IGNORE_NEW_LINES. Check file(): $table_data = file($this->table_name, FILE_IGNORE_NEW_LINES); Returns the file in an array. Each element of the array corresponds to a line in the file, with the newline still attached. Upon failure, file() returns FALSE. Note: Each line in the resulting array will include the line ending, unless FILE_IGNORE_NEW_LINES is used, so you still need to use rtrim() if you do not want the line ending present.
{ "pile_set_name": "StackExchange" }
# Test non-ascii archive members # XFAIL: system-darwin RUN: rm -rf %t && mkdir -p %t/extracted RUN: echo "contents" > %t/£.txt RUN: echo "CREATE %t/mri.ar" > %t/script.mri RUN: echo "ADDMOD %t/£.txt" >> %t/script.mri RUN: echo "SAVE" >> %t/script.mri RUN: llvm-ar -M < %t/script.mri RUN: cd %t/extracted && llvm-ar x %t/mri.ar # This works around problems launching processess that # include arguments with non-ascii characters. # Python on Linux defaults to ASCII encoding unless the # environment specifies otherwise, so it is explicitly set. # The reliance the test has on this locale is not ideal, # however alternate solutions have been difficult due to # behaviour differences with python 2 vs python 3, # and linux vs windows. RUN: env LANG=en_US.UTF-8 %python -c "assert open(u'\U000000A3.txt', 'rb').read() == b'contents\n'"
{ "pile_set_name": "Github" }
Q: App Crashes while processing image in iOS 7 I am working on a image processing app. One can have many layers on images and can save them to disk. Here's the code that does that (TransparentBG.png is 3000x3000 transparent image): CCSprite *blankImage = [CCSprite spriteWithFile:@"assetsFullSize/TransparentBG.png"]; //CCSprite *blankImage = [CCSprite spriteWithFile:@"assets/centerPaneBG.png"]; blankImage.tag=SAVE_IMAGE_BASE_TAG + [[AppManager instance] generateNextSaveImageIndex]; NSLog(@" blankImage.tag = %i",blankImage.tag); NSLog(@" blankImage.size = %@",NSStringFromCGSize(blankImage.contentSize)); for(int i=1; i<[layers count]; i++) { NSLog(@" i = %i",i); ImageFeature *feature = [layers objectAtIndex:i]; CCSprite *layer = (CCSprite *)[self getChildByTag:LAYER_INDEX_BASE + i]; NSLog(@" ********* layer.position = %@",NSStringFromCGPoint(layer.position)); NSLog(@" ********* feature.posX,posYition = %i,%i",feature.posX,feature.posY); // [layer removeFromParent]; // CCSprite *layerCopy = [layer copy]; CCTexture2D *texture = [layer texture]; CCSprite *layerCopy = [CCSprite spriteWithTexture:texture]; layerCopy.anchorPoint = layer.anchorPoint; NSLog(@" anchorPoint = %@",NSStringFromCGPoint(layer.anchorPoint)); // layerCopy.position = ccpAdd(layer.position,ccp(-LEFT_PANE_WIDTH,0)); // layerCopy.position = ccp([self getImageFeature_posX_fomSpritePosition:layer],[self getImageFeature_posY_fomSpritePosition:layer]); layerCopy.position = ccp((feature.posX/3000) * blankImage.contentSize.width,(feature.posY/3000) * blankImage.contentSize.height); layerCopy.position = IS_RETINA ? ccp(feature.posX / 2,feature.posY / 2) : ccp(feature.posX,feature.posY); NSLog(@" ********* layerCopy.position = %@",NSStringFromCGPoint(layerCopy.position)); layerCopy.color = layer.color; layerCopy.scaleX = layer.scaleX / VISUAL_SCALING_FACTOR; layerCopy.scaleY = layer.scaleY / VISUAL_SCALING_FACTOR; layerCopy.rotation = layer.rotation; layerCopy.opacity = layer.opacity; [blankImage addChild:layerCopy z:i tag:layer.tag]; // layer.anchorPoint = ccp(0.5,0.5); // layer.position = ccpAdd(layer.position,ccp(-LEFT_PANE_WIDTH,0)); // [blankImage addChild:layer z:i tag:layer.tag]; } // CCSprite *attribution = [CCSprite spriteWithFile:@"assets/pikpark.png"]; // CCSprite *attribution = [CCSprite spriteWithFile:@"assetsFullSize/pikpark.png"]; // attribution.anchorPoint = ccp(0.5,0.5); // attribution.position = ccp(blankImage.contentSize.width- (attribution.contentSize.width/2.0),attribution.contentSize.height/2.0); // attribution.opacity = 64; // [blankImage addChild:attribution z:8999 tag:ATTRIBUTION]; // blankImage.scale = 300.0/blankImage.contentSize.height; CGPoint p = blankImage.anchorPoint; [blankImage setAnchorPoint:ccp(0,0)]; // CCRenderTexture *renderer = [CCRenderTexture renderTextureWithWidth:300 height:300]; // CCRenderTexture *renderer = [CCRenderTexture renderTextureWithWidth:1500 height:1500]; // CCRenderTexture *renderer = [CCRenderTexture renderTextureWithWidth:3000 height:3000]; CCRenderTexture *renderer = [CCRenderTexture renderTextureWithWidth:blankImage.contentSize.width height:blankImage.contentSize.height]; [renderer begin]; [blankImage visit]; [renderer end]; [blankImage setAnchorPoint:p]; UIImage *thumbImage = [renderer getUIImage]; NSLog(@" thumbImage.size = %@",NSStringFromCGSize([thumbImage size])); NSString *key = [NSString stringWithFormat:@"%i",blankImage.tag]; NSLog(@" key = %@",key); CCSprite *renderedSprite = [CCSprite spriteWithCGImage:thumbImage.CGImage key:key]; NSLog(@" width=%3f height=%3f",renderedSprite.contentSize.width,renderedSprite.contentSize.height); // And save to UserDocs NSArray *paths = NSSearchPathForDirectoriesInDomains(NSDocumentDirectory,NSUserDomainMask,YES); NSString *documentsDirectory = [paths objectAtIndex:0]; NSString *galleryDirectory = [documentsDirectory stringByAppendingPathComponent:@"gallery"]; NSLog(@" galleryDirectory = %@",galleryDirectory); NSString *saveFileName = [NSString stringWithFormat:@"image_%i.png",blankImage.tag]; NSLog(@" saveFileName = %@",saveFileName); NSString *galleryPath = [galleryDirectory stringByAppendingPathComponent:saveFileName]; NSLog(@" galleryPath = %@",galleryPath); NSError *error; NSData *imageData = UIImagePNGRepresentation(thumbImage); [imageData writeToFile:galleryPath options:NULL error:&error];// atomically:NO]; NSLog(@" GALLERY IMAGE SAVED!"); I have tested it on the simulator, and works fine. But when I test it on my iPad2, it crashes giving memory pressure fatal exception. Through breakpoints i can see that the following line is making the app crash giving the memory pressure exception from the above set of code. UIImage *thumbImage = [renderer getUIImage]; If I change the size of the CCRenderTexture *renderer to 300x300 the app stop crashing. But it severely screws with the quality and size of the image being saved. 3000x3000 generates superb quality images. I tried using despatch_async but got no success with that. Is there anyway I can work around the memory pressure issue? Please help. A: A 3000x3000 texture consumes over 34 Megabytes of texture memory. You create a texture from the image (x1). Then you create a render texture for rendering (x2). Then you create a UIImage from the render texture (x3). Finally you create a NSData with UIImagePNGRepresentation (x4). So the same texture memory is held in various buffers in memory at this point in time, at least 4 times = 136 MB. I say "at least" because some texture loading inefficiencies are known in cocos2d and may exist in UIImage etc as well. For example creating a CCTexture2D may actually create two buffers of the same size, so real memory usage could be 170 MB. Run Instruments to find out how much memory is really used. One thing you can try is to separate the individual parts to allow temporary buffer being freed from memory. For example after loading the CCTexture2D, don't create the sprite and render texture right away but dispatch of performSelectorInBackground:afterDelay: with a delay of maybe a 20th of a second. You can do the same after creating the UIImage from render texture so that the PNG representation is put on hold for another fraction of a second.
{ "pile_set_name": "StackExchange" }
Follow us Account John Hegarty launches incubator Sir John Hegarty and the investment specialist Tom Teichman are launching an incubator business called The Garage and have bought a townhouse in Soho to hothouse start-ups at seed stage. The Garage: Teichman (l) and Hegarty are seeking start-ups with disruptive business ideas The venture will offer cut-price desk space in The Garage’s office, business advice and up to £50,000 to chosen start-ups, in return for a minority share of their business. Hegarty said The Garage would invest in companies that fit three criteria: "They have to have an idea that’s disruptive to a current business model. The idea needs to be scalable and we need to like the people involved." Hegarty is a co-founder of Bartle Bogle Hegarty, where he has spent 30 years helping clients grow their brands. Teichman is the founder of Spark Ventures, which has backed Notonthehighstreet.com, Lastminute.com and Moshi Monsters, among others. The Garage’s start-ups will also receive consultancy from other experienced business names, including the Moshi Monsters founder, Michael Acton Smith, and Holly Tucker, who launched Not­onthehighstreet.com. Nick Kendall and Kevin Brown, who worked with Hegarty at BBH, will provide media and marketing advice. Crowdcube will also be based in The Garage’s office and will offer the entrepreneurs lectures and events.
{ "pile_set_name": "Pile-CC" }
Hong Kong Sees 20 IPOs From Mainland by Dec. 31 While about 110 companies are seeking approval to list their shares and about 40 have permission to go ahead, between 10 and 20 firms, mostly from the mainland, are likely to complete IPOs by Dec. 31, said Lawrence Fok, chief marketing officer for the Hong Kong Exchange and Clearing Ltd. Hong Kong’s benchmark measure for mainland companies climbed more than 10 percent last week while the Bloomberg China-US 55 Index of Chinese stocks in the U.S. rose 6.5 percent. “Even if more and more state-owned enterprises are listing on our exchange, the next big wave will be the private enterprises,” Fok said in an interview Dec. 2 in New York. “Some very successful private enterprises, especially in the consumer business, are looking to tap the capital market.” Some companies are in a rush to catch “the last train” in 2011 for IPOs even amid “poor” market conditions on concern that 2012 might be worse, Francis Lun, managing director at Lyncean Holdings Ltd. in Hong Kong said in an interview with Bloomberg Television Nov. 29. “If you get the money now, you can do a lot of things. You can buy distressed assets, for example.”
{ "pile_set_name": "Pile-CC" }
Q: Make JFileChooser start in a folder inside its own .jar I have a program that I pack into a .jar archive. At the top level in the archive I have the main class and a folder called images. How can I make a JFileChooser start in the image folder inside the .jar archive? If I use JFileChooser open = new JFileChooser("images"); it will start in a folder called images OUTSIDE the archive, but thats not what I want. A: JFileChooser works with filesystem, it does not treat jar/zip files as filesystem. You need to implement your own class to navigate your jar-file. Consider Apache VFS project.
{ "pile_set_name": "StackExchange" }
プロの料理人や料理研究家によるレシピを中心に検索できるサービス「Quugle」が注目を集めている。「クックパッドを除外し、プロの本格的なレシピを簡単に探せる」と好評だ。 Quugle Quugleだとプロのレシピばかりヒットする Googleで「料理名」+「レシピ」で検索すると、必ずといっていいほどクックパッドのレシピが上位に並ぶ。有用なものもあるが、プロの本格的なレシピを知りたい人には不便だ。 Quugleの開発者は、「Web上には『無責任なレシピ』が無数に転がっており、優良なレシピが埋もれてしまっていると指摘。「素晴らしいレシピがなるべく短時間でストレス無く発見出来るよう」Googleのカスタム検索を2カ月間かけて最適化し、開発したという。 プロのレシピを中心に収録するが、「プロでなくとも、料理愛を感じるレシピサイトやブログは積極的に検索エンジンに登録している」という。サービスは進化を続けており、要望があれば「#Quugle」でブログやSNSなどに書き込んでもらうよう、開発者は呼びかけている。
{ "pile_set_name": "OpenWebText2" }
BaconBizConf 2013: Bootstrapping Sketchnotes - joelhooks http://joelhooks.com/blog/2013/06/06/my-sketchnotes-and-thoughts-from-baconbizconf-2013/ ====== marcusneto Absolutely amazing. Love these. Even showed them to my oldest son as he likes to draw. ------ urlwolf Idea: a subreddit or subHN (if that existed) for bootstrappers? ------ mustard76 These notes are frickin awesome! Thanks. ------ leonardsouza Nice!
{ "pile_set_name": "HackerNews" }
Login Registration Thank you for registering. An email has been dispatched to your Email ID with details of your User ID and Password to use your account. If you donot receive this email in your inbox, please check your spam mailbox. If it is not there, please have your mail administrator to check your server filters and make sure the messages from TheLawWeekly.com domain are not blocked.
{ "pile_set_name": "Pile-CC" }
Q: How to position a def for a sum of entries in TKINTER I'm trying to get a sum of t1 and t2 after pressing button b1. However, I cannot figure out where to position the def sum(self): As it currently sits in the code I am getting the error TypeError: sum() missing 1 required positional argument: 'self' after inputting in t1 and t2 then pressing b1. from tkinter import * import tkinter as tk class Example(tk.Frame): def __init__(self, root): tk.Frame.__init__(self, root) self.canvas = tk.Canvas(root, borderwidth=0, background="#ffffff") root.geometry("1000x500") self.frame = tk.Frame(self.canvas, background="#ffffff") self.vsb = tk.Scrollbar(root, orient="vertical", command=self.canvas.yview) self.canvas.configure(yscrollcommand=self.vsb.set) self.vsb.pack(side="right", fill="y") self.canvas.pack(side="left", fill="both", expand=True) self.canvas.create_window((4,4), window=self.frame, anchor="nw", tags="self.frame") self.populate() def populate(self): l1=Label(self.frame,text="First Number") l1.grid(row=0,column=0) t1=Entry(self.frame) t1.grid(row=0,column=1) l2=Label(self.frame,text="Second Number") l2.grid(row=1,column=0) t2=Entry(self.frame) t2.grid(row=1,column=1) l3=Label(self.frame,text="Result") l3.grid(row=2,column=0) t3=Entry(self.frame) t3.grid(row=2,column=1) b1=Button(self.frame,text="Click For SUM",command=sum) b1.grid(row=3,column=1) def onFrameConfigure(self, event): '''Reset the scroll region to encompass the inner frame''' self.canvas.configure(scrollregion=self.canvas.bbox("all")) def sum(self): a=int(self.t1.get()) b=int(self.t2.get()) c=a+b self.t3.insert(0,c) if __name__ == "__main__": root=tk.Tk() Example(root).pack(side="top", fill="both", expand=True) root.mainloop() A: The function is expecting the parameter self. In python, class methods (unless explicitly decorated with @staticmethod) are automatically passed self ( the object calling the function) as the first parameter. Your first issue is one of indentation: sum(self) is not indented and thus not interpreted as being a method of the Example class, and neither is onFrameConfigure; you need to indent both of those to be at the same indentation level as populate() Even after you fix that, you'll run into another problem: You also need to assign variables to the class when you create them in populate(self), otherwise they will only exist in the scope of that function, and you won't have a good way to access them. you also need to change the command. Since you're calling a method you need to declare the appropriate namespace (self): def populate(self): self.l1=Label(self.frame,text="First Number") self.l1.grid(row=0,column=0) ... self.b1=Button(self.frame,text="Click For SUM", command=self.sum) self.b1.grid(row=3,column=1)
{ "pile_set_name": "StackExchange" }
Prognosis of Indirect Composite Resin Cuspal Coverage on Endodontically Treated Premolars and Molars: An In Vivo Prospective Study. This prospective clinical study evaluated the success rate of indirect composite resin cuspal coverage on endodontically treated molars and premolars and the survival rate of the restored teeth. One hundred fifty endodontically treated teeth were restored with total resin cuspal coverage and randomly selected for the study. Patients were recalled after 2 to 5 years for clinical evaluation. Data were subjected to standard tests of statistical correlations using Spearman test. Out of the 150 teeth, 84 were molars and 66 were premolars. Of these teeth, 58.7% had mesio-occlusal-distal (MOD) cavities, 20.7% had mesio-occlusal (MO), and 20.7% had occlusal-distal (OD). A build-up procedure was performed in 51.3% of the teeth, and buccal veneer composite resins were placed at the margins of 96.7% of the teeth. Out of the 150 teeth, 30 (20%) presented margin discoloration, 3 teeth (2%) had restoration reparable fractures, 2 teeth (1.3%) had restoration irreparable fractures, and 1 tooth (0.7%) exhibited secondary recurrent caries. The opposing arch that occluded with the treated teeth presented 58% natural teeth (no restoration material), 26.7% ceramic crowns, and 15.3% implant-supported ceramic crowns. Statistically significant differences (p = 0.018) between irreparable restoration fractures and the type of support material present in the opposing arch were found. In a period of up to 5 years, the resin cuspal coverage of endodontic treated teeth had a success rate of 96%, while the tooth survival rate was 100%. The type of support material on the opposing arch may influence the longevity of the restoration of endodontically treated teeth.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to increase downloading speed I am using Ubuntu 12.04 . and I use Firefox for browsing and downloading . i would like to increase downloading speed. How can i do increase downloading speed ? A: uGET uses curl and aria2 plugins to maximize speed with multiple connections. As far as I can tell, it provides the highest speeds, never reached by other downloaders, except the non-free Flareget. (Without it I would have not been able to see the top download speed of my internet connection.) Integration with Firefox is done automatically if FlashGot in Firefox is installed. The needed settings are: Right click a category (or better All category), 'Default new download' set number of Max connections ...up to 16. Edit-Settings-Pluggings, plugins matching order: curl+aria2 Xtreme Download Manager - was updated and looks very impressive. It can use up to 32 segments per download! - but for some reason, comparing alternatively on the same test-iso download, the 32-connection speed was significantly under that of uGet (with only 12-connections). It uses Java and looks a bit different than IDM and uGet. It uses some memory but not too much (see the java line in the conky to the right): It is set to start by default with the system but that cannot be disabled from within the program; so you need to disable that at system level if you want. Axel is a CLI program, my favorite at some point (now, it oddly seems unable to capture youtube videos, maybe due to a change in the way Youtube operates and to Axel not keepeing the pace with that). It will download each file from multiple servers (if available), thus increasing significantly the download speed. sudo apt-get install axel Install FlashGot addon in Firefox Set Axel in Flashgot options as the main downloader or just for capturing media. Flareget deserves to be mentioned, although the number of connections per file vary between 4 and 16 depending on the version and license. Even the minimum number of connections will significantly increase speed, but the latest versions will limit (after a trial period) to just two connections any download above 25 MB. It seems to have a smaller memory footprint. FlashGot addon for Firefox is a very good way of redirecting the browser downloads towards external downloaders like those mentioned.
{ "pile_set_name": "StackExchange" }
ivided by o? 1 Suppose 2*i - 19 = 5*p, -5*i + 2*p + 12 = -2*i. Suppose -i*y + 539 - 192 = 3*c, y = -c + 115. What is the remainder when c is divided by (-4 - 9/(-2))*34? 15 What is the remainder when -276*16/((-512)/40) is divided by 169? 7 Let k = 395 - 447. Let z = 6 - 3. Calculate the remainder when (z - (-123)/(-39)) + (-1204)/k is divided by 3. 2 Let o(d) = -7*d + 87. Let k be o(16). Calculate the remainder when 152 is divided by k/10*310/(-25). 28 Suppose -14*y = 41*y - 564 - 316. What is the remainder when 312 is divided by y? 8 Suppose -16*k - 1861 = -5861. Let t = -196 + k. Calculate the remainder when t is divided by 21. 12 Let j = 9106 + -8992. What is the remainder when 227 is divided by j? 113 Let s = 36162 + -35982. What is the remainder when 7916 is divided by s? 176 Let i(g) = -12*g - 50. Let r be i(-4). Let b(f) = -42*f - 43. Calculate the remainder when 163 is divided by b(r). 40 Let p(y) = 264*y + 5626. What is the remainder when p(-19) is divided by 285? 40 What is the remainder when 3061/9 - 151/1359 is divided by 87? 79 Let y = -1380 + 1470. What is the remainder when 532 is divided by y? 82 Suppose -3*t = w - 31, 3*t + 46 + 95 = 3*w. Let h = w - 25. Let r(u) = -u**3 + 38*u**2 + 58*u - 2192. Calculate the remainder when h is divided by r(38). 6 Suppose 0 = -5*b - 4*l + 36, -9 = -2*b + 4*l - 17. Suppose -3*x = 2*q - 56, 2*q - b*x - 32 = -x. What is the remainder when q is divided by 4? 2 Let o(z) = 2*z**3 + 3*z + 3. What is the remainder when 70 is divided by o(0)? 1 Let a be (-2)/14 + (-1034)/14. Let o = 77 + a. Suppose -o*w + 130 = -59. Calculate the remainder when w is divided by 14. 7 Let p(v) = -3*v**3 - 49*v**2 + 15*v - 21. Let r = 5 - -14. Calculate the remainder when p(-17) is divided by r. 17 Calculate the remainder when 192 is divided by (-315)/(-45) + (1 - (-6 + -1)). 12 What is the remainder when 192 is divided by 14 + 3 + -16 + 19? 12 Let x(w) = -w**2 - 14*w - 2. Let d be x(-11). Suppose 2*y = 41 + d. Let p = y + -26. What is the remainder when 19 is divided by p? 9 Let r(c) = c**3 + 7*c**2 - 12*c + 3. What is the remainder when 2591 is divided by r(2)? 11 Suppose 58 = 4*g - 2*g. Suppose h + 85 = 134. Suppose 3*q - h = -f, -12*q - 5*f + 85 = -7*q. What is the remainder when g is divided by q? 13 Suppose 11*g + 1187 - 3442 = 0. Let v = 353 - g. Calculate the remainder when v is divided by 76. 72 Let c(m) = -m**3 + 18*m**2 - 62*m + 212. Calculate the remainder when 1168 is divided by c(12). 172 Let u = 28 + -1. Suppose -6*i + u + 45 = 0. Calculate the remainder when ((-18)/15)/(i/(-440)) is divided by 15. 14 Suppose -5*h + u = -7, -202*h - 5*u = -204*h - 11. Calculate the remainder when 97 is divided by h. 1 Let u(g) be the first derivative of g**4/4 + 17*g**3/3 + 6*g**2 - 53*g + 149. Calculate the remainder when 47 is divided by u(-16). 3 Let b(j) = -23*j + 25. Let h(f) = -2*f**2 - f + 12. Suppose 5*c + 28 = 28. Calculate the remainder when b(-3) is divided by h(c). 10 Let r be (4/3)/(287/(-42) + 7). Suppose -r*k - 70 = -15*k. Let t = -40 + 74. Calculate the remainder when t is divided by k. 4 Let g be (4 - (130 - 0)) + 0. Let v = g + 56. Let a = v + 106. What is the remainder when 95 is divided by a? 23 Let n(x) = -4*x**2 - 35*x - 39. Let i(q) = -2*q**3 - q**2 + 3*q + 4. What is the remainder when i(-4) is divided by n(-6)? 23 Suppose 328 = 29*j - 73 + 111. Calculate the remainder when 81 is divided by j. 1 Let c(b) = b**3 - 7*b**2 + 4*b - 4. What is the remainder when c(8) is divided by 820/21 + (-212)/4452? 14 Suppose -13*p = -6017 - 4513 - 6851. Calculate the remainder when p is divided by 330. 17 Let n be -2 - 21/(-3 - 0). Suppose 5*x = -5*u + 115, -2*u - 3*x = -n*u + 39. Suppose 0 = -4*c + 7*c - 90. Calculate the remainder when c is divided by u. 12 Suppose -15*l - 48 = -21*l. Suppose 4*y = -5*h + 245, 5*h + y = 129 + 101. What is the remainder when h is divided by l? 5 Let d = 195 + -171. Calculate the remainder when (22/(-6))/(2/(-78)) is divided by d. 23 Let y = 4561 - 4391. Calculate the remainder when 508 is divided by y. 168 Suppose -45 = 3*l - 27. Let f(s) = 8*s**2 + 28*s + 138. Calculate the remainder when f(l) is divided by 65. 63 Suppose 4 = -4*x + 56. What is the remainder when ((-12)/(-2) - (-238 + 76)) + -14 is divided by x? 11 What is the remainder when 2445 is divided by (404/(-303))/(1/(-27))? 33 Let q = 4669 + -4613. Calculate the remainder when 369 is divided by q. 33 Suppose -8*l + 452 + 220 = 0. Let a = l + -43. Calculate the remainder when a is divided by 23. 18 Let n be (-47)/(-7) + (-10)/(-35). Suppose 0 = -h + m - n, h = -h - 5*m. What is the remainder when 3/h + (324/15 - -3) is divided by 15? 9 Suppose 0 = -2*j - j - 21. Let u = j + 17. Suppose -261 - 55 = -158*n. Calculate the remainder when u is divided by n. 0 Suppose 83*o = -56*o + 39893. Calculate the remainder when o is divided by 27. 17 Let s = 25100 - 25022. What is the remainder when 4749 is divided by s? 69 Suppose 7*q - 450 = 10*q. Let l be q/(-60) - (-1)/2. Suppose d - 124 = -l*d. What is the remainder when 122 is divided by d? 29 Let b be ((-8)/40)/(4/20). Let n(z) = -43*z**3 - 2*z**2 - 2*z. What is the remainder when n(b) is divided by 9? 7 Let f(n) = n**3 + 11*n**2 - 9*n - 44. What is the remainder when f(-10) is divided by 4? 2 Let u be (-10432)/(-16)*1/(-2). Let y = u - -533. Calculate the remainder when y is divided by 18. 9 Let o be (-3291 - (-6)/3) + 10 + -6. Calculate the remainder when (-1)/(-3) + (5 - o/27) is divided by 5. 2 Suppose -105 = -6*v - 21. Suppose v*a - 339 = 11*a. What is the remainder when a is divided by 15? 8 Let g(c) = -62*c + 3335. What is the remainder when g(52) is divided by 228/5 - 4/(-10)? 19 Let l = 1701 - 1694. Calculate the remainder when 7 is divided by l. 0 Let w = 3614 + -5582. Calculate the remainder when (w/(-26))/2 - 18/(-117) is divided by 1. 0 Calculate the remainder when 1822 is divided by ((42/(-105))/((-4)/(-365)))/((-2)/4). 70 Let u(i) = 16*i**2 - 120*i + 1156. Calculate the remainder when u(9) is divided by 81. 76 Let d = 641 - -141. Suppose 3*b + 299 = 15*w - 13*w, 4*b = -5*w + d. What is the remainder when w is divided by 54? 46 Let z = 12673 + -12600. Calculate the remainder when 4/(-14) + (-3061)/(-7) is divided by z. 72 Let i(q) = -q**2 - 16*q - 13. Suppose 2*n = 3*m + 39, -4*m - 18 = -3*m + n. Let v be i(m). Calculate the remainder when 35 is divided by -1 - -8 - 5/((-5)/v). 8 Suppose -4*x - 44 = 3*g + g, -5*g - 5 = 0. Let a(r) = -55*r + 196. Let n be a(4). Calculate the remainder when 9 is divided by n/x*(1/(-2) - -3). 3 Suppose 0*u + 3*u - 267 = 0. Let m = -43 + u. Calculate the remainder when m is divided by (-24 + 8)*3/(-18)*3. 6 Suppose -t + 4*f = -5*t + 16, -4*f = -4*t + 16. What is the remainder when 23 is divided by (t - 8)/(-4 + 30/9)? 5 Let h = 377 + -346. Let r(d) = d**2 - 26*d + 149. Calculate the remainder when r(h) is divided by 61. 60 Let u(s) = s**2 + 7*s + 7. Let v be (1*-3)/((-12)/8)*-4. Calculate the remainder when 116 is divided by u(v). 11 Let q be 2/4*0/6. Let k be (-304 + (2 - q))/((-8)/4). Suppose 5*x + 292 = 3*m, k = -5*m - 2*x + 679. What is the remainder when m is divided by 36? 32 Let x = 13428 - 13253. Calculate the remainder when 671 is divided by x. 146 Let r(j) = -2*j. Let s be r(2). Let z be -2*-7*2/s. Let u(o) = -o**2 - 10*o - 6. Calculate the remainder when 40 is divided by u(z). 10 Let c = 256 - 259. What is the remainder when 66 is divided by 24 - (4 + (c - 1))*-1? 18 What is the remainder when 771 is divided by ((-82)/4)/(19 - 156/8)? 33 Let q(x) = x**2 - 35*x - 53. Let m = 174 + -137. Calculate the remainder when 80 is divided by q(m). 17 Suppose -15*v + 9*v + 204 = 0. Let l(p) = -4 + p**2 + 33*p**3 - 4*p + 1 - v*p**3. What is the remainder when 48 is divided by l(-2)? 14 Let j(o) = -o**3 - 20*o**2 + 17*o + 19. Let c be j(-20). Let i be c*(-4 + 6 + -3). Suppose -i - 113 = -14*g. Calculate the remainder when 59 is divided by g. 28 Let n(l) = l**2 + 12*l + 381. Let i be (2 + 0 + -2)/((-50)/(-50)). Calculate the remainder when n(i) is divided by 16. 13 Let g = 1008 - 442. What is the remainder when g is divided by 32? 22 Let f(z) = -49*z + 17. Suppose -538*x + 536*x = 0. What is the remainder when ((-8)/6)/(1/(-33)) is div
{ "pile_set_name": "DM Mathematics" }
All photos contained in this article were shot by CCT Solutions/Mike Pannone, and are copyrighted. The following article is property of Mike Pannone and DefenseReview.com (DR) and is copyrighted material. If you are reading this article on another website other than DefenseReview.com, please email us the website address/URL (where the unauthorized DR article reprint is located) at defrev (at) gmail (dot) com. Thank you. By Mike Pannone July 5, 2013 Last updated on 7/05/13. Background I was at my local range shooting a few months back, and one of the club members came up to watch some of the drills I was shooting on steel. He looked at the pistol and the exchange went like this: -"It sounds like you’re having a good day. What are you shooting?" -"CZ P-07." -"Never heard of it? How does it run?" -"It’s the best pistol nobody knows about." My first experience with CZ pistols was in the Special Forces Qualification Course as an 18B – Special Forces Weapons Sergeant. In our light weapons portion, we had various Eastern Bloc pistols, the CZ 75 being one of them. I saw them again only a year later in Thailand while conducting training with the Royal Thai Special Forces. They had some extremely worn CZ 75’s but every one of them ran great. I was impressed with their durability and accuracy considering the shape they were in. Since fielding in 1975, over 1 million CZ 75’s have been made, and it is the most common pistol in use worldwide by military and law enforcement organizations. Fast forward 15 years to when I shot an SP01 at my local range in Tucson, AZ for the first time. I was instantly hooked, and within a week went to the CZ Custom Shop in Mesa to have them build me up one. 20,000 rounds on that gun alone and 5 years later, and I bought a 9mm P-07, my 7th CZ pistol. But this one is different. The P-07 Duty is a relatively new (2009) polymer-framed pistol from the renown Czech weapons company Česká Zbrojovka Uherský Brod, and marketed in the US by CZ-USA. It's extremely well priced for a high quality pistol from a big name company ($496.00 MSRP). Design The CZ P-07 Duty tactical pistol is a locked-breach, short-recoil operated design with a firing pin safety and an integral M1913 Picatinny railed dustcover. The hood of the barrel locks into the slide like a Glock or Sig and is unlocked via a camming surface below the chamber that mates with a camming surface on the locking block in the frame again like a Glock or Sig. The pistol's Omega trigger system is a simplified version of the CZ-75 trigger mechanism and has a frame mounted safety or de-cocker that is end-user-convertible, depending on which you prefer. It’s comparable in size to a Glock 19 and has a new magazine design allowing a flush fitting magazine of 16 rounds. The stats for comparison: Dimensions: CZ P-07 Glock 19 (G19) Weight 1.700 lbs. 1.31lbs Overall Length 7.300” 6.85 in Barrel Length 3.800 4.02 in Height 5.100” 5.00 in Width 1.500” 1.18 in Capacity 16 + 1 15 + 1 Reliability and Durability The P07 Duty I have has proven to be extremely reliable and durable. I have more than 7000 rounds through it and have yet to encounter any pistol-related malfunction. By “pistol-related” I mean a mechanical failure of a properly maintained pistol with quality ammunition and good magazines. Any unmaintained weapon will eventually fail, and magazines are always the most failure-prone part of a quality firearm. Recently, I shot 900 rounds of Wolf 9mm ammo that was given to me. Over three sessions in 3 consecutive days without cleaning or lubricating the pistol (just to see how it would do), there were no issues, even though the guns internals were absolutely filled with un-burnt powder residue. The only stoppages were 2 failures to feed, where the round stopped on the feed ramp due to mud-like fouling. The "tap" of a "tap-rack" drill released the slide each time. As far as durability is concerned, in 7K rounds, all I have done is clean it on average every 500-700 rounds fired and put more ammunition in it. Accuracy and Shootability My P-07 pistol came with white-outline sights, which I immediately had replaced with a fiber-optic front and metal combat fixed rear at the CZ Custom Shop. It is also available with tritium night sights for those so inclined. A staple of my pistol training is to start and end each session with a string of 25-yard slow fire on a standard NRA B-8 target. I have been able to post mid-to-high 90’s on this, but I haven’t gotten a 100…yet. I have several 97’s and a 98, with the lowest score being a 92. A former teammate from Special Forces who is also my senior instructor at CTT-Solutions (Kyle Raisbeck) just purchased one with tritium sights and told me he can reliably hit an A-zone steel at 50m with little difficulty right out of the box. Mine has performed likewise. Trigger I'm a fan of double action first shot pistols for carry as the longer and heavier first shot is an inherent safety like a revolver and if reasonable in weight is not a detractor at all. I like DA/SA, SA and striker fired pistols equally but for different reasons with different applications. One sage piece of wisdom I learned long ago; the pistol you train properly with the most is the most effective one for you. The fairytale that this or that trigger is “the best” comes from people who would have you believe if you have the “right gun” it makes a big difference or can make up for poor training. Having shot the Beretta M9 extensively in SF (and having heard every complaint about it under the sun)I have long since learned that double action is not obsolete, outdated or undesirable but contrary to common myths and misconceptions it is simply different. Case in point: with a Beretta 92F-pattern gun (actually an Elite II), Ben Stoeger won the 2011 USPSA Production class National Championship. Here are trigger-pull weights right out of the box on a brand new CZ P07 Duty with 100 rounds through it. The average trigger pull (of ten) on a Lyman trigger pull gauge: • Double action- 6.75 lbs. • Single action- 3. 28 lbs. Shooting all double action I was able to hit a 6” plate at 25m support hand only 6/10 strong hand only 7/10 and freestyle 10/10 when I took my time. One-shot draws at 10m from surrender position and a Blade-Tech Eclipse holster, I was able to average 1.22 seconds. From surrender, four 5-shot strings on a 6” x 11” A-zone plate @20m, average time was 3.65 seconds with 18 out of 20 hits (90%) and no more than 1 miss in a string. My shot-to-shot slide-lock reload times on an A-zone average for 20 repetitions was 1.63 seconds with 6 shots dropped of 40 (85%). Even if I blow it completely, I can still keep it under 3.00 seconds. The pistol handles well in every regard: accuracy, single shots from the holster for speed and strings of 5 at 20m. Some informal video’s I took during training from my YouTube Channel for reference: http://www.youtube.com/channel/UC55QQT56x_RtqZy1fZ_p4cA Summary • Reliability – 7000+rds without a malfunction (bar extremely fouled gun using 900rds of Wolf ammo with no maintenance) • Durability – 7000+rds without any parts breakage • Safety – double action first shot, de-cocker and firing pin safety • Shootability – speed drills are on par with any other guns in its class • Accuracy – capable of shooting solid 25 yard Bullseye scores stock. The gun far exceeds the accuracy of some big name pistols with a much higher price tag. • Capacity – comparable size with Glock 19 but holds one more round • Cost – $496 vs. $600+ for comparable high quality mid-size pistols Accessories • Holsters – I am extremely happy with the Blade-tech Eclipse and Kyle has been just as happy with the Raven Concealment Systems Phantom. • Extended capacity base pads – CZ makes readily available high quality +2 plates • Sights – (fiber optic and tritium) • Flashlight – I use an X300 with the DG-11 tape switch and it fits well. • Customer service – CZ-USA has been easy to work with, and in my interactions they have been nothing but polite, prompt and professional. The CZ Custom Shop is staffed with high-level competitive shooters from world champion shooter and icon of USPSA Angus Hobdell to multiple shooters that are USPSA rated Master and Grand Master class competitors. This is a refreshing change, and it makes getting work done or getting a new gun infinitely easier. And, they build guns you'll want to hand down to your kids–after you're gone, though. I am convinced that for a personal protection firearm, the CZ P-07 Duty combat pistol is equal to anything out there and better than most. The reliability, durability, safety, shootability, accuracy, capacity and cost make it a win in every category for a self-defense/concealed carry pistol. The smooth double-action first shot is an inherent safety and is less likely to be inadvertently actuated under stress by a less experienced shooter. For an experienced shooter, it is a pleasant gun to carry and shoot, handles extremely well and is truly bomb-proof durable. At $496 MSRP (and readily available for less than that), it’s a steal. Truly the best gun nobody knows about…that is until now. About the Author: Michael Pannone (Mike Pannone) is currently the owner/operator of, and senior instructor for, CTT Solutions, which is a tactical training (including tactical shooting) and consulting firm. He's also an instructor with Alias Training & Security Services, and a certified Colt Armorer. Mr. Pannone is a former operational member of U.S. Marine Force Reconnaissance, U.S. Army Special Forces (SF), and specially selected elements of the Joint Special Operations Command. He has participated in stabilization, combat, and high risk protection operations in support of U.S. policies throughout the word as both an active duty military member, and a civilian contractor. During his military career, Mr. Pannone was the Distinguished Honor Graduate of a Level 1 SOTIC held at Ft Bragg. He currently instructs U.S. military, law enforcement (LE), and private citizens around the country as an adjunct instructor with several different organizations. He can be contacted via e-mail at [email protected] Company Contact Info: Mike Pannone CTT Solutions E-mail: [email protected] Website: http://www.ctt-solutions.com Stuart Wong Ghost Products Inc. CZ Custom Shop 1008 S. Center St. Mesa, AZ 85210 Phone: 480-969-1311 Fax: 480-969-9687 Website: http://www.czcustom.com CZ-USA P.O. Box 171073 Kansas City, KS 66117-0073 Toll-free: 1-800-955-4486 Phone: (913) 321-1811 Fax: (913) 321-2251 General Info: [email protected] Warranty Dept: [email protected] Custom Work: [email protected] Webstore: [email protected] Website: http://www.cz-usa.com Dan Wesson 65 Borden Ave. Norwich, NY 13815 Phone: 607-336-1174 Fax: 607-336-2730 Parts & Customer Svc E-mail: [email protected] © Copyright 2013 Mike Pannone and DefenseReview.com (DR). All rights reserved. This material may not be published, broadcast, rewritten or redistributed without receiving permission and providing proper credit and appropriate links. Related Articles: SIG Sauer MCX (Mission-Configurable Weapon System) Dual-Piston/Op-Rod 5.56x45mm NATO and 7.62x39mm Russian AR-15 Short Barreled Rifle (SBR)/PDW/Carbine with Integral Suppressor Introduced at NDIA SOFIC 2013! (Photos!) All-New Isobrite Eclipse T100 Tritium Illuminated Lightweight Polycarbon Tactical Watch Expands ArmourLite’s Commitment to Making the Brightest and Most Durable Watches ArmourLite IsoBrite Hard-Use Tactical Watch/Diving Watch with T100 Tritium Illumination for Military and Law Enforcement Tactical Operations, Maritime Operations and Civilian Tactical Shooting (Video!) Bravo 18 and Alamo Tactical AK/AKM Accessories: Left-Sided/Ambi-Charging Handle, Rail System, OSS VSR Visual Signature Reducer/Flash Hider and Push-Button Ambidextrous Magazine Release Button Gives Your Kalashnikov Carbine/SBR Tactical AR-15 Capability! (Video!) Bad Company Tactical Rapid Retention System (BCT R2S) Holster System for Tactical SBR (Short Barreled Rifle)/Sub-Carbine-Type Personal Defense Weapons (PDW) and Pistols (Video!) Next Level Training (NLT) SIRT Training Pistol 110 Pro and SIRT-AR Laser Bolt (AR-15 BCG Retrofit) with Resetting Trigger and Laser Shot Indicator for the Most Effective Dry-Fire Training Possible! (Video!) Primary Weapons Systems PWS MK110 MOD 1 10.75″ Tactical AR-15 SBR (Short Barreled Rifle): Mid-Length Gas Piston/Op-Rod 5.56mm NATO/.223 Rem AR for Suppressed Fire! (Video!) Molon Labe Industries (MLI) SCARmag 25-Round 7.62mm NATO/.308 Win. Super-Polymer Rifle Magazine for FN MK-17 SCAR-H (Heavy) and FN SCAR 17S Gets Shot-Tested/Bullet-Impact Tested: Takes a Bleeding and Keeps on Feeding! HERA Arms H3MAG 5.56mm/.223 Rem. 30-Round Polymer Rifle Magazine with Round-Count Viewing Window for the Tactical AR-15 Carbine Caracal F and Caracal C Low-Bore-Axis, Striker-Fired Polymer-Frame 9mm Combat Pistols for Concealed Carry (CCW) and Covert Missions: Tactical Pistol Tack Drivers at the Range! Arsenal Firearms Strike One Pistol System Internal Parts and Operating Mechanism Shown and Explained at SHOT Show 2013 (Video!) KRISS USA Sphinx SDP SubCompact, Compact and Standard 9mm Combat/Tactical Pistol Family with DEFIANCE HALO H3F Fiber-Optic/Tritium Tactical Sights! (Video!) KRISS USA Sphinx SDP Compact High-Capacity 9mm Tactical/Combat Pistol (with DEFIANCE Silencer/Sound Suppressor) Impresses at the Range at SHOT Show 2012 Media Day! Smith & Wesson (S&W) M&P Pro CORE (Competition Optics Ready Equipment) Combat/Tactical/Competition Pistols: Good to Go and Ready to Beat Glock Pistols? Smith & Wesson (S&W) M&P SHIELD 9mm/.40 S&W Single-Stack, Striker-Fired Compact/Sub-Compact Pistol for Concealed Carry (CCW) Applications Smith & Wesson (S&W) M&P High-Capacity Tactical Pistols for Competition and Personal Protection: An In-Depth Military Operator/Competition Shooter’s Analysis (Photos and Video!) Beretta Px4 Storm Rotating-Barrel Semi-Auto Tactical Pistol Family for Military Spec-Operators, Law Enforcement, and Civilian Tactical Shooters: Standard, Compact, Sub-Compact, and Special Duty (SD)/Joint Combat Pistol (JCP) Models (Video!) Next Level Training (NLT) SIRT Training Pistol 110 Pro and SIRT-AR Laser Bolt (AR-15 BCG Retrofit) with Resetting Trigger and Laser Shot Indicator for the Most Effective Dry-Fire Training Possible! (Video!) Next Level Training (NLT) SIRT Training Pistol: Glock-Simulating Laser Training Pistol (with Auto-Resetting Trigger) for Better Shooting and Trigger Mechanics Heckler & Koch HK P30 9mm Parabellum/9x19mm NATO, HK45 and HK45 Compact (HK45C)/Mk 24 Mod 0 Combat Assault Pistol (CAP) .45 ACP Semi-Auto Combat/Tactical Pistols with Ambidextrous Controls (Ambi-Controls) for Military Special Operations Assaulters/Operators, Law Enforcement Officers (LEO’s) and Civilian Tactical Shooters: Silencer/Sound Suppressor-Ready! Salient Arms (SAI) Customized Glock 17/22 (G17/22), Glock 34/35 (G34/35), and Glock 19/23 (G19/23) Pistols for Tactical 3-Gun and IPSC Competition, Taran Butler Style! (Photos!)
{ "pile_set_name": "OpenWebText2" }
Spanish lawyers and Tibet supporters have led the world in preparing a historic legal analysis of the consequences of China’s invasion of Tibet and oppression of its people. The Spanish National Court, Audiencia Nacional received two lawsuits prepared by Spanish lawyers with Comité de Apoyo al Tibetand held evidence admissible against members of the Politburo standing committee of the CCP. This is the first judicial complaint ever filed against Chinese leaders for crimes against Tibetans. The International Campaign for Tibet gave evidence in both cases. In the following article, uploaded with the kind permission of the author, Karen Collier gives an insight into the ground-breaking legal cases. SPECIAL REPORT: Spain has led the world in preparing a historic legal analysis of the consequences of China’s invasion of Tibet and oppression of its people. The Spanish National Court, Audiencia Nacional received two lawsuits prepared by Spanish lawyers with Comité de Apoyo al Tibet (CAT) and held evidence admissible against members of the Politburo standing committee of the CCP. This is the first judicial complaint ever filed against Chinese leaders for crimes against Tibetans. The lawsuits are an apt reply to the impediment of exile and the political restrictions within Tibet under Chinese rule. Limitations on the principle of universal jurisdiction have emerged as a consequence of the recent resolution by Spanish Congress restricting cross-border cases to conditional jurisdiction, following diplomatic pressure that now requires amongst other things, a discernible link to Spain, the prosecuting state. The modification of the law, which threatens both lawsuits, will be appealed. This article analyses the viability of universal jurisdiction vis-à-vis the historic lawsuits for Tibet and as a case study traces its precedents, namely the landmark case against Chilean dictator General Augusto Pinochet and the Nuremberg trials. Emphasis is placed on how legal action combined with documentation projects such as The Tibet Oral History Project and similar complementary social movements have proven fundamental in fighting impunity and seek a measure of justice for the Tibetan people over 50 years on. The development and application of the principle of Universal Jurisdiction by the Spanish Courts has been, perhaps the greatest contribution to the world in the defence of human rights. A massive principle and “pillar of democracy” has almost fallen: the “universality” of Universal Justice. The benefits in Spanish lawyers pursuing such highly politicised and audacious cases, now halted by mounting foreign pressure, transcend the obstacles confronting the Court, consistently reinforcing the enlightened jurisprudential aspiration of absolute universality over the most heinous crimes against humanity. Surely this is worth defending. Several specific international treaties have addressed the area of state jurisdiction in criminal law, however no general treaty provides a comprehensive solution of the jurisdiction of states in criminal cases. Historically, the application of the universality principle was recognised by Hugo Grotius in the 17th Century in relation to the crime of piracy on the high seas, the perpetrators of which were deemed to be hostis humani generis, “enemies of all mankind.” Today, international law continues to regard piracy as universally cognizable.Beyond its extension to slave trading in the 19th Century, the principle developed in the wake of the Nuremberg trials to the drafting of the Universal Declaration of Human Rights, holding that “criminal accountability need not end with the home state.” States practicing extraterritorial and universal jurisdiction continue to cite the Lotus principle of 1927 for support, established by the Permanent Court of International Justice (PCIJ) that: “States are free to adjudicate cases of genocide committed abroad, as long as third-party states cannot prove that extraterritorial jurisdiction is prohibited by international law.” Full text >>
{ "pile_set_name": "Pile-CC" }
Q: Convert a list containing 10 elemnts into three dimentional array I have a list with 10 elements with these shapes [(1, 13),(2, 13),(2, 13),(13, 13),(4, 13),(5, 13),(5, 13),(6, 13),(2, 13),(8, 13)]. Every element in a list is a two dimensional for example first element of list is an array([[0. , 0. , 0.33, 0. , 0. , 0. , 0. , 0. , 0. , 0. , 0.67, 0. , 0. ]]) I want to convert this list into three dimensional array with dimensions(10,?,13) but the problem is second dimension is not a fixed number and it is changed for every case. Is there any way to do this? I have to feed this three dimensional input into my Keras model. A: padding is all you need recreate your data: X = [] for _ in range(10): i = np.random.randint(15) x = np.random.uniform(0,1, (i,13)) X.append(x) use padding: max_dim = 20 X_pad = [] for x in X: X_pad.append(np.pad(x, ((max_dim-len(x),0),(0,0)), mode='constant')) # pre padding # X_pad.append(np.pad(x, ((0,max_dim-len(x)),(0,0)), mode='constant')) # post padding X_pad = np.stack(X_pad) X_pad.shape # (10, max_dim, 13)
{ "pile_set_name": "StackExchange" }
A crab called Tutankhamen I just heard of a crab species with the scientific name Tutankhamen. Crab Tut! Kind of cool considering we are about to open the world-famous Tutankhamun exhibition. Tutankhamen cristatipes has a spiny triangular body, pointed nose (the rostrum) and elongated claws that look like a plumber’s wrench. It is quite small, with a body 15 mm wide and legs about 30 mm long. Tutankhamen cristatipes was named in 1925 by Mary J. Rathbun (1860-1943). In total, she described 1147 new species and subspecies, 63 new genera, one subfamily, three families and a superfamily. “A few years earlier, King Tut’s tomb was uncovered and I think she could have named it in the Pharaoh-fever that swept the world at that time,” crustacean expert and PhD colleague Anna McCallum tells me. Mary Jane Rathbun at work. She began as an unpaid assistant to her brother, Richard Rathbun, and was later employed as a curator at the Smithsonian Institution. Source: Smithsonian Institution Archives via Wikimedia Commons. Crab Tut is almost as rare as King Tut too - it is known from only two specimens. Both Tuts had exclusive habitats: the king in the Egyptian deserts and the crab in deep waters on the outer continental slope off Florida. And they both reside in hard outer skeletons: King Tut in his sarcophagus, Crab Tut in its carapace. I couldn’t find what colour Crab Tut is, but I’d like to dream it’s as colourful as the gold and blue sarcophagus of King Tut. This is definitely one cool character of the crustacean world. Yeh I like the claws too. It was also interesting noting the slight difference in spelling between the crab and the king. There are a few different accepted spellings and Mary chose the one with an e - Tutankhamen not Tutankhamun.
{ "pile_set_name": "Pile-CC" }
Dont forget to comment and give me some feedback on wheter you like it or not, dont just look at it and say nothing i wont know what you are thinking about the map if you dont tell me. please comment Additional Notes So this is a maze that i am working on with my friends it is pretty simple right now we are not nearly done, we are thinking of having 5 levels in all and if you guys like this a lot when it comes out then we will add to it more. So basically you go down into the ground and beat the first maze(really easy), then you move down to the second maze, which gets very complex. So in the second maze you are dropped down into water and jump out, you are in a small room with 4 different passage ways. you must choose one, you then follow the chosen passage way and it leads you to a maze, you beat the maze and at the end you go down or up a ladder. but only one of the 4 passage ways is the correct one, but if you go in the wrong maze then you go up/down a ladder and take a passage way to the small room with the four passage ways. We are still working on level three we are thinking a huge maze with only 2 ways to finish. thats pretty much it i will make another post when we get the fourth maze complete. Hope you enjoy the pics.Subscribe to me on youtube to get updates, on the maze and my other minecraft adventures:
{ "pile_set_name": "OpenWebText2" }
/* * ppui/sdl/DisplayDeviceFB_SDL.cpp * * Copyright 2009 Peter Barth, Christopher O'Neill, Dale Whinham * * This file is part of Milkytracker. * * Milkytracker is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Milkytracker is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with Milkytracker. If not, see <http://www.gnu.org/licenses/>. * * 12/5/14 - Dale Whinham * - Port to SDL2 * - Resizable window which renders to a scaled texture * - Experimental, buggy Retina support (potential problems with mouse coordinates if letterboxing happens) * * TODO: - Test under Linux (only tested under OSX) * - Test/fix/remove scale factor and orientation code * - Look at the OpenGL stuff */ #include "DisplayDeviceFB_SDL.h" #include "Graphics.h" PPDisplayDeviceFB::PPDisplayDeviceFB(pp_int32 width, pp_int32 height, pp_int32 scaleFactor, pp_int32 bpp, bool fullScreen, Orientations theOrientation/* = ORIENTATION_NORMAL*/, bool swapRedBlue/* = false*/) : PPDisplayDevice(width, height, scaleFactor, bpp, fullScreen, theOrientation), needsTemporaryBuffer((orientation != ORIENTATION_NORMAL) || (scaleFactor != 1)), temporaryBuffer(NULL) { // Create an SDL window and surface theWindow = CreateWindow(realWidth, realHeight, bpp, #ifdef HIDPI_SUPPORT SDL_WINDOW_ALLOW_HIGHDPI | // Support for 'Retina'/Hi-DPI displays #endif SDL_WINDOW_RESIZABLE | // MilkyTracker's window is resizable (bFullScreen ? SDL_WINDOW_FULLSCREEN_DESKTOP : 0)); // Use 'fake fullscreen' because we can scale if (theWindow == NULL) { fprintf(stderr, "SDL: Could not create window.\n"); exit(EXIT_FAILURE); } // Create renderer for the window theRenderer = SDL_CreateRenderer(theWindow, drv_index, 0); if (theRenderer == NULL) { fprintf(stderr, "SDL: SDL_CreateRenderer failed: %s\n", SDL_GetError()); exit(EXIT_FAILURE); } #ifdef HIDPI_SUPPORT // Feed SDL_RenderSetLogicalSize() with output size, not GUI surface size, otherwise mouse coordinates will be wrong for Hi-DPI int rendererW, rendererH; SDL_GetRendererOutputSize(theRenderer, &rendererW, &rendererH); #endif // Log renderer capabilities SDL_RendererInfo theRendererInfo; if (!SDL_GetRendererInfo(theRenderer, &theRendererInfo)) { if (theRendererInfo.flags & SDL_RENDERER_SOFTWARE) printf("SDL: Using software renderer.\n"); if (theRendererInfo.flags & SDL_RENDERER_ACCELERATED) printf("SDL: Using accelerated renderer.\n"); if (theRendererInfo.flags & SDL_RENDERER_PRESENTVSYNC) printf("SDL: Vsync enabled.\n"); if (theRendererInfo.flags & SDL_RENDERER_TARGETTEXTURE) printf("SDL: Renderer supports rendering to texture.\n"); } // Lock aspect ratio and scale the UI up to fit the window #ifdef HIDPI_SUPPORT SDL_RenderSetLogicalSize(theRenderer, rendererW, rendererH); #else SDL_RenderSetLogicalSize(theRenderer, realWidth, realHeight); #endif // Use linear filtering for the scaling (make this optional eventually) SDL_SetHint(SDL_HINT_RENDER_SCALE_QUALITY, "linear"); // Create surface for rendering graphics theSurface = SDL_CreateRGBSurface(0, realWidth, realHeight, bpp == -1 ? 32 : bpp, 0, 0, 0, 0); if (theSurface == NULL) { fprintf(stderr, "SDL: SDL_CreateSurface failed: %s\n", SDL_GetError()); exit(EXIT_FAILURE); } // Streaming texture for rendering the UI theTexture = SDL_CreateTexture(theRenderer, theSurface->format->format, SDL_TEXTUREACCESS_STREAMING, realWidth, realHeight); if (theTexture == NULL) { fprintf(stderr, "SDL: SDL_CreateTexture failed: %s\n", SDL_GetError()); exit(EXIT_FAILURE); } // We got a surface: update bpp value bpp = theSurface->format->BitsPerPixel; // Create a PPGraphics context based on bpp switch (bpp) { case 16: currentGraphics = new PPGraphics_16BIT(width, height, 0, NULL); break; case 24: { PPGraphics_24bpp_generic* g = new PPGraphics_24bpp_generic(width, height, 0, NULL); if (swapRedBlue) { g->setComponentBitpositions(theSurface->format->Bshift, theSurface->format->Gshift, theSurface->format->Rshift); } else { g->setComponentBitpositions(theSurface->format->Rshift, theSurface->format->Gshift, theSurface->format->Bshift); } currentGraphics = static_cast<PPGraphicsAbstract*>(g); break; } case 32: { PPGraphics_32bpp_generic* g = new PPGraphics_32bpp_generic(width, height, 0, NULL); if (swapRedBlue) { g->setComponentBitpositions(theSurface->format->Bshift, theSurface->format->Gshift, theSurface->format->Rshift); } else { g->setComponentBitpositions(theSurface->format->Rshift, theSurface->format->Gshift, theSurface->format->Bshift); } currentGraphics = static_cast<PPGraphicsAbstract*>(g); break; } default: fprintf(stderr, "SDL: Unsupported color depth (%i), try either 16, 24 or 32", bpp); exit(EXIT_FAILURE); } if (needsTemporaryBuffer) { temporaryBufferPitch = (width*bpp)/8; temporaryBufferBPP = bpp; temporaryBuffer = new pp_uint8[getSize().width*getSize().height*(bpp/8)]; } currentGraphics->lock = true; } PPDisplayDeviceFB::~PPDisplayDeviceFB() { SDL_FreeSurface(theSurface); SDL_DestroyRenderer(theRenderer); SDL_DestroyWindow(theWindow); delete[] temporaryBuffer; // base class is responsible for deleting currentGraphics } PPGraphicsAbstract* PPDisplayDeviceFB::open() { if (!isEnabled()) return NULL; if (currentGraphics->lock) { if (SDL_LockSurface(theSurface) < 0) return NULL; currentGraphics->lock = false; if (needsTemporaryBuffer) static_cast<PPGraphicsFrameBuffer*>(currentGraphics)->setBufferProperties(temporaryBufferPitch, (pp_uint8*)temporaryBuffer); else static_cast<PPGraphicsFrameBuffer*>(currentGraphics)->setBufferProperties(theSurface->pitch, (pp_uint8*)theSurface->pixels); return currentGraphics; } return NULL; } void PPDisplayDeviceFB::close() { SDL_UnlockSurface(theSurface); currentGraphics->lock = true; } void PPDisplayDeviceFB::update() { if (!isUpdateAllowed() || !isEnabled()) return; if (theSurface->locked) { return; } PPRect r(0, 0, getSize().width, getSize().height); swap(r); // Update entire texture and copy to renderer SDL_UpdateTexture(theTexture, NULL, theSurface->pixels, theSurface->pitch); SDL_RenderClear(theRenderer); SDL_RenderCopy(theRenderer, theTexture, NULL, NULL); SDL_RenderPresent(theRenderer); } void PPDisplayDeviceFB::update(const PPRect& r) { if (!isUpdateAllowed() || !isEnabled()) return; if (theSurface->locked) { return; } swap(r); PPRect r2(r); r2.scale(scaleFactor); transformInverse(r2); SDL_Rect r3 = { r2.x1, r2.y1, r2.width(), r2.height() }; // Calculate destination pixel data offset based on row pitch and x coordinate void* surfaceOffset = (char*) theSurface->pixels + r2.y1 * theSurface->pitch + r2.x1 * theSurface->format->BytesPerPixel; // Update dirty area of texture and copy to renderer SDL_UpdateTexture(theTexture, &r3, surfaceOffset, theSurface->pitch); SDL_RenderClear(theRenderer); SDL_RenderCopy(theRenderer, theTexture, NULL, NULL); SDL_RenderPresent(theRenderer); } void PPDisplayDeviceFB::swap(const PPRect& r2) { PPRect r(r2); pp_int32 h; if (r.x2 < r.x1) { h = r.x1; r.x1 = r.x2; r.x2 = h; } if (r.y2 < r.y1) { h = r.y1; r.y1 = r.y2; r.y2 = h; } switch (orientation) { case ORIENTATION_NORMAL: { if (!needsTemporaryBuffer) return; if (SDL_LockSurface(theSurface) < 0) return; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); switch (temporaryBufferBPP) { case 16: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint16* dstPtr = (pp_uint16*)(dst + y*dstPitch + destRect.x1*dstBPP); pp_uint8* srcPtr = src + (v>>16)*srcPitch; for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *dstPtr++ = *(pp_uint16*)(srcPtr + (u>>16) * srcBPP); u += stepU; } v += stepV; } break; } case 24: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint8* dstPtr = (pp_uint8*)(dst + y*dstPitch + destRect.x1*dstBPP); pp_uint8* srcPtr = src + (v>>16)*srcPitch; for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *dstPtr = *(pp_uint8*)(srcPtr + (u>>16) * srcBPP); *(dstPtr+1) = *(pp_uint8*)(srcPtr + (u>>16) * srcBPP + 1); *(dstPtr+2) = *(pp_uint8*)(srcPtr + (u>>16) * srcBPP + 2); dstPtr+=3; u += stepU; } v += stepV; } break; } case 32: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint32* dstPtr = (pp_uint32*)(dst + y*dstPitch + destRect.x1*dstBPP); pp_uint8* srcPtr = src + (v>>16)*srcPitch; for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *dstPtr++ = *(pp_uint32*)(srcPtr + (u>>16) * srcBPP); u += stepU; } v += stepV; } break; } default: fprintf(stderr, "SDL: Unsupported color depth for requested orientation"); exit(2); } SDL_UnlockSurface(theSurface); break; } case ORIENTATION_ROTATE90CCW: { if (SDL_LockSurface(theSurface) < 0) return; switch (temporaryBufferBPP) { case 16: { pp_uint32 srcPitch = temporaryBufferPitch >> 1; pp_uint32 dstPitch = theSurface->pitch >> 1; pp_uint16* src = (pp_uint16*)temporaryBuffer; pp_uint16* dst = (pp_uint16*)theSurface->pixels; if (scaleFactor != 1) { PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint16* srcPtr = src + (v>>16)*srcPitch; pp_uint16* dstPtr = dst + y + (realHeight-destRect.x1)*dstPitch; for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *(dstPtr-=dstPitch) = *(srcPtr+(u>>16)); u += stepU; } v += stepV; } } else { for (pp_uint32 y = r.y1; y < r.y2; y++) { pp_uint16* srcPtr = src + y*srcPitch + r.x1; pp_uint16* dstPtr = dst + y + (realHeight-r.x1)*dstPitch; for (pp_uint32 x = r.x1; x < r.x2; x++) *(dstPtr-=dstPitch) = *srcPtr++; } } break; } case 24: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; if (scaleFactor != 1) { PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint8* srcPtr = src + (v>>16)*srcPitch; pp_uint8* dstPtr = dst + y*dstBPP + dstPitch*(realHeight-1-destRect.x1); for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { dstPtr[0] = *(srcPtr+(u>>16) * srcBPP); dstPtr[1] = *(srcPtr+(u>>16) * srcBPP + 1); dstPtr[2] = *(srcPtr+(u>>16) * srcBPP + 2); dstPtr-=dstPitch; u += stepU; } v += stepV; } } else { for (pp_uint32 y = r.y1; y < r.y2; y++) { pp_uint8* srcPtr = src + y*srcPitch + r.x1*srcBPP; pp_uint8* dstPtr = dst + y*dstBPP + dstPitch*(realHeight-1-r.x1); for (pp_uint32 x = r.x1; x < r.x2; x++) { dstPtr[0] = srcPtr[0]; dstPtr[1] = srcPtr[1]; dstPtr[2] = srcPtr[2]; srcPtr+=srcBPP; dstPtr-=dstPitch; } } } break; } case 32: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; if (scaleFactor != 1) { PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint8* srcPtr = src + (v>>16)*srcPitch; pp_uint32* dstPtr = (pp_uint32*)(dst + y*dstBPP + dstPitch*(realHeight-1-destRect.x1)); for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *(dstPtr-=(dstPitch>>2)) = *(pp_uint32*)(srcPtr + (u>>16) * srcBPP); u += stepU; } v += stepV; } } else { for (pp_uint32 y = r.y1; y < r.y2; y++) { pp_uint32* srcPtr = (pp_uint32*)(src + y*srcPitch + r.x1*srcBPP); pp_uint32* dstPtr = (pp_uint32*)(dst + y*dstBPP + dstPitch*(realHeight-1-r.x1)); for (pp_uint32 x = r.x1; x < r.x2; x++) *(dstPtr-=(dstPitch>>2)) = *srcPtr++; } } break; } default: fprintf(stderr, "SDL: Unsupported color depth for requested orientation"); exit(2); } SDL_UnlockSurface(theSurface); break; } case ORIENTATION_ROTATE90CW: { if (SDL_LockSurface(theSurface) < 0) return; switch (temporaryBufferBPP) { case 16: { pp_uint32 srcPitch = temporaryBufferPitch >> 1; pp_uint32 dstPitch = theSurface->pitch >> 1; pp_uint16* src = (pp_uint16*)temporaryBuffer; pp_uint16* dst = (pp_uint16*)theSurface->pixels; if (scaleFactor != 1) { PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint16* srcPtr = src + (v>>16)*srcPitch; pp_uint16* dstPtr = dst + (realWidth-1-y) + (dstPitch*(destRect.x1)); for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *(dstPtr+=dstPitch) = *(srcPtr+(u>>16)); u += stepU; } v += stepV; } } else { for (pp_uint32 y = r.y1; y < r.y2; y++) { pp_uint16* srcPtr = src + y*srcPitch + r.x1; pp_uint16* dstPtr = dst + (realWidth-1-y) + (dstPitch*r.x1); for (pp_uint32 x = r.x1; x < r.x2; x++) *(dstPtr+=dstPitch) = *srcPtr++; } } break; } case 24: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; if (scaleFactor != 1) { PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint8* srcPtr = src + (v>>16)*srcPitch; pp_uint8* dstPtr = dst + (realWidth-1-y)*dstBPP + (dstPitch*(destRect.x1)); for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { dstPtr[0] = *(srcPtr+(u>>16) * srcBPP); dstPtr[1] = *(srcPtr+(u>>16) * srcBPP + 1); dstPtr[2] = *(srcPtr+(u>>16) * srcBPP + 2); dstPtr+=dstPitch; u += stepU; } v += stepV; } } else { for (pp_uint32 y = r.y1; y < r.y2; y++) { pp_uint8* srcPtr = src + y*srcPitch + r.x1*srcBPP; pp_uint8* dstPtr = dst + (realWidth-1-y)*dstBPP + (dstPitch*r.x1); for (pp_uint32 x = r.x1; x < r.x2; x++) { dstPtr[0] = srcPtr[0]; dstPtr[1] = srcPtr[1]; dstPtr[2] = srcPtr[2]; srcPtr+=srcBPP; dstPtr+=dstPitch; } } } break; } case 32: { pp_uint32 srcPitch = temporaryBufferPitch; pp_uint32 dstPitch = theSurface->pitch; pp_uint8* src = (pp_uint8*)temporaryBuffer; pp_uint8* dst = (pp_uint8*)theSurface->pixels; const pp_uint32 srcBPP = temporaryBufferBPP/8; const pp_uint32 dstBPP = theSurface->format->BytesPerPixel; if (scaleFactor != 1) { PPRect destRect(r); destRect.scale(scaleFactor); const pp_uint32 stepU = (r.x2 - r.x1) * 65536 / (destRect.x2 - destRect.x1); const pp_uint32 stepV = (r.y2 - r.y1) * 65536 / (destRect.y2 - destRect.y1); pp_uint32 v = r.y1 * 65536; for (pp_uint32 y = destRect.y1; y < destRect.y2; y++) { pp_uint32 u = r.x1 * 65536; pp_uint8* srcPtr = src + (v>>16)*srcPitch; pp_uint32* dstPtr = (pp_uint32*)(dst + (realWidth-1-y)*dstBPP + (dstPitch*(destRect.x1))); for (pp_uint32 x = destRect.x1; x < destRect.x2; x++) { *(dstPtr+=(dstPitch>>2)) = *(pp_uint32*)(srcPtr + (u>>16) * srcBPP); u += stepU; } v += stepV; } } else { for (pp_uint32 y = r.y1; y < r.y2; y++) { pp_uint32* srcPtr = (pp_uint32*)(src + y*srcPitch + r.x1*srcBPP); pp_uint32* dstPtr = (pp_uint32*)(dst + (realWidth-1-y)*dstBPP + (dstPitch*r.x1)); for (pp_uint32 x = r.x1; x < r.x2; x++) *(dstPtr+=(dstPitch>>2)) = *srcPtr++; } } break; } default: fprintf(stderr, "SDL: Unsupported color depth for requested orientation"); exit(EXIT_FAILURE); } SDL_UnlockSurface(theSurface); break; } } } // This is unused at the moment, could be useful if we manage to get the GUI resizable in the future. void PPDisplayDeviceFB::setSize(const PPSize& size) { this->size = size; theSurface = SDL_CreateRGBSurface(0, size.width, size.height, theSurface->format->BitsPerPixel, 0, 0, 0, 0); theTexture = SDL_CreateTextureFromSurface(theRenderer, theSurface); theRenderer = SDL_GetRenderer(theWindow); }
{ "pile_set_name": "Github" }
Senate Republicans overcame internal divisions late Thursday to approve a 2018 budget that will increase the deficit by $1.5 trillion over 10 years to allow for President Trump’s proposed tax cuts. Passage of the GOP’s budget blueprint is a largely symbolic exercise, but it sets the stage for smoother passage of Trump’s upcoming tax cuts. It will include special instructions that allow for passage of a tax plan by a simple majority, without threat of a Senate filibuster to block it. At the White House, Trump had been confident of the result earlier in the day and predicted it was a sign that his tax plan would also succeed. “Frankly, I think we have the votes for the tax cuts, which will follow fairly shortly thereafter,” he said. But the outcome was not certain, as some conservatives still objected to piling onto the deficit. Many joined Congress during the rise of the tea party movement, which railed for years against rising national debt under President Obama after the Great Recession. The vote was 51-49, with all Democrats opposed. “The budget’s a sham,” Sen. David Perdue (R-Ga.) said at a recent Koch-backed group’s gathering of wealthy donors in New York. “It has nothing to do with reality. ... It’s a tool to get to reconciliation.” Sen. Bob Corker (R-Tenn.) called the budget a “hoax” on Thursday. But most Republicans argued that Trump’s tax cuts will more than cover the $1.5-trillion shortfall by spurring economic growth and leading to future tax revenues. Treasury Secretary Steven T. Mnuchin predicted the tax package will unleash so much economic growth it will begin to pay down the nation’s debt. Independent economists, however, doubt growth will be as robust as advocates claim, and argue that the plan’s reliance on deficit-spending will actually dampen any benefits for growth. Nonpartisan fiscal watchdogs also worry the tax breaks will fall largely to the most wealthy households, while those in the middle class could pay more if popular deductions are eliminated in favor of the tax plan’s proposed $24,000 standard deduction for couples. Once the House and Senate reconcile their budgets and a final budget is approved, Republicans are set to unveil their tax plan, which remains a work in progress. Party leaders in Congress are drafting legislation from a framework established with the White House. The tax plan calls for reducing tax rates on corporations from 35% to 20%, and consolidating individual tax rates to 35%, 25% and 12%, though the income brackets for those rates have yet to be set. Rep. Kevin Brady (R-Texas), chairman of the House Ways and Means Committee, has said once Congress finishes the budget, his panel will unveil the tax bill. “Once that budget is done, boom, we’ll bring it forward,” Brady said earlier this month. The budget approved by the Senate Thursday follows earlier similar Republican blueprints. It slashes domestic spending, including steep cuts to Medicare and Medicaid. Senators voted into the evening on various amendments, including those looking ahead to the coming tax debate. One Democratic amendment sought to preserve the state and local tax deduction, which helps many residents of California and other high-cost states reduce their federal income tax bills. That deduction is being targeted for elimination. Republicans used their majority to reject the amendment, which would have prevented consideration of any bill that repeals or limits the deduction. “What the entire GOP proposal is about is giving tax breaks to people who don’t need it by making cuts to education, housing and health care,” tweeted the Budget Committee’s ranking member, Sen. Bernie Sanders (I-Vt.). The Senate budget now needs to be reconciled with a House version. A final budget vote is expected by the end of the month. Times staff writer Jim Puzzanghera in Washington contributed to this report. [email protected] @LisaMascaro ALSO Bannon’s ouster could boost the powerful Koch network, which has surprising sway in Trump’s White House Trump punts his top priorities to Congress, setting the stage for a year-end showdown Is this small-town congressman from New Mexico tough enough to win Democrats the House majority? More coverage of Congress More coverage of politics and the White House UPDATES: 6:35 p.m.: This article was updated after the Senate vote. This article was originally published at 2:50 p.m.
{ "pile_set_name": "OpenWebText2" }
You are sending an email that contains the article and a private message for your recipient(s). Your Name: Your e-mail: * Required! Recipient (e-mail): * Subject: * Introductory Message: HTML/Text (Photo: Yes/No) (At the moment, only Text is allowed...) Message Text: According to the Inquirer, software mammoth Microsoft has denied reports that it is outsourcing any of the development work for its future operating system, codenamed Longhorn. The industry was all abuzz with rumours that Vole planned to send some of its prized code to be developed in India. The rumours came from WashTech, which is trying to unionise Vole workers against the dark forces of CEO Steve 'sound of one hand clapping' Ballmer. WashTech claimed that Mcrosoft had doubled the number of people working for the company in India to 2,000, of which 900 are Microsoft employees while the rest are contract workers. However a spokesVole has said while WashTech's numbers are correct, only testing of its next generation software will be carried out in India and perhaps the development of a few tools. However core Windows development work will be carried out by God fearing US employees in the good old US of A.
{ "pile_set_name": "Pile-CC" }
import * as React from "react"; import { store } from "../../redux/store"; import { MapTransformProps } from "./interfaces"; import { isUndefined } from "lodash"; import { sortGroupBy } from "../../point_groups/point_group_sort"; import { Color } from "../../ui"; import { transformXY } from "./util"; import { nn, alternating, xy } from "../../point_groups/paths"; import { TaggedPoint, TaggedPointGroup } from "farmbot"; import { zoomCompensation } from "./zoom"; export interface GroupOrderProps { group: TaggedPointGroup | undefined; groupPoints: TaggedPoint[]; zoomLvl: number; mapTransformProps: MapTransformProps; } const sortedPointCoordinates = ( group: TaggedPointGroup | undefined, groupPoints: TaggedPoint[], ): { x: number, y: number }[] => { if (isUndefined(group)) { return []; } const { resources } = store.getState(); const groupSortType = resources.consumers.farm_designer.tryGroupSortType || group.body.sort_type; const sorted = () => { switch (groupSortType) { case "xy_alternating": return alternating(groupPoints, "xy"); case "yx_alternating": return alternating(groupPoints, "yx"); case "nn": return nn(groupPoints); default: return sortGroupBy(groupSortType, groupPoints); } }; return sorted().map(p => ({ x: p.body.x, y: p.body.y })); }; export interface PointsPathLineProps { orderedPoints: { x: number, y: number }[]; mapTransformProps: MapTransformProps; color?: Color; dash?: number; strokeWidth?: number; zoomLvl: number; } export const PointsPathLine = (props: PointsPathLineProps) => <g id="group-order-line" stroke={props.color || Color.mediumGray} strokeWidth={props.strokeWidth || zoomCompensation(props.zoomLvl, 3)} strokeDasharray={props.dash || zoomCompensation(props.zoomLvl, 12)}> {props.orderedPoints.map((p, i) => { const prev = i > 0 ? props.orderedPoints[i - 1] : p; const one = transformXY(prev.x, prev.y, props.mapTransformProps); const two = transformXY(p.x, p.y, props.mapTransformProps); return <g id="group-order-element" key={i}> <line x1={one.qx} y1={one.qy} x2={two.qx} y2={two.qy} /> </g>; })} </g>; export interface PointsPathLabelsProps { orderedPoints: { x: number, y: number }[]; mapTransformProps: MapTransformProps; zoomLvl: number; } export const PointsPathLabels = (props: PointsPathLabelsProps) => <g id="group-order-labels"> {props.orderedPoints.map((p, i) => { const position = transformXY(p.x, p.y, props.mapTransformProps); const offset = 15; return <g id="group-order-label-element" key={i} stroke={"none"}> <circle cx={position.qx + offset} cy={position.qy - offset} r={zoomCompensation(props.zoomLvl, 9.5)} fill={Color.white} fillOpacity={0.65} /> <text x={position.qx + offset} y={position.qy - offset} fontSize={zoomCompensation(props.zoomLvl, 1.45) + "rem"} fill={Color.darkGray} fillOpacity={0.75} fontWeight={"bold"} textAnchor={"middle"} alignmentBaseline={"middle"}> {i + 1} </text> </g>; })} </g>; export const GroupOrder = (props: GroupOrderProps) => <g id="group-order" style={{ pointerEvents: "none" }}> <PointsPathLine orderedPoints={sortedPointCoordinates(props.group, props.groupPoints)} zoomLvl={props.zoomLvl} mapTransformProps={props.mapTransformProps} /> <PointsPathLabels orderedPoints={sortedPointCoordinates(props.group, props.groupPoints)} zoomLvl={props.zoomLvl} mapTransformProps={props.mapTransformProps} /> </g>; interface NNPathProps { pathPoints: TaggedPoint[]; mapTransformProps: MapTransformProps; } export const NNPath = (props: NNPathProps) => localStorage.getItem("try_it") == "ok" ? <PointsPathLine color={Color.blue} strokeWidth={2} dash={1} orderedPoints={nn(props.pathPoints).map(xy)} zoomLvl={1} mapTransformProps={props.mapTransformProps} /> : <g />;
{ "pile_set_name": "Github" }
An audit of the role of the sonographer in non-obstetric ultrasound. In order to investigate the role of the sonographer in non-obstetric ultrasound, 1046 consecutive non-obstetric ultrasound scans performed by sonographers were audited. In 94% of cases, the report prepared by the sonographer gave an accurate account of the findings. In 6.3% of reports the radiologist provided additional comments, whilst in only 0.7% of cases was the sonographer's report significantly altered. In the 630 patients in whom adequate follow-up data was available, there was a single instance of a false positive ultrasound finding but no other significant ultrasound inaccuracy. This audit indicates that the local arrangements for involving sonographers in a non-obstetric ultrasound service has resulted in agreed standards being met. It is suggested that sonographers can and should be involved more widely in the provision of non-obstetric ultrasound services.
{ "pile_set_name": "PubMed Abstracts" }
--- abstract: 'Superconductivity at about 15.6 K was achieved in Tb$_{1-x}$Ca$_x$FeAsO by partially substituting Tb$^{3+}$ with Ca$^{2+}$ in the nominal doping region $x = 0.40 \sim 0.50$. A detailed investigation was carried out in a typical sample with doping level of $x$ = 0.44. The upper critical field of this sample was estimated to be 77 Tesla from the magnetic field dependent resistivity data. The domination of hole-like charge carriers in the low-temperature region was confirmed by Hall effect measurements. The comparison between the calcium-doped sample Pr$_{1-x}$Ca$_x$FeAsO (non-superconductive) and the Strontium-doped sample Pr$_{1-x}$Sr$_x$FeAsO (superconductive) suggests that a lager ion radius of the doped alkaline-earth element compared with that of the rare-earth element may be a necessary requirement for achieving superconductivity in the hole-doped 1111 phase.' author: - 'Gang Mu, Bin Zeng, Peng Cheng, Xiyu Zhu, Fei Han, Bing Shen, and Hai-Hu Wen' title: 'Superconductivity at 15.6 K in Calcium-doped Tb$_{1-x}$Ca$_x$FeAsO: the structure requirement for achieving superconductivity in the hole-doped 1111 phase' --- Introduction ============ The discovery of superconductivity in iron pnictides have generated enormous interests in the community of condensed matter physics.[@Kamihara2008] Up to date, the iron pnictide superconductors have developed into several families with different structures, which were abbreviated as the 1111 phase (including the oxy-arsenide[@Kamihara2008] and fluorine-arsenide[@SrF]), 122 phase,[@Rotter; @CWCh] 111 phase,[@LiFeAs; @LiFeAsChu; @LiFeAsUK] 11 phase,[@FeSe] 42622 phase,[@42622] and so on. It seems that each phase with different structure has a unique superconducting transition temperature $T_c$. As for the 1111 phase, most of the discovered superconductors are characterized as electron-doped ones [@Pr52K; @CP; @WangC; @Mandrus; @CaoGH], while the hole-doped superconductors were only reported in the strontium-doped Ln$_{1-x}$Sr$_{x}$FeAsO (Ln = La, Pr, Nd).[@WenEPL; @LaSr2; @PrSr; @NdSr] The hole-doped superconductivity in 1111 phase by substituting other ion-dopants with valence of “+2”, such as barium or calcium, seems quite difficult to be achieved, at least in many of the rare-earth based systems. Obviously, it is important to carry out more explorations in this direction in order to extend the family of the hole-doped superconductors in 1111 phase. And it is also significant to investigate the factors which govern the electronic properties (superconducting or non-superconducting) in the hole-doped side based on the 1111 phase. In this paper we report a new hole-doped superconductor in the 1111 phase, calcium-doped Tb$_{1-x}$Ca$_x$FeAsO, with the maximum superconducting transition temperature of 15.6 K (95% $\rho_n$). It is found that superconductivity appears in the nominal doping region $x = 0.40 \sim 0.50$. The physical properties of a selected sample with $x$ = 0.44 were investigated in depth. We estimated the upper critical field of this sample to be 77 Tesla based on the Werthamer-Helfand-Hohenberg (WHH) formula.[@WHH] The conducting charge carriers in this sample were characterized to be hole type in a wide low-temperature region by the Hall effect measurements. Meanwhile, we have also successfully synthesized calcium-doped Pr$_{1-x}$Ca$_x$FeAsO, which also displays hole-type charge carriers in low-temperature region but doesn’t superconduct at all. We attribute this different behavior to the sensitive electronic response to the relative radii of the doped ions compared with that of the rare-earth ions. Experimental Details ==================== The Tb$_{1-x}$Ca$_x$FeAsO samples were prepared using a two-step solid state reaction method. In the first step, TbAs and CaAs were prepared by reacting Tb flakes (purity 99.99%), Ca flakes (purity 99.9%) and As grains (purity 99.99%) at 500 $^o$C for 10 hours and then 700 $^o$C for 16 hours. They were sealed in an evacuated quartz tube when reacting. Then the resultant precursors were thoroughly grounded together with Fe powder (purity 99.95%) and Fe$_2$O$_3$ powder (purity 99.5%) in stoichiometry as given by the formula Tb$_{1-x}$Ca$_x$FeAsO. All the weighing and mixing procedures were performed in a glove box with a protective argon atmosphere. Then the mixtures were pressed into pellets and sealed in an evacuated quartz tube. The materials were heated up to 1150-1170 $^o$C with a rate of 120 $^o$C/hr and maintained for 40 hours. Then a cooling procedure was followed. After that, we can get the superconducting polycrystalline samples. The process of preparing Pr$_{1-x}$Ca$_x$FeAsO samples is quite similar to that of Tb$_{1-x}$Ca$_x$FeAsO. The x-ray diffraction (XRD) measurements of our samples were carried out by a $Mac$-$Science$ MXP18A-HF equipment with Cu-K$_\alpha$ radiation. The ac susceptibility of the samples were measured on the Maglab-12T (Oxford) with an ac field of 0.1 Oe and a frequency of 333 Hz. The resistance and Hall effect measurements were done using a six-probe technique on the Quantum Design instrument physical property measurement system (PPMS) with magnetic fields up to 9 T. The current direction was changed for measuring each point in order to remove the contacting thermal power. The temperature stabilization was better than 0.1% and the resolution of the voltmeter was better than 10 nV. ![(Color online) (a) X-ray diffraction pattern for the sample Tb$_{0.56}$Ca$_{0.44}$FeAsO. All the main peaks can be indexed to the tetragonal ZrCuSiAs-type structure. The peaks from the impurities are precisely indexed to Tb$_2$O$_3$ and FeAs. (b) Temperature dependence of resistivity for the Tb$_{0.56}$Ca$_{0.44}$FeAsO sample under two different fields 0 T and 9 T. The data under 0 T is shown up to 300 K. (c) The ac susceptibility data measured with $f = 333$ Hz and $H_{ac} = 0.1$ Oe .[]{data-label="fig1"}](Fig1.eps){width="9cm"} Experimental data and discussion ================================ Sample characterization for Tb$_{0.56}$Ca$_{0.44}$FeAsO ------------------------------------------------------- The x-ray diffraction pattern for the sample Tb$_{1-x}$Ca$_x$FeAsO with the nominal doping level of $x$ = 0.44 is shown in Fig. 1(a). It is clear that all the main peaks can be indexed to the 1111 phase with the tetragonal ZrCuSiAs-type structure.[@ZrCuSiAs] The main impurity phases were identified to be Tb$_2$O$_3$ and FeAs, which are all not superconducting in the measuring temperature. By using the software Fullprof, we can determine the lattice constants as $a = 3.900$ $\AA$ and $c = 8.423$ $\AA$ for this sample. By comparing with the lattice constants of the parent phase TbFeAsO ($a = 3.898$ $\AA$, $c = 8.404$ $\AA$) reported by other group,[@JieY] we find that the $a$-axis lattice constant in the present sample is slightly larger than that of the parent phase, while the expansion along the $c$-axis direction is more distinct. In fact, the similar tendency has been observed in other hole-doped systems in the 1111 phase.[@LaSr2; @PrSr] This indicates that the calcium atoms go into the crystal lattice of the TbFeAsO system because the radius of Ca$^{2+}$ is larger than that of Tb$^{3+}$ (see Fig. 7). In Fig. 1(b) we present a typical set of resistive data for the same sample Tb$_{0.56}$Ca$_{0.44}$FeAsO under 0 T and 9 T. The data under 0 T is shown up to 300 K. A clear superconducting transition can be seen in the low temperature region. Taking a criterion of 95% $\rho_n$, the onset transition temperature is determined to be 15.6 K. A magnetic field of 9 T only suppresses the onset transition temperature about 1.6 K, indicating a rather high upper critical field in our sample. In the high temperature region, the resistivity anomaly coming from the antiferromagnetic (AF) or structural transition has been suppressed and a flattening feature was observed clearly. The similar behavior has been observed in other hole-doped 1111 systems Ln$_{1-x}$Sr$_x$FeAsO (Ln = La, Pr, Nd).[@WenEPL; @LaSr2; @PrSr; @NdSr] Figure 1(c) shows the ac susceptibility data measured with $f = 333$ Hz and $H_{ac} = 0.1$ Oe. A rough estimate from the diamagnetic signal shows that the superconducting volume fraction of the present sample is beyond 50%, confirming the bulk superconductivity in our samples. The onset critical temperature by magnetic measurements is roughly corresponding to the zero-resistance temperature. ![(Color online) Temperature dependence of resistivity for Tb$_{0.56}$Ca$_{0.44}$FeAsO near the superconducting transition under different magnetic fields. The onset transition temperature defined by 95%$\rho_n$ shifts with the magnetic field slowly. Inset: phase diagram derived from the resistive transition curves.[]{data-label="fig2"}](Fig2.eps){width="8.5cm"} ![(Color online) Hall effect measurements for the samples Tb$_{1-x}$Ca$_{x}$FeAsO. The main frame shows the field dependence of the Hall resistivity $\rho_{xy}$ at different temperatures for the sample with $x$ = 0.44. Inset: Temperature dependence of the Hall coefficient $R_H$ for two samples with $x$ = 0.44 and 0.45.[]{data-label="fig3"}](Fig3.eps){width="9cm"} Upper critical field for Tb$_{0.56}$Ca$_{0.44}$FeAsO ---------------------------------------------------- We attempted to estimate the upper critical field of the sample Tb$_{0.56}$Ca$_{0.44}$FeAsO from the resistivity data. Temperature dependence of resistivity under different magnetic fields is shown in the main frame of Fig. 2. It is found that the onset transition point, which reflects mainly the upper critical field in the configuration of H$\|$ab-plane, shifts more slowly than the zero resistivity point to low temperatures under fields. The magnetoresistance in the normal state is found to be quite small. We take a criterion of 95%$\rho_n$ to determine the onset transition points under different fields, which are represented by the red open circles in the inset of Fig. 2. From these data we can determine the slope of $H_{c2}(T)$ near $T_c$, $dH_{c2}/dT|_{T_c} \approx -7.1$ T/K. By using the WHH formula[@WHH] the value of zero temperature upper critical field $H_{c2}(0)$ can be estimated through: $$H_{c2}(0)=-0.693T_c(\frac{dH_{c2}}{dT})|_{T_c}. \label{eq:1}$$ Taking $T_c$= 15.6 K, we get $H_{c2}(0) \approx 77$ T. Regarding the relatively low value of $T_c$=15.6 K in the present sample, this value of upper critical field $H_{c2}(0)$ is actually quite high. Actually, in the strontium-doped Ln$_{1-x}$Sr$_x$FeAsO (Ln = La, Pr), the rather high $H_{c2}(0)$ and large slope $dH_{c2}(T)/dT|_{T_c}$ ($\sim4$ T/K) have been observed when comparing with the F-doped LaFeAsO sample, which was attributed to higher quasiparticle density of states (DOS) near the Fermi level in the hole-doped samples.[@PrSr] Surprisingly, the slope $dH_{c2}(T)/dT|_{T_c}$ found here is even larger than that of the strontium-doped samples. The essential physical mechanism for this behavior may still need more investigation in this system, including that from the theoretical side. Hall effect of Tb$_{1-x}$Ca$_{x}$FeAsO -------------------------------------- It is known that Hall effect measurement is a useful tool to investigate the information of charge carriers and the band structure. For a conventional metal with Fermi liquid feature, the Hall coefficient is almost independent of temperature. However, this situation is changed for a multiband material[@HY] or a sample with non-Fermi liquid behavior, such as the cuprate superconductors.[@Ong] To examine the type of the conducting carriers, we measured the Hall effect of the samples Tb$_{1-x}$Ca$_{x}$FeAsO. The main frame of Fig. 3 shows the magnetic field dependence of Hall resistivity ($\rho_{xy}$) at different temperatures for the sample with $x$ = 0.44. In the experiment $\rho_{xy}$ was taken as $\rho_{xy}$ = \[$\rho$(+H) - $\rho$(-H)\]/2 at each point to eliminate the effect of the misaligned Hall electrodes. We can see that all curves in Fig. 3 have good linearity versus the magnetic field. Moreover, $\rho_{xy}$ is positive at all temperatures below 160 K giving a positive Hall coefficient $R_H = \rho_{xy}/H$, which actually indicates that hole-type charge carriers dominate the conduction below 160 K in the present sample. The temperature dependence of $R_H$ for two samples with $x$ = 0.44 and 0.45 is shown in the inset of Fig. 3. One can see that the evolution of $R_H$ with temperature are quite similar for the two samples, indicating the reliability of the Hall data. The hump feature in low temperature region is quite similar to that observed in strontium-doped Ln$_{1-x}$Sr$_{x}$FeAsO (Ln = La, Pr) samples.[@WenEPL; @LaSr2; @PrSr] However, there is still some differences obviously. Firstly, the Hall coefficient $R_H$ changes its sign at about 160 K which is remarkably lower than that observed in the strontium-doped systems ($\sim250$ K). This character seems to be quite common in the calcium-doped 1111 phase because the sign changing of $R_H$ was also found to occur at about 160 K in Pr$_{1-x}$Ca$_{x}$FeAsO (see Fig. 5) and Nd$_{1-x}$Ca$_{x}$FeAsO (data not shown here). Secondly, the negative $R_H$ at about 200 K has a rather large absolute value. This feature seems to be unique in the calcium-doped superconducting samples, since it can’t be observed in Ln$_{1-x}$Sr$_{x}$FeAsO (Ln = La, Pr) or Pr$_{1-x}$Ca$_{x}$FeAsO. Assuming a simple two-band scenario with different types of carriers, we can express the Hall coefficient $R_H$ in the low-field limit as $$R_H=\frac{\sigma_1 \mu_1+\sigma_2 \mu_2}{(\sigma_1+\sigma_2)^2},\label{eq:2}$$ where $\sigma_i$ and $\mu_i$ are the conductivity and the mobility of the $i^{th}$ band, respectively. They are determined by the charge-carrier density and scattering rate of each band. We attribute the strong and complicated temperature dependence of $R_H$ in the present system to the competing effect of the scattering rate as well as the charge-carrier density in different bands. ![(Color online) Temperature dependence of resistivity for two calcium-doped samples Pr$_{1-x}$Ca$_{x}$FeAsO with $x$ = 0.20 and 0.40, along with two strontium-doped samples Pr$_{1-x}$Sr$_{x}$FeAsO with $x$ = 0.05 and 0.25 for comparison. It is clear that the behavior of the calcium-doped samples is between that of the two strontium-doped samples in high temperature region.[]{data-label="fig4"}](Fig4.eps){width="9cm"} ![(Color online) Hall effect measurements for one sample Pr$_{0.60}$Ca$_{0.40}$FeAsO. The main frame shows the field dependence of the Hall resistivity $\rho_{xy}$ at different temperatures. Inset: Temperature dependence of the Hall coefficient $R_H$, which is positive in the temperature region below about 160 K.[]{data-label="fig5"}](Fig5.eps){width="9cm"} The case in the calcium-doped Pr$_{1-x}$Ca$_{x}$FeAsO ----------------------------------------------------- One may be curious to know what would happen if we substitute calcium to the systems based on other rare-earth elements. Actually, we have tried the case of calcium-doped LaFeAsO, PrFeAsO, NdFeAsO, GdFeAsO, and so on. Here we just show the results of Pr$_{1-x}$Ca$_{x}$FeAsO for example. No superconductivity was found in the calcium-doped Pr$_{1-x}$Ca$_{x}$FeAsO samples in quite wide doping range ($0.10\leq x \leq 0.50$). In Fig. 4, we show the temperature dependence of resistivity for two selected samples with $x = 0.20$ and 0.40. In order to have a comparison, we also display the resistivity data for two strontium-doped Pr$_{1-x}$Sr$_{x}$FeAsO samples with different doping levels ($x$ = 0.05 and 0.25). It is clear that the resistivity anomaly from the AF or structural transition around 160 K is suppressed gradually with the increase of strontium contents. By having a closer scrutiny, we find that the behavior of the calcium-doped samples is between that of the two strontium-doped samples in high temperature region. This may suggest that the real doped charge carriers in the calcium-doped PrFeAsO are roughly corresponding to $0.10 \sim0.20$ of that of the strontium-doped PrFeAsO system and the AF order has been suppressed to a certain extent by the calcium-doping. To further investigate the conducting properties of the Pr$_{1-x}$Ca$_{x}$FeAsO sample, we have measured the Hall effect of them and display the data of one typical sample with $x = 0.40$ in Fig. 5. Nonlinear behavior was observed in the field dependent $\rho_{xy}$ data below 100 K. The hump feature and positive value of $R_H$ can be seen below about 160 K, which is rather similar to that observed in Tb$_{1-x}$Ca$_{x}$FeAsO (see Fig. 3). This behavior indicates strongly that the hole-type charge carriers have been induced to the system and they dominate the conducting in low temperature region. [ccccccc]{}sample & $a$ ($\AA$) & $c$ ($\AA$) & Fe-As-Fe ($^o$) & d$_{PrOPr}$ ($\AA$) & d$_{AsFeAs}$ ($\AA$) & d$_{inter}$ ($\AA$)\ PrFeAsO & $3.985$ & $8.595$ & $111.968$ & $2.405$ & $2.690$ & $1.750$\ Pr$_{0.87}$Ca$_{0.13}$FeAsO & $3.987$ & $8.628$ & $112.429$ & $2.396$ & $2.668$ & $1.782$\ Pr$_{0.84}$Sr$_{0.16}$FeAsO & $3.985$ & $8.622$ & $112.413$ & $2.387$ & $2.666$ & $1.785$\ \[tab:table1\] In order to find the factors which prevent Pr$_{1-x}$Ca$_{x}$FeAsO from superconducting even if hole-type charge carriers have been doped into the system, we analyzed the structural details of one calcium-doped Pr$_{1-x}$Ca$_x$FeAsO with nominal $x$ = 0.4. Selected Rietveld refinement results are listed in table I, and the refinement pattern is shown in Fig. 6. Only small amounts of Pr$_2$O$_3$ and FeAs can be seen as the impurities. From the refinement, we find that the actual doping concentration for the sample Pr$_{1-x}$Ca$_x$FeAsO with nominal $x$ = 0.4 is only about 0.13, which is quite consistent with the argument we obtained from the resistivity data (see Fig. 4). In order to have a comparison with the strontium-doped PrFeAsO system where superconductivity has been obtained, we also display the structural parameters of the parent phase PrFeAsO and strontium-doped Pr$_{1-x}$Sr$_x$FeAsO with $x$ = 0.16 (the value from refinement) [@Jeitschko; @Ju] in table I. Here we define d$_{PrOPr}$ and d$_{AsFeAs}$ as the vertical distance between the Pr atoms residing at the top and bottom of the PrO layer and that between the As atoms in the FeAs layer, respectively. And d$_{inter}$ is the interlayer space between the Pr-O-Pr block and the As-Fe-As block. It is clear that the lattice constant along $a$-axis remains nearly unchanged while that along $c$-axis expands clearly when calcium is doped to PrFeAsO. Both d$_{PrOPr}$ and d$_{AsFeAs}$ shrink slightly while d$_{inter}$ expands distinctly with the actual calcium doping of 0.13, resulting in the expansion behavior of the lattice along $c$-axis. Surprisingly, we find that calcium doping gives a rather similar influence to the crystal structure to that of strontium doping, when we compare the parameters of Pr$_{0.87}$Ca$_{0.13}$FeAsO and Pr$_{0.84}$Sr$_{0.16}$FeAsO as shown in table I, even if the radius of Ca$^{2+}$ is smaller than that of Pr$^{3+}$ while the radius of Sr$^{2+}$ is larger (see Fig. 7). We note that the sample Pr$_{0.84}$Sr$_{0.16}$FeAsO still doesn’t superconduct and superconductivity was achieved in the samples with even higher doping, as reported in Ref.\[25\]. However, the fact that the radius of Ca$^{2+}$ is smaller than that of Pr$^{3+}$ seems to prevent from doping even more calcium to PrFeAsO and consequently prevent from achieving superconductivity in Pr$_{1-x}$Ca$_{x}$FeAsO system, because the effect of doped calcium is to expand the lattice along $c$-axis. This argument is reinforced by the fact that only 13% of calcium can be doped into the system even if the nominal doping concentration is 40%. ![(Color online) The observed (red crosses) and calculated (green solid line) x-ray powder diffraction patterns of Pr$_{0.6}$Ca$_{0.4}$FeAsO. The three rows of vertical bars show the calculated positions of Bragg reflections for Pr$_2$O$_3$ (blue), FeAs(red) and Pr$_{0.6}$Ca$_{0.4}$FeAsO (black), respectively. The magenta solid line shown at the bottom of the figure indicates the differences between observations and calculations.[]{data-label="fig6"}](Fig6.eps){width="9cm"} ![(Color online) The data of ion radii for some selected rare-earth-element ions. The blue dotted and red dashed lines represent the value of Sr$^{2+}$ and Ca$^{2+}$, respectively.[]{data-label="fig7"}](Fig7.eps){width="9cm"} To validate our supposition, we have tried the case of other calcium-doped samples. In La$_{1-x}$Ca$_{x}$FeAsO, we found that it is quite difficult to dope charge carriers (probably also Ca) to the system and the Hall coefficient remains negative, and very similar behaviors to that of Pr$_{1-x}$Ca$_{x}$FeAsO were observed in Nd$_{1-x}$Ca$_{x}$FeAsO. Very small superconducting signal can be observed in Sm$_{1-x}$Ca$_{x}$FeAsO sometimes. Zero resistance can be obtained easily in Gd$_{1-x}$Ca$_{x}$FeAsO, but the diamagnetic signal is smaller than that of the Tb$_{1-x}$Ca$_{x}$FeAsO system. We can’t get the 1111 phase on the heavy rare-earth (Dy, Ho, et al) side under ambient pressure. By summarizing the phenomena mentioned above, we argue that the relationship between the ion radii of the rare-earth elements and the alkaline-earth element may play a key role in achieving superconductivity in the hole-doped 1111 phase (see Fig. 7). That is, superconductivity emerges only when the ion radius of the rare-earth element is smaller than that of the alkaline-earth element. At this time, we can say safely that it is rather difficult, if not impossible, to obtain superconductivity when the ion radius of the rare-earth element is larger. Moreover, it seems that superconductivity favors the situation when the difference between the two radii is lager, within the tolerance of crystal lattice. These arguments are quite consistent with that stated in the previous paragraph. This actually gives a restriction in exploring new superconductors in hole-dope side of 1111 phase. Concluding remarks ================== In summary, bulk superconductivity was achieved by substituting Tb$^{3+}$ with Ca$^{2+}$ in TbFeAsO system. The maximum superconducting transition temperature $T_c$ = 15.6 K is found to appear around the nominal doping level $x$ = 0.40$\sim$ 0.50. The positive Hall coefficient $R_H$ in a wide low-temperature range suggests that the hole-type charge carriers dominate the conduction in this system. Surprisingly, the slope of the upper critical magnetic field vs. temperature near $T_c$ in calcium-doped Tb$_{1-x}$Ca$_{x}$FeAsO is found to be much higher than that of the electron-doped and strontium-doped ones. Moreover, we have investigated the structural and conducting properties of other calcium-doped systems (taking Pr$_{1-x}$Ca$_{x}$FeAsO for example). We found that the relationship between the ion radii of the rare-earth elements and alkaline-earth elements may play a key role in achieveing superconductivity in the hole-doped 1111 phase. We acknowledge the help of XRD experiments from L. H. Yang and H. Chen. This work is supported by the Natural Science Foundation of China, the Ministry of Science and Technology of China (973 project: 2006CB01000, 2006CB921802), the Knowledge Innovation Project of Chinese Academy of Sciences (ITSNEM). [00]{} Y. Kamihara, T. Watanabe, M. Hirano, and H. Hosono, J. Am. Chem. Soc. **130**, 3296 (2008). X. Zhu, F. Han, P. Cheng, G. Mu, B. Shen, and H. H. Wen, Europhys. Lett. **85**, 17011 (2009). M. Rotter, M. Tegel, and D. Johrendt, Phys. Rev. Lett. **101**, 107006 (2008). K. Sasmal, B. Lv, B. Lorenz, A. M. Guloy, F. Chen, Y. Y. Xue, and C. W. Chu, Phys. Rev. Lett. **101**, 107007 (2008). X. C. Wang, Q. Q. Liu, Y. X. Lv, W. B. Gao, L. X. Yang, R. C. Yu, F. Y. Li, and C. Q. Jin, arXiv: Condat/0806.4688. J. H. Tapp, Z. Tang, B. Lv, K. Sasmal, B. Lorenz, P. C.W. Chu, and A. M. Guloy, Phys. Rev. B **78**, 060505(R) (2008). M. J. Pitcher, D. R. Parker, P. Adamson, S. J. C. Herkelrath, A. T. Boothroyd, and S. J. Clarke, Chem. Commun. (Cambridge) **2008**, 5918. F.C. Hsu, J.Y. Luo, K.W. Yeh, T.K. Chen, T.W. Huang, P.M. Wu, Y.C. Lee, Y.L. Huang, Y.Y. Chu, D.C. Yan, M.K. Wu, Proceedings of National Academy of Sciences **105**, 14262 (2008). X. Zhu, F. Han, G. Mu, P. Cheng, B. Shen, B. Zeng, and H. H. Wen, Phys. Rev. B **79**, 220512(R) (2009) Z. Ren, J. Yang, W. Lu, W. Yi, G. C. Che, X. L. Dong, L. L. Sun, and Z. X. Zhao, Materials Research Innovations **12**, 105, (2008). P. Cheng, L. Fang, H. Yang, X. Zhu, G. Mu, H. Luo, Z. Wang, and H. H. Wen, Science in China G, **51(6)**, 719-722 (2008). C. Wang, L. Li, S. Chi, Z. Zhu, Z. Ren, Y. Li, Y. Wang, X. Lin, Y. Luo, S. Jiang, X. Xu, G. Cao, and Z. Xu, Europhys. Lett. **83**, 67006 (2008). A. S. Sefat, A. Huq, M. A. McGuire, R. Jin, B. C. Sales, D. Mandrus, L. M. D. Cranswick, P. W. Stephens, and K. H. Stone, Phys. Rev. B **78**, 104505 (2008). G. Cao, C. Wang, Z. Zhu, S. Jiang, Y. Luo, S. Chi, Z. Ren, Q. Tao, Y. Wang, and Z. Xu, Phys. Rev. B **79**, 054521 (2009). H. H. Wen, G. Mu, L. Fang, H. Yang, and X. Y. Zhu, Europhys. Lett. **82**, 17009 (2008). G. Mu, L. Fang, H. Yang, X. Zhu, P. Cheng, and H. H. Wen, J. Phys. Soc. Jpn. Suppl. **77**, 15-18 (2008). G. Mu, B. Zeng, X. Zhu, F. Han, P. Cheng, B. Shen, and H. H. Wen, Phys. Rev. B **79**, 104501 (2009). K. Kasperkiewicz, J. G. Bos, A. N. Fitch, K. Prassides, and S. Margadonna, Chem. Commun. (Cambridge) **2009**, 707. N. R. Werthamer, E. Helfand and P. C. Hohenberg, Phys. Rev. **147**, 295 (1966). V. Johnson, and W. Jeitschko, J. Solid State Chem. **11**, 161 (1974). J. Yang, X. L. Shen, W. Lu, W. Yi, Z. C. Li, Z. A. Ren, G. C. Che, X. L. Dong, L. L. Sun, F. Zhou, and Z. X. Zhao, New J. Phys. **11** 025005 (2009). H. Yang, Y. Liu, C. G. Zhuang, J. R. Shi, Y. G. Yao, S. Massidda, M. Monni, Y. Jia, X. X. Xi, Q. Li, Z. K. Liu, Q. R. Feng, H. H. Wen, Phys. Rev. Lett. **101**, 067001 (2008). T. R. Chien, D. A. Brawner, Z. Z. Wang, and N. P. Ong, Phys. Rev. B, **43**, 6242-6245 (1991). P. Quebe, L.J. Terbüchte, and W. Jeitschko, New J. Phys. **11** 083003 (2009). J. Ju, Z. Li, G. Mu, H. H. Wen, K. Sato, M. Watahiki, G. Li, and K. Tanigaki, New J. Phys. **11** 083003 (2009).
{ "pile_set_name": "ArXiv" }
Q: Does the hash of a file change if the filename changes? Does the hash of a file change if the filename or path or timestamp or permissions change? $ echo some contents > testfile $ shasum testfile 3a2be7b07a1a19072bf54c95a8c4a3fe0cdb35d4 testfile A: The hash of a file is the hash of its contents. Metadata such as the file name, timestamps, permissions, etc. have no influence on the hash. Assuming a non-broken cryptographic hash, two files have the same hash if and only if they have the same contents. The most common such hashes are the SHA-2 family (SHA-256, SHA-384, SHA-512) and the SHA3 family. This does not include MD5 or SHA-1 which are broken, nor a CRC such as with cksum which is not a cryptographic hash. A: Not as far as I can tell after a simple test. $ echo some contents > testfile $ shasum testfile 3a2be7b07a1a19072bf54c95a8c4a3fe0cdb35d4 testfile $ mv testfile newfile $ shasum newfile 3a2be7b07a1a19072bf54c95a8c4a3fe0cdb35d4 newfile
{ "pile_set_name": "StackExchange" }
The use of pre-operative brain natriuretic peptides as a predictor of adverse outcomes after cardiac surgery: a systematic review and meta-analysis. The objective of this systematic review was to assess whether pre-operative brain natriuretic peptide (BNP) and N-terminal pro-B-type natriuretic peptide (NT pro-BNP) are independent predictors of adverse outcomes after cardiac surgery. MEDLINE, Embase and the Cochrane Controlled Trials Register databases were searched. Eligible studies included observational or randomized control trials measuring natriuretic peptide concentrations before induction of anaesthesia for cardiac surgery. Two investigators independently extracted the data and assessed the validity of the included studies. The predictive ability of pre-operative BNP or NT pro-BNP on mortality, post-operative atrial fibrillation (AF) and intra-aortic balloon pump (IABP) requirement was meta-analysed. The association between BNP or NT pro-BNP and other outcomes was systematically summarized. A total of 4933 patients from 22 studies were considered in the systematic review. Ten studies with one or more outcomes of interest were included in the meta-analyses. The strength of association between pre-operative natriuretic peptide levels and adverse outcomes after surgery was variable, as was the size and quality of the included studies. The summary areas under the receiver operating characteristic curve for mortality, post-operative AF and post-operative IABP requirement were 0.61 (95% confidence interval [CI] 0.51-0.70), 0.61 (95% CI 0.58-0.64) and 0.81 (95% CI 0.73-0.89), respectively. With the limited data available, the associations between pre-operative natriuretic peptide levels and adverse outcomes after cardiac surgery were moderate. Future studies should assess whether pre-operative natriuretic peptides can provide additional independent predictive information to well-validated prognostic scores of cardiac surgery.
{ "pile_set_name": "PubMed Abstracts" }
1. Technical Field Embodiments of the present invention generally relate to cooling systems. More particularly, embodiments relate to dynamically cooling computing systems. 2. Discussion As society continues to become more mobile, the demand for enhanced mobile computing systems also grows. Indeed, the desirability of features such as wireless networking and digital imaging has spurred an unparalleled increase in the use of systems such as notebook (or laptop) computers, handheld personal digital assistants (PDAs) and wireless smart phones. Other types of computing systems such as desktop computers, servers and set-top boxes have also been associated with an escalation in functionality and use. While adding features to computing systems has likely increased the marketability of these systems, it has been determined that the additional power workload associated with these features can negatively affect processing performance and/or battery life. For example, the temperature increases that commonly accompany feature-rich mobile computing have been a recent area of concern. As components consume more power, they generate heat, which can slow down transistor switching and increase the drain of current on the power supply. While conventional notebook computers often make use of strategically located and sized vents to address these temperature concerns by increasing the amount of airflow through the system, a number of difficulties remain. In particular, the power workloads and associated optimum cooling requirements in a mobile computing system often change as the use of the mobile computing system changes. For example, the use of a computing system's wireless networking functionality may result in the generation of heat in an entirely different set of components than the use of the computing system's digital imaging functionality. The location and sizing of conventional vents in mobile computing systems, however, is static and typically does not change once the system is designed and constructed. As a result, a computing system having a vent scheme that is optimized for one usage profile may experience less than optimum performance and battery life for another usage profile.
{ "pile_set_name": "USPTO Backgrounds" }
Professional issues for physiotherapists in family-centred and community-based settings. This paper reports results from a qualitative study of physiotherapists in a community-based and family-centred setting in which a growing awareness of the family-centred approach accompanied the transition from an institutional structure to a predominantly community-based structure. The goal was to gain insight into how a family-centred philosophy was working and to explore the benefits and dilemmas for physiotherapists in such a setting. Semi-structured interviews were conducted with 10 physiotherapists working with children with disabilities. Analysis of the results against a continuum of family control versus physiotherapist control showed that physiotherapists saw their roles as working with the family to discuss shared goals. However, qualitative analyses showed tensions between the policy of family involvement and another influential policy in physiotherapy: evidence-based practice. Further, there were tensions if the desires of the family could not be matched with available resources. The results show benefits and barriers to working in a community-based, family-centred approach. Barriers included practical dilemmas, policy dilemmas, and career dilemmas. This paper argues that, while family-centred practice is supported by the literature and physiotherapists, significant policy and professional issues need to be addressed before such practice can be fully adopted.
{ "pile_set_name": "PubMed Abstracts" }
UrbanSpoon Review: “Likes it” IF YOU CAN DREAM IT UrbanSpoon Review: “Likes it” Service – Good…seems like its a family owned and operated place. On of last visit, I got the impression that the mom ran the front of house, the dad did the cooking and daughters were the severs. Food – Been there 3 times and each time had the lunch buffet. The food was good for a buffet…but only average for Indian food. It just seemed to lack some of strong spices and flavor of Indian food. With that said…it was still very good for a lunch buffet.
{ "pile_set_name": "Pile-CC" }
sigmaAngle = 0.0005; sigmaDistance = 1;
{ "pile_set_name": "Github" }
The pro-life community in Connecticut will rally Tuesday to protest a bill passed last week by the Democrat-led State House of Representatives that would subject the advertising of faith-based, pro-life pregnancy centers to the oversight of the state attorney general. “The Anti-Pregnancy Center Bill is the first abortion-related legislation to pass a chamber of the Connecticut General Assembly in nearly thirty years,” warned Family Institute of Connecticut (FIC) president Peter Wolfgang. “Our last chance to stop it from becoming law is in the State Senate.” URGENT: PRO-LIFE RALLY Tuesday, May 21, 2019, Noon, at State Capitol **More Details to Follow**https://t.co/K4WDE1Z1zU — Family Institute CT (@FICAction) May 18, 2019 Wolfgang continued: These centers honestly and openly serve hundreds of women in our state seeking assistance and an alternative to abortion. Litigation created by this bill, even if using false claims, could easily put these centers out of business. The centers are not able to recover legal costs under this bill, even if a court rules the claim is false. H.B. 7070, an Act Concerning Deceptive Advertising Practices of Limited Services Pregnancy Centers, makes the claim that the pro-life centers engage in “deceptive advertising practices” that give pregnant women the impression they offer abortions. During a public health committee hearing of the bill in February, Democrat State Rep. Liz Linehan said the faith-based centers “operate with the appearance of a medical facility and advertise to people as though they offer abortion and emergency contraception, when they are actually opposed to these services,” reported CT Mirror. Linehan added the faith-based facilities “lure” women who are “in a vulnerable state, looking to receive time-sensitive, sensitive health care information from qualified individuals.” The Democrat lawmakers moved ahead with the legislation despite a lawsuit filed in April by a pro-life pregnancy center against the capital city of Hartford. Pro-life ministry Caring Families Pregnancy Services filed the lawsuit in U.S. District Court, seeking an injunction to stop enforcement of the city ordinance that compels the pregnancy center and its Mobile Care ministry to post signs and messages stating, “This facility does not have a licensed medical provider on site to provide or supervise all services.” In the complaint filed by Alliance Defending Freedom (ADF), the non-profit litigation firm representing Caring Families Mobile Care ministry, the pregnancy center observed: These compelled statements incorrectly imply that Mobile Care is not qualified to provide the free services it offers. … No other entities are required to post the signs or make the verbal statements. Hartford exempts abortion clinics, community health centers, and all other health care entities from the Ordinance. Hartford exempts all other entities besides pro-life pregnancy resource centers, even if those other entities meet all the criteria that Hartford is purportedly concerned about. The complaint noted as well that the ministry offers many services and faith supports that “do not require supervision by a licensed medical provider.” “The ordinance is similar to portions of a California law that the U.S. Supreme Court struck down last year in National Institute of Family and Life Advocates v. Becerra,” ADF said in a press statement. Kevin Theriot, ADF senior counsel, said Hartford “has no business steering women away from life-affirming help.” “The U.S. Supreme Court ruled just last year that pro-life pregnancy centers should be free to serve women without unjust government punishment,” he continued. “Hartford’s law only makes it harder for women to seek out all of their options and obtain support. That’s why we’re filing a lawsuit to protect pregnancy centers from hostile regulation that singles them out.” Wolfgang said in a statement to Breitbart News that State House Democrats have reacted to the lawsuit against the city of Hartford “by saying they want the legislature to pass the same law in the hope that the State of Connecticut will be sued too.” “Other jurisdictions have had to pay huge fines to pregnancy centers after losing similar cases but the House leadership does not care,” he added. “With leadership like this, it’s no wonder our state is a fiscal disaster.” Letter says HB 7070, the anti-pregnancy center bill, could cause CT to be penalized bc Weldon Amendment: "The Connecticut Senate should avoid the huge loss of federal funds, or paying the legal fees of pregnancy centers, by simply letting this bill die." https://t.co/BGxPsFgT43 — Family Institute CT (@FICAction) May 21, 2019 Journal Inquirer columnist Chris Powell wrote in February the anti-pregnancy center legislation “is largely a mechanism by which the pro-abortion side aims to intimidate the anti-abortion side and to frighten legislators into striking pro-abortion poses.” “[T]he more the left practices intimidation here, the less it may persuade the country that there is nothing questionable about abortion, not even abortion of late-term, viable fetuses and infanticide,” he wrote. “Indeed, the Democratic Party, the party of the left, is already giving the impression that it considers abortion the highest social good.” In keeping with Powell’s observation, on Monday, Connecticut’s Democrat Gov. Ned Lamont and Lt. Gov. Susan Bysiewicz published an open letter urging women who own businesses around the country to move to Connecticut – where having an abortion is viewed positively. CT Mirror reported that Lamont and Bysiewicz urged women in states that have passed pro-life legislation to look to Connecticut, promising them assistance with relocating their businesses and an abortion-friendly climate. “If you are as concerned as we are about this issue, we would urge you to relocate your operations to a state that supports the rights of women and whose actions and laws are unwavering in support of tolerance and inclusivity,” Lamont and Bysiewicz wrote. The Democrat leaders’ invitation to women business owners comes as the state’s “fiscal disaster,” as noted by Wolfgang, continues to make headlines regularly. Businesses have left the state and homeowners have responded similarly in the wake of continued tax increases, most recently of which are proposed tolls on state highways. Connecticut is considered a “sinkhole state,” without enough assets to cover its debt, says Truth in Accounting. The state ranks as number 49 for fiscal health in the nation, with only New Jersey ranking below it. “Because Connecticut doesn’t have enough money to pay its bills, it has a $69.8 billion financial hole,” the financial watchdog states. “To fill it, each Connecticut taxpayer would have to send $53,400 to the state.”
{ "pile_set_name": "OpenWebText2" }
Kitchen Nightmares Kitchen Nightmares is an American reality television series formerly broadcast on the Fox network, in which chef Gordon Ramsay is invited by the owners to spend a week with a failing restaurant in an attempt to revive the business. It is based on the British show Ramsay's Kitchen Nightmares. The show premiered Wednesday September 19, 2007. On June 23, 2014, Ramsay announced that he was ending the series. In June 2018, Gordon Ramsay's 24 Hours to Hell and Back, a new series with a premise much like Kitchen Nightmares but a shorter timeline, premiered on Fox. Production The show was produced by ITV Studios America and Optomen, in association with A. Smith & Co. Productions, with Arthur Smith, Kent Weed and Patricia Llewellyn serving as executive producers. In the UK, the series is broadcast under the name Kitchen Nightmares USA and Ramsay's Kitchen Nightmares USA on Channel 4, which also produced the original UK version. Reruns, along with the British series, are frequently shown on BBC America. Series overview Episodes Season 1 (2007) The first season focused on restaurants in the southern California and New York City areas. Season 2 (2008–09) Season 3 (2010) The third season was originally scheduled to premiere on Wednesday, January 27, 2010, but it was postponed to Friday, January 29, 2010, due to the State of the Union address. Season 4 (2011) In May 2010, the Fox network announced the return of Kitchen Nightmares for a fourth season. The fourth season aired from January 21, 2011 to May 20, 2011 on Fox. Season 5 (2011–12) In March 2011 the producers of the show announced a casting call for a fifth season. The fifth season premiered on Friday, September 23, 2011 and ended on March 30, 2012. Season 6 (2012–13) In February 2012 the Fox network announced it renewed Kitchen Nightmares for a sixth season, which premiered on Friday, October 26, 2012. {{Episode table |background = #66ccff |overall=6 |season = 6 |title = 41 |aux1 = 25 |airdate = 12 |viewers = 10 |country = US |titleT = Restaurant |aux1T = Location |episodes = {{Episode list |EpisodeNumber = 82 |EpisodeNumber2 = 15 |Title = Amy's Baking Company |Aux1 = Scottsdale, Arizona |OriginalAirDate = |Viewers = N/A |ShortSummary = Because of the level of conflict with the restaurant owners, Ramsay leaves the restaurant without finishing, a first (and the only instance) in Kitchen Nightmares''' history. |LineColor = 66CCFF }} }} Season 7 (2014) Season 7 was originally set to premiere on February 28, 2014, but was delayed until April 11, 2014. Lawsuit In September 2007, a case was filed by Martin Hyde, the former general manager of Dillon's, against Ramsay for allegedly staging disasters and hiring actors to trick the viewing audience. The case was dismissed and went into arbitration. Reception Ginia Bellafante of the New York Times found Ramsay's teaching methods and high standards "undeniably hypnotic" and commented that "the thrill of watching Mr. Ramsay is in witnessing someone so at peace with his own arrogance." Doug Elfman of the Chicago Sun-Times said the show is "a very entertaining public service" that "will make you laugh, make you sick and make you think". Randy Cordova of the Arizona Republic found Ramsay "just as blustery and foul-mouthed here as he is on Hell's Kitchen. But he is also oddly endearing, mainly because he genuinely seems invested in the fate of each restaurant". Critics have commented that Fox's adaptation of Kitchen Nightmares strayed from the strengths of the original Channel 4 series. Maureen Ryan of the Chicago Tribune said, "Leave it to Fox to take something the Brits did pretty well and muck it up". She added, "Never mind the cooking; this edition of the show appears to be more interested in playing up the family dramas at the restaurants Ramsay visits". Robert Lloyd of the Los Angeles Times commented, "Whereas the British Ramsay's Kitchen Nightmares'' is fundamentally a food show — it has interesting things to show you about how a restaurant runs and a kitchen works, the wonders of local markets and what you can make from them if you're Gordon Ramsay or willing to follow his instructions — the Fox edition emphasizes mishap, argument and emotional breakdown almost to the exclusion of cuisine". See also Bar Rescue Hotel Hell Restaurant: Impossible Restaurant Makeover Restaurant Stakeout Ramsay's Kitchen Nightmares Notes References General references External links Category:2007 American television series debuts Category:2014 American television series endings Category:2000s American reality television series Category:2010s American reality television series Category:American television series based on British television series Category:English-language television programs Category:Food reality television series Category:Fox Broadcasting Company original programming Category:Television series by All3Media Category:Television series by 20th Century Fox Television Category:Television series by ITV Studios Category:2000s American workplace television series Category:2010s American workplace television series
{ "pile_set_name": "Wikipedia (en)" }
Q: Rails 4: favicon not showing My favicon just won't show, in Chrome or Firefox. This is how I am rendering it in the <head> section: <%= favicon_link_tag 'favicon.ico' %> It is located in public/images. This is the produced HTML: <link rel="shortcut icon" type="image/x-icon" href="/images/favicon.ico"> Opening the link in my browser shows the icon correctly. A: The favicon is not handled by the asset pipeline when its in the public folder, and this can cause caching problems. See here: How to add favicon in rails 3.2 and Clear the cache from the Rails asset pipeline. Use the favicon_link_tag and place the .ico file in /app/assets/images/ to get it into the asset pipeline. If it still doesn't work after that, try clearing your browser cache, your rails cache, and restarting your rails server.
{ "pile_set_name": "StackExchange" }
By Lauren Down10 February 2011, 12:36 Created and installed in the 1980s, Scottish sculptor and artist Eduardo Paolozzi’s tiled murals have long adorned the walls of Tottenham Court Road station’s ticketing halls and platforms. With refurbishments under way in preparation of the new Crossrail train line, Transport for London have not yet given an actual estimate of how much of the thousand-sqaure metre mural will be lost, only that some most certainly will. Ahead of the refurbishment, the French artist Daniel Buren has been commissioned to make new works for the completed station.
{ "pile_set_name": "Pile-CC" }
import { Menu, app, shell, MenuItemConstructorOptions } from 'electron'; import i18next from 'i18next'; import { createSelector, createStructuredSelector } from 'reselect'; import { relaunchApp } from '../../app/main/app'; import { CERTIFICATES_CLEARED } from '../../navigation/actions'; import { dispatch, select, Service } from '../../store'; import { RootState } from '../../store/rootReducer'; import { MENU_BAR_ABOUT_CLICKED, MENU_BAR_ADD_NEW_SERVER_CLICKED, MENU_BAR_TOGGLE_IS_TRAY_ICON_ENABLED_CLICKED, MENU_BAR_TOGGLE_IS_MENU_BAR_ENABLED_CLICKED, MENU_BAR_TOGGLE_IS_SIDE_BAR_ENABLED_CLICKED, MENU_BAR_SELECT_SERVER_CLICKED, MENU_BAR_TOGGLE_IS_SHOW_WINDOW_ON_UNREAD_CHANGED_ENABLED_CLICKED, } from '../actions'; import { askForAppDataReset } from './dialogs'; import { getRootWindow } from './rootWindow'; import { getAllServerWebContents, getWebContentsByServerUrl } from './webviews'; const t = i18next.t.bind(i18next); const on = ( condition: boolean, getMenuItems: () => MenuItemConstructorOptions[], ): MenuItemConstructorOptions[] => (condition ? getMenuItems() : []); const createAppMenu = createSelector( () => undefined, (): MenuItemConstructorOptions => ({ id: 'appMenu', label: process.platform === 'darwin' ? app.name : t('menus.fileMenu'), submenu: [ ...on(process.platform === 'darwin', () => [ { id: 'about', label: t('menus.about', { appName: app.name }), click: () => { getRootWindow().show(); dispatch({ type: MENU_BAR_ABOUT_CLICKED }); }, }, { type: 'separator' }, { id: 'services', label: t('menus.services'), role: 'services', }, { type: 'separator' }, { id: 'hide', label: t('menus.hide', { appName: app.name }), role: 'hide', }, { id: 'hideOthers', label: t('menus.hideOthers'), role: 'hideOthers', }, { id: 'unhide', label: t('menus.unhide'), role: 'unhide', }, { type: 'separator' }, ]), ...on(process.platform !== 'darwin', () => [ { id: 'addNewServer', label: t('menus.addNewServer'), accelerator: 'CommandOrControl+N', click: () => { getRootWindow().show(); dispatch({ type: MENU_BAR_ADD_NEW_SERVER_CLICKED }); }, }, { type: 'separator' }, ]), { id: 'disableGpu', label: t('menus.disableGpu'), enabled: !app.commandLine.hasSwitch('disable-gpu'), click: () => { relaunchApp('--disable-gpu'); }, }, { type: 'separator' }, { id: 'quit', label: t('menus.quit', { appName: app.name }), accelerator: 'CommandOrControl+Q', click: () => { app.quit(); }, }, ], }), ); const createEditMenu = createSelector( () => undefined, (): MenuItemConstructorOptions => ({ id: 'editMenu', label: t('menus.editMenu'), submenu: [ { id: 'undo', label: t('menus.undo'), role: 'undo', }, { id: 'redo', label: t('menus.redo'), role: 'redo', }, { type: 'separator' }, { id: 'cut', label: t('menus.cut'), role: 'cut', }, { id: 'copy', label: t('menus.copy'), role: 'copy', }, { id: 'paste', label: t('menus.paste'), role: 'paste', }, { id: 'selectAll', label: t('menus.selectAll'), role: 'selectAll', }, ], }), ); const selectViewDeps = createStructuredSelector({ currentServerUrl: ({ currentServerUrl }: RootState) => currentServerUrl, isSideBarEnabled: ({ isSideBarEnabled }: RootState) => isSideBarEnabled, isTrayIconEnabled: ({ isTrayIconEnabled }: RootState) => isTrayIconEnabled, isMenuBarEnabled: ({ isMenuBarEnabled }: RootState) => isMenuBarEnabled, mainWindowState: ({ mainWindowState }: RootState) => mainWindowState, }); const createViewMenu = createSelector( selectViewDeps, ({ currentServerUrl, isSideBarEnabled, isTrayIconEnabled, isMenuBarEnabled, mainWindowState, }): MenuItemConstructorOptions => ({ id: 'viewMenu', label: t('menus.viewMenu'), submenu: [ { id: 'reload', label: t('menus.reload'), accelerator: 'CommandOrControl+R', enabled: !!currentServerUrl, click: () => { getRootWindow().show(); const guestWebContents = getWebContentsByServerUrl(currentServerUrl); guestWebContents.reload(); }, }, { id: 'reloadIgnoringCache', label: t('menus.reloadIgnoringCache'), enabled: !!currentServerUrl, click: () => { getRootWindow().show(); const guestWebContents = getWebContentsByServerUrl(currentServerUrl); guestWebContents.reloadIgnoringCache(); }, }, { id: 'openDevTools', label: t('menus.openDevTools'), enabled: !!currentServerUrl, accelerator: process.platform === 'darwin' ? 'Command+Alt+I' : 'Ctrl+Shift+I', click: () => { const guestWebContents = getWebContentsByServerUrl(currentServerUrl); guestWebContents.toggleDevTools(); }, }, { type: 'separator' }, { id: 'back', label: t('menus.back'), enabled: !!currentServerUrl, accelerator: process.platform === 'darwin' ? 'Command+[' : 'Alt+Left', click: () => { getRootWindow().show(); const guestWebContents = getWebContentsByServerUrl(currentServerUrl); guestWebContents.goBack(); }, }, { id: 'forward', label: t('menus.forward'), enabled: !!currentServerUrl, accelerator: process.platform === 'darwin' ? 'Command+]' : 'Alt+Right', click: () => { getRootWindow().show(); const guestWebContents = getWebContentsByServerUrl(currentServerUrl); guestWebContents.goForward(); }, }, { type: 'separator' }, { id: 'showTrayIcon', label: t('menus.showTrayIcon'), type: 'checkbox', checked: isTrayIconEnabled, click: ({ checked }) => { dispatch({ type: MENU_BAR_TOGGLE_IS_TRAY_ICON_ENABLED_CLICKED, payload: checked, }); }, }, ...on(process.platform === 'darwin', () => [ { id: 'showFullScreen', label: t('menus.showFullScreen'), type: 'checkbox', checked: mainWindowState.visible, accelerator: 'Control+Command+F', click: ({ checked: enabled }) => { getRootWindow().show(); getRootWindow().setFullScreen(enabled); }, }, ]), ...on(process.platform !== 'darwin', () => [ { id: 'showMenuBar', label: t('menus.showMenuBar'), type: 'checkbox', checked: isMenuBarEnabled, click: ({ checked }) => { getRootWindow().show(); dispatch({ type: MENU_BAR_TOGGLE_IS_MENU_BAR_ENABLED_CLICKED, payload: checked, }); }, }, ]), { id: 'showServerList', label: t('menus.showServerList'), type: 'checkbox', checked: isSideBarEnabled, click: ({ checked }) => { getRootWindow().show(); dispatch({ type: MENU_BAR_TOGGLE_IS_SIDE_BAR_ENABLED_CLICKED, payload: checked, }); }, }, { type: 'separator' }, { id: 'resetZoom', label: t('menus.resetZoom'), accelerator: 'CommandOrControl+0', click: () => { getRootWindow().show(); getRootWindow().webContents.zoomLevel = 0; }, }, { id: 'zoomIn', label: t('menus.zoomIn'), accelerator: 'CommandOrControl+Plus', click: () => { getRootWindow().show(); if (getRootWindow().webContents.zoomLevel >= 9) { return; } getRootWindow().webContents.zoomLevel++; }, }, { id: 'zoomOut', label: t('menus.zoomOut'), accelerator: 'CommandOrControl+-', click: () => { getRootWindow().show(); if (getRootWindow().webContents.zoomLevel <= -9) { return; } getRootWindow().webContents.zoomLevel--; }, }, ], }), ); const selectWindowDeps = createStructuredSelector({ servers: ({ servers }:RootState) => servers, currentServerUrl: ({ currentServerUrl }:RootState) => currentServerUrl, isShowWindowOnUnreadChangedEnabled: ({ isShowWindowOnUnreadChangedEnabled }:RootState) => isShowWindowOnUnreadChangedEnabled, }); const createWindowMenu = createSelector( selectWindowDeps, ({ servers, currentServerUrl, isShowWindowOnUnreadChangedEnabled, }): MenuItemConstructorOptions => ({ id: 'windowMenu', label: t('menus.windowMenu'), role: 'windowMenu', submenu: [ ...on(process.platform === 'darwin', () => [ { id: 'addNewServer', label: t('menus.addNewServer'), accelerator: 'CommandOrControl+N', click: () => { getRootWindow().show(); dispatch({ type: MENU_BAR_ADD_NEW_SERVER_CLICKED }); }, }, { type: 'separator' }, ]), ...on(servers.length > 0, () => [ ...servers.map((server, i): MenuItemConstructorOptions => ({ id: server.url, type: currentServerUrl ? 'checkbox' : 'normal', label: server.title.replace(/&/g, '&&'), checked: currentServerUrl === server.url, accelerator: `CommandOrControl+${ i + 1 }`, click: () => { getRootWindow().show(); dispatch({ type: MENU_BAR_SELECT_SERVER_CLICKED, payload: server.url, }); }, })), { type: 'separator' }, ]), { id: 'showOnUnreadMessage', type: 'checkbox', label: t('menus.showOnUnreadMessage'), checked: isShowWindowOnUnreadChangedEnabled, click: ({ checked }) => { getRootWindow().show(); dispatch({ type: MENU_BAR_TOGGLE_IS_SHOW_WINDOW_ON_UNREAD_CHANGED_ENABLED_CLICKED, payload: checked, }); }, }, { type: 'separator' }, { id: 'minimize', role: 'minimize', label: t('menus.minimize'), accelerator: 'CommandOrControl+M', }, { id: 'close', role: 'close', label: t('menus.close'), accelerator: 'CommandOrControl+W', }, ], }), ); const createHelpMenu = createSelector( () => undefined, (): MenuItemConstructorOptions => ({ id: 'helpMenu', label: t('menus.helpMenu'), role: 'help', submenu: [ { id: 'documentation', label: t('menus.documentation'), click: () => { shell.openExternal('https://docs.rocket.chat/'); }, }, { id: 'reportIssue', label: t('menus.reportIssue'), click: () => { shell.openExternal('https://github.com/RocketChat/Rocket.Chat/issues/new'); }, }, { type: 'separator' }, { id: 'reload-window', label: t('menus.reload'), accelerator: 'CommandOrControl+Shift+R', click: () => { getRootWindow().show(); getRootWindow().reload(); }, }, { id: 'toggleDevTools', label: t('menus.toggleDevTools'), click: () => { getRootWindow().show(); getRootWindow().webContents.toggleDevTools(); }, }, { type: 'separator' }, { id: 'clearTrustedCertificates', label: t('menus.clearTrustedCertificates'), click: () => { getRootWindow().show(); dispatch({ type: CERTIFICATES_CLEARED }); getAllServerWebContents().forEach((webContents) => { webContents.reloadIgnoringCache(); }); }, }, { id: 'resetAppData', label: t('menus.resetAppData'), click: async () => { const permitted = await askForAppDataReset(); if (permitted) { relaunchApp('--reset-app-data'); } }, }, { type: 'separator' }, { id: 'learnMore', label: t('menus.learnMore'), click: () => { shell.openExternal('https://rocket.chat'); }, }, ...on(process.platform !== 'darwin', () => [ { id: 'about', label: t('menus.about', { appName: app.name }), click: () => { getRootWindow().show(); dispatch({ type: MENU_BAR_ABOUT_CLICKED }); }, }, ]), ], }), ); const selectMenuBarTemplate = createSelector([ createAppMenu, createEditMenu, createViewMenu, createWindowMenu, createHelpMenu, ], (...menus) => menus); const selectMenuBarTemplateAsJson = createSelector( selectMenuBarTemplate, (template: unknown) => JSON.stringify(template), ); class MenuBarService extends Service { protected initialize(): void { this.watch(selectMenuBarTemplateAsJson, () => { const menuBarTemplate = select(selectMenuBarTemplate); const menu = Menu.buildFromTemplate(menuBarTemplate); if (process.platform === 'darwin') { Menu.setApplicationMenu(menu); return; } Menu.setApplicationMenu(null); getRootWindow().setMenu(menu); }); } } export default new MenuBarService();
{ "pile_set_name": "Github" }
Q: Writing to a CSV with python without brackets I am trying to write the below information to a csv file in this format: Tmin, -40 However my output looks like the below with the brackets and quotes around the -40: Tmin, ['-40'] My code is below. Basically I am searching through a csv file for a specific phrase, in this case "Tmin", and reading the entry 1 cell to the right. I then want to write both "Tmin" and the value read directly to a second csv file. I have searched for a way to remove the quotes and brackets but have not been able to get it to work. I am pretty new to python so any help would be helpful. Thanks. import csv fileInput = "Input.csv" fileOutput = "output.csv" Name_Column = 0 Value_Column = 1 with open(fileInput, 'r') as file: reader = csv.reader(file) Tmin = [line[Value_Column] for line in reader if line[Name_Column] == 'Tmin'] print "Tmin=", Tmin #print to screen to check value read with open (fileOutput,'w') as file: writer = csv.writer(file) print writer.writerow(['Tmin',Tmin]) A: python is just printing the Tmin as a list, you can either print the CSV row as a string, or just the first element in the row. Try print "Tmin=", ", ".join(Tmin) or print "Tmin=", Tmin[0] if you want to have csv output through the csv writer, you need a single list, not a list inside a list: Try writer.writerow(['Tmin']+Tmin) #note this is already printing the result to a file so dont "print" the return value
{ "pile_set_name": "StackExchange" }
1974 English cricket season The 1974 English cricket season was the 75th in which the County Championship had been an official competition. The recent pattern of joint tours continued with India and Pakistan again playing three Tests each against England. Worcestershire won the County Championship. Honours County Championship - Worcestershire Gillette Cup - Kent Sunday League - Leicestershire Benson & Hedges Cup - Surrey Minor Counties Championship - Oxfordshire Second XI Championship - Middlesex II Wisden - Dennis Amiss, Mike Denness, Norman Gifford, Tony Greig, Andy Roberts Test series County Championship Gillette Cup Benson & Hedges Cup Sunday League Leading batsmen Leading bowlers References Annual reviews Playfair Cricket Annual 1975 Wisden Cricketers' Almanack 1975 External links CricketArchive – season and tournament itineraries Category:1974 in English cricket Category:English cricket seasons from 1969 to 2000
{ "pile_set_name": "Wikipedia (en)" }
Evidence derived from clinical observations indicates that small numbers of tumor cells can exist in a dormant state in clinically normal persons or can persist in patients receiving anti-tumor therapy who have attained clinical tumor remissions. Little is known of the host-tumor cell interactions that result in the establishment of this dormant tumor state. We have observed delayed tumor emergence in mice immunized against a syngeneic chemically-induced lymphoma. The mice were immunized with mitomycin C-treated lymphoma cells and then challenged 14 days later with a dose of live tumor that killed 100 percent of unimmunized mice in less than 28 days. In contrast, over 95 percent of immunized mice resisted the immediate outgrowth of the tumor and remained clinically normal for many months. However, during this 18 month period about 40 percent of such mice developed large ascitic tumors. Control groups of immunized but unchallenged mice and untreated mice observed for similar periods remained completely free of such tumors. We propose to use this model system to (1) identify the host immune and non-immune components that act on tumor cells to establish and maintain the tumor-dormant state and (2) characterize the events that lead to breakdown of the tumor-dormant state and outgrowth of tumor. An understanding of the interactions involved in tumor dormancy should greatly facilitate the development of methods for prolonging the tumor-dormant period and, ultimately, the complete elimination of residual tumor cells.
{ "pile_set_name": "NIH ExPorter" }
Activation of the innate immune system upon pathogen recognition results in a rapid and definitive microbicidal response to invading microorganisms that is fine-tuned to prevent deleterious deficiencies or excesses in the response. Increasing evidence indicates that immune responses are rapidly coordinated by neural circuits that operate reflexively. However, given the complexity of the nervous and immune systems of mammals, the precise mechanisms by which the two systems influence each other remain understudied. This proposal describes experiments designed to elucidate the mechanism by which the nervous system regulates innate immunity. Using the nematode Caenorhabditis elegans, we have recently demonstrated that innate immunity is not only regulated at the cell autonomous level, but also at the cell non-autonomous level through neurons expressing G-protein-coupled receptors. More specifically, we found that NPR-1, a GPCR similar to mammalian neuropeptide Y receptors, participates in a neural circuit that controls the p38/PMK-1 MAPK pathway in C. elegans. Additional studies from our laboratory indicate that OCTR-1, which is an adrenergic GPCR for octopamine expressed in the nervous system, controls the p38/PMK-1 pathway and unfolded response pathways that are expressed in non-neuronal tissues and that are necessary to alleviate the increased demand on protein folding during immune activation. In this proposal specifically, we will use a variety of molecular and genetic techniques to explore the general hypothesis that the nervous system regulates immune homeostasis during host response to pathogen infections at the whole animal level. Given the conserved nature of innate immune responses and of GPCR-mediated signaling in the nervous system, the proposed studies should lead to a better understanding of some of the mechanisms by which the metazoan nervous and innate immune systems influence each other.
{ "pile_set_name": "NIH ExPorter" }
Pineocytoma mimicking a pineal cyst on imaging: true diagnostic dilemma or a case of incomplete imaging? Pineocytomas have been described as well-circumscribed, homogeneously enhancing masses. However, there is considerable variability in this appearance, and certain pineocytomas may have a predominantly cystic appearance on imaging. This has led some to suggest that differentiation between pineocytomas and pineal cysts may not be possible. We have attempted to determine if cystic pineocytomas could be found in a series of these tumors evaluated by CT and MR imaging. We searched the radiology literature as well as the medical records from our own institution for pathologically proved pineocytomas with available preoperative imaging or imaging reports, with specific focus on whether postcontrast MR imaging was included. In cases in which images were available, they were evaluated by a Certificate of Added Qualification (CAQ)-certified neuroradiologist and a radiology resident, who attempted to determine if the pineocytomas had any MR imaging characteristics of typical pineal cysts. To be considered a typical pineal cyst, an area of signal-intensity abnormality must be centered on the pineal recess, demonstrating internal homogeneity on T2-weighted imaging, following CSF signal intensity on T1- and T2-weighted images, without any marginal lobularity or nodular contrast enhancement and a wall thickness of <2 mm. In cases in which imaging was not available, radiology reports and/or descriptions provided in the radiology literature were reviewed by a CAQ-certified neuroradiologist. For any lesion described as cystic, we again attempted to elucidate the exact extent of imaging that was performed, note specific lesion characteristics, and determine if the lesion met the criteria described previously. Finally, for tumors in which image size was provided, the mean value of maximal tumor dimension, SD, median, and range were calculated. Forty-four pathologically proved cases of pineocytomas from the radiology literature, as well as 8 pathologically proved cases of pineocytomas from our institution with available imaging studies and/or reports, were reviewed. Of these, 23 were solid masses, and 7 were partially solid and cystic, whereas 14 tumors could not be completely characterized due to incomplete imaging evaluation. Eight were primarily cystic; however, none of these could be confidently characterized as meeting the criteria for a typical cyst. In our analysis, no truly cystic pineocytomas were identified.
{ "pile_set_name": "PubMed Abstracts" }
People exist at different times. My life, for instance, consists of me-at-age-five, me-as-a-teenager, me-as-a-university-student, and of course many other temporal stages (or time-slices) as well. In a sense, then, we can see a single person, whose life extends over time, as akin to a group of people, each of whom exists for just a short stretch of time. This perspective raises a host of interesting questions. Here’s one: Coherence is often considered a rational virtue. Rational people have beliefs, desires, and other attitudes that cohere with each, that fit together nicely, while having attitudes that clash with each other is a mark of irrationality. Certainly that’s the case for coherence at a single time. If there’s a time where you have inconsistent beliefs, then that’s irrational. But what about coherence over time? Is that a rational virtue too? Should your beliefs and desires held at different times fit together in any particular way? Should your actions, performed at different times, fit together as part of a sensible long-term course of action? Many philosophers have thought so. After all, if your beliefs, desires, and actions at different times don’t cohere with each other, then you’re likely to engage in self-defeating behavior. If you keep changing your mind about what to try to achieve or about how best to achieve it, then (so the thought goes) you’ll wind up achieving nothing. You will start projects but promptly abandon them as soon as you adopt different goals or change your views about the best way of reaching your goals. But there are grounds for suspicion. To take the case of belief, why should what you believed in the past matter for what you ought to do now? Shouldn’t it just depend on what evidence you have right now? And letting facts about how you acted in the past influence your present decision-making can seem like committing the sunk-cost fallacy. More to the point, why should you treat your past selves differently from how you treat other people? Why should your past selves’ attitudes and actions matter more for how you rationally ought to be going forward, than any stranger’s attitudes and actions? Seeing yourself as akin to a group (a group of time-slices), it’s tempting to think that your different time-slices are no more beholden to each others’ attitudes and actions than are the members of any other group. Insights about individual rationality can help us design better group decision-making procedures, and insights about groups can lead us to revise our views about individual rationality. Beyond demoting the importance of coherence over time, adopting this perspective means taking certain analogies seriously. We can see memory as a kind of testimony – testimony from one’s past selves. And whether one should trust one’s memory will depend on exactly how reliable one thinks it is, just as whether one should trust someone’s testimony depends on how reliable one thinks that person is. And we can see intentions as like commands or advice coming from one’s past selves. Whether one should satisfy that intention then depends on how good one thinks one’s past self was as an advisor, or on whether there are any costs to disobeying its commands. (A useful way to control one’s future selves is to change their incentives; think of the smoker who tries to quit in part by betting his friend that he won’t have a cigarette in the next month.) This idea, that individuals are akin to groups, goes back at least to Derek Parfit. In his highly influential Reasons and Persons (OUP, 1986), he writes that “when we are considering both theoretical and practical rationality, the relation between a person now and himself at other times is relevantly similar to the relation between different people” (p. 190). Parfit thought that personal identity over time was unimportant both for rationality and, more controversially, for morality. (The latter raises some other interesting issues: If your past and future selves are like other people, as far as morality is concerned, is it morally wrong to coerce your future self, like our foresighted smoker, or is it sometimes morally permissible to coerce others, if it’s for a good reason? Is it wrong to harm one person to benefit her in the future, say by sticking her with a needle to vaccinate her, or is it sometimes morally permissible to harm one person to benefit a different person?) Taking seriously the analogy between individuals and groups opens promising avenues for new research. There is a vibrant debate about group rationality, about how we should take individuals’ beliefs or preferences and aggregate them to come up with a ‘group belief’ or ‘group preference.’ This is important for democracy and for other cases where people must act as a unified group–that is, as akin to a single individual–as in the case of a panel of judges who must issue a joint opinion. Group Agency by Christian List and Philip Pettit, is an excellent discussion of these issues. We might even go further and think of individuals at particular times–your different time-slices, say–as group-like in some respects. When you seem to have contradictory beliefs, perhaps it’s useful to think of yourself as a fragmented person, with each fragment having a different (but consistent!) set of beliefs. And in cognitive science, it is now common to think of the mind as consisting of different semi-autonomous subsystems (though whether these subsystems are like individuals varies depending on the case) – there is Marvin Minsky’s Society of Mind hypothesis, Jerry Fodor’s modularity hypothesis, and Kahneman and Tversky’s division of the mind into System 1 (which is fast, automatic, and subconscious) and System 2 (which is slow, effortful, and conscious). Seeing individuals as groups, then, opens opportunities for cross-pollination. Insights about individual rationality can help us design better group decision-making procedures, and insights about groups can lead us to revise our views about individual rationality, for instance, by leading us to conclude that coherence over time isn’t a rational imperative. And, as Parfit himself thought, it can lead us to a more open, generous stance, where we treat the boundary between ourselves and others as less important than we otherwise might. Featured image credit: City sunny people street by David Marcu. CC0 via Pexels.
{ "pile_set_name": "OpenWebText2" }
I’d have left Pujols at 1B, because his elbow is more important than this game — no matter how much they’ve put into getting a win today. I’d have put LaRue at 3B, where he’s played four games in his big league career, Glaus at SS and left Miles at 2B. 26 Comments Not only do you risk Albert’s elbow, what if he got wiped out on a double play attempt or a steal? He would not have been able to make a relay throw from the outfield. Even could have put Miles at short and Glaus at second. yeah, i definately thought that was a very strange one moving Pujols to second, personally id probably have played Miles at SS and LaRue at Second but which ever way he worked it, someone was gonna be out of position. BTW, i thought there was at least some intent to hit Izturis as a recation to not getting strike 3 called the ball previous. Good game to watch though – just a shame we couldnt come away with the W. I don’t have a problem with AP at second. He’s a big boy and knows how to take care of himself, knows his limits and how to stay within them, etc. With some less self-aware sluggers of years gone by (I can think of one in particular), I would have recoiled in horror from this move, but they would never have offered to help at SS (where reportedly AP originally volunteered to step in, TLR wisely declining) or 2B. What an interesting outfield situation we had yesterday although here is one that I thought about: Molina to catch, LaRue to left field and Schumaker to short. This guy has played it all and could have probably been called on to pitch had we run out of pitchers (I am told he was hitting the 90s in HS/college). I just kept having visions of Pujols in a double play with his competitive nature taking over and Prince Albert throwing out his elbow to save the game that doesn’t even matter that much in the grand scheme of things. Honestly I think anything would have been better than moving Pujols from first base. Just a scary move. No matter who you put where, there is risk. I liked the move. Put your best glove man at second. He can at least field the ball and make plays. You know you won’t get a 6-4-3, but a 4-6-3 is possible. Albert feeds the SS on the dp already, so it is somewhat familiar. You’re not moving a whole set of dominoes with multiple players out of position. I am curious about one thing, though. How would the relays be affected by the changes? I dont have a problem with Pujols playing 2B. The only time that he might have to throw as hard as he can is on a relay. You dont really throw as hard as you can on a ball hit to you at 2B to 1B very often, and he is one of if not the smartest player I have ever seen. He knows his limits and it means staying within them help out the team in the long run that is what he would do. Someone finally realized that Thompson cannot pitch in the bigs-Yea! Now we have to tell Reyes the same thing and bring up Garcia from Springfield. What are they waiting for? If they don’t know that Reyes is never going to make it, something is wrong and they aren’t the baseball geniuses that people say they are. Either trade him for another hitter or send him to the minors. Bring Rasmus up, put Ankiel in right and trade for another outfielder that can hit both right and lefties. Play Ryan at short and say good bye to Izturis who they never should have signed in the first place. Cards lineup. Rasmus,Ankiel, Pulhols, Glaus,New outfielder, Ryan, Molina, Kennedy or new second baseman. Trade Duncan, Izturis, Reyes, and Flores, and maybe Kennedy What I propose certainly isn’t any worse than what they are doing now. the Cubs are going to bury them unless they make these changes soon. Am I wrong?? Donald Gray I refuse to acknowledge such a post from a “Cardinals Fan” that spells Albert’s last name as “Pulhols”…in Cardinals Nation, not knowing how to spell Albert’s last name is like not knowing the pledge of allegiance… Man, LaRussa’s enthusiasm (“He was the logical guy to call up…”) really shows his deep, ongoing commitment to encouraging and supporting promising young players… esp. ‘cuz Izturis is just knocking the cover off the ball, as expected. Donald, before we sell the farm, can we make it to May or even June first? We weren’t even supposed to contend for the Division this year and our stellar outfield, strong starting rotation and of course Albert Pujols have made winners out of the Cardinals. There will be times that the Cards will fall, but there are 162 games. Let’s not panic quite yet. ““The only thing is, he plays ‘young.’ And at some point you need to call that to his attention. Otherwise, he’s not going to improve, and he’s not going to be the player he can be. This is a guy that played a lot for us last year, because he played well, and he deserved it” and “But the big thing is, there isn’t anything about Brendan Ryan that I don’t like” I still believe he has something that he doesn’t like about him. Just from what I’ve read and from his decisions that seem to counter what he says, it seems that TLR has a personal problem with Ryan, like he had a problem with Scott Rolen. It’s just a feeling, but I’ve been right before. Meta The following are trademarks or service marks of Major League Baseball entities and may be used only with permission of Major League Baseball Properties, Inc. or the relevant Major League Baseball entity: Major League, Major League Baseball, MLB, the silhouetted batter logo, World Series, National League, American League, Division Series, League Championship Series, All-Star Game, and the names, nicknames, logos, uniform designs, color combinations, and slogans designating the Major League Baseball clubs and entities, and their respective mascots, events and exhibitions.
{ "pile_set_name": "Pile-CC" }
Portland resident Mike Hastie served as an Army medic during the war. What he saw in Vietnam sickened him. “It wakes you up when you take a teenager off a helicopter who’s got his head missing or took a bullet in the head,” he said, his voice cracking with emotion. “What we saw in Vietnam was the utter complete (expletive) lie of Vietnam,” he went on. “Ken Burns talks about there were many truths. No! There was only one truth: The truth is the war was a lie — total and complete fabricated bullshit.” When he got back from Vietnam, Hastie said, he tried to explain to supporters of the war that it was a terrible mistake, but found no one would listen to him. “Whenever you give information that threatens someone’ core belief system, there is an urgent need to deny,” Hastie said. “Not only am I betrayed by Vietnam, but I’m betrayed by the American people when I come back and try to bear witness.” Joseph White of Corvallis, who led an Air Force communications squadron in the Philippines during Vietnam, said the war dragged on as long as it did because politicians hid the truth about the conflict from the American people — and the American people let them get away with it.
{ "pile_set_name": "OpenWebText2" }
A researcher says he has uncovered a security weakness that can easily trick people into executing malicious code when they use the Microsoft Internet Explorer and Google Chrome browsers to visit booby-trapped websites. The attack was recently presented at the Hack in the Box security conference by independent security researcher Rosario Valotta. It exploits weaknesses in the way browsers notify users when they execute operating-system-level commands, such as printing or saving. He said the attack works against Windows 7 and Windows 8 users running IE versions 9 and 10 when they enter either one or two characters while visiting a malicious website. Windows 8 machines running Chrome can be forced to execute malicious code when users click on a single HTML button on a malicious page, such as "Play" for a video or a Facebook "Like." Windows provides some protection against this social engineering attack, but Valotta said attackers can often bypass those defenses. When a user visits the attack website, it opens a pop-under window that in most cases will remain invisible. The hidden window immediately begins downloading a malicious executable file without notifying the user or requiring any kind of permission. When the website is visited using IE, the file can be executed when English-speaking Windows 7 users type "r" and when Windows 8 users enter the tab key followed by the r key. The keystrokes, which can be invoked by asking the visitor to solve a CAPTCHA puzzle used to filter out bots, send a Windows command to the pop-under window instructing it to run the recently downloaded file. Clicking a booby-trapped HTML button while visiting the page in Chrome similarly executes the malicious file. Security researchers have long viewed the ability to invoke powerful operating-system commands as one of a browser's more dangerous features. While this ability provides convenience to users, it can also be exploited to force a machine to expose or delete sensitive data or, as in this case, execute code of an attacker's choice. "The integration between the browsing environment and the operating system to actually execute system-level commands is a pretty terrible design," said Robert Hansen, director of product management at White Hat Security. "As a security researcher, almost every time you see something like that, you know that there's some way to exploit it. Every time there's these weird hooks into system-level DLLs that are used both by the operating system and by the browser, it's almost always going to have some dangerous thing about it." For their part, Microsoft officials said in a statement that they don't consider the behavior a vulnerability. "We are aware of this industry-wide social engineering technique that requires user interaction to run a malicious application," the statement said. "This is not a vulnerability, as someone must be convinced to visit a malicious site and take additional action, such as using a keyboard shortcut to execute the malicious application. Smart Screen will help mitigate the risk for customers running Internet Explorer. We continue to encourage customers [to] exercise caution when visiting untrusted websites." The attack is by no means foolproof since Windows 7 and 8 both provide protections designed to prevent the execution of malicious files. One defense, known as User Account Control, requires a user to approve the running of any file that needs high-level "administrator" privileges from the operating system. Another, known as Smart Screen, checks webpages and downloaded files for signs they're malicious. But Valotta said Smart Screen protections can be bypassed in some cases by using shortened URLs that link to malicious executable files. He found that about 20 percent of them will get through. Smart Screen can also be bypassed when malware is digitally signed by a genuine extended validation certificate or a "trusted" signing certificate that's already been used to validate benign applications. Valotta said malware frequently doesn't need an end user to approve administrator access through User Access Control. HTML content injection, keylogging and autostart, and other malicious functions can all be carried out with non-administrative privileges because they rely on so-called "userland" programming interfaces, according to Valotta. While it's troubling to see an attack with the potential to do so much damage with so little user interaction, it's important to note that the defenses Microsoft puts into recent versions of Windows go a long way to making these types of exploits less reliable. The user notifications and the Smart Screen filtering will often completely shut down an attack before it's able to succeed. These protections may also limit the damage that can be done and the amount of effort required when an attack does work. Security professionals call this layered approach "defense in depth." Still, it's surprising to read Microsoft's statement saying it's not a vulnerability when a user is one or two clicks away from an attack that has a statistically significant chance of successfully executing malicious software. This weakness may not be the highest priority for Microsoft's security team, but I do think it's worth an eventual fix. Story updated to fix UAC in the third-to-last paragraph.
{ "pile_set_name": "OpenWebText2" }
Q: Trouble with Navigator.appCodeName and Useragent While executing below code it was displaying Mozilla eventhough if it was executed in safari or chrome at Useragent and AppCode Name. Am i missing anything? <!DOCTYPE html> <html> <body> <p>Click the button to display the code name of your browser.</p> <button onclick="myFunction()">Try it</button> <p id="demo"></p> <p id="demo1"></p> <script> function myFunction() { var x = "Browser CodeName: " + navigator.appCodeName; var y = navigator.userAgent; document.getElementById("demo").innerHTML = x; document.getElementById("demo1").innerHTML = y; } </script> </body> </html> A: navigator.appCodeName always returns 'Mozilla' on any browser because the property is deprecated and kept only for compatibility purposes. https://developer.mozilla.org/en-US/docs/Web/API/NavigatorID.appCodeName A library like https://github.com/ded/bowser will solve the problem for most browser detection. This library is more exhaustive: https://github.com/bestiejs/platform.js/
{ "pile_set_name": "StackExchange" }
Ten or more canvassers, purportedly working in shifts, urged attendees at Saturday’s public school enrollment fair at the Mission’s John O’Connell High School to vote Josephine Zhao onto the school board. This occurred in spite of the candidate’s well-publicized “withdrawal” from the race in early September, after revelations that she sent Chinese- and English-language supporters conflicting messages, and had impugned her fellow candidates as “two transgender candidates … fighting for the title of ‘first transgender commissioner’ … There are also three homosexuals. Their highest priority for education would be to spread ideologies.” Public school parents, however, were purportedly told by the canvassers to vote for Zhao anyway, as “she’s still on the ballot.” This is true; Zhao’s “withdrawal” came at too late a date to remove her from the running for November’s election. Event attendees were also allegedly told they should vote for Zhao because “the Chinese community needs her.” This, of course, is a more subjective matter. Multiple attendees said the Zhao canvassers, who were described as older Asian men and women, were organized and working in shifts, and handing out English-language campaign material (the flier, obtained by Mission Local, describes Zhao’s impoverished upbringing in China and her hard work since arriving in the United States 30 years ago at age 19; it is labeled “Immigrant Story Part I” in its upper right-hand corner). Several parents in attendance told us the Zhao canvassers did all of this within John O’Connell High School at the voter-rich enrollment fair — a transgression of rules every other candidate or their backers respected. Reached via e-mail, Zhao wrote, “I had nothing to do with the canvassers over the weekend. My supporters have taken it upon themselves to support my former candidacy and to support having Chinese representation on the school board. They must still [have] had literature from several months ago. Please contact them directly if you want further details.” She did not answer our question of whether she would serve if elected. District 6 supervisor candidate Christine Johnson, District 2 Supe Catherine Stefani and Sheriff Vicki Hennessy have publicly dropped their support of Zhao, but her marquee endorsers — including Mayor London Breed, Sen. Scott Wiener, Assemblyman David Chiu, former supervisor and Assemblywoman Fiona Ma — have not yet done so, despite several of them counseling her out of the race. One day prior to her canvassers showing up at the Oct. 13 enrollment fair, Zhao commented via her “Josephine Zhao for School Board 2018” Facebook page for the first time since her Sept. 10 “withdrawal.” In her brief post, Zhao praised an article written by an LGBT Chinese woman who salvaged her relationship with her parents thanks, in part, to Zhao. “I am committed to be an ally of LGBTQ community and agent to bring the immigrant community forward,” Zhao wrote on her campaign Facebook page. Multiple city politicos have reported Zhao’s storefront campaign signs have been refreshed, even since her Sept. 10 withdrawal. Zhao, in 2013, joined with reactionary, anti-LGBT groups to protest the state’s proposed gender-neutral bathroom bill, AB 1266. This is something left-leaning opponents have tossed back at Zhao and her allies through the years, and she has issued apologies. Mission Local, however, was able to document that Zhao has, repeatedly, downplayed the extent to which she was involved in the effort to undo AB 1266, helping to circulate and collect a petition put out by the Pacific Justice Institute — which is described by the Southern Poverty Law Center as “an anti-LGBT hate group.” Via the WeChat Chinese-language messaging system, Zhao communicated with scads of followers. She filled hundreds of paid spots on Wiener’s 2016 state senate campaign, while attacking his opponent, Jane Kim, as a “homewrecker/career-wrecker.” Zhao in 2016 also referred to supervisor candidate Sandra Lee Fewer, who was running against Marjan Philhour for the District 1 seat, as “Chinese trash” and a “race-traitor.” The Examiner documented Zhao, via WeChat, sending her core Chinese-language supporters different messages than what she communicated in English. Cantonese speakers have told Mission Local that WeChat users have, since Zhao’s ostensible withdrawal, urged users of the service to vote for her regardless. The volume and fervency of those messages, we are told, has increased of late, with Zhao’s supporters allegedly even calling for some manner of press conference this weekend, to urge the community to support her in the coming election and spur her to run. Even with Mayor Breed’s appointment of Faauuga Moliga to a vacant school board seat, there are still 19 candidates on the ballot running for three spots — with no incumbent other than Moliga, who is still running in November’s race.
{ "pile_set_name": "OpenWebText2" }
Opinion Fairfax, VA – -(Ammoland.com)- The Democrat Party is now so aligned with gun control that every major candidate running for its 2020 presidential nomination recently appeared in a propaganda video (below) produced by one of the nation’s most active firearm prohibition groups. It should come as no surprise, then, that a bill introduced in the Democrat-controlled U.S. House of Representatives to ban most modern semi-automatic long guns, and the original-equipment magazines used with such firearms, is rapidly gaining steam. Your help is urgently needed to ensure this wide-ranging gun ban never becomes law. Misleadingly dubbed the “Assault Weapons Ban of 2019,” the bill is squarely aimed at the most popular rifles in the U.S., including America’s Rifle, the AR-15. It would prohibit not just ARs, but any semi-automatic rifle, whether centerfire or rimfire, that has the capacity to accept a detachable magazine and one or more of various common features, including a pistol grip or an adjustable stock. The bill would also impose a magazine capacity limit of 10 rounds. There is, of course, nothing especially dangerous or unusual about these types of firearms or magazines. Semi-automatic designs that use the energy produced by the firing of a fixed cartridge to eject a spent casing and chamber the next cartridge are simply the modern evolution of repeating firearms. Like revolvers and lever-action rifles, these arms fire only one shot with each pull of the trigger. The basic operating mechanisms of these guns have been in wide use among the American population since at least the late 19th Century. Gun control advocates, however, seek to use the similarities in appearance between some types of semi-automatic firearms and the guns fielded by the military to confuse people into believing there is something especially destructive about these guns. They also use hyperbolic terms like “assault weapons,” “weapons of war,” and even “weapons of mass destruction” to convince the public that these sorts of guns are littering “the streets” in the hands of criminals. In fact, most of the firearms targeted by the proposed ban do not use especially powerful or lethal cartridges. Popular hunting cartridges like the .30-06 or .270 Winchester deliver markedly more muzzle energy. Meanwhile, common shotgun slugs or buckshot deliver substantially more “destructive” energy than these claimed “weapons of mass destruction.” It is also false to claim that semi-automatic rifles are the choice of violent criminals or even those perpetrating mass casualty crimes. Year after year, FBI statistic consistently show that rifles of any sort are under-represented in firearm-related murders, while mass shootings over the years have involved every major type of firearm, most commonly handguns. Bans on popular semi-automatic rifles and limits on magazine capacity have been enacted in certain states and were in effect at the federal level between 1994 and 2004. Yet no reliable study has ever shown that the bans reduced violent crime. Even if that weren’t the case, however, the U.S. Supreme Court has already foreclosed the idea that a firearm’s “dangerousness” is a valid basis for banning it by holding that handguns – by far the most lethal and commonly-used crime gun – are protected by the Second Amendment and cannot be banned. This is because, the court said, they are also the overwhelming choice of law-abiding Americans for legitimate purposes, most importantly self-defense. The same is true of AR-15s and other semi-automatic rifles, as well as 11+ magazines, with law-abiding Americans adopting them in droves as their firearms of choice for home defense and other lawful purposes. Tens of millions of such rifles, and hundreds of millions of such magazines, are peacefully owned and used throughout America. Indeed, as a prominent gun control advocate on the right once admitted, the “logic” of an “assault weapons” ban is not to reduce crime but to serve as a “purely symbolic” gesture that will “desensitize the public to the regulation of weapons in preparation for their ultimate confiscation.” Meanwhile, even some left-leaning gun control advocates have acknowledged that banning semi-automatic firearms is a useless and futile effort that won’t appreciably improve pubic safety. Now, with the pressure mounting on Congress to “do something” – anything – to calm the fears of people who don’t like to admit that violent crime is a complex, multi-faceted problem that won’t be solved with symbolic measures, your voice needs to be heard. Contact your federal lawmakers TODAY and tell them firmly but politely that banning ANY firearm or magazine is unacceptable. Please call your U.S. Representative and U.S. Senators using the Capitol switchboard at 202-224-3121. In particular, ask them to OPPOSE the “Assault Weapons Ban of 2019” and any similar legislation that would target semi-automatic firearms and the magazines designed to be used with them. There is nothing “reasonable” or “commonsense” about pointless laws that limit the freedoms and safety of law-abiding people and leave criminals unaffected. Make your voice heard TODAY! About: Established in 1975, the Institute for Legislative Action (ILA) is the “lobbying” arm of the National Rifle Association of America. ILA is responsible for preserving the right of all law-abiding individuals in the legislative, political, and legal arenas, to purchase, possess and use firearms for legitimate purposes as guaranteed by the Second Amendment to the U.S. Constitution. Visit: www.nra.org
{ "pile_set_name": "OpenWebText2" }
Q: Integration of $x^3 \tan^{-1}(x)$ by parts I'm having problem with this question. How would one integrate $$\int x^3\tan^{-1}x\,dx\text{ ?}$$ After trying too much I got stuck at this point. How would one integrate $$\int \frac{x^4}{1+x^2}\,dx\text{ ?}$$ A: You're almost there. Are you familiar with polynomial long division? Apply the algorithm to get: $$ \frac{x^4}{1+x^2} = x^2 + \frac{1}{1+x^2} -1 $$ This should be easy to integrate. A: You've done the hardest part. Now, the problem isn't so much about "calculus"; you simply need to recall what you've learned in algebra: $(1)$ Divide the numerator of the integrand: $\,{x^4}\,$ by its denominator, $\,{1+x^2}\,$ using *polynomial long division *, (linked to serve as a reference). This will give you: $$\int \frac{x^4}{1+x^2}\,dx = \int (x^2 + \frac{1}{1+x^2} -1)\,dx=\;\;?$$ Alternatively: Notice also that $$\int \frac{x^4}{x^2 + 1}\,dx= \int \frac{[(x^4 - 1) + 1]}{x^2 + 1}\,dx$$ $$= \int \frac{(x^2 + 1)(x^2 - 1) + 1}{x^2 + 1} \,dx = \int x^2 - 1 + \frac{1}{x^2 + 1}\,dx$$ I trust you can take it from here?
{ "pile_set_name": "StackExchange" }
description: Montant mensuel de la bourse de lycée échelon 4, en multiple de la base mensuelle des allocations familiales (BMAF) unit: currency values: 2016-07-01: value: 1.7791
{ "pile_set_name": "Github" }
Townsendiellini Townsendiellini is a tribe of bees in the family Apidae. There are at least 3 described species in Townsendiellini. A genus of Townsendiellini is Townsendiella Crawford, 1916. References Michener, Charles D. (2000). The Bees of the World, xiv + 913. Michener, Charles D. (2007). The Bees of the World, Second Edition, xvi + 953. Further reading External links NCBI Taxonomy Browser, Townsendiellini Category:Nomadinae
{ "pile_set_name": "Wikipedia (en)" }
While the Modi government secured some notable gains during its time in office thus far, challenges lie ahead this year and beyond. Since becoming prime minister in 2014, Narendra Modi has paid significant attention to India’s foreign relations. Though there could be some quibbles about how much he managed to achieve, there is little doubt that his focus at least led to greater energy and push in India’s foreign policy, even if Modi’s foreign policy has not witnessed any significant shifts. But since his re-election last summer, India’s foreign policy challenges have been growing. And while the reasons for this may be varied, some of it is because of the BJP government’s own mistakes. In his first term, Modi was able to undertake significant strategic outreach to the United States, Japan, and Australia. The revival of the Quad is a great indicator of the pragmatism in India’s diplomacy today. Despite some setbacks in between, India also managed to consolidate its position in two important Indian Ocean countries – Sri Lanka and Maldives. Modi can also be credited with a more effective outreach to Southeast Asia, with its Act East Policy. But there are also growing difficulties. Managing China, India’s most serious challenge, has seen some success but it remains a major and continuing problem. India’s more active role in the Quad in its second avatar is a positive sign. Despite the occasional wavering in India’s Indo-Pacific policy, elevating the Quad to foreign ministerial level deliberations shows the willingness of all the four Quad members to acknowledge the reality of the China problem and the need for the four to work toward strategic coordination. But there are serious problems with India’s hard capacity to manage the China problem. General V.P. Malik, the former chief of Indian Army Staff, said during the Kargil war that “we will fight with what we have,” but such an approach while facing a much a larger and strong force in China will be dangerous for India. For all the loud rhetoric on national security, the Modi government’s defense budget allocation has been abysmal. Year after year, it has driven down the defense budget, which now has the lowest allocation since the period before the 1962 Sino-Indian War. Enjoying this article? Click here to subscribe for full access. Just $5 a month. Even within this allocation, much of it is spent on salaries and pension, leaving very little for capital expenditure, thus leaving procurement issues unresolved. All three Indian services have significant gaps and this is going to test India’s ability to defend successfully against China. The Indian focus appears to be on diplomacy to deal with China, but depending on one toll alone could be dangerous. Another major challenge is the neighborhood, and the problems here are compounded due to India’s internal developments. Today, India’s neighborhood policy is facing serious challenges, in part because of the Citizenship Amendment Act (CAA) and the proposed National Register of Citizens (NRC). Together, they have had a particularly negative impact on India’s relations with Afghanistan and Bangladesh. With the CAA targeting three Islamic neighbors – Afghanistan, Bangladesh, and Pakistan – India’s neighborhood diplomacy suddenly faces new problems. Relations with Bangladesh had improved significantly under Prime Minister Sheikh Hasina but the CAA and the NRC have put the Bangladeshi government in a difficult position. Relations with Afghanistan, another friendly neighbor, are affected also. Moreover, the CAA is seen both as specifically targeting Muslims and as equating Indian citizenship with Hinduism, raising eyebrows across the world. Even India’s partners are questioning its credentials as a multicultural, pluralist society. India did enjoy certain soft power benefit as the world’s largest democracy, with diverse cultures and religions co-existing in a stable political system, but that image has been tarnished by the recent developments. Modi, Home Minister Amit Shah, and even External Affairs Minister S. Jaishankar can ignore the global concerns by saying these are internal matters of India. But the reality is that India’s moral standing has taken a hit and it will need significant efforts on the part of the Modi government to demonstrate that India is still a multicultural and secular democracy. Modi did make a smart choice in getting Jaishankar to head the foreign ministry. Jaishankar, a former foreign secretary, is well-respected around the world, and is known to have been an important reason for many of Modi’s foreign policy successes in his first term. But it is unclear if an experienced technocrat like Jaishankar can weather the storms created by poor domestic political decisions. Jaishankar was successful to a large extent in assuaging the fears around the developments in Jammu and Kashmir, after Article 370 was revoked in early July. His extensive engagements in the United States, speaking in nearly a dozen think tanks, as well as other media interviews, helped stem the damage. But India’s outreach has been poor after the CAA. Jaishankar’s cancellation of meetings with U.S. House Foreign Affairs Committee (HFAC) because the delegation included Ms. Pramila Jayapal, for instance, has angered Democrats in the United States to the point where Jayapal now has another 10 legislators co-sponsoring her resolution in the Congress, seeking a return to normalcy in Kashmir at the earliest. It is not clear that India still enjoys the kind of bipartisan support in the U.S. as it did in the last 15 years. This comes on top of Modi’s statement, “Ab ki baar Trump Sarkar,” which has not gone down well with Democrats. It would have been better for Modi to not poke his head into the internal politics of another country. The U.S. relationship is absolutely critical in managing the China issue and it will be a challenge to get it back to even keel, especially if a Democrat wins the White House in November. Diplomat Brief Weekly Newsletter N Get first-read access to major articles yet to be released, as well as links to thought-provoking commentaries and in-depth articles from our Asia-Pacific correspondents. Subscribe Newsletter It is unclear how the India-Japan relationship has been affected. The annual summit, originally slated to take place in Guwahati in December 2019, was postponed because of CAA-related protests. This has been an annual feature for more than a decade and it is possibly the first time that the summit meeting has been skipped. India’s democracy and stability plays at least a supporting role in India’s partnerships, and even uncertainty can hurt these relations. While India has faced many external difficulties in the past, they have rarely been the result of domestic politics. Handling these new challenges could be much more difficult than the Indian government assumes.
{ "pile_set_name": "OpenWebText2" }
Five North Texas cities saw more than 20 percent of those 65 and older participating in the workforce. As the nation’s population ages, more and more seniors are staying in the workforce—and at highly concentrated rates in North Texas cities. Plano has the highest percentage of seniors in the workforce of any city in the country, according to an analysis of U.S. Census Bureau data done by Provision Living. You can click here to see a breakdown of all the communities in this study. The analysis looked at cities with a total population of 200,000 people or more. Of the more than 34,000 residents of Plano older than 65, a quarter are working. The same analysis found that Plano’s senior workforce grew at a quicker pace than its senior population from 2009 to 2017. The number of seniors in the workforce grew 99 percent over that time frame, while the overall senior population increased 65 percent. Of the 15 U.S. cities with the highest percentage of their seniors working, four additional cities were in North Texas. Arlington, Irving, Dallas, and Garland ranged from having 21 to 23 percent of seniors participating in the workforce. Austin, Lubbock, and Houston were also in the top 15. Statewide, one of the biggest factors contributing to the concentration of senior workers is the aging of Baby Boomers, said Lloyd Potter, State Demographer with the Texas Demographic Center. The second contributing factor is that the aging population is healthier, Potter said. “By and large, the seniors are healthier,” Potter said. “You have people who are physically able to work and are interested in working.” By 2030, all baby boomers will be older than 65, leaving the state’s population of people of retirement age to grow to 5.9 million, according to a report by the Texas Demographic Center. The number of those 65 and older who choose to continue working past retirement age likely depends on their education level and the type of work they’re doing, Potter said. In Plano, 58 percent of the population holds a bachelor's degree or higher, said Christina Day, the city’s director of Planning. Day said Plano’s top professions are related to management and office work, which continue to translate as communities age. Access to health care from a number of area medical facilities, property tax breaks for those 65 and older and offerings from the parks department are a draw for seniors to the city, Day said. But in Day’s personal experience, seniors are also looking at factors that draw many young families to communities — jobs and schools. “I live here because great jobs, great schools,” Day said. “So when my parents retired, where did they move? To Plano, so they could be near their grandkids.” Day said both her parents are still in the workforce.
{ "pile_set_name": "OpenWebText2" }
Q: Authenticated encryption vs end-end encryption I am kind of new to crypto. can someone highlight the differences between authenticated encryption and End-to-End encryption A: Authenticated encryption is an all-in-one encryption form (algorithm) that provides privacy, integrity, and authenticity together. End-to-end encryption is a concept where only end-users read the encrypted message. end-to-end encryption aims to prevent man-in-the-middle eavesdrop such as telecom and internet providers. The transit data in the servers are encrypted and the service owners do not have keys and the possibility to decrypt it. they are totally different.
{ "pile_set_name": "StackExchange" }
Q: adding install location in installdir to Registry key in installshield 2018 I do not know how I can put the user-selected installation path in the registry key in the Installshield environment. Please guide me step by step. Thanks A: Essence: Essentially storing property values in the registry entails explicitly defining them to be written into a known registry location (I use per-machine, in other words HKLM, to ensure the property can be read back by all users on the machine) and then you use AppSearch (built-in MSI mechanism) or a custom action to read back the values as appropriate. HKLM\Software\[Manufacturer]\[ProductName]\[ProductVersion] = [PROPERTYNAME] How-To: Rather than me repeating the steps here, please read the following documents: InstallShield Tip: Saving MSI property values to make them available after the initial installation The WiX toolset's "Remember Property" pattern Complexity: The latter link is not for Installshield, but for WiX. It shows the same save property procedure in WiX, but more importantly it discusses how reading properties back from the registry can conflict with properties set on the command line.
{ "pile_set_name": "StackExchange" }
Pupil Premium The targeted and strategic use of the Pupil Premium Grant (PPG) will support us in achieving our vision. Pupil Premium Grant (PPG) The Pupil Premium was introduced in April 2011 and is allocated to schools to work with pupils who have been registered for free school meals at any point in the last six years (known as ‘Ever 6’ FSM). The Pupil Premium Grant equates to around £1300 (April 2014) Schools also receive funding for children who have been looked after continuously for more than six months, and children of service personnel. Inthe academic year 2013/2014 approximately 34% of our children were entitled to Free School Meals. Currently, approximately 29% of our children are entitled to Free School Meals. Principles ·We ensure that teaching and learning opportunities meet the needs of all of our pupils. ·We ensure that appropriate provision is made for pupils who belong to vulnerable groups, ensuring that the needs of socially disadvantaged pupils are assessed and addressed in timely manner. ·In making provision for socially disadvantaged pupils, we recognise that not all pupils who receive free school meals will be socially disadvantaged. ·We also recognise that not all pupils who are socially disadvantaged are registered or qualify for free school meals. We reserve the right to allocate the Pupil Premium funding to support any pupil or groups of pupils the school has legitimately identified as being socially disadvantaged. ·Pupil Premium funding will be allocated following a needs analysis which will identify priority classes, groups or individuals. Limited funding and resources means that not all children receiving free school meals will be in receipt of Pupil Premium interventions at one time. Provision The range of provision the Governors may consider making for this group could include: All of our work through the Pupil Premium will be aimed at accelerating progress, moving children to at least age related expectations. Initially this will be in Reading, Writing and Mathematics. Pupil Premium resources will be also be used to target higher attaining pupils on FSM to make accelerated progress. Reporting It will be the responsibility of the Head Teacher and Deputy Head Teacher to produce regular reports for the Governors’ Resources sub-committee and the Full Governing Body on: ·the progress made towards narrowing the gap, by year group, for socially disadvantaged pupils. ·an outline of the provision that was made since the last meeting. ·an evaluation of the cost effectiveness, in terms of the progress made by the pupils receiving a particular provision, when compared with other forms of support. The Governors of Radleys Primary School will ensure that there is an annual statement to parents on how the Pupil Premium funding has been used to address the issue of ‘narrowing the gap’ for socially disadvantaged pupils. This task will be carried out within the requirements published by the Department for Education. Appeal Any appeals against this policy will be through the governor’s complaints procedure. Our Action Plan By clicking here you can see our current Pupil Premium action plan. To see our overview of Pupil Premium allocation for 2011-12 click here. To see our overview of Pupil Premium allocation for 2012-13 click here. To see our overview of Pupil Premium allocation for 2013-14 click here. To see our overview of Pupil Premium allocation for 2014-15 click here. To see our overview of Pupil Premium allocation for 2015-16 click here. To see our overview of Pupil Premium allocation for 2016 -17 click here. To see our overview of Pupil Premium allocation for 2017-18 click here.
{ "pile_set_name": "Pile-CC" }
In the process of conducting operations such as, for example, drilling operations, within an oil or gas wellbore, one or more torque transmission joints may be utilized to transfer torque and/or rotation between separate components of a downhole assembly. For example, a torque transmission joint may be utilized to transfer torque from a driver sub to a driveshaft of a drilling tool. The driver sub may be coupled to, and rotated by, a drill string. The driveshaft extends within the driver sub and may be coupled to another well tool such as, for example, a rotary drill bit. The torque transmission joint is disposed in an annular space between the driver sub and the driveshaft. Torque and/or rotation may be transmitted from the driver sub to the driveshaft by establishing an interference fit between the torque transmission joint and the driveshaft. Torque and/or rotation are transmitted from the driver sub to the driveshaft via frictional forces at the interference fit. Conventional interference fits include press-fits and shrink-fits. The use of a press-fit in the torque transmission joint permits easy assembly and disassembly. However, when a press-fit is used, the torque transmission joint is subject to significant wear at the interference fit, resulting in a loss of torque transfer, damage to communication equipment disposed within the drilling tool, and eventual failure. The use of a shrink-fit in the torque transmission joint provides increased wear resistance and reliability. However, when a shrink-fit is used, assembly and disassembly of the torque transmission joint is more difficult. Therefore, what is needed is an apparatus and/or method that addressed one or more or the foregoing issues, among others.
{ "pile_set_name": "USPTO Backgrounds" }
"MAN 1:" "And it's a winner." "Winner, hold 9, pay the line." "MAN 2:" "Let's go, come on out." "MAN 3:" "There, they're coming out." "Yeah, they're coming out for a point now." "Get your bets down." "There you are." "Craps, you lose." "Sorry, Mr. Falkner." "Still your dice." "Shoot again, Mr. Falkner." "I wanna bet a dollar he doesn't make it." "Just put it on the don't-pass line, lady." "Eight." "Eight's a point." "Once eight." "Now, play the hard way at the come and field." "Two hundred on the hard eight, limit on four, five, six and ten." "Seven, you lose." "Sorry, Mr. Falkner." "Hey, I won." "How about my $2?" " There it is, lady, right in front of you." " Glad I brought you luck." "Wish it could be more, Joe, but that taps me out." "JOE:" "Next good shooter." "All right, they're coming out of the dice now." "Put your bets down." "Coming out." "GLENN:" ""Dearest Stephanie:" "Well, the old man did it again." "And after all the promises I made, there's really no excuse except that I felt lucky." "Yeah, I was, considering how much more I could've lost." "To make a long story short," "Stephanie," "I went for 10,000--"" "[KNOCKING ON DOOR]" "Hello, Castle." "What brings you here?" "I saw you lose pretty good tonight." "That's the way the dice roll." "I'm glad you're such a philosopher." "You owe me $8,000." "I got your promissory note." "Next time I make a strike, I'll pick it up." "Not good enough." "That note is payable on demand." "I'm demanding it right now." "You said you'd give me till the 15th of April." "It doesn't say so here." "You're not kidding me, Castle." "I know what you're up to." "You never wanted me to make good on this." "You think I don't know the score?" "The Marty Davis crowd wants this land to put up a new casino." "So?" "So you told them you could deliver it." "And by the 12th of April." "As long as you know so much, you might as well know the whole story." "I put up 50 grand as a guarantee." "Too bad you're gonna lose your money." "Oh, you're wrong, Falkner." "I'm not gonna lose one penny." "But I'm not selling." "I'm keeping this property for my daughter, Stephanie." "You're a tough man to deal with, Falkner." "Wouldn't be surprised if Stephanie was a lot easier." "Now don't be foolish, Castle, that's no way to" "You'll notice it's payable on demand." "But there's no reason to be nervous." "That motel property of yours is worth $500 a front foot." "I can get you 6." "But we'll have to act within the next 24 hours." "I appreciate your help, Mr. Castle, but I'd rather not sell." "Now wait a minute, your father owed me $8,000." "You're not gonna renege?" "You'll get your money." "This could be the opportunity of a lifetime but these people will only wait until the 12th." "Today's the 10th." "I understand." " I'll discuss it with a friend." " Who?" "Mike Garvin?" "Well, whoever it is, if he's any kind of a businessman, he'll tell you to accept my proposition." "I'm staying at the Lodestar Apartments." "Let me know what you decide." " Yeah?" " Hello, Castle." "Well, if it isn't Mr. Michael Garvin Jr." "Darned if it isn't." "Come on in." "Well, how's the used-car business?" " I didn't come here to talk cars." " No?" "Well, what's on your mind?" "A girl named Stephanie Falkner." "Why, Junior, I'm surprised at you." "You, a married man." "What are you talking about?" "Well, aren't you?" "You and a long-legged model from Vegas got married a couple of days ago." "She used to go by the name of Margo Winters." "Since when is that your business?" "Since Stephanie Falkner became yours." "Just because you were engaged to the girl doesn't give you any licence to butt into my affairs." "Why don't you lay off her, Castle?" "She's had a bad break." "Her father's been murdered." "Look, Junior, why don't you butt out?" "If your old man knew you were here, he might get good and sore." "What kind of a crack is that?" "I heard tell he's kind of nuts about Stephanie himself." " I guess it runs in the family, huh?" " Why, you" "What's a matter?" "Can't you take it down there?" "Look, why don't you be a good boy and go on home to your bride." "Hello, Evie." "What are you doing here?" "Well, it's a long, long story." "Why don't I make myself comfortable while I tell it?" "Sit down." "It's about time you and I had one of those little heart-to-heart talks." "You let me down something awful, Evie." "Here, I got you one of those nice cushy jobs." "First chance you get, what do you do?" "You double-cross me." "What are you talking about?" "I had a visitor a while back." "Fellow by the name of Michael Garvin Jr., your boss' son." " Mean anything to you?" " No." "Well, I figured you must have put a bug in Junior's ear about my playing the heavy with Stephanie Falkner." "Now, if I wanted any publicity," "I would have hired myself a press agent." "Well, he didn't find out anything from me." "Now look, sugarplum, just in case you've forgotten, there's a sheriff in Kansas who's looking for a redhead who answers your description." "It seems this redhead forged a couple of cheques." "I was in trouble." "I needed money." "Who wasn't, at one time or another?" "I'm trying to fix up my life." "You know I'm trying." "And I'm all for you." "As soon as this deal is over." "[PHONE RINGING]" "Answer it." "Michael Garvin Investments." "I'd like to speak to Mr. Garvin, please." "I'm sorry, Mr. Garvin's out of town." "But, Eva, this is Stephanie Falkner." "I must speak to Mr. Garvin." "No, I have no idea when he'll be back." "Yes." "Yes, I'll tell him you called." "Well, I gotta be running along." "Come on, honeybunch, keep your nose clean." "[PHONE RINGS]" " Yes?" "EVA:" "Miss Falkner?" " Yes." " I couldn't talk to you before but I did hear from Mr. Garvin." "He's in Las Vegas." "He's flying back to Los Angeles late tonight." "He said he'd meet you tomorrow morning at 11 in Perry Mason's office." "That's his attorney." "Perry Mason's office?" " Are you sure?" " Absolutely." "He's already set up the meeting." "All right." "Thank you very much." "You're quite welcome." "You held out on me, Evie." "I don't like that." "Something tells me I'm gonna have to call that sheriff in Kansas." "That's when I decided to get in touch with Mr. Garvin." "I'm glad you did, Stephanie." "How much did Castle offer for the land?" "Six hundred dollars a foot." "That's about half what it's worth, Perry." "MASON:" "Who is this George Castle, Mike?" "I think he killed Stephanie's father." " How do you know?" " I just got back from Vegas." "I traced your father's movements the night he was killed." "He'd been gambling heavily, going from place to place." "And in every place, George Castle was somewhere in the background." "That doesn't prove a thing." "Maybe not." "But I intend to find out from him myself if I have to." "Do you have a licence for that?" "Certainly." "I'm a deputy." "I have three revolvers." "Where do you keep them?" "Various places." "My son, Junior, has one, there's one in my office safe and I always carry one ready for action." "I think you're being childish, Mike." "As your attorney, I suggest you turn your information and theories over to the authorities in Las Vegas." " Stephanie?" " I'm sorry." "I just haven't gotten over my father's death yet." "Gambling was like a disease to him, but he" "He never let me down." "He never let me down." "What do you think, Della?" "I think Mr. Garvin's in love with that girl." "I'm flattered, really flattered." "When Miss Falkner told me she'd take it up with a friend," "I didn't expect it would be Perry Mason." "My offer to her might have been a little low." "But you understand, a man likes to make the best deal he can." "I understand." "All right, let's get down to brass tacks." "What do you want for Miss Falkner's motel?" "Two hundred and twenty-five thousand dollars." "You're joking." "Don't misunderstand me." "I just want an expression of that amount from you so I can present it to Miss Falkner." "I can't guarantee she'll accept it." "Now look, Mason, let's be reasonable." "That figures out to $1,500 a front foot." "What's the going rate?" "A thousand." "Is that what you offer?" "All right, I'll offer a thousand." " Will you make it 1,200?" " What?" "No." "You won't go 1,200?" "Okay, Mason, on the condition you present it to your client," "I'll go 1,200, but that's it." "That's too bad, because 1,200 is not acceptable." "I wouldn't even discuss it with her." "I'll go my limit." "Thirteen hundred dollars." "Take it or leave it." "Let's see, I want 1,500, you offer 1,300." "Will you--?" "Will you split the difference?" "All right, Mason, that's the top." "I can't go any higher." "You can walk right out of here and I won't stop you." "I'll give you 1,400." "Well, I'll present your offer to my client." "I'm going to recommend not selling, not at that price." "Fifteen hundred dollars is out of the question." "Perhaps it's just as well." "You know, I've got a hunch that you stuck your neck out on this deal." "How much do you stand to lose if you can't deliver that property?" "You're smart, Mason, real smart." "How well did you know Glenn Falkner?" "Maybe you're not so smart." "[PHONE RINGS]" "Wait a minute." "Hello?" "No." "When?" "All right." "In ten minutes." "I'll be right here." "All right, Mason," "I'll pay her $1,500." "Where do we go from here?" "I'm going to get a bad taste out of my mouth." "Be in my office in the morning." "Paul Drake, please." "This is Perry Mason." "Hello, Paul." "I have a job for you." "George Castle." "Go ahead, Perry." "I want a complete background." "He operates out of Las Vegas." "You'll have to go up there." " Operates?" " All I know is" "Hold it, Paul." "I'm sorry, Paul." "Now, where was I?" "Oh, yes." "Castle's business is a mystery." "His ethics, questionable, his source of income" "Well, you see what you can dig up." "He sounds perfectly charming." "About a week ago in Vegas, a man by the name of Glenn Falkner was murdered." " Yeah, I remember." " There might be a connection." "All right, I'll check." "How far can I go on expenses?" "Oh, the limit." "When you turn in your vouchers, I'll buy everything." "Except casino chips." "Okay, Perry, I'll get right on it." ""Las Palmas, Las Tunas," "Las Vegas."" "Give you a lift, Miss Falkner?" "Well." "I thought I recognised you, Mason." "Well, lieutenant, what are you doing in this neighbourhood?" "Oh, we work around the clock sometimes, you know that." "And it's inconsiderate of me, holding up a public servant in the performance of his duties." "No, no, not at all." "You going somewhere?" "Been somewhere." "Just taking the young lady home." "If you have no objection?" "MAN:" "Say, lieutenant," "Sergeant Gordon would like to see you upstairs." "Okay." "Well it's been nice meeting you, Miss--?" "Well, it's still been nice." "So George Castle is dead." "How did you know that?" "That gentleman with the deceptive smile was Lieutenant Tragg." "The only thing that keeps him working around the clock is a homicide." "You wanna tell me about it?" "No." "No, I have to go home." "Please take me home." "Yes, ma'am, what can we do for you?" "Is Mr. Garvin around?" "He's very busy." "If you're interested in a trade--?" "Oh, no, thank you." "I'm perfectly happy with Mr. Garvin." " I'm Mrs. Garvin." " Oh." "Oh, he isn't in the office, Mrs. Garvin, he's out back." "Thank you." "So this is what you call hard work?" "Margo." "What are you doing here?" "Well, is that any way to greet a wife?" "Why, this" " This is the first time I've been here." "Mr. Garvin." "Mr. Garvin, what will your employees think?" "You must've been upset when you left this morning." " Where did you get this?" " On the dresser." "How many times do I have to tell you not to touch it?" "Well, I'm sorry." "I'm sorry, too, honey." "I was afraid you might get hurt." "You don't know how easily these things go off." "Come on, I'll walk you back to your car." "Hello?" "Mr. Perry, I want you to take on Stephanie Falkner as your client." " As of right now?" " Yes." "There's a possibility she killed George Castle in self-defence." "I want you to protect her." "There might be a conflict of interest." "That's all right." "Your first obligation is to Stephanie, regardless of where the chips fall." "All right, I'll do what I can." "Now, you've got to tell me the truth, Stephanie." "When I was at George Castle's apartment last night, he received a telephone call." " Was it you?" " No." "Then it was just coincidence your getting there after I left?" "Yes." "Were you carrying a gun?" "Let me see it." "Have you ever used that gun?" "Oh, no." "It's been fired." "One shot's been fired." "Where'd you get this?" "Michael" " Mr. Garvin gave it to me." " When?" "Yesterday, just after we left at your office." "He said Castle was dangerous." "He wanted me to keep it for protection." "Why did you go to see Castle in the first place?" "I had some childish notion that if I could talk to him," "I could find out if he was responsible for my father's murder." "And when you got Castle's room?" "He was dead." " And you didn't use this gun at all?" " No." "Well, at the moment, I wouldn't want it to fall into the hands of the police." "All right?" "Now, I don't want you to leave here." "I don't want you talk to anyone till I get back, you understand?" "We'll send someone over to see the whole batch." " How are you, counsellor?" " Good." "I haven't seen you for quite a while." "Did you hear about--?" "About your marriage?" "I did." "And congratulations." "Thanks." "Well, what can I do for you?" "I don't know about me but I think you can help your dad and Stephanie Falkner." "I don't get you." "Where do you keep your gun?" "A mighty nice gun, Junior." "Just like your dad's." "That's right." "He knew I always carry a lot of cash so he gave me that one." "After I got a licence." "That way" "Hey, look out." "It's all right, there's no one out there." "That was stupid of me." "I guess I shouldn't be handling these things." "You always know quite a lot about them in court." "I'm sorry, Junior." "Well, I owe you a new desk." "Okay, I'll bite." "If it were anybody else but Perry Mason putting on this act, it might be convincing." "Put that gun in your pocket and come with me." " Here we are." " Let's take mine." "I'm in a hurry, Mike." "All the more reason, this one's a real bomb." " Gonna try to sell it to him, Bill." " Okay, Mike." "Good luck." "I told you, Mr. Mason, I don't like this." "I'm a married man." "It's all right, I'll act as chaperon." "Stephanie, it's Perry Mason." "Congratulations on your marriage, Junior." "Thanks, Stephanie." "I knew you'd understand." "She can understand inside." "Come on." "Give Stephanie the gun, Junior." "I don't know what Mason has in mind, Stephanie." "Give her the gun." "Now, there's no secret about this." "If anyone asks you where you got that gun, tell them Michael Garvin gave it to you." "Oh." "MASON:" "Now, one bullet has been fired from the gun." "You have no idea as to who fired it, when or where it was fired." "If anyone wants to know, it will be necessary for them to check with Michael Garvin." "Is that clear?" "Perfectly." "Wait a minute, you might get my old man involved in this thing." "[PHONE RINGING]" "Hello." "Yes." "Oh." "That Lieutenant Tragg is downstairs." "Can we get out that way?" "Better let him come up." "We'll find our way down through the service entrance." "Come on, Junior." "Have him come up, please." " Who is it?" " Lieutenant Tragg." "Breathing fire?" "If he's a dragon, he's a tired one." "Hello, lieutenant." " I'm here." " Sit down." "I'm really sorry to interrupt your lunch." "Oh, I'm not as young as I once was." "Who is?" "Clock running down?" "After this chore, I'm gonna start bedding down to about 12 solid hours of shuteye." "Chore?" "You here on business?" "No, it's more of a favour." "We just booked your client, Stephanie Falkner, for murder." "It's a pretty solid case now." "Now look, Tragg" "She was the girl in your car last night, in front of the Lodestar." "That doesn't mean a thing." "You didn't let me finish." "We also found the murder gun in her apartment." " Where?" " Lying right on the table when we walked in." "That's impossible." "Has it been checked out with ballistics?" "It certainly has." "There's no doubt the bullet that killed Castle came from that gun." "Miss Falkner wants to see you." "And I told her I'd try to get a message to you." "I've kept my word." "MASON:" "It's all my fault." "I'm so clever, I put a noose right around Stephanie's neck." "I don't see why you feel that way." "I took her the gun, Della." "I literally forced it on her." "And now it turns out to be the gun that killed Castle." "You got it from Junior Garvin." "You think for two seconds, Burger's gonna believe that?" "Try Junior again, will you?" "I'll be through here in a couple of minutes, honey." "Just be patient." "[PHONE RINGS]" "Hello?" "Who's calling, please?" "Just a moment." "It's Perry Mason's office again." "No, Mr. Garvin isn't here right now." "No, I don't know where I could reach him." "Yes, yes, I'll tell him." "What do you want me to tell Mr. Mason's office the next time he calls?" "I just don't wanna talk to him, that's all." "Well, you're going to have to eventually." "What if you're subpoenaed for the trial?" "MAN:" "Lieutenant, it's been established that at 8:27, a phone call from the manager of the Lodestar Apartments brought a prowl car to the scene." "Now, at what time did you personally get there?" "About 8:30, give or take a couple of minutes." "And did you see a young woman in the vicinity?" " Yes." " Can you identify her?" "Yes, the defendant, Stephanie Falkner." "I show you now this gun" "It is marked "People's Exhibit A."" "and ask if you've ever seen this before." "TRAGG:" "Yes." "BURGER:" "This gun has been identified as the murder weapon through ballistic tests." "Where did you see it first?" "TRAGG:" "I found it in the defendant's apartment on the morning of April 12th." "BURGER:" "Did the defendant make any comment with reference to the gun?" "TRAGG:" "Well, she said that a Mr. Michael Garvin had given it to her." "BURGER:" "Did she say anything else about it?" "TRAGG:" "Well, there was a discharged shell in the gun, but Miss Falkner claimed to know nothing about it." "BURGER:" "Thank you, lieutenant." "Your witness." "Lieutenant Tragg, did the defendant say that she had received the gun from Michael Garvin Sr. or Michael Garvin Jr.?" "Well, just that she had received it from Michael Garvin." "Did she say when she had received it?" "No, sir." "Then as far as you personally know, this weapon could have been turned over to the defendant after the murder?" "Could have been." "Thank you, lieutenant." "That's all." "You may step down, lieutenant." "If it'd please the court, we intend to connect up this time element right now." "I call Eva Elliott to the stand, please." "Miss Elliott, you're employed as a private secretary" " by Mr. Michael Garvin Sr.?" " I am." "Were you so employed on the 11th day of April of this year," " the night that George was murdered?" " I was." " Did you work late that night?" " Yes, sir." "What time did Mr. Garvin get to the office that day?" "It was about 5:30 in the afternoon." "He had spent a few days in Las Vegas." "You worked until what time?" "About 8:00." "And what did Mr. Garvin do?" "I object, Your Honour." "The question, the whole line of questioning, is immaterial, irrelevant and incompetent." "I'm connecting the murder weapon and the time element, Your Honour." "On the strength of counsel's assurance, I will permit the evidence subject to a subsequent motion to strike it if it is not connected." "You may answer the question, Miss Elliott." "What happened at Mr. Garvin's office about 8:00?" "Well, I was stacking my work for the next morning." "And what was Mr. Garvin doing?" "Well, he took off his jacket and shoulder holster, he was going to shave and change clothes." "I see, Mr. Garvin generally carried a gun?" "Yes, sir." "Was there a gun in his holster at that time?" "It might have been in his jacket pocket." " It was definitely not in the holster?" " No, sir." "And he habitually carried his gun in the holster?" "Yes, sir." "He must have either left it someplace or given it to someone?" " I object, Your Honour." " I'm finished with the witness." "You may cross-examine." "No questions at this time." "Then I call Mr. Michael Garvin Sr." "You may leave the stand, please." "Mr. Garvin, on the 11th day of April this year, did you give or lend to the defendant, Stephanie Falkner, a weapon?" "GARVIN:" "I did." " I ask you now, if this gun, which I place in your hand and which is marked "Exhibit A," is the weapon?" "I don't know." "You can't identify your own gun?" "I have three guns so much alike that the only way I can tell them apart is by the serial numbers." "I see." "Well, that brings us then to the question of the identities of these guns of yours." "In order to avoid confusion, let's try this:" "Let's call the gun that you gave your son, Michael Garvin Jr., the "Junior gun,"" "let's call the one that you keep in your safe or vault, the "vault gun,"" "and let's refer to the one that you habitually carry on your person as the "holster gun."" " Is that clear?" " Yes, sir." "Now, on the 11th day of April, you gave the holster gun to Miss Falkner." "You then returned to your office." "What did you do there?" "Well, since I hadn't been home for several days," "I showered and changed clothes." "At that time, you were minus a gun from your holster, is that correct?" "Why, yes, sir." "And did you replaced it with the gun from your vault?" "Just a minute." "Do you have any objection to this line of questioning, Mr. Mason?" "I have, Your Honour, but we also are anxious to make some sense out of these guns." "We reserve our rights." "Proceed, Mr. Burger." "Mr. Garvin, did you place the vault gun in your holster?" "Yes, sir." "And did you then go to the apartment of Stephanie Falkner, the defendant," " to take her to dinner?" " Yes." "BURGER:" "Did you take her to dinner?" "GARVIN:" "No." " Why not?" " Miss Falkner was upset." "Why was she upset?" "She told me she had gone to the Lodestar to see George Castle." "Taking with her the holster gun you had given her?" "I must object here, Your Honour." "The question not only calls for a conclusion of the witness as to the identity of those guns, it is also leading and suggestive." "I'll withdraw the question." "Now then, Mr. Garvin, because Stephanie Falkner was upset after seeing George Castle, you did not go to dinner, is that correct?" "MASON:" "Objection." "Leading, argumentative and calls for a conclusion." "Very well, Mr. Mason, I'm finished with this witness." "Cross-examine." "Mr. Garvin, why did you give the defendant what the district attorney refers to as the "holster gun"?" "Answer the question, please." "Because" "Because she had once been engaged to my son, Michael Jr.," "I had looked forward to having her as a member of the family and when it turned out that my son married someone else in such a hurry," "I suddenly realised..." "I realised that I wanted her to have every protection." "Paul, did you ever find out where George Castle got all his money?" "No, that I'm not too clear on." "I did find out last night, however, that he owns 40 percent interest in Julie's under a fictitious name, of course." ""Julie's"?" "What's that?" "We you can sure tell you're a bachelor." "It's a swank women's shop in Vegas." "The kind of place where they have long-legged models." "If you're a smart shopper, you might be able to pick up a little cotton frock for about $200." "Well, I suppose it's still a cheap way for a man to get rid of his wife so she can't see how much he's losing at the casino." "You know the place, Mr. Garvin?" "Your secretary, Eva Elliott, used to model there." "I had no idea." "Your daughter-in-law was employed there too." " Margo?" " It's funny you didn't know that." "Now, just a minute, young man." "What's that supposed to mean?" "Now, relax, Mike." "You must admit it is peculiar." "You wanted me to protect Stephanie, even if there was a conflict of interest." " Do those instructions still go?" " They do." "Even if it affects you or your family?" "All right, Mike." "I'll put you back on the stand to start clearing up a little matter of those guns." "Something I'm not too clear on myself right now." "If it'd please the court, Michael Garvin Sr." "was on the stand when the court took its recess." "I have one further question I should like to ask of him." "BURGER:" "If the court please," "Mr. Mason announced this morning that he'd completed his cross-examination of Michael Garvin Sr." "And since my next witness is Mr. Garvin Jr., since he's here in court and ready to be sworn," "I insist that I be allowed to put him on the stand at this time." "After that, if Mr. Mason wishes to recall Mr. Garvin Sr.," "I shall have no objection." "That is agreeable to me, Your Honour." "Proceed with your case, Mr. Burger." "Thank you, Your Honour." "Call Michael Garvin Jr." "MAN:" "Michael Garvin Jr. to the stand." "Mr. Garvin, I ask you now to remember the morning of April 12th of this year." "Did Perry Mason visit you at your place of business?" "He did." "He asked to see my gun." "I took it out of my desk." "He clumsily fired a shot into the desk." "What happened then?" "He gave me back a different gun." "I object, Your Honour." "Improper groundwork for that question." "It calls for a conclusion the witness could not possibly know as fact." "The gun turned out to be the murder weapon." "You switched guns on me." "The witness will come to order." "The witness will answer the questions asked and will refrain from extraordinary pronouncements." "The defence objection is sustained." "Very well, Your Honour, I'll rephrase the question." "On that morning, Mr. Mason handed you what we have called here the "Junior gun."" " Is that correct?" " That's right." "I show you a Smith Wesson revolver marked "Exhibit B," and ask if that is your gun." "It is." "How do you know?" "About five months ago, I scratched my initials on the bottom of the handle." "Here, if you look closely, you can see them." "Are you sure that this is the gun that you handed Mr. Mason" " in your office that morning?" " Yes." "Now, he fired this gun, thereby causing a certain amount of confusion?" "Yes, sir." " And after he handed you back a gun?" " Yes." "What did you do with that particular gun?" "I took it to the apartment of Stephanie Falkner." "And what did you do with it there?" "Nothing." "I just stood there while Mr. Mason recited some double talk about Stephanie being in danger, and that I was bringing her a gun that she could use for defence." "I see." "By doing all this, Mr. Mason apparently meant to explain the presence of a discharged shell in the cylinder of your gun and at the same time, make it appear that the murder weapon, Exhibit A, had been in your possession" "during the time that the murder was committed." " Is that right?" " Objected to as argumentative." "The objection is well-taken." "Mr. Burger, you are bordering on misconduct." "Please ask questions which are within the scope of the issues and are proper." "Very well, Your Honour." "Cross-examine." "Now, Michael Garvin Jr., you stated that the gun which we're calling the "Junior gun"" "was not out of your possession up to the time you gave it to me." "That's right." "Which means, you took it home with you that evening?" "Yes, I always do." "What did you do with it at bedtime?" "Yeah, when I undressed I put it on the dresser." "And what did you do when you got up in the morning?" "I dressed and had breakfast, I shaved, I brushed my teeth." "I see." "Then what?" "Then I went to the office." "You took the gun with you?" " Well, no." " Oh?" "Then what did you do with the gun?" "I left it on the dresser." "My wife brought it down to the office later." "Now, isn't it possible your wife may have used that gun before she brought it down to the office later?" "That's a lie." "I resent that." "You switched guns" "Sit down, young man." "Sit down before I find you in contempt." "BURGER:" "I object, Your Honour." "That question is argumentative." "It's improper cross-examination." "And it contains a dastardly insinuation." "Objection's overruled." "The witness may resent it if he likes but Mr. Mason is representing a defendant in a murder case." "Now, Mr. Burger, if the court might make a suggestion, it would seem a bullet was fired from the weapon" "Mr. Mason had in his hand." "Is that right?" "Yes, Your Honour." "Well, I presume it could be determined whether the bullet came from the murder weapon or the Junior gun." "And since it certainly didn't fade into thin air..." "Or did it?" "Your Honour, an attempt was made to find that bullet." "It apparently ricocheted off the desktop and out the window." "In any event, we haven't been able to find it." "I see." "You may continue, Mr. Mason." "Thank you, Your Honour." "Now, Michael..." "I have no further questions of this witness." "You may step down." "Then I call Mrs. Michael Garvin to the stand, please." " State your name." " Margo Garvin." "Raise your right hand." "Do you solemnly swear the evidence you're about to give is the truth and nothing but the truth?" " I do." " Be seated." "Now, Mrs. Garvin, I show you a weapon marked "People's Exhibit A"" "and ask if you have ever seen this gun before." "I can't say." "I saw one which looked very much like it but I'm not an expert." " Where did you see that gun?" " My husband left it on the dresser." "When was this?" "On the night of April 11th." "The following morning, did you see the gun again?" " I did." " What did you do with it, Mrs. Garvin?" "I took it to my husband's office." "Thank you." "Your witness." "Mrs. Garvin, did you know the decedent, George Castle?" "Yes, I knew him in Las Vegas." "He was one of the owners of a dress shop where I modelled." "Did you have any personal relationship with him?" "No." "Mrs. Garvin, you were at home" " during the evening of April 11th?" " Yes." "And you did not leave your home at all during that evening?" "No." "Thank you." "No further questions." "If Your Honour please," "Mr. Mason, earlier expressed a desire to recall Mr. Michael Garvin Sr." "for further cross-examination." "The state has no objection if he wishes to do so at this time." "Your Honour, before I do that, I would like to confer with my client." "How much time will you need, counsellor?" "Just a few minutes." "You may step down, Mrs. Garvin." "The court will recess until 2:30." "That was a nice piece of work." "You've certainly led me down the garden path." "What are you talking about?" "I've told you the truth." "Have you?" "How do you feel about Mike Garvin?" "Oh, I think he's a very nice boy." "I'm referring to Mike Garvin Sr." "What do you mean, how do I feel?" "Well, I think he's-- He's a wonderful man." " Like your father?" " He's much younger than my father." "Not so much younger." "Really, Mr. Mason, this is ridiculous." "I don't see any point to it." "Believe me, there is a point." "And it might be the answer to those guns." "MASON:" "Mr. Garvin, you've been a client of mine for a long time." "GARVIN:" "That's right." "MASON:" "In point of fact, you recommended me to the defendant." "GARVIN:" "I did." "MASON:" "You did that knowing full well that if your interests conflicted with those of the defendant, I would be forced to sacrifice you." "Yes." "Perhaps that moment has come, Mr. Garvin." "GARVIN:" "Very well." "First, then let us clarify the confusion of the three guns in this case." "All right." "Now, you gave the defendant your holster gun on the afternoon of April 11th." "Yes, I did." "Later that night, you opened your safe, or vault, then put your vault gun in the holster, is that correct?" "Yes." "You were gonna take the defendant out to dinner." "What time did you arrive at her apartment?" "About 9:00." "Now, during the course of that evening, did you, without her knowledge, substitute the vault gun for the holster gun that you had given her earlier?" "Yes, I did." "Why did you do that, Mr. Garvin?" " I'd rather not answer." " But you have to answer." "Why did you substitute the vault gun for the holster gun?" "Because I thought she killed Mr. Castle with it." "In self-defence, of course." "MASON:" "So you switched guns?" " Yes." " And thus entrapped the defendant." " I did not." " Yes, you did." "Because, Mr. Garvin, the gun you took out of your safe was the murder weapon." " Well, that's not true." " But it is true." "So now the question arises:" "How did the murder gun get into your safe in the first place?" " Did you kill George Castle?" " Wh--?" "No." "Who else has the combination to your safe?" "My secretary." " Eva Elliott?" " Yes." "How far is your office from the Lodestar?" "Oh, just two blocks." "And how long did it take you to shave, shower and change your clothes that evening?" " About 30 minutes." " "About 30 minutes."" "So someone could have gone to your safe, removed the gun, killed George Castle and returned the gun to your safe?" "Yes." "And was your secretary, Eva Elliot, present in your office during that time?" "Well, yes, she was." "Thank you, Mr. Garvin." "No further questions." "You may step down, sir." "If it'd please the court," "I'd like to recall Eva Elliott to the stand." "I feel that under the circumstances" "Never mind the speeches." "I thought my luck would hold out just this once, but" "But it never has." "I didn't mean to frame you, Stephanie." "You've got to believe that." "I was just trying to make something of myself." "I was trying, but George Castle wouldn't let me." "He just wouldn't let me." "All right, you guys." "Take it easy." "I still don't understand what happened to the gun that I brought Stephanie." "She hid it." "The gun the police found was the one your father substituted the night before." "After your father left, she examined it, saw it had been fired." " She thought Pop had killed Castle." " That's it." "Which reminds me..." "Oh, which reminds me." "Where are your father and Stephanie?" " Downtown." " City hall?" "Hall of Records." "They're taking out a marriage licence." "He left this for you." "The amount is blank." "He said for you to fill it in, for services rendered and gratefully accepted." "Now, if you'll just add another thousand to that." "Oh, what for?" "Down payment on that car you drove yesterday." "Come on, Miss Street, I'll give you a demonstration." "Hold it, Junior." "We'll demonstrate it." "Want me to fill it in?"
{ "pile_set_name": "OpenSubtitles" }
The present invention relates generally to a method, system, and computer program product for computer aided allocation of physical memory of a computer system, and more particularly to a method, system, and computer program product for allocating physical memory based on required system architecture specifications, system configuration, and user requirements. A Memory Management Unit, (hereinafter “MMU”), of the computer system, manages access to memory in computer hardware. The MMU performs virtual memory management by translating virtual memory addresses to physical addresses in computer system memory. The MMU may also be referred to as a paged memory management unit, (hereinafter “PPMU”). The MMU may be part of a Central Processing Unit, (hereinafter “CPU”), or alternatively may be a separate integrated circuit. Additional functions performed by the MMU include managing functional attributes of the memory, such as bus arbitration, memory protection, cache control, and bank switching in some computer architectures, such as 8-bit systems. The MMU typically divides a virtual address space, which is a range of addresses used by the processor, into pages. A basic unit for memory translation is called a page. The attributes of a physical page in memory are specified within the translation resources of a page, such that each address within a page comprises identical attributes. Example of page sizes include 4 kilobyte, (hereinafter “kB”), 16 kB, 64 kb, 2 megabyte, (hereinafter “MB”), 32 MB, 512 MB, and 1 gigabyte. Upper address bits of a virtual address comprise a virtual page number, while a bottom bit of the virtual address corresponds to an offset within a page. An MMU may use a page table containing one page table entry, (hereinafter “PTE”) per page. The page table maps virtual page numbers to main memory physical page numbers. A physical page number is combined with a page offset to give a complete physical address. The PTE may identify information regarding a page, the information may include whether or not the page has been written to, a last assessed date stamp, identification of a processor type which may read and write to the page, for example in supervisor mode or in user mode, and whether the page should be cached. The PTE may prohibit access to a virtual page, for example by directing the MMU to signal a page fault to the CPU. This may occur when there is no physical memory allocated to that virtual page. An operating system, (hereinafter “OS”), may manage the page fault, for example by accessing available physical memory, and creating a new PTE to map the available physical memory to the requested virtual address. If there is no available physical memory, the OS may select an existing page, use a replacement algorithm, and save the existing page to a disk (a process called “paging”). A shortage of PTEs, may result in the OS having to free memory for new mapping. Physical memory may include a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any other method of storing computer code. Memory types may include the physical memory examples listed above. The MMU may generate an illegal access error condition or an invalid page fault condition upon illegal or non-existing memory accesses, respectively, which may lead to an exception fault or a bus error condition, when handled by the operating system. An exerciser tool, or an exerciser, may be used in a post-silicon validation or verification cycle as part of a manufacturing process of Integrated Circuits, (hereinafter “IC”). Post-silicon verification confirms functionality of actual devices running in real time using tools such as a logic analyzer and other assertion based tools. An exerciser is an application that is loaded onto a Device or Design Under Test (DUT), and may generate a test program, alternatively called a test case or test template, execute the test program, and check a result of the test program. Exercisers are essential tools in functional verification of a post-silicon platform. An exerciser is an application or program loaded to the computer system, which continuously generates test-cases, executes the test cases, and checks results of the test cases. A stimuli generator is a subcomponent of the exerciser used to generate a test case. As part of test case generation, the stimuli generator allocates one or more intervals in physical memory to be used for testing, and generates virtual translations for each of the one or more intervals. In a post-silicon test environment, an amount of physical memory available to use for testing may be limited. For example, at an early stage of post-silicon testing, memory devices that are external to a processor may not be available and the processor is required to run the post-silicon testing from its own memory cache. Allocation of intervals in memory is limited when a test case requires many intervals of memory, each with different attributes. For later verification stages, the exerciser may use memory which is external to the processor. It is important that a test case includes memory translations with a variety of page sizes. It is typically desired that certain intervals are translated with large pages in order to control data flow of specific translation micro-architecture resources. For extensive verification it is also desired that an allocation of intervals covers all the physical memory. Each interval has specific memory attributes. Hence, translating intervals with large pages imposes constraints for allocation of the intervals, since memory attributes are consistent across all pages within the interval, where pages of different sizes can overlap each other in the physical memory domain.
{ "pile_set_name": "USPTO Backgrounds" }
After the Colombian Association of Newspaper Editors and Media (Andiarios) decided to run the opinion column that prompted the libel lawsuit by Ecuadorian President Rafael Correa, newspapers all over Latin America decided to follow suit on Thursday, Feb. 23, reported the Ecuadorian newspaper El Universo, the daily being sued by Correa. Read more »
{ "pile_set_name": "Pile-CC" }
Bodyguard, The (1992) - Details Someone is threatening singing superstar Rachel Marron (Whitney Houston), and ex-Secret Service agent Frank Farmer (Kevin Costner) is hired to protect her. Farmer has to contend with the singer's indifference to security, her entourage (who care more for their place in her career than for her safety), her obsessed fans, her jealous sister ... and somewhere in the night, a professional killer who can't be eluded, can't be caught, and can't be called off.
{ "pile_set_name": "Pile-CC" }
{ "images" : [ { "idiom" : "universal", "filename" : "website_icon.png", "scale" : "1x" }, { "idiom" : "universal", "scale" : "2x" }, { "idiom" : "universal", "scale" : "3x" } ], "info" : { "version" : 1, "author" : "xcode" } }
{ "pile_set_name": "Github" }
We recently lost our 12 year old Stella. She was a Australian Shephard/Chow Chow Mix/Golden Mix. She was the sweetest dog I have ever had I dont think I saw the dog grown once. And Im saying that because I know Chow's often get a bad name and I may not have even considered getting her had I known she had Chow in her. Im sure glad we adopted her though. Her battle started about 1.5 months ago threw up lots of bile didnt look anything like what a dog with a upset stomach throws up. Tried feeding her rice after that that came up literally seconds later. So off to the vet, they did a xray and saw a spot on the xray where her stomach went to intestine. While the stop wasnt dismissed we tried something to stop her from throwing up that day. It worked she was back to herself and eating normal but about a week and half later throwing up again. Back to the vet had a xray with Barium done. The spot was a lot more evident this time, but Stella also had a fever this time and high white blood cell count. Had a ultrasound done where they confirmed a tumor in that location about 1.5cm by 1.5cm ( I think not diggin up paperwork right now). Put her on a bland diet at that point. 1 3/4 cups brown rice8 oz chickenfish oilground up egg shellssometimes some other protein sourcepumpkin/green beanspepcid I usually split this over 4 feedings during the day when she ate large quantities or drank large quantities. Things went south. She did well for a couple weeks on this but I could see her slowing down basically all she would do was get up, eat, go to the bathroom and go for a walk. I often would see her acting strangely outside pacing our fence just starring. It was sad to watch. I think she had a low grade fever constantly the last couple weeks and her hind legs just would no longer cooperate. We opted to not have any further testing done I struggle with that decision everyday because it was not a money issue. I just struggled with her recovery if she had surgery and having her last days trying to recover. We did give her piroxicam towards the end. We had her put to sleep this past Monday she had stopped eating although I do feel I probably could have hand fed her. But when she was struggling to keep water down after a walk where she constantly tripped we made the decision to have her euthanized. I could not believe how fast she deteriorated although I think she was masking a lot of her pain. Sorry for my ramblings I just wanted to say what a wonderful dog our Chow Chow mix was. Hope my image posted ok I had to resize it. I am so sorry for your loss and all you have been through. Please don't second guess your actions. I know how hard it is to let go. We lost our Loki (pure chow) just a few months ago. He, too, was 12. We went through similar circumstances.... in the end we had to do what was best for Loki and that was to let him go and be at peace.A day doesn't go by that he isn't missed. We have since adopted another rescue. He is no "Loki" but we love him dearly. I think in every dog owners lifetime there is that one special dog that is irreplaceable. Take comfort in the great life you provided for him Thanks for the nice comments. The last few days have been a little better. Ive still lost it a few times but I have tried hard to focus on the good times and not the last days. Sorry for your losses. Stomach cancer I would think would be one of the more miserable things when the one thing you want to do the most ( eat ) becomes the most upsetting to your system.
{ "pile_set_name": "Pile-CC" }
New Horizons in orthostatic hypotension. orthostatic hypotension (OH) is a common disabling condition associated with increased morbidity and mortality. Much of the evidence available is derived from younger populations with chronic neurological disease leading to uncertainty for the diagnosis and management of older people. to provide an overview of recent and emerging evidence for the diagnosis, management and prognosis of OH in older persons. a narrative review of recent studies, emerging therapies and relevant regulatory updates. revisions to the diagnostic criteria for OH include the duration of the blood pressure drop, specific criteria for initial and delayed OH and OH with hypertension. Non-drug therapies remain the first-line treatment option and Comprehensive Geriatric Assessment appears to result in lower rates of OH. Recent evidence concerning withdrawal of causative medication is inconsistent. Midodrine has recently become the only licenced medication for OH in the UK. Other emerging treatments include atomoxetine and droxidopa but these require further evaluation. Many other agents may be used but are not supported by high-quality evidence. The increase in mortality associated with OH is less apparent in older people. OH remains common in older people, the new diagnostic criteria address some of the previous uncertainty but evidence concerning withdrawal of antihypertensives is conflicting. Midodrine is now the only licenced medication for OH in the UK, but non-drug therapies remain first line and fludrocortisone may be considered before midodrine. We may see other agents such as droxidopa becoming increasingly used over the coming years.
{ "pile_set_name": "PubMed Abstracts" }
Insanity Wolf school calls me to pick up son for wearing photohub t-shirt pick him up in photohub t-shirt these captions aren't guaranteed to be correct
{ "pile_set_name": "OpenWebText2" }
Not so long ago, Ontario and Quebec ruled the roost in the Canadian henhouse. Now it takes the two of them to lay an egg. OK, I exaggerate. But the once-cocksure provinces didn’t launch their new coalition with a lot of oomph last week, when Ontario Premier Kathleen Wynne travelled to Quebec City to meet Philippe Couillard, her Quebec counterpart. Couillard was hardly subtle in his comments about the new alliance. Quebec and Ontario “are back,” the Quebec premier said, “as a very important block of influence in the country.” It’s a mark of the effectiveness of this new Ontario-Quebec block that this is the first time you’ve read about it. But before losing myself in skepticism, I should say that Wynne and Couillard are on to something here. They have yet to rattle the foundations of the nation’s true economic powerhouse — the West. But they have belatedly recognized that the axis of political power has shifted to Saskatchewan, Alberta and British Columbia. In short, the Central Canadian premiers know that it’s time to fight back. And the centrepiece of their dalliance with 21st-century realities smartly features energy — in the form of a vow to increase sales of Quebec hydroelectricity into Ontario. Back home in the Maritimes, where Canada’s premiers met this week (in Charlottetown), we can resist fracking and new energy projects with all the zeal of a latter-day Joan of Arc, as long as we understand that our purity of spirit and nobility of mind are turning us into economic outcasts with an uncertain future. Call me biased (I do consult in the energy sector), but I can’t resist reaching the obvious conclusion that Canada’s prosperous provinces — now including Newfoundland and Labrador — are thriving in large part due to the development of their natural resources. And citizens living therein are somehow managing to cope with the prosperity. I’ll resist another obvious conclusion, however — namely, that political leaders in Atlantic Canada have let us down by not entering into the kind of coalition that has long united Canada’s three westernmost provinces, and that Couillard and Wynne are now trying to form. An Atlantic Canada political “block” could be a beautiful thing in the new Canadian order, but it could only be achieved in the face of entrenched opposition to change. (To blame only politicians for this state of affairs is like blaming fish for the state of the oceans.) On the far coast, meanwhile, British Columbia Premier Christy Clark will continue to gloat (as she did this week in Charlottetown) about something called the New West Partnership Trade Agreement. The deal with Alberta and Saskatchewan is supposed to boost the economy by, as Clark put it, knocking down “unnecessary barriers to trade.” Clark and her colleagues in the West are also sending a message to Premier Stephen Harper, who has made a studious and stunningly successful effort to ignore the provinces over the past eight years. Premiers like Alberta’s Peter Lougheed once bestrode this country like colossi. Now, who among us can even name the premier of Alberta (David Hancock, I think) without first consulting the oracle at Google? Harper’s pretty good at ignoring — and thereby marginalizing — the list of his least favourite things, which includes not only the premiers but also the CBC, medicare, the media and Australian-rules football. But he can’t ignore the Western coalition, and he knows it. Why else would his government promote transfer policies, for instance, that will send more health-care money to young and vigorous Alberta and less to aging and ailing Nova Scotia? Ontario and Quebec are now trying to play in the great national game, as part of a team uniting Canada’s two largest “have not” provinces. Heck, in the new Canadian order, maybe we should join Ontario’s 21st-century team. The Maritime provinces have been divided and conquered long enough, and there’s no sense acting like it’s still 1867.
{ "pile_set_name": "Pile-CC" }
8" F. Basketball Product Description 57507 Elite 8" F. Basketball has the look of sculptures with details designed to capture the spirit of the sport or activity. Available in Antique Pewter and Gold finish, these figurines are mounted on a Mahogany finish base. ASI 363654 All items are subject to availability. Some items may not look exactly as depicted do to specification changes from our vendors that are subject to change without notice.
{ "pile_set_name": "Pile-CC" }
"Bad Boys" ready to take over UK's defense In 2013, the Kentucky football defense was very mediocre. The Cats ranked in the middle of the pack in yards given up (59th out of 120 teams) and near the bottom in points given up to opponents (89th). This year, the D is looking to do a 180 and take a new persona. Nate Willis and J.D. Harmon have dubbed the unit “The Bad Boys.” They explain why here:
{ "pile_set_name": "Pile-CC" }
I want to encourage those who haven’t read In Vitro Fertilization: Opening a Pandora Box (Part 1) to click on the link and read it first. In this blog entry I am going to discuss the remaining ethical issues of IVF and answer the big question: Is there a way in which we can use IVF ethically and if, how? It has already been established in the previous blog entry that the normal procedure of IVF undoubtedly results in the killing of human life by discarding zygotes or embryos and is therefore unethical. There is however a lot of other ethical issues surrounding IVF that need some careful reasoning and examination. It is important to note that our three premises still stand. Firstly, all life starts at conception. Secondly, the zygote (fertilized egg cell) is a human being with all its human rights. Thirdly, that we consider these truths to be universal. If you do not agree with these points of view, you do not need to read any further, because the arguments will stand or fall on these points. With that said we can proceed to the first ethical issue. Freezing Embryos The freezing of embryos poses serious ethical concerns. I want to start by giving you a staggering fact. At the moment there are more than 600 000 frozen embryos in America. In other words, we currently have 600 000 souls on ice. Is it ethically sound to freeze a human being and keep it from developing? If we truly see the embryo as a person with rights it should be unambiguous to see that it is ethically impermissible to freeze an embryo. Other difficult questions resulting from freezing the embryos are – what happens to the embryos when the mother dies, the couple cannot afford IVF any further, the couple do not want any more children or when the couple divorces? None of these situations can ultimately be prevented and these situations will cause the freezed embryos to be killed. Is there a way in which we can use IVF ethically and if, how? I believe there are only two ways in which we can prevent the killing of embryos during the process of IVF, but does that make it ethical? The first way is to allow all the 10 to 12 embryos to implant into the mother’s uterus. That way we know for sure that no external conditions, as mentioned before, are going to cause embryos to be killed. The problem, however, is that now we are allowing a potentially dangerous situation to develop for both the mother and the babies if too high many embryos implant. The more embryos that implant into the uterus the higher the risk of the pregnancy and the likelihood of complications and death. We might end up having to take one human life to save another human life. For this very reason, the normal protocol of IVF only allows 2-4 embryos to implant. It should be clear to you that allowing all the embryos to implant is not an ethical solution to our problem, for it might do exactly that which we are trying to avoid – the killing of embryos, and as a complication, might even endanger the mother’s life. The second way is to only fertilize one or two egg cells and allow them to implant into the uterus. Now to be honest, this is the most ethical way to use IVF. However, there are some major objections. Although not these objections are on the grounds of ethics, they should still be considered. The first one is the fact that the chance of a successful live birth will now decrease immensely and can be anywhere between only 5-10%. Because of this low success rate the need for more treatment cycles will necessarily increase as will the financial burden on the couple. Every couple who has ever undergone IVF will testify to the high emotional stress involved and the strain on their relationship. What will the emotional cost be, considered the low success rate and the need for more treatment cycles? Apart from the financial and emotional cost, there are also the physical costs to consider. The increased risk of ovarian cancer, ovarian hyper stimulation syndrome and other risks after implantation, like possible birth defects. With that in mind, can the small chance of a successful outcome outweigh all the costs? What is the cost-benefit then? Some of you may still think it is worth the cost. With this said there is the second objection. In our society, the gift of your own biological child is something that most couples long for. It is natural and understandable for couples struggling with infertility to also want their own biological child. However, it can become objectionable when the struggle for a biological child becomes an obsession that outweighs all the ethical questions already raised and the goal for an own biological child is more important than having a child you could love, care and parent. It begs the question, when does the struggle for your own biological child become an obsession in the light of 132 million orphans worldwide? That however is an issue you should decide for yourself. The final ethical issue is the way in which IVF technology was discovered and is being developed and improved today. A few weeks ago, I asked a very dear friend of mine if it is ethical for medical practitioners to use IVF technology which was discovered by killing and experimenting on human lives. He responded by giving me the following analogy: Let’s say the Nazi’s developed a cancer treatment during WWII by killing or experimenting on Jews. What will be the most ethical thing to do with the cancer treatment today? Will it be to use it to treat millions of cancer patients and save their lives or will it be to not use it at all because it was discovered unethically? My answer was undoubtedly that we should treat the cancer patients. For a few days, this analogy kept my mind at peace and I was persuaded that we should use IVF. However, IVF technology is not the same as cancer treatment because it does not cure a life-threatening illness. It is also not just a once off discovery. Today around the world hundreds and thousands of human lives are killed and experimented on in the development and improvement of IVF. Therefore, I would like to change and correct the analogy. Let’s say the Nazi’s developed a way in which they could culture a limb for people without it by experimenting on and killing Jews during WWII. And they are currently still busy killing and experimenting on Jews to improve the culturing of limbs. What will be the most ethical thing to do with the technology of culturing limbs today? Will it be to use it to enhance millions of lives or will it be not to use it at all because it is currently the result of thousands of deaths and experimentations on humans? Are we fine using medical technology that causes us to indirectly support the killing of thousands of human lives? I want you to really think of that question and the impact of your possible answer Now is there no hope for couples struggling with infertility? No, we currently have a program called Naprotechnology which looks very promising and the unconditional love of adoption. “Having a moral heartbeat for humanity.” If you found this blog entry interesting, thought-provoking and informative share it with friends.
{ "pile_set_name": "OpenWebText2" }
Saturday, November 13, 2010 Do you have a living room makeover on your hands? Do you need some extra seating for the holidays? Please stop in at 817 West Broad Street, Falls Church Virginia for all of your decor needs. Here is some of our current inventory: Below you can see that we have a pair of French Provincial Style Arm Chairs. Two matching Victorian Settee's We have two identical wing chairs with claw and ball feet. Three elegant chairs. The chair on the far left is a chippendale style heavily carved arm chair. In the middle is a Victorian Ballon back chair and on the right is a hand painted Karges chair. Below we have a comfortable sofa with a matching carpet that looks spectacular in a large room. In the corner we have a victorian style half settee by Maitland Smith. Contact Us Phone: 703-536-4663 Email: [email protected] Our Inventory Our inventory includes antique, vintage and high-end reproduction furnishings and decorative objects. Some of the more unusual pieces are Italian marquetry tables and cabinets with both simple and ornate inlaid wood designs. Fine furniture companies such as Baker, Southwood, Maitland- Smith, Karges, and Christopher Guy are represented in our collection. Unique hand painted pieces are available. We also have a sizable selection of framed art including many signed original oil paintings, hand tinted engravings, and prints. A particular interest of the owner is antique and vintage china and porcelain from Europe (especially Limoges France), and Japan. Numerous beautiful hand painted pieces are included. Antique and vintage glassware (ex. Heisey) of various colors are available. Mirrors, lamps, and rugs (including Persian) of a variety of styles and sizes are available. These consist of antique, vintage, and new items. Home Staging Services Home Staging services provided by an accredited staging professional are available for both Staging for Living as well as Home Staging for the Real Estate Market. Ready for a fresh look in your living space? Consider Staging for living. Thinking of moving? Before placing your home on the real estate market, get a professional Home Staging consultation. Statistics show homes sell faster and at a higher price when professionally staged than homes that are not. Let Home Staging Extraordinaire, LLC (also doing business as Eclectic Elegance) review what you can do to make the sale of your biggest asset an effective and financially rewarding process. Many of the recommendations may involve little or no cost to the seller!
{ "pile_set_name": "Pile-CC" }
Header Search Main navigation Main page content The Centers for Disease Control and Prevention (CDC) released data on the ten leading causes of death in the United States recently. Tragically, suicide—too often a consequence of untreated mental illness and substance use disorders, and as such a preventable condition—remains on that list as the 10th leading cause of death for adults and the second-leading cause of death in our youth. Suicide rates increased from 29,199 deaths in 1996 to 47,173 deaths in 2017. What are the contributors to the state of mind that ends in a person taking their own life? What can government do about this? What responsibility do we have to each other to take actions that will alter this course? These are questions of great importance, because rising deaths by suicide say something about the conditions under which our people live and die and about our society at large. Earlier this month there was news that over 90 people overdosed on synthetic marijuana laced with the powerful opioid fentanyl at a park in New Haven, Conn. Thankfully, no one died of an overdose that day due to the quick response from emergency personnel. Such stories remind us that people across the country are struggling with addiction to illicit substances and opioid-based pain medications.
{ "pile_set_name": "Pile-CC" }
Kimberly, West Virginia Kimberly is the name of several unincorporated communities in the U.S. state of West Virginia. Kimberly, Fayette County, West Virginia Kimberly, Monongalia County, West Virginia
{ "pile_set_name": "Wikipedia (en)" }
<?php /* * This file is part of PHPUnit. * * (c) Sebastian Bergmann <[email protected]> * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ class BankAccountException extends RuntimeException { } /** * A bank account. * * @since Class available since Release 2.3.0 */ class BankAccount { /** * The bank account's balance. * * @var float */ protected $balance = 0; /** * Returns the bank account's balance. * * @return float */ public function getBalance() { return $this->balance; } /** * Sets the bank account's balance. * * @param float $balance * * @throws BankAccountException */ protected function setBalance($balance) { if ($balance >= 0) { $this->balance = $balance; } else { throw new BankAccountException; } } /** * Deposits an amount of money to the bank account. * * @param float $balance * * @throws BankAccountException */ public function depositMoney($balance) { $this->setBalance($this->getBalance() + $balance); return $this->getBalance(); } /** * Withdraws an amount of money from the bank account. * * @param float $balance * * @throws BankAccountException */ public function withdrawMoney($balance) { $this->setBalance($this->getBalance() - $balance); return $this->getBalance(); } }
{ "pile_set_name": "Github" }
HDTV Supplys WolfPack 16x32 HDMI Matrix HDBaseT Switcher is a preconfigured integrated HDMI video and HDMI audio modular HDMI matrix router. The 36x36 chassis′s back plane allows HDMI technologies to be converted and switched eliminating external converters and it allows any input to be routed to any output, or the same input to be routed to all outputs. The 16x32 HDMI Matrix HDBaseT Router is 4K at 30 Hz compliant. NOTE: You will need to buy a quantity of the above of HDBaseT receivers that supports the number of the TVs you have as we made them optional so you can pick the quantity you need and not have to pay for 32 when you need only, say, 25. See the below configuration example... By having 1-port slide in cards the matrix is very reliable as in the unlikely even there is a loss of signal you just replace the card with a spare you have purchased or order another from us. The complete matrix doesn′t have to be sent to us for a repair. Free Android and iOS App: The IOS App for this WolfPack card cage matrix is in the Apple Application Store and when you SEARCH the key words ”MCS” or ”Matrix Control System” you can download and install it to your iPad or iPhone. Also from your iPad or iPhone click the following link...MCS-matrix control system to install it directly. The WolfPack 16x32 HDMI Matrix HDBaseT Router manages HDMI input signals for the inputs and HDBaseT CATx cabling for the output. This 16x32 HDMI Matrix HDBaseT Router support long haul transmission, maintains power reliability in the event of failure and offer the best flexible solutions for an AV system deployment. Our 16x32 HDMI Matrix HDBaseT Router also can support high-resolution HDMI sources routed to HDMI displays, monitors, projectors, or audio receivers, etc. The EDID can be selected between seven different modes or copied from the attached displays. 4K 16x32 HDBaseT HDMI Video Matrix Switcher Features: Chassis size: 36 input and 36 outputs cards Input Cards Supported: 16 - 4K female HDMI single port cards = 16 - HDMI inputs Output Cards: 32 - HDBaseT HDMI single port cards = 132 - RJ45 outputs Up to HDBaseT Receivers to support 220 feet at 1080p or 115 feet with CAT5e/6/7 at 4K/30 Input HDMI cable distance: Up to ~12 feet with an AWG22 HDMI 1.4 high speed cable Supports resolution exchanges with several resolutions can be chosen and used Uses a dual control system Control via Web / RS232 and Front Buttons control (no remote control) Rack-mountable The heart of the 16x32 HDMI Matrix HDBaseT Router is the WolfPack chassis backplane which allows customization of the configuration for input and output cards to match every need of the system and application. The matrix support hot-plugs and you can change the cards while the equipment are still working. Why not buy buy this 16x32 HDMI Video Matrix Switcher today? Specs NOTE: HDTV Supplys implementation of the HDBaseT technology and this product adds virtually zero latency to the signal, less than 7 microseconds over 220 feet of CATx cable. At 100 feet you are talking about 3 microseconds. This means for example, in a church or auditorium, the speakers lips are in synch with the image on all the TVs and projectors. Below is a video of the WolfPack 9x9 card cage model showing the fast switching speed and its features. The larger 18x18 card cage model will operate exactly the same but will allow more input and output cards. Why not buy buy this 16x32 HDMI Video Matrix Switcher today? Q: How is HDBaseT technology different than others? A: Unlike other HD distribution technologies, HDBaseT is the only technology which enables CAT5/6/7 connectivity from 70 meters to 100 meters, depending upon the specific product, for uncompressed full HD multimedia content and up to 100 watts of charging power via a single cable. HDBaseT is optimized for video applications and can connect all HDBaseT enabled home entertainment devices. Also, HDBaseT technology has the capacity to deliver double the resolution available today to future 2K and 4K formats. Other existing solutions also require a specific cable and/or a new proprietary connector while HDBaseT utilizes the existing Ethernet infrastructure. HDMI HDbaseT Extender Helpful Tips & Recommendations: Keep cables away from any equipment with an electromagnetic wave, e.g., mobile phone, microwave, radio equipment, fluorescent lamp, high voltage power lines, etc. CAT5/6 cables should not exceed 220 feet or (70m). Please adhere to the TIA/EIA568B standards when terminating network cables in the field. Q: What is the HDMI and HDCP compliantcy of the matrix? A: It supports HDMI 1.4 and HDCP 1.4 which works with all HDMI products. Q: What resolutions does it support? A: It supports high-definition resolutions of 480i, 480p, 720p, 1080i, 1080p and 4K at 30 Hz. Q: Does the matrix have a WEB GUI controlled from a browser? A: No, it can easily controlled via Front panel buttons on both 16x16 HDMI matrix switchers. Q: Does the matrix have an OFF/ON switch? A: No, it should remain ON to store the EDID and HDCP information. If you need to turn it off you will need to pull the AC plug or buy a remote control automated ON/OFF AC receptacle Q: Does this HDMI Matrix Switch have a remote control? A: No. Q: I see the the HDMI extenders come with 2-remote IR cables, will the remote IR work with this matrix? A: No, the cables are used when the application has one source and one widescreen. They can't be used with this matrix and need to be set aside and not used. Q: Can I use unpowered HDMI over CAT5/6 extenders with this matrix? A: We don't recommend them with our matrices, or anyone elses, due to them consuming power from the matrix and the matrices are not designed to power many external devices. Consider the example of 9 - HDMI balun transmitters that need 0.5a amp each to power it times 9 or 4.5 amps the matrix would have to supply. The power supply of this matrix is rated at 12v at 3.5 amp so in that example the matrix would probably break down and your warranty may be voided. See the companion powered HDMI extenders in the above OPTIONS that have 2-AC adapters. HDMI cables with built-in boosters also consume power also and we don't recommend more than 2, if at all. You must use our low power ones, also. Q: Do the HDMI receivers support Remote IR? A: No, they send perfect audio and video but do not have remote IR. Why not buy this on a WolfPack™ 16x32 HDMI Matrix Switch over CAT5 today? Warranty HDTV Supply includes a 2 Year WolfPackCare™ Advance Replace Limited Warranty on this matrix system. The warranty states that the Modular HDMI Matrix Router will perform substantially in accordance with the accompanying written materials for a period of 2 years from the date of the receipt of the order & that the Modular Matrix Router will be free from defects in materials & workmanship under normal use. Slide-in Boards & HDBaseT Extenders: If a board or extender goes bad in the first 2-years and HDTV Supplys Tech Support team verifys the problem after a telephone call, HDTV Supply will send a new or like-new unit usually within 24-hours by USPS Air Priority at HDTV Supplys expense. We will ask for a credit card for payment in case the bad devcie is not sent back to us within 5-business days. You will need to provide us the tracking number as we will to you and you will need to pay for the devices return. Chassis or Power Supply: If the chassis or power supply goes bad and HDTV Supplys tech support team verifys it HDTV Supply will send a new or like-new chassis usually within 24-hours by UPS ground at HDTV Supplys expense. We will ask for a credit card for payment in case the bad chassis is not sent back to us within 5-business days. You will need to provide us the tracking number as we will to you and you will need to pay for the chassis return. In order to get a warranty replacement for a defective item HDTV Supplys Support Team will verify the product is eligible for a warranty. An RMA number will then be issued. Shipped replacements will be in like new conditions, tested and all components included. HDTV Supply also sells a 3 or 5 Year warranty for this product. Please call us for a quote. Why not buy this Modular HDMI Matrix Router today? Pictures Ask a Question Questions & Answers HDTV Supply created our unique line of WolfPack line of products which are born from a hungry, circling pack of high performance video and audio HDMI that surround our competition to devour them. The WolfPack family is sleek, unique & swift & even the smallest configuration wolf can adapt himself to many hostile environments. The Wolfpack family can roam long distances even some up to 300 feet over HDBaseT trails and howl 4K whereas those who try to trap the WolfPack fails & runs away to the older devices. You can only get this one-of-a-kind WolfPack product from HDTV Supply. Reasons To Buy an HDTV Supply WolfPack Product: All WolfPack products have FREE HDTV Supply U.S. based Live Telephone Lifetime Tech support HDTV Supply has a dedicated TEXT support line at 805-409-0208 to support you HDTV Supply has a dedicated Product Manager for WolfPack products to assist with any special needs If there is a WolfPack firmware update for your product you will find it at our site Many times we will list lower refurbished WolfPack products at our site All WolfPack products are usually in stock and ship the same week day if the order comes in by 12PM PST You can buy WolfPack products from us with most any credit card, your Amazon account and PayPal
{ "pile_set_name": "Pile-CC" }
<Project Sdk="Microsoft.NET.Sdk.WindowsDesktop"> <PropertyGroup> <TargetFramework>netcoreapp3.1</TargetFramework> <UseWPF>true</UseWPF> <OutputType>WinExe</OutputType> <RootNamespace>ExpenseIt9</RootNamespace> <AssemblyName>ExpenseIt9</AssemblyName> </PropertyGroup> <ItemGroup> <AppDesigner Include="Properties\" /> <ProjectReference Include="..\EditBoxControlLibrary\EditBoxControlLibrary.csproj"> <Project>{558eee03-6927-4fe6-aeb6-972769960849}</Project> <Name>EditBoxControlLibrary</Name> <SetTargetFramework>TargetFramework=$(TargetFramework)</SetTargetFramework> </ProjectReference> <Resource Include="Watermark.png" /> </ItemGroup> </Project>
{ "pile_set_name": "Github" }
Q: Cookies. Case Sensitive Paths. How to rewrite URLs We have a sizable collection of applications (>50) all running under a single domain but with different virtual directories. Pretty standard stuff. We store cookies using paths to segregate cookies by application. Paths are set the the Application Path. This seems to work fine as long as the casing of the URL is the same as the application path. If it is different, the browser fails to retrieve the collection of cookies. Is there any very basic way (ISAPI? Global ASAX?) to rewrite all URLs so that they match the Application Path? Ideally this is something that can be configured at the application level. Currently stuck on IIS6. thanks A: Wondering if this is a possible (even a good) solution: In Global.asax: void Application_BeginRequest(object sender, EventArgs e) { string url = HttpContext.Current.Request.Url.PathAndQuery; string application = HttpContext.Current.Request.ApplicationPath; if (!url.StartsWith(application)) { HttpContext.Current.Response.Redirect(application + url.Substring(application.Length)); } }
{ "pile_set_name": "StackExchange" }
Design, Synthesis and Biological Evaluation of Novel Urea and Thiourea Bearing thieno[3,2-d]-pyrimidines as PI3 Kinase Inhibitors. Phosphatidylinositol-3-kinase α (PI3Kα) is a ubiquitous intracellular enzyme, mainly involved in intracellular signaling pathways, promotes cellular growth, proliferation, and differentiation. Therefore, inhibition of PI3K can be a hotspot in molecular targeted therapy for the treatment of cancer. The present research work involves molecular docking studies performed to screen derivatives of urea and thiourea bearing thieno [3,2-d]-pyrimidines against the active site of PI3K enzyme using MOE.2008.10. The designed structures (6a-f) and (7a-j) were synthesized by the facile synthetic methods and evaluated for their anticancer activity against HT-29 and MCF-7 cell lines and inhibitory activity against PI3Kα enzyme. Among the tested compounds, 4-(4-(2-(3-(pyrimidin-2-yl)thioureido)ethyl)piperazin-1-yl)thieno[3,2- d]pyrimidine-6-carboxamide (7f) showed the highest anticancer activity against HT-29 and MCF-7 cell lines with IC50 values of 2.18 µM and 4.25 µM, respectively. Further, the same compound also exhibited potent PI3Kα inhibitory activity with IC50 value of 1.26 µM. Docking studies supported the initial pharmacophoric hypothesis and suggested a mode of interaction at the active binding site of PI3Kα, demonstrating that the target compounds were potential inhibitory agents for cancer therapy.
{ "pile_set_name": "PubMed Abstracts" }
Pages Mar 27, 2017 It's amazing to me what a little food can do for you. This week they brought my TPN which is basically my food put through an IV. The Picc line goes in my upper arm and straight to my heart more or less. It pumps my food into my 24/7. I have a bad that carries my food and all my picc supplies. That bag goes with me everywhere, and if I'm being honest, I'm really sick of it. It's okay though because it's keeping me alive and that's all that matters right now. Thank you to all of you for your help and support with my GoFundMe campaign. I have some awesome news to update you. We'll be changing the number to just cover the surgery right now. Up until today we were having to pay out of pocket for my TPN. The insurance contacted my doctor this week and said that they would now be covering my TPN. I can't tell how you HUGE that is! It was costing $3700 a day, and to have that weight lifted is amazing! Now, we'll just have to raise $25,000 for my surgery. It still feels like a HUGE number, but because of your generosity and support, I know we'll get there! The surgery is scheduled for April 3rd. Until that time I'm not able to have anymore visitors because of my picc. They want it to stay as sanitary as possible inside our little home, so people aren't able to come over especially if they've been sick. My nurses and family are about all that are allowed at the moment. So many of you have sent gifts, texts, meals, phone calls, and so much more, and I can't thank you enough. I don't always respond to every text because life gets in the way, but please know how much they mean to me and how appreciative I am for all your love and support. I look forward to getting better so I can be with all of you again. Dave and I just want to tell you all how touched and humbled we are by all your love. The first time we went through this, we often felt alone. This time it has been so different. We truly can't thank you enough, or tell you how humbling it is to feel of all your love. We're so very blessed to have each of you. Thank you for all your prayers. I feel them. God sends me strength everyday and I can't express what that means to me. I know without you I wouldn't be able to keep going, so thank you for your prayers in my behalf. It's a truly touching experience. I'll make sure to keep each of you updated on how things are going. Here's the link to my GoFundMe in case any of you missed it before: Help Jilly Strasburg Live Jilly Strasburg Jilly & Bavid Jilly's most Popular Posts Love that lasts a Lifetime The most beautiful people we have known are those who have known defeat, known suffering, known struggle, known loss, and have found their way out of the depths. These people have an appreciation, a sensitivity, and an understanding of life that fills them with compassion, gentleness, and a deep loving concern. Beautiful people do not just happen.
{ "pile_set_name": "Pile-CC" }
Sign up to FREE email alerts from Mirror - Arsenal FC Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email Besiktas want Arsenal keeper David Ospina - but are frustrated at the £3million asking price. Ospina, 27, is No.2 at the Emirates behind Petr Cech who arrived last summer and played just four times in the Premier League last season. Besiktas, the Turkish title holders, would be able to offer him regular first team action and Champions League football. President Fikret Orman said: “Arsenal want a lot for him so we may have to look for alternatives. “I do want Ospina and we are going to get a foreign keeper.” Ospina has helped his country into the Copa America semi-finals where they face Chile.
{ "pile_set_name": "OpenWebText2" }
Q: Express homepage not rendered on server I am developing a react app that uses server-side rendering. My routes work, except the homepage. Not sure why. I'm assuming I'm not setting up my express server correctly to handle the index route...? The following is the module which handles express' setup and whatnot. I'm assuming I have the app.get('*) or app.use(express.static) incorrect. app.js (server) require('ignore-styles') const compression = require('compression') const express = require('express') const path = require('path') require('babel-register')({ ignore: /\/(build|node_modules)\//, presets: ['env', 'react-app'] }) const universalLoader = require('./universal') const app = express() // Support Gzip app.use(compression()) // Serve static assets app.use(express.static(path.resolve(__dirname, '..', 'build'))) // Always return the main index.html, so react-router render the route in the client app.get('*', universalLoader) module.exports = app universalLoader.js (server) import path from 'path' import fs from 'fs' import React from 'react' import { Provider } from 'react-redux' import { renderToString } from 'react-dom/server' import { StaticRouter, matchPath } from 'react-router-dom' import configureStore from '../src/store' import App from '../src/components/App' import routes from '../src/shared/routes' import { getSiteInfo } from '../src/store/actions/siteInfo' import { REACT_APP_SITE_KEY } from '../src/shared/vars' import Helmet from 'react-helmet' module.exports = function universalLoader(req, res, next) { // console.log('Loading....') const store = configureStore() const fullUrl = req.protocol + '://' + req.get('host') + req.originalUrl let routeFound = false // Try to find a matched route const promises = routes.reduce((promise, route) => { var props = matchPath(req.url, route) // If route was matched, component exists, and has an initialAction // then call it's initialAction. // This action will most-likely load some data asyncronously if (props && route.component && route.component.initialAction) { promise.push(Promise.resolve(store.dispatch(route.component.initialAction(store, props)))) } return promise }, []) // Load initial site data promises.push(Promise.resolve(store.dispatch(getSiteInfo(REACT_APP_SITE_KEY)))) // Wait until all async data has been loaded Promise.all(promises) .then(() => { // Load index file path const filePath = path.resolve(__dirname, '..', 'build', 'index.html') // Read index file fs.readFile(filePath, 'utf8', (err, htmlData) => { if(err){ console.error('read err', err) return res.status(404).end() } const preloadedState = store.getState() // console.log("PreloadedState:", preloadedState) const context = preloadedState // console.log(context) // Note: Pass in serverRequest prop so the App knows the domain it's on for meta tags const markup = renderToString( <Provider store={store}> <StaticRouter location={req.url} context={context}> <App serverRequest={req} serverResponse={res} /> </StaticRouter> </Provider> ) const helmet = Helmet.renderStatic() // Somewhere a `<Redirect>` was rendered if(context.url){ console.log('Redirected:', context.url) redirect(301, context.url) // we're good, send the response }else{ // Page meta data const meta = helmet.title.toString() + helmet.meta.toString() + helmet.link.toString() // Prep state to be injected into DOM for client const pageState = `<script>window.__PRELOADED_STATE__ = ${JSON.stringify(preloadedState).replace(/</g, '\\u003c')}</script>` // Inject state and markup const RenderedApp = htmlData .replace('<script></script>', pageState) // Store state to pass to client .replace('<meta name="helmet">', meta) // Meta data .replace('{{SSR}}', markup) // Actual markup/component html console.log("SSR Rendered: ", req.path) res.send(RenderedApp) } }) }) .catch(err => { console.log("Error:", err) }) } I am console.log()-ing when a route is being handled within universalLoader(). All routes show in the console that stuff is happening. Except my homepage. It does not even show the "Loading..." message. A: express.static will be serving up any files in your build directory. If it finds the requested file it will serve it up and end the request/response. No middleware registered after express.static will get the chance to run if a suitable file is found. Based on this line: const filePath = path.resolve(__dirname, '..', 'build', 'index.html') it would appear that you have a file called index.html in your build directory. This will get served up by express.static when you hit the URL for index.html but it will also get served up if you just hit the / URL because express.static defaults to serving up index.html. See the index property here: https://expressjs.com/en/4x/api.html#express.static The directory you point express.static at needs to contain files that are static, i.e. that require no processing whatsoever. If any of the files need processing they need to live elsewhere. Note the parallels with how an Express app typically has a separate folder for views, which in many ways is similar to what you're trying to do. I would also suggest commenting out express.static to see what effect that has. It should be a quick way to confirm that express.static is responsible for stopping your index route being reached. Update Based on your comments it would seem that you do have a static directory at build/static that contains your JS and CSS files. You can serve this up directly using: app.use(express.static(path.resolve(__dirname, '..', 'build', 'static'))) However, this will cause all your URLs to change too, so http://localhost/static/js/example.js will now be http://localhost/js/example.js. To retain the original URLs you would need to put the static back in via the route path: app.use('/static', express.static(path.resolve(__dirname, '..', 'build', 'static')))
{ "pile_set_name": "StackExchange" }
# crc [![GitTip](http://img.shields.io/gittip/alexgorbatchev.svg?style=flat)](https://www.gittip.com/alexgorbatchev/) [![Dependency status](http://img.shields.io/david/alexgorbatchev/node-crc.svg?style=flat)](https://david-dm.org/alexgorbatchev/node-crc) [![devDependency Status](http://img.shields.io/david/dev/alexgorbatchev/node-crc.svg?style=flat)](https://david-dm.org/alexgorbatchev/node-crc?type=dev) [![Build Status](http://img.shields.io/travis/alexgorbatchev/node-crc.svg?style=flat&branch=master)](https://travis-ci.org/alexgorbatchev/node-crc) [![NPM](https://nodei.co/npm/crc.svg?style=flat)](https://npmjs.org/package/crc) Module for calculating Cyclic Redundancy Check (CRC) for Node.js and the Browser. # Important: Node >= 6.3.0 < 6.9.2 There's was a bug in Node [#9342](https://github.com/nodejs/node/issues/9342) that affected CRC calculation if `Buffer.split()` is used (see issue discussion for details). This affected all version starting from `6.3.0` up to but not including `6.9.2`. The patch [#9341](https://github.com/nodejs/node/pull/9341) was released in `6.9.2`. If you are upgrading and seeing odd CRC calculation mismatches, this might be the reason. ## Features * Full test suite comparing values against reference `pycrc` implementation. * Pure JavaScript implementation, no dependencies. * Provides CRC tables for optimized calculations. * Provides support for the following CRC algorithms: * CRC1 `crc.crc1(…)` * CRC8 `crc.crc8(…)` * CRC8 1-Wire `crc.crc81wire(…)` * CRC16 `crc.crc16(…)` * CRC16 CCITT `crc.crc16ccitt(…)` * CRC16 Modbus `crc.crc16modbus(…)` * CRC16 Kermit `crc.crc16kermit(…)` * CRC16 XModem `crc.crc16xmodem(…)` * CRC24 `crc.crc24(…)` * CRC32 `crc.crc32(…)` * CRCJAM `crc.crcjam(…)` ## Installation ``` npm install crc ``` ## Usage Calculate a CRC32: ```js const crc = require('crc'); crc.crc32('hello').toString(16); // "3610a686" ``` Calculate a CRC32 of a file: ```js crc.crc32(fs.readFileSync('README.md', 'utf8')).toString(16); // "127ad531" ``` Or using a `Buffer`: ```js crc.crc32(fs.readFileSync('README.md')).toString(16); // "127ad531" ``` Incrementally calculate a CRC32: ```js value = crc.crc32('one'); value = crc.crc32('two', value); value = crc.crc32('three', value); value.toString(16); // "9e1c092" ``` For web distribution, it's best to require specific modules that you need to avoid bundling unnecessary code. ```js const crc32 = require('crc/lib/crc32'); crc32('hello').toString(16); // "3610a686" ``` ## Running tests ``` npm test ``` ## Thanks! [pycrc](http://www.tty1.net/pycrc/) library is which the source of all of the CRC tables. # License The MIT License (MIT) Copyright (c) 2014 Alex Gorbatchev Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
{ "pile_set_name": "Github" }
Chromosome 6q24 transient neonatal diabetes mellitus and protein sensitive hyperinsulinaemic hypoglycaemia. We describe the novel clinical observation of protein induced hyperinsulinaemic hypoglycaemia following remission of transient neonatal diabetes mellitus (TNDM) in a patient with 6q24 methylation defect. A male infant of non-consanguineous Caucasian parents, born at 40 weeks of gestation with a birth weight of 3330 g (-0.55 standard deviation score) presented with hyperglycaemia in the first week of life and was diagnosed with 6q24 TNDM. At 22 months of age, he developed recurrent hypoglycaemic episodes. Controlled diagnostic fast, oral glucose tolerance test, protein loading test and mixed meal tolerance test were undertaken. Sequencing of ABCC8, KCNJ11, GLUD1 and HADH were performed. Investigations suggested a diagnosis of protein sensitive hyperinsulinaemic hypoglycaemia with normal serum ammonia, acylcarnitine profile and urine organic acids. Sequencing of ABCC8, KCNJ11, GLUD1 and HADH did not identify a pathogenic mutation to explain his hyperinsulinaemic hypoglycaemia. This clinical case demonstrates the novel observation of protein sensitive hyperinsulinaemic hypoglycaemia in a patient with 6q24 TNDM. Long-term follow-up of patients with chromosome 6q24 TNDM is warranted following remission.
{ "pile_set_name": "PubMed Abstracts" }