text
stringlengths 8
5.77M
|
---|
Sixers’ Fultz (shoulder) to miss at least 3 weeks
The Philadelphia 76ers announced that rookie point guard Markelle Fultz will be out indefinitely with soreness and scapular muscle imbalance in his right shoulder.
Doctors confirmed that there is no structural impairment to the shoulder, and he will continue his physiotherapy treatment and will be reevaluated in three weeks
Fultz, the No. 1 pick in the 2017 NBA draft, has had problems with his shoulder all season that have greatly affected his free-throw mechanics. Fultz’s form has been widely mocked as his shots clanked off the backboard.
|
Interrelated and integrated studies of subjects with periodontal diseases are being carried out. The goals of the ongoing studies are to improve knowledge of factors contributing to the etiology and pathogenesis of periodontal diseases, as well as to use this knowledge to monitor the progression of diseases and to improve diagnostic and prognostic capabilities. Subjects are initially screened and clinically characterized by investigators in the Core section of the Center, and appropriate clinical samples and other pertinent information are collected. Clinical, biostatistical, and data management support are provided to the other study groups involved in the Center. During the past year, two categories of subjects have been studied. Subjects with periodontitis are being observed longitudinally to determine clinical, immunological, and bacteriological parameters associated with progressing periodontal sites. Data from these studies will provide information regarding the nature of progression of periodontitis and provide a basis for rationale therapy and prognosis. The second category of subjects are those with early onset forms of periodontitis and their families. Our data indicate that the expression of early onset periodontitis (juvenile periodontitis JP and severe periodontitis SP) is genetically determined. Therefore, we are continuing to enter families identified via probands with these diseases into our studies in order to test genetic hypotheses of the mode of transmission in these diseases and to study clinical and immunological features of these diseases. Finally, in vitro studies aimed at determining some of the immunological pathogenic mechanisms that contribute to periodontal diseases have been accomplished.
|
Q:
Moq Unit test fails when calling a Service
I’m retrofitting production code with unit testing on my BusAcnts controller. The view contains a WebGrid and I’m using Stuart Leeks WebGrid service code (_busAcntService.GetBusAcnts) to handle the paging and sorting.
The Unit test fails with a “System.NullReferenceExceptionObject reference not set to an instance of an object.” error. If I run the test in debug and put a breakpoint at the point the service is called in the controller and another one in the Service on the called method (GetBusAcnts) and try to step through the test fails (with the same NullReference error) at the point the service is called. I cannot step into the service to see what the source of the problem is.
For testing purposes I pulled the basic query out of the service and put it in a GetBusAcnts method in the controller to emulate most of the function of the service. When I call the GetBusAcnts method in the controller rather than the one in the service the test passes.
This is a MVC5 EF6 application using xUnit 1.9.2, Moq 4.2. The EF6 mock database is set up as in this article Testing with a mocking framework (EF6 onwards). For this post I've simplified the code where I could and have not included things that are working and don't need to be shown.
I’m stumped as to why the test is failing at the point the service is called and don’t know how to troubleshoot further since I can’t step through the code.
Service Interface:
public interface IBusAcntService
{
IEnumerable<BusIdxVm> GetBusAcnts(MyDb dbCtx, out int totalRecords,
int pageSize = -1, int pageIndex = -1, string sort = "Name",
SortDirection sortOrder = SortDirection.Ascending);
}
Service:
public class BusAcntService : IBusAcntService
{
// helpers that take an IQueryable<TAFIdxVM> and a bool to indicate ascending/descending
// and apply that ordering to the IQueryable and return the result
private readonly IDictionary<string, Func<IQueryable<BusIdxVm>, bool,
IOrderedQueryable<BusIdxVm>>>
_busAcntOrderings = new Dictionary<string, Func<IQueryable<BusIdxVm>, bool,
IOrderedQueryable<BusIdxVm>>>
{
{"AcntNumber", CreateOrderingFunc<BusIdxVm, int>(p=>p.AcntNumber)},
{"CmpnyName", CreateOrderingFunc<BusIdxVm, string>(p=>p.CmpnyName)},
{"Status", CreateOrderingFunc<BusIdxVm, string>(p=>p.Status)},
{"Renewal", CreateOrderingFunc<BusIdxVm, int>(p=>p.Renewal)},
{"Structure", CreateOrderingFunc<BusIdxVm, string>(p=>p.Structure)},
{"Lock", CreateOrderingFunc<BusIdxVm, double>(p=>p.Lock)},
{"Created", CreateOrderingFunc<BusIdxVm, DateTime>(t => t.Created)},
{"Modified", CreateOrderingFunc<BusIdxVm, DateTime>(t => t.Modified)}
};
/// <summary>
/// returns a Func that takes an IQueryable and a bool, and sorts the IQueryable
/// (ascending or descending based on the bool).
/// The sort is performed on the property identified by the key selector.
/// </summary>
/// <typeparam name="T"></typeparam>
/// <typeparam name="TKey"></typeparam>
/// <param name="keySelector"></param>
/// <returns></returns>
private static Func<IQueryable<T>, bool, IOrderedQueryable<T>> CreateOrderingFunc<T,
TKey>(Expression<Func<T, TKey>> keySelector)
{
return (source, ascending) => ascending ? source.OrderBy(keySelector) :
source.OrderByDescending(keySelector);
}
public IEnumerable<BusIdxVm> GetBusAcnts(MyDb dbCtx, out int totalRecords,
int pageSize = -1, int pageIndex = -1, string sort = "Name",
SortDirection sortOrder = SortDirection.Ascending)
{
using (var db = dbCtx) { IQueryable<BusIdxVm> ba;
ba = from bsa in db.BusAcnts select new BusIdxVm { Id = bsa.Id,
AcntNumber = bsa.AcntNumber, CmpnyName = bsa.CmpnyName, Status = bsa.Status,
Renewal = bsa.RnwlStat, Structure = bsa.Structure, Lock = bsa.Lock,
Created = bsa.Created,Modified = bsa.Modified };
totalRecords = ba.Count();
var applyOrdering = _busAcntOrderings[sort]; // apply sorting
ba = applyOrdering(ba, sortOrder == SortDirection.Ascending);
if (pageSize > 0 && pageIndex >= 0) // apply paging
{
ba = ba.Skip(pageIndex * pageSize).Take(pageSize);
}
return ba.ToList(); }
}
}
Controller:
public class BusAcntController : Controller
{
private readonly MyDb _db;
private readonly IBusAcntService _busAcntService;
public BusAcntController() : this(new BusAcntService())
{ _db = new MyDb(); }
public BusAcntController(IBusAcntService busAcntService)
{ _busAcntService = busAcntService; }
public BusAcntController(MyDb db) { _db = db; }
public ActionResult Index(int page = 1, string sort = "AcntNumber",
string sortDir = "Ascending")
{
int pageSize = 15;
int totalRecords;
var busAcnts = _busAcntService.GetBusAcnts( _db, out totalRecords,
pageSize: pageSize, pageIndex: page - 1, sort: sort,
sortOrder: Mth.GetSortDirection(sortDir));
//var busAcnts = GetBusAcnts(_db); //Controller method
var busIdxVms = busAcnts as IList<BusIdxVm> ?? busAcnts.ToList();
var model = new PagedBusIdxModel { PageSize = pageSize, PageNumber = page,
BusAcnts = busIdxVms, TotalRows = totalRecords };
ViewBag._Status = Mth.DrpDwn(DropDowns.Status, ""); ViewBag._Lock = Mth.DrpDwn
return View(model);
}
private IEnumerable<BusIdxVm> GetBusAcnts(MyDb db)
{
IQueryable<BusIdxVm> ba = from bsa in db.BusAcnts select new BusIdxVm
{
Id = bsa.Id, AcntNumber = bsa.AcntNumber, CmpnyName = bsa.CmpnyName,
Status = bsa.Status, Renewal = bsa.RnwlStat, Structure = bsa.Structure,
Lock = bsa.Lock, Created = bsa.Created, Modified = bsa.Modified
};
return ba.ToList();
}
}
Unit Test:
[Fact]
public void GetAllBusAcnt()
{
var mockMyDb = MockDBSetup.MockMyDb();
var controller = new BusAcntController(mockMyDb.Object);
var controllerContextMock = new Mock<ControllerContext>();
controllerContextMock.Setup(
x => x.HttpContext.User.IsInRole(It.Is<string>(s => s.Equals("admin")))
).Returns(true);
controller.ControllerContext = controllerContextMock.Object;
var viewResult = controller.Index() as ViewResult;
var model = viewResult.Model as PagedBusIdxModel;
Assert.NotNull(model);
Assert.Equal(6, model.BusAcnts.ToList().Count());
Assert.Equal("Company 2", model.BusAcnts.ToList()[1].CmpnyName);
}
Does anyone have any idea why the call to the service is making the test fail or suggestions on how I might troubleshoot further?
Solution:
Thanks to Daniel J. G. The problem was that the service was not being initialized with the constructor passing the mock db. Change
public BusAcntController(MyDb db) { _db = db; }
to
public BusAcntController(MyDb db) : this(new BusAcntService()) { _db = db; }
It now passes the test and the production app still works.
A:
It is throwing that exception because you are constructing your controller using a constructor that only sets _db, leaving _busAcntService with its default value (null). So the test will fail at this point var busAcnts = _busAcntService.GetBusAcnts(...); because _busAcntService is null.
//In your test you create the controller using:
var controller = new BusAcntController(mockMyDb.Object);
//which calls this constructor, that only sets _db:
public BusAcntController(MyDb db) { _db = db; }
In your tests you should provide mocks/stubs for all dependencies of the class under test, and that class should provide some means to set those dependencies (like parameters in constructor methods).
You could update your constructors as:
public BusAcntController() : this(new BusAcntService(), new MyDb())
{
}
public BusAcntController(IBusAcntService busAcntService, MyDb db)
{
_busAcntService = busAcntService;
_db = db;
}
Then update your test to provide both the service and db instances to the controller (so both are under your control and you can setup your test scenario):
[Fact]
public void GetAllBusAcnt()
{
var mockMyDb = MockDBSetup.MockMyDb();
//create a mock for the service, and setup the call for GetBusAcnts
var serviceMock = new Mock<IBusAcntService>();
var expectedBusAccounts = new List<BusIdxVm>(){ new BusIdxVm(), ...a few more... };
serviceMock.Setup(s => s.GetBusAcnts(mockMyDb.Object, ....other params...)).Returns(expectedBusAccounts);
//Create the controller using both mocks
var controller = new BusAcntController(serviceMock.Object, mockMyDb.Object);
var controllerContextMock = new Mock<ControllerContext>();
controllerContextMock.Setup(
x => x.HttpContext.User.IsInRole(It.Is<string>(s => s.Equals("admin")))
).Returns(true);
controller.ControllerContext = controllerContextMock.Object;
var viewResult = controller.Index() as ViewResult;
var model = viewResult.Model as PagedBusIdxModel;
Assert.NotNull(model);
Assert.Equal(6, model.BusAcnts.ToList().Count());
Assert.Equal("Company 2", model.BusAcnts.ToList()[1].CmpnyName);
}
Now you can pass mocks for both the service and database, and setup correctly your test scenario. As a sidenote, as you notice you are just passing a db to the controller, just to pass it to the service. It looks like the db should be a dependency of the service class and a dependency of the controller.
Finally, it looks from your original code that you were expecting your code to run with a real service instance (and not a mocked service). If you really want to do so (which would be more of an integration test), you can still do that by building your controller like this on your test method var controller = new BusAcntController(new BusAcntService(), mockMyDb.Object);
|
• A new series spinning out of “Night of the Owls”!• After many years on the run, Calvin Rose returns to Gotham City to investigate the fallout from “Night of the Owls”!• Can the Court of Owls finally be defeated? Could Calvin have the one thing he’s been seeking his entire life: his freedom?
|
Posttranslational modification with ubiquitin chains is essential for cell division in all eukaryotes. Ubiquitin chains are synthesized by a cascade of E1 ubiquitin-activating, E2 ubiquitin-conjugating, and E3 ubiquitin ligase enzymes, with the latter defining the substrate specificity of this modification. Among ~600 human E3s, the anaphase-promoting complex (APC/C) is essential for mitosis, and the aberrant expression of APC/C- regulators or substrates has been tightly linked to tumorigenesis. Moreover, the indirect inhibition of the APC/C by paclitaxel, a small molecule that activates the APC/C-inhibitory spindle checkpoint, has become a mainstay of chemotherapy. We have recently discovered that the APC/C assembles chains of a novel topology, linked through Lys11 of ubiquitin. The APC/C achieves K11-linkage formation by employing an initiating E2, Ube2C, and an elongating E2, Ube2S. Similar to the APC/C, K11-linked chains and the E2-module composed of Ube2C and Ube2S are required for cell division. Therefore, dissecting the APC/C-dependent assembly and function of K11-linked chains is critical to our understanding of cell division. Here, we propose t dissect the mechanism of K11-linked ubiquitin chain formation by using a set of unique biochemical and structural assays combined with ubiquitin- and E2-mutants derived from extensive biochemical screens. We will directly test for functions of K11-linked ubiquitin chains by employing the novel approach of E3-reprogramming that allows us to switch the topology of ubiquitin chains that are assembled by the APC/C in cells. Finally, we will investigate the regulation of K11-linked chain formation, using a group of cancer-related APC/C-substrates, the spindle assembly factors HURP, NuSAP, and Tpx2, as our model system. Together, we expect that our studies will reveal core principles of ubiquitylation and cell cycle regulation. In this manner, our work will likely provide guidance for the development of novel classes of chemotherapeutics that target essential E2 enzymes.
|
# The MIT License
# Copyright (c) 2004-2009, Sun Microsystems, Inc., Wim Rosseel
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
# furnished to do so, subject to the following conditions:
# The above copyright notice and this permission notice shall be included in
# all copies or substantial portions of the Software.
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE
blurb=Er blijken een grote hoeveelheid jobs gedefinieerd. Wist U dat het mogelijk is om je jobs in aparte overzichtsschermen te groeperen? U kunt gelijk wanneer op de '+' bovenaan de pagina klikken om een nieuw overzichtsscherm te cre\u00EBren.
Dismiss=Ok
Create\ a\ view\ now=Cre\u00EBer nu een nieuw overzichtsscherm.
|
Manchester United are cautiously exploring the option of a move for Edinson Cavani as one of a number of clubs who have been offered the chance to sign the Paris St Germain and Uruguay striker this month.
But United officials are thought to harbour a number of reservations about a deal and are wary of repeating some of the mistakes made with the signing of Alexis Sanchez.
Atletico Madrid and Chelsea have been leading the race for Cavani, who has asked to leave PSG.
The Uruguayan’s parents have suggested his preference is to join Atletico but, while that has not discouraged Chelsea, the west London club are so far proving reluctant to meet PSG’s £12.6 million valuation of the player, who is out of contract at the end of the season.
Whether United opt to formally enter the running remains to be seen but the club’s hierarchy are giving consideration to a move, even if the Sanchez experience is informing those internal discussions.
Having missed out on their top January target, Norway striker Erling Haaland, who opted to join Borussia Dortmund instead, and with Marcus Rashford now sidelined for months with a double stress fracture, Ole Gunnar Solskjaer is keen to reinforce his attacking options.
|
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.hadoop.util;
import java.io.IOException;
import java.io.PrintStream;
import org.apache.hadoop.classification.InterfaceAudience;
import org.apache.hadoop.classification.InterfaceStability;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.ipc.CallerContext;
/**
* A utility to help run {@link Tool}s.
*
* <p><code>ToolRunner</code> can be used to run classes implementing
* <code>Tool</code> interface. It works in conjunction with
* {@link GenericOptionsParser} to parse the
* <a href="{@docRoot}/../hadoop-project-dist/hadoop-common/CommandsManual.html#Generic_Options">
* generic hadoop command line arguments</a> and modifies the
* <code>Configuration</code> of the <code>Tool</code>. The
* application-specific options are passed along without being modified.
* </p>
*
* @see Tool
* @see GenericOptionsParser
*/
@InterfaceAudience.Public
@InterfaceStability.Stable
public class ToolRunner {
/**
* Runs the given <code>Tool</code> by {@link Tool#run(String[])}, after
* parsing with the given generic arguments. Uses the given
* <code>Configuration</code>, or builds one if null.
*
* Sets the <code>Tool</code>'s configuration with the possibly modified
* version of the <code>conf</code>.
*
* @param conf <code>Configuration</code> for the <code>Tool</code>.
* @param tool <code>Tool</code> to run.
* @param args command-line arguments to the tool.
* @return exit code of the {@link Tool#run(String[])} method.
*/
public static int run(Configuration conf, Tool tool, String[] args)
throws Exception{
if (CallerContext.getCurrent() == null) {
CallerContext ctx = new CallerContext.Builder("CLI").build();
CallerContext.setCurrent(ctx);
}
if(conf == null) {
conf = new Configuration();
}
GenericOptionsParser parser = new GenericOptionsParser(conf, args);
//set the configuration back, so that Tool can configure itself
tool.setConf(conf);
//get the args w/o generic hadoop args
String[] toolArgs = parser.getRemainingArgs();
return tool.run(toolArgs);
}
/**
* Runs the <code>Tool</code> with its <code>Configuration</code>.
*
* Equivalent to <code>run(tool.getConf(), tool, args)</code>.
*
* @param tool <code>Tool</code> to run.
* @param args command-line arguments to the tool.
* @return exit code of the {@link Tool#run(String[])} method.
*/
public static int run(Tool tool, String[] args)
throws Exception{
return run(tool.getConf(), tool, args);
}
/**
* Prints generic command-line argurments and usage information.
*
* @param out stream to write usage information to.
*/
public static void printGenericCommandUsage(PrintStream out) {
GenericOptionsParser.printGenericCommandUsage(out);
}
/**
* Print out a prompt to the user, and return true if the user
* responds with "y" or "yes". (case insensitive)
*/
public static boolean confirmPrompt(String prompt) throws IOException {
while (true) {
System.err.print(prompt + " (Y or N) ");
StringBuilder responseBuilder = new StringBuilder();
while (true) {
int c = System.in.read();
if (c == -1 || c == '\r' || c == '\n') {
break;
}
responseBuilder.append((char)c);
}
String response = responseBuilder.toString();
if (response.equalsIgnoreCase("y") ||
response.equalsIgnoreCase("yes")) {
return true;
} else if (response.equalsIgnoreCase("n") ||
response.equalsIgnoreCase("no")) {
return false;
}
System.err.println("Invalid input: " + response);
// else ask them again
}
}
}
|
Association Between Two Polymorphisms in the Promoter Region of miR-143/miR-145 and the Susceptibility of Lung Cancer in Northeast Chinese Nonsmoking Females.
Lung cancer is known to cause high mortality and morbidity. The study aimed to explore the association between rs3733845 and rs3733846 polymorphisms in the promoter region of miR-143/145 and the risk of lung cancer among 575 nonsmoking cases and 575 cancer-free controls in a Chinese female population. We genotyped two single nucleotide polymorphisms (SNPs) in the promoter region of miR-143/145 in 575 cases and 575 controls using TaqMan allelic discrimination method. Logistic regression analysis was conducted to assess the association between polymorphisms in the promoter of miR-143/miR-145 and risk of lung cancer females. Crossover analysis was used to explore the interaction between the two SNPs and environmental risk factors (cooking oil fume exposure and passive smoking exposure). The results showed that both rs3733845 and rs3733846 polymorphisms were associated with an increased lung adenocarcinoma risk in dominant model (adjusted odds ratio [OR] = 1.329, 95% confidence intervals [CIs] = 1.026-1.723, p = 0.031 and adjusted OR = 1.450, 95% CI = 1.112-1.890, p = 0.006, respectively). The results of crossover analysis revealed that rs3733845 and rs3733846 risk genotypes along with cooking oil exposure increased lung cancer risk by 1.862-fold and 2.260-fold, respectively (adjusted OR = 1.862, 95% CI = 1.105-3.138, p = 0.020 for rs3733845; adjusted OR = 2.260, 95% CI = 1.354-3.769, p = 0.002 for rs3733846). There was positive multiplicative interaction between the two SNPs and cooking oil fume exposure (adjusted OR = 1.362, 95% CI = 1.078-1.719, p = 0.009 for oil × rs3733845; adjusted OR = 1.399, 95% CI = 1.122-1.745, p = 0.003 for oil × rs3733846). In nonsmoking females, rs3733845 and rs3733846 polymorphisms might be associated with lung adenocarcinoma risk. Moreover, the interactions between the two SNPs and cooking oil fume exposure were statistically significant on a multiplicative scale rather than an addictive scale.
|
17 Ideas for Bachelorette Parties in Australia’s Yarra Valley
Located about an hour outside Melbourne, Yarra Valley is Victoria’s crown jewel region for wine tasting, gourmet eats, luxury stays and more. Bachelorette party gals, this guide’s for you. We’re traipsing through the lush valley’s top cellar doors, comfortable digs, wonderful restaurants and more to bring you the best of the local options.
Grab an Introductory Glass of Bubbly at Domaine Chandon
Coldstream, VIC, Australia
Sipping on bubbly is the best way to kick off any bachelorette weekend, and Domaine Chandon is the place to do it in Yarra Valley. Tasting tours can be booked for groups and you’re likely to learn a whole lot about Australian sparkling wine production while getting a taste of the good stuff.
Go Hot Air Ballooning
Yarra Valley, Australia
Melbourne’s Global Ballooning offers hot air balloon tours of the Yarra Valley that’ll have you and your bachelorette party crew seeing a whole new perspective of this gorgeous wine country and the surrounding mountains.
Go Gin Tasting at Four Pillars Gin
Healesville, VIC, Australia
Aussies love their botanical gins and Four Pillars has a huge fan base, both local and abroad. The distillery is located in Healesville and offers group tours and tastings that are perfect for a bachelorette crowd.
Stay & Experience the Farmhouse at Meletos
Coldstream, VIC, Australia
The 23-room Farmhouse at Meletos in the heart of the Yarra Valley offers group options that include yoga classes, private dining experiences, wine tastings, floral arranging classes, and more. The gardens, the effortlessly chic décor, the food. There’s so much to love about this spot.
Dine, Lounge & Wine Taste at Giant Steps Wine
Healesville, VIC, Australia
Dine amongst old oak wine barrels while overlooking the vineyards at the private dining room of Giant Steps Wine. This spot is awesome for a crew of bachelorette gals that like to keep things low-key and all about the terroir.
Sip Wine at The Stables at Stones
Coldstream, VIC, Australia
Dinner at The Stables at Stones is one of those Yarra Valley experiences you and your ladies really won’t get anywhere else. The seasonal, regional menus are served in an historic brick building that was once stablehand quarters.
Dine at Meletos Café
Coldstream, VIC, Australia
If you’re planning a daytrip to Yarra Valley, a meal at Meletos’ Café make a perfect midday or early evening stop. The views are simply gorgeous and the food is divine, all locally grown and sourced, reflective of the valley’s bounty.
Visit TarraWarra Estate
Yarra Glen, VIC, Australia
Besides being a fantastic winery stop in Yarra Valley, TarraWarra is also a sprawling estate with a museum on-site. The art collection here is just as impressive as the portfolio of sustainably produced wines.
This food and wine mecca in Coldstream features extensive gardens, a destination restaurant and gorgeous gathering spaces. Book a table for the bride’s best gals and enjoy a dinner on the grounds of a hundred-year-old estate.
Wine Taste at Oakridge Wines
Coldstream, VIC, Australia
Vineyard tours and cellar doors are a major reason to spend your bachelorette party in Yarra Valley. At Oakridge, the wines are as delectable as the views, and Chef Matt Stone’s restaurant makes a great midday lunch spot.
Fill up on Charcuterie at Medhurst
Gruyere, VIC, Australia
Minimalists are sure to enjoy Medhurst’s modern cellar door, a spot where it’s really all about the vineyard views. Add a stop here to fill up on charcuterie boards and tasty wines to your Yarra Valley itinerary.
Stay at Yarra Valley Lodge
Chirnside Park, VIC, Australia
Luxury accommodations await at Yarra Valley Lodge, where you can book a handful of double bedded rooms for your ladies to share. The terraces looking out onto the gorgeous Yarra Ranges are the perfect perch to unwind from a big day of vineyard tours.
Thank you so much for your interest in The Venue Report. We are reviewing your property thoroughly in order to properly give it the attention it deserves. If you do not hear back from us within four weeks we kindly invite you to submit again at a later date.
Looking for more ways to make your venue stand out? Our friends at Minted have a special program for gorgeous venues like yours! Learn more here.
We’re so excited about this beautiful relationship.where will you celebrate?
|
Q:
adding images to a tab label
I was looking to make tabs that look like the following:
How do you add an image to TabControl's label in Winforms?
but in wpf C#.
I dynamically add the tabs and was hoping to change the image depending on if the tab had been saved or not (i already have the code for that part).
Is there an easy way to do this?
A:
what you are looking for is the TabItems HeaderTemplate ...
XAML:
<TabItem.HeaderTemplate>
<DataTemplate>
<StackPanel Orientation="Horizontal">
<Rectangle Fill="Red" Width="10" Height="10" Margin="3,0"/>
<TextBlock Text="{Binding}"/>
</StackPanel>
</DataTemplate>
</TabItem.HeaderTemplate>
instead of a rectangle you could specify an image or whatever element you want ...
|
[Pharmacokinetics and relative bioavailability of probucol inclusion complex capsule in healthy dogs].
To study the pharmacokinetics and relative bioavailability of probucol inclusion complex capsule. Following oral administration of a single dose of 250 mg of conventional tablet (formulation A, purchased from the market) and probucol inclusion complex capsule (formulation B, a new formulation for preclinical trial) to each of 6 healthy dogs in a randomized crossover design, the plasma levels of the active drug at different time points were determined by HPLC and the plasma concentration-time profiles of formulation A and B were obtained. The pharmacokinetic parameters as well as relative bioavailability were analyzed. The concentration-time curves of formulation A and formulation B were found to fit a two-compartment open model. The Tmax values of formulation A and formulation B were (9.3 +/- 2.1) h and (9.3 +/- 2.1) h, the Cmax values were (1.5 +/- 1.0) microgram.mL-1 and (2.3 +/- 0.9) microgram.mL-1 and the AUC0-240 values were (85 +/- 56) microgram.h.mL-1 and (134 +/- 55) microgram.h.mL-1, respectively. The relative bioavailability of formulation B was found to be (198 +/- 90)% compared with formulation A. The results of variance analysis and two one-side t-test showed that there was significant difference between the two formulations in the AUC0-240. The high bioavailability by the inclusion of formulation B is attributed to the improvement of its water-solubility by the inclusion process and this is supposed to be a key factor for improving drug bioavailability.
|
Day 14: Yaweh Nissi Part 2
Yesterday we looked at the story of Moses and the Israelites’ battle againist the Amalekites. We learned the importance of holding high the cross of Christ in all of our spiritual battles.
Today I want touch on another important lesson we can learn from this story.
As Moses held high his staff as he overlooked the battle, his arms grew tired. At this point he asked two of his most trusted leaders, Aaron and Hur to come along beside him prop up his arms.
When we are facing difficulties or stepping out into a new ministry, it is so important for us to also have people who can hold us up in prayer.
When we attempt to handle it all on our own strength, we grow weary and tired. When we have trusted friends who will support us through their prayers, we no longer have to bear the burden by ourselves.
I am definitely not good at sharing the burden. I tend towards giving people the impression that I am self-sufficient and can handle it all on my own. I can look back at times in my life where I have not reached out to others and I literally cracked under the pressure.
Some of this is caused by the influence of our society telling me that I need to be strong and independent. Most of it is caused by plain ol’ pride. And you know what they say about pride . . .
I have just recently started to reach out to others; asking them if they will pray for me on a regular basis. The amazing thing . . . most of them already were! I have gained a sense of peace knowing that I am not in this alone.
What issues are you facing today? Who will you ask to come along side of you just like Aaron and Hur did for Moses?
|
Ibtesam Alkarnake had already started the arduous 24-hour journey from a temporary home in Jordan to asylum in Canada when her waters broke.
Nearly six years after they fled the war in Syria, safety seemed finally in reach, as the family made their way to the northern Alberta city of Fort McMurray to begin new lives as privately sponsored refugees.
So Alkarnake said nothing, enduring hours of discomfort in silence as they made stopovers in Frankfurt and Calgary. When the family landed in Fort McMurray on Tuesday evening, she posed for pictures, trading hugs and smiling at the dozens who showed up at the airport to greet the city’s newest residents
Only when the family was taken to their new home did she reveal to one of the sponsors that she was about to give birth. And just hours after the family landed in Fort McMurray, her son Eyad was born at a local hospital, weighing 6lb 3oz.
“Brute determination” is how Doug Doyle, the pastor of Fort City church, described it. “She was bound and determined to get to Canada and have that child in Canada.”
Doyle’s congregation began the process of sponsoring the family to Canada in 2015, taking advantage of a programme that allows Canadians to bring refugees to the country in exchange for covering their expenses for the first year or so and helping the newcomers settle into their new lives.
The process took years – during which Alkarnake became pregnant and was initially told she would be held back from traveling to Canada as a result. Panic set in, said Doyle, as the family feared they had lost their chance at starting over in Canada. “They’ve had several years of unsettledness. They were wanting to settle and find a place to call home.”
The church intervened on their behalf and officials agreed to let her travel after a health check confirmed it was safe to do so. The baby surprised everyone by arriving at least a month early, said Doyle. He wasn’t sure exactly at what point in the family’s journey that her waters broke.
Both Alkarnake and Eyad are doing well and the family – which includes her husband and four other kids who range in age from five to 17 years – are slowly settling in.
“For them, it’s been a total whirlwind,” said Doyle. “They’ve arrived at an incredibly unique time in history, right? You have borders closing to people like them in the US, you have the shooting in Quebec.”
The day after their arrival, some members of the family participated in a local solidarity march for those affected by the mosque shooting in Quebec City. “We just let them enter the politics of Canada at this point in time, and let them see expressions of support for the Islamic community in our city,” said Doyle.
It was a moving tribute to Quebec from the residents of Fort McMurray, who made headlines around the world last year after flames forced a frantic evacuation of the city and destroyed thousands of structures.
The experience was a game-changer for the few in the congregation who had been reluctant to embrace the idea of sponsoring refugees, said Doyle. “People began to see themselves as displaced people, as refugees in a sense, who got so welcomed and cared for by the cities that they ended up in,” he said. “And it created quite the re-evaluation of how do you respond to people who have been displaced through no fault of their own.”
As the city struggled with the aftermath of the fire, Doyle suggested to his congregation that they pass their sponsorship duty to a church in Edmonton. “And no, our people rallied and said we are going to do this,” he said. “As devastated as Fort McMurray is by the fire, there’s a resilience in the city … And there’s this desire to give back.”
|
Thursday, 19 April 2018
A Pinterest Inspired Brunch ♡
Hey Guys,
Brunch? We've all heard about it, but have you ever been for Brunch? I always see people on Instagram going for Brunch on weekdays and weekends in Central London and think WOW, it looks amazing. The food and location, wow, but a little confession for you all, I've only Brunched once, and that one time was this year, when I turned 22, yup, at 22, I had my very first Brunch. I don't know why, but I was very excited for it, I guess because I've heard and seen so much about it, I was excited to 'do it' and that being, simply to eat a late breakfast, early lunch! It was in fact a success, but quite pricey, which made me thought of creating a fancy but bank account friendly homemade Brunch, one that the entire family can enjoy. That's where my good old friend Pinterest came in, I searched for inspiration (is inspiration you can search for? I don't think I've ever said that before haha) and as always Pinterest never failed, so I attempted to create Pinterest Inspired Brunch ...
Lets start off with the setting; setting of the table, atmosphere and overall ambiance. For setting I wanted to create a 'fancy' feel, with a budget tag, which is why I chose to use the gorgeous Sainsbury's Home Palm House Set (£44.00)* which is actually half price in stores. The set comes with 12pc's, including bowls, plates and side plates. They have a beautiful, print and brings an overall pretty vibe to the table. Then for little accents such flowers, candles and other bits and bobs. If you follow me on instagram (@tipscapsule) yes, that was a shameless plug, you'd know I love creating flatlays with flowers and readers or the blog know I love candles, the perfect combination. I lit a few candles in safe places and let the scent flow into the air. As for flowers, I scattered them around the table, and elsewhere to add a little of colour.
Even though it was a just a Brunch, I wanted to create a cozy atmosphere and laid two blankets on the sofa. I love blankets, even on the colder days of Spring, I'll find myself wrapped up in a blanket watching TV. I've been using this Sainbury's Woven Throw (£20.00*), its quite a big throw, but its the coziest one I've ever used. I also laid the gorgeous Sainsbury's Home Artificial Arrangement (£12.00)*.
Now, lets get onto food, because that's the most important and fun part FOOD! Mmm, Mmm, Mmm. When I was 'planning' this little Brunch, I didn't know whether to do it a pick n' mix style or tailor it to what everyone will eat. Because I wanted to go all out, I bought a variety of foods that I knew everybody would it. I went for the classics, Croissant, Pancakes, Waffles and then the more 'modern' of Avocado on Toast. Of course, as we all have major sweet tooths, I had to pop a brownie and an eclair in too!
And there we have it, a Pinterest Inspired Brunch, have you Brunched before?
|
Q:
Windows 7 does not give a warning when subnet on a network with DHCP conflicts with one of the existing static subnets on another adapter
On the client-side, i have a loopback adapter at 192.168.1.1, with a 255.255.255.0 mask. I also have a wireless connection that does not work when the loopback adapter is enabled. Would it make sense for the operating system to give me a warning when I am connecting to a network that is on the same subnet over a different adapter?
A:
No. Having multiple network adapters on the same subnet is a totally valid configuration assuming that both the adapters connect to the same network. That's why we have subnets, after all.
So, as far as the operating system is concerned, you just have two NICs on the same network. There's no reason for it to complain about that.
You'll need to take one of your networks and change its subnet (I suggest the loopback adapter, probably easier).
|
/*
* RapidMiner
*
* Copyright (C) 2001-2014 by RapidMiner and the contributors
*
* Complete list of developers available at our web site:
*
* http://rapidminer.com
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see http://www.gnu.org/licenses/.
*/
package com.rapidminer.operator.ports.metadata;
import com.rapidminer.operator.ports.InputPort;
import com.rapidminer.operator.ports.OutputPort;
/**
* This rule might be used, if a model is applied on a data set.
*
* @author Sebastian Land
*/
public class ModelApplicationRule extends PassThroughRule {
private InputPort modelInput;
public ModelApplicationRule(InputPort inputPort, OutputPort outputPort, InputPort modelInput, boolean mandatory) {
super(inputPort, outputPort, mandatory);
this.modelInput = modelInput;
}
@Override
public MetaData modifyMetaData(MetaData metaData) {
if (metaData instanceof ExampleSetMetaData) {
MetaData modelMetaData = modelInput.getMetaData();
if (modelMetaData instanceof ModelMetaData) {
metaData = ((ModelMetaData)modelMetaData).apply((ExampleSetMetaData) metaData, getInputPort());
}
}
return metaData;
}
}
|
Welcome to silverdale towing
Silverdale towing was established in 1995 in Silverdale Washington to fill the need for a better towing and road service company in Silverdale and Kitsap County. Until we arrived, consumers choices were slim and souring prices abound. We purchased a fleet of brand new, state-of-the-art towing and recovery vehicles, painted them all a distinctive yellow so our customers could easily distinguish us from the competition, and hired only the most highly skilled and Wreckmaster® certified drivers to provide our service.
Since our inception, Silverdale Towing has reached new heights of quality and service and provided our customers with a much needed alternative that our customers clearly appreciate. In fact, the citizens of Silverdale and Kitsap County have richly rewarded us with their continued loyal patronage.
So, when your vehicle is in need of rescue, call Silverdale Towing!
So, when your vehicle is in need of rescue, call Silverdale Towing!
ALL SERVICES ARE ONLY PERFORMED BY WRECKMASTER® TRAINED AND CERTIFIED DRIVERS. ALL OF OUR DRIVERS HAVE PASSED A STRICT WASHINGTON STATE PATROL BACKGROUND CHECK.
|
Search
User login
STAND WITH RAND
Tue, 04/07/2015 - 14:45 — ub
News
US Senator Rand Paul attacked his Grand Old Party today as he formally launched his presidential bid in Louisville. The tea party Republican who continues to serve in The Senate since 2010, has carefully built a brand of mainstream Libertarian-ism.
|
From Route 617. Turn left onto Route 624 and drive 0.7 of a
mile and park at Wickapeck Lodge on the right.
You can take a circular walk by heading clockwise from a
blocked-off trail just down the road from the parking area. It
will bring you back to Camp Wickapeck. Near the end you can take
a side walk on the boardwalk through the swampy area.
|
I hadn’t really thought about prison until I sat down for lunch with my mum recently. In December, I was one of 15 people who were found guilty of a terror-related offence for blockading a deportation charter flight in 2017. The offence, under the Aviation and Maritime Security Act, carries with it a potential life sentence, but until that fateful lunch, incarceration had been more of an abstract concept than a potential reality for me.
We sat in a Wetherspoon’s and I told my mum that I hadn’t really thought about the upcoming sentencing, I’d been too busy. She looked at me for a second, taking a sip of her drink before saying: “Well, I’m preparing for you to go inside, I have been for a while.”
That was the moment that it hit me. I might be about to go to prison.
For most of the Stansted 15, the chance of jail is slim – including for me – but it could still happen. And so, I’m sat here writing among piles of things I may need in prison. Atop stacks of boxers, there are hastily purchased sets of toiletries. Next to them, reams of paper, stamps and pencils, ready to be folded into a duffel bag for the trip to Chelmsford crown court one week from today.
I’ve spent the last few weeks rehearsing goodbyes. Thinking of something to say to my four-year-old niece when I see her later this week, knowing it might be the last time for a while. I’ve thought about the things I’m going to say to my pals, the looks I’m going to share with my fellow defendants, the desperate hug I’ll share with my mum in the doorway to the court as we’re called in, both of us reassuring the other that it’s going to be OK, both of us knowing that the other may be lying. I think about all these things and more, and realise just how lucky I am.
In 2017, the UK held 27,000 people in indefinite immigration detention; 15% of these were taken in during routine Home Office appointments. In other words, 4,050 people attended an appointment one day, expecting to walk in, sign something to confirm their compliance and walk back out to their families and lives, but instead were whipped away without warning to be held indefinitely in a detention centre. On top of this, there are those who are grabbed from the streets, from their places of work or from their homes in the darkness of the night.
People such as Otis Bolamu, a survivor of torture and a charity volunteer living in Swansea, who escaped the Democratic Republic of the Congo after being threatened with death, having been accused by the government of spying for the opposition party. Otis was grabbed in a 4am raid on his home and was due to be deported to certain death on Christmas Day. His deportation was only temporarily stayed through public pressure.
It’s people such as Twane Morgan, the Jamaican man who served two terms in Afghanistan for Britain before being discharged with post-traumatic stress disorder, who is due to be on the first charter flight to Jamaica since the Windrush scandal erupted last April.
People such as the eight-month-old baby held in detention earlier this month, or the Nigerian lesbian woman on the flight we stopped in March 2017, who was contacted by her abusive ex-husband days before her scheduled removal with the promise to kill her if she was returned to Nigeria.
That’s the thing about this entire experience. Each of the goodbyes that I’ll have – every desperate embrace I find myself in outside the court, every word I say to my loved ones, every anxious glance I share with my mum from the dock – I know that deep down they won’t be the last. Simply by virtue of my birthplace, I’ve been afforded the humanity of a goodbye. More than that though, I know that after this is all over, I’ll come back to the safety and security of those who love me. Whether it’s minutes, hours, weeks, months or years after that sentencing hearing starts, eventually I’ll be back home, writing, dancing and living. For most people who bear the brunt of the hostile environment, that’s not true. The future that awaits them is uncertain. It’s laced with pain, with the potential of violence, torture and death.
The fact that we live in a country that allows such a disparity in the execution of rights and freedoms is a stain on our society. It’s why we stopped that plane in March 2017 and why we must all keep fighting today – because freedom and humanity cannot be discriminatory. If only the privileged few enjoy it, then none of us truly do.
• Ben Smoke is a journalist and a Stansted 15 activist
|
Hey AVM, I have had my storm for 2 weeks also! Upgraded 1 wk ago to BBC's v3, I going to v3.5 this weekend! There is a lot of support here!!! The links are in the 9530 Operating Softare/Hybrids forum. Neolantis has the link for each version with instructions! Hope to see you in the forums!
|
Tekken 7 Jukebox Tool
A simple and extensible way to share and replace Tekken 7 music
[Download v1.5]
10.19 MB
[Download Updated Default Music Pack (T1-TTT2) - Volume Fixed!] 10.19 MB
1. Description and Purpose
2. Requirements
Microsoft Windows 7 or higher
Microsoft .NET Framework 4.5 or higher
3. Instructions
Download and extract the tool in a location of your choice
Download the Default Music Pack or generate and import your own soundbanks for use with the tool (find the tutorial further down this post)
Place any music packs in the /BGM/ directory (which has to be located in the same directory the tool is run from)
Launch the tool and choose your preferred background music for each individual stage, then select "Generate .pak"
The tool will generate a "Jukebox.pak" in the same directory it's run from
Place "Jukebox.pak" in your "TEKKEN 7/TekkenGame/Content/Paks/~mods" directory (if it doesn't already exist, create it)
Launch the game and enjoy your new music!
4. Donations
5. Special Thanks
HelixShot, for putting me on the right path to the solution for FR stage BGM replacements
xRuneXero, for compiling an extensive list of soundbank IDs for the default game BGMs, which I shamelessly parsed and converted for use with the stage list in this tool
6. Frequently Asked Questions / Known Issues
Does this tool work online?
Since it only locally replaces non-gameplay relevant data that does not affect your opponent's game in any way, using it online should be completely fine. There is, however, no guarantee , and I can't say for 100% certainty that there won't be any problems.
Since it only locally replaces non-gameplay relevant data that does not affect your opponent's game in any way, using it online should be completely fine. , and I can't say for 100% certainty that there won't be any problems. I can't replace the menu and character select music, or the BGM for any of the Fated Retribution stages!
This has been fixed in v1.1. Please update your Jukebox Tool.
This has been fixed in v1.1. Please update your Jukebox Tool. I'm getting an error message "The size of the selected soundtrack's stub is larger than the original soundtrack's stub" when trying to set BGM for a Fated Retribution stage!
This has been fixed in v1.4. Please update your Jukebox Tool.
This has been fixed in v1.4. Please update your Jukebox Tool. The tool tells me that a Jukebox.pak has been created, but it doesn't actually exist! / My Jukebox.pak file is 0kb!
This has been fixed in v1.2. Please update your Jukebox Tool.
This has been fixed in v1.2. Please update your Jukebox Tool. I set the main menu and character select themes to default, but I can't hear anything in-game!
This has been fixed in v1.1. Please update your Jukebox tool.
This has been fixed in v1.1. Please update your Jukebox tool. My replaced background music is really quiet?
Try downloading the updated Default Music Pack. It should contain fixes for the low volume that many users have been complaining about. If it still contains a track that doesn't match to the official BGM in volume, please let me know so that I can fix it.
7. Release Notes
v1.5 (Nov 30 2017) Added support for Howard Estate and Tekken Bowl BGM replacements Jukebox.pak will now be generated as Jukebox_P.pak for DLC compatibility reasons v1.4 (Sep 13 2017) The soundbank is now completely rebuilt upon generation of Jukebox.pak (instead simply being modified) As a result, stub sizes are no longer an issue, and every track can be switched out for any other track v1.2 (Sep 09 2017) U4Pak is now shipped as a pre-compiled, self-contained binary executable file that should work with the vast majority of setups As a result, Python 2.7 is no longer required Fixed an issue where the program would incorrectly state that Jukebox.pak has been successfully generated, even when it hasn't v1.1 (Aug 22 2017) Fixed an issue where the modified soundbank would not be written to disk from memory in some cases, causing FR stages and menu music to not play properly upon replacement v1.0 (Aug 22 2017) Initial release Addendum: Creating your own music packs
Try downloading the updated Default Music Pack. It should contain fixes for the low volume that many users have been complaining about. If it still contains a track that doesn't match to the official BGM in volume, please let me know so that I can fix it.
[+] Spoiler 1. Convert all audio files you wish to insert into the game to the .wav format
2. Download the latest version of Wwise from Audiokinetic
3. Create a new project and give it a name of your choice
4. On the left side of your screen, in the Project Explorer, under "Actor-Mixer Hierarchy", right-click "Default Work Unit", hover over "New Child" and select "Work Unit" [+] Spoiler 5. Give your new work unit a name of your choice
6. Drag and drop your audio files on top of your newly created work unit, then select "Import" [+] Spoiler 7. In the top menu bar, select "Layouts", then "SoundBank" (or press F7)
8. In the Project Explorer, select the "SoundBanks" tab [+] Spoiler 9. In the Project Explorer, right-click "Default Work Unit", hover over "New Child" and select "SoundBank"
10. Give your new SoundBank a name of your choice
11. In the Project Explorer, select the "Audio" tab [+] Spoiler 12. In the SoundBank Manager, click the "+" square next to "Default Work Unit", then drag and drop your audio files from the Project Explorer on top of your newly created SoundBank [+] Spoiler 13. On the bottom of your screen, in the SoundBank Editor, select all of your sounds (through CTRL-click or SHIFT-click), then right-click them and select "Show in Multi Editor" [+] Spoiler 14. Select "General Settings", then "Loop" and check "Is Looping Enabled". Then, select "Stream" and check both "Is Streaming Enabled" and "Zero latency". Make sure to set "Prefetch length (ms)" to 0, or the tool might throw an error when trying to replace the BGM of certain stages with your custom one [+] Spoiler 15. (Optional) Select one of your tracks, then press Shift+O to open the Contents Editor. Double-click on your track in the list to open the Source Editor. Here, you may adjust your track's loop start and loop end points by dragging the blue (loop start) and red (loop end) markers over your desired position in the waveform. To play and pause, press Spacebar. To zoom in and out, hold CTRL and use your mouse wheel.
16. In the SoundBank Manager, on the right-hand side of your screen, under Platforms, select "Windows"; then, under Languages, select "English(US)"
17. In the Project Explorer, select the "ShareSets" tab [+] Spoiler 18. In the Project Explorer, under "Conversion Settings", expand "Default Work Unit", then double-click "Default Conversion Settings" [+] Spoiler 19. In the Conversion Settings Editor, under "Sample Rate", select 48000; then, under "Format", select "Vorbis"; then, under "Quality", select a value of 4 or lower [+] Spoiler 20. In the SoundBank Manager, click "Generate" [+] Spoiler 21. Launch the Tekken 7 Jukebox Tool, select "File", then "Import Custom Soundbank"
22. Click the "Browse..." button and navigate to your Wwise SoundBank output directory (Documents/WwiseProjects/<Project Name>/GeneratedSoundBanks/Windows)
23. Select the file named "<Project Name>.bnk" (NOT Init.bnk)
24. Give your sound pack a name or category [+] Spoiler 25. Select "Save"
26. Restart the Tekken 7 Jukebox Tool
Your new sound pack is now available for use with the tool. [+] Spoiler
The Tekken 7 Jukebox Tool allows for easy replacement of existing background music in Tekken 7 for the PC. Simple to use and extensible, it aims to be the primary means for the Tekken 7 modding community to share their custom music mods and allow users to be flexible in their choice of preferred music. Anyone can create additional music packs for use with this tool, making it the easiest way to adjust and cater to every aspect of your personal musical needs.Donations aren't required, and I will never bug anyone about them, but greatly appreciated. Any amount tremendously helps me out. Donating won't only fill you with the warm feeling of having done a good deed, but also rewards you with my eternal gratitude!
|
Erucism in New Zealand: exposure to gum leaf skeletoniser (Uraba lugens) caterpillars in the differential diagnosis of contact dermatitis in the Auckland region.
There are no indigenous caterpillars known to be associated with erucism, but the recently established gum leaf skeletoniser (Uraba lugens) has venom-containing spines that cause adverse reactions in humans. Symptoms are usually characterised by a stinging sensation, followed by itching and the formation of wheals. Exposure to U. lugens should be considered by medical practitioners in the differential diagnosis of contact dermatitis in the Auckland region.
|
IVF clinics aren't doing enough to encourage people to donate eggs and sperm, the head of the Human Fertilisation and Embryology Authority (HFEA), the fertility watchdog, has suggested.
In a new push to raise awareness of egg and sperm donation, chair of the HFEA Lisa Jardine has said she wanted egg donation__to become as “obvious as blood donation”.
Lots of men are apparently interested in making sperm donations but are put off, feeling unwelcome or not having their phone calls returned, said Lisa.
“We have some evidence, somewhat anecdotal, that donors are not particularly welcomed at clinics. Clinics are more and more busy and donors are (treated as) a sort of side issue,” she explained.
Lisa added that women going through fertility treatment could also be encouraged to donate, reports PA. “Women going through treatment will probably be stimulated to produce more eggs than they use themselves,” she said. “Now some of them choose to freeze those for further attempts but there may well be more eggs than that, in which case donating them to another woman who doesn’t have viable eggs of her own is the most extraordinary gift.”
However, Lisa said there were issues to consider. One of these is that people can't donate anonymously anymore, so any child produced from treatment could attempt to track down the donor later in their life.
Laura Witjens, Chair of the National Gamete Donation Trust, said raising awareness about sperm and egg donation could make it a subject to “talk about in the pub.” Laura commented that while egg donors were perhaps seen as “good people”, sperm donors sometimes had the stigma of being a “dirty man”. Raising awareness, said Laura, could help end this stigma, reports the Telegraph.
Have you ever donated? Or become a parent because of donated eggs or sperm?
Welcome to Gail's Blog! Gail launched Donor Concierge in 2006 to provide intended parents with greater choice when searching for an egg donor or surrogate. Our Blog retains her voice, and our company retains her philosophy & ethics. We invite you to learn about finding an egg donor, finding a surrogate mother and the fascinating world of fertility.
|
Q:
UILabel does not show all my text and it also doesn't show that there is more (...)
I am determining the height of my cells dynamically, to fit all my text.
I also set the number of lines to 0.
It works most of the time but sometimes I get things like this:
There is more text than is shown, and even if I log the label text, it shows more that what is being displayed.
The black frame is used to show that the frame is big enough to hold the text but for some reason the label refuses to show all my text.
Has anyone experienced anything like this?
Can anyone help me solve this?
I know it's not complicated but its been driving me crazy.
A:
The solution was actually very simple, for some reason, the number of lines was being changed, so now I only make sure that before the cell is displayed, the number of lines for the label is in fact 0.
Thank you all for the help!
|
require(__dirname).test({
expect: [
['opentagstart', {'name': 'R', 'attributes': {}}],
['opentag', {'name': 'R', 'attributes': {}, 'isSelfClosing': false}],
['opencdata', undefined],
['cdata', ' this is '],
['closecdata', undefined],
['closetag', 'R']
]
})
.write('<r><![CDATA[ this is ]')
.write(']>')
.write('</r>')
.close()
|
It depends on the game really. NFS: Carbon you CAN use the cheats and still get your gamer points and acheivements. So, that is at least one that I know about. Also GWAR I have heard you can use cheats and still get your gamer points too. Not sure of any others though.
|
The Portland Thorns have signed midfielder Ashley Herndon and defender Kelli Hubly to short-term contracts.
Herndon and Hubly will serve as replacements for Dagny Brynjarsdottir and Nadia Nadim while the two players are away at the 2017 European Championships.
Here is the full release from the Thorns:
PORTLAND, Ore. - Portland Thorns FC have signed midfielder Ashley Herndon and defender Kelli Hubly, it was announced today.
Herndon and Hubly will serve as field player replacements for Dagny Brynjarsdottir and Nadia Nadim, who are both away on international duty for the 2017 European Championships.
Herndon appeared in 84 games (all starts) for James Madison University, tallying 37 goals and 27 assists during her four-year career (2013-16). During her senior campaign in 2016, Herndon was named Colonial Athletic Conference Player of the Year and earned NSCAA second-team All-Mid-Atlantic Region honors, scoring 11 goals.
Hubly began her collegiate career at the University of Kentucky (2012-14), appearing 65 games (40 starts), registering 10 goals and 7 assists. She played her final season at DePaul in 2016, featuring in 18 matches (all starts), tallying five assists.
-- Jamie Goldberg | [email protected]
503-853-3761 | @jamiebgoldberg
|
Background {#Sec1}
==========
Fetal adenocarcinoma of the lung (FLAC), which is classified into low-grade (L-FLAC) and high-grade (H-FLAC), is an extremely rare subtype of pulmonary tumor occurring with a relative incidence of 0.5% among all lung cancers \[[@CR1]\]. Because of its rarity, optimal treatments for the management of the disease are poorly understood. We report a case of H-FLAC with invasion of the right superior sulcus that showed a pathologic complete response to neoadjuvant chemoradiotherapy followed by right upper lobectomy performed by complete video-assisted thoracoscopic surgery (VATS).
Case presentation {#Sec2}
=================
A 54-year-old Japanese man with a 30 pack-year smoking history was referred to a medical institution due to pain and paresthesia from the ulnar surface of the right forearm to the small finger of the right hand in the distribution of the C8 and T1 dermatomes that had persisted for approximately 2 months. He had no remarkable medical history. The patient's laboratory data revealed an elevation carcinoembryonic antigen (CEA) level of 8.4 ng/ml. A chest X-ray showed a tumoral shadow at the right apex of the upper-lung field. (Fig. [1](#Fig1){ref-type="fig"}a). On a computed tomography (CT) of the chest, a 56 × 30 × 25-mm mass was discovered at the right superior sulcus (Fig. [1](#Fig1){ref-type="fig"}b--e). The mass was suspected to have invaded the chest wall of the right first and second intercostal space (Fig. [1](#Fig1){ref-type="fig"}b--d). Additionally, the disruption of blood flow of the subclavian vein, which was suspected to be due to tumor invasion, was confirmed (Fig. [1](#Fig1){ref-type="fig"}d). Fluorodeoxyglucose-positron emission tomography (FDG-PET) demonstrated high FDG uptake (SUVmax 13.5) in the mass at the right lung apex (Fig. [1](#Fig1){ref-type="fig"}f). Bone scintigraphy and cerebral magnetic resonance imaging (MRI) showed no evidence of distant metastasis. The histopathological diagnosis of a bronchoscopic biopsy specimen was non-small cell lung cancer-suspected adenocarcinoma. The tumor was classified as cStage IIB (cT3N0M0). The patient was referred to our hospital for the treatment. We decided to perform neoadjuvant chemoradiotherapy followed by right upper lobectomy. Fig. 1Radiologic imaging of the chest. **a** Chest X-ray showed a tumoral shadow at the right apex of the upper-lung field. **b** Computed tomography (CT) of the chest (pulmonary window): a 56 × 30 × 25-mm mass was identified at the right superior sulcus. **c**, **d** Coronal chest CT (mediastinal window): the mass was suspected to have invaded the chest wall at the right first and second intercostal space and the subclavian vein. **e** Sagittal chest CT before chemoradiotherapy (mediastinal window). **f** Fluorodeoxyglucose-positron emission tomography (FDG-PET). The mass showed a high FDG uptake (SUVmax 13.5). **g** Chest CT (pulmonary window) performed after chemoradiotherapy revealed the remarkable reduction of the tumor. **h** Sagittal chest CT after chemoradiotherapy (mediastinal window). The reduction of the mass to 19.5 mm in long diameter was recognized. In addition, it seemed that the contact between the tumor and the chest wall had been released
We induced chemotherapy with cisplatin 80 mg/m^2^ on day 1, plus vinorelbine 20 mg/m^2^ on days 1 and 8. Two cycles of chemotherapy were scheduled every 21 days. Concurrent thoracic radiation therapy (40 Gy in 20 fractions of 2 Gy each) was performed. Chest CT after chemoradiotherapy indicated remarkable reduction of the tumor (Fig. [1](#Fig1){ref-type="fig"}g, h). Also, it revealed a partial response in which tumor volume decreased by 65.2% (Fig. [1](#Fig1){ref-type="fig"}h). In addition, most of the contact between the tumor and the chest wall was released (Fig. [1](#Fig1){ref-type="fig"}h). We assessed the patient at stage ycT1bN0M0 and ycStage IA2. The pain and paresthesia from the ulnar aspect of the right forearm to the little finger were much improved. The laboratory data showed that the CEA level had decreased to 6.9 ng/ml. Because there was no evidence of distant metastasis or local progression, we planned to perform right upper lobectomy 4 weeks after the completion of the chemoradiotherapy. Because chest CT after chemoradiotherapy indicated the remarkable shrinkage of the tumor, we decided to attempt thoracoscopic right upper lobectomy. When firm adhesion is observed between the tumor and chest wall, our policy is to perform open thoracotomy with chest wall resection.
The patient was positioned in the left lateral decubitus position. First, we observed the right thoracic cavity using a thoracoscopy through a 10-mm trocar in the sixth intercostal space on the midaxillary line. Because only partial adhesion of the chest wall apex was observed (Fig. [2](#Fig2){ref-type="fig"}a), we judged that tumor resection could be accomplished by complete VATS. We inserted a 7.5-mm trocar in the fourth intercostal space on the posterior axillary line and a 3-cm wound retractor in the same intercostal space on the anterior axillary line. Partial parietal pleurectomy was performed with the resection of the extra parietal pleural fatty tissue of the site of tumor adhesion (Fig. [2](#Fig2){ref-type="fig"}b). We confirmed that the extra parietal pleural fatty tissue was a safe margin, ensuring (by an intraoperative diagnosis) that it contained no viable cancer cells. Subsequently, we performed right upper lobectomy with lymph node dissection (ND2a-1) through complete VATS. Fig. 2Thoracoscopic views of the right superior sulcus. **a** Partial parietal pleural invasion of the apex chest wall. **b** Parietal pleurectomy at the site of tumor invasion and additional resection of the extra parietal pleural fatty tissue was performed by complete VATS. \*The site of tumor invasion of the chest wall. \*\*Apex of the right upper lobe. \*\*\*Superior vena cava
A postoperative pathological examination revealed no viable cancer cells in the resected tumor. The pathological effect of induction therapy was classified as a pathologically complete cell death, Ef 3. However, extensive fibrotic lesions with hyaline degeneration were confirmed in the resected specimen as the evidence of the effect of chemoradiotherapy. Parietal pleural invasion of the tumor was suggested on histopathological images of the resected specimen in which elastic fibers disappeared and were replaced by connective tissue. We reexamined the preoperative bronchoscopic biopsy specimen, which had been diagnosed as non-small cell lung cancer. A histopathological examination revealed the absence of morule formation (Fig. [3](#Fig3){ref-type="fig"}a). Immunohistochemistry revealed that the tumor cells were positive for p53 protein (Fig. [3](#Fig3){ref-type="fig"}b), oncofetal protein (SALL4 and Glypican3), and β-catenin (Fig. [3](#Fig3){ref-type="fig"}c--e). With respect to β-catenin staining, membranous expression patterns were observed (Fig. [3](#Fig3){ref-type="fig"}e). As for neuroendocrine markers, the specimen was positive for CD56 but negative for chromogranin A and synaptophysin. These immunohistochemistry results supported a pathological diagnosis of adenocarcinoma with fetal features (high grade). We decided not to perform adjuvant chemotherapy because of the pathological complete response to neoadjuvant chemoradiotherapy. Fig. 3On the histopathological examination, H-FLAC exhibits the absence of morule formation (**a**: H&E staining, × 100 objective lens). Immunohistochemically, the tumor cells were positive for p53 (**b**, × 200 objective lens), SALL4 (**c**, × 200 objective lens), and Glypican3 (**d**, × 200 objective lens). The tumor cells showed membranous staining of β-catenin (**e**, × 200 objective lens)
The patient was discharged without postoperative complications on the 14th day after the surgery. He receives clinical and radiologic assessments every 3 months. No recurrence was observed at 2 years of follow-up.
Discussion {#Sec3}
==========
We reported a case of adenocarcinoma with fetal features (high grade) invading the superior sulcus that showed a complete response to neoadjuvant chemoradiotherapy, which was followed by right upper lobectomy under complete VATS. This report suggests that neoadjuvant chemoradiotherapy may be effective for H-FLAC. We diagnosed the tumor in this case as adenocarcinoma with fetal features based on new criteria for adenocarcinoma in small biopsies and cytology of the 2015 WHO classification of lung tumors \[[@CR2]\]; according to the pathological definition of FLAC, the tumors are composed of columnar atypical cells arranged in a complex glandular pattern, the cytoplasm of which is vacuolated and clear due to the presence of glycogen. The histopathological and immunohistochemical findings in this case were consistent with the features of H-FLAC \[[@CR1], [@CR3]\]. Collectively, we recognized the diagnosis of the tumor as H-FLAC. Since H-FLAC often progresses to an advanced stage at presentation, it is known that the prognosis is poor in comparison to L-FLAC. Although there are no standard treatments for FLAC, complete surgical resection is the first choice of management for resectable cases, similarly to all subtypes of primary lung cancer \[[@CR4]\]. However, the benefit of chemotherapy and radiotherapy for FLAC is not well defined \[[@CR5]\]. In addition, the role of chemotherapy and radiotherapy in the neoadjuvant or adjuvant setting is not well known \[[@CR4]\]. Only a few cases of L-FLAC are reported to have been treated with neoadjuvant chemotherapy or adjuvant chemoradiotherapy \[[@CR6]--[@CR8]\]. Although there were few reports of neoadjuvant or adjuvant therapy for H-FLAC, Giusti et al. reported a case in which a multidisciplinary approach was used in the treatment of H-FLAC \[[@CR9]\]. They showed a case treated in a neoadjuvant setting with cisplatin plus docetaxel. However, the administration of carboplatin plus vinorelbine and radiotherapy in the adjuvant setting was performed separately because the pathological examination of the resected specimen showed a pathologic partial response. To our knowledge, our case is the first report of H-FLAC showing a pathologic complete response to neoadjuvant concurrent chemoradiotherapy. The reason why the cisplatin plus vinorelbine regimen showed a remarkable effect in our case was unknown. In addition, we could not determine whether this is the most effective regimen because of the small number of reports of neoadjuvant therapy for H-FLAC. Chemotherapy with concurrent radiotherapy may be effective for H-FLAC.
This report also suggests that superior sulcus tumors may be successfully resected by complete VATS lobectomy in cases in which neoadjuvant chemoradiotherapy showed a high degree of efficacy. Preoperative concurrent chemoradiotherapy is recommended as the standard treatment for resectable non-small cell lung cancer of the superior sulcus \[[@CR10]\]. However, the optimal regimen and irradiation dose have not been established. Cisplatin plus vinorelbine in preoperative chemotherapy with 40 Gy of radiation was used as neoadjuvant therapy in the present case because it has been reported to be effective for non-small cell lung cancer \[[@CR11]\]. It is known that the surgery for superior sulcus tumors generally involves the en bloc resection of the right upper lobe, chest wall, and nerve roots by the posterior approach or an anterior transcervical approach with a long L-shaped incision. Recently, the application of VATS-combined hybrid procedures has been reported in a small number of cases \[[@CR12], [@CR13]\]. However, these approaches involve invasive procedures such as rib resection or sternotomy. In the present case, neoadjuvant chemoradiotherapy achieved remarkable tumor reduction. It seems that this enabled the performance of complete VATS lobectomy as a minimally invasive surgical approach. Since the patient in this case had neurological complications, it was clear that the tumor had been affecting the C8 and T1 nerve roots. As the neurological symptoms disappeared due to the remarkable reduction of the tumor after the chemoradiotherapy, it is likely that the tumor had been compressing the nerve roots without direct infiltration of the nerves. Although tumor invasion of the parietal pleura was suggested on histopathological images of the resected specimen in which elastic fibers disappeared and were replaced by connective tissue, it seems that the tumor had not extended beyond the parietal pleura. The outcome of our case suggests that it may be possible to resect a superior sulcus tumor without bony thorax defects by complete VATS.
Conclusions {#Sec4}
===========
We reported an extremely rare case of adenocarcinoma with fetal features (high grade) invading the right superior sulcus, which showed a complete response to neoadjuvant chemoradiotherapy and which was successfully resected by complete VATS. However, the role of neoadjuvant chemoradiotherapy for H-FLAC is not well established. Although the complete resection of superior sulcus tumor without bony thorax defects by VATS alone may be possible after a good response to induction therapy, the optimal procedure remains to be established. This case provides and suggests a useful approach to the management of advanced-stage H-FLAC. More cases are needed to clarify the effects of this treatment method.
CEA
: Carcinoembryonic antigen
CT
: Computed tomography
FLAC
: Fetal adenocarcinoma
H-FLAC
: High-grade fetal adenocarcinoma
L-FLAC
: Low-grade fetal adenocarcinoma
MRI
: Magnetic resonance imaging
VATS
: Video-assisted thoracoscopic surgery
**Publisher's Note**
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Not applicable.
NT and SA performed the neoadjuvant chemoradiotherapy. KK and HY performed the operation. TM and TK performed the pathologic diagnosis. KK wrote the initial draft. KK and HY revised the manuscript. AM supervised the editing of the manuscript. All authors read and approved the final manuscript.
This research was not funded.
Data sharing is not applicable to this report as no datasets were created or analyzed during the current study.
Not applicable.
Informed consent was obtained from the patient for the publication of this report.
The authors declare that they have no competing interests.
|
Q:
Meteor client subscribe to a third-party API
There are a few examples of using Meteor with, say, Twitter API. Typical approach is to insert new tweets into Meteor Collection in the server, then let clients subscribe to this collection.
However, writing to database is costly, time consuming and unnecessary if I just want to display the new tweets on client there's no need to store these tweets in my database.
Is it possible for Meteor client to listen to Twitter directly, or at least avoiding writing new tweets to Meteor server database?
A:
Just talk to the Twitter REST API directly with Meteor.http.get or some other approach like jQuery's $.getJSON. You don't really need to build anything specifically with Meteor to talk with the Twitter API, but your app will obviously benefit from Meteor features like live templating if you do. Otherwise you'll have to patch things together yourself.
|
Q:
AWS Reducing RDS Instance size causes job to run longer
I recently reduced the size of one of our RDS instances from an r3.xlarge to an r3.large. Under usual load this is absolutely fine for this instance. We do however have a morning job that runs that is very IO intensive.
Strangely, since reducing the size of the instance we have seen disck IO and cpu utilization consistently lower than before.
I expected to see these metrics increase as we were running the same load with reduced hardware specs?
The most noticeable impact of this is that we have a job that previously completed in ~2 hours now running up to 9 hours+. Of course, I expected it to run slower, but not this exponential when it seems to be now under utilizing the resources available to it?
Does anyone have any ideas why this behaviour would manifest?
Many Thanks,
A:
As the table on this page makes clear, Amazon do throttle both absolute throughput to the EBS subsystem, and the number of IOPS an instance may make to it. They don't list every possible size of instance, but they list enough that it's clear that smaller VMs have less IO capacity available to them.
It is therefore unsurprising that when you moved an IO-limited job to a smaller VM, it took more time to complete.
|
Menu
Bid to smuggle 148 black scorpions to Bangkok foiled
Karachi—Sind Wildlife Department foiled a bid to smuggle 148 black scorpions to Bangkok at Karachi Airport on Tuesday. Game Officer Sindh Wildlife Department Rasheed Ahmed said that the Department during operation at Karachi Airport recovered 148 black scorpions from a box.
Rasheed Ahmed said that the recovered scorpions worth hundreds of thousand rupees in international market. The box was booked for Bangkok from Mirpur Khas by accused identified as Abdul Rehman. A case has been registered against culprit, investigation was in progress.
|
The first female pilot to head the US F-16 Viper demonstration team has been relieved of duty two weeks after landing the job amid much fanfare – a decision apparently spurred by concerns over her leadership abilities.
Captain Zoe ‘Sis’ Kotnik had been appointed as commander of the ACC F-16 Viper demo team just two weeks prior. The demonstration team performs at air shows and events across the country, showcasing the F-16’s capabilities.
Col. Derek O’Malley, commander of the 20th Fighter Wing, said in a Facebook post that he was dismissing Kotnik because he had “lost confidence in her ability to lead the team.”
“It was exciting to have the first female demo team pilot here at Shaw, but I’m also just as excited about the many other females that are serving with great distinction across our Air Force,” O’Malley said in his Facebook statement. He stressed that Kotnik was a “good person” and deserved to learn from her mistakes “without being under public scrutiny.”
Kotnik’s promotion came just weeks before the scheduled release of a new superhero film, Captain Marvel, which stars actress Brie Larson as an F-16 pilot – a coincidence that has raised suspicions on social media that there may be more to the story.
Revealingly, a tweet announcing Kotnik’s appointment on January 29 has a very superhero feel, with a photograph of the female captain rendered to look like a comic book panel.
“In that instant, she knew she could fly her F-16 higher, further and faster than anyone else,” the text under the photograph reads. The Air Force Times described the tweet as a “nod” to the upcoming superhero film.
Stay tuned throughout the day as we release more info about our new commander! pic.twitter.com/UbhNnDeVfd — F-16 Viper Demo Team (@ViperDemoTeam) January 29, 2019
According to the BBC, the USAF hopes to use the “buzz” around Captain Marvel to boost recruitment.
Some social media users expressed vexation with the announcement, accusing O’Malley of not being forthcoming about Kotnik’s sudden departure.
“It looks like you just want to throw her under the bus. Either give us the full truth, or quit dragging her through the mud with this BS,” wrote Facebook user Rebecca Brown.
If you like this story, share it with a friend!
|
Have you heard the saying that “Nigerians have no chill?” Well, that saying is truth in its every word, in fact like the Internet, Nigerians don’t forget and when it’s the right time, they’ll exercise their savagery skills on you.
This was what fell on Nigerian Banku singer, Mr. Eazi who tried being patriotic after a long time and Nigerians are having none of that! The singer, yesterday wished Nigeria a happy Independence Day, wishing the country peace, prosperity and unity on Twitter, but you know Savages live on Twitter and they took up his matter from there.
See The Hillarious Replies Below
The question now is, Do Nigerians hate Mr Eazi already?. Tell us what you think in the comment section..
|
Indole-2-carboxamides as allosteric modulators of the cannabinoid CB₁ receptor.
We synthesized new N-phenylethyl-1H-indole-2-carboxamides as the first SAR study of allosteric modulators of the CB(1) receptor. The presence of the carboxamide functionality was required in order to obtain a stimulatory effect. The maximum stimulatory activity on CB(1) was exerted by carboxamides 13 (EC(50) = 50 nM) and 21 (EC(50) = 90 nM) bearing a dimethylamino or piperidinyl group, respectively, at position 4 of the phenethyl moiety and a chlorine atom at position 5 of the indole.
|
Q:
JAVA_OPTS set in catalina.sh not working for TOMCAT private instance
I have placed JVM options via JAVA_OPTS in catalina.sh in the catalina base. However, the system doesn't pick those options--I am trying to pass profiling information to set paths for project properties and logging files. I have to set the options in setenv.sh in the private instance's bin. Even the echo command that I put in catalina.sh to view the JAVA_OPTS doesn't get printed-defaults like CATALINA_BASE,etc. do get printed. Is catalina.sh even being processed?
At the end of the day, my system works fine with setenv.sh. I am curious as to why JAVA_OPTS are not being picked up from catalina.sh.
I am using Ubuntu 12.04 with TOMCAT 7 installed and JDK 1.7.
Thanks
A:
You are not supposed to edit the catalina.sh file - it states so in that file. Instead, to set your environmental variables, create a setenv.sh file in the same directory where catalina.sh is (called CATALINA_BASE/bin) and write your code in it.
I had to set the JAVA_OPTS variable myself, and I created the bin/setenv.sh file, set it to executable chmod +x bin/setenv.sh and wrote in it:
JAVA_OPTS="$JAVA_OPTS -Xms128m -Xmx512m -server"
which set my initial allocated memory to 128 and max memory to 512 MB. And it was working.
|
/*
* RPubsUploader.java
*
* Copyright (C) 2020 by RStudio, PBC
*
* Unless you have received this program directly from RStudio pursuant
* to the terms of a commercial license agreement with RStudio, then
* this program is licensed to you under the terms of version 3 of the
* GNU Affero General Public License. This program is distributed WITHOUT
* ANY EXPRESS OR IMPLIED WARRANTY, INCLUDING THOSE OF NON-INFRINGEMENT,
* MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Please refer to the
* AGPL (http://www.gnu.org/licenses/agpl-3.0.txt) for more details.
*
*/
package org.rstudio.studio.client.common.rpubs;
import org.rstudio.core.client.CommandWithArg;
import org.rstudio.core.client.HandlerRegistrations;
import org.rstudio.core.client.StringUtil;
import org.rstudio.core.client.dom.WindowEx;
import org.rstudio.core.client.widget.OperationWithInput;
import org.rstudio.studio.client.application.Desktop;
import org.rstudio.studio.client.application.events.EventBus;
import org.rstudio.studio.client.common.GlobalDisplay;
import org.rstudio.studio.client.common.rpubs.events.RPubsUploadStatusEvent;
import org.rstudio.studio.client.common.rpubs.model.RPubsServerOperations;
import org.rstudio.studio.client.server.ServerError;
import org.rstudio.studio.client.server.ServerRequestCallback;
import org.rstudio.studio.client.server.VoidServerRequestCallback;
import org.rstudio.studio.client.workbench.views.vcs.common.ConsoleProgressDialog;
public class RPubsUploader
{
public RPubsUploader(
RPubsServerOperations server,
GlobalDisplay globalDisplay,
EventBus eventBus,
String contextId)
{
server_ = server;
globalDisplay_ = globalDisplay;
eventBus_ = eventBus;
contextId_ = contextId;
}
public void performUpload(final String title, final String rmdFile,
final String htmlFile, final String uploadId, final boolean modify)
{
// set state
uploadInProgress_ = true;
// do upload
if (Desktop.hasDesktopFrame())
{
performUpload(title, rmdFile, htmlFile, uploadId, null, modify);
}
else
{
// randomize the name so Firefox doesn't prevent us from reactivating
// the window programmatically
globalDisplay_.openProgressWindow(
"_rpubs_upload" + (int)(Math.random() * 10000),
PROGRESS_MESSAGE,
new OperationWithInput<WindowEx>() {
@Override
public void execute(WindowEx window)
{
performUpload(title, rmdFile, htmlFile, uploadId,
window, modify);
}
});
}
}
public void setOnUploadComplete(CommandWithArg<Boolean> cmd)
{
onUploadComplete_ = cmd;
}
public boolean isUploadInProgress()
{
return uploadInProgress_;
}
public void terminateUpload()
{
server_.rpubsTerminateUpload(contextId_,
new VoidServerRequestCallback());
if (uploadProgressWindow_ != null)
uploadProgressWindow_.close();
}
// Private methods --------------------------------------------------------
private void performUpload(final String title,
final String rmdFile,
final String htmlFile,
final String uploadId,
final WindowEx progressWindow,
final boolean modify)
{
// record progress window
uploadProgressWindow_ = progressWindow;
// subscribe to notification of upload completion
eventRegistrations_.add(
eventBus_.addHandler(RPubsUploadStatusEvent.TYPE,
new RPubsUploadStatusEvent.Handler()
{
@Override
public void onRPubsPublishStatus(RPubsUploadStatusEvent event)
{
// make sure it applies to our context
RPubsUploadStatusEvent.Status status = event.getStatus();
if (status.getContextId() != contextId_)
return;
uploadInProgress_ = false;
onUploadComplete(true);
if (!StringUtil.isNullOrEmpty(status.getError()))
{
if (progressWindow != null)
progressWindow.close();
new ConsoleProgressDialog("Upload Error Occurred",
status.getError(),
1).showModal();
}
else
{
if (progressWindow != null)
{
progressWindow.replaceLocationHref(status.getContinueUrl());
}
else
{
globalDisplay_.openWindow(status.getContinueUrl());
}
}
}
}));
// initiate the upload
server_.rpubsUpload(
contextId_,
title,
rmdFile == null ? "" : rmdFile,
htmlFile,
uploadId == null ? "" : uploadId,
modify,
new ServerRequestCallback<Boolean>() {
@Override
public void onResponseReceived(Boolean response)
{
if (!response.booleanValue())
{
onUploadComplete(false);
globalDisplay_.showErrorMessage(
"Error",
"Unable to continue " +
"(another publish is currently running)");
}
}
@Override
public void onError(ServerError error)
{
onUploadComplete(false);
globalDisplay_.showErrorMessage("Error",
error.getUserMessage());
}
});
}
private void onUploadComplete(boolean succeeded)
{
if (onUploadComplete_ != null)
onUploadComplete_.execute(succeeded);
eventRegistrations_.removeHandler();
}
private final GlobalDisplay globalDisplay_;
private final EventBus eventBus_;
private final RPubsServerOperations server_;
private boolean uploadInProgress_;
private String contextId_ = "";
private WindowEx uploadProgressWindow_ = null;
private CommandWithArg<Boolean> onUploadComplete_ = null;
public static final String PROGRESS_MESSAGE =
"Uploading document to RPubs...";
private HandlerRegistrations eventRegistrations_ =
new HandlerRegistrations();
}
|
Introduction {#sec1-1}
============
In this article, less frequent cardiac and extracardiac findings which may be encountered by interpreting physicians during viewing of myocardial perfusion single-photon emission computed tomography (SPECT) images are presented.
Radiolabeled Emboli {#sec1-2}
===================
Myocardial perfusion SPECT of a 40-year-old woman referred for evaluation of recent dyspnea. The stress image was unremarkable. The rest image was repeated later because of interfering intestinal activity. The delayed rest raw projections revealed unexpectedly a focal intense uptake around the right lung hilum just above the level of the heart, which was absent on the initial rest study. The patient experienced no acute symptom of dyspnea throughout the rest phase, during radiopharmaceutical injection or afterward. An unenhanced chest CT was subsequently performed which was negative for any pathology. These findings may be highly confusing to the interpreter or sometimes considered as a magical finding since there is no abnormality in other phases and also no corresponding lesion may be found during radiological imaging. Radiolabeled thrombotic pulmonary emboli dislodged from intravenous line or clot formation during injection is a major mechanism. It is worth noting that a radiolabeled clot embolus originated from an intravenous line can occur during injection or at any time postinjection, as in our patient, as a result of hand movement or unintentional pressure on intravenous line or injection site\[[@ref1][@ref2][@ref3][@ref4]\] \[[Figure 1](#F1){ref-type="fig"}\].
{#F1}
Transposition of Great Arteries {#sec1-3}
===============================
[Figure 2](#F2){ref-type="fig"} demonstrates the myocardial perfusion SPECT of a 59-year-old female patient who is a known case of congenitally corrected transposition of great arteries (TGA) or levo-TGA presented for preoperative evaluation before cholecystectomy. As can be seen, the left ventricle (LV) is remodeled, i.e., spherical in shape, and shows a nonuniform thickness of the myocardial walls representing as multiple perfusion defects. However, the invasive coronary angiography performed shortly thereafter, revealed normal epicardial coronary vessels. Levo-TGA is a rare congenital anomaly of the heart in which atrioventricular and ventriculoarterial discordance is present. The ventricle located on the right side shows the morphology of LV, i.e., conical in shape with thick walls. However, the opposite one demonstrates the morphology of right ventricle (RV), similar to that in dextrocardia. There might be progressive failure of the LV unrelated to coronary artery disease. The failure of LV results from inappropriate morphology of LV and thus not able to cope with the pressure load of the aorta and inadequate pumping power to circulate the blood systemically. In some occasion, the LV or morphological RV may become hypertrophied, therefore, more prominent on myocardial perfusion SPECT. This pattern is visualized different from that seen in dextrocardia. Though fixed or reversible perfusion defects may exist indicating myocardial infarction or ischemia of noncoronary origin, respectively. Taken together, a multimodality approach is recommended in such patients.\[[@ref5][@ref6][@ref7][@ref8][@ref9]\]
{#F2}
Breast Prosthesis {#sec1-4}
=================
Breast prosthetic implants are increasingly used either for esthetic reasons or for patients undergoing mastectomy following prior breast cancer. Silicone breast implants, lied on the LV during myocardial perfusion SPECT, impose more degree of attenuation on the photons emitting from the myocardium toward the detector than nonprosthetic breasts, the latter mainly composed of fatty tissue. Furthermore, in contrast to natural breast tissue which is easily moveable on the chest not to intervene the LV and the detector, and also compressible to flatten uniformly on the chest, prosthetic implants are rigid in structure and somewhat fixed in location. Maneuvers to overcome the attenuation effect of the breast on the LV would be limited. This issue causes interpretative and diagnostic impediments. Mostly, perfusion defects created are fixed or constant in severity and location from stress to rest phases. Anterior or anterolateral walls are mainly affected, like that seen in the myocardial perfusion SPECT of a 65-year-old female presented in Figure [3a](#F3){ref-type="fig"} and [b](#F3){ref-type="fig"}. Another useful feature of perfusion defects created by prosthetic implants is an abrupt transition across the boundary between the defect and normal myocardium (indicated by a small arrow in [Figure 3a](#F3){ref-type="fig"}. In general, the pattern of attenuation generated by prosthetic implants is more predictable, in terms of location and severity in both phases.\[[@ref10][@ref11]\]
{#F3}
Breast Tissue Uptake {#sec1-5}
====================
The glandular tissue in the breast, in most circumstances, takes up ^99m^Tc-methoxyisobutylisonitrile (MIBI) to a very low level. However, in other physiological or nonphysiological conditions, a much higher accumulation may be observed due to hormonal stimulation and tissue proliferation. A common cause of uptake in the breast is ongoing lactation. Occasionally, the uptake may be unilateral in one breast that is used for feeding of the infant. However, nonlactation related causes, for example, induced by medications or even physiological reasons, show a bilateral and symmetrical uptake as is noted in a 65-year-old woman \[[Figure 4](#F4){ref-type="fig"}\]. This issue does not bear a malign effect on the image quality but may signify a clinically important situation. However, workup for verifying malignant lesions is necessary, particularly in localized focal hyperactivities.\[[@ref12][@ref13][@ref14]\]
{#F4}
Pericardial Effusion {#sec1-6}
====================
Pericardial effusion (PF) is accumulation of fluid in the pericardial space. Various etiologies, infectious, or noninfectious have been identified for development of PF. In severe cases, symptoms like dyspnea may arise; but, in less severe ones, the condition may remain undiagnosed and discovered incidentally during cardiac or thoracic imaging. On myocardial perfusion SPECT, moderate to severe PFs may be observed as a photopenic halo around the whole heart on planar projections. However, the finding is more distinct in tomographic slices as that seen in [Figure 5](#F5){ref-type="fig"}.\[[@ref15][@ref16][@ref17]\]
{#F5}
Hiatal Hernia {#sec1-7}
=============
Hiatal hernia is a rare complication of gastrointestinal tract in that part of the stomach protrudes into the thoracic cavity through esophageal foramen of the diaphragm. Proximity to the LV may interfere with contouring of myocardial walls by segmentation and edge detection algorithms and thus, scaling artifact may arise. This finding may also be concerning of an intrathoracic neoplastic process. In [Figure 6](#F6){ref-type="fig"}, a large zone of activity accumulation is evident behind the LV in an 85-year-old woman without marked prior gastroesophageal complaint. Except the location of the activity behind the LV hinting at its nature, the finding should be confirmed with radiological modalities. Here, anterior and lateral radiographs of the chest revealed and confirmed the presence of a hiatal hernia.\[[@ref18][@ref19]\]
{#F6}
Hepatocellular Carcinoma {#sec1-8}
========================
Primary neoplastic lesions of the liver are not a rare occurrence. Mostly, because of intense uptake in the hepatic parenchyma, lesions with lower avidity for ^99m^Tc-MIBI are more likely to be noticed. In this, 76-year-old man with a known history of hepatocellular carcinoma and high levels of serum alpha-fetoproteins and cancer antigen 19-9 presented for a myocardial perfusion SPECT \[[Figure 7](#F7){ref-type="fig"}\]. In cinematic images, a zone with heterogeneously lower uptake compared to normal hepatic parenchyma was noted.\[[@ref20]\]
{#F7}
Ascites {#sec1-9}
=======
Patients with advanced hepatic failure and cirrhosis are occasionally referred for cardiac evaluation before operation for liver transplant. This is not a rare finding and do not interfere with the perfusion status of the LV myocardium. On projections of raw data \[[Figure 8](#F8){ref-type="fig"}\], a photopenic halo surrounds the liver, spleen, and bowels. Sometimes, loops of bowels may be seen as well separated. However, it is important to verify the presence of ascites mimics such as intraperitoneal dialysate.\[[@ref15][@ref16][@ref17][@ref18][@ref19][@ref20][@ref21]\]
{#F8}
Aortic Aneurysm {#sec1-10}
===============
A 73-year-old male was presented for cardiac assessment before operation for large abdominal aneurysm. The patient underwent a dipyridamole stress--rest myocardial perfusion SPECT. On raw cinematic display, a large intra-abdominal photon-deficient zone was observed, which correlated with the large aneurysm in abdominal aorta. Aortic aneurysms are a life-threatening condition affecting mostly the elderly and results in higher rates of morbidity and mortality if left untreated. Treatment options are surgical repair or placement of grafts. The diagnosis and preoperative evaluation are mainly based on anatomical modalities including CT. Rarely, a finding related to this problem may be found incidentally. This case emphasizes paying meticulous attention to photopenic defects in mid abdomen, particularly in patients without pertinent history\[[@ref22][@ref23]\] \[[Figure 9](#F9){ref-type="fig"}\].
{#F9}
Splenomegaly {#sec1-11}
============
A 74-year-old woman with a long history of chronic myeloid leukemia presented for a myocardial perfusion SPECT. During inspecting raw images \[[Figure 10](#F10){ref-type="fig"}\], a huge spleen with marked uptake was seen. The splenomegaly, itself, cause less interference with visual and semi-quantitative interpretation unless very close to the LV. Contrary to other causes of subdiaphragmatic activity in vicinity to the LV, the negative effect of this issue on LV inferior wall cannot be eliminated by routine strategies.\[[@ref24]\]
{#F10}
Polycystic Kidney Disease {#sec1-12}
=========================
Polycystic kidney disease (PCKD) is a rare autosomal dominant disorder that affects adults. Formation of numerous enlarging cysts causes progressive loss of function by replacing functional tissue in kidneys. When kidneys are severely involved, huge photopenic zones would be seen at the region of the kidneys, like those visible in myocardial perfusion SPECT \[[Figure 11](#F11){ref-type="fig"}\] of a 40-year-old woman who is an extreme case of PCKD, where the bowels are bilaterally pushed into the middle of the abdomen.\[[@ref25]\]
{#F11}
Declaration of patient consent {#sec2-1}
------------------------------
The authors certify that they have obtained all appropriate patient consent forms. In the form the patient(s) has/have given his/her/their consent for his/her/their images and other clinical information to be reported in the journal. The patients understand that their names and initials will not be published and due efforts will be made to conceal their identity, but anonymity cannot be guaranteed.
Financial support and sponsorship {#sec2-2}
---------------------------------
Nil.
Conflicts of interest {#sec2-3}
---------------------
There are no conflicts of interest.
|
Related Stories
A Kitchener judge sentenced James Parise Tuesday, to nine years in prison for the beating death of Catherine Todd last March.
With time already served, it means Parise will spend the next seven and a half years behind bars.
Lawyers for the defense and the Crown both suggested Parise, who pled guilty to manslaughter on Feb. 11, spend nine years in prison for killing Todd.
Prosecutor Vlatko Karadzic says the sentence is heavier than what is typically given in cases of manslaughter. However, he told the court the time fits the crime.
Karadzic added that Parise may not have meant to kill Todd, but he did go to extraordinary lengths to make sure the her body was never found.
Catherine Todd, known as Cathy to her friends and family, was killed in her apartment on Lorraine Avenue in Kitchener's Heritage Park neighbourhood.
Parise told the court he beat Todd to death in a drug-induced rage and then dumped her body in a landfill on Erb Street in Waterloo.
Waterloo Regional Police spent over six weeks searching that landfill, but they were unable to find Todd's body.
Daughter's body 'rotting away with the garbage'
"The word 'landfill' has a new meaning for me," Todd's mother told the court. "It is a place where my daughter's body is rotting away with the garbage."
Marlene Todd-Durrer struggled to read her victim impact statement on Tuesday. The elderly woman was one of five family members to speak before James Parise was sentenced. All said they find it hard to think about how Cathy Todd's body was thrown out with the trash.
"Right now, it is hard to get the images of what James Parise did to her out of my mind," said Todd's brother. Mike Todd hopes that, in time, he'll be able to remember his sister without thinking about her beaten, bloodied body.
"I am not sure I or my family will ever get out of the denial stage of grieving," said Todd's sister, Susie Johnson. "Visiting the dump and standing on the massive amounts of garbage is sadly the closest we get to Cathy after her death."
Parise apologizes for killing Todd
As the family testimonies were read, James Parise sat silently in the prisoner's box.
The twenty-six year old construction worker from Kitchener showed no sign of emotion until the Judge gave him the opportunity to speak.
"There's nothing I can say to take away the pain I've caused," Parise told the court. "I'm terribly sorry for what I've done."
For the first time since he was led into the courtroom, Parise glanced down at his hands. It wasn't much, but Judge Gary Hearn seemed to interpreted the brief action as a genuine sign of remorse.
"If there ever was a wake-up call for Mr. Parise, this is it," Judge Hearn said and suggested Parise seek counselling to control his anger and drug use.
The Judge agreed to the suggested nine year sentence, but made it clear that no sentence imposed by the court could bring Catherine Todd back to life.
|
Intratendinous rupture of the supraspinatus: anatomical and functional results of 24 operative cases.
The aim was to describe the natural history of intratendinous partial rotator cuff tears as well as the anatomical and clinical results of surgical treatment of a cohort of 24 patients. There were 14 men and 10 women with a mean age of 50 years. The right shoulder was involved in 17 cases. For 16 cases, a progressive history of shoulder pain was reported. Pre-operatively, a painful and positive Jobe's sign was observed in only 13 cases. Pre-operative mean absolute constant score was 63.52 points. Based on standard MRI, intratendinous lesions were diagnosed on the coronal view with hyper-signal within the tendon in the T2 FatSat sequence. No fatty infiltration was noted. Fourteen open and 10 arthroscopic repairs were performed. Patients were reviewed with clinical assessment and MRI. The final Constant score was 81.3 points with a mean gain of 18.5 points. Patients were back to work after a mean of 5.8 months and to sports after 6 months. The mean subjective result was of 8.9/10. Three cases of reflex sympathetic dystrophy were observed. Intratendinous tears of the supraspinatus tendon are rare and difficult to diagnose. Diagnosis relies on MRI (T2 FatSat). Trauma is not usually described. Chronic calcifying tendonitis may also contribute to the development of such tears. There is no associated fatty infiltration of the muscle. The Jobe's test is frequently painful or positive. Arthroscopic resection of the tendon insertion with reinsertion to the greater tuberosity seems to be the optimal treatment. Retrospective study, IV.
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<!-- NewPage -->
<html lang="en">
<head>
<!-- Generated by javadoc (1.8.0_162) on Wed Apr 01 15:58:21 SAST 2020 -->
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>S3 Stream Upload 2.1.0 API</title>
<script type="text/javascript">
tmpTargetPage = "" + window.location.search;
if (tmpTargetPage != "" && tmpTargetPage != "undefined")
tmpTargetPage = tmpTargetPage.substring(1);
if (tmpTargetPage.indexOf(":") != -1 || (tmpTargetPage != "" && !validURL(tmpTargetPage)))
tmpTargetPage = "undefined";
targetPage = tmpTargetPage;
function validURL(url) {
try {
url = decodeURIComponent(url);
}
catch (error) {
return false;
}
var pos = url.indexOf(".html");
if (pos == -1 || pos != url.length - 5)
return false;
var allowNumber = false;
var allowSep = false;
var seenDot = false;
for (var i = 0; i < url.length - 5; i++) {
var ch = url.charAt(i);
if ('a' <= ch && ch <= 'z' ||
'A' <= ch && ch <= 'Z' ||
ch == '$' ||
ch == '_' ||
ch.charCodeAt(0) > 127) {
allowNumber = true;
allowSep = true;
} else if ('0' <= ch && ch <= '9'
|| ch == '-') {
if (!allowNumber)
return false;
} else if (ch == '/' || ch == '.') {
if (!allowSep)
return false;
allowNumber = false;
allowSep = false;
if (ch == '.')
seenDot = true;
if (ch == '/' && seenDot)
return false;
} else {
return false;
}
}
return true;
}
function loadFrames() {
if (targetPage != "" && targetPage != "undefined")
top.classFrame.location = top.targetPage;
}
</script>
</head>
<frameset cols="20%,80%" title="Documentation frame" onload="top.loadFrames()">
<frame src="allclasses-frame.html" name="packageFrame" title="All classes and interfaces (except non-static nested types)">
<frame src="alex/mojaki/s3upload/package-summary.html" name="classFrame" title="Package, class and interface descriptions" scrolling="yes">
<noframes>
<noscript>
<div>JavaScript is disabled on your browser.</div>
</noscript>
<h2>Frame Alert</h2>
<p>This document is designed to be viewed using the frames feature. If you see this message, you are using a non-frame-capable web client. Link to <a href="alex/mojaki/s3upload/package-summary.html">Non-frame version</a>.</p>
</noframes>
</frameset>
</html>
|
Occurrence in various mammalian cells and tissues of the Ca 2+ activated protease specific for the intermediate-sized filament proteins vimentin and desmin.
Several mammalian cell lines propagated in suspension and monolayer culture and some normal and cancerous tissues from rat, hamster and cat were screened for the presence of the Ca 2+ activated protease specific for the intermediate-sized filament protein vimentin. Gel permeation chromatography on Sephacryl S-300 of postnuclear supernatants, and sucrose density gradient centrifugation of extracts from Triton X-100-resistant residual cell structures revealed the presence of the enzyme in all cells and tissues tested. Its apparent molecular weight amounted to 100 000. Except in the cases of a spontaneous rat lung tumour and a rat hepatocellular carcinoma induced by diethylnitrosamine, most of the enzyme was released into the postnuclear supernatant during cell or tissue extraction, indicating that it is of cytoplasmic origin. There was no correlation between the enzyme level and the vimentin content of cells and tissues. Rat and hamster liver as well as cat kidney, in which vimentin has not been detected by polyacrylamide gel electrophoresis, were relatively rich in the Ca 2+ activated protease. The experimental results point at the widespread, if not general, occurrence of the enzyme in mammalian cells.
|
"Every day 40 million people are going to hydrocarbon retail points to meet their demand, and 190 million people are getting the benefit of subsidies. India offers 1 lakh crore of bio-fuel and bio-energy business to the world," Pradhan said.
|
Application of the proteolytic enzyme papain in routine platelet serology.
The use of proteolytic enzymes is well established in red cell serology. These enzymes modify some antigen structures and remove sialic acid from the red cell membrane. Enzyme-sensitive structures have also been identified on the platelet membrane. The effect of papain, a proteolytic enzyme used widely in red cell serology, on the detection of various platelet alloantibodies was examined to determine its usefulness in platelet serology. Antisera with the specificities anti-HPA-la, -2b, -3a, -4a, -5a, -5b, and -Naka were examined. HLA antibodies were also included. All sera were tested by a solid-phase red cell adherence technique in parallel with untreated platelets (UP) and platelets treated with papain (PP) for 15 minutes at 37 degrees C. The reactivity of anti-HPA-2b was eliminated and that of anti-HPA-3a was either eliminated or almost eliminated with PP. Antisera specific for the other alloantigens tested reacted similarly or more strongly with PP compared with UP. These findings were confirmed by flow cytometry. The reactivity of HLA antibodies with PP was generally enhanced. Inactivation by papain of platelet alloantigens in the HPA-2 and HPA-3 systems, but not in other systems, may assist in resolving mixtures of platelet alloantibodies. Also, detection of weak antibodies of other specificities may be enhanced. The use of PP may be a simple and useful serologic tool for investigating platelet alloantibodies.
|
We recommend
Hair Dew
Details
this creamy, conditioning leave-in is light enough for every day. it's great on 'naked' hair immediately after a cleanse, or as a way to reinvigorate tired hair all the way through your hair care cycle.
for seriously protective hair experience, try using hair dew on moist hair (or over a quick spritz of one of our Juices herbal leave-ins) and then seal ends with one of the Sugar Pomades before gently manipulating hair into a protective style like braids, twists, or an updo. days of moisture, sheen, and hair happiness!
I GOT A LIL SAMPLE 2 FL OZ BOTTLE FROM MY FRIEND AND I ABSOLUTELY LOVE THIS PRODUCT I MUST GET ME SOME. THIS IS GONNA BE A PRODUCT I'M GONNA STICK WITH FOR SURE. THANK YOU (Posted on 7/19/14)
Very Happy Review by Shajay7
I live in Arizona and have very tight 3c 4a curls. The weather here is very hot and very dry and the water is very hard. Most of the products available here only coat the hair with oil without adding any moisture. The Oyin Hair Dew seems to be the only thing I've found that will keep my hair looking amazing. I use it at a leave in and daily moisturizer and in the Arizona winder and summer I'm very happy with this product!! (Posted on 7/16/14)
AMAZING Review by Luli
I was very nervous at first because everyone was saying that the smell was overwhelming and annoying but I think it smells delicious and the smell doesnt bother me at all. I love when i'm out somewhere and and the wind blows or something and this delicious scent from my hair products swirls around the room and i can see people around me sniffing the air and looking for the source of the amazing smell. I smell like oatmeal and cookies with hair dew. I have 3b curls on top and 3c curls underneath and this was an amazing detangler. it left my hair feeling soft and moisturized all day. (Posted on 7/5/14)
I love Hair Dew Review by Sophia
I'm back for more Hair Dew. This time, the liter size. I love this stuff! It is perfect for my 3C/4A hair. I use it every night before I put my hair up and my hair is so moisturized and soft. The scent is great too. Please keep this one in production... it's a hair MUST for me now. (Posted on 7/4/14)
Luv luv luv Review by Lizzy may
I put this on the shelf bcuz i'm a product junkie, But let let me tell you, I have not found anything more moisturizing than these products. (Posted on 7/3/14)
Amazing! Review by JoJo
This product is amazing! I've been natural for 4 years and at last I have found the perfect product for my 4A hair.
Thanks Oyin Handmade Hair Dew! (Posted on 6/30/14)
This stuff is instantly and lastingly conditioning. Review by Sepiamay
Incredibly softening and hydrating. It returned my natural coil and created waves. I love it! (Posted on 6/26/14)
Love at first Sight Review by Gifted1
I absolutely love this moisturizing lotion. I bought the mini however will definitely be ordering the largest size. My new transitioning kinky hair LOVE this moisturizer. It makes my thirsty hair so soft and manageabke. Thanks for using your expertise to make this awesome product. (Posted on 6/17/14)
loooooove Review by Nicole
This product leaves my hair so soft and moisturized. I've been natural for a year and it has taken me SO long to find a leave-in and now I have. I would deff recommend this to everyone. (Posted on 6/14/14)
Great product Review by Bee
I CANNOT get enough of this product! I use this under my leave in after a shower and I get INCREDIBLE softness, manageability, and my hair tangles seem to melt away! This product is also great under a styling butter for twist outs/braid outs as the definition and softness can't be beat! Also, I got this product two days after ordering it! What great service! Totally satisfied & will purchase again. (Posted on 6/6/14)
The Best…. Review by Silvercharmn4u
I have tried many products in my cabinet has narrowed down to just a few… The dew is the best especially for humidity and thick hair, this is the only thing that works on my hair. I know everyone hair is different, but this has been tested under the Florida hot and Humid and the Vegas Dry and Humid and has passed the test with flying colors. I am in love with this product and can't wait until it comes to a Target in Florida ….But in the meantime I guess I will continue to pay shipping costs because this is Must in my healthy hair journey……The BEST (Posted on 6/5/14)
Addictive Review by Tricia
I love Oyin's hair dew because it smells so good. Hair Dew keeps hair moisturized, I even use it in my wigs when brushing them. Great product to have in your linen closet. (Posted on 5/17/14)
Awesome. Review by Shurly
This hair moisturizer actually does as promised. I tried it on day 2 hair the first time, after I had coloured it the night before. My hair felt parched, but after putting this on in the morning my curls came back to life. It was wicked! I stretched my wash and go another 2 days with this product before I went for my curly cut/trim. My hairdresser even commented on how soft my curls were. If you haven't already put it in your shopping cart, I suggest you get on that :P (Posted on 5/3/14)
New Love Review by Vroni
I strongly suggest this product as my hair has never been softer and more manageable. I purchased it in the 5 pc snack pack, but will have to order more as I have a lot of hair. I use the Gregg Juice first, then the hair dew and seal with little of the pomade. (Posted on 4/23/14)
I love this company... Review by Lesh
Also, the shipping with Oyin Handmade is so good... I ordered this on a non-business day. It shipped out on Monday and got here on Tuesday. I live in Maryland, but it still flabbergasts me. I was so desperate and in need of this hair dew that the quick shipping near made me emotional. :') Some online-only natural hair companies are terrible at shipping soon and keeping customers updated, but not this one. (Posted on 3/30/14)
best leave in conditioner Review by Kam
l have relaxed hair and it's the best. I use it right before rollersetting and it leaves my hair bouncy and moisturized. It detangles on contact. Love this leave in! (Posted on 3/29/14)
Suggestion for Already-Great Product Review by Beeb
My hair always reacts very positively to this product. It does exactly what it says it will do. It refreshes and moisturizes for days instead of hours.
I do have one suggestion that would make the hair dew a staple part of my hair care regimen. I would lovingly suggest that you work on creating this same product with a variety of fragrances to choose from, or (at the very least) one other, lighter or fragrance free version. The smell of this wonderful product is the only thing that holds me back from using it as much as I would like to. For me, the scent is nice for a few minutes but quickly becomes overpowering as it lingers in the air. So yes definitely, it works very well but I am hesitant to use it because of the overly sweet fragrance. I hope for a lighter or non-fragrant choice. (I feel the same way about the whipped pudding, btw) (Posted on 3/26/14)
Love it! Review by Lesh
At first, when I opened up the seal on my first bottle to take a sniff, I wasn't too pleased with the smell. For a while I thought it was weird (and didn't like it). And it took me a while to realize that although the moisturizer wasn't what I was used to, it was amazing at moisturizing my hair without build-up, and keeping it soft and bouncy. I can use it to set my hair in Curlformers (which I do often; I can't speak for the hold because my hair is naturally great at holding a curl, but it keeps my hair moisturized, soft, and bouncy) or in braids, and I haven't tried it on bantu knots but I'm sure it would be just as great. It didn't quite do the job for my twist-outs, but I don't mind -- I have the Whipped Pudding for that. ;) I love how the product is all natural, and therefore I don't have to worry about anything harmful in it. In time, the smell grew on me as well. :D I wish it wasn't so expensive, but I understand that it's worth its value. Off to go stock up and buy the 1-Liter next! (P.S. -- someone somewhere said it smells like butter pecan. I agree. Also, my hair is a coarse, low-porosity, 4b/4a mix. If you want a closer view, check out curlonabudget.tumblr.com) (Posted on 3/21/14)
OMG! Yes Review by Ariel A. L.
I like slip when I use a leave-in conditioner, and I got more slip than I thought possible of any product. Therefore, I LOVE this product!
It made my freshly washed hair feel like 'dew.' And it definitely keeps my hair moisturized after drying and at least another day. (Posted on 3/12/14)
Moisture Madness Review by Ty
I don't write reviews, but this product is OUTSTANDING. This was not effective as a leave in for me, but as a refresher on dry hair before bed... This product is perfect. I can freshen and soften my hair daily in the winter. It's light enough to use generously (by the pump) and I seal with my home made oil mixture or raw Shea butter. My hair is 3c but very hard and stiff when dry. This product softens my hair right up and it lasts the whole day and sometimes 2. (Posted on 2/26/14)
Super Moisturizing! Review by Rosey J Hearts
The Hair Dew lotion is amazing!! It's extra moisturizing and slips through the hair very easily. I was surprised that I didn't have to spray my hair with water first to detangle my dry hair. Just using the lotion by itself naturally gave me the moisture that I needed to manage and style my hair.
I am in love with product and do plan to purchase it again! Thanks so much for this. I have finally found my staple leave-in. (Posted on 1/31/14)
moist but strong smell Review by Julie
I ordered a trial size hoping the smell had changed but its the same. It is just too strong. I like the moisture it provides but I can't get past the too strong smell. I really wish there were options for scents or unscented on this product. Also, when I got my last trial size it was not sealed all the way. 1/3 of the product ended up in the mailer. Very disappointing. (Posted on 1/31/14)
Love this for my girls Review by Tinisia
I use this to soften, detangle and to add moisture to my daughters hair. I love it!!!! My youngest has had less tears since I've been using this product. Thanks so much!!! (Posted on 1/20/14)
PJ Stops Here!!! Review by kuteNkurly
I am not sure why it took me so long to find Hair Dew but thank God I did!! I used to be a product junkie but this cured me. I have thick 4a-4b hair type and it used to stay so dry and to top it off I have sensitive skin so what ever I used caused me to break out. Enters Hair Dew and I have not had a problem with dryness or breakouts. At first I thought the smell would make me sick because I do not tolerate scents well. I was surprised that it was very suttle and I did not have an "allergy attack". If you are on the fence I would say jump you cannot go wrong at ALL with this product. I even use it when I straighten my hair. I mix a dab with my leave in and my hair is shiny and bouncy and stays hydrated until I wash again. Just buy it already!!! (Posted on 1/18/14)
hair dew Review by Harmony
I absolutely love this product I recently ordered a larger bottle I can't be without it..I finally found something that gives my hair( 4c )some life...5stars n my book Thank you Oyin.... (Posted on 1/17/14)
Very rich and Great Smell Review by Lex
Great for wet or damp hair. My hair smells like baked goods! (Posted on 1/13/14)
Enter stage left, our superhero, Hair Dew! Review by Amy
AMAZING. Where have you been all my life, Oyin? I have found the true love of my life. Oyin has stepped into my curly coils life on bended knee and came to my rescue. The life of a natural hair super-heroine is never smooth terrain.Trying out new products with such hope and aspiration that maybe, this one will work out. As you can imagine, the holy grail of products come a dime a dozen per marketing matchmakers and leave a gal like myself with unfulfilled hair. But once in a long while a product comes along and becomes my sidekick, ala Maddy to my Addison, Charlie to my Lucy, Huey to my Jasmine.
Virtually no buildup, rather no build-up. Light delish fragrance, moisture rich, all natural ingredients, locally made by a great business with a niche that certainly has made its place with my naturally curlys, big chops, and transitioners.
Bravo Oyin
P,s, Try their other products too...Funk Butter is the truth!
(Posted on 1/3/14)
Awesome Moisturizer Review by Gi Gi
I absolutely love this leave-in/moisturizer!!! I suffered from Protein overload and Oyin Hairdew came to the rescue. It only took one week to turn it around. I applied it to the length of my hair at night and covered it with a satin bonnet. Once I prepared my hair in the morning for work it was absolutely full of moisture!!! I highly recommend this product and will be repurchasing. Please don't change the formula!!! (Posted on 12/26/13)
Hands down GREAT product but pricing though??! Review by Ife
Beware this review is a bit long :)
It's Cyber Monday!! You immediately think great discount until I placed my order for the Hair Dew (1L) and after shipping I only saved $.15 cents. What a blow!! The hype was to much....I couldn't even save a dollar.
The product is absolutely amazing please never change the formula. My hair soaks it up. This is a staple for me and it is the ONLY water based leave in I use for my hair. And I love it.
The only downfall is the price. The price is rising and it's starting to bother me. The price rose to about 3 to 4 dollars more a bottle!! And then shipping is damn there almost 8 dollars. So all in all the total increase for ME at least, is about 11-12 dollars. I love you guys but you are starting to become like the rest.
You have a great product, people love it and you slowly start increasing the price little by little to the point where you wonder hmm should I be paying almost 40 dollars for a single hair product?
Also! your 16.9oz bottle used to be 500mL and it is now 475 mL?? I mean some may say it's petty but that's 25mL decrease in product (almost an oz) but I'm still charged more!!
I have told everyone I know about this product, and a few laugh when they see the price. No one is forcing anyone to buy the product but the price is becoming more of a burden. Especially shipping! $75 dollars for free shipping....ridiculous!
I have been using Hair Dew for two years now and I think I love it more and more after each use. I have really course 4C hair and Hair Dew gives it much love. Hair Dew is creamy, yet light weight and sooo moisturizing. Hair Dew is the Truth! (Posted on 11/29/13)
Holy Grail!! Review by Marie J.
OMG!! I love love love this product! It leaves my fine strands incredibly soft, easy to detangle and most importantly moisturized!! After a year and a half of being natural I have finally found something that actually keeps my hair moisturized without buildup and as an added bonus it smells delicious!! I use it as a leave in on damp hair and then seal in the moisture with their burnt sugar pomeade! What a winning combination! Thanks so much for creating such great products!! (Posted on 11/23/13)
Hair Dew Review by Gloria
I have been using this for a little while now and I absolutely love it!. It smells great and my hair is so soft. Please do not ever change the formula in this! I highly recommend this to everyone I know natural. I need to get a larger bottle next time! Thank you for a awesome product! (Posted on 8/9/13)
Moisture City! Review by Naya
Who's baking sweets? Yum! Oh wait, that's my hair. Hair dew, hair dew, hair dew. This product helped me discover what my hair really needed. My hair would often be dry as a desert and then I kept hearing about this company named Oyin. Hmm, why not give it a shot right? The hair dew left my hair super soft and when paired with Oyin's Burnt Sugar Pomade I got my first successful wash & go. I could even get awesome hair just paring it with water which was incredible! Definitely a highly recommended product. (Posted on 8/8/13)
Amazing!! Review by Leah Nicole
This is an amazing conditioner. I smells like baked goodies!!! Yum. I would not use this product alone or with just oil. It tends to make my hair dry. I found that this was best used whenever I would protective style. I would, on wet hair, use a little of this, some oil and a moisturizing styler on top. This kept my hair moisturized forever!! At least until I took it down which was about a week. Definitely worth the rebuy whenever I find the change. (Posted on 8/8/13)
Game Changer for Moisture Balance Review by Joanie
Only a few products are true game changers and this is definitely one. I placed my first order of Hair Dew on 1.11.11 and it has maintained the balance of moisture in my hair ever since. Natural for six years, I was a HUGE product junkie and dabbled in the leave-in/moisturizer options that other natural and non-natural brands offered. I found a cocktail of products that worked well, but I didn't know true moisture until the Hair Dew. My hair is a beautiful, fine mass of coils that flyaway in cold, humidity or when stretched. My hair now looks smoother, lustrous, has dark, crazy sheen and doesn't feel greasy. Jamyla and Pierre have somehow concocted the perfect combination of penetrating oils, humectants, and moisture to balance hair overtime without buildup. It works so well and so consistently that I even took it as my only hair product on a camping trip! Yes. I now use it in my weekly routine either alone, underneath stylers, or to refresh Kinky Curly sets. (Posted on 8/8/13)
Love, Love, And More Love! Review by Mikel
This product truly gives my kinky coily hair daily life! It is so light yet it gets the job done. (Posted on 8/7/13)
Dews and Don'ts Review by Lynn Renée
I can't say enough WONDERFUL things about Oyin's Hair Dew!!! Whenever my Wash and Go is more of a Wash and NO, Hair Dew to the rescue!!! I don't care how dry my hair is, a little spritz of Juices and Berries followed by Hair Dew makes all the little coilies down in Knotsville shout for joy!!! Please don't ever stop making this product!!! Gratitude Oyin!!!! (Posted on 8/7/13)
Love this! Review by Stephanie
This product works wonders on my daughter's hair. I use this daily and her hair looks so fresh! Two thumbs up!!! (Posted on 8/7/13)
HG MOISTURIZER Review by Jordan
This was the first and only product post big chop to provide my hair with amazing moisture that lasts! I bought the 16.9 oz bottle last October and my hair loves it. A little goes a long way. The moisturizer has a very creamy consistency but is not too thick, perfect for curlies who's hair does not like heavy products. The smell reminds me of vanilla cream and is absolutely divine. I would recommend this product to anyone who needs lasting moisture and wants serious shine and manageability. (Posted on 8/7/13)
Hair Dew- definitely a "do" for me! Review by Julie K.
I subscribe to CurlKit and usually the products made for African-American hair don't work on my fine, porous 3b white girl curls. My hair always looked oily or weighed down using these types of products, especially ones heavy in oils. I was very hesitant to try this stuff- but wow- was I glad I did. It smells like a candy store in heaven! It applied easily to my hair, made it so shiny and silky, AND allowed my curl to come out with no frizz withsoever! I feel like this product could work on ANY hair type. Great stuff!! (Posted on 8/7/13)
HEAVEN SENT!! Review by Stephanie D
When I first started using this product, my hair was so dry. Two years later and my hair has done a complete 360. Hair dew is so moisturizing but not oily at all. And the smell is AMAZING!!! I recommend it to all hair types and thank you Oyin for making such dope products!! (Posted on 8/7/13)
Awesome Hair Moisturizer! Review by LaTasha
I can't live without hair dew. This is by far one of my favorite Oyin products. I use it on my wet and dry hair daily. It's great for my two strand twists and leaves my hair looking really good. Sometimes after I wash my hair and twist with the dew and venture out I get wonderful compliments on my hair. Of course I have to tell them about Oyin and where to purchase hair dew. (Posted on 8/7/13)
Great every day moisturizer and leave in Review by kahlea
Great leave-in and every day moisturizer! I like to use this when im putting my hair up in a bun. It makes it soft and shiny when I take it down at the end of the day. Smells delicious and its light enough to use every day. (Posted on 8/7/13)
Best Hair Lotion on the Planet Review by Adrienne
This is my absolute favorite product from Oyin Handmade. I use Hair Dew for everything from my twist, to twist outs, to fluffy curls on sponge rollers. It adds the needed umph, or mositure my hair needs without weighing down my hair. And I can use it every day and it still isn't weighed down. When I don't use it you can tell, its dry and doesn't do what I need it to do. I've tried tons of other products but nothing has beat this one. I'm no longer a product junkie. #teamHairDew (Posted on 8/7/13)
Wont go with out it again. Review by Erika
Let' s talk about keeping your hair mouisturized. I have not been able to fine another product that will keep my hair soft mouisturized and does not weigh my hiar down. The moment I stopped isung this my hiar was dry and my ends started splitting as if their life depended on it. (Posted on 8/7/13)
I got waves to make ya SEASICK! Review by Calvin
Well, I don't know about the seasickness, but my waves are lookin' mighty fresh and ocean-like with Oyin Handmade's Hair Dew!
I use this leave-in conditioner on the daily for my 4A/4B hair, whether I'm rocking a buzzed Dark Caesar or sporting my waves and curls because I'm too lazy to get a haircut. Either way, my hair is sufficiently hydrated and super soft all day.
OH, you don't have it yet? Get it, right now! You won't regret your decision! (Posted on 8/7/13)
Multifaceted Awesome Conditioner Review by Onome-Ayo
This conditioner can be used so many different ways! I have 4a/4b hair and i use this as a leave in, styler, an sometimes as refresher. Great premium product! It makes my hair very soft and workable plus it smells great! (Posted on 8/7/13)
Great slip and moisture! Review by Shirley
I have fine to medium texture very thick low porosity hair, and it's difficult to find a leave-in conditioner that won't weigh down my hair and is also moisturizing. I'm a terrible product junkie, but I keep coming back to Oyin Handmade's Hair Dew because I always get good results. It also plays well with other products - no white film residue, etc. And has very good slip in application!!
I do wish there was an unscented version, it has a nice scent but sometimes my sinuses are not happy with any scents. 5 stars! (Posted on 8/7/13)
I Dew Review by Denise
Honey Dew + Hair = 4eva
If Melanie (my hair) could marry this leave in and be Melanie Dew she probably would. They are great together! haha but seriously, this is an awesome leave-in. It is so moisturizing, has major slip for detangling, and the moisture level remains even when my hair is completely dry after washing. Has the same slip (or better) than Kinky Curly Knot Today. And after a couple days, i just scrunch some into my ends and seal with an oil, and the moisture loving continues on through the week. Yeah, I dew. (Posted on 8/7/13)
Do the Dew Review by Tam
I received a sample size of Hair Dew from a local natural hair group event. To say I made that small bottle last is an understatement! It was so moisturizing for my hair and made it feel great. I was a fan for life from the first use. (Posted on 8/7/13)
Amazingggggggg Review by Kale
OMG I love this stuff can you say amazeballs for my ohhhh soooooo thirsty hair. This product is a God send and I will forver and a day be buying this stuff as long as OYIN still makes it. Yeahhhh buddy I love this stuff (Posted on 8/7/13)
Love it! Review by Danica
This is my favorite daily moisturizer! My 1 year old son, who has eczema, was unable to use anything in his hair but this. It has done wonders for his hair! We both use this daily and our hair is super soft and smells wonderful!!! (Posted on 8/7/13)
hair dew Review by Tolen
My hair type is 4z to the wtf power lol meaning it's absolutely terrible to deal with. I find that this is one of the rare products that actually works and moisturizes my hair. It feels nice and smells good too. (Posted on 8/6/13)
The smell alone is a reason to buy this product Review by ERIKA
I use this product as soon as I get out of the shower with my hair completely saturate with a little Honey Hemp Conditioner still left in my hair. I found that it is best to apply this product with my hair saturated and then, for definition and added moisture I add the pomade. (Posted on 8/6/13)
Nothing else like it Review by Bethany
My hair is very dry, especially between washings. The hair dew provides enough moisture without weighing my hair down. It plays well with all of my other products or I can use it alone. My hair is soft but not greasy. And it makes me want a bowl of Golden Grahams :) (Posted on 8/6/13)
A Must-Buy Review by Nell
This has been a part of my Holy Grail staples since I first tried it over a year ago. I love how multifunctional it is for my hair - it's a leave-in, a daily moisturizer, and sometimes I wear it as a stand-alone styler with the Burnt Sugar Pomade. It leaves my hair nice and soft. I love it! (Posted on 8/5/13)
Hair Dew Review by Andrea
I must say that I've been using the hair dew for 5 months now and I absolutely love this stuff. This is now a staple product of mine! Please don't change a thing this stuff is freakin awesome! (Posted on 8/5/13)
I should have gotten the larger size Review by K Porter
I love this stuff! It has run out and I regret not having ordered the larger size. It softens my daughter's hair, and moisturizes.
I love Hair Dew! Best product ever! It leaves my type 4 hair moisturized without leaving it too greasy. The scent isn't too overpowering and it lasts a long time. (Posted on 8/5/13)
great product! Review by Farrin Lampkin
I decided to give hair dew a try after watching a ton of reviews on youtube! After all of the great responses i had no choice but to purchase some! This is great as a leave in ,moisturizer and a great night time twisting agent..love it! (Posted on 8/5/13)
I love this stuff! Review by Cynthia
I love Hair Dew. I use this after a wash to do my final detangle. I consider it a deep conditioner that you don't rinse. The ingredients are amazing. My hair loves it. (Posted on 8/5/13)
great moisturizer Review by felicia
I love this as a leave-in under any of my gel stylers and a twist out refresher. Works with everything (except ecostyler but then again nothing works with ecostyler for me) And you can't beat the scent! (Posted on 8/5/13)
Great Refresher!!! Review by Anita M.
I love using this as a refresher especially when I have my hair in twists, braids or mini twists in my hair. I use it with their leave in sprays. Love it!!! Great product! (Posted on 8/4/13)
The smell! The soft! Review by Janean
Honey dew makes my hair so soft and manageable for the whole day. My hair gets very dry in between washes, and this product helps fight it! (Posted on 8/4/13)
Perfect for fine naturals Review by Alanna
I have fine natural hair and sometimes some moisturizers can be too heavy for my hair. This is light and perfect for the warmer weather months since it draws in moisture. It doesn't weigh down my curls either! (Posted on 8/4/13)
Hair Dew Review by Theresa B
Wow. That sums it up. The hair dew is a must have product. It smells like fresh baked cookies in a bottle. This is a every day product of choice for my hair. Not only does it smells delightful, but it moisturizes my hair like no other. I can rave all day about this!!! (Posted on 8/4/13)
Amazing! Review by Adria
When it comes to body and hair products, the scent is one of the most important things. Hands down, Hair DEW is the BEST smelling hair moisturizer I've ever tried. It smells like a batch of fresh sugar cookies! It also works great for daily moisturizer or twists. I will definitely keep this staple in my hair routine! (Posted on 8/4/13)
Staple Review by Alyscia
This is one of my staple products. Love the burnt sugar fragrance! It's great as a moisturizer, refresher, and leave-in. I have repurchased it several times and will continue to do so. (Posted on 8/4/13)
Love this stuff Review by Kenya
I have been using Hair Dew since it was first introduced on my hair and also my son's. It's a great leave in and every day moisturizer. It has been the only moisturizer that keeps my son's dry curls soft and moisturized all day. it also makes detangling and moisturizing my hair easy when I been neglectful and my hair is a dry tangled mess. Love this stuff! (Posted on 8/3/13)
I Finally Found It Review by Cricket
I ordered a small bottle of the Hair Dew from CurlMart and I fell in love. It made my hair so soft and moisturized for a week. I had to have more, so I ordered the 1 liter bottle and 2 mini bottles from Oyin. I gave the 2 mini bottles away to my natural friends and told them they had to try it. Now they LOVE it. I cannot be without this product. It is now my one and only leave-in / daily moisturizer. (Posted on 8/3/13)
Moisturizing perfection Review by Jeannie
My previous light moisturizer was suddenly nowhere to be found and I was trying several products as potential replacements when Hair Dew was suddenly available. It was exactly what I had been looking for.
Hair Dew has a liquid-silk consistency that absorbs quickly and easily. I use it liberally after washing when I twist my hair, and then during the week when I'm rocking my twist-out. I have even admitted to slathering it on my arms and legs when I can't find the lotion because there's no greasy after-feel. Like most Oyin products, Hair Dew has the heavenly scent of a fresh-baked dessert. So long as it keeps getting made, I'll keep buying. (Posted on 8/2/13)
The BEST for thick hair Review by Jalisa
I've been using this for a year and its the only leave in that doesn't sit on top of my hair but actually absorbs into it. The smell is wonderful but not overbearing and the consistency is creamy without being too heavy. PLEASE PLEASE PLEASE don't ever stop selling this!! (Posted on 8/2/13)
love it for my daughter Review by Rashonda
I use this stuff in my 6 year old daughter's hair. It moisturizes her hair, and leaves it soft for days. It smells good, and I love the fact that it doesn't have any harsh chemicals. (Posted on 8/2/13)
awesome moisturizer! Review by Leah
I have been using this product since I started caring for my natural hair 2 years ago and it has been an essential staple in my hair regimen ever since . I spray my ends with Greg Juice and then add a little bit of hair dew to the length of the hair strand before I go to bed each night. The Oyin hair dew penetrates the strands of my hair so that it doesn't build up and leaves my hair very soft the next morning. I love this stuff! (Posted on 8/1/13)
Awesome Review by Cricket
I ordered a small bottle of the Hair Dew from CurlMart and I fell in love. It made my hair so soft and moisturized for a week. I had to have more, so I ordered the 1 liter bottle and 2 mini bottles from Oyin. I gave the 2 mini bottles away to my natural friends and told them they had to try it. Now they LOVE it. I cannot be without this product. It is my one and only leave-in / daily moisturizer. (Posted on 7/31/13)
Wash and Go Heaven Review by Tacola Mae
My hair loves this after a wash and go.. which is the only style I ever wear! Do you remember that awful Pink Lotion your mom used on you when you were a lil nappy head? This reminds me of that stuff but natural and amazing and SO much better for you! Smells great and it's lighter than the other products (WP). (Posted on 7/31/13)
|
Analysis of the use of imipenem at a university hospital following the restructuring of an antimicrobial audit system.
This study analyzed the use pattern of imipenem following the restructuring of the antimicrobial audit system at a University Hospital. It was an observational study before and after the restructuring of the antimicrobial audit system in a University Hospital from May to August and then from September to December 2006. The criteria of the rational use of imipenem were obtained from a non-systematic revision of the literature. The collection of data on the general characteristics and clinical state of the patient, the infection and the established therapy was carried out in a previously tested instrument. Data was recorded, revised and analyzed in a database built with the software SPSS for Windows PC, version 10.0. The statistical analysis had a descriptive character: frequencies, mean, median and standard deviation. No differences were encountered in relation to the appropriate indication, consumption and clinical outcomes of patients. However, there was a reduction of 4 to 1 (75.0%) in the number of associations with spectrum superposition and an increase of 4 to 8 (50.0%) in the change of therapy. The restructuring of the antimicrobial audit system in the studied hospital did not reflect significantly the increase of the appropriate indication of imipenem. It contributed, however, to the reduction of the inappropriate associations of this antibiotic and to changes of therapy, without, however, compromising the quality of services rendered to patients.
|
Shahin Giray
Shahin Giray (c1585-1641) was an exiled member of the ruling house of the Crimean Khanate. Another Şahin Giray was the last Crimean khan.
Shahin was the son of Khan Saadet II Giray (reigned 1584) and the grandson of Khan Mehmed II Giray (reigned 1577-1584). His eldest brother was Devlet who was killed in 1601. His elder brother was the future Khan Mehmed III Giray (reigned 1623-1628). His mother was Es Turgan, the daughter of "Gazi Bey" (Mirza Kazi?) who founded the Lesser Nogai Horde around 1557.
Life
In 1584 İslâm II Giray (1584-1588) came to the throne by expelling and killing Shahin's grandfather Mehmed II. Mehmed's sons Saadet, Murad and Devlet fled to the steppe. Three months later Saadet invaded Crimea, made himself khan and was quickly driven out. Saadet fled east, intrigued with the Persians and Russians and died in 1587, probably poisoned by the Russians. Saadet's sons, in order by age, were Devlet, Mehmed (Mehmed III) and Shahin
Under Ğazı II Giray (1588-1607): Around 1594 the 10-year-old Shahin, his brothers and mother returned to Crimea. By around 1600 Gazi's kalga was the future Selyamet I and his nureddin was Devlet, Shahin's eldest brother. (The kalga and nureddin were second and third rank after the khan.) In 1601 Devlet was involved in a plot against Gazi and was killed. Shahin and Mehmed escaped. Selyamet soon came under suspicion and also fled. The three went to Turkey.
Under Selâmet I Giray (1608-1610): After Gazi's death the Turks placed Selyamet on the throne. He brought with him Mehmed and Shahin as his kalga and nureddin. This was dangerous since he had fought their father and grandfather. They began plotting, Janibek informed on them and Selyamet planned to kill them. They learned of the plan and fled to the Caucasus. They gathered troops and Selyamet appealed to the Turks. The Turks sent a diplomat, Rizvan Pasha, to Kaffa. He worked out a deal by which the brothers would be restored to their original positions. While returning to Crimea they learned that Selyamet had died. Mehmed reached Bakhchisarai, made himself khan with Shahin as kalga. Janibek fled to Rizvan Pasha at Kaffa. Mehmed marched on Kaffa. Janibek's brother Devlet went to Istanbul and Mehmed sent Haji-Koy to Istanbul with bribes. Selyamet had already bribed the viziers to support Janibek. Haji-Koy decided to take his bribes to the other side. Sultan Ahmed I approved Janibek and sent eight galleys with janissaries to Kaffa. Mehmed and Shahin fled to the steppes. Learning that the Turkish troops were leaving, the brothers invaded Crimea. Only part of the troops had left, the brothers were soundly defeated and fled to Budjak.
Under Canibek Giray (1610-1623): The 25-year old Shahin accompanied his brother Mehmed from Budjak to Istanbul and then returned to Budjak. At this time, under Khan Temir, the Budjak Horde was actively raiding Poland. Shahin brought so much loot to his men that he became more popular than the inactive Janibek. In 1614 Janibek marched against him, but he evaded the khan's army. Returning to Crimea, Janibek learned where Shahin was hiding. He sent a second army which was also evaded. Eventually the Turks got after him and he fled to the Caucasus (1614). He did not dare stay since Janibek had friends in the region, so he went south to the Persians. At first the Persians suspected that he was a spy, but he gradually gained thir trust. The Turks, who were then at war with Persia (Ottoman–Safavid War (1603–1618)), called Khan Janibek to fight the Persians. The campaign was a failure. The Turks blamed the Crimeans and the Crimeans blamed Shahin, accusing him of revealing Crimean secrets. Shahin was given charge of Crimean captives. He released the commoners. but was rather rough with the nobles.
In 1617, while Jannibek was away in Persia the Turks ordered Janibek's brother kalga Devlet to fight the Poles. Devlet had to hold part of his army in Crimea to guard against Shahin. It is possible that Shahin could have captured Crimea at this time if he had known about the shortage of troops. Around 1619 Shahin gathered troops from the Lesser Nogai Horde and planned to move on Crimea. Kalga Devlet sent a large army east and Shahin fled to the Kumyks.
Under Mehmed III Giray (1623-1628): When his brother came to the throne Shahin was in Persia. The Shah released him, guessing, correctly, that he would be anti-Turkish. He left Persia in late 1623, spent some time in the Caucasus and reached Crimea in May 1624. The Turks tried to remove Mehmed and Shahin was a major factor in the resistance. Shahin tried to protect Crimean independence by making an anti-Turkish alliance with Poland. In 1627 he made an enemy of Khan Temir. In 1628 he and his brother were overthrown. For a fuller account see Mehmed III Giray.
Under Janibek Giray,second reign (1628-1635) Mehmed and Shahin fled to the Zaporozhian Cossacks. In 1628 they returned with a Cossack army but the Cossacks fell to looting and abandoned the brothers to carry their loot home. In 1629 they tried again. This time Mehmed was killed and Shahin barely escaped with a few companions. He fled east to the North Caucasus, but the local rulers were afraid to help him, so he went south for a second time to Persia. The Shah welcomed him and offered troops, planning to push north of the Caucasus. Shahin made secret contacts with potential allies in Crimea and the north Caucasus. In the summer of 1632 Janibek found out and killed his agents. For some reason Shahin killed a Persian governor and was forced to flee to his father-in-law in Kumykia, taking with him a large amount of treasure. No one in the Caucasus dared to protect him so he tried the Turks at Azov. After various maneuvers he sailed from Azov to Kaffa to Istanbul (second half of 1633). Sultan Murad welcomed him and sent him to Rhodes where he might be used as a replacement khan.
Under Inayet (1635-1637) and Bahadir (1637-1641) In 1635 Janibek was overthrown and also exiled to Rhodes. When the 70-year old Janibek died in 1636 his treasures were given to Shahin. There seems to be little information about what Shahin did during his exile on Rhodes from 1633 to 1641. He began making contacts with friends in Crimea, something that Bahadir reported to the sultan. It is said that a certain stargazer predicted that great evils would be caused by a man with a bird’s name. (Shahin means 'falcon'.) For whatever reason, the sultan decided to execute him. To allay suspicions, he was invited to a feast by Nakkash-Mustafa Pasha, who was traveling by way of Rhodes to become the governor of Egypt. When Shahin arrived at the feast he was strangled.
Source and footnotes
Oleksa Gaivoronsky «Повелители двух материков», Kiev-Bakhchisarai, second edition, 2010, Volume 1: under Gazi: pp 350, 351, Volume 2: Under Selyamet: pp 29–30, Janibek's accession: pp 30–35, under first Janibek: pp 44,45,49,51,52; Mehmed III: pp 89-131; Second Janibek: pp 155-158,175-179; Bahadir:pp 249-251.
Category:Crimean Khanate
|
Q:
Problem with depth of field in specular reflection
The reflection is not correct in the bottom. As you can see everything around it is blurred, except for the reflection of the railing. How do I fix this? I'm using 2.8 and cycles for rendering.
A:
As far as I know, this is coherent with reality. The reflected picture is practically at the same distance (or a bit more) of the real railing.
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_SSL_SSL_INFO_H_
#define NET_SSL_SSL_INFO_H_
#include <stdint.h>
#include <vector>
#include "base/memory/ref_counted.h"
#include "net/base/net_export.h"
#include "net/cert/cert_status_flags.h"
#include "net/cert/ct_policy_status.h"
#include "net/cert/ct_verify_result.h"
#include "net/cert/ocsp_verify_result.h"
#include "net/cert/sct_status_flags.h"
#include "net/cert/signed_certificate_timestamp_and_status.h"
#include "net/cert/x509_cert_types.h"
#include "net/ssl/ssl_config.h"
namespace net {
class X509Certificate;
// SSL connection info.
// This is really a struct. All members are public.
class NET_EXPORT SSLInfo {
public:
// HandshakeType enumerates the possible resumption cases after an SSL
// handshake.
enum HandshakeType {
HANDSHAKE_UNKNOWN = 0,
HANDSHAKE_RESUME, // we resumed a previous session.
HANDSHAKE_FULL, // we negotiated a new session.
};
SSLInfo();
SSLInfo(const SSLInfo& info);
~SSLInfo();
SSLInfo& operator=(const SSLInfo& info);
void Reset();
bool is_valid() const { return cert.get() != nullptr; }
// Adds the SignedCertificateTimestamps and policy compliance details
// from ct_verify_result to |signed_certificate_timestamps| and
// |ct_policy_compliance_details|. SCTs are held in three separate
// vectors in ct_verify_result, each vetor representing a particular
// verification state, this method associates each of the SCTs with
// the corresponding SCTVerifyStatus as it adds it to the
// |signed_certificate_timestamps| list.
void UpdateCertificateTransparencyInfo(
const ct::CTVerifyResult& ct_verify_result);
// The SSL certificate.
scoped_refptr<X509Certificate> cert;
// The SSL certificate as received by the client. Can be different
// from |cert|, which is the chain as built by the client during
// validation.
scoped_refptr<X509Certificate> unverified_cert;
// Bitmask of status info of |cert|, representing, for example, known errors
// and extended validation (EV) status.
// See cert_status_flags.h for values.
CertStatus cert_status = 0;
// The ID of the (EC)DH group used by the key exchange or zero if unknown
// (older cache entries may not store the value) or not applicable.
uint16_t key_exchange_group = 0;
// The signature algorithm used by the peer in the TLS handshake, as defined
// by the TLS SignatureScheme registry
// (https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-signaturescheme).
// These correspond to |SSL_SIGN_*| constants in BoringSSL. The value is zero
// if unknown (older cache entries may not store the value) or not applicable.
uint16_t peer_signature_algorithm = 0;
// Information about the SSL connection itself. See
// ssl_connection_status_flags.h for values. The protocol version,
// ciphersuite, and compression in use are encoded within.
int connection_status = 0;
// If the certificate is valid, then this is true iff it was rooted at a
// standard CA root. (As opposed to a user-installed root.)
bool is_issued_by_known_root = false;
// True if pinning was bypassed on this connection.
bool pkp_bypassed = false;
// True if a client certificate was sent to the server. Note that sending
// a Certificate message with no client certificate in it does not count.
bool client_cert_sent = false;
// True if data was received over early data on the server. This field is only
// set for server sockets.
bool early_data_received = false;
HandshakeType handshake_type = HANDSHAKE_UNKNOWN;
// The hashes, in several algorithms, of the SubjectPublicKeyInfos from
// each certificate in the chain.
HashValueVector public_key_hashes;
// pinning_failure_log contains a message produced by
// TransportSecurityState::PKPState::CheckPublicKeyPins in the event of a
// pinning failure. It is a (somewhat) human-readable string.
std::string pinning_failure_log;
// List of SignedCertificateTimestamps and their corresponding validation
// status.
SignedCertificateTimestampAndStatusList signed_certificate_timestamps;
// Whether the connection complied with the CT cert policy, and if
// not, why not.
ct::CTPolicyCompliance ct_policy_compliance =
ct::CTPolicyCompliance::CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE;
// True if the connection was required to comply with the CT cert policy. Only
// meaningful if |ct_policy_compliance| is not
// COMPLIANCE_DETAILS_NOT_AVAILABLE.
bool ct_policy_compliance_required = false;
// OCSP stapling details.
OCSPVerifyResult ocsp_result;
// True if there was a certificate error which should be treated as fatal,
// and false otherwise.
bool is_fatal_cert_error = false;
};
} // namespace net
#endif // NET_SSL_SSL_INFO_H_
|
449 F.2d 277
Peter CASELLAv.UNITED STATES of America, Appellant.
No. 18447.
United States Court of Appeals,Third Circuit.
Argued June 24, 1971.Decided Sept. 29, 1971.As Amended Oct. 27, 1971.
D. William Subin, Asst. U. S. Atty., Camden, N. J. (Frederick B. Lacey, U. S. Atty., Newark, N. J., on the brief), for appellant.
Edward C. Toole, Jr., Clark, Ladner, Fortenbaugh & Young, Philadelphia, Pa., for appellee.
Before BIGGS, and VAN DUSEN, Circuit Judges, and KRAFT, District Judge.
OPINION OF THE COURT
BIGGS, Circuit Judge.
1
This is a proceeding brought by Casella pursuant to 28 U.S.C. Section 2255 to relieve himself of judgments of conviction and of sentence as set out hereinafter. He was indicted on a four count indictment1 filed April 15, 1958, along with Santore. It will be observed that Casella and Santore were indicted as principals but that an aider and abettor is liable as a principal pursuant to 18 U.S.C. Section 2.2 In the Casella-Santore trial, Marshall, a narcotics agent of the United States, testified that Santore told him and other narcotics agents that upon inquiry of Santore as to where were the cans of opium, Santore stated that "the opium was still being cooked down south, and not all the cans were ready for delivery." (Emphasis added). This was the only statement or "explanation", if the latter term may be justly used, respecting the origin of the drugs.
2
The Trial Judge (Madden, J.) after reciting in substance the four counts of the indictment, in charging the jury, stated: "[I]n common parlance * * * the first count is the count which charges the sale of narcotic drugs, the second count is the count which charges receipt, concealment or the buying of certain narcotic drugs, the third count charges the sale of narcotic drugs which weren't in the original stamped package, tax-stamp container, and the fourth count is the count which charges the sale of narcotic drugs not in pursuance of a written order form as designated by the United States Treasury Department."
3
As to 21 U.S.C. Section 174, Judge Madden went on to say: "[I] repeat what I consider the important portions of this statute, as it pertains to this case: 'Whoever * * * receives, conceals, buys, sells, or in any manner facilitates the transportation, concealment, or sale of any such narcotic drug after being imported or brought into the United States contrary to law, shall be * * * guilty. * * *' 'Whenever on trial for a violation of this subsection the defendant is shown to have or have had possession of the narcotic drug, such possession shall be deemed sufficient evidence to authorize conviction unless the defendant explains the possession to the satisfaction of the jury.' Congress, likewise, has seen fit to pass another section relating to the handling in proper fashion of narcotic drugs, and the prohibition of them. I am now reading from section 4704 of Title 26: 'It shall be unlawful for any person to purchase, sell, dispense, or distribute narcotic drugs except in the original stamped package or from the original stamped package; and the absence of appropriate tax paid stamps from narcotic drugs shall be prima facie evidence of a violation of this subsection by the person in whose possession the same may be found.' Now, another thing that Congress has forbidden is this, and I am now reading from Section 4705(a) of Title 26: 'It shall be unlawful for any person to sell, barter, exchange, or give away narcotic drugs except in pursuance of a written order of the person to whom such article is sold, bartered, exchanged, or given, on a form to be issued in blank for that purpose by the Secretary or his delegate.' That means the Secretary of the Treasury or his delegate. You know when you go to the doctor, and he prescribes a narcotic drug, he gives you a prescription on a blank piece of paper that he writes out. That is the form that is normally prescribed by the Secretary of the Treasury."
4
Judge Madden also said: "There has been considerable comment, ladies and gentlemen [of the jury], made that there is no showing that the defendant Casella ever had possession of the narcotics in question or that they were imported into the United States. I will now read to you section 2 of Title 18: 'Whoever commits an offense against the United States, or aids, abets, counsels, commands, induces, or procures its commission is a principal.' That means one who aids, abets, counsels, induces or procures another in the commission of a crime is just as guilty as one who actually performs the act. I have read to you the statute making one who aids, abets, counsels or procures another in the commission of a crime equally guilty as a principal, so, if you find that the defendant Santore had possession of the narcotics in question, and you further find that the defendant Casella had knowledge of Santore's conduct, and that Casella aided and abetted Santore in carrying on such enterprise, then he, Casella, would be legally held to have possession of the narcotics the same as Santore. This, then, if you so find, would bring into full force and effect that portion of the statute that I have previously read to you: 'Whenever on trial for a violation of this subsection, the defendant is shown to have or have had possession of the narcotic drug, such possession shall be deemed sufficient evidence to authorize conviction unless the defendant explains the possession to the satisfaction of the jury.' So, ladies and gentlemen, if you find that the defendants had possession of the drug, you will then consider whether the defendant or defendants have explained their possession to your satisfaction, as required under the statute, and not concern yourself with the question of importation of the drug3 into the United States unless such importation would play some part in the explanation made by the defendants. If the explanation of possession made by the defendants is sufficient to raise in your mind a reasonable doubt as to the guilt of the defendants, then they would be entitled to a verdict of acquittal."4 (Emphasis added.)
5
Nothing more was said by the Court in its charge relevant to the issues of importation or possession or presumptions related to possession by Santore.
6
Casella and Santore were found guilty on all counts and Casella was sentenced as appears from the judgment of sentence thus: "It is adjudged that the defendant is hereby committed to the custody of the Attorney General or his authorized representative for imprisonment for a period of 15 years on each of Counts 1 and 2, and on Counts 3 and 4 a term of ten years on each of said counts. It is the further Order of this Court that the sentence on Counts 1 and 2 be concurrent with each other, and the sentence on Counts 3 and 4 be concurrent with each other, but that the sentence on Counts 3 and 4, while concurrent with each other, shall be consecutive to the terms imposed on Counts 1 and 2. The said terms imposed hereunder of a total of 25 years shall be concurrent with the first 25 years of the sentence of 40 years imposed by the Honorable Gregory F. Noonan, Judge of the United States District Court for the Southern District of New York, on July 31st, 1958."5 Casella appealed to this court, principally on the ground of entrapment but the judgments of conviction were affirmed.6
7
In 1969 Casella filed the present Section 2255 motion to vacate the judgments of conviction and sentence imposed on him in 1959. After hearing the Trial Judge in the Section 2255 proceeding (Cohen, J.) ordered "that the judgment and sentence of * * * Casella on Criminal Indictment No. 151-58, be and the same are hereby vacated.",7 and further ordered "that he shall stand trial or otherwise plead to the aforesaid indictment."8
8
We have quoted the words of Agent Marshall in testifying to the statement made to him by Santore when all of the ordered cans of opium had not been delivered that the opium was still being cooked "down south".9 Judge Cohen addressed himself to the issue of importation, stating in part: "Certainly, the time interval confined the term 'south' to the southern portion of the United States and obviously not to the southern regions of China or Asia. See Marks v. United States, 196 F. 476 (2nd Cir. 1912) holding that the conversion of hard crude opium into a molasses-like substance fit for smoking by cooking within the United States was a manufacturing of the narcotic drug contrary to law. It would seem, then, that opium, and its derivative heroin, may well be manufactured within the United States, rather than merely imported from without, with or without the actual knowledge of the majority of users charged with its possession; further, that the problem of logical probability as a foundation for the statutory presumption of knowledge of illegal importation from mere possession in criminal cases still persists. In Erwing v. United States, 323 F.2d 674 (9 Cir. 1963), no proof was introduced to show cocaine hydrochloride was imported. However, extensive expert testimony was introduced at trial to the effect that all of the cocaine hydrochloride derived from coca leaves, a South American shrub, dispensed in California in the Los Angeles area came from domestic sources."10
9
As we read the record of the trial before Judge Madden and Judge Cohen's opinion in the Section 2255 proceeding, we think it is clear that both Judges viewed Santore's statement as some evidence of non-importation of the drugs and we conclude that they were correct in doing so. Judge Cohen also stated: "In the instant case the essential element of the guilty knowledge of illegal importation of narcotic drugs was predicated upon 'possession,' which in turn depended upon a finding of aiding and abetting one who did in fact have possession. * * *" 304 F.Supp. at 760. But Judge Cohen went further and concluded that the language quoted from Judge Madden's charge compelled the jury to find importation into the United States; in short, that the presumption of Section 174 was paramount and controlling and therefore no explanation could suffice to relieve Santore of a guilty mind, his mens rea being established as a matter of law, and hence Casella's as an aider and abettor.
10
Judge Cohen cited in support of his position Leary v. United States, 395 U.S. 6, 89 S.Ct. 1532, 23 L.Ed.2d 57 (1969), in particular at 45, n. 92, 53-55, and 21 U.S.C. Section 176a, which he thought presented a view which properly could be analogized to Casella's case and therefore controlled it in Casella's favor. His citations from the Leary opinion are not irrelevant but Judge Cohen did not have the advantage of the opinion of the Supreme Court in Turner v. United States, 396 U.S. 398, 90 S.Ct. 642, 24 L.Ed.2d 610, decided January 20, 1970.11 In the Turner case, Mr. Justice White stated for the Court at 405-407, 90 S.Ct. at 646, under heading "II.", as follows: "We turn first to the conviction for trafficking in heroin in violation of Sec. 174. Count 1 charged Turner with (1) knowingly receiving, concealing, and transporting heroin which (2) was illegally imported and which (3) he knew was illegally imported. See Harris v. United States, 359 U.S. 19, 23, 79 S.Ct. 560, 3 L.Ed.2d 597 (1959). For conviction, it was necessary for the Government to prove each of these three elements of the crime to the satisfaction of the jury beyond a reasonable doubt. The jury was so instructed and Turner was found guilty.
11
"The proof was that Turner had knowingly possessed heroin; since it is illegal to import heroin or to manufacture it here, he was also chargeable with knowing that his heroin had an illegal source. For all practical purposes, this was the Government's case. The trial judge, noting that there was no other evidence of importation or of Turner's knowledge that his heroin had come from abroad, followed the usual practice and instructed the jury-as Sec. 174 permits but does not require-that possession of a narcotic drug is sufficient evidence to justify conviction of the crime defined in Sec. 174.
12
"The jury, however, even if it believed Turner had possessed heroin, was not required by the instructions to find him guilty. The jury was instructed that it was the sole judge of the facts and the inferences to be drawn therefrom, that all elements of the crime must be proved beyond a reasonable doubt, and that the inference authorized by the statute did not require the defendant to present evidence. To convict, the jury was informed, it 'must be satisfied by the totality of the evidence irrespective of the source from which it comes of the guilt of the defendant. * * *' The jury was obligated by its instructions to assess for itself the probative force of possession and the weight, if any, to be accorded the statutory inference. If it is true, as the Government contends, that heroin is not produced in the United States and that any heroin possessed here must have originated abroad, the jury, based on its own store of knowledge, may well have shared this view and concluded that Turner was equally well informed. Alternatively, the jury may have been without its own information concerning the sources of heroin, and may have convicted Turner in reliance on the inference permitted by the statute, perhaps reasoning that the statute represented an official determination that heroin is not a domestic product.
13
"Whatever course the jury took, it found Turner guilty beyond a reasonable doubt and the question on review is the sufficiency of the evidence, or more precisely, the soundness of inferring guilt from proof of possession alone. Since the jury might have relied heavily on the inferences authorized by the statute and included in the court's instructions, our primary focus is on the validity of the evidentiary rule contained in Sec. 174." (Notes omitted and emphasis added.)12
14
Judge Madden need not have charged the jury at all on the inferences to be drawn from possession of the drugs; he could have remained completely silent as was held permissible in Turner. Casella's contention, however, is that instead of remaining silent he gave a charge which withdrew from the jury the determination of one essential element of the crime, namely, whether Casella had knowledge of illegal importation. We so construe the charge. Judge Madden therefore committed fundamental constitutional error in the light of the Sixth and Fourteenth Amendments.13
15
The error went to the fact finding process and therefore Judge Cohen was correct in retroactively obliterating the judgments of conviction on Counts I and II. Cf. Bannister v. United States, 446 F.2d 1250 (3 Cir. 1971).
16
In respect to Counts III and IV Judge Cohen ruled that the underlying statutes, 26 U.S.C. Secs. 4704(a) and 4705(a), were unconstitutional in light of Leary v. United States, 395 U.S. 6, 89 S.Ct. 1532, 23 L.Ed.2d 57 (1969).
17
Specifically in respect to Count III, Section 4704(a) has been held constitutional by this court in United States v. Clark, 425 F.2d 827 (1970) and Wilson v. United States, 426 F.2d 246 (1970).14 Casella, however, argues on appeal that it was fundamental error for Judge Madden to merely recite verbatim the words of Section 4704(a) without explanation. While we think that it would have been the preferable course for Judge Madden to have elaborated on the meaning of this statute in the context of the case, particularly since he went into some explanation of the other statutes involved in the indictment, we cannot deem the error to charge as suggested by Casella's counsel in this court to be of such fundamental nature as to require reversal.
18
With respect to Count IV the Supreme Court in an opinion filed subsequent to Judge Cohen's opinion held that 26 U.S.C. Sec. 4705(a) was constitutional. Minor v. United States, 396 U.S. 87, 90 S.Ct. 284, 24 L.Ed.2d 283 (1969). The judgments on Count IV must stand. No assumption or presumption or inference was relevant, nor was the charge in any way improper or not justified in law. There was ample evidence to enable the jury to find beyond a reasonable doubt that Santore sold the drugs without employing the form required for that purpose the drugs without employing the form required for that purpose by the Secretary of the Treasury or by his delegate. Casella aided and abetted that transaction.
19
Casella made a vigorous argument but one which we have had difficulty in grasping in respect to the aiding and abetting statute set out in note 2, supra. He seems to contend that the provisions of Section 2 should not and cannot apply where guilt from possession may be inferred under Section 174 or Section 4704(a). It is not necessary, however, in the light of our decision to determine such an issue.
20
The judgments caused to be entered by Judge Cohen on Counts I and II will be affirmed, but the judgments entered by him on Counts III and IV will be reversed. The case will be remanded with directions to reinstate the judgments of conviction and sentence on Counts III and IV.
21
We thank this court's appointed counsel, Edward C. Toole, Jr., Esquire, for his careful, thoughtful work on behalf of his client.
1
As follows:
COUNT I
That on or about the 23rd day of January, 1958, in the Township of Washington, County of Gloucester, State and District of New Jersey,
PETER CASELLA and JAMES SANTORE
did fraudulently, knowingly and feloniously sell certain narcotic drugs, to wit, 172 ounces, 35 grains of heroin and four jars containing opium, gross weight 49 ounces, 36 1/2 grains, after the same had been fraudulently, knowingly, and unlawfully imported and brought into the United States contrary to law, the said PETER CASELLA and JAMES SANTORE then and there well knowing the same to have been fraudulently, knowingly and unlawfully imported and brought into the United States contrary to law.
In violation of Section 174, United States Code, Title 21.
COUNT II
That on or about the 23rd day of January, 1958, in the Township of Washington, County of Gloucester, State and District of New Jersey,
PETER CASELLA and JAMES SANTORE
did fraudulently, knowingly and feloniously receive, conceal and buy certain narcotic drugs, to wit, 172 ounces, 35 grains of heroin and four jars containing opium, gross weight 49 ounces, 36 1/2 grains, after the same had been fraudulently, knowingly and unlawfully imported and brought into the United States contrary to law, the said PETER CASELLA and JAMES SANTORE then and there well knowing the same to have been fraudulently, knowingly and unlawfully imported and brought into the United States contrary to law.
In violation of Section 174, United States Code, Title 21.
21 U.S.C., Section 174, provides in pertinent part:
"Whoever fraudulently or knowingly imports or brings any narcotic drug into the United States * * * contrary to law, or receives, conceals, buys, sells, or in any manner facilitates the transportation, concealment, or sale of any such narcotic drug after being imported or brought in, knowing the same to have been imported or brought into the United States contrary to law or conspires to commit any of such acts in violation of the laws of the United States, shall be imprisoned not less than five or more than twenty years and, in addition, may be fined not more than $20,000. * * *
"Whenever on trial for a violation of this section the defendant is shown to have or to have had possession of the narcotic drug, such possession shall be deemed sufficient evidence to authorize conviction unless the defendant explains the possession to the satisfaction of the jury."
COUNT III
That on or about the 23rd day of January, 1958, in the Township of Washington, County of Gloucester, State and District of New Jersey,
PETER CASELLA and JAMES SANTORE
did knowingly, unlawfully and feloniously sell certain narcotic drugs, to wit, 172 ounces, 35 grains of heroin and four jars containing opium, gross weight 49 ounces, 36 1/2 grains, which were not in or from the original stamped package.
In violation of Section 4704(a), United States Code, Title 26.
26 U.S.C., Section 4704(a) provides in pertinent part:
"It shall be unlawful for any person to purchase, sell, dispense, or distribute narcotic drugs except in the original stamped package or from the original stamped package; and the absence of appropriate taxpaid stamps from narcotic drugs shall be prima facie evidence of a violation of this subsection by the person in whose possession the same may be found."
COUNT IV
That on or about the 23rd day of January, 1958, in the Township of Washington, County of Gloucester, State and District of New Jersey,
PETER CASELLA and JAMES SANTORE
did knowingly, unlawfully and feloniously sell certain narcotic drugs, to wit, 172 ounces, 35 grains of heroin and four jars containing opium, gross weight 49 ounces, 36 1/2 grains, which said sale was not made in pursuance of a written order of the person to whom such narcotic drugs were sold on a form issued in blank for that purpose by the Secretary of the Treasury of the United States or his delegate.
In violation of Section 4705(a), United States Code, Title 26.
26 U.S.C., Section 4705(a) provides in pertinent part:
"It shall be unlawful for any person to sell, barter, exchange, or give away narcotic drugs except in pursuance of a written order of the person to whom such article is sold, bartered, exchanged, or given, on a form to be issued in blank for that purpose by the Secretary or his delegate."
2
Section 2 follows:
"(a) Whoever commits an offense against the United States or aids, abets, counsels, commands, induces or procures its commission, is punishable as a principal.
"(b) Whoever willfully causes an act to be done which if directly performed by him or another would be an offense against the United States, is punishable as a principal."
3
The use of the singular word "drug" is not accurate because there were two drugs involved, opium and heroin, a derivative of opium, but the drugs, opium and heroin, named in all four counts were the same and it is not necessary to distinguish between opium and heroin in our decision in this case
4
Tr. 376-377
5
The appeals from the judgments of conviction in this case appear at United States v. Santore, 290 F.2d 51 (1960), cert. den. 365 U.S. 834, 81 S.Ct. 749, 5 L.Ed.2d 744 (1961)
6
United States v. Santore, 270 F.2d 503 (1959), cert. den. Casella v. United States, 361 U.S. 930, 80 S.Ct. 370, 4 L.Ed.2d 353 (1960)
7
In our view the order made by the Trial Judge vacated the four judgments of conviction and sentence on each of the four counts of the indictment. We can perceive no other interpretation of the words employed by the Trial Judge
8
The indictment at No. 151-58 is that set ont in note 1 of this opinion
9
A small semantic essay could be written on the word "south" and the phrase "down south." The noun "south" is described in Webster's New International Dictionary of the English Language, Second Ed., at "3" as "That part of the United States south of Mason and Dixon's line, the Ohio River, and the southern boundaries of Missouri and Kansas." As we all know, the chorus of "Dixie", by Daniel D. Emmett (1859) has a line "Away down south in Dixie." (Emphasis added.) See Song Dex Treasury of Humorous and Nostalgic Songs, p. 345. It would appear that the phrase "down south" has a well defined meaning and ordinarily at least describes the southern part of the United States. On the other hand, it can be argued that the word "south" in this case can mean any place on the compass south of Atlantic City, New Jersey
10
304 F.Supp. 756, at 762 (D.N.J.1969)
11
Judge Madden, of course, did not have Turner before him since the Santore-Casella trial had taken place more than a decade before that decision
12
Mr. Justice White stated in Turner at 403, 90 S.Ct. at 645: "The statutory inference created by Sec. 174 has been upheld by this Court with respect to opium and heroin. * * *"
13
We are informed by a letter from the Clerk of the United States District Court for the District of New Jersey to the Clerk of this court that the requests for charge of the parties and the transcript of the arguments of counsel to the jury "were never ordered by the defendant."
This material cannot now be procured for examination for the Clerk's letter informs us that Mr. Charles J. Degnan, Judge Madden's court reporter, "left the Government service in the spring of 1970 and at that time all his records which were ten years old or older were destroyed." Since Casella's counsel did not see fit to include in the record the transcription of the requests for charge and the arguments of counsel we treat this material as irrelevant. We point out that ten years had passed following Casella's conviction before the Section 2255 motion was filed.
14
At the time of his decision in the instant case Judge Cohen could not have had before him these decisions of this court
|
Application of tracers in studying free fatty acid metabolism of various organs in vivo.
A few selected examples are given of the application of radio-labeled fatty acids in studying substrate utilization under in vivo conditions. The flux of free fatty acids (FFA) may be calculated by the constant infusion technique of Armstrong et al. using either labeled palmitic or oleic acid. Utilization of FFA by the myocardium is conveniently studied by the constant infusion of 14C-labeled palmitate or oleate. The extraction ratio of these two fatty acids is very similar both in the case of myocardium and of several other tissues investigated. Using this technique not only the removal and oxidation of FFA may be calculated but also competition between the major substrates (FFA, lactate, ketone bodies) can be studied. Arterial FFA concentration, rate of coronary blood flow, and myocardial work are mentioned as some of the important factors influencing the rate of myocardial FFA utilization. The study of skeletal muscle metabolism employing labeled fatty acids is of great importance since release as well as uptake of FFA takes place across most muscle beds and thus net arteriovenous differences may be misleading. A somewhat similar situation also exists in the splanchnic region. Labeled fatty acids have also been utilized to investigate both the oxidation of FFA and their incorporation into brain lipids. Both the uptake and release of FFA may be followed in the adipose tissue by the use of labeled palmitate or oleate.
|
Q:
How to add lightning component to a navigation menu
I have created a lightning component and implemented forceCommunity:availableForAllPageTypes in the component tag.
We are using Customer Service Template. What I want is to add the component in the Navigation Menu. However I do not find any option for the same. Will it be possible to add the Component in the Navigation Menu?
A:
One can add the Lightning component to a Communities page and include that page in the navigation bar, but there is no way to directly add the component to the menu.
For info on adding components to Communities pages, see this page:
Configure Components for Communities
|
The Slovaks seem to be slaughthering the French over in Helsinki and the Czechs have an early lead against Belarus in Stockholm. Later tonight Finland plays Germany while Sweden takes on Switzerland. Canada's first game will be against Denmark tomorrow.
Went down to Stockholm last night and saw Sweden beat Belarus at the Stockholm Globe Arena.
Not great hockey, to tell the truth, but at least the good guys won.
Belarus played really well. They were of course the lesser skilled team, but played a very disciplined game, making it really hard for Sweden to accomplish anything. Then former Penguin Koltsov scored for them, making it even more of an uphill battle for Sweden.
Sweden seemed to lack a game plan. In general, they had better players than Belarus, but there was general confusion no tape to tape passes, no one was crashing the crease and every one subscribed to the pass rather than shoot mentality. Utterly frustrating to watch, as it was clear Sweden was the better team, but they had no freaking idea of how to use that to their advantage. The panalty kill was good though. It almost seemed like Sweden was creating more scoring chances when short handed than when even strength. Maybe because that was the only time Belarus stopped playing defense first?
Oh well, we got the three points for a regulation win, and in the end that's all that matters.
And in the Swiss department - they now also beat the Czechs!
So, the Swiss has faced Sweden, Canada and the Czech Republic, and beaten all three.
Whoda thunk, eh?
|
Nowadays, we take without any consideration that our desktop screens—and even our phones—will convey us photos in brilliant complete colour. electronic colour is a primary a part of how we use our units, yet we by no means supply a notion to the way it is produced or the way it got here about.
Chromatic Algorithms finds the interesting background at the back of electronic colour, tracing it from the paintings of some marvelous computing device scientists and experimentally minded artists within the past due Sixties and early ‘70s via to its visual appeal in advertisement software program within the early Nineteen Nineties. blending philosophy of expertise, aesthetics, and media research, Carolyn Kane exhibits how progressive the earliest computer-generated shades were—built with the big postwar number-crunching machines, those first examples of “computer art” have been so amazing that artists and desktop scientists seemed them as psychedelic, even innovative, harbingers of a higher destiny for people and machines. yet, Kane indicates, the explosive progress of non-public computing and its accompanying want for off-the-shelf software program resulted in standardization and the slow ultimate of the experimental box during which desktop artists had thrived.
Gilles Deleuze released radical books on movie: Cinema 1: The Movement-Image and Cinema 2: The Time-Image. enticing with a variety of movie types, histories and theories, Deleuze's writings deal with movie as a brand new kind of philosophy. This ciné-philosophy deals a startling new method of realizing the complexities of the relocating photo, its technical issues and constraints in addition to its mental and political results.
During this provocative paintings, Thomas Jovanovski offers a contrasting interpretation to the postmodernist and feminist examining of Nietzsche. As Jovanovski continues, Nietzsche’s written proposal is primarily a sustained pastime geared toward negating and superseding the (primarily) Socratic ideas of Western ontology with a brand new desk of aesthetic ethics - ethics that originate from the Dionysian perception of Aeschylean tragedy.
A brand new selection of essays by means of the across the world famous cultural critic and highbrow historian Martin Jay that revolves round the issues of violence and visuality, with essays at the Holocaust and digital fact, non secular violence, the paintings global, and the Unicorn Killer, between quite a lot of different subject matters.
A preliminary set of problems arises from the fact that each individual, and group of individuals, sees color differently. Several people may be exposed to the same object — a computer screen, a can of Coke, a translucent earthworm — from the same vantage point and under the same viewing conditions, and yet each will see the object in a unique way. This is because a person’s physiology, history, culture, and memory structure his or her visual perception. Visual responses to color also diversify across language, gender, and ethnic divides.
32 Color is dangerous because it is too potent and attractive, preventing one from turning away from it, yet also essential for life, vitality, and creation. To say that color is a pharmakon is to say that color is and has always been a kind of technology. So while my focus in the following chapters lies with computer-generated color, it is nonetheless crucial to note here that color of any kind is also always a matter of technics. That this has been acknowledged only in certain fields since the Industrial Revolution is beside the point.
Such a view allows pigment-based colors to concurrently act as symbols of pleasure, deception, and deceit. One may show one’s “true colors” in a moment of vulnerability, intimacy, or the expression of raw emotion, but just as easily one may hide behind a mask of colorful makeup and concealer. ”31 Color’s capacity to simultaneously conceal and reveal, or attract and repulse, invokes the ambivalence of the pharmakon. In critical theory the pharmakon is traditionally associated with the Phaedrus, where Socrates aligns it with the then-new technology of writing.
|
Pages
Tuesday, May 21, 2013
Swag Of The Day (part 4)
Wearing a new blazer/shirt release from Feel, some jewelry from Vexiin and a cool pair of sneakers from a store I just discovered recently called Rerty. The sneakers are HUD controlled and let you change between a clean and a dirty version. They give you some other wear options like an open or closed strap, too.
( => click
picture to enlarge !)
MESH (=>
If no SLURL is linked, click on the sidebar store logo for a
teleport!)
|
Q:
Simulating mouse clicks from service
I am looking forums for two days now and can't find the answer. I am new to android and i have a problem. I need to have a small server service in backround (which i have) that gets coordinates for example. With that coordinates i must simulate (make) a click on the active activity...
It should be service for controling the android from the computer. The computer client aplication sends some information like pressed key or mouse click and the service gets it and performs action on active activity.
Is there any way to do that , some example or something ? Thank you
A:
This is not possible due to obvious security risks.
|
An orbital floor brush machine is a device that includes a motor and an orbital brush. Tile brush is powered by the motor and rotated on a floor or other underlying surface. The orbital floor brush machine can consequently be used to clean the underlying surface. In addition, the orbital floor brush machine can be used for polishing. Further, the orbital floor brush machine can be used with a variety of cleaning and/or polishing compounds.
The orbital brush typically is circular or ring shaped. A ring-shaped orbital blush typically includes bristles only in a ring or rings around an outer edge of the orbital brush. Inner bristles may not be included on such a device because the speed of rotation of the inner bristles, especially those near the center of the brush, is very low compared to the rotational speed of the bristles near the outer edge of the orbital brush. As a result, the outer bristles do most of the work performed by the orbital floor brush machine. In addition, inner bristles are not used because they would increase the required rotational energy. As a result, inner bristles would make an orbital brush rotate more slowly. In addition, a reduced area force would be provided at each of the bristles.
The cleaning power and efficiency of the orbital floor brush machine is related to the number of bristles and/or bristle tufts. Bristle tufts comprise bundles of bristle fibers. The bundles of bristle fibers offer greater stiffness than the bristle fibers alone possess.
In an orbital floor brush machine, the size and/or stiffness of the individual bristles can be increased in order to improve the effectiveness of the orbital brush. In addition, the number of bristles in a bristle tuft or the compactness of a bristle tuft can be increased. However, this can in turn cause other problems. Increased bristle/tuft stiffness can increase rotational resistance of the orbital brush. This in turn can lead to a hopping of the orbital brush, greatly reducing overall effectiveness of the orbital floor brush machine. In addition, such hopping generates additional strain on the machine and can lead to mechanical failures and customer dissatisfaction.
|
---
author:
- 'N. Nardetto'
- 'E. Poretti'
- 'M. Rainer'
- 'A. Fokin'
- 'P. Mathias'
- 'R.I. Anderson'
- 'A. Gallenne'
- 'W. Gieren'
- 'D. Graczyk'
- 'P. Kervella'
- 'A. Mérand'
- 'D. Mourard'
- 'H. Neilson'
- 'G. Pietrzynski'
- 'B. Pilecki'
- 'J. Storm'
bibliography:
- 'bibtex\_nn.bib'
date: 'Received ... ; accepted ...'
title: |
HARPS-N high spectral resolution observations of Cepheids\
I. The Baade-Wesselink projection factor of $\delta$ Cep revisited[^1]
---
Introduction {#s_Introduction}
============
Since their period-luminosity (PL) relation was established [@leavitt1912], Cepheid variable stars have been used to calibrate the distance scale [@hertzsprung13] and then the Hubble constant [@riess11; @freedman12; @riess16]. The discovery that the $K$-band PL relation is nearly universal and can be applied to any host galaxy whatever its metallicity [@storm11a] is a considerable step forward in the use of Cepheids as distance indicators. Determining the distances to Cepheids relies on the Baade-Wesselink (BW) method, which in turn relies on a correct evaluation of the projection factor $p$. This is necessary to convert the radial velocity variations derived from the spectral line profiles into photospheric pulsation velocities [@nardetto04].
The projection factor of $\delta$ Cep, the eponym of the Cepheid variables, has been determined by means of different techniques, which we summarize here (see Table \[tab\_history\] and the previous review by @nardetto14b):
- Purely geometric considerations lead to the identification of two contributing effects only in the projection factor, i.e., the limb darkening of the star and the motion (expansion or contraction) of the atmosphere. @nardetto14b described this classical approach and its recent variations [e.g., @gray07; @hadrava09b].
[|l|l||l|]{} method & $p$ & reference\
\
centroid & 1.415 & @getting34\
centroid & 1.375 &@vanhoof52\
centroid & 1.360 &@burki82\
centroid & 1.328 &@neilson12\
\
bisector & 1.34 & [@sabbey95]\
Gaussian &1.27 $\pm$ 0.01 & @nardetto04\
cc-g ($Pp$) & 1.25 $ \pm$ 0.05 &@nardetto09\
\
cc-g & 1.273 $\pm$ 0.021 $\pm$ 0.050 &@merand05\
cc-g & 1.245 $\pm$ 0.030 $\pm$ 0.050 &@gro07\
cc-g &1.290 $\pm$ 0.020 $\pm$ 0.050 &@merand15\
cc-g ($Pp$) & 1.47 $\pm$ 0.05 &@gieren05\
cc-g ($Pp$) &1.29 $\pm$ 0.06 &@laney09\
cc-g ($Pp$) &1.41 $\pm$ 0.05 &@storm11b\
cc-g ($Pp$) &1.325 $\pm$ 0.03 &@gro13\
- To improve the previous method we should consider that Cepheids do not pulsate in a quasi-hydrostatic way and the dynamical structure of their atmosphere is extremely complex [@sanford56; @bell64; @karp75; @sasselov90; @wallerstein15]. Therefore, improving the determination of the BW projection factor requires a hydrodynamical model that is able to describe the atmosphere. To date, the projection factor has been studied with two such models: the first is based on a [*piston*]{} in which the radial velocity curve is used as an input [@sabbey95] and the second is a [*self-consistent*]{} model [@nardetto04]. @sabbey95 found a mean value of the projection factor $p=1.34$ (see also [@marengo02; @marengo03]). However, this value was derived using the bisector method of the radial velocity determination (applied to the theoretical line profiles). This makes it difficult to compare this value with other studies. As commonly done in the literature, if a Gaussian fit of the cross-correlated line-profile is used to derive the radial velocity RV$_\mathrm{cc-g}$ (“cc” for cross-correlated and “g” for Gaussian), then the measured projection factor tends to be about 11% smaller than the initial geometrical projection factor is found, i.e., $p=1.25\pm0.05$ [@nardetto09].
- As an approach entirely based on observations, @merand05 applied the inverse BW method to infrared interferometric data of $\delta$ Cep. The projection factor is then fit, where the distance of $\delta$ Cep is known with 4% uncertainty from the HST parallax ($d=274\pm11$ pc; @benedict02). They found $p=1.273\pm0.021\pm0.050$ using RV$_\mathrm{cc-g}$ for the radial velocity. The first error is the internal one due to the fitting method. The second is due to the uncertainty of the distance. @gro07 found $p=1.245\pm0.030\pm0.050$ when using almost the same distance (273 instead of 274 pc), a different radial velocity dataset and a different fitting method of the radial velocity curve. Recently, @merand15 applied an integrated inverse method (SPIPS) to $\delta$ Cep (by combining interferometry and photometry) and found $p=1.29\pm0.02\pm0.05.$ These values agree closely with the self-consistent hydrodynamical model. Another slightly different approach is to apply the infrared surface brightness inverse method to distant Cepheids (see [@fouque97; @kervella04b] for the principles) in order to derive a period projection factor relation ($Pp$). In this approach the distance to each LMC Cepheid is assumed to be the same by taking into account the geometry of LMC. This constrains the slope of the $Pp$ relation. However, its zero-point is alternatively fixed using distances to Cepheids in Galactic clusters [@gieren05], HST parallaxes of nearby Cepheids derived by @vl07 [@laney09; @storm11b], or a combination of both [@gro13]. @laney09 also used high-amplitude $\delta$ Scuti stars to derive their $Pp$ relation (see also Fig. 10 in [@nardetto14]). The projection factors derived by @laney09 and @gro13 are consistent with the interferometric values, while the projection factors from @gieren05 and @storm11b are significantly greater (see Table \[tab\_history\]).
- @pilecki13 constrained the projection factor using a short-period Cepheid ($P=3.80$ d, similar to the period of $\delta$ Cep) in a eclipsing binary system. They found $p=1.21\pm0.04$.
This non-exhaustive review shows just how complex the situation regarding the value of the BW projection factor of $\delta$ Cep is. This paper is part of the international “Araucaria Project”, whose purpose is to provide an improved local calibration of the extragalactic distance scale out to distances of a few megaparsecs [@gieren05_messenger]. In Sect. \[s\_HARPS-N\] we present new High Accuracy Radial velocity Planet Searcher for the Northern hemisphere (HARPS-N) observations. Using these spectra together with the @merand05 data obtained with the Fiber Linked Unit for Optical Recombination operating at the focus of the Center for High Angular Resolution Astronomy (CHARA) array [@ten05] located at the Mount Wilson Observatory (California, USA), we apply the inverse BW method to derive the projection factor associated with the RV$_\mathrm{cc-g}$ radial velocity and for 17 individual spectral lines (Sect. \[s\_BWinv\]). In Sect. \[s\_hydro\], we briefly describe the hydrodynamical model used in @nardetto04 and review the projection factor decomposition into three sub-concepts ($p = p_\mathrm{0} f_\mathrm{grad} f_\mathrm{o-g}$, @nardetto07). In Sect. \[ss\_BWinv\_model\], we compare the observational and theoretical projection factors. We then compare the hydrodynamical model with the observed atmospheric velocity gradient (Sect. \[ss\_grad\]) and the angular diameter curve of FLUOR/CHARA (Sect. \[ss\_RV\]). In Sect. \[s\_fog\] we derive the $f_\mathrm{o-g}$ quantity from the previous sections. We conclude in Sect. \[s\_conclusion\].
HARPS-N spectroscopic observations {#s_HARPS-N}
==================================
HARPS-N is a high-precision radial-velocity spectrograph installed at the Italian Telescopio Nazionale Galileo (TNG), a 3.58-meter telescope located at the Roque de los Muchachos Observatory on the island of La Palma, Canary Islands, Spain [@co12]. HARPS-N is the northern hemisphere counterpart of the similar HARPS instrument installed at the ESO 3.6 m telescope at La Silla Observatory in Chile. The instrument covers the wavelength range from 3800 to 6900 Å with a resolving power of $R \simeq 115000$. A total of 103 spectra were secured between 27 March and 6 September 2015 in the framework of the OPTICON proposal 2015B/015 (Table \[Tab\_log\]). In order to calculate the pulsation phase of each spectrum, we used $P=5.366208$ d [@engle14] and $T_0=2457105.930$ d, the time corresponding to the maximum approaching velocity determined from the HARPS-N radial velocities. The data are spread over 14 of the 30 pulsation cycles elapsed between the first and last epoch. The final products of the HARPS-N data reduction software (DRS) installed at TNG (on-line mode) are background-subtracted, cosmic-corrected, flat-fielded, and wavelength-calibrated spectra (with and without merging of the spectral orders). We used these spectra to compute the mean-line profiles by means of the least-squares deconvolution (LSD) technique [@donati97]. As can be seen in Fig. \[f0\], the mean profiles reflect the large-amplitude radial pulsation by distorting the shape in a continuous way.
The DRS also computes the star’s radial velocity by fitting a Gaussian function to the cross-correlation functions (CCFs). To do this, the DRS uses a mask including thousands of lines covering the whole HARPS-N spectral ranges. The observer can select the mask among those available online and the G2 mask was the closest to the $\delta$ Cep spectral type. As a further step, we re-computed the RV values by using the HARPS-N DRS in the offline mode on the Yabi platform, as in the case of $\tau$ Boo [@borsa15]. We applied both library and custom masks, ranging spectral types from F5 to G2. We obtained RV curves fitted with very similar sets of least-squares parameters showing only some small changes in the mean values. Table \[Tab\_log\] lists the $\mathrm{RV_\mathrm{cc-g}}$ values obtained from the custom F5I mask, also plotted in panel a) of Fig. \[f1a\_RVcc\] with different symbols for each pulsation cycle. The RV curve shows a full amplitude of 38.4 and an average value (i.e., the A$_0$ value of the fit) of $V_\gamma =-16.95$ . As a comparison, we calculate the centroid of the mean line profiles $\mathrm{RV_\mathrm{cc-c}}$ (“cc” for cross-correlated and “c” for centroid) and plot the residuals in panel b) of Fig. \[f1a\_RVcc\]. The $\mathrm{RV_\mathrm{cc-c}}$ curve has an amplitude 1.2 lower than that of the $\mathrm{RV_\mathrm{cc-g}}$ value. This result is similar to that reported in the case of $\beta$ Dor [Fig. 2 in @nardetto06a]. The implications of this difference on the projection factor is discussed in Sect. \[ss\_RVcc\].
Consistent with @anderson15a, we find no evidence for cycle-to-cycle differences in the RV amplitude as exhibited by long-period Cepheids [@anderson14; @anderson16]. We also investigated the possible effect of the binary motion due to the companion [@anderson15a]. Unfortunately, the HARPS-N observations are placed on the slow decline of the RV curve and they only span 160 days. We were able to detect a slow drift of $-0.5\pm0.1$ m s$^{-1}$ d$^{-1}$. The least-squares solution with 14 harmonics leaves a r.m.s. residual of 49 m s$^{-1}$. Including a linear trend did not significantly reduce the residual since the major source of error probably lies in the fits of the very different shapes of the mean-line profiles along the pulsation cycle (Fig. \[f0\]). We also note that surface effects induced by convection and granulation [@neilson14] could contribute to increasing the residual r.m.s. These effects are also observed in the light curves of Cepheids [@derekas12; @evans15; @poretti15; @derekas16].
[|lcrl|lcrl|]{}
BJD & $\phi$ & RV$_\mathrm{cc-g}$ & $\sigma_\mathrm{RV_\mathrm{cc-g}}$ & BJD & $\phi$ & RV$_\mathrm{cc-g}$ & $\sigma_\mathrm{RV_\mathrm{cc-g}}$\
2457108.765 & 0.53 & -9.6505 & 0.0004 & 2457174.601 & 0.80 & 2.8618 & 0.0009\
2457109.760 & 0.71 & -0.1170 & 0.0005 & 2457175.553 & 0.97 & -34.7911 & 0.0010\
2457112.747 & 0.27 & -23.4763 & 0.0003 & 2457175.554 & 0.97 & -34.8038 & 0.0009\
2457113.753 & 0.46 & -13.2657 & 0.0003 & 2457175.721 & 0.01 & -35.3598 & 0.0008\
2457137.747 & 0.93 & -29.1695 & 0.0016 & 2457175.722 & 0.01 & -35.3590 & 0.0008\
2457142.728 & 0.85 & -5.3965 & 0.0012 & 2457176.545 & 0.16 & -29.4283 & 0.0008\
2457143.703 & 0.04 & -34.6591 & 0.0008 & 2457176.546 & 0.16 & -29.4176 & 0.0008\
2457143.704 & 0.04 & -34.6507 & 0.0007 & 2457176.723 & 0.19 & -27.7502 & 0.0006\
2457144.709 & 0.22 & -25.9233 & 0.0006 & 2457176.724 & 0.19 & -27.7408 & 0.0006\
2457144.710 & 0.22 & -25.9144 & 0.0006 & 2457177.526 & 0.34 & -19.6200 & 0.0007\
2457145.712 & 0.41 & -15.7395 & 0.0003 & 2457177.527 & 0.34 & -19.6091 & 0.0007\
2457145.714 & 0.41 & -15.7263 & 0.0003 & 2457177.598 & 0.36 & -18.8642 & 0.0005\
2457146.695 & 0.59 & -6.5524 & 0.0007 & 2457177.599 & 0.36 & -18.8540 & 0.0006\
2457146.696 & 0.59 & -6.5400 & 0.0007 & 2457178.543 & 0.53 & -9.5137 & 0.0007\
2457147.726 & 0.79 & 3.0172 & 0.0012 & 2457178.544 & 0.53 & -9.5015 & 0.0008\
2457147.727 & 0.79 & 3.0182 & 0.0012 & 2457178.718 & 0.56 & -7.9788 & 0.0011\
2457148.704 & 0.97 & -34.7264 & 0.0007 & 2457178.720 & 0.56 & -7.9717 & 0.0020\
2457148.705 & 0.97 & -34.7357 & 0.0008 & 2457204.523 & 0.37 & -18.0216 & 0.0005\
2457153.719 & 0.90 & -22.7805 & 0.0016 & 2457204.524 & 0.37 & -18.0121 & 0.0005\
2457153.720 & 0.90 & -22.8391 & 0.0017 & 2457205.547 & 0.56 & -8.0510 & 0.0007\
2457154.659 & 0.08 & -32.9507 & 0.0028 & 2457205.548 & 0.56 & -8.0441 & 0.0007\
2457154.661 & 0.08 & -32.9407 & 0.0027 & 2457206.455 & 0.73 & 0.8814 & 0.0008\
2457156.745 & 0.47 & -12.6738 & 0.0016 & 2457206.457 & 0.73 & 0.8987 & 0.0007\
2457157.695 & 0.64 & -4.2804 & 0.0025 & 2457206.538 & 0.75 & 1.7037 & 0.0009\
2457157.697 & 0.64 & -4.2640 & 0.0023 & 2457206.539 & 0.75 & 1.7139 & 0.0009\
2457159.734 & 0.02 & -35.0911 & 0.0010 & 2457206.723 & 0.78 & 2.8518 & 0.0013\
2457159.735 & 0.02 & -35.0878 & 0.0010 & 2457206.724 & 0.78 & 2.8540 & 0.0015\
2457169.546 & 0.85 & -4.5949 & 0.0012 & 2457207.546 & 0.94 & -30.6013 & 0.0009\
2457169.547 & 0.85 & -4.6461 & 0.0013 & 2457207.547 & 0.94 & -30.6337 & 0.0009\
2457169.614 & 0.86 & -8.7664 & 0.0012 & 2457208.471 & 0.11 & -31.8710 & 0.0010\
2457169.615 & 0.87 & -8.8388 & 0.0014 & 2457208.472 & 0.11 & -31.8670 & 0.0010\
2457170.558 & 0.04 & -34.5581 & 0.0010 & 2457208.621 & 0.14 & -30.5734 & 0.0011\
2457170.559 & 0.04 & -34.5525 & 0.0009 & 2457209.466 & 0.29 & -22.3141 & 0.0008\
2457170.718 & 0.07 & -33.4392 & 0.0011 & 2457209.467 & 0.29 & -22.3028 & 0.0010\
2457170.719 & 0.07 & -33.4328 & 0.0011 & 2457209.708 & 0.34 & -19.8308 & 0.0006\
2457170.721 & 0.07 & -33.4184 & 0.0009 & 2457209.709 & 0.34 & -19.8196 & 0.0006\
2457170.721 & 0.07 & -33.4142 & 0.0008 & 2457210.515 & 0.49 & -11.7732 & 0.0009\
2457171.536 & 0.22 & -25.9946 & 0.0010 & 2457210.515 & 0.49 & -11.7647 & 0.0009\
2457171.540 & 0.22 & -25.9575 & 0.0009 & 2457210.623 & 0.51 & -10.7254 & 0.0008\
2457171.600 & 0.24 & -25.3673 & 0.0006 & 2457210.624 & 0.51 & -10.7162 & 0.0008\
2457171.602 & 0.24 & -25.3431 & 0.0006 & 2457255.670 & 0.90 & -22.2876 & 0.0014\
2457172.596 & 0.42 & -15.1771 & 0.0005 & 2457255.671 & 0.90 & -22.3447 & 0.0013\
2457172.598 & 0.42 & -15.1607 & 0.0005 & 2457255.745 & 0.92 & -26.4495 & 0.0010\
2457172.712 & 0.44 & -14.0256 & 0.0005 & 2457255.746 & 0.92 & -26.5002 & 0.0009\
2457172.713 & 0.44 & -14.0132 & 0.0005 & 2457255.748 & 0.92 & -26.6127 & 0.0010\
2457173.530 & 0.59 & -6.5085 & 0.0010 & 2457255.749 & 0.92 & -26.6636 & 0.0010\
2457173.532 & 0.60 & -6.4944 & 0.0010 & 2457255.751 & 0.92 & -26.7676 & 0.0010\
2457173.725 & 0.63 & -4.8069 & 0.0007 & 2457255.752 & 0.92 & -26.8161 & 0.0010\
2457173.726 & 0.63 & -4.7941 & 0.0007 & 2457270.699 & 0.70 & -0.9438 & 0.0008\
2457174.531 & 0.78 & 2.8942 & 0.0013 & 2457270.700 & 0.71 & -0.9308 & 0.0008\
2457174.535 & 0.78 & 2.8976 & 0.0014 & 2457271.731 & 0.90 & -20.0635 & 0.0007\
2457174.597 & 0.79 & 2.8737 & 0.0008 & & & &\
days & & & & days & & &\
[rlcccc]{}
No. & El. & Wavelength (Å) & Ep (eV) & $\log(gf)$\
1 & & 4683.560 & 2.831 & -2.319\
2 & & 4896.439 & 3.883 & -2.050\
3 & & 5082.339 & 3.658 & -0.540\
4 & & 5367.467 & 4.415 & 0.443\
5 & & 5373.709 & 4.473 & -0.860\
6 & & 5383.369 & 4.312 & 0.645\
7 & & 5418.751 & 1.582 & -2.110\
8 & & 5576.089 & 3.430 & -1.000\
9 & & 5862.353 & 4.549 & -0.058\
10 & & 6003.012 & 3.881 & -1.120\
11 & & 6024.058 & 4.548 & -0.120\
12 & & 6027.051 & 4.076 & -1.089\
13 & & 6056.005 & 4.733 & -0.460\
14 & & 6155.134 & 5.619 & -0.400\
15 & & 6252.555 & 2.404 & -1.687\
16 & & 6265.134 & 2.176 & -2.550\
17 & & 6336.824 & 3.686 & -0.856\
Inverse Baade-Wesselink projection factors derived from observations {#s_BWinv}
====================================================================
Using the cross-correlated radial velocity curve {#ss_RVcc}
------------------------------------------------
We describe the interferometric version of the BW method as follows. We apply a classical ${\chi}^{2} $ minimization
$$\label{chi2sum} {\chi}^{2} = \sum_{i}{\frac{(\theta_{\rm
obs}(\phi_{i}) - \theta_{\rm model}(\phi_{i}))^2}{\sigma_{\rm
obs}(\phi_{i})^2}},$$
where
- $ \theta_{\rm obs}(\phi_{i})$ are the interferometric limb-darkened angular diameters obtained from FLUOR/CHARA observations [@merand05], with $\phi_{i}$ the pulsation phase corresponding to the $i$-th measurement (Fig. \[f1b\_theta\]);
- $\sigma_{\rm obs}(\phi_{i})$ are the statistical uncertainties corresponding to FLUOR/CHARA measurements;
- $\theta_{\rm model}(\phi_{i})$ are the modeled limb-darkened angular diameters, defined as $$\label{diam_mod}
\theta_{\rm model}(\phi_{i}) = \overline{\theta} +
9.3009\,\frac{p_\mathrm{cc-g}}{d} \left(\int RV_\mathrm{cc-g}(\phi_{i})d\phi_{i}\right) [{\rm mas}],$$
where the conversion factor 9.3009 is defined using the solar radius given in @prsa16.
The $RV_\mathrm{cc-g}(\phi_{i})$ is the interpolated HARPS-N cross-correlated radial velocity curve shown in panel a) of Fig. \[f1a\_RVcc\]. It is obtained using the Gaussian fit, i.e., the most common approach in the literature. The parameters $\overline{\theta}$ and $p_\mathrm{cc-g}$ are the mean angular diameter of the star (in mas) and the projection factor (associated with the Gaussian fit of the CCFs), respectively, while $d$ is the distance to the star. The quantities $\overline{\theta}$ and $p_\mathrm{cc-g}$ are fit in order to minimize ${\chi}^{2}$, while $d$ is fixed to $d=272 \pm 3 (stat.) \pm 5 (syst.)$ pc [@majaess12].
We find $\overline{\theta}=1.466\pm0.007$ mas and $p_\mathrm{cc-g}=1.239 \pm 0.031$, where the uncertainty on the projection factor (hereafter $\sigma_\mathrm{stat-fluor}$) is about 2.5% and stems from FLUOR/CHARA angular diameter measurements. If we apply this procedure 10,000 times using a Gaussian distribution for the assumed distance that is centered at $272$ pc and has a half width at half maximum (HWHM) of $3$ pc (corresponding to the statistical precision on the distance of @majaess12), then we obtain a symmetric distribution for the 10,000 values of $p_\mathrm{cc-g}$ with a HWHM $\sigma_\mathrm{stat-d}=0.014$. If the distance is set to $277$ pc and $267$ pc (corresponding to the systematical uncertainty of $\pm5$ pc of @majaess12), we find $p=1.262$ and $p=1.216$, respectively. We have a systematical uncertainty $\sigma_\mathrm{syst-d}=0.023$ for the projection factor. We thus find $p_\mathrm{cc-g}=1.239\pm0.031$ ($\sigma_\mathrm{stat-fluor}$) $\pm0.014$ ($\sigma_\mathrm{stat-d}$) $\pm0.023$ ($\sigma_\mathrm{syst-d}$). These results are illustrated in Fig. \[Fig\_mcpinv\]. Interestingly, if we use the RV$_\mathrm{cc-c}$ curve in Eq. \[diam\_mod\] (still keeping $d=272$ pc), we obtain $p_\mathrm{cc-c}=1.272$ while the uncertainties remain unchanged.
The distance of $\delta$ Cep obtained by @majaess12 is an average of [*Hipparcos*]{} [@leeuw2007b] and HST [@benedict02] trigonometric parallaxes, together with the cluster main sequence fitting distance. If we rely on the direct distance to $\delta$ Cep obtained only by HST [@benedict02], i.e., $273\pm11$ pc, then $\sigma_\mathrm{stat-d}$ is larger with a value of $0.050$ (compared to 0.014 when relying on @majaess12). A distance $d=244~\pm~10$ pc was obtained by @anderson15a from the reanalysis of the [*Hipparcos*]{} astrometry of $\delta$ Cep. It leads to a very small projection factor $p_\mathrm{cc-g}=1.14\pm0.031\pm0.047$ compared to other values listed in Table \[tab\_history\].
Using the first moment radial velocity curves corresponding to individual spectral lines {#ss_RVci}
----------------------------------------------------------------------------------------
We use the 17 unblended spectral lines (Table \[Tab\_Lines\]) that were previously selected for an analysis of eight Cepheids with periods ranging from 4.7 to 42.9 d [@nardetto07]. These lines remain unblended for every pulsation phase of the Cepheids considered. Moreover, they were carefully selected in order to represent a wide range of depths, hence to measure the atmospheric velocity gradient (Sect. \[ss\_grad\]). For each of these lines, we derive the centroid velocity ($RV_{\mathrm c}$), i.e., the first moment of the spectral line profile, estimated as
$$\label{Eq_CDG}
RV_{\mathrm c} = \frac{\int_{\rm line} \lambda S(\lambda) d\lambda}{\int_{\rm line} S(\lambda) d\lambda}
,$$
where $S(\lambda)$ is the observed line profile. The radial velocity measurements associated with the spectral lines are presented in Fig. \[f1c\_RVci\]a together with the interpolated RV$_\mathrm{cc-g}$ curve. The RV$_\mathrm{c}$ curves plotted have been corrected for the $\gamma$-velocity value corresponding to the RV$_\mathrm{cc-g}$ curve, i.e., $V_\mathrm{\gamma}=-16.95$ . The residuals, i.e., the $\gamma$-velocity offsets, between the curves of Fig. \[f1c\_RVci\]a are related to the line asymmetry and the k-term value (see [@nardetto08a] for Cepheids and [@nardetto13; @nardetto14] for other types of pulsating stars). This will be analyzed in a forthcoming paper. The final RV$_\mathrm{c}$ curves used in the inverse BW approach are corrected from their own residual $\gamma$-velocity in such a way that the interpolated curve has an average of zero. The residual of these curves compared to the RV$_\mathrm{cc-g}$ and RV$_\mathrm{cc-c}$ curves are shown in panel b) and c), respectively. We then apply the same method as in Sect. \[ss\_RVcc\]. The measured projection factor values $p_\mathrm{obs}$($k$) associated with each spectral line $k$ are listed in Table \[Tab\_pf\]. The statistical and systematical uncertainties in the case of individual lines are the same as those found when using the RV$_\mathrm{cc-g}$ curve. The projection factor values range from $1.273$ (line 7) to $1.329$ (line 10), whereas the value corresponding to the cross-correlation method is $1.239$ (see Fig. \[Fig\_mcpinv\]). This shows that the projection factor depends significantly on the method used to derive the radial velocity and the spectral line considered. To analyze these values it is possible to use hydrodynamical simulations and the projection factor decomposition into three terms introduced by @nardetto07.
[|c|ccc||cc|]{} & &\
line & D$^{\mathrm{(a)}}$ & $p_\mathrm{obs \pm \sigma_\mathrm{fluor-stat} \pm \sigma_\mathrm{d-stat} \pm \sigma_\mathrm{d-syst}}$$^{\mathrm{(b)}}$ & $f_\mathrm{grad}$$^{\mathrm{(c)}}$ & $p_\mathrm{hydro}$$^{\mathrm{(d)}}$ & $p_\mathrm{0}$$^{\mathrm{(e)}}$\
line 1 & 0.281 $_\mathrm{ \pm 0.001 }$ & 1.287 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.983 $_\mathrm{ \pm 0.007 }$ & 1.307 & 1.360\
line 2 & 0.147 $_\mathrm{ \pm 0.001 }$ & 1.323 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.991 $_\mathrm{ \pm 0.004 }$ & 1.328 & 1.365\
line 3 & 0.348 $_\mathrm{ \pm 0.001 }$ & 1.280 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.979 $_\mathrm{ \pm 0.009 }$ & 1.304 & 1.369\
line 4 & 0.573 $_\mathrm{ \pm 0.001 }$ & 1.282 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.967 $_\mathrm{ \pm 0.014 }$ & 1.292 & 1.375\
line 5 & 0.297 $_\mathrm{ \pm 0.001 }$ & 1.297 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.982 $_\mathrm{ \pm 0.008 }$ & 1.309 & 1.375\
line 6 & 0.612 $_\mathrm{ \pm 0.001 }$ & 1.282 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.964 $_\mathrm{ \pm 0.015 }$ & 1.288 & 1.375\
line 7 & 0.562 $_\mathrm{ \pm 0.001 }$ & 1.273 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.967 $_\mathrm{ \pm 0.014 }$ & 1.272 & 1.376\
line 8 & 0.500 $_\mathrm{ \pm 0.001 }$ & 1.285 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.971 $_\mathrm{ \pm 0.012 }$ & 1.297 & 1.378\
line 9 & 0.364 $_\mathrm{ \pm 0.001 }$ & 1.307 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.979 $_\mathrm{ \pm 0.009 }$ & 1.302 & 1.383\
line 10 & 0.326 $_\mathrm{ \pm 0.001 }$ & 1.329 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.981 $_\mathrm{ \pm 0.008 }$ & 1.301 & 1.387\
line 11 & 0.429 $_\mathrm{ \pm 0.001 }$ & 1.295 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.975 $_\mathrm{ \pm 0.011 }$ & 1.304 & 1.385\
line 12 & 0.283 $_\mathrm{ \pm 0.001 }$ & 1.300 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.983 $_\mathrm{ \pm 0.007 }$ & 1.312 & 1.385\
line 13 & 0.290 $_\mathrm{ \pm 0.002 }$ & 1.294 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.983 $_\mathrm{ \pm 0.008 }$ & 1.304 & 1.386\
line 14 & 0.317 $_\mathrm{ \pm 0.002 }$ & 1.292 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.981 $_\mathrm{ \pm 0.008 }$ & 1.310 & 1.387\
line 15 & 0.497 $_\mathrm{ \pm 0.001 }$ & 1.280 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.971 $_\mathrm{ \pm 0.012 }$ & 1.290 & 1.389\
line 16 & 0.348 $_\mathrm{ \pm 0.001 }$ & 1.301 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.979 $_\mathrm{ \pm 0.009 }$ & 1.301 & 1.389\
line 17 & 0.366 $_\mathrm{ \pm 0.001 }$ & 1.323 $_\mathrm{ \pm 0.031 \pm 0.014 \pm 0.023 }$ & 0.978 $_\mathrm{ \pm 0.009 }$ & 1.297 & 1.390\
The line depth $D$ is calculated at minimum radius of the star.
The observational projection factors $p_\mathrm{obs}$ is derived from HARPS-N and FLUOR/CHARA interferometric data using the inverse BW approach (Sect. \[ss\_RVci\]).
The $f_\mathrm{grad}$ coefficient involved in the projection factor decomposition ($p = p_\mathrm{0} f_\mathrm{grad} f_\mathrm{o-g}$, @nardetto07) is derived from Eq. \[Eq\_grad2\] and Eq. \[Eq\_grad\_O\] (Sect. \[ss\_grad\]).
The inverse projection factors $p_\mathrm{hydro}$ is calculated with the hydrodynamical model (Sect. \[ss\_BWinv\_model\])
The modeled geometric projection factor $p_\mathrm{0}$ is derived in the continuum next to each spectral line. The $f_\mathrm{o-g}$ quantity, which is obtained using the projection factor decomposition ($f_\mathrm{o-g}= \frac{p_\mathrm{obs}}{p_{\mathrm{o}}\,f_{\mathrm{grad}}}$), is derived in Sect. \[s\_fog\].
Comparing the hydrodynamical model of $\delta$ Cep with observations {#s_hydro}
====================================================================
Our best model of $\delta$ Cep was presented in @nardetto04 and is computed using the code by @fokin91. The hydrodynamical model requires only five input fundamental parameters: $M=4.8\,\Mo$, $L=1995\,\Lo$, $\te=5877$ K, $Y=0.28$, and $Z=0.02$. At the limit cycle the pulsation period is $5.419$ d, very close (1%) to the observed value.
Baade-Wesselink projection factors derived from the hydrodynamical model {#ss_BWinv_model}
-------------------------------------------------------------------------
The projection factors are derived directly from the hydrodynamical code for each spectral line of Table \[Tab\_Lines\] following the definition and procedure described in @nardetto07. The computed projection factors range from $1.272$ (line 7) to $1.328$ (line 2). In Fig. \[f2a\_pf\] we plot the theoretical projection factors ($p_\mathrm{hydro}$) as a function of the observational values (listed in Table \[Tab\_pf\]). In this figure the statistical uncertainties on the observational projection factors, i.e., $\sigma_\mathrm{stat-fluor}$ and $\sigma_\mathrm{stat-d}$, have been summed quadratically (i.e., $\sigma=0.034$). The agreement is excellent since the most discrepant lines (10 and 17, in red in the figure) show observational projection factor values only about 1$\sigma$ larger than the theoretical values.
Atmospheric velocity gradient of $\delta$ Cep {#ss_grad}
---------------------------------------------
In @nardetto07, we split the projection factor into three quantities: $p= p_{\mathrm{o}}\,f_{\mathrm{grad}}\,f_{\mathrm{o-g}}$, where $p_\mathrm{0}$ is the geometrical projection factor (linked to the limb darkening of the star); $f_\mathrm{grad}$, which is a cycle-integrated quantity linked to the velocity gradient in the atmosphere of the star (i.e., between the considered line-forming region and the photosphere); and $f_\mathrm{o-g}$, which is the relative motion of the optical pulsating photosphere with respect to the corresponding mass elements.
We derive $f_{\mathrm{grad}}$ directly from HARPS-N observations. In @nardetto07, we showed that the line depth taken at the minimum radius phase (hereafter $D$) traces the height of the line-forming regions in such a way that the projection factor decomposition is possible. By comparing $ \Delta RV_{\mathrm{c}}$ with the depth, $D$, of the 17 selected spectral lines listed in Table \[Tab\_Lines\], we directly measure $f_\mathrm{grad}$. If we define $a_0$ and $b_0$ as the slope and zero-point of the linear correlation (the photosphere being the zero line depth),
$$\label{Eq_grad}
\Delta RV_{\mathrm{c}}= a_0 D + b_0,$$
then the velocity gradient correction on the projection factor is
$$\label{Eq_grad2}
f_{\mathrm{grad}}= \frac{b_0}{a_0D+ b_0}.$$
In @anderson16b the atmospheric velocity gradient is defined as the difference between velocities determined using weak and strong lines at each pulsation phase. In our description of the projection factor, $f_\mathrm{grad}$ is calculated with Eqs. \[Eq\_grad\] and \[Eq\_grad2\], i.e., considering the amplitude of the radial velocity curves from individual lines. In the following we thus refer to $f_\mathrm{grad}$ as a cycle integrated quantity.
In Fig. \[Fig\_grad\] we plot the HARPS-N measurements with blue dots, except for lines 10 and 17 for which we use red squares. These two values are about 2$\sigma$ below the other measurements, as already noted in Fig. \[f2a\_pf\]. After fitting all measured $\Delta RV_{\mathrm{c}}\mathrm{[obs]}$ with a linear relation we find
$$\label{Eq_grad_O}
\Delta RV_{\mathrm{c}}\mathrm{[obs]}= [2.86 \pm 0.84] D + [35.40 \pm 0.36]
.$$
The reduced $\chi^2$ is 1.4 and decreases to 1.1 if lines 10 and 17 are not considered (but with approximately the same values of $a_0$ and $b_0$). For comparison, the reduced $\chi^2$ is 2.5 if a horizontal line is fitted. The same quantities derived from the hydrodynamical model are shown in Fig. \[Fig\_grad\] ($\Delta RV_{\mathrm{c}}\mathrm{[mod]}$, magenta squares). The corresponding relation is $$\label{Eq_grad_M}
\Delta RV_{\mathrm{c}}\mathrm{[mod]}= [2.90 \pm 0.39] D + [32.84 \pm 0.13]
.$$
The slopes of Eq. \[Eq\_grad\_O\] and \[Eq\_grad\_M\] are consistent, while the theoretical zero-point is about 2.6 below the corresponding observational value, which means that the amplitudes of the theoretical radial velocity curves are 2.6 (or 7.8%) smaller on average. Such disagreement occurs because our code is self-consistent, i.e., the radial velocity curve is not used as an input like in a [*piston*]{} code, and because the treatment of convection in the code is missing which can slightly bias (by a few percent) the input fundamental parameters. The two- or three-dimensional models that properly describe the coupling between the pulsation and the convection [@geroux15; @houdek15] are currently not providing synthetic profiles, hence preventing the calculation of the projection factor. Therefore, we rely on our purely radiative hydrodynamical code (as previously done in [@nardetto04; @nardetto07]) to study the atmosphere of Cepheids. Its consistency with the spectroscopic and interferometric observables is satisfactory as soon as we consider a multiplying correcting factor of $f_\mathrm{c}=1.078$. Consequently, Eq. \[Eq\_grad\_M\] becomes
$$\label{Eq_grad_M_res}
\Delta RV_{\mathrm{c}}\mathrm{[mod]}= [2.90 D + 32.84] *f_\mathrm{c}.$$
The corresponding values are shown in Fig. \[Fig\_grad\] with light blue squares, and the agreement with observations is now excellent. If the theoretical amplitudes of the radial velocity curves are underestimated, why do we obtain the correct values of the projection factors in Sect. \[ss\_BWinv\_model\]? The answer is that the projection factor depends only on the ratio of pulsation to radial velocities. If the pulsation velocity curve has an amplitude that is 7.8% larger, then the radial velocity curve (whatever the line considered) and the radius variation (see Sect. \[ss\_RV\]), also have amplitudes that are 7.8% larger and the derived projection factor remains the same. Small differences in the velocity amplitudes between the RV$_\mathrm{cc-c}$ and RV$_\mathrm{c}$ curves (Fig. \[f1c\_RVci\]c) are due to the use of different methods and line samples (a full mask and 17 selected lines, respectively).
Angular diameter curve. {#ss_RV}
-----------------------
In Fig. \[fig\_ang\], we compare our best-fit infrared angular diameters from FLUOR/CHARA (same curve as Fig. \[f1b\_theta\]) with the photospheric angular diameters derived directly from the model assuming a distance of $d=272~$pc [@majaess12]. Following the projection factor decomposition, this photospheric angular diameter is calculated by integrating the pulsation velocity associated with the photosphere of the star. We consider this to be the layer of the star for which the optical depth in the continuum (in the vicinity of the 6003.012Å spectral line) is $\tau_c=\frac{2}{3}$. However, to superimpose the computed photospheric angular diameter curve on the interferometric one, we again need a correction factor $f_\mathrm{c}$. We find that the rescaled model (magenta open squares) is consistent with the solid line, which corresponds to the integration of the HARPS-N RV$_\mathrm{cc-g}$ curve (multiplied consistently by p$_\mathrm{cc-g}$). We rescaled the outputs of the hydrodynamical code, i.e., the atmospheric velocity gradient (Sect. \[ss\_grad\]), the radial velocity, and the angular diameter curves, by the same quantity $f_\mathrm{c}$ in order to reproduce the observations satisfactorily. This scaling leaves the hydrodynamical projection factors unchanged and in agreement with the observational values (Table \[Tab\_Lines\]). This can be seen using Eq. \[diam\_mod\]: if we multiply each part of this equation by $f_\mathrm{c}$, the result in terms of the projection factor is unchanged.
Determining $f_\mathrm{o-g}$ {#s_fog}
============================
The variable $f_{\mathrm{o-g}}$ is linked to the distinction between the [*optical*]{} and [*gas*]{} photospheric layers. The [*optical*]{} layer is the location where the continuum is generated ($\tau_c=\frac{2}{3}$). The [*gas*]{} layer is the location of some mass element in the hydrodynamic model mesh where, at some moment in time, the photosphere is located. Given that the location of the photosphere moves through different mass elements as the star pulsates, the two layers have different velocities, hence it is necessary to define $f_{\mathrm{o-g}}$ in the projection factor decomposition. The $f_\mathrm{o-g}$ quantity is independent of the spectral line considered and is given by
$$\label{Eq_pf_decomposition}
f_{\mathrm{o-g}} = \frac{p_\mathrm{obs}(k)}{p_{\mathrm{o}}(k)\,f_{\mathrm{grad}}(k)}\ ,$$
where $k$ indicates the spectral line considered. From the previous sections, we now have the ability to derive $ f_{\mathrm{o-g}}$. In Sect. \[s\_BWinv\], we derived the projection factors $p_\mathrm{obs}(k)$ for 17 individual lines. In Sect. \[ss\_grad\], we determined $f_{\mathrm{grad}}(k)= \frac{b_0}{a_0D_k+ b_0}$ using Eq. \[Eq\_grad2\] (see Table \[Tab\_pf\]). The last quantity required to derive $f_{\mathrm{o-g}}$ is the geometric projection factor $p_\mathrm{o}$ (see Eq. \[Eq\_pf\_decomposition\]). There is currently no direct estimation of $p_\mathrm{o}$ for $\delta$ Cep. If we rely on the hydrodynamical model, $p_\mathrm{o}$ can be inferred from the intensity distribution next to the continuum of each spectral line. The list of geometric projection factors are listed in Table \[Tab\_pf\] and plotted in Fig. \[Fig\_po\] with magenta dots. These calculations are done in the plane-parallel radiative transfer approximation. On the other hand, @neilson12 showed that the p-factor differs significantly as a function of geometry where those from plane-parallel model atmospheres are 3-7% greater then those derived from spherically symmetric models. Using their Table 1, we find for $\delta$ Cep a spherically symmetric geometrical projection factor of 1.342 in the R-band (i.e., with an effective wavelength of 6000 Å). In Fig. \[Fig\_po\], if we shift our results (magenta dots) by $0.043$ in order to get 1.342 at 6000 Å (a decrease of 3.2%), we roughly estimate the geometrical projection factors in spherical geometry as a function of the wavelength (red open triangles). In Fig. \[Fig\_po\], we now plot the $\frac{p_\mathrm{obs}(k)}{f_{\mathrm{grad}}(k)}$ quantity for each individual spectral line with their corresponding uncertainties (blue open squares). If we divide the $\frac{p_\mathrm{obs}(k)}{f_{\mathrm{grad}}(k)}$ quantities obtained for each individual spectral line by the corresponding value of $p_{\mathrm{o}}(k)$ calculated in plane-parallel geometry, we obtain $f_{\mathrm{o-g}} = 0.975 \pm 0.002$, with a reduced $\chi^2$ of 0.13. This indicates that our uncertainties (the quadratic sum of $\sigma_\mathrm{stat-fluor}$, $\sigma_\mathrm{stat-d}$ and the statistical uncertainty on $f_\mathrm{grad}$) are probably overestimated. This value is several $\sigma$ greater than that found directly with the hydrodynamical model of $\delta$ Cep: $f_\mathrm{o-g}=0.963 \pm 0.005$ ([@nardetto07], their Table 5). Using the values of $p_{\mathrm{o}}$ from @neilson12 (blue open triangles), we obtain $f_{\mathrm{o-g}} = 1.006 \pm 0.002$. Thus, $f_{\mathrm{o-g}}$ depends significantly on the model used to calculate $p_{\mathrm{o}}$.
Conclusion {#s_conclusion}
==========
Our rescaled hydrodynamical model of $\delta$ Cep is consistent with both spectroscopic and interferometric data modulo a rescaling factor that depends on the input parameters of the model ($M, L, T_\mathrm{eff}, Z$). In particular, it reproduces the observed amplitudes of the radial velocity curves associated with a selection of 17 unblended spectral lines as a function of the line depth in a very satisfactory way. This is a critical step for deriving the correct value of the projection factor. This strongly suggests that our decomposition of the projection factor into three physical terms is adequate. The next difficult step will be to measure $p_\mathrm{0}$ directly from the next generation of visible-wavelength interferometers. With such values in hand, it will be possible to derive $f_\mathrm{o-g}$ directly from observations.
The projection factor is a complex quantity that is particularly sensitive to the definition of the radial velocity measurement. More details should be given and perhaps a standard procedure applied in future analyses. For instance, the CCFs are generally fitted with a Gaussian. This produces a velocity value sensitive to stellar rotation and to both the line width and depth [@nardetto06a]. Thus, additional biases in the distance determination are introduced, in particular when comparing the projection factors of different Cepheids. Conversely, investigating the projection factor of individual lines is useful for learning how to mitigate the impact of the radial velocity modulation [@anderson14] and the possible angular-diameter modulation [@anderson16] on the BW distances.
In this study, we found $p_\mathrm{cc-g}=1.24\pm0.04$ a value that is consistent with the *Pp* relation of @nardetto09, i.e., $p_\mathrm{cc-g}=1.25\pm 0.05$. However, a disagreement is still found between the interferometric and the infrared surface-brightness approaches (and their respective projection factors) in the case of $\delta$ Cep [@ngeow12], while an agreement is found for the long-period Cepheid $\ell$ Car [@kervella04d]. This suggests that the p-factors adopted in these approaches might be affected by something not directly related to the projection factor itself but rather to other effects in the atmosphere or close to it, such as a static circumstellar environment [@nardetto16a]. However, it is worth mentioning that the two methods currently provide [*absolutely the same results in terms of distances*]{}. After a long history (since @getting34), the BW projection factor remains a key quantity in the calibration of the cosmic distance scale, and one century after the discovery of the Period-Luminosity relation [@leavitt08], Cepheid pulsation is still a distinct challenge. With Gaia and other high-quality spectroscopic data, it will soon be possible to better constrain the *Pp* relation.
The observations leading to these results have received funding from the European Commission’s Seventh Framework Programme (FP7/2013-2016) under grant agreement number 312430 (OPTICON). The authors thank the GAPS observers F. Borsa, L. Di Fabrizio, R. Fares, A. Fiorenzano, P. Giacobbe, J. Maldonado, and G. Scandariato. The authors thank the CHARA Array, which is funded by the National Science Foundation through NSF grants AST-0606958 and AST-0908253 and by Georgia State University through the College of Arts and Sciences, as well as the W. M. Keck Foundation. This research has made use of the SIMBAD and VIZIER[^2] databases at CDS, Strasbourg (France), and of the electronic bibliography maintained by the NASA/ADS system. WG gratefully acknowledges financial support for this work from the BASAL Centro de Astrofisica y Tecnologias Afines (CATA) PFB-06/2007, and from the Millenium Institute of Astrophysics (MAS) of the Iniciativa Cientifica Milenio del Ministerio de Economia, Fomento y Turismo de Chile, project IC120009. We acknowledge financial support for this work from ECOS-CONICYT grant C13U01. Support from the Polish National Science Center grant MAESTRO 2012/06/A/ST9/00269 is also acknowledged. EP and MR acknowledge financial support from PRIN INAF-2014. NN, PK, AG, and WG acknowledge the support of the French-Chilean exchange program ECOS- Sud/CONICYT (C13U01). The authors acknowledge the support of the French Agence Nationale de la Recherche (ANR), under grant ANR-15-CE31-0012- 01 (project UnlockCepheids) and the financial support from “Programme National de Physique Stellaire” (PNPS) of CNRS/INSU, France.
[^1]: Table A.1 is available in electronic format at the CDS via anonymous ftp to cdsarc.u-strasbg.fr (130.79.128.5) or via http://cdsarc.u-strasbg.fr/viz-bin/qcat?J/A+A/593/A45
[^2]: Available at http://cdsweb.u- strasbg.fr/
|
Q:
Angular 6 HTTP Interceptor not setting headers
I'm trying to make a jsonwebtoken interceptor and for some reason it doesn't set the header at all.
For my providers I have
import { TokenInterceptorService } from './token-interceptor.service';
...
providers: [AuthService, AuthGuard, {
provide: HTTP_INTERCEPTORS,
useClass: TokenInterceptorService,
multi: true
}]
as my TokenInterceptorService is pretty simple too:
import { Injectable } from '@angular/core';
import { HttpInterceptor } from '@angular/common/http';
@Injectable({
providedIn: 'root'
})
export class TokenInterceptorService implements HttpInterceptor {
constructor() { }
intercept(req, next) {
let tokenizedReq = req.clone({
setHeader: {
Authorization: 'Bearer xx.yy.zz'
}
})
return next.handle(tokenizedReq);
}
}
if I log tokenizedReq the headers have nothing. I must be overlooking something.
A:
Not setHeader but setHeaders - in plural form
let tokenizedReq = req.clone({
setHeaders: {
'Authorization': 'Bearer xx.yy.zz'
}
})
|
DONETSK, Ukraine -- Just a month ago, few people were talking about more autonomy for Donetsk -- less still about it joining Russia.
But with Russian troops in Crimea and the Black Sea peninsula soon to vote on joining Russia, some in Donetsk are agitating for a referendum to widen the eastern industrial region’s autonomy -- and perhaps even to go further.
Oleksandr, 29, a driver from Donetsk, says plainly that he wants to join Russia and that he has been out on the streets to make his voice heard.
“If [Russian President Vladimir] Putin will take us in, then I am only for; we are only for," Oleksandr said. "We are going to stand up for our beliefs. The new government is not acceptable to us. They are nationalists. It's just awful. There's nothing else I can say."
Oleksandr, who declined to give his last name, was taking a date to the cinema on the eve of the March 8 Women's Day holiday.
Many of those to whom RFE/RL spoke here say they view the authorities in Kyiv as "illegitimate" rulers who came to power through coup that toppled a president who drew his support in the industrial east.
Winning their support will clearly pose a challenge for the new Ukrainian government.
But while many say they view themselves as pro-Russian, there is little consensus about whether that means simply more local and regional autonomy for Donetsk and other parts of Ukraine's Russophone east -- or something more drastic.
Maksim, 19, for instance, says he is pro-Russian. But he doesn't want to join Russia. Instead, he says, Donetsk should be granted more regional autonomy.
"I think Ukraine has to stay a united country," Maksim says. "Crimea -- OK, that’s one thing; but Donbas, no way. It doesn’t matter who's in power. There's always been a divide between the East and West. But we can't just join Russia. We're a united country -- we have to rise to a new level."
Meanwhile Vitali, 19, a student from Donetsk, is not against the Donbas region becoming a part of Russia, since he has friends there. But he adds that he too would prefer the region to remain in Ukraine with increased autonomy from Kyiv.
In the two weeks since Viktor Yanukovych was ousted as Ukraine's president, pro-Russia forces have twice stormed the regional administration. Pavel Gubarev, a pro-Moscow civic leader who declared himself the "people's governor," made open calls for a referendum and openly advocated separatism -- which is illegal under Ukraine's criminal code.
Gubarev was detained this week by the SBU, Ukraine's security service. On March 8, an estimated 5,000 pro-Russia demonstrators gathered at the Oblast Administration building in Donetsk to demand Gubarev's release.
Ukraine's central government, however, has made clear moves in recent days to stamp authority on the east.
Kyiv has appointed a new governor to Donetsk Oblast. It has also replaced the head of the regional police, SBU security services, and prosecutor’s office.
Moreover, supporters of the new pro-Western authorities in Kyiv have also been able to put people on the streets. On March 5, for example, several thousand pro-Ukraine demonstrators gathered in Donetsk to support the central government.
Rival demonstrations were planned for March 9 by both pro-Kyiv and pro-Moscow groups.
Larisa, a 50-year-old private entrepreneur, says she is simply worn out by all the political turmoil.
"I want the country to be quiet and calm. That is what I support," she says. "I don’t want any war. I don't want our [territorial] integrity violated."
|
Property Details
Other Housing Types Offered
Corporate
Learn about Station Square
Nestled in a peaceful, park-like setting, Station Square Apartments is the ideal location for those who seek comfort, convenience and exceptional value. Our spacious 1,2 and 3 bedroom apartments include a host of features to make you feel at home. Station Square's on-site management team will provide you with exceptional service. We invite you to make Station Square Apartment you new home.
Neighborhood Information: Station Square
Call 301-637-4778
Directions
From I-495/I-95 take MD 4 North (Pennsylvania Ave). Make a Left onto Silver Hill Rd. Make a left onto Navy Day Dr, Make Immediate Right to Merge onto Pearl Drive. Make Left onto Pearl Drive to Station Square Apartments.
GPS Coordinates
Latitude: 38.841777
Longitude: -76.927114
What Apartment Renters Should Know About Suitland, MD
Station Square is located in Suitland, MD just a few miles east of Washington, DC. The new National Harbor provides shopping and dining options, and with Andrews Air Force Base nearby, renters can visit the Airmen Memorial Museum and Paul E. Garber.
Management Information: Morgan Properties
Call 301-637-4778
Morgan Properties
As one of the Nation's leading apt management companies, Morgan Properties has been creating the standards that others have followed for many years. It is an organization that is built upon a commitment to excellence. Our award-winning employees are dedicated to providing our residents with a quality residential living experience every day; you have the Morgan Properties commitment to excellence.
|
This is the upstream version of Matchbox Window Manager. Matchbox is an Open Source base environment for the X Window System running on non-desktop embedded platforms such as handhelds, set-top boxes, kiosks and anything else for which screen space, input mechanisms or system resources are limited.
|
FK506 is an immunosuppressant that inhibits T-cell activation and proliferation [B. E. Bierer et al., Current Opinions in Immunology, 5, pp. 763-773 (1993)]. Immunosuppressants, such as FK506, are useful drugs in the treatment of transplant rejection and the prevention of autoimmune diseases. Furthermore, such compounds are useful tools in immune system research.
FK506 is a more recently discovered and more potent immunosuppressant than cyclosporin. Unfortunately, FK506 is characterized by undesirable pharmacological properties, such as toxicity and poor bioavailability [P. Neuhaus et al., Lancet, 344, pp. 423-428 (1994)]. Therefore, there remains a need for potent immunosuppressants with improved pharmacological properties.
FK506 acts as an immunosuppressant by inhibiting T-cell signal transduction pathways that control lymphokine transcription factors. As a result, gene activation of various lymphokines, including IL-2, is prevented. This in turn leads to an inhibition of T-cells, and therefore, immunosuppression.
FK506 exerts these effects in a step-wise process. Initially, FK506 binds to a peptidyl prolyl isomerase, FK506 Binding Protein ("FKBP12"). This complex then binds to, and inhibits, calcineurin. Subsequent events inhibit signal transduction pathways, inhibit lymphokine gene transcription, and ultimately, reduce production of lymphokines, such as IL-2.
Calcineurin is a Ca.sup.2+ -dependent serine/threonine phosphatase. It is a heterodimer composed of 2 subunits: calcineurin A ("CnA"), a 59 kDa catalytic subunit and calcineurin B ("CnB"), a 19 kDa subunit. CnA contains a phosphatase active site and an autoinhibitory region as well as binding sites for calmodulin and CnB. Binding of FKBP12/FK506 inhibits the phosphatase activity of calcineurin against physiological substrates. FKBP12/FK506 does not, however, bind at the phosphatase active site.
Thus, a compound may inhibit calcineurin by binding to the phosphatase active site ("active site"), by binding to an accessory binding site, such as the FKBP12/FK506 binding site, or by binding to both sites simultaneously. Such compounds may interact directly with calcineurin or, alternatively, may bind to FKBP12, or a FKBP12 homologue, prior to binding to calcineurin.
FKBP12 has been characterized by its cDNA and amino acid sequences. The crystal structures of FKBP12, and of FKBP12 bound to FK506, have been reported. However, this structural information has not proven useful in the design of calcineurin inhibitors [M. V. Caffrey et al., Bioorg. Med. Chem. Lett., 21, pp. 2507-2510 (1994)].
Rat calcineurin has been characterized by its amino acid sequences and its cDNA. Human calcineurin has been characterized by its amino acid sequences and its cDNA [Guerini et al., Proc. Natl. Acad. Sci. USA, 86, pp. 9183-87 (1989)]. Knowledge of the primary structure, i.e., amino acid sequence, of calcineurin, however, does not allow prediction of its tertiary structure. Nor does it afford an understanding of the structural, conformational, and chemical interactions of calcineurin with FKBP12/FK506 or other compounds or inhibitors.
The crystal structure of calcineurin has not been reported. Nor has the crystal structure of a calcineurin homologue or a calcineurin co-complex been reported. The need, therefore, exists for determining the crystal structure of calcineurin to provide a more accurate description of the structure of calcineurin to aid in the design of improved inhibitors of calcineurin activity. The crystal structure of a complex comprising calcineurin A, calcineurin B, FKBP12, and FK506 would provide such a description.
Calcineurin inhibitors, such as FK506, have therapeutic potential as immunosuppressants. Specifically, such compounds may be used in the treatment of transplant rejection and autoimmune diseases, such as rheumatoid arthritis, multiple sclerosis, juvenile diabetes, asthma, inflammatory bowel disease, and other autoimmune diseases.
|
Although this is is a cartoon character, it does not show the basic anatomical structure. The lines are crooked, hence NO high-end Finishing is there. Her right hand looks slightly Smaller than the Left one. Also the both hands are smaller as compared to the body.
Character- hair lines are crooked, that's a main con there. Head is perfectly formed and the facial structure is correct. The eyes plays a major role in expressing the Expression, and makes the character cute. There any many problems in the body. But looking that it's a comical childish character, it's not a big deal. you should be using more than one color also.
Overall- Overall this pic is cute, the lack of background is a bit let down though. Try to add more Quality to your further Drawings. Good Day
Well I personally think the other critique was a bit harsh..? o v oI really like how you drew the hair! It's just so flowy~
The lines are dark, but the lineart should stay the same amount of darkness for the entire body though... and if you don't feel like drawing hands or are lazy (like me) just make the sleeves longer, do a chibi or put them behind her back? Or you can practise ;DI also can't give you too much for originality since I've seen that bow on characters for a while I do like the pom poms though, and this style is just adorable! * 3 *and add some shading.okay 100 words I'm out xD
|
Q:
How to stop an unstoppable windows 7 service?
I have recently installed a program that deploys an agent which "protects" from peripherals.
What it actually does at this point is to block any kind of media I plug to my PC.
I've done some checking and I found the name of this service blocking my peripherals. So, naturally, I've tried stopping it.
First I tried the sc stop, but I was denied the access.
Trying to do it by services.msc will result in not even giving me the priviledge to use stop on that service.
Same response from taskkill: Access denied...
Then I figured I'd try net stop resulting with the 2191 message which if I try net helpmsg 2191 does not give any information.
I then decided to surf Superuser and found out about these pstools. But as soon as I try to do the cmd switch with psexec -s cmd I get the message:
Couldn't install PsExec service: access is denied.
Strangely, if I try to use just psexec it does prompt me with the help info. So this was a dead end again.
After all these fails I have decided to just remove it from startup right? So I open msconfig and remove the service from startup, save and finally reboot. Unfortunately, when PC reboots so does the service. By the time I can access the task manager the service is already running, again. Can't really imagine how though.
All these access failures made me think I might not have the required privileges or something, but my user account is set as administrator so I think there's nothing more I can do.
A:
Many security software installs a special driver that intercepts any changes to its services and processes.
However, the driver is normally not loaded in Safe Mode, so you can disable the service there. If the service is still started after reboot, you may want to find and disable the driver in Device Manager. This kind of driver is normally under the "Non-plug and play drivers" section which is viewable by selecting "Show hidden devices" from the View menu. The name of the driver is normally well-known for each provider.
A:
What about opening regedit.exe and go to
HKLM\SYSTEM\CurrentControlSet\services\[service name]
Than change the service to disable (I think you can do that by changing the "Start" value to 4).
The valid service Start types are:
SERVICE_BOOT_START (0): A device driver started by the system loader. This value is valid only for driver services.
SERVICE_SYSTEM_START (1): A device driver started by the IoInitSystem function. This value is valid only for driver services.
SERVICE_AUTO_START (2): A service started automatically by the service control manager during system startup. For more information, see Automatically Starting Services.
SERVICE_DEMAND_START (3): A service started by the service control manager when a process calls the StartService function. For more information, see Starting Services on Demand.
SERVICE_DISABLED (4): A service that cannot be started. Attempts to start the service result in the error code ERROR_SERVICE_DISABLED.
A:
Use taskkill command followed by the service's process ID. This will kill the service.
|
Laparoscopic vagotomy using mini-instruments in the rat: a new laparoscopic small animal model.
Animal models are necessary for research, technical developments, and training purposes in laparoscopic surgery. Although various operations on small animals have been described, there is still a need for a simple and practical laparoscopic small animal model. We acknowledged truncal vagotomy as a simple procedure, and aimed to develop a model of laparoscopic truncal vagotomy (LTV) in the rat, an inexpensive and easily available animal. Fifty Wistar rats were randomized into an LTV group (n = 25) and an open truncal vagotomy (OTV) group (n = 25). LTV was effected with two minitrocars inserted into the left upper and right lower quadrants. Two techniques of vagotomy were developed: first, with the esophagus in its anatomical position, and second, with the distal esophagus retracted anteriorly with a grasper inserted into the retroesophageal space. OTV was performed through a midline incision. Animals were sacrificed 24h postoperatively, and autopsy was performed. The mean +/- SD operating time was 8.3+/-1.4 min in the LTV group and 5.5+/-0.2 min in the OTV group (P < 0.05). The laparoscopically magnified view provided a better distinction of vagal fibers compared with open surgery, with the second laparoscopic technique providing the best exposure. Complications developed in three rats (12%) from the LTV group and one (4%) from the OTV group (P > 0.05). Vagotomy was confirmed to be complete at autopsy in all of the animals. This is the first technical description of laparoscopic peptic ulcer surgery in the rat. Although subsequent histopathological and physiological studies may be required, technically, laparoscopic vagotomy in the rat seems to be a simple, inexpensive, and expeditious small-animal model for laparoscopic research.
|
/*
JustMock Lite
Copyright © 2010-2015 Progress Software Corporation
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
using System;
using System.Collections.Generic;
namespace Telerik.JustMock.Expectations.Abstraction
{
/// <summary>
/// Interface containing Func type method expectations.
/// </summary>
/// <typeparam name="TReturn"></typeparam>
public interface IFunc<TReturn> : IThrows<IFunc<TReturn>>, IReturns<TReturn>, IAssertable
{
/// <summary>
/// Specifies the return value for the expected method.
/// </summary>
/// <param name="value">any object value</param>
/// <returns></returns>
IAssertable Returns(TReturn value);
/// <summary>
/// Specifies the delegate to evaluate and return for the expected method.
/// </summary>
/// <param name="delegate">Target delegate to evaluate.</param>
/// <returns>Reference to <see cref="IAssertable"/> interface</returns>
IAssertable Returns(Delegate @delegate);
/// <summary>
/// Specifies the delegate to evaluate and return for the expected method.
/// </summary>
/// <param name="func">Target delegate to evaluate</param>
/// <returns>Reference to <see cref="IAssertable"/> interface</returns>
IAssertable Returns(Func<TReturn> func);
#if !LITE_EDITION
/// <summary>
/// Returns a enumerable collection for the target query.
/// </summary>
/// <typeparam name="TArg">Argument type</typeparam>
/// <param name="collection">Enumerable collection</param>
/// <returns>Instance of <see cref="IAssertable"/></returns>
IAssertable ReturnsCollection<TArg>(IEnumerable<TArg> collection);
#endif
}
}
|
Mutation of serine 90 to glutamic acid mimics phosphorylation of bovine prolactin.
Phosphorylated prolactin has been identified and isolated from bovine pituitaries. The biological activity of this phosphoprotein is severely reduced in comparison with nonphosphorylated prolactin. The sites of phosphorylation are serines 26, 34, and 90, and the stoichiometry is 1:1:10, respectively. In this report, the phosphoserine residues have been individually replaced with glutamic acid in recombinant methionyl bovine prolactins in order to mimic phosphorylation at each site. Substitution of glutamic acid for serine at positions 26, 34, and 90 reduced protein helical contents by 10, 6, and 14%, respectively. UV absorbances for S26E and S34E bovine prolactins were blue-shifted, similar to the biological isolates of phosphorylated bovine prolactin, but the biological activities of the S26E and S34E mutants (ED50 values of 16.3 and 18.8 pM, respectively) were similar to that of wild-type prolactin (ED50 value of 18.6 pM) in the Nb2 rat lymphoma assay. S90E bovine prolactin had the greatest reduction in helical content but showed similar UV and fluorescent spectra to the wild-type bovine prolactin. The biological activity of S90E bovine prolactin (ED50 value of 672 pM) was reduced to an activity similar to that of phosphorylated bovine prolactin. The data indicate that the phosphorylation of serine 90 is responsible for the reduction in biological activity.
|
1. Field of the Invention
The present invention relates to a rotary drier apparatus for drying rinsed semiconductor wafers.
2. Description of the Prior Art
A process of rinsing/drying semiconductor wafers has now conspicuously been improved in its throughput capacity owing to automation. It is the main method among many methods to effect the process described above to rinsing/drying carriers adapted to house 20 sheets of wafers therein in units carriers of two. A drier apparatus for use in such a process is of a type in which wafers are dried by rotation, wherein carriers serving to house the wafers are set interiorly of cradles mounted on a rotor, and any water adhering to the wafers is blown off by rotating the rotor. Such methods are for example described in Japanese Laid-Open Patent Publications No. 55-154736 and No. 56-8823.
A process of rotating and drying semiconductor wafers is adapted to keep the wafers horizontal and thereafter to allow a rotor to be rotated for easily removing waters. On the other hand, when the wafers are conveyed from one process to another, the wafers are supported vertically in their attitude in a carrier, and conveyed. Therefore, it is needed to alter the wafers from the vertical state to a horizontal one upon setting the carriers, including the wafers supported therein, on a rotary drier apparatus. A prior rotary drier apparatus for semiconductor wafers has a device to alter the attitude of a cradle to achieve the above object. The device comprises, for example a rod to push the cradle and an air cylinder to drive the rod.
However, such a prior rotary drier apparatus so equipped with the cradle attitude altering device suffers from some drawbacks that (a) hermetic sealing is insufficient at a connecting portion between a vessel and the attitude altering device, (b) cleanliness in the vessel is deteriorated since the attitude altering device goes in and out of the vessel in part, and (c) the construction of the rotary drier apparatus is complicated resulting in a large overall apparatus.
|
Take my hand just one more timePrends ma main juste encore une foisIt’s safe to leave your doubts behindC'est plus sur de laisser tes doutes derrière I will be with you through the lonely days and the lonely nightsJe serai avec toi au cours de ces jours seuls et ces nuits solitairesI will follow my heart back to youJe suivrai mon cœur jusqu'à toi I will follow my heart back to youJe suivrai mon cœur jusqu'à toi Take my hand just one more timePrends ma main juste encore une foisIt’s safe to leave your doubts behindC'est plus sur de laisser tes doutes derrière I will be with you through the lonely days and the lonely nightsJe serai avec toi au cours de ces jours seuls et ces nuits solitaires
Take my hand just one more timePrends ma main juste encore une foisIt’s safe to leave your doubts behindC'est plus sur de laisser tes doutes derrière I will be with you through the lonely days and the lonely nightsJe serai avec toi au cours de ces jours seuls et ces nuits solitaires
|
French hours
"French hours" is a term used in the film and television industries for when there is no break for lunch during a film shoot. Instead food is passed around all day long and the crew works continuously. The lack of a lunch break means that crew members and the cast have to steal moments to eat. Joel Schumacher employed French hours when filming Phone Booth, a film completed in 10 days. Ridley Scott also used the approach when filming Robin Hood, noting that actors often had to eat on horseback between takes. Scott also agreed with the cast and crew that he would adhere strictly to a 10 hour shooting day due to lack of a traditional lunch break.
In accordance with union rules and the SAG contract, what traditionally takes place when French hours are instituted is that the cast and crew are remunerated in the form of "meal penalties". In the film and television industry, the cast and crew are required to be officially broken for lunch six hours after their initial call time. Meal penalties are monetary compensation that are incurred every half hour after the six-hour deadline until a meal break is given, or the shoot day ends. On a film like Phone Booth, it would not be unusual for the cast and crew to receive 20 or more meal penalties.
In parts of Canada and the United States, French hours are referred to as "Pacific North West Hours", or simply "PNW Hours" or "PNW".
References
Category:Film production
|
74 F.3d 1265
316 U.S.App.D.C. 4, 106 Ed. Law Rep. 981
CAREER COLLEGE ASSOCIATION, et al., Appellants,v.Richard W. RILEY, Secretary of the United States Departmentof Education, Appellee.
No. 94-5270.
United States Court of Appeals,District of Columbia Circuit.
Argued Nov. 13, 1995.Decided Jan. 26, 1996.
Thomas Hylden, Washington, DC, argued the cause and filed the briefs, for appellants.
Fred E. Haynes, Assistant United States Attorney and Steven Z. Finley, Attorney, Department of Education, pro hac vice, Washington, DC, argued the cause for appellee, with whom Eric H. Holder, Jr., United States Attorney, and R. Craig Lawrence, Assistant United States Attorney, were on the brief. John D. Bates and Thomas S. Rees, Assistant United States Attorneys, entered appearances.
Before: SILBERMAN, GINSBURG, and HENDERSON, Circuit Judges.
SILBERMAN, Circuit Judge:
1
The Higher Education Act, Title IV, governs federally funded student financial aid programs for college and post-secondary vocational training. 20 U.S.C. §§ 1070-1099 (1990 & 1992 Supp.). Congress amended the HEA in 1992 to improve the accountability and integrity of institutions participating in Title IV programs. The Department of Education (DOE) conducted regional meetings and "negotiated rulemaking sessions" to develop regulations to implement these amendments. Appellants raise five separate challenges to the regulations ultimately promulgated by the DOE. We reject these and affirm the district court's grant of summary judgment for Secretary Riley. We address each issue and the relevant facts in turn.
Master Calendar Issue
2
Appellants contend that the entire set of regulations amending 34 C.F.R. Part 668, the Student Assistance General Provisions, is ineffective for the award year 1994-95 because it was not promulgated "in final form" by May 1, 1994, as required by the Master Calendar Provision. The Master Calendar Provision states that
3
Any regulatory changes initiated by the Secretary ... that have not been published in final form by December 1 prior to the start of the award year shall not become effective until the beginning of the second award year after such December 1 date. For award year 1994-95, this subsection shall not require a delay in the effectiveness of regulatory changes ... that are published in final form by May 1, 1994.
4
20 U.S.C. § 1089(c) (1992). On February 17 and 28, 1994, the DOE published proposed rules for Part 668 and provided a 30-day comment period. 59 Fed.Reg. 8,044 (1994); 59 Fed.Reg. 9,526 (1994). On April 29, 1994, the DOE published an "Interim Final Rule," denominated "interim final regulations with invitation for comment." 59 Fed.Reg. 22,348 (1994). The April 29 Rule stated that its effective date was July 1, 1994, [316 U.S.App.D.C. 7] with the exception of provisions containing information collection requirements for which Office of Management and Budget (OMB) approval was required under the Paperwork Reduction Act (PRA). Upon receiving OMB approval, the DOE would publish a notice announcing the effective date for these provisions. The Rule solicited comments by June 20, 1994, and stated that the Secretary would consider any comments received "in determining whether to make any changes in these rules," and would publish any changes or a notice indicating no changes would be made. No mention was made of when any such changes would become effective. On June 22, after the comment period but prior to the Rule's effective date, appellants filed suit, seeking declaratory and injunctive relief. Subsequently, on July 7, the DOE issued a notice that announced OMB approval for the information collection requirements, explained that the April 29 Rule was final and effective for the 1994-95 award year, reopened and extended the comment period until July 28, and announced that the comments had been solicited in anticipation of possible revisions for the 1995-96 award year. 59 Fed.Reg. 34,964 (1994).
5
Since the Secretary published the "Interim Final Rule" on April 29, 1994, the dispute turns on whether those regulations were then "in final form." Appellants assert that the use of "interim" necessarily implies that the regulations were subject to change and therefore not in final form. Congress did not explicitly authorize "interim final regulations" in the HEA, as it has elsewhere, and the other DOE regulations published the same day were not described as "interim," showing that the Secretary himself did not view Part 668 as a final rule. The Secretary also requested comments on the Rule by June 20 and stated that notice of any changes--or the lack thereof--would be published. This deadline, prior to the Rule's July 1 effective date, indicates that the Secretary was considering changes for 1994-95. That changes were contemplated, it is argued, undermines the function of the Master Calendar Provision as a notice statute intended to apprise regulated institutions of the coming year's requirements. Comments responding to the Interim Final Rule show that such institutions viewed the April 29 notice as a proposed rather than a final rule. And the Secretary effectively recognized the ambiguity of the Rule by his publication of the July 7 correction notice. Finally, appellants argue that the regulation necessarily was subject to change since it had not yet received PRA approval from the OMB; several sections would not become effective until such approval was received, and failure to receive approval could result in changes.
6
The designation of the Rule as "interim," absent the explanation (given subsequently) that the Secretary contemplated that any revisions would take effect after the 1994-95 year and that comments were sought only for that purpose, was certainly maladroit. We agree with the government, however, that the rule passes muster under the Master Calendar Provision. The key word in the title "Interim Final Rule," unless the title is to be read as an oxymoron, is not interim, but final. "Interim" refers only to the Rule's intended duration--not its tentative nature. The designation of the July 1 effective date could only have meant--and, therefore, put the public on notice of that meaning--that the regulation was in final form when published and therefore complied with the Master Calendar Provision. The Secretary's request for comments on the Rule is explicable, as the government points out, in light of the short December 1 deadline for any proposed rules to be put in effect for the 1995-96 award year. That other final rules issued at the same time were not termed "interim" only suggests that the Secretary did not contemplate a possible modification of those rules in the following year. Nor do we think it particularly relevant that a number of commenters were confused. Competent counsel would surely have advised any client that the Secretary intended the Rule to be final as to the 1994-95 award year.1 Any other construction would suggest [316 U.S.App.D.C. 8] that the April 29 publication was without legal significance at all (a senseless repetition of the notice of proposed rulemaking).
7
There remains the matter of OMB approval. The government points out that OMB's own rules specify that its action under the PRA cannot rescind or amend a rule. Therefore, the published rule's finality is not affected by the fact that the Secretary had not received OMB approval at the time of promulgation--approval came only seven days before July 1 and was not published until the July 7 notice. Admittedly, it seems a bit anomalous for a rule that is on its face subject to another entity's approval to be considered final. But as a matter of law, the regulation would have been valid on July 1 whether or not OMB had approved the relevant portions. Absent OMB approval, the Department would not have been entitled to impose a sanction or withhold a benefit to a member of the regulated class, but the regulation still would have constituted a normative standard.2 Accordingly, it cannot be said that the April 29 publication was not "final" within the meaning of the Master Calendar Provision.
The Refund Regulation
8
Two provisions in the 1992 HEA amendments deal with refunds by institutions of "unearned tuition" upon the withdrawal of students during an enrollment period. Generally under the Title IV programs, both the federal government and the student will contribute to the cost of the student's education. The federal government pays its portion for each enrollment period up front; students, in contrast, may pay at varying rates throughout the enrollment period, according to the institution's payment policy. For example, if the entire institutional charges for the enrollment period were $5,000, the government might pay $4,000 initially and the student the remaining $1,000 spread over the course of the enrollment period. When a student withdraws partway through the enrollment period, the institution must refund a certain portion of the charges to account for its reduced educational obligations toward the student. Appellants challenge regulations issued by the Secretary to govern the determination of this refund, claiming they conflict with the statutory refund provisions.
9
20 U.S.C. § 1091b (1992) requires that institutions develop a "fair and equitable" policy for refunding "unearned tuition." § 1091b(a). An institution's policy "shall be considered to be fair and equitable"
10
if that policy provides for a refund in an amount of at least the largest of the amounts provided under--
11
(1) the requirements of applicable State law;
12
(2) the specific refund requirements established by the institution's nationally recognized accrediting agency and approved by the Secretary; or
13
(3) the pro rata refund calculation described in subsection (c) of this section, except that this paragraph will not apply to the institution's refund policy for any student whose date of withdrawal from the institution is after the 60 percent point (in time) in the period of enrollment for which the student has been charged.
14
20 U.S.C. § 1091b(b). The second relevant statutory provision states that "refunds shall be credited in the following order:" first to reimburse federal government programs, then other sources of aid (e.g., state government programs), and last the student. 20 U.S.C. § 1092(a)(1)(F) (1992).
15
Under the prior refund regulations, institutions were not required to consider the student's scheduled, but not yet paid, cash payments in making § 1091b(b)'s refund calculation. Institutions therefore based refunds on the charges they had actually collected, not on the total charges for the enrollment period. The Secretary determined that this practice in effect paid the student's [316 U.S.App.D.C. 9] unpaid charges from Title IV funds and had the collateral consequence of treating students inequitably because, as will be seen below, students who had paid their portion of the tuition before dropping out ended up paying more of the cost than students who had deferred or defaulted upon payment of their share. See 56 Fed.Reg. 66,498 (1991). Thus, after Congress enacted § 1092(a)(1)(F)'s refund crediting order in 1992, the Secretary issued a new "Refund Regulation" that required consideration of scheduled cash payments:
16
(iii) In determining the amount that the institution may retain for the portion of the period of enrollment for which the student has been charged during which the student was actually enrolled, an institution shall--
17
(A) Compute the unpaid amount of a scheduled cash payment by subtracting the amount paid by the student for that period of enrollment for which the student has been charged from the scheduled cash payment for the period of enrollment for which the student has been charged; and
18
(B) Subtract the unpaid amount of the scheduled cash payment from the amount that may be retained by the institution according to the institution's refund policy ...
19
34 C.F.R. 668.22(f)(2)(iii) (1994). Put simply, this requires that after calculating the refund under § 1091b(b)(1) and (2), the school subtract the student's unpaid charges from the amount it would otherwise retain.3
20
The effect of this provision on the refund calculation can best be seen in a numerical example. Assume the numbers from above--$5,000 total charges, $4,000 paid up front by Title IV programs, and $1,000 paid over the course of the semester by the student. If a student withdraws from a ten-week program after two weeks, the institution would be entitled, assuming a pro rata calculation for simplicity, to retain 1/5 of the tuition earned, here $1,000.4 The following chart shows examples of the refund calculation under the prior and current regulations, assuming varying payments by the student:
21
Assuming five equally spaced payments (the second row of the table), the student would only have paid $200 of his full $1,000 obligation. Under the prior regulations, the school would refund $3,200--the amount it actually received, $4,200, minus the pro rata amount earned, $1,000. The government would thus receive $3,200 back; and the student effectively would "receive" $800--the amount not yet paid and for which he is then not charged. Under the new Refund Regulation, the school must subtract the amount of the student's unpaid charges--$800--from the amount the institution is otherwise entitled to retain--$1,000--and is left with only $200. The total refund to Title IV programs would then be $4,000--$4,200 actually received minus $200 retained by the institution.
22
The effect of the new regulation is to require the refund calculation to be made--in accord with the applicable method, here, pro rata--as if the student had paid his full obligation for the enrollment period. Thus, if the student has paid the full $1,000, the [316 U.S.App.D.C. 10] refund will be identical under both the former and current regulation: under the former regulations, the institution retains $1,000, so the refund is $4000--$5000 actually received minus $1000; under the Refund Regulation, the unpaid scheduled cash payment is $0, so the institution retains $1,000, and the refund is again $4,000. But if, on the other hand, the student has not yet paid his full charges, the school's retained funds decrease by the unpaid amount.5
23
Appellants contend that because the Refund Regulation changes the amount the institution can retain, by requiring the institution to add to the refund the amount of the student's unpaid scheduled cash payment, it impermissibly modifies § 1091b(b)'s definition of a fair and equitable refund policy. Section 1091b(b) fully occupies the field of refund determinations and therefore compels the Secretary to accept as "fair and equitable" any determination made in accord with the provision. Two district courts have so held. See California Cosmetology Coalition v. Riley, 871 F.Supp. 1263, 1270-72 (C.D.Cal.1994); Coalition of New York State Carrier Schools, Inc. v. Riley, 894 F.Supp. 567, 571-72 (N.D.N.Y.1995).
24
While the regulation appears superficially to conflict with the statutory language, upon closer examination we are not persuaded by appellants' arguments. As indicated above, there is no issue if the student has paid the full amount of the enrollment period charges up front; the refund is identical under both § 1091b(b) and the Refund Regulation. The problem arises when the student has not yet paid the enrollment charges for the relevant period. Then, as appellants contend, the Refund Regulation has the effect of "adding" the amount of the student's unpaid scheduled cash payments to the refund as calculated under § 1091b(b). However, not including the unpaid amount, as under the prior regulations, has the effect of constructively "refunding" that amount to the student--at the expense of the federal government--and of therefore crediting the refund to the student before the Title IV programs. This violates the explicit allocation requirements of § 1092(a)(1)(F).6
25
The two statutory provisions are thus in considerable tension as to the appropriate way to address unpaid student charges in the refund determination. But neither expressly addresses the situation; it appears that the draftsmen did not contemplate this scenario and its impact on the refund calculation. Section 1092(a)(1)(F), which provides that "refunds shall be credited" to the government before the student, suggests that the drafters presumed the student will have paid the charges to then be "refunded." Similarly, the language of § 1091b(a)--"Each institution ... shall have in effect a fair and equitable refund policy under which the institution refunds unearned tuition, fees, room and board, and other charges to a student who received [federal assistance]"--suggests that the drafters assumed that the student would pay the full charges for the enrollment period, such that all "unearned tuition" will need to be refunded. But § 1091b(b) does not on its face require the institution to include the student's unpaid charges in the [316 U.S.App.D.C. 11] refund calculation. We thus conclude that the statute is ambiguous as to how students' unpaid charges affect the refund determination.
26
Given this ambiguity, the Secretary has some discretion to resolve the apparent conflict between the two provisions. Chevron U.S.A. Inc. v. Natural Resources Defense Council, Inc., 467 U.S. 837, 104 S.Ct. 2778, 81 L.Ed.2d 694 (1984). The Secretary asserts that the Refund Regulation defines "unearned tuition" by requiring the institution to consider the full charges assessed for the enrollment period--not just the charges actually received--in calculating the refund. This in essence requires the institution to presume that the student has paid the full charges at the outset. If the total charges are $5,000, and the student has completed 1/5 of the course, it is logical that the "unearned tuition" is $4,000--the sum of the student's and the government's payment obligations. The Refund Regulation merely requires repayment of this full amount regardless of whether the student has paid his portion. The Regulation therefore does not "add" to the refund, as appellants allege, but merely treats all students--and the government--equally with respect to unpaid charges by defining the "unearned tuition" to which the refund policy must be directed.
27
That the Refund Regulation corrects the misallocation of refunds can be seen from the examples in the table, supra. Although the federal government paid $4,000 in all three scenarios, under the prior regulation it was refunded varying amounts--$3,000, $3,200, and $4,000. The student effectively received a corresponding "refund" of the amount he had not yet paid--$1,000, $800, and $0. This violated the refund crediting order of § 1092(a)(1)(F) by in effect allowing the institution to "refund" money to the student first. Under the current regulation, in contrast, the federal government receives the same amount, the full $4,000, in all three scenarios, prior to any refund to the student (who receives no refund in this example). And the institution is only required to refund (up to) the unearned amount of the full tuitional charge--$4,000 ($5,000 full charge minus $1,000 "earned").
28
To be sure, the inevitable effect of the Refund Regulation is that institutions will retain less money if the student has not paid in full. The decrease in an institution's income is not, however, dispositive. While the statute clearly posits that institutions generally will retain some funds when a student withdraws, it does not delineate a precise amount and does not condition that amount on what the institution has actually received. Congress was focusing in § 1091b(b) on fairness and equity to the students--it is unusual, to say the least, for Congress to speak of fairness to the federal government. The Refund Regulation, by affecting the amount the institution retains, is not inconsistent with this policy. It essentially puts the risk of the student's "default" on the institution--which may be reasonable given that the institution has more control over the student's payments, but the statutory silence on unpaid charges makes that permissible. We thus conclude that the Secretary has permissibly interpreted these two statutory provisions to fulfill the mandates of both as closely as possible.7
The Cohort Default Rate Rule
29
It is also alleged that the "Cohort Default Rate Rule" exceeds the Secretary's authority because it conflicts with various statutory provisions. In order to participate in Title IV programs, an institution must be both eligible and administratively capable. Eligibility requires that an institution be an institution of higher education and that it meet various program and administrative requirements, e.g., that it use funds solely in accord with program provisions, that it provide information to the Secretary and other persons. 20 U.S.C. § 1094(a) (1990). The eligibility criterion upon which appellants focus examines the institution's cohort default [316 U.S.App.D.C. 12] rate--the percentage of students in default on federally insured loans in any given award year--for loan programs: "An institution whose cohort default rate is equal to or greater than [25% ] for each of the three most recent fiscal years for which data are available shall not be eligible to participate in a program under this part for the fiscal year for which the determination is made and for the two succeeding fiscal years ..." 20 U.S.C. § 1085(a)(2) (1992) (emphasis added). In addition to these threshold eligibility requirements, an institution must be administratively (and financially) capable of participating in Title IV programs: "Notwithstanding any other [statutory] provisions ..., the Secretary shall prescribe such regulations as may be necessary to provide for-- ... the establishment of reasonable standards of financial responsibility and appropriate institutional capability for the administration by an eligible institution of [Title IV programs]." 20 U.S.C. § 1094(c). Pursuant to this provision, the Secretary promulgated regulations that determine an institution administratively incapable of adequately administering Title IV programs (both loan and non-loan) if, inter alia, the institution has a cohort default rate of more than 25% for any of the three most recent fiscal years. 34 C.F.R. § 668.16(m)(1)(i) (1994). A determination that an institution has impaired administrative capability may affect its ability to secure an initial or renewal application and may result in a limitation of participation rights, i.e., provisional certification for a period of one to three years.
30
Appellants allege that this regulation, the "Cohort Default Rate Rule," has "changed" the default rate measure from a violation in each of the three prior years as required by the eligibility provision, to any of the three prior years under the administrative capability regulation. This puts an institution at "heightened" risk of losing its participation under the Secretary's administrative capability regulation even though it meets the eligibility requirements. This modification has additional significance, appellants claim, in that the regulation permits the Secretary to provisionally certify an institution when it is prohibited by the statute, which allows provisional certification only when an institution is seeking an initial or renewal certification, is having its administrative capability determined for the first time, or has undergone a change of ownership. 20 U.S.C. § 1099c(h). Appellants also point out that the regulation neglects to provide the statutory notice and hearing protections for the limitation or termination of participation in Title IV programs, 20 U.S.C. § 1094(c)(1)(F) (1990), and the statutory appeal rights for loss of eligibility, 20 U.S.C. § 1085(a)(2). Thus, by first placing an institution on provisional certification--equivalent to a "limitation" of participation, and then revoking that certification--equivalent to a loss of eligibility, the Secretary effectively can terminate an institution's participation without providing these statutorily required procedural protections.
31
The Secretary counters that he has express statutory authority to establish "reasonable standards of ... appropriate institutional capability" for the Title IV programs, 20 U.S.C. § 1094(c)(1)(B), and to "establish procedures and requirements relating to the administrative capabilities of institutions," based on, inter alia, "consideration of past performance of institutions ... with respect to student aid programs," 20 U.S.C. § 1099c(d)(1) (1992). It was pursuant to his authority under these provisions--not § 1085(a)(2)--that the Secretary promulgated the administrative capability regulations. Section 1085(a)(2) addresses eligibility, not administrative capability, and has distinct, if overlapping, coverage of loan programs. The 25% default rate criterion, evaluated over three years, is a reasonable measure of a school's administrative performance.8
32
The statutory provisional certification limitations are no bar to the regulations, the Secretary asserts, because he will only provisionally certify an institution on the basis of administrative incapability in accord with these limitations, i.e., at an initial or renewal [316 U.S.App.D.C. 13] application, change of ownership, or first determination. And such an initial or renewal certification, it is argued, would not fall under the terms of § 1094(c), which requires notice and a hearing, because it would not limit or terminate Title IV "participation"--which the Secretary interprets to mean current, full participation. Provisional certification of an institution during the pendency of a current certification, in contrast, can only be accomplished through an affirmative administrative action, which would be subject to the notice and hearing requirements of § 1094(c) and the appeal rights of § 1085(a)(2). As to revocation, the statute itself provides for termination without procedural protections: "If, prior to the end of a period of provisional certification under this subsection, the Secretary determines that the institution is unable to meet its responsibilities under its program participation agreement, the Secretary may terminate the institution's participation." 20 U.S.C. § 1099c(h)(3). This provision does not require the procedural protections of §§ 1094(c) and 1085(a)(2), and the Secretary therefore asserts that he has discretion to select appropriate procedures. He has done so by providing that an institution will have an opportunity to be heard in an administrative review process before an independent official, 34 C.F.R. § 668.13(f).
33
We note that the statutory structure indicates that "eligibility" is not synonymous with "administrative capability"--which the Secretary is expressly authorized to define--and this alone suggests that the Secretary's independent construction of administrative capability to include a 25% default rate criterion is permissible. And the prevention of student defaults can reasonably be thought one indication of an institution's "past performance ... with respect to student aid programs." That administrative capability and eligibility both examine default rates--and that administrative capability could be construed as one factor in determining eligibility--does not preclude the Secretary from choosing a different measure for the former. The two criteria are distinct; administrative capability is a broader concept than eligibility both in its scope of application, i.e., all Title IV, HEA programs rather than just loan programs, and in the range of factors it incorporates.
34
We find more troubling appellants' argument that the Secretary should not be able to do in two steps what he cannot do in one: terminate an institution's participation without certain procedural protections. Although the Cohort Default Rate Rule itself is silent as to when evaluation of administrative capability occurs, we will accept the Secretary's interpretation of the regulation as allowing him only to exercise his authority to provisionally certify institutions in accord with the statutory limitations. It then follows logically--as the Secretary contends--that institutions subject to provisional certification under § 1099c(h) as initial or renewal applications are not entitled to the notice and hearing and the appeal requirements. Such applicants are not "participating" in a Title IV program and do not possess any current "eligibility" that can be lost. To conclude otherwise would create in effect an "entitlement" to certification--for without positing such an entitlement, which the statute does not provide, there is no valid argument that an applicant has a "right" to procedural protections granted participating institutions. On the other hand, the Secretary concedes that the disputed procedural protections do apply to a change from full to provisional certification of a currently participating institution.
35
As to the "second step" of termination of provisional certification, the Secretary's decision not to provide notice and hearing or appeal rights based on § 1099c(h)(3)'s silence--when Congress has specified procedures elsewhere--is not impermissible.9 [316 U.S.App.D.C. 14] That section does not cross-reference § 1094(c) or § 1085(a)(2), and it provides no express procedural protections. While § 1099c(h)(3) does refer to the Secretary's termination of an institution's "participation," what is being terminated is not the full participation assumed in §§ 1094 and 1085(a)(2), but participation that has already been limited based on an evaluation of the risk of continued Title IV funding for a particular institution. And as the Secretary noted at oral argument, a provisionally certified institution merely has one level of administrative review rather than two. Absent any due process concerns, the Secretary's interpretation of § 1099c(h)(3) as establishing a separate standard for termination of provisional certification is permissible.
The Thirteen Week Rule
36
We can more easily dispense with the claim that the "Thirteen Week Rule" is arbitrary and capricious. The HEA requires that institutions have a 70% placement rate for their graduates "as determined under regulations of the Secretary." 20 U.S.C. § 1088(e)(2)(A) (1992). Pursuant to this provision, the Secretary promulgated the "Thirteen Week Rule," which requires that institutions calculate the placement rate for any award year based on "the number of students who, within 180 days of the day they received their degree, ... obtained gainful employment ... and, on the date of this calculation, are employed, or have been employed, for at least 13 weeks following receipt of the credential from the institution." 34 C.F.R. § 668.8(g)1(ii) (1994). Appellants contend that this regulation is arbitrary and capricious because it will be "virtually impossible" to meet. If a school has to calculate the placement rate at the end of the award year, it will have insufficient time to determine whether its graduates have obtained employment within 180 days and maintained that employment for 13 weeks, a total of about 270 days.
37
But the Secretary points out that this "virtual impossibility" is based on a misreading of the statute; the calculation of the placement rate is to be made not at the end of the award year, but at the yearly audit, within 120 days after the fiscal year ends. This allows the institution to look to the post-graduation time period to determine placement. We think this explanation entirely reasonable, and indeed, the auditing provision is explicitly referenced in the placement rate regulation. We nevertheless were concerned by the possibility that some institutions might be caught with insufficient time to calculate the placement rate by the timing of the end of their fiscal year. But, the Secretary represented at oral argument that he would not find a violation nor impose a penalty if the sole reason that an institution was unable to document its placement rate at the time of the audit was that 270 days had not yet elapsed.
The Five Day Rule
38
The Five Day Rule, which applies to non-term based, credit hour (vocational) schools, defines a "week of instructional time to be any week in which at least 5 days of regularly scheduled instruction, examinations, or preparation for examinations occurs ..." 34 C.F.R. § 668.2(b) (1994). Appellants argue that the Five Day Rule is unreasonable because there is no evidence in the record to support the rule, and the severe effect on evening students is not justified by the statute. The Secretary asserts that his interpretation is due Chevron deference because the statutory term "week of instruction" is not defined,10 and emphasizes that the DOE considered all relevant factors and important aspects of the problem, gave an explanation consistent with the evidence, and provided a reasonable interpretation of the statute. We agree with the Secretary that the Five Day Rule is not arbitrary and capricious. The record contained indications that certain non-term based, credit hour institutions abused the definitions of full-time student [316 U.S.App.D.C. 15] and academic year. Furthermore, the effect of the regulation was ameliorated by the Secretary's interpretation--which we must accept because not inconsistent with the regulation--allowing institutions to receive credit for each week of instruction on a pro rata basis, i.e., with only four days of instruction per week, an institution could receive credit for 80% of a week's worth of instruction.
39
Appellants also assert that the February 29 Proposed Rule gave insufficient notice that the Secretary was considering defining a "week of instruction" as five days of class. The Proposed Rule had a "one day rule" for all institutions--defining a week of instruction as any week with one day of class--that supposedly would allow creative and innovative programs, yet "not open the door to abuse." 59 Fed.Reg. at 9,529-30. Appellants acknowledge that the Proposed Rule noted concerns with abuse, but contend that the reference was insufficient to put the public on notice that such a dramatic change in the definition of "week of instruction" was contemplated. The statements were ambiguous, and were obscurely located in the preamble under the definition of full-time student. And while commenters referred to possible abuse of a one day rule, the Secretary cannot change the regulation based solely on comments received. The Five Day Rule, it is argued, was therefore not a "logical outgrowth" from the Proposed Rule. Chocolate Mfrs. Ass'n v. Block, 755 F.2d 1098, 1102-05 (4th Cir.1985).
40
Contrary to appellants' efforts to find ambiguity and obscurity, the February 28 notice explicitly stated that the Secretary was concerned with possible abuse of the definition of academic year and full-time student, and "request[ed] comments on whether, to further address this potential abuse, he should also establish a weekly minimum full-time workload for educational programs that are measured in credit hours but do not use academic terms." 59 Fed.Reg. at 9,530. The statements were logically placed in the discussion of the definitions of statutory terms, and more particularly under a term dealing with workload requirements--"full-time student." Cf. MCI Telecommunications Corp. v. FCC, 57 F.3d 1136, 1141-42 (D.C.Cir.1995) (statements provided insufficient notice when placed in a footnote to the background section, appended to a discussion of a completely separate topic). These statements were sufficient to apprise the public, at a minimum, that the issue of the definition of a full-time workload--possibly through the definition of academic year--was on the table. That the Proposed Rule described the one day rule approvingly does not undermine the notice to interested parties that the rule was subject to modification, particularly in light of adverse comments, as received by the Secretary here. Chocolate Mfrs. Ass'n, 755 F.2d at 1107; City of Stoughton v. EPA, 858 F.2d 747, 753 (D.C.Cir.1988). The change from a one day rule to the Five Day Rule, while not insubstantial, was a "logical outgrowth" from the Proposed Rule's express concerns.
41
* * * * * *
42
The district court's summary judgment in favor of Secretary Riley is therefore
43
Affirmed.
1
Counsel may well also have concluded that the Secretary's awkward description of the Rule and other factors would give rise to a reasonable question whether the Rule was in conformity with the Master Calendar Provision--but that is not the same thing as true confusion as to the purport of the Secretary's promulgation
2
OMB's possible failure to approve a particular provision is also less troubling than appellants suggest because it could only serve to reduce an institution's potential exposure to limited participation or other sanction. The published regulation therefore gives a maximum regulatory exposure; an institution knows fully the substantive requirements, but is aware that some may not be enforced if OMB approval is not forthcoming
3
The regulation does not apply to the pro rata calculation of § 1091b(b)(3), which is already statutorily defined
4
State law and accrediting agency policies may often use different methods to calculate the refund, e.g., by applying various cut-off points during the enrollment period for set refund levels. The Refund Regulation does not affect the method of calculation
NOTE--Some parts of this form are wider than one screen. To view
material that exceeds the width of this screen, use the right arrow
key. To return to the original screen, use the left arrow key.
---------------------------------------------------------------------------------------
Amount Amount Paid Total Prior Amount Current Amount
Paid by / Unpaid Amount Regulation: Refunded Regulation: Refunded
Title IV By Paid Amount (to Amount (to
Programs Student Institution Title Institution Title
Retains IV) Retains IV)
---------------------------------------------------------------------------------------
$4,000 $0 / $1,000 $4,000 $1,000 $3,000 $0 $4,000
---------------------------------------------------------------------------------------
$4,000 $200 / $800 $4,200 $1,000 $3,200 $200 $4,000
---------------------------------------------------------------------------------------
$4,000 $1,000 / $0 $5,000 $1,000 $4,000 $1,000 $4,000
---------------------------------------------------------------------------------------
5
As can be seen in the table, under the Refund Regulation the amount the institution retains varies with the student's unpaid charges, while the amount refunded to the Title IV programs--and therefore the amount of Title IV assistance given to similarly-situated students--remains constant. The Title IV programs will receive a refund of $4,000 regardless of whether the student has paid $200 or $1,000, and therefore will not "make up the difference" for the student who has only paid $200. For sample calculations, see Student Assistance General Provisions, Notice of Proposed Rulemaking, 56 Fed.Reg. 66,496, 66,498 (1991)
6
For example, assuming the same scenario as in the table, supra at 9, under the former regulations, a student who paid the full $1000 would not receive any refund. He therefore would have paid $800 more than the student who paid only $200, and $1,000 more than the student who paid nothing. The latter two students received a constructive "refund" of the amount not paid. That this is a "refund" can be seen more clearly by positing that a student who should have paid the $200 by the time he withdraws, has defaulted on that payment. Under the former regulations, the school would still be entitled to retain $1,000 and would refund only $3,000--$4,000 collected minus $1,000 retained; the student therefore receives the benefit of the $200 he never paid, for which the federal government pays through its reduced refund. The $200 can, not insensibly, be considered a "refund"--so may the $800 not yet paid
7
We disagree with the two district court opinions on which appellants rely--California Cosmetology Coalition and Coalition of New York State Career Schools--because they mischaracterize the regulation as adding to the refund rather than as addressing the problem of students' unpaid charges, and fail to consider the relation of § 1091b(b)'s refund calculation to § 1092(a)(1)(F)'s refund allocation
8
The Secretary also notes that the 25% rate over a three year period was actually a relaxation of the standard from a 20% rate for any one year. That the numerical rate is identical to that of the eligibility provision--which the 1992 Amendments gradually decreased to 25%--is thus fortuitous
9
We are told by the Secretary that the 1992 amendments removed a provision that required all administrative hearings to be "on the record," i.e., with oral hearings. Under the new regulations, this hearing procedure is preserved for fully certified institutions, but only a written administrative review is allowed provisionally certified, "high risk" institutions. We are also informed that while the term "provisional certification" was incorporated in the HEA for the first time by the 1992 amendments, it stems from a prior statutory provision--and administrative practice--allowing the Secretary to enter into "limitation agreements" that provide fewer participation rights to the institution. This regulatory background and experience provide additional support for the Secretary's construction of the provisional certification process
10
20 U.S.C. § 1088 sets minimum weeks of instructional time for program eligibility, but does not define such a week
|
[General]
Name = Black Hole
Class = WCL_GRENADE
Recoil = 0
Recharge = 1
Drain = 10
ROF = 200
[Projectile]
Amount = 1
Speed = 100
Spread = 0
Projectile = p_blackhole.txt
|
As The Denver Post[3]’s Christopher N. Osher[4] reports, while Maes initially thought of the program as most of us do – as a harmless, if marginal, effort to reduce pollution – he now has seen the light.
(It’s that staticy TeeVee light that comes with lost signals, you know.)
“This is bigger than it looks like on the surface, and it could threaten our personal freedoms,” Maes said.
He added: “These aren’t just warm, fuzzy ideas from the mayor. These are very specific strategies that are dictated to us by this United Nations[5] program that mayors have signed on to.”
Now that your Spotted This Morning correspondent has signaled that he disagrees with Maes about the actual goals of the B-Cycle program, please allow me to make an argument that the gubernatorial candidate should have made.
The argument is that with so much transportation funding going to build such things as pricey light rail[8] systems that never pay for themselves, and which reduce only a fraction of vehicle miles traveled, cities are actually increasing congestion by not providing adequate infrastructure for those who drive.
Had Maes stuck to that line of reasoning, his message would have resonated with his party and even among some Independents tired of waiting for cyclists to get out of their way at rush hour.
(Tip to bicycle commuters: When you’re blocking a lane and backing up traffic for blocks, please at least find a sustainable cadence; that pedal-and-coast bit makes you look arrogantly indifferent to your fellow citizens. (And please don’t take offense at this criticism, because I’m with you that a lot of drivers don’t share the road like they should.))
But Maes didn’t sound any of those practical concerns. He went the Blue Helmets route, following an instinct that Tea Party[9] types would be wise to start reining in if they really hope to do such laudable things as reduce deficit spending.
Meanwhile, Maes has said other nutty things this week, as our next item address.
HEY DAN MAES, WE HEARD YOU ON ROSEN
The apparent frontrunner in the Republican’s gubernatorial primary race said some awfully harsh things about The Denver Post this week – which were demonstrably untrue.
In an editorial titled “Get your facts straight,”[10] we expose the falsehoods he made regarding our coverage of his finances this decade.
ROMANOFF EXITS THE IVORY TOWER
Mike Littwin’s analysis of the meltdown at Team Romanoff[11] yesterday gets it right, by pointing out that the millions of PAC dollars that compliment the overall bankroll at the Democratic Senatorial Campaign Committee are fungible, and the Obama-style fiction of not accepting PACs is ridiculously misleading:
Romanoff says he’ll take DSCC money only if PAC money is removed from his bundle. It’s what the DSCC has done for Obama, who doesn’t take PAC money.
Of course, it’s phony-baloney when Obama does it, and it would be just as phony if the DSCC would try to separate the money for Romanoff — which I doubt it would do.
If there’s a pile of money with tobacco money in it, it doesn’t matter which of the dollar bills you take. It’s still a pile of tobacco dollars.
If we concede that a mosque at ground zero[13] is a sign of our tolerance — and it is — surely debating the problems with its setting lets the world know we have the cognitive ability not to be a bunch of saps.
Bigot!
It is, you see, ugly and un-American to question the motivations of those opening an Islamic center a stone’s throw from ground zero — a project that will cost $100 million — but not ugly of organizers to pick a spot that’s a stone’s throw from ground zero.
Oh, and Obama did a telephone call in Colorado yesterday to support Michael Bennet[14].
Your Spotted This Morning correspondent skipped it in order to dine with his wife.
But if the president answered this burning question, please let me know at once:
How is Snooki?
Keep up with your Spotted This Morning correspondent on Facebook [15]and Twitter[16], for links and observations throughout the day.
|
What is -6*j(i) + 3*w(i)?
-3*i + 3
Let t(a) = -5*a**3 + 4*a**2 - 4. Let h(i) = 14*i**3 - 11*i**2 + 11. Let z = -65 + 70. Suppose -2 - 2 = 4*j - z*x, 2*j + x = 12. Calculate j*h(q) + 11*t(q).
q**3
Let c(l) = 5*l**2 + l - 1. Let h(y) = -9*y**2 - 3*y + 3. Let o = 104 + -102. Give o*h(t) + 5*c(t).
7*t**2 - t + 1
Let k(h) = 39*h + 9. Let r(z) = -51*z - 11. Let s(u) = -4*k(u) - 3*r(u). Let t(f) be the first derivative of -13*f**2/2 - 12*f - 1. Give 9*s(q) - 2*t(q).
-q - 3
Let n(x) = x - 3*x**2 + 3*x**2 - x**3. Suppose 5*r - 19 = -4. Let f(s) = -2*s**3 + 4*s. Suppose -12 = 3*c - 9. Calculate c*f(y) + r*n(y).
-y**3 - y
Let f(b) = b. Let q(r) be the second derivative of 5*r**3/6 + 3*r**2/2 - 2*r. Let a = -675 - -678. What is a*f(c) - q(c)?
-2*c - 3
Let u(o) = 51*o. Let i(v) be the second derivative of -5*v**3/6 - 2*v - 38. What is 21*i(w) + 2*u(w)?
-3*w
Let q(w) = -3*w**3 + 4*w + 7. Let i = -446 + 1323. Let f(t) = i - t**3 - 883 - 3*t + 3*t**3. Determine -4*f(s) - 3*q(s).
s**3 + 3
Suppose 3*y - 10 = 2. Let f(w) = -w - 1. Let a be 12 - ((-16 - -13) + 12). Let d(h) = 1. Give a*d(l) + y*f(l).
-4*l - 1
Let j(g) = -11*g**3 - 2*g**2 - 5*g - 1. Let u(d) = -10*d**3 - 3*d**2 - 6*d - 2. Determine -3*j(y) + 2*u(y).
13*y**3 + 3*y - 1
Let u(l) = 2*l**3 - 3*l**2 - 3*l - 3. Let m(p) = 7*p + 4*p**2 + 0 + 0 - 2*p**3 + 1 - 3*p + 3. What is 3*m(y) + 4*u(y)?
2*y**3
Let q(o) = -o - 1. Let k(n) = n**3 - 10*n**2 + 23*n - 11. Let g be k(7). Let i(h) = -h. Calculate g*i(l) - q(l).
-2*l + 1
Let b(v) = -v - 1. Let o(a) = 1315*a - 9 - 2626*a + 1303*a. Give -6*b(i) + o(i).
-2*i - 3
Let z be (-6)/4*(-1 - 5). Let g(j) = 11*j - 6. Let b(w) be the second derivative of 0 - 64*w - 3/2*w**2 + 5/6*w**3. Give z*b(i) - 4*g(i).
i - 3
Suppose 29 - 101 = -24*x. Let n(d) = -d**3 - 7*d**2 + 2. Let g(w) = 3*w**2 - 1. What is x*n(t) + 7*g(t)?
-3*t**3 - 1
Let x(c) be the first derivative of -44 + 0*c**3 - 5/4*c**4 + 2*c - c**2. Let s(z) = 21*z**3 + 9*z - 9. What is -2*s(q) - 9*x(q)?
3*q**3
Let c(y) = -14*y + 15 + 4 + 1. Let u(m) = -5*m + 7. Let d be (204/42)/(20/70). Calculate d*u(q) - 6*c(q).
-q - 1
Let r be 2/(32/12) + 115/(-20). Let l(a) = 4*a - 16. Let v(b) = -b + 5. Determine r*l(q) - 16*v(q).
-4*q
Let j(a) = -3*a**2 - 2. Let h be 4/(-10) + 484/10. Let c be (1/2)/(2*(-2)/h). Let q(v) = 10*v**2 + 7. Let b = 38 + -59. Determine b*j(w) + c*q(w).
3*w**2
Let m(c) = -15*c - 3. Suppose 41*h = 32*h - 45. Let k(o) = -29*o - 5. Give h*m(r) + 3*k(r).
-12*r
Let f(d) = 2*d**3 - 9*d**2 + 8*d - 1. Let k(z) = -z**3 + 8*z**2 - 8*z + 1. What is -5*f(h) - 6*k(h)?
-4*h**3 - 3*h**2 + 8*h - 1
Let g(z) = 2*z. Let l(f) = f**2 + 3*f. Let a = 11 + -7. Suppose 5*d - a = -9. Let r = 3 + d. Calculate r*l(p) - 3*g(p).
2*p**2
Let p(z) = 11*z**3 + 3*z**2 - 3*z. Suppose 9 = -3*i, -2*t + 27 = -5*t - 2*i. Let l(u) = 22*u**3 + 7*u**2 - 7*u. Give t*p(h) + 3*l(h).
-11*h**3
Let b be 5 - ((-9)/(-18) - 1/2). Let s be 7/(b*4/20). Let u(x) = 9*x**2 - 6*x + 8. Let n(k) = -10*k**2 + 7*k - 9. Give s*u(l) + 6*n(l).
3*l**2 + 2
Let v(y) = y**2 - 5. Suppose -t = -2*t + 5*m - 18, -3*m = -2*t - 8. Let a(z) = 0*z**2 + z**t + 0 - 2. Suppose -25 = 5*q - 0*q. Determine q*a(i) + 2*v(i).
-3*i**2
Let g(p) = 8155*p + 63. Let q(c) = -263*c - 2. Calculate -2*g(j) - 63*q(j).
259*j
Let t(w) = 86*w + 4. Let y(i) = 1. What is -t(v) + 5*y(v)?
-86*v + 1
Let i(z) = 7*z + 8. Suppose 0 = 3*p + 4*k - 2, -3*p + 7*k = 8*k + 13. Let r(q) = -6*q + 0 - 2 - 5. Determine p*r(m) - 5*i(m).
m + 2
Let w(s) = 2*s + 1. Let t(q) = -q**2 + 12*q - 50. Determine -t(p) + 6*w(p).
p**2 + 56
Let j(z) = -6*z**3 + 15*z**3 + 8 + 2*z**2 - 2. Let l(t) = -t + 36. Let u be l(19). Let p(a) = 26*a**3 + 6*a**2 + 17. Determine u*j(n) - 6*p(n).
-3*n**3 - 2*n**2
Let x(o) = -2*o**3 + 58*o**2 + 11*o - 33. Let l(z) = z - 3. Calculate -22*l(j) + 2*x(j).
-4*j**3 + 116*j**2
Let p(i) = -551*i**3 + 10*i**2 + 5*i - 5. Let m(c) = 245196*c**3 - 4448*c**2 - 2224*c + 2224. Determine 5*m(w) + 2224*p(w).
556*w**3
Let n(a) = a**3 - 4*a**2 - a - 4. Let g(m) = m**3 + 5*m**2 + 2*m + 5. What is 2*g(z) + 3*n(z)?
5*z**3 - 2*z**2 + z - 2
Let k(w) = 746*w + 20. Let v(g) = -746*g - 25. Calculate -5*k(y) - 4*v(y).
-746*y
Suppose 4*t - 85 - 3 = 0. Let p = -20 + t. Let m(n) = -n**2 - 3*n + 2*n**p + 0*n**2. Let y(f) = 4*f**2 - 10*f. Calculate 7*m(r) - 2*y(r).
-r**2 - r
Let m(c) = 22*c**3 + 3*c - 3. Suppose -7 - 92 = -33*n. Let k(j) = -703*j**3 - 95*j + 95. Give n*k(w) + 95*m(w).
-19*w**3
Suppose 4*l - 19 = -15*l. Let d(t) = -t + 1. Let f(o) = 3*o**2 + 5*o - 5. What is l*f(b) + 6*d(b)?
3*b**2 - b + 1
Let k(v) = 9*v**3 + 2*v**2 - 2*v + 3. Let f(s) = -10*s**3 - 4*s**2 + 3*s - 4. What is -4*f(w) - 5*k(w)?
-5*w**3 + 6*w**2 - 2*w + 1
Let o(v) = 1. Let a(x) = 2*x - 5. Let j = 4 - 5. Suppose -2*p - 2 = 2. Let r be 43/(-9) - p/(-9). Calculate j*a(u) + r*o(u).
-2*u
Let j(a) = -312*a**2 - 8*a + 6. Let d(f) = -104*f**2 - 3*f + 2. Give -8*d(h) + 3*j(h).
-104*h**2 + 2
Let f(u) = 3*u**2 - 1. Let q(c) = 103*c**2 + 2*c + 3. Give 3*f(h) + q(h).
112*h**2 + 2*h
Let a(j) = 8*j**2 + 2. Let x(n) = -n**3 - 17*n**2 + n - 5. Give 5*a(v) + 2*x(v).
-2*v**3 + 6*v**2 + 2*v
Let z(x) = -60*x**2 + 5*x + 5. Let r(n) = 90*n**2 - 7*n - 7. Determine 5*r(y) + 7*z(y).
30*y**2
Let l = 5 + -4. Let r(w) = -3*w + 1. Let f be r(l). Let b(u) = u. Let j(q) be the first derivative of 3*q**2/2 + q - 3. Give f*j(o) + 5*b(o).
-o - 2
Let f(o) = -2 + 37*o - 68*o + 7*o**2 + 25*o. Let a(c) = -11 + 11 + c - c**2. Suppose 3*z + 21 = -5*b, -2*z + 4*z - 36 = 5*b. Determine b*a(s) - f(s).
-s**2 + 2
Let r(s) = -3*s**2 - 80*s - 5. Let v(j) = 4*j**2 + 79*j + 6. Give -6*r(b) - 5*v(b).
-2*b**2 + 85*b
Let x(w) = -11*w**3 - 26*w**2 - 96. Let a(q) = -5*q**3 - 11*q**2 - 48. What is 5*a(r) - 2*x(r)?
-3*r**3 - 3*r**2 - 48
Let n(w) = -3*w**3 + 4*w**2 + 12*w - 8. Let r(s) = -2*s**3 + 3*s**2 + 10*s - 7. Calculate -3*n(k) + 4*r(k).
k**3 + 4*k - 4
Let j(i) be the second derivative of -7*i**4/12 - i**3/3 + 7*i**2/2 + 3*i - 6. Let o(y) = -y**2. What is j(d) - 6*o(d)?
-d**2 - 2*d + 7
Let q(k) = k**3 - k + 2. Let y(c) = -c**2 + 1. Let j(v) = 0*v**2 - 33 + v - 2*v + 32 + 2*v**2. Let o be j(-1). Let w = -11 + 10. Calculate o*y(d) + w*q(d).
-d**3 - 2*d**2 + d
Let z(a) = -132*a + 4. Let r(s) = -71*s + 2. Calculate 7*r(g) - 4*z(g).
31*g - 2
Let t(h) = h**3 + 2*h**2 + h + 10. Let v be t(-3). Let c(f) = -3*f + 1. Let j(q) = -14*q + 6. What is v*j(m) + 11*c(m)?
-5*m - 1
Let b(s) = -4*s - 10. Let x(u) = 2*u + 1. Give b(g) - 3*x(g).
-10*g - 13
Let k(i) = -20*i**3 - 8*i + 6. Let d be (91 + -81)/(-3 - -1). Let l(y) = -19*y**3 - 7*y + 5. Give d*k(m) + 6*l(m).
-14*m**3 - 2*m
Let a(q) = -21 - 572*q + 282*q + 286*q. Let j(n) = -2*n - 10. Determine 6*a(b) - 13*j(b).
2*b + 4
Let i(j) = 3*j + 24. Let g(n) be the third derivative of n**4/24 + 4*n**3/3 - 4*n**2 + 52. Calculate 7*g(u) - 2*i(u).
u + 8
Let l(m) = -m + 694. Let x(f) = 139. Determine 2*l(t) - 11*x(t).
-2*t - 141
Let q(v) = 60*v**3 - 17*v**2 + 6. Let r(j) = 2*j**3 + 2*j**2 - 1. Determine -q(o) - 6*r(o).
-72*o**3 + 5*o**2
Let c(k) = -k**3 - 6*k**2 + 1. Suppose -z + 4*t + 62 + 31 = 0, t = z - 81. Let a = z - 73. Let q(j) = 2*j**3 + 7*j**2 - 1. Determine a*c(h) + 3*q(h).
2*h**3 - 3*h**2 + 1
Let v be (-19 - -13)*(-2)/(-1). Let x(n) = -4*n - 9. Let t(m) = 0*m - m - 6*m - 9. Let s(o) = -29*o - 35. Let f(j) = -4*s(j) + 18*t(j). Give v*x(y) + 5*f(y).
-2*y - 2
Let m(u) = 3*u + 5*u**2 + 2*u + 5*u**2 - 4*u**2. Let s(c) = -5*c**2 - 4*c. Let w be -2*1 - (-4 + 7). Suppose 9 = -7*k - 19. Determine k*m(t) + w*s(t).
t**2
Let z(g) = 595*g - 19. Let l(q) = 297*q - 7. Calculate -5*l(n) + 2*z(n).
-295*n - 3
Let g be 12/27 - 590/(-90). Let c(p) = -7*p**3 - 2*p - 6. Let s(n) = 6*n**3 + 7 - 2*n**3 + 4*n**3 + 3*n. Determine g*c(v) + 6*s(v).
-v**3 + 4*v
Let z(a) = -183*a + 2. Let i(j) = -550*j + 8. What is -2*i(r) + 7*z(r)?
-181*r - 2
Let i(n) = -8*n**2 + 3*n - 5. Let j(x) = 7*x**2 - 4*x + 4. Give -5*i(m) - 6*j(m).
-2*m**2 + 9*m + 1
Let b(z) = 3*z**2 + 6*z + 6. Let f(i) = -3*i**2 - 7*i - 7. Let r(y) = 5*b(y) + 4*f(y). Let n(q) = -3*q + 1 - q**2 - q**2 - 4. What is 2*n(p) + 3*r(p)?
5*p**2
Let h(b) = -4*b - 3. Let j(c) = -3*c - 4. Let z(t) = -t**3 - 2*t**2 + 7*t - 8. Let o be z(-4). Give o*h(x) + 3*j(x).
7*x
Let c = -18 - -20. Let w(q) = q**3 + q**2 - q + 1. Let p(l) = -5*l**3 - 7*l**2
|
Mass vaccination against hepatitis B: the French example.
Mainland France is considered as a low endemicity area for hepatitis B, but the French Caribbean and Pacific territories are classified into areas of intermediate and high endemicity. In France vaccination programmes aimed at high-risk groups were started in 1982 (including health care workers and patients receiving blood products) and the immunization of babies born of hepatitis B virus surface antigen (HBsAg)-positive mothers was reinforced in 1992. Considering the drawbacks and limited effect of targeted vaccination policies, universal vaccination targeted particularly to the preadolescent and adolescent population was initiated in 1994. In 1995, hepatitis B virus (HBV) vaccination was included in the infant immunization schedule. However, the emotion generated by the claim that HBV vaccination could have led to the development of central nervous system demyelinating disorders resulted in a marked decline of HBV vaccine use, both in the pediatric (23.3% vaccination coverage in children less than 13 years old) and in the adult population. The current coverage rates are likely to be insufficient to bring about a significant reduction in the control of hepatitis B in France. The success of universal immunization is highly dependent on reinstating the confidence of the public and health care professionals in the safety and efficacy of hepatitis B vaccines.
|
---
abstract: 'Zonotopes are becoming an increasingly popular set representation for formal verification techniques. This is mainly due to their efficient representation and their favorable computational complexity of important operations in high-dimensional spaces. In particular, zonotopes are closed under Minkowski addition and linear maps, which can be very efficiently implemented. Unfortunately, zonotopes are not closed under Minkowski difference for dimensions greater than two. However, we present an algorithm that efficiently computes a halfspace representation of the Minkowski difference of two zonotopes. In addition, we present an efficient algorithm that computes an approximation of the Minkowski difference in generator representation. The efficiency of the proposed solution is demonstrated by numerical experiments. These experiments show a reduced computation time in comparison to that when first the halfspace representation of zonotopes is obtained and the Minkowski difference is performed subsequently.'
author:
- Matthias Althoff
bibliography:
- 'althoff\_own.bib'
- 'althoff\_other.bib'
title: On Computing the Minkowski Difference of Zonotopes
---
Introduction {#sec:introduction}
============
Zonotopes have recently enjoyed a lot of popularity as a set representation for formal methods in engineering and computer science. One of the main reasons is that zonotopes can be efficiently stored in computer systems, especially when dealing with high-dimensional problems. Another important reason is that zonotopes are closed under linear maps and Minkowski addition as shown in Sec. \[sec:preliminariesAndProblemStatement\]. However, to the best knowledge of the author, there exists no published algorithm for computing the Minkowski difference of zonotopes. Such an algorithm would open up new possibilities for formal methods in engineering and computer science. We first review existing literature on zonotopes for formal verification and state estimation of continuous dynamic systems, formal verification of computer programs, and problems in computational geometry.
Today, zonotopes are widely used to compute the reachable set of continuous dynamic systems, i.e., the set of states that are reachable by the solution of a differential equation when the initial state, inputs, and parameters are uncertain within bounded sets. Early works on this problem used a variety of set representations, such as polytopes [@Chutinan2003], ellipsoids [@Kurzhanski2000], oriented hyper-rectangles [@Stursberg2003], and level sets [@Mitchell2005]. All the mentioned set representations are either not closed under important operations (e.g. ellipsoids and oriented hyper-rectangles are not closed under Minkowski addition) or are computationally inefficient in high-dimensional spaces (e.g. polytopes and level sets). For linear continuous systems in particular, zonotopes provide an excellent compromise between accuracy and efficiency as first demonstrated by K[ü]{}hn [@Kuehn1998]. Later, Girard [@Girard2005] extended the approach to uncertain inputs. This work also developed a method for computing the reachable set for all times except isolated points in time. It has led to a wrapping-free algorithm, i.e., an algorithm for which over-approximations are not accumulating, in [@Girard2006]. Further extensions of the previously mentioned work are the use for systems with uncertain parameters [@Althoff2011a], nonlinear ordinary differential equations [@Althoff2008c], and nonlinear differential-algebraic systems [@Althoff2014a]. Reachable sets have been applied to many technical realizations, such as automated vehicles [@Althoff2014b], human-robot collaboration [@Pereira2015], and smart grids [@Althoff2014c].
Zonotopes are also used to rigorously estimate the states of dynamical systems as an alternative to observers that optimize with respect to the best estimate, such as Kalman filters. One of the first works that uses zonotopes for state-bounding observers is [@Combastel2003]. As with reachability analysis, this work has been extended to nonlinear systems in [@Alamo2003; @Combastel2005] and systems with uncertain parameters [@Le2013]. A further application of zonotopes for continuous dynamic systems is model-predictive control with guaranteed stability [@Bravo2006]. Advances in using zonotopes for control and guaranteed state estimation are summarized in [@Le2013b].
In computer science, zonotopes are used as abstract domains in abstract interpretation for static program analysis [@Gaubolt2006], whose implementation details can be found in [@Ghorbal2009]. An extension of zonotopes with (sub-)polyhedric domains can be found in [@Ghorbal2010]. Further extensions of zonotopes exist, but for the brevity of the literature review, they are not presented. Zonotopes are also used in automated theorem provers as a set representation [@Immler2015a]. Finally, zonotopes are used as bounding volumes to facilitate fast collision detection algorithms [@Guibas2005].
Zonotopes are also an active research area in computational geometry. However, this paper mainly focuses on computational aspects on Minkowski difference targeted for applications in engineering and computer science. Thus, recent developments regarding combinatorics and relations to other mathematical problems are only briefly reviewed. This is not to say that this review is complete. The association of zonotopes with higher Bruhat orders is described in [@Felsner2001]. Coherence and enumeration of tilings of 3-zonotopes are addressed in [@Bailey1999]. Properties of zonotopes with large 2D-cuts are derived in [@Roerig2009] with examples provided by the *Ukrainian easter eggs*. In [@Campi1994], an enclosure of zonoids by zonotopes is derived, which has the same support values for fixed directions. A bound for the number of generators with equal length of a zonotope required to enclose a ball up to a certain Hausdorff distance is obtained in [@Bourgain1993]. In [@Ferrez2005] it is shown that the problem of maximizing a quadratic form in $n$ binary variables when the underlying (symmetric) matrix is positive semidefinite, can be reduced to searching the extreme points of a zonotope. The problem of listing all extreme points of a zonotope is addressed in [@Fukuda2004].
As shown above, the applications of zonotopes are manifold. Most works use zonotopes to enclose other sets, resulting in over-approximations. However, for many applications the ability to compute the Minkowski difference[^1] is essential. The use of the Minkowski difference can be exemplified through the computation of invariance sets of dynamic systems [@Lombardi2011], reachability analysis [@Rakovic2006], robust model predictive control [@Richards2007], optimal control [@Kerrigan2002], robotic path planning [@Bernabeu2001], robust interval regression analysis [@Inuiguchi2002], and cooperative games [@Danilov2000]. Providing an algorithm for computing the Minkowski difference of zonotopes would open up many new possibilities. Minkowski difference is well-known and rather straightforward to implement for polytopes for which open source implementations exist, see e.g. [@Herceg2013]. Since a zonotope is a special case of a polytope, one could use the algorithms for polytopes. However, this is less efficient compared to the novel computation for zonotopes as presented later.
The paper is organized as follows: We recall in Sec. \[sec:preliminariesAndProblemStatement\] some preliminaries on zonotopes and provide the definition of the Minkowski difference. In Sec. \[sec:halfspaceConversion\], algorithms are presented for computing the halfspace representation of the Minkowski difference of zonotopes. The resulting halfspace representation is used to obtain an approximation of the Minkowski difference in generator representation in Sec. \[sec:generatorAdjustment\]. The performance of the approach is demonstrated by numerical experiments in Sec. \[sec:numericalExperiments\].
Preliminaries and Problem Statement {#sec:preliminariesAndProblemStatement}
===================================
We first recall the representation of a zonotope. Throughout this paper, we index elements of vectors and matrices by subscripts and enumerate vectors or matrices by superscripts in parentheses to avoid confusion with the exponentiation of a variable. For instance $A{^{(k)}}_{ij}$ is the element of the ${i^\text{th}}$ row and ${j^\text{th}}$ column of the ${k^\text{th}}$ matrix $A{^{(k)}}$.
Zonotopes are parameterized by a center $c \in \mathbb{R}^n$ and generators $g{^{(i)}} \in \mathbb{R}^n$ and defined for $c\in\mathbb{R}^{n}$, $g{^{(i)}}\in\mathbb{R}^{n}$ as $$\label{eq:zonotope}
\mathcal{Z} = \Big\{ c + \sum_{i=1}^{p} \beta_i \, g{^{(i)}} \Big| \beta_i \in [-1,1] \Big\}.$$ The order of a zonotope is defined as $\varrho = \frac{p}{n}$.
We write in short $\mathcal{Z}=(c,g{^{(1)}},\ldots,g{^{(p)}})$. Zonotopes are a compact way of representing sets in high-dimensional spaces. More importantly, linear maps $M\otimes \mathcal{Z}:=\{M z |z \in \mathcal{Z}\}$ ($M\in\mathbb{R}^{q\times n}$) and Minkowski addition $\mathcal{Z}_1\oplus \mathcal{Z}_2 := \{z_1 + z_2 | z_1 \in \mathcal{Z}_1 , z_2 \in \mathcal{Z}_2\}$, as required in many of the applications mentioned in Sec. \[sec:introduction\], can be computed efficiently and exactly [@Kuehn1998b]. Given $\mathcal{Z}_1=(c, g{^{(1)}}, \ldots, g{^{(p_1)}})$ and $\mathcal{Z}_2=(d, h{^{(1)}}, \ldots, h{^{(p_2)}})$ one can efficiently compute $$\label{eq:additionAndMultiplication}
\begin{split}
\mathcal{Z}_1 \oplus \mathcal{Z}_2 & = (c + d, g{^{(1)}}, \ldots, g{^{(p_1)}}, h{^{(1)}}, \ldots, h{^{(p_2)}}), \\
M\otimes \mathcal{Z}_1 & = (M \, c, M\, g{^{(1)}}, \ldots, M \, g{^{(p_1)}}).
\end{split}$$ Note that in the remainder of this paper, the symbol for set-based multiplication is often omitted for simplicity of notation. Further, one or both operands of set-based operations can be singletons and set-based multiplication has precedence over Minkowski addition. A zonotope can be interpreted in three ways, see e.g. [@Henk2004 p. 364] and [@Ziegler1995 Sec. 7.3]. All interpretations are now introduced, as we use each one in this paper to show certain properties concisely.
#### **Minkowski addition of line segments (first interpretation)**
A zonotope can be interpreted as the Minkowski addition of line segments $l{^{(i)}} = [-1,1]\, g{^{(i)}}$, which is visualized step-by-step for $\mathbb{R}^2$ in Fig. \[fig:zonotope\].
#### **Projection of a hypercube (second interpretation)**
A zonotope can be interpreted as the projection of a $p$-dimensional unit hypercube $\mathcal{C} = [-1,1]^p$ onto the $n$-dimensional space by the matrix of generators $G = \begin{bmatrix} g{^{(1)}}, & \ldots, & g{^{(p)}} \end{bmatrix}$, which is then translated to the center $c$: $\mathcal{Z} = c \oplus G \otimes \mathcal{C}$. We write in short $\mathcal{Z} = (c, G)$.
#### **Polytopes whose faces are centrally symmetric (third interpretation)**
A zonotope can be interpreted as a polytope whose $j$-faces are centrally symmetric. As later shown in Sec. \[sec:halfspaceConversion\], the facets ($(n-1)$-faces) are obtained by choosing particular halfspaces $\{x \in \mathbb{R}^n \big| {c{^{(i)}}}^T \, x \leq d_i\}$, $c{^{(i)}}\in\mathbb{R}^{n}$, $d_i\in\mathbb{R}$ whose intersection forms the halfspace representation (H-representation) of a zonotope: $$\label{eq:zonotopeHalfspace}
\mathcal{Z}_H = \Big\{x \in \mathbb{R}^n \big| C \, x \leq d \Big\},$$ where $C = \begin{bmatrix} c{^{(1)}}, & \ldots, & c{^{(q)}} \end{bmatrix}^T$ and $d = \begin{bmatrix} d_1, & \ldots, & d_q \end{bmatrix}^T$.
\[\]\[\][$c$]{} \[\]\[\][$l{^{(1)}}$]{} \[\]\[\][$l{^{(2)}}$]{} \[\]\[\][$l{^{(3)}}$]{}
Related to the Minkowski addition is the Minkowski difference. Given the minuend $\mathcal{Z}_m$ and the subtrahend $\mathcal{Z}_s$ of equal dimension, the Minkowski difference is defined as (see [@Montejano1996]) $$\mathcal{Z}_m\ominus \mathcal{Z}_s = \{x \in \mathbb{R}^n | x \oplus \mathcal{Z}_s \subseteq \mathcal{Z}_m \},$$ such that $(\mathcal{Z}_m\ominus \mathcal{Z}_s) \oplus \mathcal{Z}_s \subseteq \mathcal{Z}_m$. We refer to $\mathcal{Z}_m\ominus \mathcal{Z}_s$ as the *difference*. When $\tilde{\mathcal{Z}}_m = \mathcal{A} \oplus \mathcal{Z}_s$, where $\mathcal{A}$ is an arbitrary set, we have $(\tilde{\mathcal{Z}}_m \ominus \mathcal{Z}_s) \oplus \mathcal{Z}_s = \tilde{\mathcal{Z}}_m$. An alternative definition (see [@Ghosh1991; @Montejano1996]) is $$\label{eq:infiniteIntersectionDefinition}
\mathcal{Z}_m\ominus \mathcal{Z}_s = \bigcap_{z_s \in \mathcal{Z}_s} (\mathcal{Z}_m - z_s).$$ The Minkowski difference can be obtained by translations along generators in Theorem \[thm:minkowskiDifferenceFromGenerators\], which is based on Lemma \[thm:finitelyManyIntersections\].
\[thm:finitelyManyIntersections\] When the subtrahend $\mathcal{Z}_s$ is convex, it suffices to compute the Minkowski difference from intersections of translations by the vertices $v{^{(i)}} \in \mathcal{V}$ of $\mathcal{Z}_s$: $$\mathcal{Z}_m\ominus \mathcal{Z}_s = \bigcap_{v{^{(i)}} \in \mathcal{V}} (\mathcal{Z}_m - v{^{(i)}})$$
See [@Kolmanovsky1998 Theorem 2.1].
\[thm:minkowskiDifferenceFromGenerators\] When the sets $\mathcal{Z}_m$ and $\mathcal{Z}_s$ are zonotopes, it suffices to apply the following recursive procedure using only the generators $g{^{(s,i)}}$ of $\mathcal{Z}_s = (c{^{(s)}}, g{^{(s,1)}}, \ldots, g{^{(s,p_s)}})$ to obtain $\mathcal{Z}_m \ominus \mathcal{Z}_s$: $$\begin{split}
\mathcal{Z}_{int}{^{(1)}} =& \mathcal{Z}_m - c{^{(s)}} \\
\forall i=1\ldots p_s: \quad \mathcal{Z}_{int}{^{(i+1)}} =& (\mathcal{Z}_{int}{^{(i)}} + g{^{(s,i)}}) \cap (\mathcal{Z}_{int}{^{(i)}} - g{^{(s,i)}}) \\
\mathcal{Z}_m\ominus \mathcal{Z}_s =& \mathcal{Z}_{int}{^{(p_s+1)}}
\end{split}$$
As shown in [@Danilov2000 eq. (2)], it generally holds for sets $\mathcal{A}$, $\mathcal{B}$, and $\mathcal{C}$ that $$\label{eq:MinkowskiAdditionToDifference}
\mathcal{A} \ominus (\mathcal{B} \oplus \mathcal{C}) = (\mathcal{A} \ominus \mathcal{B}) \ominus \mathcal{C}.$$ Let us rewrite $\mathcal{Z}_m \ominus \mathcal{Z}_s = \mathcal{Z}_m \ominus (c{^{(s)}} \bigoplus_{i=1}^{p_s} [-1,1] \otimes g{^{(s,i)}})$. By recursively applying we obtain $$\label{eq:recursiveMinkoskiDifference}
\mathcal{Z}_m \ominus \mathcal{Z}_s = \bigg(\Big((\mathcal{Z}_m - c{^{(s)}}) \ominus [-1,1] \otimes g{^{(1)}} \Big) \ominus \ldots \bigg) \ominus [-1,1] \otimes g{^{(p_s)}}.$$ The Minkowski difference with $[-1,1] \otimes g{^{(s,i)}}$ can be further simplified according to Lemma \[thm:finitelyManyIntersections\] by only considering the extreme cases, such that for a set $\mathcal{A}$ we have $$\label{eq:generatorDifferenceToIntersection}
\mathcal{A} \ominus [-1,1] \otimes g{^{(s,i)}} = (\mathcal{A} + g{^{(s,i)}}) \cap (\mathcal{A} - g{^{(s,i)}}).$$ Inserting into results in the theorem to be proven.
To provide the reader with a better understanding of the Minkowski difference of zonotopes, we show three distinctive examples in Fig. \[fig:minkowskiDifferenceExamples\]: (a) the zonotope order of $\mathcal{Z}_d = \mathcal{Z}_m \ominus \mathcal{Z}_s$ equals the one of the minuend, (b) the order is reduced, and (c) the result is the empty set. We choose $$\begin{split}
& \mathcal{Z}_m = \left( \begin{bmatrix} 1 \\ 1 \end{bmatrix}, \begin{bmatrix} 1 \\ 0 \end{bmatrix}, \begin{bmatrix} 0 \\ 1 \end{bmatrix}, \begin{bmatrix} 1 \\ 1 \end{bmatrix} \right), \\
& \mathcal{Z}_{s,1} = \left( \begin{bmatrix} 0 \\ 0 \end{bmatrix}, \begin{bmatrix} 0.5 \\ 0 \end{bmatrix}, \begin{bmatrix} 0 \\ 0.5 \end{bmatrix} \right),
\mathcal{Z}_{s,2} = \left( \begin{bmatrix} 0 \\ 0 \end{bmatrix}, \begin{bmatrix} 1 \\ 0 \end{bmatrix}, \begin{bmatrix} 0 \\ 0.5 \end{bmatrix} \right),
\mathcal{Z}_{s,3} = \left( \begin{bmatrix} 0 \\ 0 \end{bmatrix}, \begin{bmatrix} 2 \\ 0 \end{bmatrix}, \begin{bmatrix} 0 \\ 0.5 \end{bmatrix} \right).
\end{split}$$
\[c\]\[c\][$x_1$]{} \[c\]\[c\][$x_2$]{} \[r\]\[c\][$\mathcal{Z}_d \oplus \mathcal{Z}_s$]{} \[l\]\[c\][$\mathcal{Z}_m$]{} \[l\]\[c\][$\mathcal{Z}_s$]{} \[r\]\[c\][$\mathcal{Z}_d$]{} \[c\]\[c\][$\mathcal{Z}_s$]{} \[c\]\[c\][$\mathcal{Z}_d$]{} \[r\]\[c\][$\mathcal{Z}_m$]{}
One can observe in Fig. \[fig:minkowskiDiffFull\] that all halfspaces of $\mathcal{Z}_m$ remain for $\mathcal{Z}_m \ominus \mathcal{Z}_{s,1}$. The result of $\mathcal{Z}_m \ominus \mathcal{Z}_{s,2}$ in Fig. \[fig:minkowskiDiffRed\] does not require all halfspaces of $\mathcal{Z}_m$. Finally, Fig. \[fig:minkowskiDiffEmpty\] shows that $\mathcal{Z}_m \ominus \mathcal{Z}_{s,3} = \emptyset$. The halfspace representation of of the Minkowski difference of zonotopes is addressed in the next section.
Halfspace Conversion of Zonotopes {#sec:halfspaceConversion}
=================================
As it is later shown in Sec. \[sec:generatorAdjustment\], zonotopes are not closed under Minkowski difference (unless in the two-dimensional case). One possibility to obtain the Minkowski addition, is to first convert both zonotopes into halfspace representation and then use standard algorithms for obtaining the Minkowski difference. In this section, we propose a more efficient algorithm for obtaining the halfspace representation of the Minkowski difference. For that purpose, we require the $n$-dimensional cross product, which is an extension of the well-known cross product of two three-dimensional vectors. The resulting vector is orthogonal to all $n-1$ $n$-dimensional vectors.
\[def:nDimCrossProduct\] Given are $n-1$ vectors $h{^{(i)}}\in\mathbb{R}^n$ which are stored in a matrix $H=[h{^{(1)}},\ldots,h{^{(n-1)}} ]\in\mathbb{R}^{n\times n-1}$. We further denote by $H^{[i]}\in\mathbb{R}^{n-1\times n-1}$ the matrix $H$, where the ${i^\text{th}}$ row is removed. The cross product $nX(H)$ of the vectors stored in $H$ is defined as $$y=nX(H)=\begin{bmatrix} \det(H^{[1]}), & \ldots, & (-1)^{i+1}\det(H^{[i]}), & \ldots, & (-1)^{n+1}\det(H^{[n]}) \end{bmatrix}^T.$$
From now on, we assume that all generators of each zonotope are not aligned. If two aligned generators would exist, e.g. $\gamma \, g{^{(i)}} = g{^{(j)}}$, $\gamma \in \mathbb{R}$, one could easily adjust $g{^{(i)}} := (\gamma + 1) g{^{(i)}}$ and remove $g{^{(j)}}$. For a general zonotope, the generator matrix $G$ is of dimension $n \times p$. The normal vector of each facet is obtained from the $n$-dimensional cross product of $n-1$ generators, which have to be selected from $p$ generators for each non-parallel facet, so that one obtains $2\binom{p}{n-1}$ facets [@Gover2010 Lemma 3.1]. This is always possible since we assume without loss of generality that all generators are not aligned. The generators that span a facet are obtained by canceling $p-n+1$ generators from the generator matrix $G$, which is denoted by $G^{\langle \gamma,\ldots,\eta \rangle}$, where $\gamma,\ldots,\eta$ are the $p-n+1$ indices of the generators that are taken out of $G$.
\[thm:hZonotope\] The halfspace representation $C\, x\leq d$ of a zonotope $(c,G)$ with $p$ independent generators is $$\begin{gathered}
C=\begin{bmatrix} C^+ \\ -C^+\end{bmatrix}, \quad C^+= \begin{bmatrix} C_1^+ \\ \vdots \\ C_\nu^+ \end{bmatrix}, \quad C_i^+=\frac{nX(G^{\langle \gamma,\ldots,\eta \rangle})^T}{\|nX(G^{\langle \gamma,\ldots,\eta \rangle})\|_2}, \\
d=\begin{bmatrix} d^+ \\ d^-\end{bmatrix} = \begin{bmatrix} {C^+}\, c + \Delta d \\ -{C^+}\, c + \Delta d \end{bmatrix}, \quad
\Delta d = \sum_{\upsilon=1}^{p} |{C^+}\, g{^{(\upsilon)}}|. \end{gathered}$$ The index $i$ varies from $1$ to $\nu = \binom{p}{n-1}$.
The ${i^\text{th}}$ facet is spanned by $n-1$ generators, which are obtained by canceling $p-n+1$ generators with indices $\gamma,\ldots,\eta$ from $G$, which is denoted by $G^{\langle \gamma,\ldots,\eta \rangle}$. This is illustrated for a two-dimensional example in Fig. \[fig:generatorsReachingFacets\]. As illustrated in Fig. \[fig:normalVector\], the normal vector of this facet is obtained by the normalized $n$-dimensional cross product (see Def. \[def:nDimCrossProduct\]): $$C_i^+=nX(G^{\langle \gamma,\ldots,\eta \rangle})^T/\|nX(G^{\langle \gamma,\ldots,\eta \rangle})\|_2.$$ It is sufficient to compute $\nu$ normal vectors denoted by a superscript ’$+$’, as the remaining $\nu$ normal vectors denoted by a superscript ’$-$’ differ only in sign due to the central symmetry of zonotopes. A possible point $x{^{(i)}}$ on the ${i^\text{th}}$ halfspace is obtained by adding generators in the direction of the normal vector to the center (see Fig. \[fig:generatorsReachingFacets\]): $$x{^{(i)}} = c + \sum_{\upsilon=1}^{p} \operatorname{\mathtt{sgn}}(C_i^+ g{^{(\upsilon)}}) g{^{(\upsilon)}},$$ where $\operatorname{\mathtt{sgn}}()$ is the sign function returning the sign of a value. Note that the generators spanning the ${i^\text{th}}$ facet are not required to reach the halfspace. To keep the result simple, however, we add them in the above formula, since they only translate $x{^{(i)}}$ on the facet. Since the elements $d_i^+$ are the scalar products of any point on the ${i^\text{th}}$ halfspace with its normal vector, we obtain $$\begin{split}
d_i^+ = {C_i^+} x{^{(i)}}
= {C_i^+} \Big(c + \sum_{\upsilon=1}^{p} \operatorname{\mathtt{sgn}}({C_i^+}\, g{^{(\upsilon)}}) g{^{(\upsilon)}}\Big)
= {C_i^+} c + \sum_{\upsilon=1}^{p} |{C_i^+}\, g{^{(\upsilon)}}| = {C_i^+} c + \Delta d_i.
\end{split}$$ Analogously, the values for $d_i^-$ are obtained.
\[c\]\[c\][$C_1^+$]{} \[c\]\[c\][$C_2^+$]{} \[c\]\[c\][$C_3^+$]{} \[c\]\[c\][$C_4^+$]{} \[c\]\[c\][$c$]{} \[c\]\[c\][$g{^{(1)}}$]{} \[c\]\[c\][$g{^{(2)}}$]{} \[c\]\[c\][$g{^{(3)}}$]{} \[c\]\[c\][$g{^{(4)}}$]{} \[c\]\[c\][$-g{^{(1)}}$]{} \[c\]\[c\][$-g{^{(2)}}$]{} \[c\]\[c\][$g{^{(3)}}$]{} \[c\]\[c\][$g{^{(2)}}$]{} \[c\]\[c\][$g{^{(3)}}$]{} \[l\]\[c\][$x{^{(1)}}=x{^{(2)}}$]{} \[l\]\[c\][$x{^{(3)}}$]{} \[l\]\[c\][$x{^{(4)}}$]{} ![Normal vector of a facet of a three-dimensional zonotope spanned by two generators.[]{data-label="fig:normalVector"}](./figures/plot_2d_Jun02_c.eps "fig:"){width="\columnwidth"}
\[c\]\[c\][$0$]{} \[c\]\[c\][$-2$]{} \[c\]\[c\][$2$]{} \[c\]\[c\][$x_1$]{} \[c\]\[c\][$x_2$]{} \[c\]\[c\][$x_3$]{} \[c\]\[c\][$g{^{(1)}}$]{} \[c\]\[c\][$g{^{(2)}}$]{} \[c\]\[c\][$C_1^+$]{} ![Normal vector of a facet of a three-dimensional zonotope spanned by two generators.[]{data-label="fig:normalVector"}](./figures/plot_3d_Jun02_d.eps "fig:"){width="\columnwidth"}
Next, we directly obtain the halfspace representation of the intersection of two zonotopes, which are identical, except that one of them is translated by a vector $2 \, h$.
\[thm:hZonotopeIntersection\] Given are two zonotopes $\mathcal{Z}_o = (c-h,G)$ and $\mathcal{Z}_t = (c+h,G)$. The halfspace representation $C\, x\leq d$ of the intersection $\mathcal{Z}_o \cap \mathcal{Z}_t$ has an identical $C$ matrix as presented in Theorem \[thm:hZonotope\], but a changed $d$ vector $$\begin{gathered}
\label{eq:translatedZonotope}
d=\begin{bmatrix} d^+ \\ d^-\end{bmatrix} = \begin{bmatrix} {C^+}\, c + \Delta d - \Delta d_{trans} \\ -{C^+}\, c + \Delta d - \Delta d_{trans} \end{bmatrix}, \quad
\Delta d = \sum_{\upsilon=1}^{p} |{C^+}\, g{^{(\upsilon)}}|, \quad \Delta d_{trans} = |{C^+} h|.\end{gathered}$$
Since the translated zonotope $\mathcal{Z}_t$ has the same generators as the original zonotope $\mathcal{Z}_o$, both halfspace representations of $\mathcal{Z}_t$ and $\mathcal{Z}_o$ will have the same normal vectors, see Theorem \[thm:hZonotope\]. For each normal vector $C_i^+$, one of the corresponding halfspaces from $\mathcal{Z}_o$ or $\mathcal{Z}_t$ is a subset of the other one as shown in Fig. \[fig:redundantGenerators\]. This, of course, is analogous for $C_i^-$. Consequently, the number of required normal vectors for the intersection is unchanged compared to Theorem \[thm:hZonotope\] as also illustrated in Fig. \[fig:redundantGenerators\].
However, the intersection results in a subset of $\mathcal{Z}_o$, which is equivalent in reducing the values of $d_i^+$ and $d_i^-$ by $\Delta d_{trans,i}$. From the duality of intersection of translated sets and Minkowski difference (see ) and after introducing $0_n$ as the $n$-dimensional vector of zeros, we have that $$\label{eq:auxiliaryEquationTranslatedZonotope}
(0_n,h) \oplus (\mathcal{Z}_o \cap \mathcal{Z}_t) = (0_n,h) \oplus \Big(\underbrace{(c-h,G) \cap (c+h,G)}_{(c,G) \ominus (0_n,h)}\Big) = (c,G).$$ The Minkowski addition of $(0_n,h)$ in can be seen as an additional generator so that $\Delta d = \sum_{\upsilon=1}^{p} |{C^+}\, g{^{(\upsilon)}}| + |{C^+}\, h|$ in . To compensate for the change in $\Delta d$, we choose $\Delta d_{trans} = |{C^+} h|$ in .
\[c\]\[c\][$C_1^+$]{} \[c\]\[c\][$-C_1^+$]{} \[c\]\[c\][$c$]{} \[c\]\[c\][$\mathcal{Z}_o$]{} \[c\]\[c\][$\mathcal{Z}_t$]{} \[c\]\[c\][$\mathcal{Z}_o \cap \mathcal{Z}_t$]{} \[c\]\[c\][$h$]{} ![Either the halfspace belonging to $C_1^+$ or $C_1^-$ is redundant for $\mathcal{Z}_o$ when computing the interaction $\mathcal{Z}_o \cap \mathcal{Z}_t$. The same applies to $\mathcal{Z}_t$[]{data-label="fig:redundantGenerators"}](./figures/intersection_Jun02_c.eps "fig:"){width="0.8\columnwidth"}
The above lemma is used to compute the halfspace representation of $\mathcal{Z}_m\ominus \mathcal{Z}_s$.
\[thm:hMinkowskiDifference\] Given are the two zonotopes $\mathcal{Z}_m = (c{^{(m)}},G{^{(m)}})$ and $\mathcal{Z}_s = (c{^{(s)}},G{^{(s)}})$. A halfspace representation $C\, x\leq d$ of the Minkowski difference $\mathcal{Z}_m \ominus \mathcal{Z}_s$ has an identical $C$ matrix as Theorem \[thm:hZonotope\], but a changed $d$ vector: $$\begin{gathered}
d=\begin{bmatrix} d^+ \\ d^-\end{bmatrix} = \begin{bmatrix} {C^+}\, (c{^{(m)}} -c{^{(s)}}) + \Delta d - \Delta d_{trans} \\ -{C^+}\, (c{^{(m)}} -c{^{(s)}}) + \Delta d - \Delta d_{trans} \end{bmatrix}, \notag \\
\Delta d = \sum_{\upsilon=1}^{p_m} |{C^+}\, g{^{(m,\upsilon)}}|, \quad \Delta d_{trans} = \sum_{\upsilon=1}^{p_s} |{C^+}\, g{^{(s,\upsilon)}}|. \label{eq:deltaD}\end{gathered}$$
As shown in Theorem \[thm:minkowskiDifferenceFromGenerators\], the Minkowski difference can be computed from finitely many translations of $\mathcal{Z}_m$ by the generators of $\mathcal{Z}_s$. The halfspace representation of intersecting $\mathcal{Z}_m$ with one translated version of itself has been shown in Lemma \[thm:hZonotopeIntersection\]. Repeated application of Lemma \[thm:hZonotopeIntersection\] results in the summation of values of $\Delta d_{trans}$ to $\Delta d_{trans} = \sum_{\upsilon=1}^{p_s} |{C^+}\, g{^{(s,\upsilon)}}|$, thus proving the theorem.
In the next section, we use the halfspace representation of the Minkowski difference to obtain an approximation in generator representation.
Generator Removal and Contraction {#sec:generatorAdjustment}
=================================
As shown in Sec. \[sec:preliminariesAndProblemStatement\], it is possible that not all generators of the minuend $\mathcal{Z}_m$ are preserved when performing a Minkowski difference. In the extreme case, the result is the empty set, and all generators have been removed. We present how to detect the generators that can be removed, followed by an algorithm that contracts the remaining generators such that the result of the Minkowski difference is approximated. Unfortunately, we cannot exactly represent the Minkowski difference by a zonotope.
\[thm:MinkowskiDifferenceClosedness\] Zonotopes are not closed under Minkowski difference, i.e., given the zonotopes $\mathcal{Z}_m$, $\mathcal{Z}_s$, the set $\mathcal{Z}_d = \mathcal{Z}_m\ominus \mathcal{Z}_s$ is not a zonotope.
We prove the proposition by a counterexample with $\mathcal{Z}_m = (\mathbf{0}, G_m)$ and $\mathcal{Z}_s = (\mathbf{0}, G_s)$, where $\mathbf{0}$ is a vector of zeros and $$G_m = \begin{bmatrix}
1 & 1 & 0 & 0 \\
1 & 0 & 1 & 0 \\
1 & 0 & 0 & 1
\end{bmatrix}, \quad
G_s = \frac{1}{3}\begin{bmatrix}
-1 & 1 & 0 & 0 \\
1 & 0 & 1 & 0 \\
1 & 0 & 0 & 1
\end{bmatrix}.$$ As one can see in the plot of $\mathcal{Z}_m\ominus \mathcal{Z}_s$ in Fig. \[fig:counterExample\] obtained by CORA [@Althoff2015a] and the MPT toolbox [@Herceg2013], not all faces are centrally symmetric as it has to be for zonotopes.
\[c\]\[c\][$x_1$]{} \[c\]\[c\][$x_2$]{} \[c\]\[c\][$x_3$]{} ![The Minkowski difference of two zonotopes that is not a zonotope in general.[]{data-label="fig:counterExample"}](./figures/exactResult_arXiv.eps "fig:"){width="0.5\columnwidth"}
Generator Removal {#sec:generatorRemoval}
-----------------
The overall algorithm for generator removal is shown in Alg. \[alg:generatorRemoval\]. First, the normal vectors of the H-representation of the minuend $\mathcal{Z}_m$ are stored together with the indices $\alpha_i,\ldots, \kappa_i$ of generators $g{^{(m,i)}}$ ($i=1,\ldots,p_m$), which span the corresponding facets. This is denoted for the ${i^\text{th}}$ halfspace by $\langle C_i, [\alpha_i,\ldots, \kappa_i] \rangle$, where $\alpha_i,\ldots, \kappa_i \in \mathbb{N}^+$ are the indices of the generators. The information for all normal vectors in $C^+$ is stored in a set $\mathcal{C}^{full}$ such that $\forall i: \langle C_i, [\alpha_i,\ldots, \kappa_i] \rangle \in \mathcal{C}^{full}$.
Next, the halfspace representation of the intersection is computed as presented in Theorem \[thm:hMinkowskiDifference\], and the minimum H-representation is obtained using linear programming [@Fukuda2004b Sec. 2.21]. This results in the set of halfspaces after the intersection $\hat{C} \subseteq \mathcal{C}^{full}$, where $\mathcal{C}^{red} = \mathcal{C}^{full} \setminus \hat{C}$ is the set of redundant halfspaces. The generator indices $[\alpha_j,\ldots, \kappa_j]$ are stored in a vector $\mathtt{ind}{^{(j)}}$ for the ${j^\text{th}}$ redundant halfspace $C^{red}_j$. The entries of $\mathtt{ind}{^{(j)}}$ are $1$ if the generator contributes to the halfspace and $0$ otherwise (see Alg. \[alg:generatorRemoval\], line \[alg:indStart\]-\[alg:indEnd\]): $$\forall i=1,\ldots,p_m: \quad \mathtt{ind}_i{^{(j)}} = \begin{cases}
1, \text{ if } i \in \{\alpha_j,\ldots, \kappa_j\}, \\
0, \text{ otherwise}.
\end{cases}$$ The generators, which are no longer required, are selected based on $\mathtt{ind}{^{(j)}}$ by the following proposition.
The ${i^\text{th}}$ generator of the minuend $\mathcal{Z}_m$ with $p_m$ generators in $n$-dimensional space is no longer required for the difference $\mathcal{Z}_m \ominus \mathcal{Z}_s$ if and only if (see Alg. \[alg:generatorRemoval\], line \[alg:remStart\]-\[alg:remEnd\]) $$\mathtt{ind}_i = 2 \binom{p_m-1}{n-2}, \quad \mathtt{ind} = \sum_{j=1}^{\varsigma} \mathtt{ind}{^{(j)}},$$ where $\varsigma$ is the number of redundant halfspaces. Please note that $\mathtt{ind}_i$ refers to the $i^{th}$ entry of the vector $\mathtt{ind}$.
Each facet is spanned by $n-1$ generators. By fixing one generator for a facet, one can still select $n-2$ generators from $p_m-1$ generators, such that each generator spans $2 \binom{p_m-1}{n-2}$ facets. If a generator is removed, those $2 \binom{p_m-1}{n-2}$ facets no longer exist, such that a generator can only be removed if and only if all $2 \binom{p_m-1}{n-2}$ facets to which it contributes are redundant.
The indices $\mathtt{removedGeneratorIndex}$ from Alg. \[alg:generatorRemoval\] are used to remove generators such that the matrix $\hat{G}{^{(m)}} = [g{^{(m,ind_1)}}, \ldots, g{^{(m,ind_v)}}]$ of remaining generators is obtained, where $ind_1, \ldots, ind_v \notin \mathtt{removedGeneratorIndex}$ and $ind_i \in \{1,\ldots,p_m\}$.
$\varsigma$ redundant generators $\langle C^{red}_k, [\alpha_k,\ldots, \kappa_k] \rangle$. $\mathtt{removedGeneratorIndex}$ $\mathtt{ind} = \begin{bmatrix} 0, & \ldots, & 0 \end{bmatrix}$ \[alg:indStart\] $\mathtt{ind}_i{^{(k)}} = \begin{cases}
1, \text{ if } i \in \{\alpha_k,\ldots, \kappa_k\}, \\
0, \text{ otherwise}.
\end{cases}$ \[alg:indEnd\] $\mathtt{ind} = \mathtt{ind} + \mathtt{ind}{^{(k)}}$ $\mathtt{removedGeneratorIndex} \leftarrow \emptyset$ \[alg:remStart\] $\mathtt{removedGeneratorIndex} = \mathtt{removedGeneratorIndex} \cup i$ \[alg:remEnd\]
Generator Contraction {#sec:generatorContraction}
---------------------
So far we have removed the generators that are not required anymore. It remains to adjust the lengths of the remaining generators so that the spanned zonotope approximates the Minkowski difference $\mathcal{Z}_m\ominus \mathcal{Z}_s$. We introduce the vector of stretching factors $\mu = \begin{bmatrix} \mu_1, & \ldots, & \mu_{p_m} \end{bmatrix}$. Since we have already removed the generators that do not span any of the remaining halfspaces in Sec. \[sec:generatorRemoval\], no stretching factor has length $0$ so that $\forall i: \, 0<\mu_i\leq 1$. To obtain the proposed approximation, let us first obtain the $\hat{d}^+$ vector of non-redundant halfspaces as $$\label{eq:dPlusOne}
\begin{split}
\hat{d}^+ =& \hat{C}^+\, (c{^{(m)}} -c{^{(s)}}) + \Delta \hat{d} - \Delta \hat{d}_{trans} \\
=& \hat{C}^+\, (c{^{(m)}} -c{^{(s)}}) + \sum_{\upsilon=1}^{p_m} |\hat{C}^+\, g{^{(m,\upsilon)}}| - \sum_{\upsilon=1}^{p_s} |\hat{C}^+\, g{^{(s,\upsilon)}}|.
\end{split}$$ Only in special cases it is possible that the approximating zonotope has identical normal vectors of the constraining halfspaces than the exact result. The main idea is to compute the $\hat{d}^+$ values of the halfspace representation for a given stretching vector $\mu$ when assuming that the normal vectors are identical, which they are not: $$\label{eq:dPlusTwo}
\begin{split}
\hat{d}^+ =& \hat{C}^+\, (c{^{(m)}} -c{^{(s)}}) + \sum_{\upsilon=1}^{\hat{p}_m} |\hat{C}^+\, \hat{g}{^{(m,\upsilon)}}| \mu_\upsilon = \hat{C}^+\, (c{^{(m)}} -c{^{(s)}}) + |\hat{C}^+\, \hat{G}{^{(m)}}| \mu.
\end{split}$$ Next, we demand that the $\hat{d}^+$ values of the minuend after stretching in are identical to the ones of the Minkowski difference $\mathcal{Z}_m \ominus \mathcal{Z}_s$ in resulting in $$\begin{split}
\hat{C}^+\, (c{^{(m)}} -c{^{(s)}}) + |\hat{C}^+\, \hat{G}{^{(m)}}| \mu =& \hat{C}^+\, (c{^{(m)}} -c{^{(s)}}) + \sum_{\upsilon=1}^{p_m} |\hat{C}^+\, g{^{(m,\upsilon)}}| - \sum_{\upsilon=1}^{p_s} |\hat{C}^+\, g{^{(s,\upsilon)}}| \\
|\hat{C}^+\, \hat{G}{^{(m)}}| \mu =& \sum_{\upsilon=1}^{p_m} |\hat{C}^+\, g{^{(m,\upsilon)}}| - \sum_{\upsilon=1}^{p_s} |\hat{C}^+\, g{^{(s,\upsilon)}}| \\
\mu =& |\hat{C}^+ \hat{G}{^{(m)}}|^{-1} (\sum_{\upsilon=1}^{p_m} |\hat{C}^+\, g{^{(m,\upsilon)}}| - \sum_{\upsilon=1}^{p_s} |\hat{C}^+\, g{^{(s,\upsilon)}}|).
\end{split}$$ We can now state the approximating generator representation of $\mathcal{Z}_m \ominus \mathcal{Z}_s$ as $$(c{^{(m)}} -c{^{(s)}}, \mu_1 \, \hat{g}{^{(m,1)}},\ldots,\mu_{\hat{p}_m} \, \hat{g}{^{(m,\hat{p}_m)}})$$ where ${\hat{p}}_m$ is the number of generators $\hat{g}{^{(m,i)}}$. Since the proposed approximation can be obtained from solving a set of linear equations, its implementation is computationally cheap. Determining the set of non-redundant halfspaces is the most time consuming process, as discussed in the next section, which presents the results of numerical experiments.
Numerical Experiments {#sec:numericalExperiments}
=====================
In this section, the performance of computing the Minkowski difference of random zonotopes with various orders and for a different number of dimensions is assessed. The computation times are compared with those of polytopes, whose halfspace representation is obtained according to Theorem \[thm:hZonotope\]. We additionally assess the computation time when combining Minkowski difference with Minkowski addition, as it is required in many applications, see e.g. [@Rakovic2006]. Please note that the results are not directly comparable, since the results when using zonotopes are approximative.
Random Generation of Zonotopes
------------------------------
To fairly assess the performance, random zonotopes are generated. Each scenario has the following parameters:
- The dimension $n$ of the Euclidean space $\mathbb{R}^n$.
- The order $\varrho_s$ of the subtrahend $\mathcal{Z}_s$.
- The order $\varrho_m$ of the minuend $\mathcal{Z}_m$.
- The maximum length $l^{s,max}$ of the generators $\|g{^{(s,i)}}\|_2$ of $\mathcal{Z}_s$ is selected as $1$ without loss of generality.
- The maximum length $l^{m,max}$ of the generators $\|g{^{(m,i)}}\|_2$ of $\mathcal{Z}_m$ is selected as $3\frac{\varrho_s}{\varrho_m}$. The fraction $\frac{\varrho_s}{\varrho_m}$ ensures that the size of the minuend and subtrahend are comparable when using different orders. The factor of $3$ is selected to balance the three cases as shown in Fig. \[fig:minkowskiDifferenceExamples\]: (a) No order reduction of the minuend, (b) order reduction of the minuend, and (c) empty sets.
Given the above parameters, a simple method for obtaining random generators would be to first randomly generate each entry of a generator by uniformly sampling values within $[-1,1]$. The generator would then be stretched to a length that is uniformly distributed within $[0,l^{max}]$. However, the directions of the resulting generators would not be uniformly distributed. Thus, we first generate points that are uniformly distributed on a unit hypersphere according to [@Muller1959]. Next, the generators are defined as the vector from the origin to the points on the hypersphere, which are stretched to achieve the desired length of the generators $l{^{(i)}}=\|g{^{(i)}}\|_2$. This is uniformly distributed within $[0,l^{max}]$.
Comparison with Polytope Implementation
---------------------------------------
In this subsection, we compare the computation times of our own MATLAB implementation compared to those of the MATLAB toolbox *Multi-Parametric Toolbox 3.0* with its default settings [@Herceg2013]. For each scenario specified by the dimension $n$ and the zonotope orders $\varrho_s$ and $\varrho_m$, we randomly generate $100$ instances of the Minkowski difference $\mathcal{Z}_m \ominus \mathcal{Z}_s$, as well as the combined use of Minkowski difference and addition $(\mathcal{Z}_m \ominus \mathcal{Z}_s)\oplus \mathcal{Z}_s$. The latter expression is not meaningful, but the average computation times would not change if we add a set other than $\mathcal{Z}_s$ with the same order and dimension. Tab. \[tab:results\] lists the results on (i) the average computation time for each instance for $\mathcal{Z}_m \ominus \mathcal{Z}_s$ and $(\mathcal{Z}_m \ominus \mathcal{Z}_s)\oplus \mathcal{Z}_s$, (ii) the average order of the resulting zonotopes of $\mathcal{Z}_m \ominus \mathcal{Z}_s$, and (iii) on the percentage of empty results of $\mathcal{Z}_m \ominus \mathcal{Z}_s$. All computations are performed on a laptop with an Intel i7-3520M CPU with 2.90GHz and $4$ cores. Parallelization of algorithms is not used in all evaluations.
------ ----------------- ----------------- -- ---------- ---------- -- ---------- -------- -- ---------- ----------
Dim. Avg. Empty
$n$ $\mathcal{Z}_m$ $\mathcal{Z}_s$ Zonotope Polytope Order Sets Zonotope Polytope
$2$ $2$ $2$ $1.6026$ $22\%$
$2$ $4$ $2$ $3.1141$ $8\%$
$2$ $2$ $4$ $1.6866$ $33\%$
$2$ $4$ $4$ $3.1398$ $7\%$
$4$ $2$ $2$ $1.6279$ $57\%$
$4$ $4$ $2$ $3.1175$ $17\%$
$4$ $2$ $4$ $1.6106$ $48\%$
$4$ $4$ $4$ $3.1152$ $11\%$
$6$ $2$ $2$ $1.6742$ $78\%$
$6$ $2.5$ $2$ $2.0873$ $58\%$
$6$ $2$ $2.5$ $1.6667$ $76\%$
$6$ $2.5$ $2.5$ $2.0799$ $52\%$
$8$ $1.8$ $1.8$ $1.5000$ $91\%$
------ ----------------- ----------------- -- ---------- ---------- -- ---------- -------- -- ---------- ----------
We first discuss the results for the Minkowski difference in Tab. \[tab:results\]. It can be observed that the zonotope implementation is in all cases faster than the polytope implementation of the *Multi-Parametric Toolbox 3.0*, e.g. for $6$ dimensions and an order of $2$ for the minuend and the subtrahend, the computation with zonotopes is more than $40$ times faster. The computation times for polytopes of larger dimensions have been declared as *did not finish* () since a single set computation takes more than two hours, which amounts to more than one week for $100$ instances. Most of the computation time for the Minkowski difference of zonotopes is spent computing the minimum halfspace representation [@Fukuda2004b Sec. 2.21]. Linear programming is used to determine generators that need to be removed as shown in Sec. \[sec:generatorRemoval\].
The difference in computation time is substantially different when combining Minkowski difference and Minkowski addition. For dimensions equal or larger than $4$ we obtain the result *did not finish* ($\mathtt{dnf}$), except when the order of the minuend and the subtrahend are $2$ for $4$ dimensions. In this case, however, the zonotope computation is already $3500$ times faster. Thus, zonotopes are several orders of magnitude faster when combining Minkowski difference with Minkowski addition.
The approximation error has not been evaluated since obtaining the volume for higher-dimensional polytopes is infeasible.
Conclusions {#sec:conclusions}
===========
To the best knowledge of the author, this is the first work that presents an approach for approximating the Minkowski difference of zonotopes. Although the Minkowski difference can be computed exactly for the halfspace representation of zonotopes, doing so would result in the loss of the generator representation of a zonotope. It would require to perform subsequent computations, such as linear maps or Minkowski addition, using a halfspace representation. For such operations in particular, however, zonotopes in generator representation are very efficient and easily outperform the halfspace representation by several orders of magnitude in high-dimensional spaces. Even though the presented approximative Minkowski difference approach is computationally more expensive than linear maps and Minkowski addition for zonotopes, it is significantly faster than state-of-the-art algorithms for halfspace representations.
Acknowledgments {#acknowledgments .unnumbered}
===============
The author gratefully acknowledges financial support by the European Commission project UnCoVerCPS under grant number 643921.
[^1]: Note that the term *Pontryagin difference* is often used as a synonym for Minkowski difference. However, we use the term *Minkowski difference* throughout this paper.
|
Age-related changes in the anatomy of the normal human heart.
Recent information has expanded our knowledge regarding age-related changes in the normal heart. With advancing age there are significant increases in heart weight, ventricular septal and probably left ventricular free wall thickness, and in valve circumferences. In the myocardium, there are increases in fat, collagen, elastin, and lipofuscin. The geometry of the heart changes as well, due to decreasing base-to-apex dimension, rightward shift and dilatation of the aortic root, and left atrial dilatation. The aortic and mitral valves thicken and become fibrotic along their appositional surfaces, and their annuli are the sites of collagen degeneration, lipid accumulation, and calcification. The coronary arteries become tortuous, dilated, and focally calcified. There are atrophy and loss of specialized conduction tissue in the atria and ventricles. These changes, while usually modest, might diminish the ability of the aged heart to adapt to the stresses imposed by a number of cardiovascular diseases.
|
Monday, March 30, 2015
Tasty Achievements: March 2015
Happy Monday Foodie Friends! With March coming to an end, it's time for us to share all of our favorite posts for the month. We love our recipes, and we love sharing our favorites all over again with you each month. March left us with lots of refreshing, spring ready recipes that you'll surely love.
One of our first favorites was Warren's Strawberry Garlic Vinaigrette. Sure, we weren't sure about the strawberries, but honestly the sweet and tangy flavors really complimented each other well. We will definitely be pinning this recipe for later.
Rosie shared her adorable tea sandwiches this month. I know that they are totally French inspired, but honestly, we can't stop imagining the ladies of Downton Abbey lunching on these and throwing shade at some innocent person (Edith tbh).
Bento Boxes are all the rage, and Holly's was cute, convenient and super healthy. The idea of having a variety of fresh items to eat through the day sounds extremely nice. We've been shopping lunch boxes to carry it to work in on Amazon because, honestly, it's all about the completed look.
Bonus! Don't forget to check out Blog Outing where we went to CeramiCafe. We're headed to the beach next week, and we are going to cook our tochus' off. Again, we appreciate you dropping by. Don't forget to let us know your thoughts in the comments below!
|
Surnames in Honduras: A study of the population of Honduras through isonymy.
In this work, we investigated surname distribution in 4,348,021 Honduran electors with the aim of detecting population structure through the study of isonymy in three administrative levels: the whole nation, the 18 departments, and the 298 municipalities. For each administrative level, we studied the surname effective number, α, the total inbreeding, FIT , the random inbreeding, FST , and the local inbreeding, FIS . Principal components analysis, multidimensional scaling, and cluster analysis were performed on Lasker's distance matrix to detect the direction of surname diffusion and for a graphic representation of the surname relationship between different locations. The values of FIT , FST , and FIS display a variation of random inbreeding between the administrative levels in the Honduras population, which is attributed to the "Prefecture effect." Multivariate analyses of department data identified two main clusters, one south-western and the second north-eastern, with the Bay Islands and the eastern Gracias a Dios out of the main clusters. The results suggest that currently the population structure of this country is the result of the joint action of short-range directional migration and drift, with drift dominating over migration, and that population diffusion may have taken place mainly in the NW-SE direction.
|
Q:
elongate or scale limbs of a model in XNA
I'd like to create one model that I import into an XNA game.
I'd like to be able to copy this model and make programmatic modifications to it during execution (with the intent of using the same model to represent multiple characters in the game). For example, I'd like to make the legs slightly longer or shorter, or the waist slightly fatter or thinner, or the head slightly smaller or larger.
I know how to use transforms to modify a mesh, but it seems that what I need here is to apply a transform to only a subset of vertices in that mesh. I have no idea how to do this in XNA, or if it's even supported.
Two questions:
1) is functionality like this supported in XNA?
2) if so, what kind of methods are used to obtain the desired result?
(note, this was crossposted from stackoverflow, this forum was recommended as a better place for my question)
A:
it can be done modifying the bone transform of your model.
You don't need submeshes, each vertex in a model should have a bone weight property that quantify how that vertex is affected by the bone transform.
In this image each color defines the bone that is applied to each vertex.
You will have a bone hierarchy tree that seems to this skeleton, that way if you change athe forearm bone, scaling it, it will affect to the hand bone.
Xna offers you a Model class that let you access to the Bones, but you have to recalcultate the bone transform by yourself. And of course the model have to be created with the skeleton that you need.
http://msdn.microsoft.com/en-us/library/microsoft.xna.framework.graphics.model_members(v=xnagamestudio.40).aspx
You should have to do something similiar to:
// Save the original bone transforms that are relative to its parents.
Model.CopyBoneTransformsTo ( Backup );
// I have not done this ever, but I would test this:
Model.Bones.Item["Hand"].Transform = Matrix.CreateScale(1,1,1.5f) * Model.Bones.Item["Hand"].Transform;
or
Model.Bones.Item["Hand"].Transform = Model.Bones.Item["Hand"].Transform * Matrix.CreateScale(1,1,1.5f);
Remember that order in matrix multiplication is very important.
|
The mother of Hunter Biden’s child says the son of former vice president and Democratic presidential contender Joe Biden is refusing to answer any questions pertaining to his “basic” lifestyle and finances as the hearing in their tumultuous paternity case approaches, court papers show.
Continue Reading Below
Lunden Roberts and the younger Biden are embroiled in a bitter court battle in Arkansas surrounding their 16-month-old baby, whom Roberts has argued he should support, according to court records and multiple reports.
The Daily Mail was first to report the latest legal filings, which were submitted to the court Wednesday.
Hunter Biden, the papers allege, “has provided no support for this child for over a year. The Court should not let the defendant continue to avoid his natural and legal duty to support his child by failing to provide basic information about his income, finances, and lifestyle.”
His attorney did not immediately respond to a FOX Business request for comment.
The paternity scandal comes as DailyMailTV reports Biden's new wife is expecting his fifth child.
HUNTER BIDEN JOINS LIST OF WEST WING KIDS LANDING LUCRATIVE CORPORATE GIGS
Biden and Roberts reportedly met at a strip club in Washington, D.C., where she worked at the time, according to Page Six.
Roberts will have the chance to question Biden under oath at a hearing on Jan. 7, 2020, despite initial reports that the hearing was scheduled for Dec. 23.
Biden’s legal team has so far allegedly neglected to cooperate with at least some of Roberts’ attorneys’ requests submitted on Aug. 21, including that they “list all banks or other financial institutions” in the past five years and that they "list all sources of income" he's received over the same time period, court records show.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Instead, Biden’s team largely objected to the requests. In addition to the objections, the attorneys often submitted their own motions for confidentiality, writing: “In the event that the Court orders the production of documents and tangible items in connection with this Request, Defendant moves the Court to impose an appropriate confidentiality order on Plaintiff and any attorney, consultant, or expert witness of Plaintiff.”
His attorneys sometimes referenced affidavits and tax returns that were previously submitted to the court.
HUNTER BIDEN'S BABY MAMA TO EXPOSE HIS FINANCES IN COURT
If he ultimately cooperates for the Jan. 7 hearing, Biden will likely discuss his financial records while under oath, including those related to his involvement in Ukrainian company Burisma Holdings, according to the Daily Mail.
PATERNITY SUIT PUSHES HUNTER BIDEN TO DISCLOSE BURISMA EARNINGS
Hunter Biden was named a paid board member of Burisma in April 2014. The company's founder was a political ally of Viktor Yanukovych, Ukraine's Russia-friendly president, who was driven out in February 2014. Yanukovych's ouster prompted the Obama administration to move quickly to deepen ties with Ukraine's new government. Joe Biden, the vice president at the time, played a leading role, traveling to Ukraine and speaking frequently with its new Western-friendly president.
President Donald Trump’s July phone call with Ukrainian President Volodymyr Zelensky, during which he allegedly pressure Zelensky to work with former associate U.S. attorney general and lawyer Rudy Giuliani to investigate Democratic political rival Joe Biden, lies at the center of the impeachment push.
On Wednesday, the House of Representatives voted to impeach Trump along party lines.
READ MORE ON FOX BUSINESS BY CLICKING HERE
The Associated Press contributed to this report.
|
Comparative Study on the Chemical Structure and In Vitro Antiproliferative Activity of Anthocyanins in Purple Root Tubers and Leaves of Sweet Potato ( Ipomoea batatas).
The structure and in vitro antiproliferative activity of anthocyanins in the root tubers of a sweet potato variety cv. Bhu Krishna and the purple leaves of a promising accession S-1467 were studied with the objectives of understanding the structure-activity relationship and comparing the leaf and tuber anthocyanins. The chemical structure of anthocyanins was determined by high-resolution electrospray ionization mass spectrometry analysis. A fluorescence-resonance-energy-transfer-based caspase sensor probe had been used to study the antiproliferative property, and analysis of the cell cycle was performed after staining with propidium iodide and subsequent fluorescence-activated cell sorting. Structurally, the anthocyanins in root tubers were identical to those in leaves, but there was a difference in the proportion of various aglycones present in both. This has led to distinguishable differences in the antiproliferative activity of leaf and tuber anthocyanins to various cancer cells. All nine anthocyanins were found in acylated forms in both tubers and leaves. However, peonidin derivatives were major anthocyanins in tubers (33.98 ± 1.41 mg) as well as leaves (27.68 ± 1.07 mg). The cyanidin derivatives were comparatively higher in leaves (20.55 ± 0.91 mg) than tubers (9.44 ± 0.94 mg). The tuber and leaf anthocyanins exhibited potential antiproliferative properties to MCF-7, HCT-116, and HeLa cancer cells, and the structure of anthocyanins had a critical role in it. The leaf anthocyanins exhibited significantly higher activity against colon and cervical cancer cells, whereas tuber anthocyanins had a slightly greater effect against breast cancer cells.
|
313 F.3d 636
Edward B. ELLIS, Petitioner, Appellee,v.UNITED STATES of America, Respondent, Appellant.
No. 01-2055.
No. 01-2067.
United States Court of Appeals, First Circuit.
Heard September 9, 2002.
Decided December 20, 2002.
COPYRIGHT MATERIAL OMITTED Daniel S. Goodman, Appellate Section, Criminal Division, United States Department of Justice, with whom Michael J. Sullivan, United States Attorney, was on brief, for appellant.
John G.S. Flym, by appointment of the court, for appellee.
Before SELYA, Circuit Judge, COFFIN, Senior Circuit Judge, and HOWARD, Circuit Judge.
SELYA, Circuit Judge.
1
These appeals, which have their genesis in an effort by the petitioner, Edward B. Ellis, to mount a collateral attack on his convictions for interstate transportation of a minor with intent to engage in criminal sexual activity, present challenging legal questions complicated by a strange procedural twist. That complication arose after the original trial judge denied Ellis's section 2255 petition in part and then recused himself as to the unadjudicated portion of the petition. A limited order of reassignment followed. The transferee judge, acting partly on the basis of a previously unadjudicated claim and partly on the basis of a previously adjudicated claim, proceeded to grant the petition.
2
The hybrid nature of this decision requires that we review its component parts separately. The first ground of decision involves the trial judge's handling of a jury note. We agree with the transferee judge's finding of error — the original trial judge used an incorrect procedure in dealing with the jury note — but we hold that this error was harmless under the circumstances. The second ground of decision involves whether the special seating arrangement afforded to the victim during her trial testimony offended the Confrontation Clause. We hold that under the law of the case doctrine the transferee judge should not have revisited the issue, but, rather, should have left intact the original judge's finding that no constitutional violation had occurred.
3
In light of these holdings, we discern no principled basis for habeas relief. Consequently, we reverse the order granting the petitioner a new trial and remand the case with directions to enter judgment for the United States.
I. BACKGROUND
4
In 1990, a jury convicted the petitioner on three counts of interstate transportation of a minor with intent to engage in criminal sexual activity. See 18 U.S.C. § 2423. The district court imposed a twenty-five year incarcerative term. On direct appeal, we affirmed the convictions and sentence. United States v. Ellis, 935 F.2d 385 (1st Cir.1991). We suggest that those who hunger for a more exegetic account of the crimes of conviction consult that opinion.
5
For present purposes, it suffices to say that the petitioner was found guilty of repeatedly abusing (in three different states) the youthful daughter of his live-in girlfriend. Id. at 388-89. The evidence adduced against him included the testimony of his victim, E.D. (who was nine years old at the time of trial). In a preliminary discussion, it was suggested, without objection from the petitioner's counsel (Attorney Goldings), that E.D. testify while seated "in such a way that she does not look at [the petitioner]."
6
Notwithstanding his initial acquiescence, Goldings objected to the special seating arrangement when E.D. was called as a witness. Judge Freedman overruled the objection. During her testimony, E.D. sat in a chair facing the jurors but facing away from the petitioner. The parties disagree both as to the exact angle between E.D. and the petitioner and as to how much of E.D.'s face the petitioner could see during her testimony. It is clear, however, that E.D., while testifying, could only have made eye contact with the petitioner by looking over her right shoulder. It is equally clear that she did not avail herself of this opportunity.
7
On direct appeal, the petitioner unsuccessfully challenged the sufficiency of the evidence, various evidentiary rulings, the jury instructions, and the length of the sentence. Id. at 389-97. He did not advance any claim related either to the handling of the jury note (discussed infra) or to the special seating arrangement.
8
In 1997, the petitioner moved pro se to vacate his sentence. See 28 U.S.C. § 2255. In that petition, he maintained that Goldings had rendered ineffective assistance of counsel (including a failure to present certain exculpatory evidence and impedance of his right to testify); charged Goldings with having concealed a conflict of interest; lodged a Confrontation Clause challenge to the special seating arrangement; complained of prosecutorial misbehavior; and accused Judge Freedman of judicial bias and misconduct. He also filed two motions: one seeking the appointment of counsel and the other asking Judge Freedman to step aside.
9
Judge Freedman denied the motion for appointment of counsel out of hand. As for the recusal motion, he did not disqualify himself generally, but, rather, proceeded to resolve four of the petitioner's five claims. Specifically, he denied the cognate ineffective assistance of counsel claims insofar as those claims touched upon the failure to present evidence and the supposed interference with the petitioner's right to testify; found no cognizable conflict of interest; and ruled that the assertions of prosecutorial misconduct were overblown. Given the present posture of the case, we need not discuss any of these rulings.
10
Judge Freedman's disposition of the Confrontation Clause claim requires some elaboration. For purposes of that analysis, Judge Freedman accepted, without deciding, that Goldings's failure to pursue the claim on direct appeal established ineffective assistance of counsel (and, therefore, established "cause" necessary to overcome the applicable procedural bar). Judge Freedman then discussed the relevant Supreme Court precedents and explained that, as the trial judge, he had made an individualized determination that a special accommodation was needed because E.D. would have to testify regarding the "heinous acts" of sexual abuse that she had endured at the hands of someone who lived with her and who had threatened to kill her and her family members. Since these facts supported the use of the special seating arrangement, Judge Freedman concluded that an appeal from the court's decision to employ the special seating arrangement would have been futile, and, therefore, that Goldings's failure to challenge the arrangement on appeal was harmless. Accordingly, he denied both the Confrontation Clause claim and the related ineffective assistance of counsel claim. See Lockhart v. Fretwell, 506 U.S. 364, 369-70, 113 S.Ct. 838, 122 L.Ed.2d 180 (1993) (outlining applicable prejudice requirement); Strickland v. Washington, 466 U.S. 668, 694, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984) (same).
11
Having adjudicated these four sets of claims, Judge Freedman stopped short of resolving the whole of the petition. Instead, he recused himself as to the fifth claim (the accusation of judicial bias and misconduct). See Murchu v. United States, 926 F.2d 50, 53 n. 3 (1st Cir.1991) (suggesting "that the district judge should have recused himself as to those portions of [a] section 2255 motion which alleged judicial misconduct"). Instead, he asked the chief judge to reassign the case to a new judge to "consider and render a decision on the balance of the petitioner's claims and enter judgment accordingly on those claims as well as those addressed by this court in its Memorandum and Order entered on March 2, 1998."
12
The chief judge subsequently assigned the case to Judge Keeton. Judge Keeton appointed counsel to represent the petitioner and gave both parties leave to file supplementary memoranda on the allegations of judicial bias and misconduct concerning (1) the court's decision to allow a special seating arrangement; (2) certain comments and gestures supposedly made by Judge Freedman during E.D.'s testimony; and (3) Judge Freedman's handling of a note from the deliberating jury.
13
Following a hearing, Judge Keeton unequivocally rejected the petitioner's claims of judicial bias (finding, inter alia, that bias played no role in the establishment of the special seating arrangement, and that Judge Freedman had made no untoward comments or gestures during the trial). He concluded, however, that Judge Freedman's exchange of notes with the jury deprived the petitioner of the assistance of counsel at a critical stage of the case (and, thus, violated the Sixth Amendment).1 Judge Keeton then opted to revisit the petitioner's already adjudicated Confrontation Clause claim. Deeming his predecessor's findings inadequate and the petitioner's view of E.D. during trial too constrained, Judge Keeton reversed the earlier ruling and declared unconstitutional the use of the special seating arrangement. Based on this pair of conclusions, Judge Keeton granted the section 2255 petition, set aside the convictions, and ordered a new trial.
14
The government thereupon filed these appeals. We treat them as one: they have been consolidated, and it would serve no useful purpose to dwell upon the technical considerations that prompted the government to file two appeals instead of one.
II. DISCUSSION
15
Under 28 U.S.C. § 2255, a convict in federal custody may ask the sentencing court to vacate, set aside, or correct his sentence on the ground that the court had imposed the sentence in violation of federal law (including, of course, the Constitution). Brackett v. United States, 270 F.3d 60, 63 (1st Cir.2001). In essence, then, section 2255 is a surrogate for the historic writ of habeas corpus. See Davis v. United States, 417 U.S. 333, 344, 94 S.Ct. 2298, 41 L.Ed.2d 109 (1974).
16
When an appeal is taken from an order under 28 U.S.C. § 2255, we examine the district court's legal conclusions de novo and scrutinize its findings of fact for clear error. Familia-Consoro v. United States, 160 F.3d 761, 764-65 (1st Cir.1998). When the district court dismisses claims without holding an evidentiary hearing, we take as true the sworn allegations of fact set forth in the petition unless those allegations are merely conclusory, contradicted by the record, or inherently incredible. Mack v. United States, 635 F.2d 20, 26-27 (1st Cir.1980); see also United States v. McGill, 11 F.3d 223, 225 (1st Cir.1993).
17
Only the jury note and seating arrangement claims are in issue here. The petitioner has neither prosecuted a cross-appeal nor otherwise challenged Judge Freedman's disposition of his other section 2255 claims. This narrowed scope of review, together with the absence of a cross-appeal, dictates that we focus on the rulings of the successor judge. We proceed in two steps. First, we discuss Judge Keeton's assessment of the jury note claim. We then consider his assessment of the Confrontation Clause claim (concentrating, for reasons that will soon become apparent, on his authority to revisit Judge Freedman's earlier adjudication of that claim).
18
We preface our analysis with an acknowledgment that one court has flatly rejected the concept of partial recusal. See United States v. Feldman, 983 F.2d 144, 145 (9th Cir.1992) ("[W]hen a judge determines that recusal is appropriate it is not within his discretion to recuse by subject matter or only as to certain issues and not others."). The majority view, however, supports the availability of such a case-management device. See, e.g., Pashaian v. Eccelston Prop., Ltd., 88 F.3d 77, 84-85 (2d Cir.1996); United States v. Kimberlin, 781 F.2d 1247, 1258-59 (7th Cir.1985). While we have not spoken directly to the subject, we indicated our approval of the praxis in Murchu, 926 F.2d at 53 n. 3, 56-57. See also Warner v. Rossignol, 538 F.2d 910, 914 n. 6 (1st Cir.1976) (finding no loss of capacity to rule on retained issues even after recusal from other issues). Today, we make that approval explicit: we hold that a judge may, in an appropriate case, decide certain issues and recuse himself or herself as to others. This was an appropriate case, and we therefore hold that Judge Freedman's partial recusal was a valid exercise of judicial authority. Under the circumstances, it constituted a sound method of dealing with the prickly problem of balancing the demands of section 2255 — a statute that evinces a strong preference for post-conviction review by the judge who presided at the defendant's trial—with the demands of the recusal statute, 28 U.S.C. § 455(a). We add, moreover, that the chief judge responded appropriately to this partial recusal by entering a limited order of reassignment.
19
Although limited orders of reassignment may — as in this case — be necessary and proper, they place unaccustomed restraints on the transferee judge. When a court assumes jurisdiction for a limited purpose, it ordinarily should confine itself to that purpose. Cf. United States v. Erwin, 155 F.3d 818, 825 (6th Cir.1998) (holding that a magistrate judge may not overstep the bounds of an order of reference); King v. Ionization Int'l, Inc., 825 F.2d 1180, 1185-86 (7th Cir.1987) (same). Observing the restrictions implied in such an order promotes the efficient operation of the courts and facilitates the winnowing of issues throughout successive stages of litigation. See Erwin, 155 F.3d at 825. By the same token, courts that carefully observe the boundaries of their assignments help stabilize the decisionmaking process, assure the predictability of results, and nourish proper working relationships between judicial units. United States v. Rivera-Martinez, 931 F.2d 148, 151 (1st Cir. 1991). This case illustrates the wisdom of adherence to these prudential policies.
A. The Jury Note.
20
Judge Keeton's first ground of decision arises out of the petitioner's allegation that, three and one-half hours after jury deliberations had begun, the jurors sent Judge Freedman a note asking: "Does it have to be unanimous to be not guilty on a[sic] indictment if the vote come [sic] out uneven?" Without consulting either side, the judge sent back a written response stating: "The verdict on all counts must be unanimous. All 12 jur[ors] must agree." Approximately thirty minutes later, the jury found the petitioner guilty on all charges.
21
Although Judge Keeton discerned no evidence of judicial bias or partiality in Judge Freedman's conduct, he concluded that his predecessor had erred in handling the jury note and that the ex parte exchange between judge and jury had deprived the petitioner of his Sixth Amendment right to the assistance of counsel at a critical stage in the proceedings. He found this error prejudicial, stating: "Given the timing and substance of the ex parte communication, I conclude that it is likely that the trial judge's response had substantial and injurious effect or influence in determining the jury's verdict." In this regard, he theorized that the jury could have misunderstood the comment that "[t]he verdict on all counts must be unanimous" to preclude a partial verdict, an ambiguity that consultation with counsel could have prevented.
22
We agree with Judge Keeton that Judge Freedman erred by failing to consult the parties before responding substantively to the deliberating jury's request for a supplementary instruction. See Rogers v. United States, 422 U.S. 35, 38-39, 95 S.Ct. 2091, 45 L.Ed.2d 1 (1975); United States v. Parent, 954 F.2d 23, 25 (1st Cir.1992). The incidence of error, however, does not end our inquiry. Because the petitioner did not raise any challenge to this supplemental instruction in his direct appeal, the claim is procedurally defaulted. It is, therefore, unreviewable on collateral attack unless the petitioner can show (1) cause sufficient to excuse his failure to raise it on direct appeal, and (2) actual prejudice. See Bousley v. United States, 523 U.S. 614, 622, 118 S.Ct. 1604, 140 L.Ed.2d 828 (1998); Derman v. United States, 298 F.3d 34, 45 (1st Cir.2002).2
23
Judge Keeton found cause sufficient to excuse the procedural default. We assume, for argument's sake, the supportability of that finding. After all, the notes were not indexed on the district court's docket sheet, and the petitioner says that he did not learn of them until 1995 (when a friend discovered them in the case file). Thus, this ground of appeal arguably was unavailable to the petitioner at the time of his direct appeal. Cf. Satterwhite v. Texas, 486 U.S. 249, 255, 108 S.Ct. 1792, 100 L.Ed.2d 284 (1988) (finding that mere placement of ex parte orders in court file does not yield constructive notice satisfying the Sixth Amendment).
24
The question reduces, therefore, to whether any cognizable prejudice resulted from the error. Quoting Brecht v. Abrahamson, 507 U.S. 619, 637-38, 113 S.Ct. 1710, 123 L.Ed.2d 353 (1993), Judge Keeton described the test as whether the error exerted a "substantial and injurious effect or influence in determining the jury's verdict." The petitioner resists this description; citing United States v. Cronic, 466 U.S. 648, 659, 104 S.Ct. 2039, 80 L.Ed.2d 657 (1984), he argues that such errors can never be harmless because they necessarily involve the denial of counsel at a critical stage of a criminal trial. This argument lacks force.
25
The Supreme Court recently has emphasized how seldom circumstances arise that justify a court in presuming prejudice (and, concomitantly, in forgoing particularized inquiry into whether a denial of counsel undermined the reliability of a judgment). See Mickens v. Taylor, 535 U.S. 162, 122 S.Ct. 1237, 1241, 152 L.Ed.2d 291 (2002); Bell v. Cone, 535 U.S. 685, 122 S.Ct. 1843, 1850-51, 152 L.Ed.2d 914 (2002). We, too, have stressed this point. See, e.g., Scarpa v. DuBois, 38 F.3d 1, 12, 15 (1st Cir.1994). The only Sixth Amendment violations that fit within this narrowly circumscribed class are those that are pervasive in nature, permeating the entire proceeding. See Roe v. Flores-Ortega, 528 U.S. 470, 483, 120 S.Ct. 1029, 145 L.Ed.2d 985 (2000) (collecting cases). In other words, the doctrine of per se prejudice applies to "a wholesale denial of counsel," whereas conventional harmless error analysis applies to a "short-term, localized denial of counsel." Curtis v. Duval, 124 F.3d 1, 5-6 (1st Cir.1997).
26
Here, the petitioner does not posit that he lacked the effective assistance of counsel throughout the proceedings but only at a specific point in the trial (when the jury sent the note in question and the judge responded). This is a difference "not of degree but of kind" in terms of whether the court's error can be deemed per se prejudicial. Cone, 122 S.Ct. at 1851. We conclude, therefore, that prejudice cannot be presumed on the basis of the momentary lapse that occurred in this case.3 Cf. Rushen v. Spain, 464 U.S. 114, 117-19 & n. 2, 104 S.Ct. 453, 78 L.Ed.2d 267 (1983) (per curiam) (holding that an ex parte discussion between judge and juror can be harmless error); Coleman v. Alabama, 399 U.S. 1, 10-11, 90 S.Ct. 1999, 26 L.Ed.2d 387 (1970) (remanding for harmlessness determination when court had improperly denied defendant counsel at preliminary hearing).
27
Clarifying that there is no presumption of prejudice does not doom the petitioner's quest. It simply means that the trial court's mishandling of the jury note does not lead automatically to the vacation of his convictions. We still must decide whether the error affected his substantial rights.
28
Although we have left open the proper standard for gauging harmlessness when such a claim of error is raised on direct appeal, see, e.g., Parent, 954 F.2d at 25 n. 5, the instant claim not only arises on collateral attack but also is procedurally defaulted. In such circumstances, it is settled in this circuit that a reviewing court must apply the "actual prejudice" standard delineated in Brecht, 507 U.S. at 637-38, 113 S.Ct. 1710. See Sustache-Rivera v. United States, 221 F.3d 8, 18 (1st Cir.2000); Curtis, 124 F.3d at 6-7.4 This standard requires us to ask whether the error had a substantial and injurious effect or influence on the outcome of the proceedings. Brecht, 507 U.S. at 637-38, 113 S.Ct. 1710. In answering that query, the burden of proof as to harmlessness falls on the government. O'Neal v. McAninch, 513 U.S. 432, 438-44, 115 S.Ct. 992, 130 L.Ed.2d 947 (1995).
29
Having established the ground rules, we return to the particulars of the case at hand. Judge Keeton identified the correct test for gauging prejudice in this type of situation. In our view, however, he misapplied the test in hypothesizing that the phrase, "The verdict on all counts must be unanimous," was "subject to interpretation" in an incorrect way (i.e., that the jurors must reach unanimous agreement on all counts combined, rather than on each count separately) and that it was "likely" to have influenced the verdict. When the Brecht standard is properly applied in the context of this case, the record reflects that the government has carried the devoir of persuasion.
30
The impetus for the standard articulated in Brecht is that the bar should be held fairly high on post-conviction review. Such proceedings are meant to afford relief only to those who have been grievously wronged, not to those who show merely a possibility — even a reasonable possibility — of harm. See Brecht, 507 U.S. at 637, 113 S.Ct. 1710; see also Singleton v. United States, 26 F.3d 233, 237 n. 9 (1st Cir.1994). This applies with even greater force to procedurally defaulted claims raised for the first time on collateral review. See United States v. Frady, 456 U.S. 152, 166, 102 S.Ct. 1584, 71 L.Ed.2d 816 (1982) (requiring such claims to clear a significantly higher hurdle on collateral attack than on direct review); Knight v. United States, 37 F.3d 769, 772-73 (1st Cir.1994) (same).
31
The bottom line is that a court cannot grant collateral relief on "mere speculation that the defendant was prejudiced by trial error; the court must find that the defendant was actually prejudiced by the error." Calderon v. Coleman, 525 U.S. 141, 146, 119 S.Ct. 500, 142 L.Ed.2d 521 (1998). The error identified by Judge Keeton does not pass through this screen; our review of the instant record convinces us that it is highly improbable that the ex parte supplemental instruction had any effect on the verdict.
32
A jury instruction cannot be read in a vacuum, but, rather, must be taken in light of the charge as a whole. See Cupp v. Naughten, 414 U.S. 141, 146-47, 94 S.Ct. 396, 38 L.Ed.2d 368 (1973); United States v. Cintolo, 818 F.2d 980, 1003 (1st Cir. 1987). In this instance, the jurors previously had received explicit instruction that "[i]t's possible that you could find the government has proved its case as to all three counts, failed to prove it as to all three counts, or proved it as to one or more counts and not on the others." In framing the question to which Judge Freedman responded, the jurors asked, "Does it have to be unanimous to be not guilty on a indictment ... ?" This use of the article "a" indicates that they understood the court's earlier instruction. Because the context in which the jurors asked for supplemental instructions strongly suggests that they understood the independence of each count, we deem it highly probable that the jury interpreted the trial judge's relatively simple reply in the manner in which it was intended: as an admonition that, to render a verdict on any count, the jury must be unanimous as to that count. See Boyde v. California, 494 U.S. 370, 381-82, 110 S.Ct. 1190, 108 L.Ed.2d 316 (1990) (employing similar analysis on direct review); Curtis, 124 F.3d at 8 (using comparable inquiry to assess allegedly improper jury instruction).
33
Nor does the timing of the verdict counsel persuasively in favor of a different conclusion. In some cases, a time line permits a reasonable inference that the error "had a causal effect on a verdict returned within minutes of the court's action." Curtis, 124 F.3d at 7 n. 2. Here, however, we do not think that much weight can be placed on the fact that the jury returned its verdict some thirty-five minutes after Judge Freedman's response. We must consider the timing in the gross and scope of the entire record. See Derman, 298 F.3d at 46. The record reveals that the jury deliberated for only four hours in total. In that relatively short period, this was the deliberating jury's third note; in other words, it asked for, and received, two other responses during that interval. When put in this context, a third question more than half an hour before reaching a verdict does not strike us as significant.
34
We are fortified in our conclusion that the error was benign by the strength of the prosecution's case. The government adduced more than adequate evidence to support the jury's verdict on all three counts. As we stated on direct review, the evidence of the petitioner's guilt "was overwhelming." Ellis, 935 F.2d at 390. Any suspicion that the supplemental instruction improperly drove the verdict is therefore highly implausible. See United States v. Bullard, 37 F.3d 765, 768 (1st Cir.1994); Rogers v. Carver, 833 F.2d 379, 385 n. 1 (1st Cir.1987).
35
To sum up, the petitioner's argument that the supplemental instruction tipped the scales is woven from gossamer strands of speculation and surmise. Notwithstanding the error, we remain confident of the integrity of the verdict — especially in view of the apparent clarity of the charge as a whole and the robust evidence of the petitioner's guilt. Consequently, we find no actual prejudice. See Calderon, 525 U.S. at 146, 119 S.Ct. 500; Brecht, 507 U.S. at 637, 113 S.Ct. 1710. It follows that Judge Keeton's first ground of decision does not justify habeas relief.
36
B. The Confrontation Clause Claim.
37
While the resolution of the jury note claim was plainly within the transferee judge's adjudicatory purview, the Confrontation Clause claim arguably was not. We briefly recapitulate the relevant facts (which are uncontradicted). After resolving the majority of the petitioner's section 2255 claims (including the Confrontation Clause claim), Judge Freedman granted in part the petitioner's motion to recuse and transferred the case so that another judge could hear and determine the fifth claim for relief (alleging judicial bias and misconduct). The successor judge resolved all the transferred claims against the petitioner (save only for the jury note claim, discussed supra). Yet, notwithstanding the limited scope of the transfer order, he ventured into other areas. Once there, he reconsidered, and overruled, his predecessor's prior adjudication of the Confrontation Clause claim. The government says that Judge Keeton exceeded his authority in revisiting that claim. The petitioner demurs.
38
This conundrum implicates the law of the case doctrine. This doctrine has two branches. One branch involves the so-called mandate rule (which, with only a few exceptions, forbids, among other things, a lower court from relitigating issues that were decided by a higher court, whether explicitly or by reasonable implication, at an earlier stage of the same case). See, e.g., United States v. Bell, 988 F.2d 247, 250 (1st Cir.1993); Rivera-Martinez, 931 F.2d at 150. The other branch, applicable here, is somewhat more flexible. It provides that "unless corrected by an appellate tribunal, a legal decision made at one stage of a civil or criminal case constitutes the law of the case throughout the pendency of the litigation." Flibotte v. Pa. Truck Lines, Inc., 131 F.3d 21, 25 (1st Cir.1997). This means that a court ordinarily ought to respect and follow its own rulings, made earlier in the same case. See Arizona v. California, 460 U.S. 605, 618, 103 S.Ct. 1382, 75 L.Ed.2d 318 (1983) (explaining that "when a court decides upon a rule of law, that decision should continue to govern the same issues in subsequent stages in the same case"). This branch of the doctrine frowns upon, but does not altogether prohibit, reconsideration of orders within a single proceeding by a successor judge. E.g., Flibotte, 131 F.3d at 25. This appeal requires us to trace the contours of the exceptions that apply to this second branch of the law of the case doctrine.
39
The presumption, of course, is that a successor judge should respect the law of the case. The orderly functioning of the judicial process requires that judges of coordinate jurisdiction honor one another's orders and revisit them only in special circumstances. See Stevenson v. Four Winds Travel, Inc., 462 F.2d 899, 904-05 (5th Cir.1972) (collecting cases); TCF Film Corp. v. Gourley, 240 F.2d 711, 713-14 & n. 2 (3d Cir.1957) (collecting cases); 18B Charles A. Wright, Arthur R. Miller & Edward H. Cooper, Federal Practice and Procedure § 4478, at 670 (2d ed.2002). This limitation is anchored in a sea of salutary policies. See generally Joan Steinman, Law of the Case: A Judicial Puzzle in Consolidated and Transferred Cases and in Multidistrict Litigation, 135 U. Pa. L.Rev. 595, 602-05 (1987). For one thing, the law of the case doctrine affords litigants a high degree of certainty as to what claims are — and are not — still open for adjudication. See Best v. Shell Oil Co., 107 F.3d 544, 546 (7th Cir.1997); see also Christianson v. Colt Indus. Operating Corp., 486 U.S. 800, 816-17, 108 S.Ct. 2166, 100 L.Ed.2d 811 (1988). For another thing, it furthers the abiding interest shared by both litigants and the public in finality and repose. See Wyoming v. Oklahoma, 502 U.S. 437, 446, 112 S.Ct. 789, 117 L.Ed.2d 1 (1992). Third, it promotes efficiency; a party should be allowed his day in court, but going beyond that point deprives others of their days in court, squanders judicial resources, and breeds undue delay. See Christianson, 486 U.S. at 819, 108 S.Ct. 2166; Rivera-Martinez, 931 F.2d at 151. Fourth, the doctrine increases confidence in the adjudicatory process: reconsideration of previously litigated issues, absent strong justification, spawns inconsistency and threatens the reputation of the judicial system. See Geoffrey C. Hazard, Jr., Preclusion as to Issues of Law: The Legal System's Interest, 70 Iowa L.Rev. 81, 88 (1984) (collecting cases). Finally, judges who too liberally second-guess their co-equals effectively usurp the appellate function and embolden litigants to engage in judge-shopping and similar forms of arbitrage. See Erwin, 155 F.3d at 825; see also White v. Higgins, 116 F.2d 312, 317-18 (1st Cir.1940); 18B Wright et al., supra § 4478.1, at 695.
40
These concerns are heightened in the federal habeas context. In the first place, the presumption against reconsideration is even stronger when the challenge arises on collateral attack of a criminal conviction (and, therefore, implicates society's reasonable reliance on the finality of a criminal conviction). See Strickland, 466 U.S. at 697, 104 S.Ct. 2052 (observing that "the presumption that a criminal judgment is final is at its strongest in collateral attacks"). In the second place, a section 2255 petition ordinarily must be brought before the trial judge. See 28 U.S.C. § 2255; see also Gregory v. United States, 585 F.2d 548, 550 (1st Cir.1978). This is not an idle gesture, for that judge has a unique knowledge of what transpired at trial and of what effect errors may have had. See McGill, 11 F.3d at 225; Panico v. United States, 412 F.2d 1151, 1155-56 (2d Cir.1969); see also Rule 4(a), Rules Governing Sec. 2255, advisory committee's note. For these reasons, a successor judge should be particularly hesitant to revisit portions of a section 2255 petition already adjudicated before the original trial judge. This is especially so in a case — like this one — in which the successor judge is operating under a limited transfer order.
41
Even so, there are times when the law of the case may give way. The question of what circumstances justify revisiting a ruling previously made in the same proceeding by a judge of coordinate jurisdiction is case-specific. Christianson, 486 U.S. at 817, 108 S.Ct. 2166; TCF Film Corp., 240 F.2d at 714. The resolution of that question is guided, however, by certain general principles. We enumerate those principles.
42
First, reconsideration is proper if the initial ruling was made on an inadequate record or was designed to be preliminary or tentative. E.g., Peterson v. Lindner, 765 F.2d 698, 704 (7th Cir.1985); cf. Times Mirror Magazines, Inc. v. Las Vegas Sports News, L.L.C., 212 F.3d 157, 160 (3d Cir.2000) (emphasizing district court's authority to reconsider matters previously decided on preliminary injunction). Second, reconsideration may be warranted if there has been a material change in controlling law. E.g., Tracey v. United States, 739 F.2d 679, 682 (1st Cir. 1984); Crane Co. v. Am. Standard, Inc., 603 F.2d 244, 248 (2d Cir.1979). Third, reconsideration may be undertaken if newly discovered evidence bears on the question. E.g., Fisher v. Trainor, 242 F.3d 24, 29 n. 5 (1st Cir.2001); Pit River Home & Agric. Coop. Ass'n v. United States, 30 F.3d 1088, 1096 (9th Cir.1994). Lastly, reconsideration may be appropriate to avoid manifest injustice. Christianson, 486 U.S. at 817, 108 S.Ct. 2166. In that regard, however, neither doubt about the correctness of a predecessor judge's rulings nor a belief that the litigant may be able to make a more convincing argument the second time around will suffice to justify reconsideration. See Fogel v. Chestnutt, 668 F.2d 100, 109 (2d Cir.1981); White, 116 F.2d at 317-18. For this purpose, there is a meaningful difference between an arguably erroneous ruling (which does not justify revisitation by a co-equal successor judge) and an unreasonable ruling that paves the way for a manifestly unjust result.
43
We employ this framework in assessing Judge Keeton's decision to revisit Judge Freedman's adjudication of the petitioner's Confrontation Clause claim. In so doing, we recognize the desirability of according the successor judge a modicum of flexibility. Thus, we review a successor judge's decision to reconsider a coordinate judge's earlier ruling for abuse of discretion. Delta Sav. Bank v. United States, 265 F.3d 1017, 1027 (9th Cir.2001); Loumar, Inc. v. Smith, 698 F.2d 759, 763 (5th Cir.1983).
44
Judge Keeton did not say why he opted to reopen the Confrontation Clause issue. It is apparent, however, that the first three conditions that might justify reconsideration are plainly absent here. Judge Freedman made his Confrontation Clause ruling based on full briefing, oral argument, and an examination of the record as a whole (the same record that was before Judge Keeton). In addition, he had the advantage of having presided over the trial and having witnessed the child's testimony at first hand. His rescript, filed on March 2, 1998, gives no indication that his Confrontation Clause ruling was meant to be tentative or preliminary. To the contrary, he instructed Judge Keeton to enter it as part of the final judgment upon completion of the proceedings, thereby signaling that he intended his ruling to be definitive. Finally, the petitioner neither presented new facts before Judge Keeton nor identified any intervening change in the law.
45
In short, the record fails to suggest any reason why Judge Keeton should have revisited Judge Freedman's Confrontation Clause ruling unless he discerned a manifest injustice. That standard is difficult to achieve: a finding of manifest injustice requires a definite and firm conviction that a prior ruling on a material matter is unreasonable or obviously wrong.5 See Arizona, 460 U.S. at 618 n. 8, 103 S.Ct. 1382; see also Dobbs v. Zant, 506 U.S. 357, 358-59, 113 S.Ct. 835, 122 L.Ed.2d 103 (1993) (indicating that the previous ruling must be called into "serious question"); Reed v. Rhodes, 179 F.3d 453, 473 (6th Cir.1999) (finding that reconsideration did not constitute abuse of discretion when original judge's ruling was ill-explained and based on obviously unsound legal analysis). A mere "doctrinal disposition" to decide the issue differently will not suffice. Agostini v. Felton, 521 U.S. 203, 236, 117 S.Ct. 1997, 138 L.Ed.2d 391 (1997).
46
We have examined the record with great care. Fairly viewed, the special seating arrangement devised by Judge Freedman for the victim's testimony was not obviously outside the compass of Supreme Court precedent. Because the record does not support a finding of manifest injustice, Judge Keeton was bound to defer to Judge Freedman's ruling on that issue. His failure to do so constitutes an abuse of discretion.
47
To begin, it is important to set the stage (and, thus, establish the appropriate frame of reference). The petitioner concedes that he failed to advance, on direct appeal, his claim that the special seating arrangement violated the Confrontation Clause. Accordingly, the claim is procedurally defaulted. In order to have succeeded on a collateral attack, therefore, he had to have shown both cause and prejudice. See McCleskey v. Zant, 499 U.S. 467, 493, 111 S.Ct. 1454, 113 L.Ed.2d 517 (1991); Derman, 298 F.3d at 45. Assuming, without deciding, that the petitioner had demonstrated cause sufficient to excuse his procedural default — a debatable proposition on this record — he still had to demonstrate a reasonable probability that, but for his counsel's failure to raise the Confrontation Clause issue on direct appeal, the outcome of that appeal would have been different. See Strickler v. Greene, 527 U.S. 263, 289, 119 S.Ct. 1936, 144 L.Ed.2d 286 (1999). Phrased another way, he had to show that his attorney's alleged blunder worked to his actual and substantial disadvantage, thereby undermining confidence in the fairness of the proceedings that culminated in his conviction.6 Kyles v. Whitley, 514 U.S. 419, 434, 115 S.Ct. 1555, 131 L.Ed.2d 490 (1995); Frady, 456 U.S. at 170, 102 S.Ct. 1584.
48
Next, we knit the cause and prejudice standard and the manifest injustice standard together. Judge Freedman found no error in the use of the special seating arrangement (and, thus, no prejudice). In order to revisit and reverse that ruling, Judge Keeton had to determine that Judge Freedman's finding was manifestly unjust (that is, that the finding was unreasonable or obviously wrong). It is that determination, necessarily implicit in Judge Keeton's actions, that we must review.
49
Our inquiry is channeled by a pair of Supreme Court opinions. Two years before the petitioner's conviction, the Court held unconstitutional, as violative of a defendant's Sixth Amendment right to confrontation, an Iowa statute that allowed the placement of an opaque screen between a defendant charged with sexual assault and his minor victims (there, two thirteen-year-old girls). Coy v. Iowa, 487 U.S. 1012, 1020-21, 108 S.Ct. 2798, 101 L.Ed.2d 857 (1988). Although the Court described face-to-face confrontation as instrumental in testing the veracity of a witness and integral to a fair trial, id. at 1016-20, 108 S.Ct. 2798, it specifically reserved the question of whether exceptions to the right of face-to-face confrontation might be recognized when "necessary to further an important public policy," id. at 1021. To the extent that such exceptions might exist, the Court cautioned, they could not rest on generalized theses (such as those contained in the Iowa statute); rather, exceptions would require "individualized findings" as to particular witnesses and circumstances. Id.
50
Six weeks after the jury convicted the petitioner, the Supreme Court decided Maryland v. Craig, 497 U.S. 836, 110 S.Ct. 3157, 111 L.Ed.2d 666 (1990). The Craig Court upheld a Maryland statute that allowed child abuse victims to testify via one-way closed circuit television upon the trial court's determination that face-to-face confrontation with the alleged abuser was likely to cause serious emotional distress. Id. at 855, 110 S.Ct. 3157. Justice O'Connor, writing for the majority, emphasized that the right to face-to-face confrontation is not an absolute requirement of the Confrontation Clause. Id. at 847-50, 110 S.Ct. 3157. An alternative arrangement is permissible as long as the arrangement is in furtherance of an important public policy — such as the protection of minors who have been victimized by sexual predators — and the reliability of the testimony is otherwise assured. Id. at 854-55, 110 S.Ct. 3157. Even so, the trial court must make individualized, case-specific findings, and, in doing so, must address the particular child's susceptibility to the particular defendant. Id. at 855-60, 110 S.Ct. 3157.
51
In addressing the section 2255 petition, Judge Freedman reviewed these precedents. He concluded that the special seating arrangement used in the petitioner's trial passed constitutional muster. Based on his supportable findings anent the need for special treatment of the child witness, this conclusion is neither unreasonable nor obviously wrong.
52
In his post-conviction rescript, Judge Freedman carefully documented the considerations that had prompted him to resort to a modified seating arrangement.7 He found that, given the nature of E.D.'s testimony, the child — who was nine years old at the time of trial — likely would have difficulty testifying in a public forum, and that she might reasonably fear testifying in front of the petitioner.
53
The petitioner asserts that Judge Freedman's findings are inadequate to meet the Craig criteria. While this is a close question, we think that the findings suffice to withstand a claim of manifest injustice. In the first place, the less the intrusion on Sixth Amendment rights, the less detail is required in a trial court's findings. See California v. Lord, 30 Cal.App.4th 1718, 36 Cal.Rptr.2d 453, 455 (1994); Brandon v. Alaska, 839 P.2d 400, 409-10 (Alaska Ct. App.1992). In all events, Judge Freedman's rescript mentions specifically that the petitioner had threatened E.D. with harm if she told what he had done. This finding, in conjunction with other facts of record (such as the fact that the petitioner arguably had made menacing gestures during the pretrial proceedings, that he had struck E.D. before, and that he repeatedly had violated a "no contact" order after his arrest), leads us to conclude that the use of a special seating arrangement was justified. See Vigil v. Tansy, 917 F.2d 1277, 1279-80 (10th Cir.1990) (allowing pre-Craig trial court to justify moderate restriction on right to confront child witness on less rigorous individualized findings).8
54
In our view, the adequacy of Judge Freedman's findings is buttressed by the hallmarks of testimonial reliability made manifest by the record. See Craig, 497 U.S. at 851, 110 S.Ct. 3157 (listing competence, administration of an oath, full opportunity for cross-examination, and full visibility of the child witness's body language and demeanor before judge, jury, and defendant as "other elements of the confrontation right"). These include the absence of any opaque physical barrier and the fact that the witness was required to give live testimony, under oath, in the presence of both the defendant and the jury. See id. To the extent that nervousness, body language, demeanor, and the like are important indicia of credibility, the jurors' entirely unimpaired view of the witness is persuasive. See Morales v. Artuz, 281 F.3d 55, 62 (2d Cir.2002); Stanger v. Indiana, 545 N.E.2d 1105, 1113 (Ind.Ct. App.1989). In addition, the petitioner had ample opportunity to cross-examine E.D. and to offer any evidence and arguments that might impugn her credibility. These are weighty factors. See Louisiana v. Brockel, 733 So.2d 640, 646 (La.Ct.App. 1999); Boatright v. Georgia, 192 Ga.App. 112, 385 S.E.2d 298, 302-03 (1989).
55
Despite these circumstances, the petitioner argues that Coy demands a different result. We do not agree. The seating arrangement there was statutorily driven, not custom-tailored to fit the exigencies of a particular case. Moreover, it involved an opaque physical barrier. In contrast, no physical barrier separated E.D. from the petitioner during the instant trial. Many courts have found the absence of such a barrier to be of decretory significance in rejecting Confrontation Clause challenges. See, e.g., N. Dakota v. Miller, 631 N.W.2d 587, 594 (N.D.2001); Smith v. Arkansas, 340 Ark. 116, 8 S.W.3d 534, 537 (2000); Utah v. Hoyt, 806 P.2d 204, 209 (Utah Ct.App.1991); Ortiz v. Georgia, 188 Ga. App. 532, 374 S.E.2d 92, 95-96 (1988); see also Morales, 281 F.3d at 58-59 (pointing out that neither Craig nor Coy expatiate on unobstructed, in-court testimony); Cumbie v. Singletary, 991 F.2d 715, 721 (11th Cir.1993) (suggesting that Coy is inapplicable when child testifies in presence of defendant); see generally Bruce E. Bohlman, The High Cost of Constitutional Rights in Child Abuse Cases — Is the Price Worth Paying?, 66 N.D. L.Rev. 579, 589 (1990) (stating that seating arrangements not involving artificial barriers "are apparently permissible under Coy"). Given these marked differences, Coy is readily distinguishable.
56
Nor are these the only bases for distinction. Unlike in Coy, the record here contains no evidence suggesting that what the petitioner actually saw of E.D.'s face at trial was substantially less than what he would have seen had she testified from the witness stand (and, indeed, Judge Freedman's description of the courtroom layout makes clear that E.D. would not have had to face the petitioner directly even if she had testified from the witness stand). The significance of this circumstance is reinforced by Judge Freedman's specific finding that the petitioner had a sufficient view of E.D.'s "demeanor." This finding is not clearly erroneous, and, thus, deserves our respect. See Familia-Consoro, 160 F.3d at 764-65; McGill, 11 F.3d at 225. Both of these factors tend to support the constitutionality of the special seating arrangement. See Smith, 8 S.W.3d at 537-38 (collecting cases); Brockel, 733 So.2d at 646.
57
In a further effort to denigrate the use of the special seating arrangement, the petitioner notes the lack of eye contact between him and E.D. We agree that the opportunity for eye contact, whether or not the witness chooses to act on it, is an important integer in the Sixth Amendment calculus. Coy, 487 U.S. at 1019, 108 S.Ct. 2798. But a defendant does not have a constitutional right to force eye contact with his accuser, id., and we refuse to fashion a bright-line rule that the lack of such an opportunity, in and of itself, automatically translates into a constitutional violation. Most other courts that have considered the question have reached a similar conclusion.9 E.g., Hoyt, 806 P.2d at 210; Ortiz, 374 S.E.2d at 95-96. Moreover, some courts have found that the lack of an easy opportunity for eye contact is palliated to a sufficient degree by a seating arrangement such as the one employed in this case (which preserves the line of sight and allows a witness to turn to make eye contact with the defendant). See California v. Sharp, 29 Cal.App.4th 1772, 36 Cal. Rptr.2d 117, 125 (1994); Boatright, 385 S.E.2d at 301.
58
We summarize succinctly. Although the lack of eye contact weighs in the petitioner's favor, all the other Confrontation Clause safeguards were present here. Mindful, as we are, that trial judges have some leeway to move a witness around a courtroom as long as those shifts retain an unobstructed line of sight between the defendant and the witness, cf. Coy, 487 U.S. at 1023, 108 S.Ct. 2798 (O'Connor, J., concurring) (suggesting that "many such procedures may raise no substantial Confrontation Clause problem since they involve testimony in the presence of the defendant"), we cannot say that Judge Freedman's core conclusion — that no Confrontation Clause violation occurred — was either unreasonable or obviously wrong.
59
In a further attempt to justify reconsideration, the petitioner submits that Judge Freedman erroneously denied him the assistance of counsel for his section 2255 petition. He argues, in effect, that his "inartful" pro se presentation before Judge Freedman may have influenced the court's rulings, freeing the successor judge to review them de novo. That argument is unavailing. A convicted criminal has no constitutional right to counsel with respect to habeas proceedings. Pennsylvania v. Finley, 481 U.S. 551, 555, 107 S.Ct. 1990, 95 L.Ed.2d 539 (1987). It is true that the petitioner could not raise his ineffective assistance of counsel claim until collateral review, see Knight, 37 F.3d at 774; United States v. Mala, 7 F.3d 1058, 1063 (1st Cir.1993), but this makes no difference. We fail to see how an adscititious ineffective assistance claim entitles a criminal defendant to the assistance of counsel on subsequent collateral review. See Moran v. McDaniel, 80 F.3d 1261, 1271 (9th Cir.1996); see also Lattimore v. Dubois, 311 F.3d 46, 55-56 (1st Cir.2002). Although we have indicated that, in certain circumstances, the appointment of counsel for a section 2255 petitioner might be warranted, such cases are few and far between. See Mala, 7 F.3d at 1063-64. The circumstances of the petitioner's case are not such as to demand the appointment of counsel.10 It follows that Judge Keeton could not reconsider a prior ruling merely because the presence of counsel might have produced new or better arguments. United States v. Velez Carrero, 140 F.3d 327, 329-30 (1st Cir.1998).
60
We need go no further. Finding no manifest injustice, we are constrained to hold that Judge Keeton abused his discretion in redeciding and countermanding Judge Freedman's previous adjudication of the Confrontation Clause claim.
III. CONCLUSION
61
Although it is true that the law must always be vigilant to protect the rights of those who are convicted of serious crimes, our system of justice guarantees a fair trial, not a perfect one. See United States v. Hasting, 461 U.S. 499, 508, 103 S.Ct. 1974, 76 L.Ed.2d 96 (1983); United States v. Polito, 856 F.2d 414, 418 (1st Cir.1988). Nowhere is this principle more venerated than on collateral review. See, e.g., Williams v. Taylor, 529 U.S. 362, 374-75, 120 S.Ct. 1495, 146 L.Ed.2d 389 (2000) (holding that habeas relief under the AEDPA, 28 U.S.C. § 2254(d)(2), is reserved for unreasonable applications of Supreme Court precedent, not merely to remedy incorrect state court decisions). In this instance, the petitioner's trial may not have been perfect, but it was most assuredly fair. Accordingly, we reverse the order granting a new trial and remand the matter to the district court with directions to enter judgment for the United States and, concomitantly, to reinstate the petitioner's convictions.
62
Reversed.
Notes:
1
Although the handling of the jury note reflects error, not misconduct, this is an essentially semantic difference for purposes of the case at bar. What matters is that, under the limited order of reassignment, the jury note claim was properly within Judge Keeton's adjudicatory purview
2
There is arguably a further exception for evidence showing actual innocence,see Bousley, 523 U.S. at 622, 118 S.Ct. 1604, but the petitioner does not invoke that exception here.
3
The petitioner's argument is not bolstered by his reliance onFrench v. Jones, 282 F.3d 893, 901 (6th Cir.2002) (affirming the grant of a state prisoner's habeas petition on the ground that the state courts "unreasonably applied harmless error analysis to French's deprivation of counsel during the supplemental instruction"). The Supreme Court recently vacated the Sixth Circuit's decision in French and remanded the case "for further consideration in light of Bell v. Cone[]." Jones v. French, ___ U.S. ___, 122 S.Ct. 2324, 153 L.Ed.2d 153 (2002).
4
To be sure, one court has used the more rigorous "harmless beyond a reasonable doubt" standard in circumstances similar to those presented in this caseSee Starr v. Lockhart, 23 F.3d 1280, 1291-92 (8th Cir. 1994). We reject that view as contrary both to circuit precedent and to the overwhelming weight of authority elsewhere. See, e.g., Bains v. Cambra, 204 F.3d 964, 976-77 (9th Cir.2000) (collecting cases); Lyons v. Stovall, 188 F.3d 327, 335 (6th Cir.1999); Hogue v. Johnson, 131 F.3d 466, 498-99 (5th Cir.1997) (collecting cases).
5
A finding of manifest injustice also requires a finding of prejudiceDobbs v. Zant, 506 U.S. 357, 359, 113 S.Ct. 835, 122 L.Ed.2d 103 (1993); United States v. Crooker, 729 F.2d 889, 890 (1st Cir.1984). Because we conclude that Judge Freedman's refusal to grant habeas relief premised on the use of the special seating arrangement was neither unreasonable nor obviously wrong, see text infra, we do not reach the question of what (if any) prejudice inured.
6
Because the quantum and kind of prejudice that must be shown in connection with an ineffective assistance of counsel claim is identical to that necessary to relieve a habeas petitioner from the effects of a procedural default,see Prou v. United States, 199 F.3d 37, 49 (1st Cir.1999), we have no need to undertake a separate analysis of the petitioner's ineffective assistance of appellate counsel claim. See Strickland, 466 U.S. at 694, 104 S.Ct. 2052 (holding that prejudice is an essential element of an ineffective assistance of counsel claim); Scarpa, 38 F.3d at 14-15 (same).
7
Although Judge Freedman and the parties discussed E.D.'s seating arrangement at a conference in advance of the criminal trial, the judge neither conducted a hearing on the matter nor made contemporaneous findings as to the effect of the petitioner's presence on E.D. Since the petitioner did not request a hearing and did not object to the lack of contemporaneous findings, we accept Judge Freedman's later statement of his reasons in lieu of contemporaneous findingsCf. California v. Sharp, 29 Cal.App.4th 1772, 36 Cal. Rptr.2d 117, 124 & n. 4 (1994) (extrapolating findings from the record where defendant failed to ask the trial court for findings).
8
To be sure, Judge Freedman's findings fell short of an express determination that E.D. ran a serious risk of trauma from testifying in front of the defendant — a type of determination suggested byCraig, 497 U.S. at 856, 110 S.Ct. 3157. Given that the petitioner's conviction pre-dated Craig, however, we think that the findings were adequate to justify the modest measures instituted in this case. See Hardy v. Wigginton, 922 F.2d 294, 299-300 (6th Cir.1990) (explaining that, in the interim between Coy and Craig, trial courts could not be expected to make Craig-type findings that were complete in every detail); Vigil, 917 F.2d at 1279-80 (similar).
9
We are aware that the Massachusetts Supreme Judicial Court has found the lack of eye contact fatal under an analogous — but differently worded — provision of the Massachusetts Declaration of RightsSee Massachusetts v. Amirault, 424 Mass. 618, 677 N.E.2d 652, 662 (Mass.1997) (terming it "a non sequitur to argue from the proposition that, because the witness cannot be forced to look at the accused during his face-to-face testimony, that therefore this aspect of the art. 12 confrontation right is dispensable"). We decline to import so rigid a requirement into the jurisprudence of the Sixth Amendment.
10
The fact that Judge Keeton appointed counsel to handle the remainder of the petitioner's claims is not dispositive. While such an appointment was within Judge Keeton's discretion, it does not follow that Judge Freedman's contrary decision constituted an abuse of discretion. This variation merely serves to illustrate what every lawyer already knows: that two judges can decide discretionary matters differently without either judge abusing his or her discretionSee, e.g., United States v. Nickens, 955 F.2d 112, 125-26 (1st Cir. 1992); Williams v. Giant Eagle Mkts., Inc., 883 F.2d 1184, 1190 (3d Cir.1989); United States v. Stubblefield, 408 F.2d 309, 311 (6th Cir.1969).
|
Impaired wound healing with defective expression of chemokines and recruitment of myeloid cells in TLR3-deficient mice.
Skin injury evokes both innate and adaptive immune responses to restore tissue integrity. TLRs play a critical role in host responses to injurious insults. Previous studies demonstrated that RNAs released from damaged tissues served as endogenous ligands for TLR3. In this study, we investigated the involvement of TLR3 in skin restoration after injury. Full excisional wounds were created on the skin of mice with TLR3 deficiency. We found that skin wound closure in TLR3(-/-) mice was significantly delayed compared with control littermates. Wound healing parameters, including re-epithelialization, granulation formation, and neovascularization, were decreased in TLR3(-/-) mice. Further studies revealed that the absence of TLR3 led to defective recruitment of neutrophils and macrophages, in association with decreased expression of the chemokines, MIP-2/CXCL2, MIP-1α/CCL3, and MCP-1/CCL2, in the wound. Moreover, in wild type mice, the mRNA level and protein content of TLR3 was significantly upregulated in wounded skins and silencing of TLR3 signal adaptor Toll/IL-1R domain-containing adapter inducing IFN-β with small interfering RNA retarded wound closure. These results indicate an essential role for TLR3 and Toll/IL-1R domain-containing adapter inducing IFN-β in wound healing by regulating chemokine production and recruitment of myeloid cells to wound for tissue repair.
|
Prosthetic cardiac valves have been used for many years to treat cardiac valvular disorders. The native heart valves (such as the aortic, pulmonary and mitral valves) serve critical functions in assuring the forward flow of an adequate supply of blood through the cardiovascular system. These heart valves can be rendered less effective by congenital, inflammatory, or infectious conditions. Such damage to the valves can result in serious cardiovascular compromise or death. For many years the definitive treatment for such disorders was the surgical repair or replacement of the valve during open-heart surgery, but such surgeries are prone to many complications. More recently, a transvascular technique has been developed for introducing and implanting a prosthetic heart valve using a flexible catheter in a manner that is less invasive than open heart surgery.
In this technique, a prosthetic valve is mounted in a crimped state on the end portion of a flexible catheter and advanced through a blood vessel of the patient until the prosthetic valve reaches the implantation site. The prosthetic valve at the catheter tip is then expanded to its functional size at the site of the defective native valve, such as by inflating a balloon on which the prosthetic valve is mounted. Alternatively, the prosthetic valve can have a resilient, self-expanding stent or frame that expands the prosthetic valve to its functional size when it is advanced from a delivery sheath at the distal end of the catheter.
The native valve annulus in which an expandable prosthetic valve is deployed typically has an irregular shape mainly due to calcification. As a result, small gaps may exist between the expanded frame of the prosthetic valve and the surrounding tissue. The gaps can allow for regurgitation (leaking) of blood flowing in a direction opposite the normal flow of blood through the valve. To minimize regurgitation, various sealing devices have been developed that seal the interface between the prosthetic valve and the surrounding tissue.
|
Bimodal relationship of human tremor and shivering on introduction to cold exposure.
Four subjects were exposed to an environmental challenge of -12 degrees C for 15 min in four conditions of exposure: 1) clothed body and clothed arm, 0.5 clo units: 2) clothed body and exposed arm, 0.4 col; 3) exposed body and exposed arm, 0.1 clo: 4) exposed body and clothed arm, 0.2 clo. Core temperature, surface temperature of the right arm, perceived thermal comfort, EMG indicated onset of shivering, and the frequency of tremor using accelerometry were monitored and data collected every 30 s. The results indicate that tremor frequency significantly increases with cold exposure, but that a significant drop in tremor frequency precedes the onset of shivering. It is suggested that pre-shivering tetany occurs prior to the onset of shivering, acts as a load upon the lever of the hand and reduces the oscillation of the limb.
|
Q:
Minimum XOR for queries
I was asked the following question in an interview.
Given an array A with N elements and an array B with M elements. For each B[X] return A[I] where XOR of A[I] and B[X] is minimum.
For example:
Input
A = [3, 2, 9, 6, 1]
B = [4, 8, 5, 9]
Output
[6, 9, 6, 9]
Because when 4 is XORed with any element in A minimum value will occur when A[I] = 6
4 ^ 3 = 7
4 ^ 2 = 6
4 ^ 9 = 13
4 ^ 6 = 2
4 ^ 1 = 5
Here is my brute force solution in python.
def get_min_xor(A, B):
ans = []
for val_b in B:
min_xor = val_b ^ A[0]
for val_a in A:
min_xor = min(min_xor, val_b ^ val_a)
# print("{} ^ {} = {}".format(val_b, val_a, val_b ^ val_a))
ans.append(min_xor ^ val_b)
return ans
Any ideas on how this could be solved in sub O(MxN) time complexity?
I had the following idea in mind.
I would sort the array A in O(NlogN) time then for each element in B. I would try to find it's place in the array A using binary search.Let's say B[X] would fit at ith position in A then I would check the min XOR of B[X] ^ A[i-1] and B[X] ^ A[i+1]. But this approach won't work in all the cases. For example the following input
A = [1,2,3]
B = [2, 5, 8]
Output:
[2, 1, 1]
Here is the trie solution.
class trie(object):
head = {}
def convert_number(self, number):
return format(number, '#032b')
def add(self, number):
cur_dict = self.head
binary_number = self.convert_number(number)
for bit in binary_number:
if bit not in cur_dict:
cur_dict[bit] = {}
cur_dict = cur_dict[bit]
cur_dict[number] = True
def search(self, number):
cur_dict = self.head
binary_number = self.convert_number(number)
for bit in binary_number:
if bit not in cur_dict:
if bit == "1":
cur_dict = cur_dict["0"]
else:
cur_dict = cur_dict["1"]
else:
cur_dict = cur_dict[bit]
return list(cur_dict.keys())[0]
def get_min_xor_with_trie(A,B):
number_trie = trie()
for val in A:
number_trie.add(val)
ans = []
for val in B:
ans.append(number_trie.search(val))
return ans
A:
The key concept is that the XOR is minimized by matching as many of the most-significant bits as possible. For example, consider B[x] = 4, when the values in A are
1 0001
2 0010
3 0011
6 0110
9 1001
The binary pattern for 4 is 0100. So we're looking for a number that starts with 0. This eliminates the 9, since 9 has a 1 as the most-significant bit. Next, we're looking for a 1 in the second bit. Only 6 starts with 01, so 6 is the best match for 4.
To solve the problem efficiently, I would put the elements of A into a trie.
Using the example from the question, the trie would look something like this. (Note that it's possible to save memory and improve speed by allowing leaf nodes higher in the trie, but that complicates construction of the trie.)
Once the tree is constructed, it's easy to look up the answer for any B[x]. Just follow the bit pattern starting from the root. For nodes that have two children, go to the child that matches the current bit. For nodes with one child, there's no choice, so go to that child. When a leaf is found, that's the answer.
The run time is O(k(N+M)) where k is the number of bits in the largest number in A.
In the example, k is 4.
|
Office Furniture Contracts (Scotland)
asked the Minister of Public Building and Works what measures he is taking to make sure that the purchase of office furniture by his Department is directed to Scotland and other development areas; and if he will provide a table of relevant statistics.
Firms in Scotland and other Development Areas are invited to tender for Ministry contracts wherever possible; if they are not successful in obtaining the whole contract they are offered a part of it provided they can meet a specified price and their offer is otherwise satisfactory.
Contracts for office furniture to the value of £288,000 have in the last year been given to firms manufacturing in Scotland and to the value of £651,000 to firms operating in other Development Areas, out of total purchases of office furniture of an estimated value of £5 million per annum.
|
/*
This is for filtering input in the "--readscan" feature
*/
#ifndef IN_FILTER_H
#define IN_FILTER_H
struct RangeList;
/**
* Filters readscan record by IP address, port number,
* or banner-type.
*/
int
readscan_filter_pass(unsigned ip, unsigned port, unsigned type,
const struct RangeList *ips,
const struct RangeList *ports,
const struct RangeList *btypes);
#endif
|
IN THE COURT OF CRIMINAL APPEALS
OF TEXAS
NO. AP-74,393
IRVING ALVIN DAVIS, Appellant
v.
THE STATE OF TEXAS
ON DIRECT APPEAL
FROM EL PASO COUNTY
Keller, P.J., filed a dissenting opinion in which Keasler and Hervey,
JJ., joined.
The Court reverses appellant's conviction on his tenth point of error, claiming that the trial court
refused to allow appellant's punishment phase witnesses to testify that appellant did not constitute a future
danger to society. Although I agree that the trial court should have permitted the testimony, I would hold
that the trial court's errors in this regard were harmless. The Court does not really explain how appellant
was harmed but simply concludes that the trial court's errors show "a degree of harm intolerable in a death-penalty case." But that conclusion, aside from being unsupported, makes little sense to me. The harm
analysis is the same for error in death and non-death cases. (1)
I also think that the Court's analysis of appellant's ninth point of error, regarding the sufficiency of
the evidence of future dangerousness, understates the strength of the evidence against appellant. Because
the strength of the State's evidence of future dangerousness is relevant to a harm analysis with respect to
the trial court's exclusion of evidence, I will first conduct a more complete sufficiency review before turning
to a harm analysis under point of error ten.
1. Legal Sufficiency
In his ninth point of error, appellant claims the evidence is legally insufficient to support the jury's
finding that he would pose a future danger to society. In reviewing the sufficiency of the evidence at
punishment, this Court looks at the evidence in the light most favorable to the verdict to determine whether
any rational trier of fact could have concluded beyond a reasonable doubt that appellant would probably
commit criminal acts of violence that would constitute a continuing threat to society. (2) The circumstances
of the crime alone, if severe enough, can support an affirmative finding to the future dangerousness special
issue. (3)
The circumstances of the offense showed a brutal crime. In addition to being raped, the victim
suffered a severe brain injury from blunt force trauma, was strangled, and suffered a ruptured pulmonary
artery. The medical examiner testified that any one of the latter three injuries was sufficient to cause death.
Moreover, appellant's act of cutting off the victim's fingertips was barbarous, and showed forethought in
covering up the crime. (4) Further, appellant was convicted of three charges of possession of stolen goods
as an adult, was suspended from school as a juvenile for possession of marijuana and assault, and became
violent on numerous occasions. Episodes of bad conduct included threatening his brother with a knife,
possessing a knife at a nightclub, locking himself in a bedroom with a girl who was passed out from drinking
too much, throwing a stool in a bar, and striking an acquaintance in the chest for no reason and pushing that
acquaintance's head down while he tried to tie his shoe. This last incident occurred just hours before
appellant murdered the victim. Finally, Dr. Edward Brown Gripon, a psychiatrist, testified that a
hypothetical person with appellant's background would constitute a continuing threat to society. A rational
trier of fact could have found that appellant would probably commit criminal acts of violence that would
constitute a continuing threat to society.
2. Lay Testimony
I would hold that the trial court's errors in preventing appellant's lay witnesses from specifically
testifying, "Irving Davis would not present a future danger to society," were harmless.
In Potier v. State, we held that the improper exclusion of evidence is unconstitutional only if it
significantly undermines the fundamental elements of the accused's defense. (5) When the accused is able to
present the substance of his defense, the proper harm analysis is conducted under Texas Rule of Appellate
Procedure 44.2(b), which states that any non-constitutional error that does not affect a substantial right
must be disregarded. (6) An error affects the defendant's substantial rights for Rule 44.2(b) purposes when
the error has "a substantial and injurious effect or influence in determining the jury's verdict." (7) Or stated
another way, an error does not affect substantial rights if the appellate court "has fair assurance that the
error did not influence the jury, or had but a slight effect." (8)
Although appellant's witnesses were not allowed to give their ultimate opinion on whether appellant
posed a future danger to society, they were able to give opinions as to his non-violent character and their
observations supporting those opinions. Carolyn Brookshire was allowed to testify that she had known
appellant for four to five years and that he was friends with her son, Corey. She related that appellant was
very polite and not aggressive. Corey Brookshire testified that appellant was a family friend he had known
for five years. He described appellant as kind-hearted and friendly. He stated further that appellant had
never been violent toward him and was a gentleman towards women. Margaret Sanderson testified that
appellant was a neighbor and friend of the family who was helpful and respectful. She also stated that the
only time she had seen appellant violent was during a fight with his brother and that the fight was nothing
more than normal sibling rivalry. Gail Pylant testified that she was the assistant principal where appellant
attended high school. She related that appellant was very respectful and did not exhibit any violent
tendencies. Michael Sanderson, Jr. testified that he and appellant had been friends and neighbors for eight
years. Sanderson described appellant as timid, respectful of his elders, and non-violent. Clare
Zawistowski testified that she was the choral director at the high school appellant attended and that
appellant was a choir member for two years. She stated that during that time, appellant was respectful and
got along with his peers. She went on to say that she never saw him become violent and that he treated
women no differently than he treated men. Amanda Sanderson testified that she had known appellant for
ten years and he was like a brother to her. She described appellant as protective and very "gentleman-like." She also stated that she had never seen appellant act aggressively or violently. Carol Davis,
appellant's mother, testified that appellant was never violent and was very special to her. Bryan Stinson
testified that appellant was his best friend and that he had never seen appellant act violently. Star Stinson
testified that appellant was friends with her sons and that she had known him for seven or eight years. She
related that appellant was helpful and had never been violent or aggressive in her presence. Defense
counsel asked eight of these witnesses whether appellant's capital murder conviction changed their opinion
of him. (9) Six gave an unqualified "no" answer, while two gave a qualified answer. (10)
In the present case, the trial court's limitation of the testimony of appellant's lay witnesses did not
rise to the level of unconstitutionality because it did not deprive the defendant of the substance of his
defense. The testimony that was admitted did serve to present the defendant's position that he was not
violent and therefore was not a future danger to society. The remaining question is whether the trial court's
ruling affected the defendant's substantial rights. I would hold that it did not.
In one important respect, the present case is similar to Schutz v. State. (11) In Schutz, the trial court
erred in admitting the ultimate opinion of two expert witnesses regarding whether the complaining witness
was manipulated into making or was fantasizing sexual assault allegations. (12) However, the expert witnesses
had given permissible testimony concerning whether the complainant exhibited traits associated with
manipulation or fantasy. (13) Under the circumstances, we found that the jury could have reasonably
predicted what the experts' ultimate conclusions about the complainant's credibility would be, and
therefore, "the jury was less likely to be improperly influenced by an explicit statement of what was already
implicit in the testimony." (14) While the present case involves the improper exclusion of evidence rather than
its improper admission, Schutz's reasoning is relevant here. Although the jury did not hear the ultimate
conclusions of the defense lay witnesses regarding appellant's future dangerousness, the evidence it did hear
lends itself to the conclusion that the witnesses did not believe appellant was a future danger. The witnesses
did testify to appellant's non-violent nature, and the defense elicited from most of them that the conviction
for capital murder did not change their opinion of him.
Moreover, there is very little likelihood that the jury would place much weight on the general
opinion of family and friends that appellant did not constitute a future danger. Appellant's crime was an
entirely unprovoked rape-murder of an acquaintance, and appellant showed foresight in concealing
evidence by cutting off the victim's fingertips.
Also, on cross-examination, a few of these witnesses admitted to not knowing about significant
activities engaged in by appellant. Carolyn Brookshire testified that she did not know what kind of activities
appellant was engaged in when he was not around her. Corey Brookshire admitted that he was unaware
of appellant's school disciplinary problems, his possession of marijuana, and his three misdemeanor
convictions. Zawistowski acknowledged that she was unaware of appellant's school disciplinary problems
and his conviction for possession of stolen goods.
And as discussed earlier in this opinion, appellant had committed a number of prior violent acts,
including one that was possibly sexual in nature. I am confident the loss of the slight probative value the
excluded testimony would have added to the defense did not have a substantial and injurious effect or
influence on the jury's punishment verdict. Thus, I would overrule point of error ten and affirm the
judgment of the trial court.
Filed: June 13, 2007
Do Not Publish
1. Tex. R. App. P. 44.2.
2. Jackson v. Virginia, 443 U.S. 307 (1979); Allridge v. State, 850 S.W.2d 471 (Tex. Crim.
App. 1991), cert. denied, 510 U.S. 831 (1993).
3. Sonnier v. State, 913 S.W.2d 511, 517 (Tex. Crim. App. 1996).
4. See Williams v. State, 958 S.W.2d 186, 191 (Tex. Crim. App. 1997)(parking two streets
down from victim's house to evade detection).
5. Potier v. State, 68 S.W.3d 657, 666 (Tex. Crim. App. 2002).
6. Id.; Tex. R. App. P. 44.2(b).
7. King v. State, 953 S.W.2d 266, 271 (Tex. Crim. App. 1997)(citing Kotteakos v. United
States, 328 U.S. 750, 776 (1946)).
8. Johnson v. State, 967 S.W.2d 410, 417 (Tex. Crim. App. 1998).
9. This question was directed to Carolyn Brookshire, Corey Brookshire, Margaret Sanderson,
Michael Sanderson, Jr., Claire Zawistowski, Amanda Sanderson, Bryan Stinson, and Star Stinson.
10. In response to the question, Zawistowski testified, "Not the Irving I knew, no." Star Stinson
responded to the question by saying, "I dislike what has happened, but I care very much, though, for
him." On the bill of exception, Zawistowski's response to the future dangerousness question was
similarly qualified.
11. 63 S.W.3d 442 (Tex. Crim. App. 2001).
12. Id. at 443.
13. Id. at 445.
14. Id. at 446.
|
package zwh.com.lib;
import android.content.Context;
import android.support.test.InstrumentationRegistry;
import android.support.test.runner.AndroidJUnit4;
import org.junit.Test;
import org.junit.runner.RunWith;
import static org.junit.Assert.*;
/**
* Instrumentation test, which will execute on an Android device.
*
* @see <a href="http://d.android.com/tools/testing">Testing documentation</a>
*/
@RunWith(AndroidJUnit4.class)
public class ExampleInstrumentedTest {
@Test
public void useAppContext() throws Exception {
// Context of the app under test.
Context appContext = InstrumentationRegistry.getTargetContext();
assertEquals("zwh.com.lib.test", appContext.getPackageName());
}
}
|
Introduction {#S1}
============
Oral cavity cancers are the eighth most common cancer worldwide ([@B1]) accounting for 2% of cancer mortality ([@B2]). Oral tongue squamous cell carcinoma (OTSCC) is the most common oral cavity cancer ([@B3]). Risk factors for OTSCC include tobacco and alcohol consumption which act synergistically to promote carcinogenesis ([@B1]).
Current mainstay treatment for OTSCC is surgery often with post-operative radiotherapy, and sometimes chemotherapy ([@B4]). The 5-year survival rate of 50--55% for OTSCC ([@B3]) has remained largely unchanged over the past 40 years ([@B5]).
Cancer stem cells (CSCs), demonstrated in many types of cancers, have been proposed to be the origin of cancer including OTSCC ([@B6]). Increased tumor size, local invasion, local recurrence, and regional metastasis have been associated with overexpression of CSC markers ([@B7]).
We have recently characterized two CSC subpopulations within moderately differentiated oral tongue squamous cell carcinoma (MDOTSCC) with an OCT4^−^ subpopulation within the tumor nests (TNs) that also expresses EMA; and an OCT4^+^ subpopulation within the peri-tumoral stroma that does not express EMA ([@B6]).
The renin--angiotensin system (RAS) is a hormonal system classically associated with blood pressure and body fluid regulation. Recent literature has demonstrated its role in cancer growth and metastasis ([@B8]) by promoting angiogenesis and cell proliferation ([@B9], [@B10]). Angiotensinogen (ANG) undergoes conversion to angiotensin I (ATI) by renin, the active form of pro-renin ([@B8], [@B11]). Pro-renin receptor (PRR) is the receptor for both pro-renin and renin ([@B12]). ATI is then converted to angiotensin II (ATII) by the action of angiotensin converting enzyme (ACE) ([@B8]). Vasoactive ATII acts on angiotensin II receptor 1 (ATIIR1) and angiotensin II receptor 2 (ATIIR2) ([@B8]).
We have recently demonstrated the presence of two putative CSC subpopulations in MDOTSCC: one within the TNs and the other within the peri-tumoral stroma ([@B6]). We have also demonstrated the expression of components of the RAS by these CSCs ([@B13]). The CSC subpopulation within the TNs expresses PRR, ATIIR1, and ATIIR2, while the CSC subpopulation within the peri-tumoral stroma expresses PRR, ACE, ATIIR1, and ATIIR2 ([@B13]).
Cathepsins B, D, and G are proteases that provide putative bypass loops for the RAS. Cathepsin B, a cysteine protease, is a pro-renin processing enzyme and converts inactive pro-renin to active renin. Cathepsin D, an aspartyl protease, is functionally homologous to renin. Cathepsin G, a serine protease, can directly produce ATII from ANG and ATI, and is functionally homologous to ACE ([@B14]). We have previously demonstrated an ESC-like population within infantile hemangioma ([@B15]) that expresses components of the RAS ([@B14], [@B15]) and also cathepsins B, D, and G, suggesting the existence of bypass loops ([@B14]).
In this study, we investigated the expression and localization of cathepsins B, D, and G in relation to the CSC subpopulations within MDOTSCC. NanoString mRNA analysis and colorimetric *in situ* hybridization (CISH) were used to confirm mRNA transcription. Protein expression and localization of each cathepsin was determined by 3,3-diaminobenzidine (DAB) and immunofluorescent (IF) immunohistochemical (IHC) staining. Enzymatic activity assays were performed to demonstrate the activity of these cathepsins.
Materials and Methods {#S2}
=====================
Tissue Samples {#S2-1}
--------------
Moderately differentiated oral tongue squamous cell carcinoma samples from four male and five female patients, aged 30--73 (mean, 58.2) years, were sourced from the Gillies McIndoe Research Institute Tissue Bank for this study, which was approved by the Central Regional Health and Disability Ethics Committee (ref. no 12/CEN/74). Written consent was obtained from all participants.
Histochemical and IHC Staining {#S2-2}
------------------------------
Hematoxylin and eosin (H&E) staining was used to confirm the presence and appropriate histological grading on 4 μm thick formalin-fixed paraffin-embedded of MDOTSCC sections from nine patients by an anatomical pathologist (HDB). These MDOTSCC sections were then used for DAB IHC staining, as previously described ([@B6], [@B13]), using primary antibodies for cathepsin B (1:1,000; cat\# sc-6490-R, Santa Cruz, CA, USA), cathepsin D (1:200; cat\# NCL-CDm, Leica, Newcastle upon Tyne, UK), cathepsin G (1:200; cat\# sc-33206, Santa Cruz, CA, USA), EMA (ready-to-use, cat\# PA0035, Leica), OCT4 (1:30, cat\# MRQ-10, Cell Marque, Rocklin, CA, USA), and tryptase (1:300, cat\# NCL-MCTRYP-428, Leica). All DAB IHC-stained slides were mounted in Surgipath Micromount (Leica).
Immunofluorescent (IF) IHC staining was performed to determine co-expression of two proteins on two samples of MDOTSCC from the original cohort of nine patients used for DAB IHC staining. Vectafluor Excel anti-mouse 488 (ready-to-use; cat\# VEDK2488, Vector Laboratories, Burlingame, CA, USA) and Alexa Fluor anti-rabbit 594 (1:500; cat\# A21207, Life Technologies, Carlsbad, CA, USA) were utilized to detect the combinations. All IF IHC-stained slides were mounted in Vecta Shield Hardset mounting medium with 4′,6′-diamino-2-phenylindole (Vector Laboratories).
Positive control tissues used for the primary antibodies were human placenta for cathepsin B; human breast cancer for cathepsin D; mouse bone marrow for cathepsin G; and human seminoma for OCT4 and SALL4. A negative MDOTSCC control sample was prepared for DAB IHC staining by using an IgG isotype control (ready-to-use; cat\# IR600, Dako, Santa Clara, CA, USA). For IF IHC staining, a negative control was performed using a section of MDOTSCC tissue with the combined use of primary isotype mouse (ready-to-use; cat\# IR750, Dako, Copenhagen, Denmark) and rabbit (read-to-use; cat\# IR600, Dako) antibodies.
All antibodies were diluted with Bond primary antibody diluent (cat\# AR9352, Leica), and DAB and IF IHC staining was carried out on the Leica Bond Rx autostainer, as previously described ([@B16]).
NanoString mRNA Analysis {#S2-3}
------------------------
Six snap-frozen samples of MDOTSCC from the original cohort of nine patients used for DAB IHC staining were used for isolation of total mRNA for NanoString nCounter™ Gene Expression Assay (Nanostring Technologies, Seattle, WA, USA), as previously described ([@B6], [@B13]). Probes for the genes encoding for cathepsin B (NM_001908.2), cathepsin D (NM_001909.3), cathepsin G (NM_001911.2), and the housekeeping gene PGK1 (NM_000291.3) were used in the analysis. Raw data were analyzed by nSolver™ software (NanoString Technologies). Results were normalized against the housekeeping gene, graphed using Excel (Microsoft Office 2013), and subjected to *t*-tests for related samples, to compare the relative abundance of each cathepsin.
Colorimetric *In Situ* Hybridization {#S2-4}
------------------------------------
4 μm thick formalin-fixed paraffin-embedded sections of six samples of MDOTSCC from the original cohort of nine patients used for DAB IHC staining were used for CISH. Staining was carried out on the Leica Bond Rx auto-stainer and detected using the ViewRNA red stain kit (Affymetrix, Santa Clara, CA, USA), as previously described ([@B16]). The probes used for cathepsin B (cat\# VA1-12282), cathepsin D (cat\# VA1-12281), cathepsin G (cat\# VA1-21016), and *Bacillus* (cat\# VF1-11712, Affymetrix) as a negative control. Positive controls used were the same for DAB IHC staining.
Cell Counting and Statistical Analyses {#S2-5}
--------------------------------------
Cell counting was performed on six fields of view of the DAB IHC-stained slides of the nine MDOTSCC samples, including cells within the TNs and those within the peri-tumoral stroma, at 400× magnification. Fields of views were selected on regions that exhibited the highest density of staining. The proportion of cells within the TNs and the peri-tumoral stroma stained positively in each field of view was calculated using Excel (Microsoft Office, 2013), and results were subjected to *t*-tests for related samples, using SPSS v.22 statistical package. Total cell counts were also subjected to χ^2^ statistical analysis, comparing relative abundance of each cathepsin.
Enzymatic Activity Assays {#S2-6}
-------------------------
Enzyme activity assays for cathepsin B (cat\# ab65300, Abcam), cathepsin D (cat\# ab65302, Abcam), and cathepsin G (cat\# ab126780, Abcam) were performed on three snap-frozen MDOTSCC samples of the cohort of six patients used for NanoString mRNA analysis, according to the manufacturer's protocol. A snap-frozen tonsil sample was used as an appropriate positive control for the cathepsins B ([@B17]) and D ([@B18]) assays, and a denatured sample of the same tonsil was used as an appropriate negative control. The capthepsin G assay kit was supplied with its positive and negative controls. The results were obtained using the Variskan Flash plate reader (Thermo Fisher Scientific). Experiments were performed in duplicates with averages taken for each.
Image Analysis {#S2-7}
--------------
3,3-Diaminobenzidine IHC-stained and CISH-stained slides were viewed and imaged on Olympus BX53 light microscope (Olympus). IF IHC-stained slides were viewed and imaged using Olympus FV1200 confocal laser-scanning microscope and processed with cellSens Dimension 1.11 software using 2D deconvolution algorithm (Olympus).
Results {#S3}
=======
Histochemical and 3,3-DAB IHC Staining {#S3-1}
--------------------------------------
Hematoxylin and eosin staining of 4 μm-thick, formalin-fixed, paraffin-embedded sections of all nine MDOTSCC samples confirm the presence and appropriate histological grading. 3,3-Diaminobenzidine IHC staining demonstrated cytoplasmic expression of cathepsin B (Figure [1](#F1){ref-type="fig"}A, brown) by cells predominantly within the TNs (Figure [1](#F1){ref-type="fig"}A, brown, *arrows*) and cells within the peri-tumoral stroma (Figure [1](#F1){ref-type="fig"}A, brown, *arrowheads*). Granular cytoplasmic staining of cathepsin D (Figure [1](#F1){ref-type="fig"}B, brown) was localized to cells within the TNs (Figure [1](#F1){ref-type="fig"}B, brown, *arrows*) and some cells within the peri-tumoral stroma (Figure [1](#F1){ref-type="fig"}B, brown, *arrowheads*). Cathepsin G was expressed in the cytoplasm of only some cells within the peri-tumoral stroma (Figure [1](#F1){ref-type="fig"}C, brown, *arrowheads*).
![Representative 3,3-diaminobenzidine immunohistochemical-stained sections of moderately differentiated oral tongue squamous cell carcinoma demonstrating cytoplasmic expression of cathepsin B \[**(A)**, brown\] within the tumor nests (TNs) and the peri-tumoral stroma. Granular staining of cathepsin D \[**(B)**, brown\] was present predominantly on cells within the TNs and those within the peri-tumoral stroma. Cytoplasmic expression of cathepsin G \[**(C)**, brown\] was demonstrated in cells within the peri-tumoral stroma. Nuclei were counter-stained with hematoxylin \[**(A--C)**, blue\]. Original magnification: 400×.](fmed-04-00100-g001){#F1}
Positive controls for cathepsins B (Figure [S1](#SM1){ref-type="supplementary-material"}A in Supplementary Material, brown), D (Figure [S1](#SM1){ref-type="supplementary-material"}B in Supplementary Material, brown), and G (Figure [S1](#SM1){ref-type="supplementary-material"}C in Supplementary Material, brown) demonstrated expected staining patterns in human placenta ([@B19]) and breast cancer ([@B20]), and mouse bone marrow ([@B21]), respectively. The negative control showed minimal staining (Figure [S1](#SM1){ref-type="supplementary-material"}D in Supplementary Material, brown).
IF IHC Staining {#S3-2}
---------------
To localize cathepsins B, D, and G in relation to the CSC sub-populations, IF IHC staining was performed on two representative MDOTSCC samples from the original cohort of nine patients used for DAB IHC staining.
The EMA^+^ cells (Figures [2](#F2){ref-type="fig"}A--C, green) within the TNs ([@B6]) expressed both cathepsin B (Figure [2](#F2){ref-type="fig"}A, red) and cathepsin D (Figure [2](#F2){ref-type="fig"}B, red), with no expression of cathepsin G (Figure [2](#F2){ref-type="fig"}C, red). Consistent with the results of DAB IHC staining, IF IHC staining demonstrated immunoreactivity (IR) for cathepsin B (Figure [2](#F2){ref-type="fig"}A, red, *arrows*) and cathepsin D (Figure [2](#F2){ref-type="fig"}B, red, *arrows*) by cells within the peri-tumoral stroma. The CSC subpopulation within the peri-tumoral stroma of MDOTSCC which expresses OCT4 ([@B6]) (Figures [2](#F2){ref-type="fig"}D--F, green) demonstrated IR for cathepsin B (Figure [2](#F2){ref-type="fig"}D, red), but not cathepsin D (Figure [2](#F2){ref-type="fig"}E, red) or cathepsin G (Figure [2](#F2){ref-type="fig"}F, red).
![Representative immunofluorescent immunohistochemical-stained sections of moderately differentiated oral tongue squamous cell carcinoma demonstrating expression of cathepsin B \[**(A,D)**, red\] by the EMA^+^ \[**(A)**, green\] cells within the tumor nests (TNs), and the OCT4^+^ \[**(D)**, green\] cells within the peri-tumoral stroma. Cathepsin D \[**(B,E)**, red\] was expressed by the EMA^+^ cells within the TNs \[**(B)**, green\], but not the OCT4^+^ cells within the peri-tumoral stroma \[**(E)**, green\]. Cathepsin D \[**(G)**, red\] was not co-localized to the cells that expressed tryptase \[**(G)**, green\]. Cathepsin G \[**(C,F)**, red\] was not expressed by the EMA^+^ cells within the TNs \[**(C)**, red\] or the OCT4^+^ cells within the peri-tumoral stroma \[**(F)**, red\]. The tryptase^+^ cells \[**(H)**, green\] within the peri-tumoral stroma also expressed cathepsin G \[**(H)**, red\]. All slides were counter-stained with 4′,6′-diamino-2-phenylindole. Scale bars: 20 µm.](fmed-04-00100-g002){#F2}
To further characterize the cathepsin D^+^ (Figure [2](#F2){ref-type="fig"}G, red) and cathepsin G^+^ (Figure [2](#F2){ref-type="fig"}H, red) cells, we performed co-staining with tryptase, as we have reported in infantile hemangioma ([@B14]). This confirmed that tryptase (Figures [2](#F2){ref-type="fig"}G,H, green) was not expressed by the cathepsin D^+^ (Figure [2](#F2){ref-type="fig"}G, red) cells, but was expressed by the cathepsin G^+^ (Figure [2](#F2){ref-type="fig"}H, red) cells.
Images illustrating the individual stains demonstrated in Figure [2](#F2){ref-type="fig"} are presented in Figure [S2](#SM2){ref-type="supplementary-material"} in Supplementary Material. Minimal staining was present on the negative control (Figure [S2](#SM2){ref-type="supplementary-material"}Q in Supplementary Material), confirming the specificity of the primary antibodies used.
NanoString mRNA Analysis {#S3-3}
------------------------
NanoString mRNA analysis for cathepsins B, D, and G was normalized against the housekeeping gene, PGK1, confirming transcriptional activation for both cathepsins B and D in all six MDOTSCC samples, whereas cathepsin G was detected at low levels in four of the six samples studied (Figure [3](#F3){ref-type="fig"}).
{#F3}
Statistical analysis of the gene transcripts confirmed significantly greater presence of cathepsin B than cathepsin D (*t* = 3.073, *p* \< 0.05), and that both cathepsins B and D were significantly more abundant than cathepsin G (*t* = 4.701 and *t* = 4.885, respectively, *p* \< 0.01).
Colorimetric *In Situ* Hybridization {#S3-4}
------------------------------------
Colorimetric *in situ* hybridization confirmed the presence of mRNA for cathepsin B (Figure [4](#F4){ref-type="fig"}A, pink, *arrows*), cathepsin D (Figure [4](#F4){ref-type="fig"}B, pink, *arrows*), and cathepsin G (Figure [4](#F4){ref-type="fig"}C, pink, *arrows*) in cells within all six MDOTSCC samples examined.
![Representative colorimetric *in situ* hybridization stained sections of moderately differentiated oral tongue squamous cell carcinoma demonstrating mRNA expression of cathepsin B \[**(A)**, pink\], cathepsin D \[**(B)**, pink\], and cathepsin G \[**(C)**, pink\]. Original magnification: 1,000×.](fmed-04-00100-g004){#F4}
Appropriate staining was seen on positive controls for cathepsin B (Figure [S3](#SM3){ref-type="supplementary-material"}A in Supplementary Material, pink, *arrows*), cathepsin D (Figure [S3](#SM3){ref-type="supplementary-material"}B in Supplementary Material, pink, *arrows*), and cathepsin G (Figure [S3](#SM3){ref-type="supplementary-material"}C in Supplementary Material, pink, *arrows*), indicating the presence of mRNA transcripts in the controls. The negative control performed on each run showed the absence of mRNA transcripts for any marker (Figure [S3](#SM3){ref-type="supplementary-material"}D in Supplementary Material).
Cell Counting and Statistical Analyses {#S3-5}
--------------------------------------
Cell counting for cathepsins B, D, and G (Figure [5](#F5){ref-type="fig"}) in all nine samples demonstrated significantly more cells staining positively for cathepsin B within the TNs, than those within the peri-tumoral stroma (91% vs. 77%, *t* = 10.281, *p* \< 0.000). Analysis using χ^2^ method showed that there were significantly more cathepsin B^+^ cells than cathepsin D^+^ cells (χ^2^ = 409.9.261, *p* \< 0.0001), and that there was significantly more cathepsin D^+^ cells relative to the cathepsin G^+^ cells (χ^2^ = 3356.0, *p* \< 0.0001). Consequently, we conclude that there was significantly more cathepsin B than cathepsin G.
{#F5}
Enzymatic Activity Assays {#S3-6}
-------------------------
To determine the functionality of the cathepsins B, D, and G within MDOTSCC, we performed enzymatic activity assays, which confirmed the functional activity for cathepsin B (Figure [6](#F6){ref-type="fig"}A) and cathepsin D (Figure [6](#F6){ref-type="fig"}B), but not cathepsin G (Figure [6](#F6){ref-type="fig"}C) within all three MDOTSCC samples, as compared with the expected activity for the positive and negative controls (Figures [6](#F6){ref-type="fig"}A--C).
{#F6}
Discussion {#S4}
==========
We have recently demonstrated expression of components of the RAS by the two CSC subpopulations within MDOTSCC ([@B13]). The novel finding of the expression and localization of cathepsins B, D, and G to these CSC subpopulations provides further insights into the biology of this cancer.
It is intriguing that cathepsin B is present in both CSC subpopulations within the TNs and the peri-tumoral stroma. However, cathepsin D is localized only to the CSC subpopulation within the TNs, while cathepsin G is localized exclusively to the tryptase^+^ phenotypic mast cells within the peri-tumoral stroma, similar to the finding in infantile hemangioma ([@B14]).
The expression of cathepsin B has been recently reported in oral cavity SCC ([@B22]). Yang et al. ([@B22]) have demonstrated that increased expression of cathepsin B is correlated with lymph node metastasis, higher tumor grade, and significantly poorer overall survival.
The finding that only four of the six MDOTSCC samples displayed relative low abundance of cathepsin G by NanoString mRNA analysis may be due to either rapid degradation of mRNA for this protein or sampling bias. However, the low transcriptional abundance may reflect the relatively low numbers cells that stained positively for cathepsin G by IHC staining.
Cathepsins B, D, and G exist in precursor forms, with the mature form of cathepsin B being 29 kDa, and its precursor form being 39 kDa ([@B23]). Its conversion requires a single cleavage of the precursor protease by either cathepsin B or in acidic conditions ([@B23], [@B24]). Cathepsin D has two precursor forms---the 51 kDa pre-pro-enzyme is cleaved, removing the signal peptide to form the 48 kDa pro-enzyme ([@B25]). Active cathepsin D is formed by removal of the 44 amino acid pro-domain of the pro-enzyme ([@B25]). Cathepsin D can be cleaved to form a single or two-chain form ([@B26]).
It is exciting to speculate that both cathepsin B and cathepsin D undergo "intra-tumoral" post-translational modification following synthesis, with the latter being confirmed by enzyme activity assays we have performed.
The precursor of cathepsin G is a 32.5 kDa protein which includes a signal peptide and a pro-dipeptide at the N terminus ([@B27]--[@B29]). This is cleaved by another protease, cathepsin C, to form the active 28.5 kDa cathepsin G ([@B27], [@B29]). Although we have confirmed transcriptional activation for cathepsin G and demonstrated localization of this protein to cells by IHC staining within the MDOTSCC samples, we used in this study, it was not possible to determine whether cathepsin G would undergo posttranslational modification into the active form, based on the activity data. However, given the relatively low number of cathepsin G^+^ cells, such activity may not be detectable by the activity kit used in this study. Furthermore, it is interesting that cathepsin G is expressed by mast cells, consistent with previous reports ([@B14]). However, its precise role in MDOTSCC carcinogenesis remains to be determined.
Recent literature suggests that the RAS plays a crucial role in cancer growth and metastasis ([@B8], [@B9]), specifically cell proliferation ([@B10]). We have demonstrated expression of cathepsins B and D by the two CSC subpopulations, and the expression of cathepsin G by the phenotypic mast cells within MDOTSCC that we have recently identified. This suggests the putative presence of bypass loops for the RAS in MDOTSCC ([@B30]).
This report suggests CSCs as a potential therapeutic target for MDOTSCC, through modulation of cathepsin B and D, and potentially G, in addition to modulation of the classical RAS. A larger study is needed to validate these findings.
Limitations {#S4-1}
-----------
1. Further study with a bigger sample size would be needed to confirm the observation of this study.
2. Further study including well and poorly differentiated OTSCC, in addition to moderately differentiated lesions may improve understanding of this aggressive cancer.
3. Functional study using *in vitro* and *in vivo* models of MDOTSCC would be needed to further validate the results of this study.
Take Home Messages {#S4-2}
------------------
1. Cathepsins B, D, and G are expressed by MDOTSCC.
2. Cathepsin B is localized to the CSC subpopulations within the TNs and the peri-tumoral stroma.
3. Cathepsin D is localized to the CSC subpopulation within the TNs.
4. Cathepsin G is localized to the phenotypic mast cells within the peri-tumoral stroma.
5. Cathepsins B and D are active in MDOTSCC.
6. These novel findings suggest CSCs within MDOTSCC as a potential therapeutic target by modulating the RAS.
Ethics Statement {#S5}
================
This study was approved Central Regional Health and Disability Ethics Committee (ref. no. 12/CEN/74).
Author Contributions {#S6}
====================
TI and ST formulated the study hypothesis and designed the study. TF, HB, TI, and ST interpreted the IHC staining data. TF and TI interpreted the NanoString data. TF performed cell counting. BvS performed the enzymatic activity assays and interpreted the results. RM performed statistical analysis. TF, TI, and ST drafted the manuscript. All authors approved the manuscript.
Conflict of Interest Statement {#S7}
==============================
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. TI and ST are inventors of the PCT patent application (no. PCT/NZ2015/050108) Cancer Diagnosis and Therapy.
We thank Ms. Liz Jones of the Gillies McIndoe Research Institute for their assistance in IHC staining. TF was supported by the Kristen Deane Scholarship.
Supplementary Material {#S8}
======================
The Supplementary Material for this article can be found online at <http://journal.frontiersin.org/article/10.3389/fmed.2017.00100/full#supplementary-material>.
######
Representative 3,3-diaminobenzidine immunohistochemical stained sections of positive control tissues showing staining for cathepsin B in human placenta \[**(A)**, brown\], cathepsin D in human breast cancer \[**(B)**, brown\], and cathepsin G in mouse bone marrow \[**(C)**, brown\]. A moderately differentiated oral tongue squamous cell carcinoma sample was used as a negative control by using an IgG isotype control\[**(D)**, brown\].
######
Click here for additional data file.
######
Split immunofluorescent immunohistochemical-stained images demonstrated in Figure [2](#F2){ref-type="fig"} for cathepsin B \[**(A,G)**, red\], cathepsin D \[**(C,I,M)**, red\], cathepsin G \[**(E,K,O)**, red\], EMA \[**(B,D,F)**, green\], OCT4 \[**(H,J,L)**, green\] and tryptase \[**(N,P)**, green\]. Cell nuclei were counterstained with 4′,6′-diamino-2-phenylindole \[**(A--Q)**, blue\]. A moderately differentiated oral tongue squamous cell carcinoma sample was used as a negative control **(Q)** by using primary isotype mouse and rabbit antibodies.
######
Click here for additional data file.
######
Representative colorimetric in situ hybridization stained sections of positive control tissues showing positive staining of cathepsin B in human placenta \[**(A)**, pink\], cathepsin D in human breast cancer \[**(B)**, pink\], and cathepsin G in mouse bone marrow \[**(C)**, pink\]. A moderately differentiated oral tongue squamous cell carcinoma samples was used as a negative control\[**(D)**, pink\] using a Bacillus probe.
######
Click here for additional data file.
[^1]: Edited by: Luigi Tornillo, University of Basel, Switzerland
[^2]: Reviewed by: Sabrina Battista, Consiglio Nazionale delle Ricerche, Italy; Giovanna Maria Pierantoni, Università degli Studi di Napoli Federico II, Italy
[^3]: ^†^Equal senior authors.
[^4]: Specialty section: This article was submitted to Pathology, a section of the journal Frontiers in Medicine
|
// Copyright (c) .NET Foundation. All rights reserved.
// Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information.
// Simplified for prometheus-net for dependency reduction reasons.
using System.Diagnostics.CodeAnalysis;
using System.Diagnostics.Contracts;
using System.IO;
using System.Net.Http.Headers;
using System.Threading.Tasks;
namespace System.Net.Http
{
/// <summary>
/// Provides an <see cref="HttpContent"/> implementation that exposes an output <see cref="Stream"/>
/// which can be written to directly. The ability to push data to the output stream differs from the
/// <see cref="StreamContent"/> where data is pulled and not pushed.
/// </summary>
sealed class PushStreamContentInternal : HttpContent
{
private readonly Func<Stream, HttpContent, TransportContext, Task> _onStreamAvailable;
private static readonly MediaTypeHeaderValue OctetStreamHeaderValue = MediaTypeHeaderValue.Parse("application/octet-stream");
/// <summary>
/// Initializes a new instance of the <see cref="PushStreamContentInternal"/> class with the given <see cref="MediaTypeHeaderValue"/>.
/// </summary>
public PushStreamContentInternal(Func<Stream, HttpContent, TransportContext, Task> onStreamAvailable, MediaTypeHeaderValue mediaType)
{
_onStreamAvailable = onStreamAvailable;
Headers.ContentType = mediaType ?? OctetStreamHeaderValue;
}
/// <summary>
/// When this method is called, it calls the action provided in the constructor with the output
/// stream to write to. Once the action has completed its work it closes the stream which will
/// close this content instance and complete the HTTP request or response.
/// </summary>
/// <param name="stream">The <see cref="Stream"/> to which to write.</param>
/// <param name="context">The associated <see cref="TransportContext"/>.</param>
/// <returns>A <see cref="Task"/> instance that is asynchronously serializing the object's content.</returns>
[SuppressMessage("Microsoft.Design", "CA1031:DoNotCatchGeneralExceptionTypes", Justification = "Exception is passed as task result.")]
protected override async Task SerializeToStreamAsync(Stream stream, TransportContext context)
{
TaskCompletionSource<bool> serializeToStreamTask = new TaskCompletionSource<bool>();
Stream wrappedStream = new CompleteTaskOnCloseStream(stream, serializeToStreamTask);
await _onStreamAvailable(wrappedStream, this, context);
// wait for wrappedStream.Close/Dispose to get called.
await serializeToStreamTask.Task;
}
/// <summary>
/// Computes the length of the stream if possible.
/// </summary>
/// <param name="length">The computed length of the stream.</param>
/// <returns><c>true</c> if the length has been computed; otherwise <c>false</c>.</returns>
protected override bool TryComputeLength(out long length)
{
// We can't know the length of the content being pushed to the output stream.
length = -1;
return false;
}
internal class CompleteTaskOnCloseStream : DelegatingStreamInternal
{
private TaskCompletionSource<bool> _serializeToStreamTask;
public CompleteTaskOnCloseStream(Stream innerStream, TaskCompletionSource<bool> serializeToStreamTask)
: base(innerStream)
{
_serializeToStreamTask = serializeToStreamTask;
}
[SuppressMessage(
"Microsoft.Usage",
"CA2215:Dispose methods should call base class dispose",
Justification = "See comments, this is intentional.")]
protected override void Dispose(bool disposing)
{
// We don't dispose the underlying stream because we don't own it. Dispose in this case just signifies
// that the user's action is finished.
_serializeToStreamTask.TrySetResult(true);
}
}
}
}
|
In return for his guilty plea Monday to aggravated manslaughter, the Burlington County prosecutor agreed to recommend 10 years in state prison for Darren Winningham, 44, when he is sentenced April 27 before Superior Court Judge Terrence R. Cook.
County Prosecutor Scott Coffina said on the night of April 23, 2016, police officers from Delanco, Delran, Edgewater Park and Riverside Township responded to a call about a person with a gun at a party inside an apartment in the 200 block of Hooker Street.
Officers found Nikita Cross, 35, of Galloway Township, lying on the floor with a
gunshot wound to her chest.
Coffina said she later was pronounced dead at Lourdes Medical Center in Willingboro. Winningham was arrested without incident and has remained since then in the Burlington County Jail.
|
Forgive me if they're not Napoleonic.. But they seem to be.
What's very confusing about this set is that 5 of them are yellow skinned while 3 are flesh.. Thoughts?
Still, it's easy to customize them anyway but a bit of consistency from POGO wouldn't have hurt. Maybe they thought best of both worlds? But I don't think they did it well haha
|
# Changelog for Elixir runtime
This is a history of elixir runtime releases.
Generally, you can cause Google App Engine to use the latest stable runtime by
choosing the following in your `app.yaml` config file:
runtime: gs://elixir-runtime/elixir.yaml
However, you may also pin to a specific version of the runtime by specifying
the version name as the yaml file name. For example, to pin to the
`elixir-2019-10-09-181239` release, use:
runtime: gs://elixir-runtime/elixir-2019-10-09-181239.yaml
There is currently no guarantee regarding how long older runtime releases will
continue to be supported. It is generally best not to pin to a specific
release unless absolutely necessary, and then you should return to latest as
soon as possible.
## elixir-2020-08-03-131308
* Update default Elixir to 1.10.4.
* Update default OTP to 22.3.4.4.
* Prebuilt OTP 20.3.8.26, 21.3.8.17, 22.3.1 through 22.3.4.4, and 23.0 through 23.0.3.
* Update gcloud to 303.0.0
* Update nodejs to 12.18.3
## elixir-2020-04-07-131853
* Update default Elixir to 1.10.2
* Update default OTP to 22.2.8
* Prebuilt OTP 21.3.8.13, 21.3.8.14, 22.2.4 through 22.2.8, and 22.3.
* Update gcloud to 287.0.0
* Update nodejs to 12.16.1
* Update asdf to 0.7.8
## elixir-2020-01-22-160655
* Prebuilt OTP 21.3.8.12, 22.1.8.1, and 22.2 through 22.2.3
* Update default OTP to 22.2.3
* Update gcloud to 277.0.0
* Update nodejs to 12.14.1
* Update asdf to 0.7.6
## elixir-2019-12-10-142915
* Prebuilt OTP 21.3.8.11 and 22.1.8
* Update default OTP to 22.1.8
* Update gcloud to 273.0.0
* Update nodejs to 12.13.1
## elixir-2019-11-14-223500
* Prebuilt OTP up to 22.1.7
* Update default elixir to 1.9.4
* Update default OTP to 22.1.7
* Update gcloud to 271.0.0
* Update asdf to 0.7.5
## elixir-2019-10-29-183530
* Prebuilt OTP up to 21.3.8.10 and 22.1.5
* Removed prebuilt OTP 21.0.1 through 21.0.8 (but kept 21.0 and 21.0.9)
* Update default elixir to 1.9.2
* Update default OTP to 22.1.5
* Update gcloud to 268.0.0
* Update nodejs to 12.13.0
## elixir-2019-10-09-181239
* Prebuilt OTP 21.3.8.7, 22.1, and 22.1.1.
* Update default to elixir to 1.9.1.
* Update default OTP to 22.1.1.
* Allow custom debian packages with plus signs in the name.
* Update gcloud to 265.0.0
* Update nodejs to 10.16.3
* Update asdf to 0.7.4
## elixir-2019-07-18-112708
* Supports building releases using the built-in mix release in elixir 1.9.
* Supports the usage changes in distillery 2.1.
* Update default elixir to 1.9.0, unless pre-2.1 distillery is in use in which case it remains on 1.8.2.
* Update default OTP to 22.0.7.
* Prebuilt OTP through 21.3.8.6 and 22.0.7.
* Removed intermediate OTP 20.x versions from the prebuilt list. (The primary and latest versions are still present.)
* Update default gcloud to 253.0.0.
* Update asdf to 0.7.3.
## elixir-2019-07-01-065508
* Prebuilt OTP through 21.3.8.4 and 22.0.4.
* Update default OTP to 22.0.4.
* Update default gcloud to 252.0.0.
* Update nodejs to 10.16.0.
## elixir-2019-05-28-222238
* Prebuilt OTP through 21.3.7.1, 21.3.8.2, and 22.0.1.
* Update default OTP to 21.3.8.2, and default Elixir to 1.8.2.
* Update default gcloud to 247.0.0.
* Update asdf to 0.7.2
## elixir-2019-04-19-135626
* Prebuilt OTP 20.3.8.21, and 21.3.3 thru 21.3.6.
* Update default OTP to 21.3.6.
* Update gcloud to 242.0.0.
* Update asdf to 0.7.1.
## elixir-2019-03-21-181846
* Prebuilt OTP 21.2 up to 21.2.7, and 21.3 up to 21.3.2.
* Update default OTP to 21.3.2.
* Update gcloud to 239.0.0.
## elixir-2019-03-04-150411
* Updated the underlying OS from Ubuntu 16.04 (Xenial) to Ubuntu 18.04 (Bionic).
* Prebuilt OTP 20.3 up to 20.3.8.20, and 21.2 up to 21.2.6.
* Update default OTP to 21.2.6, and default Elixir to 1.8.1
* Update asdf to 0.7.0.
* Update gcloud to 236.0.0.
* Update nodejs to 10.15.2.
## elixir-2019-01-19-000446 (elixir-ubuntu16)
* This is the last planned release on Ubuntu 16.04 (Xenial). Future releases will update to Ubuntu 18.04 (Bionic). To remain on Xenial, pin to this release by setting the runtime to `gs://elixir-runtime/elixir-ubuntu16.yaml`
* Prebuilt OTP 20.3 up to 20.3.8.18, and 21.2 up to 21.2.3.
* Update default OTP to 21.2.3.
* Update gcloud to 230.0.0.
## elixir-2019-01-02-104948
* Prebuilt OTP 21.2, 21.2.1, and 21.2.2.
* Update default OTP to 21.2.2.
* Update gcloud to 228.0.0.
* Update nodejs to 10.15.0.
## elixir-2018-12-11-124828
* The runtime now recognizes Phoenix 1.4 and webpack when building assets. (Brunch is still supported for older projects.)
* Prebuilt OTP 20.3.8.x up to 20.3.8.15, and 21.1.x up to 21.1.4.
* Update default OTP to 21.1.4 and default Elixir to 1.7.4.
* Update gcloud to 227.0.0.
* Update nodejs to 10.14.1.
## elixir-2018-10-10-134614
* Set ASDF_DATA_DIR to fix asdf after being updated to 0.6.
* Prebuilt OTP 20.3.8.9, 21.0.9, and 21.1.
* Update default OTP to 21.0.9. Default Elixir remains 1.7.3.
* Update gcloud to 219.0.1.
* Update nodejs to 8.12.0.
## elixir-2018-09-11-102415
* Update defaults to OTP 21 and Elixir 1.7 (specifically OTP 21.0.8 and Elixir 1.7.3).
* Prebuilt OTP through 20.3.8.8 and 21.0.8
* Update gcloud to 215.0.0
* Update nodejs to 8.11.4
## elixir-2018-07-30-141124
* Prebuilt OTP through 20.3.8.3 and 21.0.4
* Update default OTP to 20.3.8.3. Default Elixir remains 1.6.6.
* Update gcloud to 209.0.0
* Update nodejs to 8.11.3
* Modify pipeline config so there is room for more erlang prebuilts.
## elixir-2018-06-22-144237
* OTP 20.3.8 and 21.0 are now prebuilt.
* Update default OTP to 20.3.8, and default Elixir to 1.6.6
* Update gcloud to 205.0.0
* Build image now includes automake, fop, and xsltproc, to support recent
asdf-erlang changes.
## elixir-2018-06-10-064921
* OTP 20.3.7 is prebuilt and is the default.
* Update gcloud to 204.0.0
* Pin prebuilt OTP image tags in each runtime release.
## elixir-2018-06-01-105216
* OTP 20.3.3, 20.3.4, 20.3.5, and 20.3.6 are now prebuilt.
* Update default OTP to 20.3.6, and default Elixir to 1.6.5
* Update asdf to 0.5.0, nodejs to 8.11.2, and gcloud to 203.0.0
## elixir-2018-04-03-180947
* OTP 20.3.2 is prebuilt and is the default
* Update nodejs to 8.11.1, and gcloud to 196.0.0
## elixir-2018-03-19-203701
* OTP 20.2.4, 20.3, and 20.3.1 are now prebuilt.
* Update default OTP from 20.2.2 to 20.3.1 and Elixir from 1.6.1 to 1.6.4.
* Update asdf to 0.4.3, nodejs to 8.10.0, and gcloud to 193.0.0
## elixir-2018-02-25-171329
* OTP 20.2.3 is now prebuilt.
* Update default Elixir from 1.5.3 to 1.6.1
* Update asdf to 0.4.2 and gcloud to 189.0.0
## elixir-2018-01-20-210216
* Prebuilt patch releases of OTP 20. Update default OTP to 20.2.2.
## elixir-2018-01-17-121145
* Support for building releases in an environment other than `prod`.
* OTP 20.2 is now prebuilt. Update default OTP from 20.1 to 20.2.
* Update default Elixir from 1.5.2 to 1.5.3.
* Update NodeJS to 8.9.4 and GCloud to 185.0.0 in the build image.
* Don't attempt to prepend `exec` to entrypoints that set environment variables
inline.
## elixir-2017-11-29-234522
This is a major overhaul of the runtime with significant new features and
fixes. Among those:
* Deployments can now be configured to build a release using Distillery, which
yields a more efficient deployment.
* Applications can provide a `.tool-versions` file specifying the particular
Erlang and Elixir versions to use. These are installed at build time.
* The builder image now includes a C compiler, so dependencies with a C
component should now install properly.
* Builds exclude directories that could contain prior development artifacts,
such as deps, _build, and node_modules, to prevent those from leaking into
the production build.
* The builder image now includes gcloud, so build steps can easily do things
like download files from Cloud Storage.
The test suite has also been fleshed out, and a bunch of minor issues have
been fixed, so the runtime should be more stable moving forward.
## elixir-2017-10-17-142851
* Generate the correct brunch build script for phoenix umbrella apps.
## elixir-2017-10-03-154925
* Update OTP 20.0 to 20.1.
* Update Elixir 1.5.1 to 1.5.2.
* Some internal cleanup
## elixir-2017-09-02-192912
* Initial release
|
Asian Games 2018
Bangladesh make strong start in hockey
Sports Desk
21 August, 2018 12:00 AM
Bangladesh players celebrate after a goal during their Asian Games 2018 men’s hockey pool B match against Oman at Gelora Bung Karno Hockey Ground in Jakarta on Monday. Bangladesh won 2-1. —AFP PHOTO
Bangladesh Men’s National Hockey Team commenced their Asian Games 2018 campaign with a brilliant win over Oman by 2-1 goals at Gelora Bung Karno Hockey Ground in Jakarta on Monday.
Bangladesh overcame Oman due to the excellence of Mohammad Arshad and Ashraful Islam in the Pool-B match of the tournament.
For Bangladesh, the encounter against Oman was nothing short of final, as men in red and green’s primary target was to confirm final 6 and a defeat against Oman would mean immediate knock-out from the competition.
Bangladesh went on the offence from the start of the play and attacked Oman defence from every possible corner. Success came fast as Bangladesh led the first quarter by 1-0 goal with forward Hossain Mohammad Arshad’s exquisite field goal in the 14th minute.
Oman came back strongly in the match and equalised the scoreline as Ammaar Juma Salim Al-Shaaibi scored the all-important goal from a penalty corner in the 23rd minute.
But the boys did not get demoralised and went on counter-attack and broke through Oman’s ranks moments later on the 28th minute took the lead once again.
Bangladesh defender Ashraful Islam scored the winning one from a penalty corner making the margin 2-1.
Jimmy-Chayan led Bangladesh held their nerves in the next two-quarters for a successful start in the six-team Pool and to collect full three points.
Both the teams had ten shots while five shots on target with 5 penalty corners. This stat reflects the competitive nature of the encounter.
Bangladesh head coach Iman Gobinathan Krishnamurthy has been credited for bringing in young players who have changed the face of Bangladesh hockey. This win makes Bangladesh’s chances of finishing at least sixth bright as they will take on higher-ranked Malaysia, Pakistan as well as minnows Thailand and Kazakhstan in the remaining group matches.
Earlier, in the day’s another Pool-B match, Pakistan crushed Thailand by 10-0 goals to lead the points table.
In their remaining Pool matches, Bangladesh will play Kazakhstan, Malaysia, Thailand, and Pakistan on August 22, 24, 26 and 28.
With this win, Bangladesh also avenged their 0-2 defeat against Oman in the Asian Games Qualifiers earlier this year.
Iman Gobinathan Krishnamurthy’s boys had a good preparation ahead of Asian Games as they did their camp at South Korea upon the invitation of Korean Hockey Association.
The men in red and green played five warm-up matches against South Korea National Hockey Team during the tour. Of these five matches, Bangladesh were able to draw the fourth match while losing the rest of the matches.
However, in the last Asian Games, Bangladesh finished 8th conceding a 2-3 defeat against Oman in the place-deciding match in Incheon, South Korea 2014.
|
[Basic and clinical studies on use of clarithromycin granules in pediatrics].
Studies were conducted on in vivo pharmacokinetics of clarithromycin (TE-031, A-56268) in children and also on the efficacy and the safety of this macrolide antibiotic in the treatment of bacterial infections in children. The results obtained are summarized as follows: 1. TE-031 granules were orally administered to 5 children in a dosage of 5 mg/kg before meal. Maximum drug concentrations (range: 0.29-2.0 micrograms/ml) in the serum occurred during a period from 30 minutes to 1 hour after administration, but there were clear differences in blood concentrations among the individuals. 2. TE-031 granules were orally administered in a average dosage of 20 mg/kg/day to a total of 17 patients, consisting of 14 children with respiratory tract infections and 3 children with intestinal infections. The clinical efficacy evaluation resulted in 10 excellent cases, 6 good cases and 1 fair case, for an efficacy rate of 94.1%. 3. Studies on the bacterial efficacy were carried out for 10 cases. The TE-031 bacteriological efficacy evaluation showed elimination in 7 cases, a decreased bacterial count in 2 cases, and no change in 1 case. The elimination rate was, thus, 70.0%. Elimination rates according to different species of bacteria were 66.7% (2 of 3 strains) for Staphylococcus aureus, 100% for both Streptococcus pneumoniae (3 of 3) and Streptococcus pyogenes (1 of 1), and 42.9% (3 of 7) for Haemophilus influenzae. 4. There were no symptoms which were attributable to side effects of the TE-031 therapy. The only laboratory test abnormality detected was eosinophilia in 1 patient.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.