text
stringlengths 0
7.84M
| meta
dict |
---|---|
Importance of tumor size as a prognostic factor after partial liver resection for solitary hepatocellular carcinoma: Implications on the current AJCC staging system.
Presently, the impact of tumors size as a prognostic factor after curative liver resection (LR) for solitary hepatocellular carcinoma (HCC) remains controversial. This study was performed to determine the prognostic factors of patients undergoing LR for solitary HCC with special emphasis on the importance of tumor size. Between 2000 and 2013, 560 patients underwent curative LR for solitary primary HCC which met the study criteria. One-hundred and seventy-eight patients underwent major hepatectomies and the overall in-hospital mortality was 2.0%. There were 282 patients (50.4%) with liver cirrhosis. The 5-year overall survival (OS) was 64% and recurrence free survival (RFS) was 50%, respectively. Multivariate analyses demonstrated that cirrhosis, microvascular invasion and size were independent predictors of RFS and cirrhosis, microvascular invasion and age were independent prognostic factors of OS. Subset analysis demonstrated that tumor size was a prognostic factor for solitary HCC with microvascular invasion (AJCC T2) but not solitary HCC without microvascular invasion (AJCC T1). Size, microvascular invasion, and cirrhosis are independent prognostic factors of RFS for solitary HCC after LR. Tumor size is an important prognostic factor in T2 but not T1 solitary tumors. These findings suggest that the current AJCC TNM staging system may need to be revised. | {
"pile_set_name": "PubMed Abstracts"
} |
A Savannah woman was killed Thursday night when she lost control of the truck she was driving at a high rate of speed and crashed at Fort Argyle and John Carter roads.
Savannah-Chatham police report Joanne Marguerite Usher, 39, of an Armstrong Drive address died at the scene of the 6:22 p.m. crash in the western edge of Chatham County.
Police say she lost control of the black Dodge pickup she was driving west on Fort Argyle Road when it entered a curve, sending it into a ditch. It then hit an embankment and flipped end-over-end onto the shoulder of the road.
The Major Accident Investigation Team is continuing to investigate the accident.
Man pleads guilty to child molestation
A Savannah man on Tuesday pleaded guilty to statutory rape and child molestation charges in return for a 30-year prison sentence with five to serve and the remainder on probation.
Travis Antwan Sanders, 30, had been scheduled to stand trial Monday and, if convicted on all charges, faced a maximum sentence of life plus 50 years in prison, Assistant District Attorney Emily Puhala said.
He also faced an additional 12 months for giving police a false name and address, she said.
Under the negotiated plea with Assistant Public Defender John Rodman, prosecutors reduced the original rape charge to statutory rape and dismissed prosecution of a charge for enticing a child for indecent purposes.
Puhala told Walmsley the state’s recommendation results from difficulty in proving the rape charge and the “extremely detrimental” impact of the 13-year-old victim testifying.
According to Puhala, the crimes occurred on June 24, 2010. The victim gave three different statements involving the facts in the case, the final one identifying Sanders as her abductor.
Hinesville man gets 15 years for robbery
A Hinesvillle man on Tuesday pleaded guilty to robbery and related charges in connection with a 2010 robbery of Savannah State University students.
Steven Lamont Carter Jr., 23, was sentenced to 15 years in prison with 10 to serve and the remainder on probation under a negotiated plea before Chatham County Superior Court Judge Timothy R. Walmsley.
In addition, Carter must pay a $500 fine and perform 250 hours of community service, Walmsley ruled.
Had Carter gone to trial as scheduled Feb. 11 and been convicted on all counts, he faced a maximum sentence of two life prison terms plus 45 years, Assistant District Attorney Ann Elmore told Walmsley.
Prosecutors were prepared to present evidence that Carter and a second Hinesville man, Barry Jerome Drummond Jr., 23, went to an off-campus apartment April 26, 2010, where they robbed two students of two laptop computers.
The computers were returned after the victims paid a $100 ransom demand, Elmore said.
Also Tuesday, Drummond pleaded guilty before Walmsley to a reduced charge of robbery in return for a 20–year term with seven to serve and the remainder on probation. | {
"pile_set_name": "Pile-CC"
} |
Mahalo for supporting Honolulu Star-Advertiser. Enjoy this free story!
Katherine Kealoha, the former deputy prosecutor- turned-convicted-felon, has been moved out of a segregated cell into the general population at the Federal Detention Center, where she has her Bible and rosary beads but still has not seen her husband, former Honolulu Police Chief Louis Kealoha. Read more
Katherine Kealoha, the former deputy prosecutor- turned-convicted-felon, has been moved out of a segregated cell into the general population at the Federal Detention Center, where she has her Bible and rosary beads but still has not seen her husband, former Honolulu Police Chief Louis Kealoha.
“She was segregated as an ex-prosecutor but she only tried state cases, not federal ones,” said her attorney, Earle Partington, who visited her Tuesday at the facility located near the Daniel K. Inouye International Airport and expects to return Saturday.
“She doesn’t feel any threat at all,” Partington said. “She’s pleased to be in general population and the women have been nice to her. I’m surprised at how upbeat she is.”
Kealoha, 48, requested that she be moved into general population and is planning to ask that her husband be allowed to visit her, Partington said.
“Louie’s forbidden to meet her because he’s a co-defendant,” Partington said. “Kat’s requesting an exception because they’re married.”
A federal jury last week convicted the Kealohas, Honolulu Police Department officer Minh-Hung “Bobby” Nguyen and Lt. Derek Wayne Hahn of four felony counts each of conspiracy and three felony counts each of obstruction. They face a maximum sentence of 20 years in prison for the obstruction convictions and up to five years for the conspiracy convictions.
Only Katherine Kealoha was ordered into custody after a federal prosecutor called her “a walking crime spree.”
U.S. District Court Chief Judge J. Michael Seabright ordered her held until her scheduled sentencing in October, saying at a bond hearing that he had “no doubt about Ms. Kealoha’s attempt to obstruct justice. She made a determined and consistent effort to have an innocent man incarcerated.”
On Wednesday, the Hawaii Supreme Court suspended Kealoha from practicing law in Hawaii effective immediately, in response to a petition by the Office of Disciplinary Counsel. She graduated from the University of Hawaii William S. Richardson School of Law and was admitted to the Hawaii bar in 1996.
In a two-page ruling, the court noted the crimes spelled out in the indictments against Kealoha involved acts of “dishonesty” and that she was convicted of multiple felonies.
The Supreme Court’s Disciplinary Board will hold formal disciplinary proceedings once her sentencing and any appeals are final, according to the court’s order.
The Kealohas used their positions to stage the theft of a mailbox at their Kahala home in order to frame Katherine Kealoha’s estranged uncle in an effort to cover up stealing thousands of dollars from her grandmother.
She is facing two additional trials: one for bank fraud, aggravated identity theft and obstruction of an official proceeding in connection with a home mortgage loan application; and another for conspiracy to distribute and dispense oxycodone and fentanyl, along with other drug-related charges.
Earlier this week, her court-appointed attorney, Cynthia Kagiwada, filed a motion in U.S. District Court to be removed from the case.
In her motion, Kagiwada cited “an irretrievable breakdown in the attorney-client relationship, which cannot be reconciled.”
A hearing on Kagiwada’s motion to be removed from the case is scheduled for July 11.
In the meantime, Partington said he has been ferrying messages to Kealoha from her mother in Colorado.
The mother, who is paying Partington’s legal bills, has been inquiring about “motherly stuff,” Partington said. “Her mother gave me all sorts of messages. She’s a Roman Catholic and wanted to make sure Katherine has her own Bible and rosary. … She does.”
Partington is also working to arrange cancer treatments for Kealoha.
She had a malignant tumor partially removed from her neck but some of it is still attached to her spine, Partington said.
“She does have cancer,” he said. “It’s not life-threatening.” | {
"pile_set_name": "OpenWebText2"
} |
1938: The First Coup Attempt
The September Conspiracy
Contrary to popular opinion, the coup of 20 July 1944 was not the first attempt by Germans to bring down the Nazi regime. The first conspiracy against the Hitler and his criminally aggressive policies pre-dated the out-break of the Second World War. Furthermore, it was arguably the conspiracy with the greatest objective chances of success. It was headed by the Chief of the German General Staff at the time, Franz Halder, and supported by many senior army generals including the later Field Marshal Erwin v. Witzleben and General Carl-Heinrich von Stülpnagel. The intellectual and moral guidance of this first conspiracy came, however, from the same man who would inspire and mentor all the latter coup attempts against Hitler: Generaloberst Ludwig Beck.
Beck had succeeded General Adam as Chief of the General Staff on 1 October 1933. At the time of his appointment, he still hoped that Hitler's government would be a positive force for change, restoring Germany to its place as a European Great Power with an army commensurate to its legitimate defensive needs. Beck supported the policies of the Nazi government to dismantle the repressive measures of the Versailles Treaty, but at no time did he share Hitler's aggressive goals. Beck firmly believed that any attempt to obtain territory by force would lead to a two front war, which Germany would inevitably lose. Beck, furthermore, was horrified by the methods employed by the Nazis to suppress opposition domestically. Yet despite increasing unease over Hitler's domestic and international policies, Beck's crisis of conscience did not come until 1938.
In March 1938, Beck was given orders to prepare the invasion of Hitler's homeland, Austria. Beck believed that the Austrian army would offer resistance. Although there was little doubt that the German Army would win this war with Austria, Beck was appalled by the idea of Germans killing other ethnic Germans. Beck therefore initially refused to prepare the invasion, but he capitulated when told that if he did not, the task of invading Austria would be turned over to the Nazi paramilitary organisation, the Sturmabteilung, or SA. In the event, the German army was met not with resistance but with flowers and swooning maidens – a spectacular success for Adolf Hitler.
Beck, however, was not taken in by the success, and when only a few months later Hilter announced his intention to seize the ethnically German parts of Czechoslovakia, Beck immediately started protesting. Strange as it may seem today, as Chief of the German General Staff Beck did not have direct access to Hitler. His only means of protesting the proposed military action (which he would be expected to prepare and plan) was to write memorandum to the Commander-in-Chief of the German Army, General von Brauchitsch, in which he drew attention to the risks associated with the proposed operation. When staff exercises suggested that the German Wehrmacht might indeed be able to crush the resistance of the Czech armed forces in just five days, Beck's protests only became more passionate. Beck was not opposed to the tactics or timing of such an invasion: he opposed the very act of aggression against a sovereign state.
When by mid-July 1938, Beck despaired of convincing Hitler to change his mind, he appealed to the conscience of his fellow generals. In a memo dated 16 July 1938 Beck wrote:
The very existence of the nation is at stake. History will attribute a blood-guilt to leaders that do not act in accordance with their professional expertise and political conscience. Your military duty to obey [orders] ends where your knowledge, your conscience and your responsibility forbids the execution of an order. If in such a situation, your advice and warnings are ignored, then it is your right and your duty before the Nation and History to resign from your positions. What Beck hoped was that the commanding generals of the German Army could be moved to resign in a collective, simultaneous gesture. This, he hoped, would prevent Hitler from pursuing his aggressive plans. Beck did not believe that Hitler would back down in the face of this collective refusal to engage in an aggressive war. On the contrary, he expected a domestic confrontation between the Army and the Nazis, including the SA and SS. Beck's aim was not merely to stop the aggressive war planned by Hitler, but rather to bring down the entire Nazi regime. He urged the Commander-in-Chief of the Army to use the inevitable confrontation "to restore the rule of law" in Germany. Beck even recommended the slogans the Army should use to explain their actions to the population. Significantly, he suggested not just "Stop the War!" but also "Peace with the Church!" "Free Expression of Opinion!" and "Down with the Secret Police!"
Not all of Germany's generals shared Beck's abhorrence of the Nazis and their polices, however, and so not all were willing to risk a confrontation. In the absence of unanimity among the Army's leadership, Beck could not hope to win a confrontation with the Nazis, but he was still not willing to accept the "blood guilt" of acting against his better judgement and his conscience. He resigned.
While not all generals in the Army supported Beck, by no means did all oppose him. Generals von Witzleben and von Stülpnagel, supported by Hans Oster in the Counter Intelligence Agency, were just as opposed to the Nazis as Beck. These men, under the leadership of Beck's immediate successor, Franz Halder, chose to pursue Beck's goal of bringing down the Nazi regime by employing conspiratorial – rather than confrontational – means. The first loose ties were established to civilian leaders equally outraged by the Nazis, and a plan was forged to arrest Hitler and try him either as a traitor or have him committed to a mental institution.
The entire action, which included detailed orders down to divisional level for the seizure of key installations and the effective disarming of the Nazi paramilitary organisations, was to be triggered by orders to invade Czechoslovakia. The reasoning was simple. The German people were terrified of a new world war. They had suffered bitterly in the First World War and they adored Hitler because he had reversed many of the humiliations of the defeat suffered in 1918 without war. The leaders of this military conspiracy firmly believed that if the German people saw Hitler was risking a new world war merely for the sake of annexing the ethnically German portions of Czechoslovakia, than they would stop supporting him.
Unfortunately, the French and the British had also suffered bitterly in the "Great War" and despite being the victors they were reluctant to risk a new war. So at the last moment, the British and French caved in. They allowed themselves to be talked into a "peace conference" with Hitler and signed away the territorial integrity of a sovereign state (Czechoslovakia) they had helped create in 1919 and guaranteed. They accepted Hitler's word that the Sudetenland was his "last" territorial ambition, and called the agreement "Peace in our Time." So the German Wehrmacht marched triumphantly into the Sudetenland without a shot being fired. Under the circumstances it was impossible to arrest the successful dictator on the grounds that he was mad. The coup with the best chances of success did not take place, and the conspirators went their separate ways. Contrary to popular opinion, the coup of 20 July 1944 was not the first attempt by Germans to bring down the Nazi regime. The first conspiracy against the Hitler and his criminally aggressive policies pre-dated the out-break of the Second World War. Furthermore, it was arguably the conspiracy with the greatest objective chances of success. It was headed by the Chief of the German General Staff at the time, Franz Halder, and supported by many senior army generals including the later Field Marshal Erwin v. Witzleben and General Carl-Heinrich von Stülpnagel. The intellectual and moral guidance of this first conspiracy came, however, from the same man who would inspire and mentor all the latter coup attempts against Hitler: Generaloberst Ludwig Beck.Beck had succeeded General Adam as Chief of the General Staff on 1 October 1933. At the time of his appointment, he still hoped that Hitler's government would be a positive force for change, restoring Germany to its place as a European Great Power with an army commensurate to its legitimate defensive needs. Beck supported the policies of the Nazi government to dismantle the repressive measures of the Versailles Treaty, but at no time did he share Hitler's aggressive goals. Beck firmly believed that any attempt to obtain territory by force would lead to a two front war, which Germany would inevitably lose. Beck, furthermore, was horrified by the methods employed by the Nazis to suppress opposition domestically. Yet despite increasing unease over Hitler's domestic and international policies, Beck's crisis of conscience did not come until 1938.In March 1938, Beck was given orders to prepare the invasion of Hitler's homeland, Austria. Beck believed that the Austrian army would offer resistance. Although there was little doubt that the German Army would win this war with Austria, Beck was appalled by the idea of Germans killing other ethnic Germans. Beck therefore initially refused to prepare the invasion, but he capitulated when told that if he did not, the task of invading Austria would be turned over to the Nazi paramilitary organisation, the Sturmabteilung, or SA. In the event, the German army was met not with resistance but with flowers and swooning maidens – a spectacular success for Adolf Hitler.Beck, however, was not taken in by the success, and when only a few months later Hilter announced his intention to seize the ethnically German parts of Czechoslovakia, Beck immediately started protesting. Strange as it may seem today, as Chief of the German General Staff Beck did not have direct access to Hitler. His only means of protesting the proposed military action (which he would be expected to prepare and plan) was to write memorandum to the Commander-in-Chief of the German Army, General von Brauchitsch, in which he drew attention to the risks associated with the proposed operation. When staff exercises suggested that the German Wehrmacht might indeed be able to crush the resistance of the Czech armed forces in just five days, Beck's protests only became more passionate. Beck was not opposed to the tactics or timing of such an invasion: he opposed the very act of aggression against a sovereign state.When by mid-July 1938, Beck despaired of convincing Hitler to change his mind, he appealed to the conscience of his fellow generals. In a memo dated 16 July 1938 Beck wrote:What Beck hoped was that the commanding generals of the German Army could be moved to resign in a collective, simultaneous gesture. This, he hoped, would prevent Hitler from pursuing his aggressive plans. Beck did not believe that Hitler would back down in the face of this collective refusal to engage in an aggressive war. On the contrary, he expected a domestic confrontation between the Army and the Nazis, including the SA and SS. Beck's aim was not merely to stop the aggressive war planned by Hitler, but rather to bring down the entire Nazi regime. He urged the Commander-in-Chief of the Army to use the inevitable confrontation "to restore the rule of law" in Germany. Beck even recommended the slogans the Army should use to explain their actions to the population. Significantly, he suggested not just "Stop the War!" but also "Peace with the Church!" "Free Expression of Opinion!" and "Down with the Secret Police!"Not all of Germany's generals shared Beck's abhorrence of the Nazis and their polices, however, and so not all were willing to risk a confrontation. In the absence of unanimity among the Army's leadership, Beck could not hope to win a confrontation with the Nazis, but he was still not willing to accept the "blood guilt" of acting against his better judgement and his conscience. He resigned.While not all generals in the Army supported Beck, by no means did all oppose him. Generals von Witzleben and von Stülpnagel, supported by Hans Oster in the Counter Intelligence Agency, were just as opposed to the Nazis as Beck. These men, under the leadership of Beck's immediate successor, Franz Halder, chose to pursue Beck's goal of bringing down the Nazi regime by employing conspiratorial – rather than confrontational – means. The first loose ties were established to civilian leaders equally outraged by the Nazis, and a plan was forged to arrest Hitler and try him either as a traitor or have him committed to a mental institution.The entire action, which included detailed orders down to divisional level for the seizure of key installations and the effective disarming of the Nazi paramilitary organisations, was to be triggered by orders to invade Czechoslovakia. The reasoning was simple. The German people were terrified of a new world war. They had suffered bitterly in the First World War and they adored Hitler because he had reversed many of the humiliations of the defeat suffered in 1918 without war. The leaders of this military conspiracy firmly believed that if the German people saw Hitler was risking a new world war merely for the sake of annexing the ethnically German portions of Czechoslovakia, than they would stop supporting him.Unfortunately, the French and the British had also suffered bitterly in the "Great War" and despite being the victors they were reluctant to risk a new war. So at the last moment, the British and French caved in. They allowed themselves to be talked into a "peace conference" with Hitler and signed away the territorial integrity of a sovereign state (Czechoslovakia) they had helped create in 1919 and guaranteed. They accepted Hitler's word that the Sudetenland was his "last" territorial ambition, and called the agreement "Peace in our Time." So the German Wehrmacht marched triumphantly into the Sudetenland without a shot being fired. Under the circumstances it was impossible to arrest the successful dictator on the grounds that he was mad. The coup with the best chances of success did not take place, and the conspirators went their separate ways.
BACK NEXT
ONLINE TRANSLATOR AND DICTIONARY
PRIVACY I COPYRIGHT I CITING I SITE MAP
If you would like to use the material of this site, please contact
If you experience any problems with this site, please contact the Contents of this web site are copyrighted. ©1993-2012 Helena P. Schrader unless otherwise noted.If you would like to use the material of this site, please contact Helena Schrader If you experience any problems with this site, please contact the web mistress
| {
"pile_set_name": "OpenWebText2"
} |
IN THE DISTRICT COURT OF APPEAL
FIRST DISTRICT, STATE OF FLORIDA
FLO-RONKE INC D/B/A NOT FINAL UNTIL TIME EXPIRES TO
AMAZING GRACE ASSISTED FILE MOTION FOR REHEARING AND
LIVING FACILITY, DISPOSITION THEREOF IF FILED
Appellant, CASE NO. 1D15-2063
v.
STATE OF FLORIDA,
AGENCY FOR HEALTH CARE
ADMINISTRATION,
Appellee.
_____________________________/
Opinion filed June 1, 2015.
An appeal from an order of the State of Florida, Division of Administrative
Hearings.
John D.C. Newton, II, Administrative Law Judge.
Rawsi Williams, Miami, for Appellant.
Tracy L. George, Chief Appellate Counsel, and Cynthia L. Hain, Assistant General
Counsel, Tallahassee, for Appellee.
PER CURIAM.
DISMISSED.
RAY, SWANSON, and MAKAR, JJ., CONCUR.
| {
"pile_set_name": "FreeLaw"
} |
Airlines currently have resources available to collect data and calculate flight trajectory amendments for an aircraft. However, such calculations can involve a significant amount of computational and human resources. This can take away valuable resources that can be allocated to more critical tasks associated with the operation of an aircraft fleet. Moreover, some smaller airlines may not have the same level of access to certain data sources as other, larger airlines. As such, the ability for smaller airlines to calculate advantageous trajectory amendments may be limited. | {
"pile_set_name": "USPTO Backgrounds"
} |
INTERVIEW: Resources for Families of those with Alzheimer's
Alzheimer’s disease affects one out of nine people over the age of 65, and the rate of diagnosis is rapidly increasing.
Health officials estimate there will be 88,000 people living with Alzheimer’s this year in Minnesota.
Cory Wiskow from the Wealshire of Bloomington joined 5 EYEWITNESS News on Thursday to talk about the growing number of people diagnosed with the disease and where families can go for resources and more information. | {
"pile_set_name": "Pile-CC"
} |
Q:
Is it bad practice in Go to json.Decode a json object to an empty interface?
I have a fairly large nested JSON object I want to decode. I could decode this to a well defined nested struct, but an alternate solution I've seen is to just decode it to an empty interface.
Functionally, this works fine. But I'm wondering if behind the scenes I'm incurring a performance penalty (reflecting) when I decode the object from JSON and again when I later marshal it to JSON.
Thoughts? Thanks in advance.
Code:
CustomizationData interface{} `json:"customizationData" datastore:"-"`
vs.
CustomizationData struct {
Items []struct {
ID string `json:"id"`
Images []struct {
CustomizationState struct {
Areas []struct {
Height float64 `json:"height"`
ID string `json:"id"`
Left float64 `json:"left"`
Parent struct {
Height float64 `json:"height"`
Left float64 `json:"left"`
Top float64 `json:"top"`
Width float64 `json:"width"`
} `json:"parent"`
Rotation float64 `json:"rotation"`
Text string `json:"text"`
Top float64 `json:"top"`
URL string `json:"url"`
Width float64 `json:"width"`
} `json:"areas"`
BackgroundColor string `json:"backgroundColor"`
IsUserSet bool `json:"isUserSet"`
Orientation float64 `json:"orientation"`
} `json:"customizationState"`
SpaceId string `json:"spaceId"`
} `json:"images"`
ProductId float64 `json:"productId"`
Quantity float64 `json:"quantity"`
Sku string `json:"sku"`
TemplateName string `json:"templateName"`
} `json:"items"`
ShippingAddress struct {
City string `json:"city"`
CountryCode string `json:"countryCode"`
Email string `json:"email"`
FirstName string `json:"firstName"`
LastName string `json:"lastName"`
Line1 string `json:"line1"`
Phone string `json:"phone"`
PostalCode string `json:"postalCode"`
State string `json:"state"`
} `json:"shippingAddress"`
TimeStamp string `json:"timeStamp"`
} `json:"customizationData" datastore:"-"
And potentially more.
A:
It depends entirely on what you intend on doing with the Unmarshalled data.
If you have nested objects / arrays in your json data, then you will end up with nested interfaces. That means you need to explicitly convert your interfaces to the correct type to access their data. In that case you are far better off using the struct in the second example as you will have your data more easily accessible as in myData.Items[0].CustomizationState.Areas[0].Height. Doing that with nested interface conversion is going to be a pain.
On the other hand, if you are just outputting this data, for example as a response to a webservice call, then you don't need to know the structure and can just spit it back out.
Personally, I always use the latter.
I assume you are using the awesome service at http://mervine.net/json2struct to convert your json into usable Go structs.
Here is a link showing the difference in ease of access between the two methods.
http://play.golang.org/p/OlJJPZcxT7
And for those who want to stay in-page:
var dataz = `{"foo": ["bar", "baz"], "boff": {"foo": "bar", "baz": "boff"}}`
type Dataz struct {
Foo []string `json:"foo"`
Boff struct {
Foo string `json:"foo"`
Baz string `json:"baz"`
} `json:"boff"`
}
func main() {
// Method 1
var d interface{}
json.Unmarshal([]byte(dataz), &d)
fmt.Println(d.(map[string]interface{})["foo"].([]interface{})[0])
// Method 2
var D Dataz
json.Unmarshal([]byte(dataz), &D)
fmt.Println(D.Foo[0])
}
EDIT
Edit based on comment about performance
Thankfully we can test it with built-in Go tools
> go test -bench .
testing: warning: no tests to run
PASS
BenchmarkInterface 300000 6208 ns/op
BenchmarkStruct 500000 3622 ns/op
ok parse 3.773s
It's the difference between handling unmarshalling of 276,000/sec or 161,000/sec. So this will almost certainly not be your bottleneck. :)
| {
"pile_set_name": "StackExchange"
} |
The Mere Presence of One’s Own Smartphone Reduces Available Cognitive Capacity - whocanfly
http://www.journals.uchicago.edu/doi/full/10.1086/691462
======
anonu
I think we saw this on HN a few months back. Can't find the prior discussion.
EDIT - Did a bit more searching:
[https://news.ycombinator.com/item?id=14639967](https://news.ycombinator.com/item?id=14639967)
~~~
Phemist
This article grabbed my attention the last time it was posted. The original
research is severely flawed - see my post
[https://news.ycombinator.com/item?id=14645120](https://news.ycombinator.com/item?id=14645120)
I was a bit late to the party last time, but hopefully some of the
speculations that happened last time can be nipped in the bud this time
around.
------
closed
Interesting article! I worked with complex span tasks in grad school, and just
had people silence their phones :(.
I wonder how many reaches participants made toward their phones when they were
in their desk or pocket (even if they were off) ..
| {
"pile_set_name": "HackerNews"
} |
Over the past several years, various studies have been conducted to measure the levels of toxic and related air pollutants in many different geographical areas. For example, a number of investigations have been made to measure ambient concentrations of HNO.sub.3, SO.sub.2, nitrates and sulfates which contribute to acidic deposition and acid rain phenomena in the environment. In order to increase the accuracy of these types of measurements, more precise sampling and analysis apparatus and procedures have been developed for measuring ambient concentrations of the aforementioned chemicals. For example, filter packs consisting of an inert filter followed by a treated filter have been developed to provide apparently reliable data for measuring sulfates and SO.sub.2.
However, measurement of HNO.sub.3 and nitrate compounds has proven to be very difficult owing to losses of HNO.sub.3 in the sampling systems, for example, in the inlet portions of the sampling apparatus, and owing to the difficulty in differentiating vapor phase HNO.sub.3 from HNO.sub.3 produced from the dissociation of NH.sub.4 NO.sub.3 during sampling procedures. The use of one or more annular denuders connected in series has been proposed by Possanzini et al, Atmos. Environ., 17, 2605 (1983), for sampling ambient concentrations of HNO.sub.3. The denuders are treated with chemicals such as sodium carbonate and citric acid so that most of the gaseous acids and bases can be absorbed onto the denuders. This allows the particles to pass through the denuders without undergoing chemical transformations or being deposited on the denuder surfaces by diffusion. However, it appears that the presence of larger particles in a sample effects the efficiency of the denuders owing to the difficulty in sampling and quantifying the larger particle fraction, particle re-entrainment and volatilization of large particle chemical components. Accordingly, there is a need for a means which separates larger size particles from the sample while retaining smaller size particles and gaseous components of the sample. | {
"pile_set_name": "USPTO Backgrounds"
} |
Q:
how to make validation using ajax Laravel 5.3
I am using Laravel 5. In my OrganisationsController I have a method addItem
public function addItem(Request $request)
{
$rules = array(
'nom' => 'required',
);
// for Validator
$validator = Validator::make(Input::all(), $rules);
if ($validator->fails())
return Response::json(array('errors' => $validator->getMessageBag()->toArray()));
else {
$section = new Section();
$section->nom = $request->nom;
$section->save();
return response()->json($section);
}
}
Ajax code
$("#add").click(function() {
$.ajax({
type: 'post',
url: '/addItem',
data: {
'_token': $('input[name=_token]').val(),
'nom': $('input[name=nom]').val()
},
success: function(data) {
if ((data.errors)) {
$('.error').removeClass('hidden');
$('.error').text(data.errors.title);
$('.error').text(data.errors.description);
} else {
$('.error').remove()
$('table').append("<tr class='section" + data.id + "'><td>" + data.id + "</td><td>" + data.nom + "</td><td><button class='edit-modal btn btn-info' data-id='" + data.id + "' data-nom='" + data.nom + "'><span class='glyphicon glyphicon-edit'></span> Edit</button> <button class='delete-modal btn btn-danger' data-id='" + data.id + "' data-nom='" + data.nom + "'><span class='glyphicon glyphicon-trash'></span> Delete</button></td></tr>"); }
}
});
$('#noom').val('');
});
html code
<div class="form-group row add">
<div class="col-md-5">
<input type="text" class="form-control " id="noom" name="nom"
placeholder="New section here" required>
<p class="error text-center alert alert-danger hidden"></p>
</div>
<div class="col-md-2">
<button class="btn btn-warning" type="submit" id="add">
<span class="glyphicon glyphicon-plus"></span> Add new Section
</button>
</div>
</div>
I don't know why my validation not work. Please suggest a example for this. I am using laravel 5. I have searched so many sites. But I cannot get solution for this.
A:
If your validations fails it will return with a status code (error code) of 422.
In your $.ajax you're only using success which won't be called if your validation fails.
You will need to add an error method to your ajax options. Using your above code you would have something like:
success: function (data) {
$('.error').remove()
$('table').append("<tr class='section" + data.id + "'><td>" + data.id + "</td><td>" + data.nom + "</td><td><button class='edit-modal btn btn-info' data-id='" + data.id + "' data-nom='" + data.nom + "'><span class='glyphicon glyphicon-edit'></span> Edit</button> <button class='delete-modal btn btn-danger' data-id='" + data.id + "' data-nom='" + data.nom + "'><span class='glyphicon glyphicon-trash'></span> Delete</button></td></tr>");
},
error: function (data) {
if (data.errors) {
$('.error').removeClass('hidden');
$('.error').text(data.errors.title);
$('.error').text(data.errors.description);
}
}
Hope this helps!
| {
"pile_set_name": "StackExchange"
} |
Mike Tomkies
Mike Tomkies (25 May 1928 – 6 October 2016), known as The Wilderness Man, was a British author covering subjects such as natural history, biography and fiction, a naturalist and filmmaker who has inspired thousands with his brutally honest accounts of almost 40 years experience living in the wildest and most remote parts of Canada, Scotland and Spain.
He originally came to public attention as a Hollywood journalist, reporting for the London Times, where he interviewed and pulled scoops on various film stars.
Biography
Born in 1928 in West Bridgeford, Notts, Mike Tomkies grew up with his family in Whitley Bay near Newcastle, later moving south to Worthing and then Henfield near Brighton. Protected and driven by his father Vincent after losing his mother, who died during childbirth with his sister, Mike developed his fascination with nature and adventure in the English countryside that surrounded him.
An early example of his wanderlust was an attempt to sail around the world in 1952, which ended with him being shipwrecked and having to walk from Lisbon to Madrid.
He served with the Coldstream Guards in the Middle East and at Buckingham Palace, but moved on to become a successful Fleet Street journalist, later freelancing in Paris, Madrid and Rome before being assigned as a Hollywood columnist until the age of 38 when he decided to get away from it all and emigrated to the Canadian wilds.
Starting a new life in British Columbia, he set out virtually penniless in an old milk truck driving across Canada to build a log cabin on the Canadian Pacific coast where he variously worked as a logger, assistant blaster and sea salmon fisherman but spent most of his time living alone and surviving mainly off the sea. This was where he began his wildlife studies tracking grizzly bears, cougars, caribou, bald eagles and killer whales, which over three years developed into the book Alone in the Wilderness, which was snapped up by Reader's Digest and became a critically acclaimed best seller.
Running short on funds, Tomkies returned to writing in Hollywood, accompanied by Booto, a stray wild dog who had adopted him in Canada and who enjoyed the attention of stars such as Cary Grant, Omar Sharif and Peter Finch during interviews.
The two also travelled around Mexico and Belize, where Tomkies spent hours with Dean Martin on the outdoor location of 5 Card Stud, even photographing the star doing his own dangerous stunts. Tomkies was the first to test the new Tartan Athletics Track built in Mexico City for the 1968 Olympics while writing for the Daily Express and, with Booto, climbed the Pyramid of the Sun, hacked through rough tracks to the ancient ruins of Palenque, and visited the terrifying Well of Sacrifice at Chichen Itza where the ancient Mayans sacrificed young humans to assuage the rain god Chac.
Back in Hollywood, Mike was invited to the Oscar awards ceremony where, even in his old truck, he was mistaken for Warren Beatty with compere Bob Hope joking that Beatty was so confident of winnings Oscars for Bonnie and Clyde he had brought a big truck to take them all away.
He returned briefly to Canada and hired North America's greatest Red Indian guide, Clayton Mack, and they went on dangerous treks deep in grizzly country, saw 21 bears in three days and were lucky to escape with their lives.
After another year in the wilds of Canada, Tomkies bid a very sad farewell to old Booto and returned to Hollywood for more amazing experiences with major film stars. He went motorbiking in the Mojave Desert with Steve McQueen; spent days with and gained extraordinary insights into the life of the greatest box office star of all time, John Wayne; while Doris Day, 'America's sweetheart', offered him a screen test. Tomkies had several feisty meetings with Hollywood's greatest maverick and wit, Robert Mitchum, who actually 'laid a joint' on him when he asked if Mitchum was still smoking pot.
However, the wild kept calling, and eventually Tomkies returned to the UK and moved to Eilean Shona, a remote island off the west coast of Scotland. There he rebuilt a wooden crofthouse which had been used as a shelter for sheep and began observing and writing about Scottish nature including golden eagle, black throated diver, pine marten and Scottish wildcat.
The studies and writing continued at a small crofter's cottage called Gaskan on the shore of Loch Shiel, which Tomkies renamed "Wildernesse", and where he cared for a variety of injured animals, tracked and studied golden eagles over a area for the government and was the first person to successfully breed the now critically endangered Scottish wildcat and return individuals to the wild. It was here he wrote nine books about the wildlife in the Scottish West Highlands.
Tomkies studied eagles in Canada, Scotland and Spain for 44 years in total (1967 to 2011) spending more than 3000 hours on precarious cliff ledges in his home made "invisible" hides for up to 38 hours at a time. Over his 20 years in the Highlands Tomkies revealed Scotland's rarest wildlife in his books to widespread acclaim from naturalists, conservationists, critics and even the Duke of Edinburgh;
"This book does more than describe a piece of wild country and its population of wild animals: it gives a picture of someone totally absorbed by his subject... The North west of Scotland is indeed a wild place, but to the observant eye of the author it is full of wonderful life."
"A Last Wild Place" is the most famous of his books written about Wildernesse, it has been a best seller ever since it was first published in 1984. For eight years, Tomkies' only companion was his german shepherd dog Moobli, who assisted him in his wildlife tracking. After Moobli died Tomkies spent the next four years alone, completing his studies of golden eagles and rare Scottish species. He then spent five years in mountain ranges throughout Spain making two films and writing a book about species including brown bear, lynx, wolf, wild boar, vultures and eagles working out of a crumbling old villa with no glass in the windows or running water.
A keen interest in film making also developed throughout the experiences in Scotland and Spain, beginning with mountainous slogs carrying of 16mm camera equipment, all the way up to modern miniDV cameras. Tomkies recorded twelve feature-length films on wildlife with a focus on Scotland and the golden eagle. Three network TV programmes were made about his life and work in the wilds, the last of which "Wild Cathedral" was repeated seven times.
In 1988 he was recognised for his work by being elected an Honorary Fellow of the Royal Zoological Society of Scotland.
Latterly Mike Tomkies was based in an Elizabethan Farmstead in Henfield, England still writing his books and always observing the world that surrounded him. He appeared in the documentary film Last of the Scottish Wildcats (Coffee Films 2006) and became the patron for a new charity, the Scottish Wildcat Association in 2009, who also recognised his achievements naming him an Honorary Member of the Association for life. He continued to travel regularly into the Scottish Highlands spending his 83rd birthday filming nesting eagles in Galloway with an RSPB team, and in 2014, having said his first fictional work, "Let Ape and Tiger Die", would be his last novel, he released a new wildlife book, "Running Wild", through publishers Whittles, bringing his life experiences in the wild up to date.
He died aged 88 on 6 October 2016.
Bibliography
The Big Man : the John Wayne Story, Barker (1971)
It Sure Beats Working: The Robert Mitchum Story, W. H. Allen (1972)
A World of My Own: Adventure and Personal Renewal in the Wilderness, Reader's Digest Press and Fitzhenry & Whiteside, (Toronto, 1976) ; republished as:
Alone in the Wilderness Macdonald and Jane's (1977)
Alone in the Wilderness Whittles (2001)
My Wilderness Wildcats, Macdonald and Jane's (1977)
Liane: A Cat from the Wild, Macdonald and Jane's (1979)
Between Earth and Paradise, Heinemann (1981)
Between Earth and Paradise, Jonathan Cape (1991) (revised edition)
Between Earth and Paradise, Whittles Publishing (latest edition)
Golden Eagle Years, Heinemann (1982)
Golden Eagle Years, Jonathan Cape (1994)
A Last Wild Place, Jonathan Cape (1984)
Out of the Wild, Jonathan Cape, (1985)
Wildcat Haven, Jonathan Cape, (1987)
On Wing and Wild Water, Jonathan Cape (1987)
Moobli, Jonathan Cape (1988),
In Spain's Secret Wilderness, Jonathan Cape (1989)
Wildcats (with illustrations by Dennis Ovenden), Whittet Books (1991)
Last Wild Years, Jonathan Cape (1992)
My Wicked First Life - Before the Wilderness, Whittles Publishing (2006)
Rare, Wild and Free , Whittles Publishing (2007)
Backwoods Mates to Hollywood Greats, Whittles Publishing (2009)
Wildcat Haven, Whittles Publishing (2009) (revised and updated)
Let Ape and Tiger Die (a novel), Whittles Publishing (2010) ISBN TBC
Running Wild, Whittles Publishing (2014)
References
Category:1928 births
Category:2016 deaths
Category:British writers
Category:British biographers | {
"pile_set_name": "Wikipedia (en)"
} |
Q:
Why isn't the composition equal to the product?
Let $G_1, G_2, H$ be three isomorph graphs. We are given the permutation $\phi:G_1\rightarrow G_2$ with $\phi=(1,2,4,3)$ and the permutation $\psi:G_2\rightarrow H$ with $\psi =(1,2)$.
In my book there is the following: $$\psi \circ\phi =\phi \cdot \psi :G_1\rightarrow H$$
in order to compute a permuation of $G_1$ to get $H$.
Isn't the composition the same as the product of permutations? Why are the permutations revesed at the product above?
A:
There are two different conventions: the product of permutations can be defined either as composition or as composition in the reverse order. With the second convention, $(1\ 2)\cdot (1\ 2\ 4\ 3)$ means the permuation that is obtained by first doing $(1\ 2)$ and then doing $(1\ 2\ 4\ 3)$ (note that this is the opposite order of usual function composition!). This is presumably the convention your book uses.
| {
"pile_set_name": "StackExchange"
} |
var $export = require('./_export');
// 19.1.2.4 / 15.2.3.6 Object.defineProperty(O, P, Attributes)
$export($export.S + $export.F * !require('./_descriptors'), 'Object', {defineProperty: require('./_object-dp').f}); | {
"pile_set_name": "Github"
} |
Q:
What does Toph's wanted poster say?
An answer to another question brought up this wanted posted from The Last Airbender season 3:
What's the English translation, if any?
A:
The translated text results in this:
Wanted
Authorities are offering a reward of 1000 gold coins
for the arrest of this twelve year old girl. She disguises
herself as blind, and even though she is small,
she is very dangerous. Information (that will lead to
her arrest) will be rewarded.
Source
The original text:
緝拿逃犯
當局懸賞一千金幣
緝捕十二歲女童她
喬裝盲人個子雖小
極之危險報訊即賞
thrown into Google translate gives this (very crude) translation:
Fugitive
The authorities offered a reward of one thousand gold coins
Arresting a 12-year-old girl
The disguise of a blind man is small
Extremely dangerous news that reward
which has the same intention.
| {
"pile_set_name": "StackExchange"
} |
Q:
Assign ipv6 address to KVM guests on bridge mode
System: CentOS 6.5
Network: Bridge on br0
IPv6: ISP Native /64 block.
IPv4: ISP address (not internal LAN)
Purpose: To assign IPv6 only to guests (manually), I don't want ipv4 address to be assigned to guest OS.
On Host:
/etc/sysctl.conf:
net.ipv4.ip_forward = 1
net.ipv6.conf.all.forwarding = 1
net.ipv6.conf.br0.forwarding = 1
net.ipv6.conf.default.forwarding = 1
brctl show
bridge name bridge id STP enabled interfaces
br0 8000.e840f2ecdfed no eth0
vnet0
virbr0 8000.52540051ef3c yes virbr0-nic
ifconfig:
br0 Link encap:Ethernet HWaddr E8:40:F2:EC:DF:ED
inet addr:xxx.xxx.xxx.xxx Bcast:xxx.xxx.xxx.255 Mask:255.255.255.0
inet6 addr: 2607:beef:be:beef::1/64 Scope:Global
inet6 addr: fe80::ea40:f2ff:feec:dfed/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:365707 errors:0 dropped:0 overruns:0 frame:0
TX packets:470458 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:28867567 (27.5 MiB) TX bytes:574512176 (547.8 MiB)
eth0 Link encap:Ethernet HWaddr E8:40:F2:EC:DF:ED
inet6 addr: fe80::ea40:f2ff:feec:dfed/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:392675 errors:0 dropped:0 overruns:0 frame:0
TX packets:608319 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:46359514 (44.2 MiB) TX bytes:586262036 (559.1 MiB)
Interrupt:20 Memory:fe500000-fe520000
/etc/sysconfig/networt-scripts/ifcfg-br0:
DEVICE=br0
BOOTPROTO=static
IPADDR=xxx.xxx.xxx.xxx
NETMASK=255.255.255.0
ONBOOT=yes
GATEWAY=xxx.xxx.xxx.xxx
IPV6INIT=yes
IPV6_AUTOCONF=no
IPV6ADDR=2607:beef:be:beef::1/64
TYPE=Bridge
DELAY=0
cat /etc/sysconfig/network-scripts/route6-br0
2607:beef:be:bff:ff:ff:ff:ff dev br0
default via 2607:beef:be:bff:ff:ff:ff:ff
route -A inet6 -n
Kernel IPv6 routing table
Destination Next Hop Flags Metric Ref Use Iface
2607:beef:be:beef::/64 :: U 256 0 0 br0
2607:beef:be:bff:ff:ff:ff:ff/128 :: U 1024 1 0 br0
fe80::/64 :: U 256 0 0 virbr0
fe80::/64 :: U 256 0 0 vnet0
fe80::/64 :: U 256 0 0 br0
fe80::/64 :: U 256 0 0 eth0
::/0 2607:beef:be:bff:ff:ff:ff:ff UG 1024 20281 4 br0
::1/128 :: U 0 1 1 lo
2607:beef:be:beef::/128 :: U 0 0 1 lo
2607:beef:be:beef::1/128 :: U 0 36128 1 lo
...
ip6tables -S:
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p ipv6-icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m state --state NEW -m tcp --dport 8888 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp6-adm-prohibited
-A FORWARD -s 2607:beef:be:beef::/64 -i br0 -j ACCEPT
On Guest:
OS: CentOS 6.5 minimal
Network: Manual
cat /etc/sysconfig/network-scripts/ifcfg-eth0:
ONBOOT=yes
NM_CONTROLLED=no
IPV6INIT=yes
IPV6ADDR=2607:beef:be:beef::2/64
IPV6_DEFAULTGW=2607:beef:be:beef::1 (The host's ipv6 address)
Behaviour:
On Host, I can ping guest's ipv6 address, vise-vesa.
I cannot ping any other ipv6 address from guest, including google dns 2001:4860:4860::8888/8844. (Timed out)
I cannot ping from any non-assigned ISP ipv6 address to guest. (Timed out)
ping6 from Hosts to outside is OK.
Update:
If I change Guest's gateway to 2607:beef:be:bff:ff:ff:ff:ff (Host's gateway), the guest will complain "no route to host". Even I added the static route info (route6-eth0) to the Guest, it still won't connect.
Could anyone help me figure out what is going on please? Thanks.
A:
So with the notice from Mark, I will answer my own question.
Host setup:
Assign the IPv6 sub block to your virtual bridge, in my example:
Add
<ip family='ipv6' address='2607:beef:be:beef:1::' prefix='96'>
To /etc/libvirt/qemu/networks/default.xml, use virsh destroy and rebuild the virbr0 device, in my case it generated a virbr1 device.
Add ip6tables rule:
ip6tables -A FORWARD -m physdev --physdev-is-bridged -j ACCEPT
ip6tables -A FORWARD -i br0 -j ACCEPT
On the VM side:
Add the selected IPv6 Address to your configuration file:
IPV6INIT=yes
IPV6ADDR=2607:beef:be:beef:1::253:8/128
Restart your VM's network interface, it just works.
I guess that because the VM is connecting with outside world via virbr1 interface at host. The gateway on host is br0. With ip6tables rule it will all sort out.
I've compiled step by step guide in my blog, https://luxing.im/adding-ipv6-support-for-kvm-vms/
| {
"pile_set_name": "StackExchange"
} |
DeferredLoader = function(element) {
var update_content = function() {
if(!element.data("dontupdate")){
$.get(element.data("path"), function(data) {
target = element.data("target")
if(target){
target = $(target)
} else {
target = element
}
target.html(data);
Elemental.load(target)
})
}
}
trigger = element.data("trigger")
if(element.html() == "" && !element.data("loaded")) {
element.data("loaded", true);
if(!trigger){ update_content(); }
if(element.data("refresh")){
setInterval(function(){ update_content(); }, element.data("refresh")*1000);
}
}
if(trigger){
if(trigger === "click"){
element.click(function(event){
update_content();
})
}
}
} | {
"pile_set_name": "Github"
} |
BRIDGEWATER — A Somerset County town spent more than $17,000 defending a $5 fee it charged a resident for a compact disc of a council meeting.
Tom Coulter filed a complaint with the New Jersey Government Record Council in October 2008, saying he should pay the actual cost of the CD to get the recording.
The state council this year sided with Coulter and found he should have paid about 96 cents.
Bridgewater paid more than $14,000 in legal fees defending the case. It had to pay $3,500 to Coulter for his legal fees and give him a $4.04 refund.
Coulter says the case shows a lack of common sense.
Township Attorney Alan Grant tells
The Courier News
of Bridgewater the legal fees would have been substantially lower had Coulter settled, as the township had offered.
More Bridgewater news: | {
"pile_set_name": "OpenWebText2"
} |
/*
* Copyright (C) Andrew Tridgell 1995-1999
*
* This software may be distributed either under the terms of the
* BSD-style license that accompanies tcpdump or the GNU GPL version 2
* or later
*/
/* \summary: SMB/CIFS printer */
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif
#include <netdissect-stdinc.h>
#include <string.h>
#include "netdissect.h"
#include "extract.h"
#include "smb.h"
static const char tstr[] = "[|SMB]";
static int request = 0;
static int unicodestr = 0;
const u_char *startbuf = NULL;
struct smbdescript {
const char *req_f1;
const char *req_f2;
const char *rep_f1;
const char *rep_f2;
void (*fn)(netdissect_options *, const u_char *, const u_char *, const u_char *, const u_char *);
};
struct smbdescriptint {
const char *req_f1;
const char *req_f2;
const char *rep_f1;
const char *rep_f2;
void (*fn)(netdissect_options *, const u_char *, const u_char *, int, int);
};
struct smbfns
{
int id;
const char *name;
int flags;
struct smbdescript descript;
};
struct smbfnsint
{
int id;
const char *name;
int flags;
struct smbdescriptint descript;
};
#define DEFDESCRIPT { NULL, NULL, NULL, NULL, NULL }
#define FLG_CHAIN (1 << 0)
static const struct smbfns *
smbfind(int id, const struct smbfns *list)
{
int sindex;
for (sindex = 0; list[sindex].name; sindex++)
if (list[sindex].id == id)
return(&list[sindex]);
return(&list[0]);
}
static const struct smbfnsint *
smbfindint(int id, const struct smbfnsint *list)
{
int sindex;
for (sindex = 0; list[sindex].name; sindex++)
if (list[sindex].id == id)
return(&list[sindex]);
return(&list[0]);
}
static void
trans2_findfirst(netdissect_options *ndo,
const u_char *param, const u_char *data, int pcnt, int dcnt)
{
const char *fmt;
if (request)
fmt = "Attribute=[A]\nSearchCount=[d]\nFlags=[w]\nLevel=[dP4]\nFile=[S]\n";
else
fmt = "Handle=[w]\nCount=[d]\nEOS=[w]\nEoffset=[d]\nLastNameOfs=[w]\n";
smb_fdata(ndo, param, fmt, param + pcnt, unicodestr);
if (dcnt) {
ND_PRINT((ndo, "data:\n"));
smb_print_data(ndo, data, dcnt);
}
}
static void
trans2_qfsinfo(netdissect_options *ndo,
const u_char *param, const u_char *data, int pcnt, int dcnt)
{
static int level = 0;
const char *fmt="";
if (request) {
ND_TCHECK2(*param, 2);
level = EXTRACT_LE_16BITS(param);
fmt = "InfoLevel=[d]\n";
smb_fdata(ndo, param, fmt, param + pcnt, unicodestr);
} else {
switch (level) {
case 1:
fmt = "idFileSystem=[W]\nSectorUnit=[D]\nUnit=[D]\nAvail=[D]\nSectorSize=[d]\n";
break;
case 2:
fmt = "CreationTime=[T2]VolNameLength=[lb]\nVolumeLabel=[c]\n";
break;
case 0x105:
fmt = "Capabilities=[W]\nMaxFileLen=[D]\nVolNameLen=[lD]\nVolume=[C]\n";
break;
default:
fmt = "UnknownLevel\n";
break;
}
smb_fdata(ndo, data, fmt, data + dcnt, unicodestr);
}
if (dcnt) {
ND_PRINT((ndo, "data:\n"));
smb_print_data(ndo, data, dcnt);
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static const struct smbfnsint trans2_fns[] = {
{ 0, "TRANSACT2_OPEN", 0,
{ "Flags2=[w]\nMode=[w]\nSearchAttrib=[A]\nAttrib=[A]\nTime=[T2]\nOFun=[w]\nSize=[D]\nRes=([w, w, w, w, w])\nPath=[S]",
NULL,
"Handle=[d]\nAttrib=[A]\nTime=[T2]\nSize=[D]\nAccess=[w]\nType=[w]\nState=[w]\nAction=[w]\nInode=[W]\nOffErr=[d]\n|EALength=[d]\n",
NULL, NULL }},
{ 1, "TRANSACT2_FINDFIRST", 0,
{ NULL, NULL, NULL, NULL, trans2_findfirst }},
{ 2, "TRANSACT2_FINDNEXT", 0, DEFDESCRIPT },
{ 3, "TRANSACT2_QFSINFO", 0,
{ NULL, NULL, NULL, NULL, trans2_qfsinfo }},
{ 4, "TRANSACT2_SETFSINFO", 0, DEFDESCRIPT },
{ 5, "TRANSACT2_QPATHINFO", 0, DEFDESCRIPT },
{ 6, "TRANSACT2_SETPATHINFO", 0, DEFDESCRIPT },
{ 7, "TRANSACT2_QFILEINFO", 0, DEFDESCRIPT },
{ 8, "TRANSACT2_SETFILEINFO", 0, DEFDESCRIPT },
{ 9, "TRANSACT2_FSCTL", 0, DEFDESCRIPT },
{ 10, "TRANSACT2_IOCTL", 0, DEFDESCRIPT },
{ 11, "TRANSACT2_FINDNOTIFYFIRST", 0, DEFDESCRIPT },
{ 12, "TRANSACT2_FINDNOTIFYNEXT", 0, DEFDESCRIPT },
{ 13, "TRANSACT2_MKDIR", 0, DEFDESCRIPT },
{ -1, NULL, 0, DEFDESCRIPT }
};
static void
print_trans2(netdissect_options *ndo,
const u_char *words, const u_char *dat, const u_char *buf, const u_char *maxbuf)
{
u_int bcc;
static const struct smbfnsint *fn = &trans2_fns[0];
const u_char *data, *param;
const u_char *w = words + 1;
const char *f1 = NULL, *f2 = NULL;
int pcnt, dcnt;
ND_TCHECK(words[0]);
if (request) {
ND_TCHECK2(w[14 * 2], 2);
pcnt = EXTRACT_LE_16BITS(w + 9 * 2);
param = buf + EXTRACT_LE_16BITS(w + 10 * 2);
dcnt = EXTRACT_LE_16BITS(w + 11 * 2);
data = buf + EXTRACT_LE_16BITS(w + 12 * 2);
fn = smbfindint(EXTRACT_LE_16BITS(w + 14 * 2), trans2_fns);
} else {
if (words[0] == 0) {
ND_PRINT((ndo, "%s\n", fn->name));
ND_PRINT((ndo, "Trans2Interim\n"));
return;
}
ND_TCHECK2(w[7 * 2], 2);
pcnt = EXTRACT_LE_16BITS(w + 3 * 2);
param = buf + EXTRACT_LE_16BITS(w + 4 * 2);
dcnt = EXTRACT_LE_16BITS(w + 6 * 2);
data = buf + EXTRACT_LE_16BITS(w + 7 * 2);
}
ND_PRINT((ndo, "%s param_length=%d data_length=%d\n", fn->name, pcnt, dcnt));
if (request) {
if (words[0] == 8) {
smb_fdata(ndo, words + 1,
"Trans2Secondary\nTotParam=[d]\nTotData=[d]\nParamCnt=[d]\nParamOff=[d]\nParamDisp=[d]\nDataCnt=[d]\nDataOff=[d]\nDataDisp=[d]\nHandle=[d]\n",
maxbuf, unicodestr);
return;
} else {
smb_fdata(ndo, words + 1,
"TotParam=[d]\nTotData=[d]\nMaxParam=[d]\nMaxData=[d]\nMaxSetup=[b][P1]\nFlags=[w]\nTimeOut=[D]\nRes1=[w]\nParamCnt=[d]\nParamOff=[d]\nDataCnt=[d]\nDataOff=[d]\nSetupCnt=[b][P1]\n",
words + 1 + 14 * 2, unicodestr);
}
f1 = fn->descript.req_f1;
f2 = fn->descript.req_f2;
} else {
smb_fdata(ndo, words + 1,
"TotParam=[d]\nTotData=[d]\nRes1=[w]\nParamCnt=[d]\nParamOff=[d]\nParamDisp[d]\nDataCnt=[d]\nDataOff=[d]\nDataDisp=[d]\nSetupCnt=[b][P1]\n",
words + 1 + 10 * 2, unicodestr);
f1 = fn->descript.rep_f1;
f2 = fn->descript.rep_f2;
}
ND_TCHECK2(*dat, 2);
bcc = EXTRACT_LE_16BITS(dat);
ND_PRINT((ndo, "smb_bcc=%u\n", bcc));
if (fn->descript.fn)
(*fn->descript.fn)(ndo, param, data, pcnt, dcnt);
else {
smb_fdata(ndo, param, f1 ? f1 : "Parameters=\n", param + pcnt, unicodestr);
smb_fdata(ndo, data, f2 ? f2 : "Data=\n", data + dcnt, unicodestr);
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static void
print_browse(netdissect_options *ndo,
const u_char *param, int paramlen, const u_char *data, int datalen)
{
const u_char *maxbuf = data + datalen;
int command;
ND_TCHECK(data[0]);
command = data[0];
smb_fdata(ndo, param, "BROWSE PACKET\n|Param ", param+paramlen, unicodestr);
switch (command) {
case 0xF:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (LocalMasterAnnouncement)\nUpdateCount=[w]\nRes1=[B]\nAnnounceInterval=[d]\nName=[n2]\nMajorVersion=[B]\nMinorVersion=[B]\nServerType=[W]\nElectionVersion=[w]\nBrowserConstant=[w]\n",
maxbuf, unicodestr);
break;
case 0x1:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (HostAnnouncement)\nUpdateCount=[w]\nRes1=[B]\nAnnounceInterval=[d]\nName=[n2]\nMajorVersion=[B]\nMinorVersion=[B]\nServerType=[W]\nElectionVersion=[w]\nBrowserConstant=[w]\n",
maxbuf, unicodestr);
break;
case 0x2:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (AnnouncementRequest)\nFlags=[B]\nReplySystemName=[S]\n",
maxbuf, unicodestr);
break;
case 0xc:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (WorkgroupAnnouncement)\nUpdateCount=[w]\nRes1=[B]\nAnnounceInterval=[d]\nName=[n2]\nMajorVersion=[B]\nMinorVersion=[B]\nServerType=[W]\nCommentPointer=[W]\nServerName=[S]\n",
maxbuf, unicodestr);
break;
case 0x8:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (ElectionFrame)\nElectionVersion=[B]\nOSSummary=[W]\nUptime=[(W, W)]\nServerName=[S]\n",
maxbuf, unicodestr);
break;
case 0xb:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (BecomeBackupBrowser)\nName=[S]\n",
maxbuf, unicodestr);
break;
case 0x9:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (GetBackupList)\nListCount?=[B]\nToken=[W]\n",
maxbuf, unicodestr);
break;
case 0xa:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (BackupListResponse)\nServerCount?=[B]\nToken=[W]\n*Name=[S]\n",
maxbuf, unicodestr);
break;
case 0xd:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (MasterAnnouncement)\nMasterName=[S]\n",
maxbuf, unicodestr);
break;
case 0xe:
data = smb_fdata(ndo, data,
"BROWSE PACKET:\nType=[B] (ResetBrowser)\nOptions=[B]\n", maxbuf, unicodestr);
break;
default:
data = smb_fdata(ndo, data, "Unknown Browser Frame ", maxbuf, unicodestr);
break;
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static void
print_ipc(netdissect_options *ndo,
const u_char *param, int paramlen, const u_char *data, int datalen)
{
if (paramlen)
smb_fdata(ndo, param, "Command=[w]\nStr1=[S]\nStr2=[S]\n", param + paramlen,
unicodestr);
if (datalen)
smb_fdata(ndo, data, "IPC ", data + datalen, unicodestr);
}
static void
print_trans(netdissect_options *ndo,
const u_char *words, const u_char *data1, const u_char *buf, const u_char *maxbuf)
{
u_int bcc;
const char *f1, *f2, *f3, *f4;
const u_char *data, *param;
const u_char *w = words + 1;
int datalen, paramlen;
if (request) {
ND_TCHECK2(w[12 * 2], 2);
paramlen = EXTRACT_LE_16BITS(w + 9 * 2);
param = buf + EXTRACT_LE_16BITS(w + 10 * 2);
datalen = EXTRACT_LE_16BITS(w + 11 * 2);
data = buf + EXTRACT_LE_16BITS(w + 12 * 2);
f1 = "TotParamCnt=[d] \nTotDataCnt=[d] \nMaxParmCnt=[d] \nMaxDataCnt=[d]\nMaxSCnt=[d] \nTransFlags=[w] \nRes1=[w] \nRes2=[w] \nRes3=[w]\nParamCnt=[d] \nParamOff=[d] \nDataCnt=[d] \nDataOff=[d] \nSUCnt=[d]\n";
f2 = "|Name=[S]\n";
f3 = "|Param ";
f4 = "|Data ";
} else {
ND_TCHECK2(w[7 * 2], 2);
paramlen = EXTRACT_LE_16BITS(w + 3 * 2);
param = buf + EXTRACT_LE_16BITS(w + 4 * 2);
datalen = EXTRACT_LE_16BITS(w + 6 * 2);
data = buf + EXTRACT_LE_16BITS(w + 7 * 2);
f1 = "TotParamCnt=[d] \nTotDataCnt=[d] \nRes1=[d]\nParamCnt=[d] \nParamOff=[d] \nRes2=[d] \nDataCnt=[d] \nDataOff=[d] \nRes3=[d]\nLsetup=[d]\n";
f2 = "|Unknown ";
f3 = "|Param ";
f4 = "|Data ";
}
smb_fdata(ndo, words + 1, f1, min(words + 1 + 2 * words[0], maxbuf),
unicodestr);
ND_TCHECK2(*data1, 2);
bcc = EXTRACT_LE_16BITS(data1);
ND_PRINT((ndo, "smb_bcc=%u\n", bcc));
if (bcc > 0) {
smb_fdata(ndo, data1 + 2, f2, maxbuf - (paramlen + datalen), unicodestr);
#define MAILSLOT_BROWSE_STR "\\MAILSLOT\\BROWSE"
ND_TCHECK2(*(data1 + 2), strlen(MAILSLOT_BROWSE_STR) + 1);
if (strcmp((const char *)(data1 + 2), MAILSLOT_BROWSE_STR) == 0) {
print_browse(ndo, param, paramlen, data, datalen);
return;
}
#undef MAILSLOT_BROWSE_STR
#define PIPE_LANMAN_STR "\\PIPE\\LANMAN"
ND_TCHECK2(*(data1 + 2), strlen(PIPE_LANMAN_STR) + 1);
if (strcmp((const char *)(data1 + 2), PIPE_LANMAN_STR) == 0) {
print_ipc(ndo, param, paramlen, data, datalen);
return;
}
#undef PIPE_LANMAN_STR
if (paramlen)
smb_fdata(ndo, param, f3, min(param + paramlen, maxbuf), unicodestr);
if (datalen)
smb_fdata(ndo, data, f4, min(data + datalen, maxbuf), unicodestr);
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static void
print_negprot(netdissect_options *ndo,
const u_char *words, const u_char *data, const u_char *buf _U_, const u_char *maxbuf)
{
u_int wct, bcc;
const char *f1 = NULL, *f2 = NULL;
ND_TCHECK(words[0]);
wct = words[0];
if (request)
f2 = "*|Dialect=[Y]\n";
else {
if (wct == 1)
f1 = "Core Protocol\nDialectIndex=[d]";
else if (wct == 17)
f1 = "NT1 Protocol\nDialectIndex=[d]\nSecMode=[B]\nMaxMux=[d]\nNumVcs=[d]\nMaxBuffer=[D]\nRawSize=[D]\nSessionKey=[W]\nCapabilities=[W]\nServerTime=[T3]TimeZone=[d]\nCryptKey=";
else if (wct == 13)
f1 = "Coreplus/Lanman1/Lanman2 Protocol\nDialectIndex=[d]\nSecMode=[w]\nMaxXMit=[d]\nMaxMux=[d]\nMaxVcs=[d]\nBlkMode=[w]\nSessionKey=[W]\nServerTime=[T1]TimeZone=[d]\nRes=[W]\nCryptKey=";
}
if (f1)
smb_fdata(ndo, words + 1, f1, min(words + 1 + wct * 2, maxbuf),
unicodestr);
else
smb_print_data(ndo, words + 1, min(wct * 2, PTR_DIFF(maxbuf, words + 1)));
ND_TCHECK2(*data, 2);
bcc = EXTRACT_LE_16BITS(data);
ND_PRINT((ndo, "smb_bcc=%u\n", bcc));
if (bcc > 0) {
if (f2)
smb_fdata(ndo, data + 2, f2, min(data + 2 + EXTRACT_LE_16BITS(data),
maxbuf), unicodestr);
else
smb_print_data(ndo, data + 2, min(EXTRACT_LE_16BITS(data), PTR_DIFF(maxbuf, data + 2)));
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static void
print_sesssetup(netdissect_options *ndo,
const u_char *words, const u_char *data, const u_char *buf _U_, const u_char *maxbuf)
{
u_int wct, bcc;
const char *f1 = NULL, *f2 = NULL;
ND_TCHECK(words[0]);
wct = words[0];
if (request) {
if (wct == 10)
f1 = "Com2=[w]\nOff2=[d]\nBufSize=[d]\nMpxMax=[d]\nVcNum=[d]\nSessionKey=[W]\nPassLen=[d]\nCryptLen=[d]\nCryptOff=[d]\nPass&Name=\n";
else
f1 = "Com2=[B]\nRes1=[B]\nOff2=[d]\nMaxBuffer=[d]\nMaxMpx=[d]\nVcNumber=[d]\nSessionKey=[W]\nCaseInsensitivePasswordLength=[d]\nCaseSensitivePasswordLength=[d]\nRes=[W]\nCapabilities=[W]\nPass1&Pass2&Account&Domain&OS&LanMan=\n";
} else {
if (wct == 3) {
f1 = "Com2=[w]\nOff2=[d]\nAction=[w]\n";
} else if (wct == 13) {
f1 = "Com2=[B]\nRes=[B]\nOff2=[d]\nAction=[w]\n";
f2 = "NativeOS=[S]\nNativeLanMan=[S]\nPrimaryDomain=[S]\n";
}
}
if (f1)
smb_fdata(ndo, words + 1, f1, min(words + 1 + wct * 2, maxbuf),
unicodestr);
else
smb_print_data(ndo, words + 1, min(wct * 2, PTR_DIFF(maxbuf, words + 1)));
ND_TCHECK2(*data, 2);
bcc = EXTRACT_LE_16BITS(data);
ND_PRINT((ndo, "smb_bcc=%u\n", bcc));
if (bcc > 0) {
if (f2)
smb_fdata(ndo, data + 2, f2, min(data + 2 + EXTRACT_LE_16BITS(data),
maxbuf), unicodestr);
else
smb_print_data(ndo, data + 2, min(EXTRACT_LE_16BITS(data), PTR_DIFF(maxbuf, data + 2)));
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static void
print_lockingandx(netdissect_options *ndo,
const u_char *words, const u_char *data, const u_char *buf _U_, const u_char *maxbuf)
{
u_int wct, bcc;
const u_char *maxwords;
const char *f1 = NULL, *f2 = NULL;
ND_TCHECK(words[0]);
wct = words[0];
if (request) {
f1 = "Com2=[w]\nOff2=[d]\nHandle=[d]\nLockType=[w]\nTimeOut=[D]\nUnlockCount=[d]\nLockCount=[d]\n";
ND_TCHECK(words[7]);
if (words[7] & 0x10)
f2 = "*Process=[d]\n[P2]Offset=[M]\nLength=[M]\n";
else
f2 = "*Process=[d]\nOffset=[D]\nLength=[D]\n";
} else {
f1 = "Com2=[w]\nOff2=[d]\n";
}
maxwords = min(words + 1 + wct * 2, maxbuf);
if (wct)
smb_fdata(ndo, words + 1, f1, maxwords, unicodestr);
ND_TCHECK2(*data, 2);
bcc = EXTRACT_LE_16BITS(data);
ND_PRINT((ndo, "smb_bcc=%u\n", bcc));
if (bcc > 0) {
if (f2)
smb_fdata(ndo, data + 2, f2, min(data + 2 + EXTRACT_LE_16BITS(data),
maxbuf), unicodestr);
else
smb_print_data(ndo, data + 2, min(EXTRACT_LE_16BITS(data), PTR_DIFF(maxbuf, data + 2)));
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static const struct smbfns smb_fns[] = {
{ -1, "SMBunknown", 0, DEFDESCRIPT },
{ SMBtcon, "SMBtcon", 0,
{ NULL, "Path=[Z]\nPassword=[Z]\nDevice=[Z]\n",
"MaxXmit=[d]\nTreeId=[d]\n", NULL,
NULL } },
{ SMBtdis, "SMBtdis", 0, DEFDESCRIPT },
{ SMBexit, "SMBexit", 0, DEFDESCRIPT },
{ SMBioctl, "SMBioctl", 0, DEFDESCRIPT },
{ SMBecho, "SMBecho", 0,
{ "ReverbCount=[d]\n", NULL,
"SequenceNum=[d]\n", NULL,
NULL } },
{ SMBulogoffX, "SMBulogoffX", FLG_CHAIN, DEFDESCRIPT },
{ SMBgetatr, "SMBgetatr", 0,
{ NULL, "Path=[Z]\n",
"Attribute=[A]\nTime=[T2]Size=[D]\nRes=([w,w,w,w,w])\n", NULL,
NULL } },
{ SMBsetatr, "SMBsetatr", 0,
{ "Attribute=[A]\nTime=[T2]Res=([w,w,w,w,w])\n", "Path=[Z]\n",
NULL, NULL, NULL } },
{ SMBchkpth, "SMBchkpth", 0,
{ NULL, "Path=[Z]\n", NULL, NULL, NULL } },
{ SMBsearch, "SMBsearch", 0,
{ "Count=[d]\nAttrib=[A]\n",
"Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\n",
"Count=[d]\n",
"BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",
NULL } },
{ SMBopen, "SMBopen", 0,
{ "Mode=[w]\nAttribute=[A]\n", "Path=[Z]\n",
"Handle=[d]\nOAttrib=[A]\nTime=[T2]Size=[D]\nAccess=[w]\n",
NULL, NULL } },
{ SMBcreate, "SMBcreate", 0,
{ "Attrib=[A]\nTime=[T2]", "Path=[Z]\n", "Handle=[d]\n", NULL, NULL } },
{ SMBmknew, "SMBmknew", 0,
{ "Attrib=[A]\nTime=[T2]", "Path=[Z]\n", "Handle=[d]\n", NULL, NULL } },
{ SMBunlink, "SMBunlink", 0,
{ "Attrib=[A]\n", "Path=[Z]\n", NULL, NULL, NULL } },
{ SMBread, "SMBread", 0,
{ "Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n", NULL,
"Count=[d]\nRes=([w,w,w,w])\n", NULL, NULL } },
{ SMBwrite, "SMBwrite", 0,
{ "Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n", NULL,
"Count=[d]\n", NULL, NULL } },
{ SMBclose, "SMBclose", 0,
{ "Handle=[d]\nTime=[T2]", NULL, NULL, NULL, NULL } },
{ SMBmkdir, "SMBmkdir", 0,
{ NULL, "Path=[Z]\n", NULL, NULL, NULL } },
{ SMBrmdir, "SMBrmdir", 0,
{ NULL, "Path=[Z]\n", NULL, NULL, NULL } },
{ SMBdskattr, "SMBdskattr", 0,
{ NULL, NULL,
"TotalUnits=[d]\nBlocksPerUnit=[d]\nBlockSize=[d]\nFreeUnits=[d]\nMedia=[w]\n",
NULL, NULL } },
{ SMBmv, "SMBmv", 0,
{ "Attrib=[A]\n", "OldPath=[Z]\nNewPath=[Z]\n", NULL, NULL, NULL } },
/*
* this is a Pathworks specific call, allowing the
* changing of the root path
*/
{ pSETDIR, "SMBsetdir", 0, { NULL, "Path=[Z]\n", NULL, NULL, NULL } },
{ SMBlseek, "SMBlseek", 0,
{ "Handle=[d]\nMode=[w]\nOffset=[D]\n", "Offset=[D]\n", NULL, NULL, NULL } },
{ SMBflush, "SMBflush", 0, { "Handle=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBsplopen, "SMBsplopen", 0,
{ "SetupLen=[d]\nMode=[w]\n", "Ident=[Z]\n", "Handle=[d]\n",
NULL, NULL } },
{ SMBsplclose, "SMBsplclose", 0,
{ "Handle=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBsplretq, "SMBsplretq", 0,
{ "MaxCount=[d]\nStartIndex=[d]\n", NULL,
"Count=[d]\nIndex=[d]\n",
"*Time=[T2]Status=[B]\nJobID=[d]\nSize=[D]\nRes=[B]Name=[s16]\n",
NULL } },
{ SMBsplwr, "SMBsplwr", 0,
{ "Handle=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBlock, "SMBlock", 0,
{ "Handle=[d]\nCount=[D]\nOffset=[D]\n", NULL, NULL, NULL, NULL } },
{ SMBunlock, "SMBunlock", 0,
{ "Handle=[d]\nCount=[D]\nOffset=[D]\n", NULL, NULL, NULL, NULL } },
/* CORE+ PROTOCOL FOLLOWS */
{ SMBreadbraw, "SMBreadbraw", 0,
{ "Handle=[d]\nOffset=[D]\nMaxCount=[d]\nMinCount=[d]\nTimeOut=[D]\nRes=[d]\n",
NULL, NULL, NULL, NULL } },
{ SMBwritebraw, "SMBwritebraw", 0,
{ "Handle=[d]\nTotalCount=[d]\nRes=[w]\nOffset=[D]\nTimeOut=[D]\nWMode=[w]\nRes2=[W]\n|DataSize=[d]\nDataOff=[d]\n",
NULL, "WriteRawAck", NULL, NULL } },
{ SMBwritec, "SMBwritec", 0,
{ NULL, NULL, "Count=[d]\n", NULL, NULL } },
{ SMBwriteclose, "SMBwriteclose", 0,
{ "Handle=[d]\nCount=[d]\nOffset=[D]\nTime=[T2]Res=([w,w,w,w,w,w])",
NULL, "Count=[d]\n", NULL, NULL } },
{ SMBlockread, "SMBlockread", 0,
{ "Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n", NULL,
"Count=[d]\nRes=([w,w,w,w])\n", NULL, NULL } },
{ SMBwriteunlock, "SMBwriteunlock", 0,
{ "Handle=[d]\nByteCount=[d]\nOffset=[D]\nCountLeft=[d]\n", NULL,
"Count=[d]\n", NULL, NULL } },
{ SMBreadBmpx, "SMBreadBmpx", 0,
{ "Handle=[d]\nOffset=[D]\nMaxCount=[d]\nMinCount=[d]\nTimeOut=[D]\nRes=[w]\n",
NULL,
"Offset=[D]\nTotCount=[d]\nRemaining=[d]\nRes=([w,w])\nDataSize=[d]\nDataOff=[d]\n",
NULL, NULL } },
{ SMBwriteBmpx, "SMBwriteBmpx", 0,
{ "Handle=[d]\nTotCount=[d]\nRes=[w]\nOffset=[D]\nTimeOut=[D]\nWMode=[w]\nRes2=[W]\nDataSize=[d]\nDataOff=[d]\n", NULL,
"Remaining=[d]\n", NULL, NULL } },
{ SMBwriteBs, "SMBwriteBs", 0,
{ "Handle=[d]\nTotCount=[d]\nOffset=[D]\nRes=[W]\nDataSize=[d]\nDataOff=[d]\n",
NULL, "Count=[d]\n", NULL, NULL } },
{ SMBsetattrE, "SMBsetattrE", 0,
{ "Handle=[d]\nCreationTime=[T2]AccessTime=[T2]ModifyTime=[T2]", NULL,
NULL, NULL, NULL } },
{ SMBgetattrE, "SMBgetattrE", 0,
{ "Handle=[d]\n", NULL,
"CreationTime=[T2]AccessTime=[T2]ModifyTime=[T2]Size=[D]\nAllocSize=[D]\nAttribute=[A]\n",
NULL, NULL } },
{ SMBtranss, "SMBtranss", 0, DEFDESCRIPT },
{ SMBioctls, "SMBioctls", 0, DEFDESCRIPT },
{ SMBcopy, "SMBcopy", 0,
{ "TreeID2=[d]\nOFun=[w]\nFlags=[w]\n", "Path=[S]\nNewPath=[S]\n",
"CopyCount=[d]\n", "|ErrStr=[S]\n", NULL } },
{ SMBmove, "SMBmove", 0,
{ "TreeID2=[d]\nOFun=[w]\nFlags=[w]\n", "Path=[S]\nNewPath=[S]\n",
"MoveCount=[d]\n", "|ErrStr=[S]\n", NULL } },
{ SMBopenX, "SMBopenX", FLG_CHAIN,
{ "Com2=[w]\nOff2=[d]\nFlags=[w]\nMode=[w]\nSearchAttrib=[A]\nAttrib=[A]\nTime=[T2]OFun=[w]\nSize=[D]\nTimeOut=[D]\nRes=[W]\n",
"Path=[S]\n",
"Com2=[w]\nOff2=[d]\nHandle=[d]\nAttrib=[A]\nTime=[T2]Size=[D]\nAccess=[w]\nType=[w]\nState=[w]\nAction=[w]\nFileID=[W]\nRes=[w]\n",
NULL, NULL } },
{ SMBreadX, "SMBreadX", FLG_CHAIN,
{ "Com2=[w]\nOff2=[d]\nHandle=[d]\nOffset=[D]\nMaxCount=[d]\nMinCount=[d]\nTimeOut=[D]\nCountLeft=[d]\n",
NULL,
"Com2=[w]\nOff2=[d]\nRemaining=[d]\nRes=[W]\nDataSize=[d]\nDataOff=[d]\nRes=([w,w,w,w])\n",
NULL, NULL } },
{ SMBwriteX, "SMBwriteX", FLG_CHAIN,
{ "Com2=[w]\nOff2=[d]\nHandle=[d]\nOffset=[D]\nTimeOut=[D]\nWMode=[w]\nCountLeft=[d]\nRes=[w]\nDataSize=[d]\nDataOff=[d]\n",
NULL,
"Com2=[w]\nOff2=[d]\nCount=[d]\nRemaining=[d]\nRes=[W]\n",
NULL, NULL } },
{ SMBffirst, "SMBffirst", 0,
{ "Count=[d]\nAttrib=[A]\n",
"Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\n",
"Count=[d]\n",
"BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",
NULL } },
{ SMBfunique, "SMBfunique", 0,
{ "Count=[d]\nAttrib=[A]\n",
"Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\n",
"Count=[d]\n",
"BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",
NULL } },
{ SMBfclose, "SMBfclose", 0,
{ "Count=[d]\nAttrib=[A]\n",
"Path=[Z]\nBlkType=[B]\nBlkLen=[d]\n|Res1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\n",
"Count=[d]\n",
"BlkType=[B]\nBlkLen=[d]\n*\nRes1=[B]\nMask=[s11]\nSrv1=[B]\nDirIndex=[d]\nSrv2=[w]\nRes2=[W]\nAttrib=[a]\nTime=[T1]Size=[D]\nName=[s13]\n",
NULL } },
{ SMBfindnclose, "SMBfindnclose", 0,
{ "Handle=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBfindclose, "SMBfindclose", 0,
{ "Handle=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBsends, "SMBsends", 0,
{ NULL, "Source=[Z]\nDest=[Z]\n", NULL, NULL, NULL } },
{ SMBsendstrt, "SMBsendstrt", 0,
{ NULL, "Source=[Z]\nDest=[Z]\n", "GroupID=[d]\n", NULL, NULL } },
{ SMBsendend, "SMBsendend", 0,
{ "GroupID=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBsendtxt, "SMBsendtxt", 0,
{ "GroupID=[d]\n", NULL, NULL, NULL, NULL } },
{ SMBsendb, "SMBsendb", 0,
{ NULL, "Source=[Z]\nDest=[Z]\n", NULL, NULL, NULL } },
{ SMBfwdname, "SMBfwdname", 0, DEFDESCRIPT },
{ SMBcancelf, "SMBcancelf", 0, DEFDESCRIPT },
{ SMBgetmac, "SMBgetmac", 0, DEFDESCRIPT },
{ SMBnegprot, "SMBnegprot", 0,
{ NULL, NULL, NULL, NULL, print_negprot } },
{ SMBsesssetupX, "SMBsesssetupX", FLG_CHAIN,
{ NULL, NULL, NULL, NULL, print_sesssetup } },
{ SMBtconX, "SMBtconX", FLG_CHAIN,
{ "Com2=[w]\nOff2=[d]\nFlags=[w]\nPassLen=[d]\nPasswd&Path&Device=\n",
NULL, "Com2=[w]\nOff2=[d]\n", "ServiceType=[R]\n", NULL } },
{ SMBlockingX, "SMBlockingX", FLG_CHAIN,
{ NULL, NULL, NULL, NULL, print_lockingandx } },
{ SMBtrans2, "SMBtrans2", 0, { NULL, NULL, NULL, NULL, print_trans2 } },
{ SMBtranss2, "SMBtranss2", 0, DEFDESCRIPT },
{ SMBctemp, "SMBctemp", 0, DEFDESCRIPT },
{ SMBreadBs, "SMBreadBs", 0, DEFDESCRIPT },
{ SMBtrans, "SMBtrans", 0, { NULL, NULL, NULL, NULL, print_trans } },
{ SMBnttrans, "SMBnttrans", 0, DEFDESCRIPT },
{ SMBnttranss, "SMBnttranss", 0, DEFDESCRIPT },
{ SMBntcreateX, "SMBntcreateX", FLG_CHAIN,
{ "Com2=[w]\nOff2=[d]\nRes=[b]\nNameLen=[ld]\nFlags=[W]\nRootDirectoryFid=[D]\nAccessMask=[W]\nAllocationSize=[L]\nExtFileAttributes=[W]\nShareAccess=[W]\nCreateDisposition=[W]\nCreateOptions=[W]\nImpersonationLevel=[W]\nSecurityFlags=[b]\n",
"Path=[C]\n",
"Com2=[w]\nOff2=[d]\nOplockLevel=[b]\nFid=[d]\nCreateAction=[W]\nCreateTime=[T3]LastAccessTime=[T3]LastWriteTime=[T3]ChangeTime=[T3]ExtFileAttributes=[W]\nAllocationSize=[L]\nEndOfFile=[L]\nFileType=[w]\nDeviceState=[w]\nDirectory=[b]\n",
NULL, NULL } },
{ SMBntcancel, "SMBntcancel", 0, DEFDESCRIPT },
{ -1, NULL, 0, DEFDESCRIPT }
};
/*
* print a SMB message
*/
static void
print_smb(netdissect_options *ndo,
const u_char *buf, const u_char *maxbuf)
{
uint16_t flags2;
int nterrcodes;
int command;
uint32_t nterror;
const u_char *words, *maxwords, *data;
const struct smbfns *fn;
const char *fmt_smbheader =
"[P4]SMB Command = [B]\nError class = [BP1]\nError code = [d]\nFlags1 = [B]\nFlags2 = [B][P13]\nTree ID = [d]\nProc ID = [d]\nUID = [d]\nMID = [d]\nWord Count = [b]\n";
int smboffset;
ND_TCHECK(buf[9]);
request = (buf[9] & 0x80) ? 0 : 1;
startbuf = buf;
command = buf[4];
fn = smbfind(command, smb_fns);
if (ndo->ndo_vflag > 1)
ND_PRINT((ndo, "\n"));
ND_PRINT((ndo, "SMB PACKET: %s (%s)\n", fn->name, request ? "REQUEST" : "REPLY"));
if (ndo->ndo_vflag < 2)
return;
ND_TCHECK_16BITS(&buf[10]);
flags2 = EXTRACT_LE_16BITS(&buf[10]);
unicodestr = flags2 & 0x8000;
nterrcodes = flags2 & 0x4000;
/* print out the header */
smb_fdata(ndo, buf, fmt_smbheader, buf + 33, unicodestr);
if (nterrcodes) {
nterror = EXTRACT_LE_32BITS(&buf[5]);
if (nterror)
ND_PRINT((ndo, "NTError = %s\n", nt_errstr(nterror)));
} else {
if (buf[5])
ND_PRINT((ndo, "SMBError = %s\n", smb_errstr(buf[5], EXTRACT_LE_16BITS(&buf[7]))));
}
smboffset = 32;
for (;;) {
const char *f1, *f2;
int wct;
u_int bcc;
int newsmboffset;
words = buf + smboffset;
ND_TCHECK(words[0]);
wct = words[0];
data = words + 1 + wct * 2;
maxwords = min(data, maxbuf);
if (request) {
f1 = fn->descript.req_f1;
f2 = fn->descript.req_f2;
} else {
f1 = fn->descript.rep_f1;
f2 = fn->descript.rep_f2;
}
if (fn->descript.fn)
(*fn->descript.fn)(ndo, words, data, buf, maxbuf);
else {
if (wct) {
if (f1)
smb_fdata(ndo, words + 1, f1, words + 1 + wct * 2, unicodestr);
else {
int i;
int v;
for (i = 0; &words[1 + 2 * i] < maxwords; i++) {
ND_TCHECK2(words[1 + 2 * i], 2);
v = EXTRACT_LE_16BITS(words + 1 + 2 * i);
ND_PRINT((ndo, "smb_vwv[%d]=%d (0x%X)\n", i, v, v));
}
}
}
ND_TCHECK2(*data, 2);
bcc = EXTRACT_LE_16BITS(data);
ND_PRINT((ndo, "smb_bcc=%u\n", bcc));
if (f2) {
if (bcc > 0)
smb_fdata(ndo, data + 2, f2, data + 2 + bcc, unicodestr);
} else {
if (bcc > 0) {
ND_PRINT((ndo, "smb_buf[]=\n"));
smb_print_data(ndo, data + 2, min(bcc, PTR_DIFF(maxbuf, data + 2)));
}
}
}
if ((fn->flags & FLG_CHAIN) == 0)
break;
if (wct == 0)
break;
ND_TCHECK(words[1]);
command = words[1];
if (command == 0xFF)
break;
ND_TCHECK2(words[3], 2);
newsmboffset = EXTRACT_LE_16BITS(words + 3);
fn = smbfind(command, smb_fns);
ND_PRINT((ndo, "\nSMB PACKET: %s (%s) (CHAINED)\n",
fn->name, request ? "REQUEST" : "REPLY"));
if (newsmboffset <= smboffset) {
ND_PRINT((ndo, "Bad andX offset: %u <= %u\n", newsmboffset, smboffset));
break;
}
smboffset = newsmboffset;
}
ND_PRINT((ndo, "\n"));
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
/*
* print a NBT packet received across tcp on port 139
*/
void
nbt_tcp_print(netdissect_options *ndo,
const u_char *data, int length)
{
int caplen;
int type;
u_int nbt_len;
const u_char *maxbuf;
if (length < 4)
goto trunc;
if (ndo->ndo_snapend < data)
goto trunc;
caplen = ndo->ndo_snapend - data;
if (caplen < 4)
goto trunc;
maxbuf = data + caplen;
ND_TCHECK_8BITS(data);
type = data[0];
ND_TCHECK_16BITS(data + 2);
nbt_len = EXTRACT_16BITS(data + 2);
length -= 4;
caplen -= 4;
startbuf = data;
if (ndo->ndo_vflag < 2) {
ND_PRINT((ndo, " NBT Session Packet: "));
switch (type) {
case 0x00:
ND_PRINT((ndo, "Session Message"));
break;
case 0x81:
ND_PRINT((ndo, "Session Request"));
break;
case 0x82:
ND_PRINT((ndo, "Session Granted"));
break;
case 0x83:
{
int ecode;
if (nbt_len < 4)
goto trunc;
if (length < 4)
goto trunc;
if (caplen < 4)
goto trunc;
ecode = data[4];
ND_PRINT((ndo, "Session Reject, "));
switch (ecode) {
case 0x80:
ND_PRINT((ndo, "Not listening on called name"));
break;
case 0x81:
ND_PRINT((ndo, "Not listening for calling name"));
break;
case 0x82:
ND_PRINT((ndo, "Called name not present"));
break;
case 0x83:
ND_PRINT((ndo, "Called name present, but insufficient resources"));
break;
default:
ND_PRINT((ndo, "Unspecified error 0x%X", ecode));
break;
}
}
break;
case 0x85:
ND_PRINT((ndo, "Session Keepalive"));
break;
default:
data = smb_fdata(ndo, data, "Unknown packet type [rB]", maxbuf, 0);
break;
}
} else {
ND_PRINT((ndo, "\n>>> NBT Session Packet\n"));
switch (type) {
case 0x00:
data = smb_fdata(ndo, data, "[P1]NBT Session Message\nFlags=[B]\nLength=[rd]\n",
data + 4, 0);
if (data == NULL)
break;
if (nbt_len >= 4 && caplen >= 4 && memcmp(data,"\377SMB",4) == 0) {
if ((int)nbt_len > caplen) {
if ((int)nbt_len > length)
ND_PRINT((ndo, "WARNING: Packet is continued in later TCP segments\n"));
else
ND_PRINT((ndo, "WARNING: Short packet. Try increasing the snap length by %d\n",
nbt_len - caplen));
}
print_smb(ndo, data, maxbuf > data + nbt_len ? data + nbt_len : maxbuf);
} else
ND_PRINT((ndo, "Session packet:(raw data or continuation?)\n"));
break;
case 0x81:
data = smb_fdata(ndo, data,
"[P1]NBT Session Request\nFlags=[B]\nLength=[rd]\nDestination=[n1]\nSource=[n1]\n",
maxbuf, 0);
break;
case 0x82:
data = smb_fdata(ndo, data, "[P1]NBT Session Granted\nFlags=[B]\nLength=[rd]\n", maxbuf, 0);
break;
case 0x83:
{
const u_char *origdata;
int ecode;
origdata = data;
data = smb_fdata(ndo, data, "[P1]NBT SessionReject\nFlags=[B]\nLength=[rd]\nReason=[B]\n",
maxbuf, 0);
if (data == NULL)
break;
if (nbt_len >= 1 && caplen >= 1) {
ecode = origdata[4];
switch (ecode) {
case 0x80:
ND_PRINT((ndo, "Not listening on called name\n"));
break;
case 0x81:
ND_PRINT((ndo, "Not listening for calling name\n"));
break;
case 0x82:
ND_PRINT((ndo, "Called name not present\n"));
break;
case 0x83:
ND_PRINT((ndo, "Called name present, but insufficient resources\n"));
break;
default:
ND_PRINT((ndo, "Unspecified error 0x%X\n", ecode));
break;
}
}
}
break;
case 0x85:
data = smb_fdata(ndo, data, "[P1]NBT Session Keepalive\nFlags=[B]\nLength=[rd]\n", maxbuf, 0);
break;
default:
data = smb_fdata(ndo, data, "NBT - Unknown packet type\nType=[B]\n", maxbuf, 0);
break;
}
ND_PRINT((ndo, "\n"));
}
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
static const struct tok opcode_str[] = {
{ 0, "QUERY" },
{ 5, "REGISTRATION" },
{ 6, "RELEASE" },
{ 7, "WACK" },
{ 8, "REFRESH(8)" },
{ 9, "REFRESH" },
{ 15, "MULTIHOMED REGISTRATION" },
{ 0, NULL }
};
/*
* print a NBT packet received across udp on port 137
*/
void
nbt_udp137_print(netdissect_options *ndo,
const u_char *data, int length)
{
const u_char *maxbuf = data + length;
int name_trn_id, response, opcode, nm_flags, rcode;
int qdcount, ancount, nscount, arcount;
const u_char *p;
int total, i;
ND_TCHECK2(data[10], 2);
name_trn_id = EXTRACT_16BITS(data);
response = (data[2] >> 7);
opcode = (data[2] >> 3) & 0xF;
nm_flags = ((data[2] & 0x7) << 4) + (data[3] >> 4);
rcode = data[3] & 0xF;
qdcount = EXTRACT_16BITS(data + 4);
ancount = EXTRACT_16BITS(data + 6);
nscount = EXTRACT_16BITS(data + 8);
arcount = EXTRACT_16BITS(data + 10);
startbuf = data;
if (maxbuf <= data)
return;
if (ndo->ndo_vflag > 1)
ND_PRINT((ndo, "\n>>> "));
ND_PRINT((ndo, "NBT UDP PACKET(137): %s", tok2str(opcode_str, "OPUNKNOWN", opcode)));
if (response) {
ND_PRINT((ndo, "; %s", rcode ? "NEGATIVE" : "POSITIVE"));
}
ND_PRINT((ndo, "; %s; %s", response ? "RESPONSE" : "REQUEST",
(nm_flags & 1) ? "BROADCAST" : "UNICAST"));
if (ndo->ndo_vflag < 2)
return;
ND_PRINT((ndo, "\nTrnID=0x%X\nOpCode=%d\nNmFlags=0x%X\nRcode=%d\nQueryCount=%d\nAnswerCount=%d\nAuthorityCount=%d\nAddressRecCount=%d\n",
name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount,
arcount));
p = data + 12;
total = ancount + nscount + arcount;
if (qdcount > 100 || total > 100) {
ND_PRINT((ndo, "Corrupt packet??\n"));
return;
}
if (qdcount) {
ND_PRINT((ndo, "QuestionRecords:\n"));
for (i = 0; i < qdcount; i++) {
p = smb_fdata(ndo, p,
"|Name=[n1]\nQuestionType=[rw]\nQuestionClass=[rw]\n#",
maxbuf, 0);
if (p == NULL)
goto out;
}
}
if (total) {
ND_PRINT((ndo, "\nResourceRecords:\n"));
for (i = 0; i < total; i++) {
int rdlen;
int restype;
p = smb_fdata(ndo, p, "Name=[n1]\n#", maxbuf, 0);
if (p == NULL)
goto out;
ND_TCHECK_16BITS(p);
restype = EXTRACT_16BITS(p);
p = smb_fdata(ndo, p, "ResType=[rw]\nResClass=[rw]\nTTL=[rD]\n", p + 8, 0);
if (p == NULL)
goto out;
ND_TCHECK_16BITS(p);
rdlen = EXTRACT_16BITS(p);
ND_PRINT((ndo, "ResourceLength=%d\nResourceData=\n", rdlen));
p += 2;
if (rdlen == 6) {
p = smb_fdata(ndo, p, "AddrType=[rw]\nAddress=[b.b.b.b]\n", p + rdlen, 0);
if (p == NULL)
goto out;
} else {
if (restype == 0x21) {
int numnames;
ND_TCHECK(*p);
numnames = p[0];
p = smb_fdata(ndo, p, "NumNames=[B]\n", p + 1, 0);
if (p == NULL)
goto out;
while (numnames--) {
p = smb_fdata(ndo, p, "Name=[n2]\t#", maxbuf, 0);
if (p == NULL)
goto out;
ND_TCHECK(*p);
if (p[0] & 0x80)
ND_PRINT((ndo, "<GROUP> "));
switch (p[0] & 0x60) {
case 0x00: ND_PRINT((ndo, "B ")); break;
case 0x20: ND_PRINT((ndo, "P ")); break;
case 0x40: ND_PRINT((ndo, "M ")); break;
case 0x60: ND_PRINT((ndo, "_ ")); break;
}
if (p[0] & 0x10)
ND_PRINT((ndo, "<DEREGISTERING> "));
if (p[0] & 0x08)
ND_PRINT((ndo, "<CONFLICT> "));
if (p[0] & 0x04)
ND_PRINT((ndo, "<ACTIVE> "));
if (p[0] & 0x02)
ND_PRINT((ndo, "<PERMANENT> "));
ND_PRINT((ndo, "\n"));
p += 2;
}
} else {
smb_print_data(ndo, p, min(rdlen, length - (p - data)));
p += rdlen;
}
}
}
}
if (p < maxbuf)
smb_fdata(ndo, p, "AdditionalData:\n", maxbuf, 0);
out:
ND_PRINT((ndo, "\n"));
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
/*
* Print an SMB-over-TCP packet received across tcp on port 445
*/
void
smb_tcp_print(netdissect_options *ndo,
const u_char * data, int length)
{
int caplen;
u_int smb_len;
const u_char *maxbuf;
if (length < 4)
goto trunc;
if (ndo->ndo_snapend < data)
goto trunc;
caplen = ndo->ndo_snapend - data;
if (caplen < 4)
goto trunc;
maxbuf = data + caplen;
smb_len = EXTRACT_24BITS(data + 1);
length -= 4;
caplen -= 4;
startbuf = data;
data += 4;
if (smb_len >= 4 && caplen >= 4 && memcmp(data,"\377SMB",4) == 0) {
if ((int)smb_len > caplen) {
if ((int)smb_len > length)
ND_PRINT((ndo, " WARNING: Packet is continued in later TCP segments\n"));
else
ND_PRINT((ndo, " WARNING: Short packet. Try increasing the snap length by %d\n",
smb_len - caplen));
} else
ND_PRINT((ndo, " "));
print_smb(ndo, data, maxbuf > data + smb_len ? data + smb_len : maxbuf);
} else
ND_PRINT((ndo, " SMB-over-TCP packet:(raw data or continuation?)\n"));
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
/*
* print a NBT packet received across udp on port 138
*/
void
nbt_udp138_print(netdissect_options *ndo,
const u_char *data, int length)
{
const u_char *maxbuf = data + length;
if (maxbuf > ndo->ndo_snapend)
maxbuf = ndo->ndo_snapend;
if (maxbuf <= data)
return;
startbuf = data;
if (ndo->ndo_vflag < 2) {
ND_PRINT((ndo, "NBT UDP PACKET(138)"));
return;
}
data = smb_fdata(ndo, data,
"\n>>> NBT UDP PACKET(138) Res=[rw] ID=[rw] IP=[b.b.b.b] Port=[rd] Length=[rd] Res2=[rw]\nSourceName=[n1]\nDestName=[n1]\n#",
maxbuf, 0);
if (data != NULL) {
/* If there isn't enough data for "\377SMB", don't check for it. */
if (&data[3] >= maxbuf)
goto out;
if (memcmp(data, "\377SMB",4) == 0)
print_smb(ndo, data, maxbuf);
}
out:
ND_PRINT((ndo, "\n"));
}
/*
print netbeui frames
*/
static struct nbf_strings {
const char *name;
const char *nonverbose;
const char *verbose;
} nbf_strings[0x20] = {
{ "Add Group Name Query", ", [P23]Name to add=[n2]#",
"[P5]ResponseCorrelator=[w]\n[P16]Name to add=[n2]\n" },
{ "Add Name Query", ", [P23]Name to add=[n2]#",
"[P5]ResponseCorrelator=[w]\n[P16]Name to add=[n2]\n" },
{ "Name In Conflict", NULL, NULL },
{ "Status Query", NULL, NULL },
{ NULL, NULL, NULL }, /* not used */
{ NULL, NULL, NULL }, /* not used */
{ NULL, NULL, NULL }, /* not used */
{ "Terminate Trace", NULL, NULL },
{ "Datagram", NULL,
"[P7]Destination=[n2]\nSource=[n2]\n" },
{ "Broadcast Datagram", NULL,
"[P7]Destination=[n2]\nSource=[n2]\n" },
{ "Name Query", ", [P7]Name=[n2]#",
"[P1]SessionNumber=[B]\nNameType=[B][P2]\nResponseCorrelator=[w]\nName=[n2]\nName of sender=[n2]\n" },
{ NULL, NULL, NULL }, /* not used */
{ NULL, NULL, NULL }, /* not used */
{ "Add Name Response", ", [P1]GroupName=[w] [P4]Destination=[n2] Source=[n2]#",
"AddNameInProcess=[B]\nGroupName=[w]\nTransmitCorrelator=[w][P2]\nDestination=[n2]\nSource=[n2]\n" },
{ "Name Recognized", NULL,
"[P1]Data2=[w]\nTransmitCorrelator=[w]\nResponseCorelator=[w]\nDestination=[n2]\nSource=[n2]\n" },
{ "Status Response", NULL, NULL },
{ NULL, NULL, NULL }, /* not used */
{ NULL, NULL, NULL }, /* not used */
{ NULL, NULL, NULL }, /* not used */
{ "Terminate Trace", NULL, NULL },
{ "Data Ack", NULL,
"[P3]TransmitCorrelator=[w][P2]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Data First/Middle", NULL,
"Flags=[{RECEIVE_CONTINUE|NO_ACK||PIGGYBACK_ACK_INCLUDED|}]\nResyncIndicator=[w][P2]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Data Only/Last", NULL,
"Flags=[{|NO_ACK|PIGGYBACK_ACK_ALLOWED|PIGGYBACK_ACK_INCLUDED|}]\nResyncIndicator=[w][P2]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Session Confirm", NULL,
"Data1=[B]\nData2=[w]\nTransmitCorrelator=[w]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Session End", NULL,
"[P1]Data2=[w][P4]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Session Initialize", NULL,
"Data1=[B]\nData2=[w]\nTransmitCorrelator=[w]\nResponseCorelator=[w]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "No Receive", NULL,
"Flags=[{|SEND_NO_ACK}]\nDataBytesAccepted=[b][P4]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Receive Outstanding", NULL,
"[P1]DataBytesAccepted=[b][P4]\nRemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ "Receive Continue", NULL,
"[P2]TransmitCorrelator=[w]\n[P2]RemoteSessionNumber=[B]\nLocalSessionNumber=[B]\n" },
{ NULL, NULL, NULL }, /* not used */
{ NULL, NULL, NULL }, /* not used */
{ "Session Alive", NULL, NULL }
};
void
netbeui_print(netdissect_options *ndo,
u_short control, const u_char *data, int length)
{
const u_char *maxbuf = data + length;
int len;
int command;
const u_char *data2;
int is_truncated = 0;
if (maxbuf > ndo->ndo_snapend)
maxbuf = ndo->ndo_snapend;
ND_TCHECK(data[4]);
len = EXTRACT_LE_16BITS(data);
command = data[4];
data2 = data + len;
if (data2 >= maxbuf) {
data2 = maxbuf;
is_truncated = 1;
}
startbuf = data;
if (ndo->ndo_vflag < 2) {
ND_PRINT((ndo, "NBF Packet: "));
data = smb_fdata(ndo, data, "[P5]#", maxbuf, 0);
} else {
ND_PRINT((ndo, "\n>>> NBF Packet\nType=0x%X ", control));
data = smb_fdata(ndo, data, "Length=[d] Signature=[w] Command=[B]\n#", maxbuf, 0);
}
if (data == NULL)
goto out;
if (command > 0x1f || nbf_strings[command].name == NULL) {
if (ndo->ndo_vflag < 2)
data = smb_fdata(ndo, data, "Unknown NBF Command#", data2, 0);
else
data = smb_fdata(ndo, data, "Unknown NBF Command\n", data2, 0);
} else {
if (ndo->ndo_vflag < 2) {
ND_PRINT((ndo, "%s", nbf_strings[command].name));
if (nbf_strings[command].nonverbose != NULL)
data = smb_fdata(ndo, data, nbf_strings[command].nonverbose, data2, 0);
} else {
ND_PRINT((ndo, "%s:\n", nbf_strings[command].name));
if (nbf_strings[command].verbose != NULL)
data = smb_fdata(ndo, data, nbf_strings[command].verbose, data2, 0);
else
ND_PRINT((ndo, "\n"));
}
}
if (ndo->ndo_vflag < 2)
return;
if (data == NULL)
goto out;
if (is_truncated) {
/* data2 was past the end of the buffer */
goto out;
}
/* If this isn't a command that would contain an SMB message, quit. */
if (command != 0x08 && command != 0x09 && command != 0x15 &&
command != 0x16)
goto out;
/* If there isn't enough data for "\377SMB", don't look for it. */
if (&data2[3] >= maxbuf)
goto out;
if (memcmp(data2, "\377SMB",4) == 0)
print_smb(ndo, data2, maxbuf);
else {
int i;
for (i = 0; i < 128; i++) {
if (&data2[i + 3] >= maxbuf)
break;
if (memcmp(&data2[i], "\377SMB", 4) == 0) {
ND_PRINT((ndo, "found SMB packet at %d\n", i));
print_smb(ndo, &data2[i], maxbuf);
break;
}
}
}
out:
ND_PRINT((ndo, "\n"));
return;
trunc:
ND_PRINT((ndo, "%s", tstr));
}
/*
* print IPX-Netbios frames
*/
void
ipx_netbios_print(netdissect_options *ndo,
const u_char *data, u_int length)
{
/*
* this is a hack till I work out how to parse the rest of the
* NetBIOS-over-IPX stuff
*/
int i;
const u_char *maxbuf;
maxbuf = data + length;
/* Don't go past the end of the captured data in the packet. */
if (maxbuf > ndo->ndo_snapend)
maxbuf = ndo->ndo_snapend;
startbuf = data;
for (i = 0; i < 128; i++) {
if (&data[i + 4] > maxbuf)
break;
if (memcmp(&data[i], "\377SMB", 4) == 0) {
smb_fdata(ndo, data, "\n>>> IPX transport ", &data[i], 0);
print_smb(ndo, &data[i], maxbuf);
ND_PRINT((ndo, "\n"));
break;
}
}
if (i == 128)
smb_fdata(ndo, data, "\n>>> Unknown IPX ", maxbuf, 0);
}
| {
"pile_set_name": "Github"
} |
Mike McDonnell was a 10-year-old altar boy when he says a priest first molested him.
Now 49, he is one of more than 1,000 victims of an estimated 300 "predator priests" in Pennsylvania, figures revealed by a state grand jury earlier this month.
Following the grand jury report, McDonnell has revealed a motive for his 2011 conviction for stealing $100,000 from the Catholic church: Revenge.
The Philadelphia resident, who is the local leader of Survivors Network of those Abused by Priests (SNAP), said the theft, as well as his struggle with alcoholism, are connected to years of sexual abuse.
"Things would manifest themselves and I would be forced to let it out and look at that fear, anger and resentment," he told NBC News in an interview.
As a recovering alcoholic — he now works as a counselor at a drug and alcohol treatment program — McDonnell says it's his duty to come clean. "For me it's important to be honest and share that story," he said.
"I didn't run from this issue."
The Archdiocese of Philadelphia later paid for counseling sessions for McDonnell, and one of his alleged abusers was defrocked. But McDonnell said he still needed to steal. The abuse, he said, "provides the backdrop for what happened."
The issue for him now, following the release of the grand jury findings, is that the church hasn't faced its own consequences, he said. McDonnell says he served nearly a year's worth of "work release" monitoring on the job for his theft.
"I was held accountable," he said. "Why shouldn't they be held accountable."
McDonnell wants Pennsylvania to eliminate any statute of limitations for child sex crimes cases.
"I’m proud to stand with survivors and victims to seek justice and expose predators," he said. | {
"pile_set_name": "OpenWebText2"
} |
Search Categories
About Me
Hi, my name is Dr. Nancy, thank you for stopping by!
My eclectic professional background (a registered nurse, health educator, sex & relationship author, radio talk show host and yoga therapist) have served to heighten my passion as an International speaker and sensuality educator.
I'm here to help you find your path towards living authentically and joyfully. With Love, Dr. N | {
"pile_set_name": "Pile-CC"
} |
Crystal structure and luminescent properties of novel coordination polymers constructed with bifurandicarboxylic acid.
Four novel coordination polymers (CPs) assembled with [2,2'-bifuran]-5,5'-dicarboxylic acid (H2L) and metal ions ZnII, CdII or CoII have been successfully synthesized. Their molecular structures have been determined to be Zn(L)(H2O)2 (1), [Zn(L)(DMF)]2 (2), [Cd(L)(EtOH)(DMF)2]2 (3) and Co(L)(H2O)4·(H2O)2 (4) by crystallographic analysis. It is found that (2) exhibits a two-dimensional infinite framework, whereas the others exhibit a one-dimensional framework. Both (2) and (3) exhibit ligand-based emission which is blue-shifted compared with the emission from the H2L ligand. Time-resolved spectroscopic measurement reveals that the complexes exhibit a similar lifetime with that of the ligand, which confirms that the emission of the complexes originates from the ligand. | {
"pile_set_name": "PubMed Abstracts"
} |
Why the 'DWTS' Dances Were Super Hot This Week!
It's official. Sean Lowe danced his way out of the Dancing With the Stars competition. Sorry Sean, they'll be no roses for you! The reality TV star was partnered up with Peta Murgatroyd this season and did surprisingly well for a newbie dude on the dance floor. He really showed us that he could jam. At the end of the day, despite any sadness he may feel for losing, he should rejoice in the fact that the rumors about alleged romance between Peta will probably now fade.
Your Tango reminded us that Sean and Peta aren't the only ones who are hot on their feet. In a recent report, Your Tangorounded up the hottest moments from this week's competition. When your mind is set on Sean and Peta, you tend to forget all the other ones. The website actually mentioned the warm temperature in a literal sense and even talked about Aly Raisman's spicy dance moves. | {
"pile_set_name": "Pile-CC"
} |
<?php
/**
* Joomla! Content Management System
*
* @copyright Copyright (C) 2005 - 2017 Open Source Matters, Inc. All rights reserved.
* @license GNU General Public License version 2 or later; see LICENSE.txt
*/
namespace Joomla\CMS\Component\Router\Rules;
defined('JPATH_PLATFORM') or die;
/**
* RouterRules interface for Joomla
*
* @since 3.4
*/
interface RulesInterface
{
/**
* Prepares a query set to be handed over to the build() method.
* This should complete a partial query set to work as a complete non-SEFed
* URL and in general make sure that all information is present and properly
* formatted. For example, the Itemid should be retrieved and set here.
*
* @param array &$query The query array to process
*
* @return void
*
* @since 3.4
*/
public function preprocess(&$query);
/**
* Parses a URI to retrieve informations for the right route through
* the component.
* This method should retrieve all its input from its method arguments.
*
* @param array &$segments The URL segments to parse
* @param array &$vars The vars that result from the segments
*
* @return void
*
* @since 3.4
*/
public function parse(&$segments, &$vars);
/**
* Builds URI segments from a query to encode the necessary informations
* for a route in a human-readable URL.
* This method should retrieve all its input from its method arguments.
*
* @param array &$query The vars that should be converted
* @param array &$segments The URL segments to create
*
* @return void
*
* @since 3.4
*/
public function build(&$query, &$segments);
}
| {
"pile_set_name": "Github"
} |
Q:
Efficiently generating labels for timeseries data based on future timeseries data
I have two years worth of sensor data in a pandas dataframe. The index is a time series. Looks like this:
temp1 overtemp time_to_overtemp
datetime
2019-01-02 09:31:00 305.96
2019-01-02 09:32:00 305.98
2019-01-02 09:33:00 305.70
2019-01-02 09:34:00 305.30
2019-01-02 09:35:00 306.88
What I want to do is loop over the time series to populate the "overtemp" and "time_to_overtemp columns. "overtemp" needs to be assigned a 1 if the temperature data anytime in the next two weeks increases by more than 2%. "time_to_overtemp" needs to show the time of the next >2% reading, if it exists in the next two weeks. If the temperature says within 2% for the next two weeks, both columns should be assigned a 0.
For example 2019-01-02 09:31:00 should look at the next two weeks worth of temperature data and put a 0 in both columns because all data in that time period is within 2% of the value. The overtemp value for 2020-01-02 09:35:00 should be a 1 because the value increased by 5% a week later. The time_to_overtemp value should indicate 7 days, 2 hours, 38 minutes because thats when the overtemp occured.
I am successfully doing some more math stuff using iterrows:
for datetime, row in df.iterrows():
but its taking forever. And I am not getting how to do the time iterations and calculations at all yet.
I have done other labeling with:
df['overtemp'] = np.select([df['temp1']<305, df['temp1']>305], [1,0])
I guess this vectorizes the process? It sure works a lot faster than iterating. But I can't figure out how to implement the datetime+two week portion.
A:
Think you could do it with pandas rolling by applying funcs, here is my go, hope this is what you need:
# create random data
ind = pd.date_range(start = pd.to_datetime("2019-01-02 09:31:00"), periods=28*24*60, freq='min')
v = [random.randint(30000, 32000)/100 for x in ind]
df = pd.DataFrame(v, index=ind, columns = ['temp1'])
# define funcs
def overtemp(S):
l = S[S>=S[-1]*1.02]
if len(l)>0:
return l[-1]
else:
return 0
def overtemp_seconds(S):
l = np.argwhere(S.values>=S.values[-1]*1.02)
if len(l)>0:
i = l[-1][0]
delta = S.index[i] - S.index[-1]
return delta.seconds
else:
return 0
# apply funcs to time window (reversed cause rolling gives you time window till offset)
over_temp = df[::-1].rolling('14D').apply(overtemp)[::-1]['temp1']
seconds_to_over_temp = df[::-1].rolling('14D').apply(overtemp_seconds)[::-1]['temp1']
# add to orig df
df['over_temp'] = over_temp
df['seconds_to_over_temp'] = seconds_to_over_temp
| {
"pile_set_name": "StackExchange"
} |
NASA Spaceward Bound
The Spaceward Bound Program is an educational program developed at NASA Ames Research Center. More information here.
The objective is for participating scientific researchers, educators and students to visit remote and extreme environments in different parts of the world and conduct astrogeological/biological experiments, make observations and learn about the origin, sustenance and adaptation of living organisms within such biospheres.
Traditionally, after the scientific theme of the expedition has been defined, (for example, hot acidic lakes, cold-dry desert, hot-dry desert, etc.), a team consisting of scientists, educators and students visits the site, each with their own objectives to accomplish.
The scientists collect samples, conduct preliminary on-site sampling, make observations, and the work usually results in publish worthy data. The educators acts as science communicators and help bridge the scientists with the students and enable the participating students to observe and record important features and outcrops along the course of the expedition. The students absorb everything and engage in discussions with the scientists,sometimes also helping them conduct their experiments. | {
"pile_set_name": "Pile-CC"
} |
Anthropometric measurements and epithelial ovarian cancer risk in African-American and White women.
Previous studies of anthropometric factors and ovarian cancer risk have been inconsistent and none have evaluated the association among African-American women. Data from a population-based, case-control study of 593 cases and 628 controls were used to evaluate ovarian cancer risk in relation to weight, height, body mass index (BMI) and waist-to-hip ratio (WHR). Odds ratios (ORs) and 95% confidence intervals (CIs) were computed and established risk factors were adjusted for using logistic regression models, stratified by race. Among all races, weight at age 18, WHR, weight and BMI one year prior to interview were associated with elevated ovarian cancer risk. When stratified by race, the association between WHR and ovarian was similar among Whites and among African Americans. However, African-American women in the fourth quartile of height had an elevated risk of ovarian cancer (OR = 3.2; 95% CI = 1.3-7.8), but this risk was not apparent in Whites (OR = 1.0; 95% CI = 0.7-1.4). These findings support the hypothesis that obesity is an important risk factor of ovarian cancer among African-Americans and Whites and also suggest that height may be a risk factor specific to African-Americans. | {
"pile_set_name": "PubMed Abstracts"
} |
Linking performance to microbiology in biofilters treating dimethyl sulphide in the presence and absence of methanol.
The performance and microbiology of two inorganic biofilters treating dimethyl sulphide (DMS) in the presence and absence of methanol was investigated. Addition of methanol was shown to result in an increase in DMS removal for methanol loadings below 90 g MeOH per cubic metre per hour with the optimal methanol loading around 10-15 g MeOH per cubic metre per hour for a DMS loading of 3.4 g DMS per cubic metre per hour, a fivefold increase in the DMS removal rate compared to the biofilter treating DMS alone. Microbial community analysis revealed that the addition of methanol led to a significant increase of up to an order of magnitude in the abundance of Hyphomicrobium spp. in the biofilter co-treating DMS and methanol compared to the biofilter treating DMS alone, whilst there was no significant difference in the abundance of Thiobacillus spp. between the two biofilters. Given the behaviour of the biofilter co-treating DMS and methanol, the magnitude of the increase in Hyphomicrobium spp. in the biofilter co-treating DMS and methanol and the ability of Hyphomicrobium spp. to use both methanol and DMS as growth substrates, it was concluded that Hyphomicrobium spp. were the microorganisms responsible for the bulk of the DMS degradation in the biofilter co-treating DMS and methanol. | {
"pile_set_name": "PubMed Abstracts"
} |
. Let y(c) = -20*c - 5. Let a be y(x). Suppose -6 - a*u**3 + 15*u + 30*u**4 - 16*u**5 + 5*u**3 + 7*u**5 = 0. Calculate u.
-2/3, 1
Let x = 13 + -10. Factor -3*k**x + 8*k**2 - 3*k + k**3 + 0*k**2 - 3*k.
-2*k*(k - 3)*(k - 1)
Suppose -6*k**3 - 344/3*k + 52*k**2 - 2/3*k**4 + 80 = 0. Calculate k.
-15, 2
Let i = -2878 + 2882. What is s in 0 - 4/3*s**2 + 2/3*s**5 + 2*s + 4/3*s**i - 8/3*s**3 = 0?
-3, -1, 0, 1
Suppose 4*a**3 + a**5 - 4*a - 6*a + 2*a**2 + 5*a + 2 - a**4 - 3*a**4 = 0. Calculate a.
-1, 1, 2
Factor -120*w**2 + 110*w**3 - 13*w**5 - 40*w**4 - 28*w**5 + 46*w**5 + 45*w.
5*w*(w - 3)**2*(w - 1)**2
Let g be 2*-1 + (1760/108 - 14). Let z(r) be the first derivative of 4/9*r**2 - 7/18*r**4 + 0*r + 2 - g*r**3 - 4/45*r**5. Solve z(j) = 0 for j.
-2, 0, 1/2
Let x(n) = -n**3 - n**2 - 2*n. Let a be x(-2). Suppose 0 = -0*f - 4*f + a. Factor -3*y**4 + 2*y**5 - f + 2 + y**4.
2*y**4*(y - 1)
Suppose -5/8*b**4 + 13/8*b**2 - 9/8*b**3 - 1 + 3/8*b**5 + 3/4*b = 0. Calculate b.
-4/3, -1, 1, 2
Let p = 4 - 1. Suppose -7*y + 24 = -p*y. Factor 0*b**4 + y*b**2 - 4*b**2 + 2*b**4 - 4*b**3.
2*b**2*(b - 1)**2
Let x be 2 - ((-2)/(-7) - 60/(-35)). Let l(r) be the first derivative of -2*r**2 - 7/4*r**4 + 2 - 16/3*r**3 + x*r. Factor l(t).
-t*(t + 2)*(7*t + 2)
Let v(j) be the first derivative of -j**5/35 + 3*j**4/28 + 23*j**3/21 + 33*j**2/14 + 2*j + 356. Factor v(c).
-(c - 7)*(c + 1)**2*(c + 2)/7
Let t = 7 - 2. Suppose -7 = t*p - 17. Factor 8 + 67*k + 189*k**p - 4*k**2 + 153*k**2 - 171*k.
2*(13*k - 2)**2
Let j be ((-234)/(-5) - 4)*-5. Let n = -640/3 - j. Factor -n*z**2 + 1/3*z + 0 + 1/3*z**3.
z*(z - 1)**2/3
Let n(b) be the second derivative of -1/42*b**4 - 1/42*b**3 + 0 - 37*b + 5/7*b**2. Solve n(l) = 0.
-5/2, 2
Suppose 99/5*g - 6*g**3 - 6/5*g**4 + 54/5 + 24/5*g**2 + 3/5*g**5 = 0. Calculate g.
-2, -1, 3
Let v(y) be the third derivative of y**5/20 + 5*y**4/8 + 3*y**3 - 4*y**2 - 26*y. What is a in v(a) = 0?
-3, -2
Suppose 0 = s + 5*s - 18. Suppose -2*d + s*d + 0*d = 0. Factor d - 2/9*f + 2/9*f**3 + 0*f**2.
2*f*(f - 1)*(f + 1)/9
Let s(x) = 9*x**3 + 133*x**2 + 38*x - 8. Let p(f) = 46*f**3 + 664*f**2 + 190*f - 44. Let a(o) = 6*p(o) - 33*s(o). Factor a(l).
-3*l*(l + 19)*(7*l + 2)
Let w(d) be the third derivative of 0*d + 0 - 9*d**2 - 1/450*d**5 + 1/180*d**4 + 0*d**3. Factor w(l).
-2*l*(l - 1)/15
Let a(d) be the third derivative of d**8/784 - d**7/98 - d**6/35 + 3*d**5/35 - 2*d**2 - 33. Suppose a(p) = 0. Calculate p.
-2, 0, 1, 6
Let p(v) be the first derivative of v**6/120 + 3*v**5/20 - 7*v**4/8 - 22*v**3/3 - 15. Let m(a) be the third derivative of p(a). What is g in m(g) = 0?
-7, 1
Let s = -28 + 16. Let a = s - -26. Let 6 - a*g**2 - 12*g**2 - 2*g**2 + g**2 + 15*g + 21*g**4 - 15*g**3 = 0. What is g?
-1, -2/7, 1
Suppose 0 = -4*c - 0*c + 5*t + 24, 2*t - 24 = -4*c. Suppose -9*o = -0*o - c*o. Factor 2*y**2 + 0*y + o - 2/3*y**3.
-2*y**2*(y - 3)/3
Let j(c) be the first derivative of -3*c**4/4 - 6*c**3 - 15*c**2/2 - 675. Factor j(k).
-3*k*(k + 1)*(k + 5)
Let n(m) = m**3 - 83*m**2 + 161*m + 83. Let x be n(81). Factor 3*r**4 - 3*r**x - 5/2*r + 0 + 2*r**3 + 1/2*r**5.
r*(r - 1)*(r + 1)**2*(r + 5)/2
Suppose 33*j - 40*j = -12*j + 15. What is k in 4/9*k**4 + 0 + 8/9*k**2 + 0*k - 4/3*k**j = 0?
0, 1, 2
Let y be (3/(-2))/(36/(-96)). Factor y*u**4 - u**5 - u**5 - 2*u**2 + 4*u**2 + 2*u**3 - 6*u**4.
-2*u**2*(u - 1)*(u + 1)**2
Let a(w) be the third derivative of -w**5/210 - 16*w**4/21 - 1024*w**3/21 + 118*w**2. Let a(m) = 0. What is m?
-32
Let f be (-194)/(-22) + 26/143. Factor -h + 3*h + 8 - 6*h**2 - h - f*h.
-2*(h + 2)*(3*h - 2)
Let l(s) = -40*s - 38. Let j be l(-1). Let a(i) be the first derivative of 5/6*i**4 + 0*i + 8/15*i**5 + 0*i**j + 4/9*i**3 + 1/9*i**6 + 3. Factor a(y).
2*y**2*(y + 1)**2*(y + 2)/3
Let k = -6/577 - -1292/13271. Factor -2/23*c**5 + 0 + 0*c**2 + 0*c**4 + 4/23*c**3 - k*c.
-2*c*(c - 1)**2*(c + 1)**2/23
Let l = -4/141 + 149/282. Let y(f) be the first derivative of l*f**4 + 0*f + 14/45*f**5 + 4 + 0*f**2 + 4/27*f**3. Determine v so that y(v) = 0.
-1, -2/7, 0
Let r(c) = -3*c**3 - 192*c - 10*c**3 + 204*c + c**2. Let h(g) = 3*g**3 - 3*g. Let z(d) = 9*h(d) + 2*r(d). Let z(l) = 0. Calculate l.
-3, 0, 1
Let c(k) = -k**2 - 8*k + 10. Let i(b) = 6*b + 15. Let m be i(-4). Let v be c(m). Find g, given that -v + 3/2*g - 1/2*g**2 = 0.
1, 2
Suppose 4*u = -20, 2*u + 14 = n - 0*n. Let o be 1 - (-6)/(-15)*10/n. Factor 2/3*d**2 - 1/3*d**4 + 0*d + o - 1/3*d**3.
-d**2*(d - 1)*(d + 2)/3
Let m be (-112)/(-168) - (-3 + 26/12). Factor -m - k + 1/2*k**2.
(k - 3)*(k + 1)/2
Let o(b) be the first derivative of 34*b**3/15 - 11*b**2/5 - 12*b/5 + 141. Factor o(p).
2*(p - 1)*(17*p + 6)/5
Let j(w) be the second derivative of 32/15*w**6 + 4/5*w**5 + 2*w + 2/3*w**7 + 0 - 14/3*w**4 - 22/3*w**3 - 4*w**2. Solve j(n) = 0 for n.
-1, -2/7, 1
Find s such that 3/5*s**4 - 6/5*s**2 + 11/5*s**3 + 0 - 8/5*s = 0.
-4, -2/3, 0, 1
Let o be (-636)/30 - 1/(5/4). Let t = -20 - o. Find p such that -8/7*p + 8/7 + 2/7*p**t = 0.
2
Let j(s) be the first derivative of 2*s**5/45 - 7*s**4/18 - 2*s**3/9 + 55*s**2/9 + 100*s/9 + 957. Factor j(w).
2*(w - 5)**2*(w + 1)*(w + 2)/9
Let i(a) = -2*a**4 - 264*a**3 + 8448*a**2 + 17692*a + 8978. Let c(b) = 3*b**4 + 264*b**3 - 8449*b**2 - 17693*b - 8978. Let r(q) = -4*c(q) - 5*i(q). Factor r(z).
-2*(z - 67)**2*(z + 1)**2
Suppose 5*o - 8 = o. Let l(m) = -2*m**3 + 2*m**2 - m - 3. Let g be l(-1). What is k in 3*k + 4*k**g - o*k - 5*k = 0?
0, 1
Suppose 13*z + 6*z = 9*z. Let m(j) be the second derivative of 1/12*j**3 + 1/48*j**4 + z + 3*j + 0*j**2. Factor m(a).
a*(a + 2)/4
Suppose -4*v = 3*x - 28, 16*x + 2*v = 12*x + 24. Suppose -2/3*j**2 + 4/9 - 2/9*j**3 + 2/9*j + 2/9*j**x = 0. Calculate j.
-1, 1, 2
Let f(j) be the first derivative of -j**7/280 + j**5/10 + 8*j**3/3 - 3*j + 16. Let u(q) be the third derivative of f(q). What is d in u(d) = 0?
-2, 0, 2
Let y(q) be the first derivative of -q**5/15 + q**4 - 16*q**3/3 + 7*q**2/2 - 28. Let c(f) be the second derivative of y(f). Find v, given that c(v) = 0.
2, 4
Factor -1/6*j**5 - 61/6*j**3 + 0 - 6*j + 14*j**2 + 7/3*j**4.
-j*(j - 6)**2*(j - 1)**2/6
Let w(y) be the first derivative of 5 + 1/27*y**3 + 1/108*y**4 + 0*y - 1/540*y**6 - 2*y**2 - 1/270*y**5. Let t(h) be the second derivative of w(h). Factor t(i).
-2*(i - 1)*(i + 1)**2/9
Let b(z) be the third derivative of z**8/33600 + z**7/3150 - 11*z**4/6 + 3*z**2. Let r(p) be the second derivative of b(p). Factor r(o).
o**2*(o + 4)/5
Let b(w) be the third derivative of 0*w**3 + 1/10*w**5 + 0*w + 31*w**2 - 1/40*w**6 + 0*w**4 + 0. Factor b(j).
-3*j**2*(j - 2)
Let x(g) = 3*g**4 + 12*g**3 + 3*g**2 - 32*g - 18. Let j(p) = 14*p**4 + 49*p**3 + 12*p**2 - 130*p - 71. Let i(q) = 2*j(q) - 9*x(q). Let i(h) = 0. What is h?
-1, 2, 10
Let o(x) be the first derivative of 2*x**5/5 - 19*x**4 + 214*x**3 + 760*x**2 + 800*x + 39. Factor o(v).
2*(v - 20)**2*(v + 1)**2
Factor -2/3*l**3 + 50*l**2 + 0*l + 0.
-2*l**2*(l - 75)/3
Let z = -19 + 15. Let m(v) = v**4 - 4*v**3 + 3*v**2 + 4*v + 4. Let s(c) = -2*c**4 + 4*c**3 - 4*c**2 - 5*c - 5. Let d(a) = z*s(a) - 5*m(a). Factor d(o).
o**2*(o + 1)*(3*o + 1)
Let m = -32 + 34. Factor -14*a**2 - 2*a**3 + 34*a**m - 4*a**3 + a**3 + 25*a.
-5*a*(a - 5)*(a + 1)
Let b(k) = 8*k**2 + 41*k + 15. Let t(m) = 23*m**2 + 122*m + 45. Let f(u) = 17*b(u) - 6*t(u). Let d be f(-17). Let 8/11 - 8/11*y + 2/11*y**d = 0. What is y?
2
Suppose -3*b - 8 = -5*b. Suppose -t = 2*j + 3*j + 19, -4*j - 20 = -b*t. Factor 4*d + d**2 + 0*d**2 + t - 2*d.
(d + 1)**2
Determine j so that -624*j - 90 + 25*j**2 - j**2 - 84*j**4 + 40 + 844*j**3 - 142 + 32 = 0.
-2/3, -2/7, 1, 10
Let y(o) be the first derivative of 3/7*o**4 + 2/35*o**5 + 10/7*o**2 + 17 + 6/7*o + 8/7*o**3. Let y(j) = 0. Calculate j.
-3, -1
Let g(r) be the second derivative of 17*r - 3/8*r**5 + 5/4*r**3 + 65/72*r**4 - 11/36*r**6 - 5/6*r**2 + 0. Suppose g(a) = 0. Calculate a.
-1, 2/11, 1
Let u(k) be the second derivative of k**5/4 - 235*k**4/12 - 5*k**3/6 + 235*k**2/2 - 182*k - 1. Factor u(q).
5*(q - 47)*(q - 1)*(q + 1)
Suppose c = 5*p - 15, -25 = 6*p - 11*p - c. Let t(x) be the third derivative of 0*x - 1/120*x**5 - 6*x**2 + 0 + 0*x**p + 1/3*x**3. Solve t(n) = 0.
-2, 2
Let z = -18 + 20. Suppose 3 = s - u - 1, -z*s + u = -13. Suppose -5*n**4 - 3*n**4 + 29*n**3 - 13*n**3 + 8*n**2 - 4*n - 3*n** | {
"pile_set_name": "DM Mathematics"
} |
Search results
Sarah Grossman had just finished up her honor's thesis on community concessions in Guatamala's Island of Flores/la Isla de Flores and Tikal National Park regions. Dr. Brent Sohngen shares that "her work represented an amazing effort by an i ...
AEDE Faculty Interviews Unemployment Rates Rise Due to Coronavirus Economy Drs. Mark Partridge and Ian Sheldon discuss the recent rise in unemployment rates due to the global pandemic. The dialogue offers insight into the realities of the pandemic and som ...
Economic Value of Natural Areas in Ohio Click on the WEBINAR to view the webinar presented in fall of 2019. Read the Economic Value of Natural Areas in Ohio Report. Ohio State Insights- November 2019 How Outdoor Activities Contribue to Ohio's Econ ... | {
"pile_set_name": "Pile-CC"
} |
1. Field of the Invention
The present invention relates to a plastic spectacles lens containing an organic dye instead of a neodymium compound having optical absorbing performance. The plastic spectacles lens of the present invention exhibits optical transmission equivalent to a plastic spectacles lens containing a neodymium compound.
2. Description of Related Art
Reducing a displeasing feeling relevant to dazzle by visible rays, an indistinctness of contrast, visual fatigue, and the like, is one application object of a spectacles lens. As one of the measures, a spectacles lens is provided with a dazzle-preventing function. A principal measure is to shade dazzling wavelength rays as selectively as possible. In practice, a spectacles lens containing a neodymium compound which can highly selectively absorb visible rays near a wavelength of 585 nm is used. Such a spectacles lens can effectively prevent dazzle.
This technique is based on the principle of providing the spectacles lens with an appropriate light blocking effect. Excessive shading or blocking rays with inappropriate wavelength may, however, unnecessarily impair visibility which is the original objective of the spectacles lens. Thus, a technique capable of maintaining visibility as satisfactory as possible, and, at the same time, providing the spectacles lens with an appropriate light blocking effect is desired.
A method of adding a rare earth metal compound, particularly a neodymium compound, with an objective of providing a dazzle-preventing effect and increasing contrast, is widely used, as mentioned above. It is worth noting that a rare earth metal compound has a very sharp peak in the absorption spectrum in the wavelength band of the visible ray region, that is, the rare earth metal compound has a narrow absorption wavelength region and is wavelength-selective. The absorption peak of a neodymium compound, for example, near 585 nm wavelength is also very sharp.
This characteristic of possessing a sharp absorption peak contributes to the high optical transmission in the wavelength band required for visibility and also to selective absorption of rays in the wavelength band exhibiting a dazzling effect. Thus, the neodymium compound provides the spectacles lens with both a dazzle-preventing effect- and visibility. The glass containing a neodymium compound has extremely desirable properties as a dazzle-preventing spectacles lens.
A method of adding a rare earth metal oxide to a glass lens as disclosed in Patent Document 1 has been generally employed for manufacturing a rare earth metal compound-containing lens. In accordance with the trend of switching the lens material from glass to plastic, a plastic lens containing a specific organic rare earth metal complex has been developed.
However, the method of incorporating an organic rare earth metal complex into a plastic lens material leaves many problems to be solved. In the first place, selection of the organic moiety in the organic rare earth metal complex is considerably restricted according to the lens material. Only an expensive organic rare earth metal complex can be used in many cases. In particular, in the case of a thiourethane lens, a common organic rare earth metal complex can be used only with difficulty due to poor solubility and dispersibility in the resin, undesirable reactivity with the lens resin, and poor storage stability under ordinary conditions. Only a very specific organic rare earth metal complex as in Patent Document 2 has been disclosed, but the disclosed technology still leaves many problems to be solved.
In the second place, an organic rare earth metal complex must be added in an amount usually of about 5 wt % in order to achieve low light transmission rate (a high light blocking effect) to the light in the above-mentioned wavelength band. It is necessary to use a large amount of an expensive organic rare earth metal complex, but on the other hand, the amount of organic rare earth metal complex must be controlled so as not to impair the mechanical characteristics of the lens.
In view of this technological background, various methods of providing a plastic lens with a function of shading the light with a specific wavelength band as selectively as possible have been disclosed. For example, Patent Document 3 discloses a method of dying the lens by immersing the lens in an aqueous solution of a dye after molding, in order to provide dazzle-preventive properties, and Patent Documents 4, 5, and 6 disclose a method of curing a monomer after adding a cobalt compound or a specific organic dye to the monomer.
However, the dyes or compounds added in the method of Patent Documents 3 to have an absorption band different from the wavelength band of the neodymium compound. In addition, some compounds have an extremely wide absorption band that unnecessarily blocks light in other visible regions in order to attain an effective dazzle-preventing effect, with a result of undue sacrifice of visibility.
Patent Document 6 describes a lens with minimum optical transrmission close to 550 to 630 nm prepared by introducing a dye by a staining technique as a comparative example to the lens containing a neodymium compound. A defect of the technique of unduly decreasing clarity as compared with the case in which a neodymium compound is used is indicated.
Patent Document 7 discloses dazzle-preventing spectacles lens containing an organic dye which has a maximum absorption index near 575 nm and a comparatively sharp peak width. The lens is drastically improved in the absorption wavelength region, as well as in the above-mentioned region width, over the lenses disclosed in Patent Documents 3 to 6.
However, when the target level is achieved by the use of a neodymium compound, the absorption band narrowness is particularly insufficient not only in terms of providing the lens with brightness, but also in terms of providing the lens with various color tones such as a gray tone and a brown tone commonly used in commercial sunglasses. Thus, the proposed organic dyes have a problem of imposing a certain restriction to the commonly used technique of providing the lens with the target color tone by a combined use of other dyes.
In sunglasses or dark spectacles lenses to protect the eyes from environment light and to reduce a displeasing feeling, lenses with various color tones are used according to the use environment and user's demands. The technique of mixing two or more dyes to obtain the target color tone is usually employed. When the target color tone is produced by mixing dyes while maintaining the selective light absorption characteristics in a specific visible ray wavelength region as in the case of the present invention, a light absorption factor in a wavelength band other than the required selective light wavelength is preferably as small as possible, that is, the light absorption peak width is preferably as sharp as possible, in order to ensure a simple combination of dyes, a wide target color tone, and a color tone with little dullness.
Thus, it can be understood that a drawback common to the methods of staining a plastic lens with an organic dye replacing a neodymium compound is the extremely wide absorption band, and for this reason, it has been difficult to provide a lens with a superior dazzle-preventing effect and visibility, and excellent color-tone setting properties comparative to a rare earth metal.
[Patent Document 1] Japanese Patent No. 3044017
[Patent Document 2] WO 96/00247
[Patent Document 3] Examined Patent Publication No. 53-39910
[Patent Document 4] Japanese Patent Application Laid-open No. 5-5860
[Patent Document 5] Japanese Patent Application Laid-open No. 5-45610
[Patent Document 6] Japanese Patent Application Laid-open No. 2-254401
[Patent Document 7] Japanese Patent No. 3718185 | {
"pile_set_name": "USPTO Backgrounds"
} |
1. Introduction {#sec1-metabolites-09-00163}
===============
The human food market for oat is increasingly important as the consumers gradually recognize its health benefits \[[@B1-metabolites-09-00163]\]. Oat is considered as a healthy grain primarily due to the presence of β-glucan, a mixed-linkage (β1→3, β1→4) glucose polymer that can reduce the risk of heart diseases by lowering blood cholesterol levels \[[@B2-metabolites-09-00163]\]. In addition, oat grain contains a higher level of nutritious storage proteins than other cereals, as it is the only cereal crop that contains avenalin as the major storage protein, a legumin-like globulin equivalent in nutritional quality to soybean proteins \[[@B3-metabolites-09-00163]\]. Furthermore, oat contains avenanthramides, a group of polyphenolic compounds that possess strong antioxidant, anti-inflammatory, and anti-cell-proliferating properties that have been linked to the prevention of cardiovascular diseases, and the protection of human skin \[[@B4-metabolites-09-00163],[@B5-metabolites-09-00163],[@B6-metabolites-09-00163],[@B7-metabolites-09-00163]\].
Avenanthramides were first identified as phytoalexins in oat leaves infected by pathogenic fungus *Puccina coronata* \[[@B8-metabolites-09-00163]\], but they were later found at significant levels in oat grains \[[@B9-metabolites-09-00163],[@B10-metabolites-09-00163]\]. Avenanthramides are a group of *N*-cinnamoylanthranilic acids comprising anthranilic acid and cinnamic acid linked by an amide bond \[[@B11-metabolites-09-00163]\]. Due to the presence of various substituted groups on the two components, more than 25 different types of avenanthramides have been detected in oat grains. However, the most abundant ones are three comprising 5-hydroxyanthranilic acid conjugated with caffeic acid (as avenanthramide-C or Avn-C), *p*-coumaric acid (as avenanthramide-A or Avn-A) or ferulic acid (as avenanthramide-B or Avn-B) \[[@B9-metabolites-09-00163]\].
Despite the health importance of avenanthramides, the biosynthesis of these compounds in oat has not been completely understood. Previous reports indicate that avenanthramides are synthesized through a condensation process of hydroxyanthranilic acid with hydroxycinnamoyl-CoA and related species, which is catalyzed by hydroxycinnamoyl-CoA:hydroxyanthranilate *N*-hydroxycinnamoyltransferase (HHT), an anthranilic acid acyl-CoA dependent acyltransferase. HHT is homologous to hydroxycinnamoyl-CoA:shikimate/quinate hydroxycinnamoyl transferase (HCT) catalyzing the coupling of *p*-coumaroyl-CoA with shikimate/quinate \[[@B12-metabolites-09-00163],[@B13-metabolites-09-00163],[@B14-metabolites-09-00163],[@B15-metabolites-09-00163]\]. Both HHT and HCT belong to the BAHD acyltransferase family where two more acetyltransferases benzylalcohol *O*-acetyltransferase (BEAT) and deacetylvindoline 4-*O*-acetyltransferase (DAT) are also included to catalyze the formation of a diverse group of plant metabolites using CoA thioesters as acyl donors \[[@B14-metabolites-09-00163]\]. In particular, HCT is a sub-family of well-conserved enzymes among land plants participating in the biosynthesis of lignins and flavonoids that function by acylating a wide range of aroyl group-containing substrates to appropriate acceptors \[[@B13-metabolites-09-00163],[@B16-metabolites-09-00163],[@B17-metabolites-09-00163],[@B18-metabolites-09-00163],[@B19-metabolites-09-00163]\]. Therefore, acyl donors such as hydroxycinnamoyl-CoA and derivatives, precursors for the biosynthesis of avenanthramides are probably diverged from the phenylpropanoid pathway and their biosynthesis may require 4-coumarate: CoA ligase (4CL) for the activation of aroyl group-containing substrates to the corresponding thioesters for the subsequent condensation process \[[@B20-metabolites-09-00163],[@B21-metabolites-09-00163],[@B22-metabolites-09-00163]\]. In addition, the exact mechanism for the biosynthesis of Avn-B has not been conclusively determined, although this avenanthramide might be synthesized by the same HHT using *p*-coumaroyl-CoA and feruloyl-CoA as substrates \[[@B12-metabolites-09-00163],[@B13-metabolites-09-00163]\]. The incomplete and inconclusive information on the biosynthesis of avenanthramides has hindered genetic improvement of this important nutritional trait in oat.
In the present study, we report the identification and characterization of the genes involved in the biosynthesis of oat major avenanthramides. An oat 4CL converts hydroxy or methoxy cinnamic acid derivatives to their corresponding thioesters. Oat HHTs are involved in the biosynthesis of Avn-A and Avn-C by the condensation of hydroxyanthranilic acid with *p*-coumaroyl-CoA and caffeoyl-CoA, respectively. Avn-B is synthesized by methylation of the hydroxyl group at position 3 of the aroyl group in Avn-C by a CCoAOMT enzyme. Elucidation of the biosynthesis of the major avenanthramides would facilitate breeding efforts to improve this important nutritional trait by functional DNA markers-assistant breeding in oat.
2. Results {#sec2-metabolites-09-00163}
==========
2.1. Identification and Functional Analysis of Genes Encoding 4CLs in the Biosynthesis of Hydroxycinnamate Thioesters {#sec2dot1-metabolites-09-00163}
---------------------------------------------------------------------------------------------------------------------
Avenanthramides are the condensed products of anthranilic acid and hydroxycinnamic acid using hydroxycinnamoyl-CoA as an acyl donor and anthranilate as an acyl acceptor. The biosynthesis of hydroxycinnamoyl-CoAs is generally believed to be catalyzed by 4-coumarate-CoA ligase (4CL) converting hydroxycinnamic acids to corresponding thioesters \[[@B23-metabolites-09-00163]\]. To identify genes encoding this enzyme in oat, an *Arabidopsis thaliana* 4CL was used as a query to search a transcriptome database of oat developing seeds \[[@B24-metabolites-09-00163]\]. Two candidate genes (As4CL1 and As4CL2) coding for putative 4CL were identified. Sequence analysis of these two genes revealed that they shared high sequence identity with each another throughout the open reading frame (ORF), except for the middle region where an insertion of a few nucleotides occurred in As4CL2, which resulted in the considerable difference in amino acid sequences of the region ([Supplementary Figure S1](#app1-metabolites-09-00163){ref-type="app"}). As4CL1 was much close to putative 4CL enzymes from other grass plants and further chosen for enzyme assay. Functional analysis of As4CL1 by in vitro assays using the purified protein expressed in *E. coli* showed that the enzyme could convert three substrates, ferulic acid, *p*-coumaric acid and caffeic acid, to their corresponding thioesters. Under the assay conditions with one hour reaction time and the same concentration of substrates, over 90% of ferulic acid, 62% of *p*-coumaric acid and 52% of caffeic acid were converted to their corresponding CoA thioesters, respectively ([Figure 1](#metabolites-09-00163-f001){ref-type="fig"}). On the contrary, no product was found by boiled As4CL1 proteins with corresponding precursors ([Supplementary Figure S2](#app1-metabolites-09-00163){ref-type="app"}).
2.2. Identification and Functional Analysis of New Genes Encoding HHT in the Biosynthesis of Avn-A and Avn-C {#sec2dot2-metabolites-09-00163}
------------------------------------------------------------------------------------------------------------
Three genes encoding HHT (AsHHT1-3) in the biosynthesis of avenanthramides were previously identified in oat \[[@B13-metabolites-09-00163]\]. Encoded isozymes AsHHT1-3 shared very high amino acid identity (from 95% to 98%). By searching the oat seed transcriptome \[[@B24-metabolites-09-00163]\] using these sequences as queries, three new HHT genes (AsHHT4-6) were identified that shared high sequence identity with each other (about 95%) but were somewhat more distinct to AsHTT1-3 sharing about 82% amino acid identity with them ([Supplementary Figure S3](#app1-metabolites-09-00163){ref-type="app"}). Representing each group, AsHHT1 and AsHHT4 were expressed in *E. coli*. Both purified enzymes could catalyze the condensation of 5-hydroxyanthranilic acid and *p*-coumaroyl-CoA, producing a product with the retention time identical to standard Avn-A (as shown in [Figure 2](#metabolites-09-00163-f002){ref-type="fig"}A for AsHHT1). Mass spectrum analysis confirmed the authenticity of the product on the basis of the molecular ion at *m*/*z* 298.1 and a fragment at *m*/*z* 254.0 yielded by the removal of carboxylic group ([Supplementary Figure S4A](#app1-metabolites-09-00163){ref-type="app"}). In addition, both enzymes could also condense 5-hydroxyanthranilic acid and caffeoyl-CoA to a product with the retention time and mass spectra identical to standard Avn-C ([Figure 2](#metabolites-09-00163-f002){ref-type="fig"}C, and [Supplementary Figure S4B](#app1-metabolites-09-00163){ref-type="app"}). In contrast, no HHT activity was detected with boiled enzymes ([Figure 2](#metabolites-09-00163-f002){ref-type="fig"}B,D). Surprisingly, when feruloyl-CoA and 5-hydroxyanthranilic acid were supplied, no new product was produced by the two enzymes, indicating AsHHTs were incapable of synthesizing Avn-B by condensation of the two perceived substrates (data not shown).
2.3. Identification and Functional Analysis of a Gene Encoding a CCoAOMT Enzyme in the Biosynthesis of Avn-B {#sec2dot3-metabolites-09-00163}
------------------------------------------------------------------------------------------------------------
As AsHHTs appeared not involved in the biosynthesis of Avn-B, we hypothesized that this avenanthramide might be synthesized by a different mechanism. A previous study showed that one of the major metabolites in mice fed with Avn-C was identified as Avn-B \[[@B25-metabolites-09-00163]\]. As caffeoyl-CoA *O*-methyltransferases could methylate a wide range of substrates, we assumed that this type of *O*-methyltransferases might be able to convert Avn-C to Avn-B by methylation. To test the hypothesis, we identified a single CCoAOMT gene from the oat transcriptome database \[[@B24-metabolites-09-00163]\] with an ORF) 768 nucleotides encoding 256 amino acids. In vitro assays of this gene using the purified protein expressed in *E. coli* in the presence of S-adenosyl methionine showed that the enzyme indeed could convert Avn-C to a product with retention time and mass spectra identical to Avn-B ([Figure 3](#metabolites-09-00163-f003){ref-type="fig"}A). To examine the substrate specificity, three possible substrates, Avn-C, caffeoyl-CoA and caffeic acid, were employed for kinetic analysis, which showed that the CCoAOMT enzyme exhibited activity towards all three substrates tested. However, the most preferred substrate was Avn-C compared to caffeoyl-CoA and caffeic acid. The ratio of Vmax to Km was 3.08 with Avn-C, five or ten times higher than those with caffeoyl-CoA and caffeic acid (0.70 and 0.31), respectively ([Table 1](#metabolites-09-00163-t001){ref-type="table"}, and [Supplementary Figure S5](#app1-metabolites-09-00163){ref-type="app"}). These results clearly indicate that Avn-B can be synthesized from Avn-C through the methylation process catalyzed by this CCoAOMT enzyme.
CCoAOMTs were identified and functionally analyzed from a variety of plants species. They were highly conserved in residues involved in the binding of *S*-Adenosyl-L-methionine (SAM), and metal ion. Two residues proximal to the active site, lysine and aspartic acid located in the C-terminal region, are involved in substrate binding and catalysis \[[@B26-metabolites-09-00163]\]. In addition, a loop structure at the C-terminus is probably involved in the recognition of substrates \[[@B27-metabolites-09-00163]\]. To confirm the importance of these residues in the oat CCoAOMT enzyme, two conserved residues at the presumed active sites (K174, D246) and one residue (A209) in the loop region possibly responsible for substrate recognition were mutagenized ([Figure 4](#metabolites-09-00163-f004){ref-type="fig"}A). Neither mutation impacted heterologous expression in *E. coli* ([Figure S6](#app1-metabolites-09-00163){ref-type="app"}), but mutation of either lysine at 174 or aspartic acid at 246 to alanine completely abolished enzyme activity towards all three substrates ([Figure 4](#metabolites-09-00163-f004){ref-type="fig"}B--D), which coincides with the previous result that these two residues are likely involved in the catalysis \[[@B26-metabolites-09-00163]\]. The mutation of alanine 209 to aspartic acid, the corresponding residue in a sorghum CCoAOMT with substrate specificity to caffeoyl-CoA, seemed to decrease the activity towards Avn-C, and increase the activity towards caffeoyl-CoA and caffeic acid slightly. However, this change was not statistically significant.
3. Discussions {#sec3-metabolites-09-00163}
==============
Avenanthramides are a group of phenolic compounds found almost exclusively in oat. Three major avenanthramides in oat are conjugates of hydroxycinnamic acid; *p*-coumaroyl-CoA (Avn-A), feruloyl-CoA (Avn-B) and caffeoyl-CoA (Avn-C). The biosynthesis of these compounds was previously believed to be catalyzed by a single enzyme called hydroxycinnamoyl CoA:hydroxyanthranilate *N*-hydroxycinnamoyl transferase (HHT) by the condensation of hydroxyanthranilate and substituted cinnamoyl-CoA thioesters \[[@B12-metabolites-09-00163],[@B13-metabolites-09-00163]\]. However, our enzymatic assays with two oat HHT proteins demonstrated that the enzymes catalyzed the N-acylation of 5-hydroxyanthranilic acid with *p*-coumaroyl-CoA or caffeoyl-CoA, but not with feruloyl-CoA, indicating that oat HHTs are only involved in the biosynthesis of Avn-A and Avn-C, but not Avn-B. A previous in vitro assay using crude protein extracts from oat showed that Avn-B was produced in the presence of 5-hydroxyanthranilic acid and feruloyl-CoA \[[@B12-metabolites-09-00163]\]. As oat crude protein extracts contain numerous enzymes, this result could arise from other enzymatic activities in the extract. In addition, when oat AsHHT1 was expressed in *E. coli*, in vitro assays using the crude protein extracts detected a low level of activity for the synthesis of Avn-B in the presence of 5-hydroxyanthranilic acid and feruloyl-CoA \[[@B13-metabolites-09-00163]\]. However, our in vitro assays using purified proteins of AsHHT1 and AsHHT4 expressed in *E. coli* showed that both could not catalyze the condensation of 5-hydroxyanthranilic acid and feruloyl-CoA, giving rise to Avn-B. The reason why the different results were obtained by the two experiments on the same gene is currently unknown. The possible explanation is that the low level of activity might also be derived from other factors in the crude proteins from the expression host in the previous experiment.
As oat HHTs are only responsible for the synthesis of Avn-A and Avn-C, the next question would be identifying the biosynthetic mechanism for Avn-B. In consideration of the structural difference of Avn-C and Avn-B, we assumed that certain CCoAOMT would be able to convert Avn-C to Avn-B by methylation as this enzyme is known to have a wide range of substrates. In fact, a previous feeding study showed that one of the major metabolites from Avn-C in mice was Avn-B \[[@B25-metabolites-09-00163]\]. Indeed, when a CCoAOMT enzyme from oat was expressed in *E. coli*, the purified protein was capable of the synthesis of Avn-B on Avn-C in the presence of *S*-adenosyl methionine, indicating that Avn-B is synthesized by the *O*-methylation of Avn-C catalyzed by this CCoAOMT enzyme.
In plants, there are two types of *O*-methyltransferases responsible for methylating hydroxyl groups at the 3- and 5-positions of a phenolic ring. The first type called caffeic acid *O*-methyltransferase (COMT) is larger in size (38--43 kD) with methylation activity mainly on caffeic acid and related species \[[@B28-metabolites-09-00163],[@B29-metabolites-09-00163]\], while the second type called caffeoyl-CoA *O*-methyltransferase (CCoAOMT) is smaller in size (23--27 kD) and has methylation activity mainly for caffeoyl-CoA and its derivatives \[[@B30-metabolites-09-00163],[@B31-metabolites-09-00163]\]. The oat O-methyltransferase with Avn-B synthetic activity belongs to the type II O-methyltransferase (CCoAOMT) \[[@B30-metabolites-09-00163],[@B31-metabolites-09-00163]\]. The residues involved in the binding of SAM and a metal ion, and proximal to the active site for catalysis \[[@B26-metabolites-09-00163]\], and the loop structure for the recognition of substrates were highly conserved \[[@B27-metabolites-09-00163]\]. In our assays, mutations of two conserved residues lysine and aspartic acid proximal to the active site to alanine completely abolished the catalytic activity of the oat CCoAOMT enzyme towards all substrates tested, consistent with an involvement of these residues in the catalysis \[[@B26-metabolites-09-00163]\]. However, substitution of alanine at position 209 with the corresponding residue aspartic acid in a sorghum CCoAOMT with substrate specificity to caffeoyl-CoA in the loop did not significantly alter activity towards Avn-C and caffeoyl-CoA, indicating that this amino acid in the loop might not play a vital role in defining its substrate specificity \[[@B29-metabolites-09-00163]\].
Oat has been considered as a functional food with many health benefits. One of the primary effective ingredients in oat grain is avenanthramides, a group of polyphenolic compounds with antioxidant, anti-inflammatory, anti-cell-proliferating and skin anti-irritant properties. Although the health-promoting properties of avenanthramides are well known, the biosynthetic mechanism was not completely understood. In the present study, we identified three different types of enzymes involved in the biosynthesis of the major avenanthramides in oat: 4CL in activating hydroxycinnamates to their thioesters prior to the condensation, HHTs catalyzing the condensation in the biosynthesis of Avn-A and Avn-C, and CCoAOMT enzyme for the methylation of Avn-C to Avn-B. Particularly, we demonstrated that oat HHTs are only responsible for the biosynthesis of Avn-A and Avn-C, but not for Avn-B, which is synthesized by a new mechanism, the methylation of Avn-C catalyzed by CCoAOMT enzyme. For the complete biosynthesis of the three major avenanthramides in oat, *p*-coumaric acid is initially derived from phenylalanine catalyzed by phenylalanine ammonia lyase (PAL) and cinnamic acid 4-hydroxylase (C4′H). *p*-coumaric acid can be activated into its CoA thioesters by 4CL, which can then be condensed with 5-hydroxyanthranilic acid to Avn-A by HHT. On the other hand, *p*-coumaroyl-CoA is often converted to *p*-coumaroyl shikimate/quinate first, which is then possibly hydroxylated by *p*-coumaroyl CoA ester 3′-hydroxylase (C3′H), a cytochrome P450 enzyme (CYP98) \[[@B32-metabolites-09-00163],[@B33-metabolites-09-00163]\]. Caffeoyl-CoA can then be condensed with 5-hydroxyanthranilic acid to Avn-C by HHT. Finally, Avn-C is methylated to Avn-B by CCoAOMT enzyme ([Figure 5](#metabolites-09-00163-f005){ref-type="fig"}). Taken together, the full elucidation of the biosynthetic pathway of avenanthramides in the present study not only contributes to our understanding of the biosynthesis of these important nutraceutical compounds, but also facilitates genetic improvement of this nutritional trait in oat by marker-assisted breeding and open opportunities to produce these active compounds by metabolic engineering of the complete biosynthetic pathway in heterologous systems.
4. Materials and Methods {#sec4-metabolites-09-00163}
========================
4.1. Plant Materials {#sec4dot1-metabolites-09-00163}
--------------------
Oat (*Avena sativa* L.) cultivar 'CDC Dancer' (Crop Development Centre, University of Saskatchewan, Canada) seeds were sterilized with 10% (*w*/*v*) NaClO for 5 min, washed with sterilized water 3 times, and germinated on filter paper with water in a plate in the dark at room temperature. After several days, the germinated seeds were transferred into the soil and grown in a controlled growth chamber at 22 °C with 65% relative humidity under 16 h light and 8 h dark cycles.
4.2. HPLC Analysis {#sec4dot2-metabolites-09-00163}
------------------
HPLC analysis of avenanthramides was carried out on an Agilent 1100 high pressure liquid chromatography (HPLC) instrument equipped with a 3 µm, 4.6 × 150 mm Phenomenex Luna C18 column (Torrance, CA, USA) and an Agilent photodiode array detector (Santa Clara, CA, USA) at 340 nm. The mobile phase consisted of solvent A (H~2~O with 5% acetonitrile and 0.1% formic acid) and solvent B (acetonitrile with 0.1% formic acid). A gradient of 13% to 30% buffer B over 20 min at a flow rate of 1.0 mL/min was applied. The avenanthramides were identified by comparison of chromatography retention times and mass spectra to authentic standards (avenanthramide A, B and C) (Sigma, St. Louis, MO, USA). Mass spectrometry analysis was performed following \[[@B34-metabolites-09-00163]\].
4.3. RNA Extraction, cDNA Synthesis and Genes Cloning {#sec4dot3-metabolites-09-00163}
-----------------------------------------------------
RNA extraction from developing seeds at about 20 days after pollination and cDNA synthesis were performed following the methods from our previous study \[[@B35-metabolites-09-00163]\]. To clone candidate genes, primers were designed to amplify the full open reading frames by PCR with Q5 polymerase (NEB, Ipswich, MA, USA). For AsHHT4-6 cloning, the two primers were HHT4F (*EcoR*I): 5′-ACTGAATTCATGCACGGTGAGGCGGTC-3′ and HHT4R (*Hind*III): 5′-AAGCTTCAGCCTGCTCACACGTCGGCGATCAG-3′. For oat 4CL cloning, the two primers were 4CL1F (*BamH*I): 5′-GGATCCAGATCGATGGGCTCCATCG-3′ and 4CL1R (*Xho*I): 5′-CTCGAGCTGACTTAGCTTTTGGACTGTG-3′. For oat CCoAOMT cloning, the two primers were CCoAOMT1F (*EcoR*I): 5′-CGGAATTCATGGCGACCACGGC-3′ and CCoAOMT1R (*Hind*III): 5′-CGAAGCTTTCACTTGGCGCG-3′. The PCR products were cloned into the pGEM vector (Promega, Madison, WI, USA) and verified by sequencing. For the construction of plasmids in the expression in *E. coli*, verified fragments were released from pGEM and sub-cloned into the destination vector pET-28a with specific restriction enzymes highlighted in the primers. For site-directed mutagenesis in CCoAOMT, three sets of primer were applied: K174A-F (5′-CGACGCCGACGCCGACAACTACC-3′) and K174A-R (5′-GGTAGTTGTCGGCGTCGGCGTCG-3′); A209D-F (5′-GTGCTCCCCGACGACGCGCCC-3′) and A209D-R (5′-GGGCGCGTCGTCGGGGAGCAC-3′); D246A-F (5′-CCCGTCGGAGCCGGCATCAC-3′) and D246A-R (5′-GTGATGCCGGCTCCGACGGG-3′). Site-directed mutagenesis was performed using an overlapping PCR in two steps. The first PCR was performed to amplify two fragments surrounding a mutation using the native gene sequence as template and two sets of primers: T7 promoter-F and K174A-R, and K174A-F and T7 terminator-R. The second PCR was performed using the mixture of the two fragments as template and one set of primers: T7 promoter-F and T7 terminator-R. The amplified product was digested with *EcoR*I and *Hind*III and sub-cloned into pET-28a vector at the same digested sites for expression analysis. The expression plasmids were verified by restriction enzyme digestion and sequencing.
4.4. Protein Expression and Purification {#sec4dot4-metabolites-09-00163}
----------------------------------------
The pET-28a recombinant constructs were introduced into *E. coli* BL21 (DE3) (Novagen, CA, USA) for protein expression. Expression was induced by the addition of 0.5 mM isopropyl β-D-1-thiogalactopyranoside (IPTG) to cultures (A~600~ at 0.4 to 0.5), and the induced cells were incubated overnight at 16 °C. The cells were harvested by centrifugation at 5000× *g* for 10 min. The pellets were resuspended in a buffer containing 100 mM Tris/HCl, pH 8.0, 0.5 M NaCl, 20 mM imidazole and 5% glycerol. Cells were disrupted by glass beads using a Mini-Beadbeater, and lysate was subsequently centrifuged at 15,000× *g* for 15 min at 4 °C. The recombinant His-tagged fusion proteins were purified by Hispur Ni-NTA Resin (Thermo Fisher Scientific, Waltham, MA, USA) according to the manual. The purified proteins were further desalted and concentrated with Zeba Spin Desalting Columns (Thermo Fisher Scientific, Waltham, MA, USA). Concentration for purified protein samples was determined using a Bradford assay.
4.5. Enzyme Assays {#sec4dot5-metabolites-09-00163}
------------------
Enzymatic assays of oat 4CL were performed following the previous method with some modification \[[@B36-metabolites-09-00163]\]. The reaction took place in a MOPS buffer (100 mM, pH 7.5) in a total volume of 300 μL consisting of 0.4 mM substrate (*p*-coumaric acid, caffeic acid, or ferulic acid), 2.5 mM ATP, 2.5 mM MgCl~2~, 0.2 mM Coenzyme A, 1\~10 μg of purified oat 4CL proteins. Enzymatic reactions were initiated by the addition of purified 4CL protein. The reaction with boiled (96 °C, 10 min) proteins was used as the control. The assay was performed at 30 °C and formation of CoA esters was monitored using a UV spectrophotometer at 333 nm for *p*-coumaroyl-CoA, 346 nm for caffeoyl-CoA and feruloyl-CoA in a time course until the substrate conversion to CoA esters was complete. Assays were terminated by adding 10 μL of acetic acid and analyzed by HPLC with the same conditions as above. CoA-thioester standards were obtained from Microcombichem (Germany). The identity of products was determined based on their retention times and UV-visible absorbance spectral profiles compared with those of the standards. The relative conversion efficiency was calculated by product/(product + substrate).
Oat HHT activity was determined by reacting 10 μL of the purified protein extracts (about 10 μg) with 100 mM 5-hydroxy-anthranilic acid in DMSO and 100 mM one of *p*-coumaroyl-/caffeoyl-/feruloyl-CoA at 30 °C for 1 h in 30 mM Tris-HCl (pH 7.2) in a total reaction volume of 100 μL. The reaction was initiated by adding the protein and stopped by adding 20 μL acetic acid. The reaction mixture was diluted with 0.38 mL methanol, filtered through 0.22 μm filter and analyzed by HPLC. Mass spectrum analysis of products in the assays was performed following a method described in a previous study \[[@B37-metabolites-09-00163]\].
The assay of oat CCoAOMT protein was performed following a previous study with modifications \[[@B31-metabolites-09-00163]\]. The reaction was comprised of 10 μg purified protein, 1 mM oversaturated SAM (Sigma, USA), 0 to 2 mM Avenanthramide C, 0 to 5 mM caffeoyl-CoA, 0 to 10 mM caffeic acid (Sigma, USA), 50 mM Tris- HCl, 0.2 mM MgCl~2~, 2 mM DTT, 10% glycerol, and 0.2 mM PMSF, which was incubated at 25 °C for 5--30 min. For the kinetic analysis, product formations relative to substrate concentrations were determined under the optimized condition. Product formation was quantified using HPLC as described above. Velocities were calculated as the amount of products formed (in μmol) based on the peak area compared to a standard curve per amount enzyme used (in μg) and time incubated (in min). Km and Vmax parameters were calculated using non-linear regression to the Michaelis-Menten kinetics using Prism 6.10 software (Graphpad Software, Inc., San Diego, CA, USA).
We thank Yu Luo from the College of Medicine and Michel Deborah from College of Pharmacy and Nutrition in the University of Saskatchewan for assistance with mass spectrum analysis and Darwin Reed for critical reading of the manuscript. This research was supported by Saskatchewan Agriculture Development Funds to X.Q.
The following are available online at <https://www.mdpi.com/2218-1989/9/8/163/s1>, Figure S1. Sequence alignment for two 4CLs from oat with the coding region sequence (CDS) (**A**) and amino acids (**B**). The shaded regions indicate amino acids that are identical to each other. The two conserved domains for 4CL enzymes were shown in red box; Figure S2. The negative controls with boiled As4CL1 enzymes were shown with corresponding subtracts. Figure S3. Full sequences alignment of oat HHTs. Shaded regions indicate amino acids that are identical to each other. Black double-headed arrows indicate the conserved domain HXXXDG and motif DFGWG in BAHD acyltransferases; Figure S4. Representative images for the MS spectra of group fragments from the products Avn-A (**A**) and Avn-C (**B**). Putative dissociation mechanisms for these compounds were shown; Figure S5. Kinetic analysis of oat CCoAOMT enzyme. The kinetic constants were estimated from Michaelis-Menten plot using the average of three biological triplicate measurements; Figure S6. Representative image showing purified CCoAOMT proteins separated by 12% SDS-PAGE. M: prestained protein marker; A209D: CCoAOMT^A209D^; K174A: CCoAOMT^K174A^; D246A: CCoAOMT^D246A^; Nucleotide sequence data reported has been deposited in the GenBank under accession numbers: MH397063 (As4CL1), MH397064 (AsHHT4), MH397065 (AsHHT5), MH397066 (AsHHT6), and MK577959 (CCoAOMT).
######
Click here for additional data file.
Conceptualization, X.Q. and Z.L.; Methodology, Z.L. and Y.C.; Software, Z.L. and Y.C.; Validation, Z.L., Y.C. and X.Q.; Formal analysis, Z.L. and Y.C.; Investigation, Z.L. and Y.C.; Resources, X.Q. and D.M.; Data curation, Z.L. and Y.C.; Writing original draft preparation, Z.L., Y.C. and X.Q.; Writing review and editing, Z.L., Y.C. and X.Q.; Visualization, Z.L. and Y.C.; Supervision, X.Q. and D.M.; Project administration, X.Q.; Funding acquisition, X.Q.
This work was supported by Agriculture Development Fund, Saskatchewan, Canada.
The authors declare no conflict of interest.
{#metabolites-09-00163-f001}
{#metabolites-09-00163-f002}
{#metabolites-09-00163-f003}
{#metabolites-09-00163-f004}
{#metabolites-09-00163-f005}
metabolites-09-00163-t001_Table 1
######
Kinetic parameters of oat CCoAOMT enzyme with three substrates.
Substrate Km (μM) Vmax (nmol/μg/min) Vmax/Km (nmol/μg/mim/μM)
------------------ ---------------- -------------------- --------------------------
Avenanthramide C 167.0 ± 25.2 514.4 ± 41.0 3.08
Caffeoyl-CoA 2319.0 ± 867.6 1620.0 ± 390.0 0.70
Caffeic Acid 1903.0 ± 173.5 597.6 ± 40.0 0.31
[^1]: Current Address: Academy for Advanced Interdisciplinary Studies, Southern University of Science and Technology (SUSTech), Shenzhen 518055, China.
| {
"pile_set_name": "PubMed Central"
} |
Melissa & Doug - 1170 | Deluxe Magic Set
$44.99
This fantastic set includes 10 professional caliber, yet easy-to-master, tricks for beginners! "Secret Silks," "Magic Number Prediction," “Egyptian Prediction” are among the ten classic tricks included. Say the magic word and this fabulous set can be yours!
Melissa & Doug - 4071 | Metal Shopping Cart/Trolley
{"id":9279144067,"title":"Melissa \u0026 Doug - 9358 | Let's Play House!: Condiments Set In Basket","handle":"772-19358","description":"\u003cp\u003eA must-have for the well-appointed play kitchen, these condiments sound and look like the real thing! Packaged in a handy metal caddy to keep everything organized, the six-piece set includes ketchup, mustard, salt, pepper, and hot sauce. Best of all: The salt and pepper really \"shake,\" the hot sauce really \"pours,\" and the ketchup and mustard \"squirt\" string! These wonderfully durable play pieces are built to last through countless culinary adventures.\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCode: 19358\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eGender: Girl\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eAge: 4\u003c\/strong\u003e\u003c\/p\u003e","published_at":"2019-05-21T17:48:35-06:00","created_at":"2017-01-12T16:21:02-07:00","vendor":"Melissa \u0026 Doug","type":"Household \u0026 Food","tags":["3 - 4 Years Old","4 - 5 Years Old","5 - 6 Years Old","Award-Winning","Playroom \u0026 Furniture","regularPrice"],"price":1999,"price_min":1999,"price_max":1999,"available":true,"price_varies":false,"compare_at_price":1999,"compare_at_price_min":1999,"compare_at_price_max":1999,"compare_at_price_varies":false,"variants":[{"id":33006810115,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"772 19358","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Melissa \u0026 Doug - 9358 | Let's Play House!: Condiments Set In Basket","public_title":null,"options":["Default Title"],"price":1999,"weight":454,"compare_at_price":1999,"inventory_quantity":5,"inventory_management":"shopify","inventory_policy":"deny","barcode":"000772193580"}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/51tx_0OWEPL._AA218__CONDIMENT_SET.jpg?v=1493746836"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/51tx_0OWEPL._AA218__CONDIMENT_SET.jpg?v=1493746836","options":["Title"],"content":"\u003cp\u003eA must-have for the well-appointed play kitchen, these condiments sound and look like the real thing! Packaged in a handy metal caddy to keep everything organized, the six-piece set includes ketchup, mustard, salt, pepper, and hot sauce. Best of all: The salt and pepper really \"shake,\" the hot sauce really \"pours,\" and the ketchup and mustard \"squirt\" string! These wonderfully durable play pieces are built to last through countless culinary adventures.\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCode: 19358\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eGender: Girl\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eAge: 4\u003c\/strong\u003e\u003c\/p\u003e"}
Melissa & Doug - 9358 | Let's Play House!: Condiments Set In Basket
$19.99
A must-have for the well-appointed play kitchen, these condiments sound and look like the real thing! Packaged in a handy metal caddy to keep everything organized, the six-piece set includes ketchup, mustard, salt, pepper, and hot sauce. Best of all: The salt and pepper really "shake," the hot sauce really "pours," and the ketchup and mustard "s...
{"id":9542892227,"title":"Playmobil - 6848 | Princess: Grand Princess Castle","handle":"8789-068484","description":"\u003cp\u003e\u003cspan\u003eEnter the magnificent golden gates to discover the Grand Princess Castle. This three-story castle has everything a princess needs, including a grand staircase and multiple lavish rooms. The double-leaf gates easily open and close, with a golden lock included to secure the palace. Pay your respects to the royal couple in the royal room complete with throne. Take the elegant spiral staircase up to the tower where you can look out over your kingdom or spend time at the weaving wheel.\u003c\/span\u003e\u003c\/p\u003e","published_at":"2017-11-07T14:16:39-07:00","created_at":"2017-02-22T17:58:29-07:00","vendor":"Playmobil","type":"Model Accessories","tags":["Age 4+","Age 5+","Award-Winning","Collectibles \u0026 Figurines","Fairy Tales","Manufactured in Europe","New","rating:5","salePrice"],"price":16799,"price_min":16799,"price_max":16799,"available":true,"price_varies":false,"compare_at_price":19999,"compare_at_price_min":19999,"compare_at_price_max":19999,"compare_at_price_varies":false,"variants":[{"id":34595763203,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"8789 068484","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Playmobil - 6848 | Princess: Grand Princess Castle","public_title":null,"options":["Default Title"],"price":16799,"weight":0,"compare_at_price":19999,"inventory_quantity":3,"inventory_management":"shopify","inventory_policy":"deny","barcode":"4008789068484"}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/91S26fNj5xL._SL1500.jpg?v=1525992851"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/91S26fNj5xL._SL1500.jpg?v=1525992851","options":["Title"],"content":"\u003cp\u003e\u003cspan\u003eEnter the magnificent golden gates to discover the Grand Princess Castle. This three-story castle has everything a princess needs, including a grand staircase and multiple lavish rooms. The double-leaf gates easily open and close, with a golden lock included to secure the palace. Pay your respects to the royal couple in the royal room complete with throne. Take the elegant spiral staircase up to the tower where you can look out over your kingdom or spend time at the weaving wheel.\u003c\/span\u003e\u003c\/p\u003e"}
Playmobil - 6848 | Princess: Grand Princess Castle
$167.99
Enter the magnificent golden gates to discover the Grand Princess Castle. This three-story castle has everything a princess needs, including a grand staircase and multiple lavish rooms. The double-leaf gates easily open and close, with a golden lock included to secure the palace. Pay your respects to the royal couple in the royal room complete w...
{"id":9542892419,"title":"Playmobil - 6853 | Princess: Masked Ball","handle":"8789-068538","description":"\u003cp\u003e\u003cspan\u003eDance the night away at the Masked Ball. You'll be serenaded by the violinist while the whirl around on the rotating dance floor. Don't forget to make a wish in the wishing well before the night is over! \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eAge: 5\u003cbr\u003eGender: Girl\u003cbr\u003eCode: 6853\u003c\/strong\u003e\u003c\/p\u003e","published_at":"2019-04-29T15:16:47-06:00","created_at":"2017-02-22T17:58:31-07:00","vendor":"Playmobil","type":"Imaginative Play","tags":["Age 4+","Award-Winning","Collectibles \u0026 Figurines","Manufactured in Europe","New","rating:5","salePrice"],"price":2351,"price_min":2351,"price_max":2351,"available":true,"price_varies":false,"compare_at_price":2799,"compare_at_price_min":2799,"compare_at_price_max":2799,"compare_at_price_varies":false,"variants":[{"id":34595765251,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"8789 068538","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Playmobil - 6853 | Princess: Masked Ball","public_title":null,"options":["Default Title"],"price":2351,"weight":0,"compare_at_price":2799,"inventory_quantity":147,"inventory_management":"shopify","inventory_policy":"deny","barcode":"4008789068538"}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/4008789068538_hi.jpg?v=1525992500"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/4008789068538_hi.jpg?v=1525992500","options":["Title"],"content":"\u003cp\u003e\u003cspan\u003eDance the night away at the Masked Ball. You'll be serenaded by the violinist while the whirl around on the rotating dance floor. Don't forget to make a wish in the wishing well before the night is over! \u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eAge: 5\u003cbr\u003eGender: Girl\u003cbr\u003eCode: 6853\u003c\/strong\u003e\u003c\/p\u003e"}
Playmobil - 6853 | Princess: Masked Ball
$23.51
Dance the night away at the Masked Ball. You'll be serenaded by the violinist while the whirl around on the rotating dance floor. Don't forget to make a wish in the wishing well before the night is over!Â
Age: 5Gender: GirlCode: 6853
{"id":9542905923,"title":"Playmobil - 9161 | Princess: Royal Couple With Carriage","handle":"8789-091611","description":"\u003cspan\u003eTake an enchanting ride with the Royal Couple with Carriage. The carriage is equipped with a push-back cover, revealing a treasure chest perfect for love letters from an enchanted prince! Safely store all the picnic items in the storage area inside the carriage behind the seat. You can style the horse’s mane with pretty flower clips or use them on your own hair! Set includes two figures, carriage, horse, basket, apples, love letters, bracelets, and many other accessories.\u003c\/span\u003e","published_at":"2019-07-30T10:30:18-06:00","created_at":"2017-02-22T17:59:35-07:00","vendor":"Playmobil","type":"Imaginative Play","tags":["4 - 5 Years Old","Age 4+","Award-Winning","Collectibles \u0026 Figurines","Manufactured in Europe","New","salePrice"],"price":2939,"price_min":2939,"price_max":2939,"available":true,"price_varies":false,"compare_at_price":3499,"compare_at_price_min":3499,"compare_at_price_max":3499,"compare_at_price_varies":false,"variants":[{"id":34595798659,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"8789 091611","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Playmobil - 9161 | Princess: Royal Couple With Carriage","public_title":null,"options":["Default Title"],"price":2939,"weight":0,"compare_at_price":3499,"inventory_quantity":46,"inventory_management":"shopify","inventory_policy":"deny","barcode":"4008789091611"}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/Playmobil_Royal_Couple_With_Carriage_-_9161.png?v=1525915420"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/Playmobil_Royal_Couple_With_Carriage_-_9161.png?v=1525915420","options":["Title"],"content":"\u003cspan\u003eTake an enchanting ride with the Royal Couple with Carriage. The carriage is equipped with a push-back cover, revealing a treasure chest perfect for love letters from an enchanted prince! Safely store all the picnic items in the storage area inside the carriage behind the seat. You can style the horse’s mane with pretty flower clips or use them on your own hair! Set includes two figures, carriage, horse, basket, apples, love letters, bracelets, and many other accessories.\u003c\/span\u003e"}
Playmobil - 9161 | Princess: Royal Couple With Carriage
$29.39
Take an enchanting ride with the Royal Couple with Carriage. The carriage is equipped with a push-back cover, revealing a treasure chest perfect for love letters from an enchanted prince! Safely store all the picnic items in the storage area inside the carriage behind the seat. You can style the horse’s mane with pretty flower clips or us...
{"id":9542909763,"title":"Playmobil - 9167 | History: Egyptian Warrior With Camel","handle":"8789-091673","description":"\u003cp\u003eBrave and valiant, the Egyptian Warrior is here to protect the tomb! Launching arrows, he defends against enemies near and far! All his extra spears are easily accessible in his saddle pack for continuous fire. This set includes one figure, camel, bow, arrows, and other accessories.\u003c\/p\u003e","published_at":"2017-11-07T14:17:34-07:00","created_at":"2017-02-22T17:59:40-07:00","vendor":"Playmobil","type":"Models","tags":["4 - 5 Years Old","Age 4+","Award-Winning","Collectibles \u0026 Figurines","salePrice"],"price":1175,"price_min":1175,"price_max":1175,"available":true,"price_varies":false,"compare_at_price":1399,"compare_at_price_min":1399,"compare_at_price_max":1399,"compare_at_price_varies":false,"variants":[{"id":34595802627,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"8789 091673","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Playmobil - 9167 | History: Egyptian Warrior With Camel","public_title":null,"options":["Default Title"],"price":1175,"weight":0,"compare_at_price":1399,"inventory_quantity":3,"inventory_management":"shopify","inventory_policy":"deny","barcode":"4008789091673"}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/9167_product_box_front.png?v=1525914891"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/1348\/5881\/products\/9167_product_box_front.png?v=1525914891","options":["Title"],"content":"\u003cp\u003eBrave and valiant, the Egyptian Warrior is here to protect the tomb! Launching arrows, he defends against enemies near and far! All his extra spears are easily accessible in his saddle pack for continuous fire. This set includes one figure, camel, bow, arrows, and other accessories.\u003c\/p\u003e"}
Playmobil - 9167 | History: Egyptian Warrior With Camel
$11.75
Brave and valiant, the Egyptian Warrior is here to protect the tomb! Launching arrows, he defends against enemies near and far! All his extra spears are easily accessible in his saddle pack for continuous fire. This set includes one figure, camel, bow, arrows, and other accessories. | {
"pile_set_name": "Pile-CC"
} |
Tag: Jack Stonehouse
Buying an espresso machine for less than £100 is easy in the UK. Coffee machine and espresso making technology has come a long way in the last few years and some budget coffee machines are available for sale on amazon that allow you to pick up a quality machine for a cheap price. You will […]
If you need a coffee machine with 15 bar pump pressure for your home or cafe, then one that comes at a discounted price is the Jack Stonehouse espresso and cappuccino coffee maker machine. It’s an industrial coffee machine that can be easily used in your home if you’re a real coffee fan, or in […]
Articles
98% of your coffee drink is made from it, so why do we have such a careless attitude when it comes to using the best quality water possible? Well this is not entirely true. There is a large amount of science around the quality of water, and some real world factors that affect water seasonally, […]
Looking for the premium coffee makers, then look no further, this is a roundup of the best for espresso enthusiasts and cappuccino consiuers. Drip espresso You can find a list of the top drip coffee makers, if you’re specifically looking for that exclusive type. You can find all the best reviewed there. Although this is a roundup of […] | {
"pile_set_name": "Pile-CC"
} |
Q:
boost pool_allocator memory pool behavior clarification
The boost documentation as below:
Note
The underlying singleton_pool used by the this allocator constructs a pool instance that is never freed. This means that memory allocated by the allocator can be still used after main() has completed, but may mean that some memory checking programs will complain about leaks.
I am confused since I checked the code and the singleton_pool still seem to be created only on the heap of the current process. I.e. if the process is killed by the OS, such pool will be released anyway? Then the above notes merely means if some daemon thread keeps on and such pool is still available after main()? Or it actually means the pool won't be released even after the entire process is killed?
It also seems to me both pool_allocator and fast_pool_allocator are using the identical mechanism to allocate memory i.e. from such a singleton_pool singleton. However this note isn't specified for the fast_pool_allocator. I would reckon both of them behaves the same for such a note above. Am I correct?
Please help. Thanks.
A:
singleton_pool implements thread-safe(under some conditions) singleton without locks, using the feature of initialization of non-local static variables. The part of source code:
template <typename Tag,
unsigned RequestedSize,
typename UserAllocator,
typename Mutex,
unsigned NextSize,
unsigned MaxSize >
class singleton_pool
{
...
struct object_creator
{
object_creator()
{ // This constructor does nothing more than ensure that instance()
// is called before main() begins, thus creating the static
// T object before multithreading race issues can come up.
singleton_pool<Tag, RequestedSize, UserAllocator, Mutex, NextSize, MaxSize>::get_pool();
}
inline void do_nothing() const
{
}
};
static object_creator create_object;
}; // struct singleton_pool
non-local variables are initialized as part of program startup, before the execution of the main function begins and get torn down when the program terminates. So that singleton_pool will be created before the main(), and destroyed after main(). If the process is terminated anyway, of course pool will be released.
| {
"pile_set_name": "StackExchange"
} |
Procedural planet generation
Real-Time procedurally generated planetary landscapes with CLOD
Abstract
We will present a real-time method for procedurally generating huge planetary landscapes with continuous level of detail. This approach enables us to produce interesting planets with a small or non existing pre-generated dataset, which in turn could be used to visualize an endless number of different planets. Where previous work in landscape generation have generally been purely procedural or purely design, we have devised a method which allows for a seamless integration of design into the computer generated world.
Another novelty is the decoupling of the mesh optimization from the rendering. While a high frame-rate is a requirement for fast and smooth animation, the mesh optimization can run in the background at a slower pace. We have implemented a system with different update frequencies for rendering and mesh optimization, to let us prioritize the different tasks, and to distribute the workload on multiple processors.
A method to generate natural looking river systems in the procedural generated terrain is explored and implemented. While we found that actual real-time procedural river generation was very difficult, one could combine a fast preprocessing step, with correct river flow calculations, which could later be placed inside the terrain.
* Seamless blend of design and pure procedurally generated terraincolor
* Decoupled mesh optimization and rendering to better utilize multi core processors
* Correct river flow calculation in a procedural landscape.
A rough cloud system seen from space. The clouds are rendered on a sphere surface which moves through a 3D perlin noise space.
Night turns to day as the sun moves across the sky.
Night turns to day as the sun moves across the sky.
Night turns to day as the sun moves across the sky.
Rough procedural mesh is rendered with a pixel shader generated noise texture. The noise is 3D Perlin noise. This video is to show that even a very rough mesh can look decent is noise is added through texturing.
Procedural planet where the rendered pixel colors are based on a lookup table. For a given distance from the planet center, the table defines the color for this pixel. This will, as shown in the paper, result in a striped look which looks unnatural. For that reason, the hight values are perturbed slightly using a noise function before the color is found in the table.
A number of different "planets" are quickly generated by changing the seed for the random number generator used in the noise functions.
Night turns to day, through a red sunrise. As the sun moves across the sky, the moving clouds can be observed before the sun eventually sets again.
A "flight" over a procedurally generated planet. The sun rises through a red sunrise and during the (short) day the planet is explored a little before the sun sets again. After sunset, the "space ship" quickly flies towards the sunset to catch up with daylight again.
A flight over the procedural planet. This time the mesh is textured. The texture is not really suitable for this purpose, but it was used none the less. At a distance, the surface is colored by the terrain types base color. As the camera gets closer, the texture will start to blend in.
A flight over the procedural planet. This time the mesh is textured. The texture is not really suitable for this purpose, but it was used none the less. At a distance, the surface is colored by the terrain types base color. As the camera gets closer, the texture will start to blend in.
The camera starts quite close to the planet and then moves away. As more and more of the planet comes into view, the finer details are removed to maintain a somewhat constant polygon count.
To detect, and handle, collisions between an arbitrary object and the planet, I implemented a method in a pixel shader where any pixel having its 3D spatial position inside a spherical domain around (bounding sphere) the "space ship" would render into an off-screen render target. If pixels were rendered, it would mean that part of the planet was inside the bounding sphere and we had a collision. The actual color being rendered would describe the normal of the surface to make it easy to average the pixel position and normals to handle the collision.
A few static images, showing various elements of the program. Sun rises, level of detail and blending design is shown.
The fractal subdivision scene was designed to weight areas such as coast lines higher than most other areas. The reasoning is that the coastal areas has a higher detail level and therefore should be rendered with a more detailed mesh. Adding vertices in areas away from the coast will generally not benefit the visual quality. Other areas with higher priority would be mountain ridges when seen from a shallow angle. Under those circumstances, the mountains form a clear silhouette against the sky and a coarse mesh would be very noticeable.
A sunrise or sun set coloring the sky red well before the sun itself becomes visible.
The view from high in the atmosphere. The sun is visible, and so are the stars. It is not entirely realistic seeing both clouds, the sun and the stars in the same direction like this, but it looks nice I think ;-)
Three examples of the blending of user designed terrain with the procedural generation as described in the paper. Click the image for a better look. The images shows the blending of a user designed circle with central bump into the procedural landscape. The topmost image blends so the user design is very strong while the bottom image shows a blend where the procedural content is weighted more heavily.
A common problem for real-time procedurally generated content is rivers. The essence of the problem is that terrain features far away / out of sight are commonly ignored when doing real-time continuous level of detail procedural content generation and rendering. For rivers this is a problem since a river may well start far away and out of sight and the flow of the river is therefore controlled by terrain which is out of sight and not generated. The method implemented, and described in the paper, is to allow for a fixed number of pre-generated rivers which are then known beforehand and can be blended into the landscape using the previously method of blending design with procedural content.
A random river seed position is chosen. The terrain is the surroundings are generated and evaluated to see if a river would start here. If it would, the river starts flowing down. As it flows, the terrain surrounding the river is procedurally refined and the river thus flows in a highly detailed terrain. The river will flow down while filling river basins and eventually reaching the ocean. | {
"pile_set_name": "Pile-CC"
} |
As confirmed measles cases around the country hit the highest number since 2000 — including more than a dozen confirmed cases in Texas — state lawmakers are considering whether parents should have access to more information about how many students in local schools aren't vaccinated.
For well over a decade, Texas has sent an annual survey to schools about how many kindergarten and seventh grade students filed for exemptions from vaccines. But the data, while publicly available, is often incomplete and lacking some key details. While private schools and charter schools report exemption rates by school, the public school districts that most Texas children attend only publicly report a rate for the entire district.
Senate Bill 329 from state Sen. Kel Seliger would allow parents to access more detailed information for each school. It would include information such as the exemption rates broken down by vaccine type, the number of students who have "conscientious exemptions" — vaccine exemptions for personal or religious beliefs — and the number of students who have medical exemptions signed by doctors. The Amarillo Republican said the bill isn't meant to impact the decisions of individual families and whether they should vaccinate their children.
“It has nothing to do with with vaccines or people who choose not to have them,” Seliger told The Texas Tribune. “It's just a statistical figure … so parents can make an informed choice. It has nothing whatsoever to do with kids who are or are not vaccinated.”
The World Health Organization has named "vaccine hesitancy" one of the top 10 threats to global health in 2019. Earlier this month, New York Mayor Bill DeBlasio issued a public health emergency over a measles outbreak in ultra-Orthodox Jewish communities in Brooklyn and announced that some unvaccinated individuals would be required to get the measles vaccine or risk a possible fine.
Texas law requires that children at all public and private schools have 10 immunizations for diseases such as tetanus, polio and whooping cough. Children must receive the vaccines before enrolling in kindergarten and are required to receive others, such as the meningococcal vaccine, in later grades. If parents want to opt out of the vaccine requirements through a conscientious exemption, they must submit a notarized affidavit form to the school that is valid for a two-year period.
In 2003, Texas allowed conscientious exemptions for the first time in addition to medical and religious exemptions.
State data shows a marked increase in conscientious vaccine exemptions over the last decade, as the "anti-vaxxer" movement has taken hold. In the 2017-18 school year, the overall conscientious exemption rate for students enrolled in kindergarten through 12th grade was 1.07%, according to data from the Texas Department of State Health Services. In Texas' largest school districts, the conscientious exemption rate for kindergarten students was higher at 1.8%. Of those larger districts, Austin ISD, which had a total student enrollment of 81,346 students for the 2017-18 school year, had the highest percentage of conscientious exemptions for kindergarten students at 2.3%.
Loading...
Yet the data is also missing many schools and districts that don't fill out the survey every year. Although it's mandated by Texas law, the state doesn't have a way to enforce that mandate, according to DSHS spokesman Chris Van Deusen. And exemption data from schools and school districts with fewer than 65 students isn't released publicly.
If a school fails to report its exemption information to the state, DSHS will audit the school the following year to make sure it is is keeping the proper records, Van Deusen said. However, the agency won’t report that data back to the state. Only the school can submit the survey, he said.
At a hearing for Seliger's bill Tuesday, Sen. Lois Kolkhorst, chairwoman of the Senate Health and Human Services Committee, raised concerns about a child being identified on smaller campuses under the more detailed exemption rates laid out by the bill. Seliger said the bill still applies the existing privacy laws that protect a student’s vaccine information.
Critics of the bill expressed the same concerns as Kolkhorst, a Brenham Republican, about student privacy. Jackie Schlegel, executive director of Texans for Vaccine Choice, warned that the expanded access to data in Seliger's bill could lead to bullying and harassment of students and their families.
The vaccine exemption information would “only be as confidential as the campus culture,” she said.
Kolkhorst left the bill pending and has not said whether the committee will vote on it in time for it to move through the two chambers before the session ends in late May.
State Rep. J.D. Sheffield, R-Gatesville, introduced a similar bill in the House this session, but it has not yet received a hearing. Sheffield filed an identical bill two years ago that made it out of the House Public Health Committee but never reached the chamber floor for a full vote. Seliger also introduced a similar bill last session, but it never received a hearing.
Dr. Flor Munoz, an associate professor at the Baylor College of Medicine, said vaccine fears have become so instilled in some people that she's found herself failing to convince parents of children who are in the hospital for vaccine-preventable diseases that they should vaccinate their children. She traced those fears to a now-retracted 1998 study that linked autism to the measles, mumps and rubella vaccine. Andrew Wakefield, who authored the study, lost his medical license in 2010 and now lives in Austin.
“They still think vaccines cause autism,” said Munoz, who specializes in pediatric infectious diseases. “They say, ‘Oh, I can deal with my child having to be on a ventilator, but I cannot deal with autism.’ There's so much wrong information out there that these people are hanging on to, and they're really putting their child's life at risk.” | {
"pile_set_name": "OpenWebText2"
} |
894 F.Supp. 340 (1995)
UNITED STATES of America, Plaintiff,
v.
Robert W. EDWARDS, Defendant.
No. 95-CR-82.
United States District Court, E.D. Wisconsin.
July 26, 1995.
*341 Eric J. Klumb, Asst. U.S. Atty., Milwaukee, WI, for plaintiff.
Robert W. Edwards, David Ziemer, Milwaukee, WI, for defendant.
DECISION AND ORDER
MYRON L. GORDON, District Judge.
On May 9, 1995, a federal grand jury sitting for the eastern district of Wisconsin returned a two-count indictment against the defendant, Robert Edwards. It charged him with possession of a firearm by a convicted felon in violation of 18 U.S.C. § 922(g)(1) and possession of a firearm which had not been registered with the National Firearms Registration and Transfer Record, in violation of 26 U.S.C. §§ 5841, 5861(d) and 5871. A jury trial is scheduled to commence on July 31, 1995.
This case was assigned to Magistrate Judge Aaron E. Goodstein for pretrial processing. The defendant filed a motion to dismiss count one of the indictment based upon the Supreme Court's recent decision in United States v. Lopez, ___ U.S. ___, 115 S.Ct. 1624, 131 L.Ed.2d 626 (1995). On July 7, 1995, Magistrate Judge Goodstein issued a recommendation advising that Mr. Edward's motion be denied. The defendant's motion, and the magistrate judge's recommendation, are now before this court for consideration.
Pursuant to 28 U.S.C. § 636(b)(1) and Local Rule § 13.03(c), one must file written objections to a magistrate judge's recommendation if he desires to challenge the recommendation. De novo review of a magistrate judge's recommendation is required only for those portions of the recommendation for which particularized objections, accompanied by legal authority and argument in support of the objections, are made. United States v. Molinaro, 683 F.Supp. 205, 211 (E.D.Wis. 1988); 28 U.S.C. § 636(b)(1); Local Rule § 13.03(c). Mr. Edwards has filed timely objections to the magistrate judge's recommendation, and I have undertaken a de novo review. I concur with the magistrate judge's recommendation and find the defendant's objections unpersuasive.
In count one of the indictment, the grand jury charges that Mr. Edwards "did knowingly possess in and affecting interstate commerce" a sawed-off shotgun and a .22 caliber handgun "having been previously convicted on March 22, 1989 of a crime punishable by a term of imprisonment exceeding one year." Pursuant to 18 U.S.C. § 922(g)(1),
[i]t shall be unlawful for any person
(1) who has been convicted in any court of, a crime punishable by a term of imprisonment for a term exceeding one year; ...
to ship or transport in interstate or foreign commerce, or possess in or affecting commerce, any firearm or ammunition; or to receive any firearm or ammunition which has been shipped or transported in interstate or foreign commerce.
In his motion to dismiss count one of the indictment, the defendant asserts that § 922(g) is an unconstitutional exercise of Congress' Commerce Clause authority and, in the alternative, that, if § 922(g) is not unconstitutional, it requires proof that a defendant's possession of a firearm contemporaneously affected interstate commerce. Mr. Edwards relies on the Supreme Court's decision in Lopez as support for both of his arguments.
In Lopez, the Supreme Court struck down as unconstitutional the Gun-Free School Zones Act of 1990, 18 U.S.C. § 922(q). That law made it a federal offense for an individual *342 "knowingly to possess a firearm at a place that the individual knows or has reasonable cause to believe, is a school zone." The Court held that § 922(q) exceeded Congress' authority "`[t]o regulate Commerce ... among the several States....'" Lopez, ___ U.S. at ___, 115 S.Ct. at 1626 (quoting U.S. Const., Art. I, § 8, cl. 3).
Congress may regulate three broad categories of activity under its authority to regulate interstate commerce. Lopez, ___ U.S. at ___, 115 S.Ct. at 1629. Congress' Commerce Clause power extends to: (1) the use of the channels of interstate commerce; (2) the instrumentalities of interstate commerce, or persons or things in interstate commerce; and (3) activities that substantially affect interstate commerce. Id. at ___-___, 115 S.Ct. at 1629-30. The Court determined that § 922(q) did not fall within the first two categories. ___ U.S. at ___, 115 S.Ct. at 1630. Thus, the Supreme Court examined § 922(q) under the third category of activity subject to regulation by Congress. Id. However, in Lopez, the Court found that § 922(q) did not involve a commercial activity that substantially affects interstate commerce and that § 922(q) contained no jurisdictional element which would ensure that the firearm possession in each case affects interstate commerce. Id. at ___-___, 115 S.Ct. at 1630-31. Consequently, the Court held that § 922(q) was unconstitutional. Id. at ___, 115 S.Ct. at 1626.
Lopez specifically examined § 922(q) whereas the case at bar directly concerns subsection (g) of § 922. The two citations look almost alike, but they are significantly different so far as constitutionality is concerned.
Although Mr. Edwards acknowledges that § 922(g) does contain a jurisdictional element requiring that the defendant possess a firearm "in or affecting commerce," he contends that possession of a firearm is not a commercial activity, and Congress' proscription of such activity is therefore unconstitutional.
The regulated activity need not be interstate activity. Regulation of purely intrastate activity is constitutional when such activity has a substantial affect on interstate commerce. See Wickard v. Filburn, 317 U.S. 111, 125, 63 S.Ct. 82, 89, 87 L.Ed. 122 (1942) (Congress may regulate purely local noncommercial activity where such activity exerts a substantial economic effect on commerce). The defendant claims that the Court in Lopez implicitly found that Congress' authority under the Commerce Clause extends only to "`economic' or `commercial' activities having a substantial relation to interstate commerce." Mr. Edwards asserts that the possession of a firearm by a convicted felon does not in any way affect interstate economic activity.
The defendant maintains that Lopez requires that a statute enacted pursuant to Congress' authority under the Commerce Clause must: (1) regulate a commercial activity and (2) contain a jurisdictional element requiring that the activity in question affects interstate commerce. I disagree. Contrary to Mr. Edward's assertion, I do not believe that the regulated activity itself need be a commercial activity. In Lopez, the Court held only that the regulated activity must substantially affect interstate commerce. ___ U.S. at ___, 115 S.Ct. at 1630.
Unlike § 922(q), § 922(g) does contain a jurisdictional element. See Lopez, ___ U.S. at ___, 115 S.Ct. at 1631. In Lopez, the Court discussed the interpretation of 18 U.S.C. § 1202(a) (the predecessor to § 922(g)) contained in United States v. Bass, 404 U.S. 336, 92 S.Ct. 515, 30 L.Ed.2d 488 (1971). ___ U.S. at ___, 115 S.Ct. at 1631. In Bass, the Court found that the "affecting commerce" element can be satisfied if the firearm possessed by a felon had previously traveled in interstate commerce. 404 U.S. at 350, 92 S.Ct. at 524. The Lopez Court found that § 922(q) was distinguishable from § 1202(a) in that § 922(q) did not contain a jurisdictional element which would "ensure, through case-by-case inquiry, that the firearm possession in question affects interstate commerce." ___ U.S. at ___, 115 S.Ct. at 1631.
§ 922(g) requires the government to prove that the firearm possession in question affects interstate commerce. In United States v. Hanna, the court of appeals for the ninth circuit rejected the defendant's challenge *343 to the constitutionality of § 922(g) based on Lopez and found that the jurisdictional element contained in § 922(g) is sufficient to establish its constitutionality. 55 F.3d 1456, 1462 (9th Cir.1995); see also United States v. Campbell, 891 F.Supp. 210, 211 (M.D.Pa.1995).
Furthermore, § 922(g) does regulate commercial activity. The defendant asserts that possession of a firearm by a felon is not an economic or commercial activity. However, it is not the mere possession of a firearm which § 922(g) proscribes. Unlike § 922(q), which regulated only the possession of firearms within a school zone, a purely local activity, § 922(g) regulates possession of a firearm by a convicted felon "in or affecting commerce." As discussed above, this element requires proof that the firearm previously traveled in interstate commerce.
While the mere possession of a firearm by a felon in and of itself may have minimal impact on interstate commerce, the movement of firearms in interstate commerce combined with the possession of those firearms by convicted felons has a substantial impact on commerce. The preamble to § 1202(a) contained congressional findings which stated in part:
Congress hereby finds and declares that the receipt, possession, or transportation of a firearm by felons ... constitutes ... a burden on commerce or threat affecting the free flow of commerce.
See Scarborough v. United States, 431 U.S. 563, 571 n. 10, 97 S.Ct. 1963, 1967 n. 10, 52 L.Ed.2d 582 (1977) (quoting preamble). As in Wickard, the purely local activity at issue in this case has a large impact on interstate commerce. See also United States v. Wilks, 58 F.3d 1518, 1521-23 (10th Cir.1995) (holding that 18 U.S.C. § 922(o), which prohibits the transfer and possession of machineguns, is a constitutional exercise of Congress' power to regulate "things in commerce").
In the alternative, the defendant argues that, if § 922(g) is constitutional, the government is required to show that the possession of the firearms by Mr. Edwards had some actual affect on interstate commerce. In support of this argument, the defendant asserts that the Supreme Court's decision in Scarborough is no longer applicable in light of the Court's decision in Lopez. Mr. Edwards contends that proof that the firearm traveled in interstate commerce at one time is no longer adequate.
I do not believe that the Court's decision in Lopez effects any change in the government's burden of proving that a defendant charged with a violation of § 922(g)(1) possessed a firearm "in and affecting interstate commerce." In Scarborough, the Court held that proof that a convicted felon possessed a firearm that had previously traveled in interstate commerce was sufficient to satisfy the statutorily required connection to commerce.
Mr. Edwards argues that Scarborough was implicitly overruled by Lopez. The defendant has submitted no authority for this proposition. The court in Lopez stated that it declined to expand Congress' authority under the Commerce Clause to encompass § 922(q). ___ U.S. at ___, 115 S.Ct. at 1634. However, the court did not express an intent to restrict congressional authority under the Commerce Clause despite the "broad language" of its previous decisions addressing congressional enactments pursuant to such authority. Id. In United States v. Stillo, 57 F.3d 553 (7th Cir.1995), the court of appeals for the seventh circuit stated that the Lopez decision did not "undermine this Court's precedents that minimal potential effect on commerce is all that need be proven to support a conviction." 57 F.3d at 558 n. 2 (Holding that the Hobbs Act, which prohibits extortion that affects interstate commerce, is constitutional). Proof that the firearm previously traveled in interstate commerce is sufficient.
The defendant's interpretation of congressional authority under the Commerce Clause is too narrow, and his interpretation of the Court's decision in Lopez is too broad. In Lopez, the Court found that § 922(q) had exceeded the limits, established in its previous decisions, of Congress' power to regulate commerce. The Court did not constrict Congress' authority to regulate commerce.
*344 ORDER
Therefore, IT IS ORDERED that the magistrate judge's recommendation be and hereby is adopted.
IT IS ALSO ORDERED that the defendant's motion to dismiss count one of the indictment be and hereby is denied.
| {
"pile_set_name": "FreeLaw"
} |
Jerry Seinfeld came to Kathy Griffin's defense after the comedian posed with a bloodied mask of President Trump.
"Yes, it was another bad joke. Every comedian tells bad jokes," Seinfeld told People in an interview published Tuesday.
"We all do it. That's how we find the good jokes," he added. "So someone told a bad joke — so what, I don’t understand the big deal."
Griffin first apologized for the photo hours the photo broke May 30, saying she "feel[s] horrible" people took the photo as a threat of violence.
During a press conference held Friday, Griffin addressed the backlash that followed telling reporters her career is over after she says the Trump family systematically "mobilized their armies" against her.
"I made a horrible, horrible call," she said. "Trust me, if I could redo the whole thing I'd have a blow up doll and no ketchup." | {
"pile_set_name": "OpenWebText2"
} |
Happy 60th Birthday Shaklee AND Mickey Mouse!
“We asked Master Coordinator Kathryn Naef (Florida) to share with you what she’s communicating to her team about why you should be at Shaklee Live 2016!
Why Shaklee Live X10
The atmosphere at Shaklee Live is effervescent! The Shaklee Family shines even brighter when together. The excitement and feeling of community create sparkle in the eyes of everyone there. Bring people on your team and see the sparkle in their eyes!
Learn from the experience of the Master Coordinators! You’ll find them everywhere – in General Sessions, in Workshops, and in the VIP Lounge, where you can “Chat with a Master Coordinator” and ask for the secrets to their success…and yours! PLUS, meet the NEW Masters! We have 10 so far since the last Shaklee Live in Cleveland!
The Shaklee Family are the happiest people on earth and we’re gathering right near the “Happiest Place on Earth!” Coincidentally, we’re both celebrating our 60th anniversaries! Happy Birthday Shaklee and Mickey! Plan a family vacation around Shaklee Live with a visit to Walt Disney World! | {
"pile_set_name": "Pile-CC"
} |
D’Espagnet: the Alchemist who inspired Newton
Jean d’Espagnet (1564 – c. 1637) was a French Renaissance polymath. He was a lawyer and politician, a mathematician and alchemist, an antiquarian poet, and friend of French literati. His 1623 works, Summary of Physics Restored and Arcanum were at once recognized to be among the clearest descriptions ever written of the hermetic cosmology and the alchemical work. Elias Ashmole, first documented english freemason, and founder member of the Royal Society, published in his first book the english translation of the Arcanum along with other selected works from Arthur Dee.
D’Espagnet had a huge library, which passed to his son Étienne, who designed optics for astronomy. In this library, mathematician Fermat got acquainted with the works of Viète. Isaac Newton had his own annotated copy of the works of d’Espagnet, where he found some inspiration, such as the universal solvent/aether, the magnetism/gravity, and properties of light.
One of my favorite extracts from his works is Canon 32 from the Enchiridion (see picture). Here is an english translation:
Lux est forma universalis – Light is universal form. D’Espagnet, 1623
XXXII LVX EST FORMA VNIVERSALIS [Light is universal form].
From the light therefore the Elements, as well as the first matter, had their information, and so attained a joynt nature of light, and by kindred a fast friendship betwixt themselves, not according to the vulgar opinion, an hatred and quarrel; they embrace each the other with a common bond of friendship, that they may joyn themselves to the making up of several mixed bodies, according to their several kinds. But the light of the Sun being of a far greater power than this former, is the Form of all forms, or the Universal form which doth convey all natural forms in the work of generation, into the disposed matter and seed of things. For every particular nature hath within it a spark of light, whose beams do in a secret manner attend with an active and motive power. | {
"pile_set_name": "Pile-CC"
} |
More superhero-related reading
Details
I've just found out that there's a wrestling move called 'Sliced Bread #2'. How embarrassing. Anyway, that's not where the title of this journal comes from. I thought it up when I was in high school and always wanted to use it for something.
Thanks to blogger.com for the hosting and the template. Content is copyright Dennis Relser (M. Elmslie) 2004-05.
Monday, February 28, 2005
I'm typing this from a 24-hour internet cafe. I'd use my super-PDA but I think Fantastic Man is jamming it or something, along with the penphone and cellphone and everything else I've got. It's a security flaw that I'm going to be bringing up with Greyghost and Itzhak; apparently Itzhak uses the same broadcasting techniques in all our equipment.
Anyway. I woke up at about three this afternoon and knew, knew, what it was I've been trying to think of for the past few days. Well, almost. See, when I went back and looked through the files again and again, I just read the words. I didn't look in the pictures. But I now remember it was something in one of the pictures that I saw.
So I threw on my coat and boots and booked for the office. I was almost running out the front door of the apartment, and almost bumped into Carlos from downstairs coming the other way. I flung myself to the side to avoid him, and fell into the bushes.
Where there was a cat, staring at me.
"You're wasting your time," I said to her, and scrambled to my feet. And ran.
Running is conspicuous, so I ducked down the first subway entrance I came to. Not a moment too soon, either, because I could hear the whirring of Icecap's Icycle as he buzzed overhead.
Obvious, of course. Icecap and his gang have sworn to catch Claudia Calhoun's murderer, and they've found out I was getting ready to take her on. Therefore I'm either the murderer or an important witness. But I don't trust them at the moment. Some of them I don't trust anytime.
They've been after me all day. I don't dare show up at work, because I don't know for sure if they've caught up to me or not. I called Greyghost's relay number from a pay phone and let him know what was going on. With any luck he'll find a reason to punch Icecap in the head. Since when is Prowl working with these dorks anyway?
The one good thing was when I was running down an alley toward Ogilvy Street and Shadow-Falcon low-bridged himself on a jeweler's awning. Don't quit the paper route! | {
"pile_set_name": "Pile-CC"
} |
Q:
Can't figure out why sScrollY in Datatables corrupt the Columns's size and alignement
I need to use sScrollX and ScrollY property for my datatables. But simply adding one of this property cause a lot of problems with size and alignemnt of the columns.
Here is a simple re-production of my table. In reality i use an Ajax call to fill my table. but i replied some data for this example:
Example
Here is a picture of my real page:
Can someone explain me this behavior ?
A:
I've had a chance to speak directly with Allan, the ideator of Datatables, and he said that it's a bug he didn't know about.
Here a temporary solution, quoting Allan:
Just been experimenting some more with a proper fix - and I think I might actually have it... The problem is that the scrolling body doesn't have the same content in its header cells as the actual header - thus different sizing rules apply.
So the fix (I guess it seems obvious now) is to have that same content in the body's header cells, but wrapped in a div which is height:0. Test case showing this "real" fix: http://datatables.net/clients/ciaoben/acs-web.it-fixed/test/esperimenti.php.html
Unfortunately 1.10.0-beta.1 hit today :-(. So it won't be in that. But I will commit this in tomorrow for the next beta unless I can think of some reason why it wouldn't work (it will slow performance down a little, but not too much I think).
Allan
For my case, it works.
| {
"pile_set_name": "StackExchange"
} |
Main menu
Category Archives: Asia-Pacific
GIC RE, an arm of the Government of Singapore’s real-estate-investment corporation, will acquire the assets of luxury hotel owner MSR Resort Golf Course after a bankruptcy court auction failed to generate any competing bids.
GIC will pay its stalking-horse offer of $1.5004 billion, plus up to $123.7 million to cover a settlement over the rejection of management agreements reached between MSR and Hilton, court records show.
MSR was set to hold an auction for its assets on Dec. 5, but the company said in court filings that it did not receive any qualified competing bids by a Dec. 3 deadline. GIC has been attempting to purchase MSR’s assets since at least 2010. GIC made multiple offers in the early stages of MSR’s Chapter 11, starting in February 2011, which MSR repeatedly rejected. MSR said it sought an equity sale rather than an asset sale in order to “avoid triggering unnecessary tax liability.”
According to an amended Chapter 11 plan and disclosure statement filed with the court on Dec. 11, MSR said the GIC transaction “will likely result in a significant tax liability against non-debtor MSR Resorts and debtor MSR Resort Sub Intermediate Mezz LLC that those entities will likely be unable to satisfy. The debtors also recognize that in the case of debtor MSR Resort Sub Intermediate LLC, the debtors will likely be unable to confirm a plan of reorganization given the size of the resulting tax liability. Nonetheless, given that the alternative presently available, both in- and out-of-court, the debtors believe the plan is the best path forward to maximize stakeholder recoveries.”
Under the current plan, most MSR creditors are expected to recover in full, except for fourth-mezzanine loan holder Five Mile Capital, which will be wiped out.
MSR estimates the amount of the tax liability in light of the GIC purchase is at about $314 million for its REIT, and about $17 million for its non-REIT holdco – neither of which is expected to have the funds to satisfy those liabilities.
A hearing to approve the MSR’s disclosure statement is scheduled for Dec. 13, before U.S. Bankruptcy Judge Sean Lane, in Manhattan. Votes on the plan are now due by Jan. 8, in time for a Jan. 15 confirmation hearing. – John Bringardner
The implosion of Hawker Beechcraft’s proposed $1.8 billion sale to Chinese buyer Superior Aviation Beijing Co. – news welcomed by its unionized employees – is just one of several recent failed deals between U.S. and Chinese companies.
The deal blew up not because of price or any immediate legal impediment, according to sources familiar with the matter, but because of the complicated nature of the deal, much of which was related to the origin of the buyer. Not only was China besieged with harsh rhetoric from both sides during the second presidential debate, the U.S. has cracked down on some of Chinese-backed enterprises operating in the U.S., ostensibly chilling certain business relations between the two superpowers. Both labor concerns and the requirement that Superior sell Hawker’s defense business separately due to security restrictions may have created additional complexities in finalizing the deal, sources said, though there has been no explicit statement about what was the ultimate deciding factor.
Steve Miller, the turnaround specialist currently installed as Hawker’s CEO, said in a statement this week only that the transaction “could not be completed on terms acceptable to the company.” Further language in the release noted, “the parties could not reach agreement on the terms of a plan-sponsorship agreement.”
Union leverage
The company’s unions early on largely shaped the outcome of any Hawker restructuring deal. Hawker filed for Chapter 11 bankruptcy protection in May and announced in July that it was in exclusive talks with Superior regarding the purchase of the company’s non-defense division. But before Superior entered the picture, heated negotiations between Hawker and the International Association of Machinists and Aerospace Workers led to a pension plan modification that preserved members’ ability to retire under terms of the current defined benefit pension plan. When Superior and Hawker entered into an exclusive negotiating period, the details had not been finalized. Restructuring professionals not involved in the deal say there are not good comparable scenarios for Chinese buyers being able to come in and change labor agreements, which can often be a sticking point.
After the Superior deal was announced, IAM president Tom Buffenbarger made a public speech expressing the union’s desire to keep Hawker in the hands of U.S. owners.
When it was revealed yesterday the deal collapsed, IAM came out with a jubilant statement that no changes would be made to the company’s pension agreement. In the release, the IAM referred to the deal as “controversial” and called the head of Beijing-based Superior a “shadowy figure known as ‘China’s Helicopter King.”
The IAM appears to have gotten their wish, but at what expense? Hawker now intends to exit as a standalone company, more details of which it plans to file in court in the coming weeks. If Hawker cannot find a buyer, it is considering shutting down its jet business, according to the statement announcing the failed deal. Hawker said it instead will focus on making aircraft that use different technology such as, the “turboprop, piston, special mission and trainer/attack [models] – the company’s most profitable products – and on its high margin parts, maintenance, repairs and refurbishment businesses, all of which have high growth potential,” according to the statement.
How the term loan crumbles
Such uncertainty has demolished more than a fifth of the value of the term loan debt since before doubts started to creep in about the deal. The cov-lite TL was active yesterday, with bids hitting as low as 56, according to sources, and holders are still trying to figure out what it will be worth coming out of bankruptcy as a standalone company.
Hawker’s secured debt consists of a $1.42 billion term loan, $241.9 million on the revolver, and $38.9 million in a synthetic L/C strip. The four main holders of the term debt are Centerbridge Partners, Angelo, Gordon & Co., Sankaty Advisors, and Capital Research & Management. Private equity sponsors that are set to lose their existing equity stakes are GS Partners and Onex Partners.
Paper tigers?
As part of the conditions of the deal, Superior couldn’t buy Hawker’s defense business, Hawker Beechcraft Defense Co., because of security concerns. Superior is 60% owned by Beijing Superior Aviation Technology, an entity owned entirely by its chairman, Shenzong Cheng, and his wife, Qin Wang. The remaining 40% is owned by an entity controlled by the Beijing municipal government. Even so, the transaction was still going to need to be reviewed by the Treasury-led interagency Committee on Foreign Investment in the United States, or CFIUS.
Recently, this type of approval has become a more sensitive issue between the U.S. and China, with two rare examples of intervention by the U.S. government in business with Chinese companies: For one, last month, the White House blocked a plan by Chinese national-owned Ralls Corp. to build four wind farms near a U.S. Navy base, after CFIUS concluded it posed security risks. That company then went on to sue CFIUS and President Obama, according to court documents, with its CEO warning that the case would deter Chinese investment in the United States, according to news reports.
Then a recent report from the House Intelligence Committee brought up the issue of potential security issues with Chinese telecom Huawei, which installed gear to manage traffic on wireless networks in the U.S. The report noted the potential for spying through Huawei gear installed to manage traffic on wireless networks. The committee also criticized Huawei management for failing to provide details about its relationships with Chinese government agencies.
Wireless-broadband provider Clearwire’s 8.25% convertible notes are being quoted at 97/100 today, according to sources, on the official announcement that Softbank Corp. is taking control of Sprint Nextel. The return to par for these notes completes a remarkable recovery from deeply distressed territory for much of the year. The exchangeable notes due 2040, with $453.7 million outstanding as of June 30, were quoted at 73/75 just last week, rising to the 90 context on Friday on the unofficial takeover talk.
The notes were valued as low as 20 cents on the dollar in December.
Softbank, a Japanese bank, officially announced on Monday that it is buying a 70% stake in Sprint for about $20.1 billion, consisting of $12.1 billion to be paid to Sprint shareholders and $8 billion of new capital onto Sprint’s balance sheet.
Clearwire shares, trading on Nasdaq under the ticker CLWR, are up another 18% today at $2.73 as of 11:17 a.m. EDT, after hitting the highest level in over a year at $2.85 today, from $1.30 last week.
Clearwire debt had already seen recovery on news earlier this year when on Aug. 8, DISH mentioned in its 10-Q that it had invested $396 million in the debt of a single issuer that was eventually interpreted to be Clearwire. Clearwire’s bonds then shot up and have continued to post small gains on speculation that DISH would somehow partner with or purchase spectrum from Clearwire. The New York Post reported Friday that Sprint is also close to a deal with Dish Networks to buy a chunk of wireless spectrum. – Max Frumes
Japan’s Daikin Industries early today announced it agreed to acquire Goodman Global, a manufacturer of HVAC products, from Hellman & Friedman for $3.7 billion.
Market participants expect that Goodman Global’s loans will be repaid in connection with the transaction, which Daiken said is expected to close in the fourth quarter. Goodman Global had about $1.4 billion outstanding under its first-lien term loan and $175 million under its second-lien as of June 30, sources said.
Daikin develops, manufactures, sells and provides aftermarket support of HVAC equipment and systems, refrigerants and other chemicals, as well as oil hydraulic products. The company said it plans to finance the transaction through a combination of internally generated funds, public policy financing, straight bond issuances and bank loans.
At closing, that dividend recap was structured as a $1.5 billion, six-year first-lien term loan, which cleared the market at L+400, with a 1.75% LIBOR floor and a 98 offer price; a $275 million, seven-year second-lien term, which cleared at L+700, with a 2% floor and a 98 offer price; and a $250 million, five-year revolving credit. The first-lien term loan had been covered by a 101 soft call premium in the first year, while the call schedule on the second-lien is 103, 102, 101 in years 1-3, respectively. – Kerry Kantin
Crescent Credit Europe has announced three hires to its London-based team.
Steven Novick has joined the firm as managing director, head of Europe, Middle East, Africa and Asia Pacific investor relations and business development, while Benjamin Blumenschein and James Scott-Williams both join as senior associates.
Novick brings 18 years of investment banking and alternative-investment capital raising experience, and will lead the efforts to expand Crescent’s investor relationships in the EMEA and Asia Pacific regions, including sovereign wealth funds and other large institutional investors.
Prior to joining Crescent, Novick was responsible for global sovereign wealth fund coverage at Credit Suisse. Prior to that, he founded and led the Middle East sovereign wealth funds and financial sponsors group for Merrill Lynch.
Blumenschein joins the firm from Bank of America Merrill Lynch, where he was an associate in the global distressed/special situations group, while Scott-Williams was most recently an associate director in the corporate structured finance team at Royal Bank of Scotland.
Crescent Capital Group invests at all levels of the capital structure, with a focus on below-investment-grade debt securities through strategies that invest in senior bank loans, high-yield debt, mezzanine-debt and distressed-debt securities. – Staff reports
ShengdaTech filed a Chapter 11 plan and disclosure statement with the U.S. Bankruptcy Court in Nevada last week, aiming for plan confirmation at an Aug. 30 hearing in Reno.
The plan entails a wind-down of the company’s business and distribution of available assets to creditors, recovered by a liquidating trustee who will see through litigation the company has already initiated in China, where its former CEO was allegedly involved in accounting irregularities. So far, a special committee formed by ShengdaTech’s board has obtained control of three Chinese bank accounts held by the company’s Chinese subsidiary, Faith Bloom, with a combined balance of about $50,000. But as of Dec. 31, 2010, those accounts were supposed to contain about $73 million, according to the company’s disclosure statement.
Under the proposed plan, holders of about $173 million in general unsecured claims will receive a pro rata share of liquidating trust assets. Although the disclosure statement outlines numerous lawsuits filed in China and the continued efforts of the special committee, which could result in a recovery, the current estimated recovery on unsecured claims is close to zero. Noteholder securities claims, shareholders’ securities claims, and equity interests will only see a recovery if general unsecured claims are paid in full.
As LCD has reported, ShengdaTech is a Chinese manufacturer of nano precipitated calcium carbonate (NPCC) with a corporate registration in China. NPCC is a specialty additive used in a variety of products to enhance their durability and efficiency, widely used in paint, paper, plastic rubber, and PVC, according to the company. A special committee of the company’s board members filed for Chapter 11 in the U.S. on Aug. 19, 2011, seeking to halt its own CEO’s alleged interference with an internal investigation into accounting regularities (see “ShengdaTech board files for Ch. 11 to continue investigation of CEO,” LCD News, Aug. 22, 2011).
At the time of its filings, ShengdaTech listed total assets of $295.4 million versus total debt of $180.9 million, though the actual level of its assets remains in question as the investigation continues.
A hearing on the company’s disclosure statement is set for June 25, with objections due by June 15. A confirmation hearing has been proposed for Aug. 30. – John Bringardner
Bright Food of China is to buy a 60% stake in Weetabix, the U.K. breakfast-cereal maker owned by Lion Capital, in a deal that could trigger a repayment of the firm’s LBO loans that were extended just last year.
The acquisition gives Weetabix an enterprise value of £1.2 billion, including shares and debt. Lion and management will continue to hold the remaining 40% of the shares, and the deal is set to complete in the second half of 2012.
Rumours that Bright Food was looking to buy Weetabix first emerged last month, though these reports were initially denied. Weetabix has long been seen as either a sale or IPO candidate, even if no formal auction process was understood to be underway.
The sale comes after Weetabix agreed to extend its debt pile in November last year. At launch of the extension, Weetabix had £495 million of drawn first-lien debt outstanding, with the second-lien debt taking the total aggregate amount outstanding to £575 million. In addition, there are two PIK tranches, which totalled £130 million for the senior and £50 million for the junior at launch.
The takeover will trigger a change of control clause on these loans, though sources said some lenders may be willing to waive this given the popularity of the credit and Lion’s continuing involvement. Last month saw a strong uptick in European repayments, with €2.4 billion repaid out of the ELLI index, compared with just €300 million in March. New loan launches, in contrast, totalled just €1.38 billion, according to LCD data.
China’s Bright Food, however, is a company that generated revenue of $12.2 billion in 2011, to give EBITDA of $1.2 billion, and so has ample access to competitively priced loan financing. To support its acquisition of a controlling stake in Manassen Foods Australia last year, the firm signed a $315 million, three-year term loan paying an all-in fee of 210 bps, including a margin of L+170.
Northamptonshire-headquartered Weetabix exports to more than 80 countries, and its other cereal brands include Alpen. – David Cox
Cement manufacturer China Shanshui Cement Group completed an issue of unsecured notes. The company was the first industrial Chinese high-yield issuer to come to market since the first half of 2011. Bookrunners Credit Suisse, Deutsche Bank, HSBC, and J.P. Morgan placed the Reg S/144A notes after a slight delay related to ensuring that disclosure was satisfactory, following a full global roadshow in Hong Kong, Singapore, London, and the U.S., sources said. Proceeds will be used to refinance debt. The final order book totaled $1.6 billion spread over 180 accounts, with 58% of the bonds placed with investors in Asia, 30% placed with U.S. accounts, and 12% with European investors, sources said. Three-quarters of the issue was placed with fund managers, 12% with private banks, 7% with banks, and 6% with insurers. The new bonds are at 100/100.25 in the secondary market, sources said. The issuer’s outstanding 8.5% notes due 2016 were yielding 9.8% around the same time. Terms:
Chinese property development company Agile Property placed an issue of senior unsecured notes. The Reg S, registered bonds priced at the tight end of guidance of 9.9-10%, in firm market conditions, sources said. Bookrunners were HSBC, Standard Chartered Bank, and UBS. Of the final order book, which totaled roughly $6.25 billion, 82% of the deal was placed with investors in Asia, and 18% was placed in Europe, sources said. Notes are guaranteed by certain non-PRC subsidiaries. The company plans to use proceeds to finance land acquisitions, refinance debt, and fund general corporate purposes. Terms:
The appointment of Chan, who identifies structured securities potentially of interest to U.S. clients as well as funding opportunities for Asian corporates, represents an expansion of the firm’s existing platform.
Chan reports to Randy Li in New York, who heads the strategic credit group for Mizuho Securities USA, and Donal Galvin in Hong Kong, who is head of sales and trading for Mizuho Securities Asia. Chan joined Mizuho Securities USA in December 2011 from mCAPITAL, an investment manager specializing in distressed opportunities and restructurings, headed by Mark Devonshire, formerly of Merrill Lynch. – Abby Latour | {
"pile_set_name": "Pile-CC"
} |
Validating the custom_probes File
Before you can use a profile, rules, and custom_probes file, you must run the check script
to validate that the files are set up correctly. If all profiles, rules, and
probe and comparison functions are correctly set up, the rules.ok and custom_probes.ok files are created. Table 5–1 describes what the check script does.
Table 5–1 What Happens When You
Use the check Script
Stage
Description
1
check searches for a custom_probes file.
2
If the file exists, check creates
the custom_probes.ok file from the custom_probes file,
removes all comments and blank lines, and retains all Bourne shell commands,
variables, and algorithms. Then, check adds the following
comment line at the end:
# version=2 checksum=num
To Validate the custom_probes File
Verify that the check script
is located in the JumpStart directory.
Note –
The check script is in the Solaris_10/Misc/jumpstart_sample directory on the Solaris Operating System DVD or on the Solaris Software - 1 CD.
Change to the JumpStart directory.
Run the check script
to validate the rules and custom_probes files.
$ ./check-ppath-rfile_name
-ppath
Validates the custom_probes file by using
the check script from the Solaris software image for
your platform instead of the check script from the system
you are using. path is the image on a local disk
or a mounted Solaris Operating System DVD or Solaris Software - 1 CD.
Use this option to run the most recent
version of check if your system is running a previous version
of Solaris.
-rfile_name
Specifies a file name other than the one that is named custom_probes. By using the -r option, you can
test the validity of a set of functions before integrating the functions into
the custom_probes file.
As the check script
runs, the script reports the validity of the rules and custom_probes files and each profile. If no errors are encountered,
the script reports: “The custom JumpStart configuration is ok”
and creates the rules.ok and custom_probes.ok files
in the JumpStart directory. | {
"pile_set_name": "Pile-CC"
} |
Universal alternating order around impurities in antiferromagnets.
The study of impurities in antiferromagnets is of considerable interest in condensed matter physics. In this Letter we address the elementary question of the effect of vacancies on the orientation of the surrounding magnetic moments in an antiferromagnet. In the presence of a magnetic field, alternating magnetic moments are induced, which can be described by a universal expression that is valid in any ordered antiferromagnet and turns out to be independent of temperature over a large range. The universality is not destroyed by quantum fluctuations, which is demonstrated by quantum Monte Carlo simulations of the two-dimensional Heisenberg antiferromagnet. Physical predictions for finite doping are made, which are relevant for experiments probing Knight shifts and the order parameter. | {
"pile_set_name": "PubMed Abstracts"
} |
When I Become a Billionaire
For a long time I’ve held this theory that when I become a billionaire my life will be perfect.
I’ll no longer lose things, I’ll always be on time, I won’t break things when I drop them, I’ll never get tired and certainly I won’t ever get stuck in traffic.
Every time something goes wrong in my life I immediately think, if I had billions of dollars this wouldn’t be happening.
So I decided to challenge this thinking. When I can’t find my keys I’m going to stop thinking this wouldn’t be happening if I were rich, instead I’m reminding myself to think that perhaps if I put my keys in a sensible place I wouldn’t lose them.
Now when I burn myself when cooking I’m realising that even if I was rich I would still burn myself because I’m not wearing an oven mitt.
And if I drop and break a plate, I would have dropped it, even if my bank account was huge (plus the plate could be a irreplaceable antique).
So if you notice me going on about “when I’m a billionaire”, just remind me that the laws of gravity remain the same, rich or poor.
Mind you, if I do become a billionaire the first thing I’m going to do is buy a police car so I can use my siren whenever I get stuck in traffic. | {
"pile_set_name": "Pile-CC"
} |
Hadefi A, Degré D, Trépo E, Moreno C. Noninvasive diagnosis in alcohol‐related liver disease. Health Sci Rep. 2020;3:e146 10.1002/hsr2.146
**Data Availability Statement:**Data sharing is not applicable to this article as no new data were created or analyzed in this study.
**Funding information** Fonds Erasme pour la recherche médicale
1. INTRODUCTION {#hsr2146-sec-0003}
===============
Liver disease is an important cause of global mortality and morbidity.[1](#hsr2146-bib-0001){ref-type="ref"}, [2](#hsr2146-bib-0002){ref-type="ref"} For example, in the United Kingdom, mortality attributable to liver disease rose fourfold between 1980 and 2013,[3](#hsr2146-bib-0003){ref-type="ref"} and evidence suggests that liver disease will likely overtake ischemic heart disease as the leading cause of years of working life lost.[4](#hsr2146-bib-0004){ref-type="ref"} Despite the increasing prevalence of nonalcoholic fatty liver disease (NAFLD), 41% of liver deaths are still attributable to alcohol.[5](#hsr2146-bib-0005){ref-type="ref"} Indeed, alcohol‐related liver disease (ALD) is a major cause of death worldwide.[6](#hsr2146-bib-0006){ref-type="ref"} Although Europe has the highest levels of reported *per capita* alcohol consumption,[7](#hsr2146-bib-0007){ref-type="ref"} there is heterogeneity between countries in terms of liver disease‐related death.[8](#hsr2146-bib-0008){ref-type="ref"}, [9](#hsr2146-bib-0009){ref-type="ref"} This is mainly due to discrepancies between effective national public health policies and population level alcohol consumption.[8](#hsr2146-bib-0008){ref-type="ref"} Unfortunately, despite the fact that liver disease patients die at a younger age, little progress has been made in implementing comprehensive alcohol control strategies.
The spectrum of ALD comprises a variety of clinical, radiological, and histological conditions, from simple steatosis, steatohepatitis, and progressive fibrosis, to cirrhosis and its complications.[5](#hsr2146-bib-0005){ref-type="ref"}, [10](#hsr2146-bib-0010){ref-type="ref"} While steatosis is present in almost all heavy drinkers, only 8% to 20% of these patients will ultimately develop cirrhosis.[10](#hsr2146-bib-0010){ref-type="ref"} However, a recent study reported that 73% of patients admitted to the hospital for the first time with cirrhosis or liver failure were unaware of their condition, suggesting that most patients are diagnosed at a decompensated stage or advanced disease.[11](#hsr2146-bib-0011){ref-type="ref"} Furthermore, it seems that ALD is rarely detected at early stages compared with liver diseases of other etiologies.[12](#hsr2146-bib-0012){ref-type="ref"}
Since fibrosis is the major predictive factor of long‐term survival in compensated patients,[12](#hsr2146-bib-0012){ref-type="ref"} its detection is crucial before decompensation (which is associated with a poorer prognosis[13](#hsr2146-bib-0013){ref-type="ref"}, [14](#hsr2146-bib-0014){ref-type="ref"}) in order to promote the reduction and, ideally, complete withdrawal, of alcohol consumption.
Considering that in its earlier stages, ALD is a silent disease, screening tools to identify individuals with alcohol use disorders (AUDs) and tests to detect liver fibrosis must be implemented, particularly among general practitioners and psychiatric units. Although liver biopsy is still the gold standard for estimating liver fibrosis,[15](#hsr2146-bib-0015){ref-type="ref"} it cannot be proposed as a screening tool due to the risk of complications and cost.[15](#hsr2146-bib-0015){ref-type="ref"} Therefore, while initially developed in chronic hepatitis C and NAFLD,[16](#hsr2146-bib-0016){ref-type="ref"}, [17](#hsr2146-bib-0017){ref-type="ref"} noninvasive tests have become increasingly used in clinical practice in order to evaluate the severity of liver fibrosis in other etiologies of liver disease. They have proven to have not only an excellent predictive value for diagnosis of advanced fibrosis but also an adequate prognostic value.[18](#hsr2146-bib-0018){ref-type="ref"}
This review article focuses on screening and noninvasive diagnostic tools for the detection of liver fibrosis in patients with ALD and their importance in clinical practice. We will also briefly summarize novel biomarkers currently being investigated as well as future directions and new opportunities in the noninvasive diagnosis of ALD.
2. THE CLINICAL PROBLEM: WHO AND HOW TO EVALUATE AND FOLLOW FOR ALD? {#hsr2146-sec-0004}
====================================================================
2.1. Who should we screen? {#hsr2146-sec-0005}
--------------------------
Data are conflicting regarding the definition of a safe alcohol limit, with no clear threshold effect.[19](#hsr2146-bib-0019){ref-type="ref"} Interestingly, the old statement that moderate alcohol consumption is protective for ischemic heart disease and diabetes in women was recently counterbalanced by a worldwide comprehensive study that assessed estimations of alcohol use, alcohol attributable deaths, and disability‐adjusted life‐years.[19](#hsr2146-bib-0019){ref-type="ref"} It was reported that the level of consumption that minimizes an individual\'s risk is 0 g of ethanol per week. This threshold is likely related to the risk of cancer associated with alcohol consumption, which is based on a linear dose relationship,[20](#hsr2146-bib-0020){ref-type="ref"}, [21](#hsr2146-bib-0021){ref-type="ref"} whereas for liver diseases, the relationship is exponential.[20](#hsr2146-bib-0020){ref-type="ref"}, [21](#hsr2146-bib-0021){ref-type="ref"} A meta‐analysis[22](#hsr2146-bib-0022){ref-type="ref"} found that the threshold associated with increased risk of mortality from liver cirrhosis among men and women is 12 to 24 g of ethanol per day. Beyond the specific amount of alcohol, drinking patterns are also an issue, with daily and binge drinking also being associated with a higher risk of liver cirrhosis.[23](#hsr2146-bib-0023){ref-type="ref"}, [24](#hsr2146-bib-0024){ref-type="ref"}, [25](#hsr2146-bib-0025){ref-type="ref"} Furthermore, competing risk factors must be taken into account when considering the thresholds of \>30 g/d for men and \>20 g/d for women used in daily clinical practice.[5](#hsr2146-bib-0005){ref-type="ref"} Among these, obesity, in addition to being an independent factor associated with ALD progression,[26](#hsr2146-bib-0026){ref-type="ref"} when associated with a body mass index (BMI) \> 30, is not only additive but also synergistic. One study that assessed obese patients with excess drinking (more than 15 drinks per week) compared with lean patients with the same drinking pattern revealed that the adjusted relative rates for liver disease mortality were 18.9 (95% CI, 6.84‐52.4) and 3.16 (95% CI, 1.28‐7.8), respectively.[27](#hsr2146-bib-0027){ref-type="ref"} Similarly, components of the metabolic syndrome, such as type 2 diabetes and/or insulin resistance, are also independent predictors of liver‐related mortality in ALD.[28](#hsr2146-bib-0028){ref-type="ref"} Furthermore, a recent study has evaluated the association between early age alcohol consumption and the occurrence of severe liver disease.[29](#hsr2146-bib-0029){ref-type="ref"} Surprisingly, there was no threshold effect, the risk was dose dependent, and alcohol consumption in early age was associated with an increased risk of severe liver disease. Lastly, lower socioeconomic status has also been associated with a higher risk of mortality from ALD,[30](#hsr2146-bib-0030){ref-type="ref"}, [31](#hsr2146-bib-0031){ref-type="ref"} although the underlying explanatory factors for this finding are not yet fully understood. Collectively, as highlighted, the commonly used threshold effect is inaccurate by itself, and we should likely lower the drinking limit in patients who present with comorbid factors.
Finally, screening for harmful alcohol consumption should be done in primary care and other health and community settings in order to deliver effective intervention,[5](#hsr2146-bib-0005){ref-type="ref"} even though the long‐term effects of screening on abstinence and relapse still need to be determined with real‐life data.
2.2. How do we screen? {#hsr2146-sec-0006}
----------------------
Noninvasive methods to detect liver fibrosis rely on two different approaches: the biological approach based on the quantification of biomarkers in serum samples and a physical approach based on the measurement of liver stiffness (LS) using imaging techniques. These two approaches will be described below.
As highlighted previously, considering the fact that liver fibrosis is the major predictor of long‐term survival, we will focus on this aspect in this review, and diagnosis and evaluation of liver steatosis in ALD will not be discussed in this article.
### 2.2.1. Biological tests {#hsr2146-sec-0007}
Several nonpatented and patented serum biomarkers (Table [1](#hsr2146-tbl-0001){ref-type="table"}) are widely used in daily clinical practice, and numerous studies have assessed their performance in liver fibrosis and cirrhosis. Among them, Fibrotest (FT) and Enhanced Liver Fibrosis (ELF), two patented serum biomarkers, demonstrate the highest performance for fibrosis quantification and have comparable diagnostic accuracy.[32](#hsr2146-bib-0032){ref-type="ref"} The FT score is based on an algorithm calculated from six serum markers, whereas the ELF test integrates three direct serum markers of extracellular matrix remodeling and fibrogenesis, namely, hyaluronic acid, tissue inhibitor of metalloproteinase‐1, and N‐terminal propeptide for collagen type III.[35](#hsr2146-bib-0035){ref-type="ref"} The latter is considered to be a direct marker of fibrosis, since it provides a direct measurement of the degree of extracellular material deposition.[35](#hsr2146-bib-0035){ref-type="ref"} The reproducibility and performance of the ELF score was initially evaluated in a large cohort of patients with chronic liver disease with mixed etiologies,[35](#hsr2146-bib-0035){ref-type="ref"} and a recent Danish study[32](#hsr2146-bib-0032){ref-type="ref"} has confirmed the high accuracy of the ELF test, showing that it is similar to FT in the assessment of liver fibrosis in ALD (area under the ROC curve \[AUROC\] of 0.92 and 0.90, respectively). Among other patented biomarkers, Fibrometer and Hepascore show comparable accuracy that does not differ from that of FT in patients with ALD.[33](#hsr2146-bib-0033){ref-type="ref"} Although the above‐mentioned patented biomarkers and FT showed similar accuracy in the prediction of advanced fibrosis and cirrhosis, in a multivariate analysis, FT alone was the most informative biomarker in terms of diagnostic and prognostic performance. Despite their excellent accuracy, these patented tests lack widespread applicability due to their high costs.
######
Performance of biological tests for the diagnosis of advanced fibrosis and cirrhosis in patients with biopsy‐proven ALD
Tests Patients, n Endpoint AUC Se, % Sp, % NPV, % PPV, %
-------------------------------------------------------------------------------------------- ------------- ---------- ----------- ----------- ----------- -------- --------
ELF ≥10.5[32](#hsr2146-bib-0032){ref-type="ref"} 289 F3‐F4 0.92‐0.94 79 91 94 71
FT ≥0.58[32](#hsr2146-bib-0032){ref-type="ref"} 289 F3‐F4 0.88‐0.88 67 87 90 60
Fibrometer[33](#hsr2146-bib-0033){ref-type="ref"}, [34](#hsr2146-bib-0034){ref-type="ref"} 218 F3‐F4 0.83‐0.94 91.8‐91.8 92.3‐92.3 NA NA
Hepascore[33](#hsr2146-bib-0033){ref-type="ref"}, [34](#hsr2146-bib-0034){ref-type="ref"} 218 F3‐F4 0.83‐0.92 NA NA NA NA
APRI ≥1.0[32](#hsr2146-bib-0032){ref-type="ref"} 289 F3‐F4 0.80‐0.85 38 90 83 52
Fib‐4 ≥ 3.25[32](#hsr2146-bib-0032){ref-type="ref"} 289 F3‐F4 0.85‐0.89 58 91 88 64
Abbreviations: ALD, alcohol‐related liver disease; APRI, aspartate transaminase‐platelet ratio index; AUC, area under the curve; ELF, Enhanced Liver Fibrosis; FT, Fibrotest; Se, sensitivity; Sp, specificity; NPV, negative predictive value; PPV, positive predictive value; NA, not available.
Nonpatented serum biomarkers have also been assessed in ALD. Aspartate transaminase‐platelet ratio index (APRI) includes AST and platelet count as variables and has been assessed in 507 patients with ALD.[36](#hsr2146-bib-0036){ref-type="ref"} APRI values \>1.5 had a sensitivity and specificity of 13.2% and 77.6%, respectively, for the diagnosis of significant fibrosis, whereas a cutoff \>2 had a sensitivity and specificity for the diagnosis of cirrhosis of 16.9% and 86.4%, respectively,[36](#hsr2146-bib-0036){ref-type="ref"} suggesting a lack of clinical utility. This low diagnostic performance was also established in a Danish prospective study that evaluated the accuracy of direct and indirect biomarkers.[32](#hsr2146-bib-0032){ref-type="ref"} Similarly, the fibrosis‐4 (Fib‐4) score also demonstrated low diagnostic performance, with AUROCs for advanced fibrosis, significant fibrosis, and cirrhosis of 0.85, 0.77, and 0.89, respectively.[32](#hsr2146-bib-0032){ref-type="ref"} Altogether, despite their higher cost compared with nonpatented and other patented serum biomarkers, the FT and ELF tests provide the best diagnostic and prognostic performance to date in the identification of advanced liver fibrosis. Additionally, these biomarkers (in particular, the ELF test) are highly cost‐effective and should be tested in primary health care settings.[37](#hsr2146-bib-0037){ref-type="ref"}, [38](#hsr2146-bib-0038){ref-type="ref"} Lastly, advanced fibrosis can be ruled out in primary health care patients with an ELF value \<10.5 or an FT \< 0.58.[32](#hsr2146-bib-0032){ref-type="ref"} Therefore, these tests might be helpful in reducing the need for liver biopsy.
### 2.2.2. Transient elastography {#hsr2146-sec-0008}
One‐dimensional ultrasound transient elastography (TE), or Fibroscan (Echosens, Paris, France), is a physical approach aimed at measuring the velocity of a low‐frequency (50 Hz) elastic shear wave spreading through the liver.[39](#hsr2146-bib-0039){ref-type="ref"} This velocity is directly related to LS, such that the stiffer the tissue, the faster the shear wave spreads. Shear wave velocity is then converted into a liver stiffness measurement (LSM). This technique has numerous advantages, such as a short procedure time (\<5 min), immediate results, ability to perform the procedure at the bedside or in an outpatient clinic, well‐defined quality criteria, and good reproducibility.[40](#hsr2146-bib-0040){ref-type="ref"} Furthermore, it has been demonstrated that the learning curve is reasonable[41](#hsr2146-bib-0041){ref-type="ref"} and that the minimal training required to be able to perform the test is about 100 exams. Although the methodology has excellent interobserver and intraobserver agreement (intraclass correlation coefficient of 0.98),[40](#hsr2146-bib-0040){ref-type="ref"}, [42](#hsr2146-bib-0042){ref-type="ref"} its applicability is lower compared with serum biomarkers. In a French study evaluating the reliability (defined as fewer than 10 valid shots) and failure rate (defined as zero valid shots) of more than 13 369 examinations,[43](#hsr2146-bib-0043){ref-type="ref"} LSM failure and unreliable results occurred in 3.1% and 15.8% cases, respectively, whereas the mean applicability rate of FT was 99.03%.[44](#hsr2146-bib-0044){ref-type="ref"} However, despite the failure rate of TE, it still outperformed liver biopsy, which has been associated with a sampling error of nearly 30%.[45](#hsr2146-bib-0045){ref-type="ref"}, [46](#hsr2146-bib-0046){ref-type="ref"}, [47](#hsr2146-bib-0047){ref-type="ref"}, [48](#hsr2146-bib-0048){ref-type="ref"} Nevertheless, even if TE is an excellent surrogate marker of advanced fibrosis and cirrhosis, it has some limitations, and confounding variables must be addressed to ensure the correct interpretation of results obtained from TE. The main confounders to be taken into consideration are nonfasting,[49](#hsr2146-bib-0049){ref-type="ref"}, [50](#hsr2146-bib-0050){ref-type="ref"}, [51](#hsr2146-bib-0051){ref-type="ref"} inflammation,[52](#hsr2146-bib-0052){ref-type="ref"}, [53](#hsr2146-bib-0053){ref-type="ref"} inexperience,[41](#hsr2146-bib-0041){ref-type="ref"}, [43](#hsr2146-bib-0043){ref-type="ref"} congestion,[54](#hsr2146-bib-0054){ref-type="ref"}, [55](#hsr2146-bib-0055){ref-type="ref"} alcohol,[56](#hsr2146-bib-0056){ref-type="ref"} obesity,[43](#hsr2146-bib-0043){ref-type="ref"}, [57](#hsr2146-bib-0057){ref-type="ref"} cholestasis,[58](#hsr2146-bib-0058){ref-type="ref"} amyloidosis,[59](#hsr2146-bib-0059){ref-type="ref"} and alcoholic hepatitis (AH)[60](#hsr2146-bib-0060){ref-type="ref"} **(**Table [2](#hsr2146-tbl-0002){ref-type="table"}). However, for obese patients, an XL probe has been developed,[66](#hsr2146-bib-0066){ref-type="ref"} which can result in reduced TE failure and improved reliability of LSM, but it must be kept in mind that LS cutoffs are lower with the XL probe. Additionally, these LS cutoffs must also be adjusted to the AST level. This feature was initially observed in viral hepatitis, where LSM correlated positively with transaminase levels,[67](#hsr2146-bib-0067){ref-type="ref"}, [68](#hsr2146-bib-0068){ref-type="ref"} and later on, in ALD.[56](#hsr2146-bib-0056){ref-type="ref"}, [69](#hsr2146-bib-0069){ref-type="ref"} A German study[56](#hsr2146-bib-0056){ref-type="ref"} performed sequential LSM before and after normalization of transaminases in patients with ALD admitted for alcohol withdrawal. They demonstrated that an AST level \>100 U/L was associated with a lack of reliable diagnosis of fibrosis, whereas levels of AST lower than 100 and 50 U/L were related to high accuracy detection of F3 (only AST level \< 50 U/L) and F4 fibrosis, respectively. These results have also been confirmed by other studies,[70](#hsr2146-bib-0070){ref-type="ref"}, [71](#hsr2146-bib-0071){ref-type="ref"} in which alcohol withdrawal was associated with a significant decrease in LSM. The influence of AST in LSM might be explained by inflammation, which has been identified as a confounding factor,[50](#hsr2146-bib-0050){ref-type="ref"}, [51](#hsr2146-bib-0051){ref-type="ref"} and by the direct relationship (except in the setting of cirrhosis) between AST levels and the amount of alcohol consumed.[54](#hsr2146-bib-0054){ref-type="ref"} In order to better determine the inflammation‐adapted cutoff values, Mueller et al[72](#hsr2146-bib-0072){ref-type="ref"} have assessed LS and liver tests in 2086 biopsy‐proven patients with ALD and chronic HCV. They showed that AST has the best correlation with LS, whereas fibrosis cutoff values in patients without elevated transaminases levels were almost comparable between ALD and HCV patients. Lastly, the fibrosis cutoff values increased exponentially as a function of median AST level in ALD patients.
######
Characteristics of the available elastography techniques for liver fibrosis stratification
Techniques Evidence in ALD Availability Confounders Failure Rate (%) Cost
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------- -------------- ------------- ------------------ ---------------------------------- --------------- -----
TE[41](#hsr2146-bib-0041){ref-type="ref"}, [43](#hsr2146-bib-0043){ref-type="ref"}, [49](#hsr2146-bib-0049){ref-type="ref"}, [50](#hsr2146-bib-0050){ref-type="ref"}, [51](#hsr2146-bib-0051){ref-type="ref"}, [52](#hsr2146-bib-0052){ref-type="ref"}, [53](#hsr2146-bib-0053){ref-type="ref"}, [54](#hsr2146-bib-0054){ref-type="ref"}, [55](#hsr2146-bib-0055){ref-type="ref"}, [56](#hsr2146-bib-0056){ref-type="ref"}, [57](#hsr2146-bib-0057){ref-type="ref"}, [58](#hsr2146-bib-0058){ref-type="ref"} +++ +++ ++ ++ congestion, alcohol, amyloidosis 3.1‐15.8 (39) €
ARFI/pSWE[61](#hsr2146-bib-0061){ref-type="ref"}, [62](#hsr2146-bib-0062){ref-type="ref"}, [63](#hsr2146-bib-0063){ref-type="ref"}, [64](#hsr2146-bib-0064){ref-type="ref"} \+ ++ \+ ++ ? 2.1 (66) €€
2D‐SWE[32](#hsr2146-bib-0032){ref-type="ref"}, [64](#hsr2146-bib-0064){ref-type="ref"} \+ \+ ? ? ? 4 €€
MRE[65](#hsr2146-bib-0065){ref-type="ref"} \+ \+ ++ ++ ? 4.3 €€€
Abbreviations: ?, limited data; ALD, alcoholic liver disease; ARFI, acoustic radiation force imaging; MRE, magnetic resonance elastography; TE, transient elastography; SWE, shear wave elastography.
Interestingly, AST levels have an influence not only on LS but also on bilirubin concentration. A recent meta‐analysis[60](#hsr2146-bib-0060){ref-type="ref"} combining individual data from 1026 patients with ALD has determined LS cutoffs as a function of both AST and bilirubin concentration. Indeed, AST and bilirubin levels higher than 38.7 U/L and 9.0 μmol/L, respectively, were associated with significantly higher LS cutoff values (for F ≥ 1).
Although TE presents some limitations, this technique is characterized by an outstanding performance in the estimation of liver fibrosis. Several biopsy‐proven ALD studies have established LS cutoffs for cirrhosis (Table [3](#hsr2146-tbl-0003){ref-type="table"}), but substantial interstudy variability exists, which can be explained by the confounders highlighted previously. However, a recent meta‐analysis[60](#hsr2146-bib-0060){ref-type="ref"} with more than 1000 ALD patients has determined diagnostic cutoffs values for F ≥ 3 and F = 4 of 12.1 and 18.6 kPa, with AUROC values of 0.90 and 0.91, respectively. Lastly, in the Danish study,[32](#hsr2146-bib-0032){ref-type="ref"} TE showed similar excellent diagnostic accuracy compared with the ELF and FT tests in intention to diagnose but did differ in the per‐protocol analysis, in favor of TE (AUROC for TE was 0.97 versus 0.92 for the ELF test and 0.90 for FT).
######
Performances of Transient Elastography for the diagnosis of advanced fibrosis and cirrhosis in patients with biopsy‐proven ALD
Authors Year Design Patients, n Age, y Endpoint Prevalence, % Cutoff, kPa AUC Se, % Sp, %
---------------------------------------------------------- ------ -------- ------------- ------------- ---------- --------------- ------------- ----------- ----------- -----------
Nahon et al[73](#hsr2146-bib-0073){ref-type="ref"} 2008 P 147 54.4 ± 8.9 F3‐F4 71‐48 12.9‐22.6 0.94‐0.87 81‐84 89‐80
Nguyen‐Khac et al[74](#hsr2146-bib-0074){ref-type="ref"} 2008 P 103 52.6 ± 9.6 F3‐F4 53‐32 11‐19.5 0.90‐0.92 86.7‐85.7 80.5‐84.2
Kim et al[75](#hsr2146-bib-0075){ref-type="ref"} 2009 R 45 49 ± 8 F3‐F4 80‐64 18.5‐25.8 0.98‐0.97 89‐90 89‐87
Boursier et al[76](#hsr2146-bib-0076){ref-type="ref"} 2009 P 91 56 ± 10 F3‐F4 69‐37 11.4‐17.3 0.85‐0.91 75‐82 75‐79
Mueller et al[56](#hsr2146-bib-0056){ref-type="ref"} 2010 P 101 53.2 ± 10.6 F3‐F4 66‐60 8.0‐11.5 0.91‐0.92 91‐100 75‐77
Janssens et al[77](#hsr2146-bib-0077){ref-type="ref"} 2010 R 48 55 ± 9 F3‐F4 65‐40 17.2‐21.7 0.75‐0.89 71‐79 71‐79
Fernandez et al[78](#hsr2146-bib-0078){ref-type="ref"} 2015 R 112 55 ± 10 F3‐F4 46‐29 15.2‐24.3 0.84‐0.90 79‐81 78‐82
Thiele et al[79](#hsr2146-bib-0079){ref-type="ref"} 2016 P 189 49 ± 10 F3‐F4 40‐15 8.8‐16.9 0.89‐0.94 80‐88 83‐88
Voican et al[80](#hsr2146-bib-0080){ref-type="ref"} 2017 P 188 55 ± 11 F3‐F4 22‐14 13‐20.8 0.96‐0.90 90‐89 90‐90
Nguyen‐Khac et al[60](#hsr2146-bib-0060){ref-type="ref"} 2018 M 1026 54 ± 11 F3‐F4 65‐42 12.1‐18.6 0.90‐0.91 81‐84 83‐85
Abbreviations: P, prospective; R, retrospective; M, meta‐analysis; AUC, area under the curve; Se, sensitivity; Sp, specificity.
### 2.2.3. Other imaging techniques {#hsr2146-sec-0009}
Given the success and the remarkable efficiency of TE in predicting liver fibrosis, other imaging techniques for the assessment of tissue stiffness have been developed and have recently emerged in clinical practice. Acoustic radiation force imaging (ARFI) and 2D‐shear wave elastography (SWE) are increasingly being evaluated in various etiologies of chronic liver disease and have become more commonly used in daily clinical practice. Only a few small trials[61](#hsr2146-bib-0061){ref-type="ref"}, [62](#hsr2146-bib-0062){ref-type="ref"} have evaluated ARFI in patients with ALD, and these have shown a diagnostic accuracy of 86% to 88% for advanced fibrosis (F ≥ 3) and 89% for cirrhosis. Nevertheless, ARFI has the advantage of fast implementation on commercial ultrasound machines and lower rates of failure compared with TE, as well as better performance in patients with ascites and obesity[81](#hsr2146-bib-0081){ref-type="ref"} (Table [2](#hsr2146-tbl-0002){ref-type="table"}). Similarly to TE, ARFI measurements are influenced by food intake and AST levels.[63](#hsr2146-bib-0063){ref-type="ref"}, [64](#hsr2146-bib-0064){ref-type="ref"} A recent meta‐analysis[82](#hsr2146-bib-0082){ref-type="ref"} based on individual data from 13 centers (mainly related to viral hepatitis and NAFLD) has evaluated the diagnostic accuracy of 2D‐SWE. The study reported AUROC values of 91% and 95% for advanced fibrosis and cirrhosis, with optimal cutoffs of 9.2 and 13.5 kPa, respectively. A smaller clinical trial in ALD patients[32](#hsr2146-bib-0032){ref-type="ref"} has also assessed the performance of 2D‐SWE compared with patented biomarkers and TE. The authors reported excellent diagnostic accuracy, with AUROC values (in intention to diagnose) of 0.93 for advanced fibrosis and cirrhosis, which is higher than those for TE (AUROC of 0.89 for advanced fibrosis and 0.87 for cirrhosis). Altogether, larger studies are needed in patients with ALD to, first, better characterize the performances of these techniques and, second, perform head‐to‐head comparisons between all the imaging modalities available. Furthermore, quality criteria as well as standardization of units between the different platforms need to be better defined.
Lastly, magnetic resonance elastography (MRE) quantifies elasticity (expressed in kPa) using a formula that characterizes the shear modulus, which is equivalent to one‐third of the Young modulus used with TE.[83](#hsr2146-bib-0083){ref-type="ref"}, [84](#hsr2146-bib-0084){ref-type="ref"} It has also been evaluated in a meta‐analysis (mostly viral hepatitis and NAFLD) based on 12 retrospective studies, comprising 697 patients.[65](#hsr2146-bib-0065){ref-type="ref"} The diagnostic accuracy of any fibrosis, significant fibrosis, advanced fibrosis, and cirrhosis was 0.84, 0.88, 0.93, and 0.92, respectively, with an overall failure rate of 4.3% (Table [2](#hsr2146-tbl-0002){ref-type="table"}). In a head‐to‐head comparison between 3D‐MRE vs 2D‐MRE, 3D‐MRE was superior to 2D‐MRE, with an AUROC for the detection of advanced fibrosis of 0.98 (3D‐MRE) vs 0.92 (2D‐MRE).[85](#hsr2146-bib-0085){ref-type="ref"} Unfortunately, its implementation in daily clinical practice is rather difficult due to the higher cost, the time consumed by the procedure, and the low availability of MR machines, ultimately resulting in lower applicability.
2.3. Use in clinical practice {#hsr2146-sec-0010}
-----------------------------
In patients with suspected ALD (presence of AUD, abnormal liver tests with AST/ALT \>1, high levels of γ‐glutamyltransferase \[although neither specific, nor sensitive, particularly in the cirrhotic stage[86](#hsr2146-bib-0086){ref-type="ref"}\], and no other causes of chronic liver disease \[HCV, HBV, or NAFLD\]), noninvasive tests can be used in clinical practice for the detection of advanced fibrosis. Although physical and biological approaches are complementary, the latter is more suited as a screening tool given the local availability in primary health care. Figure [1](#hsr2146-fig-0001){ref-type="fig"} depicts our proposed algorithm for the use of noninvasive methods for risk stratification of patients with ALD in clinical practice. AUD should be screened in primary health care, alcohol rehabilitation centers, and in psychiatric units, since the prevalence of AUD is higher in patients with psychiatric disorders.[87](#hsr2146-bib-0087){ref-type="ref"} In order to increase the identification of AUD and to better characterize patients\' drinking habits, screening tools have been developed, including one of the most validated and widely used, the Alcohol Use Disorders Inventory Test (AUDIT).[88](#hsr2146-bib-0088){ref-type="ref"} For low prevalence populations, such as patients in the primary health care sector, serum biomarkers with high negative predictive value (\>94%), such as the ELF score and FT, should be used as a first‐line method to rule out advanced fibrosis. Although patented biomarkers are considered to have lower applicability compared with nonpatented ones given their higher cost, two recent studies[37](#hsr2146-bib-0037){ref-type="ref"}, [38](#hsr2146-bib-0038){ref-type="ref"} have found that the ELF score is cost‐effective in primary health care[38](#hsr2146-bib-0038){ref-type="ref"} for fibrosis assessment in patients with ALD. Patients with low risk of advanced fibrosis (ELF \< 10.5, FT \< 0.58) should be offered interventions aiming to reduce, and eventually withdraw, alcohol consumption. For those who reach alcohol abstinence, no further assessments are needed. For those who either resume alcohol consumption or cannot reduce their drinking habits, a follow‐up should be offered in order to detect early advanced fibrosis. Those at high risk of having advanced fibrosis (ELF score ≥ 10.5, FT ≥ 0.58) should be referred to a liver clinic. For high prevalence populations, such as patients in secondary care (alcohol rehabilitation centers and psychiatric units), direct referral to TE is highly effective.[38](#hsr2146-bib-0038){ref-type="ref"} TE is the most widely available and best evaluated technique in ALD for the measurement of LS, although ARFI and 2D‐SWE are also becoming increasingly available.[89](#hsr2146-bib-0089){ref-type="ref"} The XL probe should be used for obese patients in order to minimize the expected higher TE failures. In case of TE failure, 2D‐SWE might be an alternative, depending on local availability. Patients at low risk of having advanced fibrosis (LSM \< 6 kPa) should be offered the same interventions previously described to reduce and/or withdraw alcohol. In patients with LSM ≥6 kPa, caution should be taken in the interpretation of LS, considering the potential confounders highlighted previously, which could increase LS. An ultrasound should be proposed in order to exclude congestion and mechanical cholestasis. If the laboratory shows elevated AST and bilirubin levels, and if the patient is not abstinent, one may either consider establishing interventions leading to alcohol detoxification and repeat TE afterwards or use AST‐adapted cutoff values if alcohol withdrawal is not feasible. In addition, asymptomatic or symptomatic AH is also associated with increased LS values. Therefore, laboratory features of AH should also be explored in order to exclude this clinical syndrome. So far, in a large ALD meta‐analysis,[60](#hsr2146-bib-0060){ref-type="ref"} LS cutoffs according to histological fibrosis stage were determined to be 7.0 kPa for F ≥ 1 fibrosis; 9.0 kPa for F ≥ 2 fibrosis; 12.1 kPa for F ≥ 3 fibrosis; and 18.6 kPa for F = 4. Furthermore, if LSM \> 20 kPa, an ultrasound should be offered in order to exclude hepatocellular carcinoma (HCC) as well as an upper endoscopy aiming to assess the presence of gastroesophageal varices. Lastly, those with a high risk of having advanced fibrosis (after exclusion of confounders) should be considered for liver biopsy if they present with certain features. These include no indirect signs of liver cirrhosis at imaging (findings of portal hypertension \[PHT\] or liver dysmorphism) with LSM suggesting F3‐F4 stage, or the presence of diagnostic doubt regarding other causes of chronic liver disease such as viral hepatitis or auto‐immune disease.
{ref-type="ref"} with permission from Elsevier](HSR2-3-e146-g001){#hsr2146-fig-0001}
2.4. Why are noninvasive tests of clinical importance? {#hsr2146-sec-0011}
------------------------------------------------------
In addition to the excellent accuracy of noninvasive tests for the estimation of liver fibrosis, recent studies have shown that TE and serum biomarkers also have the ability to predict clinical decompensation as well as survival in patients with chronic liver disease.[90](#hsr2146-bib-0090){ref-type="ref"}, [91](#hsr2146-bib-0091){ref-type="ref"}, [92](#hsr2146-bib-0092){ref-type="ref"}, [93](#hsr2146-bib-0093){ref-type="ref"}, [94](#hsr2146-bib-0094){ref-type="ref"}, [95](#hsr2146-bib-0095){ref-type="ref"}, [96](#hsr2146-bib-0096){ref-type="ref"}, [97](#hsr2146-bib-0097){ref-type="ref"} A meta‐analysis[98](#hsr2146-bib-0098){ref-type="ref"} based on 17 studies in 7058 patients with chronic liver disease (mainly viral hepatitis) has shown that TE values were significantly associated with risk of hepatic decompensation (six studies; relative risk \[RR\], 1.07; 95% CI, 1.03‐1.11), HCC (nine studies; RR, 1.11; 95% CI, 1.05‐1.18), death (five studies; RR, 1.22; 95% CI, 1.05‐1.43), or a composite of these outcomes (seven studies; RR, 1.32; 95% CI, 1.16‐1.51). More specifically, it has also been shown in chronic liver disease (mainly viral hepatitis and ALD)[99](#hsr2146-bib-0099){ref-type="ref"}, [100](#hsr2146-bib-0100){ref-type="ref"} that there is a positive correlation between LS and hepatic venous pressure gradient (HVPG). Their performance was similar in predicting the occurrence of PHT complications, suggesting that LS is as effective as HPVG in predicting clinical decompensation and PHT‐related complications. These results were confirmed by a meta‐analysis[101](#hsr2146-bib-0101){ref-type="ref"} based on a total of 18 studies, which included 3644 patients (mainly viral hepatitis). The study found that the diagnostic performance of TE for predicting clinically significant PHT (ie, HVPG ≥10 mmHg) is quite excellent, with a hierarchical summary receiver operating characteristic (HSROC) of 0.93 but has a lower accuracy for the prediction of large esophageal varices (HSROC of 0.78). The 90% specific cutoff in this setting was 21 kPa. However, although widely assessed in chronic liver disease, such as in viral hepatitis and NAFLD, the prognostic value of noninvasive tests in ALD has been less often evaluated. A French study[33](#hsr2146-bib-0033){ref-type="ref"} has compared the prognostic value of FT with other patented biomarkers, Fibrometer and Hepascore, in a cohort of 218 ALD patients. They found that FT, along with biopsy fibrosis staging, was the most significant independent prognostic factors of overall survival. Fibrometer and Hepascore did not improve either the diagnostic or the prognostic value of FT. More recently, preliminary results on the long‐term prognostic value of TE in ALD patients were presented during the most recent International Liver Congress.[102](#hsr2146-bib-0102){ref-type="ref"} The authors reported on a prospective study of 675 patients with a mean follow‐up of 3.3 years, which aimed to assess prediction of long‐term survival by LS in heavy drinkers. They showed that (a) LS is the best parameter for predicting survival, (b) LS cutoff \>12.5 was associated with 3‐ and 5‐year survival rates of 74% and 64%, respectively, (c) LS remains an independent predictor of survival and liver‐related death (with bilirubin), and, interestingly, (d) LS seems to outperform other prognostic AH scores such as CHILD, MELD, and Maddrey in terms of prediction of overall survival.
3. FUTURE DIRECTIONS {#hsr2146-sec-0012}
====================
Data in the literature regarding the efficacy and limitations of noninvasive diagnostic modalities of liver fibrosis in ALD are recent and scarce compared with that on other etiologies of chronic liver disease. Furthermore, there are other unmet needs to fulfill: (a) identify novel diagnostic and prognostic biomarkers, ii) determine the ability of available noninvasive modalities to monitor eventual new anti‐fibrotic drugs, and iii) characterize the diagnostic abilities of noninvasive markers in the primary care population.
Recently, "omics" approaches (lipidomics, proteomics, metabolomics, and transcriptomics) have shown promising results with regard to the identification of novel markers in NAFLD,[103](#hsr2146-bib-0103){ref-type="ref"} and some of these approaches are also currently being assessed in ALD.[104](#hsr2146-bib-0104){ref-type="ref"} In a mouse model of ALD, proteomic analysis of circulating extracellular vesicles (EVs) has shown a distinct signature of proteins as compared with control‐EVs.[105](#hsr2146-bib-0105){ref-type="ref"} They have also identified Heat shock protein 90 in ALD‐EVs as a mediator of macrophage activation. On the other hand, among transcriptomic approaches based on circulating small noncoding RNA (miRNA) and long‐noncoding RNAs (lncRNAs), several exosome‐associated miRNAs have been studied as potential biomarkers in preclinical studies.[106](#hsr2146-bib-0106){ref-type="ref"}, [107](#hsr2146-bib-0107){ref-type="ref"}, [108](#hsr2146-bib-0108){ref-type="ref"}, [109](#hsr2146-bib-0109){ref-type="ref"} Briefly, in mouse models of ALD, serum levels of miR‐155 and miR‐122[110](#hsr2146-bib-0110){ref-type="ref"} were increased and, interestingly, enriched in circulating exosomes as well as miR‐192 and miR‐30a.[108](#hsr2146-bib-0108){ref-type="ref"} More importantly, the latter finding has also been confirmed in patients with AH compared with healthy controls.[108](#hsr2146-bib-0108){ref-type="ref"} Lastly, lncRNAs, such as AK128652 and AK054921, were also increased in the sera of patients with alcoholic cirrhosis and seem to be surrogate markers for survival in these patients.[109](#hsr2146-bib-0109){ref-type="ref"} Overall, these promising biomarkers are still in the field of translational research, and larger trials to evaluate their accuracy and feasibility are needed.
Finally, the diagnostic abilities of noninvasive markers for ALD must also be assessed in primary care since the prevalence in this population might be different compared with that in secondary and tertiary care settings and could negatively impact the sensitivity and negative predictive value of these surrogate markers of liver fibrosis.
4. CONCLUSION {#hsr2146-sec-0013}
=============
Significant progress has been made in the noninvasive assessment of liver disease in patients with ALD. Regarding the identification of advanced fibrosis, ELF score, FT, and TE are the most accurate and validated modalities. These patented biomarkers are best suited for first‐line investigation in primary care since they have been shown to be cost‐effective, but additional external validation is needed. TE is well‐suited for second‐line investigation in referral centers in order to select patients who might require liver biopsy or need follow‐up in the liver clinic. The performance of other imaging techniques (ARFI, 2D‐SWE, and MRE), although promising, needs to be better assessed in patients with ALD, with an accurate definition of quality criteria. Initially developed for diagnostic purposes, these noninvasive modalities seem to also have prognostic value in terms of prediction of overall survival, clinical decompensation, and HCC occurrence, but future long‐term studies will help us determine more accurately the role for these markers in the prognosis of patients with ALD. Efforts need to be concentrated on the development of novel biomarkers and, primarily, on the implementation of noninvasive diagnostic modalities in primary care, in order to identify patients earlier, before decompensation, which is associated with poorer outcomes. Finally, considering the growing burden of liver disease worldwide, a great challenge resides in the establishment of efficient public health policies that aim to reduce harmful alcohol consumption as well as to improve accessibility to interventions that allow us to reach this goal.
CONFLICT OF INTEREST {#hsr2146-sec-0016}
====================
Alia Hadefi, Delphine Degré, Eric Trépo, and Christophe Moreno have no conflict of interest to declare.
AUTHOR CONTRIBUTIONS {#hsr2146-sec-0014}
====================
Writing---Original Draft Preparation: Alia Hadefi
Writing---Review & Editing: Alia Hadefi, Delphine Degré, Eric Trépo, and Christophe Moreno
All authors have read and approved the final version of the manuscript. The corresponding author had full access to all of the data in this study and takes complete responsibility for the integrity of the data and the accuracy of the data analysis.
TRANSPARENCY STATEMENT {#hsr2146-sec-0015}
======================
The lead author, Alia Hadefi, affirms that this manuscript is an honest, accurate, and transparent account of the study being reported; that no important aspects of the study have been omitted; and that any discrepancies from the study as planned (and if relevant, registered) have been explained.
We acknowledge the contribution of the medical writer, Sandy Field, PhD, for her assistance concerning English‐language editing. Alia Hadefi is supported by a research grant from the "Fonds Erasme pour la recherche médicale"(doctoral research fellow grant). This funding support played no role in study design; collection, analysis, and interpretation of data; writing of the report; or the decision to submit the report for publication.
DATA AVAILABILITY STATEMENT {#hsr2146-sec-0020}
===========================
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
| {
"pile_set_name": "PubMed Central"
} |
/*!
* @name WP-Player Admin CSS
* @desc WP-Player MetaBox 样式
* @author M.J
* @date 2014-12-19
* @update 2017-6-12
* @URL http://webjyh.com
* @Github https://github.com/webjyh/WP-Player
* @version 2.6.1
*/.wp-player-wrap{padding:10px}.wp-player-wrap .wp-player-tabs{margin:0;border-bottom:1px solid #EEE;height:36px}.wp-player-wrap .wp-player-tabs li{display:inline-block;margin:0}.wp-player-wrap .wp-player-tabs li a{display:inline-block;padding:0 15px;height:36px;line-height:36px;color:#333;text-decoration:none;margin-right:10px;border:1px solid #FFF;border-bottom:0}.wp-player-wrap .wp-player-tabs li.current a{border-color:#EEE;background:#FFF;font-weight:700}.wp-player-wrap .wp-player-row{border:1px solid #EEE;padding:10px 15px;border-top:none}.wp-player-wrap .wp-player-row .red{color:red}.wp-player-wrap .wp-player-inner{display:none}.wp-player-wrap .wp-player-inner.current{display:block}.wp-player-wrap .wp-player-text{height:28px;width:50%}.wp-player-wrap .wp-player-select{vertical-align:top}.wp-player-wrap .wp-player-textarea{margin-bottom:10px}.wp-player-wrap .wp-player-textarea textarea{width:60%;min-height:120px;margin-bottom:5px;margin-right:5px}.wp-player-wrap .wp-player-textarea p.desc{margin:0;color:#666}@media screen and (min-width:1200px){.wp-player-wrap .wp-player-text{width:35%}}@media screen and (min-width:1300px){.wp-player-wrap .wp-player-text{width:45%}}@media screen and (min-width:1400px){.wp-player-wrap .wp-player-text{width:50%}}@media screen and (min-width:1500px){.wp-player-wrap .wp-player-text{width:55%}} | {
"pile_set_name": "Github"
} |
Top off almost any bottle at your baby shower with these bottle hanger favor boxes with personalized labels for a
uniquely decorative guest gift. Features a loop to fit over most types of bottles (wine, beer, soda, or water ...
View Product
Make your adult birthday party a little more magical with these cute cupcake wrappers and toppers. This set of personalized
cupcake wrappers and toppers is perfect for any birthday party theme. Set comes with 24 scallop-edged wrappers in a ...
View Product
Give your baby shower guests the royal treatment by handing over these personalized gold round candy tins. Beautifully decorated in
a gold finish with your choice of label design and personalization, all that's left to do is to fill ...
View Product
We believe in celebrating life - every occasion, every milestone, every laugh, smile and tear. We know that sharing these moments makes them extra special, and we want to be there to help you celebrate life, one event at a time. | {
"pile_set_name": "Pile-CC"
} |
APT Kansas City 2015
The Road to Kansas City Starts Here!
APT Kansas City 2015: Convergence of People and Places—Diverse Technologies and Practices
Kansas City is more than Jazz and barbeque; Kansas City’s essence is CONVERGENCE. In this place, the settled East met the expansive West and the Union North clashed with the Confederate South. It is a historic transportation hub where river and overland systems converged and led to the development of a diverse economy of industry, agriculture, lumber, commodities, engineering and medicine. Kansas City is also a cultural place shaped by a tradition of visual and performing arts and a rich musical heritage.
In a city where CONVERGENCE is as much a part of modern life as it is deeply ingrained in the history and culture, APT Kansas City 2015 will explore the interface of diverse technologies and how this evolves the modern practice of heritage conservation.
Join us November 1-5, in historic Kansas City! Most Conference activities will take place at The Brass on Baltimore (formerly the Baltimore Club), located within the historic Kansas City Club building. APT has secured special Conference rates at four terrific hotels all within convenient walking distance with nightly rates between $159-$169 (plus taxes and fees). To find out more about our destination city, click here.
Mark your calendars; we’re going to Kansas City! Follow #APTKC2015 on Twitter for updates and like us on Facebook!
Continuing Education CreditsIf you attend every CE opportunity (both keynote presentations, all paper sessions, one half day field session and one workshop) you can earn 27 CEs, which is $18.50 per credit for APT members who register early. If you attend only the paper and keynote sessions you can earn 10 CEs, which is also a great value at $50 per credit.
Continuing Education credits will be available throughout the Conference including:• AIA LUs;• U.S. Engineers RCEP PDHs; and• Canadian Architects CEs (via reciprocity with AIA) | {
"pile_set_name": "Pile-CC"
} |
Retrograde abdominal visceral perfusion: is it beneficial?
It is proposed that retrograde abdominal perfusion be used in combination with retrograde cerebral perfusion to provide total body visceral protection during aortic reconstruction; however, its physiologic effects remain unknown. We compared the effect of superior vena caval perfusion alone with that of combined superior and inferior vena caval perfusion on the liver and kidney in 6 mongrel dogs. Organ blood flow was measured using ultrasonic flow probes on the hepatic artery, the portal vein, and the renal artery. Regional tissue blood flow to the liver and the kidney was assessed using colored microspheres and pH probes. Anesthetized dogs were placed on total cardiopulmonary bypass. After cooling to 20 degrees C, retrograde perfusion was begun with 30 minutes of superior vena caval perfusion followed by another 30 minutes of bicaval perfusion, or vice versa. Very little renal blood flow was measured with either method of retrograde perfusion. Although the liver received more blood flow in comparison to the kidney, there was no significant difference between superior vena caval perfusion alone and bicaval perfusion. The addition of inferior vena caval perfusion results in portal hypertension, hepatic congestion, ascites, and bowel edema. In the canine model, bicaval perfusion does not provide superior protection to the liver and kidneys when compared with superior vena caval perfusion alone. | {
"pile_set_name": "PubMed Abstracts"
} |
The Dan Bongino Show
News & Politics With a Sharp Edge by Former Secret Service Agent, Republican Nominee for the US Senate & Author of the New York Times Best Seller "Life Inside the Bubble", Dan Bongino.
Executive Producer - Joe Armacost
http://www.Bongino.com
Follow Us On Social Media:
http://www.twitter.com/dbongino
http://www.Facebook.com/dan.bongino
http://www.Instagram.com/dbongino
Book Available Here:
http://www.amazon.com/Life-Inside-Bubble-Top-Ranked-Service/dp/1938067363/ref=cm_cr_pr_product_top | {
"pile_set_name": "Pile-CC"
} |
"Previously, on United States of Tara..." "I'm kinda worried about Max, though." "The alters have been coming on to him." "I've been reading a tasteful guide to the french arts." "He says he respects our agreement and doesn't sleep with them, but I don't know..." "I think he's tempted." "It's been too long since we did any manly stuff." "All we do now is nurse trees and shit." "We're landscapers, asshole." "Are you hiring?" "I'd like to fill out an application." "I think he's nice." "I'm workin' on this experimental theater thing right now." "You should come check it out." "Hell House?" "Is that the name of the play?" "Hi!" "Tiffany St. John." "This part over here, the water, would have kind of a trompe l'œil-type feel." "I am impressed." "I know about the multiple personalities." "You know, you've conquered it with your creativity and your talent." " What are you doin'?" " Trying to get laid." "I gotta get these concepts mocked up." "Charmaine did me a favor for once." "It's a mural, too, not some boring bathroom job." "Hey." "You and me tomorrow night." "I might even bring some props." "Sous-titres :" "browncoat, grischka, lafeelicita" "Sous-titres :" "salomon, valpi" "I don't believe in God." "I wish I did." "Hail Mary, full of grace, the Lord is with Thee." "Alice believes in God." "Blessed art Thou amongst women, and blessed is the fruit of Thy womb." "I don't know what I believe in." "Yes, I do." "Faith." "And art." "Not that what I do is art or anything." "This one here is for national colitis week." "Hadassah plant a tree drive." "Seem to be on some list for people who need gigantic fundraising thermometers." "But once in a while..." "What you do for work is also what you do for love." "And when that happens... it's heaven." "Max?" "You up?" "I didn't mean to..." "I didn't realize you were, you know..." "Having your gentleman's time." "Which is fine." "I think it's fantastic." "What?" "Where'd you get the term gentleman's time?" "I made it up." " Right now." "Just now." " Well, yeah." " I didn't know, so..." " No, no, it's good." "I like it." "It's... very Rhett Butler." "Fetch me some brandy and cigars." "I'm preparing myself a gentleman's time." " Why?" "'cause we're not having..." " Somethin' like that." "That's a... interesting question you pose, little lady." "Some day when women have the vote, we'll have to discuss it." "Until then, I'll just be in the library with the colonel having my gentleman's time." "Okay, camping trip check." "Book fair pledge." "And if you could tell Laurie Marvin she can shove her pta blood drive out her hideous reworked snout..." "Only kidding. 2:00 to 4:00 shift." "Plus, I'm making blondies." "So eat that, Alice." "Like your glasses." "Why's your sister wearing dark glasses?" "Shade out drugs today." "Tomorrow's put a cap on drugs." "We have to wear a hat." " Look at you with the school spirit!" " Not really." "She's just doing it because otherwise we'd get detention." " Fucking benedict dushbag." " Is this form for school?" "No, actually." "It's..." "It's a parental consent for this theater thing I'm doing." "What theater thing?" "It's for Halloween." "It's like a haunted house kind of deal." " Wait, is it a Hell House?" " A what?" "This evangelical play that they use to scare kids straight." "Maybe you can be a gang raper?" "No." "Let's see, it says here, "Youth quaking', soul shakin'" ""keep you from waking' up Satan's bacon cutting edge evangelism tool of the'90s."" " They oughta change that right now." " I'm just doing it to infiltrate." "I'm writing an extra credit expose for social studies." "Marshy, I think you're a liar." "I think you're joining the God squad in order to get closer to Jason." "And mystery solved." "His dad's the pastor." "Oh, my God!" "I can't wait to dance at your ass pirate wedding!" "Hey, knock it off!" "If Marshall wants to put his time into this, I'm sure he has a good reason." "Yeah." "Cock!" "Okay, Marsh, am I dropping you?" "I gotta go." "Yes." "Please." "Hey, Neil." "Neil." "Neil!" "I can't understand you, Neil." "I guess marijuana is a gateway drug after all." "Why'd he call you from the Ikea parking lot?" "Olive garden waitress wouldn't go home with him, so he drove 3 feet and passed out." "Fuck!" "This is a new client." "Huge property." "How am I gonna aerate this lady's lawn in one day?" "Was that rhetorical?" "Because it sounded euphemistically filthy." "What?" "No!" "Dad..." "I have a quiz in french fourth period." "I'll get you back in time." "Come on." " Fine." " Yeah!" "Knuckles." "My man!" "All right." "Now, you know what, honey?" "It's not saturation." "It's timing." "They don't want us in Uganda?" "Coolio, okay?" "But don't you tell me that we're done in Winnipeg, because that's just fear talking, and I don't play that." "Okay, honey, can I buzz you back?" "That's Jeff from the president's team." "Okay, bye, honey." "Hey, himbo, give me the good news." "Awesome." "Okay, book it and cook it." "I'll talk to you soon." "Okay, bye." "Oh... my God!" "I came home late, so I didn't get to see what you did yesterday!" "Oh, it's amazing." "I love it!" "It's like..." "It's glowing." "I put mica in the pigment." "You know, I am so glad" "You got me to go with inspiration over motivation." "Oh, God, I just wanna live in there, right?" "Are your other personalities all so talented?" "Well, Alice plays the piano." "She's not very good, apparently." "Just moves her arms around a lot." "You need to keep that rock." "I mean it." "People always pick the one they need." "Who is at our door?" " Hey." " Hey, sugar, come on in." " How's it going?" " Well, I only have four rsvps, so maybe I could get another week before the byycb party." "Oh, hey..." "Tara." "That's the "best you, you can be" party." "I already invited you, but you said you don't have disposable income." "OK, let me see these work sheets." "OK, why is this one crossed out?" "I talked past the "yes"." "OK, all right." "Now, you listen to me." "I am not gonna say that this isn't gonna be hard, because to do anything of measure takes work." "But you can either stand here and say," ""Why is everything always happening to me?"" "Or you can take control and see what your life can become when you really let your light shine." "That's what I want." "I'll come to your party, Charmie." "You see that?" " All right, now go pick out a rock." " OK." "So she's recommended me to this head honcho, at the world headquarters to do something in the executive dining room, which is so generous." "Tiffany must be very pleased with your work." "Yeah!" "Is that hard for you to admit to yourself?" "No." "I mean..." "It is, but..." "And worse than that..." "When I was driving here today, I had this... feeling." "You're gonna think I'm insane." "Well, i'm sure you already do." "It's just..." "I haven't had a real friend in so long, it's kinda scary to be hopeful." "Don't even wanna say it out loud." "Well..." "People who've been through trauma don't believe they're lovable." "You've been carrying that negative programming for a long time, so it's gonna take a while for you to really trust a new person." "I just wish I had more of a handle on what happened to me." "Well, your alters know." "That's why the system was created, to protect you." "So you could live through school, so you could go to college, so that you could meet and marry Max, and raise those amazing kids." "I'm sorry my parts are so shy about coming out in here." "It's..." "We have lots of time, honey." "Maybe..." "Tara needs space to take it all in." " Take all what in?" " Well, look at you." "You're facing life head-on." "You've got satisfying work, you've got a new friend." "You should be so proud of yourself!" "So is this..." "Does this qualify as a breakthrough?" "You bet!" "Well, smell me!" "OK, then when you get going, you just drop this down." " Whoa, nelly!" " Give it some gas." "Yeah, there ya go!" " Look at this!" " Rock and roll!" "Slow down." "Dad!" "I had one in here." "Motherfucker!" "In my briefcase." " Fuck!" " One, two, three, four, five, six, seven, eight, nine, ten." "OK." "All right." " Whoo, my arms!" " I know!" "Guys, we are doing so great!" "Remember, anything of measure takes work, doesn't it?" "Fuck, yeah!" "Also remember that whichever one of you does the most cars gets this very posh Vita-self hoodie in addition to the cash i'm giving you." "Are these yours?" " Yeah." "Is there a problem?" " We do Vita-self here." " It's our mall." " It's everybody's mall, Sudoku." "All right, it's your mall." "No problem." "It's all good." "Get the fucking flyers." "Sorry." "I know, it..." " I think that's enough, Mom." " OK." "Oh, God, you should rest up." "Yeah, I'm just gonna watch brief encounter, and cool my heels." "Nice." "And Mom, it was pretty fun until my throat closed up." "So don't chew Dad a new one." "I wish you would." "It'd make me feel better." "I don't have the energy." "Yeah, you do." "He's allergic, and I lost my EpiPen." "Plus, you took him out of school." " So you are mad." " Of course I'm mad." "He could have been really hurt." "What were you thinking?" "I'm not the only one that's ever screwed up around here." " You wanna give me the laundry list?" " No, I don't." "You don't wanna remind me about the time T left the iron on," "{\and }Katie burned herself and got a bubble{\ on her hand}, {\and }since she was {\still }crawling, it kept {\splitting }open?" " Will you knock it off?" " Come on." "I wanna hear all my offenses." "Don't you have them meticulously listed on your computer?" "Yeah, so you'll know everything, so we won't have secrets." "Come on, you think I wanna tell you that stuff?" "Tara!" "I can't believe this." "200 bucks' worth of flyers, and a whole day's work down the drain." "You don't have to pay me, aunt Charmaine." "That's nice, sweetie." "But I still have 600 worth of elixirs at home, and nobody wants to buy it." "Do you know how many people are trying to unload this stuff on eBay?" "Even at all the fake eBays." "I had no idea." "Maybe we can talk to my manager." " Set something up at Barnabeez." " Really?" "Sure." "I mean, isn't there some sort of Vita-self slogan about... making your own future but innovating your present?" "I'm just so blown away by the power of Vita-self!" "Mom..." "Can I skip school today?" "I'll get the homework." "Okay." "Don't you have rehearsal after school?" "They don't need me." "If you like him, he must be a great guy." "And if he likes you, then he won't give a damn about the bee stings." "If you don't show up, you'll never know." "At least he does it in the shower." "My ex used to have his gentleman's time right next to me in bed." "I don't care what he says." "I just, I'm never gonna believe that I know how to do it better than he does." "I mean," "I know T doesn't feel that way, which is, I'm sure, part of her skank muffin appeal." "So how does it work, you know?" "Do you guys have, like, rules about having sex with the alters?" "Well, the first DID therapist said it should be my choice." "And I felt bad about putting Max through so much, so I was like, "knock yourself out"." "Which he did... with T. Until he realized she was stuck at 16." " And that kinda put a damper on things." " Gotcha." "Basically, we..." "mutually agreed." "It's... too messy if he fucks my alters." "Well, you know..." "When I blow Roger," "I pretend I'm N'ichelle, from that Fox show with the grainy streetwalkers?" "It's like the only way I can get through it." "Honestly, I think you are a genius." "I really do." "Yeah, but it, it's different, you know?" "When you're N'ichelle, you're still in the room." "I don't know where I am." "What is it, honey?" "What's wrong?" " Sorry, it's just..." " No..." "Max and I... haven't been very... connected." "I'm sorry, but I don't know how that's any different from any other couple who've been married for a while." " Really?" " Listen, I hate to disappoint you, but that is like the centrifugal forces of unsexy daily life plus biology." "You know, you name me one couple your age who has sex more than once a week." "Who are not tv characters." "Thank you." "And this is why we drink." " Hey, Kate." " Hey." "Hello, Kitty." "Why do you {\always }call me that?" "Workers like nicknames." "We have solid data." "Hey, so I have a line on an excellent product discount." "Love that word." "Hit me." "Protein powder." "I mean, people love healthy shakes." "So we could tie it into some sort of... fit menu?" "We don't do that." "Next time, do your homework." "I'm sorry I left the iron on." "I'm sorry I don't remember leaving the iron on." "Babe..." "It isn't just that I can't remember whole chunks of my childhood or almost killing our children." "{\And }It doesn't only happen when {\the alters}they are out and doing stuff that I don't know about." "I've been fading in and out forever, Max." "Until I quit the meds, I didn't even know how much I'd lost." "How much good stuff." "I remember I met you at a party, but that's it." "My head is so messed up, I literally have no memory of our first date." "Honey..." "We got high a lot when we first started going out." "No, no, no." "The point is, I missed it." "I can't reminisce!" "With you." "I mean, how can you make a lifetime of memories with someone when the person you're spending it with isn't even there?" "What did we do?" "We made a casserole thing with a can of mushroom soup." "Burned the shit out of it, set off all the alarms." "Well, I wanna make new memories, and I want our sex life back." "Our sex life." "And if we never had one, then I wanna make one." "Oh, we had one." "Why do you think you burned the shit out of the chicken?" "Great work, guys." "Great work, everybody." "Really looking good." "Just great." "Welcome." "Welcome." "We're just about to get started, and..." "Oh, Kimmy!" "Kimmy'll catch you up on the blocking." "Okay?" "Great." "What happened to your face?" "Shut up, Kimmy." "I had a bad bug encounter." "Does that hurt?" "Yes." "I mean..." "No." "You're so cute." "Come on." "Thank you." "It's just complicated 'cause it's a national chain and everything." "Oh, you're a sweetheart for trying." "I gotta run." "Bye." "Sorry I'm late!" "We started without you." "Excuse me, can I get one of... whatever they're having?" "And some nachos?" "So..." " So..." " Did you close that deal?" "Good girl!" "Good girl!" "Drinks are on you." "Oh, good." "I'll have a sip of that." "A sip?" "Oh!" "Okay." " See ya." " See ya." "I'll say one thing." "You're not the girl I thought you were." "No?" "Putting it together." "Supply, demand." "It wasn't the right idea, but... you know what you were thinking like?" "Junior manager." "Some day, Kitty." "Some day soon." " Do I get a raise?" " No." "So the disassociation happens when you have a trigger, right?" "Sorry." "Thank you." "And is the trigger something that reminds you of, like, some bad thing that happened to you, or what?" "Yeah, but like a lot of the triggers are just weird, like, the smell of instant coffee or something." "{\I mean, }I have no idea what that means." "And there were no alters before the event, but you just have no idea what happened?" "At {\*boarding }school, she had sex with a guy she didn't want to have sex with." " Charmaine!" " What?" "Everybody has their shit!" "Besides, that's back when "No" meant give her another drink." "I mean, if I had a nickel for every guy" "I had drunk sex with when I didn't want to, well..." "I wouldn't be selling Vita- fuckin'" " Self." "Wait." "So you're not buying any of this?" "Look..." "I watch 20/20, okay?" "I believe that bad things happen that people can't remember." "But, I mean, how come whenever it's this DID thing, the abusers are always hooking up electrical boxes to the kids' genitals?" "I mean, who has electrical boxes ready to go?" " You are screaming." " Can I get an electro genital torturer at..." "Hi..." "At Wal-Mart?" "Thank you." "Can we have another one of those, please?" "Thank you." "Oh, my God..." "I wanna meet one." " Tiffany, you don't." " No, I do." "I do!" " I'm not a dancing monkey." " Oh, come on!" "Hello, who's in there?" "Come out and have a drink with us." "Did I mention I was molested?" "I was." "Come out, come out, come out!" "Did you have fun?" "No." "Good morning!" " I didn't..." "No, no, no." " Get out." "So Tiffany thinks one of your alters broke into her place in the middle of the night." "I'm the only one who has her key." "If it's not a good time, I can just skip rehearsal." "No, no." "Can I drop him?" "I'll be right back." "Go!" "Go." "Infiltrate." "Thanks, mom." "Are you Tara Gregson?" "What is it?" "A restraining order." "No shit!" "Gotta mean it, guys." "We've got homosexual souls to save!" "Kevin, you look like you're waiting for the bus." "Come on, let's go." "Get moving!" "I mean, what the fuck, okay?" "It's not just the restraining order." "I'm banned from selling Vita-Self products." "God..." "You just ruin everything..." "Don't you?" "Find joy." "Self-satisfied bitch." " We never get to have any friends." " Oh." "Thanks a lot." "You know what I mean." "Early in the morning and late at night, two dead boys got up to fight." "Back to back, they faced each other, drew their swords and shot each other." "Early in the morning and late at night, two dead boys got up to fight." "God bless Max," "Katie, and Marshy." "God bless Charmie and Tara." "God bless T." "God bless Buck." "God bless..." "Two dead boys got up to fight." "I'm done." " Come on." " You always go too fast." "Early in the morning and late at night, two dead boys got up to fight." "Back to back, they faced each other, drew their swords and shot each other." "Early in the morning and late at night." | {
"pile_set_name": "OpenSubtitles"
} |
<?xml version="1.0" encoding="utf-8"?>
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns="http://www.tei-c.org/ns/1.0"
xmlns:tei="http://www.tei-c.org/ns/1.0"
xmlns:iso="http://www.iso.org/ns/1.0"
xmlns:ve="http://schemas.openxmlformats.org/markup-compatibility/2006"
xmlns:o="urn:schemas-microsoft-com:office:office"
xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"
xmlns:rel="http://schemas.openxmlformats.org/package/2006/relationships"
xmlns:m="http://schemas.openxmlformats.org/officeDocument/2006/math"
xmlns:v="urn:schemas-microsoft-com:vml"
xmlns:wp="http://schemas.openxmlformats.org/drawingml/2006/wordprocessingDrawing"
xmlns:a="http://schemas.openxmlformats.org/drawingml/2006/main"
xmlns:pic="http://schemas.openxmlformats.org/drawingml/2006/picture"
xmlns:w10="urn:schemas-microsoft-com:office:word"
xmlns:w="http://schemas.openxmlformats.org/wordprocessingml/2006/main"
xmlns:wne="http://schemas.microsoft.com/office/word/2006/wordml"
xmlns:mml="http://www.w3.org/1998/Math/MathML"
xmlns:html="http://www.w3.org/1999/xhtml"
xmlns:its="http://www.w3.org/2005/11/its"
xmlns:tbx="http://www.lisa.org/TBX-Specification.33.0.html"
version="2.0"
exclude-result-prefixes="#all">
<!-- import base conversion style -->
<xsl:import href="../../../docx/from/docxtotei.xsl"/>
<doc xmlns="http://www.oxygenxml.com/ns/doc/xsl" scope="stylesheet" type="stylesheet">
<desc>
<p> TEI stylesheet for simplifying TEI ODD markup </p>
<p>This software is dual-licensed:
1. Distributed under a Creative Commons Attribution-ShareAlike 3.0
Unported License http://creativecommons.org/licenses/by-sa/3.0/
2. http://www.opensource.org/licenses/BSD-2-Clause
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
This software is provided by the copyright holders and contributors
"as is" and any express or implied warranties, including, but not
limited to, the implied warranties of merchantability and fitness for
a particular purpose are disclaimed. In no event shall the copyright
holder or contributors be liable for any direct, indirect, incidental,
special, exemplary, or consequential damages (including, but not
limited to, procurement of substitute goods or services; loss of use,
data, or profits; or business interruption) however caused and on any
theory of liability, whether in contract, strict liability, or tort
(including negligence or otherwise) arising in any way out of the use
of this software, even if advised of the possibility of such damage.
</p>
<p>Author: See AUTHORS</p>
<p>Copyright: 2013, TEI Consortium</p>
</desc>
</doc>
<xsl:template match="@rend[.='Body Text']" mode="pass2"/>
<xsl:template match="@rend[.='Body Text 2']" mode="pass2"/>
<xsl:template match="@rend[.='Body Text 3']" mode="pass2"/>
<xsl:template match="@rend[.='Text Body']" mode="pass2"/>
<xsl:template match="@rend[.='Text body']" mode="pass2"/>
<xsl:template match="@rend[.='Body Text Indent']" mode="pass2"/>
</xsl:stylesheet>
| {
"pile_set_name": "Github"
} |
Q:
Vim command behaving differently at end of line
I have defined several maps that encaspulate a selected piece of text, e.g. to convert "text" to "\texttt{text}". This is one example for such a map:
vmap <buffer> ,t xi\texttt{<Esc>pa}<Esc>
However, this map does not work as expected when the selected text is at the end of the line.
Take for example this line:
word1 word2 word3
when I execute the normal command viw,t for every word in the line, this is the result that I get:
\texttt{word1} \texttt{word2}\texttt{word3}
with a trailing space, i.e. the insert of the last texttt{ happened at the wrong place.
How can I change my map to work regardless of where it is executed?
A:
Try using s instead of xi. That deletes the selection and goes straight into insert mode avoiding the uncertain cursor position after deleting with x.
vmap <buffer> ,t s\texttt{<Esc>pa}<Esc>
| {
"pile_set_name": "StackExchange"
} |
/**
*
*/
package com.ugos.jiprolog.engine;
/**
* @author UgoChirico
*
*/
public class JIPRepresentationException extends JIPRuntimeException {
/**
*
*/
private String typeError;
public JIPRepresentationException(String typeError)
{
this.typeError = typeError;
}
JIPRepresentationException(String typeError, JIPEngine engine)
{
this(typeError);
m_engine = engine;
}
@Override
public JIPTerm getTerm()
{
return getTerm(new Functor("representation_error/1", new ConsCell (Atom.createAtom(typeError), null)));
// return getTerm("type_error(" + typeError + ", " + culprit + ")", strTerm);
}
}
| {
"pile_set_name": "Github"
} |
Breitbart's Milo Yiannopoulos is going to war against Twitter and wants the social network to start being honest with its users.
Milo, who has been permanently banned by Twitter after teasing GhostBuster's actress Leslie Jones and writing a critical review of the film, appeared on CNBC to discuss the site's bias.
He has requested every piece of information Twitter has on him, including info on the decision for his suspension and verified check removal.
Twitter has been accused by many of being anti-free speech. Milo believes that by driving “interesting personalities away from the platform” is going to “stall user growth”.
Watch and see for yourself. | {
"pile_set_name": "OpenWebText2"
} |
Explore the contents of this article with a free Wolfram SystemModeler trial.Could you fly using machine guns as the upward driving force? That’s the question asked in Randall Munroe’s What if? article, “Machine Gun Jetpack.” It turns out you could, because some machine guns have enough thrust to lift their own weight, and then some. In this post, I’ll explore the dynamics of shooting machine guns downward and study the actual forces, velocities, and heights that could be achieved. I’ll also repeat the warning from the What if? post: Please do not try this at home. That’s what we have modeling software for.
Machine gun with a squirrel on top
Let’s start smaller than a human, with a gray squirrel from the original story. Put this squirrel on a machine gun, fire it downward at the full automatic setting, and see what happens. I’ll be using Wolfram SystemModeler to model the dynamics of this system.
Model of a machine gun
The image above shows the model of a machine gun. It contains bullet and gun components that are masses that are influenced by gravity. They are easily constructed by combining built-in mechanical components:
Mass influenced by the Earth’s gravitational force
The magazine component is a little more advanced because it ejects the mass of the bullet and the bullet casing as each shot is fired. It does this by taking the initial mass of the full magazine and subtracting the mass of a cartridge multiplied by the number of shots fired, which is given by the shot counter component.
Combining this together with a simple model of a squirrel, a sensor for the position above ground, and a crash detector that stops the simulation when everything crashes on the ground, I now have a complete model.
To get a good simulation, I need to populate the model with parameters for the different components. I will use a gray squirrel, which typically weighs around 0.5 kg (around 1.1 pounds).
Then I need some data for our machine gun. I’ll use the ubiquitous AK-47 assault rifle. Here is some basic data about this rifle:
The thrust generated by the gun can be calculated from the mass of the bullet, the velocity of the bullet when leaving the muzzle, and how often the gun is fired:
I can then estimate the percentage of each firing interval that is used to actually propel the bullet through the barrel. I am going to make the assumption that the average speed in the barrel is equal to half the final speed:
The force during this short time can then be calculated using the thrust:
Now I have all the parameters I need to make our squirrel fly on a machine gun:
Now we simulate the squirrel on the machine gun with a single bullet in the gun:
Seeing the height over time, I conclude that the squirrel reached a height of about 9 centimeters (3.5 inches) and experienced a flight time of only 0.27 seconds.
To put it another way:
That didn’t get the squirrel very far above the ground. The obvious solution to this? Fire more bullets from the gun. A standard magazine has 30 rounds:
This gives a flight time of almost 5.8 seconds, and the squirrel reached the dizzying height of 17.6 meters (58 feet). Well, it would be dizzying for humans; for squirrels, it’s probably not so scary.
Now we’re getting somewhere:
I have shown that a squirrel can fly on a machine gun. Let’s move on to a human, going directly for the standard magazine size with 30 bullets:
One gun is not enough to lift a human very far. I need more guns. Let’s do a parameter sweep with the number of guns varying from 1 to 80:
This shows some interesting patterns. The effect from 50 guns and above can be easily explained. More guns means more power, which means higher flight. The simulations with 15 and 32 guns are a little more interesting, though. Let’s look a little closer at the 15 guns scenario. The red dots show the firing interval, meaning the guns shoot one bullet each every 0.1 seconds:
You can see that the craft manages to take off slightly, starts to fall down again, gets off another shot, but then falls farther than the height it had gained. You can also look at the velocity over time:
For the first shot, the craft starts at a zero velocity standing still on the ground. It gains velocity sharply, but before getting off the next shot, the velocity falls below zero. This means that during one firing cycle, there is a net loss in velocity, resulting in the eventual falling down, even though there are bullets left in the gun. It could then start over from standstill on the ground, doing tiny jumps up and down.
The scenario with 32 guns exhibits yet another behavior. The start looks similar to the behavior with 15 guns, where it gains some altitude, but then falls back down because it loses net velocity during each firing cycle. But then at around 2.5 seconds it starts to gain altitude, until all the ammunition is spent at 3 seconds.
This can be explained if you look at the mass of the magazine over time:
You can see that at each shot, the magazine loses weight because it ejects a bullet and a bullet casing. After a while, this makes the whole craft light enough to gain altitude. This indicates there is some limit to how many bullets you can carry for each machine gun and still be able to fly, which is another interesting parameter you can vary. Let’s try to fly with the following magazine sizes for an AK-47, assuming I create my own custom magazines:
Because more guns means more power, I will use a large number of guns, 1,000:
When using 1,000 guns, it turns out it is not a good idea to bring 165 bullets for each gun:
This is because if you bring too many bullets, the craft becomes too heavy to gain any altitude. Now that I have found a reasonable (if there can be anything reasonable about trying to fly with machine guns) number of bullets to bring along, let’s see the achieved heights when varying the number of guns. I would expect that with more guns, we will gain more height and flight time.
Here is the maximum height achieved with the different number of guns:
It turns out that increasing the number of guns drastically (from 1,500 to 50 million) only gives a marginal increase in the top height achieved. This is because as the number of guns increases, the part of the human carried by each gun decreases, until each gun only carries its own weight plus very little additional mass. This makes the total craft approach the same maximum height as a single gun without any extra weight, and adding more guns will give no more advantage.
In closing, the best machine gun jetpack you can build with AK-47s consists of at least around 5,000 machine guns loaded with 145 bullets each.
How high you can fly using machine guns
Download this post, as a Computable Document Format (CDF) file, and its accompanying models. | {
"pile_set_name": "OpenWebText2"
} |
Ask HN: Any speech segmentation API's out there? - shk88
I've been working on an idea for an MVP that leverages speech recognition, for which there are a few viable API's. However, I'm interested in not only speech to text, but also determining the timing of each spoken word relative to the input audio. Unfortunately I haven't been able to find any good resources on how to accomplish this.<p>Any ideas on where to start?
======
clyfe
<http://cmusphinx.sourceforge.net/wiki/speakerdiarization>
| {
"pile_set_name": "HackerNews"
} |
As an outpouring of voter outrage roils the election, Bill Moyers revisits a conversation he had with Jacob Hacker and Paul Pierson, authors of the book Winner-Take-All Politics: How Washington Made the Rich Richer — and Turned Its Back on the Middle Class. Here is the full transcript of the podcast. We encourage you to listen to the interview and subscribe to our podcast here.
Transcript
Bill Moyers: Welcome. I’m Bill Moyers. And I want to talk about the hurricane that’s blowing across America right now.
(Soundbite of Sanders rally)
Bernie Sanders: In our country today, we have more income and wealth inequality than any other major industrialized nation on earth.
Moyers: It’s blasting the race for president from left and right.
(Soundbite of Trump rally)
Donald Trump: Middle-income people are making less money today in real dollars by far than they made 18 years ago.
Moyers: Voters are angry. Angry at stagnating wages. Angry at the loss of upward mobility for their kids. Angry at the power of corporations and rich people over our political system.
(Soundbite of Democracy Awakening protest)
Democracy Awakening Crowd: The American people…
Kai Newkirk: …won’t take this anymore.
Crowd: …won’t take this anymore.
Newkirk: We’re going to end this corruption!
Moyers: And they’re angry over the vast gap that keeps growing between rich and poor.
(Soundbite of Hillary Clinton rally)
Hillary Clinton: Prosperity can’t be just for CEOs and hedge-fund managers. Democracy can’t be just for billionaires and corporations.
Moyers: Let’s call this what it is: gross inequality. And what’s happening is not inevitable. Inequality is no force of nature. For more than 40 years our politicians have collaborated with campaign contributors to make the rich richer even as Washington turned its back on the middle class. So stay with us as we explore America’s winner-take-all politics.
Moyers: For over 40 years now, I’ve worked at the intersection of politics and journalism. Inside the White House with President Johnson, I was his assistant for domestic policy and then became his press secretary.
On the outside, as a broadcast journalist for these past four decades, I’ve kept a wary eye on those at the center of power. I’ve spent years listening to America, covering our history, our mythology, the reality of our politics and the power of corporations.
Back in 2012, I began my last television series with a question that was beginning to trouble the country: What were these forces that were making the rich richer and more powerful, while obstructing everyone else?
Why had the economy stopped working for the middle class, even as those at the top were enjoying massive rewards? It was that mystery — every bit as puzzling as a crime drama — that convinced me to bring back my weekly broadcast and line up interviews.
(Soundbite of Occupy Wall Street protest)
Occupy Protestors: We are the 99 percent! And so are you!
Moyers: But I wasn’t the only one who wanted answers.
Protestor: We are tired of corporate America, corporate finance and the media industry controlling our political system.
Moyers: The very day I conducted my first interview of the series, protesters were setting up camp in a park near Wall Street.
Bill Black: The 1 percent…
Crowd: The 1 percent…
Black: …have dominant…
Crowd: …have dominant…
Black: …political power…
Crowd: …political power…
Black: …over both parties.
Crowd: …over both parties.
Moyers: They wanted to wake the rest of us up as, through those financial canyons, they shouted their displeasure at the country’s gross inequality.
Protestors: Whose streets? Our streets!
Moyers: When I saw what the Occupy movement was doing, I was reminded of a woman named Amanda Gruebel. Her testimony before Congress came straight from the heartland.
(Soundbite of Senate hearing)
$10,000 might not seem like a lot to some people, but that loss of income required a complete financial, emotional and spiritual overhaul in our family. —Amanda Gruebel
Amanda Greubel: My name is Amanda Greubel. I am 32 years old, born and raised in Iowa. I’ve been married for 10 years today to my high-school sweetheart, Josh. He’s the high school band director in the same district where I am the family resource center director.
Moyers: This recording is from a 2011 Senate hearing exploring how middle-class Americans were struggling.
Greubel: We have a 5-year-old son, Benen, and our second child on the way in December. Like a lot of American families, we have a lot of debt, mortgage, two vehicles and, because we both have master’s degrees, a lot of student loan debt.
Moyers: And that year when the state cut funding for local school districts, her salary was cut by $10,000.
Greubel: $10,000 might not seem like a lot to some people, but that loss of income required a complete financial, emotional and spiritual overhaul in our family. […] It means that even though I would rather shop at local grocers, I shop at Wal-Mart for groceries because that’s where the lowest prices are. Sometimes the grocery money runs out before the end of the month, and then we have to be creative with what’s in the cupboard — and that was a fun challenge at first, but the novelty wears off after a while. […] It means that most of our clothing comes from Goodwill, garage sales and the clearance racks because we try not to spend full-price on anything anymore. It means that when my son brought me the snack calendar for his classroom and I saw that that month was his week to provide snacks for 15 classmates, I was scared because I knew that it would stretch the grocery budget even further.
Moyers: You could imagine Amanda Gruebel channeling the anguish of millions of Americans.
Greubel: If my family with two master’s degrees is struggling, you can imagine how bad it is for other people. Kids don’t necessarily tell their parents when they’re afraid, because they see that their parents are stressed out enough already and they don’t want to make it worse. When kids don’t have enough to eat or they worry about losing their homes they cannot concentrate on learning their math facts, or their reading strategies. And in some cases financial concerns lead to or exacerbate issues such as domestic violence, child abuse, substance abuse and physical or mental-health conditions. All of the things that are ailing our families right now are so interconnected.
Moyers: So as Occupy Wall Street was rallying, and our once and future middle class was struggling, I turned to Jacob Hacker and Paul Pierson to help me understand what had gone wrong.
They are noted scholars. Paul Pierson teaches political science at the University of California, Berkeley. Jacob Hacker is a professor of political science at Yale and director of the Institution for Social and Policy Studies.
When I first met Hacker and Pierson in 2012, they had just published a book that was receiving high praise — and fast becoming a best seller. It was called Winner-Take-All Politics: How Washington Made the Rich Richer — and Turned Its Back on the Middle Class.
Paul Pierson: I think a lot of people know that inequality has grown in the United States. But saying that inequality has grown doesn’t begin to describe what’s happened.
Moyers: This is Paul Pierson.
If you take all of the income gains from 1979 to 2007 — so all the increased household income over that period — around 40 percent of those gains went to the top one percent. And if you look at the bottom 90 percent, they had less than that combined. —Jacob Hacker
Pierson: The metaphor that we had been using lately is if you imagine a ladder, with the rungs in the ladder, and you think, “Okay, well inequality’s growing. So the rungs are getting further apart from each other.”
That’s not what’s happened in the United States. What’s happened in the United States is that the top one or two rungs have shot up, you know, into the stratosphere while all the other ones have stayed more or less in place. It’s really astonishing how concentrated the gains of economic growth have been.
Moyers: Here’s Jacob Hacker.
Jacob Hacker: You know, the startling statistic that we have in the book is that if you take all of the income gains from 1979 to 2007 — so all the increased household income over that period — around 40 percent of those gains went to the top one percent. And if you look at the bottom 90 percent, they had less than that combined.
And it is not just a one- or two-year story. I mean, we’ve seen a terrible economy over the last few years. And the last decade is now being called “The Lost Decade” because there was no growth in middle incomes, there was no — there was an increase in the share of Americans without health insurance, more people are poor. So there was a terrible 10 years.
But we were actually looking at the last 30 years, and seeing that the middle class had only gotten ahead to the extent that it had because of families working more hours.
So this is a story that isn’t just about those at the top doing much, much better. But is, also, we found, a story about those in the middle not getting ahead, often falling behind in important ways, failing to have the same kinds of opportunity and economic security that they once had.
Moyers: Let’s take a look at just how dramatic the inequality is. You have a chart here…
…I asked them to explain a dramatic bar graph from their book. It showed how much incomes grew between 1979 and 2006 among five segments of the population. The poorest fifth grew by 11 percent. The middle-income groups all grew too, by increasing amounts. But the top fifth grew the most at 55 percent, which sounds like a lot — until you see the top 1 percent.
Hacker: It exploded at the top.
The line for the top 1 percent, it’s hard to fit on the graph because it’s so much out of proportion to the increases that occurred among other income groups including people who are just below the top 1 percent. So, that top 1 percent saw its real incomes increase by over 250 percent between 1979 and 2006. Yeah. Over 250 percent.
Pierson: And actually, even this graph — we couldn’t find a graph that fully describes it because even this graph actually really understates the story. Because it —
Moyers: Understates it?
Pierson: Understates it.
Since we’ve been keeping records on the incomes of the richest from tax statistics in the early 20th century, we never saw as large a share of national income going to the richest one-in-a-thousand households as we did just before the Great Recession. —Jacob Hacker
Moyers: I mean, this is pretty powerful. When I looked I thought it was a showstopper.
Pierson: OK, so well, if you really if you really want the showstopper you have to go one step further because that big increase is for the top 1 percent. But the real action is inside the top 1 percent. If you go to the top tenth of 1 percent or the top hundredth of 1 percent, you know, you would need a much bigger graph to show what’s happening to incomes for that — for that more select group, because they’ve gone up much faster than have incomes for just your average top 1-percent kind of person.
Moyers: But we’ve all known for a long time that the rich were getting richer, and the middle class was barely holding its own. I mean, that was no mystery, right?
Hacker: Oh, it is. It’s a mystery when you start to look beneath the familiar, common statement that inequality has grown. Because when we think about rising inequality, we think, “Oh, it’s the haves versus the have-nots.” That the top third of the income distribution, say, is pulling away from the bottom third.
And what we found is it’s not the haves versus the have-nots. It’s the have-it-alls versus the rest of Americans. And those have-it-alls, which are households in say the top one-tenth of 1 percent of the income distribution, the richest one-in-a-thousand households are truly living in an unparalleled age.
Since we’ve been keeping records on the incomes of the richest from tax statistics in the early 20th century, we never saw as large a share of national income going to the richest one-in-a-thousand households as we did just before the Great Recession.
Their share of national income quadrupled over this period, to the point where they were pulling down about 1 in 8 dollars in our economy. One-in-a-thousand households pulling down about 1 in 8 dollars in our economy before the great recession began.
Moyers: You set out to try to solve three mysteries: who done it, who created the circumstances and conditions for the creation of a winner-take-all economy. And your answer to that in one sentence is?
Hacker: American politics did it far more than we would have believed when we started this research. What government has done and not done and the politics that produced it is really at the heart of the rise of an economy that has showered huge riches on the very, very, very well off.
Moyers: It’s the politics, stupid?
Hacker: Exactly.
Moyers: How did they do it?
Pierson: Through organized combat, is the short answer.
Moyers: And why did they do it?
Hacker: Because they could. Because the transformation of political organization, the creation of a powerful, organized, business community, the degree to which that was self-reinforcing within both parties has meant that politicians have found that they can on issue after issue cater to the interests of the very well off while either ignoring or only symbolically addressing many of the concerns that are felt by most Americans and get reelected and survive politically.
Pierson: If you listen to many public officials over the over the last 20 or 30 years as they’ve started to recognize that inequality has grown, typically what they’ll say is, this is a result just of economic change. It’s a result of globalization changes in technology that have advantaged the educated at those with high skills at the expense of the uneducated.
And there, clearly — there is some truth to this story that education matters more in determining economic rewards. But the more we looked at this, the less satisfied we were with that explanation.
That it couldn’t explain why the economic gains were so concentrated within a very small subset of the educated people in American society. I mean, 29 percent of Americans now have college degrees. But a much, much smaller percentage of Americans were benefiting from this economic transformation.
Moyers: Remember, this was 2012. Mitt Romney was working to oust Obama from the White House.
(Soundbite of Republican fundraiser)
Mitt Romney: There are 47 percent of the people who will vote for the president no matter what.
Moyers: He got into trouble talking behind closed doors, when he wrote off a group of Americans who weren’t doing so well.
Romney: There are 47 percent of people who are with him, who depend on government, who believe that they are victims, who believe that government has a responsibility to care for them, who believe that they are entitled to health care, to food, to housing, to you name it. That that’s an entitlement, and the government should give it to them.
So it’s one thing to say, “Oh, the rich are getting richer because we have this new global economy.” But how do you explain the fact that we’ve seen over this period where the rich have gotten richer the tax rates on the richest of the rich come dramatically down? —Jacob Hacker
Moyers: Inequality was still a fringe issue that election year — two years before Thomas Piketty’s book Capital became a surprise best seller; three years before Pope Francis officially preached about a moral obligation to work for a “just distribution of the fruits of the earth”; and four years before the populist uprising we are now seeing in the current presidential race — a wave of frustration from people who are furious with Washington for doing so little to help them.
Back then, Hacker and Pierson were on to something. They rejected the conventional wisdom that inequality is primarily a product of the global economy, and they pointed fingers.
Moyers [To Hacker and Pierson]: Well, as you speak, I can hear all of those free-marketers out they say, “Come on, Pierson, come on, Hacker, it is the global economy. It’s that cheap labor overseas. It’s those high-technology skills that you say are required, these deep forces that actually are beyond our control, and are making inevitable this division between the top and everyone else.” Right? That’s what they’re saying as they listen to you right now.
Hacker: We think the story that’s told about how the global economy has shifted clearly matters. But that it doesn’t get to the sort of really powerful role that government played in adapting to this new environment and in changing the well-being of people in the middle and at the top.
Pierson: And again, we wouldn’t want to say that the kinds of changes that they’re talking about don’t matter at all. But they still leave open for a country to decide how they’re going to respond to those kinds of economic challenges.
And when you look at other affluent democracies that have also been exposed to these same kinds of pressures, who are actually more open — smaller economies are often more open to the global economy than the United States is — you don’t see anything like the runup in inequality, especially this very concentrated high-end inequality, in most of these other countries that you see in the United States. Which to us, really, was a very strong clue that we need to understand why the American response to globalization, to technological change has been different than the response of most other wealthy democracies.
Hacker: So it’s one thing to say, “Oh, the rich are getting richer because we have this new global economy.”
But how do you explain the fact that we’ve seen over this period where the rich have gotten richer the tax rates on the richest of the rich come dramatically down? You know, Warren Buffet now says that he thinks he’s paying a lower tax rate than the people who work for him do.
The Bush tax cuts in a lot of ways were written like a subprime mortgage. You know, they were designed to make people see certain things, and not see a lot of the fine print. —Paul Pierson
Pierson: The thing that got us going at the very beginning was the Bush tax cuts.
(Soundbite of President George W. Bush)
George W. Bush: This tax relief plan is principled. We cut taxes for every income taxpayer. We target nobody in, we target nobody out. And tax relief is now on the way. Today is a great day for America.
Moyers: But what Bush had just done in 2001 was a bonanza for the very rich.
Pierson: The Bush tax cuts in a lot of ways were written like a subprime mortgage. You know, they were designed to make people see certain things, and not see a lot of the fine print.
Hacker: Fully 30 to 40 percent of the benefits were going to the very top of the income distribution. The top 1 percent. And when you broke it down, it was really the top one-tenth of 1 percent that did so well because of the estate tax changes, and because of the changes in the top tax rates, the changes in the capital gains taxes. And if you go to 2003, changes in the dividend tax.
I mean, these were all tax breaks that were worth a vast amount to the richest of Americans and worth very little to middle-class Americans.
Pierson: Within a few weeks after the legislation was passed, we all get a letter that says Congress and the president have given you this tax cut. And then that’s pretty much it for the middle class. But for higher-income groups, the further forward you go in time, the bigger and bigger the benefits get. So it was really designed to front-load the relatively modest benefits for the middle class, and to back-load the benefits for the wealthy.
Hacker: So why? Why do the winners get policies that make their winnings even larger? You know, this is not a trivial change. If you say from the mid-’90s to 2007, those top 400 tax payers, they’ve seen their tax rates decline so much that it’s worth about $46 million for every one —
Moyers: For every —
Hacker: — of those 400 tax payers. So it’s — the numbers are staggering. When you start to look within the top 1 percent, and look at what government has done to help those people out, through taxes, through changes in the market, financial deregulation and the like and through protecting them from efforts to try to push back.
Moyers: Protecting them?
Hacker: Well, I think this is something that really needs to be understood. You know, these large shifts in our economy had been propelled in part by what government has done, say deregulating the market, the financial markets, to allow wealthy people to gamble with their own and other people’s money, and ways to put all of us at risk, but allow them to make huge fortunes.
And at the same time, when those risks have become apparent, there has been a studious effort on the part of political leaders to try to protect against government stepping in and regulating or changing the rules.
Moyers: You write: “We have a government that’s been promoting inequality, and at the same time, as you just said, failing to counteract it.” This has been going on, you write, 30 years or more. And, Paul, here’s the key sentence: “Step by step, and debate by debate, our public officials have rewritten the rules of the economy in ways that favor the few at the expense of the many.”
Pierson: In some ways, the fundamental myth that we’re trying to break out of is the idea that there’s something natural out there called “the American economy” that is prior to government, prior to politics. And that government, if it’s involved at all, is only involved sort of at the end of the day, maybe tidying things up around the edges, or redistributing money from some people to another.
What we’ve seen is an organizational revolution over the last 30 years that has meant that business, and Wall Street, and ideological conservative organizations that are pushing for free market policies have all become much more influential. —Jacob Hacker
And I think the financial crisis has been a rude awakening for people who viewed the economic world that way. It’s now, I think, very clear in retrospect that the decisions that leading public officials made over a period of decades helped to get us to a point where a financial crisis could be so devastating to all Americans.
Moyers: How can this happen? I mean, how could Washington turn its back on the broad middle class to favor a relatively few at the top — in a democracy?
Hacker: What has really changed is the organization of American politics, particularly the organizations that represent the deepest-pocketed members of American society. What we’ve seen is an organizational revolution over the last 30 years that has meant that business, and Wall Street, and ideological conservative organizations that are pushing for free market policies have all become much more influential.
And at the same time, a lot of the organizations that once represented the middle class — labor unions, broad-based civic organizations and sort of, organizations at the local and grassroots level, including social movements, have all lost enormous ground.
And so it’s that imbalance, that shift, I think, that is the sort of underlying pressure that plays out in our politics today. The way we describe it in the book is as if the ecosystem of American politics has changed. And everyone in American politics, Democrats, Republicans, liberals, conservatives, has had to adapt to this new world where money matters much more in our politics, and where groups representing business and the wealthy are much more powerful than in the past.
Moyers: And you don’t beat around the bush. You say, quote, “Most voters of moderate means … have been organized out of politics, left adrift as the foundations of middle-class democracy have washed away.”
Hacker: Yeah, I mean, if you look at the history of American democracy it is about a broadening of our understanding of political equality to incorporate African-Americans and women and ultimately to also incorporate the idea that large inequalities of property were a threat to democratic equality. So FDR during the Great Depression famously said that political equality was meaningless in the face of economic inequality.
So we now, I think, understand that inequality of income and wealth is part of a capitalist society, but it can’t overwhelm our democracy. And what we’ve seen in the last 30 years is a gradual erosion of the firewalls that protect our democracy from the inequalities that are occurring in the market. Money has come into politics much more.
And the power that people have in the market is being used more and more in politics as well. And that’s a concern because Americans have very complex views about equality, but they all agree in this basic idea that as Thomas Jefferson famously said, “All men are created equal.”
And he meant men probably, but you know, the modern understand of that phrase, we believe that people whether they’re rich or they’re poor, whether they have lots of property or not, whether they’re in, on Wall Street or off, they should have equal potential to influence what government does. Anybody who looks around at our government today cannot believe that’s the case or that we’re even close to that.
Moyers: There was a time when we were sure that a strong middle class was the backbone of a democracy. And there was a time, after the second World War when I was a young man, when incomes actually grew slightly faster at the bottom and the middle than at the top, is that right? Paul, Do your figures support that?
Pierson: Yes, they do. And we describe that period after World War II, which lasted for about 30 years as being a country which we labeled Broadland. And —
Moyers: Broadland?
Pierson: Broadland. And I think it’s most clearly captured by that old idea that a rising tide lifts all boats.
Everybody’s income is going up at the roughly the same rate, slightly faster actually toward the bottom of the income distribution than toward the top, but everybody’s incomes were going up. And it’s important to understand, this wasn’t some egalitarian fantasy world. It wasn’t Sweden.
It was the United States, recognizably the United States with significant inequalities of wealth, but everybody was participating in prosperity and seeing their incomes rise. And then after the mid-1970s we start moving toward a distribution of income that looks more like that of a Third-World oligarchy. It looks more like Mexico or Brazil or Russia. Income inequality that — statistics on income inequality now suggest that inequality is higher in the US than it is in Egypt. And that’s quite a journey from where we were when I was growing up.
I think almost all Americans lose from the shift toward a society in which rewards are so narrowly concentrated on a small segment of the population. —Paul Pierson
Hacker: Right now I think we’re seeing the kind of bitter fruit of winner-take-all politics because this financial crisis was not an act of God or work of nature. It was brought on by poor decisions that were made in Washington and on Wall Street. Yes, there’s a global dimension to this, but a big part of it was failures of domestic policy. You know, if you look to our northern neighbor, Canada, it had nothing like the same degree of banking crisis the United States did. And that’s partly because it had much more effective regulations of the financial sector. You know, over this period that we saw leverage and speculation increasing on Wall Street, Washington — both Democrats and Republicans — were trying as hard as they could to allow Wall Street to do even more.
Moyers: So the winner-take-all politics has produced a winner-take-all economy? Right?
Hacker: Yes.
Pierson: Yes.
Moyers: And the winners are?
Hacker: The winners are those who’ve made out so well in this new economy, the very well off and financial — and people in the highest reaches of finance and corporate executive suites.
Moyers: And the losers?
Pierson: Well, the losers are, I think, almost all of us.
I think almost all Americans lose from the shift toward a society in which rewards are so narrowly concentrated on a small segment of the population.
Hacker: And there’s no sign that the sort of massive concentration of the gains of the economy at the very top is slowing down. In fact, this downturn has been remarkable in the degree to which those at the very top seem to have weathered it pretty well. Profits are still very high. Those who are on Wall Street have recovered thanks to a massive government bailout.
Moyers: Taxpayers put it up. I mean, they’re spending taxpayer money.
Hacker: Yes, yes. And so we’ve seen the economy over 30 years very consistently shift in this direction. And what I think has not happened and what concerns us greatly is a kind of real undermining, deep undermining, of the operation of our democratic institutions.
I mean, we’re describing a massive erosion, but the question is could we see those democratic political institutions really cease to function effectively in the future if we have a society that continues to tilt so heavily toward winner-take-all. And that’s why we wrote the book because, you know — Walter Lippmann back in the early 20th century said the challenge for democratic reform is that democracy has to lift itself up by its own bootstraps.
And we’re — we are deep believers in the ability of American democracy to reform itself, of the strength of our democratic institutions. But they’re in very serious disrepair right now. And we’ve seen in recent political fights a sort of paralysis and a broad loss of faith in government. And that sort of secession of the wealthy from our economic life that we’ve already started to see could be matched by a secession of them from our political life and a sort of loss of that broad democracy that was characteristic of mid-20th century. That’s the greatest fear that we have.
Moyers: Would you say we still have a middle-class country?
Pierson: That’s —
Moyers: Wow.
Pierson: No, no, I wouldn’t, I wouldn’t.
Moyers: You’re hesitant.
Pierson: If you asked me if you asked me that point blank, I mean —
Moyers: Point blank, Paul, do we still have a middle-class country?
Pierson: I would say no. I mean, obviously there is still something there is still something that we would recognize as a middle class, it’s still probably the biggest segment of the population. But in terms of its weight in the society, its ability to produce a society and reproduce a society that is oriented around the needs and concerns and opportunities of the middle class, I don’t think that we live in that country anymore.
Moyers: And you say we are way behind in mobility. Behind Australia, Norway, Finland, Germany, France, Spain and Canada. We are way down the list in terms of social mobility. Am I reading you right?
Hacker: Over this period in which those at the very top have done better and better, the chance of climbing up the economic ladder hasn’t grown at all; it may have actually declined. And that is reflected, I think, in a sense of pessimism that you see among many middle-class Americans about whether the American dream still holds true.
At the individual level Americans are extremely optimistic. And if you ask them, “Will you achieve the American dream?” Most Americans say yes. But at a collective level when you ask people, “Does the American dream still hold true?” We’re seeing in surveys for the first time that only about, you know, half of Americans are agreeing that the American dream still holds true. And that’s remarkable.
Moyers: What’s the practical consequences of that? Jacob? Of giving up faith and hope in that dream?
Hacker: The fact is that for most middle-class and working-class Americans the politics seems increasingly removed from their everyday experience and their life. And there is a current of distrust and anger toward Washington is that is so deep right now.
Hacker: That is one of the big changes that occurs over this period. Money becomes more important for campaigns and it also becomes much more important in terms of lobbying, which in some ways is the more important way that money changed American politics. It’s really the development of lobbying over this this last 25, 30 years that stands out as the most dramatic role of money in American politics.
In the mid-20th century we saw a period in which income gains were broadly distributed, in which middle-class Americans had voice through labor unions, through civic organizations and through, ultimately, their government. We’ve seen an erosion of that world, but just because it’s lost ground doesn’t mean it can’t be saved. —Jacob Hacker
We tell the story in the book of the Tax Reform Act of 1986, because this was one of these great examples when the lobbyists were overcome. You know, the Gucci Gulch right outside the Senate chamber, where the well-heeled lobbyists attend to members of Congress. Well, Gucci Gulch was a place of, not of celebration, but of despair after 1986 because all these tax loopholes were closed, rates were brought down in a way that was actually making the tax code more equitable. And that was considered to be a big step forward for the public interest.
Well, a few years later lobbyists had written a lot of these loopholes back into the tax code. Ten years later, you know, you could hardly see any traces of the 1986 Tax Reform Act. Almost all of the good-government public-interest reforms that were put into the tax code in 1986 overcoming the lobbyists have been put back in, have been overwhelmed by the day-in, day-out lobbying to get those tax provisions right back into place.
Moyers: Quite a cycle, I mean, if you’re creating a winner-take-all economy the winners have more money to contribute to the politicians, who turn it into a winner-take-all politics. I mean, it just keeps —
Pierson: Right. It is the story that we try to tell in this book that there has been a 30-year war in which the sound of the voice of ordinary Americans has been quieter and quieter in American politics and the voice of business and the wealthy has been louder and louder. Many people, I think, read this book and think it’s a pessimistic book, that it’s grim reading and there are ways in which that’s true.
But Jacob and I genuinely believe that it’s an optimistic story compared with the story that we’re typically told about what’s been happening to the American economy. Because what we’re typically told is there’s nothing you can do about this, that it’s just an economic reality, there’s no point in blaming any political party.
And I think the main punch line of our story and the optimistic message is that politics got us into this mess and therefore potentially politics can get us out of it.
Moyers: But if both political parties are indebted to the winners where do the losers find an army to join?
Hacker: When citizens are organized and when they press their claims forcefully, when there are reformist leaders within government and outside it who work on their behalf, then we do see reform. This is the story of the American democratic experiment of wave after wave of reform leading to a much broader franchise, to a much broader understanding of the American idea.
In the mid-20th century we saw a period in which income gains were broadly distributed, in which middle-class Americans had voice through labor unions, through civic organizations and through, ultimately, their government. We’ve seen an erosion of that world, but just because it’s lost ground doesn’t mean it can’t be saved. And so in writing this book we were hoping to sort of tell Americans that what was valuable in the past could be a part of our future.
Moyers: Jacob Hacker and Paul Pierson, thank you.
Pierson: Thank you so much.
Hacker: Thank you. | {
"pile_set_name": "OpenWebText2"
} |
Q:
passing arguments python script
I am trying to know haw can I pass these files as arguments in a py file, and construct dataframe from these files
pd.read_csv('C:/Users/Demonstrator/Downloads/file1.csv',delimiter=';', parse_dates=[0], infer_datetime_format = True)
df_energy2=pd.read_csv('C:/Users/Demonstrator/Downloads/file2.csv', delimiter=';', parse_dates=[0], infer_datetime_format = True)
Thank you
A:
Passing arguments is simple. You can have a look at https://docs.python.org/3/library/argparse.html
The most easiest way to pass argument to a python script is by adding these line to you python script and modifying them as per need:
if __name__ == '__main__':
import sys
if len(sys.argv) != 2 # here I am expecting only one commandline agrument
print("USAGE: <Scriptname> <commandlineargument>")
sys.exit(1)
commandlineValue = sys.argv[1] # sys.argv[0] contains the file name you are running
# Do what ever you want to do with the commandlineValue, it will just print it
print ("CommandlineValue Passed is : {}".format(commandlineValue))
| {
"pile_set_name": "StackExchange"
} |
Q:
What trusted file cleaning tools are available for Ubuntu?
I want to get a trusted file cleaning tool to remove unwanted files.
When I try to add the Ubuntu Tweak repository it says it is from an untrusted repository.
So, are there any trusted file cleaning tools available for Ubuntu?
A:
These are some that could be what you need...
FSLint: Utility collection to find and fix common errors in file storage. It can find things like:
Duplicate files
Problematic filenames
Temporary files
Bad symlinks
Empty directories
Nonstripped binaries
To install, open a terminal Ctrl + Alt + T and enter command:
sudo apt-get install fslint
BleachBit: BleachBit deletes unnecessary files to free valuable disk space, maintain privacy, and remove junk. It removes cache, Internet history, temporary
files, cookies, and broken shortcuts.
It handles cleaning of Adobe Reader, Bash, Beagle, Epiphany, Firefox, Flash, GIMP, Google Earth, Java, KDE, OpenOffice.org, Opera, RealPlayer,
rpmbuild, Second Life Viewer, VIM, XChat, and more.
Beyond simply erasing junk files, BleachBit wipes free disk space (to hide previously deleted files for privacy and to improve compression of images),
vacuums Firefox databases (to improve performance without deleting data), and securely shreds arbitrary files.
To install, open a terminal Ctrl + Alt + T and enter command:
sudo apt-get install bleachbit
GtkOrphan: A graphical tool to find and remove orphaned libraries. It scans your Debian system, looking for orphaned libraries and helps remove them to claim back your disk space.
To install, open a terminal Ctrl + Alt + T and enter command:
sudo apt-get install gtkorphan
fdupes: Identifies duplicate files within given directories. (FSLint too gives this option to delete duplicate files from the system.)
P.S. The above recommended applications (except fdupes) are in Universe section of Ubuntu's repository. So before starting to install these, you'll have to Enable the “Universe” repository, then update the repos with sudo apt-get update and then you can install programs in Universe repo using apt-get.
A:
Bleachbit is already in the repository
sudo apt-get install bleachbit
And for the untrusted repository you surely did not add the gpg key when you added the PPA repository.
For adding a PPA repository and the gpg key you do: sudo add-apt-repository "ppa name"
example (the Ubuntu Tweak PPA):
sudo add-apt-repository ppa:tualatrix/ppa && sudo apt-get update && sudo apt-get install ubuntu-tweak
Source How do I use software from a PPA?
A:
ubuntu-tweak is one of the best utilities you are looking for. To install it you need to add ppa:tualatrix/next.To install ubuntu-tweak open a terminal and enter the following lines,
sudo add-apt-repository ppa:tualatrix/next
sudo apt-get update
sudo apt-get install ubuntu-tweak
This will install ubuntu-tweak on your system.
| {
"pile_set_name": "StackExchange"
} |
The Supreme Court on Monday rejected an appeal from a company owned by an unidentified foreign government that has refused to turn over information subpoenaed by Special Counsel Robert Mueller.
The company, whose identity remains a mystery with details filed under seal, is facing a $50,000 per day court-imposed fine for failure to turn over documents responsive to a grand jury subpoena. Fines for the company have been accruing since January and could total nearly $3.5 million.
MYSTERY COMPANY MUST COMPLY WITH SUBPOENA LINKED TO MUELLER PROBE, APPELLATE COURT RULES
Federal prosecutors have been trying to get the information from the unnamed company since as early as the summer of 2018.
The company has challenged the subpoena from the federal grand jury in Washington and refused to turn over requested documents to Mueller’s team. The corporation argued that complying with the subpoena would violate the laws of its country and constitute an undue hardship. In December, the D.C. Circuit Court of Appeals rejected their argument.
The special counsel’s office confirmed Monday it was handing off the mystery subpoena fight case to the U.S. Attorney’s office in Washington.
Mueller turned over his final report to Attorney General William Barr last week. Barr, in a summary sent to Congress on Sunday, said Mueller found no evidence of collusion between Trump campaign associates and Russia during the 2016 presidential election.
MUELLER SEEKING SUBPOENA, CONTEMPT CITATION AGAINST FOREIGN CORPORATION
Despite the fact that the investigation is complete, the status of the grand jury impaneled in the case remains unclear. The fines on the company will continue to accrue until the grand jury is discharged.
The special counsel issued more than 2,800 subpoenas, executed nearly 500 search warrants, obtained more than 230 orders for communication records and interviewed approximately 500 witnesses, according to Barr's summary.
Fox News' Jake Gibson, Gregg Re and The Associated Press contributed to this report. | {
"pile_set_name": "OpenWebText2"
} |
Hogan Promo Code, Promotion and Hogan Coupon-Codes Rebates.
Promo codes, Voucher Rebates and Discount codes from Hogan.
.
Welcome to the Hogan UK program, the Italian brand founded in 1986 specialized in creating and selling shoes, bags and clothing for men and women. Current Hogan promotions like Hogan Special Offers! Special Offers and latest Promotions at Hogan. Hogan free delivery! Free standard delivery for items above 230 GBP. Hogan can be found in the Fashion Accessories category. Hogan coupon, couponcode and free promotions here at promo-couponcode.com. To redeem a coupon or discount code, simply click on the underlined link for the above offers. If there's a Hogan coupon code or promo code listed after clicking to the offer you will need to enter that discount code in the appropriate place on the Hogan website, usually found during the check out process for the shopping cart.
We are always looking for newest Hogan Promo Code and coupon codes. If just not a Hogan coupon is active at the moment, save money even with Hogan discounts. Check back often as we're constantly updating Hogan promotions codes, deals and discounts. All of the offers and discounts listed above are subject to change without notice. Find hundreds of online stores with exceptional coupons and promo codes updated daily at favoritecodes.com. | {
"pile_set_name": "Pile-CC"
} |
External USB hardrive
SATA hardrive external enclosure, with AC power supply, with usb and sata connectors
i formatted and partitioned it without problem using the SATA connection
yet using the USB connection theres issues:
When its connected the safely remove icon appears
In device manager it is recognized as
a USB device - under drives
USB mass storage device - under USB serial controllers
Its not recognized in disk management nor in my computer
I know its not got a conflicting mapped network drive letter, as its assigned X:
Exactly the same issue on two seperate computers on all the usb slots i had the will to try. USB pen drives work fine.
I've read every thread i could find and most problems seem to be the conflicting drive letters, i was wondering if it might need some changes to the BIOS?
This might sound silly, but make sure your SATA drive is plugged into the enclosure well.. Meaning double check the power and data cables. It sounds like Windows is recognizing the SATA to USB chipset (enclosure), but not the drive itself (Which should show up in device manager under hard drives). | {
"pile_set_name": "Pile-CC"
} |
A man was captured on surveillance footage calmly eating noodles amid a horrifying street fight in Keelung City, Taiwan. The brawl, involving around 40 knife-wielding triad members, resulted in sliced hand tendons and a cut off nose.
The video, which was shot in January but only recently published online, shows a man in a blue shirt dining in a street food stall just three meters away from the chaotic scene. Even as the opposing gangs stood on either side of him arguing, he simply moved a little bit to the edge of the table to continue eating.
The Taiwanese police at first thought the noodle-eating man, who only left after watching the fight for some 10 minutes, was the mastermind behind the whole ordeal, as he appeared too calm.
According to the brave man, he “risked his life” to finish the noodles because he did not want to waste the food, which was only delivered to him shortly before the fight broke out.
Watch the video here:
By Joyce Ng
[AD] Sign up for the Chinese University of Hong Kong’s Contemporary China Studies program!
| {
"pile_set_name": "OpenWebText2"
} |
In today's Breakfast With Dave note, Rosenberg declares the death of the painful deleveraging cycle.
DELEVERAGING ... R.I.P.
Well, one headwind is now behind us. The consumer deleveraging cycle. This by no means suggests we are entering into a whole new credit cycle. But at the margin, the inability to access loans that plagued the consumer for so long has dissipated rather substantially of late. And just as the labour market embarks on an improving trend and just as the fiscal squeeze enters into its final stage. The building blocks for the consumer to grab the torch are being put together with each and every passing data point of late. Don't fight it. Embrace it.
The latest data point was the consumer credit data from the Fed for May — rising $19.6 billion (the consensus was +12.5 billion) or at an 8.3% annual rate, in the fastest pace of borrowing since May 2012. The gains were broad based with revolving credit up at a 9.3% annual rate, the strongest advance since May last year, and nonrevolving credit was also up at a 7.9% annual rate, but we know that in recent years, this was more of a federally-assisted student loan story than a tale about the consumer sector again willing to tap the credit lines for spending purposes. In fact, stripping out the federal government, credit lines for spending purposes. In fact, stripping out the federal government, credit surged at an 8.9% annual rate and the YOY trend ticked up to +2.5%.
At the banks, consumer credit is up 2.8% from year-ago levels. Consumer credit extended by savings institutions is up 6%. Credit unions have lent out funds to the consumer sector at a 10.2% pace over the past year (thanks to George Bailey!). And asset pools backed by consumer credit are also up 2.6%. Are these ripping credit numbers? Absolutely not. The new era is still one of prudence and frugality compared with the insanity and excesses of the last cycle. But deflationary deleveraging this ain't. | {
"pile_set_name": "Pile-CC"
} |
Proton transport through a peptide-tethered bilayer lipid membrane by the H(+)-ATP synthase from chloroplasts measured by impedance spectroscopy.
A lipid membrane was tethered to a gold film by a peptide spacer molecule terminated by a sulfhydryl group. Membranes were formed by fusion of liposomes prepared from egg phosphatidylcholine on self assembled monolayers of the thiolipopeptide Myr-Lys(Myr)-Ser-Ser-Pro-Ala-Ser-Ser-Ala-Ala-Ser-Ala-Cys-amide mixed with mercaptoethanol as a diluent molecule or lateral spacer. These mixed films, although not representing a perfect lipid bilayer, have been shown to retain the activity of incorporated H(+)-ATP synthases from chloroplasts in contrast to films prepared from the pure thiolipopeptide. The activity of the protein was demonstrated by impedance spectroscopy. The resistance decreased due to proton transport across the lipid film, which occurs as a consequence of adenosine triphosphate (ATP) hydrolysis. Several effects previously determined from kinetic measurements of the enzyme reconstituted in liposomes such as saturation with respect to the substrate (ATP), inhibition by venturicidin, activation by a positive potential pulse and increase of the proton current as a function of increasingly negative potentials have been confirmed also for this tethered membrane system. Changes in the impedance spectra due to the addition of ATP were fully reversible. | {
"pile_set_name": "PubMed Abstracts"
} |
/*
* Copyright 2016 Google Inc. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package dev.olog.service.floating.api;
import android.content.Context;
import android.graphics.Canvas;
import android.graphics.Paint;
import android.graphics.Path;
import android.util.AttributeSet;
import android.util.TypedValue;
import android.view.View;
import androidx.annotation.ColorInt;
import androidx.annotation.NonNull;
import dev.olog.service.floating.R;
/**
* {@code View} that draws a triangle selector icon at a given horizontal position within its bounds.
* A {@code TabSelectorView} is like a horizontal rail upon which its triangle selector can slide
* left/right.
*
* Class is public to allow for XML use.
*/
public class TabSelectorView extends View {
private static final String TAG = "HoverMenuTabSelectorView";
private static final int DEFAULT_SELECTOR_WIDTH_DP = 24;
private static final int DEFAULT_SELECTOR_HEIGHT_DP = 16;
private int mSelectorWidthPx;
private int mSelectorHeightPx;
private int mDesiredSelectorCenterLocationPx; // the selector position that the client wants
private int mLeftMostSelectorLocationPx; // based on mLeftBoundOffset and mSelectorWidthPx;
private int mRightMostSelectorLocationPx; // based on mRightBoundOffsetPx and mSelectorWidthPx;
private Path mSelectorPaintPath;
private Paint mSelectorPaint;
public TabSelectorView(Context context) {
this(context, null);
}
public TabSelectorView(Context context, AttributeSet attrs) {
super(context, attrs);
init();
}
private void init() {
mSelectorWidthPx = (int) TypedValue.applyDimension(TypedValue.COMPLEX_UNIT_DIP, DEFAULT_SELECTOR_WIDTH_DP, getResources().getDisplayMetrics());
mSelectorHeightPx = (int) TypedValue.applyDimension(TypedValue.COMPLEX_UNIT_DIP, DEFAULT_SELECTOR_HEIGHT_DP, getResources().getDisplayMetrics());
setSelectorPosition(mSelectorWidthPx / 2);
mSelectorPaint = new Paint();
mSelectorPaint.setColor(getResources().getColor(R.color.hover_selector_color));
mSelectorPaint.setStyle(Paint.Style.FILL);
}
public void setSelectorColor(@ColorInt int color) {
mSelectorPaint.setColor(color);
invalidate();
}
/**
* Sets the pixel position of the center of the selector icon. The position given will be
* clamped to available space in this View.
*
* @param position horizontal pixel position
*/
public void setSelectorPosition(int position) {
mDesiredSelectorCenterLocationPx = position;
invalidateSelectorPath();
}
@Override
protected void onMeasure(int widthMeasureSpec, int heightMeasureSpec) {
setMeasuredDimension(MeasureSpec.getSize(widthMeasureSpec), mSelectorHeightPx);
}
@Override
protected void onLayout(boolean changed, int left, int top, int right, int bottom) {
super.onLayout(changed, left, top, right, bottom);
if (changed) {
invalidateSelectorPath();
}
}
@Override
protected void onDraw(@NonNull Canvas canvas) {
canvas.drawPath(mSelectorPaintPath, mSelectorPaint);
}
private void invalidateSelectorPath() {
mLeftMostSelectorLocationPx = getPaddingLeft() + (mSelectorWidthPx / 2);
mRightMostSelectorLocationPx = getWidth() - getPaddingRight() - (mSelectorWidthPx / 2);
int selectorCenterLocationPx = clampSelectorPosition(mDesiredSelectorCenterLocationPx);
mSelectorPaintPath = new Path();
mSelectorPaintPath.moveTo(selectorCenterLocationPx, 0); // top of triangle
mSelectorPaintPath.lineTo(selectorCenterLocationPx + (mSelectorWidthPx / 2), mSelectorHeightPx); // bottom right of triangle
mSelectorPaintPath.lineTo(selectorCenterLocationPx - (mSelectorWidthPx / 2), mSelectorHeightPx); // bottom left of triangle
mSelectorPaintPath.lineTo(selectorCenterLocationPx, 0); // back to origin
invalidate();
}
private int clampSelectorPosition(int position) {
if (position < mLeftMostSelectorLocationPx) {
return mLeftMostSelectorLocationPx;
} else if (position > mRightMostSelectorLocationPx) {
return mRightMostSelectorLocationPx;
} else {
return position;
}
}
}
| {
"pile_set_name": "Github"
} |
Tanks for the storage of liquids have been constructed in a variety of ways from a variety of materials. In one common application, the underground storage of hydrocarbons, such as gasoline and other petroleum products, the tanks have conventionally been fabricated out of steel or fiberglass, most commonly with a single rigid wall. In many applications this construction has proved reasonably satisfactory, with such tanks functioning properly for many years before requiring repair or replacement. However, the increasing age of many of the tanks currently in place is beginning to present serious environmental dangers. Many of the older steel tanks buried underground have rusted and are beginning to leak, thus releasing the petroleum materials into the ground where they may seep into and pollute underground water supplies. While rustproof, some fiberglass tanks have also exhibited leakage, causing the same problems.
One of the primary problems with leaking storage tanks has been the difficulty or inability to ascertain when or if such leaks are occurring from a given tank. Because the excavation and removal of such a storage tank, which may contain thousands of gallons of fuel, is an expensive and difficult undertaking, such an operation is difficult to justify unless there is some evidence of actual leakage.
Because of the increasing potential danger of leaking storage tnaks, particularly in communities that utilize ground water for public consumption, many municipalities have implemented or plan to implement ordinances requiring the use of double wall storage tanks underground and requiring replacement of existing single wall tanks. While the installation of a conventional double wall tank in a new facility entails no great difficulty and a generally manageable increase in cost over a single wall tank, the burden of complying with such ordinances by replacing existing sound, single wall tanks with double wall tanks can be heavy. This burden has promoted the search for methods of fabricating relatively inexpensive double wall tanks. This burden has also given impetus to the search for a method of remanufacturing existing single wall tanks into a double wall assembly with means for detecting the presence of any leaks into the space between the two walls.
A number of techniques have been disclosed for converting single wall tank into double wall tank and providing such tanks with the means for detecting the presence of leaks. Such methods are shown for example in my U.S. Pat. No. 4,640,439 as well as my copending application Ser. No. 046,634. Although these techniques provide for quite acceptable double wall tanks they do require the employment of a perforated spacing material such as mesh, or alternatively, a molded spacing material that must be constructed and applied to the inner tank. The labor and time involved in constructing and installing these spacing materials can be significant and the need certainly exists to reduce even further the cost of producing such double wall tanks. | {
"pile_set_name": "USPTO Backgrounds"
} |
Welcome!
Menu
Available
Ok, so I know this is most likely the very first page you will visit on my website because that is the first thing I do when looking for a kitten! I do keep this page updated, so if you see a kitten listed as available, it probably is!
Feel free to contact me at [email protected] AFTER you read the Contact Page as it lists the info I need from you when inquiring about a kitten.
One Baby left!
Sweet and busy chocolate point Himalayan female still available and ready to go in a few weeks! $650 No Breeding rights
Kittens born May 7, 2017!
Mocha and Dash are the proud parents of of THREE babies! yay! We will start listing who is available in a few weeks, so keep checking back! Be sure to contact me if you want a kitten from this litter! These kittens will be ready to go to their new homes around the end of July to early August. | {
"pile_set_name": "Pile-CC"
} |
Context-dependent and invariant associations between APOE genotype and levels of lipoproteins and risk of ischemic heart disease: a review.
Apolipoprotein E (APOE) plays a pivotal role in the catabolism of triglyceride-rich lipoproteins by serving as a ligand for lipoprotein receptors. The common three-allele (epsilon 2/epsilon 3/epsilon 4) variation in the APOE gene is the most studied susceptibility polymorphism to date, identified in more than 50 different populations worldwide. Differences in the associations between APOE genotype and lipids, lipoproteins, and risk of ischemic heart disease between and within studies have raised the possibility that this gene is expressed in a context-dependent rather than invariant manner. The objective of this review was to focus on studies that in particular yield information about such context-dependent associations of the APOE polymorphism. The well-documented pattern of increasing cholesterol levels from epsilon 2 to epsilon 3 to epsilon 4 seems invariant across different populations; however, the magnitude of this association appears to be modifiable by gender, exogenous estrogens, diet and perhaps by body size. The less pronounced associations between the APOE polymorphism and high-density lipoprotein (HDL) cholesterol and triglycerides appear to differ by gender, to be enhanced by hyperglycemia and alcohol consumption, and abolished by exogenous estrogens in women, thus suggesting strong context dependency. The APOE polymorphism explains more of the variation in levels of cholesterol and apolipoprotein B (APOB) in women than in men, whereas a larger fraction of the variation in triglycerides is explained by the APOE polymorphism in men than in women. Finally, relative to epsilon 33 individuals, epsilon 32 women may be protected while epsilon 43 and epsilon 44 men may be particularly susceptible to ischemic heart disease. In conclusion, differences in magnitude or presence of APOE gene associations across studies or across subgroups within studies appear to be due to the influence of gender, exogenous estrogens, diet, hyperglycemia, alcohol consumption and perhaps body size. Consequently, these contexts should be considered when APOE polymorphism is studied. | {
"pile_set_name": "PubMed Abstracts"
} |
Q:
Can Azure Search integrate seamlessly with Azure DocumentDB?
According to the link, for Azure search to work, the data needs to be uploaded to the search service. If i have a No-SQL database in Azure as DocumentDB, can the search service be configured to access the data directly from database, rather than uploading the data to the service?
A:
I can not comment below the current thread, so I will add a new reply.
I am a Program Manager with Azure Search and I can confirm Daron's comments about this being a top request. There is also a fair amount of voting for it from our UserVoice page (http://feedback.azure.com/forums/263029-azure-search/suggestions/6328680-auto-indexing-of-docdb). As a result, we have been investigating tighter integration of these technologies.
| {
"pile_set_name": "StackExchange"
} |
How do we make sure the tiny satellites of Breakthrough Starshot don’t sail on past Alpha Centauri? Also in this issue: touchscreen-friendly space suits, a shiny new coronagraph at the Keck Observatory, and a Congressional homework assignment for SpaceX.
Breakthrough Starshot has quite a list of luminary names involved with the project, and now they can add another to the rolls: the ESO.
This site may earn affiliate commissions from the links on this page. Terms of use.
ExtremeTech Newsletter
Subscribe Today to get the latest ExtremeTech news delivered right to your inbox.
Email
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our
Terms of Use and
Privacy Policy. You may unsubscribe from the newsletter at any time. | {
"pile_set_name": "Pile-CC"
} |
1. Introduction {#sec1}
===============
Breast cancer is the most frequently diagnosed cancer among women in Ontario and is the second leading cause of cancer death \[[@B1]\]. Abstraction of medical charts is considered the gold standard for collecting breast cancer treatment data for monitoring and research purposes. However, this process can be laborious and costly, especially when conducting large population-based epidemiology research \[[@B2]\]. An alternative method is the use of administrative databases.
Previous studies using US data have revealed that the overall agreement between medical charts and administrative data for breast cancer treatment type is high, but agreement for specific treatment types and dates has not been evaluated concurrently \[[@B3]--[@B10]\]. Only one study has examined receipt of breast cancer radiotherapy in administrative databases in comparison to medical charts \[[@B9]\] but there have been no studies that have examined the validity of the anatomic location to which radiotherapy was received or the validity of radiotherapy start and end dates. Three US studies have examined the validity of breast cancer chemotherapy protocols \[[@B6], [@B7], [@B10]\] and found that they were of high accuracy. One study has validated chemotherapy dates and found moderate agreement with medical charts \[[@B8]\]. Validity of breast cancer surgery data in administrative databases has been examined in Ontario \[[@B11]\], demonstrating 86.2% agreement with medical charts; however, this includes a small cohort from the early 1990s and only validated very broad categories of surgery. A more recent study evaluated agreement for breast cancer surgery between hospital records, medical claims, and the cancer registry in Manitoba and found substantial or almost perfect agreement between data sources \[[@B12]\]. Surgery dates, however, were not validated in either study. Several studies have examined factors associated with agreement between administrative data and medical charts and found that agreement decreased with age, stage, and diagnosis year and varied by treatment site \[[@B3]--[@B5], [@B7], [@B8]\].
The Activity Level Reporting (ALR) database is housed at Cancer Care Ontario and collects selected systemic therapy and all radiation treatment from regional cancer centres and their associated hospitals \[[@B13]\]. Admission and discharge information for surgeries in Ontario is collected by the Canadian Institute of Health Information\'s hospital abstracting databases (Discharge Abstract Database \[DAD\], National Ambulatory Care and Reporting System \[NACRS\]). The purpose of this study was to evaluate the validity of the ALR and CIHI\'s DAD and NACRS databases in comparison to medical charts for breast cancer treatment data and to examine factors that may influence agreement. Specifically, the validity of the ALR was evaluated for the receipt of radiotherapy and chemotherapy and for specific radiotherapy anatomic locations and chemotherapy protocols and their corresponding treatment dates. CIHI\'s DAD and NACRS databases were evaluated for the receipt of surgery and for specific surgery types and their corresponding dates.
2. Methods {#sec2}
==========
2.1. Selection of Breast Cancer Cases {#sec2.1}
-------------------------------------
The Ontario Breast Screening Program (OBSP) is a province-wide, organized screening program that provides high-quality breast cancer screening services for women aged 50 to 74 \[[@B14]\]. Women are not eligible if they have acute breast symptoms, a history of breast cancer, or current breast implants \[[@B14]\]. This study identified women aged 50--69 screened through the OBSP between January 1, 2006, and December 31, 2009, with an abnormal mammogram and a diagnosis of screen-detected invasive breast cancer. Exclusions included prevalent cancers detected on initial screens, premenopausal women, bilateral or nonprimary breast cancer, non-Ontario residents, diagnoses more than 1 year following abnormal screening, stage IV breast cancer, women who were missing information required to identify treatment centre location, and women who received treatment at a hospital with less than 15 eligible women.
2.2. Data Collection {#sec2.2}
--------------------
### 2.2.1. Medical Chart Abstraction {#sec2.2.1}
Trained chart abstractors visited regional cancer centres across Ontario and reviewed medical charts to abstract relevant treatment data for all eligible women. Regional cancer centres are specialized centres in Ontario that deliver all cancer radiotherapy, and patients may also be referred to a regional cancer centre for diagnostic work-up, systemic therapy, and/or treatment planning. These centres and their associated hospitals maintain detailed patient charts about breast cancer treatment information and they have been shown to have complete, high-quality information \[[@B15], [@B16]\]. To facilitate chart abstraction, a local collaborator was identified for each regional cancer centre. A chart abstraction form was developed to collect demographic, prognostic, and treatment data. Abstraction occurred between 2014 and 2016.
Age at diagnosis and year of diagnosis were recorded. Women\'s postal code of residence at screening was linked to the 2006 Canadian Census to determine income quintiles (Q1 (low)--Q5 (high)) and community status \[[@B17]\]. Community status included urban (population 10,000+), rural (\<10,000 and a strong Metropolitan Influenced Zone (MIZ)), rural remote (\<10,000 and a moderate MIZ), and rural very remote (\<10,000 and a weak/no MIZ) \[[@B17]\]. Women were categorized as having no comorbidities if they had no preexisting illnesses other than arthritis or high blood pressure at the time of diagnosis and comorbid if they had any other preexisting illness at diagnosis outlined by the Charlson Index \[[@B18]\]. Breast cancer classification (invasive without associated ductal carcinoma in situ or invasive with associated ductal carcinoma in situ) was also recorded. Stage (I, II, and III) was based on the TNM classification scheme (6th edition) \[[@B19]\] and tumour grade was categorized as 1, 2, or 3. Women with negative results for estrogen and progesterone receptors (i.e., immunohistochemical assays showing \<1% of tumour cells positive for antibody nuclear staining) \[[@B20]\] and negative for HER2/neu protein overexpression (score 0, 1+) \[[@B21]\] were categorized as triple negative. Treatment centre region (South Central, South Eastern, South Western, and Northern \[[@B22]\]) was classified according to the regional cancer centre a woman first attended. Radiotherapy data included the anatomic location of radiotherapy given, the start and end dates of treatment, and whether treatment was completed. Chemotherapy data included the chemotherapy protocol given, the start and end dates of treatment, and whether treatment was completed. Surgery data included the type of surgery performed and the date of the surgery.
### 2.2.2. Administrative Data {#sec2.2.2}
Administrative data on radiotherapy and chemotherapy were obtained from the ALR. The ALR includes data submitted to Cancer Care Ontario by regional cancer centres and their associated hospitals. Radiotherapy data included the visit date of the activity, disease site, and the anatomic location of the body that received treatment. Chemotherapy data included the visit date of the activity, disease site, and medications given during chemotherapy.
Administrative data on surgery were obtained from CIHI\'s DAD and NACRS databases. DAD is a health services database that receives inpatient hospital discharge data directly from Ontario hospitals. NACRS is a health services database that receives ambulatory hospital and clinic discharge data from hospitals in Ontario. Surgery data included the date of the procedure, the type of procedure, and the main reason for the procedure (e.g., breast cancer).
2.3. Data Analysis {#sec2.3}
------------------
Medical chart data was linked with the ALR and CIHI databases using the Ontario Cancer Registry group number. For ALR radiotherapy data, a record was excluded if it indicated a non-breast disease site, if the treatment end date was more than 3 months after the follow-up chart abstraction date or more than 18 months after the diagnosis date (as these records likely indicate treatment for a second primary tumour or metastasis), if it was within 18 months but related to a recurrence, or if it indicated an incomplete treatment. For ALR chemotherapy data, a record was excluded if it indicated a non-breast disease site, if treatment end date was more than 3 months after follow-up chart abstraction date or more than 24 months after the diagnosis date, if it indicated receipt of hormone therapy only, or if it indicated that the chemotherapy protocol was unknown. For CIHI surgery data, a record was excluded if it was unrelated to invasive breast cancer, if it was missing surgery date and type, if the surgery was not treatment related, or if the surgery occurred before diagnosis or more than 12 months after diagnosis.
Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and kappa statistics were calculated for the receipt of radiotherapy, chemotherapy, and surgery, as well as for specific radiotherapy anatomic locations, chemotherapy protocols, and surgery types. The kappa statistic accounts for chance agreement and was classified into five levels: slight agreement (\<0.20), fair agreement (0.21--0.40), moderate agreement (0.41--0.60), substantial agreement (0.61--0.80), and almost perfect agreement (0.81--1.00) \[[@B23], [@B24]\]. To compare radiotherapy anatomic locations, analyses were restricted to women that received radiotherapy according to medical charts. Bilateral internal mammary chain was grouped with the supraclavicular/axilla region and radiation to the breast and chest wall were grouped. To compare chemotherapy protocols, analyses were restricted to women that received chemotherapy according to medical charts and had only one chemotherapy protocol. Agreement analyses for chemotherapy protocols were further restricted to exclude women that received a clinical trial according to the ALR, as it was not noted which specific drug(s) they received. To compare surgery types, analyses were restricted to women that received surgery according to medical charts. Percent agreement for radiotherapy and chemotherapy start and end dates and surgery dates in medical charts and administrative databases was also calculated for an exact match, ±1 day and ±7 days. Dates were validated by type for the most frequent treatment type and restricted to those women with treatment types that matched between the medical charts and the administrative data.
Multivariable logistic regression estimated odds ratios (OR) and 95% confidence intervals (CI) for factors influencing agreement between administrative databases and medical charts. Age at diagnosis (50--59, 60--69), year of diagnosis (2006, 2007, 2008, and 2009), TNM stage (I, II/III), and treatment centre region (South Central, South Eastern, South Western, and Northern) were adjusted for in all models. An offset controlling for agreement due to chance was included in all models \[[@B25]\]. Regression analyses were conducted for the receipt of each therapy and for the most common treatment type for each therapy. All analyses were performed using SAS version 9.4 \[[@B26]\]. The study was approved by the University of Toronto Research Ethics Board and informed consent was not required.
3. Results {#sec3}
==========
Overall, 2,518 eligible women diagnosed with stages I--III, unilateral, screen-detected invasive breast cancer were identified ([Figure 1](#fig1){ref-type="fig"}). Women were excluded if their medical charts were not available (*n* = 40), not eligible after review (*n* = 66), or incomplete (*n* = 11). The final sample consisted of 2,401 women of whom 2,375 had complete radiotherapy data, 2,292 had complete chemotherapy data, and 2,400 had complete surgery data.
There were a total of 51,020 records in the ALR for the 2,375 women in the radiotherapy cohort ([Figure 2(a)](#fig2){ref-type="fig"}). Records were excluded if they indicated a non-breast disease site (*n* = 766), if the treatment end date was more than 3 months after follow-up chart abstraction date (*n* = 629), if the treatment end date was before diagnosis (*n* = 25) or more than 18 months after the diagnosis (*n* = 2,750), if treatment was within 18 months of diagnosis but was related to a recurrence (*n* = 73), or if the radiation course was incomplete (*n* = 3,430). There were a total of 34,539 records in the ALR for the 2,292 women in the chemotherapy cohort ([Figure 2(b)](#fig2){ref-type="fig"}). Records were excluded if they indicated a non-breast disease site (*n* = 1,330), if the treatment end date was more than 3 months after follow-up chart abstraction date (*n* = 1,989) or more than 24 months after diagnosis (*n* = 5,205), if the records were for hormone therapy only (*n* = 101), or if the chemotherapy protocol was unknown (*n* = 53). There were a total of 120,328 records in the CIHI databases for the 2,400 women in the surgery cohort ([Figure 2(c)](#fig2){ref-type="fig"}). Records were excluded if they were not related to invasive breast cancer (*n* = 31,259), were missing surgery date and type (*n* = 1,607), were not relevant for breast cancer treatment (*n* = 82,752), occurred before diagnosis (*n* = 14) or more than 12 months after diagnosis (*n* = 252), or were duplicates between the CIHI DAD and NACRS databases (*n* = 19).
Women with complete treatment information for radiotherapy, chemotherapy, and surgery represent overlapping cohorts and thus have very similar characteristics ([Table 1](#tab1){ref-type="table"}). Approximately two-thirds of women were aged 60 to 69 and one-third were diagnosed in 2009. The majority were from an urban community setting and approximately one-quarter were from the highest income quintile. More than half of the women did not report any comorbidities, and most were classified as having invasive breast cancer with associated ductal carcinoma in situ. Approximately two-thirds of women had stage I breast cancer, with half having an intermediate grade tumour. Most patients did not have triple negative hormone status. More than half of the women received treatment in the South Central region of Ontario, which represents the Greater Toronto Area.
For receipt of radiotherapy, sensitivity was 92.0%, specificity was 99.3%, PPV was 99.8%, and NPV was 71.9% ([Table 2](#tab2){ref-type="table"}). The kappa statistic showed substantial agreement between medical charts and the ALR (0.793). Sensitivity was high for breast/chest wall radiation (88.2%) and supraclavicular/axilla radiation (86.6%) but lower for breast boost (43.3%), while specificity was greater than 98% for both breast boost and supraclavicular/axilla radiation. PPV was more than 90% for all radiotherapy anatomic locations and NPV was more than 83% for all radiotherapy anatomic locations. The kappa statistic showed moderate agreement for breast boost (kappa = 0.520) and almost perfect agreement for supraclavicular/axilla radiation (kappa = 0.868).
For receipt of chemotherapy, sensitivity was 77.7%, specificity was 99.2%, PPV was 98.2%, and NPV was 88.5% ([Table 2](#tab2){ref-type="table"}). The kappa statistic showed substantial agreement between medical charts and the ALR (0.804). Sensitivity was high for the chemotherapy protocol Fluorouracil, Epirubicin, Cyclophosphamide, Docetaxel (FEC-D; 71.9%) but lower for all others (65.3% for Adriamycin, Cyclophosphamide, Paclitaxel \[ACP\]/Adriamycin, Cyclophosphamide, Taxol \[ACT\], 62.5% for Fluorouracil, Epirubicin, Cyclophosphamide \[FEC\], 60.6% for Adriamycin, Cyclophosphamide \[AC\], and 50.7% for Taxotere, Cyclophosphamide or Carboplatin \[TC\]), while specificity was greater than 94% for all chemotherapy protocols. PPV was more than 90% for all chemotherapy protocols, except for TC, which was 72.3%. The NPV for all chemotherapy protocols was above 80%. The kappa statistic showed substantial agreement for all chemotherapy protocols (kappa = 0.682 for FEC-D, 0.714 for AC, 0.733 for ACP/ACT, and 0.734 for FEC), except for TC, which showed moderate agreement (kappa = 0.559).
For receipt of surgery, sensitivity was 95.8%, and specificity and PPV were both 100% ([Table 2](#tab2){ref-type="table"}). Sensitivity was high for partial mastectomy (94.2%) and modified radical mastectomy (89.5%), but lower for sentinel lymph node biopsy (73.7%), simple total mastectomy (60.7%), and axillary node dissection (27.4%). Specificity was very high for all surgery types (partial mastectomy, 91.7%; modified radical mastectomy, 98.3%; simple total mastectomy, 99.1%; axillary node dissection, 98.7%) but lower for sentinel lymph node biopsy (71.9%). PPV was greater than 86% for all surgery types; however, NPV ranged from 53.6% for sentinel lymph node biopsy to 98.6% for modified radical mastectomy. Kappa statistics varied by surgery type and showed fair agreement (axillary node dissection, 0.314), moderate agreement (sentinel lymph node biopsy, 0.415), substantial agreement (simple total mastectomy, 0.693; partial mastectomy, 0.781), and almost perfect agreement (modified radical mastectomy, 0.869).
For receipt of radiotherapy, odds of chance-corrected agreement were 1.41 times higher for women aged 60--69 compared to women aged 50--59 (OR = 1.41, 95% CI: 1.00--1.99; [Table 3](#tab3){ref-type="table"}). For year of diagnosis, odds of chance-corrected agreement for radiotherapy were significantly higher for subsequent years compared to 2006 (OR = 1.59, 95% CI: 1.05--2.42 for 2007; OR = 1.81, 95% CI: 1.16--2.83 for 2008; OR = 3.72, 95% CI: 2.12--6.54 for 2009; test for trend *p* \< 0.0001). No factors were associated with agreement for breast or chest wall radiation. For receipt of chemotherapy, odds of chance-corrected agreement were 1.94 times higher for diagnoses in 2008 (OR = 1.94, 95% CI: 1.20--3.16) and 34% lower for stage II/III breast cancer compared to stage I (OR = 0.66, 95% CI: 0.48--0.91). Odds of chance-corrected agreement for surgery overall could not be calculated, due to limited variability in receipt of surgery. For partial mastectomy, odds of chance-corrected agreement were 3.36 times higher for stage II/III breast cancer compared to stage I (OR = 3.36, 95% CI: 2.27--4.99).
Agreement in treatment dates was also examined among those women with matching treatment types between medical charts and administrative data ([Table 4](#tab4){ref-type="table"}). Among 1,623 women with matching breast/chest wall radiation in medical charts and the ALR, 96.5% of start dates were an exact match, increasing to 98.7% for ±7 days. Agreement for end dates was slightly lower, with 83.0% dates matching exactly, increasing to 95.4% for ±7 days. Among 207 women with matching FEC-D chemotherapy protocols between medical charts and the ALR, 88.7% of start dates were an exact match, increasing to 96.1% for ±7 days. Agreement for end dates was slightly lower, with 85.4% dates matching exactly, increasing to 94.7% for ±7 days. Among 1,917 women with matching partial mastectomy surgeries between medical charts and CIHI databases, exact agreement for dates was very high at 96.3%, increasing to 98.2% for ±7 days.
4. Discussion {#sec4}
=============
This study found that sensitivity, specificity, PPV, NPV, and kappa were high for receipt of radiotherapy, chemotherapy, and surgery. Agreement decreased slightly when considering specific radiotherapy anatomic locations, chemotherapy protocols, and surgery types. Odds of chance-corrected agreement tended to increase with more recent diagnosis year and were impacted by stage of treatment. Approximately 95% of start and end dates for radiotherapy and chemotherapy and surgery dates in administrative databases were within a week of the dates recorded in the medical charts.
Agreement for receipt of radiotherapy overall was substantial. Sensitivity and PPV were high for breast/chest wall radiation; however specificity and NPV could not be reliably calculated due to minimal variability, as almost all women received this type of radiation. Agreement was also very high for supraclavicular/axilla radiation, but there was lower sensitivity and only moderate agreement for breast boost. Moderate agreement for breast boost is likely a result of select misclassification in the ALR (i.e., if the original treated site is recorded instead of coding the treatment as a breast boost). Overall, results of this study are consistent with previous research with other administrative databases in the US, which indicated the agreement for the receipt of radiotherapy as substantial (kappa = 0.70 to 0.79) \[[@B3], [@B6]\]. To our knowledge, this was the first paper to validate the anatomic location that received radiotherapy.
Results for chemotherapy agreement are also consistent with previous work from the US, which indicated that the agreement for the receipt of chemotherapy was substantial (kappa = 0.62 to 0.79) \[[@B3]--[@B5], [@B8]\] or almost perfect (kappa = 0.82 to 0.89) \[[@B6], [@B10]\]. Agreement was slightly lower for specific chemotherapy protocols, consistent with other research \[[@B6], [@B10]\]. Disagreement in chemotherapy protocols in our study was often a result of the ALR missing one drug from a multidrug protocol or listing no treatment information for a woman who had corresponding records in the medical charts. The latter may be explained by the limitation that some smaller hospitals in Ontario did not report to the ALR during the time period of our study \[[@B13]\].
Sensitivity, specificity, and PPV were high for receipt of treatment surgery, which aligns with previous research on 1991 data from the same CIHI database \[[@B11]\]. Agreement was lowest for axillary node dissection and sentinel lymph node biopsy, which was expected because reporting of these procedures in CIHI databases was only optional until 2015 if it occurred during the same episode as the primary lumpectomy or mastectomy. Previous research in Manitoba comparing hospital records with medical claims and the Manitoba Cancer Registry also found lower agreement for axillary node dissection when compared to other surgery types \[[@B12]\].
Results from this study indicated that agreement for receipt of chemotherapy is not impacted by age. This result is consistent with some literature from the US \[[@B7]\], but not other literature which showed a decrease in agreement with increases in age \[[@B4]\]. Our study also showed that chemotherapy and radiotherapy agreement increased with more recent diagnosis year. Although this finding was inconsistent with other literature \[[@B4]\], it was expected in our study based on active efforts to increase the accuracy of the ALR after its establishment in the late 1990s. Results from this study do align with previous research for stage, with more advanced stage of breast cancer resulting in higher odds of disagreement for receipt of chemotherapy \[[@B4]\]. This may suggest poorer agreement for palliative versus curative treatments. Conversely, we found that agreement increased with advanced stage of breast cancer for partial mastectomy, possibly indicating more substantial agreement for more complex cases requiring longer hospital stays.
Exact agreement in radiotherapy start dates was extremely high at 96.5%. There was slightly less agreement in radiotherapy end dates; however, the discrepancies were minor as agreement increased from 83% to 95.4% when considering end dates within 1 week of the medical chart end dates. Agreement in chemotherapy start and end dates was also high, with disagreements mostly due to missing ALR records at the beginning of treatment protocols. Agreement in dates for surgery was extremely high. Mismatched dates mostly occurred in women whose first treatment surgery was also diagnostic, as these procedures were not coded in CIHI as breast cancer-related and were therefore excluded during data cleaning. To our knowledge, only one previous study has validated dates for breast cancer treatment, finding only 86% agreement ±30 days \[[@B8]\]. Overall, treatment dates in the ALR and CIHI databases were highly accurate, which means that this data is being used reliably for monitoring and evaluation of Ontario treatment wait times.
Strengths of this study include a large sample size and use of data from a population-based cohort of screened women, with access to the medical charts of more than 95% of the eligible women. Also, this was the first study to our knowledge to validate breast cancer treatment types and dates in the ALR and CIHI databases. However, there are several limitations. First, the definitions used for the type of therapy may have differed between medical charts and administrative data. In addition, some types of treatments could not be compared because they were not present in both data sources. The results may not generalize to women diagnosed outside of the OBSP, those with stage IV breast cancers, in situ breast cancers, or other cancers which might have different treatments, such as oral rather than systemic chemotherapy. Finally, while medical charts were used as the gold standard, previous research has suggested that a true gold standard may not exist \[[@B27]\].
5. Conclusions {#sec5}
==============
Agreement between medical charts and administrative databases for breast cancer treatment data varied from moderate to almost perfect, depending on treatment type. In future Ontario studies, chart review may not be required for collection of breast cancer treatment data. Future research could validate more specific treatment details, such as radiotherapy dose levels, to determine if administrative databases suffice for more detailed epidemiological research.
This work was supported by the Canadian Institutes of Health Research (Grant no. 130400). The authors thank the study staff, Brittany Speller, Leanne Lindsay, and Lucy Leon, and Jessie Cunningham for assisting in the literature search. Lastly, they acknowledge Cancer Care Ontario for use of its data for this study.
Disclosure
==========
The Canadian Institutes of Health Research had no involvement in the study design, data collection, analysis, interpretation, manuscript preparation, or the decision to submit the manuscript for publication.
Conflicts of Interest
=====================
The authors declare that there are no conflicts of interest regarding the publication of this article.
{#fig1}
{#fig2}
######
Characteristics of eligible women diagnosed with invasive breast cancer through Ontario Breast Screening Program between January 1, 2006, and December 31, 2009, by women with complete radiotherapy, chemotherapy, and surgery data.
-------------------------------------------------------------------------------
Characteristics Radiotherapy\ Chemotherapy\ Surgery\
*N* = 2,375\ *N* = 2,292\ *N* = 2,400\
*n* (%) *n* (%) *n* (%)
-------------------------------- --------------- --------------- --------------
*Age at diagnosis (years)*
50--59 824 (34.7) 792 (34.6) 832 (34.7)
60--69 1,551 (65.3) 1,500 (65.4) 1,568 (65.3)
*Year of diagnosis*
2006 454 (19.1) 439 (19.2) 459 (19.1)
2007 597 (25.1) 574 (25.0) 602 (25.1)
2008 613 (25.8) 593 (25.9) 618 (25.8)
2009 711 (29.9) 686 (29.9) 721 (30.0)
*Income quintile*
1: lowest 417 (17.6) 400 (17.5) 423 (17.7)
2 466 (19.7) 447 (19.6) 471 (19.7)
3 474 (20.1) 456 (20.0) 478 (20.0)
4 447 (18.9) 432 (18.9) 452 (18.9)
5: highest 559 (23.7) 547 (24.0) 564 (23.6)
*Missing* *12* *10* *12*
*Community status*
Urban 1,962 (82.7) 1,893 (82.6) 1,985 (82.8)
Rural 132 (5.6) 129 (5.6) 133 (5.5)
Rural remote 188 (7.9) 182 (7.9) 189 (7.9)
Rural very remote 91 (3.8) 87 (3.8) 91 (3.8)
*Missing* *2* *1* *2*
*Comorbidity*
No 1,338 (57.2) 1,290 (57.2) 1,354 (57.3)
Yes 1,001 (42.8) 967 (42.8) 1,008 (42.7)
*Missing* *36* *35* *38*
*Breast cancer classification*
Invasive 698 (30.2) 675 (30.2) 703 (30.1)
Invasive + DCIS 1,615 (69.8) 1,559 (69.8) 1,635 (69.9)
*Missing* *62* *58* *62*
*TNM stage*
I 1,544 (65.9) 1,507 (66.7) 1,555 (65.7)
II 675 (28.8) 637 (28.2) 683 (28.9)
III 123 (5.3) 117 (5.2) 128 (5.4)
*Missing* *33* *31* *34*
*Histologic grade*
1 706 (30.4) 694 (30.9) 711 (30.3)
2 1,103 (47.5) 1,060 (47.2) 1,117 (47.6)
3 514 (22.1) 491 (21.9) 520 (22.1)
*Missing* *52* *47* *52*
*Triple negative*
No 2,093 (90.6) 2,034 (91.0) 2,112 (90.6)
Yes 217 (9.4) 202 (9.0) 220 (9.4)
*Missing* *65* *56* *68*
*Treatment centre region*
South Central 1,213 (51.1) 1,155 (50.4) 1,230 (51.3)
South Eastern 411 (17.3) 403 (17.6) 412 (17.2)
South Western 463 (19.5) 453 (19.8) 468 (19.5)
Northern 288 (12.1) 281 (12.3) 290 (12.1)
-------------------------------------------------------------------------------
DCIS, ductal carcinoma in situ.
######
Agreement analysis by receipt of treatment and specific type of treatment, comparing information from administrative databases with medical charts among women with complete radiotherapy, chemotherapy, and surgery data.
--------------------------------------------------------------------------------------------------------------------------------------
Treatment type Medical\ Administrative database^1^ \ Sensitivity\ Specificity\ PPV\ NPV\ Kappa
chart\ *n* (%) (%) (%) (%) (%)
*n* (%)
------------------------------------ -------------- ------------------------------ -------------- -------------- ------ ------ -------
*Radiotherapy*^2^
Yes 1,970 (82.9) 1,816 (76.5) 92.0 99.3 99.8 71.9 0.793
No 405 (17.1) 559 (23.5)
*Breast or chest wall radiation*
Yes 1,840 (93.4) 1,735 (88.1) 88.2 n/a 93.5 n/a n/a
No 130 (6.6) 235 (11.9)
*Breast boost*
Yes 510 (25.9) 230 (11.7) 43.3 99.4 96.1 83.4 0.520
No 1,460 (74.1) 1,740 (88.3)
*Supraclavicular/axilla radiation*
Yes 232 (11.8) 223 (11.3) 86.6 98.7 90.1 98.2 0.868
No 1,738 (88.2) 1,747 (88.7)
*Chemotherapy*^3^
Yes 840 (36.6) 665 (29.0) 77.7 99.2 98.2 88.5 0.804
No 1,452 (63.4) 1,627 (71.0)
*FEC-D*
Yes 288 (44.2) 226 (34.7) 71.9 94.8 91.6 81.0 0.682
No 364 (55.8) 426 (65.3)
*AC*
Yes 109 (16.7) 67 (10.3) 60.6 99.8 98.5 92.6 0.714
No 543 (83.3) 585 (89.7)
*ACP/ACT*
Yes 95 (14.6) 67 (10.3) 65.3 99.1 92.5 94.4 0.733
No 557 (85.4) 585 (89.7)
*TC*
Yes 67 (10.3) 47 (7.2) 50.7 97.8 72.3 94.5 0.559
No 585 (89.7) 605 (92.8)
*FEC*
Yes 48 (7.4) 32 (4.9) 62.5 99.7 93.8 97.1 0.734
No 604 (92.6) 620 (95.1)
*Surgery* ^4^
Yes 2,396 (99.8) 2,296 (95.7) 95.8 100 100 n/a n/a
No 4 (0.2) 104 (4.3)
*Partial mastectomy*
Yes 2,035 (84.9) 1,947 (81.3) 94.2 91.7 98.5 73.7 0.781
No 361 (15.1) 449 (18.7)
*Modified radical mastectomy*
Yes 277 (11.6) 284 (11.9) 89.5 98.3 87.3 98.6 0.869
No 2,119 (88.4) 2,112 (88.1)
*Simple (total) mastectomy*
Yes 234 (9.8) 162 (6.8) 60.7 99.1 87.7 95.9 0.693
No 2,162 (90.2) 2,234 (93.2)
*Axillary node dissection*
Yes 818 (34.1) 244 (10.2) 27.4 98.7 91.8 72.4 0.314
No 1,578 (65.9) 2,152 (89.8)
*Sentinel lymph node biopsy*
Yes 1,684 (70.3) 1,441 (60.1) 73.7 71.9 86.1 53.6 0.415
No 712 (29.7) 955 (39.9)
--------------------------------------------------------------------------------------------------------------------------------------
*Note*. Due to small numbers, values marked "n/a" could not be reliably calculated. PPV, positive predictive value; NPV, negative predictive value; FEC-D, Fluorouracil, Epirubicin, Cyclophosphamide, Docetaxel; AC, Adriamycin, Cyclophosphamide; ACP, Adriamycin, Cyclophosphamide, Paclitaxel; ACT, Adriamycin, Cyclophosphamide, Taxol; TC, Taxotere, Cyclophosphamide or Carboplatin; FEC, Fluorouracil, Epirubicin, Cyclophosphamide. ^1^The corresponding administrative database is the Activity Level Reporting database (ALR) for radiotherapy and chemotherapy treatment data, and Canadian Institute for Health Information (CIHI) databases for surgical data. ^2^Including brachytherapy/internal radiation, clinical trials, and unknown and other types of radiotherapy. *N* = 2,375 for receipt of radiotherapy (women with complete radiotherapy data in medical charts), and *N* = 1,970 for radiotherapy types (women who received radiotherapy according to medical charts). ^3^Including clinical trials, unknown, and all chemotherapy protocols. *N* = 2,292 for receipt of chemotherapy (women with complete chemotherapy data in medical charts), and *N* = 652 for chemotherapy protocols (women who received one chemotherapy treatment according to medical charts). ^4^Including partial mastectomies, modified radical mastectomies, simple (total) mastectomies, axillary node dissections, sentinel lymph node biopsies, and other surgeries. *N* = 2,400 women for receipt of surgery (women with complete surgery data in medical charts) and *N* = 2,396 for surgery type (women who received surgery according to medical charts).
######
Odds ratios (ORs) and 95% confidence intervals (CIs) comparing agreement versus disagreement between medical records and administrative database information in women with invasive breast cancer for each treatment and its most common type.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Radiotherapy\ Breast or chest wall radiation\ Chemotherapy\ FEC-D\ Partial mastectomy^2^ \
*N* = 2,375 *N* = 1,970 *N* = 2,292 *N* = 652 *N* = 2,396
--------------------- ------------------------------- --------------------------------- ------------------- ----------- ------------------------- ------------ ------------------- -------- ----------------------- --------------
*Age at diagnosis*
50--59 1.00 (ref) 1.00 (ref) 1.00 (ref) 1.00 (ref) 1.00 (ref)
60--69 **1.41 (1.00--1.99)** **0.0498** 1.05 (0.82--1.35) 0.6960 1.06 (0.77--1.47) 0.7075 0.81 (0.52--1.26) 0.3512 0.81 (0.56--1.19) 0.2823
*Year of diagnosis*
2006 1.00 (ref) 1.00 (ref) 1.00 (ref) 1.00 (ref) 1.00 (ref)
2007 **1.59 (1.05--2.42)** **0.0287** 0.96 (0.69--1.34) 0.8100 0.87 (0.57--1.34) 0.5323 1.05 (0.54--2.06) 0.8859 0.93 (0.53--1.64) 0.8029
2008 **1.81 (1.16--2.83)** **0.0086** 1.04 (0.73--1.49) 0.8168 **1.94 (1.20--3.16)** **0.0074** 1.63 (0.80--3.32) 0.1763 0.67 (0.39--1.14) 0.1418
2009 **3.72 (2.12--6.54)** ^**3**^ **\<0.0001** 0.99 (0.71--1.40) 0.9766 1.49 (0.96--2.33) 0.0765 1.37 (0.69--2.73) 0.3647 0.63 (0.37--1.07) 0.0869
*TNM stage*
I 1.00 (ref) 1.00 (ref) 1.00 (ref) 1.00 (ref) 1.00 (ref)
II/III 1.25 (0.87--1.80) 0.2191 0.99 (0.76--1.29) 0.9637 **0.66 (0.48--0.91)** **0.0108** 1.43 (0.87--2.32) 0.1556 **3.36 (2.27--4.99)** **\<0.0001**
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
*Note*. Missing values were excluded from analyses. FEC-D, Fluorouracil, Epirubicin, Cyclophosphamide, Docetaxel. ^1^Adjusted for all other variables in the table and treatment centre region. ^2^Results could not be computed for receipt of surgery overall, as there was limited variability. ^3^Test for trend *p* \< 0.0001.
######
Percent agreement between medical charts and administrative databases for radiotherapy, chemotherapy, and surgery dates.
Date validated Exact agreement Agreement ± 1 day Agreement ± 7 days
-------------------------------------------- ----------------- ------------------- --------------------
Radiotherapy (breast/chest wall radiation)
Start date 96.5% 97.5% 98.7%
End date 83.0% 84.0% 95.4%
Chemotherapy (FEC-D)
Start date 88.7% 93.1% 96.1%
End date 85.4% 90.8% 94.7%
Surgery (partial mastectomy) 96.3% 97.2% 98.2%
ALR, Activity Level Reporting database; CIHI, Canadian Institute for Health Information; FEC-D, Fluorouracil, Epirubicin, Cyclophosphamide, Docetaxel.
[^1]: Academic Editor: Pagona Lagiou
| {
"pile_set_name": "PubMed Central"
} |
“This will happen to you in high school; better get used to it!” one student exclaimed, as a group of middle-schoolers allegedly raped their younger male classmate in the locker room.
In school, he became known as “the boy who was raped.”
As the young teen roamed the hallways over the next 18 months, he was taunted by other students who alternately called him “the boy who was butt-fucked” and “snitch” for reporting the attack, according to a new federal lawsuit against Washington Public Schools in Oklahoma.
In the suit, the alleged victim, now 14, and his parents claim the district’s superintendent and middle-school principal not only knew about the sexual abuse he was suffering—but “ignored, minimized and dismissed it.”
As a result, Superintendent A.J. Brewer and Washington Middle School Principal Stuart McPherson gave the perpetrators “a free pass to continue—and escalate—their abuse” of the boy, the 32-page lawsuit claims. The suit was filed in Oklahoma City on Monday.
Both Brewer and McPherson allegedly refused “to recognize that forcible digital penetration of a student’s rectum is sexual assault—regardless of whether the victim is male or female,” calling it “horseplay” and “accidental,” according to the complaint.
Doe was allegedly “subjected to three sexual assaults by his male peers in an 18-month period, almost daily verbal harassment and bullying, and threats of physical harm and death in Washington Public Schools that went unchecked by officials with the authority to stop it.”
The boy was in sixth grade when he was first sexually assaulted, according to the lawsuit, which describes the harassment and bullying he suffered as “a relentless and inescapable aspect” of his daily life.
“It was not horseplay—or an accident—when one student restrained Child Doe while another shoved his fingers in [his] rectum in front of a classroom full of students,” the suit states. “And it was not horseplay or an accident when other students snuck up behind Child Doe in school locker rooms and shoved their fingers in his rectum.”
At least one of the assaults happened in music class, according to the suit, and three students participated as 30 to 40 others looked on.
Afterward, the boy immediately called his parents in tears, and they came to the school to meet with administrators, according to the complaint.
That’s when the name-calling began, with his attackers and their friends whispering the word “snitch” as they mocked him, the lawsuit claims.
Later, the boy received a text message from his first tormentor, who said, “Fuck you, I am going to kill you,” the lawsuit alleges. Doe and his parents reported the harassment and threats—but none of the students were ever disciplined, according to the suit.
Doe’s father was upset about the volatile situation and called several meetings with McPherson, the school’s principal, who dismissed the assaults and at one point allegedly asked, “What do you want me to do, hold his hand?”
McPherson and the superintendent, Brewer, even “asked Child Doe if the students stuck their fingers in Child Doe’s body by accident or on purpose,” the lawsuit claims. Eventually, Brewer allegedly suggested that Doe take the matter “into his own hands” by “using his baseball bat to defend himself.”
The victim and his father believed that to be an inadequate solution, according to the lawsuit, and—out of desperation—Doe asked to be held back a grade in order to escape the perpetrators.
The school agreed, but life has not gotten better for Doe, as he struggles to cope with the trauma, according to the lawsuit, which claims “he lost his eligibility to play a sport he loves, and he has required mental health counseling.”
“The defendants’ failure to take meaningful action to address this has traumatized Child Doe psychologically and emotionally,” the complaint states, noting that Doe has been diagnosed with depression, social anxiety disorder, and post-traumatic stress disorder.
Doe’s family alleges that the school’s behavior violated federal civil-rights laws. They have demanded a jury trial and are seeking compensatory and punitive damages, as well as injunctive relief to ensure that future students do not experience the same trauma. Doe was not the only boy subjected to sexual abuse at the school, the lawsuit claims.
The Oklahoma State Bureau of Investigation confirmed to the Associated Press that it is investigating the lawsuit’s allegations. The bureau reportedly began its probe in November at the request of a local police department.
Spokeswoman Jessica Brown told the news agency that the investigation will soon be concluded and handed over to the district attorney to determine criminal charges.
Andy Fugitt, an attorney for the school, declined comment to the AP, citing pending litigation. | {
"pile_set_name": "OpenWebText2"
} |
After taking a few moments on this past week’s UFC 202 conference call to throw some expletives the way of most of the WWE roster, featherweight champ Conor McGregor clarified his statements.
Or, rather, he doubled down on his trash talk.
I didn't mean no disrespect to the @wwe fans. What I meant to say was that I'd slap the head off your entire roster. And twice on Sunday's. — Conor McGregor (@TheNotoriousMMA) August 7, 2016
“I didn’t mean no disrespect to the @wwe fans,” McGregor tweeted. “What I meant to say was that I’d slap the head off your entire roster. And twice on Sunday’s.”
McGregor (19-3 MMA, 7-1 UFC) rematches Nate Diaz (19-10 MMA, 14-8 UFC) in the UFC 202 pay-per-view welterweight main event Aug. 20 at T-Mobile Arena in Las Vegas.
Diaz scored a second round submission of McGregor in the first outing, a result many pro wrestlers who responded on social media were quick to point out.
Check out some of the most interesting responses from the world of sports entertainment below.
* * *
Coming from a guy who built a career copying my persona, I expected the type of class we get from Ronda or Anderson. pic.twitter.com/iVoC0Xva5g — Ric Flair® (@RicFlairNatrBoy) August 7, 2016
After Diaz finishes you again, I dare you to try guys like Dolph, Brock, or Fit. Oh you're welcome for your gimmick pic.twitter.com/0qziVjlMav — Ric Flair® (@RicFlairNatrBoy) August 7, 2016
So much talk for a guy who fights 15 min matches twice a year…… Good for you Conor McGaiver. — Rusev MACHKA (@RusevBUL) August 7, 2016
The way Nate Diaz Stockton slapped you or nah?https://t.co/PGDrBcVum7 — MVP (@The305MVP) August 7, 2016
I don't dislike McGregor. He's just making money and getting people to talk.
But I bet on Diaz last fight. I'll bet on Diaz again. $$$$ — MVP (@The305MVP) August 7, 2016
I beg to differ kid https://t.co/u6KmP7C1Sy — Baron Corbin (@BaronCorbinWWE) August 7, 2016
Maybe I'm late to the party……..what weight class and what size locker room is being called out #WWEGuy — Bill DeMott (@BillDeMott) August 7, 2016
I think McGregor could do well in the featherweight division……if the WWE had one. https://t.co/90XGpSICS9 — AJStyles.Org (@AJStylesOrg) August 7, 2016
4 kids, these balls aren't shrinking. When comes to AJ Styles, it's hard work that pays off. https://t.co/iDBBKlAosA — AJStyles.Org (@AJStylesOrg) August 7, 2016
Your the size of my leg. Shut up. https://t.co/fBVEdf8hE1 — Roman Reigns (@WWERomanReigns) August 7, 2016
You're* sorry grammar geeks, Smh. — Roman Reigns (@WWERomanReigns) August 7, 2016
@TheNotoriousMMA @WWE very funny little guy. Why don't you get your head out of Dana White's ass — Kurt Angle (@RealKurtAngle) August 7, 2016
Never show a Jack Russell a mirror. It thinks it's a majestic Irish Wolfhound. Really, just an annoying wee yapper trying to sell tickets. — Sheamus (@WWESheamus) August 7, 2016
Yikes, looks like @TheNotoriousMMA could really use a bowl of Booty O's right about now. Someone hook him up…https://t.co/aLuSQvt7P2 — Kofi Kingston (@TrueKofi) August 7, 2016
Would you prefer to find us individually or have us all line up at once? I know your time is valuable, sir. https://t.co/XPnKhWAlza — ShinigamE (@WWEBigE) August 7, 2016
I would pay good $$ to see @RealKurtAngle STRETCH THE PISS outta @TheNotoriousMMA and make him tap. #itstrue https://t.co/Uvo8H34nHy — Bubba Ray Dudley (@BubbaRayDudley) August 7, 2016
Sorry pal no disrespect to u, but my fights are legit, unlike the fixed fights u have in @UFC. I’ll embarrass u. https://t.co/X5WCyeHYbf — Chris Jericho (@IAmJericho) August 7, 2016
@TheNotoriousMMA bro you're water trash,here's some advice keep that mouth shut or I'll shut it for you , you mutt! https://t.co/7nksv6sDLj — matthew riddle (@riddletuf7) August 7, 2016
I promise Connor Mcgregor would beat the shit out of me in a fight — TRENT? (@trentylocks) August 7, 2016
For more on UFC 202, check out the UFC Rumors section of the site. | {
"pile_set_name": "OpenWebText2"
} |
A community-of-care: the integration of a palliative approach within residential aged care facilities in Australia.
In developed countries, residential aged care facilities (RACFs) are increasingly becoming the place of care and site of death for older people with complex chronic illnesses. Consequently, it is becoming ever more relevant for these facilities to provide appropriate complex, as well as end-of-life care for this growing group of people. Evidence-based guidelines for providing a 'palliative approach' were developed and introduced in Australia in 2004, with the emphasis on improving symptom control earlier in the disease trajectory. The aim of the study reported here was to explore the extent to which a palliative approach was being used in the organisation and provision of care for older people with complex needs living in mixed-level (a combination of low- and high-level care) RACFs. This paper primarily reports on the qualitative findings. Two residential aged care organisations, one in rural New South Wales and the other in Sydney, Australia, participated. Data were collected over a 9-month period from May until December 2008. Residents, family members and aged care staff were interviewed. Thematic analysis of participant interviews shows that while the various elements of a palliative approach are incorporated into the care of high-level care residents, the discourse itself is not used. In this paper, we argue for a new conceptualisation of care for people in mixed-level care facilities: a community-of-care, in which a palliative approach is one of several components of the care provided. The findings illuminate aged care staff experiences of providing care to high-level care residents. They also provide valuable insights into high-level care residents' perceptions of their health, care provided and the way in which they foresee their care being provided in future. These findings will be important for informing clinical practice, research and policy in these settings. | {
"pile_set_name": "PubMed Abstracts"
} |
945 F.2d 401
Spellmon-Beyv.Collins*
NO. 91-4176
United States Court of Appeals,Fifth Circuit.
SEP 16, 1991
1
Appeal From: E.D.Tex.
2
AFFIRMED.
*
Fed.R.App.P. 34(a); 5th Cir.R. 34.2
| {
"pile_set_name": "FreeLaw"
} |
Houston ankle surgery
How to Strengthen Your Ankle after Surgery Doctors typically recommend ankle surgery patients enter a short period of immobilization and rest. But, doing so causes some level of atrophy. When this happens, muscles and connective tissues become smaller and weaker. So, it’s important to know how to strengthen your ankle after surgery. How to Strengthen…
Ankle sprain treatment is a simple DIY routine that just about anyone can do. Ankle sprains result from just engaging in normal activities and also from sports participation. When you sprain your ankle, you’ll need to treat it with care so the sprain heals correctly. Ankle Sprain Treatment Before you start an ankle sprain treatment,…
How Long will It take to Recover from Ankle Surgery? How long will it take to recover from ankle surgery? That’s a good question and unfortunately, there’s no hard and fast answer. However, there are some common parameters we can look at to answer that very question. In general, it takes about 6 to…
What is the Average Cost of Ankle Surgery? What is the average cost of ankle surgery? If you’re asking this question, you might not have the right health insurance. Or, you’ve elected to pay for the procedure on your own. Whatever the case, there are different factors that make up the overall cost of ankle…
How Long does It take to Recover from Ankle Ligament Repair Surgery? How long does it take to recover from ankle ligament repair surgery? Well, that really depends on what actually happened. In other words, the severity of the damage. First of all, it’s very important to understand what a torn ligament is and what…
How Long does It take to Heal from a Broken Ankle Surgery? How long does it take to heal from a broken ankle surgery? That’s a question most people have when researching the possibilities of an ankle injury. And, it’s not an exact answer. Unfortunately, there are no quick and easy answers to the question…
What is a Bone Fusion for the Ankle? Bone fusion of the ankle is a surgical procedure. It’s performed on patients with worn out ankle joints. This leads to repeated pain in the foot. In the medical world, this is called “degenerative arthritis,” and as the term states, it only gets worse over time. To…
What is Reconstructive Ankle Surgery? Your feet and ankles are remarkably complex parts of the body. There are several bones, ligaments, muscles, and more which allow you to ambulate through your daily routine. But, these natural wonders don’t always get through the day unharmed. In fact, you might experience an injury which requires reconstructive ankle…
Do Torn Ankle Ligaments Require Surgery? Do torn ankle ligaments require surgery? That’s a question some people have after suffering from ligament damage in their feet and ankles. In some instances, surgery isn’t necessary but in others, it is the only real option. Do Torn Ankle Ligaments Require Surgery? Torn ankle ligaments cause pain, swelling,… | {
"pile_set_name": "Pile-CC"
} |
New Neanderthal remains from Mani peninsula, Southern Greece: the Kalamakia Middle Paleolithic cave site.
The Kalamakia cave, a Middle Paleolithic site on the western coast of the Mani peninsula, Greece, was excavated in 1993-2006 by an interdisciplinary team from the Ephoreia of Paleoanthropology and Speleology (Greek Ministry of Culture) and the Muséum national d'Histoire naturelle (Paris). The site is dated to between ca. 100,000 and >39,000 years BP (Before Present) and has yielded Mousterian lithics, a rich fauna, and human remains from several layers. The latter include 10 isolated teeth, a cranial fragment and three postcranial elements. The remains represent at least eight individuals, two of them subadults, and show both carnivore and anthropogenic modifications. They can be identified as Neanderthal on the basis of diagnostic morphology on most specimens. A diet similar to that of Neanderthals from mixed habitat is suggested by our analysis of dental wear (occlusal fingerprint analysis) and microwear (occlusal texture microwear analysis), in agreement with the faunal and palynological analyses of the site. These new fossils significantly expand the Neanderthal sample known from Greece. Together with the human specimens from Lakonis and Apidima, the Kalamakia human remains add to the growing evidence of a strong Neanderthal presence in the Mani region during the Late Pleistocene. | {
"pile_set_name": "PubMed Abstracts"
} |
Pop music has been buzzing a lot in Soundcloud with the melodious performance of Natasha Jane Julian
Interpretation of Pop music has been redefined in a brilliant way with the latest track of California pop singer Natasha Jane Julian who has set Soundcloud on fire
Beverly Hills, Jun 19, 2019 (Issuewire.com) - Pop music as a genre has always led the list of directory of Western music culture but nowadays the most popular audio sharing podium Soundcloud is bestowing with a round of enthusiasms by the latest soundtrack ‘Bathin’ In Your Garbage’ by the blossoming California pop singer Natasha Jane Julian. Commencing with the aspect of Soul music genre, handclapping, this track will usher you into a realm of complete awe. Its melodious timbre will definitely take your flight off to a serene ambiance. A sense of tranquility will engulf your mind and you will wish to escape in a realm of solitude. This Californian artist has adorned this latest soundtrack with utmost aesthetic beauty which sounds like a spontaneous flow of a calm and quiet stream.
Despite being a tranquil sounded track it’s immensely engrossing. This magical rendition is not only brilliant in its tune, beats, but it also spreads spell through its intense lyric. The smooth, stylish and magnificent tonal quality of Natasha perfectly blends in with tapings, beats, and rhythms of the track. It deals with very honest and authentic storytelling which leaves an everlasting impact on the listeners. This is the perfect package which can gear you up for your better times. Natasha with her sultry tune reveals the futilities of humanity in a moody yet inspirational manner.
This young artist grew up in Southern California with an inherent passion for music. She initiated her Pop songwriting career in 2015 and she released her debut in the year 2016. She is an artist with her poignant passion for melodic and moody Pop vibes and spreading emotions with her soulful lyrics. She released her sophomore EP Happily Ever After with wonderful reviews. Natasha amalgamated the spices of Rock, Soul, and Trip-hop wonderfully in her tracks. Check out her profiles and follow her on Facebook, Instagram, YouTube and Twitter accounts.
Don't forget to visit this link to hear Natasha Jane Julian's all songs:
https://soundcloud.com/natashajanejulian
Media Contact | {
"pile_set_name": "OpenWebText2"
} |
Dopamine and migraine: a review of pharmacological, biochemical, neurophysiological, and therapeutic data.
The dopamine theory of migraine pathogenesis, first proposed by F. Sicuteri in 1977, has attracted renewed interest after an increased frequency of the dopamine D2 receptor (DRD2) gene allele NcoI C was found in patients with migraine with aura. Therefore we reviewed the relevant literature. The most compelling argument favoring an interictal hypersensitivity of dopamine receptors in migraineurs stems from pharmacologic studies of the gastric and autonomic effects of dopaminergic agents such as apomorphine, but none of these studies was blinded and placebo-controlled. Various DRD2 antagonists abort migraine attacks after parenteral administration, while there is circumstantial evidence that dopamine agonists may be useful for prophylaxis. Most drugs used in these trials, however, lack selectivity for dopamine receptors. Both in pharmacological and therapeutic studies most patients had migraine without aura. We conclude that data suggesting a primary role for the dopaminergic system in migraine pathogenesis are unconvincing. Based on well established interactions between central amines, a reduced release of serotonin between attacks could lower dopamine release which would lead to receptor hypersensitivity. | {
"pile_set_name": "PubMed Abstracts"
} |
Case Report: Double Oberlin Nerve Transfer to Restore Elbow Flexion Following C5-C6 Avulsion Injury.
The use of nerve transfers to restore nerve function following traumatic avulsion injuries has been described, though there is still a paucity in the literature documenting technique and long-term outcomes for these procedures. The double Oberlin nerve transfer involves transferring fascicles from the median and ulnar nerves to the musculocutaneous nerve to restore elbow flexion in patients with a C5-C6 avulsion injury. The purpose of this case report is to present our indications and technique for a double Oberlin transfer in addition to exhibiting video footage at follow-up time points documenting the incremental improvement in elbow flexion following the injury. The patient is a 25-yr old, left-hand dominant male who presented 5 mo following a motor vehicle accident. He had 0/5 biceps muscle strength on the left with a computed tomography myelogram that demonstrated pseudomeningoceles from C2-C3 to C7-T1 with root avulsions of C5 and C6. He was subsequently indicated for a double Oberlin nerve transfer to restore elbow flexion. In this case report, we present our technique and outcomes for a double Oberlin transfer with restoration of elbow flexion at 1-yr follow-up for a patient with traumatic brachial plexus injury. We believe that the double Oberlin transfer serves as a safe and effective method to restore elbow flexion in this patient population. | {
"pile_set_name": "PubMed Abstracts"
} |
Image copyright AP Image caption The price of US oil has fallen as a result of increased production due to fracking, boosting the US economy
The US oil price fell below the symbolic threshold of $50 a barrel for the first time since April 2009, before finishing the day at $50.05.
The price of Brent crude also fell on Monday, dipping 6% to $53 a barrel.
The price of both Brent crude and US oil, known as West Texas Intermediate crude, have now lost more than half of their value since mid-2014.
Investors are worried that combination of a global supply glut and weak demand could cause prices to tumble further.
US oil production has soared recently, as fracking - or the process of extracting oil from shale rock by injecting fluids into the ground - has revolutionised oil production in the country, transforming US states such as North Dakota and Pennsylvania in the process.
However, the increase in production has come just as economies across the world - from Europe to China - have slowed their once voracious demand for oil.
This, combined with Opec's decision to continue extracting oil at its current pace, has left many investors worried.
That has in turn led shares of many of the world's leading energy firms, from BP to Exxon Mobil, to decline sharply over the past few months. | {
"pile_set_name": "OpenWebText2"
} |
Our Mission
We truly believe that much of who we are revolves around the home. Of course it's a great investment, but beyond that, it is the foundation of what we value most, personal relationships. With such a high importance put on a home, we strive to not only make home ownership a reality, but to do so with as little stress and disruption to your lives as possible. We believe in the importance of continuous communication and our clients being educated about the entire real estate process. It allows for decisions to be made more comfortably and quickly, and reduces stress and frustration that can occur when buying or selling a home. We pride ourselves in being honest, proactive and continually working toward a win-win solution for all those involved. We are here for you, from beginning to end, because there's no place like home.
Mobile Search?
There is a mobile property search version available. Would you like to redirect?
(Not all content is available on the mobile site).
1
2
Becky Lund & Team
REALTOR®
RE/MAX Gold
5252 Sunrise Blvd, Ste 1
Fair Oaks, CA 95628
916-531-7124
3
Your Fair Oaks and Surrounding Communities Specialists
We love this area we call home. So much, that it drives us everyday to work hard for those looking for their new home or selling a home here. These are our neighbors. We'd be thrilled to have the opportunity to do the same for you. Please contact us for anything real estate you need! | {
"pile_set_name": "Pile-CC"
} |
Q:
finite flat commutative group schemes arising from Abelian varieties
How are the finite flat group schemes $\mathcal{A}[\ell^n]$ arising from an Abelian scheme $\mathcal{A}/S$ singled out among other finite flat commutative group schemes of exponent $\ell^n$?
A:
Is the abelian scheme you consider a fixed one?
If the base is of characteristic $p$, and $l = p$ then the Lie algebra of $A[l]$ is isomorphic to $Lie(A)$, so you get a dimension condition.
For example, $\alpha_p \oplus \alpha_p$ cannot be embedded in an elliptic curve.
There are also more general condition your group scheme $G$ should satisfy.
Assume that $S$ is the spectrum of an Artinian algebra and that
$G$ is $p$-torsion with a trivial bi-nilpotent part.
We have an exact sequence:
$$ 0 \to G^{mult} \to G \to G^{et} \to 0$$
then the orders of $G^{mult}$ and $G^{et}$ must be equal if $G$ is the $p$-torsion of an abelian scheme.
On the other hand, in section (15.4) of the book "Commutative group schemes" of F. Oort, there is the following result:
Every finite flat commutative group scheme is a subgroup scheme of some abelian variety $A$.
A:
I'm reminded of two papers by Maja Volkov, an erstwhile student of Jean-Marc Fontaine. They are
MR2148801 (2006a:14027)
Volkov, Maja
A class of $p$-adic Galois representations arising from abelian varieties over $\Bbb Q_p$.
Math. Ann. 331 (2005), no. 4, 889–923.
MR1837096 (2002d:11067)
Volkov, Maja
Les représentations $l$-adiques associées aux courbes elliptiques sur ${\Bbb Q}_p$.
J. Reine Angew. Math. 535 (2001), 65–101.
| {
"pile_set_name": "StackExchange"
} |
1. Field of the Invention
This invention relates to a cooling system for a V-type engine transversely mounted on a motor vehicle.
2. Description of the Prior Art
In a motor vehicle with a transversely mounted V-type engine, a radiator is disposed at the front of the engine as viewed in the longitudinal direction of the vehicle, with the radiation surface thereof arranged nearly perpendicularly in relation to the longitudinal direction of the vehicle, such that outside air will hit the radiation surface nearly perpendicularly during travel. That is, the radiator is installed on the side of the engine with the radiation surface thereof being nearly in parallel with the axis of an engine crankshaft. Therefore, there is a problem that various members of the cooling system, such as a water pump and a thermostat, are arranged in a space provided on the side of the engine, and accordingly it is impracticable to manufacture compact engines. Furthermore there also is a problem that because an exhaust system and other systems are disposed on the side of the engine, the cooling system interfered with such systems, resulting in a difficult layout of the cooling system on the side of the engine. To cope with these disadvantages, there has been proposed a cooling system for the V-type engine wherein the water pump and the thermostat are mounted at the end section of the engine (hereinafter referred to simply as "the engine end section") as viewed in the axial direction of the crankshaft.
In the conventional cooling system for the transversely mounted V-type engine, as shown for example in FIG. 1, a water pump 41 is mounted at the front end of an engine 40; a thermostat 42 is disposed at the rear end; and a suction line 44 communicating with a radiator 43 and the suction port of the water pump 41 is arranged through the thermostat 42 and a V-like space between the banks 45 and 46 of cylinders of the engine. The coolant is supplied to the engine 40 from the water pump 41 through coolant supply lines 47 via coolant inlet ports 48. This coolant is returned to the radiator 43 through a coolant return line 51 via coolant outlet ports 49 provided at the rear end of the engine 40. Furthermore, there is provided a bypass line 52 for returning the coolant to the suction line 44 by bypassing it through the radiator 43 when the coolant temperature is low. A part of the coolant is supplied also to a driver's seat heater 55 through a coolant line 54 for the heater.
Furthermore, in a conventional cooling system as shown in FIG. 1, since the water pump 41 and the thermostat 42 are not mounted on the side of the engine 40, a much larger space is provided at the side of the engine 40, thereby preventing interference between these devices and the exhaust system. However, because of the presence of the coolant return line 51 and the bypass line 52 on the side of the engine 40, it is still impossible to make the engine substantially compact.
Furthermore, with a recent increase in the number of drivers who are fond of low-hood vehicles, the production of low-hood vehicles has been demanded. In conventional cooling systems, the radiator to be mounted in a position where the height of the hood should be held to a minimum extends largely in a vertical direction in order to improve the cooling efficiency, with the result that the hood can not be substantially lowered.
Besides the above-described conventional art, a technique is known in the prior art (Laid-Open Japanese Utility Model No. 61-128335) for providing the coolant inlet port in one end of the engine body for leading the coolant into the engine, disposing the coolant outlet port in the other end of the engine body, and positioning a communication line connecting the outlet port to the radiator in a space between the radiator and the engine body. According to this technique, however, the space required for mounting the cooling system increases in the direction the width of the engine. | {
"pile_set_name": "USPTO Backgrounds"
} |
Field
Embodiments of the inventive concept relate to a semiconductor device, a method of fabricating the same and an electronic apparatus and system.
Description of Related Art
In order to shrink a size of a semiconductor device and improve the performance, various methods by which a plurality of memory cells are vertically formed on a substrate, have been studied. | {
"pile_set_name": "USPTO Backgrounds"
} |
Aluminum induces neurite elongation and sprouting in cultured hippocampal neurons.
It has been reported that the aluminum content in the human brain increases with age, and it is particularly high in those with Alzheimer's disease. In this study, we found that a low aluminum concentration (100 mumol/L) in the culture media of opossum hippocampal neurons can induce extensive neurite outgrowth (ie, elongation and branching of neurites) and sprouting (ie, outgrowth of filiform processes from neurite varicosities) within 48 hours. Such changes in neurite morphology were remarkably similar to those described in the aged or Alzheimer's disease brain. Neurites that responded to aluminum varied greatly in length, thickness, and branching pattern. Many neurites appeared to have no clear directional growth pattern because they frequently changed their course and formed a meshwork of neurites with others originating from the same cell body. Sprouting neurites varied in length, thickness, and branching pattern, but they always originated from a globular enlargement of neurites along the neurite shaft or at the terminal end. Such growth pattern and extensive sprouting of neurites did not fit the growth pattern displayed by the control neurons. Our findings suggest that aluminum may be involved in the neuronal remodeling characteristic of aging and Alzheimer's disease. | {
"pile_set_name": "PubMed Abstracts"
} |
One of the comments read: "How does one propose to produce the various species/sub-species simply from 'some sort of cat', after the fact?" This was in response to how Noah brought a 'kind' of cat into the ark and now we have pumas, jaguars, cheetahs, leopards, etc. I was curious myself and another person suggested asking this as a new question.
Basically, the argument would go along the lines of..."How does a single breeding pair turn into both Chihuahuas and Great Danes in under 5000 years? If Noah’s ark had only 1 pair of each kind, the speed of evolution required to get some of the variation that exists needs to be much faster than reality." (This was taken from http://anadder.com/noahs-ark-and-evolution which has a few other points for this argument)
Are you at all interested in answers from denominations that allow for somewhat less literal readings of the OT? Or at least less literal readings of the genealogy? I.e., it's possible that the OT presents a very "condensed" genealogy? Or that the magnitude of the flood is hyperbolized? Or are you only interested in "challenging" OT "super-literalists"?
–
svidgenJan 16 '13 at 20:58
Yes, I would be interested in those as well.
–
ChandrewJan 16 '13 at 21:02
1
One thing you have to do with Noah's ark when you come up with arguments against it(and this applies to almost anything) is actually read the story. Many arguments against it don't even represt what the account said, such as "It couldn't have rained enough in 40 days to cover the earth" when in reality the story doesn't actually claim the rain caused the flood, it says the fountains of the deep broke open AND it rained for 40 days. Noah didn't take 2 of every kind, there was alot of things he didn't have to take. See answersingenesis.org/get-answers#/topic/noahs-ark for lots of info
–
2tim424Jan 16 '13 at 23:23
The literalist response to this is: The problem of genetic diversity from the various kinds of animals on Noah's ark is much less daunting than the question "If we all evolved from some single-celled organism that spontaneously developed from some 'primordial soup', where did we get the genetic material for all forms of life on earth today?" Clearly that initial organism must have contained all the genetic diversity if this line of thinking is true. Other than the absence of the magic ingredient of millions of years, the problem is much greater for the pure evolutionist.
–
David Stratton♦Jan 17 '13 at 0:11
@David just for info, it has been pointed out that I may have (when reading it, and via a previous comment - now deleted) mentally put quote marks in different places to what you had in mind. Sorry 'bout that.
–
Marc Gravell♦Jan 17 '13 at 22:56
3 Answers
3
Scientifically speaking, evolution is not required for variations within a species. The only requirement is that all of the genetic information seen in the species today was present in the first generation. From then on, species experience the isolation of genes through geographic and other factors.
The breeding of new species of dogs does not produce new genetic information--it merely isolates particular genetic information that is already present in the species. This is a key point--selective breeding does not result in any new information, but actually the loss of information, as only the chosen genes are kept.
In cattle, selective breeding often results in weaknesses within a certain breed. Hereford cattle are quite susceptible to Pink Eye, but if you have Hereford Angus cross, the weakness in the Hereford Breed, that resulted in a loss of genetic resistance to Pink Eye, is merged back with the lost genetic information that is still present in the Angus breed, yielding a herd with higher genetic resilience.
Different breeds of dogs can still interbreed with each other, as can different breeds of cattle, so there is no new species and no evolution. Evolution is the creation of new species--variation within a kind is not evolution.
Dogs have, indeed, shown a higher variability than other species, but they are all still dogs. Another key point, though, is that this doesn't happen in nature, but with a great deal of intervention and unnatural forces brought to bear upon the process (by humans).
The word used in Genesis is probably best translated "kind". Noah didn't bring Chihuahuas, Poodles, Great Danes, Labrador Retrievers, Beagles, and every other kind of dog. He brought two mutts, which is basically what you get if you take all the breeds and interbreed them together to undo the genetic isolation.
Furthermore, Noah didn't bring a Chinese, a Korean, a Vietnamese, a Russian, an Arab, a European, a Jew, an African, and a Hawaiian. There were only eight people, but those eight people contained all the genetic information necessary to produce the variations we see today that have been caused by genetic isolation through geographic and other factors.
Also keep in mind that this was a miraculous event, where the animals in questions were not rounded up at random, but rather presented themselves to Noah... therefore the God has the easy opportunity to make sure that the necessary genetic material was present in each of the specimens.
–
Joel CoehoornJan 16 '13 at 18:39
2
These comments aren't really the optimal way to have an extended discussion. I think that if the answer were phrased as "this is what people believe" and not "this is the Truth" then it would not be such a debate magnet. It is OK, and even helpful, to own up to the fact that this area is highly contested and that not everyone believes the view described.
–
James TJan 17 '13 at 0:11
2
<Unconstructive comments removed.> I like James T's suggestion. And yes, please no discussions in comments.
–
El'endia Starman♦Jan 17 '13 at 3:52
All of these processes do in fact have the potential of generating new genetic information. Different factors will increase or decrease the rate of variation, but the fact is that the successive combination, recombination, duplication, and mutation of genes will produce new genes. Throw in horizontal transfers, especially inter-species transfers, and you've got quite a lot going on. Now add natural (or artificial, in the case of animal husbandry) selection and voila, evolution.
Most breeds of dogs are at most a few hundred years old, having been
artificially selected for particular morphologies and behaviors by
people for specific functional roles. Through this selective breeding,
the dog has developed into hundreds of varied breeds, and shows more
behavioral and morphological variation than any other land mammal.
Some denominations do not insist that believers take on a literal interpretation of all OT events. In particular, many events in Genesis may be read by Catholics either as allegories, "condensed" stories, and/or hyperbole.
So, taking the story either as hyperbole and/or allegory, the question is rendered moot. By this interpretation, we don't need to explain modern genetic variation, because the story didn't happen precisely as documented. The events that the story were based on have been documented in such a manner as to highlight the theological value. By this reading, there certainly may have been a very massive flood, which Noah was instructed to build an big boat for, onto which he was also instructed to stow a lot of local animals. But, it may also have been a small flood, or some other "flood-like" event that resulted in a corresponding spiritual, symbolic covenant with God.
Taking the story as a "condensed" story, by which I mean the details of and surrounding the story actually took place over a longer period of time to more people, we allow ourselves the interpretation that Noah and his family represent a much larger group of people, who built many boats (or other "anti-flood" mechanisms) to survive, with livestock, through a predicted or divinely revealed flood, series of floods, etc. And it's possible that far more time has passed than is represented by the genealogy -- it's possible that each "person" in the tree is actually a metaphorical or poetic means of referring to an era.
But even in this case, we also don't necessarily rule out the possibility that it's a "literalization" of primarily spiritual events. The story could be allegorical, condensed, and hyperbolic. It may have happened over a long period of time to many people in a mostly spiritual manner.
Finally, the Catholic Church also doesn't insist that we don't take it literally! And as such, if God flooded the whole Earth, saving only Noah, his family, and whatever animals they brought on board, we must also assume that God was capable of supernaturally repopulating the earth. I.e., after the flood, God temporarily accelerated reproduction and genetic mutation to provide us with the variety we have today.
In brief, from a Catholic perspective, if we want a purely scientific explanation for the modern day genetic rainbow, we need to query the scientific community and ask "is this feasible?" However, we're not restricted from coming up with creative possibilities on our own, provided they don't trash the theological value of the scripture. As far as the Church is concerned, the theological value of the story is of prime importance.
Any interpretation that doesn't destroy the known theological significance is fair game. | {
"pile_set_name": "Pile-CC"
} |
BOSTON -- If the Red Sox know the extent of David Price's latest elbow injury, team officials aren't saying. But they do expect the left-hander to pitch again this season.
Price was scratched from his scheduled start Friday night at Fenway Park and placed on the 10-day disabled list. He began experiencing discomfort in his left elbow in the days after his start last Saturday night in Anaheim, according to manager John Farrell. When the symptoms didn't subside, Price went for an MRI on Thursday that revealed inflammation.
Citing HIPAA laws, Red Sox president of baseball operations Dave Dombrowski said he couldn't divulge specifics of the injury and declined to provide a timetable for Price's return, although he said it remains unlikely the team will acquire a starting pitcher before Monday's trade deadline. Farrell, meanwhile, downplayed the seriousness of the situation, at least in comparison to the strained flexor mass in spring training that caused Price to miss the season's first two months.
"I don't think this is anything compared to what he went through in spring training in terms of severity," said Farrell, who added that Price may be ready to resume playing catch by Monday or Tuesday. "Much less. That's by his own admission."
The move to the DL is retroactive to Tuesday, which means the soonest Price could pitch is Aug. 4 against the Chicago White Sox at Fenway Park. But considering he dealt with an elbow injury only a few months ago, the Red Sox figure to be cautious about bringing him back too soon.
Dombrowski has said the AL East-leading Red Sox aren't in the market for starting pitching at the trade deadline, unlike many other playoff contenders. The Sox also don't have the prospects to jump into the bidding for Yu Darvish, Sonny Gray or a top-flight starter after trades for closer Craig Kimbrel and starters Drew Pomeranz and Chris Sale depleted their farm system.
But it's fair to wonder whether the Red Sox will be compelled to pursue depth starters such as the St. Louis Cardinals' Lance Lynn or the Toronto Blue Jays' Francisco Liriano, both of whom are eligible for free agency at season's end and likely won't fetch a top prospect.
"We're not going to go out and make a big trade for a starting pitcher," Dombrowski said. "We're still hopeful that David will be back. We have four really proven major league starters that are quality -- Sale and [Rick] Porcello and [Eduardo] Rodriguez and Pomeranz."
David Price is DL-bound due to the return of a left elbow problem that cost him nearly two months at the start of the season. Mike Stobe/Getty Images
Porcello started in Price's place in Friday's 4-2 loss to the Kansas City Royals. Dombrowski said veteran right-hander Doug Fister (0-5 with a 7.46 ERA since being claimed off waivers last month) will re-enter the rotation next week with Price sidelined.
Price gave up six runs (five earned) in five innings last Saturday night against the Angels but had posted a 2.66 ERA and 43 strikeouts in 44 innings over his seven previous starts. His average fastball velocity has topped 94 mph, according to Fangraphs, which is greater than last season before he began having elbow trouble.
Price is 5-3 with a 3.82 ERA in 11 starts since returning May 29 from a spring training injury that he recently termed "a torn elbow." He underwent an MRI in early March and even flew to the NFL combine in Indianapolis to get second opinions from orthopedic surgeons Dr. James Andrews and Dr. Neal ElAttrache.
Since his return to the mound, Price has sparred with the media, ceasing to do one-on-one interviews, limiting his comments to days he pitches and even lashing out at Hall of Fame pitcher and current television analyst Dennis Eckersley on the team plane June 29.
In the highly publicized incident, Price mocked and cursed at Eckersley multiple times, according to a report in Sunday's Boston Globe that provided previously unreported details of the altercation. Price was annoyed by a comment made by Eckersley during the NESN broadcast of Boston's game against Minnesota earlier that night. When NESN showed Rodriguez's subpar pitching statistics from a rehab outing with Double-A Portland, Eckersley said, "Yuck."
Neither Price nor anyone in uniform has apologized to Eckersley, although Dombrowski said he, owner John Henry, chairman Tom Werner and team president Sam Kennedy have issued individual apologies. Asked about the incident after a July 4 start in Texas, Price said, "Standing up for my teammates. Whatever crap I catch for that, I'm fine with it."
Dombrowski put to rest conspiracy theories that the Red Sox put Price on the DL to avoid having him make his first start at Fenway since the Globe published its report.
"You can't put a guy on the disabled list unless you get medical clearance from the commissioner's office," Dombrowski said. "The commissioner's office checks, gets the doctor's report. You have to send a doctor's certification and all that."
Said Farrell: "If he was physically healthy, he'd be pitching. He's not."
Lefty reliever Robby Scott was recalled from Triple-A Pawtucket to fill Price's roster spot. Scott has a 3.75 ERA in 38 relief appearances this season.
Also, utility infielder Eduardo Nunez joined the team and made his Red Sox debut Friday night as the designated hitter. Nunez, acquired late Tuesday night from the San Francisco Giants for two minor league pitchers, will play regularly at multiple positions, according to Farrell.
To open a roster spot for Nunez, infielder Deven Marrero was optioned to Triple-A. | {
"pile_set_name": "OpenWebText2"
} |
Q:
How Does the repaint function work?
I wonder that how the function below is working. With the first function call,
it paints only background over the old square location, but the with second function call it paints red square.
if(CURR_X != x || CURR_Y != y) {
//The square is moving, repaint backgorund
//over the old square location
repaint(CURR_X,CURR_Y,CURR_W+OFFSET,CURR_H+OFFSET);
//Update coordinates
square.setX(x);
square.setY(y);
repaint(square.getX(),square.getY(),
square.getWidth()+OFFSET,square.getHeight()+OFFSET);
}
A:
The repaint() method passes the paint request to the RepaintManager. When multiple requests are received is a short period of time the RepaintManager will consolidate the two individual requests into a single request.
So if you have something like:
repaint(5, 5, 20, 20);
...
repaint( 30, 30, 20, 20);
The RepaintManager ends up consolidating them into a single repaint of (5, 5, 45, 45). So this larger area will include the area of both individual requests. So then the paintComponent() method paints the background of that area and then paints the square.
| {
"pile_set_name": "StackExchange"
} |
The centralizer is the largest subgroupHH of GG containing SS such that SS is in the center of HH. The centralizer of a subset is clearly a subgroup of its normalizer, as fixing the set gH=Hgg H=H g is a weaker requirement than gh=hgg h=h g for all h∈Hh\in H. | {
"pile_set_name": "Pile-CC"
} |
/******************************************************************************
* SunnyUI 开源控件库、工具类库、扩展类库、多页面开发框架。
* CopyRight (C) 2012-2020 ShenYongHua(沈永华).
* QQ群:56829229 QQ:17612584 EMail:[email protected]
*
* Blog: https://www.cnblogs.com/yhuse
* Gitee: https://gitee.com/yhuse/SunnyUI
* GitHub: https://github.com/yhuse/SunnyUI
*
* SunnyUI.dll can be used for free under the GPL-3.0 license.
* If you use this code, please keep this note.
* 如果您使用此代码,请保留此说明。
******************************************************************************
* 文件名称: UIBarChartOption.cs
* 文件说明: 柱状图配置类
* 当前版本: V2.2
* 创建日期: 2020-06-06
*
* 2020-06-06: V2.2.5 增加文件说明
******************************************************************************/
using System;
using System.Collections.Generic;
using System.Drawing;
namespace Sunny.UI
{
public class UIBarOption : UIOption, IDisposable
{
public UICategoryAxis XAxis { get; set; } = new UICategoryAxis();
public UIBarToolTip ToolTip { get; set; }
public UIValueAxis YAxis { get; set; } = new UIValueAxis();
public List<UIBarSeries> Series = new List<UIBarSeries>();
public UIChartGrid Grid = new UIChartGrid();
public readonly List<UIScaleLine> XAxisScaleLines = new List<UIScaleLine>();
public readonly List<UIScaleLine> YAxisScaleLines = new List<UIScaleLine>();
public void AddSeries(UIBarSeries series)
{
Series.Add(series);
}
public void Dispose()
{
foreach (var series in Series)
{
series?.Dispose();
}
Series.Clear();
}
public int SeriesCount => Series.Count;
}
public class UIBarToolTip
{
public string Formatter { get; set; } = "{{b}} : {{c}}";
public string ValueFormat { get; set; } = "F0";
public UIAxisPointer AxisPointer = new UIAxisPointer();
}
public class UIAxisPointer
{
public UIAxisPointerType Type { get; set; } = UIAxisPointerType.Line;
}
public enum UIAxisPointerType
{
Line, Shadow
}
public class UIAxis
{
public string Name { get; set; }
public UIAxisType Type { get; set; }
/// <summary>
/// 坐标轴的分割段数,需要注意的是这个分割段数只是个预估值
/// 最后实际显示的段数会在这个基础上根据分割后坐标轴刻度显示的易读程度作调整。
/// 在类目轴中无效。
/// </summary>
public int SplitNumber { get; set; } = 5;
/// <summary>
/// 是否是脱离 0 值比例。设置成 true 后坐标刻度不会强制包含零刻度。在双数值轴的散点图中比较有用。
/// </summary>
public bool Scale { get; set; }
public UIAxisTick AxisTick = new UIAxisTick();
public UIAxisLabel AxisLabel = new UIAxisLabel();
public bool MaxAuto { get; set; } = true;
public bool MinAuto { get; set; } = true;
public double Max { get; set; } = 100;
public double Min { get; set; } = 0;
}
public class UICategoryAxis : UIAxis
{
public UICategoryAxis()
{
Type = UIAxisType.Category;
}
public List<string> Data = new List<string>();
public void Clear()
{
Data.Clear();
}
}
public class UIAxisLabel
{
/// <summary>
/// 是否显示刻度标签。
/// </summary>
public bool Show { get; set; } = true;
/// <summary>
/// 坐标轴刻度的显示间隔,在类目轴中有效。默认同 axisLabel.interval 一样。
/// 默认会采用标签不重叠的策略间隔显示标签。
/// 可以设置成 0 强制显示所有标签。
/// 如果设置为 1,表示『隔一个标签显示一个标签』,如果值为 2,表示隔两个标签显示一个标签,以此类推。
/// </summary>
public int Interval { get; set; } = 0;
public delegate string DoFormatter(double value, int index);
public event DoFormatter Formatter;
public string GetLabel(double value, int index)
{
return Formatter != null ? Formatter?.Invoke(value, index) : value.ToString("F" + DecimalCount);
}
/// <summary>
/// 小数位个数,Formatter不为空时以Formatter为准
/// </summary>
public int DecimalCount { get; set; } = 0;
}
public class UIAxisTick
{
/// <summary>
/// 类目轴中在为 true 的时候有效,可以保证刻度线和标签对齐。
/// </summary>
public bool AlignWithLabel { get; set; }
/// <summary>
/// 是否显示坐标轴刻度。
/// </summary>
public bool Show { get; set; } = true;
/// <summary>
/// 坐标轴刻度的长度。
/// </summary>
public int Length { get; set; } = 5;
/// <summary>
/// 坐标轴刻度的显示间隔,在类目轴中有效。默认同 axisLabel.interval 一样。
/// 默认会采用标签不重叠的策略间隔显示标签。
/// 可以设置成 0 强制显示所有标签。
/// 如果设置为 1,表示『隔一个标签显示一个标签』,如果值为 2,表示隔两个标签显示一个标签,以此类推。
/// </summary>
public int Interval { get; set; } = 0;
}
public class UIValueAxis : UIAxis
{
public UIValueAxis()
{
Type = UIAxisType.Value;
}
}
public class UIBarSeries : IDisposable
{
public string Name { get; set; }
public int MaxWidth { get; set; } = int.MaxValue;
public UISeriesType Type => UISeriesType.Bar;
public readonly List<double> Data = new List<double>();
public readonly List<Color> Colors = new List<Color>();
public void AddData(double value)
{
Data.Add(value);
if (DataColorChange != null)
{
Colors.Add(DataColorChange.Invoke(value));
}
}
public void AddData(double value, Color color)
{
Data.Add(value);
Colors.Add(color);
}
public void Dispose()
{
Data.Clear();
Colors.Clear();
}
public delegate Color OnDataColorChangeEventHandler(double data);
public event OnDataColorChangeEventHandler DataColorChange;
public bool HaveCustomColor(int index)
{
return Colors.Count > 0 && index >= 0 && index < Colors.Count;
}
public void Clear()
{
Data.Clear();
Colors.Clear();
}
}
} | {
"pile_set_name": "Github"
} |
About The Frame®
Airs Weekdays at 3:30 p.m.
A daily chronicle of creativity in film, TV, music, arts and entertainment produced by Southern California Public Radio. Host John Horn leads the conversation, accompanied by the nation's most plugged-in cultural journalists.
Over the past two years, the Academy of Motion Picture Arts and Sciences has sent invitations to approximately 1,400 new members, hoping to diversify the mostly male and overwhelmingly white organization. With the 2018 Oscar nominations, we finally saw the effect of these new additions.
Younger voters helped push indie films such as "Get Out" and "Ladybird" while seasoned Academy members favored stalwarts like "Dunkirk" and "Darkest Hour."
This year's nominations also held many triumphs for women and people of color. Jordan Peele and Greta Gerwig both garnered directing nominations while Rachel Morrison became the first woman nominated as a cinematographer, for her work on "Mudbound."
The Frame's host John Horn caught up with Vulture's Kyle Buchanan and Variety's Amy Nicholson to talk about this year's snubs, triumphs and surprises.
WHAT WERE THIS YEAR'S NOTABLE SNUBS?
Amy: I feel like "The Florida Project" is the big hole this year. I was really hoping that film would've gotten a ton more nominations across the board: cinematography, direction — everything. I think that Sean Baker is one of the best filmmakers working right now and the absence of it in every category, except for supporting actor... I feel like in 10 years we're going to look back on this as a big mistake.
Kyle: Well, I loved "Battle of the Sexes" but it just seemed to come-and-go when it was released early in September. As for "Wonder Woman," that was genuinely one of my favorite movies of the year. Why didn't it get nominated for best picture? I think because its [technical achievements] were not superlative enough. If you're going to make it into the best picture lineup and you are a tentpole action blockbuster, you need to be a lock in visual effects, you need to be a lock in production design and costumes — like "Mad Max: Fury Road" did. And "Wonder Woman" just didn't have those advantages. If you couldn't get nominated anywhere else, are you going to get nominated for best picture? It's awfully rare.
WHY NO JAMES FRANCO NOMINATION?
Kyle: I think it's pretty obvious. The accusations of sexual misconduct surfaced with just a few days left to vote. There's no doubt in my mind that they had an effect on his candidacy. The best actor field was very thin this year, for Denzel [Washington] to get in says a lot of things beyond the fact that Franco took a hit. It says that they still love Denzel, they'll want to nominate him for anything. It says that so many people voted at the last minute. And it says that even though "The Post" did make it into picture and actress [categories], they didn't [choose] Tom Hanks for best actor.
WHAT ARE THE LESS-NOTABLE SNUBS?
Amy: I wish Bria Vinaite had made it in as the mom from "The Florida Project." This is an unknown actress, just discovered off of Instagram and had an amazing screen presence. I think she's doing a lot more acting than anybody realizes. I look forward to seeing her in the future.
WHAT DO YOU MAKE OF THE SCREENPLAY CATEGORIES?
Amy: I'm glad to see "Disaster Artist" in here. The book is fantastic and I thought they did such a good job figuring out how to stream the timelines together and make this a story about creativity and getting the people to come together to get something done even though it's a little bit ridiculous. "Molly's Game" is in there, and I thought that film was a lot stronger than anyone gave it credit for. I'm a little sad [Jessica] Chastain didn't make it [in the actress category].
WHAT WERE YOU MOST SURPRISED BY?
Kyle: The most notable of the screenplay nominations was in the adapted [category], which, again, wasn't the strongest field we've ever had. But "Logan" made it in. That's Hugh Jackman's final "Wolverine" film. It's very rare that a comic book movie gets nominated in screenplay. The only one that ever has, as far as I know, is "The Incredibles" in original screenplay. For an actual live-action Marvel film to get nominated in adapted screenplay, that's another one of the walls that's fallen today.
WHAT MADE YOU HAPPY?
Kyle: I think it's a really good crop of nominees. You know we always say, if the Oscars represent the industry, well then what does it mean? And I think there are encouraging signs this year, in part, because the Academy has been taking steps to broaden itself, diversify its ranks. And I think we've seen a lot of those picks reflected this year, not only in the fact that there's good taste reflected in the nominations, but in the fact that we have a lot of new records to tout. Rachel Morrison getting nominated for cinematography for "Mudbound" — that's the first time in the 90-year history of the Academy Awards a woman has gotten that. And it's no small thing either that "Mudbound," while it didn't make it into [best] picture and director [categories], did make it into categories that Netflix has never penetrated before, like supporting actress for Mary J. Blige and best song.
Amy: That nomination for Mary J. Blige makes me incredibly happy. She is so great in that film. She channels all of these emotions without saying anything. I feel like it's this almost psychic performance where you’re reading her mind the entire time. | {
"pile_set_name": "Pile-CC"
} |
Thousands of new jobs will be created and available for jobseekers in Dubai this year, reckon Dubai-based recruitment consultants. Specifically, firms in IT, telecom, aviation, healthcare and education will continue to hire in coming months as the UAE’s efforts to diversify the economy bear fruit.
“We can expect more recruitment activity in 2017,” says Sanjay Modi, managing director, Monster.com, APAC & Middle East, an employment website. He maintains that there have been substantial investments in various sectors over the past couple of years including IT, healthcare, education and infrastructure in efforts to diversify the UAE economy, leading to new opportunities for UAE jobseekers.
“We noted a 10 per cent increase in IT sector hiring in 2016. Education and healthcare have seen steady growth in the past year, and are expected to grow at a considerable pace this year,” adds Abbas Ali, vice-president, TASC Outsourcing. He foresees a growing demand for sales personnel, engineers and contact-centre professionals in telecom, a sector that recorded five per cent growth in hiring in 2016.
“The Mena region is very diverse when it comes to the factors that affect the overall quality of living in each city. Our recent studies [show] that the UAE’s job market continues to thrive,” says Suhail Masri, vice-president of Employer Solutions at Bayt.com, an online recruitment specialist.
“Looking ahead, 2017 has already shown to be busy in the first few days of the year. Companies, both local and foreign, are making sounds about growing teams and adding to their existing skillset, says Kate Watson, managing director, Blueprint, a recruitment agency.
Where are the jobs?
Even as the latest Monster Employment Index (MEI) shows a year-on-year decline in terms of the availability of new online job opportunities, the fact remains that the UAE is ahead of other GCC countries in regards to economic diversification, and there remain key non-oil sectors that are leading the jobs growth.
Among the ones to witness a growth are occupations related to purchase, logistics, and supply chain, which registered a year-on-year growth of 19 per cent in the November Monster Index. While all sectors registered a year-on-year decline in online hiring in November, the education industry registered the least decline at -1 per cent, reflecting the government’s commitment to advancing education in the UAE.
“I believe that education will certainly see a rise in headcount as more than 500 educational projects at an estimated investment worth $50 billion are under various stages of development across the GCC to meet the growing demand for education,” says Ali of TASC.
“The communications sector has continued to grow and diversify in the past year. This trend is set to continue in 2017, with employers demanding more relevant skills and candidates realising that changing roles purely for a higher financial package may not be tolerated,” adds Blueprint’s Watson.
“With ecommerce and telecom sectors poised for growth in the region, hiring in these sectors is slated to increase too. As the region strategises to make the economy less oil dependent, verticals such as IT, telecom, aviation, healthcare and education are likely to see an increase in the headcount,” maintains Ali.
What will help you land a job
According to recent research, more than half of GCC workers surveyed are considering leaving their current employer in 2017 while 14 per cent of UAE employers claim they do not have the talent needed to achieve next year’s objectives. A separate study shows that over two-thirds of surveyed employers are looking to expand workforce in the coming 12 months.
“Competition will increase this year, with many talented people leaving their jobs to seek other opportunities and employers having clearly defined requirements of candidates. This means it is important for jobseekers to stand out as much as possible with updated skills and advanced presence in the market,” says Modi of Monster.com.
“Both Dubai and the UAE have ranked at the top when it comes to job availability, compensation, and career growth. Even in regards to factors such as labour rights, entrepreneurship support, and other socio-economic conditions, the UAE has secured a strong position in the region that is likely to carry over in the new year,” said Masri of Bayt.com.
In addition, the UAE is witnessing a growing trend in the recruitment of women in the workspace. There has been major focus by the government on empowering women in the workspace, which is clearly showing results in the recent years. “We anticipate that this trend will continue to see momentum in the coming months,” said Ali. – Samaa | {
"pile_set_name": "OpenWebText2"
} |
-- options of some commands
WITH, WITH ( .. ), (),
-- alter/create role
SUPERUSER, NOSUPERUSER, CREATEDB, NOCREATEDB, CREATEROLE, NOCREATEROLE, INHERIT, NOINHERIT,
LOGIN, NOLOGIN, REPLICATION, NOREPLICATION, BYPASSRLS, NOBYPASSRLS, CONNECTION LIMIT 100,
ENCRYPTED PASSWORD, UNENCRYPTED PASSWORD, VALID UNTIL '2020-01-01',
IN ROLE, IN GROUP, ROLE, ADMIN, USER, SYSID;
-- copy
FORMAT, OIDS, FREEZE, DELIMITER, NULL '..', HEADER, QUOTE, ESCAPE, FORCE_QUOTE,
FORCE_NOT_NULL, FORCE_NULL, ENCODING;
-- create aggregate
BASETYPE=, SFUNC=, STYPE=, SSPACE=, FINALFUNC=, FINALFUNC_EXTRA=,
FINALFUNC_MODIFY=, COMBINEFUNC=, SERIALFUNC=, DESERIALFUNC=,
INITCOND=, MSFUNC=, MINVFUNC=, MSTYPE=, MSSPACE=, MFINALFUNC=, MFINALFUNC_EXTRA=,
MFINALFUNC_MODIFY=, MINITCOND=, SORTOP=, PARALLEL=;
-- create collation
LOCALE=, LC_COLLATE=, LC_CTYPE=, PROVIDER=, VERSION=;
-- create dataase
OWNER=, TEMPLATE=, ENCODING=, LC_COLLATE=, LC_CTYPE=, TABLESPACE=, ALLOW_CONNECTIONS=,
CONNECTION LIMIT=, IS_TEMPLATE=;
-- create extension
SCHEMA, VERSION, FROM, CASCADE;
-- create operator
PROCEDURE=, LEFTARG=, RIGHTARG=, COMMUTATOR=, NEGATOR=, RESTRICT=, JOIN=, HASHES=, MERGES=
-- create text search configuration
PARSER=, COPY=;
-- create text search dictionary
TEMPLATE=;
-- create text search parser
START=, GETTOKEN=, END=, LEXTYPES=, HEADLINE=;
-- create text search template
INIT=, LEXIZE=;
-- create type
SUBTYPE=, SUBTYPE_OPCLASS=, COLLATION=, CANONICAL=, SUBTYPE_DIFF=,
INPUT=, OUTPUT=, RECEIVE=, SEND=, TYPMOD_IN=, TYPMOD_OUT=, ANALYZE=, INTERNALLENGTH=, PASSEDBYVALUE=,
ALIGNMENT=, STORAGE=, LIKE=, CATEGORY=, PREFERRED=, DEFAULT=, ELEMENT=, DELIMITER=, COLLATABLE=;
-- analyze/explain/vacuum
ANALYZE, VERBOSE, COSTS, BUFFERS, TIMING, SUMMARY, FORMAT TEXT, FORMAT XML, FORMAT JSON,
FORMAT YAML, FREEZE, FULL, DISABLE_PAGE_SKIPPING;
-- table like options
TABLE t1(LIKE t1 INCLUDING COMMENTS INCLUDING CONSTRAINTS EXCLUDING DEFAULTS INCLUDING IDENTITY INCLUDING INDEXES INCLUDING STATISTICS INCLUDING STORAGE EXCLUDING ALL);
| {
"pile_set_name": "Github"
} |
It’s no secret that Fieldwire gives construction firms the edge that they need to save time and streamline their days on-site. But today we want to focus on one branch of the industry - heavy civil construction. Handling roadwork, paving, excavation, and other infrastructure jobs can be pretty strenuous, and with so much riding on the success of their endeavors, any tool that can make time in the field easier is a welcome advantage. So here’s how Fieldwire can lend a hand to our heavy civil brothers and sisters and help save them time and money:
Remote Document Updating
Many heavy civil projects are in remote locales, often times with little to no internet access or cell service. Ordinarily, that lack of connectivity might be problematic, but that’s not the case with Fieldwire! Your plans, tasks, photos, and files will all remain accessible without an internet or data connection. Simply sync up the app in the morning on your tablet or phone, and at night when you’re back at the office or home, and all of the information that you logged that day will sync with the rest of your team (and their data will sync to you as well). It’s a great way to stay in touch with the latest progress.
Since many different projects can be going on at once, often miles, cities, or states away from the home office, you’ll need an easy way to get the latest information from the office to the field. Rather than emailing team members and making sure they download and print plan updates, you can use Fieldwire to update everyone at the same time. Whenever they next connect to the internet, those changes get updated in the app without any effort on their part!
Speaking of plan updates, you can also use Fieldwire to create as-builts while you’re in the field. No need to send sketches back to the office to add to a set of plans anymore. Simply export PDFs of your plans at the end of a project and your client will have a clean, up-to-date set of as-built record drawings. All of the links on your exported plans are kept live as well, so your client will be able to see any RFIs, change documents, or any other file attachments that have been posted on the plans. This ensures they’ll always have the full picture available to them.
Issue Tracking
When you’re dealing with excavation, you never truly know what you’re going to find. You might come across an abandoned utility pipe, an old foundation, or troublesome soil conditions. Unforeseen circumstances are par for the course in heavy civil construction, and Fieldwire allows you to document any and all sudden issues as soon as they turn up. Add a time-stamped photo or video, leave detailed notes, and assign the issue to the appropriate person. They’ll immediately be notified of the new obstacle and will be able to respond, as well as track any costs and keep you up-to-date on the progress. The entire history of this issue will be saved within the task you create for it in the app.
You can also use Fieldwire’s photo and video features to document any noteworthy existing conditions on the jobsite before you start working. This makes it easier to compare existing conditions against your contract to make sure everything is covered and you aren’t blamed for anything that was there when you arrived. Elevations, surveying points, grid-lines, compaction testing, and all sorts of data about your site’s surroundings can be stored within Fieldwire. Should any change orders need to be drawn up, you’ll have the information necessary to explain and justify these extra expenses right there in your Fieldwire tasks.
Inspections & Documentation
There are a lot of different groups involved in heavy civil work. Whether it’s independent inspectors, geotechnical engineers, or civil designers, there’s always going to be some coordination necessary to make sure these third parties can verify the work is being installed per design. Fieldwire makes it easy to track when inspections take place via tasks, photos, dated notations, and the ability to sign off electronically using our Scribble task tool. Documentation is the name of the game, so there’s never any confusion or uncertainty about the status of the project.
Make use of our wide selection of drawing markup tools, such as the area and length measurement tools, to track how much asphalt has been placed, highlight any prioritized locations, or calculate material orders. You can also assign start and end dates on your tasks to keep an organized schedule. Use the calendar task view on Fieldwire’s web interface to easily see what’s coming up next and make any schedule adjustments on the fly by simply dragging and dropping tasks as you see fit. You can also keep everyone in the loop about open issues, or simply share a list of items to target during walkthroughs with Fieldwire’s reporting system. Generate custom PDF or spreadsheet reports manually, or schedule them to be sent out automatically on a daily, weekly, or monthly basis.
Earth-Shattering Results
Fieldwire is dedicated to improving everyone’s day in the field, and that includes those in the heavy civil community. Infrastructure and public works are the backbone of building, and while that line of work may differ from the efforts of vertical contractors, heavy civil teams can still benefit greatly by incorporating Fieldwire into their daily routine. Using the suggestions above will certainly deliver a seismic boost to your crew’s on-site efficiency, so take Fieldwire for a spin today and start enjoying the savings! | {
"pile_set_name": "Pile-CC"
} |
Subsets and Splits